home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 53.3 KB | 1,238 lines |
- ==Phrack Magazine==
-
- Volume Seven, Issue Forty-Eight, File 2 of 18
-
- Phrack Loopback
-
- -----------------------------------------------------------------------------
-
- This is a response to the letter from KoV included in "Line Noise
- Part I" from Phrack #47. After reading this open letter, I nearly died of
- laughter. The inaccuracies of KoV's story were numerous and comical.
- However, from the way KoV presented themselves, they are acting as if
- it was their BBS network and a government conspiracy that has gotten
- them into trouble. As a result, they will appear to many as a
- wrongfully persecuted group of computer users.
-
- Apparently, KoV likes to fancy themselves as a group that
- spread "open-minded" and "sociopolitical" beliefs through their BBS
- network, KoVNet. They claim that they "questioned [the] authority" of
- those who "tried to oppress [their] free-thinking minds." They then
- state that this caused the "AmeriKKKan" government to monitor their
- actions, "stalk [them] in public places", and and attempt to destroy
- them "from the moment of KoV's conception."
-
- This is ridiculous. First off, their BBS network was not
- enough to cause the government to stalk them in public. If a BBS
- network that contains disdain for the American government justifies
- the stalking of its users, then NUMEROUS people in this country are
- currently being followed in public. Therefore, KoV's claim about
- their threatening BBS network is an attempt to make
- themselves look bigger and more important than they were.
-
- Now, let us look at the real reason they are facing legal
- actions. KoV is blaming "false accusations from a local university"
- for their troubles. However, the accusations are not false and
- after you read what led them to be caught, you will reallize that KoV
- was never a threat to the government.
-
- I do not know exactly how many universities they hacked.
- However, if it is one local university as they claim, it is Skidmore
- in Saratoga Springs NY, the university which I attend. I myself have played
- around with Skidmore's computers and do not feel any loyalty or
- patriotism to my school. Therefore, it is not a grudge I am harboring
- against KoV for hacking Skidmore's system that is causing me to write
- this. It is merely the fact that KoV is distorting the truth in an
- attempt to turn themselves into martyrs.
-
- Personally, I cannot blame anyone for breaking into Skidmore's
- system. Since Skidmore was relatively new to the Internet, their
- security was very lax making it very easy to explore and play around
- with the system. If KoV had any knowledge whatsoever, they would not have
- been caught or even detected by Skidmore. It was their egos and lack
- of knowledge that led to their investigation. I myself saw with my
- own eyes how they were detected.
-
- The system that was hacked by KoV was wopr.skidmore.edu.
- Well, one day I took a look at the system logs for WOPR and saw "root
- login from [some out of domain ip address]" standing out quite well.
- If KoV was really so Knowledgable and dangerous, wouldn't they know how to
- edit system logs? However, they did not which shows KoV is another
- example of people who managed to obtain root access and did not know
- what to do with it.
-
- Some people would think, "Big deal! Just because they didn't
- edit the system logs does not mean that they could ever be linked to
- the crime." This is very true. However, this would have required KoV
- to keep their mouths shut about the incident. Yet, they did not.
- Apparently, Lord Valgamon made a post to some of the BBS networks he
- frequented where he showed off about hacking Skidmore and told
- everyone how he did it.
-
- This hurt KoV greatly. As a result, a narc on the BBS network
- alerted CERT about Lord Valgamon's claims who, in turn, reported the
- incident to Skidmore. This caused Skidmore to now have a name, though
- anonymous, to apply to the break in. Consequently, the proper
- authorities became involved and they began to track down Lord Valgamon
- on the BBS networks.
-
- From the above facts, you can probably guess that the
- "AmeriKKKan" government would never have a special interest in KoV
- because they are the typical stereotype of an "ELiTE M0DeM d00d." If
- Lord Valgamon and KoV had kept their mouths shut about the incident,
- they never would have been caught. However, KoV needed to tell their
- ELiTE BBS scene how bad-ass they were and, as a result, their
- bad-asses are getting spanked hard.
-
- KoV had not done any crime or brought up any controversy
- against the government. Their only crime was that they were stupid.
- I understand that KoV is now asking for the support of the h/p and
- political groups in the scene. However, I would not recomend anyone
- to give them support. There was no government conspiracy against KoV
- and everything that has happened to them was brought on by their own
- stupidity. Do not turn a bunch of egotistical and immature criminals
- into martyrs. I will end this with the same words KoV started their
- letter with: "Don't believe the hype." - Public Enemy.
-
- Sincerely,
- Mr. Sandman
-
- [ Wow. Well, we always like to hear all sides to any story, and each
- time something gets published that gets under someone else's skin, we
- inevitably do. Thanks for writing! ]
-
-
- -----------------------------------------------------------------------------
-
- Hello!
-
- Let me tell some words about myself. Computers and
- telecommunications take quite important place in my life. In
- past I worked as a programmer, system administrator and finally
- I ran my own business selling computer hardware (now I have
- closed this business because I have lost my interest for trade
- and due to some financial reasons). I owned my own BBS for
- several years but now I have it shut down because I do not want
- support lamers leeching files 2-3 years old and having no ideas
- what email is. Now almost every day I spent many hours reading
- Internet newsgroups, mainly dedicated to phreaking/hacking.
-
- A friend of mine, gave me some Phrack issues (newest was #42 of 1993).
- I have read them and like them very much.
-
- If it is possible, please drop me a line how could I subscribe
- to Phrack magazine. If you do, please encrypt your reply and
- send it via anonymous remailer, because now Russian government
- begun to control email messages very thoroughtly.
-
- I have private information from friend Internet provider about
- the FAPSI (Federal Agency of Government Communications and
- Information -- some form of Russian NSA/FCC hybrid formed from
- ex-KGB agents) actions aimed to control data passed through
- Internet channels in Russia. FAPSI ordered all Internet
- providers in St.Petersburg to install software which task will
- be to copy all messages addressed to/from persons which FAPSI
- interested in and to scan for some keywords specified by FAPSI.
-
- Providers will get their licences for providing communication
- service only after installing such spy software. There is a
- rumour that FAPSI has installed hidden microphones (bugs) in
- providers' offices to control any "illegal" activity (free
- information exchange always was illegal in USSR/Russia). I say
- "rumour" because I have heared it only from one trusted source,
- other information came from several trusted sources
- simultaneously.
-
- BTW, using a PGP is illegal in Russia too, because FAPSI can not
- break the PGP-encrypted messages.
-
- If you find information written above meaningful, you may use it
- in your own discretion but with some precautions -- remember
- that country I live in have barbaric laws and Russian
- Police/Security Services have _absolute_ power to put in jail
- anyone they want without any court or warrant.
-
- [ Normally I strip out all anonymous remailers, because they
- interfere with the bulk mailing process, bounce mail, and generally
- screw things up...however, there are always exceptions.
-
- The FAPSI requirements are extremely interesting to hear about. It
- certainly makes sense, and I fear that our country is likewise heading
- towards that goal.
-
- If you get the chance, you ought to write more about being a hacker
- in your country, since I am sure the rest of the world would be
- fascinated by it. ]
-
- -----------------------------------------------------------------------------
-
- Greetings...
-
- I looking for just a nibble of information...
-
- When one logs into a remote system and gets login and passwords questions
- how does one write a program to crack a password...
-
- I'm sure that is not an easy question or even a nibble perhaps a byte...
-
- Seeking Info,
- SPY
-
- [ Well, I can't tell you how to write a program to crack passwords
- without knowing what kind of system you want to crack passwords for.
-
- I can't tell you how to say "Where is the bathroom" in a foreign
- language without first knowing what language you want to say it in.
-
- If you are talking about UNIX passwords, there are already numerous
- programs written to "crack" passwords. I would suggest you go poke around
- and look for programs like "crack" or "killer cracker." If you
- can't find reference to either of these on the net, then you really
- ought to consider finding a new hobby. ]
-
- -----------------------------------------------------------------------------
-
- Wuzup! I have a pager that I don't use anymore because I can't afford the
- bill. So I was wondering if there is anyway I can hook-up my pager for free
- without going through a paging service.
-
- [ Depending upon the pager, you can possibly change or add capcodes through
- special programming software. Almost all Motorola pagers allow you to do
- this.
-
- This won't allow you to "really" get free service, but you can piggy back
- on top of some known person's pager service (or just intercept their pages.)
-
- The only way to get "free" service is to reactivate the pager's current
- capcode in the paging system from the local provider who owns the frequency
- the pager is crystaled for. ]
-
- -----------------------------------------------------------------------------
-
- I was browsing through Issue 47, and saw something that had caught
- my eye.
-
-
- ""THE HACKER WAR -- LOD vs MOD"
-
- This t-shirt chronicles the infamous "Hacker War" between rival
- groups The Legion of Doom and The Masters of Destruction. The front
- of the shirt displays a flight map of the various battle-sites
- hit by MOD and tracked by LOD. The back of the shirt
- has a detailed timeline of the key dates in the conflict, and
- a rather ironic quote from an MOD member."
-
- A few weeks ago, I read the book Masters of Deception, a book about
- the "war". Wasn't the name of the rival group Masters of Deception?
- I assume that Erik would know, he appeared to be the main "villain" in
- this version of the story. Any response would be appreciated.
-
-
- [ I was the villain? Well corn my pone.
-
- In any case, you should always take everything you read with a grain of
- salt. In my opinion, the book was a piece of shit. Since many of the
- MOD members decided to viciously attack the author, Josh Quittner, posing
- as the ILF, I can only assume that they felt likewise.
-
- So you decide for yourself about all that. Oh, and buy the damn
- t-shirt. http://www.fc.net/phrack/shirts.html ]
-
- -----------------------------------------------------------------------------
-
-
- Hi Can you teach me to be a hacker i think that that would be cool so what do
- you think can you teach me to be a hacker and to be cool you are one of the
- biggest hackers in the world
-
- [ No, I'm afraid as one of the biggest hackers in the world, I'm far too
- important to expend any energy on the likes of you.
-
- Now go back to your PlayStation and get better at Toshinden. ]
-
- -----------------------------------------------------------------------------
-
-
- Where culd i find some zipped red box tones? Or blue box.
- CyberOptik
-
- [ Make your own tones with the Blue Beep program.
-
- Follow some of the links from the Phrack Home page, and you should
- find this program on any number of sites. ]
-
- -----------------------------------------------------------------------------
-
- Hallo, din Gamle ╪rn!!
- (Norwegian for: Hello, you Old Eagle!!(direct.translated.)
- (╪rn(Eagle) is pronounced like: earn ) End of Norw. lesson.
-
- This is a question from one viking to another; I am a newbie in the H/P
- division so I spend my days(and nights!) dwnloading all i can find about the
- subject. But I do have some problems with the cellular phone system over
- here, NMT 900. Which your system AMPS have stolen all the good parts from!
- Untill last year i could program my cellular phone, Ericsson NH 99, by
- programming and switching the 27c512 prom. But now the norwegian
- telecompany Telenor Mobil has inserted pin codes, i.e. if my cellular phone
- number used to be 12 34 56 78 (we have 8 digits), then my phone number now
- has changed to 12 34 56 78 XX X. Where the 3 last digits are unknown to the
- owner of the phone.
-
- I do have programs and cables for programming the phone with all 8+3 digits,
- but then I have to know the 3 digits, the pin code, and I do NOT know how
- to download them from the cellular traffic going around my place. Can you
- help me beat the system? How do I dwnload the pin code???? I read that they
- are going to use the same system i the N.Y. area within this year, so someone
- is going to ask you these qst. sooner or later. Be prepared! Or is my qst.
- old news? Maybe everyone knows how to do this? Exept the norwegian newbie....
-
- Vennlig hilsen
- (thats:Best regards)
-
- Stian(Mr.Phonee) Engerud
-
- [ I'm not sure I understand how the last 3 digits can be unknown to the
- owner of the phone. If your number changes, then obviously you have to
- know the new number. Are you sure this isn't just a touch-tone PIN
- entered in when you use phone, like systems over here in the states?
-
- If it is, then you'll still need some kind of ESN reader, or other means
- to decode the reverse channel, and a 900 mhz-capable radio and a touch-tone
- decoder to grab the PINS as well. It's incredibly annoying.
-
- On another note, I thought Telenor Mobil had AMPS, ETACS and GSM systems
- in place. Have they upgraded their ETACS systems as well? If not,
- use those. ]
-
- -----------------------------------------------------------------------------
-
- From: zadox@mindspring.com (Ron Zalkind)
- Subject: Phrack Magazine: Strategic Marketing Partnership
-
- I'm one of the principals of a new Internet-based, second-generation,
- Information Technology service. This new Internet service debuted last week
- at the Culpepper Forum in Atlanta. I'd like to propose a strategic marketing
- partnership with Phrack Magazine. This proposal will spell out what it is
- our service does (including a product demo), how we think a partnership with
- Phrack Magazine might work, and how we can all increase profits by doing so.
- Please reply to this E-mail with the name and E-mail address of the
- 'director of online strategy', or the 'circulation director', for Phrack
- Magazine. Thank you.
-
- Ron Zalkind, President
- R.E. Zalkind & Co. Inc.
- Voice: 770-518-1600
- Fax: 770-642-0802
- E-mail: zadox@mindspring.com (Ron Zalkind)
- Ron Zalkind
-
- [ WOW! I can't wait to hook up with THESE incredibly savvy people
- so Phrack can dramatically increase our profits. Let's see, if we
- make any money, we'll see a 100% increase! It's a no-lose
- situation.
-
- Man, I hate Internet mass-mailers. Don't these people attempt to qualify
- their leads even a LITTLE? Strategic Marketing Opportunities with
- free computer hacker magazines? Ron? Hello? ]
-
- -----------------------------------------------------------------------------
-
-
- First of all, great work on the 'zine all these years, hope to see 48
- soon.
-
- I have an article from "Airman" magazine (I believe it was the April
- 1996 issue), the US Air Force magazine given to military members. It
- details the efforts of AFOSI (Air Force Office of Special Investigations)
- to prevent hackers from breaking in to military computers. Considering
- it's coming from the military, it's not too badly written (the author
- actually knew the difference between "crackers" and "hackers"). I don't
- have a scanner, but I'd be more than willing to snail mail it to you. I
- just wanted to check and see if you guys already had it of not. If you
- don't, let me know, and I'll get it to you ASAP.
-
- Keep up the good work....
-
- [ We would definately like to see the text from this article. Please
- forward it!
-
- In fact, if any of you readers ever come across ANYTHING you think is cool,
- email it to us, or snail mail it. We love getting mail.
- We will print anything cool. (And a lot of lame things too!)
-
- Just stop sending us credit histories and password files. :) ]
-
- -----------------------------------------------------------------------------
-
- need access to w.gov xxx now
-
- [ w.gov? Uh, ok, let's see:
-
- Reserved Domain (W-GOV-DOM)
-
- Domain Name: W.GOV
-
- Administrative Contact, Technical Contact, Zone Contact:
- Internet Assigned Numbers Authority (IANA) iana@isi.edu
- (310) 822-1511
-
- Record last updated on 02-Dec-93.
- Record created on 01-Dec-93.
-
-
- Do you know what this means? Duh. ]
-
- -----------------------------------------------------------------------------
-
- From: health@moneyworld.com
- Subject: Scientific Discoveries Minimize Aging (DHEA)
-
- http://dhea.natureplus.com
-
- Take advantage of the amazing benefits of DHEA. In the search for the
- FOUNTAIN OF YOUTH, DHEA is a must README. People, age 70, feeling and
- acting 25.
-
- Read the medical research at http://dhea.natureplus.com .A quote from
- an article published by the New York Academy of Science written by Dr.
- S.S.C.YEN;
- "DHEA in appropriate replacement doses appears to have remedial effects
- with respect to its ability to induce an anabolic growth factor, increase
- muscle strength and lean body mass, activate immune function, and enhance
- quality of life in aging men and women, with no significant adverse effects."
-
- Regain the eye of the tiger! Don't wait ! Click on: http://dhea.natureplus.com
-
- To terminate from the Health Catalog, Reply to health@moneyworld.com with
- "remove" in the subject field. Bob Williams 206-269-0846
-
- P.S. You will find a full line of Vitamin, Supplements and OTC Health
- Catalog at http://natureplus.com.
-
- [ Yet another Mass mailing! How many lame mailing lists are we on?
- You have to wonder about these things.
-
- But how angry can one get, knowing that DHEA is the FOUNTAIN OF YOUTH!
- I need to get me some of that. A little DHEA, a little GHB, a little
- DMT, and you'll look younger, feel younger, and have the brain of
- a two year old.
-
- And besides, Jesus loves acronyms. ]
-
- -----------------------------------------------------------------------------
-
- Do you listen to 2nur radio? If so have you ever heard a band named
- SOYLENT GREEN or GOITER on any of their shows?
- please email me back
- thanx,
- Nick
-
- [ Nick, I hate to break it to you, but:
-
- SOYLENT GREEN IS PEOPLE!!!
- IT'S PEOPLE!!!!! ]
-
- -----------------------------------------------------------------------------
-
- From: Pete Shipley <shipley@dis.org>
- To: best-of-security@suburbia.org, cert@cert.org, cudigest@sun.soci.niu.edu,
- daddict@l5.com, dc-stuff@fc.net, dtangent@defcon.org,
- emmanuel@2600.com, grayarea@gti.gti.net, letters@2600.com,
- mycroft@fish.com, phrack@freeside.fc.net, phrack@well.sf.ca.us,
- proff@suburbia.org, root@iss.net, root@l0pht.com, root@lod.com,
- root@newhackcity.com, spaf@cs.purdue.edu, strat@uu.net,
- will@command.com.inter.net, zen@fish.com
- Subject: Shipley owned, hacked and thrashed
-
-
- Please distribute this letter freely:
-
- This posting is being made from dis.org, and this is not forged e-mail.
- Even though this mail is coming from Peter Shipley's account, I am not him.
-
- Who am I?
-
- That is unimportant except to say that I cannot take anymore of the
- "DoC" crowd's BULLSHIT. I would like to raise an issue with them, mostly
- (but not all related to the incident at defcon).
-
- To you drunken losers at defcon who had to fuck with Netta's speech (DoC
- on hold here for a second, it wasn't just them): If you didn't want to hear
- Netta's speech (though in your opinion it may be monotone, boring or even
- wrong) you DIDN'T HAVE TO STAY AND LISTEN TO IT. There were some people that
- WANTED to listen to the speech, but you all had to act like POMPOUS ELITIST
- ASSES. How different are you now from a government that would like to
- enforce censorship upon it's own people?
-
- All I can say is "getbacks are a bitch". A few things to consider:
-
- 1. Shipley is an utter tool. His whole appearance is a front. If he's
- such an awesome security specialist then why was he so easily owned? Also
- I bring into question some of the motives he has for harassing Netta Gilboa.
- Her boyfriend (who is currenlty in jail) was known for continually hacking
- (yes CONTINUALLY hacking) Peter Shipley. I know this because I spoke with
- Chris (n00gz) many times and was aware of this fact.
-
- In my opinion Petey, anyone that is foolish enough to hire you to secure their
- systems are idiots; whether it's the military, government, industry, a
- business -- they should all just ask for their money back. You are a discredit
- to your profession.
-
- 2. Shipley is a coward. Only cowards attack people weaker than them
- but back away from a confrontation with someone of equal size or power.
- Careful Peter -- next time don't piss off Bootleg, he might hurt that pretty
- boy face of yours (though I admit, I would like to see it)
-
- 3. Hackman was a gob of shit. Peter Shipley has come to know his true
- calling in life now (to wit: Webmaster).
-
- 4. The fangs make you look like a homo. Maybe you are (nothing against
- them actually, just stating a fact).
-
- Shipley, se7en, (ayoung, where's your piglet account?). Get a fucking life.
- Maybe instead of contstantly going around "Searching for intelligent life"
- perhaps you should stay home and secure your own systems. You are all owned,
- now don't you feel stupid? You should. You are.
-
- DIS.ORG == DISORGANIZED.
-
- -- galf@upt
-
- [ This is almost funny.
-
- Notice I said, almost.
-
- You have to admit though, Shipley always comes with some damn fine
- women in tow. Oh the things I did in my mind to that blonde...
-
- Something tells me that the author of this forged message could use a lot
- of Shipley hand-me-downs: Women, contracts, references, etc... ]
-
- -----------------------------------------------------------------------------
-
-
- Hey, I just watched the movie Hackers, and I was just curious to know if They
- used you and the LOD to models the characters in the movie after? Alot of the
- handles, and choice phrases they used sounded awfully Farmiliar with what
- went on, or at least what the book said went on.
-
- Meds:}
-
- [ Actually, meds, the screenwriter hung around with "MOD" and other people from
- the New York hack scene and picked up some pointers, and then used
- people like Dead Lord and Emmanuel Goldstein as technical assistants.
-
- Or something like that.
-
- Please, don't ever associate "LOD" with this piece of shit again. :) ]
-
- -----------------------------------------------------------------------------
-
- A lot of people have read the article about Joe Engressia and his time in
- Memphis where he was arrested by the police and banned from his dream of
- working on phone lines. Well, at the time when he was living on Union
- avenue, my mother was in charge of payroll, hiring and the like at a local
- switchboard. This was back in 1972 when the phone system was less of the
- fuqup it is today. Well, a friend of my mother's taught Mr. Engressia how to
- cook and other related houshold things despite his handicap. Shortly after
- or before this, (I am unsure) he was arrested by the police. I think this
- was also about the time the interview was made. Anyway, the local phone
- companies would not touch him, not even to give him service. My mother,
- after talking with him decided to hire him as a phone consultant. (Her
- opinion of his was that "He was so brilliant, it was scary, I mean REALLY
- scary.") She though he was a great "kid" (22 at the time) and was the best
- consultant that they had. He worked there for three years before moving.
-
- The last my mother heard was that he was living in a Denver high rise
- working as a consultant to a corporation or something out there. I only just
- started talking with my parents about this today, but I am sure that they
- will tell me more of him.
-
- Oh, and my father was good friends of Joe too, he and Joe were Ham Radio
- operators here in Memphis and my father still phreaks on them so I am sure
- that Mr. Engressia does too. Anyway, my father is teaching me how to hack,
- and my mother is teaching me how to phreak, but she only knows a little of
- outdated info and wants to get in touch with Joe. If anyone, ANYONE has any
- information about Joe, or if somehow this article gets to Joe, please let me
- know at the following e-mail address:
- Kormed@aol.com.
-
-
- [ We used to call Joe on conferences a long time ago. I could probably
- dig his contact information up, but I really doubt he'd appreciate his
- number being published in Phrack.
-
- Hell, if your parents are teaching you how to hack & phreak, then certainly
- they can find Joe. He was always listed in Directory Assistance when
- we tracked him down years back.
-
- Have you even really looked for him? ]
-
-
- -----------------------------------------------------------------------------
-
- quick question For Bloodaxe.
-
- Ok, I know you probably get this Alot,but I just have to ask?...
-
- Did you Really Date Christina Applegate?
-
- had to ask,
-
- [ Man, now that is a rumor that I would love to have started myself.
- No. Never dated her, never met her, never talked to her, never
- had any contact whatsoever. Spent some time holding up some of her
- posters with one hand, but that's about it. ]
-
- -----------------------------------------------------------------------------
-
- do you have any info on stealing magic cookies ??
-
-
- [ No, but I can trade you these magic beans for your cow. If you plant
- them they will grow high into the sky, towards the castle in the clouds
- where the giant lives with the talking harp and the goose that lays the
- golden eggs.
-
- Go read some of the WWW Security Lists, if you're talking about what
- I think you are. There are also javascript routines that collect
- navigator cookies from clients hitting your page. After briefly looking
- around, I can't find the specific sites to snarf them from. Go do a
- webcrawler search for WWW security or javascript security. ]
-
- -----------------------------------------------------------------------------
-
- Dear Phracks - I'm a Free Journalist from Germany and I'm going to write
- an articel about ISDN and the possible danger which might happen to a
- company etc. getting hacked by some agnets, spies etc. from other
- countries. So I'm looking for indos about ISDN-Viruses, Hackers and
- background infos.
-
- Can you help me?
-
- [ Wow, a "Free Journalist." I thought that pesky national socialist party
- imprisoned all you guys.
-
- ISDN Viruses are quite possibly the worst thing to happen to computing
- since the creation of the Cellular Trojan Horse. Basically, these viruses
- travel over the wires using the X.224 transport protocol, and seize the
- D channel using Q.931. All SS7 data sent over the D channel is quickly
- compromized and re-routed to different signal transfer points, causing
- massive ANI Failure over the entire routing mesh.
-
- Rumor has it that the Internet Liberation Front was behind these viruses
- with heavy investement coming from the German Bundesnachrichtendienst's
- Project Rahab. These hackers were paid with AT&T calling cards encoded
- with a polymorphic encryption scheme, and cocaine.
-
- You can quote me on this. ]
-
- -----------------------------------------------------------------------------
-
- Well, i wanna make an offer, and a nice deal.
- i am n editor in an H/P/C magazine of HFA ( universal H/P/C
- group..)
- well, what i wanna offer is a joining both of the papers
- 2gether, OR! u want more subscribes, we'll publish ya,
- but adding 1 article from ya'r paper, saying from where it is.
- so, if we can make this deal, contact me asap!
- 10x.
-
- [ Let me see if I understand this, your "universal H/P/C group" has
- a magazine, and wants to do "Phrack" the great honor of merging
- with us, or printing our articles? Wow. What a deal. You mean
- by linking up with you guys, we will hit a greater audience
- "universally?"
-
- So, merging our roughly 10,000 direct email subscribers, and a roughly
- 75,000 more WWW or misc. readers, adding in your readers, that should
- bring us up to 85,001 readers! Universally! FAN-FUCKING-TASTIC!
-
- Are there so many rocks for you people to crawl out from under?
- Sheesh! ]
-
-
- -----------------------------------------------------------------------------
-
- Hello,
-
-
- I have a need for a network sniffer. Specifically, one that will
- sniff IEEE-802.3 packets and TCP/IP packets. Any leads?
-
-
- [ Well, gee, are there network sniffers that won't?
-
- Go do an archie search for tcpdump. ]
-
- -----------------------------------------------------------------------------
-
- I was just strolling by you page: http://freeside.com/phrack.html,
- and found my link "Showgirl Video" (link to vegaslive.com).
-
- I am the creator and webmaster for the site. If I can ever be
- of assistance to you let me know.
-
- We are one of the few sites in the world that has a live stage and
- live 1 on 1 conferencing in one place.
-
- john...
-
- [ Ya know, every time I'm in Vegas I make it out to Showgirl Video with
- a bucket of quarters and a healthy dose of bad intent. I have to
- congratulate you guys for going on-line. I love it when two of
- my favorite things come together (smut and computers).
-
- Unfortunately, The Vegaslive site is kind of pricey. You guys seriously
- need a flat fee. I suggest you look at a SUPURB site:
- http://www.peepshow.com
-
- That place has a flat fee, all you can eat pricing structure, the way
- God meant it to be. Take note, and follow suit. ]
-
-
- -----------------------------------------------------------------------------
-
- I have a Mitsubishi MT9 (MT-1097FOR6A) ..I program the NAM with the
- passw: 2697435 ...I need the passw to have access to SCAN or TAC
- function ...please, help me!
-
- Thank
- Regards
-
- [NCG]
-
- [ I'm not familiar with that phone, but I'd start off looking through
- Dr. Who's archive of cellular info at:
-
- http://www.l0pht.com/radiophone
-
- If what you are looking for isn't there, there might be a link to
- somewhere that has it. ]
-
- -----------------------------------------------------------------------------
-
- my name is azreal! I am also known as the angel of death. why did you sell
- out to the feds back when you running comsec. i think phiber optick was a
- great guy and i would have been glad to work with a legend. do you know his
- e-mail adress
- azreal
-
- [ Azrael? The Angel of Death? I thought Azrael was Gargamel's annoying cat.
-
- But to answer your question, I sold out to the man ages ago for money.
- Pure and simple. Once you hit puberty, you might have a need for cash.
- Once mommie sends you off to college, you might need it even more. And
- in the distant future, when you get out on your own, you will really
- know.
-
- Yes, phiber is swell. There have been good pictures of him in many
- national magazines. Try not to get the pages stuck together.
-
- And, yes, I do know his email address. Thanks for asking! ]
-
- -----------------------------------------------------------------------------
-
- From: prodigy.com (MR MARK P DOLESH)
-
- How do you hack?
-
- [ Very carefully. ]
-
- -----------------------------------------------------------------------------
-
- Did you ever write a edition that deals with breaking the screensavers
- code? If so which one? How about breking the Win95 password. You know
- the one that allows you into Win95?
-
- [ We pass all articles about breaking Windows Screen Savers on to
- the more technical forum at 2600 magazine.
-
- To disable the Win95 password, install Linux. ]
-
- -----------------------------------------------------------------------------
-
- A phriend of mine showed me your sight a few days ago at his house...I
- thought it was pretty cool. I dloaded a few issues and stuff to check
- out...I haven't been on the internet to long so I'm still trying to phined
- more stuff that interest me, and I would like to set up my own page like
- that but my account is thru the school...Is there anyway around that? So
- it can be like border line legal? How underground can one go??? If you
- still have the file on where the line is please send them...Thanks.
-
- [ Your account is through your school, but you are looking for a way around
- that? Hmmm...let me see. I'm just going to throw out something wild
- and crazy, but, what the hell: Maybe, get another account through
- another Internet provider? I know, it's just too outlandish. Forgive
- me for being so zany.
-
- How underground can you really go? I used to have that file you are looking
- for, but I was so underground at the time, it got soiled with mud and
- disintegrated, eventually polluting the water table, and was ultimately
- drank by the city of Pasadena, Texas. ]
-
- -----------------------------------------------------------------------------
-
- In regards to volume one ,issue four , Phile #8 of 11 ...
- This shit has got to be a joke , I tryed to make some and
- Was a great dissapointment ????
-
- [ The meth recipe works just fine. Obviously you DIDN'T try to make it.
- If you feel like a REAL MORON, look at the cat recipe in the line noise
- section of this issue. Stay up for a week, go into deep amphetamine
- psychosis and die! Woo Woo! ]
-
- -----------------------------------------------------------------------------
-
- I ve tried to locate these guys who have Black book for cracking
- passwords in major software and some games as well.They go by the Names
- of Jolly Reaper and Maugan Ra aka Manix.Iam doc X from London (not a
- pig!!!) if U happpen to know these doodez let us know.TA from GB
-
- [ Perhaps you have Phrack confused with something having to do with
- pirated software. I'd ask that question in a posting to the USENET
- group alt.warez or on the IRC #warez channels. ]
-
- -----------------------------------------------------------------------------
-
- Eric,
- i have been searching the internet for some kind of script that
- will subscribe a certain email address to a shitload of
- mailing lists...i have heard of such a thing.
- what im lacking is that keyword to search for such as:
-
- bombard
- attack
- flash
-
- what is the technical term for this kind of attack?
- or better yet, do you know where to get a hold of such a script.
- im not familiar with mailing lists and id rather not spend the time
- researching the topic...but i need vengeance quickly :-)
-
- any help appreciated,
- -roger
-
- [ The name for this type of attack? Uh, an email bomb?
-
- But let's take a closer look at your mail:
-
- "id rather not spend the time researching the topic...but I need vengeance
- quickly"
-
- I'm not going to be your fucking research assistant, or your accomplice.
- If you can't figure out how to look through our back issues to find any of
- the tons of fake mailers we've printed, or figure out how to automate them
- using shell script, then you don't deserve to live, much less
- get your speedy vengeance.
-
- Couldn't you even come up with a NON-LAME way to get back at someone? Hell,
- even rewriting their .login to say "exit" or something silly like that is
- more clever, and less cliche, than flooding their inbox. ]
-
- -----------------------------------------------------------------------------
-
- The art of " information manipulation " has possessed my virgin soul ! I
- turned into a fuckin' 2-year old (drool and all) when experiencing the free
- local call system involving a paperclip . All I've been thinking is hack,
- haCK, HACK ! I'm still drenched behind the ears but I'm a patient, turbo
- learner (whatever the hell that means) !
-
- Here's the problem: I possess some info that could make you smile so
- big, that your sphinctor would unwrinkle. I would like to experiment, if you
- will . Perhaps, dabble with this stuff , but I am very uneducated in raping
- mainframes. This could be a major wood producer
- because my EX works at this establishment .
-
- I need a trustworthy pro who possesses a plethora of tasty tactics . Whic
- h way to the Dagobah System.....I seek YODA !!
-
- [ Drooling 2-year old.
-
- Very uneducated in raping mainframes.
-
- Major wood producer.
-
- Well, gee, I'm sure your info would make my "sphinctor" unwrinkle, but I'm
- wearing a new pair of jeans, so I guess I'll have to take a rain check.
-
- God bless AOL for bringing the internet to the masses! ]
-
-
- -----------------------------------------------------------------------------
-
- i want to be added to your list. and could you send me unziped hacking
- software or can you tell me how to unzip softwarre nd a beginners guide
- to hacking. i would appreciate it i want to begin fun new field of
- hacking thank you
-
- [ You want to learn all about hacking, but you don't know how to unzip
- files?
-
- Crawl before you run, Kwai Chang. ]
-
- -----------------------------------------------------------------------------
-
- VA'CH CO' TAI
-
- Anh Ta'm ddi du li.ch xa, ngu? ta.i mo^.t kha'ch sa.n. DDa~ ma^'y
- tie^'ng ddo^`ng ho^` ro^`i anh ngu? kho^ng ddu*o*.c vi` tie^'ng cu*o*`i
- no'i huye^n na'o tu*` pho`ng be^n ca.nh vo.ng sang. Ro~ ra`ng la` ho.
- ddang dda'nh ba`i, sa't pha.t nhau a(n thua lo*'n.
-
- Ra'ng nhi.n cho to*'i 3 gio*` sa'ng va^~n cu*' tra(`n tro.c hoa`i, anh
- Ta'm chi.u he^'t no^?i, be`n go~ nhe. va`o va'ch dde^? nha('c khe'o
- pho`ng be^n ca.nh.
-
- Anh Ta'm vu*`a go~ xong la^.p tu*'c anh nghe mo^.t gio.ng tenor he't le^n
- tu*` pho`ng be^n:
-
- - Tro*`i o*i! Co' bie^'t ba^y gio*` la` ma^'y gio*` sa'ng ro^`i
- kho^ng? O*? ddo' ma` ddo'ng ddinh treo hi`nh!
-
- - ?!?!?
-
- [Uh, let's see...No Boom Boom with soul brother. Soul Brother too beaucoup.
-
- Ddi Ma'o.]
-
- -----------------------------------------------------------------------------
-
-
- Hola me gustaria tener mucha informacion de lo que ustedes hacen sobre
- todo de como lo hacen. Es decir que me manden informacion de los secretos
- de los sistemas operativos de internet de todo lo que me puedan mandar.
- yo soy universitario, y me gusta todo lo relacionado con redes.
-
- Muchos saludos.
- Contestenme.
-
-
- [ What is this, International Day?
-
- !Si quieras mucha informacion, LEA MUCHOS LIBROS! !DIOS MIO! !No estoy
- el maestro del mundo! Ehehe, esta fue solomente una chiste. No esta
- nunca libros en espanol sobre <<computer security>>. Que lastima.
-
- If you want to learn, start with english...then go buy the entire O'Reilly
- Yellow series and Blue series. That will get you started learning
- "los secretos de los sistemas operativos de internet." ]
-
- -----------------------------------------------------------------------------
-
- From: "Erik K. Escobar"
- Subject: Apology
-
- This letter is to be forwared to the newsgroup io.general by madmagic, in
- care of Mr. Escobar.
-
- I would like to send a public apology to Internex Online for the
- treatment I have given the staff and users of this system. I threw
- around some threats and words that can incriminate me, and realized that
- it was a stupid idea on my behalf. In the last week or so with the
- negative attention I have gotten, I got to know the IO/ICAN staff a bit
- better and everything in good standing. Me and Internex Online are now
- even and there will be no retaliation or sour words from me. I just want
- everything to go back to the norm.
