548 lines
26 KiB
Plaintext
548 lines
26 KiB
Plaintext
____________________________________________________________________________
|
|
____________________________________________________________________________
|
|
|
|
THE SYNDICATE REPORT
|
|
|
|
Information Transmittal No. 27
|
|
(Part 1 of 2)
|
|
|
|
Released January 18, 1990
|
|
Featuring:
|
|
________________________________________________
|
|
|
|
Editor's Note
|
|
"The World Around Us, Closing Out 1989"
|
|
|
|
NEW: Telenet PCP Thief Hacker
|
|
"Programmed by Brew Associates"
|
|
|
|
Dubbing Viruses
|
|
|
|
"Safe" Government Software
|
|
|
|
Poking Around Prodigy (IBM/Sears Joint Venture)
|
|
|
|
A Neuromancer Sharp Exert
|
|
|
|
Brief Notes from the Report
|
|
|
|
Vocabulary Tonic
|
|
________________________________________________
|
|
|
|
by The Sensei
|
|
Editor Syndicate Report Magazine
|
|
|
|
____________________________________________________________________________
|
|
____________________________________________________________________________
|
|
|
|
EXPOSITION: TSR
|
|
|
|
Once again, The Report accepts outside sources. Anybody can write/provide
|
|
information to The Syndicate Report. Articles/Information may be provided
|
|
through NANOTECH COLLUSION Bulletin Board System @612-476-4913. Any info
|
|
such as Busts, Phreaking, Hacking, Data / Telecommunications, and all new
|
|
developments on any the previous mentioned specialties will be: accepted,
|
|
labeled, and given full actual credit to the article/info provider(s), or
|
|
writer(s). --
|
|
|
|
** All articles have been presented by me unless shown at the end of the
|
|
article as the information provider(s), or writer(s). **
|
|
____________________________________________________________________________
|
|
____________________________________________________________________________
|
|
|
|
EDITOR'S NOTE: TSR
|
|
|
|
"The World Around Us, Closing Out 1989"
|
|
|
|
Wow! What a year: 1989. Look at all that has happened! I'm speaking
|
|
about underground and in reality. Here's a recap:
|
|
|
|
Underground / Reality:
|
|
|
|
Internet Worm Panama Invasion by U.S.
|
|
Intro of many new hacking utilities Jacob Wetterling Kidnapping
|
|
PCP Thief California Earthquake
|
|
Phry Code Pro Hurricane Hugo
|
|
Falken Phreak Tools
|
|
New version of Code Thief
|
|
A NEW VMB Hacker?
|
|
Media's Virus Scare FREEDOM FOR:
|
|
Code Thief is mentioned on T.V. E. Germany
|
|
Czechs!
|
|
Poland
|
|
Romanians
|
|
Hungry
|
|
|
|
OTHERS:
|
|
A struggling U.S.S.R.
|
|
The Irish Rebels
|
|
& of course the bloody failure
|
|
by the Chinese Students.
|
|
Alaskian Oil Spill
|
|
|
|
AT&T's first profit loss,
|
|
...AND MORE!
|
|
|
|
Just as 1989 was about the close quietly, the United States strikes
|
|
against the Noriegian Regime -- it's now dead. It's incredible that all of us
|
|
are currently witnessing history. You know about history, don't ya? Sure you
|
|
do. Remember sitting in class wondering what it would be like to live
|
|
during a time of absolute CHANGE. --And mostly for the better.
|
|
|
|
This issue is dedicated to 1989. May the 1990s reveal more.
|
|
|
|
|
|
;The Sensei / TSR Editor
|
|
____________________________________________________________________________
|
|
____________________________________________________________________________
|
|
|
|
NEW: TELENET PCP THIEF HACKER TSR
|
|
"Programed by Brew Associates"
|
|
|
|
Computer hacking utilities. They all start out with one single
|
|
purpose: To Gain Information. Isn't information gathering the basis for
|
|
hacks? What I mean is that basic hackers do menial jobs for hacks. A hack
|
|
uses that information (code/password, etc) to gain more information. It all
|
|
seems very irrelevant.
|
|
Now I come back to earth, and remember we all are human beings.
|
|
|
|
The under terra firma personality: Brew Associates has done it again,
|
|
with the swiftness of a prowler, he has created PC Pursuit Thief. The
|
|
Exciter's long rein at the top of PCP Hacker's has come to a halt. The end of
|
|
perfection for Code Thief has prompted him to go onto a more comfortable stall
|
|
via PCP Telenet. PCP Thief has the same similar style for with windows and
|
|
everything.
|
|
AND, I agree totally. Straight code abusing from your own home is
|
|
crazy. Dialing PCP shows little threat to hack/phreakdom.
|
|
|
|
I and Professor Falken has been Beta testing future releases of PCP
|
|
Thief. The first BETA version quicken returned to the drawing board. The
|
|
second was just about finished except some minor detail. After that, fancy
|
|
features were added to as savor.
|
|
|
|
PCP Thief v1.0
|
|
Features:
|
|
|
|
Public Access
|
|
Command Line Hacking
|
|
Timed Hacking from DOS
|
|
Full Modem Support
|
|
Alterable Pass/ID Templates
|
|
Generic Terminal Mode
|
|
Variable Speed Hacking
|
|
Full New Version Support
|
|
Online "Passes Found" Listing
|
|
Fancy colorful/rotating Windows
|
|
Online Credits Listing
|
|
Voluminous Descriptive Hacking Windows
|
|
Complete Documentation Included / Online Questions Answered
|
|
|
|
...And Best of All BUG FREE!
|
|
|
|
|
|
Questions, comments, threats, or compliments can be directed towards Brew
|
|
Associates, Phortune 500, via Nanotech Collusion BBS.
|
|
|
|
:::: Information Provided by Brew Associates ::::
|
|
:::: Brew Associates is contributing Programmer of PCP / Code Thief ::::
|
|
____________________________________________________________________________
|
|
____________________________________________________________________________
|
|
|
|
DUBBING VIRUSES:
|
|
|
|
I've gathered some more information about viruses. Mainly what's I've
|
|
done is gathered the names and what they dreadfully do to your unsuspecting
|
|
systems. If you have anything to add, dial Nanotech Collusion.
|
|
|
|
-- LEGEND --
|
|
|
|
* = Freshly Added
|
|
|
|
:::::::::::::::::::::::::::::::: VIRUSES :::::::::::::::::::::::::::::::::
|
|
|
|
:::: IBM PCs/COMPATIBLES ::::
|
|
|
|
1. The Friday the 13th Virus/Jerusalem: Reek havoc on COM and EXE files.
|
|
2. Datacrime Virus / Columbus Day Virus (1280/1168): Destroys FAT Table
|
|
3. Jerusalem Virus
|
|
4. The Cascade Virus: Falling Letters jumbled to bottom of screen.
|
|
5. The Pakistani Brain
|
|
6. 1701 Virus
|
|
7. Icelandic Virus
|
|
* 8. Lehigh: Trashes system and hard drive data.
|
|
* 9. Alameda: Corrupts files, causes "Out of Memory" errors.
|
|
* 10. DBASE Virus: .COM infector, corrupting data in DBF files.
|
|
* 11. Screen: Infects all .COM programs in directories
|
|
* 12. Ping Pong
|
|
* 13. Stoned
|
|
* 14. Den Zuk
|
|
* 15. Fu Manchu
|
|
* 16. Vienna (DOS 62)
|
|
* 17. April First
|
|
* 18. Ghost Virus / Icelandic Univ.: Infects .COM files & boot sectors.
|
|
* 19. Ping Pong: Replaces boot sector of infected system with boot virus
|
|
* 20. Dark Avenger: A Runaway infection in memory.
|
|
* 21. Alabama Virus: Infects .EXE files (increased 1560k) & FAT Infecter.
|
|
* 22. Ashar: Infecting by duplicating
|
|
* 23. Yankee Doodle: (Vienna) Running in the game, Outrun. Plays song.
|
|
* 24. Ghost Virus / GHOSTBALL Boot Version
|
|
* 25. Ghost Virus / GHOSTBALL COM Version
|
|
* 26. New Jerusalem
|
|
* 27. 2930
|
|
* 28. AIDS / VGA2CGA
|
|
* 29. Disk Killer / OGRE
|
|
* 30. 1536 / Zer0 Bug
|
|
* 41. MIX1
|
|
* 42. 3551 / SYSLOCK
|
|
* 43. Vacsina
|
|
* 44. Ohio
|
|
* 45. Typo
|
|
* 46. Swap / Israeli Boot
|
|
* 47. 1514 / Datacrime 2
|
|
* 48. PENTAGON
|
|
* 49. Saratoga
|
|
* 50. 405
|
|
* 51. 1704 Format
|
|
* 52. 1280 / Datacrime
|
|
* 53. 1701 / Cascade
|
|
* 54. 1704 / Cascade-B
|
|
* 55. Stoned / Marijuana
|
|
* 56. 1704 / Cascade / Falling Letters
|
|
* 57. Ping Pong-B / Fall Letters Boot
|
|
* 58. DEN ZUK
|
|
* 59. Ping Pong / Italian / Bouncing Dot
|
|
* 60. VIENNA-B
|
|
* 71. VIENNA / 648 / DOS-68
|
|
* 72. Jersualem-B
|
|
* 73. YALE / Alameda
|
|
* 74. Jerusalem / 1813
|
|
* 75. SURIV03
|
|
* 76. SURIV02
|
|
* 77. SURIV01
|
|
|
|
:::: EUROPEAN -- VIRUSES ::::
|
|
|
|
* 1. Keldysh: TSR virus infecting .COM / .EXE's -- Letters Drop to bottom.
|
|
* 2. 3066 Virus (Traceback)
|
|
* 3. The Icelandic
|
|
* 4. Black Hole: Attack at Comp.Co-op, Moscow. A TSR .COM / .EXE Infector.
|
|
5. Datacrime-2: Destroys FAT
|
|
* 6. 405 Virus
|
|
* 7. DOS-62 Virus: Infects all .COM / .EXE Files -- Deleting.
|
|
|
|
:::: MACINTOSH ::::
|
|
|
|
1. Macmag Virus: The WISH FOR PEACE Virus
|
|
2. Scores Virus: Attacks prgs within Elec. Data Systems Corp.
|
|
* 3. nVIR: Attach of numerous Universities & Europe, through E-Mail.
|
|
|
|
|
|
:::: APPLE II ::::
|
|
|
|
*1. CyberAids
|
|
*2. Festering Hate: Infects .SYSTEM, or BASIC.SYSTEM in root directory.
|
|
All Volumes/HDs/Ram Disks destroyed.
|
|
*3. Load Runner: A european virus found in a copy program: Speedy Smith.
|
|
Also by booting an uninfected disk after running an infected
|
|
disk. RAM Resident, maybe?
|
|
|
|
:::: AMIGA ::::
|
|
|
|
*1. Phantasumble
|
|
*2. IRQ: Deadly, but curable.
|
|
*3. Byte Warriro: Causes read/write errors, GURUs
|
|
*4. 16 BIT
|
|
|
|
::::::::::::::::::::::::::::::::: WORMS ::::::::::::::::::::::::::::::::::
|
|
|
|
For All/Other Computer Systems
|
|
|
|
1. Internet Worm. M.J.'s babe.
|
|
2. WORMS Against Nuclear Killers: "WANK."
|
|
________________________________________________
|
|
|
|
Any additions can be made via Nanotech Collusion BBS, via Feedback, or
|
|
personal Email for privacy.
|
|
|
|
;The Sensei
|
|
____________________________________________________________________________
|
|
____________________________________________________________________________
|
|
|
|
"SAFE" GOVERNMENT SOFTWARE: TSR
|
|
|
|
|
|
As early as 1967, the Department of Defense formed a task force to set
|
|
security standards for computers, operating systems, and networks. The goal:
|
|
to define the criteria for "trusted" systems that could be relied upon to
|
|
police themselves and their users and prevent sensitive information from
|
|
getting into the wrong hands. After more than a decade of research, their
|
|
efforts were compiled in the "DEPARTMENT OF DEFENSE TRUSTED SYSTEM EVALUATION
|
|
CRITERIA" --known as "THE ORANGE BOOK" because of its orange cover.
|
|
|
|
The Orange Book specifies four levels, or divisions, of protection,
|
|
designated (in order of increasing security) D, C, B, and A. Systems in
|
|
Division A systems must be mathematically proven to be secure (a requirement
|
|
that's barely within reach of any commercial computer OS). The control
|
|
objectives for each level are divided into three categories: security policy,
|
|
accountability, and assurance.
|
|
|
|
() Mandatory Policy = Admin. grants users access to specific data -- and
|
|
that such data ONLY. A user has access to data for a
|
|
good reason. 1, that person has proper clearance;
|
|
and 2, the person has a need to know the information
|
|
for his/her job. A user with this access can grant
|
|
other such access.
|
|
|
|
() Accountability = Makes sure that users are accountable for their
|
|
actions. There are 3 requirements to ensure
|
|
this accountability. First, the user has to ID
|
|
her/his self to the system. Second, a password
|
|
is then required. And third, a user's actions
|
|
must leave an audit trial so that admins. can find
|
|
out "who dunnit" if information is abused.
|
|
|
|
() Assurance Policy = Requires that the system be designed, tested, and
|
|
verified so as to make sure that first two object-
|
|
ives are met. There must be a high degree of
|
|
confidence that the system's security mechanisms
|
|
can't be circumvented by bright "hackers" or
|
|
knowledgeable users. The Orange Book emphasized that
|
|
the assurance process doesn't end when the system is
|
|
shipped or installed; every system modification and
|
|
every new feature that's added needs to be checked
|
|
for security breaches. Only then, can the system be
|
|
TRUSTED.
|
|
|
|
*** TO BE CONTINUED:
|
|
Part Two Will Explain the FOUR LEVELS of PROTECTION.
|
|
|
|
|
|
;The Sensei / TSR Editor
|
|
|
|
____________________________________________________________________________
|
|
____________________________________________________________________________
|
|
|
|
POKING AROUND PRODIGY (IBM/Sears Joint Venture): TSR (t.s)
|
|
|
|
I got my first bill for Prodigy this month, after three spine tingling
|
|
FREE months on-line Prodigy. 9.95$ just as they said it would be. I don't
|
|
even remember if that was before or after Minnesota 6% sales tax.
|
|
|
|
IMPRESSED WITH? I'm impressed with the amount of attention they are giving
|
|
Prodigy. I've received many newsletters, about 5 or 6 just in one month. The
|
|
letters explain all the new enhancements online -- easily accessible with their
|
|
(J)ump words -- a very decent idea. I'm also impressed with the on-line
|
|
technical help, both via 1-800 and HELP99A (Mailbox Address). The technical
|
|
help via HELP99A isn't real bright, but they do offer some good basic
|
|
hints/information, and best of all -- they've always responded. I've ask them
|
|
about the CGA color, and if a new version of the Prodigy terminal software were
|
|
coming out to support mice, etc. They explained both very completely. A new
|
|
version is expected in Spring, maybe February. And lastly, this month, I'm
|
|
impressed with the amount of people are accepting Prodigy. I get quite a bit
|
|
of feedback about Prodigy from users, and most don't even mention the slowness
|
|
and generic look....probably because most are generic users.
|
|
|
|
One last word about updates. Your Prodigy software is actually updated
|
|
right under you nose. How? You say? Well, each time you log into Prodigy, it
|
|
uploads updated modification directly to your harddrive/floppies. It stores
|
|
the updated information in a file by the name of STAGE.DAT. So if you see this
|
|
things fluctuating in size/date -- you know what's it doing. What's the
|
|
current level of modification? There are two numbers that tell you. One is on
|
|
the label of the Prodigy Software installation disks (v2.1) in the lower right
|
|
hand corner. There's another number in the lower right corner of the logon
|
|
screen. It refers to an internal system Prodigy uses to denote changes and
|
|
modifications, many of which are minor and incremental. That number should be:
|
|
6.03.xx (The 'xx' will be a number, but that number doesn't matter as much as
|
|
the 6.03).
|
|
|
|
NO IMPRESSION LEFT: The service is good, but I didn't pay for it. There
|
|
has to be more information online that interests me. More
|
|
political/social/telcom information and news. Number two, the speed HAS to
|
|
increase. Sometimes I don't have access to a 2400 baud modem, and I'm caught
|
|
using 1200 bps. There is a huge difference! Time is money these days, and
|
|
Prodigy isn't delivering me my moneys worth (even though it's only 9.95/month).
