Copy Link
Add to Bookmark
Report

hwa-hn03

eZine's profile picture
Published in 
HWA
 · 26 Apr 2019

  

[42:65:67:69:6E]-[28:63:29:31:39:39:38:20:68:77:61:20:73:74:65:76:65]
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=
==========================================================================
= <=-[ HWA.hax0r.news ]-=> =
==========================================================================
¯`·>[=©HWA'99=]<·´¯ Number 3 Volume 1 Xmas Special'1998/99
==========================================================================

Sorry its late, there was some religious thing people were getting
all antsy about and THEN all this drunkenness and stuff started it was
quite strange really ... anyways here it is... - Cruci


sss
sssshoho
s ohohoho sss
s ooooooooooo AAs ss
(0) HHHH HHH WWW WW AAAAA ss
HH HH WW WW WW AA AA (o)
HHHHHHH WW WWWW WW AAAAAAAAA -
HH HH WWWWWWWWWW AA AA
HHHH HHH WWW WWW AAA AAA


-= H W A . H A X 0 R . N E W S C H R I S T M A S S P E C I A L =-

¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯

[] Which turned out to be the "New Years Special" but nevah mind []

kr4d!=31337

¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯




"I f*cking hate christmas, you know, its so fuc*ing commercialized
and I always get like f*cking cDc t-shirts and Linux CD's, it sux"


- BGates 12/17/98


¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯

"hope i can get this out before 1999... cripes its bigger than I
thought.. omigod its eating me ! arrgh get em off me get em off me!
uhm, anyway my apologies for the shabby layout of this issue, we were
all wasted on valerian root and ganesh sticks ...

- Ed (Slightly psychotic)

¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯



Synopsis
--------

The purpose of this list is to 'digest' current events of interest that
affect the online underground and netizens in general. This includes
coverage of general security issues, hacks, exploits, underground news
and anything else I think is worthy of a look see.

This list is NOT meant as a replacement for, nor to compete with, the
likes of publications such as CuD or PHRACK or with news sites such as
AntiOnline, the Hacker News Network (HNN) or mailing lists such as
BUGTRAQ or ISN nor could any other 'digest' of this type do so.

It *is* intended however, to compliment such material and provide a
reference to those who follow the culture by keeping tabs on as many
sources as possible and providing links to further info, its a labour
of love and will be continued for as long as I feel like it, i'm not
motivated by dollars or the illusion of fame, did you ever notice how
the most famous/infamous hackers are the ones that get caught? there's
a lot to be said for remaining just outside the circle... <g>


@HWA

¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯

OK. THATS AS CHRISTMASSY AS WE GET, 'NUFF SED AWK?

¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯`·¸¸·´¯


=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=
Welcome to HWA.hax0r.news ... #3
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=
Issue #3 ( The super /<ick <\ss Christmas Special or some shit ) Plik!
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=


"
Captain, I am not a merry man"

- Lt.Cmndr Worf, STTNG


[*]====[ Issue 4 Volume 1 to be released on or about Jan 13th 1999]====[*]


------+--+----------------------------------------------------------------
Key Content
------+--+----------------------------------------------------------------

Keys: use the keys to search for start of each section rather than using
regular numbers ... this may change but dats the way its at now so tfs.

0.0 ... COPYRIGHTS
0.1 ... CONTACT INFORMATION & SNAIL MAIL DROP (UPDATED) ETC
0.2 ... SOURCES
0.3 ... THIS IS WHO WE ARE
0.4 ... WHAT'S IN A NAME? why `HWA.hax0r.news'?
0.5 ... Cruciphux's bio (h0h0 and its true, erhm mostly.) <G>
0.6 ... HWA FAQ V1.0
A.L ... Nothing. (Just put here to deliberately annoy people. -Ed.)
1.0 ... Greets (!?!?!?)
1.1 ... Last minute stuff, rumours, newsbytes, malebag
1.1a .. www.ehap.org: The ongoing war against Pedophilia on The Net.
1.1b .. ALERT!: Chinese Hackers Sentenced to Death, LoU preps for war.
1.1c .. HWA mirrors Keen Veracity, the LoU hacking e-zine
2.0 ... From the editor
2.1 ... Email and Commentary
2.2 ... Tron's death (Chaos Computer Club member)
2.3 ... Santa in the nude?
2.4 ... Remember the Hong Kong Blondes? cDc takes their leave.
3.0 ... Santa's Dox *** HHN Exclusive!
3.1 ... Remote Explorer hits MCI *HARD*
4.0 ... Latest Web Browser Exploits (UPDATED - READER RESPONSE)
4.1 ... Cyber Army's Present, the Anonymizer source!
4.2 ... Windows Trojans Update & The New Remote Explorer NT Scare
4.3 ... Fucking Hostile and HWA get jiggy wit it over issue #2
5.0 ... l33t d00dz - by Flaming Cow
5.1 ... Anti-Antionline?
5.2 ... Bikkle gets the Pickle?
6.0 ... The Christmas Hax0r Flood
6.1 ... Latest exploits & hacks (13th)
6.2 ... Think Twice before becoming a Hacker Attacker!
6.3 ... Hack Your Head Instead! xtc, exctasy, mdma, etc ...
7.0 ... Hacking IRC'98 : Part 2: Crashing Eggdrop bots
7.1 ... Hacked Websites (Zillions of em!!)
A.0 ... APPENDICES
A.1 ... PHACVW linx and references (Xm4s Special Edition)

------+--+----------------------------------------------------------------

@HWA'98/99



0.0 (C) COPYRIGHT, (K)OPYWRONG, COPYLEFT? V2.0
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Important semi-legalese and license to redistribute:

YOU MAY DISTRIBUTE THIS ZINE WITHOUT PERMISSION FROM MYSELF
AND ARE GRANTED THE RIGHT TO QUOTE ME OR THE CONTENTS OF THE
ZINE SO LONG AS Cruciphux AND HWA.hax0r.news ARE MENTIONED IN
YOUR WRITING. LINK'S ARE NOT NECESSARY OR EXPECTED BUT ARE
APPRECIATED the current link is http://welcome.to/HWA.hax0r.news
IT IS NOT MY INTENTION TO VIOLATE ANYONE'S COPYRIGHTS OR BREAK
ANY NETIQUETTE IN ANY WAY IF YOU FEEL I'VE DONE THAT PLEASE EMAIL
ME PRIVATELY current email cruciphux@dok.org

THIS DOES NOT CONSTITUTE ANY LEGAL RIGHTS, IN THIS COUNTRY ALL
WORKS ARE (C) AS SOON AS COMMITTED TO PAPER OR DISK, IF ORIGINAL
THE LAYOUT AND COMMENTARIES ARE THEREFORE (C) WHICH MEANS:

I RETAIN ALL RIGHTS, BUT I GIVE YOU THE RIGHT TO READ, QUOTE
AND REDISTRIBUTE. - EoD


Although this file and all future issues are now copyright, some of
the content however holds its own copyright and these are printed and
respected. News is news so i'll print any and all news but will quote
sources when the source is known, if its good enough for CNN its good
enough for me. And i'm doing it for free on my own time so pfffft. :)

No monies are made or sought through the distribution of this material.
If you have a problem or concern email me and we'll discuss it.

cruciphux@dok.org

Cruciphux [C*:.]



0.1 CONTACT INFORMATION AND MAIL DROP
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Wahoo, we now have a mail-drop, if you are outside of the U.S.A or
Canada / North America (hell even if you are inside ..) and wish to
send printed matter like newspaper clippings a subscription to your
cool foreign hacking zine or photos, small non-explosive packages
or sensitive information etc etc well, now you can. (w00t)

Send all goodies to:

HWA NEWS
P.O BOX 44118
370 MAIN ST. NORTH
BRAMPTON, ONTARIO
CANADA
L6V 4H5

Don't bother staking it out it gets forwarded elsewhere from there
and others pick up the mail ;-)

Our email remains:

Submissions/zine gossip.....: hwa@press.usmc.net
Private email to editor.....: cruciphux@mobsters.com (* changing soon)
Distribution/Website........: sas72@usa.net

Phone number................: hahahaha uhm, no. maybe later thanks.
Fax.........................: see above.
Celfone?....................: Scan for it. the opto
Uhm pager? .................: no. Stop that! ^G
VMB.........................: How to irritate people w/John Cleese was on last
night, a jolly good shew no matter how often you've
seen it.

System fail much? ..........: Not usually no, hrm lemme see

12:10AM up 2 days, 11:49, 2 users, load averages: 0.04, 0.02, 0.00

12:20am up 1 day, 21:41h, 2 users, load average: 0.07, 0.13, 0.25

<snip>

Guh. oh ya, installed more hardware forgot .. bah. owell. ;-)

<snip>



@HWA'98

0.2 Sources ***
~~~~~~~~~~~

Sources can be some, all, or none of the following (by no means complete
nor listed in any degree of importance) Unless otherwise noted, like msgs
from lists or news from other sites, articles and information is compiled
and or sourced by Cruciphux no copyright claimed.

HiR:Hackers Information Report... http://axon.jccc.net/hir/
News & I/O zine ................. http://www.antionline.com/
News/Hacker site................. http://www.bikkel.com/~demoniz/
News (New site unconfirmed).......http://cnewz98.hypermart.net/
Back Orifice/cDc..................http://www.cultdeadcow.com/
News site (HNN/l0pht),............http://www.hackernews.com/
Help Net Security.................http://help.ims.hr
News,Advisories,++ ...............http://www.l0pht.com/
NewsTrolls (HNN)..................http://www.newstrolls.com/
News + Exploit archive ...........http://www.rootshell.com/beta/news.html
CuD ..............................http://www.soci.niu.edu/~cudigest
News site+........................http://www.zdnet.com/

+Various mailing lists and some newsgroups, such as ...

http://www.the-project.org/ .. IRC list/admin archives
http://www.anchordesk.com/ .. Jesse Berst's AnchorDesk

alt.hackers.malicious
alt.hackers
alt.2600
BUGTRAQ
ISN security mailing list
ntbugtraq
<+others>


NEWS Agencies, News search engines etc:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.cnn.com/SEARCH/
http://www.foxnews.com/search/cgi-bin/search.cgi?query=cracker&days=0&wires=0&startwire=0
http://www.news.com/Searching/Results/1,18,1,00.html?querystr=cracker
http://www.ottawacitizen.com/business/
http://search.yahoo.com.sg/search/news_sg?p=cracker
http://www.washingtonpost.com/cgi-bin/search?DB_NAME=WPlate&TOTAL_HITLIST=20&DEFAULT_OPERATOR=AND&headline=&WITHIN_FIELD_NAME=.lt.event_date&WITHIN_DAYS=0&description=cracker
http://www.zdnet.com/zdtv/cybercrime/
http://www.zdnet.com/zdtv/cybercrime/chaostheory/ (Kevin Poulsen's Column)

NOTE: See section 9.0 for more details on links.

Referenced news links
~~~~~~~~~~~~~~~~~~~~~

http://www.ottawacitizen.com/business/981211/2093909.html
http://www.zdnet.com/zdnn/stories/news/0,4586,2175287,00.html
http://www.zdnet.com/zdtv/cybercrime/features/story/0,3700,2175248,00.html
http://www.3xt.net/justin/ Another Agent Steal home page(?):

Submissions/Hints/Tips/Etc
~~~~~~~~~~~~~~~~~~~~~~~~~~
All submissions that are `published' are printed with the credits
you provide, if no response is received by a week or two it is assumed
that you don't care wether the article/email is to be used in an issue
or not and may be used at my discretion.

Looking for:

Good news sites that are not already listed here OR on the HNN affiliates
page at http://www.hackernews.com/affiliates.html

Magazines (complete or just the articles) of breaking sekurity or hacker
activity in your region, this includes telephone phraud and any other
technological use, abuse hole or cool thingy. ;-) cut em out and send it
to the drop box. Hell even a postcard would be cool, i'll scan em in and
stick em in a postcard section on the site heh. I like mail. It is your
friend. Spammers will be bumfucked by my pet doberman though. Or digitally
destroyed. so be warned. <sic>


- Ed



@HWA'98


0.3 THIS IS WHO WE ARE
~~~~~~~~~~~~~~~~~~
The only two people you need to know about at this time are sAs72
who does website maintenance and Cruciphux who does editorial.

sas72@usa.net ............. currently active
cruciphux@dok.org.......... currently active

* Formerly "
Who am we?" otherwise unchanged since last issue.
see the mini-bio on Cruciphux (next article) this issue (#3)

Who cares? (Version 2.0)
~~~~~~~~~~~~~~~~~~~~~~~~~

Revised Xmas 98
~~~~~~~~~~~~~~~

I do NOT work for the government in any shape or form other than
paying uh some of my erhm taxes...well most of it but fuck you
you don't need to know that. <sic>

Ok i'm still a noone and a nobody, but yeah I *was* a hacker, been
a cracker, ran a warez board (and a PD board) done some phone phun
etc .. but all in my teens and i've since started wearing a "
white
hat" (but it has little grey specks on it I must admit) and I am in
no way a "
master hacker/phreaker" not "leet". I'm just me, take it or
leave it, didn't want it, didn't need it, been there, done that ...
you guys have the reigns now and i'm deadly curious as to what you're
doing with them. Hell mail me for advice and shit if you want, i'll
help if I can. I'll respond to all verifiable emails. Maybe even some
aol.com's. <heh> I hear there's a new movie out "
You've got burned!"
or something? sounds cool gotta check that out...

