<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d9515291\x26blogName\x3d192.168.0.1\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dBLUE\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttps://dosshell.blogspot.com/search\x26blogLocale\x3den_US\x26v\x3d2\x26homepageUrl\x3dhttp://dosshell.blogspot.com/\x26vt\x3d-5074834188165755409', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe" }); } }); </script>

Sunday, August 28, 2005

I see you...hopefully

Yep, I just added some script to my blog so I can hopefully not only see how many people see this, but where they're from. Good stuff.

Thank you GVisit. This is a site that, when you put a line of script on your webpage, records visitors ip addresses through javascript and then locates the place where the ip came from. Then logs it and puts a marker on a site you can look at to see who all is looking at it. It's very effective in my opinion, or at least for the site's it's been used with, but since I just now added it to my blog I wonder if it'll work or not. Well, it's worth a try. :-)

College is going good for me and plus I have a lot of spare time now where I'm on campus so I get to play around on their computers. Fun, Fun. If they only knew how insecure it was. This is a major problem with universitys of today. They are growing to the point to which EVERYTHING is digital and there are no hard records. This means a skilled individual could get access to an administrator account, which is very easy, and change his/her grades. There are stories every day of students doing just that. Sad Sad world.

AK's remedy to this situation.
I should really be hired as the head of computer security. Thats first and foremost. Next we're going to make a central computer system in the main building of the school. This computer is going to be unhackable. I know what you're saying, how can you do that...Well first it would be a standalone computer which would not be linked to any other computers on the campus. It wouldn't use a wireless internet connection and infact it would have no internet connection hooked up to it period.

I know what you're saying, "how would the teachers insert grades and such?" I got that covered. The teachers would still have their normal computers but they would be issued a 1gb thumb drive with a certain program on it. Each time they need to input grades into the computer they would put in their thumb drive, insert the grades onto it then at the end of the day they could plug the thumb drive into the main computer and it would update automatically. The students wouldn't have access to any part of the setup that had to do with their grades. There would only be a select few people with the ability to access the main computer and the teachers wouldn't even have to access them. By simply imputing their "update drive" they would give it a moment and it'd be done. Game over, no more for you. The only way someone could hack it now is if they gained physical access to the computer.

The next step is that the main computer system would be running a decent version of linux so it would naturally be cheaper and more secure. I know that my campus' computers could fall prey to a mysql injection attack and it would be all over. Even a bootable version of linux and someone with enough knowledge to use it could do it too. Most Universities have career centers to help you get a job and hold onto a resume for you and all that. This is dangerous because they often have enough knowledge for stealing an identity. Oh well, I guess it's better for me this way, it just takes all the fun out of the chase. When they just hand you all this info it's no fun. You gotta work for what you want.

I don't know why I posted this, I just wasted some time. None the less I hope you enjoyed it.

AK

Wednesday, August 24, 2005

Zombies, Zombies Everywhere And Not A Thought To Think

With the zotob worm running a muck the world's focus has been taken off of the rest of the computer virus, worm, etc. problems. A much less known scourge is the Zombie!!! No, not like the hollywood movie zombie or the hatian bokor created zombie but rather the computer backdoor zombie. Zombies are computers that are used and controlled by crackers. Now these computers can be used to proxy out or even use part of the processor power to work on whatever they want, and according to a news story there are 172,000 new ones each day. NOW, granted the zotob worm is obliterating systems so they can't be zombies but I'd say that roughly 70% of non zotob affected computers are zombies. This means only 30% are in the clear. Are you in the clear? Are you sure?

Sidenote - DON'T MOVE YOUR TASKBAR IF YOU DON'T WANT IT MOVED

ok, more info on zombies here and here

For now, I've praised Zotob because he does what I did. He put the info out there on how to bypass something and OTHER people took advantage of it. What few know is there is a zytob worm as well. This worm was created by the same writer as the mytob worm. I know it's hard to find info on these things unless you know what to look for so I thought I'd help ya a bit ;)

Zotob Exploit

I believe this is the mytob exploit, not sure though...any help with this?

As for the hereafter, I just decided to put links to a lot of random security exploits that Microsoft has found, yet can still be abused because not everyone is able to think properly and update either illegally or legally. In other words, I'ma try to scare the hell outta ya...haha ;)

link, link, link, link, link, link, link, link, link, link, link, link, link, link, link, link, link, link, link, link, link, link, link, link, link, link, link, link, link, link, link, link

Now, thats just scratching the surface, theres hundreds if not thousands more on their site...imagine the ones they haven't found.

Remote Code Execution is when someone else makes your pc do something through a scripting exploit.
Privelage Elevation is when a user logs in and gains admin powers.
System Compromise is when they get control of your machine - zombie
Denial of Service, or DoS, blocks the main user out.


AK

p.s. it was hard as fuck to get each of those exploits individually...took 2 hours, I hope you appreciate this...haha

Thursday, August 18, 2005

There's been a development

Zotob, a computer hacker, recently posted a guide on how to bypass certain things on a windows 2000 system and within a few hours of them posting several worms hit the internet with a quickness. The exploit used shuts down the computer within 60 seconds and the computer keeps rebooting. 5 variations of this worm are out as of right now. Since then Zotob has been listed as a "Malicious Hacker". He may or may not be a malicious hacker but I can say that for him posting the guide to it doesn't make him a malicious hacker. He's just teaching and spreading knowledge much like I do.

