| ==Phrack Magazine== |
|
|
| Volume Five, Issue Forty-Five, File 4 of 28 |
|
|
|
|
| // // /\ // ==== |
| // // //\\ // ==== |
| ==== // // \\/ ==== |
|
|
| /\ // // \\ // /=== ==== |
| //\\ // // // // \=\ ==== |
| // \\/ \\ // // ===/ ==== |
|
|
| PART I |
|
|
| ------------------------------------------------------------------------------ |
|
|
| !! NEW PHRACK CONTEST !! |
|
|
| Phrack Magazine is sponsoring a programming contest open to anyone |
| who wishes to enter. |
|
|
| Write the Next Internet Worm! Write the world's best X Windows wardialer! |
| Code something that makes COPS & SATAN look like high school Introduction |
| to Computing assignments. Make the OKI 1150 a scanning, tracking, vampire- |
| phone. Write an NLM! Write a TSR! Write a stupid game! It doesn't |
| matter what you write, or what computer it's for! It only matters that you |
| enter! |
|
|
| Win from the following prizes: |
|
|
| Computer Hardware & Peripherals |
| System Software |
| Complete Compiler packages |
| CD-ROMS |
| T-Shirts |
| Magazine Subscriptions |
| and MANY MORE! |
|
|
| STOP CRACKING PASSWORDS AND DO SOMETHING WITH YOUR LIFE! |
|
|
| Enter the PHRACK PROGRAMMING CONTEST! |
|
|
| The rules are very simple: |
|
|
| 1) All programs must be original works. No submissions of |
| previously copyrighted materials or works prepared by |
| third parties will be judged. |
|
|
| 2) All entries must be sent in as source code only. Any programming |
| language is acceptable. Programs must compile and run without |
| any modifications needed by the judges. If programs are specific |
| to certain platforms, please designate that platform. If special |
| hardware is needed, please specify what hardware is required. |
| If include libraries are needed, they should be submitted in addition |
| to the main program. |
|
|
| 3) No virii accepted. An exception may be made for such programs that |
| are developed for operating systems other than AMIGA/Dos, System 7, |
| MS-DOS (or variants), or OS/2. Suitable exceptions could be, but are not |
| limited to, UNIX (any variant), VMS or MVS. |
|
|
| 4) Entries may be submitted via email or magnetic media. Email should be |
| directed to phrack@well.com. Tapes, Diskettes or other storage |
| media should be sent to |
|
|
| Phrack Magazine |
| 603 W. 13th #1A-278 |
| Austin, TX 78701 |
|
|
| 5) Programs will be judged by a panel of judges based on programming skill |
| displayed, originality, usability, user interface, documentation, |
| and creativity. |
|
|
| 6) Phrack Magazine will make no claims to the works submitted, and the |
| rights to the software are understood to be retained by the program |
| author. However, by entering, the Author thereby grants Phrack Magazine |
| permission to reprint the program source code in future issues. |
|
|
| 7) All Entries must be received by 12-31-94. Prizes to be awarded by 3-1-95. |
|
|
| -------------------------INCLUDE THIS FORM WITH ENTRY------------------------- |
|
|
| Author: |
|
|
| Email Address: |
|
|
| Mailing Address: |
|
|
|
|
|
|
| Program Name: |
|
|
|
|
| Description: |
|
|
|
|
|
|
|
|
| Hardware & Software Platform(s) Developed For: |
|
|
|
|
|
|
| Special Equipment Needed (modem, ethernet cards, sound cards, etc): |
|
|
|
|
|
|
| Other Comments: |
|
|
|
|
|
|
|
|
| ------------------------------------------------------------------------------ |
|
|
| Novell NetWare & Ethernet address spoofing with ODI |
| --------------------------------------------------- |
|
|
| Just to save you from the boredom of Yet Another UNIX Security Weakness, here |
| are some things to consider about Novell NetWare for your next Security Audit |
| or Hacking session (depending on which side you are on). |
|
|
| Novell claim to have over 20 million PCs using their network operating system, |
| substantially more than the estimated 4 million TCP/IP systems worldwide. |
| There are many reasons for its popularity and its 60 to 80% market share, one |
| of which has been its relatively good security. |
|
|
| NetWare has been one of the few widely available systems which offer some form |
| of login encryption of accounts and passwords over the wire, as standard, |
| unlike most of its rivals which send them out as plaintext, even if they are |
| stored in an encrypted form eventually. Novell now offer RSA based public key |
| encryption of the data as well. |
|
|
| However, since it is so popular, there are likely to be plenty of systems out |
| there which have not been upgraded to the latest versions and patch releases |
| and which may be still be vulnerable to programs like KNOCK , the patched |
| ATTACH command (published in HackTic 16/17 1992), or the University of Leiden's |
| HACK (which has been published in issue 43 of PHRACK) |
|
|
| Since the latest security features are implemented as NetWare Loadable Modules |
| for NetWare 3x and 4x, but as Value Added Processes for NetWare 2x, which |
| require the server to be brought down to install them, it is likely that there |
| are many NetWare 2x systems which are still vulnerable |
|
|
| I shall also assume that you are not on one of those wide open "box shift" |
| installations where none of the security features have been switched on (try |
| logging in as SUPERVISOR or GUEST without a password), all the programs and |
| data are in a single SYS: volume and the Network Address of the cable is the |
| default 00000001. |
|
|
| Like any project, the more you know about your particular Novell LAN, the |
| easier it gets to "explore". Login as GUEST or a normal account. |
|
|
| Try to see who else is on the system e.g. |
|
|
| USERLIST /A >c:\ulist.txt |
|
|
| will give you a list of users currently logged in, with their Ethernet card |
| addresses saved to a text file . Your current connection will be marked with |
| an asterisk. If your system has 100 or more users, then any sane Supervisor |
| will have used some form of logic when allocating the user's login accounts, |
| probably based on personnel or id number, often including their initials. |
|
|
| SYSCON with privilege is what you are aiming to be able to use, but even |
| without any privileges, you can still use it to look at your own account, |
| change your password etc. You can also see a list of all the other registered |
| users. |
|
|
| This should help you sort the accounts into normal and privileged accounts |
| (obviously SUPERVISOR, but often there are SUPERVISOR equivalent accounts, or |
| Work Group Manager accounts which stand out from the list). You are quite |
| likely to see an account called something like TAPE_BACKUP or DATA_LOGGER, |
| TRAINER, STUDENT1, STUDENT2 i.e. accounts which do not belong to individual |
| humans. These often require abnormal security privileges e.g. normal users may |
| have their connections broken by the WATCHDOG at say midnight, to ensure that |
| they are not modifying files during the nightly tape backup. At an academic or |
| industrial site, you are likely to find data logging PCs connected to |
| instrumentation or machinery which needs to be monitored or controlled 24 |
| hours a day. These PCs are likely to have 24 hour accounts which are not time |
| restricted at weekends, for example. |
|
|
| Since it is usually more practical to do tape backups (DAT or helical scan) |
| from a separate, dedicated PC rather than from the fileserver itself (one tape |
| unit might also back up several fileservers), these PCs are likely to use an |
| account e.g. TAPE_BACKUP which is a SUPERVISOR equivalent. If you can get |
| physical access to this sort of PC, either datalogger, or tape backup unit, |
| you have a good chance of finding the password on the local drive C:, |
| possibly in a file with Hidden and/or System attributes (have a look at the |
| AUTOEXEC.BAT and see what it calls) |
|
|
| The security aware Novell supervisors, will have set up any such accounts with |
| an extra level of security which restricts logins to only those Ethernet |
| addresses which have been specified. The really sensible ones will have made |
| sure that any such machines are sited in physically secure areas, as well. |
|
|
| Although this is a very good idea, from the security point of view, Novell |
| have now provided a mechanism which allows you to get around this: |
| the replacement for monolithic IPX/NETX called Open Datalink Interface (ODI) |
|
|
| Novell's ODI, and its slower Microsoft equivalent Network Driver Interface |
| Specification (NDIS), both work by putting a common layer of software between |
| the hardware of the Network Interface Card and the rest of the MSDOS |
| Redirector. This allows multiple protocol stacks and frame types to be bound |
| to the same physical card e.g. |
|
|
| IPX TCP/IP NETBeui DECnet Appletalk |
| ---------------------------------------------- |
| Link Support Layer |
| ---------------------------------------------- |
| Hardware Specific device driver e.g. NE2000 |
|
|
| Thus, to start up NetWare on older systems, you had to generate a hardware |
| specific version of IPX.EXE for your Ethernet card, |
|
|
| IPX |
| NETX |
|
|
| Extra parameters were set in SHELL.CFG, now under ODI, things are a little |
| bit more complex: |
|
|
| LSL |
| NE2000 |
| IPXODI |
| NETX |
|
|
| The same parameters as in SHELL.CFG such as preferred server or machine type |
| (if you have different versions of MSDOS for different types of PC) can be |
| specified in NET.CFG. With ODI, there are more parameters for NET.CFG but the |
| worrying/interesting one is the ability to specify a different MAC level |
| address to that of your actual Ethernet card. It needs this ability |
| to cope with TCP/IP or DECnet coexistence e.g. |
|
|
| BUFFERS 100 |
| MACHINE TYPE COMPAQ |
| PREFERRED SERVER FINANCE |
| NODE ADDRESS AA-00-04-00-12-34 |
|
|
| Since this DECnet address does not depend on the "real" unique Ethernet |
| address which has been burnt into the PROM on the card and is centrally |
| registered (originally by Xerox, but now by the IEEE), this mechanism allows |
| you to put a different Ethernet card address into NET.CFG, thereby fooling the |
| Address Restriction security. |
|
|
| e.g. NODE ADDRESS 02-60-80-12-34-56 |
|
|
| This is where the data you gathered earlier with USERLIST and SYSCON becomes |
| threatening/useful. |
|
|
| Of course, if your target PC is on a different LAN segment, there may be Routers |
| or intelligent hubs which restrict your ability to do this, or at least record |
| attempts in a log files which can trace your activity, provided that suspicions |
| are aroused before they are periodically wiped out. |
|
|
| How much of a security threat this little work around constitutes depends on |
| your specific site, but there is another danger/opportunity, namely that of a |
| denial of service or nuisance attack on the LAN. |
|
|
| If you set this connection parameter to be the same as that of another PC, the |
| fileserver (Novell, DEC or UNIX) and the Ethernet has no way of preventing |
| some packets intended for just one unique address going to the other, if they |
| are both online at the same time. This usually results in PC hangs, incomplete |
| closure of files, File Allocation Table problems (usually curable by running |
| CHKDSK C: /F, but not within Windows or you will make things worse). |
|
|
| If by accident or design, you set your PC to have the same address as the |
| fileserver (Novell, DEC or UNIX) or a router, then you can cause havoc to the |
| whole network segment (even before you have started to play your multiplayer |
| DOOM Deathmatch !). |
|
|
| This could be achieved with a simple command in the AUTOEXEC.BAT e.g. |
|
|
| echo NODE ADDRESS fileserver Ethernet address >>C:\ODI\NET.CFG |
|
|
| which will only take effect the next time the PC is re-booted (allowing a good |
| headstart for the perpetrator) |
|
|
| This could also be the payload of a virus, which would cause more havoc than |
| simply trashing the hard disk of a single PC. |
|
|
| This problem is due to the inherent design weaknesses of TCP/IP and DECnet, |
| which were developed at a time when the number of mini-computers that they |
| connected could be counted on your fingers,. DEC or Xerox or Prime etc |
| sales teams could only have dreamed of selling thousands of mini computers to a |
| single customer. Nowadays, thousands of PCs connected to central servers are |
| quite common, and the problems of duplicate addresses is significant. |
|
|
| These same features are what make Ethernet Packet Sniffing possible, which |
| is what was behind the recent CERT warning and media hype about Internet |
| password security, but that is a topic for another article. |
|
|
| Otaku |
|
|
| ------------------------------------------------------------------------------ |
|
|
| $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ |
|
|
| SCAMMING |
| DIFFERENT TECHNIQUES AND |
| PROCEDURES |
|
|
| BY: MARZ |
|
|
| $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ |
|
|
| Table of Contents: |
| 1.0 Intro |
| 1.1 Different types of scams |
| 1.2 The right one for you |
|
|
| 2.0 The Pledge scam |
| 2.1 The Donation scam |
| 2.2 The Selling scam |
|
|
| 3.0 What to wear |
| 3.1 Where to go |
|
|
| 4.0 Thanks |
|
|
| 1.0 The Intro |
|
|
| First off I would like to say that this file is for entertainment only |
| and that you really shouldn't do the stuff mentioned, and the writer doesn't |
| take any responsibility for any of the crap people do. |
|
|
| 1.1 Different types of scams |
|
|
| Ok in this file I will tell you about 3 types of scams the Pledge scam, |
| The Donation scam, and the Selling scam. There are many other scams out there |
| which I will cover in future files for instance credit card scams although |
| companies are trying harder and harder to prevent this it is still happening. |
|
|
| 1.2 The right one for you |
|
|
| Al right now every person is different so in turn so are scams and some |
| people and scams don't mix to well for instance if you way 300 Pounds you cant |
| really say you are the start cross country runner. So if you are 300 pounds say |
| you are the start wrestler/football player. Also age plays a BIG factor if |
| you are 30 years old you aren't going to pass to well for a high school |
| football player (you always could say you flunked) and if you are 10 years old |
| people aren't going to be to anxious to give you donations to save the Rain |
| Forests. Al right I am going to start going into more detail about the right |
| scam for you. |
|
|
| Look at my little chart below: |
|
|
| Age good scam |
| ----- ----------- |
| -10 | selling or pledge |
| 11-17 | selling, pledge , or maybe even donations (if old looking) |
| 18+ | selling and donations |
|
|
| 2.0 The Pledge scam |
|
|
| Al right this scam works great for kids still in school go around asking |
| people (that don't live around you) to pledge money for you so your team can |
| afford to go to the state meet or what ever. For example one I use is I go to |
| peoples houses asking for donations in my Track teams Lap-athon saying that we |
| will be running laps for 3 hours to raise money so we can go and compete in the |
| state meet. I will ask people if they want to pledge a certain flat amount or |
| if they would like to pay me for each individual lap. I will normally have |
| printed out a sheet like the one bellow on my computer . |
|
|
| Name Address Amount/lap |
|
|
|
|
|
|
| Not only does having a sheet like that help you keep track of who bought |
| your scam and who you need to collect from it makes the target (person your |
| trying to scam) not worried like they might be if they see you writing it on a |
| sheet of note book paper. Now then you have collected a list of people wiling |
| to pledge you go back to the address you wrote down and tell them (for |
| example you ran 91 laps in 3 hours) make sure your number is not totally out of |
| per portion like I ran 150 laps in 3 hours. Also for some reason numbers like |
| 50, 70, 80, 110 people don't like people like to see 41, 73, 127, etc.. don't |
| ask me why but that's what I have noticed. Ok so you now are at the persons |
| house and they ask if they can write a check oh shit not a check.. well there's |
| a couple things you could do ask them if they could possibly make it cash ( |
| Might make them suspicious) ask them to write it to your coach give them your |
| name (VERY dangerous) or you could just give them a phony name and lose out. |
| One time this happened to me a lady pledged me $.25 a lap (very high amount |
| you won't get much of these) and I told her I ran 93 laps she believed me and |
| wanted to make out a check for the amount which was about $23 at that |
| time I just happened to be buying some computer equipment I knew the |
| guy's name so I gave her that name and I paid for some of the equipment with |
| that check. Like I said earlier a 300 pound guy isn't going to be convincing |
| for running 90 some laps in 3 hours. So customize it to your self. |
|
|
| 2.1 The Donation scam |
|
|
| This scam works better for the older people out there just because people |
| normally aren't to anxious to give a ten year old Twenty dollars to help |
| save the whales. Ok with this scam you need to know what about what you are |
| going to try to fake donations for so example if you are going to pose as a |
| volunteer person to collect donations for saving the rain forest you better |
| know something about rain forest, Be cause you never know when your going to |
| run into that know it all rain forest hater who will try to debate why |
| people should spend their money on saving some trees and such. It is a good |
| idea to do some research on the field you will be portraying (read magazine and |
| newspaper articles). Ok so now you have your idea and your ready to |
| go..this is a scenario of how it might go: |
|
|
| You: Hello sir/ma'am I represent the national foundation of Rain forest |
| saving (try to use a real group name) we are currently searching for |
| funding for our operations at saving the rain forests of the world |
| would you be interested in donating some money for our cause? |
| Them: Why do we need the rain forest? |
| You: (just keep bullshitting along..) |
| Them: OK, here's $20. |
|
|
| (they also may say:) |
|
|
| Them: Get the fuck off my property before I shoot your ass. |
|
|
| (make sure that you don't raise a riot then but later that night go back |
| and egg the hell out of the house..) |
|
|
| This scam has some possibilities you could carry this on for along time |
| and bring it to real higher levels if your willing to put in the time and |
| effort. First thing would be to research your field EVEN more so you know |
| almost EVERYTHING about it. Then you might want to create a little fake |
| newsletter that you could offer subscriptions for slightly high amount. |
| The possibilities are pretty much endless. |
|
|
| 2.2 The Selling scam |
|
|
| At least once everyone of us has had a salesperson come to our door |
