| ==Phrack Magazine== |
|
|
| Volume Seven, Issue Forty-Eight, File 18 of 18 |
|
|
| PWN PWN PNW PNW PNW PNW PNW PNW PNW PNW PNW PWN PWN |
| PWN PWN |
| PWN Phrack World News PWN |
| PWN PWN |
| PWN Compiled by Datastream Cowboy PWN |
| PWN PWN |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
|
|
|
|
|
|
| Security Software Thwarts Hackers July 23, 1996 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| (PRNewswire) |
|
|
| World Star Holdings, Ltd. announced today that there have been approximately |
| 5,000 unsuccessful attempts to break its proprietary VPAGE Internet security |
| system. In order to further demonstrate the functionality of its technology, |
| they Company has unveiled a new addition to the World Star Internet security |
| challenge: "The World Star Cyberhospital." |
|
|
| The company recently launched an online contest offering more than $50,000 in |
| cash and prizes to the first person to break its security. |
|
|
| [ THESE CHALLENGES ARE UNADULTERATED BULLSHIT. Phrack suggests you test |
| something other than the fake, non-production demo contest system. How |
| well does their software hold up in a real business environment? |
| (in other words: THEIRS!?!!@$) |
|
|
| World Star Holdings (NET-WORLDSTAR-MB-CA) |
| 165 Garry Street |
| Winnipeg, Manitoba R3C 1G7 |
| CA |
|
|
| Netname: WORLDSTAR-MB-CA |
| Netnumber: 205.200.247.0 ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Your Cellular Phone Number May Be Up For Grabs August 21, 1996 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Mimi Whitefield (Miami Herald) |
|
|
|
|
| Electronic bandits have snatched cellular phone numbers from the airwaves and |
| cloned phones used by the Miami office of the Secret Service. |
|
|
| BellSouth Florida president Joe Lacher's phone has been cloned; Spero Canton, |
| spokesman for BellSouth, has been a victim three times over. |
|
|
| "The bums never sleep. They're everywhere," complained Bill Oberlink, |
| regional president for AT&T Wireless Services. |
|
|
| But the good news is that law enforcement agencies and cellular companies |
| themselves are fighting back with a new arsenal of tools, technology and laws |
| that make it easier to detect and prosecute cellular bandits. |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Miami Fraud Squad Pursues Cellular Bandits August 12, 1996 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Audra D.S. Burch (Miami Herald) |
|
|
| How's this for capitalism gone awry: Metro-Dade police nabbed a cellular |
| bandit who was selling a $150 package deal -- $75 each for a stolen phone |
| and number -- along with a 30-day guarantee on unlimited illegal air time. |
| |
| In a sting operation, police took him on the cut-rate offer. |
|
|
| Thanks to the work of a special Metro-Dade Police Economic Crimes Bureau, the |
| entrepreneurial cloner got a prison sentence. |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Newer Technology Aids Fight Against Cellular Fraud August 21, 1996 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Mimi Whitefield (Miami Herald) |
|
|
| New technology is on the side of cellular companies fighting telecom criminals |
| who can rack up thousands of dollars in illegal charges before a consumer even |
| knows he's been hit. |
|
|
| New Jersey-based Bellcore, for example, has developed NetMavin software, |
| which can detect fraudulent or unusual calling patterns within half an hour. |
|
|
| "This is really going to screw the cloners up," said Roseanna DeMaria, an |
| AT&T Wireless executive. |
|
|
| ----------------------------------------------------------------------------- |
|
|
| SPA Files Copyright Suit July 28, 1996 |
| ~~~~~~~~~~~~~~~~~~~~~~~~ |
| (Reuters News) |
|
|
| The Software Publishers Association said Sunday it filed a civil copyright |
| infringement lawsuit against a Seattle man for illegal distribution of |
| software on the Internet. |
|
|
| The suit, which was filed July 23 in the U.S. District Court in Seattle, |
| alleges that Max Butler illegally uploaded copyrighted software to a file |
| transfer protocol site for distribution across the Internet, the trade |
| association said. |
|
|
| "This action is a warning to Internet users who believe they can infringe |
| software copyrights without fear of exposure or penalty," said Sandra |
| Sellers, Software Publisher's vice president of intellectual property |
| education and enforcement. |
|
|
| ----------------------------------------------------------------------------- |
|
|
| The L0pht August, 1996 |
| ~~~~~~~~~ |
| by Steve G. Steinberg (Wired) p. 40 |
|
|
| What do a group of hackers do when the equipment they've accumulated over |
| years of dumpster diving no longer fits in their apartments? They get |
| a l0pht. Since 1993, a core group of seven Boston-based hackers have rented |
| a loft space for hacking, trading information about cellular phones security, |
| and building things like a wireless Internet service using discarded |
| microwave equipment. |
|
|
| Now that all of them have day jobs in the industry, why do they keep at it? |
| "For the girls and the text files, of course," says Mudge. |
|
|
| [ HELL YES!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Cracking Down on the Outlaws of Cyberspace July 2, 1996 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by M.J. Zuckerman (USA Today) p. 4B |
|
|
|
|
| What's it take to be America's top cybercop? |
|
|
| "I was a hockey referee, so I'm used to being beaten up," suggests Jim |
| Christy, who is among those most often mentioned for the title. And he's |
| been at it for only a decade. |
|
|
| Today, with the weighty title of Chief of Computer Crime Investigations |
| and Information Warfare, he is one of 68 computer investigators in the |
| Air Force Office of Special Investigations (OSI). |
|
|
| Christy, a Baltimore native, stumbled into the computer field. After |
| drawing No. 35 in the draft lottery during the Vietnam War, he joined the |
| Air Force rather than waiting to be drafted. He spent the next four years |
| as a computer key punch operator, followed by 13 years as a civilian working |
| computers at the Pentagon. |
|
|
| When he moved to OSI, Christy largely ceased his hands-on involvement with |
| computers and systems. |
|
|
| Since last fall, Christy has been on temporary assignment to the Senate |
| Permanent Subcommittee on Investigations, helping them examine security |
| in cyberspace. |
|
|
| "I like working up on Capitol Hill, because you can make a difference," |
| Christy says. |
|
|
| ----------------------------------------------------------------------------- |
|
|
|
|
| Hackers Penetrate Justice Department Home Page August 18, 1996 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| (AP News Wire) |
|
|
| Internet hackers infiltrated the Justice Department's home page |
| yesterday, altering the official web site to include swasticas, |
| obscene pictures and lots of criticism of the Communications Decency Act. |
|
|
| The official web site, which was turned off by government technicians |
| when it was discovered, was changed to read "United States Department of |
| Injustice," next to a red, black and white flag bearing a swastika. |
|
|
| The page included color pictures of George Washington, Adolf Hitler, and a |
| topless Jennifer Aniston. |
|
|
| [ A link to a copy of the page is it http://www.fc.net/phrack/doj ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Employment Prospect Grim for Hacker August 19, 1996 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| (AP News wire) |
|
|
|
|
| Employment prospects are grim for Kevin Lee Poulsen, a computer whiz |
| imprisoned five years for his cyberspace havoc. |
|
|
| The 30-year-old hacker has been barred from getting near a computer for the |
| next three years and he now fears selling cowboy boots at a Western store |
| will be his only opportunity to make some money. |
|
|
| "It's the only place where I've been greeted with a positive attitude," he |
| said during an interview last week. "I can't get a job that I am qualified |
| for, basically." |
|
|
| On September 3, he goes to federal court in hopes of having some of the |
| computer restrictions relaxed. |
|
|
| ----------------------------------------------------------------------------- |
|
|
| School Hires Student To Hack Into Computers August 22, 1996 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| (The Sun Herald) |
|
|
| Students at Palisades Park's high school needed their transcripts to |
| send off to colleges. But they were in the computer and no one who knew |
| the password could be reached. So the school hired a 16-year-old hacker |
| to break in. |
|
|
| Superintendent George Fasciano was forced to explain to the School |
| Board on Monday the $875 bill for the services of Matthew Fielder. |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Feds aim low on hacker crackdown June 21, 1996 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Lewis Z. Koch (Upside Online News) |
|
|
| Nineteen-year-old Christopher Schanot of St. Louis, Mo. has been |
| languishing in a Federal jail since March 25, 1996, charged with four |
| counts of computer hacking. He is not allowed to post bond, because |
| Federal authorities contend he is "a computer genius intent on |
| infiltrating computer systems of some of the largest companies and |
| entities in the country," and because a jailhouse snitch claims Schanot |
| bragged he would run away if he were released. He has never been charged |
| with a crime or arrested before. |
|
|
| Schanot's problems began after he ran away from home on May 30, 1995, |
| taking some of his disks, a hard drive and personal items. According to a |
| knowledgeable source close to Schanot, Chris felt his parents, especially |
| his father Michael, didn't understand or respect him. |
|
|
| Less rocky, it seems, was his relationship with Netta Gilboa, a |
| 38-year-old woman living near Philadelphia. Gilboa is editor-in-chief and |
| publisher of _Gray Areas_, a slick, text-heavy, irregular magazine that |
| explores the "grey areas" of "alternative lifestyles and deviant |
| subcultures." |
|
|
| ----------------------------------------------------------------------------- |
|
|
| City of London Surrenders To Cyber Gangs June 2, 1996 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| (Times of London) |
|
|
| City of London financial institutions have paid huge sums to international |
| gangs of sophisticated "cyber terrorists" who have amassed up to 400 million |
| pounds worldwide by threatening to wipe out computer systems. |
|
|
| A Sunday Times Insight investigation has established that British and |
| American agencies are examining more than 40 "attacks" on financial |
| institutions in London and New York since 1993. |
|
|
| Victims have paid up to 13 million pounds a time after the blackmailers |
| demonstrated their ability to bring trading to a halt using advanced |
| "information warfare" techniques learnt from the military. |
|
|
| According to the American National Security Agency (NSA), they have |
| penetrated computer systems using "logic bombs" (coded devices that can |
| be remotely detonated), electromagnetic pulses and "high emission radio |
| frequency guns," which blow a devastating electronic "wind" through a |
| computer system. |
|
|
| The gangs are believed to have gained expertise in information warfare |
| techniques from the American military, which is developing "weapons" |
| that can disable or destroy computer hardware. Some are also known to |
| have infiltrated banks simply by placing saboteurs on their payroll as |
| temporary staff. |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Credit Fraud on AOL |
| ~~~~~~~~~~~~~~~~~~~ |
| (AP Newswire) |
|
|
| Two boys posed as billing representatives for an online service and stole |
| at least 15 credit card numbers, and used those numbers to buy $15,000 |
| worth of merchandise, from computer equipment to cymbals, police said. |
|
|
| The two 16-year-olds were charged with 39 counts of possession of |
| stolen property, theft and attempted fraud. They were released to the |
| custody of their parents pending a Family Court hearing. |
|
|
| Police believe the boys obtained a program designed by computer |
| hackers to flimflam customers of America Online. It sends a message to |
| users saying they will be cut off if they don't type in their name, |
| credit card account number and computer service password. |
|
|
| ----------------------------------------------------------------------------- |
|
|
| FBI Survey Reveals Growth of Cybercrime May 6, 1996 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Rory J. O'Connor (San Jose Mercury News) |
|
|
| Intruders are breaking into the nation's computer systems at an |
| increasing rate and often with more nefarious motives than in the |
| past, according to a survey co-sponsored by the FBI and a private |
| group of computer security professionals. |
|
|
| "What this shows is that the ante has been upped in cyberspace," said |
| Richard Power, senior analyst of the Computer Security Institute in |
| San Francisco, which conducted the survey. "As all manner of commerce |
| moves into cyberspace, all manner of crime is moving there as well. |
| It's no longer just vandalism." |
|
|
| More than 40 percent of the 428 corporate, university and government |
| sites that responded to the FBI survey reported at least one |
| unauthorized use of their computers within the last 12 months, with |
| some institutions reporting as many as 1,000 attacks in the period. |
|
|
| It also appears that there's more computer crime for hire occurring, |
| Power said, exploiting mainly older hackers who have graduated to |
| making money off the skill they once used simply to establish bragging |
| rights with their peers. He suggested that some of the hiring is being |
| done by intelligence services of various governments, although he |
| offered no proof. |
|
|
| ----------------------------------------------------------------------------- |
|
|
| University hacker to be hunted on the Internet April 27, 1996 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Robert Uhlig (London Daily Telegraph) |
|
|
| Computer experts at Cambridge University are using the Internet to hunt |
| for a hacker who breached their security systems to access some of the |
| world's most sensitive research information. |
|
|
| The authorities had no indication that the hacker deleted or altered |
| files, "although there was the potential for that", he said. Files |
| belonging to world-renowned research scientists may have been viewed or |
| copied, giving the hacker an insight into commercially and academically |
| sensitive material. |
|
|
| The hacker used a so-called sniffer program, which sat silently within the |
| computer system for four weeks, monitoring its activities. This could |
| allow the hacker to compile a list of all passwords to give him unhindered |
| access to every computer on the university's network. "There was the |
| potential to access any material on any computer anywhere on the |
| university's network - ranging from electronic-mail to confidential |
| research data," said Mr Stibbs. |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Agents' Codes Exposed on Web March 16, 1996 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By: Robert E. Kessler (Newsday) |
|
|
|
|
| In an attempt to help (Ed) Cummings, and discredit the Secret Service, a Long |
| Island-based hacker magazine last week launched a page on the World Wide |
| Web publishing lists of Secret Service radio frequencies, photographs of |
| agents, and codenames used by the agency for officials and buildings. |
|
|
| Last year, Cummings, a 35-year-old native of Reading, Pa., pleaded |
| guilty to federal charges in Philadelphia of possessing telecommunications |
| equipment with intent to defraud and served a seven-month prison sentence. |
|
|
| As a result of that conviction, last week Cummings was sentenced by a |
| judge in Easton, Pa., north of Philadelphia, to serve a six- to 24-month |
| sentence for violating probation after pleading no contest to a 1994 charge |
| of tampering with evidence in another telephone hacking case. |
|
|
| "Painting this guy as some white knight or someone who is standing up |
| for free speech is wrong," said Kun. "He's engaged in fraud." |
|
|
| Cummings' attorney, Kenneth Trujillo, could not be reached for comment. |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Judge Denies Bond to Accused Hacker April 6, 1996 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Tim Bryant (St. Louis Post Dispatch) |
|
|
| After another prisoner said accused computer hacker Christopher Schanot was |
| planning a quick escape from his parents' home near High Ridge, a federal |
| magistrate decided Friday to keep Schanot in jail. |
|
|
| "He said he would wait a couple of days and take off," testified the |
| prisoner, Gerald Esposito. |
|
|
| Schanot's lawyer, federal public defender Norm London, told Davis that |
| the alleged conversation between the young man and Esposito never happened. |
|
|
| London, pointing out that Esposito has convictions for sexual assault, |
| said the older prisoner had "made overtures" to jail officials about moving |
| Schanot into Esposito's housing area. |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Hacked Off! Government, Firms Fight Computer Intruders April 7, 1996 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Colleen Bradford (St. Louis Post Dispatch) |
|
|
| Every day, hundreds of people in front of personal computers try to sneak |
| into corporate and government computer networks. Sometimes they just look |
| around, sometimes they destroy data and sometimes they steal personal and |
| classified information. |
|
|
| Two weeks ago, law enforcement officials charged an Argentine, 21, with |
| using the Internet to illegally break into computer networks at Department |
| of Defense installations, the NASA, Los Alamos National Laboratory and |
| several universities. The Justice Department is now seeking Julio Cesar |
| Ardita, who accessed confidential research files on aircraft design, radar |
| technology and satellite engineering. |
|
|
| And Chris Schanot, 19, from High Ridge, was in court in St. Louis last |
| week on charges of hacking. Schanot, who fled to Pennsylvania from St. |
| Louis after graduating from Vianney High School last May, is accused in a |
| five-count indictment of breaking into the computers of Southwestern Bell, |
| Bell Communications Research, Sprint and SRI International, a research and |
| development contractor with government contracts. His trial is set for June |
| 10. |
|
|
| Schanot, like other hackers, likely became addicted to the feeling of |
| power that cracking into a private computer network brings, said St. Louis |
| County Police Sgt. Thomas Lasater, who has been investigating computer |
| crime for seven years. |
|
|
| "Normally these young hackers do not use the computers for financial |
| gain," Lasater said. "It's just a challenge for them to see what they can |
| conquer." |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Mike and Terry's Dreadful Adventure |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Elizabeth Weise (AP Newswire) |
|
|
| Terry Ewing was late. His plane left in an hour and he was cutting it close. |
| But he couldn't tear himself away from his computer and the hole he'd hacked |
| into the security network of Tower Records. |
|
|
| He kept poking around, looking for something interesting to take to the |
| hackers' convention he was going to. Finally, five minutes before the |
| airport shuttle beeped in front of his apartment, he downloaded a file |
| containing 1,700 credit card numbers. |
|
|
| "We didn't expect anyone was watching," he said seven months later - |
| through an inch of Plexiglas at the Sacramento County Jail. |
|
|
| Ewing had had second thoughts about taking the Tower Records file with |
| him on July 31, so he left it on his hard drive while he and Kim hit |
| DefCon, the biggest of the West Coast hacker gatherings, for a weekend of |
| bragging, hanging out and messing around. |
|
|
| "We never guessed they were onto us. Their security was so weak it |
| really blew," the 20-year-old Kim says by phone from the sixth floor of |
| the same jail that held his friend. He is facing an 18-month sentence. |
|
|
|
|