mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
1193 lines
49 KiB
Text
1193 lines
49 KiB
Text
![]() |
==Phrack Magazine==
|
|||
|
|
|||
|
Volume Four, Issue Forty-Three, File 26 of 27
|
|||
|
|
|||
|
International Scenes
|
|||
|
|
|||
|
There was once a time when hackers were basically isolated. It was
|
|||
|
almost unheard of to run into hackers from countries other than the
|
|||
|
United States. Then in the mid 1980's thanks largely to the
|
|||
|
existence of chat systems accessible through X.25 networks like
|
|||
|
Altger, tchh and QSD, hackers world-wide began to run into each other.
|
|||
|
They began to talk, trade information, and learn from each other.
|
|||
|
Separate and diverse subcultures began to merge into one collective
|
|||
|
scene and has brought us the hacking subculture we know today. A
|
|||
|
subculture that knows no borders, one whose denizens share the common goal
|
|||
|
of liberating information from its corporate shackles.
|
|||
|
|
|||
|
With the incredible proliferation of the Internet around the globe, this
|
|||
|
group is growing by leaps and bounds. With this in mind, we want to help
|
|||
|
further unite the communities in various countries by shedding light
|
|||
|
onto the hacking scenes that exist there. We have been requesting files
|
|||
|
from people to describe the hacking scene in their country, but
|
|||
|
unfortunately, more people volunteered than followed through (you know
|
|||
|
who you are.) By next issue we will have more, I'm sure, but for now,
|
|||
|
we want to introduce you all to the scenes in Ireland and Canada.
|
|||
|
|
|||
|
|
|||
|
*****************************************************************************
|
|||
|
|
|||
|
COUNTRIES ON THE INTERNET
|
|||
|
|
|||
|
AD Andorra
|
|||
|
AE United Arab Emirates
|
|||
|
AF Afghanistan
|
|||
|
AG Antigua and Barbuda
|
|||
|
AI Anguilla
|
|||
|
AL Albania
|
|||
|
AM Armenia
|
|||
|
AN Netherland Antilles
|
|||
|
AO Angola
|
|||
|
AQ Antarctica
|
|||
|
AR Argentina
|
|||
|
AS American Samoa
|
|||
|
AT Austria
|
|||
|
AU Australia
|
|||
|
AW Aruba
|
|||
|
AZ Azerbaidjan
|
|||
|
BA Bosnia-Herzegovina
|
|||
|
BB Barbados
|
|||
|
BD Bangladesh
|
|||
|
BE Belgium
|
|||
|
BF Burkina Faso
|
|||
|
BG Bulgaria
|
|||
|
BH Bahrain
|
|||
|
BI Burundi
|
|||
|
BJ Benin
|
|||
|
BM Bermuda
|
|||
|
BN Brunei Darussalam
|
|||
|
BO Bolivia
|
|||
|
BR Brazil
|
|||
|
BS Bahamas
|
|||
|
BT Buthan
|
|||
|
BV Bouvet Island
|
|||
|
BW Botswana
|
|||
|
BY Bielorussia
|
|||
|
BZ Belize
|
|||
|
CA Canada
|
|||
|
CC Cocos Island
|
|||
|
CF Central African Republic
|
|||
|
CG Congo
|
|||
|
CH Switzerland
|
|||
|
CI Ivory Coast
|
|||
|
CK Cook Islands
|
|||
|
CL Chile
|
|||
|
CM Cameroon
|
|||
|
CN China
|
|||
|
CO Colombia
|
|||
|
CR Costa Rica
|
|||
|
CS Czechoslovakia
|
|||
|
CU Cuba
|
|||
|
CV Cape Verde
|
|||
|
CX Christmas Island
|
|||
|
CY Cyprus
|
|||
|
DE Germany
|
|||
|
DJ Djibouti
|
|||
|
DK Denmark
|
|||
|
DM Dominica
|
|||
|
DO Dominican Republic
|
|||
|
DZ Algeria
|
|||
|
EC Ecuador
|
|||
|
EE Estonia
|
|||
|
EG Egypt
|
|||
|
EH Western Sahara
|
|||
|
ES Spain
|
|||
|
ET Ethiopia
|
|||
|
FI Finland
|
|||
|
FJ Fiji
|
|||
|
FK Falkland Islands
|
|||
|
FM Micronesia
|
|||
|
FO Faroe Islands
|
|||
|
FR France
|
|||
|
FX France
|
|||
|
GA Gabon
|
|||
|
GB Great Britain (UK)
|
|||
|
GD Grenada
|
|||
|
GE Georgia
|
|||
|
GH Ghana
|
|||
|
GI Gibraltar
|
|||
|
GL Greenland
|
|||
|
GP Guadeloupe
|
|||
|
GQ Equatorial Guinea
|
|||
|
GF French Guyana
|
|||
|
GM Gambia
|
|||
|
GN Guinea
|
|||
|
GR Greece
|
|||
|
GT Guatemala
|
|||
|
GU Guam
|
|||
|
GW Guinea Bissau
|
|||
|
GY Guyana
|
|||
|
HK Hong Kong
|
|||
|
HM Heard & McDonald Island
|
|||
|
HN Honduras
|
|||
|
HR Croatia
|
|||
|
HT Haiti
|
|||
|
HU Hungary
|
|||
|
ID Indonesia
|
|||
|
IE Ireland
|
|||
|
IL Israel
|
|||
|
IN India
|
|||
|
IO British Indian Ocean Territories
|
|||
|
IQ Iraq
|
|||
|
IR Iran
|
|||
|
IS Iceland
|
|||
|
IT Italy
|
|||
|
JM Jamaica
|
|||
|
JO Jordan
|
|||
|
JP Japan
|
|||
|
KE Kenya
|
|||
|
KG Kirgistan
|
|||
|
KH Cambodia
|
|||
|
KI Kiribati
|
|||
|
KM Comoros
|
|||
|
KN St.Kitts Nevis Anguilla
|
|||
|
KP North Korea
|
|||
|
KR South Korea
|
|||
|
KW Kuwait
|
|||
|
KY Cayman Islands
|
|||
|
KZ Kazachstan
|
|||
|
LA Laos
|
|||
|
LB Lebanon
|
|||
|
LC Saint Lucia
|
|||
|
LI Liechtenstein
|
|||
|
LK Sri Lanka
|
|||
|
LR Liberia
|
|||
|
LS Lesotho
|
|||
|
LT Lithuania
|
|||
|
LU Luxembourg
|
|||
|
LV Latvia
|
|||
|
LY Libya
|
|||
|
MA Morocco
|
|||
|
MC Monaco
|
|||
|
MD Moldavia
|
|||
|
MG Madagascar
|
|||
|
MH Marshall Islands
|
|||
|
ML Mali
|
|||
|
MM Myanmar
|
|||
|
MN Mongolia
|
|||
|
MO Macau
|
|||
|
MP Northern Mariana Island
|
|||
|
MQ Martinique
|
|||
|
MR Mauritania
|
|||
|
MS Montserrat
|
|||
|
MT Malta
|
|||
|
MU Mauritius
|
|||
|
MV Maldives
|
|||
|
MW Malawi
|
|||
|
MX Mexico
|
|||
|
MY Malaysia
|
|||
|
MZ Mozambique
|
|||
|
NA Namibia
|
|||
|
NC New Caledonia
|
|||
|
NE Niger
|
|||
|
NF Norfolk Island
|
|||
|
NG Nigeria
|
|||
|
NI Nicaragua
|
|||
|
NL Netherlands
|
|||
|
NO Norway
|
|||
|
NP Nepal
|
|||
|
NR Nauru
|
|||
|
NT Neutral Zone
|
|||
|
NU Niue
|
|||
|
NZ New Zealand
|
|||
|
OM Oman
|
|||
|
PA Panama
|
|||
|
PE Peru
|
|||
|
PF Polynesia
|
|||
|
PG Papua New Guinea
|
|||
|
PH Philippines
|
|||
|
PK Pakistan
|
|||
|
PL Poland
|
|||
|
PM St. Pierre & Miquelon
|
|||
|
PN Pitcairn
|
|||
|
PT Portugal
|
|||
|
PR Puerto Rico
|
|||
|
PW Palau
|
|||
|
PY Paraguay
|
|||
|
QA Qatar
|
|||
|
RE Reunion
|
|||
|
RO Romania
|
|||
|
RU Russian Federation
|
|||
|
RW Rwanda
|
|||
|
SA Saudi Arabia
|
|||
|
SB Solomon Islands
|
|||
|
SC Seychelles
|
|||
|
SD Sudan
|
|||
|
SE Sweden
|
|||
|
SG Singapore
|
|||
|
SH St. Helena
|
|||
|
SI Slovenia
|
|||
|
SJ Svalbard & Jan Mayen Islands
|
|||
|
SL Sierra Leone
|
|||
|
SM San Marino
|
|||
|
SN Senegal
|
|||
|
SO Somalia
|
|||
|
SR Suriname
|
|||
|
ST St. Tome and Principe
|
|||
|
SU Soviet Union
|
|||
|
SV El Salvador
|
|||
|
SY Syria
|
|||
|
SZ Swaziland
|
|||
|
TC Turks & Caicos Islands
|
|||
|
TD Chad
|
|||
|
TF French Southern Territories
|
|||
|
TG Togo
|
|||
|
TH Thailand
|
|||
|
TJ Tadjikistan
|
|||
|
TK Tokelau
|
|||
|
TM Turkmenistan
|
|||
|
TN Tunisia
|
|||
|
TO Tonga
|
|||
|
TP East Timor
|
|||
|
TR Turkey
|
|||
|
TT Trinidad & Tobago
|
|||
|
TV Tuvalu
|
|||
|
TW Taiwan
|
|||
|
TZ Tanzania
|
|||
|
UA Ukraine
|
|||
|
UG Uganda
|
|||
|
UK United Kingdom
|
|||
|
UM US Minor Outlying Islands
|
|||
|
US United States
|
|||
|
UY Uruguay
|
|||
|
UZ Uzbekistan
|
|||
|
VA Vatican City State
|
|||
|
VC St.Vincent & Grenadines
|
|||
|
VE Venezuela
|
|||
|
VG British Virgin Islands
|
|||
|
VI U.S. Virgin Islands
|
|||
|
VN Vietnam
|
|||
|
VU Vanuatu
|
|||
|
WF Wallis & Futuna Islands
|
|||
|
WS Samoa
|
|||
|
YE Yemen
|
|||
|
YU Yugoslavia
|
|||
|
ZA South Africa
|
|||
|
ZM Zambia
|
|||
|
ZR Zaire
|
|||
|
ZW Zimbabwe
|
|||
|
|
|||
|
****************************************************************************
|
|||
|
|
|||
|
HACKING IN IRELAND
|
|||
|
BY
|
|||
|
HAWKWIND
|
|||
|
|
|||
|
Greetings from the Emerald Isle! My name is Hawkwind, and I'm an
|
|||
|
Irish hacker *evil cackle*. So, what's the hacking scene like in this
|
|||
|
small green island called Ireland, perched on the edge of the Atlantic
|
|||
|
Ocean? -an island which claims to have one of the most sophisticated
|
|||
|
digital phone networks in Europe, home of Eirpac (the Irish equivalent to
|
|||
|
Sprintnet/Telenet) and lots of other weird and wonderful things like
|
|||
|
that.
|
|||
|
|
|||
|
Well, the hacking scene, like the country itself, is small
|
|||
|
-there are no elite in Ireland. -or if there are they are so elite that
|
|||
|
nobody has heard of them. So if you're only into elite stuff, then
|
|||
|
don't bother reading on, skip onto the next country.
|
|||
|
|
|||
|
Also, sadly at the moment, there seems to be little interest in
|
|||
|
hacking in Ireland -I can count the number of Irish hackers I know on
|
|||
|
the fingers of one hand. Maybe I'm just hanging out in the wrong places,
|
|||
|
or perhaps its the Iron Hand of Ireland's own Little Brother, friend and
|
|||
|
follower of the U.S's Big Brother, enforcing his evil ways of censorship
|
|||
|
and the like upon us all, denying us the right to free information.
|
|||
|
Nationwide censorship of Usenet hurts like dry ice, but restricting ftp
|
|||
|
and telnet out of the country to the privileged few, is the fatal
|
|||
|
crunch. Now, I ask you, with grief like this, is it any wonder so few
|
|||
|
Irish have made it into the Computer Underground -to those that have
|
|||
|
beaten the odds, I wish them well.
|
|||
|
|
|||
|
OK, so what do Irish hackers like to hack? Like many hackers we
|
|||
|
just have the curiosity and desire to explore any system or network we
|
|||
|
come across -the everlasting search for that spine-tingling adrenaline
|
|||
|
rush when you've beaten the system and got somewhere where perhaps no
|
|||
|
commoner has gone before -don't ever ask us to choose between getting
|
|||
|
well drunk, having sex, or hacking --it would be a rough choice.
|
|||
|
|
|||
|
Let me start by telling you of what I find an interesting moment
|
|||
|
in Irish hacking history. -to you it may just seem like no big deal, but
|
|||
|
we kinda like it.
|
|||
|
There is a type manufacturing company in Dublin, Ireland and
|
|||
|
they like to make tyres--in order not to ruin any reputations we won't
|
|||
|
mention any names--just another tyre company. Now this company likes
|
|||
|
nice modern systems--big colorful display panels with lots of flashing
|
|||
|
lights, to keep their managers happy and amused for hours. A happy
|
|||
|
company is lots of happy striving workers and so, a big flashy sign
|
|||
|
which displayed the number of tyres being produced, and dutifully
|
|||
|
counted upwards every time one come off the assembly line, was
|
|||
|
constructed. So they had a big sign inside the plant so the workers
|
|||
|
could see how hard they were working, and big bonuses and lots of
|
|||
|
presents were promised if they got past a certain number in a day.
|
|||
|
There was also a large juicy sign outside the plant showing this number
|
|||
|
so that the general public could be suitably impressed with the busy-bee
|
|||
|
workers and the number of tyres being produced.
|
|||
|
|
|||
|
And all these signs and computers controlling them were
|
|||
|
connected to such mysteries as a network with a couple of black boxes
|
|||
|
which management proudly called modems -enter stage left, Irish
|
|||
|
hackers, *deep bow and evil wave*
|
|||
|
|
|||
|
So you can imagine, one warm sunny summer's evening, when there
|
|||
|
was really nothing better to do in Dublin, strange things started to
|
|||
|
happen at the tyre factory. Yes, strange things indeed. Suddenly the
|
|||
|
workers got very lazy and started slowing down their production,
|
|||
|
becoming slower and slower and slower. The numbers stopped counting up
|
|||
|
on the glowing sign. Then the digits oddly started counting backwards.
|
|||
|
Down they went, getting faster and faster -people began to picture
|
|||
|
enraged workers destroying tyres in a crazed frenzy. Soon our sign
|
|||
|
showed that there were no tyres left and it began to dive into negative
|
|||
|
numbers of tyres. The passers-by scratched their heads in astonishment.
|
|||
|
|
|||
|
Ah, but enough fun -this really was a very good tyre company
|
|||
|
with very hard-working workers. They deserve lots of bonuses -heck,
|
|||
|
didn't someone say this was the most productive factory in Europe? Well
|
|||
|
it was that day anyway! *evil cackle* So the signs stopped counting
|
|||
|
backwards, and suddenly began to race forwards like there was no
|
|||
|
tomorrow. The workers were scurrying back and forth at lightening speed
|
|||
|
-one hundred, two hundred..a thousand...ten thousand...what, a hundred
|
|||
|
thousand! Soon our good workers had produced more tyres in the space of
|
|||
|
20 minutes, than visitors Disneyland had in 25 years...
