[HN Gopher] Black Hat Exploits of the Stupid-Easy 80s
___________________________________________________________________
 
Black Hat Exploits of the Stupid-Easy 80s
 
Author : mad_ned
Score  : 144 points
Date   : 2021-06-30 12:44 UTC (10 hours ago)
 
web link (madned.substack.com)
w3m dump (madned.substack.com)
 
| pcdoodle wrote:
| AOL
| 
| Win32 API and VB6 Subclassing. Open random chatrooms, collect all
| the screen names. Go to school. Computer dials AOL while parents
| at work. Tries Screen Names as password. 3 attempts before AOL
| Hangs up. Redials and tries next set of 3. Come home from school.
| Fresh Screen Names. Free AOL. Terrorize Hanson Chat Room with
|  Instant Message. _Everyone has
| left the chat_
 
| geocrasher wrote:
| Early 90's Southern California. I was about 15 and had been
| teaching myself Borland Turbo C++ at home with the SAMS book. At
| school, there was a room in the Library with about 20 386sx/16's
| that were used to teach kids... Borland TC++. The teacher?
| Another student who was good at programming. I didn't know him,
| but he had a reputation for being egotistical. My friend and I
| just went in there at lunch to play QBasic games, which I'd
| modify a bit for more fun.
| 
| One day I decided to mess with the egotistical teen teacher. I
| wrote a little TC++ program that ran from autoexec.bat. On
| bootup, it put out several seconds of a low frequency buzz from
| the PC speaker and then printed "Oh, Excuse me! I couldn't
| contain myself!" and then disappeared. At that point, the
| autoexec.bat removed the binary and then overwrite the old
| autoexec.bat over itself, removing any proof.
| 
| Nobody could say it was me, but the Librarian knew and said if I
| did it again I wouldn't be able to go back. But she also said he
| was really pissed by it and I get the feeling she got a kick out
| of it, too.
 
  | JeremyReimer wrote:
  | You reminded me of a time in high school when I worked for the
  | local library. The librarian had a perverse habit of closing
  | the windows in the back room during the summer, making it
  | unbearably hot. My mother, who worked there full-time as the
  | Children's Librarian--the Librarian's direct subordinate--told
  | me that during winter this woman would open up the windows and
  | make everyone freeze.
  | 
  | So while I worked on a program in FoxPro to automatically print
  | out new catalog cards, I also wrote a small program in
  | QuickBasic to print out (depending on the time of year) a
  | message saying "OPEN THE WINDOW!" or "CLOSE THE WINDOW!" (the
  | latter signed by "The Frozen Ghost") and then pause the
  | computer for a good minute or so just to make sure somebody
  | read it.
  | 
  | For good measure, I made the AUTOEXEC.BAT file and my program
  | read-only, and then deleted ATTRIB.EXE from the hard disk so
  | that it would at least be somewhat annoying to remove.
  | 
  | Years later I got a call from an IT tech who wanted to ask me
  | some questions about DOS (he never specifically said why!) and
  | I feigned ignorance. It felt good.
 
| at_a_remove wrote:
| I mean, there _was_ security, it 's just that most of the holes
| were so big you could drive a bus through, honking and dragging a
| bunch of rusty bikes.
| 
| I have walked onto MUDs and, annoyed at being killed by some
| wizard for saying "hi," (stupid n00b move on my part) figured out
| how to bring the game to a screeching halt in about fifteen
| minutes. They had to bring it all down and patch to make me go
| away. This wasn't a testament to my ability, it's just that
| nobody was _thinking_ about this stuff in a defensive way.
| 
| Oh, your system won't let me email that file out, you'll just
| return it to me? Well, lemme just forge my send from so you give
| it to me anyway.
| 
| I got up to a lot of horsing around, almost all of it non-
| destructive because getting attention generally is not a great
| thing and it wasn't my stuff, I just wanted to see what was out
| there and you either had to hear about it from someone who knew
| it already or you had to stumble across it.
 
| BrandoElFollito wrote:
| Early 90's, university. I tricked the administrator of the UNIX
| cluster to "su" from my account.
| 
| The su binary was mine, she typed the root password and the
| cluster was mine.
| 
| I went to the administrators to say that I cracked the system and
| would like to be part of the administrators team. I was accepted.
| 
| I learned an awful lot over the next few years (as a student, and
| then as a PhD student) - this helped me to land a job at IBM, and
| then at another company that was expanding in Europe.
 
  | a1369209993 wrote:
  | > I went to the administrators to say that I cracked the system
  | and would like to be part of the administrators team. I was
  | accepted.
  | 
  | See, this? This is how school computer systems are supposed to
  | work.
 
