www.jibble.org http://www.jibble.org/ www.jibble.org - homepage of Paul Mutton nothing High Severity - a security blog http://www.jibble.org/ <!-- 1294448327 --><h3>High Severity - a security blog</h3><p>If you're interested in online security, penetration testing, hacking and so on, you may be interested in my new blog, <a href="http://www.highseverity.com/">High Severity</a>. I'll be kicking things off by interviewing a member of <i>Anonymous</i>, so stay tuned to <a href="http://www.highseverity.com/">highseverity.com</a> and let me know if there are any other features you would like to see on the site.</p><p style="font-size: 10px;text-align: right;">7 Jan 2011 - 16:58:47 PST<br />[<a href="http://www.jibble.org/news/?period=2011-01&amp;id=1294448327">Permanent link</a>]</p> Paul Mutton Cyber Security Challenge UK - cipher challenge winner http://www.jibble.org/ <!-- 1280479726 --><h3>Cyber Security Challenge UK - cipher challenge winner</h3><p>Yay, I just won the Cyber Security Challenge UK <a href="https://cybersecuritychallenge.org.uk/cipher.html">cipher challenge</a>! Rather appropriately, I've won season tickets for Bletchley Park, plus a personal tour of the refurbished Colossus code breaking computer from World War 2. <a href="http://www.jibble.org/cyber-security-challenge-uk-winner/">This</a> is how I cracked the code.</p><p style="font-size: 10px;text-align: right;">30 Jul 2010 - 1:48:46 PDT<br />[<a href="http://www.jibble.org/news/?period=2010-07&amp;id=1280479726">Permanent link</a>]</p> Paul Mutton O2 Wireless Box III - Still Insecure http://www.jibble.org/ <!-- 1270914360 --><h3>O2 Wireless Box III - Still Insecure</h3><p>After waiting several months for <a href="http://www.o2.co.uk/">O2</a> to fix the wireless router vulnerability I reported <a href="http://www.jibble.org/o2-broadband-fail/">last year</a>, I was about to discuss how the vulnerability worked... </p> <p> ...but then I discovered (in less than one minute!) that their fix contains a <a href="http://www.jibble.org/o2-broadband-fail/#update">new vulnerability</a> which makes it possible to do CSRF attacks. That means an attacker could steal your WEP/WPA2 key, change your password, set up port forwarding, etc. Read more <a href="http://www.jibble.org/o2-broadband-fail/#update">here</a>.</p><p style="font-size: 10px;text-align: right;">10 Apr 2010 - 8:46:00 PDT<br />[<a href="http://www.jibble.org/news/?period=2010-04&amp;id=1270914360">Permanent link</a>]</p> Paul Mutton O2 Broadband Router Security http://www.jibble.org/ <!-- 1251486875 --><h3>O2 Broadband Router Security</h3><p>A few weeks ago, I discovered a serious <a href="http://www.jibble.org/o2-broadband-fail/">security flaw</a> that affects hundreds of thousands of broadband internet users. I made several attempts to report this problem to O2, but they erroneously insisted that the security of their Wireless Boxes exceeds industry standards and is acceptable for home use.</p> <p> I strongly disagree, so I have <a href="http://www.jibble.org/o2-broadband-fail/">published</a> my findings to try and get them to take the matter seriously. It's quite an interesting attack vector, so I shall describe it in full detail <i>after</i> they have fixed the problem.</p><p style="font-size: 10px;text-align: right;">28 Aug 2009 - 12:14:35 PDT<br />[<a href="http://www.jibble.org/news/?period=2009-08&amp;id=1251486875">Permanent link</a>]</p> Paul Mutton Current Cost Graphs http://www.jibble.org/ <!-- 1220905385 --><h3>Current Cost Graphs</h3><p>I've been jibbling about with a <a href="http://www.currentcost.com/">Current Cost</a> device lately, and have been working out how to get data out of it and into some <a href="http://www.jibble.org/currentcost/">shiny graphs</a>. </p> <p> What with the current trend of rising energy costs, this is both enlightening and depressing!</p><p style="font-size: 10px;text-align: right;">8 Sep 2008 - 13:23:05 PDT<br />[<a href="http://www.jibble.org/news/?period=2008-09&amp;id=1220905385">Permanent link</a>]</p> Paul Mutton BBC iPlayer DRM hack http://www.jibble.org/ <!