home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 50.5 KB | 1,122 lines |
-
- ==Phrack Inc.==
-
- Volume Four, Issue Forty-One, File 2 of 13
-
- [-=:< Phrack Loopback >:=-]
-
- By Dispater & Mind Mage
-
- Phrack Loopback is a forum for you, the reader, to ask questions, air
- problems, and talk about what ever topic you would like to discuss. This is
- also the place Phrack Staff will make suggestions to you by reviewing various
- items of note; books, magazines, software, catalogs, hardware, etc.
-
- In this issue:
-
- Comments on Phrack 40 : Rop Gonggrijp
- Fine Art of Telephony (re: Phrack 40) : Inhuman
- Question & Comment (BT Tymnet/AS400) : Otto Synch
- BT Tymnet article in Phrack 40 : Anonymous
- Phrack fraud? : Doctor Pizz
- Remarks & Warning! : Synaps/Clone1/Feyd
- One Ron Hults (re: Phrack 38 Loopback) : Ken Martin
- Hacking In Czecho-Slovakia : Stalker
- Phrack 40 is Sexist! : Ground Zero
- Phrack 40 is Sexist!? (PC Phrack) : Shit Kickin' Jim
- Misunderstood Hackers Get No Respect : The Cruiser
- Hackers Should Land In Jail, Not In Press : Alan Falk
- Anonymous Usenet Posting? : Anonymous
- Anonymous Mail Poster : Sir Hackalot
- Phrack On The Move : Andy Panda-Bear
- Computer Underground Publications Index : Amadeus
- Pirates v. AT&T: Posters : Legacy Irreverent
- Ultrix 4.2 Bug : Krynn
- PumpCon Hosed : Phil "The Outlander"
- 2600 Meeting Disrupted by Law Enforcement : Emmanuel Goldstein
- Two New Hardcovers : Alan J. Rothman
- _______________________________________________________________________________
-
- Letters to the Editors
- ~~~~~~~~~~~~~~~~~~~~~~
- From: rop@hacktic.nl (Rop Gonggrijp) (Editor of Hack-Tic Magazine)
- Date: August 14, 1992
- Subject: Comments on Phrack 40
-
- My compliments! You've put out one of the best issues to date. If you keep
- this up I'll have to get jealous!
-
- Rop Gonggrijp (rop@hacktic.nl) Dangerous and capable of making
- fax: +31 20 6900968 considerable trouble.
-
- ----------
-
- From: Inhuman (Sysop of Pentavia BBS)
- Date: August 18, 1992
- Subject: Fine Art of Telephony
-
- I just wanted to let you guys know that the article titled "The Fine Art of
- Telephony" was one of the best articles I've seen in Phrack in a long time.
-
- I hope to see more information on switching and general telephony in the
- future.
-
- Thanks,
-
- Inhuman
-
- ----------
-
- Date: October 22, 1992
- From: Otto Synch
- Subject: Question & Comment
-
- Hello,
-
- Reading your (huge) Phrack issue #40, and noticing that you were accepting
- comments and questions, I decided to post mine. First of all, please forgive
- the English. I'm French and can't help it :-)
-
- My comment: When I saw in the index that this issue was dealing with BT
- Tymnet, I felt very happy because I was looking for such information. And when
- I read it, I felt really disappointed. Toucan Jones could have reduced his
- whole article with the following lines:
-
- -> Find any Tymnet number.
- -> Dial and wait for the "Please log-in:" prompt.
- -> Log as user "help", no password required.
- -> Capture everything you want, it's free public information.
-
- I must say I was a bit surprised to find this kind of article in a high-quality
- magazine such as yours...
-
- My question: I'm currently trying to find out everything about a neat AS/400
- I've "found," but I never saw any "hack report" on it. Do you know if there
- are any available?
-
- OK - Let's see if you answer. We feel somewhat lonely here in the Old
- Continent...but Phrack is here to keep the challenge up!
-
- Regards,
-
- > Otto Sync <
-
- ----------
-
- From: Anonymous
- Date: August 19, 1992
- Subject: BT Tymnet article in Phrack 40
-
- Dear Phrack Staff,
-
- The BT Tymnet article in the 40th issue of Phrack was totally lame. I hate it
- when people enter Telenet or Tymnet's information facility and just buffer all
- the sh*t that's in there. Then they have the audacity to slap their name on
- the data as if they had made a major network discovery. That's so f*ck*ng
- lame!
-
- Phrack should make a policy not to accept such lame sh*t for their fine
- magazine. Is Phrack *that* desperate for articles? Crap like commercial dial-
- up lists is about as lame as posting a few random pages from the front of the
- white pages. The information is quickly outdated and easily available at any
- time to anyone. You don't hack this sh*t.
-
- Regards,
-
- Anonymous (anonymous because I don't want to hear any lame flames)
-
- [Editor's Response: We agree that buffering some dialup list is not hacking,
- however, in this specific case, a decision was made that
- not everyone had ready access to the information or even
- knew of its existence. Furthermore and more relevant to
- why the article appeared in Phrack, an article on Tymnet
- was appropriate when considering the recent events with
- the MOD case in New York.
-
- In the future, you may ask that your letter be printed
- anonymously, but don't send us anonymous mail.]
-
- ----------
-
- From: Doctor Pizz
- Date: October 12, 1992
- Subject: Phrack fraud?
-
- I recently received an ad from someone who was selling the full set of Phrack
- back issues for $100.00. I do believe that this is a violation of your rights
- to Phrack, as he is obviously selling your work for profit!
