mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
1204 lines
50 KiB
Text
1204 lines
50 KiB
Text
![]() |
==Phrack Magazine==
|
|||
|
|
|||
|
Volume Four, Issue Forty-Three, File 7 of 27
|
|||
|
|
|||
|
CONFERENCE NEWS
|
|||
|
PART I
|
|||
|
|
|||
|
****************************************************************************
|
|||
|
|
|||
|
The Missouri Programmers' Convention Transcripts
|
|||
|
|
|||
|
Compiled by Synapse 403
|
|||
|
|
|||
|
For those of you who were at the con, or moreover were at the con
|
|||
|
and can remember it (Sir Lance?), these transcripts are for you.
|
|||
|
They are not absolute in their accuracy and are most likely full
|
|||
|
of holes, however please keep in mind they are the transcribed
|
|||
|
product of a hacker who is suffering from a hangover of heroic
|
|||
|
proportions, and is typing to keep his mind off the mutiny
|
|||
|
happening in his stomach.
|
|||
|
|
|||
|
|
|||
|
Please note that within the transcripts you will find parts of
|
|||
|
the speaker's words paraphrased, this is not intended to
|
|||
|
misrepresent them, this is simply an easy way to cut to the chase
|
|||
|
and get this job done. Another note to make is that with in this
|
|||
|
transcript, several people have been labeled unknown, this is
|
|||
|
either due to I could not see their face while they were speaking
|
|||
|
or they wished to remain anonymous. These folks will be labeled
|
|||
|
"unknown" keep in mind that this is for the above reasons and not
|
|||
|
any slight, or K-RaD At|T|_|D3.
|
|||
|
|
|||
|
SummerCon
|
|||
|
|
|||
|
Introductions on camera were the essential beginning of the
|
|||
|
meeting, with Drunkfux wandering counter clockwise through the
|
|||
|
room, pointing the camera (that he was clinically joined with),
|
|||
|
in your face and asking your name and to say a bit about yourself.
|
|||
|
|
|||
|
Surprisingly enough there was little adverse reaction to this
|
|||
|
aside from a few quiet jokes in relation to people wondering how
|
|||
|
much $ Drunkfux would be getting from SRI for the tape <G>
|
|||
|
|
|||
|
Stuart Hauser from SRI, Stanford Research Inst. was the first
|
|||
|
speaker of the day, he was (or is) a older looking man who looked
|
|||
|
relaxed and confident. He was here to tell us about SRI and their
|
|||
|
goals (or he was here to milk the crowd for info, depends who you
|
|||
|
talk to I suppose).
|
|||
|
|
|||
|
SRI is an international corporation, employing over 3000
|
|||
|
people, that claims no ties to the Feds, NSA , CIA or any other
|
|||
|
government arm interested in harming, persecuting or even
|
|||
|
prosecuting the hacker community.
|
|||
|
|
|||
|
Their main concern is major network security, on a corporate
|
|||
|
level. However there was talk of SRI having contract work for
|
|||
|
military related arms producers this was not brought up at the
|
|||
|
conference.
|
|||
|
|
|||
|
He started by talking about himself and SRI, he mentioned their
|
|||
|
policy and their feelings towards dealing with the hacker
|
|||
|
community on a productive level. He went on to confirm, that
|
|||
|
someone we all know or know of that works for the same company is an
|
|||
|
asshole, and we are not the only community to realize this. I
|
|||
|
will leave his name out for reasons of privacy, however a good
|
|||
|
hint for those who were not at scon and are reading this his first
|
|||
|
name starts with DON.
|
|||
|
|
|||
|
After allowing us all to laugh this over he went to tell us of
|
|||
|
the finding of his teams research form SRI. His team consisted of
|
|||
|
himself, Doug Web, and Mudhead, they were tasked to compile a
|
|||
|
report on the computer underground in some nebulous fashion, he
|
|||
|
was of course (at least to me and everyone I was sitting with)
|
|||
|
not very clear with this. To the best of our knowledge the report
|
|||
|
was like a damage potential report, ie: How much can the hackers
|
|||
|
really do, and HOW much will the hackers do?
|
|||
|
|
|||
|
Stu conceded that the networks and companies had more to fear
|
|||
|
from corporate espionage at the hands of employees and
|
|||
|
mismanagement then they did from hackers. However he fears a
|
|||
|
new breed of hackers he says are becoming a reality on the nets,
|
|||
|
the hacker for cash, digital criminals. He felt that this new
|
|||
|
breed of hacker will be counterproductive for the both the PD
|
|||
|
world and the underground on the basis that if they destroy it
|
|||
|
for the corps, we cannot use it either.
|
|||
|
|
|||
|
In the way of security Stuart felt the Social engineering was
|
|||
|
the biggest weakness of any system, and the most difficult to
|
|||
|
defend against. Also he felt too much info about machines and
|
|||
|
security of them was public info, also public info was available
|
|||
|
for use in social engineering. He felt that the only way to
|
|||
|
combat this is to make the employees and owners of companies more
|
|||
|
aware of these threats. Beyond the social engineering he feels
|
|||
|
that physical measure are too weak at most facilities and do not
|
|||
|
protect there hardcopy data well enough he meant this both for
|
|||
|
Trashing and actual b&e situations again he felt the situation
|
|||
|
was to spread awareness.
|
|||
|
|
|||
|
While conducting the interviews to for this report Stuart formed
|
|||
|
his own opinion of the hacker which he shared with us. He feels
|
|||
|
that hackers for the most part are not malicious at all, and are
|
|||
|
actually decent members of cyberspace. Moreover he feels that
|
|||
|
hackers should be put to work as opposed to put to jail.
|
|||
|
Something we all feel strongly about. Stuart finished his speech with
|
|||
|
brief allusions to scholarships and upcoming programs, at this point he
|
|||
|
left the floor open to questions. The are as follows:
|
|||
|
|
|||
|
Emmanuel Goldstien: "Earlier you (Stuart) mentioned the existence
|
|||
|
of 'malicious hackers', where are they?"
|
|||
|
|
|||
|
Stu: "Holland, Scandinavia, the UK poses a great threat,
|
|||
|
Israel, Australia. The bloc countries for virii and piracy are very
|
|||
|
busy right now, We have to wonder what will happen when they get full
|
|||
|
access to our nets. What happens when the eastern bloc catches
|
|||
|
up?"
|
|||
|
|
|||
|
Unknown: "Who finances this".
|
|||
|
|
|||
|
Stuart: "Really that's none of your business" (paraphrased <G>)
|
|||
|
|
|||
|
Unknown: "Where is the evidence of these so called malicious
|
|||
|
hackers, I think the whole malicious hacker idea is spawned by the
|
|||
|
media to justify the persecution of hackers".
|
|||
|
|
|||
|
Stuart: [Has no chance to reply]
|
|||
|
|
|||
|
Control-C: (interjects) "Punk kids are all over the place doing it
|
|||
|
man."
|
|||
|
|
|||
|
KL: "its common knowledge that it is happening there."
|
|||
|
|
|||
|
Stu: (offers example) Was told that at three companies have tried
|
|||
|
to hire tiger teams, for corporate breaches however he has no proof
|
|||
|
of this. Yet he feels the sources were reliable.
|
|||
|
|
|||
|
Unknown: "I have heard rumors that SRI is writing software to
|
|||
|
catch hackers. is this true?"
|
|||
|
|
|||
|
Stu: Says he hasn't heard about this. However if they are more
|
|||
|
interested in what SRI is doing he will be sticking around until
|
|||
|
this afternoon or evening. And has about 15 copies of the report that
|
|||
|
are available to the public.
|
|||
|
|
|||
|
Next speaker
|
|||
|
|
|||
|
[I was out of the room for this speaker and asked Black Kat to
|
|||
|
type this in, so your guess is as good as mine.]
|
|||
|
|
|||
|
Someone showed a DES encryption laptop, 8 months old, with a built in
|
|||
|
chip to encrypt everything in and out (modem, disk, etc). Didn't have
|
|||
|
an overhead projector but was giving personal demos. Made by BCC
|
|||
|
(Beaver Computing Company) out of California. Doesn't advertise, but
|
|||
|
will give sales brochures etc, if you call the 800 number.
|
|||
|
Thinks the govt is discouraging wide scale distribution.
|
|||
|
|
|||
|
Count Zero & RDT
|
|||
|
|
|||
|
Count Zero announced he would be talking on a unique telco
|
|||
|
feature they found and about packet radio. Stickers and
|
|||
|
board adds from RDT and cDc were handed out at this time.
|
|||
|
|
|||
|
White Knight and Count0 started by introducing a bizarre
|
|||
|
telco feature they came across, and played a tape recording to
|
|||
|
demonstrate some of its features to the crowd. After some chatter with
|
|||
|
the rest of the con, nothing definite was concluded, however, some
|
|||
|
good ideas are brought out. (As well as some insight by folks who have
|
|||
|
discovered similar systems.)
|
|||
|
|
|||
|
Next came some comic relief from Count0 and White Knight in the
|
|||
|
way of the termination papers of an employee from a telco, the
|
|||
|
employees case report was read to the crowd and essentially painted the
|
|||
|
picture of a really disgruntled and ornery operator. Specifics were read,
|
|||
|
and people laughed at the shit this guy had gotten away with, end of
|
|||
|
story.
|
|||
|
|
|||
|
Following this Count0 spoke for Brian Oblivion who could not be
|
|||
|
there about an American Database/social program called America 2000.
|
|||
|
Brian came across this information by the way of a group in Penn state,
|
|||
|
the program is meant to monitor the attitudes of students, and how
|
|||
|
they behave with within state standards..
|
|||
|
|
|||
|
Furthermore the Database is compiled without the knowledge or
|
|||
|
permission of parents, beyond this the file can stay with a man
|
|||
|
or woman for life, in the hands of the state.
|
|||
|
|
|||
|
Count0 on Packet Radio
|
|||
|
Self-empowering Technology
|
|||
|
|
|||
|
Next came the actual Packet radio discussion, Count0 displayed
|
|||
|
his hardware and talked at great length on a whole spectrum of issues
|
|||
|
related to the radio packet switching, and some points while straying,
|
|||
|
even the morality of the FCC. This went on for quite some time.
|
|||
|
Count0 instructed the crowd on the principle behind packet switch
|
|||
|
radio as well as explaining which licenses to get and to apply.
|
|||
|
|
|||
|
Drunkfux, Merchandising
|
|||
|
|
|||
|
Drunkfux
|
|||
|
|
|||
|
Drunkfux started by, Merchandising a shitload of ho-ho con
|
|||
|
shirts, 15$ a piece as well as mthreat his tonloc shirts, also selling the
|
|||
|
mods for the Mistubishi 800, mthreat also had a chip preprogrammed for
|
|||
|
the Mits 800 avail. Those who could not get the mod were told to get it
|
|||
|
from cypher.com in /pub/vind. He told us of the new Metal Land revival and
|
|||
|
said a bit about it.
|
|||
|
|
|||
|
Next and most interesting was the discussion of the fate of
|
|||
|
Louis Cypher, and his companions in the recent bust. It seems Cypher
|
|||
|
and ALLEGED accomplices Doc and JP have been charged with numerous
|
|||
|
felonies not which the least of is Treasury Fraud and b&e of a federal
|
|||
|
post office. Drunkfux went into detail on how they had been turned
|
|||
|
on, and essentially entraped into the situation. Also how the media as
|
|||
|
per usual had made a witch hunt out of it by connecting Doc to the a
|
|||
|
remote relation to the Kennedys etc, etc.
|
|||
|
|
|||
|
Eric Neilson with CPSR
|
|||
|
|
|||
|
Eric Nielson started by telling the crowd what had drawn him to
|
|||
|
the CPSR, by the way of reading a discussion in congress about a
|
|||
|
congressman defending the strength of a Starwars network by stating that the
|
|||
|
gov had an excellent example for security: the phone networks in the
|
|||
|
USA. Needless to say Eric had little faith in this analogy <G>.
|
|||
|
|
|||
|
He went on to describe what the CPSR covers and what they have
|
|||
|
done recently in the of the clipper debate, Sundevil and other 1st
|
|||
|
Amend. issues. He discussed the internal workings of CPSR and its
|
|||
|
funding police as well as telling Conf Members how to go about joining.
|
|||
|
|
|||
|
Erik Bloodaxe
|
|||
|
|
|||
|
Erik started out with explaining why Phrack 43 is not yet out.
|
|||
|
This is due to the fact that Stormking.com will not allow it to be mailed
|
|||
|
from it, seeing as the owner does telco consulting and feels it would
|
|||
|
be a conflict of interest. Furthermore he won't give the listserve to
|
|||
|
the Phrack Staff, making it somewhat difficult to distribute. However KL
|
|||
|
is acting as a mediator and hopefully this will be settled soon.
|
|||
|
Mindvox was considered but rejected as a choice, for fear of people
|
|||
|
getting a hold of the list..
|
|||
|
|
|||
|
On the issue of Phrack and the copyright, Erik had only ONE fed
|
|||
|
register out of all those who collect it. However Phrack has
|
|||
|
obtained logs of both CERT forwarding Phrack by mail, as well as Tymnet
|
|||
|
obtaining the mag.
|
|||
|
|
|||
|
Beyond this Agent Steel was discussed in an "I told you so
|
|||
|
fashion" it turns out that him being accused of being a narc in the past
|
|||
|
were valid, seeing it was proved by way of documentation that Agent
|
|||
|
ratted out Kevin Poulsen (Dark Dante) resulting in his current 19
|
|||
|
charges.
|
|||
|
|
|||
|
And of Course the new LOD issue was broached, however very
|
|||
|
little was discussed on it and it was simply agreed to a large degree that
|
|||
|
Cameron (lord Havoc) must have been seriously abused as a child to
|
|||
|
display the type of obvious brain damage he is afflicted with now.
|
|||
|
|
|||
|
Emmanuel Goldstein 2600
|
|||
|
|
|||
|
Emmanuel Goldstein in his purple Bellcore shirt discussed with us
|
|||
|
his appearance before a Congressional hearing on a panel with Don
|
|||
|
Delaney and how the hostility shown towards him by the house
|
|||
|
representatives in session. Beyond this he went on to describe several
|
|||
|
nasty letter letters sent to him by telcos for PUBLIC info he had posted
|
|||
|
in the winter issue of 2600. This is a very brief summary of what he had to
|
|||
|
say, mainly due to the fact that I was too busy listening to him to
|
|||
|
concentrate my apologies go to those who were interested in
|
|||
|
reading the whole thing.
|
|||
|
|
|||
|
|
|||
|
Next up was a lengthy discussion on Novel Software and its
|
|||
|
weaknesses, By Erreth Akbe however the speaker he wished me to leave
|
|||
|
this out of the transcripts so I will respect his wishes in this.
|
|||
|
|
|||
|
********End Of Transcript***********
|
|||
|
|
|||
|
I would like to thank the following for making the Con an
|
|||
|
experience for me that I will not soon forget:
|
|||
|
|
|||
|
Arist0tle, Black Kat, Butler, Control-C, Erreth Akbe, Tommydcat,
|
|||
|
the Public and theNot. Thx guys.
|
|||
|
|
|||
|
Please send all responses to Besaville@acdm.sait.ab.ca
|
|||
|
|
|||
|
*****************************************************************************
|
|||
|
|
|||
|
Presenting :::
|
|||
|
|
|||
|
SummerCon 1993 in Review !!!
|
|||
|
|
|||
|
Hacking Tales and Exploits by the SotMESC
|
|||
|
|
|||
|
Additional Activities by the GCMS MechWarriors
|
|||
|
|
|||
|
-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-
|
|||
|
|
|||
|
The weather was right, too right. Something was foul in the
|
|||
|
air. It was akin to that mythical 'Calm before the Storm' scenario
|
|||
|
that is dreaded by so many. But, Scribbles and I boarded the
|
|||
|
Techno-Laden SotMESC compact and took off down the Highway to our
|
|||
|
ultimate goal . . . Hacker Heaven in Summertime Fun - SummerCon !!!
