[HN Gopher] Black Hat Exploits of the Stupid-Easy 80s
       ___________________________________________________________________
        
       Black Hat Exploits of the Stupid-Easy 80s
        
       Author : mad_ned
       Score  : 144 points
       Date   : 2021-06-30 12:44 UTC (10 hours ago)
        
 (HTM) web link (madned.substack.com)
 (TXT) w3m dump (madned.substack.com)
        
       | pcdoodle wrote:
       | AOL
       | 
       | Win32 API and VB6 Subclassing. Open random chatrooms, collect all
       | the screen names. Go to school. Computer dials AOL while parents
       | at work. Tries Screen Names as password. 3 attempts before AOL
       | Hangs up. Redials and tries next set of 3. Come home from school.
       | Fresh Screen Names. Free AOL. Terrorize Hanson Chat Room with
       | <font size = 9999999999999999> Instant Message. _Everyone has
       | left the chat_
        
       | geocrasher wrote:
       | Early 90's Southern California. I was about 15 and had been
       | teaching myself Borland Turbo C++ at home with the SAMS book. At
       | school, there was a room in the Library with about 20 386sx/16's
       | that were used to teach kids... Borland TC++. The teacher?
       | Another student who was good at programming. I didn't know him,
       | but he had a reputation for being egotistical. My friend and I
       | just went in there at lunch to play QBasic games, which I'd
       | modify a bit for more fun.
       | 
       | One day I decided to mess with the egotistical teen teacher. I
       | wrote a little TC++ program that ran from autoexec.bat. On
       | bootup, it put out several seconds of a low frequency buzz from
       | the PC speaker and then printed "Oh, Excuse me! I couldn't
       | contain myself!" and then disappeared. At that point, the
       | autoexec.bat removed the binary and then overwrite the old
       | autoexec.bat over itself, removing any proof.
       | 
       | Nobody could say it was me, but the Librarian knew and said if I
       | did it again I wouldn't be able to go back. But she also said he
       | was really pissed by it and I get the feeling she got a kick out
       | of it, too.
        
         | JeremyReimer wrote:
         | You reminded me of a time in high school when I worked for the
         | local library. The librarian had a perverse habit of closing
         | the windows in the back room during the summer, making it
         | unbearably hot. My mother, who worked there full-time as the
         | Children's Librarian--the Librarian's direct subordinate--told
         | me that during winter this woman would open up the windows and
         | make everyone freeze.
         | 
         | So while I worked on a program in FoxPro to automatically print
         | out new catalog cards, I also wrote a small program in
         | QuickBasic to print out (depending on the time of year) a
         | message saying "OPEN THE WINDOW!" or "CLOSE THE WINDOW!" (the
         | latter signed by "The Frozen Ghost") and then pause the
         | computer for a good minute or so just to make sure somebody
         | read it.
         | 
         | For good measure, I made the AUTOEXEC.BAT file and my program
         | read-only, and then deleted ATTRIB.EXE from the hard disk so
         | that it would at least be somewhat annoying to remove.
         | 
         | Years later I got a call from an IT tech who wanted to ask me
         | some questions about DOS (he never specifically said why!) and
         | I feigned ignorance. It felt good.
        
       | at_a_remove wrote:
       | I mean, there _was_ security, it 's just that most of the holes
       | were so big you could drive a bus through, honking and dragging a
       | bunch of rusty bikes.
       | 
       | I have walked onto MUDs and, annoyed at being killed by some
       | wizard for saying "hi," (stupid n00b move on my part) figured out
       | how to bring the game to a screeching halt in about fifteen
       | minutes. They had to bring it all down and patch to make me go
       | away. This wasn't a testament to my ability, it's just that
       | nobody was _thinking_ about this stuff in a defensive way.
       | 
       | Oh, your system won't let me email that file out, you'll just
       | return it to me? Well, lemme just forge my send from so you give
       | it to me anyway.
       | 
       | I got up to a lot of horsing around, almost all of it non-
       | destructive because getting attention generally is not a great
       | thing and it wasn't my stuff, I just wanted to see what was out
       | there and you either had to hear about it from someone who knew
       | it already or you had to stumble across it.
        
       | BrandoElFollito wrote:
       | Early 90's, university. I tricked the administrator of the UNIX
       | cluster to "su" from my account.
       | 
       | The su binary was mine, she typed the root password and the
       | cluster was mine.
       | 
       | I went to the administrators to say that I cracked the system and
       | would like to be part of the administrators team. I was accepted.
       | 
       | I learned an awful lot over the next few years (as a student, and
       | then as a PhD student) - this helped me to land a job at IBM, and
       | then at another company that was expanding in Europe.
        
         | a1369209993 wrote:
         | > I went to the administrators to say that I cracked the system
         | and would like to be part of the administrators team. I was
         | accepted.
         | 
         | See, this? This is how school computer systems are supposed to
         | work.
        
       | ddingus wrote:
       | The 80's
       | 
       | This piece brought a few memories and impressions forward.
       | 
       | One was hacking ULTIMA 2 and 3. Copy protection involved the bad
       | sector technique. However, those programs did not do an in depth
       | error check. Atari machines made a beep on each disk sector read.
       | 
       | To play a copy of the game, one just counted the beeps, open the
       | drive door, wait for the error sound (how handy is all that?),
       | then close the door and carry on.
       | 
       | Chain smoking... all through primary and most of high school, the
       | teachers lounges were filled with tobacco smoke. To their credit,
       | the educators did not reek in class, well one did, but those
       | areas of the building did.
       | 
       | All grades were old school analog, in the grade book, in pen.
       | Changes were done with a strike through, new value, initial.
       | 
       | One of my peers wrote a book report program in BASIC that would
       | generate a fairly healthy set of variations. The seed was a wait
       | for input loop. Was double digit report success before there were
       | questions.
       | 
       | Someone plugged an expansion card into a running Apple ][
       | computer and killed it. Despite a dead CPU, it displayed video
       | anyway. Was my first real experience with simple hardware vs
       | custom chips. Those computers did not have the spiffy sprites,
       | colors and sounds the C64 and Atari machines had, but they did
       | have just enough of the things that really mattered when it came
       | down to getting real work done. Someone looked the machine over,
       | plugged in a replacement chip and it was running again. Nice.
       | 
       | At the local university there was a card operated photo copy
       | machine. 5 cents a page or something like that. But, one could
       | ask for a copy, and listen for a little wine as some part began
       | to spin up, hit eject on the card and get a free page.
       | 
       | Most locked doors in my primary school could be opened with just
       | hand manipulation of the doorknob. Turns out they were not
       | mounted in their recommended orientation. A gravity based attack
       | was possible and I found it one day bored just fiddling with the
       | knob. Turns out, the more I moved it, the more motion was
       | possible!
       | 
       | Reporting that got me into trouble too. I remember that clearly!
       | 
       | Of course they were angry at the doors being so easy, tried to
       | assign blame to me, a 6th grader, amd were more concerned about
       | the work and cost to fix the issue.
       | 
       | If only people would just avoid doing anything unexpected, there
       | would not be a problem. In fact, there was not a problem, until
       | you came along...
       | 
       | I remember looks on adult faces I did not see often when my
       | response was, "How would you know?"
       | 
       | Some foreshadowing there for sure.
       | 
       | Heck, I even did responsible disclosure. Took it right to them
       | first. Could have blabbed it to others and then what?
       | 
       | Yeah, got the look again.
       | 
       | One phone related one was super interesting too. A friend and I
       | took an old pulse dial phone apart and were kind of stunned to
       | see how simple it was. Then we made calls successfully without
       | the dialer, just slapping the handset hook with anything close to
       | the expected pulse rate. Cool.
       | 
       | Then we called one another and were doing it again, just
       | interrupting one another. Soon, an operator was on the line
       | asking how we did this call. So we told her.
       | 
       | Turns out we had dialed some test sequence or other. Of course it
       | was not published and was not intended for use doing an actual,
       | live call. Tech had to reset the whole thing, but we did get a
       | super cool tour of the system later as that same tech was happy
       | to show us how the robot like, electromechanical system worked.
       | Amazing. These trees of open circuits! When one dialed a number,
       | that number was an address that literally moved an rotated arms
       | that closed the circuit to connect the intended phones!
       | 
       | Fun times. So much was human scale and could be directly seen,
       | heard, felt and was slow enough to be explored directly.
        
       | teknopaul wrote:
       | seems like bragging about is still the number one way to get
       | caught.
        
       | Bluecobra wrote:
       | > (Also worth mentioning: everyone's assigned password was their
       | social security number!)
       | 
       | My student ID in college was my SSN, and that was only 20 years
       | ago. :(
        
       | tptacek wrote:
       | This is a fun post. It's sort of mind-blowing to think about in
       | the era of 15 page Project Zero posts about reverse engineering
       | nested AMD SVM virtualization control blocks, but throughout much
       | of the 1990s, the modal vector for an actual hacker taking over a
       | network --- any network --- was simply by mounting a world-
       | exposed NFS share. Leendert van Doorn's NFS shell was probably
       | the most important hacking tool of that entire decade.
        
       | mikewarot wrote:
       | I was a young CS student, and the VAX administrators had written
       | a program called SETUIC to work around some limitations on
       | hardware to allow business students access to an IBM mainframe.
       | 
       | If you ran SETUIC with no parameters, it set your UIC to [0,0],
       | silently. _Anyone_ , not just business students, could run it.
       | The system environment variables pointed to it, like a big
       | advertisement sign to a young CS student.
       | 
       | I learned many things about how the world works after
       | accidentally discovering this fact. It is fortunate for me that a
       | 2 year suspension was the extent of my punishment. They were
       | hopping mad, not at my actions, but at those who I was foolish
       | enough to share this knowledge with, and had acted far less
       | conservatively than I had.
       | 
       | I later was a system administrator, elsewhere, for 15 years.
        