|
|||
|
|
|||
|
Ah yes, these are the things that Irish hackers like to do -we
|
|||
|
still wonder if the management gave all those good workers their
|
|||
|
bonuses??
|
|||
|
|
|||
|
So really, we like to investigate or hack anything that we might
|
|||
|
stumble across -anything from the local University library computer to
|
|||
|
tyre companies to networks in lands far away. One of the things we
|
|||
|
really like doing is just exploring, hopping from one network to the
|
|||
|
next, using computers in such awed places as the U.S., Canada or Mexico,
|
|||
|
this is probably because for us, even to reach such computers and
|
|||
|
networks is an achievement, that our Little Brother would deny us had he
|
|||
|
his evil ways. We think that the Internet is one of the greatest
|
|||
|
creations in a long time, and we would never want to do any malicious
|
|||
|
damage on such a free association -if only our Little Brother would let
|
|||
|
us associate freely with it, instead of making life just that little bit
|
|||
|
more difficult. We find Sprintnet and other connected goodies
|
|||
|
interesting prowling grounds, although we are the first to admit that we
|
|||
|
still have very much to learn here. To explore these systems is very
|
|||
|
interesting for us, because they are so far away and in such interesting
|
|||
|
lands that we may never see ourselves -what to you might be the old U.S.,
|
|||
|
to explore the nets there gives us a sense of excitement and a variety
|
|||
|
of systems that cannot be found on such a small island as our own
|
|||
|
Ireland.
|
|||
|
|
|||
|
And of course, there is the never-ending quest for U.S. outdials
|
|||
|
in the hope that one day we might actually reach some of the fabled U.S.
|
|||
|
h/p boards and actually meet a real Fed or two. *snicker* Turning from
|
|||
|
the strictly hacking scene for the moment there are some Irish people
|
|||
|
interested in the phones and other phun things -a while back two
|
|||
|
college guys were busted for cracking an eleven digit code on some new
|
|||
|
phone system chip or something, which had given them unlimited dialling
|
|||
|
access and other phun privileges. -then there was the magic toll free
|
|||
|
number which for a month or two gave the Irish population unlimited
|
|||
|
access to the outside world (a big thank-you goes to whoever worked that
|
|||
|
one out. *grin*) I'm told from reliable sources that we have a pretty
|
|||
|
sophisticated phone system, a matter we soon hope to be investigating,
|
|||
|
but this does not seem to have stopped phreakers from trying, and if we
|
|||
|
manage to work anything out, we'll, as our 'Telecom Eireann' so aptly
|
|||
|
put it 'Keep in touch across the world'.
|
|||
|
|
|||
|
Sadly, we are plagued by outrageous phone charges, even for
|
|||
|
local calls and hence many Irish boards have failed to blossom -of
|
|||
|
those that do, the sysops seem to be little interested in h/p talk and I
|
|||
|
know of no dedicated h/p Irish board.
|
|||
|
|
|||
|
There also used to be a type of Underground meeting that occurred
|
|||
|
every dark rainy Sunday afternoon, down in the Ormond, a hotel in Dublin
|
|||
|
city centre. It passed unheeded under the guise of a computer club, but
|
|||
|
the bloke who ran it was a renowned con-man, and dealer of everything
|
|||
|
and anything from car radios to Rolex watches -in any event the club
|
|||
|
must have been one of the biggest WareZ swapping centres, including all
|
|||
|
the latest videos from the U.S. which would not be released in the
|
|||
|
cinemas(movies) here until six months later. Generally people
|
|||
|
interested in the same computer type things just got together to chat
|
|||
|
and swap the latest news, disks and videos -an interesting place with
|
|||
|
interesting folks, which sadly no longer seems to happen. Perhaps
|
|||
|
someone will revive something similar in the near future.
|
|||
|
|
|||
|
Well, I'll end the tale there for the moment. Hopefully you've
|
|||
|
gotten a little flavor of our little Underground, watched over by our
|
|||
|
Little Brother, in our little country called Ireland. I'm not sure how
|
|||
|
I ended up writing this article, but since nobody else stepped forward, I
|
|||
|
thought Ireland should at least get some kind of mention, if nothing
|
|||
|
else -so you can /dev/null any flames.
|
|||
|
|
|||
|
Before I sign off, I'd just like to thank Phrack not only for
|
|||
|
giving me the chance to tell my tale, but for supplying us with a great
|
|||
|
publication and guide to the Underground. Finally, if you are an Irish
|
|||
|
hacker/phreaker, then get in touch now!!! -I really want to be able to say
|
|||
|
that I can count the number of Irish hackers I know on two hands, and not
|
|||
|
just one, before the end of the decade! Also, I am always interested in
|
|||
|
talking to anyone interested in the hack/phreak world so get in touch if
|
|||
|
you want to chat -just remember, we are no elite!
|
|||
|
(I don't suppose anyone out there, knows anything about the Irish phone
|
|||
|
system? *shrugs*)
|
|||
|
|
|||
|
Ok, I can be reached at the following, for the next little while:
|
|||
|
(Yes, I do have Irish a/c's but not for thine eyes...)
|
|||
|
|
|||
|
al575@yfn.ysu.edu
|
|||
|
hawkwind@m-net.ann-arbor.mi.us
|
|||
|
hawkwin@santafe.edu (note: no 'd' at end userid)
|
|||
|
|
|||
|
|
|||
|
I'm also sometimes on IRC, and may hopefully be on phantom soon.
|
|||
|
Well, as we say in Ireland, good luck and may the road rise up before
|
|||
|
you.
|
|||
|
|
|||
|
Slan Leat,
|
|||
|
Hawkwind.
|
|||
|
|
|||
|
*****************************************************************************
|
|||
|
|
|||
|
|
|||
|
Canada
|
|||
|
All is Quiet on the Northern Front
|
|||
|
|
|||
|
Written and compiled by Synapse
|
|||
|
|
|||
|
Welcome to the barren wastes or rather the undeveloped wastes if
|
|||
|
you will. Welcome to Canada. A realm seldom traveled and less
|
|||
|
often explored. Canada, or .ca if you will, is virgin country in
|
|||
|
the net. There are places that have been sitting idle for years
|
|||
|
on our nets that still have default accounts in use. There is an
|
|||
|
unmeasurable amount of data out there waiting to be tapped. The
|
|||
|
possibilities in this are endless, Canada is untouched for the
|
|||
|
most part, and as developed networks go, I feel that Canada is as
|
|||
|
close to The 'Undiscovered country' as you can get.
|
|||
|
|
|||
|
Most likely if you are reading this article you will be of a
|
|||
|
nationality other than Canadian. If so, perhaps this will be an
|
|||
|
educational experience for you. To explain our nets and our scene
|
|||
|
here in the far far north, I must first explain our nation and
|
|||
|
its greatest difficulty, it has NO identity, therefore it tends
|
|||
|
to mirror those it is enamored with. Hence our scene resembles
|
|||
|
an amalgamation of whatever seems popular in the nets at a given
|
|||
|
time. Most often it attempts somewhat miserably to emulate the
|
|||
|
scene south of our border, the great U S of A. And in short it
|
|||
|
fails miserably.
|
|||
|
|
|||
|
This is not to say that Canada does not have a scene of its own
|
|||
|
nor is it attempting to take away from those scenes that have
|
|||
|
developed fully on their own within .ca. It is simply bringing to
|
|||
|
light a problem that plagues our scene and dilutes it for those
|
|||
|
who are serious about the computer underground, and whatever
|
|||
|
ideals it may contain.
|
|||
|
|
|||
|
If you travel the nets in Canada you will find that dissent and
|
|||
|
"ElYtEeGoStRoKInG" are staple with both the Hacking and Warez
|
|||
|
scenes all throughout the nine provinces and 2 territories. As I
|
|||
|
am sure you know this is not a problem unique to .ca. However in
|
|||
|
a scene as minute and spread painfully thin as ours, arrogance
|
|||
|
and mis-communication can be fatal in the way of cooperation
|
|||
|
gaps. This has proved the case many times in the recent past, and
|
|||
|
I am sure it will in the near future as well.
