How we hacked [not cracked] Opnix

Top Page
Attachments:
Message as email
+ (text/plain)
Delete this message
Reply to this message
Author: Jimfarli@wiredglobal.com
Date:  
Subject: How we hacked [not cracked] Opnix
Hey Brian, Jason - maybe Opnix is willing to trade bandwidth for their own
t-shirts ::grin::

On Thu, 09 Nov 2000, you wrote:
> I love this! I want one.....Maybe a trade could be arranged?
>
> /****************************************************************************/
> /                                                                            /
> /  John Kloian III                                 Chief Technology Officer  /
> /  OpNIX, Inc.                                             http://opnix.com  /
> /                                                                            /
> /                      .Simply chocoliscious bandwidth.                      /
> /                                                                            /
> /****************************************************************************/

>
> On Thu, 9 Nov 2000, Brian Cluff wrote:
>
> >How we hacked [not cracked] Opnix
> >
> >This hack does not neccesarily only work for opnix. You can test
> >the hack by executing all on one line
> >
> >echo `printf
> >"\0103\0117\0124\0124\0117\0116\0055\0124\0105\0105\0123\0110\0111\0122\0124
> >" |tee /dev/null`
> >
> >and check the fibers for proper configuration.
> >
> >The first step is to completely saturate the opnix fiber using
> >UREA. This will prepare the fiber for complete spectral
> >corruption.
> >
> >After about 10 minutes of complete saturation, you stop the
> >process.
> >
> >Next we manipulated the routes of the fiber to cause slow downs in
> >the port attacks that we will do next.
> >
> >Once the routing is done we applied a different attack spectrum
> >from many different ports that we prepared beforehand. This will
> >cause great corruption in the fiber. When the fiber has become
> >sufficently corrupt, you can find other things to do for most of
> >the day, happy that you have probably done a successfull hack.
> >
> >A number of hours after we had corrupted the fiber we wanted
> >to flush all traces of our attack. It took sevral attempts to
> >completely flush all traces.
> >
> >You can see screenshots of our hack at:
> >http://www.snaptek.com/opnixfiberhack/
> >
> >
> >________________________________________________
> >See http://PLUG.phoenix.az.us/navigator-mail.shtml if your mail doesn't post to the list quickly and you use Netscape to write mail.
> >
> >Plug-discuss mailing list -
> >http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss
> >
>
>
> ________________________________________________
> See http://PLUG.phoenix.az.us/navigator-mail.shtml if your mail doesn't post to the list quickly and you use Netscape to write mail.
>
> Plug-discuss mailing list -
> http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss

--

Jim

Always practice safe HEX