[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]


..[ Phrack Magazine ]..
.:: Phrack Loopback ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ]
Current issue : #46 | Release date : 1994-09-20 | Editor : Erik Bloodaxe
IntroductionErik Bloodaxe
Phrack LoopbackPhrack Staff
Line NoisePhrack Staff
Line NoisePhrack Staff
Phrack Prophile on Minor ThreatMinor Threat
Paid Advertisementunknown
Paid Advertisement (cont)unknown
The Wonderful World of PagersErik Bloodaxe
Legal Info by Szechuan DeathSzechuan Death
A Guide to Porno BoxesCarl Corey
Unix Hacking - Tools of the TradeThe Shining
The fingerd Trojan HorseHitman Italy
The Phrack University Dialup ListPhrack Staff
A Little About DialcomHerd Beast
VisaNet Operations Part IIce Jey
VisaNet Operations Part IIIce Jey
Gettin' Down 'N Dirty Wit Da GS/1Dr. Delam & Maldoror
StartalkThe Red Skull
Cyber Christ Meets Lady Luck Part IWinn Schwartau
Cyber Christ Meets Lady Luck Part IIWinn Schwartau
The Groom Lake Desert RatPsychoSpy
HOPEErik Bloodaxe
Cyber Christ Bites the Big AppleWinn Schwartau
The ABCs of Better Hotel StayingSeven Up
AT&T Definity System 75/85Erudite
Keytrap v1.0 Keyboard Key LoggerDcypher
International Scenesvarious
Phrack World NewsDatastream Cowboy
Title : Phrack Loopback
Author : Phrack Staff
                              ==Phrack Magazine==

                 Volume Five, Issue Forty-Six, File 2 of 28

****************************************************************************

                                Phrack Loopback


------------------------------------------------------------------------------

I'd like to write you about my friends cat.  His name is 'Cid.  Cid
loves reading, in fact he'll read just about anything, from the labels on
his cat food tins to the instructions on the "real" use of his Grafix
(incense burner :) ).  Well one take, 'Cid (or was it me) was indulging
in the reason he got his moniker and mentioned that he'd like to receive
Phrack.  Well i told him he could just subscribe to it and then he went
into a real sob story about how he doesn't have net access.  So as a
favor to 'Cid (who really does exist, and really has tripped out on brain
blotters) i'd like to subscribe to Phrack.

[You my want to take note that Phrack can also be printed on paper.
 Now, that's a lot of blotter.

 You've got your subscription, now go watch some anime.]

------------------------------------------------------------------------------

I recently got a new job and shortly after beginning working there, they
decided to retool and reorganize a bit for better productivity.

While we were going through some old boxes and stuff, I came across a
little black box with the words "Demon Dialer" molded into the front of
it, it even had the (functional!) 20volt power supply.

Needless to say I was pretty happy with my find.  I asked if I could have
it and since no one else there seemed to know what to make of it, mine it
was!

My only problem now... I've played around with it, and it seems to do a
lot more than what I originally thought, but the fact of the matter is..
I really haven't the foggiest idea of how to get it to REALLY work for me.

If anyone has any information, or better still, actual documentation for
a Telephonics Inc, Demon Dialer.. I'd really appreciate passing it on to me.

Also, something rater strange.  The phone cable attached to it had a
normal looking 4-wire connector on one end, but the other was split to
have RJ jacks, one with the yellow-black combo and one with the
red-green.  The split ends (sorry :)) were plugged into the WALL and
PHONE jacks on the demon dialer.  The purpose for this perplexes me since
one's supposed to be input and one's supposed to be a passthrough for the
phone to be plugged into.

Anyway, any info would be nice.  Thanks guys.

[Telephonics was one of those odd telco device manufacturers back in the
 80's.  They made the demon dialer (a speed dialing device), a
 two-line conference box, a divertor, etc.  Essentially, they provided
 in hardware what the telco's were beginning to roll-out in software.

 I think the line splitter you have was merely plugged into those
 two jacks for storage purposes.  What that probably was for was to
 allow two lines to use the Demon Dialer.  It was probably just reversed
 when your company boxed it so it wouldn't get lost.

 I'm not sure if Telephonics is still in business.  A good place to
 start looking for info would be comp.dcom.telecom or alt.dcom.telecom.
 Another good place may be Hello Direct (800-HI-HELLO).  They used to
 do have Telephonics equipment available for mail-order.]

------------------------------------------------------------------------------

I saw an ad for a book called "Secrets of a SuperHacker" by Knightmare.
Supposedly it intersperses tales of his exploits with code and examples.
I have big doubts, but have you heard anything good/bad about it?

[Your doubts are well founded.  I got an advance copy of that book.
 Let's put it this way:  does any book that contains over a dozen pages
 of "common passwords" sound like ground breaking material?

 This book is so like "Out of the Inner Circle" that I almost wanted
 to believe Knightmare (Dennis Fiery) was really yet another
 alias for Bill Landreth.  Imagine "Out of the Inner Circle" with
 about a hundred or more extra pages of adjectives and examples that
 may have been useful years back.

 The Knightmare I knew, Tom in 602, whose bust by Gail Thackeray
 gave law enforcement a big buffer of the Black Ice Private BBS
 and help spark the infamous LOD Hacker Crackdown, certainly didn't
 have anything to do with this.  In fact, the book has a kind of
 snide tone to it and is so clueless, that leads me to believe it
 may have been written by a cop or security type person looking to
 make a quick buck.

 As far as source code, well, there is a sample basic program that
 tries to emulate a university login.

 If you want a good book, go buy "Firewalls and Internet Security" by
 Cheswick and Bellovin.]

