Your modifications and/or contributions to the white paper on how to hack a ham sandwich are located here before i modify the white paper... Vos modifications/ajouts au papier sur comment hacker un sandwich au jambon sont stockées ici avant modif du papier... |
|
Nom: mon nom ??? modifsil faut pas oublier ke l on es la saucisse ki veut penetrer le pain ss autorisation du medecin Nom: Aurelien modifsJ'finirais bien par un steack Tartare, mais j'ai pu de viande hackée. La bise au chat ++ Nom: ZeubX (Hacker de pizza toute garniture) modifsPour faire un vrai hack de ham-sandwiches , il primordial de passé par la phase sacrifice de poulet , et preparation des tacos sauce ADM . La j'attaque toujours par un bon scan nmap -sS -O -is cornichon ip_du_sandwich Un petit coup de perl whisker.pl -I -i -h ip_du_sandwhich A ce stade la , nous avons generalement toutes les informations sur la configuration et les different deamons alimentaire que possede notre cible. Je conseille au debuttant d'avaller un flanby vanille pour digerer les tacos d'ADM , qui , bien qu'efficace , sont toutes fois tres lourd. Je n'aime pas trop les buffer-overflow qui vise les salades,tomates,et sauce mayo. Moi je hack la plupart du temps grace a la cueillere a flanby , en exploitant les cgi. Si je trouve un whois mal coder par le sandwich-coder je tape souvent des truc du genre: www.bidon.com;cat /etc/salade_shadow | mail zeubx@stephanie.fr ;xtrem-mayo -display ip_a_moi:frigo On peut aussi utiliser des attaque dos contre l'admin du sandwich EX(tjs le whois):www.bidon.com;cat /dev/hda1>>/etc/salade. cela a pour effet de remplacer la feuille de salade par le disque dur hda. A 12h , l'admin fou vas se casser les dent dessus. Le sandwich ne repondra plus au ping tant que l'admin sera chez le dentiste. Grace a ca , on peut envisage le tcp hijacking mais la , c une autre histoire...
Nom: egery (la terreur des sandwichs au jambon) modifsdans le script vous avez oublié le tag <PLASTICBAG>, tres important pour configurer la variable "je déchire tout avec les mains et les dents" !!! vraiment, quel manque de sérieux... au fait, le site est super quand même. Nom: Phil BANK$ modifsOuais, encore un questionnaire ou on peut répondre n'importe quoi ! Rien à dire, c juste pour remplir le formulaire ! Nom: ökljdsölkäpå modifsrien Nom: Antoine Gauthier modifsGo to http://www.hotdog.com to get the hotdog upgrade (free!) Nom: Olivier modifsJe découvre ... Super, longue vie à vous. Nom: morphuse modifsj'est rien compris Nom: Xavier modifsPar analogie avec les attaques "flood", il faut, avec les sandwiches au jambon, ployer le ouasson, je veux dire moissonner le coton, enfin, m'avez compris, noyer le poisson. - Retirer le ham du sandwich - Insérer un poisson, mort ou vivant - Ficeler (ça glisse, le poisson), si on vous dit ô le beau rôti, eh bien partagez, avec un peu de mayonnaise on partage mieux, mais ne mangez pas la ficelle. - Tremper le sandwich ficelé dans une bière tiède Au bout d'un certain temps, ça bouillonne (merci, Pasteur!). On peut alors inventer un mode d'emploi ad hoc (Haddock, si vous avez mis une morue entière). Moi, je crois que ce serait un excellent désinfectant pour chaussures de sport. D'autres m'ont dit que ça régénérait le clavier ou le tampon du clavier, à moins que ce ne soit un buffer I/O, mais je n'ai jamais essayé de renverser un sandwich au poisson dégoulinant de bière "dans" un port série ou parallèle. Finalement, l'incertitude demeure, et quelle triste époque, hein ? Nom: modifsNom: KOSAK... yé suis Rousse et Alors ??? modifsNitchevo !!(accent russe dans le texte) vous oubliez toujours une étape importante , celle qui fait que votre ham hackingburger ne sera pas total recall back packer. à savoir >::< LA PHASE HAMSTER ou peut être HAM STAIR ?? je sais plus, désolé.pauvre petite bète, finir dis-hacké entre mortadelle et salami. ou salmi(de canard). BORGEMOÏ de BOLCHOÏ faut q'vous laisse, Boris m'appelle... Salut à Pierre (le Grand) et Christianovna Nom: Bacano modifsSubject: The Alien From Seatle (new X-File series) I wonder if you wonder what i'm wondering ... why Kitetoa and my self now, dedicated ourselfs in helping people about f00d hacks? Because its not a joke ... a joke was the answer i get from Microsoft Brasil about the NSAKey ("all X-Files is what you saying"), so this article is dedicated in his memory. Good Bless You!!!!!! (...) Following the X-Files new : The Alien from Seatle ... here it goes the resume of last episodes... 1# Alien Base in Brasil # http://www.iptvreports.mcmail.com/ic2kreport.htm#_Toc448565556102. In 1994, NSA intercepted phone calls between Thomson-CSF and Brazil concerning SIVAM, a $1.3 billion surveillance system for the Amazon rain forest. The company was alleged to have bribed members of the Brazilian government selection panel. The contract was awarded to the US Raytheon Corporation - who announced afterwards that "the Department of Commerce worked very hard in support of U.S. industry on this project".(69) Raytheon also provide maintenance and engineering services to NSA's ECHELON satellite interception station at Sugar Grove. 2# But ... what is ECHELON? ask Mulder # http://www.uol.com.br/idgnow/busca/0911b3.htm EU could start investigations about a U.S. spy net 09/11/98 The EU is considering an large investigation to find out if NSA is abusing his presence and his power of survailance over the Internet to spy private and goverment institutions. The NSA is responsable for manage a spy program codename Echelon, that came from the Could War. The Comite for Cientific and Technologic Options of European Parlement says that Echelon is a hiden spy worldwide network for communication interceptions like e-mail, phones, faxes, satellite and backbones. (!!!!!!!!!!!) It's all reported in a document "An Avaliation of Political Control Technologies", showing how NSA send intercepted information by satellite to Fort Meade, in Maryland U.S., from a hub based on Menwith Hill (near London UK) Daniel Verton - Federal Computer Week 3# What's a little spying between friends? # http://www.nandotimes.com/technology/story/body/0,1634,89923-142316-981920-0,00.html 4# Yeah ... and there is a lunatic spending money with that? bah ...