mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
1354 lines
64 KiB
Text
1354 lines
64 KiB
Text
![]() |
.oO Phrack Magazine Oo.
|
||
|
|
||
|
Volume Seven, Issue Forty-Nine
|
||
|
|
||
|
File 3 of 16
|
||
|
|
||
|
// // /\ // ====
|
||
|
// // //\\ // ====
|
||
|
==== // // \\/ ====
|
||
|
|
||
|
/\ // // \\ // /=== ====
|
||
|
//\\ // // // // \=\ ====
|
||
|
// \\/ \\ // // ===/ ====
|
||
|
|
||
|
------------------------------------------------------------------------------
|
||
|
|
||
|
CUERVOCON 96 CUERVOCON 96 CUERVOCON 96 CUERVOCON 96 CUERVOCON 96
|
||
|
|
||
|
Tengo que hable con mi abogado.
|
||
|
|
||
|
----------------------------------------------------------------
|
||
|
|
||
|
What : A computer/telephony/security conference. (show this part to your
|
||
|
boss.)
|
||
|
|
||
|
Where: Fort Brown Hotel, Brownsville Texas.
|
||
|
|
||
|
When : 28 & 29 December, 1996
|
||
|
|
||
|
Who : The usual gang of cretins.
|
||
|
|
||
|
Why : It's winter, and it is 12 degrees outside. The dumpsters are frozen
|
||
|
shut, and there are icicles on the payphones. Brownsville is at the
|
||
|
Southern-most tip of Texas, right up against...Mexico. Yes, Mexico,
|
||
|
land of cheap cerveza, four-dollar strippers, and liberal drinking
|
||
|
laws. Mexico, where you too can own your very own Federal law
|
||
|
enforcement official for a fistful of pesos.
|
||
|
|
||
|
----------------------------------------------------------------
|
||
|
|
||
|
Speakers
|
||
|
|
||
|
Anybody wishing to speak at CuervoCon should send
|
||
|
e-mail to the address at the bottom of this announcement.
|
||
|
Currently the list includes:
|
||
|
u4ea (by teleconfrence)
|
||
|
Major
|
||
|
ReDragon
|
||
|
Caffiend (about her Breasts)
|
||
|
daemon9 (about his Breasts)
|
||
|
|
||
|
----------------------------------------------------------------
|
||
|
|
||
|
Events
|
||
|
|
||
|
"How Much Can You Drink?"
|
||
|
"Fool The Lamer"
|
||
|
"Hack The Stripper"
|
||
|
"Hack The Web Server"
|
||
|
"sk00l"
|
||
|
"Ouija Board Hacking"
|
||
|
|
||
|
...as well as a variety of Technical Presentations.
|
||
|
|
||
|
|
||
|
----------------------------------------------------------------
|
||
|
|
||
|
|
||
|
General Information
|
||
|
|
||
|
|
||
|
The Fort Brown Hotel will have available to us, 125 rooms at the holiday in @
|
||
|
$55 a room, and $75 rooms at the ramada @ $45 each. The Fort Brown was
|
||
|
previously an actual fort when it was closed down by Uncle Sam. It became one
|
||
|
large hotel until it was recently purchased and split into the Holiday Inn and
|
||
|
the Ramada. The Fort Brown was chosen because it is across the street from
|
||
|
the bridge to Mexico. You can call the Fort Brown Ramada at:
|
||
|
|
||
|
210-541-2921
|
||
|
|
||
|
You can call the Fort Brown Holiday Inn at:
|
||
|
|
||
|
210-546-2201
|
||
|
|
||
|
Call for reservations, make sure to tell them your with CuervoCon.
|
||
|
|
||
|
Friday and Saturday the con will be in the 'Calvary' room. While Sunday we
|
||
|
have the 'Fortress Room' where all the big speakers will be. Friday and
|
||
|
Saturday we will have a few speakers and activities. Friday Night mainly,
|
||
|
so we can have people arrive on time. We hope to have the con room open 24
|
||
|
hours a day.
|
||
|
|
||
|
Brownsville is right on the Mexican border, adjacent to the Mexican town
|
||
|
Matamoris. The Gulf of Mexico is 25 miles away. Brownsville has a population
|
||
|
just over 100,000. The police force includes 175 officers, and a wide variety
|
||
|
of federal law enforcement agencies have a strong presence there as well.
|
||
|
The climate is semi-tropical, and the RBOC is SouthWestern Bell.
|
||
|
|
||
|
Matamoris is the other half of brownsville. Home of over 1/2 a million
|
||
|
people, it is known since the early 1900's as a pit of sin. The federale's
|
||
|
are not to be fucked with and it is serviced by TelMex. It is known for its
|
||
|
bars, strip clubs and mexican food. Matamoros also has an airport incase
|
||
|
you live in Mexico and care to go, via aeromexico.
|
||
|
|
||
|
Directions:
|
||
|
In Texas Driving - Go anyway you can to get to US 77 South. Take 77 South
|
||
|
till it ends in Brownsville. From there you will turn right on International.
|
||
|
Proceed all the way down international, right before the bridge, turn left.
|
||
|
The Fort Brown will be on the left.
|
||
|
|
||
|
For those flying in - We are going to try to have a shuttle going. Also just
|
||
|
tell the cab driver, Fort Brown.
|
||
|
|
||
|
The Con Registration Fee, aka the pay it when you walk in our we will beat you
|
||
|
up, is only 10$ and an additional 5$ for the 'I paid for eliteness sticker'
|
||
|
which will let you into the special events, such as hack the stripper.
|
||
|
|
||
|
----------------------------------------------------------------
|
||
|
|
||
|
Celebrity Endorsements
|
||
|
|
||
|
|
||
|
|
||
|
Here's what last years participants had to say about CuervoCon:
|
||
|
|
||
|
"I attended the CuervoCon 95. I found many people there who, fearing a
|
||
|
sunburn, wanted to buy my t-shirts!" -ErikB
|
||
|
|
||
|
"I tried to attend, but was thwarted by "No Admittance to The Public"
|
||
|
sign. I feel as though I missed the event of the year." - The Public
|
||
|
|
||
|
"mmmm...look at all the little Mexican boys..." -Netta Gilboa
|
||
|
|
||
|
"Wow! CuervoCon 95 was more fun that spilling my guts to the feds!" -
|
||
|
Panther Modern
|
||
|
|
||
|
"CuervoCon is our favorite annual event. We know we can give
|
||
|
security a day of rest, because you people are all too drunk to
|
||
|
give us any trouble..." - AT&T
|
||
|
|
||
|
"No moleste, por favor." - TeleMex
|
||
|
|
||
|
Don't miss it!
|
||
|
|
||
|
----------------------------------------------------------------
|
||
|
|
||
|
|
||
|
Have you ever hacked a machine in your hometown from a foreign
|
||
|
country?
|
||
|
|
||
|
Have you ever had to convert dollars into pesos to get your bribe right?
|
||
|
|
||
|
Have you ever spent time in a foreign prison, where your "rights as an
|
||
|
American" just don't apply?
|
||
|
|
||
|
Have you ever been taken down for soemthing that wasn't even illegal
|
||
|
half an hour ago?
|
||
|
|
||
|
YOU WILL! And the con that will bring it to you?
|
||
|
|
||
|
CUERVOCON 96
|
||
|
|
||
|
----------------------------------------------------------------
|
||
|
|
||
|
CUERVOCON 96 CUERVOCON 96 CUERVOCON 96 CUERVOCON 96 CUERVOCON 96
|
||
|
brought to you by
|
||
|
- S.o.B. - TNo - PLA - Phrack - The Guild - F.U.C.K. - SotMESC -
|
||
|
|
||
|
|
||
|
Contact Information
|
||
|
|
||
|
info@cuervocon.org
|
||
|
|
||
|
www.cuervocon.org - Look here for updates.
|
||
|
|
||
|
Voice mail system coming up soon.
|
||
|
|
||
|
----------------------------------------------------------------
|
||
|
|
||
|
|
||
|
----<>----
|
||
|
|
||
|
|
||
|
*** The truth behind the Adult Verification Services
|
||
|
|
||
|
('porno' will set you free)
|
||
|
|
||
|
*** By your passively skeptical author, t3.
|
||
|
|
||
|
*** 10.30.96
|
||
|
|
||
|
|
||
|
Let's speak for a minute about 'porno'. 'Porno' has saturated the
|
||
|
Net to a level in which it's difficult *not* to see it, regardless if
|
||
|
you're looking for it. It can be found on the largest web site and the
|
||
|
smallest ftp site. It can be found on Usenet, it can be found with any
|
||
|
one of numerous search engines. Let's not delude ourselves, porno is
|
||
|
*everywhere* and anyone with the motor skills to click a mouse can have access
|
||
|
to it.
|
||
|
|
||
|
About a year ago a concept came along called 'Adult Verification'. This first
|
||
|
started out by people writing crude cgi scripts that would query every person
|
||
|
as to their age. 'Are you 18' it would say, and even a sexually aware 9-year
|
||
|
old would know to say 'yay' to this.
|
||
|
|
||
|
Soon thereafter, someone topped this 4-line piece of code by writing a login
|
||
|
interface, most likely it was incorporated into Netscape or some other, less
|
||
|
worthy browser. This program made use of the actual browser to authenticate
|
||
|
users. Of course one needed a login and password, of which had to be manually
|
||
|
added after ample proof of age was received. If one merely wanted to
|
||
|
cover one's ass, this would not be a logical solution.
