| .oO Phrack 50 Oo. |
|
|
| Volume Seven, Issue Fifty |
|
|
| 2 of 16 |
|
|
| Phrack Loopback |
|
|
| ----------------------------------------------------------------------------- |
| |
|
|
| Hi, |
| I have a story of violations of freespeech and censorship and |
| if I am busted unjustly, please publish this story to the public. |
| Yesterday some faggot e-mailed me with a ton of ascii crap that |
| took me an hour + to DL. WHen I finished DLing it, windoze stalled and I |
| had to restart.. So naturally I was pissed off. The reason this guy |
| said he did this was because I posted a cheat program for the game |
| Diablo on my webpage and he doesn't like cheaters. Today he e-mailed me |
| again with ascii crap.....I was beyond pissed....so I did what anyone in |
| my position would do....Imailbombed him ... about 600 msg's or so. |
| I used Kaboom3 and an SMTP I thought (Looked like it from port 25) was |
| anonymous and untraceable. |
| As it turns out, 2 hours later the head of security at Earthlink |
| (my current ISP) called and said that someone from my account had e-mail |
| bombed this person. The security guy said that the person I bombed |
| complained to his ISP because it "put out his business for hours." His |
| ISP traced it to Earthlink and then to me, by contacting the earthlink |
| security guy and having him look in the logs for who was connected to |
| the ip (dynamic) they saw in the bomb messages at the time the bombing |
| occurred. He also said that the guy I bombed called the FBI and got them |
| involved in it. Is this sounding fucking ridiculous yet? First of all, |
| any reputable business presumably has a better-than-28.8 connection, |
| which means it would have taken this guy a couple seconds to DL my bomb. |
| Secondly, even if he doesn't have a T-1, at 28.8 it would take 2 hours |
| or so, maybe less. But the FBI is involved..... I can't fucking |
| believe it! So naturally the first thing I do is e-mail all the |
| reputable hackz known to me. This is ridiculous, this is |
| oppressive, this is BIG BROTHER! |
|
|
| Yours, |
| GrEeNbEaSt |
|
|
|
|
| [ So, what exactly is it that you want us to do, besides burst into fits |
| of uncontrollable for several minutes at a time? ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
|
|
| Hey, in phrack 48, the article on IP spoofing says you need to sample to |
| TCP sequence numbers of the host you are attacking. The method is |
| suggests is to connect via SMTP and then drop the connection. There is |
| a problem with this - sendmail usually logs failed mail transfers, so |
| the host will probably be able to correlate this with the time of the |
| attack and find out who you are. Further, this connection must be done |
| from a non-spoofed IP address to guarantee you get a returned packet. |
| There are two options available here: |
|
|
| 1) Forge the sequence sampling connection as another host on your subnet |
| (although if they contact your provider and your provider logs massive |
| data, you're busted - also this will not work if the local network uses |
| an active hub) |
|
|
| 2) Make sure to remove these traces if you manage to crack the machine - |
| this is all or nothing - if you fail to crack it, but left indicators of |
| an attack, you are screwed. (again only if your provider logs heavily) |
|
|
| If you want to circumvent these dangers altogether, simply sample the |
| sequence numbers from some highly non-logging port. The standard inetd |
| server for UNIX runs a TCP echo, discard and chargen service, which you |
| can get sequence numbers from, and does not log anything. |
|
|
| There are two complications to this attack which are becoming |
| increasingly used, and which effectively prevent it. |
|
|
| 1) Some providers do not allow foreign IP addresses to go out of their |
| subnet as source IP addresses - this is done through router blocking. |
| Most sites just don't give a damn or are too stupid to figure out how to |
| do it, but the number of providers doing this is increasing. You could |
| try to hack their router - easy to find, do a traceroute, but chances of |
| success are slim if it doesn't allow remote logins. Also, your ISP will |
| know if this happens, and may take additional precautions immediately |
| (such as grabbing your ethernet address if you are on a local network - |
| then you are f!!ked) We don't want any minors reading this to see any |
| offensive words, do we - oh lord, they might even ban phrack in the |
| state of Texas. No offense to anyone from Tx unless they deserve it. |
|
|
| 2) Some OS's use pseudo-random number generators to create TCP sequence |
| numbers at the beginning of each connection. This is easy to do under |
| Linux, and I think some commercial OS's might even be doing this now |
| (anyone have confirmation of the rumor that Solaris now does this?) |
| Now, this is easy to check for - connect twice in immediate succession |
| and see if you get two sequential (or close) numbers. However, a |
| workaround for this would be to generate pseudo-random sequence numbers |
| for the first connection from a given IP address (and then again when |
| the IP layer no longer has any knowledge of this IP address) If a site |
| was running non-crypto pseudo-random sequences, it would be possible to |
| analyze it using a spectral test to try to predict sequence numbers, but |
| if they use a cryptographically secure sequence generator, you would |
| have to break it (probably not too hard since any highly secure crypto |
| sequence would make IP response time unreasonably slow) A |
| counter-solution to this would be to generate random numbers in low cpu |
| load time, and have a buffer of them for later use. Here, we could |
| probably go on forever with attacks and countermeasures, so lets stop |
| now, as a cure for sanity. |
|
|
| As an aside note for the highly paranoid: ethernet spoofing |
|
|
| Note: some of this is theorized, and might not be 100% accurate - if you |
| get the jist of it, you should be able to figure out if it works for |
| you. |
|
|
| It is possible to spoof ethernet hardware addresses as well. Some cards |
| will allow you to do this easily, but you need to have card programming |
| docs (check the Linux kernel source for your card driver-!!). Others |
| won't let you do it at all, and require a ROM change, or worse it might |
| be solid state logic on the card - EVIL. Course you might be able to |
| get around solid state stuff by recoding the ROM, but I wouldn't |
| recommend it unless you don't have the $70 to buy a new card, and have a |
| month or two to spend in the basement. |
|
|
| If you make up an ethernet address, you should probably use a real card |
| identifier (the first three bytes). This is because some sniffing |
| software raises warning flags when unknown card identifiers pop up, and |
| this software is run by more network admins than I'd like to think. |
|
|
| Some new hub technologies may limit this type of spoofing- most notably, |
| active hubs wouldn't allow it at all. Other new hub designs use |
| mappings of ethernet address to specific ports on the hub, so you might |
| not be able to change the address without turning off the machine, |
| waiting for the hub to time out the address, and rebooting. |
|
|
| Ethernet hardware address spoofing will make a machine completely |
| undetectable, provided it is not the only machine on a network that is |
| being monitored. |
|
|
| There may be a way around active hubs, and this is multicast ethernet |
| addresses. Any network card capable of multicast should be able to send |
| packets with an ethernet multicast address. This address is not |
| specific to each card, as many cards can send and receive on the same |
