779 lines
33 KiB
Plaintext
779 lines
33 KiB
Plaintext
|
|
Computer underground Digest Thu Jan 2, 1997 Volume 9 : Issue 01
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Field Agent Extraordinaire: David Smith
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #9.01 (Thu, Jan 2, 1997)
|
|
|
|
File 1--CLO#21-Negotiating the end of the millennium
|
|
File 2--Jenott case: More gossip, so-called criminal hacker stuff
|
|
File 3--Soldier Innocent of Giving Secret Code to Chinese
|
|
File 4--Crack5: ANNOUNCE: Daily Telegraph Article (fwd)
|
|
File 5--BoS: Phrack 49 (fwd)
|
|
File 6--Cu Digest Header Info (unchanged since 13 Dec, 1996)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Tue, 24 Dec 1996 17:22:23 +0100
|
|
From: "William S. Galkin" <wgalkin@EARTHLINK.COM>
|
|
Subject: File 1--CLO#21-Negotiating the end of the millennium
|
|
|
|
[PLEASE NOTE: All back issues can now be found at the
|
|
Computer Law Observer site located at:
|
|
http://www.lawcircle.com/observer]
|
|
|
|
=============================================================
|
|
December, 1996 The Computer Law Observer Issue No. 21
|
|
=============================================================
|
|
The Computer Law Observer is distributed monthly for free by Challenge
|
|
Communications. To subscribe, e-mail to lawobserver-request@charm.net
|
|
with the word "subscribe" (leaving out the quotation marks) in the
|
|
message area. To unsubscribe, do the same, inserting the word
|
|
"unsubscribe". Re-posting is prohibited without permission. Copyright
|
|
1996 by Challenge Communications. See our website for back issues:
|
|
http://www.lawcircle.com/observer
|
|
------------------------------------------------------------
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++
|
|
NEGOTIATING THE END OF THE MILLENNIUM
|
|
++++++++++++++++++++++++++++++++++++++++++++++
|
|
by William S. Galkin, Esq.
|
|
(biography at end)
|
|
|
|
|
|
Irony -
|
|
|
|
Billions of dollars, and the world's best and brightest, have been
|
|
devoted to the development of information technologies. And, now, with
|
|
the meteoric rise in use of the Internet, we seem finally to be at the
|
|
dawn of a new era where information resources will truly permeate our
|
|
lives - dramatically altering the landscape of mankind in a manner many
|
|
compare to the industrial revolution.
|
|
|
|
And yet, someone discovered a flaw, a fault line that runs through much
|
|
of the system. A simple programming error, that when viewed with
|
|
hindsight one wonders "How could anyone have made such an obvious
|
|
mistake?"
|
|
|
|
This article focuses on the legal issues involved in successfully
|
|
negotiating a solution to what is often referred to as the "Year 2000
|
|
Problem".
|
|
|
|
Mistake -
|
|
|
|
Date calculations play an essential role in most applications. Almost
|
|
all applications record information regarding the year with two digits
|
|
(i.e., 96 for 1996). The basic functions involving dates include
|
|
calculating, comparing and sequencing. Therefore, when a program wants
|
|
to calculate a person's current age, it will perform a calculation by
|
|
subtracting the person's date of birth from the current year. In my
|
|
case, subtract 57 (1957) from 96 (1996) and the result is 39. However,
|
|
when the new millennium arrives, the year information contained in most
|
|
applications will be "00". The calculation of my age (i.e., 00 minus 57)
|
|
produces an erroneous result of negative 57!
|
|
|
|
Magnitude -
|
|
|
|
All hardware and software systems are potentially affected by the Year
|
|
2000 problem, even applications that are resident with service bureaus.
|
|
Major corporations are expected to have to pay at least $40 million to
|
|
rectify the problem. The worldwide cost could reach $400 billion.
|
|
Federal Express was reported as having paid 5 cents per line of code to
|
|
correct the problem, which resulted in a $500 million total cost. Chubb
|
|
Insurance has paid $180 million and the state of Nebraska has paid $32
|
|
million.
|
|
|
|
The problem is estimated to affect 95% of all U.S. companies. To date,
|
|
only one third of affected companies are undergoing conversion. Some
|
|
estimate that either the cost to repair or the failure to repair could
|
|
result in a bankruptcy rate of 1 to 5%.
|
|
|
|
The repair process is complex and involves either a data solution or a
|
|
procedural solution. The data solution involves the modification of each
|
|
occurrence of a date. This requires a methodical line-by-line analysis
|
|
of code. With each change, the affected logic must be revisited and the
|
|
modification must then be tested. Mid-sized companies will often have
|
|
millions of lines of code. As many as one in every 50 lines could have a
|
|
date reference. Data entry screens and output formats will have to be
|
|
modified as well. A procedural solution involves changing the processing
|
|
methodology so that an application will know that "18" means "2018"
|
|
instead of "1918". This approach is difficult to implement as well.
|
|
|
|
First steps -
|
|
|
|
Every affected company needs to design its own approach to the Year 2000
|
|
problem. Usually a team will be set up to oversee the process. The team
|
|
will include the appropriate internal technical personnel as well as
|
|
management and outside consultants. Financial and legal advisors may
|
|
also need to be included.
|
|
|
|
The first step is to take a thorough inventory of all affected
|
|
applications and gather all of the software license and support
|
|
agreements that govern such applications to determine each party's
|
|
rights and liabilities. There are a variety of provisions that might be
|
|
found in these agreements, especially for custom software or where
|
|
agreements went through a negotiation process.
|
|
|
|
Some provisions might obligate the vendor to assist with the repairs or
|
|
impose liability for damages that occur due to the Year 2000 problem.
|
|
Additionally, a licensee will need to identify all confidentiality
|
|
restrictions that might be found in the license agreements in order that
|
|
when the repair work begins, it can proceed efficiently without
|
|
violating these provisions. Many modifications will require access to
|
|
the source code. Therefore, it is important to determine whether a
|
|
source code escrow agreement requires delivery to rectify such a
|
|
problem.
|
|
|
|
Negotiating the cure -
|
|
|
|
Rectifying the Year 2000 problem is complex because of both the variable
|
|
times when problems might arise and because of the variety of forms the
|
|
problems might take. Accordingly, when hiring outside consultants to
|
|
repair the problem, a careful agreement needs to be drafted to specify
|
|
what the problem is, how and when it is going to be fixed, and what
|
|
happens if it is not adequately fixed. Following is a discussion of
|
|
some of the important issues that need to be considered:
|
|
|
|
DEFINITION OF PROBLEM: A survey of the problem is the first step. This
|
|
can be performed in house, by a third party consultant or by the vendor
|
|
hired to correct the problem. The results of this analysis will become
|
|
an essential component of the agreement. The survey should include a
|
|
catalogue of all applications reviewed and specifications as to what
|
|
kind of corrections are needed for each application. There are a variety
|
|
of correction methods that can be implemented - some will be appropriate
|
|
for some applications, and not for others. The ideal goal is for the
|
|
vendor to represent that all Year 2000 problems will be corrected, even
|
|
those not listed in the survey results. However, most vendors will not
|
|
agree to such a global representation.
|
|
|
|
CONFIDENTIALITY: The vendor will be having intimate contact with a large
|
|
portion of the information about the company. Additionally, the company
|
|
itself will be under confidentiality restrictions that may prohibit the
|
|
company granting access to certain applications. Accordingly, the
|
|
confidentiality issues need to be settled in advance.
|
|
|
|
IMPLEMENTATION SCHEDULE: It cannot be over stressed, that with Year 2000
|
|
repairs, time is of the essence. A detailed implementation schedule
|
|
needs to be prepared and specific remedies and options need to be
|
|
available if the schedule becomes delayed due to the actions of the
|
|
consultant or the company.
|
|
|
|
EVALUATING PROGRESS: Having the work completed by a certain date, well
|
|
in advance of December 31, 1999, if possible, may be crucial in
|
|
accomplishing an effective transition. Accordingly, the vendor should be
|
|
required to keep the company regularly informed of progress and of any
|
|
delays.
|
|
|
|
CHANGE ORDERS: As the work begins to be performed, it is inevitable
|
|
that additional tasks will be identified as needing to be performed. The
|
|
agreement needs to be flexible enough to adjust for these changes in
|
|
scope.
|
|
|
|
TIME OF WORK AND DISRUPTION: Much of the Year 2000 repair work will have
|
|
to be performed when the system or certain applications are down. This
|
|
means that companies will want this work performed at night or over the
|
|
weekends. Accordingly, it is important that the agreement set forth
|
|
when the system will be done, and who determines the down schedule.
|
|
|
|
TESTING PROCEDURES: Given the complexity of the repair methods, testing
|
|
must be an essential component of the repair services. The vendor and
|
|
the customer must develop and agree upon test criteria, how the tests
|
|
will be performed, and when the system is considered to have passed the
|
|
test. Additionally, it is important that a significant period of live
|
|
use be a part of the test period. In order for this to be effectively
|
|
available, the repair work must be completed well before December 31,
|
|
1999.
|
|
|
|
FOLLOW-UP REPAIRS: It is likely that the testing procedures will turn up
|
|
problems and errors. These errors may or may not fall within the scope
|
|
of the repair services. Accordingly, the vendor should agree to be
|
|
available (i.e., have personnel available) to rectify whatever problems
|
|
arise. This is an important provision. As the year 2000 approaches,
|
|
vendors will be stretching themselves thinner and thinner to complete
|
|
the work by the deadline. Without prior assurances, there may not be
|
|
personnel available to perform these follow up services.
|
|
|
|
COST INCREASES; EMERGENCY SERVICES: Many service agreements are done on
|
|
a time and materials basis and the vendor can increase the hourly rate
|
|
after giving proper notice (e.g., 60 days' prior written notice). These
|
|
provisions are workable when other vendors are available to substitute
|
|
for a vendor that raises its price too much. As time goes on, it will
|
|
be prohibitively expensive to find a substitute vendor, if one can be
|
|
found at all.
|
|
|
|
LENGTH OF WARRANTY: Not all Year 2000 glitches will be apparent at the
|
|
turn of the century. It may take months or even years for some to
|
|
surface. The warranty provision needs to take this issue into account.
|
|
|
|
Other issues -
|
|
|
|
Obviously, all new license agreements should include Year 2000
|
|
compliance requirements. This is a complex provision and should be
|
|
carefully drafted. However, a discussion of this provision is beyond the
|
|
scope of this article.
|
|
|
|
Given the cost to repair and the potential for damage resulting from
|
|
lack of compliance, due diligence for any corporate acquisition or
|
|
significant loan or investment, must include a thorough evaluation of
|
|
this issue.
|
|
|
|
Many boards of directors have been postponing dealing with the problem
|
|
because of the large expense that will appear on their financial
|
|
statements. To make matters worse, the Financial Accounting Standards
|
|
Board emerging issues committee has determined that money spent on the
|
|
Year 2000 Problem must be charged against the current year's earnings,
|
|
and cannot be amortized.
|
|
|
|
However, a corporation that does not develop, in a timely manner, a
|
|
complete compliance plan, will be a good target for shareholder suits
|
|
against the officers and directors if failure in this regard results in
|
|
a decrease in the value of the stock or company.
|
|
|
|
Conclusion -
|
|
|
|
Some companies are waiting for a "silver bullet" that will be developed
|
|
which will simply and efficiently rectify the problem. However, the most
|
|
optimistic predictions foresee the best technological developments
|
|
providing at most a 30% savings in repair time and costs.
|
|
|
|
The process of making systems Year 2000 compliant can be complex and
|
|
fraught with unknown variables. A good agreement is necessary to
|
|
successfully deal with the many issues involved. However, given that the
|
|
end of the millennium is approaching fast, a prudent company will
|
|
construct alternate plans if compliance is not achieved on time.
|
|
|
|
ABOUT THE AUTHOR:
|
|
|
|
Mr. Galkin can be reached for comments or questions
|
|
about the topic discussed in this article as follows:
|
|
E- MAIL: wgalkin@lawcircle.com
|
|
WWW: http://www.lawcircle.com/galkin
|
|
TELEPHONE: 410-356-8853/FAX:410-356-8804
|
|
MAIL: 10451 Mill Run Circle, Suite 400
|
|
Owings Mills, Maryland 21117.
|
|
|
|
Mr. Galkin is an attorney in private practice.
|
|
He is also the adjunct professor of Computer Law at the
|
|
University of Maryland School of Law. He is a
|
|
graduate of New York University School of Law
|
|
and has concentrated his private practice on
|
|
intellectual property, computer and technology law
|
|
issues since 1986. He represents small startup,
|
|
midsized and large companies, across the U.S. and
|
|
internationally, dealing with a wide range of legal
|
|
issues associated with computers and technology,
|
|
such as developing, marketing and protecting
|
|
software, purchasing and selling complex computer
|
|
systems, launching and operating a variety of online
|
|
business ventures, and trademark and copyright
|
|
issues.
|
|
|
|
------------------------------
|
|
|
|
Date: Sat, 21 Dec 1996 18:50:46 -0600 (CST)
|
|
From: Crypt Newsletter <crypt@sun.soci.niu.edu>
|
|
Subject: File 2--Jenott case: More gossip, so-called criminal hacker stuff
|
|
|
|
The so-called criminal hacker
|
|
=============================
|
|
|
|
By December 17th, the U.S. Army's prosecution of Eric Jenott, "the Ft.
|
|
Bragg hacker," was in full swing. Much of the testimony appeared aimed
|
|
at proving Jenott to be a criminal hacker. However, a key witness
|
|
turned out to be little more than a convicted thief attempting to
|
|
curry favor for himself in return for helping to convict Jenott. Other
|
|
testimony appeared to be standard circumstantial hacker hearsay attributed
|
|
to the Ft. Bragg soldier. Very little of the court's unclassified
|
|
proceedings convincingly portrayed Jenott as a potential spy for
|
|
communist China.
|
|
|
|
Raymond Chen, a former Marine, testified Jenott gave "the [Internet]
|
|
address for the secretary of defense computer system" to him "before
|
|
Jenott joined the Army." Chen accessed the system using this information,
|
|
he said.
|
|
|
|
According to Chen, Jenott confided that he had been hacking into Navy,
|
|
Air Force and other DoD computers since 1994. He claimed that Jenott
|
|
had admitted to deleting information from a Navy system.
|
|
|
|
Chen, who is also in legal trouble from this case and a convicted
|
|
thief stemming from a 1991 break-in at the University of Washington in
|
|
which he stole a computer, claimed he has been granted immunity from
|
|
prosecution in exchange for his testimony in the Jenott case. Chen was
|
|
convicted of burglary and possession of stolen property in December 1992.
|
|
His sentence was 60 days in jail and 30 days of community service.
|
|
|
|
Chen testified that he had negotiated immunity with Army prosecutor
|
|
Emmett Wells. According to the Fayetteville Observer, Chen said
|
|
in court "Wells said if I can get Jenott convicted of espionage, he
|
|
will get me out of my trouble in Washington state."
|
|
|
|
Wells was removed from the case when he attempted to commit suicide
|
|
by slashing a wrist a few days earlier.
|
|
|
|
Army prosecutor Matthew Wilkov had Chen say "he understood that Wells
|
|
was an Army prosecutor and had no direct control over the charges in
|
|
Washington." However, Wilkov added "he had agreed to write a letter
|
|
saying Chen had cooperated in an Army case."
|
|
|
|
Testimony continued from Army employees who worked the Fort Bragg
|
|
bulletin board system. Janet Warden said she had been monitoring
|
|
posts by Jenott and undisclosed others on the board. It was
|
|
about computer hacking, she said, and included references to S-MILS,
|
|
a military acronym for secure military sites.
|
|
|
|
Warden said she had been instructed to observe Jenott's conversations
|
|
on the system.
|
|
|
|
Logs from the Ft. Bragg BBS indicated Jenott sent "several" electronic
|
|
messages to Qihang Liu at Oak Ridge, Tennessee. Liu did not reply.
|
|
|
|
Another military intelligence investigator, Ronald E. Davis, said that
|
|
he interviewed Jenott and that "I learned he passed the password . . ."
|
|
|
|
Davis was asked twice by prosecution what he learned from Jenott. The
|
|
second time he said he "learned [Jenott] committed espionage." Jenott's
|
|
lawyer, Tim Dunn, immediately objected and Fred Arquilla sustained it.
|
|
|
|
The court was then closed again for the purposes of secrecy during
|
|
the rest of Davis' presentation and testimony from John F. Deasy, a
|
|
soldier from the Land Information Warfare Activity at Fort Belvoir,
|
|
Virginia.
|
|
|
|
When the court was re-opened, Deasy said he had been asked to look
|
|
"over a file about someone from Fort Bragg hacking into [a] University
|
|
British Columbia computer." Deasy also said he was told the security
|
|
of a "switching station" on the Army's Mobile Subscriber Network
|
|
was breached.
|
|
|
|
Ray Chen testified again, claiming he had learned in a chat group
|
|
with Jenott's brother, Lance, and unnamed others that Jenott had
|
|
"hacked" into a university of British Columbia computer.
|
|
|
|
Other prosecution witnesses said they had followed Jenott's discussions
|
|
on the Ft. Bragg BBS on the use of passwords of "professors and students"
|
|
to hack into computers and the utilization of laptops and payphones to
|
|
avoid being traced.
|
|
|
|
|
|
Izzit secret?
|
|
=============
|
|
|
|
While the U.S. Army contended Eric Jenott gave a secret password
|
|
for a secure cellular telephone network to Quihang Liu, the
|
|
system's builder did not consider the password verboten until more
|
|
than a full month after the Ft. Bragg hacker was charged with
|
|
espionage.
|
|
|
|
GTE developed the system and an employee, Steven Sullivan, testified
|
|
at Jenott's court martial in another closed session, December 18th.
|
|
|
|
The prosecution's Matthew Willkov maintained the password was classified.
|
|
"If classified information is carried on the system, the password is
|
|
secret" he said, according to the Fayetteville Observer.
|
|
|
|
Jenott's defense disagreed.
|
|
|
|
Judge Fred Arquilla said the password is classified, but only in the
|
|
context of determining whether the court should be in closed session
|
|
during testimony. He informed the jury that closing the court should
|
|
not bear on its decision as to whether or not the password in
|
|
contention was or is actually classified.
|
|
|
|
Clear?
|
|
|
|
Anyway, much later FBI agent Steven McFall -- who said he was suffering
|
|
from a case of food poisoning -- testified that federal agents had seized
|
|
an Army jacket and uniform with Jenott's name on it from the apartment of
|
|
Quihang Liu.
|
|
|
|
|
|
Suicide? Or not? In court gossip rules
|
|
========================================
|
|
|
|
Jenott's counsel, Tim Dunn, said on Friday that he had checked
|
|
out a tip "that a former prosecutor [Emmett Wells] in the case
|
|
tried to kill himself because he was being pressured to alter
|
|
documents."
|
|
|
|
According to the Fayetteville Observer, Dunn said he had also talked
|
|
to Wells and the rumor proved unsubstantiated.
|
|
|
|
"He said it was not true, it was fascinating, but he had to go,"
|
|
Dunn said. Wells is currently being treated at Walter Reed Army
|
|
Medical Center after apparently trying to kill himself by slashing
|
|
a wrist last Sunday.
|
|
|
|
The Observer also reported the defense's effort to have some evidence
|
|
declared inadmissible because the government has kept sloppy records
|
|
on it. Judge Fred Arquilla denied Dunn's request but said he could
|
|
introduce evidence pointing out the government's sloppiness.
|
|
|
|
Kevin Nauer testified on computer data apparently seized from Jenott's
|
|
hard disks or diskettes. It included words purported to be written by
|
|
the Ft. Bragg hacker.
|
|
|
|
According to Knauer and reported in the Observer, a poem credited to
|
|
Jenott said "At least I'll have a tiny part in bringing this nation to
|
|
its knees."
|
|
|
|
According to prosecution testimony, Jenott is also claimed to have said
|
|
he had "wiped out hundreds of computers at the Defense Information Systems
|
|
Agency."
|
|
|
|
Throughout most of the Jenott case, it has been impossible to distinguish
|
|
whether much of the testimony is based on anything more substantive than
|
|
weird hacker bragging, notes from the underground, hearsay or crazy gossip.
|
|
|
|
Full text from the Fayetteville Observer: http://www.foto.com
|
|
|
|
|
|
George Smith
|
|
Crypt Newsletter
|
|
http://www.soci.niu.edu/~crypt
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 31 Dec 96 12:31 CST
|
|
From: Jim Thomas <tk0jut1@mvs.cso.niu.edu>
|
|
Subject: File 3--Soldier Innocent of Giving Secret Code to Chinese
|
|
|
|
Copyright Chicago Tribune
|
|
Monday, December 23, 1996
|
|
|
|
SOLDIER INNOCENT OF GIVING SECRET CODE TO CHINESE
|
|
|
|
A soldier accused of passing a secret computer code to a
|
|
Chinese citizen was acquitted Sunday (Dec. 23) of espionage, the
|
|
most serious charge at his court martial.
