788 lines
26 KiB
Plaintext
788 lines
26 KiB
Plaintext
#######################################
|
|
# #
|
|
# #
|
|
# ======== =\ = ====== #
|
|
# == = \ = = #
|
|
# == = \ = ====== #
|
|
# == = \ = = #
|
|
# == = \= ====== #
|
|
# #
|
|
# #
|
|
# <Tolmes News Service> #
|
|
# ''''''''''''''''''''' #
|
|
# #
|
|
# #
|
|
# > Written by Dr. Hugo P. Tolmes < #
|
|
# #
|
|
# #
|
|
#######################################
|
|
|
|
|
|
Issue Number: 10
|
|
Release Date: November 19, 1987
|
|
|
|
|
|
Most of this issue will detail with the events concerning the bust of Shadow
|
|
Hawk. First there will be an article that describes the bust. Here it is:
|
|
|
|
|
|
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
|
|
|
|
|
TITLE: Youth is a Suspect in Theft of Software
|
|
FROM: The Chicago Tribune
|
|
DATE: September 17, 1987
|
|
|
|
|
|
A 17-year-old North Side youth is under investigation by the U.S. Secret
|
|
Service and the U.S. attourney's office for allegedly breaking into AT&T
|
|
computers across the nation and stealing sophisticated software valued
|
|
in the thousands of dollars. The youth is also suspected of advertising AT&T's
|
|
security devices over a network in Texas that is used as a "bulletin
|
|
board" by computer enthusiasts. The sole purpose of the computer network in
|
|
Texas, known as "Phreak Class-2600" is "to educate computer enthusiasts ... to
|
|
penetrate industrial and government sector computer systems," according to
|
|
a sworn affidavit filed in U.S. District Court by Assistant U.S. Atty.
|
|
William J. Cook.
|
|
On Sept. 4, Secret Service agents carrying a search warrant raided the
|
|
home of the youth, identified as Herbert D. Zinn Jr., of 6211 N. Artersian Ave.
|
|
The agents confiscated computers and the software that was stolen during the
|
|
break-ins, according to a U.S. Atty. Anton R. Valukas. A sworn affidavit
|
|
filed in U.S. District Court by Secret Service Agent Patrick Convery said the
|
|
the youth, using the code-name "Shadow Hawk" is suspected of breaking into an
|
|
AT&T computer at NATO Maintenance and Supply Headquarters in Burlington, N.C.
|
|
and an AT&T computer at Robins Air Force Base, Georgia, during the last
|
|
five months.
|
|
In addition, he also broke into AT&T computers at Bell Labs in
|
|
Naperville and New Jersey, according to the affidavit. Among the software
|
|
stolen during the break-ins was an artificial intelligence program that is
|
|
not yet on the market, the affidavit said. A single copy of the software is
|
|
valued at $5,000, but AT&T told the Secret Service that the program has an
|
|
estimated market value of $1 million.
|
|
An analysis of long distance calls made from Zinn's telephone disclosed
|
|
that attempts also were made to gain access to computers at the accounts
|
|
payable department of the Washington Post newspaper, a hostpital in South
|
|
Bend, Ind.; and computers in Colombus, Ohio; Rye, N.Y., and Pipe Creek, Tex.,
|
|
according to the government. Zinn's father, Herbert D. Zinn Sr., declined
|
|
to comment.
|
|
However, the affidavit said, the elder Zinn had recently retired from an
|
|
auto radio installationfederal investigators
|
|
that Zinn's son was "a bright boy" whose father had bragged at work that
|
|
his son's interest in computers "had just taken off."
|
|
"We consider this to be very serious," Valukas said. "We have said
|
|
from the beginning that we would take an aggressive stance in this area. We
|
|
are currently reviewing the matter and no charges have been filed." A
|
|
17-year-old is considered a juvenile under federal law. Valudas
|
|
characterized the software taken from NATO and the Air Force base as "low
|
|
level in terms of sensitivity."
|
|
Kathyryn Clark, a spokesman for AT&T, said "I'm aware of it. Our
|
|
security systems alert us when there is this type of break. It's in the hands
|
|
of the U.S. attorney."
|
|
Last June 6, Henry Kluepfel, an AT&T corporate security official tuned
|
|
into the Phreak Class-2600 and spotted messages from Shadow Hawk, the
|
|
affidavit said. Shadow Hawk braged in the messages that he had successfully
|
|
gained access to AT&T computer files and said he was interested in creating
|
|
some "Trojan horses" in the AT&T network. A Trojan horse, in computer
|
|
lingo, is an unauthorized computer program placed into a computer. Later
|
|
that month, another AT&T corporate security official spotted a statement
|
|
made by Shadow Hawk on another computer bulletin board in Chicago.
|
|
In that message, Shadow Hawk provided the names, telephone numbers,
|
|
passwords and other critical information needed to gain access to
|
|
seven different AT&T computers, according to the affidavit. On July 7,
|
|
a computer break-in at the Bell Labs computer in Naperville was discovered
|
|
and a record of the intruder's telephone number was spotted on the
|
|
compromised computer, the affidavit said. Illinois Bell then began using a
|
|
device known as a dial number recorder to log all calls made from the
|
|
telephone number, the affidavit said. From July 17 through July 19, the Zinn
|
|
computer gained access to the NATO computer by using and unauthorized
|
|
passowrd, according to the government.
|
|
The Zinn computer transferred software packages valued at $21,000
|
|
from the NATO computer, the affidavit said. On July 23, the AT&T software
|
|
program with an estimated $1 million market value vanished from the Bell
|
|
Labs computer in New Jersey. And, on July 27, $3,000 worth of software was
|
|
taken from Bell Labs. On July 31, the Zinn computer, according to the
|
|
affidavit, entered an AT&T computer that was holding a software program
|
|
used by the regional Bell System companies to record telephone service
|
|
requirements for customers.
|
|
That program, "if manipulated can give free telephone service and it can
|
|
be used to disrupt or halt telephone communications," the affidavit said.
|
|
On Aug. 1 and Aug. 3, 16 entries into the Naperville computer were made and
|
|
$40,000 worth of software used to support AT&T's electronic switching
|
|
system was stolen, according to the government.
|
|
On Aug. 28, the Zinn computer broke into the AT&T computer at Robins
|
|
Air Force Base and stole software that was used to back up a switching system
|
|
used by the Department of Defense, the affidavit said.
|
|
|
|
|
|
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
|
|
|
NOTA:
|
|
|
|
It seems that Shadow Hawk was severely busted for hacking. If he does not go
|
|
back into the hacking world, he should be remembered as one of the better
|
|
hackers (much better than most hackers). Shadow Hawk made several scans
|
|
of local exchanges and was known to have broken into many computers. He was
|
|
very good with the Unix operating system and definitely knew what he was
|
|
doing. As I said before, he should be remembered as one of the better hackers
|
|
of the hack/phreak world. Now I will go into the article in detail with some
|
|
explanations on different things mentioned.
|
|
|
|
======================================
|
|
|
|
|
|
|
|
"The sole purpose of the computer network in Texas, known as 'Phreak
|
|
Class-2600' is 'to educate computer enthusiasts ... to penetrate industrial
|
|
and government sector computer systems.'"-
|
|
|
|
The bbs described as "Phreak Class-2600" is actually "Phreak Klass
|
|
Room 2600." The current number to this bulletin board is (806) 799-0016. The
|
|
board isn't the greatest but it does have some very knowledgable people on it.
|
|
As described in the article, Phreak Klass is meant to educate people to
|
|
phreaking and hacking. If you would like to learn more about phreaking and
|
|
hacking, then please call. The current login is: EDUCATE. The board is public
|
|
and does not print codes or passwords to systems. The board is up for
|
|
educational purposes and codes or passwords are not tolerated.
|
|
|
|
|
|
|
|
======================================
|
|
|
|
|
|
|
|
"Henry Kluepfel, an AT&T corporate security official, tuned into the
|
|
Phreak Class-2600 and spotted messages from Shadow Hawk"-
|
|
|
|
This would indicate that there is currently an AT&T security official
|
|
on Phreak Klass. It is also likely that this security official, named Henry
|
|
Kluepfel, is on other bulletin boards related to the topics of phreaking and
|
|
hacking. Although this security official was/is monitoring messages on
|
|
Phreak Klass, it is unknown whether or not he had anything to do with the bust
|
|
of Shadow Hawk. He might still be there and it is not known by which handle he
|
|
goes by.
|
|
|
|
Although many names are definitely not the informant, it should be assumed
|
|
that one of the users on this list is Henry Kluepfel (PK Userlist):
|
|
|
|
|
|
1. D,DR.
|
|
2. EWING,JR -
|
|
3. !,DOC PHUN
|
|
4. !,FUSION
|
|
5. !,KARATE KID
|
|
6. !,ZACK
|
|
7. (TUFF),TRACKER
|
|
8. -----,OMEGA
|
|
9. ., EVADER
|
|
10. .,BAUHAUS
|
|
11. .,EASTWIND
|
|
12. .,EVADER
|
|
13. .,LOKI
|
|
14. .,MERLIN
|
|
15. .,OBERHIEMAN
|
|
16. .,RYCHE
|
|
17. .,SABRO
|
|
18. .,THE SHUFFLER
|
|
19. .,WOLFMAN
|
|
20. ...,PENDRAGON
|
|
21. 0PERATOR,THE
|
|
22. 1,VANDAL
|
|
23. 666,LUCIFER
|
|
24. ADAM,MIKE
|
|
25. ADEPT,BLUE
|
|
26. ADEPT,MAGNUS
|
|
27. ADVENGER,DEMON
|
|
28. AGENT,ADEPT
|
|
29. ALAND,PATRICK
|
|
30. ANARCHIST,ARMCHAIR
|
|
31. ANDREX,THE
|
|
32. ANGEL,DEATH
|
|
33. ANONYMOUS,RODNEY
|
|
34. ASHAD,ABDUL
|
|
35. ASSAULT,SILENT
|
|
36. ASSOCIATES,BREW
|
|
37. ATLANTIC,BILL
|
|
38. ATTACK!,OPERATIO AVOCADO,THE FLYING
|
|
40. AXIS,AGENT
|
|
41. BACARDI,DR
|
|
42. BAND,REZ
|
|
43. BANDIT,THE
|
|
44. BANDIT,TIME-
|
|
45. BARD,THE
|
|
46. BARON,RED
|
|
47. BARON,THE BAUD
|
|
48. BEEBLEBROX,ZAPHOD
|
|
49. BELLCON,MR
|
|
50. BERSITUS,BEN
|
|
51. BLACK,MR.
|
|
52. BLASTER,BYTE
|
|
53. BLIP,MR
|
|
54. BOBO,BOBO
|
|
55. BOUDREAUX,SMASHER
|
|
56. BREAKER,CIRCUIT
|
|
57. BREAKER,CODE
|
|
58. BREAKER,THE
|
|
59. BRIGGS,SIR
|
|
60. BROWN,DAVE
|
|
61. BUDMAN,THE
|
|
62. BULT,BUCKWEAT
|
|
63. BUM,DIGITAL
|
|
64. C,CTRL
|
|
65. CHANGE,RECENT
|
|
66. CHARLIE,COSMIC
|
|
67. CHEMIST,RENEGADE
|
|
68. CHEUNG,SLYDE
|
|
69. CHICKEN,THUNDER
|
|
70. CHOUINARD,JAY
|
|
71. CITIZEN,CONCERNED
|
|
72. COIL,VERTICAL
|
|
73. COLONEL,THE
|
|
74. CONNECT,CROSS
|
|
75. COOL J,LL
|
|
76. COOL,FIRECRACKER
|
|
77. COUNT,THE
|
|
78. CRACKER,THE
|
|
79. CRACKER,THE UNKNOWN
|
|
80. CREAPER,DARK
|
|
81. CRIMINAL,CORPORATE
|
|
82. CULPRIT,CARRIER
|
|
83. D MEN TOR,THE
|
|
84. DARKONE,THE
|
|
85. DEATH,COMMANDER
|
|
86. DEATH,CREEPING
|
|
87. DEATH,CRIMSON
|
|
88. DEATH,DRUIDIC
|
|
89. DECEIVER,THE
|
|
90. DELETE THIS.,THE DRUID
|
|
91. DEMON,DISK
|
|
92. DEMON,THE GUARDIAN
|
|
93. DENT,ARTHUR
|
|
94. DEVIL,ARCH
|
|
95. DIAMOND, KING
|
|
96. DOG,THE JUNKYARD
|
|
97. DRAKE,SIR FRANCIS
|
|
98. DROW,THE
|
|
99. DUDE,THE
|
|
100. DUKE,THE
|
|
101. DUTCHMAN,THE
|
|
102. EDGE,THE
|
|
103. ELIMINATOR,THE
|
|
104. ELITE,PURE
|
|
105. EQUALIZER,THE
|
|
106. ERICKSON,S.K.
|
|
107. EVANS,MARK
|
|
108. EXECUTIONER,THE
|
|
109. EXORCIST,THE
|
|
110. EXTERMINATOR,THE
|
|
111. FACTOR,DOMINANT
|
|
112. FALCON,GREY
|
|
113. FALCON,THE
|
|
114. FINGERS,FINEOUS
|
|
115. FLASH,GRANDMASTER
|
|
116. FLINT,CAPTAIN
|
|
117. FLOYD,PHREAKY
|
|
118. FLYER,MIDNIGHT
|
|
119. FOG,SINISTER
|
|
120. FOREHEAD,PORCELAIN
|
|
121. FOUL,LORD
|
|
122. FREAKER,PHILLIPPINO
|
|
123. FREEZE,THE
|
|
124. FRESH,DOUG
|
|
125. FUGATIVE,THE
|
|
126. FUGITIVE,THE
|
|
127. FUGITIVE-,-THE
|
|
128. GAMELORD,SIR
|
|
129. GHOST,GREY
|
|
130. GIBE,FRANKEN
|
|
131. GRAHAM,MICHAEL
|
|
132. GREEL,MAGNUS
|
|
133. GREEN,TYRONE
|
|
134. GREYHOUND,GRANTIN
|
|
135. GRIFFIN, THE
|
|
136. GRIFFIN,THE
|
|
137. GUARDIAN,THE
|
|
138. HACK,MULTI
|
|
139. HACK,TRASH
|
|
140. HALEN,VAN
|
|
141. HARRY,DIRTY
|
|
142. HATTER,MAD
|
|
143. HAVOC,MAJ.
|
|
144. HAWK,NIGHT
|
|
145. HAWK<_),(_>SHADOW
|
|
146. HEADROOM,MAX
|
|
147. HEART,PURPLE
|
|
148. HEARTS,JACK OF
|
|
149. HELIX,DOUBLE
|
|
150. HIEROPHANT,THE ARCANE
|
|
151. HOFFMAN,GREG
|
|
152. HOLMES,SHERLOCK
|
|
153. HORSE,CRAZY
|
|
154. I AM,SAM
|
|
155. ICOM,MR.
|
|
156. IDAP,IOWD
|
|
157. IDLE,BILLY
|
|
158. III,EPSILON
|
|
159. INSIDER,THE
|
|
160. INSTRUCTOR,THE
|
|
161. JACK,CRACKA
|
|
162. JAGGERS,BOB
|
|
163. JAMES,JESSE
|
|
164. JAY,EVIL
|
|
165. JENI,JINN
|
|
166. JOE,G.I.
|
|
167. JOHN,CRACKER
|
|
168. JOHNSON,FRED
|
|
169. KAY,DR.
|
|
170. KEY,DEGARMO &
|
|
171. KHAN,KERRANGHT,BLACK
|
|
173. KNIGHT,THE CELESTIAL
|
|
174. KNIGHT,WHITE
|
|
175. KODIAK <-,->
|
|
176. KOMMISAR,DER
|
|
177. KOUSIDIS,IVAN
|
|
178. KRACKER,THE
|
|
179. LAMBO,PIRATESOFT
|
|
180. LAWLESS,LORD
|
|
181. LEFTIST,THE
|
|
182. LEMIEUX,MARIO
|
|
183. LESTAT,VAMPIRE
|
|
184. LIGHT,BUD
|
|
185. LIGHTNING, KNIGHT
|
|
186. LOGIC,DIGITAL
|
|
187. LOOP,DEAD
|
|
188. LORD,SHADOW
|
|
189. LOVER,THE EGYPTIAN
|
|
190. LUCAS, THE 0PERATOR
|
|
191. LUTHOR,LEX
|
|
192. M.D.,DR. CRAZY
|
|
193. MAC,SIR
|
|
194. MACK,T-
|
|
195. MAD,MR
|
|
196. MAGICIAN,ZORLOFF
|
|
197. MAIDEN,IRON
|
|
198. MAN,HAC
|
|
199. MAN,TERMINAL
|
|
200. MAN,THE PHONE
|
|
201. MANIPULATOR,CODE
|
|
202. MARAUDER,THE
|
|
203. MARTYR,THE
|
|
204. MASTER, HATCHET
|
|
205. MASTER,CODES
|
|
206. MASTER,DELTA-
|
|
207. MASTER,STAR
|
|
208. MAX,MAD
|
|
209. MECHANIC,CHIEF
|
|
210. MENTOR,THE
|
|
211. MIDNITE,CAPTAIN
|
|
212. MINDED,ABSENT
|
|
213. MIRANDA,QUINTON J.
|
|
214. MONGREL,SPLIFF
