Abusing the Cat… The UniCat

Just a quick post to show I have not forgotten my series of small articles to show how the mainstream view of Hackers & Hacking is wrong, and we are not all evil misfits trying to do harm to YOU!

When I was in university, the library was short on Computer Workstations and you often had to wait for a free one to come available to check your email, play on the Internet, do work, etc. This was very annoying if you were in a rush and just wanted to check your email to see where you were supposed to be, or quickly email in an assignment to your lecturer.

Now, scattered around the library were UniCat terminals, simple terminals with a BBS style catalogue program running on them that allowed you to search the books in the library, see what they had, what was out (and when it was due back), order books and periodicals, and so on.  Another hand feature it had was the ability to connect to similar programs running at other universities.

Now the first time i connected to another university to see how the system work I saw the familiar.

Connected to ***********.****.****.
Escape character is ‘^]’.

So what do you do in such a situation, I pressed ^] which gave me the telnet prompt and decided to connect to a different address, that of my linux account. It connected fine. Which allowed me when in a rush to check my email & ICQ, Spod, code, and do anything else I needed too without waiting for a machine to come free. It also stopped me tying up machines that could otherwise be used by others.

Playing with these terminals also helped out, since there was a bug in the system and occasionally they would crash down to the VAXos, and be unusable until the one IT staff who knew the system went around restarting them. Unless I happened to spot it was down and would help out. Well I could not leave my emergency terminals out of use.

CyberSecurityChallenge Cipher – Walkthrough

After seeing all the people posting on Twitter/Facebook/Blogs how they have solved the cipher challenge on the CyberSecurityChallenge website when all they have done is take the first step, I thought it might be nice to post a small walkthrough to give some pointers, help, and show them that first impressions are not always correct.

Only read on if you have stopped trying to solve the puzzle yourself, or if you just need a push in the right direction. AKA, here be spoilers.

(more…)

Britain’s Got Computer Talent.

On Monday the 26th July 2010 the UK Minister for Security Declares Cyber Security Challenge UK Open.

The Cyber Security Challenge is a series of national online games and competitions that will test the cyber security abilities of individuals and teams from every walk of life. It is designed to excite and inspire anyone considering a career in the cyber security industry.

The Challenge will identify talented individuals capable of becoming part of the UK’s cyber security profession now and in the future.

Why should I participate?

Participation in the Challenge offers three fantastic opportunities:

  1. The Challenge will award more than 30 superb prizes. These will include:
    • Places on the Detica Academy
    • Funded or part-funded places for masters-level university security courses
    • Funded security courses provided by SANS Institute.
    • Memberships of trade bodies and professional associations
    • Professional mentoring sessions
    • Time on the CREST penetration test rig
    • Delegate passes to industry conferences
    • An internship at one of the UK’s premier security companies
    • Prizes will be allocated based on individuals’ ambitions and the stage they are at in their career.
  2. The Challenge will provide participants with the opportunity to use world-class technology and facilities that would otherwise be inaccessible.
  3. It will also provide a way for individuals to meet with, work with, and learn from some of the UK’s most prominent organisations in cyber security, education and politics.
    Those who demonstrate excellent levels of skill and talent will be exposed to potential employers who will look favourably on anyone who can perform well throughout the Challenge.
  4. The Challenge offers an opportunity for all participants to publicly demonstrate their cyber security skills and build their reputation with peers and potential employers as the UK’s most talented security experts.

The first challenge to get yourself started with is up here

Get playing!.

The Next Hope

To all of you lucky enough to be at The Next Hope this weekend, I wish you a great time, and a curse of boils (I want to be there).

For those who are there, remember to download the Hope App to your phone,(iPhone, Android, macOS, etc) all free from the relevant AppStore. For those with normal web enabled phones you can use http://thenexthope.mobi.

For those of us unable to be there (And those there as well) the guys from Radio Statler will be streaming the event, the talks, plus extra content.

So Everyone should have a good weekend.

And hopefully the hotel will be saved and the next hope will not be the last hope (especially with the last hope being called the last hope it would get too confusing.)

If anyone see’s the 2600 guys remember to give thanks.

Hackers 1 : Network Admin 0

I forget exactly when this incident happened. I do remember it was towards the end of the University season (either the year end, or midway). It was in my second to last year in University, and everyone was rushing about trying to finish papers, coursework and get everything handed in on time.

