Copy Link
Add to Bookmark
Report

NeuroCactus_07

eZine's profile picture
Published in 
NeuroCactus
 · 5 years ago

  


³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³
ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ

ÚÄÄ°±²ÛÛÛ²±°Ä°±²ÛÛÛÛÜÄÛ²±°Ä°±²ÛÛÛÛÛ²±°Ä°±²ÛÛÛÛÛÛÛ²±°Ä°±²ÛÛÛ²±°ÄÄ¿
ÚÄÄ°±²ÛÛÛ²±°Ä°±²ÛÛÄÛÛÛÄÛÛ²±°Ä°±²ÛÛÛ²±°Ä°±²ÛÛÛßÄßÛÛÛ²±°Ä°±²ÛÛÛ²±°ÄÄ¿
ÄÄÄ°±²ÛÛÛ²±°Ä°±²ÛÛÛÄÛÛÛÄÛÛÛ²±°Ä°±²Û²±°Ä°±²ÛÛÛÄÄÄÄÄÄÄÄÄÄÄÄ°±²ÛÛÛ²±°ÄÄÄ
ÀÄÄ°±²ÛÛÛ²±°Ä°±²ÛÛÄÛÛÛÄÛÛ²±°Ä°±²ÛÛÛ²±°Ä°±²ÛÛÛÜÄÜÛÛÛ²±°Ä°±²ÛÛÛ²±°ÄÄÙ
ÀÄÄ°±²ÛÛÛ²±°Ä°±²ÛÄßÛÛÛÛ²±°Ä°±²ÛÛÛÛÛ²±°Ä°±²ÛÛÛÛÛÛÛ²±°Ä°±²ÛÛÛ²±°ÄÄÙ

³ "Know you can't fool, children of the revolution" ³
ÀÅÙ NeuroCactus Bulletin Number Seven ÀÅÙ
- BLaDe - FRaCTaL iNSaNiTY - RiPMaX - DaTa KiNG -

³ ³ ³ N ³ E ³ U ³ R ³ O ³ ³ ³ C ³ A ³ C ³ T ³ U ³ S ³ ³ ³
ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ

[7.1] - Contents and Disclaimer
ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ
[7.1] - Contents and Disclaimer ................... Fractal Insanity
[7.2] - Neurocactus News .................................... Ripmax
[7.3] - VoiceMail, The Next Generation ... Fractal Insanity & Ripmax
[7.4] - RIM Remote System ......................... Fractal Insanity
[7.5] - Interesting Easycall features ............. Fractal Insanity
[7.6] - Optic Surfer - The Truth is in here .............. Data King
[7.7] - Optic Surfer - The aftermath ........................ Ripmax
[7.8] - EACS Upgrade .............................. Fractal Insanity
[7.9] - Phreaking Laws ................................... Data King
[7.10] - Greets and Contacting us .................. Neurocactus Team

Attached Files
ÍÍÍÍÍÍÍÍÍÍÍÍÍÍ

[Nc-Index] - Index to first 7 Issues of NC Bulletin .......... Ripmax
[TelcoJam] - Mod File with numerous Telecom Samples ........ The Pick

Disclaimer: The content of this magazine (NC-007) isfor informational
purposes only and the articles described below cannot be condoned by
NeuroCactus and NeuroCactus does not partake in any of the succeeding
activities. The authors accept no responsibility for loss of friends,
loss of freedom or loss of life due to the illegal use of the
activities described beyond. We do NOT do ANYTHING ILLEGAL!!! If you
think you have malicious intentions towards the law or any other
establishment, please do not read this file.

This magazine in its electronic form can not be sold without prior
permission from the authors. It also may not be spread via any sort
of Public Domain, Shareware or CD-ROM package.


³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³
ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ

- [7.2] - NeuroCactus News - [7.2] -
- Written by Ripmax -

³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³
ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ

As the sands fall through the hour glass so does issue seven of the
Neurocactus magazine. Welcome back to the not so informational light
hearted H/P magazine. We apologize for the lateness of this release
but with certain legal matters going ahead (Skeeve) and Datakings
article we thought we better wait and see what happens. We've plenty
of news for this Issue so time to enlighten you.

As we have promised, NC-003 we would track down and our search is
almost complete. We have managed to contact The Pick who informs us
that Scourge sysop of Chiba City has sold his computer but kept his
hard drive so there is hope yet. We have also recovered The Picks
'TELCOJAM' mod file. Those of you from a few years back will probably
recognise the samples. We have included it in this issue.

