[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]

..[ Phrack Magazine ]..
.:: Phrack Loopback Part II / Editorial ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ]
Current issue : #43 | Release date : 1993-07-01 | Editor : Erik Bloodaxe
IntroductionDatastream Cowboy
Phrack Loopback Part IPhrack Staff
Phrack Loopback Part II / EditorialPhrack Staff
Line Noise Part IPhrack Staff
Line Noise Part IIPhrack Staff
Phrack Pro-Phile on Doctor WhoDoctor Who
Conference News Part Ivarious
Conference News Part IIvarious
How To Hack Blackjack (Part I)Lex Luthor
How To Hack Blackjack (Part II)Lex Luthor
Help for Verifying Novell SecurityPhrack Staff
My Bust (Part I)Robert Clark
My Bust (Part II)Robert Clark
Playing Hide and Seek, Unix StylePhrack Accident
Physical Access and Theft of PBX SystemsCodec
Guide to the 5ESSFirm G.R.A.S.P.
Cellular InfoMadjus
LODCOM BBS Archive Informationunknown
LODCOM Sample Messagesunknown
Step By Step Guide To Stealing a CamaroSpy Ace
Acronyms Part IFirm G.R.A.S.P.
Acronyms Part IIFirm G.R.A.S.P.
Acronyms Part IIIFirm G.R.A.S.P.
Acronyms Part IVFirm G.R.A.S.P.
Acronyms Part VFirm G.R.A.S.P.
International Scenevarious
Phrack World NewsDatastream Cowboy
Title : Phrack Loopback Part II / Editorial
Author : Phrack Staff
                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 3 of 27

                                Phrack Loopback
                                    Part II

                      ToneLoc T-Shirt Offer

Yes, the rumors are true: A ToneLoc t-shirt is at last available.

The shirt is an extra large, 100% cotton Hanes Beefy-T, silk screened
with four colors on front and eight colors on back.

The front features an "anti-bell" logo, with your favorite corporate
symbol in blue under a slashed circle in red. The ToneLoc logo appears
above, with an appropriate quote below.

The back has six Tonemaps, visual representations of exchange scans,
contributed by ToneLoc'ers from around the globe. The exchange and
scanner's handle is printed below each Tonemap. The handles of the beta
testing team are listed below the maps.

If you act now, a free copy of the latest release of ToneLoc will be
included with your order! Please specify 3.5" or 5.25" disks.

$15 postpaid; add $5 for international orders.
Make your check or money order payable to "ToneLoc Shirt."

Send to:

ToneLoc Shirt
12407 Mopac Expwy N #100-264
Austin, TX  78758
Voice Mail (24 hours): 512-314-5460

- Mucho Maas
- Minor Threat

[Editor:  I have one of these.  The only hacker program immortalized in
          cotton.  Nifty!]


 The return of a telecom legend...

 &&  &&&&&&&  &&&&&          &&&&&&&&&&&  &&&&&&&&&  &&&&&&&&&&&&&&   &&&&&&&&
 &&   &&&&&   &&&&&&&&&  &&&&& &&&&&  &&  &&&&&&&&    &&&&&&&&&&&&&    &&&&&&&
 &&    &&&    &&&&&&&&&  &&&&   &&&&  &&  &&&&&&&  &&  &&&&&&&&  &&  &  &&&&&&
 &&  &  &  &  &&&&&&&&&  &&&  &  &&&  &&  &&&&&&&  &&  &&&&&&&&  &&  &&  &&&&&
 &&  &&   &&  &&     &&  &&  &&&  &&  &&  &&&&&&&  &&  &&&&&&&&  &&  &&&  &&&&
 &&  &&& &&&  &&  &&&&&  &&  &&&  &&  &&  &&&&&&&  &&  && &&&&&  &&  &&&&  &&&
 &&  &&&&&&&  &&  &&&&&  &&  &&&  &&  &&  &&&&&&&  &&  &&  &&&&  &&  &&&&&  &&
 &&  &&&&&&&  &&  &&&&&  &&       &&  &&  &&&&&&&  &&  &&   &&&  &&  &&&&&  &&
 &&  &&&&&&&  &&  &&&&&&&&&  &&&  &&  &&  &&&&&&&  &&  &&    &&  &&  &&&&  &&&
 &&  &&&&&&&  &&  &&&&&&&&&  &&&  &&  &&       &&      &&  &  &  &&  &&&  &&&&
 &&  &&&&&&&  &&    &&&&&&&  &&&  &&  &&&&&&&&&&&  &&  &&  &&    &&  &&  &&&&&
 &&  &&&&&&&  &&  &&&&&&&&&  &&&  &&  &&&&&&&&&&&  &&  &&  &&&   &&  &  &&&&&&
 &&  &&&&&&&  &&     &&&&&&&&&&&&&&&  &&&&&&&&&&&  &&  &&&&&&&&  &&    &&&&&&&
 &&  &&&&&&&  &&&&&&&&&&&&&&&&&&&&&&          &&&&&&&&&&&&&&&&&& &&   &&&&&&&&

                          S  O  U  T  H  W  E  S  T

                A Neon Knights/Metal Communications Experience

                                    _   _
                                   [ x x ]
                         cDc        \   /        cDc
                                    (' ')

              '..and none but the Bovine survived the onslaught'

                     -cDc-   CULT OF THE DEAD COW   -cDc-
                              cDc communications
                         -cDc-   D0PE SYSTEM   -cDc-

                                  Very K-Rad
                                No Lame Ratios
                               Running Baphomet
                              Sysd00d : Drunkfux
                             86,400 Seconds A Day
                            OoOOooOdlez o' T-Files
                           The Official HoHoCon BBS
                          New Pimping Tips Every Day
                         Tonz o' Nifty Ascii Pictures
                        Talk To Satan Himself.. Live!!
                       Free 5-Digit Metro K0DEZ For All
                      d0Pe Gifs Of Gail Thackeray Online
                     Read Hate Filled Nazi Skinhead Poemz
                    Home Of K-RAP : The K-Rad Ascii Possee
                   Learn How To Make Money! Just Ask Byron!
                  Necropheliacs & Kidporn Kollekt0rz Welcome
                 Y0 Y0 Y0 Lonely D00dz! We gotz girlie uzerz!
                Lots Of Message Bases With Really K-KeWL Names
               Is This Whole "Volcano Ad" Thing Stupid Or What?
              GNU Warez From The Future! We Have A Time Machine!
             I Think We Have One Of Those Big, EL8 Drive Thingies
            No Net Access? Submit Your cDc & Phrack Articles Here!
           The Only System Authorized By The Debbie Gibson Fan Club
          The Neon Knights Did NOT Die, We Just Went Way Underground
         This Thing Is Starting To Look Like That Album St0nerzz Like
        Mega KooL Games Like Lemonade Stand And Hunt The Wumpus Deluxe
       Hey! It's The Mashed Potato Mountain Thing From Close Encounters
      Users Include Lots Of Elite Peoplez You See On Shows Like Dateline
     That Really Trendy Super High Speed Modem All Those Warez DooDz Have
    cDc / CuD / dFx / Neon Knights / NIA / Phrack / uXu / Video Vindicator
   Telco / Systems / Networks / Security / Cellular / Satan / Death / K0DEZ


Hi there!

As a beginner in Cyberspace & a new reader of Phrack, I just wanna say thiz...

Keep the good work!!!!!.

I only have your latest issue, and I never read previous ones, so this
is maybe old stuff... but I would like to see the Infonet network and
Datapac covered in some of UR articles... let me know if u published something
in recent issues.

Greetings from South America,

(yes, it's an Alias!!!)

[Editor:  Well, InfoNet we've never done.  Any takers?  Datapac I
          personally scanned some time ago, but almost ALL of the
          100K of NUA's I found still work.  Maybe someone should
          take my script and re-scan it.  Anyone?  Class?  Bueler?]


begin contribution-------------------------------
VMS machines that have captive accounts often have accounts such as HYTELNET.
This is an account which will archie for you, or take you to a few select BBSs
or any of many boring things to do.  You simply log in as HYTELNET, there isn't
a password, and go through the menus.  Now, that's where the fun begins.  If
you use HYTELNET to telnet anywhere, while it is connecting, simply  type your
local telnet escape key (something like ^\ or ^]) and then........you have a
telnet prompt.  Unfortunately, if you close or disconnect, it will return to
the HYTELNET menus, and you can't open a new connection, since you're already
connected.  So, what you do is SPAWN whatever process you want.....you could
SPAWN TELNET or SPAWN FTP or SPAWN anything else for that matter.  SPAWN with
no arguments (the shell escape) does not work, however.  This works from any
captive account that telnets.  So, you can telnet to a VAX that has HYTELNET,
log in as HYTELNET, do what I told you, and then hack to wherever, since the
reports from the target site will show that HYTELNET@insert.vax.site committed
the heinous crimes that you did.
end contribution--------------------------------

[Editor:  Kaneda:  thanks for that tidbit.  Now I'm sure to get grief
          on IRC from someone coming from an odd site.  :)
          Give my regards to Tetsuo.  "But some day...we will be"]


  _   _
 [ x x ] cDc communications
  \   /  Global Domination Update
  (' ')  #12 - April 1st, 1993
Est. 1986

 New gNu NEW gnU new GnU nEW gNu neW gnu nEw releases for April, 1993:

 _________________________________/Text Files\_________________________________

221: "Sickness" by Franken Gibe.  Paralyzed by thoughts.  Rage!  Fight!  Dark!

222: "A Day in the Life of Debbie G1bs0n" by The Madwoman.  The pop idol faces
her arch enemy on the fields of ninja combat and in the arms of love.

223: "The B!G Envelope Stuffing Scam" by Hanover Fiste.  How to get money.
Make Sally Struthers proud of you.

224: "The Bird" by Obscure Images.  Story 'bout a sad guy who laughs at birds.
It's depressing.  Oi's a kooky guy.

225: "Tequila Willy's Position Paper" by Reid Fleming and Omega.  Unknown to
most, Tequila Willy thew his hat in the ring for the 1992 presidential
election.  Here's the paper detailing his positions on all the important
issues.  Better luck in '96, eh?

226: "Simple Cryptology" by Dave Ferret.  Introductory guide to cryptology
which also includes a good list of other sources to look into.

227: "Big Ol' Heaping Pile of Shit" by Suicidal Maniac.  Buncha poems about
lots of things.  Wacky.

228: "ISDN: Fucking the Vacuum Cleaner Attachments" by Reid Fleming.  Intended
for _Mondo 2000_, this file drops science about everyone's favorite future
phone system.

229: "The Evil Truth About Peter Pan" by Lady Carolin.  It's a whole mess of
things you and your puny little mind might not have noticed about this popular
kiddie (hah!) story.

230: "The 2:00 O'Clock Bus" by Tequila Willy and Bambi the Usurper.  Geriatric
porn with some doggy flavor.

 _____________________________/Other Stuff to Get\_____________________________

From: cDc communications/P.O. Box 53011/Lubbock, TX  79453

This is Swamp Ratte's stuff:

     All the cDc t-files on disk by mail, for convenience sake!  Specify
     MS-DOS or Apple II format 3.5" disks.  $3.00 cash.

     cDc stickers!  Same design as were flying around at HoHoCon, with the
     scary-lookin' cow skull.  k00l.  Send a SASE and 50 cents for a dozen of
     'em (or just send a dollar).

     Weasel-MX tape!  _Obvious_ 45-minute cassette.  This is Swamp Ratte's
     funk/punk-rock/hip-hop band.  It's a mess, but fun.  $3.00 cash.

     cDc hat!  Yeah, get yer very own stylin' black baseball cap embroidered
     with the cDc file-header-type logo on the front in white.  This isn't the
     foam-and-mesh cheap kind of hat; it's a "6-panel" (the hat industry term)
     quality deal.  Roll hard with the phat cDc gear.  $15.00 plus a buck for

     _Swingin' Muzak_ compilation tape!  An hour of rockin' tuneage from
     Weasel-MX (all new for '93), Counter Culture, Acid Mirror, Truth or
     Consequences, Grandma's V.D., and Sekrut Squirrel.  Lotsa good, catchy,
     energetic stuff for only $5.00 cash.
 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
From: FNORD! Publications/2660 Trojan Dr. #912/Green Bay, Wisconsin 54304-1235

This is Obscure Images' stuff:

     FNORD! 'zine #1 & #4 - $2.00 Each

     Shoggoth 912 #1 - $0.75

     For some snarly techno grooves, send away for the new tape from Green
     Bay's finest (and only) technorave sensation, I OPENING!  IO-Illumination
     Demo Tape (7 songs of joy) - $5.00
 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
From: Freeside Orbital Data Network/ATTN:dFx-HoHoCon-cDc/11504 Hughes Road #124
      Houston, TX  77089

This is Drunkfux's stuff:

     HoHoCon '92 T-Shirts : Black : XL : Elite : Stylish : Dope : Slammin'
     Only $15 + $2 shipping ($2.50 for two shirts).
     Your choice of either "I LOVE FEDS" or "I LOVE WAREZ" on front, where
     "LOVE" is actually a red heart, ala "I LOVE N.Y." or "I LOVE SPAM."
     On the back of every beautimus shirt is...

                                dFx & cDc Present

                                   HOHOCON '92

                                 December 18-20
                                 Allen Park Inn
                                 Houston, Texas

     HoHoCon '92 VHS Video : 6 Hours : Hilariously Elite : $18 + $2 Shipping

     Please make all checks payable to O.I.S.  Free cDc sticker with every
     order!  w0w!
 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
From: Bill's Shirt Thing/P.O. Box 53832/Lubbock, TX/79453

This is Franken Gibe's stuff:

     AIDS sucks!  Order a catalog!  Nifty t-shirts that make you happy.
     Proceeds go to local AIDS Resource Center.  Send a $0.29 stamp for the
 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
From: Teach Me Violence magazine/61 East 8th St./Suite 202/New York, NY  10003

This is The Pusher's stuff:

     Teach Me Violence 'zine:
     Issue #1 (Mr. Bungle, COC, Murphy's Law)
     Issue #2 (Helmet, Supertouch, Agnostic Front, American Standard)
     Issue #3 (Faith No More, Chris Haskett, Cathedral, Iceburn, Venom)
     $3.00 cash each
 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
From: A Day In The Life Of.../P.O. Box 94221/Seattle, WA  98124

This is Lady Carolin's stuff:

     A Day In The Life Of... 'zine, free with two stamps.

     Bi-monthly contact list of girlie bands/grrrl bands/female vocalists.  $1.
 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 __________________________________/cDc Gnuz\__________________________________

                           "cDc: savin' trees in '93"

Hiya once again, here's whassup:

NEW Internet FTP site: zero.cypher.com.  This is Drunkfux and Louis Cypher's
chilly-the-most deal.  Login as "anonymous" and get all the cDc stuph fast fast

NEW cDc Mailing list: Get on the ever-dope and slamagnifiterrific cDc mailing
list!  Send mail to cDc@cypher.com and include some wonderlessly elite message
along the lines of, "ADD ME 2 DA MAILIN LIZT!!@&!"

NEW Official cDc Global Domination Factory Direct Outlets:
Cyberspace.Nexus               +31-67-879307 [Belgium]
Mirrorshades BBS               903/668-1777
The Ministry of Knowledge      401/043-3446
The Crowbar Hotel              713/373-4031

We're always taking t-file submissions, so if you've got a file and want to
really get it out there, there's no better way than with cDc.  Upload text to
The Polka AE, or my Internet address, or send disks or hardcopy to the cDc post
office box in Lubbock, TX.

NEW updated CDCKC0W.TXT file.  All the information for sysops to get going
running Factory Direct Outlets.  It should be available from wherever you got
this Update.

NEW CDCV9.ZIP is out containing cDc t-files 201-225.  Factory Direct Outlet
sysops should get this and put it up on their systems.

See ya in May.

S. Ratte'
cDc/Editor and P|-|Ear13zz |_3@DeRrr
"We're into t-files for the girlies and money."

Write to: cDc communications, P.O. Box 53011, Lubbock, TX  79453.
Internet: sratte@cypher.com, sratte@mindvox.phantom.com.

[Editor:  Whew.  Any word on those cDc Glow in The Dark Toilet
          Seat Covers?  I've got my 29.95 ready!]


Hey there a few of us use this account and wuld like to get phrack
sent to us here if at all possible... :)
We are all Australians and all read your magazine to death..
a friend of mine runs a board called shred til ya ded which is basically
a hpac and warez assortment... nothing 0 day but definately good for hacking
info... we are in the middle of getting all of your mags online at the moment
you mentioned in phrack 42 that you would like people from other countries
to write pieces about the scene there... well depending on the kind of thing
you want i would be more than happy to give it a go with some mates

[Editor:  Darkstar and anyone else--send me your files about your
          scenes in other countries.  Nearly everyone who promised me
          a file about their country flaked out.  You'll see who did
          send me a file later in this issue.  Other countries:  get
          off your duffs and send me a file!  We want to know what
          goes on there!  Boards, Busts, History, Hackers, Hangouts,
          Groups, Greats, Legends, Lore, EVERYTHING!]


I remember seeing a message somewhere on the WELL saying an issue of
Phrack carried listings of Viruses.  Could you tell me which one(s)?

Also, do you know of any sites which have virus listings archived ?


Jon Barber

[Editor:  Well, John, Phrack doesn't carry virii info.  You might
          check around for 40hex.  Personally, I think virii
          are vastly overrated hype driven onward by McAffee
          and other self-serving interests.  That is why we
          ignore them.  (That is also why I don't mention them
          when I lecture on computer security...they are no
          big thing.)]



So I was reading Phrack 42's listing for SprintNET nodes... But there was
no information on how to access it..

What are the ACNS For the Sprintnet?  Is there a Phrack out that details
use of the SprintNET..

Would appreciate ANY and ALL, as I've never heard of it being used widely
like the Internet, and would like to know how to use it..

Jack Flash...

[Editor:  Jack...you kids are spoiled.  You and your Internet.  Hrumph.
          Remember when Arpanet was like a 20 or so Universities and
          Contractors, and tied to about 100 bases thru Milnet?  No?

          To answer your question, Sprintnet (used to be Telenet, and
          always will be to me) is a public packet switched network.
          It can be accessed in nearly EVERY city in the USA, and in
          many large cities in other countries.

          The Toll-Free dialups are:  300-2400:  800-546-1000
                                     9600 v.32:  800-546-2500

          At the TERMINAL= prompt, type D1.  Then to find a local
          dialup, at the @ prompt type MAIL.  Login as username
          PHONES password PHONES.]


RE: Loop-Back

I was wondering if it would be possible for you to do something on Novell LAN
security, as we have one at my high school. I was also wondering about
bluebox tones...in my area, if you call  into the next county, sometimes you
hear what sounds like bluebox tones. I had thought these lines were digital,
and therefore, would not require tones of any type.. any ideas?

RF Burns

[Editor:  As for the Novell...check later in this issue.
          As for the MF tones...when calls go from one area to another
          it is quite common to hear multi-frequency tones.  Depending
          upon the way the call is routed, your particular pick of LD
          carrier and the equipment between you and the destination,
          you may hear these tones.  You may even be one of the lucky
          ones, and be able to seize a trunk.  Using certain LD carriers
          you can still box, but usually you are stuck with a trunk that
          can't get out of the area.  Alas.]


Hi -

I'm a student in the MLS program here at SUNY Albany.  I
found out about Phrack while researching a paper for my public policy class,
on the ECPA and shit.

Well, I gave a fabulous 45-minute presentation on it all and then wrote
an even better paper for which I was rewarded with an A as well as an A
for the class.  Turns out John Perry Barlow and Mitch Kapor are heroes of
my professor as well.

So now I'm hooked.  For my thesis I'm writing a user manual for librarians
on the Internet and helping teach a class in telecommunications.

Just wanted to let you phrack-types know you're my heroes and I want to be
a member of the phrack phamily.  Can't send any money, though.  *:(

Keep the faith,
        hopey t

[Editor:  That's really great!  Usually profs are terribly anal about
          anything regarding Phrack and/or hacking.  You are very
          lucky to have had such an instructor.  Congrats on the
          class and good luck with your thesis!]


    I was just glancing through Phrack #42, and read the portion
that sez that all computer professionals (essentially) have to
delete this and even old copies of Phrack.
    Coupla questions: I'm a Network Administrator for a University,
do I have to comply? It's not like I am a thug from Bellcore or
anything like that. Although one of the things I am concerned with,
professionally, is the security of our systems, I am no Cliff Stoll.
If I were to catch an unauthorized visitor, I would give him the boot,
not chase him down with prosecution in mind.
    I have, of course, deleted all my old Phracks as well as #42,
but I would like to be able to re-snarf them. Let me know...
                                           Dan Marner

[Editor:  Well, Dan, technically Phrack could quite possibly
          be beneficial to you and assist you with your career, and
          this is the typical scenario in which we request that you
          register your subscription and pay the registration fee.
          Of course, we don't have the SS as our own personal
          thugs to go break your legs if you don't comply. :)
          You might at least try to get your employer to pay for
          the subscription.

          As far as issues prior to 42 go, KEEP THEM!  They are
          exempt from anything, and are arguably public domain.]


    I need to get in touch with some Macintosh phreakers. Know any?
    Anyway, are there any good war dialers or scanners out there for
    Macintosh? I need something that picks up PBXs and VMBs as well as
    Thanx in advance...

[Editor:  I personally avoid the little toadstools like the plague,
          and I was unable to get a hold of the only hacker I know who
          uses one.  If anyone out there on the net could email us
          with the scoop on Mac hacking/phreaking utilities it would
          be most appreciated.]


Hello!  I was just wondering if you knew of any FidoNet site that carries
back issues of phrack.  The main reason behind this, as my link through the
Internet is basically through a FidoNet-type network and I am unable to ftp
files.  Any help would be appreciated!

  Jason K

[Editor:  Phrack pops up everywhere.  I would be very surprised if
          it wasn't on a ton of fido sites.  However, I have no idea
          of what those sites may be.  If anyone knows of any,
          let us know!]


      Can you give me the email address for the 2600 Magazine or
      whomever the person in charge.

      I've no idea how to contact them, so that's why I'm asking you.

      I'm much obliged.


[Editor:  2600 magazine can be reached at 2600@well.sf.ca.us
          To subscribe send $21 to 2600 Subscriptions, P.O. Box 752,
          Middle Island, NY, 11953-0752.
          To submit articles write to 2600 Editorial Dept., P.O. Box 99,
          Middle Island, NY, 11953-0099.

          Note:  If you are submitting articles to 2600 and to us,
          please have the courtesy of LETTING BOTH MAGAZINES KNOW
          IN ADVANCE.  Ahem.]


Do you know if there has been a set date and place for the next HoHoCon?

Best Regards,

[Editor:  Actually, it's looking more and more like HoHoCon will
          be December 17, 18, 19 in Austin, TX.  It may still
          be in Houston, but methinks the Big H has had about enough
          of dFx.  We'll let you know when we know for sure.]


   Reporter for major metro paper is interested in help finding out anything
there is to find on four prominent people who have volunteered to have their
privacy breached.
   Financial fundamentals. Lives of crime. Aches and pains. How rich they are,
where they vacation, who they socialize with. You name it, we're interested in
seeing if it's out there.
   All for a good cause.
   If you're willing to advise this computer-ignorant reporter, or dig in and
get the dope on these volunteers, please contact him at tye@nws.globe.com
   Or call at 617-929-3342.
   Help especially appreciated from anyone in the BOSTON area.


[Editor:  Interesting.  This showed up in my box in late June, so it should
          still be going.  I would recommend watching yourselves in any
          dealings with journalists.  Take it form one who has been
          burned by the press.  (And who has a journalism degree himself.)]


Hey there...

I don't know if this will get to Dispater or to the new editor.  Since the
change in editorship, the proper way to contact Phrack has become sort of a
mystery.  (The new address wasn't included in Phrack 31.)

Anyway, I'm writing to bitch about the quality of #31.  I've got two main beefs:
1. The article about fake-mail was GREAT until it turned into a "how-to"
 primer on using the info given to cause damage.  That is exactly the
 kind of thing that will end up getting you sued.  I have some legal
 background, and I'm pretty sure that the author of that article and
 possibly even Phrack itself and its editors are now open to a damn
 good argument for tortuous negligence if anyone follows the instructions
 and damages someone on Compuserve, etc.

 The argument will go something like, "Phrack set into motion a chain of
 events that led to my client being damaged."  You guys should have
 just given the info, and left off the moronic ways to abuse it.

2. The article on "Mall Security Frequencies" was copied directly from
 Popular Communications, Nov. 1992 issue.  Hell, that was even their
 cover story.  Can we say "copyright enfringement?"  If not, I'm sure
 you'll be _hearing_ it a few more times.  If I was still practicing,
 I'd call 'em up and ask their permission to sue on contingency.
 Split the damages obtained on a motion for summary judgment 50/50 with
 them.  It would only take a week and one filed complaint...

 Point is, you have opened yourselves up to get sued and lose EASILY.
 As much as I've enjoyed reading Phrack over the years, if this new
 staff continues in this manner, I'll be stuck with back-issues.

Cyber (305)
To find out more about the anon service, send mail to help@anon.penet.fi.
Due to the double-blind system, any replies to this message will be anonymized,
and an anonymous id will be allocated automatically. You have been warned.
Please report any problems, inappropriate use etc. to admin@anon.penet.fi.
*IMPORTANT server security update*, mail to update@anon.penet.fi for details.

[Editor:  I think you meant 41, not 31.  But to answer your points:

          1) As long as there is a first amendment, Phrack will
             continue to print articles that some may or may not
             agree with.  Printing the blueprints for an atomic bomb
             does not make you an accomplice to those who build it
             and detonate it.
          2) Numbers are numbers.  Can we even spell "copyright
             infringement?"  If you were still "practicing..."
             We at Phrack wholeheartedly encourage you to again pick
             it up, and keep practicing and practicing until you
             get whatever it is you were practicing down pat.
             Obviously it must have been guitar, and not law.

          Such a litigious society we live in.  Suing Phrack would
          accomplish nothing.  It would not even hinder its
          publication.  Since Phrack has no money, nothing would
          be gained.  Even if fined, Phrack could not be forced to
          sell its computer equipment to pay fines, since this would
          be removing the livelihood of the publisher, thus it would
          continue its quarterly publication.  Where on Earth did
          you get such ideas?  You obviously know nothing about
          lawsuits.  Any lawyer would laugh at the thought of suing
          Phrack since it would gain nothing financially, and provide
          such a huge amount of bad publicity that even if a judgement
          were reached in their behalf it would not be worth it.
          Oh wait, you were a lawyer.  Now I know why the past tense.

          But you are correct on one point: we cannot print
          copyrighted material without permission.  You may have
          noted that last issue (among other changes) Phrack
          no longer includes full text of news items without
          prior permission from the publisher.  That was the
          ONLY thing that worried me about publishing Phrack, and
          so I changed it.

          We at Phrack welcome constructive criticism, but at least
          have the nerve to email directly, rather than hide behind
          an anonymous remailer.  That way, someone could have
          responded to you in a more direct and expeditious manner.]


Dear Sir/Madam,

I am a student at ukc in England and wish to subscribe to Phrack receiving
it as email at the following address ks16@ukc.ac.uk thank you and keep up the
good work.

We use unix and I would be interested in getting a copy of su (switch user)
which looks for the user file passwd.su in the users home directory.  I don't
know much about unix, but I do know it would need to run from my home directory
and access the kernel.

Many thanks for any help you may be able to give.


[Editor:  Its "SIR"  hehe.  Sir Bloodaxe.  In any case, if anyone would
          care to draft up this modification to su and send it in
          I'll print it in the next issue's line noise.]


I had some beef with Rack's article in PHRACK 42. I've attached a
writeup of comments; you're welcome to a) forward it to him, b)
shitcan it, or c) publish it.


My background: I've been into the scene for about 12 years. My day job
is writing unix s/w for a NASA contractor. My night job... well, never
mind that. I have a strong amateur interest in crypto, and I'd like to
share some of what people in the usenet/Internet community have been
kind enough to teach me.

Racketeer sez:
>        If you think that the world of the Hackers is deeply shrouded with
>extreme prejudice, I bet you can't wait to talk with crypto-analysts.  These
>people are traditionally the biggest bunch of holes I've ever laid eyes on. In
>their mind, people have been debating the concepts of encryption since the
>dawn of time, and if you come up with a totally new method of data encryption,
>"Oh, I just came up with this idea for an encryption which might be the best
>one yet" when people have dedicated all their lives to designing and breaking
>encryption techniques -- so what makes you think you're so fucking bright?

One real reason for this reaction is that people _have_ been studying
encryption for 100 years or so. As a result, many simple cryptosystems
are continually being reinvented by people who haven't ever made even
a simple study of cryptosystems.

Imagine if someone came up to you and said "Wow! I just found a
totally K00L way to send fake mail! It's radical! No one's ever
thought of it before!"

You'd laugh, right? _Anyone_ can figure out how to forge mail.

Well, _anyone_ can come up with the n-th variation of the Vigniere or
substitution cipher.

An even more important reason for their 'tude is that cypherpunks are
suspicious by nature.  A key principle of crypto is that you can only
trust algorithms that have been made public and thoroughly picked
over. Without that public scrutiny, how can you trust it?

The fedz' Digital Signature Standard (DSS) got raked in the crypto and
industry press because the fedz wouldn't disclose details of the
algorithm. "How do we know it's secure?" the cypherpunks asked. "We
won't use it if we don't know it's secure!"

Point being: (for those of you who skipped over) cypherpunks trust NO
ONE when the subject is encryption algorithms. Maybe J. Random Hacker
has come up with a scheme faster and more secure than, say, RSA. If
JRH won't share the details, no one will use it.

Racketeer goes on to talk about DES. One important thing to note is
that the unix crypt() function has NOTHING to do with DES. Here's part
of the SunOS 4.1.2 man page for crypt():

     crypt implements a  one-rotor  machine  designed  along  the
     lines  of  the  German Enigma, but with a 256-element rotor.
     Methods of attack on such machines are  widely  known,  thus
     crypt provides minimal security.

It's fairly clear that for a known-ciphertext attack (i.e. you
have a block of encoded text, but neither the key nor the plaintext)
will, at worst, require 2^56 decryption attempts. Various schemes for
parallel machines and so forth have been posted in sci.crypt. Does the
NSA have something that can crack DES? Probably.

Remember that DES is mostly used for short-lived session keys. ATMs
are a good example; they typically use a DES key for one communication
session with the central bank. New session, new key. DES is _not_ very
well suited for long-term encryption, since it can probably be
attacked in "reasonable" time by a determined, well-equipped opponent.

Now, on to PGP. Pretty Good Software was indeed threatened with a
lawsuit by Public Key Partners (PKP). PKP holds the patent on the RSA
public-key algorithm. (Many people, me included, don't think that the
patent would stand up in court; so far, no one's tried.)

The nice thing about PGP is that it offers IDEA and RSA in a nice
package. When you encrypt a file, PGP generates an IDEA session key,
which is then encrypted with RSA. An opponent would have to either a)
exhaustively search the entire IDEA key space or b) break RSA to
decrypt the file without the password.

Racketeer also mentions that PGP can optionally compress files before
encryption. There's a solid crypto reason behind this, too. One
well-known and successful way to attack an encrypted file is to look
for patterns of repeated characters. Since the statistical frequencies
of word and letter use in English (and many other languages; some
folks have even compiled these statistics for Pascal & C!) are
well-known, comparing the file contents with a statistical profile can
give some insight into the file's contents.

By compressing files before encrypting them, PGP is moving the
redundancy out of the text and into the small dictionary of
compression symbols. You'd still have to decrypt the file before you
could do anything useful with that dictionary, or even to determine
that it _had_ a signature!

[Editor:  Well, Rack is not to blame for all complaints I got about the
          file.  I printed a file that was several KBytes short of
          complete.  I noticed it seemed odd, but was assured by
          Rack, TK & Presence that I had received the correct file.
          I was misinformed, and should have known better than to
          print a file I should have known was incomplete.  I apologize
          to Rack & to all of you.

          About the other gripes:  Rack, care to reply?]


In issue #42 of Phrack there was an article about the USPS' practice of
selling change of address information without consumer consent.  I sent
the supplied form letter and carbon copied my congressman and senators.
Today I received a reply from the USPS Records Office.

April 1, 1993

Dear Mr. Rosen:

This concerns your recent Privacy Act request for accountings of
disclosure of mail forwarding information you have provided to the Postal

Disclosure of your forwarding address might have been made to individual
requesters by post offices or to subscribers to the National Change of
Address File (NCOA) by an NCOA licensee.  The NCOA is a consolidated file
of all forwarding information provided by postal customers and stored on
automated media.  Listholders may subscribe to NCOA to obtain the new
addresses of individuals for whom they already have in their possession
the old address.

For disclosures made by post offices, we are in the process of querying
the Washington, DC postmaster for any accountings.

For disclosures made from the NCOA system, we will begin querying NCOA
licensees all of which keep logs identifying the particular subscribers to
whom they have given NCOA information.  This accounting will not identify
with certainty the subscribers who have in fact received your new address,
but will give you a list of all subscribers receiving NCOA service for the
relevant time period and thus might have received your address.

Because a large number of requests like yours are being received, there
will be a delay in responding.  Requests are being processed in order of
receipt and you will be sent the accountings as soon as possible.  Your
patience is appreciated.


Betty E. Sheriff
USPS Records Officer

[Editor:  Thanks for sending that letter in!  Amazing that someone
          in the maze of red tape even thought to make a form letter
          to respond.  I think I'll demand a disclosure as well.]

                             Phrack 42 Errata

We mistakenly noted that the TRW video shown at HoHoCon was dubbed by
Dispater and Scott Simpson.  It was actually made by Dispater and ZIBBY.


                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 3a of 27


                           My Problems With Clipper

                               by Chris Goggans

The introduction of the new government backed encryption chip, Clipper,
has become a much debated issue.  I like many others have a large number
of problems with the chip and the problems it may bring in the future.

Why should we believe that this algorithm is robust?  For years
and years the NSA has backed DES as the encryption standard, when
cryptoanalysts have consistently brought its strength into question.
Additionally, the NSA has forced companies to submit their routines
for analysis before allowing them to be distributed commercially.  At
times they have even requested that the algorithms be purposely
weakened (we will assume that this was so they could more easily
decipher the encrypted data.)

With this in mind, why should we now meet anything endorsed by the NSA
with anything but suspicion?  And the fact that they refuse to release
the algorithm for security reasons even further adds to the suspicion
that this chip is either inherently weak and easily broken by the NSA
or that there is a backdoor in the algorithm that will allow the NSA
to effortlessly view any data encrypted with the Clipper.

Assuming that the government is on the level (for once), and they cannot
decipher Clipper-encrypted data without legally obtaining keys from
the assigned escrow agents.  The idea that the government will have to
go before a judge and show just cause for needing the keys pacifies some,
but from my own personal experience, the government will always get
what they want.  If the Secret Service could get a search warrant to
enter my home based solely upon one posting to an electronic bulletin board,
they could certainly obtain the necessary keys needed to decipher my
speech.  In fact, most non-technical persons will become needlessly
suspicious upon the mere mention of someone using encrypted speech mechanisms
and be more easily swayed to release the keys to law enforcement.

Should Clipper be adopted by various government agencies for use, this could
have serious trickle-down effects upon the lives of regular citizens.
Let's say the military decides that they will use Clipper.  They will then
most likely require their various contractors to use it as well.  Then
after continued use, the contractor may begin to tell its other customers
to communicate with them using Clipper also.  Usage could grow
exponentially as more and more people become comfortable with the use
of the secure communications devices until it becomes a defacto standard
without any legal pressures to use it ever mandated by Congress.
Should Congress mandate its use in any form, even if only within the
government itself, this potentiality will rapidly become reality.

If Clipper eventually receives such accepted use, anyone using any other
type of encryption will be immediately suspect.  "Why aren't you using
the chip?  What do you have to hide?"  The government may even outlaw
the use of any other encryption technologies, and if America
has become comfortable and satisfied with Clipper such a law may go
unchallenged, after all, only spies, child pornographers and drug dealers
would have something to hide, right?

As the world's computer networks creep ever further into our daily lives,
and the speed and power of supercomputers multiplies every year a rather
frightening scenario emerges.  Since the government is a major funder of
the Internet, who is to say that Clipper won't become the basis for
encrypting over its lines?  As our country moves closer to ISDN and the
PSTN and the PSDN's become more intertwined, who is to say that Clipper
won't be the basis for encryption since companies like AT&T already
endorse it?

Imagine if you will, a massively parallel supercomputer, the likes of which
may not exist yet, in a special room in Ft. Meade, or buried underground
in New Jersey, that consistently decrypts all communications and
sorts it according to communicating parties.  Then through the use of
AI, the computer decides whether or not such communication presents a threat
"to national security."

The structure of the telephone network already supports such an arrangement.
The purpose of the NSA allows for such an arrangement.  The advances in computer
technology will give the potential for such an arrangement.  If Clipper is
tainted, yet accepted, there will be no more privacy in America.

Perhaps my view of the government and their ultimate intentions is way off
base.  I sincerely hope so, as I do not want to be forced to take the mark
of this beast to conduct my business dealings and to live my life in peace.
[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2021, Phrack Magazine.