|
|
And of course those annoying ONLINE error codes: CM, DM, API, OMCM, to
|
|
name a few. Here's a run down on them...
|
|
|
|
CM: Problem detected by comm. module which controls the flow of
|
|
information between your PC, modem, the fone lines and computer you
|
|
call when you logon the service. Usually you'll see CM4, 5 or 6. The
|
|
type of error can be caused by local connections, or you may be
|
|
logging into the service during the off hours. Just reconnect to
|
|
Prodigy...it usually clears the air.
|
|
|
|
API: Indicates a problem in a particular usage on the service -- the one
|
|
you were just using. Problems like this are usually only momentary,
|
|
in time, and self correct. API 8 or API 15 imply that the PC isn't
|
|
getting enough memory to Prodigy. Check & clear resident programs.
|
|
|
|
DM: The scene module shows this code when there's not enough PC memory
|
|
available. You can boot your system and logon again. Make sure you
|
|
have at least 512 ram. Nothing resident. Make a self-booting disk if
|
|
you have to accommodate.
|
|
|
|
OMCM: This code is narrative jointly by two different modules/scenes.
|
|
This is what happens: Every message (i.e. assortment of info) Prodigy
|
|
sends to your PC has two parts; the message contents, and special
|
|
info. Prodigy's software uses to make sure the message itself is
|
|
error-free. If there is errors, you get an OMCM code. OMCM6 is a
|
|
version of this code that means you're not using the most recent
|
|
version of Prodigy -- version 2.1. If you don't, dial 800-767-3664
|
|
for you'll receive it free of charge. OMCM9 indicates a poor
|
|
transmission, once again, or line quality. Also, your message
|
|
expected by your system was not received. Rather than have you wait
|
|
for a message that isn't coming (and thereby tie you up), Prodigy
|
|
sends this error code. You might as well relog in.
|
|
|
|
If you don't have the latest version of Prodigy, dial 1-800-356-3664 and
|
|
you'll receive the updated version in the mail.
|
|
|
|
(Information provided via experience with Prodigy)
|
|
(Prodigy Services Co., 445 Hamilton Ave., White Plains, NY, 10601)
|
|
|
|
|
|
;The Sensei / TSR Editor 1990
|
|
|
|
____________________________________________________________________________
|
|
____________________________________________________________________________
|
|
|
|
A NEUROMANCER SHARP EXERT:
|
|
|
|
Case was 24. At 22, he'd been a cowboy,
|
|
a rustler, one of the best in the Sprawl. He'd
|
|
been trained by the best, by McCoy Pauley and Bobby
|
|
Quine, legends in the biz. He'd operated on an
|
|
almost permanent adrenaline high, a by product of
|
|
youth and proficiency, jacked into a custom
|
|
cyberspace deck that projected his disembodied
|
|
consciousness into the consensual hallucination
|
|
that was the matrix. A thief, he'd worked for
|
|
other, wealthier thieves, employers who provided
|
|
the exotic software required to penetrate the
|
|
bright walls of corporate systems, opening windows
|
|
into rich fields of data.
|
|
|
|
$$$$$$$$$$$$$
|
|
|
|
Case's virus had bored a window
|
|
through the library's command ice.. He punched
|
|
himself through and found an infinite blue space
|
|
ranged with color-coded spheres strung on a tight
|
|
grid of pale blue neon. In the nonspace of the
|
|
matrix, the interior of a given data construct
|
|
possessed unlimited subjective dimension. He began
|
|
to glide through the spheres as if he were on
|
|
invisible tracks.
|
|
|
|
Here, this one.
|
|
Punching his way into the sphere, chill blue
|
|
neon vault above him starless and smooth as
|
|
frosted glass, he triggered a subprogram
|
|
that effected certain alterations in the
|
|
core custodial commands.
|
|
|
|
Out now. Reversing smoothly,
|
|
the virus reknitting the fabric of the window.
|
|
DONE.
|
|
|
|
:::: From William Gibson ::::
|
|
:::: Author of Neuromancer, 1984 ::::
|
|
____________________________________________________________________________
|
|
____________________________________________________________________________
|
|
|
|
::::::::::::::::::::::: SYNDICATE REPORT BRIEF NOTES :::::::::::::::::::::::
|
|
|
|
// AT&T Announces Cutts //
|
|
|
|
AT&T said it will drop about 8,500 positions in 1990, adding to the 25,000
|
|
jobs expected to be eliminated in 1989. AT&T had 298,000 employees at the end
|
|
of September. Automated switching technology has allowed AT&T to cut down on
|
|
operators. Also, many employees who install phone equipment are being phased
|
|
out as the company goes to high-tech digital equipment.
|
|
________________________________________________
|
|
|
|
// Sprint, Bell Make Agreement //
|
|
|
|
Pacific Bell and US Sprint Monday announced an agreement to develop and
|
|
market complementary 800 services. Why: To simplify the ordering, billing and
|
|
trouble reporting of 800 services in California. Terms: The companies will make
|
|
their 800 services available through a single call to either Pacific Bell or US
|
|
Sprint.
|
|
________________________________________________
|
|
|
|
// Firm Provides Networking ISDN //
|
|
|
|
General DataComm will fulfill an order for the world's first installation of
|
|
a multiplexer network. Use: With ISDN services to provide a virtual private
|
|
network using Telecom Australia's ISDN offering called "Macrolink." Customer:
|
|
Not named until the end of the first quarter of 1990, when the ISDN network is
|
|
installed and operational.
|
|
|
|
____________________________________________________________________________
|
|
___________________________________________________________________________
|
|
|
|
::::::::::::::::::::::::::: TSR Vocabulary Tonic ::::::::::::::::::::::::::
|
|
|
|
What "Vocab. Tonic" is, is a list of acronyms and definitions to help
|
|
educate the ignorant hacker. With an extensive vocabulary, there is virtually
|
|
nothing one can't learn. Study on...
|
|
|
|
Bit Stream: Refers to a continuous series of bits being transmitted on a
|
|
transmission line.
|
|
|
|
CCSS: (Common Channel Signaling System) A systems whereby all signalling
|
|
for a number of voice paths in carried over one common channle,
|
|
instead of within each individual channel.
|
|
|
|
DTMF: (Dual Tone Multi-Frequency) The keys on any standard tone fone.
|
|
|
|
EE Signal: (End-to-End Signaling) A mode of network operation in which the
|
|
originating central office (or station) retains control and
|
|
signals directly to each CO (Central Office) as trunks are added
|
|
to the connection.
|
|
|
|
PRIMOS: This is an operating system on the Prime Supermini and mainframe
|
|
computer systems.
|
|
|
|
TSPS: (Traffic Service Postal System) Dial '0' Operator.
|
|
|
|
____________________________________________________________________________
|
|
____________________________________________________________________________
|
|
|
|
:::::::::::::::::::::::::: TSR "Quote of the Month" ::::::::::::::::::::::::
|
|
|
|
"Computing with anti-radioactive glasses....
|
|
will be the wave of the coming..."
|
|
|
|
-Tech E. Teddy
|
|
|
|
____________________________________________________________________________
|
|
____________________________________________________________________________
|
|
|
|
TSR will accept additional sponsor/support Systems. If you have a certain
|
|
interest in the Report, and wish to provide support to TSR -- Leave your BBS
|
|
number -- and any other information on Nanotech Collusion Bulletin Board
|
|
Systems.
|
|
____________________________________________________________________________
|
|
____________________________________________________________________________
|
|
|
|
N A N O T E C H C O L L U S I O N
|
|
6 1 2 - 4 7 6 - 4 9 1 3
|
|
|
|
- The Syndicate Report Support -
|
|
- Bulletin Board System -
|
|
- Accommodating 19.2k bps, Over 130+ Megs, P/H Msg Bases, & Files -
|
|
____________________________________________________________________________
|
|
____________________________________________________________________________
|
|
|
|
This concludes this Transmittal No. 27
|
|
(Part 1 of 2)
|
|
|
|
Released January 18th, 1990
|
|
|
|
by The Sensei
|
|
Editor of The Syndicate Report
|
|
____________________________________________________________________________
|
|
____________________________________________________________________________
|
|
|