Copy Link
Add to Bookmark
Report

Phrack Inc. Volume 05 Issue 45 File 28

eZine's profile picture
Published in 
Phrack Inc
 · 5 years ago

  

==Phrack Magazine==

Volume Five, Issue Forty-Five, File 28 of 28

PWN PWN PNW PNW PNW PNW PNW PNW PNW PNW PNW PWN PWN
PWN PWN
PWN Phrack World News PWN
PWN PWN
PWN Compiled by Datastream Cowboy PWN
PWN PWN
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN



Paramount's Hack Attack March 3, 1994
~~~~~~~~~~~~~~~~~~~~~~~
Reuter News Wire

Though the minds of Paramount execs have surely been n potential whackings,
computer hacking was the chief focus of execs Bob Jaffe and John Goldwyn
last week.

The execs got Par to pay a low six-figure fee against mid-six figures to
Johnathan Littman for the rights to make a movie from his Sept. 12 LA Times
Magazine article "The Last Hacker," and major names are lining up to be
involved.

It's the story of Kevin Lee Poulsen, a skilled computer hacker who was so
inventive he once disabled the phone system of KIIS_FM so he could be the
102nd caller and win the $50,000 Porsche giveaway.

Poulsen was caught and has been in jail for the last three years, facing
more than 100 years in prison.

It was a vicious tug of war between Touchstone, which was trying to purchase
it for "City Slickers" director Ron Underwood.

Littman, meanwhile, has remained tight with the underground community of
hackers as he researches his book.

That takes its tool. Among other things, the mischief meisters have already
changed his voice mail greeting to render an obscene proposal.

------------------------------------------------------------------------------

Hacker Attempts To Chase Cupid Away February 10, 1994
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
UPI News Sources

Two bachelors who rented a billboard to find the perfect mate said Thursday
they had fallen victim to a computer hacker who sabotaged their voice mail
message and made it X-rated.

Steeg Anderson said the original recording that informed callers
how they may get hold of the men was changed to a "perverted" sexually
suggestive message.

"We are getting calls from all over the country," he said. "So we were
shocked when we heard the message. We don't want people to get the wrong
idea."

"It's rare, but we've seen this kind of thing before," said Sandy Hale, a
Pac Bell spokeswoman. "There is a security procedure that can prevent this
from happening, but many people simply don't use it."

------------------------------------------------------------------------------

Wire Pirates March 1994
~~~~~~~~~~~~
by Paul Wallich (Scientific American) (Page 90)

Consumers and entrepreneurs crowd onto the information highway, where
electronic bandits and other hazards await them.

[Scientific American's latest articles about the perils of Cyberspace.
Sound bytes galore from Dorothy Denning, Peter Neumann, Donn Parker,
Mark Abene, Gene Spafford and others. Much better than their last attempt
to cover such a thing back in 1991.]


------------------------------------------------------------------------------

AT&T Warns Businesses December 8, 1993
~~~~~~~~~~~~~~~~~~~~~
Business Wire Sources

AT&T urges businesses to guard against increased risk of toll-fraud attempts
by hackers, or toll-call thieves, during the upcoming holiday season.

Last year nationwide toll-fraud attempts increased by about 50 percent during
the Christmas week. Hackers "break into" PBXs or voice-mail systems, obtain
passwords or access to outside lines, and then sell or use the information to
make illegal international phone calls.

Toll fraud cost American businesses more than $2 billion in 1993. "Hackers
count on being able to steal calls undetected while businesses are closed
during a long holiday weekend," says Larry Watt, director of AT&T's Toll
Fraud Prevention Center. "Tis the season to be wary."

AT&T is the industry leader in helping companies to prevent toll fraud.
Businesses that want more information on preventative measures can request
AT&T's free booklet, "Tips on Safeguarding Your Company's Telecom Network,"
by calling 1-800-NET-SAFE.

------------------------------------------------------------------------------

Sadomasochists Meet Cyberpunks At An L.A. Party June 14, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Jessica Seigel (Chicago Tribune)

Sadomasochists meet the cyberpunks. Leather meet hypernormalcy. Body
piercing meet network surfing (communicating by computer). It was a night
for mingling among the subcultures to share their different approaches to
messing with mind and body.

The recent party at the S&M club "Club Fuck" was organized by "Boing Boing,"
a zine that focuses on the kinetic, futuristic world of the new frontier
known as cyberspace. This place doesn't exist in a physical location, but
anyone can visit from their home computer by hooking into vast electronic
networks.

A blindfolded man dressed in a jock strap and high heeled boots stood on
stage while helpers pinned flashing Christmas lights to his flesh with thin
needles. Then a man with deer antlers tied to his forehead whipped him.

The crowd of mostly twentysomethings who came to the club because of the
cyber theme observed with stony expressions. Chris Gardner, 24, an
architecture student who studied virtual reality in school, covered his
eyes with his hand.

No one, really was "fitting in." The sadomasochists looked curiously at the
very-average-looking cyber fans, who openly gawked back at the black
leather, nudity and body piercing.

Sharing subcultures can be so much fun.

------------------------------------------------------------------------------

Intruder Alert On Internet February 4, 1994
~~~~~~~~~~~~~~~~~~~~~~~~~~
AP News Sources

Intruders have broken into the giant Internet computer network and users are
being advised to protect themselves by changing their passwords.

The breaks-ins may jeopardize the work of tens of thousands of computer
users, warned the Computer Emergency Response Team, based at Carnegie
Mellon University in Pittsburgh.

"Intruders have already captured access information for tens of
thousands of systems across the Internet," said an emergency response
team sent out on the network late Thursday.

Passwords were obtained by the intruders using a "Trojan horse
program," so called because it can enter the main computer for some
legitimate purpose, but with coding that lets it remain after that
purpose is accomplished.

The program then records the first 128 keystrokes when someone else
connects to the Internet, and the illegal user later dials in and
receives that information. The first keystrokes of a user generally
contain such information as name and password of the user. Once they
know that the intruders can then sign on as the person whose password
they have stolen, read that person's files and change them if they
wish.

------------------------------------------------------------------------------

Harding Email Compromised by Journalists February 27, 1994
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by C.W. Nevius (SF Chronicle)

In another example of the media circus that has dogged Tonya Harding,
a number of American journalists have apparently obtained the secret computer
code numbers that would allow them to read Harding's personal electronic mail
at the Winter Olympics.

No reporters have admitted reading Harding's electronic mail, but the
apparent access to private communications has caused concern among those
covering the Games.

The Olympic computer system is one of the most popular communications devices
at the Games. Any member of the Olympic family -- media, athlete or Olympic
official -- can message anyone else from any of several hundred
computer terminals all over the Olympic venues.

The flaw in the system is that it is not especially difficult to
break the personal code. Every accredited member of the Olympic family is
given an identification number. It is written on both the front and back
of the credential everyone wears at the Games. Anyone who has a face-to-face
meeting with an athlete would be able to pick up the accreditation number,
if the person knew where to look.

Each person is also given a "Secret" password to access the communication
system. At the outset, the password was comprised of the digits corresponding
to that person's birth date. Although Olympic officials advised everyone
to choose their own password, Harding apparently never got around to doing
so.

Harding's initial password would have been 1112, because her birthday
is the 11th of December.

Although none of the writers at the Olympics has admitted reading Harding's
personal electronic mail, it would be difficult, if not impossible, to
determine if anyone did any actual snooping. There are no records kept
of who signs on to the computer from any particular terminal.

------------------------------------------------------------------------------

Reality Check January 1994
~~~~~~~~~~~~~
by Doug Fine (Spin) (Page 62)

I ask accused hacker Kevin Lee Poulsen if, as he approaches three years in
jail without trial, he has any regrets about his computer-related activities.
Without missing a beat, and breaking a media silence that began with his
first arrest in 1988, he answers: "I regret shopping at Hughes Supermarket.
I'm thinking of organizing a high-tech boycott."

Poulsen is referring to the site of his 1991 bust in Van Nuys, California.
There, between the aisles of foodstuffs, two zealous bag-boys -- their resolve
boosted by a recent episode of Unsolved Mysteries that featured the alleged
criminal -- jumped the 25-year-old, wrestled him to the ground, and handed
the suspect over to the security agents waiting outside.

Poulsen still kicks himself for returning to Hughes a second time that
spring evening. According to court documents, a former hacker crony of
Poulsen's, threatened with his own prison sentence, had tipped off the
FBI that Poulsen might be stopping by.

What, I ask him, had he needed so badly that he felt compelled to return
to a supermarket at midnight?

"Do you even have to ask?" he says. "Condoms, of course."

[A very different Kevin Poulsen story. Get it and read it.]

------------------------------------------------------------------------------

Key Evidence in Computer Case Disallowed January 4, 1994
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Los Angeles Staff Writers (Los Angeles Times) (Page B3)

U.S. District Judge Ronald Whyte in San Jose said computer tapes found
in a storage locker rented by Kevin Lee Poulsen should not have been
examined by prosecutors without a search warrant and cannot be used as
evidence.

Whyte had ruled the tapes admissible last month but changed his mind,
saying he had overlooked evidence that should have put a police officer
on notice of Poulsen's privacy rights.

In addition to illegal possession of classified government secrets,
Poulsen faces 13 other charges, including eavesdroping on telephone
conversations, and tapping into Pacific Bell's computer and an unclassified
military computer network. He could be sentenced to 85 years in prison if
convicted of all charges.

His lawyer, Paul Meltzer of Santa Cruz, said the sole evidence of the
espionage charge is contained on one of the storage locker tapes. Meltzer
said a government analyst found that the tape contained a 1987 order,
classified secret, concerning a military exercise.

Poulsen, who lived in Menlo Park at the time of his arrest in the San
Jose case, worked in the mid-1980s as a consultant testing Pentagon computer
security. He was arrested in 1988 on some of the hacking charges, disappeared
and was picked up in April, 1991, after a tip prompted by a television show.

------------------------------------------------------------------------------

Hacker to ask charges be dropped January 4, 1994
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
UPI News Sources

An attorney for a former Silicon Valley computer expert accused of raiding
confidential electronic government files said Tuesday he will ask to have
charges dismissed now that a federal judge has thrown out the government's
chief evidence.

Attorney Peter Leeming said the government's case against Kevin L.
Poulsen is in disarray following a ruling suppressing computer tapes and
other evidence seized from a rented storage locker in 1988.

''We're ready to go to trial in the case, and actually we're looking
forward to it,'' Leeming said.

Poulsen is charged with espionage and other offenses stemming from his
hacking into military and Pacific Bell telephone computers. The government
alleges that Poulsen illegally obtained confidential military computer codes
and confidential information on court-ordered wiretaps.

------------------------------------------------------------------------------

The Password is Loopholes March 1, 1994
~~~~~~~~~~~~~~~~~~~~~~~~~
by Joshua Quittner (Newsday) (Page 61)

You'd think that Polytechnic University, in Brooklyn, one of the finer
technical schools in the country, would know how to safeguard its
computer system against hacker intrusions. And you'd think the same of
New York University's Courant Institute, which hosts the mathematical
and computer science departments.

But a teenage Brooklyn hacker, who calls himself Iceman, and some
of his friends say they invaded the schools Internet-connected
computers and snatched the passwords of 103 students.

Internet break-ins have been a national news story lately, with
reports that unknown intruders have purloined more than 10,000 passwords
in a burst of activity during recent months. The Federal Bureau of
Investigation is investigating, since so many "federal-interest
computers" are attached to the wide-open Internet and since it is a
crime to possess and use other peoples' passwords.

Experts now believe that a group of young hackers who call
themselves The Posse are responsible for the break-ins, though who they
are and what they're after is unclear. Some people believe the crew is
merely collecting passwords for bragging rights, while others suspect
more insidious motives. Their approach is more sophisticated, from a
technical standpoint, than Iceman's. But the result is the same.

Now Iceman, who's 18, has nothing to do with The Posse, never heard
of it, in fact. He hangs with a group of budding New York City hackers
who call themselves MPI.

Iceman told me it was simple to steal 103 passwords on the
universities systems since each password was a common word or name.

What did Iceman and company do with the passwords?

He said mostly, they enjoy reading other people's files and e-mail.
"Every once in a while," he said, "you get something interesting."

------------------------------------------------------------------------------

A Rape In Cyberspace December 21, 1993
~~~~~~~~~~~~~~~~~~~~
by Julian Dibbell (Village Voice) (Page 36)

[<SNIFF> Some guy made my MUD character do bad things in a public
area. And all the other MUDders could do was sit and watch! WAHHHHH.

Get a fucking life, people. Wait, let me restate that; Get a
FUCKING REAL LIFE!]

------------------------------------------------------------------------------

Hacking Goes Legit February 7, 1993
~~~~~~~~~~~~~~~~~~
by Ann Steffora and Martin Cheek (Industry Week) (Page 43)

Corporations ARE using "tiger teams" and less glamorous methods to check
computer security.

[Uh, yeah. Sure they are. Hey, is that an accountant in your dumpster?
Better tuck in that tie dude. Don't forget your clipboard!

I will put a computer security audit by me, or by anyone from the hacker
community, against a computer security audit done by ANY of the following:
Coopers & Lybrand, Deloitte & Touche, Arthur Andersen or Price Waterhouse.
It's no contest. These people are NOT computer people. Period.

Get the hell out of the computer business and go do my fucking taxes.]

------------------------------------------------------------------------------

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT