home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 51.2 KB | 1,170 lines |
- ==Phrack Magazine==
-
- Volume Five, Issue Forty-Six, File 2 of 28
-
- ****************************************************************************
-
- Phrack Loopback
-
-
- ------------------------------------------------------------------------------
-
- I'd like to write you about my friends cat. His name is 'Cid. Cid
- loves reading, in fact he'll read just about anything, from the labels on
- his cat food tins to the instructions on the "real" use of his Grafix
- (incense burner :) ). Well one take, 'Cid (or was it me) was indulging
- in the reason he got his moniker and mentioned that he'd like to receive
- Phrack. Well i told him he could just subscribe to it and then he went
- into a real sob story about how he doesn't have net access. So as a
- favor to 'Cid (who really does exist, and really has tripped out on brain
- blotters) i'd like to subscribe to Phrack.
-
- [You my want to take note that Phrack can also be printed on paper.
- Now, that's a lot of blotter.
-
- You've got your subscription, now go watch some anime.]
-
- ------------------------------------------------------------------------------
-
- I recently got a new job and shortly after beginning working there, they
- decided to retool and reorganize a bit for better productivity.
-
- While we were going through some old boxes and stuff, I came across a
- little black box with the words "Demon Dialer" molded into the front of
- it, it even had the (functional!) 20volt power supply.
-
- Needless to say I was pretty happy with my find. I asked if I could have
- it and since no one else there seemed to know what to make of it, mine it
- was!
-
- My only problem now... I've played around with it, and it seems to do a
- lot more than what I originally thought, but the fact of the matter is..
- I really haven't the foggiest idea of how to get it to REALLY work for me.
-
- If anyone has any information, or better still, actual documentation for
- a Telephonics Inc, Demon Dialer.. I'd really appreciate passing it on to me.
-
- Also, something rater strange. The phone cable attached to it had a
- normal looking 4-wire connector on one end, but the other was split to
- have RJ jacks, one with the yellow-black combo and one with the
- red-green. The split ends (sorry :)) were plugged into the WALL and
- PHONE jacks on the demon dialer. The purpose for this perplexes me since
- one's supposed to be input and one's supposed to be a passthrough for the
- phone to be plugged into.
-
- Anyway, any info would be nice. Thanks guys.
-
- [Telephonics was one of those odd telco device manufacturers back in the
- 80's. They made the demon dialer (a speed dialing device), a
- two-line conference box, a divertor, etc. Essentially, they provided
- in hardware what the telco's were beginning to roll-out in software.
-
- I think the line splitter you have was merely plugged into those
- two jacks for storage purposes. What that probably was for was to
- allow two lines to use the Demon Dialer. It was probably just reversed
- when your company boxed it so it wouldn't get lost.
-
- I'm not sure if Telephonics is still in business. A good place to
- start looking for info would be comp.dcom.telecom or alt.dcom.telecom.
- Another good place may be Hello Direct (800-HI-HELLO). They used to
- do have Telephonics equipment available for mail-order.]
-
- ------------------------------------------------------------------------------
-
- I saw an ad for a book called "Secrets of a SuperHacker" by Knightmare.
- Supposedly it intersperses tales of his exploits with code and examples.
- I have big doubts, but have you heard anything good/bad about it?
-
- [Your doubts are well founded. I got an advance copy of that book.
- Let's put it this way: does any book that contains over a dozen pages
- of "common passwords" sound like ground breaking material?
-
- This book is so like "Out of the Inner Circle" that I almost wanted
- to believe Knightmare (Dennis Fiery) was really yet another
- alias for Bill Landreth. Imagine "Out of the Inner Circle" with
- about a hundred or more extra pages of adjectives and examples that
- may have been useful years back.
-
- The Knightmare I knew, Tom in 602, whose bust by Gail Thackeray
- gave law enforcement a big buffer of the Black Ice Private BBS
- and help spark the infamous LOD Hacker Crackdown, certainly didn't
- have anything to do with this. In fact, the book has a kind of
- snide tone to it and is so clueless, that leads me to believe it
- may have been written by a cop or security type person looking to
- make a quick buck.
-
- As far as source code, well, there is a sample basic program that
- tries to emulate a university login.
-
- If you want a good book, go buy "Firewalls and Internet Security" by
- Cheswick and Bellovin.]
-
- ------------------------------------------------------------------------------
-
- Hey Chris,
-
- I'm sure you are under a constant avalanche of requests for certain files,
- so I might as well add to your frustration <grin>. I know of a program
- that supposedly tracks cellular phone frequencies and displays them on
- a cellmap. However, I don't know the name of the program or (obviously)
- where to find this little gem. I was wondering if you could possibly
- enlighten me on a way to acquire a program similar to the one I have
- described. I have developed some other methods of tracking locations
- of cellular calls. However my methods rely on a database and manually
- mapping cellular phones, this method is strictly low tech. Of course
- this would be for experimental use only, therefore it would not be used
- to actually track actual, restricted, radio spectrum signals. I wouldn't
- want the aether Gestapo pummeling our heads and necks.
-
- [I don't know of anything that plots frequencies on a cellmap. How would
- you know the actual locations of cells for whatever city you may
- be in to plot them accurately?
-
- There are a number of programs written to listen to forward channel messages
- and tell you when a call is going to jump to another channel. The cellular
- telephone experimenter's kit from Network Wizards has a lot of nice
- C source that will let you write your own programs that work with their
- interface to the OKI 900. I suppose you could get the FCC database
- CD-ROM for your state and make note of longitude and latitude of cell sites
- and make your own database for your city, and then make a truly
- visual representation of a cellmap and watch calls move from cell to cell.
- But I don't think there is such a thing floating around the underground
- at present.
-
- Of course the carriers have this ability, and are more than happy to make
- it available to Law Enforcement (without a warrant mind you). Hi OJ!
-
- email Mark Lottor mw@nw.com for more info about the CTEK.]
-
- ------------------------------------------------------------------------------
-
- I saw this in a HoHoCon ad:
-
- Top Ten Nark List
- 1. Traxxter
- 2. Scott Chasin
- 3. Chris Goggans
- 4. Aget Steal
- 5. Dale Drrew
- 6. Cliff Stoll
- 7. [blank]
- 8. Julio Fernandez
- 9. Scanman
- 10. Cori Braun
-
- What did Chris Goggans do? Isn't he Erik Bloodaxe, the publisher of
- Phrack? I sincerely doubt that the feds would have someone
- working for them that puts out a publication like Phrack. It would
- be way too much of an embarrassment for them. I wrote to the
- editor of Phrack when I read that Agent Steal said that the publisher
- of Phrack was a Fed - IN PHRACK no less. He said it was a stupid rumor.
- Is there anything to support this fact? And why is there now some manhunt for
- Agent Steal (at CFP the FBI was checking legs) if Steal was admittedly
- their employee? The whole thing is very confusing to me. Please explain.
- If Goggans isn't Bloodaxe then he'd Knight Lightning (this just came to me).
- Nevertheless, what's the story here?
-
- [First off, I think you take things a little too seriously. If you are on
- a nark hunt, worry about your associates, not people you obviously
- don't even know. Chris Goggans (ME) is most positively Erik Bloodaxe.
- Thanks for remembering.
-
- Agent Steal was involved with the FBI. This is a fact.
- In his case, he even appeared to have some kind of immunity while trying
- to gather information on other hackers like Mitnik and Poulsen. This
- immunity is under scrutiny by the Bureau's own Internal Affairs (or so the
- new rumors go), since Steal was pulling a fast one and committing crimes
- the Bureau didn't know about to get some quick cash while he set up his
- friends.
-
- My story is a bit more convoluted. You can sum it up by saying, if you
- interfere with my businesses, I'll try my best to track you down and turn
- you in. I guess I am a nark.]
-
- ------------------------------------------------------------------------------
-
- I read in the last Phrack (45) that you wanted someone to write a few
- words on scrambling systems. Give me a rough outline of what you want
- and I'll see if I can help :-) Basically I wrote the Black Book
- (European Scrambling Systems 1,2,3,4,5 and World Satellite TV &
- Scrambling Methods) and also edit Hack Watch News & Syndicated
- HackWatch. They all deal with scrambling system hacks as opposed to
- computer hacking & phreaking. (Things are a bit iffy here as regards
- phreaking as all calls are logged but the eprom phone cards are easy
- to hack) Oh yeah and another claim to fame ;-) if you can call it
- that, is that I was quoted in an article on satellite piracy in
- "Wired" August issue.
-
- This Hawkwind character that you had an article from in Phrack43
- sounds like a *real* hacker indeed :-> Actually there is an elite in
- Ireland but it is mainly concerned with satellite hacking and that
- Hawkwind character is obviously just a JAFA (Irish hacker expression
- - Just Another Fu**ing Amateur). Most of the advanced telco stuff is
- tested in the south of the country as Dublin is not really that
- important in terms of comms - most of the Atlantic path satellite
- comms gear and brains are on the south coast :-)
-
- Actually the Hawkwind article really pissed off some people here in
- Ireland - there were a few questions asked on my own bbs (Special
- Projects +353-51-50143) about this character. I am not even sure if
- the character is a real hacker or just a wannabe - there were no
- responses from any of his addresses. SP is sort of like the neutral
- territory for satellite and cable hacking information in Europe
- though there are a few US callers. With the way things are going with
- your new DBS DirecTv system in the US, it looks like the European
- satellite hackers are going to be supplying a lot of information
- (DirecTv's security overlay was developed by News Datacom - the
- developers of the totally hacked VideoCrypt system here in Europe).
-
- There telco here uses eprom phone cards. These are extremely easy to
- hack (well most real hackers in .IE work on breaking satellite
- scrambling systems that use smart cards) as they are only serial
- eprom.
-
- Regards
-
- [About the satellite information: YES! Write the biggest, best
- article the whole fucking hacker world has ever seen about
- every aspect of satellite tv!! Personally, I'm more interested in
- that than anything else anyone could possibly write (seeing as how
- I'm about to buy a dish for both C and Ku).
-
- About Hawkwind's article on hacking in Ireland: If I were to write
- an article about hacking in America, it would be entirely different
- than anyone else in America would write. A country is a big place.
- Just because someone else's hacking experience is different than
- your own, it's no reason to discredit them. However, if your
- exposure to the scene in Ireland is so completely different than
- Hawkwind's, I would LOVE to print it as well.]
-
- ------------------------------------------------------------------------------
-
- The Columbus Freenet uses a password generating routine that takes the
- first and last initial of the user's real name, and inserts it into a randomly
- chosen template. Some of the templates are:
-
- E(f)www5(l)
- (f)22ww5(l) where f and l are first and last initials
- (f)2ww97(l)
- (f)2ww95(l)
-
- and so on. There are not too many of these templates, I guess maybe 50.
- I imagine most people go in and change their password right away, but
- then again that's what a prudent person would do (so they probably don't).
-
- Columbus 2600 meetings:
-
- Fungal Mutoid-sysop of The KrackBaby BBS (614-326-3933) organized the
- first 2600 meetings in Columbus, unfortunately hardly anyone shows up...
- I don't know why HP is so dead in Central Ohio, but fear and paranoia
- run rampant.
- That's all for now...keep up with the good work!
-
- R.U.Serius?!
-
- [Hmmm...templates are always a bad thing. All one has to do is get the
- program that generates them, and viola, you've got a pre-made dict file
- for your crack program. Not very smart on the part of the Freenet,
- but hacking a Freenet, is like kicking a puppy.
-
- I hope more people go to your 2600 meetings. The ones here in Austin
- kinda died out too. Maybe our cities are just lame.]
-
- ------------------------------------------------------------------------------
-
- A complaint: That piece about McDonald's in Phrack 45 was, in a word, LAME.
- Surely Phrack can do better. Maliciousness for its own sake isn't very
- interesting and frankly the article didn't have any ideas that a bored
- 13-year-old couldn't have thought up--probably written by one.
-
- That aside, I found some good stuff in there. Some of it was old news,
- but Phrack serves an archival purpose too, so that was ok. On a more
- personal note, I could really relate to your account of HoHoCon--not that
- I was there, just that I have started to feel old lately even though I don't
- turn 25 for another 2 days :) Sometimes I feel myself saying things like
- "Why, sonny, when I was your age the Apple II was king..."
-
- Keep up the good work, and don't let the lamers get you down.
-
- [Thanks for the letter. I personally thought the McDonald's file was
- a laugh riot. Even if it was juvenile and moronic, I wouldn't expect
- anyone to analyze it and go through with anything it contained. It was
- just for fun. Lighten up :)
-
- I am glad to see that at least someone else recognizes that Phrack
- is attempting to serve as an archive of our subculture, rather than just
- a collection of technical info that will be outdated overnight, or a
- buglist that will be rendered mostly unusable within hours of release.
-
- There is so much going on within the community, and it is becoming such a
- spectacle in the popular media, that in 20 years, we can all go back and
- look at Phrack and remember the people, places, and meetings that
- changed the face of the net.
-
- Or maybe I'm just terribly lame, and either 1) refuse to put in the
- good stuff, 2) don't have access to the good stuff, 3) exist only as a
- puppet agent of The Man, or 4) Don't know nothin' 'bout Telco!
- But you know what they say about opinions.]
-
- ----------------------------------------------------------------------------
-
- I have a few comments on your editorial in Phrack 44 (on information
- wants to be free). Thanks for voicing an opinion that is shared by many
- of us. I am glad to see a public figure in the CuG with nutz enuff to
- actually come out and make such a statement and mean it.
- Again, thanks.
-
- Now on the subject of hacking as a whole. Is it just me, or are the number
- of losers on the increase? There have always been those who would try
- and apply these skills to ripoff scams and system trashing but now that
- seems to be the sole intent of many of the "hackers" I come into contact
- with. What ever happened to hacking to learn more about the system. To
- really hack a system (be it phone, computer), is a test of skill and
- determination, and upon success you walk away with a greater understanding
- of the machine and its software. Hacking is more than just knowing how
- to run crack on a filched password file, or using some exploitation
- scripts picked up on IRC, it is a quest for knowledge and gaining
- superiority over a system by use of great skill acquired by a deliberate
- effort. Once was a time when things like toll fraud (I do miss blue
- boxes) were a means to an end, now they seem to be the end in itself.
-
- Also, I am researching info on OSI comsec procedures and have found some
- really interesting goodies, if you are interested in publishing
- my piece when completed, let me know..
-
- [(NOTE: This came from a .mil)
- Man, I'm glad to see that people in the armed forces still have minds
- of their own. Not many people would express such a thing openly.
-
- Yes, the destructive/profit-motivated trends of many of the hackers of
- today are pretty sad. But you have to realize, as the technology
- becomes more and more like consumer electronics, rather than the
- traditional mold of computer as scientific research tool, an entirely
- different market segment will be exposed to it and use the technology
- for less than scrupulous means.
-
- Even the act of hacking itself. Today, I can basically gain access
- to any model of system known to man by asking. I realize that
- there are many who cannot accomplish such a thing, but with the
- proliferation of public access sites, almost everyone can afford
- access to the net to explore and learn. The point comes down to this:
- if you have an account on a Sun, why do you need an account on a Sun
- at Boeing, unless you either 1) want to sell the cad files of the 777 to
- Airbus or McDonnell-Douglas 2) want to get financial information to
- make a killing on Wall Street, or 3) just want to have an ego boost
- and say "I OWN BOEING!"
-
- Personally, I can understand the ego boost aspect, but I've decided that
- I'd much rather get paid by a company like Boeing to hack for them
- than against them. I don't want to sell anyone's info, so hacking
- into any company is basically useless to me, unless they are paying me
- to look for potential weaknesses.
-
- Granted, it's not an easy market to get into, but it's a goal to
- shoot for.
-
- And for those who find it impossible to quit due to fear of losing
- their edge, check out my editorial in this issue for a possible
- solution.]
-
- ------------------------------------------------------------------------------
-
- I am looking for a Macintosh app that does the same thing as an app
- called "Demon Dial" that has been lost in the annals of software
- history due to the fact that some people (sysops) question whether it
- is illegal software (it dials up a series of phone #'s looking for data
- connections). Do you know where I could find an application for the Mac
- that does this simple function?
-
- [We had a guy ask in an earlier issue for Macintosh hacking/phreaking
- apps. Noone responded. Hell, I know SOMEONE has to use a Mac
- out there. Are you Mac-weenies all embarrassed to speak up?
-
- Hell, uuencode and email me your aps, and I'll put them up for
- ftp! Help out your poor fellow Macintosh users. I certainly
- would if I could, but the thought of touching a Mac gives me the
- chills.]
-
- ------------------------------------------------------------------------------
-
- Have you ever heard of being denied access to your own cell phone?
- I am currently in the process of buying a cell phone and was informed
- that I COULD NOT have the programming guide of the security code
- they enter to program my phone. In my opinion the key word is "MY."
- If I get a digital security system for my house you better damn well
- figure I will have the security codes for that. The phone was a Motorola
- flip phone. I called Motorola and explained how displeased I was with
- this company and they said they could not interfere with a reps. policy.
