| ==Phrack Magazine== | |
| Volume Five, Issue Forty-Five, File 27 of 28 | |
| **************************************************************************** | |
| International Scenes | |
| There was once a time when hackers were basically isolated. It was | |
| almost unheard of to run into hackers from countries other than the | |
| United States. Then in the mid 1980's thanks largely to the | |
| existence of chat systems accessible through X.25 networks like | |
| Altger, tchh and QSD, hackers world-wide began to run into each other. | |
| They began to talk, trade information, and learn from each other. | |
| Separate and diverse subcultures began to merge into one collective | |
| scene and has brought us the hacking subculture we know today. A | |
| subculture that knows no borders, one whose denizens share the common goal | |
| of liberating information from its corporate shackles. | |
| With the incredible proliferation of the Internet around the globe, this | |
| group is growing by leaps and bounds. With this in mind, we want to help | |
| further unite the communities in various countries by shedding light | |
| onto the hacking scenes that exist there. If you want to contribute a | |
| file about the hacking scene in your country, please send it to us | |
| at phrack@well.com. | |
| This month we have files about the scenes in Argentina, Australia and Greece. | |
| ________________________________________________________________________________ | |
| Argentina: Hacking at the ass of the world | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by: OPii. | |
| Yeah, i know, it's something you just can't stop, whenever you try to sleep | |
| that recurrent idea comes and recurses through your very brain, you are | |
| blind, it happens to be worse than MTV, you just can't get to sleep, you stay | |
| up for hours, you forget to feed yourself, you can't even remember your name, | |
| you turn catatonic, you stand still stretching every nerve and mumbling | |
| "hhmmpff..sc.eenn...arghh..teennn..ahhh..." and then you explode in a | |
| terrifying scream... | |
| "ARRRGHHHHHH, WHAT THE FUCK IS GOING ON IN ARGENTINA??????" | |
| Right? | |
| NO???? | |
| Well, I never really thought that could happened but I'm gonna answer | |
| the question anyway, I know you probably don't give a fuck about Argentina | |
| and it's scene but, hey, reading shitty text files is not new to you so | |
| you wanna change your habits RIGHT NOW? Nahhhhhhhh | |
| Introduction | |
| ~~~~~~~~~~~~ | |
| Ok, enough is enough, so let's get to the point. | |
| Argentina is lagging. While other countries are flying toward the hyper | |
| publicized "Data Highway", Argentina is still trying to fork it's path in | |
| the telecommunication's jungle. And this has it's pros and cons. | |
| Before 1990 the telecommunications in Argentina were in hands of Entel, | |
| the government's monopolistic arm that ruled the area. But, and there's always | |
| a BUT, the service provided by Entel was worse than bad. For too many | |
| people it was normal to wait YEARS for a line, paying $1000+ when they | |
| finally got it installed, and then a never-ending nightmare began, | |
| if it rained, the line went dead, if it didn't die it went crazy, you | |
| could pick up the phone and listen to your favorite radio station but | |
| of course you could not call anyone. Or you could had bizarre conferences | |
| with persons you'd never met...it was basically POTS but with features | |
| that Entel never thought about... N-way calling, call forwarding to hell, | |
| continuous call waiting in the form of line noise, speed dialing to always | |
| busy DNs... | |
| Ahh, you could get a line in less than a month if you paid the $1000 | |
| to some bogus vapor-companies whose workers would came pulling loops out | |
| of their sleeves and installing them quietly (yeah, all completely illegal), | |
| these companies were known as the phone mob. | |
| Remember, Entel was the ONLY company entitled to give you not only a phone | |
| line but the phone itself. | |
| And the bills... the bills always had an encrypted message in them, you needed | |
| a PhD in Black Magic in order to decipher what the fuck the telco was | |
| charging you... but for most mortals the meaning was only one: | |
| PAY, pay whatever we order you to pay, and don't ask why. | |
| You made only local calls? PAY! (local calls are not free in Argentina) | |
| You didn't make that call to Nairobi, Kenya? PAY! | |
| Ohh, but you cant dial outside the country with your line? PAY ANYWAY! | |
| You want to complain? PAY FIRST! | |
| In 1990 the government decided to split Entel in two companies and sell them | |
| to private investors, each company would service either the northern or | |
| southern Argentina, the border being Buenos Aires' downtown (in case you | |
| don't know Buenos Aires is the capital of Argentina). | |
| This was nothing more than giving the monopolistic Entel to two new | |
| monopolistic companies as we will see. | |
| So the government sold Entel and two new companies appeared in Argentina's | |
| communications scene: | |
| - Telefonica de Argentina. Servicing the southern part of Argentina, this | |
| company is formed by the Spanish Telefonica de Espaa (owned by Spanish gov.) | |
| and several Argentinian and foreign investors. | |
| - Telecom Argentina. Services the northern Argentina and it's major | |
| stockholders are France Telecom and STET (Italy). | |
| Also, another two companies where born: | |
| - Telintar. Owned by Telefonica and Telecom. The ONE AND ONLY LD carrier | |
| in Argentina. | |
| - Startel. Guess who owns it? Yeah, Telefonica and Telecom, with some | |
| philanthropic aides like Citicorp, J.P. Morgan and Techint and Perez | |
| Companc ( Argentinian megacorps). Startel provides TELEX and data | |
| transmission services as well as mobile and sea radio links. It runs | |
| the most known Argentinian X.25 PSN (ARPAC). | |
| The government however had to assure minimal control of the companies | |
| and verify that their procedures and actions conform to the Argentinian | |
| laws. That's the duty of the SNC (National Communications Secretary) and | |
| the CNT ( National Telecommunications Commission), the last being some | |
| sort of mirror image of the American FCC. | |
| Did anything changed with the appearance of Telefonica and Telecom? | |
| Did the customers noticed an improvement in the phone service? | |
| Both companies began to "correct" Entel's mess rapidly but personally | |
| I consider it was a little more than nothing for the customer. | |
| They did change loops, trunks, switches, added features, installed | |
| inter-office fiber links, private PSNs and more. But, it's 1994 | |
| now, and I still know zillions of persons that had their line dead | |
| for 4-5 months, or have been visiting the telco offices everyday | |
| during a month complaining about line_noise/no_dial_tone/ | |
| dial_tone_but_no_dialing/cant_receive_calls/cant_dial_certain_NPAs/ | |
| bills_are_way_out_of_scope/etc. | |
| To conclude this section I will only say that: | |
| 1). There's still a telecom. monopoly in Argentina, now in the form | |
| of two private companies. | |
| 2). Service got better but it's still a mess, dirty and expensive. | |
| 3). Both companies enjoyed an explosive economic grow since 1990, their | |
| shares being one of the best things you could get a hold of in the | |
| stock exchange. | |
| The Phony Phone System | |
| ~~~~~~~~~~~~~~~~~~~~~~ | |
| Argentina uses pulse dialing, except for those lucky persons that | |
| have the latest installed switches in their COs. If you don't have | |
| DTMF you HAVE TO ask for it, you can do this dialing 112 (Telecom) | |
| or visiting the office (Telefonica and/or Telecom). Someone will | |
| eventually listen to you and answer: | |
| 1) "Uh???? What's DTMF?" - Forget it, ever considered teaching algebra | |
| to a chimpanzee? | |
| 2) "I'm sorry you can't dial MF with that line" - No luck | |
| 3) "Not a problem, we'll set it for MF" - You bastard! | |
| Switches are Step by Step or Crossbars but since 1990 the number of | |
| electronic, and specially, digital switches has increased constantly. | |
| Both, Telecom and Telefonica, use equipment from many different | |
| vendors: Siemmens, Ericsson, Hitachi, Fujitsu, Northern Telecom, AT&T, | |
| Alcatel, NEC, Spanish companies, Italians, Norwegians, and God only knows | |
| what else. Most switches are either European or Japanesse. | |
| As for PBXs, Siemmens, Ericsson and Fujitsu are the brands of choice for | |
| most companies, with the recent grow of NT's Meridians among large | |
| corporations. | |
| DNs are 7 digits but still 6 digits in low line density locations, | |
| this includes certain areas in Buenos Aires, the capital. Generally, 6 | |
| digit DNs can't complete an international call for themselves, they need | |
| operator assistance ( DDI is the "feature" that allows a subscriber | |
| to make international calls without operator's assistance, geez). Other | |
| features offered are 3-way, conference, call forwarding, call waiting | |
| (can't be fucking disabled temporarily!) and more. Telecom also offers a | |
| service called "Factel" which is a detailed list of all the calls you made | |
| in a billing period (2 months), this comes with your bills and they | |
| charge you for EACH PAGE. | |
| LOCAL CALLS ARE *NOT* FREE. | |
| Toll free numbers (800) where introduced two years ago but so far there are | |
| few 800s to call, one of the few is the CNT's 800 for reception of | |
| complains about the telco's service. | |
| Both Telefonica and Telecom use Frecuency Division Multiplexing (FDM) or | |
| Time Division Multiplexing (TDM) for grouping channels with a bandwidth | |
| of 4KHz into a multiplexed signal, called Base Band, of several channels. | |
| Analog and digital multiplexing is used depending on the equipment | |
| installed. | |
| The hierarchy of groups is as follows: | |
| - Primary Group or Basic Group: 12 4KHz channels for a total bandwidth of | |
| 48Khz, generally placed in the 60-108 KHz space. | |
| There are three ways for forming a Basic Group: Direct Modulation, | |
| Pre-group Modulation or Premodulation, I won't discuss 'em in this | |
| article. | |
| - Secondary Group (aka Super Group): 5 Primary Groups (PG) for a total of | |
| 12x5 = 60 channels and a 240KHz bandwidth., placed in 312-552KHz band | |
| - Master Group (MG): 5 SGs, 60x5 = 300 channels, 1232 Khz. bandwidth | |
| ( 5x240Khz + 32Khz.) in the 812-2044Khz. band | |
| - Super Master Group (SMG): | |
| 3MGs, 3x300 = 900 channels | |
| 3 x 1232Khz + 176 Khz = 3872 KHz bandwidth. (8516-12388 KHz) | |
| For digital multiplexing, using TDM, things are like this: | |
| Pulse amplitude modulation (PAM) is first used to sample the 4Khz | |
| channel, then the PAM signal is quantified in 256 discrete values | |
| ( 8 bits) and this is finally multiplexed as follows: | |
| - A basic 2048 Mbit/s for 30 channels (8Khz/channel for they're sampled...) | |
| - 8 Mbit/s = 4x2Mbit/s ( 120 channels) | |
| - 34 Mbit/s = 4x8Mbit/s ( 480 channels) | |
| - 52 Mbit/s = 6x8Mbit/s ( 720 channels) <--this is not standard) | |
| - 140 Mbit/s = 4x34Mbit/s ( 1920 channels) | |
| - 565 Mbit/s = 4x140Mbit/s ( 7680 channels) | |
| - 900 Mbit/s = 6x140Mbit/s (11.520 channels) | |
| Both DC and AC is used for signalling depending on several characteristics | |
| as trunk length, the switch's technology, etc. | |
| Reverse polarity and E and M signalling is used with DC, while DP | |
| and MF is used with AC. CCITT #3,CCITT #4 or CCITT #5 is used | |
| on international circuits, otherwise R2 is used. | |
| I won't go into the details of the different in band signalling methods as they | |
| are probably well known by you... i'll only point that, as you guessed, | |
| things are set for interesting boxing experiences. | |
| Argentina is the place for the casual explorer in this topic, even "Joe | |
| customer" could choose alternate routes for his local calls, all by | |
| himself, some years ago, prefixing the destination DN with a 3 digit number. | |
| There are other interesting things to ponder here, like the way calls | |
| from one company's zone to the other company's zone are completed, etc. | |
| Also, SxS and Xbar switches are fun to mess with, known their "hidden | |
| features" like line freezing, forced ANIF and forced linkage of the | |
| circuit to a given CO. | |
| Payphones, known as TPAs in local telco. jargon, comes in different | |
| flavors. First, the one that both companies inherited from their | |
| predecessor, Entel, this one sports a rotary dial and needs tokens to | |
| operate. | |
| Then the obsoleted Telecom's "card puncher", needed a card with a mag | |
| strip that the phone would punch each time you used it, these have been | |
| replaced by the new Telecom's modular payphone. (Perhaps it was a piece of | |
| shit and Telecom replaced them right away??? ). You wont find one of these | |
| easily. | |
| Telecom's modular payphone works with cards and wont accept tokens or | |
| coins, these have a cute LCD and controls for volume, language selection | |
| of the messages displayed as well as buttons for redialing and replacing | |
| an exhausted card while a call is in progress. It's uses cards with an | |
| 8 contacts on-card chip. | |
| Telefonica's payphones accept cards AND tokens, they also have a LCD | |
| and buttons for volume, redial, etc. They also use cards with 8 contacts | |
| on-card chip. They skipped the "brilliant" card punching stage so these are the | |
| phones you'll find in Telefonica's area. | |
| NO PAYPHONE WILL ACCEPT REGULAR CREDIT CARDS. | |
| ONE COMPANY'S PHONE CARD IS INCOMPATIBLE WITH THE OTHER COMPANY'S PHONES. | |
| ( this is supposed the change this year? ) | |
| Phone cards cant be recharged when they're exhausted. | |
| ( eh, this is not quite true ) | |
| Telefonica is said to make their payphones accept regular coins any | |
| time noooooooowwwwwwww bahahahahahahah . | |
| The Networks | |
| ~~~~~~~~~~~~ | |
| Networks in Argentina are growing, and are growing fast, but they are | |
| still poor and slow when compared to other countries nets. | |
| LAN are usually based on PCs with Novell's Netware in its different | |
| flavors or some lousy Lantastic. | |
| As for WANs, the computers you'll ran into are IBM mainframes, DEC | |
| VAXes running VMS, and Unixes (generally IBM's RS/6000 w/AIX or lower | |
| end PC clones running SCO). | |
| Still, open systems are being happily adopted and TCP/IP based LANs are | |
| emerging everyday. | |
| There aren't many systems online 24hrs/day but mostly online during work | |
| hours. You'll find most systems unreliable, bad configured, and worse | |
| used. | |
| ARPAC, The Jester's Playground | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| ARPAC (DNIC==7222) is the most known PSN in Argentina. It has dialup | |
| access in more than 30 cities in the country, although the fastest | |
| baud rate for them is an infamous 2400bds. Leased lines go | |
| up to a maximum of 19.2Kbds. | |
| The protocol used is the X.25 suite and ARPAC offers the following | |
| optional facilities: | |
| - Closed User Group. (CUG) | |
| - Fast Select. | |
| - Packet size negotiation. | |
| - One-way logical channels. (outgoing/incoming). | |
| - Non-standard window sizes. | |
| - Reverse charge request and acceptance. | |
| - Multipoint access | |
| - Incoming/outgoing call blocking. | |
| - Incoming/outgoing call blocking to and from CUGs. | |
| Obviously these features, should you accept them, imply a little | |
| extra bucks in your Arpac bill (which will self-destroy your wallet in | |
| five secs.). | |
| Startel, the company that runs ARPAC, uses a unit called PTD (it stands | |
| for Data Transmission Packet in Spanish) for billing purposes. | |
| Packets are 128 bytes and conform a PTD, transmission of 64 bytes or | |
| less are considered as 1/2 PTD. | |
| Startel vacuum cleans it's customers bank accounts this way: | |
| 1) A one time payment for the installation of the X.25 equipment. | |
| 2) A "basic monthly payment" that does not include data traffic. | |
| 3) A "variable monthly payment" that depends on the number of PTDs | |
| handled by Arpac. | |
| As for December 1993 this was calculated considering a fee of $0.007595/PTD | |
| and 1 PTD/min for leased lines + 4 PTD/min for dialup access. Also | |
| remember that those dialing from the PSTN are paying the local call | |
| too. | |
| There are discounts based on the day of week and hour of the | |
| connection: | |
| - Type "A" fee (normal fee) Mon-Fri 06:00-20:00 | |
| - Type "B" fee (40% discount) Mon-Fri 20:00-24:00 | |
| - Type "C" fee (60% discount) Mon-Fri 24:00-06:00 | |
| Sat. 20:00-06:00 | |
| Sun. and | |
| Holidays 00:00-24:00 | |
| International connections are not considered in this figure and are | |
| billed according to Telintar (LD carrier) fees. | |
| A 8% or 18% tax is applicable to all payments. Customers can also | |
| choose a fixed monthly payment instead of basic+traffic payments. | |
| The software used is that of ITAPAC (DNIC 2222) and as far as i know | |
| theres no support to mnemonics instead of the plain X.121 addressing. | |
| Nuas are DNIC+10 digit composed this way: | |
| [07222]XXXX YYYYY PP | |
| ^^^^\^^^^^\^^\__ port/subaddress | |
| \ \ | |
| \ \_ host | |
| \ | |
| \ __ corresponds to a "nodal area" in Startel's | |
| jargon,usually associated with geographic | |
| location. | |
| Some valid entries here are: | |
| 2111,2141,2171,2511,2211,2911,2172,2912... | |
| NUIs, IURs in Startel's babbling, are formed like this: | |
| 9XXXXXXXX/YYYYYY | |
| ^^^^^^^^\^^^^^^\_ this is the password, normally 5/6 alphanumerics, | |
| \ all uppercase. | |
| \ | |
| \__ da nui! X is in the [0-9] range and generally the whole | |
| 8 digits correspond to one of the subscriber's DNs. | |
| So if you were to use ARPAC you'd make a call by typing | |
| .. <enter> upon connection (7E1, <= 2.4kbds) | |
| then | |
| N9<XXXXXXXX>/<YYYYYY>-<nua> ; when using a NUI. or | |
| <nua> ; w/o NUI needs Reverse Charge | |
| ; Acceptance of course. | |
| You don't wanna call them NUIs when talking to Startel personnel | |
| (i.e. social engineering) unless you want to become instantly suspected | |
| to be an evil phraudster (aka haq3R). | |
| "CIBA", The Infamous, or BT Tymnet's retarded child (DNIC==7220) | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| If you cared enough to read the BT Tymnet's worldwide dialups listing | |
| you probably noticed a few entries for Argentina. These were regularly | |
| used by "net explorers" in the mid 80's and were known as "CIBA" among | |
| them. CIBA dialups are 300bds (wow!) and use CCITT v.21 protocol (ATB0 | |
| for your modem). At that time the fastest ARPAC dialup was 1200bds. | |
| All in all CIBA is nothing more than the door to BT Tymnet in | |
| Argentina (node 7407, host 1212). There's no direct access to interesting | |
| utilities such as "xray" and the likes. | |
| NUIs here were stupidly choosen and easily scanned since they followed | |
| two known patterns: | |
| naargXXXXna , and | |
| enargXXXnet X being in the [0-9] range. | |
| Many of these were not passworded. Of course no one would even think to | |
| scan NUIs at 300bds nowadays... | |
| Internet | |
| ~~~~~~~~ | |
| The Internet is rarely know and even less used in the student, | |
| professor, computer and communications professionals circles. It's a | |
| depressive experience to explain the workings of "telnet","rlogin","ftp" | |
| and such "eccentricities" to people who were supposed to know about them | |
| from their TCP/IP books, courses and lectures. You, reader, could | |
| allege that a networked unix system is enough to explain this, but | |
| despite the technical explanations, the political, economic and social | |
| implications of the Internet will remain unknown until a vast amount of | |
| persons actually USE and EXPERIENCE it. And I'm not talking about | |
| "Joe citizen" here, I'm talking about people that would actually NEED | |
| the net if they were to improve their work. | |
| It's like describing the taste of an apple to someone, he'll | |
| surely understand what you say but don't expect him to understand what | |
| it tastes like until he actually bites it. | |
| The Internet top level authority in Argentina is the Foreign Relations | |
| Ministry and its link to the rest of the world is sponsored by the | |
| 'United Nations Development Programme'. 'whois' output follows: | |
| United Nations Development Programme (NET-ARNET) | |
| Ministerio de Relaciones Exteriores y Culto | |
| Reconquista 1088 ler. Piso - Informatica | |
| Buenos Aires | |
| ARGENTINA | |
| Netname: ARNET-NET | |
| Netnumber: 140.191.0.0 | |
| Coordinator: | |
| Amodio, Jorge Marcelo (JMA49) PETE@ATINA.AR | |
| +54 1313 8082 | |
| Domain System inverse mapping provided by: | |
| ATINA.AR 140.191.2.2 | |
| ATHEA.AR 140.191.4.10 | |
| Record last updated on 06-May-91. | |
| Argentina has only an UUCP link (well, once again this is just the publicly | |
| known info...) to the Internet through UUNET, connecting several uucp | |
| linked networks to it (RAN,RECYT,etc). Atina.ar is the most important | |
| host in this scheme, seconded by the Science and Technology Secretary's | |
| host (SECYT) and the University of Buenos Aires (UBA) host located at | |
| the Exact and Natural Sciencies Faculty in a dependency known as the | |
| "CCC". | |
| There's also a company the offers Internet connectivity bypassing atina | |
| and uunet. 'whois' output: | |
| SatLink Uucp/Internet (SATLINK-DOM) | |
| Casilla de Correo 3618 | |
| (1000) Correo Central | |
| Buenos Aires | |
| ARGENTINA | |
| Domain Name: SATLINK.NET | |
| Administrative Contact, Technical Contact, Zone Contact: | |
| Stolovitzky, Horacio (HS3) postmaster@SATLINK.NET | |
| +54-1-983-6740 | |
| Domain servers in listed order: | |
| NKOSI.WELL.SF.CA.US 192.132.30.4 | |
| WELL.SF.CA.US 192.132.30.2 | |
| Record last updated on 24-Mar-93. | |
| There are other links that bypass atina and uunet, all of them part of | |
| corporate networks. (i.e. IBM's VNET, etc) | |
| Although everyone says theres only a UUCP link to the Internet, word is | |
| that there are a few hidden 9600bds leased lines shared among many hosts | |
| at some sites, at any rate this is completely insufficient for servicing | |
| researchers, students and other interested parties, thus the existence | |
| of these links is kept as a sort of secret. | |
| 64kbds links are supposed to be installed for interactive sessions | |
| this year at certain sites. | |
| Other networks | |
| ~~~~~~~~~~~~~~ | |
| Many companies form their corporate networks as CUGs on Arpac, have | |
| their own network, or both. Telcos, consulting firms, banks and | |
| insurance companies fall in these categories and are quite interesting | |
| research projects for the inquisitive hacker. | |
| The "Scene" | |
| ~~~~~~~~~~~ | |
| There's not much to say about the Argentinian scene. Given the cost | |
