mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
93 lines
3.8 KiB
Text
93 lines
3.8 KiB
Text
![]() |
==Phrack Inc.==
|
||
|
|
||
|
Volume Three, Issue 29, File #5 of 12
|
||
|
|
||
|
[-][-] [-][-] [-][-] [-][-] [-][-] [-][-] [-][-]
|
||
|
[-] [-]
|
||
|
[-] Covert Paths [-]
|
||
|
[-] [-]
|
||
|
[-] by [-]
|
||
|
[-] [-]
|
||
|
[-] Cyber Neuron Limited and Synthecide [-]
|
||
|
[-] [-]
|
||
|
[-] November 1, 1989 [-]
|
||
|
[-] [-]
|
||
|
[-][-] [-][-] [-][-] [-][-] [-][-] [-][-] [-][-]
|
||
|
|
||
|
|
||
|
When cracking a system, it is important for you to use a path to the system
|
||
|
that will not lead the authorities to your door step.
|
||
|
|
||
|
There are several methods for doing this and all of them will depend on your
|
||
|
destination, available time, goal and the phase of the moon. This article
|
||
|
deals mostly with cover attacks via a connected network.
|
||
|
|
||
|
If attacking via a phone link:
|
||
|
|
||
|
o Tap in to your local payphone line and red box or "sprint" the call.
|
||
|
|
||
|
o Using a long haul service (like Sprint or MCI) to dial into systems in
|
||
|
remote cities. [This should hinder a track by a good order of
|
||
|
magnitude.]
|
||
|
|
||
|
o Use a midnight packet switching network (eg: PC-Pursuit, Tymnet, et. al.)
|
||
|
|
||
|
o All the above.
|
||
|
|
||
|
|
||
|
If attacking from a network (eg: the Internet) there are ways of spoofing the
|
||
|
packet headers, but this requires superuser privileges on the system you are
|
||
|
attacking from and a fair amount of 'C' programming expertise. Therefore, this
|
||
|
will not be discussed here in any more detail.
|
||
|
|
||
|
Another obvious trick is to use network routers and gateways along with guest
|
||
|
accounts to "route" your data path. This will cause the person tracking you to
|
||
|
have to go though more red tape and hassle to track you. This gives you more
|
||
|
time to cover your tracks.
|
||
|
|
||
|
Some useful paths I know of are:
|
||
|
|
||
|
accuvax.nwu.edu
|
||
|
cory.berkeley.edu
|
||
|
violet.berkeley.edu
|
||
|
headcrash.berkeley.edu
|
||
|
|
||
|
|
||
|
host: violet.berkeley.edu host: headcrash.berkeley.edu
|
||
|
account: nobody account: netgate
|
||
|
net address:128.32.136.22 net address: 128.32.234.31
|
||
|
|
||
|
|
||
|
host: cory.berkeley.edu host accuvax.nwu.edu
|
||
|
account: terminal account: telnet
|
||
|
net address: 128.32.134.6 net address: 129.105.49.1
|
||
|
|
||
|
|
||
|
host: lightning.berkeley.edu host: score.stanford.edu
|
||
|
port: 8033 account: guest
|
||
|
net address: 128.32.234.10 net address: 36.8.0.46
|
||
|
|
||
|
|
||
|
The accounts nobody, netgate, and terminal at Berkeley are accounts that were
|
||
|
installed so that people can use the system to rlogin or telnet to an account
|
||
|
elsewhere without a local login (or so I am told by the local hackers [Hi
|
||
|
Audrey...]). The lightning path/method can be accessed by the command:
|
||
|
"telnet lightning.berkeley.edu 8033".
|
||
|
|
||
|
I am interested in hearing about other Internet access accounts that are
|
||
|
available out there. If you know of any please send them in.
|
||
|
|
||
|
Tymnet is also a useful method of gaining access to systems. From Tymnet, you
|
||
|
can hook up to just about any computer and use the other methods to go one step
|
||
|
further. It's not until you are traced back to the computer you linked to from
|
||
|
Tymnet that they can even begin to follow you back. My understanding is that
|
||
|
for a systen to find your Tymnet node, they must contact Tymnet personally and
|
||
|
ask them to put a trap on their connection.
|
||
|
|
||
|
For more infomation concerning Tymnet see the article "Hacking & Tymnet" by
|
||
|
Synthecide in Phrack Inc. Newsletter Issue XXX.
|
||
|
|
||
|
**********************************
|
||
|
|
||
|
>--------=====END=====--------<
|