mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
1146 lines
43 KiB
Text
1146 lines
43 KiB
Text
---[ Phrack Magazine Volume 7, Issue 51 September 01, 1997, article 02 of 17
|
|
|
|
|
|
-------------------------[ P H R A C K 51 L O O P B A C K
|
|
|
|
|
|
--------[ Phrack Staff
|
|
|
|
|
|
|
|
0x1>-------------------------------------------------------------------------
|
|
|
|
Issue 50 proves that Phrack _is_ back, and better than ever.
|
|
Congratulations to you and the rest of the Phrack staff for putting
|
|
together what I think is by far the most informative issue to date. The
|
|
quality of the articles and code (YES! Lots of code!) reflects the hard
|
|
work and commitment that obviously went in to this issue. I could go on,
|
|
but I'm all out of lip balm.
|
|
|
|
Thank you!
|
|
_pip_
|
|
|
|
|
|
[ Thank you. We aim to please. ]
|
|
|
|
0x2>-------------------------------------------------------------------------
|
|
|
|
{ ...Bugtraq Phrack 50 announcement deleted... }
|
|
|
|
So What?
|
|
Who cares? get this crap off of the mailing list.
|
|
phrack is as much trash as 2600 or any other
|
|
little idiot magazine.
|
|
|
|
|
|
[ Thank you. We aim to please. ]
|
|
|
|
0x3>-------------------------------------------------------------------------
|
|
|
|
juggernaut is way cool, man.
|
|
|
|
minor bug: you dont unset IFF_PROMISC on exit, so it's not terribly stealthy,
|
|
but it's no big deal to fix.
|
|
|
|
anyway. cool.
|
|
|
|
.techs.
|
|
|
|
|
|
[ Although Juggernaut is *not* meant to be a 'covert' program you are
|
|
completely right about that. I should unset promiscuous mode when the
|
|
program exits. In fact, in version 1.2 (patchfile available in this
|
|
issue) I include this very thing. ]
|
|
|
|
0x4>-------------------------------------------------------------------------
|
|
|
|
Hi!
|
|
I've got the p50.tgz and well, played a little with jugernaut.
|
|
It's realy cool but:
|
|
1) It doesn't compile so clean. You've forgot to #include
|
|
<linux/netdevice.h> before <linux/if_arp.h>
|
|
2) The spy connection part is not quite cool because you
|
|
sniff and dump all the stuff that is comeing from the dest. port
|
|
and dest. host ...
|
|
So if U try 2 spy say:
|
|
193.226.34.223 [4000] 193.226.62.1 [23]
|
|
U spy in fact all the stuff that is comeing from 193.226.62.1 [23] for
|
|
ALL the conn. made to 193.226.62.1 on the 23 (telnet) port.
|
|
This will cause a cool mess on the screen.
|
|
I've tried 2 restrict the spying by introduceing a new cond.
|
|
iphp->daddr==target->saddr in net.c ... it brocked the spy routine
|
|
|
|
Maybe U'll fix somehow that thing..
|
|
|
|
All my best regards,
|
|
Sandu Mihai
|
|
|
|
|
|
[ <linux/if_arp.h> includes <linux/netdevice.h>. The compilation of the
|
|
program should go smoothly on any linux 2.0.x based system. Version 1.2
|
|
also fixes the TCP circuit isolation problem you allude to... ]
|
|
|
|
0x5>-------------------------------------------------------------------------
|
|
|
|
Thanks!
|
|
|
|
This is a very impressive tool! Brilliant work!
|
|
|
|
Thank you,
|
|
|
|
--Craig
|
|
|
|
|
|
[ Thank you. ]
|
|
|
|
0x6>-------------------------------------------------------------------------
|
|
|
|
I'm just writing this to say thanx for putting out such a kickass publication.
|
|
Down here in 514 it's fuckin dead, you mention hacking and half the people
|
|
don't have a clue what Unix is.It's fuckin pathetic, but i'm glad to say
|
|
that your mag has helped a lot and i look forward to future issues, you guys
|
|
really do make a difference in the hacking community. Thanx.
|
|
|
|
Snake Eyes
|
|
|
|
[ Amen to that. ]
|
|
|
|
0x7>-------------------------------------------------------------------------
|
|
|
|
Hi! =8)
|
|
|
|
Why don't you (at Phrack) compile an updated Pro-Phile on known H/P
|
|
Groups like the one on issue #6 ?
|
|
So we - the readers - can know something more about the ACTUAL scene
|
|
(but perhaps it's not worth - ppl's sick of all that 3l33t d00dz ;)
|
|
|
|
I really appreciated that dox & srcs on spoofing, D.O.S., etc.
|
|
HIGH technical quality, sources, articles, news.... and it's free! :P
|
|
Ahh that's life! ;)
|
|
|
|
However, great job with the latest Phrack issues.
|
|
To quote a friend of mine (talking of Phrack Magazine)...
|
|
|
|
> It's improved a lot with Deamon9 in command....
|
|
|
|
K, that's all.
|
|
**PHRACK RULEZ!** (I had to say that :)
|
|
Oh... and sorry for my english!
|
|
|
|
Cya....
|
|
|
|
-Axl-
|
|
|
|
[ Not a bad idea. Perhaps someone would like to do an article on
|
|
the existing groups out there for P52? ]
|
|
|
|
|
|
0x8>-------------------------------------------------------------------------
|
|
|
|
I would like to know what you suggest to get me headed in the right
|
|
direction reguarding the compromise of computers on the internet.
|
|
any information that you would be able to spare would be most appreaciated.
|
|
atomicpunk.
|
|
|
|
[ It's *all* about compromise. It's something you have to do. Be fair to
|
|
them. Listen to them. Don't shut them out of your life. They are
|
|
wonderful creatures... It's a give and take thing and sometimes, yes, you
|
|
*have* to compromise -- that's part of having a mature relationship. ]
|
|
|
|
|
|
0x9>-------------------------------------------------------------------------
|
|
|
|
I recently locked into my car so i called a friend to come help me
|
|
when the slim jim was no help he decided to try another less known
|
|
method.
|
|
|
|
We simply took a stiff metal coat hanger and straightened it out and
|
|
made a small loop in it then we took a small speaker wire about 3 feet
|
|
long and tied a loop into one end so it would slide to make the loop
|
|
smaller or larger.
|
|
|
|
Then you take the wire and run it in through the loop in the hanger
|
|
and pry the top edge of the car door open and slide both looped ends
|
|
through holding onto the unlooped ends.
|
|
|
|
then you use the hanger to position the loop in the speaker wire
|
|
around the door lock once you have the loop into position you hold
|
|
the hanger steady and gradualy pull the loop tight around the lock
|
|
once the loop is tight you just pull up on the hanger.
|
|
|
|
This works on most all vehicles with top door locks and with a little
|
|
prep. and practice can be done in under 2 mins. also its less
|
|
conspicious and easier to get than a slim jim. and they are cheap
|
|
so no one care to toss the out after breaking into an entire lot of cars.
|
|
|
|
Hope you found this phile worth while
|
|
C'ya
|
|
The Stony Pony
|
|
|
|
|
|
[ Aspiring young car thieves among us thank you; however if you
|
|
lock yourself in the car again, you might try unlocking the door
|
|
manually. ]
|
|
|
|
0xa>-------------------------------------------------------------------------
|
|
|
|
HOW YOU KNOW YOUR A TRY HARD HACKER
|
|
-------------------------------------
|
|
|
|
|
|
By [Xtreme]
|
|
|
|
|
|
I just wrote this to tell all you try hard hackers something.
|
|
|
|
1) You goto other hacker pages on the web.
|
|
2) You think loading a program that waz made by a hacker is hacking.
|
|
3) The only thing you do is get the lastest passwd file from your isp.
|
|
4) You goto channels like #hack and ask for passwd files.
|
|
5) You don't know where to get warez.
|
|
6) You always telnet to hosts and type
|
|
|
|
login: root
|
|
password: root
|
|
|
|
and stuff like that.
|
|
|
|
7) You brag about how you are a hacker.
|
|
8) You don't know C.
|
|
9) Your a girl.
|
|
10) You don't know what's a shell.
|
|
11) You don't know what Linux, FreeBSD and all those other UNIX's are.
|
|
12) You don't have a UNIX OS.
|
|
13) You think when using IRC war scripts, your hacking.
|
|
14) Asking how to hack other people's computer.
|
|
15) You try cracking a shadowed passwd file.
|
|
16) You don't know if a passwd file is shadowed or not.
|
|
17) You ask what is a T1.
|
|
18) You ask how to email bomb and you think email bombing is a form of hacking.
|
|
19) Your learning BASIC language.
|
|
20) You think you can get into hacking straight away.
|
|
21) You don't know how to set up an eggdrop bot.
|
|
22) You think .mil stands sites stand for a country.
|
|
|
|
|
|
[ That is without a doubt, the dumbest thing I have ever read in my life.
|
|
Not only do I award you no points, but we are all now dumber having read
|
|
that. May God have mercy on your soul. ]
|
|
|
|
0xb>-------------------------------------------------------------------------
|
|
|
|
What command do I use to make you denial of service package work?
|
|
|
|
|
|
[ You hit yourself in the head with a hammer. ]
|
|
|
|
0xc>-------------------------------------------------------------------------
|
|
|
|
I was scanning the 413 xxx 99XX range and I found some #'s. I have
|
|
no idea what they do. I was wondering if you could help me out.
|
|
Maybe call them and see what you find or someting.
|
|
|
|
(413) xxx-99xx
|
|
(413) xxx-99xx
|
|
(413) xxx-99xx These are all fax #s, I think
|
|
(413) xxx-99xx
|
|
|
|
(413) xxx-99xx goes beep beep beep
|
|
|
|
(413) xxx-99xx goes beeeep
|
|
|
|
(413) xxx-99xx auto foward I think
|
|
|
|
(413) xxx-99xx goes beeep beeep
|
|
|
|
|
|
[ I tried calling these but I got no answer. Maybe the 'X' on my phone
|
|
is case sensitive? ]
|
|
|
|
0xd>-------------------------------------------------------------------------
|
|
|
|
Sir,
|
|
I would like to know how could I get root permission from a simple user.
|
|
I have read that this can be accomplished by setuid programs, and I have read
|
|
an article describing the way this can be done in Phrack Magazine. Still I
|
|
couldn't gain root access. I would be very interested in finding ways of doing
|
|
this on Irix 5.2 or Solaris 2.5. If you know anything about this, please
|
|
send me an e-mail. If you know any resources on the Web that details the use
|
|
of setuid programs in order to get root access, please tell me.
|
|
|
|
|
|
[ P49-14 ]
|
|
|
|
0xe>-------------------------------------------------------------------------
|
|
|
|
>AND FOR THE LOVE OF GOD, SOMEONE NOTIFY MITCH KABAY...!<
|
|
|
|
Mich, not Mitch. "Mich" is short for "Michel."
|
|
|
|
|
|
M. E. Kabay, PhD, CISSP (Kirkland, QC)
|
|
Director of Education
|
|
National Computer Security Association (Carlisle, PA)
|
|
http://www.ncsa.com
|
|
|
|
[ No, Mike is short for Michael. ]
|
|
|
|
0xf>-------------------------------------------------------------------------
|
|
|
|
Your zine is the best
|
|
Please send it to Psycho Al1@aol.com
|
|
|
|
The Psychotic Monk
|
|
|
|
PS:Aohell rulez
|
|
|
|
|
|
[ You are an idiot. ]
|
|
|
|
0x10>-------------------------------------------------------------------------
|
|
|
|
Hi, Phrack people!
|
|
|
|
Great job on issue 50! Nice magazine. Article 'bout TTY hijacking is really
|
|
superb.
|
|
|
|
I have just one question to you. Is there any holes on target system in this
|
|
situation? There's a server, running freeBSD 2.1.5, with a shadowed passwords.
|
|
I've got a dial-up account on that machine as a simple user. What bugs can I
|
|
use for having root privileges?
|
|
|
|
Best wishes from Ukraine!! OmegA
|
|
|
|
|
|
[ find / -perm -4000 -print ]
|
|
|
|
0x11>-------------------------------------------------------------------------
|
|
|
|
hello... long-time reader, first-time writer:
|
|
|
|
i know that all "submissions" are to be encrypted... and i should be
|
|
encrypting anyways, but i'll make it quick ... besides, this isn't
|
|
really a "submission..."
|
|
|
|
congrats on reaching the 50th issue mark, and congrats on an
|
|
excellent ish!
|
|
|
|
i just a quick question. i would like to reprint the <soapbox>
|
|
for issue #50 on my web page, with a hypertext link to the
|
|
Official Phrack Homepage (http://www.fc.net/phrack/ - correct?).
|
|
I think it says brings up some important points, and since it's
|
|
copywrited, and you sren't losers, i'd ask you (it's not like a
|
|
simple copywrite has stopped anyone before)!
|
|
|
|
thanks,
|
|
lenny
|
|
|
|
|
|
[ A simple copyright may not stop people, but the simple restitution
|
|
remanded by courts might. However, go ahead and put a hypertext link.
|
|
The official webpage will be at phrack.com/net/org, SOON. ]
|
|
|
|
0x12>-------------------------------------------------------------------------
|
|
|
|
In Volume Four, Issue Forty-One, File 3 of 13, Supernigger was featured
|
|
in your Phrack Pro-Phile. Whatever happened to him? Did he "grow up and
|
|
get a real job" or is he still lurking around?
|
|
|
|
- Styx
|
|
|
|
|
|
[ Both. ]
|
|
|
|
0x13>-------------------------------------------------------------------------
|
|
|
|
People @ Phrack:
|
|
|
|
In Phrack #50 in the file 'Linenoize' Khelbin wrote an article about remote
|
|
BBS hacking, namely using Renegade's default 'PKUNZIP -do' command overwrite
|
|
the userbase with your own ...
|
|
|
|
For some strange reason, while renegade is booted, and if it runs PKUNZIP -do
|
|
the procedure will NOT work... but the procedure DOES work when Renegade is
|
|
down at the Dos Prompt..?
|
|
|
|
Does Renegade extract files into memory or something while testing for
|
|
integrity? -8) .. I tried this out on 10-04, 5-11 and even
|
|
04-whatever-the-fuck-that-version-was and it didn't work.. I think Khelbin
|
|
needs help for his chronic crack addiction since I can't find any way possible
|
|
to get his article to work..
|
|
|
|
op: Taos BBS
|
|
|
|
~~~ Telegard v3.02
|
|
|
|
|
|
[ We dunno. Anyone else have an answer? ]
|
|
|
|
0x14>-------------------------------------------------------------------------
|
|
|
|
Regarding Xarthons submission about Linux IP_MASQ in Phrack 50...
|
|
|
|
The masquerading code is not designed for security. Hardwiring RFC1918
|
|
addresses into the IP_MASQ code is not a clever idea for two reasons:
|
|
|
|
1) It diminishes the usefulness of the code. I have used masquerading to
|
|
keep things running when my company changed internet providers. I
|
|
masqueraded our old _valid_ IP range. Other people may come up with
|
|
other valid uses, like providing redundancy through two ISPs.
|
|
2) The masquerading code is part of the Linux packet filter, which can
|
|
certainly be configured to prevent spoofing, a quite a bit more.
|
|
|
|
If the static packet filter and the masquerading code are used together
|
|
they can provide as much security as a 'dynamic' filtering firewall like
|
|
Firewall-1 in many cases. A very short 'HOW-TO':
|
|
|
|
1) Put spoofing filters on all interfaces. Only allow incoming packets
|
|
to the external interface if the destination address is that of the
|
|
external interface (that's the address the masquerading code inserts as the
|
|
source address of outgoing packets).
|
|
|
|
2) Insert rule(s) in the forwarding filter to masquerade your outgoing
|
|
packets. You do not need to route incoming replies to masqueraded
|
|
packets, that happens auto-magically. Deny everything else (and _log_).
|
|
|
|
3) Make sure the gateway does not run anything that leaves you
|
|
vulnerable. Don't run NFS, the portmapper etc. Update sendmail, bind to
|
|
the latest versions if you run them.
|
|
|
|
4) Disable telnet, and use 'ssh' for maintenance. If you must support
|
|
incoming telnet connections through the firewall install the TIS firewall
|
|
toolkit, and use one-time passwords.
|
|
|
|
5) Run 'COPS', 'Tripwire'.
|
|
|
|
6) Read a good book about Internet security, and make sure you
|
|
understand all the issues involved before you configure _any_ firewall,
|
|
even one with a GUI and a drool-proof manual.
|
|
|
|
I hope this is useful to some people.
|
|
|
|
Ge' Weijers (speaking for myself only)
|
|
|
|
0x15>-------------------------------------------------------------------------
|
|
|
|
You write in P49-06:
|
|
|
|
... The only sure way to destroy this
|
|
channel is to deny ALL ICMP_ECHO traffic into your network.
|
|
|
|
No. It suffices to clear the content of the packets
|
|
when passing the firewall.
|
|
|
|
|
|
ralf
|
|
|
|
[ True enough. However, by doing this you remove the RTT info from
|
|
the ICMP echos which will break some implementations which rely on it. ]
|
|
|
|
0x16>-------------------------------------------------------------------------
|
|
|
|
Hi, Im a Wannabe, maybe you would call me and idiot.
|
|
Where do you guys hang out, IRC? Wich channel, #supreme? Wich server?
|
|
Know any good trix for me how to learn more about hacking?
|
|
|
|
Please answer my letter, I know that you get lots of letters, but
|
|
please!!
|
|
|
|
[ EFNet, #phrack ]
|
|
|
|
0x17>-------------------------------------------------------------------------
|
|
|
|
You cant realy say that IRC is for loosers cuz in Phrack 50 I saw an
|
|
article with some text taken from IRC, and you were logged in.
|
|
|
|
[ We are losers. Ergo, yes we can. ]
|
|
|
|
Which good hack books, UNIX books or things like that do you recommend.
|
|
|
|
Thank You For An Answer!!
|
|
|
|
[ Anything Addison Wesley or ORA. Also, many of the PTR/PH books. ]
|
|
|
|
0x18>-------------------------------------------------------------------------
|
|
|
|
I am writing to inquire about the fate of Pirate Magazine
|
|
and how I might contact it's creators. It seems to have been out of
|
|
circulation since 1990 and I was hoping to look at possibly organizing
|
|
some kind of initiative to revive this excellent publication. I thought
|
|
first to turn to Phrack magazine. Thanx for your time.
