| ---[ Phrack Magazine Volume 8, Issue 53 July 8, 1998, article 02 of 15 |
|
|
|
|
| -------------------------[ P H R A C K 53 L O O P B A C K |
|
|
|
|
| --------[ Phrack Staff |
|
|
|
|
|
|
| [ Ed. note: The letters are perhaps editted for format, but generally not for |
| grammar and/or spelling. I try not to correct the vernacular, as it often |
| adds a colorful perspective to the letter in question. ] |
|
|
| 0x1>-------------------------------------------------------------------------- |
|
|
| [ P52-02@0xd: ... Something you've mailed to a whiley bunch... ] |
| |
| I couldn't help but notice your use of "whiley" rather than the more common |
| English word "wily" in the above-quoted paragraph. In the future, take the |
| time to grammar and spell check your replies to minimize the emotional |
| damage you are bound to suffer. |
| --Bob Stratton |
|
|
| [ WHOA! My bad. Strat has caught me with my proverbial pants around my |
| proverbial ankles. Further evidence towards me - not - being |
| omnisicient argument (although I still believe this to be conjecture). ] |
|
|
| P.S. Thanks for the sensible code-formatting discussion. Your style sounds |
| a lot like that which kept me sane back when I earned my living writing |
| code. The enlightened person's answer, of course, is to use an Emacs minor |
| mode, and to let the editor do the work while one types. Emacs is also the |
| answer to the Windoze 95 junkie looking for something with which to read |
| Phrack. Works for me. |
|
|
| [ Amen. Except for the emacs part. pico with regexp or vim 5.0 with |
| syntax highlighting is the way to go. ] |
|
|
| 0x2>-------------------------------------------------------------------------- |
|
|
| [ P52-09: On the Morality of Phreaking ] |
|
|
| Dear Phrack, |
|
|
| I am not a hacker nor a hacker wannabe, so I had only the most passing |
| acquaintance with your publication. However, today by chance I came across |
| this article in your January 26 issue. |
|
|
| I am impressed. I did my MA in philosophy, and I was quite nonplussed to see |
| such a lucid and philosophical point of view in what is, to my understanding, |
| a very specialized publication not typically devoted to philosophy. Though my |
| areas of interest were mainly Nietzsche and Deleuze, I found your summary of |
| both Mill and Kant to be accurate and well-applied. Kudos, you obviously have |
| some very intelligent people on staff, whose talents are not limited to your |
| own area of expertise. |
|
|
| Yours respectfully, |
| Sean Saraq |
| Toronto |
|
|
| [ High praise indeed! Thank you for the compliments. It's good to see |
| we're read in communities other then that of our target demographic. ] |
|
|
| 0x3>-------------------------------------------------------------------------- |
|
|
| I can't believe you included article 12 in Phrack 50. Is Phrack really |
| getting so sad? Have you really got nothing better to publish than |
| regurgitated crypto babble? |
|
|
| [ Despite what you may think, we are not sad. The phrack compound is |
| imbibed with much conviviality and festivity. Why, every Friday is |
| `punch a mime day`. We hire a mime to come down to the office and we |
| all take turns punching him in the face. ] |
|
|
| Cheers, Chris (XORed that's Fghyud) |
|
|
| [ That's not a very good XOR implementation you have there. It appears |
| an extraneous character has been inserted. Check your pad or the stream |
| cipher. Or perhaps check your other regurgitated crypto babble for more |
| info. ] |
|
|
| 0x4>-------------------------------------------------------------------------- |
|
|
| For those readers interested in "Piercing Firewalls" (Phrack Issue 52) |
| take a look at datapipe.c available at www.rootshell.com. I can't think |
| of any way to make it work with X, like tunnel/portal, but it works fine |
| with telnet and nothing needs to be running outside the firewall. |
|
|
| ziro antagonist |
|
|
| [ Noted. ] |
|
|
| 0x5>-------------------------------------------------------------------------- |
|
|
| Okay, enough nagging about the Milla pics! |
|
|
| The one thing everyone reading Phrack wants to know is: |
| When will you publish nude pictures of dangergrl ??? |
|
|
| [ When your mom gives them back. ] |
|
|
| Yours Sincerely, |
| -anonymous. (i get kicked from #hack enuf as it is already :) |
|
|
| [ What a suprise. ] |
|
|
| 0x6>-------------------------------------------------------------------------- |
|
|
| While the Juggernaut program is interesting, I've found that its model for |
| session stealing is a tad limited. There are two issues, one of which I've |
| dealt with. First issue is the one packet read, one packet written paradigm. |
| It really should allow separate threads for read/write to avoid getting |
| easily out of synch. This I've not dealt with, but it is understandable given |
| the second, the ACK storms it creates. |
|
|
| [ Juggernaut 1.x is very primitive in many ways. Juggernaut++, the next |
| generation juggernaut, has been mostly redesigned from the ground up |
| with a 90% new code base. It has many things the previous versions |
| lacked, including: a much better interface, threading for concurency, |
| portability, effcicieny mods, and many bugfixes. ] |
|
|
| The ACK storms can be avoided with an ARP attack (or possibly an ICMP |
| redirect). Send an ARP message to the source of the connection you're |
| stealing (an ARP reply) which tells it that the ethernet address of the |
| machine it's talking to (the destination machine, which you want to talk to |
| instead) is something "off in space" like 2:3:4:5:6:7 instead of the real |
| address. This needs to be done fairly often, should be started immediately |
| before you start your hijack attack. |
|
|
| [ Indeed. As long the host will accept and cache unsolicited ARP |
| responses, this will work. ] |
|
|
| The result is that the machine you are intercepting becomes unable to talk to |
| the destination and won't desynch the session, and traffic goes to practically |
| nothing. After you stop, the ARP table will shortly expire and be updated |
| with correct information, so the attack will either appear as a network |
| glitch, or you'll get alerted (NT will alert) that an IP address conflict |
| exists (but tell nothing about what the conflict is with). Moreover, an ARP |
| reply will escape the notice of many network monitoring programs. |
|
|
| [ Something like this has in fact been implemented in juggernaut++... |
| And, just to answer the burning question I get asked so often, NO, J++ |
| is NOT publically available. ] |
|
|
| I have sent the code to the original author of Juggernaut (being inclined to |
| share knowledge) and wanted to alert you. |
|
|
| [ The original author of juggernaut and I are pretty close. I'll be shure |
| to check with him. ] |
|
|
| 0x7>-------------------------------------------------------------------------- |
| |
| Hi! My name is StiN. |
|
|
| [ Mine's route. ] |
|
|
| I'm from Russia. |
| |
| [ I'm from the U.S. ] |
|
|
| Sorry for my bad English. |
|
|
| [ Sorry for my bad russian, comrade. ] |
|
|
| I Have a friend His name is Armany. |
|
|
| [ I have a friend named Gilgamesh. ] |
|
|
| Where do you live? |
|
|
| [ I live in a small one bedroom aprartment with four cats. ] |
|
|
| How old are you? |
|
|
| [ 19. ] |
|
|
| What's yore name? |
|
|
| [ We already went over this. ] |
|
|
| What's yore Hobby? |
|
|
| [ Volunteering for free medical tests of any variety. ] |
|
|
| Do you knew Russia? |
|
|
| [ I KNEW RUSSIA BACK IN THE GOOD OLE' DAYS! Back before the collapse. ] |
|
|
| Good Bay. |
|
|
| [ Bad Bay: Bay of Pigs. Good bay: Bay of jello. ] |
|
|
| 0x8>-------------------------------------------------------------------------- |
|
|
| Hola, soy Omar |
|
|
| Soy un fantico de su revista, la sigo desde la phrack 48. |
| No soy un hacker, phreaker, o cualquier cosa, soy ms un fantico de las |
| malditas mquinas. |
| Muy buenos artculos; gracias por las cosas de LINUX (me fueron de mucha |
| utilidad) |
|
|
| Suerte y sigan as. |
| Saludos de Uruguay. South Amrica. |
|
|
| [ Yo quiero taco bell. ] |
|
|
| 0x9>-------------------------------------------------------------------------- |
|
|
| hi, |
|
|
| where can i find the source code for the legendary internet worm by |
| morris (1988) ? |
|
|
| thanx (i hope u dudez can help me :( ) |
|
|
| [ ftp://idea.sec.dsi.unimi.it/pub/crypt/code/worm_src.tar.gz ] |
|
|
| 0xa>-------------------------------------------------------------------------- |
|
|
| My friends were going to a basketball game at their gay school (Grades |
|
|
| [ Wow, they have gay schools now? Do they videotape you jerking off |
| and looking completely gay and stupid? (http://www.leisuretown.com) ] |
|
|
| pre-school through 8th grade). They were wearing their wallet chains, |
| not causing any harm with them. (It was an after school activity) the |
|
|
| [ As opposed to those people who have the wallet-chain/morning-stars. |
| They are the ones who cause all that wallet-chain inflicted harm. ] |
|
|
| teachers made them take them off. My friend, Krazy K, asked if he could |
|
|
| [ Krazy K? Any relation to Daft D? ] |
|
|
| take off the chain and keep the wallet, but they made him give them the |
| whole thing. He thought it was funny, though, especially since he had |
| condomes in it (It is a "christian" school). Not that he was going to |
|
|
| [ Condomes! The condom that's a tent! ] |
|
|
| use them. They of course being the nosy bastards that they are, rummaged |
| around in it to their liking and found them. (We know because they |
| talked to him about it. |
|
|
| [ Good detective work. ] |
|
|
| He told them it was a joke he was going to do to his friend. "I was going to |
| put it in his locker" He said.) |
|
|
| [ Now *that's* good humor. ] |
|
|
| I was wondering about the legality of this whole thing. Is it legal |
|
|
| [ Perhaps you should wonder about the stupidity of the whole thing first, |
| then work your way towards relevance, and then back to stupidity again. ] |
|
|
| to take someones wallet and chain (Which I consider personal property) |
| when it is an after school activity and then look through it? They gave |
|
|
| [ *shrug* Sure is fun though, isn't it? Actually, I don't know the laws |
| and regulations of gay schools. It just might be allowed. ] |
|
|
| him no alternative (but to go home, and, "Oh by the way, you can't use |
| the phone"). Then to search through the wallet without permission of the |
| owner? I am asking because, I would like to get them in trouble, In |
| retaliation to the many times I've been screwed there (I go to high |
|
|
| [ Been screwed at the gay school? Hmm. Did you have any condomes? ] |
|
|
| school now, thank God). If you could tell me, or know of someone who |
| knows, then that would help us. |
|
|
| Thanks, |
|
|
| Abs0lute Zer0 |
| |
| [ You can say that again. ] |
|
|
| 0xb>-------------------------------------------------------------------------- |
|
|
| Dear Editor, |
|
|
| I would like to take a chance to give my most sincere thanks for |
| resurrecting my uttermost respect to the humanity (so often shattered by |
| politicians and other freaks) by providing me a unique opportunity to |
| immerse myself into the deep wisdom and magic of written word found in the |
| Line Noise section. This is truly the place where one can look for (with a |
| sense of deep confidence) a genuine proof that every person is a genius on |
| the inside. |
|
|
| [ Well thank you very much. Although I think you are refering to |
| loopback. ] |
|
|
| Driven by this wonderful feeling of replenished hope and respect, I'd like |
| to answer a cry for help from a young but talented Hacker Demonhawk, who |
| expressed a wish to "blow shit up!!". I used to be a chemist, and I would |
|
|
| [ Ummm... ] |
|
|
| like to share, in the spirit of the magazine, my knowledge and provide easy, |
| quick instructions for young fighting souls that would assist them in the |
| aforementioned noble cause. In other words, how to build a bomb. |
|
|
| [ Whoops. You just lost me there. ] |
|
|
| { rest of message truncated due to overwhelming levels of inanity ... } |
|
|
| 0xc>-------------------------------------------------------------------------- |
|
|
| where would one go to get "private" hacker help? |
|
|
| [ In the back where they give the lapdances. ] |
|
|
| 0xd>-------------------------------------------------------------------------- |
|
|
| sorry to bother ya... |
| i was hoping maybe you could give me some info. don't take me for a complete |
| idiot, |
|
|
| [ Uh oh. ] |
|
|
| i just don't know much about this kind of stuff. |
