mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
454 lines
20 KiB
Text
454 lines
20 KiB
Text
![]() |
==Phrack Magazine==
|
||
|
|
||
|
Volume Seven, Issue Forty-Eight, File 18 of 18
|
||
|
|
||
|
PWN PWN PNW PNW PNW PNW PNW PNW PNW PNW PNW PWN PWN
|
||
|
PWN PWN
|
||
|
PWN Phrack World News PWN
|
||
|
PWN PWN
|
||
|
PWN Compiled by Datastream Cowboy PWN
|
||
|
PWN PWN
|
||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
|
||
|
|
||
|
|
||
|
Security Software Thwarts Hackers July 23, 1996
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
(PRNewswire)
|
||
|
|
||
|
World Star Holdings, Ltd. announced today that there have been approximately
|
||
|
5,000 unsuccessful attempts to break its proprietary VPAGE Internet security
|
||
|
system. In order to further demonstrate the functionality of its technology,
|
||
|
they Company has unveiled a new addition to the World Star Internet security
|
||
|
challenge: "The World Star Cyberhospital."
|
||
|
|
||
|
The company recently launched an online contest offering more than $50,000 in
|
||
|
cash and prizes to the first person to break its security.
|
||
|
|
||
|
[ THESE CHALLENGES ARE UNADULTERATED BULLSHIT. Phrack suggests you test
|
||
|
something other than the fake, non-production demo contest system. How
|
||
|
well does their software hold up in a real business environment?
|
||
|
(in other words: THEIRS!?!!@$)
|
||
|
|
||
|
World Star Holdings (NET-WORLDSTAR-MB-CA)
|
||
|
165 Garry Street
|
||
|
Winnipeg, Manitoba R3C 1G7
|
||
|
CA
|
||
|
|
||
|
Netname: WORLDSTAR-MB-CA
|
||
|
Netnumber: 205.200.247.0 ]
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
Your Cellular Phone Number May Be Up For Grabs August 21, 1996
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by Mimi Whitefield (Miami Herald)
|
||
|
|
||
|
|
||
|
Electronic bandits have snatched cellular phone numbers from the airwaves and
|
||
|
cloned phones used by the Miami office of the Secret Service.
|
||
|
|
||
|
BellSouth Florida president Joe Lacher's phone has been cloned; Spero Canton,
|
||
|
spokesman for BellSouth, has been a victim three times over.
|
||
|
|
||
|
"The bums never sleep. They're everywhere," complained Bill Oberlink,
|
||
|
regional president for AT&T Wireless Services.
|
||
|
|
||
|
But the good news is that law enforcement agencies and cellular companies
|
||
|
themselves are fighting back with a new arsenal of tools, technology and laws
|
||
|
that make it easier to detect and prosecute cellular bandits.
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
Miami Fraud Squad Pursues Cellular Bandits August 12, 1996
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by Audra D.S. Burch (Miami Herald)
|
||
|
|
||
|
How's this for capitalism gone awry: Metro-Dade police nabbed a cellular
|
||
|
bandit who was selling a $150 package deal -- $75 each for a stolen phone
|
||
|
and number -- along with a 30-day guarantee on unlimited illegal air time.
|
||
|
|
||
|
In a sting operation, police took him on the cut-rate offer.
|
||
|
|
||
|
Thanks to the work of a special Metro-Dade Police Economic Crimes Bureau, the
|
||
|
entrepreneurial cloner got a prison sentence.
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
Newer Technology Aids Fight Against Cellular Fraud August 21, 1996
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by Mimi Whitefield (Miami Herald)
|
||
|
|
||
|
New technology is on the side of cellular companies fighting telecom criminals
|
||
|
who can rack up thousands of dollars in illegal charges before a consumer even
|
||
|
knows he's been hit.
|
||
|
|
||
|
New Jersey-based Bellcore, for example, has developed NetMavin software,
|
||
|
which can detect fraudulent or unusual calling patterns within half an hour.
|
||
|
|
||
|
"This is really going to screw the cloners up," said Roseanna DeMaria, an
|
||
|
AT&T Wireless executive.
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
SPA Files Copyright Suit July 28, 1996
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
(Reuters News)
|
||
|
|
||
|
The Software Publishers Association said Sunday it filed a civil copyright
|
||
|
infringement lawsuit against a Seattle man for illegal distribution of
|
||
|
software on the Internet.
|
||
|
|
||
|
The suit, which was filed July 23 in the U.S. District Court in Seattle,
|
||
|
alleges that Max Butler illegally uploaded copyrighted software to a file
|
||
|
transfer protocol site for distribution across the Internet, the trade
|
||
|
association said.
|
||
|
|
||
|
"This action is a warning to Internet users who believe they can infringe
|
||
|
software copyrights without fear of exposure or penalty," said Sandra
|
||
|
Sellers, Software Publisher's vice president of intellectual property
|
||
|
education and enforcement.
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
The L0pht August, 1996
|
||
|
~~~~~~~~~
|
||
|
by Steve G. Steinberg (Wired) p. 40
|
||
|
|
||
|
What do a group of hackers do when the equipment they've accumulated over
|
||
|
years of dumpster diving no longer fits in their apartments? They get
|
||
|
a l0pht. Since 1993, a core group of seven Boston-based hackers have rented
|
||
|
a loft space for hacking, trading information about cellular phones security,
|
||
|
and building things like a wireless Internet service using discarded
|
||
|
microwave equipment.
|
||
|
|
||
|
Now that all of them have day jobs in the industry, why do they keep at it?
|
||
|
"For the girls and the text files, of course," says Mudge.
|
||
|
|
||
|
[ HELL YES!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! ]
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
Cracking Down on the Outlaws of Cyberspace July 2, 1996
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by M.J. Zuckerman (USA Today) p. 4B
|
||
|
|
||
|
|
||
|
What's it take to be America's top cybercop?
|
||
|
|
||
|
"I was a hockey referee, so I'm used to being beaten up," suggests Jim
|
||
|
Christy, who is among those most often mentioned for the title. And he's
|
||
|
been at it for only a decade.
|
||
|
|
||
|
Today, with the weighty title of Chief of Computer Crime Investigations
|
||
|
and Information Warfare, he is one of 68 computer investigators in the
|
||
|
Air Force Office of Special Investigations (OSI).
|
||
|
|
||
|
Christy, a Baltimore native, stumbled into the computer field. After
|
||
|
drawing No. 35 in the draft lottery during the Vietnam War, he joined the
|
||
|
Air Force rather than waiting to be drafted. He spent the next four years
|
||
|
as a computer key punch operator, followed by 13 years as a civilian working
|
||
|
computers at the Pentagon.
|
||
|
|
||
|
When he moved to OSI, Christy largely ceased his hands-on involvement with
|
||
|
computers and systems.
|
||
|
|
||
|
Since last fall, Christy has been on temporary assignment to the Senate
|
||
|
Permanent Subcommittee on Investigations, helping them examine security
|
||
|
in cyberspace.
|
||
|
|
||
|
"I like working up on Capitol Hill, because you can make a difference,"
|
||
|
Christy says.
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
|
||
|
Hackers Penetrate Justice Department Home Page August 18, 1996
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
(AP News Wire)
|
||
|
|
||
|
Internet hackers infiltrated the Justice Department's home page
|
||
|
yesterday, altering the official web site to include swasticas,
|
||
|
obscene pictures and lots of criticism of the Communications Decency Act.
|
||
|
|
||
|
The official web site, which was turned off by government technicians
|
||
|
when it was discovered, was changed to read "United States Department of
|
||
|
Injustice," next to a red, black and white flag bearing a swastika.
|
||
|
|
||
|
The page included color pictures of George Washington, Adolf Hitler, and a
|
||
|
topless Jennifer Aniston.
|
||
|
|
||
|
[ A link to a copy of the page is it http://www.fc.net/phrack/doj ]
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
Employment Prospect Grim for Hacker August 19, 1996
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
(AP News wire)
|
||
|
|
||
|
|
||
|
Employment prospects are grim for Kevin Lee Poulsen, a computer whiz
|
||
|
imprisoned five years for his cyberspace havoc.
|
||
|
|
||
|
The 30-year-old hacker has been barred from getting near a computer for the
|
||
|
next three years and he now fears selling cowboy boots at a Western store
|
||
|
will be his only opportunity to make some money.
|
||
|
|
||
|
"It's the only place where I've been greeted with a positive attitude," he
|
||
|
said during an interview last week. "I can't get a job that I am qualified
|
||
|
for, basically."
|
||
|
|
||
|
On September 3, he goes to federal court in hopes of having some of the
|
||
|
computer restrictions relaxed.
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
School Hires Student To Hack Into Computers August 22, 1996
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
(The Sun Herald)
|
||
|
|
||
|
Students at Palisades Park's high school needed their transcripts to
|
||
|
send off to colleges. But they were in the computer and no one who knew
|
||
|
the password could be reached. So the school hired a 16-year-old hacker
|
||
|
to break in.
|
||
|
|
||
|
Superintendent George Fasciano was forced to explain to the School
|
||
|
Board on Monday the $875 bill for the services of Matthew Fielder.
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
Feds aim low on hacker crackdown June 21, 1996
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by Lewis Z. Koch (Upside Online News)
|
||
|
|
||
|
Nineteen-year-old Christopher Schanot of St. Louis, Mo. has been
|
||
|
languishing in a Federal jail since March 25, 1996, charged with four
|
||
|
counts of computer hacking. He is not allowed to post bond, because
|
||
|
Federal authorities contend he is "a computer genius intent on
|
||
|
infiltrating computer systems of some of the largest companies and
|
||
|
entities in the country," and because a jailhouse snitch claims Schanot
|
||
|
bragged he would run away if he were released. He has never been charged
|
||
|
with a crime or arrested before.
|
||
|
|
||
|
Schanot's problems began after he ran away from home on May 30, 1995,
|
||
|
taking some of his disks, a hard drive and personal items. According to a
|
||
|
knowledgeable source close to Schanot, Chris felt his parents, especially
|
||
|
his father Michael, didn't understand or respect him.
|
||
|
|
||
|
Less rocky, it seems, was his relationship with Netta Gilboa, a
|
||
|
38-year-old woman living near Philadelphia. Gilboa is editor-in-chief and
|
||
|
publisher of _Gray Areas_, a slick, text-heavy, irregular magazine that
|
||
|
explores the "grey areas" of "alternative lifestyles and deviant
|
||
|
subcultures."
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
City of London Surrenders To Cyber Gangs June 2, 1996
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
(Times of London)
|
||
|
|
||
|
City of London financial institutions have paid huge sums to international
|
||
|
gangs of sophisticated "cyber terrorists" who have amassed up to 400 million
|
||
|
pounds worldwide by threatening to wipe out computer systems.
|
||
|
|
||
|
A Sunday Times Insight investigation has established that British and
|
||
|
American agencies are examining more than 40 "attacks" on financial
|
||
|
institutions in London and New York since 1993.
|
||
|
|
||
|
Victims have paid up to 13 million pounds a time after the blackmailers
|
||
|
demonstrated their ability to bring trading to a halt using advanced
|
||
|
"information warfare" techniques learnt from the military.
|
||
|
|
||
|
According to the American National Security Agency (NSA), they have
|
||
|
penetrated computer systems using "logic bombs" (coded devices that can
|
||
|
be remotely detonated), electromagnetic pulses and "high emission radio
|
||
|
frequency guns," which blow a devastating electronic "wind" through a
|
||
|
computer system.
|
||
|
|
||
|
The gangs are believed to have gained expertise in information warfare
|
||
|
techniques from the American military, which is developing "weapons"
|
||
|
that can disable or destroy computer hardware. Some are also known to
|
||
|
have infiltrated banks simply by placing saboteurs on their payroll as
|
||
|
temporary staff.
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
Credit Fraud on AOL
|
||
|
~~~~~~~~~~~~~~~~~~~
|
||
|
(AP Newswire)
|
||
|
|
||
|
Two boys posed as billing representatives for an online service and stole
|
||
|
at least 15 credit card numbers, and used those numbers to buy $15,000
|
||
|
worth of merchandise, from computer equipment to cymbals, police said.
|
||
|
|
||
|
The two 16-year-olds were charged with 39 counts of possession of
|
||
|
stolen property, theft and attempted fraud. They were released to the
|
||
|
custody of their parents pending a Family Court hearing.
|
||
|
|
||
|
Police believe the boys obtained a program designed by computer
|
||
|
hackers to flimflam customers of America Online. It sends a message to
|
||
|
users saying they will be cut off if they don't type in their name,
|
||
|
credit card account number and computer service password.
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
FBI Survey Reveals Growth of Cybercrime May 6, 1996
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by Rory J. O'Connor (San Jose Mercury News)
|
||
|
|
||
|
Intruders are breaking into the nation's computer systems at an
|
||
|
increasing rate and often with more nefarious motives than in the
|
||
|
past, according to a survey co-sponsored by the FBI and a private
|
||
|
group of computer security professionals.
|
||
|
|
||
|
"What this shows is that the ante has been upped in cyberspace," said
|
||
|
Richard Power, senior analyst of the Computer Security Institute in
|
||
|
San Francisco, which conducted the survey. "As all manner of commerce
|
||
|
moves into cyberspace, all manner of crime is moving there as well.
|
||
|
It's no longer just vandalism."
|
||
|
|
||
|
More than 40 percent of the 428 corporate, university and government
|
||
|
sites that responded to the FBI survey reported at least one
|
||
|
unauthorized use of their computers within the last 12 months, with
|
||
|
some institutions reporting as many as 1,000 attacks in the period.
|
||
|
|
||
|
It also appears that there's more computer crime for hire occurring,
|
||
|
Power said, exploiting mainly older hackers who have graduated to
|
||
|
making money off the skill they once used simply to establish bragging
|
||
|
rights with their peers. He suggested that some of the hiring is being
|
||
|
done by intelligence services of various governments, although he
|
||
|
offered no proof.
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
University hacker to be hunted on the Internet April 27, 1996
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
By Robert Uhlig (London Daily Telegraph)
|
||
|
|
||
|
Computer experts at Cambridge University are using the Internet to hunt
|
||
|
for a hacker who breached their security systems to access some of the
|
||
|
world's most sensitive research information.
|
||
|
|
||
|
The authorities had no indication that the hacker deleted or altered
|
||
|
files, "although there was the potential for that", he said. Files
|
||
|
belonging to world-renowned research scientists may have been viewed or
|
||
|
copied, giving the hacker an insight into commercially and academically
|
||
|
sensitive material.
|
||
|
|
||
|
The hacker used a so-called sniffer program, which sat silently within the
|
||
|
computer system for four weeks, monitoring its activities. This could
|
||
|
allow the hacker to compile a list of all passwords to give him unhindered
|
||
|
access to every computer on the university's network. "There was the
|
||
|
potential to access any material on any computer anywhere on the
|
||
|
university's network - ranging from electronic-mail to confidential
|
||
|
research data," said Mr Stibbs.
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
Agents' Codes Exposed on Web March 16, 1996
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
By: Robert E. Kessler (Newsday)
|
||
|
|
||
|
|
||
|
In an attempt to help (Ed) Cummings, and discredit the Secret Service, a Long
|
||
|
Island-based hacker magazine last week launched a page on the World Wide
|
||
|
Web publishing lists of Secret Service radio frequencies, photographs of
|
||
|
agents, and codenames used by the agency for officials and buildings.
|
||
|
|
||
|
Last year, Cummings, a 35-year-old native of Reading, Pa., pleaded
|
||
|
guilty to federal charges in Philadelphia of possessing telecommunications
|
||
|
equipment with intent to defraud and served a seven-month prison sentence.
|
||
|
|
||
|
As a result of that conviction, last week Cummings was sentenced by a
|
||
|
judge in Easton, Pa., north of Philadelphia, to serve a six- to 24-month
|
||
|
sentence for violating probation after pleading no contest to a 1994 charge
|
||
|
of tampering with evidence in another telephone hacking case.
|
||
|
|
||
|
"Painting this guy as some white knight or someone who is standing up
|
||
|
for free speech is wrong," said Kun. "He's engaged in fraud."
|
||
|
|
||
|
Cummings' attorney, Kenneth Trujillo, could not be reached for comment.