- When I was selling car phone we kept the programming guide unless they
- asked for it. I demanded it and they laughed in my face. Who said
- "the customer is always right" anyway?
-
- Thanks, any info is greatly appreciated. By the way, you wouldn't
- happen to have the CN/A number for 815 would you? Also, any ANAC
- would be very helpful.
-
- [Well, I hate to say it, but you got typical service from your
- cellular agent. Let's face it, these sales reps probably knew
- about as much about that programming manual as I do nuclear
- physics: "Its confusing, but if you understand it, you can fuck
- things up."
-
- I am surprised that Motorola wouldn't sell you the book though.
- Motorola will sell anybody anything. You probably called the wrong
- place. Moto is so huge they've got multiple groups working on somewhat
- similar technologies with absolutely no communication between the groups.
- Sometimes they are in different countries, but sometimes they are in the
- same city! I would suggest you call a local FAE (Field Applications
- Engineer)
- and get them to get the book for you. Make up some story about
- working on some computer controlled application with the phone, and that
- you need any and all documentation on the phone. They'll do it. Money
- is money.
-
- As far as the 815 CNA, hell, just call the business office. I haven't
- called a CNA in years, only the business office. They are nice people.
- And no PINs.
-
- 815 ANAC: ok guys, someone must have one...email it!
-
- "The customer is always right" wasn't in Bartlett's or Columbia's
- books of famous quotations. I guess that phrase has been written out of out
- history. So, from now on you aren't always right, I guess.]
-
- ------------------------------------------------------------------------------
-
- Dear Phrack:
-
-
- We want you!
-
- We want you to be a part of our cutting edge documentary that is traversing
- across the "NEW EDGE" of computers, culture, and chaos.
-
- Working in conjunction with Douglas Rushkoff, the best selling author of
- "CYBERIA," we are currently gathering together the leaders of this
- technological and cultural revolution. This is not a documentary in the
- traditional sense of the word. It is more of an exploration, a journey, a
- unique vision of the world as seen through the eyes of those who live on the
- bleeding edge; where technology, art, science, music, pleasure, and new
- thoughts collide. A place people like you and me like to call home.
-
- "New Edge" will deliver a slice of creativity, insanity, and infallibility,
- and feed those who are hungry for more than what Main Street USA has to
- offer. This project will detonate across the US and around the world. It
- will become the who's who of the new frontier and you belong on it's
- illustrious list of futurians. Please look over the enclosed press release
- description of the project.
-
- Phrack has long been the ultimate source for hack/phreak info, and helped to
- push the limits of free speech and information. The role that Phrack has
- played in the Steve Jackson Games Case set an important precedent for
- CyberLaw. We will also be interviewing several people from the EFF.
-
- Please call me ASAP to schedule an interview for "New Edge", or send me
- E-Mail.
-
- Sincerely,
-
- Todd LeValley
- Producer, N E W E D G E
- (310) 545-8138 Tel/Fax
- belief@eworld.com
-
-
- W E L C O M E
- T O T H E
- W O R L D
- O N T H E
- E D G E O F
- T H E F U T U R E
-
-
- W E L C O M E
- T O T H E
- N E W E D G E
- -the documentary-
-
-
- T h e O r g a n i z a t i o n
-
- Belief Productions in association with Film Forum.
-
- T h e M i s s i o n
-
- Journey through the labyrinth of cyberia and experience the people, places
- and philosophy that construct cyberspace and the shores of the technological
- frontier. This fast paced visual voyage through the digital revolution will
- feature interviews with the innovators, artists, cyberpunks, and visionaries
- from all sides of the planet. These specialists are the futurists who are
- engineering our cybergenic tomorrow in laboratories today. Along the way we
- will investigate the numerous social and political issues which are cropping
- up as each foot of fiber optic cable is laid. Artificial intelligence, the
- Internet, nanotechnology, interactive media, computer viruses, electronic
- music, and virtual reality are just a few of the many nodes our journey will
- explore.
-
- T h e F u n d i n g
-
- This exploration is sponsored in part by a grant from The Annenberg
- Foundation in association with the LA based non-profit cutting-edge media
- group Film Forum.
-
- T h e P r o c e s s
-
- The New Edge project will capture moving images with a variety of input
- devices and then assemble them into one fluid documentary using Apple
- Macintosh Quadras & PowerMac computers. The post production work will be
- done entirely on the computers using the Radius Video Vision Telecast Board
- in conjunction with Quicktime software applications such as Adobe Premiere
- 4.0 and CoSA After Effects 2.01. The final piece will be recorded to BETACAM
- SP videotape for exhibition and distribution. The capture formats for the
- project will include: BETACAM SP, Super VHS, Hi-8, 16MM Film, Super-8 Film,
- 35MM Stills, and the Fisher
- Price Pixelvision 2000.
-
- T h e R e s u l t s
-
- New Edge will pride itself on an innovative visual and aural style which
- before today, could only be created on high-end professional video systems
- and only for short format spots. The New Edge documentary will be two hours
- in length and will have a dense, layered look previously featured only in
- much shorter pieces. New Edge will be a showcase piece not only for the
- content contained within, but for the way in which the piece was produced.
- It will be a spectacular tribute to the products and technology involved in
- its creation.
-
- D i s t r i b u t i o n
-
- Direct Cinema - Distributes videos to Libraries, Schools, and Universities
- throughout the United States.
-
- Mico Entertainment/NHK Enterprises - Provider of American programming for
- Japanese Television.
-
- Labyrinth Media Ltd. - European reality-based documentary distributor
-
- T h e A u d i e n c e
-
- New Edge is aimed at both the technophiles and technophobes alike. While the
- show will feature very complex and sophisticated topics, the discussions will
- be structured to appeal to both those who do and do not have the technical
- framework that underlines the cyberian movement. The show's content and
- style will make it readily available to the MTV and Generation X demographic
- groups as well as executives who want to stay on top of the latest
- technological advances. Individuals who read Mondo 2000 and Wired magazine
- will also naturally latch on to this electronic
- presentation of their favorite topics.
