try probing random IPs on port 80, not domains..
The entire 2^32 ipv4 block does not take long to probe, and I'll see you in my logs and think "oh it's that guy from /prog/. I wonder if he found anything nice"
More difficult is the heuristics you'd use to realise you'd stumbled across "CIA leakage sites" automatically.
Gary McKinnon was searching specific IP ranges, and looking at the content personally. (pretty shocking how straightforward he got in, hardly a "master hacker")
Bringing /prog/ back to its people
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy