20.04.2013 Views

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ight commands to bring those things to her doorstep. Of course,<br />

sooner or later the people the hacker is ripping off are going to find<br />

out and cut power, send her bills, reclaim property (and possibly<br />

break her hands), so a hacker spoofing her way through life has to<br />

be constantly juggling her needs and extras, re-issuing commands,<br />

switching services, and grabbing new access IDs all the time.<br />

> The phrase “living on borrowed time” comes to mind.<br />

> Icarus<br />

tooLS of tHe trade<br />

Posted By: Slamm-0!<br />

Being a hacker isn’t all about buying a better commlink or<br />

upgrading your warez—you want to hone your skills to compete<br />

with the likes of yours truly, and you’ll need to learn a few of the<br />

tools of the trade that they don’t teach in the after-hour comp-sci<br />

classes at the local pub.<br />

expLoitS<br />

Any good hacker knows that an exploit doesn’t just happen;<br />

you have to make it happen. If you wait for the perfect flaw to cross<br />

your path, you’re never going to get anywhere as a hacker. You have<br />

to go out and look at the code, see where the ambiguity lies, and<br />

keep an open and creative mind for how to tweak your programs<br />

to take maximum advantage of the opportunities that exist.<br />

When you get down to it, exploits are the most basic<br />

building block in a hacker’s arsenal. Every attack program, every<br />

strategy or tactic for bypassing security, every hardware or software<br />

hack is based around an exploit of one form or another.<br />

Without an exploit, no user would have privileges beyond those<br />

basic access rights assigned to them. Without exploits, there<br />

would be no hackers.<br />

> And the armies of darkness would march across the face of the<br />

Matrix …<br />

> Glitch<br />

Most exploits aren’t due to programmer faults or deliberate<br />

flaws placed in the program by skilled and foresighted hackers;<br />

they come about from translation errors or slight incompatibilities<br />

between different code, creating ambiguities that a skilled user<br />

can take advantage of to do things they aren’t suppose to be able<br />

to do—such as bypass system security or other safeguards. The<br />

Matrix has so many layers of code that it is practically impossible<br />

to prevent exploits in code, not that programmers ever stop trying<br />

to make flawless code, or spiders stop patching up new exploits as<br />

they’re discovered.<br />

A new exploit is worth its weight in gold radicals, and hackers<br />

tend to hoard them—the less often an exploit is used, the less<br />

likely it is to be discovered and patched. On the other hand, data<br />

brokers (and even other hackers) are always on the lookout for a<br />

good exploit and will trade in cred or favors for them.<br />

BLack Matrix Service providerS<br />

People like us need to access the Matrix, and for that you<br />

need a Matrix Service Provider (MSP). Of course, without a SIN<br />

(or not wanting to give out a SIN), we need an MSP that will<br />

accept straight cred and not ask any questions: a black MSP. Some<br />

Unwired<br />

of these services border on the legal, providing the same services<br />

as regular MSPs without asking for SINs, while others are hacked<br />

accounts on a normal MSP or strictly illegal operations set up by<br />

Matrix syndicates, which tend to offer special services like anonymizers,<br />

one-shot commcodes, dead-drop e-mail boxes, and credit<br />

laundering services.<br />

anarkh<br />

One of the many free shadowy MSPs available to shadowrunners<br />

and the SINless, Anarkh is a no-frills black MSP that offers<br />

only the most basic service—a commcode. But there’s no ads and<br />

no charge. I wouldn’t leave any files in your mailbox (ever), and<br />

it can be hacked by a couple college students on brainbenders …<br />

but hey! Free!<br />

anonymizers and re-Mailers<br />

While not always illegal, a good portion of the anonymizers<br />

and re-mailers available on the Matrix are run by Matrix gangs, or<br />

as under-the-table start-ups by enterprising spiders and programmers<br />

in little-used corporate nodes. The advantage of the shadowy<br />

anonymizers is they don’t have to work with law enforcement; the<br />

downside is that they’re less trustworthy than legitimate Matrix<br />

security corps. Both cost about the same for their level of service.<br />

fuchi telecomm<br />

A lingering remnant of Fuchi Industrial Electronics, this<br />

splinter corporation was lost in the shuffle as the megacorps<br />

squabbled over the remains of the former AAA megacorp. Because<br />

of lingering contractual obligations, NeoNET has to allow Fuchi<br />

Telecomm access to the new Matrix protocols for existing customers.<br />

Of course, by the same obligations, Fuchi Telecomm can’t<br />

accept any new customers, so there’s a brisk under-the-table trade<br />

in existing accounts. Billing doesn’t care to know the SIN as long<br />

as they’re paid at the beginning of every month. They don’t give<br />

you agents, but they do offer anonymizer and re-mailer services<br />

for a nominal fee.<br />

one-Shots<br />

A service exclusive to the larger and more organized black<br />

MSPs are one-shot commcodes, good for a set period of time<br />

(usually 24 hours after activation, though this varies from provider<br />

to provider) or the duration of a single continuous Matrix<br />

session (up to the maximum period), and then all traces of the<br />

commcode are erased. Shadowrunners usually use one-shots<br />

when they need limited Matrix access, or they don’t want to<br />

worry about being sloppy.<br />

pusan Undernet<br />

An affiliate of the Choson Ring in Seattle, the Pusan<br />

Undernet is typical of the larger and more organized black MSPs,<br />

the type that charges as much (or often more) than a comparable<br />

premium MSP but offers additional services in the form of oneshot<br />

commcodes, numbered credit accounts, and escrow services.<br />

BackdoorS<br />

In hacker parlance, a backdoor is a hidden account or deliberately<br />

programmed security flaw that lets you access a particular<br />

system easier. People can get really paranoid about backdoors because<br />

Simon Wentworth (order #1132857) 9<br />

85<br />

hacker’s handbook . . . . . . . . . . . . . . . . . . . . . . . . . .

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!