mm256.dat and mm2048.dat
See the specific page about these two
Micro$oft's
monsters that are haunting your own
computer (5 megabytes of concealed activity!)
Wanna have some "fun"? Type the following inside your Netscape URL window (Location):
about:memory-cache (you'll see the memory cache)
about:image-cache (you'll see a list of the cached images...)
about:global (you'll see global history entries)
about:cache (you'll see all disk cache statistics)
about:document (you'll get a new window with info about the current document)
Fun, eh?
You are being cracked
Have a look at DejaNews there you'll quickly discover
how many indications about your interests can be gained by EVERYBODY just
checking your usenet comments and mail (another good reason to use ALWAYS
anonymous remailers)...
this is really scary! Looks like the ideal playground for "blackemailers". All
the search engines are slowly building huge databases with your preferences, they also
react immediately to your search patterns... if you search for "tits" on
Yahoo, you'll get some hideous pub about (not free) smut-services, if you
search for "job", you'll get
some hideous pub about (not-free) career services... do you really believe that
all these data (about you) will be ever erased?
But we can try to 'stalk'
Dejanews... have a look here
How to search anonymously
All the main search engines KEEP TRACK of your search strings and of your
activity. There are on the web (very interesting) "search strings depots", listing
the most used search strings (yes, you have guessed it, they are mostly sex-related)
and you can even see 'on-line' the search actions performed by some users (on
some search engines) that do not know that you are 'watching their search' while
they perform (and refine) it... this is great fun. Another way to get at the search
strings that people use (which may be very well thought little masterpiece of 'exact'
searching, useful to learn the difficult art of searching correctly) is the "klebing"
method, explained elsewhere on my site.
As I have already explained in my "how to search" lessons, search engines
are only ONE of the search strategies and approaches you can use. Yet their importance
cannot be underestimated (that's the reason more and more search engines are popping
up like fungi nowadays) and you better learn how to defend yourself from their tracking
mechanisms. You should always try to use a dynamic IP (like compuserve or
aol: your IP address and host name should always be the more anonymous and "neutral" you
can get, if possible without any 'national' tag as well... see below Lord Caligo's
lesson and my comments on how to get 'bogus' IP-dynamic host names :-)
Anyway, for the more paranoids (or the more careful) among you, here is a link to
the anonymized Altavista
search form
(Courtesy of fravia+... do not leave your tracks around!)
Of course no real anonymity section would be complete without an explanation of
the above anonymizer...
Anonymous surfing
Crack the tricksters
You better begin to surf the Web anonymously if you want to be an
"old" cracker. The anonymizer will
allow you to do it whenever you feel like it. You actually do not need to visit
the anonymizer page: just remember, when
you smell a rat, to precede the *exact and complete* http://... address you
want to visit, writing
(even per hand in the "address" field of your browser)
"http://www.anonymizer.com:8080/"
before it. The spiders will then track your visit as "niobe.c2.com", or
something similar. Are there other "...:8080" URLs that allow this kind of
anonymity? Yes, many server (even if
they do not realize it), just find yours if you do not trust the anonymizer
(btw, :8081 works
as well, only with less "concurrence" :-)
I'm sure you'll appreciate
the fact that you
may nowadays telnet using a fake proxy! Indeed
there exist now a "Java Telnet Proxy Server"
that will allow a telnet applet connecting with any server on the Internet!
Here it is at
netobjective
And you can even choose the port!... Your little cracker's heart understand what this mean
as well
as I do, don't you? (and even if you don't understand now why this is
QUITE important I'm sure you will in due time :-)
Back to the top of this nice page
Cookies (and crookies :-)
Crack the browsers
We live in a world where software (and hardware) developments are neither
documented nor care to tell their user what's really going on under the hood (and under the
hoop). Still not convinced? You still believe that the society you live in cares from
something else than pushing you around along paths and patterns you are not even
supposed to see? Well, if it is so,
cookies may represent a very instructive example for you.
The Jar for your cookies
Use Netscape, like all sensible reversers do, DO NOT USE MS-Explorer: Micro$oft's Trojan Web_horse does not allow you to see its own traces, it's terribly slow in all its version, it is even more bugged
than Netscape's Navigator (how they could pull even more bugs than Netscape really beats me :-) and, globally, Micro$oft's products are only good for lamers and people that has been brain-washed by frills and advertising, as you'll learn perusing the material inside +HCU's project 9, the "Micro$oft bashing" project.