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
Judge Denies Bond to Accused Hacker April 6, 1996
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by Tim Bryant (St. Louis Post Dispatch)
|
||
|
|
||
|
After another prisoner said accused computer hacker Christopher Schanot was
|
||
|
planning a quick escape from his parents' home near High Ridge, a federal
|
||
|
magistrate decided Friday to keep Schanot in jail.
|
||
|
|
||
|
"He said he would wait a couple of days and take off," testified the
|
||
|
prisoner, Gerald Esposito.
|
||
|
|
||
|
Schanot's lawyer, federal public defender Norm London, told Davis that
|
||
|
the alleged conversation between the young man and Esposito never happened.
|
||
|
|
||
|
London, pointing out that Esposito has convictions for sexual assault,
|
||
|
said the older prisoner had "made overtures" to jail officials about moving
|
||
|
Schanot into Esposito's housing area.
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
Hacked Off! Government, Firms Fight Computer Intruders April 7, 1996
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by Colleen Bradford (St. Louis Post Dispatch)
|
||
|
|
||
|
Every day, hundreds of people in front of personal computers try to sneak
|
||
|
into corporate and government computer networks. Sometimes they just look
|
||
|
around, sometimes they destroy data and sometimes they steal personal and
|
||
|
classified information.
|
||
|
|
||
|
Two weeks ago, law enforcement officials charged an Argentine, 21, with
|
||
|
using the Internet to illegally break into computer networks at Department
|
||
|
of Defense installations, the NASA, Los Alamos National Laboratory and
|
||
|
several universities. The Justice Department is now seeking Julio Cesar
|
||
|
Ardita, who accessed confidential research files on aircraft design, radar
|
||
|
technology and satellite engineering.
|
||
|
|
||
|
And Chris Schanot, 19, from High Ridge, was in court in St. Louis last
|
||
|
week on charges of hacking. Schanot, who fled to Pennsylvania from St.
|
||
|
Louis after graduating from Vianney High School last May, is accused in a
|
||
|
five-count indictment of breaking into the computers of Southwestern Bell,
|
||
|
Bell Communications Research, Sprint and SRI International, a research and
|
||
|
development contractor with government contracts. His trial is set for June
|
||
|
10.
|
||
|
|
||
|
Schanot, like other hackers, likely became addicted to the feeling of
|
||
|
power that cracking into a private computer network brings, said St. Louis
|
||
|
County Police Sgt. Thomas Lasater, who has been investigating computer
|
||
|
crime for seven years.
|
||
|
|
||
|
"Normally these young hackers do not use the computers for financial
|
||
|
gain," Lasater said. "It's just a challenge for them to see what they can
|
||
|
conquer."
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
Mike and Terry's Dreadful Adventure
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by Elizabeth Weise (AP Newswire)
|
||
|
|
||
|
Terry Ewing was late. His plane left in an hour and he was cutting it close.
|
||
|
But he couldn't tear himself away from his computer and the hole he'd hacked
|
||
|
into the security network of Tower Records.
|
||
|
|
||
|
He kept poking around, looking for something interesting to take to the
|
||
|
hackers' convention he was going to. Finally, five minutes before the
|
||
|
airport shuttle beeped in front of his apartment, he downloaded a file
|
||
|
containing 1,700 credit card numbers.
|
||
|
|
||
|
"We didn't expect anyone was watching," he said seven months later -
|
||
|
through an inch of Plexiglas at the Sacramento County Jail.
|
||
|
|
||
|
Ewing had had second thoughts about taking the Tower Records file with
|
||
|
him on July 31, so he left it on his hard drive while he and Kim hit
|
||
|
DefCon, the biggest of the West Coast hacker gatherings, for a weekend of
|
||
|
bragging, hanging out and messing around.
|
||
|
|
||
|
"We never guessed they were onto us. Their security was so weak it
|
||
|
really blew," the 20-year-old Kim says by phone from the sixth floor of
|
||
|
the same jail that held his friend. He is facing an 18-month sentence.
|
||
|
|