[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]


..[ Phrack Magazine ]..
.:: Phrack World News XI ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ]
Current issue : #11 | Release date : 1987-02-17 | Editor : Taran King
Index to Phrack ElevenTaran King
Phrack Pro-Phile VIII on Wizard of ArpanetTaran King
PACT: Prefix Access Code TranslatorThe Executioner
Hacking Voice Mail SystemsBlack Knight from 713
Simple Data Encryption or Digital Electronics 101The Leftist
AIS - Automatic Intercept SystemTaran King
Hacking Primos I, II, IIIEvil Jay
Telephone Signalling MethodsDoom Prophet
Cellular Spoofing By Electronic Serial Numbers donatedAmadeus
Busy Line VerificationPhantom Phreaker
Phrack World News XKnight Lightning
Phrack World News XIKnight Lightning
Title : Phrack World News XI
Author : Knight Lightning
                               ==Phrack Inc.==

                  Volume Two, Issue Eleven, Phile #12 of 12

PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
PWN                                                                         PWN
PWN                      *>=-{ Phrack World News }-=<*                      PWN
PWN                                                                         PWN
PWN                                Issue XI                                 PWN
PWN                                                                         PWN
PWN                      Written, Compiled, and Edited                      PWN
PWN                           by Knight Lightning                           PWN
PWN                                                                         PWN
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN

Computer Bulletin Boards                                       January 8, 1986
------------------------
By The KTVI Channel 2 News Staff in St. Louis

Please keep in mind that Karen and Russ are anchor persons at KTVI.
All comments in []s are by me.-KL
 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Karen:  If Santa Claus brought you a computer for Christmas, beware of seeing
        a few things you may not have bargained for.  Computer bulletin boards
        have spread by the thousands over the past few years and now some
        people are concerned that the electronic messages may have gotten a
        bit out of hand.

Russ:  In its simplest definition, a computer bulletin board is a program or
       message that can be accessed by other computers via telephone lines.
       Anyone who has a home computer and a modem can receive and transmit to
       computer bulletin boards.  There are thousands of them nationwide, but
       some are causing quite a stink [What a profound statement Russ].

               [Flash to a picture of a geeky looking teenager]

       Meet Jason Rebbe, he is a 16 year old computer whiz who a few months
       ago accidentally tapped into a bulletin board called Dr. Doom's Castle.
       [Sorry to break in here Russ, but why is this guy a computer whiz?
       Just because he has a computer?  Hey Russ, look a little closer, isn't
       Jason sitting in front of a Commodore-64?  I thought so.  Oh yeah one
       other thing, this BBS Dr. Doom's Castle has no known relation to Dr.
       Doom (512) or Danger Zone Private.]  Dr. Doom gives instructions on how
       to build bombs and guns [Lions and Tigers and Bears, oh my!].  Jason
       found the recipe for smoke bombs and tried to make one in his kitchen,
       it didn't work.  [Ba ha ha].

Jason:  I heard an explosion in the basement first and that's when I knew
        something was wrong.  I thought it would be really neat to just set it
        off someday when there was a lot of people around, just as a joke or a
        prank.  [Yeah, that would be K-Rad d00d!].  I didn't expect it to blow
        up my house.

Russ:  Jason wasn't hurt, but it cost about 2 grand [that's $2,000 to you and
       me] to repair the kitchen.  Jason's dad didn't take it well.

Bob Holloway:  Mad wasn't the word for it.  I, I was, I was past mad.

Russ:  Mr. Holloway called Southwestern Bell and AT&T to see what could be
       done about bulletin boards like Dr. Doom's Castle.  The answer was
       nothing.  The Bureau of Alcohol, Tobacco, and Firearms said the same
       thing.

Daniel Hoggart (Bureau of Alcohol, Tobacco, and Firearms): There is no
               violation in publishing the information.  The violation only
               occurs when someone actually follows through on the
               instructions and actually constructs a bomb.

Russ:  Another bulletin board that is becoming more and more prevalent these
       days is the Aryian Nation.  This one [bulletin board] in Chicago says,
       "If you are an anti-Communist you have made the right connection...on
       the other hand, if you are consumed with such myths as
       Judeo-Christianity, you most definitely dialed the wrong number."

Stan Anderman (Anti-Defamation League):  Some of this really extreme hatred
              is an attempt to create an environment where violence becomes
              acceptable.

Russ:  Like most computer bulletin boards the Aryian Nation message is legal
       and falls under free speech laws.  However, a bill is scheduled to go
       to congress this session outlawing the kinds of bulletin boards we saw
       here tonight.

       But, for the moment, hackers should not be too surprised if something
       unusual pops up on their computer terminal.  [Ahem, Russ, you did it
       again.  All computer users are *NOT* hackers.]

