==Phrack Magazine== Volume Six, Issue Forty-Seven, File 21 of 22 **************************************************************************** International Scenes There was once a time when hackers were basically isolated. It was almost unheard of to run into hackers from countries other than the United States. Then in the mid 1980's thanks largely to the existence of chat systems accessible through X.25 networks like Altger, tchh and QSD, hackers world-wide began to run into each other. They began to talk, trade information, and learn from each other. Separate and diverse subcultures began to merge into one collective scene and has brought us the hacking subculture we know today. A subculture that knows no borders, one whose denizens share the common goal of liberating information from its corporate shackles. With the incredible proliferation of the Internet around the globe, this group is growing by leaps and bounds. With this in mind, we want to help further unite the communities in various countries by shedding light onto the hacking scenes that exist there. If you want to contribute a file about the hacking scene in your country, please send it to us at phrack@well.com. This month we have files about the scenes in Norway, France, Italy and an update from Denmark. ------------------------------------------------------------------------------ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- dfp-1 An orientation on the Norwegian hacking/phreaking scene dfp-1 Written by the Digital Freedom Phanatic (dfp@powertech.no) Brought to you in January, 1995 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - PROLOGUE: It's 1995 and little has been mentioned about Norwegian hackers in the media lately. I thought this would be a nice opportunity to summarize some of the things that have happened on the scene in Norway during the last 5 or so years. For those of you in the Norwegian audience not recognizing my name; you shouldn't. I am more or less an acquaintance of many of you guys, but I feel that in order to get something done on the Norwegian scene right now (it's been fairly quiet for a while, nicht wahr?) I cannot reveal my true identity. Hell, let's see if I get any responses to this article. Now for the good stuff... Unfortunately I entered the scene as late as around 1990, so I'm not quite up-to-date on stuff that happened before that. I've been trying to gather old articles from newspapers and books. What I have been able to come up with is more or less some articles about a couple of hackers who managed to get into a local newspaper's computer. Also, I have gotten in touch with some of the _real old Norwegian hackers_ dating back to the '70s. Needless to say, those people today work in the telecommunications industry. AREAS OF INTEREST FOR HACKERS: First, a little introduction to Norway. We are a very, very rich country, mainly due to the enormous amount of oil resources which we are pumping from the North Sea. As a result of this wealth (I guess), our people are well educated and we have a blooming industry. Well, in some cases. Nevermind. Keywords: large corporations, very large and respected telecommunications semi-monopoly, expensive communications. So in theory, there should be a lot of corporate hacking taking place in Norway. Well, either the people doing this are doing it real well, or nobody is doing it. I don't think anybody is. As I have come to understand, most hacking in Norway has really been Internet related. Norway was actually one of the first countries apart from USA getting connected to the Internet; way back in 1982. STATUS OF INTERNET CONNECTIVITY: The universities have been hooked up since the dawn of time, and today these are the centers of the Internet community and high-speed telecom equipment in general use in Norway. Actually, we have four universities and at least three of them are currently networked with each other at a speed of 34Mbps. The university network's (Uninett) international Internet connection is through NORDUnet and has a bandwidth of 2Mbps. Until a couple of years ago, one could not gain legitimate access to the Internet except by obtaining an account on one of the Uninett connected machines. This was impossible, at least for a majority of the hacker community, so Uninett, or rather the computers at the University of Oslo, became a Mecca for the scene. The big people had accounts there, or borrowed one. However, security is pretty stiff there and I fear that there was little actual _hacking_ going on, people were merely borrowing legitimate accounts through friends. What's fun about the University of Oslo computer network is that it until recently could be used for dialling out with speeds up to 14.4kbps. Actually, some of their dialup terminal servers were configured to let you connect into them and dial out. Try CONNECT USEk.15 after logging in to Net/ONE (the University LAN). I don't think this works anymore, nor do I know if this was a "feature" introduced when the terminal servers were installed. It could be that some hacker reconfigured them. In that case, please let me know! Dialled 820s as well (The 900 numbers of Norway). Today the Internet situation is very different. We have had an extravagant boost in the number of Internet access providers lately: Oslonett, PowerTech, EUnet, Vestnett, BigBlue, MoNet, NordNet and PMDData are those I can think of right now. Also, a number of companies are providing leased-line access: TelePost, EUnet and Datametrix. PowerTech is starting to do this soon now (they say), presumably with competitive prices, but they are real bad on bandwidth. (Well, they've been the cheapest for me so far.) At least we're not far from getting Internet trial accounts shovelled up our asses here. Let's hope some souls will soon pour some actual value into the net; more information, more services. I've seen little of that. Until we get more Norwegian fun services on the Net, we might as well exploit the services of Norwegian companies with no clue whatsoever when it comes to security. Take, for instance, Cinet AS (cinet.no) which has a world NFS mountable root disk (rw). BigBlue Systems AS (bigblue.no) uses a Linux server which you can log to using accounts named node1, node2 or node3. Full shell user access. Or you could try logging in as "-froot" to obtain root access. Hm, I think they plugged that. :) Well, ach so. There's more out there. Just get hacking. And feel free to tell me what you find! WHAT WERE THE HACKERS DOING: There used to be a blooming hacking scene in Norway earlier. Well, one might not say blooming with bright ideas and happenings, but at least there were many people doing the right stuff. Using X.25 NUIs to get to QSD, Password spoofing at the local DataPak PAD using Pad2Pad, Social Engineering, Hacking calling cards to get to the states, finding AT&T Alliance backdoors so as to keep people up all night long when there was school the day after.. The good old days. We could even do easy blueboxing. 1980s-1992. I must admit, though, that QSD isn't much anymore. I liked it better when there were a hundred people logged in simultaneously, and when there were alliances being held with people from the States, Norway, Denmark, Israel, all over the place. Then came the busts. It was around October 1992 when the first busts started taking place. We have a very interesting timeline there. First, the police teamed up with a couple of computer software retailers (BJ Electronics, sounds familiar huh?) and busted ten or so of the warez type board sysops. People to remember: Gizmo, Enemy :-). Soon after that, bigger names were taken down. Mario, Graham Two (Vishnu), Edison, RamJet, Peter, Leikarnes etc. Kevin was never busted. I wonder who he was. These guys were taken for more serious stuff like carding, datapak (x.25), AT&T Alliance conferences, boxing, and general abuse of the telephone system. A couple of shorter raid periods followed in 1993, and the scene was pretty much dead - except for the k-rad warez kids. AT&T and the other big guys we used to bluebox off of have all gone for CCIS/CCITT #7 so there is little to be done boxing in Norway now. Well, as a matter of fact I haven't checked that out lately. An interesting thing, though, is that you can temporarily disconnect the complete international trunk set between Norway and Iceland by breaking (24+26 250ms 26 100ms) on the Iceland Direct line. Everybody trying to _legitimately_ dial an Icelandic number from Norway for a while after that just gets a busy signal. Ha ha. Poor man's fun. Wish I could do that with the States... :) WHAT'S AHEAD FOR THE NORWEGIAN SCENE: I think we should get organized. I have a few projects in mind. There are a lot of security flaws and weaknesses yet to be discovered in Norwegian systems and services. We need to get all of Norway scanned for automated answering services and carriers. We need to get into some Central Offices to check out the labels on the modems connected to their Ericsson boxes. We need to get trashing. We need to start talking hacking and phreaking at The Gathering. We need to find data numbers for C.O.s, banks, corporate computers, the local McDonalds', we need to get root access at an Internet provider and we need to be able