mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
423 lines
23 KiB
Text
423 lines
23 KiB
Text
==Phrack Inc.==
|
|
|
|
Volume Three, Issue Thirty-five, File 10 of 13
|
|
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
PWN PWN
|
|
PWN Phrack World News PWN
|
|
PWN PWN
|
|
PWN Issue XXXV / Part One PWN
|
|
PWN PWN
|
|
PWN Compiled by Dispater PWN
|
|
PWN PWN
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
|
|
Welcome to another edition of Phrack World News. Read this issue very
|
|
carefully because it is full of very important stories about a multitude of
|
|
different issues. Special thanks goes to Dark OverLord, Stainless Steel
|
|
Provider, and Private Citizen for their help in preparing this issue.
|
|
_______________________________________________________________________________
|
|
|
|
XMASCON 1991
|
|
~~~~~~~~~~~
|
|
NIA Magazine & Phrack Inc. present:
|
|
|
|
The Second Annual
|
|
|
|
X M A S C O N
|
|
|
|
|
|
Who: All Hackers, Journalists, Security Personnel, Federal Agents, Lawyers,
|
|
Authors and Other Interested Parties.
|
|
|
|
Where: Houston Airport Hilton Inn
|
|
500 North Belt East
|
|
Houston, Texas 77060
|
|
U.S.A.
|
|
Tel: (713) 931-0101
|
|
Fax: (713) 931-3523
|
|
|
|
When: Friday December 27 through Sunday December 29, 1991
|
|
|
|
|
|
Yes, ladies and gentlemen, you read it right... Xmascon has returned! This will
|
|
undoubtedly be the telecom event of the year. Unlike certain conferences in the
|
|
past, Xmascon 91 has a devoted and dedicated staff who are putting in an
|
|
unmentionable amount of time to ensure a large, vast and organized collection
|
|
of some of the most diversified people in the telecommunications world. The
|
|
event will be open to the public so that anyone may attend and learn more about
|
|
the different aspects of computer security.
|
|
|
|
|
|
Hotel Information
|
|
-----------------
|
|
|
|
The Houston Airport Hilton Inn is located about 6 miles from Intercontinental
|
|
Airport. The Xmascon group room rates are $49.00 plus tax (15%) per night, your
|
|
choice of either single or double. There are also 7 suites available, the
|
|
prices of which vary from $140 to $250. You can call the hotel to find out the
|
|
differences and availability of the suites, and you will also NEED to tell them
|
|
you are with the Xmascon Conference to receive the reduced room rate,
|
|
otherwise, you will be paying $69.00. There is no charge for children,
|
|
regardless of age, when they occupy the same room as their parents. Specially
|
|
designed rooms for the handicapped are available. The hotel provides free
|
|
transportation to and from the airport, as well as neighboring Greenspoint
|
|
Mall, every 30 minutes on the hour, and on call, if needed. There are 2
|
|
restaurants in the hotel. The Wicker Works is open until 11:00 pm, and The
|
|
Forty Love is open 24 Hours. There will also be breakfast, lunch and dinner
|
|
buffets each day. There is a piano bar, The Cycle Club, as well as a sports
|
|
bar, Chaps, which features numerous table games, large screen TV, and a disco
|
|
with a DJ. Within the hotel compound, there are 3 pools, 2 of which are
|
|
indoors, a jacuzzi, a miniature golf course, and a fully equipped health club
|
|
which features universal weights, a whirlpool and sauna. A car rental agency
|
|
is located in the hotel lobby, and you can arrange to pick your car up at
|
|
either the airport or the hotel. Xmascon attendees are entitled to a discounted
|
|
rate. Contact the hotel for more information.
|
|
|
|
Xmascon will last 3 days, with the main conference being held on Saturday,
|
|
December 28, in the Osage meeting room, starting at 12:00 p.m. and continuing
|
|
on throughout the evening. This year, we have our own complete wing of the
|
|
hotel, which is housed around a 3,000 square foot atrium ballroom. The wing
|
|
is completely separated from the rest of the hotel, so we are strongly
|
|
encouraging people to make their reservations as far in advance as possible
|
|
to ensure themselves a room within our area.
|
|
|
|
We are hoping to have a number of people speak on a varied assortment of
|
|
topics. If you would like to speak, please contact us as soon as possible and
|
|
let us know who you are, who you represent (if anyone), the topic you wish to
|
|
speak on, a rough estimate of how long you will need, and whether or not you
|
|
will be needing any audio-visual aids.