So use your good, relatively old and relatively stable Navigator version 3, that you may merrily reverse (in order to use its hidden functions to your advantage) using the material inside
+HCU's project 5 that deals with Netscape cracking (and the
many 'surprises' that are hidden inside the browsers you are using.
OK,
start your "cookies discovery" trip! You'll quickly see how very simple cookies (and there are much more nasty things
around, thank Javascript) can lay
some eggs inside your harddisk (inside your "cookies.txt" netscape file).
Cookies -together with Javascript programs and Java applets- are
the *FUTURE* of reverse engineering.
So study them.
Here is the coveted entrance to my cookies (and robots) pages
__
|
WARNING! Some of the cookies and of the secret robots pages
are
MICROSOFT EXPLORER HOSTILE
|
You may of course use Netscape,
if you want (Best version is version 3 NOT version 4),
but if you want to browse with a fast, complete and agile
application (LESS than one million bytes! MUCH more fast and MUCH more
configurable than the overbloated duo), you
better download Opera
right away... you'll never go back to the big Browsersaurii!
Anyway I'm warning you: don't use Micro$oft's puke on my site! (Watch it! Some pages just "play" hostility, some
are seriously hostile, so: don't complain
you have not been warned! :-)
|
Click on this to see three simple anti Micro$oft
Javascript applets
BTW, you may like to know already now which kind of cookie my pages will
plant inside your computer, don't worry, it's an harmless little thing and
looks like this (you may check later):
/fravia FALSE 872928000 fravia_cookie_noanon_page 1
Ah Ah! Die cookie die!
As you (should) already know, the best way to eliminate once
for all any cookies planting possibility is to create a directory
cookies.txt inside Netscape's directory
(where the file cookies.txt originally is). This directory
will get a GREATER priority than the targeted file, and all cookies will
be therefore sent to dev null. Ah Ah! Die cookie die! Once you have
created this new cookies.txt directory you may
quietly reset "Options"/ "Network preferences"/"protocols"/"show an alert before
accepting a cookie" to NO, in fact the sites that you will visit will "believe"
that they planted their silent cookies in your hardisk, and let you through without
delay, yet you will know that no cookie whatsoever has been planted. Ah Ah! Die cookie die!
Let's find out who
Crack the enemies
Internet Address finder
Stalker
page
You may want to have a look at my counter measures page or, more directly, at
my enemy tracking page, or, for some other funny
tricks to my corporate
survival tricks page in order to
grasp even better some useful techniques and approaches, yet you'll find tricks all over my site, for instance
on the links page, and of course on the search
engines page and inside all my "how to search" lessons.
Common tricks to lure wannaby anonymous
surfers
Crack the lamers
A common (in our trade) trick to lure wannaby anonymous surfers
is the "fake page" trick: here is
it is (courtesy of fravia)
1) set up a page which is not connected with any other page
2) put some goodies on it that the target needs badly
3) write (remailing) to the target and tell him to download the goodies
4) target downloads... he will be one of the very few(*) that your spiders
will track on the "fake" page in the following days
(*) Yes, he will not be the only one... somebody
else will nevertheless come and visit your "secret" page:
1) a robot i.e. an automated spider
looking for pages or information, logging, for instance, from Yahoo, but could also be private
(the older ones use funny spiders, BTW) mostly these spiders are simple
automated "logging in" from a
remote server... and yes! There are ways to "catch" them and "reverse
engineer" the kind of info
they are carring away: Master +Alistair has long ago promised a tutorial
on this strange art, let's hope
he'll write it asap :-)
2) a seeker (these are the guys that always check the full
directory of a URL location just in order to find
hidden pages there, simplest way is to use a /.rt command), or
3) the server administrator slaves.
But these few occurrences apart, you'll get a lot information about
your "anonymous" target (or your enemies will, if *YOU* are the target)
The Anonymity Essays
Fravia's Anonymity Academy
Well, this new section begins with some very interesting essays
by our colleague and friend LordCaligo, I hope to receive more contributions
from all the
anonymity wizards among my readers... else I will start writing and adding some
new essays myself... in the mean time you may also find interesting my
how to search the web lessons, where
I discuss subjects like 'combing', 'klebing' and automated retrieval of information through
intelligent agents, all matters which may be
quite relevant for anonymity purposes :-)
FAA: PHASE A by LordCaligo, 8 November 1997
How to create a
webpage with controversial contents
(FAA_001)
FAA: PHASE B by LordCaligo, 21 November 1997
How to have
free access to the net by fake-accounts
(FAA_002)
FAA: PHASE C by fravia+, 15 June 1997
Concealed and
hidden files inside your own computer
First essay: What's behind Micro$oft's mm256.dat and mm2048.dat files?
