| ==Phrack Magazine== | |
| Volume Five, Issue Forty-Six, File 2 of 28 | |
| **************************************************************************** | |
| Phrack Loopback | |
| ------------------------------------------------------------------------------ | |
| I'd like to write you about my friends cat. His name is 'Cid. Cid | |
| loves reading, in fact he'll read just about anything, from the labels on | |
| his cat food tins to the instructions on the "real" use of his Grafix | |
| (incense burner :) ). Well one take, 'Cid (or was it me) was indulging | |
| in the reason he got his moniker and mentioned that he'd like to receive | |
| Phrack. Well i told him he could just subscribe to it and then he went | |
| into a real sob story about how he doesn't have net access. So as a | |
| favor to 'Cid (who really does exist, and really has tripped out on brain | |
| blotters) i'd like to subscribe to Phrack. | |
| [You my want to take note that Phrack can also be printed on paper. | |
| Now, that's a lot of blotter. | |
| You've got your subscription, now go watch some anime.] | |
| ------------------------------------------------------------------------------ | |
| I recently got a new job and shortly after beginning working there, they | |
| decided to retool and reorganize a bit for better productivity. | |
| While we were going through some old boxes and stuff, I came across a | |
| little black box with the words "Demon Dialer" molded into the front of | |
| it, it even had the (functional!) 20volt power supply. | |
| Needless to say I was pretty happy with my find. I asked if I could have | |
| it and since no one else there seemed to know what to make of it, mine it | |
| was! | |
| My only problem now... I've played around with it, and it seems to do a | |
| lot more than what I originally thought, but the fact of the matter is.. | |
| I really haven't the foggiest idea of how to get it to REALLY work for me. | |
| If anyone has any information, or better still, actual documentation for | |
| a Telephonics Inc, Demon Dialer.. I'd really appreciate passing it on to me. | |
| Also, something rater strange. The phone cable attached to it had a | |
| normal looking 4-wire connector on one end, but the other was split to | |
| have RJ jacks, one with the yellow-black combo and one with the | |
| red-green. The split ends (sorry :)) were plugged into the WALL and | |
| PHONE jacks on the demon dialer. The purpose for this perplexes me since | |
| one's supposed to be input and one's supposed to be a passthrough for the | |
| phone to be plugged into. | |
| Anyway, any info would be nice. Thanks guys. | |
| [Telephonics was one of those odd telco device manufacturers back in the | |
| 80's. They made the demon dialer (a speed dialing device), a | |
| two-line conference box, a divertor, etc. Essentially, they provided | |
| in hardware what the telco's were beginning to roll-out in software. | |
| I think the line splitter you have was merely plugged into those | |
| two jacks for storage purposes. What that probably was for was to | |
| allow two lines to use the Demon Dialer. It was probably just reversed | |
| when your company boxed it so it wouldn't get lost. | |
| I'm not sure if Telephonics is still in business. A good place to | |
| start looking for info would be comp.dcom.telecom or alt.dcom.telecom. | |
| Another good place may be Hello Direct (800-HI-HELLO). They used to | |
| do have Telephonics equipment available for mail-order.] | |
| ------------------------------------------------------------------------------ | |
| I saw an ad for a book called "Secrets of a SuperHacker" by Knightmare. | |
| Supposedly it intersperses tales of his exploits with code and examples. | |
| I have big doubts, but have you heard anything good/bad about it? | |
| [Your doubts are well founded. I got an advance copy of that book. | |
| Let's put it this way: does any book that contains over a dozen pages | |
| of "common passwords" sound like ground breaking material? | |
| This book is so like "Out of the Inner Circle" that I almost wanted | |
| to believe Knightmare (Dennis Fiery) was really yet another | |
| alias for Bill Landreth. Imagine "Out of the Inner Circle" with | |
| about a hundred or more extra pages of adjectives and examples that | |
| may have been useful years back. | |
| The Knightmare I knew, Tom in 602, whose bust by Gail Thackeray | |
| gave law enforcement a big buffer of the Black Ice Private BBS | |
| and help spark the infamous LOD Hacker Crackdown, certainly didn't | |
| have anything to do with this. In fact, the book has a kind of | |
| snide tone to it and is so clueless, that leads me to believe it | |
| may have been written by a cop or security type person looking to | |
| make a quick buck. | |
| As far as source code, well, there is a sample basic program that | |
| tries to emulate a university login. | |
| If you want a good book, go buy "Firewalls and Internet Security" by | |
| Cheswick and Bellovin.] | |
| ------------------------------------------------------------------------------ | |
| Hey Chris, | |
| I'm sure you are under a constant avalanche of requests for certain files, | |
| so I might as well add to your frustration <grin>. I know of a program | |
| that supposedly tracks cellular phone frequencies and displays them on | |
| a cellmap. However, I don't know the name of the program or (obviously) | |
| where to find this little gem. I was wondering if you could possibly | |
| enlighten me on a way to acquire a program similar to the one I have | |
| described. I have developed some other methods of tracking locations | |
| of cellular calls. However my methods rely on a database and manually | |
| mapping cellular phones, this method is strictly low tech. Of course | |
| this would be for experimental use only, therefore it would not be used | |
| to actually track actual, restricted, radio spectrum signals. I wouldn't | |
| want the aether Gestapo pummeling our heads and necks. | |
| [I don't know of anything that plots frequencies on a cellmap. How would | |
| you know the actual locations of cells for whatever city you may | |
| be in to plot them accurately? | |
| There are a number of programs written to listen to forward channel messages | |
| and tell you when a call is going to jump to another channel. The cellular | |
| telephone experimenter's kit from Network Wizards has a lot of nice | |
| C source that will let you write your own programs that work with their | |
| interface to the OKI 900. I suppose you could get the FCC database | |
| CD-ROM for your state and make note of longitude and latitude of cell sites | |
| and make your own database for your city, and then make a truly | |
| visual representation of a cellmap and watch calls move from cell to cell. | |
| But I don't think there is such a thing floating around the underground | |
