Wednesday, April 23, 2014

Hacker Diaries Chapter 8

Rick Fleming got his knowledge about hacking changed this day. As a veteran air force intelligence operator, he worked on computer security  and intelligence programs. He also earned a master engineering about computers during his years of working. He is an amazing programmer and he was the best programmer you can scout. If he were to do something he wanted to do, he would hire H.D. Moore before anyone else did. He was always trying to scout new youth hackers and train them so they could be even better. When H.D. Moore came to his office, Fleming was surprised. All he saw was a teenager with a messed up haircut. and a sleek black jacket. When he arrived in CSC (Computer Sciences Corporation), he was very surprised.

Fleming approached an IRC with Moore in it. Real time conversations. That was what he really needed. He asked Moore if he wanted to work in the Air Force. Moore immediately went to his office. When he was interviewed by Fleming, Moore was nervous. Before Fleming asked Moore on what specific areas he excelled in, he first asked Moore on his experience in computing. Moore told Fleming that he got some references from big companies like Yahoo! and Microsoft. He told Fleming that two years earlier before the interview he reported Microsoft and Yahoo! about the holes in their security system. Microsoft and Yahoo! agreed and would stock Moore with more references whenever he applied to a job. It was also revealed that Moore wrote a program script and worked with the Navy 's project called Shadow.

Moore was at his youth; he could absorb even more information more easily and even better, he had professional experience with the Navies. Because there was a complicated system that filtered subtle probes and attacks against military, Moore got the current code base and rewrote large chunks so that the base could be deployed in a single computer config. Moore explained that the patterns in the security and with Nmap, hackers could easily track and map the entire internet. Moore also stated that he found some coordinated attacks. He also concluded that this could be a threat to the national security. In a few weeks time, the Pentagon was threatened with attacks directed from multiple locations around the world. They were using Nmap, an amazing tool that can help track hackers.

However, the threat was real. Moore's analysis about Nmap was 100% correct. People that used it were untraceable. Some attackers even sent more than 3 probes a day. After so much talking, Fleming hired the youngster. The fastest way to detect an Nmap scan was to use Perl (Read chapters 2-4 before if still dazed) script. The problem about hiring Moore was that he wants to incorporate himself. But behind that cocky, silent persona, what impressed Fleming the most was how Moore could speak so fastly and back up his mind with what he had. And that was just the beginning.

H.D. Moore was born in 1981, Hawaii. His parents were divorced and he was sent crashing down. He was a troublemaker at some primary schools; once he even got dumped out of school before he even stayed there for a week. His real name was H.D; his parents wanted a Hindu name for him. He often got picked because of his name. The first computer he messed around with was a computer designed by one of the greatest hackers to step foot in this world; Steve Wozniak. When he was in his tough school years (Years 5-7) he was completely out of control and not a very intelligent kid that knew a lot about computers. He wrote his own programs and all he really done was send computers crashing. A few years passed, and when H.D was in high school, he was a bright kid who knew a lot about computers. When H.D moved to California with his mom, he was dropped out of school. The first thing he did after being dropped out wasn't cry like a person that lost all his hope; instead, he logged on to his computer. He dedicated his life to it and it really paid off. Trojan softwares that he made, he sent to fellow work mates in his IRC.

H.D wanted to go to school again and he got to a school where he chose his subjects and he was free. He chose his subjects and had countless hours of free time. He was considered a good hacker and sometimes it takes a hacker to beat a hacker. When he worked in CSC, he did a lot of projects and got a lot of paperwork. He also dialed VPNs. Some projects that he did were classified. He was even told to make offensive hack tools. Some of his scripts and tools were really useful. He got a lot of dough for his work he produced. He was then head of his division. A few years later, H.D resigned to be a freelancer. Whenever he was needed by Fleming, he could come and this time, Fleming hired him when business was big. Most days, when H.D was working too hard, he got to have a break. He usually uses a black DefCon shirt to work . Fleming even considers H.D too smart as a hacker. "He is one of the best hackers this world will ever encounter" Felming said. "I would place him at the top 20 worldwide".

Tuesday, April 15, 2014

Hacker Diaries: Chapter 7

In this very day, Willie Gonzalez's life was about to change. He was the average teenager that you would meet. Willie was an innocent child that never wanted to know much about computers. But unfortunately, this happened.

Willie met a teenager messing with a computer and he was told to press a button. The teenager looked hooked up to the computer, but Willie didn't know what else he could've done, so he pressed enter. When he did so, Willie was warned that he was inside the U.S government computer system. He was shocked, but in shock, he was also interested and he decided to go deeper inside hacking.

 Willie's parents were divorced. He had a bad life as a teenager. His mother was poor and he needed to get a part time job to work. He got a new father and moved to Miami. Although it was much better in Miami, high school still sucked. It was very boring. He got a better life and he could buy softwares with his stepfather. When he entered a BBS, he found out that you could get expensive softwares for free.

