[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]

..[ Phrack Magazine ]..
.:: PWN/Part 1 ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ]
Current issue : #35 | Release date : 1991-11-17 | Editor : Dispater
Introduction to Phrack 34Dispater & Crimson Death
Phrack LoopbackPhrack Staff
Phrack Profile of Chris GoggansS. Leonard Spitz
Telenet/Sprintnet's PC Pursuit Outdial DirectoryAmadeus
Sting OperationsSovereign Immunity
Social Security Numbers & PrivacyChris Hibbert
Users Guide to VAX/VMS Part 1 of 3Black Kat
A Beginners Guide to Novell Netware 386The Butler
Auto-Answer ItTwisted Pair
PWN/Part 1Dispater
PWN/Part 2Dispater
PWN/Part 3Dispater
PWN/Part 4Dispater
Title : PWN/Part 1
Author : Dispater
                                ==Phrack Inc.==

                 Volume Three, Issue Thirty-five, File 10 of 13

              PWN                                             PWN
              PWN              Phrack World News              PWN
              PWN                                             PWN
              PWN            Issue XXXV / Part One            PWN
              PWN                                             PWN
              PWN            Compiled by Dispater             PWN
              PWN                                             PWN

Welcome to another edition of Phrack World News.  Read this issue very
carefully because it is full of very important stories about a multitude of
different issues.  Special thanks goes to Dark OverLord, Stainless Steel
Provider, and Private Citizen for their help in preparing this issue.

NIA Magazine & Phrack Inc. present:

                           The Second Annual

                             X M A S C O N

Who:  All Hackers, Journalists, Security Personnel, Federal Agents, Lawyers,
      Authors and Other Interested Parties.

Where:                 Houston Airport Hilton Inn
                          500 North Belt East
                         Houston, Texas  77060
                          Tel: (713) 931-0101
                          Fax: (713) 931-3523

When:      Friday December 27 through Sunday December 29, 1991

Yes, ladies and gentlemen, you read it right... Xmascon has returned! This will
undoubtedly be the telecom event of the year. Unlike certain conferences in the
past, Xmascon 91 has a devoted and dedicated staff who are putting in an
unmentionable amount of time to ensure a large, vast and organized collection
of some of the most diversified people in the telecommunications world. The
event will be open to the public so that anyone may attend and learn more about
the different aspects of computer security.

                           Hotel Information

The Houston Airport Hilton Inn is located about 6 miles from Intercontinental
Airport. The Xmascon group room rates are $49.00 plus tax (15%) per night, your
choice of either single or double. There are also 7 suites available, the
prices of which vary from $140 to $250. You can call the hotel to find out the
differences and availability of the suites, and you will also NEED to tell them
you are with the Xmascon Conference to receive the reduced room rate,
otherwise, you will be paying $69.00. There is no charge for children,
regardless of age, when they occupy the same room as their parents.  Specially
designed rooms for the handicapped are available. The hotel provides free
transportation to and from the airport, as well as neighboring Greenspoint
Mall, every 30 minutes on the hour, and on call, if needed. There are 2
restaurants in the hotel. The Wicker Works is open until 11:00 pm, and The
Forty Love is open 24 Hours. There will also be breakfast, lunch and dinner
buffets each day. There is a piano bar, The Cycle Club, as well as a sports
bar, Chaps, which features numerous table games, large screen TV, and a disco
with a DJ.  Within the hotel compound, there are 3 pools, 2 of which are
indoors, a jacuzzi, a miniature golf course, and a fully equipped health club
which features universal weights, a whirlpool and sauna.  A car rental agency
is located in the hotel lobby, and you can arrange to pick your car up at
either the airport or the hotel. Xmascon attendees are entitled to a discounted
rate. Contact the hotel for more information.