| and the time you have to wait to get a phone line installed there | |
| aren't many BBSes up 24hrs. Most of them are up during nighttime, from | |
| 10:00/11:00 pm to 6:00/7:00am, of these, very, very few are dedicated to | |
| hack/phreak topics. | |
| Also, considering that theres no decent internet access at your local | |
| university you would be forced to explore X.25 networks in order to | |
| fulfill your natural interest and seek of knowledge. | |
| But there aren't many hackers either. Most Argentinians you'll find on | |
| the nets are mere abusers with one final goal: to get to QSD or the | |
| likes. While this sounds rather amusing (eh) there's an explanation to | |
| it. | |
| In the mid 80's a few Argentinians used to exploit CIBA's clueless | |
| procedures for choosing NUIs. At that time the fastest ARPAC dialup | |
| was 1200bds so 300bds was not that bad after all, and not bad at all | |
| as you were sure you could find a new NUI in a matter of hours. | |
| Yes, many people wasted their diminishing lifes in QSD, but for some this | |
| new x.25 thingie was more than a mean for meeting friends over the net | |
| and having endless chats with them, some needed to learn and understand | |
| the workings of the nets and the many different systems hooked to it. | |
| For those the place was Altos, and AMP (although you couldn't connect to | |
| PSS directly). And Altos proved to be of great help for Argentinians | |
| that got introduced to the hack/phreak world not on a BBS but right on a | |
| X.25 network. And so did the sequel of Korn-chat sites (tchh,lutzifer, | |
| italian "artemus") or even Pegasus and LINA sometimes. | |
| Around '89 or '90 an Efinet (Efinet == Fidonet wannabe) meeting was held, | |
| and during it someone gave out a "strange bunch of numbers in the form | |
| of some sort of code or something" (this being an ARPAC NUI followed by | |
| QSD's NUA) and the attendees ran home and tested it, just to see them | |
| connected to the France chat extrordinaire. Meanwhile, things were | |
| getting hot elsewhere in the world, and those once famous X.25 hangouts | |
| went virtually dead, so these newcomers wouldn't get in touch with | |
| Argentinian hackers (as they wouldn't appear in QSD) or other countries' | |
| hackers (as they were having a bad time or retiring or simply leaving | |
| X.25 alone). So, even if they wanted to learn, these freshmen, for good or | |
| for bad, were on their own and still are... | |
| The vast majority of the argentine society never heard the words "hacker" | |
| or "phreaker" or, if they did, they relate it to things happening in | |
| other countries, far, far away. | |
| It wasn't until '93, in accordance with the apparently boundless tendency to | |
| use the word "cybersomething" when referring to anything remotely related to | |
| new technologies, computers, or scifi novels or any other thing that | |
| requires publicity, i.e. see cyberIdol's cybershitty cyberCD to understand | |
| what I cybermean, uhg excuse me, back to the point... | |
| It wasn't until '92 or '93 that the media discovered this brilliant trend | |
| for selling more and more, apparently some genius said: "Hey, what if we | |
| sell the future? What if we write about how will life be, how will | |
| technology be, how will the planet be, how will your dog be? All this | |
| with some vague journalistic odor of course. I bet we will sell more!". | |
| So they did, and in this frame the hacker/phreak scene is more like the | |
| salt to dress the salad, yet things didn't get to the extreme of | |
| sensationalism and hacking is portrayed as an activity bound to some | |
| new sort of romanticism, still things are very much confused, putting | |
| hackers, phreakers, crackers, pirates, virii authors and mere fraudsters all | |
| together in the same bag (yes, but what would you expect anyway?). Even some | |
| interviews to an ex-hacker (who now runs a data security firm), and a | |
| self proclaimed "expert" ( more a virus expert, IF anything) have | |
| appeared. | |
| On the other side, many "eleet poseurs" have appeared too, but as one | |
| could expect, they are nothing more than mere poseurs and certainly not | |
| worth more than a phrase here. | |
| Final Words! | |
| ~~~~~~~~~~~~ | |
| This is the 'scene' AS I SEE IT, i don't consider myself an enlightened | |
| entity, thus I acknowledge my description might not be objective nor | |
| complete (in fact it might be complete bullshit but, do I care? do YOU | |
| care?). | |
| Argentina is a country where lots of things are still there, waiting to | |
| be discovered, virgin beaches for you to explore and enjoy. Security is | |
| generally lax, and people is generally not security-aware and even less | |
| hacker-aware, trashing and social engineering are simple things that DO | |
| give many benefits. | |
| As far as I know theres no specific law dealing with computer related | |
| crimes (whatever that mean...), and as long as you don't get yourself | |
| involved in the traditional crime pictures you are pretty much safe. | |
| On the other hand, the bad and expensive phone service, the lack of | |
| internet connectivity and the limited number of BBSes dedicated to the | |
| so called "underground" (yes, I did it, I used the damned word, argh) | |
| make things tougher for newcomers. | |
| Perhaps the most interesting thing is that there's not much knowledge of | |
| what hacking/phreaking means and this gives us an unique opportunity to avoid | |
| misunderstandings and errors that occurred in other countries. Perhaps | |
| it is possible to influence people in a positive way, making them think | |
| about secrecy, security, privacy and responsibility issues. We are | |
| still free of Geraldos, we didn't suffer witch hunts ala Operation | |
| Sundevil, the words "hacker" and "phreaker" have not been demonized yet, | |
| although the Orwelian-way is common practice among the telcos, but | |
| nobody seem to give a fuck about this, or maybe nobody notice?. | |
| So, this is it, the file has come to an end and I think it's enough | |
| for an introduction, I did not cover cellular telephony nor satellite | |
| links and companies providing related services, I did not mention many | |
| other things but my intention was to write a description of how things | |
| are here, not a fucking encyclopedia. | |
| If you think that many topics are deliberately vague and not covered | |
| in deep, that some information might be not accurate or if you don't | |
| agree with anything I've stated you can contact me at: | |
| HBO +541-788-4850 24hrs. | |
| Loser's joint +541-658-7983 23:00-6:00 (GMT -3) | |
| Here's my PGP key. DO USE IT OR EXPECT NO REPLIES | |
| -----BEGIN PGP PUBLIC KEY BLOCK----- | |
| Version: 2.3a | |
| mQCNAi1EBdUAAAEEAMdEmi+ajN/WIIvN3jjUQk/wb0CLsXe+K49fX8DuUXvUSpdJ | |
| UCu8wFH82reJWttj3vaMQ/guKADC/VTIbfsRGWZhbvc+7Mb0W/3LPJSj5zpG9O+M | |
| +XF6A7eB6IfncS+p9jU5Tb9lMc/H0BoW4VTpYO/eWK9DJGfAFOA/puxL3X5tAAUR | |
| tB1PUGlpIDxvcGlpQGJpYXBiYS51YmEuZWR1LmFyPg== | |
| =rKbG | |
| -----END PGP PUBLIC KEY BLOCK----- | |
| ------------------------------------------------------------------------------ | |
| The | |
| Australian | |
| Underground | |
| ( or The lack thereof! ) | |
| by | |
| Data King | |
| ATTITUDE | |
| For several years now the Australian underground scene has turned better yet | |
| worse at the same time. The amount of companies and colleges using datacomm | |
| has dramatically increased. In my opinion it is still not yet to the stage of | |
| America in this respect though. | |
| The number of 'hackers' has increased, but I use the term loosely as I do not | |
| consider many of these so called 'hackers' to be hackers. Why do I say this? | |
