| ==Phrack Inc.== |
|
|
| Volume Four, Issue Thirty-Nine, File 1 of 13 |
|
|
| Issue XXXIX Index |
| ___________________ |
|
|
| P H R A C K 3 9 |
|
|
| June 26, 1992 |
| ___________________ |
|
|
| ~You're Not Dealing With AT&T~ |
|
|
| Welcome to Phrack 39. This will be the final issue before SummerCon '92. |
| Details of SummerCon will appear in our special anniversary issue due late this |
| summer -- Phrack 40. Rumor also has it that the next issue of Mondo 2000 will |
| contain some type of coverage about SummerCon as well! |
|
|
| Phrack has been receiving an enormous amount of mail containing questions and |
| comments from our readers and we really appreciate the attention, but we don't |
| know what to do with it all. Phrack Loopback was created to address letters of |
| this sort, but in a lot of cases, the senders of the mail are not indicating if |
| their question is to be posted to Loopback or if they are to be identified as |
| the author of their question in Loopback. |
|
|
| Dispater has been moving all across the country over the past couple of months, |
| which is the primary reason for the delay in releasing this issue. However, |
| now that he is settled, the fun is about to begin. He will be responding to |
| your mail very soon and hopefully this will all be sorted out by issue 40. |
| For right now, you can enjoy a variety of special interest articles and letters |
| in this issue's Loopback, including "A Review of Steve Jackson Games' HACKER" |
| by Deluge. Special thanks goes out to Mentor and Steve Jackson for a copy of |
| the game and the totally cool looking poster. "Association of Security |
| Sysadmins" is my favorite! ;) |
|
|
| Another problem situation that needs to be mentioned has to do with would-be |
| subscribers. For some reason the "phracksub@stormking.com" account has been |
| receiving hundreds of requests from people who want to be added to the |
| subscription list. This isn't how it works. You must subscribe yourself, we |
| can't and won't do it for you. The instructions are included later in this |
| file. Up till this point we have been informing people of their error and |
| mailing them the instructions, but we will ignore these requests from now on. |
| Anyone with an intelligence level high enough to enjoy Phrack should be capable |
| of figuring out how to subscribe. |
|
|
| Phrack Pro-Phile focuses on Shadow Hawk 1 -- The first hacker ever to be |
| prosecuted under the Computer Fraud & Abuse Act of 1986. A lot of people don't |
| realize that Robert Morris, Jr. was not the first because Shadow Hawk 1 was |
| tried as a minor and therefore a lot of details in his case are not publicly |
| known. Something to point out however is that the same people (William J. Cook |
| and Henry Klupfel) that were responsible for prosecuting SH1 in 1989, came back |
| in 1990 to attack Knight Lightning... but this time the government and Bellcore |
| didn't fare as well and now both Cook and Klupfel (among others) are being sued |
| in Federal Court in Austin, Texas (See Steve Jackson Games v. United States). |
|
|
| Now, before anyone starts flying off their keyboards screaming about our |
| article "Air Fone Frequencies" by Leroy Donnelly, we will let you know what's |
| what. Yes, the same article did recently appear in Informatik, however, both |
| publications received it from the same source (Telecom Digest) and Informatik |
| just had an earlier release date. At Phrack, we feel that the information was |
| interesting and useful enough that our readers deserved to see it and we do not |
| assume by any means that everyone on the Phrack list is also a reader of |
| publications like Telecom Digest or Informatik. |
|
|
| Phrack's feature article in this issue is "The Complete Guide To The DIALOG |
| Information Network" by Brian Oblivion. Our undying gratitude to Mr. Oblivion |
| for his consistency in providing Phrack and its readers with entertaining |
| quality articles... and we're told that the best is yet to come. |
|
|
| Longtime fans of Phrack might recall that Phrack 9 had an article on Dialog |
| services and it also had an article on Centigram Voice Mail. Now 30 issues |
| later, both topics are resurrected in much greater detail. |
|
|
| You will also note that the Centigram article in this issue is penned under the |
| pseudonym of ">Unknown User<," a name that was adopted from the anonymous |
| posting feature of the Metal Shop Private bulletin board (the birthplace of |
| Phrack, sysoped by Taran King during 1985-1987). The name ">Unknown User<" has |
| traditionally been reserved for authors who did not wish to be identified in |
| any capacity other than to the Phrack editors. In this case, however, even the |
| staff at Phrack has absolutely no idea who the author of this file is because |
| of the unique way of SMTP Fakemail it was delivered. |
|
|
| No Pirates' Cove in this issue. Be watching for the next Pirates' Cove in |
| Phrack 40. |
|
|
| - - - - - - - - |
|
|
| Knight Lightning recently spoke at the National Computer Security Association's |
| Virus Conference in Washington, D.C. His presentation panel which consisted |
| of himself, Winn Schwartau (author of Terminal Compromise), and Michael |
| Alexander (chief editor of ISPNews and formally an editor and reporter for |
| ComputerWorld) was very well received and the people attending the conference |
| appeared genuinely interested in learning about the hacking community and |
| computer security. KL remarked that he felt really good about the public's |
| reaction to his presentation because "its the first time, I've agreed to be on |