to listen in to phone conversations. We will. Get in touch with me if you'd like to join. These were just a couple of thoughts of mine that I wanted to share with you fellow hackers out there. Hope you've enjoyed them. And for heaven's sake, feel free to give me some feedback (via internet: dfp@powertech.no). FUN FACTS: Many companies have unconfigured PBXes that you can obtain outside dialtone on. There is no flat rate telephony. A 28k8 modem goes for a little less than $400. All phone calls are logged, logs are erased after a couple of months (presumably). Only ISDN customers can get Caller ID. There are three cellular operator companies. All the Norway Direct operators are situated in Kongens gate 21, OSLO, Norway. The NMT-900 Cellular network doesn't allow calls to Pakistan. All Norwegian babes are young, slim and blonde...not :) I'll be releasing a couple of files on Norwegian hacking/phreaking areas and techniques in the months to come. Here's a list of those I am planning, haven't written anything yet but I think I will. If there's anything in particular you'd like to add or to get hurried up, or if you have information which should be included in these files, then get in touch with me. (*) COCOTs and Monopoly operated Pay Phones in Norway (*) MBBS, the Norwegian BBS System; Backdoors and Security (*) Norwegian Telecom; TeleNor. Organization and computer systems. (*) The Norwegian State Libraries; BibSys network security (*) Telephone Monopoly; current status, what will happen, when? Sincerely Yours, Digital Freedom Phanatic Yola's to (unsorted, people I know or would like to know): Gizmo, Enemy, Mario, Graham Two (Vishnu), Edison, Roger RamJet, Peter, Gekko, Ozelot, Sicko, Flesaker, Karstad, Arild Leikarnes, Frode1 og Frode2 :-), The Dealer, Saron, Digital Phanatic, SCSI (BayernPower!), SevenUp (damiano?), UrbanMatrix, OnkelD. Where ARE you guys hiding? ;-) ------------------------------------------------------------------------------ >-=-=-=-=-=-< >-=-=-=-=-=-< By NeurAlien The French scene has always been portrayed as weak by both French and foreign people. There's a paradox here: France was one of the first countries to develop a modern network (in 1981) YET there have been few _good hackers_. How is that explained? I DUNNO ! In fact, stating that France is underdeveloped at a hacker level is partly false. In France, hackers have always been isolated or hidden in little isolated groups. Whenever a good group formed, everyone was quickly busted by DST (the agency in charge of computer fraud). Moreover, this agency (DST) is somewhat effective and hacking has been illegal here since 1988. The risks when you are caught are VERY HEAVY and the trial lasts forever! Usually, it takes 3 years to go to trial and the material is ALWAYS seized even if you're not charged with anything!. The Videotex initiative that provided France such a breakthrough in technology is now an handicap because it can't follow the evolution of modems and isn't well adapted for networking with the Internet. I- The Videotex aka Minitel ------------------------ Minitel has been developed in 1981 by France Telecom. It was excellent at the time but it hasn't evolved very much. Let's see what hacking has been like in the Minitel world. To explain a little what "Minitel hacking" was, I must detail a little how Teletel (the network that supports Minitel) works. Teletel is based on X25 and provides multiple price levels: Teletel 0 (T0) is free for the user, costs a lot for the server. Teletel 1 (T1) costs a local call to the user, the price of the X25 collect connection to the server. Teletel 2 (T2) costs the price of a local call + X25 communication (6+ cents per minute) to the user.) Teletel 3 (T3) costs T2 + a charge that is reversed to the server (costs 20 cents to $1 per minute to the user.) A lot of servers are accessible only in T3 for the users. The principle of hacking Teletel was to find a the X25 number corresponding to the T3 CODE in order to log on the T3 server from T2 level. Eventually, there could be a password on the T2 access. Actually, it's very basic and very dumb hacking since you can only do some scanning to find the x25 number of the servers. T1 was used for more professional type servers and the hackers that used to hack T1 were better than T2 hackers. T2 K0d3z were very popular among wannabe hackers, some Special Interest Groups about T2 were formed on a lot of servers and there was even a server dedicated to T2 codes. The quality of information has always been extremely low in this kind of club. Moreover, the kind of k0dez kidz on these SIGs and servers were particularly dumb (sorry for them). It got really bad in 1991 when a lot of T2 guys started to flame each other, accusing them of leeching some T2 codes from one server and posting them to another, saying that the other guys were ripping everyone off etc... It may be continuing now but I'm totally uninterested by these people so I completely left this scene. The "good ones" of the T2 K0d3z k1dz stopped T2 (it's not free so it's too expensive!). They usually started to Hack T0 which is totally free. (it's like a 1-800 for Teletel). The servers of T0 are nearly all of the "restricted access" kind. But they have weak protection schemes and can be easily bypassed with some experience. The hackers of T0 servers don't usually know each other and some of them may form a kind of little "islands". (I'm calling them "islands" because it is always placed in an Information System on T0, deep within the system. There are perhaps 10 or so "islands" that have no connection with other hackers. A typical "island" consists of 5 to 10 hackers. Some hackers may go on 2 or more "islands" but prefer to keep the presence of both "islands" secret. Why? In order not to destroy both if one of them is found and shut down! One reason most never heard of these person is that there is nearly no connection between the Teletel world and the Internet. The only way to escape to Internet and Intl X25 is Teletel 1 (T1). II- When Teletel goes professional ------------------------------- As I said, the T1 is the only way for a Teletel hacker to evolve to hacking Internet or International & ASCII X25. On Teletel 1, you can sometimes log on to some interesting Unixes, Vaxes etc. T1 is also the only way on Teletel to use the International X25 network. You have to get a Transpac NUI to call a foreign address from T1. Until 1991, the Transpac NUIs were a 4 to 6 random alphanumeric characters. A man called IER had made an NUI Scanner that allowed him to find NUIs by scanning out every 4 character NUI. It WAS effective, but Transpac changed to a 6 character NUI. (IER was busted and caught. No news from him since that day!) Many good hackers used T1 a lot to hack systems and to go on the Internet and the Intl X25 networks. For example, you may have heard of people like Netlink, Furax, Jansky or Synaps. They hacked X25 and Internet but it seems that each of them was busted and caught. Some are still alive on the Net, but some aren't!!! Some French hackers were really good but it seems that no one can hide very long from the DST. They are very effective, and with the help of France Telecom, they trace back a lot of calls. Places like QSD haven't been used very much by the French because of their lack of technological knowledge. ahem... Moreover, QSD/The Line is tapped by governmental agencies so g00d French hackers don't like it. IV- The groups ---------- Some groups have been formed in France but they've never lived long enough to give new hackers the knowledge of the old hackers. Some groups were: NICK, Hardcore Hackers, Piratel, TeKila Underground. Many of them were hacking systems in Teletel 1. A group called CCCF appeared in 1991. It was founded by Jean Bernard Condat and in fact it was not really a group. This guy, JBC, is deft at maneuvering people into doing what he wants. He organized fake contests like "The price of the Chaos" to get more information and then act as if he personally discovered the hacks that were given to him. He recently started the Chaos newsletter where nothing originates from him...it's taken from everywhere and from his personal contacts. He has big power because he works for SVP which is a private information company that has the goal of providing information to whoever wants it, for a large amount of money. Nobody knows what JBC really wants but he is definitely a threat to the underground. Somebody, I don't recall who, already mentioned that in Phrack. V- Phreaking in Phrance -------------------- Phone phreaking became really active in France in 1992 after the massive release of a blue box that worked in France. Several months later discovery of this caused the death of blue boxing from France. The blue box program was running on ST and several people that used it formed the TeKila Underground. As far as i know, this was an happy group that had a lot of parties and liked smoking... :) They weren't very effective: just into using the blue box. Then came the movement of the "Horlogers", it was due to the credit you could gain if you connected in Teletel 3 on some server. The "horlogers" were staying HOURS and DAYS on a server with blue box just to have more credit (counted in minute of connection) on those server. They were staying connected on a place called "L'horloge" (the timer) that enabled you not to be disconnected by the server when being idle for a long time. Blue boxing is now very hard in France. The Australian blue box ceased to work and a lot of phreakers couldn't phreak anymore. The real problem in France is that nobody (or almost nobody) knows how the France Telecom phone network works so we can't really use any flaws in this system. Calling cards have been heavily used in France, placing the country in the top ten consumers of stolen CC's. When AT&T & MCI saw that, they contacted France Telecom and now each calling card from AT&T, MCI can't call back to France. Moreover, FT's CC called "Carte France Telecom" (CFT or CP) is traced and recorded: I mean, when the person who owns the CFT receives the bill, written on the bill is the number of the caller and of the called party. HARD isn't it? Recently, some busts were done on AT&T and MCI CC users. They are now awaiting trial. VI- Magazines --------- Back before 1990 a magazine was published twice and sent to every single university in France. It was called "Hackito" from the "Hackito ergo sum" motto. (I've never found an issue of it, but if you have one, send me it to me in email.) There is also this shitty zine called Chaos... Now, a new zine is making the underground react in France: It's called "N0 Way" and I'm the Editor. This magazine is written entirely in French. The current issue is number 3. Anyone wanting to submit something to "N0 Way" can send me a message in Email. Today we are seeing a lot of people in France wanting to know more about hacking. It seems to have taken off here but not as much as in Holland or in the USA. Email me to receive "N0 Way": an133729@anon.penet.fi ++NeurAlien. ------------------------------------------------------------------------------ The Italian Scene by Zero Uno Italy, as you know, is among the industrialized EEC powers. It deserves this honor only to the work of talented people, not by its government, which is utterly idiot and totally unable to fulfill the needs of the people. This characteristic inevitably has conditioned the whole telecommunication market, both phone and networks, which must make clever long term decisions, something that Italian government is not able to do. The phone company is owned by the government through Italy Telecom (IT), the new society formed by the previous three state-owned firms involved in communications. In the last five years IT has undoubtedly made good work, but the quality of phone connections and service was so bad in the past, that many people feel very upset when comes to talk to IT. The Telephone System Italy is divided in 220 telephone districts, each with its own unique prefix: a zero followed by a number (up to three digits). In addition there are a few special prefixes in order to access cellular phones (0335,0336) or to reach some 'fake' locations (0769), like many tv programs that use the telephone to reach people. (Like 555 in the USA) In this way IT protects itself from line congestions when successful TV-progs are involved. All kind of modern connections are availabl. This means that payphones, pagers, cellulars (ETACS and GSM), radio (an old, now unsupported phone for cars in 400 Mhz range) are present. Another strange beast is televoting (0869) a fake prefix that holds the number of incoming calls for polls. It was used to test some political decisions, but the hack here was so evident (the redial button) that now televote is not so well thought of. Standard Numbering The numbers that begins with the digit '1' are reserved for special services. This include all amenities like emergency numbers (113, roughly the equivalent of American 911), 187 (an all-but-everything number for all requests to IT, such ordering a new phone, installing a new line and so on) and toll free numbers 167[0 or 8] xxxxx. As a reminder about IT's long term planning capacity, the toll free numbers started as 1678-xxxxx, but were so successful that IT was forced to add the 1670-xxxxx later |-(! All 1678-7xxxx are in use by foreign phone companies, and heavily scanned |-). Some pretty numbers: 1678-72341 A promo for a XXX-rated line (in north or south america) 1678-70152 See the following capture ---------------------------------- CAPTURE ------------------------------------- OFFICIAL USE ONLY ͻ FAMNET (sm) AFAS HQ and AF FSCs ͼ This system is for the use of authorized users ONLY. Individuals using this computer system without authority, or in access of their authority, are subject to having all