home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 58.4 KB | 1,412 lines |
- .oO Phrack 50 Oo.
-
- Volume Seven, Issue Fifty
-
- 2 of 16
-
- Phrack Loopback
-
- -----------------------------------------------------------------------------
-
-
- Hi,
- I have a story of violations of freespeech and censorship and
- if I am busted unjustly, please publish this story to the public.
- Yesterday some faggot e-mailed me with a ton of ascii crap that
- took me an hour + to DL. WHen I finished DLing it, windoze stalled and I
- had to restart.. So naturally I was pissed off. The reason this guy
- said he did this was because I posted a cheat program for the game
- Diablo on my webpage and he doesn't like cheaters. Today he e-mailed me
- again with ascii crap.....I was beyond pissed....so I did what anyone in
- my position would do....Imailbombed him ... about 600 msg's or so.
- I used Kaboom3 and an SMTP I thought (Looked like it from port 25) was
- anonymous and untraceable.
- As it turns out, 2 hours later the head of security at Earthlink
- (my current ISP) called and said that someone from my account had e-mail
- bombed this person. The security guy said that the person I bombed
- complained to his ISP because it "put out his business for hours." His
- ISP traced it to Earthlink and then to me, by contacting the earthlink
- security guy and having him look in the logs for who was connected to
- the ip (dynamic) they saw in the bomb messages at the time the bombing
- occurred. He also said that the guy I bombed called the FBI and got them
- involved in it. Is this sounding fucking ridiculous yet? First of all,
- any reputable business presumably has a better-than-28.8 connection,
- which means it would have taken this guy a couple seconds to DL my bomb.
- Secondly, even if he doesn't have a T-1, at 28.8 it would take 2 hours
- or so, maybe less. But the FBI is involved..... I can't fucking
- believe it! So naturally the first thing I do is e-mail all the
- reputable hackz known to me. This is ridiculous, this is
- oppressive, this is BIG BROTHER!
-
- Yours,
- GrEeNbEaSt
-
-
- [ So, what exactly is it that you want us to do, besides burst into fits
- of uncontrollable for several minutes at a time? ]
-
- -----------------------------------------------------------------------------
-
-
- Hey, in phrack 48, the article on IP spoofing says you need to sample to
- TCP sequence numbers of the host you are attacking. The method is
- suggests is to connect via SMTP and then drop the connection. There is
- a problem with this - sendmail usually logs failed mail transfers, so
- the host will probably be able to correlate this with the time of the
- attack and find out who you are. Further, this connection must be done
- from a non-spoofed IP address to guarantee you get a returned packet.
- There are two options available here:
-
- 1) Forge the sequence sampling connection as another host on your subnet
- (although if they contact your provider and your provider logs massive
- data, you're busted - also this will not work if the local network uses
- an active hub)
-
- 2) Make sure to remove these traces if you manage to crack the machine -
- this is all or nothing - if you fail to crack it, but left indicators of
- an attack, you are screwed. (again only if your provider logs heavily)
-
- If you want to circumvent these dangers altogether, simply sample the
- sequence numbers from some highly non-logging port. The standard inetd
- server for UNIX runs a TCP echo, discard and chargen service, which you
- can get sequence numbers from, and does not log anything.
-
- There are two complications to this attack which are becoming
- increasingly used, and which effectively prevent it.
-
- 1) Some providers do not allow foreign IP addresses to go out of their
- subnet as source IP addresses - this is done through router blocking.
- Most sites just don't give a damn or are too stupid to figure out how to
- do it, but the number of providers doing this is increasing. You could
- try to hack their router - easy to find, do a traceroute, but chances of
- success are slim if it doesn't allow remote logins. Also, your ISP will
- know if this happens, and may take additional precautions immediately
- (such as grabbing your ethernet address if you are on a local network -
- then you are f!!ked) We don't want any minors reading this to see any
- offensive words, do we - oh lord, they might even ban phrack in the
- state of Texas. No offense to anyone from Tx unless they deserve it.
-
- 2) Some OS's use pseudo-random number generators to create TCP sequence
- numbers at the beginning of each connection. This is easy to do under
- Linux, and I think some commercial OS's might even be doing this now
- (anyone have confirmation of the rumor that Solaris now does this?)
- Now, this is easy to check for - connect twice in immediate succession
- and see if you get two sequential (or close) numbers. However, a
- workaround for this would be to generate pseudo-random sequence numbers
- for the first connection from a given IP address (and then again when
- the IP layer no longer has any knowledge of this IP address) If a site
- was running non-crypto pseudo-random sequences, it would be possible to
- analyze it using a spectral test to try to predict sequence numbers, but
- if they use a cryptographically secure sequence generator, you would
- have to break it (probably not too hard since any highly secure crypto
- sequence would make IP response time unreasonably slow) A
- counter-solution to this would be to generate random numbers in low cpu
- load time, and have a buffer of them for later use. Here, we could
- probably go on forever with attacks and countermeasures, so lets stop
- now, as a cure for sanity.
-
- As an aside note for the highly paranoid: ethernet spoofing
-
- Note: some of this is theorized, and might not be 100% accurate - if you
- get the jist of it, you should be able to figure out if it works for
- you.
-
- It is possible to spoof ethernet hardware addresses as well. Some cards
- will allow you to do this easily, but you need to have card programming
- docs (check the Linux kernel source for your card driver-!!). Others
- won't let you do it at all, and require a ROM change, or worse it might
- be solid state logic on the card - EVIL. Course you might be able to
- get around solid state stuff by recoding the ROM, but I wouldn't
- recommend it unless you don't have the $70 to buy a new card, and have a
- month or two to spend in the basement.
-
- If you make up an ethernet address, you should probably use a real card
- identifier (the first three bytes). This is because some sniffing
- software raises warning flags when unknown card identifiers pop up, and
- this software is run by more network admins than I'd like to think.
-
- Some new hub technologies may limit this type of spoofing- most notably,
- active hubs wouldn't allow it at all. Other new hub designs use
- mappings of ethernet address to specific ports on the hub, so you might
- not be able to change the address without turning off the machine,
- waiting for the hub to time out the address, and rebooting.
-
- Ethernet hardware address spoofing will make a machine completely
- undetectable, provided it is not the only machine on a network that is
- being monitored.
-
- There may be a way around active hubs, and this is multicast ethernet
- addresses. Any network card capable of multicast should be able to send
- packets with an ethernet multicast address. This address is not
- specific to each card, as many cards can send and receive on the same
- multicast address. The problem here is router and hub technology may
- have already advanced to the point where it can distinguish multicast
- ethernet addresses and convert them to multicast IP addresses, which
- would not allow you to spoof. This is only theoretical - I haven't
- tried it, don't know anyone who has, and have never even heard rumors
- about it.
