mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
424 lines
21 KiB
Text
424 lines
21 KiB
Text
![]() |
==Phrack Inc.==
|
||
|
|
||
|
Volume Two, Issue 21, File 10 of 11
|
||
|
|
||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
PWN The Legacy... ...Lives On PWN
|
||
|
PWN Phrack World News PWN
|
||
|
PWN Issue XXI/1 PWN
|
||
|
PWN PWN
|
||
|
PWN Created by Knight Lightning PWN
|
||
|
PWN PWN
|
||
|
PWN Written and Edited by PWN
|
||
|
PWN Knight Lightning and Epsilon PWN
|
||
|
PWN PWN
|
||
|
PWN The Future... ...Is Forever PWN
|
||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
|
||
|
|
||
|
On The Edge Of Forever November 4, 1988
|
||
|
~~~~~~~~~~~~~~~~~~~~~~
|
||
|
Greetings and welcome to Phrack World News Issue XXI! As most of you have
|
||
|
realized, Taran King and I are back to stay and the tradition of Phrack Inc.
|
||
|
lives on. November 17, 1988 marks the Three Year Anniversary of Phrack Inc.
|
||
|
and we have never been prouder of our efforts to bring you the best magazine
|
||
|
possible.
|
||
|
|
||
|
However, we can not do it alone. Both Taran King and I have been reduced to
|
||
|
completely legal status and can not afford the luxury of calling bulletin
|
||
|
boards or contacting all the people we would like too.
|
||
|
|
||
|
Epsilon has been helping us a lot by acting as the collection agency for many
|
||
|
of the files for Phrack and several news articles as well. Please, if you have
|
||
|
a file for Phrack Inc. or an article for PWN contact him or leave mail for The
|
||
|
Mentor. And speaking of The Mentor, The Phoenix Project has a new number;
|
||
|
(512) 441-3088. Be sure to give it a call.
|
||
|
|
||
|
The article about Pacific Bell in this issue may contain some information that
|
||
|
has been seen before. Regardless of that, PWN is a place where such
|
||
|
information can be indexed for later reference and helps keep important events
|
||
|
and happenings in a certain continuity which is beneficial to everyone.
|
||
|
|
||
|
This issue of Phrack features the Second Special Presentation of Phrack World
|
||
|
News, which contains the abridged edition of the WGN Radio Show that dealt with
|
||
|
computer hackers and features John Maxfield.
|
||
|
|
||
|
With regard to the file about Teleconnect Long Distance. Hatchet Molly says
|
||
|
that now Teleconnect "flags" suspect bulletin boards and if a Teleconnect
|
||
|
calling card is used to call one, the card number is cancelled and a new card
|
||
|
is mailed to the customer within three days. What a wonderful company policy
|
||
|
that is.
|
||
|
|
||
|
For the months ahead, I am working on a file about hackers abroad, mostly
|
||
|
focusing on the Chaos Computer Club, which I have begun to have strong
|
||
|
relations with, and some other hacker instances in Europe and other parts of
|
||
|
the world.
|
||
|
|
||
|
Scheduled for January/February is a file series on the Wide Area Networks;
|
||
|
Bitnet and quite possibly ARPAnet, MILInet, NSFnet, IBM's VNET, CCnet, UUCP,
|
||
|
CSnet, SPAN, JANet, JUNet, and the list goes on. The main emphasis will be on
|
||
|
Bitnet though with secondary emphasis on UUCP and the other networks.
|
||
|
|
||
|
Hope you enjoy this issue and remember... "The Future Is Forever"
|
||
|
|
||
|
:Knight Lightning
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Pacific Bell Means Business October 6, 1988
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
The following information originally appeared in WORM Newsletter, a publication
|
||
|
produced and distributed by Sir Francis Drake. The series of memos presented
|
||
|
here are shown to enable the members of today's hacking community to fully
|
||
|
understand the forces at work that seek to bring them down. The memo(s) have
|
||
|
been edited for this presentation. -KL
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
Copy For: Roland Donaldson August 3, 1987
|
||
|
Subject: Unauthorized Remote Computer Access
|
||
|
|
||
|
San Francisco, July 29, 1987
|
||
|
Case Nos.: 86-883, 87-497
|
||
|
|
||
|
T. M. CASSANI, Director-Electronic Operations:
|
||
|
|
||
|
Electronic Operations recently investigated two cases involving a number of
|
||
|
sophisticated hackers who were adept at illegally compromising public and
|
||
|
private sector computers. Included among the victims of these hackers was
|
||
|
Pacific Bell, as well as other local exchange carriers and long distance
|
||
|
providers.
|
||
|
|
||
|
Below is a synopsis of the two cases (87-497 and 86-883), each of which
|
||
|
demonstrate weaknesses in Pacific Bell's remote access dial-up systems.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Case No. 87-497
|
||
|
---------------
|
||
|
On May 14, 1987, Electronic Operations received a court order directing Pacific
|
||
|
Bell to place traps on the telephone numbers assigned to a company known as
|
||
|
"Santa Cruz Operations." The court order was issued in order to identify the
|
||
|
telephone number being used by an individual who was illegally entering Santa
|
||
|
Cruz Operations' computer and stealing information.
|
||
|
|
||
|
On May 28, 1987, a telephone number was identified five separate times making
|
||
|
illegal entry into Santa Cruz Operations' computer. The originating telephone
|
||
|
number was 805-PRE-SUFF, which is listed to Jane Doe, 8731 W. Cresthill Drive,
|
||
|
Apt. 404, Thousand Oaks, California.
|
||
|
|
||
|
On June 3, 1987, a search warrant was served at 8731 W. Cresthill Drive, Apt
|
||
|
404, Thousand Oaks, California. The residents of the apartment, who were not
|
||
|
at home, were identified as Jane Doe, a programmer for General Telephone, and
|
||
|
Kevin Hacker, a known computer hacker. Found inside the apartment were three
|
||
|
computers, numerous floppy disks and a number of General Telephone computer
|
||
|
manuals.
|
||
|
|
||
|
Kevin Hacker was arrested several years ago for hacking Pacific Bell, UCLA and
|
||
|
Hughes Aircraft Company computers. Hacker was a minor at the time of his
|
||
|
arrest. Kevin Hacker was recently arrested for compromising the data base of
|
||
|
Santa Cruz Operations.
|
||
|
|
||
|
The floppy disks that were seized pursuant to the search warrant revealed
|
||
|
Mitnick's involvment in compromising the Pacific Bell UNIX operation systems
|
||
|
and other data bases. The disks documented the following:
|
||
|
|
||
|
o Hacker's compromise of all Southern California SCC/ESAC computers. On
|
||
|
file were the names, log-ins, passwords, and home telephone numbers for
|
||
|
Northern and Southern ESAC employees.
|
||
|
|
||
|
o The dial-up numbers and circuit identification documents for SCC computers
|
||
|
and Data Kits.
|
||
|
|
||
|
o The commands for testing and seizing trunk testing lines and channels.
|
||
|
|
||
|
o The commands and log-ins for COSMOS wire centers for Northern and Southern
|
||
|
California.
|
||
|
|
||
|
o The commands for line monitoring and the seizure of dial tone.
|
||
|
|
||
|
o References to the impersonation of Southern California Security Agents and
|
||
|
ESAC employees to obtain information.
|
||
|
|
||
|
o The commands for placing terminating and originating traps.
|
||
|
|
||
|
o The addresses of Pacific Bell locations and the Electronic Door Lock
|
||
|
access codes for the following Southern California central offices ELSG12,
|
||
|
LSAN06, LSAN12, LSAN15, LSAN23, LSAN56, AVLN11, HLWD01, HWTH01, IGWD01,
|
||
|
LOMT11, AND SNPD01.
|
||
|
|
||
|
o Inter-company Electronic Mail detailing new login/password procedures and
|
||
|
safeguards.
|
||
|
|
||
|
o The work sheet of an UNIX encryption reader hacker file. If successful,
|
||
|
this program could break into any UNIX system at will.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Case No. 86-883
|
||
|
---------------
|
||
|
On November 14, 1986, Electronic Operations received a search warrant directing
|
||
|
Pacific Bell to trap calls being made to the Stanford University computer. The
|
||
|
Stanford Computer was being illegally accessed and was then being used to
|
||
|
access other large computer systems throughout the country.
|
||
|
|
||
|
The calls to the Stanford Computer were routed through several different common
|
||
|
carriers and through numerous states. Through a combination of traps, traces
|
||
|
and sifting through information posted on the Stanford computer, several
|
||
|
suspects were identified throughout the United States.
|
||
|
|
||
|
The group of computer hackers who illegally accessed the Stanford computer
|
||
|
system were known as "The Legion of Doom." Subsequent investigation indicated
|
||
|
that the Legion of Doom was responsible for:
|
||
|
|
||
|
o The use of Stanford University high-speed mainframes to attack and hack
|
||
|
ESAC/SCC mini compuuters with an UNIX password hacker file. Password
|
||
|
files were then stored on the Stanford systems for other members of the
|
||
|
Legion of Doom to use. Login and passwords for every local exchange
|
||
|
carrier as well as AT&T SCC/ESAC mini computers were on file.
|
||
|
|
||
|
o The Legion of Doom used the Stanford computers to enter and attack other
|
||
|
institutions and private contractors' computers. Some of the contractors'
|
||
|
computers were used for national defense research.
|
||
|
|
||
|
On July 21, 1987, eight search warrants were served in three states at homes
|
||
|
where members of the Legion of Doom reside. Three of the searches were
|
||
|
conducted in California. Steve Dougherty, Senior Investigator-Electronic
|
||
|
Operations, accompanied Secret Service agents at the service of a search
|
||
|
warrant at 2605 Trousdale Drive, Burlingame, California, which was the
|
||
|
residence of Stan QUEST, a sixteen-year-old member of the Legion of Doom.
|
||
|
(Correction - Oryan QUEST has never been a member of the Legion Of Doom. -KL)
|
||
|
|
||
|
Dougherty interviewed QUEST, who had used the pseudonym "O'Ryan Quest," (Oryan
|
||
|
QUEST) when accessing computers. During the interview, QUEST admitted the
|
||
|
following:
|
||
|
|
||
|
o The entering of central offices, (Burlingame, San Mateo, San Bruno,
|
||
|
Millbrae) disguised as a Federal Express deliveryman. The entries were
|
||
|
done to case out the CO's for the purpose of finding computer terminals
|
||
|
with telephones, the locations of switches and bays, the names of
|
||
|
Comtechs, and materials related to the operations of the central office.
|
||
|
QUEST also claimed to have been in the AT&T Administration office on
|
||
|
Folsom Street, San Francisco.
|
||
|
|
||
|
o QUEST's telephone service had been disconnected twice for nonpayment, and
|
||
|
twice he had his service restored by impersonating a service
|
||
|
representative.
|
||
|
|
||
|
o Learning to test circuits and trunks with his computer by using ROTL and
|
||
|
CAROT test procedures.
|
||
|
|
||
|
o Members of the Legion of Doom often accessed test trunks to monitor each
|
||
|
other's lines for fun.
|
||
|
|
||
|
o On several occasions QUEST would post the telephone number of a public
|
||
|
coin phone for access to his BBS, Digital IDS. He would then access teh
|
||
|
Millbrae COSMOS wire center and add call forwarding to the coin phone. He
|
||
|
would activate the call forwarding to his home telephone number, securing
|
||
|
the identity of his location.
|
||
|
|
||
|
o QUEST would impersonate an employee who had authorization to use a Data
|
||
|
Kit and have it turned on for him. When he was done, he would call back
|
||
|
and have the Data Kit turned off.
|
||
|
|
||
|
o QUEST also would use his knowledge to disconnect and busyout the telephone
|
||
|
services of individuals he did not like. Further, he would add several
|
||
|
custom calling features to their lines to create larger bills.
|
||
|
|
||
|
o It was very easy to use the test trunks with his computer to seize another
|
||
|
person's dial tone and make calls appear on their bills. QUEST did not
|
||
|
admit charging 976 calls to anyone, but he knew of others who did.
|
||
|
|
||
|
o When the Legion of Doom attacked a computer system, they gave themselves
|
||
|
five minutes to complete the hacking. If they were not successful in five
|
||
|
minutes, they would attempt another system. The Legion of Doom was able
|
||
|
to crack a computer in under five minutes approximately 90% of the time.
|
||
|
|
||
|
o QUEST would impersonate employees to get non-published telephone listings.
|
||
|
QUEST received the non-published listing for Apple Computer Founder, Steve
|
||
|
Wozniak, and members of The Beastie Boys rock group.
|
||
|
|
||
|
o QUEST told Dougherty of one New York member of the Legion of Doom, "Bill
|
||
|
from Arnoc," (Bill From RNOC) who has been placing his own traps in New
|
||
|
York. Bill from Arnoc (Bill From RNOC) helped QUEST place traps in
|
||
|
Pacific Bell.
|
||
|
|
||
|
(Gee Stan, you forgot to admit sneaking over the border. -KL)
|
||
|
|
||
|
The review of the evidence seized at QUEST's residence tends to corroborate all
|
||
|
QUEST's statements.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Conclusions
|
||
|
-----------
|
||
|
There are some important conclusions that can be drawn from the above two cases
|
||
|
regarding future computer system concerns.
|
||
|
|
||
|
o The number of individuals capable of entering Pacific Bell operating
|
||
|
systems is growing.
|
||
|
|
||
|
o Computer Hackers are becoming more sophisticated in their attacks.
|
||
|
|
||
|
o Dial-up ports will always be a target for computer entry by a hacker.
|
||
|
|
||
|
o Even dial-up ports with remote callbacks and manually controlled modems
|
||
|
can be compromised.
|
||
|
|
||
|
o A hacker can place a central office off-line by overloading a SCC mini
|
||
|
computer by improperly placing traps or by putting traps on several DID
|
||
|
multi-trunk groups such as MCI or Sprint groups.
|
||
|
|
||
|
o Terrorist or Organized Crime organizations could use this underground
|
||
|
computer technology against Pacific Bell or to their own advantage.
|
||
|
|
||
|
o Pacific Bell proprietary data bases such as PTT ESAC or PB2 ESAC could be
|
||
|
compromised.
|
||
|
|
||
|
o The integrity of accurate customer billing statements have been
|
||
|
compromised through access to the CEBS (Computerized Electronic Billing
|
||
|
System) and will remain questionable. A customer can dispute large
|
||
|
direct-dialed calls and claim his telephone was accessed by a computer
|
||
|
hacker.
|
||
|
- - -
|
||
|
o Oryan QUEST has a really BIG mouth and would dick over anyone and everyone
|
||
|
to overcome his inferiority complex from being an illegal alien without a
|
||
|
green card. Outside of the Dan The Operator/Maxfield incident, I have
|
||
|
never seen such a mass admission of guilt. To make matters worse, QUEST
|
||
|
probably made up most of the incidents to make himself sound like a really
|
||
|
big time hacker.
|
||
|
- - -
|
||
|
Recommendations
|
||
|
---------------
|
||
|
The information gained as a result of the above investigations should be shared
|
||
|
with those individuals responsible for the integrity of our computer systems.
|
||
|
Further, an ongoing business partnership between security and the individuals
|
||
|
responsible for the integrity of our computer systems should be initiated and
|
||
|
maintained to ensure prompt, effective resolution of future computer related
|
||
|
security issues.
|
||
|
|
||
|
JOHN E. VENN
|
||
|
Manager-Electronic Operations
|
||
|
|
||
|
|
||
|
Special Thanks To Sir Francis Drake
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
He's Really Just Out Of Control PostCon'88
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
"I would SHRED everything, because
|
||
|
we get so much information
|
||
|
out of the dumpster,
|
||
|
it's UNREAL..."
|
||
|
|
||
|
-- Control C
|
||
|
|
||
|
Over the last few months there has been a lot of controversy about the
|
||
|
mysterious cricumstances regarding Michigan Bell and Control C. To set the
|
||
|
record straight, ^C gave me the full details of what happened so I could pass
|
||
|
it on to you.
|
||
|
|
||
|
Just prior to leaving Chicago, where ^C had been going to school, he had
|
||
|
illegally accessed an AOL system belonging to Michigan Bell. The system
|
||
|
operator broke in on him and ^C tried unsuccessfully to pass himself off as a
|
||
|
legitimate user. When this did not work, he hung up and did not give it a
|
||
|
second thought. Upon returning home to Detroit, he had a message waiting for
|
||
|
him to contact the sysop of the AOL system. He calling him and they,
|
||
|
accompanied by Michigan Bell security, went out to lunch. To avoid being
|
||
|
prosecuted, Control C had to give up all of the information he had on that
|
||
|
system and explain how he had gotten in. Since he had cooperated, they let him
|
||
|
go without further hassle. Unfortunately, Control C was soon busted again for
|
||
|
breaking into his Central Office, but this time he was not going to get off so
|
||
|
easily. He had to agree to making a talk show movie and a poster (quoted in
|
||
|
the beginning of the article) for Michigan Bell. Both of these items have been
|
||
|
distributed across the country to better illustrate the hacker mind-set and as
|
||
|
a reminder to destroy important documents that were being thrown away.
|
||
|
|
||
|
While being interrogated by Michigan Bell security department, Control C was
|
||
|
shown a list of recently busted hackers from the July 21, 1987 sweep of the
|
||
|
country. On this list was Sir Francis Drake, which is how the rumor about SFD
|
||
|
being busted last year got started. However, what Control C and Michigan Bell
|
||
|
did not know was that when Mark Gerardo was apprehended last year, he was
|
||
|
believed to be SFD and as such was entered in their files incorrectly.
