233 lines
12 KiB
Plaintext
233 lines
12 KiB
Plaintext
==Phrack Inc.==
|
|
|
|
Volume Four, Issue Thirty-Nine, File 1 of 13
|
|
|
|
Issue XXXIX Index
|
|
___________________
|
|
|
|
P H R A C K 3 9
|
|
|
|
June 26, 1992
|
|
___________________
|
|
|
|
~You're Not Dealing With AT&T~
|
|
|
|
Welcome to Phrack 39. This will be the final issue before SummerCon '92.
|
|
Details of SummerCon will appear in our special anniversary issue due late this
|
|
summer -- Phrack 40. Rumor also has it that the next issue of Mondo 2000 will
|
|
contain some type of coverage about SummerCon as well!
|
|
|
|
Phrack has been receiving an enormous amount of mail containing questions and
|
|
comments from our readers and we really appreciate the attention, but we don't
|
|
know what to do with it all. Phrack Loopback was created to address letters of
|
|
this sort, but in a lot of cases, the senders of the mail are not indicating if
|
|
their question is to be posted to Loopback or if they are to be identified as
|
|
the author of their question in Loopback.
|
|
|
|
Dispater has been moving all across the country over the past couple of months,
|
|
which is the primary reason for the delay in releasing this issue. However,
|
|
now that he is settled, the fun is about to begin. He will be responding to
|
|
your mail very soon and hopefully this will all be sorted out by issue 40.
|
|
For right now, you can enjoy a variety of special interest articles and letters
|
|
in this issue's Loopback, including "A Review of Steve Jackson Games' HACKER"
|
|
by Deluge. Special thanks goes out to Mentor and Steve Jackson for a copy of
|
|
the game and the totally cool looking poster. "Association of Security
|
|
Sysadmins" is my favorite! ;)
|
|
|
|
Another problem situation that needs to be mentioned has to do with would-be
|
|
subscribers. For some reason the "phracksub@stormking.com" account has been
|
|
receiving hundreds of requests from people who want to be added to the
|
|
subscription list. This isn't how it works. You must subscribe yourself, we
|
|
can't and won't do it for you. The instructions are included later in this
|
|
file. Up till this point we have been informing people of their error and
|
|
mailing them the instructions, but we will ignore these requests from now on.
|
|
Anyone with an intelligence level high enough to enjoy Phrack should be capable
|
|
of figuring out how to subscribe.
|
|
|
|
Phrack Pro-Phile focuses on Shadow Hawk 1 -- The first hacker ever to be
|
|
prosecuted under the Computer Fraud & Abuse Act of 1986. A lot of people don't
|
|
realize that Robert Morris, Jr. was not the first because Shadow Hawk 1 was
|
|
tried as a minor and therefore a lot of details in his case are not publicly
|
|
known. Something to point out however is that the same people (William J. Cook
|
|
and Henry Klupfel) that were responsible for prosecuting SH1 in 1989, came back
|
|
in 1990 to attack Knight Lightning... but this time the government and Bellcore
|
|
didn't fare as well and now both Cook and Klupfel (among others) are being sued
|
|
in Federal Court in Austin, Texas (See Steve Jackson Games v. United States).
|
|
|
|
Now, before anyone starts flying off their keyboards screaming about our
|
|
article "Air Fone Frequencies" by Leroy Donnelly, we will let you know what's
|
|
what. Yes, the same article did recently appear in Informatik, however, both
|
|
publications received it from the same source (Telecom Digest) and Informatik
|
|
just had an earlier release date. At Phrack, we feel that the information was
|
|
interesting and useful enough that our readers deserved to see it and we do not
|
|
assume by any means that everyone on the Phrack list is also a reader of
|
|
publications like Telecom Digest or Informatik.
|
|
|
|
Phrack's feature article in this issue is "The Complete Guide To The DIALOG
|
|
Information Network" by Brian Oblivion. Our undying gratitude to Mr. Oblivion
|
|
for his consistency in providing Phrack and its readers with entertaining
|
|
quality articles... and we're told that the best is yet to come.
|
|
|
|
Longtime fans of Phrack might recall that Phrack 9 had an article on Dialog
|
|
services and it also had an article on Centigram Voice Mail. Now 30 issues
|
|
later, both topics are resurrected in much greater detail.
|
|
|
|
You will also note that the Centigram article in this issue is penned under the
|
|
pseudonym of ">Unknown User<," a name that was adopted from the anonymous
|
|
posting feature of the Metal Shop Private bulletin board (the birthplace of
|
|
Phrack, sysoped by Taran King during 1985-1987). The name ">Unknown User<" has
|
|
traditionally been reserved for authors who did not wish to be identified in
|
|
any capacity other than to the Phrack editors. In this case, however, even the
|
|
staff at Phrack has absolutely no idea who the author of this file is because
|
|
of the unique way of SMTP Fakemail it was delivered.
|
|
|
|
No Pirates' Cove in this issue. Be watching for the next Pirates' Cove in
|
|
Phrack 40.
|
|
|
|
- - - - - - - -
|
|
|
|
Knight Lightning recently spoke at the National Computer Security Association's
|
|
Virus Conference in Washington, D.C. His presentation panel which consisted
|
|
of himself, Winn Schwartau (author of Terminal Compromise), and Michael
|
|
Alexander (chief editor of ISPNews and formally an editor and reporter for
|
|
ComputerWorld) was very well received and the people attending the conference
|
|
appeared genuinely interested in learning about the hacking community and
|
|
computer security. KL remarked that he felt really good about the public's
|
|
reaction to his presentation because "its the first time, I've agreed to be on
|
|
one of these panels and someone in the audience hasn't made accusatory or
|
|
derogatory remarks."
|
|
|
|
"It's inappropriate for you to be here."
|
|
|
|
This was the warm reception KL and a few others received upon entering the
|
|
room where the secret midnight society anti-virus group was holding a meeting.
|
|
It appears that a small number of anti-virus "experts" have decided to embark
|
|
on a mission to rid the country of computer bulletin boards that allow the
|
|
dissemination of computer viruses... by any means possible, including the
|
|
harassment of the sysops (or the sysops' parents if the operator is a minor).
|
|
|
|
At Phrack, some of us feel that there are no good viruses and are opposed to
|
|
their creation and distribution. Others of us (e.g. Dispater) just think
|
|
viruses are almost as boring as the people who make a carear out of
|
|
exterminating them. However, we do not agree with the method proposed by this
|
|
organization and will be watching.
|
|
|
|
- - - - - - - - - -
|
|
|
|
Special thanks for help in producing this issue:
|
|
|
|
Beta-Ray Bill Crimson Flash (512)
|
|
Datastream Cowboy Deluge
|
|
Dispater, EDITOR Dokkalfar
|
|
Frosty (of CyberSpace Project) Gentry
|
|
The Iron Eagle (of Australia) JJ Flash
|
|
Knight Lightning, Founder Mr. Fink
|
|
The Omega [RDT][-cDc-] The Public
|
|
Rambone Ripper of HALE
|
|
Tuc White Knight [RDT][-cDc-]
|
|
|
|
We're Back and We're Phrack!
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
HOW TO SUBSCRIBE TO PHRACK MAGAZINE
|
|
|
|
The distribution of Phrack is now being performed by the software called
|
|
Listserv. All individuals on the Phrack Mailing List prior to your receipt of
|
|
this letter have been deleted from the list.
|
|
|
|
If you would like to re-subscribe to Phrack Inc. please follow these
|
|
instructions:
|
|
|
|
1. Send a piece of electronic mail to "LISTSERV@STORMKING.COM". The mail
|
|
must be sent from the account where you wish Phrack to be delivered.