| at present. | |
| Of course the carriers have this ability, and are more than happy to make | |
| it available to Law Enforcement (without a warrant mind you). Hi OJ! | |
| email Mark Lottor mw@nw.com for more info about the CTEK.] | |
| ------------------------------------------------------------------------------ | |
| I saw this in a HoHoCon ad: | |
| Top Ten Nark List | |
| 1. Traxxter | |
| 2. Scott Chasin | |
| 3. Chris Goggans | |
| 4. Aget Steal | |
| 5. Dale Drrew | |
| 6. Cliff Stoll | |
| 7. [blank] | |
| 8. Julio Fernandez | |
| 9. Scanman | |
| 10. Cori Braun | |
| What did Chris Goggans do? Isn't he Erik Bloodaxe, the publisher of | |
| Phrack? I sincerely doubt that the feds would have someone | |
| working for them that puts out a publication like Phrack. It would | |
| be way too much of an embarrassment for them. I wrote to the | |
| editor of Phrack when I read that Agent Steal said that the publisher | |
| of Phrack was a Fed - IN PHRACK no less. He said it was a stupid rumor. | |
| Is there anything to support this fact? And why is there now some manhunt for | |
| Agent Steal (at CFP the FBI was checking legs) if Steal was admittedly | |
| their employee? The whole thing is very confusing to me. Please explain. | |
| If Goggans isn't Bloodaxe then he'd Knight Lightning (this just came to me). | |
| Nevertheless, what's the story here? | |
| [First off, I think you take things a little too seriously. If you are on | |
| a nark hunt, worry about your associates, not people you obviously | |
| don't even know. Chris Goggans (ME) is most positively Erik Bloodaxe. | |
| Thanks for remembering. | |
| Agent Steal was involved with the FBI. This is a fact. | |
| In his case, he even appeared to have some kind of immunity while trying | |
| to gather information on other hackers like Mitnik and Poulsen. This | |
| immunity is under scrutiny by the Bureau's own Internal Affairs (or so the | |
| new rumors go), since Steal was pulling a fast one and committing crimes | |
| the Bureau didn't know about to get some quick cash while he set up his | |
| friends. | |
| My story is a bit more convoluted. You can sum it up by saying, if you | |
| interfere with my businesses, I'll try my best to track you down and turn | |
| you in. I guess I am a nark.] | |
| ------------------------------------------------------------------------------ | |
| I read in the last Phrack (45) that you wanted someone to write a few | |
| words on scrambling systems. Give me a rough outline of what you want | |
| and I'll see if I can help :-) Basically I wrote the Black Book | |
| (European Scrambling Systems 1,2,3,4,5 and World Satellite TV & | |
| Scrambling Methods) and also edit Hack Watch News & Syndicated | |
| HackWatch. They all deal with scrambling system hacks as opposed to | |
| computer hacking & phreaking. (Things are a bit iffy here as regards | |
| phreaking as all calls are logged but the eprom phone cards are easy | |
| to hack) Oh yeah and another claim to fame ;-) if you can call it | |
| that, is that I was quoted in an article on satellite piracy in | |
| "Wired" August issue. | |
| This Hawkwind character that you had an article from in Phrack43 | |
| sounds like a *real* hacker indeed :-> Actually there is an elite in | |
| Ireland but it is mainly concerned with satellite hacking and that | |
| Hawkwind character is obviously just a JAFA (Irish hacker expression | |
| - Just Another Fu**ing Amateur). Most of the advanced telco stuff is | |
| tested in the south of the country as Dublin is not really that | |
| important in terms of comms - most of the Atlantic path satellite | |
| comms gear and brains are on the south coast :-) | |
| Actually the Hawkwind article really pissed off some people here in | |
| Ireland - there were a few questions asked on my own bbs (Special | |
| Projects +353-51-50143) about this character. I am not even sure if | |
| the character is a real hacker or just a wannabe - there were no | |
| responses from any of his addresses. SP is sort of like the neutral | |
| territory for satellite and cable hacking information in Europe | |
| though there are a few US callers. With the way things are going with | |
| your new DBS DirecTv system in the US, it looks like the European | |
| satellite hackers are going to be supplying a lot of information | |
| (DirecTv's security overlay was developed by News Datacom - the | |
| developers of the totally hacked VideoCrypt system here in Europe). | |
| There telco here uses eprom phone cards. These are extremely easy to | |
| hack (well most real hackers in .IE work on breaking satellite | |
| scrambling systems that use smart cards) as they are only serial | |
| eprom. | |
| Regards | |
| [About the satellite information: YES! Write the biggest, best | |
| article the whole fucking hacker world has ever seen about | |
| every aspect of satellite tv!! Personally, I'm more interested in | |
| that than anything else anyone could possibly write (seeing as how | |
| I'm about to buy a dish for both C and Ku). | |
| About Hawkwind's article on hacking in Ireland: If I were to write | |
| an article about hacking in America, it would be entirely different | |
| than anyone else in America would write. A country is a big place. | |
| Just because someone else's hacking experience is different than | |
| your own, it's no reason to discredit them. However, if your | |
| exposure to the scene in Ireland is so completely different than | |
| Hawkwind's, I would LOVE to print it as well.] | |
| ------------------------------------------------------------------------------ | |
| The Columbus Freenet uses a password generating routine that takes the | |
| first and last initial of the user's real name, and inserts it into a randomly | |
| chosen template. Some of the templates are: | |
| E(f)www5(l) | |
| (f)22ww5(l) where f and l are first and last initials | |
| (f)2ww97(l) | |
| (f)2ww95(l) | |
| and so on. There are not too many of these templates, I guess maybe 50. | |
| I imagine most people go in and change their password right away, but | |
| then again that's what a prudent person would do (so they probably don't). | |
| Columbus 2600 meetings: | |
| Fungal Mutoid-sysop of The KrackBaby BBS (614-326-3933) organized the | |
| first 2600 meetings in Columbus, unfortunately hardly anyone shows up... | |
| I don't know why HP is so dead in Central Ohio, but fear and paranoia | |
| run rampant. | |
| That's all for now...keep up with the good work! | |
| R.U.Serius?! | |
| [Hmmm...templates are always a bad thing. All one has to do is get the | |
| program that generates them, and viola, you've got a pre-made dict file | |
| for your crack program. Not very smart on the part of the Freenet, | |
| but hacking a Freenet, is like kicking a puppy. | |
| I hope more people go to your 2600 meetings. The ones here in Austin | |