| multicast address. The problem here is router and hub technology may |
| have already advanced to the point where it can distinguish multicast |
| ethernet addresses and convert them to multicast IP addresses, which |
| would not allow you to spoof. This is only theoretical - I haven't |
| tried it, don't know anyone who has, and have never even heard rumors |
| about it. |
|
|
| Note : this information is in no means comprehensive - I don't have the |
| time or resources to study it, but most likely results in ethernet |
| spoofing vary by the manufacturers of the network hardware all the way |
| down the local line - (i.e - ethernet card all the way to the first |
| gateway) |
|
|
| Another aside: return path rerouting |
|
|
| In return path rerouting, the IP spoofing attack follows the same |
| general principal, except that the attacking machine gets reply packets, |
| and does not need to operate blind. There are three ways to make this |
| work: |
|
|
| 1) Pretending to be a trusted host on your subnet |
| Easy, just pick up packets destined for the trusted machine which |
| look like responses to your forged packets, and send on their IP |
| address, and SYN flood their machine. This will even work past |
| blocking ISP's |
|
|
| 2) Source routing attack |
| Medium difficulty, you have to construct a path between your machine |
| and the target, and a path between your machine and the trusted host |
| (although the last part can be made up). Use this and either the |
| strict or loose IP routing option, and all packets will come back to=20 |
| you. This will not work nearly as much, since many hosts and=20 |
| routers discard source routed packets (it is a well-known flaw in=20 |
| TCP/IP now). However, mightn't buggy implementations only discard |
| one type of source routing? |
|
|
| 3) Experimental - ICMP redirect attack |
| Try using ICMP redirects to redirect the packets back to the=20 |
| attacking machine. ICMP redirects should only be accepted to=20 |
| machines on a local subnet, but buggy implementations might not do |
| this correctly (actually, I think the Host Requirements RFC says=20 |
| this is recommended, not required). Also, it may be possible to =20 |
| create a path using redirects or forged routing updates to direct |
| traffic to a trusted site back to the attacking site. After the |
| attack, the routing information could be repaired, making it seem |
| like a temporary network failure. If anyone followed this and knows |
| what I mean, let me know if you think it's possible. =20 |
|
|
| Thanks |
|
|
| Zach |
|
|
| [ Zach, you have good ideas and points. Now, why haven't YOU written |
| an article for Phrack??? |
|
|
| You should...<hint><hint> ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| DEATH TO THE INNOCENT |
|
|
|
|
| I WENT TO A PARTY, MOM, I REMBERED WHAT YOU SAID. |
| YOU TOLD ME NOT TO DRINK, MOM, SO I DRANK SODA INSTEAD. |
| I REALLY FELT PROUD INSIDE, MOM, THE WAY YOU SAID I WOULD. |
| I DIDN'T DRINK AND DRIVE, MOM, THOUGH THE OTHERS SAID I SHOULD. |
| I KNOW I DID THE RIGHT THING, MOM, I KNOW YOUR ALWAYS RIGHT. |
| NOW THE PARTY IS ENDING, MOM, AS EVERONE IS DRIVING OUT OF SIGHT. |
|
|
| AS I GOT INTO MY CAR, MOM, I KNEW I'D GET HOME IN ONE PIECE. |
| BECAUSE OF THE WAY YOU RAISED ME, SO RESPONSIBLE AND SWEET. |
| I STARTED DRIVING AWAY, MOM, BUT AS I PULLED INTO THE ROAD, |
| THE OTHER CAR DIDN'T SEE ME, MOM, AND HIT ME LIKE A LOAD. |
| AS I LAY HERE ON THE PAVEMENT, MOM, I HEAR THE POLICE MAN SAY, |
| THE OTHER GUY IS DRUNK, MOM, AND NOW I'M THE ONE WHO WILL PAY. |
| I'M LYING HERE DYING. MOM, I WISH YOU'D GET HERE SOON. |
|
|
| HOW COULD THIS HAPPEN TO ME, MOM? MY LIFE JUST BURST LIKE A BALLOON. |
| THERE IS BLOOD ALL AROUND ME, MOM, AND MOST OF IT IS MINE. |
| I HEAR THE MEDIC SAY, MOM, I'LL DIE IN A SHORT TIME. |
| I JUST WANTED TO TELL YOU, MOM, I SWEAR I DIDN'T DRINK. |
| IT WAS THE OTHERS, MOM. THE OTHERS DID NOT THINK. |
| HE WAS PROBIBLY AT THE SAME PARTY AS I. |
| THE ONLY DIFFERENCE IS, HE DRANK AND I WILL DIE. |
|
|
| WHY DO PEOPLE DRINK, MOM? IT CAN RUIN YOUR HOLE LIFE. |
| I'M FEELING SHARP PAINS NOW. PAINS JUST LIKE A KNIFE. |
| THE GUY WHO HIT ME IS WALKING, MOM, AND I DON'T THINK IT'S FAIR. |
| I'M LYING HERE DYING AND ALL HE CAN DO IS STARE. |
|
|
| TELL MY BROTHER NOT TO CRY MOM, TELL DADDY TO BE BRAVE. |
| AND WHEN I GO TO HEAVEN, MOM, PUT DADDY'S GIRL ON MY GRAVE. |
| SOMEONE SHOUYLD HAVE TOLD HIM, MOM, NOT TO DRINK AND DRIVE. |
| IF ONLY THEY HAD TOLD HIM, MOM, I WOULD STILL BE ALIVE. |
|
|
| MY BREATH IS GETTING SHORTER, MOM. I'M BECOMING VERY SCARED. |
| PLEASE DON'T CRY FOR ME, MOM, WHEN I NEEDED YOU, YOU WERE ALWAYS THERE. |
| I HAVE ONE LAST QUESTION, MOM, BEFORE I SAY GOODBYE. |
| I DIDN'T DRINK AND DRIVE, MOM, SO WHY AM I THE ONE TO DIE? |
|
|
| [ Interesting...booze, violence. Now, if only this little story had |
| some forced sodomy of teenage schoolgirls... |
|
|
| Man, I have no shame...drinking and driving is evil, and will get you |
| shot in Central America for attempted homicide. That's why I take |
| cabs or hang around with 12-steppers or mormons. Either way, it gives |
| you someone to subject to your drunken ravings. |
|
|
| Now why this was sent to Phrack, I have no idea. ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| I just have one question, i just moved back down to Texas from NY,,, |
| is there any one at phrack that knows local BBS numbers for san antonio??? |
|
|
| thanx for the help, |
|
|
| [In almost any city with running water and electricity (and yes, |
| even San Antonio qualifies as of this writing), in any local computer |
| store you will find local compu-nerd publications. I think in San Antonio |
| its "Computer User." In any case, in the back are usually listings of |
| local bulletin boards. Start with these, and eventually you will come |
| across the kinds of bulletin boards you really want. ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| The trial of the Danes arrested in the article I wrote in #47 has now |
| ended. No jail sentences, just community service up to 200 hours (me) |
| and a fine of 30.000Dkr. (apx. $5000). |
|
|
| Anyway, remember I wrote you about the article being quoted and |
| translated to Danish in a Danish magazine? Well, after the same magazine |
| published our REAL names, adrs with the advice not to hire us for any |
| jobs I got pretty sick of them and sent them a bill of DKr 5000, billing |
| them for my article.=20 |
|
|
| Of course, they won't pay me (would rather go to court) so now I'm |
| considering taking them on their word. The company I'd be going after |
| is a daughtercompany of Coopers & Lybrand and is called Institute of |
| Datasecurity. Most of their employees seem to be notorious idiots, always |
| proclaiming themselves in the media with the anecdotes of yesterday. They |
| even gave out an award (money) to the DA who prosecuted us for doing |
| a nice job!=20 |
|
|
| Well, since they didn't only violate my personal copyright but also the |
| restrictions of Phrack Magazine itself, I wanted to know if I could get |
| your support? Just some kind of written statement about the policy of |
| the magazine, whether or not they paid you for it, etc. |
|
|
| In a hurry, dont mind the mistakes, |
|
|
| Le Cerveau |
|
|
| [ Can you please send a photocopy of that article to us at the Phrack |
| mailing address? Maybe we can help. |
|
|
| I really don't have much respect for the accounting firms "computer |
| security" teams, and never have. In the years they've been doing this |
| work, they STILL don't get it. |
|
|
| It's too bad you aren't in America. You could probably sue the living= |
| hell |
| out of everyone involved, if they really did publish your names |
