| ==Phrack Inc.== | |
| Volume Two, Issue 24, File 11 of 13 | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| PWN PWN | |
| PWN P h r a c k W o r l d N e w s PWN | |
| PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN | |
| PWN Issue XXIV/Part 1 PWN | |
| PWN PWN | |
| PWN February 25, 1989 PWN | |
| PWN PWN | |
| PWN Created, Written, and Edited PWN | |
| PWN by Knight Lightning PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| Time And Time Again | |
| ~~~~~~~~~~~~~~~~~~~ | |
| Greetings to everyone! This issue of Phrack Inc. marks the completion of the | |
| plan I had conceived a little more than one year ago -- "The Phoenix Project." | |
| No, not the bulletin board run by The Mentor (although the name of the board | |
| came from this plan), my scheme to rebuild the hacking community from its | |
| remaining ashes of the "Crisis of 1987." My plan had several parts that needed | |
| to come together. | |
| - Announce the plan and pour lots of hype into it to spur great enthusiasm. | |
| - Hold SummerCon '88 in St. Louis, Missouri to get today's hackers to meet. | |
| - Regain control of Phrack Inc. and put it back on its feet. | |
| - Release the Vicious Circle Trilogy to expose and defeat our security | |
| problems. | |
| - Bring today's hackers into the next Millennium with The Future Transcendent | |
| Saga (which helps to unite yesterday's hackers with the present). | |
| And now... | |
| Announcing The 3rd Annual... | |
| SummerCon '89 | |
| ~~~~~~~~~~~~~ | |
| Saint Louis, Missouri | |
| July 23-25, 1989 | |
| The date is a tentative one, but I would imagine that it will not change. | |
| For more information please contact Taran King or Knight Lightning. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| On the lighter side, this issue of Phrack World News contains articles dealing | |
| with Shadow Hawk, The Disk Jockey, Compaq, the FBI "Super" Database, the | |
| Australian-American Hackers Ring, Computer Emergency Response Team, StarLink, | |
| The Xenix Project, The Lost City of Atlantis, The Beehive BBS, and much more. | |
| So read it and enjoy. | |
| For any questions, comments, submissions of articles, or whatever, I can be | |
| reached at C483307@UMCVMB.MISSOURI.EDU or C483307@UMCVMB.BITNET or whatever | |
| bulletin board you can find me on. | |
| :Knight Lightning | |
| _______________________________________________________________________________ | |
| Explosives Expertise Found In Computer January 5, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Matt Neufeld (The Washington Times) | |
| One of the four Bethesda youths killed in an explosion in the garage at the | |
| home of the Brazilian Embassy's attache last weekend had access to a local | |
| computer system's how-to listing of bombs and explosives, according to a system | |
| member. | |
| "He was highly involved with computers," said the computer operator of the | |
| 18-year-old Dov Fischman, one of the teens killed by the explosion. "Dov used | |
| to go over to my friend's house," where they discussed various types of | |
| software and computer systems, he said. | |
| Located within an elaborate computer system of about 200 private bulletin | |
| boards is a board titled "The Lost City of Atlantis" that contains files under | |
| the following names: "Pipe Bombs," Gas Tank Bombs," "Make Smoke Bombs," "Soda | |
| Bombs," "Explosive Info," "Kitchen Improvised Plastic Explosives," and "Plastic | |
| Explosives," according to system files reviewed yesterday by the Washington | |
| Times. | |
| Details on committing mischief and various illegal activities fill the files of | |
| Atlantis and other boards in the system. The Atlantis board is listed under | |
| the heading, "The Rules of Anarchy." | |
| The files on Atlantis, which is run locally, but could be accessed by computer | |
| owners nationwide, include information and correspondence on how to buy various | |
| chemicals and and explosives used to make bombs. Other files have explanations | |
| on how to use these materials to fashion the bombs. | |
| "Some or all of you reading this may have caught word from the grapevine that I | |
| sell laboratory materials and/or chemicals," begins one message from a system | |
| worker who operates under the pseudonym "The Pyromaniac." | |
| "I can get for you almost any substance you would want or need," the message | |
| says later. "Always remember that I am flexible; Your parents need not know | |
| about the chemicals." | |
| Mr. Fischman and the other teens have been described by friends and relatives | |
| as highly intelligent, hard-working honor students. They were killed about | |
