decker tricks, show off your genius |
decker tricks, show off your genius |
Feb 8 2004, 07:07 AM
Post
#1
|
|
Immortal Elf Group: Members Posts: 11,410 Joined: 1-October 03 From: Pittsburgh Member No.: 5,670 |
came up with a neat trick for deckers i thought i'd share. it allows you to set up what amounts to a permant valid account on any host you're skilled enough to hack. all you need is a computer (programming) skill of 4+, and good Validate, Deception, and Read/Write programs. a high DF helps; if you can change modes, go for high masking.
first, create a command set with four operations. the operations are, in order, Validate Account, Send Data, Send Data, Null Operation (24 hrs). next, logon to the host and validate a user account. this allows you to do an Upload Data operation, so you can save your command script as a text file on the host, then Send Data to create an active copy of the script; with the valid account, you can do this without rolling dice. now, do a Null Operation (24 hrs) to activate the command set. the system will get +5 to its security value, which is why you want high masking. your work is done; log off. the command set waits 24 hrs, then validates a new user account (24 hrs is the minimum time a spoofed account will remain valid). with the new user account, it then does one Send Data to email you the new account information, then does a second Send Data to call up the saved copy of itself. using that, it does a Null Operation (24 hrs) to activate the new copy of the command set. the command set waits another 24 hrs, then kicks in. rinse, wash, repeat. partly as instruction and partly for the karma, i rolled out a character of mine performing this trick here. the character is GG Beat. |
|
|
Feb 8 2004, 07:53 AM
Post
#2
|
|
Moving Target Group: Members Posts: 184 Joined: 29-August 03 Member No.: 5,553 |
I've been doing something similar with command sets and Redirect Datatrail operations to bounce commcalls through Validated accounts in various secure hosts in order to foil tracing....
Err.. more info when I'm not scrambling to get ready for work.. |
|
|
Feb 8 2004, 08:21 AM
Post
#3
|
|
Running Target Group: Members Posts: 1,028 Joined: 9-November 02 From: The Republic of Vermont Member No.: 3,581 |
Congratulations. You've invented the rootkit.
|
|
|
Feb 8 2004, 08:24 AM
Post
#4
|
|
Immortal Elf Group: Members Posts: 11,410 Joined: 1-October 03 From: Pittsburgh Member No.: 5,670 |
indeed. i'm introducing near-mystical technology into the world of SR--such things shouldn't even be possible, given the level of technology in 206x !!
i think it's hilarious how hard you have to work to use basic hacker tricks, in SR. |
|
|
Feb 8 2004, 08:30 AM
Post
#5
|
|
Running Target Group: Members Posts: 1,049 Joined: 24-March 03 Member No.: 4,323 |
Unfortunately, this trick is less reliable with a company that employs security deckers.
|
|
|
Feb 8 2004, 08:34 AM
Post
#6
|
|
Running Target Group: Members Posts: 1,362 Joined: 3-October 03 From: Poway, San Diego County, CA, USA Member No.: 5,676 |
Self-replicating command sets. L33t. Of course, the one hitch is that you have to upload your e-mail address onto the host, giving security a potential lead on you if they find it.
|
|
|
Feb 8 2004, 08:47 AM
Post
#7
|
|
Neophyte Runner Group: Members Posts: 2,458 Joined: 22-March 03 From: I am a figment of my own imagination. Member No.: 4,302 |
Come on now. Every decker worth a grain of salt can make an anonymoose e-mail addy.
|
|
|
Feb 8 2004, 08:50 AM
Post
#8
|
|
Immortal Elf Group: Members Posts: 11,410 Joined: 1-October 03 From: Pittsburgh Member No.: 5,670 |
well, you probably don't want to do this trick on an actual host--better on a grid, where security is looser and traffic is higher.
|
|
|
Feb 8 2004, 10:51 PM
Post
#9
|
|||
Running Target Group: Members Posts: 1,047 Joined: 12-November 03 From: Perilously close to the Sioux Nation. Member No.: 5,818 |
:eek: How'd I get involved in this thread? ;) |
||
|
|||
Feb 8 2004, 10:56 PM
Post
#10
|
|
Moving Target Group: Members Posts: 973 Joined: 3-October 03 Member No.: 5,677 |
:rotfl:
|
|
|
Feb 8 2004, 11:03 PM
Post
#11
|
|
Immortal Elf Group: Members Posts: 11,410 Joined: 1-October 03 From: Pittsburgh Member No.: 5,670 |
Orient, i'm very interested in your auto-redirect scheme. i'm working up one myself, but if someone else has already done all the hard work...
|
|
|
Feb 9 2004, 04:55 AM
Post
#12
|
|
Running Target Group: Members Posts: 1,362 Joined: 3-October 03 From: Poway, San Diego County, CA, USA Member No.: 5,676 |
Okay, here comes the clue train, last stop you. Security deckers aren't above doing a little hacking themselves. So, security decker traces your anonymous e-mail address, hacks it, and looks through your inbox, sent messages folder, and the log that says where you jacked in from. Now, the log will be useless if you redirected your datatrail, since they can't trace your redirects without you being there to hit with a trace utility. And of course, you can download your received messages and erase everything as soon as you dl/send it. However, they can continue to monitor your account if they manage to get in unnoticed. So, unless you meteiculously cleanse your e-mail account, search it for dataworms and sniffer programs every time you log on, and change to a new pirate account regularly, regardless of whether you have reason to suspect it's been compromised, you can be monitored. And even if you do all that, that still leaves your enemies a small window to infect your account with a dataworm, and monitor the address until you log on, allowing them to monitor incoming messages. The only solution to this would be to have an agent guarding your account 24/7 to both watch for intruders and shoot down dataworm info dumps. Even this wouldn't be foolproof. No matter what you do, you will leave a datatrail of some sort.
|
|
|
Feb 9 2004, 05:33 AM
Post
#13
|
|
Shooting Target Group: Members Posts: 1,685 Joined: 17-August 02 Member No.: 3,123 |
Or you could send it to fifty thousand email boxes. The other 49,999 will delete "CLICK HERE FOR AWESOME SICK PORN jfi4u389fq20j f893f8934", but you'll be quite happy to use l: jfi4u389fq20j p: f893f8934 :)
|
|
|
Feb 9 2004, 06:21 AM
Post
#14
|
|
Immortal Elf Group: Members Posts: 11,410 Joined: 1-October 03 From: Pittsburgh Member No.: 5,670 |
even better, send a single email to one address, which in turn shotguns it out to however many addresses. that way, no one will be wondering why the grid's email traffic suddenly shot through the roof.
|
|
|
Feb 9 2004, 07:11 AM
Post
#15
|
|
Running Target Group: Members Posts: 1,362 Joined: 3-October 03 From: Poway, San Diego County, CA, USA Member No.: 5,676 |
You would be surprised at how many people actually open messages like that. :rotfl:
|
|
|
Feb 9 2004, 03:51 PM
Post
#16
|
|
Moving Target Group: Members Posts: 555 Joined: 11-August 03 Member No.: 5,408 |
Thats why you fill it with junk, your decker only cares about the name of the email.
|
|
|
Feb 9 2004, 05:04 PM
Post
#17
|
|||
Technomancer Group: Retired Admins Posts: 4,638 Joined: 2-October 02 From: Champaign, IL Member No.: 3,374 |
Indeed! If the company has security on the system, it's not going to take it long to notice that there are new accounts popping up. Specifically because there is such a thing as a Validate utility on the market, I'd have to imagine that any business that can afford a green-hard or higher would probably have some kind of smart frame or agent doing nothing but watching for this kind of activity. Specially because would be relatively cheap for a company to own such equipment and keep it running. Gotta give those programmers something to do! Now I just have to hope Elfie doesn't read that paragraph :) |
||
|
|||
Feb 9 2004, 05:59 PM
Post
#18
|
|
Runner Group: Members Posts: 3,035 Joined: 26-February 02 From: Anahiem, CA Member No.: 100 |
Dash: All you do there is add an extra step where the Decker needs to find the Smart Frame/Agent and hack it to ignore that new account. Or maybe you could somehow make the account look like it has been there all along or something. Either way, I'd give the Decker a way around it.
|
|
|
Feb 9 2004, 06:27 PM
Post
#19
|
|
Moving Target Group: Members Posts: 354 Joined: 1-April 03 From: Long Island, NY Member No.: 4,364 |
Of course there's a way around it. It's like chess. You move, I counter it, you counter my counter, etc. I just need a little work on my decker tricks if I'm going to survive (oh yeah, that'll be another thread).
|
|
|
Feb 9 2004, 07:20 PM
Post
#20
|
|
panda! Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
hmm, didnt know you could do a null ops inside a command set...
as for the redirect comcall commandset, its described in the matrix book under decker tricks. but i allways belived that you could only do make comcall on a RTG. this will make my decking days easyer as i can just call my onsite partners, i just hope that they have vibration only (or maybe a headphone)... |
|
|
Feb 10 2004, 12:15 AM
Post
#21
|
|
Running Target Group: Members Posts: 1,362 Joined: 3-October 03 From: Poway, San Diego County, CA, USA Member No.: 5,676 |
Yes, since the work week is 40 hours, and week is 168 hous long, a company would need 4 security deckers to have one on duty at all times. However, having a frame or agent on guard at all times is much more economical.
|
|
|
Feb 10 2004, 12:19 AM
Post
#22
|
|
Immortal Elf Group: Members Posts: 11,410 Joined: 1-October 03 From: Pittsburgh Member No.: 5,670 |
don't get me wrong, this isn't a trick you'd use on Lone Star. but, say, Angel Satcom? or, better yet, any number of random MSPs? (i do have to wonder about that discrepancy--in Matrix, it says your average MSP is an Orange-Average host; but in T:Matrix, it stats an average MSP as Green-Easy!)
|
|
|
Feb 10 2004, 05:43 AM
Post
#23
|
|
Target Group: Members Posts: 47 Joined: 26-June 03 From: Salt Lake City: Ute Nation Member No.: 4,811 |
Deckers love those throwaway MSP accounts. Head over to the cybercafe, order
a mocha-java, pop in this week's free UCASOL chip, register new account to be used later for less than legal purposes and then hit the newsfeeds. (You do at least skim the buisness news daily to keep that Evaluate program current - right?) :D |
|
|
Feb 10 2004, 09:37 AM
Post
#24
|
|
Immortal Elf Group: Members Posts: 11,410 Joined: 1-October 03 From: Pittsburgh Member No.: 5,670 |
don't need to. otaku are teh leet!
|
|
|
Feb 10 2004, 03:28 PM
Post
#25
|
|||
Technomancer Group: Retired Admins Posts: 4,638 Joined: 2-October 02 From: Champaign, IL Member No.: 3,374 |
Sure, like I was saying to Elfie yesteday, though, if you hack the agent and the group notices it, they know what the agent was protecting and no where to look for extraneous data. The response: hack more than one agent so they're not sure which one was the "important" hack. That of course, is more dangerous and could get you whacked by IC or anything else that happens to be in the system. |
||
|
|||
Lo-Fi Version | Time is now: 4th February 2025 - 05:43 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.