-
- T h e G u i d e s
-
- Mike Goedecke - Director/Graphic Designer
- Mike was the Writer/Director/Cinematographer for the Interplay CD-ROM game
- entitled Sim City. Acting as graphic designer for the Voyager Co.- Criterion
- Laser Disc Division his work is featured on titles such as: Akira, DEVO-The
- Truth About De-Evolution, The Adventures of Baron Munchausen, and Spartacus.
- Most recently he collaborated with Los Angeles Video Artist Art Nomura on a
- video installation piece entitled Digital Mandala. The piece was edited,
- composited , and mastered to Laser Disc using an Apple Macintosh Computer and
- off-the-shelf software. The installation is scheduled to tour museums and
- art galleries across the United States and Europe. While attending
- Cinema/Television Graduate School at the University of Southern California,
- Mike directed the award winning documentary short Rhythm, which celebrates
- various musical cultures.
-
- Todd LeValley - Producer/Graphic Designer
- Todd is the Producer/Director of CyberCulture: Visions From The New Edge, a
- documentary that introduces the electronic underground. This project has
- been warmly received at numerous "Cyber Festivals" around the country, as
- well as at the Director's Guild Of America, and is currently being
- distributed by FringeWare Inc. Todd's commercial experience includes being
- the in-house graphic designer for Barbour/Langley Productions designing,
- compositing, and producing the graphic packages for several 20th Century Fox
- Television pilots and The Sci-Fi Trader for the USA Network/Sci-Fi Channel.
- Todd is a graduate of the Cinema/Television program at Loyola Marymount
- University.
-
- Jeff Runyan - Cinematographer/Editor
- Jeff received an MFA from the University of Southern California's Graduate
- School of Cinema/Television with an emphasis in cinematography and editing.
- He studied cinematography under the guidance of Woody Omens, ASC. and Earl
- Rath, ASC., and editing with Edward Dmytryk. Jeff was the cinematographer on
- the award wining documentary Rhythm. He has recently completed shooting and
- editing a documentary on Academy Award winning Cinematographer Conrad Hall
- for the ASC and has just finished directing a short film for USC
- Teleproductions.
-
- Douglas Rushkoff - Cyber Consultant/Author
- Douglas is the author of the best selling Harper Collins San Francisco novel,
- Cyberia. He spent two years of his life living among the key players in the
- cyber universe. Douglas knows the New Edge well and is providing us with the
- map to its points of interest, rest stops and travelers.
-
- For more information, please contact:
- Todd LeValley, Producer
- Belief Productions
- (310) 545-8138
- belief@eworld.com
-
- [Dear New Edge:
-
- You have got to be kidding me. "Readers of Wired and Mondo 2000 will
- naturally latch on to this electronic presentation of their favorite
- topics?"
-
- Aren't we awful fucking high on ourselves? Christ. Mondo & Wired
- readers and writers (and stars) are themselves so fucking far removed
- from the real meat of the underground, that they wouldn't
- even be able to relate to it. Obviously this "documentary"
- is going to be aimed at the wannabes who sit at home furiously
- masturbating to "Cyborgasm" while installing FRACTINT, being very
- careful not to soil their copy of "The Hacker Crackdown." Oh joy.
-
- These guys are so fucking out of it, they sent me two letters.
- One addressed to Phrack, the other to Phrack / Emmanuel Goldstein.
- Maybe they think we're 2600.
-
- CYBER-COUNT: 12 occurrences.
-
- That's kind of low. I'm surprised your public relations people didn't
- have you add in a few more cyber-this's or cyber-that's into the
- blurb. Gotta keep that cyber-count high if you want to get those
- digi-bucks out of those cyberians! CYBER!!!
-
- Read my review of Cyberia guys...find a new pop-fad to
- milk for cash.]
-
- ------------------------------------------------------------------------------
-
- In less than 3 weeks, I will be leaving for Basic Training. Once out of
- there, I will be working on Satellite Data Transmissions for the US
- Army. I am highly excited, just waiting to see what type of computers
- I will be working on. Anyways, I will be enrolled in a 32-week
- accelerated technical class teaching me all about satellites, and
- the computers that I will be using. Here's the kick. I'll be writing
- a series of Tech Journals detailing the workings/operations of/weaknesses,
- and the use of the systems. I was wondering if you would be interested
- in carrying these. I've read Phrack for a long time, but it is an off
- the wall subject. I'll also be playing with the military phone system,
- in hopes of finding out what the ABCD tones do. (I heard from a file
- that Military phones utilize them but I'm still a civilian, and am
- clueless).
-
- Thanks for keeping me informed
- Kalisti!
-
- [Sorry to hear about your impending Basic Training. I'm not big on
- the military, as they would make me chop off all my hair.
-
- About the Satellite systems: YES If you do indeed find time to write
- up any files on how they work, systems involved, weaknesses, etc.
- I'D LOVE TO PRINT THAT! Just make sure you don't blow your clearance.
-
- Satellites are very cool. I'm about to buy a Ku Band disk to do some
- packet radio type stuff. A bit low-tech compared to the Army, but hell,
- I'm on a budget.
-
- ABCD...they are used for prioritizing calls on AUTOVON. FTS doesn't
- use them (I think), and they can only be used on certain lines.
-
- They are:
-
- A = priority
- B = priority override
- C = flash
- D = flash override
-
- For instance, if you want to make it known that this is an important
- call, you hit the "a" button before dialing. It establishes a
- priority-class call, which may cause a light to come on or something
- as equally attention grabbing at the called party's end. Priority
- calls cannot be interrupted, except by a Priority Override" etc,
- with Flash Override being the highest class.
-
- If you do these from an improper line, you will get an error message.
- The one I used to get when BS'ing AUTOVON op's long ago
- was "The President's use of this line is not authorized." Funny.
-
- Let me know if any of this is still valid.]
-
-
-
- ------------------------------------------------------------------------------
-
- Dear Phrack,
- The following is a copy of a Toneloc found file my friend got. As happens
- to my friend a lot the numbers aren't valid. But, you'll see he found at least
- one System 75. It appears that the 75 had a tracer installed on it already.
- My friend did not get a call back on it, and nothing has been done as far
- as we know. But, I still wonder -- Is scanning no longer safe?
-
-
- Castor [612]
-
- 56X-XXXX 22:57:34 03-Apr-94 C CONNECT 1200
-
- Login: b
- Password:
- INCORRECT LOGIN
-
- Login: c
- Password:
- INCORRECT LOGIN
-
- 56X-XXXX 23:04:12 03-Apr-94 C CONNECT 1200
-
- c
- Unknown command error
- Ready
- d
- Unknown command error
- Ready
- e
- Unknown command error
- Ready
- b
- Unknown command error
- Ready
-
- 56X-XXXX 23:49:19 03-Apr-94 C CONNECT 1200
-
- KEYBOARD LOCKED, WAIT FOR LOGIN
- [1;24r [1;1H [0J
-
- Login: b
- Password:
- INCORRECT LOGIN
-
- 56X-XXXX 01:23:28 04-Apr-94 C CONNECT 1200
-
- Login: b
- Password:
- INCORRECT LOGIN
-
- Call traced to 612-XXX-XXXX.
- Saving number in security log for further investigation.
-
- [Jeez. That sure does suck.
-
- Well, live and learn kiddoes. 1994 is not the time to be hacking
- by direct dialing local numbers. It's just not all that smart.
-
- Caller-ID has been tariffed in a lot of RBOCS. A lot of modem
- manufacturers implemented caller-id features into their equipment.
- Having these features in the equipment means that it won't be long
- before people redesign all their login programs to make use of
- these features. I would.
-
- I've got an ISDN line. Every time I call out, the SPID (phone number)
- of the B channel I'm using is broadcast. There is nothing I can do
- about that. On a remote connection, almost all decent ISDN terminal
- adaptors have the option to block any SPID they don't know. They won't
- even answer the phone, because they receive and interpret the phone
- number before any session is established.
-
- Yeah, well, that's ISDN, but it will not take a genius to do a few
- quick hacks on some linux box and we will suddenly be inundated with all
- kinds of "security packages" that use modems with Caller-ID.
-
- Yeah, I know, *67 (or whatever it is) to block the data, or
- route the call through another carrier so the data won't get passed
- (10288-NXX-XXXX). The data is still in the system, just not being
- transmitted from the switch out to the party being called.
-
- It amazes me how many really smart people I know have been busted
- solely because they were hacking local systems and calling them
- directly.
-
- Scanning has always been a very tricky subject. Since you are paying
- for a phone line, and if you have flat-rate service, you are
- thereby entitled to call as many numbers as you want. The big issue
- a while back was dialing sequentially (which set some telcos on a rampage
- because call usage patterns looked like telemarketing machines).
- The other problem is harassment. One call to an individual is a wrong
- number. Two is bordering on harassment. So, doing a complete scan
- and calling the carriers back through some other method would be
- a fairly good idea. And always have your calls forwarded to a
- non-working number so the 5,000 assholes who call-return you
- during the scan won't interfere.
-
- If you are lucky enough to live in the boonies, you are probably
- still somewhat safe, but everyone else...be careful.]
-
- ------------------------------------------------------------------------------
-
- Phrack-
-
- I was wondering if anyone has ever done an article on breaking
- Novell Network through a workstation. I've heard it can be done through
- the SysAdmin computer, but is there a way to find the userlist and
- passwords? Also how would I go about cleaning up after myself so as to
- not leave a trace on the logs. I would appreciate a way other than screen
- capture, but if anyone knows of a good boot record booting program to
- do a capture of every key typed that would be great, and maybe it
- could be uuencoded in the next Phrack!
-
- Thanks again for making the best, ass kickin', a step above the
- rest, brain moving, earth shaking, body shivering, fist shaking, totally
- bitchin', muy excelente, awesome H/P magazine in the whole world! :)
-
- Sincerely,
-
- The Warden
-
- [Thanks for the compliments...
-
- About your question though, I'm not quite sure what you mean.
- In a NetWare environment there really isn't any userlist and passwords
- that you can get at. You can run the syscon utility and look at all the
- usernames, but not much more. The passwords are stored in what's known
- as the "bindery." These are 3 files in the sys/system directory
- called NET$OBJ.SYS, NET$VAL.SYS, and NET$PROP.SYS. If you can
- pull a password out of those files, I will shit in my hat and eat it.
-
- Beyond that, yes, a key-capture program is definitely the ideal
- solution for monitoring activity on a PC workstation. There is
- one in this issue.]
-
-
- ------------------------------------------------------------------------------
-
- Hi,
- I've Been reading your magazine for a long time now, my eyes light up when
- I see an advert for a UK BBS with related hacking/phreaking articles or files
- on it, but when I try to ring them they are usually gone.
- I've been searching for ages for BBS's in the UK with these kind of articles
- on them but I've had no luck, Even postings on the USENET had little results.
- I have had a few boards which are shady but they ask unusual questions about
- abiding to rules/laws about hacking then they prompt with fake login and
- registration schemes.
-
- If you have some, could you possibly send or publish a list of shady UK BBS's
- Id be extremely grateful
-
- Cheers,
-
- Steven
-
- [Steven:
-
- Hell, I don't even know the numbers to any "shady" bulletin boards here
- in America. The only UK hacker bbs I knew of in recent years was
- Unauthorised Access, but I'm sure that's the advert you are referring to.