-
- The address I received to order these disks was:
-
- R.E. Jones
- 21067 Jones-Mill
- Long Beach, MS 39560
-
- It seems he is also selling the set of NIA files for $50, a set of "Hacking
- Programs" for $40, LOD Tech Journals for $25, and lots of viruses. It sounds
- like some sort of copyright violation, or fraud, as he is selling public domain
- stuff for personal profit. At least you should be aware of this. Anyway, I
- look forward to receiving future volumes of Phrack! Keep up the good work.
-
- Good luck in stopping this guy!
-
- Thank you,
-
- --Doctor Pizz--
-
- [Editor's Note: We look forward to hearing what our Phrack readers think about
- people selling hardcopies of Phrack for their own personal
- profit.]
-
- ----------
-
- From: Synaps a/k/a Clone1 a/k/a Feyd
- Date: September 2, 1992
- Subject: Remarks & Warning!
-
- Hi,
-
- I've been a regular reader of Phrack for two years now and I approve fully the
- way you continue Phrack. It's really a wonderful magazine and if I can help
- its development in France, I'll do as much as I can! Anyway, this is not
- really the goal of my letter and excuse me for my English, which isn't very
- good.
-
- My remarks are about the way you distribute Phrack. Sometimes, I don't receive
- it fully. I know this is not your fault and I understand that (this net
- sometimes has some problems!). But I think you could provide a mail server
- like NETSERV where we could get back issues by mail and just by MAIL (no FTP).
-
- Some people (a lot in France) don't have any access to international FTP and
- there are no FTP sites in France which have ANY issues of Phrack. I did use
- some LISTSERV mailers with the send/get facility. Could you install it on your LISTSERV?
-
- My warning is about a "group" (I should say a pseudo-group) founded by Jean
- Bernard Condat and called CCCF. In fact, the JBC have spread his name through
- the net to a lot of people in the Underground. As the Underground place in
- France is weak (the D.S.T, anti-hacker staff is very active here and very
- efficient), people tend to trust JBC. He seems (I said SEEMS) to have a good
- knowledge in computing, looks kind, and has a lot of resources. The only
- problem is that he makes some "sting" (as you called it some years ago)
- operation and uses the information he spied to track hackers. He organized a
- game last year which was "le prix du chaos" (the amount of chaos) where he
- asked hackers to prove their capabilities.
-
- It was not the real goal of this challenge. He used all the materials hackers
- send him to harass some people and now he "plays" with the normal police and
- the secret police (DST) and installs like a trade between himself and them.
- It's really scary for the hacking scene in France because a lot of people trust
- him (even the television which has no basis to prove if he is really a hacker
- as he claims to be or if he is a hacker-tracker as he IS!). Journalists take
- him as a serious source for he says he leads a group of computer enthusiasts.
-
- But we discovered that his group doesn't exist. There is nobody in his group
- except his brother and some other weird people (2 or 3) whereas he says there
- is 73 people in his club/group. You should spread this warning to everybody in
- the underground because we must show that "stings" are not only for USA! I
- know he already has a database with a lot of information like addresses and
- other stuff like that about hackers and then he "plays" with those hackers.
-
- Be very careful with this guy. Too many trust him. Now it's time to be
- "objective" about him and his group!
-
- Thanks a lot and goodbye.
-
- Synaps a/k/a Clone1 a/k/a Feyd
-
- ----------
-
- From: Ken Martin <70712.760@compuserve.com>
- Date: November 17, 1992
- Subject: One Ron Hults...(Phrack 38 Loopback)
-
- Dear Phrack Staff:
-
- This letter is concerning the letter in the Phrack Loopback column (#38, April
- 20, 1992) written by one Ron Hults. It suggests that all children should be
- disallowed access to a computer with a modem.
-
- The news release to which it is attached attempts to put an idea in the
- reader's mind that everything out there (on bulletin boards) is bad. Anyone
- who can read messages from "satanic cultists, pedophile, and rapists" can also
- read a typical disclaimer found on most bulletin boards which have adult
- material and communication areas available to their users, and should be able
- to tell the SysOp of a BBS how old he/she is.
-
- A child who is intelligent enough to operate a computer and modem should also
- be able to decide what is appropriate for him/her to read, and should have the
- sense enough to avoid areas of the BBS that could lead to trouble, and not to
- give their address and home phone number to the Charles Manson idols. (It is a
- fact that all adolescents have thoughts about sex; nothing can change that.
- The operator of a BBS also has the moral responsibility to keep little kids out
- of the XXX-Rated GIF downloading area.)
-
- One problem with that is BBSes run by the underground type (hack/phreak, these
- usually consist of people from 15-30 years of age). The operators of these let
- practically anyone into their system, from my experiences. These types of
- BBSes often have credit card numbers, telephone calling card numbers, access
- codes to credit reporting services, etc., usually along with text-file
- documents about mischievous topics. Mr. Hults makes no mention of these in his
- letter and press release. It is my belief that these types of systems are the
- real problem. The kids are fascinated that, all of a sudden, they know how to
- make explosives and can get lots of anything for free.
-
- I believe that the parents of children should have the sense enough to watch
- what they are doing. If they don't like the kind of information that they're
- getting or the kind of messages that they're sending to other users, then that
- is the time to restrict access to the modem.
-
- I am fifteen years old, and I can say that I have gotten into more than my
- share of trouble with the law as a result of information that I have obtained
- from BBSes and public communications services like CompuServe. The computer is
- a tool, and it always will be. Whether it is put to good use or not depends on
- its user. I have put my computer/modem to use in positive applications more
- than destructive ones.
-
- I would like Mr. Hults to think about his little idea of banning children from
- modem use, and to think about the impact it would have on their education.
- Many schools use computers/modems in their science and English curriculums for
- research purposes.
-
- Banning children from telecommunications is like taking away connection to the
- outside world and all forms of publication whatsoever when one takes a look
- around a large information service like CompuServe or GEnie, and sees all of
- the information that a service like this is capable of providing to this
- nation.
