| ==Phrack Inc.== |
|
|
| Volume Four, Issue Forty-One, File 2 of 13 |
|
|
| [-=:< Phrack Loopback >:=-] |
|
|
| By Dispater & Mind Mage |
|
|
| Phrack Loopback is a forum for you, the reader, to ask questions, air |
| problems, and talk about what ever topic you would like to discuss. This is |
| also the place Phrack Staff will make suggestions to you by reviewing various |
| items of note; books, magazines, software, catalogs, hardware, etc. |
|
|
| In this issue: |
|
|
| Comments on Phrack 40 : Rop Gonggrijp |
| Fine Art of Telephony (re: Phrack 40) : Inhuman |
| Question & Comment (BT Tymnet/AS400) : Otto Synch |
| BT Tymnet article in Phrack 40 : Anonymous |
| Phrack fraud? : Doctor Pizz |
| Remarks & Warning! : Synaps/Clone1/Feyd |
| One Ron Hults (re: Phrack 38 Loopback) : Ken Martin |
| Hacking In Czecho-Slovakia : Stalker |
| Phrack 40 is Sexist! : Ground Zero |
| Phrack 40 is Sexist!? (PC Phrack) : Shit Kickin' Jim |
| Misunderstood Hackers Get No Respect : The Cruiser |
| Hackers Should Land In Jail, Not In Press : Alan Falk |
| Anonymous Usenet Posting? : Anonymous |
| Anonymous Mail Poster : Sir Hackalot |
| Phrack On The Move : Andy Panda-Bear |
| Computer Underground Publications Index : Amadeus |
| Pirates v. AT&T: Posters : Legacy Irreverent |
| Ultrix 4.2 Bug : Krynn |
| PumpCon Hosed : Phil "The Outlander" |
| 2600 Meeting Disrupted by Law Enforcement : Emmanuel Goldstein |
| Two New Hardcovers : Alan J. Rothman |
| _______________________________________________________________________________ |
|
|
| Letters to the Editors |
| ~~~~~~~~~~~~~~~~~~~~~~ |
| From: rop@hacktic.nl (Rop Gonggrijp) (Editor of Hack-Tic Magazine) |
| Date: August 14, 1992 |
| Subject: Comments on Phrack 40 |
|
|
| My compliments! You've put out one of the best issues to date. If you keep |
| this up I'll have to get jealous! |
|
|
| Rop Gonggrijp (rop@hacktic.nl) Dangerous and capable of making |
| fax: +31 20 6900968 considerable trouble. |
|
|
| ---------- |
|
|
| From: Inhuman (Sysop of Pentavia BBS) |
| Date: August 18, 1992 |
| Subject: Fine Art of Telephony |
|
|
| I just wanted to let you guys know that the article titled "The Fine Art of |
| Telephony" was one of the best articles I've seen in Phrack in a long time. |
|
|
| I hope to see more information on switching and general telephony in the |
| future. |
|
|
| Thanks, |
|
|
| Inhuman |
|
|
| ---------- |
|
|
| Date: October 22, 1992 |
| From: Otto Synch |
| Subject: Question & Comment |
|
|
| Hello, |
|
|
| Reading your (huge) Phrack issue #40, and noticing that you were accepting |
| comments and questions, I decided to post mine. First of all, please forgive |
| the English. I'm French and can't help it :-) |
|
|
| My comment: When I saw in the index that this issue was dealing with BT |
| Tymnet, I felt very happy because I was looking for such information. And when |
| I read it, I felt really disappointed. Toucan Jones could have reduced his |
| whole article with the following lines: |
|
|
| -> Find any Tymnet number. |
| -> Dial and wait for the "Please log-in:" prompt. |
| -> Log as user "help", no password required. |
| -> Capture everything you want, it's free public information. |
|
|
| I must say I was a bit surprised to find this kind of article in a high-quality |
| magazine such as yours... |
|
|
| My question: I'm currently trying to find out everything about a neat AS/400 |
| I've "found," but I never saw any "hack report" on it. Do you know if there |
| are any available? |
|
|
| OK - Let's see if you answer. We feel somewhat lonely here in the Old |
| Continent...but Phrack is here to keep the challenge up! |
|
|
| Regards, |
|
|
| > Otto Sync < |
|
|
| ---------- |
|
|
| From: Anonymous |
| Date: August 19, 1992 |
| Subject: BT Tymnet article in Phrack 40 |
|
|
| Dear Phrack Staff, |
|
|
| The BT Tymnet article in the 40th issue of Phrack was totally lame. I hate it |
| when people enter Telenet or Tymnet's information facility and just buffer all |
| the sh*t that's in there. Then they have the audacity to slap their name on |
| the data as if they had made a major network discovery. That's so f*ck*ng |
| lame! |
|
|
| Phrack should make a policy not to accept such lame sh*t for their fine |
| magazine. Is Phrack *that* desperate for articles? Crap like commercial dial- |
| up lists is about as lame as posting a few random pages from the front of the |
| white pages. The information is quickly outdated and easily available at any |
| time to anyone. You don't hack this sh*t. |
|
|
| Regards, |
|
|
| Anonymous (anonymous because I don't want to hear any lame flames) |
|
|
| [Editor's Response: We agree that buffering some dialup list is not hacking, |
| however, in this specific case, a decision was made that |
| not everyone had ready access to the information or even |
| knew of its existence. Furthermore and more relevant to |
| why the article appeared in Phrack, an article on Tymnet |
| was appropriate when considering the recent events with |
| the MOD case in New York. |
|
|
| In the future, you may ask that your letter be printed |
| anonymously, but don't send us anonymous mail.] |
|
|
| ---------- |
|
|
| From: Doctor Pizz |
| Date: October 12, 1992 |
| Subject: Phrack fraud? |
|
|
| I recently received an ad from someone who was selling the full set of Phrack |
| back issues for $100.00. I do believe that this is a violation of your rights |
| to Phrack, as he is obviously selling your work for profit! |
|
|
| The address I received to order these disks was: |
|
|
| R.E. Jones |
| 21067 Jones-Mill |
| Long Beach, MS 39560 |
|
|
| It seems he is also selling the set of NIA files for $50, a set of "Hacking |
| Programs" for $40, LOD Tech Journals for $25, and lots of viruses. It sounds |
| like some sort of copyright violation, or fraud, as he is selling public domain |
| stuff for personal profit. At least you should be aware of this. Anyway, I |
| look forward to receiving future volumes of Phrack! Keep up the good work. |
|
|
| Good luck in stopping this guy! |
|
|
| Thank you, |
|
|
| --Doctor Pizz-- |
|
|
| [Editor's Note: We look forward to hearing what our Phrack readers think about |
| people selling hardcopies of Phrack for their own personal |
| profit.] |
|
|
| ---------- |
|
|
| From: Synaps a/k/a Clone1 a/k/a Feyd |
| Date: September 2, 1992 |
| Subject: Remarks & Warning! |
|
|
| Hi, |
|
|
| I've been a regular reader of Phrack for two years now and I approve fully the |
| way you continue Phrack. It's really a wonderful magazine and if I can help |