| and advise people not to hire you for work. ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| HEY Whats up, |
| I was wondering if U could tell me how to e-mail bomb Please!!!!=20 |
|
|
| [No, that's a stupid thing to do. |
|
|
| But, if you insist.... |
|
|
| Go do a WWW search for the program "UpYours" This should |
| suit your needs just fine. ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Hello, |
|
|
| I was wondering if you know where i can get copies of "The Journal of |
| Privileged Information"? I have issues 1-5, and i`m looking for 6 - |
| present. If you know where i can get them, it would be greatly |
| appriciated!! thanx |
|
|
| techcode |
|
|
| [ I'm not really familiar with this magazine, but if anyone out there |
| has copies of this, email us with information on where to get more. ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Dear Phrack, |
|
|
| Great job on issue 49. I enjoyed the section in Line Noise about ID |
| machine hacking. Anyway, I wanted to say that Phrack rules; it is by |
| far my favorite computer hobbyist magazine. By the way, I remember reading= |
| a |
| letter that a reader sent in, about some queer selling bound volumes of= |
| Phrack, |
| LOD Tech Journals, and virus source code. A similar occurance happended to |
| me when I found that some wannabe-elite pseudo-hacker was selling printed |
| copies of Phrack, 40 Hex, Digital Free Press, and Xeroxed copies of= |
| alt.2600. |
| I was curious, to say the least, and felt compelled to defend the honor of |
| those aforementioned publications. I talked to the fag, and I gained his |
| trust by using undecipherable hacker jargon that he seemed awed by. It= |
| turns |
| out that he had been distributing pirated junk on his PC, using an= |
| unregistered |
| copy of Serv-U. I gave him a registration crack, and in return he gave me= |
| an |
| account on his machine, so I could download his warez. I logged on to |
| his PC one day, and I quickly found the serv-u.ini file with the encrypted |
| passwords. |
|
|
| Since Serv-U uses Unix style encryption, I cracked his personal account |
| in about 17 minutes. He kept a TCP/IP connection open from 4pm to 11pm |
| every evening, and I logged on as him one day. I uploaded a virus to the |
| windows system directory and renamed it something benign, and then I edited |
| his autoexec.bat to execute it (I also used Fixtime from the Nowhere |
| Utilities 2.0 to make it smooth). I haven't heard from him since. That |
| one was a simple job to protect the rights of cool magazines like Phrack! |
|
|
| Take it easy, and keep the issues coming. |
|
|
| dethbug |
|
|
| [ If only all readers were as loyal. Or better yet, if only all readers |
| sent us a dollar! |
|
|
| Seriously though...a virus was a bit much, but since we weren't there |
| to sue to protect our copyright... |
|
|
| But uh, let it be known that you were not directed by, nor acting as an |
| agent of Phrack Magazine, and any and all such behavior was done |
| purely on your own behalf. :) ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Does this cost anything ?=20 |
| LORDCYBRON |
|
|
| [ Unfortunately it does, but only your mortal soul. ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Phrack, |
|
|
| We would like permission to republished Chris Goggans' |
| (Erik Bloodaxe) editorials from issue 4.42 to issue |
| 7.48 in Node9: An E-Journal of Writing and Technology. |
|
|
| http://node9.phil3.uni-freiburg.de |
|
|
| There is a lot of interest in hacker culture in |
| cultural studies, and Chris Goggans' editorials give |
| a good snapshot of the hacker's side of the from |
| last three years.=20 |
|
|
| We could tell our readers to simply go to Phrack and get |
| the editorials themselves, but putting the editorials |
| together makes them more effective. Plus, for many of |
| our readers, a number of names, terms, events need to |
| be annotated. |
|
|
| Jon Adams=20 |
|
|
| [ Well Jon, Phrack has always had a policy of letting people reprint |
| articles / editorials / whatever as long as all pieces remain |
| intact with all credit given to the original author and to Phrack |
| Magazine. If you can do that, feel free to use the editorials. ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Hi Hackers |
| =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D |
|
|
| I have only one question for you, please answer me. I read in your magazine |
|
|
| > =3D=3DPhrack Magazine=3D=3D |
| > |
| > Volume Seven, Issue Forty-Eight, File 10 of 18 |
| > |
| > Electronic Telephone Cards: How to make your own! |
| > ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
|
|
| Its very excelent for people who live in country when used the cards from=20 |
| Gemplus, Solaic, Schlumberger, Oberthur: (French cards 256 bit). But I live= |
| in=20 |
| Slovak Republic and in this country we use The cards from ODS, Giesecke &=20 |
| Devrient, ORGA Karten systeme, Uniqua, Gemplus, Schlumberger and Oldenbourg= |
| =20 |
| Kartensysteme (German cards 128 bit). |
|
|
| I am was reading in some paper that some people have emulator of these=20 |
| telephone cards (German card). Emulator with PIC procesor. |
|
|
| But I very very long time searching Internet and I have not information how= |
| =20 |
| I make this emulator. Only in your magazine I found help how I make=20 |
| emulator but emulator which emulate french telephone card but I need=20 |
| emulator which emulate german telephone card. |
|
|
| Please help me if You know some adress where I can find information=20 |
| HOW I MAKE TELEPHONE CARD EMULATOR (WITH PIC PROCESSOR) WHICH EMULATE=20 |
| TELEPHONE CARD TYPE GERMAN TELEPHONE CARD (128 BITS). |
|
|
| Thanks very much, for your answer. realllly thanks, i am waiiiiting. |
|
|
| !!!!! M A X O !!!!! |
|
|
| [ Actually, we don't but perhaps this request will bring in some |
| information from people in Germany. ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
|
|
| Can you please send me some hacker stuff that I can use on AOL. |
|
|
| THANX |
|
|
| [ The most important tool a hacker can have is a brain. Unfortunately, |
| since you are on AOL, it appears that your tool box is empty. Perhaps |
| you'd be more interested in some cool beavis & butthead .WAV files... ] |
|
|
| ---------------------------------------------------------------- |
|
|
| Looking for talented hackers for special projects. |
| First project concerns breaking source code. Please respond. |
|
|
| Justin Raprager=20 |
| <adamas@raprager.com> |
|
|
| [ You probably can't afford any of us on the Phrack Staff. |
| Your request is being passed on the the readers. ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Is your web site the best kept secret on the Internet? |
|
|
| We'll promote it to 50 search engines and indexes for $85 |
| and complete the job in 2 business days. Satisfaction is |
| guaranteed! |
|
|
| Owl's Eye Productions, Inc. |
| 260 E. Main Street |
| Brewster, NY 10509 |
| Phone: (914) 278-4933 |
| Fax: (914) 278-4507 |
| Email: owl@owlsnest.com |
|
|
| [ Now, if our site is a secret, then how did you morons know about us? |
| I think a better sales pitch is: |
|
|
| "Is your Web Site Secure?" |
|
|
| We'll give your info to several million hackers for FREE who will be |
| sure to subject it to an extesive battery of security testing ranging |
| from exploitation of remote security vulnerabilties to denial of service |
| attacks. Your site will be profiled continuously for months until |
| people grow tired of causing you grief. |
|
|
| Would Owl's Eye Productions, Inc. care to be the first for this |
| amazing new service? Let us know. ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| From: Ray Wardell <ray.wardell@novix.com> |
| To: phrack@well.com |
| Subject: FUCK YOU |
|
|
| FUCK YOU ... YOU DUMB ASS SHIT HEAD... FUCK WITH ME AND DIE... |
|
|
| [ Uh, ok. ] |
|
|
|
|
| ----------------------------------------------------------------------------- |
|
|
|
|
| Hi, I would like to become a hacker. I just watched that movie HACKERS. It |
| got me all siked up. If you could give me some information on how to |
| become one, I would be apreciative. |
|
|
| [ So if you had watched "Buttman Goes To Budapest" then Stagliano would |
| be getting this email instead of Phrack? |
|
|
| Dude...it was only a movie. And a bad one at that. ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Hi there ! |
|
|
| Your article of the PIC16C84-Phonecard includes a uuencoded part |
| that contains the file "telecard.zip". telecard.zip contains the file |
| telecard.pcb which was created with Tango PCB Series 2. |
| My version of Accel Tango PCB Version 12 is not able to read this file. |
| So, I want to ask you, if its possible to send me this file in ASCII-Format |
| or (better) in a graphic-format like PCX or GIF. |
| A HP-Laserjet-prn-viewer would be useful, too. |
| I was also not able to read the schematic-file. Maybe you know a |
| location on the internet where I can get an evaluation version of the |
| older version of Tango PCB Series II. |
|
|
| [ Actually, we've got the same problem here at Phrack. Anyone out there |
| who can help, please send us email and we'll get it out to the |
| masses! ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Hi my name is Konrad. I live in Ottawa, Onratio (Canada). I have a |
| question about one thing. When I download a trial program from internet, |
| it is only good for 30 days, and when it expires it writes that, to some |
| file so I tried reinsalling and redownloading the program, but when I |
| tried to run it, it gave me a message that this version is expired and |
| that I have to purchase the program. Do you know, to what file it |
| registers that it has expired, and how to disable it. If you don't know |
| how to do it, maybe you know someone that might be able to do it, and |
| forward my address to them. It is very important to me, because I'm |
| finishing a home page called Teen Online and my graphic program expired |
| (TrueSpace2) and there is no way that I can afford it, so I rather stick |
| to trial version. Ok... Thanks for your time.=20 |
| Konrad |
|
|
| [ Usually you can simply reinstall these trial programs and use them |
| for another 30 days. With others, you can change your system date |
| back, or edit a date in an INI file. It all depends on the program. |
| Try some of these things and let us know what works. ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Why don't you write somthing for the bulgarian hackers? |
| (recent:take a look at everything that happened in Varna, Bulgaria this= |
| year) |
|
|
| M a n i a X K i l l e r i a n |
|
|
| [ We'd love to print something about the Bulgarian scene. Honestly, |
| I have no idea what happened in Varna, nor would I know where to look. |
|
|
| Here's a novel idea: Since you are IN Bulgaria, why don't you |
| write something about it for us! ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| I'm using BPI Accounts Receviable System Version 1.10 for IBM |
| Released September 1983 |
|
|
| It has whats called a "key disk" that allows only the person with that |
| disk to closeout the program or month. The problem is this, when I make |
| a copy of this Key Disk the files match the original to the T.. There are |
| only 2 files involved. But, when I try to closeout, BPI asks me to insert |
| the Key Disk and press enter to proceed. When I do this with the "copy" |
| of the Key Disk the BPI program tells me that the copy is not a Key Disk. |
| This only happens with the copy, any ideas?=20 |
|
|
| Both Key Disks contain the same information. If I try to activate the |
| close directly from the Key Disk Copy it tells me that it can't find a |
| file, basrun.exe I checked and this file is part of the BPI Directory on C: |
| I've used this accounting software for many years and it works well. |
| But I'm afraid the good Key Disk may go bad one day and I'll be stuck. |
| Thats why I'm trying to make a copy. Any help would be appreciated. |
|
|
| [ Obviously there is something else on that disk that a normal copy |
| is not getting. Maybe something as simple as a volume label or |
| some hidden files. |
|
|
| The easiest thing to do to get around this is make a sector by sector copy |
| to a disk image file using some kind of program like the UNIX command "dd" |
| and then copy that image back onto a blank diskette. ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Hi! |
|
|
| Here I have something for you, which may be interesting in your news= |
| section. |
|
|
| Sometime during the night between Saturday April 5th and Sunday April 6th, |
| hackers broke into one of Telenor Nextel's webservers and deleted the= |
| homepages |
| of 11.000 private customers and 70 corporate customers, among them the= |
| homepages |
| of Norway's two largest newpapers VG and Dagbladet, and the largest online= |
| news |
| magazine, Nettavisen. |
|
|
| The hackers somehow got access to hidden scripts, and after modifying and |
| manipulating them ran them, thereby deleting all the files mentioned. |
|
|
| Early Sunday, the ISP Telenor Nextel started restoring files from a backup= |
| made |
| Saturday, but after encountering problems with that one, they had to restore |
| from Tuesday's backup. Saturday's backup will be added sometime during= |
| Monday. |
| =D8kokrim, Norwegian police's department for Economic Crime has been= |
| contacted. |
| =09 |
| Reactions: |
|
|
| Sverre Holm of Norway's Organization for Internet Users (http://www.ibio.no) |
| criticize Telenor for lack of proper information, as well as an unhealthy |
| attitude. In response to Telenor's comment that they can't guarantee this= |
| won't |
| happen again, he says, "Such an attitude can't be tolerated. If this is what |
| Telenor means, then we have a serious problem here." |
|
|
| Other reactions will surely come in the next days. |
|
|
| References (all in Norwegian): |
|
|
| Telenor Internett: |
| http://internett.telenor.no/ |
| Scandinavia Online: |
| http://www.sol.no/ (Telenor's online service) |
| SOL Direkte: |
| http://www.sol.no/snpub/SNDirekte/index.cgi?kategori=3DNett-Nytt |
| Nettavisen: |
| http://www.nettavisen.no/Innenriks/860330846.html |
|
|
| I hope this could be interesting to you, and a candidate for your news flash |
| pages. Unfortunately, any references included are to pages in Norwegian, but |
| anyone with you speaking either Norwegian, Swedish, or Danish should be able= |
| to |
| get more information. |
|
|
| Cheers, |
| O L I K |
|
|
| [ We here at Phrack always want to know what is going on out there on |
| planet Earth. Keep us informed of anty other developments! ] |
|
|
|
|
| ----------------------------------------------------------------------------- |
|
|
|
|
| I'm investigating some informatic viruses who infect images generating |
| new fractalized images with a never seen beauty and singularity. Or may=20 |
| be they investigate me. These viruses could broke sohemer in many diverse=20 |
| disciplines like art, artificial life, fractals maths, digital image..=20 |
| if you look web's images http://antaviana.com/virus/angles.htm you will=20 |
| understand everything. I would be acknowledged if you could help me, and=20 |
| it is posible i would like you to diffusse this subject in your interesting |
| publication. |
|
|
| In the name of biodiversity, if you have these VIRUSES, |
| PLEASE DON'T DISTROY THEM. |
|
|
| [ Ok. We won't. ] |
|
|
|
|
| ----------------------------------------------------------------------------- |
|
|
|
|
| Hi ! |
|
|
| I read In Volume Seven, Issue Forty-Eight, File 11 of 18 - How to make own |
| telephon card . But when i try to make it , this card didnt work ! I try |
| all things, and i try to find more informations about telephone cards, but |
| i still dont know what's wrong ! |
| But today i found on http://www.hut.fi/~then/electronics/smartcards.html |
| that there is some errors, but there is no information what's wrong.=20 |
| So i decidet to write to Phrack magazine , becouse in article is eriten to |
| mail all questions to Phrack....=20 |
| Please send me info what is wrong, and how i must change the ASM program to |
| work correctly or just PLEASE send me email of contact person who knows how |
| to !! |
|
|
| Thanx in advance ! |
|
|
| Marko |
|
|
| [ Obviously that little smartcard article caused a stir. We've got all= |
| kinds |
| of email about it. We'll see what more we can dig up, but we are going |
| to really need some help from Europeans and South Americans. (Smart |
| cards are not in use here in America!) ] |
|
|
|
|
| ----------------------------------------------------------------------------- |
|
|
|
|
| LOA is back!!! Visit our new page at: |
|
|
| http://www.hackers.com/LOA |
|
|
| Check it out and be sure to send your comments to revelation@hackers.com |
| Volume 2 of The Ultimate Beginner's Guide To Hacking And Phreaking has been |
| released as well, so be sure to download it and send me your comments. Be |
| sure to check out the LOA Files section to view and download past, present, |
| and future LOA Projects. Take it easy all... |
|
|
| [ No offense intended, but did you ever wonder why there were so many |
| "Legions of" whatever after LOD? |
|
|
| We'll put a link up to your page though... ] |
|
|
|
|
| ----------------------------------------------------------------------------- |
|
|
|
|
| Hey, did you know that Juno (the nationwide free email service) has PPP |
| access? Free? To superusers only? Who login directly to their terminals |
| that have no ANI? And that they are complete fucking idiots, because in |
| every juno.ini file buried deep in the /juno/user00000x/ directory there is |
| a section called "Variables" which lists at least one Juno server account, |
| i.e. "junox14" and a password for it. These work. Not that I've tried them, |
| or do this, or can be held in any way legally responsible for my non-PGP |
| encrypted actions, which do not show my views, and are protected under the |
| 1st Amendment. |
|
|
| Sorry, didn't feel like using alternate caps today. |
|
|
| l8r, |
|
|
| -dArkl0rd- |
|
|
| [ Interesting. We'll have to get the Juno software and play |
| without the advertisements! |
|
|
| Thanks, Mr. Shaw ] |
|
|
|
|
| ----------------------------------------------------------------------------- |
|
|
|
|
| Hi. I've got a strange request. We're putting together a case that |
| encourages the U.S. to loosen its encryption export policies. |
|
|
| Do you know of any written resources that discuss the ability of hackers |
| to break into NASA, tamper with launches or satellites? The folks at |
| infowar.com insist that it is possible, but say that confidentiality |
| won't allow them to publish that fact. |
|
|
| We need written evidence to document the case, you understand. |
|
|
| Anyway, I'd appreciate hearing from you. |
|
|
| Jonathan |
|
|
| [ I'd suggest you talk to Emmanuel Goldstein at 2600. The whole |
| satellite thing came from a bogus post back in the early 80's |
| on a BBS in New Jersey called "The Private Sector." Reporters |
| siezed on it, resulting in headlines like "Wiz Kids Zap Satellites." |
|
|
| 2600 wrote about this in I believe 1984 or 1985. Check with them for |
| better details. ] |
|
|
|
|
| ----------------------------------------------------------------------------- |
|
|
| Queridos crackeadores: |
|
|
| Les quiero pedir si no saben de donde puedo sacar programas para |
| crackear y phrackear. |
| =20 |
| Desde ya mucahas gracias: |
| Mauricio |
|
|
| [ Existan muchos programas en sitos de FTP y WWW en todos los piases |
| del mundo. No sabes de donde puedes sacarlos? Compredes |
| "Webcrawler" o "Excite"? Dios mio. ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Hi Phrack; |
|
|
| Intro to Telephony and PBX systems in Phrack#49 was excellent, pulled a=20 |
| lot of things together for me. That's probably the clearest, most=20 |
| concise explanation of the phone system that I've ever read. Hopefully=20 |
| Cavalier will be up for many more articles like that in the future. |
|
|
| respects, |
| jake |
|
|
| [ Thanks! Hopefully we can continue have more telephony related articles |
| in the future. It is fast becoming a lost art in today's hacker |
| community. ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
|
|
| hey.. a Note To Say, 1-Greetings From IreLand.. |
| 2-Thanks A million.. I love Phrack.. |
| 3-Where Is The NexT Issue.. Whats up doc..=20 |
| 4-do ya have info/schematics on the shit that allows one |
| to break into cellfone conversation and chat briefly |
| to callers, as described in winn schwartaus excellent |
| article on Defcon ][ ?Cellfone |
| 5-Is Phrack on a Mailing List?? if so, Can ya Stick me |
| On it? |
| Many ThanKs |
| NasTy Nigel, |
| [PhreaK PowEr] |
|
|
| [ 1. Greetings to you too gobshite! |
| 2. Thanks! |
| 3. You're reading it. |
| 4. Not that I was in the room making those calls mentioned |
| in that article or anything, but... :) |
| An Oki-900 with CTEK cable hooked to a PC running omnicell tracking |
| calls. A motorola brick phone in debug mode, hooked to a 25db gain |
| yagi antenna (on a tripod) pointed out the window. As Omnicell locked |
| in on interesting calls, the Motorola was tuned to the corresponding |
| channel, Tx Audio turned on, various humorous interrupts were uttered, |
| and Tx Audio turned off so the party being "contacted" wouldn't be |
| thrown off their cell channel by our more powerful broadcast. |
| Very simple. |
| 5. The mailing list now is so huge that it will only serve to let people |
| know when issues are going out, special bulletins, etc. Mailing out |
| a meg to almost 30,000 people causes serious problems to the Internet, |
| so we decided to make the change. ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| I just wanted to drop a line and say that you guys are doing a great job |
| with the zine. I just got issue 49 and I'm looking forward to reading it. |
| I'm sure you've heard of The Works, the bbs with the most text files in the |
| US. Well, it's finally back online, after six months in the gutter. For the |
| best text files and the coolest users east of the Mississippi, call us up. |
| +1 617 262 6444. You can't go wrong with the Works. We want you to call. |
|
|
| [ It's amazing that BBSes like The Works are still around, even with a bit |
| of down time. What's it been? 10 years? Geez. |
|
|
| You're approaching the longevity of Demon Roach or P-80. ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| I'm doing research on hackers for my LIB 105 class and have come across |
| some of what I guess is tech speak or jargon. I've noticed that the |
| letters 'PH' are frequently used to intentionaly mispell the words |
| phreak, lopht, and in Phrak Magazine. Is there a reason behind all of |
| these PHunny spellings? |
|
|
| [ Uh, PH as in Phone. From the old Phone "Phreak" subculture of the |
| late 60's, early 70's.] |
|
|
| ----------------------------------------------------------------------------- |
|
|
|
|
| I think a great idea for a future article would be how to make a decoder |
| card for a DSS sattelite reciever with some easy commercial stuff and a |
| cmos Z-80 I.C. ... |
|
|
| [ If it were that easy, there would be a bigger number of players in the |
| billion dollar industry of satellite piracy. A key figure in that |
| closed community once told me that it cost them about $1,000,000 US to |
| crack each new rev of smart card. (But when you figure that means only |
| selling 10000 pirate cards at 100 bucks, the cost of doing business |
| is minimal, compared to the cost of the service provider sending out |
| new software and cards to each subscriber.) ] |
|
|
|
|
| ----------------------------------------------------------------------------- |
|
|
| Hi, I am a Primestar installer, I was wondering if you knew anything about |
| how to stop Primestar from de-authorizing their unused IRD's? I know of 2 |
| installation screens accessable through the password screen using #'s 996 & |
| 114, do you know of any others? I would appreciate any info you might have. |
|
|
| Thanks, |
|
|
| [ And Phrack would appreciate ANY info you have! ANYTHING! EVERYTHING! |
| As an installer, you probably have some insights into the cards/recievers |
| that we don't. Write them up! ] |
|
|
|
|
| ----------------------------------------------------------------------------- |
|
|
| For certain reasons, some people may want to create a new anonymous mail |
| box. Did they considered to create it in France? |
| A lot of IPS offer the possibility to create mailboxes to those who have |
| no computers by using a primitive look-alike telnet system: the French |
| Minitel. This is convenient because a couple millions of Minitel have |
| been freely distributed in France during the last ten years. The only |
| cost is that an overcharge is billed to your phone bill of approx |
| 35cents per minute. But this is perfectly legal and hard to trace back. |
| Hyperterminal (at least in its french version) emulates the french |
| minitel. |
|
|
| The only thing is to dial 3615 in France and use one of this server: |
| ABCNET, ACENET, ADNET, ALTERN,FASTNET,EMAIL... |
| For example, EMAIL creates an e-mail adresse like: |
| pseudonym@xmail.org. |
|
|
| The only thing is that you have to know a little bit of French to use |
| it, but just a little bit. The cost of a call (International and |
| Minitel overcharge) should not be a problem to some of you. |
| LeFrenchie |
|
|
| [ This is a good idea. People outside of France don't know much about |
| Minitel, (Or any videotext systems) since they failed in a big way |
| here in the states and most other countries. Many old hackers might |
| remember some of the Minitel Chat systems also accessible over X.25 such |
| as QSD (208057040540), but without emulation software wouldn't have |
| ever had access to the real Minitel. ] |
|
|
|
|
| ----------------------------------------------------------------------------- |
|
|
| Two questions |
|
|
| 1 How can I connect to an IRC server though a firewall? |
| 2 How can I intercept messages sent to chanserv and nickserv on Dal.net? |
|
|
| Thank you. |
|
|
| [ 1. Open up ports 6665-6667 |
| 2. Set up a hacked IRC server. Get someone important to add it to the |
| EFNET server hierarchy. Look for PRIVMSG to whomever you want. ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Hello, |
| A modem has a light buffer between the copper wires of the |
| telephone line and the rest of the copper printed circuit ( mother) |
| board. How ( or does) does a firewall prevent hacks on a system or |
| is this just a matter of Modern (Mastodon) buffalo hunting: They |
| go down the same big or small. Specifically , beyond smart self |
| learning systems can a server realy prevent contamination without |
| the intervention of beings? My sister a suposed Webmistress says |
| there are intervening buffers, I still see that between what ever, |
| there is a very big freaking leap of faith.. |
| Senor Please Elucidate |
| Richard |
|
|
| [ Uh, if you think the "firewall" is that light buffer between the wires, |
| then you have missed the point. A firewall in the networking context is |
| not the same as the metal firewall in your automobile....it is merely |
| a metaphor that has been adopted as the term d'jour. |
|
|
| Please read: Building Internet Firewalls by Brent Chapman & |
| Elizabeth Zwicky or Firewalls & Internet Security by Cheswick & Bellovin ] |
|
|
|
|
| ----------------------------------------------------------------------------- |
|
|
|
|
| > Drop us a line on what you think of 49. Comments are encouraged. |
|
|
| I think issue 49 was great, not to mention getting it out on time. I do have |
| a suggestion though. The past few issues of Phrack have focused mainly on=20 |
| UNIX and not much else. I think UNIX is a great OS, but it would be cool if |
| occasionally you would print a few articles about other systems. I would=20 |
| write one myself but right now I don't have anything new to contribute.=20 |
|
|
| Later, |
| Tetbrac |
|
|
| [ This has been a request for a long time. Hopefully we'll get some |
| articles on other operating systems some day. Personally, I'd like |
| to see VMS, MVS and OS-400. Any takers? ] |
|
|
|
|
| ----------------------------------------------------------------------------- |
|
|
| I just finished reading issue 48, and congratulate you on some excellent |
| techinical articles. I have only one (rather insignificant) comment: |
| within the article #13 on project neptune, it was stated: "[the urgent |
| pointer] is TCP's way of implementing out of band (OOB) data." Actually, |
| URG pointers are in band (specification-wise), however most (but not all) |
| TCP implementations map the URG flag to out of band. While this point is |
| irrelevant to SYN flooding, I thought I would present it in case anyone who |
| read the article is interested in pursuing any nuts & bolts transport layer |
| implementations. Keep up the good work, and keep turning out more of this |
| kind of technical information. |
|
|
| ammit-thoth |
|
|
| [ Point noted. Thanks! ] |
|
|
|
|
| ----------------------------------------------------------------------------- |
|
|
| Listen... you've probably been noticing that I've mailed you guys a |
| couple times asking for help with hacking. Before I have never recieved |
| any mail back. You have got to please mail me back this time. I found |
| something on accident that is really out of my league. You guys are the |
| best I know of that might be able to help me. I really need your help on |
| this one. I was fucken around on Telnet just typing in numbers in the |
| Chicago area code. On accident I typed in numbers and I entered a NASA |
| Packet Switching System ( NPSS). It said it was a government computer |
| system and to leave right away. Please mail me back for the numbers. I |
| need your help to get into this system.... I need yer help. |
|
|
| [ Let me guess, you typed the prefix 321 instead of 312 while playing |
| on Telenet. The systems you'll find on that prefix have been hacked |
| at for nearly two decades now. Systems on the network were targeted |
| in the 80's by Germany's Chaos Computer Club, and I personally know |
| they have been poked at by groups in the US, UK and Australia |
| starting back in 1981. |
|
|
| What I'm trying to say is, after so many years of people beating on the |
| same few systems, shouldn't you look for something a bit less stale? ] |
|
|
|
|
| ----------------------------------------------------------------------------- |
|
|
| Dear phrack, |
|
|
| I want to be added to the list. I was also wondering if you had ay |
| publications or information on TEMPEST monitoring? Also know as Van Eck |
| monitoring. |
|
|
| [ We published a Dr. Moeller's paper continuing on Van Eck's work |
| in Phrack issue 44. |
|
|
| You might also want to check out http://www.thecodex.com |
| for a self-contained anti-tempest terminal for about 10K. ] |
|
|
|
|