|
|
|
|
Joong Gun
|
|
|
|
[ Anyone have any information? ]
|
|
|
|
0x19>-------------------------------------------------------------------------
|
|
|
|
Hello,
|
|
|
|
I just got Phrack 50 and loved it....It is the first one I've
|
|
got. I was wondering if you guys know about any other newsletters or
|
|
magazines that are sent to your e-mail address or you can get off the web on
|
|
a regular basis, like Phrack. thanX
|
|
|
|
[ Other magazines come and go on a pretty regular basis. Phrack is
|
|
eternal. Phrack is all you need. ]
|
|
|
|
0x1a>-------------------------------------------------------------------------
|
|
|
|
Please help me. If I can't join your club, please let me learn from you. I
|
|
am interested in both Program hacking and remote access.
|
|
|
|
Thanks.
|
|
|
|
quattro
|
|
|
|
[ You join our club if you can find our secret clubhouse. ]
|
|
|
|
0x1b>-------------------------------------------------------------------------
|
|
|
|
hi. This is from a guy you probably will never hear of again, and
|
|
definantly have never heard of already. I wanna ask you a question. At
|
|
my school, people write crap on their backpacks with witeout. I have
|
|
never done this for 2 reasons
|
|
|
|
1) I dont wanna be grouped with the poseur metalheads, etc who write
|
|
"Pantera" and "666" and "Satan" etc but cannot name a song of thiers,
|
|
and/or go to church....
|
|
|
|
2) I dont wanna be grouped with the wanna be hackers who write stuff
|
|
like Anarchy symbols, "Aohell" "Kaboom" and the such, because thats just
|
|
plain lame. You have to feel sorry for people who think they are elite
|
|
because they can mailbomb somebody.
|
|
|
|
Another reason I have never written anything is I havent found anything
|
|
worht advertising. Now i have, I wanna write "The guild" or something to
|
|
that extennt maybe "r00t" or something. I have not done this for i do
|
|
not want to piss you off (indirectly something may get to you about it.
|
|
It could happen, remember the 6 degrees of seperation? hehehe). If this
|
|
is ok with you, lemme know please. (cad@traveller.com) Also, if your
|
|
wondering why im mailing this to you alone, it is because you are a
|
|
fucking baddass. heh. Well, lemme know whenever ok? thanks.
|
|
|
|
(I know i have an absence of punctuation, i'm in a hurry and I have
|
|
homework)
|
|
|
|
|
|
[ You have our permission to write r00t on your backpack. ]
|
|
|
|
0x1c>-------------------------------------------------------------------------
|
|
|
|
|
|
yes i want to learn how to hack and need to learn fast
|
|
Js444 told me you can help
|
|
will repay BIG
|
|
thanks
|
|
|
|
[ How big? ]
|
|
|
|
0x1d>-------------------------------------------------------------------------
|
|
|
|
|
|
I sent this from your hoime page...is it X-UIDL? I dunno, it's 4 AM
|
|
anyway
|
|
|
|
um oh, keep in mind that ur response (if made) to this may be dumped to
|
|
#hack printed in the next Citadel knockoff or whatevrr
|
|
|
|
I was just like thinking oh, I was thinking "I don't have an Irix
|
|
sniffer!"...actually my thoughts don't have quotes around them it was
|
|
more like
|
|
|
|
~o- all the Irix sniffers I have suck -o~
|
|
|
|
and then theres like Irix 4, 5, 6. Bah. And like sniffit sucks and
|
|
anyway. And then I mentioned this and people were making fun of me, but
|
|
I don't care. I only care lately when people are like, "Oh that's what
|
|
youy make? I'm 17, have a criminal record and make three times that!".
|
|
Anyway, people are like, "No, no nirva is elite" so I thought, aha, I'll
|
|
ask nirva what a good Irix sniffer is. Oh, like now that people are
|
|
laughing at that I have to keep this quets like secrtet. I even think
|
|
some Irix's don't have compile, like Solaris. Christ, some Solaris's
|
|
have jack shit. Anyway.
|
|
|
|
1) Why don't u log on #hack, or are you tres elite #!guild or beyond
|
|
elite #www or #root #Twilight_Zone and more importantly
|
|
|
|
2) Irix sniffer - captures passwords, actually compiles. I hate
|
|
coding. I am a a lazy American. And like, getting legit root access on
|
|
an Irix...bvah, Irix sniffer!
|
|
|
|
Bye-bye hackers
|
|
|
|
oh PostScript
|
|
|
|
3) Are you a cyberpunk?
|
|
|
|
If I ran Phrack I wouldn't like Mr. Tishler have "Are hackers in general
|
|
geeks?" as the question _everyone_ gets, I think, Are you a cyberpunk?
|
|
Would be it
|
|
|
|
[ 1. We do hang out on as many public channels as we can stand for
|
|
at least a little bit of time each issue. But really why do
|
|
you care if an editor of Phrack is there when people are shouting
|
|
about their penis size and how many drugs they are on? If you
|
|
want to talk about something, we are always available by e-mail
|
|
and will usually talk to you by private msgs if we aren't busy
|
|
doing something else at the moment.
|
|
2. Anyone want to write us a really cool one?
|
|
3. Who are we to change tradition? ]
|
|
|
|
0x1e>-------------------------------------------------------------------------
|
|
|
|
|
|
Hello,
|
|
|
|
I wanna ask you something about the following problem. I'm really stuck (the
|
|
1st time ;-)) ! Is it possible to pass a firewall and access one of the
|
|
domains behind it ?? I'm afraid that the sysadmins did their job fine :(
|
|
I've got everything what I need but that damn wall....I'll give you some info
|
|
that I've obtained so far:
|
|
|
|
- IP-address of the firewall,
|
|
- All the domains + IP adresses behind this wall,
|
|
- The login-account of the superuser,
|
|
- All the open-UNIX ports behind the wall,
|
|
- The company has no WWW-site but they do have an Intranet.
|
|
|
|
portscanning gives me this:
|
|
21~=ftp,
|
|
23~=telnet,
|
|
25~=smtp-mail 220 x.x.x.x SMTP/smap Ready.
|
|
|
|
This is at IP x.x.x.2 but I found out that also x.x.x.1 belongs to the same
|
|
company with 3 other ports...
|
|
7~=echo,
|
|
9~=discard-sink null
|
|
79~=finger.
|
|
|
|
Is the only way to go by D.O.S. attack the firewall and then spoof the
|
|
firewall's IP addres ?
|
|
|
|
But how to start ?? Woul u be so kind to help me ??
|
|
|
|
TIA,
|
|
theGIZMO
|
|
|
|
|
|
[ fragmentation. ]
|
|
|
|
|
|
0x1f>-------------------------------------------------------------------------
|
|
|
|
|
|
Ok, this might sound dumb , but, I think it would be cool to have this as a
|
|
slogan.
|
|
|
|
"Blah, blah, blah, and along with your subscription, you'll receive a
|
|
LIFETIME WARRANTY ON YOUR BRAIN!! That is, if for any reason your brain
|
|
can't figure out a problem you're having hacking, just e-mail us with your
|
|
question and we'll be glad to help you out. Note: Please PGP encrypt all
|
|
questions regarding hacking questions. Thank you."
|
|
|
|
Do you like it? Note that blah, blah, blah is whatever you would it to be.
|
|
Such as, "You can subscribe to Phrack Magazine by sending e-mail to
|
|
Phrackedit@infonexus.com requesting you be put on the list, and along with
|
|
your subscription......"
|
|
|
|
Ok, thats it....write back if you like it....or if you don't. Here is my PGP
|
|
public key.
|
|
Oh yeah...you might have gotten mail from PhatTode@aol.com. That is me. So
|
|
direct replies to those messages to this new address...Thank you.
|
|
|
|
[ You're right. It does sound dumb. ]
|
|
|
|
0x20>-------------------------------------------------------------------------
|
|
|
|
|
|
Hey,
|
|
sorry to bother you but I just got Redhat Linux 4.1 in the mail. I
|
|
think it's great besides the fact that I hear that it lacks security.
|
|
HOw do I get PGP up in it? Is it easy to install? Thanks.
|
|
|
|
Killer Bee
|
|
|
|
[ yes, very easy to install. Read the documentation. It's different
|
|
for different platforms. ]
|
|
|
|
0x21>-------------------------------------------------------------------------
|
|
|
|
|
|
Hello
|
|
|
|
My name is Joseph and I am intrested in any information you may have
|
|
about the early day's of hacking and current hacking underground.. also
|
|
I understand you are a member of the guild ?? what is this?
|
|
|
|
Joseph --> jgriffiths@iname.com
|
|
|
|
[ The guild is like what r00t was before r00t got all famous and became
|
|
greatly feared and admired. Oh. And we spend most of our time counting
|
|
our millions and having sex with models. ]
|
|
|
|
0x22>-------------------------------------------------------------------------
|
|
|
|
|
|
Hi there,
|
|
|
|
Do you know where I can find the Rosetta stone for interpreting the output
|
|
of Solaris lockd & statd in debug mode? I can't find any public information
|
|
about it, even on Sun sites. Sun Microsystem refuses to let their lab
|
|
publish anything about interpretation of system calls outputs. Are they
|
|
afraid that they will be losing support contracts if this information gets
|
|
out? The man page does not include arguments to run in debug mode, and
|
|
what's the point of providing the tools w/o the means to interpret the
|
|
result? Teach a man how to fish .....you know.
|
|
|
|
Thanks.
|
|
|
|
Christine
|
|
|
|
[ Someone want to write an article on it? ]
|
|
|
|
0x23>-------------------------------------------------------------------------
|
|
|
|
|
|
In regards to the article on Ethernet spoofing:
|
|
|
|
As an aside note for the highly paranoid: ethernet spoofing
|
|
|
|
Note: some of this is theorized, and might not be 100% accurate - if you
|
|
get the jist of it, you should be able to figure out if it works for
|
|
you.
|
|
|
|
It is possible to spoof ethernet hardware addresses as well. Some cards
|
|
will allow you to do this easily, but you need to have card programming
|
|
docs (check the Linux kernel source for your card driver-!!). Others
|
|
won't let you do it at all, and require a ROM change, or worse it might
|
|
be solid state logic on the card - EVIL. Course you might be able to
|
|
get around solid state stuff by recoding the ROM, but I wouldn't
|
|
recommend it unless you don't have the $70 to buy a new card, and have a
|
|
month or two to spend in the basement.
|
|
|
|
... rest of stuff(tm) deleted ...
|
|
|
|
Interestingly enough, most of the Sun sparc stations I've seen allow you to
|
|
enter in any mac address that you want using ifconfig(1M). I "know someone"
|
|
who picked up a Sparc IPC for $50 (Can $$) and upon discovering that the
|
|
battery that powers the IDPROM was deceased, we needed to fake a mac address
|
|
to get it to talk to someone. Sun's default is 0:0:0:0:0:0 but the 3Com
|
|
card's mac (from a different network) worked quite nicely.
|
|
|
|
Interesting concept the author has though, I'll be f*ck around with the idea
|
|
when I'm supposedly doing work =)
|
|
|
|
|
|
[ MAC address spoofing techniques are well known about, especially under
|
|
Sparcs. However, do some research, write some code and an article and
|
|
submit it... ]
|
|
|
|
0x24>-------------------------------------------------------------------------
|
|
|
|
|
|
I love your e-zine it is the coolest thing i've read.
|
|
|
|
[ Thank you. It's the coolest thing we've written. ]
|
|
|
|
Please could you tell me any ways to violate the security of a "MacAdmin"
|
|
based system on the Apple Macintosh.
|
|
|
|
[ What's a Macintosh? ]
|
|
|
|
Mark "Vombat" Brown
|
|
|
|
May phrack and Fiona live forever!
|
|
|
|
|
|
[ ...and may Phrack and Fiona do a joint project some time soon... ]
|
|
|
|
|
|
0x25>-------------------------------------------------------------------------
|
|
|
|
|
|
Hey, I sent this to you because yer handle is shorter.
|
|
Anyways, great job on issue 50, always a pleasure to read it, and
|
|
in article 12, by Sideshow Bob, I was wondering about the "tail"
|
|
command. I don't seem to have this nifty util, and was wondering
|
|
if perchance, you knew where I could get a copy. Also: the Skytel
|
|
article sorta looked like an advertisement to me. Nothing against that, it's
|
|
still pretty interesting to learn of Skytel's history, and of the nifty things
|
|
out there, but I was wondering if it sounded like a detailed ad to anyone else.