                  Typed For PWN's Usage by Knight Lightning
______________________________________________________________________________

MIT Unix:  Victim or Aggressor?                  January 23 - February 2, 1987
-------------------------------
Is the MIT system an innocent victim of hacker oppression or simply another
trap to capture unsuspecting hackers in the act?

It all started like this...

      [Some posts have been slightly edited to be relevant to the topic]

------------------------------------------------------------------------------
MIT
Name: Druidic Death
Date: 12:49 am  Mon Jan 20, 1986

Lately I've been messing around on MIT's VAX in there Physics Department.

Recently some one else got on there and did some damage to files.  However MIT
told me that they'll still trust us to call them.  The number is:

617-253-XXXX

We have to agree to the following or we will be kicked off, they will create a
"hacker" account for us.

<1>  Use only GUEST, RODNEY, and GAMES.  No other accounts until the
     hacker one is made.  There are no passwords on these accounts.

<2>  Make sure we log off properly.  Control-D.  This is a UNIX system.

<3>  Not to call between 9 AM and 5 PM Eastern Standard Time.  This
     is to avoid tying up the system.

<4>  Leave mail to GEORGE only with UNIX questions (or C).  And leave our
     handles so he'll know who we are.

------------------------------------------------------------------------------
Unix
Name: Celtic Phrost
Date: 4:16 pm  Mon Jan 20, 1986

Thanks Death for the MIT computer, I've been working on getting into them for
weeks.  Here's another you can play around with:

                                 617/258-XXXX
                                 login:GUEST

Or use a WHO command at the logon to see other accounts, it has been a long
time since I played with that system, so I am unsure if the GUEST account
still works, but if you use the WHO command you should see the GUEST account
needed for applying for your own account.

    -Phrost
------------------------------------------------------------------------------
Unix
Name: Celtic Phrost
Date: 5:35 pm  Mon Jan 20, 1986

Ok, sorry, but I just remembered the application account, its: OPEN
Gawd, I am glad I got that off my chest!

    -(A relieved)Celtic Phrost.

Also on that MIT computer Death listed, some other default accounts are:

          LONG          MIKE          GREG          NEIL          DAN

Get the rest yourself, and please people, LEAVE THEM UNPASSWORDED!

------------------------------------------------------------------------------
MIT
Name: Druidic Death #12
Date: 1:16 am  Fri Jan 23, 1987

MIT is pretty cool.  If you haven't called yet, try it out.  Just PLEASE make
sure you follow the little rules they asked us about! If someone doesn't do
something right the sysop leaves the gripe mail to me.  Check out my directory
under the guest account just type "cd Dru".  Read the first file.

------------------------------------------------------------------------------
MIT
Name: Ctrl C
Date: 12:56 pm  Sat Jan 24, 1987

MIT Un-Passworded Unix Accounts:   617-253-XXXX

ALEX   BILL   GAMES   DAVE   GUEST   DAN   GREG   MIKE   LONG   NEIL  TOM  TED
BRIAN    RODNEY    VRET     GENTILE    ROCKY    SPIKE     KEVIN    KRIS    TIM

And PLEASE don't change the Passwords....

         -=>Ctrl C<=-
------------------------------------------------------------------------------
MIT Again
Name: Druidic Death
Date: 1:00 pm  Wed Jan 28, 1987

Ok people, MIT is pissed, someone hasn't been keeping the bargain and they
aren't too thrilled about it.   There were only three things they asked us to
do, and they were reasonable too.  All they wanted was for us to not
compromise the security much more than we had already, logoff properly, not
leave any processes going, and call only during non-business hours, and we
would be able to use the GUEST accounts as much as we like.

Someone got real nice and added themselves to the "daemon" group which is
superusers only, the name was "celtic".  Gee, I wonder who that could have
been?  I'm not pissed at anyone, but I'd like to keep on using MIT's
computers, and they'd love for us to be on, but they're getting paranoid.
Whoever is calling besides me, be cool ok?  They even gave me a voice phone to
chat with their sysops with.  How often do you see this happen?

a little perturbed but not pissed...

DRU'
------------------------------------------------------------------------------
Tsk, Celtic.
Name: Evil Jay
Date: 9:39 am  Thu Jan 29, 1987

Well, personally I don't know why anyone would want to be a superuser on the
system in question. Once you've been on once, there is really nothing that
interesting to look at...but anyway.

-EJ
------------------------------------------------------------------------------
In trouble again...
Name: Celtic Phrost
Date: 2:35 pm  Fri Jan 30, 1987

...I was framed!! I did not add myself to any "daemon" group on any MIT UNIX.
I did call once, and I must admit I did hang up without logging off, but this
was due to a faulty program that would NOT allow me to break out of it, no
matter what I tried.  I am sure that I didn't cause any damage by that.

              -Phrost
------------------------------------------------------------------------------
Major Problems
Name: Druidic Death
Date: 12:20 pm  Sat Jan 31, 1987

OK, major stuff going down.  Some unidentified individual logged into the
Physics Dept's PDP11/34 at 617-253-XXXX and was drastically violating the
"agreement" we had reached.  I was the one that made the "deal" with them.
And they even gave me a voice line to talk to them with.

Well, one day I called the other Physics computer, the office AT and
discovered that someone created an account in the superuser DAEMON group
called "celtic". Well, I was contacted by Brian through a chat and he told me
to call him.  Then he proceeded to nicely inform me that "due to unauthorized
abuse of the system, the deal is off".

He was cool about it and said he wished he didn't have to do that.  Then I
called George, the guy that made the deal and he said that someone who said he
was "Celtic Phrost" went on to the system and deleted nearly a year's worth of
artificial intelligence data from the nuclear fission research base.

Needless to say I was shocked.  I said that he can't believe that it was one
of us, that as far as I knew everyone was keeping the deal.  Then he (quite
pissed off) said that he wanted all of our names so he can report us to the
FBI.  He called us fags, and all sorts of stuff, he was VERY!! [underline
twice] PISSED! I don't blame him.  Actually I'm not blaming Celtic Phrost, it
very easily could have been a frame up.

But another thing is George thinks that Celtic Phrost and Druidic Death are
one and the same, in other words, he thinks that *I* stabbed him in the back.
Basically he just doesn't understand the way the hacker community operates.

Well, the deal is off, they plan to prosecute whoever they can catch.  Since
George is my best friend's brother I have not only lost a friend, but I'm
likely to see some legal problems soon.  Also, I can forget about doing my
graduate work at MIT.  Whoever did this damage to them, I hope you're happy.
You really messed things up real nice for a lot of people.

Celtic, I don't have any reason to believe you messed with them.  I also have
no reason to think you didn't.  I'm not making an accusation against you, but
WHOEVER did this, deserves to be shot as far as I'm concerned.  Until this
data was lost, they were on the verge of harnessing a laser-lithium produced
form of nuclear fission that would have been more efficient than using the
standard hydrogen.  Well, back to the drawing board now.

I realize that it's hard to believe that they would have data like this on
this system.  But they were quite stupid in many other areas too.  Leaving the
superuser account with no password??  Think about it.

It's also possible that they were exaggerating.  But regardless, damage seems
to have been done.

------------------------------------------------------------------------------
MIT
Name: Phreakenstein
Date: 1:31 am  Sun Feb 01, 1987

Heck! I dunno, but whoever it was, I think, should let himself (the s00per
K-rad elyte d00d he is) be known.

I wasn't on MIT, but it was pretty dumb of MIT to even let Hackers on.  I
wouldn't really worry though, they did let you on, and all you have to prove
is that you had no reason to do it.

----Phreak
------------------------------------------------------------------------------
I wonder...
Name: Ax Murderer #15
Date: 6:43 pm  Sun Feb 01, 1987

I highly doubt that is was someone on this system.  Since this is an elite
board, I think all the users are pretty decent and know right and wrong things
to do.  Could be that one of the users on this system called another system
and gave it out!??  Nahh...shooting the asshole is not enough, let's think of
something better.

Ax Murderer
------------------------------------------------------------------------------
It was stupid
Name: Druidic Death #12
Date: 9:21 pm  Sun Feb 01, 1987

It seems to me, or, what I gathered, they felt that there were going to be
hackers on the system to begin with and that this way they could keep
themselves basically safe.

I doubt that it was Celtic Phrost, I don't think he'd be an asshole like that.
But I can't say.  When I posted, I was pretty pissed about the whole deal.
I've calmed down now.  Psychic Warlord said something to me voice the other
day that made me stop and think.  What if this was a set up right from the
start? I mean, MIT won't give me specifics on just what supposedly happened,
Celtic Phrost denies everything, and the biggest part of it is what George
said to me.

"We can forgive you for what you did to us if you'll promise to go straight
and never do this again and just tell us who all of your friends are that are
on the system".

I didn't pay much attention to that remark at first, now I'm beginning to
wonder...

I, of course, didn't narc on anyone.  (Who do I know??? hehe)

DRU'
------------------------------------------------------------------------------
Well
Name: Solid State
Date: 11:40 pm  Sun Feb 01, 1987

Well if they were serious about the FBI, I wouldn't take this too lightly.
Lately at Stanford there has been a lot of investigators that I've pinpointed
running around.  This is mainly due to the number of break-ins this summer.

Anyways, if a large college like MIT says they may call in the FBI, be wary,
but don't over-react.

SOLID STATE
------------------------------------------------------------------------------
Comments...
Name: Delta-Master
Date: 7:15 am  Mon Feb 02, 1987

It wouldn't surprise me if it was some kind of setup, it's been done before.

Delta-Master
------------------------------------------------------------------------------
Oh well...
Name: Evil Jay
Date: 8:56 am  Mon Feb 02, 1987

I think your all wrong.  The MIT lines have been around for a long time and
are widely known among the rodents.  Anyone with a g-file could hack out a
password on the system so it looks to me like someone just messed around and
just happened to use Phrost as a flunkie.  Oh well...

-EJ
------------------------------------------------------------------------------
All posts taken from:
               ___
              /   )
              \___  |         |            __
                  \ |_   _   _|  _        (_   _   _        _
              (___/ | ) ( \ ( | (_) \/\/  __) | ) ( \ \/\/ | )
                                              |
      \_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_/

                "We're not ELITE...  we're just cool as hell."
 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                 Information Provided indirectly/directly by

         Ax Murderer/Celtic Phrost/Ctrl C/Delta-Master/Druidic Death
                      Evil Jay/Phreakenstein/Solid State
______________________________________________________________________________

Phortune 500:  Phreakdom's Newest Organization               February 16, 1987
----------------------------------------------
For those of you who are in the least bit interested, Phortune 500 is a group
of telecommunication hobbyists who's goal is to spread information as well as
further their own knowledge in the world of telecommunications.  This new
group was formed by:

       Brew Associates/Handsomest One/Lord Lawless/The Renegade Chemist
             Quinton J. Miranda/Striker/The Mad Hacker/The Spiker

These eight members are also known as Board Of Directors (BOD).  They don't
claim to be *Elite* in the sense that they are they world's greatest hackers,
but they ARE somewhat picky about their members.  They prefer someone who
knows a bit about everything and has talents exclusive to him/herself.

One of the projects that Phortune 500 has completed is an individual password
AE type system.  It's called TransPhor.  It was written and created by Brew
Associates.  It has been Beta tested on The Undergraduate Lounge (Sysoped by
Quinton J. Miranda).   It is due to be released to the public throughout the
next few months.

Phortune 500 has been in operation for about 4 months, and has released two
newsletters of their own.  The Phortune 500 Newsletter is quite like the
"People" of contemporary magazines.  While some magazines cover the deep
technical aspects of the world in which we communicate, their newsletter tries
to cover the lighter side while throwing in information that they feel is "of
technical nature."   The third issue is due to be released by the end of this
month.
 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
             *>=-> The Phortune 500 Membership Questionnaire <-=<*

Note:  The following information is of a totally confidential nature.  The
       reason you may find this so lengthy and in depth is for our knowledge
       of you. We, with Phortune 500, feel as though we should know
       prospective members well before we allow them into our organization.
       Pending the answers you supply us, you will be admitted to Phortune 500
       as a charter member.  Please answer the following completely...
..............................................................................

Handle                          :
First Name                      :
Voice Phone Number              :
Data Phone Number               :
City & State                    :
Age                             :
Occupation (If Applicable)      :
Place of Employment (Optional)  :
Work Phone Number   (Optional)  :
Computer Type                   :
Modem Type                      :
Interests                       :
Areas Of Expertise              :
References (No More Than Three) :
Major Accomplishments (If Any)  :
..............................................................................
Answer In 50 Words Or Less;

^*^  What Is Phortune 500 in Your Opinion?

^*^  Why Do You Want To Be Involved With Phortune 500?

^*^  How Can You Contribute to Phortune 500?
..............................................................................

Please answer each question to the best of your ability and then return to any
Phortune 500 Board of Directors Member Or a Phortune 500 BBS:

           The Private Connection (Limited Membership) 219-322-7266
           The Undergraduate AE   (Private Files Only) 602-990-1573

                           Information provided by

             Quinton J. Miranda & Phortune 500 Board Of Directors
______________________________________________________________________________

PWN Quicknote
-------------
At the University of Rhode Island there is supposed to be some undercover
agent for Bay Bell.  Supposedly he hangs out at the library and watches for
people checking out the Bell Technical Journals.  Then he asks questions like,
'What do you want those for?' 'Do you know what 2600Hz is?' and other similar
questions. He isn't registered at the school and of course has no classes.
[Sounds bogus to me...oh well-KL].       Information by Asmodeus Rex (1/21/87)
______________________________________________________________________________

[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2021, Phrack Magazine.