Rss

    Archives for : EFT

    Ham Radio Links

    Amateur Packet Radio Australian

    Aussiewide Packet Radio Network http://www.ampr.org.au/

    AAPRA  http://members.optusnet.com.au/aapra

    Queensland APRS Users Group http://www.tech-software.net/

    VK2KFJ’s Packet Radio Links page http://www.qsl.net/vk2kfj/pacradio.html

    VK4ZU http://www.users.on.net/~trevorb/

    VK5 AX25 Packet Network Map (VK5AH) http://homepages.picknowl.com.au/wavetel/vk5pack.htm

    Winlink

    Winpack

    International

    Amateur Packet Radio Gateways http://www.ampr-gates.net/frame_e.htm

    Amateur Packet Radio, net 44, and AMPR.ORG `http://www.ampr.org/

    American Febo Enterprises http://www.febo.com/index.html

    BayCom http://www.baycom.org/

    FUNET http://www.funet.fi/pub/ham/packet/

    FUNET ftp://ftp.funet.fi/pub/ham/packet/

    F4DAY http://perso.wanadoo.fr/jf.fourcadier/index_e.htm

    F6FBB http://www.f6fbb.org/

    GB7DIP TNOS/PBBS http://www.qsl.net/gb7dip/access.html

    G4JKQ TCP/IP Telnet listing http://www.qsl.net/g4jkq/tcp.htm

    G7JJF TNC Driver Support (WINTNC) http://www.g7jjf.demon.co.uk/

    High speed packet http://hydra.carleton.ca/articles/hispeed.html

    High Speed Packet radio http://www.lmrgroup.com/ke3ht/hspr.html

    High-speed Packet Radio http://cacofonix.nt.tuwien.ac.at/~oe1kib/Radio/

    KE5FX http://www.qsl.net/ke5fx/

    K4ABT (home page) http://www.packetradio.com/

    Linux® / Amateur Radio Information http://delbert.matlock.com/linux-radio.htm

    Linux AX25-HOWTO http://tldp.org/HOWTO/AX25-HOWTO/

    PA3CGO http://www.qsl.net/pa3gco/

    Packet Info and Downloads http://www.packetradio.com/

    Packet Links http://www.stack.serpukhov.su/~victor/hamradio/packet/packet.html

    Packet Net (VK5 packet map) http://www.packetnet.org/

    Packet Net (FBB software) http://www.packetnet.org/fbb.htm

    PAcket Digital Amateur Network (PADAN) http://www.weaksignals.com/

    Radio-TNC Wiring Diagrams http://users3.ev1.net/~medcalf/ztx/wire/

    RST http://www.qsl.net/on1blu/

    Slovenian ATV/Packet http://lea.hamradio.si/~s51kq/

    Sound Card Packet http://www.qsl.net/soundcardpacket/index.html

    TAPR http://www.tapr.org/

    TNC-X http://www.tnc-x.com/

    TPK http://www.f6fbb.org/f1ebn/index.htm

    TNOS Central http://www.lantz.com/tnos/

    TVIPUG http://www.tvipug.org

    WA4DSY 56k RF Modem http://www.wa4dsy.net/

    Yet Another 9k6 Modem http://www.microlet.com/yam/

     

    Sound Card Packet

    ILINKBOARDS.com http://www.ilinkboards.com/

    Sound Card Buddy http://www.sparetimegizmos.com/Hardware/SoundBuddy.htm

    Soundcard Interfacing http://www.qsl.net/wm2u/interface.html

    Sound Card Packet AGWPE (KC2RLM) http://www.patmedia.net/ralphmilnes/soundcardpacket/

    Sound Card Interface with Tone Keyer (WA8LMF) http://members.aol.com/wa8lmf/ham/tonekeyer.htm

    QDG sound card interface

    Return to Top


    Winlink

    Winlink! 2000 http://winlink.org/

    Aussie Winlink http://www.aussiewinlink.org

    Pactor Communications Australia http://www.pca.cc/


    Winpack

    Winpack home page http://www.peaksys.co.uk/

    Winpack info http://www2.tpg.com.au/users/peteglo/winpack.htm

     

    TNC information

    General

    Setting Your TNC’s Audio Drive Level http://www.febo.com/packet/layer-one/transmit.html

    TNC and Radio mods http://www.johnmather.free-online.co.uk/tnc.htm

    MFJ

    MFJ-1278B Care and maintenance http://www.qsl.net/ke4mob/

    AEA

    AEA radio and TNC mods http://www.k7on.com/mods/aea/mods/aeamod.txt

    Other suppliers

    BYONICS http://byonics.com/

    Fox Delta http://www.foxdelta.com/

    Kantronics http://www.kantronics.com/

    PacComm http://www.paccomm.com/

    The DXZone Digital and Packet Radio http://www.dxzone.com/catalog/Manufacturers/Digital_and_Packet_Radio/

    Tigertronics http://www.tigertronics.com/

    Timewave http://www.timewave.com/amprods.html

    TNC-X – The Expandable TNC  http://www.tnc-x.com/


    Gateways

    Amateur Packet Radio Gateways http://www.ampr-gates.net

    G4JKQ http://www.g4jkq.co.uk/

    The Gateways Home Page http://www.ampr-gateways.org/

     

    High-Speed Digital Networks and Multimedia (Amateur)

    North Texas High Speed MultiMedia group http://groups.yahoo.com/group/ntms-hsmm/

    Also take a look at the wireless LAN pages


    APRS

    Aus APRS http://www.radio-active.net.au/vk2_aprs.html

    APRS http://www.radio-active.net.au/web/gpsaprs/aprsrept.html

    APRS http://aprs.rutgers.edu/

    APRS http://www.cave.org/aprs/

    APRS in Adelaide http://vk5.aprs.net.au/

    AVR-Microcontroller http://www.qsl.net/dk5jg/aprs_karten/index.html

    APRS in the UK http://www.aprsuk.net/

    aprsworld http://www.aprsworld.net

    APRS.DE http://www.aprs.de/

    APRS-Berlin http://www.aprs-berlin.de/

    APRS-Frankfurt http://www.aprs-frankfurt.de/

    BYONICS (Electronics Projects for Amateur Radio) http://www.byonics.com/

    CanAPRS http://www.canaprs.net/

    Dansk APRS Gruppe http://www.aprs.dk/

    findU.com http://www.findu.com/

    France APRS http://www.franceaprs.net/

    Kansas City APRS Working Group http://www.kcaprs.org/

    KD4RDB http://wes.johnston.net/aprs/

    Live Australian APRS data maps http://www.aprs.net.au/japrs_live.html

    NIAN http://nian.aprs.org/

    Queensland APRS Users Group http://www.tech-software.net/

    Tri-State APRS Working Group http://www.tawg.org/


    Other Digital Modes

    General

    HF-FAX http://www.hffax.de/index.html

    ZL1BPU http://www.qsl.net/zl1bpu/

    Morse Code

    CW Operators’ QRP Club Inc. http://www.users.on.net/~zietz/qrp/club.htm

    Fists Down Under http://fistsdownunder.morsekeys.com

    LEARN MORSE CODE in one minute ! http://www.learnmorsecode.com/

    MRX morse code http://www.mrx.com.au/

    Not Morse Code, Slow Scan , Packet or APRS

    HamDream by HB9TLK (digital radio) http://www.qslnet.de/member/hb9tlk/

    JE3HHT, Makoto (Mako) Mori http://www.qsl.net/mmhamsoft/

    PSK31 and other PC Magic http://www.psk31.com/

    WSJT ACTIVITY IN AU (follow link) http://www.tased.edu.au/tasonline/vk7wia/


    Amateur Digital Radio

    AR Digital Voice Communications http://www.hamradio-dv.org/

    Australian National D-Star http://www.dstar.org.au/

    Ham Radio digital info http://www.hamradio.com/pdf/dstar.pdf

    ICOM America digital http://www.icomamerica.com/amateur/dstar/

    Temple University Digital Voice Project http://www.temple.edu/k3tu/digital_voice.htm

    Temple University Vocoder Redux http://www.temple.edu/k3tu/VocoderRedux.pdf

    WinDRM – HF Digital Radio Mondiale http://n1su.com/windrm/

     

    D-Star

    Australian D-Star information http://www.dstar.org.au/

    D-Star wikipedia http://en.wikipedia.org/wiki/D-STAR

    ICOM America D-Star Forums http://www.icomamerica.com/en/support/forums/tt.asp?forumid=2

     

    Software Defined Radio

    FlexRadio Systems Software Defined Radios http://www.flex-radio.com/

    Rocky software for SoftRock-40 hardware http://www.dxatlas.com/rocky/

    SDRadio – a Software Defined Radio http://digilander.libero.it/i2phd/sdradio/

    SoftRock-40 Software Defined Radio http://www.amqrp.org/kits/softrock40/index.html

    The Weaksignals pages og Alberto I2PHD (software)  http://www.weaksignals.com/


    Digital Radio

    BBC digital Radio http://www.bbc.co.uk/digitalradio/

    Digital Audio Broadcasting http://www.digitalradio.ca/

    Digital Radio Broadcasting http://happy.emu.id.au/lab/info/digradio/index.html

    Digital Radio http://www.magi.com/~moted/dr/

    DRDB http://www.drdb.org/

    DRM – Digitaler Rundfunk unter 30 MHz http://www.b-kainka.de/drm.htm#dritte

     

    Amateur Radio Direction Finding

    Amateur Radio Direction Finding and Orienteering http://vkradio.com/ardf.html

    Amateur Radio Direction Finding Webring http://www.qsl.net/vk3zpf/webring1.htm

    Homing In http://members.aol.com/homingin/

    RON GRAHAM ELECTRONICS (ARDF and more) http://users.mackay.net.au/~ron/

    Victorian ARDF Group Inc. http://www.ardf.org.au/


    Repeater Linking

    There are currently There are 5 internet linking projects that I know of :-

    IRLP,  iPHONE, iLINK, eCHOLINK and WIN SYSTEM (May 2005)

    EchoLink http://www.echolink.org/

    Hamlink (K1RFD) http://www.hamlink.net/

    KWARC (live audio) http://www.kwarc.org/listen/

    Internet Linking http://www.qsl.net/g3zhi/index2.html

    IRLP http://www.irlp.net/

    IRLP status http://status.irlp.net

    WIN SYSTEM http://www.winsystem.org/

    iLINK

    G4CDY-L Internet Gateway http://www.g4cdy.co.uk/

    iLink http://www.aacnet.net./

    VA3TO iLINK INTERFACE http://www.ilinkca.com/

    VK2JTP iLINK gateway http://www.qsl.net/vk2jtp/

    WB2REM & G4CDY’S  iLINK boards http://www.ilinkboards.com/

    WB4FAY http://www.wb4fay.com/ilink_FAQ.html

    INTERFACES

    ILINKBOARDS.com http://www.ilinkboards.com/


    laser diodes

    A R Laser Communications http://www.qsl.net/wb9ajz/laser/laser.htm

    Australian Optical DX Group http://groups.yahoo.com/group/Optical_DX/

    Driver Enhancements http://www.misty.com/people/don/laserdps.htm#dpsdepm

    European Laser Communications http://www.emn.org.uk/laser.htm

    Ronja http://atrey.karlin.mff.cuni.cz/~clock/twibright/ronja/


    Amateur Radio Licence

    radiofun http://www.alphalink.com.au/~parkerp/gateway.htm

    Worldwide Information on Licensing for Radio Amateurs by OH2MCN http://www.qsl.net/oh2mcn/license.htm


    Amateur Radio Clubs and Organisations

    Also see ATV link page

    and VHF link page

    Australian

    Adelaide Hills Amateur Radio Society http://www.qsl.net/vk5bar/

    Amateur Radio Victoria http://www.amateurradio.com.au/

    Barossa Amateur Radio Club VK5BRC http://www.qsl.net/vk5brc/

    Brisbane Amateur Radio Club http://www.qsl.net/vk4ba/index.html

    Brisbane VHF Group

    Central Coast Amateur Radio Club http://www.ccarc.org.au/

    Central Goldfields A R Club http://www.cgfar.com/

    CHIFLEY A R CLUB http://chifley.radiocorner.net/

    Coffs Harbour & District Amateur Radio Club http://www.qsl.net/vk2ep/index.html

    CW Operators’ QRP Club Inc. http://www.users.on.net/~zietz/qrp/club.htm

    Eastern and Mountain District Radio Club http://www.emdrc.com.au

    Gold Coast AR Society http://www.gcars.com.au/

    Healesville Amateur Radio Group http://www.harg.org.au/

    Historical Wireless Society of South East Queensland http://www.hws.org.au/

    Ipswich Metro Radio Group http://imrg.ips-mesh.net/

    Lockyer Valley Radio and Electronic Club Inc http://www.qsl.net/vk4wil/

    Manly-Warringah Radio Society http://www.qsl.net/vk2mb/

    NWTARIG http://vk7ax.tassie.net.au/nwtarig/

    QRP Amateur Radio Club International http://www.qrparci.org/

    Queensland APRS Users Group http://www.tech-software.net/

    RADAR Club Inc http://radarclub.tripod.com

    Radio Amateurs Old Timers Club Australia Inc http://www.raotc.org.au/

    Radio Sport http://www.uq.net.au/radiosport/

    Radio and Electronics Association of Southern Tasmania http://reast.asn.au/

    Riverland Amateur Radio Club http://www.rrc.org.au/

    South Australian Packet User Group Inc. (SAPUG) http://www.sapug.ampr.org/

    SERG http://serg.mountgambier.org

    South Coast AMATEUR RADIO Club http://www.scarc.org.au/

    SOUTHSIDE AMATEUR RADIO SOCIETY http://www.qsl.net/vk4wss/

    Sunshine Coast Amateur Radio Club http://vk4wis.org/

    VK Young Amateur Radio Operator’s Net http://www.geocities.com/vk_ya/

    VK3APC http://www.mdrc.org.au/

    VK3BEZ (WIA Eastern Zone Amateur Radio Club) http://www.qsl.net/vk3bez/

    VK4WIL http://www.qsl.net/vk4wil/

    West Australia Repeater Group http://www.warg.org.au

    WESTLAKES AR Club http://www.westlakesarc.org.au/

    WIA VK4 Qld http://www.wiaq.com/

    WIA VK4 QNEWS NEWSROOM http://www.wiaq.com/qnews/upload/qnews.htm

    WIA http://www.wia.org.au/

    WICEN Australia http://www.wicen.org.au/

    WICEN Brisbane Qld

    New Zealand

    NZART http://www.nzart.org.nz/nzart/

    Papakura Radio Club http://www.qsl.net/zl1vk/

    Wanganui Amateur Radio Society Inc. http://www.zl2ja.org.nz/

    Wellington VHF Group http://www.vhf.org.nz/

    International

    American QRP Club http://www.amqrp.org/index.html

    ARRL http://www.arrl.org/

    Clear Lake Amateur Radio Club http://www.clarc.org/

    FRARS http://www.frars.org.uk/

    HKAR http://www.hkra.org/

    HRDXA http://www.qsl.net/vr2dxa/

    KIDSHAMRADIO http://www.kidshamradio.com/

    K2MFF Amateur Radio club http://www-ec.njit.edu/~k2mff/

    North TeXas Repeater Association http://www.ntxra.com/main_page.htm

    N0WGE http://www.sckans.edu/~sireland/radio/

    The Repeater Builders Technical Information Page http://www.repeater-builder.com/rbtip/index.html#main-index