|
||
|
|
||
|
Information Provided by Control C
|
||
|
|
||
|
With a little help figuring out the SFD mixup from me and Taran King
|
||
|
|
||
|
:Knight Lightning
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
North Dakota Nightmare September 10, 1988
|
||
|
~~~~~~~~~~~~~~~~~~~~~~
|
||
|
"For Kracking Crue's Docs Avage The Game Is Over"
|
||
|
|
||
|
In March of 1987, the North Dakota members of Kracking Crue (Docs Avage and
|
||
|
SpyroGyra (also known as Ractor)) found a local extender and were able to hack
|
||
|
out a code. They both lived on campus at North Dakota State University and
|
||
|
were able to abuse the code without the worry of being caught because of the
|
||
|
campus's Dimension phone system giving them a high degree of anonymity.
|
||
|
|
||
|
They used this code for the entire rest of the school year and nothing had
|
||
|
happened to prevent them from abusing it. Because of this lack of security, DA
|
||
|
and SG began to believe that the code would be safe for them to use anywhere.
|
||
|
The school year ended and the members of the Crue went home. Eventually the
|
||
|
Crue discovered a 1-800 number for the long distance service they had been
|
||
|
abusing and began to use it once again. However, they were soon to discover
|
||
|
that they were not half as safe as they thought.
|
||
|
|
||
|
The LD company had indeed been watching that code, but could not do anything to
|
||
|
catch the Crue because of the Dimension system on NDSU campus. Docs Avage
|
||
|
started to use the code from his apartment to call SpyroGyra and a few other
|
||
|
people and the company got his line tapped and kept a record of where all his
|
||
|
calls went to.
|
||
|
|
||
|
In Docs Avage's own words;
|
||
|
|
||
|
"On July 27th, 1988, I arrived back at my apartment after spending a
|
||
|
weekend with my parents at their home. I found it rather interesting to
|
||
|
discover three extra cars in the parking lot, one of which was a Dodge
|
||
|
Diplomat.
|
||
|
|
||
|
I walked into my apartment and discover two police detectives, two phone
|
||
|
officials, and two "computer experts" blissfully dismantling my Apple and
|
||
|
all my peripherals. One of my roommates was handcuffed and seated in a
|
||
|
chair and my other roommate was kept closely watched as he was sitting in
|
||
|
the kitchen. I was asked who I was, and read my rights. I agreed to
|
||
|
cooperate. I was busted on a dialup.
|
||
|
|
||
|
The dialup being the one I had hacked out several months before, and
|
||
|
gotten quite greedy with it (ok, I overabused the darn thing). In my
|
||
|
apartment, I placed around a $1000 worth of calls with it. I had made
|
||
|
calls with it before, but not to that extent.
|
||
|
|
||
|
I remained very cooperative, and talked to several phone security
|
||
|
representatives, including those from AT&T and U.S. Sprint (I had a
|
||
|
printout of 4 Sprint Codes, never had used them, just had them). The
|
||
|
phone security people are experts at adverse psychology, and I can
|
||
|
successfully say that they did a very good job of scaring me.
|
||
|
Nevertheless, I knew that they were trying to play with my brain, so it
|
||
|
wasn't as bad as it could have been.
|
||
|
|
||
|
My roommate had been charged with the same offense as myself, Class C
|
||
|
Felony Theft of Services (max 5 years/$5000). However, the only thing he
|
||
|
contributed to the whole matter was the fact that the telephone account
|
||
|
was in his name. The charges were dropped against him.
|
||
|
|
||
|
After almost two months of waiting, the sentence date came. I plead
|
||
|
guilty, playing on a deal that my lawyer had made with the state's
|
||
|
attorney. The sentence included restitution (which hasn't been determined
|
||
|
yet). The phone company is desparately trying to stick me with a large
|
||
|
bill, for services that cannot be proven that I had anything to do with; a
|
||
|
bill that could stretch up to $5000 (like hell if I'm paying that much),
|
||
|
and a very nice little clause called Deferment of Imposition. Basically,
|
||
|
I remain on probation until I pay back the restitution, at that time I can
|
||
|
go through hearings and prove that I haven't been involved in such
|
||
|
activities as for what I was convicted and the charges will not be placed
|
||
|
on my record. For the time being however, it's turning out to be monthly
|
||
|
payments with supervised probation. Needless to say, I, Docs Avage is
|
||
|
retired, at least as as retired as someone in my position can get."
|
||
|
|
||
|
Docs said that he had been looking to retire for some time and that this
|
||
|
incident was the final straw. He also added that he was questioned about
|
||
|
Jester Sluggo, Phrack Inc., and the Legion of Doom. He did not know anything.
|
||
|
|
||
|
Information Provided by Docs Avage and SpyroGyra
|
||
|
_______________________________________________________________________________
|