-
- Note : this information is in no means comprehensive - I don't have the
- time or resources to study it, but most likely results in ethernet
- spoofing vary by the manufacturers of the network hardware all the way
- down the local line - (i.e - ethernet card all the way to the first
- gateway)
-
- Another aside: return path rerouting
-
- In return path rerouting, the IP spoofing attack follows the same
- general principal, except that the attacking machine gets reply packets,
- and does not need to operate blind. There are three ways to make this
- work:
-
- 1) Pretending to be a trusted host on your subnet
- Easy, just pick up packets destined for the trusted machine which
- look like responses to your forged packets, and send on their IP
- address, and SYN flood their machine. This will even work past
- blocking ISP's
-
- 2) Source routing attack
- Medium difficulty, you have to construct a path between your machine
- and the target, and a path between your machine and the trusted host
- (although the last part can be made up). Use this and either the
- strict or loose IP routing option, and all packets will come back to=20
- you. This will not work nearly as much, since many hosts and=20
- routers discard source routed packets (it is a well-known flaw in=20
- TCP/IP now). However, mightn't buggy implementations only discard
- one type of source routing?
-
- 3) Experimental - ICMP redirect attack
- Try using ICMP redirects to redirect the packets back to the=20
- attacking machine. ICMP redirects should only be accepted to=20
- machines on a local subnet, but buggy implementations might not do
- this correctly (actually, I think the Host Requirements RFC says=20
- this is recommended, not required). Also, it may be possible to =20
- create a path using redirects or forged routing updates to direct
- traffic to a trusted site back to the attacking site. After the
- attack, the routing information could be repaired, making it seem
- like a temporary network failure. If anyone followed this and knows
- what I mean, let me know if you think it's possible. =20
-
- Thanks
-
- Zach
-
- [ Zach, you have good ideas and points. Now, why haven't YOU written
- an article for Phrack???
-
- You should...<hint><hint> ]
-
- -----------------------------------------------------------------------------
-
- DEATH TO THE INNOCENT
-
-
- I WENT TO A PARTY, MOM, I REMBERED WHAT YOU SAID.
- YOU TOLD ME NOT TO DRINK, MOM, SO I DRANK SODA INSTEAD.
- I REALLY FELT PROUD INSIDE, MOM, THE WAY YOU SAID I WOULD.
- I DIDN'T DRINK AND DRIVE, MOM, THOUGH THE OTHERS SAID I SHOULD.
- I KNOW I DID THE RIGHT THING, MOM, I KNOW YOUR ALWAYS RIGHT.
- NOW THE PARTY IS ENDING, MOM, AS EVERONE IS DRIVING OUT OF SIGHT.
-
- AS I GOT INTO MY CAR, MOM, I KNEW I'D GET HOME IN ONE PIECE.
- BECAUSE OF THE WAY YOU RAISED ME, SO RESPONSIBLE AND SWEET.
- I STARTED DRIVING AWAY, MOM, BUT AS I PULLED INTO THE ROAD,
- THE OTHER CAR DIDN'T SEE ME, MOM, AND HIT ME LIKE A LOAD.
- AS I LAY HERE ON THE PAVEMENT, MOM, I HEAR THE POLICE MAN SAY,
- THE OTHER GUY IS DRUNK, MOM, AND NOW I'M THE ONE WHO WILL PAY.
- I'M LYING HERE DYING. MOM, I WISH YOU'D GET HERE SOON.
-
- HOW COULD THIS HAPPEN TO ME, MOM? MY LIFE JUST BURST LIKE A BALLOON.
- THERE IS BLOOD ALL AROUND ME, MOM, AND MOST OF IT IS MINE.
- I HEAR THE MEDIC SAY, MOM, I'LL DIE IN A SHORT TIME.
- I JUST WANTED TO TELL YOU, MOM, I SWEAR I DIDN'T DRINK.
- IT WAS THE OTHERS, MOM. THE OTHERS DID NOT THINK.
- HE WAS PROBIBLY AT THE SAME PARTY AS I.
- THE ONLY DIFFERENCE IS, HE DRANK AND I WILL DIE.
-
- WHY DO PEOPLE DRINK, MOM? IT CAN RUIN YOUR HOLE LIFE.
- I'M FEELING SHARP PAINS NOW. PAINS JUST LIKE A KNIFE.
- THE GUY WHO HIT ME IS WALKING, MOM, AND I DON'T THINK IT'S FAIR.
- I'M LYING HERE DYING AND ALL HE CAN DO IS STARE.
-
- TELL MY BROTHER NOT TO CRY MOM, TELL DADDY TO BE BRAVE.
- AND WHEN I GO TO HEAVEN, MOM, PUT DADDY'S GIRL ON MY GRAVE.
- SOMEONE SHOUYLD HAVE TOLD HIM, MOM, NOT TO DRINK AND DRIVE.
- IF ONLY THEY HAD TOLD HIM, MOM, I WOULD STILL BE ALIVE.
-
- MY BREATH IS GETTING SHORTER, MOM. I'M BECOMING VERY SCARED.
- PLEASE DON'T CRY FOR ME, MOM, WHEN I NEEDED YOU, YOU WERE ALWAYS THERE.
- I HAVE ONE LAST QUESTION, MOM, BEFORE I SAY GOODBYE.
- I DIDN'T DRINK AND DRIVE, MOM, SO WHY AM I THE ONE TO DIE?
-
- [ Interesting...booze, violence. Now, if only this little story had
- some forced sodomy of teenage schoolgirls...
-
- Man, I have no shame...drinking and driving is evil, and will get you
- shot in Central America for attempted homicide. That's why I take
- cabs or hang around with 12-steppers or mormons. Either way, it gives
- you someone to subject to your drunken ravings.
-
- Now why this was sent to Phrack, I have no idea. ]
-
- -----------------------------------------------------------------------------
-
- I just have one question, i just moved back down to Texas from NY,,,
- is there any one at phrack that knows local BBS numbers for san antonio???
-
- thanx for the help,
-
- [In almost any city with running water and electricity (and yes,
- even San Antonio qualifies as of this writing), in any local computer
- store you will find local compu-nerd publications. I think in San Antonio
- its "Computer User." In any case, in the back are usually listings of
- local bulletin boards. Start with these, and eventually you will come
- across the kinds of bulletin boards you really want. ]
-
- -----------------------------------------------------------------------------
-
- The trial of the Danes arrested in the article I wrote in #47 has now
- ended. No jail sentences, just community service up to 200 hours (me)
- and a fine of 30.000Dkr. (apx. $5000).
-
- Anyway, remember I wrote you about the article being quoted and
- translated to Danish in a Danish magazine? Well, after the same magazine
- published our REAL names, adrs with the advice not to hire us for any
- jobs I got pretty sick of them and sent them a bill of DKr 5000, billing
- them for my article.=20
-
- Of course, they won't pay me (would rather go to court) so now I'm
- considering taking them on their word. The company I'd be going after
- is a daughtercompany of Coopers & Lybrand and is called Institute of
- Datasecurity. Most of their employees seem to be notorious idiots, always
- proclaiming themselves in the media with the anecdotes of yesterday. They
- even gave out an award (money) to the DA who prosecuted us for doing
- a nice job!=20
-
- Well, since they didn't only violate my personal copyright but also the
- restrictions of Phrack Magazine itself, I wanted to know if I could get
- your support? Just some kind of written statement about the policy of
- the magazine, whether or not they paid you for it, etc.
