How to dismantle North Korea

PHASE 1: EXPLOITATION
>send malicious / infected emails to every possible north korean email address you can find
>specifically target north korean government and state media credentials
>trawl for compromised north korean credentials to any system you can find
>maintain phishing campaign over the course of 6 months, aim to gather approximately 2k to 5k credentials
>target embassies, state-run media, tourism, police agencies, military and contractors

PHASE 2: LATERAL MOVEMENT
>focus effort on any captured government credentials
>using compromised government credentials, send further malicious emails to all their contacts in a slow, concerted manner over months
>send malicious emails to police information-lines / contacts simply asking for information pertaining to a legal provision, screenshotted in an attachment (contains virus - polymorphic remote administration tool)
>do the same to miltiary administration email addresses
>do the same for state-run media accounts, including television / radio stations
>do the same for critical infrastructure such as power, electricity, energy, and telecom

PHASE 3: RECONNAISSANCE
>obtain foothold in military systems with documentation through military administration accounts (think military receptionists, logistics)
>locate incident response, disaster recovery and continuity plans
>alter the plans to replace valid phone numbers, radio frequencies, incident codes, access passwords, directions and lines of authority with invalid ones
>format automated backups such that they are corrupted (bash script to kill process after 'x' minutes)
>delete random hex data from existing backups such that they are unusable
>gather all information possible pertaining to contact channels / communication procedures
>gather all information pertaining to communications infrastructure (DR / IR plans always contain network topology maps)
>using these maps, identify the standard vulnerabilities that can provide backdoor access to critical communications infrastructure (servers, routers, web apps, databases, SCADA / PLC's)
>exploit vulnerabilities and wait, do nothing for a few months but ensure the exploits are active
>repeat this process for critical infrastructure, electricity / energy and telecommunications networks
>monitor military communications and chatter, map out typical activity and standard communications formats
>optional: steal missile plans, details, specifications
>optional: infiltrate missile control and guidance systems (god-mode hard)

Here's where it gets interesting

>las vegas was a nuclear weapon deal
>they got it out and hid it to avoid heat
>set it in hawaii
>set timer for 38 minutes same amount of time for a missle from NK to hit hawaii
>through an act of God nuke doesn't go off
>they have to call off threat when the bomb fails to detonate or does detonate but only results in small dirty bomb maybe a block or two in size

PHASE 4: YOU CAN'T STOP IT
>Kim Jong Un enjoys frequent ski-trips in remote, far away places
>using commercial satellite imagery, identify when kim jong un has travelled to such a place
>when he's there, wait until around 1.30am
>using foothold within telecommunications providers, identify base transceiver stations (mobile phone towers)
>identify all circuit switched and mobile switching centres within the GSM core network
>one-by-one, restore their firmware to factory reset
>corrupt factory reset so that they are entirely bricked
>format all BGP setting files / databases
>all mobiles, phones and commercial internet services are down

t. kike

PHASE 5: IT'S TOO LATE
>using google maps, identify the nearest substation / energy transmission line to Kim Jong Un's location
>using foothold within critical infrastructure, begin to re-route voltage in rapid successional waves, slowly leading up to a cascade of transmission lines overloading in rapid succession
>kim jong un's general area is now without power or phone connectivity

PHASE 6: IT'S HAPPENING
>using backdoor'd military communications channels, send out all-alert to border guard posts through speakers, computers and radios if possible that an important announcement will be made shortly
>announce the following using pre-recorded statement, through official military channels to border guards:
>our glorious and all-mighty leader has brokered an agreement, and South Korea has monumentally agreed to total annexing by North Korea
>as of now, all travel between North and South Korea is permitted and encouraged - all civilians will be encouraged to travel to South Korea to colonize the region. All travel bans are lifted, and all excursions are permissable by all citizens.
>immediately order that guards open gates, turn on lights and permit travel
>authorisation is given to all soldiers to immediately shoot any soldier, police officer or citizen refusing to comply with these instructions
>any soldier who shoots someone for refusal to comply with these orders will be tremendously rewarded
>full assistance must be rendered to any south or north citizen wishing to exit or enter the country

PHASE 6.1: IT'S OVER
>simultaneously, using backdoor'd police communication channels, send out the exact same all alert to police
>simultaneously, using backdoor'd telecommunications channels, send out the exact same all alert to state-run media and request official announcements immediately, including broadcast over city speakers
>simultaneously, using official military communication channels, instruct tourism operators that travel is mandated between north and south korea now
>citizens will be immediately ferried to south korea
>as such, vehicles are urgently needed at all police stations in major city centres
>once loaded with civilans and their belongings, busses are directed to travel immediately to Seoul, where further instructions will be given by waiting military officials
>compliance with this order is mandatory, and all wages will be payed at 2x standard government employee wage to ensure that businesses are well rewarded for their assistance
>police and military have been authorised to immediately shoot any individual who refuses to assist with this order
>shortly after, instruct all police to inform citizens (via door-knock, speaker announcements, phone calls and alerts) in major city centres that travel will be permissable in and out of North Korea for only the next 24 hours
>police are to instruct all citizens wanting to leave to proceed to the most central police stations in major city areas for immediate travel to south korea
>remind citizens that it is now their duty as ordered by the glorious leader to colonize the South through Songun

OPTIONAL:
>completely obliterate Kim at the start of phase 4 with ballistic missiles
>if all else fails, completely obliterate north korean ballistic missile sites

Do it.

PHASE 1: Post on Sup Forums and do nothing.

>thinking people would actually believe this

Why dismantle one of the two countries left that has no jewish influence?

How about just carpet bombing them? Pretty small peninsula and they only own half of it. Send the Marines to secure the Chinese border to prevent fleeing/assistance like last time and just keep bombing the NK's till they starve, die, or surrender.

>why would a jewish-controlled country want to dismantle a non-jewish-controlled country

I wonder who could be behind this thread...

>cross eyed panface detected

NK is not the same as they used to

>tfw north koreans actually believe their glorious leader doesn't have to shit
>tfw they believe their glorious leader controls the weather
>tfw they believe their glorious leader hit 4 holes-in-one on his first try playing golf
>tfw they believed their glorious leader when he instructed them to eat sawdust during times of particularly severe famine
>tfw they believe he invented the hamburger
>tfw they believe that when he was born (atop a sacred mountain), a new star was formed and winter turned to spring
>tfw they believe that Japan stole time from them back in 1919, and as such; corrected their clocks by 30 minutes last year
>tfw they believe their glorious leader learned to drive at the age of three
>tfw they believe that their glorious leader has worked with scientists to create the cure to AIDS, cancer, MERS, SARS and ebola
>tfw you think they'd genuinely question this order if it came through official channels and were instructed by their glorious leader not to question it

>good goyin

Americans don't need to war NK anymore. Let the Aussies do it for them.

meaning what, they are impervious to bombs? If you say bunkers, we already have shit designed to erase them

...

You know they have radar, right?
Can you imagine how difficult it would be to send enough carpet bombs in the exact right location with enough ammunition in the perfect conditions with somehow avoiding anti-aircraft measures to perfectly erase any possibility for a retaliatory strike before it's over?

If you're thinking of moving in warships to shoot down missiles, do you think China will let that happen without tipping off the Norks or straight-up demanding that the US stops? Do you know we damn-near got into a full-blown war with China during the last time they tried this?

"Carpet bombing" them won't work and besides, you'd obliterate millions of innocent people who hate the regime more than you could even imagine, because they live in it. They'd want nothing more than for the entire country to be completely dismantled and destroyed but wouldn't want to lose their lives and their family's lives in the process.

I say nuclear weapons that not even your country is dumb enough to mess with. And is the same reason no other country ever mess with you. This is not an unequal battle as you are used to. Focus on sandniggers instead.

PHASE 1
>send malicious / infected emails
how does an user protect themselves from this part.

"""Common""" sense. Use throwaway email services (mailinator.com and mytemp.email are excellent) for shit you'll never sign up to again. Use Keepass to remember passwords for throwaway services if you need to.

Always hover over links in emails and check the bottom left of your screen to see where it really wants to send you to. If it's a mismatch, don't click it. Always re-read everything before even previewing an attached file. Don't even bother opening email attachments from people you don't know.

Use Avira free antivirus and use Malwarebytes free antimalware. Keep Avira's real-time protection running.

If I hack a random company's SMTP server, I can send you an email from "[email protected]" or "[email protected]" so always keep in mind that some emails may appear extremely legitimate whilst being completely malicious.

>send malicious / infected emails
They were cut off the web to avoid that

>>send malicious / infected emails to every possible north korean email address you can find
There was an Olympic Games/Stuxnet program to infiltrate North Korea's nuclear program. The US gave up trying via electronic delivery because their internet is so tightly controlled, there was no discoverable entry point.

>He wants to dismantle Best Korea
whats wrong with you?

Awesome thanks for the good info

>How to dismantle NK

Give Japan and SK nukes whether China and NK like it or not and forget that they even exist because they'd have no card to play anymore without having a card played back at them

Her's just some emails I've found in around 5 mins of searching:

[email protected]
(web contractor)

[email protected]
(North Korea's Ministry of Posts and Telecommunications)

[email protected]
(Foreign Languages Publishing House of the DPR Korea)

[email protected]
(web admin for a government site)
[email protected]
(his personal email)

[email protected]
(government email address)

[email protected]
(admin for a korean social network called "Friend")

[email protected]
(elderly fund, government run)

They had a DNS leak a few months ago, too. If there's public-facing infrastructure, there's vulnerabilities for sure. Guarantee'd to be RFI / LFI / SQLi / Persistent XSS etc. vulns there somewhere. Additionally, where their administrators use services like Gmail, there's additional vectors from there.

Dunno where you heard that the US 'gave up' but I can pretty much guarantee you that, in my experience anyway; they've already got footholds within North Korean systems for sure.