http://www.buskillvampfih2iucxhit3qp36i2zzql3u6pmkeafvlxs3tlmot5yad.onion/luks-self-destruct
The ‘ find ‘ scanner picked-up 21 distinct entries that matched one of our byte sequences The ‘ email ‘ scanner picked-up a bogus email address “
[email protected]” — which is probably
just a coincidence of random data Same as above, the ‘ domain ‘ scanner picked-up the same bogus “y5.LU” domain from above And for completeness, let’s use ` bulk_extractor ` again on the entire ‘ /dev/sda ‘ drive–not
just the LUKS-encrypted partition: root@kali:~# bulk_extractor -q -1 -o bulk_out...