Willie was a child that hated school. He especially hated typing lessons. He was bad at them, so he went the easy way in. He hacked into a teacher's account and made him pass all the assignments. He got to change his score because he had unlimited access to admin accounts. he still hates school although he could find some tricks to get good grades, and that is by cheating.

When Willie was playing a game at home, his neighbor, called Kryp was a good friend of his. Their parents knew each other and that was when Kryp visited Willie to play a game. Willie was happy he got a friend to play with. Willie thought him on how the game works and all the logic behind the game. He really like How Kryp acted and that was why he thought Kryp. Kryp was intelligent and knew how the game worked, so he was caught up in Willie's hacking bait.

When Willie was 18, his mom was worried about him hacking and was afraid that he would get in some serious problem with the FBI or a big association. Willie didn't mind and he just kept on hacking. Today, Willie will hack himself to jail. Straight to jail by hacking a lot of companies, but not defacing them. He got the FBI curious but that didn't stop him.

A year had just passed. Willie was 19 and now he's got a job in a local Miami company. They didn't know Willie was a hacker, so Willie disguised as a technician and said that he had to fix the computer. Instead he just used the admin computer, opened command prompt, and destroyed files. He shook with the CEO after that and he had free lunch after job applying.

Willie met Kryp in Taco Bell. They had a good time together, they chat, and they shared some laughs. This thing they did they called a DP run, Dr. Pepper run, was a weekly thing. One week, Kryp asked Willie "Willie, are you a hacker?" Willie was surprised and told Kryp "Yes I am, Kryp. As a matter of fact, I have hacked hundreds of websites. Hacking is not bad. It is the person that is good or bad." That was the first time Willie explained about hacking. After a few DP runs with different teens, Kryp was asked the same question and answered just like his mentor.

Tuesday, April 8, 2014

Hacker Diaries Chapter 6

It was unfamiliar for hackers. In DefCon, there were more well dressed people. A girl, Anna Moore just won an award. She was an intelligent child which learnt about DOS since she was 3. It was the conflict when AT&T crashed but for Anna, she learned programming. The internet was introduced to her when she was nine. She labels herself as a computer nerd. When it was 1996, she joined an IRC. It was when there were gangs in servers, banning everyone they want to. Those times were called nuking. It was when the IRC were at war.

Anna took a new online name 'Starla Pureheart'. She learnt to phreak phones the old fashioned way. She attempted to hack and described hacking as learning to dance in a body suit. She said that windows had a weak security system. She went deeper inside hacking when her dad got her a book to hack linux. She learnt the programming language 'C' and it was one of her favorite. When Anna's mom heard about 2600, it attracted her. But in her state, Oklahoma, it was inactive. The next time she tried to join 2600 was successful. She didn't get good information though. In 2600, they were asked if they wanted to join DefCon. She wanted to join but she needed to pay. Anna sold a Pokemon game, a Backstreet Boys CD, and a Mario 64 game. The money was raised and she could go.

In DefCon, the hotel they stayed in needed repairs. When they were to register, there were two registration lines; the white hat and the black hat. Defcon was what they expected; laughter, seriousness, and hacking. Anna really enjoyed it. Despite not being famous, Defcon kept in shape. In a mayhem, the third day, Anna has won the CyberEthicalSurfivor Contest. Everyone was impressed. Defcon was impressed. Anna was let to communicate with her father through email. Hacking, was a real passion. she went to university and took more courses.

Thursday, April 3, 2014

Hacker Diaries Chapter 5

After 9/11, Congress grated federal law enforcement authorities sweeping new powers to play with phones and track terror seekers on the move. It was a hacker's dream come true. Exactly 11 weeks after 9/11, the infamous hacker gang World of Hell, found by Cowhead200. Its members were found all over the world. They defaced hundreds of websites at a time. The numbers of websites that they 'owned' were really many. They included private companies and military organizations. When the federal agents checked his room, it wasn't much like a bedroom. It looked more like a hacking lab and a technology center. There were many computers that were the best ones in that era. He also had a guitar to go with him.

WorldOfHell first struck a South Korean manufacturer of power amplifiers. Actually Cowhead did. WorldOfHell's first debut was a porn site, and they wanted to be feared. People in their IRC server thought that they were just script kiddie wannabies. On March 25, they started a mass defacement and defaced more than 200 sites. By the end of the month, they got 13 experienced members and defaced all over the world. By June, a new member called RaFa joined. He was loud, and was the person that bragged most. He was born in 1984, somwhere in Middle-America. He was the smart student that got good grades in  High School. He also like graphic arts, that's why he called himself RaFa, after the painter Raphael. In the group, no one cared about him and the major guys like Cowhead would ignore him.