| ----------------------------------------------------------------------------- |
|
|
| I just read your editorial in Phrack 48 and I feel like giving you my two= |
| cents |
| worth. I think you did an excellent critique on the "scene." As a person |
| who has been watching for a while, and as a person who has been through it, |
| I found it nice, to say the least, to find others who actually seem to have |
| their head on straight. This letter was originally much longer, but I |
| shortened it because I think you get the point. |
|
|
| I started programming computers in 1983 at the age of 6. I was running |
| DOS 2.0 and I had a blazing fast 1200 baud modem. At the time, I had |
| no mentors, no teachers, no friends that could teach me how to use that |
| incredible machine. The books of the time were cryptic, especially for an |
| age where most children could not read, much less program. But I did my= |
| best. |
| Ten years later, I was still on my own. |
|
|
| I didn't get ahold of a copy of Phrack until 1991. I thought it was really |
| cool that people like me would get together and exchange infomation, talk |
| computers, etc. |
|
|
| In '94, I got into viruses and prolly was one of the better independant |
| (i.e. not in a group) writers. It was about that time I got onto IRC. |
| Most of the time I would hang out in #virus, but every now and then I |
| would pop into #hack. I never stayed...I couldn't stand the arrogance. |
|
|
| Shortly before I went to school, I was in competition for control of a |
| new freenet versus a local hacker group. A month after I went to college, |
| that group got busted. I got lucky. |
|
|
| Earlier this year, I went on Good Morning America to talk about viruses. |
| Looking back, it is prolly the single dumbest thing I have done in my |
| whole life. |
|
|
| As much as I wanted to, I've never been to a 2600 meeting, never been to |
| a Con. Never really had any hacker friends. It's always been just me. |
| I'm sure I know less about breaking into computers than the guy who has |
| been doing it for a week but has access to tons of partners. But I still |
| consider myself a hacker. My interest has been one of learning about the |
| system. I've been learning longer than most. I rarely break into |
| a system. I have access to unix systems, and even a VAX. I don't want |
| the latest hacking tools. I write my own, with my theories. I don't |
| need much else. But I've never had anyone to share it with. But I think I |
| realize that the past is the past, and I won't ever get to attend the old |
| cons or sit on conference calls, as much as I'd love to. I won't bother |
| with the latest cons because I can get the same stuff at a college party. |
|
|
| Well, that is about it. I apologize if it is poorly written. Bad english |
| skills :) I hate writing these because I grow tired of getting slammed |
| by some arrogant asshole. Thats prolly why I have been doing this alone |
| for 13 years. After your editorial, I wonder how many people will stop |
| showing up at the cons...I hate the isolation, but I would never want to |
| be a part of a "scene" which has turned from mature goals to juvenile |
| ones. Just my thoughts... |
|
|
| Evil Avatar |
|
|
| [ Actually, I have more respect for the people who continue to stay in the |
| fringes, learning on their own rather than scurrying for attention |
| in the media and in the community. (Yes, like me.) |
|
|
| To be fair though, don't sell yourself short by avoiding Cons if you |
| really want to check them out. Despite all the ranting I did in that |
| editorial, I still have many friends in the community and enjoy |
| meeting new ones at conferences. Not everyone thinks it is cool |
| to trash a hotel, or to try to out "elite" one another. Unfortunately, |
| the loudest and most visible people at such events tend to be the |
| most juvenile. If you find this happening, do what I do: get the |
| hell out of the conference area and find a convenient bar. The older |
| hackers will eventually find you there, and you can all drink in peace |
| and actually talk unmolested. ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
|
|
| Dear Phrack -- |
|
|
| Been a reader since the 80s, and I'm one of the originals... Would like |
| to submit a poem that I wrote that details the experience of a hacker |
| who left the scene for several years -- Coming back to find it in utter |
| Dissaray... Definitely not the way he left it... Well -- You guys will |
| let me know what you think |
|
|
| "Where Have All The Hackers Gone"? |
| ---------------------------------- |
|
|
| Original Poetry by: Jump'n Jack Flash -916- |
|
|
|
|
| On a cold night in the dead of winter a soul stumbles into #hack and asks: |
| 'Where have all the Hackers Gone?' |
|
|
| Immediately the group recognizes him as one of the originals. |
|
|
| 'Help us change our grades!' a voice calls out from the huddled masses. |
| 'Help me hack root on a NYNEX system!' another voice asks. |
|
|
| The soul clutches his bowed head and covers his ears, trying to remember |
| back to before he involuntarily left the scene a few years ago. |
|
|
| 'The only thing that kept me sane while I was imprisioned was the |
| thought of seeing my friends and fellow hackers, now I demand you tell |
| me Where Have All The Hackers Gone?' the soul begs the crowd of jubulent |
| newbies. |
|
|
| Silence is the only answer he receives, |
| For there are no real hackers here. |
|
|
| Then a voice speaks up and says, |
| 'They're gone! You're the first we've seen!' |
| The soul asks, |
| 'What do you mean?' |
|
|
| And Silence is the only answer he receives, |
| For there are now real hackers here. |
|
|
| And like a wall crumbling down it comes to him and he falls to his knees, |
| like hunting for human life after a Nuclear war he stumbles out of the room, |
| And he hurries to the place where only the Elite could go just a few years= |
| ago, |
| But when he arrives he is shocked and amazed, |
| There are no hackers here on this dark winter day. |
|
|
| And he stumbles into traffic, |
| feeling the snow crunch beneath his feet, |
| and he shouts into the night for the elite, |
|
|
| 'Where Have All The Hackers Gone?' |
|
|
| And Silence is the only answer he receives, |
| For there are no real hackers here. |
|
|
| [ Nice poem man...thanks! |
|
|
| Where did the hackers go? They grew up and got real jobs... ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| I'd love to say that I'll miss Erik, but after that obnoxious, immature |
| rant, all I can say is good riddance. Now maybe Phrack will be useful |
| again. |
|
|
| [ Well, I guess not everyone agrees with me, which is a good thing. |
| But, uh, I'm not gone man...just narrowing my duties...so fuck you. :) ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
|
|
| '' WARNING '' |
| COVERT EXTERMINATION OF THE POPULATION. !!!=20 |
| THE UNITED NATIONS=3DNEW WORLD ORDER HAS TURNED AMERICA INTO A |
| EXTERMINATION CAMP. THE PENTAGON GERM '' AIDS '' WAS CREATED |
| AT A GERM WARFARE LAB AT FT, DETRICK, MD. AIDS AND CANCER CELLS |
| ARE BEING INJECTED INTO PEOPLE UNKNOWING UNDER THE GUISE OF VACCINES |
| AND SOME PHARMACEUTICALS. |
|
|
| SOMETIMES THE TRUTH IS SO UGLY WE DO NOT WANT TO BELIEVE IT. !! |
| AND IF WE DO NOTHING, THEN WE DESERVE IT. ! |
| BELIEVE IT OR NOT. DISTRIBUTE WIDELY. |
| '' HACK OR CRACK THE UNITED NATIONS =3D NEW WORLD ORDER. '' |
| LONG LIVE THE POWER THROUGH RESISTANCE.'' !!! |
|
|
| SONS OF LIBERTY MILITIA |
| 312 S. WYOMISSING, AVE. |
| SHILLINGTON, PA. 19607 U.S.A. |
| 610-775-0497 GERONIMO@WEBTV.NET |
|
|
| [ It's about time we got some mail from some kind of Militia-types! |
| Let's all arm up to prepare for the revolution! A healthy dose |
