PDA

View Full Version : usenet posting techniques



pokitisme
02-06-2014, 04:46 AM
ok so ive started this thread to get some basics of the new life of usenet posting.ive posted for quite awhile on the old groups the common technique or taking a folder and adding it to rar/zip files with a certain amount of split files and par files for those split rar files.and posting or creating .sfv / .nfo /.txt files for information and in some cases using gspot for additional info in the nfo.so heres my issue in this new usenet world----- how do u get dsjfsdfsdkfk.rar.056 from star wars1.rar.001---- in other ways what is the encryption method used to convert such files of good to unrecognizable gibberish and getting the pars to work in the new order as well.i would suspect u rar up the files par them then encrypt the rars and pars but the encryption thing so far eludes me due to lack of effort on my part.but this is a question that confounds me and causes time of pause in the posting community--i still post but not in a way thats so flamboyant .so i pose this querry to yonder mods and admin types and those regular posters.if once things have been summarily explaind i give all permission to lock said thread but suspect others of less intelect will have additional questions such as whats a rar as opposed to .rar.thanks moddies and adminers .

SgtMajor
02-08-2014, 12:06 AM
In simple terms, here is how I have seen it done :)

Prepare rar files
Create par2 files
Using Better File Rename or your choice:
Rename ALL files, filename only, not extension (I use the password generator of lastpass, 32 chars long, lowercase letters & numbers, or use this https://identitysafe.norton.com/password-generator/# )
Sgtmajor.rar converts to frucran5spa3amud.rar
Sgtmajor.par2 converts to frucran5spa3amud.par2
Now rename the rar file extension files only to 001, 002, 003 etc again using better file rename (this hides the fact your files are indeed rar files on the servers)
frucran5spa3amud.rar converts to frucran5spa3amud.001
frucran5spa3amud.par2 stays the same as do all the par2 files

Make a folder copy then run the par2 file and it will rename all the files (less the par2 files though) if you want to verify your work

Upload the frucran5spa3amud group of files to the groups you want, I still use camelpost powerpost programme, it will create a nzb file for you,
Share the nzb file when complete

Maybe others have a different way?

Admiral_Crunch
02-08-2014, 05:59 PM
So...it's common for the groups to use an idiot code? By which I mean, the obfuscated filenames are chosen at random, not encrypted versions of the original filenames?

ZEROdayO
02-08-2014, 06:41 PM
depend which grp, for example into inner-sanctum posting omgwtfnzbs which use md5 technique to subject only and par2 files

Beck38
02-08-2014, 08:23 PM
Here's my basic 'routine', you can take the advice or lump it:

1. Forget about using PowePost or the many clones out there (like camelpost). Use something that does post/verify, like JBinUp (it also has built-in SSL, plus the ability to check either on the server you are actually posting to or a secondary.) I have it set up 'normally', checking with the posting server, then...

2. Check propagation; if you're using one of the 'major' plants to post (Astra, Giga, etc.) then check on one of the other majors, and if you're using a more secondary service, STILL check on one of the majors.

3. After the post is completed, check fully by using NZBcc on a plant that you have unlimited d/l'ing so use the best validation method.

4. If your ISP is known to be using DPI (deep packet inspection) or you want more protection, use a good vpn.

5. Scrambling hints: For posting names, keep it simple. Making folks jump though x hoops just to figure out the actual name of the file may look good at first, but really limits it. Same with encrypting the rar's, unless you want to go the private pay-walled route.
Take a look at how the major indexers (NZBIndex and binsearch) treat your posts, and go from there.

pokitisme
02-10-2014, 01:22 AM
yea all good ideas i think i would rename it a variation on my nym so as to keep it civil in the fact that my post would be known even if the nfo was encrypted---thanks for all ur guys help---ill test it when i have more space---2 tb drives full and no dvd's to burn

pokitisme
02-11-2014, 04:25 PM
well right now im having a issue posting thru the ssl ports of newshosting-i will post some updates as they come.they have given me ssl ports but when i try it hangs and times out.so ive fired off another email and ill post what goes on here.im using powerpost A@A v11b

Beck38
02-11-2014, 09:24 PM
im using powerpost A@A v11b

I cannot stress more than what I listed as Numero 1 on my list above. Toss powerpost and get JBinup no matter what, it will fix two things that a program thats 15+ years old (powerpost) doesn't do, first has ssl built in, second, does posting verification, which virtually eliminates 'skips' and 'fades' occurring during the posting process.

Beck38
02-17-2014, 12:34 PM
Rename ALL files, filename only, not extension (I use the password generator of lastpass, 32 chars long, lowercase letters & numbers, or use this https://identitysafe.norton.com/password-generator/# )
Sgtmajor.rar converts to frucran5spa3amud.rar
Sgtmajor.par2 converts to frucran5spa3amud.par2

Maybe others have a different way?

The main problem with that technique, is that there is no 'reverse engineering' of the filename unless and until one d/l's the entire package and subjects it to processing. I don't think anyone is going to spend the time and the bits to grab something they have absolutely no clue as to what it is, beforehand.

Obviously, those utilizing 'secret' web sites where that scrambled filename is listed (pay-walled or not) is a fools errand. The 'bad guys' will eventually get into those sites, get the 'keys' so to speak, and WACK it's gone. No fuss, no muss, virtually zero time wasted. From reports here on this site and elsewhere, that's already happening.

Any scheme needs to have two main elements, to my way of thinking:

1. The 'true' filename needs to be easily and quickly figured out. I've shown many people here how to do it by using the most powerful site on earth (maybe hyperbole) to retrieve it.

2. To retrieve and confirm the payload, one must go through the entire d/l process (parity check, decryption, unrar).

3. Plain text nfo's are posted to allow searching by the major search engines (Binsearch or NZBIndex or many others) and there is a simply 'trick' (fully combined with step 1) to find the posting and retrieve.

Perfect? No, nothing in this life is, especially when going up against organized crime.

Does it work? So far, it requires a lot of work by the Guido's and even if they do that work and take down the posting, if one is doing their due diligence one can simply post again with a small tweak in the process.

Been on usenet for 30 years, been binary posting for well over 15 of those, and since the 'new' regime of hyper-DMCA (say the last couple of years) I'm still batting 1000 ZERO takedowns. And a fair amount of that is material that has been aggressively targeted and taken down which was posted by others, with non-reliable obfuscation techniques.

Then again, a lot of what I get (yes I do leech!) is totally 'in the clear', in newsgroups one would think are especially targeted (a.b. teevee being a good example) but have never had a problem, and I'm 'slow on the trigger' on most of that (i.e., it may takes days to get it).

So the vast amount of these pay-walled encrypted postings, I say the h*ll with them. It's probably overrun with pre-wrestling and the like.

Admiral_Crunch
02-17-2014, 06:03 PM
The main problem with that technique, is that there is no 'reverse engineering' of the filename unless and until one d/l's the entire package and subjects it to processing. I don't think anyone is going to spend the time and the bits to grab something they have absolutely no clue as to what it is, beforehand.

Obviously, those utilizing 'secret' web sites where that scrambled filename is listed (pay-walled or not) is a fools errand. The 'bad guys' will eventually get into those sites, get the 'keys' so to speak, and WACK it's gone. No fuss, no muss, virtually zero time wasted. From reports here on this site and elsewhere, that's already happening.

That's why I always assumed that the obfuscated file names were encrypted versions of the real ones. But apparently, according to folks here, some posters do use random "idiot codes" gotten out of a password generator.

So there is a real danger that, if the site goes down, all the posted content is effectively lost. Disheartening...

SgtMajor
02-17-2014, 06:49 PM
The main problem with that technique, is that there is no 'reverse engineering' of the filename unless and until one d/l's the entire package and subjects it to processing. I don't think anyone is going to spend the time and the bits to grab something they have absolutely no clue as to what it is, beforehand.

Obviously, those utilizing 'secret' web sites where that scrambled filename is listed (pay-walled or not) is a fools errand. The 'bad guys' will eventually get into those sites, get the 'keys' so to speak, and WACK it's gone. No fuss, no muss, virtually zero time wasted. From reports here on this site and elsewhere, that's already happening.

That's why I always assumed that the obfuscated file names were encrypted versions of the real ones. But apparently, according to folks here, some posters do use random "idiot codes" gotten out of a password generator.

So there is a real danger that, if the site goes down, all the posted content is effectively lost. Disheartening...

But if you were not a member of that site, what their members posted you will not miss.

Horses for courses, if there was only 1 way to post then the reverse engineering of filenames would be too easy for the autobots to take down, might as well be in plain sight. There is even a programme out there that automates all the randomness and prepares a group of files for upload without it being in any way cryptic.

It's up to the individual how they share things that matters, whether that be to just 1 site or multiple sites, it's entirely their choice, just look at how the daily ebook flood posting has changed in recent months, and how many disliked the randomness of it, but that's how the poster wishes to do their uploads and the downloaders just have to figure it out. The takedowns are aggressive these days.

Uppers can upload to usenet for 1 person, or 10 people, or a request, or to just 1 or to many sites, or the mass public, there is no rules to say everything they up has to be shared with everybody. Nobody has any right over how another person uploads. Like it or not, as long as you do your things your way and allow others to do things their way, each to their own, live & let live etc, then does it really matter at the end of the day how x or y or z shares their stuff? Most items have a short shelf life anyway and most other things can be requested and reposted if necessary, and if what you post has a long life span on usenet, then good for you :)

Beck38
02-17-2014, 08:46 PM
That's why I always assumed that the obfuscated file names were encrypted versions of the real ones. But apparently, according to folks here, some posters do use random "idiot codes" gotten out of a password generator.

So there is a real danger that, if the site goes down, all the posted content is effectively lost. Disheartening...

does it really matter at the end of the day how x or y or z shares their stuff? Most items have a short shelf life anyway and most other things can be requested and reposted if necessary, and if what you post has a long life span on usenet, then good for you :)

I think it matters, and I remember vividly when even the best/most expensive usenet site had a retention of a few weeks at best, so one had to be 'quick on the draw', even with using dial-up speeds. But virtually every plant is now (almost) complete back to what I call 'day zero' (around August 2008), some better than others, but things 'for sure' don't 'roll off' the server due to lack of space. I occasionally test out nzb's I've posted back to around that point and find problems ('skips' or 'fades') in the plants and yes, they do get repaired by the plant operators (look back here on this board for many examples of that).

Now, do I expect 100%, probably not. But it's a good goal, isn't it? As is making sure the time and effort (and money) expended to do the posting is well utilized; I'm still thinking about the fact that although the usenet plants (Astra/Giga/whoever) has this tremendous retention, none of the free, public, indexing sites have anywhere near that retention (in fact, they admit to around 1000 days or a bit over 2.5 years). So anything older than that simply isn't in their database.

Great (not). I'm still thinking of re-posting the nfo/nzb's from further back, on stuff that I've verified is still 'there' on the plants.

In short, like I said, unless the posting is something that organized crime (pro-wrestling, p0rn to name two) produces then the number of high profile take-downs are extremely rare, even in today's environment. And it's been my experience that a couple weeks later, the same targeted material is posted with really minimal obfuscation, and it lasts just about forever. Seems that if the original poster had done minimal due diligence on their work, it wouldn't have been whacked to begin with.

Admiral_Crunch
02-18-2014, 04:16 PM
In short, like I said, unless the posting is something that organized crime (pro-wrestling, p0rn to name two) produces then the number of high profile take-downs are extremely rare, even in today's environment.

Porn? I've never even heard of a porn takedown...it's always tv and movies.

Dear God...not my porn...

piercerseth
02-19-2014, 11:07 PM
Newsmangler is no longer maintained, but GoPostStuff is: https://github.com/madcowfred/GoPostStuff/