| 3:15 a.m. Saturday in an explosion at the home of attache Vera Machado in the | |
| 6200 block of Verne Street. A Montgomery County Police investigation | |
| determined the cause was accidental and caused by the youths "experimenting | |
| with some type of explosive." | |
| Nitrates, peroxides and carbonates were found at Mr. Fischman's home, along | |
| with literature on "resources for chemicals and appliances and recipes | |
| utilized for explosive devices," said fire marshal's spokesman Mike Hall. "The | |
| exact nature of resources and recipes has not been disclosed by the | |
| investigative section, as the investigation is going on." | |
| "I have no knowledge that any computer system information was used," but that | |
| possibility will be investigated, Mr. Hall said. Mr. Fischman's father, Joel, | |
| yesterday said his son and the other three youths were involved with computers. | |
| But he said he was not aware of any connection between computers and the | |
| explosion. He referred further questions to the police. | |
| The local computer system operator said most users are 15 to 19 years old. The | |
| operator, however, said it is common for users of the system to peruse the | |
| files while their parents have no knowledge of the contents. | |
| The boards and files are legal, and the bomb information is primarily confined | |
| to "private" bulletin boards created by persons known as "system operators." | |
| However, anyone with a home computer, a telephone and a modem can hook up to | |
| the bulletin boards if they gain approval of the individual operators, the | |
| operator said. | |
| "I think this should be allowed, but not just for any kids," said the operator, | |
| who is an adult. He said it's "really the parents' fault" for not supervising | |
| their children's computer access. | |
| Another board in the system, "Warp Speed," also provides information on | |
| explosives. That board was shut down sometime between December 30, 1988 and | |
| January 1, 1989 the operator said. That board is "host" to "Damage, Inc.," | |
| which is a "group of people who concentrate on explosives, things to screw | |
| people up, damage," he said. | |
| In the "Beehive" board the following message appears from "Mister Fusion:" | |
| "low cost explosives are no problem. make them yourself. what do | |
| you want rdx? detonators, low explosives? high explosives? i can | |
| tell you what to do for some, but I would reccomend (sic) cia black | |
| books 1-3." | |
| Other boards and files in the system include information on computer hacking, | |
| constructing a device to jam police radar detectors, picking locks, and | |
| "phreaking," which is computer jargon for using computers to make free | |
| telephone calls. | |
| Some of these files are: "Making LSD," "Listing of common household chemicals," | |
| "Info on Barbiturates," "Make a mini-flame thrower," How to make a land mine," | |
| "How to Hot Wire a car," "Home Defense: part II, guns or friends," "How to have | |
| fun with someone else's car," "Fun! with Random Senseless Violence," "Picking | |
| up little girls," and "How to break into a house." | |
| "A lot of the information is wrong, in the phreaker world, regarding ways to | |
| defeat the telephone company," said the operator, who has been involved with | |
| computers for at least six years. "But the bomb information is pretty much | |
| accurate." | |
| In the two page, "High Explosives" file, there are detailed explanations on how | |
| to use the chemicals cacodyal, tetryl and mercury fulminate. | |
| "This stuff is awesome," begins the section on cacodyal. "It is possesses | |
| flammability when exposed to air. Plus it will release a cloud of thick white | |
| smoke. The smoke just happens to be arsenic." | |
| The file does offer this warning at the end: "Don't attempt to make these | |
| things unless you are experienced in handling chemicals. They can be very | |
| dangerous if not handled properly." | |
| The "Kitchen Improvised Plastic Explosives" file, which instructs users on "how | |
| to make plastique from bleach" and is credited to a Tim Lewis, warns that the | |
| chemicals are dangerous." | |
| _______________________________________________________________________________ | |
| Computer Emergency Response Team (CERT) January 23, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Excerpted from UNIX Today | |
| WASHINGTON -- The federal government's newly formed Computer Emergency Response | |
| Team (CERT) is hoping to sign up 100 technical experts to aid in its battle | |
| against computer viruses. | |
| CERT, formed last month by the Department of Defense's Advanced Research | |
| Project Agency (DARPA), expects to sign volunteers from federal, military, and | |
| civilian agencies to act as advisors to users facing possible network invasion. | |
| DARPA hopes to sign people from the National Institute of Science and | |
| Technology, the National Security Agency, the Software Engineering Institute, | |
| and other government-funded university laboratories, and even the FBI. | |
| The standing team of UNIX security experts will replace an ad hoc group pulled | |
| together by the Pentagon last November to deal with the infection of UNIX | |
| systems allegedly brought on by Robert Morris Jr., a government spokesman said. | |
| CERT's charter will also include an outreach program to help educate users | |
| about what they can do the prevent security lapses, according to Susan Duncal, | |
| a spokeswoman for CERT. The group is expected to produce a "security audit" | |
| checklist to which users can refer when assessing their network vulnerability. | |
| The group is also expected to focus on repairing security lapses that exist in | |
| current UNIX software. | |
| To contact CERT, call the Software Engineering Institute at Carnegie-Mellon | |
| University in Pittsburgh at (412) 268-7090; or use the Arpanet mailbox address | |
| cert@sei.cmu.edu. | |
| _______________________________________________________________________________ | |
| The Xenix Project aka The Phoenix Project Phase II January 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| There are some big changes in store for everyone's favorite bulletin board. | |
| As of January 25, 1989, The Mentor became the proud owner of the complete SCO | |
| Xenix system, complete with the development kit and text utilities (a $1200 | |
| investment, but worth it). He has arranged for a UUCP mail and USENET | |
| newsfeed, and is working on getting bulletin board software up and running on | |
| it. | |
| So what does this mean to you? As I have been illustrating throughout The | |
| Future Transcendent Saga and a few other files/places, the future lies in the | |
| wide area networks. So now for the first time ever, The Mentor is offering the | |
| hackers a cheap, *LEGAL* way to access the gigabytes of information available | |
| through USENET. Mail can be sent through BITNET, MILNET, ARPANET, and INTERNET | |
| gateways to users all over the world. In short, connectivity has arrived and | |
| the future grows ever closer. | |
| The first thing that The Mentor wants to do is get a second hard disk drive. | |
| There is no way the Xenix Project can run right now without it. His 40 meg has | |
| a 20 meg Xenix partition, 17 megs of which is occupied by the /root/ file | |
| system. The MS-DOS partition has 12 megs of the board, plus all the programs | |
| he needs to exist (Pagemaker, Word, Microsoft C, Brief, etc). A *MINIMUM* of a | |
| 60 meg drive will be needed to support the newsfeed (USENET generated 50 megs | |
| of traffic in the last 2 weeks). A 100+ meg drive would be better. Once a | |
| hard disk is obtained, the system will go online as a single-line UNIX machine. | |
| Hopefully, enough money will be generated to add a second phone line and modem | |
| quickly. At this point the system will begin to take off. | |
| The Mentor's eventual goal (inside 6 months) is to have 4-6 300-2400 baud lines | |
| available for dialin on a hunt group, plus a 19.2Kbaud line for getting the | |
| USENET feed. The estimated startup cost for a 5-line system is: | |
| 110 meg hard disk........................ $1000 | |
| 4 2400 baud modems (I've got 1 already).. $ 525 | |
| Installation of 4 phone lines............ $ 450 | |
| MultiPort Serial Card.................... $ 300 | |
| SCO Xenix Software....................... $1200 | |
| ~~~~~ | |
| $3475 | |
| Financing is a problem. The Mentor has already sunk the $1200 into the Xenix | |
| package (plus his original purchase of the computer system), leaving him $2200 | |
| away from the best hacker system in the world. There are two ways that he | |
| hopes on getting the money for the rest of the system. | |
| A) Donations - Many users have already indicated that they will send in | |
| anywhere from $10 to $100. Surprisingly enough, the security | |
| people on The Phoenix Project have been extremely generous. | |
| There *is* an incentive to donate, as will be shown below. | |
| B) Monthly fees - There will be a $5-$12.50 charge per month to use the UNIX | |
| side of the system, but the Phoenix Project BBS will remain | |
| free! Here is how it works: | |
| Level 1 - BBS Only. Anyone who wishes to use only The Phoenix Project will | |
| call and log in to account name 'bbs.' They will be forced into the BBS | |
| software, at which point they will log in as usual. As far as they're | |
| concerned, this is just a change of software with the addition of the front | |
| end password 'bbs.' | |
| Level 2 - Individual Mail & News account. For $5 a month, a user will get | |
| their own private account with full access to UUCP mail and USENET news. | |
| They will be able to send mail all over the world and to read and post to | |
| the hundreds of USENET newsgroups. Legally, for a change! | |
| Level 3 - Individual Mail, News, Games, and Chat. The user will have all | |
| the privileges of a Level 2 person, be able to access games such as Rogue, | |
| Chase, and Greed, plus will have access to the multi-user chat system | |
| similar to the one running on Altos in West Germany, allowing real-time | |
| conferencing between hackers here in the states without having to have an | |
| NUI to get to Datex-P. This will cost $10 per month. | |
| Level 4 - Full Bourne Shell access. This will allow access to the full | |
| system, including the C compiler, text utilities, and will include access to | |
| the online laser printer for printing term papers, important documents, or | |
| anything else (mailing will incur a small fee.) Level 4 access will be | |
| restricted to people technically sophisticated enough to know how to use and | |
| how not to use UNIX compilers. The entire Xenix Development System and | |
| Text Processing Utilities are installed, including online manual pages. I | |
| will aid people in debugging and testing code whenever needed. Charge is | |
| $12.50 per month. | |
| C) Why Donate? - Simple. You get a price break. Here are the charter | |
| membership categories: | |
| Contributing: $20 You receive 6 months of Level 2 access, a $10 savings | |
| over the monthly fees. | |
| Supporting: $45 You receive either 1 year of Level 2 access or 6 months | |
| of Level 3 access. | |
| Sustaining: $75 You receive 1 year of Level 3 access, or life time level | |
| 2 access. | |
| Lifetime: $100 You receive lifetime Level 4 access. Contributions in | |
| amounts less than $20 will be directly applied toward Level 2 | |
| access (e.g. A $10 donation will give you 2 months Level 2 | |
| access). | |
| Hardware contributions will definitely be accepted in return for access. | |
| Contact me and we'll cut a deal. | |
| Information Provided by The Mentor | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| A Few Notes From The Mentor | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| People -- I am not trying to make a profit off of this. If I could afford the | |
| hardware I'd buy it. The Phoenix Project has been committed to bringing you | |
| the best in hack/phreak information available, and will continue to do so FREE. | |
| I stress, even after the switch is made, The Phoenix Project BBS will be | |
| available under a un-pass-worded login that anyone can log into and use. It's | |
| only if you want to enter the world of networks in a *LEGAL* manner that I need | |
| to get money . | |
| The system will expand as interest in it expands. If I never get enough paid | |
| users to add more than one line, it will remain a one-line system. I think | |
| enough people will see the advantages of UUCP and USENET to be willing to shell | |
| out the cost of a 6-pack of good beer to get access. | |
| As a side note to UNIX hacks out there, this system will also offer a good | |
| place to explore your UNIX hacking techniques. Unlike other systems that | |
| penalize you for breaking security, I will reward people who find holes in my | |
| security. While this will mostly only apply to Level 4 people (the only ones | |
| not in a restricted shell), 3-6 months of free access will be given to people | |
| discovering security loopholes. So if you've ever wanted an unrestricted | |
| environment for learning/perfecting your UNIX, this is it! | |
| For more information, I can be reached at: | |
| The Phoenix Project: 512-441-3088 | |
| Shadowkeep II: 512-929-7002 | |
| Hacker's Den 88: 718-358-9209 | |
| Donations can be sent to: Loyd | |
| PO Box 8500-615 | |
| San Marcos, TX 78666 | |
| (make all checks payable to Loyd) | |
| +++The Mentor+++ | |
| "The Future is Forever!" | |
| _______________________________________________________________________________ | |
| Breaking Into Computers Is A Crime, Pure And Simple December 4, 1988 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Edward A Parrish Jr., Past President, IEEE Computer Society | |
