![](https://static.wixstatic.com/media/41d000_09fb5faf639d7079be4d0f79b4818bbf.png/v1/fill/w_1280,h_1164,al_c,q_90,blur_2,enc_auto/41d000_09fb5faf639d7079be4d0f79b4818bbf.png)
![](https://static.wixstatic.com/media/41d000_4cb378833b7ca607a01d7db69d625ff9.png/v1/fill/w_411,h_70,al_c,lg_1,q_85,enc_auto/41d000_4cb378833b7ca607a01d7db69d625ff9.png)
HackStation
![](https://static.wixstatic.com/media/84770f_af4a8bf32767ed13ea218123feb91fc8.png/v1/fill/w_298,h_44,al_c,lg_1,q_85,enc_auto/84770f_af4a8bf32767ed13ea218123feb91fc8.png)
Reviews
Cryptolocker Version 1.1
The best thing there is!
CryptoLocker is a ransomware trojan which targets computers running Microsoft Windows[1] and first surfaced in September 2013. A CryptoLocker attack may come from various sources; one such is disguised as a legitimate email attachment. When activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers. The malware then displays a message which offers to decrypt the data if a payment (through either Bitcoin or a pre-paid voucher) is made by a stated deadline, and threatens to delete the private key if the deadline passes. If the deadline is not met, the malware offers to decrypt data via an online service provided by the malware's operators, for a significantly higher price in Bitcoin.
Anonymous Tools
Useful Software
![](https://static.wixstatic.com/media/f94cb7_29e9ac7096c44157a80273d9cf40e00c.jpg/v1/fill/w_768,h_352,al_c,lg_1,q_80,enc_auto/f94cb7_29e9ac7096c44157a80273d9cf40e00c.jpg)
Anonymous called high-orbit ion canon or HOIC come into light. Attackers are constantly changing their tactics and tools in response to defender's actions. HOIC is an Windows executable file. Once started, you will be presented with the following GUI screen. If the attacker clicks on the + sign under TARGETS they get another pop-up box where you can specify target data.
The attacker can then specify the following Target data. After the attacker clicks on the Add button, they are taken back to the main screen. The attacker can then adjust the THREADS number if desired to further increase the strength of the attack. When they are ready to lauch the attack, they click on the "FIRE TEH LAZER!" button.