| kinda died out too. Maybe our cities are just lame.] | |
| ------------------------------------------------------------------------------ | |
| A complaint: That piece about McDonald's in Phrack 45 was, in a word, LAME. | |
| Surely Phrack can do better. Maliciousness for its own sake isn't very | |
| interesting and frankly the article didn't have any ideas that a bored | |
| 13-year-old couldn't have thought up--probably written by one. | |
| That aside, I found some good stuff in there. Some of it was old news, | |
| but Phrack serves an archival purpose too, so that was ok. On a more | |
| personal note, I could really relate to your account of HoHoCon--not that | |
| I was there, just that I have started to feel old lately even though I don't | |
| turn 25 for another 2 days :) Sometimes I feel myself saying things like | |
| "Why, sonny, when I was your age the Apple II was king..." | |
| Keep up the good work, and don't let the lamers get you down. | |
| [Thanks for the letter. I personally thought the McDonald's file was | |
| a laugh riot. Even if it was juvenile and moronic, I wouldn't expect | |
| anyone to analyze it and go through with anything it contained. It was | |
| just for fun. Lighten up :) | |
| I am glad to see that at least someone else recognizes that Phrack | |
| is attempting to serve as an archive of our subculture, rather than just | |
| a collection of technical info that will be outdated overnight, or a | |
| buglist that will be rendered mostly unusable within hours of release. | |
| There is so much going on within the community, and it is becoming such a | |
| spectacle in the popular media, that in 20 years, we can all go back and | |
| look at Phrack and remember the people, places, and meetings that | |
| changed the face of the net. | |
| Or maybe I'm just terribly lame, and either 1) refuse to put in the | |
| good stuff, 2) don't have access to the good stuff, 3) exist only as a | |
| puppet agent of The Man, or 4) Don't know nothin' 'bout Telco! | |
| But you know what they say about opinions.] | |
| ---------------------------------------------------------------------------- | |
| I have a few comments on your editorial in Phrack 44 (on information | |
| wants to be free). Thanks for voicing an opinion that is shared by many | |
| of us. I am glad to see a public figure in the CuG with nutz enuff to | |
| actually come out and make such a statement and mean it. | |
| Again, thanks. | |
| Now on the subject of hacking as a whole. Is it just me, or are the number | |
| of losers on the increase? There have always been those who would try | |
| and apply these skills to ripoff scams and system trashing but now that | |
| seems to be the sole intent of many of the "hackers" I come into contact | |
| with. What ever happened to hacking to learn more about the system. To | |
| really hack a system (be it phone, computer), is a test of skill and | |
| determination, and upon success you walk away with a greater understanding | |
| of the machine and its software. Hacking is more than just knowing how | |
| to run crack on a filched password file, or using some exploitation | |
| scripts picked up on IRC, it is a quest for knowledge and gaining | |
| superiority over a system by use of great skill acquired by a deliberate | |
| effort. Once was a time when things like toll fraud (I do miss blue | |
| boxes) were a means to an end, now they seem to be the end in itself. | |
| Also, I am researching info on OSI comsec procedures and have found some | |
| really interesting goodies, if you are interested in publishing | |
| my piece when completed, let me know.. | |
| [(NOTE: This came from a .mil) | |
| Man, I'm glad to see that people in the armed forces still have minds | |
| of their own. Not many people would express such a thing openly. | |
| Yes, the destructive/profit-motivated trends of many of the hackers of | |
| today are pretty sad. But you have to realize, as the technology | |
| becomes more and more like consumer electronics, rather than the | |
| traditional mold of computer as scientific research tool, an entirely | |
| different market segment will be exposed to it and use the technology | |
| for less than scrupulous means. | |
| Even the act of hacking itself. Today, I can basically gain access | |
| to any model of system known to man by asking. I realize that | |
| there are many who cannot accomplish such a thing, but with the | |
| proliferation of public access sites, almost everyone can afford | |
| access to the net to explore and learn. The point comes down to this: | |
| if you have an account on a Sun, why do you need an account on a Sun | |
| at Boeing, unless you either 1) want to sell the cad files of the 777 to | |
| Airbus or McDonnell-Douglas 2) want to get financial information to | |
| make a killing on Wall Street, or 3) just want to have an ego boost | |
| and say "I OWN BOEING!" | |
| Personally, I can understand the ego boost aspect, but I've decided that | |
| I'd much rather get paid by a company like Boeing to hack for them | |
| than against them. I don't want to sell anyone's info, so hacking | |
| into any company is basically useless to me, unless they are paying me | |
| to look for potential weaknesses. | |
| Granted, it's not an easy market to get into, but it's a goal to | |
| shoot for. | |
| And for those who find it impossible to quit due to fear of losing | |
| their edge, check out my editorial in this issue for a possible | |
| solution.] | |
| ------------------------------------------------------------------------------ | |
| I am looking for a Macintosh app that does the same thing as an app | |
| called "Demon Dial" that has been lost in the annals of software | |
| history due to the fact that some people (sysops) question whether it | |
| is illegal software (it dials up a series of phone #'s looking for data | |
| connections). Do you know where I could find an application for the Mac | |
| that does this simple function? | |
| [We had a guy ask in an earlier issue for Macintosh hacking/phreaking | |
| apps. Noone responded. Hell, I know SOMEONE has to use a Mac | |
| out there. Are you Mac-weenies all embarrassed to speak up? | |
| Hell, uuencode and email me your aps, and I'll put them up for | |
| ftp! Help out your poor fellow Macintosh users. I certainly | |
| would if I could, but the thought of touching a Mac gives me the | |
| chills.] | |
| ------------------------------------------------------------------------------ | |
| Have you ever heard of being denied access to your own cell phone? | |
| I am currently in the process of buying a cell phone and was informed | |
| that I COULD NOT have the programming guide of the security code | |
| they enter to program my phone. In my opinion the key word is "MY." | |
| If I get a digital security system for my house you better damn well | |