| ddingus wrote:
| The 80's
| 
| This piece brought a few memories and impressions forward.
| 
| One was hacking ULTIMA 2 and 3. Copy protection involved the bad
| sector technique. However, those programs did not do an in depth
| error check. Atari machines made a beep on each disk sector read.
| 
| To play a copy of the game, one just counted the beeps, open the
| drive door, wait for the error sound (how handy is all that?),
| then close the door and carry on.
| 
| Chain smoking... all through primary and most of high school, the
| teachers lounges were filled with tobacco smoke. To their credit,
| the educators did not reek in class, well one did, but those
| areas of the building did.
| 
| All grades were old school analog, in the grade book, in pen.
| Changes were done with a strike through, new value, initial.
| 
| One of my peers wrote a book report program in BASIC that would
| generate a fairly healthy set of variations. The seed was a wait
| for input loop. Was double digit report success before there were
| questions.
| 
| Someone plugged an expansion card into a running Apple ][
| computer and killed it. Despite a dead CPU, it displayed video
| anyway. Was my first real experience with simple hardware vs
| custom chips. Those computers did not have the spiffy sprites,
| colors and sounds the C64 and Atari machines had, but they did
| have just enough of the things that really mattered when it came
| down to getting real work done. Someone looked the machine over,
| plugged in a replacement chip and it was running again. Nice.
| 
| At the local university there was a card operated photo copy
| machine. 5 cents a page or something like that. But, one could
| ask for a copy, and listen for a little wine as some part began
| to spin up, hit eject on the card and get a free page.
| 
| Most locked doors in my primary school could be opened with just
| hand manipulation of the doorknob. Turns out they were not
| mounted in their recommended orientation. A gravity based attack
| was possible and I found it one day bored just fiddling with the
| knob. Turns out, the more I moved it, the more motion was
| possible!
| 
| Reporting that got me into trouble too. I remember that clearly!
| 
| Of course they were angry at the doors being so easy, tried to
| assign blame to me, a 6th grader, amd were more concerned about
| the work and cost to fix the issue.
| 
| If only people would just avoid doing anything unexpected, there
| would not be a problem. In fact, there was not a problem, until
| you came along...
| 
| I remember looks on adult faces I did not see often when my
| response was, "How would you know?"
| 
| Some foreshadowing there for sure.
| 
| Heck, I even did responsible disclosure. Took it right to them
| first. Could have blabbed it to others and then what?
| 
| Yeah, got the look again.
| 
| One phone related one was super interesting too. A friend and I
| took an old pulse dial phone apart and were kind of stunned to
| see how simple it was. Then we made calls successfully without
| the dialer, just slapping the handset hook with anything close to
| the expected pulse rate. Cool.
| 
| Then we called one another and were doing it again, just
| interrupting one another. Soon, an operator was on the line
| asking how we did this call. So we told her.
| 
| Turns out we had dialed some test sequence or other. Of course it
| was not published and was not intended for use doing an actual,
| live call. Tech had to reset the whole thing, but we did get a
| super cool tour of the system later as that same tech was happy
| to show us how the robot like, electromechanical system worked.
| Amazing. These trees of open circuits! When one dialed a number,
| that number was an address that literally moved an rotated arms
| that closed the circuit to connect the intended phones!
| 
| Fun times. So much was human scale and could be directly seen,
| heard, felt and was slow enough to be explored directly.
 
| teknopaul wrote:
| seems like bragging about is still the number one way to get
| caught.
 
| Bluecobra wrote:
| > (Also worth mentioning: everyone's assigned password was their
| social security number!)
| 
| My student ID in college was my SSN, and that was only 20 years
| ago. :(
 
| tptacek wrote:
| This is a fun post. It's sort of mind-blowing to think about in
| the era of 15 page Project Zero posts about reverse engineering
| nested AMD SVM virtualization control blocks, but throughout much
| of the 1990s, the modal vector for an actual hacker taking over a
| network --- any network --- was simply by mounting a world-
| exposed NFS share. Leendert van Doorn's NFS shell was probably
| the most important hacking tool of that entire decade.
 
| mikewarot wrote:
| I was a young CS student, and the VAX administrators had written
| a program called SETUIC to work around some limitations on
| hardware to allow business students access to an IBM mainframe.
| 
| If you ran SETUIC with no parameters, it set your UIC to [0,0],
| silently. _Anyone_ , not just business students, could run it.
| The system environment variables pointed to it, like a big
| advertisement sign to a young CS student.
| 
| I learned many things about how the world works after
| accidentally discovering this fact. It is fortunate for me that a
| 2 year suspension was the extent of my punishment. They were
| hopping mad, not at my actions, but at those who I was foolish
| enough to share this knowledge with, and had acted far less
| conservatively than I had.
| 
| I later was a system administrator, elsewhere, for 15 years.
 
| api wrote:
| My friends and I "hacked" AT&T System 75 and similar PBX (intra-
| office phone system) machines in the early 1990s for various
| reasons, and they were easy to get into because they came loaded
| with like 20 default admin accounts.
| 
| I remember a few of these: "cust/custpw", "rcust/rcustpw", and
| "craft/craftpw" come to mind. Almost nobody removed or changed
| the password to these accounts.
| 
| We'd find the machines using a "wardialer" (named after the phone
| scanning scene in Wargames) app that would dial every number and
| look for modems. We used a DOS scanner called "ToneLoc." We lived
| in Cincinnati and could easily scan all kinds of local number
| prefixes for free that overlapped with areas that were likely to
| dredge up a rich PBX haul: downtown, near the airport, near
| universities, etc. A certain kind of weird 1200-bps answer with
| unusual parity settings (7E1 if I remember correctly) was a dead
| giveaway for one of these ridiculously vulnerable AT&T PBX
| machines.
| 
| Once you got in you could pull pranks, set up remote access lines
| to get "free" phone calls, set up party lines for you and your
| friends, etc.
| 
| I was like 14 or 15 at the time.
| 
| We also found other "phun" things with our wardialer including
| large outdoor signs with modems to allow remote configuration of
| the text they would display. If you saw "SMOKE POT EVERY DAY" and
| similar things a 15 year old would write on a highway or
| advertising sign in Cincinnati in the early 1990s that was us.
| 
| There was a real sense of exploration back then. When we scanned
| areas like downtown Cincinnati we'd find tons and tons of modems
| that would answer with mysterious (to us) prompts or blobs of
| binary spew that I'm sure represented protocols we didn't know
| how to emulate. A few times we managed to try obvious-sounding
| login/password pairs on some of these login prompts and find
| ourselves inside an Ultrix or a SunOS machine full of mysterious
| data. We really didn't bother anything on those machines, just
| looked around. We pulled pranks with things like signs but the
| only things we really ever messed with or possibly damaged were
| the PBXes. There were just too many fun things to do with those.
| 
| The weirdest thing I remember finding was something that
| initiated an Xmodem transfer and sent a black empty pixmap and
| then hung up. I wonder if it was some kind of camera or
| industrial monitor that was not actually working but was still
| on.
| 
| The most "alarming" thing we found was some kind of building
| controller that we assumed belonged to a downtown skyscraper and
| seemed to control elevators, which we didn't fuck with out of
| concern that it could actually hurt people. Don't know if you
| could have done anything dangerous with it but we didn't want to
| try so we just dropped that one.
| 
| There just wasn't a lot of security back then because it was all
| new and very few people knew how to do what we were doing. Even
| though Wargames popularized the idea of phone scanning people
| still seemed to assume that a live modem on a phone line was
| secure if the number was obscure.
| 
| All that started changing really rapidly in the late 1990s when
| tons of people got online.
| 
| Edit: found the scanner!
| 
| https://en.wikipedia.org/wiki/ToneLoc
| 
| https://archive.org/details/20040130-bbs-mthreat
 
  | passwordreset wrote:
  | SWIM once said to me: Funny thing about those System 75's, the
  | entire ordeal originated from the hack of a bank's telephone
  | system, who had a small Unix UUCP network and, for some odd
  | reason, put all their System 75 logins and passwords into their
  | Systems file. The default login information leaked out after a
  | hacker named Syadasti announced that he was willing to turn any
  | System 75's given to him into usable remote PBXes, and
  | eventually some other hacker (Scott Simpson, maybe? don't know)
  | set up a system on his own home line that responded like a
  | System 75 would, and gave Syadasti that number. He promptly
  | tried to login with the cust/rcust accounts, which were
  | recorded by the other hacker, which led to the explosion of
  | System 75 hacks throughout the US.
 
| tyingq wrote:
| Shared computer labs were dead easy to scrape account info from.
| Since the terminals were text, it was easy to code up a password
| scraper. You write a program that faked the login and password
| prompts, record the data, say "password incorrect", then exit, at
| which point the real login daemon would take over. Cliff Stoll's
| "The Cuckoo's Egg" describes this pretty well.
 
| [deleted]
 
| colordrops wrote:
| The easiest exploit I can recall (late 80s? Early 90s?) was
| getting credit card numbers from tossed receipts at gas station
| pumps.
 
  | 29athrowaway wrote:
  | Initially there was no validation for credit cards. There were
  | programs called credit card generators that could generate a
  | card from any bank in the world, with any name on card, etc.
  | 
  | If you wanted you could generate a card for McLovin from some
  | bank in Hawaii and it would work.
  | 
  | I never used them but a close friend back in middle school did
  | and got his computer taken away permanently.
 
    | edmundsauto wrote:
    | This was a checksum that machines could run locally, to make
    | sure the account # was "valid". Then, in batch, systems would
    | connect to the bank for the account interaction.
    | 
    | Some services (AOL, when it charged by the minute) wouldnt do
    | the actual bank reconciliation for a few days, during which
    | you could use the service.
 
  | bluedino wrote:
  | You could get the whole carbon from a counter at a department
  | store if the cashier wasn't around.
 
    | sgerenser wrote:
    | I worked at Sears selling TVs while in college from 2002-04,
    | and even in their latest POS systems anyone could walk up to
    | the thermal printer, press a button (even with the register
    | itself locked) and print out a reverse-chronological "journal
    | roll," which included names, addresses, phone numbers and
    | full credit card numbers and expiration dates for every
    | transaction. Crazy that anyone thought that was OK in the
    | early 2000s.
 
  | failwhaleshark wrote:
  | Before carbonless, the carbon slips between the layers. There
  | were up to 4 additional copies make on some of those kinds of
  | forms and you'd have to press very hard with a ballpoint pen in
  | order to get it to register at the bottom. Then, the credit
  | card imprinter had to press the card to get through them.
  | 
  | Since most cards don't have raised numbers anymore, manual
  | credit card imprinting is no longer possible.
 
  | irscott wrote:
  | You used to be able to Google for transaction information from
  | a particular e commerce shopping cart and get .txts of credit
  | card info, name, address. The wild west was wild.
 
| Trias11 wrote:
| You could browse all files on many remote computers via:
| 
| net use \\\123.45.6.78\
| 
| dir \\\123.45.6.78\
 
| spullara wrote:
| I've been thinking about writing up a similar post focused on all
| the dumb stuff that was possible in the 80s. Everything from
| default voice mail passwords, long distance carriers with
| predictable code patterns, office phone systems that tell you as
| soon as you have a wrong digit for outside line access, DECs own
| global asset management system having a huge security hole in it,
| etc. Honestly though you can just read the first half of
| Mitnick's book up until the point he starts breaking into actual
| buildings to get a feel for it. Social engineering was and will
| remain the most powerful tool in the hacking arsenal.
 
  | 300bps wrote:
  | _long distance carriers with predictable code patterns_
  | 
  | Thank god for statutes of limitations. Sorry MCI and Sprint for
  | getting about 20 codes per night with my 300 baud modem when I
  | was 13.
 
| leifg wrote:
| I still remember when Windows computers beging hooked up to a
| dial up would be open on the internet. Lots of them had no admin
| password and all drives where shared by default.
| 
| So by just port scanning on the SMB port you'll find a lot of
| computers and would have access to all their files.
 
  | arminiusreturns wrote:
  | Man I stumbled on some crazy stuff back then when doing scans,
  | one of the more notable was finding and ISP billing system with
  | it's C drive shared over netbios (137/138). It was such the
  | wild west days of the internet.
  | 
  | Stuff like: I got in the local newpaper for recovering a county
  | server password that had been lost... cracks me up in
  | retrospect.
 
  | AnimalMuppet wrote:
  | With a cable modem, you were on the same physical cable as your
  | neighbors. If you looked at "Network Neighborhood", you would
  | see your neighbors' computers and printers (unless they had
  | turned off file and print sharing).
 
    | bluedino wrote:
    | Fire up Ettercap and read unencrypted AIM conversations...
 
    | thedougd wrote:
    | Ah yes, I had forgotten about this. Routers and access points
    | weren't yet a consumer item.
 
| MeinBlutIstBlau wrote:
| The typical 80's hack I always think of is in Ferris Buellers Day
| Off where Ferris hacks the schools records to change the number
| of days he was sick. Not only was there no internet, but how did
| he connect to the network? It's something I've always wondered if
| it would've even been possible.
 
  | kgwxd wrote:
  | He learned a lot while hacking the WOPR.
 
  | pjmlp wrote:
  | Here are modems for Timex 2068,
  | https://www.timexsinclair.com/products/hardware/rs232-serial...
 
  | mad_ned wrote:
  | possible, maybe not likely. our school for instance had a modem
  | line you could dial into, that let you access this one program
  | that was for career counseling, it was like a buzzfeed quiz
  | that asked you questions, and then recommended a career for
  | you. I think I got plumber. we tried to hack past this to get
  | at the general OS, but no luck. I suppose someone could set
  | something like that up for the school record access, but would
  | they? (like I claim in the article, it was the 80s so maybe)
 
  | dave_sullivan wrote:
  | I had a project one time for a school district and had access
  | to all of that. Made me think of the "changing grades remotely"
  | trope and had a pretty good chuckle. Wouldn't have been
  | possible when I was a kid but it is now I guess.
 
  | bluedino wrote:
  | Early 90's, but our computer system (some sort of minicomputer)
  | had a modem bank so that teachers could do grades and such from
  | home. I worked in the office because I had an open hour, I
  | earned a credit and I also got to see the guidance counselors
  | view students records and such. It would have been very, very
  | easy to change grades.
  | 
  | Also, many schools had internet connections back then. I know
  | our school had a T1, it might have also had a leased line to
  | the state education system for some reason, I would guess the
  | security was very lax back then.
 
  | dragontamer wrote:
  | > Not only was there no internet, but how did he connect to the
  | network?
  | 
  | Most "networks" were over phone lines those days.
  | 
  | You call in with a modem, and that connects you into a
  | particular computer (or in the general case: a network). BBS
  | for example was just a shared computer on a modem on a well-
  | known publicly posted telephone number that many people called
  | every now and then to check for message.
  | 
  | If you knew the correct telephone numbers and the proper
  | parameters to connect (baud rate, modem type, etc. etc.), you
  | could even get a printer (aka: Fax Machine), a UNIX login
  | prompt, or other equipment inside of an office (and presumably
  | a school).
  | 
  | ----
  | 
  | Now why would a school put their grades database on a publicly
  | facing telephone number and hope it doesn't get hacked? Well,
  | that's a good question.
  | 
  | But then again, ATM machines in tiny liquor stores are still
  | largely on this telephone-line / modem technology (I dunno if
  | its still like this today, but even just 10 years ago, a
  | surprising number of ATM machines were still accessible over
  | dial up). So why don't you ask the ATM machine engineers why
  | they think that this practice is safe.
  | 
  | After all, if its safe enough for ATMs, its probably safe
  | enough for a school network. If this thought process is
  | horrifying to you, then welcome to the 80s / 90s era of
  | computer security.
 
    | kQq9oHeAz6wLLS wrote:
    | > Now why would a school put their grades database on a
    | publicly facing telephone number and hope it doesn't get
    | hacked?
    | 
    | Same folks who built David Lightman's school system,
    | apparently.
 
    | goalieca wrote:
    | My high school had the attendance computer in main office and
    | it could be found on the network from any other machine.
    | Everyone knew the password to it since was used and shared
    | for all other admin and IT tasks.
 
  | kmeisthax wrote:
  | This concept is a little weird to think about today, but the
  | Internet used to be accessed through regular voice phone lines.
  | You'd plug your computer into the phone network with a little
  | thing called a modem. In the _really_ early days you actually
  | had to use an acoustic coupler for regulatory reasons. Then you
  | dialed the phone number of the computer you wanted to connect
  | to - most of which were _not_ running the Internet Protocol!
  | 
  | Typical computer systems you would dial into would include...
  | 
  | 1. Proprietary data services (AOL, Compuserve, etc)
  | 
  | 2. BBS systems - typically individual computers running
  | services that let you send messages or files to other users who
  | could then dial in to receive them. Some BBSes were even
  | networked to one another, the largest of such systems being
  | Fidonet
  | 
  | 3. Remotely-managed IT equipment - the sort of thing depicted
  | in the movie.
  | 
  | 4. Mainframes - universities and large businesses would often
  | have remote access that you'd dial into. This is roughly
  | equivalent to SSHing into an Internet-connected machine today.
  | 
  | 5. The Internet - originally only through remote access to
  | mainframes (#4). Later on, data services (#1) started offering
  | open Internet access. (notoriously, AOL utterly demolished
  | USENET's existing cultural norms by doing this) Then companies
  | started just selling dial-in Internet access without other
  | services and this became the dominant use case for modems.
  | 
  | This concept was inverted starting in the late 90s. First,
  | phone companies started offering "digital subscriber lines"
  | (DSL) that provided way more bandwidth to connect to an ISP
  | with. Then, (at least in North America, thanks to various Sega
  | Genesis related reasons) cable companies got in on this and
  | started offering "broadband Internet", too. With the greater
  | bandwidth of these services, it suddenly made sense to send
  | Voice over Internet Protocol (VoIP) instead of Internet
  | Protocol over Voice. So dedicated landline channels became very
  | outdated _very quickly_ , and today we think of voice as just
  | something you send over a multitude of Internet apps.
 
    | bluedino wrote:
    | Don't forget about your dialing into your office computer to
    | work from home, using something like LapLink or PC Anywhere
 
  | CountDrewku wrote:
  | Watch War Games and that'll give you a general overview of how
  | you'd access a system back in the 80s. They were still
  | networked and accessible remotely, just not the way they are
  | today.
 
| ulzeraj wrote:
| Very cool stories. I remember running some pranks but those are
| all from the early 2000s.
| 
| Best story I remember there was this arrogant guy that worked
| with on the Unix department. He was into FreeBSD by that time and
| had an attitude towards the Linux guys. One day he left his table
| and forgot his machine open with a root prompt. They took the
| chance and modified inetd.conf to map a certain port to the
| shutdown program. People had so much fun shutting down his
| computer remotely and watching his reaction.
| 
| There was also this time working for a smaller company and we
| would prank each other all the time. I had admin access to the
| Linux router so I've created a NAT rule to redirect this guy's
| traffic to a transparent squid proxy running a perl script that
| relied on imagemagik to turn the images upside down. Got the
| script from a Slashdot post. Poor guy even tried to reinstall the
| OS to no avail. He eventually found out and had his revenge by
| going into my computer CMOS and setting disk access to PIO
| instead of DMA.
| 
| I also remember scaring people through Windows' net send commands
| and that one where you take a screenshot of the desktop then you
| remove all the icons and interface bars and set the screenshot as
| background image. Also randomly adding 'alias ls=exit' to some
| server /etc/profile.
 
  | jonshariat wrote:
  | Not a programmer but lots of good memories doing the background
  | trick by hand. Good times.
 
| 29athrowaway wrote:
| A highly recommended text file, enjoy:
| 
| Anatomy of a pirate
| 
| http://www.textfiles.com/piracy/anatomy.txt
 
| tobinfricke wrote:
| When the web was new, one could use Altavista to search for
| /etc/passwd files accidentally exposed to the web, and crack
| them. Even better, many *nix machines shipped with some accounts
| having no password by default. I remember one could easily telnet
| into almost any SGI Irix machine via the "lp" account.
 
| jamal-kumar wrote:
| Back in the mid-2000s I was really into computer security (still
| am) and managed to trick my school's truancy system using
| something called a silent termination test line. Basically what
| this does is cuts out the line entirely to test for line noise
| for a few minutes, like you pick up the phone and it'll still be
| connected to that number, no dial tone just silence. I just
| confidently went right up to the secretary and told her my new
| home phone number was the silent termination test line. There
| would be this automated truancy bot calling everyone but whenever
| it would reach my name, skipping around a class a day at one
| point (Still don't know how I actually graduated other than the
| teachers liking me and getting my homework done anyways), it
| would just fuck the entire system up and a bunch of people
| wouldn't get calls after me either.
| 
| Smoking drugs and hanging out with girls was way funner,
| completely zero regrets getting doing stuff like that out of my
| system early... considering the trajectory my life has been on I
| really didn't need post secondary. Can only imagine how stressful
| and expensive that would have been and to what depressing,
| indebted end.
| 
| There was a bunch of other fun stuff on that test prefix, but
| half of that is lost to the sands of time, the funnest I don't
| even know what the hell it was. I've asked random phone company
| linemen about it and they're basically just like "how the hell do
| you even know anything about this?", and can't tell me what this
| number I found was. I basically war-dialed it based on patterns
| from other numbers on the prefix and it'd give me 30 seconds and
| then a real dial tone (payphones around then actually used some
| recorded tone). Since I could call these numbers for free from
| the school payphone, it was easy to find, and that real dial tone
| was probably in the phone company HQ. We found this enormous list
| of interesting phone numbers from phonelosers.org (Wish those
| were archived!) and just started doing shit like calling the
| white house and the president of kenya's office. I think we only
| stopped after a friend of mine made a huge stupid mistake and
| tried to print the list out. The library printer just started
| spitting out REAMS of paper, the librarian was like what the hell
| and I just remember thinking damn he fucked up, and running away
| hahaha
 