    Richardson Wireless Klub http://www.k5rwk.org/

    RADARS http://www.mbc.co.uk/RADARS/

    RSGB http://www.rsgb.org/

    SARL http://www.sarl.org.za/

    Submarine Veterans Amateur Radio http://w0oog.50megs.com/

    Southgate AR club http://www.southgatearc.org/index.htm

    TEARA http://www.teara.org/

    The 500 KC Experimental Group for Amateur Radio http://www.500kc.com/

    Tucson Amateur Packet Radio http://www.tapr.org/

    W6DEK 435 Los Angeles http://www.w6dek.com/


    Amateur Radio

    Australian

    Australian AR Repeater Map http://vkham.com/australimaps.html

    AMATEUR RADIO WIKI http://www.amateur-radio-wiki.net

    HAM SHACK COMPUTERS http://www4.tpgi.com.au/users/vk6pg/

    Ham Radio in Australia with VK1DA http://members.ozemail.com.au/~andrewd/hamradio/

    HF Radio Antenna Tuners http://www.users.bigpond.net.au/eagle33/elect/ant_tuner.htm

    Queensland AR Repeater listings http://vkham.com/Repeater/vk4map.html

    Radioactive Networks: Ham http://www.radio-active.net.au/web/ham/

    Tony Hunt VK5AH (Home of Adelaides 10m Repeater) http://homepages.picknowl.com.au/wavetel/default.htm

    VK1DA’s Amateur Radio Web Directory vk1da.net/radlink.html

    VK1KEP http://www.pcug.org.au/~prellis/amateur/

    VK1OD owenduffy.net

    VK2BA (AM radio) http://www.macnaughtonart.com/default.htm

    VK3PA http://www.vk3pa.com/home.asp

    VK3UKF http://members.fortunecity.co.uk/vk3ukf/index.html

    VK3XPD http://www.users.bigpond.com/alandevlin/index.html

    VK3YE’s Gateway to AR http://www.alphalink.com.au/~parkerp/gateway.htm

    VK3ZQB http://members.datafast.net.au/vk3zqb/

    VK4CEJ http://www.hfradio.org/vk4cej/hamlinks.html

    VK4TEC http://www.tech-software.net/

    VK4TUB http://www.vk4tub.org/

    VK4ZGB http://members.optusnet.com.au/jamieb/index.html

    VK4ZU http://www.users.on.net/~trevorb/

    VK5BR http://users.tpg.com.au/users/ldbutler/

    VK5KK http://www.ozemail.com.au/~tecknolt/index.html

    VK8JJ http://www.qsl.net/vk8jj/

    New Zealand

    Micro Controller Projects for Radio Amateurs and Hobbyists http://www.qsl.net/zl1bpu/micro/index.htm

    Precision Frequency Transmission and Reception http://www.qsl.net/zl1bpu/micro/Precision/index.htm

    ZL3TMB http://www.hamradio.co.nz/

    International

    AC6V’s AR & DX Reference http://www.ac6v.com/

    Amateur radio with Knoppix http://www.afu-knoppix.de/

    Amateur Radio Soundblaster Software Collection http://www.muenster.de/~welp/sb.htm

    AM fone.net http://www.amfone.net

    AMRAD Low Frequency Web Page http://www.amrad.org/projects/lf/index.html

    DL4YHF http://www.qsl.net/dl4yhf/

    Direction finding http://members.aol.com/homingin/

    DSP Links http://users.iafrica.com/k/ku/kurient/dsp/links.html

    Electric-web.org www.electric-web.org

    EI4HQ http://www.4c.ucc.ie/~cjgebruers/index.htm

    EI8IC http://www.qsl.net/ei8ic/

    EHAM http://www.eham.net/

    eQSL (electronic QSL) http://www.eqsl.cc/qslcard/

    HamInfoBar http://www.haminfobar.co.uk/

    Felix Meyer http://home.datacomm.ch/hb9abx/

    FUNET http://www.funet.fi/pub/ham/

    F4DAY http://perso.wanadoo.fr/jf.fourcadier/index_e.htm

    Gateway to Amateur Radio http://www.alphalink.net.au/~parkerp/gabra.htm

    Grid Square Locator http://www.arrl.org/locate/grid.html

    G3PTO http://www.qsl.net/g3pto/

    G4KLX (The [ON/]G4KLX Page) http://www.qslnet.de/member/g4klx/

    HAM RADIO EQUIPMENT & ACCESSORIES http://www.area-ham.org/library/equip/equip.htm

    Ham-Links http://www.k1dwu.net/ham-links/

    HAMUNIVERSE.COM http://www.hamuniverse.com/

    Hamview DSP software http://www.qsl.net/k3pgp/Hamview/hamview.htm

    Homebrew RF Test Equipment And Software http://www.qsl.net/n9zia/wireless/appendixF.html#10

    KB4VOL   link site http://pages.prodigy.com/kb4vol/

    KE5FX http://www.qsl.net/ke5fx/

    KF6VTA & KG4TBJ http://www.geocities.com/silensiosham/index.html

    KU4AY ham radio directory http://www.ku4ay.net/

    K1DWU http://www.k1dwu.net/

    K1TTT http://www.k1ttt.net/

    K1TTT Technical Reference http://www.k1ttt.net/technote/techref.html

    K3PGP http://www.k3pgp.org/

    K3TZ Ham Radio Experimentation http://www.qsl.net/k3tz/

    K6XC (links) http://home.earthlink.net/~rluttringer/

    Lighthouses (International Lighthouse/ Lightship Weekend) http://illw.net

    Links2go http://www.links2go.net/more/www.ampr.org/

    Mels AMATEUR RADIO LINK’S http://www.users.zetnet.co.uk/melspage/amlinks.htm

    Michael Todd Computers & Communications http://www.arcompanion.com/

    MoDTS http://www.m0dts.co.uk/

    NT8N http://www.qsl.net/nt8n

    NW7US   (Amateur and Shortwave Radio) http://hfradio.org/

    N3EYR’s Radio Links http://www.isrv.com/~joel/radio.html

    PD0RKC http://www.qsl.net/pd0rkc/

    PI6ATV (ATV, Antenna, software, info) http://members.tripod.lycos.nl/PI6ATV/software.htm

    Radio Links http://www.angelfire.com/ri/theboss1/

    Radio Corner (forum) http://www.radiocorner.net

    Ray Vaughan http://rayvaughan.com/

    Reference http://www.panix.com/~clay/ham/

    streaming radio programs http://live365.com/home/index.live

    The Elmer HAMlet (information) http://www.qth.com/antenna/index.htm

    VE1XYL and VE1ALQ http://www.qsl.net/ve1alq/downloads/tetrode-ps/pwrsup.htm

    WB6VUB (links) http://www.mpicomputers.com/ham/

    WL7LP http://www.geocities.com/TimesSquare/Castle/3782/wl7lp.html

    W2XO http://www.w2xo.pgh.pa.us/

    XE1BEF  (DX, mods, links and more) http://www.geocities.com/xe1bef/


    Communications Equipment

    Australian

    Andrews Communication Systems http://www.andrewscom.com.au/

    AUSTRALIAN ENTERPRISE INDUSTRIAL http://www.spin.net.au/~aeitower/

    BENELEC www.benelec.com.au

    Bushcomm www.bushcomm.com.au

    G. & C. COMMUNICATIONS www.gccomm.com.au

    Hamak (RM Products Italy) http://www.hamak.com.au/

    Hamshack http://www.hamshack.com.au

    KENWOOD Australia http://www.kenwood.com.au/

    Kyle Communications http://www.kyle.com.au/

    ICOM Australia http://www.icom.net.au

    Mini-kits http://www.minikits.com.au/

    OZGEAR http://www.ozgear.com.au/

    Radio-Data (links) http://www.radio-data.net/

    Radio Specialists (equipment connectors and antenna) http://www.radiospecialists.com.au

    STRICTLY HAM http://www.strictlyham.com.au/

    TET-EMTRON www.tet-emtron.com

    Townsville CB& Communications http://www.vk4tub.org/tcb/tcb.html

    TTS Systems http://www.ttssystems.com.au/

    VK4-ICE Communications http://www.vk4ice.com

    WiNRADiO (PC based receivers) http://www.winradio.com.au

    International

    MFJ http://www.mfjenterprises.com/index.php

    Vertex Standard http://www.vxstd.com/en/index.html

    W7FG VINTAGE MANUALS CATALOGUE http://www.w7fg.com/index.html

    Z Communications Company (repair of old radio equipment) http://home.comcast.net/~zcomco/

    See also Kits and components


    Radio mods, cables, connection info

    batlabs (Motorola radio connection, cable info) http://www.batlabs.com/

    Hall Electronics http://www.hallelectronics.com/getech/proglink.htm

    Radio Mods http://www.mods.dk/

    WWW.ham.dmz.ro (mods info and more) http://www.ham.dmz.ro/

    W4RP IC-2720H Page http://www.w4rp.com/ic2720/

    XE1BEF  (DX, mods, links and more) http://www.geocities.com/xe1bef/

    Please also look at manufacture’s sites


    Lightning Protection

    www.DaStrike.com (video and links) http://www.dastrike.com/

    K9WK Amateur Radio http://www.k9wk.com/litenin.html

    Lightning Protection Institute http://www.lightning.org/

    Marine Grounding Systems http://www.sailmail.com/grounds.htm

    Moonraker boat lightning information http://www.moonraker.com.au/techni/lightning-marine.htm

    NLSI http://www.lightningsafety.com/nlsi_lhm/effect.html

    PolyPhaser http://www.polyphaser.com/

    RFI Lightning protection http://www.rfindustries.com.au/rfiproducts/lightning/lightning.htm

     

    Amateur Spread Spectrum

    Spread Spectrum Scene http://www.sss-mag.com/map.html

    Spread spectrum http://www.amrad.org/projects/ss/

    SS Info http://www.ictp.trieste.it/~radionet/1997_workshop/wireless/notes/index.htm


    Call-sign finders

    The DX Notebook http://www.dxer.org/callbook.html

    QRZ http://www.qrz.com/

    QSL.NET http://www.qsl.net/


    Equipment suppliers and manufacturers

    Easy-radio (your DNS server may have problems finding this site) http://www.easy-radio.co.uk/


    Kits and Components

    Australian and selected international suppliers

    ACRES ELECTRONICS http://www.acreselectronics.co.nz/product.htm

    Allthings http://www.allthings.com.au/

    Altronics http://www.altronics.com.au/

    Antique Electronic Supply http://www.tubesandmore.com/

    Antenna Systems and Supplies Inc. (sm) http://www.antennasystems.com/

    Av-COMM http://www.avcomm.com.au/

    BYONICS http://www.byonics.com/

    Clarke & Severn Electronics http://www.clarke.com.au

    Cliff Electronics (Aus) Pty. Ltd http://www.cliff.com.au/

    Computronics http://www.computronics.com.au/tools/

    David Hall Electronics http://www.dhe.com.au

    Dick Smith Electronics http://www.dse.com.au/cgi-bin/dse.storefront

    Digi-Key http://www.digikey.com/

    Dominion Electronics http://www.dominion.net.au/

    Electronics http://www.michelletroutman.com/index.htm

    Elliott Sound Products http://sound.westhost.com/index2.html

    Farnell http://www.farnell.com/

    Fox Delta http://www.foxdelta.com/

    G1MFG.com (ATV and more) http://www.g1mfg.com/index.html

    Hammond Mfg http://www.hammondmfg.com/

    Hy-Q International http://www.hy-q.com.au

    IRH Components http://www.irh.com.au/index.htm

    Jaycar http://www.jaycar.com.au/

    Microwave Dynamics http://www.microwave-dynamics.com/

    MicroZed Computers http://www.microzed.com.au/

    Mini-Circuits http://www.minicircuits.com/

    Mini-kits http://www.minikits.com.au/

    Mouser Electronics http://www.mouser.com/

    NEWTEK ELECTRONICS http://www.newtek.com.au/

    Oatley electronics http://www.oatleyelectronics.com/

    Ocean State Electronics http://www.oselectronics.com/

    Ozitronics http://www.ozitronics.com/

    pacific DATACOM http://www.pacificdatacom.com.au

    Picaxe http://www.Picaxe.com.au

    Prime Electronics http://www.prime-electronics.com.au/

    Radio Parts http://www.radioparts.com.au/

    R.C.S. Radio (circuit boards) http://www.rcsradio.com.au/

    RF Modules Australia (ZigBee) http:\www.rfmodules.com.au

    RFShop (Brisbane) http://www.rfshop.com.au/

    Rockby Electronics and Computers http://www.rockby.com.au/

    RS Components http://www.rsaustralia.com/

    Semtronics http://www.semtronics.com.au/

    Sicom http://www.sircom.co.nz

    Silvertone Electronics http://www.silvertone.com.au/

    South Island Component Centre (New Zealand) http://www.sicom.co.nz/

    Surplus Sales of Nebraska http://www.surplussales.com/

    Surplustronics (New Zealand) http://www.surplustronics.co.nz/

    Tandy (Australia) http://www.tandy.com.au/

    Teckics http://www.techniks.com/

    TTS Systems http://www.ttssystems.com.au/

    WB9ANQ’s Surplus Store http://www.qsl.net/wb9anq/

    Wiltronics http://www.wiltronics.com.au/

    Worldwide Electronic Components http:/www.iinet.net.au/~worcom

    13cm.co.uk http://www.13cm.co.uk/

    Also look at the ATV links



    PCB layout and schematic programs baas electronics LAYo1 PCB http://www.baas.nl/layo1pcb/uk/index.html

    Easytrax http://www.cia.com.au/rcsradio/

    Electronics WORKBENCH http://www.ewbeurope.com/Franklin Industries http://www.franklin-industries.com/Eagle/starteagle.html McCAD http://www.mccad.com/ OrCAD http://www.orcad.com/downloads.aspx TARGET 3001! http://www.ibfriedrich.com/english/engl_vordownload.htm Tech5 http://www.tech5.nl/eda/pcblayout TinyCAD http://tinycad.sourceforge.net/ VEGO ABACOM http://www.vego.nl/abacom/download/download.htm