| figure I will have the security codes for that. The phone was a Motorola | |
| flip phone. I called Motorola and explained how displeased I was with | |
| this company and they said they could not interfere with a reps. policy. | |
| When I was selling car phone we kept the programming guide unless they | |
| asked for it. I demanded it and they laughed in my face. Who said | |
| "the customer is always right" anyway? | |
| Thanks, any info is greatly appreciated. By the way, you wouldn't | |
| happen to have the CN/A number for 815 would you? Also, any ANAC | |
| would be very helpful. | |
| [Well, I hate to say it, but you got typical service from your | |
| cellular agent. Let's face it, these sales reps probably knew | |
| about as much about that programming manual as I do nuclear | |
| physics: "Its confusing, but if you understand it, you can fuck | |
| things up." | |
| I am surprised that Motorola wouldn't sell you the book though. | |
| Motorola will sell anybody anything. You probably called the wrong | |
| place. Moto is so huge they've got multiple groups working on somewhat | |
| similar technologies with absolutely no communication between the groups. | |
| Sometimes they are in different countries, but sometimes they are in the | |
| same city! I would suggest you call a local FAE (Field Applications | |
| Engineer) | |
| and get them to get the book for you. Make up some story about | |
| working on some computer controlled application with the phone, and that | |
| you need any and all documentation on the phone. They'll do it. Money | |
| is money. | |
| As far as the 815 CNA, hell, just call the business office. I haven't | |
| called a CNA in years, only the business office. They are nice people. | |
| And no PINs. | |
| 815 ANAC: ok guys, someone must have one...email it! | |
| "The customer is always right" wasn't in Bartlett's or Columbia's | |
| books of famous quotations. I guess that phrase has been written out of out | |
| history. So, from now on you aren't always right, I guess.] | |
| ------------------------------------------------------------------------------ | |
| Dear Phrack: | |
| We want you! | |
| We want you to be a part of our cutting edge documentary that is traversing | |
| across the "NEW EDGE" of computers, culture, and chaos. | |
| Working in conjunction with Douglas Rushkoff, the best selling author of | |
| "CYBERIA," we are currently gathering together the leaders of this | |
| technological and cultural revolution. This is not a documentary in the | |
| traditional sense of the word. It is more of an exploration, a journey, a | |
| unique vision of the world as seen through the eyes of those who live on the | |
| bleeding edge; where technology, art, science, music, pleasure, and new | |
| thoughts collide. A place people like you and me like to call home. | |
| "New Edge" will deliver a slice of creativity, insanity, and infallibility, | |
| and feed those who are hungry for more than what Main Street USA has to | |
| offer. This project will detonate across the US and around the world. It | |
| will become the who's who of the new frontier and you belong on it's | |
| illustrious list of futurians. Please look over the enclosed press release | |
| description of the project. | |
| Phrack has long been the ultimate source for hack/phreak info, and helped to | |
| push the limits of free speech and information. The role that Phrack has | |
| played in the Steve Jackson Games Case set an important precedent for | |
| CyberLaw. We will also be interviewing several people from the EFF. | |
| Please call me ASAP to schedule an interview for "New Edge", or send me | |
| E-Mail. | |
| Sincerely, | |
| Todd LeValley | |
| Producer, N E W E D G E | |
| (310) 545-8138 Tel/Fax | |
| belief@eworld.com | |
| W E L C O M E | |
| T O T H E | |
| W O R L D | |
| O N T H E | |
| E D G E O F | |
| T H E F U T U R E | |
| W E L C O M E | |
| T O T H E | |
| N E W E D G E | |
| -the documentary- | |
| T h e O r g a n i z a t i o n | |
| Belief Productions in association with Film Forum. | |
| T h e M i s s i o n | |
| Journey through the labyrinth of cyberia and experience the people, places | |
| and philosophy that construct cyberspace and the shores of the technological | |
| frontier. This fast paced visual voyage through the digital revolution will | |
| feature interviews with the innovators, artists, cyberpunks, and visionaries | |
| from all sides of the planet. These specialists are the futurists who are | |
| engineering our cybergenic tomorrow in laboratories today. Along the way we | |
| will investigate the numerous social and political issues which are cropping | |
| up as each foot of fiber optic cable is laid. Artificial intelligence, the | |
| Internet, nanotechnology, interactive media, computer viruses, electronic | |
| music, and virtual reality are just a few of the many nodes our journey will | |
| explore. | |
| T h e F u n d i n g | |
| This exploration is sponsored in part by a grant from The Annenberg | |
| Foundation in association with the LA based non-profit cutting-edge media | |
| group Film Forum. | |
| T h e P r o c e s s | |
| The New Edge project will capture moving images with a variety of input | |
| devices and then assemble them into one fluid documentary using Apple | |
| Macintosh Quadras & PowerMac computers. The post production work will be | |
| done entirely on the computers using the Radius Video Vision Telecast Board | |
| in conjunction with Quicktime software applications such as Adobe Premiere | |
| 4.0 and CoSA After Effects 2.01. The final piece will be recorded to BETACAM | |
| SP videotape for exhibition and distribution. The capture formats for the | |
| project will include: BETACAM SP, Super VHS, Hi-8, 16MM Film, Super-8 Film, | |
| 35MM Stills, and the Fisher | |
| Price Pixelvision 2000. | |
| T h e R e s u l t s | |
| New Edge will pride itself on an innovative visual and aural style which | |
| before today, could only be created on high-end professional video systems | |
| and only for short format spots. The New Edge documentary will be two hours | |
| in length and will have a dense, layered look previously featured only in | |
| much shorter pieces. New Edge will be a showcase piece not only for the | |
| content contained within, but for the way in which the piece was produced. | |
| It will be a spectacular tribute to the products and technology involved in | |
| its creation. | |
| D i s t r i b u t i o n | |
| Direct Cinema - Distributes videos to Libraries, Schools, and Universities | |
| throughout the United States. | |
| Mico Entertainment/NHK Enterprises - Provider of American programming for | |
| Japanese Television. | |
| Labyrinth Media Ltd. - European reality-based documentary distributor | |
| T h e A u d i e n c e | |
| New Edge is aimed at both the technophiles and technophobes alike. While the | |
