home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 51.7 KB | 1,205 lines |
- ==Phrack Magazine==
-
- Volume Four, Issue Forty-Three, File 7 of 27
-
- CONFERENCE NEWS
- PART I
-
- ****************************************************************************
-
- The Missouri Programmers' Convention Transcripts
-
- Compiled by Synapse 403
-
- For those of you who were at the con, or moreover were at the con
- and can remember it (Sir Lance?), these transcripts are for you.
- They are not absolute in their accuracy and are most likely full
- of holes, however please keep in mind they are the transcribed
- product of a hacker who is suffering from a hangover of heroic
- proportions, and is typing to keep his mind off the mutiny
- happening in his stomach.
-
-
- Please note that within the transcripts you will find parts of
- the speaker's words paraphrased, this is not intended to
- misrepresent them, this is simply an easy way to cut to the chase
- and get this job done. Another note to make is that with in this
- transcript, several people have been labeled unknown, this is
- either due to I could not see their face while they were speaking
- or they wished to remain anonymous. These folks will be labeled
- "unknown" keep in mind that this is for the above reasons and not
- any slight, or K-RaD At|T|_|D3.
-
- SummerCon
-
- Introductions on camera were the essential beginning of the
- meeting, with Drunkfux wandering counter clockwise through the
- room, pointing the camera (that he was clinically joined with),
- in your face and asking your name and to say a bit about yourself.
-
- Surprisingly enough there was little adverse reaction to this
- aside from a few quiet jokes in relation to people wondering how
- much $ Drunkfux would be getting from SRI for the tape <G>
-
- Stuart Hauser from SRI, Stanford Research Inst. was the first
- speaker of the day, he was (or is) a older looking man who looked
- relaxed and confident. He was here to tell us about SRI and their
- goals (or he was here to milk the crowd for info, depends who you
- talk to I suppose).
-
- SRI is an international corporation, employing over 3000
- people, that claims no ties to the Feds, NSA , CIA or any other
- government arm interested in harming, persecuting or even
- prosecuting the hacker community.
-
- Their main concern is major network security, on a corporate
- level. However there was talk of SRI having contract work for
- military related arms producers this was not brought up at the
- conference.
-
- He started by talking about himself and SRI, he mentioned their
- policy and their feelings towards dealing with the hacker
- community on a productive level. He went on to confirm, that
- someone we all know or know of that works for the same company is an
- asshole, and we are not the only community to realize this. I
- will leave his name out for reasons of privacy, however a good
- hint for those who were not at scon and are reading this his first
- name starts with DON.
-
- After allowing us all to laugh this over he went to tell us of
- the finding of his teams research form SRI. His team consisted of
- himself, Doug Web, and Mudhead, they were tasked to compile a
- report on the computer underground in some nebulous fashion, he
- was of course (at least to me and everyone I was sitting with)
- not very clear with this. To the best of our knowledge the report
- was like a damage potential report, ie: How much can the hackers
- really do, and HOW much will the hackers do?
-
- Stu conceded that the networks and companies had more to fear
- from corporate espionage at the hands of employees and
- mismanagement then they did from hackers. However he fears a
- new breed of hackers he says are becoming a reality on the nets,
- the hacker for cash, digital criminals. He felt that this new
- breed of hacker will be counterproductive for the both the PD
- world and the underground on the basis that if they destroy it
- for the corps, we cannot use it either.
-
- In the way of security Stuart felt the Social engineering was
- the biggest weakness of any system, and the most difficult to
- defend against. Also he felt too much info about machines and
- security of them was public info, also public info was available
- for use in social engineering. He felt that the only way to
- combat this is to make the employees and owners of companies more
- aware of these threats. Beyond the social engineering he feels
- that physical measure are too weak at most facilities and do not
- protect there hardcopy data well enough he meant this both for
- Trashing and actual b&e situations again he felt the situation
- was to spread awareness.
-
- While conducting the interviews to for this report Stuart formed
- his own opinion of the hacker which he shared with us. He feels
- that hackers for the most part are not malicious at all, and are
- actually decent members of cyberspace. Moreover he feels that
- hackers should be put to work as opposed to put to jail.
- Something we all feel strongly about. Stuart finished his speech with
- brief allusions to scholarships and upcoming programs, at this point he
- left the floor open to questions. The are as follows:
-
- Emmanuel Goldstien: "Earlier you (Stuart) mentioned the existence
- of 'malicious hackers', where are they?"
-
- Stu: "Holland, Scandinavia, the UK poses a great threat,
- Israel, Australia. The bloc countries for virii and piracy are very
- busy right now, We have to wonder what will happen when they get full
- access to our nets. What happens when the eastern bloc catches
- up?"
-
- Unknown: "Who finances this".
-
- Stuart: "Really that's none of your business" (paraphrased <G>)
-
- Unknown: "Where is the evidence of these so called malicious
- hackers, I think the whole malicious hacker idea is spawned by the
- media to justify the persecution of hackers".
-
- Stuart: [Has no chance to reply]
-
- Control-C: (interjects) "Punk kids are all over the place doing it
- man."
-
- KL: "its common knowledge that it is happening there."
-
- Stu: (offers example) Was told that at three companies have tried
- to hire tiger teams, for corporate breaches however he has no proof
- of this. Yet he feels the sources were reliable.
-
- Unknown: "I have heard rumors that SRI is writing software to
- catch hackers. is this true?"
-
- Stu: Says he hasn't heard about this. However if they are more
- interested in what SRI is doing he will be sticking around until
- this afternoon or evening. And has about 15 copies of the report that
- are available to the public.
-
- Next speaker
-
- [I was out of the room for this speaker and asked Black Kat to
- type this in, so your guess is as good as mine.]
-
- Someone showed a DES encryption laptop, 8 months old, with a built in
- chip to encrypt everything in and out (modem, disk, etc). Didn't have
- an overhead projector but was giving personal demos. Made by BCC
- (Beaver Computing Company) out of California. Doesn't advertise, but
- will give sales brochures etc, if you call the 800 number.
