Title : Line Noise
Author : Phrack Staff
.oO Phrack Magazine Oo.
Volume Seven, Issue Forty-Nine
File 3 of 16
// // /\ // ====
// // //\\ // ====
==== // // \\/ ====
/\ // // \\ // /=== ====
//\\ // // // // \=\ ====
// \\/ \\ // // ===/ ====
------------------------------------------------------------------------------
CUERVOCON 96 CUERVOCON 96 CUERVOCON 96 CUERVOCON 96 CUERVOCON 96
Tengo que hable con mi abogado.
----------------------------------------------------------------
What : A computer/telephony/security conference. (show this part to your
boss.)
Where: Fort Brown Hotel, Brownsville Texas.
When : 28 & 29 December, 1996
Who : The usual gang of cretins.
Why : It's winter, and it is 12 degrees outside. The dumpsters are frozen
shut, and there are icicles on the payphones. Brownsville is at the
Southern-most tip of Texas, right up against...Mexico. Yes, Mexico,
land of cheap cerveza, four-dollar strippers, and liberal drinking
laws. Mexico, where you too can own your very own Federal law
enforcement official for a fistful of pesos.
----------------------------------------------------------------
Speakers
Anybody wishing to speak at CuervoCon should send
e-mail to the address at the bottom of this announcement.
Currently the list includes:
u4ea (by teleconfrence)
Major
ReDragon
Caffiend (about her Breasts)
daemon9 (about his Breasts)
----------------------------------------------------------------
Events
"How Much Can You Drink?"
"Fool The Lamer"
"Hack The Stripper"
"Hack The Web Server"
"sk00l"
"Ouija Board Hacking"
...as well as a variety of Technical Presentations.
----------------------------------------------------------------
General Information
The Fort Brown Hotel will have available to us, 125 rooms at the holiday in @
$55 a room, and $75 rooms at the ramada @ $45 each. The Fort Brown was
previously an actual fort when it was closed down by Uncle Sam. It became one
large hotel until it was recently purchased and split into the Holiday Inn and
the Ramada. The Fort Brown was chosen because it is across the street from
the bridge to Mexico. You can call the Fort Brown Ramada at:
210-541-2921
You can call the Fort Brown Holiday Inn at:
210-546-2201
Call for reservations, make sure to tell them your with CuervoCon.
Friday and Saturday the con will be in the 'Calvary' room. While Sunday we
have the 'Fortress Room' where all the big speakers will be. Friday and
Saturday we will have a few speakers and activities. Friday Night mainly,
so we can have people arrive on time. We hope to have the con room open 24
hours a day.
Brownsville is right on the Mexican border, adjacent to the Mexican town
Matamoris. The Gulf of Mexico is 25 miles away. Brownsville has a population
just over 100,000. The police force includes 175 officers, and a wide variety
of federal law enforcement agencies have a strong presence there as well.
The climate is semi-tropical, and the RBOC is SouthWestern Bell.
Matamoris is the other half of brownsville. Home of over 1/2 a million
people, it is known since the early 1900's as a pit of sin. The federale's
are not to be fucked with and it is serviced by TelMex. It is known for its
bars, strip clubs and mexican food. Matamoros also has an airport incase
you live in Mexico and care to go, via aeromexico.
Directions:
In Texas Driving - Go anyway you can to get to US 77 South. Take 77 South
till it ends in Brownsville. From there you will turn right on International.
Proceed all the way down international, right before the bridge, turn left.
The Fort Brown will be on the left.
For those flying in - We are going to try to have a shuttle going. Also just
tell the cab driver, Fort Brown.
The Con Registration Fee, aka the pay it when you walk in our we will beat you
up, is only 10$ and an additional 5$ for the 'I paid for eliteness sticker'
which will let you into the special events, such as hack the stripper.
----------------------------------------------------------------
Celebrity Endorsements
Here's what last years participants had to say about CuervoCon:
"I attended the CuervoCon 95. I found many people there who, fearing a
sunburn, wanted to buy my t-shirts!" -ErikB
"I tried to attend, but was thwarted by "No Admittance to The Public"
sign. I feel as though I missed the event of the year." - The Public
"mmmm...look at all the little Mexican boys..." -Netta Gilboa
"Wow! CuervoCon 95 was more fun that spilling my guts to the feds!" -
Panther Modern
"CuervoCon is our favorite annual event. We know we can give
security a day of rest, because you people are all too drunk to
give us any trouble..." - AT&T
"No moleste, por favor." - TeleMex
Don't miss it!
----------------------------------------------------------------
Have you ever hacked a machine in your hometown from a foreign
country?
Have you ever had to convert dollars into pesos to get your bribe right?
Have you ever spent time in a foreign prison, where your "rights as an
American" just don't apply?
Have you ever been taken down for soemthing that wasn't even illegal
half an hour ago?
YOU WILL! And the con that will bring it to you?
CUERVOCON 96
----------------------------------------------------------------
CUERVOCON 96 CUERVOCON 96 CUERVOCON 96 CUERVOCON 96 CUERVOCON 96
brought to you by
- S.o.B. - TNo - PLA - Phrack - The Guild - F.U.C.K. - SotMESC -
Contact Information
info@cuervocon.org
www.cuervocon.org - Look here for updates.
Voice mail system coming up soon.
----------------------------------------------------------------
----<>----
*** The truth behind the Adult Verification Services
('porno' will set you free)
*** By your passively skeptical author, t3.
*** 10.30.96
Let's speak for a minute about 'porno'. 'Porno' has saturated the
Net to a level in which it's difficult *not* to see it, regardless if
you're looking for it. It can be found on the largest web site and the
smallest ftp site. It can be found on Usenet, it can be found with any
one of numerous search engines. Let's not delude ourselves, porno is
*everywhere* and anyone with the motor skills to click a mouse can have access
to it.
About a year ago a concept came along called 'Adult Verification'. This first
started out by people writing crude cgi scripts that would query every person
as to their age. 'Are you 18' it would say, and even a sexually aware 9-year
old would know to say 'yay' to this.
Soon thereafter, someone topped this 4-line piece of code by writing a login
interface, most likely it was incorporated into Netscape or some other, less
worthy browser. This program made use of the actual browser to authenticate
users. Of course one needed a login and password, of which had to be manually
added after ample proof of age was received. If one merely wanted to
cover one's ass, this would not be a logical solution.
This all occurred during which the CDA (Communications Decency Act) had
actually existed. On June 7, 1995, the CDA was passed through the Senate
to the President, signed, and made a law:
(1) in the heading by striking `Broadcasting obscene
language' and inserting `Utterance of indecent or profane
language by radio communication; transmission to minor of
indecent material from remote computer facility, electronic
communications service, or electronic bulletin board service';
et al...Now it was illegal to transmit 'indecent material' on the
Internet. If this were to actually be adhered to, the Net would shrink
so drastically that the current topology would last ten years before
needing an upgrade.
Is was soon apparent that this act was not going to fly. Groups like the
EFF and the ACLU suddenly became extremely busy. Companies such as Apple
and Microsoft challenged the constitutionality of such a law and took
this directly to court. It was also apparent that the transmission of
'indecent material' would not disappear, but merely go further underground.
Indeed, this is exactly what happened. Soon thereafter Adult Verification
services began popping up. AVS (Adult Verification Services), Adultcheck,
Adultpass, and a slew of others came up with an idea.
The idea was to verify a person's adult status by acquiring one's credit
card number. This would, ahem, without a doubt, prove that the individual
was 18. Why? Because you had to be 18 to have a credit card of course!
Someone obviously didn't take into consideration the five or so million
pre-adults that would make it their goal to surpass such shotty
authentication.
It began by the government stating that a credit card is a legal means of
verifying one's age, this allowing those distributing 'porno'graphic
materials to continue distributing to those 18 and over. The initial
means that the 'providers of porn' used to do this was to basically
verify the format of the card and not actually run a check on it. As
most of us all know, there have been plenty of "Credit Card Generators"
produced in the last five years, quite capable of fooling these shotty
authentication systems.
As this authentication was obviously lacking in the "authentication"
part, the next step was to actually validate the cards. This began and
ended nearly as quickly, for finding a credit card (for example, in
mommy's purse), junior could peruse porn until his dick grew red and chafed.
On June 12, 1996 it was was determined that the CDA indeed violated one's
constitutional rights and was striken down as a law. More on this at
<http://www.eff.org/pub/Legal/Cases/EFF_ACLU_v_DoJ/>.
But it didn't seem to phase the Authentication services.
The Authentication Services currently verify age by obtaining a credit
card, verifying it, and actually charging a fee for the service. About
$9.95 for two years which entitles you to an abundance of graphic, ad,
and airbrush-laden web pages and images. This most likely sufficiently
scared off the less determined of minors because now they'd be engaging in
credit card fraud.
It's truly odd that after it has been deemed legal to distribute said
porn, that all of these services still insist that it's illegal to do
so. Let us realize that Usenet barely flinched when the CDA was in
effect, and still offered gigs upon (glorious) gigs of nude bodies to
oggle at.
After taking a good look at this whole bizarre operation, I have made a
few conclusions of my own.
Charging $9.95 for two years of access to 'porno'graphy seems a little too
good to be true. One must realize that there is a charge to the billing
company for each credit card transaction made. I'd be surprised if it
wasn't half of this ten bucks. These authentication companies also pay
"handsomely" the purveyors of porn. In order for such a service to
function, obviously there needs to be an agreement with the distributor and the
authenticator.
Now, one that distributes 'porno'graphy on the Net will certainly not feel
the need to do these Verification Services any favors. The majority of
people that do run these explicit sites are certainly not interested in
supporting censorship of their material (probably 90% money-making). The
AVS's knew this and offered a stipend to those using their services.
The AVS's currently work by paying the site that contains 'indecent
material' a certain amount each time that site gets another person to
sign up with their service. This works by the AVS sending html that is
put on a verification page. If one finds this page important enough,
they may be convinced to sign up with the service that allows you to
access it.
The stipend is generally around $4.00, and as high as $7.50. There are
many AVS's, and the majority of the said 'sites' use more than one,
sometimes all of them for verification. If a particular site uses one
AVS exclusively, the AVS will pay on the highest end of their scale for new
recruits.
If we get into some simple math, we may find some contradictions
regarding this. The initial fee to those interested in accessing porn is
$9.95. Out of these we can safely say that more than $3.00 goes to
simply checking the validity of the card and billing it. This leaves the
AVS with $6.95.
Now, on the receiving end we have a very minimum of $4.00 going towards
each new person that signs up. It's probably safe to say that over 90%
of new customers to these AVS's sign-up through 'porno'graphic pages and
not directly from the site itself.
So $9.95 ends up being $6.95 after expenses, and then the service sends
another $4.00 to the person that gave them the account. This leaves the
AVS with a maximum of $2.95 total.
The costs running an AVS are surely not exorbant, but are certainly not
cheap. I have yet to find an AVS running off of anything less than at T1
(1.544mbit) speeds. This translates to an extreme minimum of 1k/month.
If you include employees, office space, and incidentals, running any such
service couldn't cost less than 5k a month at the very least. This would
mean to break even one would have to bring in:
5000/2.95
1694 new customers a month, simply to break even! That's a lot
considering the membership lasts for two years. And this is in the
*best-case* scenario. I would be hard-pressed to believe that one such
service could steadily rely on such a base of new clients every month
indefinitely!
I have theorized that these services are in fact not self-run moneymaking
ventures, but are actually being funded by a higher authority. It's
quite feasible to believe that the government, having been challenged and
beat, have actually allocated funds to protecting the minors of the Net
from obscenity. It's *certainly* not far-fetched, especially with Al
Gore (think, Tipper) in an improperly high position.
The government could allocate a comparitively paltry sum of one million a
year towards funding (even creating) companies that act merely to pay
people to be complacent. What if the government merely let relatively
computer proficient professionals bid on forming these AVS's? What if?
Well, unless i'm overlooking something, I can't see too much illogic to
my theory.
Another consideration of these services is that even at their current
state, they are extremely easy to overcome. So easy, in fact, that their
existence will hardly offer much resistance to a horny teenager. Remember,
people will do anything to get 'porno'graphy.
Such holes in these systems are that the verified member of such an AVS
connects to a sexually explicit site, is bounced backed to the AVS for
authentication, and is then bounced back again to the page (url) that
contains the "naughty stuff". This page can be simply bookmarked and
distributed to anyone and their Mom.
Why? All the services I've come across (the largest ones) do not
authenticate the target url, they target the initial "warning" page and
contain information to pass the user on to the naughty stuff. Thus if
one single person can obtain the target url, he can bypass all future
authentication and can as well pass the url on through various channels,
quite easily ending up in the hands of a minor.
As well, if stupidity was a metaphor for AVS's, most of the target url's
have filenames such as "warning.html" or "granted.html". Any
half-respectable search engine (such as AltaVista) is capable of snarfing
out such information. Doubly-so because these services will obviously
want to advertise their existence.
The only method that seems to partially protect minors from 'porno'graphy
is the method of installing client-based software such as SurfWatch that
try to censor 'porno'graphy. This, as well, relies on a willing company or
individual to operate. This works quite archaically by imbedding META
tags in html source. For example:
<META name="description" content="Validate Age Verification
Service"><meta name="keywords" content="sex erotica nude porn penthouse
pornography erotic porno adult playboy dating marriage love date age
validate validation protect children kids money commercial wealth nudes
pics jpg gif">
This particular tag would be placed in the receiving html of a
co-operative service or individual. The client-based software would
search for such tags and censor the content accordingly. From my
understanding, those using AVS's are not required to embed these tags in
their "warning" page html. If they do not, which I would imagine many
probably wouldn't, then suddenly these client-based censorship tools are
rendered useless.