| show will feature very complex and sophisticated topics, the discussions will | |
| be structured to appeal to both those who do and do not have the technical | |
| framework that underlines the cyberian movement. The show's content and | |
| style will make it readily available to the MTV and Generation X demographic | |
| groups as well as executives who want to stay on top of the latest | |
| technological advances. Individuals who read Mondo 2000 and Wired magazine | |
| will also naturally latch on to this electronic | |
| presentation of their favorite topics. | |
| T h e G u i d e s | |
| Mike Goedecke - Director/Graphic Designer | |
| Mike was the Writer/Director/Cinematographer for the Interplay CD-ROM game | |
| entitled Sim City. Acting as graphic designer for the Voyager Co.- Criterion | |
| Laser Disc Division his work is featured on titles such as: Akira, DEVO-The | |
| Truth About De-Evolution, The Adventures of Baron Munchausen, and Spartacus. | |
| Most recently he collaborated with Los Angeles Video Artist Art Nomura on a | |
| video installation piece entitled Digital Mandala. The piece was edited, | |
| composited , and mastered to Laser Disc using an Apple Macintosh Computer and | |
| off-the-shelf software. The installation is scheduled to tour museums and | |
| art galleries across the United States and Europe. While attending | |
| Cinema/Television Graduate School at the University of Southern California, | |
| Mike directed the award winning documentary short Rhythm, which celebrates | |
| various musical cultures. | |
| Todd LeValley - Producer/Graphic Designer | |
| Todd is the Producer/Director of CyberCulture: Visions From The New Edge, a | |
| documentary that introduces the electronic underground. This project has | |
| been warmly received at numerous "Cyber Festivals" around the country, as | |
| well as at the Director's Guild Of America, and is currently being | |
| distributed by FringeWare Inc. Todd's commercial experience includes being | |
| the in-house graphic designer for Barbour/Langley Productions designing, | |
| compositing, and producing the graphic packages for several 20th Century Fox | |
| Television pilots and The Sci-Fi Trader for the USA Network/Sci-Fi Channel. | |
| Todd is a graduate of the Cinema/Television program at Loyola Marymount | |
| University. | |
| Jeff Runyan - Cinematographer/Editor | |
| Jeff received an MFA from the University of Southern California's Graduate | |
| School of Cinema/Television with an emphasis in cinematography and editing. | |
| He studied cinematography under the guidance of Woody Omens, ASC. and Earl | |
| Rath, ASC., and editing with Edward Dmytryk. Jeff was the cinematographer on | |
| the award wining documentary Rhythm. He has recently completed shooting and | |
| editing a documentary on Academy Award winning Cinematographer Conrad Hall | |
| for the ASC and has just finished directing a short film for USC | |
| Teleproductions. | |
| Douglas Rushkoff - Cyber Consultant/Author | |
| Douglas is the author of the best selling Harper Collins San Francisco novel, | |
| Cyberia. He spent two years of his life living among the key players in the | |
| cyber universe. Douglas knows the New Edge well and is providing us with the | |
| map to its points of interest, rest stops and travelers. | |
| For more information, please contact: | |
| Todd LeValley, Producer | |
| Belief Productions | |
| (310) 545-8138 | |
| belief@eworld.com | |
| [Dear New Edge: | |
| You have got to be kidding me. "Readers of Wired and Mondo 2000 will | |
| naturally latch on to this electronic presentation of their favorite | |
| topics?" | |
| Aren't we awful fucking high on ourselves? Christ. Mondo & Wired | |
| readers and writers (and stars) are themselves so fucking far removed | |
| from the real meat of the underground, that they wouldn't | |
| even be able to relate to it. Obviously this "documentary" | |
| is going to be aimed at the wannabes who sit at home furiously | |
| masturbating to "Cyborgasm" while installing FRACTINT, being very | |
| careful not to soil their copy of "The Hacker Crackdown." Oh joy. | |
| These guys are so fucking out of it, they sent me two letters. | |
| One addressed to Phrack, the other to Phrack / Emmanuel Goldstein. | |
| Maybe they think we're 2600. | |
| CYBER-COUNT: 12 occurrences. | |
| That's kind of low. I'm surprised your public relations people didn't | |
| have you add in a few more cyber-this's or cyber-that's into the | |
| blurb. Gotta keep that cyber-count high if you want to get those | |
| digi-bucks out of those cyberians! CYBER!!! | |
| Read my review of Cyberia guys...find a new pop-fad to | |
| milk for cash.] | |
| ------------------------------------------------------------------------------ | |
| In less than 3 weeks, I will be leaving for Basic Training. Once out of | |
| there, I will be working on Satellite Data Transmissions for the US | |
| Army. I am highly excited, just waiting to see what type of computers | |
| I will be working on. Anyways, I will be enrolled in a 32-week | |
| accelerated technical class teaching me all about satellites, and | |
| the computers that I will be using. Here's the kick. I'll be writing | |
| a series of Tech Journals detailing the workings/operations of/weaknesses, | |
| and the use of the systems. I was wondering if you would be interested | |
| in carrying these. I've read Phrack for a long time, but it is an off | |
| the wall subject. I'll also be playing with the military phone system, | |
| in hopes of finding out what the ABCD tones do. (I heard from a file | |
| that Military phones utilize them but I'm still a civilian, and am | |
| clueless). | |
| Thanks for keeping me informed | |
| Kalisti! | |
| [Sorry to hear about your impending Basic Training. I'm not big on | |
| the military, as they would make me chop off all my hair. | |
| About the Satellite systems: YES If you do indeed find time to write | |
| up any files on how they work, systems involved, weaknesses, etc. | |
| I'D LOVE TO PRINT THAT! Just make sure you don't blow your clearance. | |
| Satellites are very cool. I'm about to buy a Ku Band disk to do some | |
| packet radio type stuff. A bit low-tech compared to the Army, but hell, | |
| I'm on a budget. | |
| ABCD...they are used for prioritizing calls on AUTOVON. FTS doesn't | |
| use them (I think), and they can only be used on certain lines. | |
| They are: | |
| A = priority | |
| B = priority override | |
| C = flash | |
| D = flash override | |
| For instance, if you want to make it known that this is an important | |
| call, you hit the "a" button before dialing. It establishes a | |
| priority-class call, which may cause a light to come on or something | |
| as equally attention grabbing at the called party's end. Priority | |
| calls cannot be interrupted, except by a Priority Override" etc, | |
