|Canadian Pharmacy – Ukraine|
A long time running pharmacy spam operation. They send tens of millions of spams per day using botnet techniques. Probably based in Eastern Europe, Ukraine/Russia. Host spammed web sites on botnets and on bulletproof Chinese web hosting.
|Dante Jimenez / Aiming Invest – United States|
Spamwarez, lists, “bulletproof” hosting in the finest South Florida tradition. Working with worst cybercriminal botnet spammers. Now mostly involved in massive botnet spamming with hosting on hacked servers and Eastern European hosters.
|Yair Shalev / Kobeni Solutions – United States|
High volume snowshoe spammer from Florida, (former?) partner-in-spam of ROKSO spammer Darrin Wohl. Son-in-law of ROKSO-listed spammer Dan Abramovich. Sued for fraud by the US FTC in 2014.
|Michael Boehm and Associates – United States|
Snowshoe spam organization that uses large numbers of inexpensive, automated VPS hosting IPs and domains in whatever TLD is currently cheapest to send high volumes of spam to extremely dirty, scraped lists. Operates under many business and individual names.
|Michael Lindsay – United States|
Lindsay’s iMedia Networks is a full-fledged spam-hosting operation serving bulletproof hosting at high premiums to well known ROKSO-listed spammers. His customers spam via botnet zombies with spam payloads hosted offshore, tunneled back to his servers. He and the gang have been hijacking (stealing) IP address space from companies for years to spam from. Illegal in the USA.
|Yambo Financials – Ukraine|
Tied into distribution and billing for child, animal, and incest-porn, pirated software, and pharmaceuticals. Run their own merchant services (credit-card “collection” sites) set up as a fake “bank.”
|Peter Severa / Peter Levashov – Russian Federation|
A spammer who writes and sells virus-spamming spamware and botnet access. Is probably involved in the writing and releasing of viruses & trojans. One of the longest operating criminal spam-lords on the internet. Works with many other Eastern Euro and US based botnet spammers. Was a partner of American spammer Alan Ralsky.
|Michael Persaud – United States|
Long time snowshoe type spammer, recently raided by FBI.
|Alvin Slocombe / Cyber World Internet Services – United States|
Bulletproof spam host operating Cyber World Internet Services / e-Insites, and currently spamming using a variety of aliases such as Brand 4 Marketing, Ad Media Plus, Site Traffic Network, RCM Delivery, and eBox.
|Jagger Babuin / BHSI – Canada|
Romanian spammer now living in Vancouver BC. Also known as the “Dr Oz” spammer.
Kali linux 2.0 is a Penetration testing Distro from Kali Team. Earlier I had posted two articles on how to install Kali (Sana) using both GUI (Live-CD) and Traditional method. But later I tried to install Kali through USB and I received this error during the installation process. "Your Installation CD-ROM couldn’t be mounted. This is probably means that the CD-ROM was not in the drive. If so you can insert and try it again." I googled and found that it is a known bug and can be resolve easily.
This post will let you know how to solve this "Detect and Mount CD-ROM" issue. Follow the below given instructions,
type in terminal: mount -t vfat /dev/sdb1 /cdrom exitI hope this solves your problem. Enjoy Sana!
root@iExplo1t:~# wget http://downloads.sourceforge.net/project/pentbox18realised/pentbox-1.8.tar.gz
Uncompress pentbox files
root@iExplo1t:~# tar -zxvf pentbox-1.8.tar.gz
Run pentbox ruby script
root@iExplo1t:~# cd pentbox-1.8/ root@iExplo1t:~/pentbox-1.8# ls