home *** CD-ROM | disk | FTP | other *** search
- ==Phrack Inc.==
-
- Volume Two, Issue 21, File 10 of 11
-
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
- PWN The Legacy... ...Lives On PWN
- PWN Phrack World News PWN
- PWN Issue XXI/1 PWN
- PWN PWN
- PWN Created by Knight Lightning PWN
- PWN PWN
- PWN Written and Edited by PWN
- PWN Knight Lightning and Epsilon PWN
- PWN PWN
- PWN The Future... ...Is Forever PWN
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
-
-
- On The Edge Of Forever November 4, 1988
- ~~~~~~~~~~~~~~~~~~~~~~
- Greetings and welcome to Phrack World News Issue XXI! As most of you have
- realized, Taran King and I are back to stay and the tradition of Phrack Inc.
- lives on. November 17, 1988 marks the Three Year Anniversary of Phrack Inc.
- and we have never been prouder of our efforts to bring you the best magazine
- possible.
-
- However, we can not do it alone. Both Taran King and I have been reduced to
- completely legal status and can not afford the luxury of calling bulletin
- boards or contacting all the people we would like too.
-
- Epsilon has been helping us a lot by acting as the collection agency for many
- of the files for Phrack and several news articles as well. Please, if you have
- a file for Phrack Inc. or an article for PWN contact him or leave mail for The
- Mentor. And speaking of The Mentor, The Phoenix Project has a new number;
- (512) 441-3088. Be sure to give it a call.
-
- The article about Pacific Bell in this issue may contain some information that
- has been seen before. Regardless of that, PWN is a place where such
- information can be indexed for later reference and helps keep important events
- and happenings in a certain continuity which is beneficial to everyone.
-
- This issue of Phrack features the Second Special Presentation of Phrack World
- News, which contains the abridged edition of the WGN Radio Show that dealt with
- computer hackers and features John Maxfield.
-
- With regard to the file about Teleconnect Long Distance. Hatchet Molly says
- that now Teleconnect "flags" suspect bulletin boards and if a Teleconnect
- calling card is used to call one, the card number is cancelled and a new card
- is mailed to the customer within three days. What a wonderful company policy
- that is.
-
- For the months ahead, I am working on a file about hackers abroad, mostly
- focusing on the Chaos Computer Club, which I have begun to have strong
- relations with, and some other hacker instances in Europe and other parts of
- the world.
-
- Scheduled for January/February is a file series on the Wide Area Networks;
- Bitnet and quite possibly ARPAnet, MILInet, NSFnet, IBM's VNET, CCnet, UUCP,
- CSnet, SPAN, JANet, JUNet, and the list goes on. The main emphasis will be on
- Bitnet though with secondary emphasis on UUCP and the other networks.
-
- Hope you enjoy this issue and remember... "The Future Is Forever"
-
- :Knight Lightning
- _______________________________________________________________________________
-
- Pacific Bell Means Business October 6, 1988
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~
- The following information originally appeared in WORM Newsletter, a publication
- produced and distributed by Sir Francis Drake. The series of memos presented
- here are shown to enable the members of today's hacking community to fully
- understand the forces at work that seek to bring them down. The memo(s) have
- been edited for this presentation. -KL
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- Copy For: Roland Donaldson August 3, 1987
- Subject: Unauthorized Remote Computer Access
-
- San Francisco, July 29, 1987
- Case Nos.: 86-883, 87-497
-
- T. M. CASSANI, Director-Electronic Operations:
-
- Electronic Operations recently investigated two cases involving a number of
- sophisticated hackers who were adept at illegally compromising public and
- private sector computers. Included among the victims of these hackers was
- Pacific Bell, as well as other local exchange carriers and long distance
- providers.
-
- Below is a synopsis of the two cases (87-497 and 86-883), each of which
- demonstrate weaknesses in Pacific Bell's remote access dial-up systems.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Case No. 87-497
- ---------------
- On May 14, 1987, Electronic Operations received a court order directing Pacific
- Bell to place traps on the telephone numbers assigned to a company known as
- "Santa Cruz Operations." The court order was issued in order to identify the
- telephone number being used by an individual who was illegally entering Santa
- Cruz Operations' computer and stealing information.
-
- On May 28, 1987, a telephone number was identified five separate times making
- illegal entry into Santa Cruz Operations' computer. The originating telephone
- number was 805-PRE-SUFF, which is listed to Jane Doe, 8731 W. Cresthill Drive,
- Apt. 404, Thousand Oaks, California.
