| ==Phrack Inc.== |
|
|
| Volume Three, Issue Thirty-five, File 10 of 13 |
|
|
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
| PWN PWN |
| PWN Phrack World News PWN |
| PWN PWN |
| PWN Issue XXXV / Part One PWN |
| PWN PWN |
| PWN Compiled by Dispater PWN |
| PWN PWN |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
|
|
| Welcome to another edition of Phrack World News. Read this issue very |
| carefully because it is full of very important stories about a multitude of |
| different issues. Special thanks goes to Dark OverLord, Stainless Steel |
| Provider, and Private Citizen for their help in preparing this issue. |
| _______________________________________________________________________________ |
|
|
| XMASCON 1991 |
| ~~~~~~~~~~~ |
| NIA Magazine & Phrack Inc. present: |
|
|
| The Second Annual |
|
|
| X M A S C O N |
|
|
|
|
| Who: All Hackers, Journalists, Security Personnel, Federal Agents, Lawyers, |
| Authors and Other Interested Parties. |
|
|
| Where: Houston Airport Hilton Inn |
| 500 North Belt East |
| Houston, Texas 77060 |
| U.S.A. |
| Tel: (713) 931-0101 |
| Fax: (713) 931-3523 |
|
|
| When: Friday December 27 through Sunday December 29, 1991 |
|
|
|
|
| Yes, ladies and gentlemen, you read it right... Xmascon has returned! This will |
| undoubtedly be the telecom event of the year. Unlike certain conferences in the |
| past, Xmascon 91 has a devoted and dedicated staff who are putting in an |
| unmentionable amount of time to ensure a large, vast and organized collection |
| of some of the most diversified people in the telecommunications world. The |
| event will be open to the public so that anyone may attend and learn more about |
| the different aspects of computer security. |
|
|
|
|
| Hotel Information |
| ----------------- |
|
|
| The Houston Airport Hilton Inn is located about 6 miles from Intercontinental |
| Airport. The Xmascon group room rates are $49.00 plus tax (15%) per night, your |
| choice of either single or double. There are also 7 suites available, the |
| prices of which vary from $140 to $250. You can call the hotel to find out the |
| differences and availability of the suites, and you will also NEED to tell them |
| you are with the Xmascon Conference to receive the reduced room rate, |
| otherwise, you will be paying $69.00. There is no charge for children, |
| regardless of age, when they occupy the same room as their parents. Specially |
| designed rooms for the handicapped are available. The hotel provides free |
| transportation to and from the airport, as well as neighboring Greenspoint |
| Mall, every 30 minutes on the hour, and on call, if needed. There are 2 |
| restaurants in the hotel. The Wicker Works is open until 11:00 pm, and The |
| Forty Love is open 24 Hours. There will also be breakfast, lunch and dinner |
| buffets each day. There is a piano bar, The Cycle Club, as well as a sports |
| bar, Chaps, which features numerous table games, large screen TV, and a disco |
| with a DJ. Within the hotel compound, there are 3 pools, 2 of which are |
| indoors, a jacuzzi, a miniature golf course, and a fully equipped health club |
| which features universal weights, a whirlpool and sauna. A car rental agency |
| is located in the hotel lobby, and you can arrange to pick your car up at |
| either the airport or the hotel. Xmascon attendees are entitled to a discounted |
| rate. Contact the hotel for more information. |
|
|
| Xmascon will last 3 days, with the main conference being held on Saturday, |
| December 28, in the Osage meeting room, starting at 12:00 p.m. and continuing |
| on throughout the evening. This year, we have our own complete wing of the |
| hotel, which is housed around a 3,000 square foot atrium ballroom. The wing |
| is completely separated from the rest of the hotel, so we are strongly |
| encouraging people to make their reservations as far in advance as possible |
| to ensure themselves a room within our area. |
|
|
| We are hoping to have a number of people speak on a varied assortment of |
| topics. If you would like to speak, please contact us as soon as possible and |
| let us know who you are, who you represent (if anyone), the topic you wish to |
| speak on, a rough estimate of how long you will need, and whether or not you |
| will be needing any audio-visual aids. |
|
|
| There will be a display case inside the meeting room which will hold items of |
| telecom interest. Specific items that will be available, or that we hope to |
| have, include the first issues of 2600, Tap, Mondo 2000, and other magazines, |
| non-computer related magazines that feature articles of interest, a wide array |
| of boxes, the Quaker Oats 2600 mhz whistle, The Metal AE, etc. We will also |
| have a VCR and monitor set up, so if you have any interesting videos (such as |