# FY 1999 Defense Budget Documents: http://www.fas.org/man/docs/fy99/topics.htm Documents on Military Spending: http://www.fas.org/man/docs/index.html 5# OK ... now jump to the NSAKey subject or i'll shut this out # http://www.techweb.com/wire/story/TWB19990906S0003 Caspar Bowden said: "Building in a 'back up' key makes no sense unless there is a revocation method for the primary (key). There is no revocation method." http://www.fipr.org/ I don't believe them -- what kind of natural disaster are they talking about? A meteor destroying all the earth's structures?" said Privacy International director general, Simon Davies."Microsoft's argument is inconsistent with its operating procedure -- it could hold a single key in multiple locations, that is a standard security procedure." He added that to compromise user security, "it's not necessary to share access with the NSA -- simply complying with their requirements will do that." http://www.wired.com/news/news/technology/story/21589.html?wnpg=2 The _NSAKEY is one of two such keys buried deep in the cryptography source code of most Windows operating systems. In other reports, Microsoft said that the _NSAKEY is still a Microsoft-controlled key that will serve as a backup in the event that the first key is compromised. That just doesn't make sense, Fernandes said. "If they lost the first key which is the equivalent to them losing the Windows source code, then that would be okay, they could just start using the backup key." Crypto expert Marc Briceno did have another word for it: "feeble." "I must say I do not believe Microsoft's present explanation that the presence of the _NSAKEY corresponds to standard practices in software development," said Marc Briceno, director of the Smartcard Developer Association. (http://www.scard.org/) "There is no technical reason for Microsoft to include a second security module verification key in their operating system ... to mark the passing of export requirements," Briceno said. 6#Le Grand Finale (only for truely hardcore fanatics) Crypto AG: The NSA's Trojan Whore? http://caq.com/cryptogate ********* Don't loose the next episodes ... "While Alien Bill finish his Trojan2000, anonymnous sources that want to keep it that way, indeed had report from a trusted 3rd party the clame for the hack on http://www.trojan2000test.com/" the MP3 version is avaiable on the holly powerfull knowledge base www.antionline.com (tm) ********* Bacano (tm) Esoteric Pizza Research Team (tm) CopyThis8=> (c) 1999 Nom: Dwork~|·$!! modifsPodrías aprovecharte de la similaridad entre 'buffer' y 'butter' y decir algo así como 'be careful while doing it, as a butter overflow will render the sandwich useless (or disgusting)'... just an idea Nom: Bacano modifsPizza Dude Security Alert: hash overflow in Kitetoa Ham Sandwich 1. Introduction Almost my acident, while i was running tests on some 0day pizza source, i stuck in a hash overflow that makes me wonder if it works too with ham sandwiches. This was tested in the tradicional white bread enviroment, with a TN320 for pizza pasta. 2. Description By CPU is big enough (regarding Kitetoa original source) to run a whatever long ham with Pata Negra daemon, in my Pasta-UX. The problem was when adding some huge amount of tomato and butter on ham kernel, i got a hash overflow. I did a little ham traffic sniffer to look on quantum packets and had run it against the sandwich, and i have found that hash was given to the pig just before he turns into ham. Then, spoofing some .id e-mail address, i got into and account of JP knowledge base, and found out that it was a very well known pig. Joefry Pig had said to me that this was the first query on his database for this particular pig, and he was surprised because he allready had make some phone call to start this pig hunt, and that he was tould that all ham from this pig was allready out of the market for quiet some time. Was when i realise that JP wasnt aware of this hash overflow, cause he never use butter on ham, cause he likes the taste that way. On Kitetoa white paper, this was not possible to find because at the time he was with some lack of hash. 3. What Ham eaters must do Allways use fresh tomatos and butter, if you are using white bread and saulty ham, in your sandwich. Its important that the ham is kinda saulty, cause the hash head pig that provoce the overflow, dont use sault. (i can not release the source of this sault, without my trusted third parts approvall, sorry ...) 4. TDL (To do List) I did not test yet the smooth penetration as reported by Kitetoa, because with pig is better with some common hardcore penetration technics. I'll try it ASAP. Bacano (tm) Esoteric Pizza Research Team (tm) CopyThis8=> (c) 1999 |
Page d'accueil Nous écrire By mail Nous envoyer des commentaires By la page de le Feed-Back |
Nouveautés
et... |
Le Sommaire de Kitetoa (orientation...) Sommaire général du site |
Les
rubriques! Les
livres publiés par Kitetoa |
Les
rubriques! (suite) Les Let-R-s Des Images On s'en fout! KitEcout' KessTaVu? -KiteToile Voyages |
Les dossiers : Precision [ZataZ] Le monde fou des Admins Defcon Le hack le plus bizarre Guerre de l'info Convention contre la cyber-criminalité Hack |
Questionnaire visant à améliorer le contenu de ce site si c'est possible et pas trop compliqué |
Rechercher sur le site ...et sur le Net Des liens et D'autres choses du Ouèb |