|
|
215. MONK,CHIP
|
|
216. MUAD'DIB,PAUL
|
|
217. MURDERER,AX
|
|
218. MYRIAD,LORD
|
|
219. NELSON,_-STYLE-_
|
|
220. NICE,MR.
|
|
221. NOTCH,TOP
|
|
222. NUDITY,FRONTAL
|
|
223. OF IMRRYR,ELRIC
|
|
224. OF REALITY,MASTER
|
|
225. OIL,EWING
|
|
226. OMEN,THE
|
|
227. ONE,HANDSOMEST
|
|
228. ONE,KATO
|
|
229. OPPOSITION,PSYCHOTIC
|
|
230. ORACLE,THE
|
|
231. OUTRIDER,THE
|
|
232. OUTWORLD,FLINT OF
|
|
233. OVERLORD,THE
|
|
234. PANDEMONIUM,WASTED
|
|
235. PECHACEK,JOHN
|
|
236. PENGUIN,THE
|
|
237. PETRA, ACE
|
|
238. PEZ,MR.
|
|
239. PHLASH,JUMPIN' JACK
|
|
240. PHONESUCKER,THE
|
|
241. PHREAK,NYNEX
|
|
242. PHREAK-A-ZOID,THE
|
|
243. PHREAKER,PHANTOM
|
|
244. PHREAKO,PHREAKO
|
|
245. PIRATEER,BADGER
|
|
246. POLTERGEIST,ASTABULA
|
|
247. POPE,THE
|
|
248. PREFICT,FORD
|
|
249. PRODIGAL,THE
|
|
250. PROPHET,DOOM
|
|
251. PROPHET,THE
|
|
252. PSYCHEDELIC,THE
|
|
253. QUEST,ORYAN
|
|
254. QUITO,DON
|
|
255. RADIX,OTHO
|
|
256. RAVEN,STAR
|
|
257. RANGER,THE
|
|
258. RAT,SWAMP
|
|
259. REAPER,CHROMATIC
|
|
260. REQUEST,INTERRUPT
|
|
261. RIDER,GHOST
|
|
262. RIDER,MIDNIGHT
|
|
263. ROLLOVR,DETH
|
|
264. ROTTEN,JOHNNY
|
|
265. RUNNER,BLADE
|
|
266. RUNNER,SHADOW
|
|
267. RUSSO,FRANK
|
|
268. SALERNO,MIKE
|
|
269. SAXON,ANGLO
|
|
270. SECTOR,TWISTED
|
|
271. SENSEI,NINJA
|
|
272. SENSEI,THE
|
|
273. SEVEN,CONRAD
|
|
274. SHARP,FARLEY
|
|
275. SHERMAN,ROBERT
|
|
276. SHERWOOD,JOHN
|
|
277. SINISTAR,SILICON
|
|
278. SLASHER,MASTER
|
|
279. SMITH,BOOMER
|
|
280. SMITH,WINSTON
|
|
281. SQUIRE,THE
|
|
282. STALKER,DEATH
|
|
283. STARR,DAVE
|
|
284. STATE,SOLID
|
|
285. STEIN,PHREAKEN
|
|
286. STERN,HOWARD
|
|
287. STEVENS,FRANKLIN
|
|
288. STYLE,MR.
|
|
289. SWANN, DAVID
|
|
290. SWINDLER,SILICON
|
|
291. T. DISASTER,MAJOR
|
|
292. TERMINATOR,THE
|
|
293. THE DUCK,HOWARD
|
|
294. THE HACK,ZACK
|
|
295. THE PROLONGED,AGRAJAG
|
|
296. THE RIPPER,JACK
|
|
297. THIEF,THE
|
|
298. TONE,DIAL
|
|
299. TRADER,THE
|
|
300. TUCBBS,TUC
|
|
301. VICIOUS,SID
|
|
302. VIGILAN WAR,WIZARD OF
|
|
304. WARLOCK LORD,THE
|
|
305. WATCHER,THE
|
|
306. WATCHER,WOMAN
|
|
307. WATCHER,WOMEN
|
|
308. WATSON,SHITHEAD
|
|
309. WAVE,SHOCK
|
|
310. WAVE,SHORT
|
|
311. WEED,TUMBLE
|
|
312. WILLIAMS,REMO
|
|
313. WIZ KID,COMPUTER
|
|
314. WOLF,LONE
|
|
315. WONDERFUL,MR.
|
|
316. XEROX,MR.
|
|
317. YOUNG,TODD
|
|
318. ZAP,CAPT
|
|
|
|
|
|
This security agent "spotted messages from Shadow Hawk". Here are some of
|
|
Shadow Hawk's posts from Phreak Klass:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Numb: 31
|
|
Subj: SHIT.
|
|
From: SHADOW HAWK
|
|
Date: MON MAY 11 2:08:53 AM
|
|
|
|
Looks like I've got a lot to learn as far as the TELE part of telecom goes...
|
|
I've got a question about trunks: Would someone mind explaining just how they
|
|
work, how you can 'drop into' a trunk w/2600, what a physical trunk (assuming
|
|
its just wires) looks like, etc.
|
|
Also, around here there are these weird green manholes that look more like
|
|
portholes to tanks than manhole covers. They usually are accompanied by a box
|
|
of the same shade, which usually has a red light (enclosed) as an appendage.
|
|
My question is, what the hell are they? There are none close enough to my
|
|
locale for me to actually attempt to enter one, but if their 'insides' are as
|
|
hi-tech as the outside looks... you get the picture
|
|
Later,
|
|
(_>Shadow Hawk<_)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Numb: 32
|
|
Subj: Boxing
|
|
From: SHADOW HAWK
|
|
Date: FRI MAY 22 1:24:56 PM
|
|
|
|
I don't think it would be THAT hard. Probably just a small sequencer & about 16
|
|
bits of DRAM, as well as a timer & of course the tone generator and keyboard
|
|
encoder. Now that may sound complicated but with todays electronics it could
|
|
all be done with probably around 6 ICs.
|
|
|
|
I had something like this in mind a while ago, the ultimate Telecom/computer
|
|
tool. IT goes something like this: a 1 MHZ A/D and a 1 MHZ D/A converter (16
|
|
bit resolution each) are connected basically to whatever you want, and to the
|
|
computer via an RS-232 interface. 'Whatever you want' is your phone line, your
|
|
ham radio, or even your LAN. It's basically a computer controlled
|
|
oscilliscope/waveform generator, except that there's no way it could run at
|
|
full 1mhz without about 16 megs of 16 bit ram & a REALLY fast coprocessor to
|
|
convert the raw waveform data into more easily convertable data. I've been
|
|
looking for a tech to help me out with this one for a long time, but to no
|
|
avail.
|
|
|
|
(the purpose, in case it wasn't readily apparent from the above, is to
|
|
1) tone dial, 2) MF dial, 3) generate ANY modem standard, 4) FAX, 5) 'scope,
|
|
6) voice recognition? The list goes on and on...)
|
|
|
|
Enough ramblings;Later, Fnord,
|
|
(_>Shadow Hawk<_)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Numb: 36
|
|
Subj: Autovon
|
|
From: SHADOW HAWK
|
|
Date: MON JUN 1 9:20:07 PM
|
|
|
|
Executioner: I'm fairly certain that the '*' (I'm assuming that you mean the D
|
|
key on a modified touch tone keypad) connects you only to a testing device of
|
|
some sort. If my assumption was wrong, would you please explain how to do it?
|
|
It sounds interesting...
|
|
|
|
(_>SH
|
|
|
|
|
|
|
|
Numb: 35
|
|
Subj: mail? what mail?
|
|
From: SHADOW HAWK
|
|
Date: MON JUN 1 9:25:28 PM
|
|
|
|
I know of the multitude orating TH's, but that method was(is)
|
|
for a particular system where I can't even chown; I've got access to everything
|
|
else though.
|
|
Mail: As the title says, what mail? I thought I'd responded to your last mail,
|
|
but I guess not... Call me!
|
|
|
|
(_>Shadow Hawk<_)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Numb: 7
|
|
Subj: Reply to Question/Mercenary
|
|
From: SHADOW HAWK
|
|
Date: FRI MAY 22 1:09:44 PM
|
|
|
|
I've never had any problems with just dialing straight through 1 (one) sprint
|
|
950. Call me crazy, stupid, or an excessive taker of risks, but I've never even
|
|
had a run in with Sprint Security. Probably because I don't hack the codes out
|
|
myself, but that's another story.
|
|
(_>Sh
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Numb: 33
|
|
Subj: BUGS
|
|
From: SHADOW HAWK
|
|
Date: MON MAY 11 2:17:12 AM
|
|
|
|
This should really go on the phreak board, BUT...
|
|
If you're referring to the bugs that are sold by deco industries, and you can
|
|
tell by their ads: they always compare their bugs to a dime or a quarter,
|
|
they're actually not that bad a deal. The phone line bug that they sell will
|
|
trasmit about a quarter to a half a block, and is powered completely from the
|
|
phone line. Their other bug, the one that's powered by (I think) a 9 volt
|
|
battery & is itself the size of a quarter, will go about 1-2 blocks. This is
|
|
without any real antenna, (except of course the phone line, or the battery
|
|
wires, respectively) which would be pretty good, except that they transmit on
|
|
the FM band. If you can find a spot on FM where theres no station, and can tune
|
|
both your receiver and the bug-transmitter to the same frequency, then you've
|
|
got it made.
|
|
|
|
As to construction, they're actually pretty easy to build if you've ever used a
|
|
soldering iron in your life. If not, make friends with a tech. and ask her/him
|
|
to do it, it is little more than a 5 minute assembly job for anyone with ANY
|
|
experience.
|
|
|
|
Later, (_>Shadow Hawk<_)
|
|
|
|
|
|
|
|
======================================
|
|
|
|
|
|
"Shadow Hawk braged in the messages that he had successfully gained access
|
|
to AT&T computer files and said he was interested in creating some 'Trojan
|
|
horses' in the AT&T network."-
|
|
|
|
|
|
This statement in the article refers to the following messages that
|
|
this security official read on Phreak Klass. Here are the messages posted by
|
|
Shadow Hawk as well as the appropriate responses (all from PK, of course):
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Numb: 39
|
|
Subj: another 'stuff' already.
|
|
From: SHADOW HAWK
|
|
Date: MON MAY 11 2:21:47 AM
|
|
|
|
I better make this quick, 2 minutes left.
|
|
I've got all this source code (Notesfiles, UnAxcess, *ALL system 5 source) as
|
|
well as this list (399K) of AT&T Unixes on their net, and nothing to do with
|
|
them. Anyone out there wanna help me make some serious 'trojans?' I REALLY like
|
|
abusing the net...
|
|
Later,
|
|
(_>Shadow Hawk<_)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Numb: 38
|
|
Subj: uucp
|
|
From: SHADOW HAWK
|
|
Date: SUN MAY 31 2:16:59 AM
|
|
|
|
I've got this idea for a trojan horse type of deal...
|
|
A shellscript, run under nohup, with the 'victim' tty being the one I'm on, and
|
|
linked to the nohup.out file. I log out, and the nohup starts doin' it's thing.
|
|
I think you can figure out the rest for yourself. The question is, will itit rig
|
|
ht now but I'm doing an 8 meg uucp transfer through it
|
|
at the moment.
|
|
|
|
Later,
|
|
(_>SH
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Numb: 30
|
|
Subj: my first born...
|
|
From: DRUIDIC DEATH
|
|
Date: WED MAY 13 2:36:54 PM
|
|
|
|
I7ll trade you my first born for a
|
|
chance to hack those systems. I'm
|
|
pretty good at TH and decoy
|
|
programming, so sure I'll help you.
|
|
I'd love to download the 399K
|
|
list for you too. Let's work out
|
|
a deal, how about it?
|
|
|
|
DRU'
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Numb: 31
|
|
Subj: unix from the top down
|
|
From: THE PROPHET
|
|
Date: THU MAY 14 6:17:23 AM
|
|
|
|
I'd like to point out one thing about my file first... A rather embarrassing
|
|
errr. In the original version, I said "chown"
|
|
was used to change file modes, when the correct command is "chmod". This was
|
|
purely a typo, as I know the difference between the two commands. The format
|
|
for the command, though, was correct.
|
|
SState- there is one slight flaw in your trojan shell script. If the LOGNAME
|
|
variable is not set by root, it will not unprotect the password file when it is
|
|
run by the superuser. It's better to check the logname by using the logname
|
|
command, which is accomplished by using logname in place of $LOGNAME in the
|
|
script.
|
|
Shadow Hawke was asking about less easily detectable trojan horses. An easy way
|
|
to subvert a utility that normally has the uid bit set, like su, is to make a
|
|
copy of the utility and hide it in an out of the way directory, with the uid
|
|
bit NOT set. Then make a c program which does the following:
|
|
if a certain argument is given to the program (which replaces the real
|
|
utility), it executes the shell using the execvp C command.
|
|
otherwise, execute the copy of the utility.
|
|
Then set change ownership of the file to root, and set the uid bit, and name it
|
|
"su" (or whatever), and replace the real utility with it. Since su always has
|
|
the uid bit set and is always owned by root, it will be less easily detected,
|
|
unless the administrators notice the file size. This is easy to do, requires
|
|
only a minimal knowledge of C, and does not require the source code for the
|
|
subverted utility.
|
|
-TP
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
======================================
|
|
|
|
|
|
"Kathyryn Clark, a spokesman for AT&T, said 'I'm aware of it. Our
|
|
security systems alert us when there is this type of break'".-
|
|
|
|
I'm so sure. Shadow Hawk broke into many more systems than the ones
|
|
they busted him for.
|
|
|
|
|
|
======================================
|
|
|
|
|
|
"Later that month, another AT&T corporate security official spotted a
|
|
statement made by Shadow Hawk on another computer bulletin board in
|
|
Chicago."-
|
|
|
|
This bulletin board is most likely Ripco (Ripco International). Shadow
|
|
Hawk was a user at this bulletin board and took part in phreak/hack discussions
|
|
(and possibly posted hacked computers). Do not quote me on this. This is only
|
|
an assumption and has not been verified. The current telephone number to
|
|
Ripco is (312) 528-5020. It should also be noted that this was a different
|
|
AT&T corporate security official. A DIFFERENT one.... as if AT&T has been
|
|
monitoring all phreak/hack bulletin boards??? Both of these security
|
|
officials are being paid to monitor boards. Is it poss
|
|
security officials monitor phreak/hack bulletin boards?? Henry Kluepfel and
|
|
this security official are certainly monitoring bulletin boards!
|
|
|
|
|
|
======================================
|
|
|
|
"In that message, Shadow Hawk provided the names, telephone numbers, passwords
|
|
and other critical information needed to gain access to seven different AT&T
|
|
computers"-
|
|
|
|
It is not certain if any of these computers were the ones that Shadow
|
|
Hawk was busted for breaking into. And of course an AT&T security official
|
|
(one of those paid to monitor boards) read Shadow Hawk's message.
|
|
|
|
|
|
======================================
|
|
|
|
|
|
|