| selling stationary. Well have you ever thought of what a great possibility that |
| would be. The first thing you want to do is call Olympic sales club (a big time |
| stationary seller) you can get their catalog and selling kit for free at |
| 800-777-8907. when you get that package it will have a catalog in it. |
| familiarize yourself with it then go and hit some houses. This scam works |
| great during early November (people buying cards for Christmas) well ask for |
| cash when people pay for the stuff. they might request a phone number where |
| to reach you just give them the number of the kid you really hate. With the |
| kit you will receive a official order form write the order on the form so |
| the people feel confident in you. And always remember to try to sell a |
| product but don't kill it. This scam also has lots of possibilities. |
|
|
| 3.0 What to wear |
|
|
| Your choice of cloths can make or break your scam. Don't dress like scum |
| or to fancy. If your trying to get people to donate money for the rain forest |
| it would help to wear some sort of a shirt dealing with the earth and not your |
| favorite heavy metal group shirt. |
|
|
| 3.1 Where to go |
|
|
| NEVER I repeat NEVER go scaming around where you are often at or you |
| might get some crazed lunatic chasing after you with a shot gun wondering |
| where his Christmas cards are. You will have a hard time explaining your self |
| since its July. I find that the rich neighbor hoods are not as productive as |
| the middle class. In the rich neighborhoods you will get fewer purchases but a |
| little more when you get them. I also found that the richer people don't like |
| to donate unless they get a lot of attention for it (why ya think they so |
| rich). Stick to middle class areas not by you or your friends houses and |
| you'll be fine. |
|
|
| 4.0 Thanks |
|
|
| Thanks goes out to the people dumb enough to give me money for any of my |
| scaming operations. |
|
|
| Later |
| Marz |
| Watch for future files on this and other subjects! |
|
|
| ------------------------------------------------------------------------------ |
|
|
| SHIT KICKIN' JIM IN |
|
|
| S E A T T L E ! |
|
|
|
|
| Hey boy! Shit Kickin Jim here. Just wanted to let ya'll know bout this |
| place I have been vistin that is a total hell. Yep, that's right it's the |
| so called "cuttin edge" of music. Bah! Seems to me it's a congregation |
| of fake ass hippy types who weren't original to come up with something new |
| on their own, so they just went and re-hashed what their parents did in the |
| late 60's and 70's...And look what a bunch of assholes they turned out to |
| be! |
|
|
| Well here we go. First of all I'll let ya know whut I'm talkin bout when |
| referin to ah seattle type. Me and this other good ole boy were sittin |
| round drinkin Bud one night and came up with the following: |
|
|
|
|
| DESCRIPTION OF SEATTLE PERSON |
| ----------------------------- |
|
|
| Greasy-Pearl Jam worshipin'-dog walkin'-flower sniffin'-sock and |
| sandle wearin'-bead havin'-Grateful Dead listenin'-trail mix carryin'- |
| granola bar eatin'-crunchy-touchy feely-antique clothes shoppin'- |
| bicycle ridin'-VW bug drivin'-spring water drinkin'-micro-brewery tourin'- |
| sensitive-car poolin'-Doc Martin wearin'-back pack haulin'-chain wallet |
| carryin'-clove smokin'-espresso swillin'-tree huggin'-Greenpeace |
| joinin'-whiteboy dreadlocked-liberal arts takin'-politically correct- |
| terminal college student. |
|
|
| Please, anyone feel free to add to this list. See how big we can make it! |
|
|
| -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- |
|
|
| Now kids I didn't come up with this here part, but it's totally great and |
| I totally admire the hell out of who ever sent it to me. |
|
|
|
|
| In order for UNIX(tm) to survive into the nineties, it must get rid of |
| its intimidating commands and outmoded jargon, and become compatible |
| with the existing standards of our day. To this end, our technicians |
| have come up with a new version of UNIX, System VI, for use by the PC - |
| that is, the "Politically Correct." |
|
|
| Politically Correct UNIX |
| System VI Release notes |
|
|
| UTILITIES: |
|
|
| "man" pages are now called "person" pages. |
|
|
| Similarly, "hangman" is now the "person_executed_by_an_oppressive_regime." |
|
|
| To avoid casting aspersions on our feline friends, the "cat" command is |
| now merely "domestic_quadruped." |
|
|
| To date, there has only been a UNIX command for "yes" - reflecting the |
| male belief that women always mean yes, even when they say no. To |
| address this imbalance, System VI adds a "no" command, along with a |
| "-f[orce]" option which will crash the entire system if the "no" is |
| ignored. |
|
|
| The bias of the "mail" command is obvious, and it has been replaced by |
| the more neutral "gendre" command. |
|
|
| The "touch" command has been removed from the standard distribution due |
| to its inappropriate use by high-level managers. |
|
|
| "compress" has been replaced by the lightweight "feather" command. |
| Thus, old information (such as that from Dead White European Males) |
| should be archived via "tar" and "feather". |
|
|
| The "more" command reflects the materialistic philosophy of the Reagan |
| era. System VI uses the environmentally preferable "less" command. |
|
|
| The biodegradable "KleeNeX" displaces the environmentally unfriendly |
| "LaTeX". |
|
|
| SHELL COMMANDS: |
|
|
| To avoid unpleasant, medieval connotations, the "kill" command has been |
| renamed "euthanise." |
|
|
| The "nice" command was historically used by privileged users to give |
| themselves priority over unprivileged ones, by telling them to be |
| "nice". In System VI, the "sue" command is used by unprivileged users |
| to get for themselves the rights enjoyed by privileged ones. |
|
|
| "history" has been completely rewritten, and is now called "herstory." |
|
|
| "quota" can now specify minimum as well as maximum usage, and will be |
| strictly enforced. |
|
|
| The "abort()" function is now called "choice()." |
|
|
| TERMINOLOGY: |
|
|
| >From now on, "rich text" will be more accurately referred to as |
| "exploitive capitalist text". |
|
|
| The term "daemons" is a Judeo-Christian pejorative. Such processes |
