home *** CD-ROM | disk | FTP | other *** search
- ==Phrack Magazine==
-
- Volume Six, Issue Forty-Seven, File 21 of 22
-
- ****************************************************************************
-
- International Scenes
-
- There was once a time when hackers were basically isolated. It was
- almost unheard of to run into hackers from countries other than the
- United States. Then in the mid 1980's thanks largely to the
- existence of chat systems accessible through X.25 networks like
- Altger, tchh and QSD, hackers world-wide began to run into each other.
- They began to talk, trade information, and learn from each other.
- Separate and diverse subcultures began to merge into one collective
- scene and has brought us the hacking subculture we know today. A
- subculture that knows no borders, one whose denizens share the common goal
- of liberating information from its corporate shackles.
-
- With the incredible proliferation of the Internet around the globe, this
- group is growing by leaps and bounds. With this in mind, we want to help
- further unite the communities in various countries by shedding light
- onto the hacking scenes that exist there. If you want to contribute a
- file about the hacking scene in your country, please send it to us
- at phrack@well.com.
-
- This month we have files about the scenes in Norway, France, Italy and an
- update from Denmark.
-
- ------------------------------------------------------------------------------
-
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- dfp-1 An orientation on the Norwegian hacking/phreaking scene dfp-1
-
- Written by the Digital Freedom Phanatic (dfp@powertech.no)
- Brought to you in January, 1995
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- PROLOGUE: It's 1995 and little has been mentioned about Norwegian
- hackers in the media lately. I thought this would be a nice opportunity
- to summarize some of the things that have happened on the scene in
- Norway during the last 5 or so years. For those of you in the Norwegian
- audience not recognizing my name; you shouldn't. I am more or less an
- acquaintance of many of you guys, but I feel that in order to get
- something done on the Norwegian scene right now (it's been fairly quiet
- for a while, nicht wahr?) I cannot reveal my true identity. Hell, let's
- see if I get any responses to this article. Now for the good stuff...
-
- Unfortunately I entered the scene as late as around 1990, so I'm not
- quite up-to-date on stuff that happened before that. I've been trying
- to gather old articles from newspapers and books. What I have been
- able to come up with is more or less some articles about a couple of
- hackers who managed to get into a local newspaper's computer. Also,
- I have gotten in touch with some of the _real old Norwegian hackers_
- dating back to the '70s. Needless to say, those people today work in
- the telecommunications industry.
-
- AREAS OF INTEREST FOR HACKERS: First, a little introduction to Norway.
- We are a very, very rich country, mainly due to the enormous amount of
- oil resources which we are pumping from the North Sea. As a result of
- this wealth (I guess), our people are well educated and we have a blooming
- industry. Well, in some cases. Nevermind. Keywords: large corporations,
- very large and respected telecommunications semi-monopoly, expensive
- communications.
-
- So in theory, there should be a lot of corporate hacking taking place in
- Norway. Well, either the people doing this are doing it real well, or
- nobody is doing it. I don't think anybody is. As I have come to
- understand, most hacking in Norway has really been Internet related.
- Norway was actually one of the first countries apart from USA getting
- connected to the Internet; way back in 1982.
-
- STATUS OF INTERNET CONNECTIVITY: The universities have been hooked up
- since the dawn of time, and today these are the centers of the Internet
- community and high-speed telecom equipment in general use in Norway.
- Actually, we have four universities and at least three of them are
- currently networked with each other at a speed of 34Mbps. The
- university network's (Uninett) international Internet connection is
- through NORDUnet and has a bandwidth of 2Mbps. Until a couple of
- years ago, one could not gain legitimate access to the Internet except
- by obtaining an account on one of the Uninett connected machines. This
- was impossible, at least for a majority of the hacker community, so
- Uninett, or rather the computers at the University of Oslo, became a Mecca
- for the scene. The big people had accounts there, or borrowed one.
- However, security is pretty stiff there and I fear that there was little
- actual _hacking_ going on, people were merely borrowing legitimate
- accounts through friends.
-
- What's fun about the University of Oslo computer network is that it
- until recently could be used for dialling out with speeds up to
- 14.4kbps. Actually, some of their dialup terminal servers were
- configured to let you connect into them and dial out. Try CONNECT
- USEk.15 after logging in to Net/ONE (the University LAN). I don't think
- this works anymore, nor do I know if this was a "feature" introduced
- when the terminal servers were installed. It could be that some hacker
- reconfigured them. In that case, please let me know! Dialled 820s
- as well (The 900 numbers of Norway).
-
- Today the Internet situation is very different. We have had an
- extravagant boost in the number of Internet access providers lately:
- Oslonett, PowerTech, EUnet, Vestnett, BigBlue, MoNet, NordNet and PMDData
- are those I can think of right now. Also, a number of companies are
- providing leased-line access: TelePost, EUnet and Datametrix. PowerTech
- is starting to do this soon now (they say), presumably with competitive
- prices, but they are real bad on bandwidth. (Well, they've been the
- cheapest for me so far.) At least we're not far from getting Internet
- trial accounts shovelled up our asses here. Let's hope some souls will
- soon pour some actual value into the net; more information, more
- services. I've seen little of that.
-
- Until we get more Norwegian fun services on the Net, we might as well
- exploit the services of Norwegian companies with no clue whatsoever when
- it comes to security. Take, for instance, Cinet AS (cinet.no) which has
- a world NFS mountable root disk (rw). BigBlue Systems AS (bigblue.no) uses
- a Linux server which you can log to using accounts named node1, node2 or
- node3. Full shell user access. Or you could try logging in as "-froot"
- to obtain root access. Hm, I think they plugged that. :) Well, ach so.
- There's more out there. Just get hacking. And feel free to tell me what
- you find!
-
- WHAT WERE THE HACKERS DOING: There used to be a blooming hacking scene
- in Norway earlier. Well, one might not say blooming with bright ideas
- and happenings, but at least there were many people doing the right
- stuff. Using X.25 NUIs to get to QSD, Password spoofing at the local
- DataPak PAD using Pad2Pad, Social Engineering, Hacking calling cards to
- get to the states, finding AT&T Alliance backdoors so as to keep people
- up all night long when there was school the day after.. The good old
- days. We could even do easy blueboxing. 1980s-1992.
-
- I must admit, though, that QSD isn't much anymore. I liked it better
- when there were a hundred people logged in simultaneously, and when
- there were alliances being held with people from the States, Norway,
- Denmark, Israel, all over the place. Then came the busts. It was
- around October 1992 when the first busts started taking place. We have
- a very interesting timeline there. First, the police teamed up with a
- couple of computer software retailers (BJ Electronics, sounds familiar
- huh?) and busted ten or so of the warez type board sysops. People to
- remember: Gizmo, Enemy :-).
-
- Soon after that, bigger names were taken down. Mario, Graham Two
- (Vishnu), Edison, RamJet, Peter, Leikarnes etc. Kevin was never busted.
- I wonder who he was. These guys were taken for more serious stuff like
- carding, datapak (x.25), AT&T Alliance conferences, boxing, and general
- abuse of the telephone system. A couple of shorter raid periods followed
- in 1993, and the scene was pretty much dead - except for the k-rad warez
- kids.
-
- AT&T and the other big guys we used to bluebox off of have all gone for
- CCIS/CCITT #7 so there is little to be done boxing in Norway now. Well,
- as a matter of fact I haven't checked that out lately. An interesting
- thing, though, is that you can temporarily disconnect the complete
- international trunk set between Norway and Iceland by breaking (24+26
- 250ms 26 100ms) on the Iceland Direct line. Everybody trying to
- _legitimately_ dial an Icelandic number from Norway for a while after
- that just gets a busy signal. Ha ha. Poor man's fun. Wish I could do
- that with the States... :)
-
- WHAT'S AHEAD FOR THE NORWEGIAN SCENE: I think we should get organized. I
- have a few projects in mind. There are a lot of security flaws and
- weaknesses yet to be discovered in Norwegian systems and services. We
- need to get all of Norway scanned for automated answering services and
- carriers. We need to get into some Central Offices to check out the
- labels on the modems connected to their Ericsson boxes. We need to get
- trashing. We need to start talking hacking and phreaking at The
- Gathering. We need to find data numbers for C.O.s, banks, corporate
- computers, the local McDonalds', we need to get root access at an Internet
- provider and we need to be able to listen in to phone conversations. We
- will. Get in touch with me if you'd like to join.
-
- These were just a couple of thoughts of mine that I wanted to share with
- you fellow hackers out there. Hope you've enjoyed them. And for heaven's
- sake, feel free to give me some feedback (via internet: dfp@powertech.no).
-
- FUN FACTS: Many companies have unconfigured PBXes that you can obtain
- outside dialtone on. There is no flat rate telephony. A 28k8 modem
- goes for a little less than $400. All phone calls are logged, logs are
- erased after a couple of months (presumably). Only ISDN customers can
- get Caller ID. There are three cellular operator companies. All the
- Norway Direct operators are situated in Kongens gate 21, OSLO, Norway.
- The NMT-900 Cellular network doesn't allow calls to Pakistan. All
- Norwegian babes are young, slim and blonde...not :)
-
- I'll be releasing a couple of files on Norwegian hacking/phreaking areas
- and techniques in the months to come. Here's a list of those I am
- planning, haven't written anything yet but I think I will. If there's
- anything in particular you'd like to add or to get hurried up, or if you
- have information which should be included in these files, then get in
- touch with me.
-
- (*) COCOTs and Monopoly operated Pay Phones in Norway
- (*) MBBS, the Norwegian BBS System; Backdoors and Security
- (*) Norwegian Telecom; TeleNor. Organization and computer systems.
- (*) The Norwegian State Libraries; BibSys network security
- (*) Telephone Monopoly; current status, what will happen, when?
-
- Sincerely Yours,
- Digital Freedom Phanatic
-
- Yola's to (unsorted, people I know or would like to know):
- Gizmo, Enemy, Mario, Graham Two (Vishnu), Edison, Roger RamJet, Peter,
- Gekko, Ozelot, Sicko, Flesaker, Karstad, Arild Leikarnes, Frode1 og
- Frode2 :-), The Dealer, Saron, Digital Phanatic, SCSI (BayernPower!),
- SevenUp (damiano?), UrbanMatrix, OnkelD. Where ARE you guys hiding?
- ;-)
-
-
- ------------------------------------------------------------------------------
-
-
- >-=-=-=-=-=-<
- <French Scene>
- >-=-=-=-=-=-<
-
- By NeurAlien
-
- The French scene has always been portrayed as weak by both French and
- foreign people. There's a paradox here: France was one of the first
- countries to develop a modern network (in 1981) YET there have been
- few _good hackers_. How is that explained? I DUNNO !
-
- In fact, stating that France is underdeveloped at a hacker level is
- partly false. In France, hackers have always been isolated or hidden
- in little isolated groups. Whenever a good group formed, everyone was
- quickly busted by DST (the agency in charge of computer fraud). Moreover,
- this agency (DST) is somewhat effective and hacking has been illegal here
- since 1988. The risks when you are caught are VERY HEAVY and the trial
- lasts forever! Usually, it takes 3 years to go to trial and the material
- is ALWAYS seized even if you're not charged with anything!.
-
- The Videotex initiative that provided France such a breakthrough
- in technology is now an handicap because it can't follow the evolution of
- modems and isn't well adapted for networking with the Internet.
-
- I- The Videotex aka Minitel
- ------------------------
-
- Minitel has been developed in 1981 by France Telecom. It was excellent at
- the time but it hasn't evolved very much. Let's see what hacking has
- been like in the Minitel world.
-
- To explain a little what "Minitel hacking" was, I must detail
- a little how Teletel (the network that supports Minitel) works.
- Teletel is based on X25 and provides multiple price levels:
-
- Teletel 0 (T0) is free for the user, costs a lot for the server.
- Teletel 1 (T1) costs a local call to the user, the price of the X25
- collect connection to the server.
- Teletel 2 (T2) costs the price of a local call + X25 communication
- (6+ cents per minute) to the user.)
- Teletel 3 (T3) costs T2 + a charge that is reversed to the server
- (costs 20 cents to $1 per minute to the user.)
-
- A lot of servers are accessible only in T3 for the users.
- The principle of hacking Teletel was to find a the X25 number corresponding
- to the T3 CODE in order to log on the T3 server from T2 level.
- Eventually, there could be a password on the T2 access.
-
- Actually, it's very basic and very dumb hacking since you can only do
- some scanning to find the x25 number of the servers.
-
- T1 was used for more professional type servers and the hackers
- that used to hack T1 were better than T2 hackers.
-
- T2 K0d3z were very popular among wannabe hackers, some Special Interest
- Groups about T2 were formed on a lot of servers and there was even a server
- dedicated to T2 codes. The quality of information has always been extremely
- low in this kind of club. Moreover, the kind of k0dez kidz on these SIGs and
- servers were particularly dumb (sorry for them). It got really bad in 1991
- when a lot of T2 guys started to flame each other, accusing them of leeching
- some T2 codes from one server and posting them to another, saying that the
- other guys were ripping everyone off etc... It may be continuing now but I'm
- totally uninterested by these people so I completely left this scene.