|
|
|
|
There will be a display case inside the meeting room which will hold items of
|
|
telecom interest. Specific items that will be available, or that we hope to
|
|
have, include the first issues of 2600, Tap, Mondo 2000, and other magazines,
|
|
non-computer related magazines that feature articles of interest, a wide array
|
|
of boxes, the Quaker Oats 2600 mhz whistle, The Metal AE, etc. We will also
|
|
have a VCR and monitor set up, so if you have any interesting videos (such as
|
|
the Unsolved Mysteries show featuring Kevin Poulsen), or if you have anything
|
|
you think people would enjoy having the chance to see, please let us know ahead
|
|
of time, and tell us if you will need any help getting it to the conference.
|
|
If all else fails, just bring it to the con and give it to us when you arrive.
|
|
|
|
If anyone requires any additional information, needs to ask any questions,
|
|
wants to RSVP, or would like to be added to the mailing list to receive the
|
|
Xmascon updates, you may write to either myself (Drunkfux), Judge Dredd, or
|
|
Lord Macduff via Internet at:
|
|
|
|
nia@nuchat.sccsi.com
|
|
|
|
Or via US Mail at:
|
|
|
|
Hard Data Corporation
|
|
ATTN: HoHo
|
|
P.O. Box 60695
|
|
Airport Mail Facility
|
|
Houston, Texas 77205-9998
|
|
U.S.A.
|
|
|
|
We will hopefully have an 800 mailbox before the next update is sent out. If
|
|
someone cares to donate a decent one, that will stay up throughout the end of
|
|
the year, please let us know. We should also be listing a few systems as an
|
|
alternative form of reaching us.
|
|
|
|
Xmascon 91 will be a priceless learning experience for professionals, and gives
|
|
journalists a chance to gather information and ideas direct from the source. It
|
|
is also one of the very few times when all the members of the computer
|
|
underground can come together for a realistic purpose. We urge people not to
|
|
miss out on an event of this caliber, which doesn't happen very often. If
|
|
you've ever wanted to meet some of the most famous people from the hacking
|
|
community, this may be your one and only chance. Don't wait to read about it in
|
|
all the magazines, and then wish you had attended, make your plans to be there
|
|
now! Be a part of our largest and greatest conference ever.
|
|
|
|
Remember, to make your reservations, call (713) 931-0101 and tell them you're
|
|
with Xmascon.
|
|
|
|
In closing... if you miss this one, you're only cheating yourself.
|
|
_______________________________________________________________________________
|
|
|
|
MindRape Revisited September 27,1991
|
|
~~~~~~~~~~~~~~~~~
|
|
>From Arizona State University State Press
|
|
Further Reading: Phrack Issue 34, File 11, "MindRape or MediaRape?"
|
|
|
|
An Arizona State University (ASU) student is one of seven suspects in a
|
|
computer fraud scheme that one US West Communications official said could cost
|
|
the carrier and the phone company as much as $5 billion in one year.
|
|
|
|
Police in Phoenix, Arizona have seized computer equipment, software, and a
|
|
list of long distance calling card codes from the home of the unidentified
|
|
19-year-old student.
|
|
|
|
The student is one of seven people -- three in Oregon and one each in
|
|
Washington, Utah, and Iowa -- singled out as suspects in a month-long
|
|
investigation of electronic phone fraud conducted by Phoenix police, said Jim
|
|
Waltman, a fraud manager for US West Communications. The Phoenix man has not
|
|
been arrested.
|
|
|
|
The computer "hackers" allegedly used their computers to gain access to
|
|
secret long distance phone access codes such as the ones found on calling
|
|
cards, and sold codes to other students for profit.
|
|
|
|
US West officials told the Associated Press that it is unknown how many
|
|
local customers have been wrongfully billed for long distance calls on their
|
|
accounts.
|
|
|
|
Kevin Robinson, public information sergeant for the Phoenix Police
|
|
Department, would not comment on the investigation.
|
|
|
|
Art Carter, dean of Student Life at Arizona State University (ASU), said
|
|
that if the student is charged, the case will be reviewed under the ASU Code of
|
|
Conduct and the action taken by the University will be determined at that time.
|
|
|
|
Mark Knighton, security director for LDL Long Distance, said his company
|
|
and US West were able to trace calls to several location, including the home of
|
|
the Phoenix man.
|
|
|
|
The Phoenix man has not been arrested, authorities said.
|
|
|
|
Waltman said he was with Phoenix police a week ago when they searched the
|
|
north Phoenix home and uncovered what turned out to be an inexpensive and
|
|
relatively simple system for getting free codes.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
Editor's Comment by: Dispater
|
|
|
|
What MindRape has been charged with cannot be determined now. A request
|
|
must be submitted to Arizona Public Records and be considered for release to
|
|
the requestor.
