Copy Link
Add to Bookmark
Report
Phrack Inc. Volume 07 Issue 48 File 18
==Phrack Magazine==
Volume Seven, Issue Forty-Eight, File 18 of 18
PWN PWN PNW PNW PNW PNW PNW PNW PNW PNW PNW PWN PWN
PWN PWN
PWN Phrack World News PWN
PWN PWN
PWN Compiled by Datastream Cowboy PWN
PWN PWN
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
Security Software Thwarts Hackers July 23, 1996
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
(PRNewswire)
World Star Holdings, Ltd. announced today that there have been approximately
5,000 unsuccessful attempts to break its proprietary VPAGE Internet security
system. In order to further demonstrate the functionality of its technology,
they Company has unveiled a new addition to the World Star Internet security
challenge: "The World Star Cyberhospital."
The company recently launched an online contest offering more than $50,000 in
cash and prizes to the first person to break its security.
[ THESE CHALLENGES ARE UNADULTERATED BULLSHIT. Phrack suggests you test
something other than the fake, non-production demo contest system. How
well does their software hold up in a real business environment?
(in other words: THEIRS!?!!@$)
World Star Holdings (NET-WORLDSTAR-MB-CA)
165 Garry Street
Winnipeg, Manitoba R3C 1G7
CA
Netname: WORLDSTAR-MB-CA
Netnumber: 205.200.247.0 ]
-----------------------------------------------------------------------------
Your Cellular Phone Number May Be Up For Grabs August 21, 1996
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Mimi Whitefield (Miami Herald)
Electronic bandits have snatched cellular phone numbers from the airwaves and
cloned phones used by the Miami office of the Secret Service.
BellSouth Florida president Joe Lacher's phone has been cloned; Spero Canton,
spokesman for BellSouth, has been a victim three times over.
"The bums never sleep. They're everywhere," complained Bill Oberlink,
regional president for AT&T Wireless Services.
But the good news is that law enforcement agencies and cellular companies
themselves are fighting back with a new arsenal of tools, technology and laws
that make it easier to detect and prosecute cellular bandits.
-----------------------------------------------------------------------------
Miami Fraud Squad Pursues Cellular Bandits August 12, 1996
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Audra D.S. Burch (Miami Herald)
How's this for capitalism gone awry: Metro-Dade police nabbed a cellular
bandit who was selling a $150 package deal -- $75 each for a stolen phone
and number -- along with a 30-day guarantee on unlimited illegal air time.
In a sting operation, police took him on the cut-rate offer.
Thanks to the work of a special Metro-Dade Police Economic Crimes Bureau, the
entrepreneurial cloner got a prison sentence.
-----------------------------------------------------------------------------
Newer Technology Aids Fight Against Cellular Fraud August 21, 1996
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Mimi Whitefield (Miami Herald)
New technology is on the side of cellular companies fighting telecom criminals
who can rack up thousands of dollars in illegal charges before a consumer even
knows he's been hit.
New Jersey-based Bellcore, for example, has developed NetMavin software,
which can detect fraudulent or unusual calling patterns within half an hour.
"This is really going to screw the cloners up," said Roseanna DeMaria, an
AT&T Wireless executive.
-----------------------------------------------------------------------------
SPA Files Copyright Suit July 28, 1996
~~~~~~~~~~~~~~~~~~~~~~~~
(Reuters News)
The Software Publishers Association said Sunday it filed a civil copyright
infringement lawsuit against a Seattle man for illegal distribution of
software on the Internet.
The suit, which was filed July 23 in the U.S. District Court in Seattle,
alleges that Max Butler illegally uploaded copyrighted software to a file
transfer protocol site for distribution across the Internet, the trade
association said.
"This action is a warning to Internet users who believe they can infringe
software copyrights without fear of exposure or penalty," said Sandra
Sellers, Software Publisher's vice president of intellectual property
education and enforcement.