    Amateur Satellites and space

    AMSAT http://www.amsat.org/

    AMSAT-DL http://www.amsat-dl.org/

    AMSAT-ZL (kiwisat) http://www.amsat-zl.org.nz/

    CSXT Civilian Space eXploration Team http://www.civilianspace.com/

    electric-web.org http://www.electric-web.org

    esa http://www.esa.int/esaCP

    Heavens-above http://www.heavens-above.com/

    ISS fan club http://www.issfanclub.com

    SATSCAPE   (free satellite tracking program) http://www.satscape.co.uk/

    Satellite tracking software http://perso.club-internet.fr/f1orl/index.html

    Satsignal http://www.satsignal.net/

    Space.com http://www.space.com/

    UHF-Satcom.com http://www.uhf-satcom.com

     

    Propagation

    NOAA http://www.sec.noaa.gov/

    IPS Radio and Space Services http://www.ips.gov.au/

    ITS http://www.its.bldrdoc.gov/

    Near-Real-Time MUF Map http://www.spacew.com/www/realtime.php

    Radio Mobile (path prediction) http://www.cplus.org/rmw/english1.html

    VK4ZU (Propagation) http://www.users.on.net/~trevorb/

     

    Satellite TV

    AV-COMM http://www.avcomm.com.au/

    KANSAT http://www.kansat.com.au/

    KRISTAL electronics http://www.kristal.com.au/index.html

    Lyngsat http://lyngsat.com/

    Nationwide Antenna Systems http://www.uq.net.au/~zznation/index.html

    Satcure http://www.satcure.com/

    SAT TV http://www.sattv.com.au/


     

    Radio and Scanning

    Australian

    Brisbane Radio Scanner http://www.angelfire.com/id/samjohnson/

    Extreme Worldwide Scanner Radio http://members.optushome.com.au/extremescan/scanning.html

    Newcastle Area Radio Frequency Guide http://scanhunter.tripod.com/index.html

    RADIO FREQUENCIES AND INFORMATION http://www.qsl.net/vk1zmc/information.html

    New Zealand

    Kiwi Radio http://kiwiradio.blakjak.net/

    NZscanners http://www.nzscanners.org.nz/

    Wellington Scanner Frequencies http://wsf2003.tripod.com/

    ZLScanner http://homepages.paradise.net.nz/lovegrov/

    ZL3TMB (Christchurch NZ) http://www.hamradio.co.nz/

    International

    Frequency guide http://www.panix.com/~clay/scanning/

    Incident Broadcast Network (including Australian feeds) http://www.incidentbroadcast.com

    Radio H.F.  (some ham stuff) http://www3.sympatico.ca/radiohf/

    RadioReference.com http://www.radioreference.com/index.php


    Amateur Radio DX and Contest

    DX Cluster

    AA1V’s DX Info-Page http://www.goldtel.net/aa1v/

    AC6V’s AR & DX Reference http://www.ac6v.com/

    Australian contesting http://www.vkham.com/index.html

    Buckmaster callsign database http://www.buck.com/cgi-bin/do_hamcall

    DX Greyline http://www.fourmilab.ch/cgi-bin/uncgi/Earth/action?opt=-p

    DX Summit http://oh2aq.kolumbus.com/dxs/

    DX 425 News http://www.425dxn.org/

    EHAM http://www.eham.net/

    EI8IC Global Overlay Mapper http://www.mapability.com/ei8ic/

    eQSL (electronic QSL) http://www.eqsl.cc/qslcard/

    German DX Foundation-GDXF http://www.gdxf.de/

    GlobalTuners (provides access to remotely controlled radio receivers all over the world) http://www.globaltuners.com/

    Ham Atlas by SP6NVK http://www.hamatlas.eu/

    Kiwi DX List http://groups.yahoo.com/group/kiwidxlist/

    Oceania Amateur Radio DX Group Incorporated http://odxg.org/

    Oceania DX Contest http://www.oceaniadxcontest.com/

    QRZ.COM http://www.qrz.com/site.html

    The AM Window http://www.amwindow.org/index.htm

    The Daily DX http://www.dailydx.com

    IARU QSL Bureaus http://www.iaru.org/iaruqsl.html

    International DX Association http://www.indexa.org/

    Internet Ham Atlas http://www.hamatlas.eu/

    IOTA http://www.425dxn.org/iota/

    IOTA groups and Reference http://www.logiciel.co.uk/iota/shtlist.html

    IOTA RSGB http://rsgbiota.org

    IOTA 425 http://www.425dxn.org/iota

    Island Radio Expedition Fondation http://www.islandradio.org/

    LA9HW HF Contest page http://home.online.no/~janalme/hammain.html

    NG3K Contest/DX Page http://www.cpcug.org/user/wfeidt/

    Northern California DX Foundation http://www.ncdxf.org

    Simple phrases in European Languages http://web.onetel.com/~stephenseabrook/

    SUMMITS on the AIR http://www.sota.org.uk/

    Telnet Access to DX Packet Clusters http://cpcug.org/user/wfeidt/Misc/cluster.html

    The DX Notebook http://www.dxer.org/

    VE6OA’s DX Links http://www.compusmart.ab.ca/agirard/dxlinks.htmVK Contest Club http://www.vkcc.com

    World of DK4KQ http://www.dl4kq.de/

    XE1BEF  DX and links http://www.geocities.com/xe1bef/

    Logging Software

    VK Contest Log (VKCL) http://web.aanet.com.au/mnds/

    VK/ZL Logger http://www.vklogger.com

    WinRD+ logging program http://www.rjmb.net/rd/index.htm


    Cluster

    AR-Technology AB5K.net http://www.ab5k.net/Home.aspx

    Clusse http://he.fi/clusse/

    CLX Home page http://clx.muc.de/

    DX CLUSTER programs http://pages.cthome.net/n1mm/html/English/DXClusters.htm

    DXCluster http://www.dxcluster.org/

    DXCluster.Info http://www.dxcluster.info/

    DxNet http://www.dxnet.free.fr/

    DX PacketCluster Sites on the Internet http://www.n4gn.com/cluster.html

    DXSpider – DX cluster system is written in perl http://linux.maruhn.com/sec/dxspider.html

    Packet Cluster user manual http://www.yccc.org/Resources/ysa/manual/

    The DXSpider User Manual http://www.dxcluster.org/main/usermanual_en.html

    VE7CC-1 Dx Spider Cluster http://www.ve7cc.net/

     

    Short Wave DX

    AUSTRALIAN RADIO DX CLUB http://www.ardxc.info/

    Electronic DX Press (HF, MW and VHF) http://members.tripod.com/~bpadula/edxp.html

    Contesting.com http://www.contesting.com/

    CQ World Wide DX Contest http://www.cqww.com/

    K6XX http://www.k6xx.com/

    Longwave Club of America (also Ham) http://www.lwca.org

    NIST time stations http://www.boulder.nist.gov/timefreq/stations/wwvb.htm

    OK1RR DX & Contesting Page http://www.qsl.net/ok1rr/

    Prime Time Shortwave http://www.primetimeshortwave.com/

    Radio Interval Signals http://www.intervalsignals.org/

    shortWWWave http://swww.dwerryhouse.com.au/

    SM3CER Contest Service http://www.sk3bg.se/contest/index.htm

    The British DX Club http://www.bdxc.org.uk/

    Yankee Clipper Contest Club http://www.yccc.org/

     

    Radio Scouting

    Scouts Australia JOTA/JOTI http://www.international.scouts.com.au/main.asp?iMenuID=9071085

    The history of the Jamboree On The Air http://home.tiscali.nl/worldscout/Jota/jota history.htm

    World Organization of the Scout Movement http://www.scout.org/jota/


    Australian Regulator

    ACMA http://www.acma.gov.au/

    International Regulator

    ITU http://www.itu.int/home/index.html



    Electronic Information and technical reference

    AC6V’s Technical Reference http://www.ac6v.com/techref.htm

    Chip directory http://www.embeddedlinks.com/chipdir/abc/s.htm#simm

    Circuit Sage http://www.circuitsage.com/

    CommLinx Solutions Pty Ltd http://www.commlinx.com.au/default.htm

    Computer Power Supply Mods http://www.qsl.net/vk4ba/projects/index.html

    Discover Circuits http://www.discovercircuits.com/

    Electronic Information http://www.beyondlogic.org/

    Electronics Links and Resources http://yallara.cs.rmit.edu.au/~pleelave/electronics1.html

    Epanorama (lots of links) http://www.epanorama.net/

    Electronics Tutorials http://www.electronics-tutorials.com/

    Electronic Theory http://www.electronicstheory.com/

    Fox Delta http://www.foxdelta.com/

    GREG’S DOWNLOAD PAGE http://www.rfcascade.com/index.html

    Hobby Projects (electronic resource) http://www.hobbyprojects.com/tutorial.html

    Hittite http://www.hittite.com

    Information site http://www.epanorama.net/

    ISO Date / Time http://wwp.greenwichmeantime.com/info/iso.htm

    Latitude/Longitude Conversion utility – 3 formats http://www.directionsmag.com/latlong.php

    New Wave Instruments (check out SS Resources) http://www.newwaveinstruments.com/index.htm

    Paul Falstad (how electronic circuits work) http://www.falstad.com/circuit/

    PINOUTS.RU (Handbook of hardware pinouts) http://pinouts.ru/

    PUFF http://www.cco.caltech.edu/~mmic/puffindex/puffE/puffE.htm

    RadioReference http://www.radioreference.com/

    RF Cafe http://www.rfcafe.com/

    RF Globalnet http://www.rfglobalnet.com

    RHR Laboratories http://www.rhrlaboratories.com/#Software

    rfshop http://www.rfshop.com.au/page7.htm

    RS232 Connections, and wiring up serial devices http://www.airborn.com.au/rs232.html

    RF Power Table

    Science Lobby (electronic links) http://www.sciencelobby.com/

    Tech FAQ http://www.tech-faq.com/

    The12volt.com (technical information for mobile electronics installers) http://www.the12volt.com/

    Electronic service

    Repair of TV Sets http://www.repairfaq.org/sam/tvfaq.htm

    Sci.Electrinic.Repair FAQ http://www.repairfaq.org/sam/tvfaq.htm

    Service engineers Forum http://www.e-repair.co.uk/index.htm

     

    Cable Data

    Andrews http://www.andrew.com/default.aspx

    Belden http://www.belden.com/

    CO-AX CABLE DATA http://www.electric-web.org/coax.htm

    Coaxial cable data http://www.qsl.net/kc6uut/coax.html

    Coaxial Cable Page http://www.cdi2.com/build_it/coaxloss.htm

    HB9ABX http://home.datacomm.ch/hb9abx/coaxdat.htm

    HB9HD http://www.hb9hd.ch/PDF/coaxcable.pdf

    KC6UUT http://www.qsl.net/kc6uut/coax.html

    NESS Engineering http://www.nessengr.com/techdata/coaxdata.html

    RF Industries cables http://www.rfindustries.com.au/rfiproducts/cablesConnectors/coaxialCables.htm

    THERFC http://www.therfc.com/coax.htm

    Times Microwave http://www.timesmicrowave.com/

    VK3KHB http://www.gak.net.au/vk3khb/atv/coaxchrt.html

    W4ZT http://w4zt.com/coax.html

    X.net Antenna cable chart http://www.x.net.au/antenna_cable.html

    50 W Coaxial Cable Information http://www.dma.org/~millersg/coax50.html

    75 W Coaxial Cable Information http://www.dma.org/~millersg/coax75.html



    Antique Radio

    Antique Electronic Supply http://www.tubesandmore.com/

    Alan Lord http://www.dundeecoll.ac.uk/sections/cs/staff/al_radio/

    Antique Radio http://antiqueradios.com/

    Apex Jr http://www.apexjr.com/

    Archives of Boatanchors http://www.tempe.gov/archives/boatanchors.html

    Australian Vintage Radio MK II http://www.southcom.com.au/~pauledgr/

    Australian Wireless (OZ-Wireless) Email List http://www.clarion.org.au/wireless/

    AWA and Fisk Radiola http://203.44.53.131/Radiola/AWA1b.htm

    Crystal Radio http://www.crystalradio.net/

    Glowbugs http://www.mines.uidaho.edu/~glowbugs/

    Hammond Museum of Radio http://www.hammondmuseumofradio.org/

    Historical Radio Society of Australia Inc. http://www.hrsa.asn.au/

    JMH’s Virtual Valve Museum http://www.tubecollector.org/numbers.htm

    John Rose’s Vintage Radio Home http://personal.nbnet.nb.ca/jrose/radios/radiomain.htm

    Klausmobile Russian Tube Directory http://klausmobile.narod.ru/td/indexe.htm

    KK7TV http://www.kk7tv.com/kk7tv.html

    Kurrajong Radio Museum http://www.vk2bv.org/museum/

    Links to Vintage Radios (Amateur) http://www.qsl.net/ka4pnv/vrlinks.htm

    Mike’s Electric Stuff http://www.netcomuk.co.uk/~wwl/electric.html

    Nostalgiar Air http://www.nostalgiaair.org/

    Phil’s Old Radios http://antiqueradio.org/

    Radio A’s Vintage Radio Page http://www.mnsi.net/~radioa/radioa.htm

    Radio Era http://www.radioera.com/

    Rap ‘n Tap http://www.midnightscience.com/rapntap/

    Replacing Capacitors http://antiqueradio.org/recap.htm

    Savoy Hill Publications http://www.valvesunlimited.demon.co.uk/Noframes/savoy_hill_publications.htm

    South East Qld Group of the HRSA http://seqg.tripod.com

    SEQG of the HRSA Crystal comp http://www.clarion.org.au/crystalset/

    SEQG One Tube Radio comp http://seqg.tripod.com/onetube/onetube.html

    TEARA’S VINTAGE RADIO LINK PAGE http://www.ipass.net/~teara/vin.html

    The Vintage Radio Emporium http://www.vintageradio.info/

    The Wireless Works http://www.wirelessworks.co.uk/

    Triode Tube Data http://www.triodeel.com/tubedata.htm Tubesworld  (Valve Audio and Valve data) http://www.tubesworld.com/

    Vintage Radio http://www.vintage-radio.com/index.shtml

    Vintage Radio Times http://www.vintageradiotimes.com/Page_1x.html

    Vintage Radios and programs http://www.compusmart.ab.ca/agirard/VINTAGE.HTM

    Vintage Radios UK http://www.valve.demon.co.uk/

    Vintage Radio and Test Equipment Site http://www.geocities.com/eb5agv/

    Vintage Radio World http://www.burdaleclose.freeserve.co.uk/

    Vintage Radio and Audio Pages http://www.mcallister.simplenet.com/

    VMARS http://www.vmars.org.uk/

    W7FG VINTAGE MANUALS CATALOGUE http://www.w7fg.com/index.html

    Ye Olde Hurdy Gurdy Museum of Vintage Radio http://ei5em.110mb.com/museum.html



    Valve Audio and Valve data Ake’e Tube Data http://w1.871.telia.com/~u87127076/index.htm CVC http://www.chelmervalve.com/index.html