| I say this because most people who hang out in the underground scene in | |
| Australia consider hacking to be getting an account at a university off of a | |
| friend and then snarfing the password file and running crack over it. They are | |
| only interested in things that will give them access to IRC, FTP & Newsgroups. | |
| ( No flames please I am talking in general here! ) | |
| Many of them have never heard of services like MIDAS, Minerva & AUSTPAC and | |
| even if they were given a dialup to one of these services I doubt they would | |
| have a clue about how to use it. We have a wealth of services out there just | |
| waiting to be tried, but there is almost no one who is interested in doing so, | |
| to give you an example. One night I was working away on my box at about 3am and | |
| a 'hacker' mate had crashed on the couch. I went to dial into one of the local | |
| universities and I misdialed the number. At first I didn't realize that I had | |
| dialed the wrong number since I got a carrier. My modem connected and then just | |
| sat there instead of the usual annex prompt. I bashed the old enter key a | |
| few times and suddenly I was presented with a menu to an accounting system. | |
| 'Sheet,' I thought, and screaming to wake my mate up ( at this stage I thought I | |
| had connected to the university and it hadn't reset the line after the last user | |
| hung up ) I started to explore the system, it soon became evident that it wasn't | |
| the university but something entirely different, by this time my 'hacker' mate | |
| had woken up. 'Whaaaaaaaaat?' comes the response from the couch, I briefly | |
| explained what had transpired and his only response was 'Ughhhhh' as he went | |
| back to sleep. Needless to say I spent the next 3 hours playing with the | |
| system, and by the time I had finished I could crash the accounting menu and | |
| exit to the operating system. | |
| The system turned out to be fairly boring and proved to be of no use to me, | |
| BUT I had to assume that before I knew, it could have been something really | |
| interesting and to spend time fully exploring it, where as my 'hacker' mate | |
| couldn't give a stuff, 'coz it wasn't on internet'. | |
| TECHNIQUES | |
| Australian Hackers no longer seem to be using advanced techniques to penetrate | |
| a system, very few would have any idea how to use TCP/IP to gain access to a | |
| system. Most satisfy themselves with obtaining an id elsewhere and then | |
| snarfing the password file and running crack over it. When it comes to things | |
| such as VMS the attitude I usually encounter is "VMS urgh, what bloody good | |
| is it!". There are some very good Hackers in Australia but most of them do | |
| not hang around in the underground scene, rather they are usually university | |
| students who learn how to make the best use of the system. Writing things like | |
| ICMP bombs, and Sniffers is usually left to these people, in fact I can not | |
| think of any active non university student hacker who lives in Australia and | |
| uses these sort of techniques. | |
| CONS | |
| To the best of my knowledge there has only ever been one underground conference | |
| in Australia, and that was from memory in 1984, it was called Hackfest and it | |
| was nothing compared to HOHOCON or Hacking at the End of the Universe. | |
| At the time we all thought it was great, and I must admit it did boost the | |
| sharing and finding of new info for a while. | |
| I, in association with one or two others, have been thinking of arranging | |
| another Hackfest to be held in 1994, it will probably be held in Melbourne, | |
| Australia. If you live in Australia and would like to attend then mail me | |
| and I will keep you informed. ( Det. Sgt. Ken Day: Don't bother trying to | |
| spy on Hackfest if it goes ahead, you're more than welcome to attend! ) | |
| NETWORKS | |
| In Australia we have several national and international networks, here is a | |
| list of some of them: | |
| MIDAS International Packet switching network DNIC = 5053 | |
| Minerva Automated Office Network w/ International PSS | |
| AUSTPAC Australian Packet Switching Network DNIC = 5052 | |
| SprintNET Need I explain this??? | |
| AARNET The Australian Network that covers Internet in Australia | |
| TRAN$END Subset of Austpac ( used by Banks for ATM/EFTPOS transmissions ) | |
| Compuserve Need I explain this??? | |
| Discovery Australian Videotext system ( Not sure if still in Service ) | |
| ????? The Australian Military Network ( Don't know its name ) | |
| TAXLAN The Australian Tax Office ( IRS ) Network | |
| PHREAKING | |
| For years people in Australia believed that phreaking was only really possible | |
| by pitting, this included Telecom Investigations Department, but we know that | |
| this is not true. Methods that have been used in Australia include: | |
| Blue Boxing off of an American Operator Line | |
| Pitting ( ie: Linemans handset connected to a telecom junction box ) | |
| Clicking ( Electric shock to a public phone ) | |
| Boxing off of a disconnected number ( almost impossible now ) | |
| Calling Cards ( both American and now Australian Calling Cards ) | |
| PBX's ( 0014-800's and local PBX's ) | |
| Mobile Telephones ( ie Cellular Phones and b4 that the old Radio mobiles ) | |
| There are probably other methods as well but I am not a phreaker so I am not | |
| the best person to comment on this. Boxing in Australia is getting dangerous | |
| now as we are getting more and more of the new digital exchanges which make it | |
| a lot easier to trace, or at least so I am told. | |
| There were some people in South Australia making/recharging Telephone cards, | |
| ( Like a disposable calling card, but you buy them in news agents and they | |
| have a dollar value, once used up you throw them away ) but these people were | |
| apparently caught and telecom have taken measures to ensure that this is no | |
| longer possible. | |
| VMB'S | |
| We have a large range of VMBs in Australia, and with the proliferation of | |
| VMBs has come the art of Hacking VMBs, we even have people here in Australia | |
| that do virtually nothing else other than play with VMBs. These people tend | |
| to go a lot further than just cracking the pin numbers, some of them have | |
| learned enough about the signalling systems used by these systems to virtually | |
| take control of the system and make it do what they want. Once again this is | |
| an area that I do not know a lot about. | |
| We also have a couple of individuals that run something called the Scene Inpho | |
| line, Which essentially is a VMB with a long recorded message giving out tips, | |
| rumors, and general rubbish. The number to the Scene Inpho Line unfortunately | |
| constantly changes as the owners of the VMB notice what's going on and shut | |
| that particular box down. | |
| BULLETIN BOARDS | |
| There are not a lot of good underground BBS's in Australia, a couple that I | |
| know of that come to mind are Destiny Stone II, Empire of Darkness, | |
| & Watchtower. I can not comment on Destiny Stone II as I have never called it. | |
| However, when I used to called Empire of Darkness it was so lame it wasn't funny | |
| and now he has gone 96+ only I can't call it ( I'm poor and can't afford a | |
| new modem ;) ). | |
| Watchtower showed potential but unfortunately the sysop of it is very slack and | |
| needs to get off of his butt and do some work on it! The underground boards in | |
| Australia tend to reflect the general state of the scene, ie: complete and total | |
| apathy! | |
| Most H/P boards in Australia are also warez sites and tend to be pretty lame and | |
| insecure because of all the warez puppies on them, I can not think of a really | |
| good board in Australia that is still operating. | |
| BUSTS | |
| In the last year the Australian Federal Police, Computer Crimes Unit has been | |
| quite busy raiding people. As a result there have been 4 convictions that I | |
| know of, and another 2 people waiting for charges to be laid. | |
| The people convicted and there sentences are as follows: | |
| Data King (me) Guilty but no record ( escaped conviction under section 19b of | |
| the act ) $300.00 fine and $500 2 year Good Behavior bond. | |
| ( Pleaded Guilty to 2 Charges ) | |
| Electron 6 Months Jail ( suspended sentence ), $500 6 Month Good | |
| Behavior bond, & 300 hours Community Service Work. | |
| ( Pleaded Guilty to 14 Charges ) | |
| Nom 6 Months Jail ( suspended sentence ), $500 6 Month Good | |
| Behavior bond, & 200 hours Community Service Work. | |
| ( Pleaded Guilty to 2 Charges ) | |
| Phoenix 12 Months Jail ( suspended sentence ), $1000 12 Month Good | |
| Behavior bond, & 500 hours Community Service Work. | |
| ( Pleaded guilty to 15 Charges ) | |
| In the most part people get busted in Australia due to either their stupidity | |
| ( Hi Phoenix! ), being lagged in by some low life, or by trusting someone they | |
| should not of ( Hi Phoenix! ). | |
| LEGALITIES | |
| Both Hacking and Phreaking have been illegal in Australia for quite a few years | |
| I will not go into details here as hopefully there will be an article in this | |
| issue of Phrack covering the laws and possible penalties. | |
| Computer Crime in Australia is the responsibility of the Australian Federal | |
| Police Computer Crimes Unit. The people known to us in this unit are: | |
| Det. Sgt. Ken Day | |
| Det. Neil Campbell | |
| Det. Steve Visic | |
| ( Sorry guys if I spelled your names wrong - NOT! ;) ) | |
| If you are able to add any names to the list, please mail them to me and any | |
| other info you have on them. That way we can begin to build up a dossier on | |
| our enemies! | |
| PUBLIC | |
| There seems to be a growing awareness in the general populace of Australia. | |
| There has been quite a bit of media hype on hacking over the last year, and | |
| slowly the public seems to be getting a great fear of hackers. To me it seems | |
| ridiculous, as the only real hackers that the public should have feared lived | |
| in the early 80's. Today's generation of Australian hackers are pretty HOPELESS | |
| in my humble opinion. To give an example, when Electron, Nom, & Phoenix's court | |
| cases were getting media attention I was sitting in my parent's lounge room one | |
| night when the news was covering their sentencing. My father thought that | |
| these people were very dangerous and should have gotten a bigger sentence than | |
| they did. At this time he did not know about my bust. I have explained it to | |
| him now but he still doesn't seem to understand...oh well that life I guess. | |
| CONCLUSION | |
| This is how I see the Australian scene, If you disagree, want to comment, send | |
| me info for future articles, get on the hackfest mailing list, or just want to | |
| have a chat you can mail me at: | |
| dking@suburbia.apana.org.au | |
| If you require privacy you can send me stuff that is encoded via pgp, my | |
| pgp public key is as follows: | |
| -----BEGIN PGP PUBLIC KEY BLOCK----- | |
| Version: 2.0 | |
| mQCNAi0t3M4AAAEEAMPZMexyZ+Nxz8Ry1w9R7pTLFGM7xk0MwJ/izS687UIJLzc5 | |
| l38jFM0bEcuSukRrLkBYIDdiAgOdn50cJmKOPyvE4FvR2eh2dbdHyFKzaVWVe5zE | |
| HZhNx2o0kb6SRIQHu8Vh/pkl+S29RKzDbIgMLLjOCwN0V1/RUal4ROOqDaCbAAUT | |
| tCdEYXRhIEtpbmcgPGRraW5nQHN1YnVyYmlhLmFwYW5hLm9yZy5hdT4= | |
| =ttmq | |
| -----END PGP PUBLIC KEY BLOCK----- | |
| I can also usually be found on IRC a couple of hours a night in these channels | |
| under the nick of dking: | |
| #apana #hack #phreak #linux | |
| Thanks for assistance with this file go to: | |
| SPiN-DoC Olorin | |
| & | |
| Connie Lingus | |
| ( Motivational Support - <SMILE> ) | |
| Have phun, and remember: | |
| BE CAREFUL OUT THERE! | |
| ============================================================================== | |
| ()()()()()()()()()()()()()()()()()()()()()()()()() | |
| () () | |
| () "Australian Hacking Laws" () | |
| () () | |
| () 21/01/93 () | |
| () () | |
| () (c) Data King () | |
| () () | |
| ()()()()()()()()()()()()()()()()()()()()()()()()() | |
| Crimes Act 1914 (Commonwealth) | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Part VIA - Offences Relating to Computers | |
| Section 19B (1) Order & Recognizance | |
| The Court can discharge you under this section, with a surety and/or | |
| recognizance given by you. | |
| If discharged under this section you may be put on a good behavior bond | |
| of up to but not exceeding 2 years. Other conditions may be placed on you | |
| by the court also, this conditions can be anything that the court considers | |
| appropriate. | |
| To have this section come into effect the following must apply: | |
| The Court is satisfied that the charge(s) are proved, but is of the opinion, | |
| having regard to: | |
| The Character, Antecedents, Age, Health, & Mental Condition | |
| that it is unexpedient to inflict any punishment or any punishment other | |
| than a nominal one on you. | |
| Basically what this means is that you can be found guilty and not have a | |
| conviction recorded against your name, but you must realign that the | |
| department of public prosecutions may object to this and then you will have | |
| to try and convince the Judge to ignore what the DPP says, (not easy). | |
| Also please realign that if you were to receive a section 19B and then were | |
| caught doing naughty things again and you are still under your good behavior | |
| bond, you will forfeit your bond and have to stand trial again for the | |
| original offence(s). | |
| Section 74A - Interpretation | |
| (1) In this part, unless the contrary intention appears: | |
| "carrier" means: | |
| (a) a general carrier within the meaning of the Telecommunications | |
| Act 1991; or | |
| (b) a mobile carrier within the meaning of that Act; or | |
| (c) a person who supplies eligible services within the meaning of | |
| that Act under a class licence issued under section 209 of that Act; | |
| "Commonwealth" includes a public authority under the Commonwealth; | |
| "Commonwealth computer" means a computer, a computer system or a part of a | |
| computer system owned, leased or operated by the Commonwealth; | |
| "Data" includes information, a computer program or part of a computer program. | |
| (2) In this Part; | |
| (a) a reference to data stored in a computer includes a reference to | |
| data entered or copied into the computer; and | |
| (b) a reference to data stored on behalf of the Commonwealth in a | |
| computer includes a reference to: | |
| (i) data stored in the computer at the direction or request | |
| of the Commonwealth; and | |
| (ii) data supplied by the Commonwealth that is stored in the | |
| computer under, or in the course of performing, a contract | |
| with the Commonwealth. | |
| Section 76B - Unlawful access to data in Commonwealth or other computers | |
| (1) A person who intentionally and without authority obtains access to: | |
| (a) data stored in a Commonwealth computer; or | |
| (b) data stored on behalf of the Commonwealth in a computer that | |
| is not a Commonwealth computer; | |
| IS GUILTY OF AN OFFENCE - PENALTY: Imprisonment for 6 months | |
| (2) A person who | |
| (a) with intent to defraud any person and without authority obtains | |
| access to data stored in a Commonwealth computer, or to data stored on | |