-----------------------------------------------------------------------------
The L0pht August, 1996
~~~~~~~~~
by Steve G. Steinberg (Wired) p. 40
What do a group of hackers do when the equipment they've accumulated over
years of dumpster diving no longer fits in their apartments? They get
a l0pht. Since 1993, a core group of seven Boston-based hackers have rented
a loft space for hacking, trading information about cellular phones security,
and building things like a wireless Internet service using discarded
microwave equipment.
Now that all of them have day jobs in the industry, why do they keep at it?
"For the girls and the text files, of course," says Mudge.
[ HELL YES!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! ]
-----------------------------------------------------------------------------
Cracking Down on the Outlaws of Cyberspace July 2, 1996
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by M.J. Zuckerman (USA Today) p. 4B
What's it take to be America's top cybercop?
"I was a hockey referee, so I'm used to being beaten up," suggests Jim
Christy, who is among those most often mentioned for the title. And he's
been at it for only a decade.
Today, with the weighty title of Chief of Computer Crime Investigations
and Information Warfare, he is one of 68 computer investigators in the
Air Force Office of Special Investigations (OSI).
Christy, a Baltimore native, stumbled into the computer field. After
drawing No. 35 in the draft lottery during the Vietnam War, he joined the
Air Force rather than waiting to be drafted. He spent the next four years
as a computer key punch operator, followed by 13 years as a civilian working
computers at the Pentagon.
When he moved to OSI, Christy largely ceased his hands-on involvement with
computers and systems.
Since last fall, Christy has been on temporary assignment to the Senate
Permanent Subcommittee on Investigations, helping them examine security
in cyberspace.
"I like working up on Capitol Hill, because you can make a difference,"
Christy says.
-----------------------------------------------------------------------------
Hackers Penetrate Justice Department Home Page August 18, 1996
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
(AP News Wire)
Internet hackers infiltrated the Justice Department's home page
yesterday, altering the official web site to include swasticas,
obscene pictures and lots of criticism of the Communications Decency Act.
The official web site, which was turned off by government technicians
when it was discovered, was changed to read "United States Department of
Injustice," next to a red, black and white flag bearing a swastika.
The page included color pictures of George Washington, Adolf Hitler, and a
topless Jennifer Aniston.
[ A link to a copy of the page is it http://www.fc.net/phrack/doj ]
-----------------------------------------------------------------------------
Employment Prospect Grim for Hacker August 19, 1996
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
(AP News wire)
Employment prospects are grim for Kevin Lee Poulsen, a computer whiz
imprisoned five years for his cyberspace havoc.
The 30-year-old hacker has been barred from getting near a computer for the
next three years and he now fears selling cowboy boots at a Western store
will be his only opportunity to make some money.
"It's the only place where I've been greeted with a positive attitude," he
said during an interview last week. "I can't get a job that I am qualified
for, basically."
On September 3, he goes to federal court in hopes of having some of the
computer restrictions relaxed.
-----------------------------------------------------------------------------
School Hires Student To Hack Into Computers August 22, 1996
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
(The Sun Herald)
Students at Palisades Park's high school needed their transcripts to
send off to colleges. But they were in the computer and no one who knew
the password could be reached. So the school hired a 16-year-old hacker
to break in.
Superintendent George Fasciano was forced to explain to the School
Board on Monday the $875 bill for the services of Matthew Fielder.
-----------------------------------------------------------------------------
Feds aim low on hacker crackdown June 21, 1996
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Lewis Z. Koch (Upside Online News)
Nineteen-year-old Christopher Schanot of St. Louis, Mo. has been
languishing in a Federal jail since March 25, 1996, charged with four
counts of computer hacking. He is not allowed to post bond, because
Federal authorities contend he is "a computer genius intent on
infiltrating computer systems of some of the largest companies and
entities in the country," and because a jailhouse snitch claims Schanot
bragged he would run away if he were released. He has never been charged
with a crime or arrested before.
Schanot's problems began after he ran away from home on May 30, 1995,
taking some of his disks, a hard drive and personal items. According to a
knowledgeable source close to Schanot, Chris felt his parents, especially
his father Michael, didn't understand or respect him.
Less rocky, it seems, was his relationship with Netta Gilboa, a
38-year-old woman living near Philadelphia. Gilboa is editor-in-chief and
publisher of _Gray Areas_, a slick, text-heavy, irregular magazine that
explores the "grey areas" of "alternative lifestyles and deviant
subcultures."
-----------------------------------------------------------------------------
City of London Surrenders To Cyber Gangs June 2, 1996
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
(Times of London)
City of London financial institutions have paid huge sums to international
gangs of sophisticated "cyber terrorists" who have amassed up to 400 million
pounds worldwide by threatening to wipe out computer systems.
A Sunday Times Insight investigation has established that British and
American agencies are examining more than 40 "attacks" on financial
institutions in London and New York since 1993.
Victims have paid up to 13 million pounds a time after the blackmailers
demonstrated their ability to bring trading to a halt using advanced
"information warfare" techniques learnt from the military.
According to the American National Security Agency (NSA), they have
penetrated computer systems using "logic bombs" (coded devices that can
be remotely detonated), electromagnetic pulses and "high emission radio
frequency guns," which blow a devastating electronic "wind" through a
computer system.
The gangs are believed to have gained expertise in information warfare
techniques from the American military, which is developing "weapons"
that can disable or destroy computer hardware. Some are also known to
have infiltrated banks simply by placing saboteurs on their payroll as
temporary staff.
-----------------------------------------------------------------------------
Credit Fraud on AOL
~~~~~~~~~~~~~~~~~~~
(AP Newswire)
Two boys posed as billing representatives for an online service and stole
at least 15 credit card numbers, and used those numbers to buy $15,000
worth of merchandise, from computer equipment to cymbals, police said.
The two 16-year-olds were charged with 39 counts of possession of
stolen property, theft and attempted fraud. They were released to the
custody of their parents pending a Family Court hearing.
Police believe the boys obtained a program designed by computer
hackers to flimflam customers of America Online. It sends a message to
users saying they will be cut off if they don't type in their name,
credit card account number and computer service password.
-----------------------------------------------------------------------------
FBI Survey Reveals Growth of Cybercrime May 6, 1996
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Rory J. O'Connor (San Jose Mercury News)
Intruders are breaking into the nation's computer systems at an
increasing rate and often with more nefarious motives than in the
past, according to a survey co-sponsored by the FBI and a private
group of computer security professionals.
"What this shows is that the ante has been upped in cyberspace," said
Richard Power, senior analyst of the Computer Security Institute in
San Francisco, which conducted the survey. "As all manner of commerce
moves into cyberspace, all manner of crime is moving there as well.
It's no longer just vandalism."
More than 40 percent of the 428 corporate, university and government
sites that responded to the FBI survey reported at least one
unauthorized use of their computers within the last 12 months, with
some institutions reporting as many as 1,000 attacks in the period.
It also appears that there's more computer crime for hire occurring,
Power said, exploiting mainly older hackers who have graduated to
making money off the skill they once used simply to establish bragging
rights with their peers. He suggested that some of the hiring is being
done by intelligence services of various governments, although he
offered no proof.
-----------------------------------------------------------------------------
University hacker to be hunted on the Internet April 27, 1996
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By Robert Uhlig (London Daily Telegraph)
Computer experts at Cambridge University are using the Internet to hunt
for a hacker who breached their security systems to access some of the
world's most sensitive research information.
The authorities had no indication that the hacker deleted or altered
files, "although there was the potential for that", he said. Files
belonging to world-renowned research scientists may have been viewed or
copied, giving the hacker an insight into commercially and academically
sensitive material.
The hacker used a so-called sniffer program, which sat silently within the
computer system for four weeks, monitoring its activities. This could
allow the hacker to compile a list of all passwords to give him unhindered
access to every computer on the university's network. "There was the
potential to access any material on any computer anywhere on the
university's network - ranging from electronic-mail to confidential
research data," said Mr Stibbs.
-----------------------------------------------------------------------------
Agents' Codes Exposed on Web March 16, 1996
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By: Robert E. Kessler (Newsday)
In an attempt to help (Ed) Cummings, and discredit the Secret Service, a Long
Island-based hacker magazine last week launched a page on the World Wide
Web publishing lists of Secret Service radio frequencies, photographs of
agents, and codenames used by the agency for officials and buildings.
Last year, Cummings, a 35-year-old native of Reading, Pa., pleaded
guilty to federal charges in Philadelphia of possessing telecommunications
equipment with intent to defraud and served a seven-month prison sentence.
As a result of that conviction, last week Cummings was sentenced by a
judge in Easton, Pa., north of Philadelphia, to serve a six- to 24-month
sentence for violating probation after pleading no contest to a 1994 charge
of tampering with evidence in another telephone hacking case.
"Painting this guy as some white knight or someone who is standing up
for free speech is wrong," said Kun. "He's engaged in fraud."
Cummings' attorney, Kenneth Trujillo, could not be reached for comment.
-----------------------------------------------------------------------------
Judge Denies Bond to Accused Hacker April 6, 1996
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Tim Bryant (St. Louis Post Dispatch)
After another prisoner said accused computer hacker Christopher Schanot was
planning a quick escape from his parents' home near High Ridge, a federal
magistrate decided Friday to keep Schanot in jail.
"He said he would wait a couple of days and take off," testified the
prisoner, Gerald Esposito.
Schanot's lawyer, federal public defender Norm London, told Davis that
the alleged conversation between the young man and Esposito never happened.
London, pointing out that Esposito has convictions for sexual assault,
said the older prisoner had "made overtures" to jail officials about moving
Schanot into Esposito's housing area.
-----------------------------------------------------------------------------
Hacked Off! Government, Firms Fight Computer Intruders April 7, 1996
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Colleen Bradford (St. Louis Post Dispatch)
Every day, hundreds of people in front of personal computers try to sneak
into corporate and government computer networks. Sometimes they just look
around, sometimes they destroy data and sometimes they steal personal and
classified information.
Two weeks ago, law enforcement officials charged an Argentine, 21, with
using the Internet to illegally break into computer networks at Department
of Defense installations, the NASA, Los Alamos National Laboratory and
several universities. The Justice Department is now seeking Julio Cesar
Ardita, who accessed confidential research files on aircraft design, radar
technology and satellite engineering.
And Chris Schanot, 19, from High Ridge, was in court in St. Louis last
week on charges of hacking. Schanot, who fled to Pennsylvania from St.
Louis after graduating from Vianney High School last May, is accused in a
five-count indictment of breaking into the computers of Southwestern Bell,
Bell Communications Research, Sprint and SRI International, a research and
development contractor with government contracts. His trial is set for June
10.
Schanot, like other hackers, likely became addicted to the feeling of
power that cracking into a private computer network brings, said St. Louis
County Police Sgt. Thomas Lasater, who has been investigating computer
crime for seven years.
"Normally these young hackers do not use the computers for financial
gain," Lasater said. "It's just a challenge for them to see what they can
conquer."
-----------------------------------------------------------------------------
Mike and Terry's Dreadful Adventure
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Elizabeth Weise (AP Newswire)
Terry Ewing was late. His plane left in an hour and he was cutting it close.
But he couldn't tear himself away from his computer and the hole he'd hacked
into the security network of Tower Records.
He kept poking around, looking for something interesting to take to the
hackers' convention he was going to. Finally, five minutes before the
airport shuttle beeped in front of his apartment, he downloaded a file
containing 1,700 credit card numbers.
"We didn't expect anyone was watching," he said seven months later -
through an inch of Plexiglas at the Sacramento County Jail.
Ewing had had second thoughts about taking the Tower Records file with
him on July 31, so he left it on his hard drive while he and Kim hit
DefCon, the biggest of the West Coast hacker gatherings, for a weekend of
bragging, hanging out and messing around.
"We never guessed they were onto us. Their security was so weak it
really blew," the 20-year-old Kim says by phone from the sixth floor of
the same jail that held his friend. He is facing an 18-month sentence.