| of AK-47's and PGP will save us all from the ZOG hordes when the |
| balloon goes up. |
|
|
| Hey, have you guys read the Turner Diaries by Andrew Macdonald? |
| Get it from Barricade Books, 150 5th Ave, NY, NY 10011. |
|
|
| Ahem. ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| i want a credit card generator |
|
|
| [I want a pony] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Hello !!! |
|
|
| I just read in P48-02 the letter of the russian subscriber who tells you=20 |
| (the editors) the story about the FAPSI and they plan to order all=20 |
| ISPs to provide for a possibilty for them to read all the mail. |
|
|
| In the editor's note below that you say that you fear your country (I assume |
| it's the USA) is also heading towards that goal.=20 |
|
|
| Well, I live in Germany, and it has already happened here. That means,=20 |
| every ISP (and this is not the exact term, as it also includes all sorts |
| of information providers, ie telephone companies - but excludes=20 |
| private BBSs, I believe) are forced to provide a method that not only |
| - Allows the government/police to read everything that is written but also |
| - Without even the ISP noticing it (though I don't know how this would=20 |
| be ensured, technically). |
| =20 |
| OK, this is not the same as in Russia, as they don't copy ALL the mail and= |
| =20 |
| news, but only that of persons suspected of a crime strong enough=20 |
| to allow it, ie it's the same thing that's needed to open people's=20 |
| mails. Still, I feel it's certainly a step in the wrong direction. |
|
|
| Note that cryptography is not (yet ?) forbidden in de. |
| =20 |
| Regards,=20 |
| =20 |
| Thomas=20 |
|
|
| [ Germany? Governmental rights violations? Say It isn't so! Should I get= |
| my |
| brown shirt out of the closet for my next visit to Berlin? :) ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
|
|
| Hello, I want to be a hacker and I need some help. I have read |
| countless reports on UNIX, VMS, and all that other jazz but that still |
| doesn't help me with my problem. |
|
|
| I want to be able to hack into someone's home PC from my own home. Now, |
| most PC's aren't capable of doing this but, this person has a |
| connection on the internet and is also linked to his work in LONDON, |
| ONTARIO at a place called IAPA. (industrial accident prevention |
| association) Anyway, he runs WINDOWS 95' and is using NETCOM. Now I |
| know his password if that does me any good, but how do I go about doing |
| this? |
|
|
| SHAOULIN |
|
|
| [ When you say "I want to hack his home PC" what do you mean? |
|
|
| Just because he uses NETCOM, that doesn't mean you can find him. He is |
| probably being assigned a dynamic IP address each time he calls in to the |
| network. Even so, let's say you can discern his IP address. Even if |
| a computer is hooked into the Internet, it is only as insecure |
| as the services it offers to the world. |
|
|
| If your friend is running Windows 95, then you may only be limited |
| to attacking any SMB-style shared directories or perhaps via FTP. |
| In either case, if you know this person's password, then you can |
| probably read/write anything you want to on their system. |
| Run a port scanner against it and see what you can access, and |
| plan based on that. ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| This message was sent to you by NaughtyRobot, an Internet spider that |
| crawls into your server through a tiny hole in the World Wide Web. |
| =20 |
| NaughtyRobot exploits a security bug in HTTP and has visited your host |
| system to collect personal, private, and sensitive information. |
| =20 |
| It has captured your Email and physical addresses, as well as your phone |
| and credit card numbers. To protect yourself against the misuse of this |
| information, do the following: |
| =20 |
| 1. alert your server SysOp, |
| 2. contact your local police, |
| 3. disconnect your telephone, and |
| 4. report your credit cards as lost. |
| =20 |
| Act at once. Remember: only YOU can prevent DATA fires. |
| =20 |
| This has been a public service announcement from the makers of |
| NaughtyRobot -- CarJacking its way onto the Information SuperHighway. |
|
|
| [ Funny, my phone isn't ringing, and my credit is still only as screwed up |
| as it was when I got through with it. ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Hi |
|
|
| I'm looking for some cellular pheaking information |
| but is verry hard to find god information |
| can giveme something to work on??? :-) |
|
|
| [ The best site going is Dr. Who's Radiophone site at: |
|
|
| http://www.l0pht.com/radiophone ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| I just have a question to ask. How would I bypass Surfwatch so that I |
| can go into web sites that I would like to see? |
|
|
| [ It is very easy to bypass SurfWatch. Stop using Mommy & Daddy's computer |
| and buy one of your own. ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| i was recently using A-Dial a couple of months ago, and came up with about |
| 10 or 12 different numbers starting at 475-1072. Curious about this, I |
| called one back, using a mini-terminal. What I expected wasn't this. What |
| it said is in the file attached to the letter. It says the same thing with |
| all of the numbers. I could use some info on what the hell this is, because |
| I never heard of Annex. Thanx. |
|
|
| Data Case |
|
|
| [ What you have connected into is more than likely a kind of terminal |
| server. From there you can usually enter a system name to connect |
| directly into the specified system, or enter in "cli" to go into the |
| command line interpreter where you have more options to choose from |
| including "help." ] |
|
|
|
|
| ----------------------------------------------------------------------------- |
|
|
|
|
| Do you know where I can find texts on hacking into the California=20 |
| Department of Motor Vehicle Records? My friend's identity was stolen=20 |
| for credit card fraud and the person who did it even went so far as to=20 |
| get a CA driver's license to impersonate her. The worst part is that=20 |
| Visa won't release a copy of the fraudulent person's fake driver's=20 |
| license to my friend, so she can't find out who this person actually is.=20 |
| Do you know of any other ways we can get this person? |
|
|
| Binky |
|
|
| [ Gee, Binky. If VISA is involved and it was credit card fraud, then |
| is the Secret Service involved too? If so, then why on earth do you |
| (or your friend) want to get in the middle of it? You'll know soon |
| enough who the person is when they get charged, or is this just a |
| Charles Bronson style vigilante thing? |
|
|
| California's DMV (as well as most public records databases in that |
| state) is kept somewhat restricted to public queries due to the large |
| number of celebrities living in the state, or otherwise you could just |
| go buy the information directly from the state. |
|
|
| If you're thinking about pulling a "Mitnick" and breaking into such |
| a database, then you better know something about IBM mainframes and |
| know how to defeat RACF. Or be willing to dig around in the trash |
| until you locate a valid account. Even if you find a valid RACF userid, |
| you will have 3-5 tries per account to guess a valid password until the |
| account is locked out (which of course will let them know you were |
| trying to hack them.) |
|
|
| For an easier solution, you might want to looking in the yellow pages |
| for a private investigator and have them do a search on Information |
| America or NIA and get the listing for you, or bribe a civil servant. ] |
|
|
|
|
| ----------------------------------------------------------------------------- |
|
|
|
|
| EOF |
|
|
|
|
|
|