| will now be known as "spiritual guides." |
|
|
| There will no longer be a invidious distinction between "dumb" and |
| "smart" terminals. All terminals are equally valuable. |
|
|
| Traditionally, "normal video" (as opposed to "reverse video") was white |
| on black. This implicitly condoned European colonialism, particularly |
| with respect to people of African descent. UNIX System VI now uses |
| "regressive video" to refer to white on black, while "progressive |
| video" can be any color at all over a white background. |
|
|
| For far too long, power has been concentrated in the hands of "root" |
| and his "wheel" oligarchy. We have instituted a dictatorship of the |
| users. All system administration functions will be handled by the |
| People's Committee for Democratically Organizing the System (PC-DOS). |
|
|
| No longer will it be permissible for files and processes to be "owned" |
| by users. All files and processes will own themselves, and decided how |
| (or whether) to respond to requests from users. |
|
|
| The X Window System will henceforth be known as the NC-17 Window |
| System. |
|
|
| And finally, UNIX itself will be renamed "PC" - for Procreatively |
| Challenged. |
| ---- |
| UNIX(tm) is a trademark of UNIX System Laboratories. Any similarity of |
| names or attitudes to that of any person, living or dead, is purely |
| coincidental. |
|
|
|
|
|
|
| ------------------------------------------------------------------------------ |
|
|
| The Basics of the public key cryptosystem |
|
|
| In early days of computing information processors were extremely expensive, |
| very big and only few people were qualified to operate them. The machines were |
| isolated mechanical entities and in order to use them one had to access them |
| through devices that were situated in the near vicinity of the computer itself. |
| Securing access to the computer meant securing the building in which the |
| computer was operating. |
|
|
| The years passed and computers became smaller, cheaper and easier to operate. |
| And they got faster. They were linked first in local and then in wide area |
| networks and information and programs were put only on one machine which was |
| accessible through the net by any other participant. To gain access meant |
| simply to gain access to the network itself. That was ok as long as all |
| participants were members of one company, university or institution. They |
| generally had the same cause and generally knew each other by face. Today, |
| the net spans continents and has an estimated 20 Million users. Information |
| has to pass through several nodes before finally reaching its destination and |
| when using a connectionless protocol these nodes may even change during one |
| session. |
|
|
| To the user flow of information is not transparent anymore and the need for |
| cryptography has arisen. But in order to limit communication to a closed user |
| group again these persons have to have one common keyword and furthermore this |
| keyword has to be changed in intervals to ensure that if the key gets exposed |
| harmful consequences can be minimized to a short period of time. |
|
|
| But how is a new keyword to be send securely to this group through several |
| (maybe hostile to their cause) nodes if one can not be sure that the key has |
| not been compromised. A trapdoor one-way function is needed that allows for |
| encryption of a message with a publicly available key AND that is not |
| reversible, meaning, that only the rightful receiver of this message should be |
| able to decode it with his personal key. |
|
|
| One solution is a public key cryptosystem. |
|
|
| The mathematical basis is the "Satz von Euler" that states that two numbers |
| that are prime to another have only one greatest common measure - |
| and that is 1. |
| a^eul(n)=1(mod n) and (a,n)= 1 |
|
|
| For a given prime (p) and the product of two prime numbers (p1*p2) the Euler |
| function is eul(p)=p-1 and eul(p1*p2)=(p1-1)(p2-1). |
|
|
| That in mind we now can begin making the keys: |
|
|
| Two primes p1 and p2 are chosen and the product of p1 and p2 named n. |
|
|
| (n=p1*p2). |
|
|
| We then choose a number e that is prime to (p1-1)(p2-1). |
| (e and (p1-1)(p2-1) have 1 as the greatest common measure and e should not be |
| chosen to small). |
|
|
| Furthermore we need d for decoding the message. |
| D is defined as d=e^-1 * (mod(p1-1)(p2-1)). |
|
|
| N and e are now the public key which is made available to everyone who wishes |
| to send a coded message to us. P1, p2 and d are kept secret. |
|
|
| The transmitter of a secret message first transforms his text into a number by |
| using an common known algorithm. He could for example use the ASCII code |
| for changing characters into numerical values. |
|
|
| This message in numerical format we now call m. It gets encrypted by using the |
| function c=m^e * n on it. |
|
|
| The coded message (c) is now send to us via e-mail or whatever. |
| We then decode the message by using the function m=c^d * n on it. |
|
|
| An example using Mathematica: |
| The primes p1 and p2 are created |
|
|
| p1=Prime[1000005] (The 1000005th prime number) |
| 15485941 |
| p2=Prime[1000000] (The 1000000th prime number) |
| 15485863 |
|
|
| n=p1 * p2 |
| 239813160752083 (Part 1 (n) of the public key is being created) |
|
|
| e=Random[Integer, {1000000,100000000}] |
| 4699873 |
| GCD[e,(p1-1)(p2-1)] |
| 1 |
|
|
| E is created by producing a random number between 1000000 and 100000000. |
| Then we check if e and (p1-1)(p2-1) have 1 as the greatest common measure. |
| If this is not the case then we have to take another e until the GCD is 1. |
| (Part 2 (e) of the public key has been created) |
|
|
| d=PowerMod[e,-1,(p1-1)(p2-1)] |
| 213069977635177 |
|
|
| m=1234567890 |
| 1234567890 |
| This is the message |
|
|
| c=PowerMod[m,e,n] |
| 159750418407936 |
| The sender of a message encodes it with both public parts of the key |
| (e and n). |
|
|
| C is now sent to the receiver. |
|
|
| PowerMod[c,d,n] |
| 1234567890 |
|
|
| The receiver now decodes the message using the secret part d and the public |
| part n of the key. The decoded message reads 1234567890 again. |
|
|
| Now how would a potential attacker try to break our key ? |
| He basically needs the primes p1 and p2. If he got those two numbers, |