So in conclusion, I would give a big thumbs-down for this whole pathetic
means of controlling freedom. The Internet was meant to be a place to
free exchange of information. Today a minor is just as able to find
explicit material on the Net as he/she is able to dig through Mom and
Dad's dresser for copies of Hustler. A minor is just as capable of
watching R or X-rated movies, stealing a magazine from a store, or even
buying one.
It's time to stop using half-assed and crippled ways of protecting kids
from obscenity on the Net. If you're a parent and you don't want your
child to view such 'porno'graphy, then why not do what you're supposed to
do and discipline the kid.
Lazy fuckers.
t3
.end
----<>----
T.A.C.D Presents...
Hacking ID Machines
By PiLL
Table Of Contents
I. What is an ID Machine & who uses them?
II. Hardware and software of the ID machines
III. Common security of ID Machines
IV. What to do once you get in
V. Closing
VI. Greets
Part One: What is an ID machine and who uses them?
First we will start with the basics. An IDM or ID Machine is exactly
what the name entails. It is a computer that government and large
companies use to make security badges and ID cards for employees and
visitors. All of the IDM's are DOS based so security, to say the least,
sucks. There are four models of IDM's. The one we will be covering the
most is the latest and greatest: the ID 4000. Also in the family of
IDM's are the 3000, 2000+, and 2000. I have heard of an ID 1000 but I
have yet to see or play with one, so if you find one, tell me. The 2000
is DOS 3.3 so I can imagine that an ID 1000 is even a bigger waste of
time. IDM's are manufactured by a branch of Polaroid entitled Polaroid
Electronic Imaging. If you want more information on IDM's call (800)343-5000
and they will send you some general specs. I will let you know right
off the start that these machines sell for as much as $75,000.00 but the
average price is around $40,000.00. So getting caught crashing one is
NOT a good idea.
You are probably wondering what companies use ID machines. Here is a
brief list. All of the Colorado and Alaska DMV's, The IRS, The FBI, The
U.S. Mint, The Federal Reserve, almost any military branch, Hewlett
Packard, Polaroid, Westinghouse (I wouldn't recommend fucking with them:
for more information on Westinghouse check out the movie Unauthorized Access
available from CDC's home page), and all of the major prisons in the
United States. By now you should be getting ideas of the potential fun
you can have. Not that I would ever use what I know for anything illegal
;)
Part Two: Hardware and Software
I will cover each machine in order but you will probably notice that the
ID4000 will get by far more attention then any other.
Hardware and Software for the 2000+ and 2000 is kind of like teaching
someone about the Apple ][ and how to use Logo so I will try not to bore
you to much with them. The 2000 series are unique to the others because
they are one full unit. The hardware is basically a really cheesy
oversized case with a 9 monochrome monitor, a 3 monitor for viewing the
victim of the hideous picture it takes, a 286 Wyse computer with 1meg of
RAM (really hauls ass), a data compression board, image processing board
(*Paris* Board), a signature scanner, a color film recorder or CFR, a
WORM Drive, a modem, and most of the time a network card so the data can
be stored on a mainframe. The Software of the 2000 series is a really
neat database program running under DOS 3.3. If you have never heard of
or used EDLIN, I would not recommend playing with a 2000. The only major
differences between an ID2000 and an ID2000+ is that the computer on the
2000+ is a HP Vectra 386 with 4megs and a SCSI Interface. That's all you
really need to know you probably won't ever encounter one unless you go
trashing a lot.
The ID3000 is also an HP 386/20 but uses DOS 5.0 and a Matrox Digital
Processing board instead of the old Paris board of the 2000 series.
This came about when your state ID actually started to remotely resemble
you in 1992. Also in the 3000 years their were more peripherals
available such as the latest CFR at the time (I think it was the 5000),
PVC printers, and bar code label printers. The software is basically
DOS 5.0 but this time they use a database shell much like DOSSHELL as
the interface with the machine. The 3000 uses SYTOS for data storage and
transfer and it is best to dial in using a program called Carbon Copy.
The 4000 is the best even though it's not that great. It was is the
first IDM in the Polaroid line that let the customer customize the
machine to their needs. This is the machine that you see when you go to
the DMV, at least in Denver. It consists of a JVC camera, a Matrox
processing board, a data compression board, an Adaptec 1505 SCSI card, a
14.4 modem, a network card, and can have any of the following added to
it: a PVC printer (in case you didn't know that's what they use on
credit cards), a magnetic stripe encoder, a bar code printer, a thermal
printer, a CFR (usually the HR6000 like at the DMV), a Ci500 scanner,
and signature pad, a finger print pad (interesting note if you have a
black light and one of the new Colorado Driver licenses hold it under a
black light and look what appears under your picture, you should see
your finger print), and a laminator. Now some of you are thinking what
about the holograms? Those are actually in the lamination, not on the
badge itself. To obtain lamination walk into the DMV and look to the
right or left of the machine if you see a little brown box that's what
you need, but please remember to leave some for the rest of us that
might be next in line. Or you can go to Eagle hardware and buy a bolt
cutter for the dumpster but that's a different text file.
The 4000 runs DOS 6.0 and Windows 3.1. The actual software for the 4000
is a terrible Visual Basic shell that reminds me of the first time I ran
that program AoHell. The only difference is that AoHell did what it was
suppose to, the 4000 software is a headache of GPF's , Environment
Errors, and Vbrun errors. A nice feature that the 4000 has that the
other IDM's don't, is the ability to create and design your own badge.
You can even do it remotely ! ! =) . Unfortunately the program Polaroid
developed for this makes paintbrush look good. But on a bright note you
can import Images.
Briefly here is a run down of what exactly happens when you get your
picture taken on an ID4000 at the DMV. At the first desk or table the
narrow eyed, overpaid, government employee will ask you for some general
information like a birth certificate, picture ID, name, address, SSN#, what
party you prefer to vote for, and whether or not you want to donate your
organs in the event of your untimely demise. You reply by handing her
your fake birth certificate and ID that you had printed no more then an
hour ago, hoping the ink is dry. "My name is Lee Taxor I reside at
38.250.25.1 Root Ave in the Beautiful Port apartments #23 located in
Telnet, Colorado, I prefer to vote for Mickey Mouse of the Disney party,
and can't donate my organs because Satan already owns them." The
disgruntled employee then enters all your information in the correct fields
while never taking an eye off you in fear that you know more about the
machine he or she is using then they do (perhaps you shouldn't of worn
your Coed Naked Hacking T-shirt that you bought at DefCon 4). As soon as
the bureaucrat hits <ENTER> all of the information is sent to a database
located in the directory named after the computer (i.e.
c:\ID4000\ColoDMV\96DMV.MDB). Then you are directed to the blue screen
where you stare at the JVC monitor trying to look cool even though the
camera always seems to catch you when you have to blink or yawn or even
sneeze. *SNAP* the picture is taken and displayed on the monitor where
the employee can laugh at your dumb expression before printing it. If
the employee decides to print the picture it is saved as a 9 digit
number associated with your database record. The 4000 then compresses
the picture and saves it. So the next time you go in and the pull up
your record it will automatically find the associated picture and
display it on the screen. But in the mean time you grab your fake ID the
DMV just made for you and leave happy.