Xmascon will last 3 days, with the main conference being held on Saturday,
December 28, in the Osage meeting room, starting at 12:00 p.m. and continuing
on throughout the evening. This year, we have our own complete wing of the
hotel, which is housed around a 3,000 square foot atrium ballroom. The wing
is completely separated from the rest of the hotel, so we are strongly
encouraging people to make their reservations as far in advance as possible
to ensure themselves a room within our area.

We are hoping to have a number of people speak on a varied assortment of
topics. If you would like to speak, please contact us as soon as possible and
let us know who you are, who you represent (if anyone), the topic you wish to
speak on, a rough estimate of how long you will need, and whether or not you
will be needing any audio-visual aids.

There will be a display case inside the meeting room which will hold items of
telecom interest. Specific items that will be available, or that we hope to
have, include the first issues of 2600, Tap, Mondo 2000, and other magazines,
non-computer related magazines that feature articles of interest, a wide array
of boxes, the Quaker Oats 2600 mhz whistle, The Metal AE, etc. We will also
have a VCR and monitor set up, so if you have any interesting videos (such as
the Unsolved Mysteries show featuring Kevin Poulsen), or if you have anything
you think people would enjoy having the chance to see, please let us know ahead
of time, and tell us if you will need any help getting it to the conference.
If all else fails, just bring it to the con and give it to us when you arrive.

If anyone requires any additional information, needs to ask any questions,
wants to RSVP, or would like to be added to the mailing list to receive the
Xmascon updates, you may write to either myself (Drunkfux), Judge Dredd, or
Lord Macduff via Internet at:


Or via US Mail at:

                         Hard Data Corporation
                               ATTN: HoHo
                             P.O. Box 60695
                         Airport Mail Facility
                      Houston, Texas  77205-9998

We will hopefully have an 800 mailbox before the next update is sent out.  If
someone cares to donate a decent one, that will stay up throughout the end of
the year, please let us know. We should also be listing a few systems as an
alternative form of reaching us.

Xmascon 91 will be a priceless learning experience for professionals, and gives
journalists a chance to gather information and ideas direct from the source. It
is also one of the very few times when all the members of the computer
underground can come together for a realistic purpose. We urge people not to
miss out on an event of this caliber, which doesn't happen very often. If
you've ever wanted to meet some of the most famous people from the hacking
community, this may be your one and only chance. Don't wait to read about it in
all the magazines, and then wish you had attended, make your plans to be there
now! Be a part of our largest and greatest conference ever.

Remember, to make your reservations, call (713) 931-0101 and tell them you're
with Xmascon.

In closing...  if you miss this one, you're only cheating yourself.

MindRape Revisited                                           September 27,1991
>From Arizona State University State Press
Further Reading:  Phrack Issue 34, File 11, "MindRape or MediaRape?"

     An Arizona State University (ASU) student is one of seven suspects in a
computer fraud scheme that one US West Communications official said could cost
the carrier and the phone company as much as $5 billion in one year.

     Police in Phoenix, Arizona have seized computer equipment, software, and a
list of long distance calling card codes from the home of the unidentified
19-year-old student.

     The student is one of seven people -- three in Oregon and one each in
Washington, Utah, and Iowa -- singled out as suspects in a month-long
investigation of electronic phone fraud conducted by Phoenix police, said Jim
Waltman, a fraud manager for US West Communications.  The Phoenix man has not
been arrested.

    The computer "hackers" allegedly used their computers to gain access to
secret long distance phone access codes such as the ones found on calling
cards, and sold codes to other students for profit.

    US West officials told the Associated Press that it is unknown how many
local customers have been wrongfully billed for long distance calls on their

    Kevin Robinson, public information sergeant for the Phoenix Police
Department, would not comment on the investigation.

    Art Carter, dean of Student Life at Arizona State University (ASU), said
that if the student is charged, the case will be reviewed under the ASU Code of
Conduct and the action taken by the University will be determined at that time.

    Mark Knighton, security director for LDL Long Distance, said his company
and US West were able to trace calls to several location, including the home of
the Phoenix man.