| maybe u could get me started... give a few tips??? |
|
|
| [ Sure. Never kiss on the first date. Always pack an extra pair of |
| socks AND underwear. Never put electrity in your mouth 'just to see |
| what would happen'. Also, if you happen to find yourself in the |
| position, always at least *ask* to give someone the reach-around; it's |
| common courtesy. ] |
|
|
| 0xe>-------------------------------------------------------------------------- |
|
|
| Hello, |
| My name is Robert I guess you could call me a beginner hacker I I was |
| wondering if you could please help me out I need some hacking numbers and |
|
|
| [ Ok. 7, 9, 11, 43, and 834. ] |
|
|
| passwords just so I can play around on them and get good. Also if you have |
|
|
| [ Sure. Try `password`, `hacker12`, `pickle`, and `love`. ] |
|
|
| any files or anything that you think that would be helpful to me please attach |
| |
| [ Alright, /dev/random is a good one to start with. ] |
|
|
| or tell me where I can get them. I just bought the book Secerts Of A Super |
| Hacker By Knightmare is that any good if there is any books I should get |
|
|
| [ Ah yes, the book of the truly desperate and depraved. As was said once |
| before by Voayger, Knightmare's biggest hack was getting that book |
| actually published. ] |
|
|
| please tell me or if you have any text please send. I am running windows 95 |
|
|
| [ Can you put Windows 95 in your mouth? NO! Such is Mango! ] |
|
|
| Thanks For Ur Time |
| Robert |
|
|
| 0xf>-------------------------------------------------------------------------- |
|
|
| Dear Sir |
| I like you hacker people because you made life easy |
| to a lot of people |
|
|
| [ Especially the makers of fine Bavarian shoe-horns. ] |
|
|
| I want to ask you an important question to me |
| When connecting to Internet, I found that some sites inform me with my ISP IP# |
|
|
| So if they're any possibility that any site can track me |
| and identify the following |
| 1-what country I came from? |
|
|
| [ Well; if you're dialing up to your ISP, and connecting to 'sites' from |
| there, that would be a one hop jump out to the world. And yes; they |
| could find out what country you're coming from, unless you're dialed |
| into a provider in another country. In which case; it might be a little |
| more difficult. The other tipoff is when you scan in your birth |
| certificate and put it up on your webpage along side your current |
| address and a head shot. |
|
|
| That's a 'no-no'. ] |
|
|
| 2-what is my phone number? |
|
|
| [ Are you asking us if we know your number? Or if someone can find your |
| number when you connect to their machine and they know your IP address? |
| I'm confused, so I'll answer the question both ways. |
|
|
| A-1: No. We don't know your number, and we don't want it. While we're |
| at it. We don't want to make out with you either. Quit sending us the |
| flowers. It's over this time once and for all. |
|
|
| A-2: If you did something that would incite someone to try to find your |
| phone number; odds are if it was an illegal action your ISP would gladly |
| hand your information to the first law enforcement person who walked |
| through the door. Or for that matter, anyone who asks nicely. ISPs |
| aren't exactly known for being well guarded vaults of information. ] |
|
|
| Globally can any site by coordination with my ISP track me and catch me? |
|
|
| [ Ever hear of Kevin Mitnick? ] |
|
|
| Please provide me with a full answer quickly. |
|
|
| [ Do people not realize this is a quarterly magazine? Quick for us is |
| 3 months. If you've done something stupid and gotten busted; our |
| sincerest apologies for being late. Next time we'll drop what we're |
| doing and get right to it. ] |
|
|
| 0x10>------------------------------------------------------------------------- |
|
|
| I am a Indiana University student currently studying Criminal Justice. I am |
| trying to gather data and find information concerning computer hacking and |
| governmental and/or corporate involvement. The twist that I am persuing |
| concerns a rumor that I had heard. I was told that when some computer |
| hackers were caught, they were recruited by the government and/or |
| corporations to work in their security department. Usually where there is a |