| its development in France, I'll do as much as I can! Anyway, this is not |
| really the goal of my letter and excuse me for my English, which isn't very |
| good. |
|
|
| My remarks are about the way you distribute Phrack. Sometimes, I don't receive |
| it fully. I know this is not your fault and I understand that (this net |
| sometimes has some problems!). But I think you could provide a mail server |
| like NETSERV where we could get back issues by mail and just by MAIL (no FTP). |
|
|
| Some people (a lot in France) don't have any access to international FTP and |
| there are no FTP sites in France which have ANY issues of Phrack. I did use |
| some LISTSERV mailers with the send/get facility. Could you install it on your |
| LISTSERV? |
|
|
| My warning is about a "group" (I should say a pseudo-group) founded by Jean |
| Bernard Condat and called CCCF. In fact, the JBC have spread his name through |
| the net to a lot of people in the Underground. As the Underground place in |
| France is weak (the D.S.T, anti-hacker staff is very active here and very |
| efficient), people tend to trust JBC. He seems (I said SEEMS) to have a good |
| knowledge in computing, looks kind, and has a lot of resources. The only |
| problem is that he makes some "sting" (as you called it some years ago) |
| operation and uses the information he spied to track hackers. He organized a |
| game last year which was "le prix du chaos" (the amount of chaos) where he |
| asked hackers to prove their capabilities. |
|
|
| It was not the real goal of this challenge. He used all the materials hackers |
| send him to harass some people and now he "plays" with the normal police and |
| the secret police (DST) and installs like a trade between himself and them. |
| It's really scary for the hacking scene in France because a lot of people trust |
| him (even the television which has no basis to prove if he is really a hacker |
| as he claims to be or if he is a hacker-tracker as he IS!). Journalists take |
| him as a serious source for he says he leads a group of computer enthusiasts. |
|
|
| But we discovered that his group doesn't exist. There is nobody in his group |
| except his brother and some other weird people (2 or 3) whereas he says there |
| is 73 people in his club/group. You should spread this warning to everybody in |
| the underground because we must show that "stings" are not only for USA! I |
| know he already has a database with a lot of information like addresses and |
| other stuff like that about hackers and then he "plays" with those hackers. |
|
|
| Be very careful with this guy. Too many trust him. Now it's time to be |
| "objective" about him and his group! |
|
|
| Thanks a lot and goodbye. |
|
|
| Synaps a/k/a Clone1 a/k/a Feyd |
|
|
| ---------- |
|
|
| From: Ken Martin <70712.760@compuserve.com> |
| Date: November 17, 1992 |
| Subject: One Ron Hults...(Phrack 38 Loopback) |
|
|
| Dear Phrack Staff: |
|
|
| This letter is concerning the letter in the Phrack Loopback column (#38, April |
| 20, 1992) written by one Ron Hults. It suggests that all children should be |
| disallowed access to a computer with a modem. |
|
|
| The news release to which it is attached attempts to put an idea in the |
| reader's mind that everything out there (on bulletin boards) is bad. Anyone |
| who can read messages from "satanic cultists, pedophile, and rapists" can also |
| read a typical disclaimer found on most bulletin boards which have adult |
| material and communication areas available to their users, and should be able |
| to tell the SysOp of a BBS how old he/she is. |
|
|
| A child who is intelligent enough to operate a computer and modem should also |
| be able to decide what is appropriate for him/her to read, and should have the |
| sense enough to avoid areas of the BBS that could lead to trouble, and not to |
| give their address and home phone number to the Charles Manson idols. (It is a |
| fact that all adolescents have thoughts about sex; nothing can change that. |
| The operator of a BBS also has the moral responsibility to keep little kids out |
| of the XXX-Rated GIF downloading area.) |
|
|
| One problem with that is BBSes run by the underground type (hack/phreak, these |
| usually consist of people from 15-30 years of age). The operators of these let |
| practically anyone into their system, from my experiences. These types of |
| BBSes often have credit card numbers, telephone calling card numbers, access |
| codes to credit reporting services, etc., usually along with text-file |
| documents about mischievous topics. Mr. Hults makes no mention of these in his |
| letter and press release. It is my belief that these types of systems are the |
| real problem. The kids are fascinated that, all of a sudden, they know how to |
| make explosives and can get lots of anything for free. |
|
|
| I believe that the parents of children should have the sense enough to watch |
| what they are doing. If they don't like the kind of information that they're |
| getting or the kind of messages that they're sending to other users, then that |
| is the time to restrict access to the modem. |
|
|
| I am fifteen years old, and I can say that I have gotten into more than my |
| share of trouble with the law as a result of information that I have obtained |
| from BBSes and public communications services like CompuServe. The computer is |
| a tool, and it always will be. Whether it is put to good use or not depends on |
| its user. I have put my computer/modem to use in positive applications more |
| than destructive ones. |
|
|
| I would like Mr. Hults to think about his little idea of banning children from |
| modem use, and to think about the impact it would have on their education. |
| Many schools use computers/modems in their science and English curriculums for |
| research purposes. |
|
|
| Banning children from telecommunications is like taking away connection to the |
| outside world and all forms of publication whatsoever when one takes a look |
| around a large information service like CompuServe or GEnie, and sees all of |
| the information that a service like this is capable of providing to this |
| nation. |
|
|
| Thanks, |
|
|
| Ken Martin (70712.760@compuserve.com) |
| a.k.a. Scorpion, The Omega Concern, Dr. Scott |
|
|
| ---------- |
|
|
| From: Stalker |
| Date: October 14, 1992 |
| Subject: Hacking In Czecho-Slovakia |
|
|
| Hi there! |
|
|
| I'm student from Czecho-Slovakia (for some stupid person who doesn't know, it's |
| in middle Europe). Call me Stalker (if there is other guy with this name, call |
| me what you want). If you think that computers, networks, hacking and other |
| interesting things are not in Eastern Europe, you're WRONG. I won't talk |
| about politicians. They really make me (and other men from computers) sick! |
| I'll tell you what is interesting here right now. |
|
|
| Our university campus is based on two main systems, VMS and ULTRIX. There's |
| VAX 6000, VAX 4000, MicroVAX, VAXStation and some oldtimer machines which run |
| under VMS. As for hacking, there's nothing interesting. You can't do some |
| tricks with /etc/passwd, there's no main bug in utilities and commands. But, |
| as I know, VMS doesn't crypt the packets across the network so you can take |
| some PC and Netwatch (or any other useful software ) and try to see what |
| is interesting on the cable. You can grab anything that you want (usernames, |
| passwords, etc.). |
|
|
| Generally, students hate VMS and love UNIX-like systems. Other machines are |
| based on ULTRIX. We have DECstations (some 3100, some 5000) and one SM 52-12 |
| which is something on VAX-11 :-(. It is a really slow machine, but it has |
| Internet access! There's many users so you can relatively easily run Crack |
| (excellent program) since passwd is not shadowed. Another useful thing is tftp |
| (see some other Crack issues). There was a machine with enabled tftp, but |
| after one incident, it was disabled. |
|
|
| I would like to tell you more about this incident but sysadmins are still |
| suspecting (they probably read my mail). Maybe after some months in other |
| articles. Now I can tell you that I'm not a real UNIX-GURU-HACKER, but the |
| sysadmins thought that I was. Someone (man or girl, who knows) has hacked one |
| (or two) machines on our campus. Administrators thought that I was this |
| mysterious hacker but I am not! He/she is much better than I and my friends. |
| Today no one knows who the hacker is. The administrator had talked to him/her |
| and after some weeks, gave him/her an account. He/she probably had root |
| privileges for some time and maybe has these today. He/she uses a modem to |
| connect. His/her login name is nemo (Jules Verne is a popular hero). I will |
| try to send mail to him/her about Phrack and maybe he/she will write |
| interesting articles about himself. |
|
|
| And some tips. Phrack is very interesting, but there's other interesting |
| official files on cert.org (192.88.209.9) available via anonymous FTP. This |
| is the Computer Emergency Response Team (CERT) FTP server. You can find |
| interesting information here about bugs in actual software, but you will see |
| only which command or utility has the bug, not how to exploit it. If you are |
| smart enough, there's nothing to say. |
|
|
| If you are not, you must read Phrack! :-) |
|
|
| Bye, |
|
|
| Stalker |
|
|
| ---------- |
|
|
| From: Ground Zero |
| Date: August 25, 1992 |
| Subject: Phrack 40 is Sexist! |
|
|
| Hi, just a quick comment about Phrack's account of SummerCon: |
|
|
| I don't think your readers need to know or are really interested in hearing |
| about the fact that Doc Holiday was busy trying to pick up girls or that there |
| were some unbalanced teeny-boppers there offering themselves to some of the |
| SummerCon participants. Also, as a woman I don't care for your |
| characterizations of females in that file. |
|
|
| I'm not trying to nitpick or be politically correct (I hate PC), I'm just |
| writing because I felt strongly enough about it. Ciao. |
|
|
| Ground Zero (Editor of Activist Times, Inc./ATI) |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| From: Shit Kickin' Jim |
| Date: September 11, 1992 |
| Subject: Phrack 40 is Sexist!? (PC Phrack) |
|
|
| Listen here woman. I don't know whut yer big fat butt thinks Phrack wuz tryin' |
| to insinuate. Lemme tell yew a thang er two. First of all, Phrack ain't run |
| by some little pip-squeek faggot ass pansies. Ah mean wut are you sum kinda |
| hOmOsexual? Here's what ah mean. NOW here iz a real story 'bout me and one a |
| my bestest friends: 4x4 Phreaker. |
|
|
| See 4x4 Phreaker come down to Texas fur a little hackin adventure. Even though |
| he lives up there in Yankee-land, 4x4 Phreaker iz a pretty good ol' boy. |
| Whuddya think real manly hackers do when they get together? Go stop by Radio |
| Shack and buy shrink wrap? |
|
|
| HELL NO! We fuckin' went to Caligula XXI. Fur yew ol' boys that ain't from |
| 'round here er yer a fauygut out there that might be readin this, Caligula XXI |
| specializes in enertainmunt fer gennelmen. |
|
|
| Now, me and 4x4 Phreaker didn't go to hawk at some fat nasty sluts like you |
| might see at your typical Ho-Ho Con. We went with the purpose in mind of seein |
| a real movie star. Yup Christy Canyon was in the house that night. 4x4 |
| Phreaker and me sat down at a table near the front. At that point I decided |
| that I'd start trollin for babes. Yep that's right I whipped out an American |
| Express Corporate Gold card. And I'll be damned if it weren't 3 minutes later |
| me and 4x4 Phreaker had us 2 new found friends for the evening. |
|
|
| So anywayz, yew can see we treated these two fine ladies real nice and they |
| returned the favor. We even took em to Waffle House the next mornin'. So I |
| dunno where yew git off by callin us sexist. Yer just some Yankee snob big |
| city high horse woman who expects to be a takin care of. |
|
|
| God bless George Bush and his mistress Jennifer whutz her name. |
|
|
| :Shit Kickin' Jim (Madder than a bramer bull fightin a mess of wet hornets) |
|
|
| _______________________________________________________________________________ |
|
|
| Misunderstood Hackers Get No Respect August 10, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by The Cruiser (ComputerWorld)(Page 24)(Letters to the Editor) |
|
|
| I just read the replies to Chris Goggans' "Hackers aren't the real enemy" |
| [ComputerWorld, June 29], and I thought I'd address a few of the points brought |
| up. I'm a hacker -- which means that I'm every system administrator's |
| nightmare. |
|
|
| Hardly. Many hackers are politically aware activists. Besides being fueled by |
| an obsession for mastering technology (I call it a blatant disregard for such), |
| true hackers live and obey a strict moral code. |
|
|
| All this talk about the differences between voyeurism and crime: Please, let's |
| stop comparing information access to breaking into someone's house. The |
| government can seize computers and equipment from suspected hackers, never to |
| return it, without even charging a crime. I will not sit back and let Big |
| Brother control me. |
|
|
| The Cruiser |
| _______________________________________________________________________________ |
|
|
| Hackers Should Land In Jail, Not In Press October 19, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Alan Falk (ComputerWorld)(Page 32)(Letters to the Editor) |
|
|
| The letters you get from avowed hackers seem to glorify the virtues of hacking. |
| I find this very disturbing for a simple reason: It completely ignores the |
| issue of private property. |
|
|
| The computer systems they hack into (pun intended) and the databases they try |
| to access, as well as the data in the databases, are private property. |
|
|
| An analogous argument might be that breaking and entering a jewelry store and |
| taking off with some valuables is really a way of testing the security controls |
| at the jeweler's establishment. They're really just doing it for the |
| excitement and challenge. |
| Would they promote voyeurism based on the "logic" that "after all, if they |
| didn't want me to look, they'd have pulled the drapes closer together?" |
|
|
| The fact that there's challenge or excitement involved (or even commitment, |
| intellect or whatever) does not change the issue. |
|
|
| I suggest that hackers who gain entry to systems against the wishes of the |
| systems' owners should be treated according to the laws regarding unlawful |
| entry, theft, etc. |
|
|
| Alan Falk |
| Cupertino, California |
| _______________________________________________________________________________ |
|
|
| Anonymous Usenet Posting? |
| ~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Date: August 19, 1992 |
| From: Anonymous |
|
|
| I've read in Phrack all about the different ways to send fake mail, but do any |
| of the readers (or Mind Mage) know anything about anonymous newsgroup posting? |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Anonymous Mail Poster August 4, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~ |
| by Sir Hackalot |
|
|
| Here is some C source to a simple "anonymous" mail poster that I wrote a LONG |
| time ago. It's just one of many pieces of code I never gave to anyone before. |
| You may find it useful. Basically, it will connect to the SMTP port and |
| automate the sending. It will allow for multiple recipients on the "To:" line, |
| and multiple "To:" lines. |
|
|
| From: sirh@sirh.com |
|
|
| ------ Cut here for fm.c ----- |
| #include <stdio.h> |
| #include <string.h> |
| #include <sys/types.h> |
| #include <sys/socket.h> |
| #include <netdb.h> |
| #include <netinet/in.h> |
| #include <arpa/inet.h> |
| #include <signal.h> |
| #include <fcntl.h> |
| #include <errno.h> |
|
|
|
|
| int openSock(name,port) |
| char *name; |
| int port; |
|
|
| { |
| int mysock,opt=1; |
| struct sockaddr_in sin; |
| struct hostent *he; |
| he = gethostbyname(name); |
| if (he == NULL) { |
| printf("No host found..\n"); |
| exit(0); |
| } |
|
|
| memcpy((caddr_t)&sin.sin_addr,he->h_addr_list[0],he->h_length); |
| sin.sin_port = port; |
|
|
| sin.sin_family = AF_INET; |
|
|
| mysock = socket(AF_INET,SOCK_STREAM,0); |
|
|
| opt = connect(mysock,(struct sockaddr *)&sin,sizeof(sin)); |
|
|
| return mysock; |
|
|
| } |
|
|
| /* This allows us to have many people on one TO line, seperated by |
| commas or spaces. */ |
|
|
| process(s,d) |
| int d; |
| char *s; |
| { |
| char *tmp; |
| char buf[120]; |
|
|
| tmp = strtok(s," ,"); |
|
|
| while (tmp != NULL) { |
| sprintf(buf,"RCPT TO: %s\n",tmp); |
| write(d,buf,strlen(buf)); |
| tmp = strtok(NULL," ,"); |
| } |
|
|
| } |
|
|
|
|
|
|
| getAndSendFrom(fd) |
| int fd; |
| { |
| char from[100]; |
| char outbound[200]; |
|
|
| printf("You must should specify a From address now.\nFrom: "); |
| gets(from); |
|
|
| sprintf(outbound,"MAIL FROM: %s\n",from); |
| write(fd,outbound,strlen(outbound)); |
|
|
|
|
|
|
| } |
|
|
| getAndSendTo(fd) |
| int fd; |
| { |
| char addrs[100]; |
|
|
| printf("Enter Recipients, with a blank line to end.\n"); |
|
|
| addrs[0] = '_'; |
|
|
| while (addrs[0] != '\0') { |
| printf("To: "); |
| gets(addrs); |
| process(addrs,fd); |
| } |
|
|
| } |
|
|
| getAndSendMsg(fd) |
| int fd; |
| { |
| char textline[90]; |
| char outbound[103]; |
|
|
| sprintf(textline,"DATA\n"); |
| write(fd,textline,strlen(textline)); |
|
|
|
|
| printf("You may now enter your message. End with a period\n\n"); |
| printf("[---------------------------------------------------------]\n"); |
|
|
| textline[0] = '_'; |
|
|
| while (textline[0] != '.') { |
| gets(textline); |
| sprintf(outbound,"%s\n",textline); |
| write(fd,outbound,strlen(outbound)); |
| } |
|
|
| } |
|
|
|
|
| main(argc,argv) |
| int argc; |
| char *argv[]; |
| { |
|
|
| char text[200]; |
| int file_d; |
|
|
| /* Get ready to connect to host. */ |
| printf("SMTP Host: "); |
| gets(text); |
|
|
| /* Connect to standard SMTP port. */ |
| file_d = openSock(text,25); |
|
|
| if (file_d < 0) { |
| printf("Error connecting to SMTP host.\n"); |
| perror("smtp_connect"); |
| exit(0); |
| } |
|
|
| printf("\n\n[+ Connected to SMTP host %s +]\n",text); |
|
|
| sleep(1); |
|
|
| getAndSendFrom(file_d); |
|
|
| getAndSendTo(file_d); |
|
|
| getAndSendMsg(file_d); |
|
|
| sprintf(text,"QUIT\n"); |
| write(file_d,text,strlen(text)); |
|
|
| /* Here we just print out all the text we got from the SMTP |
| Host. Since this is a simple program, we didnt need to do |
| anything with it. */ |
|
|
| printf("[Session Message dump]:\n"); |
| while(read(file_d,text,78) > 0) |
| printf("%s\n",text); |
| close(file_d); |
| } |
| ----- End file fm.c |
| _______________________________________________________________________________ |
|
|
| From: Andy Panda-Bear |
| Date: September 25, 1992 |
| Subject: Phrack on the move |
|
|
| To Whom It May Concern: |
|
|
| I love reading your Phrack articles and find them very, very informative as |
| well as helpful. I was wondering in you've ever or plan to put together a |
| compendium of related articles. For instance, you could make a Phrack guide to |
| telephony and include all telephone/telecommunications articles. Perhaps a |
| "Phrack Guide to UNIX" or "Phrack Guide to Internet" could be produced. It |
| could have reprints of past articles along with commentaries by individuals who |
| care to share their knowledge. Anyway it's just something to think about. |
|
|
| Thanks for many megabytes of useful info and keep it coming. |
|
|
| Later, |
|
|
| Andy Panda-Bear |
|
|
| ---------- |
|
|
