home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 44.4 KB | 1,147 lines |
- ---[ Phrack Magazine Volume 7, Issue 51 September 01, 1997, article 02 of 17
-
-
- -------------------------[ P H R A C K 51 L O O P B A C K
-
-
- --------[ Phrack Staff
-
-
-
- 0x1>-------------------------------------------------------------------------
-
- Issue 50 proves that Phrack _is_ back, and better than ever.
- Congratulations to you and the rest of the Phrack staff for putting
- together what I think is by far the most informative issue to date. The
- quality of the articles and code (YES! Lots of code!) reflects the hard
- work and commitment that obviously went in to this issue. I could go on,
- but I'm all out of lip balm.
-
- Thank you!
- _pip_
-
-
- [ Thank you. We aim to please. ]
-
- 0x2>-------------------------------------------------------------------------
-
- { ...Bugtraq Phrack 50 announcement deleted... }
-
- So What?
- Who cares? get this crap off of the mailing list.
- phrack is as much trash as 2600 or any other
- little idiot magazine.
-
-
- [ Thank you. We aim to please. ]
-
- 0x3>-------------------------------------------------------------------------
-
- juggernaut is way cool, man.
-
- minor bug: you dont unset IFF_PROMISC on exit, so it's not terribly stealthy,
- but it's no big deal to fix.
-
- anyway. cool.
-
- .techs.
-
-
- [ Although Juggernaut is *not* meant to be a 'covert' program you are
- completely right about that. I should unset promiscuous mode when the
- program exits. In fact, in version 1.2 (patchfile available in this
- issue) I include this very thing. ]
-
- 0x4>-------------------------------------------------------------------------
-
- Hi!
- I've got the p50.tgz and well, played a little with jugernaut.
- It's realy cool but:
- 1) It doesn't compile so clean. You've forgot to #include
- <linux/netdevice.h> before <linux/if_arp.h>
- 2) The spy connection part is not quite cool because you
- sniff and dump all the stuff that is comeing from the dest. port
- and dest. host ...
- So if U try 2 spy say:
- 193.226.34.223 [4000] 193.226.62.1 [23]
- U spy in fact all the stuff that is comeing from 193.226.62.1 [23] for
- ALL the conn. made to 193.226.62.1 on the 23 (telnet) port.
- This will cause a cool mess on the screen.
- I've tried 2 restrict the spying by introduceing a new cond.
- iphp->daddr==target->saddr in net.c ... it brocked the spy routine
-
- Maybe U'll fix somehow that thing..
-
- All my best regards,
- Sandu Mihai
-
-
- [ <linux/if_arp.h> includes <linux/netdevice.h>. The compilation of the
- program should go smoothly on any linux 2.0.x based system. Version 1.2
- also fixes the TCP circuit isolation problem you allude to... ]
-
- 0x5>-------------------------------------------------------------------------
-
- Thanks!
-
- This is a very impressive tool! Brilliant work!
-
- Thank you,
-
- --Craig
-
-
- [ Thank you. ]
-
- 0x6>-------------------------------------------------------------------------
-
- I'm just writing this to say thanx for putting out such a kickass publication.
- Down here in 514 it's fuckin dead, you mention hacking and half the people
- don't have a clue what Unix is.It's fuckin pathetic, but i'm glad to say
- that your mag has helped a lot and i look forward to future issues, you guys
- really do make a difference in the hacking community. Thanx.
-
- Snake Eyes
-
- [ Amen to that. ]
-
- 0x7>-------------------------------------------------------------------------
-
- Hi! =8)
-
- Why don't you (at Phrack) compile an updated Pro-Phile on known H/P
- Groups like the one on issue #6 ?
- So we - the readers - can know something more about the ACTUAL scene
- (but perhaps it's not worth - ppl's sick of all that 3l33t d00dz ;)
-
- I really appreciated that dox & srcs on spoofing, D.O.S., etc.
- HIGH technical quality, sources, articles, news.... and it's free! :P
- Ahh that's life! ;)
-
- However, great job with the latest Phrack issues.
- To quote a friend of mine (talking of Phrack Magazine)...
-
- > It's improved a lot with Deamon9 in command....
-
- K, that's all.
- **PHRACK RULEZ!** (I had to say that :)
- Oh... and sorry for my english!
-
- Cya....
-
- -Axl-
-
- [ Not a bad idea. Perhaps someone would like to do an article on
- the existing groups out there for P52? ]
-
-
- 0x8>-------------------------------------------------------------------------
-
- I would like to know what you suggest to get me headed in the right
- direction reguarding the compromise of computers on the internet.
- any information that you would be able to spare would be most appreaciated.
- atomicpunk.
-
- [ It's *all* about compromise. It's something you have to do. Be fair to
- them. Listen to them. Don't shut them out of your life. They are
- wonderful creatures... It's a give and take thing and sometimes, yes, you
- *have* to compromise -- that's part of having a mature relationship. ]
-
-
- 0x9>-------------------------------------------------------------------------
-
- I recently locked into my car so i called a friend to come help me
- when the slim jim was no help he decided to try another less known
- method.
-
- We simply took a stiff metal coat hanger and straightened it out and
- made a small loop in it then we took a small speaker wire about 3 feet
- long and tied a loop into one end so it would slide to make the loop
- smaller or larger.
-
- Then you take the wire and run it in through the loop in the hanger
- and pry the top edge of the car door open and slide both looped ends
- through holding onto the unlooped ends.
-
- then you use the hanger to position the loop in the speaker wire
- around the door lock once you have the loop into position you hold
- the hanger steady and gradualy pull the loop tight around the lock
- once the loop is tight you just pull up on the hanger.
-
- This works on most all vehicles with top door locks and with a little
- prep. and practice can be done in under 2 mins. also its less
- conspicious and easier to get than a slim jim. and they are cheap
- so no one care to toss the out after breaking into an entire lot of cars.
-
- Hope you found this phile worth while
- C'ya
- The Stony Pony
-
-
- [ Aspiring young car thieves among us thank you; however if you
- lock yourself in the car again, you might try unlocking the door
- manually. ]
-
- 0xa>-------------------------------------------------------------------------
-
- HOW YOU KNOW YOUR A TRY HARD HACKER
- -------------------------------------
-
-
- By [Xtreme]
-
-
- I just wrote this to tell all you try hard hackers something.
-
- 1) You goto other hacker pages on the web.
- 2) You think loading a program that waz made by a hacker is hacking.
- 3) The only thing you do is get the lastest passwd file from your isp.
- 4) You goto channels like #hack and ask for passwd files.
- 5) You don't know where to get warez.
- 6) You always telnet to hosts and type
-
- login: root
- password: root
-
- and stuff like that.
-
- 7) You brag about how you are a hacker.
- 8) You don't know C.
- 9) Your a girl.
- 10) You don't know what's a shell.
- 11) You don't know what Linux, FreeBSD and all those other UNIX's are.
- 12) You don't have a UNIX OS.
- 13) You think when using IRC war scripts, your hacking.
- 14) Asking how to hack other people's computer.
- 15) You try cracking a shadowed passwd file.
- 16) You don't know if a passwd file is shadowed or not.
- 17) You ask what is a T1.
- 18) You ask how to email bomb and you think email bombing is a form of hacking.
- 19) Your learning BASIC language.
- 20) You think you can get into hacking straight away.
- 21) You don't know how to set up an eggdrop bot.
- 22) You think .mil stands sites stand for a country.
-
-
- [ That is without a doubt, the dumbest thing I have ever read in my life.
- Not only do I award you no points, but we are all now dumber having read
- that. May God have mercy on your soul. ]
-
- 0xb>-------------------------------------------------------------------------
-
- What command do I use to make you denial of service package work?
-
-
- [ You hit yourself in the head with a hammer. ]
-
- 0xc>-------------------------------------------------------------------------
-
- I was scanning the 413 xxx 99XX range and I found some #'s. I have
- no idea what they do. I was wondering if you could help me out.
- Maybe call them and see what you find or someting.
-
- (413) xxx-99xx
- (413) xxx-99xx
- (413) xxx-99xx These are all fax #s, I think
- (413) xxx-99xx
-
- (413) xxx-99xx goes beep beep beep
-
- (413) xxx-99xx goes beeeep
-
- (413) xxx-99xx auto foward I think
-
- (413) xxx-99xx goes beeep beeep
-
-
- [ I tried calling these but I got no answer. Maybe the 'X' on my phone
- is case sensitive? ]
-
- 0xd>-------------------------------------------------------------------------
-
- Sir,
- I would like to know how could I get root permission from a simple user.
- I have read that this can be accomplished by setuid programs, and I have read
- an article describing the way this can be done in Phrack Magazine. Still I
- couldn't gain root access. I would be very interested in finding ways of doing
- this on Irix 5.2 or Solaris 2.5. If you know anything about this, please
- send me an e-mail. If you know any resources on the Web that details the use
- of setuid programs in order to get root access, please tell me.
-
-
- [ P49-14 ]
-
- 0xe>-------------------------------------------------------------------------
-
- >AND FOR THE LOVE OF GOD, SOMEONE NOTIFY MITCH KABAY...!<
-
- Mich, not Mitch. "Mich" is short for "Michel."
-
-
- M. E. Kabay, PhD, CISSP (Kirkland, QC)
- Director of Education
- National Computer Security Association (Carlisle, PA)
- http://www.ncsa.com
-
- [ No, Mike is short for Michael. ]
-
- 0xf>-------------------------------------------------------------------------
-
- Your zine is the best
- Please send it to Psycho Al1@aol.com
-
- The Psychotic Monk
-
- PS:Aohell rulez
-
-
- [ You are an idiot. ]
-
- 0x10>-------------------------------------------------------------------------
-
- Hi, Phrack people!
-
- Great job on issue 50! Nice magazine. Article 'bout TTY hijacking is really
- superb.
-
- I have just one question to you. Is there any holes on target system in this
- situation? There's a server, running freeBSD 2.1.5, with a shadowed passwords.
- I've got a dial-up account on that machine as a simple user. What bugs can I
- use for having root privileges?
-
- Best wishes from Ukraine!! OmegA
-
-
- [ find / -perm -4000 -print ]
-
- 0x11>-------------------------------------------------------------------------
-
- hello... long-time reader, first-time writer:
-
- i know that all "submissions" are to be encrypted... and i should be
- encrypting anyways, but i'll make it quick ... besides, this isn't
- really a "submission..."
-
- congrats on reaching the 50th issue mark, and congrats on an
- excellent ish!
-
- i just a quick question. i would like to reprint the <soapbox>
- for issue #50 on my web page, with a hypertext link to the
- Official Phrack Homepage (http://www.fc.net/phrack/ - correct?).
- I think it says brings up some important points, and since it's
- copywrited, and you sren't losers, i'd ask you (it's not like a
- simple copywrite has stopped anyone before)!
-
- thanks,
- lenny
-
-
- [ A simple copyright may not stop people, but the simple restitution
- remanded by courts might. However, go ahead and put a hypertext link.
- The official webpage will be at phrack.com/net/org, SOON. ]
-
- 0x12>-------------------------------------------------------------------------
-
- In Volume Four, Issue Forty-One, File 3 of 13, Supernigger was featured
- in your Phrack Pro-Phile. Whatever happened to him? Did he "grow up and
- get a real job" or is he still lurking around?
-
- - Styx
-
-
- [ Both. ]
-
- 0x13>-------------------------------------------------------------------------
-
- People @ Phrack:
-
- In Phrack #50 in the file 'Linenoize' Khelbin wrote an article about remote
- BBS hacking, namely using Renegade's default 'PKUNZIP -do' command overwrite
- the userbase with your own ...
-
- For some strange reason, while renegade is booted, and if it runs PKUNZIP -do
- the procedure will NOT work... but the procedure DOES work when Renegade is
- down at the Dos Prompt..?
-
- Does Renegade extract files into memory or something while testing for
- integrity? -8) .. I tried this out on 10-04, 5-11 and even
- 04-whatever-the-fuck-that-version-was and it didn't work.. I think Khelbin
- needs help for his chronic crack addiction since I can't find any way possible
- to get his article to work..
-
- op: Taos BBS
-
- ~~~ Telegard v3.02
-
-
- [ We dunno. Anyone else have an answer? ]
-
- 0x14>-------------------------------------------------------------------------
-
- Regarding Xarthons submission about Linux IP_MASQ in Phrack 50...
-
- The masquerading code is not designed for security. Hardwiring RFC1918
- addresses into the IP_MASQ code is not a clever idea for two reasons:
-
- 1) It diminishes the usefulness of the code. I have used masquerading to
- keep things running when my company changed internet providers. I
- masqueraded our old _valid_ IP range. Other people may come up with
- other valid uses, like providing redundancy through two ISPs.
- 2) The masquerading code is part of the Linux packet filter, which can
- certainly be configured to prevent spoofing, a quite a bit more.
-
- If the static packet filter and the masquerading code are used together
- they can provide as much security as a 'dynamic' filtering firewall like
- Firewall-1 in many cases. A very short 'HOW-TO':
-
- 1) Put spoofing filters on all interfaces. Only allow incoming packets
- to the external interface if the destination address is that of the
- external interface (that's the address the masquerading code inserts as the
- source address of outgoing packets).
-
- 2) Insert rule(s) in the forwarding filter to masquerade your outgoing
- packets. You do not need to route incoming replies to masqueraded
- packets, that happens auto-magically. Deny everything else (and _log_).
-
- 3) Make sure the gateway does not run anything that leaves you
- vulnerable. Don't run NFS, the portmapper etc. Update sendmail, bind to
- the latest versions if you run them.
-
- 4) Disable telnet, and use 'ssh' for maintenance. If you must support
- incoming telnet connections through the firewall install the TIS firewall
- toolkit, and use one-time passwords.
-
- 5) Run 'COPS', 'Tripwire'.
-
- 6) Read a good book about Internet security, and make sure you
- understand all the issues involved before you configure _any_ firewall,
- even one with a GUI and a drool-proof manual.
-
- I hope this is useful to some people.
-
- Ge' Weijers (speaking for myself only)
-
- 0x15>-------------------------------------------------------------------------
-
- You write in P49-06:
-
- ... The only sure way to destroy this
- channel is to deny ALL ICMP_ECHO traffic into your network.
-
- No. It suffices to clear the content of the packets
- when passing the firewall.
-
-
- ralf
-
- [ True enough. However, by doing this you remove the RTT info from
- the ICMP echos which will break some implementations which rely on it. ]
-
- 0x16>-------------------------------------------------------------------------
-
- Hi, I┤m a Wannabe, maybe you would call me and idiot.
- Where do you guys hang out, IRC? Wich channel, #supreme? Wich server?
- Know any good trix for me how to learn more about hacking?
-
- Please answer my letter, I know that you get lots of letters, but
- please!!
-
- [ EFNet, #phrack ]
-
- 0x17>-------------------------------------------------------------------------
-
- You can┤t realy say that IRC is for loosers cuz in Phrack 50 I saw an
- article with some text taken from IRC, and you were logged in.
-
- [ We are losers. Ergo, yes we can. ]
-
- Which good hack books, UNIX books or things like that do you recommend.
-
- Thank You For An Answer!!
-
- [ Anything Addison Wesley or ORA. Also, many of the PTR/PH books. ]
-
- 0x18>-------------------------------------------------------------------------
-
- I am writing to inquire about the fate of Pirate Magazine
- and how I might contact it's creators. It seems to have been out of
- circulation since 1990 and I was hoping to look at possibly organizing
- some kind of initiative to revive this excellent publication. I thought
- first to turn to Phrack magazine. Thanx for your time.
-
- Joong Gun
-
- [ Anyone have any information? ]
-
- 0x19>-------------------------------------------------------------------------
-
- Hello,
-
- I just got Phrack 50 and loved it....It is the first one I've
- got. I was wondering if you guys know about any other newsletters or
- magazines that are sent to your e-mail address or you can get off the web on
- a regular basis, like Phrack. thanX
-
- [ Other magazines come and go on a pretty regular basis. Phrack is
- eternal. Phrack is all you need. ]
-
- 0x1a>-------------------------------------------------------------------------
-
- Please help me. If I can't join your club, please let me learn from you. I
- am interested in both Program hacking and remote access.
-
- Thanks.
-
- quattro
-
- [ You join our club if you can find our secret clubhouse. ]
-
- 0x1b>-------------------------------------------------------------------------
-
- hi. This is from a guy you probably will never hear of again, and
- definantly have never heard of already. I wanna ask you a question. At
- my school, people write crap on their backpacks with witeout. I have
- never done this for 2 reasons
-
- 1) I dont wanna be grouped with the poseur metalheads, etc who write
- "Pantera" and "666" and "Satan" etc but cannot name a song of thiers,
- and/or go to church....
-
- 2) I dont wanna be grouped with the wanna be hackers who write stuff
- like Anarchy symbols, "Aohell" "Kaboom" and the such, because thats just
- plain lame. You have to feel sorry for people who think they are elite
- because they can mailbomb somebody.
-
- Another reason I have never written anything is I havent found anything
- worht advertising. Now i have, I wanna write "The guild" or something to
- that extennt maybe "r00t" or something. I have not done this for i do
- not want to piss you off (indirectly something may get to you about it.
- It could happen, remember the 6 degrees of seperation? hehehe). If this
- is ok with you, lemme know please. (cad@traveller.com) Also, if your
- wondering why im mailing this to you alone, it is because you are a
- fucking baddass. heh. Well, lemme know whenever ok? thanks.
-
- (I know i have an absence of punctuation, i'm in a hurry and I have
- homework)
-
-
- [ You have our permission to write r00t on your backpack. ]
-
- 0x1c>-------------------------------------------------------------------------
-
-
- yes i want to learn how to hack and need to learn fast
- Js444 told me you can help
- will repay BIG
- thanks
-
- [ How big? ]
-
- 0x1d>-------------------------------------------------------------------------
-
-
- I sent this from your hoime page...is it X-UIDL? I dunno, it's 4 AM
- anyway
-
- um oh, keep in mind that ur response (if made) to this may be dumped to
- #hack printed in the next Citadel knockoff or whatevrr
-
- I was just like thinking oh, I was thinking "I don't have an Irix
- sniffer!"...actually my thoughts don't have quotes around them it was
- more like
-
- ~o- all the Irix sniffers I have suck -o~
-
- and then theres like Irix 4, 5, 6. Bah. And like sniffit sucks and
- anyway. And then I mentioned this and people were making fun of me, but
- I don't care. I only care lately when people are like, "Oh that's what
- youy make? I'm 17, have a criminal record and make three times that!".
- Anyway, people are like, "No, no nirva is elite" so I thought, aha, I'll
- ask nirva what a good Irix sniffer is. Oh, like now that people are
- laughing at that I have to keep this quets like secrtet. I even think
- some Irix's don't have compile, like Solaris. Christ, some Solaris's
- have jack shit. Anyway.
-
- 1) Why don't u log on #hack, or are you tres elite #!guild or beyond
- elite #www or #root #Twilight_Zone and more importantly
-
- 2) Irix sniffer - captures passwords, actually compiles. I hate
- coding. I am a a lazy American. And like, getting legit root access on
- an Irix...bvah, Irix sniffer!
-
- Bye-bye hackers
-
- oh PostScript
-
- 3) Are you a cyberpunk?
-
- If I ran Phrack I wouldn't like Mr. Tishler have "Are hackers in general
- geeks?" as the question _everyone_ gets, I think, Are you a cyberpunk?
- Would be it
-
- [ 1. We do hang out on as many public channels as we can stand for
- at least a little bit of time each issue. But really why do
- you care if an editor of Phrack is there when people are shouting
- about their penis size and how many drugs they are on? If you
- want to talk about something, we are always available by e-mail
- and will usually talk to you by private msgs if we aren't busy
- doing something else at the moment.
- 2. Anyone want to write us a really cool one?
- 3. Who are we to change tradition? ]
-
- 0x1e>-------------------------------------------------------------------------
-
-
- Hello,
-
- I wanna ask you something about the following problem. I'm really stuck (the
- 1st time ;-)) ! Is it possible to pass a firewall and access one of the
- domains behind it ?? I'm afraid that the sysadmins did their job fine :(
- I've got everything what I need but that damn wall....I'll give you some info
- that I've obtained so far:
-
- - IP-address of the firewall,
- - All the domains + IP adresses behind this wall,
- - The login-account of the superuser,
- - All the open-UNIX ports behind the wall,
- - The company has no WWW-site but they do have an Intranet.
-
- portscanning gives me this:
- 21~=ftp,
- 23~=telnet,
- 25~=smtp-mail 220 x.x.x.x SMTP/smap Ready.
-
- This is at IP x.x.x.2 but I found out that also x.x.x.1 belongs to the same
- company with 3 other ports...
- 7~=echo,
- 9~=discard-sink null
- 79~=finger.
-
- Is the only way to go by D.O.S. attack the firewall and then spoof the
- firewall's IP addres ?
-
- But how to start ?? Woul u be so kind to help me ??
-
- TIA,
- theGIZMO
-
-
- [ fragmentation. ]
-
-
- 0x1f>-------------------------------------------------------------------------
-
-
- Ok, this might sound dumb , but, I think it would be cool to have this as a
- slogan.
-
- "Blah, blah, blah, and along with your subscription, you'll receive a
- LIFETIME WARRANTY ON YOUR BRAIN!! That is, if for any reason your brain
- can't figure out a problem you're having hacking, just e-mail us with your
- question and we'll be glad to help you out. Note: Please PGP encrypt all
- questions regarding hacking questions. Thank you."
-
- Do you like it? Note that blah, blah, blah is whatever you would it to be.
- Such as, "You can subscribe to Phrack Magazine by sending e-mail to
- Phrackedit@infonexus.com requesting you be put on the list, and along with
- your subscription......"
-
- Ok, thats it....write back if you like it....or if you don't. Here is my PGP
- public key.
- Oh yeah...you might have gotten mail from PhatTode@aol.com. That is me. So
- direct replies to those messages to this new address...Thank you.
-
- [ You're right. It does sound dumb. ]
-
- 0x20>-------------------------------------------------------------------------
-
-
- Hey,
- sorry to bother you but I just got Redhat Linux 4.1 in the mail. I
- think it's great besides the fact that I hear that it lacks security.
- HOw do I get PGP up in it? Is it easy to install? Thanks.
-
- Killer Bee
-
- [ yes, very easy to install. Read the documentation. It's different
- for different platforms. ]
-
- 0x21>-------------------------------------------------------------------------
-
-
- Hello
-
- My name is Joseph and I am intrested in any information you may have
- about the early day's of hacking and current hacking underground.. also
- I understand you are a member of the guild ?? what is this?
-
- Joseph --> jgriffiths@iname.com
-
- [ The guild is like what r00t was before r00t got all famous and became
- greatly feared and admired. Oh. And we spend most of our time counting
- our millions and having sex with models. ]
-
- 0x22>-------------------------------------------------------------------------
-
-
- Hi there,
-
- Do you know where I can find the Rosetta stone for interpreting the output
- of Solaris lockd & statd in debug mode? I can't find any public information
- about it, even on Sun sites. Sun Microsystem refuses to let their lab
- publish anything about interpretation of system calls outputs. Are they
- afraid that they will be losing support contracts if this information gets
- out? The man page does not include arguments to run in debug mode, and
- what's the point of providing the tools w/o the means to interpret the
- result? Teach a man how to fish .....you know.
-
- Thanks.
-
- Christine
-
- [ Someone want to write an article on it? ]
-
- 0x23>-------------------------------------------------------------------------
-
-
- In regards to the article on Ethernet spoofing:
-
- As an aside note for the highly paranoid: ethernet spoofing
-
- Note: some of this is theorized, and might not be 100% accurate - if you
- get the jist of it, you should be able to figure out if it works for
- you.
-
- It is possible to spoof ethernet hardware addresses as well. Some cards
- will allow you to do this easily, but you need to have card programming
- docs (check the Linux kernel source for your card driver-!!). Others
- won't let you do it at all, and require a ROM change, or worse it might
- be solid state logic on the card - EVIL. Course you might be able to
- get around solid state stuff by recoding the ROM, but I wouldn't
- recommend it unless you don't have the $70 to buy a new card, and have a
- month or two to spend in the basement.
-
- ... rest of stuff(tm) deleted ...
-
- Interestingly enough, most of the Sun sparc stations I've seen allow you to
- enter in any mac address that you want using ifconfig(1M). I "know someone"
- who picked up a Sparc IPC for $50 (Can $$) and upon discovering that the
- battery that powers the IDPROM was deceased, we needed to fake a mac address
- to get it to talk to someone. Sun's default is 0:0:0:0:0:0 but the 3Com
- card's mac (from a different network) worked quite nicely.
-
- Interesting concept the author has though, I'll be f*ck around with the idea
- when I'm supposedly doing work =)
-
-
- [ MAC address spoofing techniques are well known about, especially under
- Sparcs. However, do some research, write some code and an article and
- submit it... ]
-
- 0x24>-------------------------------------------------------------------------
-
-
- I love your e-zine it is the coolest thing i've read.
-
- [ Thank you. It's the coolest thing we've written. ]
-
- Please could you tell me any ways to violate the security of a "MacAdmin"
- based system on the Apple Macintosh.
-
- [ What's a Macintosh? ]
-
- Mark "Vombat" Brown
-
- May phrack and Fiona live forever!
-
-
- [ ...and may Phrack and Fiona do a joint project some time soon... ]
-
-
- 0x25>-------------------------------------------------------------------------
-
-
- Hey, I sent this to you because yer handle is shorter.
- Anyways, great job on issue 50, always a pleasure to read it, and
- in article 12, by Sideshow Bob, I was wondering about the "tail"
- command. I don't seem to have this nifty util, and was wondering
- if perchance, you knew where I could get a copy. Also: the Skytel
- article sorta looked like an advertisement to me. Nothing against that, it's
- still pretty interesting to learn of Skytel's history, and of the nifty things
- out there, but I was wondering if it sounded like a detailed ad to anyone else.
- But if you could help me out with the tail command, I'd be so grateful.
- Joel Thomas
-
- [ Standard GNU utility. Try your local unix box. ]
-
- 0x26>-------------------------------------------------------------------------
-
-
-
- |
- | G'day mate,
- | I am a computer user in Camplong, Timor. I have limited internet access, as
- | it is a long distance phone call from home. I have downloaded your issues
- | 46-50 and haven't read through them all yet, but what I see looks good.
- | What I need from you is a UUENCODER program so I can extract the included
- | files.
-
- [ Standard GNU shell tool. Any Unix host will have it. Do a websearch
- to get it for Windows. ]
-
- | I am also confused on how to extract the .c files from the text
- | files(philes?).
-
- [ As it says in the header file: gcc -o extract extract.c
-
- then `extract filename` ]
-
- | I am not a C programmer, but my dad is.
-
- [ That's nice. ]
-
- |
- | I need PGP. Although my side of the internet is safe, noone reading others
- | letters (the sysop is too dumb or something to even think about that) I want
- | my mail to get where it is going in one piece unread. Where can I find a
- | free copy of PGP?
-
- [ Do a websearch. ]
-
- 0x27>-------------------------------------------------------------------------
-
-
-
- .. crack me up. Excellent social porno in your reader's letters section.
- Keep on commenting. Might start screaming soon.
-
- Um, the guy from slovakia might want to get hold of Bill Squire for
- information on smartcard programmers; as I seem to recall, he likes
- messing with these electronic devices.
-
- Another thing; I though DC was now just sticking to his viola? According
- to all the news he only started hacking because someone vandalized it?
- Wonder if I should have used the same thing in my case: "I plead not
- guilty, Magistrate sir, but the University's good-for-nothing courses
- drove me to it." Whatever it takes, I guess..
-
- Yum.
-
- -me.
-
-
- 0x28>-------------------------------------------------------------------------
-
-
- This is a response to p48-02 in which one "Mr. Sandman" proceeded to spew
- out eleven paragraphs of blatant misinformation. Rather than lumbering
- through a point-by-point rebuttal to his letter, I will quickly summarize
- what was wrong with it, and then state a few facts to clarify some things.
-
- KoV never touched Skidmore. This is something that anyone who was in the
- group will attest to. And not just to follow the old "admit nothing, deny
- everything" plan. In reality, we NEVER touched it.
-
- In retrospect, I find it very odd that someone from New York would claim
- to know so much about the inner workings of a decidedly regional
- [Connecticut] hacker collective. While we weren't exactly xenophobic, we
- certainly didn't go out of our way to divulge information about ourselves
- to anyone outside the group (or the state, for that matter). This would
- explain why Mr. Sandman's letter was riddled with insufferably laughable
- lies that were obviously the product of a jealous and dejected outsider.
-
- One thing that needs to be put to rest is that we were certainly not "a
- bunch of egotistical and immature criminals" as Mr. Sandman would have you
- believe. The primary focus of KoV's efforts was not to "break into
- universities" or "make ourselves look bigger and more important than we
- were." We existed, first and foremost, to unify what was, at that time, a
- greatly divided scene. Squabbling and infighting among those few real
- hackers who were still around was leading to a critical breakdown at the
- fundamental level. Something had to be done, and fast. In an effort to
- bring together a group of like-minded individuals (not only from the
- hacker perspective but also in terms of anarcho-libertarian philosophy and
- ideology), I started KoV with an intentionally humorous name behind the
- acronym. It was an almost immediate success, and over time I certainly
- accomplished all that I'd set out to do, and then some.
-
- The current state of the "Connecticut hacker scene" (for lack of better
- terminology) is much different than it was in the summer of 1994. People
- are working together, cooperating, and the incessant "civil wars" which
- plagued us back then are all but nonexistent today. I think I'd be well
- within my rights to credit KoV with helping to assure that those problems
- are now but a memory. It really bothers me when anonymous instigators like
- Mr. Sandman attempt to dishonor all the work that we did to get this far,
- without even really having a clue as to what we were (and are) all about.
- Perhaps he and his ilk could benefit from such groups as KoV. Because no
- matter how I feel about him and his actions...
-
- "The more we fight among ourselves,
- the less of a threat we are to the system."
-
- - Valgamon
- Sat Jun 07 15:49:25 EDT 1997
-
-
- 0x29>-------------------------------------------------------------------------
-
- What up.
-
- Yo, Ima hack/phreak from back in the day (1984)
-
- My 1st bbs was on an atari with a floppy drive and 64k!
-
- Nowadays, I do rap music and acting, live in Los angeles (im from western NY),
- and run 900#s and adult websites.
-
- Check this out, I need to thangs:
-
- #1: FTP space for adult pix (not really important, since my host gives me
- unlimited space), but I have no anonymous ftp capabilities)
-
- #2: Windows NT or unix
-
- Can you help??
-
- Have broom (Music software) will travel (trade)
-
-
- [ We will trade you unix for a rap song about Phrack and a movie role
- for route. ]
-
- 0x2a>-------------------------------------------------------------------------
-
-
- This is in reference to the first part of your " PGP Attack FAQ," which
- addresses the length of time necessary to brute force IDEA. Perhaps I'm
- overly paranoid (naw...) or just a perfectionist, but I would like to
- point out two things about this:
-
- 1) Somewhat of an error in your math?
- 2) "As far as present technology is concerned."
-
- "As we all know the keyspace of IDEA is 128-bits. In base 10 notation
- that is:
-
-
- 340,282,366,920,938,463,463,374,607,431,768,211,456.
-
- To recover a particular key, one must, on average, search half the
- keyspace. That is 127 bits:
-
-
- 170,141,183,460,469,231,731,687,303715,884,105,728.
-
- If you had 1,000,000,000 machines that could try 1,000,000,000 keys/sec,
- it would still take all these machines longer than the universe as we
- know it has existed and then some, to find the key. IDEA, as far as
- present technology is concerned, is not vulnerable to brute-force
- attack, pure and simple. "
-
- Somewhat of an error in your math
- ========================
-
- OK, let's examine the math. For simplicity, let's say we only had one
- machine that could try 1,000,000,000 keys/sec. The number of seconds it
- would take for this machine to search half the keyspace, and thus find
- the correct key would be
- 170,141,183,460,469,231,731,687,303715,884,105,728 divided by
- 1,000,000,000. This would yield 170,141,183,460,000,000,000,000,000,000
- seconds of maximum search time before finding the key. This in turn
- would be 2,835,686,391,010,000,000,000,000,000 minutes =
- 47,261,439,850,100,000,000,000,000 hours =
- 1,969,226,660,420,000,000,000,000 days = 5,395,141,535,400,000,000,000
- years = approximately 5.395 sextillion years. If there are 1,000,000,000
- of these machines as you suggest, then the years required for a
- successful brute force crack would be 5,395,141,535,400,000,000,000 /
- 1,000,000,000 = 5,395,141.5354. So, it comes down to: are you saying
- that these 1,000,000,000 machines are acting as a collective entity or
- can *each* one of these machines operate on 1,000,000,000 keys/sec and
- thus operate together at a speed of (1,000,000,000) * (1,000,000,000) =
- 1,000,000,000,000,000,000 keys/sec. If the first is true, then you are
- correct in saying that "it would still take all these machines longer
- than the universe as we know it has existed and then some," as it would
- take app. 5.395 sextillion years (scientists estimnate that universal
- redshift shows the universe to have existed thus far for only 15 billion
- years). If the second is true, then it would take far less time than the
- existence of the universe at app. 5.395 million years... which could be
- compared to twice the amount of time human beings have existed on earth,
- or just a fraction of the time dinosaurs were here.
-
-
- [ Hrm. Take it up with Schneier. ]
-
-
- "As far as present technology is concerned."
- =============================
-
- How far is present technology concerned?! The Intel/Sandia Teraflops
- Supercomputer can reportedly perform 1.06 trillion floating point
- operations per second (refer to
- http://www.intel.com/pressroom/archive/releases/cn121796.htm). Assuming
-
- [ Keep in mind that factoring and brute force key searches are
- integer-based calculations, not floating point operations. ]
-
- one of these "instructions" can operate on, let's say something around a
- 28th power float variable, then disregarding read/write operations, the
- system can search at 1.06 trillion keys/sec. This yields a total search
- time (before a successful "hit") of
- 170,141,183,460,469,231,731,687,303715,884,105,728 / 1.06 trillion =
- 160,510,550,434,000,000,000,000,000 seconds = 5,089,756,165,470,000,000
- years or 5.089 quintillion years... still a rediculous amount of time
- even on the fastest publicised system in existence. Now, this system,
- the Intel/Sandia Teraflops Supercomputer is made up of 9,200 200 MHz
- Pentium Pro processors. Being that they didn't have to buy them at
- markup/retail and they manufacture them from scratch for their own
- purposes, let's say it cost $500 per chip plus some negligible ram and
- labor costs (how much ram do you need when you have a gig+ worth of
- onboard cache, etc.). With 9,200 chips, the system would take about
- $4,600,000 to build. A practical question: if federal taxation is %28 on
- an annual income of $80,000, where does all the money go? Well, let's
- say a Billion dollars per decade goes to the NSA to build whatever they
- want. If the 9,200 chip system cost $4,600,000 then a little algebra
- reveals that with one billion dollars, the NSA could purchase
- approximately 2 million 200 MHz pentium pros. If the 9200 chip system
- did 1.06 trillion keys/sec, thus the 2 million chip system would be
- capable of approximately 230,434,782,609,000 keys/sec or app. 230
- trllion keys/sec. Now, say the NSA is smart enough not to buy crappy x86
- chips and instead get 500 MHz DEC Alpha RISC chips. This is 300 Mhz or 3
- fifths faster than a 200 MHz pentium pro approximately. so 230 trillion
- + (230 trillion * 3/5) = 368,695,652,174,000 or 368 trillion keys/sec.
- The original calculation yields that the successful search time would be
- 170,141,183,460,469,231,731,687,303715,884,105,728 / 368,695,652,174,000
- = 461,467,832,499,000,000,000,000 seconds = 14,633,048,975,700,000. Ok,
- great... so now we're down to 14.6 quadrillion years of search time,
- which means that at least now we may get REALLY lucky and hit the right
- key within a certain degree of insanity. But, this was only a billion
- dollars we gave the NSA in a decade. If we're especially paranoid, let's
- say the government was so concerned over nuclear terrorists sending
- encrypted messages, that the NSA got a TRILLION dollars to build a
- system. That divides the whole equation by a thousand making the search
- time 14,633,048,975,700 years or 14.6 trillion years... STILL
- rediculous. Ok, so let's say that now we're giving the NSA a HUNDRED
- TRILLION DOLLARS thus dividing the search time by 100 yielding
- 146,330,489,757 years which is about ten times longer than the existence
- of the universe. But now, if we had 1,000,000,000 of *these* machines
- working concurrently the search time would wind up being 146.330489757
- years. But, if each RISC processor were replaced with a small piece of
- nanotechnology, each piece of this nanotech being 100 times faster than
- the alpha chips, you get 1.46330489757 year. There ya have it... some
- classified nanotechnology, 100 trillion dollars, and a DAMN lot of
- landmass all multiplied by 1,000,000,000 and you've brute forced IDEA in
- a year and a half. I won't go into the tedious calculations, but an
- object with the surface area of two of our moons would approximately be
- able to house this complex. Now, as I know you're asking about where to
- store all the keys... and the fact that this drive would be bigger than
- a solar system and so on, just have the keys generated using the same
- PRNG in the brute force attack... you'll just have three times the
- instructions (write for the generation, read to get it, write to compare
- it) so multiply the search time by three. The technology is possible...
- it's economics and territory that doesn't work.
-
- [ Theorectially shure. But you have sorta just proved the point that
- it is not feasible. ]
-
- --gKHAN
-
-
- 0x2b>-------------------------------------------------------------------------
-
-
- The snippit in P50 in section 02 of the zine by Xarthon entitled
-
- > Yet another Lin(s)ux bug! "IP_MASQ fails to check to make sure that a
- > packet is in the non routable range." "So in conclusion, you are able to
- > spoof as if you are on the inside network, from the outside. "
-
- Is so incomplete I would almost call it a lie. The only way that Linux
- would do this is if the person setting up the IP-Masq system issued the
- command "ipfwadm -F -p masquerade" which if you read the IP-Masq HOWTO it
- tells you explicity NOT to do for this very reason. My retort for Xarthon
- and all others who do stupid ass things like leave port 19 open and such;
- is that Linux only sux if you do. To wit, don't be a moron, and you won't
- have to complain that it sucks.
-
- Swift Griggs | UNIX Systems Admin
-
-
- 0x2c>-------------------------------------------------------------------------
-
-
- Hi there,
-
- I have a question regarding a certain piece of hardware that has come
- into my possession. Since this little piece of equipment contains no
- indications of its intended use i have no idea what this thing could do.
- So here's a descrition of the little box; i hope you might be able to
- provide me with more information on what this device is supposed to do.
-
- Description:
- -lightgrey rectangular casing (13CMx9CMx3CM)
- -frontpanel has one green LED, a connector labeled "SCANNER", and a
- little door which reveals two sets of dipswitches (2 sets of 8, labeled
- "DIPSW1" and "DIPSW2")
- -backpanel has three connectors, a RJ4-like connector (only it has 6
- lines instead of 4; it looks like a connector for a Memorex Terminal)
- labeled "A", a standard IBM-PC keyboard connector labeled "B", and a
- small (9-pin) serial interface-connector labeled "C".
- -there is a sticker with a serial number, a barcode, and "Made in
- Taiwan" on the bottom
- -the circuit-board contains IC's of Sony, Philips, and TExas Instruments
- -there is also one removable EPROM, made by AMD; it has a label on it
- which reads "V2.61 CS:EF88"
-
-
- I have found that a normal keyboard plugged into connector B, while a
- KBD-to-RJ-jack cord is plugged into connector A will allow the box to be
- placed between the keyboard and the kbd-port; so my first guess would be
- that this is some kind of filtering device. But that doesn't explain why
- there is a serial-connector and this "SCANNER" connector present.
-
- So, do you know what this thing is ?
-
- -lucipher.
-
- [ Readers? ]
-
- 0x2d>-------------------------------------------------------------------------
-
-
- hi, my friends.i am a newbie come from China,i had read some Phrack magazine.
- but to me surprise,i had not success compile a program still now.i send e-mail
- to the author,but server tell me there is no this user.
- for example, phrack-49-15 describle tcp port scan,but i can not find
- ip_tcp.h, other paper tell me a way to guess password,and said the program only
- need Ansi complier,but i can not success too. oh.my god.
- i use sun os ,gcc, i need your help, thanks.
- yours
- keven zhong
-
- [ Here at Phrack, we use TheDraw for ANSI compilers. I hope that
- answers your question. ]
-
- 0x2e>-------------------------------------------------------------------------
-
-
- I'm just writing this to say thanks to all the hackers that represent Phrack
- and work hard to keep it going,you guys are truly keeping the new generation
- alive.If it weren't for Phrack i'd probably never have wanted to waste my time
- with computer's,the technical info is first class and a lot better than most
- of the crap out there.I would suggest that maybe once in a while u guys could
- write some more stuff geared towards the newbies,it really is important
- because most people who aren't familiar with the terms get completely
- lost.Down here in Montreal(514),most people think hacking is spreading virri
- or u/l shitty trojans,there's no talk about unix or networks.We really need
- some help down here,the scene is practically dead and most newbies don't have
- any support to help them get started.Anywyas i just want to say keep up the
- good work,and it's really appreciated.
- --
- | Return Address: Dave.Conway@claw.mn.pubnix.net
- | Standard disclaimer: The views of this user are strictly his/her own.
-
- [ Thanks, if anyone cool is in Montreal, e-mail this guy and revive
- your scene. ]
-
-
- ----[ EOF
-