| ==Phrack Inc.== | |
| Volume Three, Issue 29, File #5 of 12 | |
| [-][-] [-][-] [-][-] [-][-] [-][-] [-][-] [-][-] | |
| [-] [-] | |
| [-] Covert Paths [-] | |
| [-] [-] | |
| [-] by [-] | |
| [-] [-] | |
| [-] Cyber Neuron Limited and Synthecide [-] | |
| [-] [-] | |
| [-] November 1, 1989 [-] | |
| [-] [-] | |
| [-][-] [-][-] [-][-] [-][-] [-][-] [-][-] [-][-] | |
| When cracking a system, it is important for you to use a path to the system | |
| that will not lead the authorities to your door step. | |
| There are several methods for doing this and all of them will depend on your | |
| destination, available time, goal and the phase of the moon. This article | |
| deals mostly with cover attacks via a connected network. | |
| If attacking via a phone link: | |
| o Tap in to your local payphone line and red box or "sprint" the call. | |
| o Using a long haul service (like Sprint or MCI) to dial into systems in | |
| remote cities. [This should hinder a track by a good order of | |
| magnitude.] | |
| o Use a midnight packet switching network (eg: PC-Pursuit, Tymnet, et. al.) | |
| o All the above. | |
| If attacking from a network (eg: the Internet) there are ways of spoofing the | |
| packet headers, but this requires superuser privileges on the system you are | |
| attacking from and a fair amount of 'C' programming expertise. Therefore, this | |
| will not be discussed here in any more detail. | |
| Another obvious trick is to use network routers and gateways along with guest | |
| accounts to "route" your data path. This will cause the person tracking you to | |
| have to go though more red tape and hassle to track you. This gives you more | |
| time to cover your tracks. | |
| Some useful paths I know of are: | |
| accuvax.nwu.edu | |
| cory.berkeley.edu | |
| violet.berkeley.edu | |
| headcrash.berkeley.edu | |
| host: violet.berkeley.edu host: headcrash.berkeley.edu | |
| account: nobody account: netgate | |
| net address:128.32.136.22 net address: 128.32.234.31 | |
| host: cory.berkeley.edu host accuvax.nwu.edu | |
| account: terminal account: telnet | |
| net address: 128.32.134.6 net address: 129.105.49.1 | |
| host: lightning.berkeley.edu host: score.stanford.edu | |
| port: 8033 account: guest | |
| net address: 128.32.234.10 net address: 36.8.0.46 | |
| The accounts nobody, netgate, and terminal at Berkeley are accounts that were | |
| installed so that people can use the system to rlogin or telnet to an account | |
| elsewhere without a local login (or so I am told by the local hackers [Hi | |
| Audrey...]). The lightning path/method can be accessed by the command: | |
| "telnet lightning.berkeley.edu 8033". | |
| I am interested in hearing about other Internet access accounts that are | |
| available out there. If you know of any please send them in. | |
| Tymnet is also a useful method of gaining access to systems. From Tymnet, you | |
| can hook up to just about any computer and use the other methods to go one step | |
| further. It's not until you are traced back to the computer you linked to from | |
| Tymnet that they can even begin to follow you back. My understanding is that | |
| for a systen to find your Tymnet node, they must contact Tymnet personally and | |
| ask them to put a trap on their connection. | |
| For more infomation concerning Tymnet see the article "Hacking & Tymnet" by | |
| Synthecide in Phrack Inc. Newsletter Issue XXX. | |
| ********************************** | |
| >--------=====END=====--------< | |