| Originally printed in Los Angeles Times | |
| During the last few years, much has been written to publicize the feats | |
| of computer hackers. There was, for example, the popular movie War Games, | |
| about a teen-ager who, using his home computer, was able to tap into a military | |
| computer network and play games with the heart of the system. The games got | |
| of control when he chose to play "thermonuclear war." The teen-ager, who was | |
| depicted with innocent motives, eventually played a crucial role in solving the | |
| problem and averting a real nuclear exchange, in the process emerging as hero. | |
| A real-life example in early November involved a so-called computer virus | |
| (a self-replicating program spread over computer networks and other media as a | |
| prank or act of vandalism), which nearly paralyzed 6,000 military and academic | |
| computers. | |
| Unfortunately, perhaps because the effect of such "pranks" seems remote to most | |
| people, it is tempting to view the hacker as something of a folk hero - a lone | |
| individual who, armed with only his own ingenuity, is able to thwart the | |
| system. Not enough attention is paid to the real damage that such people can | |
| do. But consider the consequences of a similar "prank" perpetrated on our | |
| air-traffic control system, or a regional banking system, or a hospital | |
| information system. The incident in which an electronic intruder broke into an | |
| unclassified Pentagon computer network, altering or destroying some files, | |
| caused potentially serious damage. | |
| We do not really know the full effect of the November virus incident that | |
| brought many computers on the Cornell-Stanford network to a halt, but credible | |
| published estimates of the cost in man-hours and computer time have been in the | |
| millions of dollars. The vast majority of professional computer scientists and | |
| engineers who design, develop, and use these sophisticated networks are | |
| dismayed by this total disregard of ethical practice and forfeiture of | |
| professional integrity. | |
| Ironically, these hackers are perhaps driven by the same need to explore, to | |
| test technical limits that motivates computer professionals; they decompose | |
| problems, develop an understanding of them and then overcome them. But | |
| apparently not all hackers recognize the difference between penetrating the | |
| technical secrets of their own computer and penetrating a network of computers | |
| that belong to others. And therein lies a key distinction between a computer | |
| professional and someone who knows a lot about computers. | |
| Clearly a technical degree is no guarantee of ethical behavior. And hackers | |
| are not the only ones who abuse the power inherent in their knowledge. What, | |
| then, can we do? | |
| For one thing, we - the public at large - can raise our own consciousness; | |
| Specifically, when someone tampers with someone else's data or programs, | |
| however clever the method, we all need to recognize that such an act is at best | |
| irresponsible and very likely criminal. That the offender feels no remorse, or | |
| that the virus had unintended consequences, does not change the essential | |
| lawlessness of the act, which is in effect breaking-and-entering. And | |
| asserting that the act had a salutary outcome, since it lead to stronger | |
| safeguards, has no more validity than if the same argument were advanced in | |
| defense of any crime. If after experiencing a burglary I purchase a burglar | |
| alarm for my house, does that excuse the burglar? Of course not. Any such act | |
| should be vigorously prosecuted. | |
| On another front, professional societies such as the IEEE Computer Society can | |
| take such steps to expel, suspend, or censure as appropriate any member found | |
| guilty of such conduct. Finally, accrediting agencies, such as the Computing | |
| Sciences Accreditation Board and the Accreditation Board for Engineering and | |
| Technology, should more vigorously pursue their standards, which provide for | |
| appropriate coverage of ethical and professional conduct in university computer | |
| science and computer engineering curriculums. | |
| We are well into the information age, a time when the computer is at least as | |
| vital to our national health, safety and survival as any other single resource. | |
| The public must insist on measures for ensuring computer security to the same | |
| degree as other technologies that are critical to its health and safety. | |
| _______________________________________________________________________________ | |