-
- Thanks,
-
- Ken Martin (70712.760@compuserve.com)
- a.k.a. Scorpion, The Omega Concern, Dr. Scott
-
- ----------
-
- From: Stalker
- Date: October 14, 1992
- Subject: Hacking In Czecho-Slovakia
-
- Hi there!
-
- I'm student from Czecho-Slovakia (for some stupid person who doesn't know, it's
- in middle Europe). Call me Stalker (if there is other guy with this name, call
- me what you want). If you think that computers, networks, hacking and other
- interesting things are not in Eastern Europe, you're WRONG. I won't talk
- about politicians. They really make me (and other men from computers) sick!
- I'll tell you what is interesting here right now.
-
- Our university campus is based on two main systems, VMS and ULTRIX. There's
- VAX 6000, VAX 4000, MicroVAX, VAXStation and some oldtimer machines which run
- under VMS. As for hacking, there's nothing interesting. You can't do some
- tricks with /etc/passwd, there's no main bug in utilities and commands. But,
- as I know, VMS doesn't crypt the packets across the network so you can take
- some PC and Netwatch (or any other useful software ) and try to see what
- is interesting on the cable. You can grab anything that you want (usernames,
- passwords, etc.).
-
- Generally, students hate VMS and love UNIX-like systems. Other machines are
- based on ULTRIX. We have DECstations (some 3100, some 5000) and one SM 52-12
- which is something on VAX-11 :-(. It is a really slow machine, but it has
- Internet access! There's many users so you can relatively easily run Crack
- (excellent program) since passwd is not shadowed. Another useful thing is tftp
- (see some other Crack issues). There was a machine with enabled tftp, but
- after one incident, it was disabled.
-
- I would like to tell you more about this incident but sysadmins are still
- suspecting (they probably read my mail). Maybe after some months in other
- articles. Now I can tell you that I'm not a real UNIX-GURU-HACKER, but the
- sysadmins thought that I was. Someone (man or girl, who knows) has hacked one
- (or two) machines on our campus. Administrators thought that I was this
- mysterious hacker but I am not! He/she is much better than I and my friends.
- Today no one knows who the hacker is. The administrator had talked to him/her
- and after some weeks, gave him/her an account. He/she probably had root
- privileges for some time and maybe has these today. He/she uses a modem to
- connect. His/her login name is nemo (Jules Verne is a popular hero). I will
- try to send mail to him/her about Phrack and maybe he/she will write
- interesting articles about himself.
-
- And some tips. Phrack is very interesting, but there's other interesting
- official files on cert.org (192.88.209.9) available via anonymous FTP. This
- is the Computer Emergency Response Team (CERT) FTP server. You can find
- interesting information here about bugs in actual software, but you will see
- only which command or utility has the bug, not how to exploit it. If you are
- smart enough, there's nothing to say.
-
- If you are not, you must read Phrack! :-)
-
- Bye,
-
- Stalker
-
- ----------
-
- From: Ground Zero
- Date: August 25, 1992
- Subject: Phrack 40 is Sexist!
-
- Hi, just a quick comment about Phrack's account of SummerCon:
-
- I don't think your readers need to know or are really interested in hearing
- about the fact that Doc Holiday was busy trying to pick up girls or that there
- were some unbalanced teeny-boppers there offering themselves to some of the
- SummerCon participants. Also, as a woman I don't care for your
- characterizations of females in that file.
-
- I'm not trying to nitpick or be politically correct (I hate PC), I'm just
- writing because I felt strongly enough about it. Ciao.
-
- Ground Zero (Editor of Activist Times, Inc./ATI)
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- From: Shit Kickin' Jim
- Date: September 11, 1992
- Subject: Phrack 40 is Sexist!? (PC Phrack)
-
- Listen here woman. I don't know whut yer big fat butt thinks Phrack wuz tryin'
- to insinuate. Lemme tell yew a thang er two. First of all, Phrack ain't run
- by some little pip-squeek faggot ass pansies. Ah mean wut are you sum kinda
- hOmOsexual? Here's what ah mean. NOW here iz a real story 'bout me and one a
- my bestest friends: 4x4 Phreaker.
-
- See 4x4 Phreaker come down to Texas fur a little hackin adventure. Even though
- he lives up there in Yankee-land, 4x4 Phreaker iz a pretty good ol' boy.
- Whuddya think real manly hackers do when they get together? Go stop by Radio
- Shack and buy shrink wrap?
-
- HELL NO! We fuckin' went to Caligula XXI. Fur yew ol' boys that ain't from
- 'round here er yer a fauygut out there that might be readin this, Caligula XXI
- specializes in enertainmunt fer gennelmen.
-
- Now, me and 4x4 Phreaker didn't go to hawk at some fat nasty sluts like you
- might see at your typical Ho-Ho Con. We went with the purpose in mind of seein
- a real movie star. Yup Christy Canyon was in the house that night. 4x4
- Phreaker and me sat down at a table near the front. At that point I decided
- that I'd start trollin for babes. Yep that's right I whipped out an American
- Express Corporate Gold card. And I'll be damned if it weren't 3 minutes later
- me and 4x4 Phreaker had us 2 new found friends for the evening.
-
- So anywayz, yew can see we treated these two fine ladies real nice and they
- returned the favor. We even took em to Waffle House the next mornin'. So I
- dunno where yew git off by callin us sexist. Yer just some Yankee snob big
- city high horse woman who expects to be a takin care of.
-
- God bless George Bush and his mistress Jennifer whutz her name.