Around the place we have been reading a few flames at the NC Team for
the lack of HOW-TO information in our magazine. Well let us say this,

1. Some of the members of NC have been busted allready and others are
probably being watched and to release information that would surely
jepordise ourselves is pointless.

2. If we did have such information, surely releasing it in such a
electronic medium would only kill it within a few weeks if not sooner
How many times have we seen things like the SCENEINFO Line being run
for months hassle free and as soon as posted in NC, killed.

3. The purpose of this magazine isnt to pass on information that any
person could use, but rather give you ideas on which a person may
wish to follow up on for themselfs ie active people.

Anyways enough of that. We wont give names as thats childish but Im
sure the people in WA know who we are talking about anyways. If you
guys are so worried why not make your own magazine? Lets see all of
your 'Elite' information.

On another note, we are looking to expand the magazine with feedback
from users either anonmously (not preferred) or alias's. Flames wont
be published but constructive criticism is ok. As you would have seen
in the last issue aswell we accept anonymous articles if there good
enough. Post a message on any of the boards located in the last
article or call DS2 and login as name:NC p/w:NC. Once logged on send
all mail via Ripmax only.

All three Perth VMB hackers who were busted have finished their cases

SIN : 150 Community Service Hours
EXCEL : 9 Months Probation
UNIQUE-1 : 50 Comminity Service Hours - Childrens Court

One Perth guy was also done for AT&T Calling cards so BECAREFUL!

Okay thats enough ramblings from me for this issue.


³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³
ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ

- [7.3] - VoiceMail... the Next Generation - [7.3] -
- Written by Fractal Insanity and Ripmax -

³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³
ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ

ADMIRALS LOG: Stardate 19950807. The coronation service was one week
ago and Im now travelling to Starbase 2624 to meet up with the crew
of the R2 on some R&R. The R2 is also being put into spacedock for
some much needed repairs to the Cabling systems. All systems will be
upgraded to fibre optics soon. The new Galaxy class starship LSD is
awaiting us for a testrun before we decide on its crew.

"Captain FRaC you have the bridge, I'll be in my quaters", commanded
Admiral Ripmax.

"This is Captain FRaC aboard the LSD requesting clearance", says
Captain FRaC.

"Confirmed", replied Base Commander Anubis. "Best of luck out there
boys, kick some fed butt."

A smirk across FRaC's face was the last he saw before the image faded

"Ensign Dataking, Plot a course for the Linux Galaxy, 9 Bogomips",
commanded FRaC," Engage!"

"Now entering sector 1.2.11 Captain", yelled Ensign Dataking.

"I bags the first 10 bugs in it...", shouted Officer Blade

"Nah they are MINE", exclaimed Captain FRaC, "Engage the ftp exec
protocol ensign"

"Too late Captain... the system is ummm gone!",sighed Ensign Dataking

The crew of the LSD were unaware of optic trashers who had beaten
them to the post and had devistated the whole system leaving but a
few peices of debree left in the /tmp directory.

"Get me a traceroute on the last incoming packets", yelled Captain
FRaC frantically.

"Engaging Packet sniffer Captain", came a muffled voice from below
the console.

"Yes i think ive found the source of the destruction, Captain, it
appears to be coming from...", said Officer Blade

**** ALERT **** ALERT **** Red alert is sounded upon the LSD

"What is wrong ensign?", shouted the Captain

"Umm we appear to be getting bombarded with incoming packets!!! The
contents appear to be... WAREZ!!!", screamed ensign Dataking

"Engage the Firewall!" commanded Captain FRac.

"Too late sir," replied Officer Blade, "The forward device array is
too badly damaged."

"Quick plot a course back to starbase 2624 urgently before we
sustain any more damage from the warez!", said Captain FRaC.

The LSD's maiden voyage was cut short due to the work of a optic
pirate and his 'elite' warez, and the ship returns home with the
dazed and angered look upon the crew.


³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³
ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ

- [7.4] - RIM Remote System- [7.4] -
- Written by Fractal Insanity -

³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³
ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ

This is a preliminary introduction to RIM, a system discovered during
a recent trashing run by the perth Neurocactus team. If anyone has any
information about RIM, NC would appreciate the help working this
system out.