|
|
|
|
Here are some possibly useful numbers:
|
|
|
|
Arizona Special Investigations Division (602)542-4853
|
|
County Attorney's Office (602)262-3411 (Gail Thackeray)
|
|
Arizona Republic Newspaper (602)271-8000
|
|
Phoenix Police Department
|
|
- General Investigations (602)262-6141
|
|
- Police Information (602)262-7626
|
|
- Police Records (602)262-6134
|
|
_______________________________________________________________________________
|
|
|
|
East Coast LOD Hackers Create Virtual Reality MAELSTROM
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
"It's reached the point where hacking is counter-productive."
|
|
|
|
If the 1980's were the decade that hackers emerged from their relative
|
|
obscurity as computer oddities, to be transformed in the public's perception as
|
|
front-page news -- then the 90's are shaping up to be the decade of hacker
|
|
turned entrepreneur. Lately the notorious hacker group Legion of Doom seems to
|
|
be a particularly fertile spawning ground for ex-hackers turned
|
|
young-businessman.
|
|
|
|
Two former East-Coast Legion of Doom members, Bruce Fanscher <Dead Lord> and
|
|
Patrick Krupa <Lord Digital>, have pooled their talents to form a new company
|
|
in the burgeoning field of Virtual Reality.
|
|
|
|
The arena of Virtual Reality has often been called technology in search of a
|
|
purpose and at times resembles nothing more than an interactive movie meets
|
|
videogame. This chaotic state of affairs has led to a never-never land of
|
|
incompatible technologies and far-out ideas, that have tremendous potential,
|
|
but little commercial application at present. Fanscher and Krupa plan to
|
|
change all that. "VR isn't anything new, it's something we've been living for
|
|
over half our lives. The only difference is the state of current technology,
|
|
makes possible an incredible variety of application." said Krupa in an
|
|
interview. "Right now we're in the ideal position to move forward on ideas
|
|
we've been working on for years," added Fanscher.
|
|
|
|
Krupa, who had attained the status of cult figure in the hacker underground
|
|
prior to his arrest, as chronicled by John Markoff (New York Times) technology
|
|
columnist, has spent the last several years working in the very lo-tech world
|
|
of theater, "Basically I was totally burnt out on computers. I mean I don't
|
|
give a damn if my word processor boots in one second instead of eight, and
|
|
that's the only place anything was heading for a long time. The NeXT has
|
|
changed all that and brought to market something truly innovative, although I
|
|
still don't care too much about technology as anything but a medium through
|
|
which you can reach people and affect their experiences and perceptions."
|
|
|
|
No stranger to creative innovation himself, Fanscher, Krupa's longtime
|
|
compatriot, has spent his share of time in the somewhat murky spotlight of the
|
|
hacker underground. Musing about his days as a hacker delving into computer
|
|
systems to see how they worked, Fanscher remarked that:
|
|
|
|
"It's reached the point where hacking is counter-productive. You can
|
|
only take apart things other people have designed and see what makes
|
|
them work, for so long, before it becomes an exercise in boredom and
|
|
the time comes to use what you've learned to create something new
|
|
that nobody has ever seen before. My current interest in other
|
|
people's systems is zero. It was a useful learning experience for me,
|
|
but there's no future in it."
|
|
|
|
This oddly charismatic, dynamic duo is rounded out by Delia Kopold a former
|
|
actress and theater major who is the architect of the worlds that make
|
|
MAELSTROM come alive. This initial offering by the collection of talents will
|
|
be an online system run on the NeXTcube supermicro -- a machine that looks more
|
|
like a piece of modern art than a computer -- that offers enhanced versions of
|
|
all the usual amenities like electronic messaging, file transfers, and
|
|
networking, all revolving around MAELSTROM, a program Fanscher calls, "a
|
|
real-time virtual interaction simulation engine." MAELSTROM will initially
|
|
take the form of an extremely detailed fantasy world complete with custom
|
|
graphic programs that run on MS-DOS, Macintosh and Amiga computers, allowing
|
|
users to tap into the NeXTcube's system architecture through their home
|
|
computers connected to telephone lines. "Maelstrom isn't really a fantasy
|
|
game, it's actually a universal engine comprised of objects that can be
|
|
accessed by a variety of graphic, sound and data files to create just about any
|
|
multi-user reality you can dream up," explains Krupa.