    Data Sheet Locator http://www.duncanamps.co.uk/cgi-bin/tdsl3.exe/

    Eimac http://www.cpii.com/eimac/index.html

    Frank’s Electron tube Pages http://home.wxs.nl/~frank.philipse/frank/frank.html

    Hammond  Manufacturing http://www.hammondmfg.com/

    House of Tubes http://www.house-of-tubes.com/home/Library.asp

    High Voltage Tube Archive http://www.funet.fi/pub/sci/electrical/tesla/tubes/

    Kiewavly http://home.mira.net/~kiewavly/audio1.html

    Industrial Valve Data http://www.netcomuk.co.uk/~wwl/data.html

    Machmat http://www.machmat.com/

    NJ7P Tube Data Search http://hereford.ampr.org/cgi-bin/tube?index=1

    RCA-R10 Data http://www.nmr.mgh.harvard.edu/~reese/RC10/

    SAS Audio Labs http://www.sasaudiolabs.com/

    Sowter Audio Transformers http://www.sowter.co.uk/

    Spice Valves http://www.duncanamps.com/spicevalves.html

    Tubetec http://www.tubetec.freeserve.co.uk/

    TUBEWORLD INC. http://www.tubeworld.com/

    Tube datasheets http://www.wps.com/archives/tube-datasheets/index.html

    Vacuum Tube Links http://www.michelletroutman.com/tubes.htm

    Valves and Tubes http://www.euramcom.freeserve.co.uk/tubes.html

    Valve Data Links http://www.thevalvepage.com/links/valvdata.htm

    Valve Data http://www.arrakis.es/~igapop/referenc.htm

    Valves Unlimited http://www.valvesunlimited.demon.co.uk/Noframes/links.htm

    Valve and Tube Supplies http://www.valves.uk.com/

    Valveamps.com http://www.valveamps.com/



    Audio

    Audio Calculators and Links http://www.audioscientific.com/Audio Calculators & References Links.htm

    BKC GROUP http://www.bkcgroup.fsnet.co.uk/

    Car Audio Australia http://www.caraudioaustralia.com/

    DIY Audio http://www.diyaudio.com/

    Duncan’s Amp Pages http://www.duncanamps.com/

    Elliott Sound Products http://sound.westhost.com/audiolink.htm

    GM ARTS http://users.chariot.net.au/~gmarts/

    Norman Koren http://www.normankoren.com/Audio/

    Rane http://www.rane.com/

    The Self Site http://www.dself.demon.co.uk/

    The Class-A Amplifier Site http://www.gmweb.btinternet.co.uk/



    Magazines

    DUBUS (VHF magazine) http://www.dubus.org/

    Elektor Electronics http://www.elektor-electronics.co.uk/

    Harlan Technologies (Amateur Television Quarterly) http://www.hampubs.com/

    Radio & Communications Monitoring Monthly http://www.monitoringmonthly.co.uk/

    SILICON CHIP http://www.siliconchip.com.au/

    VHF Communications Mag http://www.vhfcomm.co.uk/



    SETI

    SETI http://www.setileague.org/homepg.htm

    SETI Australia http://www.seti.org.au/

    Nmap Examples

    Some Nmap examples I thought I would post.

    Scanning past Watchguard Firewalls: nmap -sS -iL targetlist.txt -P0 -sV -T4

    Verbose Scan: nmap -v

    This option scans all reserved TCP ports on the target machine. The -v option enables verbose mode.

    nmap -sS -O /24

    Launches a stealth SYN scan against each machine that is up out of the 256 IPs on “class C” sized network where Scanme resides. It also tries to determine what operating system is running on each host that is up and running. This requires root privileges because of the SYN scan and OS detection.

    nmap -sV -p 22,53,110,143,4564 198.116.0-255.1-127

    Launches host enumeration and a TCP scan at the first half of each of the 255 possible eight-bit subnets in the 198.116 class B address space. This tests whether the systems run SSH, DNS, POP3, or IMAP on their standard ports, or anything on port 4564. For any of these ports found open, version detection is used to determine what application is running.

    nmap -v -iR 100000 -PN -p 80

    Asks Nmap to choose 100,000 hosts at random and scan them for web servers (port 80). Host enumeration is disabled with -PN since first sending a couple probes to determine whether a host is up is wasteful when you are only probing one port on each target host anyway.

    nmap -PN -p80 -oX logs/pb-port80scan.xml -oG logs/pb-port80scan.gnmap 216.163.128.20/20

    This scans 4096 IPs for any web servers (without pinging them) and saves the output in grepable and XML formats.

    Instead of limiting ourselves to scanning just one target., let’s broaden our horizon’s to bigger and better things. In example 2 we used our IP address to base a scan against. Using that address again we can get a look at numerous targets in our “community”. At the command line type the following (substituting a valid address of your choice of course):

    nmap -sT -O 206.212.15.0-50

    What this does is instruct nmap to scan every host between the IP addresses of 206.212.15.0 and 206.212.15.50. If you happen to find many interesting feedback results from this or a larger scale scan then you can always pipe the output into your choice of a human readable file or a machine parsable file for future reference by issuing the following option:

    To create a human readable output file issue the -oN command into your nmap string so that it would look similar to this:

    nmap -sT -O -oN sample.txt 206.212.15.0-50

    Rather have a machine parsable file? Enter the -oM to pipe the output into a machine parsable file:

    nmap -sT -O -oM sample.txt 206.212.15.0-50

    *Back when I was becoming aquatinted with all the nmap options, I ran my first large scale scan against 250 consecutive machines using an arbitrary number (nmap -sX -O -oN sample.txt XXX.XXX.XXX.0-250).To my great surprise I was confronted with 250 up and running virgin Linux machines. Another reason why Linux enthusiasts should NEVER become bored.

    -I This is a handy little call that activates nmap’s TCP reverse ident scanning option. This divulges information that gives the username that owns available processes. Let’s take a look (Note that the host has to be running ident). At the command line issue this command against your target, in this case our default Eve running Linux:

    -iR Use this command to instruct nmap to scan random hosts for you.

    -p Port range option allows you to pick what port or ports you wish nmap to scan against.

    -v Use verbosity to display more output data. Use twice (-v -v) for maximum verbosity.

    -h Displays a quick reference of nmap’s calls

    Now that we have looked at nmap’s three basic usage types and some of it’s other options, let’s mix and match them.

    nmap -v -v -sS -O 209.212.53.50-100

    This instructs nmap to use a maximum amount of verbosity to run a stealth scan and OS detection against all machines between IP addresses 209.212.53.50 and 209.212.53.100. This command will also require root privileges due to both the -sS and -O calls. Of course this will display a very overwhelming amount of data so let’s log our results into a human readable file for future reference:

    nmap -v -v -sS -O -oN sample.txt 209.212.53.50-100

    Now let’s make nmap run a stealth scan and instruct it to look only for machines offering http and ftp services between the addresses of 209.212.53.50 and 209.212.53.100. Once again we will log the output (I’m a log junkie) for future reference into a human readable file called ftphttpscan.txt:

    nmap -sS -p 23,80 -oN ftphttpscan.txt 209.212.53.50-100

    Remember the -iR option mentioned previously? Let’s use it to take a random sampling of Internet web servers using the verbatim example from nmap’s man page:

    nmap -sS -iR -p 80

    Last but certainly not least, while gleaning information, don’t forget to nmap yourself. Just type at the command line: nmap 127.0.0.1 This is especially useful and recommended if you’re a newcomer to Linux and connected to the Internet via DSL or cable modem.

    Detect promiscuous network devices or sniffers on a network

    Old versions       nmap –script=promiscuous 10.0.1.0/24

    New Versions     nmap -sV –script=sniffer-detect 10.0.1.0/24

    How To Hijack Fast Food Drive-Thru Frequencies

    This is an article I found on the Phone Losers site I thought I would copy here so I can give it a go at some stage.

    How To Hijack Fast Food Drive-Thru Frequencies

    A few years back, some friends and I were messing around with a Taco Bell’s drive-thru frequencies. RijilV and isotek showed me how easy it was to hijack the frequencies of just about any fast food restaurant with a very simple mod to a ham radio. The radios they used were Yaesu VX-5 and VX-7 models. We had a few weeks of occasional fun, sitting a few parking lots away and saying all kinds of horrible things to potential fast food customers. For the most part, I didn’t record any of it. But you can find a few clips of our fast food hijinks if you scroll down on the PLA Sound Clips Archive page.

    Finally we decided to capture a bit of our FCC violations on video. But instead of capturing actual customers being harassed by us as they placed an order, I drove through the Taco Bell drive-thru myself with a video camera sitting on the dashboard. As I attempted to place my order, RijilV informed me of some crazy new Taco Bell policies and a manager immediately rushed out to explain to me that I wasn’t actually talking to an employee. Here is that video:

    After spending several years on Google Video and YouTube, it’s been watched approximately 20,000 times. And of those 20,000 people who have viewed it, approximately all of them have emailed me and asked me what kind of radio we used and how can they use a radio to do the same thing. So in the spirit of April 1st and in order to quell the number of emails sent to me and posts on the PLA Forums asking the same thing, I’ve decided to write this tutorial to help those people out.

    But I’m not going to explain how to modify a Yaesu VX5 or a Yaesu VX7. A simple Google search will show you how to modify these ham radios. The problem with these mods is that, even though they’re fairly simple, you have to buy the radios which could cost you anywhere from $200 – $400. Then, after removing a couple solder points, you have to learn how to use it, you have to look up fast food frequency lists, you have to understand the difference between the transmit frequencies and the receive frequencies and you have to scroll through PL tones using trial and error to find the correct one.

    Or how about we do this a different way. A way that uses a couple items that you might already have in your home. You can easily modify most old CB radios in a way that will allow them to transmit directly to drive-thru frequencies. You won’t have to scroll through hundreds of possible drive-thru frequencies, because a CB radio’s channels line up in exactly the same way as most drive-thru’s channels, only at a higher frequency. How do you get your CB radio to run at a higher frequency? A simple replacement of the crystal inside, with a 6.5536 MHz crystal. This triples the megahertz that are broadcast on and there is no learning required. You just take the modified CB radio to a fast food restaurant and start broadcasting to the customers.

    “But RBCP, I don’t have a 6.5536 MHz crystal lying around my house,” you might be whining at this point. But this isn’t true. Just about any house has several 6.5536 MHz crystals in them if you know where to look. This just happens to be the exact same crystal that you can find in electric heaters, hair dryers, electric stoves, curling irons, electric hot water heaters, irons, and toasters. These crystals are in just about any item that has heated coils and are used to control the frequency of the heating elements so that they don’t burn your house down.

    So for this modification you need…

    • 1 CB radio. It has to be a 40 channel CB radio with a digital display, which includes just about any CB radio manufactured after the mid 1980’s. The old 23 channel CBs from the 1970’s will not work. It can even be a walkie talkie CB radio. If you don’t have one, you can find one at Goodwill or a yard sale for probably less than $10.
    • 1 toaster. (Or other item with heating elements inside.) A toaster is the most ideal to use, because it’s almost guaranteed to have the crystal inside of it. It’s more common to find curling irons and hair dryers that don’t. Again, it should be a toaster manufactured within the past 20 years or so. Before that they didn’t have crystal requirements for toaster manufacturers. (And incidentally, there were a lot more electrical house fires back then.) Goodwill will probably have a toaster for less than $10.
    • 1 soldering iron and solder. Don’t worry if you don’t have soldering experience. It’s actually pretty easy. Click here for a soldering tutorial. You can purchase a soldering iron at Radio Shack or Sears for about $10.
    • A few screwdrivers

    Even if you have to buy all these materials, you’re only out $30. That’s a lot better than the $300 you might end up spending on a Yaesu radio. And some of you might already have all these items so you don’t have to pay anything. Ask a friend or a relative if they’ve got an old toaster or CB radio lying around that they don’t need.

    First you’ll want to take apart your toaster. This isn’t too hard. Just flip it upside down and start removing the screws. You’ll probably need to pull off the plastic lever and knobs before you remove the top of the toaster. Once you have the top off, you’ll see a green or brown circuit board inside.

    Flip the circuit board down and you’ll see all the components on the other side, including the 6.5536 MHz crystal. The crystal is silver and will have 6.5 stamped on the side of it. In the picture below, I’ve used an arrow to show you where it’s located.

    The crystal is likely in a different spot in other toasters, but it’s hard to mistake for any other electronic component. The crystal will have some form of 6.5 stamped on the side of it. In my toaster, it showed 6.55-12. While the official frequency needed is 6.5536 MHz, anything within 1.6 megahertz will work. So don’t worry if your crystal just says 6.5 or 6.50 – it’s all the same for our purposes.

    It’s kind of hard to see what I’m doing in the picture above, but I’m heating up the leads on the crystal from underneath with my soldering iron to melt the solder, and I’m pulling on the crystal from above with a pair of needle nose pliers. It only takes a few seconds to get the crystal out of the toaster.

    Now that the crystal is out of your toaster, throw your toaster away! Do not attempt to use it once the crystal is removed. Remember, the crystal is in there for safety and using your toaster without the crystal could burn your toast and/or start a kitchen fire. It’s likely your toaster won’t even turn on with the missing crystal, but please don’t even try. Just throw it away.

    As I mentioned before, just about any brand and model of CB radio will work, as long as it has the digital display on it. Which means, just about any CB radio manufactured after the mid 1980’s. These are the kinds of CB radios whose frequencies are controlled by a single crystal inside of them. For my mod, I used a Radio Shack TRC-207 walkie talkie CB radio, which is pictured above. I prefer using a walkie talkie CB radio because it doesn’t requiring sticking a huge CB antenna on the roof of my car which might be noticed if a fast food employee starts looking around the parking lot for the culprits.

    Taking apart your CB radio is just as easy as taking apart the toaster. Remove the screws and pop it open. You may or may not have to lift up the circuit board inside to find the crystal inside. In my particular model, the crystal actually plugged into a socket so I didn’t need to even desolder the old crystal. I just pulled it out with my fingers and then plugged in the new 6.55 MHz crystal. I don’t know how common this is, because in other CB radios that I’ve modified the crystal was soldered to the circuit board, just like in the toaster.

    Put your CB back together and test it to make sure it’s working. You’re finished! Obviously, you won’t be able to talk on normal CB channels anymore since your CB is transmitting and receiving at a much higher frequency now. But who cares, CB channels are lame anyway. Let’s hop in the car and drive to our nearest fast food establishment to test it out.

    Sit near the drive-thru and wait for a customer to pull up. While the customer is talking to the drive-thru speaker, start flipping through your channels until you hear them talking. I’ve found that most drive thrus end up being somewhere in the 16 – 25 channel range. I’ve never found one above channel 30 and only a few on channels 1 through 15. It all depends on how their drive-thru is set up and what frequencies they’re using. Anyway, push down your talk button and start talking to the customer.

