home *** CD-ROM | disk | FTP | other *** search
- ==Phrack Inc.==
-
- Volume Four, Issue Thirty-Nine, File 1 of 13
-
- Issue XXXIX Index
- ___________________
-
- P H R A C K 3 9
-
- June 26, 1992
- ___________________
-
- ~You're Not Dealing With AT&T~
-
- Welcome to Phrack 39. This will be the final issue before SummerCon '92.
- Details of SummerCon will appear in our special anniversary issue due late this
- summer -- Phrack 40. Rumor also has it that the next issue of Mondo 2000 will
- contain some type of coverage about SummerCon as well!
-
- Phrack has been receiving an enormous amount of mail containing questions and
- comments from our readers and we really appreciate the attention, but we don't
- know what to do with it all. Phrack Loopback was created to address letters of
- this sort, but in a lot of cases, the senders of the mail are not indicating if
- their question is to be posted to Loopback or if they are to be identified as
- the author of their question in Loopback.
-
- Dispater has been moving all across the country over the past couple of months,
- which is the primary reason for the delay in releasing this issue. However,
- now that he is settled, the fun is about to begin. He will be responding to
- your mail very soon and hopefully this will all be sorted out by issue 40.
- For right now, you can enjoy a variety of special interest articles and letters
- in this issue's Loopback, including "A Review of Steve Jackson Games' HACKER"
- by Deluge. Special thanks goes out to Mentor and Steve Jackson for a copy of
- the game and the totally cool looking poster. "Association of Security
- Sysadmins" is my favorite! ;)
-
- Another problem situation that needs to be mentioned has to do with would-be
- subscribers. For some reason the "phracksub@stormking.com" account has been
- receiving hundreds of requests from people who want to be added to the
- subscription list. This isn't how it works. You must subscribe yourself, we
- can't and won't do it for you. The instructions are included later in this
- file. Up till this point we have been informing people of their error and
- mailing them the instructions, but we will ignore these requests from now on.
- Anyone with an intelligence level high enough to enjoy Phrack should be capable
- of figuring out how to subscribe.
-
- Phrack Pro-Phile focuses on Shadow Hawk 1 -- The first hacker ever to be
- prosecuted under the Computer Fraud & Abuse Act of 1986. A lot of people don't
- realize that Robert Morris, Jr. was not the first because Shadow Hawk 1 was
- tried as a minor and therefore a lot of details in his case are not publicly
- known. Something to point out however is that the same people (William J. Cook
- and Henry Klupfel) that were responsible for prosecuting SH1 in 1989, came back
- in 1990 to attack Knight Lightning... but this time the government and Bellcore
- didn't fare as well and now both Cook and Klupfel (among others) are being sued
- in Federal Court in Austin, Texas (See Steve Jackson Games v. United States).
-
- Now, before anyone starts flying off their keyboards screaming about our
- article "Air Fone Frequencies" by Leroy Donnelly, we will let you know what's
- what. Yes, the same article did recently appear in Informatik, however, both
- publications received it from the same source (Telecom Digest) and Informatik
- just had an earlier release date. At Phrack, we feel that the information was
- interesting and useful enough that our readers deserved to see it and we do not
- assume by any means that everyone on the Phrack list is also a reader of
- publications like Telecom Digest or Informatik.
-
- Phrack's feature article in this issue is "The Complete Guide To The DIALOG
- Information Network" by Brian Oblivion. Our undying gratitude to Mr. Oblivion
- for his consistency in providing Phrack and its readers with entertaining
- quality articles... and we're told that the best is yet to come.
-
- Longtime fans of Phrack might recall that Phrack 9 had an article on Dialog
- services and it also had an article on Centigram Voice Mail. Now 30 issues
- later, both topics are resurrected in much greater detail.
-
- You will also note that the Centigram article in this issue is penned under the
- pseudonym of ">Unknown User<," a name that was adopted from the anonymous
- posting feature of the Metal Shop Private bulletin board (the birthplace of
- Phrack, sysoped by Taran King during 1985-1987). The name ">Unknown User<" has
- traditionally been reserved for authors who did not wish to be identified in
- any capacity other than to the Phrack editors. In this case, however, even the
- staff at Phrack has absolutely no idea who the author of this file is because
- of the unique way of SMTP Fakemail it was delivered.
-
- No Pirates' Cove in this issue. Be watching for the next Pirates' Cove in
- Phrack 40.
-
- - - - - - - - -
-
- Knight Lightning recently spoke at the National Computer Security Association's
- Virus Conference in Washington, D.C. His presentation panel which consisted
- of himself, Winn Schwartau (author of Terminal Compromise), and Michael
- Alexander (chief editor of ISPNews and formally an editor and reporter for
- ComputerWorld) was very well received and the people attending the conference
- appeared genuinely interested in learning about the hacking community and
- computer security. KL remarked that he felt really good about the public's
- reaction to his presentation because "its the first time, I've agreed to be on
- one of these panels and someone in the audience hasn't made accusatory or
- derogatory remarks."
-
- "It's inappropriate for you to be here."