|
|
|
|
The MAELSTROM system is about to go through a short beta-test run in New York
|
|
City prior to a national ad campaign that will herald its universal
|
|
accessibility on packet switch. "Our beta system already offers everything
|
|
that competing services offer, but at a much lower cost -- and we're still
|
|
adding features. And nothing like Maelstrom has ever existed before, the
|
|
technology just wasn't there," concludes Fanscher.
|
|
_______________________________________________________________________________
|
|
|
|
2600 Magazine Exposes Security Holes October 18,1991
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by John F. McMullen & Barbara E. McMullen (Newbytes)
|
|
|
|
Armonk, New York -- Supported by videotape examples, Emmanuel Goldstein, editor
|
|
and publisher of 2600 Magazine: The Hacker Quarterly, told those in attendance
|
|
at an October 17th New York City press conference that "the American public is
|
|
often lulled into a false sense of security; a security that is often not
|
|
supported by the facts of specific cases."
|
|
|
|
The videotapes, produced by 2600 and provided to the press show both the
|
|
intrusion of a Dutch "hacker" in to United States Military computers and what
|
|
Goldstein alleges is the fallibility of a brand of mechanical, pushbutton locks
|
|
used by, among others, New York State University sites, Federal Express, United
|
|
Parcel Service, JFK International Airport, IBM and NASA.
|
|
|
|
Goldstein told Newsbytes "We invested considerable time and money to wake
|
|
people up to the fact that we have a false sense of security when it comes not
|
|
only to computer networks but to physical safety as well."
|
|
|
|
The tape of the Dutch "hacker" was made by Goldstein while in Europe. and shows
|
|
the intrusion into a Unites States Army computer system. The intruder was able
|
|
to set up a fictitious account called "danquayle" and, once into the system,
|
|
was able to obtain "root" privileges thus giving him total control of the
|
|
workings of the system.
|
|
|
|
A portion of this tape had previously been shown with Goldstein's approval on
|
|
an episode of the Geraldo Rivera television show "Now It Can Be Told".
|
|
Goldstein told Newsbytes that one^S^Q reason for his release of the entire tape to
|
|
the press was his feeling that the Rivera episode entitled "The Mad Hacker's
|
|
Key Party" had distorted the message of the tape -- "This was not a case of a
|
|
terrorist break-in but was rather simply a demonstration of the lack of
|
|
security of our systems. To find root accounts with password like "Kuwait" and
|
|
lack of sophisticated security in our military computers should be of real
|
|
concern and should not be lost in an exploitation of the 'hacker' issue."
|
|
|
|
A background paper provided at the conference by 2600 explains the entire
|
|
intrusion effort in detail and states "The purpose of this demonstration is to
|
|
show just how easy it really was. Great care was taken to ensure that no
|
|
damage or alteration of data occurred on this particular system. No military
|
|
secrets were taken and no files were saved to a disk by the hackers. What is
|
|
frightening is that nobody knows who else has access to this information or
|
|
what their motivations might be. This is a warning that cannot be taken
|
|
lightly."
|
|
|
|
The second videotape show Goldstein and other 2600 staff opening seemingly at
|
|
will locks manufactured by Simplex Security Systems. The locks of the
|
|
mechanical pushbutton combination variety were shown to be installed at the
|
|
State of New York University at Stony Brook, JFK International Airport and on
|
|
Federal Express and United Parcel pick-up boxes throughout the New York
|
|
Metropolitan area.
|
|
|
|
In the film, Goldstein is shown filling out a Federal Express envelope for
|
|
delivery to 2600 Magazine and inserting in the Fedex dropbox. He then lifts
|
|
the weather protection cover on the box's lock and keys a combination that
|
|
allows him to open the lock and remove his envelope. Scott Skinner, a SUNY
|
|
student and 2600 staff member told Newsbytes that it had actually taken the
|
|
staff 10 minutes to determine the proper code combinations to open the lock.
|
|
|
|
Skinner explained, "While Simplex prefers people to think that there is an
|
|
endless number of permutations to the lock, there are actually only 1,085. In
|
|
most cases, even this number is greatly reduced -- if one knows that only three
|
|
buttons are being used, it reduces the possibilities to 135. Additionally, we
|
|
found that, once we had the combination to one Federal Express dropbox, it
|
|
worked in every other one that we tried in the New York area."
|
|
|
|
Goldstein told Newsbytes "When we contacted Simplex, they first denied that the
|
|
locks were unsafe and then said that the permutations were much greater. After
|
|
some discussion, they admitted that the 1,085 figure was correct but said that
|
|
it would take a person with a complete listing of the combinations over four
|
|
hours to try them all. Our experience obviously shows that they may be opened
|
|
in a much shorter time than that."