-
- Maybe someone else in the UK knows something decent to call over there.
- Any takers? ]
-
- ------------------------------------------------------------------------------
-
- [THE GRADY FILES]
-
- Many of you may remember the NSA Security Manual we published last
- issue. That single file generated more press and hype than I'd
- seen in a long time. It was mentioned in several newspapers, it
- appeared on television. It was ridiculous. The document is
- available to anyone who can fill out a FIOA request.
-
- Regardless, people went zany. At first I couldn't figure out
- why everyone was so worked up, and then I caught wind of Grady
- Ward. Grady had posted the document to the net (with all mention
- of Phrack deleted from it) in several USENET forums alt.politics.org.nsa,
- talk.politics.crypto and comp.org.eff.talk. Several readers of
- Phrack were quick to jump up and point out that Grady had obtained
- it from the magazine (thanks guys!) which he grudgingly admitted.
- Grady got to be in the spotlight for a while as the Phrack/NSA Handbook
- thread continued to grow.
-
- In the meantime, Grady was either calling, or giving him the
- benefit of the doubt, getting called by an awful lot of press.
- And even more compelling is the way he'd began pronouncing my
- impending federal raid on so many newsgroups.
-
- And of course, I don't have time to read any of that USENET crap
- so I'm oblivious to all of this. Then I got a message from Grady.
-
- [GRADY WRITES]
-
- You might want to get ready for the FBI
- serving a warrant on you for information
- about the NSA security employee manual
- published in Phrack 45;
- the NSA security people called me about 10 minutes
- ago to talk about how it got on the net.
-
- I being very cooperative, gave him
- your address in Austin.
-
- Grady
- 707-826-7715
-
- [I REPLY]
-
- Get a grip.
-
- Nothing that was contained in that file could not
- be obtained through other sources.
-
-
- [GRADY REPLIES]
-
- Just because you did nothing illegal, doesn't mean that
- you won't be annoyed by the FBI. Generally they will
- be very polite however.
-
- Gripping. Now what?
-
- [I REPLY]
-
- Ok,
-
- If someone actually did contact you, what was his name and number.
- I will forward that to my lawyer.
-
- [GRADY REPLIES]
-
- I have received your mail regarding "Re: NSA"
- It will be read immediately when I return.
-
- If you are seeking more information on the
- Moby lexical databases, please run
-
- finger grady@netcom.com
-
- for general information or help downloading
- live samples and a postscript version of our
- current brochure via anonymous ftp.
-
- Thanks - Grady Ward
-
- -------------------
-
- He never answered my mail.
-
- ------------------------------------------------------------------------------
-
- Dear Sir:
-
- Please refrain from sending such material to this address in the future!
- Since this address has been usubscribed from the Phrack mailing list,
- it means that further mailings are undesirable.
-
- I would also wish to remind you that maintaining lists of people's email
- without consent is quite immoral and devious. How hypocritical of
- you, who decry all such behavior when it is practiced by corporations
- or governments.
-
- Thank you.
- robbie@mundoe.maths.mu.oz.au
-
- [PHRACK EDITOR ABUSES POWER:
-
- Dear Sir:
-
- Please excuse the mailing. Have you ever heard of a mistake?
- Have you ever heard of an oversight?
-
- Is it really that much of an inconvenience for you to hit the "d" key
- to remove one small piece of unwanted mail?
-
- This being said, I would also like to invite you to go fuck yourself.
-
- ** I guess this guy does not like to get unsolicited mail **]
-
- ------------------------------------------------------------------------------
-
- You people really piss me off! You're undermining the fun and
- enjoyment of the rest of the internet users just for your juvenile
- games and illegal activities. Do you realize how much better off we'd
- be if you all just went away and left the Net to honest people like me?
- There is no place in today's society for a bunch of maladjusted
- paranoid psychotics like yourselves. Please do all of us users a favor
- and go jump in a river.
-
- Kevin Barnes
- kebar@netcom.com
-
- [ABUSE OF POWER CONTINUES...WILL ERIKB EVER STOP?
-
- Hey Keith:
-
- Thanks a lot for the letter!
-
- You know, it does my heart good to hear from such kind and caring
- folks like yourself. It's so fortunate for the Internet that there are
- people like yourself who take it upon themselves to become martyrs for
- their causes and express their ideals in such an intelligent manner.
-
- It's fascinating to me that you can send such email sight-unseen.
- Do you know who you are writing to? Do you even have the slightest
- idea? What do you hope to accomplish? Do you have any idea?
-
- This particular "maladjusted paranoid psychotic" to whom you have so
- eloquently addressed is an engineer in the R&D of a Fortune 500 computer
- company, and that along with outside consulting will net me about
- six-figures this tax year. I've consulted for telephone companies,
- governments, aerospace, financial institutions, oil companies (the list
- goes on...) and quite frankly I don't do anything even remotely illegal.
- In fact, one recent and quite prominent quote from me was "I only
- hack for money."
-
- Now, about the silent majority of "honest people" like yourself that you
- have so self-rightously chosen to represent...
-
- I've been using the net since the early 80's (arpa-days) initially
- through a rms granted guest account on MIT-OZ. I've continued to
- work with other Internet Providers to cover the asses of the so-called
- "honest people" of which you include yourself.
-
- Now, in my view, if it were not for people like us, who consistently
- expose and pinpoint weaknesses in the operating systems and networking
- technologies that you use for your "fun and enjoyment" and that I use
- for MY JOB, you would continue to be at serious risk. But, perhaps
- ignorance is truly bliss, and if so, then Keith, you are probably one of
- the happiest people on this fine planet.
-
- Now, per your request, I may just go jump in a river, as the one near
- my house is quite nice, and it is almost 100 degrees here in Texas.