-
- Erik
-
- [ * AND THEN * ]
-
-
- From: "Erik K. Escobar"
- Subject: Shit
-
- As my understanding, A letter of apology under my name was redistributed
- around within my mailing list and whatever. As some of you know, myself
- and Zencor have been having problems with Internex in the past and near
- the middle of this week, I got into a large battle with was ACC, ICAN,
- and Internex Online -vs- Me. It is stupid to get into an argument with
- that many corporations, and a few words and threats were thrown, they
- locked my account. I wrote a letter in response of that and they
- proceded to lock other Zencor staff accounts and hack our web site. Also
- they posted the letter in the news groups and whatever. They eventually
- decided to charge me and whatever, and to save me time outta the courts
- and crap like that I made an apology for the threats, seeing that they
- could incriminate me. Internex has done wrong and I probably won't be
- seeing alot of apologies coming my way. If they didn't have certain info
- about me..they could have me very well laughing at them but that is not
- the case.
-
- Erik
- Lord Kaotik
- [ ZENC0R TECHN0L0GIES ]
-
-
- [ Can you say, LAME? ]
-
- -----------------------------------------------------------------------------
-
- Been trying to locate for some time the file, plusmap.txt that used to be on
- the phrack bbs (716-871-1915). This file outlined information regarding the
- videopal in the videocipher II plus satellite decoder module. Any idea where
- I might find this file?
-
-
- [ I didn't know there was a "phrack" bbs. <Sigh>
-
- In any case, I would look for information regarding this on the following
- sites:
-
- http://www.scramblingnews.com
- http://www.hackerscatalog.com
- http://ireland.iol.ie/~kooltek/welcome.html
-
- Satellite Watch BBS : 517-685-2451
-
- This ought to get you in the right direction. ]
-
- -----------------------------------------------------------------------------
-
- Hi,
-
- Just a quick note to tell you about the Hawaii Education Literacy Project -
- a non-profit organization - and our efforts to promote literacy by making
- electronic text easier and more enjoyable to read. Given that we're both in
- the reading biz, I thought you might be interested.
-
- ReadToMe, our first program, reads aloud any form of electronic text,
- including Web pages, and is free to anyone who wishes to use it.
-
- The "Web Designers" section of our home page tells you how your pages can
- literally speak to your audience. Actually, all you need to do to make your
- pages audible is to add the following html code:
-
- <P><A HREF="http://www.pixi.com/~reader1/readweb.bok">Hear
- This Page!</A> Requires ReadToMe Software... Don't got it? <A
- HREF="http://www.pixi.com/~reader1">GET IT FREE!</A>
- </P>
-
- A beta test version of the program can be obtained from
- http://www.pixi.com/~reader1. I encourage you and your readers to download
- a copy and take it for a spin.
-
- Thank you for your time,
-
- Rob Hanson
- rhanson@freeway.net
- Hawaii Education Literacy Project
-
-
- [ Honestly, I don't know if this is a spam to a list of magazine people, or
- really a phrack reader. I have this thing about jumk email, and the joy of
- offering that info to our thousands of bored hacker readers looking for
- an excuse to fuck with some system.
-
- I'll let them decide if this was a spam. Thanks, Rob. ]
-
- -----------------------------------------------------------------------------
-
- ********************************
- SYNTHETIC PLEASURES opens in the US theaters
- ********************************
- save the date, spread the word. forgive us if you got this before.
-
- -----------------------------------------------------------------------
- eerily memorable is SYNTHETIC PLEASURES, a trippy, provocative tour through
- the perfectly artificial worlds of cyberspace, plastic surgery,
- mind-altering chemicals and controlled, man-made environments that
- questions whether the natural world is redundant, or even necessary. those
- who see it will want to pinch themselves when it's over.
- (janet maslin- The New York Times)
- ------------------------------------------------------------------------
-
- for further info contact:
- caipirinha@caipirinha.com
- http://www.syntheticpleasures.com
-
- first opening dates:
-
- Aug 29 Los Angeles, CA- Nuart Theatre
- Aug 30 San Francisco, CA- Castro Theatre
- Aug 30 Berkeley, CA- UC Theatre
- Aug 30 San Jose, CA- Towne Theatre
- Aug 30 Palo Alto, CA- Aquarius Theatre
- Aug 30 Portland, OR- Cinema 21
- Sept 13 San Diego, CA- Ken Theatre
- Sept 13 NYC, NY- Cinema Village
- Sept 13 NYC, NY- City Cinemas
- Sept 13 Larkspur, CA- Larkspur Theatre
- Sept 20 Boston, MA- Kendall Square Theater
- Sept 20 Cleveland, OH- Cedar Lee
- Sept 20 Philadelphia, PA- Ritz
- Sept 22 Vorheess, NJ- Ritz 12
- Sept 27 Austin, TX- Dobie Theater
- Sept 27 New Haven, CT- York Theatre
- Sept 27 Pittsburgh,PA- Rex
- Oct 4 Washington, DC- Key Cinema
- Oct 11 Providence, RI- Avon Theater
- Oct 11 Kansas City, MO- Tivoli
- Oct 11 Baltimore,MD - Charles Theatre
- Oct 18 Waterville MA- Railroad Square
- Oct 18 Durham,NC - Carolina Theater
- Oct 18 Raleigh, NC - Colony Theater
- Oct 18 Chapel Hill,NC -The Chelsea Theatre
- Oct 25 Seattle, WA- Varsity
- Nov 8 Ft Lauderdale FL- Fox Sunrise
- Nov 15 Gainesville,FL - Plaza Theater
- Nov 16 Hanover, NH- Dartmouth Theater
- Nov 22 Miami, FL- Alliance
- Nov 25,29,30 Tampa FL - Tampa Theatre
- Dec 13 Chicago, IL - Music Box
-
-
- [ THIS WAS DEFINATELY A SPAM.
-
- I wonder what lovely cgi-bin holes that WWW site is sporting.
-
- But wait, maybe they just want some k-rad cyber-press like
- MGM got for the "Hackers" WWW page. Oh man, what a dilemma.
- To hack, or not to hack. Assholes. ]
-
-
- -----------------------------------------------------------------------------
-
-
- ==Phrack Magazine==
-
- Volume Seven, Issue Forty-Eight, File 2a of 18
-
- Phrack Editorial
- by
- Erik Bloodaxe
-
-
- This may very well be my last Phrack editorial, since I'm no longer going to
- fill the day-to-day role of editor, so I figure I ought to close out my
- crusade to piss everyone off.
-
- I don't like most of you people. The hacking subculture has become a
- mockery of its past self. People might argue that the community has
- "evolved" or "grown" somehow, but that is utter crap. The community
- has degenerated. It has become a media-fueled farce. The act of intellectual
- discovery that hacking once represented has now been replaced by one of
- greed, self-aggrandization and misplaced post-adolescent angst.
-
- DefCon IV epitomized this change in such amazing detail, that I can only hope
- to find words to describe it adequately. Imagine the bastard offspring
- of Lollapalooza and a Star Trek convention. Imagine 300+ people out of their
- homes, and away from Mother's watchful eye for the first time in their
- pathetic lives. Imagine those same people with the ego of Rush Limbaugh and
- the social skills of Jeffrey Dahmer, armed with laptops loaded with programs
- they can't use, and talking at length to reporters about techniques they
- don't understand. Welcome to DefCon.
-
- If I were to judge the health of the community by the turnout of this
- conference, my prognosis would be "terminally ill."
-
- It would seem that "hacking" has become the next logical step for many people
- looking for an outlet to strike back at "something." "Well, gee, I've already
- pierced every available piece of skin on my body and dyed my hair blue...what
- on earth can I do now to shock my parents? I know! I'll break some federal
- laws, and maybe get my name in the paper! THAT WOULD BE COOL! It'll be
- just like that movie!"
-
- I hate to burst everyone's bubble, but you are so fucked up.
-
- In this day and age, you really don't have to do anything illegal to be
- a hacker. It is well within the reach of everyone to learn more, and use
- more powerful computers legally than any of us from the late 70's and early
- 80's ever dreamed. Way back then, it was ALL about learning how to use these
- crazy things called computers. There were hundreds of different types of
- systems, hundreds of different networks, and everyone was starting from ground
- zero. There were no public means of access; there were no books in stores or
- library shelves espousing arcane command syntaxes; there were no classes
- available to the layperson. We were locked out.
-
- Faced with these obstacles, normal, intelligent, law-abiding adolescents from
- around the globe found themselves attempting to gain access to these
- fascinating machines through whatever means possible. There simply was
- no other way. There were no laws, and yet everyone knew it wasn't strictly
- kosher behavior. This fact added a cheap rush to the actual break-in, but
- the main drive was still simply to learn.
-
- Now, with the majority of operating systems being UNIX-based, and the majority
- of networks being TCP/IP-based the amount of knowledge to be gathered has
- shrunk considerably. With the incredibly low prices of powerful personal
- computers, and the free availablity of complex operating systems, the need
- to break into remote systems in order to learn has been removed. The only
- possible needs being met by remote intrusions would be a means to gather
- specific information to be sold, or that base psychological rush from doing
- something forbidden and getting away with it. Chasing any high only leads
- to a serious crash, and in the case of breaking into computers, that
- only leads to jail.
-
- There is absolutely nothing cool about going to jail. I know too many
- people who are currently in jail, who have been in jail, and some who are
- on their way to jail. Trust me on this, people. You will not be
- respected by anyone if you act rashly, do something careless and
- end up being convicted of several felonies. In fact, all of your "friends,"
- (those who didn't get busted along with you, and turn state's evidence against
- you) will just think you were a moron for being so sloppy...until they also
- get nailed.
-
- Get raided and you will almost certainly spend time in jail. Even once you
- are released, you will lose your passport and your ability to travel freely,
- you will lose your ability to do business in classified environments, you
- will become unemployable by most companies, you may even lose your rights to
- use computer or networking equipment for years. Is is still worth it?
-
- I break into computers for a living, and I love my job. However, I don't
- kid myself about just how lucky I really am. Don't fool yourselves into
- thinking that it was easy for me to achieve this, or that anyone else can
- easily slip into such a role. Staking out a claim in the information security
- industry is a continual battle for a hacker. Your past will constantly
- stand in your way, especially if you try to hide it and lie to everyone.
- (Read the recent Forbes ASAP article and spot the hacker from Garrison
- Associates lying about his past, although he was raided for running
- the Scantronics Publications BBS in San Deigo just a few short years ago.
- Shame on you Kludge.)
-
- I've never lied about anything, so that can't be held over my head. I've
- never been convicted of anything either, although I came closer to jail
- than hopefully any of you will ever experience. The ONLY reason I avoided
- prison was the fact that law enforcement was not prepared to deal with
- that type of crime. Now, I've taught many of those same law enforcement
- agencies about the nature of computer crimes. They are all learning and
- not making the same mistakes any more.
-
- At the same time, the technology to protect against intrusions has increased
- dramatically. Technology now exists that will not only stop attacks, but
- identify the attack methodology, the location of the attacker, and take
- appropriate countermeasures all in real-time. The company I work for makes it.
- I've always said that anything that can stop me will stop almost anyone,
- even through I'm not anywhere close to the world's best. There simply
- aren't that many things to monitor, once you know what to look for.
-
- The rewards have diminished and the risks have increased.
-
- Hacking is not about crime. You don't need to be a criminal to be a hacker.
- Hanging out with hackers doen't make you a hacker any more than hanging
- out in a hospital makes you a doctor. Wearing the t-shirt doesn't
- increase your intelligence or social standing. Being cool doesn't mean
- treating everyone like shit, or pretending that you know more than everyone
- around you.
-
- Of course, I'm just a bitter old sell-out living in the past, so
- what do I know?
-
- Well, what I do know, is that even though I'm one of the few screaming about
- how fucked up and un-fun everything has become, I'm not alone in my disgust.
- There are a bunch of us who have reached the conclusion that the "scene"
- is not worth supporting; that the cons are not worth attending; that the
- new influx of would-be hackers is not worth mentoring. Maybe a lot of us
- have finally grown up.
-
- In response, expect a great many to suddenly disappear from the cons. We'll be
- doing our own thing, drinking a few cool drinks someplace warm, and reflecting
- on the collective pasts we've all drawn from, and how the lack of that
- developmental stage has ruined the newer generations. So those of us
- with that shared frame of reference will continue to meet, enjoy each
- other's company, swap stock tips in the same breath as operating system
- flaws, and dream about the future of security.
-
- You're probably not invited.
-
- -----------------------------------------------------------------------------
-