| rumor, there is some truth to the matter, especially when concerning the |
| department of defense. I don't know if you could help me find information |
| concerning this issue. Any help would be greatly appreciated. |
|
|
| Respectfully, |
| Jason Sturgeon |
|
|
| [ Well... We at Phrack haven't heard anything about the DoD hiring |
| 'hackers', it's been our understanding that the government at least |
| prefers straight laced guys with military background to handle their |
| stuff. Although it's not out of the realms of possibility that they've |
| hired 'hackers', if it's happened it's of rare occurance, and those |
| individuals who fit the title of 'hacker' probably don't conform to your |
| definition of what a 'hacker' really is.. |
|
|
| Corporations and The Government for the most part tend to shy away from |
| 'hackers', if merely for the stigma of being a 'hacker'. But as a |
| stereotype, hackers conjur up all sorts of bad mental images for |
| respectable management types. We're sure it's happened to some capacity, |
| but we have no witty anticdotes concerning it. ] |
|
|
| 0x11>------------------------------------------------------------------------- |
|
|
| Hello there |
|
|
| I have heard there are some risks using callback modems. |
| Can you give me some more info on this, or info where to look |
|
|
| [ Risks of callback modems are fairly simple. The problems involved with |
| them are a little bit more complex. We'll discuss both in an effort to |
| best cover this subject. The overall fundamental flaw of callback |
| modems is the idea that you could 'fake' a hang-up on your end, or play |
| a dialtone in an effort to fool the modem into thinking it hung up. Then |
| you wait for it to dial the number, and once it's done, 'ATA' your modem |
| and pick up the carrier. |
|
|
| We ourselves have tested this a couple times with moderate success, it's |
| not 100% accurate, and it also depends on the hardware on the remote |
| side. |
|
|
| If the call-back information is based of ANI, that could provide more |
| problems, since the Phrack staff has heard the rumor that you can fake |
| ANI with certian types of ISDN set-ups. |
|
|
| The two types of callback modem configurations, one being a program that |
| acts as a frontend to the dialing mechanism, the other being hardware |
| based. |
|
|
| Such as, you dial in to the modem, the program asks you to authenticate |
| yourself by some means, you do so; it hangs up and calls the number |
| that's paired with your authenication information. This isn't so bad, |
| but if anyone remembers back when certian BBSs had callback that you |
| could enter, you could make them call arbitrary phone numbers by putting |
| in a fake number if their door was misconfigured. |
|
|
| As far as hardware based call-back, whence you program the passwords and |
| numbers into the modem and it deals with the whole transaction, |
| introduces a scalability issue as well as the fact that the modem has no |
| means to log on it's own, etc.. etc.. etc. |
|
|
| If any readers wish to write an article based on this subject you are |
| urged to write it and send it in. It'd be nice to see some more solid |
| information on this subject. |
|
|
| As well; if any companies wish to send us modems, we urge you to send us |
| some modems so we can put them up against a battery of hacker tested and |
| hacker approved tests. ] |
|
|
| 0x12>------------------------------------------------------------------------- |
|
|
| I would like to know about cellular phones....how to find out secret |
| pin, how to listen to calls etc.... |
|
|
| [ I would like to know more about marshmellows. How they're planted, the |
| way they're picked in the spring time as they blossom from the little |
| tiny buds you get in 'Swiss Miss Hot Coco', to the fat chewey vessles of |
| taste and excitment that they are at full maturity. |
|
|
| I would like to find out the secrets of gravity, as well as a good solid |
| reason why the universe keeps 'expanding' -- without any of that "just |
| because" rhetoric that seems to dominate the subject. ] |
|
|
| If You need the cellular make I'll be obliged to give it to you.... |
|
|
| [ Wow. You'll give us your phone just so we can look at it? Send us your |
| home address and we'll send you a S.A.S.E to mail it back to us in. ] |
|
|
| Thanks. Anthony. |
|
|
| [ No. Thank _you_ your generosity Anthony! ] |
| |
| 0x13>------------------------------------------------------------------------- |
|
|
| Hiya, |
|
|
| Not wishing to sound like a playboy forum article but I have read phrack for |
|
|
| [ Already my interest is waning... ] |
|
|
| quite a while and have only seen cause to write now. |
| I commend you on your editorial on C programming style. The sooner we get out |
|
|
| [ And I commend you on your commendation. +100 points. ] |
|
|
| there and club to death those people that use single space indentation the |
| better. |
|
|
| I do however have three main points to disagree with you on. |
|
|
| 1. Write as many comments as you can. You may need to remember what it |
| was you where coding AFTER copious amounts of recriational drugs. |
|
|
| [ Nah. You don't want to get out of hand with the commenting. You end |
| up commenting needlessly and redundancy abounds. And if you can't read |
| your own code, kill yourself. -100 points. ] |
|
|
| 2. Put your own varaibles with uppercase first letters (to distinguish them |
| from sys vars) |
|
|
| [ `sys vars`? What like argc, argv or errno? This is a ridiculous |
| suggestion. It makes your code ugly and harder to parse. I award you |
| no points. ] |
|
|
| 3. In reference to your comment |
|
|
| "In the grand scheme of things, none are really |
| any more correct than any others, except mine." |
|
|
| It must be said that this is completely wrong. The only point that counts |
| is in fact mine. |
|
|
| [ Not when it's in my magazine. With a final score of 0, you lose. ] |
|
|
| Regards, |
| andrewm at quicknet dot com dot au |
|
|
| [ Cute. ] |
|
|
| 0x14>------------------------------------------------------------------------- |
|
|
| Dear Guys, |
|
|
| First off, I'd like to say that I am ever more impressed with the quality |
| of each successive issue of Phrack. |
|
|
| [ Danke. ] |
|
|
| The reason for this mail it to respond to the request made by N0_eCH0 in |
| Ireland in issue 52. Myself and a few friends are happy to help this guy |
| out if we can. I'm afraid that we're no great sources of knowledge, but |
| are willing to have a crack at most things. |
|
|
| Anyway, if you can pass this on, as there was no e-mail address for |
| N0_eCH0, I'd be much obliged. Keep up the excellent work, I look forward |
| to issue 53 ! |
|
|
| ben_w@netcom.co.uk |
|
|
| [ There you go. ] |
|
|
| 0x15>------------------------------------------------------------------------- |
|
|
| To whom it may concern: |
|
|
| I was wonder how I can read someone dir and take over their |
| account the kernal is 2.0.0. How could I hack into the system |
| without having a passwd!! |
|
|
| [ I assume you mean Linux. `LILO: linux init=/bin/sh`. Oh, and you need |
| console access. Good luck. ] |
|
|
| Thanx! |
|
|
| Tag |
|
|
| 0x16>------------------------------------------------------------------------- |
|
|
| [ P52-19@0x2: Statement of Louis J. Freeh, Director F.B.I... ] |
|
|
|
|
| Hello, |
|
|
| I would like to say that the article, published as P52-19 is without |
| a doubt one of the most frightening threats to our freedom that man has |
| ever seen. |
|
|
| the article is: |
| "The Impact of Encryption |
| on Public Safety |
|
|
| Statement of Louis J. Freeh, Director |
| Federal Bureau of Investigation" |
|
|
| This article basically states that Americans should have now |
| personal communication rights whatsoever. The Director of the FBI |
| practically states that strong encryption should be banned from the |
| public, because he wants law enforcement officers to be able to read all |
| of our mail. He says that this would be for reasons of terrorists and |
| criminals, but fails to state that the security of the average American |
| would be compromised. Due to his proposal that you would have to |
| forfeit your key to government officials, and that these keys would only |
| be used "for the immediate decryption of criminal-related encrypted |
| communications or electronic information.". Or maybe this way the |
| government can just intrecept all of your communications. |
| My main objection to this is the irrelevancy that this would have to |
| the general public. According to US law, the US Postal Service is the |
| ultimate form of private security. The average American should be able |
| to send a letter to anywhere in the world, and it should be completely |
| safe. And what more can you send with encrypted email? A program, but |
| you can do that with a disk in a letter. So whats stopping these |
| terrorists from hopping on down to the Post Office? |
| Another problem with this proposal is that encrypted information is |
| more used to protect your information from other parties then the |
| government. I can guarantee that the average Joe living down the street |
| is encrypting his love letter to his mistress Jane so that his wife |
| doesn't see int, not so that some lazy, fat, government "official" |
| doesn't see it. Most people use this technology for much more practical |
| usage than the deception of the government. We use it because of the |
| millions of people on the Net, and perhapse we don't want those millions |
| to see every little thing about our personal lives. |
| And finally, why should the government be able to restrict our right |
| to gather peacefully? With technology moving so fast, i think that it |
| is reasonable to assume that the Internet is a gathering place? We have |
| all of the means of normal communication and more. Chat rooms, email, |
| and programs like Mirabilis's ICQ allow us to communicate on a whole new |
| level. |
| In light of all of this, i hope you share my opinions now about the |
| loss of freedom that this would represent. Thank you. |
|
|
| 0x17>------------------------------------------------------------------------- |
|
|
| Hi, |
|
|
| I am a little sysadm on a little Linux-Server on the net. |
|
|
| [ I have little interest in those details. ] |
|
|
| I am searching for documents about System Security under Linux/UNIX |
| just to be up-to-date :) Thank you for your help. |
|
|
| [ http://www.redhat.com/linux-info/security/linux-security/ ] |
|
|
| And btw...I have parts of the /etc/shadow file from my ISP...what |
| can I do with this? Can I just run crack over it? |
|
|
| [ Well now, that all depends on what parts you have, doesn't it...? |
| If you have the encrypted hashes, then you're in business. ] |
|
|
| And, btw: Not all germans hate americans...I am german and I |
| don't hate americans... and my generation has nothing to do with |
| the WWII... |
|
|
| [ Oh, I think you do. I am relatively certian that, somewhere deep |
| down, you dislike us. You couldn't take a shellacking like you did |
| in WWII (not to mention spaetzle) and *not* feel some sort of |
| resentment. It's ok. Embrace your malevolent feelings. Hug them. |
| C'mon! Once you've done that, you can dissolve them. I admonish you to |
| TURN THAT FROWN UPSIDE-DOWN! Cmon! Bodyslam yourself into gayness! ] |
|
|
| -firefox01 |
|
|
| 0x18>------------------------------------------------------------------------- |
|
|
| Hello there, good to talk to you. |
|
|
| [ Likewise. ] |
|
|
| I am just this "Thinker" with this thought why don't we the Hackers and you |
| the one of the major contributing Hacker commune (2600,Phrack,ect) make a Full |
| Strong "live" Cryto network for the Hacker and by the Hacker. |
|
|
| [ I have a thought. Get a speak n' spell. ] |
|
|
| I can't belive I am sending this from hotmail bought out by |
| microshit blah blah no this thing must be really insecure. |
|
|
| [ Well, maybe it just needs love and attention and for someone to say nice |
| things to it. ] |
|
|
| Well I have a whole line of ideas and no one ever listens to me |
| netscape ect... but if your intrested e-mail me back and I'll give you |
| my POP adress. The benifit of this system is 1) we can piss off the FBI |
|
|
| [ Yes, let's piss off the F.B.I. And, while we're at it, let's piss off |
| the IRS and let's annoy the CIA.. We can poke fun at the retarded |
| wrestlers association. And lastly, let's aggravate an enraged bull. ] |
|
|
| and 2) final we hackers can have a place to loyter and idile , lurk at |
|
|
| [ loyter and idile? Hey, aren't they those two Jewish film critics? I |
| love them! ] |
|
|
| where we can say what ever the Hell such as Full deatails on how to |
| enter a sys,ect...of corse we will have to screen ppl for trust ect... |
|
|
| [ And screen them for stupidity. ] |
|
|
| But I reall belive we can werk this. |
| If you want to here the rest of my ground shaking ideas just ask, or |
| full deatials on the Crypto.net . |
|
|
| [ Pass. ] |
|
|
| 0x19>------------------------------------------------------------------------- |
|
|
| First off, I'd like to say that I love the mag...but you really get some |
| nutjobs that post to it..(myself included) I'm not an elite hacker, a unix |
| guru or anything like that(duh), but I am amazed at the effort you put into |
| Phrack...anyways, keep up the good work |
|
|
| [ Thanks, nutjob. ] |
|
|
| 0x1a>------------------------------------------------------------------------- |
|
|
| Hello, |
|
|
| Who was the first hacker in history? |
|
|
| [ God. ] |
|
|
| thanks for your time, |
| greetings, |
| Max |
|
|
| 0x1b>------------------------------------------------------------------------- |
|
|
| Hi. |
|
|
| i'm a Swedish kid and i just wonders |
|
|
| [ Now the Swedes I like. Beautiful women. Amazing accents. I *think* |
| they like me. Although this one particularly hot Swedish girl I know |
| doesn't seem to like me much. I think maybe it's because I try too hard |
| around her. She'll come around and I'll be like bouncing off the walls |
| trying to impress her.. I remember one time I got so excited I almost |
| set sail for gaiety. I know. I know. I should "just relax" and |
| everything will fall into place. I dunno tho. She's so pretty. And |
| ahm just so awkward... ] |
|
|
| if you might know a good haking, freaking and craking |
| site. I've checked everywhere but i have not any. |
|
|
| [ Huh? ] |
|
|
| 0x1c>------------------------------------------------------------------------- |
|
|
| Hey sup, I'm makin an essay site similar to Slackers Inc. but with more |
| essays. The only problem is I need sponsors to get my page up, can you pay me |
| a small fee monthly for displayin a banner for your site. I know almost |
|
|
| [ O.k. Sure, how does nothing/month sound? ] |
|
|
| everybody knows about Phrack Magazine but I heard you do some sponsoring, E- |
| mail me back if you are interested. |
|
|
| [ Yah, we are *so* reknown for our advertising budget. And now I'd like to |
| make Phrack reknown for sponsoring a gay fucking highschool/college paper |
| stealing webpage. Sure. I'll get right on that after we do our 'kick |
| a baby harp seal campaign'. ] |
|
|
| 0x1d>------------------------------------------------------------------------- |
|
|
| You need to write an Interactive tutorial to simulate hacking into a |
| private college or a company. You should make it realistic and hard to access. |
|
|
| [ Someone already did. They're called *.edu and *.com. Although sometimes |
| they're not too realistic. ] |
|
|
| 0x1e>------------------------------------------------------------------------- |
|
|
| [ P52-14: International Crime Syndicate Association ] |
|
|
| Dorathea Demming, |
|
|
| You remark that the ICSA doesn't guarantee their certification against |
| attack. |
|
|
| "In plain English, they are saying that if you get sued, you are on your |
| own." |
|
|
| Do you know of any security company, consultant, or consortia that will |
| commit to helping a customer legally if they've been attacked? |
|
|
| Stu |
|
|
| 0x1f>------------------------------------------------------------------------- |
|
|
| In skateboarding you are a "poseur" if you don't know shit. |
| In the computers culture you are a "lamer" if you don't know shit. |
|
|
| The term that bugs me is "elite" or "eleet" or "3l33t3". |
| Are you elite? |
|
|
| I just don't like the term. |
| I really like the term "HI-FI" ,as in high-fidelity, or high-fidelity |
| stereo's. |
|
|
| An outdate term that orginally meant "I've got the best gear". |
| But now it just means "late 70's marketing scheme". |
|
|
| Are you hi-fi? |
| It has a ring to it. |
| You may be elite right now but in time you'll be hi-fi. |
|
|
| ------------------------------------------------------------------------------ |
|
|
| ----[ EOF |
|
|