| 
          
         | 
        
          
            <<  
             ^ 
              >>
          
          
            
              
                Date: 2000-03-12
                 
                 
                Cyber Patrol Hack en Detail
                
                 
-.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- 
                 
                
      Wie die Datenbank mit über 80.000 durch Cyber Patrol  
blockierte URLS  entleert und die Verschlüsselung gelnackt  
wurde, ist nun in allen Details auf einer Homepage in SE  
nachzulesen. 
 
Zu sehen ist auch, was CP an ganz normalen Webinhalten  
filtert - man sieht dem Blödsinn quasi ins Angesicht. 
 
-.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-   
releayed by Peter F Bradshaw <pfb@nautronix.com.au> 
 via crypto@efa.org.au> 
-.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-   
 
Let's start from the beginning. Before we even install a  
product we must have some set of goals we want to achieve.  
For Cyber Patrol the goal was to break the authentication  
scheme and to extract the URL database, documenting the  
structures in the progress, thus facilitating interoperability.  
These constitute practical goals. You will also find less  
pragmatic goals for the launching of an attack, such as the  
inquisitive desire to learn the internals of someone else's  
product, the thrill of doing something you are not supposed to  
be able to do, and the recognition you might gain for being  
the first one to explore unchartered territory. We can call  
these goals of personal gratification. More interesting for the  
majority of people are probably the political goals, to expose  
any hidden agenda that might be lurking behind the product  
and to fuel the discussion around it, in this case the  
discussion around censorware. For us, the primary  
motivation has been the possible political implications. 
 
With the goals firmly set in mind, we begin our work to  
achieve them. 
 
 
 
3 Overview 
 
Installation is straightforward. You will note, however, that you are not asked to supply an installation path. This is a typical example of producers taking the easy way out. Rather than going through with the little ext 
ra bit of effort, they chose to take the easy route - by forcing all their customers to install the software into C:\PATROL no matter what. 
 
Now, before we speak some more on how we can achieve our goals, let's go on a short tour of the program. For reference, here's a screenshot of the main interface. As can be seen, a large part of the main interface is devo 
ted to time management. For each day in the week you can - with a 30 minute granularity - control the hours in which a user is allowed to use the Internet. You can set the maximum amount of time "online" allowed per day a 
nd calendar week. 
 
To the upper right, you'll find a panel for controlling the filters  
in Cyber Patrol. It's fairly straightforward, but let's run through  
the alternatives anyway. 
 
IRC Chat Filters on keywords that are not allowed to be part  
of the channel name. ChatGard Lets you specify things that  
are never to be allowed to be transmitted over the Internet,  
such as your address, phone number and the like. The  
clipboard will be monitored too. The "Carlin-7" mentioned are  
shit, piss, fuck, cunt, cocksucker, mother-fucker, and tits.  
See also [ACLU96] WWW, FTP & Other This is where you  
add any additional URLs you want to filter, or allow, as the  
case may be. News This screen is virtually identical to the  
"WWW, FTP & Other" one, but here you can define any  
newsgroups you want to filter. You can also choose to apply  
the IRC keyword filters to newsgroup names. Games &  
Applications Here you can specify up to sixteen 16-bit  
windows applications that should not be allowed to be run.  
Not very useful if you're running a 32-bit operating system  
though. 
 
Die komplette Analyse 
http://hem.passagen.se/eddy1/reveng/cp4/cp4break.html
                   
-.-  -.-. 
Connectivity statt Isolierung 
http://o5.or.at
                   
-.-. --.- -.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-
    
                 
- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- 
                
edited by Harkank 
published on: 2000-03-12 
comments to office@quintessenz.at
                   
                  
                    subscribe Newsletter
                  
                   
                
- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- 
                
                  <<  
                   ^ 
                    >> 
                
                
               | 
             
           
         | 
         | 
        
          
         |