  | techrat wrote:
  | Web archive goes back to 1997...
  | 
  | http://web.archive.org/web/19990125102138/http://www.phonelo...
 
    | jamal-kumar wrote:
    | I don't know if I have time to dig through all of that with
    | th interspersed broken links but I am pretty sure it was on
    | phonelosers.com which was their forum
    | 
    | Still thanks for the link I haven't seen this in ages
    | 
    | I think RBCP went to jail at some point
    | 
    | The closest thing I can find on google is a really old
    | version from 1995:
    | http://www.textfiles.com/groups/PHONELOSERS/pla007.txt But
    | the thing got HUGE over like a decade
 
| thedougd wrote:
| Some fun ones:
| 
| BBS games started adding virtual currency that you could transfer
| between players. Some even participated in a network of BBS
| systems, allowing the movement of game currency from one BBS to
| another. These frequently didn't have input validation and you
| could transfer -1 to another player and they'd receive 4294967296
| dollars. Unfortunately we were kids and kids do nasty things. We
| would completely upend a competitive game by giving all the
| underdogs huge wealth.
| 
| Pager numbers all fell in the same exchanges. Every number under
| 123-456-xxxx would be a pager. I wrote a program to war dial all
| these and leave the same victim's phone number on all the pagers.
| We did it to a friend and witnessed an endless stream of
| frustrated calls to their house for a few hours. Brutal.
| 
| A school system put their mechanical control systems on a modem.
| We acquired the software and directory that could access these
| control systems. Not only did they put all the HVAC systems on
| it, they also added things like emergency and off-hour lighting.
| Some of the stuff that was controllable through this remote
| interface was down right scary: boiler pressure measurements,
| boiler system valves, etc. We weren't stupid enough to mess with
| that but would have fun turning off all the lights at night, or
| turning up the heat before the Saturday morning recreation
| basketball games in the gym.
 
  | brk wrote:
  | I remember using odd/unprintable characters in those BBS games
  | for my username. There was one (spacewars?) where you got a
  | bounty, but had to type in the characters name to claim the
  | bounty, people would complain they could not collect the bounty
  | against me, as my name was basically brk[null character].
 
| reid wrote:
| My high school in 2003 used IBM PCs with Windows NT. I discovered
| the Messenger service, enabled by default, remained enabled and
| was not turned off by group policy.
| 
| Start > Run, type "cmd", then:                   net send B131
| "Hi there"
| 
| This would pop up "Hi there" on the B131 computer. The hostname
| of each computer (B131, for example) was taped to the top of each
| monitor, so I had a great time annoying my classmates in computer
| lab. One day students around me noticed me doing this and I
| naively showed them how to do it. I helpfully suggested to
| _never_ type * as the hostname or the message would send to all
| computers.
| 
| After a school wide DDoS from several students around me sending
| messages over and over like:                   net send * "this
| school is the worst"
| 
| ...and a lot more unmentionable messages, I was soon escorted out
| for a three day suspension for "hacking the school network." Good
| times. :)
 
  | jamal-kumar wrote:
  | heh I remember doing a little bat file that was something like
  | @echo off       net use e: \\Network\Share
  | 
  | to get to the network shares which I could see in windows
  | 2000's network display but would just tell you 'access denied'
  | if you tried to simply click on them. Just giving them a drive
  | mount like that worked fucking swimmingly. It gave us access to
  | pretty much everything, including this program called
  | 'photodex' where the username and password was the first
  | initial of our principal's first name and his last name and the
  | password was 'teacher'. Some other kid figured this out at some
  | point before us, and we found a folder containing bunch of shit
  | with super obvious file names like TEENPORN.JPG.EXE and the kid
  | we didn't really like in our IT class who turned out to be a
  | registered sex offender as an adult (he told me this at a
  | wedding after complaining that they took his guns away, and all
  | i could do was remember this incident and laugh) actually went
  | and clicked one of these because he was a bit thick in general,
  | and ended up getting in shit for this. I don't remember if they
  | managed to lock things down properly after that but I think I
  | remember recalling that this ruined the fun.
 
| peter_l_downs wrote:
| Great writing. I never did anything so interesting, but I have a
| few fun stories from highschool. Our school district gave every
| student access to a mac laptop for coursework, but of course we
| used to play a lot of flash games. Eventually they got around to
| updating the network's blocklist or whatever so addictinggames
| couldn't be accessed anymore. I'm sure they thought they were
| very smart but this just raised the stakes.
| 
| Of course we couldn't install games or our own software on the
| computers -- the `/Applications` folder was locked down and
| nothing would execute outside of it. They weren't totally stupid,
| they had some remote monitoring and privilege blocking software
| to prevent us from getting control of our own machines and doing
| silly things like playing games or even opening the Terminal. But
| eventually someone (not me, really, I wish I were this smart)
| figured out that inside of one of the pre-installed .app's there
| was a directory to which users still had write permission. So
| everyone in the entire school started playing Marble Blast Gold
| and, for some reason, Pokemon Red through an emulator, all just
| by dropping the programs inside the special fold
| `/Applications/SomeThingICantRemember.app/contents/special-
| folder/`. The games spread like wildfire because the school had
| also set up a system of shared network folders, one for each
| teacher, so that teachers could more easily share files with us.
| Turns out we could also use it to share files with each other.
| Lots of movies, as well. Eventually someone noticed and shut that
| all down.
| 
| Of course, highschool students want to play games instead of
| doing coursework, so one day someone (not me, really) realized
| that if you removed the battery from the laptop you could then
| unscrew the case and remove a stick of RAM, which would allow you
| to hold certain keys at boot to reset the PRAM or something like
| that. This would let you boot into safe mode, circumventing the
| remote monitoring and permissions software they had in place, and
| make your user account an administrator. Boom, games were back. I
| mostly used it to be able to work on software projects, of
| course, but I did end up playing a bit of Advance Wars.
| 
| I can't remember now but there was some issue where this didn't
| persist for very long -- maybe there were updates that the remote
| monitoring system would send that would reset your admin status?
| -- so you would have to go through the whole PRAM reset
| rigamarole, with a screwdriver, and that was a pain in the ass. I
| was out of school for a while my senior spring due to the flu and
| I figured out a way to totally disable the remote management
| software.
| 
| This was great, and I was having an awesome time working on
| software that would eventually get me my first programming job
| while I should have been focusing in class, when I got called
| down to the principal's office, where I was accused of being a
| computer hacker. I of course denied it, but they said that it
| certainly was odd that my computer had stopped communicating with
| the remote management software entirely. I think because I was so
| close to graduating and actually hadn't done anything wrong I got
| away with a week of detention and a firm promise to not do
| anything of the sort ever again.
| 
| Around that same time it had come out that certain administrators
| at the school were misusing the remote management software's
| features to spy on highschool students in their own homes, which
| was pretty absurd and of course a huge and expensive debacle, so
| I think they were somewhat more sympathetic to me disabling it
| than they might have been otherwise.
| 
| https://en.wikipedia.org/wiki/Robbins_v._Lower_Merion_School...
 
  | peter_l_downs wrote:
  | Oh, one other fun thing. We had a schoolday that ended with a
  | 30 minute activity period where every student had to sign up on
  | some web interface to a different teacher's room. This was so
  | that you could get help, meet with teachers, project groups,
  | whatever if you needed it. But there were limited spots in each
  | teacher's periods and you needed to sign up in advance, with no
  | more signups allowed after noon on the same day. I took a look
  | at the web interface and realized that all the checks were
  | client-side, so I wrote a little script that would let me sign
  | up for any activity period, at any time, even during the
  | activity periods. It was good fun being able to switch periods
  | at the end of the day, and seeing teachers being confused after
  | they had called attendance, checked me in to their room, and
  | then seeing me drop off the attendance and show up somewhere
  | else. Gave me a free pass to go wherever I wanted which was
  | nice.
 
  | Pick-A-Hill2019 wrote:
  | I took a look at that link (Robbins v. Lower Merion School
  | District) and - Wow, remotely activating students webcams in
  | their own bedrooms is ... just ... SMH. I hope I am wrong but
  | as far as I can tell, no-one went to jail for it?? Dayamn!
 
| __MatrixMan__ wrote:
| In my middle school you could just x out of the Windows NT login
| window and get a userless session.
| 
| We didn't understand that we hadn't hacked anything, and neither
| did our teachers. Their misplaced awe at our ability to cloak our
| activities in anonymity was intoxicating.
| 
| Most of my cohort then are engineers now.
| 
| I worry that as security gets better, opportunities for
| creativity and exploration go away, which might not bode well for
| future generations.
 
  | tester756 wrote:
  | Don't worry
  | 
  | If you're into real world security / reverse engineering and
  | other stuff, then try CTFs, other strong people will ensure
  | that you'll have enough room for creativity and hacky hacks :)
 
  | jamal-kumar wrote:
  | I think about this alot too. Tons of the current tutorials on
  | learning how to break windows security teach you on an old
  | windows 7 VM just to make it easy to get around mitigations and
  | learn without hindrance. I mean I know I learned on windows XP
  | VMs... but what happens when Microsoft rescinds offering those
  | free windows 7 IE11 VMs any arbitrary time soon?
  | 
  | On the other hand I like how Microsoft actually seems to be
  | giving a damn these days.
 
  | grawprog wrote:
  | In university, for some strange reason, we were required to
  | spend a few hours in a 'learn how to use a search engine
  | class.' It was brutal, they used remote control software and
  | slowly and painfully taught us how to use google.
  | 
  | I figured out pretty quickly you could Ctrl-alt-delete to bring
  | up the task manager and just close the client on the computer I
  | was using.
  | 
  | The teacher never figured out why one of the computers vanished
  | off the remote software management screen she was using.
 