-
- In a hurry, dont mind the mistakes,
-
- Le Cerveau
-
- [ Can you please send a photocopy of that article to us at the Phrack
- mailing address? Maybe we can help.
-
- I really don't have much respect for the accounting firms "computer
- security" teams, and never have. In the years they've been doing this
- work, they STILL don't get it.
-
- It's too bad you aren't in America. You could probably sue the living=
- hell
- out of everyone involved, if they really did publish your names
- and advise people not to hire you for work. ]
-
- -----------------------------------------------------------------------------
-
- HEY Whats up,
- I was wondering if U could tell me how to e-mail bomb Please!!!!=20
-
- [No, that's a stupid thing to do.
-
- But, if you insist....
-
- Go do a WWW search for the program "UpYours" This should
- suit your needs just fine. ]
-
- -----------------------------------------------------------------------------
-
- Hello,
-
- I was wondering if you know where i can get copies of "The Journal of
- Privileged Information"? I have issues 1-5, and i`m looking for 6 -
- present. If you know where i can get them, it would be greatly
- appriciated!! thanx
-
- techcode
-
- [ I'm not really familiar with this magazine, but if anyone out there
- has copies of this, email us with information on where to get more. ]
-
- -----------------------------------------------------------------------------
-
- Dear Phrack,
-
- Great job on issue 49. I enjoyed the section in Line Noise about ID
- machine hacking. Anyway, I wanted to say that Phrack rules; it is by
- far my favorite computer hobbyist magazine. By the way, I remember reading=
- a
- letter that a reader sent in, about some queer selling bound volumes of=
- Phrack,
- LOD Tech Journals, and virus source code. A similar occurance happended to
- me when I found that some wannabe-elite pseudo-hacker was selling printed
- copies of Phrack, 40 Hex, Digital Free Press, and Xeroxed copies of=
- alt.2600.
- I was curious, to say the least, and felt compelled to defend the honor of
- those aforementioned publications. I talked to the fag, and I gained his
- trust by using undecipherable hacker jargon that he seemed awed by. It=
- turns
- out that he had been distributing pirated junk on his PC, using an=
- unregistered
- copy of Serv-U. I gave him a registration crack, and in return he gave me=
- an
- account on his machine, so I could download his warez. I logged on to
- his PC one day, and I quickly found the serv-u.ini file with the encrypted
- passwords.
-
- Since Serv-U uses Unix style encryption, I cracked his personal account
- in about 17 minutes. He kept a TCP/IP connection open from 4pm to 11pm
- every evening, and I logged on as him one day. I uploaded a virus to the
- windows system directory and renamed it something benign, and then I edited
- his autoexec.bat to execute it (I also used Fixtime from the Nowhere
- Utilities 2.0 to make it smooth). I haven't heard from him since. That
- one was a simple job to protect the rights of cool magazines like Phrack!
-
- Take it easy, and keep the issues coming.
-
- dethbug
-
- [ If only all readers were as loyal. Or better yet, if only all readers
- sent us a dollar!
-
- Seriously though...a virus was a bit much, but since we weren't there
- to sue to protect our copyright...
-
- But uh, let it be known that you were not directed by, nor acting as an
- agent of Phrack Magazine, and any and all such behavior was done
- purely on your own behalf. :) ]
-
- -----------------------------------------------------------------------------
-
- Does this cost anything ?=20
- LORDCYBRON
-
- [ Unfortunately it does, but only your mortal soul. ]
-
- -----------------------------------------------------------------------------
-
- Phrack,
-
- We would like permission to republished Chris Goggans'
- (Erik Bloodaxe) editorials from issue 4.42 to issue
- 7.48 in Node9: An E-Journal of Writing and Technology.
-
- http://node9.phil3.uni-freiburg.de
-
- There is a lot of interest in hacker culture in
- cultural studies, and Chris Goggans' editorials give
- a good snapshot of the hacker's side of the from
- last three years.=20
-
- We could tell our readers to simply go to Phrack and get
- the editorials themselves, but putting the editorials
- together makes them more effective. Plus, for many of
- our readers, a number of names, terms, events need to
- be annotated.
-
- Jon Adams=20
-
- [ Well Jon, Phrack has always had a policy of letting people reprint
- articles / editorials / whatever as long as all pieces remain
- intact with all credit given to the original author and to Phrack
- Magazine. If you can do that, feel free to use the editorials. ]
-
- -----------------------------------------------------------------------------
-
- Hi Hackers
- =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
-
- I have only one question for you, please answer me. I read in your magazine
-
- > =3D=3DPhrack Magazine=3D=3D
- >
- > Volume Seven, Issue Forty-Eight, File 10 of 18
- >
- > Electronic Telephone Cards: How to make your own!
- > ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Its very excelent for people who live in country when used the cards from=20
- Gemplus, Solaic, Schlumberger, Oberthur: (French cards 256 bit). But I live=
- in=20
- Slovak Republic and in this country we use The cards from ODS, Giesecke &=20
- Devrient, ORGA Karten systeme, Uniqua, Gemplus, Schlumberger and Oldenbourg=
- =20
- Kartensysteme (German cards 128 bit).
-
- I am was reading in some paper that some people have emulator of these=20
- telephone cards (German card). Emulator with PIC procesor.
-
- But I very very long time searching Internet and I have not information how=
- =20
- I make this emulator. Only in your magazine I found help how I make=20
- emulator but emulator which emulate french telephone card but I need=20
- emulator which emulate german telephone card.
-
- Please help me if You know some adress where I can find information=20
- HOW I MAKE TELEPHONE CARD EMULATOR (WITH PIC PROCESSOR) WHICH EMULATE=20
- TELEPHONE CARD TYPE GERMAN TELEPHONE CARD (128 BITS).
-
- Thanks very much, for your answer. realllly thanks, i am waiiiiting.
-
- !!!!! M A X O !!!!!
-
- [ Actually, we don't but perhaps this request will bring in some
- information from people in Germany. ]
-
- -----------------------------------------------------------------------------
-
-
- Can you please send me some hacker stuff that I can use on AOL.
-
- THANX
-
- [ The most important tool a hacker can have is a brain. Unfortunately,
- since you are on AOL, it appears that your tool box is empty. Perhaps
- you'd be more interested in some cool beavis & butthead .WAV files... ]
-
- ----------------------------------------------------------------
-
- Looking for talented hackers for special projects.
- First project concerns breaking source code. Please respond.
-
- Justin Raprager=20
- <adamas@raprager.com>
-
- [ You probably can't afford any of us on the Phrack Staff.
- Your request is being passed on the the readers. ]
-
- -----------------------------------------------------------------------------
-
- Is your web site the best kept secret on the Internet?
-
- We'll promote it to 50 search engines and indexes for $85
- and complete the job in 2 business days. Satisfaction is
- guaranteed!
-
- Owl's Eye Productions, Inc.