- Thinks the govt is discouraging wide scale distribution.
-
- Count Zero & RDT
-
- Count Zero announced he would be talking on a unique telco
- feature they found and about packet radio. Stickers and
- board adds from RDT and cDc were handed out at this time.
-
- White Knight and Count0 started by introducing a bizarre
- telco feature they came across, and played a tape recording to
- demonstrate some of its features to the crowd. After some chatter with
- the rest of the con, nothing definite was concluded, however, some
- good ideas are brought out. (As well as some insight by folks who have
- discovered similar systems.)
-
- Next came some comic relief from Count0 and White Knight in the
- way of the termination papers of an employee from a telco, the
- employees case report was read to the crowd and essentially painted the
- picture of a really disgruntled and ornery operator. Specifics were read,
- and people laughed at the shit this guy had gotten away with, end of
- story.
-
- Following this Count0 spoke for Brian Oblivion who could not be
- there about an American Database/social program called America 2000.
- Brian came across this information by the way of a group in Penn state,
- the program is meant to monitor the attitudes of students, and how
- they behave with within state standards..
-
- Furthermore the Database is compiled without the knowledge or
- permission of parents, beyond this the file can stay with a man
- or woman for life, in the hands of the state.
-
- Count0 on Packet Radio
- Self-empowering Technology
-
- Next came the actual Packet radio discussion, Count0 displayed
- his hardware and talked at great length on a whole spectrum of issues
- related to the radio packet switching, and some points while straying,
- even the morality of the FCC. This went on for quite some time.
- Count0 instructed the crowd on the principle behind packet switch
- radio as well as explaining which licenses to get and to apply.
-
- Drunkfux, Merchandising
-
- Drunkfux
-
- Drunkfux started by, Merchandising a shitload of ho-ho con
- shirts, 15$ a piece as well as mthreat his tonloc shirts, also selling the
- mods for the Mistubishi 800, mthreat also had a chip preprogrammed for
- the Mits 800 avail. Those who could not get the mod were told to get it
- from cypher.com in /pub/vind. He told us of the new Metal Land revival and
- said a bit about it.
-
- Next and most interesting was the discussion of the fate of
- Louis Cypher, and his companions in the recent bust. It seems Cypher
- and ALLEGED accomplices Doc and JP have been charged with numerous
- felonies not which the least of is Treasury Fraud and b&e of a federal
- post office. Drunkfux went into detail on how they had been turned
- on, and essentially entraped into the situation. Also how the media as
- per usual had made a witch hunt out of it by connecting Doc to the a
- remote relation to the Kennedys etc, etc.
-
- Eric Neilson with CPSR
-
- Eric Nielson started by telling the crowd what had drawn him to
- the CPSR, by the way of reading a discussion in congress about a
- congressman defending the strength of a Starwars network by stating that the
- gov had an excellent example for security: the phone networks in the
- USA. Needless to say Eric had little faith in this analogy <G>.
-
- He went on to describe what the CPSR covers and what they have
- done recently in the of the clipper debate, Sundevil and other 1st
- Amend. issues. He discussed the internal workings of CPSR and its
- funding police as well as telling Conf Members how to go about joining.
-
- Erik Bloodaxe
-
- Erik started out with explaining why Phrack 43 is not yet out.
- This is due to the fact that Stormking.com will not allow it to be mailed
- from it, seeing as the owner does telco consulting and feels it would
- be a conflict of interest. Furthermore he won't give the listserve to
- the Phrack Staff, making it somewhat difficult to distribute. However KL
- is acting as a mediator and hopefully this will be settled soon.
- Mindvox was considered but rejected as a choice, for fear of people
- getting a hold of the list..
-
- On the issue of Phrack and the copyright, Erik had only ONE fed
- register out of all those who collect it. However Phrack has
- obtained logs of both CERT forwarding Phrack by mail, as well as Tymnet
- obtaining the mag.
-
- Beyond this Agent Steel was discussed in an "I told you so
- fashion" it turns out that him being accused of being a narc in the past
- were valid, seeing it was proved by way of documentation that Agent
- ratted out Kevin Poulsen (Dark Dante) resulting in his current 19
- charges.
-
- And of Course the new LOD issue was broached, however very
- little was discussed on it and it was simply agreed to a large degree that
- Cameron (lord Havoc) must have been seriously abused as a child to
- display the type of obvious brain damage he is afflicted with now.
-
- Emmanuel Goldstein 2600
-
- Emmanuel Goldstein in his purple Bellcore shirt discussed with us
- his appearance before a Congressional hearing on a panel with Don
- Delaney and how the hostility shown towards him by the house
- representatives in session. Beyond this he went on to describe several
- nasty letter letters sent to him by telcos for PUBLIC info he had posted
- in the winter issue of 2600. This is a very brief summary of what he had to
- say, mainly due to the fact that I was too busy listening to him to
- concentrate my apologies go to those who were interested in
- reading the whole thing.
-
-
- Next up was a lengthy discussion on Novel Software and its
- weaknesses, By Erreth Akbe however the speaker he wished me to leave
- this out of the transcripts so I will respect his wishes in this.
-
- ********End Of Transcript***********
-
- I would like to thank the following for making the Con an
- experience for me that I will not soon forget:
-
- Arist0tle, Black Kat, Butler, Control-C, Erreth Akbe, Tommydcat,
- the Public and theNot. Thx guys.
-
- Please send all responses to Besaville@acdm.sait.ab.ca
-
- *****************************************************************************
-
- Presenting :::
-
- SummerCon 1993 in Review !!!
-
- Hacking Tales and Exploits by the SotMESC
-
- Additional Activities by the GCMS MechWarriors
-
- -()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-
-
- The weather was right, too right. Something was foul in the
- air. It was akin to that mythical 'Calm before the Storm' scenario
- that is dreaded by so many. But, Scribbles and I boarded the
- Techno-Laden SotMESC compact and took off down the Highway to our
- ultimate goal . . . Hacker Heaven in Summertime Fun - SummerCon !!!