|
|
But if you could help me out with the tail command, I'd be so grateful.
|
|
Joel Thomas
|
|
|
|
[ Standard GNU utility. Try your local unix box. ]
|
|
|
|
0x26>-------------------------------------------------------------------------
|
|
|
|
|
|
|
|
|
|
|
| G'day mate,
|
|
| I am a computer user in Camplong, Timor. I have limited internet access, as
|
|
| it is a long distance phone call from home. I have downloaded your issues
|
|
| 46-50 and haven't read through them all yet, but what I see looks good.
|
|
| What I need from you is a UUENCODER program so I can extract the included
|
|
| files.
|
|
|
|
[ Standard GNU shell tool. Any Unix host will have it. Do a websearch
|
|
to get it for Windows. ]
|
|
|
|
| I am also confused on how to extract the .c files from the text
|
|
| files(philes?).
|
|
|
|
[ As it says in the header file: gcc -o extract extract.c
|
|
|
|
then `extract filename` ]
|
|
|
|
| I am not a C programmer, but my dad is.
|
|
|
|
[ That's nice. ]
|
|
|
|
|
|
|
| I need PGP. Although my side of the internet is safe, noone reading others
|
|
| letters (the sysop is too dumb or something to even think about that) I want
|
|
| my mail to get where it is going in one piece unread. Where can I find a
|
|
| free copy of PGP?
|
|
|
|
[ Do a websearch. ]
|
|
|
|
0x27>-------------------------------------------------------------------------
|
|
|
|
|
|
|
|
.. crack me up. Excellent social porno in your reader's letters section.
|
|
Keep on commenting. Might start screaming soon.
|
|
|
|
Um, the guy from slovakia might want to get hold of Bill Squire for
|
|
information on smartcard programmers; as I seem to recall, he likes
|
|
messing with these electronic devices.
|
|
|
|
Another thing; I though DC was now just sticking to his viola? According
|
|
to all the news he only started hacking because someone vandalized it?
|
|
Wonder if I should have used the same thing in my case: "I plead not
|
|
guilty, Magistrate sir, but the University's good-for-nothing courses
|
|
drove me to it." Whatever it takes, I guess..
|
|
|
|
Yum.
|
|
|
|
-me.
|
|
|
|
|
|
0x28>-------------------------------------------------------------------------
|
|
|
|
|
|
This is a response to p48-02 in which one "Mr. Sandman" proceeded to spew
|
|
out eleven paragraphs of blatant misinformation. Rather than lumbering
|
|
through a point-by-point rebuttal to his letter, I will quickly summarize
|
|
what was wrong with it, and then state a few facts to clarify some things.
|
|
|
|
KoV never touched Skidmore. This is something that anyone who was in the
|
|
group will attest to. And not just to follow the old "admit nothing, deny
|
|
everything" plan. In reality, we NEVER touched it.
|
|
|
|
In retrospect, I find it very odd that someone from New York would claim
|
|
to know so much about the inner workings of a decidedly regional
|
|
[Connecticut] hacker collective. While we weren't exactly xenophobic, we
|
|
certainly didn't go out of our way to divulge information about ourselves
|
|
to anyone outside the group (or the state, for that matter). This would
|
|
explain why Mr. Sandman's letter was riddled with insufferably laughable
|
|
lies that were obviously the product of a jealous and dejected outsider.
|
|
|
|
One thing that needs to be put to rest is that we were certainly not "a
|
|
bunch of egotistical and immature criminals" as Mr. Sandman would have you
|
|
believe. The primary focus of KoV's efforts was not to "break into
|
|
universities" or "make ourselves look bigger and more important than we
|
|
were." We existed, first and foremost, to unify what was, at that time, a
|
|
greatly divided scene. Squabbling and infighting among those few real
|
|
hackers who were still around was leading to a critical breakdown at the
|
|
fundamental level. Something had to be done, and fast. In an effort to
|
|
bring together a group of like-minded individuals (not only from the
|
|
hacker perspective but also in terms of anarcho-libertarian philosophy and
|
|
ideology), I started KoV with an intentionally humorous name behind the
|
|
acronym. It was an almost immediate success, and over time I certainly
|
|
accomplished all that I'd set out to do, and then some.
|
|
|
|
The current state of the "Connecticut hacker scene" (for lack of better
|
|
terminology) is much different than it was in the summer of 1994. People
|
|
are working together, cooperating, and the incessant "civil wars" which
|
|
plagued us back then are all but nonexistent today. I think I'd be well
|
|
within my rights to credit KoV with helping to assure that those problems
|
|
are now but a memory. It really bothers me when anonymous instigators like
|
|
Mr. Sandman attempt to dishonor all the work that we did to get this far,
|
|
without even really having a clue as to what we were (and are) all about.
|
|
Perhaps he and his ilk could benefit from such groups as KoV. Because no
|
|
matter how I feel about him and his actions...
|
|
|
|
"The more we fight among ourselves,
|
|
the less of a threat we are to the system."
|
|
|
|
- Valgamon
|
|
Sat Jun 07 15:49:25 EDT 1997
|
|
|
|
|
|
0x29>-------------------------------------------------------------------------
|
|
|
|
What up.
|
|
|
|
Yo, Ima hack/phreak from back in the day (1984)
|
|
|
|
My 1st bbs was on an atari with a floppy drive and 64k!
|
|
|
|
Nowadays, I do rap music and acting, live in Los angeles (im from western NY),
|
|
and run 900#s and adult websites.
|
|
|
|
Check this out, I need to thangs:
|
|
|
|
#1: FTP space for adult pix (not really important, since my host gives me
|
|
unlimited space), but I have no anonymous ftp capabilities)
|
|
|
|
#2: Windows NT or unix
|
|
|
|
Can you help??
|
|
|
|
Have broom (Music software) will travel (trade)
|
|
|
|
|
|
[ We will trade you unix for a rap song about Phrack and a movie role
|
|
for route. ]
|
|
|
|
0x2a>-------------------------------------------------------------------------
|
|
|
|
|
|
This is in reference to the first part of your " PGP Attack FAQ," which
|
|
addresses the length of time necessary to brute force IDEA. Perhaps I'm
|
|
overly paranoid (naw...) or just a perfectionist, but I would like to
|
|
point out two things about this:
|
|
|
|
1) Somewhat of an error in your math?
