| ---[ Phrack Magazine Volume 7, Issue 51 September 01, 1997, article 02 of 17 | |
| -------------------------[ P H R A C K 51 L O O P B A C K | |
| --------[ Phrack Staff | |
| 0x1>------------------------------------------------------------------------- | |
| Issue 50 proves that Phrack _is_ back, and better than ever. | |
| Congratulations to you and the rest of the Phrack staff for putting | |
| together what I think is by far the most informative issue to date. The | |
| quality of the articles and code (YES! Lots of code!) reflects the hard | |
| work and commitment that obviously went in to this issue. I could go on, | |
| but I'm all out of lip balm. | |
| Thank you! | |
| _pip_ | |
| [ Thank you. We aim to please. ] | |
| 0x2>------------------------------------------------------------------------- | |
| { ...Bugtraq Phrack 50 announcement deleted... } | |
| So What? | |
| Who cares? get this crap off of the mailing list. | |
| phrack is as much trash as 2600 or any other | |
| little idiot magazine. | |
| [ Thank you. We aim to please. ] | |
| 0x3>------------------------------------------------------------------------- | |
| juggernaut is way cool, man. | |
| minor bug: you dont unset IFF_PROMISC on exit, so it's not terribly stealthy, | |
| but it's no big deal to fix. | |
| anyway. cool. | |
| .techs. | |
| [ Although Juggernaut is *not* meant to be a 'covert' program you are | |
| completely right about that. I should unset promiscuous mode when the | |
| program exits. In fact, in version 1.2 (patchfile available in this | |
| issue) I include this very thing. ] | |
| 0x4>------------------------------------------------------------------------- | |
| Hi! | |
| I've got the p50.tgz and well, played a little with jugernaut. | |
| It's realy cool but: | |
| 1) It doesn't compile so clean. You've forgot to #include | |
| <linux/netdevice.h> before <linux/if_arp.h> | |
| 2) The spy connection part is not quite cool because you | |
| sniff and dump all the stuff that is comeing from the dest. port | |
| and dest. host ... | |
| So if U try 2 spy say: | |
| 193.226.34.223 [4000] 193.226.62.1 [23] | |
| U spy in fact all the stuff that is comeing from 193.226.62.1 [23] for | |
| ALL the conn. made to 193.226.62.1 on the 23 (telnet) port. | |
| This will cause a cool mess on the screen. | |
| I've tried 2 restrict the spying by introduceing a new cond. | |
| iphp->daddr==target->saddr in net.c ... it brocked the spy routine | |
| Maybe U'll fix somehow that thing.. | |
| All my best regards, | |
| Sandu Mihai | |
| [ <linux/if_arp.h> includes <linux/netdevice.h>. The compilation of the | |
| program should go smoothly on any linux 2.0.x based system. Version 1.2 | |
| also fixes the TCP circuit isolation problem you allude to... ] | |
| 0x5>------------------------------------------------------------------------- | |
| Thanks! | |
| This is a very impressive tool! Brilliant work! | |
| Thank you, | |
| --Craig | |
| [ Thank you. ] | |
| 0x6>------------------------------------------------------------------------- | |
| I'm just writing this to say thanx for putting out such a kickass publication. | |
| Down here in 514 it's fuckin dead, you mention hacking and half the people | |
| don't have a clue what Unix is.It's fuckin pathetic, but i'm glad to say | |
| that your mag has helped a lot and i look forward to future issues, you guys | |
| really do make a difference in the hacking community. Thanx. | |
| Snake Eyes | |
| [ Amen to that. ] | |
| 0x7>------------------------------------------------------------------------- | |
| Hi! =8) | |
| Why don't you (at Phrack) compile an updated Pro-Phile on known H/P | |
| Groups like the one on issue #6 ? | |
| So we - the readers - can know something more about the ACTUAL scene | |
| (but perhaps it's not worth - ppl's sick of all that 3l33t d00dz ;) | |
| I really appreciated that dox & srcs on spoofing, D.O.S., etc. | |
| HIGH technical quality, sources, articles, news.... and it's free! :P | |
| Ahh that's life! ;) | |
| However, great job with the latest Phrack issues. | |
| To quote a friend of mine (talking of Phrack Magazine)... | |
| > It's improved a lot with Deamon9 in command.... | |
| K, that's all. | |
| **PHRACK RULEZ!** (I had to say that :) | |
| Oh... and sorry for my english! | |
| Cya.... | |
| -Axl- | |
| [ Not a bad idea. Perhaps someone would like to do an article on | |
| the existing groups out there for P52? ] | |
| 0x8>------------------------------------------------------------------------- | |
| I would like to know what you suggest to get me headed in the right | |
| direction reguarding the compromise of computers on the internet. | |
| any information that you would be able to spare would be most appreaciated. | |
| atomicpunk. | |
| [ It's *all* about compromise. It's something you have to do. Be fair to | |
| them. Listen to them. Don't shut them out of your life. They are | |
| wonderful creatures... It's a give and take thing and sometimes, yes, you | |
| *have* to compromise -- that's part of having a mature relationship. ] | |
| 0x9>------------------------------------------------------------------------- | |
| I recently locked into my car so i called a friend to come help me | |
| when the slim jim was no help he decided to try another less known | |
| method. | |
| We simply took a stiff metal coat hanger and straightened it out and | |
| made a small loop in it then we took a small speaker wire about 3 feet | |
| long and tied a loop into one end so it would slide to make the loop | |
| smaller or larger. | |
| Then you take the wire and run it in through the loop in the hanger | |
| and pry the top edge of the car door open and slide both looped ends | |
| through holding onto the unlooped ends. | |
| then you use the hanger to position the loop in the speaker wire | |
| around the door lock once you have the loop into position you hold | |