| the Unsolved Mysteries show featuring Kevin Poulsen), or if you have anything |
| you think people would enjoy having the chance to see, please let us know ahead |
| of time, and tell us if you will need any help getting it to the conference. |
| If all else fails, just bring it to the con and give it to us when you arrive. |
|
|
| If anyone requires any additional information, needs to ask any questions, |
| wants to RSVP, or would like to be added to the mailing list to receive the |
| Xmascon updates, you may write to either myself (Drunkfux), Judge Dredd, or |
| Lord Macduff via Internet at: |
|
|
| nia@nuchat.sccsi.com |
|
|
| Or via US Mail at: |
|
|
| Hard Data Corporation |
| ATTN: HoHo |
| P.O. Box 60695 |
| Airport Mail Facility |
| Houston, Texas 77205-9998 |
| U.S.A. |
|
|
| We will hopefully have an 800 mailbox before the next update is sent out. If |
| someone cares to donate a decent one, that will stay up throughout the end of |
| the year, please let us know. We should also be listing a few systems as an |
| alternative form of reaching us. |
|
|
| Xmascon 91 will be a priceless learning experience for professionals, and gives |
| journalists a chance to gather information and ideas direct from the source. It |
| is also one of the very few times when all the members of the computer |
| underground can come together for a realistic purpose. We urge people not to |
| miss out on an event of this caliber, which doesn't happen very often. If |
| you've ever wanted to meet some of the most famous people from the hacking |
| community, this may be your one and only chance. Don't wait to read about it in |
| all the magazines, and then wish you had attended, make your plans to be there |
| now! Be a part of our largest and greatest conference ever. |
|
|
| Remember, to make your reservations, call (713) 931-0101 and tell them you're |
| with Xmascon. |
|
|
| In closing... if you miss this one, you're only cheating yourself. |
| _______________________________________________________________________________ |
|
|
| MindRape Revisited September 27,1991 |
| ~~~~~~~~~~~~~~~~~ |
| >From Arizona State University State Press |
| Further Reading: Phrack Issue 34, File 11, "MindRape or MediaRape?" |
|
|
| An Arizona State University (ASU) student is one of seven suspects in a |
| computer fraud scheme that one US West Communications official said could cost |
| the carrier and the phone company as much as $5 billion in one year. |
|
|
| Police in Phoenix, Arizona have seized computer equipment, software, and a |
| list of long distance calling card codes from the home of the unidentified |
| 19-year-old student. |
|
|
| The student is one of seven people -- three in Oregon and one each in |
| Washington, Utah, and Iowa -- singled out as suspects in a month-long |
| investigation of electronic phone fraud conducted by Phoenix police, said Jim |
| Waltman, a fraud manager for US West Communications. The Phoenix man has not |
| been arrested. |
|
|
| The computer "hackers" allegedly used their computers to gain access to |
| secret long distance phone access codes such as the ones found on calling |
| cards, and sold codes to other students for profit. |
|
|
| US West officials told the Associated Press that it is unknown how many |
| local customers have been wrongfully billed for long distance calls on their |
| accounts. |
|
|
| Kevin Robinson, public information sergeant for the Phoenix Police |
| Department, would not comment on the investigation. |
|
|
| Art Carter, dean of Student Life at Arizona State University (ASU), said |
| that if the student is charged, the case will be reviewed under the ASU Code of |
| Conduct and the action taken by the University will be determined at that time. |
|
|
| Mark Knighton, security director for LDL Long Distance, said his company |
| and US West were able to trace calls to several location, including the home of |
| the Phoenix man. |
|
|
| The Phoenix man has not been arrested, authorities said. |
|
|
| Waltman said he was with Phoenix police a week ago when they searched the |
| north Phoenix home and uncovered what turned out to be an inexpensive and |
| relatively simple system for getting free codes. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
| Editor's Comment by: Dispater |
|
|
| What MindRape has been charged with cannot be determined now. A request |
| must be submitted to Arizona Public Records and be considered for release to |
| the requestor. |
|
|
| Here are some possibly useful numbers: |
|
|
| Arizona Special Investigations Division (602)542-4853 |
| County Attorney's Office (602)262-3411 (Gail Thackeray) |
| Arizona Republic Newspaper (602)271-8000 |
| Phoenix Police Department |
| - General Investigations (602)262-6141 |
| - Police Information (602)262-7626 |
| - Police Records (602)262-6134 |
| _______________________________________________________________________________ |
|
|
| East Coast LOD Hackers Create Virtual Reality MAELSTROM |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| "It's reached the point where hacking is counter-productive." |
|
|
| If the 1980's were the decade that hackers emerged from their relative |
| obscurity as computer oddities, to be transformed in the public's perception as |
| front-page news -- then the 90's are shaping up to be the decade of hacker |
| turned entrepreneur. Lately the notorious hacker group Legion of Doom seems to |
| be a particularly fertile spawning ground for ex-hackers turned |
| young-businessman. |
|
|
| Two former East-Coast Legion of Doom members, Bruce Fanscher <Dead Lord> and |
| Patrick Krupa <Lord Digital>, have pooled their talents to form a new company |
| in the burgeoning field of Virtual Reality. |
|
|
| The arena of Virtual Reality has often been called technology in search of a |
| purpose and at times resembles nothing more than an interactive movie meets |
| videogame. This chaotic state of affairs has led to a never-never land of |
| incompatible technologies and far-out ideas, that have tremendous potential, |
| but little commercial application at present. Fanscher and Krupa plan to |
| change all that. "VR isn't anything new, it's something we've been living for |
| over half our lives. The only difference is the state of current technology, |
| makes possible an incredible variety of application." said Krupa in an |
| interview. "Right now we're in the ideal position to move forward on ideas |
| we've been working on for years," added Fanscher. |
|
|
| Krupa, who had attained the status of cult figure in the hacker underground |
| prior to his arrest, as chronicled by John Markoff (New York Times) technology |
| columnist, has spent the last several years working in the very lo-tech world |
| of theater, "Basically I was totally burnt out on computers. I mean I don't |
| give a damn if my word processor boots in one second instead of eight, and |
| that's the only place anything was heading for a long time. The NeXT has |
| changed all that and brought to market something truly innovative, although I |
| still don't care too much about technology as anything but a medium through |
| which you can reach people and affect their experiences and perceptions." |
|
|
| No stranger to creative innovation himself, Fanscher, Krupa's longtime |
| compatriot, has spent his share of time in the somewhat murky spotlight of the |
| hacker underground. Musing about his days as a hacker delving into computer |
| systems to see how they worked, Fanscher remarked that: |
|
|
| "It's reached the point where hacking is counter-productive. You can |
| only take apart things other people have designed and see what makes |
| them work, for so long, before it becomes an exercise in boredom and |
| the time comes to use what you've learned to create something new |
| that nobody has ever seen before. My current interest in other |
| people's systems is zero. It was a useful learning experience for me, |
| but there's no future in it." |
|
|
| This oddly charismatic, dynamic duo is rounded out by Delia Kopold a former |
| actress and theater major who is the architect of the worlds that make |
| MAELSTROM come alive. This initial offering by the collection of talents will |
| be an online system run on the NeXTcube supermicro -- a machine that looks more |
| like a piece of modern art than a computer -- that offers enhanced versions of |
| all the usual amenities like electronic messaging, file transfers, and |
| networking, all revolving around MAELSTROM, a program Fanscher calls, "a |
| real-time virtual interaction simulation engine." MAELSTROM will initially |
| take the form of an extremely detailed fantasy world complete with custom |
| graphic programs that run on MS-DOS, Macintosh and Amiga computers, allowing |
| users to tap into the NeXTcube's system architecture through their home |
| computers connected to telephone lines. "Maelstrom isn't really a fantasy |
| game, it's actually a universal engine comprised of objects that can be |
| accessed by a variety of graphic, sound and data files to create just about any |
| multi-user reality you can dream up," explains Krupa. |
|
|
| The MAELSTROM system is about to go through a short beta-test run in New York |
| City prior to a national ad campaign that will herald its universal |
| accessibility on packet switch. "Our beta system already offers everything |
| that competing services offer, but at a much lower cost -- and we're still |
| adding features. And nothing like Maelstrom has ever existed before, the |
| technology just wasn't there," concludes Fanscher. |
| _______________________________________________________________________________ |
|
|