| Computer Underground Publications Index |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Amadeus |
|
|
| I just finished the new edition of the Phrack Index, now called the Computer |
| Underground Publications Index since it now includes the issues of the Legion |
| of Doom Tech Journals and Informatik. |
|
|
| You can get it from ftp.uu.net as /tmp/CUPindex |
|
|
| I have already sent it to da folks at CUD so that they may enter it into their |
| archives. |
|
|
| The CUP has been updated to included all the Phracks up to 40. |
|
|
| C'ya |
|
|
| Amadeus |
| _______________________________________________________________________________ |
|
|
| Pirates v. AT&T: Posters August 8, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Legacy Irreverent (legacy@cpu.cyberpnk1.sai.com) |
|
|
| On May 24 1992, two lone Pirates, Legacy of CyberPunk System, and Captain |
| Picard of Holodeck, had finally had enough of AT&T. Together, they traveled to |
| the AT&T Maintenance Facility, just west of Goddard, Kansas, and claimed the |
| property in the name of Pirates and Hackers everywhere. They hoisted the Jolly |
| Roger skull and crossbones high on the AT&T flagpole, where it stayed for 2 |
| days until it was taken down by security. |
|
|
| This event was photographed and videotaped by EGATOBAS Productions, to preserve |
| this landmark in history. And now you can witness the event. For a limited |
| time we are offering a 11" x 17" full color poster of the Jolly Roger Pirate |
| flag flying high over AT&T, with the AT&T logo in plain view, with the caption; |
| "WE CAME, WE SAW, WE CONQUERED." These are $5.50 each and are laminated. |
|
|
| Also available, by request is a 20" x 30" full color photograph, and a cotton |
| T-shirt with the same full color picture on the front, for $20 each. |
|
|
| If you are interested in purchasing any of the above items, simply send check |
| or money order for the amount to: |
|
|
| CyberPunk System |
| P.O. Box 771027 |
| Wichita, KS 67277-1072 |
|
|
| A GIF of this is also available from CyberPunk System, 1:291/19, 23:316/0, |
| 72:708/316, 69:2316/0. FREQ magicname PIRATE |
|
|
| Any questions, send them to Legacy@cpu.cyberpnk1.sai.com |
|
|
| _______________________________________________________________________________ |
|
|
| Ultrix 4.2 Bug |
| ~~~~~~~~~~~~~~ |
| By Krynn |
|
|
| A bug was discovered in Ultrix 4.2 upgrade version. It involves npasswd, and |
| root. It is quite simple, and a patch/fix is available. Here is a description |
| of the hole: |
|
|
| Sys Admin's username: mradmin |
| Any user's username : mruser |
|
|
| Okay, mruser has forgotten his password, which isn't good. Mruser goes to |
| mradmin and asks mradmin to change his password to newpass. Mradmin does so. |
|
|
| Mradmin now will su to root, and npasswd mruser. He will enter mruser's new |
| password, newpasswd. It will appear in the /etc/passwd that mruser's password |
| is a "*" (shadowed), and that it has been changed, but it hasn't. |
|
|
| The password changed was root's, meaning root's password is now newuser. |
|
|
| A fix is available via anonymous ftp at: |
|
|
| black.ox.ac.uk /src/npasswd.enhanced.shar.Z |
|
|
| The original is there as /src/npasswd jpl.tar.Z |
| _______________________________________________________________________________ |
|
|
| PumpCon Hosed November 5, 1992 |
| ~~~~~~~~~~~~~ |
| by Phil "The Outlander" |
|
|
| PumpCon '92 was held this past weekend at the Westchester Courtyard by |
| Marriott, and was shut down in spades. |
|
|
| It began like any typical hacker/phreak/cyberpunk's convention, with lots of |
| beer, lots of shooting the bull, and lots of people from around the country, |
| except that the guests got sloppy, stupid, noisy, and overconfident. |
|
|
| The manager of the hotel, accompanied by three town of Greenborough police |
| officers, entered the room at approximately 10pm on Saturday. The manager had |
| received complaints about noise and vandalism from some of the hotel's other |
| guests. She claims to have tried to call the room several times before |
| physically entering, but the room's telephone line was consistently busy. |
|
|
| The police officers noticed the multiple open (and empty) beer bottles |
| scattered around the room and were gearing up to make some arrests for |
| "Unlawful Possession of Alcoholic Beverages by Underage Persons" when one of |
| the policemen spotted an Amiga, connected to a US Robotics modem, which was in |
| turn connected to the suite's phone line. The "stolen" calling card was all |
| the probable cause necessary to upgrade the charges to "Wire Fraud." |
|
|
| Everyone in the suite was detained for questioning. Standard investigation |
| procedure was followed. The entire case was handled by local authorities, |
| including the Westchester County DA. To my knowledge, the FBI and Bell |
| Security people were not called in (or if they were, it was after I was |
| released). |
|
|
| Each detainee was body-searched for diskettes, hand-written notes about credit |
| and computer services, autodialers, and the like. The suite where PumpCon had |
| taken place was also searched. Hardware seized includes at least two Amigas |
| with monitors, modems, and diskettes, and one AT&T dumb terminal with modem. |
|
|
| Each of the detainees was interviewed in turn. Just before dawn on the morning |
| of Sunday, November 1st, the police began making the actual arrests. Four to |
| eight people were arrested and taken to the local jail. |
|
|
| The rest of the detainees were released with no charges or arrests filed. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| And now on a personal note to anybody who is new to the world of hacking: |
|
|
| Many of the attendees to PumpCon '92 were just like me. I was aware of the |
| possible consequences of an arrest, but the full enormity of the possibilities |
| hadn't sunk in. Getting busted can really ruin your life, and I am unwilling |
| to sacrifice my liberty and get a criminal record just for the thrill of |
| hanging out with the "eleet." |
|
|
| I was personally terrified out of my skull and went right off any dreams I had |
| of being some kind of big-time cyberpunk. The law had us outgunned ten to one |
| (literally and figuratively) and I as I write this on Monday night I still |
| haven't stopped shaking. |
|
|
| To anyone who hasn't considered what it would be like to get seriously busted, |
| I want you to try and picture the scene that night, and comes the dawn, a lot |
| of the people you were partying with just twelve hours earlier are carted away |
| in handcuffs to face an uncertain future. |
|
|
| The attendees of PumpCon, including myself and with few exceptions, were utter |
| and complete fools. They thought that they could act like jerks, bust up the |
| hotel, and phreak off the room lines without bringing down the heat like a jet |
| of molten lava. They thought they were too smart to get caught. They thought |
| that they were immortal. They thought wrong, and now some of them are going to |
| pay for it. |
|
|
| I got lucky. I was released, and I learned some invaluable lessons. |
|
|
| I can't stress enough to anybody out there who is treating the state of the |
| Hack like it's a big game: You aren't going to get your marbles back when the |
| night is over. The stakes are real. Ask yourself if you can deal with the |
| possibilities of ruining your life before it's even begun. |
|
|
| Everyone must make their own decision. You are only given this one chance to |
| bail out now; any others that come along are blessings from on high. |
|
|
| If you do decide to live in the computer underground, I can only offer this |
| advice: Cover your a$$. Do not act foolishly. Do not associate with fools. |
| Remember that you are not immortal, and that ultimately there are no safety |
| nets. Intelligence can't always save you. Do not, in your arrogance, believe |
| that it will. My time as a cyberpunk has been short and undistinguished but it |
| has taught me this much. |
|
|
| I'm not saying that you should not become a hacker. If that is truly your |
| wish, then I'm not one to stop you. I'm just warning you that when the fall |
| comes, it can come hard, and there's nobody who can help you when you've gone |
| far enough past the line. |
|
|
| Phil "The Outlander" |
| _______________________________________________________________________________ |
|
|
| 2600 Meeting Disrupted by Law Enforcement December 12, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Emmanuel Goldstein (Editor of 2600 Magazine) |
|
|
| The following is a letter I wrote to the Washington Post in response to their |
| article about the incidents at the Pentagon City Mall on November 6, entitled, |
| "Hackers Allege Harassment at Mall" (dated November 13, page A1). Their |
| article failed to focus on the startling revelation of federal government |
| involvement and the ominous implications of such an action. The article also |
| does little to lessen the near hysteria that is pumped into the general public |
| every time the word "hacker" is mentioned. |
|
|
| Let us take a good look at what has been confirmed so far. A group of computer |
| hackers gathered at a local mall as they do once a month. Similar meetings |
| have been going on in other cities for years without incident. This gathering |
| was not for the purposes of causing trouble and nobody has accused the hackers |
| of doing anything wrong. Rather, the gathering was simply a place to meet and |
| socialize. This is what people seem to do in food courts and it was the |
| hackers' intention to do nothing more. |
|
|
| When mall security personnel surrounded the group and demanded that they all |
| submit to a search, it became very clear that something bizarre was happening. |
| Those who resisted were threatened with arrest. Everyone's names were written |
| down, everyone's bags gone through. One person attempted to write down the |
| badge numbers of the people doing this. The list was snatched out of his hand |
| and ripped to pieces. Another hacker attempted to catch the episode on film. |
| He was apprehended and the film was ripped from his camera. School books, |
| notepads, and personal property were seized. Much of it has still not been |
| returned. The group was held for close to an hour and then told to stay out |
| of the mall or be arrested. |
|
|
| This kind of treatment is enough to shock most people, particularly when |
| coupled with the overwhelming evidence and eyewitness accounts confirming no |
| unusual or disruptive behavior on the part of the group. It is against |
| everything that our society stands for to subject people to random searches and |
| official intimidation, simply because of their interests, lifestyles, or the |
| way they look. This occurrence alone would warrant condemnation of a blatant |
| abuse of power. But the story doesn't end there. |
|
|
| The harassment of the hackers by the mall police was only the most obvious |
| element. Where the most attention should be focused at this point is on the |
| United States Secret Service which, according to Al Johnson, head of mall |
| security, "ramrodded" the whole thing. Other media sources, such as the |
| industry newsletter Communications Daily, were told by Johnson that the Secret |
| Service was all over the mall that day and that they had, in effect, ordered |
| the harassment. Arlington police confirm that the Secret Service was at the |
| mall that day. |
|
|
| It is understood that the Secret Service, as a branch of the Treasury |
| Department, investigates credit card fraud. Credit card fraud, in turn, can be |
| accomplished through computer crime. Some computer hackers could conceivably |
| use their talents to accomplish computer crime. Thus we arrive at the current |
| Secret Service policy, which appears to treat everybody in the hacker world as |
| if they were a proven counterfeiter. This feeling is grounded in |
| misperceptions and an apprehension that borders on panic. Not helping the |
| situation any is the ever-present generation gap -- most hackers are young and |
| most government officials are not. |
|
|
| Apart from being disturbed by the gross generalizations that comprise their |
| policy, it seems a tremendous waste of resources to use our Secret Service to |
| spy on public gatherings in shopping malls. It seems certain to be a violation |
| of our rights to allow them to disrupt these meetings and intimidate the |
| participants, albeit indirectly. Like any other governmental agency, it is |
| expected that the Secret Service follow the rules and not violate the |
| constitutional rights of citizens. |
|
|
| If such actions are not publicly condemned, we will in effect be granting a |
| license for their continuance and expansion. The incident above sounds like |
| something from the darkest days of the Soviet Union when human rights activists |
| were intimidated by government agents and their subordinates. True, these are |
| technology enthusiasts, not activists. But who they are is not the issue. We |
| cannot permit governmental abuse of any person or group simply because they may |
| be controversial. |
|
|
| Why do hackers evoke such controversy? Their mere presence is an inconvenience |
| to those who want so desperately to believe the emperor is wearing clothes. |
| Hackers have a tendency of pointing out the obvious inadequacies of the |
| computer systems we entrust with such a large and growing part of our lives. |
| Many people don't want to be told how flimsily these various systems are held |
| together and how so much personal data is readily available to so many. |
| Because hackers manage to demonstrate how simple it is to get and manipulate |
| this information, they are held fully responsible for the security holes |
| themselves. |
|
|
| But, contrary to most media perceptions, hackers have very little interest in |
| looking at other people's personal files. Ironically, they tend to value |
| privacy more than the rest of us because they know firsthand how vulnerable it |
| is. Over the years, hackers have gone to the media to expose weaknesses in our |
| credit reporting agencies, the grading system for New York City public schools, |
| military computer systems, voice mail systems, and even commonly used push |
| button locks that give a false sense of security. Not one of these examples |
| resulted in significant media attention and, consequently, adequate security |
| was either delayed or not implemented at all. |
|
|
| Conversely, whenever the government chooses to prosecute a hacker, most media |
| attention focuses on what the hacker "could have done" had he been malicious. |
| This reinforces the inaccurate depiction of hackers as the major threat to our |
| privacy and completely ignores the failure of the system itself. |
|
|
| By coming out publicly and meeting with other hackers and non-hackers in an |
| open atmosphere, we have dispelled many of the myths and helped foster an |
| environment conducive to learning. But the message we received at the Pentagon |
| City Mall tells us to hide, be secretive, and not trust anybody. Perhaps |
| that's how the Secret Service wants hackers to behave. But we are not |
| criminals and we refuse to act as such simply because we are perceived that way |
| by uninformed bureaucrats. |
|
|
| Regardless of our individual outlooks on the hacker issue, we should be |
| outraged and extremely frightened to see the Secret Service act as they did. |
| Whether or not we believe that hackers are decent people, we must agree that |
| they are entitled to the same constitutional freedoms the rest of us take for |
| granted. Any less is tantamount to a very dangerous and ill-advised precedent. |
|
|
| Emmanuel Goldstein |
| Editor, 2600 Magazine -- The Hacker Quarterly (516)751-2600 |
|
|
| (NOTE: 2600 Magazine coordinates monthly hacker meetings throughout the |
| country.) |
| _______________________________________________________________________________ |
|
|
| Two New Hardcovers November 24, 1992 |
| ~~~~~~~~~~~~~~~~~~ |
| by Alan J. Rothman (New York Law Journal)(Page 5) |
|
|
| During the opening sequence of the classic English television series "The |
| Prisoner," the lead character known only as Number 6 (brilliantly played by |
| Patrick McGoohan) is abducted and taken to a secret location called "The |
| Village." He desperately pleads with his captors "What do you want?" Their |
| grim response is "Information." Through 17 thrilling episodes, his kidnappers |
| staged elaborate high-tech ruses to find out why he quit work as a spy. |
|
|
| Had this story been set in the 1990s rather than the 1960s, all The Village's |
| proprietors would have needed was a PC and a modem. They could have assembled |
| a composite of Number 6's movements by cross-referencing records from any of |
| the commercial data bases containing the details of nearly everyone's daily |
| activities. Then with a bit of ingenuity, they could have tried to steal even |
| more information by hacking into other restricted data systems. |
|
|
| No longer fiction, but common fact, the billowing growth in the computers and |
| telecommunications networks everywhere is generating urgent legal issues |
| regarding the content, usage and ownership of the data coursing through them. |
| Dilemmas have also surfaced concerning the responsibilities of the businesses |
| which gather, sift and repackage such information. Indeed, a critical juncture |
| has now been reached where the basic constitutional rights of privacy and |
| expression are colliding with the ever-expanding reach of modern technology. |
|
|
| Two well-crafted books have recently been published which together frame the |
| spectrum of relevant individual rights issues in these areas with uncanny |
| symmetry. Fortunately, neither degenerates into a "computers are bad" |
| jeremiad. Rather, they portray an appropriate balance between the virtues of |
| computerization and disturbing cases of technological misuse for wrongful |
| commercial and governmental ends. |
|
|
| Presenting array of new forms of electronic encroachment on personal privacy is |
| Jeffrey Rothfeder's alarming new book, "Privacy for Sale: How Computerization |
| Has Made Everyone's Private Life an Open Secret" (Simon & Schuster, 224 pages, |
| $22). He offers the chilling thesis that anyone can find out nearly anything |
| regarding anybody and there is nowhere left to hide. He convincingly states |
| his case in a concise and insightful exploration of the trends and abuses in |
| the mass processing of personal data. |
|
|
| The fascinating mechanics of how and where information about virtually every |
| aspect of our lives is gathered and then computerized are extensively |
| described. The most productive fonts include medical records, credit |
| histories, mortgage applications, subscription lists, phone records, driver's |
| licenses and insurance forms. Yet notwithstanding the legitimate commercial |
| and regulatory reasons for providing these facts, the author carefully |
| documents another more deeply hidden and troubling consequence of volunteering |
| such information: It is constantly resold, combined with other sources and |
| reused without your knowledge or permission for purposes entirely different |
| from those you first intended. |
|
|
| Mr. Rothfeder alleges the most perilous result of these activities is the |
| growing and highly organized sales, integration and cross-matching of |
| databases. Businesses and government entities now have sophisticated software |
