The Great Rickroll: A High School Graduation Prank's Digital Hijinks

In the annals of high school traditions, the senior prank often stands out as a moment of memorable, albeit sometimes mischievous, expression. Among these, a particularly elaborate and digitally audacious exploit, dubbed "The Big Rick," unfolded within a large school district outside of Chicago. This event saw students not only executing a widespread prank but also inadvertently highlighting significant cybersecurity vulnerabilities within the educational network. The core of this story lies in the calculated and widespread "rickrolling" of hundreds of screens and audio systems across multiple school buildings, a feat orchestrated by a group of graduating seniors.

The Genesis of a Digital Heist

The tradition of senior pranks is deeply ingrained in the fabric of many US high schools, offering a final, often lighthearted, act of defiance or celebration before graduation. For Minh Duong, a senior at the time, this tradition provided the impetus for a far more complex undertaking than mere toilet-papering trees. His journey into the school's digital infrastructure began years earlier, during his freshman year, when he was around 14 years old. Driven by an early interest in school security, and perhaps a touch of youthful recklessness, Duong started scanning the school's internal network. At this stage, he admits to not understanding "basic ethics or responsible disclosure" and was eager to "break something." This early exploration laid the groundwork for future exploits, as he began identifying connected devices and potential access points.

During these initial forays, Duong gained access to internet-connected security cameras, even posting a picture of himself online as proof, an action which led to him being caught and told to stop scanning the network. However, the seeds of exploiting the school's systems had been sown. He discovered that many systems within the school district were running the LanSchool application, a "classroom management" software designed to give teachers control over student computers, including monitoring screens and logging keystrokes. This software, Duong realized, could be repurposed for his own ends.

The Pillars of "The Big Rick"

The elaborate prank, "The Big Rick," hinged on the exploitation of three key components within the school district's network. The planning and execution of this operation took months and involved a team of four friends: Minh Duong (also known by the moniker WhiteHoodHacker), and his accomplices, codenamed Shapes, Jimmy, and Green.

1. LanSchool Application Repurposing: One of the primary tools Duong utilized was a teacher's version of the LanSchool application. By repurposing this software, which was intended for student monitoring, the group could conduct scans and exploit systems while masking their activities to appear as if they originated from a different school within the district. This provided a layer of obfuscation, making it harder for IT administrators to pinpoint the source of the malicious activity.

Read also: Impact of Teacher Shouting

2. The IPTV Presentation System: A critical element of the prank was gaining control of the school's IPTV presentation system. This system is used to display announcements and is connected to hundreds of projectors and televisions across multiple school buildings. Duong had identified vulnerabilities in this system years prior, during his initial network scans. The system comprises receivers that connect directly to projectors and displays, encoders for broadcasting video, and servers for central management. Duong, however, opted against using the central servers for the rickroll, recognizing that broadcasting from there would generate too much traffic and be easily detectable. Instead, he devised a strategy to upload a custom script, acting as a payload, to each receiver individually. This was done in batches in the month leading up to the prank, significantly reducing the risk of detection. He conducted rigorous testing at night, remotely accessing a computer lab PC through the computer club, to ensure the projectors displayed the stream correctly. To prevent teachers from easily disabling the stream, the script was designed to run on a loop, powering on the display and setting the volume to maximum every 10 seconds. The only effective ways to stop the stream would be to change the HDMI input source on the projectors or pull the power cable. Furthermore, they disabled infrared remotes and implemented a failsafe that reset the projectors to play the correct feed just seconds before Rick Astley's iconic tune would begin.

3. The EPIC Paging and Intercom System: The third and final component of "The Big Rick" was the Education Paging and Intercom Communications (EPIC) system. This system controls the hallway and classroom speakers and is used for announcements, fire alarms, and bells. Crucially, it also has the capability to play custom audio tracks. The group initially attempted to access EPIC using default usernames and passwords, but these had been changed. However, through further scanning, they discovered that while the default password had been altered, the new password was simply the example password provided in the system's user manual, which was readily available online. This led to the discovery of an administrative account with the password "password," granting them access to the entire district's speaker systems. The night before the prank, the speaker system was configured to automatically trigger in the afternoon.

The Execution: "Never Gonna Give You Up" Blasts Across the District

On April 30, 2021, at precisely 10:55 am, a message of impending importance flashed across all TV screens and classroom projectors in six schools within Cook County, Illinois. "Please standby for an important announcement," the displays read, accompanied by a five-minute countdown timer. Screens that were off powered on, and projectors automatically switched to the HDMI input. Teachers, attempting to regain control, found their efforts futile. One teacher, caught on video, exclaimed, "They overtook our projector." Students speculated wildly, with some guessing it might be a message from President Joe Biden, or perhaps "big brother."

This orchestrated scenario was unfolding simultaneously across dozens of classrooms and hallways, affecting over 500 screens and impacting the 12,000 students within Illinois' school district 214. As the countdown timer reached zero, the grainy, gyrating figure of Rick Astley burst onto the screens, heralded by the opening notes of "Never Gonna Give You Up." Minh Duong, positioned discreetly in a classroom corner, meticulously monitored his laptop, coordinating with his friends via encrypted messenger. The sight of classmates and teachers reacting with a mixture of confusion and amusement was, for Duong, a testament to the prank's success. Later that day, at 2:05 pm, the audio dimension of the prank was amplified as Duong and his friends took control of the school's public address (PA) systems, playing the song one last time.

Beyond the Prank: Security Implications and Responsible Disclosure

While "The Big Rick" was conceived as a harmless graduation prank, the methods employed were undeniably illegal. Accessing school IT systems without authorization falls under "unauthorized access" according to the Computer Fraud and Abuse Act. A malicious actor could have leveraged such access to steal data, move laterally through the network, or cause significant harm. Duong himself acknowledged the potential legal ramifications, stating, "I was just a lucky case."

Read also: Navigating Florida Teacher Certification

However, the group's intent was never malicious. They had established a set of guidelines, including not compromising the safety of others, minimizing disruption to learning, avoiding sensitive private information, and ensuring systems were not left in a weaker state than they were found. Their primary objective was to execute a prank, and they were keen to demonstrate this.

A crucial aspect of their operation was their approach to disclosure. Three days before the rickroll, after much of the technical groundwork was laid, they compiled a comprehensive 26-page report detailing their findings and the vulnerabilities they had exploited. This report was sent to the school district's administrators immediately after the prank concluded. The report not only outlined what they had done but also provided specific security suggestions, such as the imperative to change all default passwords.

This proactive disclosure played a significant role in mitigating potential repercussions. The school district, rather than pursuing punitive measures, viewed the incident as an unscheduled penetration test. A spokesperson stated that the district "does not condone hacking" but acknowledged that the "incident highlights the importance of the extensive cybersecurity learning opportunities the District offers to students." They further commented that the students "presented the data in a professional manner," and their tech team subsequently implemented changes to bolster security.

The district even invited the students to a debriefing session, where Duong, using his real name while others employed anonymous accounts, provided further details on securing the system. This collaborative approach, born from a prank, transformed a potentially damaging incident into a valuable learning experience for both the students and the school administration.

Read also: Solving the Special Education Shortage

tags: #teacher #rick #rolls #students #explained

Popular posts: