Archive for June, 2007
Hacking World of Worldcraft

Social Engineering a N00b Party

I had a level 11 Mage.  My level 20 friend (who happened to be female) was teaching me how to play the game.  Some level 43 guy started hitting on my escort.  Feeling playful, I challenged him to a duel.  He turned his back on me while I threw blows for like 10 minutes and had no effect. 

One spell did work though, Polymorph (only for about 5 seconds though).  I turned him into a sheep.  This must have really pissed him off because what he did next was devious.

He finally finished me off and then quickly made friends with our two person party.  He hung out with us for a little while, the whole time flirting with my friend.  Then he told her that I was talking shit about her to him on whisper mode.  Not true at all.  But worked.  She got really mad and disband from the party.

He tried to do other stuff to my character but I was just a trial account so all he had left to do was laugh at me: “Ha Ha I just scored with your friend.”

Here is a pretty good article addressing some cool hacks (cheats) that have been done on WoW.  The article is on theRegister and its called, Hacking WoW and the pursuit of knowledge

change a character’s X, Y and Z coordinates to give the illusion of flying or move to a more advantageous location

Automated Spawn Camping – code to automate a character’s task of camping outside a cave in wait of monsters and stabbing them when they appear. A player who runs the bot shortly before going to bed can awake to find the character has pocketed plenty of gold left behind by the felled beasts.

Create bot characters that can send you IMs to your cell phone


*atchung: some hacks such “spawn camping” will get you labeled a filthy cheater, a taboo as untouchable in the world of online gaming as a pedophile or 18th century horse thief.  hack at your own filty risk.

The Gold Disk v2

I was using the Gold Disk today and I noticed that (unlike version 1) it did not automatically fix everything.  It left the password setting alone so I had to do that all manually.  I think its for the best because the old one could lock down the system by screwing with the password settings.

update: gold disk v2 can do automatic fixes, but as I said before, I had to do a lot of things manually.

Cyberwar is coming!

ANYONE who follows technology or military affairs has heard the predictions for more than a decade. Cyberwar is coming. But how bad would a cyberwar really be — especially when compared with the blood-and-guts genuine article? Whatever the answer, governments are readying themselves for the Big One.

When Computers Attack – NYTIMES article

Security Now Episode #95

Steve Gibson and Leo Laporte talked about OpenID on Episode 95.  OpenID would provide a single-sign on verification for site logins.  This would not replace something like SSL (which is mutual authentication), but it would be better for simple site logins to sites like, and others.

BYU professor Philip J. Windley, explains how OpenID works on his site.

Hacker Taps Cell Phone to Stalk Family

A stalker is on the loose — and may be watching and listening in your bedroom, bathroom or office meeting.

Just ask Tim Kuykendall, whose cell phone provided a portal through which a hacker gained access to the most intimate details of his life, recording family members’ conversations and snapping pictures of what they were wearing.

“We’ve had [times] where I’m having a conversation in my home and I get a voice mail and the conversation’s replayed; received a phone call or even checked my voice mail from a message and while I push ‘OK’ to listen to [it] I’m hearing a conversation going on in the living room between my daughter and my wife,” he told FOX News.

More on foxnews (with video)


DHS acknowledges own computer break-ins

WASHINGTON — The Homeland Security Department, the lead U.S. agency for fighting cyber threats, suffered more than 800 hacker break-ins, virus outbreaks and other computer security problems over two years, senior officials acknowledged to Congress.

In one instance, hacker tools for stealing passwords and other files were found on two internal Homeland Security computer systems. The agency’s headquarters sought forensic help from the department’s own Security Operations Center and the U.S. Computer Emergency Readiness Team it operates with Carnegie Mellon University.

more here

Caution: This is Sparta!

Caution: This is Sparta

ONLINE EXTORTION – E-Mail Scam Includes Hit-Man Threat

Extortion – criminal offense, which occurs when a person obtains money, behaviour, or other goods and/or services from another by wrongfully threatening or inflicting harm to his person, reputation, or property. Euphemistically, refraining from doing harm is sometimes called protection.

hit man scam fbi

The scam e-mail, which first appeared in December, threatens to kill recipients if they do not pay the sender. It’s a scam. FBI officials recommend you don’t reply.

A new scam cropping up in e-mail boxes across the country is preying not on recipients’ greed or good intentions, but on their fears. The scam e-mail, which first appeared in December, threatens to kill recipients if they do not pay thousands of dollars to the sender, who purports to be a hired assassin.

About 115 complaints have been filed with the FBI’s Internet Crime Complaint Center (IC3) since the scam emerged, according to special agent John Hambrick, who heads IC3. He said the extortion scam does not appear to target anyone specifically and that IC3 has not received any reports of money loss or threats carried out.

More on FBI website.

Chinese and the Islamic Fundamentalists vs. Social Evolution

This post is completely OFF TOPIC – I started off writing about the Great Fire Wall of China and then went on an insane religious and political tangent.  I started asking myself, “Why does the chinese government and other nations repress the cutting edge of human social evolution?”  And here is what I came up with. 

There are a few cultures hopelessly fighting against the social evolution of humanity.  the Chinese government and the Islamic fundamentalist are among the largest and potentially most influential.  In a relatively short period of time humanity has gone from tribalism to nationalism and now to globalism.  Each stage in social evolution has happend faster and faster and now globalization is happening so fast that it is hard to keep up.  Almost every nation is facing immigration, refugee, and security issues as third world conflicts and economic situations leave impoverished people behind forcing them to seek stability in other countries.  So called “first world” countries face immigration issues and are greatly influenced by the globalized economy.  

Technology, trade and travel have merged humanity and there is nothing any of us can do about it.  To their detriment, the Chinese government and the Islamic fundamentalists are really trying to resist portions of this inevitable social change. 

The Chinese trade globally and are clearly a leader in the commodities market.  But the chinese government represses its people by greatly filtering the exchange of ideas.  Some how they don’t understand that it is the ideas of the people that are the greatest and most revolutionary asset in any globalized society… or perhaps they do understand this as certain ideas are a threat to their level of communistic control over the people.  They have created what has been coined the Great Fire Wall of China in which they filter certain ideas from the public.  Keywords like “tank man” and “freedom” are blocked.  The greatest part of globalization is the free exchange of ideas.  In the US, this exchange of ideas is making a new breed of middle class who are self-sufficient and becoming very wealthy very quickly.

Contrary to many elitist beliefs the Arab and Islamic world have made many contributions to science, medicine, mathematics, and technology.  In fact, Arab muslim Ibn al-Haytham is knows as the Father of optics because he formulated “the first comprehensive and systematic alternative to Greek optical theories”.  Many of their contibutions occured between 600 A.D. and 1200 A.D, a period known as the Islamic Golden Age.  All this was done when Europe was still in the Dark Ages.  Many of there discoveries were passed on and further developed by the Europeans during the  Renaissance(Note: of course, many of the arab/muslim innovations were built on the systems and inventions of the people they conquered… as is the case with the europeans which makes up we know as modern western civilization.  We owe the bulk of the origins of western civilization to the greeks and egyptians who the Roman got most of their innovations from).

Bernard Lewis put out a book shortly after 9/11 called, What Went Wrong?  which talks about the clash betwen Islam (civilization based in islam not the Religion itself) and Modernity in the Middle East.    In a discussion about Bernard’s book, Joanne Myers says:

[Bernard] takes the reader on a journey through history, from the time when Islam was the world’s greatest, most enlightened, and most powerful civilization, to modern times when it has failed to adjust to the challenges brought about by the reformation and the scientific and political revolutions in the West.

In the discussion Bernard points out that the question “What went wrong?” is so pronounced in the Islamic world that many muslim leaders in the last few hundred years have asked the question.  The answers they’ve come up with range from “There are too many infidels” to “We have not kept up with modernity”. 

Different things have also been tried in the world of Islam to change:

Now, for the first time, in Iran they are carrying out what I might describe, without intending any disrespect, as the “Christianization” of Islam, using the word to indicate not doctrines, not morality, but institutions. What you now have in Iran, for the first time in Islamic history, is the functional equivalent of a papacy, a college of cardinals, a bench of Bishops, and, most important of all, an inquisition, and, inch’Allah, they will soon have a reformation too.

Bernard Lewis does not state a single reason why Islam (as a civilization) has failed to keep up with modernity.  I think Ken Wilber and Robert Keegan are the closest to an explaination when they discusses the the Many faces of Terrorism and Integral politics.  They place the Islamic fundamentalists (particularly fundamentalist) in the Amber stage of consciousness which means that they are ethnocentric conformist.  I would go even further and suggest that they are glued together with flecks of Red (tribalism, sects controled by Imams) Considering their stage of consciousness it seems that (unlike the old dominating amber roman catholic christianity) they have not been broken up diluted enough to accept the bleeding edge of human development.  That is not to say the individuals and small groups within the Islamic world (such as the Bahai’a and Sikhs) are not at the cutting edge.  The core is true hard core amber. 

I digress a little, the Islamic world HAS been broken up (Sunnis vs. Shia, etc) but it has not been sufficiently diluted yet.  Christianity broke up into Catholic and Protestants.  At one time those were large warring factions of Christiandom (societies built on christianity) but now those two have been broken in to hundreds of denominations and spin-off belief systems.  Islam has different factions but not as diluted and broken up as Christianity.

Religious denominations are usually created when a member of a certain faith has a spiritual awakening that is so profound they express it to others and start to get a following.  Islam seems to have such a strong fundamentalist (solid Amber and Red) core that any new development is stamped out like a camp fire threatening to become a forest fire.  I believe that reform is happening right now within the Islamic world the result is constant relentless violence. 

Go Google Yourself

Look Who’s Googling

    On a recent flight to Italy, a friend of mine met a guy, hooked up, and assumed that was the end of it. She was, after all, on her way to visit her boyfriend. Unfortunately for her, she failed to take the wondrous powers of Google into account.

    “I only told him my first name and a very general account of what I did for a living,” said *Alison Charles, 26, who, until recently, has been dealing with her “cyberstalker” ever since that fateful flight last summer.

Google your full name and variations of it and make sure you are not showing up anywhere. Check the online phonebooks, type in your address and phone numbers. Sometimes you’ll be surprised on what you’ll find.

All a person needs is your first name and last name and they have you. Because if someone wants more information all they have to do is pay about $10 bucks and on a sight like this: Intellius or People Finders and they can get even more info such as your home address. Many times paying a third party company is not even necessary, they can just google you.

These days even more data can be extracted using the local county. I won’t go in how to do this because most people don’t know about it and I’d like to keep it that way. For some reason Federal and Local governments have a complete disregard for the privacy of citizens.

The point is that you should never put your personal information online. Use identification proxies such as: a psuedo name, a P.O. Box, an 800 number to keep intouch with your audience if your a blogger. You may trust some of the people you interact with online, but for every 10 people that are decent there is at least one who will want more information than you are willing to give.

I’ve heard stories of stalkers showing at homes of unsuspecting Internet users, targeted “spear phishing” attacks, and worse. Protect your data.

Military PII (personally identifiable data):
The military has resently gotten very serious about protecting PII. PII includes the following data:

    Full name (if not common)
    National identification number
    Telephone number
    Street address
    E-mail address
    IP address (in some cases)
    Vehicle registration plate number
    Driver’s license number
    Face, fingerprints, or handwriting
    Credit card numbers
    Digital identity

When these bits of data are combined they can be used to gather more and more.

More on PII at