|
|||
|
|
|||
|
Instantly, weather was seen brewing in the Caribbean. Hints
|
|||
|
of Hurricanes echoed through the towns we drifted through. To
|
|||
|
alleviate any anxieties, massive quantities of Jolt! were obtained
|
|||
|
in the infamous town of Hatties-Gulch, a small town taken over by
|
|||
|
the virulent filth called College Students.
|
|||
|
|
|||
|
The trip continued, over hill and over dale. Dale was quite
|
|||
|
considerate not to press charges. Colleges were passed in a blink
|
|||
|
of the eye. Nothing was going to stop us. We were on a mission
|
|||
|
from the Church. But, that's another story.
|
|||
|
|
|||
|
After locating that famous arch, a beeline was made at speeds
|
|||
|
over 100 MPH through St. Louis until our destination came into
|
|||
|
view: The St. Louis Executive International (800-325-4850). We
|
|||
|
came to meet our nemesis and friends at the fest hosted by the
|
|||
|
Missouri Programming Institute. Brakes were quickly applied
|
|||
|
as the car appeared to be going off the off-ramp and into the ditch.
|
|||
|
|
|||
|
From the lobby it was obvious, there were unusual people here.
|
|||
|
These were the kind of people that you fear your daughters would
|
|||
|
never meet. The kind of people that kicked themselves into
|
|||
|
caffeine frenzies and would become infatuated with virtual lands.
|
|||
|
Yes, these were my kind of people.
|
|||
|
|
|||
|
Now, the adventure may start . . .
|
|||
|
|
|||
|
Oh, and in response to A-Gal on pg 30 of 2600, Scribbles
|
|||
|
says she's the sexiest hacker on the nets. Hmmmmm, I'm inclined
|
|||
|
to agree with that. I'm sure Control-C will agree too, especially
|
|||
|
after he trailed her for half of SCon.
|
|||
|
|
|||
|
Now, we all know that Friday is the warm-up day on what we can
|
|||
|
expect to see at SCon during the main Saturday drag. It was no
|
|||
|
surprise to find the main junction box rewired, pay-phones providing
|
|||
|
free services, rooms rerouted and computers running rampant down the
|
|||
|
hallways. But, the traditional trashing of Control-C's room this
|
|||
|
early signaled that more would be needed to top the night. The
|
|||
|
maid was definitely not pleased.
|
|||
|
|
|||
|
For a list of those that attended, maybe KL can provide us
|
|||
|
with that information. There were too many faces for my fingers
|
|||
|
to lap into. And, there were quite a few new faces. I believe
|
|||
|
that Weevil was the youngest hacker at 16, and Emmanuel was the
|
|||
|
oldest, although he didn't give his age.
|
|||
|
|
|||
|
-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-
|
|||
|
|
|||
|
THE CONFERENCE
|
|||
|
|
|||
|
-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-
|
|||
|
|
|||
|
Let's get to the meat of the matter. The conference had
|
|||
|
a nice spacious central area with tables neatly lining alongside
|
|||
|
the wall. Between the tables and the walls were many hacks packed
|
|||
|
as tightly as they could get. Why didn't we think of moving the tables
|
|||
|
closer together ???
|
|||
|
|
|||
|
KL took control and ran the conference smoothly. dFx panned
|
|||
|
everyone on his digital camcorder. Several cameras were around
|
|||
|
to provide us with gifs later. And the conference took off . . .
|
|||
|
|
|||
|
|
|||
|
First up was Stuart from SRI (Stanford Research Institute).
|
|||
|
He elaborated on SRI's being involved in research, engineering and
|
|||
|
design. From studies done around the world with hackers and those
|
|||
|
associated, malicious hacking can not be stopped. There is no
|
|||
|
evidence, though, that the current hackers are interested in
|
|||
|
bringing the networks down at all. Concern was given to new
|
|||
|
hackers that may be emerging with financial gain and maliciousness
|
|||
|
occurring. The top security hole with system was noted as
|
|||
|
being the infamous social engineering technique. SRI did note
|
|||
|
that many places did not utilize the security that they even had
|
|||
|
in place. It was also noted that laws against malicious hackers,
|
|||
|
and probably any hacker, should be fair and just. The most
|
|||
|
malicious hacks that are turning up have been spotted in the
|
|||
|
following named countries: Holland, Scandinavia countries,
|
|||
|
very possibly soon in the UK, Australia, Israel, the former USSR,
|
|||
|
and Bulgaria ( noted for virii writers ).
|
|||
|
|
|||
|
A voice made mention of Operation Rahab, hackers in German Intelligence.
|
|||
|
|
|||
|
Next up was Count Zero from cDc/RDT to talk about packet
|
|||
|
radio. His talk included information about the IESS and handed
|
|||
|
out a flyer on America 2000 ( school under 1984 regimes ).
|
|||
|
Maybe someone will provide us with a copy of this. A packet
|
|||
|
radio modem at 1200 can be obtained easily for $50. TCP/IP
|
|||
|
packets are already being send over the bandwidth along with
|
|||
|
other network protocols. The usefulness of all this is that
|
|||
|
the information is broadcast and it is virgin territory. The
|
|||
|
baud limitation is due only based upon the bandwidth you are
|
|||
|
operating at and the number of collisions occurring. On a
|
|||
|
band you can see every packet that is being transmitted if
|
|||
|
you wish. All this is located on a 2 meter band. Currently
|
|||
|
the FCC forbids encryptions on the airwaves, although this is
|
|||
|
noted as being virtually impossible to enforce. It also takes
|
|||
|
5 months to get an amateur radio license, and your personal info
|
|||
|
is recorded in a book easily obtained at libraries. The problem
|
|||
|
with going around the FCC is that there exist vigilante HAMs that
|
|||
|
monitor the bands and have nothing better to do than filter
|
|||
|
info and whine to the FCC. Bandwidths are decreasing though.
|
|||
|
This is due to an increased interest overall by communications
|
|||
|
in these areas. Unless you do something major the FCC will
|
|||
|
not give you much interest. The book on preparing yourself for
|
|||
|
a Tech Class can be obtained from Radio Shack for $9.
|
|||
|
|
|||
|
Next up was dFx. He was promoting the HCon and Tone-Loc
|
|||
|
t-shirts that were for sale. Merchandising was getting pretty
|
|||
|
high. He also gave out a few Mitsubishi 800 disks. He was
|
|||
|
also recognized as the ONLY and LAST member of the Neon Knights,
|
|||
|
a club that had a wide range of comedy names generated. The
|
|||
|
word was put out the HCon '93 will be in December 17-19 with
|
|||
|
a hint that it could also wind up being in Austin. Then the
|
|||
|
conversation turned to Lord Byron's bust, which we should here
|
|||
|
more information on any day this week. The conversation
|
|||
|
reiterated the government narc that was at the AA meeting
|
|||
|
that was pressuring Byron. Byron was also noted as having
|
|||
|
rejected a plea bargain the courts offered him. And lastly,
|
|||
|
it is going to happen soon so get them while you can. The
|
|||
|
FTP site at eff.org will be dropping its CuD directory due
|
|||
|
to a conflict of interest with EFFs major contributors, mainly
|
|||
|
the RBOCs and other interest groups that don't like us.
|
|||
|
|
|||
|
Erik Bloodaxe took the table next to talk about what
|
|||
|
was happening with his involvement with Phrack and some
|
|||
|
interesting info about Agent Steel. As for Phrack, the
|
|||
|
Email list is being with-held by Tuc. The mailing list
|
|||
|
has been refused at Mindvox due to files missing mysteriously
|
|||
|
at that site. And, no organization registered for Phrack #42
|
|||
|
since it was copyrighted with a nice and lengthy preamble,
|
|||
|
except for one company from Mitre. Currently Phrack #43 is
|
|||
|
in limbo and is estimated at 1 Meg long. Going onto the
|
|||
|
info about Agent Steel, basically he's a narc. Lord Havok from
|
|||
|
Canada is trying to restart the LOD under some unknown
|
|||
|
logical rationale that since LOD is defunct, anyone can
|
|||
|
reclaim the name. Lord Havoc, aka Cameron, has been going
|
|||
|
around trying to get documentation to put together an LOD
|
|||
|
technical journal #5. Supposedly there is a skin-head group
|
|||
|
in Canada that in now tracking Cameron down.
|
|||
|
|
|||
|
Someone came up next [Minor Threat] and gave us an update on
|
|||
|
Codec. Two weeks after the last SCon, Codec was pulled over while
|
|||
|
on the run from the law for speeding and then arrested for
|
|||
|
burglary, resisting arrest, etc . . . He is estimated to
|
|||
|
be out of jail in 1995 and still has time to serve in a few
|
|||
|
other states. Mail can be sent to him at this address:
|
|||
|
codec@cypher.com. Maybe Crunch can give Codec some hints on
|
|||
|
how to get by in prison?
|
|||
|
|
|||
|
From the CPSR, Eric Nielson took the table. He elaborated
|
|||
|
on the CPSR and ran a Q&A period. Basically, the CPSR files many
|
|||
|
FOIA requests and sues the government. Their focus is on the
|
|||
|
workplace computing. Elaboration was given on the Clipper Chip
|
|||
|
and computer ship security. The CPSR is staffed with lawyers
|
|||
|
and takes their funding from dues and grants. They are not
|
|||
|
sponsored by any corporations.
|
|||
|
|
|||
|
From the far side of the table came the infamous Emmanuel
|
|||
|
Goldstein from 2600. He stated how he had testified at congress and
|
|||
|
gave them a live demonstration of bandwidth scanning and redboxing.
|
|||
|
While he was there, the inquisition started against him on the
|
|||
|
issue of 2600. Emmanuel then tried to explain the culture to
|
|||
|
our representative that it is bad to classify all hackers as
|
|||
|
criminals. Goldstein then went on to talk about the DC 2600 bust
|
|||
|
and how it has resulted in 2600 meetings springing up all across
|
|||
|
the country. A review of several films on software piracy at
|
|||
|
the office, disaster recovery and viruses from Commonwealth
|
|||
|
Films was given. And, to highlight everything, 2600 has purchased
|
|||
|
an AT&T van that they plan to take to assorted conventions and
|
|||
|
start a fleet of these up.
|
|||
|
|
|||
|
Pst, BTW, on pg 43 of 2600 the intersection should be a jump =:)
|
|||
|
|
|||
|
Last up was Erreth Akby, a Certified Netware Engineer. He
|
|||
|
explained that the only upgrade in Novell 4.0 is the disk compression.
|
|||
|
He also informed us that the supervisor and guest accounts generally
|
|||
|
have default passwords. TO hack into this Net, you should use a PC
|
|||
|
with full alt and functions keys. The supervisor p/w is on the
|
|||
|
RConsole in a file called autoexec.mcf on version 3.11. Netcrack
|
|||
|
will not work on a system with Intruder Lock-Out. Non-dedicated
|
|||
|
netware must boot from a floppy. Best of all, you can dial out
|
|||
|
by using cubix-quarts, which are PC with modems on the system.
|
|||
|
|
|||
|
Below is a quick reprint of a paper that was recovered
|
|||
|
from Control-C's trashed room.
|
|||
|
|
|||
|
Mrs Jasnagan,
|
|||
|
|
|||
|
I would like to set up a meeting
|
|||
|
to discuss Kevin's progress in Social
|
|||
|
Studies and English. Please let
|
|||
|
me know when it would be
|
|||
|
convenient.
|
|||
|
|
|||
|
Thank you
|
|||
|
|
|||
|
( Scribble , scribble )
|
|||
|
|
|||
|
Dear Mr + Mrs Gormby,
|
|||
|
|
|||
|
We would be happy
|
|||
|
to meet with you at
|
|||
|
9:30 on Thursday, April
|
|||
|
1st in Room 104
|
|||
|
|
|||
|
Sincerely,
|
|||
|
M.Jarnagin
|
|||
|
&
|
|||
|
S.Dietrich
|
|||
|
|
|||
|
|
|||
|
Now, could this be Kevin Poulson ??? Naaa, no way.
|
|||
|
Amazing what technical data trashing will uncover. I guess
|
|||
|
I should throw this away now . . .
|
|||
|
|
|||
|
After the convention, there was much rejoicing. The reasons
|
|||
|
would become fairly obvious as a 'swingers party' sign was soon
|
|||
|
located outside one of the hotel wings. Yes, it would be a very
|
|||
|
good convention.
|
|||
|
|
|||
|
Several people made their way to the vehicles for a long
|
|||
|
night of trashing and raiding of the various FedEx, UPS and
|
|||
|
other assorted boxes around town. Other groups made their
|
|||
|
way to computers that were trying to connect with anything
|
|||
|
they could out in town. There were also those that reluctantly
|
|||
|
went to the mall to take advantage of the local population.
|
|||
|
|
|||
|
What did not happen ??? Control-C did not get laid, but
|
|||
|
it was rumored that there were a few 12-year olds wandering
|
|||
|
around the hotel looking for this legendary hacker. No deaths
|
|||
|
had occured, the fires were kept to a minimum and nothing major
|
|||
|
was noted as being broken.
|
|||
|
|
|||
|
One thing was for sure, there were a lot of alcoholic
|
|||
|
beverages going around, walkie-talkies, scanners, and wild
|
|||
|
tales. Several area buildings were broken into, but nothing
|
|||
|
major was done.
|
|||
|
|
|||
|
Then the shit hit the fan. It seems several hackers had riled
|
|||
|
the swingers into a frenzy. I guess the swingers couldn't swing
|
|||
|
with it. What happened ??? Phones went ringing room to room and
|
|||
|
radios blared to life that the cops were here !!! At count, there
|
|||
|
were 6 cops, 1 sheriff and 4 hotel employees that started patrolling
|
|||
|
the hallways. Yes, we were under room arrest at our own convention
|
|||
|
in our own wing. Anyone that left there room was told to stay there
|
|||
|
or they would be arrested. The cops were very insistent that no
|
|||
|
pictures were to be taken. The swingers had broken our balls.
|
|||
|
|
|||
|
But, this would not stop us. Soon, there was a phone network
|
|||
|
going on with radio interfaces. The windows opened and a few migrated
|
|||
|
to other locations of the hotel. After a while, the authorities left
|
|||
|
feeling satisfied that they had intimidated us. They didn't.
|
|||
|
|
|||
|
After they left, the hallways erupted again. In the SotMESC
|
|||
|
room a gathering turned out to watch several techno-infested
|
|||
|
videos. At the cDc room were others viewing the HoHoCon '92 film
|
|||
|
that dFx brought down with him. At one point, the microwave
|
|||
|
around the lobby was detonated and a mysterious stack of Credit
|
|||
|
Card carbons was found. The liberated phones were being
|
|||
|
utilized to their full international extent, and several of the
|
|||
|
soda machines decided to give out a few free drinks.
|
|||
|
|
|||
|
But, we couldn't leave well enough alone. Sir Lance went
|
|||
|
to the lobby and took a picture of the hotel Asst. Manager.
|
|||
|
I guess this guy didn't like his photo being taken, since he
|
|||
|
turned around and called the cops on Sir Lance. Down the hallway
|
|||
|
the cops came, dragging Sir Lance back with them. In the end,
|
|||
|
the cops explained to the Asst. Manager that it was not a crime
|
|||
|
in the US to take pictures of people.
|
|||
|
|
|||
|
In another related story, Kaos Wizard wound up calling the
|
|||
|
SotMESC room with a wild plea for help. It seemed he was with
|
|||
|
a large group of trashers that included Albatross, Intrepid,
|
|||
|
Forced Entry, Zippy, The Public and more. Kaos was at a Central
|
|||
|
Office close to the hotel on Woodson and needed help. He had
|
|||
|
taken off to take a piss and noticed that the trashers were
|
|||
|
surrounded by cops when he returned. There was no way he was going
|
|||
|
back with all those cops there ( and, might I mention, there was
|
|||
|
also a police dog ). Mystic Moos gathered up a few people and
|
|||
|
went to rescue Kaos Wizard as the rest of the trashers returned
|
|||
|
to the hotel. It seems they had eluded the cops by telling them
|
|||
|
that they were waiting for their friend to return from taking
|
|||
|
a bathroom break ( Kaos Wizard ). Unfortunately, he never
|
|||
|
returned. The cops let them go eventually. Mystic Moos rescued
|
|||
|
Kaos Wizard, and the hotel was aglow in activity again.
|
|||
|
|
|||
|
Control-C came down the hall at one point to make a startling
|
|||
|
discovery. It seems that at a local club there was a band playing
|
|||
|
that featured 'Lex Luthor'. The elusive X-LOD founder had been
|
|||
|
located. AFter some thought, it was decided he could stay there
|
|||
|
and sing the blues while the rest of us partied the night away.
|
|||
|
|
|||
|
For those interested, the hotel fax is 314-731-3752.
|
|||
|
|
|||
|
One of the police officers detaining us was S.M. Gibbons.
|
|||
|
|
|||
|
IBM will send a 36 page fax to the number you give them.
|
|||
|
To activate, call 1-800-IBM-4FAX. As you can imagine, it wasn't
|
|||
|
long before the hotels fax ran out of thermal paper.
|
|||
|
|
|||
|
Below is a gathering of Flyers . . .
|
|||
|
|
|||
|
HoHoCon '92 Product Ordering Information
|
|||
|
|
|||
|
If you are interested in obtaining either HoHoCon shirts or videos,
|
|||
|
please contact us at any of the following:
|
|||
|
|
|||
|
drunkfux@cypher.com
|
|||
|
hohocon@cypher.com
|
|||
|
cDc@cypher.com
|
|||
|
dfx@nuchat.sccsu.com
|
|||
|
359@7354 (WWIV Net)
|
|||
|
|
|||
|
HoHoCon
|
|||
|
1310 Tulane, Box #2
|
|||
|
Houston, Tx
|
|||
|
77008-4106
|
|||
|
|
|||
|
713-468-5802 (data)
|
|||
|
|
|||
|
The shirts are $15 plus $3 shipping ($4 for two shirts). At this
|
|||
|
time, they only come in extra large. We may add additional sizes if
|
|||
|
there is a demand for them. The front of the shirt has the following
|
|||
|
in a white strip across the chest:
|
|||
|
|
|||
|
I LOVE FEDS
|
|||
|
|
|||
|
( Where LOVE = a red heart, very similar to the I LOVE NY logo )
|
|||
|
|
|||
|
And this on the back:
|
|||
|
|
|||
|
dFx & cDc Present
|
|||
|
|
|||
|
HoHoCon '92
|
|||
|
|
|||
|
December 18-20
|
|||
|
Allen Park Inn
|
|||
|
Houston, Texas
|
|||
|
|
|||
|
There is another version of the shirt available with the following:
|
|||
|
|
|||
|
I LOVE WAREZ
|
|||
|
|
|||
|
The video includes footage from all three days, is six hours long and
|
|||
|
costs $18 plus $3 shipping ($4 if purchasing another item also).
|
|||
|
Please note that if you are purchasing multiple items, you only need
|
|||
|
to pay one shipping charge of $4, not a charge for each item. If
|
|||
|
you wish to send an order in now, make all checks or money orders
|
|||
|
payable to O.I.S., include your phone number and mail it to the street
|
|||
|
address listed above. Allow a few weeks for arrival.
|
|||
|
|
|||
|
Thanks to everyone who attended and supported HoHoCon '92. Mail us if
|
|||
|
you wish to be an early addition to the HoHoCon '93 (December 17-19)
|
|||
|
mailing list.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Calvary Black Crawling Systems
|
|||
|
617-267-2732 617-482-6356
|
|||
|
|
|||
|
ATDT EAST
|
|||
|
617-350-STIF
|
|||
|
|
|||
|
DemOnseed sez: "Call ATDT East or I'll crush your skull"
|
|||
|
|
|||
|
Home of -= RDT...
|
|||
|
|
|||
|
|
|||
|
Trailings to follow . . . Slug, slug, slugfest . . .
|
|||
|
|
|||
|
Join the ranks of the Cons: HoHoCon, MardiCon, SummerCon !!!
|
|||
|
|
|||
|
****************************************************************************
|
|||
|
|
|||
|
Top 25 Things I Learned at SummerCon '93
|
|||
|
--------------------------------
|
|||
|
By Darkangel
|
|||
|
|
|||
|
|
|||
|
SummerCon is a place where many hackers from all over the
|
|||
|
world meet to discuss the current state of hacking today, and to
|
|||
|
drink themselves under the table. Every year, pages and pages of
|
|||
|
useful information is passed and traded among the participants.
|
|||
|
In this brief summery, I will attempt to point out the things
|
|||
|
that I learned and I thought were the most helpful to the whole
|
|||
|
hacker community. I hope you enjoy it.
|
|||
|
|
|||
|
#1) DON'T let Control-C within 15 feet of any person that
|
|||
|
does not have a penis.
|
|||
|
|
|||
|
#2) Knight Lightning will have a stroke before the age of
|
|||
|
30.
|
|||
|
|
|||
|
#3) French Canadians ALWAYS sound drunk.
|
|||
|
|
|||
|
#4) Loops do not make good pickup lines.
|
|||
|
|
|||
|
#5) The Zenith is outside the window. Just look up.
|
|||
|
|
|||
|
#6) Smoking certain herbs is still illegal in St. Louis.
|
|||
|
|
|||
|
#7) If you see a taxi and think it might be a cop, it
|
|||
|
probably is.
|
|||
|
|
|||
|
#8) Hotel Security is worse than Mall Security.
|
|||
|
|
|||
|
#9) The payphones in the lobby are not meant to be free.
|
|||
|
|
|||
|
#10) Do not climb through the ceiling to get to the room
|
|||
|
with the PBX in it.
|
|||
|
|
|||
|
#11) Do not glue the locks shut on an entire floor of the
|
|||
|
hotel. (especially when people are in them)
|
|||
|
|
|||
|
#12) This machine is broken.
|
|||
|
|
|||
|
#13) Do not dump bags you got trashing on the floor of
|
|||
|
someone else's room.
|
|||
|
|
|||
|
#14) St. Louis police do not appreciate the finer points of
|
|||
|
Simplex lock hacking.
|
|||
|
|
|||
|
#15) VaxBuster should never be allowed to drink Everclear.
|
|||
|
|
|||
|
#16) Scribbles has a very nice ass.
|
|||
|
|
|||
|
#17) Do not photograph Pakistani hotel security guards.
|
|||
|
|
|||
|
#18) Do not try to bring a six pack through customs.
|
|||
|
|
|||
|
#19) Loki is the Fakemail God.
|
|||
|
|
|||
|
#20) Do not rip the phone boxes out of the walls and cut
|
|||
|
the wires.
|
|||
|
|
|||
|
#21) Barbie Doll pornos can be cool.
|
|||
|
|
|||
|
#22) Frosty can do weird things with techno and movies.
|
|||
|
|
|||
|
#23) Always remove the mirrors from the walls to check for
|
|||
|
hidden cameras.
|
|||
|
|
|||
|
#24) Do not threaten or harass other people staying at the
|
|||
|
same hotel. This can be bad.
|
|||
|
|
|||
|
#25) I really don't think the hotel will let us come back.
|
|||
|
|
|||
|
That wraps it up! See you at HoHoCon!
|
|||
|
|
|||
|
-Darkangel
|
|||
|
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
Hack-Tic Presents
|
|||
|
|
|||
|
H A C K I N G
|
|||
|
|
|||
|
at the E N D of the
|
|||
|
|
|||
|
U N I V E R S E
|
|||
|
|
|||
|
1993 SUMMER CONGRESS, THE NETHERLANDS
|
|||
|
|
|||
|
=========================================================================
|
|||
|
|
|||
|
HEU?
|
|||
|
|
|||
|
Remember the Galactic Hacker Party back in 1989? Ever wondered what
|
|||
|
happened to the people behind it? We sold out to big business, you
|
|||
|
think. Think again, we're back!
|
|||
|
|
|||
|
That's right. On august 4th, 5th and 6th 1993, we're organizing a
|
|||
|
three-day summer congress for hackers, phone phreaks, programmers,
|
|||
|
computer haters, data travellers, electro-wizards, networkers, hardware
|
|||
|
freaks, techno-anarchists, communications junkies, cyberpunks, system
|
|||
|
managers, stupid users, paranoid androids, Unix gurus, whizz kids, warez
|
|||
|
dudes, law enforcement officers (appropriate undercover dress required),
|
|||
|
guerilla heating engineers and other assorted bald, long-haired and/or
|
|||
|
unshaven scum. And all this in the middle of nowhere (well, the middle
|
|||
|
of Holland, actually, but that's the same thing) at the Larserbos
|
|||
|
campground four meters below sea level.
|
|||
|
|
|||
|
The three days will be filled with lectures, discussions and workshops
|
|||
|
on hacking, phreaking, people's networks, Unix security risks, virtual
|
|||
|
reality, semafun, social engineering, magstrips, lockpicking,
|
|||
|
viruses, paranoia, legal sanctions against hacking in Holland and
|
|||
|
elsewhere and much, much more. English will be the lingua franca for
|
|||
|
this event, although one or two workshops may take place in Dutch.
|
|||
|
There will be an Internet connection, an intertent ethernet and social
|
|||
|
interaction (both electronic and live). Included in the price are four
|
|||
|
nights in your own tent. Also included are inspiration, transpiration, a
|
|||
|
shortage of showers (but a lake to swim in), good weather (guaranteed by
|
|||
|
god), campfires and plenty of wide open space and fresh air. All of this
|
|||
|
for only 100 dutch guilders (currently around US$70).
|
|||
|
|
|||
|
We will also arrange for the availability of food, drink and smokes of
|
|||
|
assorted types, but this is not included in the price. Our bar will be
|
|||
|
open 24 hours a day, as well as a guarded depository for valuables
|
|||
|
(like laptops, cameras etc.). You may even get your stuff back! For
|
|||
|
people with no tent or air mattress: you can buy a tent through us for
|
|||
|
100 guilders, a mattress costs 10 guilders. You can arrive from 17:00
|
|||
|
(that's five p.m. for analogue types) on August 3rd. We don't have to
|
|||
|
vacate the premises until 12:00 noon on Saturday, August 7 so you can
|
|||
|
even try to sleep through the devastating Party at the End of Time
|
|||
|
(PET) on the closing night (live music provided). We will arrange for
|
|||
|
shuttle buses to and from train stations in the vicinity.
|
|||
|
|
|||
|
HOW?
|
|||
|
|
|||
|
Payment: in advance please. Un-organized, poor techno-freaks like us
|
|||
|
would like to get to the Bahamas at least once. We can only guarantee
|
|||
|
you a place if you pay before Friday June 25th, 1993. If you live in
|
|||
|
Holland, just transfer fl. 100 to giro 6065765 (Hack-Tic) and mention
|
|||
|
'HEU' and your name. If you're in Germany, pay DM 100,- to Hack-Tic,
|
|||
|
Konto 2136638, Sparkasse Bielefeld, BLZ 48050161. If you live elsewhere:
|
|||
|
call, fax or e-mail us for the best way to get the money to us from your
|
|||
|
country. We accept American Express, we do NOT cash ANY foreign cheques.
|
|||
|
|
|||
|
HA!
|
|||
|
|
|||
|
Very Important: Bring many guitars and laptops.
|
|||
|
|
|||
|
ME?
|
|||
|
|
|||
|
Yes, you! Busloads of alternative techno-freaks from all over the
|
|||
|
planet will descend on this event. You wouldn't want to miss that,
|
|||
|
now, would you?
|
|||
|
|
|||
|
Maybe you are part of that select group that has something special to
|
|||
|
offer! Participating in 'Hacking at the End of the Universe' is
|
|||
|
exciting, but organizing your very own part of it is even more fun. We
|
|||
|
already have a load of interesting workshops and lectures scheduled,
|
|||
|
but we're always on the lookout for more. We're also still in the
|
|||
|
market for people who want to help us organize during the congress.
|
|||
|
|
|||
|
In whatever way you wish to participate, call, write, e-mail or fax us
|
|||
|
soon, and make sure your money gets here on time. Space is limited.
|
|||
|
|
|||
|
SO:
|
|||
|
|
|||
|
- 4th, 5th and 6th of August
|
|||
|
|
|||
|
- Hacking at the End of the Universe
|
|||
|
(a hacker summer congress)
|
|||
|
|
|||
|
- ANWB groepsterrein Larserbos
|
|||
|
Zeebiesweg 47
|
|||
|
8219 PT Lelystad
|
|||
|
The Netherlands
|
|||
|
|
|||
|
- Cost: fl. 100,- (+/- 70 US$) per person
|
|||
|
(including 4 nights in your own tent)
|
|||
|
|
|||
|
MORE INFO:
|
|||
|
|
|||
|
Hack-Tic
|
|||
|
Postbus 22953
|
|||
|
1100 DL Amsterdam
|
|||
|
The Netherlands
|
|||
|
|
|||
|
tel : +31 20 6001480
|
|||
|
fax : +31 20 6900968
|
|||
|
E-mail : heu@hacktic.nl
|
|||
|
|
|||
|
VIRUS:
|
|||
|
|
|||
|
If you know a forum or network that you feel this message belongs on,
|
|||
|
by all means slip it in. Echo-areas, your favorite bbs, /etc/motd, IRC,
|
|||
|
WP.BAT, you name it. Spread the worm, uh, word.
|
|||
|
=========================================================================
|
|||
|
|
|||
|
SCHEDULE
|
|||
|
|
|||
|
day 0 August 3rd, 1993
|
|||
|
=====
|
|||
|
16:00 You are welcome to set up your tent
|
|||
|
19:00 Improvised Dinner
|
|||
|
|
|||
|
day 1 August 4th, 1993
|
|||
|
=====
|
|||
|
11:00-12:00 Opening ceremony
|
|||
|
12:00-13:30 Workshops
|
|||
|
14:00-15:30 Workshops
|
|||
|
15:30-19:00 'Networking for the Masses' 16:00-18:00 Workshops
|
|||
|
19:00-21:00 Dinner
|
|||
|
21:30-23:00 Workshops
|
|||
|
|
|||
|
|
|||
|
day 2 August 5th, 1993
|
|||
|
=====
|
|||
|
11:30-13:00 Workshops
|
|||
|
14:00-17:00 Phreaking the Phone 14:00-17:00 Workshops
|
|||
|
17:30-19:00 Workshops
|
|||
|
19:00-21:00 Dinner
|
|||
|
|
|||
|
|
|||
|
day 3 August 6th, 1993
|
|||
|
=====
|
|||
|
11:30-13:00 Workshops
|
|||
|
14:00-18:00 Hacking (and) The Law 14:00-17:00 Workshops
|
|||
|
18:00-19:00 Closing ceremony
|
|||
|
19:00-21:00 Barbeque
|
|||
|
21:00-??:?? Party at the End of Time (Live Music)
|
|||
|
|
|||
|
day 4 August 7th, 1993
|
|||
|
=====
|
|||
|
12:00 All good things come to an end
|
|||
|
|
|||
|
=========================================================================
|
|||
|
|
|||
|
'Networking for the masses', Wednesday August 4th 1993, 15:30
|
|||
|
|
|||
|
One of the main discussions at the 1989 Galactic Hacker Party focused on
|
|||
|
whether or not the alternative community should use computer networking.
|
|||
|
Many people felt a resentment against using a 'tool of oppression' for
|
|||
|
their own purposes. Computer technology was, in the eyes of many,
|
|||
|
something to be smashed rather than used.
|
|||
|
|
|||
|
Times have changed. Many who were violently opposed to using computers
|
|||
|
in 1989 have since discovered word-processing and desktop publishing.
|
|||
|
Even the most radical groups have replaced typewriters with PCs. The
|
|||
|
'computer networking revolution' has begun to affect the alternative
|
|||
|
community.
|
|||
|
|
|||
|
Not all is well: many obstacles stand in the way of the 'free flow of
|
|||
|
information.' Groups with access to information pay such high prices for
|
|||
|
it that they are forced to sell information they'd prefer to pass on for
|
|||
|
free. Some low-cost alternative networks have completely lost their
|
|||
|
democratic structure. Is this the era of the digital dictator, or are we
|
|||
|
moving towards digital democracy?
|
|||
|
|
|||
|
To discuss these and other issues, we've invited the following people
|
|||
|
who are active in the field of computer networking: [Electronic mail
|
|||
|
addresses for each of the participants are shown in brackets.]
|
|||
|
|
|||
|
Ted Lindgreen (ted@nluug.nl) is managing director of nlnet. Nlnet is the
|
|||
|
largest commercial TCP/IP and UUCP network provider in the Netherlands.
|
|||
|
|
|||
|
Peter van der Pouw Kraan (peter@hacktic.nl) was actively involved in the
|
|||
|
squat-movement newsletters 'Bluf!' and 'NN' and has outspoken ideas
|
|||
|
about technology and its relation to society. Had a PC all the way back
|
|||
|
in 1985!
|
|||
|
|
|||
|
Maja van der Velden (maja@agenda.hacktic.nl) is from the Agenda
|
|||
|
Foundation which sets up and supports communication and information
|
|||
|
projects.
|
|||
|
|
|||
|
Joost Flint (joost@aps.hacktic.nl) is from the Activist Press Service.
|
|||
|
APS has a bbs and works to get alternative-media and pressure groups
|
|||
|
online.
|
|||
|
|
|||
|
Felipe Rodriquez (nonsenso@utopia.hacktic.nl) is from the Hack-Tic
|
|||
|
Network which grew out of the Dutch computer underground and currently
|
|||
|
connects thousands of people to the global Internet.
|
|||
|
|
|||
|
Andre Blum (zabkar@roana.hacktic.nl), is an expert in the field of
|
|||
|
wireless communications.
|
|||
|
|
|||
|
Eelco de Graaff (Eelco.de.Graaff@p5.f1.n281.z2.fidonet.org) is the
|
|||
|
nethost of net 281 of FidoNet, EchoMail troubleshooter, and one of the
|
|||
|
founders of the Dutch Fidonet Foundation.
|
|||
|
|
|||
|
Michael Polman (michael@antenna.nl) of the Antenna foundation is a
|
|||
|
consultant in the field of international networking. He specialises in
|
|||
|
non-governmental networks in the South.
|
|||
|
|
|||
|
Alfred Heitink (alfred@antenna.nl) is a social scientist specializing in
|
|||
|
the field of computer-mediated communication as well as system manager at
|
|||
|
the Dutch Antenna host.
|
|||
|
|
|||
|
Rena Tangens (rena@bionic.zer.de), was involved in the creation of the
|
|||
|
Bionic Mailbox in Bielefeld (Germany) and the Zerberus mailbox network.
|
|||
|
She is an artist and wants to combine art and technology.
|
|||
|
|
|||
|
The discussion will be led by freelance radiomaker and science
|
|||
|
journalist Herbert Blankesteyn. He was involved in the 'Archie'
|
|||
|
children's bbs of the Dutch VPRO broadcasting corporation.
|
|||
|
=========================================================================
|
|||
|
|
|||
|
'Phreaking the Phone', Thursday August 5th 1993, 14:00
|
|||
|
|
|||
|
Your own telephone may have possibilities you never dreamed possible.
|
|||
|
Many years ago people discovered that one could fool the telephone
|
|||
|
network into thinking you were part of the network and not just a
|
|||
|
customer. As a result, one could make strange and sometimes free
|
|||
|
phonecalls to anywhere on the planet. A subculture quickly formed.
|
|||
|
|
|||
|
The phone companies got wise and made a lot of things (nearly)
|
|||
|
impossible. What is still possible today? What is still legal today?
|
|||
|
What can they do about it? What are they doing about it?
|
|||
|
|
|||
|
Billsf (bill@tech.hacktic.nl) and M. Tillman, a few of the worlds best
|
|||
|
phreaks, will introduce the audience to this new world. Phone phreaks
|
|||
|
from many different countries will exchange stories of success and
|
|||
|
defeat. Your life may never be the same.
|
|||
|
=========================================================================
|
|||
|
|
|||
|
'Hacking (and) The Law', Friday August 6th, 14:00
|
|||
|
|
|||
|
You can use your own computer and modem to access some big computer
|
|||
|
system at a university without the people owning that computer knowing
|
|||
|
about it. For years this activity was more or less legal in Holland: if
|
|||
|
you were just looking around on the Internet and didn't break anything
|
|||
|
nobody really cared too much...
|
|||
|
|
|||
|
That is, until shortly before the new computer crime law went into
|
|||
|
effect. Suddenly computer hackers were portrayed as evil 'crashers'
|
|||
|
intent on destroying systems or, at least, looking into everyone's
|
|||
|
files.
|
|||
|
|
|||
|
The supporters of the new law said that it was about time something was
|
|||
|
done about it. Critics of the law say it's like hunting mosquitoes with
|
|||
|
a machine-gun. They claim the aforementioned type of hacking is not the
|
|||
|
real problem and that the law is excessively harsh.
|
|||
|
|
|||
|
To discuss these issues we've invited a panel of experts, some of whom
|
|||
|
are, or have been, in touch with the law in one way or another.
|
|||
|
|
|||
|
Harry Onderwater (fridge@cri.hacktic.nl), is technical EDP auditor at the
|
|||
|
Dutch National Criminal Intelligence Service (CRI) and is responsible for
|
|||
|
combatting computer crime in the Netherlands. He says he's willing to
|
|||
|
arrest hackers if that is what it takes to make computer systems secure.
|
|||
|
|
|||
|
Prof. Dr. I.S. (Bob) Herschberg (herschbe@dutiws.twi.tudelft.nl), gained
|
|||
|
a hacker's control over his first system 21 years ago and never ceased
|
|||
|
the good work. Now lecturing, teaching and publishing on computer
|
|||
|
insecurity and imprivacy at the technical university in Delft. His
|
|||
|
thesis: 'penetrating a system is not perpetrating a crime'.
|
|||
|
|
|||
|
Ronald 'RGB' O. (rgb@utopia.hacktic.nl) has the distinction of being the
|
|||
|
only Dutch hacker arrested before and after the new law went into effect.
|
|||
|
He is a self-taught UNIX security expert and a writer for Hack-Tic
|
|||
|
Magazine.
|
|||
|
|
|||
|
Ruud Wiggers (ruudw@cs.vu.nl), system manager at the Free University
|
|||
|
(VU) in Amsterdam, has for 10 years been trying to plug holes in system
|
|||
|
security. He was involved in the RGB arrest.
|
|||
|
|
|||
|
Andy Mueller-Maguhn (andy@cccbln.ccc.de) is from the Chaos Computer Club
|
|||
|
in Germany.
|
|||
|
|
|||
|
Eric Corley (emmanuel@eff.org) a.k.a. Emmanuel Goldstein is editor
|
|||
|
of the hacker publication '2600 magazine'. The first person to realize
|
|||
|
the huge implications of the government crackdown on hackers in the US.
|
|||
|
|
|||
|
Winn Schwartau (wschwartau@mcimail.com) is a commercial computer
|
|||
|
security advisor as well as the author of the book 'Terminal
|
|||
|
Compromise'. His new book entitled 'Information Warfare' has just been
|
|||
|
released.
|
|||
|
|
|||
|
Ray Kaplan (kaplan@bpa.arizona.edu) is a computer security consultant.
|
|||
|
He is constantly trying to bridge the gap between hackers and the
|
|||
|
computer industry. He organizes 'meet the enemy' sessions where system
|
|||
|
managers can teleconference with hackers.
|
|||
|
|
|||
|
Wietse Venema (wietse@wzv.win.tue.nl) is a systems expert at the
|
|||
|
Technical University in Eindhoven. He is the author of some very well
|
|||
|
known utilities to monitor hacking on unix systems. He has a healthy
|
|||
|
suspicion of anything technical.
|
|||
|
|
|||
|
Peter Klerks (klerks@rulfsw.leidenuniv.nl) is a scientist at the centre
|
|||
|
for the study of social antagonism at the Leiden University. He has
|
|||
|
studied the Dutch police force extensively, and is author of the book
|
|||
|
'Counterterrorism in the Netherlands.'
|
|||
|
|
|||
|
Don Stikvoort (stikvoort@surfnet.nl), one of the computer security
|
|||
|
experts for the Dutch Academic Society and chairman of CERT-NL (Computer
|
|||
|
Emergency Response Team). He is also actively involved in SURFnet
|
|||
|
network management.
|
|||
|
|
|||
|
Rop Gonggrijp (rop@hacktic.nl) was involved in some of the first
|
|||
|
computer break-ins in the Netherlands during the 80's and is now editor
|
|||
|
of Hack-Tic Magazine.
|
|||
|
|
|||
|
The discussion will be led by Francisco van Jole (fvjole@hacktic.nl),
|
|||
|
journalist for 'De Volkskrant'.
|
|||
|
=========================================================================
|
|||
|
|
|||
|
WORKSHOPS
|
|||
|
|
|||
|
HEUnet introduction
|
|||
|
an introduction to the Hacking at the End of the Universe network.
|
|||
|
|
|||
|
Jumpstart to VR, 3D world-building on PC's
|
|||
|
Marc Bennett, editor of Black Ice magazine, will explain how to
|
|||
|
design worlds on your own PC which can be used in Virtual Reality
|
|||
|
systems.
|
|||
|
|
|||
|
Replacing MS/DOS, Running UNIX on your own PC
|
|||
|
People who are already running unix on their PCs will tell you what
|
|||
|
unix has to offer and they'll talk about the different flavours in
|
|||
|
cheap or free unix software available.
|
|||
|
|
|||
|
Unix security
|
|||
|
RGB and fidelio have probably created more jobs in the unix security
|
|||
|
business than the rest of the world put together. They'll talk about
|
|||
|
some of the ins and outs of unix security.
|
|||
|
|
|||
|
E-mail networking
|
|||
|
Should we destroy X400 or shall we let it destroy itself?
|
|||
|
|
|||
|
'User Authorization Failure'
|
|||
|
A quick introduction to the VAX/VMS Operating System for those that
|
|||
|
consider a career in VMS security.
|
|||
|
|
|||
|
'The right to keep a secret'
|
|||
|
Encryption offers you the chance to really keep a secret, and
|
|||
|
governments know it. They want you to use locks that they have the
|
|||
|
key to. The fight is on!
|
|||
|
|
|||
|
'Virus about to destroy the earth!'. Don't believe the hype!
|
|||
|
What is the real threat of computer viruses? What technical
|
|||
|
possibilities are there? Are we being tricked by a fear-machine that
|
|||
|
runs on the money spent on anti-virus software?
|
|||
|
|
|||
|
'It came out of the sky'
|
|||
|
'Receiving pager information and what not to do with it'. Information
|
|||
|
to pagers is sent through the air without encryption. Rop Gonggrijp
|
|||
|
and Bill Squire demonstrate a receiver that picks it all up and
|
|||
|
present some spooky scenarios describing what one could do with all
|
|||
|
that information.
|
|||
|
|
|||
|
Cellular phones and cordless phones
|
|||
|
How do these systems work, what frequencies do they use, and what are
|
|||
|
the differences between different systems world-wide?
|
|||
|
|
|||
|
Zen and the art of lock-picking.
|
|||
|
In this workshop The Key will let you play with cylinder locks of all
|
|||
|
types and tell you of ingenious ways to open them.
|
|||
|
|
|||
|
"Doesn't mean they're not after you"
|
|||
|
The secret services and other paranoia.
|
|||
|
|
|||
|
Audio Adventures
|
|||
|
Steffen Wernery and Tim Pritlove talk about adventure games that you
|
|||
|
play using a Touch Tone telephone.
|
|||
|
|
|||
|
Botanical Hacking (THC++)
|
|||
|
Using computers, modems and other high tech to grow.
|
|||
|
|
|||
|
Wireless LAN (Data Radio)
|
|||
|
How high a data rate can you pump through the air, and what is still
|
|||
|
legal?
|
|||
|
|
|||
|
Social Engineering
|
|||
|
The Dude, well known from his articles in Hack-Tic, will teach you
|
|||
|
the basics of social engineering, the skill of manipulating people
|
|||
|
within bureaucracies.
|
|||
|
|
|||
|
'Hacking Plastic'
|
|||
|
Tim and Billsf talk about the security risks in chip-cards, magnetic
|
|||
|
cards, credit cards and the like.
|
|||
|
|
|||
|
Antenna Host Demo
|
|||
|
The Antenna Foundation is setting up and supporting computer
|
|||
|
networks, mainly in the South. They are operating a host system in
|
|||
|
Nijmegen, The Netherlands, and they will demonstrate it in this
|
|||
|
workshop, and talk about their activities.
|
|||
|
|
|||
|
APS Demo
|
|||
|
APS (Activist Press Service) is operating a bbs in Amsterdam, The
|
|||
|
Netherlands. You'll see it and will be able to play with it
|
|||
|
'hands-on'.
|
|||
|
|
|||
|
'Hocking the arts'
|
|||
|
Benten and Marc Marc are computer artists. They present some of their
|
|||
|
work under the motto: Hocking the arts, demystifying without losing
|
|||
|
its magic contents.
|
|||
|
|
|||
|
Public Unix Demo
|
|||
|
Demonstrating the Hack-Tic xs4all public unix, as well as other
|
|||
|
public unix systems.
|
|||
|
|
|||
|
Packet Radio Demo
|
|||
|
Showing the possibilities of existing radio amateur packet radio
|
|||
|
equipment to transport packets of data over the airwaves.
|
|||
|
=========================================================================
|
|||
|
|
|||
|
COMPUTERS AT 'HACKING AT THE END OF THE UNIVERSE'
|
|||
|
|
|||
|
This will get a little technical for those who want to know what we're
|
|||
|
going to set up. If you don't know much about computers, just bring
|
|||
|
whatever you have and we'll see how and if we can hook it up.
|
|||
|
|
|||
|
We're going to have ethernet connected to Internet (TCP/IP). You can
|
|||
|
connect by sitting down at one of our PC's or terminals, by hooking up
|
|||
|
your own equipment (we have a depository, so don't worry about theft),
|
|||
|
or by using one of our 'printerport <--> ethernet' adapters and
|
|||
|
hooking up laptops and notebooks that way. There may be a small fee
|
|||
|
involved here, we don't know what they're going to cost us. Contact us
|
|||
|
for details, also if you have a few of these adapters lying around.
|
|||
|
There might also be serial ports you can connect to using a nullmodem
|
|||
|
cable.
|
|||
|
|
|||
|
You can log in to our UNIX system(s) and send and receive mail and
|
|||
|
UseNet news that way. Every participant that wants one can get her/his
|
|||
|
own IP number to use worldwide. Users of the network are urged to make
|
|||
|
whatever files they have on their systems available to others over the
|
|||
|
ethernet. Bring anything that has a power cord or batteries and let's
|
|||
|
network it!
|
|||
|
=========================================================================
|
|||
|
|
|||
|
--
|
|||
|
Hstorm ++31 2230 60551
|
|||
|
Ad Timmering <north@hstorm.hacktic.nl>
|