How To Join The Hacker's Choice ------------------------------- $Id: HOWTO-JOIN-THC.txt,v 1.7 2003/03/10 06:38:44 plasmoid Exp $ + Introdution The Hacker's Choice is not one of those groups with special 31337 rules and rituals. We are _no_ underground guys, that only meet in the dark of cyberspace rooms. Applying for a membership at THC is really as easy as 1,2,3. 1. In order to join, you'll need to provide some of your work that fits into our collection of papers and releases. Just have a look at our papers and release sections. 2. THC does not stop when you pull the plug. We have scheduled real-life meetings to discuss matter of importance. We are looking for open- minded, friendly people that also find the time to chat and laugh. If you prefer doing your stuff alone in the dark, well, THC is not your group. 3. That's it. You are now a new THC member. Next time you are visiting the THC crew in bar or pub, you get a beer for free, the so called "application beer". We are open to all contributions, nothing is too obscure, nothing is too strange. + Projects list You don't have an idea right now? Hmm, take a look at some projects we suggest as member applications. You don't need to do one of those below, but if you want to, contact us. o Distributed sniffer with database support - maybe an enhanced dsniff o Detected Intruder System - Hacker's IDS [Interested: Trinoo et al.] - IDS supervises backdoors, patches, email, ... - Checks if the hacker has been detected and alarms him, e.g. SMS, pager, email.... o Web-security analyse tool - Based on wget or something similar - Checks for SSI, form variables, cgi calls, ... - Returns vulnerable pages o Distributed Fuzzy Fingerprinting - Distributed crunching according to the FFP talk from 19C3 - Database-support to store users and target fingerprints - More information at plasmoid@thehackerschoice.com o Automated Analysis of Session IDs - Based on paper http://www.segfault.net/~plasmoid/SessionIDs.pdf - Given a set of Session IDs and the date they were created, the tool should try to minimize the entropy within the numbers. o Password cracker for SAP R/3 Passwords o 1-to-1 THC-Scan Linux Port [Interested: C0d3] - Port the DOS Tool THC-Scan to Linux as exact as possible - References: the Van Hauser's original Pascal source code - Plasmoid can help with Linux serial programming if necessary o PalmPilot InfraRed Sniffer - Uses notebook infrared interface to intercept connections - Evil elite! x Smart Unix keylogger [Finished and released as a THC paper by RD] - Manuel mode: toggled by specific key sequence - Auto mode: detects password prompts and logs keys - See passive SSH analysis for the password prompt trick - Don't forget to map the keys o Hiding information inside the SWAP [Interested: UDP] - Article covering methods for placing files/content in the swap. - Linux/*BSD/Solaris. Whatever you want. It rocks. o Extended Portscanner - Minimum functionality of nmap. - Scans through proxies and reaches DMZ. - Bounce scanning support-