| with Flash Override being the highest class. | |
| If you do these from an improper line, you will get an error message. | |
| The one I used to get when BS'ing AUTOVON op's long ago | |
| was "The President's use of this line is not authorized." Funny. | |
| Let me know if any of this is still valid.] | |
| ------------------------------------------------------------------------------ | |
| Dear Phrack, | |
| The following is a copy of a Toneloc found file my friend got. As happens | |
| to my friend a lot the numbers aren't valid. But, you'll see he found at least | |
| one System 75. It appears that the 75 had a tracer installed on it already. | |
| My friend did not get a call back on it, and nothing has been done as far | |
| as we know. But, I still wonder -- Is scanning no longer safe? | |
| Castor [612] | |
| 56X-XXXX 22:57:34 03-Apr-94 C CONNECT 1200 | |
| Login: b | |
| Password: | |
| INCORRECT LOGIN | |
| Login: c | |
| Password: | |
| INCORRECT LOGIN | |
| 56X-XXXX 23:04:12 03-Apr-94 C CONNECT 1200 | |
| c | |
| Unknown command error | |
| Ready | |
| d | |
| Unknown command error | |
| Ready | |
| e | |
| Unknown command error | |
| Ready | |
| b | |
| Unknown command error | |
| Ready | |
| 56X-XXXX 23:49:19 03-Apr-94 C CONNECT 1200 | |
| KEYBOARD LOCKED, WAIT FOR LOGIN | |
| [1;24r [1;1H [0J | |
| Login: b | |
| Password: | |
| INCORRECT LOGIN | |
| 56X-XXXX 01:23:28 04-Apr-94 C CONNECT 1200 | |
| Login: b | |
| Password: | |
| INCORRECT LOGIN | |
| Call traced to 612-XXX-XXXX. | |
| Saving number in security log for further investigation. | |
| [Jeez. That sure does suck. | |
| Well, live and learn kiddoes. 1994 is not the time to be hacking | |
| by direct dialing local numbers. It's just not all that smart. | |
| Caller-ID has been tariffed in a lot of RBOCS. A lot of modem | |
| manufacturers implemented caller-id features into their equipment. | |
| Having these features in the equipment means that it won't be long | |
| before people redesign all their login programs to make use of | |
| these features. I would. | |
| I've got an ISDN line. Every time I call out, the SPID (phone number) | |
| of the B channel I'm using is broadcast. There is nothing I can do | |
| about that. On a remote connection, almost all decent ISDN terminal | |
| adaptors have the option to block any SPID they don't know. They won't | |
| even answer the phone, because they receive and interpret the phone | |
| number before any session is established. | |
| Yeah, well, that's ISDN, but it will not take a genius to do a few | |
| quick hacks on some linux box and we will suddenly be inundated with all | |
| kinds of "security packages" that use modems with Caller-ID. | |
| Yeah, I know, *67 (or whatever it is) to block the data, or | |
| route the call through another carrier so the data won't get passed | |
| (10288-NXX-XXXX). The data is still in the system, just not being | |
| transmitted from the switch out to the party being called. | |
| It amazes me how many really smart people I know have been busted | |
| solely because they were hacking local systems and calling them | |
| directly. | |
| Scanning has always been a very tricky subject. Since you are paying | |
| for a phone line, and if you have flat-rate service, you are | |
| thereby entitled to call as many numbers as you want. The big issue | |
| a while back was dialing sequentially (which set some telcos on a rampage | |
| because call usage patterns looked like telemarketing machines). | |
| The other problem is harassment. One call to an individual is a wrong | |
| number. Two is bordering on harassment. So, doing a complete scan | |
| and calling the carriers back through some other method would be | |
| a fairly good idea. And always have your calls forwarded to a | |
| non-working number so the 5,000 assholes who call-return you | |
| during the scan won't interfere. | |
| If you are lucky enough to live in the boonies, you are probably | |
| still somewhat safe, but everyone else...be careful.] | |
| ------------------------------------------------------------------------------ | |
| Phrack- | |
| I was wondering if anyone has ever done an article on breaking | |
| Novell Network through a workstation. I've heard it can be done through | |
| the SysAdmin computer, but is there a way to find the userlist and | |
| passwords? Also how would I go about cleaning up after myself so as to | |
| not leave a trace on the logs. I would appreciate a way other than screen | |
| capture, but if anyone knows of a good boot record booting program to | |
| do a capture of every key typed that would be great, and maybe it | |
| could be uuencoded in the next Phrack! | |
| Thanks again for making the best, ass kickin', a step above the | |
| rest, brain moving, earth shaking, body shivering, fist shaking, totally | |
| bitchin', muy excelente, awesome H/P magazine in the whole world! :) | |
| Sincerely, | |
| The Warden | |
| [Thanks for the compliments... | |
| About your question though, I'm not quite sure what you mean. | |
| In a NetWare environment there really isn't any userlist and passwords | |
| that you can get at. You can run the syscon utility and look at all the | |
| usernames, but not much more. The passwords are stored in what's known | |
| as the "bindery." These are 3 files in the sys/system directory | |
| called NET$OBJ.SYS, NET$VAL.SYS, and NET$PROP.SYS. If you can | |
| pull a password out of those files, I will shit in my hat and eat it. | |
| Beyond that, yes, a key-capture program is definitely the ideal | |
| solution for monitoring activity on a PC workstation. There is | |
| one in this issue.] | |
| ------------------------------------------------------------------------------ | |
| Hi, | |
| I've Been reading your magazine for a long time now, my eyes light up when | |
| I see an advert for a UK BBS with related hacking/phreaking articles or files | |
| on it, but when I try to ring them they are usually gone. | |
| I've been searching for ages for BBS's in the UK with these kind of articles | |
| on them but I've had no luck, Even postings on the USENET had little results. | |
| I have had a few boards which are shady but they ask unusual questions about | |
| abiding to rules/laws about hacking then they prompt with fake login and | |
| registration schemes. | |
| If you have some, could you possibly send or publish a list of shady UK BBS's | |
| Id be extremely grateful | |
| Cheers, | |
| Steven | |
| [Steven: | |
| Hell, I don't even know the numbers to any "shady" bulletin boards here | |
| in America. The only UK hacker bbs I knew of in recent years was | |
| Unauthorised Access, but I'm sure that's the advert you are referring to. | |
| Maybe someone else in the UK knows something decent to call over there. | |
| Any takers? ] | |
| ------------------------------------------------------------------------------ | |