|
|||
|
|
|||
|
Canada seems to a have a communication barrier that separates
|
|||
|
east from west. There is simply close to no communications
|
|||
|
between the two. It is as if we are in separate hemispheres and
|
|||
|
lost to the technology of fibber optics and damned to smoke
|
|||
|
signals and drum beating. I have to wonder sometimes if both
|
|||
|
sides are so involved in their own local power struggles, that
|
|||
|
the rest of the world has melted away including their country men
|
|||
|
on either side.
|
|||
|
|
|||
|
Alas it is time to dive into this the this of the article. To
|
|||
|
detail the complete underground in Canada would be impossible for
|
|||
|
me to do, to even give a non-biased view would be impossible. So
|
|||
|
if you feel that this is simply an overextended opinion, thank
|
|||
|
IBM for the PgDn key and spare yourself some opinionated text.
|
|||
|
|
|||
|
The Almost LODs of .ca
|
|||
|
|
|||
|
Just like the U.S., Canada is proliferated with umpteen amounts
|
|||
|
of upstart groups who after reading some trashy second rate book
|
|||
|
on LOD or Kevin Mitnick, have decided that they have found what
|
|||
|
it is to be elyte. Most often these will be the prominent voices
|
|||
|
on underground boards spitting flame and stroking immeasurably
|
|||
|
unhealthy egos, and boasting how proficient they are with toneloc
|
|||
|
and Killer Cracker. However as with most boasts put forth by
|
|||
|
fourteen year olds, nothing comes of it.
|
|||
|
|
|||
|
However if you can manage passage through the quagmire of shit
|
|||
|
that serves as the .ca scene, then you will most likely encounter
|
|||
|
some of .ca's more serious minded types who while retaining
|
|||
|
talent and a penchant for learning, do not sport an ego of
|
|||
|
astronomical proportions, and wit that would bring condescension
|
|||
|
from an ant. The following is a short list of several of .ca's
|
|||
|
more prominent if not more talented groups.
|
|||
|
|
|||
|
RaBID The Virus People
|
|||
|
|
|||
|
If the Virus world is your environment, then most likely you
|
|||
|
have stumbled across the work of RaBID, hopefully not on the
|
|||
|
receiving end.. Rabid is based out of 416 or rather Toronto
|
|||
|
Canada, at it's prime Rabid was running a mail net that spanned
|
|||
|
Canada and were releasing enough material to employ the boys at
|
|||
|
McAfee. Things have changed. While Rabid had at one point been a
|
|||
|
productive group (if you can call a virus group productive) time
|
|||
|
seems to have worn their edge, in fact Rabid as a group have
|
|||
|
failed to release anything of value in a great long time. Perhaps
|
|||
|
this will change. If nothing else Rabid did bring a much needed
|
|||
|
ego boost to the Canadian scene, in doing so they opened the door
|
|||
|
for other such groups to be seen on the international level with
|
|||
|
out being laughed out of the nets. For this if nothing else they
|
|||
|
deserve recognition. There is a great deal more to be said about
|
|||
|
Rabid, however as I said all the information given here will be
|
|||
|
cursory, if you require an information at all in the future on
|
|||
|
Rabid or any of the groups mentioned below I will leave an e-mail
|
|||
|
address below where you can write me, I will help you if I can.
|
|||
|
|
|||
|
FOG out of 403 Calgary, Alberta
|
|||
|
|
|||
|
No scene is complete without talented juveniles given to temper
|
|||
|
tantrums virus spreading and general malicious behavior..Enter
|
|||
|
FOG. FOG stands for the Fist Of God, it is for the most part a
|
|||
|
group of individuals who go through unnatural amounts of effort
|
|||
|
to get under the skin of others. Yet beyond juvenile behavior
|
|||
|
that tends to underscore most endeavors they undertake. FOG does
|
|||
|
for the most part work very diligently for a united .ca scene.
|
|||
|
They have in the past run a nation wide net using encrypted mail
|
|||
|
procedures so that dialogue could be opened between the east and
|
|||
|
western scenes. This event was stopped when the Hubs house was
|
|||
|
raided by the Royal Canadian Mounted Police for suspected telco
|
|||
|
abuse, they were no charges laid however yet the organizers felt
|
|||
|
that the information passing through the net was much too
|
|||
|
valuable to be compromised by a bust. The net was killed.
|
|||
|
|
|||
|
After the net disappeared several members of FoG began writing
|
|||
|
bbs software to be spread across the country to make networking
|
|||
|
easier or rather standardized. The bbs also includes encryption
|
|||
|
options for the mail, and will soon be HAM radio as well as
|
|||
|
cellular modem capable. This program is available to any who wish
|
|||
|
to take it, as I said earlier, just mail me.
|
|||
|
|
|||
|
NuKE Making Art out of Arrogance
|
|||
|
|
|||
|
NuKE hails from 516 Montreal, Canada. It as far as I can see
|
|||
|
primarily now a virus group. Producing and modifying strains, for
|
|||
|
the most part NuKE has been the most active underground .ca group
|
|||
|
that has seen movement on an international level, with this past
|
|||
|
year.
|
|||
|
|
|||
|
It's membership has changed quite severely since I last had
|
|||
|
contact with them. Therefore I fear that to publish anything else
|
|||
|
on them would be inaccurate and therefore an injustice. However
|
|||
|
if you are interested in pursuing this topic........Mail me.
|
|||
|
|
|||
|
|
|||
|
As you can see these are cursory overviews of Canada's groups it
|
|||
|
is of course largely incomplete, I provided it only to serve as a
|
|||
|
guide for the feeling of Canada's groups. There are of course
|
|||
|
many worth mentioning that I failed to show, and moreover there
|
|||
|
is a great deal more to the groups that I did mention. To those
|
|||
|
who are in the above groups are unhappy with the opinion put
|
|||
|
forth please by all means FUCKOFF. I e-mailed all of you, and in
|
|||
|
your infallible wisdom you failed to reply. So suffer with it :>
|
|||
|
|
|||
|
.ca and the law
|
|||
|
|
|||
|
While Canada has been for the most part largely un-abused by the
|
|||
|
'Computer Criminal'. It's laws are none the less fairly advanced.
|
|||
|
Our legislators to their credit have kept a close eye on our
|
|||
|
neighbors in the south, and have introduced laws accordingly.
|
|||
|
|
|||
|
The following is the Canadian criminal code as pertaining to
|
|||
|
Computer Crime.
|
|||
|
|
|||
|
342.1
|
|||
|
(1) Every one who, fraudulently and without color of right,
|
|||
|
(a) obtains, directly or indirectly, any computer service,
|
|||
|
(b) by means of an electro-magnetic, acoustic, mechanical
|
|||
|
or other device, intercepts or causes to be intercepted,
|
|||
|
directly or indirectly, any function of a computer system, or,
|
|||
|
(c) uses or causes to be used, directly or indirectly, a
|
|||
|
computer system with intent to commit an offense under
|
|||
|
paragraph (a) or (b) or an offense under section 430 in
|
|||
|
relation to data or a computer system
|
|||
|
is guilty of an indictable offence and liable to
|
|||
|
imprisonment for a term not exceeding ten years, or is
|
|||
|
guilty of an offence punishable on summary conviction.
|
|||
|
(2) In this section, "computer program" means data representing
|
|||
|
instructions or statements that, when executed in a computer
|
|||
|
system, causes the computer to perform a function;
|
|||
|
"computer service" includes data processing and the
|
|||
|
storage or retrieval of data; "computer system" means
|
|||
|
a device that, or a group of interconnected or related
|
|||
|
devices one or more of which,
|
|||
|
(a) contains computer programs or other data, and
|
|||
|
(b) pursuant to computer programs,
|
|||
|
(i) performs logic and control, and
|
|||
|
(ii) may perform any other function;
|
|||
|
"data" means representation of information or of concepts
|
|||
|
that are being prepared or have been prepared in a form
|
|||
|
suitable for use in a computer system;
|
|||
|
"electro-magnetic, acoustic, mechanical or other device"
|
|||
|
means any device or apparatus that is used or is capable of
|
|||
|
being used to intercept any function of a computer system,
|
|||
|
but does not include a hearing aid used to correct subnormal
|
|||
|
hearing of the user to not better than normal hearing;
|
|||
|
"function" includes logic, control, arithmetic, deletion,
|
|||
|
storage and retrieval and communication of telecommunication to,
|
|||
|
from or within a computer system; "intercept" includes listen
|
|||
|
to or record a function of a computer system, or acquire the
|
|||
|
substance, meaning or purport thereof.
|
|||
|
|
|||
|
430.
|
|||
|
[...]
|
|||
|
(1.1) Every one commits mischief who willfully
|
|||
|
(a) destroys or alters data;
|
|||
|
(b) renders data meaningless, useless or ineffective;
|
|||
|
(c) obstructs, interrupts or interferes with the lawful
|
|||
|
use of data; or
|
|||
|
(d) obstructs, interrupts or interferes with any person
|
|||
|
in the lawful use of data or denies access to data
|
|||
|
to any person who is entitled to access thereto.
|
|||
|
[...]
|
|||
|
|
|||
|
(8) In this section, "data" has the same meaning as in
|
|||
|
section 342.1.
|
|||
|
|
|||
|
As you can see our criminal code carries severe penalties for
|
|||
|
both Hacking and Virus spreading however, there is little
|
|||
|
precedent to set sentences by. While this is reassuring, there
|
|||
|
seems to be a new trends to prosecute those who are caught at
|
|||
|
computer crime. Moreover it seems to be a trend to prosecute with
|
|||
|
setting precedence in mind.. So for those of you in .ca who have
|
|||
|
busted recently I would begin to fear right about now.
|
|||
|
|
|||
|
For the most part most computer crime in Canada that results in
|
|||
|
busts is telco related, most often the charges are federal but
|
|||
|
the sentences are light, however as I said before, this is
|
|||
|
changing. And will continue to change with each new bust ,
|
|||
|
welcome to the new dawn I suppose.
|
|||
|
|
|||
|
Datapac, Canada's first net
|
|||
|
|
|||
|
As it stands Datapac is Canada's largest and most used
|
|||
|
network, it is old archaic and slow, yet still it is immense
|
|||
|
amounts of fun to play with. The following is a technical excerpt
|
|||
|
to help you understand the operation of Datapac and how to
|
|||
|
maneuver it. Those of you who are already familiar with the
|
|||
|
workings of this type of network will find this dry and
|
|||
|
repetitive for those of you who are not familiar it may make for
|
|||
|
some learning.
|
|||
|
|
|||
|
After the manual entry you will find a list of interesting sites
|
|||
|
to explore with, enjoy....
|
|||
|
|
|||
|
Datapac 3101 "Welcome to the Dark Ages"
|
|||
|
|
|||
|
Interface (ITI) in a Packet Assembler/Disassembler (PAD), which
|
|||
|
allows the devices to access the Network over dial-up (DDD) or Dedicated
|
|||
|
Access Lines.
|
|||
|
|
|||
|
ITI, the end-to-end protocol for Datapac 3101, conforms to the
|
|||
|
CCITT recommendations X.3, X.28 and X.29 and supports access to the
|
|||
|
Datapac Network for asynchronous, start-stop character mode terminals.
|
|||
|
|
|||
|
X.3 specifies the operation of the PAD. It contains the
|
|||
|
specifications for the twenty-two International parameters and
|
|||
|
their operation.
|
|||
|
|
|||
|
X.25 specifies the command language between the terminal and
|
|||
|
the PAD. It also specifies the conditions which define the command
|
|||
|
mode and the data transfer mode.
|
|||
|
|
|||
|
X.29 specifies the procedures to be followed by an X.25 DTE
|
|||
|
to access and modify the parameters in the PAD as well as the data
|
|||
|
transfer procedure.
|
|||
|
|
|||
|
The Datapac 3101 service provides for terminal to Host (user's
|
|||
|
computer) and terminal to terminal communication. The Host access
|
|||
|
should conform with the X.25 protocol, using the Datapac 3000 access
|
|||
|
service, and also support the higher level protocol conventions for ITI.
|
|||
|
Host access may also be provided via the Datapac 3101 service for some
|
|||
|
applications. The Datapac 3101 service also provides block mode and
|
|||
|
tape support.
|
|||
|
|
|||
|
INTERNATIONAL PAD PARAMETERS
|
|||
|
----------------------------
|
|||
|
|
|||
|
1) Ability to Escape from Data Transfer State*
|
|||
|
|
|||
|
The setting of this parameter allows the user to interrupt
|
|||
|
the communication of his or her application (data transfer mode) and
|
|||
|
interact with the PAD (common mode). The character to do this is
|
|||
|
"ControlJP". To return to data transfer mode, press the carriage
|
|||
|
return or enter a blank command line. If the user wants to send a
|
|||
|
"ControlJP" to the Host, with this parameter set set to one, simply
|
|||
|
hit ControlJP twice and the second ControlJP will go to the Host and
|
|||
|
the user will remain in data transfer mode. This also applies to
|
|||
|
the user data field in the call request command line.
|
|||
|
|
|||
|
Parameter Number: 1
|
|||
|
Possible Values: 0 = Escape not possible.
|
|||
|
1 = Escape is possible.
|
|||
|
|
|||
|
*Note: Escape from Data transfer mode may also be possible using
|
|||
|
the break signal if parameter seven is set to eight.
|
|||
|
|
|||
|
|
|||
|
2) Echo*
|
|||
|
|
|||
|
This parameter indicates to the PAD whether or not the
|
|||
|
terminal input data must be echoed. This may be required if the user's
|
|||
|
terminal cannot echo back what is being entered.
|
|||
|
|
|||
|
Parameter Number: 1
|
|||
|
Possible Values: 0 = No echo.
|
|||
|
1 = Echo.
|
|||
|
|
|||
|
*Note: Echo will also be affected by the setting of Parameter 20.
|
|||
|
|
|||
|
|
|||
|
3) Selection of Data Forwarding Signal
|
|||
|
|
|||
|
This parameter indicates to the PAD the set to terminal
|
|||
|
generated characters or conditions that will cause data to be forwarded
|
|||
|
to the destination. For example, (CR) can be used as a data forwarding
|
|||
|
signal on receipt of a (CR) from the local DTE Y, the PAD will forward all
|
|||
|
characters in its buffer to the remote end, including the (CR). If P13 is
|
|||
|
set to 6.7, 22 or 23, a (LF) will be included in the packet and will delimit
|
|||
|
it. Data is also forwarded when the buffer is full whether or not a
|
|||
|
forwarding character is received.
|
|||
|
|
|||
|
Parameter Number: 3
|
|||
|
Possible Values: 0 = No data forwarding signal.
|
|||
|
2 = Forward on carriage return.
|
|||
|
2 = Carriage return.
|
|||
|
126 = All characters in columns 0 and 1
|
|||
|
of ASCII table and the character
|
|||
|
del of International alphabet #5.
|
|||
|
|
|||
|
|
|||
|
4) Selection of Idle Timer Delay
|
|||
|
|
|||
|
This parameter is used to determine the idle timer limit
|
|||
|
value when data forwarding is based on timeouts. To optimize packetizing
|
|||
|
of data, no data forwarding signal need be specified. The PAD will then
|
|||
|
packetize data based on packet size specified (256 or 128 characters).
|
|||
|
The idle timer is used to send any packets that are not fully filled.
|
|||
|
If idle timer is activated and the Host requires the (CR) to input data,
|
|||
|
it still must be provided before the data send is accepted by the Host.
