Friday, March 21, 2014

OK .... (oh am gonna pay for this i know)

Now stop asking me for free internet, i mean for real, is it so hard to think as a hacker? come on, you want something... you make it happen right... after my last post on how to get free internet people have always asked how do i save myself from the issue of the modem disconnecting after 10 minutes or so.... (applies to CDMA only)

Now heres a good hack:

  • use a dialer that supports auto/re-connect pppd and wvdial are my best dialers since i am a *nix till i die so...
  • create a bash/batch script calling reconnect 
  • use a fully connected system.... multiple modems
  • use a fully connected system.... multiple modems that interchange after one disconnects to pick the other up,
  • use a fully connected system.... multiple modems that interchange after one disconnects to pick the other up and changes the data/traffic route
  • use a fully connected system.... multiple modems that interchange after one disconnects to pick the other up and changes the data route and also allows the data/traffic to be persistent on a specific device/modem....

We good? alright

I will show the following methods.

  • Bash script to check what modem/device has highest speed(read connected)
  • after that change route to currently connected modem (read highest speed)
  • finally make sure the above connections can be used e.g to stream a video (very difficult...but not impossible)

Script:

as i said, i use wvdial alot so .... calling to modems with wvdial

 sudo wvdialconf
[sudo] password for taecode0h: 
Editing `/etc/wvdial.conf'.

Scanning your serial ports for a modem.

Modem Port Scan<*1>: S0   S1   S2   S3   
ttyACM0<*1>: ATQ0 V1 E1 -- failed with 2400 baud, next try: 9600 baud
ttyACM0<*1>: ATQ0 V1 E1 -- failed with 9600 baud, next try: 115200 baud
ttyACM0<*1>: ATQ0 V1 E1 -- and failed too at 115200, giving up.


Sorry, no modem was detected!  Is it in use by another program?
Did you configure it properly with setserial?

Please read the FAQ at http://alumnit.ca/wiki/?WvDial

this command checks for the modem on the system then after that writes it to the config fie that is /etc/wvdial.conf

now we can replicate the same config file as we will use the same settings as both modems are of the same company, with that said we will also be required to use a different serial port for the second modem depending on what it finds: .....

 taecode0h@r41nsec:~$ sudo wvdialconf
Editing `/etc/wvdial.conf'.

Scanning your serial ports for a modem.

Modem Port Scan<*1>: S0   S1   S2   S3   
ttyACM0<*1>: ATQ0 V1 E1 -- OK
ttyACM0<*1>: ATQ0 V1 E1 Z -- OK
ttyACM0<*1>: ATQ0 V1 E1 S0=0 -- OK
ttyACM0<*1>: ATQ0 V1 E1 S0=0 &C1 -- OK
ttyACM0<*1>: ATQ0 V1 E1 S0=0 &C1 &D2 -- OK
ttyACM0<*1>: ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0 -- OK
ttyACM0<*1>: Modem Identifier: ATI -- MF192-T-1.0.0
ttyACM0<*1>: Speed 4800: AT -- OK
ttyACM0<*1>: Speed 9600: AT -- OK
ttyACM0<*1>: Speed 19200: AT -- OK
ttyACM0<*1>: Speed 38400: AT -- OK
ttyACM0<*1>: Speed 57600: AT -- OK
ttyACM0<*1>: Speed 115200: AT -- OK
ttyACM0<*1>: Speed 230400: AT -- OK
ttyACM0<*1>: Speed 460800: AT -- OK
ttyACM0<*1>: Max speed is 460800; that should be safe.
ttyACM0<*1>: ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0 -- OK
ttyACM1<*1>: ATQ0 V1 E1 -- OK
ttyACM1<*1>: ATQ0 V1 E1 Z -- OK
ttyACM1<*1>: ATQ0 V1 E1 S0=0 -- OK
ttyACM1<*1>: ATQ0 V1 E1 S0=0 &C1 -- OK
ttyACM1<*1>: ATQ0 V1 E1 S0=0 &C1 &D2 -- OK
ttyACM1<*1>: ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0 -- OK
ttyACM1<*1>: Modem Identifier: ATI -- MF192-T-1.0.0
ttyACM1<*1>: Speed 4800: AT -- OK
ttyACM1<*1>: Speed 9600: AT -- OK
ttyACM1<*1>: Speed 19200: AT -- OK
ttyACM1<*1>: Speed 38400: AT -- OK
ttyACM1<*1>: Speed 57600: AT -- OK
ttyACM1<*1>: Speed 115200: AT -- OK
ttyACM1<*1>: Speed 230400: AT -- OK
ttyACM1<*1>: Speed 460800: AT -- OK
ttyACM1<*1>: Max speed is 460800; that should be safe.
ttyACM1<*1>: ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0 -- OK
ttyACM2<*1>: ATQ0 V1 E1 -- OK
ttyACM2<*1>: ATQ0 V1 E1 Z -- OK
ttyACM2<*1>: ATQ0 V1 E1 S0=0 -- OK
ttyACM2<*1>: ATQ0 V1 E1 S0=0 &C1 -- OK
ttyACM2<*1>: ATQ0 V1 E1 S0=0 &C1 &D2 -- OK
ttyACM2<*1>: ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0 -- OK
ttyACM2<*1>: Modem Identifier: ATI -- MF192-T-1.0.0
ttyACM2<*1>: Speed 4800: AT -- OK
ttyACM2<*1>: Speed 9600: AT -- OK
ttyACM2<*1>: Speed 19200: AT -- OK
ttyACM2<*1>: Speed 38400: AT -- OK
ttyACM2<*1>: Speed 57600: AT -- OK
ttyACM2<*1>: Speed 115200: AT -- OK
ttyACM2<*1>: Speed 230400: AT -- OK
ttyACM2<*1>: Speed 460800: AT -- OK
ttyACM2<*1>: Max speed is 460800; that should be safe.
ttyACM2<*1>: ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0 -- OK
ttyUSB0<*1>: ATQ0 V1 E1 -- OK
ttyUSB0<*1>: ATQ0 V1 E1 Z -- OK
ttyUSB0<*1>: ATQ0 V1 E1 S0=0 -- OK
ttyUSB0<*1>: ATQ0 V1 E1 S0=0 &C1 -- OK
ttyUSB0<*1>: ATQ0 V1 E1 S0=0 &C1 &D2 -- OK
ttyUSB0<*1>: ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0 -- OK
ttyUSB0<*1>: Modem Identifier: ATI -- Manufacturer: +GMI: HUAWEI TECHNOLOGIES CO., LTD
ttyUSB0<*1>: Speed 9600: AT -- OK
ttyUSB0<*1>: Max speed is 9600; that should be safe.
ttyUSB0<*1>: ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0 -- OK
ttyUSB1<*1>: ATQ0 V1 E1 -- failed with 2400 baud, next try: 9600 baud
ttyUSB1<*1>: ATQ0 V1 E1 -- failed with 9600 baud, next try: 9600 baud
ttyUSB1<*1>: ATQ0 V1 E1 -- and failed too at 115200, giving up.
ttyUSB2<*1>: ATQ0 V1 E1 -- OK
ttyUSB2<*1>: ATQ0 V1 E1 Z -- OK
ttyUSB2<*1>: ATQ0 V1 E1 S0=0 -- OK
ttyUSB2<*1>: ATQ0 V1 E1 S0=0 &C1 -- OK
ttyUSB2<*1>: ATQ0 V1 E1 S0=0 &C1 &D2 -- OK
ttyUSB2<*1>: ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0 -- OK
ttyUSB2<*1>: Modem Identifier: ATI -- Manufacturer: +GMI: HUAWEI TECHNOLOGIES CO., LTD
ttyUSB2<*1>: Speed 9600: AT -- OK
ttyUSB2<*1>: Max speed is 9600; that should be safe.
ttyUSB2<*1>: ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0 -- OK

Found an USB modem on /dev/ttyACM0.
Modem configuration written to /etc/wvdial.conf.
ttyACM0<Info>: Speed 460800; init "ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0"
ttyACM1<Info>: Speed 460800; init "ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0"
ttyACM2<Info>: Speed 460800; init "ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0"
ttyUSB0<Info>: Speed 9600; init "ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0"
ttyUSB2<Info>: Speed 9600; init "ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0"
As you can see it did find two modems .... forget the part u see the mf-192 its a GSM type i was using to illustrate this, again it only shows one was found but clearly two have according to the terminal one one ttyUSB0 and on ttyACM0 with that said...

leego... save another config file /etc/wvdial2.conf edit the required parts and finally set it out to roll,

now the script.
modem_route=$(
for iface in `ifconfig -a | grep ppp | awk '{print $1; }'`; do
    echo $iface = `ping -I $iface -c 1 -q 8.8.8.8 | grep avg | awk -F/ '{print $5;}'`
done | sort -k 3 -rn | head -n 1
)

logger "Setting new route from candidate: $modem_route"

ip route del default
ip route add default dev `echo $modem_route | awk '{print $1;}'`
now this pings google dns server to check speed and also disconnection depending on the ping TTL and also changes the route between the two modem routes as you can see on the last two lines.

now next thing is to dial both modems.... this is done with the following command 

sudo wvdial -C /etc/wvdial.conf
calls first^ modem 

sudo wvdial -C /etc/wvdial2.conf
calls second^ modem

oww run a cron job to call the script every- i dont know people say cron jobs cant run every second but hey... people also say hacking is hard :) 

with that said...  more configurations can be done to induct a smoother flow on the internet like streaming media and also on allowing media required to pass on a specific device to be as such unchanged :)
do i need to go deeper than this sure... but come on should i do all this for you?

if yes ... wait for it... THIS IS FOR EDUCATIONAL PURPOSES ONLY how to configure routes.


sorta looks like this now huh

                                                                ________
                                          +------------+        /
                                          |            |       |
                            +-------------+ Modem 1 +-------
        __                  |             |            |     /
    ___/  \_         +------+-------+     +------------+    |
  _/        \__      |     if1      |                      /
 /             \     |              |                      |
|YoBox          -----+ Script       |                      |Internet
 \_           __/    |              |                      |
   \__     __/       |     if2      |                      \
      \___/          +------+-------+     +------------+    |
                            |             |            |     \
                            +-------------+ Modem 2 +-------
                                          |            |       |
                                          +------------+        \________

OsmocomBB+OpenBTS+GSM={Calypso Chipset/Motorola C123} *USB+2.5mm Jack

BTS------------Base Transiever Station
GSM-----------Global System for Mobile Communications, originally Group Spécial Mobile
OsmocomBB---Firmware to run in our Calypso Based Device (Motorola C123)
USB to 2.5mm Jack cable (I will show you how to make this)


  • What I am doing.
  • What are my objectives.
  • Why the above equipment.
  • Why am I doing this.
  • What do I get out of this.


What I am doing

I will be creating a BTS with the cheapest hardware equipment available to do this.

What are my objectives

Read above and then think of what a BTS can do.

Why the above Equipment

  • Ummmm coz its really cheap (the equipment)
  • Coz I want a BTS really bad (the things you can exploit research with this)
  • Coz testing IPV4/IPV6/TCP..... is too overrated and and everyone is doing it... who will do GSM

Why am I doing this (now am just repeating myself)

What do I get out of this

Everything and Nothing ----> yes its every bit of knowledge till where i stop and its nothing since I know Telcos will probably ignore my rant :(

..... ok lets get rolling.

REQUIREMENTS:
Hardware: 
  1. PC
  2. Calypso Chipset Supported Device (Motorola c113,c115,118.....)
  3. USB to 2.5mm Jack cable
Software:
  1. *nix Based OS
  2. OsmocomBB
  3. OpenBTS

STEPS
  1. Install OpenBTS (and Asterisk)
  2. Install OsmocomBB
  3. Configure Everything
  4. Create USB -2.5 mm Jack* am not going to go into this.... its a pain i dont want to remember  (not that its very hard ... its just i burnt a finger and probably someones house while at it)
  5. Test
  6. and......play



  1. Install OpenBTS (and Asterisk)

Well this has so many ways to do this, from compiling the source and if you have Ubuntu 12.04 (I did this also on  7.3 (wheezy) 64-bit) x86-64 architecture as your OS Debian packages exist to do this , you need also to install this as a first:

autoconf
libtool
libosip2
libortp
libusb-1.0
g++
sqlite3
libsqlite3-dev (sipauthserve only)
libreadline6-dev
libncurses5-dev


sudo apt-get install autoconf libtool libosip2-dev libortp-dev libusb-1.0-0-dev g++ sqlite3 libsqlite3-dev erlang libreadline6-dev libncurses5-dev

Well after that the following downloaded packages need to be installed (N.B the packages you are about to install are specific for UHD ----USRP Hardware Driver---- devices)

sudo dpkg -i a53_1.0-1_amd64.deb
sudo dpkg -i openbts-public_3.2_amd64.deb
sudo dpkg -i smqueue-public_3.2_amd64.deb 
sudo dpkg -i sipauthserve-public_3.2_amd64.deb

Running OpenBTS

(from OpenBTS root)
cd /OpenBTS
sudo ./OpenBTS

You should see something like this..... well if you have your devices connected and configured


system ready
use the OpenBTSCLI utility to access CLI

And if you scan for GSM towers on your phone, you should see a 00101 (test) network. If you try to attach, it will reject you. This is because OpenBTS, by default, only allows registered handsets to connect. As we are not running our registration server (sipauthserve) no phones will camp. From here, we should look at a few OpenBTS configuration variables. Connect to OpenBTS with the OpenBTSCLI command:

(from OpenBTS root) 
cd /OpenBTS 
sudo ./OpenBTSCLI

Once you have OpenBTS up and running, you need to change the following configuration parameters in the database (/etc/OpenBTS/OpenBTS.db):

Control.GSMTAP.TargetIP = 127.0.0.1
GSM.Radio.NeedBSIC = 1
GSM.Radio.Band = 1800
GSM.CellSelection.Neighbors =           (set to empty string)
GSM.RACH.MaxRetrans = 3
GSM.RACH.TxInteger = 8
GSM.Radio.C0 = <your ARFCN (see note)>
Control.LUR.OpenRegistration = ^63905.*$   (note: in this example only IMSIs with MCC 639 and the MNC 05 will be allowed to register to the network, change that accordingly)
Warning: Only set GSM.Radio.C0 to an ARFCN you have a valid license for.

Installing OsmocomBB

this part is really fun but also very tricky especially if you don't have an arm cross compiler (this enables us to compile the arm code to firmwares for the software to be loaded in to the calypso based device read (Motorola C123)

so here is a good place to start :

am guessing you have done the necessary, many people ask me where the usb to 2.5 mm cable is available for purchase and i would say here

now that we have nearly everything done, play around with Osmocom if its your first time.... clearly if you need to know what it does i would suggest you go to my PDFs link and get more info on the 2G networks before doing anything past what you are doing.


Now.... this is how to work a BTS from the cheap device.....

P.S you need to do a filter replacement as such and in-case you destroy your board like i also did you will need to do... this look at photo





"When attempting this for the first try, I soldered / desoldered components a few times and ended up destroying the pads and traces so much that there was no way I could put the original filters or balun back on the PCB.

So in a last attempt to make the phone do something, I tried something a little unorthodox (actually proposed by h0rizon on IRC :). Instead of doing a proper unbalanced to balanced signal convesion, I just connected one of the RITA balanced line to the ground using a DC blocking cap. And then connected the other balanced line to the input via a capacitor as well. For DCS1800 you need to add a capacitor of your own, but for EGSM, there is a capacitor in the input SAW matching that does the trick so you only need a wire.

The quite dirty results is shown on the side. It's ugly but it actually works ... The signal is maybe distorded or a litte more noisy, that has yet to be determined. So if you screw up, you can always fall back to this :)

"
cited from http://246tnt.com/gsm/rx_filter.html



RF-hacking.... Yes Radio Frequency SPECIFICALLY, GSM

So do I start with explaining every single bit? because this is one hell of a lengthy topic.

OK lets start here:

GSM:
Most common network/protocol in the mobile industry (around 75% of mobile users)
Established around 1999
Very common
(was/is) Very Expensive Debugging devices
(had) Very little Documentation

Equipment:

MS-----------Mobile Station=Mobile Equipment + Sim Card
BTS----------Base Transmission Station
BSC----------Base Station Controller

here is a basic illustration of the GSM network



So with this we have a huge playing field, I know this is rather new to many people and since GSM was a very hushed on project it means the documentation available is either too heavy for people to indulge in or too un-detailed, so starting of from the really simple works out there i will try to bridge this lines the best way i can.

so my next post will explain how to do "DEBUGGING" on this network with very simple easy to afford tools (note afford not get)

Here are the things that we can achieve as of now.

Access the air interface between the phone and BTS
Access HLR via SS7 hacks and pay services (later on)

So what will we learn from all this:

  1. HOW IN/SECURE GSM NETWORKS REALLY ARE
  2. HOW TO BREAK THIS SECURITY
  3. HOW TO DO MAN IN THE MIDDLE ATTACKS ON THIS NETWORKS
  4. HOW TO INTERCEPT DATA ON THIS NETWORKS
  5. HOW TO SETUP BASE TRANSMISSION STATIONS
  6. HOW TO ACCESS SIM APPLICATIONS\
  7. HOW TO CLONE/HACK SIM CARDS
  8. HOW TO CREATE OUR OWN GSM NETWORKS COMPLETE WITH :


  • Personalised simcards
  • sim applications
  • secure network rules and protocols
  • effective services 
  • really cheap call rates (i know i will probably be killed for this so if you dont hear from me... ahem)


So with that... why dont we dive in..... start from the next post about the debugging devices.

Sunday, February 2, 2014

Of ChromeBooks and Hacking (read Pentest)

So, Yes first post this year huh (talk about lazy (lets call it busy for now))

Good year? new girl, same car :) New Partnership, shaved dreads, yes shaved em.... cut some friends and exes, built an empire (ok working on it) hacked a bank (no ... not done that) , hacked a GSM tower (via) stole GSM credentials (of course am not admitting lol)

now since we have an update of my life can i state i totally dig my Chromebook (CR-48) Mario Pony...?


  • after all, it is really light (around 3lb) 
  • battery life 8 hours (yes that long... i actually don't carry my charger to work (thats how much of a bad ass i become))
  • its got an inbuilt CDMA/GSM (if you know what to do to change in between those two)
  • GPS (ok it uses the WWAN modem card)
  • the processor leaves more to the wanting performance as it is still a netbook
  • the SSD does save tonnes in performance though
  • and yes >>> YOU CAN JAILBREAK it ... add tonnes of things and baaaam (Kay knows i say this too much)
  • barely heats up, did i mention its like light > 

Now for the next topic> turning my CR-48 to a development/Security oriented machine (ok too bad i wont be doing Reverse Eng on it waaaait or can we?

