Copy Link
Add to Bookmark
Report
System Failure 12
... have i told, you lately, that i love you, secret squirrel? ...
,ab da, ,ab da, ,ab'` 'dab'` 'da,
,ab'` 'da$$$.. $$$ab'` 'da$$$: $$$ab'` 'da$$$: $$$: $$$
$$$: `""""""' $$$$$::: `""^%.,g#7$$$$: °$$$$$: $$$: $$$
`""""^%gHHHg.`"""^&^"""^%ghh77' `""""'' '$$$$$: $$$: $$$
.ggg. $$$$$: .gghgg. $$$$$: .ggghh. $$$$$>> $$$: $$$
$$$: $$$$$: $$$$$: $$$$$: $$$$$: $$$$$: $$$: $$$
$$$: $$$$$: °$$$$$: $$$$$: $$$$$: $$$$$: $$$: $$$
$$$: $$$$$: $$$$$: $$$$$>> ¬¼"`` ``"È$: $$$: $$$
$$$>> $$$$$: $$$$$: $$$$$: l anarkzznOn l: $$$: $$$
$$$: $$$$$: $$$$$>> $$$$$: $»,.. ..,ɬ: $$$>> $$$
$$$: $$$$$: $$$$$: $$$$$: $$$$$: $$$$$: $$$: $$$
$$$: $$$$$: $$$$$: $$$$$: $$$$$: $$$$$: $$$: $$$
:: :::: $$$::: $$$$$:: :$$$$$: ::$$$$$::: $$$$$: ::$$$$$:: :$$$:: :$$$ ::: ::
$$$:` `"""""""^%$$$$$: $$$$$: $$$$$: $$$$$: $$$: °$$$
$$$: .gggaa: $$$$$: °$$$$$: `"""""""""""""""' ggg. :$$$
``"Ó%g³$$$$b: `"$$$: ``777"ýý%%ýý"777 .sysfail12$$$³g%½"''
`Ó*f_ `"ýý%%ýý"' `"ýý%%ýý"' _f*½`
` ÄÄ ..>> systemfailure#12 <<.. ÄÄ '
sys#12. anarchist noname
.----------------------------------------------------------------------------.
| System Failure: Issue #12 |
`----------------------------------------------------------------------------'
Yeah yeah, so I'm late getting the issue out. What else is new? Sorry for the
delay in releasing this issue, I've been busy with school-type stuff like
finals and such. But hey, now that I'm finished with high school, I can sit in
my room all day and devote ALL my time to System Failure! Well, maybe not.
Anyway, this is our one-year anniversary issue; the group was started a year
ago on May 3rd, so like, happy anniversary to us, dammit!@# Speaking of
holiday-type stuff, happy birthday to Infinite Zero too, whose birthday is
this weekend. Thanks once again to Anarchist for the opening ascii (what would
we ever do without you?). Look for a big site update in a few days (after I've
finished with graduation and had time to chill). Enjoy the issue!
--Logic Box [6/3/98]
.----------------------------------------------------------------------------.
| http://www.sysfail.org/ |
| [sysfail@syfail.org] |
`----------------------------------------------------------------------------'
.----------------------------------------------------------------------------.
| CONTENTS |
| SysInfoTrade by SysFail Staff |
| The History of System Failure by Logic Box |
| Milw0rm Hacks Nuclear Site: An Interview With J.F. by Pinguino |
| Advanced Looting and Trashing by Mr. Sonik |
| Kids and Violence Today by Saint skullY the Dazed |
| Bypassing Your Friendly Neighborhood Firewall by Duncan |
| Messing With Cell Sites by Skitso |
| Reading and Understanding the Assignment Area from A "T" Order by FoneMan |
`----------------------------------------------------------------------------'
<-------+
| SysInfoTrade
+----------------> staff@sysfail.org
--Pinguino's cat Linenoise is the new System Failure mascot. Go look at his
page at http://www.leper.org/~linenoise/ ... you can e-mail him at
kitten@linenoise.org (courtesy of Alienphreak and JF).
--A girl in Fallbrook, CA by the name of Mary Kait Durkee refused to say the
pledge during history class. She claims to not believe in God, thinks that
society is violent, and the government corrupt. She refuses to show
respect to a pledge with whose beliefs she didn't believe in. After being
sent to detention, she contacted the ACLU and are fighting for her first
amendment rights. They're suing her school.
--The goldmine of webpage information sources is at www.webproforum.com,
sponsored by the IEC (International Engineering Consortium). With online
tutorials by companies such as Nortel, Sun, Lucent, HP, AT&T, and
BellSouth, they cover topics such as radio telephony, ss7, pcs,
programmable switching, ATM, cable modems, net security, and so much more.
The main page at www.iec.com lists major technology conventions and other
interesting topics.
--E3 was last weekend, and Sega announced a console that will outdo current
game consoles. Dreamcast. It runs on Windows CE, has a 200MHZ chip, and 64
audio channels. The new improvements are courtesy of Yamaha, Hitachi,
Microsoft, and NEC. [Editor's Note: BAH! Fuck Sega!]
--milw0rm has been VERY active recently.. http://www.hektik.com/hacked/
shows before/after of all of their recent webpage hacks.
--Saint skullY is starting a new project called Open Linux Standard
Distribution (OpenLSD). Basically, he's gonna combine the OpenBSD source tree
with the Linux kernel. For more info or to help, go to http://www.openlsd.org/
or e-mail skully@openlsd.org.
--April 1998- MOD is apparently still quite active and hitting the news
with their recent breakin and theft of Defense Information Systems Network
Equipment Manager (DEM). That long phrase is just a piece of software used
for tracking and communication with submarines. The DOD claims that the
program is unclassified. An interview between Wired and a 24-year old
Russian member claimed a different side of the story.
"We could launch the DEM program using the DISA systems as a trusted
gateway, thus gaining very important router/repeater information about the
DISA," he said.
"We could then either reconfigure/shut down the equipment, or attempt to
compromise it to change routes through systems we 'own,' then sniff from
the owned DISA boxes," he said, describing a process of setting an
invisible recorder to capture keystrokes or network traffic on a system."
"Our goals are to demonstrate the power of 15 or so individuals over large
organizations, through publicizing break-ins and data retrieved," he said.
--May 18, 1998 -- BEEPLESS! (submitted by Kaeiri) Today over a million
people lost their pager service due to a "satellite spinning out of
control". PageNET, Airtouch, and other pager companies were affected,
including MY pager! Damn satellite control centers. Important resources
like hospitals/doctors, fire departments, police, etc lost their critical
paging protocol. Police report there was a lowered rate in drug deals
because of narcotics dealers losing their ever-used paging (and cellular?
being investigated) needs. The newspapers report that service will be
back up by tommorrow morning, and they are investigating longterm effects
and damages. Check out http://www.pagemart.com/satellite.htm for more
info.
--Checkout www.linenoise.org ..active (is that my word of the day or
something?!@$) web board where you can network with people in your area,
and a nice collection of textfiles.. soon they will offer every issue of
System Failure as well.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
The History of System Failure
by Logic Box (logic@sysfail.org)
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Contrary to what some people may think, System Failure was never an organized
project to begin with. The zine--and the group--was born on May 3rd, 1998, in
Cupertino, California.
I had met Pinguino on IRC a couple of weeks earlier. After seeing a
particularly elaborate graphic that she'd drawn for someone's webpage, I
followed the accompanying link to www.penguinpalace.com--Penguin Palace
Multimedia. I read a bit about the history of the company, about the things
they did, the places they'd been, and an in-depth history of a very amazing
girl named Joyce Kolb--or, as most of us know her, Pinguino.
I was very impressed with her website, and what I knew about her. I'd seen her
in #rock on IRC for awhile, but I'd never really bothered to talk to her. I
saw #peng mentioned on penguinpalace.com, and decided to go there and check
things out. I talked to Pinguino for awhile, and started hanging out in #peng
a lot. Pinguino and I became friends pretty fast; she even sent me cookies
and stuff for my birthday. :)
A couple weeks after I'd started hanging out there, I saw Pinguino talking to
someone about a trip to the San Jose area that she was making on the next
weekend. Seeing as how I live in the San Jose area, I thought it might be
pretty cool to meet her. So, I grabbed my good friend Darkcactus and we headed
over to DeAnza Community College, where she was helping her friend Mr. Frost
out with an anti-gun thing called TAG (Tuffmen Against Guns) at DeAnza's
monthly expo-type thing.
After walking around the expo for a couple hours, we eventually met up with
Pinguino, Mr. Frost, and his girlfriend Gerry. Me, Ping, and DC walked around
the college campus for a while and talked about various things. We found out
that she planned to move to Denver, Colorado in the next two weeks.