-
- Instantly, weather was seen brewing in the Caribbean. Hints
- of Hurricanes echoed through the towns we drifted through. To
- alleviate any anxieties, massive quantities of Jolt! were obtained
- in the infamous town of Hatties-Gulch, a small town taken over by
- the virulent filth called College Students.
-
- The trip continued, over hill and over dale. Dale was quite
- considerate not to press charges. Colleges were passed in a blink
- of the eye. Nothing was going to stop us. We were on a mission
- from the Church. But, that's another story.
-
- After locating that famous arch, a beeline was made at speeds
- over 100 MPH through St. Louis until our destination came into
- view: The St. Louis Executive International (800-325-4850). We
- came to meet our nemesis and friends at the fest hosted by the
- Missouri Programming Institute. Brakes were quickly applied
- as the car appeared to be going off the off-ramp and into the ditch.
-
- From the lobby it was obvious, there were unusual people here.
- These were the kind of people that you fear your daughters would
- never meet. The kind of people that kicked themselves into
- caffeine frenzies and would become infatuated with virtual lands.
- Yes, these were my kind of people.
-
- Now, the adventure may start . . .
-
- Oh, and in response to A-Gal on pg 30 of 2600, Scribbles
- says she's the sexiest hacker on the nets. Hmmmmm, I'm inclined
- to agree with that. I'm sure Control-C will agree too, especially
- after he trailed her for half of SCon.
-
- Now, we all know that Friday is the warm-up day on what we can
- expect to see at SCon during the main Saturday drag. It was no
- surprise to find the main junction box rewired, pay-phones providing
- free services, rooms rerouted and computers running rampant down the
- hallways. But, the traditional trashing of Control-C's room this
- early signaled that more would be needed to top the night. The
- maid was definitely not pleased.
-
- For a list of those that attended, maybe KL can provide us
- with that information. There were too many faces for my fingers
- to lap into. And, there were quite a few new faces. I believe
- that Weevil was the youngest hacker at 16, and Emmanuel was the
- oldest, although he didn't give his age.
-
- -()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-
-
- THE CONFERENCE
-
- -()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-
-
- Let's get to the meat of the matter. The conference had
- a nice spacious central area with tables neatly lining alongside
- the wall. Between the tables and the walls were many hacks packed
- as tightly as they could get. Why didn't we think of moving the tables
- closer together ???
-
- KL took control and ran the conference smoothly. dFx panned
- everyone on his digital camcorder. Several cameras were around
- to provide us with gifs later. And the conference took off . . .
-
-
- First up was Stuart from SRI (Stanford Research Institute).
- He elaborated on SRI's being involved in research, engineering and
- design. From studies done around the world with hackers and those
- associated, malicious hacking can not be stopped. There is no
- evidence, though, that the current hackers are interested in
- bringing the networks down at all. Concern was given to new
- hackers that may be emerging with financial gain and maliciousness
- occurring. The top security hole with system was noted as
- being the infamous social engineering technique. SRI did note
- that many places did not utilize the security that they even had
- in place. It was also noted that laws against malicious hackers,
- and probably any hacker, should be fair and just. The most
- malicious hacks that are turning up have been spotted in the
- following named countries: Holland, Scandinavia countries,
- very possibly soon in the UK, Australia, Israel, the former USSR,
- and Bulgaria ( noted for virii writers ).
-
- A voice made mention of Operation Rahab, hackers in German Intelligence.
-
- Next up was Count Zero from cDc/RDT to talk about packet
- radio. His talk included information about the IESS and handed
- out a flyer on America 2000 ( school under 1984 regimes ).
- Maybe someone will provide us with a copy of this. A packet
- radio modem at 1200 can be obtained easily for $50. TCP/IP
- packets are already being send over the bandwidth along with
- other network protocols. The usefulness of all this is that
- the information is broadcast and it is virgin territory. The
- baud limitation is due only based upon the bandwidth you are
- operating at and the number of collisions occurring. On a
- band you can see every packet that is being transmitted if
- you wish. All this is located on a 2 meter band. Currently
- the FCC forbids encryptions on the airwaves, although this is
- noted as being virtually impossible to enforce. It also takes
- 5 months to get an amateur radio license, and your personal info
- is recorded in a book easily obtained at libraries. The problem
- with going around the FCC is that there exist vigilante HAMs that
- monitor the bands and have nothing better to do than filter
- info and whine to the FCC. Bandwidths are decreasing though.
- This is due to an increased interest overall by communications
- in these areas. Unless you do something major the FCC will
- not give you much interest. The book on preparing yourself for
- a Tech Class can be obtained from Radio Shack for $9.
-
- Next up was dFx. He was promoting the HCon and Tone-Loc
- t-shirts that were for sale. Merchandising was getting pretty
- high. He also gave out a few Mitsubishi 800 disks. He was
- also recognized as the ONLY and LAST member of the Neon Knights,
- a club that had a wide range of comedy names generated. The
- word was put out the HCon '93 will be in December 17-19 with
- a hint that it could also wind up being in Austin. Then the
- conversation turned to Lord Byron's bust, which we should here
- more information on any day this week. The conversation
- reiterated the government narc that was at the AA meeting
- that was pressuring Byron. Byron was also noted as having
- rejected a plea bargain the courts offered him. And lastly,
- it is going to happen soon so get them while you can. The
- FTP site at eff.org will be dropping its CuD directory due
- to a conflict of interest with EFFs major contributors, mainly
- the RBOCs and other interest groups that don't like us.