|
|
|
|
2. Leave the "Subject:" field of that letter empty.
|
|
|
|
3. The first line of your mail message should read:
|
|
SUBSCRIBE PHRACK <your name here>
|
|
|
|
4. DO NOT leave your address in the name field!
|
|
(This field is for PHRACK STAFF use only, so please use a full name)
|
|
|
|
Once you receive the confirmation message, you will then be added to the Phrack
|
|
Mailing List. If you do not receive this message within 48 hours, send another
|
|
message. If you STILL do not receive a message, please contact
|
|
"SERVER@STORMKING.COM".
|
|
|
|
You will receive future mailings from "PHRACK@STORMKING.COM".
|
|
|
|
If there are any problems with this procedure, please contact
|
|
"SERVER@STORMKING.COM" with a detailed message.
|
|
|
|
You should get a conformation message sent back to you on your subscription.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Table Of Contents
|
|
~~~~~~~~~~~~~~~~~
|
|
1. Introduction by Dispater and Phrack Staff 12K
|
|
2. Phrack Loopback by Phrack Staff 24K
|
|
3. Phrack Pro-Phile on Shadow Hawk 1 by Dispater 8K
|
|
4. Network Miscellany V by Datastream Cowboy 34K
|
|
5. DIALOG Information Network by Brian Oblivion 43K
|
|
6 Centigram Voice Mail System Consoles by >Unknown User< 36K
|
|
7. Special Area Codes II by Bill Huttig 17K
|
|
8. Air Fone Frequencies by Leroy Donnelly 14K
|
|
9. The Open Barn Door by Douglas Waller (Newsweek) 11K
|
|
10. PWN/Part 1 by Datastream Cowboy 30K
|
|
11. PWN/Part 2 by Datastream Cowboy 27K
|
|
12. PWN/Part 3 by Datastream Cowboy 29K
|
|
13. PWN/Part 4 by Datastream Cowboy 29K
|
|
|
|
Total: 314K
|
|
|
|
"Phrack. If you don't get it, you don't get it."
|
|
|
|
phracksub@stormking.com
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
Somebody Watching? Somebody Listening?
|
|
|
|
*** Special Announcement ***
|
|
|
|
KNIGHT LIGHTNING TO SPEAK AT SURVEILLANCE EXPO '92
|
|
Washington, DC
|
|
|
|
The Fourth Annual International Surveillance and Countersurveillance Conference
|
|
and Exposition focusing on Information Security and Investigations Technology
|
|
will take place at the Sheraton Premiere in Tysons Corner (Vienna), Virginia on
|
|
August 4-7.
|
|
|
|
The seminars are on August 7th and include Craig Neidorf (aka Knight Lightning)
|
|
presenting and discussing the following:
|
|
|
|
- Are law enforcement and computer security officials focusing their
|
|
attention on where the real crimes are being committed?
|
|
|
|
- Should security holes and other bugs be made known to the public?
|
|
|
|
- Is information property and if so, what is it worth?
|
|
|
|
Experience the case that changed the way computer crime is investigated
|
|
and prosecuted by taking a look at one of America's most talked about
|
|
computer crime prosecutions: United States v. Neidorf (1990).
|
|
|
|
Exonerated former defendant Craig Neidorf will discuss the computer
|
|
"hacker" underground, Phrack newsletter, computer security, and how it all
|
|
came into play during his 7 month victimization by some of our nation's
|
|
largest telephone companies and an overly ambitious and malicious federal
|
|
prosecutor. Neidorf will speak about his trial in 1990 and how the court
|
|
dealt with complex issues of First Amendment rights, intellectual
|
|
property, and criminal justice.
|
|
|
|
Security professionals, government employees, and all other interested parties
|
|
are invited to attend. For more information please contact:
|
|
|
|
American Technology Associates, Inc.
|
|
P.O. Box 20254
|
|
Washington, DC 20041
|
|
(202)331-1125 Voice
|
|
(703)318-8223 FAX
|
|
_______________________________________________________________________________
|