-
- :Shit Kickin' Jim (Madder than a bramer bull fightin a mess of wet hornets)
-
- _______________________________________________________________________________
-
- Misunderstood Hackers Get No Respect August 10, 1992
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by The Cruiser (ComputerWorld)(Page 24)(Letters to the Editor)
-
- I just read the replies to Chris Goggans' "Hackers aren't the real enemy"
- [ComputerWorld, June 29], and I thought I'd address a few of the points brought
- up. I'm a hacker -- which means that I'm every system administrator's
- nightmare.
-
- Hardly. Many hackers are politically aware activists. Besides being fueled by
- an obsession for mastering technology (I call it a blatant disregard for such),
- true hackers live and obey a strict moral code.
-
- All this talk about the differences between voyeurism and crime: Please, let's
- stop comparing information access to breaking into someone's house. The
- government can seize computers and equipment from suspected hackers, never to
- return it, without even charging a crime. I will not sit back and let Big
- Brother control me.
-
- The Cruiser
- _______________________________________________________________________________
-
- Hackers Should Land In Jail, Not In Press October 19, 1992
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Alan Falk (ComputerWorld)(Page 32)(Letters to the Editor)
-
- The letters you get from avowed hackers seem to glorify the virtues of hacking.
- I find this very disturbing for a simple reason: It completely ignores the
- issue of private property.
-
- The computer systems they hack into (pun intended) and the databases they try
- to access, as well as the data in the databases, are private property.
-
- An analogous argument might be that breaking and entering a jewelry store and
- taking off with some valuables is really a way of testing the security controls
- at the jeweler's establishment. They're really just doing it for the
- excitement and challenge.
- Would they promote voyeurism based on the "logic" that "after all, if they
- didn't want me to look, they'd have pulled the drapes closer together?"
-
- The fact that there's challenge or excitement involved (or even commitment,
- intellect or whatever) does not change the issue.
-
- I suggest that hackers who gain entry to systems against the wishes of the
- systems' owners should be treated according to the laws regarding unlawful
- entry, theft, etc.
-
- Alan Falk
- Cupertino, California
- _______________________________________________________________________________
- ^L
- Anonymous Usenet Posting?
- ~~~~~~~~~~~~~~~~~~~~~~~~~
- Date: August 19, 1992
- From: Anonymous
-
- I've read in Phrack all about the different ways to send fake mail, but do any
- of the readers (or Mind Mage) know anything about anonymous newsgroup posting?
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Anonymous Mail Poster August 4, 1992
- ~~~~~~~~~~~~~~~~~~~~~
- by Sir Hackalot
-
- Here is some C source to a simple "anonymous" mail poster that I wrote a LONG
- time ago. It's just one of many pieces of code I never gave to anyone before.
- You may find it useful. Basically, it will connect to the SMTP port and
- automate the sending. It will allow for multiple recipients on the "To:" line,
- and multiple "To:" lines.
-
- From: sirh@sirh.com
-
- ------ Cut here for fm.c -----
- #include <stdio.h>
- #include <string.h>
- #include <sys/types.h>
- #include <sys/socket.h>
- #include <netdb.h>
- #include <netinet/in.h>
- #include <arpa/inet.h>
- #include <signal.h>
- #include <fcntl.h>
- #include <errno.h>
-
-
- int openSock(name,port)
- char *name;
- int port;
-
- {
- int mysock,opt=1;
- struct sockaddr_in sin;
- struct hostent *he;
- he = gethostbyname(name);
- if (he == NULL) {
- printf("No host found..\n");
- exit(0);
- }
-
- memcpy((caddr_t)&sin.sin_addr,he->h_addr_list[0],he->h_length);
- sin.sin_port = port;
-
- sin.sin_family = AF_INET;
-
- mysock = socket(AF_INET,SOCK_STREAM,0);
-
- opt = connect(mysock,(struct sockaddr *)&sin,sizeof(sin));
-
- return mysock;
-
- }
-
- /* This allows us to have many people on one TO line, seperated by
- commas or spaces. */
-
- process(s,d)
- int d;
- char *s;
- {
- char *tmp;
- char buf[120];
-
- tmp = strtok(s," ,");
-
- while (tmp != NULL) {
- sprintf(buf,"RCPT TO: %s\n",tmp);
- write(d,buf,strlen(buf));
- tmp = strtok(NULL," ,");
- }
-
- }
-
-
-
- getAndSendFrom(fd)
- int fd;
- {
- char from[100];
- char outbound[200];
-
- printf("You must should specify a From address now.\nFrom: ");
- gets(from);
-
- sprintf(outbound,"MAIL FROM: %s\n",from);
- write(fd,outbound,strlen(outbound));
-
-
-
- }
-
- getAndSendTo(fd)
- int fd;
- {
- char addrs[100];
-
- printf("Enter Recipients, with a blank line to end.\n");
-
- addrs[0] = '_';
-
- while (addrs[0] != '\0') {
- printf("To: ");
- gets(addrs);
- process(addrs,fd);
- }
-
- }
-
- getAndSendMsg(fd)
- int fd;
- {
- char textline[90];
- char outbound[103];
-
- sprintf(textline,"DATA\n");
- write(fd,textline,strlen(textline));
-
-
- printf("You may now enter your message. End with a period\n\n");
- printf("[---------------------------------------------------------]\n");
-
- textline[0] = '_';
-
- while (textline[0] != '.') {
- gets(textline);
- sprintf(outbound,"%s\n",textline);
- write(fd,outbound,strlen(outbound));
- }
-
- }
-
-
- main(argc,argv)
- int argc;
- char *argv[];
- {
-
- char text[200];
- int file_d;
-
- /* Get ready to connect to host. */
- printf("SMTP Host: ");
- gets(text);
-
- /* Connect to standard SMTP port. */
- file_d = openSock(text,25);
-
- if (file_d < 0) {
- printf("Error connecting to SMTP host.\n");
- perror("smtp_connect");
- exit(0);
- }
-
- printf("\n\n[+ Connected to SMTP host %s +]\n",text);
-
- sleep(1);
-
- getAndSendFrom(file_d);
-
- getAndSendTo(file_d);
-
- getAndSendMsg(file_d);
-
- sprintf(text,"QUIT\n");
- write(file_d,text,strlen(text));
-
- /* Here we just print out all the text we got from the SMTP
- Host. Since this is a simple program, we didnt need to do
- anything with it. */
-
- printf("[Session Message dump]:\n");
- while(read(file_d,text,78) > 0)
- printf("%s\n",text);
- close(file_d);
- }
- ----- End file fm.c
- _______________________________________________________________________________
- ^L
- From: Andy Panda-Bear
- Date: September 25, 1992
- Subject: Phrack on the move
-
- To Whom It May Concern:
-
- I love reading your Phrack articles and find them very, very informative as
- well as helpful. I was wondering in you've ever or plan to put together a
- compendium of related articles. For instance, you could make a Phrack guide to
- telephony and include all telephone/telecommunications articles. Perhaps a
- "Phrack Guide to UNIX" or "Phrack Guide to Internet" could be produced. It
- could have reprints of past articles along with commentaries by individuals who
- care to share their knowledge. Anyway it's just something to think about.
-
- Thanks for many megabytes of useful info and keep it coming.
-
- Later,
-
- Andy Panda-Bear
-
- ----------
-
- Computer Underground Publications Index
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Amadeus
-
- I just finished the new edition of the Phrack Index, now called the Computer
- Underground Publications Index since it now includes the issues of the Legion
- of Doom Tech Journals and Informatik.
-
- You can get it from ftp.uu.net as /tmp/CUPindex
-
- I have already sent it to da folks at CUD so that they may enter it into their
- archives.
-
- The CUP has been updated to included all the Phracks up to 40.
-
- C'ya
-
- Amadeus
- _______________________________________________________________________________
-
- Pirates v. AT&T: Posters August 8, 1992
- ~~~~~~~~~~~~~~~~~~~~~~~~
- by Legacy Irreverent (legacy@cpu.cyberpnk1.sai.com)
-
- On May 24 1992, two lone Pirates, Legacy of CyberPunk System, and Captain
- Picard of Holodeck, had finally had enough of AT&T. Together, they traveled to
- the AT&T Maintenance Facility, just west of Goddard, Kansas, and claimed the
- property in the name of Pirates and Hackers everywhere. They hoisted the Jolly
- Roger skull and crossbones high on the AT&T flagpole, where it stayed for 2
- days until it was taken down by security.
-
- This event was photographed and videotaped by EGATOBAS Productions, to preserve
- this landmark in history. And now you can witness the event. For a limited
- time we are offering a 11" x 17" full color poster of the Jolly Roger Pirate
- flag flying high over AT&T, with the AT&T logo in plain view, with the caption;
- "WE CAME, WE SAW, WE CONQUERED." These are $5.50 each and are laminated.
-
- Also available, by request is a 20" x 30" full color photograph, and a cotton
- T-shirt with the same full color picture on the front, for $20 each.
-
- If you are interested in purchasing any of the above items, simply send check
- or money order for the amount to:
-
- CyberPunk System
- P.O. Box 771027
- Wichita, KS 67277-1072
-
- A GIF of this is also available from CyberPunk System, 1:291/19, 23:316/0,
- 72:708/316, 69:2316/0. FREQ magicname PIRATE
-
- Any questions, send them to Legacy@cpu.cyberpnk1.sai.com
-
- _______________________________________________________________________________
-
- Ultrix 4.2 Bug
- ~~~~~~~~~~~~~~
- By Krynn
-
- A bug was discovered in Ultrix 4.2 upgrade version. It involves npasswd, and
- root. It is quite simple, and a patch/fix is available. Here is a description
- of the hole:
-
- Sys Admin's username: mradmin
- Any user's username : mruser
-
- Okay, mruser has forgotten his password, which isn't good. Mruser goes to
- mradmin and asks mradmin to change his password to newpass. Mradmin does so.
-
- Mradmin now will su to root, and npasswd mruser. He will enter mruser's new
- password, newpasswd. It will appear in the /etc/passwd that mruser's password
- is a "*" (shadowed), and that it has been changed, but it hasn't.
-
- The password changed was root's, meaning root's password is now newuser.
-
- A fix is available via anonymous ftp at:
-
- black.ox.ac.uk /src/npasswd.enhanced.shar.Z
-
- The original is there as /src/npasswd jpl.tar.Z
- _______________________________________________________________________________
-
- PumpCon Hosed November 5, 1992
- ~~~~~~~~~~~~~
- by Phil "The Outlander"
-
- PumpCon '92 was held this past weekend at the Westchester Courtyard by
- Marriott, and was shut down in spades.
-
- It began like any typical hacker/phreak/cyberpunk's convention, with lots of
- beer, lots of shooting the bull, and lots of people from around the country,
- except that the guests got sloppy, stupid, noisy, and overconfident.
-
- The manager of the hotel, accompanied by three town of Greenborough police
- officers, entered the room at approximately 10pm on Saturday. The manager had
- received complaints about noise and vandalism from some of the hotel's other
- guests. She claims to have tried to call the room several times before
- physically entering, but the room's telephone line was consistently busy.
-
- The police officers noticed the multiple open (and empty) beer bottles
- scattered around the room and were gearing up to make some arrests for
- "Unlawful Possession of Alcoholic Beverages by Underage Persons" when one of
- the policemen spotted an Amiga, connected to a US Robotics modem, which was in
- turn connected to the suite's phone line. The "stolen" calling card was all
- the probable cause necessary to upgrade the charges to "Wire Fraud."
-
- Everyone in the suite was detained for questioning. Standard investigation
- procedure was followed. The entire case was handled by local authorities,
- including the Westchester County DA. To my knowledge, the FBI and Bell
- Security people were not called in (or if they were, it was after I was
- released).
-
- Each detainee was body-searched for diskettes, hand-written notes about credit
- and computer services, autodialers, and the like. The suite where PumpCon had
- taken place was also searched. Hardware seized includes at least two Amigas
- with monitors, modems, and diskettes, and one AT&T dumb terminal with modem.
-
- Each of the detainees was interviewed in turn. Just before dawn on the morning
- of Sunday, November 1st, the police began making the actual arrests. Four to
- eight people were arrested and taken to the local jail.
-
- The rest of the detainees were released with no charges or arrests filed.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- And now on a personal note to anybody who is new to the world of hacking:
-
- Many of the attendees to PumpCon '92 were just like me. I was aware of the
- possible consequences of an arrest, but the full enormity of the possibilities
- hadn't sunk in. Getting busted can really ruin your life, and I am unwilling
- to sacrifice my liberty and get a criminal record just for the thrill of
- hanging out with the "eleet."
-
- I was personally terrified out of my skull and went right off any dreams I had
- of being some kind of big-time cyberpunk. The law had us outgunned ten to one
- (literally and figuratively) and I as I write this on Monday night I still
- haven't stopped shaking.
-
- To anyone who hasn't considered what it would be like to get seriously busted,
- I want you to try and picture the scene that night, and comes the dawn, a lot
- of the people you were partying with just twelve hours earlier are carted away
- in handcuffs to face an uncertain future.
-
- The attendees of PumpCon, including myself and with few exceptions, were utter
- and complete fools. They thought that they could act like jerks, bust up the
- hotel, and phreak off the room lines without bringing down the heat like a jet
- of molten lava. They thought they were too smart to get caught. They thought
- that they were immortal. They thought wrong, and now some of them are going to
- pay for it.
-
- I got lucky. I was released, and I learned some invaluable lessons.
-
- I can't stress enough to anybody out there who is treating the state of the
- Hack like it's a big game: You aren't going to get your marbles back when the
- night is over. The stakes are real. Ask yourself if you can deal with the
- possibilities of ruining your life before it's even begun.
-
- Everyone must make their own decision. You are only given this one chance to
- bail out now; any others that come along are blessings from on high.
-
- If you do decide to live in the computer underground, I can only offer this
- advice: Cover your a$$. Do not act foolishly. Do not associate with fools.
- Remember that you are not immortal, and that ultimately there are no safety
- nets. Intelligence can't always save you. Do not, in your arrogance, believe
- that it will. My time as a cyberpunk has been short and undistinguished but it
- has taught me this much.
-
- I'm not saying that you should not become a hacker. If that is truly your
- wish, then I'm not one to stop you. I'm just warning you that when the fall
- comes, it can come hard, and there's nobody who can help you when you've gone
- far enough past the line.
-
- Phil "The Outlander"
- _______________________________________________________________________________
-
- 2600 Meeting Disrupted by Law Enforcement December 12, 1992
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Emmanuel Goldstein (Editor of 2600 Magazine)
-
- The following is a letter I wrote to the Washington Post in response to their
- article about the incidents at the Pentagon City Mall on November 6, entitled,
- "Hackers Allege Harassment at Mall" (dated November 13, page A1). Their
- article failed to focus on the startling revelation of federal government
- involvement and the ominous implications of such an action. The article also
- does little to lessen the near hysteria that is pumped into the general public
- every time the word "hacker" is mentioned.
-
- Let us take a good look at what has been confirmed so far. A group of computer
- hackers gathered at a local mall as they do once a month. Similar meetings
- have been going on in other cities for years without incident. This gathering
- was not for the purposes of causing trouble and nobody has accused the hackers
- of doing anything wrong. Rather, the gathering was simply a place to meet and
- socialize. This is what people seem to do in food courts and it was the
- hackers' intention to do nothing more.
-
- When mall security personnel surrounded the group and demanded that they all
- submit to a search, it became very clear that something bizarre was happening.
- Those who resisted were threatened with arrest. Everyone's names were written
- down, everyone's bags gone through. One person attempted to write down the
- badge numbers of the people doing this. The list was snatched out of his hand
- and ripped to pieces. Another hacker attempted to catch the episode on film.
- He was apprehended and the film was ripped from his camera. School books,
- notepads, and personal property were seized. Much of it has still not been
- returned. The group was held for close to an hour and then told to stay out
- of the mall or be arrested.
-
- This kind of treatment is enough to shock most people, particularly when
- coupled with the overwhelming evidence and eyewitness accounts confirming no
- unusual or disruptive behavior on the part of the group. It is against
- everything that our society stands for to subject people to random searches and
- official intimidation, simply because of their interests, lifestyles, or the
- way they look. This occurrence alone would warrant condemnation of a blatant
- abuse of power. But the story doesn't end there.
-
- The harassment of the hackers by the mall police was only the most obvious
- element. Where the most attention should be focused at this point is on the
- United States Secret Service which, according to Al Johnson, head of mall
- security, "ramrodded" the whole thing. Other media sources, such as the
- industry newsletter Communications Daily, were told by Johnson that the Secret
- Service was all over the mall that day and that they had, in effect, ordered
- the harassment. Arlington police confirm that the Secret Service was at the
- mall that day.
-
- It is understood that the Secret Service, as a branch of the Treasury
- Department, investigates credit card fraud. Credit card fraud, in turn, can be
- accomplished through computer crime. Some computer hackers could conceivably
- use their talents to accomplish computer crime. Thus we arrive at the current
- Secret Service policy, which appears to treat everybody in the hacker world as
- if they were a proven counterfeiter. This feeling is grounded in
- misperceptions and an apprehension that borders on panic. Not helping the
- situation any is the ever-present generation gap -- most hackers are young and
- most government officials are not.
-
- Apart from being disturbed by the gross generalizations that comprise their
- policy, it seems a tremendous waste of resources to use our Secret Service to
- spy on public gatherings in shopping malls. It seems certain to be a violation
- of our rights to allow them to disrupt these meetings and intimidate the
- participants, albeit indirectly. Like any other governmental agency, it is
- expected that the Secret Service follow the rules and not violate the
- constitutional rights of citizens.
-
- If such actions are not publicly condemned, we will in effect be granting a
- license for their continuance and expansion. The incident above sounds like
- something from the darkest days of the Soviet Union when human rights activists
- were intimidated by government agents and their subordinates. True, these are
- technology enthusiasts, not activists. But who they are is not the issue. We
- cannot permit governmental abuse of any person or group simply because they may
- be controversial.
-
- Why do hackers evoke such controversy? Their mere presence is an inconvenience
- to those who want so desperately to believe the emperor is wearing clothes.
- Hackers have a tendency of pointing out the obvious inadequacies of the
- computer systems we entrust with such a large and growing part of our lives.
- Many people don't want to be told how flimsily these various systems are held
- together and how so much personal data is readily available to so many.
- Because hackers manage to demonstrate how simple it is to get and manipulate
- this information, they are held fully responsible for the security holes
- themselves.
-
- But, contrary to most media perceptions, hackers have very little interest in
- looking at other people's personal files. Ironically, they tend to value
- privacy more than the rest of us because they know firsthand how vulnerable it
- is. Over the years, hackers have gone to the media to expose weaknesses in our
- credit reporting agencies, the grading system for New York City public schools,
- military computer systems, voice mail systems, and even commonly used push
- button locks that give a false sense of security. Not one of these examples
- resulted in significant media attention and, consequently, adequate security
- was either delayed or not implemented at all.
-
- Conversely, whenever the government chooses to prosecute a hacker, most media
- attention focuses on what the hacker "could have done" had he been malicious.
- This reinforces the inaccurate depiction of hackers as the major threat to our
- privacy and completely ignores the failure of the system itself.
-
- By coming out publicly and meeting with other hackers and non-hackers in an
- open atmosphere, we have dispelled many of the myths and helped foster an
- environment conducive to learning. But the message we received at the Pentagon
- City Mall tells us to hide, be secretive, and not trust anybody. Perhaps
- that's how the Secret Service wants hackers to behave. But we are not
- criminals and we refuse to act as such simply because we are perceived that way
- by uninformed bureaucrats.
-
- Regardless of our individual outlooks on the hacker issue, we should be
- outraged and extremely frightened to see the Secret Service act as they did.
- Whether or not we believe that hackers are decent people, we must agree that
- they are entitled to the same constitutional freedoms the rest of us take for
- granted. Any less is tantamount to a very dangerous and ill-advised precedent.
-
- Emmanuel Goldstein
- Editor, 2600 Magazine -- The Hacker Quarterly (516)751-2600
-
- (NOTE: 2600 Magazine coordinates monthly hacker meetings throughout the
- country.)
- _______________________________________________________________________________
-
- Two New Hardcovers November 24, 1992
- ~~~~~~~~~~~~~~~~~~
- by Alan J. Rothman (New York Law Journal)(Page 5)
-
- During the opening sequence of the classic English television series "The
- Prisoner," the lead character known only as Number 6 (brilliantly played by
- Patrick McGoohan) is abducted and taken to a secret location called "The
- Village." He desperately pleads with his captors "What do you want?" Their
- grim response is "Information." Through 17 thrilling episodes, his kidnappers
- staged elaborate high-tech ruses to find out why he quit work as a spy.
-
- Had this story been set in the 1990s rather than the 1960s, all The Village's
- proprietors would have needed was a PC and a modem. They could have assembled
- a composite of Number 6's movements by cross-referencing records from any of
- the commercial data bases containing the details of nearly everyone's daily
- activities. Then with a bit of ingenuity, they could have tried to steal even
- more information by hacking into other restricted data systems.
-
- No longer fiction, but common fact, the billowing growth in the computers and
- telecommunications networks everywhere is generating urgent legal issues
- regarding the content, usage and ownership of the data coursing through them.
- Dilemmas have also surfaced concerning the responsibilities of the businesses
- which gather, sift and repackage such information. Indeed, a critical juncture
- has now been reached where the basic constitutional rights of privacy and
- expression are colliding with the ever-expanding reach of modern technology.
-
- Two well-crafted books have recently been published which together frame the
- spectrum of relevant individual rights issues in these areas with uncanny
- symmetry. Fortunately, neither degenerates into a "computers are bad"
- jeremiad. Rather, they portray an appropriate balance between the virtues of
- computerization and disturbing cases of technological misuse for wrongful
- commercial and governmental ends.
-
- Presenting array of new forms of electronic encroachment on personal privacy is
- Jeffrey Rothfeder's alarming new book, "Privacy for Sale: How Computerization
- Has Made Everyone's Private Life an Open Secret" (Simon & Schuster, 224 pages,
- $22). He offers the chilling thesis that anyone can find out nearly anything
- regarding anybody and there is nowhere left to hide. He convincingly states
- his case in a concise and insightful exploration of the trends and abuses in
- the mass processing of personal data.
-
- The fascinating mechanics of how and where information about virtually every
- aspect of our lives is gathered and then computerized are extensively
- described. The most productive fonts include medical records, credit
- histories, mortgage applications, subscription lists, phone records, driver's
- licenses and insurance forms. Yet notwithstanding the legitimate commercial
- and regulatory reasons for providing these facts, the author carefully
- documents another more deeply hidden and troubling consequence of volunteering
- such information: It is constantly resold, combined with other sources and
- reused without your knowledge or permission for purposes entirely different
- from those you first intended.
-
- Mr. Rothfeder alleges the most perilous result of these activities is the
- growing and highly organized sales, integration and cross-matching of
- databases. Businesses and government entities now have sophisticated software
- to generate complex demographic profiles about individuals, populations and
- geographic areas. In turn, these computer-generated syntheses are increasingly
- used for invasive and discriminatory purposes.
-
- Numerous examples of such misuse are cited, ranging from slightly annoying to
- purely horrifying. The astonishing breadth of this roster includes the sale of
- driver's license information with height weight specifications to clothes
- marketers for tall men and thin women, purchases of credit histories and
- workmen's compensation claims reports by prospective employers who believe this
- material is indicative of a job applicant's character, and the creation of
- "propensity files" by federal agencies to identify people who have not
- committed any offense but might likely be criminals.
-
- Two additional problems pervade the trafficking of intimate information.
- First, there is little or no federal legislation to effectively protect people
- from certain problems presented in the book. For example, the release of
- medical records thought to be "confidential" is virtually unprotected.
-
- Second, it can be extremely difficult to have false entries corrected before
- they have a ripple effect on your other data. Beyond the common tales of
- frustration at clearing up a faulty credit report, Mr. Rothfeder relates the
- case of a man denied any health insurance because his medical records contained
- an erroneous report he was HIV positive.
-
-
- JOURNEY IN CYBERSPACE
-
- Turning to a much more accurate account, author Bruce Sterling takes readers
- into the ethereal realm of "cyberspace" where computers, networks, and
- electronic bulletin boards systems (BBS) are linked together by phone. In his
- first non-fiction work, "The Hacker Crackdown: Law and Disorder on the
- Electronic Frontier" (Bantam, 328 pages, $23), he chronicles the U.S.
- government's highly visible efforts in 1990 to prosecute "hackers" it suspected
- of committing crimes by PC and modem. However, Mr. Sterling distinguishes this
- term as being more about active computer enthusiasts, most of whom have never
- committed any wrongdoing. The writer's other credits include some highly
- regarded "cyberpunk" science fiction, where computer technology is central to
- the plots and characters.
-
- The "crackdown" detailed by the author began with the crash of AT&T's long-
- distance phone system on January 15, 1990. Although it has never been proven
- that hackers were responsible, this event served as the final catalyst to spur
- federal law enforcement agencies into concerted action against a suspected
- underground of computer criminals. A variety of counter-operations were
- executed. Most notable was Operation Sundevil the following May when agents
- around the country seized 42 computer systems, 23,000 diskettes, and halted 25
- BBS's where the government believed hackers were exchanging tips of the trade.
-
- Some of the government's resulting prosecutions through their nationwide
- efforts were moderately successful. However, the book's dramatic centerpiece is
- the trial of Craig Neidorf (a.k.a. Knight Lightning). Mr. Neidorf was a
- contributor to Phrack, an electronic magazine catering to hackers, available on
- various BBS's.
-
- In January 1989, another hacker named "Prophet" transmitted a document he
- pilfered from BellSouth's computers regarding the 911 emergency system to
- Neidorf. Together they edited the text, which Neidorf then published in
- Phrack. In July 1990, he was placed on trial for federal charges of entering a
- fraudulent scheme with Prophet to steal this document. The government alleged
- it was worth $79,499 and that its publication threatened emergency operations.
- To the prosecutor's dismay, the case was dropped when the defense proved the
- same material was publicly available for only $13.
-
- With insight and style, Mr. Sterling uses this and other events to cast
- intriguing new spins on applicable civil liberties issues.
-
- Are the constitutional guarantees of freedom of expression and assembly fully
- extended to BBS dialogs and gatherings? What degree of privacy can be expected
- for personal data on systems which may be subject to surreptitious entry? Are
- hackers really breaking any laws when merely exploring new systems? Is posting
- a message or document on a BBS considered a "publication"? Should all BBS's be
- monitored just because of their potential for illegal activity? What are the
- responsibilities of BBS operators for the contents of, and access to, their
- systems?
-
- The efforts of Mitchell Kapor, the co-developer of Lotus 123 and now chairman
- of ONtechnology, are depicted as a direct response to such issues raised by the
- crackdown. Mr. Kapor assembled a prominent group of fellow computer
- professionals to establish the Electronic Frontier Foundation (EFF), dedicated
- to education and lobbying for free speech and expression in electronic media.
- As well, EFF has provided support to Craig Neidorf and others they consider
- wrongly charged with computer crime.
-
- Weighty legal matters aside, the author also embellishes his story with some
- colorful hacker lore. These denizens of cyberspace are mostly young men in
- their late teens or early twenties, often fueled by junk food and propelled by
- macho. Perhaps their most amusing trait is the monikers they adopt --
- Bloodaxe, Shadowhawk, and of course, Phiber Optik.
-
- Someone else, a non-hacker involuntary given the pseudonym "Number 6," knew his
- every act was continually being monitored and recorded against his will. As a
- manifestation of resistance to this relentless surveillance, he often bid
- farewell to other citizens of the Village with a sarcastic "Be seeing you."
- Today, the offerings of authors Rothfeder and Sterling provide a resounding
- "And you" as a form of rejoinder (often uttered by The Village's citizens as
- well), to publicize the ironic diversity threats wrought by information
- technology.
-
- Number 6 cleverly managed to escape his fictional captivity in The Village
- during the final (and mind-boggling) episode of The Prisoner. However, based
- on the compelling evidence presented in these two books, the protection of
- individual rights in the reality of today's evolving "global village" of
- computer networks and telecommunications may not be so neatly resolved.
- _______________________________________________________________________________
-