-
- On June 3, 1987, a search warrant was served at 8731 W. Cresthill Drive, Apt
- 404, Thousand Oaks, California. The residents of the apartment, who were not
- at home, were identified as Jane Doe, a programmer for General Telephone, and
- Kevin Hacker, a known computer hacker. Found inside the apartment were three
- computers, numerous floppy disks and a number of General Telephone computer
- manuals.
-
- Kevin Hacker was arrested several years ago for hacking Pacific Bell, UCLA and
- Hughes Aircraft Company computers. Hacker was a minor at the time of his
- arrest. Kevin Hacker was recently arrested for compromising the data base of
- Santa Cruz Operations.
-
- The floppy disks that were seized pursuant to the search warrant revealed
- Mitnick's involvment in compromising the Pacific Bell UNIX operation systems
- and other data bases. The disks documented the following:
-
- o Hacker's compromise of all Southern California SCC/ESAC computers. On
- file were the names, log-ins, passwords, and home telephone numbers for
- Northern and Southern ESAC employees.
-
- o The dial-up numbers and circuit identification documents for SCC computers
- and Data Kits.
-
- o The commands for testing and seizing trunk testing lines and channels.
-
- o The commands and log-ins for COSMOS wire centers for Northern and Southern
- California.
-
- o The commands for line monitoring and the seizure of dial tone.
-
- o References to the impersonation of Southern California Security Agents and
- ESAC employees to obtain information.
-
- o The commands for placing terminating and originating traps.
-
- o The addresses of Pacific Bell locations and the Electronic Door Lock
- access codes for the following Southern California central offices ELSG12,
- LSAN06, LSAN12, LSAN15, LSAN23, LSAN56, AVLN11, HLWD01, HWTH01, IGWD01,
- LOMT11, AND SNPD01.
-
- o Inter-company Electronic Mail detailing new login/password procedures and
- safeguards.
-
- o The work sheet of an UNIX encryption reader hacker file. If successful,
- this program could break into any UNIX system at will.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Case No. 86-883
- ---------------
- On November 14, 1986, Electronic Operations received a search warrant directing
- Pacific Bell to trap calls being made to the Stanford University computer. The
- Stanford Computer was being illegally accessed and was then being used to
- access other large computer systems throughout the country.
-
- The calls to the Stanford Computer were routed through several different common
- carriers and through numerous states. Through a combination of traps, traces
- and sifting through information posted on the Stanford computer, several
- suspects were identified throughout the United States.
-
- The group of computer hackers who illegally accessed the Stanford computer
- system were known as "The Legion of Doom." Subsequent investigation indicated
- that the Legion of Doom was responsible for:
-
- o The use of Stanford University high-speed mainframes to attack and hack
- ESAC/SCC mini compuuters with an UNIX password hacker file. Password
- files were then stored on the Stanford systems for other members of the
- Legion of Doom to use. Login and passwords for every local exchange
- carrier as well as AT&T SCC/ESAC mini computers were on file.
-
- o The Legion of Doom used the Stanford computers to enter and attack other
- institutions and private contractors' computers. Some of the contractors'
- computers were used for national defense research.
-
- On July 21, 1987, eight search warrants were served in three states at homes
- where members of the Legion of Doom reside. Three of the searches were
- conducted in California. Steve Dougherty, Senior Investigator-Electronic
- Operations, accompanied Secret Service agents at the service of a search
- warrant at 2605 Trousdale Drive, Burlingame, California, which was the
- residence of Stan QUEST, a sixteen-year-old member of the Legion of Doom.
- (Correction - Oryan QUEST has never been a member of the Legion Of Doom. -KL)
-
- Dougherty interviewed QUEST, who had used the pseudonym "O'Ryan Quest," (Oryan
- QUEST) when accessing computers. During the interview, QUEST admitted the
- following:
-
- o The entering of central offices, (Burlingame, San Mateo, San Bruno,
- Millbrae) disguised as a Federal Express deliveryman. The entries were
- done to case out the CO's for the purpose of finding computer terminals
- with telephones, the locations of switches and bays, the names of
- Comtechs, and materials related to the operations of the central office.
- QUEST also claimed to have been in the AT&T Administration office on
- Folsom Street, San Francisco.
-
- o QUEST's telephone service had been disconnected twice for nonpayment, and
- twice he had his service restored by impersonating a service
- representative.
-
- o Learning to test circuits and trunks with his computer by using ROTL and
- CAROT test procedures.
-
- o Members of the Legion of Doom often accessed test trunks to monitor each
- other's lines for fun.
-
- o On several occasions QUEST would post the telephone number of a public
- coin phone for access to his BBS, Digital IDS. He would then access teh
- Millbrae COSMOS wire center and add call forwarding to the coin phone. He
- would activate the call forwarding to his home telephone number, securing
- the identity of his location.
-
- o QUEST would impersonate an employee who had authorization to use a Data
- Kit and have it turned on for him. When he was done, he would call back
- and have the Data Kit turned off.
-
- o QUEST also would use his knowledge to disconnect and busyout the telephone
- services of individuals he did not like. Further, he would add several
- custom calling features to their lines to create larger bills.
-
- o It was very easy to use the test trunks with his computer to seize another
- person's dial tone and make calls appear on their bills. QUEST did not
- admit charging 976 calls to anyone, but he knew of others who did.
-
- o When the Legion of Doom attacked a computer system, they gave themselves
- five minutes to complete the hacking. If they were not successful in five
- minutes, they would attempt another system. The Legion of Doom was able
- to crack a computer in under five minutes approximately 90% of the time.
-
- o QUEST would impersonate employees to get non-published telephone listings.
- QUEST received the non-published listing for Apple Computer Founder, Steve
- Wozniak, and members of The Beastie Boys rock group.
-
- o QUEST told Dougherty of one New York member of the Legion of Doom, "Bill
- from Arnoc," (Bill From RNOC) who has been placing his own traps in New
- York. Bill from Arnoc (Bill From RNOC) helped QUEST place traps in
- Pacific Bell.
-
- (Gee Stan, you forgot to admit sneaking over the border. -KL)
-
- The review of the evidence seized at QUEST's residence tends to corroborate all
- QUEST's statements.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Conclusions
- -----------
- There are some important conclusions that can be drawn from the above two cases
- regarding future computer system concerns.
-
- o The number of individuals capable of entering Pacific Bell operating
- systems is growing.
-
- o Computer Hackers are becoming more sophisticated in their attacks.
-
- o Dial-up ports will always be a target for computer entry by a hacker.
-
- o Even dial-up ports with remote callbacks and manually controlled modems
- can be compromised.
-
- o A hacker can place a central office off-line by overloading a SCC mini
- computer by improperly placing traps or by putting traps on several DID
- multi-trunk groups such as MCI or Sprint groups.
-
- o Terrorist or Organized Crime organizations could use this underground
- computer technology against Pacific Bell or to their own advantage.
-
- o Pacific Bell proprietary data bases such as PTT ESAC or PB2 ESAC could be
- compromised.
-
- o The integrity of accurate customer billing statements have been
- compromised through access to the CEBS (Computerized Electronic Billing
- System) and will remain questionable. A customer can dispute large
- direct-dialed calls and claim his telephone was accessed by a computer
- hacker.
- - - -
- o Oryan QUEST has a really BIG mouth and would dick over anyone and everyone
- to overcome his inferiority complex from being an illegal alien without a
- green card. Outside of the Dan The Operator/Maxfield incident, I have
- never seen such a mass admission of guilt. To make matters worse, QUEST
- probably made up most of the incidents to make himself sound like a really
- big time hacker.
- - - -
- Recommendations
- ---------------
- The information gained as a result of the above investigations should be shared
- with those individuals responsible for the integrity of our computer systems.
- Further, an ongoing business partnership between security and the individuals
- responsible for the integrity of our computer systems should be initiated and
- maintained to ensure prompt, effective resolution of future computer related
- security issues.
-
- JOHN E. VENN
- Manager-Electronic Operations
-
-
- Special Thanks To Sir Francis Drake
- _______________________________________________________________________________
-
- He's Really Just Out Of Control PostCon'88
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- "I would SHRED everything, because
- we get so much information
- out of the dumpster,
- it's UNREAL..."
-
- -- Control C
-
- Over the last few months there has been a lot of controversy about the
- mysterious cricumstances regarding Michigan Bell and Control C. To set the
- record straight, ^C gave me the full details of what happened so I could pass
- it on to you.
-
- Just prior to leaving Chicago, where ^C had been going to school, he had
- illegally accessed an AOL system belonging to Michigan Bell. The system
- operator broke in on him and ^C tried unsuccessfully to pass himself off as a
- legitimate user. When this did not work, he hung up and did not give it a
- second thought. Upon returning home to Detroit, he had a message waiting for
- him to contact the sysop of the AOL system. He calling him and they,
- accompanied by Michigan Bell security, went out to lunch. To avoid being
- prosecuted, Control C had to give up all of the information he had on that
- system and explain how he had gotten in. Since he had cooperated, they let him
- go without further hassle. Unfortunately, Control C was soon busted again for
- breaking into his Central Office, but this time he was not going to get off so
- easily. He had to agree to making a talk show movie and a poster (quoted in
- the beginning of the article) for Michigan Bell. Both of these items have been
- distributed across the country to better illustrate the hacker mind-set and as
- a reminder to destroy important documents that were being thrown away.
-
- While being interrogated by Michigan Bell security department, Control C was
- shown a list of recently busted hackers from the July 21, 1987 sweep of the
- country. On this list was Sir Francis Drake, which is how the rumor about SFD
- being busted last year got started. However, what Control C and Michigan Bell
- did not know was that when Mark Gerardo was apprehended last year, he was
- believed to be SFD and as such was entered in their files incorrectly.
-
- Information Provided by Control C
-
- With a little help figuring out the SFD mixup from me and Taran King
-
- :Knight Lightning
- _______________________________________________________________________________
-
- North Dakota Nightmare September 10, 1988
- ~~~~~~~~~~~~~~~~~~~~~~
- "For Kracking Crue's Docs Avage The Game Is Over"
-
- In March of 1987, the North Dakota members of Kracking Crue (Docs Avage and
- SpyroGyra (also known as Ractor)) found a local extender and were able to hack
- out a code. They both lived on campus at North Dakota State University and
- were able to abuse the code without the worry of being caught because of the
- campus's Dimension phone system giving them a high degree of anonymity.
-
- They used this code for the entire rest of the school year and nothing had
- happened to prevent them from abusing it. Because of this lack of security, DA
- and SG began to believe that the code would be safe for them to use anywhere.
- The school year ended and the members of the Crue went home. Eventually the
- Crue discovered a 1-800 number for the long distance service they had been
- abusing and began to use it once again. However, they were soon to discover
- that they were not half as safe as they thought.
-
- The LD company had indeed been watching that code, but could not do anything to
- catch the Crue because of the Dimension system on NDSU campus. Docs Avage
- started to use the code from his apartment to call SpyroGyra and a few other
- people and the company got his line tapped and kept a record of where all his
- calls went to.
-
- In Docs Avage's own words;
-
- "On July 27th, 1988, I arrived back at my apartment after spending a
- weekend with my parents at their home. I found it rather interesting to
- discover three extra cars in the parking lot, one of which was a Dodge
- Diplomat.
-
- I walked into my apartment and discover two police detectives, two phone
- officials, and two "computer experts" blissfully dismantling my Apple and
- all my peripherals. One of my roommates was handcuffed and seated in a
- chair and my other roommate was kept closely watched as he was sitting in
- the kitchen. I was asked who I was, and read my rights. I agreed to
- cooperate. I was busted on a dialup.
-
- The dialup being the one I had hacked out several months before, and
- gotten quite greedy with it (ok, I overabused the darn thing). In my
- apartment, I placed around a $1000 worth of calls with it. I had made
- calls with it before, but not to that extent.
-
- I remained very cooperative, and talked to several phone security
- representatives, including those from AT&T and U.S. Sprint (I had a
- printout of 4 Sprint Codes, never had used them, just had them). The
- phone security people are experts at adverse psychology, and I can
- successfully say that they did a very good job of scaring me.
- Nevertheless, I knew that they were trying to play with my brain, so it
- wasn't as bad as it could have been.
-
- My roommate had been charged with the same offense as myself, Class C
- Felony Theft of Services (max 5 years/$5000). However, the only thing he
- contributed to the whole matter was the fact that the telephone account
- was in his name. The charges were dropped against him.
-
- After almost two months of waiting, the sentence date came. I plead
- guilty, playing on a deal that my lawyer had made with the state's
- attorney. The sentence included restitution (which hasn't been determined
- yet). The phone company is desparately trying to stick me with a large
- bill, for services that cannot be proven that I had anything to do with; a
- bill that could stretch up to $5000 (like hell if I'm paying that much),
- and a very nice little clause called Deferment of Imposition. Basically,
- I remain on probation until I pay back the restitution, at that time I can
- go through hearings and prove that I haven't been involved in such
- activities as for what I was convicted and the charges will not be placed
- on my record. For the time being however, it's turning out to be monthly
- payments with supervised probation. Needless to say, I, Docs Avage is
- retired, at least as as retired as someone in my position can get."
-
- Docs said that he had been looking to retire for some time and that this
- incident was the final straw. He also added that he was questioned about
- Jester Sluggo, Phrack Inc., and the Legion of Doom. He did not know anything.
-
- Information Provided by Docs Avage and SpyroGyra
- _______________________________________________________________________________
-