RIM appears to be a remotely placeable semi exchange which can offer
all the features of the parent (AXE or Sys12). The official Acronym
has not yet been discovered but I beleive it to be Remote Internal
Multiplexor. The obvious use of the RIM is to provide telephone
services remotely without the need for a full exchange ie AXE or
SYS12.

The RIM unit establishes a connection to the parent exchange in one of
three ways.

1.1: Non-Integrated Mode
-- Interface to parenting switch (AXE/S12) at VF
-- Supports all services currently supported by parenting switch

1.2: Integrated Mode
-- Interfaces to parenting switch directly at 2Mbit/s
-- Supports a number of services provided they are available at
the switch.

1.3: Mixed Mode
-- Interface to parenting switch at VF and 2Mbit/s
-- Supports all services as per 1.1 and 1.2

The features available at the RIM as a subset of the parent switch are
related to the protocol of transmission used. The best protocol and no
doubt the most secure is due for use in Dec 1996 which will allow all
services including easycall to be available at the RIM end.

Here is a field diagram of the COMNET in which the RIM will be
connected to access the remote parenting switch.

Comnet Workstation ---X28--. SULTAN .- Mediation Device - RIMS
\ | / |
\ | X25 `-Modem >< Modem - RIMS
\ | /
Comnet Workstation --LAN--X25---DCN/DDN---------.
/ | \ \
X25 X28 Backup \ \
/ | X25 X28 Backup
/ | \ \
Comnet Database ----- Network Management Group ` After Hours Centre


The reason for COMNET is to be able to access the RIMS units from
anywhere on the Digital Communications Network (Austpac) via DDN. As
you can see, the RIM units can be either directly connected to the
network through a mediation device (protocol translater) or by dial up
modem. This leaves open the oppertunity for someone with protocol
emulation, to dial into the mediation device and emulating a RIM. The
power gained here would be the same as having 'root' on a local
exchange... Naturally if you can get yourself onto COMNET from either
a workstation on the net or getting in from remote through austpac,
you can attempt to hack the RIM unit and of course any of the other
things on the COMNET network.

Now is the perfect time to start attacking such a system as it is
still in testing and i have inches thick of pages of bugs and problems
in the system that might be exploited and the system doesnt appear to
be anywhere near fully operational untill Dec 1996.

The only information gathered so far into the operating system
vulribilities are the account groups which will be on the system.

NMG,NSS,EMG,COC INSTALLER and MONITOR.

The default UserID on the system is STARTUP and is in the INSTALLER
group.

Although it may be in vein to attack such a default account, you never
know it may still be there as the system is still being installed B-)

This is all the information im prepared to publish about the system
which is apparently 'Telecom Confidential'. If you want any more
information please contact Neurocactus directly.


³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³
ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ

- [7.5] - New interesting easycall features - [7.5] -
- Written by FRaCTaL iNSaNiTY -

³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³
ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ

For those who are behind the times (and the internal inconfidence
paperwork) here are some of the new easycall features which may or may
not be available already. Some of these features lead me to beleive
that the abilities of the exchanges as far as privacy is concerned is
being compromised.

Package 3
~~~~~~~~~
Selective ring: Allows the user to define a CLI scrrening list of full
or partial national numbers that will cause a distinctive ring cadance
when calls are received from these numbers. Up to 3 selective rind
screening lists are provided per line each one generating a seperate
distinctive ring.

<OUCH!!! Imagine the consequences here guys... if customers have that
sort of screening power id hate to see what logs they have on the
exchanges>

Selective call diversion: Diverts calls selectively based on a CLI
screening list. The customer creates, and has control over, the
contents of the screening list.

Multiple Subscriber number: Allows multiple numbers to terminate on the
same device (L12). Calls to each number will generate seperate
distinctive ring cadences. Charging applys per number, except for
charges related to the physical access.

Remote control (RCSS): Allows the customer to control features remotely
by calling a given number at the customers home exchange. The customer
is guided through the procedure by a series of RVAs. Access is
controlled by a password. (ehehehehehehe where there is a password
there is a way in)

Automatic Callback (CCBS): This feature allows a calling customer
encountering busy to have the network notify him/her with a distinctive
ring cadence when the called customer becomes free, and automatically
connect the call. Up to five callbacks can be queued at any time.

Some of the above utilise feature tools.

Password control: Allows the customer to change their password

Distinctive Dial tone: Provides different dial tones as required by
various features. An example is facility tone recieved while call
diversion is active.

Distinctive ring: Provides different ring cadence depending on the
characteristics of the incoming call. Examples are for CCBS recall, the
different MSNs or for selective ring according to the screening lists.

Screen list editing: Allows the customer to edit and interrogate the
screening lists used by various features.


³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³
ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ

- [7.6] - Optic Surfer - The truth is in Here - [7.6] -
- Written by Data King -

³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³
ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ

I have noticed that there is a lot of confusion and
mis-information on the Ausnet breakin by Optik Surfer. Since I
became involved in this saga I have learned quite a bit about
it and now is the time to let you, the readers, find out the
truth, or as much of the truth as I can tell you safely.

This article was written on 18/06/95, and has been updated to
be more accurate for the release of NeuroCactus Issue 7.

As you are probably aware, Mr. Skeeve Stevens was recently
charged with several hacking charges, (and also 1 Kiddie Porn)
I make no claims to the validity of information contained in
this article, to the best of my knowledge everything is fact,
however circumstances prevent me from verifying everything as
100% correct.

How it was done
~~~~~~~~~~~~~~~

The following is purely an educated guess on my part, I
believe that this is how it was done, but I do not know for
certain.

Ausnet provide dial in access via a 131 number (131494), or of
course you can telnet/rlogin into their terminal server.

Ausnet does not allow shell access to their machines, when you
telnet to their machines and login you get asked if you want
to change you password, and after this you get logged out.

I believe that the person who committed the breakin simply
gained access to a shell on the machine and then copied the
newuser database. Most probably this was done via the
"newuser" account and one of the many ways you can execute
another shell other than the standard one.

Curiosity Value: For a time you could dial into their terminal
server and login as "newuser", now from here you were expected
to start the registration procedure, however if you decided to
do something like:

ppp /compressed 38400 default

You would start up a ppp session with global access. However
they have fixed this since the Optik Surfer episode. So much
for Ausnet having the best security of any ISP in Australia!
(Their sendmail was also a vulnerable version)

This as I said is purely an estimated guess on my behalf, I
have not had and probably will never have the opportunity to
examine the logs of the machine(s) in question to find out for
certain.


Who is the Optik Surfer
~~~~~~~~~~~~~~~~~~~~~~~

It is my belief, and after reading this article, probably
yours also, that the person who first did this and the Optik
Surfer are two different people.

The reason I believe this is simply because the person I
believe is the Optik Surfer has absolutely no skill when it
comes to computer security.

Before I come out and say who I believe the Optik Surfer is, I
will give you the facts and then you can decide if you agree
with my analysis.

1. Several Weeks prior to the Ausnet breakin, Skeeve spent
several days here in Melbourne, staying at Monash Uni
Halls of Residence with a "friend" (From what I hear she
couldn't stand him after she met him in person).

2. Tuesday, 18th April 1995, Approximately 6am, Optik Surfer
posted a message with the from address of ernst@world.net
(world.net = Ausnet). The contents of this message is
fairly well known but for completeness it is included at
the end of this article.

2a. This message was addressed to Journalists who have email
addresses and also several ISP's. Interestingly enough
most of the non-national service providers are sydney
based ones.

2b. Several hours before this email was posted, Rewt2 was on
the net and was offered 1000+ credit cards that were
"virgin" and offered by the person who "hacked them out".
Rewt2 was offered these cards in exchange for information
pertaining to root level holes on ozemail, he refused the
cards for 2 reasons, the first being he didn't trust the
source, the second being he had a better use for the
hole. The person offering the card details was none other
than Skeeve. Skeeve told him he wanted the information so
that he could tell ozemail and repair his status with
them, they were annoyed with him as he was constantly
connected to them and ran up the equivelant of an $18,000
bill on a free account, which he was apparently given
after telling them about another security hole on their
system.

3. Tuesday, 18th April 1995, 4.30am-6.30am, I was on the net
talking to Skeeve.

4. During this conversation Skeeve wished to know how to
exit from EMACS.

5. I have yet to check, but I suspect ernst@world.net uses
EMACS as his email editor.

6. Wednesday, 19th April 1995, Approximately 5.30pm, The
Australian Federal Police raid Skeeve's home and
confiscate his equipment.

7. Skeeve refuses to supply the Federal Police with his
encryption key for his MAC hard drive, when asked about
this Skeeve told me: "There is Kiddie Porn on there.....I
was working on an article for the Sydney Morning Herald".

8. Skeeve is a publicity freak, and considering he was
telling me before the Ausnet break in occurred that he
needed more exposure, I have no doubts as to him being
willing to pull a stunt such as this.

9. Skeeve at one stage was telling people that 5 or 6 other
people told him that I did it, when questioned about this
Skeeve told me "Frank told me that", I had someone I know
ask Frank if this was true, Frank said "no".

10. When Skeeve was again confronted about him saying it was
me, he started saying that he had heard it was SPiN-DoC
had done it (I know Spin fairly well - this is NOT his
style).

11. This is unconfirmed, however I believe the source: Whilst
Skeeve was in Melbourne, he was using a friends
ex-girlfriends account at monash uni for access to the
net (Whether she knew or not I don't know). Apparently
this person has been speaking to the AFP and will now be
appearing in court for them as a witness.

12. There is a video tape floating around of the Ausnet
breakin, Optik Surfer mentions it in his email, I have
heard from someone who has this tape, and apparently the
tape was supplied to them by Skeeve.

As you can see I believe that it was Skeeve, however as I said
earlier I do not think he did the original hack, I believe
someone told him how to do it.

Statement
~~~~~~~~~

