4487 lines
215 KiB
Plaintext
4487 lines
215 KiB
Plaintext
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue Thirty-Three, File 1 of 13
|
|||
|
|
|||
|
Issue XXXIII Index
|
|||
|
________________
|
|||
|
|
|||
|
P H R A C K 3 3
|
|||
|
|
|||
|
September 15, 1991
|
|||
|
________________
|
|||
|
|
|||
|
~Technology for Survival~
|
|||
|
|
|||
|
On December 24, 1989, Taran King and I released the 30th issue of Phrack
|
|||
|
and began to prepare for the new decade. The future of Phrack seemed bright
|
|||
|
and full of great potential. A few weeks later, Phrack was shut down by the
|
|||
|
United States Secret Service as part of a large scale attack on the world
|
|||
|
famous hacking group, the Legion of Doom.
|
|||
|
|
|||
|
The legend of Phrack died... or did it? Several months later, a
|
|||
|
newsletter called Phrack and listed as issue 31 appeared under the editorship
|
|||
|
of Doc Holiday. Of course it was not the original Doc Holiday from Tennessee,
|
|||
|
but instead one of the founding members of Comsec Data Security, Scott Chasin.
|
|||
|
It may have called itself Phrack, but it wasn't.
|
|||
|
|
|||
|
On November 17, 1990, another attempt was made to resurrect Phrack.
|
|||
|
Crimson Death and Doc Holiday were back to try again, this time calling their
|
|||
|
product "Phrack Classic." That issue was not absolutely terrible, but the tone
|
|||
|
behind the articles was misplaced. The introduction itself showed a lack of
|
|||
|
responsibility and maturity at a time when it was needed most. To complicate
|
|||
|
matters, Crimson Death failed to produce another issue of Phrack Classic until
|
|||
|
September 1, 1991, almost 10 months later. This lack of predictability and
|
|||
|
continuity has become too much of a burden on the hacker community.
|
|||
|
|
|||
|
I am proud to announce that a new era of Phrack has thus begun. The new
|
|||
|
Phrack is listed as Phrack 33 despite the Phrack Classic issue of September
|
|||
|
1st. To help ease the transition, the new Phrack staff has borrowed files
|
|||
|
from the PC 33 so they are chronicled correctly. Even Crimson Death has agreed
|
|||
|
that it is once again time to pass the torch.
|
|||
|
|
|||
|
The new Phrack editor is Dispater and other people involved in working on
|
|||
|
this issue include Ninja Master, Circuit, and The Not. Of course they are
|
|||
|
always looking for help and good articles. The new Phrack will be run slightly
|
|||
|
different than the old. The kind of information likely to be found in Phrack
|
|||
|
will not change drastically, but Phrack is intended for people to learn about
|
|||
|
the types of vulnerabilities in systems that some hackers might be likely to
|
|||
|
exploit. If you are concerned about your system being disrupted by computer
|
|||
|
intruders, allow the hackers who write for Phrack to point out some flaws you
|
|||
|
might wish to correct. Phrack still strongly supports the free exchange of
|
|||
|
information and will never participate in censorship except when it would be
|
|||
|
necessary to protect an individual's personal privacy. There is a delicate
|
|||
|
balance to be found in this arena and hopefully it can be discovered. Be
|
|||
|
patient and do not judge the new Phrack without really giving it a chance to
|
|||
|
work out the bugs.
|
|||
|
|
|||
|
I've said my piece, now it is time to turn over the reigns to Dispater.
|
|||
|
I wish him the best of luck, and for you the readers, I hope you enjoy the new
|
|||
|
Phrack as much as you have enjoyed the previous.
|
|||
|
|
|||
|
Sincerely,
|
|||
|
|
|||
|
:Knight Lightning (kl@STORMKING.COM)
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
A few words from Dispater:
|
|||
|
|
|||
|
Phrack will be introducing a new regular column similar to a "letters to
|
|||
|
the editor" section. It will be featured as the second file in each issue,
|
|||
|
beginning with issue 34. Any questions, comments, or problems that you the
|
|||
|
reader would like to air with Phrack publically will be answered there.
|
|||
|
|
|||
|
I'd really like to thank Crimson Death for his cooperation in helping us
|
|||
|
get Phrack started again. He is one of the coolest hackers I have met. We
|
|||
|
could not have done it without him. Other important people to mention are the
|
|||
|
The Monk and Twisted Pair.
|
|||
|
|
|||
|
Thanks to Tuc, Phrack will soon be using an Internet listserver. See
|
|||
|
Phrack 34 for more details. Phrack will also be found on various anonymous FTP
|
|||
|
sites across the Internet, including the anonymous ftp site at EFF.ORG, a Unix
|
|||
|
machine operated by the Electronic Frontier Foundation, an organization to
|
|||
|
which we at Phrack respect. It can also be found at the anonymous ftp site at
|
|||
|
CS.WIDENER.EDU
|
|||
|
|
|||
|
Off the Internet, we hope to establish several bulletin board systems
|
|||
|
as archive sites including Digital Underground (812)941-9427, which is operated
|
|||
|
by The Not. Submissions or letters to Phrack can be made there or on the
|
|||
|
Internet by sending mail to "phracksub@STORMKING.COM".
|
|||
|
|
|||
|
The new format will be a little more professional. This is because I
|
|||
|
have no desire to find myself in court one day like Knight Lightning. However,
|
|||
|
I have no intention of turning Phrack Inc. into some dry industry journal.
|
|||
|
Keeping things lite and entertaining is one of the ways that I was attracted
|
|||
|
to Phrack. I think most people will agree that there is a balance of fun
|
|||
|
and business to be maintained. If this balance is not met, you the reader,
|
|||
|
will get bored and so will I!
|
|||
|
|
|||
|
Check out Phrack World News Special Edition IV for the "details" on
|
|||
|
CyberView '91, the SummerCon-ference hosted by Knight Lightning that took place
|
|||
|
this past summer in St. Louis, Missouri.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
Phrack XXXIII Table of Contents
|
|||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
|
|||
|
1. Introduction to Phrack 33 by Knight Lightning and Dispater
|
|||
|
2. Phrack Profile of Shooting Shark by Crimson Death
|
|||
|
3. A Hacker's Guide to the Internet by The Gatsby
|
|||
|
4. FEDIX On-Line Information Service by Fedix Upix
|
|||
|
5. LATA Referance List by Infinite Loop
|
|||
|
6. International Toll Free Code List by The Trunk Terminator
|
|||
|
7. Phreaking in Germany by Ninja Master
|
|||
|
8. TCP/IP: A Tutorial Part 1 of 2 by The Not
|
|||
|
9. A REAL Functioning RED BOX Schematic by J.R."Bob" Dobbs
|
|||
|
10. Phrack World News Special Edition IV (CyberView '91) by Bruce Sterling
|
|||
|
11. PWN/Part01 by Crimson Death
|
|||
|
12. PWN/Part02 by Dispater
|
|||
|
13. PWN/Part03 by Dispater
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue Thirty-Three, File 2 of 13
|
|||
|
|
|||
|
-*[ P H R A C K XXXIII P R O P H I L E ]*-
|
|||
|
|
|||
|
-=>[ by Crimson Death ]<=-
|
|||
|
|
|||
|
This issue Phrack Profile features a hacker familiar to most of you.
|
|||
|
His informative files in Phrack and the Legion of Doom Technical Journals
|
|||
|
created a stampede of wanna-be Unix hackers. Your friend and mine...
|
|||
|
|
|||
|
Shooting Shark
|
|||
|
~~~~~~~~~~~~~~
|
|||
|
|
|||
|
Personal
|
|||
|
~~~~~~~~
|
|||
|
Handle: Shooting Shark
|
|||
|
Call him: 'Shark'
|
|||
|
Past handles: None
|
|||
|
Handle origin: It's the title of the 3rd song on "Revolution By Night,"
|
|||
|
which many consider to be Blue Oyster Cult's last good
|
|||
|
album.
|
|||
|
Date of Birth: 11/25/66
|
|||
|
Age at current date: 24
|
|||
|
Approximate Location: San Francisco Bay Area.
|
|||
|
Height: 5'10"
|
|||
|
Weight: 150 lbs.
|
|||
|
Eye color: Hazel
|
|||
|
Hair Color: Dark Brown
|
|||
|
Computers: First: Apple //e. Presently: ALR Business V EISA
|
|||
|
386/33.
|
|||
|
------------------------------------------------------------------------------
|
|||
|
|
|||
|
The Story of my Hacking Career
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
In 1984 I was lucky enough to be a Senior at a high school that had one of
|
|||
|
the pilot "Advanced Placement Computer Science" classes. I didn't know much
|
|||
|
about computers at the time, but I had a strong interest, so I signed up.
|
|||
|
"Advanced Placement Computer Science" meant programming in Pascal using the
|
|||
|
UCSD P-System on the newly-released Apple //e. I wasn't too crazy about
|
|||
|
programming in Pascal -- does ANYBODY really like Pascal? -- but I did enjoy
|
|||
|
the software piracy sessions that the class had after school and, much of the
|
|||
|
time, during class when the Instructor was lecturing about DO WHILE loops or
|
|||
|
something equally fascinating. Some of our favorite games at the time were
|
|||
|
ZORK II and what I still consider to be the best Apple II game ever, RESCUE
|
|||
|
RAIDERS. A few months into the school year, I somehow convinced my mother to
|
|||
|
buy me my very own Apple //e, with an entire 64K of RAM, a monochrome monitor,
|
|||
|
and a floppy drive. The first low-cost hard drive for the Apple II, the Sider,
|
|||
|
was $700 for 10Mb at the time, so it was out of the question.
|
|||
|
|
|||
|
Now at about this time, Coleco was touting their Adam add-on to the
|
|||
|
ColecoVision game unit, and they had these great guilt-inducing advertisements
|
|||
|
that had copy something like this:
|
|||
|
|
|||
|
TEACHER: "I want to talk to you about Billy. He's not doing very
|
|||
|
well in school. He just doesn't seem to understand new
|
|||
|
concepts as well as the other kids. All he does is sit
|
|||
|
there and pick his nose."
|
|||
|
|
|||
|
CONCERNED "Well, golly, I just don't know what to do. It's probably
|
|||
|
FATHER: probably because his mother drank so much when she was
|
|||
|
pregnant."
|
|||
|
|
|||
|
TEACHER: "Have you considered getting Billy a computer?"
|
|||
|
|
|||
|
And of course the next scene showed little Billy inserting a tape
|
|||
|
cartridge into his new Adam and pecking his way to higher grades.
|
|||
|
|
|||
|
Such was not the case with me when I got MY computer. All I did was go
|
|||
|
home after school and play "Wizardry." I stopped doing homework and
|
|||
|
I failed 3 out of 6 classes my last semester of my Senior year of high school.
|
|||
|
Luckily enough, I had already been accepted to the local state University, so
|
|||
|
it didn't really matter. Shortly before graduating, I took the AP Computer
|
|||
|
Science test and got the minimum passing score. (I didn't feel so bad when Sir
|
|||
|
Francis Drake later told me that he failed it. Then again, he completed all
|
|||
|
the questions in BASIC.)
|
|||
|
|
|||
|
Worse yet, "Wargames" came out around this time. I'll admit it, my
|
|||
|
interest in hacking was largely influenced by that film.
|
|||
|
|
|||
|
Shortly after I (barely) graduated from high school, I saved up my money
|
|||
|
and bought a (get this) Hayes MicroModem //e. It was only something like $250
|
|||
|
and I was in 300 baud heaven. I started calling the local "use your real name"
|
|||
|
BBSs and shortly graduated to the various small-time hacker BBSs. Note that
|
|||
|
90% of the BBSs at this time were running on Apples using Networks, GBBS or
|
|||
|
some other variant. Few were faster than 300 baud. It was on one of these
|
|||
|
Apple Networks BBSs that I noticed some users talking about these mysterious
|
|||
|
numbers called "800 extenders." I innocently inquired as to what these were,
|
|||
|
and got a reply from Elric of Imrryr. He explained that all I needed to do was
|
|||
|
dial an 800 number, enter a six-digit code, and then I could call anywhere I
|
|||
|
wanted for FREE! It was the most amazing thing. So, I picked a handle, and
|
|||
|
began calling systems like Sherwood Forest II and Sherwood Forest III, OSUNY,
|
|||
|
and PloverNet. At their height, you could call any of these systems and read
|
|||
|
dozens of new messages containing lots of new Sprint and extender codes EVERY
|
|||
|
DAY. It was great! I kept pestering my mentor, Elric, and despite his
|
|||
|
undoubted annoyance with my stupid questions, we remained friends. By this
|
|||
|
time, I realized that my Hayes MicroModem //e was just not where it was at, and
|
|||
|
saved up the $400 to buy a Novation Apple Cat 300, the most awesomest modem of
|
|||
|
its day. This baby had a sound generation chip which could be used to generate
|
|||
|
speech, and more importantly, DTMF and 2600Hz tones. Stupidly enough, I began
|
|||
|
blue boxing. Ironically, at this time I was living in the very town that Steve
|
|||
|
Wozniak and Steve Jobs had gotten busted in for boxing ten years previously.
|
|||
|
|
|||
|
And THEN I started college. I probably would have remained a two-bit
|
|||
|
Apple hacker (instead of what I am today, a two-bit IBM hacker) to this day if
|
|||
|
a friend hadn't told me that it was easy to hack into the school's new Pyramid
|
|||
|
90x, a "super mini" that ran a BSD 4.2 variant. "The professor for the C class
|
|||
|
has created a bunch of accounts, sequentially numbered, all with the same
|
|||
|
default password," he told me. "Just keep trying them until you get an account
|
|||
|
that hasn't been used by a student yet!" I snagged an account which I still
|
|||
|
use to this day, seven years later.
|
|||
|
|
|||
|
At about this time, I called The Matrix, run by Dr. Strangelove. This was
|
|||
|
my first experience with Ken's FORUM-PC BBS software. Dr. Strangelove was a
|
|||
|
great guy, even though he looks somewhat like a wood mouse (and I mean that in
|
|||
|
the nicest possible way). DSL helped me build my first XT clone for a total
|
|||
|
cost of about $400. He even GAVE me a lot of the components I needed, like a
|
|||
|
CGA card and a keyboard.
|
|||
|
|
|||
|
Shortly after that, The Matrix went down and was quickly replaced by IDI,
|
|||
|
run by Aiken Drum. It is here that I met Sir Francis Drake. Shortly after
|
|||
|
THAT, IDI went down and was quickly replaced by Lunatic Labs Unltd, run by my
|
|||
|
old friend The Mad Alchemist. TMA lived within walking distance of my house,
|
|||
|
so I called LunaLabs quite a bit. LunaLabs later became the home base of
|
|||
|
Phrack for a few issues when Knight Lightning and Taran King gave it upon
|
|||
|
entering their freshman year of college.
|
|||
|
|
|||
|
So during this time I just got really into Unix and started writing files
|
|||
|
for Phrack. I wrote about six articles for Phrack and then one for the 2nd LOD
|
|||
|
Technical Journal, which featured a brute-force password hacker. I know, that
|
|||
|
sounds archaic, but this was back in 1984, and I was actually one of the few
|
|||
|
people in the hacker community that knew quite a bit about Unix. I've been
|
|||
|
told by several people that it was my LOD TJ article that got *them* into Unix
|
|||
|
hacking (shucks). I also wrote the original Unix Nasties article for Phrack,
|
|||
|
and on two occasions, when I was later heavily into massive Internet node
|
|||
|
hopping, I would get into a virgin system at some backwoods college like MIT
|
|||
|
and find *my file* in somebody's directory.
|
|||
|
|
|||
|
During 1987, I got a letter from the local FBI office. It was addressed
|
|||
|
to my real name and asked for any information I might wish to provide on a
|
|||
|
break-in in San Diego. Of course I declined, but they kept sending me more
|
|||
|
letters. Now that I was 18 years old I decided to stop doing illegal things.
|
|||
|
I know..."what a weenie." So Lunatic Labs, now being run by The Mad Alchemist,
|
|||
|
became my exclusive haunt because it was a local board. When Elric and Sir
|
|||
|
Francis Drake took over the editorship of Phrack for a few issues, I wrote all
|
|||
|
their intro files.
|
|||
|
|
|||
|
When my computer broke I let those days just fade away behind me.
|
|||
|
Occasionally, old associates would manage to find me and call me voice, much to
|
|||
|
my surprise. Somebody called me once and told me an account had been created
|
|||
|
for me on a BBS called "Catch 22," a system that must have been too good to
|
|||
|
last. I think I called it twice before it went down. Most recently, Crimson
|
|||
|
Death called me, asked me to write a Profile, and here we are.
|
|||
|
|
|||
|
What I'm Doing Now
|
|||
|
~~~~~~~~~~~~~~~~~~
|
|||
|
After two years in the Computer Science program in college, I switched my
|
|||
|
major to Theater Arts for three reasons:
|
|||
|
|
|||
|
1) Theater Arts people were generally nicer people;
|
|||
|
2) Most CS students were just too geeky for me (note I said "most"); and,
|
|||
|
3) I just couldn't manage to pass Calculus III!
|
|||
|
|
|||
|
I graduated last year with a BA in Theater Arts, and like all newly graduated
|
|||
|
Theater majors, started practicing my lines, such as "Do you want fries with
|
|||
|
that?" and "Can I tell you about today's special?" However, I managed to have
|
|||
|
the amazing luck of getting a job in upper management at one of the west
|
|||
|
coast's most famous IBM video graphics card manufacturers. My position lets me
|
|||
|
play with a lot of different toys like AutoDesk 3D Studio and 24-bit frame
|
|||
|
buffers. A 24-bit image I created was featured on the cover of the November
|
|||
|
1990 issue of Presentation Products magazine. For a while I was the system
|
|||
|
administrator of the company's Unix system, with an IP address and netnews and
|
|||
|
the whole works. Now I'm running the company's two-line BBS -- if you can
|
|||
|
figure out what company I work for, give it a call and leave me some mail
|
|||
|
sometime. I'm also into MIDI, and I've set my mother up with a nice little
|
|||
|
studio including a Tascam Porta One and a Roland MT-32. I was an extra in the
|
|||
|
films "Patty Hearst" (with The $muggler) and "The Doors" (for which I put in a
|
|||
|
22-hour day at the Warfield Theater in San Francisco for a concert scene that
|
|||
|
WAS CUT FROM THE #*%& FILM) and I look forward to working on more films in a
|
|||
|
capacity that does not require me to wear bell-bottoms. I've also acted in
|
|||
|
local college theater and I'll be directing a full-length production at a local
|
|||
|
community theater next year. I like to consider myself a well-rounded person.
|
|||
|
|
|||
|
Oh yeah. I also got married last October.
|
|||
|
|
|||
|
People I Have Known
|
|||
|
~~~~~~~~~~~~~~~~~~~
|
|||
|
Elric of Imrryr -- My true mentor. He got me into the business. Too bad he
|
|||
|
moved to Los Angeles.
|
|||
|
|
|||
|
Shadow 2600 -- Known to some as David Flory, may he rest in peace. Early
|
|||
|
in my career he mentioned me and listed me as a collaborator for
|
|||
|
a 2600 article. That was the first time I saw my name in print.
|
|||
|
|
|||
|
Oryan QUEST -- After I had my first Phrack article published, he started
|
|||
|
calling me (he lived about 20 miles away at the time). He would
|
|||
|
just call me and give me c0deZ like he was trying to impress me
|
|||
|
or something. I don't know why he needed me for his own
|
|||
|
personal validation. I was one of the first people to see
|
|||
|
through him and I realized early on that he was a pathological
|
|||
|
liar. Later on he lied about me on a BBS and got me kicked off,
|
|||
|
because the Sysop though he was this great guy. Sheesh.
|
|||
|
|
|||
|
Sir Francis Drake -- Certainly one of the more unique people I've met. He
|
|||
|
printed a really crappy two-part fiction story I wrote in
|
|||
|
his WORM magazine. Shortly after that the magazine
|
|||
|
folded; I think there's a connection.
|
|||
|
|
|||
|
David Lightman -- Never met him, but he used to share my Unix account at
|
|||
|
school.
|
|||
|
|
|||
|
The Disk Jockey -- He pulled a TRW report on the woman that I later ended
|
|||
|
up marrying. Incidentally, he can be seen playing
|
|||
|
basketball in the background in one scene of the film
|
|||
|
"Hoosiers."
|
|||
|
|
|||
|
Lex Luthor -- I have to respect somebody who would first publish my article in
|
|||
|
LOD TJ and then call me up for no reason a year later and give me
|
|||
|
his private Tymnet outdial code.
|
|||
|
|
|||
|
Dr. Strangelove -- He runs a really cool BBS called JUST SAY YES. Call it at
|
|||
|
(415) 922-2008. DSL is probably singularly responsible for
|
|||
|
getting me into IBM clones, which in turn got me my job (how
|
|||
|
many Apple // programmers are they hiring nowadays?).
|
|||
|
|
|||
|
BBSs
|
|||
|
~~~
|
|||
|
Sherwood Forest II and III, OSUNY -- I just thought they were the greatest
|
|||
|
systems ever.
|
|||
|
|
|||
|
Pirate's Bay -- Run by Mr. KRACK-MAN, who considered himself the greatest Apple
|
|||
|
pirate that ever lived. It's still up, for all I know.
|
|||
|
|
|||
|
The 2600 Magazine BBS -- Run on a piece of Apple BBS software called
|
|||
|
TBBS. It is there that I met David Flory.
|
|||
|
|
|||
|
The Police Station -- Remember THAT one?
|
|||
|
|
|||
|
The Matrix, IDI, Lunatic Labs -- Three great Bay Area Forum-PC boards.
|
|||
|
|
|||
|
Catch-22 -- 25 Users, No Waiting!
|
|||
|
|
|||
|
And, of course, net.telecom (the original), comp.risks, rec.arts.startrek...
|
|||
|
|
|||
|
Memories
|
|||
|
~~~~~~~~
|
|||
|
Remember Alliance Teleconferencing? Nothing like putting the receiver
|
|||
|
down to go get something to eat, forgetting about it, coming back in 24 hours,
|
|||
|
and finding the conference still going on.
|
|||
|
|
|||
|
Playing Wizardry and Rescue Raiders on my Apple //e until I lost the
|
|||
|
feeling in my fingers...
|
|||
|
|
|||
|
Carding 13 child-sized Garfield sleeping bags to people I didn't
|
|||
|
particularly care for in high school...
|
|||
|
|
|||
|
Calling Canadian DA Ops and playing a 2600Hz tone for them was always fun.
|
|||
|
|
|||
|
Trashing all the local COs with The Mad Alchemist...
|
|||
|
|
|||
|
My brush with greatness: I was riding BART home from school one night a
|
|||
|
few years ago when Steve Wozniak got onto my car with two of his kids. He was
|
|||
|
taking them to a Warriors game. I was the only person in the car that
|
|||
|
recognized him. He signed a copy of BYTE that I happened to have on me and we
|
|||
|
talked about his new venture, CL-9, the universal remote controller. (Do you
|
|||
|
know anybody who ever BOUGHT one of those?)
|
|||
|
|
|||
|
....And now, for the question
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
"Of the general population of phreaks you have met, would you consider
|
|||
|
most phreaks, if any, to be computer geeks?"
|
|||
|
|
|||
|
Back in my Apple pirating days, I met quite a few young men who were
|
|||
|
definitely members of the Order of the Geek. However, I can count the number
|
|||
|
of true phreaks/hackers I have met personally on one hand. None of them are
|
|||
|
people I'd consider geeks, nerds, spazzes, dorks, etc. They're all people who
|
|||
|
live on the fringe and do things a bit differently -- how many LEGAL people do
|
|||
|
you know that have a nose ring? -- but they're all people I've respected.
|
|||
|
Well, let me take back what I just said. Dr. Strangelove looks kinda geeky in
|
|||
|
my opinion (my mother thinks he's cute, but then again she said that Sir
|
|||
|
Francis Drake is "cute" and when I told him that it bothered him to no end),
|
|||
|
but I consider him a good friend and a generally k-kool d00d. (I'm sure I'll
|
|||
|
be getting a voice call from him on that one...) The only phreak that I've
|
|||
|
ever taken a genuine disliking to was Oryan QUEST, but that was only because he
|
|||
|
was a pathological liar and a pest. Who knows, he might be a nice person now,
|
|||
|
so no offense intended, especially if he knows my home address.
|
|||
|
|
|||
|
So, Anyway...
|
|||
|
|
|||
|
-> Thanks for your time Shooting Shark.
|
|||
|
|
|||
|
Crimson Death
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue Thirty-Three, File 3 of 13
|
|||
|
|
|||
|
______________________________________________________________________________
|
|||
|
|
|||
|
A Hacker's Guide to the Internet
|
|||
|
|
|||
|
By The Gatsby
|
|||
|
|
|||
|
Version 2.00 / AXiS / July 7, 1991
|
|||
|
______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
1 Index
|
|||
|
~~~~~~~~~
|
|||
|
Part: Title:
|
|||
|
~~~~ ~~~~~
|
|||
|
1 Index
|
|||
|
2 Introduction
|
|||
|
3 Glossary, Acronyms, and Abbreviations
|
|||
|
4 What is the Internet?
|
|||
|
5 Where You Can Access The Internet
|
|||
|
6 TAC
|
|||
|
7 Basic Commands
|
|||
|
a TELNET command
|
|||
|
b ftp ANONYMOUS to a Remote Site
|
|||
|
c Basic How to tftp the Files
|
|||
|
d Basic Fingering
|
|||
|
8 Networks
|
|||
|
9 Internet Protocols
|
|||
|
10 Host Names and Addresses
|
|||
|
|
|||
|
|
|||
|
2 Introduction
|
|||
|
~~~~~~~~~~~~~~~~
|
|||
|
The original release of this informative file was in an IRG newsletter,
|
|||
|
but it had some errors that I wanted to correct. I have also added more
|
|||
|
technical information.
|
|||
|
|
|||
|
This file is intended for the newcomer to Internet and people (like
|
|||
|
me) who are not enrolled at a university with Internet access. It covers the
|
|||
|
basic commands, the use of Internet, and some tips for hacking through
|
|||
|
Internet. There is no MAGICAL way to hacking a UNIX system. If you have any
|
|||
|
questions, I can be reached on a number of boards.
|
|||
|
|
|||
|
- The Crypt - - 619/457+1836 - - Call today -
|
|||
|
- Land of Karrus - - 215/948+2132 -
|
|||
|
- Insanity Lane - - 619/591+4974 -
|
|||
|
- Apocalypse NOW - - 2o6/838+6435 - <*> AXiS World HQ <*>
|
|||
|
|
|||
|
Mail me on the Internet: gats@ryptyde.cts.com
|
|||
|
bbs.gatsby@spies.com
|
|||
|
|
|||
|
The Gatsby
|
|||
|
|
|||
|
*** Special Thanks go to Haywire (a/k/a Insanity: SysOp of Insanity Lane),
|
|||
|
Doctor Dissector, and all the members of AXiS.
|
|||
|
|
|||
|
|
|||
|
3 Glossary, Acronyms, and Abbreviations
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
ACSE - Association Control Service Element, this is used with ISO to help
|
|||
|
manage associations.
|
|||
|
ARP - Address Resolution Protocol, this is used to translate IP protocol
|
|||
|
to Ethernet Address.
|
|||
|
ARPA - Defense Advanced Research Project Agency
|
|||
|
ARPANET - Defense Advanced Research Project Agency or ARPA. This is an
|
|||
|
experimental PSN which is still a sub network in the Internet.
|
|||
|
CCITT - International Telegraph and Telephone Consultative Committee is a
|
|||
|
international committee that sets standard. I wish they would set
|
|||
|
a standard for the way they present their name!
|
|||
|
CERT - Computer Emergency Response Team, they are responsible for
|
|||
|
coordinating many security incident response efforts. They have
|
|||
|
real nice reports on "holes" in various UNIX strands, which you
|
|||
|
should get because they are very informative.
|
|||
|
CMIP - Common Management Information Protocol, this is a new HIGH level
|
|||
|
protocol.
|
|||
|
CLNP - Connection Less Network Protocol is OSI equivalent to Internet IP
|
|||
|
DARPA - Defence Advanced Research Project Agency. See ARPANET
|
|||
|
DDN - Defence Data Network
|
|||
|
driver - a program (or software) that communicates with the network itself,
|
|||
|
examples are TELNET, FTP, RLOGON, etc.
|
|||
|
ftp - File Transfer Protocol, this is used to copy files from one host
|
|||
|
to another.
|
|||
|
FQDN - Fully Qualified Domain Name, the complete hostname that reflects
|
|||
|
the domains of which the host is a part.
|
|||
|
Gateway - Computer that interconnects networks.
|
|||
|
Host - Computer that is connected to a PSN.
|
|||
|
Hostname - Name that officially identifies each computer attached
|
|||
|
internetwork.
|
|||
|
Internet - The specific IP-base internetwork.
|
|||
|
IP - Internet Protocol which is the standard that allows dissimilar
|
|||
|
host to connect.
|
|||
|
ICMP - Internet Control Message Protocol is used for error messages for
|
|||
|
the TCP/IP.
|
|||
|
LAN - Local Area Network
|
|||
|
MAN - Metropolitan Area Network
|
|||
|
MILNET - DDN unclassified operational military network.
|
|||
|
NCP - Network Control Protocol, the official network protocol from 1970
|
|||
|
until 1982.
|
|||
|
NIC - DDN Network Information Center
|
|||
|
NUA - Network User Address
|
|||
|
OSI - Open System Interconnection. An international standardization
|
|||
|
program facilitate to communications among computers of different
|
|||
|
makes and models.
|
|||
|
Protocol - The rules for communication between hosts, controlling the
|
|||
|
information by making it orderly.
|
|||
|
PSN - Packet Switched Network
|
|||
|
RFC - Request For Comments, is technical files about Internet protocols
|
|||
|
one can access these from anonymous ftp at NIC.DDN.MIL.
|
|||
|
ROSE - Remote Operations Service Element, this is a protocol that is used
|
|||
|
along with OSI applications.
|
|||
|
TAC - Terminal Access Controller; a computer that allow direct access to
|
|||
|
Internet.
|
|||
|
TCP - Transmission Control Protocol
|
|||
|
TELNET - Protocol for opening a transparent connection to a distant host.
|
|||
|
tftp - Trivial File Transfer Protocol, one way to transfer data from one
|
|||
|
host to another.
|
|||
|
UDP - User Datagram _Protocol
|
|||
|
Unix - This is copyrighted by AT&T, but I use it to cover all the
|
|||
|
look-alike Unix systems, which you will run into more often.
|
|||
|
UUCP - Unix-to-Unix Copy Program, this protocol allows UNIX file
|
|||
|
transfers. This uses phone lines using its own protocol, X.25 and
|
|||
|
TCP/IP. This protocol also exist for VMS and MS-DOS.
|
|||
|
uucp - uucp when in lower case refers to the UNIX command uucp. For
|
|||
|
more information on uucp read files by The Mentor in the Legion of
|
|||
|
Doom Technical Journals.
|
|||
|
WAN - Wide Area Network
|
|||
|
X.25 - CCITTs standard protocol that rules the interconnection of two
|
|||
|
hosts.
|
|||
|
|
|||
|
|
|||
|
In this file I have used several special charters to signify certain
|
|||
|
things. Here is the key;
|
|||
|
|
|||
|
* - Buffed from UNIX itself. You will find this on the left side of the
|
|||
|
margin. This is normally "how to do" or just "examples" of what to do
|
|||
|
when using Internet.
|
|||
|
|
|||
|
# - This means these are commands, or something that must be typed in.
|
|||
|
|
|||
|
|
|||
|
4 What is the Internet?
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
To understand the Internet you must first know what it is. The Internet
|
|||
|
is a group of various networks, ARPANET (an experimental WAN) was the first.
|
|||
|
ARPANET started in 1969, this experimental PSN used Network Control Protocol
|
|||
|
(NCP). NCP was the official protocol from 1970 until 1982 of the Internet (at
|
|||
|
this time also known as DARPA Internet or ARPA Internet). In the early 80's
|
|||
|
DARPA developed the Transmission Control Protocol/Internet Protocol which is
|
|||
|
the official protocol today, but much more on this later. Due to this fact,
|
|||
|
in 1983 ARPANet split into two networks, MILNET and ARPANET (both are still
|
|||
|
part of the DDN).
|
|||
|
|
|||
|
The expansion of Local Area Networks (LAN) and Wide Area Networks (WAN)
|
|||
|
helped make the Internet connecting 2,000+ networks strong. The networks
|
|||
|
include NSFNET, MILNET, NSN, ESnet and CSNET. Though the largest part of the
|
|||
|
Internet is in the United States, the Internet still connects the TCP/IP
|
|||
|
networks in Europe, Japan, Australia, Canada, and Mexico.
|
|||
|
|
|||
|
|
|||
|
5 Where You Can Access Internet
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Internet is most likely to be found on Local Area Networks or LANs and
|
|||
|
Wide Area networks or WANs. LANs are defined as networks permitting the
|
|||
|
interconnection and intercommunication of a group of computers, primarily for
|
|||
|
the sharing of resources such as data storage device and printers. LANs cover
|
|||
|
a short distance (less than a mile) and are almost always within a single
|
|||
|
building complex. WANs are networks which have been designed to carry data
|
|||
|
calls over long distances (many hundreds of miles). You can also access
|
|||
|
Internet through TymNet or Telenet via gateway. You'll have to find your own
|
|||
|
NUAs though.
|
|||
|
|
|||
|
|
|||
|
6 TAC
|
|||
|
~~~~~~~
|
|||
|
TAC (terminal access controller) is another way to access Internet. This
|
|||
|
is just dial-up terminal to a terminal access controller. You will need to
|
|||
|
get a password and an account. TAC has direct access to MILNET. One example
|
|||
|
of a TAC dialup is (800)368-2217, but there are several out there to be found.
|
|||
|
In fact, CERT has a report circulating about people attempting to find these
|
|||
|
dialups through social engineering.
|
|||
|
|
|||
|
If you want the TAC manual you can write a letter to:
|
|||
|
|
|||
|
Defense Communications Agency
|
|||
|
Attn: Code BIAR
|
|||
|
Washington, DC 2o3o5-2ooo
|
|||
|
|
|||
|
Be sure to write that you want the TAC User Guide, 310-p70-74.
|
|||
|
|
|||
|
In order to logon, you will need a TAC Access Card. You would probably
|
|||
|
get it from the DDN NIC. Here is a sample logon:
|
|||
|
|
|||
|
|
|||
|
Use Control-Q for help...
|
|||
|
|
|||
|
*
|
|||
|
* PVC-TAC 111: 01 \ TAC uses to this to identify itself
|
|||
|
* @ #o 124.32.5.82 \ Use ``O'' for open and the internet
|
|||
|
* / address which yea want to call.
|
|||
|
*
|
|||
|
* TAC Userid: #THE.GATSBY
|
|||
|
* Access Code: #10kgb0124
|
|||
|
* Login OK
|
|||
|
* TCP trying...Open
|
|||
|
*
|
|||
|
*
|
|||
|
|
|||
|
|
|||
|
7 Basic Commands
|
|||
|
~~~~~~~~~~~~~~~~~~
|
|||
|
a: Basic TELNET Commands
|
|||
|
|
|||
|
Situation: You have an account on a UNIX system that is a host on
|
|||
|
Internet. Now you can access the entire world! Once the UNIX system you
|
|||
|
should see a prompt, which can look like a '$' or '%' (it also depends on what
|
|||
|
shell you are in and the type of Unix system). At the prompt you can do all
|
|||
|
the normal UNIX commands, but when on a Internet host you can type 'telnet'
|
|||
|
which will bring you to the 'telnet' prompt.
|
|||
|
|
|||
|
*
|
|||
|
* $ #telnet
|
|||
|
* ^ ^
|
|||
|
| |
|
|||
|
| the command that will bring you to the telnet prompt
|
|||
|
|
|
|||
|
a normal UNIX prompt
|
|||
|
|
|||
|
|
|||
|
You should get this:
|
|||
|
|
|||
|
*
|
|||
|
* telnet>
|
|||
|
*
|
|||
|
At this prompt you will have a whole different set of commands which are
|
|||
|
as follows (This comes from UCSD, so it may vary from place to place).
|
|||
|
|
|||
|
*
|
|||
|
* telnet> #help
|
|||
|
*
|
|||
|
* close close current connection
|
|||
|
* display display operating parameters
|
|||
|
* open connect to a site
|
|||
|
* quit exit telnet
|
|||
|
* send transmit special character
|
|||
|
* set set operating parameters
|
|||
|
* status print status information
|
|||
|
* toggle toggle operating parameters
|
|||
|
* ? to see what you are looking at now
|
|||
|
*
|
|||
|
|
|||
|
close - this command is used to 'close' a connection, when multitasking
|
|||
|
or jumping between systems.
|
|||
|
|
|||
|
display - this set the display setting, commands for this are as follow.
|
|||
|
|
|||
|
^E echo.
|
|||
|
^] escape.
|
|||
|
^H erase.
|
|||
|
^O flushoutput.
|
|||
|
^C interrupt.
|
|||
|
^U kill.
|
|||
|
^\ quit.
|
|||
|
^D eof.
|
|||
|
|
|||
|
|
|||
|
open - type 'open [host]' to connect to a system
|
|||
|
|
|||
|
*
|
|||
|
* $ #telnet ucsd.edu
|
|||
|
*
|
|||
|
|
|||
|
or
|
|||
|
*
|
|||
|
* telnet> #open 125.24.64.32.1
|
|||
|
*
|
|||
|
|
|||
|
quit - to get out of telnet and back to UNIX
|
|||
|
send - send files
|
|||
|
set - set
|
|||
|
echo - character to toggle local echoing on/off
|
|||
|
escape - character to escape back to telnet command mode
|
|||
|
|
|||
|
|
|||
|
The following need 'localchars' to be toggled:
|
|||
|
|
|||
|
erase - character to cause an Erase Character
|
|||
|
flushoutput - character to cause an Abort Output
|
|||
|
interrupt - character to cause an Interrupt Process
|
|||
|
kill - character to cause an Erase Line
|
|||
|
quit - character to cause a Break
|
|||
|
eof - character to cause an EOF
|
|||
|
? - display help information
|
|||
|
|
|||
|
|
|||
|
b: ftp ANONYMOUS to a remote site
|
|||
|
|
|||
|
ftp or file transfer protocol is used to copy files from a remote host to
|
|||
|
the one that you are on. You can copy anything. Security has really clamped
|
|||
|
down on the passwd file, but it will still work here and there (always worth a
|
|||
|
shot).
|
|||
|
|
|||
|
This could be useful when you see a Internet CuD (Computer Underground
|
|||
|
Digest) site that accepts a anonymous ftps, and you want to read the CuDs, but
|
|||
|
do not feel like wasting your time on boards downloading them. The best way
|
|||
|
to start out is to ftp a directory to see what you are getting.
|
|||
|
|
|||
|
Example: The CuD archive site has an Internet address of 192.55.239.132
|
|||
|
and my account name is "gats".
|
|||
|
|
|||
|
*
|
|||
|
* $ #ftp
|
|||
|
* ^ ^
|
|||
|
| |
|
|||
|
| ftp command
|
|||
|
|
|
|||
|
UNIX prompt
|
|||
|
|
|||
|
*
|
|||
|
* ftp> #open 192.55.239.132
|
|||
|
* Connected to 192.55.239.132
|
|||
|
* 220 192.55.239.132 FTP Server (sometimes the date, etc)
|
|||
|
* Name (192.55.239.132:gats): #anonymous
|
|||
|
* ^ ^ ^
|
|||
|
| | |
|
|||
|
| | This is where you type 'anonymous' unless
|
|||
|
| | you have a account on 192.55.239.132.
|
|||
|
| |
|
|||
|
| This is the name of my account or [from]
|
|||
|
|
|
|||
|
This is the Internet address or [to]
|
|||
|
*
|
|||
|
* Password: #gats
|
|||
|
* ^
|
|||
|
|
|
|||
|
For this just type your username or anything you feel like typing
|
|||
|
in at that time. It doesn't matter.
|
|||
|
|
|||
|
*
|
|||
|
* % ftp 192.55.239.132
|
|||
|
* Connected to 192.55.239.132
|
|||
|
* ftp> #ls
|
|||
|
* ^
|
|||
|
|
|
|||
|
You are connected now, thus you can ls it.
|
|||
|
|
|||
|
Just move around like you would in a normal unix system. Most of the
|
|||
|
commands still apply on this connection. Here is a example of me getting a
|
|||
|
copy of the Electronic Frontier Foundation's Effector (issue 1.04) from
|
|||
|
Internet address 192.55.239.132.
|
|||
|
|
|||
|
*
|
|||
|
* % #ftp
|
|||
|
* ftp> #open 128.135.12.60
|
|||
|
* Trying 128.135.12.60...
|
|||
|
* 220 chsun1 FTP server (SunOS 4.1) ready.
|
|||
|
* Name (128.135.12.60:gatsby): anonymous
|
|||
|
* 331 Guest login ok, send ident as password.
|
|||
|
* Password: #gatsby
|
|||
|
* 230 Guest login ok, access restrictions apply.
|
|||
|
* ftp> #ls
|
|||
|
* 200 PORT command successful.
|
|||
|
* 150 ASCII data connection for /bin/ls (132.239.13.10,4781) * (0 bytes).
|
|||
|
* .hushlogin
|
|||
|
* bin
|
|||
|
* dev
|
|||
|
* etc
|
|||
|
* pub
|
|||
|
* usr
|
|||
|
* README
|
|||
|
* 226 ASCII Transfer complete.
|
|||
|
* 37 bytes received in 0.038 seconds (0.96 Kbytes/s)
|
|||
|
* ftp>
|
|||
|
|
|||
|
_________________________________________________________________________
|
|||
|
|
|
|||
|
| This is where you can try to 'cd' the "etc" dir or just 'get'
|
|||
|
| /etc/passwd, but grabbing the passwd file this way is a dieing art.
|
|||
|
|_________________________________________________________________________
|
|||
|
|
|||
|
* ftp> #cd pub
|
|||
|
* 200 PORT command successful.
|
|||
|
* ftp> #ls
|
|||
|
* ceremony
|
|||
|
* cud
|
|||
|
* dos
|
|||
|
* eff
|
|||
|
* incoming
|
|||
|
* united
|
|||
|
* unix
|
|||
|
* vax
|
|||
|
* 226 ASCII Transfer cmplete.
|
|||
|
* 62 bytes received in 1.1 seconds (0.054 Kbytes/s)
|
|||
|
* ftp> #cd eff
|
|||
|
* 250 CWD command successful.
|
|||
|
* ftp> #ls
|
|||
|
* 200 PORT command successful.
|
|||
|
* 150 ASCII data connection for /bin/ls (132.239.13.10,4805) (0 bytes).
|
|||
|
* Index
|
|||
|
* eff.brief
|
|||
|
* eff.info
|
|||
|
* eff.paper
|
|||
|
* eff1.00
|
|||
|
* eff1.01
|
|||
|
* eff1.02
|
|||
|
* eff1.03
|
|||
|
* eff1.04
|
|||
|
* eff1.05
|
|||
|
* realtime.1
|
|||
|
* 226 ASCII Transfer complete.
|
|||
|
* 105 bytes received in 1.8 seconds (0.057 Kbytes/s)
|
|||
|
* ftp> #get
|
|||
|
* (remote-file) #eff1.04
|
|||
|
* (local-file) #eff1.04
|
|||
|
* 200 PORT command successful.
|
|||
|
* 150 Opening ASCII mode data connection for eff1.04 (909 bytes).
|
|||
|
* 226 Transfer complete.
|
|||
|
* local: eff1.04 remote: eff1.04
|
|||
|
* 931 bytes received in 2.2 seconds (0.42 Kbytes/s)
|
|||
|
* ftp> #close
|
|||
|
* Bye...
|
|||
|
* ftp> #quit
|
|||
|
* %
|
|||
|
*
|
|||
|
|
|||
|
To read the file you can just 'get' the file and buffer it. If the files
|
|||
|
are just too long, you can 'xmodem' it off the host you are on. Just type
|
|||
|
'xmodem' and that will make it much faster to get the files. Here is the set
|
|||
|
up (as found on ocf.berkeley.edu).
|
|||
|
|
|||
|
If you want to: type:
|
|||
|
|
|||
|
send a text file from an apple computer to the ME xmodem ra <filename>
|
|||
|
send a text file from a non-apple home computer xmodem rt <filename>
|
|||
|
send a non-text file from a home computer xmodem rb <filename>
|
|||
|
send a text file to an apple computer from the ME xmodem sa <filename>
|
|||
|
send a text file to a non-apple home computer xmodem st <filename>
|
|||
|
send a non-text file to a home computer xmodem sb <filename>
|
|||
|
|
|||
|
xmodem will then display:
|
|||
|
|
|||
|
*
|
|||
|
* XMODEM Version 3.6 -- UNIX-Microcomputer Remote File Transfer Facility
|
|||
|
* File filename Ready to (SEND/BATCH RECEIVE) in (binary/text/apple) mode
|
|||
|
* Estimated File Size (file size)
|
|||
|
* Estimated transmission time (time)
|
|||
|
* Send several Control-X characters to cancel
|
|||
|
*
|
|||
|
|
|||
|
|
|||
|
Hints- File transfer can be an iffy endeavor; one thing that can help is to
|
|||
|
tell the annex box not to use flow control. Before you do rlogin, type
|
|||
|
|
|||
|
stty oflow none
|
|||
|
stty iflow none
|
|||
|
|
|||
|
at the annex prompt. This works best coming through 2-6092.
|
|||
|
|
|||
|
Some special commands used during ftp session are cdup (same as cd ..) and
|
|||
|
dir (gives a detailed listing of the files).
|
|||
|
|
|||
|
|
|||
|
c: How to tftp the Files
|
|||
|
|
|||
|
tftp (Trivial File Transfer Protocol, the command is NOT in caps, because
|
|||
|
UNIX is case sensitive) is a command used to transfer files from host to host.
|
|||
|
This command is used sometimes like ftp, in that you can move around using
|
|||
|
UNIX commands. I will not go into this part of the command, but I will go
|
|||
|
into the basic format, and structure to get files you want. Moreover, I will
|
|||
|
be covering how to flip the /etc/passwd out of remote sites.
|
|||
|
There is a little trick that has been around a while. It helps you to
|
|||
|
"flip" the /etc/passwd file out of different sites, which gets you the passwd
|
|||
|
file without out breaking into the system. Then just run Brute Hacker (the
|
|||
|
latest version) on the thing and you save time and energy. This 'hole' (not
|
|||
|
referring to the method of obtaining Unix superuser status) may can be found
|
|||
|
on SunOS 3.X, but has been fixed in 4.0. It has sometimes appeared in
|
|||
|
System V, BSD and a few others.
|
|||
|
|
|||
|
The only problem with this 'hole' is that the system manager will often
|
|||
|
realize what you are doing. The problem occurs when attempts to tftp the
|
|||
|
/etc/passwd is happen too many times. You may see this (or something like
|
|||
|
this) when you logon on to your account. This was buffered off of
|
|||
|
plague.berkeley.edu. I guess they knew what I was doing.
|
|||
|
|
|||
|
*
|
|||
|
* DomainOS Release 10.3 (bsd4.3) Apollo DN3500 (host name):
|
|||
|
* This account has been deactivated due to use in system cracking
|
|||
|
* activities (specifically attempting to tftp /etc/passwd files from remote
|
|||
|
* sites) and for having been used or broken in to from <where the calls are
|
|||
|
* from>. If the legitimate owner of the account wishes it reactivated,
|
|||
|
* please mail to the staff for more information.
|
|||
|
*
|
|||
|
* - Staff
|
|||
|
*
|
|||
|
|
|||
|
The tftp is used in this format:
|
|||
|
|
|||
|
tftp -<command> <any name> <Internet Address> /etc/passwd <netascii>
|
|||
|
|
|||
|
Command -g is to get the file, this will copy the file onto
|
|||
|
your 'home' directory, thus you can do anything with
|
|||
|
the file.
|
|||
|
|
|||
|
Any Name If your going to copy it to your 'home' directory, it needs a
|
|||
|
name.
|
|||
|
|
|||
|
Internet This is the address that you want to snag the passwd file from.
|
|||
|
Address There are hundreds of thousands of them.
|
|||
|
|
|||
|
/ETC/PASSWD THIS IS THE FILE THAT YOU WANT. You do not want John Smith's
|
|||
|
even though it would be trivial to retreive it.
|
|||
|
|
|||
|
netascii This how you want the file to be transferred.
|
|||
|
|
|||
|
& Welcome to the power of UNIX, it is multitasking, this little
|
|||
|
symbol place at the end will allow you to do other things (such
|
|||
|
as grab the passwd file from the UNIX that you are on).
|
|||
|
|
|||
|
Here is the set up: We want to get the passwd file from
|
|||
|
sunshine.ucsd.edu. The file in your 'home' directory is going to be named
|
|||
|
'asunshine'.
|
|||
|
|
|||
|
*
|
|||
|
* $ #tftp -g asunshine sunshine.ucsd.edu /etc/passwd &
|
|||
|
*
|
|||
|
|
|||
|
|
|||
|
d Basic Fingering
|
|||
|
|
|||
|
Fingering is a real good way to get an account on remote sites. Typing
|
|||
|
'who' or just 'finger <account name> <CR>' you can have names to "finger".
|
|||
|
This will give you all kinds information on the person's account. Here is a
|
|||
|
example of how to do it:
|
|||
|
|
|||
|
*
|
|||
|
* % #who
|
|||
|
* joeo ttyp0 Jun 10 21:50 (bmdlib.csm.edu)
|
|||
|
* gatsby ttyp1 Jun 10 22:25 (foobar.plague.mil)
|
|||
|
* ddc crp00 Jun 10 11:57 (aogpat.cs.pitt.edu)
|
|||
|
* liliya display Jun 10 19:40
|
|||
|
|
|||
|
/and fingering what you see
|
|||
|
|
|||
|
* % #finger bbc
|
|||
|
* Login name: ddc In real life: David Douglas Cornwall
|
|||
|
* Office: David C. Co
|
|||
|
* Directory: //aogpat/users_local/bdc Shell: /bin/csh
|
|||
|
* On since Jun 10 11:57:46 on crp00 from aogpat Phone 555-1212
|
|||
|
* 52 minutes Idle Time
|
|||
|
* Plan: I like to eat apples and bananas.
|
|||
|
* %
|
|||
|
*
|
|||
|
|
|||
|
Now you could just call (or Telnet to) 'aogpat.cs.pit.edu' and try to
|
|||
|
hack out an account. Try the last name as the password, the first name, the
|
|||
|
middle name, and try them all backwards. The chances are real good that you
|
|||
|
WILL get in because people are stupid.
|
|||
|
|
|||
|
If there are no users online for you to type "who" you can just type
|
|||
|
"last" and all of the users who logged on will come rolling out. Now "finger"
|
|||
|
them. The only problem with using the "last" command is aborting it.
|
|||
|
|
|||
|
You can also try telephoning individual users and tell them you are the
|
|||
|
system manager (i.e. social engineer them). However, I have not always seen
|
|||
|
phone numbers in everyone's ".plan" file (the file you see when you finger the
|
|||
|
user).
|
|||
|
|
|||
|
|
|||
|
8 Other Networks
|
|||
|
~~~~~~~~~~~~~~~~~
|
|||
|
AARNet - Australian Academic and Research Network. This network supports
|
|||
|
research for various Australian Universities. This network
|
|||
|
supports TCP/IP, DECnet, and OSI (CLNS).
|
|||
|
|
|||
|
ARPANET - We've already discussed this network.
|
|||
|
|
|||
|
BITNET - Because It's Time NETwork (BITNET) is a worldwide network that
|
|||
|
connects many colleges and universities. This network uses many
|
|||
|
different protocols, but it dose use the TCP/IP.
|
|||
|
|
|||
|
CREN CSNET - Corporation for Research and Educational Network (CREN) or
|
|||
|
Computer + Science research NETwork (CSNET). This network links
|
|||
|
scientists at sites all over the world. CSNET providing access
|
|||
|
|
|||
|
to the Internet, CREN to BITNET. CREN is the name more often
|
|||
|
used today.
|
|||
|
|
|||
|
CSUNET - California State University Network (CSUNET). This network
|
|||
|
connects the California State University campuses and other
|
|||
|
universities in California. This network is based on the CCITT
|
|||
|
X.25 protocol, and also uses TCP/IP, SNA/DSLC, DECnet, and
|
|||
|
others.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The Cypress Net - This network started as a experimental network. The use of
|
|||
|
this network today is as a connection to the TCP/IP Internet
|
|||
|
as a cheap price.
|
|||
|
|
|||
|
DRI - Defense Research Internet is a WAN that is used as a platform
|
|||
|
from which to work from. This network has all kind of services,
|
|||
|
such as multicast service, real-time conference and more. This
|
|||
|
network uses the TCP/IP (also see RFC 907-A for more information
|
|||
|
on this network).
|
|||
|
|
|||
|
ESnet - This is the new network operated by the Department of Energy's
|
|||
|
Office of Energy Research (DoE OER). This net is the backbone
|
|||
|
for all DoE OER programs. This network replaced the High Energy
|
|||
|
Physics DECnet (HEPnet) and also the Magnetic Fusion Energy
|
|||
|
network (MFEnet). The protocols offered are IP/TCP and also
|
|||
|
DECnet service.
|
|||
|
|
|||
|
JANET - JANET is a Joint Academic NETwork based in the UK, connected to
|
|||
|
the Internet. JANET is a PSN (information has pass through a
|
|||
|
PAD) using the protocol X.25 though it does support the TCP/IP.
|
|||
|
This network also connects PSS (Packet Switched Service is a PSN
|
|||
|
that is owned and operated by British telecom).
|
|||
|
|
|||
|
JUNET - Japan's university message system using UUCP, the Internet as its
|
|||
|
backbone, and X.25 (see RFC 877). This network is also a part of
|
|||
|
USENET (this is the network news).
|
|||
|
|
|||
|
Los Nettos - Los Nettos is a high speed MAN in the Los Angeles area. This
|
|||
|
network uses the IP/TCP.
|
|||
|
|
|||
|
MILNET - When ARPANET split, the DDN was created and MILNET (MILitary
|
|||
|
NETwork) is also a part of the network. MILNET is unclassified,
|
|||
|
but there are three other classified networks that make up the
|
|||
|
DDN.
|
|||
|
|
|||
|
NORDUNet - This net is the backbone to the networks in the Nordic Countries,
|
|||
|
Denmark (DENet), Finland (FUNET), Iceland (SURIS), Norway
|
|||
|
(UNINETT), and Sweden (SUNET). NORDUnet supports TCP/IP, DECNet,
|
|||
|
and X.25.
|
|||
|
|
|||
|
NSN - NASA Science Network (NSN). This network is used by NASA to send
|
|||
|
and relay information. The protocols used are TCP/IP. NSN has a
|
|||
|
sister network called Space Physics Analysis Network (SPAN) for
|
|||
|
DECNet.
|
|||
|
|
|||
|
ONet - Ontario Network is a TCP/IP network used for research.
|
|||
|
|
|||
|
NSFNet - National Science Foundation Network, this network is in the
|
|||
|
IP/TCP family, but in any case it uses UDP (User Diagram
|
|||
|
Protocol) and not TCP. NSFnet is the network for the US
|
|||
|
scientific and engineering research community. Listed below are
|
|||
|
all the NSFNet Sub-networks:
|
|||
|
|
|||
|
BARRNet - Bay Area Regional Research Network is located in the San
|
|||
|
Francisco area. This network uses TCP/IP.
|
|||
|
|
|||
|
CERFnet - California Education and Research Federation Network is
|
|||
|
a research based network supporting Southern California
|
|||
|
Universities communication services. This network uses
|
|||
|
TCP/IP.
|
|||
|
|
|||
|
CICNet - Committee on Institutional Cooperation. This network
|
|||
|
services the BIG 10, and University of Chicago. This
|
|||
|
network uses TCP/IP.
|
|||
|
|
|||
|
JvNCnet - John von Neumann National Supercomputer Center. This
|
|||
|
network uses TCP/IP.
|
|||
|
|
|||
|
Merit - Merit connects Michigan's academic and research
|
|||
|
computers. This network supports TCP/IP, X.25 and
|
|||
|
Ethernet for LANs.
|
|||
|
|
|||
|
MIDnet - MIDnet connects 18 universities and research centers in
|
|||
|
the midwest United States. The support protocols are
|
|||
|
TELNET, FTP and SMTP.
|
|||
|
|
|||
|
MRNet - Minnesota Regional Network, this network services
|
|||
|
Minnesota. The network protocols are TCP/IP.
|
|||
|
|
|||
|
NEARnet - New England Academic and Research Network, connects
|
|||
|
various research/educational institutions. You
|
|||
|
can get more information about this net by mailing
|
|||
|
'nearnet-staff@bbn.com'.
|
|||
|
|
|||
|
|
|||
|
NCSAnet - The National Center for Supercomputing Applications
|
|||
|
supports the whole IP family (TCP, UDP, ICMP, etc).
|
|||
|
|
|||
|
NWNet - North West Network provides service to the Northwestern
|
|||
|
United States and Alaska. This network supports IP and
|
|||
|
DECnet.
|
|||
|
|
|||
|
NYSERNet - New York Service Network is a autonomous nonprofit
|
|||
|
network. This network supports the TCP/IP.
|
|||
|
|
|||
|
OARnet - Ohio Academic Resources Network gives access to the
|
|||
|
Ohio Supercomputer Center. This network supports TCP/IP.
|
|||
|
|
|||
|
PREPnet - Pennsylvania Research and Economic Partnership is a
|
|||
|
network operated and managed by Bell of Pennsylvania. It
|
|||
|
supports TCP/IP.
|
|||
|
|
|||
|
PSCNET - Pittsburgh Supercomputer Center serving Pennsylvania,
|
|||
|
Maryland, and Ohio. It supports TCP/IP, and DECnet.
|
|||
|
|
|||
|
SDSCnet - San Diego Super Computer Center is a network whose goal
|
|||
|
is to support research in the field of science. The
|
|||
|
Internet address is 'y1.ucsc.edu' or call Bob at
|
|||
|
(619)534-5060 and ask for a account on his Cray.
|
|||
|
|
|||
|
Sesquinet - Sesquinet is a network based in Texas. It supports
|
|||
|
TCP/IP.
|
|||
|
|
|||
|
SURAnet - Southeastern Universities Research Association Network
|
|||
|
is a network that connects institutions in the Southeast
|
|||
|
United States.
|
|||
|
|
|||
|
THEnet - Texas Higher Education Network is a network that is run
|
|||
|
by Texas A&M University. This network connects to hosts
|
|||
|
in Mexico.
|
|||
|
|
|||
|
USAN/NCAR - University SAtellite Network (USAN)/National Center for
|
|||
|
Atmospheric Research is a network for information
|
|||
|
exchange.
|
|||
|
|
|||
|
Westnet - Westnet connects the western part of the United States,
|
|||
|
but not including California. The network is supported
|
|||
|
by Colorado State University.
|
|||
|
|
|||
|
USENET - USENET is the network news (the message base for the Internet).
|
|||
|
This message base is quite large with over 400 different topics
|
|||
|
and connecting to 17 different countries.
|
|||
|
|
|||
|
|
|||
|
9 Internet Protocols
|
|||
|
~~~~~~~~~~~~~~~~~~~~~
|
|||
|
TCP/IP is a general term relating to the whole family of Internet
|
|||
|
protocols. The protocols in this family are IP, TCP, UDP, ICMP, ROSE, ACSE,
|
|||
|
CMIP, ISO, ARP and Ethernet for LANs. If if you want more information, get
|
|||
|
the RFCs.
|
|||
|
|
|||
|
TCP/IP protocol is a "layered" set of protocols. In this diagram taken
|
|||
|
from RFC 1180 you will see how the protocol is layered when connection is
|
|||
|
made.
|
|||
|
|
|||
|
Figure is of a Basic TCP/IP Network Node:
|
|||
|
|
|||
|
-----------------------------------
|
|||
|
| Network Application |
|
|||
|
| |
|
|||
|
| ... \ | / .. \ | / ... |
|
|||
|
| ------- ------- |
|
|||
|
| | TCP | | UDP | |
|
|||
|
| ------- ------- |
|
|||
|
| \ / | % Key %
|
|||
|
| ------- --------- | ~~~~~~~
|
|||
|
| | ARP | | IP | | UDP User Diagram Protocol
|
|||
|
| ------- ------*-- | TCP Transfer Control Protocol
|
|||
|
| \ | | IP Internet Protocol
|
|||
|
| \ | | ENET Ethernet
|
|||
|
| ------------- | ARP Address Resolution
|
|||
|
| | ENET | | Protocol
|
|||
|
| -------@----- | O Transceiver
|
|||
|
| | | @ Ethernet Address
|
|||
|
-------------- | ------------------ * IP address
|
|||
|
|
|
|||
|
========================O=================================================
|
|||
|
^
|
|||
|
|
|
|||
|
Ethernet Cable
|
|||
|
|
|||
|
TCP/IP: If connection is made is between the IP module and the TCP module the
|
|||
|
packets are called a TCP datagram. TCP is responsible for making
|
|||
|
sure that the commands get through the other end. It keeps track of
|
|||
|
what is sent, and retransmits anything that does not go through. The
|
|||
|
IP provides the basic service of getting TCP datagram from place to
|
|||
|
place. It may seem like the TCP is doing all the work, this is true
|
|||
|
in small networks, but when connection is made to a remote host on
|
|||
|
the Internet (passing through several networks) this is a complex
|
|||
|
job. Say I am connected from a server at UCSD to LSU (SURAnet) the
|
|||
|
data grams have to pass through a NSFnet backbone. The IP has to
|
|||
|
keep track of all the data when the switch is made at the NSFnet
|
|||
|
backbone from the TCP to the UDP. The only NSFnet backbone that
|
|||
|
connects LSU is the University of Maryland, which has different
|
|||
|
circuit sets. The cable (trunk)/circuit types are the T1 (a basic
|
|||
|
24-channel 1.544 Md/s pulse code modulation used in the US) to a
|
|||
|
56 Kbps. Keeping track of all the data from the switch from T1 to
|
|||
|
56Kbs and TCP to UDP is not all it has to deal with. Datagrams on
|
|||
|
their way to the NSFnet backbone (at the University of Maryland) may
|
|||
|
take many different paths from the UCSD server.
|
|||
|
|
|||
|
All the TCP does is break up the data into datagrams (manageable
|
|||
|
chunks), and keeps track of the datagrams. The TCP keeps track of
|
|||
|
the datagrams by placing a header at the front of each datagram. The
|
|||
|
header contains 160 (20 octets) pieces of information about the
|
|||
|
datagram. Some of this information is the FQDN (Fully Qualified
|
|||
|
Domain Name). The datagrams are numbers in octets (a group of eight
|
|||
|
binary digits, say there are 500 octets of data, the numbering of the
|
|||
|
datagrams would be 0, next datagram 500, next datagram 1000, 1500
|
|||
|
etc.
|
|||
|
|
|||
|
UDP/IP: UDP is one of the two main protocols of the IP. In other words the
|
|||
|
UDP works the same as TCP, it places a header on the data you send,
|
|||
|
and passes it over to the IP for transportation throughout the
|
|||
|
Internet. The difference is that it offers service to the user's
|
|||
|
network application. It does not maintain an end-to-end connection,
|
|||
|
it just pushes the datagrams out.
|
|||
|
|
|||
|
ICMP: ICMP is used for relaying error messages. For example you might try to
|
|||
|
connect to a system and get a message back saying "Host unreachable",
|
|||
|
this is ICMP in action. This protocol is universal within the
|
|||
|
Internet, because of its nature. This protocol does not use port
|
|||
|
numbers in it's headers, since it talks to the network software itself.
|
|||
|
|
|||
|
|
|||
|
Ethernet: Most of the networks use Ethernet. Ethernet is just a party line.
|
|||
|
When packets are sent out on the Ethernet, every host on the
|
|||
|
Ethernet sees them. To make sure the packets get to the right
|
|||
|
place, the Ethernet designers wanted to make sure that each address
|
|||
|
is different. For this reason 48 bits are allocated for the
|
|||
|
Ethernet address, and a built in Ethernet address on the Ethernet
|
|||
|
controller.
|
|||
|
|
|||
|
The Ethernet packets have a 14-octet header, this includes address
|
|||
|
"to" and "from." The Ethernet is not too secure, it is possible to
|
|||
|
have the packets go to two places, thus someone can see just what
|
|||
|
you are doing. You need to take note that the Ethernet is not
|
|||
|
connected to the Internet. A host on both the Ethernet and on the
|
|||
|
Internet has to have both an Ethernet connection and an Internet
|
|||
|
server.
|
|||
|
|
|||
|
ARP: ARP translates the IP address into an Ethernet address. A conversion
|
|||
|
table is used (the table is called ARP Table) to convert the addresses.
|
|||
|
Therefore, you would never even know if you were connected to the
|
|||
|
Ethernet because you would be connecting to the IP address.
|
|||
|
|
|||
|
The following is a real sketchy description of a few Internet protocols,
|
|||
|
but if you would like to get more information you can access it via
|
|||
|
anonymous ftp from several hosts. Here is a list of RFCs that deal with
|
|||
|
the topic of protocols.
|
|||
|
|
|||
|
|~~~~~~~~~~~~~~~|~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
|
|||
|
| RFC: | Description: |
|
|||
|
| | |
|
|||
|
|~~~~~~~~~~~~~~~|~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
|
|||
|
| rfc1011 | Official Protocols of the Internet |
|
|||
|
| rfc1009 | NSFnet gateway specifications |
|
|||
|
| rfc1001/2 | netBIOS: networking for PC's |
|
|||
|
| rfc894 | IP on Ethernet |
|
|||
|
| rfc854/5 | telnet - protocols for remote logins |
|
|||
|
| rfc793 | TCP |
|
|||
|
| rfc792 | ICMP |
|
|||
|
| rfc791 | IP |
|
|||
|
| rfc768 | UDP |
|
|||
|
| | |
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
|
|||
|
10 Host Name and Address
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Internet addresses are long and difficult hard to remember (i.e.,
|
|||
|
128.128.57.83) so we use host names. All hosts registered on the Internet
|
|||
|
must have names that reflect them domains under which they are registered.
|
|||
|
Such names are called Fully Qualified Domain Names (FQDNs). Lets dissect a
|
|||
|
name and see the domains:
|
|||
|
|
|||
|
lilac.berkeley.edu
|
|||
|
^ ^ ^
|
|||
|
| | |
|
|||
|
| | |____ "edu" shows that this host is sponsored by an
|
|||
|
| | education related organization. This is a top-level
|
|||
|
| | domain.
|
|||
|
| |
|
|||
|
| |___________ "berkeley" is the second-level domain. This shows
|
|||
|
| that it is an organization within University of
|
|||
|
| Calironia at Berkeley.
|
|||
|
|
|
|||
|
|__________________ "lilac" is the third-level domain. This indicates the
|
|||
|
local host name is 'lilac'.
|
|||
|
|
|||
|
Common Top-Level Domains
|
|||
|
|
|||
|
COM - commercial enterprise
|
|||
|
EDU - educational institutions
|
|||
|
GOV - nonmilitary government agencies
|
|||
|
MIL - military (non-classified)
|
|||
|
NET - networking entities
|
|||
|
ORG - nonprofit intuitions
|
|||
|
|
|||
|
A network address is the numerical address of a host, gateway, or TAC.
|
|||
|
The addresses are made up of four decimal numbered slots, which are separated
|
|||
|
by a period.
|
|||
|
|
|||
|
There are three classes that are used most, these are Class A, Class B,
|
|||
|
and Class C.
|
|||
|
|
|||
|
Class A - from '0' to '127'
|
|||
|
Class B - from '128' to '191'
|
|||
|
Class C - from '192' to '223'
|
|||
|
|
|||
|
Class A - Is for MILNET net hosts. The first part of the address has the
|
|||
|
network number. The second is for the physical PSN port number.
|
|||
|
The third is for the logical port number, since it is on MILNET,
|
|||
|
it is a MILNET host. The fourth part is for which PSN it is on.
|
|||
|
On 29.34.0.9. '29' is the network it is on. '34' means it is on
|
|||
|
port '34'. '9' is the PSN number.
|
|||
|
|
|||
|
Class B - This is for the Internet hosts, the first two "clumps" are for the
|
|||
|
network portion. The second two are for the local port.
|
|||
|
|
|||
|
128.28.82.1
|
|||
|
\_/ \_/
|
|||
|
| |_____ Local portion of the address
|
|||
|
|
|
|||
|
|___________ Potation address.
|
|||
|
|
|||
|
Class C - The first three "clumps" are the network portion and the last one
|
|||
|
is the local port.
|
|||
|
|
|||
|
193.43.91.1
|
|||
|
\_|_/ |_____ Local Portation Address
|
|||
|
|
|
|||
|
|__________ Network Portation Address
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue Thirty-Three, File 4 of 13
|
|||
|
|
|||
|
________________________________________________________
|
|||
|
| |
|
|||
|
| FEDIX |
|
|||
|
| On-Line Information Service |
|
|||
|
| |
|
|||
|
| Written by the people at FEDIX |
|
|||
|
| |
|
|||
|
| Like Fedix Upix |
|
|||
|
|________________________________________________________|
|
|||
|
|
|||
|
|
|||
|
What is FEDIX?
|
|||
|
|
|||
|
FEDIX is an on-line information service that links the higher education
|
|||
|
community and the federal government to facilitate research, education, and
|
|||
|
services. The system provides accurate and timely federal agency information
|
|||
|
to colleges, universities, and other research organizations.
|
|||
|
|
|||
|
There are NO REGISTRATION FEES and NO ACCESS CHARGES for using FEDIX. The
|
|||
|
only cost is for the phone call.
|
|||
|
|
|||
|
FEDIX provides daily information updates on:
|
|||
|
|
|||
|
- Federal EDUCATION and RESEARCH PROGRAMS (including descriptions,
|
|||
|
eligibility, funding, deadlines).
|
|||
|
- SCHOLARSHIPS, FELLOWSHIPS, and GRANTS
|
|||
|
- Available used government RESEARCH EQUIPMENT
|
|||
|
- New funding for specific research and education activities from
|
|||
|
the COMMERCE BUSINESS DAILY, FEDERAL REGISTER, and other sources.
|
|||
|
- MINORITY ASSISTANCE research and education programs
|
|||
|
- NEWS & CURRENT EVENTS within participating agencies
|
|||
|
- GENERAL INFORMATION such as agency history, budget, organizational
|
|||
|
structure, mission statement, etc.
|
|||
|
|
|||
|
|
|||
|
PARTICIPATING AGENCIES
|
|||
|
|
|||
|
Currently FEDIX provides information on 7 federal agencies broken down into 2
|
|||
|
general categories:
|
|||
|
|
|||
|
1. Comprehensive Education and Research Related Agency Information
|
|||
|
- The Department of Energy (DOE)
|
|||
|
- Office of Naval Research (ONR)
|
|||
|
- National Aeronautics and Space Administration (NASA)
|
|||
|
- Federal Aviation Administration (FAA)
|
|||
|
|
|||
|
2. Minority Assistance Information
|
|||
|
- National Science Foundation (NSF)
|
|||
|
- Department of Housing and Urban Development (HUD)
|
|||
|
- Department of Commerce (DOC)
|
|||
|
|
|||
|
Additional government agencies are expected to join FEDIX in the future.
|
|||
|
|
|||
|
|
|||
|
REQUIRED HARDWARE AND SOFTWARE
|
|||
|
|
|||
|
Any microcomputer with communications software (or a dumb terminal) and a modem
|
|||
|
operating at 1200 or 2400 baud can access the system.
|
|||
|
|
|||
|
|
|||
|
HOURS OF OPERATION
|
|||
|
|
|||
|
The system operates 24 hours a day, 7 days a week. The only exceptions are for
|
|||
|
periodic system updating or maintenance.
|
|||
|
|
|||
|
|
|||
|
TELEPHONE NUMBERS
|
|||
|
|
|||
|
* Computer (data line): 301-258-0953 or 1-800-232-4879
|
|||
|
* HELPLINE (technical assistance): 301-975-0103.
|
|||
|
|
|||
|
The HELPLINE (for problems or comments) is open Monday-Friday 8:30 AM-4:30 PM
|
|||
|
Eastern Daylight Time, except on federal holidays.
|
|||
|
|
|||
|
|
|||
|
SYSTEM FEATURES
|
|||
|
|
|||
|
Although FEDIX provides a broad range of features for searching, scanning, and
|
|||
|
downloading, the system is easy to use. The following features will permit
|
|||
|
quick and easy access to agency databases:
|
|||
|
|
|||
|
Menus
|
|||
|
-- Information in the system is organized under a series of branching menus.
|
|||
|
By selecting appropriate menu options (using either the OPTION NUMBER or the
|
|||
|
two-character MENU CODE), you may begin at the FEDIX Main Menu and work your
|
|||
|
way through various intermediate menus to a desired sub-menu. However, if you
|
|||
|
already know the menu code of a desired menu, you may bypass the intermediate
|
|||
|
menus and proceed directly to that menu by typing the menu code at the prompt.
|
|||
|
|
|||
|
Help screens are available for key menus and can be viewed by typing '?'
|
|||
|
at the prompt.
|
|||
|
|
|||
|
Capturing Data
|
|||
|
-- If you are using a microcomputer with communicaions software, it is likely
|
|||
|
that your system is capable of storing or "capturing" information as it comes
|
|||
|
across your screen. If you "turn capture on", you will be able to view
|
|||
|
information from the databases and store it in a file on your system to be
|
|||
|
printed later. This may be desirable at times when downloading is not
|
|||
|
appropriate. Refer to your communications software documentation for
|
|||
|
instructions on how to activate the capture feature.
|
|||
|
|
|||
|
Downloading
|
|||
|
-- Throughout the system, options are available which allow you to search,
|
|||
|
list, and/or download files containing information on specific topics. The
|
|||
|
download feature can be used to deliver text files (ASCII) or compressed,
|
|||
|
self-extracting ASCII files to your system very quickly for later use at your
|
|||
|
convenience. Text files in ASCII format, tagged with a ".MAC" extension, are
|
|||
|
downloadable by Macintosh users. Compressed ASCII files, tagged with an ".EXE"
|
|||
|
extension, may be downloaded by users of IBM compatible computers. However,
|
|||
|
your system must be capable of file transfers. (See the documentation on your
|
|||
|
communication software).
|
|||
|
|
|||
|
Mail
|
|||
|
-- An electronic bulletin board feature allows you to send and receive messages
|
|||
|
to and from the SYSTEM OPERATOR ONLY. This feature will NOT send messages
|
|||
|
between users. It can be used to inquire about operating the system, receive
|
|||
|
helpful suggestions from the systems operator, etc.
|
|||
|
|
|||
|
Utility Menu
|
|||
|
-- The Utility Menu, selected from the FEDIX Main Menu, enables you to modify
|
|||
|
user information, prioritize agencies for viewing, search and download agency
|
|||
|
information, set a default calling menu, and set the file transfer protocol for
|
|||
|
downloading files.
|
|||
|
|
|||
|
|
|||
|
INDEX OF KEY INFORMATION ON FEDIX
|
|||
|
|
|||
|
Key information for each agency is listed below with the code for the menu from
|
|||
|
which the information can be accessed. Please be advised that this list is not
|
|||
|
comprehensive and that a significant amount of information is available on
|
|||
|
FEDIX in addition to what is listed here.
|
|||
|
|
|||
|
AGENCY/DATABASE MENU CODE
|
|||
|
|
|||
|
DEPARTMENT OF ENERGY (DOE)/DOEINFO
|
|||
|
Available Used Research Equipment :EG:
|
|||
|
Research Program Information :IX:
|
|||
|
Education Program Information :GA:
|
|||
|
Search/List/Download Program Information :IX:
|
|||
|
Research and Training Reactors Information :RT:
|
|||
|
Procurement Notices :MM:
|
|||
|
Current Events :DN:
|
|||
|
|
|||
|
|
|||
|
NATIONAL AERONAUTICS AND SPACE ADMINISTRATION/NASINFO
|
|||
|
Research Program Information :RP:
|
|||
|
Education Program Information :EA:
|
|||
|
Search/List/Download Program Information :NN:
|
|||
|
Description/Activities of Space Centers :SC:
|
|||
|
Procurement Notices :EV:
|
|||
|
Proposal/Award Guidelines :NA:
|
|||
|
|
|||
|
|
|||
|
OFFICE OF NAVAL RESEARCH/ONRINFO
|
|||
|
Research Program Information :RY:,:AR:
|
|||
|
Special Programs (Special Research and Education Initiatives) :ON:
|
|||
|
Search/List/Download Program Information :NR:
|
|||
|
Description/Activities of Laboratories and other ONR Facilities :LB:
|
|||
|
Procurement Notices (Broad Agency Announcements, Requests for --
|
|||
|
Proposals, etc. :NE:
|
|||
|
Information on the Preparation and Administration of Contracts, --
|
|||
|
Grants, Proposals :AD:
|
|||
|
|
|||
|
|
|||
|
FEDERAL AVIATION ADMINISTRATION/FAAINFO
|
|||
|
Education Program Information - Pre-College :FE:
|
|||
|
Mio rity Aviation Education Programs :FY:
|
|||
|
Search/List/Download Program Information :FF:
|
|||
|
Aviation Education Resources (Newsletters, Films/Videos, --
|
|||
|
Publications) :FR:
|
|||
|
Aviation Education Contacts (Government, Industry, Academic, --
|
|||
|
Associations) :FO:
|
|||
|
College-Level Airway Science Curriculum Information :FC:
|
|||
|
Procurement Notice :FP:
|
|||
|
Planned Competitive and Noncompetitive Procurements for the --
|
|||
|
Current Fiscal Year :F1:
|
|||
|
Employment Information :FN:
|
|||
|
Current Events :FV:
|
|||
|
|
|||
|
|
|||
|
MINORITY/MININFO
|
|||
|
U. S. Department of Commerce
|
|||
|
Research/Education Minority Assistance Programs :CP:
|
|||
|
Procurement Notices (ALL Notices for Agency) :M1:
|
|||
|
Current Events :M1:
|
|||
|
Minority Contacts :M1:
|
|||
|
|
|||
|
Department of Energy
|
|||
|
Research/Education Minority Assistance Programs :EP:
|
|||
|
Procurement Notices (ALL Notices for Agency) :M2:
|
|||
|
Current Events :M2:
|
|||
|
Minority Contacts :M2:
|
|||
|
|
|||
|
U.S. Department of Housing and Urban Development
|
|||
|
Research/Education Minority Assistance Programs :HP:
|
|||
|
Procurement Notices (ALL Notices for Agency) :M3:
|
|||
|
Current Events :M3:
|
|||
|
Minority Contacts :M3:
|
|||
|
|
|||
|
National Aeronautics and Space Administration
|
|||
|
Research/Education Minority Assistance Programs :NP:
|
|||
|
Procurement Notices (ALL Notices for Agency) :M4:
|
|||
|
Current Events :M4:
|
|||
|
Minority Contacts :M4:
|
|||
|
|
|||
|
National Science Foundation
|
|||
|
Research/Education Minority AssisdaXce Programs :SP:
|
|||
|
Procurement Notices (ALL Notices for Agency) :M5:
|
|||
|
Budget Information :SB:
|
|||
|
NSF Bulletin :M5:
|
|||
|
Minority Contacts :M5:
|
|||
|
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue Thirty-Three, File 5 of 13
|
|||
|
|
|||
|
|
|||
|
|\/\/\/\/\/\/\/\/\/\/\/\/\/|
|
|||
|
| |
|
|||
|
| LATA Referance List |
|
|||
|
| |
|
|||
|
| by Infinite Loop |
|
|||
|
| |
|
|||
|
|/\/\/\/\/\/\/\/\/\/\/\/\/\|
|
|||
|
|
|||
|
|
|||
|
United States telephone LATA official designation numbers:
|
|||
|
|
|||
|
STATE NAME NUMBER
|
|||
|
|
|||
|
AK ALASKA 832
|
|||
|
AL BIRMINGHAM 476
|
|||
|
AL HUNTSVILLE 477
|
|||
|
AL MONTGOMERY 478
|
|||
|
AL MOBILE 480
|
|||
|
AR FORT SMITH 526
|
|||
|
AR LITTLE ROCK 528
|
|||
|
AR PINE BLUFF 530
|
|||
|
AZ PHOENIX 666
|
|||
|
AZ TUCSON 668
|
|||
|
AZ NAVAJO RESERVATION 980
|
|||
|
CA SAN FRANCISCO 722
|
|||
|
CA CHICO 724
|
|||
|
CA SACRAMENTO 726
|
|||
|
CA FRESNO 728
|
|||
|
CA LOS ANGELES 730
|
|||
|
CA SAN DIEGO 732
|
|||
|
CA BAKERSFIELD 734
|
|||
|
CA MONTEREY 736
|
|||
|
CA STOCKTON 738
|
|||
|
CA SAN LUIS OBISPO 740
|
|||
|
CA PALM SPRINGS 973
|
|||
|
CO DENVER 656
|
|||
|
CO COLORADO SRPINGS 658
|
|||
|
CT CONNECTICUT <SNET> 920
|
|||
|
DC WASHINGTON 236
|
|||
|
FL PENSACOLA 448
|
|||
|
FL PANAMA CITY 450
|
|||
|
FL JACKSONVILLE 452
|
|||
|
FL GAINESVILLE 454
|
|||
|
FL DAYTONA BEACH 456
|
|||
|
FL ORLANDO 458
|
|||
|
FL SOUTHEAST 460
|
|||
|
FL FORT MYERS 939
|
|||
|
FL GULF COST 952
|
|||
|
FL TALLAHASSEE 953
|
|||
|
GA ATLANTA 438
|
|||
|
GA SAVANNAH 440
|
|||
|
GA AUGUSTA 442
|
|||
|
GA ALBANY 444
|
|||
|
GA MACON 446
|
|||
|
HI HAWAII 834
|
|||
|
IA SIOUX CITY 630
|
|||
|
IA DES MOINES 632
|
|||
|
IA DAVENPORT 634
|
|||
|
IA CEDAR RAPIDS 635
|
|||
|
ID IDAHO 652
|
|||
|
ID COEUR D'ALENE 960
|
|||
|
IL CHICAGO 358
|
|||
|
IL ROCKFORD 360
|
|||
|
IL CAIRO 362
|
|||
|
IL STERLING 364
|
|||
|
IL FORREST 366
|
|||
|
IL PEORIA 368
|
|||
|
IL CHAMPAIGN 370
|
|||
|
IL SPRINGFIELD 372
|
|||
|
IL QUINCY 374
|
|||
|
IL MATTOON 976
|
|||
|
IL GALESBURG 977
|
|||
|
IL OLNEY 978
|
|||
|
IN EVANSVILLE 330
|
|||
|
IN SOUTH BEND 332
|
|||
|
IN AUBURN/HUNTINGTON 334
|
|||
|
IN INDIANAPOLIS 336
|
|||
|
IN BLOOMINGTON 338
|
|||
|
IN RICHMOND 937
|
|||
|
IN TERRE HAUTE 938
|
|||
|
KS WICHITA 532
|
|||
|
KS TOPEKA 534
|
|||
|
KY LOUISVILLE 462
|
|||
|
KY OWENSBORO 464
|
|||
|
KY WINCHESTER 466
|
|||
|
LA SHREVEPORT 486
|
|||
|
LA LAFAYETTE 488
|
|||
|
LA NEW ORLEANS 490
|
|||
|
LA BATON ROUGE 492
|
|||
|
MA WESTERN MASSACHUSETT 126
|
|||
|
MA EASTERN MASSACHUSETT 128
|
|||
|
MD BALTIMORE 238
|
|||
|
MD HAGERSTOWN 240
|
|||
|
MD SALISBURY 242
|
|||
|
ME MAINE 120
|
|||
|
MI DETROIT 340
|
|||
|
MI UPPER PENINSULA 342
|
|||
|
MI SAGINAW 344
|
|||
|
MI LANSING 346
|
|||
|
MI GRAND RAPIDS 348
|
|||
|
MN ROCHESTER 620
|
|||
|
MN DULUTH 624
|
|||
|
MN ST CLOUD 626
|
|||
|
MN MINNEAPOLIS 628
|
|||
|
MO ST LOUIS 520
|
|||
|
MO WESTPHALIA 521
|
|||
|
MO SPRINGFIELD 522
|
|||
|
MO KANSAS CITY 524
|
|||
|
MS JACKSON 482
|
|||
|
MS BILOXI 484
|
|||
|
MT GREAT FALLS 648
|
|||
|
MT BILLINGS 650
|
|||
|
MT KALISPELL 963
|
|||
|
NC ASHEVILLE 420
|
|||
|
NC CHARLOTTE 422
|
|||
|
NC GREENSBORO 424
|
|||
|
NC RALEIGH 426
|
|||
|
NC WILMINGTON 428
|
|||
|
NC FAYETTEVILLE 949
|
|||
|
NC ROCKY MOUNT 951
|
|||
|
ND FARGO 636
|
|||
|
ND BISMARCK 638
|
|||
|
NE OMAHA 644
|
|||
|
NE GRAND ISLAND 646
|
|||
|
NE LINCOLN 958
|
|||
|
NH NEW HAMPSHIRE 122
|
|||
|
NJ ATLANTIC COSTAL 220
|
|||
|
NJ DELAWARE VALLEY 222
|
|||
|
NJ NORTH JERSEY 224
|
|||
|
NM NEW MEXICO 664
|
|||
|
NV RENO 720
|
|||
|
NV PAHRUMP 721
|
|||
|
NY NEW YORK METRO 132
|
|||
|
NY POUGHKEEPSIE 133
|
|||
|
NY ALBANY 134
|
|||
|
NY SYRACUSE 136
|
|||
|
NY BINGHAMTON 138
|
|||
|
NY BUFFALO 140
|
|||
|
NY FISHERS ISLAND 921
|
|||
|
NY ROCHESTER 974
|
|||
|
OH CLEAVELAND 320
|
|||
|
OH YOUNGSTOWN 322
|
|||
|
OH COLUMBUS 324
|
|||
|
OH AKRON 325
|
|||
|
OH TOLEDO 326
|
|||
|
OH DAYTON 328
|
|||
|
OH CINCINNATI BELL 922
|
|||
|
OH MANSFIELD 923
|
|||
|
OK OKLAHOMA CITY 536
|
|||
|
OK TULSA 538
|
|||
|
OR EUGENE 670
|
|||
|
OR PORTLAND 672
|
|||
|
PA CAPITAL 226
|
|||
|
PA PHILADELPHIA 228
|
|||
|
PA ALTOONA 230
|
|||
|
PA NORTHEAST 232
|
|||
|
PA PITTSBURG 234
|
|||
|
PA ERIE 924
|
|||
|
PR PUERTO RICO 820
|
|||
|
RI RHODE ISLAND 130
|
|||
|
SC GREENVILLE 430
|
|||
|
SC FLORENCE 432
|
|||
|
SC COLUMBIA 434
|
|||
|
SC CHARLESTON 436
|
|||
|
SD SOUTH DAKOTA 640
|
|||
|
TN MEMPHIS 468
|
|||
|
TN NASHVILLE 470
|
|||
|
TN CHATTANOOGA 472
|
|||
|
TN KNOXVILLE 474
|
|||
|
TN BRISTOL 956
|
|||
|
TX EL PASO 540
|
|||
|
TX MIDLAND 542
|
|||
|
TX LUBBOCK 544
|
|||
|
TX AMARILLO 546
|
|||
|
TX WICHITA FALLS 548
|
|||
|
TX ABILENE 550
|
|||
|
TX DALLAS 552
|
|||
|
TX LONGVIEW 554
|
|||
|
TX WACO 556
|
|||
|
TX AUSTIN 558
|
|||
|
TX HOUSTON 560
|
|||
|
TX BEAUMONT 562
|
|||
|
TX CORPUS CHRISTI 564
|
|||
|
TX SAN ANTONIO 566
|
|||
|
TX BROWNSVILLE 568
|
|||
|
TX HEARNE 570
|
|||
|
TX SAN ANGELO 961
|
|||
|
US MIDWAY/WAKE 836
|
|||
|
UT UTAH 660
|
|||
|
UT NAVAJO RESERVATION 981
|
|||
|
VA ROANOKE 244
|
|||
|
VA CULPEPER 246
|
|||
|
VA RICHMOND 248
|
|||
|
VA LYNCHBURG 250
|
|||
|
VA NORFOLK 252
|
|||
|
VA HARRISONBURG 927
|
|||
|
VA CHARLOTTESVILLE 928
|
|||
|
VA EDINBURG 929
|
|||
|
VI US VIRGIN ISLANDS 822
|
|||
|
VT VERMONT 124
|
|||
|
WA SEATTLE 674
|
|||
|
WA SPOKANE 676
|
|||
|
WI NORTHEASST 350
|
|||
|
WI NORTHWEST 352
|
|||
|
WI SOUTHWEST 354
|
|||
|
WI SOUTHEAST 356
|
|||
|
WV CHARLESTON 254
|
|||
|
WV CLARKSBURG 256
|
|||
|
WV BLUEFIELD 932
|
|||
|
WY WYOMING 654
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue Thirty-Three, File 6 of 13
|
|||
|
|
|||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
- -
|
|||
|
= International Toll-free, Local Rated, =
|
|||
|
- -
|
|||
|
= and Specially Toll Services =
|
|||
|
- -
|
|||
|
= by The Trunk Terminator =
|
|||
|
- -
|
|||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
|
|||
|
The following indicates access codes and numbers used within various countries
|
|||
|
for toll-free and special paid services. The dialing codes shown represent how
|
|||
|
they would be dialed within the country involved. Generally, it is not
|
|||
|
possible to access another country's domestic toll-free or specialty network
|
|||
|
directly. Where an international access is available, it is normally done by
|
|||
|
using the domestic services which then forward the call to the destination
|
|||
|
country.
|
|||
|
|
|||
|
Where possible, the number of digits has been indicated with 'n' (a number from
|
|||
|
2 to 8) or 'x' (any number). An ellipsis (...) indicates that there are a
|
|||
|
variable number of extra digits, or possibly a conflict in the reports of
|
|||
|
numbers of digits used.
|
|||
|
|
|||
|
|
|||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
Toll-free or equivalent local charge services
|
|||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
|
|||
|
=================
|
|||
|
A u s t r a l i a
|
|||
|
=================
|
|||
|
|
|||
|
008 xxx xxx That is how Phrack Inc. recomends it be written
|
|||
|
to differentiate it from STD area codes
|
|||
|
which are written with area codes (0x) thru
|
|||
|
(0xxx) and numbers n xxxx through nxx xxxx.
|
|||
|
|
|||
|
0014 ttt xxx xxx International Toll free access from Australia
|
|||
|
(ttt is reported as "800" or other toll-free
|
|||
|
access code; or, ttt may not be present at all.
|
|||
|
|
|||
|
(Canada Direct uses 0014 881 150)
|
|||
|
|
|||
|
=============
|
|||
|
B e l g i u m
|
|||
|
=============
|
|||
|
|
|||
|
11 xxxx
|
|||
|
|
|||
|
=============
|
|||
|
D e n m a r k
|
|||
|
=============
|
|||
|
|
|||
|
800 xxxxx
|
|||
|
8001 xxxx (charged as local call)
|
|||
|
|
|||
|
=============
|
|||
|
F i n l a n d
|
|||
|
=============
|
|||
|
|
|||
|
9800 xxxxx (...) (PTT as local service provider)
|
|||
|
0800 xxxxx (...) (Private phone company as local service provider)
|
|||
|
|
|||
|
9800 costs the same as a local call (dialable from
|
|||
|
all areas in Finland), while 0800 are truly toll-free and
|
|||
|
dialable from all private telco areas.
|
|||
|
|
|||
|
===========
|
|||
|
F r a n c e
|
|||
|
===========
|
|||
|
|
|||
|
05 xxxxxx This is outside area code 1, so from Paris 16 05.
|
|||
|
|
|||
|
05 19 xx xx These numbers terminate outside France.
|
|||
|
|
|||
|
36 63 xx xx (local call rate)
|
|||
|
|
|||
|
'11' is computer directory information.
|
|||
|
'12' is voice directory information (equivalent to 411).
|
|||
|
|
|||
|
===========================
|
|||
|
G e r m a n y ( w e s t )
|
|||
|
===========================
|
|||
|
|
|||
|
0130 xxxx (...xx) The number to use AT&T is 0130-0010 and U.S. Sprint is
|
|||
|
0130-0013. For a general toll-free number listings, pick up
|
|||
|
a copy of the International Herald newspaper and look in the
|
|||
|
sports section is for an AT&T add. You will find a number
|
|||
|
for dialing the US from various countries. Mearly, chop
|
|||
|
off the exchange and only use the "area code" number.
|
|||
|
|
|||
|
=============
|
|||
|
I r e l a n d
|
|||
|
=============
|
|||
|
|
|||
|
1800 xxxxxx
|
|||
|
1850 xxxxxx (local rate)
|
|||
|
|
|||
|
=========
|
|||
|
I t a l y
|
|||
|
=========
|
|||
|
|
|||
|
167 xxxxx (digits length)
|
|||
|
|
|||
|
We're not 100% sure about the length of digits for Italy.
|
|||
|
One way to check these is to get a copy of an *international*
|
|||
|
edition of the weekly magazines like TIME, all ads and little
|
|||
|
contents. But they do goof up regularly, like printing Paris
|
|||
|
numbers as (01) xxxxxxxx when they mean (1) xxxxxxxx.
|
|||
|
|
|||
|
===========
|
|||
|
M e x i c o
|
|||
|
===========
|
|||
|
|
|||
|
91 800 xxxxx....
|
|||
|
|
|||
|
=====================
|
|||
|
N e t h e r l a n d s
|
|||
|
=====================
|
|||
|
|
|||
|
06-0xxx
|
|||
|
06-0xxxxxx
|
|||
|
06-4xx(x) 06-2229111 is AT&T USA direct and Sprint & MCI have operator
|
|||
|
services on 06-022xxxx. It used to be possible to call
|
|||
|
06-022xxxx to Denmark, and then use the CCITT no. 4
|
|||
|
signalling system to phreak calls to anywhere in the
|
|||
|
world.
|
|||
|
|
|||
|
06-11 This is the Dutch equivalent of 911, it is free when
|
|||
|
dialled from a phone company operated payphone, otherwise the
|
|||
|
charge is one unit, DFL 0.15, about US $ 0.08. There were
|
|||
|
discussions about making such calls free from any phone, but
|
|||
|
I haven't followed them recently. Calling a toll-free number
|
|||
|
from a payphone requires a deposit of one coin, which is
|
|||
|
returned after the call.
|
|||
|
|
|||
|
The total length of the numbers varies from 4 to 10 digits
|
|||
|
and the dash indicates the secondary dial tone. It is not
|
|||
|
possible to reach 06 prefixed numbers from abroad.
|
|||
|
|
|||
|
=====================
|
|||
|
N e w Z e a l a n d
|
|||
|
=====================
|
|||
|
|
|||
|
0800 xxx xxx That is through the state telco, Telecom New Zealand. Clear
|
|||
|
Communications, the recently started alternative LD carrier,
|
|||
|
does not offer a toll-free service as yet. When Clear offer
|
|||
|
one, it will more than likely be to the subscribers existing
|
|||
|
number (eg Dial toll free 050-04-654-3210) as they are not
|
|||
|
in control of number issue. 0800 is strictly Telecom at this
|
|||
|
stage.
|
|||
|
|
|||
|
=========================
|
|||
|
N o r t h A m e r i c a
|
|||
|
=========================
|
|||
|
|
|||
|
1 800 nxx xxxx Access to toll free numbers can vary according
|
|||
|
to region, state or country (ie. not all 800
|
|||
|
numbers are accessible to all regions).
|
|||
|
|
|||
|
The nxx prefix portion of the 800 number presently
|
|||
|
determines which long distance carrier or 800
|
|||
|
service company will handle the call (and in
|
|||
|
some cases determine the geographical region).
|
|||
|
|
|||
|
=========
|
|||
|
S p a i n
|
|||
|
=========
|
|||
|
|
|||
|
900 xxxxxx The number for ATT direct in Spain is 900-99-00-11. The
|
|||
|
payphones are all push-button but generate pulses. It takes
|
|||
|
forever to get connected.
|
|||
|
|
|||
|
===========
|
|||
|
S w e d e n
|
|||
|
===========
|
|||
|
|
|||
|
020 xxxxxx (without dialtone after '020').
|
|||
|
|
|||
|
=====================
|
|||
|
S w i t z e r l a n d
|
|||
|
=====================
|
|||
|
|
|||
|
04605 xxxx (not toll-free but metered at lowest rate)
|
|||
|
155 xx xx ("green number")
|
|||
|
|
|||
|
In Switzerland there is nothing exactly like the equivalent
|
|||
|
to United States "800" service. The PTT is now encouraging
|
|||
|
the use of "green numbers" beginning with 155. The direct
|
|||
|
marketing ads on TV often give the order number for
|
|||
|
Switzerland as a number such as 155 XX XX. The access number
|
|||
|
for MCI Call USA is for example 155 02 22. There are two
|
|||
|
problems with this:
|
|||
|
|
|||
|
1] When calling from a model AZ44(older model) payphone all
|
|||
|
numbers which begin with a "1" are treated as "service"
|
|||
|
numbers and the payphone begins to sound a "cuckoo clock
|
|||
|
noise" once the 155 is entered. The "cuckoo clock noise" is
|
|||
|
to alert operators on the "service numbers" that the caller
|
|||
|
is using a payphone (fraud protection). This noise is quite
|
|||
|
a distraction when calling someone in the USA using MCI Call
|
|||
|
USA.
|
|||
|
|
|||
|
2] The newer style TelcaStar phones are programmed to block
|
|||
|
the keypad after 3 digits are dialed of a "service number".
|
|||
|
It used to be that the only numbers beginning with "1" were
|
|||
|
"service numbers" and all "service numbers" were 3 digits.
|
|||
|
The PTT is aware of this problem and are said to be
|
|||
|
considering what instructions to give the manufacturer of the
|
|||
|
payphones.
|
|||
|
|
|||
|
AT&T USA Direct has an access number of 046 05 00 11. This
|
|||
|
is not a free call, but the time is metered at the lowest
|
|||
|
rate. This number does not suffer the "cuckoo clock noise"
|
|||
|
problem.
|
|||
|
|
|||
|
Canada Direct uses 046 05 83 30.
|
|||
|
|
|||
|
===========================
|
|||
|
U n i t e d K i n g d o m
|
|||
|
===========================
|
|||
|
|
|||
|
0800 xxx xxx (Toll-free)
|
|||
|
0345 xxx xxx (Local rate)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
Tolled/Specialty Pay services
|
|||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
|
|||
|
=================
|
|||
|
A u s t r a l i a
|
|||
|
=================
|
|||
|
|
|||
|
0055 x yxxx where y=0-4,8 means the number is Australia
|
|||
|
wide (and costs more),
|
|||
|
y=5 means the number is only state wide,
|
|||
|
y=6,7,9 means the number is for the
|
|||
|
capital city only.
|
|||
|
|
|||
|
=============
|
|||
|
F i n l a n d
|
|||
|
=============
|
|||
|
|
|||
|
9700 xxxxx (PTT-operated)
|
|||
|
0700 xxxxx (Private telco-operated)
|
|||
|
|
|||
|
The cost ranges from about 0.5 USD to 5 USD per minute.
|
|||
|
|
|||
|
===========
|
|||
|
F r a n c e
|
|||
|
===========
|
|||
|
|
|||
|
36 65 xx xx (5 message units each call for up to 140 seconds)
|
|||
|
|
|||
|
These are for various information services as well as chat
|
|||
|
lines.
|
|||
|
|
|||
|
=====================
|
|||
|
N e t h e r l a n d s
|
|||
|
=====================
|
|||
|
|
|||
|
06-9 xx...
|
|||
|
06-321 xx...
|
|||
|
06-8 xx... (3 to 40ct/min)
|
|||
|
|
|||
|
Other codes (such as 06-9) precede special tariff calls
|
|||
|
(similar to 900 in the US). The highest special rate is
|
|||
|
(currently) DFL 0.50 / minute.
|
|||
|
|
|||
|
=========================
|
|||
|
N o r t h A m e r i c a
|
|||
|
=========================
|
|||
|
|
|||
|
1 900 nxx xxxx (various rates, depending on provider)
|
|||
|
1 (npa) 976 xxxx (in many area codes, connected through regional telco;
|
|||
|
in some areas, the call requires the area code where
|
|||
|
depending on the intra-area dialing used)
|
|||
|
|
|||
|
(other exchange prefixes within area codes such as 540, 720
|
|||
|
or 915 are used for other pay services such as group chat,
|
|||
|
other types of recorded messages, etc. These vary depending
|
|||
|
on the area code within North America, and not all regions in
|
|||
|
North America have these.)
|
|||
|
|
|||
|
===========
|
|||
|
S w e d e n
|
|||
|
===========
|
|||
|
|
|||
|
071 x xxxxx
|
|||
|
|
|||
|
The Swedish answer to the United States "900"-number, 071 are
|
|||
|
as follows.
|
|||
|
|
|||
|
(Charges are related to the next digit)
|
|||
|
|
|||
|
code SEK/minute
|
|||
|
0712xxxxx 3,65
|
|||
|
0713xxxxx 4,90
|
|||
|
0714xxxxx 6,90
|
|||
|
0715xxxxx 9,90
|
|||
|
0716xxxxx 12,50
|
|||
|
0717xxxxx 15,30
|
|||
|
0719xx varying fees, cannot be dialled directly but needs operator
|
|||
|
|
|||
|
Numbers starting with 0713-0717 can only be dialled from
|
|||
|
phones connected to AXE exchanges. At present about half of
|
|||
|
all phones in Sweden are connected to such exchanges.
|
|||
|
|
|||
|
Another special toll number is domestic number information:
|
|||
|
07975 (6,90 SEK/minute).
|
|||
|
|
|||
|
===========================
|
|||
|
U n i t e d K i n g d o m
|
|||
|
===========================
|
|||
|
|
|||
|
0836 xxx xxx
|
|||
|
0898 xxx xxx
|
|||
|
|
|||
|
The rate seems to be uniform as 34p per minute cheap rate,
|
|||
|
45p at all other times.
|
|||
|
|
|||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue Thirty-Three, File 7 of 13
|
|||
|
|
|||
|
//---------------------\\
|
|||
|
|| P h r e a k i n g ||
|
|||
|
|| ||
|
|||
|
|| i n ||
|
|||
|
|| ||
|
|||
|
|| G e r m a n y ||
|
|||
|
|| ||
|
|||
|
|| by ||
|
|||
|
|| ||
|
|||
|
|| -=+Ninja Master+=- ||
|
|||
|
|| ||
|
|||
|
|| of ||
|
|||
|
|| ||
|
|||
|
|| -[The Hellfire Club]- ||
|
|||
|
\\---------------------//
|
|||
|
|
|||
|
|
|||
|
Phreaking in Germany at this moment is at an all time high. The main reason is
|
|||
|
because of the German reunification. Most, if not all, of the equipment in
|
|||
|
Germany is still mechanical (especially on the former Communist side). So
|
|||
|
Boxing is VERY easy to do, as are line taps.
|
|||
|
|
|||
|
Tracing on the other hand, is still hard to do. This is because with the
|
|||
|
mechanical switches they need many technicians who look at the switches and
|
|||
|
follow the wires on their own. They usually don't know where the wire leads,
|
|||
|
so they have to physically follow the wire to trace it.
|
|||
|
|
|||
|
There are two main ways of phreaking in Germany at the moment. One is Boxing
|
|||
|
and the other is through Cordless Phones, both of which I will describe.
|
|||
|
|
|||
|
//------\\
|
|||
|
|| Boxing ||
|
|||
|
\\------//
|
|||
|
|
|||
|
Boxing in Germany is somewhat similar to the US, but I will describe to you
|
|||
|
the whole process.
|
|||
|
|
|||
|
Most boxing in Germany is started with a call to a toll free number (most of
|
|||
|
which produce a connection to a firm in the US, AT&T.) To initiate the call,
|
|||
|
you dial 0130 - 81 and the number. Germany's toll free net starts with 0130.
|
|||
|
81 is for connection to the US. You wait for the connection, and blast the
|
|||
|
dissconect signal. As we all know, in the US it's 2600 Hz, but in Germany it's
|
|||
|
a mixture of 2400 and 2600 Hz. After that, you send a single 2400 Hz frequency
|
|||
|
to hold the line. Then you decide if you want a local US call, or an
|
|||
|
International call. Don't forget, you are connected to the US now, so it looks
|
|||
|
as if anything out of it as International, even though your calling from
|
|||
|
Germany. Calls within the US are done normally, with KP+0+AC+NNNNNNN.
|
|||
|
To make the international call, it's KP2+internalional code+0+number.
|
|||
|
You have to drop the zero though from the number you care calling. For
|
|||
|
example, in Germany all numbers start with a 02366.
|
|||
|
|
|||
|
One big difference between boxing in the US and Germany, are the laws. In
|
|||
|
Germany, they look very strictly at data-security, but the laws are not clear
|
|||
|
in
|
|||
|
the area of phreaking. No one knows if a phreak is really stealin something
|
|||
|
from the German phone company, since he is using a normal phone number. This
|
|||
|
may sound stupid to us, but that's how they view it. Phreaks getting busted
|
|||
|
for in Germany is usually a rare occassion, if ever.
|
|||
|
|
|||
|
//---------------\\
|
|||
|
|| Cordless Phones ||
|
|||
|
\\---------------//
|
|||
|
|
|||
|
When I am refering to "cordless phones", I'm not talking about portable phones
|
|||
|
in the cellular phone system. I'm talking about simple cordless phones that
|
|||
|
you have in your home. Cordless phones broadcast on a speciffic radio
|
|||
|
frequency (around 46MHz) to a "base unit" that is connected to the wall jack.
|
|||
|
|
|||
|
What the you do now is put a long antenna on the roof of your car. Then
|
|||
|
connect the antenna to your handset. The length of the antenna is usually
|
|||
|
best around 1.5 meters long. You only need the handset, because you are going
|
|||
|
to be connecting to another persons base, but make sure the batteries in the
|
|||
|
handset are fully charged. Now, the next step is to drive around in your car,
|
|||
|
until you hear a free line. Then, mearly call anywhere you like! Usually you
|
|||
|
have to situate yourself, and find where the best postion is to recieve the
|
|||
|
signal clearly, and that the person who's base your connected to can't see you.
|
|||
|
|
|||
|
One reason this works quite well, is because most cordless phones in Germany
|
|||
|
don't have the code feature that is so prominent here (where you can
|
|||
|
select a scrambling code on the handset and base).
|
|||
|
|
|||
|
One of the incentives to phreak in this manner is because, cordless phones
|
|||
|
being illegal, the person, who's dial tone you used, would much rather pay a
|
|||
|
few high long distance bills than the even higher fines for geting caught with
|
|||
|
a cordless phone.
|
|||
|
|
|||
|
Cordless phones are forbidden in Germany, although you can buy them almost
|
|||
|
anywhere. What is illegal is to physically connect them to the phone
|
|||
|
system. The phone company there actually searches for people with cordless
|
|||
|
phones, by using a specially equiped van. Once they find that you have a
|
|||
|
cordless phone connected, they come with two policmen and a search warrant.
|
|||
|
You can be charged with anything from illegal connection of nontested equipment
|
|||
|
to forging of a document.
|
|||
|
|
|||
|
//----------\\
|
|||
|
|| Conclusion ||
|
|||
|
\\----------//
|
|||
|
|
|||
|
Well, I hope this gave you a little bit of understanding of how disorganized
|
|||
|
the phone system is in over there, and gave you a few helpfull hints in case
|
|||
|
you ever happen to find yourself in Germany.
|
|||
|
|
|||
|
If you have any comments, corrections, or additions, you can reach me through
|
|||
|
Phrack, or the following boards:
|
|||
|
|
|||
|
Lightning Systems 9th Dimension
|
|||
|
414-363-4282 818-783-5320
|
|||
|
|
|||
|
Until next time!
|
|||
|
|
|||
|
-=+Ninja Master+=-
|
|||
|
-[The Hellfire Club]-
|
|||
|
"Tell Telco We're Phreaking, Phreaking USA!"
|
|||
|
|
|||
|
\\---------------------------------------------------------------------------//
|
|||
|
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue Thirty-Three, File 8 of 13
|
|||
|
|
|||
|
A TCP/IP Tutorial : Behind The Internet
|
|||
|
Part One of Two
|
|||
|
|
|||
|
September 12, 1991
|
|||
|
|
|||
|
by The Not
|
|||
|
|
|||
|
|
|||
|
Table of Contents
|
|||
|
|
|||
|
1. Introduction
|
|||
|
2. TCP/IP Overview
|
|||
|
3. Ethernet
|
|||
|
4. ARP
|
|||
|
|
|||
|
1. Introduction
|
|||
|
|
|||
|
This tutorial contains only one view of the salient points of TCP/IP,
|
|||
|
and therefore it is the "bare bones" of TCP/IP technology. It omits
|
|||
|
the history of development and funding, the business case for its
|
|||
|
use, and its future as compared to ISO OSI. Indeed, a great deal of
|
|||
|
technical information is also omitted. What remains is a minimum of
|
|||
|
information that must be understood by the professional working in a
|
|||
|
TCP/IP environment. These professionals include the systems
|
|||
|
administrator, the systems programmer, and the network manager.
|
|||
|
|
|||
|
This tutorial uses examples from the UNIX TCP/IP environment, however
|
|||
|
the main points apply across all implementations of TCP/IP.
|
|||
|
|
|||
|
Note that the purpose of this memo is explanation, not definition.
|
|||
|
If any question arises about the correct specification of a protocol,
|
|||
|
please refer to the actual standards defining RFC.
|
|||
|
The next section is an overview of TCP/IP, followed by detailed
|
|||
|
descriptions of individual components.
|
|||
|
|
|||
|
2. TCP/IP Overview
|
|||
|
|
|||
|
The generic term "TCP/IP" usually means anything and everything
|
|||
|
related to the specific protocols of TCP and IP. It can include
|
|||
|
other protocols, applications, and even the network medium. A sample
|
|||
|
of these protocols are: UDP, ARP, and ICMP. A sample of these
|
|||
|
applications are: TELNET, FTP, and rcp. A more accurate term is
|
|||
|
"internet technology". A network that uses internet technology is
|
|||
|
called an "internet".
|
|||
|
|
|||
|
2.1 Basic Structure
|
|||
|
|
|||
|
To understand this technology you must first understand the following
|
|||
|
logical structure:
|
|||
|
|
|||
|
----------------------------
|
|||
|
| network applications |
|
|||
|
| |
|
|||
|
|... \ | / .. \ | / ...|
|
|||
|
| ----- ----- |
|
|||
|
| |TCP| |UDP| |
|
|||
|
| ----- ----- |
|
|||
|
| \ / |
|
|||
|
| -------- |
|
|||
|
| | IP | |
|
|||
|
| ----- -*------ |
|
|||
|
| |ARP| | |
|
|||
|
| ----- | |
|
|||
|
| \ | |
|
|||
|
| ------ |
|
|||
|
| |ENET| |
|
|||
|
| ---@-- |
|
|||
|
----------|-----------------
|
|||
|
|
|
|||
|
----------------------o---------
|
|||
|
Ethernet Cable
|
|||
|
|
|||
|
Figure 1. Basic TCP/IP Network Node
|
|||
|
|
|||
|
This is the logical structure of the layered protocols inside a
|
|||
|
computer on an internet. Each computer that can communicate using
|
|||
|
internet technology has such a logical structure. It is this logical
|
|||
|
structure that determines the behavior of the computer on the
|
|||
|
internet. The boxes represent processing of the data as it passes
|
|||
|
through the computer, and the lines connecting boxes show the path of
|
|||
|
data. The horizontal line at the bottom represents the Ethernet
|
|||
|
cable; the "o" is the transceiver. The "*" is the IP address and the
|
|||
|
"@" is the Ethernet address. Understanding this logical structure is
|
|||
|
essential to understanding internet technology; it is referred to
|
|||
|
throughout this tutorial.
|
|||
|
|
|||
|
2.2 Terminology
|
|||
|
|
|||
|
The name of a unit of data that flows through an internet is
|
|||
|
dependent upon where it exists in the protocol stack. In summary: if
|
|||
|
it is on an Ethernet it is called an Ethernet frame; if it is between
|
|||
|
the Ethernet driver and the IP module it is called a IP packet; if it
|
|||
|
is between the IP module and the UDP module it is called a UDP
|
|||
|
datagram; if it is between the IP module and the TCP module it is
|
|||
|
called a TCP segment (more generally, a transport message); and if it
|
|||
|
is in a network application it is called a application message.
|
|||
|
|
|||
|
These definitions are imperfect. Actual definitions vary from one
|
|||
|
publication to the next. More specific definitions can be found in
|
|||
|
RFC 1122, section 1.3.3.
|
|||
|
|
|||
|
A driver is software that communicates directly with the network
|
|||
|
interface hardware. A module is software that communicates with a
|
|||
|
driver, with network applications, or with another module.
|
|||
|
|
|||
|
The terms driver, module, Ethernet frame, IP packet, UDP datagram,
|
|||
|
TCP message, and application message are used where appropriate
|
|||
|
throughout this tutorial.
|
|||
|
|
|||
|
2.3 Flow of Data
|
|||
|
|
|||
|
Let's follow the data as it flows down through the protocol stack
|
|||
|
shown in Figure 1. For an application that uses TCP (Transmission
|
|||
|
Control Protocol), data passes between the application and the TCP
|
|||
|
module. For applications that use UDP (User Datagram Protocol), data
|
|||
|
passes between the application and the UDP module. FTP (File
|
|||
|
Transfer Protocol) is a typical application that uses TCP. Its
|
|||
|
protocol stack in this example is FTP/TCP/IP/ENET. SNMP (Simple
|
|||
|
Network Management Protocol) is an application that uses UDP. Its
|
|||
|
protocol stack in this example is SNMP/UDP/IP/ENET.
|
|||
|
|
|||
|
The TCP module, UDP module, and the Ethernet driver are n-to-1
|
|||
|
multiplexers. As multiplexers they switch many inputs to one output.
|
|||
|
They are also 1-to-n de-multiplexers. As de-multiplexers they switch
|
|||
|
one input to many outputs according to the type field in the protocol
|
|||
|
header.
|
|||
|
|
|||
|
|
|||
|
1 2 3 ... n 1 2 3 ... n
|
|||
|
\ | / | \ | | / ^
|
|||
|
\ | | / | \ | | / |
|
|||
|
------------- flow ---------------- flow
|
|||
|
|multiplexer| of |de-multiplexer| of
|
|||
|
------------- data ---------------- data
|
|||
|
| | | |
|
|||
|
| v | |
|
|||
|
1 1
|
|||
|
|
|||
|
Figure 2. n-to-1 multiplexer and 1-to-n de-multiplexer
|
|||
|
|
|||
|
If an Ethernet frame comes up into the Ethernet driver off the
|
|||
|
network, the packet can be passed upwards to either the ARP (Address
|
|||
|
Resolution Protocol) module or to the IP (Internet Protocol) module.
|
|||
|
The value of the type field in the Ethernet frame determines whether
|
|||
|
the Ethernet frame is passed to the ARP or the IP module.
|
|||
|
|
|||
|
If an IP packet comes up into IP, the unit of data is passed upwards
|
|||
|
to either TCP or UDP, as determined by the value of the protocol
|
|||
|
field in the IP header.
|
|||
|
|
|||
|
If the UDP datagram comes up into UDP, the application message is
|
|||
|
passed upwards to the network application based on the value of the
|
|||
|
port field in the UDP header. If the TCP message comes up into TCP,
|
|||
|
the application message is passed upwards to the network application
|
|||
|
based on the value of the port field in the TCP header.
|
|||
|
|
|||
|
The downwards multiplexing is simple to perform because from each
|
|||
|
starting point there is only the one downward path; each protocol
|
|||
|
module adds its header information so the packet can be de-
|
|||
|
multiplexed at the destination computer.
|
|||
|
|
|||
|
Data passing out from the applications through either TCP or UDP
|
|||
|
converges on the IP module and is sent downwards through the lower
|
|||
|
network interface driver.
|
|||
|
|
|||
|
Although internet technology supports many different network media,
|
|||
|
Ethernet is used for all examples in this tutorial because it is the
|
|||
|
most common physical network used under IP. The computer in Figure 1
|
|||
|
has a single Ethernet connection. The 6-byte Ethernet address is
|
|||
|
unique for each interface on an Ethernet and is located at the lower
|
|||
|
interface of the Ethernet driver.
|
|||
|
|
|||
|
The computer also has a 4-byte IP address. This address is located
|
|||
|
at the lower interface to the IP module. The IP address must be
|
|||
|
unique for an internet.
|
|||
|
|
|||
|
A running computer always knows its own IP address and Ethernet
|
|||
|
address.
|
|||
|
|
|||
|
2.4 Two Network Interfaces
|
|||
|
|
|||
|
If a computer is connected to 2 separate Ethernets it is as in Figure
|
|||
|
3.
|
|||
|
|
|||
|
----------------------------
|
|||
|
| network applications |
|
|||
|
| |
|
|||
|
|... \ | / .. \ | / ...|
|
|||
|
| ----- ----- |
|
|||
|
| |TCP| |UDP| |
|
|||
|
| ----- ----- |
|
|||
|
| \ / |
|
|||
|
| -------- |
|
|||
|
| | IP | |
|
|||
|
| ----- -*----*- ----- |
|
|||
|
| |ARP| | | |ARP| |
|
|||
|
| ----- | | ----- |
|
|||
|
| \ | | / |
|
|||
|
| ------ ------ |
|
|||
|
| |ENET| |ENET| |
|
|||
|
| ---@-- ---@-- |
|
|||
|
----------|-------|---------
|
|||
|
| |
|
|||
|
| ---o---------------------------
|
|||
|
| Ethernet Cable 2
|
|||
|
---------------o----------
|
|||
|
Ethernet Cable 1
|
|||
|
|
|||
|
Figure 3. TCP/IP Network Node on 2 Ethernets
|
|||
|
|
|||
|
Please note that this computer has 2 Ethernet addresses and 2 IP
|
|||
|
addresses.
|
|||
|
|
|||
|
It is seen from this structure that for computers with more than one
|
|||
|
physical network interface, the IP module is both a n-to-m
|
|||
|
multiplexer and an m-to-n de-multiplexer.
|
|||
|
|
|||
|
1 2 3 ... n 1 2 3 ... n
|
|||
|
\ | | / | \ | | / ^
|
|||
|
\ | | / | \ | | / |
|
|||
|
------------- flow ---------------- flow
|
|||
|
|multiplexer| of |de-multiplexer| of
|
|||
|
------------- data ---------------- data
|
|||
|
/ | | \ | / | | \ |
|
|||
|
/ | | \ v / | | \ |
|
|||
|
1 2 3 ... m 1 2 3 ... m
|
|||
|
|
|||
|
Figure 4. n-to-m multiplexer and m-to-n de-multiplexer
|
|||
|
|
|||
|
It performs this multiplexing in either direction to accommodate
|
|||
|
incoming and outgoing data. An IP module with more than 1 network
|
|||
|
interface is more complex than our original example in that it can
|
|||
|
forward data onto the next network. Data can arrive on any network
|
|||
|
interface and be sent out on any other.
|
|||
|
|
|||
|
TCP UDP
|
|||
|
\ /
|
|||
|
\ /
|
|||
|
--------------
|
|||
|
| IP |
|
|||
|
| |
|
|||
|
| --- |
|
|||
|
| / \ |
|
|||
|
| / v |
|
|||
|
--------------
|
|||
|
/ \
|
|||
|
/ \
|
|||
|
data data
|
|||
|
comes in goes out
|
|||
|
here here
|
|||
|
|
|||
|
Figure 5. Example of IP Forwarding a IP Packet
|
|||
|
|
|||
|
The process of sending an IP packet out onto another network is
|
|||
|
called "forwarding" an IP packet. A computer that has been dedicated
|
|||
|
to the task of forwarding IP packets is called an "IP-router".
|
|||
|
|
|||
|
As you can see from the figure, the forwarded IP packet never touches
|
|||
|
the TCP and UDP modules on the IP-router. Some IP-router
|
|||
|
implementations do not have a TCP or UDP module.
|
|||
|
|
|||
|
2.5 IP Creates a Single Logical Network
|
|||
|
|
|||
|
The IP module is central to the success of internet technology. Each
|
|||
|
module or driver adds its header to the message as the message passes
|
|||
|
down through the protocol stack. Each module or driver strips the
|
|||
|
corresponding header from the message as the message climbs the
|
|||
|
protocol stack up towards the application. The IP header contains
|
|||
|
the IP address, which builds a single logical network from multiple
|
|||
|
physical networks. This interconnection of physical networks is the
|
|||
|
source of the name: internet. A set of interconnected physical
|
|||
|
networks that limit the range of an IP packet is called an
|
|||
|
"internet".
|
|||
|
|
|||
|
2.6 Physical Network Independence
|
|||
|
|
|||
|
IP hides the underlying network hardware from the network
|
|||
|
applications. If you invent a new physical network, you can put it
|
|||
|
into service by implementing a new driver that connects to the
|
|||
|
internet underneath IP. Thus, the network applications remain intact
|
|||
|
and are not vulnerable to changes in hardware technology.
|
|||
|
|
|||
|
2.7 Interoperability
|
|||
|
|
|||
|
If two computers on an internet can communicate, they are said to
|
|||
|
"interoperate"; if an implementation of internet technology is good,
|
|||
|
it is said to have "interoperability". Users of general-purpose
|
|||
|
computers benefit from the installation of an internet because of the
|
|||
|
interoperability in computers on the market. Generally, when you buy
|
|||
|
a computer, it will interoperate. If the computer does not have
|
|||
|
interoperability, and interoperability can not be added, it occupies
|
|||
|
a rare and special niche in the market.
|
|||
|
|
|||
|
2.8 After the Overview
|
|||
|
|
|||
|
With the background set, we will answer the following questions:
|
|||
|
|
|||
|
When sending out an IP packet, how is the destination Ethernet
|
|||
|
address determined?
|
|||
|
|
|||
|
How does IP know which of multiple lower network interfaces to use
|
|||
|
when sending out an IP packet?
|
|||
|
|
|||
|
How does a client on one computer reach the server on another?
|
|||
|
|
|||
|
Why do both TCP and UDP exist, instead of just one or the other?
|
|||
|
|
|||
|
What network applications are available?
|
|||
|
|
|||
|
These will be explained, in turn, after an Ethernet refresher.
|
|||
|
|
|||
|
3. Ethernet
|
|||
|
|
|||
|
This section is a short review of Ethernet technology.
|
|||
|
|
|||
|
An Ethernet frame contains the destination address, source address,
|
|||
|
type field, and data.
|
|||
|
|
|||
|
An Ethernet address is 6 bytes. Every device has its own Ethernet
|
|||
|
address and listens for Ethernet frames with that destination
|
|||
|
address. All devices also listen for Ethernet frames with a wild-
|
|||
|
card destination address of "FF-FF-FF-FF-FF-FF" (in hexadecimal),
|
|||
|
called a "broadcast" address.
|
|||
|
|
|||
|
Ethernet uses CSMA/CD (Carrier Sense and Multiple Access with
|
|||
|
Collision Detection). CSMA/CD means that all devices communicate on
|
|||
|
a single medium, that only one can transmit at a time, and that they
|
|||
|
can all receive simultaneously. If 2 devices try to transmit at the
|
|||
|
same instant, the transmit collision is detected, and both devices
|
|||
|
wait a random (but short) period before trying to transmit again.
|
|||
|
|
|||
|
3.1 A Human Analogy
|
|||
|
|
|||
|
A good analogy of Ethernet technology is a group of people talking in
|
|||
|
a small, completely dark room. In this analogy, the physical network
|
|||
|
medium is sound waves on air in the room instead of electrical
|
|||
|
signals on a coaxial cable.
|
|||
|
|
|||
|
Each person can hear the words when another is talking (Carrier
|
|||
|
Sense). Everyone in the room has equal capability to talk (Multiple
|
|||
|
Access), but none of them give lengthy speeches because they are
|
|||
|
polite. If a person is impolite, he is asked to leave the room
|
|||
|
(i.e., thrown off the net).
|
|||
|
|
|||
|
No one talks while another is speaking. But if two people start
|
|||
|
speaking at the same instant, each of them know this because each
|
|||
|
hears something they haven't said (Collision Detection). When these
|
|||
|
two people notice this condition, they wait for a moment, then one
|
|||
|
begins talking. The other hears the talking and waits for the first
|
|||
|
to finish before beginning his own speech.
|
|||
|
|
|||
|
Each person has an unique name (unique Ethernet address) to avoid
|
|||
|
confusion. Every time one of them talks, he prefaces the message
|
|||
|
with the name of the person he is talking to and with his own name
|
|||
|
(Ethernet destination and source address, respectively), i.e., "Hello
|
|||
|
Jane, this is Jack, ..blah blah blah...". If the sender wants to
|
|||
|
talk to everyone he might say "everyone" (broadcast address), i.e.,
|
|||
|
"Hello Everyone, this is Jack, ..blah blah blah...".
|
|||
|
|
|||
|
4. ARP
|
|||
|
|
|||
|
When sending out an IP packet, how is the destination Ethernet
|
|||
|
address determined?
|
|||
|
|
|||
|
ARP (Address Resolution Protocol) is used to translate IP addresses
|
|||
|
to Ethernet addresses. The translation is done only for outgoing IP
|
|||
|
packets, because this is when the IP header and the Ethernet header
|
|||
|
are created.
|
|||
|
|
|||
|
4.1 ARP Table for Address Translation
|
|||
|
|
|||
|
The translation is performed with a table look-up. The table, called
|
|||
|
the ARP table, is stored in memory and contains a row for each
|
|||
|
computer. There is a column for IP address and a column for Ethernet
|
|||
|
address. When translating an IP address to an Ethernet address, the
|
|||
|
table is searched for a matching IP address. The following is a
|
|||
|
simplified ARP table:
|
|||
|
|
|||
|
------------------------------------
|
|||
|
|IP address Ethernet address |
|
|||
|
------------------------------------
|
|||
|
|223.1.2.1 08-00-39-00-2F-C3|
|
|||
|
|223.1.2.3 08-00-5A-21-A7-22|
|
|||
|
|223.1.2.4 08-00-10-99-AC-54|
|
|||
|
------------------------------------
|
|||
|
TABLE 1. Example ARP Table
|
|||
|
|
|||
|
The human convention when writing out the 4-byte IP address is each
|
|||
|
byte in decimal and separating bytes with a period. When writing out
|
|||
|
the 6-byte Ethernet address, the conventions are each byte in
|
|||
|
hexadecimal and separating bytes with either a minus sign or a colon.
|
|||
|
|
|||
|
The ARP table is necessary because the IP address and Ethernet
|
|||
|
address are selected independently; you can not use an algorithm to
|
|||
|
translate IP address to Ethernet address. The IP address is selected
|
|||
|
by the network manager based on the location of the computer on the
|
|||
|
internet. When the computer is moved to a different part of an
|
|||
|
internet, its IP address must be changed. The Ethernet address is
|
|||
|
selected by the manufacturer based on the Ethernet address space
|
|||
|
licensed by the manufacturer. When the Ethernet hardware interface
|
|||
|
board changes, the Ethernet address changes.
|
|||
|
|
|||
|
4.2 Typical Translation Scenario
|
|||
|
|
|||
|
During normal operation a network application, such as TELNET, sends
|
|||
|
an application message to TCP, then TCP sends the corresponding TCP
|
|||
|
message to the IP module. The destination IP address is known by the
|
|||
|
application, the TCP module, and the IP module. At this point the IP
|
|||
|
packet has been constructed and is ready to be given to the Ethernet
|
|||
|
driver, but first the destination Ethernet address must be
|
|||
|
determined.
|
|||
|
|
|||
|
The ARP table is used to look-up the destination Ethernet address.
|
|||
|
|
|||
|
4.3 ARP Request/Response Pair
|
|||
|
|
|||
|
But how does the ARP table get filled in the first place? The answer
|
|||
|
is that it is filled automatically by ARP on an "as-needed" basis.
|
|||
|
|
|||
|
Two things happen when the ARP table can not be used to translate an
|
|||
|
address:
|
|||
|
|
|||
|
1. An ARP request packet with a broadcast Ethernet address is sent
|
|||
|
out on the network to every computer.
|
|||
|
|
|||
|
2. The outgoing IP packet is queued.
|
|||
|
|
|||
|
Every computer's Ethernet interface receives the broadcast Ethernet
|
|||
|
frame. Each Ethernet driver examines the Type field in the Ethernet
|
|||
|
frame and passes the ARP packet to the ARP module. The ARP request
|
|||
|
packet says "If your IP address matches this target IP address, then
|
|||
|
please tell me your Ethernet address". An ARP request packet looks
|
|||
|
something like this:
|
|||
|
|
|||
|
---------------------------------------
|
|||
|
|Sender IP Address 223.1.2.1 |
|
|||
|
|Sender Enet Address 08-00-39-00-2F-C3|
|
|||
|
---------------------------------------
|
|||
|
|Target IP Address 223.1.2.2 |
|
|||
|
|Target Enet Address <blank> |
|
|||
|
---------------------------------------
|
|||
|
TABLE 2. Example ARP Request
|
|||
|
|
|||
|
Each ARP module examines the IP address and if the Target IP address
|
|||
|
matches its own IP address, it sends a response directly to the
|
|||
|
source Ethernet address. The ARP response packet says "Yes, that
|
|||
|
target IP address is mine, let me give you my Ethernet address". An
|
|||
|
ARP response packet has the sender/target field contents swapped as
|
|||
|
compared to the request. It looks something like this:
|
|||
|
|
|||
|
---------------------------------------
|
|||
|
|Sender IP Address 223.1.2.2 |
|
|||
|
|Sender Enet Address 08-00-28-00-38-A9|
|
|||
|
---------------------------------------
|
|||
|
|Target IP Address 223.1.2.1 |
|
|||
|
|Target Enet Address 08-00-39-00-2F-C3|
|
|||
|
---------------------------------------
|
|||
|
TABLE 3. Example ARP Response
|
|||
|
|
|||
|
The response is received by the original sender computer. The
|
|||
|
Ethernet driver looks at the Type field in the Ethernet frame then
|
|||
|
passes the ARP packet to the ARP module. The ARP module examines the
|
|||
|
ARP packet and adds the sender's IP and Ethernet addresses to its ARP
|
|||
|
table.
|
|||
|
|
|||
|
The updated table now looks like this:
|
|||
|
|
|||
|
----------------------------------
|
|||
|
|IP address Ethernet address |
|
|||
|
----------------------------------
|
|||
|
|223.1.2.1 08-00-39-00-2F-C3|
|
|||
|
|223.1.2.2 08-00-28-00-38-A9|
|
|||
|
|223.1.2.3 08-00-5A-21-A7-22|
|
|||
|
|223.1.2.4 08-00-10-99-AC-54|
|
|||
|
----------------------------------
|
|||
|
TA
|
|||
|
BLE 4. ARP Table after Response
|
|||
|
|
|||
|
4.4 Scenario Continued
|
|||
|
|
|||
|
The new translation has now been installed automatically in the
|
|||
|
table, just milli-seconds after it was needed. As you remember from
|
|||
|
step 2 above, the outgoing IP packet was queued. Next, the IP
|
|||
|
address to Ethernet address translation is performed by look-up in
|
|||
|
the ARP table then the Ethernet frame is transmitted on the Ethernet.
|
|||
|
Therefore, with the new steps 3, 4, and 5, the scenario for the
|
|||
|
sender computer is:
|
|||
|
|
|||
|
1. An ARP request packet with a broadcast Ethernet address is sent
|
|||
|
out on the network to every computer.
|
|||
|
|
|||
|
2. The outgoing IP packet is queued.
|
|||
|
|
|||
|
3. The ARP response arrives with the IP-to-Ethernet address
|
|||
|
translation for the ARP table.
|
|||
|
|
|||
|
4. For the queued IP packet, the ARP table is used to translate the
|
|||
|
IP address to the Ethernet address.
|
|||
|
|
|||
|
5. The Ethernet frame is transmitted on the Ethernet.
|
|||
|
|
|||
|
In summary, when the translation is missing from the ARP table, one
|
|||
|
IP packet is queued. The translation data is quickly filled in with
|
|||
|
ARP request/response and the queued IP packet is transmitted.
|
|||
|
|
|||
|
Each computer has a separate ARP table for each of its Ethernet
|
|||
|
interfaces. If the target computer does not exist, there will be no
|
|||
|
ARP response and no entry in the ARP table. IP will discard outgoing
|
|||
|
IP packets sent to that address. The upper layer protocols can't
|
|||
|
tell the difference between a broken Ethernet and the absence of a
|
|||
|
computer with the target IP address.
|
|||
|
|
|||
|
Some implementations of IP and ARP don't queue the IP packet while
|
|||
|
waiting for the ARP response. Instead the IP packet is discarded and
|
|||
|
the recovery from the IP packet loss is left to the TCP module or the
|
|||
|
UDP network application. This recovery is performed by time-out and
|
|||
|
retransmission. The retransmitted message is successfully sent out
|
|||
|
onto the network because the first copy of the message has already
|
|||
|
caused the ARP table to be filled.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue Thirty-Three, File 9 of 13
|
|||
|
|
|||
|
/////////////////////\\\\\\\\\\\\\\\\\\\\\
|
|||
|
|| ||
|
|||
|
|| A Real Functioning RED BOX Schematic ||
|
|||
|
|| ||
|
|||
|
|| Written by: R.J. "BoB" Dobbs ||
|
|||
|
|| ||
|
|||
|
\\\\\\\\\\\\\\\\\\\\\/////////////////////
|
|||
|
|
|||
|
::What is a Red Box?::
|
|||
|
|
|||
|
Essentially, the Red Box is a device used to fool the phone company's
|
|||
|
computer into thinking coins are deposited into a payphone. Every time you
|
|||
|
drop a coin into a payphone, the phone signals the type of coin inserted with
|
|||
|
one or more bursts of a combination of 1700hz and 2200hz. The tone bursts are
|
|||
|
coded as follows:
|
|||
|
|
|||
|
Nickel : One 60 millisecond pulse
|
|||
|
Dime : Two 60 millisecond pulses separated by 60 milliseconds
|
|||
|
Quarter: Five 35 millisecond pulses separated by 35 milliseconds
|
|||
|
|
|||
|
::How to use it::
|
|||
|
|
|||
|
Simply dial a long distance number (some areas require you to stick in
|
|||
|
a genuine nickel first), wait for the ACTS computer to demand your cash, and
|
|||
|
press the "deposit" button on the red box for each coin you want to simulate.
|
|||
|
The coin signals are coupled from the red box into the phone with a small
|
|||
|
speaker held to the mouthpiece. For local calls, either you must first deposit
|
|||
|
a genuine nickle before simulating more coins or place your call through the
|
|||
|
operator with 0+xxx+yyyy. Use some care when the operator is on the line -
|
|||
|
sometimes they catch on to your beeper ploy.
|
|||
|
|
|||
|
::Circuit Operation::
|
|||
|
|
|||
|
Each time the pushbutton is pressed, it triggers half of IC1, configured
|
|||
|
as a monostable multivibrator to energize the rest of the circuit for a length
|
|||
|
of time determined by the setting of the coin selector switch. This in turn
|
|||
|
starts the other half of IC1, configured as an astable multivibrator, pulsing
|
|||
|
on and off at regular intervals at a rate determined by the 100k pot between
|
|||
|
pins 12 and 13. The output of the astable thus alternately powers of IC2,
|
|||
|
configured as a square wave oscillator, providing the required 1700hz and
|
|||
|
2200hz to the op amp which acts as a buffer to drive the speaker.
|
|||
|
|
|||
|
::Alignment & Testing::
|
|||
|
|
|||
|
When you are making this thing by no means should you use a 9v AC to DC
|
|||
|
adapter! I also suggest not using a bread board. So be careful with that
|
|||
|
sodering iron. Both of these things will cause you problems.
|
|||
|
For alignment, a frequency counter is desired but you can use a good
|
|||
|
oscilloscope as well. (These are not ABSOLUTELY necessary, but to help.) In
|
|||
|
order to figure frequency in Hz with your scope you can use the following
|
|||
|
formula.
|
|||
|
|
|||
|
1 S = The measurement of the wave that is on the display
|
|||
|
Hz = -----------
|
|||
|
S*(T*10^-6) T = The setting of the time selector (milliseconds)
|
|||
|
|
|||
|
1
|
|||
|
Hz = ------------------ Hz = 2198
|
|||
|
9.1 * 50ms * 10^-6
|
|||
|
|
|||
|
Carefully remove IC1 from it's socket. Install a temporary jumper from
|
|||
|
+9v supply to pin 14 of IC2 and temporarily disconnect the 0.01uF capacitors
|
|||
|
from pins 5 and 9 of IC2. Power up the circuit. Measuring the output from pin
|
|||
|
5 of IC2 with the frequency counter or scope, adjust the 50k pot between pins 1
|
|||
|
and 6 for an output of 1700hz. Now adjust the 50k pot between pins 8 and 13
|
|||
|
for an output of 2200hz from pin 9 of IC2. Remove the temporary jumper and
|
|||
|
re-attach the capacitors to pins 5 and 9 of IC2, and re-insert IC1. (Note: if
|
|||
|
no frequency counter is available, the outputs can be adjusted by ear one at a
|
|||
|
time by zero-beating the output tone with a computer generated tone of known
|
|||
|
precision.)
|
|||
|
Next, using a multimeter, adjust the 10K pot at the cathode of the
|
|||
|
"quarter" diode for resistance of approximately 8K ohms. (This sets the
|
|||
|
difference between the duration of the quarter pulses and those of the
|
|||
|
nickel/dime -- fine tuning of this ratio may be necessary durring the latter
|
|||
|
stages of alignment; this can be done by ear.)
|
|||
|
Now, temporarily disconnect the wire between pins 5 and 10 of IC1. Set
|
|||
|
coin selector switch in the "N" (nickel) position. With the oscilloscope
|
|||
|
measuring the output from pin 9 of IC1, adjust the 100k pot between pins 12 and
|
|||
|
13 of IC1 for output pulses of 60 millisecond duration. Reconnect the wire
|
|||
|
between pins 5 and 10. (Note: If no scope is available, adjust the pulse rate
|
|||
|
by ear using computer generated tones for comparison.)
|
|||
|
Leave the selector switch in the "N" position. Adjust the 50K pot
|
|||
|
labeled "Nickel" for a single beep each time the deposit pushbutton is pressed.
|
|||
|
Next set the coin selector switch to "Dime". Adjust the 50k pot labelled
|
|||
|
"Dime" for a quick double beep each time the pushbutton is pressed.
|
|||
|
Finally, set the selector to "Quarter". Adjust the 50k pot labelled
|
|||
|
"Quarter" until exactly 5 very quick beeps are heard for each button
|
|||
|
press. Don't worry if the quarter beeps sound shorter and faster than
|
|||
|
the nickel and dime ones. They should be.
|
|||
|
|
|||
|
::Conclusion::
|
|||
|
|
|||
|
If all went well to this point, your red box should be completely
|
|||
|
aligned and functional. A final test should now be conducted from a payphone
|
|||
|
using the DATL (Dial Access Test Line) coin test. Dial 09591230 and follow the
|
|||
|
computer instructions using the red box at the proper prompts. The computer
|
|||
|
should correctly identify all coins "simulated" and flag any anomalies. With a
|
|||
|
little discretion, your red box should bring you many years of use. Remember,
|
|||
|
there is no such thing as spare change!
|
|||
|
|
|||
|
::Parts list for Red Box::
|
|||
|
|
|||
|
2 556 Dual Timer IC's 8 0.01uF Caps
|
|||
|
1 741 Op Amp IC 2 0.1uF Cap
|
|||
|
2 1N914 Diodes 1 1.0uF Electrolytic Cap
|
|||
|
5 10k Resistors 2 10uF Electrolytic Caps
|
|||
|
1 4.7k Resistor 1 3 Position Rotary Switch
|
|||
|
2 100k Resistors 1 SPST Toggle Switch
|
|||
|
1 100k PC Mount Pots 1 Momentary Push Button Switch (n/o)
|
|||
|
3 50k PC Mount Pot 1 9v Battery Clip
|
|||
|
1 10k PC Mount Pot 2 14 Pin Dip Socket
|
|||
|
2 50k Multi-Turn Pots 1 8 Pin Dip Socket
|
|||
|
|
|||
|
::Schematic::
|
|||
|
_
|
|||
|
+9__S1/ _____________________________________________________________
|
|||
|
| | | | | S3 |
|
|||
|
R1 R2 | R3 o @ o |
|
|||
|
|___C1___| _____| |_________|/___ / o \___ |
|
|||
|
| ____|_____|_____|____ | | |\ | | _| |
|
|||
|
_| o | 6 4 14 | R4 R5 D1 | | R9< |
|
|||
|
S2 | o _|5 13|_____| | | |__ | |
|
|||
|
| | | | |__ g | _| | |
|
|||
|
g |_|10 IC1 8|_ _| | R8< | |
|
|||
|
| 556 | |__R6< |__ | | |
|
|||
|
_|9 12|_| _| | | |
|
|||
|
| | | |__C2__g R7< | | |
|
|||
|
| |_11___3___7___2___1__| | | | |
|
|||
|
| | | | |___|_______________________|____|____| |
|
|||
|
| | C3 | | |
|
|||
|
|__|/| | | C4 |
|
|||
|
| |\ | | | |
|
|||
|
| D2 g g g |
|
|||
|
|_____________________ |
|
|||
|
| | | |
|
|||
|
___ R10 | R11 ___ |
|
|||
|
v | | | | | v |
|
|||
|
__R12 |__| ___|___ |__| R13__ |
|
|||
|
| _|___|___|___|____|_ | |
|
|||
|
| | 1 4 14 10 13 | | |
|
|||
|
| | | | |
|
|||
|
|_______|6 8|_______| |
|
|||
|
| | | IC2 | | | |
|
|||
|
C5 |__|2 556 12|__| C6 |
|
|||
|
| | | | |
|
|||
|
g __|3 11|__ g |
|
|||
|
| |_____7___5___9______| | |
|
|||
|
C7 | | | C8 |
|
|||
|
| | C9 C10 | |
|
|||
|
| | |___| | |
|
|||
|
g g | g |
|
|||
|
| |
|
|||
|
| ________________________________|
|
|||
|
| | |
|
|||
|
| R14 |
|
|||
|
| | |\ |
|
|||
|
| | | \ |
|
|||
|
|___________|___________|3 \|
|
|||
|
| | | 7 \
|
|||
|
C11 R15 |IC3 \
|
|||
|
| | |741 6/___
|
|||
|
g g | 4 / |
|
|||
|
| /| |
|
|||
|
g_[speaker]___C12______|2 / | |
|
|||
|
| |/ g |
|
|||
|
|_______________|
|
|||
|
|
|||
|
::Schematic Parts Code::
|
|||
|
|
|||
|
R1:10K R4:10K R7:50K pot R10:10K R13:50K pot
|
|||
|
R2:10K R5:10K R8:50K pot R11:10K R14:100K
|
|||
|
R3:4.7K R6:100K pot R9:50K pot R12:50K pot R15:100K
|
|||
|
|
|||
|
C1:0.01uf C4:10uf C7:0.01uf C10:0.01uf
|
|||
|
C2:1.00uf C5:0.01uf C8:0.01uf C11:0.10uf D1 :1N914
|
|||
|
C3:0.01uf C6:0.01uf C9:0.01uf C12:10uf D2 :1N914
|
|||
|
|
|||
|
S1 - SPST toggle
|
|||
|
S2 - Momentary push button Normally Open
|
|||
|
S3 - 3-position rotary switch g - Ground
|
|||
|
|
|||
|
\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\?///////////////////////////////////////
|
|||
|
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue Thirty-Three, File 10 of 13
|
|||
|
|
|||
|
PWN ^*^ PWN ^*^ PWN { CyberView '91 } PWN ^*^ PWN ^*^ PWN
|
|||
|
^*^ ^*^
|
|||
|
PWN P h r a c k W o r l d N e w s PWN
|
|||
|
^*^ ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ ^*^
|
|||
|
PWN Special Edition Issue Four PWN
|
|||
|
^*^ ^*^
|
|||
|
PWN "The Hackers Who Came In From The Cold" PWN
|
|||
|
^*^ ^*^
|
|||
|
PWN June 21-23, 1991 PWN
|
|||
|
^*^ ^*^
|
|||
|
PWN Written by Bruce Sterling PWN
|
|||
|
^*^ ^*^
|
|||
|
PWN ^*^ PWN ^*^ PWN { CyberView '91 } PWN ^*^ PWN ^*^ PWN
|
|||
|
|
|||
|
|
|||
|
The Hackers Who Came In From The Cold
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
"Millionaries and vandals met at the computer-underground convention
|
|||
|
to discuss free information. What they found was free love."
|
|||
|
|
|||
|
by Bruce Sterling : bruces @ well.sf.ca.us
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
** A slightly shorter version of this article appears in Details Magazine
|
|||
|
(October 1991, pages 94-97, 134). The Details article includes photographs
|
|||
|
of Knight Lightning, Erik Bloodaxe, Mitch Kapor, and Doc Holiday.
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
They called it "CyberView '91." Actually, it was another "SummerCon" --
|
|||
|
the traditional summer gathering of the American hacker underground. The
|
|||
|
organizer, 21 year old "Knight Lightning," had recently beaten a Computer Fraud
|
|||
|
and Abuse rap that might have put him in jail for thirty years. A little
|
|||
|
discretion seemed in order.
|
|||
|
|
|||
|
The convention hotel, a seedy but accommodating motor-inn outside the
|
|||
|
airport in St Louis, had hosted SummerCons before. Changing the name had been
|
|||
|
a good idea. If the staff were alert, and actually recognized that these were
|
|||
|
the same kids back again, things might get hairy.
|
|||
|
|
|||
|
The SummerCon '88 hotel was definitely out of bounds. The US Secret
|
|||
|
Service had set up shop in an informant's room that year, and videotaped the
|
|||
|
drunken antics of the now globally notorious "Legion of Doom" through a one-way
|
|||
|
mirror. The running of SummerCon '88 had constituted a major count of criminal
|
|||
|
conspiracy against young Knight Lightning, during his 1990 federal trial.
|
|||
|
|
|||
|
That hotel inspired sour memories. Besides, people already got plenty
|
|||
|
nervous playing "hunt the fed" at SummerCon gigs. SummerCons generally
|
|||
|
featured at least one active federal informant. Hackers and phone phreaks
|
|||
|
like to talk a lot. They talk about phones and computers -- and about each
|
|||
|
other.
|
|||
|
|
|||
|
For insiders, the world of computer hacking is a lot like Mexico. There's
|
|||
|
no middle class. There's a million little kids screwing around with their
|
|||
|
modems, trying to snitch long-distance phone-codes, trying to swipe pirated
|
|||
|
software -- the "kodez kidz" and "warez doodz." They're peons, "rodents."
|
|||
|
Then there's a few earnest wannabes, up-and-comers, pupils. Not many. Less of
|
|||
|
'em every year, lately.
|
|||
|
|
|||
|
And then there's the heavy dudes. The players. The Legion of Doom are
|
|||
|
definitely heavy. Germany's Chaos Computer Club are very heavy, and already
|
|||
|
back out on parole after their dire flirtation with the KGB. The Masters of
|
|||
|
Destruction in New York are a pain in the ass to their rivals in the
|
|||
|
underground, but ya gotta admit they are heavy. MoD's "Phiber Optik" has
|
|||
|
almost completed his public-service sentence, too... "Phoenix" and his crowd
|
|||
|
down in Australia used to be heavy, but nobody's heard much out of "Nom" and
|
|||
|
"Electron" since the Australian heat came down on them.
|
|||
|
|
|||
|
The people in Holland are very active, but somehow the Dutch hackers don't
|
|||
|
quite qualify as "heavy." Probably because computer-hacking is legal in
|
|||
|
Holland, and therefore nobody ever gets busted for it. The Dutch lack the
|
|||
|
proper bad attitude, somehow.
|
|||
|
|
|||
|
America's answer to the Dutch menace began arriving in a steady confusion
|
|||
|
of airport shuttle buses and college-kid decaying junkers. A software pirate,
|
|||
|
one of the more prosperous attendees, flaunted a radar-detecting black
|
|||
|
muscle-car. In some dim era before the jet age, this section of St Louis had
|
|||
|
been a mellow, fertile Samuel Clemens landscape. Waist-high summer weeds still
|
|||
|
flourished beside the four-lane highway and the airport feeder roads.
|
|||
|
|
|||
|
The graceless CyberView hotel had been slammed down onto this landscape
|
|||
|
as if dropped from a B-52. A small office-tower loomed in one corner beside a
|
|||
|
large parking garage. The rest was a rambling mess of long, narrow, dimly lit
|
|||
|
corridors, with a small swimming pool, a glass-fronted souvenir shop and a
|
|||
|
cheerless dining room. The hotel was clean enough, and the staff, despite
|
|||
|
provocation, proved adept at minding their own business. For their part, the
|
|||
|
hackers seemed quite fond of the place.
|
|||
|
|
|||
|
The term "hacker" has had a spotted history. Real "hackers," traditional
|
|||
|
"hackers," like to write software programs. They like to "grind code,"
|
|||
|
plunging into its densest abstractions until the world outside the computer
|
|||
|
terminal bleaches away. Hackers tend to be portly white techies with thick
|
|||
|
fuzzy beards who talk entirely in jargon, stare into space a lot, and laugh
|
|||
|
briefly for no apparent reason. The CyberView crowd, though they call
|
|||
|
themselves "hackers," are better identified as computer intruders. They don't
|
|||
|
look, talk or act like 60s M.I.T.-style hackers.
|
|||
|
|
|||
|
Computer intruders of the 90s aren't stone pocket-protector techies.
|
|||
|
They're young white suburban males, and look harmless enough, but sneaky.
|
|||
|
They're much the kind of kid you might find skinny-dipping at 2AM in a backyard
|
|||
|
suburban swimming pool. The kind of kid who would freeze in the glare of the
|
|||
|
homeowner's flashlight, then frantically grab his pants and leap over the
|
|||
|
fence, leaving behind a half-empty bottle of tequila, a Metallica T-shirt, and,
|
|||
|
probably, his wallet.
|
|||
|
|
|||
|
One might wonder why, in the second decade of the personal-computer
|
|||
|
revolution, most computer intruders are still suburban teenage white whiz-kids.
|
|||
|
Hacking-as-computer-intrusion has been around long enough to have bred an
|
|||
|
entire generation of serious, heavy-duty adult computer-criminals. Basically,
|
|||
|
this simply hasn't occurred. Almost all computer intruders simply quit after
|
|||
|
age 22. They get bored with it, frankly. Sneaking around in other people's
|
|||
|
swimming pools simply loses its appeal. They get out of school. They get
|
|||
|
married. They buy their own swimming pools. They have to find some replica
|
|||
|
of a real life.
|
|||
|
|
|||
|
The Legion of Doom -- or rather, the Texas wing of LoD -- had hit Saint
|
|||
|
Louis in high style, this weekend of June 22. The Legion of Doom has been
|
|||
|
characterized as "a high-tech street gang" by the Secret Service, but this is
|
|||
|
surely one of the leakiest, goofiest and best-publicized criminal conspiracies
|
|||
|
in American history.
|
|||
|
|
|||
|
Not much has been heard from Legion founder "Lex Luthor" in recent years.
|
|||
|
The Legion's Atlanta wing; "Prophet," "Leftist," and "Urvile," are just now
|
|||
|
getting out of various prisons and into Georgia halfway-houses. "Mentor" got
|
|||
|
married and writes science fiction games for a living.
|
|||
|
|
|||
|
But "Erik Bloodaxe," "Doc Holiday," and "Malefactor" were here -- in
|
|||
|
person, and in the current issues of TIME and NEWSWEEK. CyberView offered a
|
|||
|
swell opportunity for the Texan Doomsters to announce the formation of their
|
|||
|
latest high-tech, uhm, organization, "Comsec Data Security Corporation."
|
|||
|
|
|||
|
Comsec boasts a corporate office in Houston, and a marketing analyst, and
|
|||
|
a full-scale corporate computer-auditing program. The Legion boys are now
|
|||
|
digital guns for hire. If you're a well-heeled company, and you can cough up
|
|||
|
per diem and air-fare, the most notorious computer-hackers in America will show
|
|||
|
right up on your doorstep and put your digital house in order -- guaranteed.
|
|||
|
|
|||
|
Bloodaxe, a limber, strikingly handsome young Texan with shoulder-length
|
|||
|
blond hair, mirrored sunglasses, a tie, and a formidable gift of gab, did the
|
|||
|
talking. Before some thirty of his former peers, gathered upstairs over
|
|||
|
styrofoam coffee and canned Coke in the hotel's Mark Twain Suite, Bloodaxe
|
|||
|
sternly announced some home truths of modern computer security.
|
|||
|
|
|||
|
Most so-called "computer security experts" -- (Comsec's competitors) --
|
|||
|
are overpriced con artists! They charge gullible corporations thousands of
|
|||
|
dollars a day, just to advise that management lock its doors at night and use
|
|||
|
paper shredders. Comsec Corp, on the other hand (with occasional consultant
|
|||
|
work from Messrs. "Pain Hertz" and "Prime Suspect") boasts America's most
|
|||
|
formidable pool of genuine expertise at actually breaking into computers.
|
|||
|
|
|||
|
Comsec, Bloodaxe continued smoothly, was not in the business of turning-in
|
|||
|
any former hacking compatriots. Just in case anybody here was, you know,
|
|||
|
worrying... On the other hand, any fool rash enough to challenge a
|
|||
|
Comsec-secured system had better be prepared for a serious hacker-to-hacker
|
|||
|
dust-up.
|
|||
|
|
|||
|
"Why would any company trust you?" someone asked languidly.
|
|||
|
|
|||
|
Malefactor, a muscular young Texan with close-cropped hair and the build
|
|||
|
of a linebacker, pointed out that, once hired, Comsec would be allowed inside
|
|||
|
the employer's computer system, and would have no reason at all to "break in."
|
|||
|
Besides, Comsec agents were to be licensed and bonded.
|
|||
|
|
|||
|
Bloodaxe insisted passionately that LoD were through with hacking for
|
|||
|
good. There was simply no future in it. The time had come for LoD to move on,
|
|||
|
and corporate consultation was their new frontier. (The career options of
|
|||
|
committed computer intruders are, when you come right down to it, remarkably
|
|||
|
slim.) "We don't want to be flippin' burgers or sellin' life insurance when
|
|||
|
we're thirty," Bloodaxe drawled. "And wonderin' when Tim Foley is gonna come
|
|||
|
kickin' in the door!" (Special Agent Timothy M. Foley of the US Secret Service
|
|||
|
has fully earned his reputation as the most formidable anti-hacker cop in
|
|||
|
America.)
|
|||
|
|
|||
|
Bloodaxe sighed wistfully. "When I look back at my life... I can see I've
|
|||
|
essentially been in school for eleven years, teaching myself to be a computer
|
|||
|
security consultant."
|
|||
|
|
|||
|
After a bit more grilling, Bloodaxe finally got to the core of matters.
|
|||
|
Did anybody here hate them now? he asked, almost timidly. Did people think the
|
|||
|
Legion had sold out? Nobody offered this opinion. The hackers shook their
|
|||
|
heads, they looked down at their sneakers, they had another slug of Coke. They
|
|||
|
didn't seem to see how it would make much difference, really. Not at this
|
|||
|
point.
|
|||
|
|
|||
|
Over half the attendees of CyberView publicly claimed to be out of the
|
|||
|
hacking game now. At least one hacker present -- (who had shown up, for some
|
|||
|
reason known only to himself, wearing a blond wig and a dime-store tiara, and
|
|||
|
was now catching flung Cheetos in his styrofoam cup) -- already made his
|
|||
|
living "consulting" for private investigators.
|
|||
|
|
|||
|
Almost everybody at CyberView had been busted, had their computers seized,
|
|||
|
or, had, at least, been interrogated -- and when federal police put the squeeze
|
|||
|
on a teenage hacker, he generally spills his guts.
|
|||
|
|
|||
|
By '87, a mere year or so after they plunged seriously into anti-hacker
|
|||
|
OBenforcement, the Secret Service had workable dossiers on everybody that
|
|||
|
really
|
|||
|
mattered. By '89, they had files on practically every last soul in the
|
|||
|
American digital underground. The problem for law enforcement has never been
|
|||
|
finding out who the hackers are. The problem has been figuring out what the
|
|||
|
hell they're really up to, and, harder yet, trying to convince the public that
|
|||
|
it's actually important and dangerous to public safety.
|
|||
|
|
|||
|
From the point of view of hackers, the cops have been acting wacky lately.
|
|||
|
The cops, and their patrons in the telephone companies, just don't understand
|
|||
|
the modern world of computers, and they're scared. "They think there are
|
|||
|
masterminds running spy-rings who employ us," a hacker told me. "They don't
|
|||
|
understand that we don't do this for money, we do it for power and knowledge."
|
|||
|
Telephone security people who reach out to the underground are accused of
|
|||
|
divided loyalties and fired by panicked employers. A young Missourian coolly
|
|||
|
psychoanalyzed the opposition. "They're overdependent on things they don't
|
|||
|
understand. They've surrendered their lives to computers."
|
|||
|
|
|||
|
"Power and knowledge" may seem odd motivations. "Money" is a lot easier
|
|||
|
to understand. There are growing armies of professional thieves who rip-off
|
|||
|
phone service for money. Hackers, though, are into, well, power and
|
|||
|
knowledge. This has made them easier to catch than the street-hustlers who
|
|||
|
steal access codes at airports. It also makes them a lot scarier.
|
|||
|
|
|||
|
Take the increasingly dicey problems posed by "Bulletin Board Systems."
|
|||
|
"Boards" are home computers tied to home telephone lines, that can store and
|
|||
|
transmit data over the phone -- written texts, software programs, computer
|
|||
|
games, electronic mail. Boards were invented in the late 70s, and, while the
|
|||
|
vast majority of boards are utterly harmless, some few piratical boards swiftly
|
|||
|
became the very backbone of the 80s digital underground. Over half the
|
|||
|
attendees of CyberView ran their own boards. "Knight Lightning" had run an
|
|||
|
electronic magazine, "Phrack," that appeared on many underground boards across
|
|||
|
America.
|
|||
|
|
|||
|
Boards are mysterious. Boards are conspiratorial. Boards have been
|
|||
|
accused of harboring: Satanists, anarchists, thieves, child pornographers,
|
|||
|
Aryan nazis, religious cultists, drug dealers -- and, of course, software
|
|||
|
pirates, phone phreaks, and hackers. Underground hacker boards were scarcely
|
|||
|
reassuring, since they often sported terrifying sci-fi heavy-metal names, like
|
|||
|
"Speed Demon Elite," "Demon Roach Underground," and "Black Ice." (Modern
|
|||
|
hacker boards tend to feature defiant titles like "Uncensored BBS," "Free
|
|||
|
Speech," and "Fifth Amendment.")
|
|||
|
|
|||
|
Underground boards carry stuff as vile and scary as, say, 60s-era
|
|||
|
underground newspapers -- from the time when Yippies hit Chicago and ROLLING
|
|||
|
STONE gave away free roach-clips to subscribers. "Anarchy files" are popular
|
|||
|
features on outlaw boards, detailing how to build pipe-bombs, how to make
|
|||
|
Molotovs, how to brew methedrine and LSD, how to break and enter buildings, how
|
|||
|
to blow up bridges, the easiest ways to kill someone with a single blow of a
|
|||
|
blunt object -- and these boards bug straight people a lot. Never mind that
|
|||
|
all this data is publicly available in public libraries where it is protected
|
|||
|
by the First Amendment. There is something about its being on a computer --
|
|||
|
where any teenage geek with a modem and keyboard can read it, and print it out,
|
|||
|
and spread it around, free as air -- there is something about that, that is
|
|||
|
creepy.
|
|||
|
|
|||
|
"Brad" is a New Age pagan from Saint Louis who runs a service known as
|
|||
|
"WEIRDBASE," available on an international network of boards called "FidoNet."
|
|||
|
Brad was mired in an interminable scandal when his readers formed a spontaneous
|
|||
|
underground railroad to help a New Age warlock smuggle his teenage daughter out
|
|||
|
of Texas, away from his fundamentalist Christian in-laws, who were utterly
|
|||
|
convinced that he had murdered his wife and intended to sacrifice his daughter
|
|||
|
to -- Satan! The scandal made local TV in Saint Louis. Cops came around and
|
|||
|
grilled Brad. The patchouli stench of Aleister Crowley hung heavy in the air.
|
|||
|
There was just no end to the hassle.
|
|||
|
|
|||
|
If you're into something goofy and dubious and you have a board about it,
|
|||
|
it can mean real trouble. Science-fiction game publisher Steve Jackson had his
|
|||
|
board seized in 1990. Some cryogenics people in California, who froze a woman
|
|||
|
for post-mortem preservation before she was officially, er, "dead," had their
|
|||
|
computers seized. People who sell dope-growing equipment have had their
|
|||
|
computers seized. In 1990, boards all over America went down: Illuminati,
|
|||
|
CLLI Code, Phoenix Project, Dr. Ripco. Computers are seized as "evidence," but
|
|||
|
since they can be kept indefinitely for study by police, this veers close to
|
|||
|
confiscation and punishment without trial. One good reason why Mitchell Kapor
|
|||
|
showed up at CyberView.
|
|||
|
|
|||
|
Mitch Kapor was the co-inventor of the mega-selling business program LOTUS
|
|||
|
1-2-3 and the founder of the software giant, Lotus Development Corporation. He
|
|||
|
is currently the president of a newly-formed electronic civil liberties group,
|
|||
|
the Electronic Frontier Foundation. Kapor, now 40, customarily wears Hawaiian
|
|||
|
shirts and is your typical post-hippie cybernetic multimillionaire. He and
|
|||
|
EFF's chief legal counsel, "Johnny Mnemonic," had flown in for the gig in
|
|||
|
Kapor's private jet.
|
|||
|
|
|||
|
Kapor had been dragged willy-nilly into the toils of the digital
|
|||
|
underground when he received an unsolicited floppy-disk in the mail, from an
|
|||
|
outlaw group known as the "NuPrometheus League." These rascals (still not
|
|||
|
apprehended) had stolen confidential proprietary software from Apple Computer,
|
|||
|
Inc., and were distributing it far and wide in order to blow Apple's trade
|
|||
|
secrets and humiliate the company. Kapor assumed that the disk was a joke, or,
|
|||
|
more likely, a clever scheme to infect his machines with a computer virus.
|
|||
|
|
|||
|
But when the FBI showed up, at Apple's behest, Kapor was shocked at the
|
|||
|
extent of their naivete. Here were these well-dressed federal officials,
|
|||
|
politely "Mr. Kapor"- ing him right and left, ready to carry out a war to the
|
|||
|
knife against evil marauding "hackers." They didn't seem to grasp that
|
|||
|
"hackers" had built the entire personal computer industry. Jobs was a hacker,
|
|||
|
Wozniak too, even Bill Gates, the youngest billionaire in the history of
|
|||
|
America -- all "hackers." The new buttoned-down regime at Apple had blown its
|
|||
|
top, and as for the feds, they were willing, but clueless. Well, let's be
|
|||
|
charitable -- the feds were "cluefully challenged." "Clue-impaired."
|
|||
|
"Differently clued...."
|
|||
|
|
|||
|
Back in the 70s (as Kapor recited to the hushed and respectful young
|
|||
|
hackers) he himself had practiced "software piracy" -- as those activities
|
|||
|
would be known today. Of course, back then, "computer software" hadn't been a
|
|||
|
major industry -- but today, "hackers" had police after them for doing things
|
|||
|
that the industry's own pioneers had pulled routinely. Kapor was irate about
|
|||
|
this. His own personal history, the lifestyle of his pioneering youth, was
|
|||
|
being smugly written out of the historical record by the latter-day corporate
|
|||
|
androids. Why, nowadays, people even blanched when Kapor forthrightly declared
|
|||
|
that he'd done LSD in the Sixties.
|
|||
|
|
|||
|
Quite a few of the younger hackers grew alarmed at this admission of
|
|||
|
Kapor's, and gazed at him in wonder, as if expecting him to explode.
|
|||
|
|
|||
|
"The law only has sledgehammers, when what we need are parking tickets and
|
|||
|
speeding tickets," Kapor said. Anti-hacker hysteria had gripped the nation in
|
|||
|
1990. Huge law enforcement efforts had been mounted against illusory threats.
|
|||
|
In Washington DC, on the very day when the formation of the Electronic Frontier
|
|||
|
Foundation had been announced, a Congressional committee had been formally
|
|||
|
presented with the plotline of a thriller movie -- DIE HARD II, in which hacker
|
|||
|
terrorists seize an airport computer -- as if this Hollywood fantasy posed a
|
|||
|
clear and present danger to the American republic. A similar hacker thriller,
|
|||
|
WAR GAMES, had been presented to Congress in the mid-80s. Hysteria served no
|
|||
|
one's purposes, and created a stampede of foolish and unenforceable laws likely
|
|||
|
to do more harm than good.
|
|||
|
|
|||
|
Kapor didn't want to "paper over the differences" between his Foundation
|
|||
|
and the underground community. In the firm opinion of EFF, intruding into
|
|||
|
computers by stealth was morally wrong. Like stealing phone service, it
|
|||
|
deserved punishment. Not draconian ruthlessness, though. Not the ruination of
|
|||
|
a youngster's entire life.
|
|||
|
|
|||
|
After a lively and quite serious discussion of digital free-speech issues,
|
|||
|
the entire crew went to dinner at an Italian eatery in the local mall, on
|
|||
|
Kapor's capacious charge-tab. Having said his piece and listened with care,
|
|||
|
Kapor began glancing at his watch. Back in Boston, his six-year-old son was
|
|||
|
waiting at home, with a new Macintosh computer-game to tackle. A quick
|
|||
|
phone-call got the jet warmed up, and Kapor and his lawyer split town.
|
|||
|
|
|||
|
With the forces of conventionality -- such as they were -- out of the
|
|||
|
picture, the Legion of Doom began to get heavily into "Mexican Flags." A
|
|||
|
Mexican Flag is a lethal, multi-layer concoction of red grenadine, white
|
|||
|
tequila and green creme-de-menthe. It is topped with a thin layer of 150 proof
|
|||
|
rum, set afire, and sucked up through straws.
|
|||
|
|
|||
|
The formal fire-and-straw ritual soon went by the board as things began to
|
|||
|
disintegrate. Wandering from room to room, the crowd became howlingly rowdy,
|
|||
|
though without creating trouble, as the CyberView crowd had wisely taken over
|
|||
|
an entire wing of the hotel.
|
|||
|
|
|||
|
"Crimson Death," a cheerful, baby-faced young hardware expert with a
|
|||
|
pierced nose and three earrings, attempted to hack the hotel's private phone
|
|||
|
system, but only succeeded in cutting off phone service to his own room.
|
|||
|
|
|||
|
Somebody announced there was a cop guarding the next wing of the hotel.
|
|||
|
Mild panic ensued. Drunken hackers crowded to the window.
|
|||
|
|
|||
|
A gentleman slipped quietly through the door of the next wing wearing a
|
|||
|
short terrycloth bathrobe and spangled silk boxer shorts.
|
|||
|
|
|||
|
Spouse-swappers had taken over the neighboring wing of the hotel, and were
|
|||
|
holding a private weekend orgy. It was a St Louis swingers' group. It turned
|
|||
|
out that the cop guarding the entrance way was an off-duty swinging cop. He'd
|
|||
|
angrily threatened to clobber Doc Holiday. Another swinger almost punched-out
|
|||
|
"Bill from RNOC," whose prurient hacker curiosity, naturally, knew no bounds.
|
|||
|
|
|||
|
It was not much of a contest. As the weekend wore on and the booze flowed
|
|||
|
freely, the hackers slowly but thoroughly infiltrated the hapless swingers, who
|
|||
|
proved surprisingly open and tolerant. At one point, they even invited a group
|
|||
|
of hackers to join in their revels, though "they had to bring their own women."
|
|||
|
|
|||
|
Despite the pulverizing effects of numerous Mexican Flags, Comsec Data
|
|||
|
Security seemed to be having very little trouble on that score. They'd
|
|||
|
vanished downtown brandishing their full-color photo in TIME magazine, and
|
|||
|
returned with an impressive depth-core sample of St Louis womanhood, one of
|
|||
|
whom, in an idle moment, broke into Doc Holiday's room, emptied his wallet, and
|
|||
|
stole his Sony tape recorder and all his shirts.
|
|||
|
|
|||
|
Events stopped dead for the season's final episode of STAR TREK: THE NEXT
|
|||
|
GENERATION. The show passed in rapt attention -- then it was back to harassing
|
|||
|
the swingers. Bill from RNOC cunningly out-waited the swinger guards,
|
|||
|
infiltrated the building, and decorated all the closed doors with globs of
|
|||
|
mustard from a pump-bottle.
|
|||
|
|
|||
|
In the hungover glare of Sunday morning, a hacker proudly showed me a
|
|||
|
large handlettered placard reading PRIVATE -- STOP, which he had stolen from
|
|||
|
the unlucky swingers on his way out of their wing. Somehow, he had managed to
|
|||
|
work his way into the building, and had suavely ingratiated himself into a
|
|||
|
bedroom, where he had engaged a swinging airline ticket-agent in a long and
|
|||
|
most informative conversation about the security of airport computer terminals.
|
|||
|
The ticket agent's wife, at the time, was sprawled on the bed engaging in
|
|||
|
desultory oral sex with a third gentleman. It transpired that she herself did
|
|||
|
a lot of work on LOTUS 1-2-3. She was thrilled to hear that the program's
|
|||
|
inventor, Mitch Kapor, had been in that very hotel, that very weekend.
|
|||
|
|
|||
|
Mitch Kapor. Right over there? Here in St Louis? Wow.
|
|||
|
|
|||
|
Isn't life strange.
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
CyberView '91 Guest List
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Those known best by handles: Those not:
|
|||
|
|
|||
|
Bill From RNOC / Circuit / The Conflict / Dead Lord Dorothy Denning
|
|||
|
Dispater / Doc Holiday / Dr. Williams / Cheap Shades Michael Godwin
|
|||
|
Crimson Death / Erik Bloodaxe / Forest Ranger / Gomez Brad Hicks
|
|||
|
Jester Sluggo / J.R. "Bob" Dobbs / Knight Lightning Mitch Kapor
|
|||
|
Malefactor / Mr. Fido / Ninja Master / Pain Hertz Bruce Sterling
|
|||
|
Phantom Phreaker / Predat0r / Psychotic Surfer of C&P
|
|||
|
Racer X / Rambone / The Renegade / Seth 2600 / Taran King
|
|||
|
Tuc <Tuc gets his own line just because he is cool!>
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue Thirty-Three, File 11 of 13
|
|||
|
|
|||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|||
|
PWN PWN
|
|||
|
PWN Phrack World News PWN
|
|||
|
PWN PWN
|
|||
|
PWN Issue XXXIII / Part One PWN
|
|||
|
PWN PWN
|
|||
|
PWN Compiled by Crimson Death PWN
|
|||
|
PWN PWN
|
|||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|||
|
|
|||
|
|
|||
|
Sir Hackalot Raided By Georgia State Police
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
"They were pretty pissed because they didn't find anything on me."
|
|||
|
|
|||
|
Those were Sir Hackalot's remarks to Crimson Death shortly after his run
|
|||
|
in with the authorities. Sir Hackalot was raided by Georgia State Police in
|
|||
|
connection with Computer Fraud. The odd thing about it is that Sir Hackalot
|
|||
|
has been inactive for over a year and no real evidence was shown against him.
|
|||
|
They just came in and took his equipment. Although Sir Hackalot was not not
|
|||
|
arrested, he was questioned about three other locals bbs users who later found
|
|||
|
themselves receiving a visit the same day. Sir Hackalot is currently waiting
|
|||
|
for his equipment to be returned.
|
|||
|
|
|||
|
Could this recent raid have anything to do with the infamous seizure of
|
|||
|
Jolnet Public Access Unix from Lockport, Illinois in connection with the Phrack
|
|||
|
E911 case? Sir Hackalot was a user on the system and in the mindset of today's
|
|||
|
law enforcement community, that may well be enough for them to justify their
|
|||
|
recent incursion of SH's civil rights.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
Square Deal for Cable Pirates
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
by David Hartshorn
|
|||
|
|
|||
|
National Programming Service has signed an agreement with 12 programmers
|
|||
|
representing 18 channel for an early conversion package for consumers with
|
|||
|
illegally modified VideoCipher II modules. The deal will be offered only to
|
|||
|
customers who convert their modified VideoCipher II modules to VC II Plus
|
|||
|
Consumer Security Protection Program (CSPP) modules. The program will be an
|
|||
|
option to NPS' current five-service minimum purchase required for conversion
|
|||
|
customers.
|
|||
|
|
|||
|
Participating programmers have agreed to offer complimentary programming
|
|||
|
through the end of 1991 for conversion customers. To qualify, customers must
|
|||
|
buy an annual subscription which will start on January 1, 1992 and run though
|
|||
|
December 31, 1992. Any additional programming customers want to buy will start
|
|||
|
on the day they convert and will run for 12 consecutive months.
|
|||
|
|
|||
|
NPS president Mike Schroeder said the objective of the program is to get
|
|||
|
people paying legally for programming from the ranks of those who are not. If
|
|||
|
a customer keeps his modified unit, he will be spending at least $600 for a new
|
|||
|
module in late 1992, plus programming, when he will be forced to convert due to
|
|||
|
a loss of audio in his modified unit. If a customer converts now to a VC II
|
|||
|
Plus with MOM (Videopal), then the net effective cost to the customer will be
|
|||
|
only $289.55 (figuring a $105 programming credit from Videopal and about $90
|
|||
|
complimentary programming).
|
|||
|
|
|||
|
Included in the deal are ABC, A&E, Bravo, CBS, Discovery Channel, Family
|
|||
|
Channel, NBC, Lifetime, Prime Network, PrimeTime 24, TNN, USA Network, WPIX,
|
|||
|
WSBK, and WWOR. The package will retail for $179.99.
|
|||
|
|
|||
|
Details: (800)444-3474
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
Clark Development Systems Gets Tough
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
by Crimson Death (Sysop of Free Speech BBS)
|
|||
|
|
|||
|
Most of you have heard of PC-Board BBS software, but what you may not have
|
|||
|
heard is what Clark Development Systems are trying to do with people running
|
|||
|
illegal copies of his software. The Following messages appeared on Salt Air
|
|||
|
BBS, which is the support BBS for PC-Board registered owners.
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
Date: 08-19-91 (11:21) Number: 88016 of 88042
|
|||
|
To: ALL Refer#: NONE
|
|||
|
>From: FRED CLARK Read: HAS REPLIES
|
|||
|
Subj: WARNING Status: PUBLIC MESSAGE
|
|||
|
Conf: SUPPORT (1) Read Type: GENERAL (A) (+)
|
|||
|
|
|||
|
********************************** WARNING **********************************
|
|||
|
|
|||
|
Due to the extent and nature of a number of pirate PCBoard systems which have
|
|||
|
been identified around the US and Canada, we are now working closely with
|
|||
|
several other software manufacturers through the SPA (Software Publisher's
|
|||
|
Association) in order to prosecute these people. Rather than attempting to
|
|||
|
prosecute them solely through our office and attorney here in Salt Lake, we
|
|||
|
will now be taking advantage of the extensive legal resources of the SPA to
|
|||
|
investigate and shut down these systems. Since a single copyright violation
|
|||
|
will be prosecuted to the full extent of $50,000 per infringement, a number of
|
|||
|
these pirates are in for a big surprise when the FBI comes knocking on their
|
|||
|
door. Please note that the SPA works closely with the FBI in the prosecution
|
|||
|
of these individuals since their crimes are involved with trafficking over
|
|||
|
state lines.
|
|||
|
|
|||
|
The SPA is now working closely with us and the information we have concerning
|
|||
|
the illegal distribution of our and other software publisher's wares. Please
|
|||
|
do not allow yourself to become involved with these people as you may also be
|
|||
|
brought into any suits and judgements won against them.
|
|||
|
|
|||
|
We are providing this information as reference only and are not pointing a
|
|||
|
finger at any one specific person or persons who are accessing this system.
|
|||
|
This message may be freely distributed.
|
|||
|
|
|||
|
Fred Clark
|
|||
|
President
|
|||
|
Clark Development Company, Inc.
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
Date: 08-19-91 (08:28) Number: 47213 of 47308
|
|||
|
To: AL LAWRENCE Refer#: NONE
|
|||
|
>From: DAVID TERRY Read: NO
|
|||
|
Subj: BETA CODE IS NOW OFFLINE Status: RECEIVER ONLY
|
|||
|
|
|||
|
|
|||
|
PLEASE NOTE! (This message is addressed to ALL!)
|
|||
|
|
|||
|
The beta code is now offline and may be offline for a couple of days. After
|
|||
|
finding a program which cracks PCBoard's registration code I have taken the
|
|||
|
beta code offline so that I can finish up work on the other routines I've been
|
|||
|
working on which will not be cracked so easily. I'm sorry if the removal
|
|||
|
inconveniences anyone. However, it's quite obvious that SOMEONE HERE leaked
|
|||
|
the beta code to a hacker otherwise the hacker could not have worked on
|
|||
|
breaking the registration code.
|
|||
|
|
|||
|
I'm sorry that the few inconsiderates have to make life difficult for the rest
|
|||
|
of you (and us). If that's the way the game is played, so be it.
|
|||
|
|
|||
|
P.S. -- We've found a couple of large pirate boards (who we have not notified)
|
|||
|
who should expect to see the FBI show up on their doorstep in the not
|
|||
|
too distant future. Pass the word along. If people want to play rough
|
|||
|
then we'll up the ante a bit ... getting out of jail won't be cheap!
|
|||
|
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
|
|||
|
|
|||
|
Seems to me they are trying to scare everyone. I think the FBI has
|
|||
|
better things to do than go around catching System Operators who didn't
|
|||
|
purchase PC-Board. At least I hope they do. First they put in a key that was
|
|||
|
needed to run the beta version of PCB and you could only get it by typing
|
|||
|
REGISTER on Salt Air, it would then encrypt your name and give you the key so
|
|||
|
you could register you beta. Expiration date were also implemented into the
|
|||
|
beta code of 14.5a, but the first day this was released on Salt Air, pirates
|
|||
|
already designed a program to make your own key with any name you wanted. It
|
|||
|
appears that with this "new" technique that Clark Systems are trying failed
|
|||
|
too. As it is cracked already also. Maybe they should be more concerned on
|
|||
|
how PC-Board functions as a BBS rather than how to make it crack-proof. As
|
|||
|
most pirate system don't run PC-Board anyway!
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
Georgia's New Area Code
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Telephone use in Georgia has increased so rapidly -- caused by increased
|
|||
|
population and the use of services like fax machines and mobile telephones that
|
|||
|
they are running out of telephone numbers.
|
|||
|
|
|||
|
Southern <Fascist> Bell will establish a new area code -- 706 -- in
|
|||
|
Georgia in May 1992. The territory currently designated by the 404 area code
|
|||
|
will be split.
|
|||
|
|
|||
|
Customers in the Atlanta Metropolitan local calling area will continue to
|
|||
|
use the 404 area code. Customers outside the Atlanta Metropolitan toll free
|
|||
|
calling area will use the 706 area code. The 912 area code (South Georgia)
|
|||
|
will not be affected by this change.
|
|||
|
|
|||
|
They realize the transition to a new area code will take some getting used
|
|||
|
to. So, between May 3, 1992 and August 2, 1992, you can dial EITHER 706 or 404
|
|||
|
to reach numbers in the new area. After August 2, 1992, the use of the 706
|
|||
|
area code is required.
|
|||
|
|
|||
|
They announced the the new area code far in advance to allow customers to
|
|||
|
plan for the change.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
Unplug July 20, 1991
|
|||
|
~~~~~~
|
|||
|
>From AT&T Newsbriefs (and contributing sources; the San Francisco Chronicle
|
|||
|
(7/20/91, A5) and the Dallas Times Herald (7/20/91, A20)
|
|||
|
|
|||
|
A prankster who intercepted and rerouted confidential telephone messages
|
|||
|
from voice mail machines in City Hall <of Houston, Texas> prompted officials to
|
|||
|
pull the plug on the phone system. The city purchased the high-tech telephone
|
|||
|
system in 1986 for $28 million. But officials forget to require each worker to
|
|||
|
use a password that allows only that worker to retrieve or transfer voice
|
|||
|
messages from their "phone mailboxes," said AT&T spokesman Virgil Wildey. As a
|
|||
|
result, Wildey said, someone who understands the system can transfer messages
|
|||
|
around, creating chaos.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
The Bust For Red October
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
By Stickman, Luis Cipher, Orion, Haywire, Sledge, and Kafka Kierkegaard
|
|||
|
|
|||
|
At 8:00 AM on August 7, 1991 in Walnut Creek, California the house of
|
|||
|
Steven Merenko, alias Captain Ramius, was raided by Novell attorneys
|
|||
|
occompanied by five federal marshals. All of his computer equipment was
|
|||
|
confiscated by the Novell attorneys; including disks, tape backups, and all
|
|||
|
hardware.
|
|||
|
|
|||
|
Novell officials had filed an affidavit in the United States District
|
|||
|
Court for the Northern District of California. They charge Merenko had
|
|||
|
illegally distributing Novell NetWare files.
|
|||
|
|
|||
|
A Novell investigator logged on to Merenko's BBS as a regular user 11
|
|||
|
times over a period of a several months. He uploaded a piece of commercial
|
|||
|
software from another company, with the company's permission, in order to gain
|
|||
|
credibility and eventually download a file part of Novell NetWare 386 v3.11,
|
|||
|
which with a full-blown installation costs more than $10,000.
|
|||
|
|
|||
|
Novell issued a Civil suit against The Red October BBS, and because of
|
|||
|
that Merenko will not go to jail if he is found guilty of letting other people
|
|||
|
download any copyrighted or commercial software. The maximum penalty in a
|
|||
|
civil case as this one is $100,000 per work infringed.
|
|||
|
|
|||
|
The Red October BBS was THG/TSAN/NapE Site with four nodes, 4 gigabytes of
|
|||
|
hard drive space online and had been running for four years.
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
Novell's Anti-Piracy Rampage
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Novell's raid on the Red October BBS on August 7, 1991 is the latest in a
|
|||
|
two-year ongoing anti-piracy venture. In the same week as the Red October
|
|||
|
bust, the original Wishlist BBS in Redondo Beach, California was also raided.
|
|||
|
Last April (1991), Novell sued seven resellers in five states that were accused
|
|||
|
of illegally selling NetWare. In the fall of last year they seized the
|
|||
|
computer equipment of two men in Tennessee accused of reselling NetWare over
|
|||
|
BBSs. According to David Bradford, senior vice president and general counsel
|
|||
|
at Novell and chairman of the Copyright Protection Fund of the Software
|
|||
|
Publisher's Association, the crackdown on software piracy has paid off.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
Lottery May Use Nintendo As Another Way To Play September 1, 1991
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Taken from Minneapolis Star Tribune (Section B)
|
|||
|
|
|||
|
"Several kinks have yet to be worked out."
|
|||
|
|
|||
|
Minnesota gamblers soon could be winning jackpots as early as 1993 from
|
|||
|
the comfort of their own living rooms. The state will begin testing a new
|
|||
|
system next summer that will allow gamblers to pick numbers and buy tickets at
|
|||
|
home by using a Nintendo control deck. The system, to be created by the state
|
|||
|
and Control Data Corporation, would be somewhat similar to banking with an
|
|||
|
automated teller machine card. Gamblers would use a Nintendo control deck and
|
|||
|
a state lottery cartridge. The cartridge would be connected by phone to the
|
|||
|
lottery's computer system, allowing players to pick Lotto America, Daily 3 and
|
|||
|
Gopher 5 numbers, and play the instant cash games. Players would gain access
|
|||
|
to the system by punching in personal security codes or passwords. Incorrect
|
|||
|
passwords would be rejected. Only adults would be allowed to play.
|
|||
|
|
|||
|
A number of kinks, including setting up a pay-in-advance system for
|
|||
|
players to draw on, computer security and adult registration, must be worked
|
|||
|
out. 32% of Minnesota households have Nintendo units. About half of those who
|
|||
|
use the units are older than 18. Those chosen to participate in the summer
|
|||
|
experiment will be given a Nintendo control deck, phone modem and lottery
|
|||
|
cartridge.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
15,000 Cuckoo Letters September 8, 1991
|
|||
|
~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Reprinted from RISKS Digest
|
|||
|
>From: Cliff Stoll
|
|||
|
|
|||
|
In 1989, I wrote, "The Cuckoo's Egg", the true story of how we tracked
|
|||
|
down a computer intruder. Figuring that a few people might wish to communicate
|
|||
|
with me, I included my e-mail address in the book's forward.
|
|||
|
|
|||
|
To my astonishment, it became a bestseller and I've received a tidal wave
|
|||
|
of e-mail. In 2 years, about 15,000 letters have arrived over four networks
|
|||
|
(Internet, Genie, Compuserve, and AOL). This suggests that about 1 to 3
|
|||
|
percent of readers send e-mail.
|
|||
|
|
|||
|
I've been amazed at the diversity of the questions and comments: ranging
|
|||
|
from comments on my use of "hacker" to improved chocolate chip cookie recipes.
|
|||
|
Surprisingly, very few flames and insulting letters arrived - a few dozen or
|
|||
|
so.
|
|||
|
|
|||
|
I've tried to answer each letter individually; lately I've created a few
|
|||
|
macros to answer the most common questions. About 5% of my replies bounce, I
|
|||
|
wonder how many people don't get through.
|
|||
|
|
|||
|
I'm happy to hear from people; it's a gas to realize how far the book's
|
|||
|
reached (letters from Moscow, the South Pole, Finland, Japan, even Berkeley);
|
|||
|
but I'm going to spend more time doing astronomy and less time answering mail.
|
|||
|
|
|||
|
Cheers, Cliff Stoll cliff@cfa.harvard.edu
|
|||
|
stoll@ocf.berkeley.edu
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue Thirty-Three, File 12 of 13
|
|||
|
|
|||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|||
|
PWN PWN
|
|||
|
PWN Phrack World News PWN
|
|||
|
PWN PWN
|
|||
|
PWN Issue XXXIII / Part Two PWN
|
|||
|
PWN PWN
|
|||
|
PWN Compiled by Dispater PWN
|
|||
|
PWN PWN
|
|||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|||
|
|
|||
|
|
|||
|
Legion of Doom Goes Corporate
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
The following is a compilation of several articles from by Michael
|
|||
|
Alexander of ComputerWorld Magazine about Comsec Data Security, Inc.
|
|||
|
|
|||
|
Comsec Data Security, Inc.
|
|||
|
|
|||
|
Chris Goggans a/k/a Erik Bloodaxe 60 Braeswood Square
|
|||
|
Scott Chasin a/k/a Doc Holiday Houston, Texas 77096
|
|||
|
Kenyon Shulman a/k/a Malefactor (713)721-6500
|
|||
|
Robert Cupps - Not a former computer hacker (713)721-6579 FAX
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
Hackers Promote Better Image (Page 124) June 24, 1991
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
HOUSTON -- Three self-professed members of the Legion of Doom, one of the
|
|||
|
most notorious computer hacker groups to operate in the United States, said
|
|||
|
they now want to get paid for their skills. Along with a former securities
|
|||
|
trader, the members launched a computer security firm called Comsec Data
|
|||
|
Security that will show corporations how to keep hackers out.
|
|||
|
|
|||
|
"We have been in the computer security business for the last 11 years --
|
|||
|
just on the different end of the stick," said Scott Chasin who said he once
|
|||
|
used the handle Doc Holiday as a Legion of Doom member. The group has been
|
|||
|
defunct since late last year, Chasin said.
|
|||
|
|
|||
|
The start-up firm plans to offer systems penetration testing, auditing,
|
|||
|
and training services as well as security products. "We have information that
|
|||
|
you can't buy in bookstores: We know why hackers hack, what motivates them,
|
|||
|
why they are curious," Chasin said.
|
|||
|
|
|||
|
Already, the start-up has met with considerable skepticism.
|
|||
|
|
|||
|
"Would I hire a safecracker to be a security guy at my bank?" asked John
|
|||
|
Blackley, information security administrator at Capitol Holding Corporation in
|
|||
|
Louisville, Kentucky. "If they stayed straight for 5 to 10 years, I might
|
|||
|
reconsider, but 12 to 18 months ago, they were hackers, and now they have to
|
|||
|
prove themselves."
|
|||
|
|
|||
|
"You don't hire ne'er-do-wells to come and look at your system," said Tom
|
|||
|
Peletier, an information security specialist at General Motors Corporation.
|
|||
|
"The Legion of Doom is a known anti-establishment group, and although it is
|
|||
|
good to see they have a capitalist bent, GM would not hire these people."
|
|||
|
|
|||
|
Comsec already has three contracts with Fortune 500 firms, Chasin said.
|
|||
|
|
|||
|
"I like their approach, and I am assuming they are legit," said Norman
|
|||
|
Sutton, a security consultant at Leemah Datacom Corporation in Hayward,
|
|||
|
California. His firm is close to signing a distribution pact with Comsec,
|
|||
|
Sutton said.
|
|||
|
|
|||
|
Federal law enforcers have described the Legion of Doom in indictments,
|
|||
|
search warrants, and other documents as a closely knit group of about 15
|
|||
|
computer hackers whose members rerouted calls, stole and altered data and
|
|||
|
disrupted telephone service by entering telephone switches, among other
|
|||
|
activities.
|
|||
|
|
|||
|
The group was founded in 1984 and has had dozens of members pass through
|
|||
|
its ranks. Approximately 12 former members have been arrested for computer
|
|||
|
hacking-related crimes; three former members are now serving jail sentences;
|
|||
|
and at least three others are under investigation. None of the Comsec founders
|
|||
|
have been charged with a computer-related crime.
|
|||
|
|
|||
|
(Article includes a color photograph of all four founding members of Comsec)
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
An Offer You Could Refuse? (Page 82) July 1, 1991
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Tom Peletier, an information security specialist at General Motors in
|
|||
|
Detroit, says he would never hire Comsec Data Security, a security consulting
|
|||
|
firm launched by three ex-members of the Legion of Doom. "You don't bring in
|
|||
|
an unknown commodity and give them the keys to the kingdom," Peletier said.
|
|||
|
Chris Goggans, one of Comsec's founders, retorted: "We don't have the keys to
|
|||
|
their kingdom, but I know at least four people off the top of my head that do."
|
|||
|
Comsec said it will do a free system penetration for GM just to prove the
|
|||
|
security firm's sincerity, Goggans said. "All they have to do is sign a
|
|||
|
release form saying they won't prosecute."
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
Group Dupes Security Experts (Page 16) July 29, 1991
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
"Houston-Based Comsec Fools Consultants To Gather Security Information"
|
|||
|
|
|||
|
HOUSTON -- Computer security consultants are supposed to know better, but
|
|||
|
at least six experts acknowledged last week that they were conned. The
|
|||
|
consultants said they were the victims of a bit of social engineering by Comsec
|
|||
|
Data Security, Inc., a security consulting firm recently launched.
|
|||
|
|
|||
|
Comsec masqueraded as a prospective customer using the name of Landmark
|
|||
|
Graphics Corporation, a large Houston-area software publisher, to gather
|
|||
|
information on how to prepare business proposals and conduct security audits
|
|||
|
and other security industry business techniques, the consultants said.
|
|||
|
|
|||
|
Three of Comsec's four founders are self-professed former members of the
|
|||
|
Legion of Doom, one of the nation's most notorious hacker groups, according to
|
|||
|
law enforcers.
|
|||
|
|
|||
|
"In their press release, they say, 'Our firm has taken a unique approach
|
|||
|
to its sales strategy,'" said one consultant who requested anonymity, citing
|
|||
|
professional embarrassment. "Well, social engineering is certainly a unique
|
|||
|
sales strategy."
|
|||
|
|
|||
|
Social engineering is a technique commonly used by hackers to gather
|
|||
|
information from helpful, but unsuspecting employees that may be used to
|
|||
|
penetrate a computer system.
|
|||
|
|
|||
|
"They are young kids that don't know their thumbs from third base about
|
|||
|
doing business, and they are trying to glean that from everybody else," said
|
|||
|
Randy March, director of consulting at Computer Security Consultants, Inc., in
|
|||
|
Ridgefield, Connecticut.
|
|||
|
|
|||
|
The consultants said gathering information by posing as a prospective
|
|||
|
customer is a common ploy, but that Comsec violated accepted business ethics by
|
|||
|
posing as an actual company.
|
|||
|
|
|||
|
"It is a pretty significant breech of business ethics to make the
|
|||
|
misrepresentation that they did," said Hardie Morgan, chief financial officer
|
|||
|
at Landmark Graphics. "They may not be hacking anymore, but they haven't
|
|||
|
changed the way they operate."
|
|||
|
|
|||
|
Morgan said his firm had received seven or eight calls from security
|
|||
|
consultants who were following up on information they had sent to "Karl
|
|||
|
Stevens," supposedly a company vice president.
|
|||
|
|
|||
|
SAME OLD STORY
|
|||
|
|
|||
|
The consultants all told Morgan the same tale: They had been contacted by
|
|||
|
"Stevens," who said he was preparing to conduct a security audit and needed
|
|||
|
information to sell the idea to upper management. "Stevens" had asked the
|
|||
|
consultants to prepare a detailed proposal outlining the steps of a security
|
|||
|
audit, pricing and other information.
|
|||
|
|
|||
|
The consultants had then been instructed to send the information by
|
|||
|
overnight mail to a Houston address that later proved to be the home of two of
|
|||
|
Comsec's founders. In some instances, the caller had left a telephone number
|
|||
|
that when called was found to be a constantly busy telephone company test
|
|||
|
number.
|
|||
|
|
|||
|
Morgan said "Stevens" had an intimate knowledge of the company's computer
|
|||
|
systems that is known only to a handful of employees. While there is no
|
|||
|
evidence that the company's systems were penetrated by outsiders, Landmark is
|
|||
|
"battering down its security hatches," Morgan said.
|
|||
|
|
|||
|
Posing as a prospective customer is not an uncommon way to gather
|
|||
|
competitive information, said Chris Goggans, one of Comsec's founders, who once
|
|||
|
used the handle of Erik Bloodaxe.
|
|||
|
|
|||
|
"Had we not been who we are, it would be a matter of no consequence,"
|
|||
|
Goggans said.
|
|||
|
|
|||
|
"They confirm definitely that they called some of their competitors," said
|
|||
|
Michael Cash, an attorney representing Comsec. "The fact they used Landmark
|
|||
|
Graphics was an error on their part, but it was the first name that popped into
|
|||
|
their heads. They did not infiltrate Landmark Graphics in any way."
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
"LEGION OF DOOM--INTERNET WORLD TOUR" T-SHIRTS!
|
|||
|
|
|||
|
Now you too can own an official Legion of Doom T-shirt. This is the same
|
|||
|
shirt that sold-out rapidly at the "Cyberview" hackers conference in St. Louis.
|
|||
|
Join the other proud owners such as award-winning author Bruce Sterling by
|
|||
|
adding this collector's item to your wardrobe. This professionally made, 100
|
|||
|
percent cotton shirt is printed on both front and back. The front displays
|
|||
|
"Legion of Doom Internet World Tour" as well as a sword and telephone
|
|||
|
intersecting the planet earth, skull-and-crossbones style. The back displays
|
|||
|
the words "Hacking for Jesus" as well as a substantial list of "tour-stops"
|
|||
|
(internet sites) and a quote from Aleister Crowley. This T-shirt is sold only
|
|||
|
as a novelty item, and is in no way attempting to glorify computer crime.
|
|||
|
|
|||
|
Shirts are only $15.00, postage included! Overseas add an additional $5.00.
|
|||
|
Send check or money-order (No CODs, cash or credit cards--even if it's really
|
|||
|
your card :-) made payable to Chris Goggans to:
|
|||
|
|
|||
|
Chris Goggans
|
|||
|
5300 N. Braeswood #4
|
|||
|
Suite 181
|
|||
|
Houston, TX 77096
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
Steve Jackson Games v. United States of America
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Articles reprinted from Effector Online 1.04 and 1.08
|
|||
|
May 1, 1991 / August 24, 1991
|
|||
|
|
|||
|
"Extending the Constitution to American Cyberspace"
|
|||
|
|
|||
|
To establish constitutional protection for electronic media and to obtain
|
|||
|
redress for an unlawful search, seizure, and prior restraint on publication,
|
|||
|
Steve Jackson Games and the Electronic Frontier Foundation filed a civil suit
|
|||
|
against the United States Secret Service and others.
|
|||
|
|
|||
|
On March 1, 1990, the United States Secret Service nearly destroyed Steve
|
|||
|
Jackson Games (SJG), an award-winning publishing business in Austin, Texas.
|
|||
|
|
|||
|
In an early morning raid with an unlawful and unconstitutional warrant,
|
|||
|
agents of the Secret Service conducted a search of the SJG office. When they
|
|||
|
left they took a manuscript being prepared for publication, private electronic
|
|||
|
mail, and several computers, including the hardware and software of the SJG
|
|||
|
Computer Bulletin Board System. Yet Jackson and his business were not only
|
|||
|
innocent of any crime, but never suspects in the first place. The raid had
|
|||
|
"been staged on the unfounded suspicion that somewhere in Jackson's office
|
|||
|
there "might be" a document compromising the security of the 911 telephone
|
|||
|
system.
|
|||
|
|
|||
|
In the months that followed, Jackson saw the business he had built up over
|
|||
|
many years dragged to the edge of bankruptcy. SJG was a successful and
|
|||
|
prestigious publisher of books and other materials used in adventure
|
|||
|
role-playing games. Jackson also operated a computer bulletin board system
|
|||
|
(BBS) to communicate with his customers and writers and obtain feedback and
|
|||
|
suggestions on new gaming ideas. The bulletin board was also the repository of
|
|||
|
private electronic mail belonging to several of its users. This private mail
|
|||
|
was seized in the raid. Despite repeated requests for the return of his
|
|||
|
manuscripts and equipment, the Secret Service has refused to comply fully.
|
|||
|
|
|||
|
More than a year after that raid, the Electronic Frontier Foundation,
|
|||
|
acting with SJG owner Steve Jackson, has filed a precedent setting civil suit
|
|||
|
against the United States Secret Service, Secret Service Agents Timothy Foley
|
|||
|
and Barbara Golden, Assistant United States Attorney William Cook, and Henry
|
|||
|
Kluepfel.
|
|||
|
|
|||
|
"This is the most important case brought to date," said EFF general
|
|||
|
counsel Mike Godwin, "to vindicate the Constitutional rights of the users of
|
|||
|
computer-based communications technology. It will establish the Constitutional
|
|||
|
dimension of electronic expression. It also will be one of the first cases
|
|||
|
that invokes the Electronic Communications Privacy Act as a shield and not as a
|
|||
|
sword -- an act that guarantees users of this digital medium the same privacy
|
|||
|
protections enjoyed by those who use the telephone and the U.S. Mail."
|
|||
|
|
|||
|
Commenting on the overall role of the Electronic Frontier Foundation in
|
|||
|
this case and other matters, EFF's president Mitch Kapor said, "We have been
|
|||
|
acting as an organization interested in defending the wrongly accused. But the
|
|||
|
Electronic Frontier Foundation is also going to be active in establishing
|
|||
|
broader principles. We begin with this case, where the issues are clear. But
|
|||
|
behind this specific action, the EFF also believes that it is vital that
|
|||
|
government, private entities, and individuals who have violated the
|
|||
|
Constitutional rights of individuals be held accountable for their actions. We
|
|||
|
also hope this case will help demystify the world of computer users to the
|
|||
|
general public and inform them about the potential of computer communities."
|
|||
|
|
|||
|
Representing Steve Jackson and the Electronic Frontier Foundation in this
|
|||
|
suit are Harvey A. Silverglate and Sharon L. Beckman of Silverglate & Good of
|
|||
|
Boston; Eric Lieberman and Nick Poser of Rabinowitz, Boudin, Standard, Krinsky
|
|||
|
& Lieberman of New York; and James George, Jr. of Graves, Dougherty, Hearon &
|
|||
|
Moody of Austin, Texas.
|
|||
|
|
|||
|
Copies of the complaint, the unlawful search warrant, statements by Steve
|
|||
|
Jackson and the Electronic Frontier Foundation, a legal fact sheet and other
|
|||
|
pertinent materials are available by request from the EFF.
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
Also made available to members of the press and electronic media on
|
|||
|
request were the following statement by Mitchell Kapor and a legal fact sheet
|
|||
|
prepared by Sharon Beckman and Harvey Silverglate of Silverglate & Good, the
|
|||
|
law firm central to the filing of this lawsuit.
|
|||
|
|
|||
|
"Why the Electronic Frontier Foundation Is
|
|||
|
Bringing Suit On Behalf of Steve Jackson"
|
|||
|
|
|||
|
With this case, the Electronic Frontier Foundation begins a new phase of
|
|||
|
affirmative legal action. We intend to fight for broad Constitutional
|
|||
|
protection for operators and users of computer bulletin boards.
|
|||
|
|
|||
|
It is essential to establish the principle that computer bulletin boards
|
|||
|
and computer conferencing systems are entitled to the same First Amendment
|
|||
|
rights enjoyed by other media. It is also critical to establish that operators
|
|||
|
of bulletin boards -- whether individuals or businesses -- are not subject to
|
|||
|
unconstitutional, overbroad searches and seizures of any of the contents of
|
|||
|
their systems, including electronic mail.
|
|||
|
|
|||
|
The Electronic Frontier Foundation also believes that it is vital to hold
|
|||
|
government, private entities, and individuals who have violated the
|
|||
|
Constitutional rights of others accountable for their actions.
|
|||
|
|
|||
|
Mitchell Kapor,
|
|||
|
President, The Electronic Frontier Foundation
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
"Legal Fact Sheet: Steve Jackson Games v. United States Secret Service, et al"
|
|||
|
|
|||
|
This lawsuit seeks to vindicate the rights of a small, successful
|
|||
|
entrepreneur/publisher to conduct its entirely lawful business, free of
|
|||
|
unjustified governmental interference. It is also the goal of this litigation
|
|||
|
to firmly establish the principle that lawful activities carried out with the
|
|||
|
aid of computer technology, including computer communications and publishing,
|
|||
|
are entitled to the same constitutional protections that have long been
|
|||
|
accorded to the print medium. Computers and modems, no less than printing
|
|||
|
presses, typewriters, the mail, and telephones -being the methods selected by
|
|||
|
Americans to communicate with one another -- are all protected by our
|
|||
|
constitutional rights.
|
|||
|
|
|||
|
Factual Background and Parties:
|
|||
|
|
|||
|
Steve Jackson, of Austin, Texas, is a successful small businessman. His
|
|||
|
company, Steve Jackson Games, is an award- winning publisher of adventure games
|
|||
|
and related books and magazines. In addition to its books and magazines, SJG
|
|||
|
operates an electronic bulletin board system (the Illuminati BBS) for its
|
|||
|
customers and for others interested in adventure games and related literary
|
|||
|
genres.
|
|||
|
|
|||
|
Also named as plaintiffs are various users of the Illuminati BBS. The
|
|||
|
professional interests of these users range from writing to computer
|
|||
|
technology.
|
|||
|
|
|||
|
Although neither Jackson nor his company were suspected of any criminal
|
|||
|
activity, the company was rendered a near fatal blow on March 1, 1990, when
|
|||
|
agents of the United States Secret Service, aided by other law enforcement
|
|||
|
officials, raided its office, seizing computer equipment necessary to the
|
|||
|
operation of its publishing business. The government seized the Illuminati BBS
|
|||
|
and all of the communications stored on it, including private electronic mail,
|
|||
|
shutting down the BBS for over a month. The Secret Service also seized
|
|||
|
publications protected by the First Amendment, including drafts of the
|
|||
|
about-to-be-released role playing game book GURPS Cyberpunk. The publication
|
|||
|
of the book was substantially delayed while SJG employees rewrote it from older
|
|||
|
drafts. This fantasy game book, which one agent preposterously called "a
|
|||
|
handbook for computer crime," has since sold over 16,000 copies and been
|
|||
|
nominated for a prestigious game industry award. No evidence of criminal
|
|||
|
activity was found.
|
|||
|
|
|||
|
The warrant application, which remained sealed at the government's request
|
|||
|
for seven months, reveals that the agents were investigating an employee of the
|
|||
|
company whom they believed to be engaged in activity they found questionable at
|
|||
|
his home and on his own time. The warrant application further reveals not only
|
|||
|
that the Secret Service had no reason to think any evidence of criminal
|
|||
|
activity would be found at SJG, but also that the government omitted telling
|
|||
|
the Magistrate who issued the warrant that SJG was a publisher and that the
|
|||
|
contemplated raid would cause a prior restraint on constitutionally protected
|
|||
|
speech, publication, and association.
|
|||
|
|
|||
|
The defendants in this case are the United States Secret Service and the
|
|||
|
individuals who, by planning and carrying out this grossly illegal search and
|
|||
|
seizure, abused the power conferred upon them by the federal government. Those
|
|||
|
individuals include Assistant United States Attorney William J. Cook, Secret
|
|||
|
Service Agents Timothy M. Foley and Barbara Golden, as well Henry M. Kluepfel
|
|||
|
of Bellcore, who actively participated in the unlawful activities as an agent
|
|||
|
of the federal government.
|
|||
|
|
|||
|
These defendants are the same individuals and entities responsible for the
|
|||
|
prosecution last year of electronic publisher Craig Neidorf. The government in
|
|||
|
that case charged that Neidorf's publication of materials concerning the
|
|||
|
enhanced 911 system constituted interstate transportation of stolen property.
|
|||
|
The prosecution was resolved in Neidorf's favor in July of 1990 when Neidorf
|
|||
|
demonstrated that materials he published were generally available to the
|
|||
|
public.
|
|||
|
|
|||
|
Legal Significance:
|
|||
|
|
|||
|
This case is about the constitutional and statutory rights of publishers
|
|||
|
who conduct their activities in electronic media rather than in the traditional
|
|||
|
print and hard copy media, as well as the rights of individuals and companies
|
|||
|
that use computer technology to communicate as well as to conduct personal and
|
|||
|
business affairs generally.
|
|||
|
|
|||
|
The government's wholly unjustified raid on SJG, and seizure of its books,
|
|||
|
magazines, and BBS, violated clearly established statutory and constitutional
|
|||
|
law, including:
|
|||
|
|
|||
|
o The Privacy Protection Act of 1980, which generally prohibits the
|
|||
|
government from searching the offices of publishers for work product and
|
|||
|
other documents, including materials that are electronically stored;
|
|||
|
|
|||
|
o The First Amendment to the U. S. Constitution, which guarantees freedom
|
|||
|
of speech, of the press and of association, and which prohibits the
|
|||
|
government from censoring publications, whether in printed or electronic
|
|||
|
media.
|
|||
|
|
|||
|
o The Fourth Amendment, which prohibits unreasonable governmental searches
|
|||
|
and seizures, including both general searches and searches conducted
|
|||
|
without probable cause to believe that specific evidence of criminal
|
|||
|
activity will be found at the location searched.
|
|||
|
|
|||
|
o The Electronic Communications Privacy Act and the Federal Wiretap
|
|||
|
statute, which together prohibit the government from seizing electronic
|
|||
|
communications without justification and proper authorization.
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
STEVE JACKSON GAMES UPDATE:
|
|||
|
THE GOVERNMENT FILES ITS RESPONSE
|
|||
|
|
|||
|
After several delays, the EFF has at last received the government's response to
|
|||
|
the Steve Jackson Games lawsuit. Our attorneys are going over these documents
|
|||
|
carefully and we'll have more detailed comment on them soon.
|
|||
|
|
|||
|
Sharon Beckman, of Silverglate and Good, one of the leading attorneys in the
|
|||
|
case said:
|
|||
|
|
|||
|
"In general, this response contains no surprises for us. Indeed, it
|
|||
|
confirms that events in this case transpired very much as we thought
|
|||
|
that they did. We continue to have a very strong case. In addition,
|
|||
|
it becomes clearer as we go forward that the Steve Jackson Games case
|
|||
|
will be a watershed piece of litigation when it comes to extending
|
|||
|
constitutional guarantees to this medium."
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
Feds Arrest "Logic Bomber" July 1, 1991
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
by Michael Alexander (ComputerWorld)(Page 10)
|
|||
|
|
|||
|
SAN DIEGO -- Federal agents arrested a disgruntled programmer last week
|
|||
|
for allegedly planting a logic bomb designed to wipe out programs and data
|
|||
|
related to the U.S. government's billion-dollar Atlas Missile program.
|
|||
|
According to law enforcers, the programmer hoped to be rehired by General
|
|||
|
Dynamics Corporation, his former employer and builder of the missile as a
|
|||
|
high-priced consultant to repair the damage.
|
|||
|
|
|||
|
Michael J. Lauffenburger, age 31, who is accused of planting the bomb, was
|
|||
|
arrested after a co-worker accidentally discovered the destructive program on
|
|||
|
April 10, 1991, disarmed it and alerted authorities. Lauffenburger had
|
|||
|
allegedly programmed the logic bomb to go off at 6 p.m. on May 24, 1991 during
|
|||
|
the Memorial Day holiday weekend and then self-destruct.
|
|||
|
|
|||
|
Lauffenburger is charged with unauthorized access of a federal-interest
|
|||
|
computer and attempted computer fraud. If convicted, he could be imprisoned
|
|||
|
for up to 10 years and fined $500,000. Lauffenburger pleaded innocent and was
|
|||
|
released on $10,000 bail.
|
|||
|
|
|||
|
The indictment said that while Lauffenburger was employed at the General
|
|||
|
Dynamics Space Systems Division plant in San Diego, he was the principle
|
|||
|
architect of a database program known as SAS.DB and PTP, which was used to
|
|||
|
track the availability and cost of parts used in building the Atlas missile.
|
|||
|
|
|||
|
On March 20, he created a program called Cleanup that, when executed,
|
|||
|
would have deleted the PTP program, deleted another set of programs used to
|
|||
|
respond to government requests for information, and then deleted itself without
|
|||
|
a trace, according to Mitchell Dembin, the assistant U.S. attorney handling the
|
|||
|
case.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue Thirty-Three, File 13 of 13
|
|||
|
|
|||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|||
|
PWN PWN
|
|||
|
PWN Phrack World News PWN
|
|||
|
PWN PWN
|
|||
|
PWN Issue XXXIII / Part Three PWN
|
|||
|
PWN PWN
|
|||
|
PWN Compiled by Dispater PWN
|
|||
|
PWN PWN
|
|||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|||
|
|
|||
|
|
|||
|
Pentagon Welcomes Hackers! September 9, 1991
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
>From USA Today
|
|||
|
|
|||
|
The FBI is investigating an Israeli teen's claim that he broke into a
|
|||
|
Pentagon computer during the gulf war. An Israeli newspaper Sunday identified
|
|||
|
the hacker as Deri Shraibman, 18. He was arrested in Jerusalem Friday but
|
|||
|
released without being charged. Yedhiot Ahronot said Shraibman read secret
|
|||
|
information on the Patriot missle -- used for the first time in the war to
|
|||
|
destroy Iraq's Scud missles in midflight.
|
|||
|
"Nowhere did it say 'no entry allowed'," Shraibman was quoted as telli
|
|||
|
police. "It just said 'Welcome.'" The Pentagon's response: It takes
|
|||
|
"computer security very seriously," spokesman Air Force Capt. Sam Grizzle said
|
|||
|
Sunday. Analysts say it isn't the first time military computers have been
|
|||
|
entered. "No system of safeguards exists ... that is 100% secure," says Alan
|
|||
|
Sabrosky, professor at Rhodes College in Memphis.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
Telesphere Sued By Creditors; Forced Into Bankruptcy
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Compiled from Telecom Digest (comp.dcom.telecom)
|
|||
|
|
|||
|
On Monday, August 19, Telesphere Communications, Inc. was sued by a group
|
|||
|
of ten creditors who claim the company best known for its 900 service isn't
|
|||
|
paying its bills. The group of creditors, all information providers using 900
|
|||
|
lines provided through Telesphere claim they are owed two million dollars in
|
|||
|
total for services rendered through their party lines, sports reports,
|
|||
|
horoscopes, sexual conversation lines and other services. They claim
|
|||
|
Telesphere has not paid them their commissions due for several months. The
|
|||
|
group of creditors filed in U.S. Bankruptcy Court in Maryland asking that an
|
|||
|
Involuntary Chapter 7 bankruptcy (meaning, liquidation of the company and
|
|||
|
distribution of all assets to creditors) be started against Telesphere.
|
|||
|
|
|||
|
The company said it will fight the effort by creditors to force it into
|
|||
|
bankruptcy. A spokesperson also said the company has already settled with more
|
|||
|
than 50 percent of its information providers who are owed money. Telesphere
|
|||
|
admitted it had a serious cash flow problem, but said this was due to the large
|
|||
|
number of uncollectible bills the local telephone companies are charging back
|
|||
|
to them. When end-users of 900 services do not pay the local telco, the telco
|
|||
|
in turn does not pay the 900 carrier -- in this case Telesphere -- and the
|
|||
|
information provider is charged for the call from a reserve each is required to
|
|||
|
maintain.
|
|||
|
|
|||
|
But the information providers dispute the extent of the uncollectible
|
|||
|
charges. They claim Telesphere has never adequately documented the charges
|
|||
|
placed against them (the information providers) month after month. In at least
|
|||
|
one instance, an information provider filed suit against an end-user for
|
|||
|
non-payment only to find out through deposition that the user HAD paid his
|
|||
|
local telco, and the local telco HAD in turn paid Telesphere. The information
|
|||
|
providers allege in their action against the company that Telesphere was in
|
|||
|
fact paid for many items charged to them as uncollectible, "and apparently are
|
|||
|
using the money to finance other aspects of their operation at the expense of
|
|||
|
one segment of their creditors; namely the information providers..."
|
|||
|
Telesphere denied these allegations.
|
|||
|
|
|||
|
Formerly based here in the Chicago area (in Oak Brook, IL), Telesphere is
|
|||
|
now based in Rockville, MD.
|
|||
|
______________________________________________________________________________
|
|||
|
|
|||
|
Theft of Telephone Service From Corporations Is Surging August 28, 1991
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
by Edmund L. Andrews (New York Times)
|
|||
|
|
|||
|
"It is by far the largest segment of communications fraud," said Rami
|
|||
|
Abuhamdeh, an independent consultant and until recently executive director of
|
|||
|
the Communications Fraud Control Association in McLean, Va. "You have all
|
|||
|
this equipment just waiting to answer your calls, and it is being run by people
|
|||
|
who are not in the business of securing telecommunications."
|
|||
|
|
|||
|
Mitsubishi International Corp. reported losing $430,000 last summer,
|
|||
|
mostly from calls to Egypt and Pakistan. Procter & Gamble Co. lost $300,000 in
|
|||
|
l988. The New York City Human Resources Administration lost $529,000 in l987.
|
|||
|
And the Secret Service, which investigates such telephone crime, says it is now
|
|||
|
receiving three to four formal complaints every week, and is adding more
|
|||
|
telephone specialists.
|
|||
|
|
|||
|
In its only ruling on the issue thus far, the Federal Communications
|
|||
|
Commission decided in May that the long-distance carrier was entitled to
|
|||
|
collect the bill for illegal calls from the company that was victimized. In
|
|||
|
the closely watched Mitsubishi case filed in June, the company sued AT&T for
|
|||
|
$10 million in the U.S. District Court in Manhattan, arguing that not only had
|
|||
|
it made the equipment through which outsiders entered Mitsubishi's phone
|
|||
|
system, but that AT&T, the maker of the switching equipment, had also been paid
|
|||
|
to maintain the equipment.
|
|||
|
|
|||
|
For smaller companies, with fewer resources than Mitsubishi, the problems
|
|||
|
can be financially overwhelming. For example, WRL Group, a small software
|
|||
|
development company in Arlington, Va., found itself charged for 5,470 calls
|
|||
|
it did not make this spring after it installed a toll-free 800 telephone
|
|||
|
number and a voice mail recording system machine to receive incoming calls.
|
|||
|
Within three weeks, the intruders had run up a bill of $106,776 to US
|
|||
|
Sprint, a United Telecommunications unit.
|
|||
|
|
|||
|
In the past, long-distance carriers bore most of the cost, since the
|
|||
|
thefts were attributed to weaknesses in their networks. But now, the phone
|
|||
|
companies are arguing that the customers should be liable for the cost of
|
|||
|
the calls, because they failed to take proper security precautions on their
|
|||
|
equipment.
|
|||
|
|
|||
|
Consumertronics, a mail order company in Alamogordo, N.M., sells brochures
|
|||
|
for $29 that describe the general principles of voice mail hacking and
|
|||
|
the particular weaknesses of different models. Included in the brochure is a
|
|||
|
list of 800 numbers along with the kind of voice mail systems to which they are
|
|||
|
connected. "It's for educational purposes," said the company's owner, John
|
|||
|
Williams, adding that he accepts Mastercard and Visa. Similar insights can be
|
|||
|
obtained from "2600 Magazine", a quarterly publication devoted to telephone
|
|||
|
hacking that is published in Middle Island, N.Y.
|
|||
|
______________________________________________________________________________
|
|||
|
|
|||
|
Proctor & Gamble August 22, 1991
|
|||
|
~~~~~~~~~~~~~~~~
|
|||
|
Compiled from Telecom Digest
|
|||
|
|
|||
|
On 8-12-91, the "Wall Street Journal" published a front page story on an
|
|||
|
investigation by Cincinnati police of phone records following a request by
|
|||
|
Procter & Gamble Co. to determine who might have furnished inside information
|
|||
|
to the "Wall Street Journal". The information, ostensibly published between
|
|||
|
March 1st and June 10th, 1991, prompted P&G to seek action under Ohio's Trade
|
|||
|
Secrets Law. In respect to a possible violation of this law, a Grand Jury
|
|||
|
issued a subpoena for records of certain phone calls placed to the Pittsburgh
|
|||
|
offices of the "Wall Street Journal" from the Cincinnati area, and to the
|
|||
|
residence of a "Wall Street Journal" reporter. By way of context, the
|
|||
|
Pittsburgh offices of the "Wall Street Journal" allegedly were of interest in
|
|||
|
that Journal reporter Alecia Swasy was principally responsible for covering
|
|||
|
Procter & Gamble, and worked out of the Pittsburgh office.
|
|||
|
|
|||
|
On 8-13-91, CompuServe subscriber Ryck Bird Lent related the Journal story
|
|||
|
to other members of CompuServe's TELECOM.ISSUES SIG. He issued the following
|
|||
|
query:
|
|||
|
|
|||
|
"Presumably, the records only show that calls were placed between
|
|||
|
two numbers, there's no content available for inspection. But
|
|||
|
what if CB had voice mail services? And what if the phone number
|
|||
|
investigations lead to online service gateways (MCI MAil, CIS),
|
|||
|
are those also subject to subpoena?"
|
|||
|
|
|||
|
At the time of Mr. Lent's post, it was known that the "Wall Street
|
|||
|
Journal" had alleged a large amount of phone company records had been provided
|
|||
|
by Cincinnati Bell to local police. An exact figure did not appear in Lent's
|
|||
|
comments. Thus, I can't be certain if the Journal published any such specific
|
|||
|
data on 8-12-91 until I see the article in question.
|
|||
|
|
|||
|
On 8-14-91, the Journal published further details on the police
|
|||
|
investigation into possible violation of the Ohio Trade Secrets Law. The
|
|||
|
Journal then asserted that a Grand Jury subpoena was issued and used by the
|
|||
|
Cincinnati Police to order Cincinnati Bell to turn over phone records spanning
|
|||
|
a 15-week period of time, covering 40 million calls placed from the 655 and 257
|
|||
|
prefixes in the 513 area code. The subpoena was issued, according to the "Wall
|
|||
|
Street Journal", only four working days after a June 10th, 1991 article on
|
|||
|
problems in P&G's food and beverage markets.
|
|||
|
|
|||
|
Wednesday [8-14-91], the Associated Press reported that P&G expected no
|
|||
|
charges to be filed under the police investigation into possible violations of
|
|||
|
the Ohio Trade Secrets Law. P&G spokesperson Terry Loftus was quoted to say:
|
|||
|
"It did not produce any results and is in fact winding down". Lotus went on to
|
|||
|
explain that the company happened to "conduct an internal investigation which
|
|||
|
turned up nothing. That was our first step. After we completed that internal
|
|||
|
investigation, we decided to turn it over to the Cincinnati Police Department".
|
|||
|
|
|||
|
Attempts to contact Gary Armstrong, the principal police officer in charge
|
|||
|
of the P&G investigation, by the Associated Press prior to 8-14-91 were
|
|||
|
unsuccessful. No one else in the Cincinnati Police Department would provide
|
|||
|
comment to AP.
|
|||
|
|
|||
|
On 8-15-91, the Associated Press provided a summary of what appeared in
|
|||
|
the 8-14-91 edition of the "Wall Street Journal" on the P&G investigation. In
|
|||
|
addition to AP's summary of the 8-14-91 Journal article, AP also quoted another
|
|||
|
P&G spokesperson -- Sydney McHugh. Ms. McHugh more or less repeated Loftus'
|
|||
|
8-13-91 statement with the following comments: "We advised the local Cincinnati
|
|||
|
Police Department of the matter because we thought it was possible that a crime
|
|||
|
had been committed in violation of Ohio law. They decided to conduct an
|
|||
|
independent investigation."
|
|||
|
|
|||
|
Subsequent to the 8-14-91 article in the Journal, AP had once again
|
|||
|
attempted to reach Officer Gary Armstrong with no success. Prosecutor Arthur
|
|||
|
M. Ney has an unpublished home phone number and was therefore unavailable for
|
|||
|
comment on Wednesday evening [08-14-91], according to AP.
|
|||
|
|
|||
|
In the past few weeks, much has appeared in the press concerning
|
|||
|
allegations that P&G, a local grand jury, and/or Cincinnati Police have found a
|
|||
|
"novel" way to circumvent the First Amendment to the U.S. Constitution. In its
|
|||
|
8-15-91 summary of the 8-14-91 Journal article, AP quoted Cincinnati attorney
|
|||
|
Robert Newman -- specializing in First Amendment issues -- as asserting:
|
|||
|
"There's no reason for the subpoena to be this broad. It's cause for alarm".
|
|||
|
Newman also offered the notion that: "P&G doesn't have to intrude in the lives
|
|||
|
of P&G employees, let alone everyone else".
|
|||
|
|
|||
|
The same AP story references Cincinnati's American Civil Liberties
|
|||
|
Union Regional Coordinator, Jim Rogers, similarly commenting that: "The
|
|||
|
subpoena is invasive for anyone in the 513 area code. If I called "The Wall
|
|||
|
Street Journal", what possible interest should P&G have in that?"
|
|||
|
|
|||
|
In a later 8-18-91 AP story, Cleveland attorney David Marburger was quoted
|
|||
|
as observing that "what is troublesome is I just wonder if a small business in
|
|||
|
Cincinnati had the same problem, would law enforcement step in and help them
|
|||
|
out?" Marburger also added, "it's a surprise to me," referring to the nature
|
|||
|
of the police investigation.
|
|||
|
|
|||
|
In response, Police Commander of Criminal Investigations, Heydon Thompson,
|
|||
|
told the Cincinnati Business Courier "Procter & Gamble is a newsmaker, but
|
|||
|
that's not the reason we are conducting this investigation." P&G spokesperson
|
|||
|
Terry Loftus responded to the notion P&G had over-reacted by pointing out: "We
|
|||
|
feel we're doing what we must do, and that's protect the shareholders. And
|
|||
|
when we believe a crime has been committed, to turn that information over to
|
|||
|
the police."
|
|||
|
|
|||
|
Meanwhile, the {Cincinnati Post} published an editorial this past
|
|||
|
weekend -- describing the P&G request for a police investigation as "kind of
|
|||
|
like when the biggest guy in a pick-up basketball game cries foul because
|
|||
|
someone barely touches him." Finally, AP referenced what it termed "coziness"
|
|||
|
between the city of Cincinnati and P&G in its 8-18-91 piece. In order to
|
|||
|
support this notion of coziness, Cincinnati Mayor David Mann was quoted to say:
|
|||
|
"The tradition here, on anything in terms of civic or charitable initiative, is
|
|||
|
you get P&G on board and everybody else lines up." As one who lived near
|
|||
|
Cincinnati for eight years, I recall Procter & Gamble's relationship with
|
|||
|
Cincinnati as rather cozy indeed.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
Hacker Charged in Australia August 13; 1991
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
The Associated Press reports from Melbourne that Nahshon Even-Chaim, a
|
|||
|
20-year old computer science student, is being charged in Melbourne's
|
|||
|
Magistrates' Court on charges of gaining unauthorized access to one of CSIRO's
|
|||
|
(Australia's government research institute) computers, and 47 counts of
|
|||
|
misusing Australia's Telecom phone system for unauthorized access to computers
|
|||
|
at various US institutions, including universities, NASA, Lawrence Livermore
|
|||
|
Labs, and Execucom Systems Corp. of Austin, Texas, where it is alleged he
|
|||
|
destroyed important files, including the only inventory of the company's
|
|||
|
assets. The prosecution says that the police recorded phone conversations in
|
|||
|
which Even-Chaim described some of his activities. No plea has been entered
|
|||
|
yet in the ongoing pre-trial proceedings.
|
|||
|
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
Dial-a-Pope Catching on in the U.S. August 17, 1991
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
>From the Toronto Star
|
|||
|
|
|||
|
The Vatican is reaching out to the world, but it looks as if Canada won't
|
|||
|
be heeding the call. In the U.S., if you dial a 900 number, you can get a
|
|||
|
daily spiritual pick-me-up from Pope John Paul II. The multilingual, Vatican
|
|||
|
-authorized service, affectionately known as Dial-a-Pope, is officially titled
|
|||
|
"Christian Messaging From the Vatican." A spokesman from Bell Canada says
|
|||
|
there is no such number in this country. But Des Burge, director of
|
|||
|
communications for the Archdiocese of Toronto, says he thinks the service, for
|
|||
|
which U.S. callers pay a fee, is a good way to help people feel more connected
|
|||
|
to the Pope. (Toronto Star)
|
|||
|
______________________________________________________________________________
|
|||
|
|
|||
|
PWN Quicknotes
|
|||
|
~~~~~~~~~~~~~~
|
|||
|
1. Agent Steal is sitting in a Texas jail awaiting trial for various crimes
|
|||
|
including credit card fraud and grand theft auto.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
2. Blue Adept is under investigation for allegedly breaking into several
|
|||
|
computer systems including Georgia Tech and NASA.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
3. Control C had his fingerprints, photographs, and a writing sample
|
|||
|
subpoenaed by a Federal Grandy Jury after Michigan Bell employees,
|
|||
|
and convicted members of the Legion of Doom (specifically The Leftist
|
|||
|
and the Urvile) gave testimony.
|
|||
|
|
|||
|
Control C was formerly an employee of Michigan Bell in their security
|
|||
|
department until January 1990, when he was fired about the same time
|
|||
|
as the raids took place on Knight Lightning, Phiber Optic, and several
|
|||
|
others. Control C has not been charged with a crime, but the status
|
|||
|
of the case remains uncertain.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
4. Gail Thackeray, a special deputy attorney in Maricopa County in Arizona,
|
|||
|
has been appointed vice president at Gatekeeper Telecommunications Systems,
|
|||
|
Inc., a start-up in Dallas. Thackeray was one of the law enforcers working
|
|||
|
on Operation Sun-Devil, the much publicized state and federal crackdown on
|
|||
|
computer crime. Gatekeeper has developed a device that it claims is a
|
|||
|
foolproof defense against computer hackers. Thackeray said her leaving
|
|||
|
will have little impact on the investigation, but one law enforcer who
|
|||
|
asked not to be identified, said it is a sure sign the investigation in on
|
|||
|
the skids. (ComputerWorld, June 24, 1991, page 126)
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
5. Tales Of The Silicon Woodsman -- Larry Welz, the notorious 1960s
|
|||
|
underground cartoonist, has gone cyberpunk. He recently devoted an entire
|
|||
|
issue of his new "Cherry" comice to the adventures of a hacker who gets
|
|||
|
swallowed by her computer and hacks her way through to the Land of Woz.
|
|||
|
(ComputerWorld, July 1, 1991, page 82)
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
6. The Free Software Foundation (FSF), founded on the philosophy of free
|
|||
|
software and unrestricted access to computers has pulled some of its
|
|||
|
computers off the Internet after malicious hackers <MOD> repeatedly deleted
|
|||
|
the group's files. The FSF also closed the open accounts on the system to
|
|||
|
shut out the hackers who were using the system to ricochet into computers
|
|||
|
all over the Internet following several complaints from other Internet
|
|||
|
users. Richard Stallman, FSF director and noted old-time hacker, refused
|
|||
|
to go along with his employees -- although he did not overturn the decision
|
|||
|
-- and without password access has been regulated to using a stand-alone
|
|||
|
machine without telecom links to the outside world.
|
|||
|
(ComputerWorld, July 15, 1991, page 82)
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
7. The heads of some Apple Macintosh user groups have received a letter from
|
|||
|
the FBI seeking their assistance in a child-kidnapping case. The FBI is
|
|||
|
querying the user group leaders to see if one of their members fits the
|
|||
|
description of a woman who is involved in a custody dispute. It's unclear
|
|||
|
why the FBI believes the fugitive is a Macintosh user.
|
|||
|
(ComputerWorld, July 29, 1991, page 90)
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
8. Computer viruses that attack IBM PCs and compatibles are nearing a
|
|||
|
milestone of sorts. Within the next few months, the list of viruses will
|
|||
|
top 1,000 according to Klaus Brunnstein, a noted German computer virus
|
|||
|
expert. He has published a list of known malicious software for MS-DOS
|
|||
|
systems that includes 979 viruses and 19 trojans. In all, there are 998
|
|||
|
pieces of "malware," Brunnstein said.
|
|||
|
(ComputerWorld, July 29, 1991, page 90)
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
9. High Noon on the Electronic Frontier -- This fall the Supreme Court of the
|
|||
|
United States may rule on the appealed conviction from U.S. v. Robert
|
|||
|
Tappan Morris. You might remember that Morris is the ex-Cornell student
|
|||
|
who accidentially shut down the Internet with a worm program. Morris is
|
|||
|
also featured in the book "Cyberpunk" by Katie Hafner and John Markoff.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
10. FBI's Computerized Criminal Histories -- There are still "major gaps in
|
|||
|
automation and record completness" in FBI and state criminal records
|
|||
|
systems, the Congressional Office of Technology has reported in a study on
|
|||
|
"Automated Record Checks of Firearm Purchasers: Issues and Options." In
|
|||
|
the report, OTA estimates that a system for complete and accurate "instant"
|
|||
|
name checks of state and federal criminal history records when a person
|
|||
|
buys a firearm would take several years and cost $200-$300 million. The
|
|||
|
FBI is still receiving dispositions (conviction, dismissal, not guilty,
|
|||
|
etc.) on only half of the 17,000 arrest records it enters into its system
|
|||
|
each day. Thus, "about half the arrests in the FBI's criminal history
|
|||
|
files ("Interstate Ident-ification Index" -- or "Triple I") are missing
|
|||
|
dispositions. The FBI finds it difficult to get these dispositions." The
|
|||
|
OTA said that Virginia has the closest thing to an instant records chck for
|
|||
|
gun purchasers. For every 100 purchasers, 94 are approved within 90
|
|||
|
seconds, but of the six who are disapproved, four or five prove to be based
|
|||
|
on bad information (a mix-up in names, a felony arrest that did not result
|
|||
|
in conviction, or a misdemeanor conviction that is not disqualifying for
|
|||
|
gun ownership) (62 pages, $3 from OTA, Washington, D.C. 20510-8025,
|
|||
|
202/224-9241, or U.S. Government Printing Office, Stock No.052-003-01247-2,
|
|||
|
Washington, D.C. 20402-9325, 202/783-3238).
|
|||
|
(Privacy Journal, August 1991, page 3)
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
Founded in 1974, Privacy Journal is an independent monthly on privacy in the
|
|||
|
computer age. It reports in legislation, legal trends, new technology, and
|
|||
|
public attitudes affecting the confidentiality of information and the
|
|||
|
individual's right to privacy.
|
|||
|
|
|||
|
Subscriptions are $98 per year ($125 overseas) and there are special
|
|||
|
discount rates for students and others. Telephone and mail orders accepted,
|
|||
|
credit cards accepted.
|
|||
|
|
|||
|
Privacy Journal
|
|||
|
P.O. Box 28577
|
|||
|
Providence, Rhode Island 02908
|
|||
|
(401)274-7861
|
|||
|
_______________________________________________________________________________
|
|||
|
|