[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]


..[ Phrack Magazine ]..
.:: Covert Paths ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ]
Current issue : #29 | Release date : 1989-11-17 | Editor : Taran King
Phrack Inc. XXIX IndexKnight Lightning & Taran King
Phrack Pro-Phile XXIX on Emmanuel GoldsteinPhrack Staff
Introduction to the Internet Protocols II: Chapter Nine of the FTSKnight Lightning
Network Miscellany IITaran King
Covert PathsSynthecide & Cyber Neuron Limited
Bank Information compiledLegion of Doom
How We Got Rich Through Electronic Fund TransferLegion of Doom
The Myth and Reality About EavesdroppingPhone Phanatic
Blocking of Long-Distance Calls...Jim Schmickley
Phrack World News XXIX Part 1Knight Lightning
Phrack World News XXIX Part 2Knight Lightning
Phrack World News XXIX Part 3Knight Lightning
Title : Covert Paths
Author : Synthecide & Cyber Neuron Limited
                                ==Phrack Inc.==

                     Volume Three, Issue 29, File #5 of 12

               [-][-] [-][-] [-][-] [-][-] [-][-] [-][-] [-][-]
               [-]                                          [-]
               [-]               Covert Paths               [-]
               [-]                                          [-]
               [-]                    by                    [-]
               [-]                                          [-]
               [-]    Cyber Neuron Limited and Synthecide   [-]
               [-]                                          [-]
               [-]             November 1, 1989             [-]
               [-]                                          [-]
               [-][-] [-][-] [-][-] [-][-] [-][-] [-][-] [-][-]


When cracking a system, it is important for you to use a path to the system
that will not lead the authorities to your door step.

There are several methods for doing this and all of them will depend on your
destination, available time, goal and the phase of the moon.  This article
deals mostly with cover attacks via a connected network.

If attacking via a phone link:

  o  Tap in to your local payphone line and red box or "sprint" the call.

  o  Using a long haul service (like Sprint or MCI) to dial into systems in
         remote cities.  [This should hinder a track by a good order of
         magnitude.]

  o  Use a midnight packet switching network (eg: PC-Pursuit, Tymnet, et. al.)

  o  All the above.


If attacking from a network (eg: the Internet) there are ways of spoofing the
packet headers, but this requires superuser privileges on the system you are
attacking from and a fair amount of 'C' programming expertise.  Therefore, this
will not be discussed here in any more detail.

Another obvious trick is to use network routers and gateways along with guest
accounts to "route" your data path.  This will cause the person tracking you to
have to go though more red tape and hassle to track you.  This gives you more
time to cover your tracks.

Some useful paths I know of are:

accuvax.nwu.edu
cory.berkeley.edu
violet.berkeley.edu
headcrash.berkeley.edu


    host: violet.berkeley.edu           host: headcrash.berkeley.edu
    account: nobody                     account: netgate
    net address:128.32.136.22           net address: 128.32.234.31


    host: cory.berkeley.edu             host accuvax.nwu.edu
    account: terminal                   account: telnet
    net address: 128.32.134.6           net address: 129.105.49.1


    host: lightning.berkeley.edu        host: score.stanford.edu
    port: 8033                          account: guest
    net address: 128.32.234.10          net address: 36.8.0.46


The accounts nobody, netgate, and terminal at Berkeley are accounts that were
installed so that people can use the system to rlogin or telnet to an account
elsewhere without a local login (or so I am told by the local hackers [Hi
Audrey...]).  The lightning path/method can be accessed by the command:
"telnet lightning.berkeley.edu 8033".

I am interested in hearing about other Internet access accounts that are
available out there.  If you know of any please send them in.

Tymnet is also a useful method of gaining access to systems.  From Tymnet, you
can hook up to just about any computer and use the other methods to go one step
further.  It's not until you are traced back to the computer you linked to from
Tymnet that they can even begin to follow you back.  My understanding is that
for a systen to find your Tymnet node, they must contact Tymnet personally and
ask them to put a trap on their connection.

For more infomation concerning Tymnet see the article "Hacking & Tymnet" by
Synthecide in Phrack Inc. Newsletter Issue XXX.

           **********************************

                        >--------=====END=====--------<
[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2014, Phrack Magazine.