|
|
2) "As far as present technology is concerned."
|
|
|
|
"As we all know the keyspace of IDEA is 128-bits. In base 10 notation
|
|
that is:
|
|
|
|
|
|
340,282,366,920,938,463,463,374,607,431,768,211,456.
|
|
|
|
To recover a particular key, one must, on average, search half the
|
|
keyspace. That is 127 bits:
|
|
|
|
|
|
170,141,183,460,469,231,731,687,303715,884,105,728.
|
|
|
|
If you had 1,000,000,000 machines that could try 1,000,000,000 keys/sec,
|
|
it would still take all these machines longer than the universe as we
|
|
know it has existed and then some, to find the key. IDEA, as far as
|
|
present technology is concerned, is not vulnerable to brute-force
|
|
attack, pure and simple. "
|
|
|
|
Somewhat of an error in your math
|
|
========================
|
|
|
|
OK, let's examine the math. For simplicity, let's say we only had one
|
|
machine that could try 1,000,000,000 keys/sec. The number of seconds it
|
|
would take for this machine to search half the keyspace, and thus find
|
|
the correct key would be
|
|
170,141,183,460,469,231,731,687,303715,884,105,728 divided by
|
|
1,000,000,000. This would yield 170,141,183,460,000,000,000,000,000,000
|
|
seconds of maximum search time before finding the key. This in turn
|
|
would be 2,835,686,391,010,000,000,000,000,000 minutes =
|
|
47,261,439,850,100,000,000,000,000 hours =
|
|
1,969,226,660,420,000,000,000,000 days = 5,395,141,535,400,000,000,000
|
|
years = approximately 5.395 sextillion years. If there are 1,000,000,000
|
|
of these machines as you suggest, then the years required for a
|
|
successful brute force crack would be 5,395,141,535,400,000,000,000 /
|
|
1,000,000,000 = 5,395,141.5354. So, it comes down to: are you saying
|
|
that these 1,000,000,000 machines are acting as a collective entity or
|
|
can *each* one of these machines operate on 1,000,000,000 keys/sec and
|
|
thus operate together at a speed of (1,000,000,000) * (1,000,000,000) =
|
|
1,000,000,000,000,000,000 keys/sec. If the first is true, then you are
|
|
correct in saying that "it would still take all these machines longer
|
|
than the universe as we know it has existed and then some," as it would
|
|
take app. 5.395 sextillion years (scientists estimnate that universal
|
|
redshift shows the universe to have existed thus far for only 15 billion
|
|
years). If the second is true, then it would take far less time than the
|
|
existence of the universe at app. 5.395 million years... which could be
|
|
compared to twice the amount of time human beings have existed on earth,
|
|
or just a fraction of the time dinosaurs were here.
|
|
|
|
|
|
[ Hrm. Take it up with Schneier. ]
|
|
|
|
|
|
"As far as present technology is concerned."
|
|
=============================
|
|
|
|
How far is present technology concerned?! The Intel/Sandia Teraflops
|
|
Supercomputer can reportedly perform 1.06 trillion floating point
|
|
operations per second (refer to
|
|
http://www.intel.com/pressroom/archive/releases/cn121796.htm). Assuming
|
|
|
|
[ Keep in mind that factoring and brute force key searches are
|
|
integer-based calculations, not floating point operations. ]
|
|
|
|
one of these "instructions" can operate on, let's say something around a
|
|
28th power float variable, then disregarding read/write operations, the
|
|
system can search at 1.06 trillion keys/sec. This yields a total search
|
|
time (before a successful "hit") of
|
|
170,141,183,460,469,231,731,687,303715,884,105,728 / 1.06 trillion =
|
|
160,510,550,434,000,000,000,000,000 seconds = 5,089,756,165,470,000,000
|
|
years or 5.089 quintillion years... still a rediculous amount of time
|
|
even on the fastest publicised system in existence. Now, this system,
|
|
the Intel/Sandia Teraflops Supercomputer is made up of 9,200 200 MHz
|
|
Pentium Pro processors. Being that they didn't have to buy them at
|
|
markup/retail and they manufacture them from scratch for their own
|
|
purposes, let's say it cost $500 per chip plus some negligible ram and
|
|
labor costs (how much ram do you need when you have a gig+ worth of
|
|
onboard cache, etc.). With 9,200 chips, the system would take about
|
|
$4,600,000 to build. A practical question: if federal taxation is %28 on
|
|
an annual income of $80,000, where does all the money go? Well, let's
|
|
say a Billion dollars per decade goes to the NSA to build whatever they
|
|
want. If the 9,200 chip system cost $4,600,000 then a little algebra
|
|
reveals that with one billion dollars, the NSA could purchase
|
|
approximately 2 million 200 MHz pentium pros. If the 9200 chip system
|
|
did 1.06 trillion keys/sec, thus the 2 million chip system would be
|
|
capable of approximately 230,434,782,609,000 keys/sec or app. 230
|
|
trllion keys/sec. Now, say the NSA is smart enough not to buy crappy x86
|
|
chips and instead get 500 MHz DEC Alpha RISC chips. This is 300 Mhz or 3
|
|
fifths faster than a 200 MHz pentium pro approximately. so 230 trillion
|
|
+ (230 trillion * 3/5) = 368,695,652,174,000 or 368 trillion keys/sec.