       | api wrote:
       | My friends and I "hacked" AT&T System 75 and similar PBX (intra-
       | office phone system) machines in the early 1990s for various
       | reasons, and they were easy to get into because they came loaded
       | with like 20 default admin accounts.
       | 
       | I remember a few of these: "cust/custpw", "rcust/rcustpw", and
       | "craft/craftpw" come to mind. Almost nobody removed or changed
       | the password to these accounts.
       | 
       | We'd find the machines using a "wardialer" (named after the phone
       | scanning scene in Wargames) app that would dial every number and
       | look for modems. We used a DOS scanner called "ToneLoc." We lived
       | in Cincinnati and could easily scan all kinds of local number
       | prefixes for free that overlapped with areas that were likely to
       | dredge up a rich PBX haul: downtown, near the airport, near
       | universities, etc. A certain kind of weird 1200-bps answer with
       | unusual parity settings (7E1 if I remember correctly) was a dead
       | giveaway for one of these ridiculously vulnerable AT&T PBX
       | machines.
       | 
       | Once you got in you could pull pranks, set up remote access lines
       | to get "free" phone calls, set up party lines for you and your
       | friends, etc.
       | 
       | I was like 14 or 15 at the time.
       | 
       | We also found other "phun" things with our wardialer including
       | large outdoor signs with modems to allow remote configuration of
       | the text they would display. If you saw "SMOKE POT EVERY DAY" and
       | similar things a 15 year old would write on a highway or
       | advertising sign in Cincinnati in the early 1990s that was us.
       | 
       | There was a real sense of exploration back then. When we scanned
       | areas like downtown Cincinnati we'd find tons and tons of modems
       | that would answer with mysterious (to us) prompts or blobs of
       | binary spew that I'm sure represented protocols we didn't know
       | how to emulate. A few times we managed to try obvious-sounding
       | login/password pairs on some of these login prompts and find
       | ourselves inside an Ultrix or a SunOS machine full of mysterious
       | data. We really didn't bother anything on those machines, just
       | looked around. We pulled pranks with things like signs but the
       | only things we really ever messed with or possibly damaged were
       | the PBXes. There were just too many fun things to do with those.
       | 
       | The weirdest thing I remember finding was something that
       | initiated an Xmodem transfer and sent a black empty pixmap and
       | then hung up. I wonder if it was some kind of camera or
       | industrial monitor that was not actually working but was still
       | on.
       | 
       | The most "alarming" thing we found was some kind of building
       | controller that we assumed belonged to a downtown skyscraper and
       | seemed to control elevators, which we didn't fuck with out of
       | concern that it could actually hurt people. Don't know if you
       | could have done anything dangerous with it but we didn't want to
       | try so we just dropped that one.
       | 
       | There just wasn't a lot of security back then because it was all
       | new and very few people knew how to do what we were doing. Even
       | though Wargames popularized the idea of phone scanning people
       | still seemed to assume that a live modem on a phone line was
       | secure if the number was obscure.
       | 
       | All that started changing really rapidly in the late 1990s when
       | tons of people got online.
       | 
       | Edit: found the scanner!
       | 
       | https://en.wikipedia.org/wiki/ToneLoc
       | 
       | https://archive.org/details/20040130-bbs-mthreat
        
         | passwordreset wrote:
         | SWIM once said to me: Funny thing about those System 75's, the
         | entire ordeal originated from the hack of a bank's telephone
         | system, who had a small Unix UUCP network and, for some odd
         | reason, put all their System 75 logins and passwords into their
         | Systems file. The default login information leaked out after a
         | hacker named Syadasti announced that he was willing to turn any
         | System 75's given to him into usable remote PBXes, and
         | eventually some other hacker (Scott Simpson, maybe? don't know)
         | set up a system on his own home line that responded like a
         | System 75 would, and gave Syadasti that number. He promptly
         | tried to login with the cust/rcust accounts, which were
         | recorded by the other hacker, which led to the explosion of
         | System 75 hacks throughout the US.
        
       | tyingq wrote:
       | Shared computer labs were dead easy to scrape account info from.
       | Since the terminals were text, it was easy to code up a password
       | scraper. You write a program that faked the login and password
       | prompts, record the data, say "password incorrect", then exit, at
       | which point the real login daemon would take over. Cliff Stoll's
       | "The Cuckoo's Egg" describes this pretty well.
        
       | [deleted]
        
       | colordrops wrote:
       | The easiest exploit I can recall (late 80s? Early 90s?) was
       | getting credit card numbers from tossed receipts at gas station
       | pumps.
        
         | 29athrowaway wrote:
         | Initially there was no validation for credit cards. There were
         | programs called credit card generators that could generate a
         | card from any bank in the world, with any name on card, etc.
         | 
         | If you wanted you could generate a card for McLovin from some
         | bank in Hawaii and it would work.
         | 
         | I never used them but a close friend back in middle school did
         | and got his computer taken away permanently.
        
           | edmundsauto wrote:
           | This was a checksum that machines could run locally, to make
           | sure the account # was "valid". Then, in batch, systems would
           | connect to the bank for the account interaction.
           | 
           | Some services (AOL, when it charged by the minute) wouldnt do
           | the actual bank reconciliation for a few days, during which
           | you could use the service.
        
         | bluedino wrote:
         | You could get the whole carbon from a counter at a department
         | store if the cashier wasn't around.
        
           | sgerenser wrote:
           | I worked at Sears selling TVs while in college from 2002-04,
           | and even in their latest POS systems anyone could walk up to
           | the thermal printer, press a button (even with the register
           | itself locked) and print out a reverse-chronological "journal
           | roll," which included names, addresses, phone numbers and
           | full credit card numbers and expiration dates for every
           | transaction. Crazy that anyone thought that was OK in the
           | early 2000s.
        
         | failwhaleshark wrote:
         | Before carbonless, the carbon slips between the layers. There
         | were up to 4 additional copies make on some of those kinds of
         | forms and you'd have to press very hard with a ballpoint pen in
         | order to get it to register at the bottom. Then, the credit
         | card imprinter had to press the card to get through them.
         | 
         | Since most cards don't have raised numbers anymore, manual
         | credit card imprinting is no longer possible.
        
         | irscott wrote:
         | You used to be able to Google for transaction information from
         | a particular e commerce shopping cart and get .txts of credit
         | card info, name, address. The wild west was wild.
        
       | Trias11 wrote:
       | You could browse all files on many remote computers via:
       | 
       | net use \\\123.45.6.78\
       | 
       | dir \\\123.45.6.78\
        
       | spullara wrote:
       | I've been thinking about writing up a similar post focused on all
       | the dumb stuff that was possible in the 80s. Everything from
       | default voice mail passwords, long distance carriers with
       | predictable code patterns, office phone systems that tell you as
       | soon as you have a wrong digit for outside line access, DECs own
       | global asset management system having a huge security hole in it,
       | etc. Honestly though you can just read the first half of
       | Mitnick's book up until the point he starts breaking into actual
       | buildings to get a feel for it. Social engineering was and will
       | remain the most powerful tool in the hacking arsenal.
        
         | 300bps wrote:
         | _long distance carriers with predictable code patterns_
         | 
         | Thank god for statutes of limitations. Sorry MCI and Sprint for
         | getting about 20 codes per night with my 300 baud modem when I
         | was 13.
        
       | leifg wrote:
       | I still remember when Windows computers beging hooked up to a
       | dial up would be open on the internet. Lots of them had no admin
       | password and all drives where shared by default.
       | 
       | So by just port scanning on the SMB port you'll find a lot of
       | computers and would have access to all their files.
        
         | arminiusreturns wrote:
         | Man I stumbled on some crazy stuff back then when doing scans,
         | one of the more notable was finding and ISP billing system with
         | it's C drive shared over netbios (137/138). It was such the
         | wild west days of the internet.
         | 
         | Stuff like: I got in the local newpaper for recovering a county
         | server password that had been lost... cracks me up in
         | retrospect.
        
         | AnimalMuppet wrote:
         | With a cable modem, you were on the same physical cable as your
         | neighbors. If you looked at "Network Neighborhood", you would
         | see your neighbors' computers and printers (unless they had
         | turned off file and print sharing).
        
           | bluedino wrote:
           | Fire up Ettercap and read unencrypted AIM conversations...
        
           | thedougd wrote:
           | Ah yes, I had forgotten about this. Routers and access points
           | weren't yet a consumer item.
        
       | MeinBlutIstBlau wrote:
       | The typical 80's hack I always think of is in Ferris Buellers Day
       | Off where Ferris hacks the schools records to change the number
       | of days he was sick. Not only was there no internet, but how did
       | he connect to the network? It's something I've always wondered if
       | it would've even been possible.
        
         | kgwxd wrote:
         | He learned a lot while hacking the WOPR.
        
         | pjmlp wrote:
         | Here are modems for Timex 2068,
         | https://www.timexsinclair.com/products/hardware/rs232-serial...
        
         | mad_ned wrote:
         | possible, maybe not likely. our school for instance had a modem
         | line you could dial into, that let you access this one program
         | that was for career counseling, it was like a buzzfeed quiz
         | that asked you questions, and then recommended a career for
         | you. I think I got plumber. we tried to hack past this to get
         | at the general OS, but no luck. I suppose someone could set
         | something like that up for the school record access, but would
         | they? (like I claim in the article, it was the 80s so maybe)
        
         | dave_sullivan wrote:
         | I had a project one time for a school district and had access
         | to all of that. Made me think of the "changing grades remotely"
         | trope and had a pretty good chuckle. Wouldn't have been
         | possible when I was a kid but it is now I guess.
        
         | bluedino wrote:
         | Early 90's, but our computer system (some sort of minicomputer)
         | had a modem bank so that teachers could do grades and such from
         | home. I worked in the office because I had an open hour, I
         | earned a credit and I also got to see the guidance counselors
         | view students records and such. It would have been very, very
         | easy to change grades.
         | 
         | Also, many schools had internet connections back then. I know
         | our school had a T1, it might have also had a leased line to
         | the state education system for some reason, I would guess the
         | security was very lax back then.
        
         | dragontamer wrote:
         | > Not only was there no internet, but how did he connect to the
         | network?
         | 
         | Most "networks" were over phone lines those days.
         | 
         | You call in with a modem, and that connects you into a
         | particular computer (or in the general case: a network). BBS
         | for example was just a shared computer on a modem on a well-
         | known publicly posted telephone number that many people called
         | every now and then to check for message.
         | 
         | If you knew the correct telephone numbers and the proper
         | parameters to connect (baud rate, modem type, etc. etc.), you
         | could even get a printer (aka: Fax Machine), a UNIX login
         | prompt, or other equipment inside of an office (and presumably
         | a school).
         | 
         | ----
         | 
         | Now why would a school put their grades database on a publicly
         | facing telephone number and hope it doesn't get hacked? Well,
         | that's a good question.
         | 
         | But then again, ATM machines in tiny liquor stores are still
         | largely on this telephone-line / modem technology (I dunno if
         | its still like this today, but even just 10 years ago, a
         | surprising number of ATM machines were still accessible over
         | dial up). So why don't you ask the ATM machine engineers why
         | they think that this practice is safe.
         | 
         | After all, if its safe enough for ATMs, its probably safe
         | enough for a school network. If this thought process is
         | horrifying to you, then welcome to the 80s / 90s era of
         | computer security.
        
           | kQq9oHeAz6wLLS wrote:
           | > Now why would a school put their grades database on a
           | publicly facing telephone number and hope it doesn't get
           | hacked?
           | 
           | Same folks who built David Lightman's school system,
           | apparently.
        
           | goalieca wrote:
           | My high school had the attendance computer in main office and
           | it could be found on the network from any other machine.
           | Everyone knew the password to it since was used and shared
           | for all other admin and IT tasks.
        
         | kmeisthax wrote:
         | This concept is a little weird to think about today, but the
         | Internet used to be accessed through regular voice phone lines.
         | You'd plug your computer into the phone network with a little
         | thing called a modem. In the _really_ early days you actually
         | had to use an acoustic coupler for regulatory reasons. Then you
         | dialed the phone number of the computer you wanted to connect
         | to - most of which were _not_ running the Internet Protocol!
         | 
         | Typical computer systems you would dial into would include...
         | 
         | 1. Proprietary data services (AOL, Compuserve, etc)
         | 
         | 2. BBS systems - typically individual computers running
         | services that let you send messages or files to other users who
         | could then dial in to receive them. Some BBSes were even
         | networked to one another, the largest of such systems being
         | Fidonet
         | 
         | 3. Remotely-managed IT equipment - the sort of thing depicted
         | in the movie.
         | 
         | 4. Mainframes - universities and large businesses would often
         | have remote access that you'd dial into. This is roughly
         | equivalent to SSHing into an Internet-connected machine today.
         | 
         | 5. The Internet - originally only through remote access to
         | mainframes (#4). Later on, data services (#1) started offering
         | open Internet access. (notoriously, AOL utterly demolished
         | USENET's existing cultural norms by doing this) Then companies
         | started just selling dial-in Internet access without other
         | services and this became the dominant use case for modems.
         | 
         | This concept was inverted starting in the late 90s. First,
         | phone companies started offering "digital subscriber lines"
         | (DSL) that provided way more bandwidth to connect to an ISP
         | with. Then, (at least in North America, thanks to various Sega
         | Genesis related reasons) cable companies got in on this and
         | started offering "broadband Internet", too. With the greater
         | bandwidth of these services, it suddenly made sense to send
         | Voice over Internet Protocol (VoIP) instead of Internet
         | Protocol over Voice. So dedicated landline channels became very
         | outdated _very quickly_ , and today we think of voice as just
         | something you send over a multitude of Internet apps.
        
           | bluedino wrote:
           | Don't forget about your dialing into your office computer to
           | work from home, using something like LapLink or PC Anywhere
        
         | CountDrewku wrote:
         | Watch War Games and that'll give you a general overview of how
         | you'd access a system back in the 80s. They were still
         | networked and accessible remotely, just not the way they are
         | today.
        
       | ulzeraj wrote:
       | Very cool stories. I remember running some pranks but those are
       | all from the early 2000s.
       | 
       | Best story I remember there was this arrogant guy that worked
       | with on the Unix department. He was into FreeBSD by that time and
       | had an attitude towards the Linux guys. One day he left his table
       | and forgot his machine open with a root prompt. They took the
       | chance and modified inetd.conf to map a certain port to the
       | shutdown program. People had so much fun shutting down his
       | computer remotely and watching his reaction.
       | 
       | There was also this time working for a smaller company and we
       | would prank each other all the time. I had admin access to the
       | Linux router so I've created a NAT rule to redirect this guy's
       | traffic to a transparent squid proxy running a perl script that
       | relied on imagemagik to turn the images upside down. Got the
       | script from a Slashdot post. Poor guy even tried to reinstall the
       | OS to no avail. He eventually found out and had his revenge by
       | going into my computer CMOS and setting disk access to PIO
       | instead of DMA.
       | 
       | I also remember scaring people through Windows' net send commands
       | and that one where you take a screenshot of the desktop then you
       | remove all the icons and interface bars and set the screenshot as
       | background image. Also randomly adding 'alias ls=exit' to some
       | server /etc/profile.
        
         | jonshariat wrote:
         | Not a programmer but lots of good memories doing the background
         | trick by hand. Good times.
        
       | 29athrowaway wrote:
       | A highly recommended text file, enjoy:
       | 
       | Anatomy of a pirate
       | 
       | http://www.textfiles.com/piracy/anatomy.txt
        
       | tobinfricke wrote:
       | When the web was new, one could use Altavista to search for
       | /etc/passwd files accidentally exposed to the web, and crack
       | them. Even better, many *nix machines shipped with some accounts
       | having no password by default. I remember one could easily telnet
       | into almost any SGI Irix machine via the "lp" account.
        
       | jamal-kumar wrote:
       | Back in the mid-2000s I was really into computer security (still
       | am) and managed to trick my school's truancy system using
       | something called a silent termination test line. Basically what
       | this does is cuts out the line entirely to test for line noise
       | for a few minutes, like you pick up the phone and it'll still be
       | connected to that number, no dial tone just silence. I just
       | confidently went right up to the secretary and told her my new
       | home phone number was the silent termination test line. There
       | would be this automated truancy bot calling everyone but whenever
       | it would reach my name, skipping around a class a day at one
       | point (Still don't know how I actually graduated other than the
       | teachers liking me and getting my homework done anyways), it
       | would just fuck the entire system up and a bunch of people
       | wouldn't get calls after me either.
       | 
       | Smoking drugs and hanging out with girls was way funner,
       | completely zero regrets getting doing stuff like that out of my
       | system early... considering the trajectory my life has been on I
       | really didn't need post secondary. Can only imagine how stressful
       | and expensive that would have been and to what depressing,
       | indebted end.
       | 
       | There was a bunch of other fun stuff on that test prefix, but
       | half of that is lost to the sands of time, the funnest I don't
       | even know what the hell it was. I've asked random phone company
       | linemen about it and they're basically just like "how the hell do
       | you even know anything about this?", and can't tell me what this
       | number I found was. I basically war-dialed it based on patterns
       | from other numbers on the prefix and it'd give me 30 seconds and
       | then a real dial tone (payphones around then actually used some
       | recorded tone). Since I could call these numbers for free from
       | the school payphone, it was easy to find, and that real dial tone
       | was probably in the phone company HQ. We found this enormous list
       | of interesting phone numbers from phonelosers.org (Wish those
       | were archived!) and just started doing shit like calling the
       | white house and the president of kenya's office. I think we only
       | stopped after a friend of mine made a huge stupid mistake and
       | tried to print the list out. The library printer just started
       | spitting out REAMS of paper, the librarian was like what the hell
       | and I just remember thinking damn he fucked up, and running away
       | hahaha
        
         | techrat wrote:
         | Web archive goes back to 1997...
         | 
         | http://web.archive.org/web/19990125102138/http://www.phonelo...
        
           | jamal-kumar wrote:
           | I don't know if I have time to dig through all of that with
           | th interspersed broken links but I am pretty sure it was on
           | phonelosers.com which was their forum
           | 
           | Still thanks for the link I haven't seen this in ages
           | 
           | I think RBCP went to jail at some point
           | 
           | The closest thing I can find on google is a really old
           | version from 1995:
           | http://www.textfiles.com/groups/PHONELOSERS/pla007.txt But
           | the thing got HUGE over like a decade
        
       | thedougd wrote:
       | Some fun ones:
       | 
       | BBS games started adding virtual currency that you could transfer
       | between players. Some even participated in a network of BBS
       | systems, allowing the movement of game currency from one BBS to
       | another. These frequently didn't have input validation and you
       | could transfer -1 to another player and they'd receive 4294967296
       | dollars. Unfortunately we were kids and kids do nasty things. We
       | would completely upend a competitive game by giving all the
       | underdogs huge wealth.
       | 
       | Pager numbers all fell in the same exchanges. Every number under
       | 123-456-xxxx would be a pager. I wrote a program to war dial all
       | these and leave the same victim's phone number on all the pagers.
       | We did it to a friend and witnessed an endless stream of
       | frustrated calls to their house for a few hours. Brutal.
       | 
       | A school system put their mechanical control systems on a modem.
       | We acquired the software and directory that could access these
       | control systems. Not only did they put all the HVAC systems on
       | it, they also added things like emergency and off-hour lighting.
       | Some of the stuff that was controllable through this remote
       | interface was down right scary: boiler pressure measurements,
       | boiler system valves, etc. We weren't stupid enough to mess with
       | that but would have fun turning off all the lights at night, or
       | turning up the heat before the Saturday morning recreation
       | basketball games in the gym.
        
         | brk wrote:
         | I remember using odd/unprintable characters in those BBS games
         | for my username. There was one (spacewars?) where you got a
         | bounty, but had to type in the characters name to claim the
         | bounty, people would complain they could not collect the bounty
         | against me, as my name was basically brk[null character].
        
       | reid wrote:
       | My high school in 2003 used IBM PCs with Windows NT. I discovered
       | the Messenger service, enabled by default, remained enabled and
       | was not turned off by group policy.
       | 
       | Start > Run, type "cmd", then:                   net send B131
       | "Hi there"
       | 
       | This would pop up "Hi there" on the B131 computer. The hostname
       | of each computer (B131, for example) was taped to the top of each
       | monitor, so I had a great time annoying my classmates in computer
       | lab. One day students around me noticed me doing this and I
       | naively showed them how to do it. I helpfully suggested to
       | _never_ type * as the hostname or the message would send to all
       | computers.
       | 
       | After a school wide DDoS from several students around me sending
       | messages over and over like:                   net send * "this
       | school is the worst"
       | 
       | ...and a lot more unmentionable messages, I was soon escorted out
       | for a three day suspension for "hacking the school network." Good
       | times. :)
        
         | jamal-kumar wrote:
         | heh I remember doing a little bat file that was something like
         | @echo off       net use e: \\Network\Share
         | 
         | to get to the network shares which I could see in windows
         | 2000's network display but would just tell you 'access denied'
         | if you tried to simply click on them. Just giving them a drive
         | mount like that worked fucking swimmingly. It gave us access to
         | pretty much everything, including this program called
         | 'photodex' where the username and password was the first
         | initial of our principal's first name and his last name and the
         | password was 'teacher'. Some other kid figured this out at some
         | point before us, and we found a folder containing bunch of shit
         | with super obvious file names like TEENPORN.JPG.EXE and the kid
         | we didn't really like in our IT class who turned out to be a
         | registered sex offender as an adult (he told me this at a
         | wedding after complaining that they took his guns away, and all
         | i could do was remember this incident and laugh) actually went
         | and clicked one of these because he was a bit thick in general,
         | and ended up getting in shit for this. I don't remember if they
         | managed to lock things down properly after that but I think I
         | remember recalling that this ruined the fun.
        
       | peter_l_downs wrote:
       | Great writing. I never did anything so interesting, but I have a
       | few fun stories from highschool. Our school district gave every
       | student access to a mac laptop for coursework, but of course we
       | used to play a lot of flash games. Eventually they got around to
       | updating the network's blocklist or whatever so addictinggames
       | couldn't be accessed anymore. I'm sure they thought they were
       | very smart but this just raised the stakes.
       | 
       | Of course we couldn't install games or our own software on the
       | computers -- the `/Applications` folder was locked down and
       | nothing would execute outside of it. They weren't totally stupid,
       | they had some remote monitoring and privilege blocking software
       | to prevent us from getting control of our own machines and doing
       | silly things like playing games or even opening the Terminal. But
       | eventually someone (not me, really, I wish I were this smart)
       | figured out that inside of one of the pre-installed .app's there
       | was a directory to which users still had write permission. So
       | everyone in the entire school started playing Marble Blast Gold
       | and, for some reason, Pokemon Red through an emulator, all just
       | by dropping the programs inside the special fold
       | `/Applications/SomeThingICantRemember.app/contents/special-
       | folder/`. The games spread like wildfire because the school had
       | also set up a system of shared network folders, one for each
       | teacher, so that teachers could more easily share files with us.
       | Turns out we could also use it to share files with each other.
       | Lots of movies, as well. Eventually someone noticed and shut that
       | all down.
       | 
       | Of course, highschool students want to play games instead of
       | doing coursework, so one day someone (not me, really) realized
       | that if you removed the battery from the laptop you could then
       | unscrew the case and remove a stick of RAM, which would allow you
       | to hold certain keys at boot to reset the PRAM or something like
       | that. This would let you boot into safe mode, circumventing the
       | remote monitoring and permissions software they had in place, and
       | make your user account an administrator. Boom, games were back. I
       | mostly used it to be able to work on software projects, of
       | course, but I did end up playing a bit of Advance Wars.
       | 
       | I can't remember now but there was some issue where this didn't
       | persist for very long -- maybe there were updates that the remote
       | monitoring system would send that would reset your admin status?
       | -- so you would have to go through the whole PRAM reset
       | rigamarole, with a screwdriver, and that was a pain in the ass. I
       | was out of school for a while my senior spring due to the flu and
       | I figured out a way to totally disable the remote management
       | software.
       | 
       | This was great, and I was having an awesome time working on
       | software that would eventually get me my first programming job
       | while I should have been focusing in class, when I got called
       | down to the principal's office, where I was accused of being a
       | computer hacker. I of course denied it, but they said that it
       | certainly was odd that my computer had stopped communicating with
       | the remote management software entirely. I think because I was so
       | close to graduating and actually hadn't done anything wrong I got
       | away with a week of detention and a firm promise to not do
       | anything of the sort ever again.
       | 
       | Around that same time it had come out that certain administrators
       | at the school were misusing the remote management software's
       | features to spy on highschool students in their own homes, which
       | was pretty absurd and of course a huge and expensive debacle, so
       | I think they were somewhat more sympathetic to me disabling it
       | than they might have been otherwise.
       | 
       | https://en.wikipedia.org/wiki/Robbins_v._Lower_Merion_School...
        
         | peter_l_downs wrote:
         | Oh, one other fun thing. We had a schoolday that ended with a
         | 30 minute activity period where every student had to sign up on
         | some web interface to a different teacher's room. This was so
         | that you could get help, meet with teachers, project groups,
         | whatever if you needed it. But there were limited spots in each
         | teacher's periods and you needed to sign up in advance, with no
         | more signups allowed after noon on the same day. I took a look
         | at the web interface and realized that all the checks were
         | client-side, so I wrote a little script that would let me sign
         | up for any activity period, at any time, even during the
         | activity periods. It was good fun being able to switch periods
         | at the end of the day, and seeing teachers being confused after
         | they had called attendance, checked me in to their room, and
         | then seeing me drop off the attendance and show up somewhere
         | else. Gave me a free pass to go wherever I wanted which was
         | nice.
        
         | Pick-A-Hill2019 wrote:
         | I took a look at that link (Robbins v. Lower Merion School
         | District) and - Wow, remotely activating students webcams in
         | their own bedrooms is ... just ... SMH. I hope I am wrong but
         | as far as I can tell, no-one went to jail for it?? Dayamn!
        
       | __MatrixMan__ wrote:
       | In my middle school you could just x out of the Windows NT login
       | window and get a userless session.
       | 
       | We didn't understand that we hadn't hacked anything, and neither
       | did our teachers. Their misplaced awe at our ability to cloak our
       | activities in anonymity was intoxicating.
       | 
       | Most of my cohort then are engineers now.
       | 
       | I worry that as security gets better, opportunities for
       | creativity and exploration go away, which might not bode well for
       | future generations.
        
         | tester756 wrote:
         | Don't worry
         | 
         | If you're into real world security / reverse engineering and
         | other stuff, then try CTFs, other strong people will ensure
         | that you'll have enough room for creativity and hacky hacks :)
        
         | jamal-kumar wrote:
         | I think about this alot too. Tons of the current tutorials on
         | learning how to break windows security teach you on an old
         | windows 7 VM just to make it easy to get around mitigations and
         | learn without hindrance. I mean I know I learned on windows XP
         | VMs... but what happens when Microsoft rescinds offering those
         | free windows 7 IE11 VMs any arbitrary time soon?
         | 
         | On the other hand I like how Microsoft actually seems to be
         | giving a damn these days.
        
         | grawprog wrote:
         | In university, for some strange reason, we were required to
         | spend a few hours in a 'learn how to use a search engine
         | class.' It was brutal, they used remote control software and
         | slowly and painfully taught us how to use google.
         | 
         | I figured out pretty quickly you could Ctrl-alt-delete to bring
         | up the task manager and just close the client on the computer I
         | was using.
         | 
         | The teacher never figured out why one of the computers vanished
         | off the remote software management screen she was using.
        
         | nogridbag wrote:
         | Yeah I also got a bit too creative in middle and high school.
         | It was all harmless fun, e.g. writing scripts so that various
         | computers would start beeping at random times during the day.
         | 
         | None of my school faculty had any understanding of computers. I
         | was even yelled at for using "Google" during a research
         | project.
         | 
         | I think the bigger fear is that people cannot make mistakes
         | anymore. Even in my local town a simple mistake went viral on
         | social media and now the student's whole life is ruined for
         | something that may have been a simple visit to the principle's
         | office back in the day.
        
         | liketochill wrote:
         | I did a school project where I dos'd a local ISP for 10 seconds
         | using broadcast amplifiers on misconfigured routers that
         | allowed the source address to be spoofed. I was probably 15?
         | The isp I think only had a T3 but most people were still on
         | dial up so overwhelming a T3 seemed like a big deal.
         | 
         | I miss having shell accounts at all the .edu's for my egg drop
         | bots. That is how I learned about all the us schools hah
        
         | twox2 wrote:
         | It's a moving target. The opportunities for kids to get
         | creative and explore are now in emerging technologies, but they
         | are "emerging" only to us old farts. To young people, it's just
         | what's there. I think these things come easy to the inquisitive
         | minds that are not tainted by what you can and can't.
         | 
         | For example, I often read bug bounty write-ups, many of which
         | are obviously written by young teenagers. Some of them are able
         | to find issues that appear to be hiding in plain site. I kind
         | of think that what you're describing is a matter of
         | perspective, but boy do I miss the good old days when
         | everything was easy to exploit.
        
       | Zenst wrote:
       | My earlier hack was a ICL 2903 running George OS, involved
       | creating large file in area previously used for system journal
       | and could then dump that file out and read the content of the
       | system journal and that was how I got the admin password. Other
       | one I did was in effect a keylogger that I ran on the system that
       | would take control of the terminal it was directed too and
       | present login, take the input and then pass to the system making
       | the user oblivious.
       | 
       | But for practical use, the old 0800 free calls trick of the early
       | 80's was probably most favourite. Back then they introduced 0800
       | free calls, when landline calls in the UK wasn't cheap. These got
       | used for marketing, so companies would have there 0800 sales etc.
       | Now, outside office hours they would direct to a recorded message
       | on the PBX. Then what you could do is after the message, if you
       | stayed on the line it would drop you into the exchange and you
       | then pressed 9 on tone dial pad and could dial any number you
       | likes as if you was dialling from that exchange location. Most
       | being in London so was nice for free calls. Had limited use for
       | BBS access, case of all that routing and line quality at times as
       | well initial set-up. But still fun.
        
       | fatnoah wrote:
       | It wasn't just the '80s. Things persisted into the mid '90s as
       | well.                 - Pirate FTP sites were in plain sight with
       | folders named with unprintable ASCII characters       - My
       | college-provided Telnet client for Windows included a backdoor
       | FTP server with a plaintext user name and easily brute-forced
       | password (unsalted hash that turned out to be a birthday of a
       | school admin)       - Admins had to resolve our network issues by
       | connecting to network via modem, from our computers.  Of course
       | terminal program had keylogging enabled...       - Open SMTP
       | relay was widespread and everywhere.  Spoofing and forging was as
       | easy as a little Telnet and HELO
        
       | flatiron wrote:
       | 90s I got suspended for "hacking" when all I did was create a
       | windows file share. Had me and my friends split the typing
       | assignments and combine them on the share so we could browse the
       | internet during typing class.
        
       | pdkl95 wrote:
       | In high school "AP CS" class in the early 90s, a friend of mine
       | was annoyed at the stupid "security" software the school
       | installed on the macs (system 7). It was basically just a system
       | extension that asked for a password on startup.
       | 
       | Poking around, my friend noticed a slightly hidden/obscured file
       | that had a file size that matched the number of characters in the
       | password. N char password, N byte file. The file didn't have the
       | password in plaintext, so my friend asked the teacher of a common
       | way to scramble a byte. The teacher quickly suggested, "XOR?"
       | 
       | So my friend decided to try XORing the bytes in the file with a
       | few values to see what happend. His _first guess_ was right: the
       | password was  "obscured" with:                 for (char *p =
       | password_str; p != NULL; p++) {         *p ^= 0xC9;       }
       | 
       | Why did he guess 0xC9? He was a total Trekkie/Trekker. 0xC9 in
       | binary is 11001001.
       | 
       | https://memory-alpha.fandom.com/wiki/11001001_%28episode%29
       | 
       | I guess we know what show the author of the "security software"
       | likes to watch...
       | 
       | Epilogue: my friend quickly did the obvious thing and made a boot
       | floppy with a small program that printed out the password, so we
       | had access to most of the computer in the school _and_ discovered
       | all the passwords we weren 't supposed to know. I think we only
       | used that to play bolo (early tank proto-battle-royale).
       | _However_... several years later in my first year at university,
       | I happened to talk to someone attending the local high school.
       | The had a copy of my friend 's boot floppy! I know we never
       | bothered to upload it a BBS, but somehow it ended up in the hands
       | of quite a few high school hackers in multiple cities.
        
         | Communitivity wrote:
         | Nice. This brings back a very fuzzy memory. I think I found at
         | one point the 'software developer switch' a physical trigger
         | for the NMI, was still in the software in the form of flower G,
         | and would pop you into a debugger. I think.. the memory is very
         | fuzzy, as it's been 30+ years since high school.
        
       ___________________________________________________________________
       (page generated 2021-06-30 23:01 UTC)