------------------------------------------------------------------------------

Hey Chris,

I'm sure you are under a constant avalanche of requests for certain files,
so I might as well add to your frustration <grin>.  I know of a program
that supposedly tracks cellular phone frequencies and displays them on
a cellmap.  However, I don't know the name of the program or (obviously)
where to find this little gem.  I was wondering if you could possibly
enlighten me on a way to acquire a program similar to the one I have
described.  I have developed some other methods of tracking locations
of cellular calls.  However my methods rely on a database and manually
mapping cellular phones, this method is strictly low tech.  Of course
this would be for experimental use only, therefore it would not be used
to actually track actual, restricted, radio spectrum signals.  I wouldn't
want the aether Gestapo pummeling our heads and necks.

[I don't know of anything that plots frequencies on a cellmap.  How would
 you know the actual locations of cells for whatever city you may
 be in to plot them accurately?

 There are a number of programs written to listen to forward channel messages
 and tell you when a call is going to jump to another channel.  The cellular
 telephone experimenter's kit from Network Wizards has a lot of nice
 C source that will let you write your own programs that work with their
 interface to the OKI 900.  I suppose you could get the FCC database
 CD-ROM for your state and make note of longitude and latitude of cell sites
 and make your own database for your city, and then make a truly
 visual representation of a cellmap and watch calls move from cell to cell.
 But I don't think there is such a thing floating around the underground
 at present.

 Of course the carriers have this ability, and are more than happy to make
 it available to Law Enforcement (without a warrant mind you).  Hi OJ!

 email Mark Lottor mw@nw.com for more info about the CTEK.]

------------------------------------------------------------------------------

I saw this in a HoHoCon ad:

        Top Ten Nark List
        1. Traxxter
        2. Scott Chasin
        3. Chris Goggans
        4. Aget Steal
        5. Dale Drrew
        6. Cliff Stoll
        7. [blank]
        8. Julio Fernandez
        9. Scanman
       10. Cori Braun

What did Chris Goggans do?  Isn't he Erik Bloodaxe, the publisher of
Phrack?  I sincerely doubt that the feds would have someone
working for them that puts out a publication like Phrack.  It would
be way too much of an embarrassment for them.  I wrote to the
editor of Phrack when I read that Agent Steal said that the publisher
of Phrack was a Fed - IN PHRACK no less.  He said it was a stupid rumor.
Is there anything to support this fact?  And why is there now some manhunt for
Agent Steal (at CFP the FBI was checking legs) if Steal was admittedly
their employee?  The whole thing is very confusing to me.  Please explain.
If Goggans isn't Bloodaxe then he'd Knight Lightning (this just came to me).
Nevertheless, what's the story here?

[First off, I think you take things a little too seriously.  If you are on
 a nark hunt, worry about your associates, not people you obviously
 don't even know.  Chris Goggans (ME) is most positively Erik Bloodaxe.
 Thanks for remembering.

 Agent Steal was involved with the FBI.  This is a fact.
 In his case, he even appeared to have some kind of immunity while trying
 to gather information on other hackers like Mitnik and Poulsen.  This
 immunity is under scrutiny by the Bureau's own Internal Affairs (or so the
 new rumors go), since Steal was pulling a fast one and committing crimes
 the Bureau didn't know about to get some quick cash while he set up his
 friends.

 My story is a bit more convoluted.  You can sum it up by saying, if you
 interfere with my businesses, I'll try my best to track you down and turn
 you in.  I guess I am a nark.]

------------------------------------------------------------------------------

I read in the last Phrack (45) that you wanted someone to write a few
words on scrambling systems. Give me a rough outline of what you want
and I'll see if I can help :-) Basically I wrote the Black Book
(European Scrambling Systems 1,2,3,4,5 and World Satellite TV &
Scrambling Methods) and also edit Hack Watch News & Syndicated
HackWatch. They all deal with scrambling system hacks as opposed to
computer hacking & phreaking. (Things are a bit iffy here as regards
phreaking as all calls are logged but the eprom phone cards are easy
to hack) Oh yeah and another claim to fame ;-) if you can call it
that, is that I was quoted in an article on satellite piracy in
"Wired" August issue.

This Hawkwind character that you had an article from in Phrack43
sounds like a *real* hacker indeed :-> Actually there is an elite in
Ireland but it is mainly concerned with satellite hacking and that
Hawkwind character is obviously just a JAFA (Irish hacker expression
- Just Another Fu**ing Amateur). Most of the advanced telco stuff is
tested in the south of the country as Dublin is not really that
important in terms of comms - most of the Atlantic path satellite
comms gear and brains are on the south coast :-)

Actually the Hawkwind article really pissed off some people here in
Ireland - there were a few questions asked on my own bbs (Special
Projects +353-51-50143) about this character. I am not even sure if
the character is a real hacker or just a wannabe - there were no
responses from any of his addresses. SP is sort of like the neutral
territory for  satellite and cable hacking information in Europe
though there are a few US callers. With the way things are going with
your new DBS DirecTv system in the US, it looks like the European
satellite hackers are going to be supplying a lot of information
(DirecTv's security overlay was developed by News Datacom - the
developers of the totally hacked VideoCrypt system here in Europe).

There telco here uses eprom phone cards. These are extremely easy to
hack (well most real hackers in .IE work on breaking satellite
scrambling systems that use smart cards) as they are only serial
eprom.

Regards

[About the satellite information:  YES!  Write the biggest, best
 article the whole fucking hacker world has ever seen about
 every aspect of satellite tv!!  Personally, I'm more interested in
 that than anything else anyone could possibly write (seeing as how
 I'm about to buy a dish for both C and Ku).

 About Hawkwind's article on hacking in Ireland:  If I were to write
 an article about hacking in America, it would be entirely different
 than anyone else in America would write.  A country is a big place.
 Just because someone else's hacking experience is different than
 your own, it's no reason to discredit them.  However, if your
 exposure to the scene in Ireland is so completely different than
 Hawkwind's, I would LOVE to print it as well.]

------------------------------------------------------------------------------

The Columbus Freenet uses a password generating routine that takes the
first and last initial of the user's real name, and inserts it into a randomly
chosen template.  Some of the templates are:

E(f)www5(l)
(f)22ww5(l)    where f and l are first and last initials
(f)2ww97(l)
(f)2ww95(l)

and so on.  There are not too many of these templates, I guess maybe 50.
I imagine most people go in and change their password right away, but
then again that's what a prudent person would do (so they probably don't).

Columbus 2600 meetings:

Fungal Mutoid-sysop of The KrackBaby BBS (614-326-3933) organized the
first 2600 meetings in Columbus, unfortunately hardly anyone shows up...
I don't know why HP is so dead in Central Ohio, but fear and paranoia
run rampant.
That's all for now...keep up with the good work!

R.U.Serius?!

[Hmmm...templates are always a bad thing. All one has to do is get the
 program that generates them, and viola, you've got a pre-made dict file
 for your crack program.  Not very smart on the part of the Freenet,
 but hacking a Freenet, is like kicking a puppy.

 I hope more people go to your 2600 meetings.  The ones here in Austin
 kinda died out too.  Maybe our cities are just lame.]

------------------------------------------------------------------------------

A complaint:  That piece about McDonald's in Phrack 45 was, in a word, LAME.
Surely Phrack can do better.  Maliciousness for its own sake isn't very
interesting and frankly the article didn't have any ideas that a bored
13-year-old couldn't have thought up--probably written by one.

That aside, I found some good stuff in there.  Some of it was old news,
but Phrack serves an archival purpose too, so that was ok.  On a more
personal note, I could really relate to your account of HoHoCon--not that
I was there, just that I have started to feel old lately even though I don't
turn 25 for another 2 days  :)  Sometimes I feel myself saying things like
"Why, sonny, when I was your age the Apple II was king..."

Keep up the good work, and don't let the lamers get you down.

[Thanks for the letter.  I personally thought the McDonald's file was
 a laugh riot.  Even if it was juvenile and moronic, I wouldn't expect
 anyone to analyze it and go through with anything it contained.  It was
 just for fun.  Lighten up :)

 I am glad to see that at least someone else recognizes that Phrack
 is attempting to serve as an archive of our subculture, rather than just
 a collection of technical info that will be outdated overnight, or a
 buglist that will be rendered mostly unusable within hours of release.

 There is so much going on within the community, and it is becoming such a
 spectacle in the popular media, that in 20 years, we can all go back and
 look at Phrack and remember the people, places, and meetings that
 changed the face of the net.

 Or maybe I'm just terribly lame, and either 1) refuse to put in the
 good stuff, 2) don't have access to the good stuff, 3) exist only as a
 puppet agent of The Man, or 4) Don't know nothin' 'bout Telco!
 But you know what they say about opinions.]

----------------------------------------------------------------------------

I have a few comments on your editorial in Phrack 44 (on information
wants to be free).  Thanks for voicing an opinion that is shared by many
of us.  I am glad to see a public figure in the CuG with nutz enuff to
actually come out and make such a statement and mean it.
Again, thanks.

Now on the subject of hacking as a whole.  Is it just me, or are the number
of losers on the increase?  There have always been those who would try
and apply these skills to ripoff scams and system trashing but now that
seems to be the sole intent of many of the "hackers" I come into contact
with.  What ever happened to hacking to learn more about the system.  To
really hack a system (be it phone, computer), is a test of skill and
determination, and upon success you walk away with a greater understanding
of the machine and its software.  Hacking is more than just knowing how
to run crack on a filched password file, or using some exploitation
scripts picked up on IRC, it is a quest for knowledge and gaining
superiority over a system by use of great skill acquired by a deliberate
effort.  Once was a time when things like toll fraud (I do miss blue
boxes) were a means to an end, now they seem to be the end in itself.

Also, I am researching info on OSI comsec procedures and have found some
really interesting goodies, if you are interested in publishing
my piece when completed, let me know..

[(NOTE:  This came from a .mil)
 Man, I'm glad to see that people in the armed forces still have minds
 of their own.  Not many people would express such a thing openly.

 Yes, the destructive/profit-motivated trends of many of the hackers of
 today are pretty sad.  But you have to realize, as the technology
 becomes more and more like consumer electronics, rather than the
 traditional mold of computer as scientific research tool, an entirely
 different market segment will be exposed to it and use the technology
 for less than scrupulous means.

 Even the act of hacking itself.  Today, I can basically gain access
 to any model of system known to man by asking.  I realize that
 there are many who cannot accomplish such a thing, but with the
 proliferation of public access sites, almost everyone can afford
 access to the net to explore and learn.  The point comes down to this:
 if you have an account on a Sun, why do you need an account on a Sun
 at Boeing, unless you either 1) want to sell the cad files of the 777 to
 Airbus or McDonnell-Douglas 2) want to get financial information to
 make a killing on Wall Street, or 3) just want to have an ego boost
 and say "I OWN BOEING!"

 Personally, I can understand the ego boost aspect, but I've decided that
 I'd much rather get paid by a company like Boeing to hack for them
 than against them.  I don't want to sell anyone's info, so hacking
 into any company is basically useless to me, unless they are paying me
 to look for potential weaknesses.

 Granted, it's not an easy market to get into, but it's a goal to
 shoot for.

 And for those who find it impossible to quit due to fear of losing
 their edge, check out my editorial in this issue for a possible
 solution.]

------------------------------------------------------------------------------

I am looking for a Macintosh app that does the same thing as an app
called "Demon Dial" that has been lost in the annals of software
history due to the fact that some people (sysops) question whether it
is illegal software (it dials up a series of phone #'s looking for data
connections).  Do you know where I could find an application for the Mac
that does this simple function?

[We had a guy ask in an earlier issue for Macintosh hacking/phreaking
 apps.  Noone responded.  Hell, I know SOMEONE has to use a Mac
 out there.  Are you Mac-weenies all embarrassed to speak up?

 Hell, uuencode and email me your aps, and I'll put them up for
 ftp!  Help out your poor fellow Macintosh users.  I certainly
 would if I could, but the thought of touching a Mac gives me the
 chills.]

------------------------------------------------------------------------------

Have you ever heard of being denied access to your own cell phone?
I am currently in the process of buying a cell phone and was informed
that I COULD NOT have the programming guide of the security code
they enter to program my phone.  In my opinion the key word is "MY."
If I get a digital security system for my house you better damn well
figure I will have the security codes for that.  The phone was a Motorola
flip phone.  I called Motorola and explained how displeased I was with
this company and they said they could not interfere with a reps. policy.
When I was selling car phone we kept the programming guide unless they
asked for it.  I demanded it and they laughed in my face.  Who said
"the customer is always right" anyway?

Thanks, any info is greatly appreciated.  By the way, you wouldn't
happen to have the CN/A number for 815 would you?  Also, any ANAC
would be very helpful.

[Well, I hate to say it, but you got typical service from your
 cellular agent.  Let's face it, these sales reps probably knew
 about as much about that programming manual as I do nuclear
 physics:  "Its confusing, but if you understand it, you can fuck
 things up."

 I am surprised that Motorola wouldn't sell you the book though.
 Motorola will sell anybody anything.  You probably called the wrong
 place.  Moto is so huge they've got multiple groups working on somewhat
 similar technologies with absolutely no communication between the groups.
 Sometimes they are in different countries, but sometimes they are in the
 same city!  I would suggest you call a local FAE (Field Applications
 Engineer)
 and get them to get the book for you.  Make up some story about
 working on some computer controlled application with the phone, and that
 you need any and all documentation on the phone.  They'll do it.  Money
 is money.

 As far as the 815 CNA, hell, just call the business office.  I haven't
 called a CNA in years, only the business office.  They are nice people.
 And no PINs.

 815 ANAC:  ok guys, someone must have one...email it!

 "The customer is always right"  wasn't in Bartlett's or Columbia's
 books of famous quotations.  I guess that phrase has been written out of out
 history.  So, from now on you aren't always right, I guess.]

------------------------------------------------------------------------------

Dear Phrack:


We want you!

We want you to be a part of our cutting edge documentary that is traversing
across the "NEW EDGE" of computers, culture, and chaos.

Working in conjunction with Douglas Rushkoff, the best selling author of
"CYBERIA,"  we are currently gathering together the leaders of this
technological and cultural revolution.  This is not a documentary in the
traditional sense of the word.  It is more of an exploration, a journey, a
unique vision of the world as seen through the eyes of those who live on the
bleeding edge; where technology, art, science, music, pleasure, and new
thoughts collide.  A place people like you and me like to call home.

"New Edge" will deliver a slice of creativity, insanity, and infallibility,
and feed those who are hungry for more than what Main Street USA has to
offer.  This project will detonate across the US and around the world.  It
will become the who's who of the new frontier and you belong on it's
illustrious list of futurians.  Please look over the enclosed press release
description of the project.

Phrack has long been the ultimate source for hack/phreak info, and helped to
push the limits of free speech and information.  The role that Phrack has
played in the Steve Jackson Games Case set an important precedent for
CyberLaw.  We will also be interviewing several people from the EFF.

Please call me ASAP to schedule an interview for "New Edge", or send me
E-Mail.

Sincerely,

Todd LeValley
Producer, N E W   E D G E
(310) 545-8138  Tel/Fax
belief@eworld.com


  W E L C O M E
   T O   T H E
    W O R L D
   O N   T H E
  E D G E   O F
T H E  F U T U R E


  W E L C O M E
   T O   T H E
 N E W   E D G E
-the documentary-


T h e  O r g a n i z a t i o n

Belief Productions in association with Film Forum.

T h e   M i s s i o n

Journey through the labyrinth of cyberia and experience the people, places
and philosophy that construct cyberspace and the shores of the technological
frontier.  This fast paced visual voyage through the digital revolution will
feature interviews with the innovators, artists, cyberpunks, and visionaries
from all sides of the planet.  These specialists are the futurists who are
engineering our cybergenic tomorrow in laboratories today.  Along the way we
will investigate the numerous social and political issues which are cropping
up as each foot of fiber optic cable is laid.  Artificial intelligence, the
Internet, nanotechnology, interactive media, computer viruses, electronic
music, and virtual reality are just a few of the many nodes our journey will
explore.

T h e   F u n d i n g

This exploration is sponsored in part by a grant from The Annenberg
Foundation in association with the LA based non-profit cutting-edge media
group Film Forum.

T h e   P r o c e s s

The New Edge project will capture moving images with a variety of input
devices and then assemble them into one fluid documentary using Apple
Macintosh Quadras & PowerMac computers.  The post production work will be
done entirely on the computers using the Radius Video Vision Telecast Board
in conjunction with Quicktime software applications such as Adobe Premiere
4.0 and CoSA After Effects 2.01.  The final piece will be recorded to BETACAM
SP videotape for exhibition and distribution.  The capture formats for the
project will include: BETACAM SP, Super VHS, Hi-8, 16MM Film, Super-8 Film,
35MM Stills, and the Fisher
Price Pixelvision 2000.

T h e   R e s u l t s

New Edge will pride itself on an innovative visual and aural style which
before today, could only be created on high-end professional video systems
and only for short format spots.  The New Edge documentary will be two hours
in length and will have a dense, layered look previously featured only in
much shorter pieces.  New Edge will be a showcase piece not only for the
content contained within, but for the way in which the piece was produced.
 It will be a spectacular tribute to the products and technology involved in
its creation.

D i s t r i b u t i o n

Direct Cinema - Distributes videos to Libraries, Schools, and Universities
throughout the United States.

Mico Entertainment/NHK Enterprises - Provider of American programming for
Japanese Television.

Labyrinth Media Ltd. - European reality-based documentary distributor

T h e   A u d i e n c e

New Edge is aimed at both the technophiles and technophobes alike.  While the
show will feature very complex and sophisticated topics, the discussions will
be structured to appeal to both those who do and do not have the technical
framework that underlines the cyberian movement.  The show's content and
style will make it readily available to the MTV and Generation X demographic
groups as well as executives who want to stay on top of the latest
technological advances.  Individuals who read Mondo 2000 and Wired magazine
will also naturally latch on to this electronic
presentation of their favorite topics.

T h e   G u i d e s

Mike Goedecke - Director/Graphic Designer
Mike was the Writer/Director/Cinematographer for the Interplay CD-ROM game
entitled Sim City.  Acting as graphic designer for the Voyager Co.- Criterion
Laser Disc Division his work is featured on titles such as: Akira, DEVO-The
Truth About De-Evolution, The Adventures of Baron Munchausen, and Spartacus.
 Most recently he collaborated with Los Angeles Video Artist Art Nomura on a
video installation piece entitled Digital Mandala.  The piece was edited,
composited , and mastered to Laser Disc using an Apple Macintosh Computer and
off-the-shelf software.  The installation is scheduled to tour museums and
art galleries across the United States and Europe.  While attending
Cinema/Television Graduate School at the University of Southern California,
Mike directed the award winning documentary short Rhythm, which celebrates
various musical cultures.

Todd LeValley - Producer/Graphic Designer
Todd is the Producer/Director of CyberCulture: Visions From The New Edge, a
documentary that introduces the electronic underground.  This project has
been warmly received at numerous "Cyber Festivals" around the country, as
well as at the Director's Guild Of America, and is currently being
distributed by FringeWare Inc.  Todd's commercial experience includes being
the in-house graphic designer for Barbour/Langley Productions  designing,
compositing, and producing the graphic packages for several 20th Century Fox
Television pilots and The Sci-Fi Trader for the USA Network/Sci-Fi Channel.
 Todd is a graduate of the Cinema/Television program at Loyola Marymount
University.

Jeff Runyan - Cinematographer/Editor
Jeff received an MFA from the University of Southern California's Graduate
School of Cinema/Television with an emphasis in cinematography and editing.
 He studied cinematography under the guidance of Woody Omens, ASC. and Earl
Rath, ASC., and editing with Edward Dmytryk.  Jeff was the cinematographer on
the award wining documentary Rhythm.  He has recently completed shooting and
editing a documentary on Academy Award winning Cinematographer Conrad Hall
for the ASC and has just finished directing a short film for USC
Teleproductions.

Douglas Rushkoff - Cyber Consultant/Author
Douglas is the author of the best selling Harper Collins San Francisco novel,
Cyberia.  He spent two years of his life living among the key players in the
cyber universe.  Douglas knows the New Edge well and is providing us with the
map to its points of interest, rest stops and travelers.

For more information, please contact:
Todd LeValley, Producer
Belief Productions
(310) 545-8138
belief@eworld.com

[Dear New Edge:

 You have got to be kidding me.  "Readers of Wired and Mondo 2000 will
 naturally latch on to this electronic presentation of their favorite
 topics?"

 Aren't we awful fucking high on ourselves?  Christ.  Mondo & Wired
 readers and writers (and stars) are themselves so fucking far removed
 from the real meat of the underground, that they wouldn't
 even be able to relate to it.  Obviously this "documentary"
 is going to be aimed at the wannabes who sit at home furiously
 masturbating to "Cyborgasm" while installing FRACTINT, being very
 careful not to soil their copy of "The Hacker Crackdown."  Oh joy.

 These guys are so fucking out of it, they sent me two letters.
 One addressed to Phrack, the other to Phrack / Emmanuel Goldstein.
 Maybe they think we're 2600.

 CYBER-COUNT:  12 occurrences.

 That's kind of low.  I'm surprised your public relations people didn't
 have you add in a few more cyber-this's or cyber-that's into the
 blurb.  Gotta keep that cyber-count high if you want to get those
 digi-bucks out of those cyberians!  CYBER!!!

 Read my review of Cyberia guys...find a new pop-fad to
 milk for cash.]

------------------------------------------------------------------------------

In less than 3 weeks, I will be leaving for Basic Training.  Once out of
there, I will be working on Satellite Data Transmissions for the US
Army.  I am highly excited, just waiting to see what type of computers
I will be working on.  Anyways, I will be enrolled in a 32-week
accelerated technical class teaching me all about satellites, and
the computers that I will be using.  Here's the kick.  I'll be writing
a series of Tech Journals detailing the workings/operations of/weaknesses,
and the use of the systems.  I was wondering if you would be interested
in carrying these.  I've read Phrack for a long time, but it is an off
the wall subject.  I'll also be playing with the military phone system,
in hopes of finding out what the ABCD tones do.  (I heard from a file
that Military phones utilize them but I'm still a civilian, and am
clueless).

Thanks for keeping me informed
Kalisti!

[Sorry to hear about your impending Basic Training.  I'm not big on
 the military, as they would make me chop off all my hair.

 About the Satellite systems:  YES  If you do indeed find time to write
 up any files on how they work, systems involved, weaknesses, etc.
 I'D LOVE TO PRINT THAT!  Just make sure you don't blow your clearance.

 Satellites are very cool.  I'm about to buy a Ku Band disk to do some
 packet radio type stuff.  A bit low-tech compared to the Army, but hell,
 I'm on a budget.

 ABCD...they are used for prioritizing calls on AUTOVON.  FTS doesn't
 use them (I think), and they can only be used on certain lines.

 They are:

 A = priority
 B = priority override
 C = flash
 D = flash override

 For instance, if you want to make it known that this is an important
 call, you hit the "a" button before dialing.  It establishes a
 priority-class call, which may cause a light to come on or something
 as equally attention grabbing at the called party's end.  Priority
 calls cannot be interrupted, except by a Priority Override" etc,
 with Flash Override being the highest class.

 If you do these from an improper line, you will get an error message.
 The one I used to get when BS'ing AUTOVON op's long ago
 was "The President's use of this line is not authorized." Funny.

 Let me know if any of this is still valid.]



------------------------------------------------------------------------------

Dear Phrack,
The following is a copy of a Toneloc found file my friend got.  As happens
to my friend a lot the numbers aren't valid. But, you'll see he found at least
one System 75.  It appears that the 75 had a tracer installed on it already.
My friend did not get a call back on it, and nothing has been done as far
as we know.  But, I still wonder -- Is scanning no longer safe?


                                        Castor [612]

56X-XXXX  22:57:34 03-Apr-94 C  CONNECT 1200

Login: b
Password:
INCORRECT LOGIN

Login: c
Password:
INCORRECT LOGIN

56X-XXXX  23:04:12 03-Apr-94 C  CONNECT 1200

c
 Unknown command error
Ready
d
 Unknown command error
Ready
e
 Unknown command error
Ready
b
 Unknown command error
Ready

56X-XXXX  23:49:19 03-Apr-94 C  CONNECT 1200

 KEYBOARD LOCKED, WAIT FOR LOGIN
 [1;24r [1;1H [0J

Login: b
Password:
INCORRECT LOGIN

56X-XXXX  01:23:28 04-Apr-94 C  CONNECT 1200

Login: b
Password:
INCORRECT LOGIN

Call traced to 612-XXX-XXXX.
Saving number in security log for further investigation.

[Jeez.  That sure does suck.

 Well, live and learn kiddoes.  1994 is not the time to be hacking
 by direct dialing local numbers.  It's just not all that smart.

 Caller-ID has been tariffed in a lot of RBOCS.  A lot of modem
 manufacturers implemented caller-id features into their equipment.
 Having these features in the equipment means that it won't be long
 before people redesign all their login programs to make use of
 these features.  I would.

 I've got an ISDN line.  Every time I call out, the SPID (phone number)
 of the B channel I'm using is broadcast.  There is nothing I can do
 about that.  On a remote connection, almost all decent ISDN terminal
 adaptors have the option to block any SPID they don't know.  They won't
 even answer the phone, because they receive and interpret the phone
 number before any session is established.

 Yeah, well, that's ISDN, but it will not take a genius to do a few
 quick hacks on some linux box and we will suddenly be inundated with all
 kinds of "security packages" that use modems with Caller-ID.

 Yeah, I know, *67 (or whatever it is) to block the data, or
 route the call through another carrier so the data won't get passed
 (10288-NXX-XXXX).  The data is still in the system, just not being
 transmitted from the switch out to the party being called.

 It amazes me how many really smart people I know have been busted
 solely because they were hacking local systems and calling them
 directly.

 Scanning has always been a very tricky subject.  Since you are paying
 for a phone line, and if you have flat-rate service, you are
 thereby entitled to call as many numbers as you want.  The big issue
 a while back was dialing sequentially (which set some telcos on a rampage
 because call usage patterns looked like telemarketing machines).
 The other problem is harassment.  One call to an individual is a wrong
 number.  Two is bordering on harassment.  So, doing a complete scan
 and calling the carriers back through some other method would be
 a fairly good idea.  And always have your calls forwarded to a
 non-working number so the 5,000 assholes who call-return you
 during the scan won't interfere.

 If you are lucky enough to live in the boonies, you are probably
 still somewhat safe, but everyone else...be careful.]

------------------------------------------------------------------------------

Phrack-

        I was wondering if anyone has ever done an article on breaking
Novell Network through a workstation.  I've heard it can be done through
the SysAdmin computer, but is there a way to find the userlist and
passwords?  Also how would I go about cleaning up after myself so as to
not leave a trace on the logs.  I would appreciate a way other than screen
capture, but if anyone knows of a good boot record booting program to
do a capture of every key typed that would be great, and maybe it
could be uuencoded in the next Phrack!

        Thanks again for making the best, ass kickin', a step above the
rest, brain moving, earth shaking, body shivering, fist shaking, totally
bitchin', muy excelente, awesome H/P magazine in the whole world!  :)

                        Sincerely,

                               The Warden

[Thanks for the compliments...

 About your question though, I'm not quite sure what you mean.
 In a NetWare environment there really isn't any userlist and passwords
 that you can get at.  You can run the syscon utility and look at all the
 usernames, but not much more.  The passwords are stored in what's known
 as the "bindery."  These are 3 files in the sys/system directory
 called NET$OBJ.SYS, NET$VAL.SYS, and NET$PROP.SYS.  If you can
 pull a password out of those files, I will shit in my hat and eat it.

 Beyond that, yes, a key-capture program is definitely the ideal
 solution for monitoring activity on a PC workstation.  There is
 one in this issue.]


------------------------------------------------------------------------------

Hi,
   I've Been reading your magazine for a long time now, my eyes light up when
I see an advert for a UK BBS with related hacking/phreaking articles or files
on it, but when I try to ring them they are usually gone.
I've been searching for ages for BBS's in the UK with these kind of articles
on them but I've had no luck, Even postings on the USENET had little results.
I have had a few boards which are shady but they ask unusual questions about
abiding to rules/laws about hacking then they prompt with fake login and
registration schemes.

If you have some, could you possibly send or publish a list of shady UK BBS's
Id be extremely grateful

Cheers,

Steven

[Steven:

 Hell, I don't even know the numbers to any "shady" bulletin boards here
 in America.  The only UK hacker bbs I knew of in recent years was
 Unauthorised Access, but I'm sure that's the advert you are referring to.

 Maybe someone else in the UK knows something decent to call over there.
 Any takers? ]

------------------------------------------------------------------------------

[THE GRADY FILES]

Many of you may remember the NSA Security Manual we published last
issue.  That single file generated more press and hype than I'd
seen in a long time.  It was mentioned in several newspapers, it
appeared on television.  It was ridiculous.  The document is
available to anyone who can fill out a FIOA request.

Regardless, people went zany.  At first I couldn't figure out
why everyone was so worked up, and then I caught wind of Grady
Ward.  Grady had posted the document to the net (with all mention
of Phrack deleted from it) in several USENET forums alt.politics.org.nsa,
talk.politics.crypto and comp.org.eff.talk.  Several readers of
Phrack were quick to jump up and point out that Grady had obtained
it from the magazine (thanks guys!) which he grudgingly admitted.
Grady got to be in the spotlight for a while as the Phrack/NSA Handbook
thread continued to grow.

In the meantime, Grady was either calling, or giving him the
benefit of the doubt, getting called by an awful lot of press.
And even more compelling is the way he'd began pronouncing my
impending federal raid on so many newsgroups.

And of course, I don't have time to read any of that USENET crap
so I'm oblivious to all of this.  Then I got a message from Grady.

[GRADY WRITES]

You might want to get ready for the FBI
serving a warrant on you for information
about the NSA security employee manual
published in Phrack 45;
the NSA security people called me about 10 minutes
ago to talk about how it got on the net.

I being very cooperative, gave him
your address in Austin.

Grady
707-826-7715

[I REPLY]

Get a grip.

Nothing that was contained in that file could not
be obtained through other sources.


[GRADY REPLIES]

Just because you did nothing illegal, doesn't mean that
you won't be annoyed by the FBI.  Generally they will
be very polite however.

Gripping.  Now what?

[I REPLY]

Ok,

If someone actually did contact you, what was his name and number.
I will forward that to my lawyer.

[GRADY REPLIES]

I have received your mail regarding "Re: NSA"
It will be read immediately when I return.

If you are seeking more information on the
Moby lexical databases, please run

finger grady@netcom.com

for general information or help downloading
live samples and a postscript version of our
current brochure via anonymous ftp.

Thanks - Grady Ward

-------------------

He never answered my mail.

------------------------------------------------------------------------------

Dear Sir:

Please refrain from sending such material to this address in the future!
Since this address has been usubscribed from the Phrack mailing list,
it means that further mailings are undesirable.

I would also wish to remind you that maintaining lists of people's email
without consent is quite immoral and devious.  How hypocritical of
you, who decry all such behavior when it is practiced by corporations
or governments.

Thank you.
robbie@mundoe.maths.mu.oz.au

[PHRACK EDITOR ABUSES POWER:

 Dear Sir:

 Please excuse the mailing.  Have you ever heard of a mistake?
 Have you ever heard of an oversight?

 Is it really that much of an inconvenience for you to hit the "d" key
 to remove one small piece of unwanted mail?

 This being said, I would also like to invite you to go fuck yourself.

 ** I guess this guy does not like to get unsolicited mail **]

------------------------------------------------------------------------------

You people really piss me off!  You're undermining the fun and
enjoyment of the rest of the internet users just for your juvenile
games and illegal activities.  Do you realize how much better off we'd
be if you all just went away and left the Net to honest people like me?
There is no place in today's society for a bunch of maladjusted
paranoid psychotics like yourselves.  Please do all of us users a favor
and go jump in a river.

Kevin Barnes
kebar@netcom.com

[ABUSE OF POWER CONTINUES...WILL ERIKB EVER STOP?

 Hey Keith:

 Thanks a lot for the letter!

 You know, it does my heart good to hear from such kind and caring
 folks like yourself.  It's so fortunate for the Internet that there are
 people like yourself who take it upon themselves to become martyrs for
 their causes and express their ideals in such an intelligent manner.

 It's fascinating to me that you can send such email sight-unseen.
 Do you know who you are writing to?  Do you even have the slightest
 idea?  What do you hope to accomplish?  Do you have any idea?

 This particular "maladjusted paranoid psychotic" to whom you have so
 eloquently addressed is an engineer in the R&D of a Fortune 500 computer
 company, and that along with outside consulting will net me about
 six-figures this tax year.  I've consulted for telephone companies,
 governments, aerospace, financial institutions, oil companies (the list
 goes on...) and quite frankly I don't do anything even remotely illegal.
 In fact, one recent and quite prominent quote from me was "I only
 hack for money."

 Now, about the silent majority of "honest people" like yourself that you
 have so self-rightously chosen to represent...

 I've been using the net since the early 80's (arpa-days) initially
 through a rms granted guest account on MIT-OZ.  I've continued to
 work with other Internet Providers to cover the asses of the so-called
 "honest people" of which you include yourself.

 Now, in my view, if it were not for people like us, who consistently
 expose and pinpoint weaknesses in the operating systems and networking
 technologies that you use for your "fun and enjoyment" and that I use
 for MY JOB, you would continue to be at serious risk.  But, perhaps
 ignorance is truly bliss, and if so, then Keith, you are probably one of
 the happiest people on this fine planet.

 Now, per your request, I may just go jump in a river, as the one near
 my house is quite nice, and it is almost 100 degrees here in Texas.
 I only ask that you do me one small favor:

 print out 500 copies of this letter, roll them up into a paper fist,
 and shove them into any orifice on your person that meets your criteria
 as deserving.

 ** I guess this guy doesn't like me...or you **

 EDITORIAL ABUSE ENDS]
-----------------------------------------------------------------------------

                              ==Phrack Magazine==

                 Volume Five, Issue Forty-Six, File 2a of 28

****************************************************************************

                                Phrack Editorial


If you aren't from America, this editorial really isn't meant for you,
so read on with warning, or go on to the next file.

-----------------------------------------------------------------------------

Stupid hackers.

We've got to do something to clean up our image.

We truly are "America's Most Valuable Resource," as ex-CIA spook Robert
Steele has said so many times.  But if we don't stop screwing over our own
countrymen, we will never be looked at as anything more than common
gutter trash.  Hacking computers for the sole purpose of collecting
systems like space-age baseball cards is stupid, pointless and can only
lead to a quick trip up the river.

Obviously, no one is going to stop hacking.  I've been lucky in that I've
found people willing to pay me to hack for them rather than against
them, but not everyone can score such a coup.  What kind of alternative
can the rest of the community have?

Let's say that everyone was given an opportunity to hack without any
worry of prosecution with free access to a safe system to hack from,
with the only catch being that you could not hack certain systems.
Military, government, financial, commercial and university systems would
all still be fair game.  Every operating system, every application, every
network type all open to your curious minds.

Would this be a good alternative?  Could you follow a few simple
guidelines for the offer of virtually unlimited hacking with no worry of
governmental interference?

Where am I going with this?

Right now we are at war.  You may not realize it, but we all feel the
implications of this war, because it's a war with no allies, and
enormous stakes.  It's a war of economics.

The very countries that shake our hands over the conference tables of
NATO and the United Nations are picking our pockets.  Whether it be the
blatant theft of American R&D by Japanese firms, or the clandestine and
governmentally-sanctioned bugging of Air France first-class seating, or
the cloak-and-dagger hacking of the SWIFT network by the German BND's
Project Rahab, America is getting fucked.

Every country on the planet is coming at us.  Let's face it, we are the
leaders in everything.  Period.  Every important discovery in this
century has been by an American or by an American company.  Certainly
other countries have better profited by our discoveries, but
nonetheless, we are the world's think-tank.

So, is it fair that we keep getting shafted by these so-called "allies?"
Is it fair that we sit idly by, like some old hound too lazy to scratch
at the ticks sucking out our life's blood by the gallon?  Hell no.

Let's say that an enterprising group of computer hackers decided to
strike back.  Using equipment bought legally, using network connections
obtained and paid for legally, and making sure that all usage was
tracked and paid for, this same group began a systematic attack of
foreign computers.  Then, upon having gained access, gave any and all
information obtained to American corporations and the Federal
government.

What laws would be broken?  Federal Computer Crime Statutes specifically
target so-called "Federal Interest Computers." (ie: banks,
telecommunications, military, etc.)  Since these attacks would involve
foreign systems, those statutes would not apply.  If all calls and
network connections were promptly paid for, no toll-fraud or other
communications related laws would apply.

International law is so muddled that the chances of getting extradited
by a country like France for breaking into systems in Paris from Albuquerque
is slim at best.  Even more slim when factoring in that the information
gained was given to the CIA and American corporations.

Every hacking case involving international breakins has been tried and
convicted based on other crimes.  Although the media may spray headlines
like "Dutch Hackers Invade Internet" or "German Hackers Raid NASA,"
those hackers were tried for breaking into systems within THEIR OWN
COUNTRIES...not somewhere else.  8lgm in England got press for hacking
world-wide, but got nailed hacking locally.  Australia's Realm Hackers:
Phoenix, Electron & Nom hacked almost exclusively other countries, but
use of AT&T calling cards rather than Australian Telecom got them a charge
of defrauding the Australian government.  Dutch hacker RGB got huge press
hacking a US military site and creating a "dquayle" account, but got
nailed while hacking a local university.  The list goes on and on.

I asked several people about the workability of my proposal.  Most
seemed to concur that it was highly unlikely that anyone would have to
fear any action by American law enforcement, or of extradition to
foreign soil to face charges there.  The most likely form of retribution
would be eradication by agents of that government.  (Can you say,
"Hagbard?")

Well, I'm willing to take that chance, but only after I get further
information from as many different sources as I can.  I'm not looking
for anyone to condone these actions, nor to finance them.  I'm only
interested in any possible legal action that may interfere with my
freedom.

I'm drafting a letter that will be sent to as many different people as
possible to gather a fully-formed opinion on the possible legal
ramifications of such an undertaking.  The letter will be sent to the FBI,
SS, CIA, NSA, NRO, Joint Chiefs, National Security Council, Congress,
Armed Forces, members of local and state police forces, lawyers, professors,
security professionals, and anyone else I can think of.  Their answers
will help fully form my decision, and perhaps if I pass along their
answers, will help influence other American hackers.

We must take the offensive, and attack the electronic borders of other
countries as vigorously as they attack us, if not more so.  This is
indeed a war, and America must not lose.

->Erik Bloodaxe...Hacker...American.

---------------------------

Ok, so maybe that was a bit much.  But any excuse to hack without fear
should be reason enough to exert a bit of Nationalism.

I'd much rather be taken out by the French in some covert operation and
go out a martyr, than catch AIDS after being raped by the Texas
Syndicate in the metal shop of some Federal Prison.  Wouldn't you?
[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2021, Phrack Magazine.