This statement is addressed to any people in the media who
happen to come by this file.

I, Data King, on behalf of all Hackers and Phreakers here in
Australia say the following:

1. We believe that the Optik Surfer Incident, is not an
accurate representation of what we do or our moral and
ethical standards.

2. The person calling himself Optik Surfer, should in our
opinion get the maximum punishment applicable under
Australian Law.

As always I am happy to talk to the media on Hacking and
Phreaking, I am also prepared to make statements concerning
Carding and Credit Cards, provided it is made clear to the
readers/viewers that I am talking from a technical viewpoint
and not as a representative of people involved in credit card
fraud on the internet.

Contact Details
~~~~~~~~~~~~~~~

I (Data King) can be contacted at any of the following places:

Internet: dking@suburbia.apana.org.au

BBS: ReWTed loGik as Data King
BBS: Destiny Stone II as Data King

Optik Surfer's Email
~~~~~~~~~~~~~~~~~~~~

This is a copy of Optik Surfer's email message, minus the
credit card details and edited to fit in 80 columns.

Interestingly enough, Skeeve is also known for his bad
spelling.....

From ernst@world.net Tue Apr 18 06:06:16 1995<br>
Received: from world.net (sydney2.ausnet.net.au
[192.190.215.5]) by oznet02.ozemail.com.au (8.6.10/8.6.5) with
ESMTP id GAA12354; Tue, 18 Apr 1995 06:06:13 +1000
From: ernst@world.net
Received: (from ernst@localhost) by world.net (8.6.8.1/8.6.6)
id GAA15253; Tue, 18 Apr 1995 06:04:01 +1000
Date: Tue, 18 Apr 1995 06:04:01 +1000
Message-Id: <199504172004.GAA15253@world.net>
To: davidson@ozemail.com.au, dhiggins@ozemail.com.au,
jhorey@ozemail.com.au,
julierob@ozemail.com.au, postmaster@apana.org.au,
postmaster@dialix.com.au, postmaster@geko.com.au,
postmaster@magna.com.au, postmaster@mpx.com.au,
postmaster@next.com.au,
postmaster@onthenet.com.au, postmaster@ozemail.com.au,
postmaster@ozonline.com.au, rod@theage.com.au,
sstevens@ozemail.com.au,
sue@smh.com.au, tgl@ozemail.com.au, tsarno@smh.com.au
Subject: ****** URGENT - PLEASE READ *******
Content-Length: 5148
Status: OR


The mail you are now reading, is from an account at Ausnet,
that has been hacked.

This mail contains details of Ausnets lack security, and the
way they left the credit card details of all their users, out
on the open which anyone could have picked them up.


This is the stages of the Ausnet hack.

* registered fake account at Ausnet
* logged into melbourne.world.net shell server.
* sydney2.world.net (main fileserver) was mounted on the
melbourne machine for complete access to any user.
* the 'newuser' account which was used to register the credit
details and make peopels accounts, was wide open. In that
directory contained a number of files which contained the
credit card details of all 1 thousand or more clients of
Ausnet.

* this file has been accessed, and distributed by hackers, and
CCers all over the world.

* in an attempt to alert people to this crime of stupidity by
Ausnet I contacted some people I thought may be able to
assist in getting it publicized, and Ausnet brought to be
responsible for their screw up.