|
||
|
|
||
|
This all occurred during which the CDA (Communications Decency Act) had
|
||
|
actually existed. On June 7, 1995, the CDA was passed through the Senate
|
||
|
to the President, signed, and made a law:
|
||
|
|
||
|
(1) in the heading by striking `Broadcasting obscene
|
||
|
language' and inserting `Utterance of indecent or profane
|
||
|
language by radio communication; transmission to minor of
|
||
|
indecent material from remote computer facility, electronic
|
||
|
communications service, or electronic bulletin board service';
|
||
|
|
||
|
et al...Now it was illegal to transmit 'indecent material' on the
|
||
|
Internet. If this were to actually be adhered to, the Net would shrink
|
||
|
so drastically that the current topology would last ten years before
|
||
|
needing an upgrade.
|
||
|
|
||
|
Is was soon apparent that this act was not going to fly. Groups like the
|
||
|
EFF and the ACLU suddenly became extremely busy. Companies such as Apple
|
||
|
and Microsoft challenged the constitutionality of such a law and took
|
||
|
this directly to court. It was also apparent that the transmission of
|
||
|
'indecent material' would not disappear, but merely go further underground.
|
||
|
|
||
|
Indeed, this is exactly what happened. Soon thereafter Adult Verification
|
||
|
services began popping up. AVS (Adult Verification Services), Adultcheck,
|
||
|
Adultpass, and a slew of others came up with an idea.
|
||
|
|
||
|
The idea was to verify a person's adult status by acquiring one's credit
|
||
|
card number. This would, ahem, without a doubt, prove that the individual
|
||
|
was 18. Why? Because you had to be 18 to have a credit card of course!
|
||
|
Someone obviously didn't take into consideration the five or so million
|
||
|
pre-adults that would make it their goal to surpass such shotty
|
||
|
authentication.
|
||
|
|
||
|
It began by the government stating that a credit card is a legal means of
|
||
|
verifying one's age, this allowing those distributing 'porno'graphic
|
||
|
materials to continue distributing to those 18 and over. The initial
|
||
|
means that the 'providers of porn' used to do this was to basically
|
||
|
verify the format of the card and not actually run a check on it. As
|
||
|
most of us all know, there have been plenty of "Credit Card Generators"
|
||
|
produced in the last five years, quite capable of fooling these shotty
|
||
|
authentication systems.
|
||
|
|
||
|
As this authentication was obviously lacking in the "authentication"
|
||
|
part, the next step was to actually validate the cards. This began and
|
||
|
ended nearly as quickly, for finding a credit card (for example, in
|
||
|
mommy's purse), junior could peruse porn until his dick grew red and chafed.
|
||
|
|
||
|
On June 12, 1996 it was was determined that the CDA indeed violated one's
|
||
|
constitutional rights and was striken down as a law. More on this at
|
||
|
<http://www.eff.org/pub/Legal/Cases/EFF_ACLU_v_DoJ/>.
|
||
|
|
||
|
But it didn't seem to phase the Authentication services.
|
||
|
|
||
|
The Authentication Services currently verify age by obtaining a credit
|
||
|
card, verifying it, and actually charging a fee for the service. About
|
||
|
$9.95 for two years which entitles you to an abundance of graphic, ad,
|
||
|
and airbrush-laden web pages and images. This most likely sufficiently
|
||
|
scared off the less determined of minors because now they'd be engaging in
|
||
|
credit card fraud.
|
||
|
|
||
|
It's truly odd that after it has been deemed legal to distribute said
|
||
|
porn, that all of these services still insist that it's illegal to do
|
||
|
so. Let us realize that Usenet barely flinched when the CDA was in
|
||
|
effect, and still offered gigs upon (glorious) gigs of nude bodies to
|
||
|
oggle at.
|
||
|
|
||
|
After taking a good look at this whole bizarre operation, I have made a
|
||
|
few conclusions of my own.
|
||
|
|
||
|
Charging $9.95 for two years of access to 'porno'graphy seems a little too
|
||
|
good to be true. One must realize that there is a charge to the billing
|
||
|
company for each credit card transaction made. I'd be surprised if it
|
||
|
wasn't half of this ten bucks. These authentication companies also pay
|
||
|
"handsomely" the purveyors of porn. In order for such a service to
|
||
|
function, obviously there needs to be an agreement with the distributor and the
|
||
|
authenticator.
|
||
|
|
||
|
Now, one that distributes 'porno'graphy on the Net will certainly not feel
|
||
|
the need to do these Verification Services any favors. The majority of
|
||
|
people that do run these explicit sites are certainly not interested in
|
||
|
supporting censorship of their material (probably 90% money-making). The
|
||
|
AVS's knew this and offered a stipend to those using their services.
|
||
|
|
||
|
The AVS's currently work by paying the site that contains 'indecent
|
||
|
material' a certain amount each time that site gets another person to
|
||
|
sign up with their service. This works by the AVS sending html that is
|
||
|
put on a verification page. If one finds this page important enough,
|
||
|
they may be convinced to sign up with the service that allows you to
|
||
|
access it.
|
||
|
|
||
|
The stipend is generally around $4.00, and as high as $7.50. There are
|
||
|
many AVS's, and the majority of the said 'sites' use more than one,
|
||
|
sometimes all of them for verification. If a particular site uses one
|
||
|
AVS exclusively, the AVS will pay on the highest end of their scale for new
|
||
|
recruits.
|
||
|
|
||
|
If we get into some simple math, we may find some contradictions
|
||
|
regarding this. The initial fee to those interested in accessing porn is
|
||
|
$9.95. Out of these we can safely say that more than $3.00 goes to
|
||
|
simply checking the validity of the card and billing it. This leaves the
|
||
|
AVS with $6.95.
|
||
|
|
||
|
Now, on the receiving end we have a very minimum of $4.00 going towards
|
||
|
each new person that signs up. It's probably safe to say that over 90%
|
||
|
of new customers to these AVS's sign-up through 'porno'graphic pages and
|
||
|
not directly from the site itself.
|
||
|
|
||
|
So $9.95 ends up being $6.95 after expenses, and then the service sends
|
||
|
another $4.00 to the person that gave them the account. This leaves the
|
||
|
AVS with a maximum of $2.95 total.
|
||
|
|
||
|
The costs running an AVS are surely not exorbant, but are certainly not
|
||
|
cheap. I have yet to find an AVS running off of anything less than at T1
|
||
|
(1.544mbit) speeds. This translates to an extreme minimum of 1k/month.
|
||
|
If you include employees, office space, and incidentals, running any such
|
||
|
service couldn't cost less than 5k a month at the very least. This would
|
||
|
mean to break even one would have to bring in:
|
||
|
|
||
|
5000/2.95
|
||
|
|
||
|
1694 new customers a month, simply to break even! That's a lot
|
||
|
considering the membership lasts for two years. And this is in the
|
||
|
*best-case* scenario. I would be hard-pressed to believe that one such
|
||
|
service could steadily rely on such a base of new clients every month
|
||
|
indefinitely!
|
||
|
|
||
|
I have theorized that these services are in fact not self-run moneymaking
|
||
|
ventures, but are actually being funded by a higher authority. It's
|
||
|
quite feasible to believe that the government, having been challenged and
|
||
|
beat, have actually allocated funds to protecting the minors of the Net
|
||
|
from obscenity. It's *certainly* not far-fetched, especially with Al
|
||
|
Gore (think, Tipper) in an improperly high position.
|
||
|
|
||
|
The government could allocate a comparitively paltry sum of one million a
|
||
|
year towards funding (even creating) companies that act merely to pay
|
||
|
people to be complacent. What if the government merely let relatively
|
||
|
computer proficient professionals bid on forming these AVS's? What if?
|
||
|
|
||
|
Well, unless i'm overlooking something, I can't see too much illogic to
|
||
|
my theory.
|
||
|
|
||
|
Another consideration of these services is that even at their current
|
||
|
state, they are extremely easy to overcome. So easy, in fact, that their
|
||
|
existence will hardly offer much resistance to a horny teenager. Remember,
|
||
|
people will do anything to get 'porno'graphy.
|
||
|
|
||
|
Such holes in these systems are that the verified member of such an AVS
|
||
|
connects to a sexually explicit site, is bounced backed to the AVS for
|
||
|
authentication, and is then bounced back again to the page (url) that
|
||
|
contains the "naughty stuff". This page can be simply bookmarked and
|
||
|
distributed to anyone and their Mom.
|
||
|
|
||
|
Why? All the services I've come across (the largest ones) do not
|
||
|
authenticate the target url, they target the initial "warning" page and
|
||
|
contain information to pass the user on to the naughty stuff. Thus if
|
||
|
one single person can obtain the target url, he can bypass all future
|
||
|
authentication and can as well pass the url on through various channels,
|
||
|
quite easily ending up in the hands of a minor.
|
||
|
|
||
|
As well, if stupidity was a metaphor for AVS's, most of the target url's
|
||
|
have filenames such as "warning.html" or "granted.html". Any
|
||
|
half-respectable search engine (such as AltaVista) is capable of snarfing
|
||
|
out such information. Doubly-so because these services will obviously
|
||
|
want to advertise their existence.
|
||
|
|
||
|
The only method that seems to partially protect minors from 'porno'graphy
|
||
|
is the method of installing client-based software such as SurfWatch that
|
||
|
try to censor 'porno'graphy. This, as well, relies on a willing company or
|
||
|
individual to operate. This works quite archaically by imbedding META
|
||
|
tags in html source. For example:
|
||
|
|
||
|
<META name="description" content="Validate Age Verification
|
||
|
Service"><meta name="keywords" content="sex erotica nude porn penthouse
|
||
|
pornography erotic porno adult playboy dating marriage love date age
|
||
|
validate validation protect children kids money commercial wealth nudes
|
||
|
pics jpg gif">
|
||
|
|
||
|
This particular tag would be placed in the receiving html of a
|
||
|
co-operative service or individual. The client-based software would
|
||
|
search for such tags and censor the content accordingly. From my
|
||
|
understanding, those using AVS's are not required to embed these tags in
|
||
|
their "warning" page html. If they do not, which I would imagine many
|
||
|
probably wouldn't, then suddenly these client-based censorship tools are
|
||
|
rendered useless.
|
||
|
|
||
|
So in conclusion, I would give a big thumbs-down for this whole pathetic
|
||
|
means of controlling freedom. The Internet was meant to be a place to
|
||
|
free exchange of information. Today a minor is just as able to find
|
||
|
explicit material on the Net as he/she is able to dig through Mom and
|
||
|
Dad's dresser for copies of Hustler. A minor is just as capable of
|
||
|
watching R or X-rated movies, stealing a magazine from a store, or even
|
||
|
buying one.
|
||
|
|
||
|
It's time to stop using half-assed and crippled ways of protecting kids
|
||
|
from obscenity on the Net. If you're a parent and you don't want your
|
||
|
child to view such 'porno'graphy, then why not do what you're supposed to
|
||
|
do and discipline the kid.
|
||
|
|
||
|
Lazy fuckers.
|
||
|
|
||
|
|
||
|
t3
|
||
|
.end
|
||
|
|
||
|
|
||
|
|
||
|
----<>----
|
||
|
|
||
|
|
||
|
T.A.C.D Presents...
|
||
|
Hacking ID Machines
|
||
|
By PiLL
|
||
|
|
||
|
Table Of Contents
|
||
|
|
||
|
I. What is an ID Machine & who uses them?
|
||
|
II. Hardware and software of the ID machines
|
||
|
III. Common security of ID Machines
|
||
|
IV. What to do once you get in
|
||
|
V. Closing
|
||
|
VI. Greets
|
||
|
|
||
|
|
||
|
Part One: What is an ID machine and who uses them?
|
||
|
|
||
|
First we will start with the basics. An IDM or ID Machine is exactly
|
||
|
what the name entails. It is a computer that government and large
|
||
|
companies use to make security badges and ID cards for employees and
|
||
|
visitors. All of the IDM's are DOS based so security, to say the least,
|
||
|
sucks. There are four models of IDM's. The one we will be covering the
|
||
|
most is the latest and greatest: the ID 4000. Also in the family of
|
||
|
IDM's are the 3000, 2000+, and 2000. I have heard of an ID 1000 but I
|
||
|
have yet to see or play with one, so if you find one, tell me. The 2000
|
||
|
is DOS 3.3 so I can imagine that an ID 1000 is even a bigger waste of
|
||
|
time. IDM's are manufactured by a branch of Polaroid entitled Polaroid
|
||
|
Electronic Imaging. If you want more information on IDM's call (800)343-5000
|
||
|
and they will send you some general specs. I will let you know right
|
||
|
off the start that these machines sell for as much as $75,000.00 but the
|
||
|
average price is around $40,000.00. So getting caught crashing one is
|
||
|
NOT a good idea.
|
||
|
|
||
|
You are probably wondering what companies use ID machines. Here is a
|
||
|
brief list. All of the Colorado and Alaska DMV's, The IRS, The FBI, The
|
||
|
U.S. Mint, The Federal Reserve, almost any military branch, Hewlett
|
||
|
Packard, Polaroid, Westinghouse (I wouldn't recommend fucking with them:
|
||
|
for more information on Westinghouse check out the movie Unauthorized Access
|
||
|
available from CDC's home page), and all of the major prisons in the
|
||
|
United States. By now you should be getting ideas of the potential fun
|
||
|
you can have. Not that I would ever use what I know for anything illegal
|
||
|
;)
|
||
|
|
||
|
Part Two: Hardware and Software
|
||
|
|
||
|
I will cover each machine in order but you will probably notice that the
|
||
|
ID4000 will get by far more attention then any other.
|
||
|
|
||
|
Hardware and Software for the 2000+ and 2000 is kind of like teaching
|
||
|
someone about the Apple ][ and how to use Logo so I will try not to bore
|
||
|
you to much with them. The 2000 series are unique to the others because
|
||
|
they are one full unit. The hardware is basically a really cheesy
|
||
|
oversized case with a 9 monochrome monitor, a 3 monitor for viewing the
|
||
|
victim of the hideous picture it takes, a 286 Wyse computer with 1meg of
|
||
|
RAM (really hauls ass), a data compression board, image processing board
|
||
|
(*Paris* Board), a signature scanner, a color film recorder or CFR, a
|
||
|
WORM Drive, a modem, and most of the time a network card so the data can
|
||
|
be stored on a mainframe. The Software of the 2000 series is a really
|
||
|
neat database program running under DOS 3.3. If you have never heard of
|
||
|
or used EDLIN, I would not recommend playing with a 2000. The only major
|
||
|
differences between an ID2000 and an ID2000+ is that the computer on the
|
||
|
2000+ is a HP Vectra 386 with 4megs and a SCSI Interface. That's all you
|
||
|
really need to know you probably won't ever encounter one unless you go
|
||
|
trashing a lot.
|
||
|
|
||
|
The ID3000 is also an HP 386/20 but uses DOS 5.0 and a Matrox Digital
|
||
|
Processing board instead of the old Paris board of the 2000 series.
|
||
|
|
||
|
This came about when your state ID actually started to remotely resemble
|
||
|
you in 1992. Also in the 3000 years their were more peripherals
|
||
|
available such as the latest CFR at the time (I think it was the 5000),
|
||
|
PVC printers, and bar code label printers. The software is basically
|
||
|
DOS 5.0 but this time they use a database shell much like DOSSHELL as
|
||
|
the interface with the machine. The 3000 uses SYTOS for data storage and
|
||
|
transfer and it is best to dial in using a program called Carbon Copy.
|
||
|
|
||
|
The 4000 is the best even though it's not that great. It was is the
|
||
|
first IDM in the Polaroid line that let the customer customize the
|
||
|
machine to their needs. This is the machine that you see when you go to
|
||
|
the DMV, at least in Denver. It consists of a JVC camera, a Matrox
|
||
|
processing board, a data compression board, an Adaptec 1505 SCSI card, a
|
||
|
14.4 modem, a network card, and can have any of the following added to
|
||
|
it: a PVC printer (in case you didn't know that's what they use on
|
||
|
credit cards), a magnetic stripe encoder, a bar code printer, a thermal
|
||
|
printer, a CFR (usually the HR6000 like at the DMV), a Ci500 scanner,
|
||
|
and signature pad, a finger print pad (interesting note if you have a
|
||
|
black light and one of the new Colorado Driver licenses hold it under a
|
||
|
black light and look what appears under your picture, you should see
|
||
|
your finger print), and a laminator. Now some of you are thinking what
|
||
|
about the holograms? Those are actually in the lamination, not on the
|
||
|
badge itself. To obtain lamination walk into the DMV and look to the
|
||
|
right or left of the machine if you see a little brown box that's what
|
||
|
you need, but please remember to leave some for the rest of us that
|
||
|
might be next in line. Or you can go to Eagle hardware and buy a bolt
|
||
|
cutter for the dumpster but that's a different text file.
|
||
|
|
||
|
The 4000 runs DOS 6.0 and Windows 3.1. The actual software for the 4000
|
||
|
is a terrible Visual Basic shell that reminds me of the first time I ran
|
||
|
that program AoHell. The only difference is that AoHell did what it was
|
||
|
suppose to, the 4000 software is a headache of GPF's , Environment
|
||
|
Errors, and Vbrun errors. A nice feature that the 4000 has that the
|
||
|
other IDM's don't, is the ability to create and design your own badge.
|
||
|
You can even do it remotely ! ! =) . Unfortunately the program Polaroid
|
||
|
developed for this makes paintbrush look good. But on a bright note you
|
||
|
can import Images.
|
||
|
|
||
|
Briefly here is a run down of what exactly happens when you get your
|
||
|
picture taken on an ID4000 at the DMV. At the first desk or table the
|
||
|
narrow eyed, overpaid, government employee will ask you for some general
|
||
|
information like a birth certificate, picture ID, name, address, SSN#, what
|
||
|
party you prefer to vote for, and whether or not you want to donate your
|
||
|
organs in the event of your untimely demise. You reply by handing her
|
||
|
your fake birth certificate and ID that you had printed no more then an
|
||
|
hour ago, hoping the ink is dry. "My name is Lee Taxor I reside at
|
||
|
38.250.25.1 Root Ave in the Beautiful Port apartments #23 located in
|
||
|
Telnet, Colorado, I prefer to vote for Mickey Mouse of the Disney party,
|
||
|
and can't donate my organs because Satan already owns them." The
|
||
|
disgruntled employee then enters all your information in the correct fields
|
||
|
while never taking an eye off you in fear that you know more about the
|
||
|
machine he or she is using then they do (perhaps you shouldn't of worn
|
||
|
your Coed Naked Hacking T-shirt that you bought at DefCon 4). As soon as
|
||
|
the bureaucrat hits <ENTER> all of the information is sent to a database
|
||
|
located in the directory named after the computer (i.e.
|
||
|
c:\ID4000\ColoDMV\96DMV.MDB). Then you are directed to the blue screen
|
||
|
where you stare at the JVC monitor trying to look cool even though the
|
||
|
camera always seems to catch you when you have to blink or yawn or even
|
||
|
sneeze. *SNAP* the picture is taken and displayed on the monitor where
|
||
|
the employee can laugh at your dumb expression before printing it. If
|
||
|
the employee decides to print the picture it is saved as a 9 digit
|
||
|
number associated with your database record. The 4000 then compresses
|
||
|
the picture and saves it. So the next time you go in and the pull up
|
||
|
your record it will automatically find the associated picture and
|
||
|
display it on the screen. But in the mean time you grab your fake ID the
|
||
|
DMV just made for you and leave happy.
|
||
|
|
||
|
In a nut shell that's all there is to these machines.
|
||
|
|
||
|
Part Three: Security
|
||
|
|
||
|
I think a better topic is lack of security. I have yet to see any of
|
||
|
these machines that are remotely secure. Before we go any further the
|
||
|
4000 is best accessed using CloseUp the others using Carbon Copy, But
|
||
|
any mainstream communications program will more then likely work. You
|
||
|
Dial and it asks you right away for a username and password. whoa, stop,
|
||
|
road block right their. Unless of course you know the backdoor that
|
||
|
Polaroid put in their machines so they can service them. =)
|
||
|
|
||
|
ID4000
|
||
|
Login: CSD (case Sensitive)
|
||
|
Password: POLAROID (who would of guessed?)
|
||
|
|
||
|
ID3000
|
||
|
Login: CPS
|
||
|
Password: POLAROID (god these guys are so efficient)
|
||
|
|
||
|
ID2000+ And ID2000
|
||
|
Login: POLAROID (ahh the good old days)
|
||
|
Password: POLAROID
|
||
|
|
||
|
Now if these do not work because they have been edited out, there are
|
||
|
still a few VERY simple ways of getting in to your victims system. The
|
||
|
first is to go with every hackers default method of social engineering.
|
||
|
The best way to do this is to call them up and say "Hi this is (insert
|
||
|
tech name here) with Polaroid Electronic Imaging! How is it going down
|
||
|
there at (name of company)." The say "pretty good!" in a funny voice
|
||
|
thinking what great customer support. You say "How is the weather been
|
||
|
in (location of company)" they reply with the current weather status
|
||
|
feeling that they can trust you cause you are so friendly. You say "well
|
||
|
(name of person), we were going through our contacts one by one doing
|
||
|
routine upgrades and system cleaning to ensure that your database is not
|
||
|
going to get corrupted anytime soon and that everything is doing what it
|
||
|
is supposed too, if you know what I mean (name of person)." Now they
|
||
|
reply "oh yeah" and laugh with you not having a clue of what you are
|
||
|
talking about. And they then say "well everything seems to be in order."
|
||
|
You say "great sounds good but old *Bob* would have my head if I didn't
|
||
|
check that out for myself." Then you ask if the modem is plugged in and
|
||
|
wait for the reply. The either say yes or no then you ask them go plug
|
||
|
it & give you the number or just give you the number. Then they comply
|
||
|
cause they are just sheep in your plan. You say "Hey thanks (name) one
|
||
|
more thing would happen to know if user CSD:Polaroid exists or did you
|
||
|
guys delete it." If they deleted it ask them to put it back in, giving
|
||
|
you administrative access. They probably know how to and will comply. If
|
||
|
they need help have them do the following: Click on the combination lock
|
||
|
icon at the top of the screen. This will bring them to the
|
||
|
administrative screen and they will have the choices of Purge, Reports,
|
||
|
and Passwords. Have them click on passwords. Then have them enter you as
|
||
|
a new user with CSD as your Name and Polaroid as your Password. After
|
||
|
they have done that make sure they give you all the Keys. The keys are
|
||
|
basically access levels like on a BBS. Lets some users do certain things
|
||
|
while others can not. The only key you need is administrative but have
|
||
|
them give you the rest as well. The other keys are Management and Luser
|
||
|
I think. The keys are located to the left of the user information that they
|
||
|
just entered. Then have them click OK and close the call politely. Ta
|
||
|
da!! Here is a list of Polaroid phone techs but I would not advise using
|
||
|
Bob or Aryia cause their big wigs and nobody ever talks to them.
|
||
|
|
||
|
Senior Techs of Polaroid
|
||
|
Regular Techs
|
||
|
Bob Pentze (manager)
|
||
|
|
||
|
Don Bacher
|
||
|
Aryia Bagapour (assistant)
|
||
|
Richard
|
||
|
Felix Sue
|
||
|
|
||
|
Rick Ward
|
||
|
Jordan Freeman
|
||
|
|
||
|
Dave Webster
|
||
|
|
||
|
Call 1-800-343-5000 for more Names =)
|
||
|
|
||
|
|
||
|
|
||
|
Part Four: What to Do once you get in
|
||
|
|
||
|
Now that your in you have access to all of their database records and
|
||
|
photos. Upload your own and have fun with it! Everything you do is
|
||
|
logged so here's what you'll want to do when you're done making yourself
|
||
|
an official FBI agent or an employee of the federal reserve. Go to all
|
||
|
of the available drives which could be a lot since they are on a network
|
||
|
and do a search from root for all of the LOG files i.e. C:\DIR /S *.LOG
|
||
|
Then delete the fuckers!!!! You can also do this by FDISK or formatting.
|
||
|
Just kidding! But if you want to do it the right way then go to the
|
||
|
admin screen and purge the error and system logs.
|
||
|
|
||
|
Basically if you want the form for government badges or the FBI agents
|
||
|
database this is the safest way to go. These computer do not have the
|
||
|
ability to trace but it does not mean the phone company doesn't! ANI
|
||
|
sucks a fat dick so remember to divert if you decide to do this. If you
|
||
|
don't know how to divert I recommend you read CoTNo or Phrack and learn
|
||
|
a little bit about phone systems and how they work.
|
||
|
|
||
|
Moving around in the software once your past the security is very simple
|
||
|
so I'm not going to get into it. If you can get around a BBS then you
|
||
|
don't need any further help. Just remember to delete or purge the logs.
|
||
|
|
||
|
Part Five: Closing
|
||
|
|
||
|
If your looking for some mild fun like uploading the DMV a new license
|
||
|
or revoking your friends this is the way to do it. However if you're
|
||
|
looking to make fake ID's I recommend you download the badge format and
|
||
|
purchase or obtain a copy of IDWare by Polaroid. IDware is a lot like
|
||
|
the 4000 software except you only need a scanner not the whole system.
|
||
|
As a warning to some of the kids I know of one guy who bought a
|
||
|
$50,000.00 ID4000 and paid it off in a year by selling fake ID's. When
|
||
|
Polaroid busted him they prosecuted to the fullest and now the guy is
|
||
|
rotting in a cell for 25 to 50 years. Just a thought to ponder.
|
||
|
|
||
|
Peace
|
||
|
PiLL
|
||
|
|
||
|
Greetz
|
||
|
Shouts go out to the following groups and individuals: TACD, TNO, MOD,
|
||
|
L0pht, CDC, UPS, Shadow, Wraith, KaoTik, Wednesday, Zydirion, Voyager,
|
||
|
Jazmine, swolf, Mustard, Terminal, Major, Legion, Disorder, Genesis,
|
||
|
Paradox, Jesta, anybody else in 303, STAR, BoxingNuN, MrHades, OuTHouse,
|
||
|
Romen, Tewph, Bravo, Kingpin, and everyone I forgot cause I'm sure there
|
||
|
are a bunch of you, sorry =P.
|
||
|
|
||
|
----<>----
|
||
|
|
||
|
The Top Ten things overheard at PumpCon '96
|
||
|
|
||
|
10. "You gotta problem? Ya'll gotta rowl!"
|
||
|
- Keith the security guard
|
||
|
|
||
|
9. "My brain has a slow ping response"
|
||
|
- Kingpin
|
||
|
|
||
|
8. "Space Rogue, I've been coveting your pickle."
|
||
|
- espidre
|
||
|
|
||
|
7. "If there's space -n shit, then it's Star Trek. Unless there's that
|
||
|
little Yoda guy - then it's Star Wars"
|
||
|
- Kingpin
|
||
|
|
||
|
6. "I'm the editor of Phrack. Wanna lay down with me?"
|
||
|
- A very drunk unnamed editor of Phrack
|
||
|
|
||
|
5. "Let's go find that spic, b_, no offense"
|
||
|
- A drunk IP to b_.
|
||
|
|
||
|
4. "I'm lookin for that fat fucker Wozz. He's big, and got a green shirt,
|
||
|
and glasses, and curly hair, just like you. As a matta a fact, you
|
||
|
gots similar characteristics!"
|
||
|
- A drunk IP to wozz.
|
||
|
|
||
|
3. "He was passed out on the floor... so I pissed on him"
|
||
|
- An unknown assailant referring to IP
|
||
|
|
||
|
2. "It was the beginning and the end of my pimping career"
|
||
|
- Kingpin referring to his escapade of getting paid
|
||
|
two dollars for sex.
|
||
|
|
||
|
1. "French Toast Pleeeeze!"
|
||
|
- Everyone
|
||
|
|
||
|
|
||
|
----<>----
|
||
|
|
||
|
|
||
|
TOP 0x10 REASONS TO KICK && WAYS TO GET
|
||
|
KICKED OUT OF #HACK (Revision 0.1.1)
|
||
|
By SirLance
|
||
|
|
||
|
0x0f asking for any information about any Microsoft products
|
||
|
0x0e talking about cars, girls, or anything unrelated to hacking
|
||
|
0x0d flooding with a passwd file contents
|
||
|
0x0c asking how to unshadow passwd
|
||
|
0x0b being on #hack, #warez and #hotsex at the same time
|
||
|
0x0a asking for ops
|
||
|
0x09 using a nick including words like 'zero' 'cool' 'acid' or 'burn'
|
||
|
0x08 asking if someone wants to trade accounts, CCs or WaR3Z
|
||
|
0x07 asking what r00t means
|
||
|
0x06 asking when the latest Phrack will be released
|
||
|
0x05 asking where to get or how to create a BOT
|
||
|
0x04 having the word BOT anywhere in your nick
|
||
|
0x03 having a nick like Br0KnCaPs and SpEak LiK3 Th4t all the time
|
||
|
0x02 asking for flash.c or nuke.c, spoof.c, ipsniff.c or CrackerJack
|
||
|
0x01 thinking #hack is a helpdesk and ask a question
|
||
|
0x00 being on from AOL, Prodigy, CompuServe, or MSN
|
||
|
|
||
|
-EOL-
|
||
|
|
||
|
|
||
|
----<>----
|
||
|
|
||
|
International business
|
||
|
by HCF
|
||
|
|
||
|
|
||
|
Friday, 3:00am 4.12:
|
||
|
I get the call:
|
||
|
|
||
|
Julie: "You break into computers right...?"
|
||
|
Dover: "Yea, what kind..."
|
||
|
Julie: "Mac, I think."
|
||
|
Dover: "Hmm... Call ``HCF'' at 213.262-XXXX"
|
||
|
Julie: "Uh, will he be awake...?"
|
||
|
Dover: "Don't worry (snicker) he'll be awake."
|
||
|
|
||
|
Friday, 4:00am 4.12
|
||
|
HCF called me at 4am after he got the call from Julie:
|
||
|
|
||
|
HCF: "you got me into this mess, I need to barrow your car."
|
||
|
Dover: "Umm shure. Ok..."
|
||
|
HCF: "I'll be right over..."
|
||
|
|
||
|
Friday, 12:30pm 4.12: upon returning the car:
|
||
|
|
||
|
HCF: "Umm, got a parking ticket, I'll write you a check later..."
|
||
|
|
||
|
(I never got the check.)
|
||
|
|
||
|
Kathleen's comment to Julie which was passed to me (days later):
|
||
|
|
||
|
Kath: "Why didn't you tell me he was cute, I want him for myself!"
|
||
|
|
||
|
When I passed this on to HCF:
|
||
|
|
||
|
HCF: "She is *gorgeous* but not without a wet suit..."
|
||
|
|
||
|
|
||
|
|
||
|
Here is the story that happened early one Friday morning... The names
|
||
|
have been changed to protect the innocent, the guilty, and the innocent-looking
|
||
|
guilty....
|
||
|
|
||
|
I was reading up on a new firewall technology, the kind that locks
|
||
|
addresses out of select ports based on specific criterion, when the phone
|
||
|
rang.
|
||
|
|
||
|
"Hello?"
|
||
|
The voice of a women, between 18 and 30, somewhat deep like Kathleen
|
||
|
Turner's, said, "Uh, hello..."
|
||
|
|
||
|
There was an obvious pause. It seemed she was surprised that I was so
|
||
|
awake and answered sharply on the second ring. It was in the middle of my
|
||
|
working hours; 3:30 AM. There was no delay in the phone's response, no
|
||
|
subtle click after I picked up, and the audio quality was clear.
|
||
|
|
||
|
"Do you hack?" she asked.
|
||
|
|
||
|
Recorder on. Mental note: *stop* getting lazy with the recorder.
|
||
|
|
||
|
"No. Are you on a Cell phone?" I responded
|
||
|
"No."
|
||
|
"Are you using a portable battery operated telephone?"
|
||
|
"No. I was told by my friend ..."
|
||
|
"Are you in any way associated with local, federal or state law enforcement
|
||
|
agencies?"
|
||
|
"Oh, I get it. No I'm not. Julie said that you could help me."
|
||
|
|
||
|
I knew Julie through a mutual friend.
|
||
|
|
||
|
"Could you call me back in 5 minutes."
|
||
|
"Well, um, ok."
|
||
|
|
||
|
Throughout the whole conversation, the phones on her end were ringing off
|
||
|
the hook. As soon as I hung up, Ben, the mutual friend, called. Julie had
|
||
|
called him first, and he gave her my number. I got his reassurance that
|
||
|
this was legit. Ben was snickering but wouldn't divulge what it was about.
|
||
|
By now my curiosity was piqued.
|
||
|
|
||
|
The phone rang again, "I need someone who can break into a computer."
|
||
|
"Whose computer?"
|
||
|
"Mine."
|
||
|
|
||
|
It turns out that the woman had hostility bought out the previous owner of
|
||
|
this business. The computer in question had both a mission-critical
|
||
|
database of some sort and a multi-level security software installed. She
|
||
|
had been working under a medium permission user for some time. The
|
||
|
computer crashed in such a way as to require the master password (root) in
|
||
|
order to boot. The pervious owner moved out of town, could not be
|
||
|
contacted, and was most likely enjoying the situation thoroughly. The
|
||
|
woman was unaware of any of the technical specifications or configuration
|
||
|
of the machine. I was able to find out that it was a Apple Macintosh Color
|
||
|
Classic; a machine primarily distributed in Japan. It would be around
|
||
|
10:00 AM in Tokyo.
|
||
|
|
||
|
"Why are the phones ringing so often at this time of the morning?" I asked.
|
||
|
"I do a lot of international business."
|
||
|
|
||
|
I was intrigued, the answer was smoothly executed without a delay or pitch
|
||
|
change. I took the job.
|
||
|
|
||
|
Upon arriving, I was greeted by a young, stunningly beautiful, woman with
|
||
|
long, jet-black hair and stressed but clear green eyes. I checked the room
|
||
|
for obvious bugs and any other surveillance. There were calendars on the
|
||
|
wall, filled out with trixy and ultra-masculine sounding names like Candy
|
||
|
and Chuck. The phones had died down some. The machine in question was
|
||
|
obviously well integrated into the environment; dust patterns, scratch
|
||
|
marks, worn-out mouse pad; it had been there for some time. There was a
|
||
|
PBX, around 6 to 8 voice lines, three phones, and no network, modem or
|
||
|
outside connectivity.
|
||
|
|
||
|
The security, which we'll call VileGuard, defeated all the "simple" methods
|
||
|
of by-passing. None of the standard or available passwords, in any case or
|
||
|
combination, worked. A brute-force script would be slow as second failure
|
||
|
shut the machine down.
|
||
|
|
||
|
I made a SCSI sector copy onto a spare drive and replaced it with the
|
||
|
original. This involved tearing open the machine, pulling various parts
|
||
|
out, hooking up loose wires, merging several computers, and turning things
|
||
|
on in this state. Trivial and routine, I did it rapidly and with both
|
||
|
hands operating independently. For those who have never opened the case of
|
||
|
an all-in-one Mac, it involves a rather violent looking smack on both sides
|
||
|
of the pressure fitted case backing, appropriately called "cracking the
|
||
|
case." This did not serve well to calm the nerves of the client. After a
|
||
|
few moments of pallor and little chirps of horror, she excused herself from
|
||
|
the room.
|
||
|
|
||
|
While the SCSI copy preceded, I overheard her taking a few calls in the
|
||
|
other room. What I heard was a one-sided conversation, but I could pretty
|
||
|
much fill in the blanks,
|
||
|
|
||
|
"Hello, Exclusive Escorts, may I help you?"
|
||
|
"Would you like to be visited at your home or at a hotel?"
|
||
|
"Well, we have Suzy, she's a 5'4" Asian lady with a very athletic body.
|
||
|
Very shy but willing, and very sensual, she measures 34, 24, 34."
|
||
|
"Big what? Sir, you'll have to speak a little clearer."
|
||
|
"Oh, I see, well we have a very well endowed girl named Valerie, she's a
|
||
|
double D and measures 38, 24, 34. Would that be more to your liking?"
|
||
|
|
||
|
It was not easy to keep from busting up laughing.
|
||
|
|
||
|
"He wants you to do what? Well, charge him double."
|
||
|
|
||
|
With the new drive installed, and to predictable results, I fired up a hex
|
||
|
editor. My experience has been that full-disk encryption typically slows
|
||
|
the machine down to the point where the user disables it. At around
|
||
|
$5C9E8, I found, "...507269 6E74204D 616E6167 65722045 72726F72...
