Notes by The ICQ & Trojan Box: We changed only the Layout of this Text... it has not been altered. (Back) |
The ICQ Security Tutorial / Written by
R a v e N
(blacksun.box.sk)
<===================================================================>
19/11/99, version 1.5
Author's notes: I'm getting tired of repeating myself*,
so please read my previous tutorials (located at http://blacksun.box.sk).
Otherwise, you might not understand some of the terminology.
* Until
recently, I had to repeat concepts and terminology that I already explained
about in previous tutorials so people who are just reading my first tutorial
won't have any difficulties understanding it. Well, I'm kinda tired of doing so,
and I'd rather spend my precious time on writing the actual content, so please
read my previous tutorials first.
Oh, by the way, I just want you to
understand that I am writing this tutorial in order to teach people how to
protect themselves. Also, I am not responsible for anything you do, but I do
recommend that you won't start stealing everyone's passwords and flooding people
etc'. Use this information in order to protect yourself.If you want to impress
someone, the best way is to protect him, not to attack him. This will show your
true power. ;-)
Anyway, have fun!
(Send comments or questions to
barakirs@netvision.net.il, or post them on our message board at
blacksun.box.sk)
What's new in this
version:
---------------------------
Version 1.2: added the "what's new"
thing.
Added appendixes A and B.
Version 1.3: added appendix C.
Version
1.4: added appendix D.
Table of
Contents
<===============>
What is ICQ?
* What does ICQ do?
*
What is it good for?
* Where can I get it?
* Before reading this
tutorial.
Why is ICQ so insecure?
* Client-side operations.
*
Sloppy programming and beta testing.
* Other instant messangers.
The
cracks
* What are cracks?
* What can ICQ cracks do for me?
* How do
they work, and why are such things possible?
* Where do I get them?
*
Unhiding IPs without the cracks
Flooding
* Various types of
floods.
* How do those programs really work?
* What to do when you are
being flooded.
Spoofing
* What is spoofing anyway?
* How can I
spoof ICQ events?
* How do those programs really work?
* Using spoofing to
play pranks on people
* Using spoofing to corrupt a person's DB.
*
Protecting yourself against DB corruptions.
ICQ homepage flaws
* What
is the ICQ homepage?
* How can I crash a person's ICQ client using flaws in
the ICQ homepage feature?
* How can I gain read access to a person's HD using
flaws in the ICQ homepage feature?
* On which versions will this
work?
Tricking ICQ's file transfer feature
* How can I send someone a
picture, a text file etc' that is actually a program?
* Why does this
happen?
Unhiding invisible users
* The web-aware option.
* Various
creative tricks.
Stealing passwords
* Stealing the DB.
* Exploiting
the forgotten passwords feature in ICQ's homepage.
* Guessing the
password.
Final notes
* To use or not to use?
* Why did AOL buy
Mirabilis for so much money?
* Running ICQ under Linux.
* Some rant about
ICQ chain letters.
Appendix A: Getting that little port by yourself
*
How do you do it?
* Why is it better to do this by yourself?
Appendix
B: The advantages of Unix ICQ clones
* Killing the "you were added"
notice.
* Getting the IP and port from the client with no need for any
patches.
* Built-in message spoofers.
Appendix C: IP ==> UIN
convertion by yourself
* Why would I wanna do this?
* How can I do
this?
Appendix D: More fun with contact lists
* How can I easily
delete someone's contact list without using a spoofer?
* How can I evade this
vicious trick?
Appendix E: Incredible tricks with the ICQ protocol
*
What cool tricks can I do once I learn the ICQ protocol?
* Where can I learn
the ICQ protocol?
Other tutorials by BSRF
* FTP Security.
*
Sendmail Security.
* Overclocking.
* Ad and Spam Blocking.
*
Anonymity.
* Info-Gathering.
* Phreaking.
* Advanced Phreaking.
*
More Phreaking.
* IRC Warfare.
* Proxies, Wingates and SOCKS
Firewalls.
* RM Networks.
* The Windows Registry.
* Cracking, part I
and II (III coming soon).
* Mailing List Security.
* HTML.
* IP
Masquerading.
* Cool info about computer hardware.
* The #2,000 "bug" in
IRC.
* The "javasCript" bug in Hotmail.
* Basic Local/Remote Unix
Security.
What is ICQ?
===========
ICQ stands for "I Seek You"
(witty little wordgame). It is an innovative program that was invented by
Mirabilis (a software company, which was later sold to AOL for about 400 million
U.S dollars in 1998). ICQ allows you to see whenever your best friends are
online, and to communicate with them. You can send text messages, URLs, chat
requests (you may have an ICQ chat with more than two users), transfer files,
send greeting cards, send voice messages etc' etc' etc'. Such a program is
called an "Instant Messanger".
IMHO (In My Humble Opinion) ICQ is the best
instant messanger out there. It beats the hell out of other instant messangers,
such as AIM (AOL Instant Messanger), Yahoo Instant Messanger, MSN Instant
Messanger, Gooey (which let's you talk to other people who are on the same
website as you are) etc'. ICQ also has the highest amount of users (I lost
count, but you can get the current amount of users at www.icq.com).
You can
download ICQ from www.icq.com or www.mirabilis.com (both domains point to the
exact same server).
ICQ is available for all versions of Windows and Mac. For
running ICQ under Linux, see the final notes chapter.
NOTE: if you are new to
ICQ, please get used to it before you start reading this tutorial. Otherwise,
you might not understand everything and get frustrated. Anyway, play around with
it and see what you can do.
Why is ICQ so
insecure?
=======================
ICQ, being the wonderfully innovative
and useful program it is, is also quite insecure. This is because:
A) Too
many operations are done by the client (client-side operations).
B) The
people at Mirabilis are sloppy programmers.
Here, let me explain.
First of
all, client-side operations make ICQ more vulnerable to attacks because of
several reasons. Take message spoofing for example. It is possible to spoof
messages (send fake messages that will appear to be sent from a different user.
Don't worry, we'll get to that later) on ICQ, because ICQ will receive messages
from every IP. You see, some people choose to tell their client to send their
messages, while other prefer to send their messages through the server, so ICQ
will simply receive messages from anyone, not only the server. If all messages
were sent through the server, ICQ wouldn't have agreed to receive messages from
anyone else but the server, and it would have made spoofing messages and other
ICQ events (such as URLs, file transfers etc') much harder.
Another example:
the next chapter discussed about cracks for ICQ. Please read it and then return
back to this part (but please read the rest of this chapter first). Done
already? Wow, you're quick! Have you taken any special courses or anything?
Nevermind, forget it. Stupid joke... ;-)
So anyway, I don't know much about
software cracking, but I know that some of these cracks weren't possible to make
if all the operations were done by the ICQ servers.
Take the IP unhider crack
for example. Your ICQ needs other people's IP addresses in order to send them
events. If sending events was possible only through the server, your ICQ client
would have had to contact the server and tell it to send an event to this or
that UIN, without even knowing this UIN's IP. The server, on the other hand,
knows everyone's IPs, so he does the delivery for you. That way, the only way to
reveal a person's IP is to have access to the server, which would certainly be
much more difficult than downloading a crack and running it... ;-)
Second of
all, the guys at Mirabilis are quite sloppy with their programming. Don't get me
wrong, I'm not saying that I'm a better programmer than them. In fact, I suck at
programming. My code (in case you know nothing about programming, a source code
is all that stuff programmers write all day long while sitting in front of their
computer monitors. Code is a programmers' slang for source code) always looks
messy and I keep forgetting what I did five minutes ago. On the other hand, I'm
not saying that the people at Mirabilis are gods. Everyone makes mistakes, and I
believe most of their mistakes are done because of poor beta testing (to do beta
testing: the act of testing a program before it's final release to the
public).
Just in case you're wondering, ICQ is not the only instant messanger
out there that is vulnerable to various security holes. In fact, the least
secure instant messanger is the MSN (Microsoft Network) instant messanger
(shock, shock!). To learn about it's amazingly-idiotic and easily-exploitable
security holes, head off to our homepage (http://blacksun.box.sk), find the Byte
Me page and read about MSN instant messanger's security holes.
The
cracks
==========
First of all, a crack is a small executable file that
changes something in a certain program. For example: turns shareware programs
(software that may be freely distributed, but has some of the most important
features disabled, or stops operating after a number of days, unless you
register the program using a serial number) into registered programs, gives you
options you're not supposed to have etc'.
The ICQ cracks allow you
to:
A) View someone's IP address, even if he turned "don't show my IP" on
in his preferences menu.
B) Add someone to your contact list without
authorization.
C) Run more than one ICQ at the same time (in order to use
multiple UINs at the same time).
D) Add yourself to your own contact list
(this becomes quite useful in protecting yourself from DB corruptions. See the
spoofing chapter for more information).
If you've already read the
previous chapter (why is ICQ so insecure), you should know by now why these
cracks work. But if your question is how... well, I'm not exactly a "cracking
guru"... I know very little about cracking (relatively, of course. I don't wanna
show off, but I do know how these cracks are made, and how to operate cracking
software such as SoftIce, procdump, various unpackers etc'), so I don't want to
provide you with any false information. If you want cracking tutorials, I
suggest going to neworder.box.sk and entering the cracking section.
Ok,
moving on. The best crack-pack for ICQ is, IMHO, IsoaQ. You can get it at
http://thor.prohosting.com/~bornic. Using it is quite simple. If you have any
problems with it, read the FAQ that is attached to the package (I recommend
reading it anyway. It contains some interesting
information).
Flooding
========
Flooding menas, of course, flooding
someone else with tons of messages or any other events. There are several ways
to flood someone's ICQ:
A) The first way is, of course, double-clicking
someone's name in your contact list, writing a message, copying it, sending it,
and then double-clicking on his name again, pressing paste, sending,
double-clicking again, pressing paste, sending... as you can see, this is quite
frustrating and ineffective.
B) Using a "canned" flooder (these kinds of
programs are often called "canned" programs, because they come like food in a
can - all you have to do is to open the can and eat. Of course, the food you
cook by yourself tastes much better, and gives you much more satisfaction. Well,
unless you're a bad cook... ;-) ).
These flooders have been programmed by
either people who learned the ICQ protocol by themselves by "eavasdropping" ICQ
or setting up a fake server on their computers and listening to what ICQ does,
or by other people who read some articles and tutorials and ran off to make a
flooder. Also, some flooders will do much more damage. They will send as many
messages as you tell them to, but instead of sending them all from one UIN, they
will send them one by one, each one from a fake UIN. That way, the victim will
suddently see his contact list filling with people he doesn't even know and fake
UINs, and be amazed to see that each one has sent him a single identical
message.
You can get a good flooder at www.warforge.com. It's a site
maintained by script kiddies and for script kiddies. A script kiddie, in case
you don't know yet, is a person that thinks he's a "hacker" because he uses
other people's software, often without even knowing how they work.
Anyway, I
personally don't advise you to start flooding people. This will only make you
look like either a lamer, a total jerk or both.
Oh, by the way, you'll need
the ICQ port in order to operate such a flooder. The ICQ port is a port that ICQ
opens and listens to. They are always somewhere between 1024 to 2000. All you
need is to scan this range with a regular portscanner and put a relatively high
timeout (one or two seconds).
Since these flooders and many other ICQ
"utilities" require the ICQ port to operate, you could open several ports in
that range in order to confuse lamers who try to flood you. You can do this by
either programming such a thing by yourself, playing around with /etc/inetd.conf
or other files if you're using Unix, using Netcat (the network administrator's
swiss army knife. Can be found, together with full documentation, of course, at
www.l0pht.org) or use some canned tool (again, www.warforge.com).
C) ICQ also
has a feature called Email Express. Let's suppose your UIN is 5917057 (just to
make things clear, it's not your UIN. Actually, it's my UIN... ;-) ). If someone
sends a message to 5917057@icq.com, you will receive it as an Email Express
message straight into your ICQ client. Now, what happens if you run some canned
mailbomber and flood this Email address? That's right, this person will get
flooded as well.
To protect yourself from such things, you can disable Email
Express from the preferences menu in ICQ. Also, I don't advise you to do such
things, not only because flooding is lame and idiotic, but also because the
victim will be able to see your Email address and your IP (to learn how to fake
Emails and the IPs in their headers, read my Sendmail tutorial).
If you've
been flooded, there are programs out there that will ask you to close your ICQ
client and will then simply erase every unread message (make sure you didn't get
any important messages while you were flooded). Again, such a program can be
found at www.warforge.com.
Spoofing
========
First of all, spoofing
is faking. For example: spoofing messages - faking messages, spoofing your IP -
faking your IP, etc'. Consider the word spoofing an alias to the word
faking.
Again, spoofing messages and other events or making programs that do
this is possible by learning the ICQ protocol. The best spoofer is called Lame
Toy, and again, you can get it at www.warforge.com.
You can play lots of fun
and amusing pranks on people using spoofers. For example: you can send people
messages from themselves, pretending to be their own computer or something, or
you could send someone a break-up letter from his beloved one (but you won't do
THAT, now would you? ;-) ). Lame Toy is also capable of spoofing other events,
such as URLs, file transfer requests, chat requests etc'.
Also, if you send
someone a message from himself and he adds himself to his contact list, the next
time he will start his ICQ client he will lose his entire contact list. This is
called a DB corruption. DB stands for DataBase. Your ICQ DB contains your entire
contact list and all of your private information and settings. It is stored in a
subdirectory in ICQ's directory which will either be called DB (in versions
older than ICQ99a), NewDB (in ICQ99a) or DB99b (in ICQ99b).
If the victim has
already added himself to his contact list and you want to see immediate results,
you could always DoS him so he'll have to reconnect to the net and restart
ICQ.
Anyway, such an action is cruel and quite illegal, so I suggest not
doing so. If you merely want to protect yourself, get a crack for ICQ that
allows you to add yourself to your own contact list (see the cracks
chapter).
Also, I recommend backing up your contact list once a
week.
ICQ homepage flaws
==================
ICQ homepage is a
feature that all ICQ versions since ICQ99a build #1700 have. It allows you to
open a small webserver on your own computer and put a nice little website on it
without any special knowledge. You will even have a nice counter, and be alerted
on ICQ whenever someone hits your webpage (unless you disable this feature, of
course). You could also serve numerous files from your own computer. Of course,
this website is up only when you are online, but since some people have either
LAN connections, DSL connections or other frame-relay connections which keep
them online 24 hours a day, 7 days a week, this feature could come to be quite
useful.
Now, let's move to the interesting part - how secure is this little
webserver?The ICQ homepage webserver that comes with ICQ99a builds #1700 and
#1701 is vulnerable to two enormously stupid attacks.
A) When you connect
to it manually (with either telnet, Netcat or any other program) and enter a
non-standard webserver command, it simply crashes and takes the victim's ICQ
client together with it. For example: the command get, combined with a
parameter, simply gets a certain file. For example: if you want the file
http://blacksun.box.sk/poop/shit.jpg (just for your information, there isn't
such a file on our server), you simply connect to blacksun.box.sk on port 80 and
type in "get /poop/shit.jpg" (without the quotes).
Now, if you connect to an
ICQ homepage webserver and simply type get without any parameters the webserver
crashes together with ICQ and you'll get a "connection lost" message.
On
newer versions of ICQ you will get a connection lost message as well, but this
time it's because the webserver simply closed the connection, not because it
crashed or anything.
B) The ICQ webserver's directory is c:\program
files\icq\homepage\ by default. Anything on this directory can be read by any
web browser (or telnet application, if you choose to surf with telnet for some
blurred and strange reason). But what if you had the option to climb up in this
field? You know, get to c:\program files\icq\, or even to c:\ and it's
subdirectories?This can be done with the ICQ webserver that comes with ICQ99a
buils #1700 and #1701. For example: if you want to read someone's system.ini
file, which is located at c:\windows\system.ini, you will need to climb up three
times to get from c:\program files\icq\homepage to c:\, and then climb down once
to get from c:\ to c:\windows. This can be done by accessing the following URL
on the victim's webserver: "/..../windows/system.ini" (without the quotes).
Here, let me explain.
One dot means "current directory". Two dots mean one
directory up. Three mean two up, and four, in our case, mean three directories
up. Once we climbed three directories up and got to c:\, we climb down to
c:\windows and then get to c:\windows\win.ini. This rule is universal, which
means it works on every OS (or at least every OS I know), including Windows,
which is the OS the ICQ webserver runs on.
Now, wait a second... we type in
this URL, but we got a 304 (forbidden) error. Oh, wait, I know why... this
webserver only allows us to access .html pages, .jpg files, .gif files and other
files that can be found on usual websites. It is very simple to trick this
stupid webserver. Simply type in this URL (again, without the quotes):
"/..../.html/windows/system.ini". Isn't this stupid or what?!You could also
download the victim's DB files and use them later to retrieve his password (see
the password stealing chapter). Hell, you could even use a download manager such
as GetRight, Go!Zilla, ReGet etc' to download it, 'cause the ICQ webserver
supports resuming!Note: newer versions of the ICQ homepage are not vulnerable to
this hole anymore.
Note: /../../../ is the same as .... (going up three
times).
Tricking ICQ's file transfer
feature
====================================
When you receive a file
transfer request from someone else, you can see the filename in a small text box
inside the request dialog box. But what happens if the filename is too long to
be displayed?Let's make an experiment. Take an executable file called "file.exe"
(without the quotes), and change it's name into "file.jpg .exe" (again, without
the quotes. I'm getting tired of saying that...). Now, send this file to someone
on ICQ.
Since the filename is too long to display, the little text box will
only show as much as it can, thus hiding the " .exe" part from the victim's
eyes. The victim will receive the file without thinking twice (I mean, it's just
an innocent little .jpg image. OR IS IT?!! MWHAHAHAHAHAHAHA!!), run it and get
infected with a virus or whatever you want to put in that executable
file.
You can go even further if you'd like to. Make an executable file
called "sex-story.txt .exe" and give it the icon of a simple .txt file.So the
next time you receive a file from another user on ICQ, think twice before you
run it... ;-)
Unhiding invisible users
========================
ICQ
has a feature in it called an "invisible list". Everyone on this list won't be
able to see whether you are online or offline, even if he has you on his contact
list.
If someone put you on invisible and you want to know whether he is
online or offline, simply do the following:
(a) Find his UIN (suppose it's my
UIN, 5917057).
(b) Go to www.icq.com/5917057
(c) Look for a little image
that says whether he is online or offline.
What is this thing, you ask? Well,
it's an option called web-aware. It allows people who don't have ICQ to see
whether you are online or offline. It is also necessary for ICQ web pagers (some
HTML code that, when placed into an HTML document, let's people send you a
message or see whether you are online or offline without the need for having ICQ
or the hassle of finding you on ICQ).
Web-aware can be turned off using the
preferences menu. If you turn web-aware off, people who will go to
www.icq.com/your-uin will see an image saying "disabled" instead of "online" or
"offline".
Even if your victim turns web-aware off, you could still manage to
detect his online presence.
For example: immature people will react if you
curse them or say bad things about them.
Also, you could register another ICQ
user (takes about 3-4 minutes), in addition to your regular one, and then switch
to it and add this person. Do not communicate with this person while you're
using this new account. He will probably forget about you in time, and won't
bother putting you on invisible or anything. That way, you could simply switch
to this new user whenever you want and see if your victim is online or
not.
