Ready to Start Your Career?

By: Av3ng3r
March 28, 2017
How I Became the High School Networking Master (Hacking School Computers)

By: Av3ng3r
March 28, 2017
About 3 months ago, I was sitting in yearbook class bored out of my mind. My work was done, and coolmathgames.com just wasn't doing it for me anymore. So, I decided to have some fun. I started with a question: "How could I take control of other student's computers?" I ran through what I knew about the workstations:
So, I took a slight detour off of morality lane and decided to map the entire network of the school. Lucky for me, the hostname of each computer was the room number followed by the computer number that was conveniently taped to the top of each monitor. I spent a week logging into random IP addresses, noting the hostname of that IP address, and creating a sort of marauders map I could use to take control of the computers around me quickly. After a few days of doing this, I found a computer whose host name no longer ended in a computer number but was instead comprised of a room name followed by the term TCHR. Bingo! One after another I found teacher workstations for every single teacher computer in the school, and I had complete control. From here, I could've run keyloggers, taken teacher passwords, change grades, or anything else you can normally do on a computer. That was not the road I wanted to go down, however.The next day I went to the assistant principal and told him everything. I knew I'd be taking a risk, as he could justifiably be furious and punish me severely, but that's not what happened. When I told him I had complete control, he burst out laughing. "That's incredible!" He exclaimed. "A high school senior beat our entire tech department. I love it!" Before I knew it, I had an appointment with the technology director of my school district, where I explained my entire adventure so he could make sure it never happened again. It may sound corny, but telling the truth and being a white-hat was the best decision I could've made. I protected the privacy of several hundred students and dozens of teachers, the integrity of our grading system, and the security of every single workstation in the school. While I am sure that many students dream of hacking the school to cause chaos and believe me I thought very hard about doing so, making the choice to help and protect is so much more fulfilling. Most students will be forgotten after they leave high school, and their legacy will be at best a record on the school's wall. Mine, however, is one that will protect the school for years.
- Windows 7, 64-bit. No ms08-067 for me.
- The student workstations all ran a specific piece of monitoring software called LanSchool. Upon further reading, I found that the teacher software was commonly downloaded by students in the past in order to accomplish the same goal I was trying to achieve. While trying this, I discovered that the school was running a new version of the software that had the student computers connect to a server where they got their teacher assignment from. No dice here.
- Next piece of information: all of the students had a remote drive that mounted to the computer when they logged in. Each student has their own unique drive, so some sort of authentication had to be used in order to gain access to the drive specifically for that student. Since the drive was visible directly in the file explorer instead of some third party software, I was pretty darn sure this was all through SMB. This I could use.