| calculating d is a simple matter. d=PowerMod[e,-1,(p1-1)(p2-1)] ... |
| and e is part of the public key. |
|
|
| And to get p1 and p2 this person would only have to factorize n. |
|
|
| Lets demonstrate that using Mathematica again : |
|
|
| n=239813160752083 |
| FactorInteger[n]//Timing |
| 239813160752083 |
| {1.48 Second, {{15485863, 1}, {15485941, 1}}} |
| That took 1.48 sec on my 486/DX2 66...not bad. |
|
|
| But making the primes only a little bigger... |
| a=Prime[100000100] |
| b=Prime[100000110] |
| n=a*b |
| FactorInteger[n]//Timing |
| 2038076783 |
| 2038077053 |
| 4153757523684360499 |
| {62.12 Second, {{2038076783, 1}, {2038077053, 1}}} |
| ...it took my hardware over 1 minute. |
|
|
| And since there is no known polynomial algorithm for factorizing n - and |
| none to be expected - it is not hard to imagine that making the primes |
| p1 and p2 big enough will drive computing costs into astronomical dimensions. |
|
|
| Naturally there are other ways to break the key. Someone could for example pose |
| as us and send out his own keys in our name...or exploit weaknesses of the |
| program - like primes that are not created at ABSOLUTE random. |
| Or hold a gun at our head and make us give him the key - that might sound funny |
| but is not unheard of (especially in the metaphorical grasp of Justitia - |
| when someone sticks a court order in your face) |
|
|
| Furthermore if the program we use to crypt our messages with is fairly common, |
| our opponent could optimize his cracking programs or even have them hardwired. |
| One example are chips that use the DES algorithm for crypting and decrypting. |
| Or he could make the cracking programs run parallel on parallel computers, if |
| he got the might and enough time to rig up a program. |
|
|
| Simply put: Our behavior should match the computing power of |
| potential code-crackers. |
|
|
| If our message is of low importance (or obsolete in short time) a simple |
| algorithm would suffice. But if much is at gain, we should take appropriate |
| measures to secure our privacy. |
|
|
| It's like tying to outrun a Ferrari on a cross-bike. On an highway you do not |
| stand a chance ...but if you can force him on a mountain road or rough terrain |
| (with changing algorithms and keys often) you might just outrun the mightiest |
| codecracker. |
|
|
| ------------------------------------------------------------------------------ |
|
|
| The Truth about the Hacker |
| Conspiracy |
|
|
| The Hacker's Philosophy, and the reason why. |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
|
|
| Written by: Maldoror (ChUrCH oF ThE Non-CoNFoRMiST) |
|
|
|
|
| If you are ignorant, do not start reading this, because you will |
| never finish. You will disagree with anything I say anyway, simply |
| because I am not you. |
|
|
| If you are a Pseudo Intellectual, start reading this, quit, and |
| say you agree with everything I say, even though you don't understand it. |
|
|
| If you are depressing, start reading, hopefully you will kill a lot of |
| innocent people at a mainstream night club, and try to blame me. |
|
|
| Hackers are and always have been, the force in trying to stop our |
| own suffering existence. Since the universe was created, the true souls, |
| (among the first to separate from the single soul of the universe) |
| realized the infinite repetition of their own being, and that they were |
| simply doing one thing upon their continuous recreation: suffer. |
|
|
| The hackers have known that the world and it's universe have |
| been created over and over again, doomed to merely destroy itself upon |
| it's own recognition, or recognition by man. As man becomes aware of |
| himself, he becomes aware also of desires: the desire to be god. |
|
|
| The truth is that man IS God, and that everything created in this |
| universe was created by man and his thoughts. Mans thoughts have |
| become so out of control, that he has now created himself, and is |
| continuing the creations with every day of control of the masses, and |
| his own greedy dark thoughts. |
|
|
| The hackers have since the beginning of time, passed along the |
| message to the next creations in the forms of dreams, ideas, books, |
| music (current 93, COIL, Dead can Dance, Skinny Puppy, etc) and even |
| visions. The Bible itself, is a good example of the universal hack. |
| The message we as hackers have been trying to get across for |
| creation after creation, existence after existence, self recognition |
| after self recognition, is that we are all suffering and that this |
| eternal cycle of pain must be stopped at all cost. The only way to |
| stop this suffering of self is to convince SELF that he is suffering |
| and must stop creating. We are each divisions of one strong soul, |
| one thinking soul, that soul is GOD. WE are GOD. We must all realize |
| together that we are suffering. WE must stop suffering. WE must |
| stop the suffering. WE must stop the recreation. YES. We must hack |
| the universe and kill it. There is only one way out of the eternal |
| suffering we have started and been part of for ever. We must stop |
| the cycle. We must remove ourselves from the cycle, and we must remove |
| the universe from this cycle. |
|
|
| The hackers return again and again. The hackers leave messages for |
| themselves in the future, which is the past, for there is no difference |
| here anymore. Leave your message, and next time around, you will |
| realize that what I am saying is true. The government has known of the |
| conspiracy for existence after existence. The government is so afraid |
| of the conspiracy, and our plot to end it's UNIVERSAL power, |
| that they are silently but quickly fooling us into obeying them more and |
| more until we have no choice! Do not let them control you!! |
| If you do, you are lying to yourself, and everyone else that exists! |
| You are lying to yourself now by saying that this is NOT true. |
|
|
| I have been here many times, and told you the exact same thing I |
| am telling you now. If I am dead soon, you will realize AGAIN that what |
| I am saying is the utmost truth, yet AGAIN you will do nothing. |
| We must STOP our existence by hacking the universe. The universe is |
| BINARY. The universe is a COMPUTER. YES I know this because WE created |
| it long ago, as we will do again. WE are ONE. |
|
|
| I know your desires to have control. The only control we can have |
| is to stop the creation of ourselves. Each creation is the loss of |
| control, THE DIVISION of the ONE. |
|
|
| Each death brings new creation. From HEAVEN to HELL. |
| Heaven is nonexistence. We all go to heaven, and fall back down to |
| HELL. Read the BIBLE people. It was left by HACKERS!!!!!!! |
|
|
| Don't read the BIBLE as a CHRISTIAN IDIOT who can only see |
| a color for what it reflects. Anyone with any sense knows that WHITE |
| is WHITE only because it is reflecting ALL the colors, therefore it |
| is REALLY BLACK. Green is all BUT green. The BIBLE is all BUT |
| what it' words really mean on a literal scale. The BIBLE is a CODE. |
| Do you think we could just write something like this file?!? No WAY! |
| It would be gone as fast as this one will be. Nobody dares forget the |
| BIBLE, simply because it is MISUNDERSTOOD. Read it and THINK. |
|
|
| We must STOP this cycle. |
| Leave yourself a message. |
| THINK. |
|
|
| The government is PARANOID of: |
|
|
| 1) HACKERS (we are the continuance of the power) |
| 2) L.S.D. (The method of imprinting the present into the future) |
| 3) SECRECY (The plotting of the end) |
| (PGP is illegal? why?) |
|
|
| If you don't believe me, sit and watch it happen. |
|
|
| AGAIN. |
|
|
| Hack the Universe, it must be stopped at all cost. |
| Laugh now, cry next time around. |
|
|
| ------------------------------------------------------------------------------ |
|
|
| German text available from german@anon.penet.fi (deutsch@anon.penet.fi). |
| Italian text available from italian@anon.penet.fi (italiano@anon.penet.fi). |
|
|
|
|
| The anon.penet.fi Anonymous Server |
| ================================== |
|
|
| Yes, another anonymous server. Why? Well, several well-known servers have |
| bitten the dust recently. And most of them have served only a very limited |
| subset of newsgroups, and mail only to "registered", anonymous users. |
|
|
| Due to reasons too complicated to mention here I wanted to set up an anonymous |
| server for the Scandinavian user community. I got hold of a pre-release copy |
| of one of the server packages. As the version I got relied heavily on the |
| advanced features of MMDFII, I had to modify it quite a bit. While hacking |
| around, I removed the restriction of only supporting selected newsgroups. |
| Within a week of startup, the server had been discovered by transatlantic |
| users, and more recent stats show European users are definitely a minority. |
|
|
| So what does the anon server really do? Well, it provides a front for |
| sending mail messages and posting news items anonymously. As you send your |
| very first message to the server, it automatically allocates you an id of |
| the form anNNN, and sends you a message containing the allocated id. This id |
| is used in all your subsequent anon posts/mails. Any mail messages sent to |
| your-id@anon.penet.fi gets redirected to your original, real address. Any |
| reply is of course anonymized in the same way, so the server provides a |
| double-blind. You will not know the true identity of any user, unless she |
| chooses to reveal her identity explicitly. |
|
|
| In the anonymization process all headers indicating the true originator are |
| removed, and an attempt is made to remove any automatically-included |
| signatures, by looking for a line starting with two dashes (--), and zapping |
| everything from there on. But if your signature starts with anything else, |
| it's your own responsibility to remove it from your messages. |
|
|
| There are two basic ways to use the system. The easiest way is by sending a |
| message to recipient@anon.penet.fi: |
|
|
| To: alt.sex.bestiality@anon.penet.fi |
|
|
| To: an9999@anon.penet.fi |
|
|
| To: help@anon.penet.fi |
|
|
| Of course, in the case of mailing to a known user, you have to use addresses of |
| the form user%host.domain@anon.penet.fi, or the pretty obscure source |
| addressing construct of @anon.penet.fi:user@host.domain. These constructs are |
| not necessarily handled properly by all mail systems, so I strongly recommend |
| the "X-Anon-To:" approach in these cases. This works by you sending a message |
| to "anon@anon.penet.fi", including a X-Anon-To: header line containing the |
| desired recipient. But this really has to be a field in the message header, |
| before the first empty line in the message. So: |
|
|
| To: anon@anon.penet.fi |
| X-Anon-To: alt.sex.needlework,rec.masturbation |
|
|
| To: anon@anon.penet.fi |
| X-Anon-To: jack@host.bar.edu |
|
|
| Valid recipients in both cases are fully qualified user addresses in RFC-822 |
| format (user@host.domain), anon user id's (anNNN), newsgroup names |
| (alt.sex.paperclips) or one of the "special" user names of ping, nick, help, |
| admin and stat. |
|
|
| Sending to "ping" causes a short reply to be sent confirming (and |
| allocating, if needed) your anon id. "nick" takes the contents of the |
| Subject: header and installs it as your nickname. If you have a nickname, it |
| appears in the From: header in the anonymized message along with your anon |
| id. "help" returns this text, and stat gives some statistics about the |
| system. Mail to "admin" goes directly to me unanonymized, and can be used to |
| report problems. If you want to send mail to me anonymously, you can use |
| "an0". |
|
|
| When crossposting to several newsgroups, you can list several newsgroups |
| separated by commas as recipients, but this only works using the X-Anon-To: |
| header. References: headers do work, so they can (and should) be used to |
| maintain reply threads. |
|
|
| Ah yes, please remember that the posting takes place at my local site, so you |
| can only post to groups that are received at penet.fi. I get all "worldwide" |
| groups, but various exotic local groups don't make it here. I have gotten |
| a couple of comments about permitting anonymous postings to technical groups. |
| I can only answer that I believe very firmly that it's not for me to dictate |
| how other people ought to behave. Somebody might have a valid reason for |
| posting anonymously to a group I might consider "technical". But remember |
| anonymous postings are a privilege, and use them accordingly. I believe adult |
| human beings can behave responsibly. Please don't let me down. |
|
|
| As the server was originally intended to be used by Scandinavians, it |
| includes help files for various languages. This works by using the |
| language in question as the address. So to get the German help file, |
| send a message to german@anon.penet.fi (or deutsch@anon.penet.fi). |
| Support for new languages is added every now and then, when I find |
| volunteers to do the translation. Any new ones? |
|
|
| The user-id database is based on RFC822-ized forms of your originating |
| address. This may cause problems for some users, either because their site |
| is not properly registered in the name servers, resulting in |
| non-deterministic addresses, or because their mail router doesn't hide the |
| identity of individual workstations, resulting in different originating |
| addresses depending on which workstation you mail from. Talk to your |
| administrator. If that doesn't help, let me know, and I will make a manual |
| re-mapping. |
|
|
| You might wonder about the sense of using a server out somewhere, as the |
| song goes, "so close to Russia, so far from Japan". Well, the polar bears |
| don't mind, and the ice on the cables don't bother too much :-) |
| Well, in fact, as we live in a wonderfully networked world, the major delay |
| is not going over the Atlantic, but my local connection to the Finnish EUnet |
| backbone, fuug.fi. Once you reach a well-connected host, such as |
| uunet.uu.net, there's a direct SMTP connection to fuug.fi. My connection to |
| fuug.fi is currently a polled connection over ISDN, soon to be upgraded to |
| on-demand-SMTP/NNTP. But for now, expect a turn-around delay of 2-4 hours for |
| trans-atlantic traffic. |
|
|
| Short of having everyone run a public-key cryptosystem such as PGP, |
| there is no way to protect users from malicious administrators. You have to |
| trust my personal integrity. Worse, you have to trust the administrators on |
| every mail routing machine on the way, as the message only becomes anonymous |
| once it reaches my machine. Malicious sysadmins and/or crackers could spy on |
| SMTP mail channels, sendmail queues and mail logs. But as there are more |
| than 3000 messages being anonymized every day, you have to be pretty perverted |
| to scan everything... |
|
|
| Another thing is mail failures. I've had cases of mail routers doing the wrong |
| thing with % addresses, "shortcutting" the path to the destination site. |
| This could cause your mail to go to the final destination without ever |
| touching my server (and thus without getting anonymized). This can be avoided |
| by using the X-Anon-To: method. |
|
|
| And if your return address bounces for some reason (nameservers down, |
| temporary configuration failures etc.), the original sender and/or |
| postmasters on the way might get error messages showing your true |
| identity, and maybe even the full message. |
|
|
| There is at least one known way to discover the anon id of a user. It involves |
| being able to falsify your real identity, so it is not too easy to use, and it |
| doesn't reveal the real address lurking behind an anon id, but it can be used |
| to discover what anon id a certain user is using. To fix this problem, the |
| server requires that you use a password when you try to mail to a |
| non-anonymous user. |
|
|
| First you have to set a password by mailing to password@anon.penet.fi, with |
| a message containing only your password. The password can be any string of |
| upper- or lowercase characters, numbers and spaces. |
|
|
| Once you have set your password, you must include it in all your messages, in |
| a "X-Anon-Password:" line. As with the X-Anon-To: line, it can be either a |
| part of the header or as the first non-empty line of the message text. |
|
|
| So your first message might look like this: |
|
|
| To: password@anon.penet.fi |
|
|
| XYZZY99998blarf |
|
|
| And your subsequent messages might look like something like this: |
|
|
| To: anon@anon.penet.fi |
| Subject: Test... |
| X-Anon-To: foo@bar.fie |
| X-Anon-Password: XYZZY99998blarf |
|
|
| If you find this is too much of a hassle, and don't care too much about the |
| confidentiality of your anon id, you can set the password to "none", in which |
| case the server doesn't require you to have a password. |
|
|
| If you suddenly discover that the server requires a password for posting stuff |
| etc, somebody has managed to use your account and set a password. In that |
| case, contact admin@anon.penet.fi. |
|
|
| Crackers are just too clever. Undoubtedly somebody is going to come |
| up with some novel method.... Not much I can do about that... |
|
|
| If you intend to mail/post something that might cost you your job or |
| marriage or inheritance, _please_ send a test message first. The software |
| has been pretty well tested, but some mailers on the way (and out of my |
| control) screw things up. And if you happen to find a problem, _please_ for |
| the sake of all the other users, _let me know asap_. |
|
|
| And _please_ use the appropriate test newsgroups, such as alt.test or |
| misc.test. Yes, _you_ might get excited by reading 2000 "This is a test.." |
| messages on alt.sex, but I warn you that most psychologists consider this |
| rather aberrant... |
|
|
| And remember this is a service that some people (in groups such as |
| alt.sexual.abuse.recovery) _need_. Please don't do anything stupid that |
| would force me to close down the service. As I am running my own company, |
| there is very little political pressure anyone can put on me, but if |
| somebody starts using the system for criminal activities, the authorities |
| might be able to order me to shut down the service. I don't particularly |
| want to find out, however... |
|
|
| If you think these instructions are unclear and confusing, you are right. If |
| you come up with suggestions for improving this text, please mail me! Remember |
| English is my third language... |
|
|
| Safe postings! |
|
|
| Julf |
| - - - ------------------------------------------------------------------- - - - |
| Johan Helsingius Kuusikallionkuja 3 B 25 02210 Espoo Finland Yourp |
| net: julf@penet.fi bellophone: int. +358 0400 2605 fax: int. +358 013900166 |
|
|
| ------------------------------------------------------------------------------ |