TOPICS


  • Jailbreaking/Rooting
  • Mounting as Writable 
  • Force Update
  • Securing it
  • Installing Ubuntu/Debian/Kali/ blah blah blah any Linux on it
  • Installing Linux tools
  • Installing a local development server
  • Installing Security Tools (esp if you did not install Kali linux)


Owww Dedication to my best friend (oww yes hackers do have lives yo) /Masha and an annoying mate /Kay and IDD SALIM GITHINJI - RIP


Monday, December 16, 2013

Reverse Engineering Kit[Olly Tools 2013---with Plugins]


So someone asked me where he should get a good Kit for reverse Engenering .... well heres a link to a 2013 Olly T00lset :) p.s will upload to my dropbox so it doesnt run the risk of elimination....


0llyDBG T00Ls 2013-2014

have a blast :)

back to code, sawa?
Wazi

My Rant - Katy

For the sake of this argument security is devoid of technology and Vic a Vic ..... And for further clarity.... This is a rant, zero security ,hacking, coding and development purpose....

She was beautiful, well I was sexually starved but in all aspects... She was beautiful ... It was around 2004 and we had attended the provincial drama festival... My ellocuent English had pulled me thus far (God had) I loved acting ... Being a thespian is something I pride myself with... Maybe because it came in 2nd in my nature or just my character.. Ok ... She was beautiful, sad part my geeky nerdy esteem kicked up a notch higher than my words.... I really did try talking to her, but sadly my courage would jolt beneath the Marian's trench in depth when making pleasants with a beautiful girl.

For the sake of this short rant... Let's call her Katy, Katy... Look for that song by Peter Bradley Adams... No relation to this story though... She was perfect, light skinned... 4 on a light skin completion meter she was medium height curvy , lord she had it long black natural hair ,ow do trust me .,, zero make up.... Except from the lip gloss on her full but very brief lips... You know the ones that leave you questioning if the kiss happened or you just bit your lower or upper lip depending on your formulae with kisses....dressed in her high school attire she played right into my geek fantasies so well I matched it with reality so quick my pecker jolted much ...ahem... She was beautiful in every sense.... She looked at me once in a while, making me fix my pullover so many times I think I switched it front to back a few more than enough times....She was beautiful... Her eyes full of energy and excitement yet shy not enough innocence could be in the world to match hers and her face... Enough to challenge the Greek sculptured philosophy in a frenzy.... She was....

Everything breaks, this is my most favorite quote, and standing by it ,I broke even and walked to her well not alone was she nor was I ,I had a fleet of men in wait... Or wingman if I may rephrase ,my salutations were met with a smile, something not many a folk do, reasons would fall in major categories noted as am very nerdy, too geeky and masculine appeal to ladies... I don't really pull that much trophies ,anyway she smiled setting a perfect display of one heck of a set of white leveled teeth, she was Beautiful, by jones she was a masterpiece.

I would love to tell you that to this day thoughts of her and me flaunt my mind that is true as she met my poor vibe with smiles that made me think i was either a very good clown or romeo himself.... to be really honest i dont know what she saw in me honestly, i dont mean to self me self short but i swear, she was too good to me, I remember when we left each other, we exchanged names , birth dates, (dont ask why) and school addresses, funny thing I never wrote, but she did... enough times to let me see she really like me... she even sent me er school tie for me to wear it, swear (this was a quintessence of a girls virginity back then) anyway.... she did and to this day I remember her as none other.

I mean to say there's always a person in mind who stirs your security, memory wise.... processor wise(mind) heck even your Operating Soul.... those are your exploits.... so exploits are good... right? they give access to the heart mean root. so .... let me code that android exploit then Katy i mean  exploit away :)

Security oriented Distro Kali Linux Header Installation Issues

So this is rather going to be short.

Many people especially in the forums have been nagging about the custom kernel on Kali Linux and how to install the kernel headers that come with the new security distro [currently at time of publish 1.0.5] and the header being 3.7-trunk-amd64, this kernel has a patch that allows packet injection hence another method i used by upgrading the kernel to 3.8.x worked for installing headers required for VMware/Virtual Box installation but i couldn't work on the wireless network security/pentest.

So here we go, first thing you will need to edit your sources list that is if they dont have this:

deb [arch=i386,amd64,armel,armhf] http://http.kali.org/kali kali-dev main contrib non-free
deb [arch=i386,amd64,armel,armhf] http://http.kali.org/kali kali-dev main/debian-installer
deb-src http://http.kali.org/kali kali-dev main contrib non-free

deb [arch=i386,amd64,armel,armhf] http://http.kali.org/kali kali main contrib non-free
deb [arch=i386,amd64,armel,armhf] http://http.kali.org/kali kali main/debian-installer
deb-src http://http.kali.org/kali kali main contrib non-free

deb [arch=i386,amd64,armel,armhf] http://security.kali.org/kali-security kali/updates main contrib non-free
deb-src http://security.kali.org/kali-security kali/updates main contrib non-free

sometimes after doing this and trying an update (apt-get update) you might get an exception that

E: Type 'deb[arch=i386,amd64,armel,armhf] ' is not known on line..... in source list /etc/apt.......
kindly eliminate the [arch=i386,amd64,armel,armhf] from everywhere it appears and try again .... this will work most of the time.
ok then ..... here are a few commands to kick in that virtual appliance NB.... this is before installing the virtual appliance

echo cups enabled >> /usr/sbin/update-rc.d
echo vmware-tools enabled >> /usr/sbin/update-rc.d
apt-get install gcc make linux-headers-$(uname -r) 

and voila.... this works ...well for me ... i hope it does for you too :)

Wednesday, December 11, 2013

Ok am better now :)

well the title is pretty much definitive, been a while since the September 13 demise of an accident , yes it was a Friday and a 13th to be precise .... any way I am well and back , few projects here and there but posts are due to continue streaming in:

An android spyware :) yes we will have that.
A mobile tracking system from what around  200$ system.
Owww and yes ... if you read my blog ... don't expect me to put up banners and notices that this is for educational purpose only.... ITS FOR SECURITY for chris* sake, if it looks bad that's because you need to patch yo system aight?

alright vented* so lets do security.

Thursday, October 17, 2013

Part 1: Stealing Internet :) again (this is becoming a habit)

Since this post is going to be a little bit long why dont I try to be as forth coming as I can, Its becoming very hard for me to blog with this projects that I am working on and no, am not complaining.
So Lets steal some more Internet Orange Ke.(Ok its Telkom but same difference)

Ok so I made an earlier Post about getting that free internet using a method that employed brute forcing usernames (still viable) but heres another method and woah unto you who use the method as this will also guarantee you making a huge  mistake (for Educational purposes only)

1. Get a CDMA/EVDO RUIM card that is not probably registered in your name.
2. Get TOR / (any suitable VPN you prefer (to me /for me .... I refer TOR for its Free sense and the fact that I get more than two hacks going here)<--- PS TOR is not that safe dont believe me (i will post that later))
3. Computer
4. CDMA/EVDO Modem best to strip off your IMEI/SN but hey its not much you just not paranoid enough ...YET
5.nmap :) (ok you dont need this i will do the scan for you)

Ok yes

5. BRAIN

..... Ok here we go:

So What we will be doing, using a VPN to bypass the billing server:

Make sure you dont have existing bundles to work this out (thats the point of it right?)

ok since this is step one I teach how to configure TOR to a specific country (why?.... TOR is used by a lot of  people, this slows down its network bandwidth, speed and we prefer high internet speeds do we not<--- alright here we go)

owww Install TOR and Vidalia  package for your OS. (If I need to show you this, ah ah....  am not going there)
then we need to access  this once we have finished the installation

Seeing what we have is the list for all servers and countries we can use for TOR .
Select a certain country you want e.g China
Click that server select and save the Fingerprint of the server to fingerprint.txt (copy like 4 of them)
 Then
Remove the spaces and add $ in front of each line & separate with ” , “. Save it as a single line.

Add “ExitNodes” and next line “StrictExitNodes 1″. It will look like … the above^

Now after that go to settings: advanced: open up the torc file you can see (mine gave me hell on my FreeBSD box so heres a VM switch up on XP ) 

once that is open edit that to give you the bellow instance:



What you will add is the ExitNodes lines to the top of that file, nothing more or less :)
save this information click open , OK , exit and done :) 
Restart the Vidalia package and voila, we are done :)

Ok from this steps we done with step one :) with step two i will explain what happens but with this if you connect your modem ... and start TOR you will be able to browse for free, OK (with disconnections every ten minutes (that's my fault --- ask orange who gave them the idea :) yes, iBrag.

anyway reality aside a simple batch/bash script would suffice over the problem.

So what do we have
Fast
Free
(annoying coz of disconnection but sure you can chip in on how to bypass this) Internet


Monday, October 14, 2013

Obfuscation :That Part About Tormenting the Bastard Trying To Get In

I made a post about tormenting the culprit trying to get either (through) your code or through your network (well it was about code) and I never ( I did note down )

Obfuscation


Simply put its jumbling up your code (in a pattern <---- this has a weakness also but hey I still said it also :P )
anyway lets keep the newbies and the lazy bums at bay for the least of the part.
So a Wikipedia explanation is as such: In software development, obfuscation is the deliberate act of creating obfuscated code, i.e. source or machine code that is difficult for humans to understand.