If you're really curious and have "
mad sk1llz" you prolly know who I
am or could find out if you care so much, bfd. I've nothing to hide
go ahead, it might be fun. ;-) just don't come to my house to rag on
my ass coz badness may reign down upon you,and I have some heavyweight
friends <grin who doesnt you ask?> well we all die sometime if you
wanna go early, fine by me. <sic>

Version 1.0
~~~~~~~~~~~
I am noone, a nobody, I am not a phed or a narq, I could be you. I do
this for myself and some friends, you get something out of it too?
'whump, there it is'. Thats all there is to it, nothing more, Neither
am I a "
hax0r" or a "cracker" and hell if I were, you think i'd
broadcast it all over some crummy news sheet? heh, get over it, this
is meant to be a fun read, nothing more, so get reading. and if you ain't
smiling, you're taking things much too seriously. Keep hacking and stay
free ... w00t.

C*:.

"
Daddy. what does regret mean?"

"
Well son, the funny thing about regret is, that its better to regret
something you HAVE done, than to regret something that you HAVEN'T
done, oh and by the way if you see your mom this weekend tell her
... NFR!!!!"
- Orbital <slightly modified quote>


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-


0.4 Whats in a name? why HWA.hax0r.news??
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Well what does HWA stand for? never mind if you ever find out I may
have to get those hax0rs from 'Hackers' or the Pretorians after you.

In case you couldn't figure it out hax0r is "
new skewl" and although
it is laughed at, shunned, or even pidgeon holed with those 'dumb
leet (l33t?) dewds' <see article later in this issue) this is the state
of affairs. It ain't Stephen Levy's HACKERS anymore. BTW to all you up
and comers, i'd highly recommend you get that book. Its almost like
buying a clue. Anyway..on with the show .. - Editorial staff


0.5 Cruciphux's bio.¥ Dec 1998
~~~~~~~~~~~~~~~~~~~~~~~~~~

Part i: The basic shit
~~~~~~~~~~~~~~~~~~~~~~

Ok since so many people already tried hacking certain systems and
checked the phederal databases and tried to match my writing stylie
to other ppl i'll come clean with a little bit of 411 on my dox. k?

Time of birth......: Between 1964 and 1974 around 8:30am, I'm a Leo
Where..............: Great Britain (Or UK, England, whatever)
Why? ..............: Accidental, just sorta happened they didn't have
good condomz back then.
Are you a b4st3rd?..:Yes but not in the sense of birthright
Schooling?, uni etc?:Fuck schools, i'm self taught my teachers sucked.

Vitals:
Age...........: 16-36 Mentally:depends on context and day of
week: 12-52 (yeah thats in yrs smart ass..) ;)
Pyschological
profile.......: My phile is smaller than a phone book but bigger
than a 2600 mag

Thoughts on life..:"
You're cold a very long time so be hot while you can"
Favourite quote...:"
If you where any more full of shit you would have an
extra arsehole!" - Myself


Hardware owned: (Physically, partial list)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Commodore stuph (hey I was a kid, Wargames was da b0mb etc)
Vic-20, C16, C64, B128, C128, Amiga 500, Amiga 1000, Amiga 2000
IBM Clone XT, AT, 386, 486, AMD 5x86, Cyrix 6x86 150mhz

W00ten Asteroids arrived at the pinball arcade/bowling alley!!
guess who got to be the Asteroids king? hahaha prolly the last
year I ever really 'played' games, started writing em then got
bored with that real quick.. anyways ..

None of this stuph stayed stock for long, used to have the machines
(c64<>*128) etc nullmodemed together with a bogus kinda 'lan' thingy
that run in interpreter C= mode heh hell I remember paying $950
for a 7 meg (seven megabytes) HD for my C64 bbs and thought I kicked
ass. Oh yah I've run various bbs'es and even wrote one for the C=
machines INCLUDING the Vic-20 , someone said it couldn't be done so
i just HAD to prove the fuqr wrong. <g> NEC-V20 chips anyone?

Thats it. I had way more but that would be secret, hardware is kinda
like sex the more you have the more people know about you etc ..

;-)

Wierd machines: IBM RS6000, Ohio Scientific multi-processor 6502
Atari 2600, Coleco Adam, TI thingy, IBM wierdness from some bank
etc .. the Ohio Scientific was interesting, nice 17"
hd in there
and all the patients records were still on it... hrm. bing! ^G

=EoF
=null pointer assignment

Part ii: Computers 0wn3d: (the other kind of leasing to 0wn)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
*********************************************************************
* Disclaimer: *
* ---------- *
* All illegal activities on my part ended on 11:59pm of the date *
* of <insert your countries statute of limitations for minors here>.*
*********************************************************************

Uhm, well mostly .edu, some .gov two .mil, Motorolla, oh and I had
mad fun with Northern Telecom. this is all pre-1989 and thats all
i'm saying on this matter. I did NO damage at any time to any hw or
sw on any of the systems i entered.

Phone systems? (cool aren't they?)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Good for making fone calls with and confs, carding? not into it but
at least one of my friends went to juvi for in excess of $250k in
cc phraud. Several visits to dumb friends by security types got me
bored in confs pretty quick, much more interesting things to do and
see, especially now with cell and digital phones etc QSL?


Q: Do you have any hints for anyone? A:yes. and here they are:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Depending on your goals if you want to survive as a person of some
repute AND be active then good luck. Meanwhile as an ethical hacker
<coff> or security professional <sneeze> take these rules to heart
and memorize them, they're good, I wrote em. ;)

<grin>

note to self: stop smiling and grinning and shit so much
self: fuck u thats me,live with it
note to self: fine. see if I care.



POP QUIZ !
~~~~~~~~~~

Section 1

Q: Do you think you know what you are doing?
A: Yes - See rules #1, #2 and #3 (thats ALL of them for you AOL'ers)

Section 2

Q: Do you KNOW what you are doing?
A: See rules #2 and #3 but think about #1

Section 3

Q: Did you answer yes to #2 buy feel a tinge of guilt, fear, terror
or feel high? or a tingling in the thumbs or back of the neck?
A: You're lying. Start again or go to bed and come back tomorrow.
oh, and stop lying!

THE RULES
~~~~~~~~~
Rule #1: If its illegal and you're over <insert age> don't do it!!
Rule #2, Don't get caught!! <I didn't tell you to do it either!>
Rule #3. Did it and got away with it? well then wOOp for you, now
keep your fucking mouth SHUT noone likes or even believes
a braggart many people have been where you are now, its what
you do NEXT that counts the most

What do I do next?

That depends, perhaps in a future article ....

Q: Any parting comments? A: Yes
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Have a safe and happy whatever this December.

oh, and read the article on by xd0pEr in section 6.3
possibly also check out the cool pyschologicl profile of a hacker
engine (work in progress) at hrm forget the url, will look it up.

Q: Did you interview yourself for this 'bit' ??
A: These bytes you mean?, perhaps some of it but noone was looking...

Now piss off. ;-)

C*:.'98


@HWA


0.6 HWA FAQ v0.1 Dec 31st 1998/1999
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Q: Who the hell is Ed? I see - Ed. *EVERYWHERE* who is he/she!?!?!

A: We checked this issue out and indeed Ed is everywhere, people are
currently looking for this person coz noone can possibly be every
where at the same time, unless .. they are, could it be? gh0d???

Q: WTF is @HWA a copyright notice?

A: No. @HWA and @HWA'98 does not denote (c) 1998 its just a cool 'end of
article marker' thingy like some real mags have (Boot, now MaximumPC
Sysadmin etc ...) however the newsletter IS (c) 1998/1999 so pfft.

Q: Are you a girl or a guy?
A: NFC

Q: Are you gay?
A: None of your business, fuck off. I *am* happy however.

Q: What does AAM, EoF, EoD,NFC, NFR, PHAC, P/H/A/C/CC/CT/G/V/W, Plik!
and etc mean??
A: Check out your favourite search engine and do a search for those terms
like "phac meaning" etc (If you're from AOL remove the quotation marks
when you type that in, those are the two little dot things that seem to
hang in the air above letters, they look like skydiving sperm)

Some of the stuff related to personal useage and use in this zine are
listed below: Some are very useful, others attempt to deny the any possible
attempts at eschewing obfuscation by obsucuring their actual definitions.

!= - Mathematical notation "is not equal to" or "does not equal"
ASC(247) "wavey equals" sign means "almost equal" to. If written
an =/= (equals sign with a slash thru it) also means !=, =< is Equal
to or less than and => is equal to or greater than (etc, this aint
fucking grade school, cripes, don't believe I just typed all that..)
AAM - Ask a minor (someone under age of adulthood, usually <16, <18 or <21)
*AOL - A great deal of people that got ripped off for net access by a huge
clueless isp with seckurity that you can drive buses through, we're
not talking Kung-Fu being no good here, Buy-A-Kloo maybe?
EoC - End of Commentary
EoA - End of Article
EoF - End of file
EoD - End of diatribe (AOL'ers: look it up)
CC - Credit Card phraud
CCC - Chaos Computer Club (Germany)
NFC - Depends on context: No Further Comment or No Fucking Comment
NFR - Network Flight Recorder (Do a websearch)
PHAC - And variations of same <coff>
Phreaking, Hacking, Anarchy, Cracking, Carding (CC) Groups Virus, Warfare

Alternates: H - hacking, hacktivist
C - Cracking <software>
C - Cracking <systems hacking>
W - Warfare <cyberwarfare usually as in Jihad>
CT - Cyber Terrorism
TBC - To Be Continued also 2bc (usueally followed by ellipses...) :)
TBA - To Be Arranged/To Be Announced also 2ba

A.L AOL. "We're better than a shoe up the arse from Henry Rollins!" - Steve Case
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
AOL has even sparked a new movie along the lines of 'Sleepless in Seatle' or
was it 'Where Eagles Dare'? hrm.. anyway its called 'You should bail!' and
infers that everyone on AOL are morons and should dump AOL for a real ISP.
Be sure to check it out at your local theatres now (or soon). - Ed <- look
there the fuqr is again!

AOL - The Angry Overpriced Lamer network is one of the worlds largest
networks next to the one in my room, and runs of millions of
.007 BogoMIP 8086's with Nec V20 mods. But seriously check out
this url to see why you are being screwed:

<BeG> - Big evil grin
<bg> - Big Grin

Figure the rest out amongst yourselves, 'hack' the answer or try socialing
it out of someone on #hackphreak or #hax* etc ... (#irchelp works too)

http://www.aolsucks.com/ Why AOL sucks. Damn Good informative site.
it made ME drop MY 9e99 hacked accounts immediately <hahaha> no not
really. AOL is lame period.

Small excerpt from the site:


{

America Online - Your Security

America Online's service, designed originally to handle about 30,000 users, is now
serving millions. As a result, many of its flaws are coming out into the open -- one
of the most prominent has been AOL's almost nonexistant security. In this mirror
of the original AOL Security site, find out how it is that the AOL hacker
community knows more about the service than AOL itself.

AOL: A Spammer's Paradise

Virtually every AOL member wages a day-to-day battle with unsolicited
commercial junk mail. Is AOL doing all it can to stop its flow? Not a chance.
AOL equips its users with nearly useless mail filtering options which do nothing but
make spammers get a new domain name every day. In the process, AOL has
made it easier and easier for spammers to build junk mail lists, and has done
nothing to stop that "harvesting" beyond making it a TOS violation.

}

(TOS = terms of service - Ed)


EoA

TBC...

@HWA'99

0.7 Inspirations and turn ons / turn offs for 1998
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Inspirations / turn ons etc:


Official drink is .......... Coke Classic (obviously not Jolt)
Best album release ......... Celebrity Skin/Hole
Best music of the year ..... 'I think i'm Paranoid'/Garbage
'Pure Morning'/Placebo
'Dragula'/Rob Zombie
'Don't like the drugs..'/Marilyn Manson

Joke of the year............. "The Apple Imac"

`Turn ons':
~~~~~~~~~~~

Videos ..................... Pure Morning/Placebo
*!*@/Bif
*!*@/Hole
Garbage
Dragula/Rob Zombie
Dope Show/Marilyn Manson
Sparkle and Shine/Econoline Crush

IRC network ................ Eris Free net (EFnet)

TV ......................... Cable 87 (Rogers) ;-)
Matrix
7 Days
X-Files
The Net
vR.5
Fromage98 (and it isn't even on yet)

Movies ..................... X-files (Wow! a long episode)
Star Trek: Insurrection

Hacktivist Group ........... Zapatista's
Hacker ..................... Kevin Mitnick
Corporation ................ BMG (http://www.bmg.com/) nice site too.
godmart (Sandles, staffs Connection Machines etc)

"mega is just a short form for megamanic I guess" - Eatons Ad


`Turn offs':
~~~~~~~~~~~~

Videos ..................... Dunno, don't watch shit videos, only good ones.
.
IRC network ................ Uhm you know the one(s)

TV.......................... TV , just turn it off period.
Millennium, X-Files etc suck now most times
they can't stick to a story, think they have
ADHD.. hrm.
CNN (Ya nice war dickweeds)
Fromage98 (and it isn't even on yet)

Movies ..................... X-files (Wow! a long episode)
Star Trek: Insurrection

Hacktivist Group ........... Zapatista's

Hacker ..................... NFC

Corporation ................ Go on take a guess. hrm lessee there are so
many of em... Mircosloth and AOL will do tho.

NFC ........................ Bill Clinton's predickament
War on Iraq the sequel Desert Fox (Desert fox off)
Bombing Civilians


@HWA


1.0 Greets!?!?! yeah greets! w0w huh. - Ed
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Thanks to all in the community for their support and interest but i'd
like to see more reader input, help me out here, whats good, what sucks
etc, not that I guarantee i'll take any notice mind you, but send in
your thoughts anyway.


Special shoutouts to:

* Kevin Mitnick (what can I say? hang in there man.)
* demoniz
* The l0pht crew
* Weld Pond
* Ken Williams
* Dicentra
* Pyra
* Vexxation
* FProphet
* TP
* The NeMstah Meistah
* sAs72
* R.Stevens (hi, nice house Robby!!)
* V.D
* D.B
* all the people who sent in cool emails and support
* Me, myself and I and everyone who reads this for whatever reasons.

+ http://www.l0pht.com/
+ http://www.2600.com/
+ http://www.legions.org/
+ http://www.genocide2600.com/
+ http://www.hackernews.com/ (Went online same time we started issue 1!)


Prolly more next time. ;-) have to get ppl's ok first <grin> you know
who you are fuqrz. heh. PliK!

Fuck off's to: Those certain turn-coats and double dealing scumbags,
you know who you are and what goes 'round comes round. Hi Jay! wtf
you doing reading this?? fuck off!


"I f*c!<ing hate krad l33t sp3ak and b4nners but wtf its kinda fun"
- Anonymous

Well seems some of my friends like what i'm doing and are offering some
of their resources to help things along, some server space new emails and
a place to try out stuff on our local lan safely and uh legally <g> will
now be easier and more fun. Hell we even have a PoBOX snail mail address
that has been graciously 'donated' to us, so send in those post cards and
photos of your leet xmas private h0h0 con's etc ... ;-)

See section 0.4 for our mail drop.

@HWA'98/99


1.1 Last minute stuff, rumours and newsbytes
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


+++ Keen Veracity has released issue #6, check it out
I got mine from a site off the main page at Bikkel,
it wasn't available on the site listed and LoU is
renovating so ...

Come get it here:
http://members.tripod.com/~hwa_2k/keen.html

+++ From 100% Pure Bikkel:

Hacker gets hacked
update by demoniz at Dec 28 , 12:25 CET

LoRD OaK, the 'hacker' who defaced CyberArmy recently tries to keep
the dispute between him and the webmaster of CyberArmy alive. He
wrote 100 % Pure Bikkel: "I donno if it matters or not, but if you go
to cyberarmy's webpage, it says the source was being "
handed out" by
someone. That someone is me and the webpage it was located at is
www.confine.com under CGI-Warez. Also their script was already
copyrighted and it is the EXACTLY the same script like word for word."

No script at Confine.com, but a hacked site. One who hacks, gets
hacked.

Archive of the site is available at http://hacknews.bikkel.com/

** Confine Web site http://www.confine.com

** When I tried reaching this site on the 28th at 12:01 EST it
was unreachable - Ed


Text reads (formatting not preserved, see Bikkel's archive):

" Milw0rm, this site was hacked f0r a reas0n. One 0f are small
time friends n0t stating any names was hacked by a s0 called l0rd
0ak. the wrath will be felt. give sh0t 0uts to all my br0ther's in
milw0rm and als0 t0 kingdem0ni0

hacked by milw0rm J.C."


** 01:00am EST Friday i'm too busy. & a tad tired, so threw the rest
of the zine together at the last minute as usual and tossed it up
on the web. See you on the 13th... now to send the word out..
and back to work on issue #4 <bg>



@HWA'98

1.1a WWW.EHAP.ORG
~~~~~~~~~~~~

EHAP stands for Ethical Hackers Against Pedophilia. Watch for a
feature article on this organization in an upcoming issue. I just
wanted to put this in this issue coz while some people are sitting
around the xmas tree opening prezzies that santa left them, somewhere
someone is being buggered or sodomized. That act is then being
photographed, scanned and spread on the net. This must be stopped.
And EHAP has some ideas on how to do just that. - Ed

From http://www.ehap.org main page December 31st 1998:

12.02.98 Japan criticized for slack policing of Internet CP

December 02, 1998

TOKYO -- Hundreds of pornographic images of children flood
Internet sites with addresses ending in "jp." It's a tip-off that they
originate in Japan -- and that there is basically nothing officials can
do about it. With no laws explicitly banning child pornography, Japan
has acquired the dubious distinction of being the global leader in the
fast-growing Internet child pornography business. Japanese police
say there are about 1,200 commercial child pornography Internet
sites in Japan. Some feature photos of children from Japan, others
of Southeast Asian children. Keiji Goto, a senior official at the
National Police Agency, said police are frustrated by cases in which
they identified the source of a pornographic site but were unable to
take further action.

Full story:
http://detnews.com/1998/technology/9812/02/12020238.htm


1.1b CHINESE HACKERS/CRACKERS GET DEATH SENTENCE!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

December 28th 8:55am PST
Story sourced from:: Wired News
http://www.wired.com/news/news/email/explode-infobeat/politics/story/17039.html

CHINESE CRACKERS GET DEATH SENTENCE

Editor Comments:

Just picked this up by Wired News ... not a nice story for this "xmas
special"
Is this what the world is coming to? some countries don't fuck
around with ANY sort of anti-government sentiment, this is a classic example
especially to 'the newbie contingent' to be damn sure you KNOW WHAT YOU'RE
GETTING YOURSELF INTO and be sure to cover your ass/tracks or you may get
something pushed up there, or even worse, be terminated

<bang><bang<bang>

USERS TERMINATED BY FOREIGN HOST

The Story:
Chinese Crackers Get Death (Reuters 8:55 a.m. 28.Dec.98.PST)

SHANGHAI, China -- Two crackers who broke into a bank computer network
and stole 260,000 yuan (US$31,400) have been sentenced to death by a court
in eastern China, the official Wenhui Daily said on Monday.

Hao Jinglong, formerly an accountant at the Zhenjiang branch of the
Industrial and Commercial Bank of China, was condemned to death, as was his
brother, Hao Jingwen, the newspaper said. The Yangzhou Intermediate Court
in Jiangsu province also confiscated 40,000 yuan from Hao.

The two opened 16 accounts under various names in a branch of the bank in
September and later broke into the branch to install a controlling device
in a bank computer terminal, the newspaper said.

They used the device to electronically wire 720,000 yuan in non-existent
deposits into the bank accounts. Afterward, they successfully withdrew
260,000 yuan from eight different branches of the bank, the newspaper
said.

All the money has since been recovered, the newspaper said, without giving
further details.

Copyright© 1998 Reuters Limited.

[EoA-1]


Source: http://www.humanrights-china.org/
Contrib: Ed

Two sentenced for subverting state
Author: <unknown>

THE Chinese courts yesterday sentenced two men convicted of subverting
state power to 13 and 11 years in prison respectively. Xu Wenli, a
Beijing resident, and Wang Youcai, of East China's Zhejiang Province,
also received a three-year deprivation of their political rights from
the Beijing No 1 Intermediate People's Court and the Intermediate
People's Court of Hangzhou, capital of Zhejiang.

Both Xu and Wang previously served prison terms in China.

In an open trial yesterday, the Beijing No 1 Intermediate People's Court
found that in November this year, with the purpose of subverting state
power, Xu secretly planned the founding of the so-called "Beijing and
Tianjin Regional Party Committee of the China Democratic Party,"

formulated this illicit organization's constitution, and served as its
chairman.

The court also found that Xu made efforts to recruit party members,
planned to convene a national party congress, and sought and accepted
funds from some hostile overseas organizations in order to organize, plan
and conduct subversive activities.

It was also proven by court investigation that from November 1997 to April
1998, Xu used various means to stir up subversive activities. After hearing
opinions from the prosecutors and the defence, the court ruled that in
accordance with relevant stipulations in China's Criminal Law, Xu's
activities constituted the crime of subverting state power, and he should
be punished according to law as both a principal element in the case and a
recidivist.

In an open trial in Zhejiang, the Intermediate People's Court of Hangzhou
found that in June this year, with the purpose of subverting state power,
Wang secretly planned to found an illicit organization called the "China
Democratic Party,"
formed a "Zhejiang Preparatory Committee for the China
Democratic Party,"
and formulated a party constitution and a declaration.

The court also found that in order to organize, plan and conduct subversive
activities, Wang contacted some hostile overseas organizations, from which
he sought and accepted financial support.

After hearing the opinions of the prosecutors and the defence, the court
ruled that in accordance with relevant stipulations in China's Criminal Law
Wang's activities constituted the crime of subverting state power, that the
crime was severe, and that he should also be punished as a recidivist.

Xu and Wang families and people from various walks of life attended yesterday's
court hearings. (Xinhua)

Date: 12/22/98
Author:
Copyright© by China Daily

[EoA-2]


1.1b LoU declares war ,,,just do it right guys.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

From HNN http://www.hackernews.com/


" War declared on China and Iraq "


contributed by Legion of the Underground
In a very heated and emotional discussion Legion of the
Underground declared cyber-war on the information
infrastructure of China and Iraq last night. They cited
severe civil rights abuses by the governments of both
countries as well as the recent sentencing to death of
two bank robbers in China and the production of
weapons of mass destruction by Iraq as the reasons for
their outrage.

Quoting from the Declaration of Independence about the
right of the people to govern themselves and stating
that the US government will probably stand idly by while
these atrocities happen in other countries the Legion of
the Underground called for the complete destruction of
all computer systems in China and Iraq.

"The Government controls what goes into our mouths
lets not let them do the same with what comes out!"

said one LoU member during a press conference held on
IRC Monday night.

LoU mentioned that they may seek out assistance in
their war from the Hong Kong Blondes. The HKBs are a
well known group attempting to cause mayhem on
China's internetworks from within the Iron Curtain. The
HKBs where trained and assisted, until recently, by the
infamous Cult of the Dead Cow hacking group.

Legion of Underground gained previous notoriety back in
October for defacing the Chinese Human Rights web site
a day after it went online.

Legions of the Underground
CNN - article on bank robbers sentenced to death
http://www.cnn.com/WORLD/asiapcf/9812/28/BC-CHINA-HACKERS.reut/

[EoA-3]

Read the Wired News coverage its better but here's part of CNN's
Reuters blurb:

China sentences hackers to death for
bank theft

December 28, 1998
Web posted at: 3:09 AM EST (0809 GMT)

SHANGHAI, China (Reuters) -- Two hackers who broke into a bank
computer network and stole 260,000 yuan (31,400) have been sentenced to
death by a court in eastern China, the official Wenhui Daily said on Monday.

...

They used the device to electronically wire 720,000 yuan in non-existent
deposits into the bank accounts. Afterwards, they successfully withdrew
260,000 yuan from eight different branches of the bank, the newspaper said.

...

Copyright 1998 Reuters. All rights reserved.

** "This material may not be published, broadcast, rewritten, or redistributed"

[DoA-2]

** ok, i'll just note some of it then ... - Ed ;-)


HWA Comments:
~~~~~~~~~~~~~

Great fun, glad i'm not living in China, give these fuckers some shit guys!
take the damn infrastructure down. We can NOT let this sort of thing go on
Kevin Mitnick gets 3yrs with no trial and China is fucking killing people,
this is now open cyber-war. Thats what they want?, thats what they're going
to get.

Prepare for armageddon. Is an electonic world war imminent?
- Ed


http://www.humanrights-china.org/

@ HWA'98

1.1c HWA Mirrors Keen Veracity
~~~~~~~~~~~~~~~~~~~~~~~~~
The site had me going for a bit there, most amusing, we thought you'd been
hacked for like 25ms, anyways theres an insiduous hack for you, put that on
a real hacked page and ppl will think ah, sysadmin's just having some fun..
hrm. And my Santa's Credit Report section is from a real cc report too. :)


http://members.tripod.com/~hwa_2k/keen.html

Jan 1st 1999
~~~~~~~~~~~~

http://www.legions.org/

The LoU site greeted users with the following screen:

<snip>

Welcome

to the Legions of assistance for Sick, and disfunctional children. We are currently working side by side with the Feed the Children Foundation aswell as The
Childrens Hospital Network. Our site is under construction. Please check back soon...

Please visit one of our Sponsors: Childrens Hospital Feed the Children

We are a non-profit organization

Read the source, and you shall be FREE!

<snip>


With links to
http://www.childrenshospital.org/
http://www.feedthechildren.org/

The relevant section in the source was this:

<!---this is actually a ploy. Legions is here and still in effect, and
as soon as we finish our new site we'll be back at ya.. LoU--->

FYI "<!--" is a comment line that most browsers not still in the stoneage
recognize as a 'hide this text' tag. - Ed


@HWA'99


2.0 From the editor:
~~~~~~~~~~~~~~~

START
~~~~~

This file is much too big and sort of wanders around a bit, sorry
about this i've been gathering info as per usual and sometimes its
difficult to 'hold on' to some material for later release. Anyway
I hope you enjoy this issue, and bear with us while we try and get
things organized into an effective well tweaked digest.

Oh ya, happy new year... and best of whatever you celebrate to those
celebrating this December. I know Orthodox Macedonian Christians
celebrate on Jan 7th as the birth of Christ since they use a different
calendar but there I go wandering again, its late, or early and time
to shut this baby down. ttys... next issue Jan 13th 1999. l8z.

- Ed


Congrats, thanks, articles, news submissions and kudos to us at the
main address: hwa@press.usmc.net complaints and all nastygrams and
mailbombs can go to /dev/nul nukes, synfloods and smurfs to 127.0.0.1

danke.

C*:.


@HWA'98/99

2.1 Email and commentary
~~~~~~~~~~~~~~~~~~~~
<deleted> Time constraints, its a 'special' y'know ... - Ed


2.2 Update on the death of Tron of the Chaos Computing Club (Germany)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This is very old and tragic news but we have been waiting for the
"official" results of the CCC's investigation to be released before
getting into any real detail on this topic. Tron was one the best
and most respected hackers in Europe.

Wired has this story:

Source: Wired News Site
Author: David Hudson
Email :dwh@berlin.snafu.de
Contrib: Ed


Berlin Prepares for Chaos
by David Hudson


3:00 a.m. 24.Dec.98.PST
BERLIN -- When Germany's legendary Chaos Computer Club convenes here
on Sunday for its 15th Congress, the atmosphere may be more emotionally
charged than it has been in years.

The CCC's annual meeting between Christmas and the new year has been a
holiday tradition since the early 1980s, when hackers and hobbyists
would show up to trade tips and passwords. Last year, over 1,500
converged on a humble school building in Hamburg for three days of hacking
workshops, and lectures on topics ranging from lockpicking to social
engineering to the history of German Net culture.

Late in October, however, one of the CCC's most accomplished hackers,
Boris Floricic, who had taken the name Tron, was found dead, hanging from a
belt strung from a tree in a Berlin park. He was 26.

(This sounds like auto-erotic asphyixiation to me but that could be
staged and the Police would know this too... - Ed )

The mysterious and as yet unsolved case is eerily reminiscent of the death
of another CCC associate, Karl Koch, nearly 10 years ago. Indeed, Berlin
police were quick to call Tron's death a suicide, as Koch's had been. But
the CCC, as well as Tron's family and friends, have vehemently denied that
suicide was even remotely in his nature.

Unlike Koch, Tron was not only a well-balanced personality but also a
brilliant hacker. He was the first European to hack phone cards so that
they could be used freely and forever, and had figured out a way to make
ISDN phone calls tap-proof.

"Often, he was the focus of attention," remembers Heinrich Seeger, a
Hamburg journalist who has covered many CCC congresses. "I guess one of
the reasons for that, aside from his undebatable genius and expertise,
were his good looks and his charm, which made him stand out."


Despite ruling the death a suicide, Berlin police have assigned eight
officers to investigate, noting more than a few oddities about the case.
Although Tron appeared to have hanged himself, for example, his feet were
firmly on the ground. German newspaper and television reports have suggested
that considering the potential value of Tron's knowledge of smartcards and
telephony, organized crime may have been involved.

Two hours are slotted on the very first evening of this year's CCC Congress
for a presentation of what is known about the case, as well as a discussion
of the dangers in cracking valuable secrets. "We know the police will be there,
but they won't be presenting any information,"
says CCC spokesman Andy
Mueller-Maguhn. "Our position has always been not to do or say anything that
would hinder their investigation."


Nevertheless, given the CCC's firm and publicly stated conviction that Tron
was murdered, the evening session will hardly be a dispassionate one. "I'm
anxious to know if the CCC's version of his death differs substantially from
the police's,"
says Seeger.

The CCC had already planned to convene in Germany's future capital rather
than Hamburg before Tron's death, but now, with the fact that Berlin was also
his hometown, this Congress promises to be more intense and more somber than
the others preceding it.

EoF

Go to the Wired site for related links in the mainstream media
on this and other related stories.

If you have any further hints or tips or sources to offer please do so
also i'd like to request any news paper clippings from outside the US and
Canada to be sent to our new snail mail drop (Postal Box), much appreciated.

Thanks - Ed

@HWA


2.3 See SANTA nude.
~~~~~~~~~~~~~~~
The link is on my site, check it out, hint SiN has something to do
with it. <BeG> <- thats big evil grin for those not in the know.

Not there anymore? no prob check here:
http://members.tripod.com/~hwa_2k/santa-sin.gif

2.4 The cDc severs all connections with the Hong Kong Blondes.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From http://www.hackernews.com/

Sorry Source of this is unknown: Think it was some little no-name
place like CNN or Wired or something....

Background article:
WHO are the Blondes anyway?
Author: Arik Hesseldahl (c) 1998 (?)

Hacking for Human Rights?
by Arik Hesseldahl

9:15am 14.Jul.98.PDT
The reclusive leader of a Chinese hacking group
that last year claimed to have temporarily disabled
a Chinese satellite is now forming a new global
hacking organization to protest Western
investment in the country.

In an interview with the Boston-based hacking
collective, the Cult of the Dead Cow, the hacker,
who calls himself Blondie Wong, said the new
group is forming in the US, Canada, and in Europe
to take up the cause of fighting human rights
abuses in China.

Wong, a dissident astrophysicist living in Toronto,
said that the new group -- known as the Yellow
Pages -- plans to target companies doing
business with China, and possibly attack their
computer networks.

"Many of these companies have computer
networks and there are a lot of members in the
Yellow Pages who have excellent hacking skills,"

Wong said.

The interview was conducted by a former United
Nations consultant known only as Oxblood Ruffin.
The group provided Wired News with an advance
copy of the interview.

In the interview, Wong seemed unconcerned about
any damage or monetary losses that might result
from a network attack carried out by the Yellow
Pages.

"Human rights is an international issue, so I don't
have a problem with businesses that profit from
our suffering paying part of the bill,"
he told
Oxblood.

As leader of the Hong Kong Blondes hacking
group, Wong has the credentials to back up his
threats. With members operating inside and
outside of China, the Hong Kong Blondes claim to
have found significant security holes within
Chinese government computer networks,
particularly systems related to satellite
communications.

The group claims it first announced itself to the
government in Beijing last year by temporarily
disabling a Chinese communications satellite -- an
incident never confirmed by the Chinese
government.

Since then, the group has threatened to cripple
certain Chinese military and security networks if
human rights issues in China reach what they
decide is a critical point.

Members of the Cult of the Dead Cow said that the
organization began advising the Blondes on strong
encryption and network intrusion at the annual
"Beyond Hope" hacker conference held in New
York last August.

In the interview, Wong details how he saw his
father stoned to death by members of the Chinese
Red Guard during the Cultural Revolution, the
period of political chaos that engulfed China during
the 1960s and '70s.

Later, as a student attending an unspecified
university in the Great Britain where he was
studying to become a teacher, Wong describes
watching televised images of the 1989 massacre
at Tiananmen Square.

"When the tanks went into the square and began
shooting and running over people, it was like I was
a little boy again, watching my father being killed,"

he told Oxblood.

Wong claimed that the Hong Kong Blondes has
doubled in size, with 42 active members operating
in China and other countries. Many of the group's
newest members are Chinese government
employees, whom Wong describes as "technical
people."


One member, a female hacker known as Lemon
Li, was detained earlier this year and has since
been moved to Paris with the help of a group
Blondie described only as "a group of people even
more outside the law than we are."
The same
group provides Wong with an armed escort
wherever he goes.

The interviewer, Oxblood, said he knows little
about the origin or membership of the Yellow
Pages, other than that the organization was
founded recently by students at Cal Tech.

"Blondie wants anyone who agrees with the
strategy of attacking American companies doing
business in China to get involved,"
Oxblood said.
"So starting new chapters is really up to whoever
gets inspired, making membership open to
anyone."


Sun Microsystems, Lucent, Motorola, Yahoo, and
Excite are among a growing number of American
companies active in China.

As for any current or future activities of the Hong
Kong Blondes, Oxblood said the group has been
patiently watching and waiting.

"They have gotten to the point where they can
pretty much hack everything that is up and
running. [Wong] is pretty tight-lipped about what
he's got planned. I would say though, that the
Blondes have the capacity to snap the backbone
of the Chinese end of the Net."




3.0 Dec 22nd: SANTA'S CREDIT INFO SPREAD BY DISGRUNTLED ELF
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Just before Christmas this year HWA has learned that due to layoffs at
the prestigious Santa's North Pole Workshop (SNPW)


*** leetguy has changed the topic on channel #leetchan to HWA.hax0r.news Christmas issue will have Santas
+credit info & dox!


SANTA'S TRW (EXPERIAN) CREDIT DOX - Submitted by s4ntaSUx (A. Disgruntled Elf)

************************** TRW CONSUMER CREDIT REPORT **************************
* consumerinfo.com *
* Ref: 100000001 *
***************** Dept: CUSTOMER SERVICE / Queued by: SUPERVISOR ***************

DATE:06-30-1997 TIME:13:13:43 SUBJECT ID:

CONSUMER,SANTA N CLAUS
AA-10777 N POLE ST/NORTH POLE AA 11209;
U-CONSUMERINFO,T-01,V-06/999/8.00,H-Y;

PAGE 1 DATE 22-12-98 TIME 23:13:34 PCB29 V401 TCA7

SANTA NICHOLAS CLAUS SS: ###-##-#### E: ELF EMPLOYED
XXX N POLE ST ###-##-####* XXXX E POLE ROAD
NORTH POLE AA 11209-1234 ###-##-####* SOUTH POLE
RPTD: 11-94 TO 3-97 U 3X YOB: 1731 RPTD: 3-1792 I
LAST SUB: #######
E:BELL ATLANTIC
*2600 BOWSER ST 12 111 MAIN STREET
LOS ANGELES CA 90017-9876 BURBANK CA 91503
RPTD: 2-92 I RPTD: 10-90 TO 2-91 I

*SANTA CLAUS, SATAN CLAUSE, JACK D RIPPER

------------------------------ PROFILE SUMMARY -------------------------------
CNT 04/01/01/20
PUBLIC RECORDS-------3 PAST DUE AMT------$956 INQUIRIES---3 SATIS ACCTS---2
INSTALL BAL----$30,630 SCH/EST PAY-----$1,431 INQS/6 MO---2 NOW DEL/DRG---2
R ESTATE BAL-------N/A R ESTATE PAY-------N/A TRADELINE---5 WAS DEL/DRG---1
REVOLVNG BAL-------$50 REVOLVNG AVAIL-----96% PAID ACCT---1 OLD TRADE--1-68

  
------------------------------- PUBLIC RECORDS -------------------------------
*SO CALIF DISTRICT COURT 11-20-92 12-01-93 3011111 $12,450 CO LIEN REL
C#: 45078321 1 BP: B476P2109

*COUNTY SPR CT SANTA ANA 2-19-92 3019999 $1,200 CIV CL JUDG
D#: 7505853 1 PLAINTIFF: ALLIED COMPANY
BP: B1234P50987

*U S BANKRUPTCY COURT 6-10-91 3009999 $8,500-L BK 13-PETIT
D#: 35054539906234561 2 $100,000-A VOLUN

----------------------------------- TRADES -----------------------------------
SUBSCRIBER OPEN AMT-TYP1 AMT-TYP2 ACCTCOND PYMT STATUS
SUB# KOB TYP TRM ECOA BALDATE BALANCE PYMT LEVEL MOS REV PYMT HISTORY
ACCOUNT # LAST PD MONTH PAY PAST DUE MAXIMUM BY MONTH

*CREDIT AND COLLECTION 9-96 $500-O COLLACCT
####### YC UNK UNK 2 4-05-97 $250 9-95 (20) 9999999999999
############ 9999999
ORIGINAL CREDITOR: DR. JOHN KILDARE

HEMLOCKS 2-96 $900-L $500-H CLOSED CURR ACCT
####### DC CHG REV 3 6-01-96 $0 2-96 (17) BNCCCCCCCCC-C
############# CNNC

*MOUNTAIN BK 3-94 $43,225-O OPEN 30 3 TIMES
####### BI SEC 60 2 5-17-97 $19,330 5-97 (39) 1CCCCCC1CCCCC
###################### 4-97 $956 $956 2-95/1 CCCCCCCCCCCC
###############

*BAY COMPANY 1-68 $1,400-L $1,200-H OPEN CUR WAS 90
####### DC CHG REV 3 5-16-97 $50 3-97 (99) C0C321CCCC000
######### 3-97 $10-E CCCCCCCCCCCC
**ACCOUNT WAS IN DISPUTE-NOW RESOLVED-REPORTED BY SUBSCRIBER**

CENTRAL BANK 12-94 $22,350-O OPEN CURR ACCT
####### BI AUT 48 1 6-15-97 $11,050 12-94 (31) CCCCCCCCCCCCC
########### 5-97 $465 CCCCCCCCCCCC
COLLATERAL: 1995 FORD TAURUS

--------------------------------- INQUIRIES ----------------------------------
HEMLOCKS 5-05-97 ####### DC
BAY COMPANY 5-03-97 ####### DC $1,500 CHG REV
HILLSIDE BANK 3-21-96 ####### BC

--------------------------------- MESSAGES -----------------------------------
SSN MATCHES


IF YOU FEEL THERE ARE INACCURACIES IN YOUR EXPERIAN CREDIT REPORT, CALL
TOLL-FREE 1 (800) 567-5470. THE EXPERIAN CUSTOMER SERVICE REPRESENTATIVE
WILL ASK YOU FOR YOUR MEMBERSHIP NUMBER, AND YOU SHOULD RESPOND WITH, "THIS
IS IN REGARD TO MY CONSUMER REVIEW SERVICE REPORT."
THE REPRESENTATIVE
WILL THEN PROMPTLY ASSIST YOU.



END -- EXPERIAN



3.1 Dec 21st: REMOTE EXPLORER NT VIRUS/TROJAN HITS MCI
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

MCI was hit by a new virus targetted presumeably only at NT systems
called the Remote Explorer..Dec 21st

Contributed by: Dicentra
Also contrib'd by others but not all the same stories...

Thanks Dice for coming up with the best/most details for me,

http://www.nai.com/products/antivirus/remote_explorer.asp ($$)
Main site: http://www.cnn.com/
Section: http://www.cnn.com/TECH/
Story: http://cnn.com/TECH/computing/9812/22/ntvirus.idg/index.html



Update: Tuesday, 22 Dec 98, 04:53:29 PM EST

"MCI WorldCom network virus may be inside job"

A new strain of computer virus that attacked MCI WorldCom's internal
business network of NT servers may have been started by a disgruntled
employee, MCI WorldCom has acknowledged.


-=[ Full Story Below ]=-


MCI WorldCom network virus
may be inside job

Telecom giant calls in Network Associates' emergency response team to
stop virus from spreading.

(Updated) December 22, 1998 Web posted at: 4:10 PM EST

by Ellen Messmer

(IDG) -- A new strain of computer virus that attacked MCI WorldCom's
internal business network of NT servers may have been started by a
disgruntled employee, MCI WorldCom has acknowledged.

The company, which is in the midst of layoffs, said they are
investigating the possibility of an inside job. The strain, which is
believed to be the first NT-hosted virus, was first detected last
Thursday. It corrupts files and encrypts data, making them unreadable.

MCI WorldCom spokesman Jim Monroe, who declined to offer much detail
about the virus attack, claimed that it "has had no serious impact on
MCI's ability to deliver service to its customers."
However, Network
Associates, whose antivirus emergency response team was called in to
help MCI WorldCom with the incident, said that the virus, dubbed Remote
Explorer, wreaked havoc on files in hundreds of desktop computers
connected to MCI's large NT-based network.

"We've never seen anything like this in 10 years of doing business,"
said Peter Watkins, general manager in the security division at Network
Associates, about Remote Explorer's modus operandi. Network Associates
believes it is the first totally NT-hosted virus that spreads by
exploiting a network's features in order to corrupt files or lock them
up through encryption. Weighing in at 125 kilobytes, the virus acts like
a network administrator run amok. In fact, the artfully crafted virus was
probably deployed on an NT server within the unlucky organization by an
inside employee, say Network Associates experts still studying the case.
But it remains unclear whether Remote Explorer can penetrate an organ-
-ization without inside help or if this malicious code is yet up on
hacker Web sites.

"This is a very sophisticated virus written by a knowledgeable person
familiar with business processes,"
explained Vincent Gullotto, manager of
the Network Associates antivirus emergency response team. "It's the
first NT-hosted virus we've seen, and the virus uses the network to spread
into the NT programs."


Remote Explorer, which has to somehow be installed in the NT driver
subdirectory, acts like an NT remote management monitor, sits in on
sessions, gathers data and impersonates a network administrator, Gullotto
said. "The virus emulates a network administrator and gives itself as many
rights as it can."
The virus is intrinsically different from any other
virus spotted before because it doesn't spread through more traditional
means, such as floppies, or through e-mail as macro viruses do.

"If you discover it, it won't let you get rid of it by just shutting
it off,"
Gullotto warned. The virus, formally called 4.03r.sys, carries
a Microsoft DLL with it, and if you try to delete it, it simply creates
another DLL. The Remote Explorer virus corrupts HTML and other types of
files through data-compression routines or encrypts them so they can't be
read. It does not, however, appear to actually delete the files it attacks
or to cause other mischief, such as reformatting a hard drive.

The virus was designed with a time routine that causes it to do damage
between 3 p.m. and 6 a.m., as well as all day Saturday and Sunday-times
when few people may notice it on a binge.

"It corrupts data so it's not usable, but we have developed a cleaner to
cope with this,"
Gullotto noted. Network Associates is updating its
VirusScan product with an antidote to counteract the virus's damage.
Network Associates believes its antidote will even "make the system immune
from it,"
Gulloto added. The antidote will restore files and decrypt files
that were encrypted by Remote Explorer's 608-bit encryption component.

Remote Explorer doesn't appear to infect Unix or spread through Unix,
though Network Associates is still running tests on a variety of Unix
platforms before it issues a final determination.

Ellen Messmer is a senior editor at Network World.


(From CNN)

But wait! theres more! ...

From HNN http://www.hackernews.com/
New NT virus spreads via NT networks
contributed by Weld Pond (To HNN)

So Back Orifice wasn't enough of a potential trojan
wake up call to corporate America running their critical
business apps on NT networks. Most companies and
most NT administrators don't understand security well
enough to effectively secure their networks. UNIX
admins know not to run untrusted software as root. Do
NT admins think about this or are they running the
lastest email attachment their buddy from college sent
them?

Everyone has this story:

<snip>

Check out this funny quote from the CNET story: 'This
means Windows NT is a very large target of opportunity
now,' Dietz said. 'We have to make the leap of faith
that attackers are as good as a certified NT
administrator.'

<snip>


@HWA


3.2 The REAL reason we are on Internet Relay Chat
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Self explanatory; read on...

Resent-Cc: recipient list not shown: ;
Resent-Date: Tue, 15 Dec 1998 11:50:50 -0700 (MST)
Date: Tue, 15 Dec 1998 11:48:31 -0700 (MST)
From: Ray Powers <rayp@primenet.com>
Reply-To: Ray Powers <rayp@primenet.com>
To: operlist@the-project.org
cc: dummies@initiate.monk.org
Subject: The real reason we're on IRC...
Resent-From: operlist@the-project.org
X-Mailing-List: <operlist@the-project.org> archive/latest/618
X-Loop: operlist@the-project.org
Resent-Sender: operlist-request@the-project.org



Preface: This is long rambling and philosophical. It does not give any
info on the latest hack or attack, and is no way meant to have any
technical merit. If that didn't make you hit D, read on...


Most of you know me. I've been on IRC for roughly.. too long. And been an
oper since the first big euro/us TS/NDCD split. I've been involved in
taking out fludnets, co-founding bH, working on the botwatch lists and the
spambot channels, being the routing secretary, co-adminning operlist, and
several other tasks I can't even remember any more all to try to help this
lovely thing we call Efnet.

The funny thing is, I haven't chatted on IRC for about two years.

I mean, I've been on IRC the whole time basically, but in retrospect, over
95% of my IRC conversations start with a user, oper or admin saying "Can
you help me with....."
It's all about me klining a bot, helping a user
get a channel back, answering questions about clients, servers, links, or
hackers, threatening to get smurfed (or worse), showing someone how to
bothunt, answering e-mail on why my bot kickbanned them, or something
else.

I never actually chat.

About two months ago my work schedule got really hectic and I basically
fell off the edge of the IRC world. I was working about 14-16 hours a day,
and just had no time to idle on IRC. A few weeks into it, I emailed the
frontiernet admins and told them to remove my O lines, as I didn't have
the time for it any more. They, nice people that they are, offered to
leave them in, so if I ever wanted to come back and help out, I could.

A week or so later, I *DID* get some spare time. I logged in, opered up,
went to hang out on a couple of my normal channels, and booted up BotHunt,
an irc script that searches the servers for bots and klines them.

I got attacked about 10 minutes later by some random DoS pup. Didn't
actually do anything but finally ping out bothunt, but kind of annoying
none-the-less, as they did send a floodnet after the client. So I, like
loyal little oper I am, compiled a list of the flood bots, klined all I
could and sent the rest to botwatch.

And stopped coming on IRC again for a bit. I mean, why bother. I just get
questions I don't have time for, requests I can't help on, and attacked
for simply enforcing the server rules. Why do people even bother to come
on IRC anyways, I thought.

Oh yeah, to chat.

A couple days later, I came back online.

I didn't oper up. I didn't connect to a tcm bot. I didn't join any oper
channels. I pulled MtgMonk out of the oper channels it was in. I joined a
couple channels I was interested in (in my particular case, the Magic:The
Gathering channels), joined, and chatted.

It was pretty cool.

Nobody nuked me. I had a couple great conversations with people on Magic
theory. I joked around with a few people I knew online, and in general had
a great time. It was amazing. It's like there's some other world out there
in IRC. Some world where people don't threaten to take over your channel
or flood your server, or yell at you for klinigng their bot. A place
where accounts don't get , users don't get nuked, and takeovers
don't happen everyday.

Its a place where people gather, and chat. That's it.

Its pretty damn cool.

This really is going out to both sides of the fence. The IRCOpers, and
the DoS pups. You want to celebrate the Holiday season this year right?
Maybe give a gift to the community that accepts you no matter who you are,
how old you are, or where you live? Try this:

Try logging on to IRC for a bit as a user. Don't oper up if you're an
oper. Don't load the nuker or the anonymous shell you DoS from if you're a
DoS pup. Just log in, join a couple channels about things you're
interested in, be it #wrestling, #sandiego, or #people_with_ppodles.

And chat.

And try and remember why you came on to this place to begin with. Not what
it became, not what *you* became.

IRC, as what its supposed to be, as what its *meant* to be, is really,
really, cool.

Try it sometime. Try using IRC to *chat*.

Its worth your time.




------------------ [ operlist@the-project.org ] -------------------------
To unsub: operlist-request@the-project.org with unsub operlist in the subject
List Maintainer: Matthew Ramsey <mjr@blackened.com>
Web Archives: http://www.the-project.org/operlist/current
---------------------------------------------------------------------------

Lovely piece of writing, just had to include this.

@HWA




4.0 Windows Trojans Update & The New Remote Explorer NT VIRUS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Last issue I reported that I had recently found many new trojans

"What you don't know CAN and DOES hurt you..." - me last issue

Trojan list:

Keys - Don't have it
+ Have it
!+ Contributed
? Name may be incorrect or a duplicate of another trojan

you have one of the 'needs' or know where I can find it for review
purposes please mail me. tnx.

!+Thanks to psychorakz muna for the url to girlfriend trojan site.

Key Name Key Name
===/==========================/=======================================
*- Acid Shiver + BackDoor
+ BackOffrice ? Control du Socket
+ Control Access + Deep Throat
+ Gatecrasher - Gjamer
!+ Girlfriend ?+ ICQ Trojan *There are many of these!
+ MastersParadise - Millennium (by HCVORG)
+ NetBus + NetSpy
- phAse zero - RAW
- SysProtect 98 + Sockets Du Trois (Same as #4?)
- TeleCommando

** Acid Shiver source was offered by someone at a hotmail account some
time ago on one of the mailing lists, dunno about anyone else or if it
was a phish or not but I never got mine. If this does exist (or not)
any 411 at all would be appreciated. ;)


A few sites where trojans may be found: (Updates requested)

!+http://www.chat.ru/~gfailure/ General Failure (Girlfriend & Source)

http://www.ufl.edu/~cycy92n/........ PHAC site - trojan files
http://www.legion2000.org/hcvorg/ .. PHAC site - HcVORG Trojan files

@HWA

4.1 Cyber Army is being jolly nice especially after recent hack attacks
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Contrib: demoniz/Ed


The Cyber Army site is a nice site, a bit flash, but nice, they
have now released their much sought after (and allegedly already
stolen and spread) anonymizer source code. After recent events its
a token of good will to the community and shows who the bad guys
are once again.

Story from http://hacknews.bikkel.com/ 100% Pure Bikkel (demoniz)
CyberArmy Anonymizer source released
update by demoniz at Dec 27 , 14:11 CET

The CyberArmy crew released today their long awaited source code of
the CyberArmy Anonymizer. You can hide your real identity with this
script. You need to have cgi-bin access to install the anonymizer.
We've tested it briefly and it worked quite well.

Download it: http://www.cyberarmy.com/files/cyberanon.zip
Main site..: http://www.cyberarmy.com

We haven't tried it here yet but plan on doing so when we move to
a new bawx in the new year, !**! <- search for that for further info


@HWA

4.2 Is it cool to hate Kevin Mitnick? - Updated with comments from fh
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

EPiLOGUE
~~~~~~~~

"two sides to every story, somebody had to stop me, I'm not the same
as when I began, I will not be treated as property!"
- John Lydon/PiL


Last issue we printed an admitted diatribe ranting about the killkevin
site run by fucking hostile (fh) on sinnerz.com I really fucked up by
not contacting him via email PRIOR to posting that article but I was in
a pissed off mood and the site as it stands still pisses me off. Anyways
here is the outcome of a discussion between myself and fh. Mucho thanks
to fh for permission to print the mail (although I was going to do it
anyway had I not recieved the response just moments ago) so thanks.



X-Sender: typeo@qni.com
X-Mailer: COOLMAILER2.0
Date: Sat, 26 Dec 1998 16:42:42 -0600
To: Cruciphux <cruciphux@mobsters.com>
From: fh <xxxx.xxx>
Subject: Re: hmmm

go ahead...

At 10:22 PM 12/18/98 -0500, you wrote:

* Ed>[ Modified for clarity : Ed = me fh = fucking hostile ]

Ed>Hi;
-
Ed>First off, do I have your permission to print your message and this
Ed>reply in a future issue of the newsletter?
Ed>
Ed>I wish all views to be aired out in the open if you are agreeable.
Ed>
fh>At 11:05 PM 12/17/98 -0600, you wrote:
fh>>What is to be careful about? I find this comment rather offending
fh>>considering neither The Messiah or SIN have >EVER released anything
fh>>that anyone would need to "be careful" while checking out.
-
Ed>Merely covering my ass. Insomuch as anyone should "be careful" when
Ed>checking out software they download from the net. I had not tried out
Ed>the software and did not want to recommend something that I had not
Ed>even run, however I maintain that the description sounded very good
Ed>and with the proliferation of trojans of the like of BO and the
Ed>(alleged) hacking of a site where software was replaced with NetBus
Ed>in the archives etc its a good policy to check-out everything no
Ed>matter what the source IMHO.
-
fh>>And also in issue 2.
fh>>Well I am saying right now that any person with a brain can tell my
fh>>site is for these basic reasons:
-
fh>>1. To get a rise out of people.
-
Ed>Having a brain and English being my primary language I figured as much
Ed>I contend the intention may not be as obvious to others.
Ed>
-
fh>2. To stop the 'FREE KEVIN' banners that everyone is putting on their
fh>page just so they look cool and all with the "hacker movements" or
fh>whatever.
-
Ed>I agree misuse of any movement for personal aggrandization sucks.
Ed>
fh>3. To stop the idiots who hack webpages and put FREE KEVIN all over them
fh> which he him and his freinds (several of whom have emalied me because
fh> of my webpage) say does more to hurt his situation then help it.
fh>
Ed>This I also agree is an unfortunate situation but with any "hero" or
Ed>"anti-hero" you're going to get this sort of abuse for personal
Ed>glorification and justification of otherwise illegal and anti-social
Ed>actions.
-
fh>And my opinion is that Kevin has brought his problems on himself. He broke
fh>the law and everyone knows it. While I don't think he should be in prison for
fh>almost 4 years with out trial, he did give up some of his rights and it is his own
fh>fault.
fh>And when he gave up his own rights then I refuse to support him.
-
Ed>Moot point. Hacker or no, agree or disagree, basic human and constitutional
Ed>rights have been abused and broken by the U.S government.
-
fh>I made no comments on my page saying that someone is "elite" for putting
fh>my banner up on their webpage. In fact I even realize that some people, who
fh>I am sure I would truely hate if I knew them, have put the banner up on their
fh>sites in order to seem like the "rebels" or whatever. That can't be avoided,
fh>just like it can't be avoided that some people who have no clue about Kevin
fh>will be putting FREE KEVIN all over their webpages.
-
Ed>...
-
-
fh>So do I truely want to see Kevin killed, fucked, and burned? Of course
fh>not. My banner is a statement of how this whole "FREE KEVIN" campaign has
fh>been shoved down everyones throat enough. And before you say it hasn't stop
fh>and think about it. Were the numorous webpages that have been hacked that
fh>said FREE KEVIN and were all about Kevin not indeed doing just that? The
fh>majority of these pages were virtual domains and the people had no clue what
fh>was going on other then some "hacker" (I wouldn't look at those people as
fh>hackers myself) has defaced their webpage for no reason other then that
fh>was the server their latest k-r4d 0-dAy SPLoiTz happend to work on.
-
Ed>I totally agree with your position on this.
-
**fh>Anyways the point is. You have your opinion and I have mine. At least the
fh>people who agree with me don't go hacking every virtual server that is hosted
fh>by someone like prohost.com or whatever the fuck it may be and shove their
fh>opinions down someones throat.
fh>
fh>They can accept it or not. I personally do not care either way.
-
Ed>I couldn't have said it better myself and hope you agree to this being
Ed>posted in an upcoming issue so others can see the points in a clearer light.
-
Ed>Cruciphux
Ed>HWA Staff
-
Ed>---------------------------------------------------------------------
Ed>Contrary to popular opinion, UNIX *is* user friendly. It just happens
Ed>to be highly selective about who it makes friends with.
Ed>---------------------------------------------------------------------


** If only other people could get down and sort out their differences in
this manner it would be a cool "scene" indeed. See guys? we had some shit
to sort out, its sorted. No fucking problem. Try it some time talking works
wonders.

fh: Public formal apologies for not contacting you prior to that "mini
diatribe"
and also "you have your opinion i have mine"? fucking kick-ass
I loved the email.

tnx.

By the way after receiving this initial response and understanding better
the true reasoning behind the rationale of the site i posted BOTH the free
kevin and burn, fuck, kill kevin banners on my site so people coule mkae
their own minds up. Personally although I understand and agree to some
extent with fh's position on this i'll lean towards the free side tnx for
the response. BTW Genius is way cool ... ;-)

- Ed ( Cruciphux )

http://www.kevinmitnick.com/ Free Kevin
http://www.sinnerz.com/fh/ FK&B Kevin site

@HWA


5.0 l33t d00d! totally l33t! KILL THE NEWBIES!!!! [ NOT!!] READ THIS.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
I was (well still am) working on an article concerning this very
topic for an upcoming issue. There are a lot of differing views on
the net about the "newbie" you've seen em, they're usually from
*.aol.com or maybe from *ipt.aol.com AND have a scroller or NUKER
<GASP an hax0r!> but seriously. often they get flamed or nuked or
ridiculed and hell, some of these assholes totally deserve the shit
they get back and well IMHO AOL.COM should be banned everywhere
not coz of the users but if the fucking admins couldn't handle
their own dicks in a pissing contest what chance do their poor users
have with them "showing them the way"? thats like asking Microsoft to
do a security audit on your NT network. <ahem>

Anyways as this is a totally no-bs unbiased publication <grin>
I won't rant and rave, we ALL had to start somewhere and this
nicely points that out. Check the article below, it was first pub'd
on http://www.hackernews.com/ in the COREDUMP section. A very good
and original piece. Permission was sought and graciously granted
for this reprint.

Original source: http://www.hackernews.com/
Original url: http://www.hackernews.com/orig/coredump/leet.html
(There is a slight misspelling here seems they spelled "l33t" as
"leet" i've already notified them of this gross error) <not>

Author: Flaming Cow
Author's site: http://www.planethack.com {nice site check it out}

How About Those l33t d00dz?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Flaming Cow www.planethack.com
Reprinted here with the permission of Flaming Cow and Planethack.

When is the last time that you were just hanging around on
IRC when you encountered a very lame person. You know
the type - they talk l1k3 7h1s; they think that the fact
that they just downloaded the newest ICQ flooder naturally
means that they now rule the world.

Most of you would probably have the same reaction that I
used to: head straight for ye olde kick/ban button. Wait.
What if that person you are about to kick could be crypto
analyzing AES in six months? What if they were destined to
be the next one added to that large group of people who
found sendmail bugs? Who exactly are you kicking?

I run a hacking website that attracts exactly these types. I
can't count the number of times that I have received "Do
you have the latest AOL scroller?"
through the feedback
form. My good friend and site sysadmin tells me that before
we got the firewall, he had several users break in and start
by trying to "dir". However, I don't ignore these emails, and
I don't send back nasty "Go Away" notes.

Yes its hard, hell, nearly impossible to imagine, but this is
the way that a hacker today has to start out. These are
not the kids who were as lucky as us to have the BBS
scene and accepting "Mentor"s to teach us. Anyone who
has the interest and the drive to learn about computers will
be caught by the media hype and will end up searching
Altavista for "hacking".

When they do that, what do they find? Well--the last time I
checked--I came up number 5. I'll admit it: by the
standards of sites like this, mine is seriously lame. People
constantly tell me: all these files are for attacking. This
violates any kind of hacker ethics that exist, and they don't
teach anyone anything. And they're right. So why do I keep
this page running? Specifically to attract those Altavista
searchers. Confused yet?

I run my site to get people interested. That is my goal.
People come here and they use these programs. I get 2000
hits a day from people who want to nuke their friend off
ICQ. They destroy, they wreak havoc, and they generally
cause a giant, unforgivable mess.

However--maybe once a week--I get an e-mail that asks
"Is this all there is? How can I go farther? I want to learn
about computers, UN*X, etc. I want to stop destroying and
start creating knowledge."
By sheer math, that is 1 out of
14000 people, but it is still one person. I can guide that
person away from their little GUI world. That one in
fourteen thousand was ready to move on, and to expand
themselves. Those that are weeded out by this
bandwidth-wasteful process have the desire and the ability
to learn. They all expand beyond my limited knowledge very
fast. Several have gone on to much better things. All of
them have been well worth my time.

So, you ask yourself, this letter started with some h^c&3r
coming into my IRC channel. I definitely don't have 14000
people doing this to *me* a week, so why should I care if
there are that few real possibilities out there? My response
is: Can we afford to waste even a single questioning mind?
The number of people who would call themselves "hackers"
has grown exponentially on the 'net in the last several
years. The number of true hackers that adhere to ethics
and hack only for knowledge and not for publicity or
bravado has dropped drastically. Do those few who are left
want their only legacy to be a bunch of kids running around
with WinNuke? If all the *real* hackers out there don't get
off their high horses and start teaching a new generation,
all that will be left eventually will be those "script kiddies."

Even the newest hacker has read Mentor's Last Words.
Some of us know them by heart, and have spent time
analyzing how we can apply his writing to our actions.
However, consider his name. He called himself Mentor for a
reason: he taught people. His values still live on in some
people, but his idea of raising the next generation is being
lost, and we *must* fight to keep it.


Related links:
http://www.antionline.com/ (if its back up **)



** See next story about some "happenings" re: Antionline.

5.1 ANTIONLINE! hacked? or just a "hardware failure"?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

The owner of Antionline seems to have become a bit of a target (to
put it mildly) for the "script kiddies"

As of this writing we see this on an attempted connect to Antionline
(what happened to all that venture capital?)

Dec 26th 1998 - 16:00hrs

http://www.antionline.com/

Greetings All,

Due to a hard drive crash, AntiOnline is currently down. We should be
back up and running the day after Christmas.

AntiOnline strives for accuracy in all that we report. When we receive
a tip, we make sure that we double check it with as many sources as
possible, and talk to all sides involved. Unfortunately, some of our
colleagues in the field do not follow the same dedication to accuracy
as we do. The Hacker News Network received an email from some "hack
group"
who apparently noticed that we were down, and decided that they
would attempt to gain a reputation for themselves by claiming that they
were the cause. HNN decided to post the claims of these hackers without
so much as an email to us, much less requesting additional verification
from the hackers. It saddens us that the Hacker News Network has decided
to follow nothing more than the standards of tabloid journalists.

To all of our regular users, you can be sure that AntiOnline will cont-
**-inue to be THE ONLY news source in the world dedicated to bringing you
the latest news from the underground and computer security scene in an
accurate and timely manner.

Oh, and one more thing. Look for the new AntiOnline, dubbed The
AntiOnline Network, on February 16th.

Yours In CyberSpace,
John Vranesevich
Founder, AntiOnline


** I don't want to sound like a prick but my knee jerk reaction to that
comment "THE ONLY news source..." etc would be "ooooh little boy had his
ego kicked in the nuts?"
hope things pan out coz if the shit comes to-
gether this will be great for the 'community' all the in-fighting and
stuff thats going on though is getting a bit silly. Go re-read the piece
on newbies and then look at what some of you guys (you know who you are)
are doing ... - Ed

[TBC-#4]

5.2 Bikkel Gets The Pickle!
~~~~~~~~~~~~~~~~~~~~~~~

Contrib: me
Story: demoniz
Time: 3:14am
Attire: Xmas Boxer shorts

Shoot the messenger
update by demoniz at Dec 24 , 0:59 CET

100 % Pure Bikkel has been accused of being responsible for
defacing the Web site of Slampcoach.com. The abuse team of
PSInet contacted our hostprovider with the request to remove this
site and take proper actions against the webmaster (me.) A classic
case of shoot the messenger. The accusation of the abuse team
was based on the fact that I reported about the compromised site.
PSInet claims to have contacted the FBI. Yeah whatever.

Read my reply to the abuse team of PSInet:


Dear Net-abuse team,

I received a complaint from the owner of bikkel.com regarding the
compromised server of www.slampcoach.com. I would appreciate it if
you could refrain from any unsubstantial accusations. According to the
information which was sent to our hostprovider (WideXS) you accuse the
bikkel.com members being responsible for this hack. This accusation
rests on the fact that my user account (http://www.bikkel.com/~demoniz/)
was mentioned on the defaced Web site. For your information: I'm the
webmaster of a popular news site for the hacker scene. I report on a
daily base about various exploits/bugs/hacks. We're dealing here with
a classic case of 'lets shoot the messenger since we have noone else to
blame.' I don't want to be disrespectful, but your investigation of this
particular hack is anything except thorough.

You wrote in your complaint:

>> If you go the website http://www.bikkel.com/~demoniz/, there is
>> mention of our customer's website getting hacked. Please see the
>> following contents found on that site.
>> -----------------------------------------------------------------
>> http://www.bikkel.com/~demoniz/
>> ok now hadez came on dalnet and asked me to give him the pass to this
>> domain i said yea sure whatever, i never met him before this...so he
>> changed the page to say some shit bot I-L and some other HCV members,
>> well little did i know thisd create a big flaming war...see i only had
>> a problem with wizk1d and silicosis...Wizk1d cause hes a jakcass 13
>> year old, that called... [snip]

Since you obviously visited my site, you should know that this particular
quote is taken from a copy of the hacked site which I received. You can
find the archive of the hacked site here:
http://www.bikkel.com/~demoniz/hacksite/slampcoach3_com.html

Maybe you should also take a look in the directory /demoniz/hacksite.
You'll find many many more archived hacked sites. Why?
Because it's an _archive_ of hacked sites. Those pages aren't written by
me, but are copies of hacked Web sites. I merely report about them.

Since you had your finger on the trigger to bring charges against me
(and punish me [start quote] PSINet is requesting that the following
website be removed and action taken on the users responsible [end quote]),
I assume you will be just as quick with your apologies.

Thank you for your time and I'm looking forward to your apologies.

Kick Ass Demoniz, some people are just so ... well you know.

@HWA


6.1 The Great Christmas Hax0r Flood of 1998
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Ok i'm not really sure i'm totally clued into what the point of this
is maybe its because i'm not in Europe or .NL right now maybe someone
could elucidate for me. Just email me some info on what the hell is
going on here.

It would appear that someone is extremely bored or someone else is
trying desperately to destroy someone else's name OR perhaps its a
fame and glory thing maybe they want to be busted I don't know.

From: http://xmaxhax0r.virtualave.net/memberz.html





6.1a Latest exploits and hacks <revisited>
~~~~~~~~~~~~~~~~~~~~~~~~~

Source credit:-> BUGTRAQ

Approved-By: aleph1@DFW.NET
Date: Sat, 21 Nov 1998 12:54:41 -0500
Reply-To: John Carlton <techhelp@ROCKETMAIL.COM>
Sender: Bugtraq List <BUGTRAQ@netspace.org>
From: John Carlton <techhelp@ROCKETMAIL.COM>
Subject: Freestats.com CGI vulnerability
To: BUGTRAQ@netspace.org

About a year ago I developed an exploit for the free web stats services
offered at freestats.com, and supplied the webmaster with proper code to
patch the bug. After hearing no reply, and seeing no fix in sight, I've
decided to post it here.

Procedure:

Start an account with freestats.com, and log in. Click on the area that
says "CLICK HERE TO EDIT YOUR USER PROFILE & COUNTER INFO" This will call
up a file called edit.pl with your user # and password included in it.

Save this file to your hard disk and open it with notepad. The only form
of security in this is a hidden attribute on the form element of your account
number. Change this from *input type=hidden name=account value=your#* to
*input type=text name=account value=""* Save your page and load it into your
browser.

Their will now be a text input box where the hidden element was before.
Simply type a # in and push the "click here to update user profile" and all
the information that appears on your screen has now been written to that user
profile.

But that isn't the worst of it. By using frames (2 frames, one to hold this
page you just made, and one as a target for the form submission) you could
change the password on all of their accounts with a simple JavaScript function.

Any thoughts, questions, or comments?

John Carlton,
CompSec specialist.

Source credit:-> [ http://www.rootshell.com/ ]

Date: Thu, 5 Nov 1998 02:38:51 +0200
From: Tatu Ylonen <ylo@SSH.FI>
Organization: SSH Communications Security, Finland
Subject: security patch for ssh-1.2.26 kerberos code

-----BEGIN PGP SIGNED MESSAGE-----

This message contains information relevant to people who compile ssh
with --with-kerberos5. There is one or more potential security
problem in the Kerberos code. These issues are not relevant for
people who have not explicitly specified --with-kerberos5 on the
configure command line.

Peter Benie <pjb1008@cam.ac.uk> found a buffer overflow in the
kerberos authentication code. To quote from his mail:

> What about sshconnect.c, line 1139
>
> sprintf(server_name,"host/%s@", remotehost);
>
> where remotehost is (char *) get_canonical_hostname() (up to 255 chars),
> is copied into server_name (a 128 char buffer)?

It looks to me like this is a genuine buffer overflow. I had not
noticed it when going through the code.

This buffer overflow is, however, extremely hard to exploit:

1. The victim must have have client compiled with --with-kerberos5 and
--enable-kerberos-tgt-passing.
2. The victim must be connecting to a server running with the same
options (i.e., krb5 with tgt passing).
3. You must do the following DNS spoofing:
- fake reverse map for the *server*
- fake forward map for the fake reversed name
4. You must fake your attack code to look like valid DNS records; this
is highly untrivial with modern versions of bind that reject all
domain names with invalid characters in them.
5. Only the part of the DNS name beyond 128 bytes can be exploited; that
must be made to align with stack frames and must contain appropriate
return addresses and jump addresses. It has been shown that this can
generally be done, but the space and structural constraints here are
extremely tight compared to most instances of buffer overflow
exploits.
6. Since the client with Kerberos TGT passing is only used
interactively, the user will almost certainly notice that something
went wrong. I don't think you can, within the structure and space
constraints, construct the code so that the user would not notice at
least the client crashing.
7. You cannot try again after a failed attack until the client again
tries to log into the same host.

This might yield an attack against the *client*.

I've fixed this in the source tree.

I'd like to thank Peter for reporting this. A fix will be included in
the next release (which I expect in about a week).

<patch deleted for brevity>

- --
SSH Communications Security http://www.ssh.fi/
SSH IPSEC Toolkit http://www.ipsec.com/
Free Unix SSH http://www.ssh.fi/sshprotocols2/

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBNkDyOakZxfGWH0o1AQGYOQP/bUNnE/ZpSQqWVc0ngxLG50+CtyksugLJ
wD0X2yIoc8jmY+UNPL7weQatgv6CmUUoWWpLctzKr8A6G/HrD2sh0OHPBwhIxg1i
3mPj7WrcIX9g/K5LaEksiZ0vv4h/gvSJty5y+wRiu0QLRmuAy91CyaKTV7Sab0YT
/W/s1NazNIg=
=iABB
-----END PGP SIGNATURE-----


@HWA'98

6.2 Think Twice Before Becoming A Hacker Attacker
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Source: CMPNET Internetweek article
Author: RUTRELL YASIN

Think Twice Before Becoming A Hacker Attacker
RUTRELL YASIN
December 14, 1998

I'm a big proponent of self-defense. Having studied a few of the martial
arts, I've learned the value of being prepared to fend off and respond
to attacks. To paraphrase a famous activist of the '60s: If someone
attacks you, make sure he can't put his hands on somebody else.

That appears to be the stance of a growing number of large companies that
have been victimized by hacker attacks, according to extensive research
conducted by WarRoom Research.

In an 18-month study of 320 Fortune 500 companies, 30 percent said they
have installed software capable of launching counterattacks to security
breaches. The report, titled "Corporate America's Competitive Edge,"
focuses on security and business intelligence practices and will be
available next month.

Most security experts agree that companies should have some way to
strike back at hackers. They caution users, however, not to get
embroiled in cyber shootouts. The main reason? The system you're
aiming at might not be the culprit.

The concept of "strikeback" has been around for years, but the method
gained wider attention over the past few months after the Defense
Department used software to disable an attacker's browser.

Strikeback can take many forms-from the collection of information
about intruders that can be used later to launch a counterstrike or put
the culprits in jail, to the launch of debilitating countermeasures such
as denial of services or flooding attacks that virtually shut down an
attacker's system.

But a savvy hacker can forge packet headers to make it appear that an
attack is coming from another location. And if a company is shooting
first and asking questions later, innocent people could be hurt.

What's ominous about the WarRoom Research findings is that many of
the companies in the security study would prefer to use their own
strikeback methods as opposed to calling the FBI or state law
enforcement agencies.

As WarRoom Research president Mark Gembicki pointed out, a code
of ethics controls how government agencies use strikeback measures.
Large companies are truly borderless and are moving into uncharted
territory.

Ken Geide, section chief of computer investigation with the FBI's
National Infrastructure Protection Center, agreed.

"It's really important that companies have the capability to detect
efforts to break into systems,"
he said. But strikeback has possible
drawbacks.

"The consequences of strikeback has the potential to put the victim at
civil risk or physical risk,"
Geide said.

The companies in the WarRoom study view strikeback as a right, just
as the law protects physical self-defense by way of force.

But there are lessons from the physical world that IT managers should
consider before launching a strike, experts said.

If you see someone trying to break into your car parked at the curb, do
you have the right to get your gun and take a shot at the suspected
thief? Geide asked.

The person might be intoxicated and just stumbling on your car, not
actually intending to break in. Worse, the bullets may ricochet and hit
a bystander.

"Our recommendation would be to let a properly trained individual help
protect the property,"
Geide said. IT managers should adopt the same
kind of response when conflicts arise in cyberspace.

"They could be launching a strikeback against themselves. The victim
is better off working with law enforcement,"
he added.

Geide said, however, that companies have been reluctant in the past to
tell law enforcement about security breaches, fearing unwanted public
exposure. Just as technology continues to advance, the FBI has grown
more sophisticated in investigating computer break-ins. "We're
cognizant of the concerns of the victim. It would be silly to victimize
the victim twice,"
Geide said.

As a result, the FBI has seen a nearly 200 percent increase in pending
investigations, primarily as referrals from victims, according to Geide.

It's clear that more large companies are devising options and plans to
address network intrusions-from both internal and external attacks.
Many are deploying tools that block or kill TCP/IP connections when an
intrusion is detected.

Those considering counterstrikes should realize that we're a long way
from being able to effectively verify that we're hitting the right targets.

Rutrell Yasin is a senior editor at InternetWeek.


@HWA'98


6.3 Ecstacy (XTC/mdma/rolls etc) Raves and Hacking your Head
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

"running around robbin banks all wacked on the sk00bi snax"
- Fun Loving Criminals

Author: xd0pEr
Status: (c) HWA/xd0pEr 1998


"Hack your head instead"
xd0pEr

* free to distribute if source and site is stated
http://welcome.to/HWA.hax0r.news/

ok This is NOT an anti-drug article, but if it makes you stop and
think then it was worth while. First off, its not just bums and
welfare people or blacks or <insert your biggot ethnicity> that end
up becoming alcoholics or drug addicts, I've known Doctors, Cops,
lawyers, business men and many computer professionals who have fallen
prey to this trap these are smart people.

Anyway so wtf do I care? well i'll tell ya wtf I care, been there done
that and i'm still here. used to play Suicidal Tendencies "Suicidal
Failure"
and think it was funny ya big hahah h0h0.

Anyway the point is this HACK YOUR BRAIN. Not not with a hatchet fuck
wad, get wit da program, get some fucking root man, GOT ROOT? no? ok
try VALERIAN ROOT, if you're a raver, its sedating, makes the colours
go super cool, neat visuals and its a herb. also take GINSENG in tab
form and also if you can stand the taste (its pretty kewl actually)
buy some ginseng drink from your local Korean variety store its like
speed that shit keeps ya going for about 2 hrs and yer mind is unfucked
... try leaving the mdma bullshit at home sure your head ain't scared of
dying but guess what the rest of your body is and fuck man you'd piss
off people you didn't even know were your friends if u deep-6'd it on
the dance floor, (thats rude) you'd look pretty rad then huh? End of
rant, check this out:


Draw up a pro and con list, doesn't have to be long or elegant:

Reasons/Excuses Consequences
+++++++++++++++++++++++++++++++++ -------------------------------------
Feels good NOW Accidental OD can kill you and your
friends if you're driving to/from the
rave or someone elses friends/family.
(I know people that have done this)
Escapism Try a movie instead, or book, hell
I hear hacking websites is IN these
days least you can't get killed too
quickly.
I think it makes me look cool You will look very cool, stone cold
and unless you're cremated you'll stay
that way forever.




What are my creds? oh how about 12yrs of lost life, 5 dead friends, a
lost house, AA ppl, NA ppl, the Police, Emerg and Shrinks know me on
a first name basis. That enuff? fuck you if you think this is shit i'm
taking the opportunity to put this out and thanks to Cruci for being
there for me, if it weren't for him, FProphet, Dicentra, Vexxation
and their families I wouldn't doing shit now cept watch worms crawl.

One last story before I go.

There was a guy that had a fantastic time but had too much to drink
he took his buddies keys and took off home in his car, hit another
car on the way home "fucking bummer" he thought, turns out that car
wiped out and smashed head on into a lamp post <yikes> so some woman
and two kids got killed just coz he was stupid enuff to get totalled
and drive home.

Next day his wife and kids are nowhere to be seen, but the police were
in the driveway. Guess the ending? ya, that was his own fucking family
he wiped out.

Merry Fucking Christmas.
Hope you all got the picture.
It ain't cool.
But the music is.
fuck i'm like 27 now and things rock
i'm still alive and life is great
but the things that coulda been ... make me break up now and then
btw: those frame sites piss you off here's the url for Bikkel's
webboard http://www.bikkel.com/~paradise/webboard/ sans frames...




To end on an upbeat t0ne, proof i've done the deal ...

"gh0d grant me the serenity
to accept the things I cannot
chmod, the courage to not DoS
although I can, and the wisdom
to spewf my ip when killing ppl
off of irc."


Ok its slightly modified but wtf its xmas, i'm sober and its
fun to be alive ... ;-)

- xd0pEr Dec'98 "A prick'n'still kickin"


Comments: xd0per FUCKING AWESOME ARTICLE. thanks man. keep rocking
we'll always be here for ya. - Ed

Demoniz may have something to say about that url but
wtf .. I hate frames too so I left it in - Ed

LEGAL HIGHS
~~~~~~~~~~~

Well not really but a good way to start hacking your head, also you
might want to look into n00tropics (nutropics). Use your favourite
search engine and look up "nootropics and nutropics".

Recommended links: (checked)

http://www.nutrimed.com/
http://www.herbnet.com/
http://www.natrol.com/
http://sunsite.unc.edu/herbmed/mediherb.html


@HWA'98/99 <almost>



7.0 HackingIRC'98 Part II [TBC] (NOTE)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Hacking eggdrops part 1 appeared in issue #2

THIS WILL CONTINUE IN AN UPCOMING ISSUE


7.1 Hacked Web Sites
~~~~~~~~~~~~~~~~

MORE COVERED IN NEXT ISSUE TOO MANY TO LIST IN THIS ONE/HACKS IN
PROGRESS...

Partial list appears below though for the curious (Partial!)

As far as I know these are not just a single vhosts hack ...

From hnn dec23
rumours


These sites have been hacked Dec23rd'98:

www.fractals.com ...........: Still hacked Dec 23rd
www.ambientcorp.com.........: Still hacked Dec 23rd
www.lindasy.com.............: Fixed
www.paulsonpress.com........: Fixed
www.uomini-photography.com..: Fixed
www.pagnol.com..............: Still hacked Dec 23rd

Newer hacks (Dec 28th)
~~~~~~~~~~~~~~~~~~~~~~
Checked 1:55p EST this msg was posted (and reported) on Bikkel
the "Still hacked" sites remained hacked for up to one week after
the initial intrusion. Bad, very bad.

More sites in protest of high telecom rates:

Checked at 12:13 EST by Cruciphux:

www.cabolinda.com .....: Server down/not responding
www.apibajasur.com.mx ..: Server down/not responding
www.doring.com ........: Raw directory with /logs displayed
www.villamex.com.mx ....:"Pagina en Construccion !!!!" message
www.cabo-architects.com.: Fixed
www.finisterra.com......: Fixed

According to BikkelRaZa-MeXiCaNa is claiming responsibility, watch for an article on the
state of Hacktivism in an upcoming issue. - Ed

* also check out http://xmaxhax0r.virtualave.net/memberz.html


@HWA'98/99


A.0 APPENDICES
~~~~~~~~~~
Planning on tidying things up a bit around here, make it more uhm
hrm, accessible... index and shit, maybe even a PDF version. we'll
see.

@HWA'98


A.1 PHACVW, sekurity, security, cyberwar and referenced links
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Site....: ETHICAL HACKERS AGAINST PEDOPHILIA
Run by..: Ken Williams
Alias...: tattooman
URL.....: http://www.ehap.org/
Comment.: Go. Read. Be enlightened, hacktivate.
Rating..: ***** 5/5
Reviewer: Ed.



Top 10/50/100/1000 etc lists:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.webfringe.com/top100?
http://www.hitbox.com/wc/world.100.HackingPhreaking.html
http://www.tazzone.com/top500/tally.cgi?section1=Hacking_Phreaking
http://www.splitinfinity.com/~top55/
http://www.linkz.net/cgi-bin/top250/


The links will no longer be maintained in this file, i've decided
to put up an indexed link list of reference material and current
hack and security sites on our web site instead of eating room in
the newsletter. Hell my search engines file is around 200k in and
of itself with just about every search engine/device out there
"stolen" mostly from spyking and other places of course. That won't
be up for some time though, i'll dig up the links to the sources as
well if I can find and verify them within a reasonable time with my
robot.. - HWA `Staff'.


A.2 Coolest Sig Award
~~~~~~~~~~~~~~~~~

_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/
_/ _/ Exxon Research & Engineering _/
_/ _/_/_/ _/_/ _/_/_/ _/ Kevin K. Sochacki _/
_/ _/ _/ _/ _/ _/ ICSBS CC124 (908) 730-2911 _/
_/ _/_/_/ _/_/ & _/_/_/ _/ mailto:kksocha@erenj.com _/
_/ _/ _/ _/ _/ _/ PERSONAL _/
_/ _/_/_/ _/ _/ _/_/_/ _/ mailto:kks@superlink.net _/
_/ _/ http://mars.superlink.net/kks _/
_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/


Now someone was prolly paid to do this but its freakin cool so congrats
to Kevin (number one most common name for (in)famous hackers! <bg> for
receiving this most prestigious bit of scribble. Truly cool kev. can
I call you kev? good how about teddy baby? ok 'nuff with the python
time to shut this sucker down.

EoD

EoF

[TBC-JAN12th-1999] In Issue #4: "Special scratch and win" issue!!
AND a free toy! watch for it... - Ed

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-

APOLOGY: THERE WAS SOME FUCKING STRONG LANGUAGE IN THESE ISSUES SO IF
YOU WERE EASILY OFFENDED WE STRONGLY URGE YOU TO CALL FOR
SOME COUNSELLING, 1-888-NO-PIRACY IS OPEN 24/7. PLEASE. IF
NOT FOR YOUR OWN SAKE, FOR THE SAKE OF OTHERS, SEEK HELP!

- Ed "hey, you can do some cool things with this staff!"


DISC-LAMER: IF IT WAS BAD, IT WASN'T ME. IF IT WAS GOOD, IT MAY HAVE BEEN
ME BUT I CAN'T SAY COZ I WORK FOR AGENT SCULLY AND ITS SECRET.


@HWA C*:.98'99

(C) Cruciphux/HWA.hax0r.news
(r) Cruciphux is a trade mark of my big hairy white ass productions.

"Mono power!" - BogoMIPr

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-
--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-
[45:6E:64]-[28:63:29:31:39:39:38:20:68:77:61:20:73:74:65:76:65]

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT