home *** CD-ROM | disk | FTP | other *** search
-
- ==Phrack Inc.==
-
- Volume Three, Issue 29, File #5 of 12
-
- [-][-] [-][-] [-][-] [-][-] [-][-] [-][-] [-][-]
- [-] [-]
- [-] Covert Paths [-]
- [-] [-]
- [-] by [-]
- [-] [-]
- [-] Cyber Neuron Limited and Synthecide [-]
- [-] [-]
- [-] November 1, 1989 [-]
- [-] [-]
- [-][-] [-][-] [-][-] [-][-] [-][-] [-][-] [-][-]
-
-
- When cracking a system, it is important for you to use a path to the system
- that will not lead the authorities to your door step.
-
- There are several methods for doing this and all of them will depend on your
- destination, available time, goal and the phase of the moon. This article
- deals mostly with cover attacks via a connected network.
-
- If attacking via a phone link:
-
- o Tap in to your local payphone line and red box or "sprint" the call.
-
- o Using a long haul service (like Sprint or MCI) to dial into systems in
- remote cities. [This should hinder a track by a good order of
- magnitude.]
-
- o Use a midnight packet switching network (eg: PC-Pursuit, Tymnet, et. al.)
-
- o All the above.
-
-
- If attacking from a network (eg: the Internet) there are ways of spoofing the
- packet headers, but this requires superuser privileges on the system you are
- attacking from and a fair amount of 'C' programming expertise. Therefore, this
- will not be discussed here in any more detail.
-
- Another obvious trick is to use network routers and gateways along with guest
- accounts to "route" your data path. This will cause the person tracking you to
- have to go though more red tape and hassle to track you. This gives you more
- time to cover your tracks.
-
- Some useful paths I know of are:
-
- accuvax.nwu.edu
- cory.berkeley.edu
- violet.berkeley.edu
- headcrash.berkeley.edu
-
-
- host: violet.berkeley.edu host: headcrash.berkeley.edu
- account: nobody account: netgate
- net address:128.32.136.22 net address: 128.32.234.31
-
-
- host: cory.berkeley.edu host accuvax.nwu.edu
- account: terminal account: telnet
- net address: 128.32.134.6 net address: 129.105.49.1
-
-
- host: lightning.berkeley.edu host: score.stanford.edu
- port: 8033 account: guest
- net address: 128.32.234.10 net address: 36.8.0.46
-
-
- The accounts nobody, netgate, and terminal at Berkeley are accounts that were
- installed so that people can use the system to rlogin or telnet to an account
- elsewhere without a local login (or so I am told by the local hackers [Hi
- Audrey...]). The lightning path/method can be accessed by the command:
- "telnet lightning.berkeley.edu 8033".
-
- I am interested in hearing about other Internet access accounts that are
- available out there. If you know of any please send them in.
-
- Tymnet is also a useful method of gaining access to systems. From Tymnet, you
- can hook up to just about any computer and use the other methods to go one step
- further. It's not until you are traced back to the computer you linked to from
- Tymnet that they can even begin to follow you back. My understanding is that
- for a systen to find your Tymnet node, they must contact Tymnet personally and
- ask them to put a trap on their connection.
-
- For more infomation concerning Tymnet see the article "Hacking & Tymnet" by
- Synthecide in Phrack Inc. Newsletter Issue XXX.
- _______________________________________________________________________________
-
-
-
-
-
-