We went back to Mr. Frost's house to chill for awhile, and watched Pinguino
dewdle. After sitting on our asses for an hour or so, we decided we were
hungry, so the three of us (me, Ping, and DC) went out to eat at a pizzeria
down the street called Gumba's.
Over lunch, we talked about Penguin Palace and the various projects she had
going. One, she said, was a H/P-themed electronic zine that touched a bit on
social issues and the like. Originally conceived to act as a sort of
replacement for the recently-retired PLA (with which I had been--and still
am--heavily involved), she called this project System Failure. She wanted to
associate a tight-knit group with it that would grow over time, and she asked
me to head the project, with Darkcactus as my second-in-command. Since the
retirement of PLA, Kenshiro Cochrane and I had been throwing around the idea
of starting our own zine. Remembering this, I asked her if he could be
involved with this project as well. She knew him from IRC too, and said yes.
System Failure was born.
We spent the next few days planning out the layout of the zine and the
website. We also drew up a detailed list of membership acceptance guidelines,
which would be made known only to members of the group. After a few more days
of hanging out, we said goodbye to Pinguino, and she went home to San Diego.
I thought the project over. I was excited at the idea of starting a zine, and
maybe--just maybe--having it be a huge success. I had no clue how big of a
following we would get. Boy, was I surprised.
The first issue released in late June, with the second issue--and the
website--going up the day before Darkcactus and I left for DefCon 5. We hooked
up with Pinguino once again at DefCon, and managed to pull off a pretty
successful showing with our booth and all (I'd call radio coverage, TV
coverage, and the fact that a newspaper reporter took us trashing a pretty
successful showing, wouldn't you?).
The zine grew over the next few months. While it was difficult at first to get
people to submit enough articles (I made a rule never to publish without at
least seven articles), it became easier as time progressed. The group also
grew steadily. I knew from day one that Saint skullY and Mr. Sonik, my
longtime friends from Oregon, would be members of System Failure in time. Spee
was a pretty unexpected--but worthwhile--addition. Though Darkcactus is a good
friend to all of us, he left the group in April of 1998, due to lack of
interest (he just isn't the writing type).
Months passed, the zine grew, we all had our ups and downs, and Pinguino
eventually relocated to Texas. She came to visit in February of 1998 for a
month, and we began planning for DefCon 6 (we've got some cool stuff planned
too). I've become very close to her in the year that I've known her, and she
has managed to convey a very strong "family" feeling among the members of the
group. Unlike a lot of huge groups you see out there every day, System Failure
is not just a ragtag band of like-minded people who are in a group for name
recognition--we are a group of very close friends (this is why we're so
selective of our members--and why we have so few compared to other groups).
And now, a year has passed. A year since I met Pinguino--who, in that short
time, has become my best friend. A year since System Failure was started--the
group, the zine, the following. A new year begins here. We never could have
made it this far if it had not been for our readers, and our contributors.
While I am grateful to each and every one of you, extra-special thanks goes to
these people:
Anarchist (practically all the opening asciis we've ever had)
BarKode (all your support and the stuff you've done for us)
JF (yours and Milw0rm's support)
Junk (your criticism and publicity)
Mr. Frost (one of the biggest moral supporters we've got)
Muerte (lots of moral support)
Pesto (for helping us when things aren't going too good)
RedBoxChiliPepper and Colleen Card (we wouldn't be here if it weren't for you)
Velocity (your criticism, your support, and just being really fucking cool)
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Milw0rm Hacks Nuclear Site: An Interview With J.F.
by Pinguino (pinguino@sysfail.org)
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Ping: J.F... of Milw0rm.. where did you guys come up with that name?
J.F.: Well, it was a joke really... hehe. We wanted something funny, yet
topical on the military side of things, as that's what we planned to do.
We act as a trojan "worm" within the military.. not just US military but
other military, such as India. :)
Ping: Milw0rm is an international group.. with members in which countries?
J.F.: 2 in UK, 2 in US, 1 in NL (Netherlands), 1 in NZ (New Zeland).
Ping: Describe your recent break-in with the Indian nuclear facility.
J.F.: Well...it was easy, lame security, it's funny because they had their
internal LAN connected up to the internet without a firewall or
anything. The motd said - PLEASE DO NOT TURN OFF MACHINES AFTER USE..
hahaha.. lame ass fucks.. and we gained sensitive data regarding the
recent nuclear test by India.
Ping: Why do you think they were so lax in security? Ignorance?
J.F.: Probably didn't realize, perhaps they couldn't afford it? Who knows.
Ping: Do you think your act will spur similar instillations to secure their
systems? Not only in India, but in other nations?
J.F.: Well it had better, because Pakistan WILL be owned.. that's a promise.
Ping: Are you now on a crusade to show the truth to the world about nuclear
threats, or something different?
J.F.: Basically, we are against all this nuclear shit, what's the point? We
want peace, not war, and surely the only use of nuclear weapons is for
war. We want to uncover details of these tests and prove that nothing is
safe, and we will do that. We have already started work and scanned
everything, madly... we will expose more.
Ping: For the most part the general population feels "safe," with no threat of
nuclear war anytime soon. Is your hacking a demonstration to show that
there is a threat? Or are you actively deleting files that will hinder
the testing and research of these deadly weapons?
J.F.: Well... I haven't personally deleted any files, although I know one
member of Milw0rm did wipe out several subnets on their server (not a
good idea). What I am basically showing is.... that DATA IS NOT SAFE, it
should not be kept on a server which is accessible from the internet. If
I was an international terrorist I could cause A LOT of trouble, but I'm
not. But seriosuly, the info I have is nothing to be joked with, it's mad
info which does NOT need to fall into the wrong hands.
Ping: Kinda funny that its people like you that these corporations are afraid
of. What would you recommend to these companies to prevent similar
attacks?
J.F.: I would tell them to stop putting sensitive dox on networks that can be
accessible from the internet, it's dumb and should be stopped. I would
also patch a hell of a lot on their server.
Ping: Has the Indian site responded in any way yet? Notices on their webpage
or anything? What's the URL anyway?
J.F.: They have patched it, but I have still got access to their server (I'm
on it now, BTW). The URL is http://www.barc.ernet.in/
Ping: Has Milw0rm decided what they want to do with the information obtained
from that particular site?
J.F.: We are playing it by ear, gaining more info, seeing what happens. We
have not yet found out India's reaction to what has happened.. as far as
I know they were unavailable to comment.
Ping: Do they realize how much information you guys have, or just think that
their webpage was hacked (in your estimation)?
J.F.: They think it's a webpage hack... but they know more. They just don't
know the extrent.
J.F.: Here's a quote by Peter Neumann, a critical infrastructure and security
expert with SRI International: he said that the three teens weren't as
much of a threat as terrorists, but that India was "way behind" America
in terms of security. HOW THE FUCK DOES THIS G1MP KNOW WE AREN'T
TERRORISTS?? They are treating us like "dumb kids" but how does he know
we don't work for a terrorist organization? Although, we don't, it shows
how easy it is to own this sort of thing. It's stupid and people like
Peter Neumann should NOT say things like that without knowing the TRUE
extent of what we have. That really annoys me, I just saw that and he
talked about our hack and the info we pull.. .it just goes to show how
clueless they all are....
Ping: No kidding.. he assumes that since the media thus far has called you
"kids," that you work alone. People shouldn't assume things when many
lives could be at risk.
J.F.: We have information realting to ALL the tests, detailed intrinsic
reports, everything....
Ping: With that sort of information, what *could* Milw0rm do? On its own,
without selling the information to anyone.. hypothetically.
J.F.: Unless we wanted to declare our own war, nothing really. We could only
use the information to work with others, but that would start a war and
that's not what we want. This is a demonstration to show how easy it is
to do this. We could, in theory, start a nuclear war. We know the exact
limitations of India's nuclear weapons from their test results.... this
could easily be exploited. We do NOT want this information to get into
the wrong hands, which is why it should be taken off... it's crazy and
it makes me angry. :/
Ping: Right... I'm sure that governments have their own private staff that
tries to accomplish what you guys did in under 20 minutes.
J.F.: It took us about 10 minutes to root the server (maybe less) and then we
just pulled the dox. So why don't they fix it? Stupid fools.
Ping: They prolly didn't know it was broken. =)
J.F.: Probably not...hehe..
J.F.: A VERY HAPPY 1ST YEAR ANIVERSARY TO SYSFAIL!#@! I LUB J00 ALL... and I
hope to see you all at DefCon. I just gotta raise some more cash (if
anyone wants to donate...tell me!#@!). LATERS Y'ALL!
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Advanced Looting and Trashing
by Mr. Sonik (sonik@sysfail.org)
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
By now you have probably seen plenty of articles on trashing and looting for
anything from free food to eleet telco warez. That's the problem--I have read
plenty of articles and consider myself an expert on this topic, and I've
decided to give some good ideas and info to help you make the most of your
time. I have spent many hours of my time reading docs about trashing before
accually trying it; I have had to throw most of the knowledge away that I have
gained through reading, simply because it's nothing like some people say it
is.
My first trip to the telco yard was a waste; I listened to an article that
said things like "make your trip fast" and "get things that are easy to grab."
Bullshit, if you want to get somthing neato you're gonna have to look hard and
take a little time to make your trip worth going on. First off, let's look at
a list of things to take with you on your trip.
1. A police scanner is a must; since my favorite telco lot is just near the
edge of city limits, I put the police and sheriff in one empty memory bank
and scan between the two of them. I also have an earphone so that I don't
have to have the scanner blaring away and giving me away to any concerned
citizens or security.
2. Some nice black clothes and a black hat. This is wise because you're going
to be out at night (most likley). Make sure that you have plenty of pockets
for your scanner, a flashlight, wire cutters for barbed wire, and some other
tools like mace or whatever makes you feel safe. Make sure you can get to
these tools quickly in case you have to take some evasive action.
3. A duffle bag or a backpack. I prefer a backpack beacause it's easier to run
with it on compared to a duffle bag, but that is my own personal
preference.
4. Tools. Some of the things I like to take with me are a good heavy duty
flashlight. I like the little mag lights that take two "AA" cells; these
lights are around $12 and are waterproof and very durable. I'm sure you
could use it to break a window, and they come with a spare bulb. The
batteries seem to last longer than the "AAA" cell lights and they are a tad
brighter, plus they are small enough to fit in your back pocket. Another tool
I may invest in is a slim jim to open car doors without breaking windows
out. I also like to have some good sharp side cutter pliers that are
capable of cutting chain link fence and barbed wire. The last thing that
may be handy is some 18-inch handle bolt cutters. These work great on
padlocks, but require a little more muscle than the longer-handled ones;
they fit in a backpack easily and are about $30 at a local hardware store
like Home Depot. Although the bolt cutters are handy, they are certainly
not required, and you may choose to leave them behind because of their
weight. It's your call.
5. Now for some things that you should absolutely _not_ take with you. A
laptop computer, your mother, noisy key/wallet chains, your pet rock, dog,
cat, frog, etc. And definitely not that noisy-ass motherfucker down the
street, or anyone you can't trust.
Okay, now that you have a starting point of what to pack, here's what to do
when you get there. First, scope the place out a time or two. I reccomend
going on a couple of different scouting trips at different times of the night
to see if there are any security guards there or maintenance crews of 24-hour
staff people. While you're there, take note of the different entrance and exit
points that you think are fairly secluded and easy to use. If you have to take
the fence apart, try not to break it; use your cutters as a last resort.
Remember, the less tracks you leave, the better. I like to bend the corner of
the fence apart and crawl underneath it whenever possible. If the fence has
fat holes in the chainlink (like my local telco yard) that is easy to climb,
go for it. Remember never to break the golden rule of silence--if you make
noise trying to climb a fence, then you might as well go home. You may feel
stupid trying to be like a ninja or some sniper-type shit, but it pays off.
Once you have the place scoped and can get in and out easily, here's what to
look for.
Dumpsters: these have more often than not payed for a trip to the yard for me.
I have found ANI, loop information, employee numbers, old interoffice memos,
and other interesting shit like instruction books to handsets and whatnot.
Trucks: Once you have trashed a little, you may want to get some neato tools
and equipment from the trucks. When breaking into trucks, look for toolbelts
and toolboxes that may have neat stuff in them. All the toolbelts I have seen
are fully loaded with tools and sometimes a handset clipped to them. Also keep
an eye out for little yellow plastic boxes with shoulder straps and little
black cloth pouches. The bigger yellow boxes are usually loop testers, which
can do all kinds of neat shit. If you're extremely lucky, you can get a DOS
terminal box. These have VT100 terminal emulators and all kinds of neat telco
info on them. I have never found one, just the instruction booklet to it.
Also, some of the most important things you can get are papers of any kind
from the trucks. Just go apeshit and load up on them; you can sort through
them later. Once, I had to take a very large pair of cable cutters to cut the
fence apart to escape with. :)
I only recomend staying a maximum amount of 20-25 minutes per trip. I usually
grab stuff that looks neat or expensive, but remember to only take what you
can carry.