    The Phoenix man has not been arrested, authorities said.

    Waltman said he was with Phoenix police a week ago when they searched the
north Phoenix home and uncovered what turned out to be an inexpensive and
relatively simple system for getting free codes.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Editor's Comment by: Dispater

     What MindRape has been charged with cannot be determined now.  A request
must be submitted to Arizona Public Records and be considered for release to
the requestor.

Here are some possibly useful numbers:

Arizona Special Investigations Division (602)542-4853
County Attorney's Office                (602)262-3411      (Gail Thackeray)
Arizona Republic Newspaper              (602)271-8000
Phoenix Police Department
- General Investigations                (602)262-6141
- Police Information                    (602)262-7626
- Police Records                        (602)262-6134

East Coast LOD Hackers Create Virtual Reality MAELSTROM
         "It's reached the point where hacking is counter-productive."

If the 1980's were the decade that hackers emerged from their relative
obscurity as computer oddities, to be transformed in the public's perception as
front-page news -- then the 90's are shaping up to be the decade of hacker
turned entrepreneur.  Lately the notorious hacker group Legion of Doom seems to
be a particularly fertile spawning ground for ex-hackers turned

Two former East-Coast Legion of Doom members, Bruce Fanscher <Dead Lord> and
Patrick Krupa <Lord Digital>, have pooled their talents to form a new company
in the burgeoning field of Virtual Reality.

The arena of Virtual Reality has often been called technology in search of a
purpose and at times resembles nothing more than an interactive movie meets
videogame.  This chaotic state of affairs has led to a never-never land of
incompatible technologies and far-out ideas, that have tremendous potential,
but little commercial application at present.  Fanscher and Krupa plan to
change all that.  "VR isn't anything new, it's something we've been living for
over half our lives.  The only difference is the state of current technology,
makes possible an incredible variety of application." said Krupa in an
interview.  "Right now we're in the ideal position to move forward on ideas
we've been working on for years," added Fanscher.

Krupa, who had attained the status of cult figure in the hacker underground
prior to his arrest, as chronicled by John Markoff (New York Times) technology
columnist, has spent the last several years working in the very lo-tech world
of theater, "Basically I was totally burnt out on computers.  I mean I don't
give a damn if my word processor boots in one second instead of eight, and
that's the only place anything was heading for a long time.  The NeXT has
changed all that and brought to market something truly innovative, although I
still don't care too much about technology as anything but a medium through
which you can reach people and affect their experiences and perceptions."

No stranger to creative innovation himself, Fanscher, Krupa's longtime
compatriot, has spent his share of time in the somewhat murky spotlight of the
hacker underground.  Musing about his days as a hacker delving into computer
systems to see how they worked, Fanscher remarked that:

     "It's reached the point where hacking is counter-productive.  You can
     only take apart things other people have designed and see what makes
     them work, for so long, before it becomes an exercise in boredom and
     the time comes to use what you've learned to create something new
     that nobody has ever seen before.  My current interest in other
     people's systems is zero.  It was a useful learning experience for me,
     but there's no future in it."

This oddly charismatic, dynamic duo is rounded out by Delia Kopold a former
actress and theater major who is the architect of the worlds that make
MAELSTROM come alive.  This initial offering by the collection of talents will
be an online system run on the NeXTcube supermicro -- a machine that looks more
like a piece of modern art than a computer -- that offers enhanced versions of
all the usual amenities like electronic messaging, file transfers, and
networking, all revolving around MAELSTROM, a program Fanscher calls, "a
real-time virtual interaction simulation engine."  MAELSTROM will initially
take the form of an extremely detailed fantasy world complete with custom
graphic programs that run on MS-DOS, Macintosh and Amiga computers, allowing
users to tap into the NeXTcube's system architecture through their home
computers connected to telephone lines.  "Maelstrom isn't really a fantasy
game, it's actually a universal engine comprised of objects that can be
accessed by a variety of graphic, sound and data files to create just about any
multi-user reality you can dream up," explains Krupa.

The MAELSTROM system is about to go through a short beta-test run in New York
City prior to a national ad campaign that will herald its universal
accessibility on packet switch.  "Our beta system already offers everything
that competing services offer, but at a much lower cost -- and we're still
adding features.  And nothing like Maelstrom has ever existed before, the
technology just wasn't there," concludes Fanscher.

2600 Magazine Exposes Security Holes                           October 18,1991
by John F. McMullen & Barbara E. McMullen (Newbytes)

Armonk, New York -- Supported by videotape examples, Emmanuel Goldstein, editor
and publisher of 2600 Magazine: The Hacker Quarterly, told those in attendance
at an October 17th New York City press conference that "the American public is
often lulled into a false sense of security; a security that is often not
supported by the facts of specific cases."

The videotapes, produced by 2600 and provided to the press show both the
intrusion of a Dutch "hacker" in to United States Military computers and what
Goldstein alleges is the fallibility of a brand of mechanical, pushbutton locks
used by, among others, New York State University sites, Federal Express, United
Parcel Service, JFK International Airport, IBM and NASA.

Goldstein told Newsbytes "We invested considerable time and money to wake
people up to the fact that we have a false sense of security when it comes not
only to computer networks but to physical safety as well."

The tape of the Dutch "hacker" was made by Goldstein while in Europe. and shows
the intrusion into a Unites States Army computer system.  The intruder was able
to set up a fictitious account called "danquayle" and, once into the system,
was able to obtain "root" privileges thus giving him total control of the
workings of the system.

A portion of this tape had previously been shown with Goldstein's approval on
an episode of the Geraldo Rivera television show "Now It Can Be Told".
Goldstein told Newsbytes that one^S^Q reason for his release of the entire tape to
the press was his feeling that the Rivera episode entitled "The Mad Hacker's
Key Party" had distorted the message of the tape -- "This was not a case of a
terrorist break-in but was rather simply a demonstration of the lack of
security of our systems.  To find root accounts with password like "Kuwait" and
lack of sophisticated security in our military computers should be of real
concern and should not be lost in an exploitation of the 'hacker' issue."

A background paper provided at the conference by 2600 explains the entire
intrusion effort in detail and states "The purpose of this demonstration is to
show just how easy it really was.  Great care was taken to ensure that no
damage or alteration of data occurred on this particular system.  No military
secrets were taken and no files were saved to a disk by the hackers.  What is
frightening is that nobody knows who else has access to this information or
what their motivations might be.  This is a warning that cannot be taken

The second videotape show Goldstein and other 2600 staff opening seemingly at
will locks manufactured by Simplex Security Systems.  The locks of the
mechanical pushbutton combination variety were shown to be installed at the
State of New York University at Stony Brook, JFK International Airport and on
Federal Express and United Parcel pick-up boxes throughout the New York
Metropolitan area.

In the film, Goldstein is shown filling out a Federal Express envelope for
delivery to 2600 Magazine and inserting in the Fedex dropbox.  He then lifts
the weather protection cover on the box's lock and keys a combination that
allows him to open the lock and remove his envelope.  Scott Skinner, a SUNY
student and 2600 staff member told Newsbytes that it had actually taken the
staff 10 minutes to determine the proper code combinations to open the lock.

Skinner explained, "While Simplex prefers people to think that there is an
endless number of permutations to the lock, there are actually only 1,085.  In
most cases, even this number is greatly reduced -- if one knows that only three
buttons are being used, it reduces the possibilities to 135.  Additionally, we
found that, once we had the combination to one Federal Express dropbox, it
worked in every other one that we tried in the New York area."

Goldstein told Newsbytes "When we contacted Simplex, they first denied that the
locks were unsafe and then said that the permutations were much greater.  After
some discussion, they admitted that the 1,085 figure was correct but said that
it would take a person with a complete listing of the combinations over four
hours to try them all. Our experience obviously shows that they may be opened
in a much shorter time than that."

