Archive for August, 2009

Amateur Radio Finally! Got my License & CallSign


After over two months of going into some extreme stupid so called “laws” here in Kuwait, I got my license as well as my call sign for HF/VHF/UHF.

Call sign: 9K2FE

The problem with our ministries here that there aren’t written laws for many of the things & if existed they are so old & makes no sense at all!

For example, they refused to proceed with my license at MOC (Ministry of Communications) unless I bring them a radio device to include it on the license!

What country does that?! I mean when you are certified as an HF user, it doesn’t matter what device you use, it’s like requesting you to bring a car before you drive & you are stuck with that car as written on your license. Stupid aih?!

The people there are so ignorant that they cannot even read the specs of the device properly & won’t even bother to look online for it, they request a hard copy of the specs of the device you want … it can be easily edited & you can provide fake specs & get what you want & no one would know! Of course I wouldn’t do that for ethical reasons & it would also be lying.

You might be asking “get what you want”?? Ah yes, I forgot to tell you, though it is not officially written in papers, but people there say Airbands are not allowed, though one guy spoke to the minister of the MOC & he didn’t say no. Also, any device that has 6 meters band is not allowed into the country cause the military USED to use that band for it’s activities, they NO longer use it, but they are either lazy enough or afraid to change the rules. You are also restricted to 3 devices, you CANNOT have more than 3 licensed radios!

On the UHF the official range for region 1 is 430-440 MHz, in Kuwait for the Amateur service you are only allowed to use 435-438 MHZ not even enough for a proper repeater frequency separation. Yes I know the government have the right to use some of the frequencies but trust me, they have no idea what they are doing.

I mean … sigh .. check this out, now if someone dies, what should happen? His call sign is no longer reserved right? If some people did not renew there call signs they are no longer reserved right? Well, here you cannot even take a dead man’s call sign.

Almost everyone in the department there has his own rules, there are no fixed rules & every person you meet would tell you something completely different than the other, knowing that they are all in the same department not to mention in the same ministry.

The situation is bad here for Amateurs.

Till later, am just happy I got my license as well as radio finally!

icom IC-E91 + License

My Radio & License

Geek Stuff Poisoning The ARP Table of My Own Router


A question arises whether it is possible for me to apply sniffing tools & be able to spy on ummm, virtually anything (if you have the right tool) of any computer on the network.

Sometimes it might be used for security issues, parental control & maybe trust issues, everything has good & bad uses.

Our home network looks like this:


| (DSL Modem) ===> (Router) |


What I did is that I brought my computer, booted up pfSense Live CD (FreeBSD Firewall) & put it between the Modem & Router.


| (DSL Modem) ===> (pfSense) ===> (Router) |


I didn’t experiment a lot, but it looks like you have to add some add-ons like software to sniff IM messages and I didn’t see any packet analyzing tools.

I then booted the main OS on my computer instead of the firewall which is Linux Kubuntu 8.04, since I have two Ethernet ports, one for the WAN & the other for the LAN, I had to connect them together, the easiest way was to install a firewall to do that, though there supposed to be a simple command that can do it.

I started some packet analysing tools, but didn’t get so deep, I don’t really need to analyze all the packets from scratch, I needed specialised tools to analyse certain kinds of packets, something went wrong & I didn’t get Internet activity, so I returned everything back as before.

I decided to ignore the method if intercepting the packets by installing a hardware in between & started thinking of some hacking techniques, I started by reading a book I bought about more than 7 years ago when I was in high school, back then I didn’t understand most of what’s there, but now I really appreciate getting that book, it’s called “Anti-Hacker Toolkit”.

I called my cousin & invited him to share me the experience since he worked on BackTrack before which has many security tools. We started by trying to poison the ARP tables of the router but it failed, apparently it’s a problem with my laptop’s hardware, I tried with my netbook & it worked.

I basically lied to both the router & my cousin’s computer letting both think that my netbook is the other.

e.x: Router thinks my computer is my cousin’s & cousin’s computer thinks mine is the the router.

This way all traffic passes through me before it goes to the other side, the main problem we faced is that we had to forward the traffic, otherwise there would be no communication between the devices which is useless. With a simple command it was working.

I told him to open MSN & start chatting while I run an IM packet sniffer & I can read every message he sends & receives. One can also check the email a computer receives via POP3 & SMTP protocols, URL sniffing is also available, actually there is a program when activated & targeted to a victim, it would open your Netscape browser to whatever the victim is surfing, and as said in the book “Talk about an invasion of privacy!”

We tried other tools to try & spoof the DNS of a computer, for example, so when the target computer tries & requests this DNS it requests it form my own computer, doing this and with other proper tools would enable me to issue a false certificate or login session which is forwarded to the real DNS, that way I would be able to have his encrypted session details and know his login password.

It isn’t really hard to do that, it’s only a matter of having the knowledge & the right tools. I remember how much good info I gained when I took Cisco’s CCNA1 certificate, the very basics of any network & how networking works should be known to any REAL hacker (not a script kiddy!).

Spying on MSN chat

Spying on MSN chat

General A Special Thanks to Nosayba

1 Comment

I want to thank Nosayba for this migration, though it is a sad story behind her migration & mine.

She lost her blog account on Blogger & migrated to WordPress & then advised me about it.

Thanks Nosayba & wish you the best with your new blog.

Old Blog Old Blog


Link to my old blog


Uncategorized Test Post


This is a test post

Just a cute image:


Just a cute image

Ok, it kinda looks much better & easier than b2evolution I have to say.