| [THE GRADY FILES] | |
| Many of you may remember the NSA Security Manual we published last | |
| issue. That single file generated more press and hype than I'd | |
| seen in a long time. It was mentioned in several newspapers, it | |
| appeared on television. It was ridiculous. The document is | |
| available to anyone who can fill out a FIOA request. | |
| Regardless, people went zany. At first I couldn't figure out | |
| why everyone was so worked up, and then I caught wind of Grady | |
| Ward. Grady had posted the document to the net (with all mention | |
| of Phrack deleted from it) in several USENET forums alt.politics.org.nsa, | |
| talk.politics.crypto and comp.org.eff.talk. Several readers of | |
| Phrack were quick to jump up and point out that Grady had obtained | |
| it from the magazine (thanks guys!) which he grudgingly admitted. | |
| Grady got to be in the spotlight for a while as the Phrack/NSA Handbook | |
| thread continued to grow. | |
| In the meantime, Grady was either calling, or giving him the | |
| benefit of the doubt, getting called by an awful lot of press. | |
| And even more compelling is the way he'd began pronouncing my | |
| impending federal raid on so many newsgroups. | |
| And of course, I don't have time to read any of that USENET crap | |
| so I'm oblivious to all of this. Then I got a message from Grady. | |
| [GRADY WRITES] | |
| You might want to get ready for the FBI | |
| serving a warrant on you for information | |
| about the NSA security employee manual | |
| published in Phrack 45; | |
| the NSA security people called me about 10 minutes | |
| ago to talk about how it got on the net. | |
| I being very cooperative, gave him | |
| your address in Austin. | |
| Grady | |
| 707-826-7715 | |
| [I REPLY] | |
| Get a grip. | |
| Nothing that was contained in that file could not | |
| be obtained through other sources. | |
| [GRADY REPLIES] | |
| Just because you did nothing illegal, doesn't mean that | |
| you won't be annoyed by the FBI. Generally they will | |
| be very polite however. | |
| Gripping. Now what? | |
| [I REPLY] | |
| Ok, | |
| If someone actually did contact you, what was his name and number. | |
| I will forward that to my lawyer. | |
| [GRADY REPLIES] | |
| I have received your mail regarding "Re: NSA" | |
| It will be read immediately when I return. | |
| If you are seeking more information on the | |
| Moby lexical databases, please run | |
| finger grady@netcom.com | |
| for general information or help downloading | |
| live samples and a postscript version of our | |
| current brochure via anonymous ftp. | |
| Thanks - Grady Ward | |
| ------------------- | |
| He never answered my mail. | |
| ------------------------------------------------------------------------------ | |
| Dear Sir: | |
| Please refrain from sending such material to this address in the future! | |
| Since this address has been usubscribed from the Phrack mailing list, | |
| it means that further mailings are undesirable. | |
| I would also wish to remind you that maintaining lists of people's email | |
| without consent is quite immoral and devious. How hypocritical of | |
| you, who decry all such behavior when it is practiced by corporations | |
| or governments. | |
| Thank you. | |
| robbie@mundoe.maths.mu.oz.au | |
| [PHRACK EDITOR ABUSES POWER: | |
| Dear Sir: | |
| Please excuse the mailing. Have you ever heard of a mistake? | |
| Have you ever heard of an oversight? | |
| Is it really that much of an inconvenience for you to hit the "d" key | |
| to remove one small piece of unwanted mail? | |
| This being said, I would also like to invite you to go fuck yourself. | |
| ** I guess this guy does not like to get unsolicited mail **] | |
| ------------------------------------------------------------------------------ | |
| You people really piss me off! You're undermining the fun and | |
| enjoyment of the rest of the internet users just for your juvenile | |
| games and illegal activities. Do you realize how much better off we'd | |
| be if you all just went away and left the Net to honest people like me? | |
| There is no place in today's society for a bunch of maladjusted | |
| paranoid psychotics like yourselves. Please do all of us users a favor | |
| and go jump in a river. | |
| Kevin Barnes | |
| kebar@netcom.com | |
| [ABUSE OF POWER CONTINUES...WILL ERIKB EVER STOP? | |
| Hey Keith: | |
| Thanks a lot for the letter! | |
| You know, it does my heart good to hear from such kind and caring | |
| folks like yourself. It's so fortunate for the Internet that there are | |
| people like yourself who take it upon themselves to become martyrs for | |
| their causes and express their ideals in such an intelligent manner. | |
| It's fascinating to me that you can send such email sight-unseen. | |
| Do you know who you are writing to? Do you even have the slightest | |
| idea? What do you hope to accomplish? Do you have any idea? | |
| This particular "maladjusted paranoid psychotic" to whom you have so | |
| eloquently addressed is an engineer in the R&D of a Fortune 500 computer | |
| company, and that along with outside consulting will net me about | |
| six-figures this tax year. I've consulted for telephone companies, | |
| governments, aerospace, financial institutions, oil companies (the list | |
| goes on...) and quite frankly I don't do anything even remotely illegal. | |
| In fact, one recent and quite prominent quote from me was "I only | |
| hack for money." | |
| Now, about the silent majority of "honest people" like yourself that you | |
| have so self-rightously chosen to represent... | |
| I've been using the net since the early 80's (arpa-days) initially | |
| through a rms granted guest account on MIT-OZ. I've continued to | |
| work with other Internet Providers to cover the asses of the so-called | |
| "honest people" of which you include yourself. | |
| Now, in my view, if it were not for people like us, who consistently | |
| expose and pinpoint weaknesses in the operating systems and networking | |
| technologies that you use for your "fun and enjoyment" and that I use | |
| for MY JOB, you would continue to be at serious risk. But, perhaps | |
| ignorance is truly bliss, and if so, then Keith, you are probably one of | |
| the happiest people on this fine planet. | |
| Now, per your request, I may just go jump in a river, as the one near | |
| my house is quite nice, and it is almost 100 degrees here in Texas. | |
| I only ask that you do me one small favor: | |
| print out 500 copies of this letter, roll them up into a paper fist, | |
| and shove them into any orifice on your person that meets your criteria | |
| as deserving. | |
| ** I guess this guy doesn't like me...or you ** | |
| EDITORIAL ABUSE ENDS] | |
| ----------------------------------------------------------------------------- | |
| ==Phrack Magazine== | |