Goldstein also pointed out that, "although a $5 Master combination lock may be
broken by a crowbar, it is a much more secure combination device.  It has
64,000 combinations compared to the 1,085 with the Simplex."

Goldstein continued, "One of the real problems is that, should a person have
the misfortune to be robbed, entry due to a failure of the Simplex lock gives
no evidence of a forcible break-in and police and insurance companies often put
the blame on the homeowner or office manager for 'giving away the combination.'
It really can create a problem."

Skinner told Newsbytes "I'm really concerned about t^Shis.  I'm a student at
SUNY, Stony Brook and all our dormitories use these locks as the only means of
security.  I've shown the problem to Scott Law who is responsible for residence
security but he has discounted the problem and said that the locks were
installed at the recommendation of the campus locksmith.  The locksmith, Garry
Lenox contradicts Law and says that he recommended against these locks years
ago and said that they were not secure for dormitory use."  Skinner said that
he will write an article for the college newspaper in an attempt to raise
consciousness about this problem.

Goldstein also said that he intends to publish the list of valid combinations
in an up-coming iss^Que of 2600 to demonstrate to the public the problems with
the lock.  He further said that he will raise the issue on his weekly radio
show, "Off The Hook", heard on New York's WBAI-FM.

In response to a Newsbytes question concerning how the 2600 staff happened to
become involved in a problem with locks, Goldstein said, "We're hackers and
when we see something with buttons on it, whether it's a computer or not, we
tend to try it.  While the average person tends to accept that things are
secure just because he is told that they are, hackers will usually try them
out.  It's because of this 'trying out' that we can point out the problems with
both the US military computer security and this lock -- and we feel that, in
both cases, we have performed a service. People should be aware when they are
at risk so that they may take action to correct it."
Questions Exist On Israeli Break-In Of US Systems            September 10,1991
by Barbara E. McMullen & John F. McMullen (Newsbytes)

NEW YORK -- Amidst reports of the intrusion by an Israeli national into United
States military computer systems, there have been conflicting accounts of the
extent and nature of the invasion.

According to wire services, Deri Schriebman, an 18 year-old graduate of
Israel's Technion Institute and a native of the northern Israeli city of
Carmiel, was arrested by Israeli police for allegedly breaking into US military
computers and commercial credit card systems.  Israeli spokes person Eitan Raz,
commenting on the equipment found at Schriebman's home for allegedly making
free overseas phone calls, was quoted as saying "This was a very complex
system. It was the first time such technology was discovered in Israel."

Newsbytes has ben able to confirm with sources that a trail of credit card
fraud in the United States and Canada led investigators to Schriebman but has
not been able to confirm that Schriebman, as reported in Israeli press, was
able to access classified Pentagon information concerning Patriot missiles
during the recent Gulf War.  A US government investigative official told
Newsbytes that, while his agency has formally requested documentation of the
events from the Israeli police, that there seems to have been no contact to
date between any US service and the Israeli investigators.

Other investigative sources have told Newsbytes that the investigation into
Schriebman's activities began in May 1991 when two Quebec teenagers were
arrested for purchasing goods through the use of stolen credit card
identification.  The teenagers told Canadian authorities that they had received
the information from a source in Carmiel, Israel and the authorities notified
Israeli police.  According to the Israeli reports, Schriebman admitted the
intrusion into credit card files and the subsequent dissemination of codes but
denied making any use of the information. He was quoted as saying that his
cracking into the systems was done only out of curiosity.

A "hacker" source told Newsbytes that underground bulletin boards utilized for
the exchange of such credit information are often frequented by foreign
nationals. He said that the most frequent visitors come from Australia, Israel
and Germany and that many of the Israelis identify themselves as have a
connection with the Technion Institute.
[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2016, Phrack Magazine.