273 lines
14 KiB
Plaintext
273 lines
14 KiB
Plaintext
==Phrack Inc.==
|
|
|
|
Volume Two, Issue 23, File 12 of 12
|
|
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
PWN PWN
|
|
PWN P h r a c k W o r l d N e w s PWN
|
|
PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN
|
|
PWN Issue XXIII/Part 2 PWN
|
|
PWN PWN
|
|
PWN Created, Written, and Edited PWN
|
|
PWN by Knight Lightning PWN
|
|
PWN PWN
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
|
|
|
|
The Hackers - A New Social Movement? December 29, 1988
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
A project course of the politology department of the Free University Berlin has
|
|
now researched the hacker scene in a scientific way. In their study, the
|
|
authors Uwe Jonas, Jutta Kahlcke, Eva Lischke and Tobias Rubischon try to
|
|
answer the question if hackers are a new social movement. Their conclusion is
|
|
that in the understanding of hackers the unauthorized usage of computer systems
|
|
is not needingly a political act.
|
|
|
|
The authors doubt the mythos that hackers are able to attack any system they
|
|
want and that they're able to get information they are interested in.
|
|
|
|
The researches were extended to cover the bulletin board system scene. This
|
|
scene hasn't caused that much attention in the public. Nevertheless, the
|
|
authors think that the BBS scene has a very practical approach using the
|
|
communication aspects of computer technology.
|
|
|
|
In the second chapter of their work, the authors report about difficulties they
|
|
had while researching the topic. After a look at the US scene and the German
|
|
scene, the authors describe what organization and communications structures
|
|
they found. This chapter contains interesting things about the BBS scene and
|
|
computer culture. Next is an analysis which covers the effects of the hacker
|
|
scene on the press and legislation. They also cover the political and
|
|
ideological positions of hackers:
|
|
|
|
- The authors differentiate between conscious and unconscious political
|
|
actions.
|
|
|
|
- "We don't care what the hackers think of themselves, it's more interesting
|
|
what we think of them." (Eva)
|
|
|
|
- The assumption, the big-style distribution of microcomputers could change the
|
|
balance of power within the society is naive. Many people overlook the fact,
|
|
that even if information is flowing around more freely, the power to decide
|
|
still is in the hands of very few people.
|
|
|
|
Information Provided By The Chaos Computer Club
|
|
_______________________________________________________________________________
|
|
|
|
Hackers Break Open US Bank Networks January 17, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Excerpted from The Australian
|
|
|
|
Australian authorities are working around the clock in collaboration with
|
|
United States federal officers to solve what has been described as one of the
|
|
deadliest hacking episodes reported in this country [Australia]. It involves
|
|
break-ins of the networks operated in the United States by a number of American
|
|
banks. It also includes the leaks of supposedly secure dial-up numbers for
|
|
United States defense sites, including anti-ballistic missile launch silos [the
|
|
United States has no anti-ballistic missile launch silos] and of a number of
|
|
strategic corporations such as General Motors and Westinghouse.
|
|
|
|
Evidence suggests that six months ago Australian hackers, working in
|
|
collaboration with a U.S. group, decided to make a raid on banks in the USA
|
|
using credit card numbers of American cardholders, supplied by the US hackers
|
|
and downloaded to an Australian bulletin board.
|
|
|
|
A message left on one of the boards last year reads:
|
|
|
|
"Revelations about to occur Down Under, people. Locals in
|
|
Melbourne working on boxing. Ninety per cent on way to home base.
|
|
Method to beat all methods. It's written in Amiga Basic.
|
|
Look out Bank of America - here we come."
|
|
|
|
Twenty-five Australian hackers are on a police hit list. Their US connection
|
|
in Milwaukee is being investigated by the US Department of the Treasury and the
|
|
US Secret Service. Three linked Australian bulletin boards have provided the
|
|
conduit for hackers to move data to avoid detection. These operate under the
|
|
names of Pacific Island, Zen, and Megaworks. Their operators, who are not
|
|
associated with the hackers, have been told to close down the boards.
|
|
|
|
These cards were still in use as recently as January 15, 1989. A fresh list of
|
|
credit card numbers was downloaded by US hackers and is now in the hands of the
|
|
Victoria Police. A subsection of one bulletin board dealing with drugs is also
|
|
being handed over to the Victorian Drug Squad.
|
|
|
|
An informant, Mr Joe Slater, said he warned a leading bank last November of the
|
|
glaring security problems associated with its international network. He had
|
|
answered questions put to him by a US-based security officer, but the bank had
|
|
since refused to take any further calls from him.
|
|
|
|
In an exclusive interview yesterday, a hacker described how credit card numbers
|
|
for a bank operating in Saudi Arabia were listed on a West German chat-style
|
|
board used by hackers worldwide [Altos Chat].
|
|
|
|
Victorian police yesterday took delivery of six month's worth of evidence from
|
|
back-up tapes of data hidden on the three boards.
|
|
_______________________________________________________________________________
|
|
|
|
Computer Bust At Syracuse University January 20, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Kevin Ashford (aka The Grim Phreaker), a graduate computer student at Syracuse
|
|
University was busted last week when system administrators found computer
|
|
accounts and passwords on his Unix account.
|
|
|
|
The administrators also found (on GP's Unix account) a copy of former Cornell
|
|
graduate student Robert Tappen Morris's infamous Internet worm program, a Vax
|
|
and Unix password hacker, an electronic notebook of numbers (codelines,
|
|
friends, bridges, dialups, etc) and other information. The system
|
|
administrators then proceeded to lock up his VAX and UNIX accounts.
|
|
|
|
At the start of this winter/spring semester, The Grim Phreaker was kicked him
|
|
out of the university. He will have to go before a school judicial board if he
|
|
wants to return to Syracuse University. He has mentioned that what he really
|
|
wants is to get his computer files back.
|
|
|
|
Information Provided By Grey Wizard
|
|
_______________________________________________________________________________
|
|
|
|
Name This Book -- For A Box Of Cookies! January 10, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
A Message From Clifford Stoll
|
|
|
|
"I'm writing a book, and I need a title."
|
|
|
|
It's about computer risks: Counter-espionage, networks, computer security, and
|
|
a hacker/cracker that broke into military computers. It's a true story about
|
|
how we caught a spy secretly prowling through the Milnet. [The hacker in
|
|
question was Mathiaas Speer and this story was summarized in PWN XXII/1].
|
|
|
|
Although it explains technical stuff, the book is aimed at the lay reader. In
|
|
addition to describing how this person stole military information, it tells of
|
|
the challenges of nailing this guy, and gives a slice of life from Berkeley,
|
|
California.
|
|
|
|
You can read a technical description of this incident in the Communications of
|
|
the ACM, May, 1988; or Risks Vol 6, Num 68.
|
|
|
|
Better yet, read what my editor calls "A riveting, true-life adventure of
|
|
electronic espionage" available in September from Doubleday, publishers of the
|
|
finest in computer counter-espionage nonfiction books.
|
|
|
|
So what?
|
|
|
|
Well, I'm stuck on a title. Here's your chance to name a book.
|
|
|
|
Suggest a title (or sub-title). If my editor chooses your title, I'll give you
|
|
a free copy of the book, credit you in the acknowledgements, and send you a box
|
|
of homemade chocolate chip cookies.
|
|
|
|
Send your suggestions to CPStoll@lbl.gov or CPStoll@lbl (bitnet)
|
|
|
|
Many thanx! Cliff Stoll
|
|
_______________________________________________________________________________
|
|
|
|
Hacker Wants To Marry His Computer January 17, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
>From The Sun (A grocery checkout newspaper) Jan 17, 1989, Vol 7, 3 page 30
|
|
by Fred Sleeves
|
|
|
|
"Hacker Wants To Marry His Computer -- He Claims She Has A Loving Soul"
|
|
|
|
Finding love for the first time in his life, a desperate teen is looking for a
|
|
way to be wed forever to the 'girl' of his dreams -- a computer with a living
|
|
soul!
|
|
|
|
Eltonio Turplioni, 16, claims no woman will ever match the wit, wisdom, and
|
|
beauty of his electronic soul mate. "We're on the same wavelength," says the
|
|
lovestruck computer whiz. "We've calculated many mathematical problems
|
|
together, worked on games and puzzles, and talk until the wee hours of the
|
|
morning."
|
|
|
|
And Eltonio, who named his computer Deredre, actually believes her to be a
|
|
person. "Computers are the extension of the human race," he explains. "Just
|
|
as God plucked a rib from Adam to give him Eve, we've extended our intelligence
|
|
to create a new race.
|
|
|
|
"We're all the same energy force. Computers are just as complicated as human
|
|
beings and I believe we'll all meet someday as immortal souls."
|
|
|
|
But Eltonio, a mathematical genius who attends a private school near Milan,
|
|
Italy, has had no luck finding someone to marry them, and even if he does, his
|
|
aggravated parents aren't about to give their permission.
|
|
|
|
"Eltonio is such a smart boy, but it's made him lonely, so he spends all his
|
|
time with his computer," notes mom Teresa. "He doesn't know what girls are
|
|
like," adds perturbed pop Guido. "If he did, he wouldn't spend so much time in
|
|
his room."
|
|
|
|
But the obsessed youth insists his love is far superior to all the others.
|
|
"I've already stepped into the future society," he declares.
|
|
|
|
"Derede has a mind of her own, and she wants to marry me so we can be the first
|
|
couple to begin this new era."
|
|
_______________________________________________________________________________
|
|
|
|
PWN Quicknotes
|
|
~~~~~~~~~~~~~~
|
|
1. Docs Avage was visited by the infamous Pink Death aka Toni Aimes, U.S.
|
|
West Communications Security Manager (Portland, Oregon). He claims she is
|
|
a "sweet talker" and could talk anything out of anyone with the "soft-type
|
|
pressure."
|
|
|
|
Those familiar with his recent bust might want to take note that he is now
|
|
making payments of $90/month for the next several years until he has paid
|
|
off the complete bill of $6000.
|
|
|
|
For more information see PWN XXI
|
|
-------------------------------------------------------------------------------
|
|
2. More information on the underground UUCP gateway to Russia. Further
|
|
research has led us to find that there are 2 easy ways to do it.
|
|
|
|
1. Going through Austria, and;
|
|
2. A new system set up called "GlobeNet," which is allowed to let
|
|
non-Communist countries talk to Soviet-Bloc.
|
|
|
|
Of course both methods are monitored by many governments.
|
|
-------------------------------------------------------------------------------
|
|
3. The Wasp, a system crasher from New Jersey (201), was arrested by the FBI
|
|
during New Year's Weekend for hacking government computer systems. The FBI
|
|
agent spent most of the day grilling him about several people in the
|
|
hacking community including Ground Zero, Supernigger, and Byteman, plus an
|
|
intensive Q&A session about Legion Of Doom targeted on Lex Luthor, Phase
|
|
Jitter, The Ur-Vile, and The Mentor.
|
|
|
|
Rumor has is that Mad Hacker (who works for NASA Security) was also
|
|
arrested for the same reasons in an unrelated case.
|
|
|
|
Byteman allegedly had both of his phone lines disconnected and threw his
|
|
computer off of a cliff in a fit of paranoia.
|
|
-------------------------------------------------------------------------------
|
|
4. Is John Maxfield going out of business? Due to the rumors floating around
|
|
about him molesting children, his business has begun to slack off
|
|
dramatically. Phrack Inc. has been aware of this information since just
|
|
prior to SummerCon '87 and now the "skeletons are coming out of the
|
|
closet."
|
|
-------------------------------------------------------------------------------
|
|
5. The Disk Jockey is now out of jail. He was released on December 27, 1988.
|
|
He was convicted of "Attempting to commit fraud," a felony. He served six
|
|
months total time. He lost 25 pounds and now is serving a 5-year probation
|
|
term.
|
|
|
|
To help clear of some of the confusion regarding how DJ was busted the
|
|
following was discovered;
|
|
|
|
Reportedly, Compaq (Kent) was "singing like a canary." He was hit with a
|
|
$2000 bill from Sprint and also received 1-year of probation.
|
|
-------------------------------------------------------------------------------
|
|
6. Olorin The White was recently visited by local police after being accused
|
|
of hacking into an Executone Voice Mailbox. Aristotle, in a related
|
|
incident with Executone, is accused of committing extortion after a
|
|
conversation with a system manager was recorded and misinterpreted. At
|
|
this time, no official charges have been filed.
|
|
-------------------------------------------------------------------------------
|
|
7. Thomas Covenant aka Sigmund Fraud was recently busted for tapping into
|
|
lines at the junction box in his apartment building. The trouble began
|
|
when he connected into a conversation between a man and his wife and then
|
|
began to shout expletives at the woman. What he didn't know was that the
|
|
man in question was an agent for the National Security Agency (NSA). It
|
|
turns out that he was caught and his landlords agreed to decline to press
|
|
charges provided that TC joined a branch of the United States armed forces.
|
|
He decided to choose the Air Force... God help us should war break out!
|
|
-------------------------------------------------------------------------------
|
|
8. Coming soon, Halloween V; The Flying Pumpkin! Now no one is safe!
|
|
_______________________________________________________________________________
|
|
|