Programmers may deliberately obfuscate code to conceal its purpose (security through obscurity) or its logic, in order to prevent tampering, deter reverse engineering, or as a puzzle or recreational challenge for someone reading the source code.

So here goes nothing , different methods to do this,
1. Manual
2. Automated

(well mainly i use manual to decode)
Say we have this piece of code

<?php echo '<p>Hello World</p>'?> 

and we have this 

<?php
$f27ff0e1af66="\x62\141\x73\145\x36\64\x5f\144\x65\143\x6f\144\x65";@eval($f27ff0e1af66(
"JHpmNWI5OWQ5MDVkODRhYmVkZThlZDQyMjY3NjNlZmM0PSJceDYyIjskcTdkM2Y3YjdhY2U3OGRmNGNjOWRmNGQ
yZjc3OGRmMWE9Ilx4NjUiOyRyZTkxZmM3NWQ2YzViNWMyODM4Nzc5YjMwODg1Y2I0OD0iXHg2NiI7JGE2OTU1NzF
kOTRkZmEwM2U2NzEwZTE2NzM1YzYwZmE2PSJceDY3IjskeTIyYmI1M2NmOGExZDA1MTEzYjEyM2QzZjNmODk5MjE
9Ilx4NmQiOyR1MDgwYjY1ZDc1NjFmOTFkMWQ0ZDA2OGU1NTAxZjQwMD0iXHg2ZiI7JHUyNzdlZGUwMDQwYjA3ZGM
yMDhiMWQxMWM5YzkyZTE2PSJceDZmIjskeTdlMjIzNDQxYWFlZDYxNmM4NTM3OTZlNjE4NWZiNDU9Ilx4NmYiOyR
nNjEzOWJiZjE3YmQzOTdhYzA5MDY1ODI1ZGVkMjhlYj0iXHg2ZiI7JHo1Y2QzOTAwNDU4YmMwYThhNThhNzc4MTc
yYmQ1MTRmPSJceDczIjskb2IwNmQ5OWY3ODZhOTM0YmRkNTlmYWRhM2JiOWVmNTI9Ilx4NzMiOyRsMTM2OTZmNTJ
jN2RlYTk2NzNjNWVhYjZlMTk1MDNmNT0iXHg3MyI7JHEzMjQwNTFkZDg2MjBiYzU5ZTM3ZmNmNjRmZjNkMGEyPSJ
ceDczIjskemY1Yjk5ZDkwNWQ4NGFiZWRlOGVkNDIyNjc2M2VmYzQuPSJcMTQxIjskcTdkM2Y3YjdhY2U3OGRmNGN
jOWRmNGQyZjc3OGRmMWEuPSJcMTYyIjskcmU5MWZjNzVkNmM1YjVjMjgzODc3OWIzMDg4NWNiNDguPSJcMTUxIjs
kYTY5NTU3MWQ5NGRmYTAzZTY3MTBlMTY3MzVjNjBmYTYuPSJcMTcyIjskeTIyYmI1M2NmOGExZDA1MTEzYjEyM2Q
zZjNmODk5MjEuPSJcMTQ0IjskdTA4MGI2NWQ3NTYxZjkxZDFkNGQwNjhlNTUwMWY0MDAuPSJcMTQyIjskdTI3N2V
kZTAwNDBiMDdkYzIwOGIxZDExYzljOTJlMTYuPSJcMTQyIjskeTdlMjIzNDQxYWFlZDYxNmM4NTM3OTZlNjE4NWZ
iNDUuPSJcMTQyIjskZzYxMzliYmYxN2JkMzk3YWMwOTA2NTgyNWRlZDI4ZWIuPSJcMTQyIjskejVjZDM5MDA0NTh
iYzBhOGE1OGE3NzgxNzJiZDUxNGYuPSJcMTY0Ijskb2IwNmQ5OWY3ODZhOTM0YmRkNTlmYWRhM2JiOWVmNTIuPSJ
cMTY0IjskbDEzNjk2ZjUyYzdkZWE5NjczYzVlYWI2ZTE5NTAzZjUuPSJcMTY0IjskcTMyNDA1MWRkODYyMGJjNTl
lMzdmY2Y2NGZmM2QwYTIuPSJcMTY0IjskemY1Yjk5ZDkwNWQ4NGFiZWRlOGVkNDIyNjc2M2VmYzQuPSJceDczIjs
kcTdkM2Y3YjdhY2U3OGRmNGNjOWRmNGQyZjc3OGRmMWEuPSJceDY1IjskcmU5MWZjNzVkNmM1YjVjMjgzODc3OWI
zMDg4NWNiNDguPSJceDZjIjskYTY5NTU3MWQ5NGRmYTAzZTY3MTBlMTY3MzVjNjBmYTYuPSJceDY5IjskeTIyYmI
1M2NmOGExZDA1MTEzYjEyM2QzZjNmODk5MjEuPSJceDM1IjskdTA4MGI2NWQ3NTYxZjkxZDFkNGQwNjhlNTUwMWY
0MDAuPSJceDVmIjskdTI3N2VkZTAwNDBiMDdkYzIwOGIxZDExYzljOTJlMTYuPSJceDVmIjskeTdlMjIzNDQxYWF
lZDYxNmM4NTM3OTZlNjE4NWZiNDUuPSJceDVmIjskZzYxMzliYmYxN2JkMzk3YWMwOTA2NTgyNWRlZDI4ZWIuPSJ
ceDVmIjskejVjZDM5MDA0NThiYzBhOGE1OGE3NzgxNzJiZDUxNGYuPSJceDcyIjskb2IwNmQ5OWY3ODZhOTM0YmR
kNTlmYWRhM2JiOWVmNTIuPSJceDcyIjskbDEzNjk2ZjUyYzdkZWE5NjczYzVlYWI2ZTE5NTAzZjUuPSJceDcyIjs
kcTMyNDA1MWRkODYyMGJjNTllMzdmY2Y2NGZmM2QwYTIuPSJceDcyIjskemY1Yjk5ZDkwNWQ4NGFiZWRlOGVkNDI
yNjc2M2VmYzQuPSJcMTQ1IjskcTdkM2Y3YjdhY2U3OGRmNGNjOWRmNGQyZjc3OGRmMWEuPSJcMTQ3IjskcmU5MWZ
jNzVkNmM1YjVjMjgzODc3OWIzMDg4NWNiNDguPSJcMTQ1IjskYTY5NTU3MWQ5NGRmYTAzZTY3MTBlMTY3MzVjNjB
mYTYuPSJcMTU2IjskdTA4MGI2NWQ3NTYxZjkxZDFkNGQwNjhlNTUwMWY0MDAuPSJcMTQ1IjskdTI3N2VkZTAwNDB
iMDdkYzIwOGIxZDExYzljOTJlMTYuPSJcMTQ1IjskeTdlMjIzNDQxYWFlZDYxNmM4NTM3OTZlNjE4NWZiNDUuPSJ
cMTQ3IjskZzYxMzliYmYxN2JkMzk3YWMwOTA2NTgyNWRlZDI4ZWIuPSJcMTYzIjskejVjZDM5MDA0NThiYzBhOGE
1OGE3NzgxNzJiZDUxNGYuPSJcMTM3Ijskb2IwNmQ5OWY3ODZhOTM0YmRkNTlmYWRhM2JiOWVmNTIuPSJcMTM3Ijs
kbDEzNjk2ZjUyYzdkZWE5NjczYzVlYWI2ZTE5NTAzZjUuPSJcMTYwIjskcTMyNDA1MWRkODYyMGJjNTllMzdmY2Y
2NGZmM2QwYTIuPSJcMTY0IjskemY1Yjk5ZDkwNWQ4NGFiZWRlOGVkNDIyNjc2M2VmYzQuPSJceDM2IjskcTdkM2Y
3YjdhY2U3OGRmNGNjOWRmNGQyZjc3OGRmMWEuPSJceDVmIjskcmU5MWZjNzVkNmM1YjVjMjgzODc3OWIzMDg4NWN
iNDguPSJceDVmIjskYTY5NTU3MWQ5NGRmYTAzZTY3MTBlMTY3MzVjNjBmYTYuPSJceDY2IjskdTA4MGI2NWQ3NTY
xZjkxZDFkNGQwNjhlNTUwMWY0MDAuPSJceDZlIjskdTI3N2VkZTAwNDBiMDdkYzIwOGIxZDExYzljOTJlMTYuPSJ
ceDZlIjskeTdlMjIzNDQxYWFlZDYxNmM4NTM3OTZlNjE4NWZiNDUuPSJceDY1IjskZzYxMzliYmYxN2JkMzk3YWM
wOTA2NTgyNWRlZDI4ZWIuPSJceDc0IjskejVjZDM5MDA0NThiYzBhOGE1OGE3NzgxNzJiZDUxNGYuPSJceDcyIjs
kb2IwNmQ5OWY3ODZhOTM0YmRkNTlmYWRhM2JiOWVmNTIuPSJceDcyIjskbDEzNjk2ZjUyYzdkZWE5NjczYzVlYWI
2ZTE5NTAzZjUuPSJceDZmIjskcTMyNDA1MWRkODYyMGJjNTllMzdmY2Y2NGZmM2QwYTIuPSJceDZmIjskemY1Yjk
5ZDkwNWQ4NGFiZWRlOGVkNDIyNjc2M2VmYzQuPSJcNjQiOyRxN2QzZjdiN2FjZTc4ZGY0Y2M5ZGY0ZDJmNzc4ZGY
xYS49IlwxNjIiOyRyZTkxZmM3NWQ2YzViNWMyODM4Nzc5YjMwODg1Y2I0OC49IlwxNDciOyRhNjk1NTcxZDk0ZGZ
hMDNlNjcxMGUxNjczNWM2MGZhNi49IlwxNTQiOyR1MDgwYjY1ZDc1NjFmOTFkMWQ0ZDA2OGU1NTAxZjQwMC49Ilw
xNDQiOyR1Mjc3ZWRlMDA0MGIwN2RjMjA4YjFkMTFjOWM5MmUxNi49IlwxNDQiOyR5N2UyMjM0NDFhYWVkNjE2Yzg
1Mzc5NmU2MTg1ZmI0NS49IlwxNjQiOyRnNjEzOWJiZjE3YmQzOTdhYzA5MDY1ODI1ZGVkMjhlYi49IlwxNDEiOyR
6NWNkMzkwMDQ1OGJjMGE4YTU4YTc3ODE3MmJkNTE0Zi49IlwxNDUiOyRvYjA2ZDk5Zjc4NmE5MzRiZGQ1OWZhZGE
zYmI5ZWY1Mi49IlwxNTciOyRsMTM2OTZmNTJjN2RlYTk2NzNjNWVhYjZlMTk1MDNmNS49IlwxNjMiOyRxMzI0MDU