I let a journalist film my access into Ausnet and some other
sites, to prove it, incase, like many other times, the company
has denied it. I will leave it up to the journalist concerned
to decide what he will do with that film.

* The afternoon of the easter monday, i hacked Ausnets web
server, in an attempt to alert their clients myself... it
seems thou, they were quick to find and fix the situation.

Below is an extract of the Credit card log on Ausnet.

The list of credit card deleted.

well thats a sample. there is 1 thousand or more details, and
almost all of those will be use for carding.

Ausnet has a lot to answer for.

I cannot be contacted for futher information about this. I
hope you will make proper use of this information.

If more informatio is needed.. please post a message to the
aus.org.efa newgroup with the subject "Help needed" and no
body. and if I think it is worth it, I will contact the
author.

Remeber - Too Many Secrets

for the sake of it. You can refer to me as 'Optik Surfer'

bye for now.
.


-=<END>=-


³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³
ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ

- [7.7] - Optik Surfer - The aftermath - [7.7] -
- Typed by Ripmax -

³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³
ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ

Hacker Charged Over AUSnet credit Breach
Taken from West Australian October 17.

A television station sponsored an attack on a Sydney Internet service
provider last April that nearly sent it out of business, according to
representitives of AUSnet computer services.

These allegatations were made as federal police computer crime experts
arrested and charged a hacker last Thursday who allegedly compromised
credit card records at AUSnet computer services.

AUSnet's media relations spokesman, Peter Sertori, said the hack
undermined the integrity of future development of communications
infrastucture in Australia. He would not identify the Television
station.

"Hacking is not an activity that should be treated lightly (by the
courts) - its not a hobby, its a commercial crime", he said. "For a
television station to be sponsoring this sort of activity is
reprehensible.

He claims the attack virtually crippled the provider, with thousands
of people cancelling their accounts because of the publicity that
surrounded the security breach.

It is likely that AUSnet will seek civil compensation from the
station in the near future, he said.

The attack on AUSnet allegedly cost the company $2 million in lost
contracts and forced banks to reissue scores of credit cards whose
numbers the hacker claimed to have published on the Internet.

Officers from the AFP's computer crime unit charged the 23-year-old
self proclaimed Internet consultant with a dozen offences at Sydney
Police Centre including six counts of unlawful access to data in a
computer and a count of possesing child pornography, a federal police
spokesman said.

He was released on bail and is due to appear at ST James local court
on October 30. The charges followed a six month investigation.

A hacker known as the Optik Surfer gained access to AUSnet world wide
web server in mid April,cracked the password of a system operator and
stole up to 1400 credit card numbers.

Optik Surfer then copied AUSnet subscriber information, including
credit card details, and claimed to have distributed it on the
Internet.

Mr Sertori said AUSnet shared the some of the blame for the incursion
as technicians had copied files between the company's Sydney and
Melbourne offices.

The hacker's message "Remember too many secrets" appeared on the
AUSnets home page. The quote comes from the 1993 hacker cult movie
Sneakers starring Robert Redford.

Electronic graffiti left by the Hacker first drew attention to the
secuirty breach on the AUSnet site.

"Did you know that AUSnet clients credit card details are all sitting
readable on their system?!?!?!, " the message read, " We have the
credit card numbers, and it has allready been distributed to many
other hackers and carders around the world."

Police inquiries are continuing and further charges are expected.


³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³
ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ

- [7.8] - EACS Upgrade - [7.8] -
- Written by Fractal Insanity -

³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³
ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ

Here is some information which some members of the scene may find
useful and worrying. This source of this information remains
classified to NC.

Subject: Electronic Access Control System (E.A.C.S)

Conversion of Exchnage access from Abbloy keys to E.A.C.S is under-
way with front door access to Exchanges now being by E.A.C.S card
(and phone) and rear door access by card only.

By the end of today Mullaloo will only have access by card and phone.

At the end of the Total conversion all phones will have been removed
and a sign left to contact hamersley for entry. If you dont have a
card or mobile you wont get in.

AFM's and the Fire brigade will key access for emergencies.

