mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
722 lines
28 KiB
Text
722 lines
28 KiB
Text
![]() |
==Phrack Inc.==
|
||
|
|
||
|
Volume Three, Issue Thirty-five, File 2 of 13
|
||
|
|
||
|
[-=:< Phrack Loopback >:=-]
|
||
|
|
||
|
By Phrack Staff
|
||
|
|
||
|
Phrack Loopback is a forum for you, the reader, to ask questions, air
|
||
|
problems, and talk about what ever topic you would like to discuss. This is
|
||
|
also the place The Phrack Staff will make suggestions to you by reviewing
|
||
|
various items of note; magazines, software, catalogs, hardware, etc.
|
||
|
______________________________________________________________________________
|
||
|
|
||
|
What's on Your Mind
|
||
|
~~~~~~~~~~~~~~~~~~
|
||
|
|
||
|
:: Hacking VMB's ::
|
||
|
|
||
|
From: Mr. Upsetter
|
||
|
To: phracksub@stormking.com
|
||
|
Subject: Phrack 34 VMB article
|
||
|
|
||
|
The article in Phrack 34 on voice mail hacking by Night Ranger was really good.
|
||
|
It reminded me of some experiences I had with a cellular voice mail system a
|
||
|
couple years ago in San Diego. I would bet there are similar systems in other
|
||
|
cities.
|
||
|
|
||
|
These VMB's would automatically answer calls when the subscriber wasn't on the
|
||
|
air. They worked just like standard VMB's. To access the box, the owner could
|
||
|
dial his or her own cellular number, then hit * when it answered. Then the VMB
|
||
|
would ask for a password.
|
||
|
|
||
|
Guess what the default password was? None! That meant all you had to do was
|
||
|
dial up a cellular VMB and hit *, and you were in. How many VMB's still had
|
||
|
the default password? About half...
|
||
|
|
||
|
To scan for cellular VMB's all you had to do was dial numbers in the cellular
|
||
|
prefix. It was pretty fun...almost too easy.
|
||
|
|
||
|
Cheers,
|
||
|
Mr. Upsetter
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
>From: Zoso Puda
|
||
|
>
|
||
|
>After reading PHRACK 34 I thought it was good. Especially the article on VMB
|
||
|
>hacking. As a matter of fact I wrote a SALT script to help me do it.
|
||
|
|
||
|
This is exactly what we like to see. People actually getting basic
|
||
|
information and building on it.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
+-------------------------------------+
|
||
|
| ZoSoft Telix VMB Hacker |
|
||
|
| |
|
||
|
| written by: Zoso Puda |
|
||
|
+-------------------------------------+
|
||
|
First words
|
||
|
-----------
|
||
|
After reading Night Ranger's article (see PHRACK 34), I decided to make a
|
||
|
VMB hacking program. Night Ranger provided good insight into how to hack VMB
|
||
|
systems but some VMBs are hard to crack. What I came up with is a program to
|
||
|
help me hack some of the harder systems. The ones that don't use the defaults
|
||
|
are tough. Also my phone has the buttons and earpiece in one unit and I had to
|
||
|
dial then put the phone to my ear and listen, look at the buttons to dial a
|
||
|
number and put the phone back to my ear to listen. It soon became tiresome.
|
||
|
|
||
|
What I finally came up with was a program to let me run all the phone
|
||
|
functions from the keyboard. My modem speaker is loud enough to hear clearly so
|
||
|
it seemed like the perfect thing to do. I also automated certain features like
|
||
|
incrementing the password or box number. The program is not fully automated
|
||
|
however. You must run this program manually. It's main purpose is to allow you
|
||
|
to run normal phone functions via the keyboard. If you cannot hear clearly
|
||
|
through your modem speaker then pick up the phone after the program dials the
|
||
|
VMB phone # and hang up the phone before hanging up the modem.
|
||
|
|
||
|
What follows is a brief description on how to use the program, compile the
|
||
|
program, and run the program. A working knowledge of VMB systems is expected.
|
||
|
|
||
|
Parameter details
|
||
|
-----------------
|
||
|
VMB phone number : If you don't know this, give it up.
|
||
|
|
||
|
Setup sequence : This code is used for systems that require a '9' or '#' or
|
||
|
'*' to be pressed before the box number. Up to 3 characters
|
||
|
can be in this string.
|
||
|
|
||
|
Valid Box # : This would be a known valid box or the box you will
|
||
|
be attempting to hack. This value remains constant.
|
||
|
|
||
|
Codefile filename: You may use a file to get 'default' or your favorite
|
||
|
passwords from. You must include the extension.
|
||
|
|
||
|
Starting box/code: Box # or code to start checking. This value will
|
||
|
increase automatically upon pressing [F7].
|
||
|
|
||
|
Using the function keys
|
||
|
-----------------------
|
||
|
[F1] Dials the VMB system (see params).
|
||
|
[F2] Hangs-up the modem.
|
||
|
[F3] Closes the current codefile.(see params).
|
||
|
[F4] Lets you set the current code/box #.
|
||
|
[F5] Dials the Setup sequence (see params).
|
||
|
[F6] Dials the current code.
|
||
|
[F7] Makes the next code current.
|
||
|
[F8] Dials the valid box (see params).
|
||
|
[F9] Allows you to re-set the parameters.
|
||
|
[F10] Hangs-up and quits the program.
|
||
|
[0 - 9] These keys will dial 0 - 9 respectively.
|
||
|
[*, #] These keys will dial * and #.
|
||
|
[/] Used as a substitute # for the keypad.
|
||
|
|
||
|
Basic Insructions
|
||
|
-----------------
|
||
|
Codefiles should be stored in the same directory as your Telix program.
|
||
|
|
||
|
A sample codefile should look like this:
|
||
|
|
||
|
1111
|
||
|
2222
|
||
|
3333
|
||
|
etc...
|
||
|
|
||
|
I suggest you make seperate codefiles for the number of digits in each code.
|
||
|
For example, all 3 digit codes should be in a file called 3DIGIT.COD, or
|
||
|
something similar.
|
||
|
|
||
|
During parameter entry, if you enter a codefile and it exists, you will NOT
|
||
|
be prompted for a 'Starting box/code'. When the codefile is finished, the
|
||
|
current code will set itself to 1000.
|
||
|
|
||
|
If you enter a blank for the codefile or the name you entered doesn't exist
|
||
|
then you will be prompted for a 'Starting Box/Code'.
|
||
|
|
||
|
Compiling
|
||
|
---------
|
||
|
Save the program within the 'CUT HERE' lines as VMBHACK.SLT. Copy the file
|
||
|
VMBHACK.SLT into the directory where your Telix scripts are. Compile using
|
||
|
CS.EXE. (example: CS VMBHACK.SLT) To run the program, load Telix and press
|
||
|
Alt-G followed by the program name (VMBHACK).
|
||
|
|
||
|
//---------------------------<CUT HERE>-------------------------------------
|
||
|
// ZoSoft VMB Hacker Version 1.4
|
||
|
// Code by: Zoso, November 1991
|
||
|
//
|
||
|
// See PHRACK 34 for more information on VMB systems.
|
||
|
//
|
||
|
// NOTE: Do not remove the credits of the original author, modified versions
|
||
|
// you may add credits, but please do not remove any.
|
||
|
//
|
||
|
str code[10], // Global Variables
|
||
|
codes[10],
|
||
|
reset[1],
|
||
|
vmb_number[15],
|
||
|
borc[1],
|
||
|
valid[10],
|
||
|
setup[3];
|
||
|
str filename[12],
|
||
|
fstatus[10];
|
||
|
int f;
|
||
|
int fflag = 0;
|
||
|
init_modem() // Modem initialization
|
||
|
{
|
||
|
cputs("AT X3 S6=0 S7=0 S11=105 M1 L3"); // X must be 3, L is Loudness on
|
||
|
cputs("^M"); // some modems, you may have to
|
||
|
waitfor("OK",20); // alter this. See you modem
|
||
|
manual.
|
||
|
}
|
||
|
vmb_dial(str string) // Dial function
|
||
|
{
|
||
|
str workstr[20];
|
||
|
workstr = string;
|
||
|
strcat(workstr,";");
|
||
|
cputs("ATDT");
|
||
|
cputs(workstr);
|
||
|
cputs("^M");
|
||
|
cputs("^M");
|
||
|
}
|
||
|
hang_up() // Hang Up function
|
||
|
{
|
||
|
hangup();
|
||
|
waitfor("",20);
|
||
|
cputs("ATH0");
|
||
|
cputs("^M");
|
||
|
cputs("^M");
|
||
|
clear_scr();
|
||
|
display();
|
||
|
}
|
||
|
next_code() // Next code function
|
||
|
{
|
||
|
int cd;
|
||
|
if (fflag)
|
||
|
{
|
||
|
if (not feof(f)) // Check for file first
|
||
|
{
|
||
|
fgets(code,10,f);
|
||
|
return;
|
||
|
}
|
||
|
if (feof(f))
|
||
|
{
|
||
|
file_close();
|
||
|
code = "999";
|
||
|
goto NEXTCODE;
|
||
|
}
|
||
|
}
|
||
|
NEXTCODE:
|
||
|
cd = stoi(code);
|
||
|
cd = cd + 1; // This line determines how the
|
||
|
code
|
||
|
itos(cd,code); // gets incremented.
|
||
|
}
|
||
|
set_code() // Enter new code
|
||
|
{
|
||
|
gotoxy(65,2);
|
||
|
gets(code,10);
|
||
|
}
|
||
|
parameters() // Set parameters
|
||
|
{
|
||
|
str c[1];
|
||
|
file_close();
|
||
|
GETINFO:
|
||
|
clear_scr();
|
||
|
printsc("VMB Hacker Parameters^M^J");
|
||
|
printsc("^M^JVMB phone number :");
|
||
|
gets(vmb_number,15);
|
||
|
printsc("^M^JSetup sequence :");
|
||
|
gets(setup,3);
|
||
|
printsc("^M^JValid box # :");
|
||
|
gets(valid,10);
|
||
|
printsc("^M^JCodefile filename :");
|
||
|
gets(filename,12);
|
||
|
if (filename != "")
|
||
|
{
|
||
|
open_file();
|
||
|
next_code();
|
||
|
}
|
||
|
if (not fflag)
|
||
|
{
|
||
|
filename = "N/A";
|
||
|
printsc("^M^JStarting box/code :");
|
||
|
gets(code,10);
|
||
|
}
|
||
|
printsc("^M^J^M^JCorrect? (Y/n):");
|
||
|
gets(c,1);
|
||
|
if (c == "n" || c == "N")
|
||
|
goto GETINFO;
|
||
|
}
|
||
|
press_enter() // Pause routine
|
||
|
{
|
||
|
str a[1];
|
||
|
pstraxy("Press [ENTER] to continue...",20,23,11);
|
||
|
gets(a,1);
|
||
|
}
|
||
|
title_scr() // Title screen
|
||
|
{
|
||
|
str i[1];
|
||
|
TITLE:
|
||
|
clear_scr();
|
||
|
pstraxy(" - ZoSoft VMB Hacker V1.4 -",20,4,11);
|
||
|
pstraxy("written for Telix by: Zoso Puda",20,6,14);
|
||
|
press_enter();
|
||
|
}
|
||
|
display() // Display screen
|
||
|
{
|
||
|
box(0,0,78,3,4,0,19); box(0,0,78,5,4,0,19);
|
||
|
pstraxy("[ ZoSoft VMB Hacker V1.4 ]",25,0,31);
|
||
|
pstraxy("VMB Number:",4,2,31); // Information display
|
||
|
pstraxy(vmb_number,16,2,27);
|
||
|
pstraxy("Valid #:",33,2,31);
|
||
|
pstraxy(valid,42,2,27);
|
||
|
pstraxy("Current:",57,2,31);
|
||
|
pstraxy(code,66,2,27);
|
||
|
pstraxy("Codefile:",6,4,31);
|
||
|
pstraxy(filename,16,4,27);
|
||
|
pstraxy("File status:",29,4,31);
|
||
|
pstraxy(fstatus,42,4,27);
|
||
|
pstraxy("Setup sequence:",50,4,31);
|
||
|
pstraxy(setup,66,4,27);
|
||
|
box(0,6,78,10,4,0,103); // Function key display
|
||
|
pstraxy("[ ]",30,6,111);
|
||
|
pstraxy(" 0 - 9,*,#",31,6,110);
|
||
|
pstraxy("[ ] Dial VMB", 2,7,111);
|
||
|
pstraxy("F1", 3,7,110);
|
||
|
pstraxy("[ ] Hang up",22,7,111);
|
||
|
pstraxy("F2",23,7,110);
|
||
|
pstraxy("[ ] Close file",42,7,111);
|
||
|
pstraxy("F3",43,7,110);
|
||
|
pstraxy("[ ] Set Current",61,7,111);
|
||
|
pstraxy("F4",62,7,110);
|
||
|
pstraxy("[ ] Setup seq.",2,8,111);
|
||
|
pstraxy("F5", 3,8,110);
|
||
|
pstraxy("[ ] Dial current",22,8,111);
|
||
|
pstraxy("F6",23,8,110);
|
||
|
pstraxy("[ ] Next box/code",42,8,111);
|
||
|
pstraxy("F7",43,8,110);
|
||
|
pstraxy("[ ] Valid box",61,8,111);
|
||
|
pstraxy("F8",62,8,110);
|
||
|
pstraxy("[ ] Parameters",22,9,111);
|
||
|
pstraxy("F9",23,9,110);
|
||
|
pstraxy("[ ] QUIT",41,9,111);
|
||
|
pstraxy("F10",42,9,110);
|
||
|
gotoxy(0,11);
|
||
|
}
|
||
|
quit_vmb() // End program
|
||
|
{
|
||
|
file_close();
|
||
|
hangup();
|
||
|
waitfor("",20);
|
||
|
clear_scr();
|
||
|
printsc("Thanks for using ZoSoft's VMB Hacker.^M^J^M^J");
|
||
|
cputs_tr(_mdm_init_str); // Restore modem params
|
||
|
}
|
||
|
open_file() // Open Codefile
|
||
|
{
|
||
|
fflag = 1;
|
||
|
f = fopen(filename,"r");
|
||
|
fstatus = "OPEN";
|
||
|
if (ferror(f))
|
||
|
file_close();
|
||
|
}
|
||
|
file_close() // Close Codefile
|
||
|
{
|
||
|
fflag = 0;
|
||
|
fclose(f);
|
||
|
fstatus = "CLOSED";
|
||
|
}
|
||
|
main() // MAIN program module
|
||
|
{
|
||
|
int chr;
|
||
|
title_scr();
|
||
|
parameters();
|
||
|
clear_scr();
|
||
|
display();
|
||
|
init_modem();
|
||
|
TOP:
|
||
|
gotoxy(0,11);
|
||
|
chr = inkeyw();
|
||
|
if (chr == '0') vmb_dial("0"); // Dial 0-9
|
||
|
if (chr == '1') vmb_dial("1");
|
||
|
if (chr == '2') vmb_dial("2");
|
||
|
if (chr == '3') vmb_dial("3");
|
||
|
if (chr == '4') vmb_dial("4");
|
||
|
if (chr == '5') vmb_dial("5");
|
||
|
if (chr == '6') vmb_dial("6");
|
||
|
if (chr == '7') vmb_dial("7");
|
||
|
if (chr == '8') vmb_dial("8");
|
||
|
if (chr == '9') vmb_dial("9");
|
||
|
if (chr == '#') vmb_dial("#"); // Pound sign (#)
|
||
|
if (chr == '/') vmb_dial("#"); // Make (/) same as (#) for keypad
|
||
|
if (chr == '*') vmb_dial("*"); // Asterisk (*)
|
||
|
if (chr == 15104) // F1
|
||
|
vmb_dial(vmb_number);
|
||
|
if (chr == 15360) // F2
|
||
|
hang_up();
|
||
|
if (chr == 15616) // F3
|
||
|
{
|
||
|
file_close();
|
||
|
display();
|
||
|
}
|
||
|
if (chr == 15872) // F4
|
||
|
{
|
||
|
set_code();
|
||
|
display();
|
||
|
}
|
||
|
if (chr == 16128) // F5
|
||
|
vmb_dial(setup);
|
||
|
if (chr == 16384) // F6
|
||
|
vmb_dial(code);
|
||
|
if (chr == 16640) // F7
|
||
|
{
|
||
|
next_code();
|
||
|
display();
|
||
|
}
|
||
|
if (chr == 16896) // F8
|
||
|
vmb_dial(valid);
|
||
|
if (chr == 17152) // F9
|
||
|
{
|
||
|
hang_up();
|
||
|
parameters();
|
||
|
display();
|
||
|
}
|
||
|
if (chr == 17408) // F10
|
||
|
{
|
||
|
quit_vmb();
|
||
|
goto END;
|
||
|
}
|
||
|
goto TOP;
|
||
|
END:
|
||
|
prints("^M^J");
|
||
|
}
|
||
|
//---------------------------<CUT HERE>---------------------
|
||
|
|
||
|
______________________________________________________________________________
|
||
|
|
||
|
:: More Legal Stuff ::
|
||
|
|
||
|
>From: "Michael Lawrie, Operations" <MICHAEL@hicom.loughborough.ac.uk>
|
||
|
>Subject: RE: Who/What is this?
