Anonymous The "Man Without A Head"

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 11

ANONYMOUS

THE "MAN
WITHOUT A HEAD"
ANONYMOUS IS A DECENTRALIZED INTERNATIONAL ACTIVIST(A
PERSON WHO CAMPAIGNS TO BRING ABOUT POLITICAL OR SOCIAL
CHANGE) /HACKTIVIST(A PERSON WHO GAINS UNAUTHORIZED ACCESS
TO COMPUTER FILES OR NETWORKS IN ORDER TO FURTHER SOCIAL
OR POLITICAL ENDS.) COLLECTIVE (DONE BY PEOPLE ACTING AS A
GROUP.) THAT IS WIDELY KNOWN FOR ITS VARIOUS CYBER ATTACKS
/

 AGAINST SEVERAL GOVERNMENTS, GOVERNMENT INSTITUTIONS AND 


GOVERNMENT AGENCIES, CORPORATIONS AROUND THE WORLD ,
ANONYMOUS ORIGINATED IN 2003 THEIR MOTTO IS “WE ARE
ANONYMOUS”
THE HACKER GROUP "ANONYMOUS" LAUNCHED A LOT OF CYBER
ATTACKS SINCE 2003 TILL THIS DAY.
SOME OF THESE ATTACKS:
1 ) 4CHAN AND 420CHAN RAIDS (2003–2007)
2 ) ENCYCLOPEDIA DRAMATICA (2004–PRESENT)
3 ) PROJECT CHANOLOGY (2008)
4 ) #OP-OKLAHOMA (2013)
5 ) #OPERATION KKK (KU KLUX KLAN) (2015)
6 ) #OP-SAUDI (2013)
7 ) #OP-ISIS (2015)
8 ) #OP-PARIS (2015)
9 ) #OP-NASA DRONES (2015)
10 ) KILLING OF GEORGE FLOYD (2020)
11 ) OPERATION NIGERIA (2020)

AND THERE IS A LOT MORE


ANONYMOUS LAUNCHED AN ATTACK ON SEVERAL
INTERNET SITES IN ISRAEL NAMED “OP-ISRAEL
(OPERATION ISRAEL) ” IS AN ANNUAL COORDINATED 
CYBER-ATTACK WHERE HACKTIVISTS ATTACK
ISRAELI GOVERNMENT AND EVEN PRIVATE
WEBSITES WITH DDOS ATTACKS AND MORE. THE
INAUGURAL CAMPAIGN WAS LAUNCHED IN 2013 BY 
ANONYMOUS HACKERS ON THE EVE OF 
HOLOCAUST REMEMBRANCE DAY (ISRAEL'S DAY OF
COMMEMORATION FOR THE APPROXIMATELY SIX
MILLION JEWS WHO DIED IN THE HOLOCAUST AS A
RESULT OF THE ACTIONS CARRIED OUT BY 
NAZI GERMANY) THIS CAMPAIGN HAS SINCE BEEN
HELD ANNUALLY .
IN 2019 ANONYMOUS HACKERS LAUNCH ANNUAL ASSAULT
AGAINST THE GOVERNMENT OF ISRAEL FOR THEIR CONTINUED
OPPRESSION OF THE PALESTINIAN PEOPLE
THIS YEAR OPERATION IS A BIT DIFFERENT – LARGELY
DECENTRALIZED AND BEING LED BY “ANONYMOUS,” THE PRO-
PALESTINIAN HACKERS FROM AROUND THE WORLD HACKED
AROUND 106 GOVERNMENT TARGETS AND A IT WAS POSTED
ONLINE AND IN THE EARLY MORNING HOURS OF THE DAY,
SEVERAL ATTACKS HAVE ALREADY HIT ISRAEL,
CCTV CAMERA’S HAVE ALREADY BEEN HIJACKED AND FOOTAG
E FROM THEM STREAMED ONLINE

THEY CAUSED OVER $3 BILLION IN DAMAGE. THEY AFFECTED


100,000 WEBSITES, 40,000 FACEBOOK PAGES, 5,000 TWITTER
ACCOUNTS AND 30,000 BANK ACCOUNTS
#BLACKLIVESMATTER MOVEMENT
ANONYMOUS DECLARED A LARGE HACKING SEQUENCE ON MAY 28,
THREE DAYS AFTER THE MURDER OF GEORGE FLOYD. AN
INDIVIDUAL CLAIMING TO BE ANONYMOUS STATED THAT "WE ARE
LEGION. WE DO NOT FORGIVE. WE DO NOT FORGET. EXPECT US."
ANONYMOUS ADDRESSED POLICE BRUTALITY AND VOWED THAT
THEY "WILL BE EXPOSING YOUR MANY CRIMES TO THE WORLD". IT IS
SUSPECTED THAT ANONYMOUS ARE THE CAUSE FOR THE
DOWNTIME AND PUBLIC SUSPENSION OF THE 
MINNEAPOLIS POLICE DEPARTMENT WEBSITE AND ITS PARENT SITE,
THE WEBSITE OF THE CITY OF MINNEAPOLIS.
• A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic
of a targeted server, service or network by overwhelming the target or its surrounding
infrastructure with a flood of Internet traffic.

• DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as


sources of attack traffic. Exploited machines can include computers and other networked
resources such as IoT devices. all various internet-connected devices that are not traditional
computers.
• This includes everything from fitness trackers and smartwatches to smart refrigerators,
headphones, cameras, washing machines, cars, traffic lights, airplane engines, and home security
systems.
DDoS attacks are carried out with networks of Internet-connected machines.

These networks consist of computers and other devices (such as IoT devices) that have been infected with
malware(software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer
system.), allowing them to be controlled remotely by an attacker. These individual devices are referred to as bots (or
zombies), and a group of bots is called a botnet.

Once a botnet has been established, the attacker is able to direct an attack by sending remote instructions to each bot.

When a victim’s server or networkis targeted by the botnet, each bot sends requests to the target’s IP address,
potentially causing the server or network to become overwhelmed, resulting in a denial-of-service to normal traffic.

Because each bot is a legitimate Internet device, separating the attack traffic from normal traffic can be difficult.
TYPES OF DDOS (DISTRIBUTED DENIAL OF SERVICE)
ATTACKS USED BY ANONYMOUS

• Low Orbit Ion Cannon (LOIC) was originally developed by Praetox Technologies as an open-source
network stress testing tool. It allowed developers to subject their servers to heavy network traffic loads
for diagnostic purposes, but it has since been modified in the public domain through various updates and
been widely used by Anonymous as a DDoS tool
• HOIC (High Orbit Ion Cannon)  its "low-orbiting" cousin, this tool is is able to cause DoS through the
use of HTTP floods
• HTTP Flood  It consists of seemingly legitimate session-based sets of HTTP GET or POST requests sent
to a target web server. These requests are specifically designed to consume a significant amount of the
server's resources, and therefore can result in a DOS (denial-of-service condition) by using botnet
• Botnet it is a collection of compromised computers often referred to as "zombies" infected with malware
that allows an attacker to control them. Botnet owners or "herders" are able to control the machines in
their botnet by means of a covert channel (secret channel) such as IRC (Internet Relay Chat), issuing
commands to perform malicious activities such as distributed denial-of-service (DDoS) attacks, the
sending of spam mail, and information theft.
• All types of DDOS • Boy-in-the-Browser Attac • CVE • Fraggle Attack • Peer to Peer Attack
methods k
• Cyber Ransom • Fragmented ACK Attack • Nuke
• #RefRef • BrickerBot
• Darknet • Hijackware • Man-in-the-Browser Attack
• ADB Miner • Buffer Overflow Attack
• Darkness (Optima) • HEARTBLEED • Man-in-the-Middle Attack
• Admin.HLP • ByteDoS
• DarkSky • High-rate Attack • Low-rate Attack
• Advanced Persistent Attac • Clean Pipe
k • Digital Fraud • Honeypot • LAND Attack
• Clearnet
• Amplification Attack • Distributed Denial-of-Ser • Hping • Keylogging
• Click Fraud vice (DDoS) Attack
• Apache Killer • HTTPS Flood • Slow-Rate Attack
• Clickjacking • DNS Amplification Attack
• Application Misuse Attack • HTTP Fragmentation Attac • SIP Server Flood
• CoAP • DNS Flood k
• ARP Poisoning • Scareware
• Command and Control Se • DROWN • XerXeS
• Asymmetric Attack rver • RFI - LFI
• Duqu • Zeus
• Backdoor • Conflicker • R.U.D.Y.
• Dynamic Web Injection • WannaCry
• BEAST • Cookie (R-U-Dead-Yet?)
• Exploit • UDP Flood
• Booster Script • Cookie Poisoning
• Flame • TCP Flood
• Border Gateway Protocol • Counter-attack
(BGP) Attack • Forged Cookie • Teardrop Attack
• Cryptovirus
• Botmaster • FREAK • Session Hijacking
• CutWail Botnet Ransomware
• Botnet
• Password Spraying
Password spraying is an attack that attempts to access a large number of accounts (usernames) with a few
commonly used passwords.
Traditional brute-force attacks attempt to gain unauthorized access to a single account by guessing
the password.

AND A LOT MORE


• For more info about DDOS attacks types
• kindly check DDoSPedia

You might also like