xZGQ4NjIwYmM1OWUzN2ZjZjY0ZmYzZDBhMi49IlwxNTMiOyR6ZjViOTlkOTA1ZDg0YWJlZGU4ZWQ0MjI2NzYzZWZ
jNC49Ilx4NWYiOyRxN2QzZjdiN2FjZTc4ZGY0Y2M5ZGY0ZDJmNzc4ZGYxYS49Ilx4NjUiOyRyZTkxZmM3NWQ2YzV
iNWMyODM4Nzc5YjMwODg1Y2I0OC49Ilx4NjUiOyRhNjk1NTcxZDk0ZGZhMDNlNjcxMGUxNjczNWM2MGZhNi49Ilx
4NjEiOyR1MDgwYjY1ZDc1NjFmOTFkMWQ0ZDA2OGU1NTAxZjQwMC49Ilx4NWYiOyR1Mjc3ZWRlMDA0MGIwN2RjMjA
4YjFkMTFjOWM5MmUxNi49Ilx4NWYiOyR5N2UyMjM0NDFhYWVkNjE2Yzg1Mzc5NmU2MTg1ZmI0NS49Ilx4NWYiOyR
nNjEzOWJiZjE3YmQzOTdhYzA5MDY1ODI1ZGVkMjhlYi49Ilx4NzIiOyR6NWNkMzkwMDQ1OGJjMGE4YTU4YTc3ODE
3MmJkNTE0Zi49Ilx4NzAiOyRvYjA2ZDk5Zjc4NmE5MzRiZGQ1OWZhZGEzYmI5ZWY1Mi49Ilx4NzQiOyR6ZjViOTl
kOTA1ZDg0YWJlZGU4ZWQ0MjI2NzYzZWZjNC49IlwxNDQiOyRxN2QzZjdiN2FjZTc4ZGY0Y2M5ZGY0ZDJmNzc4ZGY
xYS49IlwxNjAiOyRyZTkxZmM3NWQ2YzViNWMyODM4Nzc5YjMwODg1Y2I0OC49IlwxNjQiOyRhNjk1NTcxZDk0ZGZ
hMDNlNjcxMGUxNjczNWM2MGZhNi49IlwxNjQiOyR1MDgwYjY1ZDc1NjFmOTFkMWQ0ZDA2OGU1NTAxZjQwMC49Ilw
xNDMiOyR1Mjc3ZWRlMDA0MGIwN2RjMjA4YjFkMTFjOWM5MmUxNi49IlwxNDYiOyR5N2UyMjM0NDFhYWVkNjE2Yzg
1Mzc5NmU2MTg1ZmI0NS49IlwxNDMiOyRnNjEzOWJiZjE3YmQzOTdhYzA5MDY1ODI1ZGVkMjhlYi49IlwxNjQiOyR
6NWNkMzkwMDQ1OGJjMGE4YTU4YTc3ODE3MmJkNTE0Zi49IlwxNTQiOyRvYjA2ZDk5Zjc4NmE5MzRiZGQ1OWZhZGE
zYmI5ZWY1Mi49Ilw2MSI7JHpmNWI5OWQ5MDVkODRhYmVkZThlZDQyMjY3NjNlZmM0Lj0iXHg2NSI7JHE3ZDNmN2I
3YWNlNzhkZjRjYzlkZjRkMmY3NzhkZjFhLj0iXHg2YyI7JHJlOTFmYzc1ZDZjNWI1YzI4Mzg3NzliMzA4ODVjYjQ
4Lj0iXHg1ZiI7JGE2OTU1NzFkOTRkZmEwM2U2NzEwZTE2NzM1YzYwZmE2Lj0iXHg2NSI7JHUwODBiNjVkNzU2MWY
5MWQxZDRkMDY4ZTU1MDFmNDAwLj0iXHg2YyI7JHUyNzdlZGUwMDQwYjA3ZGMyMDhiMWQxMWM5YzkyZTE2Lj0iXHg
2YyI7JHk3ZTIyMzQ0MWFhZWQ2MTZjODUzNzk2ZTYxODVmYjQ1Lj0iXHg2ZiI7JHo1Y2QzOTAwNDU4YmMwYThhNTh
hNzc4MTcyYmQ1MTRmLj0iXHg2MSI7JG9iMDZkOTlmNzg2YTkzNGJkZDU5ZmFkYTNiYjllZjUyLj0iXHgzMyI7JHp
mNWI5OWQ5MDVkODRhYmVkZThlZDQyMjY3NjNlZmM0Lj0iXDE0MyI7JHE3ZDNmN2I3YWNlNzhkZjRjYzlkZjRkMmY
3NzhkZjFhLj0iXDE0MSI7JHJlOTFmYzc1ZDZjNWI1YzI4Mzg3NzliMzA4ODVjYjQ4Lj0iXDE0MyI7JHUwODBiNjV
kNzU2MWY5MWQxZDRkMDY4ZTU1MDFmNDAwLj0iXDE0NSI7JHUyNzdlZGUwMDQwYjA3ZGMyMDhiMWQxMWM5YzkyZTE
2Lj0iXDE2NSI7JHk3ZTIyMzQ0MWFhZWQ2MTZjODUzNzk2ZTYxODVmYjQ1Lj0iXDE1NiI7JHo1Y2QzOTAwNDU4YmM
wYThhNThhNzc4MTcyYmQ1MTRmLj0iXDE0MyI7JHpmNWI5OWQ5MDVkODRhYmVkZThlZDQyMjY3NjNlZmM0Lj0iXHg
2ZiI7JHE3ZDNmN2I3YWNlNzhkZjRjYzlkZjRkMmY3NzhkZjFhLj0iXHg2MyI7JHJlOTFmYzc1ZDZjNWI1YzI4Mzg
3NzliMzA4ODVjYjQ4Lj0iXHg2ZiI7JHUwODBiNjVkNzU2MWY5MWQxZDRkMDY4ZTU1MDFmNDAwLj0iXHg2MSI7JHU
yNzdlZGUwMDQwYjA3ZGMyMDhiMWQxMWM5YzkyZTE2Lj0iXHg3MyI7JHk3ZTIyMzQ0MWFhZWQ2MTZjODUzNzk2ZTY
xODVmYjQ1Lj0iXHg3NCI7JHo1Y2QzOTAwNDU4YmMwYThhNThhNzc4MTcyYmQ1MTRmLj0iXHg2NSI7JHpmNWI5OWQ
5MDVkODRhYmVkZThlZDQyMjY3NjNlZmM0Lj0iXDE0NCI7JHE3ZDNmN2I3YWNlNzhkZjRjYzlkZjRkMmY3NzhkZjF
hLj0iXDE0NSI7JHJlOTFmYzc1ZDZjNWI1YzI4Mzg3NzliMzA4ODVjYjQ4Lj0iXDE1NiI7JHUwODBiNjVkNzU2MWY
5MWQxZDRkMDY4ZTU1MDFmNDAwLj0iXDE1NiI7JHUyNzdlZGUwMDQwYjA3ZGMyMDhiMWQxMWM5YzkyZTE2Lj0iXDE
1MCI7JHk3ZTIyMzQ0MWFhZWQ2MTZjODUzNzk2ZTYxODVmYjQ1Lj0iXDE0NSI7JHpmNWI5OWQ5MDVkODRhYmVkZTh
lZDQyMjY3NjNlZmM0Lj0iXHg2NSI7JHJlOTFmYzc1ZDZjNWI1YzI4Mzg3NzliMzA4ODVjYjQ4Lj0iXHg3NCI7JHk
3ZTIyMzQ0MWFhZWQ2MTZjODUzNzk2ZTYxODVmYjQ1Lj0iXHg2ZSI7JHJlOTFmYzc1ZDZjNWI1YzI4Mzg3NzliMzA
4ODVjYjQ4Lj0iXDE0NSI7JHk3ZTIyMzQ0MWFhZWQ2MTZjODUzNzk2ZTYxODVmYjQ1Lj0iXDE2NCI7JHJlOTFmYzc
1ZDZjNWI1YzI4Mzg3NzliMzA4ODVjYjQ4Lj0iXHg2ZSI7JHk3ZTIyMzQ0MWFhZWQ2MTZjODUzNzk2ZTYxODVmYjQ
1Lj0iXHg3MyI7JHJlOTFmYzc1ZDZjNWI1YzI4Mzg3NzliMzA4ODVjYjQ4Lj0iXDE2NCI7JHJlOTFmYzc1ZDZjNWI
1YzI4Mzg3NzliMzA4ODVjYjQ4Lj0iXHg3MyI7JGc2MTM5YmJmMTdiZDM5N2FjMDkwNjU4MjVkZWQyOGViKCk7aWY
oJHkyMmJiNTNjZjhhMWQwNTExM2IxMjNkM2YzZjg5OTIxKCRxN2QzZjdiN2FjZTc4ZGY0Y2M5ZGY0ZDJmNzc4ZGY
xYSgiXHg1Y1w1MFx4MjJcMTMzXHgzMFw1NVx4MzlcMTAxXHgyZFwxMzJceDYxXDU1XHg3YVwxMzRceDJiXDU3XHg
zZFwxMzVceDJhXDQyXHg1Y1w1MSIsIlx4MjhcNDJceDIyXDUxIiwkejVjZDM5MDA0NThiYzBhOGE1OGE3NzgxNzJ
iZDUxNGYoIlxyXG4iLCIiLCRyZTkxZmM3NWQ2YzViNWMyODM4Nzc5YjMwODg1Y2I0OCgkcTMyNDA1MWRkODYyMGJ
jNTllMzdmY2Y2NGZmM2QwYTIoX19GSUxFX18sIlx4MjgiKSkpKSk9PSJceDY0XDE0Mlx4MzRcMTQ0XHgzM1w2MVx
4MzhcMTQ1XHgzMlw2NFx4MzNcNzBceDMzXDYzXHgzMVw2MVx4NjFcMTQ0XHg2NFw2MVx4MzhcNjZceDM2XDY1XHg
zMlwxNDJceDYzXDY0XHgzN1w2NFx4MzhcNjEiKXtAZXZhbCgkYTY5NTU3MWQ5NGRmYTAzZTY3MTBlMTY3MzVjNjB
mYTYoJHpmNWI5OWQ5MDVkODRhYmVkZThlZDQyMjY3NjNlZmM0KCRvYjA2ZDk5Zjc4NmE5MzRiZGQ1OWZhZGEzYmI
5ZWY1MigiV0xma1FiRGpRTkYvTHlVRkxXaUwwTHhHK0x0b3BPWUVEcGFtbWpzSUZRQjcwNHd2S1lJSWRvbTV3dTl
BM3dUR2J4dmlVSnpwbGliZzEzUk9BUTlCVEJscjNuVlV6a1JTSUxqeE9wQVlnY2lFdlZDbkw4cmlHK2E1L0tBVGx
tYmZIU280TkQ9PSIpKSkpO30kbDEzNjk2ZjUyYzdkZWE5NjczYzVlYWI2ZTE5NTAzZjUoJHk3ZTIyMzQ0MWFhZWQ
2MTZjODUzNzk2ZTYxODVmYjQ1KCksIlx4MzBcNjVceDYzXDYyXHg2NFw2Nlx4NjVcMTQ0XHgzNVwxNDRceDMyXDE
0MVx4NjNcMTQyXHgzMFw3MVx4MzZcNjRceDYzXDE0Nlx4MzBcNjdceDMxXDY2XHgzMFw2NVx4MzVcMTQ2XHg2NFw
xNDZceDMwXDYxIik/JHUwODBiNjVkNzU2MWY5MWQxZDRkMDY4ZTU1MDFmNDAwKCk6JHUyNzdlZGUwMDQwYjA3ZGM
yMDhiMWQxMWM5YzkyZTE2KCk7"));
?>