Of course the Lords of Chaos were out in force, and the Universities Network was down, and had been for about a week, people were seriously starting to panic.  The network at the time was Windows 95 running of a Novell network. Now somehow (no info was ever posted) the windows image had become corrupted.  You could log onto the network, and it would copy the global copy of windows to your workstation ok, only winsock, and several other network important files/libs were corrupt meaning windows could not talk to the network.  This had a knock-on problem of all the program files & user data were stored on network drives.  Basically you were left with a corrupt and damaged version of windows that was of no use to anyone.

Now some of the computer labs had computers that also had local copies of windows on them, for specific software/applications. Unfortunately these were not set up to use the network, or the internet, in fact they had been set up specifically to be unable to use the network. (for security and to help prevent the pirating of specialised software)

After a few days of no net-access a friend and myself got fed up and decided to do something about it. We found one of the small labs with local copy windows machines, and using some of the libraries off the corrupt net-work versions, plus manually rewriting sever config files we were able to get two machines fully running on the uni’s network, and hence the internet. So there we were happily using the internet to plan the weekends fun when a Lecturer wandered into the lab.

“What are you guys doing in here?”

“err, just finishing some coursework to email in”

“What, do you think I’m stupid? The network is down”

I pointed at my screen and invited her to come look, pointing at a couple of websites to show it was working, and pointed out since we were desperate to finish our coursework we “fixed” the two machines we were using. She looked thoughtful for a while, then asked could we do the same to all the others in the lab, since she had an important lesson that afternoon that she had already put off once due to the broken network.

It was another week and a half before they fixed the network and all the universities computers were usable. But for that week and a half there was one small computer lab that was fully functional, and its location was spread about like a secret. After all, if everyone knew about it, you’d never get a free computer.

I like to think we helped a few people be a little less stressed in the run up to exams.

Reclaiming the word Hacker

As The Next HOPE draws near I figured now would be an appropriate time for me to say a few words about the misappropriation of the term “Hacker“. To quote Randal from Clerks II. “I’m taking it back

How often do you seen mention these days like :-

  • “Hacker steals hundreds of credit card details” (Hello, that’s not Hacking its credit card fraud).
  • “Hacker defaces ****’s website” (Try Vandalism not Hacking.)
  • “Hacker steals companies data to sell” (Try Industrial Espionage)

Yes there are people out there that do illegal things, a lot of them can be described as Skript Kiddies, crackers, thieves, vandal, humans. Yes there are Hackers that do illegal things, but that does not mean all Hackers do. There was a case in the UK a few years ago of a doctor who killed hundreds of his patients, does that make all doctors mass murderers?

Wikipedia describes the origin of the term Hack as thus :-

The term “hack” was first used by US university computing centre staff in the mid-1960s. The context determined whether the complimentary or derogatory meanings were implied. Phrases such as “ugly hack” or “quick hack” generally referred to the latter meaning; phrases such as “cool hack” or “neat hack”, to the former. In modern computer programming, a “hack” can refer to a solution or method which functions correctly but which is “ugly” in its concept, which works outside the accepted structures and norms of the environment, or which is not easily extendible or maintainable. The programmer keeps beating on it until a solution is found.

In a similar vein, a “hack” may refer to works outside of computer programming. For example, a math hack means a clever solution to a mathematical problem. The GNU General Public License has been described as a copyright hack because it cleverly uses the copyright laws for a purpose the lawmakers did not foresee. All of these uses now also seem to be spreading beyond MIT as well.

The term should be kept as it was originally intended, to describe those people who are curious about how things work, whether it be computers, networks, phones, electronics, maths, whatever. People who find ways to use things in ways that was not in the original specification. We used to cherish these people as innovators, explorers, etc. (Well apart from the early days when the church would burn them as heretics). We should go back to using “Hacker” as a positive description, and just call criminals “Criminals”.  So Media People pay attention, I’m taking the word Hackers back.

To aid in the takeback, I will be posting a series of old Hacks, & examples of Hacking. None of them Illegal, none that caused Harm, Injury, disfigurement. There may have been some upset caused by some, but only in a “How come he can do that? why cant I? It’s not Fair”. They are all just examples of someone being curious, someone using things for more than they were designed for, someone helping others thanks to his playing.