|
|||
|
The idle timer does not send any empty packets.
|
|||
|
|
|||
|
|
|||
|
Parameter Number: 4
|
|||
|
Possible Values: 0 = No data forwarding on timeout is
|
|||
|
required.
|
|||
|
1-255 = Indicates value of the delay in
|
|||
|
twenties of a second. (i.e., a
|
|||
|
value of 250 makes the time wait
|
|||
|
10 seconds)
|
|||
|
|
|||
|
*Note: When editing is on (P15:1), the idle timer is inactive.
|
|||
|
If this is the only data forwarding condition, turning the editing function
|
|||
|
on could cause a user terminal to hand or data not to be forwarded.
|
|||
|
|
|||
|
5) Auxiliary Device Control*
|
|||
|
|
|||
|
This is used for flow control of data coming from either a
|
|||
|
PC or auxiliary device, e.g.: a paper tape machine. When set to
|
|||
|
1 it indicates to the PAD that the data is to be read an auxiliary
|
|||
|
I/O device connected to the terminal. This parameter set to 2 indicates
|
|||
|
that the data is coming from an intelligent device, i.e., a PC, and that
|
|||
|
the PAD must exert flow control differently.
|
|||
|
|
|||
|
Parameter Number: 5
|
|||
|
Possible Values: 0 = No use of X-on/X-off.
|
|||
|
1 = Use of X-on/X-off for auxiliary
|
|||
|
devices.
|
|||
|
2 = Use of X-on/X-off for
|
|||
|
intelligent terminals.
|
|||
|
|
|||
|
*Note: A value of 2 is recommended for PC's.
|
|||
|
|
|||
|
|
|||
|
6) Suppress Network Messages
|
|||
|
|
|||
|
This parameter indicates to the PAD whether or not Network
|
|||
|
generated messages are to be transmitted to the terminal.
|
|||
|
|
|||
|
Parameter Number: 6
|
|||
|
Possible Values: 0 = Suppress message.
|
|||
|
1 = Transmit message.
|
|||
|
5 = PAD prompt (*) follows Datapac
|
|||
|
service signals.
|
|||
|
|
|||
|
7) Procedure on Break
|
|||
|
|
|||
|
This parameter is used to indicate how the PAD should
|
|||
|
process a break signal that is received from the terminal
|
|||
|
while the terminal is in data transfer state.
|
|||
|
|
|||
|
Parameter Number: 7
|
|||
|
Possible Values: 0 = Nothing. (remain in data transfer
|
|||
|
mode)
|
|||
|
1 = Interrupt. (remain in data
|
|||
|
transfer mode)
|
|||
|
2 = Reset. (remain in data transfer
|
|||
|
mode)
|
|||
|
4 = Send an "indication of break"
|
|||
|
message to the packet mode DTE.
|
|||
|
(remain in data transfer mode)
|
|||
|
8 = Escape from data transfer mode
|
|||
|
(i.e., enter command mode)
|
|||
|
16 = Discard output to terminal
|
|||
|
activate Parameter 8 (P8:1)
|
|||
|
(remain in data transfer mode)
|
|||
|
21 = A combination of 1, 4 and 16.
|
|||
|
|
|||
|
|
|||
|
*Note: The break signal is ignored if the virtual circuit is not
|
|||
|
established while in command state. The break signal will delete
|
|||
|
the current line.
|
|||
|
|
|||
|
The valid values for P7 are 0, 1, 2, 8 and 21.
|
|||
|
|
|||
|
8) Discard Output
|
|||
|
|
|||
|
This parameter is used in conjunction with Parameter 7.
|
|||
|
Depending upon the break procedure selected, this parameter may be
|
|||
|
set by the PAD when the terminal user requests that terminal data be
|
|||
|
discarded. This parameter must then be reset by the destination
|
|||
|
computer to allow normal delivery. The PAD will discard all packets
|
|||
|
destined for the terminal from the time the PAD sets this parameter
|
|||
|
(i.e., it receives a break signal when Parameter 7 is set to 21) to
|
|||
|
the time the parameter is reset by the destination. It can only be
|
|||
|
reset by the destination.
|
|||
|
|
|||
|
Parameter Number: 8
|
|||
|
Possible Values: 0 = Normal delivery of output to
|
|||
|
terminal.
|
|||
|
1 = Discard output to terminal.
|
|||
|
|
|||
|
9) Padding after Carriage Return
|
|||
|
|
|||
|
This parameter is used to specify the number of padding
|
|||
|
characters to be inserted by the PAD following a CR transmitted
|
|||
|
to the terminal. Padding allows time for the carriage to return
|
|||
|
on mechanical printing devices.
|
|||
|
|
|||
|
|
|||
|
Parameter Number: 9
|
|||
|
Possible Values: 0 = 2 padding characters will be
|
|||
|
inserted at 110 bps and 4
|
|||
|
padding characters will be
|
|||
|
inserted at higher speeds, in
|
|||
|
command mode only. (no padding
|
|||
|
is done in data transfer mode)
|
|||
|
1-255 = The number of padding characters
|
|||
|
to be inserted in both data
|
|||
|
transfer and command mode.
|
|||
|
|
|||
|
10) Line Folding
|
|||
|
|
|||
|
This parameter indicates the maximum number of printable
|
|||
|
characters that can be displayed on the terminal before the PAD must
|
|||
|
send a format effector (i.e.., <CR><LF>). This permits more data to
|
|||
|
be transmitted in one packet while still letting the user print out
|
|||
|
more than one line, i.e., printing out forms.
|
|||
|
|
|||
|
11) Transmission Speed (Read only)
|
|||
|
|
|||
|
This parameter is set by the PAD as a result of transmission
|
|||
|
speed detection if the terminal accesses an autobaud port. When a
|
|||
|
private port with fixed speed is used, this parameter is set based
|
|||
|
on the pre-stored information selected at subscription time.
|
|||
|
|
|||
|
Parameter Number: 11
|
|||
|
Possible Values: 0 = 110 bps
|
|||
|
2 = 300 bps
|
|||
|
3 = 1200 bps
|
|||
|
4 = 2400 bps
|
|||
|
This is all very dry stuff (what buffer isn't?) however if you need more
|
|||
|
info on it simply mail me.
|
|||
|
|
|||
|
NUA list
|
|||
|
20500011 Bell Northern Research
|
|||
|
39400100 Envoy (English/Francais)
|
|||
|
30400101 Envoy (Anglais/French)
|
|||
|
39500032 Globe and Mail
|
|||
|
41100015,I Infoglobe
|
|||
|
59600072 University of Athabasca
|
|||
|
60100010 Universtiy of Alberta
|
|||
|
67100752 ?
|
|||
|
67100673 ?
|
|||
|
20400177 QL
|
|||
|
29400138 Tymnet CIS02 7770,101 'free demo'
|
|||
|
20401338 Tymnet
|
|||
|
41100043 CSG Infoglobe
|
|||
|
73500023 KN Computer MCT
|
|||
|
59100092 Keyano College (Alberta)
|
|||
|
72400014 System Max-Daisey (VAX/VMS)
|
|||
|
69100018 Cybershare
|
|||
|
55500010 ?
|
|||
|
29400263 ?
|
|||
|
29400263 ?
|
|||
|
67100086 Sears
|
|||
|
67100132 Primenet
|
|||
|
67100489 Terminal ID=VAX
|
|||
|
67100629 (VAX/VMS)
|
|||
|
67100632 McKim Advertising (Vancouver)
|
|||
|
93200233 University of Manitoba
|
|||
|
79400100 Envoy Info/Mailbox
|
|||
|
92100086 Datapac General Info
|
|||
|
20500011 Canole II
|
|||
|
|
|||
|
I have kept a number of sites I have, off this list simply
|
|||
|
to ensure I keep them, however there are thousands of Virgin
|
|||
|
sites available off of Dpac. Something to keep your eyes open for
|
|||
|
are Canadian government machines which are fairly abundant on the
|
|||
|
Dpac.