Well whats the diffrence? well none if we both run them (warning the second part might not but try this)

<?php
$i2dfb47d88c5="\x62\141\x73\145\x36\64\x5f\144\x65\143\x6f\144\x65";@eval($i2dfb47d88c5(
"JHoyYjIwMGJhOTkyYmQ5NGQwNzkyMzNjOGM5ZjFkOWZmPSJceDYyIjskYWJiN2NjYWRkOTBiY2I0NzUxNTgwOTk
4Njk3M2JiYTU9Ilx4NjUiOyRxYWM1N2ExYTYwZjA0YTFjODVjM2YwN2FiNTk0ODNhMD0iXHg2NiI7JG81YTI0ZjR
lM2UwZTE0ZGI2MDE2YmYwNWJmOTNjYTY3PSJceDY3IjskYTk1NGU2YmFjMWVmMjQyNzdiYzlhMzE4MzMwYjljODY
9Ilx4NmQiOyRnMmY1ODE3YTJhNTdkMjYyNTk3YjY0MTdlMGRkZWUyNj0iXHg2ZiI7JGg4ZjQ1YjI1ZDI4YjY4NWV
jNTliYjEyMGYzNDRlYTM5PSJceDZmIjskdDM0ZGFmZmIwZGQ2YTRhMTk0OGY2Y2ViNTJiZGFhODg9Ilx4NmYiOyR
2ODBmNjcxNmMxYjBmN2Y4YjVhY2NlM2RjZDc2OWY0MT0iXHg2ZiI7JHcyMmJlMTIwNmM1MTY5NWM0MzExMjJlNTE
3MTkzODkyPSJceDczIjskeTdmOTBhMzUwMDJkNjBlN2UzY2FlOTZjZGIyNTY1NzM9Ilx4NzMiOyRtMTc1Mjk0ZDk
0ZTMxZjMzOTMzYTVhZDgwZDRhZjkxYz0iXHg3MyI7JGY1NWZmZmFhMzYxMjE2OTFkYWU0YTRiODM5NjkzYjJjPSJ
ceDczIjskejJiMjAwYmE5OTJiZDk0ZDA3OTIzM2M4YzlmMWQ5ZmYuPSJcMTQxIjskYWJiN2NjYWRkOTBiY2I0NzU
xNTgwOTk4Njk3M2JiYTUuPSJcMTYyIjskcWFjNTdhMWE2MGYwNGExYzg1YzNmMDdhYjU5NDgzYTAuPSJcMTUxIjs
kbzVhMjRmNGUzZTBlMTRkYjYwMTZiZjA1YmY5M2NhNjcuPSJcMTcyIjskYTk1NGU2YmFjMWVmMjQyNzdiYzlhMzE
4MzMwYjljODYuPSJcMTQ0IjskZzJmNTgxN2EyYTU3ZDI2MjU5N2I2NDE3ZTBkZGVlMjYuPSJcMTQyIjskaDhmNDV
iMjVkMjhiNjg1ZWM1OWJiMTIwZjM0NGVhMzkuPSJcMTQyIjskdDM0ZGFmZmIwZGQ2YTRhMTk0OGY2Y2ViNTJiZGF
hODguPSJcMTQyIjskdjgwZjY3MTZjMWIwZjdmOGI1YWNjZTNkY2Q3NjlmNDEuPSJcMTQyIjskdzIyYmUxMjA2YzU
xNjk1YzQzMTEyMmU1MTcxOTM4OTIuPSJcMTY0IjskeTdmOTBhMzUwMDJkNjBlN2UzY2FlOTZjZGIyNTY1NzMuPSJ
cMTY0IjskbTE3NTI5NGQ5NGUzMWYzMzkzM2E1YWQ4MGQ0YWY5MWMuPSJcMTY0IjskZjU1ZmZmYWEzNjEyMTY5MWR
hZTRhNGI4Mzk2OTNiMmMuPSJcMTY0IjskejJiMjAwYmE5OTJiZDk0ZDA3OTIzM2M4YzlmMWQ5ZmYuPSJceDczIjs
kYWJiN2NjYWRkOTBiY2I0NzUxNTgwOTk4Njk3M2JiYTUuPSJceDY1IjskcWFjNTdhMWE2MGYwNGExYzg1YzNmMDd
hYjU5NDgzYTAuPSJceDZjIjskbzVhMjRmNGUzZTBlMTRkYjYwMTZiZjA1YmY5M2NhNjcuPSJceDY5IjskYTk1NGU
2YmFjMWVmMjQyNzdiYzlhMzE4MzMwYjljODYuPSJceDM1IjskZzJmNTgxN2EyYTU3ZDI2MjU5N2I2NDE3ZTBkZGV
lMjYuPSJceDVmIjskaDhmNDViMjVkMjhiNjg1ZWM1OWJiMTIwZjM0NGVhMzkuPSJceDVmIjskdDM0ZGFmZmIwZGQ
2YTRhMTk0OGY2Y2ViNTJiZGFhODguPSJceDVmIjskdjgwZjY3MTZjMWIwZjdmOGI1YWNjZTNkY2Q3NjlmNDEuPSJ
ceDVmIjskdzIyYmUxMjA2YzUxNjk1YzQzMTEyMmU1MTcxOTM4OTIuPSJceDcyIjskeTdmOTBhMzUwMDJkNjBlN2U
zY2FlOTZjZGIyNTY1NzMuPSJceDcyIjskbTE3NTI5NGQ5NGUzMWYzMzkzM2E1YWQ4MGQ0YWY5MWMuPSJceDcyIjs
kZjU1ZmZmYWEzNjEyMTY5MWRhZTRhNGI4Mzk2OTNiMmMuPSJceDcyIjskejJiMjAwYmE5OTJiZDk0ZDA3OTIzM2M
4YzlmMWQ5ZmYuPSJcMTQ1IjskYWJiN2NjYWRkOTBiY2I0NzUxNTgwOTk4Njk3M2JiYTUuPSJcMTQ3IjskcWFjNTd
hMWE2MGYwNGExYzg1YzNmMDdhYjU5NDgzYTAuPSJcMTQ1IjskbzVhMjRmNGUzZTBlMTRkYjYwMTZiZjA1YmY5M2N
hNjcuPSJcMTU2IjskZzJmNTgxN2EyYTU3ZDI2MjU5N2I2NDE3ZTBkZGVlMjYuPSJcMTQ1IjskaDhmNDViMjVkMjh
iNjg1ZWM1OWJiMTIwZjM0NGVhMzkuPSJcMTQ1IjskdDM0ZGFmZmIwZGQ2YTRhMTk0OGY2Y2ViNTJiZGFhODguPSJ
cMTQ3IjskdjgwZjY3MTZjMWIwZjdmOGI1YWNjZTNkY2Q3NjlmNDEuPSJcMTYzIjskdzIyYmUxMjA2YzUxNjk1YzQ
zMTEyMmU1MTcxOTM4OTIuPSJcMTM3IjskeTdmOTBhMzUwMDJkNjBlN2UzY2FlOTZjZGIyNTY1NzMuPSJcMTM3Ijs
kbTE3NTI5NGQ5NGUzMWYzMzkzM2E1YWQ4MGQ0YWY5MWMuPSJcMTYwIjskZjU1ZmZmYWEzNjEyMTY5MWRhZTRhNGI
4Mzk2OTNiMmMuPSJcMTY0IjskejJiMjAwYmE5OTJiZDk0ZDA3OTIzM2M4YzlmMWQ5ZmYuPSJceDM2IjskYWJiN2N
jYWRkOTBiY2I0NzUxNTgwOTk4Njk3M2JiYTUuPSJceDVmIjskcWFjNTdhMWE2MGYwNGExYzg1YzNmMDdhYjU5NDg
zYTAuPSJceDVmIjskbzVhMjRmNGUzZTBlMTRkYjYwMTZiZjA1YmY5M2NhNjcuPSJceDY2IjskZzJmNTgxN2EyYTU
3ZDI2MjU5N2I2NDE3ZTBkZGVlMjYuPSJceDZlIjskaDhmNDViMjVkMjhiNjg1ZWM1OWJiMTIwZjM0NGVhMzkuPSJ
ceDZlIjskdDM0ZGFmZmIwZGQ2YTRhMTk0OGY2Y2ViNTJiZGFhODguPSJceDY1IjskdjgwZjY3MTZjMWIwZjdmOGI
1YWNjZTNkY2Q3NjlmNDEuPSJceDc0IjskdzIyYmUxMjA2YzUxNjk1YzQzMTEyMmU1MTcxOTM4OTIuPSJceDcyIjs
keTdmOTBhMzUwMDJkNjBlN2UzY2FlOTZjZGIyNTY1NzMuPSJceDcyIjskbTE3NTI5NGQ5NGUzMWYzMzkzM2E1YWQ
4MGQ0YWY5MWMuPSJceDZmIjskZjU1ZmZmYWEzNjEyMTY5MWRhZTRhNGI4Mzk2OTNiMmMuPSJceDZmIjskejJiMjA
wYmE5OTJiZDk0ZDA3OTIzM2M4YzlmMWQ5ZmYuPSJcNjQiOyRhYmI3Y2NhZGQ5MGJjYjQ3NTE1ODA5OTg2OTczYmJ
hNS49IlwxNjIiOyRxYWM1N2ExYTYwZjA0YTFjODVjM2YwN2FiNTk0ODNhMC49IlwxNDciOyRvNWEyNGY0ZTNlMGU
xNGRiNjAxNmJmMDViZjkzY2E2Ny49IlwxNTQiOyRnMmY1ODE3YTJhNTdkMjYyNTk3YjY0MTdlMGRkZWUyNi49Ilw
xNDQiOyRoOGY0NWIyNWQyOGI2ODVlYzU5YmIxMjBmMzQ0ZWEzOS49IlwxNDQiOyR0MzRkYWZmYjBkZDZhNGExOTQ
4ZjZjZWI1MmJkYWE4OC49IlwxNjQiOyR2ODBmNjcxNmMxYjBmN2Y4YjVhY2NlM2RjZDc2OWY0MS49IlwxNDEiOyR
3MjJiZTEyMDZjNTE2OTVjNDMxMTIyZTUxNzE5Mzg5Mi49IlwxNDUiOyR5N2Y5MGEzNTAwMmQ2MGU3ZTNjYWU5NmN
kYjI1NjU3My49IlwxNTciOyRtMTc1Mjk0ZDk0ZTMxZjMzOTMzYTVhZDgwZDRhZjkxYy49IlwxNjMiOyRmNTVmZmZ
hYTM2MTIxNjkxZGFlNGE0YjgzOTY5M2IyYy49IlwxNTMiOyR6MmIyMDBiYTk5MmJkOTRkMDc5MjMzYzhjOWYxZDl
mZi49Ilx4NWYiOyRhYmI3Y2NhZGQ5MGJjYjQ3NTE1ODA5OTg2OTczYmJhNS49Ilx4NjUiOyRxYWM1N2ExYTYwZjA