|
|
The original calculation yields that the successful search time would be
|
|
170,141,183,460,469,231,731,687,303715,884,105,728 / 368,695,652,174,000
|
|
= 461,467,832,499,000,000,000,000 seconds = 14,633,048,975,700,000. Ok,
|
|
great... so now we're down to 14.6 quadrillion years of search time,
|
|
which means that at least now we may get REALLY lucky and hit the right
|
|
key within a certain degree of insanity. But, this was only a billion
|
|
dollars we gave the NSA in a decade. If we're especially paranoid, let's
|
|
say the government was so concerned over nuclear terrorists sending
|
|
encrypted messages, that the NSA got a TRILLION dollars to build a
|
|
system. That divides the whole equation by a thousand making the search
|
|
time 14,633,048,975,700 years or 14.6 trillion years... STILL
|
|
rediculous. Ok, so let's say that now we're giving the NSA a HUNDRED
|
|
TRILLION DOLLARS thus dividing the search time by 100 yielding
|
|
146,330,489,757 years which is about ten times longer than the existence
|
|
of the universe. But now, if we had 1,000,000,000 of *these* machines
|
|
working concurrently the search time would wind up being 146.330489757
|
|
years. But, if each RISC processor were replaced with a small piece of
|
|
nanotechnology, each piece of this nanotech being 100 times faster than
|
|
the alpha chips, you get 1.46330489757 year. There ya have it... some
|
|
classified nanotechnology, 100 trillion dollars, and a DAMN lot of
|
|
landmass all multiplied by 1,000,000,000 and you've brute forced IDEA in
|
|
a year and a half. I won't go into the tedious calculations, but an
|
|
object with the surface area of two of our moons would approximately be
|
|
able to house this complex. Now, as I know you're asking about where to
|
|
store all the keys... and the fact that this drive would be bigger than
|
|
a solar system and so on, just have the keys generated using the same
|
|
PRNG in the brute force attack... you'll just have three times the
|
|
instructions (write for the generation, read to get it, write to compare
|
|
it) so multiply the search time by three. The technology is possible...
|
|
it's economics and territory that doesn't work.
|
|
|
|
[ Theorectially shure. But you have sorta just proved the point that
|
|
it is not feasible. ]
|
|
|
|
--gKHAN
|
|
|
|
|
|
0x2b>-------------------------------------------------------------------------
|
|
|
|
|
|
The snippit in P50 in section 02 of the zine by Xarthon entitled
|
|
|
|
> Yet another Lin(s)ux bug! "IP_MASQ fails to check to make sure that a
|
|
> packet is in the non routable range." "So in conclusion, you are able to
|
|
> spoof as if you are on the inside network, from the outside. "
|
|
|
|
Is so incomplete I would almost call it a lie. The only way that Linux
|
|
would do this is if the person setting up the IP-Masq system issued the
|
|
command "ipfwadm -F -p masquerade" which if you read the IP-Masq HOWTO it
|
|
tells you explicity NOT to do for this very reason. My retort for Xarthon
|
|
and all others who do stupid ass things like leave port 19 open and such;
|
|
is that Linux only sux if you do. To wit, don't be a moron, and you won't
|
|
have to complain that it sucks.
|
|
|
|
Swift Griggs | UNIX Systems Admin
|
|
|
|
|
|
0x2c>-------------------------------------------------------------------------
|
|
|
|
|
|
Hi there,
|
|
|
|
I have a question regarding a certain piece of hardware that has come
|
|
into my possession. Since this little piece of equipment contains no
|
|
indications of its intended use i have no idea what this thing could do.
|
|
So here's a descrition of the little box; i hope you might be able to
|
|
provide me with more information on what this device is supposed to do.
|
|
|
|
Description:
|
|
-lightgrey rectangular casing (13CMx9CMx3CM)
|
|
-frontpanel has one green LED, a connector labeled "SCANNER", and a
|
|
little door which reveals two sets of dipswitches (2 sets of 8, labeled
|
|
"DIPSW1" and "DIPSW2")
|
|
-backpanel has three connectors, a RJ4-like connector (only it has 6
|
|
lines instead of 4; it looks like a connector for a Memorex Terminal)
|
|
labeled "A", a standard IBM-PC keyboard connector labeled "B", and a
|
|
small (9-pin) serial interface-connector labeled "C".
|
|
-there is a sticker with a serial number, a barcode, and "Made in
|
|
Taiwan" on the bottom
|
|
-the circuit-board contains IC's of Sony, Philips, and TExas Instruments
|
|
-there is also one removable EPROM, made by AMD; it has a label on it
|
|
which reads "V2.61 CS:EF88"
|
|
|
|
|
|
I have found that a normal keyboard plugged into connector B, while a
|
|
KBD-to-RJ-jack cord is plugged into connector A will allow the box to be
|
|
placed between the keyboard and the kbd-port; so my first guess would be
|
|
that this is some kind of filtering device. But that doesn't explain why
|
|
there is a serial-connector and this "SCANNER" connector present.
|
|
|
|
So, do you know what this thing is ?
|
|
|
|
-lucipher.
|
|
|
|
[ Readers? ]
|
|
|
|
0x2d>-------------------------------------------------------------------------
|
|
|
|
|
|
hi, my friends.i am a newbie come from China,i had read some Phrack magazine.
|
|
but to me surprise,i had not success compile a program still now.i send e-mail
|
|
to the author,but server tell me there is no this user.
|
|
for example, phrack-49-15 describle tcp port scan,but i can not find
|
|
ip_tcp.h, other paper tell me a way to guess password,and said the program only
|
|
need Ansi complier,but i can not success too. oh.my god.
|
|
i use sun os ,gcc, i need your help, thanks.
|
|
yours
|
|
keven zhong
|
|
|
|
[ Here at Phrack, we use TheDraw for ANSI compilers. I hope that
|
|
answers your question. ]
|
|
|
|
0x2e>-------------------------------------------------------------------------
|
|
|
|
|
|
I'm just writing this to say thanks to all the hackers that represent Phrack
|
|
and work hard to keep it going,you guys are truly keeping the new generation
|
|
alive.If it weren't for Phrack i'd probably never have wanted to waste my time
|
|
with computer's,the technical info is first class and a lot better than most
|
|
of the crap out there.I would suggest that maybe once in a while u guys could
|
|
write some more stuff geared towards the newbies,it really is important
|
|
because most people who aren't familiar with the terms get completely
|
|
lost.Down here in Montreal(514),most people think hacking is spreading virri
|
|
or u/l shitty trojans,there's no talk about unix or networks.We really need
|
|
some help down here,the scene is practically dead and most newbies don't have
|
|
any support to help them get started.Anywyas i just want to say keep up the
|
|
good work,and it's really appreciated.
|
|
--
|
|
| Return Address: Dave.Conway@claw.mn.pubnix.net
|
|
| Standard disclaimer: The views of this user are strictly his/her own.
|
|
|
|
[ Thanks, if anyone cool is in Montreal, e-mail this guy and revive
|
|
your scene. ]
|
|
|
|
|
|
----[ EOF
|