|
|
|
|
Goldstein also pointed out that, "although a $5 Master combination lock may be
|
|
broken by a crowbar, it is a much more secure combination device. It has
|
|
64,000 combinations compared to the 1,085 with the Simplex."
|
|
|
|
Goldstein continued, "One of the real problems is that, should a person have
|
|
the misfortune to be robbed, entry due to a failure of the Simplex lock gives
|
|
no evidence of a forcible break-in and police and insurance companies often put
|
|
the blame on the homeowner or office manager for 'giving away the combination.'
|
|
It really can create a problem."
|
|
|
|
Skinner told Newsbytes "I'm really concerned about t^Shis. I'm a student at
|
|
SUNY, Stony Brook and all our dormitories use these locks as the only means of
|
|
security. I've shown the problem to Scott Law who is responsible for residence
|
|
security but he has discounted the problem and said that the locks were
|
|
installed at the recommendation of the campus locksmith. The locksmith, Garry
|
|
Lenox contradicts Law and says that he recommended against these locks years
|
|
ago and said that they were not secure for dormitory use." Skinner said that
|
|
he will write an article for the college newspaper in an attempt to raise
|
|
consciousness about this problem.
|
|
|
|
Goldstein also said that he intends to publish the list of valid combinations
|
|
in an up-coming iss^Que of 2600 to demonstrate to the public the problems with
|
|
the lock. He further said that he will raise the issue on his weekly radio
|
|
show, "Off The Hook", heard on New York's WBAI-FM.
|
|
|
|
In response to a Newsbytes question concerning how the 2600 staff happened to
|
|
become involved in a problem with locks, Goldstein said, "We're hackers and
|
|
when we see something with buttons on it, whether it's a computer or not, we
|
|
tend to try it. While the average person tends to accept that things are
|
|
secure just because he is told that they are, hackers will usually try them
|
|
out. It's because of this 'trying out' that we can point out the problems with
|
|
both the US military computer security and this lock -- and we feel that, in
|
|
both cases, we have performed a service. People should be aware when they are
|
|
at risk so that they may take action to correct it."
|
|
_______________________________________________________________________________
|
|
|
|
Questions Exist On Israeli Break-In Of US Systems September 10,1991
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Barbara E. McMullen & John F. McMullen (Newsbytes)
|
|
|
|
NEW YORK -- Amidst reports of the intrusion by an Israeli national into United
|
|
States military computer systems, there have been conflicting accounts of the
|
|
extent and nature of the invasion.
|
|
|
|
According to wire services, Deri Schriebman, an 18 year-old graduate of
|
|
Israel's Technion Institute and a native of the northern Israeli city of
|
|
Carmiel, was arrested by Israeli police for allegedly breaking into US military
|
|
computers and commercial credit card systems. Israeli spokes person Eitan Raz,
|
|
commenting on the equipment found at Schriebman's home for allegedly making
|
|
free overseas phone calls, was quoted as saying "This was a very complex
|
|
system. It was the first time such technology was discovered in Israel."
|
|
|
|
Newsbytes has ben able to confirm with sources that a trail of credit card
|
|
fraud in the United States and Canada led investigators to Schriebman but has
|
|
not been able to confirm that Schriebman, as reported in Israeli press, was
|
|
able to access classified Pentagon information concerning Patriot missiles
|
|
during the recent Gulf War. A US government investigative official told
|
|
Newsbytes that, while his agency has formally requested documentation of the
|
|
events from the Israeli police, that there seems to have been no contact to
|
|
date between any US service and the Israeli investigators.
|
|
|
|
Other investigative sources have told Newsbytes that the investigation into
|
|
Schriebman's activities began in May 1991 when two Quebec teenagers were
|
|
arrested for purchasing goods through the use of stolen credit card
|
|
identification. The teenagers told Canadian authorities that they had received
|
|
the information from a source in Carmiel, Israel and the authorities notified
|
|
Israeli police. According to the Israeli reports, Schriebman admitted the
|
|
intrusion into credit card files and the subsequent dissemination of codes but
|
|
denied making any use of the information. He was quoted as saying that his
|
|
cracking into the systems was done only out of curiosity.
|
|
|
|
A "hacker" source told Newsbytes that underground bulletin boards utilized for
|
|
the exchange of such credit information are often frequented by foreign
|
|
nationals. He said that the most frequent visitors come from Australia, Israel
|
|
and Germany and that many of the Israelis identify themselves as have a
|
|
connection with the Technion Institute.
|
|
_______________________________________________________________________________
|