-- 1205352257 --><h3>BBC iPlayer DRM hack</h3><p> BBC iPlayer has been available for a while now, but there have been a few things I still don't like about it. The iPlayer client started off as a Windows-only application that rather covertly stole lots of your bandwidth by installing a peer to peer network client which remained running even when you weren't using iPlayer. Crappy digital rights management meant that you could only watch downloaded programmes for a certain amount of time, and even then, things would tend to break and you would have to download everything again in order to watch it. After a while, they started to let you stream programmes directly from their website without needing to install this junk, but the quality was not as good. </p> <p> Fortunately, a few days ago, the BBC made iPlayer available to iPhone users. The video quality is <i>much</i> nicer, and it doesn't contain any of that wanky DRM bollocks. The BBC iPlayer website currently determines whether you're using an iPhone by looking at the User-Agent header that the web browser sends to the server each time it makes an HTTP request. </p> <p> So, using Firefox and Chris Pederick's <a href="http://chrispederick.com/work/user-agent-switcher/">User-Agent Switcher</a>, it is possible to trick the BBC iPlayer site into thinking that you're using an iPhone, thus giving you access to the better-quality DRM-free downloads. </p> <h4>Spoofing the iPhone</h4> <p> Set your browser's User-Agent to something that looks like an <a href="http://www.twenga.co.uk/dir-Phones,iPhone">iPhone</a>: </p> <p> <code>Mozilla/5.0 (iPhone; U; CPU like Mac OS X; en) AppleWebKit/420+ (KHTML, like Gecko) Version/3.0 Mobile/1A543a Safari/419.3</code> </p> <p> Now have a look around the BBC iPlayer website and find your favourite episode of Eastenders... </p> <p> The next bit is slightly awkward. Firefox will want to open the video within the browser using something horrible like Apple Quicktime, but all we want to do is download the video so we can keep it forever (remember, its DRM-free!). I made the following piece of JavaScript which will create a new web page that contains a direct download link for the video. Simply redirecting to the video URL makes the browser try to play it, so you'll need to right-click on the URL and use "save as". The default filename will have a ".htm" extension, so rename the whole file to something meaningful and give it a ".mp4" extension instead. </p> <h4>Downloading the DRM-free video the easy way</h4> <p> To make it easier to use the JavaScript, you can save it as a bookmark and keep it to hand on Firefox's bookmarks toolbar. This is the code you'll need to bookmark (all on one line): </p> <p> <code>javascript:window.location = 'data:text/html,&lt;p&gt;Download the video with &lt;a href=&quot;' + document.getElementById('mip-flash-player').getElementsByTagName('object')[0].firstChild.value + '&quot;&gt;this link&lt;/a&gt; (right-click, save as, rename with .mp4 extension)&lt;/p&gt;';</code> </p> <p> So now it's trivial to get hold of DRM-free content from BBC iPlayer: </p> <ol> <li>Install <a href="http://chrispederick.com/work/user-agent-switcher/">User-Agent Switcher</a>.</li> <li>Add a new User-Agent string to Firefox so you can pretend to be an iPhone.</li> <li>Go to the iPlayer site with your iPhoney browser and find something worth watching (hint: Eastenders).</li> <li>Click on the special JavaScript bookmark shown above.</li> <li>Right-click on the link it gives you and save it somewhere, giving the file an ".mp4" extension.</li> <li>Finally, play the video (as often as you like!) using <a href="http://www.videolan.org/vlc/">VLC</a>.</li> </ol></p><p style="font-size: 10px;text-align: right;">12 Mar 2008 - 13:04:17 PDT<br />[<a href="http://www.jibble.org/news/?period=2008-03&amp;id=1205352257">Permanent link</a>]</p> Paul Mutton PircBot 1.4.6 IRC library released http://www.jibble.org/ <!-- 1176317353 --><h3>PircBot 1.4.6 IRC library released</h3><p>It's becoming increasingly common for IRC networks to require clients to register with NickServ, and then identify themselves to NickServ each time they connect. Failure to do so prevents the client (or bot) from being able to send private messages to other users, and the server may even force a nick-change upon the client. </p> <p> The new release of <a href="http://www.jibble.org/pircbot.php">PircBot 1.4.6</a> addresses this problem by allowing bots to identify with NickServ (using a previously registered nick and password). This works on IRC networks which support raw NICKSERV commands, such as freenode.</p><p style="font-size: 10px;text-align: right;">11 Apr 2007 - 11:49:13 PDT<br />[<a href="http://www.jibble.org/news/?period=2007-04&amp;id=1176317353">Permanent link</a>]</p> Paul Mutton Lens hoods http://www.jibble.org/ <!-- 1148903061 --><h3>Lens hoods</h3><p>One of my latest web sites, which offers free downloadable <a href="http://www.lenshoods.co.uk/">lens hoods</a>, is mentioned in a <a href="http://news.bbc.co.uk/1/hi/technology/4989842.stm">BBC News article</a>. The site lets you download lens hoods for a variety of SLR camera lenses, which can then be printed onto paper or card and glued together to make an impromptu lens hood. Lens hoods are an essential accessory for any photographer, as they prevent stray light entering the lens and reducing image contrast. </p> <p> So if you're into photography and haven't got a lens hood yet, why don't you go and grab a free one from <a href="http://www.lenshoods.co.uk/">www.lenshoods.co.uk</a></p><p style="font-size: 10px;text-align: right;">29 May 2006 - 12:44:21 BST<br />[<a href="http://www.jibble.org/news/?period=2006-05&amp;id=1148903061">Permanent link</a>]</p> Paul Mutton Mobile Googlebot "uses" Nokia 6820 http://www.jibble.org/ <!-- 1146227052 --><h3>Mobile Googlebot "uses" Nokia 6820</h3><p>Someone <a href="http://mobile.kaywa.com/mobile_market/the-first-four-user-agents-nokia-6820-before-mozilla.html">recently commented</a> on a large proportion of their web site visitors coming from Nokia 6820 devices - even more than from Mozilla based browsers! </p> <p> Taking a quick peek at my own Apache log file, I noticed quite a lot of requests coming from a range of IP addresses - owned by Google - with the UserAgent set to "<code>Nokia6820/2.0 (4.83) Profile/MIDP-1.0 Configuration/CLDC-1.0 (compatible; Googlebot-Mobile/2.1; +http://www.google.com/bot.html)</code>" </p> <p> This probably explains these erroneous stats :) </p> <p> Obviously Google are not really using Nokia 6820s to crawl the web, but they are presumably performing separate crawls with this different user agent to see whether sites return different content if they know the client is using a phone or other small-screened device. It would be interesting to know how many sites do actually return different content for mobile browsers.</p><p style="font-size: 10px;text-align: right;">28 Apr 2006 - 13:24:12 BST<br />[<a href="http://www.jibble.org/news/?period=2006-04&amp;id=1146227052">Permanent link</a>]</p> Paul Mutton Time to go http://www.jibble.org/ <!-- 1143873445 --><h3>Time to go</h3><p>After several years of being heavily involved with computers and the internet, I've decided to give it all up and go and live in a shanty town in Peru. Here I will enjoy an exclusive plot in a "pueblos j�venes", with no electricity supply and no nearby telecommunications masts. It's possible that you may be able to contact me with VoIP (Voice over Intelligent Pigeons), but due to a local outbreak of H5N1 bird flu, this cannot be guaranteed. </p> <p> Obviously, I will not be able to update this web site after I have embarked upon my new life. If you would like to buy it, offers may be passed on to my solicitor, Mr Uve Binadd.</p><p style="font-size: 10px;text-align: right;">1 Apr 2006 - 7:37:25 BST<br />[<a href="http://www.jibble.org/news/?period=2006-04&amp;id=1143873445">Permanent link</a>]</p> Paul Mutton KiteCam II - Donate Your Camera! http://www.jibble.org/ <!-- 1141597821 --><h3>KiteCam II - Donate Your Camera!</h3><p>It's been quite a while since the original <a href="http://www.jibble.org/kitecam/">KiteCam</a> adventure saw my �300 digital camera soaring into the skies to take <a href="http://www.jibble.org/kitecam/">aerial photos</a> of the University of Kent. Unfortunately, it went a bit wrong and the camera ended up getting completely trashed when it hit the ground just a little bit too hard. It was a bit of a devastating moment, what with me being a poor student and having broken my only camera... but still, it seemed like a good idea at the time. </p> <p> <img src="http://www.jibble.org/kitecam/images/Cimg0021_thumb.jpg" alt="" height="96" width="128"> <img src="http://www.jibble.org/kitecam/images/Cimg0042_thumb.jpg" alt="" height="96" width="128"> <img src="http://www.jibble.org/kitecam/images/IMG_0055_thumb.jpg" alt="" height="90" width="135"> </p> <p> Now I believe it is time to relive this fun experiment by planning <b>KiteCam II</b>. My initial thoughts were to avoid the same mistakes as last time by putting a bit more effort into making sure everything is well-organized and safe, but then I suddenly realised <i>there is no fun without danger</i>! </p> <p> So, I'm going to do KiteCam II in pretty much the same way. It will involve a kite. A stupid, impractically huge kite. It will involve bubble wrap. Oh yes. It will involve lots of string and some toilet roll. It will involve some ingenious remote shutter mechanism which can be attached to the camera. But most of all, it will involve that ludicrous element of danger that makes it so fun. </p> <p> This has made me realise that it's best to use someone else's camera for this kind of thing. </p> <p> If you would like to donate a 35mm SLR camera and lens to be used in KiteCam II, please <a href="http://www.jibble.org/contact/">contact me</a>. Wide-angle lenses would be best for this kind of stunt. Film cameras will do fine, but I certainly won't turn down a chance to send someone else's digital SLR in the air! :) Please note that any cameras and lenses you donate will not be returned - they will most likely end up in pieces! However, you will be safe in the knowledge that you'll be helping out with a fun project and your donation will be mentioned on the inevitable web page of photos that will appear after it's all done. </p> <p> So, what are you waiting for? <a href="http://www.jibble.org/contact/">Let me know</a> if you have any of the following that you'd like to donate: </p> <ul> <li>35mm film or <a href="http://www.twenga.co.uk/dir-Photo,Digital-SLR-camera">digital SLR camera</a>.</li> <li>Wide-angle lens for 35mm camera.</li> <li>Crazy ideas to make KiteCam II more exciting.</li> </ul> <p> I look forward to hearing from you :)</p><p style="font-size: 10px;text-align: right;">5 Mar 2006 - 22:30:21 GMT<br />[<a href="http://www.jibble.org/news/?period=2006-03&amp;id=1141597821">Permanent link</a>]</p> Paul Mutton Autoboxing Considered Harmful http://www.jibble.org/ <!-- 1135198746 --><h3>Autoboxing Considered Harmful</h3><p>I was not a great fan of Java 1.5 when its new features were announced. Sure, I could see the benefits of things like autoboxing, but having taught this stuff to university students for 3 years, I couldn't help but think of the problems it could cause. </p> <p> I came up with the following example, which demonstrates autoboxing in action (note: never write code like this!): </p> <pre> Integer a1 = 100;<br /> Integer a2 = 100;<br /> System.out.println(a1 == a2); // Prints "true"</pre> <p> Note that this code will not compile in Java 1.4 or earlier, as you cannot assign an int to an Integer without autoboxing. The equality operation could appear to return "true" because the int values inside the Integers are the same, but it's actually because when a1 and a2 are assigned, they end up pointing to the same immutable Integer object. Testing the same object for equality with itself obviously returns true. </p> <p> This alone can cause some confusion, as changing the code to do things the "old" way would give different results: </p> <pre> Integer a1 = new Integer(100);<br /> Integer a2 = new Integer(100);<br /> System.out.println(a1 == a2); // Prints "false"</pre> <p> To most people, the above difference would be obvious - a1 and a2 both point to different Integer objects (they just happen to contain the same int value), so the equality operation returns false. </p> <p> Now, let's jump back to that first example where two autoboxed Integers are compared. What happens if we change their values from 100 to 150? </p> <pre> Integer b1 = 150;<br /> Integer b2 = 150;<br /> System.out.println(b1 == b2); // Prints "<b>false</b>"</pre> <p> Most people look at this and go, "Huh? Why does it return <i>false</i> now?" Unfortunately, only values between -128 and +127 are assigned to the same immutable Integer object in a pool of Integers. Anything outside that range appears to be assigned to a new Integer object, so equality will never happen. </p> <p> Using autoboxing in this way is a poor practice, but I can imagine it being all too easy for student programmers to fall into this trap and end up getting <i>really</i> confused. I even know people who work with Java every day and were very surprised by this. </p> <p> Sun's advice on when to use autoboxing and unboxing is pretty sound, and should be observed and taught in order to prevent any weirdness happening: </p> <p class="smallprint"> Use them only when there is an "impedance mismatch" between reference types and primitives, for example, when you have to put numerical values into a collection. It is not appropriate to use autoboxing and unboxing for scientific computing, or other performance-sensitive numerical code. An Integer is not a substitute for an int; autoboxing and unboxing blur the distinction between primitive types and reference types, but they do not eliminate it. </p> <p> Wise words indeed. </p></p><p style="font-size: 10px;text-align: right;">21 Dec 2005 - 20:59:06 GMT<br />[<a href="http://www.jibble.org/news/?period=2005-12&amp;id=1135198746">Permanent link</a>]</p> Paul Mutton