- 260 E. Main Street
- Brewster, NY 10509
- Phone: (914) 278-4933
- Fax: (914) 278-4507
- Email: owl@owlsnest.com
-
- [ Now, if our site is a secret, then how did you morons know about us?
- I think a better sales pitch is:
-
- "Is your Web Site Secure?"
-
- We'll give your info to several million hackers for FREE who will be
- sure to subject it to an extesive battery of security testing ranging
- from exploitation of remote security vulnerabilties to denial of service
- attacks. Your site will be profiled continuously for months until
- people grow tired of causing you grief.
-
- Would Owl's Eye Productions, Inc. care to be the first for this
- amazing new service? Let us know. ]
-
- -----------------------------------------------------------------------------
-
- From: Ray Wardell <ray.wardell@novix.com>
- To: phrack@well.com
- Subject: FUCK YOU
-
- FUCK YOU ... YOU DUMB ASS SHIT HEAD... FUCK WITH ME AND DIE...
-
- [ Uh, ok. ]
-
-
- -----------------------------------------------------------------------------
-
-
- Hi, I would like to become a hacker. I just watched that movie HACKERS. It
- got me all siked up. If you could give me some information on how to
- become one, I would be apreciative.
-
- [ So if you had watched "Buttman Goes To Budapest" then Stagliano would
- be getting this email instead of Phrack?
-
- Dude...it was only a movie. And a bad one at that. ]
-
- -----------------------------------------------------------------------------
-
- Hi there !
-
- Your article of the PIC16C84-Phonecard includes a uuencoded part
- that contains the file "telecard.zip". telecard.zip contains the file
- telecard.pcb which was created with Tango PCB Series 2.
- My version of Accel Tango PCB Version 12 is not able to read this file.
- So, I want to ask you, if its possible to send me this file in ASCII-Format
- or (better) in a graphic-format like PCX or GIF.
- A HP-Laserjet-prn-viewer would be useful, too.
- I was also not able to read the schematic-file. Maybe you know a
- location on the internet where I can get an evaluation version of the
- older version of Tango PCB Series II.
-
- [ Actually, we've got the same problem here at Phrack. Anyone out there
- who can help, please send us email and we'll get it out to the
- masses! ]
-
- -----------------------------------------------------------------------------
-
- Hi my name is Konrad. I live in Ottawa, Onratio (Canada). I have a
- question about one thing. When I download a trial program from internet,
- it is only good for 30 days, and when it expires it writes that, to some
- file so I tried reinsalling and redownloading the program, but when I
- tried to run it, it gave me a message that this version is expired and
- that I have to purchase the program. Do you know, to what file it
- registers that it has expired, and how to disable it. If you don't know
- how to do it, maybe you know someone that might be able to do it, and
- forward my address to them. It is very important to me, because I'm
- finishing a home page called Teen Online and my graphic program expired
- (TrueSpace2) and there is no way that I can afford it, so I rather stick
- to trial version. Ok... Thanks for your time.=20
- Konrad
-
- [ Usually you can simply reinstall these trial programs and use them
- for another 30 days. With others, you can change your system date
- back, or edit a date in an INI file. It all depends on the program.
- Try some of these things and let us know what works. ]
-
- -----------------------------------------------------------------------------
-
- Why don't you write somthing for the bulgarian hackers?
- (recent:take a look at everything that happened in Varna, Bulgaria this=
- year)
-
- M a n i a X K i l l e r i a n
-
- [ We'd love to print something about the Bulgarian scene. Honestly,
- I have no idea what happened in Varna, nor would I know where to look.
-
- Here's a novel idea: Since you are IN Bulgaria, why don't you
- write something about it for us! ]
-
- -----------------------------------------------------------------------------
-
- I'm using BPI Accounts Receviable System Version 1.10 for IBM
- Released September 1983
-
- It has whats called a "key disk" that allows only the person with that
- disk to closeout the program or month. The problem is this, when I make
- a copy of this Key Disk the files match the original to the T.. There are
- only 2 files involved. But, when I try to closeout, BPI asks me to insert
- the Key Disk and press enter to proceed. When I do this with the "copy"
- of the Key Disk the BPI program tells me that the copy is not a Key Disk.
- This only happens with the copy, any ideas?=20
-
- Both Key Disks contain the same information. If I try to activate the
- close directly from the Key Disk Copy it tells me that it can't find a
- file, basrun.exe I checked and this file is part of the BPI Directory on C:
- I've used this accounting software for many years and it works well.
- But I'm afraid the good Key Disk may go bad one day and I'll be stuck.
- Thats why I'm trying to make a copy. Any help would be appreciated.
-
- [ Obviously there is something else on that disk that a normal copy
- is not getting. Maybe something as simple as a volume label or
- some hidden files.
-
- The easiest thing to do to get around this is make a sector by sector copy
- to a disk image file using some kind of program like the UNIX command "dd"
- and then copy that image back onto a blank diskette. ]
-
- -----------------------------------------------------------------------------
-
- Hi!
-
- Here I have something for you, which may be interesting in your news=
- section.
-
- Sometime during the night between Saturday April 5th and Sunday April 6th,
- hackers broke into one of Telenor Nextel's webservers and deleted the=
- homepages
- of 11.000 private customers and 70 corporate customers, among them the=
- homepages
- of Norway's two largest newpapers VG and Dagbladet, and the largest online=
- news
- magazine, Nettavisen.
-
- The hackers somehow got access to hidden scripts, and after modifying and
- manipulating them ran them, thereby deleting all the files mentioned.
-
- Early Sunday, the ISP Telenor Nextel started restoring files from a backup=
- made
- Saturday, but after encountering problems with that one, they had to restore
- from Tuesday's backup. Saturday's backup will be added sometime during=
- Monday.
- =D8kokrim, Norwegian police's department for Economic Crime has been=
- contacted.
- =09
- Reactions:
-
- Sverre Holm of Norway's Organization for Internet Users (http://www.ibio.no)
- criticize Telenor for lack of proper information, as well as an unhealthy
- attitude. In response to Telenor's comment that they can't guarantee this=
- won't
- happen again, he says, "Such an attitude can't be tolerated. If this is what
- Telenor means, then we have a serious problem here."
-
- Other reactions will surely come in the next days.
-
- References (all in Norwegian):
-
- Telenor Internett:
- http://internett.telenor.no/
- Scandinavia Online:
- http://www.sol.no/ (Telenor's online service)
- SOL Direkte:
- http://www.sol.no/snpub/SNDirekte/index.cgi?kategori=3DNett-Nytt
- Nettavisen:
- http://www.nettavisen.no/Innenriks/860330846.html
-
- I hope this could be interesting to you, and a candidate for your news flash
- pages. Unfortunately, any references included are to pages in Norwegian, but
- anyone with you speaking either Norwegian, Swedish, or Danish should be able=
- to
- get more information.