| to generate complex demographic profiles about individuals, populations and |
| geographic areas. In turn, these computer-generated syntheses are increasingly |
| used for invasive and discriminatory purposes. |
|
|
| Numerous examples of such misuse are cited, ranging from slightly annoying to |
| purely horrifying. The astonishing breadth of this roster includes the sale of |
| driver's license information with height weight specifications to clothes |
| marketers for tall men and thin women, purchases of credit histories and |
| workmen's compensation claims reports by prospective employers who believe this |
| material is indicative of a job applicant's character, and the creation of |
| "propensity files" by federal agencies to identify people who have not |
| committed any offense but might likely be criminals. |
|
|
| Two additional problems pervade the trafficking of intimate information. |
| First, there is little or no federal legislation to effectively protect people |
| from certain problems presented in the book. For example, the release of |
| medical records thought to be "confidential" is virtually unprotected. |
|
|
| Second, it can be extremely difficult to have false entries corrected before |
| they have a ripple effect on your other data. Beyond the common tales of |
| frustration at clearing up a faulty credit report, Mr. Rothfeder relates the |
| case of a man denied any health insurance because his medical records contained |
| an erroneous report he was HIV positive. |
|
|
|
|
| JOURNEY IN CYBERSPACE |
|
|
| Turning to a much more accurate account, author Bruce Sterling takes readers |
| into the ethereal realm of "cyberspace" where computers, networks, and |
| electronic bulletin boards systems (BBS) are linked together by phone. In his |
| first non-fiction work, "The Hacker Crackdown: Law and Disorder on the |
| Electronic Frontier" (Bantam, 328 pages, $23), he chronicles the U.S. |
| government's highly visible efforts in 1990 to prosecute "hackers" it suspected |
| of committing crimes by PC and modem. However, Mr. Sterling distinguishes this |
| term as being more about active computer enthusiasts, most of whom have never |
| committed any wrongdoing. The writer's other credits include some highly |
| regarded "cyberpunk" science fiction, where computer technology is central to |
| the plots and characters. |
|
|
| The "crackdown" detailed by the author began with the crash of AT&T's long- |
| distance phone system on January 15, 1990. Although it has never been proven |
| that hackers were responsible, this event served as the final catalyst to spur |
| federal law enforcement agencies into concerted action against a suspected |
| underground of computer criminals. A variety of counter-operations were |
| executed. Most notable was Operation Sundevil the following May when agents |
| around the country seized 42 computer systems, 23,000 diskettes, and halted 25 |
| BBS's where the government believed hackers were exchanging tips of the trade. |
|
|
| Some of the government's resulting prosecutions through their nationwide |
| efforts were moderately successful. However, the book's dramatic centerpiece is |
| the trial of Craig Neidorf (a.k.a. Knight Lightning). Mr. Neidorf was a |
| contributor to Phrack, an electronic magazine catering to hackers, available on |
| various BBS's. |
|
|
| In January 1989, another hacker named "Prophet" transmitted a document he |
| pilfered from BellSouth's computers regarding the 911 emergency system to |
| Neidorf. Together they edited the text, which Neidorf then published in |
| Phrack. In July 1990, he was placed on trial for federal charges of entering a |
| fraudulent scheme with Prophet to steal this document. The government alleged |
| it was worth $79,499 and that its publication threatened emergency operations. |
| To the prosecutor's dismay, the case was dropped when the defense proved the |
| same material was publicly available for only $13. |
|
|
| With insight and style, Mr. Sterling uses this and other events to cast |
| intriguing new spins on applicable civil liberties issues. |
|
|
| Are the constitutional guarantees of freedom of expression and assembly fully |
| extended to BBS dialogs and gatherings? What degree of privacy can be expected |
| for personal data on systems which may be subject to surreptitious entry? Are |
| hackers really breaking any laws when merely exploring new systems? Is posting |
| a message or document on a BBS considered a "publication"? Should all BBS's be |
| monitored just because of their potential for illegal activity? What are the |
| responsibilities of BBS operators for the contents of, and access to, their |
| systems? |
|
|
| The efforts of Mitchell Kapor, the co-developer of Lotus 123 and now chairman |
| of ONtechnology, are depicted as a direct response to such issues raised by the |
| crackdown. Mr. Kapor assembled a prominent group of fellow computer |
| professionals to establish the Electronic Frontier Foundation (EFF), dedicated |
| to education and lobbying for free speech and expression in electronic media. |
| As well, EFF has provided support to Craig Neidorf and others they consider |
| wrongly charged with computer crime. |
|
|
| Weighty legal matters aside, the author also embellishes his story with some |
| colorful hacker lore. These denizens of cyberspace are mostly young men in |
| their late teens or early twenties, often fueled by junk food and propelled by |
| macho. Perhaps their most amusing trait is the monikers they adopt -- |
| Bloodaxe, Shadowhawk, and of course, Phiber Optik. |
|
|
| Someone else, a non-hacker involuntary given the pseudonym "Number 6," knew his |
| every act was continually being monitored and recorded against his will. As a |
| manifestation of resistance to this relentless surveillance, he often bid |
| farewell to other citizens of the Village with a sarcastic "Be seeing you." |
| Today, the offerings of authors Rothfeder and Sterling provide a resounding |
| "And you" as a form of rejoinder (often uttered by The Village's citizens as |
| well), to publicize the ironic diversity threats wrought by information |
| technology. |
|
|
| Number 6 cleverly managed to escape his fictional captivity in The Village |
| during the final (and mind-boggling) episode of The Prisoner. However, based |
| on the compelling evidence presented in these two books, the protection of |
| individual rights in the reality of today's evolving "global village" of |
| computer networks and telecommunications may not be so neatly resolved. |
|
|