home *** CD-ROM | disk | FTP | other *** search
-
-
- ==Phrack Inc.==
-
- Volume Three, Issue Thirty-five, File 10 of 13
-
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
- PWN PWN
- PWN Phrack World News PWN
- PWN PWN
- PWN Issue XXXV / Part One PWN
- PWN PWN
- PWN Compiled by Dispater PWN
- PWN PWN
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
-
- Welcome to another edition of Phrack World News. Read this issue very
- carefully because it is full of very important stories about a multitude of
- different issues. Special thanks goes to Dark OverLord, Stainless Steel
- Provider, and Private Citizen for their help in preparing this issue.
- _______________________________________________________________________________
-
- XMASCON 1991
- ~~~~~~~~~~~
- NIA Magazine & Phrack Inc. present:
-
- The Second Annual
-
- X M A S C O N
-
-
- Who: All Hackers, Journalists, Security Personnel, Federal Agents, Lawyers,
- Authors and Other Interested Parties.
-
- Where: Houston Airport Hilton Inn
- 500 North Belt East
- Houston, Texas 77060
- U.S.A.
- Tel: (713) 931-0101
- Fax: (713) 931-3523
-
- When: Friday December 27 through Sunday December 29, 1991
-
-
- Yes, ladies and gentlemen, you read it right... Xmascon has returned! This will
- undoubtedly be the telecom event of the year. Unlike certain conferences in the
- past, Xmascon 91 has a devoted and dedicated staff who are putting in an
- unmentionable amount of time to ensure a large, vast and organized collection
- of some of the most diversified people in the telecommunications world. The
- event will be open to the public so that anyone may attend and learn more about
- the different aspects of computer security.
-
-
- Hotel Information
- -----------------
-
- The Houston Airport Hilton Inn is located about 6 miles from Intercontinental
- Airport. The Xmascon group room rates are $49.00 plus tax (15%) per night, your
- choice of either single or double. There are also 7 suites available, the
- prices of which vary from $140 to $250. You can call the hotel to find out the
- differences and availability of the suites, and you will also NEED to tell them
- you are with the Xmascon Conference to receive the reduced room rate,
- otherwise, you will be paying $69.00. There is no charge for children,
- regardless of age, when they occupy the same room as their parents. Specially
- designed rooms for the handicapped are available. The hotel provides free
- transportation to and from the airport, as well as neighboring Greenspoint
- Mall, every 30 minutes on the hour, and on call, if needed. There are 2
- restaurants in the hotel. The Wicker Works is open until 11:00 pm, and The
- Forty Love is open 24 Hours. There will also be breakfast, lunch and dinner
- buffets each day. There is a piano bar, The Cycle Club, as well as a sports
- bar, Chaps, which features numerous table games, large screen TV, and a disco
- with a DJ. Within the hotel compound, there are 3 pools, 2 of which are
- indoors, a jacuzzi, a miniature golf course, and a fully equipped health club
- which features universal weights, a whirlpool and sauna. A car rental agency
- is located in the hotel lobby, and you can arrange to pick your car up at
- either the airport or the hotel. Xmascon attendees are entitled to a discounted
- rate. Contact the hotel for more information.
-
- Xmascon will last 3 days, with the main conference being held on Saturday,
- December 28, in the Osage meeting room, starting at 12:00 p.m. and continuing
- on throughout the evening. This year, we have our own complete wing of the
- hotel, which is housed around a 3,000 square foot atrium ballroom. The wing
- is completely separated from the rest of the hotel, so we are strongly
- encouraging people to make their reservations as far in advance as possible
- to ensure themselves a room within our area.
-
- We are hoping to have a number of people speak on a varied assortment of
- topics. If you would like to speak, please contact us as soon as possible and
- let us know who you are, who you represent (if anyone), the topic you wish to
- speak on, a rough estimate of how long you will need, and whether or not you
- will be needing any audio-visual aids.
-
- There will be a display case inside the meeting room which will hold items of
- telecom interest. Specific items that will be available, or that we hope to
- have, include the first issues of 2600, Tap, Mondo 2000, and other magazines,
- non-computer related magazines that feature articles of interest, a wide array
- of boxes, the Quaker Oats 2600 mhz whistle, The Metal AE, etc. We will also
- have a VCR and monitor set up, so if you have any interesting videos (such as
- the Unsolved Mysteries show featuring Kevin Poulsen), or if you have anything
- you think people would enjoy having the chance to see, please let us know ahead
- of time, and tell us if you will need any help getting it to the conference.
- If all else fails, just bring it to the con and give it to us when you arrive.
-
- If anyone requires any additional information, needs to ask any questions,
- wants to RSVP, or would like to be added to the mailing list to receive the
- Xmascon updates, you may write to either myself (Drunkfux), Judge Dredd, or
- Lord Macduff via Internet at:
-
- nia@nuchat.sccsi.com
-
- Or via US Mail at:
-
- Hard Data Corporation
- ATTN: HoHo
- P.O. Box 60695
- Airport Mail Facility
- Houston, Texas 77205-9998
- U.S.A.
-
- We will hopefully have an 800 mailbox before the next update is sent out. If
- someone cares to donate a decent one, that will stay up throughout the end of
- the year, please let us know. We should also be listing a few systems as an
- alternative form of reaching us.
-
- Xmascon 91 will be a priceless learning experience for professionals, and gives
- journalists a chance to gather information and ideas direct from the source. It
- is also one of the very few times when all the members of the computer
- underground can come together for a realistic purpose. We urge people not to
- miss out on an event of this caliber, which doesn't happen very often. If
- you've ever wanted to meet some of the most famous people from the hacking
- community, this may be your one and only chance. Don't wait to read about it in
- all the magazines, and then wish you had attended, make your plans to be there
- now! Be a part of our largest and greatest conference ever.
-
- Remember, to make your reservations, call (713) 931-0101 and tell them you're
- with Xmascon.
-
- In closing... if you miss this one, you're only cheating yourself.
- _______________________________________________________________________________
-
- MindRape Revisited September 27,1991
- ~~~~~~~~~~~~~~~~~
- >From Arizona State University State Press
- Further Reading: Phrack Issue 34, File 11, "MindRape or MediaRape?"
-
- An Arizona State University (ASU) student is one of seven suspects in a
- computer fraud scheme that one US West Communications official said could cost
- the carrier and the phone company as much as $5 billion in one year.
-
- Police in Phoenix, Arizona have seized computer equipment, software, and a
- list of long distance calling card codes from the home of the unidentified
- 19-year-old student.
-
- The student is one of seven people -- three in Oregon and one each in
- Washington, Utah, and Iowa -- singled out as suspects in a month-long
- investigation of electronic phone fraud conducted by Phoenix police, said Jim
- Waltman, a fraud manager for US West Communications. The Phoenix man has not
- been arrested.
-
- The computer "hackers" allegedly used their computers to gain access to
- secret long distance phone access codes such as the ones found on calling
- cards, and sold codes to other students for profit.
-
- US West officials told the Associated Press that it is unknown how many
- local customers have been wrongfully billed for long distance calls on their
- accounts.
-
- Kevin Robinson, public information sergeant for the Phoenix Police
- Department, would not comment on the investigation.
-
- Art Carter, dean of Student Life at Arizona State University (ASU), said
- that if the student is charged, the case will be reviewed under the ASU Code of
- Conduct and the action taken by the University will be determined at that time.
-
- Mark Knighton, security director for LDL Long Distance, said his company
- and US West were able to trace calls to several location, including the home of
- the Phoenix man.
-
- The Phoenix man has not been arrested, authorities said.
-
- Waltman said he was with Phoenix police a week ago when they searched the
- north Phoenix home and uncovered what turned out to be an inexpensive and
- relatively simple system for getting free codes.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- Editor's Comment by: Dispater
-
- What MindRape has been charged with cannot be determined now. A request
- must be submitted to Arizona Public Records and be considered for release to
- the requestor.
-
- Here are some possibly useful numbers:
-
- Arizona Special Investigations Division (602)542-4853
- County Attorney's Office (602)262-3411 (Gail Thackeray)
- Arizona Republic Newspaper (602)271-8000
- Phoenix Police Department
- - General Investigations (602)262-6141
- - Police Information (602)262-7626
- - Police Records (602)262-6134
- _______________________________________________________________________________
-
- East Coast LOD Hackers Create Virtual Reality MAELSTROM
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- "It's reached the point where hacking is counter-productive."
-
- If the 1980's were the decade that hackers emerged from their relative
- obscurity as computer oddities, to be transformed in the public's perception as
- front-page news -- then the 90's are shaping up to be the decade of hacker
- turned entrepreneur. Lately the notorious hacker group Legion of Doom seems to
- be a particularly fertile spawning ground for ex-hackers turned
- young-businessman.
-
- Two former East-Coast Legion of Doom members, Bruce Fanscher <Dead Lord> and
- Patrick Krupa <Lord Digital>, have pooled their talents to form a new company
- in the burgeoning field of Virtual Reality.
-
- The arena of Virtual Reality has often been called technology in search of a
- purpose and at times resembles nothing more than an interactive movie meets
- videogame. This chaotic state of affairs has led to a never-never land of
- incompatible technologies and far-out ideas, that have tremendous potential,
- but little commercial application at present. Fanscher and Krupa plan to
- change all that. "VR isn't anything new, it's something we've been living for
- over half our lives. The only difference is the state of current technology,
- makes possible an incredible variety of application." said Krupa in an
- interview. "Right now we're in the ideal position to move forward on ideas
- we've been working on for years," added Fanscher.
-
- Krupa, who had attained the status of cult figure in the hacker underground
- prior to his arrest, as chronicled by John Markoff (New York Times) technology
- columnist, has spent the last several years working in the very lo-tech world
- of theater, "Basically I was totally burnt out on computers. I mean I don't
- give a damn if my word processor boots in one second instead of eight, and
- that's the only place anything was heading for a long time. The NeXT has
- changed all that and brought to market something truly innovative, although I
- still don't care too much about technology as anything but a medium through
- which you can reach people and affect their experiences and perceptions."
-
- No stranger to creative innovation himself, Fanscher, Krupa's longtime
- compatriot, has spent his share of time in the somewhat murky spotlight of the
- hacker underground. Musing about his days as a hacker delving into computer
- systems to see how they worked, Fanscher remarked that:
-
- "It's reached the point where hacking is counter-productive. You can
- only take apart things other people have designed and see what makes
- them work, for so long, before it becomes an exercise in boredom and
- the time comes to use what you've learned to create something new
- that nobody has ever seen before. My current interest in other
- people's systems is zero. It was a useful learning experience for me,
- but there's no future in it."
-
- This oddly charismatic, dynamic duo is rounded out by Delia Kopold a former
- actress and theater major who is the architect of the worlds that make
- MAELSTROM come alive. This initial offering by the collection of talents will
- be an online system run on the NeXTcube supermicro -- a machine that looks more
- like a piece of modern art than a computer -- that offers enhanced versions of
- all the usual amenities like electronic messaging, file transfers, and
- networking, all revolving around MAELSTROM, a program Fanscher calls, "a
- real-time virtual interaction simulation engine." MAELSTROM will initially
- take the form of an extremely detailed fantasy world complete with custom
- graphic programs that run on MS-DOS, Macintosh and Amiga computers, allowing
- users to tap into the NeXTcube's system architecture through their home
- computers connected to telephone lines. "Maelstrom isn't really a fantasy
- game, it's actually a universal engine comprised of objects that can be
- accessed by a variety of graphic, sound and data files to create just about any
- multi-user reality you can dream up," explains Krupa.