|
|
|
|
But Pfc. Eric Jenott, 21, was convicted of damaging government
|
|
property and computer fraud after closing arguments.
|
|
|
|
Jenott, of Graham, Wash., was sentenced to three years in
|
|
prison and ordered to forfeit all benefits.
|
|
|
|
<snip>
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 27 Dec 1996 13:20:01 -0600 (CST)
|
|
From: Chip Rosenthal <chip@UNICOM.COM>
|
|
Subject: File 4--Crack5: ANNOUNCE: Daily Telegraph Article (fwd)
|
|
|
|
Just wanted to bring this news posting to your attention. The
|
|
Telegraph appears to be on-line as <http://www.telegraph.co.uk/>.
|
|
It might be worth checking the "Connected" section next week to
|
|
see if something appears there.
|
|
|
|
------- start of forwarded message -------
|
|
From--Alec Muffett <alecm@crypto.dircon.co.uk%antispam>
|
|
Subject--Crack5--ANNOUNCE--Daily Telegraph Article
|
|
|
|
|
|
I gather (from the journalist concerned) that next week's (tuesday?)
|
|
Daily Telegraph Computing Section will carry an article regarding the
|
|
release of Crack5, in which "most security experts" are "highly
|
|
critical" of "gifted amateurs" (!) such as myself, who "irresponsibly"
|
|
release software such as Crack, SATAN, COPS, etc, onto the net.
|
|
|
|
I've chatted with the fellow quite extensively, and also gather that he
|
|
was unable (in the midst of the christmas break) to find any "security experts"
|
|
who could find a good word to say about Crack; undeterred, I've had a go at
|
|
putting a positive spin on the matter, and can only but hope that between
|
|
his hands and the final print that I don't wind up looking a villan
|
|
- I suspect I shan't, but you never know...
|
|
|
|
Regardless, I must admit that I look forward to the almost inevitable
|
|
furore with some enthusiasm. 8-)
|
|
|
|
Followups set to comp.security.unix.
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 18 Dec 1996 01:54:46 -0500 (EST)
|
|
From: "noah@enabled.com" <noah@enabled.com>
|
|
Subject: File 5--BoS: Phrack 49 (fwd)
|
|
|
|
From -Noah
|
|
|
|
---------- Forwarded message ----------
|
|
Date--Fri, 8 Nov 1996 19:46:47 -0800 (PST)
|
|
Subject--BoS--Phrack 49
|
|
|
|
-----BEGIN PGP SIGNED MESSAGE-----
|
|
|
|
|
|
The new issue of Phrack Magazine, the underground's *premier*
|
|
computer security publication, is upon us all!!
|
|
|
|
|
|
|
|
http://www.infonexus.com/~daemon9/phrack49.tgz
|
|
ftp://ftp.infonexus.com/pub/Philes/Phrack/phrack49.tgz
|
|
http://www.fc.net/~phrack
|
|
|
|
or send email to the below address...
|
|
|
|
An excerpt from Issue 49, P49-01:
|
|
|
|
|
|
.oO Phrack 49 Oo.
|
|
|
|
Volume Seven, Issue Forty-Nine
|
|
|
|
1 of 16
|
|
|
|
Issue 49 Index
|
|
____________________
|
|
|
|
P H R A C K 4 9
|
|
|
|
November 08, 1996
|
|
____________________
|
|
|
|
|
|
Welcome to the next generation of Phrack magazine. A kinder, gentler, Phrack.
|
|
A seasoned, experienced Phrack. A tawdry, naughty Phrack. A corpulent,
|
|
well-fed Phrack. Phrack for the whole family. Phrack for the kids, Phrack
|
|
for the adults. Even Phrack for the those enjoying their golden years.
|
|
|
|
If you thought 48 was a fluke, here is 49, RIGHT ON SCHEDULE. Full speed
|
|
ahead, baby. We promised timely Phrack. We promised quality Phrack. Here
|
|
are both in ONE CONVENIENT PACKAGE! We trimmed the fat to bring you the lean
|
|
Phrack. Chock full of the healthy information you need in your diet. All
|
|
natural. No artificial ingredients. No snake oil. No placebo effect.
|
|
Phrack is full of everything you want, and nothing you don't.
|
|
|
|
This issue is the first *official* offering from the new editorial staff. If
|
|
you missed them, our prophiles can be found in issue 48. Speaking of 48,
|
|
what a tumultuous situation article 13 caused. All that wacking SYN flooding.
|
|
Well, it got the job done and my point across. It got vendors and programmers
|
|
working to come up with work-around solutions to this age-old problem. Until
|
|
recently, SYN-flooding was a skeleton in the closet of security professionals.
|
|
It was akin the crazy uncle everyone has, who thinks he is Saint Jerome. We
|
|
all knew it was there, but we ignored it and kinda hoped it would go away...
|
|
Anyway, after this issue, I hope it *will* just go away. I have done
|
|
interviews for several magazines about the attack and talked until I was blue
|
|
in the face to masses of people. I think the word is out, the job is done.
|
|
Enough *is* enough. " SYN_flooding=old_hat; ". Onto bigger and better things.
|
|
|
|
A few more quick points (after all, you want Phrack Warez, not babbling
|
|
daemon9). I want to thank the community for supporting me (and co.) thus far.
|
|
Countless people have been quite supportive of the Guild, the Infonexus, and
|
|
of Phrack. Time and work do permit me to get back to all of you individually,
|
|
so just a quick blurb here. Thank you all. I will be using Phrack as a tool
|
|
to give back to you, so please mail me (or any of the editors with your
|
|
suggestions). This is *your* magazine. I just work here.
|
|
|
|
Most of all, I am stoked to be here. I am giving this my all. I'm fresh, I'm
|
|
ready... I'm hyped + I'm amped (most of my heros don't appear on no stamps..).
|
|
|
|
Drop us a line on what you think of 49. Comments are encouraged.
|
|
|
|
|
|
Bottom line (and you *can* quote me on this): Phrack is BACK.
|
|
|
|
- daemon9
|
|
|
|
[ And remember: r00t may own you, but the Guild loves you ]
|
|
[ TNO, on the other hand, doesn't even fucking care you exist ]
|
|
|
|
- ---------------------------------------------------------------------------
|
|
|
|
|
|
Enjoy the magazine. It is for and by the hacking community. Period.
|
|
|
|
|
|
Editors : daemon9, Datastream Cowboy, Voyager
|
|
Mailboy : Erik Bloodaxe
|
|
Elite : Nirva (*trust* me on this one)
|
|
Raided : X (investigated, no charges as of yet)
|
|
Hair Technique : Mycroft, Aleph1
|
|
Tired : TCP SYN flooding
|
|
Wired : Not copping silly slogans from played-out, vertigo
|
|
inducing magazines.
|
|
Pissed off: ludichrist
|
|
Pissed on: ip
|
|
News : DisordeR
|
|
Thanks : Alhambra, Halflife, Snocrash, Mythrandir, Nihil, jenf,
|
|
xanax, kamee, t3, sirsyko, mudge.
|
|
Shout Outs : Major, Cavalier, Presence, A-Flat, Colonel Mustard,
|
|
Bogus Technician, Merc, Invalid, b_, oof, BioHazard,
|
|
Grave45, NeTTwerk, Panzer, The Bishop, TeleMonster,
|
|
Ph0n-E, loadammo, h0trod.
|
|
|
|
Phrack Magazine V. 7, #49, November 08, 1996.
|
|
Contents Copyright (c) 1996 Phrack Magazine. All Rights Reserved.
|
|
Nothing may be reproduced in whole or in part without written
|
|
permission from the editors. Phrack Magazine is made available
|
|
quarterly to the public free of charge. Go nuts people.
|
|
Subscription requests, articles, comments, whatever should be directed to:
|
|
|
|
phrackedit@infonexus.com
|
|
|
|
Submissions to the above email address may be encrypted
|
|
with the following key (note this is a NEW key):
|
|
|
|
- -----BEGIN PGP PUBLIC KEY BLOCK-----
|
|
Version: 2.6.2
|
|
|
|
mQENAzJuWJgAAAEH/2auap+FzX1AZOsQRPWRrRSOai2ZokfVpWWJI8DRuSpX9l7w
|
|
5qWHrZdL/RweA4lgwAmcrAOD6d8+AzZfXEhkKi92G9ZNy2cjsb5g7oamkcPmC03h
|
|
pdhRe5rHXDWUtXDEhHlkV0WvkLXrhFijW2VdJ2UDFyFd8q0nBSIz+JTGneNO0w4q
|
|
aowCx3gZpEb4hkEU1LFoJXywZhnBg06jSxD9exbBF2WKeealqTlntlcsMmeJ3OdS
|
|
9fqnGI19BWirqkIJYtNXdzP4M2usOEvikrdhXwSbCNcDGcY6pyKco2rKbBUj5V2I
|
|
8/2L0TSGSaRBZ/YKRplwycldy63UVVTLMNGQCCUABRG0KlBocmFjayBNYWdhemlu
|
|
ZSA8cGhyYWNrZWRpdEBpbmZvbmV4dXMuY29tPg==
|
|
=eHJS
|
|
- -----END PGP PUBLIC KEY BLOCK-----
|
|
|
|
ENCRYPTED SUBSCRIPTION REQUESTS WILL BE IGNORED
|
|
|
|
Phrack goes out plaintext... You certainly can subscribe in plaintext
|
|
|
|
|
|
.oO Phrack 49 Oo.
|
|
-------------------------------------
|
|
Table Of Contents
|
|
|
|
1. Introduction 7 K
|
|
2. Phrack loopback 6 K
|
|
3. Line Noise 65 K
|
|
4. Phrack Prophile on Mudge by Phrack Staff 8 K
|
|
5. Introduction to Telephony and PBX systems by Cavalier 100K
|
|
6. Project Loki: ICMP Tunneling by daemon9/alhambra 10 K
|
|
7. Project Hades: TCP weaknesses by daemon9 38 K
|
|
8. Introduction to CGI and CGI vulnerabilities by G. Gilliss 12 K
|
|
9. Content-Blind Cancelbot by Dr. Dimitri Vulis 40 K
|
|
10. A Steganography Improvement Proposal by cjm1 6 K
|
|
11. South Western Bell Lineman Work Codes by Icon 18 K
|
|
12. Introduction to the FedLine software system by Parmaster 19 K
|
|
13. Telephone Company Customer Applications by Voyager 38 K
|
|
14. Smashing The Stack For Fun And Profit by Aleph1 66 K
|
|
15. TCP port Stealth Scanning by Uriel 32 K
|
|
16. Phrack World News by Disorder 109K
|
|
|
|
575k
|
|
-------------------------------------
|
|
|
|
"...There's MORE than maybes..."
|
|
|
|
- Tom Regean (Gabriel Bryne) "Miller's Crossing"
|
|
[ Obviously referring to the blatent truism that Phrack IS back ]
|
|
|
|
"...Fuckin' Cops..."
|
|
|
|
- Verbal Kint/Keyser Soze (Kevin Spacey) "The Usual Suspects"
|
|
[ Not sure what was meant by that.. ]
|
|
|
|
"Got more funky styles than my Laserjet got fonts"
|
|
- 311/Grassroots "Omaha Stylee"
|
|
[ That would be referring to us, of course ]
|
|
|
|
EOF
|
|
|
|
|
|
- --
|
|
[ route@infonexus.com ] Editor, Phrack Magazine / Member, Guild Corporation
|
|
|
|
...check out the nametag.. you're in MY world now grandma...
|
|
|
|
-----BEGIN PGP SIGNATURE-----
|
|
Version: 2.6.2
|
|
|
|
iQCVAwUBMoP+pgtXkSokWGapAQFpqgQAgDEjwg7Q9TDbTQHzECneOc4FHK4QNAkb
|
|
pynBsLq21gzhzzGDxLDveKv4lEJBPxqGnE1Fex3hnqdsL46oXMjRECRHkmP8Lhqx
|
|
+P1N7Xa+q50NKkvuh2vZFdTN3Jgihwf5AF+5ngrlVbeV945BCJ1K9mr4GAUGccQD
|
|
KoAKHrOPKIw=
|
|
=deJO
|
|
-----END PGP SIGNATURE-----
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 15 Dec 1996 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 6--Cu Digest Header Info (unchanged since 13 Dec, 1996)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #9.01
|
|
************************************
|
|
|