-
- Cheers,
- O L I K
-
- [ We here at Phrack always want to know what is going on out there on
- planet Earth. Keep us informed of anty other developments! ]
-
-
- -----------------------------------------------------------------------------
-
-
- I'm investigating some informatic viruses who infect images generating
- new fractalized images with a never seen beauty and singularity. Or may=20
- be they investigate me. These viruses could broke sohemer in many diverse=20
- disciplines like art, artificial life, fractals maths, digital image..=20
- if you look web's images http://antaviana.com/virus/angles.htm you will=20
- understand everything. I would be acknowledged if you could help me, and=20
- it is posible i would like you to diffusse this subject in your interesting
- publication.
-
- In the name of biodiversity, if you have these VIRUSES,
- PLEASE DON'T DISTROY THEM.
-
- [ Ok. We won't. ]
-
-
- -----------------------------------------------------------------------------
-
-
- Hi !
-
- I read In Volume Seven, Issue Forty-Eight, File 11 of 18 - How to make own
- telephon card . But when i try to make it , this card didnt work ! I try
- all things, and i try to find more informations about telephone cards, but
- i still dont know what's wrong !
- But today i found on http://www.hut.fi/~then/electronics/smartcards.html
- that there is some errors, but there is no information what's wrong.=20
- So i decidet to write to Phrack magazine , becouse in article is eriten to
- mail all questions to Phrack....=20
- Please send me info what is wrong, and how i must change the ASM program to
- work correctly or just PLEASE send me email of contact person who knows how
- to !!
-
- Thanx in advance !
-
- Marko
-
- [ Obviously that little smartcard article caused a stir. We've got all=
- kinds
- of email about it. We'll see what more we can dig up, but we are going
- to really need some help from Europeans and South Americans. (Smart
- cards are not in use here in America!) ]
-
-
- -----------------------------------------------------------------------------
-
-
- LOA is back!!! Visit our new page at:
-
- http://www.hackers.com/LOA
-
- Check it out and be sure to send your comments to revelation@hackers.com
- Volume 2 of The Ultimate Beginner's Guide To Hacking And Phreaking has been
- released as well, so be sure to download it and send me your comments. Be
- sure to check out the LOA Files section to view and download past, present,
- and future LOA Projects. Take it easy all...
-
- [ No offense intended, but did you ever wonder why there were so many
- "Legions of" whatever after LOD?
-
- We'll put a link up to your page though... ]
-
-
- -----------------------------------------------------------------------------
-
-
- Hey, did you know that Juno (the nationwide free email service) has PPP
- access? Free? To superusers only? Who login directly to their terminals
- that have no ANI? And that they are complete fucking idiots, because in
- every juno.ini file buried deep in the /juno/user00000x/ directory there is
- a section called "Variables" which lists at least one Juno server account,
- i.e. "junox14" and a password for it. These work. Not that I've tried them,
- or do this, or can be held in any way legally responsible for my non-PGP
- encrypted actions, which do not show my views, and are protected under the
- 1st Amendment.
-
- Sorry, didn't feel like using alternate caps today.
-
- l8r,
-
- -dArkl0rd-
-
- [ Interesting. We'll have to get the Juno software and play
- without the advertisements!
-
- Thanks, Mr. Shaw ]
-
-
- -----------------------------------------------------------------------------
-
-
- Hi. I've got a strange request. We're putting together a case that
- encourages the U.S. to loosen its encryption export policies.
-
- Do you know of any written resources that discuss the ability of hackers
- to break into NASA, tamper with launches or satellites? The folks at
- infowar.com insist that it is possible, but say that confidentiality
- won't allow them to publish that fact.
-
- We need written evidence to document the case, you understand.
-
- Anyway, I'd appreciate hearing from you.
-
- Jonathan
-
- [ I'd suggest you talk to Emmanuel Goldstein at 2600. The whole
- satellite thing came from a bogus post back in the early 80's
- on a BBS in New Jersey called "The Private Sector." Reporters
- siezed on it, resulting in headlines like "Wiz Kids Zap Satellites."
-
- 2600 wrote about this in I believe 1984 or 1985. Check with them for
- better details. ]
-
-
- -----------------------------------------------------------------------------
-
- Queridos crackeadores:
-
- Les quiero pedir si no saben de donde puedo sacar programas para
- crackear y phrackear.
- =20
- Desde ya mucahas gracias:
- Mauricio
-
- [ Existan muchos programas en sitos de FTP y WWW en todos los piases
- del mundo. No sabes de donde puedes sacarlos? Compredes
- "Webcrawler" o "Excite"? Dios mio. ]
-
- -----------------------------------------------------------------------------
-
- Hi Phrack;
-
- Intro to Telephony and PBX systems in Phrack#49 was excellent, pulled a=20
- lot of things together for me. That's probably the clearest, most=20
- concise explanation of the phone system that I've ever read. Hopefully=20
- Cavalier will be up for many more articles like that in the future.
-
- respects,
- jake
-
- [ Thanks! Hopefully we can continue have more telephony related articles
- in the future. It is fast becoming a lost art in today's hacker
- community. ]
-
- -----------------------------------------------------------------------------
-
-
- hey.. a Note To Say, 1-Greetings From IreLand..
- 2-Thanks A million.. I love Phrack..
- 3-Where Is The NexT Issue.. Whats up doc..=20
- 4-do ya have info/schematics on the shit that allows one
- to break into cellfone conversation and chat briefly
- to callers, as described in winn schwartaus excellent
- article on Defcon ][ ?Cellfone
- 5-Is Phrack on a Mailing List?? if so, Can ya Stick me
- On it?
- Many ThanKs
- NasTy Nigel,
- [PhreaK PowEr]
-
- [ 1. Greetings to you too gobshite!
- 2. Thanks!
- 3. You're reading it.
- 4. Not that I was in the room making those calls mentioned
- in that article or anything, but... :)
- An Oki-900 with CTEK cable hooked to a PC running omnicell tracking
- calls. A motorola brick phone in debug mode, hooked to a 25db gain
- yagi antenna (on a tripod) pointed out the window. As Omnicell locked
- in on interesting calls, the Motorola was tuned to the corresponding
- channel, Tx Audio turned on, various humorous interrupts were uttered,
- and Tx Audio turned off so the party being "contacted" wouldn't be
- thrown off their cell channel by our more powerful broadcast.
- Very simple.
- 5. The mailing list now is so huge that it will only serve to let people
- know when issues are going out, special bulletins, etc. Mailing out
- a meg to almost 30,000 people causes serious problems to the Internet,
- so we decided to make the change. ]
-
- -----------------------------------------------------------------------------
-
- I just wanted to drop a line and say that you guys are doing a great job
- with the zine. I just got issue 49 and I'm looking forward to reading it.
- I'm sure you've heard of The Works, the bbs with the most text files in the
- US. Well, it's finally back online, after six months in the gutter. For the
- best text files and the coolest users east of the Mississippi, call us up.
- +1 617 262 6444. You can't go wrong with the Works. We want you to call.
-
- [ It's amazing that BBSes like The Works are still around, even with a bit
- of down time. What's it been? 10 years? Geez.