| Volume Five, Issue Forty-Six, File 2a of 28 | |
| **************************************************************************** | |
| Phrack Editorial | |
| If you aren't from America, this editorial really isn't meant for you, | |
| so read on with warning, or go on to the next file. | |
| ----------------------------------------------------------------------------- | |
| Stupid hackers. | |
| We've got to do something to clean up our image. | |
| We truly are "America's Most Valuable Resource," as ex-CIA spook Robert | |
| Steele has said so many times. But if we don't stop screwing over our own | |
| countrymen, we will never be looked at as anything more than common | |
| gutter trash. Hacking computers for the sole purpose of collecting | |
| systems like space-age baseball cards is stupid, pointless and can only | |
| lead to a quick trip up the river. | |
| Obviously, no one is going to stop hacking. I've been lucky in that I've | |
| found people willing to pay me to hack for them rather than against | |
| them, but not everyone can score such a coup. What kind of alternative | |
| can the rest of the community have? | |
| Let's say that everyone was given an opportunity to hack without any | |
| worry of prosecution with free access to a safe system to hack from, | |
| with the only catch being that you could not hack certain systems. | |
| Military, government, financial, commercial and university systems would | |
| all still be fair game. Every operating system, every application, every | |
| network type all open to your curious minds. | |
| Would this be a good alternative? Could you follow a few simple | |
| guidelines for the offer of virtually unlimited hacking with no worry of | |
| governmental interference? | |
| Where am I going with this? | |
| Right now we are at war. You may not realize it, but we all feel the | |
| implications of this war, because it's a war with no allies, and | |
| enormous stakes. It's a war of economics. | |
| The very countries that shake our hands over the conference tables of | |
| NATO and the United Nations are picking our pockets. Whether it be the | |
| blatant theft of American R&D by Japanese firms, or the clandestine and | |
| governmentally-sanctioned bugging of Air France first-class seating, or | |
| the cloak-and-dagger hacking of the SWIFT network by the German BND's | |
| Project Rahab, America is getting fucked. | |
| Every country on the planet is coming at us. Let's face it, we are the | |
| leaders in everything. Period. Every important discovery in this | |
| century has been by an American or by an American company. Certainly | |
| other countries have better profited by our discoveries, but | |
| nonetheless, we are the world's think-tank. | |
| So, is it fair that we keep getting shafted by these so-called "allies?" | |
| Is it fair that we sit idly by, like some old hound too lazy to scratch | |
| at the ticks sucking out our life's blood by the gallon? Hell no. | |
| Let's say that an enterprising group of computer hackers decided to | |
| strike back. Using equipment bought legally, using network connections | |
| obtained and paid for legally, and making sure that all usage was | |
| tracked and paid for, this same group began a systematic attack of | |
| foreign computers. Then, upon having gained access, gave any and all | |
| information obtained to American corporations and the Federal | |
| government. | |
| What laws would be broken? Federal Computer Crime Statutes specifically | |
| target so-called "Federal Interest Computers." (ie: banks, | |
| telecommunications, military, etc.) Since these attacks would involve | |
| foreign systems, those statutes would not apply. If all calls and | |
| network connections were promptly paid for, no toll-fraud or other | |
| communications related laws would apply. | |
| International law is so muddled that the chances of getting extradited | |
| by a country like France for breaking into systems in Paris from Albuquerque | |
| is slim at best. Even more slim when factoring in that the information | |
| gained was given to the CIA and American corporations. | |
| Every hacking case involving international breakins has been tried and | |
| convicted based on other crimes. Although the media may spray headlines | |
| like "Dutch Hackers Invade Internet" or "German Hackers Raid NASA," | |
| those hackers were tried for breaking into systems within THEIR OWN | |
| COUNTRIES...not somewhere else. 8lgm in England got press for hacking | |
| world-wide, but got nailed hacking locally. Australia's Realm Hackers: | |
| Phoenix, Electron & Nom hacked almost exclusively other countries, but | |
| use of AT&T calling cards rather than Australian Telecom got them a charge | |
| of defrauding the Australian government. Dutch hacker RGB got huge press | |
| hacking a US military site and creating a "dquayle" account, but got | |
| nailed while hacking a local university. The list goes on and on. | |
| I asked several people about the workability of my proposal. Most | |
| seemed to concur that it was highly unlikely that anyone would have to | |
| fear any action by American law enforcement, or of extradition to | |
| foreign soil to face charges there. The most likely form of retribution | |
| would be eradication by agents of that government. (Can you say, | |
| "Hagbard?") | |
| Well, I'm willing to take that chance, but only after I get further | |
| information from as many different sources as I can. I'm not looking | |
| for anyone to condone these actions, nor to finance them. I'm only | |
| interested in any possible legal action that may interfere with my | |
| freedom. | |
| I'm drafting a letter that will be sent to as many different people as | |
| possible to gather a fully-formed opinion on the possible legal | |
| ramifications of such an undertaking. The letter will be sent to the FBI, | |
| SS, CIA, NSA, NRO, Joint Chiefs, National Security Council, Congress, | |
| Armed Forces, members of local and state police forces, lawyers, professors, | |
| security professionals, and anyone else I can think of. Their answers | |
| will help fully form my decision, and perhaps if I pass along their | |
| answers, will help influence other American hackers. | |
| We must take the offensive, and attack the electronic borders of other | |
| countries as vigorously as they attack us, if not more so. This is | |
| indeed a war, and America must not lose. | |
| ->Erik Bloodaxe...Hacker...American. | |
| --------------------------- | |
| Ok, so maybe that was a bit much. But any excuse to hack without fear | |
| should be reason enough to exert a bit of Nationalism. | |
| I'd much rather be taken out by the French in some covert operation and | |
| go out a martyr, than catch AIDS after being raped by the Texas | |
| Syndicate in the metal shop of some Federal Prison. Wouldn't you? | |