| behalf of the Commonwealth in a computer that is not a Commonwealth | |
| computer; or | |
| (b) intentionally and without authority obtains access to data stored | |
| in a Commonwealth computer, or to data stored on behalf of the | |
| Commonwealth in a computer that is not a Commonwealth computer, being | |
| data that the person knows or ought reasonably to know relates to: | |
| (i) the security, defense or international relations of | |
| Australia; | |
| (ii) the existence or identity of a confidential source of | |
| information relating to the enforcement of a criminal law of | |
| the Commonwealth or of a State or Territory; | |
| (iii) the enforcement of a law of the Commonwealth or of a | |
| State or Territory; | |
| (iv) the protection of public safety; | |
| (v) the personal affairs of any person; | |
| (vi) trade secrets; | |
| (vii) records of a financial institution; or | |
| (viii) commercial information the disclosure of which could | |
| cause advantage or disadvantage to any person; | |
| IS GUILTY OF AN OFFENCE - PENALTY: Imprisonment for 2 Years | |
| (3) A person who: | |
| (a) has intentionally and without authority obtained access to data | |
| stored in a Commonwealth computer, or to data stored on behalf of the | |
| Commonwealth in a computer that is not a Commonwealth computer; | |
| (b) after examining part of that data, knows or ought reasonably | |
| to know that the part of the data which the person examined relates | |
| wholly or partly to any of the matters referred to in paragraph | |
| (2)(b); and | |
| (c) continues to examine that data; | |
| IS GUILTY OF AN OFFENCE - PENALTY: for contravention of this subsection: | |
| Imprisonment for 2 years | |
| Section 76C - Damaging data in Commonwealth and other computers | |
| A person who intentionally and without authority or lawful excuse: | |
| (a) destroys, erases or alters data stored in, or inserts data into a | |
| Commonwealth computer; | |
| (b) interferes with, or interrupts or obstructs the lawful use of a | |
| Commonwealth computer; | |
| (c) destroys, erases, alters or adds to data stored on behalf of the | |
| Commonwealth in a computer that is not a Commonwealth computer; or | |
| (d) impedes or prevents access to, or impairs the usefulness or | |
| effectiveness of, data stored in a Commonwealth computer or data stored | |
| on behalf of the Commonwealth in a computer that is not a Commonwealth | |
| computer; | |
| IS GUILTY OF AN OFFENCE - PENALTY: Imprisonment for 10 years | |
| Section 76D - Unlawful access to data in Commonwealth and other computers by | |
| means of certain facilities. | |
| (1) A person who, by means of a facility operated or provided by the | |
| Commonwealth or by a carrier, intentionally and without authority obtains | |
| access to data stored in a computer. | |
| IS GUILTY OF AN OFFENCE - PENALTY: Imprisonment for 6 months | |
| (2) A person who: | |
| (a) by means of a facility operated or provided by the Commonwealth | |
| or by a carrier, with intent to defraud any person and without | |
| authority obtains access to data stored in a computer; or | |
| (b) by means of such a facility, intentionally and without authority | |
| obtains access to data stored in a computer, being data that the | |
| person knows or ought reasonably to know relates to: | |
| (i) the security, defense, or international relations of | |
| Australia | |
| (ii) the existence or identity of a confidential source of | |
| information relating to the enforcement of a criminal law of | |
| the Commonwealth or of a State or Territory; | |
| (iii) the enforcement of a law of the Commonwealth or of a | |
| State or Territory; | |
| (iv) the protection of public safety; | |
| (v) the personal affairs of any person; | |
| (vi) trade secrets; | |
| (vii) records of a financial institution; or | |
| (viii) commercial information the disclosure of which could | |
| cause advantage or disadvantage to any person; | |
| IS GUILTY OF AN OFFENCE - PENALTY: Imprisonment for 2 Years | |
| (3) A person who: | |
| (a) by means of a facility operated or provided by the Commonwealth | |
| or by a carrier, has intentionally and without authority obtained | |
| access to data stored in a computer; | |
| (b) after examining part of that data, knows or ought reasonably to | |
| know that the part of the data which the person examined relates wholly | |
| or partly to any of the matters referred to in paragraph (2)(b); and | |
| (c) continues to examine that data; | |
| IS GUILTY OF AN OFFENCE - PENALTY: Imprisonment for 2 Years. | |
| Section 76E - Damaging data in Commonwealth and other computers by means of | |
| certain facilities | |
| A person who, by means of a facility operated or provided by the Commonwealth, | |
| intentionally and without authority or lawful excuse: | |
| (a) destroys, erases or alters data stored in, or inserts data into a | |
| computer; | |
| (b) interferes with, or interrupts or obstructs the lawful use of, | |
| a computer; or | |
| (c) impedes or prevents access to, or impairs the usefulness or | |
| effectiveness of, data stored in a computer; | |
| IS GUILTY OF AN OFFENCE - PENALTY: Imprisonment for 10 Years. | |
| Section 76F - Saving of State and Territory Laws | |
| Sections 76D and 76E are not intended to exclude or limit the concurrent | |
| operation of any law of a State or Territory. | |
| Conclusion: | |
| ~~~~~~~~~~~ | |
| You may have noticed that any hack of a Computer in Australia could result in | |
| you staying in a prison for quite a long time, as almost any hack would be | |
| and offence under just about all of the subsections listed above, combine this | |
| with a consecutive sentence and you *COULD* be in jail for over 25 years. | |
| "Be Careful Out There!!" | |
| ------------------------------------------------------------------------------ | |
| -- The HELLenic Digital Subculture Scene -- | |
| by Opticon the Disassembled | |
| - "EL33t3 Hackers": "TH3rE R N0 UNKraKKable ZyZTEMZ.EV3ry1 HAS[S] It's H0L3z." | |
| - I'm sure every "EL33t3#@$$^!!! HaKKER" has at least one hole by nature. | |
| "The Gods could have chosen any place but they chose Greece"...Yes, they did. | |
| By mistake probably. | |
| Agricultural country, light industry, member of the European Community, ten | |
| million residents, surrounded by sea (polluted in some areas) and forests | |
| (burned in some areas). Four thousand years old culture, beautiful language | |
| (due to it's ancientness) [...] | |
| Digital subculture scene? Quite a few articles appear on newspapers and | |
| magazines about CyberPunk. Quite a few people claim to be hackers (elite ones), | |
| crackers (elite ones), phreakers (elite ones) and coders (elite ones). | |
| University students get insane pleasure when talking about their last | |
| achievements, how they cracked all the accounts of a shadowed password file, | |
| and how they transferred 2000 true color, porno JPEG and phracking files. | |
| Public bulletin board systems distribute blue boxing related articles (Hail | |
| Mark Tabas!) and pirate boards distribute "oNE DaY WAREZ!@!#". | |
| "Phone freaks, crackers, hackers, virus makers." At the end, an interview | |
| with a young software cracker. He listens to TECHNO ("the only real music"), | |
| he would like to buy an Apple Powerbook and he needs only five minutes to | |
| "crack a disk". | |
| No busts have taken place AS FAR AS I KNOW. Only innocent pirates and couriers | |
| were prosecuted years ago, due to distribution of cracked programs for ZX | |
| Spectrum, Commodore and Amstrad ("peeks, pokes, hints & tips"). | |
| An article about "Legion Of Doom! - ComSec" appeared on November 1991: | |
| "X-Hackers offer their services to companies". Glamorous picture of the | |
| group, opinions, history, comments from a phracking illiterate journalist. | |
| An-archic 'zines (printed format) were publishing digital underground related | |
| news, since mid '80s. | |
| A family man in my city has been using a black box for 10 years. He accepts | |
| calls from relatives living in Italy. | |
| At the age of seventeen Nikos Nasoyfis wrote a book about 8088/8086 assembly | |
| programming and cracking of protection methods. He is considered to be a | |
| genius in those areas. Upon the request of a magazine he created "the first | |
| Hellenic virus". | |
| No Digital Underground / An-archy related systems exist, except DiES IRAE. | |
| But of course " If [When] you are good, nobody knows that you are there ". | |
| * Packet Switching Data Networks | |
| SERVICE: HELLASPAC | |
| DNIC: 2023 | |
| LOG-IN PROCEDURES | |
| 1. Dial access number: | |
| 1161 for both 300 and 1200 bps. Additionally, the | |
| following access numbers are available within Athens: | |
| 8848481, 8849021, and 3477699. | |
| 2. Upon connection, the user types three dots and Enter or Return: | |
| ... (CR) | |
| 3. The network will respond | |
| : HELLASPAC | |
| If no response, repeat step 2. | |
| 4. Upon receipt of the network prompt, the user types (in capital letters): | |
| NXXXX - 0 WWWW (CR) | |
| where XXXX is the user's NUI and WWWW is the NUA. | |
| 5. HELLASPAC will answer | |
| : COM | |
| 6. To log off, type | |
| (CTRL)PCLR(CR) | |
| The network will respond | |
| CLR CONF | |
| Until the end of the year a free experimental 2400bps ( 1200 baud + MNP 5 ) | |
| dial up public service will be operating at 0961-11111 (if you call this a | |
| 2400 baud NUI, shame on you! You know who you are :-) ). 0961-22222 will | |
| lead to HellasTel ( Video Text ). Can't tell if foreigners can call these | |
| numbers. | |
| SERVICE: ARIADNET | |
| Ariadnet is a Hellenic research/academic network sponsored by the European | |
| Community. There are two main hosts: LEON and ISOSUN. The first one serves | |
| the public; dial-ups, low cost (10.000 drg for three months), yet low disk | |
| quota (starts from 1 MB) due to "the workstation's incapability to carry | |
| a lot of hard disks". The second one serves users who call from other | |
| sources (i.e. PSDNs). Thanks to Ariadnet most universities provide free | |
| internet access (usually they reach 1 KiloByte per second) in conjunction to | |
| restricted HellasPac access (a.k.a. high expenses). | |
| The following captures will talk by themselves. | |
| ** | |
| ISOSUN @ ARIADNE hellenic research/academic network | |
| login: help | |
| Last login: Wed Mar 18 19:37:13 from 38212026 | |
| SunOS Release 4.0.3_EXPORT (ARIADNE.FEB2) #1: Thu Feb 13 13:04:45 EET 1992 | |
| Please, do not leave your mail in mailing queue for a long time. | |
| Clean them up often. Otherwise your mail may be lost.... | |
| thanks | |
| postmaster | |
| A R I A D N E T - X.121 server | |
| Demokritos | |
| isosun SUN:INTERNET,X400-R&D-MHS 10100101, leon 10100102 | |
| PRIME 9950 primos: EARN-BITNET 10100100, gatos 10100104 | |
| mVAX DECNET-CERN (cluster) 10100103, KE-lab 10100108 | |
| EIE mVAx 101002005 | |
| EKT Data Bases PERKIN-ELMER 10100200 | |
| Kapodistriako Pan.CYBER-NOS 10100401, mVAX 10100402 | |
| Aristotelion Pan. mVAX 13100104, unix 386 13100108, | |
| Metsovion Polytechnion | |
| vms-mvax 1010030107, sun 1010030106 | |
| High Energy Lab 10100351 | |
| Gen.Secr. Research UNIX V 1010050008, sequent 1010050007 | |
| ITY Pan. Patra, CTI unix server 16100101 | |
| ATE Pan. Crete , FORTH 18100100 | |
| ASSOE(Athens U. of Economics) VAX/VMS 10100600 | |
| NATIONAL OBSERVATORY VAX/VMS 10100700 | |
| Rethimno Pan Kritis/Economics-Philosophy 38312025 | |
| Chania Poly. Kritis 38212026 | |
| ZENON,INTRAKOM,ATKO, HITEC, PLANET via X25 and TCPIP/X25 | |
| ATDP6519905 | |
| ATDP6533172 V21/V22 MODEM hayes, no parity, 1 stop bit, 8 data | |
| connect to ARIADNET pad service @ Demokritos | |
| HELLASPAC Gateway, IXI Gateway, X400 Gateway, Internet Gateway | |
| INFORMATION: +301 6513392 FAX: 6532175 | |
| TEAM: Y.Corovesis,A.Drigas,T.Telonis (+4 students) | |
| ADMINISTRATION: A.Arvilias tel:+301 6515224 | |
| NEXT: TEI-Pirea, EMY, NTUA-physicslab, Thessaloniki VAX9000 | |
| ** | |
| * Phone Network | |
| The last four years or so, the old analog switching centers (HDW, Rotary, | |
| Crossbar) are being replaced with digital ones (Ericsson-Intracom AXE-10 | |
| and Siemens EWSD). Theoretically that should be completed by the end of 1994 | |
| (according to the Christian way of chronometry). | |
| These provide the following for the masses: | |
| PAGING (was operating anyway) | |
| HOT LINE | |
| "WAKE-UP" SERVICE | |
| ABBREVIATED DIALLING | |
| THREE PARTY SERVICE | |
| CALL WAITING | |
| "DOT NOT DISTURB" SERVICE | |
| OUTGOING CALL BARRING | |
| MALICIOUS CALL IDENTIFICATION | |
| ABSENT SUBSCRIBER SERVICE | |
| LINE HUNTING | |
| TOLL TICKETING (sure they do!) | |
| ...and of course better control OF the masses FOR the state. | |
| I got very interesting results exploring those new centers. If I ever finish | |
| the project it will appear in Phrack or UPi (hopefully). Damn...Better to | |
| think over that twice. Abusing raises eyebrows. | |
| The country direct numbers use the 00-800-country code-11 format. Believe it | |
| or not; I had to social engineer the directory assistance operator to start | |
| moving. Not to mention the time and examples he needed to understand what I | |
| was talking about. Bad luck? | |
| FINLAND 00-800-358-11 | |
| CYPRUS 00-800-357-11 | |
| ICELAND 00-800-353-11 | |
| BRITAIN/NORTH IRELAND 00-800-44-11 | |
| SWEDEN 00-800-46-11 | |
| HOLLAND 00-800-31-11 | |
| NORWAY 00-800-47-11 | |
| DENMARK 00-800-45-11 | |
| FRANCE 00-800-33-11 | |
| GERMANY 00-800-49-11 | |
| M.C.I. 00-800-122155 | |
| 00-800-1211 | |
| SPRINT 00-800-1411 | |
| AT&T 00-800-1311 | |
| As of now only U.S.A. direct numbers can be used for blue boxing. It was | |
| possible to do so and it should be possible nowadays, although I cannot | |
| confirm that. The last months I have spent A LOT of time scanning numbers | |
| and frequencies but I didn't come to an end. To be continued... | |
| * Cellular Phone Networks | |
| The pen-European digital (shit!) mobile telephony system G.S.M. is being | |
| implemented. Nothing is solid yet and of course no one claims (trumpet fanfare | |
| added here) that phreaks out through that. In the first state PANAFON will | |
| cover Athens and Argosaronic and afterwards all the big cities: Thessaloniki | |
| (it should be functioning by now), Patra, Heraklio et cetera. They are planning | |
| to cover more than 90% of the country's residents and 75% of the geographical | |
| region. Problems appear thanks to the strange terrain. I don't know what is | |
| going on with TELESTET. | |
| The total registered subscribers are considered to be about ten thousand. | |
| * Miscellaneous | |
| An Integrated Service Digital Network is being established and local | |
| universities are installing [optical] Fiber Distributed Data Interfaces. | |
| PBXs are now becoming popular. | |
| Most operators know little or nothing on computer security or managing in | |
| general. That's why some of them accept offered help and provide afterwards | |
| (non-privileged) accounts and old, yet valuable, duplicate manuals. If some | |
| anti-hacking measurements are taken, that is thanks to the company employers | |
| who maintain and prepare the systems. | |
| Do not hang on this, but I think that there are no laws concerning H/P in | |
| particular. | |
| Needless to say that no conferences take place. Of course QSD & IRC...ohhh | |
| fuck it. | |