(FAA_003)
FAA: PHASE D by MML, 23 September 1997
Reversing Governmental Polices:
Internet access for the masses
Get access passwords sent to you and browse anonymously
(FAA_004)
FAA: PHASE E by -the_gonz, 25 November 1998
An easy way to stop the guys (from Redmond) to
snoop data inside your harddisk
An hardware attempt
for more safety while you┤re out on the web
(FAA_005)
FAA: PHASE F by a295225(at)hotmail, 25 June 1999
Better E-Mail Anonymity
The basics of SMTP and telnet used to explain how to enhance anonymity
(FAA_006)
Anonemail section
FAA: PHASE G by +Zer0, 24 September 1999
Making an anonymous mailer
Messing with data structures
(FAA_007)
Anonemail section
Wanna check the nice URL below? (Discover Janus' services...)
http://www.rewebber.com/surf_encrypted/MTAGtqqMSQPXgerK+zzE4o+YXD9iiYG1YZ6BzeY30IejBq4N14oyXtN7EErAqkCNahXInIfsF8IUMytcUBP3v3GQgLyfof1tagnZK6K6LOZvhJgcrG+h2evioU2Pz59DGgk=
How to mail anonymously:
How to post anonymously:
How to surf anonymously:
How to publish anonymously:
How to search anonymously:
Privacy on the web, never ending links
I will remind you of THREE useful digests related to privacy (and general
interesting reversing things :-)
* The RISKS Forum is a MODERATED digest. Its Usenet equivalent is
comp.risks. Peter Neumann of SRI International is the moderator of
this excellent and renowned Internet digest.
Read RISKS as a newsgroup (comp.risks or equivalent) if possible and
convenient for you. Alternatively, via majordomo, SEND DIRECT E-MAIL
REQUESTS to <risks-request@csl.sri.com> with one-line,
SUBSCRIBE (or UNSUBSCRIBE) [with net address if different from FROM:] or
INFO [for unabridged version of RISKS information]
The INFO file is also obtainable from
http://www.CSL.sri.com/risksinfo.html ftp://www.CSL.sri.com/pub/risks.info
ARCHIVES are available: ftp://ftp.sri.com/risks or
ftp ftp.sri.com
login anonymous
[YourNetAddress]
cd risks
* The PRIVACY Forum is run by Lauren Weinstein. It includes a digest (which
he moderates quite selectively), archive, and other features, such as
PRIVACY Forum Radio interviews. It is somewhat akin to RISKS; it spans
the full range of both technological and nontechnological privacy-related
issues (with an emphasis on the former). For information regarding the
PRIVACY Forum, please send the exact line:
information privacy
as the BODY of a message to "privacy-request@vortex.com"; you will receive
a response from an automated listserv system. To submit contributions,
send to "privacy@vortex.com".
PRIVACY Forum materials, including archive access/searching, additional
information, and all other facets, are available on the Web via:
http://www.vortex.com
* The Computer PRIVACY Digest (CPD) (formerly the Telecom Privacy digest) is
run by Leonard P. Levine. It is gatewayed to the USENET newsgroup
comp.society.privacy. It is a relatively open (i.e., less tightly moderated)
forum, and was established to provide a forum for discussion on the
effect of technology on privacy. All too often technology is way ahead of
the law and society as it presents us with new devices and applications.
Technology can enhance and detract from privacy. Submissions should go to
comp-privacy@uwm.edu and administrative requests to
comp-privacy-request@uwm.edu. (For example, vol 13, issue 031, 23 Dec
1998, has a long item on random credit-card fraud via small charges.)
There is clearly much potential for overlap between these digests.
Other related pages of my anonymity Lab
[corporate survival]
[stalking matters]
[enemy tracking]
[steganography]
[What Fravia knows about you]
[Tweak your browser!]
[Anonymous e-mailing]
[things that happen]
Fravia's main
homepage
links
+ORC
bots wars
students' essays
counter measures
bots wars
antismut CGI tricks
academy database
tools
javascript tricks
cocktails
search_forms
mail_fravia+
Is software reverse engineering illegal?
(c) Fravia, 1995, 1996, 1997, 1998, 1999.
All rights reserved, in the European Union and elsewhere