|
||
|
...Print Manager Error..." in plain text. I searched for some of the
|
||
|
known, lower permission, passwords. I found a few scattered around sector
|
||
|
$9b4. The hex editor I was using could not access the boot or driver
|
||
|
partitions, so I switched to one that could. It's not as pretty of an
|
||
|
interface as the last editor, and is rather old. Its saving grace though
|
||
|
is that it doesn't recognize the modern warnings of what it can and cannot
|
||
|
see. There it was, VileGuard; driver level security.
|
||
|
|
||
|
"Eric is endowed with eight and has a very masculine physique."
|
||
|
|
||
|
Every male was "endowed with eight," every female had relatively identical
|
||
|
measurements.
|
||
|
|
||
|
I hunted fruitlessly around the low sectors for what might be the master
|
||
|
password. All awhile wishing the find function of the editor would accept
|
||
|
regexp. All the other passwords were intercapped on the odd character, but
|
||
|
that was a convention of the current owner, and not necessarily used by the
|
||
|
past owner.
|
||
|
|
||
|
"Oh, you want a girl that is fluent in Greek?"
|
||
|
|
||
|
It's not professional for me, and not good salesmanship for her, to have me
|
||
|
overheard laughing myself into anoxia. After trying to straighten up and
|
||
|
gather my wits together again, I began to consider an alternate
|
||
|
possibility. If I don't know the password, what happens if I make it so
|
||
|
that the driver doesn't either. Return to the first-installed condition
|
||
|
perhaps? It was a thought. It turned out to be a bad thought, resulting in
|
||
|
my haphazardly writing "xxxx" over, pretty much, random sectors of the
|
||
|
driver partition.
|
||
|
|
||
|
"Oh yes sir, Roxanne prefers older men. She appreciates how very
|
||
|
experienced they are. I understand sir, and I'm sure she can help you with
|
||
|
that."
|
||
|
|
||
|
Before I made a second copy and whipped out the RE tools, TMON and MacNosy,
|
||
|
I tried booting. The results were, as you'd expect, that the disk didn't
|
||
|
mount. Instead, it asked me if I wanted to reinitialize the disk. Pause.
|
||
|
Think... ya, why not. This was most definitely farther than I had gotten
|
||
|
with the secure driver installed and functional. I canceled and fired up
|
||
|
one of many disk formatters I had on hand. Though the formatter wasn't the
|
||
|
slickest, it had proven itself repeatedly in the past. Its main quality
|
||
|
was that of writing a driver onto a disk that is in just about *any*
|
||
|
condition. It's made by a French drive manufacturer. As dangerous as this
|
||
|
behavior is, I'm sure it's a planned feature. It could see the drive and
|
||
|
allowed me to "update" the driver. A few seconds later, a normal
|
||
|
"finished" dialog.
|
||
|
|
||
|
"Yes, Stan carries a set of various toys with him. No, I don't believe he
|
||
|
normally carries that, but I'm sure if you ask him nicely, he'll drop by
|
||
|
the hardware store on his way and pick one up."
|
||
|
|
||
|
I rebooted. It worked. I copied over the disk's data and reformatted.
|
||
|
Time to try it on the original drive (I had, of course, been working on my
|
||
|
copy.) Upon startup, before anything could be accessed, "Please input the
|
||
|
master password..."
|
||
|
|
||
|
Puts an unusual twist on the phrase, "adverse working conditions"
|
||
|
|
||
|
- HCF
|
||
|
|
||
|
Note 1: Payment was in currency.
|
||
|
Note 2: If you ever think you understand the opposite sex's view on sex,
|
||
|
you're underestimating.
|
||
|
|
||
|
|
||
|
----<>----
|
||
|
|
||
|
|
||
|
The Beginners Guide to RF hacking
|
||
|
|
||
|
by Ph0n-E of BLA & DOC
|
||
|
|
||
|
|
||
|
Airphones suck. I'm on yet another long plane ride to some
|
||
|
wacky event. I've tried dialing into my favorite isp using this lame GTE
|
||
|
airphone, $15 per call no matter how long you "talk". In big letters it
|
||
|
says 14.4k data rate, only after several attempts I see the very fine
|
||
|
print, 2400 baud throughput. What kind of crap is that? A 14.4 modem that
|
||
|
can only do 2400? It might be the fact they use antiquated 900MHz AM
|
||
|
transmissions. The ATT skyphones that are now appearing use imarsat
|
||
|
technology, but those are $10/minute. Anyway they suck, and I have an
|
||
|
hour or so before they start showing Mission Impossible so I guess I'll
|
||
|
write this Phrack article Route has been bugging me about.
|
||
|
|
||
|
There are a bunch of people who I've helped get into radio stuff, five
|
||
|
people bought handheld radios @ DefCon... So I'm going to run down some
|
||
|
basics to help everyone get started. As a disclaimer, I knew nothing about
|
||
|
RF and radios two years ago. My background is filmmaking, RF stuff is just
|
||
|
for phun.
|
||
|
|
||
|
So why the hell would you want to screw around with radio gear? Isn't it
|
||
|
only for old geezers and wanna be rentacops? Didn't CB go out with Smokey
|
||
|
& the Bandit?
|
||
|
|
||
|
Some cool things you can do:
|
||
|
|
||
|
Fast-food drive thrus can be very entertaining, usually the order taker
|
||
|
is on one frequency and the drivethru speaker is on another. So you can
|
||
|
park down the block and tell that fat pig that she exceeds the weight
|
||
|
limit and McDonalds no longer serves to Fatchix. Or when granny pulls up
|
||
|
to order those tasty mcnuggets, blast over her and tell the nice MCD slave
|
||
|
you want 30 happy meals for your trip to the orphanage. If you're lucky
|
||
|
enough to have two fast food palaces close to each other you can link them
|
||
|
together and sit back and enjoy the confusion.
|
||
|
|
||
|
You've always wanted a HERF gun, well your radio doubles as a small
|
||
|
scale version. RF energy does strange and unpredictable things to
|
||
|
electronic gear, especially computers. The guy in front of me on the plane
|
||
|
was playing some lame game on his windowz laptop which was making some very
|
||
|
annoying cutey noises. He refused to wear headphones, he said "they mushed
|
||
|
his hair...". Somehow my radio accidentally keyed up directly under his
|
||
|
seat, there was this agonizing cutey death noise and then all kinds of cool
|
||
|
graphics appeared on his screen, major crash. He's still trying to get it
|
||
|
to reboot.
|
||
|
|
||
|
Of course there are the ever popular cordless phones. The new ones work
|
||
|
on 900MHz, but 90% of the phones out there work in the 49MHz band. You can
|
||
|
easily modify the right ham radio or just use a commercial low band radio
|
||
|
to annoy everyone. Scanning phone calls is OK, but now you can talk back,
|
||
|
add sound effects, etc... That hot babe down the street is talking to
|
||
|
her big goony boyfriend, it seems only fair that you should let her know
|
||
|
about his gay boyfriend. Endless hours of torture.
|
||
|
|
||
|
You can also just rap with your other hacker pals (especially useful
|
||
|
cons). Packet radio, which allows you up to 9600 baud wireless net
|
||
|
connections, its really endless in its utility.
|
||
|
|
||
|
How to get started:
|
||
|
|
||
|
Well you're supposed to get this thing called a HAM license. You take
|
||
|
this test given by some grampa, and then you get your very own call sign.
|
||
|
If you're up to that, go for it. One thing though, use a P.O. box for your
|
||
|
address as the feds think of HAMs as wackos, and are first on the list when
|
||
|
searching for terrorists. Keep in mind that most fun radio things are
|
||
|
blatantly illegal anyway, but you're use to that sort of thing, right?
|
||
|
|
||
|
If you are familiar with scanners, newer ones can receive over a very
|
||
|
large range of frequencies, some range from 0 to 2.6 GHz. You are not going
|
||
|
to be able to buy a radio that will transmit over that entire spectrum. There
|
||
|
are military radios that are designed to sweep large frequencies ranges for
|
||
|
jamming, bomb detonation, etc. - but you won't find one at your local radio
|
||
|
shack.
|
||
|
|
||
|
A very primitive look at how the spectrum is broken down into sections:
|
||
|
|
||
|
0 - 30MHz (HF) Mostly HAM stuff, short-wave, CB.
|
||
|
30 - 80MHz (lowband) Police, business, cordless phones, HAM
|
||
|
80 - 108MHz (FM radio) You know, like tunes and stuff
|
||
|
110 - 122MHz (Aircraft band) You are clear for landing on runway 2600
|
||
|
136 - 174MHz (VHF) HAM, business, police
|
||
|
200 - 230MHz Marine, HAM
|
||
|
410 - 470MHz (UHF), HAM, business
|
||
|
470 - 512MHz T-band, business, police
|
||
|
800MHz cell, trunking, business
|
||
|
900MHz trunking, spread spectrum devices, pagers
|
||
|
1GHZ+ (microwave) satellite, TV trucks, datalinks
|
||
|
|
||
|
Something to remember, the lower the frequency the farther the radio waves
|
||
|
travel, and the higher the frequency the more directional the waves are.
|
||
|
|
||
|
A good place to start is with a dual band handheld. Acquire a Yaesu
|
||
|
FT-50. This radio is pretty amazing, its very small, black and looks cool.
|
||
|
More importantly it can easily be moded. You see this is a HAM radio, it's
|
||
|
designed to transmit on HAM bands, but by removing a resistor and solder
|
||
|
joint, and then doing a little keypad trick you have a radio that transmits
|
||
|
all over the VHF/UHF bands. It can transmit approximately 120-232MHz and
|
||
|
315-509MHz (varies from radio to radio), and will receive from 76MHz to about
|
||
|
1GHz (thats 1000MHz lamer!), and yes that *includes* cell phones. You also
|
||
|
want to get the FTT-12 keypad which adds PL capabilities and other cool stuff
|
||
|
including audio sampling. So you get a killer radio, scanner, and red box all
|
||
|
in one! Yaesu recently got some heat for this radio so they changed the eprom
|
||
|
on newer radios, but they can modified as well, so no worries.
|
||
|
|
||
|
Now for some radio basics. There are several different modulation schemes,
|
||
|
SSB - Single Side Band, AM - Amplitude Modulation, FM - Frequency Modulation,
|
||
|
etc. The most common type above HF communications is NFM, or Narrow band
|
||
|
Frequency Modulation.
|
||
|
|
||
|
There are three basic ways communication works:
|
||
|
|
||
|
Simplex - The Transmit and Receive frequencies are the same, used for short
|
||
|
distance communications.
|
||
|
|
||
|
Repeater - The Transmit and Receive frequencies are offset, or even on
|
||
|
different bands.
|
||
|
|
||
|
Trunking - A bunch of different companies or groups within a company share
|
||
|
multiple repeaters. If you're listening to a frequency with a scanner and
|
||
|
one time its your local Police and the next it's your garbage man, the fire
|
||
|
dept... - that's trunking. Similar to cell phones you get bits and pieces
|
||
|
of conversations as calls are handed off among repeater sites.
|
||
|
|
||
|
Their radios are programmed for specific "talk groups", so the police only
|
||
|
hear police, and not bruno calling into base about some weasel kid he found
|
||
|
rummaging through his dumpsters. There are three manufacturers - Motorola,
|
||
|
Ericsson (GE), and EF Johnson. EFJ uses LTR which sends sub-audible codes
|
||
|
along with each transmission, the other systems use a dedicated control
|
||
|
channel system similar to cell phones. Hacking trunk systems is an entire
|
||
|
article in itself, but as should be obvious, take out the control channel
|
||
|
and the entire system crashes (in most cases).
|
||
|
|
||
|
OK so you got your new radio you tune around and your find some security
|
||
|
goons at the movie theater down the street. They are total losers so you
|
||
|
start busting on them. You can hear them, but why they can't hear you?
|
||
|
The answer-- SubAudible Tones. These are tones that are constantly
|
||
|
transmitted with your voice transmission - supposedly subaudible, but if
|
||
|
you listen closely you can hear them. With out the tone you don't break
|
||
|
their squelch (they don't hear you.) These tones are used keep nearby
|
||
|
users from interfering with each other and to keep bozos like you from
|
||
|
messing with them. There are two types, CTCSS Continuos Tone-Codes Squelch
|
||
|
system (otherwise known as PL or Privacy Line by Motorola) or DCS Digital
|
||
|
Coded Squelch (DPL - Digital Privacy Line). If you listened to me and got
|
||
|
that FT-50 you will be styling because its the only modable dual band that
|
||
|
does both. So now you need to find their code, first try PL because its
|
||
|
more common. There is a mode in which the radio will scan for tones for
|
||
|
you, but its slow and a pain. The easiest thing to do is turn on Tone
|
||
|
Squelch, you will see the busy light on your radio turn on when they are
|
||
|
talking but you wont hear them. Go into the PL tone select mode and tune
|
||
|
through the different tones while the busy light remains on, as soon as you
|
||
|
hear them again you have the right tone, set it and bust away! If you
|
||
|
don't find a PL that works move on to DPL. There is one other squelch
|
||
|
setting which uses DTMF tone bursts to open the squelch, but its rarely
|
||
|
used, and when it is used its mostly for paging and individuals.
|
||
|
|
||
|
Now you find yourself at Defcon, you hear DT is being harassed by
|
||
|
security for taking out some slot machines with a HERF gun, so you figure
|
||
|
it's your hacker responsibility to fight back. You manage to find a
|
||
|
security freq, you get their PL, but their signal is very weak, and only
|
||
|
some of them can hear your vicious jokes about their moms. What's up? They
|
||
|
are using a repeater. A handheld radio only puts out so much power,
|
||
|
usually the max is about 5 watts. That's pretty much all you want radiating
|
||
|
that close to your skull (think brain tumor). So a repeater is radio that
|
||
|
receives the transmissions from the handhelds on freq A and then
|
||
|
retransmits it with a ton more watts on freq B. So you need to program
|
||
|
your radio to receive on one channel and transmit on another. Usually
|
||
|
repeaters follow a standard rule of 5.0MHz on UHF and .6MHz on VHF, and
|
||
|
they can either be positive or negative offsets. Most radios have a
|
||
|
auto-repeater mode which will automatically do the offset for you or you
|
||
|
need to place the TX and RX freqs in the two different VCOs. Government
|
||
|
organizations and people who are likely targets for hacks (Shadow Traffic
|
||
|
news copter live feeds) use nonstandard offsets so you will just need to
|
||
|
tune around.
|
||
|
|
||
|
Some ham radios have an interesting feature called crossband repeat.
|
||
|
You're hanging out at Taco Bell munching your Nachos Supreme listening to the
|
||
|
drive thru freq on your radio. You notice the Jack in the Box across the
|
||
|
street, tuning around you discover that TacoHell is on VHF (say 156.40) and
|
||
|
Jack in the Crack is on UHF (say 464.40). You program the two freqs into
|
||
|
your radio and put it in xband repeat mode. Now when someone places their
|
||
|
order at Taco they hear it at Jacks, and when they place their order at
|
||
|
Jacks they hear it at Taco. When the radio receives something on 156.40 it
|
||
|
retransmits it on 464.40, and when it receives something on 464.40 it
|
||
|
retransmits it on 156.40.
|
||
|
|
||
|
"...I want Nachos, gimme Nachos..."
|
||
|
"...Sorry we don't have Nachos at Jack's..."
|
||
|
"...Huh? Im at Taco Bell..."
|
||
|
Get it? Unfortunately the FT-50 does not do xband repeat, that's the only
|
||
|
feature it's lacking.
|
||
|
|
||
|
Damn it, all this RF hacking is fun, but how do I make free phone calls?
|
||
|
Well you can, sort of. Many commercial and amateur repeaters have a
|
||
|
feature called an autopatch or phonepatch. This is a box that connects the
|
||
|
radio system to a phone line so that you can place and receive calls. Keep
|
||
|
in mind that calls are heard by everyone who has their radio on! The
|
||
|
autopatch feature is usually protected by a DTMF code. Monitor the input
|
||
|
freq of the repeater when someone places a call you will hear their dtmf
|
||
|
digits - if you're super elite you can tell what they are by just hearing
|
||
|
them, but us normal people who have lives put the FT-50 in DTMF decode mode
|
||
|
and snag the codez... If your radio doesn't do DTMF decode, record the audio
|
||
|
and decode it later with your soundblaster warez. Most of the time they
|
||
|
will block long-distance calls, and 911 calls. Usually there is a way
|
||
|
around that, but this is not a phreaking article. Often the repeaters are
|
||
|
remote configurable, the operator can change various functions in the field
|
||
|
by using a DTMF code. Again, scan for that code and you too can take
|
||
|
control of the repeater. What you can do varies greatly from machine to
|
||
|
machine, sometimes you can turn on long-distance calls, program speed-dials,
|
||
|
even change the freq of the repeater.
|
||
|
|
||
|
What about cordless phones, can't I just dial out on someone's line?
|
||
|
Sort of. You use to be able to take a Sony cordless phone which did
|
||
|
autoscanning (looked for an available channel) drive down the block with
|
||
|
the phone on until it locked on to your neighbors cordless and you get a
|
||
|
dialtone. Now cordless phones have a subaudible security tone just like PL
|
||
|
tones on radios so it doesn't work anymore. There are a bunch of tones and
|
||
|
they vary by phone manufacturer, so it's easier to make your free calls other
|
||
|
ways.
|
||
|
|
||
|
But as I mentioned before you can screw with people, not with your FT-50
|
||
|
though. Cordless phones fall very close to the 6 meter (50MHz) HAM band and
|
||
|
the lowband commercial radio frequencies. There are 25 channels with the
|
||
|
base transmitting 43-47MHz and the handset from 48-50MHz. What you want to
|
||
|
do is program a radio to receive on the base freqs and transmit on the
|
||
|
handset freqs. The phones put out a few milliwatts of power (very little).