of their activities on this system monitored and recorded by system personnel. In the course of monitoring individuals improperly using this system, or in the course of system maintenance, the activities of authorized users may also be monitored. Anyone using the system expressly consents to such monitoring and is advised that such monitoring reveals possible evidence of criminal activity, system personnel may provide the evidence of such monitoring to law enforcement officials. Line trace initialized........................................... We now have your phone number......WE TRACK HACKERS AND ADVISE AUTHORITIES. ---------------------------- END OF CAPTURE -------------------------------- Unfortunately IT does not support caller ID, so the last sentence is pure crap. The above numbers are (obviously) all public. These ones are 'reserved' for internal use, though many many people play with 'em: 135 BBS to record maintenance procedures 138 BBS or human operator (depend on districts) 1372 Ring-back 1391 Human operator 160 Security service (???) 1414 A yet-to-be-implemented service, that enables a user to use one phone and bill on their own phone the subsequent call. Will be implemented |-)? Not all districts support this, and since they are not public they can change rapidly. Also present are the country direct numbers in the 1721xxx format. Country Code ----------------------------- Argentina 054 Brazil 055 Chile 056 AT&T 011 MCI 022 Sprint 877 Services Offered With the advent of digital COs, 'new' (new to the Italian market, anyway) services were provided. The so called STS (additional telephone services) allowing (obviously paying) the teleconference (three user talking simultaneously), incoming call signal when you are talking with another party, and finally calling transfer, useful when you are away from home. The current pulses billed can be inquired (paying one pulse, obviously!). The Packet Networks There is only one packet network provider, ITAPAC (DNIC 2222). As with other packet networks, the access is available with a PAD that accepts only NUI accounts (non-reverse charging) and those who accept reverse-charge calls (in ITAPAC lingo, the 'easy way'). These are heavily hacked because it is the most widespread network in Italy (and the most unreliable, insecure, *bad*) and also because some NUI users simply were not aware of the costs of this kind of service, and they have payed all the phreakers' bills too! Sometimes, for promotional sales, some NUIs were discharged to the public. Other were disseminated by phreakers, collected by PAD (only a few NUIs are valid across different PADs, most aren't). Until some time ago QSD France was the most 'in' PAD site. Another common activity was surfing across Packet Networks of different states. Now many common NUIs were deleted from system, but some still survive. Many times the net is unusable because has reached its maximum load or because of for system outages. Also, even if the ports run at 2400 bps, is not uncommon to reach the same speed of a 1200 bps connection. Use it if you don't pay or pay a limited fee for it. The H/P/C/V Scene Common folklore depicts Italians as adaptable to unfriendly environments in a clever way. Although these rumors are not completely true, there is an Italian way of H/P/C/V. Hacking in Italy is not a common activity. There are several teens who spent lot of effort to learn some tricks, but they are teens, with all pros and cons. Rarely do these individuals survive the 20 years-old barrier, for one reason or another. Those who survive generally self-limit their actions to a restricted area, and generally remain anonymous. The few that remain are the brightest, with lot of know-how and abilities. I only know two people at this top rank level. Hacking is focused on setting up unauthorized fsp sites in university computers, removing licenses to pro warez and gaining illicit access to some resources in internet or in ITAPAC. ITAPAC is now no longer a key issue since ITAPAC (and Italy in general) has very few computing resources, and ITAPAC has severe security problems, so it is predated by hacker wannabees. Also Italy lacks of H/P groups like LOD,MOD and the CCC. Apart from Omega Team, to my knowledge no other group has existed. Phreaking used to be fairly common, but now is much less so because of new digital COs and stricter security. Blue boxing to USA was *very* common until January 1, 1992. On this date, the software that controls the traffic over North America was changed, and boxing to USA is no longer possible. Carding now is the only phreak access, and is used mainly by