-
- Erik Bloodaxe took the table next to talk about what
- was happening with his involvement with Phrack and some
- interesting info about Agent Steel. As for Phrack, the
- Email list is being with-held by Tuc. The mailing list
- has been refused at Mindvox due to files missing mysteriously
- at that site. And, no organization registered for Phrack #42
- since it was copyrighted with a nice and lengthy preamble,
- except for one company from Mitre. Currently Phrack #43 is
- in limbo and is estimated at 1 Meg long. Going onto the
- info about Agent Steel, basically he's a narc. Lord Havok from
- Canada is trying to restart the LOD under some unknown
- logical rationale that since LOD is defunct, anyone can
- reclaim the name. Lord Havoc, aka Cameron, has been going
- around trying to get documentation to put together an LOD
- technical journal #5. Supposedly there is a skin-head group
- in Canada that in now tracking Cameron down.
-
- Someone came up next [Minor Threat] and gave us an update on
- Codec. Two weeks after the last SCon, Codec was pulled over while
- on the run from the law for speeding and then arrested for
- burglary, resisting arrest, etc . . . He is estimated to
- be out of jail in 1995 and still has time to serve in a few
- other states. Mail can be sent to him at this address:
- codec@cypher.com. Maybe Crunch can give Codec some hints on
- how to get by in prison?
-
- From the CPSR, Eric Nielson took the table. He elaborated
- on the CPSR and ran a Q&A period. Basically, the CPSR files many
- FOIA requests and sues the government. Their focus is on the
- workplace computing. Elaboration was given on the Clipper Chip
- and computer ship security. The CPSR is staffed with lawyers
- and takes their funding from dues and grants. They are not
- sponsored by any corporations.
-
- From the far side of the table came the infamous Emmanuel
- Goldstein from 2600. He stated how he had testified at congress and
- gave them a live demonstration of bandwidth scanning and redboxing.
- While he was there, the inquisition started against him on the
- issue of 2600. Emmanuel then tried to explain the culture to
- our representative that it is bad to classify all hackers as
- criminals. Goldstein then went on to talk about the DC 2600 bust
- and how it has resulted in 2600 meetings springing up all across
- the country. A review of several films on software piracy at
- the office, disaster recovery and viruses from Commonwealth
- Films was given. And, to highlight everything, 2600 has purchased
- an AT&T van that they plan to take to assorted conventions and
- start a fleet of these up.
-
- Pst, BTW, on pg 43 of 2600 the intersection should be a jump =:)
-
- Last up was Erreth Akby, a Certified Netware Engineer. He
- explained that the only upgrade in Novell 4.0 is the disk compression.
- He also informed us that the supervisor and guest accounts generally
- have default passwords. TO hack into this Net, you should use a PC
- with full alt and functions keys. The supervisor p/w is on the
- RConsole in a file called autoexec.mcf on version 3.11. Netcrack
- will not work on a system with Intruder Lock-Out. Non-dedicated
- netware must boot from a floppy. Best of all, you can dial out
- by using cubix-quarts, which are PC with modems on the system.
-
- Below is a quick reprint of a paper that was recovered
- from Control-C's trashed room.
-
- Mrs Jasnagan,
-
- I would like to set up a meeting
- to discuss Kevin's progress in Social
- Studies and English. Please let
- me know when it would be
- convenient.
-
- Thank you
-
- ( Scribble , scribble )
-
- Dear Mr + Mrs Gormby,
-
- We would be happy
- to meet with you at
- 9:30 on Thursday, April
- 1st in Room 104
-
- Sincerely,
- M.Jarnagin
- &
- S.Dietrich
-
-
- Now, could this be Kevin Poulson ??? Naaa, no way.
- Amazing what technical data trashing will uncover. I guess
- I should throw this away now . . .
-
- After the convention, there was much rejoicing. The reasons
- would become fairly obvious as a 'swingers party' sign was soon
- located outside one of the hotel wings. Yes, it would be a very
- good convention.
-
- Several people made their way to the vehicles for a long
- night of trashing and raiding of the various FedEx, UPS and
- other assorted boxes around town. Other groups made their
- way to computers that were trying to connect with anything
- they could out in town. There were also those that reluctantly
- went to the mall to take advantage of the local population.
-
- What did not happen ??? Control-C did not get laid, but
- it was rumored that there were a few 12-year olds wandering
- around the hotel looking for this legendary hacker. No deaths
- had occured, the fires were kept to a minimum and nothing major
- was noted as being broken.
-
- One thing was for sure, there were a lot of alcoholic
- beverages going around, walkie-talkies, scanners, and wild
- tales. Several area buildings were broken into, but nothing
- major was done.
-
- Then the shit hit the fan. It seems several hackers had riled
- the swingers into a frenzy. I guess the swingers couldn't swing
- with it. What happened ??? Phones went ringing room to room and
- radios blared to life that the cops were here !!! At count, there
- were 6 cops, 1 sheriff and 4 hotel employees that started patrolling
- the hallways. Yes, we were under room arrest at our own convention
- in our own wing. Anyone that left there room was told to stay there
- or they would be arrested. The cops were very insistent that no
- pictures were to be taken. The swingers had broken our balls.
-
- But, this would not stop us. Soon, there was a phone network
- going on with radio interfaces. The windows opened and a few migrated
- to other locations of the hotel. After a while, the authorities left
- feeling satisfied that they had intimidated us. They didn't.
-
- After they left, the hallways erupted again. In the SotMESC
- room a gathering turned out to watch several techno-infested
- videos. At the cDc room were others viewing the HoHoCon '92 film
- that dFx brought down with him. At one point, the microwave
- around the lobby was detonated and a mysterious stack of Credit
- Card carbons was found. The liberated phones were being
- utilized to their full international extent, and several of the
- soda machines decided to give out a few free drinks.
-
- But, we couldn't leave well enough alone. Sir Lance went
- to the lobby and took a picture of the hotel Asst. Manager.
- I guess this guy didn't like his photo being taken, since he
- turned around and called the cops on Sir Lance. Down the hallway
- the cops came, dragging Sir Lance back with them. In the end,
- the cops explained to the Asst. Manager that it was not a crime
- in the US to take pictures of people.