- I only ask that you do me one small favor:
-
- print out 500 copies of this letter, roll them up into a paper fist,
- and shove them into any orifice on your person that meets your criteria
- as deserving.
-
- ** I guess this guy doesn't like me...or you **
-
- EDITORIAL ABUSE ENDS]
- -----------------------------------------------------------------------------
-
- ==Phrack Magazine==
-
- Volume Five, Issue Forty-Six, File 2a of 28
-
- ****************************************************************************
-
- Phrack Editorial
-
-
- If you aren't from America, this editorial really isn't meant for you,
- so read on with warning, or go on to the next file.
-
- -----------------------------------------------------------------------------
-
- Stupid hackers.
-
- We've got to do something to clean up our image.
-
- We truly are "America's Most Valuable Resource," as ex-CIA spook Robert
- Steele has said so many times. But if we don't stop screwing over our own
- countrymen, we will never be looked at as anything more than common
- gutter trash. Hacking computers for the sole purpose of collecting
- systems like space-age baseball cards is stupid, pointless and can only
- lead to a quick trip up the river.
-
- Obviously, no one is going to stop hacking. I've been lucky in that I've
- found people willing to pay me to hack for them rather than against
- them, but not everyone can score such a coup. What kind of alternative
- can the rest of the community have?
-
- Let's say that everyone was given an opportunity to hack without any
- worry of prosecution with free access to a safe system to hack from,
- with the only catch being that you could not hack certain systems.
- Military, government, financial, commercial and university systems would
- all still be fair game. Every operating system, every application, every
- network type all open to your curious minds.
-
- Would this be a good alternative? Could you follow a few simple
- guidelines for the offer of virtually unlimited hacking with no worry of
- governmental interference?
-
- Where am I going with this?
-
- Right now we are at war. You may not realize it, but we all feel the
- implications of this war, because it's a war with no allies, and
- enormous stakes. It's a war of economics.
-
- The very countries that shake our hands over the conference tables of
- NATO and the United Nations are picking our pockets. Whether it be the
- blatant theft of American R&D by Japanese firms, or the clandestine and
- governmentally-sanctioned bugging of Air France first-class seating, or
- the cloak-and-dagger hacking of the SWIFT network by the German BND's
- Project Rahab, America is getting fucked.
-
- Every country on the planet is coming at us. Let's face it, we are the
- leaders in everything. Period. Every important discovery in this
- century has been by an American or by an American company. Certainly
- other countries have better profited by our discoveries, but
- nonetheless, we are the world's think-tank.
-
- So, is it fair that we keep getting shafted by these so-called "allies?"
- Is it fair that we sit idly by, like some old hound too lazy to scratch
- at the ticks sucking out our life's blood by the gallon? Hell no.
-
- Let's say that an enterprising group of computer hackers decided to
- strike back. Using equipment bought legally, using network connections
- obtained and paid for legally, and making sure that all usage was
- tracked and paid for, this same group began a systematic attack of
- foreign computers. Then, upon having gained access, gave any and all
- information obtained to American corporations and the Federal
- government.
-
- What laws would be broken? Federal Computer Crime Statutes specifically
- target so-called "Federal Interest Computers." (ie: banks,
- telecommunications, military, etc.) Since these attacks would involve
- foreign systems, those statutes would not apply. If all calls and
- network connections were promptly paid for, no toll-fraud or other
- communications related laws would apply.
-
- International law is so muddled that the chances of getting extradited
- by a country like France for breaking into systems in Paris from Albuquerque
- is slim at best. Even more slim when factoring in that the information
- gained was given to the CIA and American corporations.
-
- Every hacking case involving international breakins has been tried and
- convicted based on other crimes. Although the media may spray headlines
- like "Dutch Hackers Invade Internet" or "German Hackers Raid NASA,"
- those hackers were tried for breaking into systems within THEIR OWN
- COUNTRIES...not somewhere else. 8lgm in England got press for hacking
- world-wide, but got nailed hacking locally. Australia's Realm Hackers:
- Phoenix, Electron & Nom hacked almost exclusively other countries, but
- use of AT&T calling cards rather than Australian Telecom got them a charge
- of defrauding the Australian government. Dutch hacker RGB got huge press
- hacking a US military site and creating a "dquayle" account, but got
- nailed while hacking a local university. The list goes on and on.
-
- I asked several people about the workability of my proposal. Most
- seemed to concur that it was highly unlikely that anyone would have to
- fear any action by American law enforcement, or of extradition to
- foreign soil to face charges there. The most likely form of retribution
- would be eradication by agents of that government. (Can you say,
- "Hagbard?")
-
- Well, I'm willing to take that chance, but only after I get further
- information from as many different sources as I can. I'm not looking
- for anyone to condone these actions, nor to finance them. I'm only
- interested in any possible legal action that may interfere with my
- freedom.
-
- I'm drafting a letter that will be sent to as many different people as
- possible to gather a fully-formed opinion on the possible legal
- ramifications of such an undertaking. The letter will be sent to the FBI,
- SS, CIA, NSA, NRO, Joint Chiefs, National Security Council, Congress,
- Armed Forces, members of local and state police forces, lawyers, professors,
- security professionals, and anyone else I can think of. Their answers
- will help fully form my decision, and perhaps if I pass along their
- answers, will help influence other American hackers.
-
- We must take the offensive, and attack the electronic borders of other
- countries as vigorously as they attack us, if not more so. This is
- indeed a war, and America must not lose.
-
- ->Erik Bloodaxe...Hacker...American.
-
- ---------------------------
-
- Ok, so maybe that was a bit much. But any excuse to hack without fear
- should be reason enough to exert a bit of Nationalism.
-
- I'd much rather be taken out by the French in some covert operation and
- go out a martyr, than catch AIDS after being raped by the Texas
- Syndicate in the metal shop of some Federal Prison. Wouldn't you?
-