---------------------------------------------------------------------

For those of you who dont understand the above, Telstra is worried
about people wandering around inside their exchanges at night (heheh)
and is upgrading the already high security abbloy locks with swipe
magnetic card locks and also the user must use his/her mobile phone
to call inside to gain access... It now looks like the rear door will
be the only entry point assuming the EACS can be broken (of course it
can). Although this bulletin only mentions two exchanges, it is most
likely that all the metro exchanges will be getting this upgrade.
This information made me wonder after I thought of some mates in
melbourne who used to go into exchanges at night and whoomp them B-)


³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³
ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ

- [7.9] - Phreaking Laws - [7.9] -
- Written by DataKing -

³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³
ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ

PART VIIB - OFFENCES RELATING TO TELECOMMUNICATIONS SERVICES

Interpretation - definitions
----------------------------

85ZB. In this Part, unless the contrary intention appears:

"carrier" means"

(a) a general carrier; or
(b) a mobile carrier; or
(c) a person who supplies eligible services under a class
licence issued under section 209 of the Telecommunications
Act 1991;

"communication" does not include a communication solely by means of
radio communication;

"communication in the course of telecommunications carriage" means a
communication that is being carried by a carrier, and includes a
communication that has been collected or received by a carrier for
carriage by the carrier, but has not been delivered by the carrier;

"telecommunications network" means a system, or a series of systems, for
carrying communications by means of guided or unguided electromagnetic
energy or both;

"telecommunications service" means a service for carrying
telecommunications by means of guided or unguided electromagnetic
energy or both.

Interpretation - person acting for a general or mobile carrier
--------------------------------------------------------------

85ZBA. For the purposes of this Part, a person who does any thing for or
on behalf of a person who is, or persons at least one of whom is, a general
carrier or a mobile carrier, is, in respect of:

(a) the doing by that person of that thing; or

(b) any rental, fee or charge payable for or in relation to the
doing by that person of that thing; or

(c) the operation by that person of a facility in connection with
the doing of that thing; or

(d) a facility belonging to that person; or

(e) the operation by that person of a satellite;

taken to be a carrier.

Interpretation - expressions used in Telecommunications Act
-----------------------------------------------------------

85ZC. Unless the contrary intention appears, expressions used in this Part,
and in the Telecommunications Act 1991, have the same respective meanings
as in that Act.

Wrongful delivery of communications
-----------------------------------

85ZD. A person shall not knowingly or recklessly cause a communication in
the course of telecommunications carriage to be received by a person or
telecommunications service other than the person or service to whom it is
directed.

PENALTY: Imprisonment for 1 year.

Improper use of telecommunications services
-------------------------------------------

85ZE. A person shall not knowingly or recklessly:

(a) use a telecommunications service supplied by a carrier to
menace or harass another person; or

(b) use a telecommunications service supplied by a carrier in such a
way as would be regarded by reasonable persons as being, in all
the circumstances, offensive.

PENALTY: Imprisonment for 1 year.

Defrauding a carrier
--------------------

85ZF. A person shall not, by means of an apparatus or device or otherwise:

(a) defraud a carrier of any rental, fee or charge properly payable
for or in relation to a telecommunications service supplied by
the carrier; or

(b) knowingly or recklessly cause a carrier to supply a
telecommunications service to another person without payment by
that other person of the proper rental, fee or charge.

PENALTY: Imprisonment for 5 years.

Interference with telecommunications services
---------------------------------------------

85ZG. (1) A person shall not knowingly or recklessly manipulate, or tamper
or interfere with, any facility operated by a carrier in such a way as to
hinder the normal operation of a telecommunications service supplied by the
carrier.

(2) A person shall not knowingly or recklessly use or operate any
apparatus or device (whether or not it is comprised in, connected to or used
in connection with a telecommunications network) in such a way as to hinder
the normal operation of a telecommunications service supplied by a carrier.

PENALTY: Imprisonment for 2 years.

Sending signals to satellite
----------------------------

85ZH. A person shall not, without lawful authority or excuse, knowingly or
recklessly transmit a signal to a satellite operated by a carrier.

PENALTY: 120 penalty units.

Interference with carrier facilities
------------------------------------

85ZJ. A person shall not knowingly or recklessly tamper or interfere with a
facility belonging to a carrier.

PENALTY: Imprisonment for 1 year.

Equipment used for unlawful purposes etc.
-----------------------------------------

85ZK. (1) A person shall not:

(a) connect equipment to a telecommunications network with the
intention of using it in, or in relation to, the commission of an
offence against a law of the Commonwealth or of a State or
Territory; or

(b) use equipment connected to a telecommunications network in, or
relation to, the commission of such an offence.

PENALTY: Imprisonment for 5 years.