Some other places to go looting besides telco yards are local electronics
stores, computer stores, and large chain stores like Office Max and Office
Depot. I have found a discarded printer, monitor, and serial cables as well as
a shitload of cd jewel cases and a desk pen and pencil holder with minor
damage to it. I also found two PS/2 bus mice for a Compaq, and a software
install disk for a IBM Thinkpad. I have heard of non-working computer systems
thrown away that need only minor repairs. I reccomend trying to find out what
day the trash is picked up at your target store and looting on that day or the
day before for maximum profits. If you have any suggestions, feel free to
contact me.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Kids and Violence Today
by Saint skullY the Dazed (skully@sysfail.org)
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
It's happened again. Another kid went on a rampage with a gun. The other times
it happened, I wasn't too concerned. They were all thousands of miles from me.
What makes this time different? I live only 15 minutes from the school where
it happened.
This time, it wasn't at some school I had never heard of. It wasn't some
distant town I probably would never visit. When it happens at a school in the
next town, you sit up and take notice. You wonder how it could happen in your
town. Well, if it can happen here, it can happen anywhere.
As you may or may not know, the school I'm taking about is Thurston High
School in Springfield, OR. Thurston had never had much violence. It didn't fit
the profile of a school infested with gangs. It was closer to a school of the
50s then a school of the 90s. Yet it happened there.
You may be wondering what can be done about this problem. Well, the solution
is not easy. I'm sure that because of this, there will be another big push for
gun control. Because of this, I'm sure there will be a push for limits on your
free speech (banning of heavy metal music, violence on TV and movies, etc). We
must not fall into that trap. Because despite what people may tell you, music,
TV, and movies are not to blame for violence. Rather, the parents of the
children who are violent should be blamed.
Would you be willing to give up your right to listen to whatever music you
like? How about watching what you want to watch? Even for a cause so noble as
helping children, I don't think that censorship is the answer. Rather, I think
that parents need to take the time to supervise their children. They need to
know what their kids are watching, what music they choose to listen to, and be
frank and earnest when their kids have questions. The kids in Kentucky who
shot at their classmates after pulling the fire alarm thought they were
playing a game. They didn't have an understanding that death is permanent. Had
their parents took the time to not only show them how to fire a gun, but also
how to safely handle the gun, and what to shoot and what not to shoot, the
tragedy in Kentucky may have been avoided. Had the student in Springfield been
better supervised by his parents, he may not have killed two classmates, his
own parents, and wounded 20 others.
The student in Springfield had been voted most likely to start World War III.
Should he have been considered violent? Yes. Does it look like this is
something that started long before he was a freshman? Yes. In short, violence
is something that grows and builds, not something that's sparked instantly. So
if you're a parent, please supervise your kids, take an active part in their
lives, help them grow up to be a good person. If you're an older sibling, help
your parents bring your younger siblings up right. And if you have no
siblings, or they are all already grown up, please remember this for when (if)
you have kids of your own. If for no other reason, the please think about
yourself and how embarrassed you'd be if a massacre happened because of your
child. But hopefully it will be because you want to avoid a massacre like
that, period.
Addendum
--------
The last part was written the same day the shootings took place. Now, a week
later when the facts have come out, and everyone has had time to calm down,
let's straighten out some things I said earlier. I chose to leave the above
in place to show what happens when you let your emotions guide you rather than
think things through. It turns out that the Kinkles were trying to help Kip
and were trying to figure out how to best help their son. The paper recently
announced that Kip's father had called about enlisting his son in the National
Guard.
Kip had a longtime interest in guns and violence, and in an attempt to
dissuade the unhealthy interest he had (guns seemed to be his life) his
parents bought him a gun and taught him to use it responsibly. There is
nothing wrong with learning to handle guns properly. However, Kip was mentally
disturbed, and even if his parents had not bought him the gun, he would
probably have still committed the massacre.
So, how do we avoid things like this? The short answer: we don't. The long
answer: there are many answers. Some suggest guns, some suggest violence on
TV/movies. However, I don't think either of those are at cause. It is a tough
decision, and I'm not exactly sure what my own opinion is. One theory I've
heard put forward that I agree with is that there are too many bullshit rules
in schools, and not enough common sense issues. One example, is that I got
reprimanded for having a pager, supposedly because it could disrupt class, yet
I could walk in wearing just enough clothes to cover myself without getting
arrested for indecent exposure, and nothing would be said. Maybe teachers
should use a little common sense and recognize that I have a pager for work
and not for dealing drugs. Or maybe kids should just fight every so often to
release all the frustration, where the worst that happens is they walk around
a couple weeks with a black eye and a few bruises (assuming no weapons were
used), rather then the frustration building up and finally getting released
via a gun pointed at fellow students.
