Best List Of Cures For Procrastination Ever

23 06 2007

11 Causes and Cures for Procrastination [via], is the best little list that I have ever seen on the net.  Its short, simple and to the point.  John lists one cause and one simple cure for each of 11 bullet points, plus there’s more in the rest of the post and comments!!  Of course the cures aren’t easy to do, but at least there isn’t some long winded explanation of how to go about a solution.  I love it!!

You can follow the jump to see the list or just click the link to see the whole post.  There’s more to this article than just the list you know.

Best of luck.
Read the rest of this entry »

How To Hack A Voting Machine In 60 SECONDS!!!! (VIDEO)

13 06 2007

This vid posted on youtube by stemcomputerssuck, shows you how to replace the ROM (aka Read Only Memory) of a voting machine, like the ones you are going to use to vote against the GOP reign of terror. This isn’t the first hack we’ve seen for voting machines, but its the first I’ve seen done in 60 (SIXTY) FRIGGIN SECONDS!!!

NOTE: One commenter said that you could speed the physical hack up with an electric screw driver. I agree, as long as you keep everything grounded to avoid any electrostatic shocks, it could be done even faster!!

Here’s the little bit of description that stemcomputerssuck left with the vid:

A detailed technical analysis of this e-voting machine can be found on http://www.wijvertrouwenstemcomputers…

But don’t worry, you’re perfectly safe. We have top men working on becoming completely apathetic towards US politics as I type!!

evil banana

On, “45 5F E1 04 22 CA 29 C4 93 3F 95 05 2B 79 2A B2”: *THE* HD Key To Rule Them All?

31 05 2007

So, this key, the one in the title, appears to be the key to rule all hd dvd keys.  Or is it?  It was actually posted may 23rd on Freedom To Tinker in a comment?!?!?  Yeah, you can use it as the key to decrypt alot of new HD discs but will it end  any need to work further on cracking AACS craptastic codes?  (Note this is the new HD key, not the one that was widely published and all fuxxored on d!gg.)

My only other source is this forum: DOOM9

Moving on, because this key was supposedly found one day after it was “put into action” by the powers that be, I’m gonna explore how the key was so rapidly extracted.

First, I’m gonna guess, just for shits and giggles.  Perhapse someone simply brute forced a prefab “wordlist” or 16 value hex number sets?  Since I refuse to go HD (either format) I have no way of really knowing if this is even plausible, cause I can’t test it out myself.  I also don’t have an XBOX 360 with the external HD-DVD drive handy to experiment with either.  So its fair to say that my first inclination is a pure shot in the dark… or is it? (see arnezami’s method of finding a Volume ID later on in the post)

Second, I’ll ask Google.  Well … so far its not an answer but it appears that someone bought this domain: …which is funny as hell cause there is no content, its just pure net real estate hilariousness.

But lets dig deeper, shall we?  Lets plug this hint “uv=00000047”, from the comment by BtCB, into Google. (pause for effect)

Okey dokey, now we are in business.  It would appear that a curios fellow who goes by the name arnezami over at DOOM9 FORUMS has some simple instructions on how to grab a Volume ID for HD-DVD.  And it follows:

Finding the Volume ID

How did I find the Volume ID?

There are essentially two ways (now). I used the USB sniffer (with the xbox 360 HD DVD) because I knew I didn’t have to bother with the (possibly obscured/wiped) memory of the software player.

  1. Download USB sniffer 1.8 then unzip and start it.
  2. Select the “USB Mass Storage Device” (I use the xbox 360 HD DVD drive) and click install.
  3. Unplug the HD DVD drive (the usb cable) and replug it again. It will be recognized by windows and the sniffer starts logging.
  4. Insert the Disc into the drive while the sniffer is.. well sniffing. Then start WinDVD and immediatly quit when the video (even the first black screen) starts. Then click ‘Close’ on the sniffer.
  5. You now have a huge log file (60+ MB or something). Open it in WinHex (pressing F7 for ascii only) and search for the ascii string (not hex search!) “00000000: 00 22 00 00” including the spaces (but excluding the quotes of course ).
  6. There was only one occurence of this in the whole file. So it has to be the Volume ID. Tata!

Btw: I used WinDVD but the above should also work for other players.

A different method (but less reliable I think) is to use WinDVD’s memdump.

  1. Open WinDVD’s memdump in WinHex
  2. Hex search (with WinHex) for 002200004000 or alternatively 0020202020200000. **
  3. There you will (usally) find the Volume ID. But I’m not sure this will always work. There may be more than one occurance. You can check if the last 16 bytes (of the 36 beginning with 0022) are random since that would have to be the MAC. If its not random you haven’t found it yet so you should go on searching until you do.


PS. Almost forgot: make sure you remove the last 16 bytes from the Volume ID log (which is the MAC) like I did in my first post. This is because in theory they might be able to track down your drive with that part… (you don’t want that). The Volume ID itself is for everybody the same (with the same movie) so that won’t reveal anything about yourself .

Seems like a plan, but if you look further you can just use these little apps posted in the same forums by a person named ape: and for Blu Ray use

But wait there’s more…

Well here is something to play with.


For me it works with WinDVD (which is the most sensitive I believe) and the Xbox 360 HD DVD. My sweet spot is a time value between 390 and 420. I usually set it at 410 which works perfectly (btw time is measured in nr of AGID retrieval attempts counted from the moment the player accesses the drive).

Just try it and play with it a bit.

Remember: this program does not use the private key. It just “watches” the drive carefully and then pretends to be the software player.

It works for HD DVD only atm.




PS. This is experimental programming. There could be bugs in it.

And that is all she wrote folks.  Yes this is the latest key to rule them all for AACS DRM craptakery and that was a little peek into how it was uncovered.  There should be HUGE applause for anrezami et all for all the hard work they did.  Just reading everything really gave me a pretty solid grasp of how AACS Encryption/DRM works.  Congrats to all the peeps at DOOM9 who worked very hard on getting all this info together.  All credit goes to them.

Of course SOMEBODY had to make some money off of all arnezami, BtCB and the rest of DOOM9’s hard work, and it looks like slysoft has borrowed arnezami and friends cracking methods to offer AnyDVD HD that will rip allmost any HD DVD or Blu Ray Disc without you having to do a damn thing.  I wonder if at least arnezami is getting a cut of the profits?  One lives in hope.

Anyhew none of this is native to linux but you can probably run most of it in WINE or convert the c++ aps to python.  Since AnyDVD doesn’t REALLY rip any HD disc then you might even consider just using the methods used by arnezami and the apps he and his friends over at DOOM9 created.

I made a little software pack for everyone so you don’t have to download everything seperately, except the slysoft app of course: HDandBDcrakingFiles.rar

Big Ups To All That Showed Big Hollywood That DRM is Useless.

Keep information free,


As it turns out you  don’t need to do a damn thing because according to

Follow the Jump to find arnezami’s sweet description of AACS encryption, if you want to understand everything that is…

Read the rest of this entry »

Tutorial: Wep Cracking At Its Best and Fastest Using Aircrack-PTW (Downloads)

17 05 2007

Source: The Register

A hanfull of hackers have the fastest attack on WEP that I’ve read of so far.

Here’s are the instructions via The Register:

 Step 1: Find the enemy (this is the test-network you created in your lab, to verify our results). You can use kismet or airodump to find it.

Step 2: Generate some traffic. To generate some traffic, use aireplay-ng in ARP injection mode. Aireplay will listen to the network until it has found an encrypted ARP packet. By reinjecting this packet again and again, you will generate a lot of traffic, and you will know that most of the traffic was ARP-traffic. For an ARP-Packet, you know the first 16 Bytes of the clertext and so the first 16 bytes of the cipherstream.

Step 3: Write this traffic to disk using airodump-ng or so. This will create a tcpdump-like capture file with the traffic.

Step 4: Launch our algorithm. You need the aircrack-ptw (by the way, aircrack-ptw has been integrated in the 0.9-dev version of aircrack-ng, which is currently in svn, but not released).

From a theoretical point of view, our algorithm is based on the following ideas. Andreas Klein, a German researcher, showed that there is a correlation in RC4 between Keybytes 1 to i-1, the keystream and the keybyte i. If the keybytes 1 to i-1 and the keystream are known, it is possible to guess the next unknown keybyte with a probability of about 1.36/256 which is a little bit higher than 1/256. We were able to show that it is also possible to guess the sum of keybytes i to i+k with a probability of more thatn 1.24/256.

In a WEP environment, the first three bytes of a packet key are always known and are called IV. Our tool tries to guess the sum of the next 1, 2, 3, … to 13 keybytes for every packet. If enough packets have been captured, the most guessed value for a sum is usually the right one. If not, the correct value is most times one of the most guessed ones.

Aircrack-ptw try to find the key, using this idea described above. If you have about 40,000 to 85,000 packets, your success probability is somewhere between 50 per cent and 95 per cent.

Sounds like fun!!

Big ups to The Register on the sweet article with the interview.  Please read the WHOLE article, the interview contains more information than the quick tutorial that I re-posted.  Reading the whole article will help you understand what this attack is really doing and how safe WEP really isn’t.

As for the attack itself, you can try to do it all in Windows using aircrack ported into cygwin.  However, I would suggest updating your BackTrack 2.0 disc or partition with the latest modules from the latest aircrack suite.

Happy Hacking!!

Top 9 Links and Videos On Lock Bumping and Bump Keys via

17 05 2007

Oh BuzzFeed you read my mind. I was just thinking about lock picking and or bumping.  I’ve practiced on my own door locks but I can’t get it to work as well as the guys in these links.


  1. Video: Action News Takes Us To The Dark Underworld Of Lock Bumping!

  2. Video: How To Make Your Own Bump Key

  3. Video: Bumping Principles – A Nice Graphic Explanation Of How It Works

  4. Video: Works On Padlocks, Too

  5. Your Bump Key Clearinghouse

  6. Video: The European Lock Bumping Expose

  7. I Guess This Means It’s Time To Get New Locks

  8. “Your Life At Risk Because Of A $1.79 Key?”

  9. A Home Security Alarm Blog (Shockingly) Says That Installing An Alarm Is Better Than Upgrading Your Locks

Wow, those really are the best 9 links I’ve seen on “Lock Bumping” or “Bump Keys”.  The really hard part is grinding down the tip and the shoulders of the key you are going to use as your bump key.  The easy part is getting the basic key cut with all settings on max or 9, depends on the key/lock that you want to bump.  Just go to whatever locksmith/keycutter nearest to you that won’t ask any questions.  Most won’t, some will laugh because they know what you are trying to do, but there is the occaisional asshole who thinks he’s friggin Judge Dread and won’t do it.  Its not illegal to posses or have bump keys cut, but it is illegal to use them on anything but your own property so stick to your own front door.  As for grinding down the shoulders and the tip of your key, a dremmel tool will do, but if you have access to something more accurate then use that instead.  Lastly you’ll need the “tomohawk” or basically a flexible plastic ruler with an eraser on the end.  That’s the part that you use to actually “bump” or hit the key while its in the lock.  My advice is to watch all the videos and read up, its not as easy as some make it out to be.

Happy Bumping!!

All credit goes to

PS: If you have a good link or tutorial on Bump Keys or Lock Bumping please post it in the comments.  I’ll add it to the list. “End The Rip-Off: Make Unlimited Calls from The USA”

14 05 2007 offers free calling to TEN over seas numbers that you designate after registering your number with the service.  It is free and its unlimited, but only to those 10 numbers.

As far as I can tell its totally legit.  Now if they could only make it unlimited calls period, not just for ten numbers.

Hey, its a pretty good start though!!

Good on ya Yak4Ever!

How To: Get Your YouTube Videos Approved by Google!

10 05 2007

There is a pretty interesting tutorial over on instructables on how to get your video  approved on YouTube, by using a Google “bug” and using the tag “Approved by Google!”.

For those of you who may not know, a “bug” in media terms, is a small garphic that sits in the lower right or left hand corner of a video.  You may have noticed that Comedy Central does this all the time for shows like “The Daily Show”.  It can be a way of branding a product as well as quick little advertisements for other shows (aka animated bugs).

Moving on.  HEre’s the link to the instructable: Get your YouTube videos approved by Google!

I’m unclear if this “Google Bug”, means that all your uploaded videos will be automatically approved no matter what the copyright is on a video, or if its just a bunch of bullshit.

I also don’t know if this counts as a hack … Your thoughts?

Lemme know if this is pure golden truth or fowl contemptable lies.

Hack On Bored Peeps!!