{"data":{"pictureId":"81060ca0c02e456e961fe8a4a890eb3d","appversion":"4.9.0","stickerId":"","filterId":"","infoStickerId":"","imageEffectId":"","playId":"","activityName":"","os":"android","product":"retouch","originAppId":"7356","exportType":"","editType":"","alias":"","enterFrom":"enter_launch","ugExtraParams":"","capabilityKey":"","capabilityExtra":""},"source_type":"hypic","tiktok_developers_3p_anchor_params":"{"client_key":"awgvo7gzpeas2ho6","template_id":"","filter_id":[]}"}

Ok,ok, hoo hooo, new week. new start , new go, we got a new Undisclosed Gentlemany here, and yeah i like him, cool guy, cool manners , cool, cool…

We have the big Killnet here, this new week, we have talk about a lot of things have to say, we talk about motivation, development , techniques, perspectives of the threat landscape, and much much more, and at the end we have aaaaaaaaaaaaaa:

a big surprise


So,Stay tunerrrr-! See you at the end of this beautyfull Interview.



Let’s begun:

Interview With Killnet


The Motivation

Stega: What led you to get involved in hacking?

Kill authority: What led me into hacking was my father, he was a member of a group called cult of the dead cow.

Stega: Do you consider yourself a Black Hat? Just for Fun ? Hacktivist ? Grey Hat?

Kill authority: Id consider myself a grey hat because i do indulge in both legal and illegal things.

Stega: Were there any socio economic or cultural factors that influenced your decision to become and dedicate yourself to hacking?

Kill authority: There were not any socio economic or cultural factors.
I hack because its fun.

Stega: What initially drew you to counterintelligence and malware development?

Kill authority: What drew me to counter intelligence and malware individually was the fact threat actors now days arent as anonymous as they seem. i dislike when they prance around acting like they’re smart and untouchable when they infact are not.

Malware was just interesting for me, i love making rootkits and bootkits specifically.

Stega: How do you balance your interest in penetration testing with your focus on counterintelligence?

Kill authority: Hacking and counter intelligence can go hand in hand. take unit8200 and cozybear for example. unit8200 managed to hack and use counter intelligence to pwn cozybear. apts are very interesting

Stega: What’s your approach to staying anonymous and maintaining multiple identities? How do you stay anonymous? In the last few months we have seen how most of the threat actors have fallen from having a very bad opsec ?

Kill authority: I have around 3 alias’s at the moment. i utilize monero from pwned wallets / my own (that hasnt logged my identity or ip address) and use VOIPs and mullvad. My mullvad is not paid for by card nor did i pay for it myself so theres no link to me there.

All my social medias have no info on me like a name or ip address or phone number that could be directly tied to me as my irl identity.

Opsec is a big word of mouth thing so here and there i set traps and lies to tie into other lies that make it seem like im slowly releasing PII when infact thats not true.


Malware Development and Techniques

Stega: What’s the most important aspect of counterintelligence in your opinion?

Kill authority: Counter intel has alot to do with:

1.Server logs / footprint of the threat actor.
2.Alias’s and connected info on the alias’s.

Baphomet got pwned by me for using an alias he tied to his telegram. (i forgot it but i know it was linked to a twitter and then an email with his full name)

Stega: Are there particular tools or frameworks you find most effective for malware development?

Kill authority: Alot of my tools are self programmed but for counter intel the following will come in handy:

-0days.
-snusbase (for intel on the person).
-intelx (pwned credentials / ip on persons).
-phishing (less likely but can work if your target is dumb enough).

Ghidra and cuttr are good tools for reverse engineering malware.

Stega: What you think are the most common techniques to use to compromise systems Which ones do you find most effective?

Kill authority: the most common are definitively stealer logs. actual hackers are dying out and becoming more and more rare. what i find most effective are RCE 0days because i loveee RCE


Perspectives on the Cyber Landscape

Stega: How has the Discord platform influenced the hacking and counterintelligence communities?

Kill authority: Discord is a shit place for hackers. ive met 2-6 smart people on discord over the entire time ive been on that application. it definitely can lead you into hacking if you move your pieces correctly.

Stega: What are your thoughts on how current cybersecurity measures deal with advanced threats?

Kill authority: Advanced threat actors or advanced persistent threats are constantly shifting tactics when cybersecurity firms put in place techniques to block them.

No piece of code will be perfect and people will find 0day exploits.

Stega: How do you think emerging technologies like AI will impact malware development?

Kill authority: A.I where its at right now are god awful for maldev. even if you manage to bypass it, itll spit out some bloat POS code. in regards to hacking its terrible. it uses methods from the 1990s lmfao

Stega: Do you believe that the cat-and-mouse game between cyber defenders and attackers is sustainable, or do you foresee a turning point?

Kill authority: i think the cat and mouse game will go on for along time. far after my time hacking. people fix bugs others arise, threat actors take advantage of it

Stega: Do you think breach forums will remain open until the end of this year?

Kill authority: Breachforums may be open once this year elapses. i know for a fact intelbrokers opsec isnt great.

Stega: What do you think about most of the threat actors choose breach forums, is it their fame, their administrators, their security? What do you think about this?

Kill authority: its definitely fame, and com kids spreading the word around to other wannabe hackers.


Personal Questions (if it’s safe and appropriate)

Stega: You mentioned you don’t really care about the wellbeing of others. How do you think this influences your approach and goals?

Kill authority: My approach becomes dull in regards to others. i dont care of the outcome of my actions if i dont personally know them and like them.

Stega: Is there a specific goal or achievement you’re aiming for in the cybersecurity or hacking space?

Kill authority: I do want to become state sponsored by a certain agency. That’s my endgoal.

Stega: What’s the biggest lesson you’ve learned from your time spent evading detection and improving your tactics?

Kill authority: Even my opsec has been bad at time. ive never been doxed but people have definitely had leads on me.

DO NOT YAP speaking too much on personal topics will lead to your downfall.

Stega: Hacking is your main activity ? Was there a specific event that led you to this activity?

Kill authority: Hacking is definitely my main and only hobby, as i said above my father was a big impact and lead into this space.

Stega: What about hacking that you find most appealing? What attracts you personally?

Kill authority: Hacking is alot of adrenaline and dopamine. once you pwn the server or person you’ve been hunting its a large dopamine rush. i have to keep up with my friends aswell so i keep pushing and learning

Stega: What do you think are the biggest risks or fears you face as a hacker (blackhat)?

Kill authority: My biggest fear ofc is getting raided and prosecuted.

Stega: How do you stay motivated ? in a field that can be both highly stressful and unpredictable?money? adrenaline? friends?

Kill authority: Money is a large factor, data brokerage is lucrative. Friends continue to push me but i find the topic interesting.

Stega: Are you a member of a group or do you plan to form one? if it is not too much to ask ?

Kill authority: Ive both owned and been members of groups. i wont name them here but some are bigger than others.

Stega: What advice would you give to someone thinking of cyber crime? Or wants to dedicate himself to cybercrime ?

Kill authority: My best advice would be to not falter. if it may be information about themselves or letting services log info about them. keep your online life separate and do NOT link the two. find smart friends in cybercrime and learn from them.

White hat hacking wont get you anywhere, most techniques taught arent shit against modern infrastructure.


Surprises surprises, let’s go to exclusivism:

WHOO IS BAPHH????


WHOO IS BAPHH?????


WHOO IS BAPHH?????

WHOO IS BAPHH?????

WHOO IS BAPHH?????

WHOO IS BAPHH?????

WHOO IS BAPHH????? WHOO IS BAPHH?????

WHOO IS BAPHOMET?????

Stega: You mentioned several times about the real identity of baphomet, how did you know? How did you find him? Could you tell us some details? I have looked at it, and I could say with certainty that it could be him. I just need to refine a few more details before publishing it.

Kill authority: keiron dennies account on telegram had a previous name, “kizzyfish” through osint i found a twitter named kizzyfish that was involved in a breach. “keiron dennie” was the name associated with the email which ended in @yahoo.co.uk

A tg scan showed the old username.

Wasn’t anything special.

No emergency data requests.

Simply osint.

Stega: That’s cool, and scary.


Thank you Killnet.