Here's to you Zotob, Cheers Mate!

Theres also been a few things to legally happen recently that make things harder on computer savvy people. With the recent safe intersections act of 2005 outlawing illegal MIRTs and traffic pre-emption devices to the court cases of certain conglomerate media production companies the time of minor infractions is over. ISPs are required to have backdoors so the government can tap in.

It used to be that the average someone would download a gig, maybe 2, of mp3s but with the way things are getting a hate for the riaa and mpaa are fueling the fire of the battle so that if someone does get sued they won't have just 200-300 songs. We figure if we're going down we're taking everything with us. IRC has been around forever and has been the foremost at aiding in the spread of illegal movies and music albums and yet no major company has attacked it yet. Instead they attack bullshit programs Napster, Morpheus, Limewire, Bearshare, Emule, and above all now...BitTorrent.

Also a brood of phishing, spyware, keyloggers, trojans, etc. have been sent out recently. Usually when a worm hits it's followed by a slew of random other attacks which, in turn, would be masked by the worm. Since the pc would be fucked the person who uses the computer would not notice a slight difference in hard drive space used. I bet you could take away a gig of room on their computer and they wouldn't notice a thing.

How do you know it's getting that bad? When Newgrounds houses a game called "Defend Your Computer"
Image hosted by Photobucket.com

Well, it's just another day and another problem. School starts back up for me in less than a week. That sucks but I'll keep posting on here. Hopefully I can come up with some good material so I won't have to just toss out my opinions on crap. If you want to know about something feel free to drop me a line and ask questions, I'm happy to answer questions. I'll post on the blog answering so everyone can see it.

AK

Saturday, August 13, 2005

Jobs for tech people

Yea, the government is actually not being such douschebags afterall. They've stopped locking up non-malicious hackers and instead, started hiring them. Recently on Digg.com there was a post about the US Department of Defence: Cyber Crime division going to Defcon and trying to hire some of the people there that know what they're talking about. Well now companies are hiring hackers privately.

41st Parameter hired Kevin Mitnick in an attempt to understand and prevent phishing attacks more. To me this is a bold statement about the annoyance that these attacks have become. If you've been looking at the current events involving things such as spamming, phishing, etc. you pick up on a kind of basis that we won't put up with their shit anymore

I mean Vardan Kushnir gets murdered in his living room during a robbery and the police don't even investigate it too thoroughly. It was a robbery, not anything that had to do with spamming, but once found out that he was the spammer there wasn't much of an investigation. Do you blame them? If I could kill random spammers and get away with it, I know I would. That'd stop the spamming and phishing with a quickness.

MIRTs are illegal now. Federal offence if caught using, buying, or selling one. That sucks.

AK

p.s. Christopher Walken for PRESIDENT!!!!

Friday, August 12, 2005

this is an audio post - click to play

Friday, August 05, 2005

We're gonna celebrate...one more time

VIDEOGAME HACKING!!!

*cough*, Ok. This post is going to be about video game hacking, I haven't posted this before because I do a bit of video game hacking and don't wanna get accused of hacking all the time, because I don't use my own hacks...I've tried them, but don't play with them regularly.

Most games today have some sort of anti cheat device. Punkbuster is one of them. Now I'm not saying that punkbuster sucks, but it's way too easy to bypass them. Punkbuster looks for groupings of code that are found in open gl hacks. The key there is the open gl hack. Any other type of hack doesn't register in their search.

Most games allow the use of skins. A skin is a file that changes how the characters look. It can also change how your walls, cars, etc. look in the game. The way that the skin works is by taking .shader files, usually, which contain the coding in which to switch one skin in the game to another which is also located in the skin file. The useage of the included files along with the .shader allow for this whole thing to work. Now as for making the walls see through, you're gonna have to get good at scripting because I won't flat out tell you how to hack it, but I'll give ya a hint.

blendFunc

OK, now if you're looking for a wallhack and don't want to make your own theres a good bunch of places you can find em. Unknown Cheats houses a few. Now if you know about the innerworking of the game you want to hack you might be able to figure out which hacks work for which games. Just because a hack is made for RTCW:ET doesn't mean you can't use it for CoD.

Usually if you take a hack made for one game and use it for another the anti-cheating device doesn't pick it up. Anti-cheat companies are heavily lacking in this way, but if they blocked every cheat that could ever be constructed all at once there would be no need for them because the games would use that basic block to stop them all. No updating cuts into their profits.


If you're not looking at hacking some multiplayer and would rather just have tutorials and built in cheats such as button combinations and console codes I would suggest Game FAQs. If you want 3rd party device assistance such as a gameshark or code breaker I would suggest the Code Creator's Club. The tool they use changes depending on which system you're looking at but if you want codes this is a good place to start looking. I think thats it for this post.

Here's a shoutout: FUCK Lieberman AND Ms. Clinton. Lieberman, you're a douschebag who needs to leave video games alone. Clinton, why can't you be more like your husband?

Suggested movie for this week: Pirates of Silicon Valley

AK