-
- In another related story, Kaos Wizard wound up calling the
- SotMESC room with a wild plea for help. It seemed he was with
- a large group of trashers that included Albatross, Intrepid,
- Forced Entry, Zippy, The Public and more. Kaos was at a Central
- Office close to the hotel on Woodson and needed help. He had
- taken off to take a piss and noticed that the trashers were
- surrounded by cops when he returned. There was no way he was going
- back with all those cops there ( and, might I mention, there was
- also a police dog ). Mystic Moos gathered up a few people and
- went to rescue Kaos Wizard as the rest of the trashers returned
- to the hotel. It seems they had eluded the cops by telling them
- that they were waiting for their friend to return from taking
- a bathroom break ( Kaos Wizard ). Unfortunately, he never
- returned. The cops let them go eventually. Mystic Moos rescued
- Kaos Wizard, and the hotel was aglow in activity again.
-
- Control-C came down the hall at one point to make a startling
- discovery. It seems that at a local club there was a band playing
- that featured 'Lex Luthor'. The elusive X-LOD founder had been
- located. AFter some thought, it was decided he could stay there
- and sing the blues while the rest of us partied the night away.
-
- For those interested, the hotel fax is 314-731-3752.
-
- One of the police officers detaining us was S.M. Gibbons.
-
- IBM will send a 36 page fax to the number you give them.
- To activate, call 1-800-IBM-4FAX. As you can imagine, it wasn't
- long before the hotels fax ran out of thermal paper.
-
- Below is a gathering of Flyers . . .
-
- HoHoCon '92 Product Ordering Information
-
- If you are interested in obtaining either HoHoCon shirts or videos,
- please contact us at any of the following:
-
- drunkfux@cypher.com
- hohocon@cypher.com
- cDc@cypher.com
- dfx@nuchat.sccsu.com
- 359@7354 (WWIV Net)
-
- HoHoCon
- 1310 Tulane, Box #2
- Houston, Tx
- 77008-4106
-
- 713-468-5802 (data)
-
- The shirts are $15 plus $3 shipping ($4 for two shirts). At this
- time, they only come in extra large. We may add additional sizes if
- there is a demand for them. The front of the shirt has the following
- in a white strip across the chest:
-
- I LOVE FEDS
-
- ( Where LOVE = a red heart, very similar to the I LOVE NY logo )
-
- And this on the back:
-
- dFx & cDc Present
-
- HoHoCon '92
-
- December 18-20
- Allen Park Inn
- Houston, Texas
-
- There is another version of the shirt available with the following:
-
- I LOVE WAREZ
-
- The video includes footage from all three days, is six hours long and
- costs $18 plus $3 shipping ($4 if purchasing another item also).
- Please note that if you are purchasing multiple items, you only need
- to pay one shipping charge of $4, not a charge for each item. If
- you wish to send an order in now, make all checks or money orders
- payable to O.I.S., include your phone number and mail it to the street
- address listed above. Allow a few weeks for arrival.
-
- Thanks to everyone who attended and supported HoHoCon '92. Mail us if
- you wish to be an early addition to the HoHoCon '93 (December 17-19)
- mailing list.
-
-
-
- Calvary Black Crawling Systems
- 617-267-2732 617-482-6356
-
- ATDT EAST
- 617-350-STIF
-
- DemOnseed sez: "Call ATDT East or I'll crush your skull"
-
- Home of -= RDT...
-
-
- Trailings to follow . . . Slug, slug, slugfest . . .
-
- Join the ranks of the Cons: HoHoCon, MardiCon, SummerCon !!!
-
- ****************************************************************************
-
- Top 25 Things I Learned at SummerCon '93
- --------------------------------
- By Darkangel
-
-
- SummerCon is a place where many hackers from all over the
- world meet to discuss the current state of hacking today, and to
- drink themselves under the table. Every year, pages and pages of
- useful information is passed and traded among the participants.
- In this brief summery, I will attempt to point out the things
- that I learned and I thought were the most helpful to the whole
- hacker community. I hope you enjoy it.
-
- #1) DON'T let Control-C within 15 feet of any person that
- does not have a penis.
-
- #2) Knight Lightning will have a stroke before the age of
- 30.
-
- #3) French Canadians ALWAYS sound drunk.
-
- #4) Loops do not make good pickup lines.
-
- #5) The Zenith is outside the window. Just look up.
-
- #6) Smoking certain herbs is still illegal in St. Louis.
-
- #7) If you see a taxi and think it might be a cop, it
- probably is.
-
- #8) Hotel Security is worse than Mall Security.
-
- #9) The payphones in the lobby are not meant to be free.
-
- #10) Do not climb through the ceiling to get to the room
- with the PBX in it.
-
- #11) Do not glue the locks shut on an entire floor of the
- hotel. (especially when people are in them)
-
- #12) This machine is broken.
-
- #13) Do not dump bags you got trashing on the floor of
- someone else's room.
-
- #14) St. Louis police do not appreciate the finer points of
- Simplex lock hacking.
-
- #15) VaxBuster should never be allowed to drink Everclear.
-
- #16) Scribbles has a very nice ass.
-
- #17) Do not photograph Pakistani hotel security guards.
-
- #18) Do not try to bring a six pack through customs.
-
- #19) Loki is the Fakemail God.
-
- #20) Do not rip the phone boxes out of the walls and cut
- the wires.
-
- #21) Barbie Doll pornos can be cool.
-
- #22) Frosty can do weird things with techno and movies.
-
- #23) Always remove the mirrors from the walls to check for
- hidden cameras.
-
- #24) Do not threaten or harass other people staying at the
- same hotel. This can be bad.
-
- #25) I really don't think the hotel will let us come back.
-
- That wraps it up! See you at HoHoCon!
-
- -Darkangel
-
- ***************************************************************************
-
- Hack-Tic Presents
-
- H A C K I N G
-
- at the E N D of the
-
- U N I V E R S E
-
- 1993 SUMMER CONGRESS, THE NETHERLANDS
-
- =========================================================================
-
- HEU?