At any rate, the answer to this is not going to be simple, and is not going to
be quick. I have no doubt that there will be more shootings, and we may very
well lose many of our rights due to knee-jerk reactions rather then those in
power taking time to find a good fix and/or the people exercising their rights
to contact their representatives.
If you have any comments or responses to this, feel free to submit them to
System Failure. Who knows, it may spark a huge debate and prompt me to set up
a web board on sysfail.org. ;=)
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Bypassing Your Friendly Neighborhood Firewall
by Duncan (duncan@arena.cwnet.com)
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Well, here you are, sitting at work, minding your own business when you up and
decide to build yourself a Linux box. Why, you ask? Because, you have 8 840
meg hard drives, 3 computers, 2 monitors, 123 keyboards, and 52 some-odd mice
sitting next to you, and more time than Death on your hands. Well, you build
your Linux box and then you ask "What next?"
Well, maybe your first thought is "Can I IRC from it?" Mine sure as hell was
when I did it, and yours will be too. But after that, you say to yourself, "I
have this Ethernet connection that goes to waste from the hours of 6pm to
4am". And this is of course wrong not to use this prime bandwidth, so, we
embark upon the bypassing of your firewall, for reasons only attuned to
causing large amounts of havoc to small groups of people on connections far
less than yours.
You may view firewalls as some prime example of network security that are
set up by highly-paid network professionals like you and I hope to be. Well,
my future hope is that I know more than the clueless dolts who thought that if
they install it directly out of the box, it would work just like they want it
to. Unfortunately, that is a little bit off from the truth. Firewall
installations will allow for port 25 connections (STMP) and most connections
over port 1024. System administrators will not see the need to block anything
above that, as it can be used by servers for outbound port connections. Well,
we can use this to our advantage. Port 25, on the other hand, is far more
insidious, as it is the mail port of the machine, and allows outside mail
delivery.
The most obvious way to do this is to just redefine our portmapping scheme on
our new Linux box (let's call it tequila). You have two choices here. You can
edit your /etc/inet.conf file, and change :
smtp stream tcp nowait root <blah blah blah blah blah>
to
smtp stream tcp nowait root /usr/sbin/tcpd in.telnetd
That is a quick way to do it. That will make your STMP port (25) point to your
newly bound telnet port. All you have to do is reload inetd.conf and kill your
sendmail program.
The second way, which is a bit more permanent, and a bit more risky (i.e., I
did it the first way, so I recommend that more) is to modify your port
settings in /etc/services. So:
telnet 23/tcp
to
telnet 1100/tcp
And now we have an open port on your new machine that will bypass your
firewall at port 1100 that is linked to your telnet port. Again, you will have
to kill your inetd and such, but you will leave your mail server, so you could
receive mail on your new system that is not supposed to be there. That will,
of course, work with ssh and everything else that you would like to have
bypass the firewall (just to mention, sshd can be run at boot time with a
different port other that the default port of 22).
Dedicated to Tequila. You were the too young to go (if you know, you know
why).
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Messing With Cell Sites
by Skitso (skitso@teleport.com)
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Clyde works for AT&T. He also goes to my church, which means certain perks for
me. He offered me a tour of the cell site "because I seem to have an unusual
interest in phones" (heh) and the tour was pretty boring until he let me
listen in on a few conversations and disconnect a few people. Then I realized,
what if I could come back and do this anytime? Here's how.
First line of defense: A fence. It _looks_ electric (it's not), and probably
has barb wires along the top; if you're planning on coming back, throw
something on the barb wire and climb over (if you cut it, they'll be sure to
beef up the security).
Second line of defense: Door lock. Fairly cheap one, pick it if you can, but
if you can't, then drill it and never come back. :)
Final defense: Silent alarm. It trips like the light in your refrigerator (and
no, you can't just put your finger in it). Once inside, you've tripped the
alarm, and the police are supposedly on the way; however, there should be
something that looks like an electrical outlet, execpt with a keyhole. It will
say "Tech on site" on/above it. Follow the wire comming out of this along to
the wall to the "alarm" panel. Open it (pull really hard); there will be two
vertical rows of metal prongs. Look for wires going to a set that has a label
on it ('tech on site'). Connect these prongs with a paper clip or something,
and that's it. The way this works is, if a technician comes in, he trips the
alarm, and by turning the key, he sends a second (different) alarm signal that
overrides the first.