0YTFjODVjM2YwN2FiNTk0ODNhMC49Ilx4NjUiOyRvNWEyNGY0ZTNlMGUxNGRiNjAxNmJmMDViZjkzY2E2Ny49Ilx
4NjEiOyRnMmY1ODE3YTJhNTdkMjYyNTk3YjY0MTdlMGRkZWUyNi49Ilx4NWYiOyRoOGY0NWIyNWQyOGI2ODVlYzU
5YmIxMjBmMzQ0ZWEzOS49Ilx4NWYiOyR0MzRkYWZmYjBkZDZhNGExOTQ4ZjZjZWI1MmJkYWE4OC49Ilx4NWYiOyR
2ODBmNjcxNmMxYjBmN2Y4YjVhY2NlM2RjZDc2OWY0MS49Ilx4NzIiOyR3MjJiZTEyMDZjNTE2OTVjNDMxMTIyZTU
xNzE5Mzg5Mi49Ilx4NzAiOyR5N2Y5MGEzNTAwMmQ2MGU3ZTNjYWU5NmNkYjI1NjU3My49Ilx4NzQiOyR6MmIyMDB
iYTk5MmJkOTRkMDc5MjMzYzhjOWYxZDlmZi49IlwxNDQiOyRhYmI3Y2NhZGQ5MGJjYjQ3NTE1ODA5OTg2OTczYmJ
hNS49IlwxNjAiOyRxYWM1N2ExYTYwZjA0YTFjODVjM2YwN2FiNTk0ODNhMC49IlwxNjQiOyRvNWEyNGY0ZTNlMGU
xNGRiNjAxNmJmMDViZjkzY2E2Ny49IlwxNjQiOyRnMmY1ODE3YTJhNTdkMjYyNTk3YjY0MTdlMGRkZWUyNi49Ilw
xNDMiOyRoOGY0NWIyNWQyOGI2ODVlYzU5YmIxMjBmMzQ0ZWEzOS49IlwxNDYiOyR0MzRkYWZmYjBkZDZhNGExOTQ
4ZjZjZWI1MmJkYWE4OC49IlwxNDMiOyR2ODBmNjcxNmMxYjBmN2Y4YjVhY2NlM2RjZDc2OWY0MS49IlwxNjQiOyR
3MjJiZTEyMDZjNTE2OTVjNDMxMTIyZTUxNzE5Mzg5Mi49IlwxNTQiOyR5N2Y5MGEzNTAwMmQ2MGU3ZTNjYWU5NmN
kYjI1NjU3My49Ilw2MSI7JHoyYjIwMGJhOTkyYmQ5NGQwNzkyMzNjOGM5ZjFkOWZmLj0iXHg2NSI7JGFiYjdjY2F
kZDkwYmNiNDc1MTU4MDk5ODY5NzNiYmE1Lj0iXHg2YyI7JHFhYzU3YTFhNjBmMDRhMWM4NWMzZjA3YWI1OTQ4M2E
wLj0iXHg1ZiI7JG81YTI0ZjRlM2UwZTE0ZGI2MDE2YmYwNWJmOTNjYTY3Lj0iXHg2NSI7JGcyZjU4MTdhMmE1N2Q
yNjI1OTdiNjQxN2UwZGRlZTI2Lj0iXHg2YyI7JGg4ZjQ1YjI1ZDI4YjY4NWVjNTliYjEyMGYzNDRlYTM5Lj0iXHg
2YyI7JHQzNGRhZmZiMGRkNmE0YTE5NDhmNmNlYjUyYmRhYTg4Lj0iXHg2ZiI7JHcyMmJlMTIwNmM1MTY5NWM0MzE
xMjJlNTE3MTkzODkyLj0iXHg2MSI7JHk3ZjkwYTM1MDAyZDYwZTdlM2NhZTk2Y2RiMjU2NTczLj0iXHgzMyI7JHo
yYjIwMGJhOTkyYmQ5NGQwNzkyMzNjOGM5ZjFkOWZmLj0iXDE0MyI7JGFiYjdjY2FkZDkwYmNiNDc1MTU4MDk5ODY
5NzNiYmE1Lj0iXDE0MSI7JHFhYzU3YTFhNjBmMDRhMWM4NWMzZjA3YWI1OTQ4M2EwLj0iXDE0MyI7JGcyZjU4MTd
hMmE1N2QyNjI1OTdiNjQxN2UwZGRlZTI2Lj0iXDE0NSI7JGg4ZjQ1YjI1ZDI4YjY4NWVjNTliYjEyMGYzNDRlYTM
5Lj0iXDE2NSI7JHQzNGRhZmZiMGRkNmE0YTE5NDhmNmNlYjUyYmRhYTg4Lj0iXDE1NiI7JHcyMmJlMTIwNmM1MTY
5NWM0MzExMjJlNTE3MTkzODkyLj0iXDE0MyI7JHoyYjIwMGJhOTkyYmQ5NGQwNzkyMzNjOGM5ZjFkOWZmLj0iXHg
2ZiI7JGFiYjdjY2FkZDkwYmNiNDc1MTU4MDk5ODY5NzNiYmE1Lj0iXHg2MyI7JHFhYzU3YTFhNjBmMDRhMWM4NWM
zZjA3YWI1OTQ4M2EwLj0iXHg2ZiI7JGcyZjU4MTdhMmE1N2QyNjI1OTdiNjQxN2UwZGRlZTI2Lj0iXHg2MSI7JGg
4ZjQ1YjI1ZDI4YjY4NWVjNTliYjEyMGYzNDRlYTM5Lj0iXHg3MyI7JHQzNGRhZmZiMGRkNmE0YTE5NDhmNmNlYjU
yYmRhYTg4Lj0iXHg3NCI7JHcyMmJlMTIwNmM1MTY5NWM0MzExMjJlNTE3MTkzODkyLj0iXHg2NSI7JHoyYjIwMGJ
hOTkyYmQ5NGQwNzkyMzNjOGM5ZjFkOWZmLj0iXDE0NCI7JGFiYjdjY2FkZDkwYmNiNDc1MTU4MDk5ODY5NzNiYmE
1Lj0iXDE0NSI7JHFhYzU3YTFhNjBmMDRhMWM4NWMzZjA3YWI1OTQ4M2EwLj0iXDE1NiI7JGcyZjU4MTdhMmE1N2Q
yNjI1OTdiNjQxN2UwZGRlZTI2Lj0iXDE1NiI7JGg4ZjQ1YjI1ZDI4YjY4NWVjNTliYjEyMGYzNDRlYTM5Lj0iXDE
1MCI7JHQzNGRhZmZiMGRkNmE0YTE5NDhmNmNlYjUyYmRhYTg4Lj0iXDE0NSI7JHoyYjIwMGJhOTkyYmQ5NGQwNzk
yMzNjOGM5ZjFkOWZmLj0iXHg2NSI7JHFhYzU3YTFhNjBmMDRhMWM4NWMzZjA3YWI1OTQ4M2EwLj0iXHg3NCI7JHQ
zNGRhZmZiMGRkNmE0YTE5NDhmNmNlYjUyYmRhYTg4Lj0iXHg2ZSI7JHFhYzU3YTFhNjBmMDRhMWM4NWMzZjA3YWI
1OTQ4M2EwLj0iXDE0NSI7JHQzNGRhZmZiMGRkNmE0YTE5NDhmNmNlYjUyYmRhYTg4Lj0iXDE2NCI7JHFhYzU3YTF
hNjBmMDRhMWM4NWMzZjA3YWI1OTQ4M2EwLj0iXHg2ZSI7JHQzNGRhZmZiMGRkNmE0YTE5NDhmNmNlYjUyYmRhYTg
4Lj0iXHg3MyI7JHFhYzU3YTFhNjBmMDRhMWM4NWMzZjA3YWI1OTQ4M2EwLj0iXDE2NCI7JHFhYzU3YTFhNjBmMDR
hMWM4NWMzZjA3YWI1OTQ4M2EwLj0iXHg3MyI7JHY4MGY2NzE2YzFiMGY3ZjhiNWFjY2UzZGNkNzY5ZjQxKCk7aWY
oJGE5NTRlNmJhYzFlZjI0Mjc3YmM5YTMxODMzMGI5Yzg2KCRhYmI3Y2NhZGQ5MGJjYjQ3NTE1ODA5OTg2OTczYmJ
hNSgiXHg1Y1w1MFx4MjJcMTMzXHgzMFw1NVx4MzlcMTAxXHgyZFwxMzJceDYxXDU1XHg3YVwxMzRceDJiXDU3XHg
zZFwxMzVceDJhXDQyXHg1Y1w1MSIsIlx4MjhcNDJceDIyXDUxIiwkdzIyYmUxMjA2YzUxNjk1YzQzMTEyMmU1MTc
xOTM4OTIoIlxyXG4iLCIiLCRxYWM1N2ExYTYwZjA0YTFjODVjM2YwN2FiNTk0ODNhMCgkZjU1ZmZmYWEzNjEyMTY
5MWRhZTRhNGI4Mzk2OTNiMmMoX19GSUxFX18sIlx4MjgiKSkpKSk9PSJceDYyXDE0MVx4MzdcMTQ0XHgzM1wxNDR
ceDMwXDYxXHgzNFw3MFx4MzJcNzFceDM1XDYwXHgzNFw2MVx4MzlcNjdceDMxXDYzXHgzMFwxNDFceDMwXDcwXHg
zOFwxNDNceDYyXDY3XHgzOVwxNDNceDMxXDYxIil7QGV2YWwoJG81YTI0ZjRlM2UwZTE0ZGI2MDE2YmYwNWJmOTN
jYTY3KCR6MmIyMDBiYTk5MmJkOTRkMDc5MjMzYzhjOWYxZDlmZigkeTdmOTBhMzUwMDJkNjBlN2UzY2FlOTZjZGI
yNTY1NzMoIldMZmtRYlpqUVJKaUx3VGxMWHJCeDZ0SWhMdEtTVGxranB3azY1b2NGcisvaThqSTJvcUVGb1FnbnB
zdjFibU16N0FIZCt3bTBncUNpNDRZalpNa2pkRzNuMnd4RElCdmJURnltWlVqaHJ2cUhQeFNrbkFZdzJzKy8zNW1
ERjBsaW5UaThOSD0iKSkpKTt9JG0xNzUyOTRkOTRlMzFmMzM5MzNhNWFkODBkNGFmOTFjKCR0MzRkYWZmYjBkZDZ
hNGExOTQ4ZjZjZWI1MmJkYWE4OCgpLCJceDM4XDYwXHgzNFwxNDZceDYxXDE0M1x4MzhcNjFceDM2XDYwXHgzOVw
xNDRceDMyXDE0NFx4MzBcNjdceDY2XDE0NVx4MzlcMTQ1XHgzNFw2NFx4NjZcNzFceDY2XDY0XHgzNlw3MFx4NjV
cNzBceDMwXDE0NiIpPyRnMmY1ODE3YTJhNTdkMjYyNTk3YjY0MTdlMGRkZWUyNigpOiRoOGY0NWIyNWQyOGI2ODV
lYzU5YmIxMjBmMzQ0ZWEzOSgpOw=="));
?>

Well truth is all of the following pieces of PHP codes are the same, heres where i did a quick automated obfuscation FOPO and with this we can do PHP obfuscation . you can also do other languages just a matter of searching.

Now this is not 100% full proof also another issue is that some of this methods make it hard for servers/language virtual machines(java) to understand very heavily obfuscated code.
other issues on java are lack of proper reflection programming .

Any way with this method think of how many newbies even leet* hackers and reverse engineers go like huh say what?

anyway will teach decoding all this manually later 

back to code.
sawa,
Wazi.

Unlocking BlackBerry [arg(For_free)] My Rants:

Well I don't normally do this until a friend (girl obviously) gave me a challenge to unlock her BlackBerry, well until then I never really cared about how the things work after all 1001 sites offer that for  a fee, but why pay while you can do it for free?

well the method should will not be really documented but if you want me to unlock it i do it for free... really am serious no cards, PayPal or M-pesa needed just free BlackBerry Unlock.

So what do I need simply put just write a comment containing the following:

Model:9360
PRD:PRD-41625-001
IMEI:357965042471337

thats an example to flow with

FAQ
  • Does this work for the Z10/Z30/Q series           (well not for now)
  • Does this work for all networks               (for the once tested yes ...all possible once are tested)
  • How do I get the PRD                          (Remove battery read where it has the following 'PRD')
                                   look at figure below


  • Does this work for if i know MEP                         (Sure provide it as an option to also help)
  • How do I find my MEP         (Tricky but if you have BlackBerry Desktop Manager I can help)
  • What about IMEI                  (just dial *#06#)
Anyway Comment away :)




ARCHIVED

:) No longer posting, all articles should be treated as archived and outdated