-
- Remember the Galactic Hacker Party back in 1989? Ever wondered what
- happened to the people behind it? We sold out to big business, you
- think. Think again, we're back!
-
- That's right. On august 4th, 5th and 6th 1993, we're organizing a
- three-day summer congress for hackers, phone phreaks, programmers,
- computer haters, data travellers, electro-wizards, networkers, hardware
- freaks, techno-anarchists, communications junkies, cyberpunks, system
- managers, stupid users, paranoid androids, Unix gurus, whizz kids, warez
- dudes, law enforcement officers (appropriate undercover dress required),
- guerilla heating engineers and other assorted bald, long-haired and/or
- unshaven scum. And all this in the middle of nowhere (well, the middle
- of Holland, actually, but that's the same thing) at the Larserbos
- campground four meters below sea level.
-
- The three days will be filled with lectures, discussions and workshops
- on hacking, phreaking, people's networks, Unix security risks, virtual
- reality, semafun, social engineering, magstrips, lockpicking,
- viruses, paranoia, legal sanctions against hacking in Holland and
- elsewhere and much, much more. English will be the lingua franca for
- this event, although one or two workshops may take place in Dutch.
- There will be an Internet connection, an intertent ethernet and social
- interaction (both electronic and live). Included in the price are four
- nights in your own tent. Also included are inspiration, transpiration, a
- shortage of showers (but a lake to swim in), good weather (guaranteed by
- god), campfires and plenty of wide open space and fresh air. All of this
- for only 100 dutch guilders (currently around US$70).
-
- We will also arrange for the availability of food, drink and smokes of
- assorted types, but this is not included in the price. Our bar will be
- open 24 hours a day, as well as a guarded depository for valuables
- (like laptops, cameras etc.). You may even get your stuff back! For
- people with no tent or air mattress: you can buy a tent through us for
- 100 guilders, a mattress costs 10 guilders. You can arrive from 17:00
- (that's five p.m. for analogue types) on August 3rd. We don't have to
- vacate the premises until 12:00 noon on Saturday, August 7 so you can
- even try to sleep through the devastating Party at the End of Time
- (PET) on the closing night (live music provided). We will arrange for
- shuttle buses to and from train stations in the vicinity.
-
- HOW?
-
- Payment: in advance please. Un-organized, poor techno-freaks like us
- would like to get to the Bahamas at least once. We can only guarantee
- you a place if you pay before Friday June 25th, 1993. If you live in
- Holland, just transfer fl. 100 to giro 6065765 (Hack-Tic) and mention
- 'HEU' and your name. If you're in Germany, pay DM 100,- to Hack-Tic,
- Konto 2136638, Sparkasse Bielefeld, BLZ 48050161. If you live elsewhere:
- call, fax or e-mail us for the best way to get the money to us from your
- country. We accept American Express, we do NOT cash ANY foreign cheques.
-
- HA!
-
- Very Important: Bring many guitars and laptops.
-
- ME?
-
- Yes, you! Busloads of alternative techno-freaks from all over the
- planet will descend on this event. You wouldn't want to miss that,
- now, would you?
-
- Maybe you are part of that select group that has something special to
- offer! Participating in 'Hacking at the End of the Universe' is
- exciting, but organizing your very own part of it is even more fun. We
- already have a load of interesting workshops and lectures scheduled,
- but we're always on the lookout for more. We're also still in the
- market for people who want to help us organize during the congress.
-
- In whatever way you wish to participate, call, write, e-mail or fax us
- soon, and make sure your money gets here on time. Space is limited.
-
- SO:
-
- - 4th, 5th and 6th of August
-
- - Hacking at the End of the Universe
- (a hacker summer congress)
-
- - ANWB groepsterrein Larserbos
- Zeebiesweg 47
- 8219 PT Lelystad
- The Netherlands
-
- - Cost: fl. 100,- (+/- 70 US$) per person
- (including 4 nights in your own tent)
-
- MORE INFO:
-
- Hack-Tic
- Postbus 22953
- 1100 DL Amsterdam
- The Netherlands
-
- tel : +31 20 6001480
- fax : +31 20 6900968
- E-mail : heu@hacktic.nl
-
- VIRUS:
-
- If you know a forum or network that you feel this message belongs on,
- by all means slip it in. Echo-areas, your favorite bbs, /etc/motd, IRC,
- WP.BAT, you name it. Spread the worm, uh, word.
- =========================================================================
-
- SCHEDULE
-
- day 0 August 3rd, 1993
- =====
- 16:00 You are welcome to set up your tent
- 19:00 Improvised Dinner
-
- day 1 August 4th, 1993
- =====
- 11:00-12:00 Opening ceremony
- 12:00-13:30 Workshops
- 14:00-15:30 Workshops
- 15:30-19:00 'Networking for the Masses' 16:00-18:00 Workshops
- 19:00-21:00 Dinner
- 21:30-23:00 Workshops
-
-
- day 2 August 5th, 1993
- =====
- 11:30-13:00 Workshops
- 14:00-17:00 Phreaking the Phone 14:00-17:00 Workshops
- 17:30-19:00 Workshops
- 19:00-21:00 Dinner
-
-
- day 3 August 6th, 1993
- =====
- 11:30-13:00 Workshops
- 14:00-18:00 Hacking (and) The Law 14:00-17:00 Workshops
- 18:00-19:00 Closing ceremony
- 19:00-21:00 Barbeque
- 21:00-??:?? Party at the End of Time (Live Music)
-
- day 4 August 7th, 1993
- =====
- 12:00 All good things come to an end
-
- =========================================================================
-
- 'Networking for the masses', Wednesday August 4th 1993, 15:30
-
- One of the main discussions at the 1989 Galactic Hacker Party focused on
- whether or not the alternative community should use computer networking.
- Many people felt a resentment against using a 'tool of oppression' for
- their own purposes. Computer technology was, in the eyes of many,
- something to be smashed rather than used.
-
- Times have changed. Many who were violently opposed to using computers
- in 1989 have since discovered word-processing and desktop publishing.
- Even the most radical groups have replaced typewriters with PCs. The
- 'computer networking revolution' has begun to affect the alternative
- community.
-
- Not all is well: many obstacles stand in the way of the 'free flow of
- information.' Groups with access to information pay such high prices for
- it that they are forced to sell information they'd prefer to pass on for
- free. Some low-cost alternative networks have completely lost their
- democratic structure. Is this the era of the digital dictator, or are we
- moving towards digital democracy?
-
- To discuss these and other issues, we've invited the following people
- who are active in the field of computer networking: [Electronic mail
- addresses for each of the participants are shown in brackets.]
-
- Ted Lindgreen (ted@nluug.nl) is managing director of nlnet. Nlnet is the
- largest commercial TCP/IP and UUCP network provider in the Netherlands.
-
- Peter van der Pouw Kraan (peter@hacktic.nl) was actively involved in the
- squat-movement newsletters 'Bluf!' and 'NN' and has outspoken ideas
- about technology and its relation to society. Had a PC all the way back
- in 1985!
-
- Maja van der Velden (maja@agenda.hacktic.nl) is from the Agenda
- Foundation which sets up and supports communication and information
- projects.
-
- Joost Flint (joost@aps.hacktic.nl) is from the Activist Press Service.
- APS has a bbs and works to get alternative-media and pressure groups
- online.
-
- Felipe Rodriquez (nonsenso@utopia.hacktic.nl) is from the Hack-Tic
- Network which grew out of the Dutch computer underground and currently
- connects thousands of people to the global Internet.
-
- Andre Blum (zabkar@roana.hacktic.nl), is an expert in the field of
- wireless communications.
-
- Eelco de Graaff (Eelco.de.Graaff@p5.f1.n281.z2.fidonet.org) is the
- nethost of net 281 of FidoNet, EchoMail troubleshooter, and one of the
- founders of the Dutch Fidonet Foundation.
-
- Michael Polman (michael@antenna.nl) of the Antenna foundation is a
- consultant in the field of international networking. He specialises in
- non-governmental networks in the South.
-
- Alfred Heitink (alfred@antenna.nl) is a social scientist specializing in
- the field of computer-mediated communication as well as system manager at
- the Dutch Antenna host.
-
- Rena Tangens (rena@bionic.zer.de), was involved in the creation of the
- Bionic Mailbox in Bielefeld (Germany) and the Zerberus mailbox network.
- She is an artist and wants to combine art and technology.
-
- The discussion will be led by freelance radiomaker and science
- journalist Herbert Blankesteyn. He was involved in the 'Archie'
- children's bbs of the Dutch VPRO broadcasting corporation.
- =========================================================================
-
- 'Phreaking the Phone', Thursday August 5th 1993, 14:00
-
- Your own telephone may have possibilities you never dreamed possible.
- Many years ago people discovered that one could fool the telephone
- network into thinking you were part of the network and not just a
- customer. As a result, one could make strange and sometimes free
- phonecalls to anywhere on the planet. A subculture quickly formed.
-
- The phone companies got wise and made a lot of things (nearly)
- impossible. What is still possible today? What is still legal today?
- What can they do about it? What are they doing about it?
-
- Billsf (bill@tech.hacktic.nl) and M. Tillman, a few of the worlds best
- phreaks, will introduce the audience to this new world. Phone phreaks
- from many different countries will exchange stories of success and
- defeat. Your life may never be the same.
- =========================================================================
-
- 'Hacking (and) The Law', Friday August 6th, 14:00
-
- You can use your own computer and modem to access some big computer
- system at a university without the people owning that computer knowing
- about it. For years this activity was more or less legal in Holland: if
- you were just looking around on the Internet and didn't break anything
- nobody really cared too much...
-
- That is, until shortly before the new computer crime law went into
- effect. Suddenly computer hackers were portrayed as evil 'crashers'
- intent on destroying systems or, at least, looking into everyone's
- files.
-
- The supporters of the new law said that it was about time something was
- done about it. Critics of the law say it's like hunting mosquitoes with
- a machine-gun. They claim the aforementioned type of hacking is not the
- real problem and that the law is excessively harsh.
-
- To discuss these issues we've invited a panel of experts, some of whom
- are, or have been, in touch with the law in one way or another.
-
- Harry Onderwater (fridge@cri.hacktic.nl), is technical EDP auditor at the
- Dutch National Criminal Intelligence Service (CRI) and is responsible for
- combatting computer crime in the Netherlands. He says he's willing to
- arrest hackers if that is what it takes to make computer systems secure.
-
- Prof. Dr. I.S. (Bob) Herschberg (herschbe@dutiws.twi.tudelft.nl), gained
- a hacker's control over his first system 21 years ago and never ceased
- the good work. Now lecturing, teaching and publishing on computer
- insecurity and imprivacy at the technical university in Delft. His
- thesis: 'penetrating a system is not perpetrating a crime'.
-
- Ronald 'RGB' O. (rgb@utopia.hacktic.nl) has the distinction of being the
- only Dutch hacker arrested before and after the new law went into effect.
- He is a self-taught UNIX security expert and a writer for Hack-Tic
- Magazine.
-
- Ruud Wiggers (ruudw@cs.vu.nl), system manager at the Free University
- (VU) in Amsterdam, has for 10 years been trying to plug holes in system
- security. He was involved in the RGB arrest.
-
- Andy Mueller-Maguhn (andy@cccbln.ccc.de) is from the Chaos Computer Club
- in Germany.
-
- Eric Corley (emmanuel@eff.org) a.k.a. Emmanuel Goldstein is editor
- of the hacker publication '2600 magazine'. The first person to realize
- the huge implications of the government crackdown on hackers in the US.
-
- Winn Schwartau (wschwartau@mcimail.com) is a commercial computer
- security advisor as well as the author of the book 'Terminal
- Compromise'. His new book entitled 'Information Warfare' has just been
- released.
-
- Ray Kaplan (kaplan@bpa.arizona.edu) is a computer security consultant.
- He is constantly trying to bridge the gap between hackers and the
- computer industry. He organizes 'meet the enemy' sessions where system
- managers can teleconference with hackers.
-
- Wietse Venema (wietse@wzv.win.tue.nl) is a systems expert at the
- Technical University in Eindhoven. He is the author of some very well
- known utilities to monitor hacking on unix systems. He has a healthy
- suspicion of anything technical.
-
- Peter Klerks (klerks@rulfsw.leidenuniv.nl) is a scientist at the centre
- for the study of social antagonism at the Leiden University. He has
- studied the Dutch police force extensively, and is author of the book
- 'Counterterrorism in the Netherlands.'
-
- Don Stikvoort (stikvoort@surfnet.nl), one of the computer security
- experts for the Dutch Academic Society and chairman of CERT-NL (Computer
- Emergency Response Team). He is also actively involved in SURFnet
- network management.
-
- Rop Gonggrijp (rop@hacktic.nl) was involved in some of the first
- computer break-ins in the Netherlands during the 80's and is now editor
- of Hack-Tic Magazine.
-
- The discussion will be led by Francisco van Jole (fvjole@hacktic.nl),
- journalist for 'De Volkskrant'.
- =========================================================================
-
- WORKSHOPS
-
- HEUnet introduction
- an introduction to the Hacking at the End of the Universe network.
-
- Jumpstart to VR, 3D world-building on PC's
- Marc Bennett, editor of Black Ice magazine, will explain how to
- design worlds on your own PC which can be used in Virtual Reality
- systems.
-
- Replacing MS/DOS, Running UNIX on your own PC
- People who are already running unix on their PCs will tell you what
- unix has to offer and they'll talk about the different flavours in
- cheap or free unix software available.
-
- Unix security
- RGB and fidelio have probably created more jobs in the unix security
- business than the rest of the world put together. They'll talk about
- some of the ins and outs of unix security.
-
- E-mail networking
- Should we destroy X400 or shall we let it destroy itself?
-
- 'User Authorization Failure'
- A quick introduction to the VAX/VMS Operating System for those that
- consider a career in VMS security.
-
- 'The right to keep a secret'
- Encryption offers you the chance to really keep a secret, and
- governments know it. They want you to use locks that they have the
- key to. The fight is on!
-
- 'Virus about to destroy the earth!'. Don't believe the hype!
- What is the real threat of computer viruses? What technical
- possibilities are there? Are we being tricked by a fear-machine that
- runs on the money spent on anti-virus software?
-
- 'It came out of the sky'
- 'Receiving pager information and what not to do with it'. Information
- to pagers is sent through the air without encryption. Rop Gonggrijp
- and Bill Squire demonstrate a receiver that picks it all up and
- present some spooky scenarios describing what one could do with all
- that information.
-
- Cellular phones and cordless phones
- How do these systems work, what frequencies do they use, and what are
- the differences between different systems world-wide?
-
- Zen and the art of lock-picking.
- In this workshop The Key will let you play with cylinder locks of all
- types and tell you of ingenious ways to open them.
-
- "Doesn't mean they're not after you"
- The secret services and other paranoia.
-
- Audio Adventures
- Steffen Wernery and Tim Pritlove talk about adventure games that you
- play using a Touch Tone telephone.
-
- Botanical Hacking (THC++)
- Using computers, modems and other high tech to grow.
-
- Wireless LAN (Data Radio)
- How high a data rate can you pump through the air, and what is still
- legal?
-
- Social Engineering
- The Dude, well known from his articles in Hack-Tic, will teach you
- the basics of social engineering, the skill of manipulating people
- within bureaucracies.
-
- 'Hacking Plastic'
- Tim and Billsf talk about the security risks in chip-cards, magnetic
- cards, credit cards and the like.
-
- Antenna Host Demo
- The Antenna Foundation is setting up and supporting computer
- networks, mainly in the South. They are operating a host system in
- Nijmegen, The Netherlands, and they will demonstrate it in this
- workshop, and talk about their activities.
-
- APS Demo
- APS (Activist Press Service) is operating a bbs in Amsterdam, The
- Netherlands. You'll see it and will be able to play with it
- 'hands-on'.
-
- 'Hocking the arts'
- Benten and Marc Marc are computer artists. They present some of their
- work under the motto: Hocking the arts, demystifying without losing
- its magic contents.
-
- Public Unix Demo
- Demonstrating the Hack-Tic xs4all public unix, as well as other
- public unix systems.
-
- Packet Radio Demo
- Showing the possibilities of existing radio amateur packet radio
- equipment to transport packets of data over the airwaves.
- =========================================================================
-
- COMPUTERS AT 'HACKING AT THE END OF THE UNIVERSE'
-
- This will get a little technical for those who want to know what we're
- going to set up. If you don't know much about computers, just bring
- whatever you have and we'll see how and if we can hook it up.
-
- We're going to have ethernet connected to Internet (TCP/IP). You can
- connect by sitting down at one of our PC's or terminals, by hooking up
- your own equipment (we have a depository, so don't worry about theft),
- or by using one of our 'printerport <--> ethernet' adapters and
- hooking up laptops and notebooks that way. There may be a small fee
- involved here, we don't know what they're going to cost us. Contact us
- for details, also if you have a few of these adapters lying around.
- There might also be serial ports you can connect to using a nullmodem
- cable.
-
- You can log in to our UNIX system(s) and send and receive mail and
- UseNet news that way. Every participant that wants one can get her/his
- own IP number to use worldwide. Users of the network are urged to make
- whatever files they have on their systems available to others over the
- ethernet. Bring anything that has a power cord or batteries and let's
- network it!
- =========================================================================
-
- --
- Hstorm ++31 2230 60551
- Ad Timmering <north@hstorm.hacktic.nl>
-