|
||
|
>
|
||
|
>In this country, the receipt of documents like this would probably be
|
||
|
>pretty helpful in sending a person down on a conspiracy to contravene
|
||
|
>a section or more of the Computer Misuse Act, I do not appreciate crap
|
||
|
>like this appearing on my machine but since you didn't send it me, I
|
||
|
>can't really moan at you - What I would appreciate though is if you
|
||
|
>told people that forwarding it to people who don't want it is probably
|
||
|
>not a good idea, unless you want all your list members locked up in
|
||
|
>some pokey British gaol that is!
|
||
|
>
|
||
|
>Michael Lawrie.
|
||
|
>---
|
||
|
>Michael Lawrie, Hicom Group Security <security@uk.ac.lut.hicom>
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Sir,
|
||
|
You will have to excuse my ignorance of telecom laws in other countries.
|
||
|
In the United States, distribution of technical information such as Phrack Inc.
|
||
|
is protected by law.
|
||
|
|
||
|
Hackers are not involved in conspiracies or plots. Most hackers could
|
||
|
care less about politics. Hackers are interested in the progression of
|
||
|
technology and learning about how our advanced society works. The inefficient
|
||
|
structure known as government is the last thing most hackers are interested in
|
||
|
exploring.
|
||
|
|
||
|
Phrack Inc. has no "membership." Phrack Inc. is an electronically
|
||
|
distributed publication. It is like any other security oriented newsletter.
|
||
|
Have you ever heard of "Computer Security Journal", "Computers and Security",
|
||
|
or "Computer Crime Digest?" These are some of the "security industry"
|
||
|
publications that are read in the U.S. Phrack Inc. merely has a little
|
||
|
different flavor to it. If you are interested in seeing any of these printed
|
||
|
journals, I can forward their address to you.
|
||
|
|
||
|
I am sorry if you received Phrack Inc. and didn't wish to read it. You
|
||
|
might wish to take the matter up with the person that forwarded it to you. I
|
||
|
hope it wasn't too big of an inconvenience for you to delete the mail message
|
||
|
containing Phrack Inc.
|
||
|
|
||
|
Cheers,
|
||
|
|
||
|
Dispater
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
After a (as it turns out not so private) conversation with Torq, it seems
|
||
|
this guy isn't even an admin anywhere. He just likes to pretend he is. Did my
|
||
|
reply end this little debate? NOT! This person had the nerve to intercept my
|
||
|
private mail to Torq and then proceeded to bitch about it some more.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
>From MICHAEL@hicom.loughborough.ac.uk Sat Nov 9 09:45:53 1991
|
||
|
Date: Fri, 8 Nov 91 13:19 GMT
|
||
|
From: "Michael Lawrie, Operations" <MICHAEL@hicom.loughborough.ac.uk>
|
||
|
To: PHRACKSUB <<@nsfnet-relay.ac.uk:PHRACKSUB@STORMKING.com>>
|
||
|
Subject: The EFF.
|
||
|
|
||
|
I found the following message the other day, whilst routing around, I am to
|
||
|
assume you lied to me about taking him off the list but for now we'll forget
|
||
|
that.
|
||
|
|
||
|
> From phrack@gnu.ai.mit.edu Wed Oct 23 01:41:51 1991
|
||
|
> Date: Wed, 23 Oct 91 01:41:47 -0400
|
||
|
> From: phracksub@stormking.com
|
||
|
> Message-Id: <::::::::::::::::::::::>
|
||
|
> To: torq@:::::::::::::::
|
||
|
> Subject: Phrack
|
||
|
>
|
||
|
> This guy sounds like a total idiot. If he does kill your account or something
|
||
|
> stupid, get a hold of the EFF. They went to bat for someone who had their
|
||
|
> account revoked because he/she had issues of Phrack on their directory.
|
||
|
>
|
||
|
> people should get a clue....