Stealing passwords
==================
If you somehow manage to
get a hold of someone's DB files, you could easily steal his password. The
passwords are stored in clear text (unencrypted) inside the .dat files. They are
always placed in the end of the iUserSound line.
If you can't find the
password, you could always download progenic.com's local password retriever and
get the password out of the .dat files.
Also, some people write fake Email
addresses in their info, such as fuck-off@hotmail.com, fake@not.real.com etc'.
In the first case (fuck-off@hotmail.com), you could try to see if
fuck-off@hotmail.com belongs to someone. If not, register it, and then go to
www.icq.com and look for the "forgot your password?" link. Enter the victim's
UIN, and the password will be sent to "his" Email address
(fuck-off@hotmail.com). Then, login to your hotmail account and wait for the
password to show up in your inbox... ;-)
Here's another example: the victim
puts fake@pentagon.com as his Email address. Too bad he didn't write
pentagon.gov, because pentagon.com are giving free Email addresses AFAIK (As Far
As I Know). Simply register fake@pentagon.com and get his password.
If your
victim wrote something like this: fake@not.real.com, you could always try to
register real.com for 70$, register the subdomain not.real.com, put a POP3 mail
server there, register the account "fake", and walla! You now own
fake@not.real.com. Okay, I know, most people won't go into so much trouble just
to get someone's ICQ password... but what the heck.
Also, you could always
try to guess someone's password, but that should take some time.
Oh, by the
way, have you noticed that the maximum length of an ICQ password is 8 chars? So
what's so interesting about it?Once upon a time, years ago (back in 1997, to be
exact. Please correct me if I'm wrong), you were able to use Linux clones for
ICQ (Mirabilis don't have an official release of ICQ for Linux, so the only way
to use ICQ under Linux is to use an ICQ "clone", which is a program that uses
the ICQ protocol and uses ICQ's features, but is not an official release by
Mirabilis) to get into people's ICQ accounts without the need for a password.
How?
Some ICQ clones for Linux didn't force the user to have a password that
was more than 8 chars long. But if you tried to login as someone else and
entered a password that is longer than 8 chars, a buffer overflow would have
occur and the password verification part would have simply got "skipped
over".
In short, a buffer overflow happens when the program is assigned a
certain buffer size for certain actions and exceeds that buffer. Buffer
overflows can cause all sorts of "embarrassing situations", and in this case,
they simply caused the program to skip the password verification
phase.
Anyway, this little flaw doesn't exist anymore. Too bad...
;-)
Final notes
===========
To use or not to
use?
---------------------
I know many people who do not use ICQ nor any
other instant messanger because of security reasons. You could also refuse to
use Email in fear of being mailbombed or receiving "hostile applications" by
mail, refuse to use the web in fear of getting into a hostile page, refuse to
use IRC in fear of getting DoSsed or hacked by someone etc'. I personally do not
believe that the solution is to simply give up. If you face a security problem,
learn it and do your best to fix it.
I hope that you will use the knowledge
you have learned while reading through this tutorial to do your best to secure
yourself from ICQ and it's security issues and flaws, instead of just giving
up.
Why did AOL buy Mirabilis for so much
money?
--------------------------------------------
Those of you who read
the introduction (you're saying you didn't read it? Naughty naughty!), or those
of you who heard about it in the news, know that Mirabilis was bought by AOL for
400 million U.S. dollars in 1998. But why would AOL buy Mirabilis for so much
money?
The answer is - Email addresses. ICQ has hundreds of millions of
users, and hundreds of thousands of more people are registering more ICQ
accounts every day. Most of those people will have an Email address, and put it
somewhere in their info. My guess is that AOL are selling some of these Email
addresses to spammers (not too many and not in one time, in order not to
scandalize the net) for money (and lot's of it. I was once offered 90$ by some
firm for every 1,000 Email addresses I sell to them).
Running ICQ under
Linux
-----------------------
ICQ for Windows 3.11, ICQ for Windows 9x,
ICQ for Windows NT, ICQ for Mac, ICQ for Java... what? No ICQ for Linux?
You
must be wondering why Mirabilis didn't release ICQ for Linux. Well, let me tell
you a little story. The Cyber God, a member of BSRF, signed up for some mailing
list he found at Mirabilis's homepage. It said that members of this mailing list
will be notified when a Linux version of ICQ goes out. He waited and waited but
nothing happened. After a while, he decided to go back to Mirabilis's homepage
and look for the page where he signed up. He searched and he searched, all with
no luck - this mailing list disappeared without a trace.
Conclusion:
???
Did Mirabilis fail to port ICQ to Linux (to port: to make a version of a
certain program for another OS)? Did the project lose it's budget? Nobody
knows...
Anyway, if you really want to run ICQ on Linux, you could
either:
A) Download ICQ for Java, and get a Java Virtual Machine for
Linux. Start your JVM and run ICQ for Java on it.
B) Go to www.linuxberg.com,
go to their software page, find the ICQ page and you will get a nice list of ICQ
clones for Linux.
Some rant about ICQ chain
letters
---------------------------------
Probably the most annoying thing
about ICQ is not it's poor security, but it's never-ending flow of chain
letters. Forward this or Mirabilis will start charging money for the use of
ICQ!! Forward this and your ICQ will change colors!! Forward this and your crush
will kiss you!! Forward this to everyone - there is a virus in the new release
of ICQ!! Forward this to everyone - do not add 5917057 (or any other UIN), he is
sending viruses!! Forward this to 1-5 people and your crush will kiss you,
forward this to 6-10 people and you will win the lottery etc' etc'...!! Forward
this or your monitor will melt down!!
People, people, be reasonable! I never
forwarded any of this crap, and Mirabilis didn't charge a penny from me, I
didn't get runned over by 49 Budist monks, I didn't get my computer infected
with any viruses nor hacked etc' etc' (although my monitor did melt...
kidding!).
Please don't forward any of this crap. I promise you that nothing
bad will happen if you won't forward these letters (I mean, everybody knows that
the only chain mail that brings you bad luck if you don't send it comes by real
mail... ;-) ).
Also, if you want a good laugh at someone who forwards you a
chain letter, send him this message:
This is an ICQ chain letter. Please
do not stop the chain!
Cindy from Sydney forwarded this letter to 49 million
people and became the queen of Zaire!!
Masha from Russia forwarded this
letter to 23.7 million people and became an astronaut and got to fly to the
moon!!
Gil from Brasil didn't forward this letter to anyone and was turned
into a frog!!
Chan from Japan forwarded this letter to 107 thousand people
and became the world's Pokemon and PacMan champion!!
If you forward this
letter to 1-5 people: 1-5 people will be pissed at you for forwarding them a
stupid chain letter!
If you forward this letter to 6-10 people: 6-10 people
will be pissed at you for forwarding them a stupid chain letter!
If you
forward this letter to 11-15 people: 11-15 people will be pissed at you for
forwarding them a stupid chain letter!
If you forward this letter to 16-20
people: 16-20 people will be pissed at you for forwarding them a stupid chain
letter!
Funny, huh? I wrote it myself... *grin*
Appendix A:
Getting that little port by
yourself
================================================
Yes. You can get
that little ICQ port by yourself, faster than any stupid "ICQ Portscanning 3l33t
k-rad h4x0r1ng proggie" and flood, spoof or just plain annoy people like hell!!
WHEEEEEEEE!!!
How? Simple. Remember when I told you about "the cool way" to
get IPs on ICQ? Well, getting the port is almost the same. You see, once you
find the IP you will also see the port nearby. Connections in netstat are
displayed by their IP, the local port and the remote port, so all you have to do
is find the remote IP of your target. This is what you'll see: his-IP:the-port.
So simply look after the : and you'll see the port.
Also, there is an even
easier way to do this. Read appendix B to find out more.
Thanks to Zero Alpha
for the idea behind this trick.
Appendix B: The advantages of Unix ICQ
clones
=============================================
Although ICQ clones
always have less features than official releases of ICQ itself, they sometimes
have some neat features, such as a menu option that updates all of your contact
list's info, a button that tries to connect to the next server out of a large
list of servers if you fail connecting etc'.
Also, most ICQ will display the
target's IP and ICQ port within a new field in the info page, as well as let you
add people without authorization nor without notifying them (although you could
choose to notify someone he's been added).
Hell, some ICQ clones will even
have a built-in message spoofer! Hehe...
Appendix C: IP ==> UIN
convertion by
yourself
=============================================
Suppose someone
just tried to nuke you. Your firewall stopped the DoS attempt. You wanna chat
with the idiot and tell him how stupid he is, but alas - you only have his IP
address. No problemo! If this user has ICQ, you can get his UIN quite
easily.
There are infinite reasons for why you would wanna know how to
convert IPs to UINs. I'm sure you could think of at least five in about a minute
and a half, so instead, let's just get on with it, shall we?
This little
trick is quite simple. First of all, grab a simple message spoofer. Then, feed
it with the target's IP, and send a spoofed message that comes from your UIN.
For example: if your UIN is 5917057 (that's MY UIN, actually... :-) ), you
should spoof a message from that UIN (spoof messages from my UIN and I'll kill
you!! :-) ). So grab a simple message spoofer and send a "spoofed" message to
your target's IP. Now, in this message, you need to include something that will
surely get replied to. It could be something offensive, something interesting or
appealing (sending a "Wanna learn how to hack Hotmail" to the usual script
kiddie would surely get replied. Also try "Hey, I have a surprise for you...".
In other words, anything that will surely get replied to) etc'. Now, suppose the
target replies to your message. Where do you think the reply goes to? You, of
course! It's your UIN, after all! Since you've sent this message from your UIN,
this is where the reply will go to.
Now, that you received an ICQ message
from your target, you will also have his/her UIN
Appendix D: More fun
with contact lists
=======================================
As I've already
said, if you make someone add himself, he will lose his contact list unless he
has the patch against it. I've already gone through the process of using message
spoofers to make someone add himself. Now, here's another cool way to do
this.
First thing's first, you need to have this person in your contact list.
Then, change his name on your contact list, and send him himself as a contact.
It will appear to him that the contact you're sending him is another person's
contact, and he will add this person, which is actually himself!
If you want
to protect yourself against such things, simply install the patch that let's you
add yourself to your own contact list (we've already discussed about where u can
get this patch), or simply make sure you don't add yourself. :-)
BTW the
cool person who came up with this trick is Dr. Virus (another member of BSRF.
He's the one that made the flash intro and menu).
Appendix E: Incredible
tricks with the ICQ
protocol
===================================================
Imagine that
you could hijack someone's session with another person and eavasdrop their
conversation. Imagine being able to get the IP, port and a lot of information
about a certain user within a couple of seconds. Imagine having more power over
the system that you can think of.
You can get this power by learning the ICQ
protocol. The problem is that other people can learn it as well, and use this
knowledge in order to maliciously harm you. Don't get caught with your pants
down. :-)
Learn the ICQ protocol here:
http://www.student.nada.kth.se/~d95-mih/icq/
Get some canned programs to see
what can be done using this knowledge and learn more about the ICQ protocol from
the source (please do not abuse these programs!):
http://www.hackology.com/~ewitness/
Thanks to Eyewitness for the
URLs.
Other tutorials by BSRF
-----------------------
* FTP
Security.
* Sendmail Security.
* Overclocking.
* Ad and Spam
Blocking.
* Anonymity.
* Info-Gathering.
* Phreaking.
* Advanced
Phreaking.
* More Phreaking.
* IRC Warfare.
* Proxies, Wingates and
SOCKS Firewalls.
* RM Networks.
* The Windows Registry.
* Cracking,
part I and II (III coming soon).
* Mailing List Security.
* HTML.
* IP
Masquerading.
* Cool info about computer hardware.
* The #2,000 "bug" in
IRC.
* The "javasCript" bug in Hotmail.
* Basic Local/Remote Unix
Security