[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]


..[ Phrack Magazine ]..
.:: Introduction ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ]
Current issue : #57 | Release date : 2001-11-08 | Editor : Phrack Staff
IntroductionPhrack Staff
Phrack LoopbackPhrack Staff
Phrack Line NoisePhrack Staff
Editorial policyPhrack Staff
IA64 shellcodepapasutra
Taranis read your e-mailjwilkins
ICMP based OS fingerprintingOfir Arkin & Fyodor Yarochkin
Vudo malloc tricksMaXX
Once upon a free()anonymous author
Against the System: Rise of the RobotsMichal Zalewski
Holistic approaches to attack detectionsasha
NIDS on mass parallel processing architecturestorm
Hang on, snoopystealth
Architecture spanning shellcodeeugene
Writing ia32 alphanumeric shellcodesrix
Cupass and the netuserchangepassword problemD.Holiday
Phrack World NewsPhrack Staff
Phrack magazine extraction utilityPhrack Staff
Title : Introduction
Author : Phrack Staff
         ...........            ......       
    a;:045555558899110::a  .;;;77777777;;o        
   ";8"   """'''''''""""`        '''  ^77;'  
  ";8"                                 ^7;'                         
 ";8"       __                        7!;'        
";8"..aaa;;9999;;;aa..               76;            
 "823p"   ''''''     2"^             52;      
   ;8^              ";;^           '23;        
  ;P;^                '6^          '57;      
  ;8;^                '6^          ;&'                       
  "@;^              ";;8^         ..     ,,,_      ...._     ...    .     .
  '@;^      .....    2^" ^G7;     HH;  ;R3!1@#'   a;AAAAa;  .###;. !@   .!"
   !# -+;44319110100~"    !#'     HH:  ;1@   !2;  a;^   a; ;3     .!@   !;^
   !@"`   '' ''''''        @#$@!!HH;  '1!'   !@;  a;^   8; ;'     ;1;   #!
    !@^                   "13    "1^  ;!@#57RR:   a;26088; ;'     ;!@!!!'
    !@^                  "53!    "!2  '!@    ^R;  a;    ;; '#     ;!1''!@^
     !@^                 '11     '11   !@    ^;   ''    ''  '33;; '1'   !;
     !^                   ''      ;     '     '    '    ;     ''   !     !'
      '              
      ;                    .      '     '     .    ;    '      :   '   


                                ==Phrack Inc.==

                   Volume 0x0b, Issue 0x39, Phile #0x01 of 0x12


...and the Jedi Knight replied with a strong tongue:
"There is no gap between phrack56 and phrack57" ...and swang his
hand from the left to the right with a slight hope to bluff
the audience...


Good News Everyone:

   P H R A C K    I S    B A C K   !@#$!@#$!@#$

|=[ Table of Contents ]=-------------------------------------------------=|
0x01 Introduction                                      Phrack Staff 0x07 kb
0x02 Loopback                                          Phrack Staff 0x09 kb
0x03 Linenoise                                         Phrack Staff 0x1e kb
0x04 Editorial policy                                  Phrack Staff 0x07 kb
0x05 IA64 shellcode                                       papasutra 0x15 kb
0x06 Taranis read your e-mail                              jwilkins 0x0a kb
0x07 ICMP based OS fingerprinting     Fyodor Yarochkin & Ofir Arkin 0x12 kb
0x08 Vudo malloc tricks                                        maxx 0x76 kb
0x09 Once upon a free()                                   anonymous 0x22 kb
0x0a Against the System: Rise of the Robots         Michal Zalewski 0x0a kb
0x0b Holistic approaches to attack detection                  sasha 0x12 kb
0x0c NIDS on mass parallel processing architecture            storm 0x17 kb
0x0d Hang on, snoopy                                        stealth 0x14 kb
0x0e Architecture spanning shellcode                         eugene 0x17 kb
0x0f Writing ia32 alphanumeric shellcodes                       rix 0x56 kb
0x10 Cupass and the netuserchangepassword problem         D.Holiday 0x14 kb
0x11 Phrack World News                                 Phrack Staff 0x06 kb
0x12 Phrack magazine extraction utility                Phrack Staff 0x15 kb
|=-----------------------------------------------------------------------=|

On this iteration of Phrack magazine there is no single editor.  The
editorial duties are being carried out by a 'Phrack Staff' collective.