-
- The MAELSTROM system is about to go through a short beta-test run in New York
- City prior to a national ad campaign that will herald its universal
- accessibility on packet switch. "Our beta system already offers everything
- that competing services offer, but at a much lower cost -- and we're still
- adding features. And nothing like Maelstrom has ever existed before, the
- technology just wasn't there," concludes Fanscher.
- _______________________________________________________________________________
-
- 2600 Magazine Exposes Security Holes October 18,1991
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by John F. McMullen & Barbara E. McMullen (Newbytes)
-
- Armonk, New York -- Supported by videotape examples, Emmanuel Goldstein, editor
- and publisher of 2600 Magazine: The Hacker Quarterly, told those in attendance
- at an October 17th New York City press conference that "the American public is
- often lulled into a false sense of security; a security that is often not
- supported by the facts of specific cases."
-
- The videotapes, produced by 2600 and provided to the press show both the
- intrusion of a Dutch "hacker" in to United States Military computers and what
- Goldstein alleges is the fallibility of a brand of mechanical, pushbutton locks
- used by, among others, New York State University sites, Federal Express, United
- Parcel Service, JFK International Airport, IBM and NASA.
-
- Goldstein told Newsbytes "We invested considerable time and money to wake
- people up to the fact that we have a false sense of security when it comes not
- only to computer networks but to physical safety as well."
-
- The tape of the Dutch "hacker" was made by Goldstein while in Europe. and shows
- the intrusion into a Unites States Army computer system. The intruder was able
- to set up a fictitious account called "danquayle" and, once into the system,
- was able to obtain "root" privileges thus giving him total control of the
- workings of the system.
-
- A portion of this tape had previously been shown with Goldstein's approval on
- an episode of the Geraldo Rivera television show "Now It Can Be Told".
- Goldstein told Newsbytes that one^S^Q reason for his release of the entire tape to
- the press was his feeling that the Rivera episode entitled "The Mad Hacker's
- Key Party" had distorted the message of the tape -- "This was not a case of a
- terrorist break-in but was rather simply a demonstration of the lack of
- security of our systems. To find root accounts with password like "Kuwait" and
- lack of sophisticated security in our military computers should be of real
- concern and should not be lost in an exploitation of the 'hacker' issue."
-
- A background paper provided at the conference by 2600 explains the entire
- intrusion effort in detail and states "The purpose of this demonstration is to
- show just how easy it really was. Great care was taken to ensure that no
- damage or alteration of data occurred on this particular system. No military
- secrets were taken and no files were saved to a disk by the hackers. What is
- frightening is that nobody knows who else has access to this information or
- what their motivations might be. This is a warning that cannot be taken
- lightly."
-
- The second videotape show Goldstein and other 2600 staff opening seemingly at
- will locks manufactured by Simplex Security Systems. The locks of the
- mechanical pushbutton combination variety were shown to be installed at the
- State of New York University at Stony Brook, JFK International Airport and on
- Federal Express and United Parcel pick-up boxes throughout the New York
- Metropolitan area.
-
- In the film, Goldstein is shown filling out a Federal Express envelope for
- delivery to 2600 Magazine and inserting in the Fedex dropbox. He then lifts
- the weather protection cover on the box's lock and keys a combination that
- allows him to open the lock and remove his envelope. Scott Skinner, a SUNY
- student and 2600 staff member told Newsbytes that it had actually taken the
- staff 10 minutes to determine the proper code combinations to open the lock.
-
- Skinner explained, "While Simplex prefers people to think that there is an
- endless number of permutations to the lock, there are actually only 1,085. In
- most cases, even this number is greatly reduced -- if one knows that only three
- buttons are being used, it reduces the possibilities to 135. Additionally, we
- found that, once we had the combination to one Federal Express dropbox, it
- worked in every other one that we tried in the New York area."
-
- Goldstein told Newsbytes "When we contacted Simplex, they first denied that the
- locks were unsafe and then said that the permutations were much greater. After
- some discussion, they admitted that the 1,085 figure was correct but said that
- it would take a person with a complete listing of the combinations over four
- hours to try them all. Our experience obviously shows that they may be opened
- in a much shorter time than that."