  | nogridbag wrote:
  | Yeah I also got a bit too creative in middle and high school.
  | It was all harmless fun, e.g. writing scripts so that various
  | computers would start beeping at random times during the day.
  | 
  | None of my school faculty had any understanding of computers. I
  | was even yelled at for using "Google" during a research
  | project.
  | 
  | I think the bigger fear is that people cannot make mistakes
  | anymore. Even in my local town a simple mistake went viral on
  | social media and now the student's whole life is ruined for
  | something that may have been a simple visit to the principle's
  | office back in the day.
 
  | liketochill wrote:
  | I did a school project where I dos'd a local ISP for 10 seconds
  | using broadcast amplifiers on misconfigured routers that
  | allowed the source address to be spoofed. I was probably 15?
  | The isp I think only had a T3 but most people were still on
  | dial up so overwhelming a T3 seemed like a big deal.
  | 
  | I miss having shell accounts at all the .edu's for my egg drop
  | bots. That is how I learned about all the us schools hah
 
  | twox2 wrote:
  | It's a moving target. The opportunities for kids to get
  | creative and explore are now in emerging technologies, but they
  | are "emerging" only to us old farts. To young people, it's just
  | what's there. I think these things come easy to the inquisitive
  | minds that are not tainted by what you can and can't.
  | 
  | For example, I often read bug bounty write-ups, many of which
  | are obviously written by young teenagers. Some of them are able
  | to find issues that appear to be hiding in plain site. I kind
  | of think that what you're describing is a matter of
  | perspective, but boy do I miss the good old days when
  | everything was easy to exploit.
 
| Zenst wrote:
| My earlier hack was a ICL 2903 running George OS, involved
| creating large file in area previously used for system journal
| and could then dump that file out and read the content of the
| system journal and that was how I got the admin password. Other
| one I did was in effect a keylogger that I ran on the system that
| would take control of the terminal it was directed too and
| present login, take the input and then pass to the system making
| the user oblivious.
| 
| But for practical use, the old 0800 free calls trick of the early
| 80's was probably most favourite. Back then they introduced 0800
| free calls, when landline calls in the UK wasn't cheap. These got
| used for marketing, so companies would have there 0800 sales etc.
| Now, outside office hours they would direct to a recorded message
| on the PBX. Then what you could do is after the message, if you
| stayed on the line it would drop you into the exchange and you
| then pressed 9 on tone dial pad and could dial any number you
| likes as if you was dialling from that exchange location. Most
| being in London so was nice for free calls. Had limited use for
| BBS access, case of all that routing and line quality at times as
| well initial set-up. But still fun.
 
| fatnoah wrote:
| It wasn't just the '80s. Things persisted into the mid '90s as
| well.                 - Pirate FTP sites were in plain sight with
| folders named with unprintable ASCII characters       - My
| college-provided Telnet client for Windows included a backdoor
| FTP server with a plaintext user name and easily brute-forced
| password (unsalted hash that turned out to be a birthday of a
| school admin)       - Admins had to resolve our network issues by
| connecting to network via modem, from our computers.  Of course
| terminal program had keylogging enabled...       - Open SMTP
| relay was widespread and everywhere.  Spoofing and forging was as
| easy as a little Telnet and HELO
 
| flatiron wrote:
| 90s I got suspended for "hacking" when all I did was create a
| windows file share. Had me and my friends split the typing
| assignments and combine them on the share so we could browse the
| internet during typing class.
 
| pdkl95 wrote:
| In high school "AP CS" class in the early 90s, a friend of mine
| was annoyed at the stupid "security" software the school
| installed on the macs (system 7). It was basically just a system
| extension that asked for a password on startup.
| 
| Poking around, my friend noticed a slightly hidden/obscured file
| that had a file size that matched the number of characters in the
| password. N char password, N byte file. The file didn't have the
| password in plaintext, so my friend asked the teacher of a common
| way to scramble a byte. The teacher quickly suggested, "XOR?"
| 
| So my friend decided to try XORing the bytes in the file with a
| few values to see what happend. His _first guess_ was right: the
| password was  "obscured" with:                 for (char *p =
| password_str; p != NULL; p++) {         *p ^= 0xC9;       }
| 
| Why did he guess 0xC9? He was a total Trekkie/Trekker. 0xC9 in
| binary is 11001001.
| 
| https://memory-alpha.fandom.com/wiki/11001001_%28episode%29
| 
| I guess we know what show the author of the "security software"
| likes to watch...
| 
| Epilogue: my friend quickly did the obvious thing and made a boot
| floppy with a small program that printed out the password, so we
| had access to most of the computer in the school _and_ discovered
| all the passwords we weren 't supposed to know. I think we only
| used that to play bolo (early tank proto-battle-royale).
| _However_... several years later in my first year at university,
| I happened to talk to someone attending the local high school.
| The had a copy of my friend 's boot floppy! I know we never
| bothered to upload it a BBS, but somehow it ended up in the hands
| of quite a few high school hackers in multiple cities.
 
  | Communitivity wrote:
  | Nice. This brings back a very fuzzy memory. I think I found at
  | one point the 'software developer switch' a physical trigger
  | for the NMI, was still in the software in the form of flower G,
  | and would pop you into a debugger. I think.. the memory is very
  | fuzzy, as it's been 30+ years since high school.
 
___________________________________________________________________
(page generated 2021-06-30 23:01 UTC)