In a nut shell that's all there is to these machines.
Part Three: Security
I think a better topic is lack of security. I have yet to see any of
these machines that are remotely secure. Before we go any further the
4000 is best accessed using CloseUp the others using Carbon Copy, But
any mainstream communications program will more then likely work. You
Dial and it asks you right away for a username and password. whoa, stop,
road block right their. Unless of course you know the backdoor that
Polaroid put in their machines so they can service them. =)
ID4000
Login: CSD (case Sensitive)
Password: POLAROID (who would of guessed?)
ID3000
Login: CPS
Password: POLAROID (god these guys are so efficient)
ID2000+ And ID2000
Login: POLAROID (ahh the good old days)
Password: POLAROID
Now if these do not work because they have been edited out, there are
still a few VERY simple ways of getting in to your victims system. The
first is to go with every hackers default method of social engineering.
The best way to do this is to call them up and say "Hi this is (insert
tech name here) with Polaroid Electronic Imaging! How is it going down
there at (name of company)." The say "pretty good!" in a funny voice
thinking what great customer support. You say "How is the weather been
in (location of company)" they reply with the current weather status
feeling that they can trust you cause you are so friendly. You say "well
(name of person), we were going through our contacts one by one doing
routine upgrades and system cleaning to ensure that your database is not
going to get corrupted anytime soon and that everything is doing what it
is supposed too, if you know what I mean (name of person)." Now they
reply "oh yeah" and laugh with you not having a clue of what you are
talking about. And they then say "well everything seems to be in order."
You say "great sounds good but old *Bob* would have my head if I didn't
check that out for myself." Then you ask if the modem is plugged in and
wait for the reply. The either say yes or no then you ask them go plug
it & give you the number or just give you the number. Then they comply
cause they are just sheep in your plan. You say "Hey thanks (name) one
more thing would happen to know if user CSD:Polaroid exists or did you
guys delete it." If they deleted it ask them to put it back in, giving
you administrative access. They probably know how to and will comply. If
they need help have them do the following: Click on the combination lock
icon at the top of the screen. This will bring them to the
administrative screen and they will have the choices of Purge, Reports,
and Passwords. Have them click on passwords. Then have them enter you as
a new user with CSD as your Name and Polaroid as your Password. After
they have done that make sure they give you all the Keys. The keys are
basically access levels like on a BBS. Lets some users do certain things
while others can not. The only key you need is administrative but have
them give you the rest as well. The other keys are Management and Luser
I think. The keys are located to the left of the user information that they
just entered. Then have them click OK and close the call politely. Ta
da!! Here is a list of Polaroid phone techs but I would not advise using
Bob or Aryia cause their big wigs and nobody ever talks to them.
Senior Techs of Polaroid
Regular Techs
Bob Pentze (manager)
Don Bacher
Aryia Bagapour (assistant)
Richard
Felix Sue
Rick Ward
Jordan Freeman
Dave Webster
Call 1-800-343-5000 for more Names =)
Part Four: What to Do once you get in
Now that your in you have access to all of their database records and
photos. Upload your own and have fun with it! Everything you do is
logged so here's what you'll want to do when you're done making yourself
an official FBI agent or an employee of the federal reserve. Go to all
of the available drives which could be a lot since they are on a network
and do a search from root for all of the LOG files i.e. C:\DIR /S *.LOG
Then delete the fuckers!!!! You can also do this by FDISK or formatting.
Just kidding! But if you want to do it the right way then go to the
admin screen and purge the error and system logs.
Basically if you want the form for government badges or the FBI agents
database this is the safest way to go. These computer do not have the
ability to trace but it does not mean the phone company doesn't! ANI
sucks a fat dick so remember to divert if you decide to do this. If you
don't know how to divert I recommend you read CoTNo or Phrack and learn
a little bit about phone systems and how they work.
Moving around in the software once your past the security is very simple
so I'm not going to get into it. If you can get around a BBS then you
don't need any further help. Just remember to delete or purge the logs.
Part Five: Closing
If your looking for some mild fun like uploading the DMV a new license
or revoking your friends this is the way to do it. However if you're
looking to make fake ID's I recommend you download the badge format and
purchase or obtain a copy of IDWare by Polaroid. IDware is a lot like
the 4000 software except you only need a scanner not the whole system.
As a warning to some of the kids I know of one guy who bought a
$50,000.00 ID4000 and paid it off in a year by selling fake ID's. When
Polaroid busted him they prosecuted to the fullest and now the guy is
rotting in a cell for 25 to 50 years. Just a thought to ponder.
Peace
PiLL
Greetz
Shouts go out to the following groups and individuals: TACD, TNO, MOD,
L0pht, CDC, UPS, Shadow, Wraith, KaoTik, Wednesday, Zydirion, Voyager,
Jazmine, swolf, Mustard, Terminal, Major, Legion, Disorder, Genesis,
Paradox, Jesta, anybody else in 303, STAR, BoxingNuN, MrHades, OuTHouse,
Romen, Tewph, Bravo, Kingpin, and everyone I forgot cause I'm sure there
are a bunch of you, sorry =P.
----<>----
The Top Ten things overheard at PumpCon '96
10. "You gotta problem? Ya'll gotta rowl!"
- Keith the security guard
9. "My brain has a slow ping response"
- Kingpin
8. "Space Rogue, I've been coveting your pickle."
- espidre
7. "If there's space -n shit, then it's Star Trek. Unless there's that
little Yoda guy - then it's Star Wars"
- Kingpin
6. "I'm the editor of Phrack. Wanna lay down with me?"
- A very drunk unnamed editor of Phrack
5. "Let's go find that spic, b_, no offense"
- A drunk IP to b_.
4. "I'm lookin for that fat fucker Wozz. He's big, and got a green shirt,
and glasses, and curly hair, just like you. As a matta a fact, you
gots similar characteristics!"
- A drunk IP to wozz.
3. "He was passed out on the floor... so I pissed on him"
- An unknown assailant referring to IP
2. "It was the beginning and the end of my pimping career"
- Kingpin referring to his escapade of getting paid
two dollars for sex.
1. "French Toast Pleeeeze!"
- Everyone
----<>----
TOP 0x10 REASONS TO KICK && WAYS TO GET
KICKED OUT OF #HACK (Revision 0.1.1)
By SirLance
0x0f asking for any information about any Microsoft products
0x0e talking about cars, girls, or anything unrelated to hacking
0x0d flooding with a passwd file contents
0x0c asking how to unshadow passwd
0x0b being on #hack, #warez and #hotsex at the same time
0x0a asking for ops
0x09 using a nick including words like 'zero' 'cool' 'acid' or 'burn'
0x08 asking if someone wants to trade accounts, CCs or WaR3Z
0x07 asking what r00t means
0x06 asking when the latest Phrack will be released
0x05 asking where to get or how to create a BOT
0x04 having the word BOT anywhere in your nick
0x03 having a nick like Br0KnCaPs and SpEak LiK3 Th4t all the time
0x02 asking for flash.c or nuke.c, spoof.c, ipsniff.c or CrackerJack
0x01 thinking #hack is a helpdesk and ask a question
0x00 being on from AOL, Prodigy, CompuServe, or MSN
-EOL-
----<>----
International business
by HCF
Friday, 3:00am 4.12:
I get the call:
Julie: "You break into computers right...?"
Dover: "Yea, what kind..."
Julie: "Mac, I think."
Dover: "Hmm... Call ``HCF'' at 213.262-XXXX"
Julie: "Uh, will he be awake...?"
Dover: "Don't worry (snicker) he'll be awake."
Friday, 4:00am 4.12
HCF called me at 4am after he got the call from Julie:
HCF: "you got me into this mess, I need to barrow your car."
Dover: "Umm shure. Ok..."
HCF: "I'll be right over..."
Friday, 12:30pm 4.12: upon returning the car:
HCF: "Umm, got a parking ticket, I'll write you a check later..."
(I never got the check.)
Kathleen's comment to Julie which was passed to me (days later):
Kath: "Why didn't you tell me he was cute, I want him for myself!"
When I passed this on to HCF:
HCF: "She is *gorgeous* but not without a wet suit..."
Here is the story that happened early one Friday morning... The names
have been changed to protect the innocent, the guilty, and the innocent-looking
guilty....
I was reading up on a new firewall technology, the kind that locks
addresses out of select ports based on specific criterion, when the phone
rang.
"Hello?"
The voice of a women, between 18 and 30, somewhat deep like Kathleen
Turner's, said, "Uh, hello..."
There was an obvious pause. It seemed she was surprised that I was so
awake and answered sharply on the second ring. It was in the middle of my
working hours; 3:30 AM. There was no delay in the phone's response, no
subtle click after I picked up, and the audio quality was clear.
"Do you hack?" she asked.
Recorder on. Mental note: *stop* getting lazy with the recorder.
"No. Are you on a Cell phone?" I responded
"No."
"Are you using a portable battery operated telephone?"
"No. I was told by my friend ..."
"Are you in any way associated with local, federal or state law enforcement
agencies?"
"Oh, I get it. No I'm not. Julie said that you could help me."
I knew Julie through a mutual friend.
"Could you call me back in 5 minutes."
"Well, um, ok."
Throughout the whole conversation, the phones on her end were ringing off
the hook. As soon as I hung up, Ben, the mutual friend, called. Julie had
called him first, and he gave her my number. I got his reassurance that
this was legit. Ben was snickering but wouldn't divulge what it was about.
By now my curiosity was piqued.
The phone rang again, "I need someone who can break into a computer."
"Whose computer?"
"Mine."
It turns out that the woman had hostility bought out the previous owner of
this business. The computer in question had both a mission-critical
database of some sort and a multi-level security software installed. She
had been working under a medium permission user for some time. The
computer crashed in such a way as to require the master password (root) in
order to boot. The pervious owner moved out of town, could not be
contacted, and was most likely enjoying the situation thoroughly. The
woman was unaware of any of the technical specifications or configuration
of the machine. I was able to find out that it was a Apple Macintosh Color
Classic; a machine primarily distributed in Japan. It would be around
10:00 AM in Tokyo.
"Why are the phones ringing so often at this time of the morning?" I asked.
"I do a lot of international business."
I was intrigued, the answer was smoothly executed without a delay or pitch
change. I took the job.
Upon arriving, I was greeted by a young, stunningly beautiful, woman with
long, jet-black hair and stressed but clear green eyes. I checked the room
for obvious bugs and any other surveillance. There were calendars on the
wall, filled out with trixy and ultra-masculine sounding names like Candy
and Chuck. The phones had died down some. The machine in question was
obviously well integrated into the environment; dust patterns, scratch
marks, worn-out mouse pad; it had been there for some time. There was a
PBX, around 6 to 8 voice lines, three phones, and no network, modem or
outside connectivity.
The security, which we'll call VileGuard, defeated all the "simple" methods
of by-passing. None of the standard or available passwords, in any case or
combination, worked. A brute-force script would be slow as second failure
shut the machine down.
I made a SCSI sector copy onto a spare drive and replaced it with the
original. This involved tearing open the machine, pulling various parts
out, hooking up loose wires, merging several computers, and turning things
on in this state. Trivial and routine, I did it rapidly and with both
hands operating independently. For those who have never opened the case of
an all-in-one Mac, it involves a rather violent looking smack on both sides
of the pressure fitted case backing, appropriately called "cracking the
case." This did not serve well to calm the nerves of the client. After a
few moments of pallor and little chirps of horror, she excused herself from
the room.
While the SCSI copy preceded, I overheard her taking a few calls in the
other room. What I heard was a one-sided conversation, but I could pretty
much fill in the blanks,
"Hello, Exclusive Escorts, may I help you?"
"Would you like to be visited at your home or at a hotel?"
"Well, we have Suzy, she's a 5'4" Asian lady with a very athletic body.
Very shy but willing, and very sensual, she measures 34, 24, 34."
"Big what? Sir, you'll have to speak a little clearer."
"Oh, I see, well we have a very well endowed girl named Valerie, she's a
double D and measures 38, 24, 34. Would that be more to your liking?"
It was not easy to keep from busting up laughing.
"He wants you to do what? Well, charge him double."
With the new drive installed, and to predictable results, I fired up a hex
editor. My experience has been that full-disk encryption typically slows
the machine down to the point where the user disables it. At around
$5C9E8, I found, "...507269 6E74204D 616E6167 65722045 72726F72...
...Print Manager Error..." in plain text. I searched for some of the
known, lower permission, passwords. I found a few scattered around sector
$9b4. The hex editor I was using could not access the boot or driver
partitions, so I switched to one that could. It's not as pretty of an
interface as the last editor, and is rather old. Its saving grace though
is that it doesn't recognize the modern warnings of what it can and cannot
see. There it was, VileGuard; driver level security.
"Eric is endowed with eight and has a very masculine physique."
Every male was "endowed with eight," every female had relatively identical
measurements.
I hunted fruitlessly around the low sectors for what might be the master
password. All awhile wishing the find function of the editor would accept
regexp. All the other passwords were intercapped on the odd character, but
that was a convention of the current owner, and not necessarily used by the
past owner.
