home *** CD-ROM | disk | FTP | other *** search
- ___________________________________________________________
-
- GUIDE TO (mostly) HARMLESS HACKING
-
- Vol 4 No. 1: The "MORE" series
-
- MORE on Hacker Wars on Internet Relay Chat (IRC)
- ____________________________________________________________
-
- Our thanks to Patrick Rutledge, Warbeast, Meltdown and k1neTiK, who all
- provided invaluable information on the burning question of the IRC world:
- help, they're nuking meee...
-
- What's the big deal about IRC and hackers? Sheesh, IRC is sooo easy to
- use... until you get on a server where hacker wars reign. What the heck do
- you do to keep from getting clobbered over and over again?
-
- Of course you could just decide your enemies can go to heck. But let's
- say
- you'd rather hang in there. You may want to hang in there because if you
- want to make friends quickly in the hacker world, one of the best ways is
- over Internet Relay Chat (IRC).
-
- On IRC a group of people type messages back and forth on a screen in
- almost
- real time. It can be more fun than Usenet where it can take from minutes to
- hours for people's replies to turn up. And unlike Usenet, if you say
- something you regret, it's soon gone from the screen. Ahem. That is, it will
- soon be gone if no one is logging the session.
-
- In some ways IRC is like CB radio, with lots of folks flaming and
- making
- fools of themselves in unique and irritating ways. So don't expect to see
- timeless wisdom and wit scrolling down your computer screen. But because IRC
- is such an inexpensive way for people from all over the world to quickly
- exchange ideas, it is widely used by hackers. Also, given the wars you can
- fight for control of IRC channels, it can give you a good hacker workout.
-
- To get on IRC you need both an IRC client program and you need to
- connect
- to a Web site or Internet Service Provider (ISP) that is running an IRC
- server program.
-
- ***********************
- Newbie note: Any program that uses a resource is called a "client." Any
- program that offers a resource is a "server." Your IRC client program runs
- on either your home computer or shell account computer and connects you to
- an IRC server program which runs on a remote computer somewhere on the
- Internet.
- ***********************
-
- You may already have an IRC server running on your ISP. Customer
- service at
- your ISP should be able to help you with instructions on how to use it. Even
- easier yet, if your Web browser is set up to use Java, you can run IRC
- straight from your browser once you have surfed into a Web-based IRC server.
-
- Where are good IRC servers for meeting other hackers?
-
- There are several IRC servers that usually offer hacker channels. EFNet
- (Eris-Free Network)links many IRC servers. It was originally started by the
- Eris FreeNet (ef.net). It is reputed to be a "war ground" where you might
- get a chance to really practice the IRC techniques we cover below.
-
- Undernet is one of the largest networks of IRC servers. The main
- purpose of
- Undernet is to be a friendly place with IRC wars under control. But this
- means, yes, lots of IRC cops! The operators of these IRC servers have
- permission to kill you not only from a channel but also from a server. Heck,
- they can ban you for good. They can even ban your whole domain.
-
- ************************************
- Newbie note: A domain is the last two (or sometimes three or four) parts of
- your email address. For example, aol.com is the domain name for America
- Online. If an IRC network were to ban the aol.com domain, that would mean
- every single person on America Online would be banned from it.
- ************************************
-
- ************************************
- You can get punched in the nose warning: If the sysadmins at your ISP were
- to find out that you had managed to get their entire domain banned from an
- IRC net on account of committing ICMP bombing or whatever, they will be
- truly mad at you! You will be lucky if the worst that happens is that you
- lose your account. You'd better hope that word doesn't get out to all the
- IRC addicts on your ISP that you were the dude that got you guys all kicked
- out.
- ************************************
-
- IRCNet is probably the same size if not larger than Undernet. IRCNet is
- basically the European/Australian split off from the old EFNet.
-
- Yes, IRC is a world-wide phenomenon. Get on the right IRC network and
- you
- can be making friends with hackers on any continent of the planet. There are
- at least 80 IRC networks in existence. To learn how to contact them, surf
- over to: http://www.irchelp.org/. You can locate additional IRC servers by
- surfing over to http://hotbot.com or http://digital.altavista.com and
- searching for "IRC server." Some IRC servers are ideal for the elite
- hacker, for example the l0pht server. Note that is a "zero" not an "O" in
- l0pht.
-
- ****************************************
- Evil genius tip: Get on an IRC server by telneting straight in through port
- 6667 at the domain name for that server.
- ****************************************
-
- But before you get too excited over trying out IRC, let us warn you.
- IRC is
- not so much phun any more because some d00dz aren't satisfied with using it
- to merely say naughty words and cast aspersions on people's ancestry and
- grooming habits. They get their laughs by kicking other people off IRC
- entirely. This is because they are too chicken to start brawls in bars. So
- they beat up on people in cyberspace where they don't have to fret over
- getting ouchies.
-
- But we're going to show some simple, effective ways to keep these
- lusers
- from ruining your IRC sessions. However, first you'll need to know some of
- the ways you can get kicked off IRC by these bullies.
-
- The simplest way to get in trouble is to accidentally give control of
- your
- IRC channel to an impostor whose goal is to kick you and your friends off.
-
- You see, the first person to start up a channel on an IRC server is
- automatically the operator (OP). The operator has the power to kick people
- off or invite people in. Also, if the operator wants to, he or she may pass
- operator status on to someone else.
-
- Ideally, when you leave the channel you would pass this status on to a
- friend your trust. Also, maybe someone who you think is your good buddy is
- begging you to please, please give him a turn being the operator. You may
- decide to hand over the OP to him or her in order to demonstrate friendship.
- But if you mess up and accidentally OP a bad guy who is pretending to be
- someone you know and trust, your fun chat can become history.
-
- One way to keep this all this obnoxious stuff from happening is to
- simply
- not OP people you do not know. But this is easier said than done. It is a
- friendly thing to give OP to your buddies. You may not want to appear stuck
- up by refusing to OP anyone. So if you are going to OP a friend, how can you
- really tell that IRC dude is your friend?
-
- Just because you recognize the nick (nickname), don't assume it's who
- you
- think it is! Check the host address associated with the nick by giving the
- command "/whois IRCnick" where "IRCnick" is the nickname of the person you
- want to check.
-
- This "/whois" command will give back to you the email address belonging
- to
- the person using that nick. If you see, for example, "d***@wannabe.net"
- instead of the address you expected, say friend@cool.com, then DO NOT OP
- him. Make the person explain who he or she is and why the email address is
- different.
-
- But entering a fake nick when entering an IRC server is only the
- simplest
- of ways someone can sabotage an IRC session. Your real trouble comes when
- people deploy "nukes" and "ICBMs" against you.
-
- "Nuking" is also known as "ICMP Bombing." This includes forged messages
- such as EOF (end of file), dead socket, redirect, etc.
-
- **************************************
- Newbie note: ICMP stands for Internet Control Message Protocol. This is an
- class of IRC attacks that go beyond exploiting quirks in the IRC server
- program to take advantage of major league hacking techniques based upon the
- way the Internet works.
- **************************************
- **************************************
- You can go to jail warning: ICMP attacks constitute illegal denial of
- service attacks. They are not just harmless harassment of a single person on
- IRC, but may affect an entire Internet host computer, disputing service to
- all who are using it.
- ***************************************
-
- For example, ICMP redirect messages are used by routers to tell other
- computers "Hey, quit sending me that stuff. Send it to routerx.foobar.net
- instead!" So an ICMP redirect message could cause your IRC messages to go to
- bit heaven instead of your chat channel.
-
- EOF stands for "end of file." "Dead socket" refers to connections such
- as
- your PPP session that you would be using with many IRC clients to connect to
- the Internet. If your IRC enemy spoofs a message that your socket is dead,
- your IRC chat session can't get any more input from you. That's what the
- program "ICMP Host Unreachable Bomber for Windows" does.
-
- Probably the most devastating IRC weapon is the flood ping, known as
- "ICBM
- flood or ICMPing." The idea is that a bully will find out what Internet host
- you are using, and then give the command "ping-f" to your host computer. Or
- even to your home computer. Yes, on IRC it is possible to identify the
- dynamically assigned IP address of your home computer and send stuff
- directly to your modem! If the bully has a decent computer, he or she may be
- able to ping yours badly enough to briefly knock you out of IRC. Then this
- character can take over your IRC session and may masquerade as you.
-
- **********************
- Newbie note: When you connect to the Internet with a point-to-point (PPP)
- connection, your ISP's host computer assigns you an Internet Protocol (IP)
- address which may be different every time you log on. This is called a
- "dynamically assigned IP address." In some cases, however, the ISP has
- arranged to assign the uses the same IP address each time.
- **********************
-
- Now let's consider in more detail the various types of flooding
- attacks on
- IRC.
-
- The purpose of flooding is to send so much garbage to a client that its
- connection to the IRC server either becomes useless or gets cut off.
-
- Text flooding is the simplest attack. For example, you could just hold
- down
- the "x" key and hit enter from time to time. This would keep the IRC screen
- filled with your junk and scroll the others' comments quickly off the
- screen. However, text flooding is almost always unsuccessful because almost
- any IRC client (the program you run on your computer) has text flood
- control. Even if it doesn't, text must pass through an IRC server. Most IRC
- servers also have text flood filters.
-
- Because text flooding is basically harmless, you are unlikely to suffer
- anything worse than getting banned or possibly K:lined for doing it.
-
- ******************************************
- Newbie note: "K:line" means to ban not just you, but anyone who is in your
- domain from an IRC server. For example, if you are a student at Giant State
- University with an email address of IRCd00d@giantstate.edu, then every
- person whose email address ends with "giantstate.edu" will also be banned.
- *******************************************
-
- Client to Client Protocol (CTCP) echo flooding is the most effective
- type
- of flood. This is sort of like the ping you send to determine whether a host
- computer is alive. It is a command used within IRC to check to see if
- someone is still on your IRC channel.
-
- How does the echo command work? To check whether someone is still on
- your
- IRC channel, give the command "/ctcp nick ECHO hello out there!" If "nick"
- (where "nick" is the IRC nickname of the person you are checking out) is
- still there, you get back "nick HELLO OUT THERE."
-
- What has happened is that your victim's IRC client program has
- automatically echoed whatever message you sent.
-
- But someone who wants to boot you off IRC can use the CTCP echo command
- to
- trick your IRC server into thinking you are hogging the channel with too
- much talking. This is because most IRC servers will automatically cut you
- off if you try text flooding.
-
- So CTCP echo flooding spoofs the IRC into falsely cutting someone off
- by
- causing the victim's IRC client to automatically keep on responding to a
- whole bunch of echo requests.
-
- Of course your attacker could also get booted off for making all those
- CTCP
- echo requests. But a knowledgeable attacker will either be working in
- league with some friends who will be doing the same thing to you or else be
- connected with several different nicks to that same IRC server. So by having
- different versions of him or herself in the form of software bots making
- those CTCP echo requests, the attacker stays on while the victim gets booted
- off.
-
- This attack is also fairly harmless, so people who get caught doing
- this
- will only get banned or maybe K:lined for their misbehavior.
-
- ******************************
- Newbie note: A "bot" is a computer program that acts kind of like a robot to
- go around and do things for you. Some bots are hard to tell from real
- people. For example, some IRC bots wait for someone to use bad language and
- respond to these naughty words in annoying ways.
- *************************************
-
- *************************************
- You can get punched in the nose warning: Bots are not permitted on the
- servers of the large networks. The IRC Cops who control hacker wars on these
- networks love nothing more than killing bots and banning the botrunners that
- they catch.
- **************************************
-
- A similar attack is CATCH ping. You can give the command "/ping nick"
- and
- the IRC client of the guy using that nick would respond to the IRC server
- with a message to be passed on to the guy who made the ping request saying
- "nick" is alive, and telling you how long it took for nick's IRC client
- program to respond. It's useful to know the response time because sometimes
- the Internet can be so slow it might take ten seconds or more to send an IRC
- message to other people on that IRC channel. So if someone seems to be
- taking a long time to reply to you, it may just be a slow Internet.
-
- Your attacker can also easily get the dynamically assigned IP (Internet
- protocol) address of your home computer and directly flood your modem. But
- just about every Unix IRC program has at least some CATCH flood protection
- in it. Again, we are looking at a fairly harmless kind of attack.
-
- So how do you handle IRC attacks? There are several programs that you
- can
- run with your Unix IRC program. Examples are the programs LiCe and Phoenix.
- These scripts will run in the background of your Unix IRC session and will
- automatically kick in some sort of protection (ignore, ban, kick) against
- attackers.
-
- If you are running a Windows-based IRC client, you may assume that like
- usual you are out of luck. In fact, when I first got on an IRC channel
- recently using Netscape 3.01 running on Win 95, the *first* thing the
- denizens of #hackers did was make fun of my operating system. Yeah, thanks.
- But in fact there are great IRC war programs for both Windows 95 and Unix.
-
- For Windows 95 you may wish to use the mIRC client program. You can
- download it from http://www.super-highway.net/users/govil/mirc40.html. It
- includes protection from ICMP ping flood. But this program isn't enough to
- handle all the IRC wars you may encounter. So you may wish to add the
- protection of the most user-friendly, powerful Windows 95 war script
- around: 7th Sphere. You can get it from http://www.localnet.com/~marcraz/.
-
- If you surf IRC from a Unix box, you'll want to try out IRCII. You can
- download it from ftp.undernet.org , in the directory /pub/irc/clients/unix,
- or http://www.irchelp.org/, or ftp://cs-ftp.bu.edu/irc/. For added
- protection, you may download LiCe from ftp://ftp.cibola.net/pub/irc/scripts.
- Ahem, at this same site you can also download the attack program Tick from
- /pub/irc/tick. But if you get Tick, just remember our "You can get punched
- in the nose" warning!
-
- *********************************
- Newbie note: For detailed instructions on how to run these IRC programs, see
- At http://www.irchelp.org/. Or go to Usenet and check out alt.irc.questions
- *********************************
-
- *********************************
- Evil genius tip: Want to know every excruciating technical detail about IRC?
- Check out RFC 1459 (The IRC protocol). You can find many copies of this ever
- popular RFC (Request for Comments) by doing a Web search.
- ********************************
-
- Now let's suppose you are all set up with an industrial strength IRC
- client
- program and war scripts. Does this mean you are ready to go to war on IRC?
-
- Us Happy Hacker folks don't recommend attacking people who take over OP
- status by force on IRC. Even if the other guys start it, remember this. If
- they were able to sneak into the channel and get OPs just like that, then
- chances are they are much more experienced and dangerous than you are.
- Until you become an IRC master yourself, we suggest you do no more than ask
- politely for OPs back.
-
- Better yet, "/ignore nick" the l00zer and join another channel. For
- instance, if #evilhaxorchat is taken over, just create #evilhaxorchat2 and
- "/invite IRCfriend" all your friends there. And remember to use what you
- learned in this Guide about the IRC whois command so that you DON'T OP
- people unless you know who they are.
-
- As Patrick Rutledge says, this might sound like a wimp move, but if you
- don't have a fighting chance, don't try - it might be more embarrassing for
- you in the long run. And if you start IRC warrioring and get K:lined off the
- system, just think about that purple nose and black eye you could get when
- all the other IRC dudes at your ISP or school find out who was the luser who
- got everyone banned.
-
- That's it for now. Now don't try any funny stuff, OK? Oh, no, they're
- nuking meee...
-
- ____________________________________________________________
-
- Want to see back issues of Guide to (mostly) Harmless Hacking? See either
- http://www.cs.utexas.edu/users/matt/hh.html (the official Happy Hacker
- archive site) or:
- http://www.geocities.com/TimesSquare/Arcade/4594
- http://www.silitoad.org
- http://base.kinetik.org
- http://www.anet-chi.com/~dsweir
- http://www.tacd.com/zines/gtmhh/
- http://ra.nilenet.com/~mjl/hacks/codez.htm
- http://www.ilf.net/brotherhood/index2.html
- http://www.magnum44.com/orion/entry.htm
- http://www.geocities.com/NapaValley/1613/main.html
-
- Subscribe to our discussion list by emailing to hacker@techbroker.com with
- message "subscribe"
- Want to share some kewl stuph with the Happy Hacker list? Correct mistakes?
- Send your messages to hacker@techbroker.com. To send me confidential email
- (please, no discussions of illegal activities) use cmeinel@techbroker.com
- and be sure to state in your message that you want me to keep this
- confidential. If you wish your message posted anonymously, please say so!
- Direct flames to dev/null@techbroker.com. Happy hacking!
- Copyright 1997 Carolyn P. Meinel. You may forward or post this GUIDE TO
- (mostly) HARMLESS HACKING on your Web site as long as you leave this notice
- at the end.
- ________________________________________________________
- Carolyn Meinel
- M/B Research -- The Technology Brokers
-
- --
- Matt Hinze <matt@cs.utexas.edu> OR <matth@mail.utexas.edu>
- PGP: http://keys.pgp.com:11371/pks/lookup?op=index&search=matt+hinze
- ICQ: 1301602 Please encrypt anything important.
- --
-