The group taunted everyone about their system and defaced the links anyway. Another member joined, and he was FoneTone. He was a good script writer and he also was humorous. He hacked five times a week, and that was the least he'd do. WoH's Kr0n said that highschool teachers were stupid and don't know anything about computers. They have successfully changed the definition of hacking, and now they are no longer pictured as nerds. Every website they defaced would say that the admin just got owned. January 15 was the end of WoH. To me, they were just a normal IRC server but they cost the net a lot. Their future is almost gone. It is not very well managed. No offense, but for the fans of this particular story, it was the most boring.

Tuesday, April 1, 2014

The Hacker Diaries Chapter 4

So, the next chapter is again a completely different story. It is about two hacking brothers. One is angry with Christianity, that one's called Pr0metheus. The other one, was just angry. He is Explotion. No matter what you think, all hackers and script kiddies have unique stories to tell. It explains why one teenage hacker wants to be The Devil's Advocate while the other is thinking what type of hacker he should be. This is not explained in the book, but there must be something that makes the hacker do this. Maybe they have no friends, maybe they have family problems, or maybe they have their personal problems. To me, not all hackers could be blamed for what they have done. There must be a sadder story behind it.

Pr0metheus, Satan's hacker, targets Christian websites to corrupt. The first thing he will need to start his onslaught is a list of victims to be terminated. A list of sites. He went to, and with the keyword 'Church' and 'Holycross' he found over 2,000 servers and websites to terminate. Everyone knows that you can't mutilate 2,000 websites in a night. To narrow this out, Pr0metheus modified the Perl (Practical Extraction and Report) which is used to process text. With the script, Pr0metheus defaced all holy writings and turned them to devilish ones. Pr0metheus is a worshiper of Satan; and he is on the internet, striking holy sites. When he's done putting all the devilish writings, he leaves a name card with his email to make his personal things more puzzling. After he is done defacing a website, he leaves Satan's symbol in it. On November 30, 2001, the Archdiocese of Baltimore issues that a hacking group called 'Hacking by Satan' has just emerged, and announces that no one is safe.

From now, we'll just call him Prometheus instead of Pr0metheus, its less complicated. Ok, and so, Prometheus started hacking since he was 14. He thought that C and Pascal :) programming were too boring but at least still better than school. When Prometheus turned fifteen, it was his birthday and he got to choose his religion. It was certainly no doubt that he chose Satanism. He started to become a Satanist when he read the bible of Satan. He said that he was really interested in it and his life felt like it just started. Satanism was the sart of his maniacal Holy demolishing. Hacking for Satan wasn't his first group. He joined a group with Poisonbox in it and his attacks directed on mostly DISAs. Prometheus then taunted system admins about their lack of security and dumped a picture of Anton LaVey, the writer of The Satan Bible. Prometheus was starting to get bored with Poisonbox and decided to gt a move on with life. He defaced a Christian school site and dumped a few letters then an upside down cross. If you count Prometheus' victims, there are 56 and counting.

Prometheus never steals credit card data, so the press don't have anything to charge him with. He always backs up original files and never destroy data on servers. He doesn't plan to stop hacking; in fact he plans to make his group grow. He said that he hacked sites not to brag, but to promote Satanism. From this angle, you can tell that he has a lot of problems. Prometheus studies in school about computer technology. Recently, we haven't heard from him.

Explosion, is a pissed of teenager, who puts charges on everyone, but not particularly anybody. He is a well educated hacker, and a quite good one too. What he really wants to do is corrupt the minds of children. Born and raised in Calif, he was the victim of a divorce. He was a good friend, and a better hacker. One day, he found a gap in the email and with the right skills, you can hack into it. In High School, he wasn't a popular kid, but doesn't get annoyed a lot. His school provides technology and unlike his old school, this one was very free. He could do just about anything he wants. A few months after his junior years, his mom died and he met a friend with his interest. He could use the computer in his friend's house just by talking his way in.

It's October 2001, and he got himself and his friend a job. He still hates people, but starts to blend with the environment. Now, Explotion is a much better person. He works as a chief technology officer in a small company in California. He works by himself where he doesn't get bothered easily. He likes his job but he would much rather hack. His assistant liked a band, and it made a poll for which song was best. Explotion made a short yet complicated script, called PHP (Hypertext Preprocessor). He wanted the song he picked to get a lot of votes, and this script looped, so every time the program stopped running, it ran again. The script was amazing. Not only he hijacked polls, but he also arranged the poll. He added songs, and put songs that the band cut from their album in the poll.People in his IRC server (Read Introduction if need more explanation) suggested him to put in vulgar and obscene titles that didn't even exist. What Explotion wanted to do was tell the band that they shouldn't have cut the songs, not to corrupt the band. It is now told that Explotion is a better person, but for me, he fights for what's good inside.

If there is unclear information about IRC, go here:

The Hacker Diaries is a compilation of hacking stories that was written by Dan Verton. All rights and respect go to him.