"Oh, you want a girl that is fluent in Greek?"
It's not professional for me, and not good salesmanship for her, to have me
overheard laughing myself into anoxia. After trying to straighten up and
gather my wits together again, I began to consider an alternate
possibility. If I don't know the password, what happens if I make it so
that the driver doesn't either. Return to the first-installed condition
perhaps? It was a thought. It turned out to be a bad thought, resulting in
my haphazardly writing "xxxx" over, pretty much, random sectors of the
driver partition.
"Oh yes sir, Roxanne prefers older men. She appreciates how very
experienced they are. I understand sir, and I'm sure she can help you with
that."
Before I made a second copy and whipped out the RE tools, TMON and MacNosy,
I tried booting. The results were, as you'd expect, that the disk didn't
mount. Instead, it asked me if I wanted to reinitialize the disk. Pause.
Think... ya, why not. This was most definitely farther than I had gotten
with the secure driver installed and functional. I canceled and fired up
one of many disk formatters I had on hand. Though the formatter wasn't the
slickest, it had proven itself repeatedly in the past. Its main quality
was that of writing a driver onto a disk that is in just about *any*
condition. It's made by a French drive manufacturer. As dangerous as this
behavior is, I'm sure it's a planned feature. It could see the drive and
allowed me to "update" the driver. A few seconds later, a normal
"finished" dialog.
"Yes, Stan carries a set of various toys with him. No, I don't believe he
normally carries that, but I'm sure if you ask him nicely, he'll drop by
the hardware store on his way and pick one up."
I rebooted. It worked. I copied over the disk's data and reformatted.
Time to try it on the original drive (I had, of course, been working on my
copy.) Upon startup, before anything could be accessed, "Please input the
master password..."
Puts an unusual twist on the phrase, "adverse working conditions"
- HCF
Note 1: Payment was in currency.
Note 2: If you ever think you understand the opposite sex's view on sex,
you're underestimating.
----<>----
The Beginners Guide to RF hacking
by Ph0n-E of BLA & DOC
Airphones suck. I'm on yet another long plane ride to some
wacky event. I've tried dialing into my favorite isp using this lame GTE
airphone, $15 per call no matter how long you "talk". In big letters it
says 14.4k data rate, only after several attempts I see the very fine
print, 2400 baud throughput. What kind of crap is that? A 14.4 modem that
can only do 2400? It might be the fact they use antiquated 900MHz AM
transmissions. The ATT skyphones that are now appearing use imarsat
technology, but those are $10/minute. Anyway they suck, and I have an
hour or so before they start showing Mission Impossible so I guess I'll
write this Phrack article Route has been bugging me about.
There are a bunch of people who I've helped get into radio stuff, five
people bought handheld radios @ DefCon... So I'm going to run down some
basics to help everyone get started. As a disclaimer, I knew nothing about
RF and radios two years ago. My background is filmmaking, RF stuff is just
for phun.
So why the hell would you want to screw around with radio gear? Isn't it
only for old geezers and wanna be rentacops? Didn't CB go out with Smokey
& the Bandit?
Some cool things you can do:
Fast-food drive thrus can be very entertaining, usually the order taker
is on one frequency and the drivethru speaker is on another. So you can
park down the block and tell that fat pig that she exceeds the weight
limit and McDonalds no longer serves to Fatchix. Or when granny pulls up
to order those tasty mcnuggets, blast over her and tell the nice MCD slave
you want 30 happy meals for your trip to the orphanage. If you're lucky
enough to have two fast food palaces close to each other you can link them
together and sit back and enjoy the confusion.
You've always wanted a HERF gun, well your radio doubles as a small
scale version. RF energy does strange and unpredictable things to
electronic gear, especially computers. The guy in front of me on the plane
was playing some lame game on his windowz laptop which was making some very
annoying cutey noises. He refused to wear headphones, he said "they mushed
his hair...". Somehow my radio accidentally keyed up directly under his
seat, there was this agonizing cutey death noise and then all kinds of cool
graphics appeared on his screen, major crash. He's still trying to get it
to reboot.
Of course there are the ever popular cordless phones. The new ones work
on 900MHz, but 90% of the phones out there work in the 49MHz band. You can
easily modify the right ham radio or just use a commercial low band radio
to annoy everyone. Scanning phone calls is OK, but now you can talk back,
add sound effects, etc... That hot babe down the street is talking to
her big goony boyfriend, it seems only fair that you should let her know
about his gay boyfriend. Endless hours of torture.
You can also just rap with your other hacker pals (especially useful
cons). Packet radio, which allows you up to 9600 baud wireless net
connections, its really endless in its utility.
How to get started:
Well you're supposed to get this thing called a HAM license. You take
this test given by some grampa, and then you get your very own call sign.
If you're up to that, go for it. One thing though, use a P.O. box for your
address as the feds think of HAMs as wackos, and are first on the list when
searching for terrorists. Keep in mind that most fun radio things are
blatantly illegal anyway, but you're use to that sort of thing, right?
If you are familiar with scanners, newer ones can receive over a very
large range of frequencies, some range from 0 to 2.6 GHz. You are not going
to be able to buy a radio that will transmit over that entire spectrum. There
are military radios that are designed to sweep large frequencies ranges for
jamming, bomb detonation, etc. - but you won't find one at your local radio
shack.
A very primitive look at how the spectrum is broken down into sections:
0 - 30MHz (HF) Mostly HAM stuff, short-wave, CB.
30 - 80MHz (lowband) Police, business, cordless phones, HAM
80 - 108MHz (FM radio) You know, like tunes and stuff
110 - 122MHz (Aircraft band) You are clear for landing on runway 2600
136 - 174MHz (VHF) HAM, business, police
200 - 230MHz Marine, HAM
410 - 470MHz (UHF), HAM, business
470 - 512MHz T-band, business, police
800MHz cell, trunking, business
900MHz trunking, spread spectrum devices, pagers
1GHZ+ (microwave) satellite, TV trucks, datalinks
Something to remember, the lower the frequency the farther the radio waves
travel, and the higher the frequency the more directional the waves are.
A good place to start is with a dual band handheld. Acquire a Yaesu
FT-50. This radio is pretty amazing, its very small, black and looks cool.
More importantly it can easily be moded. You see this is a HAM radio, it's
designed to transmit on HAM bands, but by removing a resistor and solder
joint, and then doing a little keypad trick you have a radio that transmits
all over the VHF/UHF bands. It can transmit approximately 120-232MHz and
315-509MHz (varies from radio to radio), and will receive from 76MHz to about
1GHz (thats 1000MHz lamer!), and yes that *includes* cell phones. You also
want to get the FTT-12 keypad which adds PL capabilities and other cool stuff
including audio sampling. So you get a killer radio, scanner, and red box all
in one! Yaesu recently got some heat for this radio so they changed the eprom
on newer radios, but they can modified as well, so no worries.
Now for some radio basics. There are several different modulation schemes,
SSB - Single Side Band, AM - Amplitude Modulation, FM - Frequency Modulation,
etc. The most common type above HF communications is NFM, or Narrow band
Frequency Modulation.
There are three basic ways communication works:
Simplex - The Transmit and Receive frequencies are the same, used for short
distance communications.
Repeater - The Transmit and Receive frequencies are offset, or even on
different bands.
Trunking - A bunch of different companies or groups within a company share
multiple repeaters. If you're listening to a frequency with a scanner and
one time its your local Police and the next it's your garbage man, the fire
dept... - that's trunking. Similar to cell phones you get bits and pieces
of conversations as calls are handed off among repeater sites.
Their radios are programmed for specific "talk groups", so the police only
hear police, and not bruno calling into base about some weasel kid he found
rummaging through his dumpsters. There are three manufacturers - Motorola,
Ericsson (GE), and EF Johnson. EFJ uses LTR which sends sub-audible codes
along with each transmission, the other systems use a dedicated control
channel system similar to cell phones. Hacking trunk systems is an entire
article in itself, but as should be obvious, take out the control channel
and the entire system crashes (in most cases).
OK so you got your new radio you tune around and your find some security
goons at the movie theater down the street. They are total losers so you
start busting on them. You can hear them, but why they can't hear you?
The answer-- SubAudible Tones. These are tones that are constantly
transmitted with your voice transmission - supposedly subaudible, but if
you listen closely you can hear them. With out the tone you don't break
their squelch (they don't hear you.) These tones are used keep nearby
users from interfering with each other and to keep bozos like you from
messing with them. There are two types, CTCSS Continuos Tone-Codes Squelch
system (otherwise known as PL or Privacy Line by Motorola) or DCS Digital
Coded Squelch (DPL - Digital Privacy Line). If you listened to me and got
that FT-50 you will be styling because its the only modable dual band that
does both. So now you need to find their code, first try PL because its
more common. There is a mode in which the radio will scan for tones for
you, but its slow and a pain. The easiest thing to do is turn on Tone
Squelch, you will see the busy light on your radio turn on when they are
talking but you wont hear them. Go into the PL tone select mode and tune
through the different tones while the busy light remains on, as soon as you
hear them again you have the right tone, set it and bust away! If you
don't find a PL that works move on to DPL. There is one other squelch
setting which uses DTMF tone bursts to open the squelch, but its rarely
used, and when it is used its mostly for paging and individuals.
Now you find yourself at Defcon, you hear DT is being harassed by
security for taking out some slot machines with a HERF gun, so you figure
it's your hacker responsibility to fight back. You manage to find a
security freq, you get their PL, but their signal is very weak, and only
some of them can hear your vicious jokes about their moms. What's up? They
are using a repeater. A handheld radio only puts out so much power,
usually the max is about 5 watts. That's pretty much all you want radiating
that close to your skull (think brain tumor). So a repeater is radio that
receives the transmissions from the handhelds on freq A and then
retransmits it with a ton more watts on freq B. So you need to program
your radio to receive on one channel and transmit on another. Usually
repeaters follow a standard rule of 5.0MHz on UHF and .6MHz on VHF, and
they can either be positive or negative offsets. Most radios have a
auto-repeater mode which will automatically do the offset for you or you
need to place the TX and RX freqs in the two different VCOs. Government
organizations and people who are likely targets for hacks (Shadow Traffic
news copter live feeds) use nonstandard offsets so you will just need to
tune around.
Some ham radios have an interesting feature called crossband repeat.
You're hanging out at Taco Bell munching your Nachos Supreme listening to the
drive thru freq on your radio. You notice the Jack in the Box across the
street, tuning around you discover that TacoHell is on VHF (say 156.40) and
Jack in the Crack is on UHF (say 464.40). You program the two freqs into
your radio and put it in xband repeat mode. Now when someone places their
order at Taco they hear it at Jacks, and when they place their order at
Jacks they hear it at Taco. When the radio receives something on 156.40 it
retransmits it on 464.40, and when it receives something on 464.40 it
retransmits it on 156.40.
"...I want Nachos, gimme Nachos..."
"...Sorry we don't have Nachos at Jack's..."
"...Huh? Im at Taco Bell..."
Get it? Unfortunately the FT-50 does not do xband repeat, that's the only
feature it's lacking.
Damn it, all this RF hacking is fun, but how do I make free phone calls?
Well you can, sort of. Many commercial and amateur repeaters have a
feature called an autopatch or phonepatch. This is a box that connects the
radio system to a phone line so that you can place and receive calls. Keep
in mind that calls are heard by everyone who has their radio on! The
autopatch feature is usually protected by a DTMF code. Monitor the input
freq of the repeater when someone places a call you will hear their dtmf
digits - if you're super elite you can tell what they are by just hearing
them, but us normal people who have lives put the FT-50 in DTMF decode mode
and snag the codez... If your radio doesn't do DTMF decode, record the audio
and decode it later with your soundblaster warez. Most of the time they
will block long-distance calls, and 911 calls. Usually there is a way
around that, but this is not a phreaking article. Often the repeaters are
remote configurable, the operator can change various functions in the field
by using a DTMF code. Again, scan for that code and you too can take
control of the repeater. What you can do varies greatly from machine to
machine, sometimes you can turn on long-distance calls, program speed-dials,
even change the freq of the repeater.
What about cordless phones, can't I just dial out on someone's line?
Sort of. You use to be able to take a Sony cordless phone which did
autoscanning (looked for an available channel) drive down the block with
the phone on until it locked on to your neighbors cordless and you get a
dialtone. Now cordless phones have a subaudible security tone just like PL
tones on radios so it doesn't work anymore. There are a bunch of tones and
they vary by phone manufacturer, so it's easier to make your free calls other
ways.
But as I mentioned before you can screw with people, not with your FT-50
though. Cordless phones fall very close to the 6 meter (50MHz) HAM band and
the lowband commercial radio frequencies. There are 25 channels with the
base transmitting 43-47MHz and the handset from 48-50MHz. What you want to
do is program a radio to receive on the base freqs and transmit on the
handset freqs. The phones put out a few milliwatts of power (very little).
On this freq you need a fairly big antenna, handhelds just don't cut it -
think magmount and mobile. There are HAM radios like the Kenwood TM-742A
which can be modified for the cordless band, however I have not found a
radio which works really well receiving the very low power signals the
phones are putting out. So, I say go commercial! The Motorola
Radius/Maxtrac line is a good choice. They have 32 channels and put out
a cool 65watts so your audio comes blasting out of their phones. Now
the sucko part, commercial radios are not designed to be field
programmable. There are numerous reasons for this, mainly they just want
Joe rentalcop to know he is on "Channel A" , not 464.500. Some radios are
programmed vie eproms, but modern Motorola radios are programmed via a
computer. You can become pals with some guy at your local radio shop and
have him program it for you. If you want to do it yourself you will need
a RIB (Radio Interface Box) with the appropriate cable for the radio, and
some software. Cloned RIB boxes are sold all the time in rec.radio.swap
and at HAM swap meets. The software is a little more difficult, Motorola
is very active in going after people who sell or distribute thier software
(eh, M0t?) They want you to lease it from them for a few zillion dollars.
