Google

Monday, March 10, 2008

Identity Protection

"What Exactly is LifeLock Identity Protection?

Identity theft is one of the fastest growing crimes today. By now hundreds of thousands of Americans have been victimized by this kind of financial crime. From kids to adults to the elderly, no one is spared from identity theft.

If you get victimized by this crime, you will work very hard to get your life back to the way it was. Your credit score will be ruined, lose your home, and some evenSign Up Now for Lifelock! experienced getting imprisoned for a crime that they didn’t even commit.

If you want to protect your identity and you want to prevent becoming a victim of identity theft, then you may want to hire LifeLock. LifeLock offers total protection from identity theft. It is a company that is dedicated in providing you with a guarantee that identity theft will never happen to you.

In fact, LifeLock can even guarantee their services for up to a million dollars. If you become a victim of identity theft while you are in a LifeLock customer, they will guarantee your good name up to a million dollars.

LifeLock is one of the leading companies in identity theft protection. Even if would be thieves get a hold of your Social Security Number, you can be sure that LifeLock will be able to protect you.

So, if you don’t want to become a victim of identity theft, you may want to get protected under LifeLock. With LifeLock, you can be sure that you are well protected and keep your name as well as your credit score clean." -Lifelock

For those that are somewhat concerned about identity theft. Personally, I'd just keep my stuff to myself, and shred important things. I suppose once hit by it, I may change my story, but until then, it's worked just fine for the last twenty something years.

Monday, March 3, 2008

New Threats!

"At the DEFCON hackers' convention this summer, two researchers showed off a way to take control of a laptop through its wireless connection. The attack didn't target the operating system; it sought out specific flaws in the software that managed the wireless-networking hardware." -by Robert Lemos

What does this mean to us? Though this is just a software vulnerability for the hardware, which would require software updates. But what if it was a vulnerability in the hardware's firmware, which would completely bypass the operating system, making EVERY system a target. This is somewhat like the change from phreakers(hacking phone's and telecommunication systems(who faded out)) to hackers(who found loops, and holes in software to make things perform in ways they weren't originally designed(not crackers)). This makes me wonder if we'll soon have a new breed of hackers that will be concentrating strictly on hardware issues. If so, the new exploits will be rather difficult to protect against. Short of firmware flashes, which 90% of box owners either A) don't know how to do, or B) are too lazy to do them.(*EDIT* Obviously firmware would still be in the same ballpark as software, but hardly anyone ever upgrades firmware, thus making it a longer wild exploit :/)

I will be keeping an eye out for these types of hacks as much as possible and keeping the blog updated with them.

Fun with Hex Editing.

For one of the missions on a site I head over to whilst bored, I was to find out the cd-key of the program, to register it. I was thinking it would be a little more difficult than it was, but to my dismay, it was rather easy. First, I grabbed the first hex editor I could find, and opened the app that was given to break. After a quick ascii search for "cd-key" I found it. Yay! Took longer to grab the hex editor than it did to find the cdkey :( Hex editing can be used in multiple ways:
According to Hex Editor Wikipedia:
"By using a hex editor, a user can see or edit the raw and exact contents of a file as opposed to the interpretation of the same content that other, higher level application software may associate with the file format. For example, this could be raw image data, in contrast to the way image editing software would interpret the same file.

In most hex editor applications the data of the computer file is represented as hexadecimal values grouped in two groups of 8 bytes and one group of 16 ASCII characters, nonprintable characters normally represented by a dot,(".") in the ASCII part.

The standard Unix shell command used to display (though not edit) a file in hexadecimal and octal is od."

So, by using a hex editor you can change just about anything you want. For example, back in the day, I used to use a hex editor to change spawn points on maps for a game I played. I won't dig into the things the 'bad' guys can do with it ^ cdkeys*cough* so we shall end it with this :D