Once you're in, there should be some binders laying on a table; steal them
all (logs, frequencies, manuals). There should also be a spectrum analyzer
lying around (like a 50 lb. one); it seems to have a 386 processor built in,
but I never got to mess with it much. Find where the coaxial cable comes in
from the tower (hard to miss, its a 6''-1' diameter cable that hugs the
ceiling). Follow it to where it enters the radio circuitry; there will be
headphone jacks (the big ones). Either plug in the headphones and listen in,
or find a homosexual headphone wire (I call it that because it's male on both
sides), plug it in, and make a loop. Since you can't call out with the radio
stuff, and it'd be a pain to beige that complex stuff, they hide a phone in
the drawer of a desk. Just plug it in behind the desk and you're set.
A few tips:
-----------
* Don't worry about doing this around 2am, there are legit people that fix
problems 24/7 (actually 2am would be best).
* If there's a car/jeep/telco van parked _inside_ the big fence, come back
another day.
* If you're really paranoid (or can't override the alarm), just remember, it
takes cops an average of 20-30 minutes to get there, so carry off all you
can.
* Remember, this info came from a Portland, OR cell site. Security may differ
elsewhere.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Reading and Understanding the Assignment Area from A "T" Order
by FoneMan (e-mail staff@sysfail.org to contact)
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
In this article I'm going to show you how to read and understand the
assignment area from a "T" order. First I'll blow up an example of an
assignment area and then break it down into smaller portions so it's easier to
understand.
Let's have a look at the entire assignment area.
---ASGM
G1 TN 708 304 1250
FA 520 SHORELY DR, BARINGTN, IL
/LOC APT 101/RT 1005/RZ 13
IOE 01010-011-30/EXK 708 381/TN
708 304-1250/LPS/DF F10-04-
064C/OAB KAY
G2 WC 708 381/CT
IF1 /CA 25/PR 2324/DF F10-04-106V
/PRQ N/BP G-W+V-BR/OPC BL-R+W-
BL/TEA CP200 E NW HWY; EXJ
/TPR 111613
RO ORD F004546723 DD 95-06-
12
IF2 /CA 200N/PR 126/BP 1/TEA IT
520 SHORELY DR; CIW
Okay, now you're probably looking at that wondering what the hell it all
means. The G1 area shows the phone number for the following cable and pair
assignment. Yes, that's right, that TN stands for Telephone Number. Wow, it's
that easy, FoneMan? Damn straight biznich.
The FA part of the assignment contains the destination address. Obviously if
the town name is too large they're going to abbreviate it like the example
above. See, this isn't too hard.
The G2 line is very important. The first part shows the wire center. Wow,
there's another one of those acronyms. That's right, WC stands for Wire
Center. Often the telco will refer to the WC as the EWO. If you see CT in the
second part, that means it's a cut-through. Wow FoneMan, this shit is easy!
The IF1 section gives details about the cable that leaves the CO. In this
case, the new service leaves on cable 25, and pair 2324. This cable runs to a
Cross Box at 200 E. Northwest Hightway (TEA). To connect this cable to the
next leg of cable, the tech will connect the white-striped green wire (from
the F1 cable) to the red-striped blue wire (of the F2 cable) and the
brown-striped violet wire (F1) to the black-striped white wire (F2). Actually,
this is already done in this case. You can tell by the EXJ (EXisting
cross-connect Jumper) after the semicolon.
The IF2 section tells the tale of the cable that left the cross-box headed
for the customer. From this we can derive the cable name (/CA 200N/) the cable
pair (/PR 126/) and terminal binding post (/BP 1/). We can also determine that
it is an inside terminal (/TEA TI) and the terminal's address (520 SHORELY
DR). The CIW at the end tells us that the inside wire is already connected. If
IT is not shown, assume that the terminal is outside, common for single-family
dwellings.
In place of CIW you may find the following:
PIW Place Inside Wire (not a CT)
CDW Connected Drop Wire (a CT)
PDW Place Drop Wire (not a CT)
Well, that's pretty much it. I hope this article has helped you some. The
person reading this should have a basic knowledge of phones to understand
things such as cable, pair, wire center, etc. This is one of the few articles
I write about phreaking, or anything for that matter, so enjoy. Peace out.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Well, this marks the beginning of a new year for System Failure. We've done
better than either Pinguino or I ever expected to, and we've come a long way
from the small zine that was born in that pizzeria. Thanks to all our
supporters and readers, and we hope you'll continue to read System Failure for
many years to come!
RAPE THE SYSTEM FAILURE
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-E-O-F-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-