    The cool thing about using a CB radio to transmit on drive-thru frequencies is that a CB is designed to work for several miles. The headsets that those fast food people wear are only designed to work for about 100 feet. So you can easily overpower the employees, even if you’re several parking lots away. In fact, you may be inadvertently screwing with several other drive-thrus in town without even knowing it. This is more likely when you’re using the kind of CB radio that’s supposed to be installed in a car. Those usually run on 5 watts and can cover an entire city. This is another reason I like to use my walkie talkie. It’s lucky if it will work for even a mile, so I’m only harassing one restaurant at a time.

    If you found this tutorial useful, you might also enjoy the video I’ve made on the same subject. It includes much of the same information in this tutorial, but also includes actual footage of us messing with a drive-thru with this CB mod. Enjoy!

    You might also enjoy our original Taco Bell Takeover video, our Happy Birthday drive-thru video and our Drive-Thru Shenanigans video.

    icon for podpress PLA TV: Hijacking Fast Food Frequencies [9:12m]: Download (4913)

    Local Copy

    The EDinburgh Great Shiraz Challenge

    Kerry and I went along to the EDinburgh Cellars Great Shiraz Challenge.

    Between Kerry and I we tasted more than 25 great wines over a harrowing 2.5 hours of hustle and bustle in a huge tent in the ED’s carpark. It was great, we both thought that it was well worth the $30/head entry fee.

    One of the great things was the amount of large and small wine companies presenting their spoils. Refreshingly many of the tasting areas were manned by the wine maker, winery owner or someone of similar stature. This made for great conversations and allowed us to find other great non-mainstream wineries on the day.

    As Kerry (Wine group – 9yrs) and I (Corporate) both worked for SouthCorp (Prior to Fosters), we agreed that we would be looking for the special wines of the day. Well we did grab an RWT on the way out as the last tasting for the day – we are not stupid.

    We had a great day overall and purchased and ordered some great wins at the Cellars after the event.

    It was great catching up with Barb and Karel from Lengs and Cooter Wines and taste some of their great wines. Barb used to work at SouthCorp for many years and Karl worked at Telstra, but Kerry and I agree that they make great wines.

    Of the wines in the winning list below our favourites are:

    2006 Woodstock “The Stocks” Shiraz

    2004 Bullers Caliope Shiraz

    2006 Hentley Farm “The Beast” Shiraz

    2005 d’Arenberg Dead Arm Shiraz

    2006 Glaetzer ‘Bishop’ Shiraz

    Other top votes from us for the day are:

    2008 Mike Press Adelaide Hills Shiraz (It’s been a long time since we’ve tasted such a good cheap wine)

    2007 Honey MoonVineyard Adelaide Hills Shiraz

    2004 Lengs & Cooter Old Vines Shiraz

    2004 Lengs & Cooter Reserve Shiraz

    2005 Artful Dodger Barossa Shiraz

    2007 Veronique Regions Shiraz

    2006 Cape Jaffa La Lune Biodynamic Shiraz

    2006 Ceravolo Sparkling Shiraz

    2007 Yelland & Papps Greenock Shiraz

    Results – Shiraz Challenge

    Shiraz Day 2008 was a massive hit, with a record crowd of over 900 slurping through a field of just over 300 Shiraz. As always, we ask attendees to vote for their favourite wine of the day, and congratulations goes to Clarendon Hills for their superbly compelling 2006 Liandra Shiraz. Here’s the full list of the Top 20:

    2006 Clarendon Hills Liandra Syrah

    2005 Torbreck Factor Shiraz

    2005 Langmeil Freedom 1843 Shiraz

    2006 Hentley Farm ‘The Beast’ Shiraz

    2005 Whistler Reserve Shiraz

    2006 Penfolds RWT Shiraz

    2005 Wild Witch Shiraz

    2005 d’Arenberg Dead Arm Shiraz

    2005 Dutschke St Jakobi Shiraz

    2006 Woodstock ‘The Stocks’ Shiraz

    2006 Brick Kiln Shiraz

    2004 Bullers Caliope Shiraz

    2006 Hentley Farm ‘The Beauty’

    2005 Pikes ‘The E.W.P’ Shiraz

    2004 Paracombe Somerville Shiraz

    2006 Kalleske Greenock Shiraz

    2005 Bendbrook Goat Track Shiraz

    2004 Penfolds St Henri Shiraz

    2004 Bethany Wines GR9 Reserve

    2005 Paxton EJ Shiraz

    TOP 20 UNDER $30:

    2005 Tin Shed Melting Pot Shiraz

    2004 Carlei Estate ‘Green Vineyard’

    2004 Majella Shiraz

    2007 Torbreck Woodcutters Shiraz

    2005 Hugo Shiraz

    2006 Tar & Roses Shiraz

    2004 Whistler Shiraz

    2005 2 Mates Shiraz McLaren Vale

    2005 d’Arenberg Footbolt Shiraz

    2006 Mitolo Jester Shiraz

    2006 Guichen Bay Vineyards Reserve

    2006 Pirathon Shiraz by Kalleske

    2006 Scarpantoni Block 3 Shiraz

    2006 Naked Run Barossa Shiraz

    2006 Bird in Hand Shiraz

    2006 O’Leary Walker Shiraz

    2006 Glaetzer ‘Bishop’ Shiraz

    2007 Paxton Quandong Shiraz

    2006 Trevor Jones ‘Boots’ Shiraz

    2005 Dutschke Gods Hill Road Shiraz

    d’Arenberg

    DUKPT Overview and Transaction notes

    Hi,

    I was asked on another post relating to DUKPT to provide some backgound. Given I have lots of material on the subject, I thought I would create this thread. Link

     

    I will come back at some stage and expand on this when I get time.

    Transaction Process narrative:

    The diagram describes a mobile terminal/ATM is described using the a AS2805 (‘2805’) message type and 3DES DUKPT and dual direction auth SSL from the terminal to the aquirer (transaction switch).

    A good explanation of DUKPT can also be found at Wikipedia.

     

    Diagram of the flow

     

    DUKPT transaction flow - terminal to bank

    DUKPT transaction flow - terminal to bank

     

    Background notes:

    • The terminal or ATM firstly encrypts the user entered pin (may be a unique DUKPT key or static, depending on the design and banks involved) prior to incorporating it into the AS 2805 transaction message.
    • the message is then encrypted again using the DUKPT key which has been established through the merchant logon process within the aquirer Host Security Module (HSM) i.e. the user entered pin is encrypted separately and encapsulated within the DUKPT encrypted 2805 message to provide full message encryption.
    • In the diagram a separate dual authenticating SSL session is also used between the terminal/ATM and the aquirers infrastructure. This allowing the transaction including the pin to traverse the external Wired/GPRS/LAN within 2 primary independent layers of encryption, with a 3rd protecting the PIN.
    • When the transaction enters the aquirer environment the message encapsulation layer provided by SSL is removed.  This leaving the DUKPT’ed 2805 message which also encapsulates the separately encrypted PIN.
    • This encrypted message is passed to the aquirer switch engine through to the aquirer’s HSM for decryption of the 2805 message excluding the user entered pin.
    • This is when transactional information necessary for aquirer’s merchant reporting (truncated card number, transaction amount, transaction type, etc.) and fraud management data is collected.
    • The aquirer switch then passes the encrypted PIN to the aquirer HSM requesting that the PIN be decrypted using the aquirer’s PIN encryption and translated to the next banks (Bank 1)  PIN Encryption Key (Pin translation only occurs within the aquirer HSM) This is then sent back to the aquirer Switch engine as the Bank 1 encrypted PIN.
    • The aquirer switch engine then send the decrypted 2805 message with the newly encrypted PIN back to aquirer HSM to be encrypted with the Bank 1 MAC key.
    • The resultant Bank 1 key encrypted message is then sent to Bank 1 for processing and/or passing to the card issuer (using a similar process as described above).
    • When the result is received back from the issuing bank it is encrypted with the Bank 1 MAC key (the pin will not be present in the result message).
    • This is then decrypted by the aquirer HSM, the transaction fate result stored into the aquirer merchant reporting system and the transaction fate re-encrypted with the original aquirer DUKPT key (should be different per terminal/merchant instance) and the result sent back to the terminal through the original established SSL encrypted terminal connection.

    The aquirer may terminate the the SSL connection on a hardware device such as a CISCO Content Service Switch (CSS), or equivalent instead of the design described in the diagram which terminates onto a SSL session server/gateway (Possibly including a Certificate Authority) or on the aquirer transaction switch.

    When PIN blocks are received by the aquirer processing centre, the PIN encryption is translated from the terminal key to the Local Master Key (LMK) by the Host Security Modules (HSM).

    When the message is sent on the upstream bank interchange link to the issuer or gateway , the aquirer HSM translates the encrypted PIN block from the LMK to the Zone Master Key (ZMK) of the aquirer interchange link. The PIN block is always encrypted using DEA3 (3DES) whenever outside of the Terminal or ATM.

    HSM-8000-User Guide V2.2

    EFT Syetms and Device Considerations

    EFT devices and systems differ depending on hardware vendor, country and bank / payment aggregator.
    Below is a list of things you may like to consider. This list is off the top of my head so it is probably not complete.

    Looking at the products and relationships us usually a good start.

    Things to consider:

    • Card skimming methods
    • Some EFT POS devices restrict the connection of a skimmer
    • Review levels of associated fraud
    • Review devices and EFT methods
    • Review terminal identification (merchant and customer)
    • Manual processing. (internal and external)
    • eCommerce products
    • PC based software
    • Dedicated server services (Nobil, etc.)
    • Web based engine (Custom objects, Web pop-ups, etc)
    • Authorisation / identification methods (Merchant and customer)
    • TCPIP session hijacking / session spoofing
    • Direct Debit as well as Credit Cards.
    • Swift (methods and controls)
    • Telegraphic transfer (methods and controls)
    • Payment aggregator relationships (eg. Payment Tech, manual processing, cheque scanning, etc.)
    • Internet banking facilities (attack / penetration,  Certificate registration / management, ISP SLA’s, etc.)
    • Implementation of Smart Card and / or alternative customer recognition devices.
    • Outsourcing and associated risks / service level agreements
    • Payment processing
    • Payment clearance
    • Payment switching
    • Reporting (segregation of merchant / customers / aggregators / partners / local / international)
    • Fraud detection and reporting
    • 3rd party acquiring risks
    • Single merchant ID many businesses
    • Allows moneys to be laundered if the payment aggregator does not place appropriate controls on the merchant.
    • Encryption used
    • Internet / trusted partner / inter-bank / extranet
    • Private and / or public certificates
    • Single use certificates
    • Client side certificates
    • Remittance advice processes and controls.
    • EFT disaster recovery and manual fall back procedures (associated security and reconciliation risks)
    • Trusted partner relationships, SLA’s, liabilities and risks.
    • EFT regulatory / legal requirements (inter-bank and government)
    • Refund processing / authorisation. (policies, procedures, controls, etc.)
    • CVV, CVV-2 / CVC-2 processing and management. (http://www.atlanticpayment.com/CVV.htm)
    • Fraud detection mechanism (neural networks, inter-bank / department customer checks, etc)
    • Supported card schemes (AMEX/Visa/Mastercard/Discover/etc )
    • Review EFT floor limits (corporate and SME merchants)
    • Review the ability to withhold merchant settlement until the presence of fraud has been determined.
    • Review customer identification details. Such as (This varies around the world depending on local regulations / privacy laws)
    • Review real-time and batched processing methods and controls (sequence numbers, access to raw data, etc.)
    • Review processing with and without expiry dates. (exception controls and policies)
    • Review exception / fraud reports.
    • Review payment store and forward policies and procedures.
    • Review Pre-Auth and Completion controls.
    • Token based payment (eCash, etc)
    • Merchant reconciliation, reporting methods and controls (paper, Internet, email, PDF, Fax, etc.) and associated security.
    • Real time gross settlement policies, procedures and controls. (IT and amounts)
    • Card issuing policies and procedures. (customer ID checks, etc)
    • Banking infrastructure (ingress / egress) controls and security. (Web, partner, payment switches, outsourced infrastructure, monitoring / reporting.)
    • Use of Internet technologies for inter-bank transfers and remote equipment.
    • Physical security and controls of devices, ATM,s, line encryptors, etc.

    Cisco Command Cheat Sheet

    I found a list of useful Cisco commands which I though I would post here.

    ROUTER COMMANDS :

    • Config# terminal editing – allows for enhanced editing commands
    • Config# terminal monitor – shows output on telnet session
    • Config# terminal ip netmask-format hexadecimal|bit-count|decimal – changes the format of subnet masks

    HOST NAME:

    • Config# hostname ROUTER_NAME

    BANNER:

    • Config# banner motd # TYPE MESSAGE HERE # – # can be substituted for any character, must start and finish the message

    DESCRIPTIONS:

    • Config# description THIS IS THE SOUTH ROUTER – can be entered at the Config-if level

    CLOCK:

    • Config# clock timezone Central -6
      # clock set hh:mm:ss dd month yyyy – Example: clock set 14:13:00 25 August 2003

    CHANGING THE REGISTER:

    • Config# config-register 0x2100 – ROM Monitor Mode
    • Config# config-register 0x2101 – ROM boot
    • Config# config-register 0x2102 – Boot from NVRAM

    BOOT SYSTEM:

    • Config# boot system tftp FILENAME SERVER_IP – Example: boot system tftp 2600_ios.bin 192.168.14.2
    • Config# boot system ROM
    • Config# boot system flash – Then – Config# reload

    CDP:

    • Config# cdp run – Turns CDP on
    • Config# cdp holdtime 180 – Sets the time that a device remains. Default is 180
    • Config# cdp timer 30 – Sets the update timer.The default is 60
    • Config# int Ethernet 0
    • Config-if# cdp enable – Enables cdp on the interface
    • Config-if# no cdp enable – Disables CDP on the interface
    • Config# no cdp run – Turns CDP off

    HOST TABLE:

    • Config# ip host ROUTER_NAME INT_Address – Example: ip host lab-a 192.168.5.1
      -or-
    • Config# ip host RTR_NAME INT_ADD1 INT_ADD2 INT_ADD3 – Example: ip host lab-a 192.168.5.1 203.23.4.2 199.2.3.2 – (for e0, s0, s1)

    DOMAIN NAME SERVICES:

    • Config# ip domain-lookup – Tell router to lookup domain names
    • Config# ip name-server 122.22.2.2 – Location of DNS server
    • Config# ip domain-name cisco.com – Domain to append to end of names

    CLEARING COUNTERS:

    • # clear interface Ethernet 0 – Clears counters on the specified interface
    • # clear counters – Clears all interface counters
    • # clear cdp counters – Clears CDP counters

    STATIC ROUTES:

    • Config# ip route Net_Add SN_Mask Next_Hop_Add – Example: ip route 192.168.15.0 255.255.255.0 205.5.5.2
    • Config# ip route 0.0.0.0 0.0.0.0 Next_Hop_Add – Default route
      -or-
    • Config# ip default-network Net_Add – Gateway LAN network

    IP ROUTING:

    • Config# ip routing – Enabled by default
    • Config# router rip
      -or-
    • Config# router igrp 100
    • Config# interface Ethernet 0
    • Config-if# ip address 122.2.3.2 255.255.255.0
    • Config-if# no shutdown

    IPX ROUTING:

    • Config# ipx routing
    • Config# interface Ethernet 0
    • Config# ipx maximum-paths 2 – Maximum equal metric paths used
    • Config-if# ipx network 222 encapsulation sap – Also Novell-Ether, SNAP, ARPA on Ethernet. Encapsulation HDLC on serial
    • Config-if# no shutdown

    ACCESS LISTS:

    IP Standard1-99
    IP Extended100-199
    IPX Standard800-899
    IPX Extended900-999
    IPX SAP Filters1000-1099

    IP STANDARD:

    • Config# access-list 10 permit 133.2.2.0 0.0.0.255 – allow all src ip’s on network 133.2.2.0
      -or-
    • Config# access-list 10 permit host 133.2.2.2 – specifies a specific host
      -or-
    • Config# access-list 10 permit any – allows any address
    • Config# int Ethernet 0
    • Config-if# ip access-group 10 in – also available: out

    IP EXTENDED:

    • Config# access-list 101 permit tcp 133.12.0.0 0.0.255.255 122.3.2.0 0.0.0.255 eq telnet
      -protocols: tcp, udp, icmp, ip (no sockets then), among others
      -source then destination address
      -eq, gt, lt for comparison
      -sockets can be numeric or name (23 or telnet, 21 or ftp, etc)
      -or-
    • Config# access-list 101 deny tcp any host 133.2.23.3 eq www

    -or-

    • Config# access-list 101 permit ip any any
    • Config# interface Ethernet 0
    • Config-if# ip access-group 101 outIPX STANDARD:
    • Config# access-list 801 permit 233 AA3 – source network/host then destination network/host

    -or-

    • Config# access-list 801 permit -1 -1 – “-1” is the same as “any” with network/host addresses
    • Config# interface Ethernet 0
    • Config-if# ipx access-group 801 outIPX EXTENDED:
    • Config# access-list 901 permit sap 4AA all 4BB all
      – Permit protocol src_add socket dest_add socket
      -“all” includes all sockets, or can use socket numbers

    -or-

    • Config# access-list 901 permit any any all any all
      -Permits any protocol with any address on any socket to go anywhere
    • Config# interface Ethernet 0
    • Config-if# ipx access-group 901 inIPX SAP FILTER:
    • Config# access-list 1000 permit 4aa 3 – “3” is the service type

    -or-

    • Config# access-list 1000 permit 4aa 0 – service type of “0” matches all services
    • Config# interface Ethernet 0
    • Config-if# ipx input-sap-filter 1000 – filter applied to incoming packets

    -or-

    • Config-if# ipx output-sap-filter 1000 – filter applied to outgoing packets

    NAMED ACCESS LISTS:

    • Config# ip access-list standard LISTNAME
      -can be ip or ipx, standard or extended
      -followed by the permit or deny list
    • Config# permit any
    • Config-if# ip access-group LISTNAME in
      -use the list name instead of a list number
      -allows for a larger amount of access-lists

    PPP SETUP:

    • Config-if# encapsulation ppp
    • Config-if# ppp authentication chap pap
      -order in which they will be used
      -only attempted with the authentification listed
      -if one fails, then connection is terminated
    • Config-if# exit
    • Config# username Lab-b password 123456
      -username is the router that will be connecting to this one
      -only specified routers can connect

    -or-

    • Config-if# ppp chap hostname ROUTER
    • Config-if# ppp chap password 123456
      -if this is set on all routers, then any of them can connect to any other
      -set same on all for easy configuration

    ISDN SETUP:

    • Config# isdn switch-type basic-5ess – determined by telecom
    • Config# interface serial 0
    • Config-if# isdn spid1 2705554564 – isdn “phonenumber” of line 1
    • Config-if# isdn spid2 2705554565 – isdn “phonenumber” of line 2
    • Config-if# encapsulation PPP – or HDLC, LAPD

    DDR – 4 Steps to setting up ISDN with DDR Configure switch type

    1. Config# isdn switch-type basic-5ess – can be done at interface config

    2. Configure static routes
    Config# ip route 123.4.35.0 255.255.255.0 192.3.5.5 – sends traffic destined for 123.4.35.0 to 192.3.5.5
    Config# ip route 192.3.5.5 255.255.255.255 bri0 – specifies how to get to network 192.3.5.5 (through bri0)

    3. Configure Interface
    Config-if# ip address 192.3.5.5 255.255.255.0
    Config-if# no shutdown
    Config-if# encapsulation ppp
    Config-if# dialer-group 1 – applies dialer-list to this interface
    Config-if# dialer map ip 192.3.5.6 name Lab-b 5551212
    connect to lab-b at 5551212 with ip 192.3.5.6 if there is interesting traffic
    can also use “dialer string 5551212” instead if there is only one router to connect to

    4. Specify interesting traffic
    Config# dialer-list 1 ip permit any
    -or-
    Config# dialer-list 1 ip list 101 – use the access-list 101 as the dialer list

    5. Other Options
    Config-if# hold-queue 75 – queue 75 packets before dialing
    Config-if# dialer load-threshold 125 either
    -load needed before second line is brought up
    -“125” is any number 1-255, where % load is x/255 (ie 125/255 is about 50%)
    -can check by in, out, or either

    Config-if# dialer idle-timeout 180
    -determines how long to stay idle before terminating the session
    -default is 120

    FRAME RELAY SETUP:

    • Config# interface serial 0
    • Config-if# encapsulation frame-relay – cisco by default, can change to ietf
    • Config-if# frame-relay lmi-type cisco – cisco by default, also ansi, q933a
    • Config-if# bandwidth 56
    • Config-if# interface serial 0.100 point-to-point – subinterface
    • Config-if# ip address 122.1.1.1 255.255.255.0
    • Config-if# frame-relay interface-dlci 100
      -maps the dlci to the interface
      -can add BROADCAST and/or IETF at the end
    • Config-if# interface serial 1.100 multipoint
    • Config-if# no inverse-arp – turns IARP off; good to do
    • Config-if# frame-relay map ip 122.1.1.2 48 ietf broadcast
      -maps an IP to a dlci (48 in this case)
      -required if IARP is turned off
      -ietf and broadcast are optional
    • Config-if# frame-relay map ip 122.1.1.3 54 broadcast

    SHOW COMMANDS

    • Show access-lists – all access lists on the router
    • Show cdp – cdp timer and holdtime frequency
    • Show cdp entry * – same as next
    • Show cdp neighbors detail – details of neighbor with ip add and ios version
    • Show cdp neighbors – id, local interface, holdtime, capability, platform portid
    • Show cdp interface – int’s running cdp and their encapsulation
    • Show cdp traffic – cdp packets sent and received
    • Show controllers serial 0 – DTE or DCE status
    • Show dialer – number of times dialer string has been reached, other stats
    • Show flash – files in flash
    • Show frame-relay lmi – lmi stats
    • Show frame-relay map – static and dynamic maps for PVC’s
    • Show frame-relay pvc – pvc’s and dlci’s
    • Show history – commands entered
    • Show hosts – contents of host table
    • Show int f0/26 – stats of f0/26
    • Show interface Ethernet 0 – show stats of Ethernet 0
    • Show ip – ip config of switch
    • Show ip access-lists – ip access-lists on switch
    • Show ip interface – ip config of interface
    • Show ip protocols – routing protocols and timers
    • Show ip route – Displays IP routing table
    • Show ipx access-lists – same, only ipx
    • Show ipx interfaces – RIP and SAP info being sent and received, IPX addresses
    • Show ipx route – ipx routes in the table
    • Show ipx servers – SAP table
    • Show ipx traffic – RIP and SAP info
    • Show isdn active – number with active status
    • Show isdn status – shows if SPIDs are valid, if connected
    • Show mac-address-table – contents of the dynamic table
    • Show protocols – routed protocols and net_addresses of interfaces
    • Show running-config – dram config file
    • Show sessions – connections via telnet to remote device
    • Show startup-config – nvram config file
    • Show terminal – shows history size
    • Show trunk a/b – trunk stat of port 26/27
    • Show version – ios info, uptime, address of switch
    • Show vlan – all configured vlan’s
    • Show vlan-membership – vlan assignments
    • Show vtp – vtp configs

    CATALYST COMMANDS
    For Native IOS – Not CatOS

    SWITCH ADDRESS:

    • Config# ip address 192.168.10.2 255.255.255.0
    • Config# ip default-gateway 192.168.10.1DUPLEX MODE:
    • Config# interface Ethernet 0/5 – “fastethernet” for 100 Mbps ports
    • Config-if# duplex full – also, half | auto | full-flow-control

    SWITCHING MODE:

    • Config# switching-mode store-and-forward – also, fragment-free

    MAC ADDRESS CONFIGS:

    • Config# mac-address-table permanent aaab.000f.ffef e0/2 – only this mac will work on this port
    • Config# mac-address-table restricted static aaab.000f.ffef e0/2 e0/3
      -port 3 can only send data out port 2 with that mac
      -very restrictive security
    • Config-if# port secure max-mac-count 5 – allows only 5 mac addresses mapped to this port

    VLANS:

    • Config# vlan 10 name FINANCE
    • Config# interface Ethernet 0/3
    • Config-if# vlan-membership static 10TRUNK LINKS:
    • Config-if# trunk on – also, off | auto | desirable | nonegotiate
    • Config-if# no trunk-vlan 2
      -removes vlan 2 from the trunk port
      -by default, all vlans are set on a trunk port

       

      CONFIGURING VTP:

    • Config# delete vtp – should be done prior to adding to a network
    • Config# vtp server – the default is server, also client and transparent
    • Config# vtp domain Camp – name doesn’t matter, just so all switches use the same
    • Config# vtp password 1234 – limited security
    • Config# vtp pruning enable – limits vtp broadcasts to only switches affected
    • Config# vtp pruning disableFLASH UPGRADE:
    • Config# copy tftp://192.168.5.5/configname.ios opcode – “opcode” for ios upgrade, “nvram” for startup config

    DELETE STARTUP CONFIG:

    • Config# delete nvram

    BGP:

    • show ip bgp – Displays entries in the BGP routing table.
    • show ip bgp injected-paths – Displays paths in the BGP routing table that were conditionally injected.
    • show ip bgp neighbors – Displays information about the TCP and BGP connections to neighbors.

    BGP Conditional Route Injection:

    Step 1 Router(config)# router bgp as-number
    -  Places the router in router configuration mode, and configures the router to run a BGP process.

    Step 2 Router(config-router)# bgp inject-map ORIGINATE exist-map LEARNED_PATH
    -  Configures the inject-map named ORIGINATE and the exist-map named LEARNED_PATH for conditional route injection.

    Step 3 Router(config-router)# exit
    -Exits router configuration mode, and enters global configuration mode.

    Step 4 Router(config)# route-map LEARNED_PATH permit sequence-number
    – Configures the route map named LEARNED_PATH.

    Step 5 Router(config-route-map)# match ip address prefix-list ROUTE
    – Specifies the aggregate route to which a more specific route will be injected.

    Step 6 Router(config-route-map# match ip route-source prefix-list ROUTE_SOURCE
    – Configures the prefix list named ROUTE_SOURCE to redistribute the source of the route.
    Note The route source is the neighbor address that is configured with the neighbor remote-as command. The tracked prefix must come from this neighbor in order for conditional route injection to occur.

    Step 7 Router(config-route-map)# exit
    – Exits route-map configuration mode, and enters global configuration mode.

    Step 8
    Router(config)# route-map ORIGINATE permit 10
    – Configures the route map named ORIGINATE.

    Step 9 Router(config-route-map)# set ip address prefix-list ORIGINATED_ROUTES
    – Specifies the routes to be injected.

    Step 10 Router(config-route-map)# set community community-attribute additive
    – Configures the community attribute of the injected routes.

    Step 11 Router(config-route-map)# exit
    – Exits route-map configuration mode, and enters global configuration mode.

    Step 12
    Router(config)# ip prefix-list ROUTE permit 10.1.1.0/24
    – Configures the prefix list named ROUTE to permit routes from network 10.1.1.0/24.

    Step 13 Router(config)# ip prefix-list ORIGINATED_ROUTES permit 10.1.1.0/25
    – Configures the prefix list named ORIGINATED_ROUTES to permit routes from network 10.1.1.0/25.

    Step 14 Router(config)# ip prefix-list ORIGINATED_ROUTES permit 10.1.1.128/25
    – Configures the prefix list named ORIGINATED_ROUTES to permit routes from network 10.1.1.0/25.

    Step 15 Router(config)# ip prefix-list ROUTE_SOURCE permit 10.2.1.1/32
    – Configures the prefix list named ROUTE_SOURCE to permit routes from network 10.2.1.1/32.
    Note The route source prefix list must be configured with a /32 mask in order for conditional route injection to occur.

    DHCP

    Step 1 (config)# interface ethernet0/0
    (config-if)#ip address 1.1.1.1 255.0.0.0
    (config-if)# no shutdown
    – Configure an IP address on the router’s Ethernet port, and bring up the interface. (On an existing router, you would have already done this.)

    Step 2 (config)# ip dhcp pool mypool
    – Create a DHCP IP address pool for the IP addresses you want to use.

    Step 3 (dhcp-config)# network 1.1.1.0 /8
    – Specify the network and subnet for the addresses you want to use from the pool.

    Step 4 (dhcp-config)#domain-name mydomain.com
    – Specify the DNS domain name for the clients.

    Step 5 (dhcp-config)#dns-server 1.1.1.10 1.1.1.11
    – Specify the primary and secondary DNS servers.

    Step 6 (dhcp-config)#default-router 1.1.1.1
    – Specify the default router (i.e., default gateway).

    Step 7 (dhcp-config)#lease 7
    – Specify the lease duration for the addresses you’re using from the pool.

    Step 8 (dhcp-config)#exit
    – Exit Pool Configuration Mode.

    This takes you back to the global configuration prompt.

    Next, exclude any addresses in the pool range that you don’t want to hand out.

    For example, let’s say that you’ve decided that all IP addresses up to .100 will be for static IP devices such as servers and printers. All IP addresses above .100 will be available in the pool for DHCP clients.

    Here’s an example of how to exclude IP addresses .100 and below:

    Optional (config)#ip dhcp excluded-address 1.1.1.0 1.1.1.100

    The full DHCP reference can be found on the CISCO site.

    Common Commands and Troubleshooting

    • Set a password on the console line:
      • configure terminal
      • line console 0
      • password ‘cisco’
      • login
    • Passwords are case sensitive.
    • You must configure a password on the VTY lines, without one no one will be able to telnet to the switch/router.
    • The default mode when logging into a switch/router via telnet or SSH is user exec mode, which is indicated by the ‘>’ prompt.
    • To configure the switch/router you need to use the privileged EXEC mode. To do this you enter the enable command in user EXEC mode. The prompt is indicated with ‘#’.
    • If both enable secret and enable password are set, the enable secret will be used.
    • The enable secret is encrypted (by default) where as the enable password is in clear text.
    • In a config containing an enable secret 5 ‘hash’ the 5 refers to the level of encryption being used.
    • If no enable password/secret has been set when someone telnets to the device, they will get a ‘%No password set’ message. Someone with physical access must set the password.
    • To place all telnet users directly into enable mode:
      • configure terminal
      • line vty 0 4
      • privilege level 15
    • To put a specific user directly into privileged EXEC mode (enable mode)
      • username superman privilege 15 password louise
    • Telnet sends all data including passwords in clear text which can be intercepted.
    • SSH encrypts all data preventing an attacker from intercepting it.
    • Setting up a local user/password login database for use with telnet:
      • configure terminal
      • line vty 0 4
      • login local
      • exit
      • username telnetuser1 password secretpass
    • To set up SSH you need to create the local user database, the domain name must be specified with the ip domain-name command and a crypto key must be created with the crypto key generate rsa command. To enable SSH on the VTY lines, use the command transport input ssh.
    • If you connect two Cisco switches together and the lights don’t go amber then green, but instead stays off. A straight through cable has been used instead of a crossover cable.
    • The term ‘a switches management interface’ normally refers to VLAN1.
    • Assign a default gateway using the ip default-gateway ipaddress command.
    • You can use the command interface range fasterthernet 0/1 – 12 to select a range of interfaces to configure at once.
    • MOTD banner appears before login prompt.
    • The login banner appears before the login prompt but after the MOTD banner.
    • The banner exec appears after a successful logon.
    • line con 0 – configuring the logging synchronous on the console port stops the router from displaying messages (like an interface state change) until it detects no input from the keyboard and not other output from the router, such as a show commands output.
    • exec-timeout x y (x=minutes, y=seconds) – the default is 5 minutes. Can be disabled by setting x=0 y=0
    • Shortcut commands
      • Up Arrow – will show you the last command you entered. Control+P does the same thing.
      • Down Arrow – will bring you one command up in the command history. Control+N does the same thing.
      • CTRL+A takes the cursor to the start of the current command.
      • CTRL+E takes the cursor to the end of the current command.
      • Left arrow or CTRL+B moves backwards (towards the start) of the command one character at a time.
      • Right arrow or CTRL+P moves forwards (towards the end) of the command one character at a time.
      • CTRL+D deletes one character (the same as backspace).
      • ESC+B moves back one word in the current command.
      • ESC+F moves forward one word in the current command.
    • show history command will show the last 10 commands run by default.
    • the history size can be increased individually on the console port and on the VTY lines with the history size x command.
    • Config modes
      • config t R1<config> is the global configuration mode.
      • line vty 0 4 R1<config-line> is the line config mode.
      • interface fastethernet 0/1 R1<config-if> interface config mode.
    Troubleshooting
    • Cisco Discovery Protocol (CDP) runs by default on Cisco routers and switches. It runs globally and on a per-interface level.
    • CDP discovers basic information about neighboring switches and routers.
    • On media that supports multicasts at the data link layer, CDP uses multicast frames. on other media, CDP sends a copy of the CDP update to any known data-link addresses.
    • The show cdp command shows CDP settings.
    • CDP can be disabled globally using the command no cdp run and re-enable using cdp run.
    • CDP can be disabled at an interface level using the no cdp enable command at the sub-interface level.
    • The command show cdp neighbor – lists one summary line of information about each neighbor. Including:
      • Device ID – the remote devices hostname.
      • Local Interface – the local switch/router interface connected to the remote host.
      • Holdtime – is the number of seconds the local device will retain the contents of the last CDP advertisement received from the remote host.
      • Capability – shows you the type of device the remote host is.
      • Platform – is the remote devices hardware platform.
      • Port ID – is the remote interface on the direct connection.
    • The command show cdp neighbor detail – lists one large set (approx 15 lines) of information, one set for every neighbor. Including:
      • The IOS version.
      • VTP management domain.
      • Management addresses.
    • show cdp entry name – lists the same information as the show cdp neighbors detail command, but only for the named neighbor (case sensitive).
    • show cdp – states whether CDP is enabled globally, and lists the default update and holdtime timers.
    • show cdp traffic – lists global statistics for the number of CDP advertisements sent and received.
    • show cdp interface type number – states whether CDP is enabled on each interface or a single interface if the interface is listed, and states the update and holdtime timers on those interfaces.
    • CDP should be disabled on interfaces it is not needed to limit risk of an attacker learning details about each switch or router. Use the no cdp enable interface subcommand to disable CDP and the cdp enable interface subcommand to re-enable it.
    • The command show cdp interface shows the CDP settings for every interface.
    • Interface status messages:
      • Interface status is down/down – this indicates a physical problem, most likely a loose or unplugged cable.
      • Line protocol is down, up/down – this indicates a problem at the logical level, most likely an encapsulation mismatch or a missing clock rate.
      • Administratively down – this indicates the interface has been shutdown and needs to be manually opened with the sub interface command no shutdown.
    • The command show mac-address-table shows the mac address table. show mac-address-table dynamic sows the dynamically learned entries only.
    • Most problems on a switch are caused by human error – misconfiguration.
    • The command show debugging shows all the currently running debugs.
    • undebug all – will turn all debugging off.
    • The command show vlan brief shows a switches VLAN configuration.
    • If pinging 127.0.0.1 fails on a pc, there is a problem with the local PC, most likely a bad install of TCP/IP.
    • On a pc the command netstat -rn shows the pc’s routing table.
    • Additional Telnet commands:
      • show sessions shows information about each telnet session, the where command does the same thing.
      • resume x, x being the session number is used to resume a telnet session.
      • To suspend a session use the command CTRL+ALT+6.
      • To disconnect an open session use the command disconnect x, x being the session number.
    • Ping result codes:
      • !!!!! – IP connectivity to the destination is ok.
      • ….. – IP connectivity to the destination does not exist.
      • U.U.U – the local router has a route to the destination, but a downstream router does not.
    • debug ip packet – can help troubleshooting the above ping results.
    • When using traceroute or extended ping the Escape Sequence is: CTRL+SHIFT+6.
    • Extended ping can only be run from enable mode.
    • If a routing table contains multiple routes to the same destination with multiple next hops and the prefixes are different, the most specific (longest) prefix route will be used. If all of the prefix lengths are the same the Administrative Distance will be used. [AD/Metric].
    • Administrative Distance is a measure of a routes believability, with a lower AD being more believable than a route with a higher AD. AD only comes into play if the prefix lengths are the same.
    • You can set the Administrative Distance on a static route with the command ip route 55.55.55.0 255.255.255.0 192.168.1.2 150, you would do this to set a backup route if a dynamic route fails/is not available in the routing table.

    Cisco NX-OS/IOS BGP (Advanced) Comparison

    These may also assist: Undocumented Cisco Commands

    Breaking VISA PIN

    Below is an article I found recently. This one of the most comprehensive descriptions of PIN Verification Value (PVV) hacking.

    I thought I would replicate it here for my local reference.

    As comments have been made regarding the grammar used in the original text, I have corrected some of the obvious errors whilst maintaining the context of the original material.

    http://69.46.26.132/~biggold1/fastget2you/tutorial.php

    ——– Original Text ———-

    Foreword
    Have you ever wonder what would happen if you lose your credit or debit card and someone finds it. Would this person be able to withdraw cash from an ATM guessing, somehow, your PIN? Moreover, if you were who finds someone’s card would you try to guess the PIN and take the chance to get some easy money? Of course the answer to both questions should be “no”. This work does not deal with the second question, it is a matter of personal ethics. Herewith I try to answer the first question.

    All the information used for this work is public and can be freely found in Internet. The rest is a matter of mathematics and programming, thus we can learn something and have some fun. I reveal no secrets. Furthermore, the aim (and final conclusion) of this work is to demonstrate that PIN algorithms are still strong enough to provide sufficient security. We all know technology is not the weak point.

    This work analyses one of the most common PIN algorithms, VISA PVV, used by many ATM cards (credit and debit cards) and tries to find out how resistant is to PIN guessing attacks. By “guessing” I do not mean choosing a random PIN and trying it in an ATM. It is well known that generally we are given three consecutive trials to enter the right PIN, if we fail ATM keeps the card. As VISA PIN is four digit long it’s easy to deduce that the chance for a random PIN guessing is 3/10000 = 0.0003, it seems low enough to be safe; it means you need to lose your card more than three thousand times (or losing more than three thousand cards at the same time 🙂 until there is a reasonable chance of losing money.

    What I really meant by “guessing” was breaking the PIN algorithm so that given any card you can immediately know the associated PIN. Therefore this document studies that possibility, analyzing the algorithm and proposing a method for the attack. Finally we give a tool which implements the attack and present results about the estimated chance to break the system. Note that as long as other banking security related algorithms (other PIN formats such as IBM PIN or card validation signatures such as CVV or CVC) are similar to VISA PIN, the same analysis can be done yielding nearly the same results and conclusions.


    VISA PVV algorithm


    One of the most common PIN algorithms is the VISA PIN Verification Value (PVV). The customer is given a PIN and a magnetic stripe card. Encoded in the magnetic stripe is a four digit number, called PVV. This number is a cryptographic signature of the PIN and other data related to the card. When a user enters his/her PIN the ATM reads the magnetic stripe, encrypts and sends all this information to a central computer. There a trial PVV is computed using the customer entered PIN and the card information with a cryptographic algorithm. The trial PVV is compared with the PVV stored in the card, if they match the central computer returns to the ATM authorization for the transaction. See in more detail.

    The description of the PVV algorithm can be found in two documents linked in the previous page. In summary it consists in the encryption of a 8 byte (64 bit) string of data, called Transformed Security Parameter (TSP), with DES algorithm (DEA) in Electronic Code Book mode (ECB) using a secret 64 bit key. The PVV is derived from the output of the encryption process, which is a 8 byte string. The four digits of the PVV (from left to right) correspond to the first four decimal digits (from left to right) of the output from DES when considered as a 16 hexadecimal character (16 x 4 bit = 64 bit) string. If there are no four decimal digits among the 16 hexadecimal characters then the PVV is completed taken (from left to right) non decimal characters and decimalizing them by using the conversion A->0, B->1, C->2, D->3, E->4, F->5. Here is an example:

    Output from DES: 0FAB9CDEFFE7DCBA

    PVV: 0975

    The strategy of avoiding decimalization by skipping characters until four decimal digits are found (which happens to be nearly all the times as we will see below) is very clever because it avoids an important bias in the distribution of digits which has been proven to be fatal for other systems, although the impact on this system would be much lower. See also a related problem not applying to VISA PVV.

    The TSP, seen as a 16 hexadecimal character (64 bit) string, is formed (from left to right) with the 11 rightmost digits of the PAN (card number) excluding the last digit (check digit), one digit from 1 to 6 which selects the secret encrypting key and finally the four digits of the PIN. Here is an example:

    PAN: 1234 5678 9012 3445
    Key selector: 1
    PIN: 2468

    TSP: 5678901234412468

    Obviously the problem of breaking VISA PIN consists in finding the secret encrypting key for DES. The method for that is to do a brute force search of the key space. Note that this is not the only method, one could try to find a weakness in DEA, many tried, but this old standard is still in wide use (now been replaced by AES and RSA, though). This demonstrates it is robust enough so that brute force is the only viable method (there are some better attacks but not practical in our case, for a summary see LASEC memo and for the dirty details see Biham & Shamir 1990, Biham & Shamir 1991, Matsui 1993, Biham & Biryukov 1994 and Heys 2001).

    The key selector digit was very likely introduced to cover the possibility of a key compromise. In that case they just have to issue new cards using another key selector. Older cards can be substituted with new ones or simply the ATM can transparently write a new PVV (corresponding to the new key and keeping the same PIN) next time the customer uses his/her card. For the shake of security all users should be asked to change their PINs, however it would be embarrassing for the bank to explain the reason, so very likely they would not make such request.

    Preparing the attack


    A brute force attack consists in encrypting a TSP with known PVV using all possible encrypting keys and compare each obtained PVV with the known PVV. When a match is found we have a candidate key. But how many keys we have to try? As we said above the key is 64 bit long, this would mean we have to try 2^64 keys. However this is not true. Actually only 56 bits are effective in DES keys because one bit (the least significant) out of each octet was historically reserved as a checksum for the others; in practice those 8 bits (one for each of the 8 octets) are ignored.

    Therefore the DES key space consists of 2^56 keys. If we try all these keys will we find one and only one match, corresponding to the bank secret key? Certainly not. We will obtain many matching keys. This is because the PVV is only a small part (one fourth) of the DES output. Furthermore the PVV is degenerated because some of the digits (those between 0 and 5 after the last, seen from left to right, digit between 6 and 9) may come from a decimal digit or from a decimalized hexadecimal digit of the DES output. Thus many keys will produce a DES output which yields to the same matching PVV.

    Then what can we do to find the real key among those other false positive keys? Simply we have to encrypt a second different TSP, also with known PVV, but using only the candidate keys which gave a positive matching with the first TSP-PVV pair. However there is no guarantee we won’t get again many false positives along with the true key. If so, we will need a third TSP-PVV pair, repeat the process and so on.

    Before we start our attack we have to know how many TSP-PVV pairs we will need. For that we have to calculate the probability for a random DES output to yield a matching PVV just by chance. There are several ways to calculate this number and here I will use a simple approach easy to understand but which requires some background in mathematics of probability.

    A probability can always be seen as the ratio of favorable cases to possible cases. In our problem the number of possible cases is given by the permutation of 16 elements (the 0 to F hexadecimal digits) in a group of 16 of them (the 16 hexadecimal digits of the DES output). This is given by 16^16 ~ 1.8 * 10^19 which of course coincides with 2^64 (different numbers of 64 bits). This set of numbers can be separated into five categories:

    Those with at least four decimal digits (0 to 9) among the 16 hexadecimal digits (0 to F) of the DES output.

    Those with exactly only three decimal digits.

    Those with exactly only two decimal digits.

    Those with exactly only one decimal digit.

    Those with no decimal digits (all between A and F).

    Let’s calculate how many numbers fall in each category. If we label the 16 hexadecimal digits of the DES output as X1 to X16 then we can label the first four decimal digits of any given number of the first category as Xi, Xj, Xk and Xl. The number of different combinations with this profile is given by the product 6 i-1 * 10 * 6j-i-1 * 10 * 6k-j-1 * 10 * 6 l-k-1 * 10 * 1616-l where the 6’s come from the number of possibilities for an A to F digit, the 10’s come from the possibilities for a 0 to 9 digit, and the 16 comes from the possibilities for a 0 to F digit. Now the total numbers in the first category is simply given by the summation of this product over i, j, k, l from 1 to 16 but with i < j < k < l. If you do some math work you will see this equals to the product of 104/6 with the summation over i from 4 to 16 of (i-1) * (i-2) * (i-3) * 6i-4 * 16 16-i ~ 1.8 * 1019.

    Analogously the number of cases in the second category is given by the summation over i, j, k from 1 to 16 with i < j < k of the product 6i-1 * 10 * 6j-i-1 * 10 * 6k-j-1 * 10 * 616-k which you can work it out to be 16!/(3! * (16-13)!) * 103 * 6 13 = 16 * 15 * 14/(3 * 2) * 103 * 613 = 56 * 104 * 613 ~ 7.3 * 1015. Similarly for the third category we have the summation over i, j from 1 to 16 with i < j of 6 i-1 * 10 * 6j-i-1 * 10 * 616-j which equals to 16!/(2! * (16-14)!) * 102 * 614 = 2 * 103 * 615 ~ 9.4 * 1014. Again, for the fourth category we have the summation over i from 1 to 16 of 6i-1 * 10 * 616-i = 160 * 615 ~ 7.5 * 1013. And finally the amount of cases in the fifth category is given by the permutation of six elements (A to F digits) in a group of 16, that is, 616 ~ 2.8 * 1012.

    I hope you followed the calculations up to this point, the hard part is done. Now as a proof that everything is right you can sum the number of cases in the 5 categories and see it equals the total number of possible cases we calculated before. Do the operations using 64 bit numbers or rounding (for floats) or overflow (for integers) errors won’t let you get the exact result.

    Up to now we have calculated the number of possible cases in each of the five categories, but we are interested in obtaining the number of favorable cases instead. It is very easy to derive the latter from the former as this is just fixing the combination of the four decimal digits (or the required hexadecimal digits if there are no four decimal digits) of the PVV instead of letting them free. In practice this means turning the 10’s in the formula above into 1’s and the required amount of 6’s into 1’s if there are no four decimal digits. That is, we have to divide the first result by 104, the second one by 103 * 6, the third one by 102 * 62 , the fourth one by 10 * 63 and the fifth one by 64 . Then the number of favorable cases in the five categories are approximately 1.8 * 1015, 1.2 * 1012, 2.6 * 1011 , 3.5 * 1010, 2.2 * 109 respectively.

    Now we are able to obtain what is the probability for a DES output to match a PVV by chance. We just have to add the five numbers of favorable cases and divide it by the total number of possible cases. Doing this we obtain that the probability is very approximately 0.0001 or one out of ten thousand. Is it strange this well rounded result? Not at all, just have a look at the numbers we calculated above. The first category dominates by several orders of magnitude the number of favorable and possible cases. This is rather intuitive as it seems clear that it is very unlikely not having four decimal digits (10 chances out of 16 per digit) among 16 hexadecimal digits. We saw previously that the relationship between the number of possible and favorable cases in the first category was a division by 10^4, that’s where our result p = 0.0001 comes from.

    Our aim for all these calculations was to find out how many TSP-PVV pairs we need to carry a successful brute force attack. Now we are able to calculate the expected number of false positives in a first search: it will be the number of trials times the probability for a single random false positive, i.e. t * p where t = 2^56, the size of the key space. This amounts to approximately 7.2 * 10^12, a rather big number. The expected number of false positives in the second search (restricted to the positive keys found in the first search) will be (t * p) * p, for a third search will be ((t * p) * p) * p and so on. Thus for n searches the expected number of false positives will be t * p^n.

    We can obtain the number of searches required to expect just one false positive by expressing the equation t * p^n = 1 and solving for n. So n equals to the logarithm in base p of 1/t, which by properties of logarithms it yields n = log(1/t)/log(p) ~ 4.2. Since we cannot do a fractional search it is convenient to round up this number. Therefore what is the expected number of false positives if we perform five searches? It is t * p^5 ~ 0.0007 or approximately 1 out of 1400. Thus using five TSP-PVV pairs is safe to obtain the true secret key with no false positives.

    The attack


    Once we know we need five TSP-PVV pairs, how do we get them? Of course we need at least one card with known PIN, and due to the nature of the PVV algorithm, that’s the only thing we need. With other PIN systems, such as IBM, we would need five cards, however this is not necessary with VISA PVV algorithm. We just have to read the magnetic stripe and then change the PIN four times but reading the card after each change.

    It is necessary to read the magnetic stripe of the card to get the PVV and the encrypting key selector. You can buy a commercial magnetic stripe reader or make one yourself following the instructions you can find in the previous page and links therein. Once you have a reader see this description of standard magnetic tracks to find out how to get the PVV from the data read. In that document the PVV field in tracks 1 and 2 is said to be five character long, but actually the true PVV consists of the last four digits. The first of the five digits is the key selector. I have only seen cards with a value of 1 in this digit, which is consistent with the standard and with the secret key never being compromised (and therefore they did not need to move to another key changing the selector).

    I did a simple C program, getpvvkey.c, to perform the attack. It consists of a loop to try all possible keys to encrypt the first TSP, if the derived PVV matches the true PVV a new TSP is tried, and so on until there is a mismatch, in which case the key is discarded and a new one is tried, or the five derived PVVs match the corresponding true PVVs, in which case we can assume we got the bank secret key, however the loop goes on until it exhausts the key space. This is done to assure we find the true key because there is a chance (although very low) the first key found is a false positive.

    It is expected the program would take a very long time to finish and to minimize the risks of a power cut, computer hang out, etc. it does checkpoints into the file getpvvkey.dat from time to time (the exact time depends on the speed of the computer, it’s around one hour for the fastest computers now in use). For the same reason if a positive key is found it is written on the file getpvvkey.key. The program only displays one message at the beginning, the starting position taken from the checkpoint file if any, after that nothing more is displayed.

    The DES algorithm is a key point in the program, it is therefore very important to optimize its speed. I tested several implementations: libdes, SSLeay, openssl, cryptlib, nss, libgcrypt, catacomb, libtomcrypt, cryptopp, ufc-crypt. The DES functions of the first four are based on the same code by Eric Young and is the one which performed best (includes optimized C and x86 assembler code). Thus I chose libdes which was the original implementation and condensed all relevant code in the files encrypt.c (C version) and x86encrypt.s (x86 assembler version). The code is slightly modified to achieve some enhancements in a brute force attack: the initial permutation is a fixed common steep in each TSP encryption and therefore can be made just one time at the beginning. Another improvement is that I wrote a completely new setkey function (I called it nextkey) which is optimum for a brute force loop.

    To get the program working you just have to type in the corresponding place five TSPs and their PVVs and then compile it. I have tested it only in UNIX platforms, using the makefile Makegetpvvkey to compile (use the command “make -f Makegetpvvkey”). It may compile on other systems but you may need to fix some things. Be sure that the definition of the type long64 corresponds to a 64 bit integer. In principle there is no dependence on the endianness of the processor. I have successfully compiled and run it on Pentium-Linux, Alpha-Tru64, Mips-Irix and Sparc-Solaris. If you do not have and do not want to install Linux (you don’t know what you are missing 😉 you still have the choice to run Linux on CD and use my program, see my page running Linux without installing it.

    Once you have found the secret bank key if you want to find the PIN of an arbitrary card you just have to write a similar program (sorry I have not written it, I’m too lazy 🙂 that would try all 10^4 PINs by generating the corresponding TSP, encrypting it with the (no longer) secret key, deriving the PVV and comparing it with the PVV in the magnetic stripe of the card. You will get one match for the true PIN. Only one match? Remember what we saw above, we have a chance of 0.0001 that a random encryption matches the PVV. We are trying 10000 PINs (and therefore TSPs) thus we expect 10000 * 0.0001 = 1 false positive on average.

    This is a very interesting result, it means that, on average, each card has two valid PINs: the customer PIN and the expected false positive. I call it “false” but note that as long as it generates the true PVV it is a PIN as valid as the customer’s one. Furthermore, there is no way to know which is which, even for the ATM; only customer knows. Even if the false positive were not valid as PIN, you still have three trials at the ATM anyway, enough on average. Therefore the probability we calculated at the beginning of this document about random guessing of the PIN has to be corrected. Actually it is twice that value, i.e., it is 0.0006 or one out of more than 1600, still safely low.

    Results


    It is important to optimize the compilation of the program and to run it in the fastest possible processor due to the long expected run time. I found that the compiler optimization flag -O gets the better performance, thought some improvement is achieved adding the -fomit-frame-pointer flag on Pentium-Linux, the -spike flag on Alpha-Tru64, the -IPA flag on Mips-Irix and the -fast flag on Sparc-Solaris. Special flags (-DDES_PTR -DDES_RISC1 -DDES_RISC2 -DDES_UNROLL -DASM) for the DES code have generally benefits as well. All these flags have already been tested and I chose the best combination for each processor (see makefile) but you can try to fine tune other flags.

    According to my tests the best performance is achieved with the AMD Athlon 1600 MHz processor, exceeding 3.4 million keys per second. Interestingly it gets better results than Intel Pentium IV 1800 MHz and 2000 MHz (see figures below, click on them to enlarge). I believe this is due to some I/O saturation, surely cache or memory access, that the AMD processor (which has half the cache of the Pentium) or the motherboard in which it is running, manages to avoid. In the first figure below you can see that the DES breaking speed of all processors has more or less a linear relationship with the processor speed, except for the two Intel Pentium I mentioned before. This is logical, it means that for a double processor speed you’ll get double breaking speed, but watch out for saturation effects, in this case it is better the AMD Athlon 1600 MHz, which will be even cheaper than the Intel Pentium 1800 MHz or 2000 MHz.

    In the second figure we can see in more detail what we would call intrinsic DES break power of the processor. I get this value simply dividing the break speed by the processor speed, that is, we get the number of DES keys tried per second and per MHz. This is a measure of the performance of the processor type independently of its speed. The results show that the best processor for this task is the AMD Athlon, then comes the Alpha and very close after it is the Intel Pentium (except for the higher speed ones which perform very poor due to the saturation effect). Next is the Mips processor and in the last place is the Sparc. Some Alpha and Mips processors are located at bottom of scale because they are early releases not including enhancements of late versions. Note that I included the performance of x86 processors for C and assembler code as there is a big difference. It seems that gcc is not a good generator of optimized machine code, but of course we don’t know whether a manual optimization of assembler code for the other processors (Alpha, Mips, Sparc) would boost their results compared to the native C compilers (I did not use gcc for these other platforms) as it happens with the x86 processor.

    Update

    Here is an article where these techniques may have been used.

    http://redtape.msnbc.com/2008/08/could-a-hacker.html

    Financial Transaction Processing

    I have been recently working inside one of the larger Banks in Australia.
    Through this work, I have been looking at the controls and mechanisms surrounding the processing of credit and debit cards around the Asia Pacific.

    I get to perform many security architecture and payment systems assessments.
    Over the years I have always considered the protection of the card data as one of the key considerations.

    Until yesterday I had never seen an CVV or PVV decryption tools. I think some scripted use of these tools could be very interesting.
    The site hziggurat29.com

    Many of the other tools on this site are also very unique and worth a look.
    Big thanks to ziggurat29 for providing such awesome tools.

    As many of these sites are of this nature are difficult to find and often seem to vanish over the years, I have chosen to replicate the the text from this page and provide local copies on the files.
    It is worth periodically visiting the ziggurat29 site every now and again to see if any additional tools have been posted.

    One of the more extraordinary files is the Atalla Hardware Security Module (HSM)  and BogoAtalla for Linksys emulation (simulation) tools. So I wonder if Eracom and Thales are shaking in their boots. Some how I don’t think so. 😉

    ——– ziggurat29 Text ———

    These are all Windows command-line utilities (except where noted); execute with the -help option
    to determine usage.

    DUKPT Decrypt (<- the actual file to download)

    This is a utility that will decrypt Encrypted PIN Blocks that have been produced via the DUKPT triple-DES method.  I used this for testing the output of some PIN Pad software I had created, but is also handy for other debugging purposes.

    VISA PVV Calculator (<- the actual
    file to download)

    This is a utility that will compute and verify PIN Verification Values that have been produced using the VISA PVV technique.  It has a bunch of auxiliary functions, such as verifying and fixing a PAN (Luhn computations), creating and encrypting PIN blocks, decrypting and extracting PINs from encrypted PIN blocks, etc.

    VISA CVV Calculator (<- the actual file to download)

    This is a utility that will compute Card Verification Values that have been produced using the VISA CVV technique.  MasterCard CVC uses the CVV algorithm, so it will work for that as well.  It will compute CVV, CVV2, CVV3, iCVV, CAVV, since these are just variations on service code and the
    format of the expiration date.  Verification is simply comparing the computed value with what you have received, so there is no explicit verification function.

    Atalla AKB Calculator (<- the actual file to download)

    This is a utility that will both generate and decrypt Atalla AKB cryptograms.  You will need the plaintext MFK to perform these operations.  When decrypting, the MAC will also be checked and the results shown.

    BogoAtalla (<- the actual file to
    download)

    This is an Atalla emulator (or simulator).  This software emulation (simulation) of the well-known Atalla Hardware Security Module (HSM) that is used by banks and processors for cryptographic operations, such as verifying/translating PIN blocks, authorising transactions by verifying
    CVV/CSC numbers, and performing key exchange procedures, was produced for testing purposes.  This implementation is not of the complete HP Atalla command set, but rather the just
    portions that I myself needed.  That being said, it is complete enough if you are performing acquiring and/or issuing processing functions, and are using more modern schemes such as Visa PVV and DUKPT, and need to do generation, verification, and translation.

    This runs as a listening socket server and handles the native Atalla command set.  I have taken some liberties with the error return values and have not striven for high-fidelity there (i.e., you may get a different error response from native hardware), but definitely should get identical positive
    responses.  Some features implemented here would normally require purchasing premium commands, but all commands here implemented are available.  Examples are generating PVV values and encrypting/decrypting plaintext PIN values.

    BogoAtalla for Linksys (<- the actual file to download)

    This is the Atalla emulator ported to Linux and build for installation on an OpenWRT system.  Makes for a really cheap ($60 USD) development/test device.

     

    Local Files

    bogoatalla002
    atallaakbcalc
    bogoatalla_10-1_mipsel
    dukptdecrypt
    visacvvcalc
    visapvvcalc