| the hanger steady and gradualy pull the loop tight around the lock | |
| once the loop is tight you just pull up on the hanger. | |
| This works on most all vehicles with top door locks and with a little | |
| prep. and practice can be done in under 2 mins. also its less | |
| conspicious and easier to get than a slim jim. and they are cheap | |
| so no one care to toss the out after breaking into an entire lot of cars. | |
| Hope you found this phile worth while | |
| C'ya | |
| The Stony Pony | |
| [ Aspiring young car thieves among us thank you; however if you | |
| lock yourself in the car again, you might try unlocking the door | |
| manually. ] | |
| 0xa>------------------------------------------------------------------------- | |
| HOW YOU KNOW YOUR A TRY HARD HACKER | |
| ------------------------------------- | |
| By [Xtreme] | |
| I just wrote this to tell all you try hard hackers something. | |
| 1) You goto other hacker pages on the web. | |
| 2) You think loading a program that waz made by a hacker is hacking. | |
| 3) The only thing you do is get the lastest passwd file from your isp. | |
| 4) You goto channels like #hack and ask for passwd files. | |
| 5) You don't know where to get warez. | |
| 6) You always telnet to hosts and type | |
| login: root | |
| password: root | |
| and stuff like that. | |
| 7) You brag about how you are a hacker. | |
| 8) You don't know C. | |
| 9) Your a girl. | |
| 10) You don't know what's a shell. | |
| 11) You don't know what Linux, FreeBSD and all those other UNIX's are. | |
| 12) You don't have a UNIX OS. | |
| 13) You think when using IRC war scripts, your hacking. | |
| 14) Asking how to hack other people's computer. | |
| 15) You try cracking a shadowed passwd file. | |
| 16) You don't know if a passwd file is shadowed or not. | |
| 17) You ask what is a T1. | |
| 18) You ask how to email bomb and you think email bombing is a form of hacking. | |
| 19) Your learning BASIC language. | |
| 20) You think you can get into hacking straight away. | |
| 21) You don't know how to set up an eggdrop bot. | |
| 22) You think .mil stands sites stand for a country. | |
| [ That is without a doubt, the dumbest thing I have ever read in my life. | |
| Not only do I award you no points, but we are all now dumber having read | |
| that. May God have mercy on your soul. ] | |
| 0xb>------------------------------------------------------------------------- | |
| What command do I use to make you denial of service package work? | |
| [ You hit yourself in the head with a hammer. ] | |
| 0xc>------------------------------------------------------------------------- | |
| I was scanning the 413 xxx 99XX range and I found some #'s. I have | |
| no idea what they do. I was wondering if you could help me out. | |
| Maybe call them and see what you find or someting. | |
| (413) xxx-99xx | |
| (413) xxx-99xx | |
| (413) xxx-99xx These are all fax #s, I think | |
| (413) xxx-99xx | |
| (413) xxx-99xx goes beep beep beep | |
| (413) xxx-99xx goes beeeep | |
| (413) xxx-99xx auto foward I think | |
| (413) xxx-99xx goes beeep beeep | |
| [ I tried calling these but I got no answer. Maybe the 'X' on my phone | |
| is case sensitive? ] | |
| 0xd>------------------------------------------------------------------------- | |
| Sir, | |
| I would like to know how could I get root permission from a simple user. | |
| I have read that this can be accomplished by setuid programs, and I have read | |
| an article describing the way this can be done in Phrack Magazine. Still I | |
| couldn't gain root access. I would be very interested in finding ways of doing | |
| this on Irix 5.2 or Solaris 2.5. If you know anything about this, please | |
| send me an e-mail. If you know any resources on the Web that details the use | |
| of setuid programs in order to get root access, please tell me. | |
| [ P49-14 ] | |
| 0xe>------------------------------------------------------------------------- | |
| >AND FOR THE LOVE OF GOD, SOMEONE NOTIFY MITCH KABAY...!< | |
| Mich, not Mitch. "Mich" is short for "Michel." | |
| M. E. Kabay, PhD, CISSP (Kirkland, QC) | |
| Director of Education | |
| National Computer Security Association (Carlisle, PA) | |
| http://www.ncsa.com | |
| [ No, Mike is short for Michael. ] | |
| 0xf>------------------------------------------------------------------------- | |
| Your zine is the best | |
| Please send it to Psycho Al1@aol.com | |
| The Psychotic Monk | |
| PS:Aohell rulez | |
| [ You are an idiot. ] | |
| 0x10>------------------------------------------------------------------------- | |
| Hi, Phrack people! | |
| Great job on issue 50! Nice magazine. Article 'bout TTY hijacking is really | |
| superb. | |
| I have just one question to you. Is there any holes on target system in this | |
| situation? There's a server, running freeBSD 2.1.5, with a shadowed passwords. | |
| I've got a dial-up account on that machine as a simple user. What bugs can I | |
| use for having root privileges? | |
| Best wishes from Ukraine!! OmegA | |
| [ find / -perm -4000 -print ] | |
| 0x11>------------------------------------------------------------------------- | |
| hello... long-time reader, first-time writer: | |
| i know that all "submissions" are to be encrypted... and i should be | |
| encrypting anyways, but i'll make it quick ... besides, this isn't | |
| really a "submission..." | |
| congrats on reaching the 50th issue mark, and congrats on an | |
| excellent ish! | |
| i just a quick question. i would like to reprint the <soapbox> | |
| for issue #50 on my web page, with a hypertext link to the | |
| Official Phrack Homepage (http://www.fc.net/phrack/ - correct?). | |
| I think it says brings up some important points, and since it's | |
| copywrited, and you sren't losers, i'd ask you (it's not like a | |
| simple copywrite has stopped anyone before)! | |
| thanks, | |
| lenny | |
| [ A simple copyright may not stop people, but the simple restitution | |
| remanded by courts might. However, go ahead and put a hypertext link. | |
| The official webpage will be at phrack.com/net/org, SOON. ] | |
| 0x12>------------------------------------------------------------------------- | |
| In Volume Four, Issue Forty-One, File 3 of 13, Supernigger was featured | |
| in your Phrack Pro-Phile. Whatever happened to him? Did he "grow up and | |
| get a real job" or is he still lurking around? | |
| - Styx | |
| [ Both. ] | |
| 0x13>------------------------------------------------------------------------- | |
| People @ Phrack: | |
| In Phrack #50 in the file 'Linenoize' Khelbin wrote an article about remote | |
| BBS hacking, namely using Renegade's default 'PKUNZIP -do' command overwrite | |
| the userbase with your own ... | |
| For some strange reason, while renegade is booted, and if it runs PKUNZIP -do | |
| the procedure will NOT work... but the procedure DOES work when Renegade is | |
| down at the Dos Prompt..? | |
| Does Renegade extract files into memory or something while testing for | |
| integrity? -8) .. I tried this out on 10-04, 5-11 and even | |
| 04-whatever-the-fuck-that-version-was and it didn't work.. I think Khelbin | |
| needs help for his chronic crack addiction since I can't find any way possible | |
| to get his article to work.. | |
| op: Taos BBS | |
| ~~~ Telegard v3.02 | |
| [ We dunno. Anyone else have an answer? ] | |
| 0x14>------------------------------------------------------------------------- | |
| Regarding Xarthons submission about Linux IP_MASQ in Phrack 50... | |
| The masquerading code is not designed for security. Hardwiring RFC1918 | |
| addresses into the IP_MASQ code is not a clever idea for two reasons: | |
| 1) It diminishes the usefulness of the code. I have used masquerading to | |
| keep things running when my company changed internet providers. I | |
| masqueraded our old _valid_ IP range. Other people may come up with | |
| other valid uses, like providing redundancy through two ISPs. | |
| 2) The masquerading code is part of the Linux packet filter, which can | |
| certainly be configured to prevent spoofing, a quite a bit more. | |
| If the static packet filter and the masquerading code are used together | |
| they can provide as much security as a 'dynamic' filtering firewall like | |
| Firewall-1 in many cases. A very short 'HOW-TO': | |
| 1) Put spoofing filters on all interfaces. Only allow incoming packets | |
| to the external interface if the destination address is that of the | |
| external interface (that's the address the masquerading code inserts as the | |
| source address of outgoing packets). | |
| 2) Insert rule(s) in the forwarding filter to masquerade your outgoing | |
| packets. You do not need to route incoming replies to masqueraded | |
| packets, that happens auto-magically. Deny everything else (and _log_). | |
| 3) Make sure the gateway does not run anything that leaves you | |
| vulnerable. Don't run NFS, the portmapper etc. Update sendmail, bind to | |
| the latest versions if you run them. | |
| 4) Disable telnet, and use 'ssh' for maintenance. If you must support | |
| incoming telnet connections through the firewall install the TIS firewall | |
| toolkit, and use one-time passwords. | |
| 5) Run 'COPS', 'Tripwire'. | |
| 6) Read a good book about Internet security, and make sure you | |
| understand all the issues involved before you configure _any_ firewall, | |
| even one with a GUI and a drool-proof manual. | |
| I hope this is useful to some people. | |
| Ge' Weijers (speaking for myself only) | |
| 0x15>------------------------------------------------------------------------- | |
| You write in P49-06: | |
| ... The only sure way to destroy this | |
| channel is to deny ALL ICMP_ECHO traffic into your network. | |
| No. It suffices to clear the content of the packets | |
| when passing the firewall. | |
| ralf | |
| [ True enough. However, by doing this you remove the RTT info from | |
| the ICMP echos which will break some implementations which rely on it. ] | |
| 0x16>------------------------------------------------------------------------- | |
| Hi, Im a Wannabe, maybe you would call me and idiot. | |
| Where do you guys hang out, IRC? Wich channel, #supreme? Wich server? | |
| Know any good trix for me how to learn more about hacking? | |
| Please answer my letter, I know that you get lots of letters, but | |
| please!! | |
| [ EFNet, #phrack ] | |
| 0x17>------------------------------------------------------------------------- | |
| You cant realy say that IRC is for loosers cuz in Phrack 50 I saw an | |
| article with some text taken from IRC, and you were logged in. | |
| [ We are losers. Ergo, yes we can. ] | |
| Which good hack books, UNIX books or things like that do you recommend. | |
| Thank You For An Answer!! | |
| [ Anything Addison Wesley or ORA. Also, many of the PTR/PH books. ] | |
| 0x18>------------------------------------------------------------------------- | |
| I am writing to inquire about the fate of Pirate Magazine | |
| and how I might contact it's creators. It seems to have been out of | |
| circulation since 1990 and I was hoping to look at possibly organizing | |
| some kind of initiative to revive this excellent publication. I thought | |
| first to turn to Phrack magazine. Thanx for your time. | |
| Joong Gun | |
| [ Anyone have any information? ] | |
| 0x19>------------------------------------------------------------------------- | |
| Hello, | |
| I just got Phrack 50 and loved it....It is the first one I've | |
| got. I was wondering if you guys know about any other newsletters or | |
| magazines that are sent to your e-mail address or you can get off the web on | |
| a regular basis, like Phrack. thanX | |
| [ Other magazines come and go on a pretty regular basis. Phrack is | |
| eternal. Phrack is all you need. ] | |
| 0x1a>------------------------------------------------------------------------- | |
| Please help me. If I can't join your club, please let me learn from you. I | |
| am interested in both Program hacking and remote access. | |
| Thanks. | |
| quattro | |
| [ You join our club if you can find our secret clubhouse. ] | |
| 0x1b>------------------------------------------------------------------------- | |
| hi. This is from a guy you probably will never hear of again, and | |
| definantly have never heard of already. I wanna ask you a question. At | |
| my school, people write crap on their backpacks with witeout. I have | |
| never done this for 2 reasons | |
| 1) I dont wanna be grouped with the poseur metalheads, etc who write | |
| "Pantera" and "666" and "Satan" etc but cannot name a song of thiers, | |
| and/or go to church.... | |
| 2) I dont wanna be grouped with the wanna be hackers who write stuff | |
| like Anarchy symbols, "Aohell" "Kaboom" and the such, because thats just | |
| plain lame. You have to feel sorry for people who think they are elite | |
| because they can mailbomb somebody. | |
| Another reason I have never written anything is I havent found anything | |
| worht advertising. Now i have, I wanna write "The guild" or something to | |
| that extennt maybe "r00t" or something. I have not done this for i do | |
| not want to piss you off (indirectly something may get to you about it. | |
| It could happen, remember the 6 degrees of seperation? hehehe). If this | |
| is ok with you, lemme know please. (cad@traveller.com) Also, if your | |
| wondering why im mailing this to you alone, it is because you are a | |
| fucking baddass. heh. Well, lemme know whenever ok? thanks. | |
| (I know i have an absence of punctuation, i'm in a hurry and I have | |
| homework) | |
| [ You have our permission to write r00t on your backpack. ] | |
| 0x1c>------------------------------------------------------------------------- | |
| yes i want to learn how to hack and need to learn fast | |
| Js444 told me you can help | |
| will repay BIG | |
| thanks | |
| [ How big? ] | |
| 0x1d>------------------------------------------------------------------------- | |
| I sent this from your hoime page...is it X-UIDL? I dunno, it's 4 AM | |
| anyway | |
| um oh, keep in mind that ur response (if made) to this may be dumped to | |
| #hack printed in the next Citadel knockoff or whatevrr | |
| I was just like thinking oh, I was thinking "I don't have an Irix | |
| sniffer!"...actually my thoughts don't have quotes around them it was | |
| more like | |
| ~o- all the Irix sniffers I have suck -o~ | |
| and then theres like Irix 4, 5, 6. Bah. And like sniffit sucks and | |
| anyway. And then I mentioned this and people were making fun of me, but | |
| I don't care. I only care lately when people are like, "Oh that's what | |
| youy make? I'm 17, have a criminal record and make three times that!". | |
| Anyway, people are like, "No, no nirva is elite" so I thought, aha, I'll | |
| ask nirva what a good Irix sniffer is. Oh, like now that people are | |
| laughing at that I have to keep this quets like secrtet. I even think | |
| some Irix's don't have compile, like Solaris. Christ, some Solaris's | |
| have jack shit. Anyway. | |
| 1) Why don't u log on #hack, or are you tres elite #!guild or beyond | |
| elite #www or #root #Twilight_Zone and more importantly | |
| 2) Irix sniffer - captures passwords, actually compiles. I hate | |
| coding. I am a a lazy American. And like, getting legit root access on | |
| an Irix...bvah, Irix sniffer! | |
| Bye-bye hackers | |
| oh PostScript | |
| 3) Are you a cyberpunk? | |
| If I ran Phrack I wouldn't like Mr. Tishler have "Are hackers in general | |
| geeks?" as the question _everyone_ gets, I think, Are you a cyberpunk? | |
| Would be it | |
| [ 1. We do hang out on as many public channels as we can stand for | |
| at least a little bit of time each issue. But really why do | |
| you care if an editor of Phrack is there when people are shouting | |
| about their penis size and how many drugs they are on? If you | |
| want to talk about something, we are always available by e-mail | |
| and will usually talk to you by private msgs if we aren't busy | |
| doing something else at the moment. | |
| 2. Anyone want to write us a really cool one? | |
| 3. Who are we to change tradition? ] | |
| 0x1e>------------------------------------------------------------------------- | |
| Hello, | |
| I wanna ask you something about the following problem. I'm really stuck (the | |
| 1st time ;-)) ! Is it possible to pass a firewall and access one of the | |
| domains behind it ?? I'm afraid that the sysadmins did their job fine :( | |
| I've got everything what I need but that damn wall....I'll give you some info | |
| that I've obtained so far: | |
| - IP-address of the firewall, | |
| - All the domains + IP adresses behind this wall, | |
| - The login-account of the superuser, | |
| - All the open-UNIX ports behind the wall, | |
| - The company has no WWW-site but they do have an Intranet. | |
| portscanning gives me this: | |
| 21~=ftp, | |
| 23~=telnet, | |
| 25~=smtp-mail 220 x.x.x.x SMTP/smap Ready. | |
| This is at IP x.x.x.2 but I found out that also x.x.x.1 belongs to the same | |
| company with 3 other ports... | |
| 7~=echo, | |
| 9~=discard-sink null | |
| 79~=finger. | |
| Is the only way to go by D.O.S. attack the firewall and then spoof the | |
| firewall's IP addres ? | |
| But how to start ?? Woul u be so kind to help me ?? | |
| TIA, | |
| theGIZMO | |
| [ fragmentation. ] | |
| 0x1f>------------------------------------------------------------------------- | |
| Ok, this might sound dumb , but, I think it would be cool to have this as a | |
| slogan. | |
| "Blah, blah, blah, and along with your subscription, you'll receive a | |
| LIFETIME WARRANTY ON YOUR BRAIN!! That is, if for any reason your brain | |
| can't figure out a problem you're having hacking, just e-mail us with your | |
| question and we'll be glad to help you out. Note: Please PGP encrypt all | |
| questions regarding hacking questions. Thank you." | |
| Do you like it? Note that blah, blah, blah is whatever you would it to be. | |
| Such as, "You can subscribe to Phrack Magazine by sending e-mail to | |
| Phrackedit@infonexus.com requesting you be put on the list, and along with | |
| your subscription......" | |
| Ok, thats it....write back if you like it....or if you don't. Here is my PGP | |
| public key. | |
| Oh yeah...you might have gotten mail from PhatTode@aol.com. That is me. So | |
| direct replies to those messages to this new address...Thank you. | |
| [ You're right. It does sound dumb. ] | |
| 0x20>------------------------------------------------------------------------- | |
| Hey, | |
| sorry to bother you but I just got Redhat Linux 4.1 in the mail. I | |
| think it's great besides the fact that I hear that it lacks security. | |
| HOw do I get PGP up in it? Is it easy to install? Thanks. | |
| Killer Bee | |
| [ yes, very easy to install. Read the documentation. It's different | |
| for different platforms. ] | |
| 0x21>------------------------------------------------------------------------- | |
| Hello | |
| My name is Joseph and I am intrested in any information you may have | |
| about the early day's of hacking and current hacking underground.. also | |
| I understand you are a member of the guild ?? what is this? | |
| Joseph --> jgriffiths@iname.com | |
| [ The guild is like what r00t was before r00t got all famous and became | |
| greatly feared and admired. Oh. And we spend most of our time counting | |
| our millions and having sex with models. ] | |
| 0x22>------------------------------------------------------------------------- | |
| Hi there, | |
| Do you know where I can find the Rosetta stone for interpreting the output | |
| of Solaris lockd & statd in debug mode? I can't find any public information | |
| about it, even on Sun sites. Sun Microsystem refuses to let their lab | |
| publish anything about interpretation of system calls outputs. Are they | |
| afraid that they will be losing support contracts if this information gets | |
| out? The man page does not include arguments to run in debug mode, and | |
| what's the point of providing the tools w/o the means to interpret the | |
| result? Teach a man how to fish .....you know. | |
| Thanks. | |
| Christine | |
| [ Someone want to write an article on it? ] | |
| 0x23>------------------------------------------------------------------------- | |
| In regards to the article on Ethernet spoofing: | |
| As an aside note for the highly paranoid: ethernet spoofing | |
| Note: some of this is theorized, and might not be 100% accurate - if you | |
| get the jist of it, you should be able to figure out if it works for | |
| you. | |
| It is possible to spoof ethernet hardware addresses as well. Some cards | |
| will allow you to do this easily, but you need to have card programming | |
| docs (check the Linux kernel source for your card driver-!!). Others | |
| won't let you do it at all, and require a ROM change, or worse it might | |
| be solid state logic on the card - EVIL. Course you might be able to | |
| get around solid state stuff by recoding the ROM, but I wouldn't | |
| recommend it unless you don't have the $70 to buy a new card, and have a | |
| month or two to spend in the basement. | |
| ... rest of stuff(tm) deleted ... | |
| Interestingly enough, most of the Sun sparc stations I've seen allow you to | |
| enter in any mac address that you want using ifconfig(1M). I "know someone" | |
| who picked up a Sparc IPC for $50 (Can $$) and upon discovering that the | |
| battery that powers the IDPROM was deceased, we needed to fake a mac address | |
| to get it to talk to someone. Sun's default is 0:0:0:0:0:0 but the 3Com | |
| card's mac (from a different network) worked quite nicely. | |
| Interesting concept the author has though, I'll be f*ck around with the idea | |
| when I'm supposedly doing work =) | |
| [ MAC address spoofing techniques are well known about, especially under | |
| Sparcs. However, do some research, write some code and an article and | |
| submit it... ] | |
| 0x24>------------------------------------------------------------------------- | |
| I love your e-zine it is the coolest thing i've read. | |
| [ Thank you. It's the coolest thing we've written. ] | |
| Please could you tell me any ways to violate the security of a "MacAdmin" | |
| based system on the Apple Macintosh. | |
| [ What's a Macintosh? ] | |
| Mark "Vombat" Brown | |
| May phrack and Fiona live forever! | |
| [ ...and may Phrack and Fiona do a joint project some time soon... ] | |
| 0x25>------------------------------------------------------------------------- | |
| Hey, I sent this to you because yer handle is shorter. | |
| Anyways, great job on issue 50, always a pleasure to read it, and | |
| in article 12, by Sideshow Bob, I was wondering about the "tail" | |
| command. I don't seem to have this nifty util, and was wondering | |
| if perchance, you knew where I could get a copy. Also: the Skytel | |
| article sorta looked like an advertisement to me. Nothing against that, it's | |
| still pretty interesting to learn of Skytel's history, and of the nifty things | |
| out there, but I was wondering if it sounded like a detailed ad to anyone else. | |
| But if you could help me out with the tail command, I'd be so grateful. | |
| Joel Thomas | |
| [ Standard GNU utility. Try your local unix box. ] | |
| 0x26>------------------------------------------------------------------------- | |
| | | |
| | G'day mate, | |
| | I am a computer user in Camplong, Timor. I have limited internet access, as | |
| | it is a long distance phone call from home. I have downloaded your issues | |
| | 46-50 and haven't read through them all yet, but what I see looks good. | |
| | What I need from you is a UUENCODER program so I can extract the included | |
| | files. | |
| [ Standard GNU shell tool. Any Unix host will have it. Do a websearch | |
| to get it for Windows. ] | |
| | I am also confused on how to extract the .c files from the text | |
| | files(philes?). | |
| [ As it says in the header file: gcc -o extract extract.c | |
| then `extract filename` ] | |
| | I am not a C programmer, but my dad is. | |
| [ That's nice. ] | |
| | | |
| | I need PGP. Although my side of the internet is safe, noone reading others | |
| | letters (the sysop is too dumb or something to even think about that) I want | |
| | my mail to get where it is going in one piece unread. Where can I find a | |
| | free copy of PGP? | |
| [ Do a websearch. ] | |
| 0x27>------------------------------------------------------------------------- | |
| .. crack me up. Excellent social porno in your reader's letters section. | |
| Keep on commenting. Might start screaming soon. | |
| Um, the guy from slovakia might want to get hold of Bill Squire for | |
| information on smartcard programmers; as I seem to recall, he likes | |
| messing with these electronic devices. | |
| Another thing; I though DC was now just sticking to his viola? According | |
| to all the news he only started hacking because someone vandalized it? | |
| Wonder if I should have used the same thing in my case: "I plead not | |
| guilty, Magistrate sir, but the University's good-for-nothing courses | |
| drove me to it." Whatever it takes, I guess.. | |
| Yum. | |
| -me. | |
| 0x28>------------------------------------------------------------------------- | |
| This is a response to p48-02 in which one "Mr. Sandman" proceeded to spew | |
| out eleven paragraphs of blatant misinformation. Rather than lumbering | |
| through a point-by-point rebuttal to his letter, I will quickly summarize | |
| what was wrong with it, and then state a few facts to clarify some things. | |
| KoV never touched Skidmore. This is something that anyone who was in the | |
| group will attest to. And not just to follow the old "admit nothing, deny | |
| everything" plan. In reality, we NEVER touched it. | |
| In retrospect, I find it very odd that someone from New York would claim | |
| to know so much about the inner workings of a decidedly regional | |
| [Connecticut] hacker collective. While we weren't exactly xenophobic, we | |
| certainly didn't go out of our way to divulge information about ourselves | |
| to anyone outside the group (or the state, for that matter). This would | |
| explain why Mr. Sandman's letter was riddled with insufferably laughable | |
| lies that were obviously the product of a jealous and dejected outsider. | |
| One thing that needs to be put to rest is that we were certainly not "a | |
| bunch of egotistical and immature criminals" as Mr. Sandman would have you | |
| believe. The primary focus of KoV's efforts was not to "break into | |
| universities" or "make ourselves look bigger and more important than we | |
| were." We existed, first and foremost, to unify what was, at that time, a | |
| greatly divided scene. Squabbling and infighting among those few real | |
| hackers who were still around was leading to a critical breakdown at the | |
| fundamental level. Something had to be done, and fast. In an effort to | |
| bring together a group of like-minded individuals (not only from the | |
| hacker perspective but also in terms of anarcho-libertarian philosophy and | |
| ideology), I started KoV with an intentionally humorous name behind the | |
| acronym. It was an almost immediate success, and over time I certainly | |
| accomplished all that I'd set out to do, and then some. | |
| The current state of the "Connecticut hacker scene" (for lack of better | |
| terminology) is much different than it was in the summer of 1994. People | |
| are working together, cooperating, and the incessant "civil wars" which | |
| plagued us back then are all but nonexistent today. I think I'd be well | |
| within my rights to credit KoV with helping to assure that those problems | |
| are now but a memory. It really bothers me when anonymous instigators like | |
| Mr. Sandman attempt to dishonor all the work that we did to get this far, | |
| without even really having a clue as to what we were (and are) all about. | |
| Perhaps he and his ilk could benefit from such groups as KoV. Because no | |
| matter how I feel about him and his actions... | |
| "The more we fight among ourselves, | |
| the less of a threat we are to the system." | |
| - Valgamon | |
| Sat Jun 07 15:49:25 EDT 1997 | |
| 0x29>------------------------------------------------------------------------- | |
| What up. | |
| Yo, Ima hack/phreak from back in the day (1984) | |
| My 1st bbs was on an atari with a floppy drive and 64k! | |
| Nowadays, I do rap music and acting, live in Los angeles (im from western NY), | |
| and run 900#s and adult websites. | |
| Check this out, I need to thangs: | |
| #1: FTP space for adult pix (not really important, since my host gives me | |
| unlimited space), but I have no anonymous ftp capabilities) | |
| #2: Windows NT or unix | |
| Can you help?? | |
| Have broom (Music software) will travel (trade) | |
| [ We will trade you unix for a rap song about Phrack and a movie role | |
| for route. ] | |
| 0x2a>------------------------------------------------------------------------- | |
| This is in reference to the first part of your " PGP Attack FAQ," which | |
| addresses the length of time necessary to brute force IDEA. Perhaps I'm | |
| overly paranoid (naw...) or just a perfectionist, but I would like to | |
| point out two things about this: | |
| 1) Somewhat of an error in your math? | |
| 2) "As far as present technology is concerned." | |
| "As we all know the keyspace of IDEA is 128-bits. In base 10 notation | |
| that is: | |
| 340,282,366,920,938,463,463,374,607,431,768,211,456. | |
| To recover a particular key, one must, on average, search half the | |
| keyspace. That is 127 bits: | |
| 170,141,183,460,469,231,731,687,303715,884,105,728. | |
| If you had 1,000,000,000 machines that could try 1,000,000,000 keys/sec, | |
| it would still take all these machines longer than the universe as we | |
| know it has existed and then some, to find the key. IDEA, as far as | |
| present technology is concerned, is not vulnerable to brute-force | |
| attack, pure and simple. " | |
| Somewhat of an error in your math | |
| ======================== | |
| OK, let's examine the math. For simplicity, let's say we only had one | |
| machine that could try 1,000,000,000 keys/sec. The number of seconds it | |
| would take for this machine to search half the keyspace, and thus find | |
| the correct key would be | |
| 170,141,183,460,469,231,731,687,303715,884,105,728 divided by | |
| 1,000,000,000. This would yield 170,141,183,460,000,000,000,000,000,000 | |
| seconds of maximum search time before finding the key. This in turn | |
| would be 2,835,686,391,010,000,000,000,000,000 minutes = | |
| 47,261,439,850,100,000,000,000,000 hours = | |
| 1,969,226,660,420,000,000,000,000 days = 5,395,141,535,400,000,000,000 | |
| years = approximately 5.395 sextillion years. If there are 1,000,000,000 | |
| of these machines as you suggest, then the years required for a | |
| successful brute force crack would be 5,395,141,535,400,000,000,000 / | |
| 1,000,000,000 = 5,395,141.5354. So, it comes down to: are you saying | |
| that these 1,000,000,000 machines are acting as a collective entity or | |
| can *each* one of these machines operate on 1,000,000,000 keys/sec and | |
| thus operate together at a speed of (1,000,000,000) * (1,000,000,000) = | |
| 1,000,000,000,000,000,000 keys/sec. If the first is true, then you are | |
| correct in saying that "it would still take all these machines longer | |
| than the universe as we know it has existed and then some," as it would | |
| take app. 5.395 sextillion years (scientists estimnate that universal | |
| redshift shows the universe to have existed thus far for only 15 billion | |
| years). If the second is true, then it would take far less time than the | |
| existence of the universe at app. 5.395 million years... which could be | |
| compared to twice the amount of time human beings have existed on earth, | |
| or just a fraction of the time dinosaurs were here. | |
| [ Hrm. Take it up with Schneier. ] | |
| "As far as present technology is concerned." | |
| ============================= | |
| How far is present technology concerned?! The Intel/Sandia Teraflops | |
| Supercomputer can reportedly perform 1.06 trillion floating point | |
| operations per second (refer to | |
| http://www.intel.com/pressroom/archive/releases/cn121796.htm). Assuming | |
| [ Keep in mind that factoring and brute force key searches are | |
| integer-based calculations, not floating point operations. ] | |
| one of these "instructions" can operate on, let's say something around a | |
| 28th power float variable, then disregarding read/write operations, the | |
| system can search at 1.06 trillion keys/sec. This yields a total search | |
| time (before a successful "hit") of | |
| 170,141,183,460,469,231,731,687,303715,884,105,728 / 1.06 trillion = | |
| 160,510,550,434,000,000,000,000,000 seconds = 5,089,756,165,470,000,000 | |
| years or 5.089 quintillion years... still a rediculous amount of time | |
| even on the fastest publicised system in existence. Now, this system, | |
| the Intel/Sandia Teraflops Supercomputer is made up of 9,200 200 MHz | |
| Pentium Pro processors. Being that they didn't have to buy them at | |
| markup/retail and they manufacture them from scratch for their own | |
| purposes, let's say it cost $500 per chip plus some negligible ram and | |
| labor costs (how much ram do you need when you have a gig+ worth of | |
| onboard cache, etc.). With 9,200 chips, the system would take about | |
| $4,600,000 to build. A practical question: if federal taxation is %28 on | |
| an annual income of $80,000, where does all the money go? Well, let's | |
| say a Billion dollars per decade goes to the NSA to build whatever they | |
| want. If the 9,200 chip system cost $4,600,000 then a little algebra | |
| reveals that with one billion dollars, the NSA could purchase | |
| approximately 2 million 200 MHz pentium pros. If the 9200 chip system | |
| did 1.06 trillion keys/sec, thus the 2 million chip system would be | |
| capable of approximately 230,434,782,609,000 keys/sec or app. 230 | |
| trllion keys/sec. Now, say the NSA is smart enough not to buy crappy x86 | |
| chips and instead get 500 MHz DEC Alpha RISC chips. This is 300 Mhz or 3 | |
| fifths faster than a 200 MHz pentium pro approximately. so 230 trillion | |
| + (230 trillion * 3/5) = 368,695,652,174,000 or 368 trillion keys/sec. | |
| The original calculation yields that the successful search time would be | |
| 170,141,183,460,469,231,731,687,303715,884,105,728 / 368,695,652,174,000 | |
| = 461,467,832,499,000,000,000,000 seconds = 14,633,048,975,700,000. Ok, | |
| great... so now we're down to 14.6 quadrillion years of search time, | |
| which means that at least now we may get REALLY lucky and hit the right | |
| key within a certain degree of insanity. But, this was only a billion | |
| dollars we gave the NSA in a decade. If we're especially paranoid, let's | |
| say the government was so concerned over nuclear terrorists sending | |
| encrypted messages, that the NSA got a TRILLION dollars to build a | |
| system. That divides the whole equation by a thousand making the search | |
| time 14,633,048,975,700 years or 14.6 trillion years... STILL | |
| rediculous. Ok, so let's say that now we're giving the NSA a HUNDRED | |
| TRILLION DOLLARS thus dividing the search time by 100 yielding | |
| 146,330,489,757 years which is about ten times longer than the existence | |
| of the universe. But now, if we had 1,000,000,000 of *these* machines | |
| working concurrently the search time would wind up being 146.330489757 | |
| years. But, if each RISC processor were replaced with a small piece of | |
| nanotechnology, each piece of this nanotech being 100 times faster than | |
| the alpha chips, you get 1.46330489757 year. There ya have it... some | |
| classified nanotechnology, 100 trillion dollars, and a DAMN lot of | |
| landmass all multiplied by 1,000,000,000 and you've brute forced IDEA in | |
| a year and a half. I won't go into the tedious calculations, but an | |
| object with the surface area of two of our moons would approximately be | |
| able to house this complex. Now, as I know you're asking about where to | |
| store all the keys... and the fact that this drive would be bigger than | |
| a solar system and so on, just have the keys generated using the same | |
| PRNG in the brute force attack... you'll just have three times the | |
| instructions (write for the generation, read to get it, write to compare | |
| it) so multiply the search time by three. The technology is possible... | |
| it's economics and territory that doesn't work. | |
| [ Theorectially shure. But you have sorta just proved the point that | |
| it is not feasible. ] | |
| --gKHAN | |
| 0x2b>------------------------------------------------------------------------- | |
| The snippit in P50 in section 02 of the zine by Xarthon entitled | |
| > Yet another Lin(s)ux bug! "IP_MASQ fails to check to make sure that a | |
| > packet is in the non routable range." "So in conclusion, you are able to | |
| > spoof as if you are on the inside network, from the outside. " | |
| Is so incomplete I would almost call it a lie. The only way that Linux | |
| would do this is if the person setting up the IP-Masq system issued the | |
| command "ipfwadm -F -p masquerade" which if you read the IP-Masq HOWTO it | |
| tells you explicity NOT to do for this very reason. My retort for Xarthon | |
| and all others who do stupid ass things like leave port 19 open and such; | |
| is that Linux only sux if you do. To wit, don't be a moron, and you won't | |
| have to complain that it sucks. | |
| Swift Griggs | UNIX Systems Admin | |
| 0x2c>------------------------------------------------------------------------- | |
| Hi there, | |
| I have a question regarding a certain piece of hardware that has come | |
| into my possession. Since this little piece of equipment contains no | |
| indications of its intended use i have no idea what this thing could do. | |
| So here's a descrition of the little box; i hope you might be able to | |
| provide me with more information on what this device is supposed to do. | |
| Description: | |
| -lightgrey rectangular casing (13CMx9CMx3CM) | |
| -frontpanel has one green LED, a connector labeled "SCANNER", and a | |
| little door which reveals two sets of dipswitches (2 sets of 8, labeled | |
| "DIPSW1" and "DIPSW2") | |
| -backpanel has three connectors, a RJ4-like connector (only it has 6 | |
| lines instead of 4; it looks like a connector for a Memorex Terminal) | |
| labeled "A", a standard IBM-PC keyboard connector labeled "B", and a | |
| small (9-pin) serial interface-connector labeled "C". | |
| -there is a sticker with a serial number, a barcode, and "Made in | |
| Taiwan" on the bottom | |
| -the circuit-board contains IC's of Sony, Philips, and TExas Instruments | |
| -there is also one removable EPROM, made by AMD; it has a label on it | |
| which reads "V2.61 CS:EF88" | |
| I have found that a normal keyboard plugged into connector B, while a | |
| KBD-to-RJ-jack cord is plugged into connector A will allow the box to be | |
| placed between the keyboard and the kbd-port; so my first guess would be | |
| that this is some kind of filtering device. But that doesn't explain why | |
| there is a serial-connector and this "SCANNER" connector present. | |
| So, do you know what this thing is ? | |
| -lucipher. | |
| [ Readers? ] | |
| 0x2d>------------------------------------------------------------------------- | |
| hi, my friends.i am a newbie come from China,i had read some Phrack magazine. | |
| but to me surprise,i had not success compile a program still now.i send e-mail | |
| to the author,but server tell me there is no this user. | |
| for example, phrack-49-15 describle tcp port scan,but i can not find | |
| ip_tcp.h, other paper tell me a way to guess password,and said the program only | |
| need Ansi complier,but i can not success too. oh.my god. | |
| i use sun os ,gcc, i need your help, thanks. | |
| yours | |
| keven zhong | |
| [ Here at Phrack, we use TheDraw for ANSI compilers. I hope that | |
| answers your question. ] | |
| 0x2e>------------------------------------------------------------------------- | |
| I'm just writing this to say thanks to all the hackers that represent Phrack | |
| and work hard to keep it going,you guys are truly keeping the new generation | |
| alive.If it weren't for Phrack i'd probably never have wanted to waste my time | |
| with computer's,the technical info is first class and a lot better than most | |
| of the crap out there.I would suggest that maybe once in a while u guys could | |
| write some more stuff geared towards the newbies,it really is important | |
| because most people who aren't familiar with the terms get completely | |
| lost.Down here in Montreal(514),most people think hacking is spreading virri | |
| or u/l shitty trojans,there's no talk about unix or networks.We really need | |
| some help down here,the scene is practically dead and most newbies don't have | |
| any support to help them get started.Anywyas i just want to say keep up the | |
| good work,and it's really appreciated. | |
| -- | |
| | Return Address: Dave.Conway@claw.mn.pubnix.net | |
| | Standard disclaimer: The views of this user are strictly his/her own. | |
| [ Thanks, if anyone cool is in Montreal, e-mail this guy and revive | |
| your scene. ] | |
| ----[ EOF | |