-
- You're approaching the longevity of Demon Roach or P-80. ]
-
- -----------------------------------------------------------------------------
-
- I'm doing research on hackers for my LIB 105 class and have come across
- some of what I guess is tech speak or jargon. I've noticed that the
- letters 'PH' are frequently used to intentionaly mispell the words
- phreak, lopht, and in Phrak Magazine. Is there a reason behind all of
- these PHunny spellings?
-
- [ Uh, PH as in Phone. From the old Phone "Phreak" subculture of the
- late 60's, early 70's.]
-
- -----------------------------------------------------------------------------
-
-
- I think a great idea for a future article would be how to make a decoder
- card for a DSS sattelite reciever with some easy commercial stuff and a
- cmos Z-80 I.C. ...
-
- [ If it were that easy, there would be a bigger number of players in the
- billion dollar industry of satellite piracy. A key figure in that
- closed community once told me that it cost them about $1,000,000 US to
- crack each new rev of smart card. (But when you figure that means only
- selling 10000 pirate cards at 100 bucks, the cost of doing business
- is minimal, compared to the cost of the service provider sending out
- new software and cards to each subscriber.) ]
-
-
- -----------------------------------------------------------------------------
-
- Hi, I am a Primestar installer, I was wondering if you knew anything about
- how to stop Primestar from de-authorizing their unused IRD's? I know of 2
- installation screens accessable through the password screen using #'s 996 &
- 114, do you know of any others? I would appreciate any info you might have.
-
- Thanks,
-
- [ And Phrack would appreciate ANY info you have! ANYTHING! EVERYTHING!
- As an installer, you probably have some insights into the cards/recievers
- that we don't. Write them up! ]
-
-
- -----------------------------------------------------------------------------
-
- For certain reasons, some people may want to create a new anonymous mail
- box. Did they considered to create it in France?
- A lot of IPS offer the possibility to create mailboxes to those who have
- no computers by using a primitive look-alike telnet system: the French
- Minitel. This is convenient because a couple millions of Minitel have
- been freely distributed in France during the last ten years. The only
- cost is that an overcharge is billed to your phone bill of approx
- 35cents per minute. But this is perfectly legal and hard to trace back.
- Hyperterminal (at least in its french version) emulates the french
- minitel.
-
- The only thing is to dial 3615 in France and use one of this server:
- ABCNET, ACENET, ADNET, ALTERN,FASTNET,EMAIL...
- For example, EMAIL creates an e-mail adresse like:
- pseudonym@xmail.org.
-
- The only thing is that you have to know a little bit of French to use
- it, but just a little bit. The cost of a call (International and
- Minitel overcharge) should not be a problem to some of you.
- LeFrenchie
-
- [ This is a good idea. People outside of France don't know much about
- Minitel, (Or any videotext systems) since they failed in a big way
- here in the states and most other countries. Many old hackers might
- remember some of the Minitel Chat systems also accessible over X.25 such
- as QSD (208057040540), but without emulation software wouldn't have
- ever had access to the real Minitel. ]
-
-
- -----------------------------------------------------------------------------
-
- Two questions
-
- 1 How can I connect to an IRC server though a firewall?
- 2 How can I intercept messages sent to chanserv and nickserv on Dal.net?
-
- Thank you.
-
- [ 1. Open up ports 6665-6667
- 2. Set up a hacked IRC server. Get someone important to add it to the
- EFNET server hierarchy. Look for PRIVMSG to whomever you want. ]
-
- -----------------------------------------------------------------------------
-
- Hello,
- A modem has a light buffer between the copper wires of the
- telephone line and the rest of the copper printed circuit ( mother)
- board. How ( or does) does a firewall prevent hacks on a system or
- is this just a matter of Modern (Mastodon) buffalo hunting: They
- go down the same big or small. Specifically , beyond smart self
- learning systems can a server realy prevent contamination without
- the intervention of beings? My sister a suposed Webmistress says
- there are intervening buffers, I still see that between what ever,
- there is a very big freaking leap of faith..
- Senor Please Elucidate
- Richard
-
- [ Uh, if you think the "firewall" is that light buffer between the wires,
- then you have missed the point. A firewall in the networking context is
- not the same as the metal firewall in your automobile....it is merely
- a metaphor that has been adopted as the term d'jour.
-
- Please read: Building Internet Firewalls by Brent Chapman &
- Elizabeth Zwicky or Firewalls & Internet Security by Cheswick & Bellovin ]
-
-
- -----------------------------------------------------------------------------
-
-
- > Drop us a line on what you think of 49. Comments are encouraged.
-
- I think issue 49 was great, not to mention getting it out on time. I do have
- a suggestion though. The past few issues of Phrack have focused mainly on=20
- UNIX and not much else. I think UNIX is a great OS, but it would be cool if
- occasionally you would print a few articles about other systems. I would=20
- write one myself but right now I don't have anything new to contribute.=20
-
- Later,
- Tetbrac
-
- [ This has been a request for a long time. Hopefully we'll get some
- articles on other operating systems some day. Personally, I'd like
- to see VMS, MVS and OS-400. Any takers? ]
-
-
- -----------------------------------------------------------------------------
-
- I just finished reading issue 48, and congratulate you on some excellent
- techinical articles. I have only one (rather insignificant) comment:
- within the article #13 on project neptune, it was stated: "[the urgent
- pointer] is TCP's way of implementing out of band (OOB) data." Actually,
- URG pointers are in band (specification-wise), however most (but not all)
- TCP implementations map the URG flag to out of band. While this point is
- irrelevant to SYN flooding, I thought I would present it in case anyone who
- read the article is interested in pursuing any nuts & bolts transport layer
- implementations. Keep up the good work, and keep turning out more of this
- kind of technical information.
-
- ammit-thoth
-
- [ Point noted. Thanks! ]
-
-
- -----------------------------------------------------------------------------
-
- Listen... you've probably been noticing that I've mailed you guys a
- couple times asking for help with hacking. Before I have never recieved
- any mail back. You have got to please mail me back this time. I found
- something on accident that is really out of my league. You guys are the
- best I know of that might be able to help me. I really need your help on
- this one. I was fucken around on Telnet just typing in numbers in the
- Chicago area code. On accident I typed in numbers and I entered a NASA
- Packet Switching System ( NPSS). It said it was a government computer
- system and to leave right away. Please mail me back for the numbers. I
- need your help to get into this system.... I need yer help.
-
- [ Let me guess, you typed the prefix 321 instead of 312 while playing
- on Telenet. The systems you'll find on that prefix have been hacked
- at for nearly two decades now. Systems on the network were targeted
- in the 80's by Germany's Chaos Computer Club, and I personally know
- they have been poked at by groups in the US, UK and Australia
- starting back in 1981.
-
- What I'm trying to say is, after so many years of people beating on the
- same few systems, shouldn't you look for something a bit less stale? ]
-
-
- -----------------------------------------------------------------------------
-
- Dear phrack,
-
- I want to be added to the list. I was also wondering if you had ay
- publications or information on TEMPEST monitoring? Also know as Van Eck
- monitoring.
