How we hacked [not cracked] Opnix

Jim farli@wiredglobal.com
Thu, 9 Nov 2000 23:37:13 -0700


Hey Brian, Jason - maybe Opnix is willing to trade bandwidth for their own
t-shirts  ::grin::

On Thu, 09 Nov 2000, you wrote:
> I love this!  I want one.....Maybe a trade could be arranged?
> 
> /****************************************************************************/
> /                                                                            /
> /  John Kloian III                                 Chief Technology Officer  /
> /  OpNIX, Inc.                                             http://opnix.com  /
> /                                                                            /
> /                      .Simply chocoliscious bandwidth.                      /
> /                                                                            /
> /****************************************************************************/
> 
> On Thu, 9 Nov 2000, Brian Cluff wrote:
> 
> >How we hacked [not cracked] Opnix
> >
> >This hack does not neccesarily only work for opnix. You can test
> >the hack by executing all on one line
> >
> >echo `printf
> >"\0103\0117\0124\0124\0117\0116\0055\0124\0105\0105\0123\0110\0111\0122\0124
> >" |tee /dev/null`
> >
> >and check the fibers for proper configuration.
> >
> >The first step is to completely saturate the opnix fiber using
> >UREA.  This will prepare the fiber for complete spectral
> >corruption.
> >
> >After about 10 minutes of complete saturation, you stop the
> >process.
> >
> >Next we manipulated the routes of the fiber to cause slow downs in
> >the port attacks that we will do next.
> >
> >Once the routing is done we applied a different attack spectrum
> >from many different ports that we prepared beforehand.  This will
> >cause great corruption in the fiber.  When the fiber has become
> >sufficently corrupt, you can find other things to do for most of
> >the day, happy that you have probably done a successfull hack.
> >
> >A number of hours after we had corrupted the fiber we wanted
> >to flush all traces of our attack.  It took sevral attempts to
> >completely flush all traces.
> >
> >You can see screenshots of our hack at:
> >http://www.snaptek.com/opnixfiberhack/
> >
> >
> >________________________________________________
> >See http://PLUG.phoenix.az.us/navigator-mail.shtml if your mail doesn't post to the list quickly and you use Netscape to write mail.
> >
> >Plug-discuss mailing list  -  Plug-discuss@lists.PLUG.phoenix.az.us
> >http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss
> >
> 
> 
> ________________________________________________
> See http://PLUG.phoenix.az.us/navigator-mail.shtml if your mail doesn't post to the list quickly and you use Netscape to write mail.
> 
> Plug-discuss mailing list  -  Plug-discuss@lists.PLUG.phoenix.az.us
> http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss
-- 

Jim

Always practice safe HEX