| 2600 Magazine Exposes Security Holes October 18,1991 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by John F. McMullen & Barbara E. McMullen (Newbytes) |
|
|
| Armonk, New York -- Supported by videotape examples, Emmanuel Goldstein, editor |
| and publisher of 2600 Magazine: The Hacker Quarterly, told those in attendance |
| at an October 17th New York City press conference that "the American public is |
| often lulled into a false sense of security; a security that is often not |
| supported by the facts of specific cases." |
|
|
| The videotapes, produced by 2600 and provided to the press show both the |
| intrusion of a Dutch "hacker" in to United States Military computers and what |
| Goldstein alleges is the fallibility of a brand of mechanical, pushbutton locks |
| used by, among others, New York State University sites, Federal Express, United |
| Parcel Service, JFK International Airport, IBM and NASA. |
|
|
| Goldstein told Newsbytes "We invested considerable time and money to wake |
| people up to the fact that we have a false sense of security when it comes not |
| only to computer networks but to physical safety as well." |
|
|
| The tape of the Dutch "hacker" was made by Goldstein while in Europe. and shows |
| the intrusion into a Unites States Army computer system. The intruder was able |
| to set up a fictitious account called "danquayle" and, once into the system, |
| was able to obtain "root" privileges thus giving him total control of the |
| workings of the system. |
|
|
| A portion of this tape had previously been shown with Goldstein's approval on |
| an episode of the Geraldo Rivera television show "Now It Can Be Told". |
| Goldstein told Newsbytes that one^S^Q reason for his release of the entire tape to |
| the press was his feeling that the Rivera episode entitled "The Mad Hacker's |
| Key Party" had distorted the message of the tape -- "This was not a case of a |
| terrorist break-in but was rather simply a demonstration of the lack of |
| security of our systems. To find root accounts with password like "Kuwait" and |
| lack of sophisticated security in our military computers should be of real |
| concern and should not be lost in an exploitation of the 'hacker' issue." |
|
|
| A background paper provided at the conference by 2600 explains the entire |
| intrusion effort in detail and states "The purpose of this demonstration is to |
| show just how easy it really was. Great care was taken to ensure that no |
| damage or alteration of data occurred on this particular system. No military |
| secrets were taken and no files were saved to a disk by the hackers. What is |
| frightening is that nobody knows who else has access to this information or |
| what their motivations might be. This is a warning that cannot be taken |
| lightly." |
|
|
| The second videotape show Goldstein and other 2600 staff opening seemingly at |
| will locks manufactured by Simplex Security Systems. The locks of the |
| mechanical pushbutton combination variety were shown to be installed at the |
| State of New York University at Stony Brook, JFK International Airport and on |
| Federal Express and United Parcel pick-up boxes throughout the New York |
| Metropolitan area. |
|
|
| In the film, Goldstein is shown filling out a Federal Express envelope for |
| delivery to 2600 Magazine and inserting in the Fedex dropbox. He then lifts |
| the weather protection cover on the box's lock and keys a combination that |
| allows him to open the lock and remove his envelope. Scott Skinner, a SUNY |
| student and 2600 staff member told Newsbytes that it had actually taken the |
| staff 10 minutes to determine the proper code combinations to open the lock. |
|
|
| Skinner explained, "While Simplex prefers people to think that there is an |
| endless number of permutations to the lock, there are actually only 1,085. In |
| most cases, even this number is greatly reduced -- if one knows that only three |
| buttons are being used, it reduces the possibilities to 135. Additionally, we |
| found that, once we had the combination to one Federal Express dropbox, it |
| worked in every other one that we tried in the New York area." |
|
|
| Goldstein told Newsbytes "When we contacted Simplex, they first denied that the |
| locks were unsafe and then said that the permutations were much greater. After |
| some discussion, they admitted that the 1,085 figure was correct but said that |
| it would take a person with a complete listing of the combinations over four |
| hours to try them all. Our experience obviously shows that they may be opened |
| in a much shorter time than that." |
|
|
| Goldstein also pointed out that, "although a $5 Master combination lock may be |
| broken by a crowbar, it is a much more secure combination device. It has |
| 64,000 combinations compared to the 1,085 with the Simplex." |
|
|