|
||
|
On this freq you need a fairly big antenna, handhelds just don't cut it -
|
||
|
think magmount and mobile. There are HAM radios like the Kenwood TM-742A
|
||
|
which can be modified for the cordless band, however I have not found a
|
||
|
radio which works really well receiving the very low power signals the
|
||
|
phones are putting out. So, I say go commercial! The Motorola
|
||
|
Radius/Maxtrac line is a good choice. They have 32 channels and put out
|
||
|
a cool 65watts so your audio comes blasting out of their phones. Now
|
||
|
the sucko part, commercial radios are not designed to be field
|
||
|
programmable. There are numerous reasons for this, mainly they just want
|
||
|
Joe rentalcop to know he is on "Channel A" , not 464.500. Some radios are
|
||
|
programmed vie eproms, but modern Motorola radios are programmed via a
|
||
|
computer. You can become pals with some guy at your local radio shop and
|
||
|
have him program it for you. If you want to do it yourself you will need
|
||
|
a RIB (Radio Interface Box) with the appropriate cable for the radio, and
|
||
|
some software. Cloned RIB boxes are sold all the time in rec.radio.swap
|
||
|
and at HAM swap meets. The software is a little more difficult, Motorola
|
||
|
is very active in going after people who sell or distribute thier software
|
||
|
(eh, M0t?) They want you to lease it from them for a few zillion dollars.
|
||
|
Be cautious, but you can sometimes find mot warez on web sites, or at HAM
|
||
|
shows. The RIB is the same for most radios, just different software, you
|
||
|
want Radius or MaxTrac LabTools. It has built in help, so you should be
|
||
|
able to figure it out. Ok so you got your lowband radio, snag a 6 meter
|
||
|
mag mount antenna, preferably with gain, and start driving around. Put
|
||
|
the radio in scan mode and you will find and endless amount of phone calls
|
||
|
to break into. Get a DTMF mic for extra fun, as your scanning around listen
|
||
|
for people just picking up the phone to make a call. You'll hear dialtone,
|
||
|
if you start dialing first since you have infinitely more power than the
|
||
|
cordless handset you will overpower them and your call will go through.
|
||
|
It's great listening to them explain to the 411 operator that their phone is
|
||
|
possessed by demons who keep dialing 411. Another trick is to monitor the
|
||
|
base frequency and listen for a weird digital ringing sound - these are tones
|
||
|
that make the handset ring. Sample these with a laptop or a yakbak or
|
||
|
whatever and play them back on the BASE frequency (note, not the normal
|
||
|
handset freq) and you will make their phones ring. Usually the sample won't
|
||
|
be perfect so it will ring all wacko. Keep in mind this tone varies from
|
||
|
phone to phone, so what works on one phone wont work on another.
|
||
|
|
||
|
Besides just scanning around how do you find freqs? OptoElectronics
|
||
|
makes cool gizmos called near-field monitors. They sample the RF noise
|
||
|
floor and when they see spikes above that they lock on to them. So you
|
||
|
stick the Scout in your pocket, when someone transmits near you, the scout
|
||
|
reads out their frequency. The Explorer is thier more advanced model which
|
||
|
will also demodulates the audio and decode PL/DPL/DTMF tones. There are
|
||
|
also several companies that offer CDs of the FCC database. You can search
|
||
|
by freq, company name, location, etc. Pretty handy if your looking for a
|
||
|
particular freq. Percon has cool CDs that will also do mapping. Before
|
||
|
you buy anything check the scanware web site, they are now giving away
|
||
|
their freq databases for major areas.
|
||
|
|
||
|
OK radioboy, you're hacking repeaters, you're causing all the cordless
|
||
|
phones in your neighborhood to ring at midnight, and no one can place
|
||
|
orders at your local drivethrus. Until one day, when the FCC and FBI
|
||
|
bust down your door. How do you avoid that?? OK, first of all don't
|
||
|
hack from home. Inspired people can eventually track you down. How?
|
||
|
Direction Finding and RF Fingerprinting. DF gear is basically a
|
||
|
wideband antenna and a specialized receiver gizmo to measure signal
|
||
|
strength and direction. More advanced units connect into GPS units for
|
||
|
precise positioning and into laptops for plotting locations and advance
|
||
|
analysis functions such as multipath negations (canceling out reflected
|
||
|
signals.) RF finger printing is the idea that each individual radio has
|
||
|
specific characteristics based on subtle defects in the manufacture of the
|
||
|
VCO and AMP sections in the radio. You sample a waveform of the radio and
|
||
|
now theoretically you can tell it apart from other radios. Doesn't really
|
||
|
work though-- too many variables. Temperature, battery voltage, age,
|
||
|
weather conditions and many other factors all effect the waveform.
|
||
|
Theoretically you could have a computer scanning around looking for a
|
||
|
particular radio, it might work on some days. Be aware that fingerprinting
|
||
|
is out there, but I wouldn't worry about it *too* much. On the other hand
|
||
|
DF gear in knowledgeable hands does work. Piss off the right bunch of HAMS
|
||
|
and they will be more than happy to hop in their Winnebego and drive all
|
||
|
over town looking for you. If you don't stay in the same spot or if you're
|
||
|
in an area with a bunch of metal surfaces (reflections) it can be very very
|
||
|
hard to find you. Hack wisely, although the FCC has had major cutbacks
|
||
|
there are certain instances in which they will take immediate action. They
|
||
|
are not going to come after you for encouraging Burger King patrons to become
|
||
|
vegetarians, but if you decide to become an air-traffic controller for a day
|
||
|
expect every federal agency you know of (and some you don't) to come looking
|
||
|
for your ass.
|
||
|
|
||
|
My plane is landing so thats all for now, next time - advanced RF hacking,
|
||
|
mobile data terminals, van eck, encryption, etc.
|
||
|
|
||
|
|
||
|
EOF
|
||
|
|
||
|
|
||
|
----<>----
|
||
|
|
||
|
|
||
|
10.16.96
|
||
|
|
||
|
Log from RAgent
|
||
|
|
||
|
GrimReper: I work For Phrack
|
||
|
GrimReper: Yeah
|
||
|
GrimReper: I gotta submit unix text things like every month
|
||
|
GrimReper: I've been in Phrack for a long time
|
||
|
GrimReper: Phrack is in MASS
|
||
|
-> *grimreper* so how much does Phrack pay you?
|
||
|
*GrimReper** How much?
|
||
|
*GrimReper** Hmm......
|
||
|
*GrimReper** About $142
|
||
|
-> *grimreper* really
|
||
|
-> *grimreper* who paid you?
|
||
|
*GrimReper** w0rd
|
||
|
*GrimReper** CardShoot
|
||
|
*GrimReper** Cardsh00t
|
||
|
-> *grimreper* hmm, I don't see any "cardsh00t" in the credits for phrack
|
||
|
+48
|
||
|
*GrimReper** There is
|
||
|
-> *grimreper* you might as well stop lying before I bring in daemon9,
|
||
|
+he's another friend of mine
|
||
|
-> *grimreper* he's one of the editors of phrack
|
||
|
*GrimReper** Get the latest Phrack?
|
||
|
*GrimReper** Its gonna have my NN
|
||
|
*GrimReper** watch
|
||
|
-> *grimreper* not anymore
|
||
|
*GrimReper** Go Ahead
|
||
|
-> *grimreper* actually
|
||
|
*GrimReper** so?
|
||
|
-> *grimreper* you will be mentioned
|
||
|
-> *grimreper* you'll be known as the lying fuckhead you are, when this
|
||
|
+log goes in the next issue
|
||
|
|
||
|
|
||
|
----<>----
|
||
|
10.24.96
|
||
|
|
||
|
Log from Aleph1
|
||
|
|
||
|
*** ggom is ~user01@pm1-6.tab.com (ggom)
|
||
|
*** on irc via server piglet.cc.utexas.edu ([128.83.42.61] We are now all
|
||
|
piglet)
|
||
|
*ggom* i am assembling a "tool shed". A "shed" for certain "expert" activity.
|
||
|
Can you help?
|
||
|
-> *ggom* maybe... go on
|
||
|
*ggom* i represent certain parties that are looking for corporate information.
|
||
|
this would fall under the "corporate espionage" umbrella
|
||
|
*ggom* this information could probably be obtained via phone phreak but access to
|
||
|
corporate servers would be a plus...can you help?
|
||
|
-> *ggom* a) how do I know you are not a cop/fed? b) why did you come to #hack
|
||
|
to ask for this? b) what type of data you after? c) what type of money are
|
||
|
you talking about?
|
||
|
*ggom* where else should i go to ask for this stuff????????
|
||
|
-> *ggom* you tell me. How do you know about #hack?
|
||
|
*ggom* looked it up on the irc server...figured this was a good place to
|
||
|
start........... i am talking about 4 to 5 figures here for the information
|
||
|
-> *ggom* you are also talking 4 to 5 years
|
||
|
-> *ggom* #hack is visited regularly by undercovers and the channel is logged
|
||
|
-> *ggom* talking openly about such thing is not smart
|
||
|
*ggom* whatever........... man, if you are GOOD, you are UNTRACEABLE. i
|
||
|
guess i am looking in the wrong place......
|
||
|
-> *ggom* you been watching way to many times "Hackers" and yes #hack is the
|
||
|
wrong place...
|
||
|
*ggom* we are on a private channel.........suggest a more private setting....
|
||
|
-> *ggom* sorry you started off on a bad foot. If you got a million to spare
|
||
|
for such information you would also have the resources to find the
|
||
|
appropiate person to do the job. So you either are full off it, are a fed,
|
||
|
or just plain dumb. This conversation ends here.
|
||
|
*ggom* later
|
||
|
*ggom* not talking a million.. talking 5 to 6 figures......... you are
|
||
|
right
|
||
|
*ggom* talk to me.......
|
||
|
*ggom* talk to me.......
|
||
|
|
||
|
|
||
|
----<>----
|