warez board sysops. Rumors said that the software update was imposed on ITALCABLE (that manages international calls) by AT&T due to the *huge* illicit traffic between Italy-USA. Basically, too many people, even non H/P ones ('friends of friends') were using blue-boxes even without the faintest idea of how they worked. Some hackers have sold boxes to normal people, and this probably was the key to the blocking of illicit calls. Now, to my knowledge, is possible to box only to Chile, Argentina and some other third-world countries. True H/P BBS are few. One, Pier Group's BBS was the most famous, in part because one member, MFB (short for MF the Best, basically the best Italian phreaker in my opinion), has written a series of humorous stories about hackers and lamerz, that had a phenomenal success. But since Pier (the sysop) was also invloved in some other illegal activities apart phreaking (stolen hardware, carding), and in this kind of activity too much advertising equals certain arrest, the board went down. Most other BBS are warez-oriented, with warez from THG, Razor 1911 and other USA crack groups. Note however that unlike other nations, Italy has no group HQs: what counts is money, not being part of a group. Many BBS are double-sided: one a ligit, more or less lame, part of a legal net like FidoNET, the other accessible only to subscribers, with warez. This has changed however since the Italian Hacker Crackdown. This is not because the police raided the warez boardz (they are too ignorant to do this) but because warez sysops, in fear of being caught, have (temporarily) closed their BBSes. Virusing has some players, though not very publicized, for obvious reasons. One has recently become famous (Dr. Revenge) for his contributions to Insane Reality, another H/P/V journal that published some 'secret' telephone numbers for United Kingdom officials. Nothing really new in Italy, as you can see. Newspapers are (as are most people) too ignorant to correctly report these problems, with the result being that the 'legal' portion of network fanatics fear other unjustified police raids, and legislators are becoming very unfriendly when dealing with this kind of communication. Several politicians and media moguls are proposing laws that forbid anonymous access to the Net, and universities are very concerned about these subjects. Two students were recently arrested because they used illicit (but almost public) passwords to surf the net (*only* to see things, *no* data damage). Italy may one day become very unfriendly to net people, even if Italians are generally considered very friendly. Zero Uno mc1671@mclink.it *only* using PGP, otherwise no response. -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.3 mQCNAi7zXJ0AAAEEAM3SZQp0+By7fi7ey/oiTU6TT5CdMYdkYnkDeM8f2bZ75Pdp 4mv9C0BTVRP0UrYgJO1I+8YrwvSjZK7+U3hty+c97RJ5lnSYQ0BbF7puSwhUxj4W AyytlQZVP6j1r4H8ulse1arIVlD9h2+GceXOx09J5uEqqhRG/uo1W3A51ixFAAUR tBtaZXJvIFVubyA8bWMxNjcxQG1jbGluay5pdD4= =9GnS -----END PGP PUBLIC KEY BLOCK----- ------------------------------------------------------------------------------ THE DANISH SCENE BY LE CERVEAU In the last issue of Phrack (46) I read an article about the Danish Computer Underground. Though, I was pleased with the text, a lot of stuff has happened since which I hope most of you have heard about. Anyway, here's an update.. In short, most (nearly all..) of the Inner Circle hackers in Denmark have been busted. It all went down December 1993 where I, Descore (Zephyr), Dixie (Nitecrawler) were busted at exactly the same time. After the 3 busts several more followed: WedLock, Netrunner, Darkman + some others. I had to spend 14 days in isolation while the others were released (somewhat due to my own stupidity). The busts were made because all of the universities in DK had been more or less taken over by hackers and the FBI + CERT & ASSIST worked together. The police told me that UNI*C was threatened to be cut off the Internet if the hacking from Denmark didn't stop (don't think that's the truth though. They bullshit alot..). So, of course the Danish police had to do something and they asked the infamous Joergen Bo Madsen for help. And they got it. And the situation in DK was getting out of control too - the Phone Company was hacked, DK's main research center hacked. No damage to ANYTHING was done though, but naturally we had to be stopped. Actually, the Phone Cmp. screwed up their own system trying to stop us - and now they blame us! Now we're all awaiting trial. It might take a while, since they said they'd start 'breaking' the PGP-encrypted files with UNI*C's computers ;).... I'd think if they did that, it'd be quite a while before trials! Busted in DK: Zephyr aka Descore, Dixie, WedLock, Netrunner, Darkman, Lazarus, Jackal and me (LC).. + Joshua - some idiot who might have helped the police a whole lot. After the bust of Jackal the police says they can't handle anymore so there won't be any. ---------------------------------------------------------------------- BUSTED BY LE CERVEAU I've been busted. Why speak out loud? Why not? I'm screwed anyway. I was stunned. About six-seven months before my bust I succeeded in breaking into a Pentagon computer (pentagon-emh4.army.mil --> otjag.army.mil). What actually launched my interest in this computer was a file about UFOs where it was listed. Now I have realized that had I found anything top secret about UFO cover-ups I probably wouldn't have released it. It wants to be free - but the question is to what degree.. I knew of course that it couldn't be one of their top secret computers (actually, OTJAG=Office of The Judge Attorney General - AFAIR) but I also knew that it would be the start of something big - one thing always leads to another. After a couple of weeks on the system, doing nothing but leeching all the mail I could get my hands on I discovered that one of the majors used an Air Force base-server (flite.jag.af.mil - AFAIR). As I suspected, all I had to find was his login - the password was exactly the same. And again this had to lead to more and it did. I found some stupid sergeant who also was a user on TACOM (Tank Automotive COMmand). Surely, even though stupid he wouldn't use the same.. - yup, he did. Access to tacom-emh1.army.mil and all their other machines granted. If you want one of the largest lists of MilNet sites then grab /etc/hosts from TACOM. After gaining SU-access on this machine interesting things started happening. If, for example, an officer was to issue some order (of course not any orders concerning war) it'd look something like this: You have to report at HQ Monday latest. Your travelling plans for the international conference .. // Signed // Col. Joe Wilkins and then some more approved signatures would follow by some other persons. Of course I grabbed all the mail on TACOM. After a month or so I was locked out of the Pentagon system - and it changed it's address to otjag.army.mil. But I didn't really care. I knew MilNet pretty good so why not I thought.. I started thinking military-systems only - a dangerous thing to do. I ended up using all my time on it and was therefore also rewarded. Soon I would have access to more than 30 military systems around the globe and I knew I was getting in over my head but I had to keep going - I felt there was no way back. I could have told myself that having to hide on all of these systems would be almost impossible. But things seemed to be going just fine. Just how idiotic can you get? With access to some CM-5's and a CM-200 at Naval Research Labs and all the wordfiles in the world no system stupid enough to let their passwd-file get taken stood a chance - one account with encrypted passwd was enough. All I had to do was start Crack on the CM-200 and wait. I took interest in some of the government machines - they weren't as hard to hack as the mil's and I soon lost interest. Except in NASA. I got in on one of their smaller machines (*.gsfc.nasa. gov) and I knew I just had to wait and it would lead to something more. Now 'strange' things started happening. Imagine this: I log in on TACOM. I log out. When I try to log in again it's impossible from the same site; I have to use another - that's when I knew that someone was watching my every step, trying to stop me. Later it started happening to me no matter how I accessed the nets. That's when I knew the end was near. A month later I was busted by the FBI in Denmark - that's the way I feel even though it was the Danish police. Actually, the trace was made through *.wwb.noaa.gov which I was using a while for cracking. That's my story - very shortened! If anyone is interested in details mail me at Restricted Access # +45-36703060. Last Words: Don't do it - don't do it.. It'll get you into all kinds of shit.. Why bother the nice governments and their so trustworthy agencies? On second thought: Just do it! [Editors note: Along with this file I was sent a capture of one of the aforementioned hacks (which I promptly deleted). It looked like our Danish friends were in a host at the office of the Judge Advocate General. Knowing how the JAG is going to handle cases isn't exactly the kind of thing anyone in the military really wants floating around. I guess they need better security, eh? ]