-
- This was the warm reception KL and a few others received upon entering the
- room where the secret midnight society anti-virus group was holding a meeting.
- It appears that a small number of anti-virus "experts" have decided to embark
- on a mission to rid the country of computer bulletin boards that allow the
- dissemination of computer viruses... by any means possible, including the
- harassment of the sysops (or the sysops' parents if the operator is a minor).
-
- At Phrack, some of us feel that there are no good viruses and are opposed to
- their creation and distribution. Others of us (e.g. Dispater) just think
- viruses are almost as boring as the people who make a career out of
- exterminating them. However, we do not agree with the method proposed by this
- organization and will be watching.
-
- - - - - - - - - - -
-
- Special thanks for help in producing this issue:
-
- Beta-Ray Bill Crimson Flash (512)
- Datastream Cowboy Deluge
- Dispater, EDITOR Dokkalfar
- Frosty (of CyberSpace Project) Gentry
- The Iron Eagle (of Australia) JJ Flash
- Knight Lightning, Founder Mr. Fink
- The Omega [RDT][-cDc-] The Public
- Rambone Ripper of HALE
- Tuc White Knight [RDT][-cDc-]
-
- We're Back and We're Phrack!
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- HOW TO SUBSCRIBE TO PHRACK MAGAZINE
-
- The distribution of Phrack is now being performed by the software called
- Listserv. All individuals on the Phrack Mailing List prior to your receipt of
- this letter have been deleted from the list.
-
- If you would like to re-subscribe to Phrack Inc. please follow these
- instructions:
-
- 1. Send a piece of electronic mail to "LISTSERV@STORMKING.COM". The mail
- must be sent from the account where you wish Phrack to be delivered.
-
- 2. Leave the "Subject:" field of that letter empty.
-
- 3. The first line of your mail message should read:
- SUBSCRIBE PHRACK <your name here>
-
- 4. DO NOT leave your address in the name field!
- (This field is for PHRACK STAFF use only, so please use a full name)
-
- Once you receive the confirmation message, you will then be added to the Phrack
- Mailing List. If you do not receive this message within 48 hours, send another
- message. If you STILL do not receive a message, please contact
- "SERVER@STORMKING.COM".
-
- You will receive future mailings from "PHRACK@STORMKING.COM".
-
- If there are any problems with this procedure, please contact
- "SERVER@STORMKING.COM" with a detailed message.
-
- You should get a confirmation message sent back to you on your subscription.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Table Of Contents
- ~~~~~~~~~~~~~~~~~
- 1. Introduction by Dispater and Phrack Staff 12K
- 2. Phrack Loopback by Phrack Staff 24K
- 3. Phrack Pro-Phile on Shadow Hawk 1 by Dispater 8K
- 4. Network Miscellany V by Datastream Cowboy 34K
- 5. DIALOG Information Network by Brian Oblivion 43K
- 6 Centigram Voice Mail System Consoles by >Unknown User< 36K
- 7. Special Area Codes II by Bill Huttig 17K
- 8. Air Fone Frequencies by Leroy Donnelly 14K
- 9. The Open Barn Door by Douglas Waller (Newsweek) 11K
- 10. PWN/Part 1 by Datastream Cowboy 30K
- 11. PWN/Part 2 by Datastream Cowboy 27K
- 12. PWN/Part 3 by Datastream Cowboy 29K
- 13. PWN/Part 4 by Datastream Cowboy 29K
-
- Total: 314K
-
- "Phrack. If you don't get it, you don't get it."
-
- phracksub@stormking.com
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- Somebody Watching? Somebody Listening?
-
- *** Special Announcement ***
-
- KNIGHT LIGHTNING TO SPEAK AT SURVEILLANCE EXPO '92
- Washington, DC
-
- The Fourth Annual International Surveillance and Countersurveillance Conference
- and Exposition focusing on Information Security and Investigations Technology
- will take place at the Sheraton Premiere in Tysons Corner (Vienna), Virginia on
- August 4-7.
-
- The seminars are on August 7th and include Craig Neidorf (aka Knight Lightning)
- presenting and discussing the following:
-
- - Are law enforcement and computer security officials focusing their
- attention on where the real crimes are being committed?
-
- - Should security holes and other bugs be made known to the public?
-
- - Is information property and if so, what is it worth?
-
- Experience the case that changed the way computer crime is investigated
- and prosecuted by taking a look at one of America's most talked about
- computer crime prosecutions: United States v. Neidorf (1990).
-
- Exonerated former defendant Craig Neidorf will discuss the computer
- "hacker" underground, Phrack newsletter, computer security, and how it all
- came into play during his 7 month victimization by some of our nation's
- largest telephone companies and an overly ambitious and malicious federal
- prosecutor. Neidorf will speak about his trial in 1990 and how the court
- dealt with complex issues of First Amendment rights, intellectual
- property, and criminal justice.
-
- Security professionals, government employees, and all other interested parties
- are invited to attend. For more information please contact:
-
- American Technology Associates, Inc.
- P.O. Box 20254
- Washington, DC 20041
- (202)331-1125 Voice
- (703)318-8223 FAX
- _______________________________________________________________________________
-
-