-
- [ We published a Dr. Moeller's paper continuing on Van Eck's work
- in Phrack issue 44.
-
- You might also want to check out http://www.thecodex.com
- for a self-contained anti-tempest terminal for about 10K. ]
-
-
- -----------------------------------------------------------------------------
-
- I just read your editorial in Phrack 48 and I feel like giving you my two=
- cents
- worth. I think you did an excellent critique on the "scene." As a person
- who has been watching for a while, and as a person who has been through it,
- I found it nice, to say the least, to find others who actually seem to have
- their head on straight. This letter was originally much longer, but I
- shortened it because I think you get the point.
-
- I started programming computers in 1983 at the age of 6. I was running
- DOS 2.0 and I had a blazing fast 1200 baud modem. At the time, I had
- no mentors, no teachers, no friends that could teach me how to use that
- incredible machine. The books of the time were cryptic, especially for an
- age where most children could not read, much less program. But I did my=
- best.
- Ten years later, I was still on my own.
-
- I didn't get ahold of a copy of Phrack until 1991. I thought it was really
- cool that people like me would get together and exchange infomation, talk
- computers, etc.
-
- In '94, I got into viruses and prolly was one of the better independant
- (i.e. not in a group) writers. It was about that time I got onto IRC.
- Most of the time I would hang out in #virus, but every now and then I
- would pop into #hack. I never stayed...I couldn't stand the arrogance.
-
- Shortly before I went to school, I was in competition for control of a
- new freenet versus a local hacker group. A month after I went to college,
- that group got busted. I got lucky.
-
- Earlier this year, I went on Good Morning America to talk about viruses.
- Looking back, it is prolly the single dumbest thing I have done in my
- whole life.
-
- As much as I wanted to, I've never been to a 2600 meeting, never been to
- a Con. Never really had any hacker friends. It's always been just me.
- I'm sure I know less about breaking into computers than the guy who has
- been doing it for a week but has access to tons of partners. But I still
- consider myself a hacker. My interest has been one of learning about the
- system. I've been learning longer than most. I rarely break into
- a system. I have access to unix systems, and even a VAX. I don't want
- the latest hacking tools. I write my own, with my theories. I don't
- need much else. But I've never had anyone to share it with. But I think I
- realize that the past is the past, and I won't ever get to attend the old
- cons or sit on conference calls, as much as I'd love to. I won't bother
- with the latest cons because I can get the same stuff at a college party.
-
- Well, that is about it. I apologize if it is poorly written. Bad english
- skills :) I hate writing these because I grow tired of getting slammed
- by some arrogant asshole. Thats prolly why I have been doing this alone
- for 13 years. After your editorial, I wonder how many people will stop
- showing up at the cons...I hate the isolation, but I would never want to
- be a part of a "scene" which has turned from mature goals to juvenile
- ones. Just my thoughts...
-
- Evil Avatar
-
- [ Actually, I have more respect for the people who continue to stay in the
- fringes, learning on their own rather than scurrying for attention
- in the media and in the community. (Yes, like me.)
-
- To be fair though, don't sell yourself short by avoiding Cons if you
- really want to check them out. Despite all the ranting I did in that
- editorial, I still have many friends in the community and enjoy
- meeting new ones at conferences. Not everyone thinks it is cool
- to trash a hotel, or to try to out "elite" one another. Unfortunately,
- the loudest and most visible people at such events tend to be the
- most juvenile. If you find this happening, do what I do: get the
- hell out of the conference area and find a convenient bar. The older
- hackers will eventually find you there, and you can all drink in peace
- and actually talk unmolested. ]
-
- -----------------------------------------------------------------------------
-
-
- Dear Phrack --
-
- Been a reader since the 80s, and I'm one of the originals... Would like
- to submit a poem that I wrote that details the experience of a hacker
- who left the scene for several years -- Coming back to find it in utter
- Dissaray... Definitely not the way he left it... Well -- You guys will
- let me know what you think
-
- "Where Have All The Hackers Gone"?
- ----------------------------------
-
- Original Poetry by: Jump'n Jack Flash -916-
-
-
- On a cold night in the dead of winter a soul stumbles into #hack and asks:
- 'Where have all the Hackers Gone?'
-
- Immediately the group recognizes him as one of the originals.
-
- 'Help us change our grades!' a voice calls out from the huddled masses.
- 'Help me hack root on a NYNEX system!' another voice asks.
-
- The soul clutches his bowed head and covers his ears, trying to remember
- back to before he involuntarily left the scene a few years ago.
-
- 'The only thing that kept me sane while I was imprisioned was the
- thought of seeing my friends and fellow hackers, now I demand you tell
- me Where Have All The Hackers Gone?' the soul begs the crowd of jubulent
- newbies.
-
- Silence is the only answer he receives,
- For there are no real hackers here.
-
- Then a voice speaks up and says,
- 'They're gone! You're the first we've seen!'
- The soul asks,
- 'What do you mean?'
-
- And Silence is the only answer he receives,
- For there are now real hackers here.
-
- And like a wall crumbling down it comes to him and he falls to his knees,
- like hunting for human life after a Nuclear war he stumbles out of the room,
- And he hurries to the place where only the Elite could go just a few years=
- ago,
- But when he arrives he is shocked and amazed,
- There are no hackers here on this dark winter day.
-
- And he stumbles into traffic,
- feeling the snow crunch beneath his feet,
- and he shouts into the night for the elite,
-
- 'Where Have All The Hackers Gone?'
-
- And Silence is the only answer he receives,
- For there are no real hackers here.
-
- [ Nice poem man...thanks!
-
- Where did the hackers go? They grew up and got real jobs... ]
-
- -----------------------------------------------------------------------------
-
- I'd love to say that I'll miss Erik, but after that obnoxious, immature
- rant, all I can say is good riddance. Now maybe Phrack will be useful
- again.
-
- [ Well, I guess not everyone agrees with me, which is a good thing.
- But, uh, I'm not gone man...just narrowing my duties...so fuck you. :) ]
-
- -----------------------------------------------------------------------------
-
-
- '' WARNING ''
- COVERT EXTERMINATION OF THE POPULATION. !!!=20
- THE UNITED NATIONS=3DNEW WORLD ORDER HAS TURNED AMERICA INTO A
- EXTERMINATION CAMP. THE PENTAGON GERM '' AIDS '' WAS CREATED
- AT A GERM WARFARE LAB AT FT, DETRICK, MD. AIDS AND CANCER CELLS
- ARE BEING INJECTED INTO PEOPLE UNKNOWING UNDER THE GUISE OF VACCINES
- AND SOME PHARMACEUTICALS.
-
- SOMETIMES THE TRUTH IS SO UGLY WE DO NOT WANT TO BELIEVE IT. !!
- AND IF WE DO NOTHING, THEN WE DESERVE IT. !
- BELIEVE IT OR NOT. DISTRIBUTE WIDELY.
- '' HACK OR CRACK THE UNITED NATIONS =3D NEW WORLD ORDER. ''
- LONG LIVE THE POWER THROUGH RESISTANCE.'' !!!
-
- SONS OF LIBERTY MILITIA
- 312 S. WYOMISSING, AVE.
- SHILLINGTON, PA. 19607 U.S.A.
- 610-775-0497 GERONIMO@WEBTV.NET
-
- [ It's about time we got some mail from some kind of Militia-types!
- Let's all arm up to prepare for the revolution! A healthy dose
- of AK-47's and PGP will save us all from the ZOG hordes when the
- balloon goes up.
-
- Hey, have you guys read the Turner Diaries by Andrew Macdonald?
- Get it from Barricade Books, 150 5th Ave, NY, NY 10011.
-
- Ahem. ]
-
- -----------------------------------------------------------------------------
-
- i want a credit card generator
-
- [I want a pony]
-
- -----------------------------------------------------------------------------
-
- Hello !!!
-
- I just read in P48-02 the letter of the russian subscriber who tells you=20
- (the editors) the story about the FAPSI and they plan to order all=20
- ISPs to provide for a possibilty for them to read all the mail.
-
- In the editor's note below that you say that you fear your country (I assume
- it's the USA) is also heading towards that goal.=20
-
- Well, I live in Germany, and it has already happened here. That means,=20
- every ISP (and this is not the exact term, as it also includes all sorts
- of information providers, ie telephone companies - but excludes=20
- private BBSs, I believe) are forced to provide a method that not only
- - Allows the government/police to read everything that is written but also
- - Without even the ISP noticing it (though I don't know how this would=20
- be ensured, technically).
- =20
- OK, this is not the same as in Russia, as they don't copy ALL the mail and=
- =20
- news, but only that of persons suspected of a crime strong enough=20
- to allow it, ie it's the same thing that's needed to open people's=20
- mails. Still, I feel it's certainly a step in the wrong direction.
-
- Note that cryptography is not (yet ?) forbidden in de.
- =20
- Regards,=20
- =20
- Thomas=20
-
- [ Germany? Governmental rights violations? Say It isn't so! Should I get=
- my
- brown shirt out of the closet for my next visit to Berlin? :) ]
-
- -----------------------------------------------------------------------------
-
-
- Hello, I want to be a hacker and I need some help. I have read
- countless reports on UNIX, VMS, and all that other jazz but that still
- doesn't help me with my problem.
-
- I want to be able to hack into someone's home PC from my own home. Now,
- most PC's aren't capable of doing this but, this person has a
- connection on the internet and is also linked to his work in LONDON,
- ONTARIO at a place called IAPA. (industrial accident prevention
- association) Anyway, he runs WINDOWS 95' and is using NETCOM. Now I
- know his password if that does me any good, but how do I go about doing
- this?
-
- SHAOULIN
-
- [ When you say "I want to hack his home PC" what do you mean?
-
- Just because he uses NETCOM, that doesn't mean you can find him. He is
- probably being assigned a dynamic IP address each time he calls in to the
- network. Even so, let's say you can discern his IP address. Even if
- a computer is hooked into the Internet, it is only as insecure
- as the services it offers to the world.
-
- If your friend is running Windows 95, then you may only be limited
- to attacking any SMB-style shared directories or perhaps via FTP.
- In either case, if you know this person's password, then you can
- probably read/write anything you want to on their system.
- Run a port scanner against it and see what you can access, and
- plan based on that. ]
-
- -----------------------------------------------------------------------------
-
- This message was sent to you by NaughtyRobot, an Internet spider that
- crawls into your server through a tiny hole in the World Wide Web.
- =20
- NaughtyRobot exploits a security bug in HTTP and has visited your host
- system to collect personal, private, and sensitive information.
- =20
- It has captured your Email and physical addresses, as well as your phone
- and credit card numbers. To protect yourself against the misuse of this
- information, do the following:
- =20
- 1. alert your server SysOp,
- 2. contact your local police,
- 3. disconnect your telephone, and
- 4. report your credit cards as lost.
- =20
- Act at once. Remember: only YOU can prevent DATA fires.
- =20
- This has been a public service announcement from the makers of
- NaughtyRobot -- CarJacking its way onto the Information SuperHighway.
-
- [ Funny, my phone isn't ringing, and my credit is still only as screwed up
- as it was when I got through with it. ]
-
- -----------------------------------------------------------------------------
-
- Hi
-
- I'm looking for some cellular pheaking information
- but is verry hard to find god information
- can giveme something to work on??? :-)
-
- [ The best site going is Dr. Who's Radiophone site at:
-
- http://www.l0pht.com/radiophone ]
-
- -----------------------------------------------------------------------------
-
- I just have a question to ask. How would I bypass Surfwatch so that I
- can go into web sites that I would like to see?
-
- [ It is very easy to bypass SurfWatch. Stop using Mommy & Daddy's computer
- and buy one of your own. ]
-
- -----------------------------------------------------------------------------
-
- i was recently using A-Dial a couple of months ago, and came up with about
- 10 or 12 different numbers starting at 475-1072. Curious about this, I
- called one back, using a mini-terminal. What I expected wasn't this. What
- it said is in the file attached to the letter. It says the same thing with
- all of the numbers. I could use some info on what the hell this is, because
- I never heard of Annex. Thanx.
-
- Data Case
-
- [ What you have connected into is more than likely a kind of terminal
- server. From there you can usually enter a system name to connect
- directly into the specified system, or enter in "cli" to go into the
- command line interpreter where you have more options to choose from
- including "help." ]
-
-
- -----------------------------------------------------------------------------
-
-
- Do you know where I can find texts on hacking into the California=20
- Department of Motor Vehicle Records? My friend's identity was stolen=20
- for credit card fraud and the person who did it even went so far as to=20
- get a CA driver's license to impersonate her. The worst part is that=20
- Visa won't release a copy of the fraudulent person's fake driver's=20
- license to my friend, so she can't find out who this person actually is.=20
- Do you know of any other ways we can get this person?
-
- Binky
-
- [ Gee, Binky. If VISA is involved and it was credit card fraud, then
- is the Secret Service involved too? If so, then why on earth do you
- (or your friend) want to get in the middle of it? You'll know soon
- enough who the person is when they get charged, or is this just a
- Charles Bronson style vigilante thing?
-
- California's DMV (as well as most public records databases in that
- state) is kept somewhat restricted to public queries due to the large
- number of celebrities living in the state, or otherwise you could just
- go buy the information directly from the state.
-
- If you're thinking about pulling a "Mitnick" and breaking into such
- a database, then you better know something about IBM mainframes and
- know how to defeat RACF. Or be willing to dig around in the trash
- until you locate a valid account. Even if you find a valid RACF userid,
- you will have 3-5 tries per account to guess a valid password until the
- account is locked out (which of course will let them know you were
- trying to hack them.)
-
- For an easier solution, you might want to looking in the yellow pages
- for a private investigator and have them do a search on Information
- America or NIA and get the listing for you, or bribe a civil servant. ]
-
-
- -----------------------------------------------------------------------------
-
-
- EOF
-
-
-