At the moment we are going to remain anonymous and not publish our
nicks or our names in the magazine.  The reason we are staying anonymous
is to ensure that people know that we are working on Phrack for all the
right reasons.  And also of course because privacy is valuable.

Let's talk about privacy for a moment.

It seems to me that lately there is no motive more attractive than
becomming a celebrities.  Ironically, celebrities have a power that will
grow more compelling and yet less meaningful in the years to come.  Why?
Because becomming a celebrity will be easier to achieve.  The drive to
increase connectivity is ultimately about the access of everyone to 
everyone and everyone to everything.  A personal home page on the web -
self-created celebrity - is only the most primitive example of what lies
ahead, but is an instructive example all the same.  Home pages are self-
validation, and self-validation lies at the very center of the drive
towards the desire to become a celebrity.

Like precious metals, society has always valued what is scarce.  As privacy
becomes rarer and rarer, it will assume greater and greater worth.

Switching subjects, there is another point that I would like to make.  The
field of information security is vast.  It is vast because it concerns not
just technology, but also sociology, criminology, economics (think of risk
modeling), and many other associated subjects.  Even within the technology
side of information security, there are many different areas of study -
vulnerability assessment, intrusion detection, public key infrastructure,
operating system security, and so on.  The point I am working towards is
that the world does not being and end with shellcode and it certainly
does not begin and end with exploits.  

You owe it to yourself to investigate what it is about information security
that makes it the most interesting and challenging field of study within
information technology today.

It's a big world out there.  Read books.  Experiment.  Don't just do.  Be.

Enjoy the magazine!


Phrack Magazine Volume 10 Number 57, August 11, 2001.  ISSN 1068-1035
Contents Copyright (c) 2001 Phrack Magazine.  All Rights Reserved.
Nothing may be reproduced in whole or in part without written permission
from the editors.
Phrack Magazine is made available to the public, as often as possible, free
of charge.

|=-----------=[ C O N T A C T   P H R A C K   M A G A Z I N E ]=---------=|

Editors:            phrackstaff@phrack.org
Submissions:        phrackstaff@phrack.org
Commentary:         loopback@phrack.org
Phrack World News:  disorder@phrack.org

|=-----------------------------------------------------------------------=|

Submissions may be encrypted with the following PGP key:

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.0.5 (GNU/Linux)
Comment: For info see http://www.gnupg.org

mQGiBDr0dzURBAC0nXC8TlrGLzTrXBcOq0NP7V3TKp/HUXghV1uhsJLzgXL1N2ad
XF7yKFoP0RyvC3O4SVhSjFtaJZgwczkkRwgpabOddk77fnCENPvl2n0pWmyZuSQa
fTEn+P8gmKEeyWXo3EDURgV5OM6m/zVvsQGxkP3/jjGES6eaELXRqqNM9wCgrzkS
c0a4bJ03ETjcQa8qp3XIuLsD/04nseebHrqgLHZ/1s1gF6wdRFYGlOYY1tvkcIU4
BRqgJZQu1DIauTEZiLBug+SdRyhJlYPhXWLXr3r7cq3TdxTD1DmM97V8CigA1H5Y
g7UB0L5ZygL2ezRxMNxyBxPNDRj3VY3niMg/DafqFs4PXSeL/N4/xU45UBeyk7La
QK2dA/4/FKBpUjXGB83s0omQ9sPHYquTiS51wze3SLpJs0jLnaIUmJ1ayBZqr0xT
0LPQp72swGcDb5xvaNzNl2rPRKQZyrsDDX8xZdXSw1SrS6xogt83RWS6gbMQ7/Hr
4AF917ElafjEp4wwd/rekD84RPumRmz4I02FN0xR5VV6K1rbILQkcGhyYWNrc3Rh
ZmYgPHBocmFja3N0YWZmQHBocmFjay5vcmc+iF0EExECAB0FAjr0dzUFCThkCQAF
CwcKAwQDFQMCAxYCAQIXgAAKCRDT4MJPPu7c4etbAJ9P/6NeGwx/nyBBTVpMweCQ
6kFNkQCgnBLX1cmZ7DSg814YjZBFdLczcFS5Ag0EOvR3URAIAOumUGdn+NCs+Ue1
d1RDCNHg6I8GEeH5DElGWC8jSMor2DOgah31VEcoPgVmtEdL8ZD/tl97vxcEhntA
ttlELWVJV854kWxRMeCFbBS+fjcQpHCig5WjFzuOrdwBHlNZK2xWCpbV770eSPb/
+z9nosdP8WzmVnJ0JVoIc99JJf3d6YfJuscebB7xn6vJ3hZWM9kqMSyXaG1K3708
gSfhTr1n9Hs7nDfKMMQ73Svbe6J3kZJNdX0cqZJLHfeiiUrtf0ZCVG52AxfLaWfm
uPoIpZaJFzexJL/TL9gsRRvVdILd3SmVKtt2koaHNmUgFRVttol3bF8VTiGWb2uX
S6WjbwcAAwUH/R9Fsk1Vf04qnzZ21DTsjwlA76cOje0Tme1VIYfwE33f3SkFo89+
jYPFCMNObvSs/JVrstzzZr/c36a4rwi93Mxn7Tg5iT2QEBdDomLb3plpbF3r3OF3
HcuXYuzNUubiA5J2nf3Rf0DdUVwWmOx8gnqF/QUrKRO+fzomT/jVaAYkVovMBE9o
csA6t6/vF+SQ5dxPq+6lTJzFY5aK90p1TGHA+2K18yCkcivPEo7b/qu+n9vCOYHM
WM+cp49bcUMExRkL934O1KUhHxbL96yBRWRzrJaC7ybGjC9hFAQ/wuXzaHOXEHd4
PqrTZI/rvnRcVJ1CXVt9UfsLXUROaEAtAOOITAQYEQIADAUCOvR3UQUJOGQJAAAK
CRDT4MJPPu7c4eksAJ9w/y+n6CHeqeUgKCYZ+EKvNWC30gCfYblC4sGwllhPufgT
gPaxlvAXKrM=
=p9fB
-----END PGP PUBLIC KEY BLOCK-----


phrack:~# head -20 /usr/include/std-disclaimer.h
/*
 *  All information in Phrack Magazine is, to the best of the ability of
 *  the editors and contributors, truthful and accurate.  When possible,
 *  all facts are checked, all code is compiled.  However, we are not
 *  omniscient (hell, we don't even get paid).  It is entirely possible
 *  something contained within this publication is incorrect in some way.
 *  If this is the case, please drop us some email so that we can correct
 *  it in a future issue.
 *
 *
 *  Also, keep in mind that Phrack Magazine accepts no responsibility for
 *  the entirely stupid (or illegal) things people may do with the
 *  information contained herein.  Phrack is a compendium of knowledge,
 *  wisdom, wit, and sass.  We neither advocate, condone nor participate
 *  in any sort of illicit behavior.  But we will sit back and watch.
 *
 *
 *  Lastly, it bears mentioning that the opinions that may be expressed in
 *  the articles of Phrack Magazine are intellectual property of their
 *  authors.
 *  These opinions do not necessarily represent those of the Phrack Staff.
 */

|=[ EOF ]=---------------------------------------------------------------=|

[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2014, Phrack Magazine.