| ==Phrack Magazine== |
|
|
| Volume Five, Issue Forty-Six, File 2 of 28 |
|
|
| **************************************************************************** |
|
|
| Phrack Loopback |
|
|
|
|
| ------------------------------------------------------------------------------ |
|
|
| I'd like to write you about my friends cat. His name is 'Cid. Cid |
| loves reading, in fact he'll read just about anything, from the labels on |
| his cat food tins to the instructions on the "real" use of his Grafix |
| (incense burner :) ). Well one take, 'Cid (or was it me) was indulging |
| in the reason he got his moniker and mentioned that he'd like to receive |
| Phrack. Well i told him he could just subscribe to it and then he went |
| into a real sob story about how he doesn't have net access. So as a |
| favor to 'Cid (who really does exist, and really has tripped out on brain |
| blotters) i'd like to subscribe to Phrack. |
|
|
| [You my want to take note that Phrack can also be printed on paper. |
| Now, that's a lot of blotter. |
|
|
| You've got your subscription, now go watch some anime.] |
|
|
| ------------------------------------------------------------------------------ |
|
|
| I recently got a new job and shortly after beginning working there, they |
| decided to retool and reorganize a bit for better productivity. |
|
|
| While we were going through some old boxes and stuff, I came across a |
| little black box with the words "Demon Dialer" molded into the front of |
| it, it even had the (functional!) 20volt power supply. |
|
|
| Needless to say I was pretty happy with my find. I asked if I could have |
| it and since no one else there seemed to know what to make of it, mine it |
| was! |
|
|
| My only problem now... I've played around with it, and it seems to do a |
| lot more than what I originally thought, but the fact of the matter is.. |
| I really haven't the foggiest idea of how to get it to REALLY work for me. |
|
|
| If anyone has any information, or better still, actual documentation for |
| a Telephonics Inc, Demon Dialer.. I'd really appreciate passing it on to me. |
|
|
| Also, something rater strange. The phone cable attached to it had a |
| normal looking 4-wire connector on one end, but the other was split to |
| have RJ jacks, one with the yellow-black combo and one with the |
| red-green. The split ends (sorry :)) were plugged into the WALL and |
| PHONE jacks on the demon dialer. The purpose for this perplexes me since |
| one's supposed to be input and one's supposed to be a passthrough for the |
| phone to be plugged into. |
|
|
| Anyway, any info would be nice. Thanks guys. |
|
|
| [Telephonics was one of those odd telco device manufacturers back in the |
| 80's. They made the demon dialer (a speed dialing device), a |
| two-line conference box, a divertor, etc. Essentially, they provided |
| in hardware what the telco's were beginning to roll-out in software. |
|
|
| I think the line splitter you have was merely plugged into those |
| two jacks for storage purposes. What that probably was for was to |
| allow two lines to use the Demon Dialer. It was probably just reversed |
| when your company boxed it so it wouldn't get lost. |
|
|
| I'm not sure if Telephonics is still in business. A good place to |
| start looking for info would be comp.dcom.telecom or alt.dcom.telecom. |
| Another good place may be Hello Direct (800-HI-HELLO). They used to |
| do have Telephonics equipment available for mail-order.] |
|
|
| ------------------------------------------------------------------------------ |
|
|
| I saw an ad for a book called "Secrets of a SuperHacker" by Knightmare. |
| Supposedly it intersperses tales of his exploits with code and examples. |
| I have big doubts, but have you heard anything good/bad about it? |
|
|
| [Your doubts are well founded. I got an advance copy of that book. |
| Let's put it this way: does any book that contains over a dozen pages |
| of "common passwords" sound like ground breaking material? |
|
|
| This book is so like "Out of the Inner Circle" that I almost wanted |
| to believe Knightmare (Dennis Fiery) was really yet another |
| alias for Bill Landreth. Imagine "Out of the Inner Circle" with |
| about a hundred or more extra pages of adjectives and examples that |
| may have been useful years back. |
|
|
| The Knightmare I knew, Tom in 602, whose bust by Gail Thackeray |
| gave law enforcement a big buffer of the Black Ice Private BBS |
| and help spark the infamous LOD Hacker Crackdown, certainly didn't |
| have anything to do with this. In fact, the book has a kind of |
| snide tone to it and is so clueless, that leads me to believe it |
| may have been written by a cop or security type person looking to |
| make a quick buck. |
|
|
| As far as source code, well, there is a sample basic program that |
| tries to emulate a university login. |
|
|
| If you want a good book, go buy "Firewalls and Internet Security" by |
| Cheswick and Bellovin.] |
|
|
| ------------------------------------------------------------------------------ |
|
|
| Hey Chris, |
|
|
| I'm sure you are under a constant avalanche of requests for certain files, |
| so I might as well add to your frustration <grin>. I know of a program |
| that supposedly tracks cellular phone frequencies and displays them on |
| a cellmap. However, I don't know the name of the program or (obviously) |
| where to find this little gem. I was wondering if you could possibly |
| enlighten me on a way to acquire a program similar to the one I have |
| described. I have developed some other methods of tracking locations |
| of cellular calls. However my methods rely on a database and manually |
| mapping cellular phones, this method is strictly low tech. Of course |
| this would be for experimental use only, therefore it would not be used |
| to actually track actual, restricted, radio spectrum signals. I wouldn't |
| want the aether Gestapo pummeling our heads and necks. |
|
|
| [I don't know of anything that plots frequencies on a cellmap. How would |
| you know the actual locations of cells for whatever city you may |
| be in to plot them accurately? |
|
|
| There are a number of programs written to listen to forward channel messages |
| and tell you when a call is going to jump to another channel. The cellular |
| telephone experimenter's kit from Network Wizards has a lot of nice |
| C source that will let you write your own programs that work with their |
| interface to the OKI 900. I suppose you could get the FCC database |
| CD-ROM for your state and make note of longitude and latitude of cell sites |
| and make your own database for your city, and then make a truly |
| visual representation of a cellmap and watch calls move from cell to cell. |
| But I don't think there is such a thing floating around the underground |
| at present. |
|
|
| Of course the carriers have this ability, and are more than happy to make |
| it available to Law Enforcement (without a warrant mind you). Hi OJ! |
|
|
| email Mark Lottor mw@nw.com for more info about the CTEK.] |
|
|
| ------------------------------------------------------------------------------ |
|
|
| I saw this in a HoHoCon ad: |
|
|
| Top Ten Nark List |
| 1. Traxxter |
| 2. Scott Chasin |
| 3. Chris Goggans |
| 4. Aget Steal |
| 5. Dale Drrew |
| 6. Cliff Stoll |
| 7. [blank] |
| 8. Julio Fernandez |
| 9. Scanman |
| 10. Cori Braun |
|
|
| What did Chris Goggans do? Isn't he Erik Bloodaxe, the publisher of |
| Phrack? I sincerely doubt that the feds would have someone |
| working for them that puts out a publication like Phrack. It would |
| be way too much of an embarrassment for them. I wrote to the |
| editor of Phrack when I read that Agent Steal said that the publisher |
| of Phrack was a Fed - IN PHRACK no less. He said it was a stupid rumor. |
| Is there anything to support this fact? And why is there now some manhunt for |
| Agent Steal (at CFP the FBI was checking legs) if Steal was admittedly |
| their employee? The whole thing is very confusing to me. Please explain. |
| If Goggans isn't Bloodaxe then he'd Knight Lightning (this just came to me). |
| Nevertheless, what's the story here? |
|
|
| [First off, I think you take things a little too seriously. If you are on |
| a nark hunt, worry about your associates, not people you obviously |
| don't even know. Chris Goggans (ME) is most positively Erik Bloodaxe. |
| Thanks for remembering. |
|
|
| Agent Steal was involved with the FBI. This is a fact. |
| In his case, he even appeared to have some kind of immunity while trying |
| to gather information on other hackers like Mitnik and Poulsen. This |
| immunity is under scrutiny by the Bureau's own Internal Affairs (or so the |
| new rumors go), since Steal was pulling a fast one and committing crimes |
| the Bureau didn't know about to get some quick cash while he set up his |
| friends. |
|
|
| My story is a bit more convoluted. You can sum it up by saying, if you |
| interfere with my businesses, I'll try my best to track you down and turn |
| you in. I guess I am a nark.] |
|
|
| ------------------------------------------------------------------------------ |
|
|
| I read in the last Phrack (45) that you wanted someone to write a few |
| words on scrambling systems. Give me a rough outline of what you want |
| and I'll see if I can help :-) Basically I wrote the Black Book |
| (European Scrambling Systems 1,2,3,4,5 and World Satellite TV & |
| Scrambling Methods) and also edit Hack Watch News & Syndicated |
| HackWatch. They all deal with scrambling system hacks as opposed to |
| computer hacking & phreaking. (Things are a bit iffy here as regards |
| phreaking as all calls are logged but the eprom phone cards are easy |
| to hack) Oh yeah and another claim to fame ;-) if you can call it |
| that, is that I was quoted in an article on satellite piracy in |
| "Wired" August issue. |
|
|
| This Hawkwind character that you had an article from in Phrack43 |
| sounds like a *real* hacker indeed :-> Actually there is an elite in |
| Ireland but it is mainly concerned with satellite hacking and that |
| Hawkwind character is obviously just a JAFA (Irish hacker expression |
| - Just Another Fu**ing Amateur). Most of the advanced telco stuff is |
| tested in the south of the country as Dublin is not really that |
| important in terms of comms - most of the Atlantic path satellite |
| comms gear and brains are on the south coast :-) |
|
|
| Actually the Hawkwind article really pissed off some people here in |
| Ireland - there were a few questions asked on my own bbs (Special |
| Projects +353-51-50143) about this character. I am not even sure if |
| the character is a real hacker or just a wannabe - there were no |
| responses from any of his addresses. SP is sort of like the neutral |
| territory for satellite and cable hacking information in Europe |
| though there are a few US callers. With the way things are going with |
| your new DBS DirecTv system in the US, it looks like the European |
| satellite hackers are going to be supplying a lot of information |
| (DirecTv's security overlay was developed by News Datacom - the |
| developers of the totally hacked VideoCrypt system here in Europe). |
|
|
| There telco here uses eprom phone cards. These are extremely easy to |
| hack (well most real hackers in .IE work on breaking satellite |
| scrambling systems that use smart cards) as they are only serial |
| eprom. |
|
|
| Regards |
|
|
| [About the satellite information: YES! Write the biggest, best |
| article the whole fucking hacker world has ever seen about |
| every aspect of satellite tv!! Personally, I'm more interested in |
| that than anything else anyone could possibly write (seeing as how |
| I'm about to buy a dish for both C and Ku). |
|
|
| About Hawkwind's article on hacking in Ireland: If I were to write |
| an article about hacking in America, it would be entirely different |
| than anyone else in America would write. A country is a big place. |
| Just because someone else's hacking experience is different than |
| your own, it's no reason to discredit them. However, if your |
| exposure to the scene in Ireland is so completely different than |
| Hawkwind's, I would LOVE to print it as well.] |
|
|
| ------------------------------------------------------------------------------ |
|
|
| The Columbus Freenet uses a password generating routine that takes the |
| first and last initial of the user's real name, and inserts it into a randomly |
| chosen template. Some of the templates are: |
|
|
| E(f)www5(l) |
| (f)22ww5(l) where f and l are first and last initials |
| (f)2ww97(l) |
| (f)2ww95(l) |
|
|
| and so on. There are not too many of these templates, I guess maybe 50. |
| I imagine most people go in and change their password right away, but |
| then again that's what a prudent person would do (so they probably don't). |
|
|
| Columbus 2600 meetings: |
|
|
| Fungal Mutoid-sysop of The KrackBaby BBS (614-326-3933) organized the |
| first 2600 meetings in Columbus, unfortunately hardly anyone shows up... |
| I don't know why HP is so dead in Central Ohio, but fear and paranoia |
| run rampant. |
| That's all for now...keep up with the good work! |
|
|
| R.U.Serius?! |
|
|
| [Hmmm...templates are always a bad thing. All one has to do is get the |
| program that generates them, and viola, you've got a pre-made dict file |
| for your crack program. Not very smart on the part of the Freenet, |
| but hacking a Freenet, is like kicking a puppy. |
|
|
| I hope more people go to your 2600 meetings. The ones here in Austin |
| kinda died out too. Maybe our cities are just lame.] |
|
|
| ------------------------------------------------------------------------------ |
|
|
| A complaint: That piece about McDonald's in Phrack 45 was, in a word, LAME. |
| Surely Phrack can do better. Maliciousness for its own sake isn't very |
| interesting and frankly the article didn't have any ideas that a bored |
| 13-year-old couldn't have thought up--probably written by one. |
|
|
| That aside, I found some good stuff in there. Some of it was old news, |
| but Phrack serves an archival purpose too, so that was ok. On a more |
| personal note, I could really relate to your account of HoHoCon--not that |
| I was there, just that I have started to feel old lately even though I don't |
| turn 25 for another 2 days :) Sometimes I feel myself saying things like |
| "Why, sonny, when I was your age the Apple II was king..." |
|
|
| Keep up the good work, and don't let the lamers get you down. |
|
|
| [Thanks for the letter. I personally thought the McDonald's file was |
| a laugh riot. Even if it was juvenile and moronic, I wouldn't expect |
| anyone to analyze it and go through with anything it contained. It was |
| just for fun. Lighten up :) |
|
|
| I am glad to see that at least someone else recognizes that Phrack |
| is attempting to serve as an archive of our subculture, rather than just |
| a collection of technical info that will be outdated overnight, or a |
| buglist that will be rendered mostly unusable within hours of release. |
|
|
| There is so much going on within the community, and it is becoming such a |
| spectacle in the popular media, that in 20 years, we can all go back and |
| look at Phrack and remember the people, places, and meetings that |
| changed the face of the net. |
|
|
| Or maybe I'm just terribly lame, and either 1) refuse to put in the |
| good stuff, 2) don't have access to the good stuff, 3) exist only as a |
| puppet agent of The Man, or 4) Don't know nothin' 'bout Telco! |
| But you know what they say about opinions.] |
|
|
| ---------------------------------------------------------------------------- |
|
|
| I have a few comments on your editorial in Phrack 44 (on information |
| wants to be free). Thanks for voicing an opinion that is shared by many |
| of us. I am glad to see a public figure in the CuG with nutz enuff to |
| actually come out and make such a statement and mean it. |
| Again, thanks. |
|
|
| Now on the subject of hacking as a whole. Is it just me, or are the number |
| of losers on the increase? There have always been those who would try |
| and apply these skills to ripoff scams and system trashing but now that |
| seems to be the sole intent of many of the "hackers" I come into contact |
| with. What ever happened to hacking to learn more about the system. To |
| really hack a system (be it phone, computer), is a test of skill and |
| determination, and upon success you walk away with a greater understanding |
| of the machine and its software. Hacking is more than just knowing how |
| to run crack on a filched password file, or using some exploitation |
| scripts picked up on IRC, it is a quest for knowledge and gaining |
| superiority over a system by use of great skill acquired by a deliberate |
| effort. Once was a time when things like toll fraud (I do miss blue |
| boxes) were a means to an end, now they seem to be the end in itself. |
|
|
| Also, I am researching info on OSI comsec procedures and have found some |
| really interesting goodies, if you are interested in publishing |
| my piece when completed, let me know.. |
|
|
| [(NOTE: This came from a .mil) |
| Man, I'm glad to see that people in the armed forces still have minds |
| of their own. Not many people would express such a thing openly. |
|
|
| Yes, the destructive/profit-motivated trends of many of the hackers of |
| today are pretty sad. But you have to realize, as the technology |
| becomes more and more like consumer electronics, rather than the |
| traditional mold of computer as scientific research tool, an entirely |
| different market segment will be exposed to it and use the technology |
| for less than scrupulous means. |
|
|
| Even the act of hacking itself. Today, I can basically gain access |
| to any model of system known to man by asking. I realize that |
| there are many who cannot accomplish such a thing, but with the |
| proliferation of public access sites, almost everyone can afford |
| access to the net to explore and learn. The point comes down to this: |
| if you have an account on a Sun, why do you need an account on a Sun |
| at Boeing, unless you either 1) want to sell the cad files of the 777 to |
| Airbus or McDonnell-Douglas 2) want to get financial information to |
| make a killing on Wall Street, or 3) just want to have an ego boost |
| and say "I OWN BOEING!" |
|
|
| Personally, I can understand the ego boost aspect, but I've decided that |
| I'd much rather get paid by a company like Boeing to hack for them |
| than against them. I don't want to sell anyone's info, so hacking |
| into any company is basically useless to me, unless they are paying me |
| to look for potential weaknesses. |
|
|
| Granted, it's not an easy market to get into, but it's a goal to |
| shoot for. |
|
|
| And for those who find it impossible to quit due to fear of losing |
| their edge, check out my editorial in this issue for a possible |
| solution.] |
|
|
| ------------------------------------------------------------------------------ |
|
|
| I am looking for a Macintosh app that does the same thing as an app |
| called "Demon Dial" that has been lost in the annals of software |
| history due to the fact that some people (sysops) question whether it |
| is illegal software (it dials up a series of phone #'s looking for data |
| connections). Do you know where I could find an application for the Mac |
| that does this simple function? |
|
|
| [We had a guy ask in an earlier issue for Macintosh hacking/phreaking |
| apps. Noone responded. Hell, I know SOMEONE has to use a Mac |
| out there. Are you Mac-weenies all embarrassed to speak up? |
|
|
| Hell, uuencode and email me your aps, and I'll put them up for |
| ftp! Help out your poor fellow Macintosh users. I certainly |
| would if I could, but the thought of touching a Mac gives me the |
| chills.] |
|
|
| ------------------------------------------------------------------------------ |
|
|
| Have you ever heard of being denied access to your own cell phone? |
| I am currently in the process of buying a cell phone and was informed |
| that I COULD NOT have the programming guide of the security code |
| they enter to program my phone. In my opinion the key word is "MY." |
| If I get a digital security system for my house you better damn well |
| figure I will have the security codes for that. The phone was a Motorola |
| flip phone. I called Motorola and explained how displeased I was with |
| this company and they said they could not interfere with a reps. policy. |
| When I was selling car phone we kept the programming guide unless they |
| asked for it. I demanded it and they laughed in my face. Who said |
| "the customer is always right" anyway? |
|
|
| Thanks, any info is greatly appreciated. By the way, you wouldn't |
| happen to have the CN/A number for 815 would you? Also, any ANAC |
| would be very helpful. |
|
|
| [Well, I hate to say it, but you got typical service from your |
| cellular agent. Let's face it, these sales reps probably knew |
| about as much about that programming manual as I do nuclear |
| physics: "Its confusing, but if you understand it, you can fuck |
| things up." |
|
|
| I am surprised that Motorola wouldn't sell you the book though. |
| Motorola will sell anybody anything. You probably called the wrong |
| place. Moto is so huge they've got multiple groups working on somewhat |
| similar technologies with absolutely no communication between the groups. |
| Sometimes they are in different countries, but sometimes they are in the |
| same city! I would suggest you call a local FAE (Field Applications |
| Engineer) |
| and get them to get the book for you. Make up some story about |
| working on some computer controlled application with the phone, and that |
| you need any and all documentation on the phone. They'll do it. Money |
| is money. |
|
|
| As far as the 815 CNA, hell, just call the business office. I haven't |
| called a CNA in years, only the business office. They are nice people. |
| And no PINs. |
|
|
| 815 ANAC: ok guys, someone must have one...email it! |
|
|
| "The customer is always right" wasn't in Bartlett's or Columbia's |
| books of famous quotations. I guess that phrase has been written out of out |
| history. So, from now on you aren't always right, I guess.] |
|
|
| ------------------------------------------------------------------------------ |
|
|
| Dear Phrack: |
|
|
|
|
| We want you! |
|
|
| We want you to be a part of our cutting edge documentary that is traversing |
| across the "NEW EDGE" of computers, culture, and chaos. |
|
|
| Working in conjunction with Douglas Rushkoff, the best selling author of |
| "CYBERIA," we are currently gathering together the leaders of this |
| technological and cultural revolution. This is not a documentary in the |
| traditional sense of the word. It is more of an exploration, a journey, a |
| unique vision of the world as seen through the eyes of those who live on the |
| bleeding edge; where technology, art, science, music, pleasure, and new |
| thoughts collide. A place people like you and me like to call home. |
|
|
| "New Edge" will deliver a slice of creativity, insanity, and infallibility, |
| and feed those who are hungry for more than what Main Street USA has to |
| offer. This project will detonate across the US and around the world. It |
| will become the who's who of the new frontier and you belong on it's |
| illustrious list of futurians. Please look over the enclosed press release |
| description of the project. |
|
|
| Phrack has long been the ultimate source for hack/phreak info, and helped to |
| push the limits of free speech and information. The role that Phrack has |
| played in the Steve Jackson Games Case set an important precedent for |
| CyberLaw. We will also be interviewing several people from the EFF. |
|
|
| Please call me ASAP to schedule an interview for "New Edge", or send me |
| E-Mail. |
|
|
| Sincerely, |
|
|
| Todd LeValley |
| Producer, N E W E D G E |
| (310) 545-8138 Tel/Fax |
| belief@eworld.com |
|
|
|
|
| W E L C O M E |
| T O T H E |
| W O R L D |
| O N T H E |
| E D G E O F |
| T H E F U T U R E |
|
|
|
|
| W E L C O M E |
| T O T H E |
| N E W E D G E |
| -the documentary- |
|
|
|
|
| T h e O r g a n i z a t i o n |
|
|
| Belief Productions in association with Film Forum. |
|
|
| T h e M i s s i o n |
|
|
| Journey through the labyrinth of cyberia and experience the people, places |
| and philosophy that construct cyberspace and the shores of the technological |
| frontier. This fast paced visual voyage through the digital revolution will |
| feature interviews with the innovators, artists, cyberpunks, and visionaries |
| from all sides of the planet. These specialists are the futurists who are |
| engineering our cybergenic tomorrow in laboratories today. Along the way we |
| will investigate the numerous social and political issues which are cropping |
| up as each foot of fiber optic cable is laid. Artificial intelligence, the |
| Internet, nanotechnology, interactive media, computer viruses, electronic |
| music, and virtual reality are just a few of the many nodes our journey will |
| explore. |
|
|
| T h e F u n d i n g |
|
|
| This exploration is sponsored in part by a grant from The Annenberg |
| Foundation in association with the LA based non-profit cutting-edge media |
| group Film Forum. |
|
|
| T h e P r o c e s s |
|
|
| The New Edge project will capture moving images with a variety of input |
| devices and then assemble them into one fluid documentary using Apple |
| Macintosh Quadras & PowerMac computers. The post production work will be |
| done entirely on the computers using the Radius Video Vision Telecast Board |
| in conjunction with Quicktime software applications such as Adobe Premiere |
| 4.0 and CoSA After Effects 2.01. The final piece will be recorded to BETACAM |
| SP videotape for exhibition and distribution. The capture formats for the |
| project will include: BETACAM SP, Super VHS, Hi-8, 16MM Film, Super-8 Film, |
| 35MM Stills, and the Fisher |
| Price Pixelvision 2000. |
|
|
| T h e R e s u l t s |
|
|
| New Edge will pride itself on an innovative visual and aural style which |
| before today, could only be created on high-end professional video systems |
| and only for short format spots. The New Edge documentary will be two hours |
| in length and will have a dense, layered look previously featured only in |
| much shorter pieces. New Edge will be a showcase piece not only for the |
| content contained within, but for the way in which the piece was produced. |
| It will be a spectacular tribute to the products and technology involved in |
| its creation. |
|
|
| D i s t r i b u t i o n |
|
|
| Direct Cinema - Distributes videos to Libraries, Schools, and Universities |
| throughout the United States. |
|
|
| Mico Entertainment/NHK Enterprises - Provider of American programming for |
| Japanese Television. |
|
|
| Labyrinth Media Ltd. - European reality-based documentary distributor |
|
|
| T h e A u d i e n c e |
|
|
| New Edge is aimed at both the technophiles and technophobes alike. While the |
| show will feature very complex and sophisticated topics, the discussions will |
| be structured to appeal to both those who do and do not have the technical |
| framework that underlines the cyberian movement. The show's content and |
| style will make it readily available to the MTV and Generation X demographic |
| groups as well as executives who want to stay on top of the latest |
| technological advances. Individuals who read Mondo 2000 and Wired magazine |
| will also naturally latch on to this electronic |
| presentation of their favorite topics. |
|
|
| T h e G u i d e s |
|
|
| Mike Goedecke - Director/Graphic Designer |
| Mike was the Writer/Director/Cinematographer for the Interplay CD-ROM game |
| entitled Sim City. Acting as graphic designer for the Voyager Co.- Criterion |
| Laser Disc Division his work is featured on titles such as: Akira, DEVO-The |
| Truth About De-Evolution, The Adventures of Baron Munchausen, and Spartacus. |
| Most recently he collaborated with Los Angeles Video Artist Art Nomura on a |
| video installation piece entitled Digital Mandala. The piece was edited, |
| composited , and mastered to Laser Disc using an Apple Macintosh Computer and |
| off-the-shelf software. The installation is scheduled to tour museums and |
| art galleries across the United States and Europe. While attending |
| Cinema/Television Graduate School at the University of Southern California, |
| Mike directed the award winning documentary short Rhythm, which celebrates |
| various musical cultures. |
|
|
| Todd LeValley - Producer/Graphic Designer |
| Todd is the Producer/Director of CyberCulture: Visions From The New Edge, a |
| documentary that introduces the electronic underground. This project has |
| been warmly received at numerous "Cyber Festivals" around the country, as |
| well as at the Director's Guild Of America, and is currently being |
| distributed by FringeWare Inc. Todd's commercial experience includes being |
| the in-house graphic designer for Barbour/Langley Productions designing, |
| compositing, and producing the graphic packages for several 20th Century Fox |
| Television pilots and The Sci-Fi Trader for the USA Network/Sci-Fi Channel. |
| Todd is a graduate of the Cinema/Television program at Loyola Marymount |
| University. |
|
|
| Jeff Runyan - Cinematographer/Editor |
| Jeff received an MFA from the University of Southern California's Graduate |
| School of Cinema/Television with an emphasis in cinematography and editing. |
| He studied cinematography under the guidance of Woody Omens, ASC. and Earl |
| Rath, ASC., and editing with Edward Dmytryk. Jeff was the cinematographer on |
| the award wining documentary Rhythm. He has recently completed shooting and |
| editing a documentary on Academy Award winning Cinematographer Conrad Hall |
| for the ASC and has just finished directing a short film for USC |
| Teleproductions. |
|
|
| Douglas Rushkoff - Cyber Consultant/Author |
| Douglas is the author of the best selling Harper Collins San Francisco novel, |
| Cyberia. He spent two years of his life living among the key players in the |
| cyber universe. Douglas knows the New Edge well and is providing us with the |
| map to its points of interest, rest stops and travelers. |
|
|
| For more information, please contact: |
| Todd LeValley, Producer |
| Belief Productions |
| (310) 545-8138 |
| belief@eworld.com |
|
|
| [Dear New Edge: |
|
|
| You have got to be kidding me. "Readers of Wired and Mondo 2000 will |
| naturally latch on to this electronic presentation of their favorite |
| topics?" |
|
|
| Aren't we awful fucking high on ourselves? Christ. Mondo & Wired |
| readers and writers (and stars) are themselves so fucking far removed |
| from the real meat of the underground, that they wouldn't |
| even be able to relate to it. Obviously this "documentary" |
| is going to be aimed at the wannabes who sit at home furiously |
| masturbating to "Cyborgasm" while installing FRACTINT, being very |
| careful not to soil their copy of "The Hacker Crackdown." Oh joy. |
|
|
| These guys are so fucking out of it, they sent me two letters. |
| One addressed to Phrack, the other to Phrack / Emmanuel Goldstein. |
| Maybe they think we're 2600. |
|
|
| CYBER-COUNT: 12 occurrences. |
|
|
| That's kind of low. I'm surprised your public relations people didn't |
| have you add in a few more cyber-this's or cyber-that's into the |
| blurb. Gotta keep that cyber-count high if you want to get those |
| digi-bucks out of those cyberians! CYBER!!! |
|
|
| Read my review of Cyberia guys...find a new pop-fad to |
| milk for cash.] |
|
|
| ------------------------------------------------------------------------------ |
|
|
| In less than 3 weeks, I will be leaving for Basic Training. Once out of |
| there, I will be working on Satellite Data Transmissions for the US |
| Army. I am highly excited, just waiting to see what type of computers |
| I will be working on. Anyways, I will be enrolled in a 32-week |
| accelerated technical class teaching me all about satellites, and |
| the computers that I will be using. Here's the kick. I'll be writing |
| a series of Tech Journals detailing the workings/operations of/weaknesses, |
| and the use of the systems. I was wondering if you would be interested |
| in carrying these. I've read Phrack for a long time, but it is an off |
| the wall subject. I'll also be playing with the military phone system, |
| in hopes of finding out what the ABCD tones do. (I heard from a file |
| that Military phones utilize them but I'm still a civilian, and am |
| clueless). |
|
|
| Thanks for keeping me informed |
| Kalisti! |
|
|
| [Sorry to hear about your impending Basic Training. I'm not big on |
| the military, as they would make me chop off all my hair. |
|
|
| About the Satellite systems: YES If you do indeed find time to write |
| up any files on how they work, systems involved, weaknesses, etc. |
| I'D LOVE TO PRINT THAT! Just make sure you don't blow your clearance. |
|
|
| Satellites are very cool. I'm about to buy a Ku Band disk to do some |
| packet radio type stuff. A bit low-tech compared to the Army, but hell, |
| I'm on a budget. |
|
|
| ABCD...they are used for prioritizing calls on AUTOVON. FTS doesn't |
| use them (I think), and they can only be used on certain lines. |
|
|
| They are: |
|
|
| A = priority |
| B = priority override |
| C = flash |
| D = flash override |
|
|
| For instance, if you want to make it known that this is an important |
| call, you hit the "a" button before dialing. It establishes a |
| priority-class call, which may cause a light to come on or something |
| as equally attention grabbing at the called party's end. Priority |
| calls cannot be interrupted, except by a Priority Override" etc, |
| with Flash Override being the highest class. |
|
|
| If you do these from an improper line, you will get an error message. |
| The one I used to get when BS'ing AUTOVON op's long ago |
| was "The President's use of this line is not authorized." Funny. |
|
|
| Let me know if any of this is still valid.] |
|
|
|
|
|
|
| ------------------------------------------------------------------------------ |
|
|
| Dear Phrack, |
| The following is a copy of a Toneloc found file my friend got. As happens |
| to my friend a lot the numbers aren't valid. But, you'll see he found at least |
| one System 75. It appears that the 75 had a tracer installed on it already. |
| My friend did not get a call back on it, and nothing has been done as far |
| as we know. But, I still wonder -- Is scanning no longer safe? |
|
|
|
|
| Castor [612] |
|
|
| 56X-XXXX 22:57:34 03-Apr-94 C CONNECT 1200 |
|
|
| Login: b |
| Password: |
| INCORRECT LOGIN |
|
|
| Login: c |
| Password: |
| INCORRECT LOGIN |
|
|
| 56X-XXXX 23:04:12 03-Apr-94 C CONNECT 1200 |
|
|
| c |
| Unknown command error |
| Ready |
| d |
| Unknown command error |
| Ready |
| e |
| Unknown command error |
| Ready |
| b |
| Unknown command error |
| Ready |
|
|
| 56X-XXXX 23:49:19 03-Apr-94 C CONNECT 1200 |
|
|
| KEYBOARD LOCKED, WAIT FOR LOGIN |
| [1;24r [1;1H [0J |
|
|
| Login: b |
| Password: |
| INCORRECT LOGIN |
|
|
| 56X-XXXX 01:23:28 04-Apr-94 C CONNECT 1200 |
|
|
| Login: b |
| Password: |
| INCORRECT LOGIN |
|
|
| Call traced to 612-XXX-XXXX. |
| Saving number in security log for further investigation. |
|
|
| [Jeez. That sure does suck. |
|
|
| Well, live and learn kiddoes. 1994 is not the time to be hacking |
| by direct dialing local numbers. It's just not all that smart. |
|
|
| Caller-ID has been tariffed in a lot of RBOCS. A lot of modem |
| manufacturers implemented caller-id features into their equipment. |
| Having these features in the equipment means that it won't be long |
| before people redesign all their login programs to make use of |
| these features. I would. |
|
|
| I've got an ISDN line. Every time I call out, the SPID (phone number) |
| of the B channel I'm using is broadcast. There is nothing I can do |
| about that. On a remote connection, almost all decent ISDN terminal |
| adaptors have the option to block any SPID they don't know. They won't |
| even answer the phone, because they receive and interpret the phone |
| number before any session is established. |
|
|
| Yeah, well, that's ISDN, but it will not take a genius to do a few |
| quick hacks on some linux box and we will suddenly be inundated with all |
| kinds of "security packages" that use modems with Caller-ID. |
|
|
| Yeah, I know, *67 (or whatever it is) to block the data, or |
| route the call through another carrier so the data won't get passed |
| (10288-NXX-XXXX). The data is still in the system, just not being |
| transmitted from the switch out to the party being called. |
|
|
| It amazes me how many really smart people I know have been busted |
| solely because they were hacking local systems and calling them |
| directly. |
|
|
| Scanning has always been a very tricky subject. Since you are paying |
| for a phone line, and if you have flat-rate service, you are |
| thereby entitled to call as many numbers as you want. The big issue |
| a while back was dialing sequentially (which set some telcos on a rampage |
| because call usage patterns looked like telemarketing machines). |
| The other problem is harassment. One call to an individual is a wrong |
| number. Two is bordering on harassment. So, doing a complete scan |
| and calling the carriers back through some other method would be |
| a fairly good idea. And always have your calls forwarded to a |
| non-working number so the 5,000 assholes who call-return you |
| during the scan won't interfere. |
|
|
| If you are lucky enough to live in the boonies, you are probably |
| still somewhat safe, but everyone else...be careful.] |
|
|
| ------------------------------------------------------------------------------ |
|
|
| Phrack- |
|
|
| I was wondering if anyone has ever done an article on breaking |
| Novell Network through a workstation. I've heard it can be done through |
| the SysAdmin computer, but is there a way to find the userlist and |
| passwords? Also how would I go about cleaning up after myself so as to |
| not leave a trace on the logs. I would appreciate a way other than screen |
| capture, but if anyone knows of a good boot record booting program to |
| do a capture of every key typed that would be great, and maybe it |
| could be uuencoded in the next Phrack! |
|
|
| Thanks again for making the best, ass kickin', a step above the |
| rest, brain moving, earth shaking, body shivering, fist shaking, totally |
| bitchin', muy excelente, awesome H/P magazine in the whole world! :) |
|
|
| Sincerely, |
|
|
| The Warden |
|
|
| [Thanks for the compliments... |
|
|
| About your question though, I'm not quite sure what you mean. |
| In a NetWare environment there really isn't any userlist and passwords |
| that you can get at. You can run the syscon utility and look at all the |
| usernames, but not much more. The passwords are stored in what's known |
| as the "bindery." These are 3 files in the sys/system directory |
| called NET$OBJ.SYS, NET$VAL.SYS, and NET$PROP.SYS. If you can |
| pull a password out of those files, I will shit in my hat and eat it. |
|
|
| Beyond that, yes, a key-capture program is definitely the ideal |
| solution for monitoring activity on a PC workstation. There is |
| one in this issue.] |
|
|
|
|
| ------------------------------------------------------------------------------ |
|
|
| Hi, |
| I've Been reading your magazine for a long time now, my eyes light up when |
| I see an advert for a UK BBS with related hacking/phreaking articles or files |
| on it, but when I try to ring them they are usually gone. |
| I've been searching for ages for BBS's in the UK with these kind of articles |
| on them but I've had no luck, Even postings on the USENET had little results. |
| I have had a few boards which are shady but they ask unusual questions about |
| abiding to rules/laws about hacking then they prompt with fake login and |
| registration schemes. |
|
|
| If you have some, could you possibly send or publish a list of shady UK BBS's |
| Id be extremely grateful |
|
|
| Cheers, |
|
|
| Steven |
|
|
| [Steven: |
|
|
| Hell, I don't even know the numbers to any "shady" bulletin boards here |
| in America. The only UK hacker bbs I knew of in recent years was |
| Unauthorised Access, but I'm sure that's the advert you are referring to. |
|
|
| Maybe someone else in the UK knows something decent to call over there. |
| Any takers? ] |
|
|
| ------------------------------------------------------------------------------ |
|
|
| [THE GRADY FILES] |
|
|
| Many of you may remember the NSA Security Manual we published last |
| issue. That single file generated more press and hype than I'd |
| seen in a long time. It was mentioned in several newspapers, it |
| appeared on television. It was ridiculous. The document is |
| available to anyone who can fill out a FIOA request. |
|
|
| Regardless, people went zany. At first I couldn't figure out |
| why everyone was so worked up, and then I caught wind of Grady |
| Ward. Grady had posted the document to the net (with all mention |
| of Phrack deleted from it) in several USENET forums alt.politics.org.nsa, |
| talk.politics.crypto and comp.org.eff.talk. Several readers of |
| Phrack were quick to jump up and point out that Grady had obtained |
| it from the magazine (thanks guys!) which he grudgingly admitted. |
| Grady got to be in the spotlight for a while as the Phrack/NSA Handbook |
| thread continued to grow. |
|
|
| In the meantime, Grady was either calling, or giving him the |
| benefit of the doubt, getting called by an awful lot of press. |
| And even more compelling is the way he'd began pronouncing my |
| impending federal raid on so many newsgroups. |
|
|
| And of course, I don't have time to read any of that USENET crap |
| so I'm oblivious to all of this. Then I got a message from Grady. |
|
|
| [GRADY WRITES] |
|
|
| You might want to get ready for the FBI |
| serving a warrant on you for information |
| about the NSA security employee manual |
| published in Phrack 45; |
| the NSA security people called me about 10 minutes |
| ago to talk about how it got on the net. |
|
|
| I being very cooperative, gave him |
| your address in Austin. |
|
|
| Grady |
| 707-826-7715 |
|
|
| [I REPLY] |
|
|
| Get a grip. |
|
|
| Nothing that was contained in that file could not |
| be obtained through other sources. |
|
|
|
|
| [GRADY REPLIES] |
|
|
| Just because you did nothing illegal, doesn't mean that |
| you won't be annoyed by the FBI. Generally they will |
| be very polite however. |
|
|
| Gripping. Now what? |
|
|
| [I REPLY] |
|
|
| Ok, |
|
|
| If someone actually did contact you, what was his name and number. |
| I will forward that to my lawyer. |
|
|
| [GRADY REPLIES] |
|
|
| I have received your mail regarding "Re: NSA" |
| It will be read immediately when I return. |
|
|
| If you are seeking more information on the |
| Moby lexical databases, please run |
|
|
| finger grady@netcom.com |
|
|
| for general information or help downloading |
| live samples and a postscript version of our |
| current brochure via anonymous ftp. |
|
|
| Thanks - Grady Ward |
|
|
| ------------------- |
|
|
| He never answered my mail. |
|
|
| ------------------------------------------------------------------------------ |
|
|
| Dear Sir: |
|
|
| Please refrain from sending such material to this address in the future! |
| Since this address has been usubscribed from the Phrack mailing list, |
| it means that further mailings are undesirable. |
|
|
| I would also wish to remind you that maintaining lists of people's email |
| without consent is quite immoral and devious. How hypocritical of |
| you, who decry all such behavior when it is practiced by corporations |
| or governments. |
|
|
| Thank you. |
| robbie@mundoe.maths.mu.oz.au |
|
|
| [PHRACK EDITOR ABUSES POWER: |
|
|
| Dear Sir: |
|
|
| Please excuse the mailing. Have you ever heard of a mistake? |
| Have you ever heard of an oversight? |
|
|
| Is it really that much of an inconvenience for you to hit the "d" key |
| to remove one small piece of unwanted mail? |
|
|
| This being said, I would also like to invite you to go fuck yourself. |
|
|
| ** I guess this guy does not like to get unsolicited mail **] |
|
|
| ------------------------------------------------------------------------------ |
|
|
| You people really piss me off! You're undermining the fun and |
| enjoyment of the rest of the internet users just for your juvenile |
| games and illegal activities. Do you realize how much better off we'd |
| be if you all just went away and left the Net to honest people like me? |
| There is no place in today's society for a bunch of maladjusted |
| paranoid psychotics like yourselves. Please do all of us users a favor |
| and go jump in a river. |
|
|
| Kevin Barnes |
| kebar@netcom.com |
|
|
| [ABUSE OF POWER CONTINUES...WILL ERIKB EVER STOP? |
|
|
| Hey Keith: |
|
|
| Thanks a lot for the letter! |
|
|
| You know, it does my heart good to hear from such kind and caring |
| folks like yourself. It's so fortunate for the Internet that there are |
| people like yourself who take it upon themselves to become martyrs for |
| their causes and express their ideals in such an intelligent manner. |
|
|
| It's fascinating to me that you can send such email sight-unseen. |
| Do you know who you are writing to? Do you even have the slightest |
| idea? What do you hope to accomplish? Do you have any idea? |
|
|
| This particular "maladjusted paranoid psychotic" to whom you have so |
| eloquently addressed is an engineer in the R&D of a Fortune 500 computer |
| company, and that along with outside consulting will net me about |
| six-figures this tax year. I've consulted for telephone companies, |
| governments, aerospace, financial institutions, oil companies (the list |
| goes on...) and quite frankly I don't do anything even remotely illegal. |
| In fact, one recent and quite prominent quote from me was "I only |
| hack for money." |
|
|
| Now, about the silent majority of "honest people" like yourself that you |
| have so self-rightously chosen to represent... |
|
|
| I've been using the net since the early 80's (arpa-days) initially |
| through a rms granted guest account on MIT-OZ. I've continued to |
| work with other Internet Providers to cover the asses of the so-called |
| "honest people" of which you include yourself. |
|
|
| Now, in my view, if it were not for people like us, who consistently |
| expose and pinpoint weaknesses in the operating systems and networking |
| technologies that you use for your "fun and enjoyment" and that I use |
| for MY JOB, you would continue to be at serious risk. But, perhaps |
| ignorance is truly bliss, and if so, then Keith, you are probably one of |
| the happiest people on this fine planet. |
|
|
| Now, per your request, I may just go jump in a river, as the one near |
| my house is quite nice, and it is almost 100 degrees here in Texas. |
| I only ask that you do me one small favor: |
|
|
| print out 500 copies of this letter, roll them up into a paper fist, |
| and shove them into any orifice on your person that meets your criteria |
| as deserving. |
|
|
| ** I guess this guy doesn't like me...or you ** |
|
|
| EDITORIAL ABUSE ENDS] |
| ----------------------------------------------------------------------------- |
|
|
| ==Phrack Magazine== |
|
|
| Volume Five, Issue Forty-Six, File 2a of 28 |
|
|
| **************************************************************************** |
|
|
| Phrack Editorial |
|
|
|
|
| If you aren't from America, this editorial really isn't meant for you, |
| so read on with warning, or go on to the next file. |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Stupid hackers. |
|
|
| We've got to do something to clean up our image. |
|
|
| We truly are "America's Most Valuable Resource," as ex-CIA spook Robert |
| Steele has said so many times. But if we don't stop screwing over our own |
| countrymen, we will never be looked at as anything more than common |
| gutter trash. Hacking computers for the sole purpose of collecting |
| systems like space-age baseball cards is stupid, pointless and can only |
| lead to a quick trip up the river. |
|
|
| Obviously, no one is going to stop hacking. I've been lucky in that I've |
| found people willing to pay me to hack for them rather than against |
| them, but not everyone can score such a coup. What kind of alternative |
| can the rest of the community have? |
|
|
| Let's say that everyone was given an opportunity to hack without any |
| worry of prosecution with free access to a safe system to hack from, |
| with the only catch being that you could not hack certain systems. |
| Military, government, financial, commercial and university systems would |
| all still be fair game. Every operating system, every application, every |
| network type all open to your curious minds. |
|
|
| Would this be a good alternative? Could you follow a few simple |
| guidelines for the offer of virtually unlimited hacking with no worry of |
| governmental interference? |
|
|
| Where am I going with this? |
|
|
| Right now we are at war. You may not realize it, but we all feel the |
| implications of this war, because it's a war with no allies, and |
| enormous stakes. It's a war of economics. |
|
|
| The very countries that shake our hands over the conference tables of |
| NATO and the United Nations are picking our pockets. Whether it be the |
| blatant theft of American R&D by Japanese firms, or the clandestine and |
| governmentally-sanctioned bugging of Air France first-class seating, or |
| the cloak-and-dagger hacking of the SWIFT network by the German BND's |
| Project Rahab, America is getting fucked. |
|
|
| Every country on the planet is coming at us. Let's face it, we are the |
| leaders in everything. Period. Every important discovery in this |
| century has been by an American or by an American company. Certainly |
| other countries have better profited by our discoveries, but |
| nonetheless, we are the world's think-tank. |
|
|
| So, is it fair that we keep getting shafted by these so-called "allies?" |
| Is it fair that we sit idly by, like some old hound too lazy to scratch |
| at the ticks sucking out our life's blood by the gallon? Hell no. |
|
|
| Let's say that an enterprising group of computer hackers decided to |
| strike back. Using equipment bought legally, using network connections |
| obtained and paid for legally, and making sure that all usage was |
| tracked and paid for, this same group began a systematic attack of |
| foreign computers. Then, upon having gained access, gave any and all |
| information obtained to American corporations and the Federal |
| government. |
|
|
| What laws would be broken? Federal Computer Crime Statutes specifically |
| target so-called "Federal Interest Computers." (ie: banks, |
| telecommunications, military, etc.) Since these attacks would involve |
| foreign systems, those statutes would not apply. If all calls and |
| network connections were promptly paid for, no toll-fraud or other |
| communications related laws would apply. |
|
|
| International law is so muddled that the chances of getting extradited |
| by a country like France for breaking into systems in Paris from Albuquerque |
| is slim at best. Even more slim when factoring in that the information |
| gained was given to the CIA and American corporations. |
|
|
| Every hacking case involving international breakins has been tried and |
| convicted based on other crimes. Although the media may spray headlines |
| like "Dutch Hackers Invade Internet" or "German Hackers Raid NASA," |
| those hackers were tried for breaking into systems within THEIR OWN |
| COUNTRIES...not somewhere else. 8lgm in England got press for hacking |
| world-wide, but got nailed hacking locally. Australia's Realm Hackers: |
| Phoenix, Electron & Nom hacked almost exclusively other countries, but |
| use of AT&T calling cards rather than Australian Telecom got them a charge |
| of defrauding the Australian government. Dutch hacker RGB got huge press |
| hacking a US military site and creating a "dquayle" account, but got |
| nailed while hacking a local university. The list goes on and on. |
|
|
| I asked several people about the workability of my proposal. Most |
| seemed to concur that it was highly unlikely that anyone would have to |
| fear any action by American law enforcement, or of extradition to |
| foreign soil to face charges there. The most likely form of retribution |
| would be eradication by agents of that government. (Can you say, |
| "Hagbard?") |
|
|
| Well, I'm willing to take that chance, but only after I get further |
| information from as many different sources as I can. I'm not looking |
| for anyone to condone these actions, nor to finance them. I'm only |
| interested in any possible legal action that may interfere with my |
| freedom. |
|
|
| I'm drafting a letter that will be sent to as many different people as |
| possible to gather a fully-formed opinion on the possible legal |
| ramifications of such an undertaking. The letter will be sent to the FBI, |
| SS, CIA, NSA, NRO, Joint Chiefs, National Security Council, Congress, |
| Armed Forces, members of local and state police forces, lawyers, professors, |
| security professionals, and anyone else I can think of. Their answers |
| will help fully form my decision, and perhaps if I pass along their |
| answers, will help influence other American hackers. |
|
|
| We must take the offensive, and attack the electronic borders of other |
| countries as vigorously as they attack us, if not more so. This is |
| indeed a war, and America must not lose. |
|
|
| ->Erik Bloodaxe...Hacker...American. |
|
|
| --------------------------- |
|
|
| Ok, so maybe that was a bit much. But any excuse to hack without fear |
| should be reason enough to exert a bit of Nationalism. |
|
|
| I'd much rather be taken out by the French in some covert operation and |
| go out a martyr, than catch AIDS after being raped by the Texas |
| Syndicate in the metal shop of some Federal Prison. Wouldn't you? |
|
|