| Goldstein continued, "One of the real problems is that, should a person have |
| the misfortune to be robbed, entry due to a failure of the Simplex lock gives |
| no evidence of a forcible break-in and police and insurance companies often put |
| the blame on the homeowner or office manager for 'giving away the combination.' |
| It really can create a problem." |
|
|
| Skinner told Newsbytes "I'm really concerned about t^Shis. I'm a student at |
| SUNY, Stony Brook and all our dormitories use these locks as the only means of |
| security. I've shown the problem to Scott Law who is responsible for residence |
| security but he has discounted the problem and said that the locks were |
| installed at the recommendation of the campus locksmith. The locksmith, Garry |
| Lenox contradicts Law and says that he recommended against these locks years |
| ago and said that they were not secure for dormitory use." Skinner said that |
| he will write an article for the college newspaper in an attempt to raise |
| consciousness about this problem. |
|
|
| Goldstein also said that he intends to publish the list of valid combinations |
| in an up-coming iss^Que of 2600 to demonstrate to the public the problems with |
| the lock. He further said that he will raise the issue on his weekly radio |
| show, "Off The Hook", heard on New York's WBAI-FM. |
|
|
| In response to a Newsbytes question concerning how the 2600 staff happened to |
| become involved in a problem with locks, Goldstein said, "We're hackers and |
| when we see something with buttons on it, whether it's a computer or not, we |
| tend to try it. While the average person tends to accept that things are |
| secure just because he is told that they are, hackers will usually try them |
| out. It's because of this 'trying out' that we can point out the problems with |
| both the US military computer security and this lock -- and we feel that, in |
| both cases, we have performed a service. People should be aware when they are |
| at risk so that they may take action to correct it." |
| _______________________________________________________________________________ |
| |
| Questions Exist On Israeli Break-In Of US Systems September 10,1991 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Barbara E. McMullen & John F. McMullen (Newsbytes) |
|
|
| NEW YORK -- Amidst reports of the intrusion by an Israeli national into United |
| States military computer systems, there have been conflicting accounts of the |
| extent and nature of the invasion. |
|
|
| According to wire services, Deri Schriebman, an 18 year-old graduate of |
| Israel's Technion Institute and a native of the northern Israeli city of |
| Carmiel, was arrested by Israeli police for allegedly breaking into US military |
| computers and commercial credit card systems. Israeli spokes person Eitan Raz, |
| commenting on the equipment found at Schriebman's home for allegedly making |
| free overseas phone calls, was quoted as saying "This was a very complex |
| system. It was the first time such technology was discovered in Israel." |
|
|
| Newsbytes has ben able to confirm with sources that a trail of credit card |
| fraud in the United States and Canada led investigators to Schriebman but has |
| not been able to confirm that Schriebman, as reported in Israeli press, was |
| able to access classified Pentagon information concerning Patriot missiles |
| during the recent Gulf War. A US government investigative official told |
| Newsbytes that, while his agency has formally requested documentation of the |
| events from the Israeli police, that there seems to have been no contact to |
| date between any US service and the Israeli investigators. |
|
|
| Other investigative sources have told Newsbytes that the investigation into |
| Schriebman's activities began in May 1991 when two Quebec teenagers were |
| arrested for purchasing goods through the use of stolen credit card |
| identification. The teenagers told Canadian authorities that they had received |
| the information from a source in Carmiel, Israel and the authorities notified |
| Israeli police. According to the Israeli reports, Schriebman admitted the |
| intrusion into credit card files and the subsequent dissemination of codes but |
| denied making any use of the information. He was quoted as saying that his |
| cracking into the systems was done only out of curiosity. |
|
|
| A "hacker" source told Newsbytes that underground bulletin boards utilized for |
| the exchange of such credit information are often frequented by foreign |
| nationals. He said that the most frequent visitors come from Australia, Israel |
| and Germany and that many of the Israelis identify themselves as have a |
| connection with the Technion Institute. |
| _______________________________________________________________________________ |
|
|