|
||
|
>
|
||
|
> Dispater
|
||
|
> phracksub@stormking.com
|
||
|
|
||
|
As you say, people should get a clue. Are you assuming that 'torq' is perhaps
|
||
|
American and as such has his rights protected by constitution? He isn't, he is
|
||
|
British and doesn't really as such have much going for him. If I want to kill
|
||
|
his account I can do it at the bat of an eyelid, whilst him receiving 'Phrack'
|
||
|
is not breaking any laws because it does not show intent, it would be breaking
|
||
|
my machine's regulations if it came here. I would enjoy the EFF to come 'to
|
||
|
bat' for Torq if I revoke his account for having issues of Phrack in his
|
||
|
directory, Its a shame he hasn't. Does the EFF have any good lawyers in the UK
|
||
|
that you know of?
|
||
|
|
||
|
Regards...
|
||
|
Michael.
|
||
|
|
||
|
---
|
||
|
Michael Lawrie, Operations Group, Systems Development and Security.
|
||
|
Mail: michael@uk.ac.lut.hicom (Span:19527::60478::lorry)
|
||
|
[What pretentious signature?] (Inet: lorry@mit.edu)
|
||
|
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
From: Dispater
|
||
|
To: MICHAEL@hicom.loughborough.ac.uk
|
||
|
|
||
|
I never said I would delete him from the distribution list. I don't
|
||
|
have to DO anything. Who the hell are you pretending to be anyway? You aren't
|
||
|
the admin of MIT's gnu machine.
|
||
|
|
||
|
>I found the following message the other day, whilst routing around, I am to
|
||
|
>assume you lied to me about taking him off the list but for now we'll forget
|
||
|
>that.
|
||
|
|
||
|
Really? What the hell were you doing prowling though someone else's
|
||
|
mail? I assume you did it without Torq's permission. I wonder if MIT would
|
||
|
like to hear that some British hacker is rummaging around their machine? Your
|
||
|
"finding" of our private e-mail might place you in criminal violation of the
|
||
|
Electronic Communications Privacy Act of 1986. This is a federal law in the
|
||
|
United States which protects the privacy of electronic communications. Your
|
||
|
interception of our communications has violated our privacy. How would you
|
||
|
like me to have a little chat with YOUR supervisor?
|
||
|
|
||
|
Why you care about what takes place on the MIT computer which is located
|
||
|
here in the USA? In this country freedom of speech is a right granted to all
|
||
|
its citizens. The previous publisher of Phrack had to go to Federal Court to
|
||
|
prove it and he succeeded. Phrack Inc. is 100% legal here and there is not one
|
||
|
damn thing you can do about it!
|
||
|
|
||
|
Dispater
|
||
|
______________________________________________________________________________
|
||
|
|
||
|
:: Hacker Philosophy ::
|
||
|
|
||
|
From: The Dark Lord Sarik Malthus
|
||
|
Organization: Underground Computing Foundation
|
||
|
|
||
|
|
||
|
> I'm curious...now, don't think I am trying to judge you, or your
|
||
|
> actions, or anything...but I am wondering how you, in your mind, justify the
|
||
|
> actions of hackers and the kind of information provided by your magazine?
|
||
|
|
||
|
I don't. I think people spend too much time attempting to justify
|
||
|
their "morality." I don't play that guilt trip. I only seek information.
|
||
|
Information has no morality. It is simple and pure, just like truth.
|
||
|
|
||
|
I do feel that with knowledge comes responsibility not to use it in a
|
||
|
destructive way. This is why I will not print "how to make bomb" files in
|
||
|
Phrack Inc. Explosives are made for one thing and it doesn't involve too
|
||
|
much creativity. People can get that type of stuff elsewhere.
|
||
|
|
||
|
I have never damaged any system or hurt any individual financially.
|
||
|
Carding is unquestionable robbery. If you know the person you are carding
|
||
|
from, that is revenge and is a different category, as far as I am concerned,
|
||
|
but it still doesn't make it right. Besides, any poser with half a brain can
|
||
|
pull a CBI. That doesn't demonstrate much talent to me. I admit I went
|
||
|
through the c0deZ phase, but I moved onto better things.
|
||
|
|
||
|
I guess your basic question may boil down to, "Why hack?" I see the
|
||
|
internet and the telecom world in as the latest frontier to be explored. If
|
||
|
you look back at how this country started, you will see that it was explored
|
||
|
by people who probably had a similar mentality to that of hackers. We want
|
||
|
to test ourselves. We want to have a broad range of different experiences in
|
||
|
our lives. We are not content with ignorance of the unknown. And, to some
|
||
|
extent we are sick of our current society's norms. With that in mind we
|
||
|
leave the security of what is considered acceptable at times.
|
||
|
|
||
|
I guess I have a lot of different unpopular views....oh well.
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
A Review of:
|
||
|
~~~~~~~~~~
|
||
|
Full Disclosure #23 - a publication For Truth, Justice, and The American Way
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
Full Disclosure Subscription Rates:
|
||
|
P.O. Box 903-FD23 U.S - 12 issues for $18.00
|
||
|
Libertyville IL 60048 24 issues for $29.95
|
||
|
No Canadian orders, please!
|
||
|
by:Twisted Pair
|
||
|
|
||
|
|
||
|
About a month ago I mailed in a coupon I got from friend in order to get a
|
||
|
sample issue of Full Disclosure. Within a week I received Issue #23. It's got
|
||
|
articles on fax interception, dumpster diving, computer security tips,
|
||
|
surveillance tips, technical stuff, mail surveillance, etc.
|
||
|
|
||
|
The Fax Interception article was most interesting to me. I've often
|
||
|
wondered just how easy it could be to intercept faxes. Its all explained in
|
||
|
the article. Here's some text from the article:
|
||
|
|
||
|
| False Sense of Security:
|
||
|
|
|
||
|
| With the widespread proliferation of fax machines came increased use.
|
||
|
| In general, a document transferred has been given the same sort of
|
||
|
| validity as one sent or received by the U.S. Mail.* In general, such
|
||
|
| communications were originally secure. Now that interception equipment is
|
||
|
| available, the
|
||
|
| sense of security has become false.
|
||
|
|
||
|
*Note: Just this month, the FCC has stopped accepting paperwork with faxed
|
||
|
signatures on them. Their new policy states that they only accept
|
||
|
original signatures.
|
||
|
|
||
|
How could the average Phrack reader start intercepting faxes? Use a
|
||
|
standard fax machine hooked up to someone's line? Naaah. Wouldn't work. The
|
||
|
handshaking routine between the two corresponding fax machines would be screwed
|
||
|
all to hell if you threw a third machine into the mix. Full Disclosure claims
|
||
|
to have successfully nabbed faxes with another method. They've pointed out
|
||
|
this assertion with a photo on their front page of a "fax". It was supposedly
|
||
|
intercepted from the FBI. It shows a computer screen with an FBI "FAX" on it.
|
||
|
It looks more like the photo was made with some cutting and pasting at the
|
||
|
neighborhood PIP store. Maybe they should have added the caption "Simulated
|
||
|
Picture" to their front page.
|
||
|
|
||
|
They recommend using IBM PC fax boards to intercept faxes. You'd need
|
||
|
"sophisticated" software that would ignore the handshaking sequences between
|
||
|
the two fax machines you're spying on. The IBM would just save all the page
|
||
|
information and ignore the protocol information transmitted.
|
||
|
|
||
|
Back to the article....
|
||
|
|
||
|
| Cellular phone-based fax machines provide ripe opportunity for "hacker"
|
||
|
| intercepts, since the signal is available via low cost police scanners.*
|
||
|
| No physical connection to a common carrier network is necessary. There is
|
||
|
| absolutely no risk of being detected.
|
||
|
|
||
|
*Note: That should read MODIFIED police scanners. See any of the ads in
|
||
|
"Nuts & Volts" for a book on doing this.
|
||
|
|
||
|
Discussed in the article is something called Broadband Interception.
|
||
|
Commercial fax interception equipment can be hooked up to monitor satellite
|
||
|
link traffic. One unit can decode up to 150 simultaneous fax transmissions
|
||
|
from a 6,000 phone line satellite link.
|
||
|
|
||
|
Next, all the consequences of forged faxes are discussed. People have
|
||
|
become so reliant on fax technology that they incorrectly assume that anything
|
||
|
that "comes over the fax" must be legitimate. Forgers find faxing much simpler
|
||
|
than trying to make a "real" document. The trouble of altering postmarks and
|
||
|
signatures is bypassed. All they need now is scissors and tape to make any
|
||
|
"legitimate-looking" document needed. In their next issue, they further
|
||
|
discuss fax interception and all the implications of sending sensitive info by
|
||
|
fax.
|
||
|
|
||
|
| Fax Intercept Suppliers
|
||
|
| (The sale and/or use of fax interception equipment may be
|
||
|
| restricted by State and Federal law)
|
||
|
|
|
||
|
| Burlex International, Box 6094, Silver Springs MD 20906 (301) 460-4444;
|
||
|
| Communications Devices,3510 Mountain Rd,Haymarket VA 22069 (703) 754-9316;
|
||
|
| El-Tec Intl, 205 Van Buren St #220, Herndon VA 22080 (703) 709-9673;
|
||
|
| [Many others listed]
|
||
|
|
||
|
Oh, here's an ad from Full Disclosure. It's a business card run:
|
||
|
______________________________________________________
|
||
|
| | |
|
||
|
| | Unix Systems Specialists Available July 10, 1992 |
|
||
|
| | |
|
||
|
| | L E N R O S E |
|
||
|
| | |
|
||
|
| | Convicted "Hacker" |
|
||
|
| | and |
|
||
|
| | Computer Consultant |
|
||
|
| | 799 Royal St. Geore #105 |
|
||
|
| | Naperville, IL 60563 (708) 527-1293 |
|
||
|
| |______________________________________________________|
|
||
|
|
||
|
Since you might want to check out a copy of Full Disclosure for yourself,
|
||
|
I'll include their address and stuff. The issue I had was 16 pages long,
|
||
|
half-newspaper size.
|
||
|
______________________________________________________________________________
|
||
|
|
||
|
|
||
|
A Review of TAP #105
|
||
|
~~~~~~~~~~~~~~~~~~~
|
||
|
TAP Magazine Subscription Rates:
|
||
|
PO Box 20264 10 issues for $10.00
|
||
|
Louisville KY 40250-0264
|
||
|
|
||
|
by Dispater
|
||
|
|
||
|
Around March of 1991 I mailed in my $10. for a subscription to TAP
|
||
|
Magazine. Promoted as "the oldest hacker magazine" and "created by Abbie
|
||
|
Hoffman." I still, to this day, have not received ONE issue for my money.
|
||
|
|
||
|
While attending CyberView '91, I met Predat0r and gave him $5.00 for a few
|
||
|
back issues consisting of #97, #100 through issue #104. I was later given a
|
||
|
complimentary issue of #105. After asking about #98 & #99, Predat0r said that
|
||
|
he wasn't going to give those out because of some bullshit with Aristotle.
|
||
|
Whatever...I still don't see why we couldn't see it.
|
||
|
|
||
|
Anyway, Issue #105 of TAP Magazine (June 1991) was nothing spectacular,
|
||
|
but it wasn't bad either. The issue was 18 pages long. For those of you who
|
||
|
have never seen it, TAP contains information on hacking and phreaking as well
|
||
|
as some political commentary. The articles are always diverse and interesting.
|
||
|
|
||
|
TAP #105 contained information about the DNA Box. This is basically
|
||
|
cellular phone phreaking. It was very good and quite detailed. There were
|
||
|
also schematics of bugs and a flow chart explaining the incident initiation
|
||
|
sequence of the E-911 system. This issue of TAP was sprinkled with some neat
|
||
|
advertisements and news clippings (as usual) and wrapped up with a file about
|
||
|
Blue Boxing. The price of $10.00 for 10 issues is worth it, but read on...
|
||
|
|
||
|
Last week I asked Predat0r what was going on with TAP magazine. He told
|
||
|
me that he had the material for the next three issues, but his copier or some
|
||
|
other equipment was broken. This is an excuse I have heard before. Whether it
|
||
|
is a valid excuse or not, only he knows. Since issue #105 (June) there has
|
||
|
been not one issue of TAP. If you have ordered a subscription prior to July
|
||
|
and not received anything, I highly suggest you write to Predat0r.
|
||
|
|
||
|
The material contained in TAP is good and very much worth the price.
|
||
|
(Especially compared to 2600 Magazine) However, I find that the general
|
||
|
management of TAP to be poor, at this time, and therefore I highly recommend
|
||
|
that you NOT send your $10 to TAP Magazine. Considering the amount of
|
||
|
advertisements that we have all seen by TAP (in magazines such as Mondo 2000,
|
||
|
2600, etc.) in the past year, there is no excuse for the non-existent service
|
||
|
that has transpired. Predat0r is a good sysop and needs to manage TAP as he
|
||
|
does his BBS. I do urge you to call BLITZKREIG BBS (502) 499-8933 : NUP:
|
||
|
COLUMBIAN COKE.
|
||
|
|
||
|
I really don't like to be so critical, but I know some people I've talked
|
||
|
to are feeling ripped off. This is why I wrote this. I truly hope that TAP
|
||
|
can get out of this slump.
|
||
|
_______________________________________________________________________________
|