(2) Subsection (1) does not apply in relation to equipment if the
connection by a person of the equipment to a telecommunications
network would not be in contravention of section 263 of the
Telecommunications Act 1991.

Unauthorised Call - switching devices prohibited
------------------------------------------------

85ZKA. <1> A person shall not:

(a) manufacture;

(b) advertise, display or offer for sale;

(c) sell; or

(d) use, operate or possess;

equipment that the person knows is equipment of a kind that, when connected
to a telecommunications network operated by a carrier, enables 2 persons
each of whom, by means of different telecommunications services each of which
is supplied by a carrier, calls that equipment (whether or not either of the
persons is aware that the call the person is making a call to such equipment),
to send communications to, and receive communications from, each other, over
that network during those calls.

PENALTY: Imprisonment for 5 years.

<2> Subsection <1> does not apply to equipment:

(a) if the connection of the equipment to a telecommunications network
by a person would not be in contravention of section 253 of the
Telecommunications Act 1991; or

(b) if the equipment is used, or intended for use, by a carrier in
connection with a telecommunications service or the operation or
maintenance of a telecommunications network.

<3> For the purposes of establishing a contraventions of subsection
(1), if, having regard to:

(a) a person's abilities, experience, qualifications and other
attributes; and

(b) all the circumstances surrounding the alleged contravention of
that subsection;

The person ought reasonably to have known that equipment is equipment of the
of the kind referred to in that subsection, the person shall be taken to have
known that the equipment is equipment of that kind.

Interception devices prohibited
-------------------------------

85ZKB. <1> A person shall not:

(a) manufacture;

(b) advertise, display or offer for sale;

(c) sell; or

(d) possess:

an apparatus or device (whether in an assembled or unassembled form) that the
person knows is an apparatus or device of a kind that is capable of being
used to enable a person to intercept a communication in contravention of
subsection 7(1) of the Telecommunications (Interception) Act 1979.

PENALTY: Imprisonment for 5 years.

<2> Subsection (1) does not apply:

(a) to an apparatus or device unless the apparatus or device could
reasonably be regarded as having been designed for the purpose, or
for purposes including the purpose, of using it in connection with
an act that, if not done in any of the circumstances referred to in
subsection 7(2) of the Telecommunications (Interception) Act 1979,
would contravene subsection 7(1) of that Act;

(b) to the possession of an apparatus or device by a person in the
course of the person's duties relating to interception of
communications passing over a telecommunications system (being a
telecommunications system within the meaning of the
Telecommunications (Interception) Act 1979), that is interception
of communications otherwise than in contravention of subsection 7(1)
of that Act; or

(c) to the:

(i) manufacture;

(ii) advertising, displaying or offering for sale;

(iii) sale; or

(iv) possession;

of an apparatus or device of the kind referred to in subsection (1)
of this section in circumstances specified in regulations made for
the purposes of this subsection.

<3> For the purposes of establishing a contravention of subsection
(1), if, having regard to:

(a) a person's abilities, experience, qualifications and other
attributes: and

(b) all the circumstances surrounding the alleged contravention of
this subsection;

the person ought reasonably to have known that an apparatus or
device is an apparatus or device of a kind referred to in that
subsection, the person shall be taken to have known that the
apparatus or device is an apparatus or device of that kind.


³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³
ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ

- [7.10] - Greets and Contacting us - [7.10] -

³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³
ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ

If you would like to contact us call any of the following places :

Bulletins Boards
----------------
Destiny Stone II (+61-9) -=- The Temple (+61-8)
Euthanasia (+61-7)

WWW Homepages
-------------
Neurocactus Homepage - http://psinet.net.au/~ripmax
Andrews Funnel Web - http://suburbia.suburbia.net/~dking

IRC
---
#hpaus or #aussies

Our Special Regards go out to (In Alphabetical Order)

Anubis : Get on the Net more.
Anthrax : Good luck with the rest of your case.
Cairo : Vanished without Trace
Captain Crunch : Your still wierd B-)
Enigma : Your the biggest warez lamer <g>
Freestyle : See you on the Net again soon!
Hook : Mud JUNKY!
Jesta : Join the MUD! :)
Metabolis : Thanx for the greets in the VLAD
Proff : Any year now you may be finished.
Slash : Collosus Video is AWESOME.
Xstatic : Party Hard!
All MUD Junkys : See you in RITUAL SACRIFICE!

³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³ ³
ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ ÀÅÙ

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT