home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Thu Jan 2, 1997 Volume 9 : Issue 01
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #9.01 (Thu, Jan 2, 1997)
-
- File 1--CLO#21-Negotiating the end of the millennium
- File 2--Jenott case: More gossip, so-called criminal hacker stuff
- File 3--Soldier Innocent of Giving Secret Code to Chinese
- File 4--Crack5: ANNOUNCE: Daily Telegraph Article (fwd)
- File 5--BoS: Phrack 49 (fwd)
- File 6--Cu Digest Header Info (unchanged since 13 Dec, 1996)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Tue, 24 Dec 1996 17:22:23 +0100
- From: "William S. Galkin" <wgalkin@EARTHLINK.COM>
- Subject: File 1--CLO#21-Negotiating the end of the millennium
-
- [PLEASE NOTE: All back issues can now be found at the
- Computer Law Observer site located at:
- http://www.lawcircle.com/observer]
-
- =============================================================
- December, 1996 The Computer Law Observer Issue No. 21
- =============================================================
- The Computer Law Observer is distributed monthly for free by Challenge
- Communications. To subscribe, e-mail to lawobserver-request@charm.net
- with the word "subscribe" (leaving out the quotation marks) in the
- message area. To unsubscribe, do the same, inserting the word
- "unsubscribe". Re-posting is prohibited without permission. Copyright
- 1996 by Challenge Communications. See our website for back issues:
- http://www.lawcircle.com/observer
- ------------------------------------------------------------
-
- ++++++++++++++++++++++++++++++++++++++++++++++
- NEGOTIATING THE END OF THE MILLENNIUM
- ++++++++++++++++++++++++++++++++++++++++++++++
- by William S. Galkin, Esq.
- (biography at end)
-
-
- Irony -
-
- Billions of dollars, and the world's best and brightest, have been
- devoted to the development of information technologies. And, now, with
- the meteoric rise in use of the Internet, we seem finally to be at the
- dawn of a new era where information resources will truly permeate our
- lives - dramatically altering the landscape of mankind in a manner many
- compare to the industrial revolution.
-
- And yet, someone discovered a flaw, a fault line that runs through much
- of the system. A simple programming error, that when viewed with
- hindsight one wonders "How could anyone have made such an obvious
- mistake?"
-
- This article focuses on the legal issues involved in successfully
- negotiating a solution to what is often referred to as the "Year 2000
- Problem".
-
- Mistake -
-
- Date calculations play an essential role in most applications. Almost
- all applications record information regarding the year with two digits
- (i.e., 96 for 1996). The basic functions involving dates include
- calculating, comparing and sequencing. Therefore, when a program wants
- to calculate a person's current age, it will perform a calculation by
- subtracting the person's date of birth from the current year. In my
- case, subtract 57 (1957) from 96 (1996) and the result is 39. However,
- when the new millennium arrives, the year information contained in most
- applications will be "00". The calculation of my age (i.e., 00 minus 57)
- produces an erroneous result of negative 57!
-
- Magnitude -
-
- All hardware and software systems are potentially affected by the Year
- 2000 problem, even applications that are resident with service bureaus.
- Major corporations are expected to have to pay at least $40 million to
- rectify the problem. The worldwide cost could reach $400 billion.
- Federal Express was reported as having paid 5 cents per line of code to
- correct the problem, which resulted in a $500 million total cost. Chubb
- Insurance has paid $180 million and the state of Nebraska has paid $32
- million.
-
- The problem is estimated to affect 95% of all U.S. companies. To date,
- only one third of affected companies are undergoing conversion. Some
- estimate that either the cost to repair or the failure to repair could
- result in a bankruptcy rate of 1 to 5%.
-
- The repair process is complex and involves either a data solution or a
- procedural solution. The data solution involves the modification of each
- occurrence of a date. This requires a methodical line-by-line analysis
- of code. With each change, the affected logic must be revisited and the
- modification must then be tested. Mid-sized companies will often have
- millions of lines of code. As many as one in every 50 lines could have a
- date reference. Data entry screens and output formats will have to be
- modified as well. A procedural solution involves changing the processing
- methodology so that an application will know that "18" means "2018"
- instead of "1918". This approach is difficult to implement as well.
-
- First steps -
-
- Every affected company needs to design its own approach to the Year 2000
- problem. Usually a team will be set up to oversee the process. The team
- will include the appropriate internal technical personnel as well as
- management and outside consultants. Financial and legal advisors may
- also need to be included.
-
- The first step is to take a thorough inventory of all affected
- applications and gather all of the software license and support
- agreements that govern such applications to determine each party's
- rights and liabilities. There are a variety of provisions that might be
- found in these agreements, especially for custom software or where
- agreements went through a negotiation process.
-
- Some provisions might obligate the vendor to assist with the repairs or
- impose liability for damages that occur due to the Year 2000 problem.
- Additionally, a licensee will need to identify all confidentiality
- restrictions that might be found in the license agreements in order that
- when the repair work begins, it can proceed efficiently without
- violating these provisions. Many modifications will require access to
- the source code. Therefore, it is important to determine whether a
- source code escrow agreement requires delivery to rectify such a
- problem.
-
- Negotiating the cure -
-
- Rectifying the Year 2000 problem is complex because of both the variable
- times when problems might arise and because of the variety of forms the
- problems might take. Accordingly, when hiring outside consultants to
- repair the problem, a careful agreement needs to be drafted to specify
- what the problem is, how and when it is going to be fixed, and what
- happens if it is not adequately fixed. Following is a discussion of
- some of the important issues that need to be considered:
-
- DEFINITION OF PROBLEM: A survey of the problem is the first step. This
- can be performed in house, by a third party consultant or by the vendor
- hired to correct the problem. The results of this analysis will become
- an essential component of the agreement. The survey should include a
- catalogue of all applications reviewed and specifications as to what
- kind of corrections are needed for each application. There are a variety
- of correction methods that can be implemented - some will be appropriate
- for some applications, and not for others. The ideal goal is for the
- vendor to represent that all Year 2000 problems will be corrected, even
- those not listed in the survey results. However, most vendors will not
- agree to such a global representation.
-
- CONFIDENTIALITY: The vendor will be having intimate contact with a large
- portion of the information about the company. Additionally, the company
- itself will be under confidentiality restrictions that may prohibit the
- company granting access to certain applications. Accordingly, the
- confidentiality issues need to be settled in advance.
-
- IMPLEMENTATION SCHEDULE: It cannot be over stressed, that with Year 2000
- repairs, time is of the essence. A detailed implementation schedule
- needs to be prepared and specific remedies and options need to be
- available if the schedule becomes delayed due to the actions of the
- consultant or the company.
-
- EVALUATING PROGRESS: Having the work completed by a certain date, well
- in advance of December 31, 1999, if possible, may be crucial in
- accomplishing an effective transition. Accordingly, the vendor should be
- required to keep the company regularly informed of progress and of any
- delays.
-
- CHANGE ORDERS: As the work begins to be performed, it is inevitable
- that additional tasks will be identified as needing to be performed. The
- agreement needs to be flexible enough to adjust for these changes in
- scope.
-
- TIME OF WORK AND DISRUPTION: Much of the Year 2000 repair work will have
- to be performed when the system or certain applications are down. This
- means that companies will want this work performed at night or over the
- weekends. Accordingly, it is important that the agreement set forth
- when the system will be done, and who determines the down schedule.
-
- TESTING PROCEDURES: Given the complexity of the repair methods, testing
- must be an essential component of the repair services. The vendor and
- the customer must develop and agree upon test criteria, how the tests
- will be performed, and when the system is considered to have passed the
- test. Additionally, it is important that a significant period of live
- use be a part of the test period. In order for this to be effectively
- available, the repair work must be completed well before December 31,
- 1999.
-
- FOLLOW-UP REPAIRS: It is likely that the testing procedures will turn up
- problems and errors. These errors may or may not fall within the scope
- of the repair services. Accordingly, the vendor should agree to be
- available (i.e., have personnel available) to rectify whatever problems
- arise. This is an important provision. As the year 2000 approaches,
- vendors will be stretching themselves thinner and thinner to complete
- the work by the deadline. Without prior assurances, there may not be
- personnel available to perform these follow up services.
-
- COST INCREASES; EMERGENCY SERVICES: Many service agreements are done on
- a time and materials basis and the vendor can increase the hourly rate
- after giving proper notice (e.g., 60 days' prior written notice). These
- provisions are workable when other vendors are available to substitute
- for a vendor that raises its price too much. As time goes on, it will
- be prohibitively expensive to find a substitute vendor, if one can be
- found at all.
-
- LENGTH OF WARRANTY: Not all Year 2000 glitches will be apparent at the
- turn of the century. It may take months or even years for some to
- surface. The warranty provision needs to take this issue into account.
-
- Other issues -
-
- Obviously, all new license agreements should include Year 2000
- compliance requirements. This is a complex provision and should be
- carefully drafted. However, a discussion of this provision is beyond the
- scope of this article.
-
- Given the cost to repair and the potential for damage resulting from
- lack of compliance, due diligence for any corporate acquisition or
- significant loan or investment, must include a thorough evaluation of
- this issue.
-
- Many boards of directors have been postponing dealing with the problem
- because of the large expense that will appear on their financial
- statements. To make matters worse, the Financial Accounting Standards
- Board emerging issues committee has determined that money spent on the
- Year 2000 Problem must be charged against the current year's earnings,
- and cannot be amortized.
-
- However, a corporation that does not develop, in a timely manner, a
- complete compliance plan, will be a good target for shareholder suits
- against the officers and directors if failure in this regard results in
- a decrease in the value of the stock or company.
-
- Conclusion -
-
- Some companies are waiting for a "silver bullet" that will be developed
- which will simply and efficiently rectify the problem. However, the most
- optimistic predictions foresee the best technological developments
- providing at most a 30% savings in repair time and costs.
-
- The process of making systems Year 2000 compliant can be complex and
- fraught with unknown variables. A good agreement is necessary to
- successfully deal with the many issues involved. However, given that the
- end of the millennium is approaching fast, a prudent company will
- construct alternate plans if compliance is not achieved on time.
-
- ABOUT THE AUTHOR:
-
- Mr. Galkin can be reached for comments or questions
- about the topic discussed in this article as follows:
- E- MAIL: wgalkin@lawcircle.com
- WWW: http://www.lawcircle.com/galkin
- TELEPHONE: 410-356-8853/FAX:410-356-8804
- MAIL: 10451 Mill Run Circle, Suite 400
- Owings Mills, Maryland 21117.
-
- Mr. Galkin is an attorney in private practice.
- He is also the adjunct professor of Computer Law at the
- University of Maryland School of Law. He is a
- graduate of New York University School of Law
- and has concentrated his private practice on
- intellectual property, computer and technology law
- issues since 1986. He represents small startup,
- midsized and large companies, across the U.S. and
- internationally, dealing with a wide range of legal
- issues associated with computers and technology,
- such as developing, marketing and protecting
- software, purchasing and selling complex computer
- systems, launching and operating a variety of online
- business ventures, and trademark and copyright
- issues.
-
- ------------------------------
-
- Date: Sat, 21 Dec 1996 18:50:46 -0600 (CST)
- From: Crypt Newsletter <crypt@sun.soci.niu.edu>
- Subject: File 2--Jenott case: More gossip, so-called criminal hacker stuff
-
- The so-called criminal hacker
- =============================
-
- By December 17th, the U.S. Army's prosecution of Eric Jenott, "the Ft.
- Bragg hacker," was in full swing. Much of the testimony appeared aimed
- at proving Jenott to be a criminal hacker. However, a key witness
- turned out to be little more than a convicted thief attempting to
- curry favor for himself in return for helping to convict Jenott. Other
- testimony appeared to be standard circumstantial hacker hearsay attributed
- to the Ft. Bragg soldier. Very little of the court's unclassified
- proceedings convincingly portrayed Jenott as a potential spy for
- communist China.
-
- Raymond Chen, a former Marine, testified Jenott gave "the [Internet]
- address for the secretary of defense computer system" to him "before
- Jenott joined the Army." Chen accessed the system using this information,
- he said.
-
- According to Chen, Jenott confided that he had been hacking into Navy,
- Air Force and other DoD computers since 1994. He claimed that Jenott
- had admitted to deleting information from a Navy system.
-
- Chen, who is also in legal trouble from this case and a convicted
- thief stemming from a 1991 break-in at the University of Washington in
- which he stole a computer, claimed he has been granted immunity from
- prosecution in exchange for his testimony in the Jenott case. Chen was
- convicted of burglary and possession of stolen property in December 1992.
- His sentence was 60 days in jail and 30 days of community service.
-
- Chen testified that he had negotiated immunity with Army prosecutor
- Emmett Wells. According to the Fayetteville Observer, Chen said
- in court "Wells said if I can get Jenott convicted of espionage, he
- will get me out of my trouble in Washington state."
-
- Wells was removed from the case when he attempted to commit suicide
- by slashing a wrist a few days earlier.
-
- Army prosecutor Matthew Wilkov had Chen say "he understood that Wells
- was an Army prosecutor and had no direct control over the charges in
- Washington." However, Wilkov added "he had agreed to write a letter
- saying Chen had cooperated in an Army case."
-
- Testimony continued from Army employees who worked the Fort Bragg
- bulletin board system. Janet Warden said she had been monitoring
- posts by Jenott and undisclosed others on the board. It was
- about computer hacking, she said, and included references to S-MILS,
- a military acronym for secure military sites.
-
- Warden said she had been instructed to observe Jenott's conversations
- on the system.
-
- Logs from the Ft. Bragg BBS indicated Jenott sent "several" electronic
- messages to Qihang Liu at Oak Ridge, Tennessee. Liu did not reply.
-
- Another military intelligence investigator, Ronald E. Davis, said that
- he interviewed Jenott and that "I learned he passed the password . . ."
-
- Davis was asked twice by prosecution what he learned from Jenott. The
- second time he said he "learned [Jenott] committed espionage." Jenott's
- lawyer, Tim Dunn, immediately objected and Fred Arquilla sustained it.
-
- The court was then closed again for the purposes of secrecy during
- the rest of Davis' presentation and testimony from John F. Deasy, a
- soldier from the Land Information Warfare Activity at Fort Belvoir,
- Virginia.
-
- When the court was re-opened, Deasy said he had been asked to look
- "over a file about someone from Fort Bragg hacking into [a] University
- British Columbia computer." Deasy also said he was told the security
- of a "switching station" on the Army's Mobile Subscriber Network
- was breached.
-
- Ray Chen testified again, claiming he had learned in a chat group
- with Jenott's brother, Lance, and unnamed others that Jenott had
- "hacked" into a university of British Columbia computer.
-
- Other prosecution witnesses said they had followed Jenott's discussions
- on the Ft. Bragg BBS on the use of passwords of "professors and students"
- to hack into computers and the utilization of laptops and payphones to
- avoid being traced.
-
-
- Izzit secret?
- =============
-
- While the U.S. Army contended Eric Jenott gave a secret password
- for a secure cellular telephone network to Quihang Liu, the
- system's builder did not consider the password verboten until more
- than a full month after the Ft. Bragg hacker was charged with
- espionage.
-
- GTE developed the system and an employee, Steven Sullivan, testified
- at Jenott's court martial in another closed session, December 18th.
-
- The prosecution's Matthew Willkov maintained the password was classified.
- "If classified information is carried on the system, the password is
- secret" he said, according to the Fayetteville Observer.
-
- Jenott's defense disagreed.
-
- Judge Fred Arquilla said the password is classified, but only in the
- context of determining whether the court should be in closed session
- during testimony. He informed the jury that closing the court should
- not bear on its decision as to whether or not the password in
- contention was or is actually classified.
-
- Clear?
-
- Anyway, much later FBI agent Steven McFall -- who said he was suffering
- from a case of food poisoning -- testified that federal agents had seized
- an Army jacket and uniform with Jenott's name on it from the apartment of
- Quihang Liu.
-
-
- Suicide? Or not? In court gossip rules
- ========================================
-
- Jenott's counsel, Tim Dunn, said on Friday that he had checked
- out a tip "that a former prosecutor [Emmett Wells] in the case
- tried to kill himself because he was being pressured to alter
- documents."
-
- According to the Fayetteville Observer, Dunn said he had also talked
- to Wells and the rumor proved unsubstantiated.
-
- "He said it was not true, it was fascinating, but he had to go,"
- Dunn said. Wells is currently being treated at Walter Reed Army
- Medical Center after apparently trying to kill himself by slashing
- a wrist last Sunday.
-
- The Observer also reported the defense's effort to have some evidence
- declared inadmissible because the government has kept sloppy records
- on it. Judge Fred Arquilla denied Dunn's request but said he could
- introduce evidence pointing out the government's sloppiness.
-
- Kevin Nauer testified on computer data apparently seized from Jenott's
- hard disks or diskettes. It included words purported to be written by
- the Ft. Bragg hacker.
-
- According to Knauer and reported in the Observer, a poem credited to
- Jenott said "At least I'll have a tiny part in bringing this nation to
- its knees."
-
- According to prosecution testimony, Jenott is also claimed to have said
- he had "wiped out hundreds of computers at the Defense Information Systems
- Agency."
-
- Throughout most of the Jenott case, it has been impossible to distinguish
- whether much of the testimony is based on anything more substantive than
- weird hacker bragging, notes from the underground, hearsay or crazy gossip.
-
- Full text from the Fayetteville Observer: http://www.foto.com
-
-
- George Smith
- Crypt Newsletter
- http://www.soci.niu.edu/~crypt
-
- ------------------------------
-
- Date: Tue, 31 Dec 96 12:31 CST
- From: Jim Thomas <tk0jut1@mvs.cso.niu.edu>
- Subject: File 3--Soldier Innocent of Giving Secret Code to Chinese
-
- Copyright Chicago Tribune
- Monday, December 23, 1996
-
- SOLDIER INNOCENT OF GIVING SECRET CODE TO CHINESE
-
- A soldier accused of passing a secret computer code to a
- Chinese citizen was acquitted Sunday (Dec. 23) of espionage, the
- most serious charge at his court martial.
-
- But Pfc. Eric Jenott, 21, was convicted of damaging government
- property and computer fraud after closing arguments.
-
- Jenott, of Graham, Wash., was sentenced to three years in
- prison and ordered to forfeit all benefits.
-
- <snip>
-
- ------------------------------
-
- Date: Fri, 27 Dec 1996 13:20:01 -0600 (CST)
- From: Chip Rosenthal <chip@UNICOM.COM>
- Subject: File 4--Crack5: ANNOUNCE: Daily Telegraph Article (fwd)
-
- Just wanted to bring this news posting to your attention. The
- Telegraph appears to be on-line as <http://www.telegraph.co.uk/>.
- It might be worth checking the "Connected" section next week to
- see if something appears there.
-
- ------- start of forwarded message -------
- From--Alec Muffett <alecm@crypto.dircon.co.uk%antispam>
- Subject--Crack5--ANNOUNCE--Daily Telegraph Article
-
-
- I gather (from the journalist concerned) that next week's (tuesday?)
- Daily Telegraph Computing Section will carry an article regarding the
- release of Crack5, in which "most security experts" are "highly
- critical" of "gifted amateurs" (!) such as myself, who "irresponsibly"
- release software such as Crack, SATAN, COPS, etc, onto the net.
-
- I've chatted with the fellow quite extensively, and also gather that he
- was unable (in the midst of the christmas break) to find any "security experts"
- who could find a good word to say about Crack; undeterred, I've had a go at
- putting a positive spin on the matter, and can only but hope that between
- his hands and the final print that I don't wind up looking a villan
- - I suspect I shan't, but you never know...
-
- Regardless, I must admit that I look forward to the almost inevitable
- furore with some enthusiasm. 8-)
-
- Followups set to comp.security.unix.
-
- ------------------------------
-
- Date: Wed, 18 Dec 1996 01:54:46 -0500 (EST)
- From: "noah@enabled.com" <noah@enabled.com>
- Subject: File 5--BoS: Phrack 49 (fwd)
-
- From -Noah
-
- ---------- Forwarded message ----------
- Date--Fri, 8 Nov 1996 19:46:47 -0800 (PST)
- Subject--BoS--Phrack 49
-
- -----BEGIN PGP SIGNED MESSAGE-----
-
-
- The new issue of Phrack Magazine, the underground's *premier*
- computer security publication, is upon us all!!
-
-
-
- http://www.infonexus.com/~daemon9/phrack49.tgz
- ftp://ftp.infonexus.com/pub/Philes/Phrack/phrack49.tgz
- http://www.fc.net/~phrack
-
- or send email to the below address...
-
- An excerpt from Issue 49, P49-01:
-
-
- .oO Phrack 49 Oo.
-
- Volume Seven, Issue Forty-Nine
-
- 1 of 16
-
- Issue 49 Index
- ____________________
-
- P H R A C K 4 9
-
- November 08, 1996
- ____________________
-
-
- Welcome to the next generation of Phrack magazine. A kinder, gentler, Phrack.
- A seasoned, experienced Phrack. A tawdry, naughty Phrack. A corpulent,
- well-fed Phrack. Phrack for the whole family. Phrack for the kids, Phrack
- for the adults. Even Phrack for the those enjoying their golden years.
-
- If you thought 48 was a fluke, here is 49, RIGHT ON SCHEDULE. Full speed
- ahead, baby. We promised timely Phrack. We promised quality Phrack. Here
- are both in ONE CONVENIENT PACKAGE! We trimmed the fat to bring you the lean
- Phrack. Chock full of the healthy information you need in your diet. All
- natural. No artificial ingredients. No snake oil. No placebo effect.
- Phrack is full of everything you want, and nothing you don't.
-
- This issue is the first *official* offering from the new editorial staff. If
- you missed them, our prophiles can be found in issue 48. Speaking of 48,
- what a tumultuous situation article 13 caused. All that wacking SYN flooding.
- Well, it got the job done and my point across. It got vendors and programmers
- working to come up with work-around solutions to this age-old problem. Until
- recently, SYN-flooding was a skeleton in the closet of security professionals.
- It was akin the crazy uncle everyone has, who thinks he is Saint Jerome. We
- all knew it was there, but we ignored it and kinda hoped it would go away...
- Anyway, after this issue, I hope it *will* just go away. I have done
- interviews for several magazines about the attack and talked until I was blue
- in the face to masses of people. I think the word is out, the job is done.
- Enough *is* enough. " SYN_flooding=old_hat; ". Onto bigger and better things.
-
- A few more quick points (after all, you want Phrack Warez, not babbling
- daemon9). I want to thank the community for supporting me (and co.) thus far.
- Countless people have been quite supportive of the Guild, the Infonexus, and
- of Phrack. Time and work do permit me to get back to all of you individually,
- so just a quick blurb here. Thank you all. I will be using Phrack as a tool
- to give back to you, so please mail me (or any of the editors with your
- suggestions). This is *your* magazine. I just work here.
-
- Most of all, I am stoked to be here. I am giving this my all. I'm fresh, I'm
- ready... I'm hyped + I'm amped (most of my heros don't appear on no stamps..).
-
- Drop us a line on what you think of 49. Comments are encouraged.
-
-
- Bottom line (and you *can* quote me on this): Phrack is BACK.
-
- - daemon9
-
- [ And remember: r00t may own you, but the Guild loves you ]
- [ TNO, on the other hand, doesn't even fucking care you exist ]
-
- - ---------------------------------------------------------------------------
-
-
- Enjoy the magazine. It is for and by the hacking community. Period.
-
-
- Editors : daemon9, Datastream Cowboy, Voyager
- Mailboy : Erik Bloodaxe
- Elite : Nirva (*trust* me on this one)
- Raided : X (investigated, no charges as of yet)
- Hair Technique : Mycroft, Aleph1
- Tired : TCP SYN flooding
- Wired : Not copping silly slogans from played-out, vertigo
- inducing magazines.
- Pissed off: ludichrist
- Pissed on: ip
- News : DisordeR
- Thanks : Alhambra, Halflife, Snocrash, Mythrandir, Nihil, jenf,
- xanax, kamee, t3, sirsyko, mudge.
- Shout Outs : Major, Cavalier, Presence, A-Flat, Colonel Mustard,
- Bogus Technician, Merc, Invalid, b_, oof, BioHazard,
- Grave45, NeTTwerk, Panzer, The Bishop, TeleMonster,
- Ph0n-E, loadammo, h0trod.
-
- Phrack Magazine V. 7, #49, November 08, 1996.
- Contents Copyright (c) 1996 Phrack Magazine. All Rights Reserved.
- Nothing may be reproduced in whole or in part without written
- permission from the editors. Phrack Magazine is made available
- quarterly to the public free of charge. Go nuts people.
- Subscription requests, articles, comments, whatever should be directed to:
-
- phrackedit@infonexus.com
-
- Submissions to the above email address may be encrypted
- with the following key (note this is a NEW key):
-
- - -----BEGIN PGP PUBLIC KEY BLOCK-----
- Version: 2.6.2
-
- mQENAzJuWJgAAAEH/2auap+FzX1AZOsQRPWRrRSOai2ZokfVpWWJI8DRuSpX9l7w
- 5qWHrZdL/RweA4lgwAmcrAOD6d8+AzZfXEhkKi92G9ZNy2cjsb5g7oamkcPmC03h
- pdhRe5rHXDWUtXDEhHlkV0WvkLXrhFijW2VdJ2UDFyFd8q0nBSIz+JTGneNO0w4q
- aowCx3gZpEb4hkEU1LFoJXywZhnBg06jSxD9exbBF2WKeealqTlntlcsMmeJ3OdS
- 9fqnGI19BWirqkIJYtNXdzP4M2usOEvikrdhXwSbCNcDGcY6pyKco2rKbBUj5V2I
- 8/2L0TSGSaRBZ/YKRplwycldy63UVVTLMNGQCCUABRG0KlBocmFjayBNYWdhemlu
- ZSA8cGhyYWNrZWRpdEBpbmZvbmV4dXMuY29tPg==
- =eHJS
- - -----END PGP PUBLIC KEY BLOCK-----
-
- ENCRYPTED SUBSCRIPTION REQUESTS WILL BE IGNORED
-
- Phrack goes out plaintext... You certainly can subscribe in plaintext
-
-
- .oO Phrack 49 Oo.
- -------------------------------------
- Table Of Contents
-
- 1. Introduction 7 K
- 2. Phrack loopback 6 K
- 3. Line Noise 65 K
- 4. Phrack Prophile on Mudge by Phrack Staff 8 K
- 5. Introduction to Telephony and PBX systems by Cavalier 100K
- 6. Project Loki: ICMP Tunneling by daemon9/alhambra 10 K
- 7. Project Hades: TCP weaknesses by daemon9 38 K
- 8. Introduction to CGI and CGI vulnerabilities by G. Gilliss 12 K
- 9. Content-Blind Cancelbot by Dr. Dimitri Vulis 40 K
- 10. A Steganography Improvement Proposal by cjm1 6 K
- 11. South Western Bell Lineman Work Codes by Icon 18 K
- 12. Introduction to the FedLine software system by Parmaster 19 K
- 13. Telephone Company Customer Applications by Voyager 38 K
- 14. Smashing The Stack For Fun And Profit by Aleph1 66 K
- 15. TCP port Stealth Scanning by Uriel 32 K
- 16. Phrack World News by Disorder 109K
-
- 575k
- -------------------------------------
-
- "...There's MORE than maybes..."
-
- - Tom Regean (Gabriel Bryne) "Miller's Crossing"
- [ Obviously referring to the blatent truism that Phrack IS back ]
-
- "...Fuckin' Cops..."
-
- - Verbal Kint/Keyser Soze (Kevin Spacey) "The Usual Suspects"
- [ Not sure what was meant by that.. ]
-
- "Got more funky styles than my Laserjet got fonts"
- - 311/Grassroots "Omaha Stylee"
- [ That would be referring to us, of course ]
-
- EOF
-
-
- - --
- [ route@infonexus.com ] Editor, Phrack Magazine / Member, Guild Corporation
-
- ...check out the nametag.. you're in MY world now grandma...
-
- -----BEGIN PGP SIGNATURE-----
- Version: 2.6.2
-
- iQCVAwUBMoP+pgtXkSokWGapAQFpqgQAgDEjwg7Q9TDbTQHzECneOc4FHK4QNAkb
- pynBsLq21gzhzzGDxLDveKv4lEJBPxqGnE1Fex3hnqdsL46oXMjRECRHkmP8Lhqx
- +P1N7Xa+q50NKkvuh2vZFdTN3Jgihwf5AF+5ngrlVbeV945BCJ1K9mr4GAUGccQD
- KoAKHrOPKIw=
- =deJO
- -----END PGP SIGNATURE-----
-
- ------------------------------
-
- Date: Thu, 15 Dec 1996 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 6--Cu Digest Header Info (unchanged since 13 Dec, 1996)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #9.01
- ************************************
-
-
-