|
|||
|
|
|||
|
Beyond Dpac, there are some actual BBS's worth calling, most
|
|||
|
however would rather not have there numbers published in Phrack. None
|
|||
|
the less here are some stable, and relatively active BBS's:
|
|||
|
|
|||
|
The Underground Subway 606-590-1147
|
|||
|
Gridpoint 403-283-5519
|
|||
|
The G-spot (Rabid HQ) 416-256-9017
|
|||
|
Front 242 (VX)(Rabid) 416-790-6632
|
|||
|
|
|||
|
I am sorry for what this article did not cover, in the umpteen or so
|
|||
|
pages I have punched up, I still have covered not even a tenth
|
|||
|
of what I would like to cover. For those who wish a reliable UG
|
|||
|
bbs for list .ca or more info on the Dpac or wish to elicit any other
|
|||
|
response to this article please e-mail me at besaville@sait.ab.ca
|
|||
|
|
|||
|
*********************************************************************
|
|||
|
|
|||
|
The German Scene
|
|||
|
(by SevenUp)
|
|||
|
----------------
|
|||
|
|
|||
|
CCC
|
|||
|
---
|
|||
|
|
|||
|
Talking about the German Hacker Scene, the Chaos Computer Club (CCC) comes
|
|||
|
to most people's mind. They are most famous for their 'NASA-Hack' and their
|
|||
|
publications like Hackerbibel and Datenschleuder, a monthly magazine talking
|
|||
|
about 'softer' stuff than 2600, such as MUD's, the Internet and BBS'es.
|
|||
|
|
|||
|
They organize the annual Chaos Communication Congress, held annually
|
|||
|
from December, 27th till 29th in Hamburg. Usually around 1000 people show up
|
|||
|
there, discussing many different topics, such as Phreaking, Internet,
|
|||
|
Women and Computer, Cellular Phones, Phone Cards and others. Many well-known
|
|||
|
people, like Pengo and Professor Brunnstein the meeting. There are usually
|
|||
|
also shows of Horror Movies (but no porns like at HohoCon), but it's not
|
|||
|
a real 'party' like SummerCon or the upcoming Hacktic Party.
|
|||
|
|
|||
|
Another annually meeting from CCC members and many other hackers is at the
|
|||
|
huge computer fare 'CeBit' in Hannover in March. The Get Together is at the
|
|||
|
Telekom booth on Tuesday at 4pm. Usually Telekom (the German phone company)
|
|||
|
representatives are very kind, give away phone cards (value: $4), but
|
|||
|
usually don't have any interesting new informations.
|
|||
|
|
|||
|
There haven't been any hacks affiliated with the CCC for the last couple of
|
|||
|
years. The CCC tries to get away from their former criminal image, talking
|
|||
|
mostly about risks of computers in society, and producing lots of press
|
|||
|
releases.
|
|||
|
|
|||
|
The KGB Hack
|
|||
|
------------
|
|||
|
|
|||
|
Most of you might know "The Cuckoo's Egg" by Cliff Stoll. His exciting
|
|||
|
novel talks about German Hackers hacking for the KGB.
|
|||
|
These guys were using the German x.25 network Datex-P to get to a US
|
|||
|
University, and from there to several hosts on the Arpa/Milnet (Internet).
|
|||
|
They were using mostly basic knowledge to get into several UNIX and VMS
|
|||
|
Systems, reading personal Mail and looking for documents the 'Russians'
|
|||
|
might have been interested in.
|
|||
|
|
|||
|
It all ends up with the suicide (murder?) of Karl Koch, one of the hackers.
|
|||
|
Although these hackers weren't CCC members, there is a pretty good book
|
|||
|
from the CCC about it, containing more facts than Cliff's book:
|
|||
|
"Hacker fuer Moskau", published by Wunderlich.
|
|||
|
|
|||
|
This is probably the best known German hack of all times.
|
|||
|
|
|||
|
Networks
|
|||
|
--------
|
|||
|
|
|||
|
I. x.25
|
|||
|
|
|||
|
The German x.25 System is called 'Datex-P' and has the DNIC (2624).
|
|||
|
Dialups are in almost every area code, or can be reached locally from
|
|||
|
everywhere. There are also Tymnet and Sprintnet Dialups available in
|
|||
|
the major cities, with some limitations though. Tymnet won't connect you
|
|||
|
to dpac (Datapac Canada). Sprintnet has just a true dialup in Frankfurt,
|
|||
|
the other dialups are handled by their partner Info AG, which allow
|
|||
|
calling most RNUAs, but most Sprintnet NUIs won't work.
|
|||
|
|
|||
|
There is a 'Subnet' in the Datex-P Network, the so called 'WiN'
|
|||
|
(which means scientific network). Almost all universities have connections
|
|||
|
to the WiN, which means they pay a flat rate each month, which allows
|
|||
|
them to make as many calls and transfer as much data to other WiN hosts,
|
|||
|
as they like. Usually x.25 rates are charged by the volume of packages/data.
|
|||
|
You can identify WiN addresses easily, because they start with
|
|||
|
(0262)45050... There are many gateways from WiN to Internet, and also a few
|
|||
|
from Internet to WiN. WiN NUAs can be reached without problem from any x.25
|
|||
|
network in the world, like Sprintnet or Tymnet; though most WiN PADs will
|
|||
|
refuse to connect to non-WiN NUAs.
|
|||
|
|
|||
|
There are also a couple of German systems, international hackers used to like.
|
|||
|
The most-famous is probably Lutzifer in Hamburg, Germany. It can still
|
|||
|
be reached from x.25 Networks like Sprintnet or Tymnet.
|
|||
|
Around two years ago, British, American and other hackers used to trade
|
|||
|
all kinds of codez on "Lutz". But now, Pat Sisson ("frenchkiss") from Sprintnet
|
|||
|
Security and Dale Drew ("Bartman") from Tymnet Security, try to track
|
|||
|
down everyone abusing their NUIs or PADs.
|
|||
|
|
|||
|
Before Lutzifer went up 2.5 years ago, tchh and Altos Munich were most
|
|||
|
attractive. They were running the same simple Korn-Chat on an Altos.
|
|||
|
There are still a couple of other x.25 Systems, which attract hackers
|
|||
|
from all over the world, like qsd, Pegasus (in France and Switzerland) and
|
|||
|
Secret Tectonics / sectec, a rather new semi-private Board in Germany with
|
|||
|
x.25 and Direct Phone Dialups, uucp/Internet Mail, File and Message Bases and
|
|||
|
all Phrack Issues as well.
|
|||
|
|
|||
|
II. Internet
|
|||
|
|
|||
|
But now, most hackers quit the x.25 scene and tried to get onto Internet.
|
|||
|
Unlike the fast Internet connections in the USA between .edu sites,
|
|||
|
German Internet connections are mostly routed through slow (9.6kbps or 64k)
|
|||
|
x.25 Links.
|
|||
|
|
|||
|
This is mostly the fault of the German phone company 'Telekom'. They have a
|
|||
|
monopoly on phone lines in Germany and charge 2-10 times higher fees than
|
|||
|
American phone co's. Even local calls are US$1.50/hour.
|
|||
|
|
|||
|
There aren't many German Internet Sites that attract foreign hackers,
|
|||
|
compared to US Sites that German Hackers are interested in.
|
|||
|
|
|||
|
There are almost no public Internet BBSes with free access in Germany.
|
|||
|
Also, German Universities have often a pretty tight security and get
|
|||
|
mad easily.
|
|||
|
|
|||
|
III. Amiga Kiddos
|
|||
|
|
|||
|
BBS'es are still the major hang-out besides IRC. The Amiga Scene with
|
|||
|
its K-rad Kiddos (most of them under 18 years) used to be dominant a
|
|||
|
couple of years ago, trading Calling Cards and new Blue Box frequencies
|
|||
|
to call the best boards in the US to leech the latest games.
|
|||
|
But recently, the IBM scene caught up and many guys switched from Amiga
|
|||
|
to IBM; so over 50% of pirate boards are IBM boards now.
|
|||
|
|
|||
|
But recently, BBS sysops have to face hard times. A couple of months
|
|||
|
ago, lots of BBS'es in Berlin, but also in Bavaria and North Germany
|
|||
|
got 'busted' - raided by the police because of their illegal warez.
|
|||
|
(see my article in Phrack 42 about it) The man behind these actions
|
|||
|
is the lawyer 'Guenther Freiherr von Gravenreuth', who works for Acti-
|
|||
|
vision, the SPA and BSA. He is tracking down kids with piracy as recklessly
|
|||
|
as BBS Sysops, who sell subscriptions for a 'Disabled Upload/Download Ratio'
|
|||
|
for around $100 a month. There have been a couple of these trials lately,
|
|||
|
without much notice by the press. Mr Gravenreuth is also responsible for
|
|||
|
many people's fear to put up a new BBS - especially in Bavaria where he lives.
|
|||
|
|
|||
|
Also, calling the favorite Board in the US is getting harder and harder,
|
|||
|
as covered in the next Chapter.
|
|||
|
|
|||
|
IV. The Phone System
|
|||
|
|
|||
|
Blueboxing used to be the favorite sport of many German traders for the
|
|||
|
last couple of years. But some phreakers wanted to make more money,
|
|||
|
selling the Bluebox Story to Magazines like Capital or Spiegel, or to
|
|||
|
TV Shows. Even AT&T and the German Telecom, who seemed to be blind about
|
|||
|
this phreaking, couldn't avoid facing the truth now - they had to do
|
|||
|
something, not only to recover from the huge losses, but also to save
|
|||
|
their reputation.
|
|||
|
|
|||
|
There are a lot of rumors and text files about the actions these phone
|
|||
|
companies took; most of them are fakes by 'eleet' people, who don't want
|
|||
|
the 'lamers' to keep the trunks and the eleet boards busy. But some actions
|
|||
|
seem to be certified; e. g. Telekom bought some intelligent filter boxes
|
|||
|
from British Telecom. These boxes should detect any C5 tones (especially
|
|||
|
2600 Hz), being sent by phreakers; and log the number of the phreaker,
|
|||
|
if possible.
|
|||
|
|
|||
|
If possible, because the Telekom doesn't have ANI in most cases. Until
|
|||
|
recently, all phone lines used to be analog, pulse dialing lines
|
|||
|
with huge relay switches. Then the Telekom started switching to 'modern'
|
|||
|
digitally switched lines, which allow Touch-Tone-Dialing, and also a few
|
|||
|
other nice features, which I want to cover now.
|
|||
|
|
|||
|
One of these nice features 'died' just about 3 weeks ago, because someone
|
|||
|
informed the new magazine 'Focus'.
|
|||
|
|
|||
|
The trick was very simple. All you need was a digital line which allowed
|
|||
|
you to dial touch tone, and a 'Silver Box' - a device, that allows you to
|
|||
|
dial the digits 0...9, #, * and also A, B, C and D - many modems have
|
|||
|
this capability too.
|
|||
|
|
|||
|
All you had to do was to dial 'B' + 'xxx' + 'yyyy', where 'B' is the
|
|||
|
Silver Tone B, 'xxx' is an internal Telekom code, and 'yyyy' are the last
|
|||
|
four digits of a phone number. The internal codes 'xxx' usually look like
|
|||
|
010, 223, 011, and so on - they switch you to an exchange, mostly in your
|
|||
|
own area code, but often in a different one! Notice that exchange number and
|
|||
|
internal code are different. When you are connected to a certain exchange,
|
|||
|
dialing the four 'yyyy' digits connects you to a certain phone number in
|
|||
|
that exchange. This enables you to make free calls - also to different area
|
|||
|
codes, but you have to try around to find which code matches with which
|
|||
|
exchange. But that's not all; now the fun just begins! Imagine the number
|
|||
|
you dial is busy... you won't hear a busy signal then, you would just be
|
|||
|
connected into the call! You could listen to the conversation of two parties!
|
|||
|
Imagine how much fun this could be... and imagine someone would be listening
|
|||
|
to your private conversations!
|
|||
|
|
|||
|
When Telekom read the article, most area codes lost this capability;
|
|||
|
but there are still some reported to work.
|
|||
|
|
|||
|
Blueboxing is getting harder and harder, MCI and AT&T keep on changing their
|
|||
|
'Break' frequencies more rapidly (though they still use in-band CCITT C5
|
|||
|
signalling); so more and more people offer Calling Card subscriptions, and
|
|||
|
even more traders, who refuse paying Telekom's high fees, buy them. They
|
|||
|
are offered mostly by Americans, Belgium people and Germans, for about $100
|
|||
|
a month. Also, I haven't heard of any case where a German got busted for
|
|||
|
abusing AT&T's Calling Cards; probably because Telekom can't really trace
|
|||
|
phones lines, either technically nor legally (they may not just 'tap' phone
|
|||
|
lines because of people's privacy).
|
|||
|
|
|||
|
Also, German Toll Free Numbers (they start with 0130) are getting more and
|
|||
|
more. I would take a guess and say they grow 20%-80% a year. There isn't any
|
|||
|
official directory nor a directory assistance for these numbers, and many
|
|||
|
companies want these numbers to remain 'unknown' to the evil hackers, since
|
|||
|
Telekom is asking high fees for them.
|
|||
|
|
|||
|
So many Germans compile and scan these numbers; there is also a semi-public
|
|||
|
list on them by SLINK - available on many BBS'es and on local German Newsgroups.
|
|||
|
This list also contains numbers of business companies like Microsoft,
|
|||
|
Hewlett Packard or Dell in Austin (hi erik :) ), so it is quite useful for
|
|||
|
'normal people' too.
|
|||
|
|
|||
|
There have also been reported the first PBX-like Systems in Germany; this is
|
|||
|
quite a sensation, because German Telekom laws don't allow PBX'es, or even the
|
|||
|
linking of two phone lines (like 3-way calling). So in fact, these Systems
|
|||
|
weren't real PBX'es, but Merial Mail VMB Systems with the Outdial feature.
|
|||
|
|
|||
|
PaRtY 0n!
|
|||
|
---------
|
|||
|
|
|||
|
There are a couple of interesting get-togethers and parties.
|
|||
|
I mentioned the annual Chaos Communication Congress after Christmas;
|
|||
|
the CCC also has weekly meetings on Tuesday. There are the annual
|
|||
|
CeBIT hacker parties, on the Tuesday at CeBIT in March. After the
|
|||
|
CeBIT meeting and weekly, there are get-togethers at the 'Bo22',
|
|||
|
a cafe in Hannover. These meetings have tradition since the KGB
|
|||
|
Hacks of Pengo and 'Hagbard Celine' Karl Koch, as I mentioned above.
|
|||
|
You will still find friends of them there, if you drop by on a Tuesday.
|
|||
|
Since a couple of months and with Emmanuel Goldstein's great support,
|
|||
|
we are having 2600 meetings in Munich, Germany too! These are the first
|
|||
|
2600 meetings outside of the US; the first meeting was quite successful
|
|||
|
with over 30 people, and the next one in July will be successful too,
|
|||
|
hopefully. Some international visitors from the US are expected, too.
|
|||
|
These meetings are held at around 6pm in front of Burger King at
|
|||
|
Central Station, Munich. I also like to thank Munich's Number One
|
|||
|
Hit Radio Station 89 HIT FM at this point, for letting us into the
|
|||
|
air for 3 minutes, talking about the 2600 meeting and a bit about 'hacking'.
|
|||
|
There are also semi-annual IRC parties in Germany, but they are
|
|||
|
'just' parties with usually 100-150 people. Hacking and phreaking
|
|||
|
isn't a topic there; probably less than 10% of them know what H/P means.
|