-
- The "good ones" of the T2 K0d3z k1dz stopped T2 (it's not free so it's
- too expensive!). They usually started to Hack T0 which is totally free.
- (it's like a 1-800 for Teletel). The servers of T0 are nearly all of the
- "restricted access" kind. But they have weak protection schemes and can
- be easily bypassed with some experience. The hackers of T0 servers don't
- usually know each other and some of them may form a kind of little "islands".
- (I'm calling them "islands" because it is always placed in an Information
- System on T0, deep within the system. There are perhaps 10 or so "islands"
- that have no connection with other hackers. A typical "island" consists of
- 5 to 10 hackers. Some hackers may go on 2 or more "islands" but prefer to
- keep the presence of both "islands" secret. Why? In order not to destroy
- both if one of them is found and shut down!
-
- One reason most never heard of these person is that there is nearly
- no connection between the Teletel world and the Internet. The only way
- to escape to Internet and Intl X25 is Teletel 1 (T1).
-
- II- When Teletel goes professional
- -------------------------------
-
- As I said, the T1 is the only way for a Teletel hacker to evolve
- to hacking Internet or International & ASCII X25. On Teletel 1, you can
- sometimes log on to some interesting Unixes, Vaxes etc.
- T1 is also the only way on Teletel to use the International X25 network.
- You have to get a Transpac NUI to call a foreign address from T1.
- Until 1991, the Transpac NUIs were a 4 to 6 random alphanumeric
- characters. A man called IER had made an NUI Scanner that allowed him to
- find NUIs by scanning out every 4 character NUI. It WAS effective,
- but Transpac changed to a 6 character NUI. (IER was busted and caught.
- No news from him since that day!)
-
- Many good hackers used T1 a lot to hack systems and to go on the Internet
- and the Intl X25 networks. For example, you may have heard of people
- like Netlink, Furax, Jansky or Synaps. They hacked X25 and Internet but
- it seems that each of them was busted and caught. Some are still alive on
- the Net, but some aren't!!!
-
- Some French hackers were really good but it seems that no one can hide
- very long from the DST. They are very effective, and with the help of
- France Telecom, they trace back a lot of calls.
-
- Places like QSD haven't been used very much by the French because of
- their lack of technological knowledge. ahem...
-
- Moreover, QSD/The Line is tapped by governmental agencies so g00d French
- hackers don't like it.
-
- IV- The groups
- ----------
-
- Some groups have been formed in France but they've never lived long enough
- to give new hackers the knowledge of the old hackers. Some groups were:
- NICK, Hardcore Hackers, Piratel, TeKila Underground. Many of them
- were hacking systems in Teletel 1.
-
- A group called CCCF appeared in 1991. It was founded by Jean Bernard
- Condat and in fact it was not really a group. This guy, JBC, is deft
- at maneuvering people into doing what he wants. He organized fake contests
- like "The price of the Chaos" to get more information and then act as
- if he personally discovered the hacks that were given to him.
-
- He recently started the Chaos newsletter where nothing originates from
- him...it's taken from everywhere and from his personal contacts.
-
- He has big power because he works for SVP which is a private
- information company that has the goal of providing information to whoever
- wants it, for a large amount of money.
-
- Nobody knows what JBC really wants but he is definitely a threat to the
- underground. Somebody, I don't recall who, already mentioned that in Phrack.
-
- V- Phreaking in Phrance
- --------------------
-
- Phone phreaking became really active in France in 1992 after the
- massive release of a blue box that worked in France. Several months
- later discovery of this caused the death of blue boxing from France.
-
- The blue box program was running on ST and several people that used it
- formed the TeKila Underground. As far as i know, this was an happy group
- that had a lot of parties and liked smoking... :)
-
- They weren't very effective: just into using the blue box.
-
- Then came the movement of the "Horlogers", it was due to the credit you
- could gain if you connected in Teletel 3 on some server. The "horlogers" were
- staying HOURS and DAYS on a server with blue box just to have more credit
- (counted in minute of connection) on those server.
- They were staying connected on a place called "L'horloge" (the timer) that
- enabled you not to be disconnected by the server when being idle for a long
- time.
-
- Blue boxing is now very hard in France. The Australian blue box
- ceased to work and a lot of phreakers couldn't phreak anymore.
-
- The real problem in France is that nobody (or almost nobody) knows how
- the France Telecom phone network works so we can't really use any flaws
- in this system.
-
- Calling cards have been heavily used in France, placing the country
- in the top ten consumers of stolen CC's. When AT&T & MCI saw that,
- they contacted France Telecom and now each calling card from AT&T, MCI
- can't call back to France.
-
- Moreover, FT's CC called "Carte France Telecom" (CFT or CP) is traced and
- recorded: I mean, when the person who owns the CFT receives the bill,
- written on the bill is the number of the caller and of the called party.
-
- HARD isn't it?
-
- Recently, some busts were done on AT&T and MCI CC users. They are now
- awaiting trial.
-
- VI- Magazines
- ---------
-
- Back before 1990 a magazine was published twice and sent to every
- single university in France. It was called "Hackito" from the
- "Hackito ergo sum" motto. (I've never found an issue of it, but if you have
- one, send me it to me in email.)
-
- There is also this shitty zine called Chaos...
-
-
- Now, a new zine is making the underground react in France:
- It's called "N0 Way" and I'm the Editor.
-
- This magazine is written entirely in French. The current issue is number 3.
- Anyone wanting to submit something to "N0 Way" can send me a message in Email.
-
- Today we are seeing a lot of people in France wanting to know more about
- hacking. It seems to have taken off here but not as much as in Holland or
- in the USA.
-
- Email me to receive "N0 Way": an133729@anon.penet.fi
-
- ++NeurAlien.
-
- ------------------------------------------------------------------------------
-
- The Italian Scene
- by
- Zero Uno
-
- Italy, as you know, is among the industrialized EEC powers. It deserves
- this honor only to the work of talented people, not by its government,
- which is utterly idiot and totally unable to fulfill the needs of the people.
- This characteristic inevitably has conditioned the whole telecommunication
- market, both phone and networks, which must make clever long term decisions,
- something that Italian government is not able to do. The phone company is
- owned by the government through Italy Telecom (IT), the new society formed by
- the previous three state-owned firms involved in communications. In the
- last five years IT has undoubtedly made good work, but the quality of phone
- connections and service was so bad in the past, that many people feel very
- upset when comes to talk to IT.
-
- The Telephone System
-
- Italy is divided in 220 telephone districts, each with its own unique
- prefix: a zero followed by a number (up to three digits). In addition there
- are a few special prefixes in order to access cellular phones (0335,0336) or
- to reach some 'fake' locations (0769), like many tv programs that use the
- telephone to reach people. (Like 555 in the USA) In this way IT protects
- itself from line congestions when successful TV-progs are involved. All
- kind of modern connections are availabl. This means that payphones, pagers,
- cellulars (ETACS and GSM), radio (an old, now unsupported phone for cars in
- 400 Mhz range) are present. Another strange beast is televoting (0869) a fake
- prefix that holds the number of incoming calls for polls. It was used to
- test some political decisions, but the hack here was so evident (the redial
- button) that now televote is not so well thought of.
-
- Standard Numbering
-
- The numbers that begins with the digit '1' are reserved for special services.
- This include all amenities like emergency numbers (113, roughly the equivalent
- of American 911), 187 (an all-but-everything number for all requests to IT,
- such ordering a new phone, installing a new line and so on) and toll free
- numbers 167[0 or 8] xxxxx. As a reminder about IT's long term planning
- capacity, the toll free numbers started as 1678-xxxxx, but were so successful
- that IT was forced to add the 1670-xxxxx later |-(! All 1678-7xxxx are in
- use by foreign phone companies, and heavily scanned |-).
-
- Some pretty numbers:
-
- 1678-72341 A promo for a XXX-rated line (in north or south america)
- 1678-70152 See the following capture
-
- ---------------------------------- CAPTURE -------------------------------------
-
- ≈≈≈≈≈≈≈≈≈≈≈≈ OFFICIAL USE ONLY ≈≈≈≈≈≈≈≈≈≈≈≈
- ╔═══════════════════════════════════════════════════════╗
- ║ FAMNET (sm) ║
- ║ ≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈ ║
- ║ AFAS HQ ║
- ║ and ║
- ║ AF FSCs ║
- ║ ≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈≈ ║
- ╚═══════════════════════════════════════════════════════╝
-
- This system is for the use of authorized users ONLY. Individuals using this
- computer system without authority, or in access of their authority, are subject
- to having all of their activities on this system monitored and recorded by
- system personnel. In the course of monitoring individuals improperly using
- this system, or in the course of system maintenance, the activities of
- authorized users may also be monitored. Anyone using the system expressly
- consents to such monitoring and is advised that such monitoring reveals
- possible evidence of criminal activity, system personnel may provide the
- evidence of such monitoring to law enforcement officials.
-
- Line trace initialized...........................................
-
- We now have your phone number......WE TRACK HACKERS AND ADVISE AUTHORITIES.
-
- ---------------------------- END OF CAPTURE --------------------------------
-
- Unfortunately IT does not support caller ID, so the last sentence is pure
- crap.
-
- The above numbers are (obviously) all public. These ones are 'reserved'
- for internal use, though many many people play with 'em:
-
- 135 BBS to record maintenance procedures
- 138 BBS or human operator (depend on districts)
- 1372 Ring-back
- 1391 Human operator
- 160 Security service (???)
- 1414 A yet-to-be-implemented service, that enables a user
- to use one phone and bill on their own phone the
- subsequent call. Will be implemented |-)?
-
- Not all districts support this, and since they are not public they can change
- rapidly. Also present are the country direct numbers in the 1721xxx format.
-
- Country Code
- -----------------------------
- Argentina 054
- Brazil 055
- Chile 056
- AT&T 011
- MCI 022
- Sprint 877
-
- Services Offered
-
- With the advent of digital COs, 'new' (new to the Italian market, anyway)
- services were provided. The so called STS (additional telephone services)
- allowing (obviously paying) the teleconference (three user talking
- simultaneously), incoming call signal when you are talking with another
- party, and finally calling transfer, useful when you are away from home.
- The current pulses billed can be inquired (paying one pulse, obviously!).
-
- The Packet Networks
-
- There is only one packet network provider, ITAPAC (DNIC 2222). As with other
- packet networks, the access is available with a PAD that accepts only NUI
- accounts (non-reverse charging) and those who accept reverse-charge calls
- (in ITAPAC lingo, the 'easy way'). These are heavily hacked because it is
- the most widespread network in Italy (and the most unreliable, insecure, *bad*)
- and also because some NUI users simply were not aware of the costs of this kind
- of service, and they have payed all the phreakers' bills too!
-
- Sometimes, for promotional sales, some NUIs were discharged to the public.
- Other were disseminated by phreakers, collected by PAD (only a few NUIs are
- valid across different PADs, most aren't). Until some time ago QSD France
- was the most 'in' PAD site. Another common activity was surfing across
- Packet Networks of different states. Now many common NUIs were deleted from
- system, but some still survive. Many times the net is unusable because
- has reached its maximum load or because of for system outages. Also, even
- if the ports run at 2400 bps, is not uncommon to reach the same speed of a
- 1200 bps connection. Use it if you don't pay or pay a limited fee for it.
-
- The H/P/C/V Scene
-
- Common folklore depicts Italians as adaptable to unfriendly environments in
- a clever way. Although these rumors are not completely true, there is an
- Italian way of H/P/C/V. Hacking in Italy is not a common activity. There
- are several teens who spent lot of effort to learn some tricks, but they
- are teens, with all pros and cons. Rarely do these individuals survive the
- 20 years-old barrier, for one reason or another. Those who survive generally
- self-limit their actions to a restricted area, and generally remain anonymous.
- The few that remain are the brightest, with lot of know-how and abilities.
- I only know two people at this top rank level. Hacking is focused on setting
- up unauthorized fsp sites in university computers, removing licenses to pro
- warez and gaining illicit access to some resources in internet or in ITAPAC.
- ITAPAC is now no longer a key issue since ITAPAC (and Italy in general) has
- very few computing resources, and ITAPAC has severe security problems, so it
- is predated by hacker wannabees. Also Italy lacks of H/P groups like
- LOD,MOD and the CCC. Apart from Omega Team, to my knowledge no other group
- has existed.
-
- Phreaking used to be fairly common, but now is much less so because of
- new digital COs and stricter security. Blue boxing to USA was *very* common
- until January 1, 1992. On this date, the software that controls the traffic
- over North America was changed, and boxing to USA is no longer possible.
- Carding now is the only phreak access, and is used mainly by warez board
- sysops. Rumors said that the software update was imposed on ITALCABLE (that
- manages international calls) by AT&T due to the *huge* illicit traffic between
- Italy-USA. Basically, too many people, even non H/P ones ('friends of
- friends') were using blue-boxes even without the faintest idea of how they
- worked. Some hackers have sold boxes to normal people, and this probably was
- the key to the blocking of illicit calls. Now, to my knowledge, is possible
- to box only to Chile, Argentina and some other third-world countries.
-
- True H/P BBS are few. One, Pier Group's BBS was the most famous, in part
- because one member, MFB (short for MF the Best, basically the best Italian
- phreaker in my opinion), has written a series of humorous stories about
- hackers and lamerz, that had a phenomenal success. But since Pier (the
- sysop) was also invloved in some other illegal activities apart phreaking
- (stolen hardware, carding), and in this kind of activity too much advertising
- equals certain arrest, the board went down. Most other BBS are
- warez-oriented, with warez from THG, Razor 1911 and other USA crack groups.
- Note however that unlike other nations, Italy has no group HQs: what counts
- is money, not being part of a group. Many BBS are double-sided: one a ligit,
- more or less lame, part of a legal net like FidoNET, the other accessible only
- to subscribers, with warez. This has changed however since the Italian Hacker
- Crackdown. This is not because the police raided the warez boardz (they are
- too ignorant to do this) but because warez sysops, in fear of being caught,
- have (temporarily) closed their BBSes.
-
- Virusing has some players, though not very publicized, for obvious reasons.
- One has recently become famous (Dr. Revenge) for his contributions to
- Insane Reality, another H/P/V journal that published some 'secret'
- telephone numbers for United Kingdom officials.
-
- Nothing really new in Italy, as you can see. Newspapers are (as are most
- people) too ignorant to correctly report these problems, with the result being
- that the 'legal' portion of network fanatics fear other unjustified police
- raids, and legislators are becoming very unfriendly when dealing with this
- kind of communication. Several politicians and media moguls are proposing
- laws that forbid anonymous access to the Net, and universities are very
- concerned about these subjects. Two students were recently arrested because
- they used illicit (but almost public) passwords to surf the net (*only* to
- see things, *no* data damage).
-
- Italy may one day become very unfriendly to net people, even if Italians are
- generally considered very friendly.
-
- Zero Uno
- mc1671@mclink.it *only* using PGP, otherwise no response.
-
- -----BEGIN PGP PUBLIC KEY BLOCK-----
- Version: 2.3
-
- mQCNAi7zXJ0AAAEEAM3SZQp0+By7fi7ey/oiTU6TT5CdMYdkYnkDeM8f2bZ75Pdp
- 4mv9C0BTVRP0UrYgJO1I+8YrwvSjZK7+U3hty+c97RJ5lnSYQ0BbF7puSwhUxj4W
- AyytlQZVP6j1r4H8ulse1arIVlD9h2+GceXOx09J5uEqqhRG/uo1W3A51ixFAAUR
- tBtaZXJvIFVubyA8bWMxNjcxQG1jbGluay5pdD4=
- =9GnS
- -----END PGP PUBLIC KEY BLOCK-----
-
- ------------------------------------------------------------------------------
-
- THE DANISH SCENE BY LE CERVEAU
-
- In the last issue of Phrack (46) I read an article about the Danish
- Computer Underground. Though, I was pleased with the text, a lot of
- stuff has happened since which I hope most of you have heard about.
- Anyway, here's an update..
-
- In short, most (nearly all..) of the Inner Circle hackers in Denmark
- have been busted. It all went down December 1993 where I,
- Descore (Zephyr), Dixie (Nitecrawler) were busted at exactly the same
- time. After the 3 busts several more followed: WedLock, Netrunner,
- Darkman + some others. I had to spend 14 days in isolation while the
- others were released (somewhat due to my own stupidity).
-
- The busts were made because all of the universities in DK had been
- more or less taken over by hackers and the FBI + CERT & ASSIST
- worked together. The police told me that UNI*C was threatened to be
- cut off the Internet if the hacking from Denmark didn't stop (don't
- think that's the truth though. They bullshit alot..).
-
- So, of course the Danish police had to do something and they asked
- the infamous Joergen Bo Madsen for help. And they got it. And the
- situation in DK was getting out of control too - the Phone Company
- was hacked, DK's main research center hacked. No damage to ANYTHING
- was done though, but naturally we had to be stopped. Actually, the
- Phone Cmp. screwed up their own system trying to stop us - and now
- they blame us!
-
- Now we're all awaiting trial. It might take a while, since they
- said they'd start 'breaking' the PGP-encrypted files with UNI*C's
- computers ;).... I'd think if they did that, it'd be quite a while
- before trials!
-
- Busted in DK: Zephyr aka Descore, Dixie, WedLock, Netrunner,
- Darkman, Lazarus, Jackal and me (LC).. + Joshua -
- some idiot who might have helped the police a whole lot.
-
- After the bust of Jackal the police says they can't handle anymore so
- there won't be any.
-
- ----------------------------------------------------------------------
-
- BUSTED
- BY LE CERVEAU
-
- I've been busted. Why speak out loud? Why not? I'm screwed anyway.
-
- I was stunned. About six-seven months before my bust I succeeded in
- breaking into a Pentagon computer (pentagon-emh4.army.mil -->
- otjag.army.mil). What actually launched my interest in this computer
- was a file about UFOs where it was listed. Now I have realized that had
- I found anything top secret about UFO cover-ups I probably wouldn't have
- released it. It wants to be free - but the question is to what degree..
- I knew of course that it couldn't be one of their top secret computers
- (actually, OTJAG=Office of The Judge Attorney General - AFAIR) but I
- also knew that it would be the start of something big - one thing
- always leads to another.
-
- After a couple of weeks on the system, doing nothing but leeching
- all the mail I could get my hands on I discovered that one of the
- majors used an Air Force base-server (flite.jag.af.mil - AFAIR). As
- I suspected, all I had to find was his login - the password was
- exactly the same. And again this had to lead to more and it did.
- I found some stupid sergeant who also was a user on TACOM
- (Tank Automotive COMmand). Surely, even though stupid he wouldn't
- use the same.. - yup, he did. Access to tacom-emh1.army.mil and
- all their other machines granted. If you want one of the
- largest lists of MilNet sites then grab /etc/hosts from TACOM.
- After gaining SU-access on this machine interesting things started
- happening. If, for example, an officer was to issue some order (of
- course not any orders concerning war) it'd look something like
- this:
-
- You have to report at HQ Monday latest. Your travelling plans
- for the international conference <blah> <blah> <blah>..
-
- // Signed //
- Col. Joe Wilkins
-
- and then some more approved signatures would follow by some
- other persons. Of course I grabbed all the mail on TACOM.
-
- After a month or so I was locked out of the Pentagon system -
- and it changed it's address to otjag.army.mil. But I didn't
- really care. I knew MilNet pretty good so why not I thought..
-
- I started thinking military-systems only - a dangerous thing
- to do. I ended up using all my time on it and was therefore
- also rewarded. Soon I would have access to more than 30 military
- systems around the globe and I knew I was getting in over my head
- but I had to keep going - I felt there was no way back. I could
- have told myself that having to hide on all of these systems
- would be almost impossible. But things seemed to be going just fine.
- Just how idiotic can you get?
-
- With access to some CM-5's and a CM-200 at Naval Research Labs
- and all the wordfiles in the world no system stupid enough to
- let their passwd-file get taken stood a chance - one account with
- encrypted passwd was enough. All I had to do was start Crack on
- the CM-200 and wait.
-
- I took interest in some of the government machines - they weren't
- as hard to hack as the mil's and I soon lost interest. Except in
- NASA. I got in on one of their smaller machines (*.gsfc.nasa.
- gov) and I knew I just had to wait and it would lead to something
- more.
-
- Now 'strange' things started happening. Imagine this: I log in
- on TACOM. I log out. When I try to log in again it's impossible
- from the same site; I have to use another - that's when I knew
- that someone was watching my every step, trying to stop me. Later
- it started happening to me no matter how I accessed the nets. That's
- when I knew the end was near. A month later I was busted by
- the FBI in Denmark - that's the way I feel even though it was the
- Danish police. Actually, the trace was made through *.wwb.noaa.gov
- which I was using a while for cracking.
-
- That's my story - very shortened! If anyone is interested in details
- mail me at Restricted Access # +45-36703060.
-
- Last Words: Don't do it - don't do it.. It'll get you into all kinds of
- shit.. Why bother the nice governments and their so trustworthy agencies?
- On second thought: Just do it!
-
- [Editors note: Along with this file I was sent a capture of one of
- the aforementioned hacks (which I promptly deleted). It looked like
- our Danish friends were in a host at the office of the Judge Advocate
- General. Knowing how the JAG is going to handle cases isn't exactly
- the kind of thing anyone in the military really wants floating around.
- I guess they need better security, eh? ]
-