| one of these panels and someone in the audience hasn't made accusatory or |
| derogatory remarks." |
|
|
| "It's inappropriate for you to be here." |
|
|
| This was the warm reception KL and a few others received upon entering the |
| room where the secret midnight society anti-virus group was holding a meeting. |
| It appears that a small number of anti-virus "experts" have decided to embark |
| on a mission to rid the country of computer bulletin boards that allow the |
| dissemination of computer viruses... by any means possible, including the |
| harassment of the sysops (or the sysops' parents if the operator is a minor). |
|
|
| At Phrack, some of us feel that there are no good viruses and are opposed to |
| their creation and distribution. Others of us (e.g. Dispater) just think |
| viruses are almost as boring as the people who make a carear out of |
| exterminating them. However, we do not agree with the method proposed by this |
| organization and will be watching. |
|
|
| - - - - - - - - - - |
|
|
| Special thanks for help in producing this issue: |
|
|
| Beta-Ray Bill Crimson Flash (512) |
| Datastream Cowboy Deluge |
| Dispater, EDITOR Dokkalfar |
| Frosty (of CyberSpace Project) Gentry |
| The Iron Eagle (of Australia) JJ Flash |
| Knight Lightning, Founder Mr. Fink |
| The Omega [RDT][-cDc-] The Public |
| Rambone Ripper of HALE |
| Tuc White Knight [RDT][-cDc-] |
|
|
| We're Back and We're Phrack! |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| HOW TO SUBSCRIBE TO PHRACK MAGAZINE |
|
|
| The distribution of Phrack is now being performed by the software called |
| Listserv. All individuals on the Phrack Mailing List prior to your receipt of |
| this letter have been deleted from the list. |
|
|
| If you would like to re-subscribe to Phrack Inc. please follow these |
| instructions: |
|
|
| 1. Send a piece of electronic mail to "LISTSERV@STORMKING.COM". The mail |
| must be sent from the account where you wish Phrack to be delivered. |
|
|
| 2. Leave the "Subject:" field of that letter empty. |
|
|
| 3. The first line of your mail message should read: |
| SUBSCRIBE PHRACK <your name here> |
|
|
| 4. DO NOT leave your address in the name field! |
| (This field is for PHRACK STAFF use only, so please use a full name) |
|
|
| Once you receive the confirmation message, you will then be added to the Phrack |
| Mailing List. If you do not receive this message within 48 hours, send another |
| message. If you STILL do not receive a message, please contact |
| "SERVER@STORMKING.COM". |
|
|
| You will receive future mailings from "PHRACK@STORMKING.COM". |
|
|
| If there are any problems with this procedure, please contact |
| "SERVER@STORMKING.COM" with a detailed message. |
|
|
| You should get a conformation message sent back to you on your subscription. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Table Of Contents |
| ~~~~~~~~~~~~~~~~~ |
| 1. Introduction by Dispater and Phrack Staff 12K |
| 2. Phrack Loopback by Phrack Staff 24K |
| 3. Phrack Pro-Phile on Shadow Hawk 1 by Dispater 8K |
| 4. Network Miscellany V by Datastream Cowboy 34K |
| 5. DIALOG Information Network by Brian Oblivion 43K |
| 6 Centigram Voice Mail System Consoles by >Unknown User< 36K |
| 7. Special Area Codes II by Bill Huttig 17K |
| 8. Air Fone Frequencies by Leroy Donnelly 14K |
| 9. The Open Barn Door by Douglas Waller (Newsweek) 11K |
| 10. PWN/Part 1 by Datastream Cowboy 30K |
| 11. PWN/Part 2 by Datastream Cowboy 27K |
| 12. PWN/Part 3 by Datastream Cowboy 29K |
| 13. PWN/Part 4 by Datastream Cowboy 29K |
|
|
| Total: 314K |
|
|
| "Phrack. If you don't get it, you don't get it." |
|
|
| phracksub@stormking.com |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
| Somebody Watching? Somebody Listening? |
|
|
| *** Special Announcement *** |
|
|
| KNIGHT LIGHTNING TO SPEAK AT SURVEILLANCE EXPO '92 |
| Washington, DC |
|
|
| The Fourth Annual International Surveillance and Countersurveillance Conference |
| and Exposition focusing on Information Security and Investigations Technology |
| will take place at the Sheraton Premiere in Tysons Corner (Vienna), Virginia on |
| August 4-7. |
|
|
| The seminars are on August 7th and include Craig Neidorf (aka Knight Lightning) |
| presenting and discussing the following: |
|
|
| - Are law enforcement and computer security officials focusing their |
| attention on where the real crimes are being committed? |
|
|
| - Should security holes and other bugs be made known to the public? |
|
|
| - Is information property and if so, what is it worth? |
|
|
| Experience the case that changed the way computer crime is investigated |
| and prosecuted by taking a look at one of America's most talked about |
| computer crime prosecutions: United States v. Neidorf (1990). |
|
|
| Exonerated former defendant Craig Neidorf will discuss the computer |
| "hacker" underground, Phrack newsletter, computer security, and how it all |
| came into play during his 7 month victimization by some of our nation's |
| largest telephone companies and an overly ambitious and malicious federal |
| prosecutor. Neidorf will speak about his trial in 1990 and how the court |
| dealt with complex issues of First Amendment rights, intellectual |
| property, and criminal justice. |
|
|
| Security professionals, government employees, and all other interested parties |
| are invited to attend. For more information please contact: |
|
|
| American Technology Associates, Inc. |
| P.O. Box 20254 |
| Washington, DC 20041 |
| (202)331-1125 Voice |
| (703)318-8223 FAX |
| _______________________________________________________________________________ |
|
|