| ---[ Phrack Magazine Volume 8, Issue 53 July 8, 1998, article 02 of 15 | |
| -------------------------[ P H R A C K 53 L O O P B A C K | |
| --------[ Phrack Staff | |
| [ Ed. note: The letters are perhaps editted for format, but generally not for | |
| grammar and/or spelling. I try not to correct the vernacular, as it often | |
| adds a colorful perspective to the letter in question. ] | |
| 0x1>-------------------------------------------------------------------------- | |
| [ P52-02@0xd: ... Something you've mailed to a whiley bunch... ] | |
| I couldn't help but notice your use of "whiley" rather than the more common | |
| English word "wily" in the above-quoted paragraph. In the future, take the | |
| time to grammar and spell check your replies to minimize the emotional | |
| damage you are bound to suffer. | |
| --Bob Stratton | |
| [ WHOA! My bad. Strat has caught me with my proverbial pants around my | |
| proverbial ankles. Further evidence towards me - not - being | |
| omnisicient argument (although I still believe this to be conjecture). ] | |
| P.S. Thanks for the sensible code-formatting discussion. Your style sounds | |
| a lot like that which kept me sane back when I earned my living writing | |
| code. The enlightened person's answer, of course, is to use an Emacs minor | |
| mode, and to let the editor do the work while one types. Emacs is also the | |
| answer to the Windoze 95 junkie looking for something with which to read | |
| Phrack. Works for me. | |
| [ Amen. Except for the emacs part. pico with regexp or vim 5.0 with | |
| syntax highlighting is the way to go. ] | |
| 0x2>-------------------------------------------------------------------------- | |
| [ P52-09: On the Morality of Phreaking ] | |
| Dear Phrack, | |
| I am not a hacker nor a hacker wannabe, so I had only the most passing | |
| acquaintance with your publication. However, today by chance I came across | |
| this article in your January 26 issue. | |
| I am impressed. I did my MA in philosophy, and I was quite nonplussed to see | |
| such a lucid and philosophical point of view in what is, to my understanding, | |
| a very specialized publication not typically devoted to philosophy. Though my | |
| areas of interest were mainly Nietzsche and Deleuze, I found your summary of | |
| both Mill and Kant to be accurate and well-applied. Kudos, you obviously have | |
| some very intelligent people on staff, whose talents are not limited to your | |
| own area of expertise. | |
| Yours respectfully, | |
| Sean Saraq | |
| Toronto | |
| [ High praise indeed! Thank you for the compliments. It's good to see | |
| we're read in communities other then that of our target demographic. ] | |
| 0x3>-------------------------------------------------------------------------- | |
| I can't believe you included article 12 in Phrack 50. Is Phrack really | |
| getting so sad? Have you really got nothing better to publish than | |
| regurgitated crypto babble? | |
| [ Despite what you may think, we are not sad. The phrack compound is | |
| imbibed with much conviviality and festivity. Why, every Friday is | |
| `punch a mime day`. We hire a mime to come down to the office and we | |
| all take turns punching him in the face. ] | |
| Cheers, Chris (XORed that's Fghyud) | |
| [ That's not a very good XOR implementation you have there. It appears | |
| an extraneous character has been inserted. Check your pad or the stream | |
| cipher. Or perhaps check your other regurgitated crypto babble for more | |
| info. ] | |
| 0x4>-------------------------------------------------------------------------- | |
| For those readers interested in "Piercing Firewalls" (Phrack Issue 52) | |
| take a look at datapipe.c available at www.rootshell.com. I can't think | |
| of any way to make it work with X, like tunnel/portal, but it works fine | |
| with telnet and nothing needs to be running outside the firewall. | |
| ziro antagonist | |
| [ Noted. ] | |
| 0x5>-------------------------------------------------------------------------- | |
| Okay, enough nagging about the Milla pics! | |
| The one thing everyone reading Phrack wants to know is: | |
| When will you publish nude pictures of dangergrl ??? | |
| [ When your mom gives them back. ] | |
| Yours Sincerely, | |
| -anonymous. (i get kicked from #hack enuf as it is already :) | |
| [ What a suprise. ] | |
| 0x6>-------------------------------------------------------------------------- | |
| While the Juggernaut program is interesting, I've found that its model for | |
| session stealing is a tad limited. There are two issues, one of which I've | |
| dealt with. First issue is the one packet read, one packet written paradigm. | |
| It really should allow separate threads for read/write to avoid getting | |
| easily out of synch. This I've not dealt with, but it is understandable given | |
| the second, the ACK storms it creates. | |
| [ Juggernaut 1.x is very primitive in many ways. Juggernaut++, the next | |
| generation juggernaut, has been mostly redesigned from the ground up | |
| with a 90% new code base. It has many things the previous versions | |
| lacked, including: a much better interface, threading for concurency, | |
| portability, effcicieny mods, and many bugfixes. ] | |
| The ACK storms can be avoided with an ARP attack (or possibly an ICMP | |
| redirect). Send an ARP message to the source of the connection you're | |
| stealing (an ARP reply) which tells it that the ethernet address of the | |
| machine it's talking to (the destination machine, which you want to talk to | |
| instead) is something "off in space" like 2:3:4:5:6:7 instead of the real | |
| address. This needs to be done fairly often, should be started immediately | |
| before you start your hijack attack. | |
| [ Indeed. As long the host will accept and cache unsolicited ARP | |
| responses, this will work. ] | |
| The result is that the machine you are intercepting becomes unable to talk to | |
| the destination and won't desynch the session, and traffic goes to practically | |
| nothing. After you stop, the ARP table will shortly expire and be updated | |
| with correct information, so the attack will either appear as a network | |
| glitch, or you'll get alerted (NT will alert) that an IP address conflict | |
| exists (but tell nothing about what the conflict is with). Moreover, an ARP | |
| reply will escape the notice of many network monitoring programs. | |
| [ Something like this has in fact been implemented in juggernaut++... | |
| And, just to answer the burning question I get asked so often, NO, J++ | |
| is NOT publically available. ] | |
| I have sent the code to the original author of Juggernaut (being inclined to | |
| share knowledge) and wanted to alert you. | |
| [ The original author of juggernaut and I are pretty close. I'll be shure | |
| to check with him. ] | |
| 0x7>-------------------------------------------------------------------------- | |
| Hi! My name is StiN. | |
| [ Mine's route. ] | |
| I'm from Russia. | |
| [ I'm from the U.S. ] | |
| Sorry for my bad English. | |
| [ Sorry for my bad russian, comrade. ] | |
| I Have a friend His name is Armany. | |
| [ I have a friend named Gilgamesh. ] | |
| Where do you live? | |
| [ I live in a small one bedroom aprartment with four cats. ] | |
| How old are you? | |
| [ 19. ] | |
| What's yore name? | |
| [ We already went over this. ] | |
| What's yore Hobby? | |
| [ Volunteering for free medical tests of any variety. ] | |
| Do you knew Russia? | |
| [ I KNEW RUSSIA BACK IN THE GOOD OLE' DAYS! Back before the collapse. ] | |
| Good Bay. | |
| [ Bad Bay: Bay of Pigs. Good bay: Bay of jello. ] | |
| 0x8>-------------------------------------------------------------------------- | |
| Hola, soy Omar | |
| Soy un fantico de su revista, la sigo desde la phrack 48. | |
| No soy un hacker, phreaker, o cualquier cosa, soy ms un fantico de las | |
| malditas mquinas. | |
| Muy buenos artculos; gracias por las cosas de LINUX (me fueron de mucha | |
| utilidad) | |
| Suerte y sigan as. | |
| Saludos de Uruguay. South Amrica. | |
| [ Yo quiero taco bell. ] | |
| 0x9>-------------------------------------------------------------------------- | |
| hi, | |
| where can i find the source code for the legendary internet worm by | |
| morris (1988) ? | |
| thanx (i hope u dudez can help me :( ) | |
| [ ftp://idea.sec.dsi.unimi.it/pub/crypt/code/worm_src.tar.gz ] | |
| 0xa>-------------------------------------------------------------------------- | |
| My friends were going to a basketball game at their gay school (Grades | |
| [ Wow, they have gay schools now? Do they videotape you jerking off | |
| and looking completely gay and stupid? (http://www.leisuretown.com) ] | |
| pre-school through 8th grade). They were wearing their wallet chains, | |
| not causing any harm with them. (It was an after school activity) the | |
| [ As opposed to those people who have the wallet-chain/morning-stars. | |
| They are the ones who cause all that wallet-chain inflicted harm. ] | |
| teachers made them take them off. My friend, Krazy K, asked if he could | |
| [ Krazy K? Any relation to Daft D? ] | |
| take off the chain and keep the wallet, but they made him give them the | |
| whole thing. He thought it was funny, though, especially since he had | |
| condomes in it (It is a "christian" school). Not that he was going to | |
| [ Condomes! The condom that's a tent! ] | |
| use them. They of course being the nosy bastards that they are, rummaged | |
| around in it to their liking and found them. (We know because they | |
| talked to him about it. | |
| [ Good detective work. ] | |
| He told them it was a joke he was going to do to his friend. "I was going to | |
| put it in his locker" He said.) | |
| [ Now *that's* good humor. ] | |
| I was wondering about the legality of this whole thing. Is it legal | |
| [ Perhaps you should wonder about the stupidity of the whole thing first, | |
| then work your way towards relevance, and then back to stupidity again. ] | |
| to take someones wallet and chain (Which I consider personal property) | |
| when it is an after school activity and then look through it? They gave | |
| [ *shrug* Sure is fun though, isn't it? Actually, I don't know the laws | |
| and regulations of gay schools. It just might be allowed. ] | |
| him no alternative (but to go home, and, "Oh by the way, you can't use | |
| the phone"). Then to search through the wallet without permission of the | |
| owner? I am asking because, I would like to get them in trouble, In | |
| retaliation to the many times I've been screwed there (I go to high | |
| [ Been screwed at the gay school? Hmm. Did you have any condomes? ] | |
| school now, thank God). If you could tell me, or know of someone who | |
| knows, then that would help us. | |
| Thanks, | |
| Abs0lute Zer0 | |
| [ You can say that again. ] | |
| 0xb>-------------------------------------------------------------------------- | |
| Dear Editor, | |
| I would like to take a chance to give my most sincere thanks for | |
| resurrecting my uttermost respect to the humanity (so often shattered by | |
| politicians and other freaks) by providing me a unique opportunity to | |
| immerse myself into the deep wisdom and magic of written word found in the | |
| Line Noise section. This is truly the place where one can look for (with a | |
| sense of deep confidence) a genuine proof that every person is a genius on | |
| the inside. | |
| [ Well thank you very much. Although I think you are refering to | |
| loopback. ] | |
| Driven by this wonderful feeling of replenished hope and respect, I'd like | |
| to answer a cry for help from a young but talented Hacker Demonhawk, who | |
| expressed a wish to "blow shit up!!". I used to be a chemist, and I would | |
| [ Ummm... ] | |
| like to share, in the spirit of the magazine, my knowledge and provide easy, | |
| quick instructions for young fighting souls that would assist them in the | |
| aforementioned noble cause. In other words, how to build a bomb. | |
| [ Whoops. You just lost me there. ] | |
| { rest of message truncated due to overwhelming levels of inanity ... } | |
| 0xc>-------------------------------------------------------------------------- | |
| where would one go to get "private" hacker help? | |
| [ In the back where they give the lapdances. ] | |
| 0xd>-------------------------------------------------------------------------- | |
| sorry to bother ya... | |
| i was hoping maybe you could give me some info. don't take me for a complete | |
| idiot, | |
| [ Uh oh. ] | |
| i just don't know much about this kind of stuff. | |
| maybe u could get me started... give a few tips??? | |
| [ Sure. Never kiss on the first date. Always pack an extra pair of | |
| socks AND underwear. Never put electrity in your mouth 'just to see | |
| what would happen'. Also, if you happen to find yourself in the | |
| position, always at least *ask* to give someone the reach-around; it's | |
| common courtesy. ] | |
| 0xe>-------------------------------------------------------------------------- | |
| Hello, | |
| My name is Robert I guess you could call me a beginner hacker I I was | |
| wondering if you could please help me out I need some hacking numbers and | |
| [ Ok. 7, 9, 11, 43, and 834. ] | |
| passwords just so I can play around on them and get good. Also if you have | |
| [ Sure. Try `password`, `hacker12`, `pickle`, and `love`. ] | |
| any files or anything that you think that would be helpful to me please attach | |
| [ Alright, /dev/random is a good one to start with. ] | |
| or tell me where I can get them. I just bought the book Secerts Of A Super | |
| Hacker By Knightmare is that any good if there is any books I should get | |
| [ Ah yes, the book of the truly desperate and depraved. As was said once | |
| before by Voayger, Knightmare's biggest hack was getting that book | |
| actually published. ] | |
| please tell me or if you have any text please send. I am running windows 95 | |
| [ Can you put Windows 95 in your mouth? NO! Such is Mango! ] | |
| Thanks For Ur Time | |
| Robert | |
| 0xf>-------------------------------------------------------------------------- | |
| Dear Sir | |
| I like you hacker people because you made life easy | |
| to a lot of people | |
| [ Especially the makers of fine Bavarian shoe-horns. ] | |
| I want to ask you an important question to me | |
| When connecting to Internet, I found that some sites inform me with my ISP IP# | |
| So if they're any possibility that any site can track me | |
| and identify the following | |
| 1-what country I came from? | |
| [ Well; if you're dialing up to your ISP, and connecting to 'sites' from | |
| there, that would be a one hop jump out to the world. And yes; they | |
| could find out what country you're coming from, unless you're dialed | |
| into a provider in another country. In which case; it might be a little | |
| more difficult. The other tipoff is when you scan in your birth | |
| certificate and put it up on your webpage along side your current | |
| address and a head shot. | |
| That's a 'no-no'. ] | |
| 2-what is my phone number? | |
| [ Are you asking us if we know your number? Or if someone can find your | |
| number when you connect to their machine and they know your IP address? | |
| I'm confused, so I'll answer the question both ways. | |
| A-1: No. We don't know your number, and we don't want it. While we're | |
| at it. We don't want to make out with you either. Quit sending us the | |
| flowers. It's over this time once and for all. | |
| A-2: If you did something that would incite someone to try to find your | |
| phone number; odds are if it was an illegal action your ISP would gladly | |
| hand your information to the first law enforcement person who walked | |
| through the door. Or for that matter, anyone who asks nicely. ISPs | |
| aren't exactly known for being well guarded vaults of information. ] | |
| Globally can any site by coordination with my ISP track me and catch me? | |
| [ Ever hear of Kevin Mitnick? ] | |
| Please provide me with a full answer quickly. | |
| [ Do people not realize this is a quarterly magazine? Quick for us is | |
| 3 months. If you've done something stupid and gotten busted; our | |
| sincerest apologies for being late. Next time we'll drop what we're | |
| doing and get right to it. ] | |
| 0x10>------------------------------------------------------------------------- | |
| I am a Indiana University student currently studying Criminal Justice. I am | |
| trying to gather data and find information concerning computer hacking and | |
| governmental and/or corporate involvement. The twist that I am persuing | |
| concerns a rumor that I had heard. I was told that when some computer | |
| hackers were caught, they were recruited by the government and/or | |
| corporations to work in their security department. Usually where there is a | |
| rumor, there is some truth to the matter, especially when concerning the | |
| department of defense. I don't know if you could help me find information | |
| concerning this issue. Any help would be greatly appreciated. | |
| Respectfully, | |
| Jason Sturgeon | |
| [ Well... We at Phrack haven't heard anything about the DoD hiring | |
| 'hackers', it's been our understanding that the government at least | |
| prefers straight laced guys with military background to handle their | |
| stuff. Although it's not out of the realms of possibility that they've | |
| hired 'hackers', if it's happened it's of rare occurance, and those | |
| individuals who fit the title of 'hacker' probably don't conform to your | |
| definition of what a 'hacker' really is.. | |
| Corporations and The Government for the most part tend to shy away from | |
| 'hackers', if merely for the stigma of being a 'hacker'. But as a | |
| stereotype, hackers conjur up all sorts of bad mental images for | |
| respectable management types. We're sure it's happened to some capacity, | |
| but we have no witty anticdotes concerning it. ] | |
| 0x11>------------------------------------------------------------------------- | |
| Hello there | |
| I have heard there are some risks using callback modems. | |
| Can you give me some more info on this, or info where to look | |
| [ Risks of callback modems are fairly simple. The problems involved with | |
| them are a little bit more complex. We'll discuss both in an effort to | |
| best cover this subject. The overall fundamental flaw of callback | |
| modems is the idea that you could 'fake' a hang-up on your end, or play | |
| a dialtone in an effort to fool the modem into thinking it hung up. Then | |
| you wait for it to dial the number, and once it's done, 'ATA' your modem | |
| and pick up the carrier. | |
| We ourselves have tested this a couple times with moderate success, it's | |
| not 100% accurate, and it also depends on the hardware on the remote | |
| side. | |
| If the call-back information is based of ANI, that could provide more | |
| problems, since the Phrack staff has heard the rumor that you can fake | |
| ANI with certian types of ISDN set-ups. | |
| The two types of callback modem configurations, one being a program that | |
| acts as a frontend to the dialing mechanism, the other being hardware | |
| based. | |
| Such as, you dial in to the modem, the program asks you to authenticate | |
| yourself by some means, you do so; it hangs up and calls the number | |
| that's paired with your authenication information. This isn't so bad, | |
| but if anyone remembers back when certian BBSs had callback that you | |
| could enter, you could make them call arbitrary phone numbers by putting | |
| in a fake number if their door was misconfigured. | |
| As far as hardware based call-back, whence you program the passwords and | |
| numbers into the modem and it deals with the whole transaction, | |
| introduces a scalability issue as well as the fact that the modem has no | |
| means to log on it's own, etc.. etc.. etc. | |
| If any readers wish to write an article based on this subject you are | |
| urged to write it and send it in. It'd be nice to see some more solid | |
| information on this subject. | |
| As well; if any companies wish to send us modems, we urge you to send us | |
| some modems so we can put them up against a battery of hacker tested and | |
| hacker approved tests. ] | |
| 0x12>------------------------------------------------------------------------- | |
| I would like to know about cellular phones....how to find out secret | |
| pin, how to listen to calls etc.... | |
| [ I would like to know more about marshmellows. How they're planted, the | |
| way they're picked in the spring time as they blossom from the little | |
| tiny buds you get in 'Swiss Miss Hot Coco', to the fat chewey vessles of | |
| taste and excitment that they are at full maturity. | |
| I would like to find out the secrets of gravity, as well as a good solid | |
| reason why the universe keeps 'expanding' -- without any of that "just | |
| because" rhetoric that seems to dominate the subject. ] | |
| If You need the cellular make I'll be obliged to give it to you.... | |
| [ Wow. You'll give us your phone just so we can look at it? Send us your | |
| home address and we'll send you a S.A.S.E to mail it back to us in. ] | |
| Thanks. Anthony. | |
| [ No. Thank _you_ your generosity Anthony! ] | |
| 0x13>------------------------------------------------------------------------- | |
| Hiya, | |
| Not wishing to sound like a playboy forum article but I have read phrack for | |
| [ Already my interest is waning... ] | |
| quite a while and have only seen cause to write now. | |
| I commend you on your editorial on C programming style. The sooner we get out | |
| [ And I commend you on your commendation. +100 points. ] | |
| there and club to death those people that use single space indentation the | |
| better. | |
| I do however have three main points to disagree with you on. | |
| 1. Write as many comments as you can. You may need to remember what it | |
| was you where coding AFTER copious amounts of recriational drugs. | |
| [ Nah. You don't want to get out of hand with the commenting. You end | |
| up commenting needlessly and redundancy abounds. And if you can't read | |
| your own code, kill yourself. -100 points. ] | |
| 2. Put your own varaibles with uppercase first letters (to distinguish them | |
| from sys vars) | |
| [ `sys vars`? What like argc, argv or errno? This is a ridiculous | |
| suggestion. It makes your code ugly and harder to parse. I award you | |
| no points. ] | |
| 3. In reference to your comment | |
| "In the grand scheme of things, none are really | |
| any more correct than any others, except mine." | |
| It must be said that this is completely wrong. The only point that counts | |
| is in fact mine. | |
| [ Not when it's in my magazine. With a final score of 0, you lose. ] | |
| Regards, | |
| andrewm at quicknet dot com dot au | |
| [ Cute. ] | |
| 0x14>------------------------------------------------------------------------- | |
| Dear Guys, | |
| First off, I'd like to say that I am ever more impressed with the quality | |
| of each successive issue of Phrack. | |
| [ Danke. ] | |
| The reason for this mail it to respond to the request made by N0_eCH0 in | |
| Ireland in issue 52. Myself and a few friends are happy to help this guy | |
| out if we can. I'm afraid that we're no great sources of knowledge, but | |
| are willing to have a crack at most things. | |
| Anyway, if you can pass this on, as there was no e-mail address for | |
| N0_eCH0, I'd be much obliged. Keep up the excellent work, I look forward | |
| to issue 53 ! | |
| ben_w@netcom.co.uk | |
| [ There you go. ] | |
| 0x15>------------------------------------------------------------------------- | |
| To whom it may concern: | |
| I was wonder how I can read someone dir and take over their | |
| account the kernal is 2.0.0. How could I hack into the system | |
| without having a passwd!! | |
| [ I assume you mean Linux. `LILO: linux init=/bin/sh`. Oh, and you need | |
| console access. Good luck. ] | |
| Thanx! | |
| Tag | |
| 0x16>------------------------------------------------------------------------- | |
| [ P52-19@0x2: Statement of Louis J. Freeh, Director F.B.I... ] | |
| Hello, | |
| I would like to say that the article, published as P52-19 is without | |
| a doubt one of the most frightening threats to our freedom that man has | |
| ever seen. | |
| the article is: | |
| "The Impact of Encryption | |
| on Public Safety | |
| Statement of Louis J. Freeh, Director | |
| Federal Bureau of Investigation" | |
| This article basically states that Americans should have now | |
| personal communication rights whatsoever. The Director of the FBI | |
| practically states that strong encryption should be banned from the | |
| public, because he wants law enforcement officers to be able to read all | |
| of our mail. He says that this would be for reasons of terrorists and | |
| criminals, but fails to state that the security of the average American | |
| would be compromised. Due to his proposal that you would have to | |
| forfeit your key to government officials, and that these keys would only | |
| be used "for the immediate decryption of criminal-related encrypted | |
| communications or electronic information.". Or maybe this way the | |
| government can just intrecept all of your communications. | |
| My main objection to this is the irrelevancy that this would have to | |
| the general public. According to US law, the US Postal Service is the | |
| ultimate form of private security. The average American should be able | |
| to send a letter to anywhere in the world, and it should be completely | |
| safe. And what more can you send with encrypted email? A program, but | |
| you can do that with a disk in a letter. So whats stopping these | |
| terrorists from hopping on down to the Post Office? | |
| Another problem with this proposal is that encrypted information is | |
| more used to protect your information from other parties then the | |
| government. I can guarantee that the average Joe living down the street | |
| is encrypting his love letter to his mistress Jane so that his wife | |
| doesn't see int, not so that some lazy, fat, government "official" | |
| doesn't see it. Most people use this technology for much more practical | |
| usage than the deception of the government. We use it because of the | |
| millions of people on the Net, and perhapse we don't want those millions | |
| to see every little thing about our personal lives. | |
| And finally, why should the government be able to restrict our right | |
| to gather peacefully? With technology moving so fast, i think that it | |
| is reasonable to assume that the Internet is a gathering place? We have | |
| all of the means of normal communication and more. Chat rooms, email, | |
| and programs like Mirabilis's ICQ allow us to communicate on a whole new | |
| level. | |
| In light of all of this, i hope you share my opinions now about the | |
| loss of freedom that this would represent. Thank you. | |
| 0x17>------------------------------------------------------------------------- | |
| Hi, | |
| I am a little sysadm on a little Linux-Server on the net. | |
| [ I have little interest in those details. ] | |
| I am searching for documents about System Security under Linux/UNIX | |
| just to be up-to-date :) Thank you for your help. | |
| [ http://www.redhat.com/linux-info/security/linux-security/ ] | |
| And btw...I have parts of the /etc/shadow file from my ISP...what | |
| can I do with this? Can I just run crack over it? | |
| [ Well now, that all depends on what parts you have, doesn't it...? | |
| If you have the encrypted hashes, then you're in business. ] | |
| And, btw: Not all germans hate americans...I am german and I | |
| don't hate americans... and my generation has nothing to do with | |
| the WWII... | |
| [ Oh, I think you do. I am relatively certian that, somewhere deep | |
| down, you dislike us. You couldn't take a shellacking like you did | |
| in WWII (not to mention spaetzle) and *not* feel some sort of | |
| resentment. It's ok. Embrace your malevolent feelings. Hug them. | |
| C'mon! Once you've done that, you can dissolve them. I admonish you to | |
| TURN THAT FROWN UPSIDE-DOWN! Cmon! Bodyslam yourself into gayness! ] | |
| -firefox01 | |
| 0x18>------------------------------------------------------------------------- | |
| Hello there, good to talk to you. | |
| [ Likewise. ] | |
| I am just this "Thinker" with this thought why don't we the Hackers and you | |
| the one of the major contributing Hacker commune (2600,Phrack,ect) make a Full | |
| Strong "live" Cryto network for the Hacker and by the Hacker. | |
| [ I have a thought. Get a speak n' spell. ] | |
| I can't belive I am sending this from hotmail bought out by | |
| microshit blah blah no this thing must be really insecure. | |
| [ Well, maybe it just needs love and attention and for someone to say nice | |
| things to it. ] | |
| Well I have a whole line of ideas and no one ever listens to me | |
| netscape ect... but if your intrested e-mail me back and I'll give you | |
| my POP adress. The benifit of this system is 1) we can piss off the FBI | |
| [ Yes, let's piss off the F.B.I. And, while we're at it, let's piss off | |
| the IRS and let's annoy the CIA.. We can poke fun at the retarded | |
| wrestlers association. And lastly, let's aggravate an enraged bull. ] | |
| and 2) final we hackers can have a place to loyter and idile , lurk at | |
| [ loyter and idile? Hey, aren't they those two Jewish film critics? I | |
| love them! ] | |
| where we can say what ever the Hell such as Full deatails on how to | |
| enter a sys,ect...of corse we will have to screen ppl for trust ect... | |
| [ And screen them for stupidity. ] | |
| But I reall belive we can werk this. | |
| If you want to here the rest of my ground shaking ideas just ask, or | |
| full deatials on the Crypto.net . | |
| [ Pass. ] | |
| 0x19>------------------------------------------------------------------------- | |
| First off, I'd like to say that I love the mag...but you really get some | |
| nutjobs that post to it..(myself included) I'm not an elite hacker, a unix | |
| guru or anything like that(duh), but I am amazed at the effort you put into | |
| Phrack...anyways, keep up the good work | |
| [ Thanks, nutjob. ] | |
| 0x1a>------------------------------------------------------------------------- | |
| Hello, | |
| Who was the first hacker in history? | |
| [ God. ] | |
| thanks for your time, | |
| greetings, | |
| Max | |
| 0x1b>------------------------------------------------------------------------- | |
| Hi. | |
| i'm a Swedish kid and i just wonders | |
| [ Now the Swedes I like. Beautiful women. Amazing accents. I *think* | |
| they like me. Although this one particularly hot Swedish girl I know | |
| doesn't seem to like me much. I think maybe it's because I try too hard | |
| around her. She'll come around and I'll be like bouncing off the walls | |
| trying to impress her.. I remember one time I got so excited I almost | |
| set sail for gaiety. I know. I know. I should "just relax" and | |
| everything will fall into place. I dunno tho. She's so pretty. And | |
| ahm just so awkward... ] | |
| if you might know a good haking, freaking and craking | |
| site. I've checked everywhere but i have not any. | |
| [ Huh? ] | |
| 0x1c>------------------------------------------------------------------------- | |
| Hey sup, I'm makin an essay site similar to Slackers Inc. but with more | |
| essays. The only problem is I need sponsors to get my page up, can you pay me | |
| a small fee monthly for displayin a banner for your site. I know almost | |
| [ O.k. Sure, how does nothing/month sound? ] | |
| everybody knows about Phrack Magazine but I heard you do some sponsoring, E- | |
| mail me back if you are interested. | |
| [ Yah, we are *so* reknown for our advertising budget. And now I'd like to | |
| make Phrack reknown for sponsoring a gay fucking highschool/college paper | |
| stealing webpage. Sure. I'll get right on that after we do our 'kick | |
| a baby harp seal campaign'. ] | |
| 0x1d>------------------------------------------------------------------------- | |
| You need to write an Interactive tutorial to simulate hacking into a | |
| private college or a company. You should make it realistic and hard to access. | |
| [ Someone already did. They're called *.edu and *.com. Although sometimes | |
| they're not too realistic. ] | |
| 0x1e>------------------------------------------------------------------------- | |
| [ P52-14: International Crime Syndicate Association ] | |
| Dorathea Demming, | |
| You remark that the ICSA doesn't guarantee their certification against | |
| attack. | |
| "In plain English, they are saying that if you get sued, you are on your | |
| own." | |
| Do you know of any security company, consultant, or consortia that will | |
| commit to helping a customer legally if they've been attacked? | |
| Stu | |
| 0x1f>------------------------------------------------------------------------- | |
| In skateboarding you are a "poseur" if you don't know shit. | |
| In the computers culture you are a "lamer" if you don't know shit. | |
| The term that bugs me is "elite" or "eleet" or "3l33t3". | |
| Are you elite? | |
| I just don't like the term. | |
| I really like the term "HI-FI" ,as in high-fidelity, or high-fidelity | |
| stereo's. | |
| An outdate term that orginally meant "I've got the best gear". | |
| But now it just means "late 70's marketing scheme". | |
| Are you hi-fi? | |
| It has a ring to it. | |
| You may be elite right now but in time you'll be hi-fi. | |
| ------------------------------------------------------------------------------ | |
| ----[ EOF | |