-
- Goldstein also pointed out that, "although a $5 Master combination lock may be
- broken by a crowbar, it is a much more secure combination device. It has
- 64,000 combinations compared to the 1,085 with the Simplex."
-
- Goldstein continued, "One of the real problems is that, should a person have
- the misfortune to be robbed, entry due to a failure of the Simplex lock gives
- no evidence of a forcible break-in and police and insurance companies often put
- the blame on the homeowner or office manager for 'giving away the combination.'
- It really can create a problem."
-
- Skinner told Newsbytes "I'm really concerned about t^Shis. I'm a student at
- SUNY, Stony Brook and all our dormitories use these locks as the only means of
- security. I've shown the problem to Scott Law who is responsible for residence
- security but he has discounted the problem and said that the locks were
- installed at the recommendation of the campus locksmith. The locksmith, Garry
- Lenox contradicts Law and says that he recommended against these locks years
- ago and said that they were not secure for dormitory use." Skinner said that
- he will write an article for the college newspaper in an attempt to raise
- consciousness about this problem.
-
- Goldstein also said that he intends to publish the list of valid combinations
- in an up-coming iss^Que of 2600 to demonstrate to the public the problems with
- the lock. He further said that he will raise the issue on his weekly radio
- show, "Off The Hook", heard on New York's WBAI-FM.
-
- In response to a Newsbytes question concerning how the 2600 staff happened to
- become involved in a problem with locks, Goldstein said, "We're hackers and
- when we see something with buttons on it, whether it's a computer or not, we
- tend to try it. While the average person tends to accept that things are
- secure just because he is told that they are, hackers will usually try them
- out. It's because of this 'trying out' that we can point out the problems with
- both the US military computer security and this lock -- and we feel that, in
- both cases, we have performed a service. People should be aware when they are
- at risk so that they may take action to correct it."
- _______________________________________________________________________________
-
- Questions Exist On Israeli Break-In Of US Systems September 10,1991
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Barbara E. McMullen & John F. McMullen (Newsbytes)
-
- NEW YORK -- Amidst reports of the intrusion by an Israeli national into United
- States military computer systems, there have been conflicting accounts of the
- extent and nature of the invasion.
-
- According to wire services, Deri Schriebman, an 18 year-old graduate of
- Israel's Technion Institute and a native of the northern Israeli city of
- Carmiel, was arrested by Israeli police for allegedly breaking into US military
- computers and commercial credit card systems. Israeli spokes person Eitan Raz,
- commenting on the equipment found at Schriebman's home for allegedly making
- free overseas phone calls, was quoted as saying "This was a very complex
- system. It was the first time such technology was discovered in Israel."
-
- Newsbytes has ben able to confirm with sources that a trail of credit card
- fraud in the United States and Canada led investigators to Schriebman but has
- not been able to confirm that Schriebman, as reported in Israeli press, was
- able to access classified Pentagon information concerning Patriot missiles
- during the recent Gulf War. A US government investigative official told
- Newsbytes that, while his agency has formally requested documentation of the
- events from the Israeli police, that there seems to have been no contact to
- date between any US service and the Israeli investigators.
-
- Other investigative sources have told Newsbytes that the investigation into
- Schriebman's activities began in May 1991 when two Quebec teenagers were
- arrested for purchasing goods through the use of stolen credit card
- identification. The teenagers told Canadian authorities that they had received
- the information from a source in Carmiel, Israel and the authorities notified
- Israeli police. According to the Israeli reports, Schriebman admitted the
- intrusion into credit card files and the subsequent dissemination of codes but
- denied making any use of the information. He was quoted as saying that his
- cracking into the systems was done only out of curiosity.
-
- A "hacker" source told Newsbytes that underground bulletin boards utilized for
- the exchange of such credit information are often frequented by foreign
- nationals. He said that the most frequent visitors come from Australia, Israel
- and Germany and that many of the Israelis identify themselves as have a
- connection with the Technion Institute.
- _______________________________________________________________________________
-
-