Be cautious, but you can sometimes find mot warez on web sites, or at HAM
shows. The RIB is the same for most radios, just different software, you
want Radius or MaxTrac LabTools. It has built in help, so you should be
able to figure it out. Ok so you got your lowband radio, snag a 6 meter
mag mount antenna, preferably with gain, and start driving around. Put
the radio in scan mode and you will find and endless amount of phone calls
to break into. Get a DTMF mic for extra fun, as your scanning around listen
for people just picking up the phone to make a call. You'll hear dialtone,
if you start dialing first since you have infinitely more power than the
cordless handset you will overpower them and your call will go through.
It's great listening to them explain to the 411 operator that their phone is
possessed by demons who keep dialing 411. Another trick is to monitor the
base frequency and listen for a weird digital ringing sound - these are tones
that make the handset ring. Sample these with a laptop or a yakbak or
whatever and play them back on the BASE frequency (note, not the normal
handset freq) and you will make their phones ring. Usually the sample won't
be perfect so it will ring all wacko. Keep in mind this tone varies from
phone to phone, so what works on one phone wont work on another.
Besides just scanning around how do you find freqs? OptoElectronics
makes cool gizmos called near-field monitors. They sample the RF noise
floor and when they see spikes above that they lock on to them. So you
stick the Scout in your pocket, when someone transmits near you, the scout
reads out their frequency. The Explorer is thier more advanced model which
will also demodulates the audio and decode PL/DPL/DTMF tones. There are
also several companies that offer CDs of the FCC database. You can search
by freq, company name, location, etc. Pretty handy if your looking for a
particular freq. Percon has cool CDs that will also do mapping. Before
you buy anything check the scanware web site, they are now giving away
their freq databases for major areas.
OK radioboy, you're hacking repeaters, you're causing all the cordless
phones in your neighborhood to ring at midnight, and no one can place
orders at your local drivethrus. Until one day, when the FCC and FBI
bust down your door. How do you avoid that?? OK, first of all don't
hack from home. Inspired people can eventually track you down. How?
Direction Finding and RF Fingerprinting. DF gear is basically a
wideband antenna and a specialized receiver gizmo to measure signal
strength and direction. More advanced units connect into GPS units for
precise positioning and into laptops for plotting locations and advance
analysis functions such as multipath negations (canceling out reflected
signals.) RF finger printing is the idea that each individual radio has
specific characteristics based on subtle defects in the manufacture of the
VCO and AMP sections in the radio. You sample a waveform of the radio and
now theoretically you can tell it apart from other radios. Doesn't really
work though-- too many variables. Temperature, battery voltage, age,
weather conditions and many other factors all effect the waveform.
Theoretically you could have a computer scanning around looking for a
particular radio, it might work on some days. Be aware that fingerprinting
is out there, but I wouldn't worry about it *too* much. On the other hand
DF gear in knowledgeable hands does work. Piss off the right bunch of HAMS
and they will be more than happy to hop in their Winnebego and drive all
over town looking for you. If you don't stay in the same spot or if you're
in an area with a bunch of metal surfaces (reflections) it can be very very
hard to find you. Hack wisely, although the FCC has had major cutbacks
there are certain instances in which they will take immediate action. They
are not going to come after you for encouraging Burger King patrons to become
vegetarians, but if you decide to become an air-traffic controller for a day
expect every federal agency you know of (and some you don't) to come looking
for your ass.
My plane is landing so thats all for now, next time - advanced RF hacking,
mobile data terminals, van eck, encryption, etc.
EOF
----<>----
10.16.96
Log from RAgent
GrimReper: I work For Phrack
GrimReper: Yeah
GrimReper: I gotta submit unix text things like every month
GrimReper: I've been in Phrack for a long time
GrimReper: Phrack is in MASS
-> *grimreper* so how much does Phrack pay you?
*GrimReper** How much?
*GrimReper** Hmm......
*GrimReper** About $142
-> *grimreper* really
-> *grimreper* who paid you?
*GrimReper** w0rd
*GrimReper** CardShoot
*GrimReper** Cardsh00t
-> *grimreper* hmm, I don't see any "cardsh00t" in the credits for phrack
+48
*GrimReper** There is
-> *grimreper* you might as well stop lying before I bring in daemon9,
+he's another friend of mine
-> *grimreper* he's one of the editors of phrack
*GrimReper** Get the latest Phrack?
*GrimReper** Its gonna have my NN
*GrimReper** watch
-> *grimreper* not anymore
*GrimReper** Go Ahead
-> *grimreper* actually
*GrimReper** so?
-> *grimreper* you will be mentioned
-> *grimreper* you'll be known as the lying fuckhead you are, when this
+log goes in the next issue
----<>----
10.24.96
Log from Aleph1
*** ggom is ~user01@pm1-6.tab.com (ggom)
*** on irc via server piglet.cc.utexas.edu ([128.83.42.61] We are now all
piglet)
*ggom* i am assembling a "tool shed". A "shed" for certain "expert" activity.
Can you help?
-> *ggom* maybe... go on
*ggom* i represent certain parties that are looking for corporate information.
this would fall under the "corporate espionage" umbrella
*ggom* this information could probably be obtained via phone phreak but access to
corporate servers would be a plus...can you help?
-> *ggom* a) how do I know you are not a cop/fed? b) why did you come to #hack
to ask for this? b) what type of data you after? c) what type of money are
you talking about?
*ggom* where else should i go to ask for this stuff????????
-> *ggom* you tell me. How do you know about #hack?
*ggom* looked it up on the irc server...figured this was a good place to
start........... i am talking about 4 to 5 figures here for the information
-> *ggom* you are also talking 4 to 5 years
-> *ggom* #hack is visited regularly by undercovers and the channel is logged
-> *ggom* talking openly about such thing is not smart
*ggom* whatever........... man, if you are GOOD, you are UNTRACEABLE. i
guess i am looking in the wrong place......
-> *ggom* you been watching way to many times "Hackers" and yes #hack is the
wrong place...
*ggom* we are on a private channel.........suggest a more private setting....
-> *ggom* sorry you started off on a bad foot. If you got a million to spare
for such information you would also have the resources to find the
appropiate person to do the job. So you either are full off it, are a fed,
or just plain dumb. This conversation ends here.
*ggom* later
*ggom* not talking a million.. talking 5 to 6 figures......... you are
right
*ggom* talk to me.......
*ggom* talk to me.......
----<>----