Hacking Challenges

Deep Freeze

January 23rd, 2009 by Patchy
Deep Freeze is a program for Windows that protects the core operating system files and configuration files without eliminating the usability for end users. Deep Freeze allows users to make virtual changes to the system, but upon reboot the frozen state of the operating system is restored. Deep Freeze is an great program; however, with poor security policies it can be foiled. In this video, I describe a few methods to circumvent Deep Freeze’s security. Full Scale Video Here
Download Here

Posted in Vblog | 7 Comments

Patchy’s Top 5 DOS Games

January 18th, 2009 by Patchy
Recently I repaired my first computer, an old 386 PC running MS-DOS 5.0, and when I booted the machine I found several of my favorite DOS games. In this vblog, I discuss my top 5 favorite DOS games from childhood. The games on my list had to meet a few requirements: it obviously had to be a DOS game and my 386 PC had to be able to run it. If you haven’t played these games most of them are available from Full Scale Video Here
Download Here

Posted in Vblog | 6 Comments

Installing Backtrack 3

November 14th, 2008 by Patchy
In this Vblog, I explain how to manually install Backtrack 3 to your hard drive. This demonstration assumes that you have a single blank hard drive, and you want to install BT3 to the entire drive. Any data stored on the hard drive will be overwritten, so backup any files you want to keep! Unlike most tutorials on install BT3, I explain each command and its purpose, so that way you can learn a little about the Linux OS. Hope you enjoy the video! Full Scale Video Here
Download Here

Posted in Vblog | 1 Comment

DNS Spoofing with Virtual Hosts

October 24th, 2008 by Patchy
DNS Spoofing is an attack where a person forges fake DNS Responds to trick a victim computer into accessing a different website. Whenever you visit a website such as the domain name is translated to the IP address of the web server. To do this your computer makes a DNS request to a DNS Server, and the server returns a DNS Respond which contains the IP address of the web server. Therefore, during a DNS Spoofing attack the victim computer receives an Spoofed IP address and attempts to connect to that web server. However, often times a web server hosts multiple website by utilizing Virtual Hosting. Virtual hosting is a method that allows a web server to host more than one domain name on the same computer and the same IP address. If an Attacker wants to DNS Spoof a website which is a virtual host on a web server the IP address is not sufficient information for the web server to determine which website the victim computer wants to access. Therefore, the DNS Spoofing attack will not work correct. The way a web server determines which website a person wants to access is with the Host Header contained in the Get Request. Consequently, an Attack needs to modify the victim’s Get Request to have the correct Host Header before it reach the web server. To do this I combined an Ettercap Filter that will Log and Drop the Get Requests from the victim, and a C program which will change the Host Header. After the Host Header is modified, the Ettercap Filter submits the new Get Request to the web server. This process will allow an attacker to perform DNS Spoofing attack with a Virtual Host. [Watch the video it will make more sense =D]. Full Scale Video Here
Download Here

Download Host.filter
Download Change_Host.c

Posted in Vblog | 1 Comment

Bypass Cisco Clean Access & Cisco NAC Appliance

September 10th, 2008 by Patchy
Cisco NAC Appliance (formerly Cisco Clean Access) is a Network Admission Control (NAC) product that is uses to enforce security policy on computers seeking to access network resources. Therefore, an administrator can force users to comply to a policy that requires the user to install or remove programs. For example, a university I previously attended required students to install McAfee Antivirus Software and remove Peer-to-Peer programs before they were allowed to access the internet.

To bypass Cisco Clean Access a user can simply change their browser’s User Agent to an Operating System that does not require this program [ex. Mozilla/5.0 (X11; U; Linux i586; en-US; rv:1.7.8) Gecko/20050511]. An easy way to change your User Agent in Firefox is to download User Agent Switcher.

With Cisco NAC Appliance, Cisco added additional detection mechanisms such as TCP fingerprinting and JavaScript OS detection, so the User Agent trick will not work. However, by changing the default parameters of the Windows TCP/IP stack the user can still connect to the network without running any host-based checks. You can do this with Kevin.

Video Demonstration: Full Scale Video Here
Download Here

Posted in News, Vblog | 1 Comment

Beer Pong Table

August 8th, 2008 by Patchy
The last few days I’ve been helping my friend Charlie construct his Illinois State University (ISU) Beer Pong Table. The legs and supports of the table are made from his roommate Brandon’s hockey sticks, and the table top is made of plywood with a 1/8″ sheet of Acrylic on top. Our friend Tyler etched ISU’s mascot, Red Bird, into the Acrylic; it was done free-hand with a dremel (Compare his etching to image). Tyler also did the text on the table: “ISU” and ” What you call Addiction … We call Dedication”. I did the LED array and the wiring; when the LEDs are lit, the light catches the etching in the acrylic. The LED controller I made allows you to switch between the LEDs being constantly on or controlled by an audio input. However, the LEDs we used are only lit at a specific voltage, so it doesn’t work very well. Full Scale Video Here
Download Here
Pre-Amp Schematic

Posted in Vblog | 4 Comments

Infinity Exists One Year Anniversary!!!

June 7th, 2008 by Patchy
It has been one year since the launch of, and a lot of things have changed; there are 18 episodes of Full Disclosure and 2100 registered members on the forums. We plan to create many episodes this summer, as well as, release a new video series, Infinity Exists Underground, which is based on viewer video submissions. Also, we would like to take donations towards the purchase of a new camera to increase our production value.

Full Scale Video Here

Posted in Vblog | 11 Comments

Dual Boot – Windows & Backtrack

April 26th, 2008 by Patchy
We said we would release a Vblog on how to Dual boot Windows and Backtrack so here it is. The process is slightly different, there is not need for an extended partition because you only need four primary partitions, and we use Lilo for the boot loader. Since we aren’t installing Ubuntu we have to manually create and configure the linux swap partition. Also, we have to manually configure Lilo; however, this allows us to change the Splash image when your computer starts.
Full Scale Video Here
Download Here

Posted in News, Vblog | 3 Comments

Tapping a 66 Block Telephone Network Interface

April 9th, 2008 by Patchy
Awhile ago I was asked to rewiring a company’s 66 Block, a type of punchdown block used to connect sets of wires in a telephone system, because they wanted to replace their plain old telephone service (POTS) with multiple VoIP telephone lines. I had little knowledge on the 66 Block before doing this job, so I got out my trusty Beige Box to figure out how it was wired. Here’s a short video on how to tap a 66 Block. (Watch Episode 6 if you need help making a Beige Box)

Full Scale Video Here
Download Here

Posted in News, Vblog | 1 Comment

Singing Tesla Coil

March 8th, 2008 by Patchy
This weekend was UIUC’s annual Engineer Open House, and last night there was a Singing Tesla Coil show. The Tesla coils were built by Steve Ward, a EE student at UIUC. “Steven has developed Tesla Coils with high levels of control allowing audio modulation of their lightning-like display. Interfacing the Continuum Fingerboard with this technology will generate a musically expressive and highly energetic, multi-voiced performace” (EOH Exhibit Guide).

Full Scale Video Here
Download Here

Posted in News, Vblog | 3 Comments

<< Previous Entries Next Entries >>