ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸ ³The HAVOC Technical Journal - http://www.thtj.com - ³± ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ± ±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±± Vol. 1 | No.12 | July 1st, 1997 | A HAVOC Bell Systems Publication wHuTz UnIx? iS tHeRe A vErSiOn fOr wInDoWz 95? _____________________________________________________________________________ -[The HAVOC Technical Journal Issue 12]- Editorial..............................Scud-O Bringing Back The Old School...........Revelation Basic Crypto...........................Scud-O Meridian Mail..........................grinchz Breaking into BCTel vans & Get Away....eclipse Nokia Cellular Programming Info........Keystroke Little Crypting System.................memor [HBS] A Story................................discore Slacking and not getting caught........SpookyOne Phreaking for some europeans...........memor [HBS] [ C Tutorials: Introduction to C ].....Fucking Hostile Oddville, THTJ.........................Scud-O The News...............................KungFuFox Phonecalls.............................THTJ Logs...................................THTJ ------------------------------------------------- [ thtj.com has arrived! ] Ok, after the closing of antionline, i decided that it was time to move up and get out own domain name. I am still formulating the site, and we are still waiting for the Majordomo for subscribers to use to get thtj setup, but by next month, subscribe@thtj.com should be up. Now i just need to set up a CGI and a form for the webpage. [ A Note for HBS members ] Ok, since the majordomo is not up, and we are never all on IRC, and im busy as shit working, you all need to e-mail me at scud@thtj.com and tell me what you want for an e-mail at thtj.com . also tell me if you need web space on thtj.com. _____________________________________________________________ The HAVOC Technical Journal - Information - Editor in Chief : Scud-O, scud@thtj.com - Assitant Editor : KungFuFox, mazer@cycat.com - Submissions Editor: Keystroke, keystroke@thepentagon.com - THTJ email address: thtj@thtj.com - THTJ website: http://www.thtj.com - THTJ mailing address: PO BOX 448 Sykesville, MD 21784 The HAVOC Technical Journal Vol. 1, No.12, July 1st, 1997. A HAVOC Bell Systems Publication. Contents Copyright (©) 1997 HAVOC Bell Systems Publishing. All Rights Reserved. No part of this publication may be reproduced in whole or in part without the expressed written consent of HAVOC Bell Systems Publishing. [No copying THTJ, damnit.] The HAVOC Technical Journal does in no way endorse the illicit use of computers, computer networks, and telecommunications networks, nor is it to be held liable for any adverse results of pursuing such activities. [Actually, to tell you the honest to goodness truth, we do endorse that stuff. We just don't wanna get in trouble if you try it for yourself and something goes wrong.] For infomation about using articles published in THTJ, send mail to: e-mail: thtj@thtj.com mail: THTJ c/o HBS PO Box 448 Sykesville, MD 21784 _____________________________________________________________ [Editorial : by Scud-O] The Old School During the past month, on #sin, Revelation had a long talk with me about the old school. Rev is a great person, and with his connections, power, and skills, i believe that he can help bring back the 'old school'. Right below this editorial, is Revelation's mission, and i want you all to read it. His look into the 'underground' is so true. Last month I almost brought to you all 'state of the underground' editorial, but after the offer from some people, i felt that it was time to first denounce selling out. i was going to publish my little state of the underground speech this month, but after Rev gave me his article on bringing back the underground, well i killed my state of the underground speech since his covers everything i wanted to talk about, and more. Revelation does provide so many revelations into the underground that so many people can not, or do not see. Many of the so called hackers, phreakers, anarchists, warez d00ds that are just so k-R4d 3reet should be ashamed of themselves. hacking and phreaking are not about messing with innocent people's lives, it is about helping the system, about telling sysadmin's about thier's problems, it is about shutting down a child porno site like Rev talks about. It is until we do things like this that we can regain respect for ourselves. Until then we will continue to go further and further down the hole until we can no longer see the light, the light towards honor, and respect and trust, those things which do not exist in today's underground. Until we become ethical, we will continue to be arrested in record numbers. And as for anarchists, well i will not even begin to talk about them, since i could spend hours rambling about anarchists. Hacking and phreaking were started to expand one's mind, and with the standard of today's hackers and phreakers, we are not expanding our minds, we are simply following cookbooks with step by step instruction on how to achieve our ends. Minds ARE being closed, and that is something that can not happen, for once we close our minds we are done for. closing our minds allows for people to control us, like Ingsoc and Big Brother ( read 1984 by George Orwell if you dont know what I am talking about ) , and this can not happen, for if it does, we are all doomed. In closing, i hope i have not depressed to too much, and I would like to thank Revelation and all of AS for thier goal of bringing back the old school, and i wish them well, they are a fine bunch of people, and they will succeed in thier goal. And if they ever need any help from me, or thtj/hbs, just let us know, we will be glad to help. Scud-O , Founder, and Editor in Chief of THTJ +----------------------------------------+ Scud-O and HBS would like to hear your views on this issue. Please feel free to e-mail us at: scud@thtj.com ---------------------------------------------- / ---/ --/ / / | /------/ / / /--- /-----/------/-----/ / / / /----------/ /--------/ -of HAVOC Bell Systems- scud@thtj.com | http://www.thtj.com _____________________________________________________________ In other news, FREE lurk3r, and e-mail Scud-O on you idea if he should expose Wal-Mart's computer and communication systems, since Wal-Mart is the ruiner of cities small and large, and they care nothing about the small business person. e-mail scud@thtj.com with a yes or no. _____________________________________________________________ ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ°° Û Û°° Û BRINGING BACK THE OLD SCHOOL Û°° Û By: Û°° Û Revelation Û°° Û LOA - AS Û°° Û www.hackers.com Û°° Û Û°° ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ°° °°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°° Ah, yes...the Old School. Those of us who have been around for a little while remember it well. The time where knowledge gatherer's were respected because of their hard work and skills. We weren't dishonered by virii spreaders and e-mail bombers...we were free...freedom. Has a nice ring to it doesn't it? Well, these days freedom is becoming less important, and crashing the government is taking priority. Why? I'll tell you why... because of hype, plain and simple. People are no longer interested in expanding their minds...they're interested in closing it. What ever happend to the belief in Utopia...the freedom that unites us all? We're losing it... that's what happend. We're losing it...the only damn thing that made me get involved in the Underground is slipping away. Of course, there will always be, no matter what, ways to expand your mind. But why are we letting the one thing that we all care about get away? This I cannot I answer...but I can provide a solution...a means to bring back the old school ethics of non destruction, Utopia, and freedom. We still have the power to return the Underground to what it was originally meant to be...free, ethical, and informative. Bringing back the old school ways will be by no means easy. It will take long, hard work from each of us...but it will be worth it. Let's return the Underground to its' original form, let's bring back the old school. In this article I am take one step toward this freedom of the old school ways. This step will be AS (Axis Security). A group of people who want to return the respect and honesty back to the hacker name. A group of people who aren't interested in spreading virri, e-mail bombing, carding, and software piracy. We simply want to expand our own minds, and the minds of others'...while bringing about a return to the old school ways of the Underground. Our organization is made up of 8 members, no more, no less. These members are: Revelation - revelation@mail.hackers.com Ed Wilkinson - ed.wilkinson@mail.hackers.com Hyper Viper - hv@mail.hackers.com Phreaked Out - phreakedout@mail.hackers.com Phreak Show - phreakshow@mail.hackers.com Brimstone - brimstone@mail.hackers.com Fallout - fallout@mail.hackers.com Samurai7 - samurai7@mail.hackers.com This hand-picked group of hackers will begin the long awaited first step towards the New School...a return of the Old School. We propose and challenge you to follow in our footsteps with ethical hacking. Be the kind of hacker that makes people respect you, not be afraid of you. No more destructive virri spreading, e-mail bombing, and software piracy. Begin this first step with us and follow us. The New School era has begun...help us push it forward. Help us promote ethical hacking, by promoting it yourself. It is only by your will that we will enter this New School era...no one person can do it, we all must do it. Ask yourself what you want to accomplish by being a hacker? Do you want to make the "ultimate hack"? Do you want to hack a government web page? Well, try this instead...hack a child pornography page if your going to hack a web page...notify System Administrator's of their security flaws...write programs and text files that describe how to protect from attacks, not how to accomplish the attack. That is how we are going to expand our minds. By fixing current problems and security flaws we bring about new standards, and with these new standards comes new problems. It's a neverending circle that will make us all wiser and more helpful to society, instead of being destructive to it. All we ask is for your support...help us bring back the Old School...welcome to the new era...the era of ethics and greatness among hackers...welcome to the New School... In closing I would like to thank The Havoc Technical Journal for publishing this article...we are now one step closer to our goal because of them. I would also like to thank Scud-O for his support of my views and of those of the Old School. I would also like to thank the man who made all of this possible, the man who is the very definition of "true hacker"...Ed Wilkinson. Without Ed and his aid in the creation of AS, this wave of ethics may never have taken place. I would also like to thank Hyper Viper for being of termendous help and support. Shoutouts to everyone at AS, L0pht, S.I.N., GkOS, THTJ, OTRiCS, Silicon Toad (for all your help and support), Phreaked Out, VC, Teknopia, Haknet, Stealth, #psychotic, LOA, LOD, Phrack (for being a terrific magazine), 2600 (for believing in freedom and having the guts to publish it), and everyone I forgot. If your leaving this article still believing in the destructiveness that nearly consumed the Underground...believe what you will...but the Old School is back, and badder than ever. Written By: Revelation (AS) Axis Security - www.hackers.com "Bringing Back The Old School...One Hacker At A Time." [ EOF ] _______________________________________________ [ Basic Crypto ] by Scud-O -------------------------------------------- -_Basic Cryptology_- -------------------------------------------- Information and Pascal (yuck) Code by Scud-O -------------------------------------------- I. Introduction This article is made to present you, the reader with the beginnings of cryptology. This is not made to fully describe every aspect of crypto. I am mainly dealing with very, very basic crypto such as substitution or transposition. For details on encryption methods such as idea, des, blowfish, etc. look for it in other future articles. I plan for at least 2-3 articles on basic crypto, this month covering beginning crypto such as substitution or transposition, next month to cover bit manipulation ( NOT, AND, OR, XOR, etc) and after that, maybe get into blowfish, idea, and other algorithms. II. Types of Ciphers First off, there are about a million different forms of ciphers and encryption methods that can be made, but for this month, the 2 methods i will discuss are substitution and tranpositition. substitution ciphers replace one character with another character, but leaves the message in the same order. However, transposition ciphers scramble the characters of a message according to some rule. These types of ciphers can be used at whatever level you feel like, and can also be intermixed. Another technique, which will be covered next month is bit manipulation, which has become popular with the use of computers. All three of these methods use a key. The key, of course is used to 'unlock' the message that is encrypted. III. Words to remember ciphertext : the encrypted text, for example: MJQQT, YMNX NX F YJXY. plaintext : the decrypted text, ie: HELLO, THIS IS A TEST. -------------------subs1.pas PROGRAM Subs1; (* simple substitution cipher. *) type str80 = string[80]; var inf, outf : str80; start : integer; ch: char; PROCEDURE code(inf, outf: str80; start: integer); VAR infile, outfile: file of char; (* should just use text instead.. *) ch: char; t: integer; BEGIN assign(infile, inf); reset(infile); assign(outfile, outf); rewrite(outfile); while not eof(infile) do begin read(infile, ch); ch := upcase(ch); if (ch>='A') and (ch<='Z') then begin t := ord(ch)+start; (* Wrap around *) if t > ord('Z') then t := t-26; ch := chr(t); end; write(outfile, ch); end; Writeln('File coded'); close(infile); close(outfile); end; PROCEDURE decode(inf, outf: str80; start: integer); VAR infile, outfile: file of char; (* should just use text instead.. *) ch: char; t: integer; BEGIN assign(infile, inf); reset(infile); assign(outfile, outf); rewrite(outfile); while not eof(infile) do begin read(infile, ch); ch := upcase(ch); if (ch>='A') and (ch<='Z') then begin t := ord(ch)-start; (* Wrap around *) if t < ord('A') then t := t+26; ch := chr(t); end; write(outfile, ch); end; Writeln('File decoded'); close(infile); close(outfile); end; begin write('enter input file: '); readln(inf); write('enter output file: '); readln(outf); write('starting position (1-26): '); readln(start); write('code or decode (C or D) '); readln(ch); if upcase(ch)='C' then code(inf,outf,start) else if upcase(ch)='D' then decode(inf,outf,start); end. input: hello, this is a test. i hope it works. output: MJQQT, YMNX NX F YJXY. N MTUJ NY BTWPX. output2: HELLO, THIS IS A TEST. I HOPE IT WORKS. Now while this may fool the casual reader, it would not fool anyone with some knowledge of crypto, and this code would be broken in a few minutes. One problem with this cipher is that it leaves the spaces in place. To make this more 'secure' we should include the space. ( We should also include all punctuation and numbers, as well as uppercase letters, but i am going to leave that to you do to if you want to. ) For example, take the alphabet: abcdefghijklmnopqrstuvwxyz and change it to: qazwsxedcrfvtgbyhnujm ikolp Now while this may not seem to make this cipher more secure, it does since now there are 27 factoral ( 27! ) instead of only 26! ways for this cipher to use. In case you did not know, 6! would be 6*5*4*3*2*1 which equals 720, therefore, 26! is a larger number, and 27! is an even greater number. example: meet me at sunset would become tssjptspqjpumgusj now, would you like to have to break that code? i dont think so. -------------------subs2.pas program subs2; type str80 = string[80]; var inf, outf : str80; alphabet,sub : str80; ch: char; { this function returns the index into the substitution cipher. } function find(alphabet: str80; ch: char): integer; var t:integer; begin find:= -1; { error code } for t:= 1 to 27 do if ch=alphabet[t] then find := t; end; { find} { just like the c function, isalpha() } function isalpha(ch: char): boolean; begin isaplha := (upcase(ch)>='A') and (upcase(ch)<='Z'); end; { isalpha } procedure code(inf, outf: str80); var infile, outfile: file of char; { should just use text instead..} ch: char; begin assign(infile, inf); reset(infile); assign(outfile, outf); rewrite(outfile); while not eof(infile) do begin read(infile, ch); ch := upcase(ch); if isalpha(ch) or (ch=' ') then begin ch := sub[find(alphabet, ch)]; { find substitution } end; write(outfile, ch); end; Writeln('File coded'); close(infile); close(outfile); end; {code} procedure decode(inf, outf: str80); var infile, outfile: file of char; { should just use text instead.. } ch: char; begin assign(infile, inf); reset(infile); assign(outfile, outf); rewrite(outfile); while not eof(infile) do begin read(infile, ch); ch := upcase(ch); if isalpha(ch) or (ch=' ') then ch := alphabet[find(sub, ch)]; { replace with real alphabet again } write(outfile, ch); end; Writeln('File decoded'); close(infile); close(outfile); end; { decode } begin {main } alphabet := 'ABCDEFGHIJKLMNOPQRSTUVWXYZ '; sub := 'QAZWSXEDCRFVTGBYHNUJM IKOLP'; write('enter input file: '); readln(inf); write('enter output file: '); readln(outf); write('code or decode (C or D) '); readln(ch); if upcase(ch)='C' then code(inf,outf,start) else if upcase(ch)='D' then decode(inf,outf,start); end. Now, while this is a harder code to break, this is still easily breakable by a frequency table of the english language. Looking for the most common letter in the ciphertext will show you which letter is 'e' , since e is the most common letter in the alphabet. To make this just a little bit more confusion, lets throw in another round of subsititution. If you are really bored you can take this to the next step, and keep adding more and more levels of subsitution, but if you do end up doing that, there is seriously something wrong with you! -------------------subs3.pas program subs3; type str80 = string[80]; var inf, outf : str80; alphabet,sub : str80; ch: char; { this function returns the index into the substitution cipher. } function find(alphabet: str80; ch: char): integer; var t:integer; begin find:= -1; { error code } for t:= 1 to 27 do if ch=alphabet[t] then find := t; end; { find} { just like the c function, isalpha() } function isalpha(ch: char): boolean; begin isaplha := (upcase(ch)>='A') and (upcase(ch)<='Z'); end; { isalpha } procedure code(inf, outf: str80); var infile, outfile: file of char; { should just use text instead..} ch: char; change : boolean; begin assign(infile, inf); reset(infile); assign(outfile, outf); rewrite(outfile); change := TRUE; while not eof(infile) do begin read(infile, ch); ch := upcase(ch); { switch alphabets with each space } if ch=' ' then change := not change; if isalpha(ch) then begin if change then ch := sub[find(alphabet, ch)]; { find substitution } else ch := sub2[find(alphabet, ch)]; { second sub } end; write(outfile, ch); end; Writeln('File coded'); close(infile); close(outfile); end; {code} procedure decode(inf, outf: str80); var infile, outfile: file of char; { should just use text instead.. } ch: char; change : boolean; begin assign(infile, inf); reset(infile); assign(outfile, outf); rewrite(outfile); change := TRUE; while not eof(infile) do begin read(infile, ch); ch := upcase(ch); { switch alphabets on a space } if ch=' ' then change := not change; if isalpha(ch) then begin if change then ch := alphabet[find(sub, ch)]; { replace with real alphabet again } else ch := alphabet[find(sub2, ch)]; { second sub } write(outfile, ch); end; Writeln('File decoded'); close(infile); close(outfile); end; { decode } begin {main } alphabet := 'ABCDEFGHIJKLMNOPQRSTUVWXYZ '; sub := 'QAZWSXEDCRFVTGBYHNUJM IKOLP'; sub2 := 'POI UYTREWQASDFGHJKLMNBVCXZ'; write('enter input file: '); readln(inf); write('enter output file: '); readln(outf); write('code or decode (C or D) '); readln(ch); if upcase(ch)='C' then code(inf,outf,start) else if upcase(ch)='D' then decode(inf,outf,start); end. Ok, so before i go, this multi-encryption makes it much harder since at each space, the sub is changed, making frequency tables somewhat useless. I hope you enjoyed this article, and tune in next month for transpostion ciphers and bit-manipulation. cya. Scud-O -[ Meridian Mail : by grinchz ]----------------------------------------------- - Forew0rd - After a few weeks of searching for any info on phreaking the Meridian Mail system I realized there was basiclly none to be found. So natuarlly I went to work on my skoolz system and discovered what tha menus where and some other lil' neeto tid bits of info on what tha system it self is. ( i stole a little bit of the menuing system info and info on hacking it from some lil' thing i happened to find on da web ) - About The Merdian Mail System - Meridian Mail is not just a stand alone system. Its actually and add on for Meridian switches made by Northern Telecom and also from British Telecom (UK Only). Tha system is very expensive averaging 2000 UK Pounds for a low end model. - Spoting a Meridian Mail System - Well spoting an MM is kinda hard but not to hard. The easiest to spot is the mail collection setup. This is when you dial the system and a digitized womens voice sez, " Welcome To Meridian Mail". And then followed by "Mail Box #?" and of course "Password?". The second setup is sounds just like an answering machine. When called it picks up and plays a msg for u. To get out of the recording simply hit "*" then press "#" and u will get a list of all options. To get to the login prompts press "81". Next is call routing which basiclly gives you a menu like "Press 1 For Butt sex" , "Press 2 For Sex w/ Muppets" , etc. Some these are pains in tha ass and u have to wait for the msg to end before u can get into tha fun but others will let u hit "*" and then press "#" to get the options and "81" to get to tha Login prompt. The last type of system is outgoing msg only. They Really Suck Stay Away From Them! U cannot use anything on them.... (probably cuz someone else already got to it :P). - The Guess 'n' Check - So u found an MM somewhere and u wanna get into it? Well here are a few things I learned while fucking around with my skoolz setup: +there is no set mail box # but is usually 4 digits +default passwd is the msg # also try mail box # backwards +passwd's are 4-16 digits in length +if u get in its kewl :P - The Menu's - From a mail box 0 - Operator Assistance 1 - Rewinds the current message about 10 seconds 2 - Play message 3 - Fast Forwards the current message by 10 seconds 4 - Previous Message 5 - Record, used when composing or forwarding a message. 6 - Next Message 7 - Message Commands(Sub Menu) 0 - Message Options (Sub Menu, can only be used on outgoing messages) 1 - Urgent, tag a message for urgent delivery. 2 - Standard, tag a message for standard delivery. 3 - Economy, tag a message for economy deliver. 4 - Private, tag a message private (private messages cannot be forwarded to other users) 5 - Acknowledgement, tag a message for acknowledgement, you'll be send an acknowledgement message when the message is received. 6 - Timed Delivers, specify a time and date for delivery. 1 - Reply, sends a message to the sender of the message. Can only be used on incoming messages from mailboxes on the same system. 2 - Play envelope - Gives all the details of the messages, such as who its from, time, if it was urgent, attached messages etc., etc. 3 - Forward, forward the message to another user. 4 - Reply All, record a message to all the senders of the messages in your mailbox. 5 - Compose, compose a message to other users, either just one, a distribution list, or several boxes. 6 - Delete, deletes message, or if used on an deleted message restores it. 9 - Sends a message you've just recorded. 8 - Mail Box Commands (Sub Menu) 0 - Mailbox Options (Sub Menu) (Not always available on earlier versions of the software) 1 - Change Operator Assistance Number 1 - Login, enters the login process. 2 - Greeting (Sub Menu) 1 - External, record a greeting to be played to external callers. 2 - Internal, record a greeting to be played to internal callers. 3 - Log-off 4 - Password Change, change your password, enter your new password twice and your old password. 5 - Distribution Lists, create distribution lists. 6 - Goto, goto a message number in your mailbox. 9 - Personal Verification, record a personal verification which will be played instead of your mail box number to message recipients. 9 - Call Sender, when used on an incoming message will dial the extension of the sender, if the number is known. - Fun Stuff - Once you work your through the system if your allowed to Change Operator Assistance Number you will rool. Then you can change that # to wut eva u want say you wanna call Keystroke for instance ( :P~~~ ) change tha # to XXX-XXX-XXXX and then go back into your box and hit "0" and voila! you have a dial-out to abuse and call ur friends. - Final Notes - Phew! I hope this satisfies you peoples fer muh first article.... I want to thank some guy named substance ( i unno who he is :P ) for writing out the menus so I didnt have to go thru and type all of them.... and thats about it see ya'll in #phreak.... latez grinchz@hotmail.com supplier of fine meats UIN: 1441903 -[ EOF ]-------------------------------------------------------------------- Breaking Into the BCTel Van - By eclipse. Ok, I'm sure you all heard about the first time cind3r and I broke into a Bctel Van, but I don't know if you heard about the time I did just a week ago. It's pretty lame, but its 1:30 am, and I can't get to sleep. Well, here's the story. So, It was about, 11 at night, and my friends had just gone home, and my other 2 friends were at a party. So, I went to the fence, which had some shitty aluminum linking from the last time it got victimized. In about 5 minutes, it was completely gone, and there was a hole in the fence from top to bottom. It was about 11:30 now, and I knew my friends would be out of the party at about 12. I decided to wait outside for them to pass my house, and they did. They wanted to help me with the van, but they had to go home, so me, trying to be all 31337 in front my my friends, got some porcelin and tried to break the window. That didn't work, so before they left, I got my crowbar. One hit, and *Bang*, a second, and *smash*. The window was broke, and I bolted across the street, and back to my house. I laid low for an hour or so, and then went back. It was all dark and quiet, so I figured it was safe. I looked in... one lineman's, one cb radio, and a box with assorted little goodies. I took the linemans and dumped it off at my house. Then, I went back and grabbed the box. It had 10 dollars in quarters in it, some BCTel stickers, and some phone boxes and shit. I sat under the lights of the store across the street from my house and looked over my findings, putting them in a bag. Then, knowing it was quality, and not quantity that I wanted, I went back for one more thing: the cb radio. I ripped it out of the van and was on my way out of the van when another linemans caught my eye. It was in the back of the van, so I had to reach across the van, with all that broken glass, and open the sliding door. I went back, and got the linemans, along with a nice, new telephone. I went home and went to sleep. Get away - By Eclipse. Tonight, while trying to start up a conf, I got a little more exercise than I had expected and wanted. I had already been there before: the store with 10 phone lines, 4 rural (8 city) blocks away from my house. I had unsuccessfully tried to start a conf, and not wanting to end the night without one, I decided I would go back. So, I got back, just as the sun had gone down over the mountains. It was fairly dark out, and I was safe with my linemans. I had JUST hooked it up, and called cind3r, expecting to start my 3,4,5,6, and eventually 10 way call. About 5 seconds (literally) into the call, a car pulls up, high beams on and everything. A male driver and a female passenger. "What are ya doin?" he asks. "Nothing" i say to him as i swear at cind3r and hang up on him. Paniked, I yanked my phone cord, and stuck it in my bag. "Oh, I know what you're doing, you little shit!" he yells, as i take off on my rollerblades, probably faster than I have ever gone in my life. I look back, and see him chasing after me on foot, but he was still a good 20 feet back, so I kept on going full tilt. I saw him run back to his car, and I knew I had some time to hide, but, bah, I was on a stretch with all houses. No bush. I saw him creep up behind me, following back in his car, about 5 feet behind me. He picked up a cell, he called the police, I would imagine. I turned down a street to get onto the slower street that wasn't on the highway. He was following me, close enough he could have probably reached out of his window and grabbed me. I was going fairly slow now, very out of breath from booting it 4 blocks already. I was one block away from my house, but I was at the other end of the street. I saw a car trying to turn onto the road, and I went in front of it, which turned down the road, giving me just a few seconds, but at the same time, a long time to get ahead of the guy. So I blade up the road, and turn off down the dirt and rock path. It was about 20 feet long, running the whole way on rollerblades. I almost fell a couple times. I looked back behind me, and saw the guy chasing after me. I laughed at him, and kept going. I was only 1 house away from my house. I got around the corner, and I saw him turn around and head back to his car. I was safe. I ran into my house and down the stairs, hot, sweaty and out of breath, while trying to explain why "i had to come home from James's house." Thats my story, the closest I have ever gotten to getting caught for phreaking. Thank god I didnt. I had more then enough shit with me for a possible stay in Juvy :). Including the linemans I had stole a week earlier from BCTel. _____________________________________________________ Nokia Cellular Programming Info - Brought to you by Keystroke FOR AUTHORIZED DEALER USE ONLY NOKIA 2160 SERIES CELLULAR TELEPHONE NAM PROGRAMMING INSTRUCTIONS The Nokia 2160 Series handportable CMT uses an EEPROM NAM that can be programmed directally from the standard keypad. In order to access the NAM, you must enter the special access code currently programmed into the phone. Once the programming mode is accessed, NAM parameters are loaded by entering them into the display and "storing" them to selected memory locations. Be sure to obtain all parameters before proceeding. EASY NAM PROGRAMMING 1. Turn the phone on. 2. Enter the NAM access code. Access code is: *#639# 3. Verify the display now reads "Cellular number" and enter the 10 digit MIN for the phone. 4. Press the softkey under the word "OK" in the display. If less then 10 digits are entered an error message will prompt you to reenter the number 5. Verfit the display reads "Enter code" and enter the five digit SID followed by four zeros. (Example 001750000 is a SID of 175 followed by four zeros.) An error message will display if an incorrect entry is made. Do not add more than four zeros to the code. NOTE: Change the Lock code by adding a pound sign and new lock code after the code. (example: 001750000#7788. Lock code=7788) Change the Language by adding a pound sign and new language code after the code (example: 001750000#2. Language = 2) Language code: 0 (default) = English, 1 = French, 2 = Spanish, 3 = Portuguse Change the Lock code and Language code by seperating each set of numbers by a pound sign. (example: 001750000#7788#2) The SID =00175, Lock code = 7788, Language = 2 (Spanish) 6. Press the softkey under the word "OK" in the display. 7. The display will tell you that the activation was OK and instruct you to power off, then on again. When the phone powers back up, it will automatically select the correct system (A or B) ACCESS NAM PROGRAMMING MODE: 1. Turn the phone on. 2. Enter the NAM access code. Factory default is: * 3 0 0 1 # 1 2 3 4 5 3. Enter the softkey [Menu] 4. If this screen appears, ----------------- you have entered the access code correctly. | Field Test | | > NAM 1 | | NAM 2 | ----------------- SELECTION FROM THE MAIN LEVEL MENU (FIRST LEVEL OF NAM MENU): 5. Press the scroll key up or down repeatedly until the desired main menu selection is displayed. Select from: NAM 1 NAM 2 NAM 3 Security Code Emergency Number SW version Serial No. Programmed Field Test 6. Press softkey [Select] to access the level menu for the your main selection. {Note from Key: They made that typo :P!} PROGRAMMING NAM'S 1 THROUGH 3 (SECOND LEVEL NAM MENU): 7. Press the key up or down to scroll through the selected NAM information list. Select from: HOME SYSTEM OWN NUMBER PSID/RSID LISTS (Note 1) CHANGE DEFAULTS CHANGE DEFAULTS" NAM STATUS ACCESS METHOD LOCAL OPTION PRIMARY PAGING CH SECONDARY PAGING CH DEDICATED CCH A DEDICATED CCH A NBR DEDICATED CCH B DEDICATED CCH B NBR OVERLOAD CLASS GROUP ID REAMING STATUS A-KEY 8. If the value is incorrect, press the softkey [Select] and use the numeric keypad or key to make any needed changed. 9. Enter softkey [OK] to save the value. 10. Repeat steps 7 through 9 for the remaining NAM info items to be viewed and/or changed. 11. To program NAMs, press [Quit] to return to the Main Menu list. Select NAM 2 or NAM 3. Once the Home System ID and Own number are programmed, the phone will automatically set the NAM Status to enabled. PROGRAMMING THE SECURITY CODE: 12. From Main Level Menu use the key to select the "Security" menu, press [Secect] and the current 5-digit security code will appear in the display. Default is 12345 13. If you wish to change the Security code at this time, use the numeric keys to change the value. 14. Press the softkey [OK] to store changes. PROGRAMMING EMERGENCY NUMBERS: 15. From Main Level Menu use the scroll key to select the "Emergency" menu, press the softkey [Select] to enter the emergency numbers. EMERGENCY NUMBER 1 (911) EMERGENCY NUMBER 2 (*911) EMERGENCY NUMBER 3 (None) 16. If you wish to change the displayed value, use the numeric keys to make changes. Use the scroll key to select the emergency number you wish to change and press [Select]. 17. To change the value, press softkey [OK]. 18. Press [QUIT] to exit the menu. 2160 Programming Continued: SW VERSION: 19. From the Main Level Menu use the scroll key to display the "SW version" menu, press [Select] to view software version, date, and product type. 20. Press [Quit] to exit the menu. SERIAL NUMBER (ESN): 21. From the Main Level Menu, use the key to display the "Programmed" menu. 24. Press [Select] and enter a four digit number that corrispondes to the month and year the phone is sold. Example (mmyy) 0197 = January 1997, 0996 = September 1996. NOTE: This menu location can be programmed only one time. Once that date had been entered it cannot be changed, Any attempt to enter the menu once it had been programmed will receive a short beep and the message "DATE ALREADY STORED". EXIT NAM PROGRAMMING: 25. To exit the NAM programming mode, turn off the phone and leave it off for five seconds. FIELD TEST: 26. The FIELD TEST MODE is used to investigate how the phone is reacting to the cellular system. The FIELD TEST information covers signal strength, battery changing status, cellular state and encryption status. The information is organized to display information relating to Analog Control Channels, Digital Control Channels, Analog Voice Channels, and Digital Voice channels. All the information provided in the FIELD TEST display is in accordance with IS136. For further information about the FIELD TEST mode, contace Nokia Customer Service at 1-800-456-5553 and ask for Nokia Field Service Bulletin ?????. 27. To activate the FIELD TEST mode you must first be in NAM programming. Instructions for entering NAM programming are on the opposite side of this page. Use the following steps to enable the FIELD TEST mode. 28. From the main menu use the scroll key to display the "FIELD TEST" menu and press the softkey [Select]. Use the key to select Enable and press the softket [OK]. 29. Turn 2160 off then back on. Once the power up self test is complete, the FIELD TEST display will begin automatically. Scroll through the different displays using the scroll key. 30. To disable the FIELD TEST mode. Return to NAM programming and disable the function under the FIELD TEST menu. PROGRAMMING PSIDS AND RSIDS: The Nokia 2160 provides the option to program Private (PSIDs) and Residential (RSIDs) System ID's as perscribed by IS-136. The PSID/RSID list is programmed to support selection/reselection processes, system selection and SID display functions. Programming the PSID/RSID list is part of the NAM programming menu. All three NAMs have their own PSID/RSID list. Follow these instructions to program the PSID/RSID lists. 1. Enter the NAM programming menu and select NAM 1 (or the desired NAM). (Note: PSID/RSID is currently only avilable in the NAM 1 location. PSID/RSID is included in NAM 2 and 3 for future use.) 2. Use the scroll key to display "PSID/RSID LISTS" and press [SELECT]. 3. Use the scroll key to select the P/RSID 1 or the desired P/RSID (1 through 5). Press the [SELECT] softkey. 4. Each list contains: System type Select Private or Residential system type. PSID/RSID System ID for the Private or Residential system. Indicates which PSID/RSID the mobile will respond to. System ID Connected System ID. The SID the PSID/RSID is connected to. Alpha Tag The name of the Private or Residential SID. Operator Code (SOC) This is the System Operator Code. (US-McCaw Cellular = 001 (dec), Canada - Rogers Cantel Inc. = 002 (dec), and McCaw Cellular Communications (for international) = 2049 (dec). Country Code Enter the country code of the PSID/RSID. Keystroke _____________________________________________________________ ************************ *Little Crypting System* memor [HBS] ************************ *********** 1 / Why that little cryptography system *************************************** Well a few years ago, i was studying cryptography systems (Hill, Rabbin, Rsa ,Des, Vigenere..) and i thought it was funny to make my own "little" and easy crypting system in that country nammed France where the encoding systems are forbidden when the key and method you use for it arent given to the french governement.. i called it Random Routines, because its a stupide system using a random string as key to crypt. 2 / How it werks? ***************** It only uses that key composed for instances of 26 caracters: AZERTYUIOPQSDFGHJKLMWX CVBN caracters with a cursor position: AZERTYUIOPQSDFGHJKLMWX VBN 1 5 1 1 2 2 0 5 0 6 for making that caracters string that is as long as you want it can go from 26bytes to .. hm (the longest i did was 32kbytes). a little programm using C++ random functions or basics rnd can do it i guess that one can work (i didnt tryed it) #include /* for presentation shit */ #include /* for a Borland C++ random command use */ void makekey() { printf("Making da key\n"); unsigned char key[32000]; for(int i=0;i<32000;i++) key[i]=random(255); printf("Key made\n"); } the second thing to have is of course the original text to crypt: the string to crypt here will be for instance "HELLO" using a rotating method on the key i'll first crypt the H: AZERTYUIOPQSDFGHJKLMWX VBN 1 5 1 1 2 2 0 5 0 6 1 6 H is the pos 16.. the first crypted thing will be the number 16 after from that H, i'll crypt the e (pos will move and the pos1 will start on the H) AZERTYUIOPQSDFGHJKLMWX VBN /* note that its a rotating position at the 1 1 2 21 5 11 string end, it continues on the string 2 5 0 6 01 begining */ from the H, i'll go to the E .. i'll get pos 14.. the begin of the "brute" crypted thing is 16,14.. i'll continue to crypt now from the E to the L AZERTYUIOPQSDFGHJKLMWX VBN 221 5 1 1 2 2 56 0 5 0 4 from the E, i'll go to the L .. i'll get pos 17.. the begin of the "brute" crypted thing is 16,14,17.. i'll continue to crypt now from the L to the L AZERTYUIOPQSDFGHJKLMWX VBN 9 1 1 2 221 5 8 2 5 0 56 from the L, i'll go to the L .. i'll get pos 1.. the begin of the "brute" crypted thing is 16,14,17,1.. i'll continue to crypt now from the L to the O AZERTYUIOPQSDFGHJKLMWX VBN 9 1 1 2 221 5 8 2 5 0 56 from the L, i'll go to the L .. i'll get pos 17.. the begin of the "brute" crypted thing is 16,14,17,1,17.. i'll continue to crypt now from the L to the O well finally, the crypted "numerous" string will be 16,14,17,1,17 well next step is to use only a little "decalage" crypting system from "hidding" like +1,+1,+1,+2 on all the numbers we get 16,14,17,1,17 + + + + + 1 1 2 2 1 ------------- 17,15,19,3,18 the next step will be to crypt thoses numbers in letters will a 2nd key like.. hmm.. ABCDE FGHIJKLMNOPQRSTUVWXXZ0123456789 1 5 1 1 2 2 3 3 3 0 5 0 5 0 5 7 16 will be O 15 will be N 19 will be R 3 will be C 18 will be Q so the finally crypted string will be "ONRCQ" now tell me how to found without knowing that crypting method that "HELLO" == "ONRCQ" ? and the keys are of course easy to find when they are of 26 30 bytes, but imagine that the key are 32000bytes.. i guess its a bit harder to find the right key and the good crypting method.. for 32000 bytes.. hmm .. lucks are 1/(255^32000) == really little! crypting ratio is 1:1.. for 1 uncrypted byte, you get 1 crypted byte. but of course you need 2 keys. 3 / Making that system a bit more complex : ******************************************* well i will include in it the Source coming and the destination , thoses are in 2 caracters that the spies will choice.. Kevin who is sending the crypted message "HELLO" to Oscar choose the "name" KN .. he knows Oscar name which is "FK". for that, i'll separate the crypted text with RN caracters. it will be RNxRNxRNxRNxRNxRNxRN <- x are the crypted bytes. so the crypted "HELLO" will be now RNORNNRNRRNCRNQRN we will put the first letter of Kevin "name" before the first RN , it will gives: KRNORNNRNRRNCRNQRN we will now put the second letter of Oscar "name" just after that one, it will gives : KKRNORNNRNRRNCRNQRN we will put the first letter of Oscar "name" just after the last RN , we will get KKRNORNNRNRRNCRNQRNF and we will put finnaly the 2nd letter of Kevin name just at the end of the string, we will finnaly have : "KKRNORNNRNRRNCRNQRNFN" is the final crypted string. that RN and name thing will be like a checksum, because if you receive a msg without crypted letters under RN and with a bad source and destination name, i guess that the crypted text is not for you and that your keys wont work for decrypting it. another little checksum will be the 1st key string lenght at the end of the crypted text. Our 1st key is 26 bytes long. 2nd key : ABCDE FGHIJKLMNOPQRSTUVWXXZ0123456789 1 5 1 1 2 2 3 3 3 0 5 0 5 0 5 7 2 is the B and 6 is the space.. so now the crypted string will be: "KKRNORNNRNRRNCRNQRNFNRNB " 4 / so now, for a spy how to guess that "KKRNORNNRNRRNCRNQRNFNRNB " ******************************************************************* == "HELLO" ? ************ well i'll use that thing nammed "Crypt-Analysis" "KKRNORNNRNRRNCRNQRNFNRNB " --**x**x**x**x**x**--**-- i'll see that "RN" are repeated.. especially in the middle string, so i'll know that the letter upper to the x will be crypted letters. i'll think probably that the letters uppers to the -- will be some checksum thing or key making shit.. so i wont be really advanced, i'll only know that: "KKFNB " <- its checksum or keymaking shit.. maybe KK are checksum and "FNB " are key making shit, or "KK" key making and "FNB " checksum , or no checksum and only key making, or checksum without key making... i'll be damn LOST! i'll know that ONRCQ will be some crypted text with a key, maybe 2 keys, maybe 3 keys??! here too, i'll be totally lost. the only thing i'll really know is that RN are only here for separating the crypted thing parts... but how all that thing works? LOST LOST LOST! well i made that cryptography system for fun, if u have any question, i coded it a few years ago on AtariSt systems with 256 bytes key , it was nammed rndrt.lzh if u have C coding questions too.. mail me in memor@mygale.org memor [HBS] _____________________________________________________________ §§§-Slacking and not getting caught-§§§ I'm going to murder all of you. Now that I got that out of the way on with the article. Are you like me, do you go to a high school (or any school) that has computer lab using Novell netware and some windows companion like "USERNET"?. If you do then good, but if you don't here is what USERNET, or other similar Novell windows companion's are about. The idea behind "USERNET" is that once the user is logged in he/she can not execute any other program besides those that are available (ones that have icons). But if your like me and are tired of hearing the instructor telling you run Microsoft windows tour or make a Pascal program that adds integer's then I have got a great way of slacking and not being caught. First off, all the things I'm going to tell you are good for doing what you want on a "USERNET" system, but is no substitute for just hacking the admin, or booting up without "USERNET" into DOS prompt, but both of these ways run the risk of you being caught slacking. So here we go. You have logged into "USERNET" and are doing whatever pathetic thing the instructor told you to do, now most school's have courses in HTML or just have web access, so Netscape navigator is available to run. RUN IT. Now once your in, go to options/general preferences and then to the APPS section. Once there look for a dialog box called "Telnet Application". Obviously this box is used to point to the external Telnet program the Netscape calls on when it is requested by the user. Now put any executional that you want into the box and it can be run simply by exiting options(OK) and typing "telnet://" then Enter in the URL box of Netscape. This tells Netscape to run the Telnet program, or in this case any program you have put into that dialog box. Now I know your saying "THAT IS THE DUMBEST THING I HAVE EVER HEARD IN MY INTIRE LIFE YOU FUCKHEAD", but it works and more you can easly switch between whatever program you ran, back to whatever your suppose to be doing (ALT+TAB) in a second and avoid being caught. My suggestions of program's to run are "C:\WINDOWS\DOSPROMT.PIF" or FileManager. If you thought this article was a waste of time and taught you nothing new then you should not have read it! So have fun, slack and take it easy. SpookyOne _____________________________________________________________ A Story, by discore ------------------------- listen kiddies! i have a story of mass porportions a garbling gaggle of great somethings hi! discore speaking, i got a great story to tell cause its time to piss some ppl off, and thats what i do best. it all started in a land far far away (salt lake city) about 2 months ago when my friend who we will call jeff started getting a slight drug problem. he ended up getting busted every week or so when he stole bottles of alchohol from his parents or something like that. then he was downtown at a crackhouse on like... the 15th of june, and he had a gun on him, and of course the crackhouse got raided, him being caught with the gun and in a shitnitz of trouble. so right after he was fingerprinted, all his infoz pulled etc he went immdiatly to my house to find me tiffany and shaun taking down this tent we were playing with. and he totally 100% freaks out at my house all starts crying and shaking. then his mom came and picked him up. the stupid slut that she is let him go and do what he wants the next day, so he is fucking durnk out of his mind and has a go kart (something you dont want jeff to have). so anyways, later in the day his mom offers me to stay up at his house that night, something that doesnt happen very often, of course i take the offer and me and jeff do something that night. in the morning im awakend by his clueless dad and 4 ppl from a detox program. they take jeff away that morning, on his best friends birthday (june 20th). so now the story is his m0m thinks i have a gun here, so tells my mom that and of course she shits a brick, i tell her to fuck off and to get out of my room. now heres the fun part the detox program that jeff is in tapped my phone line for unknown reasons. i cant name anything cause i plan on sue'ing the living shit out of this detox facility. the point of my story is to realize this isnt a free world anymore. you are owned by your law enforcement and your government. the have the power to kill you for no reason or lock you up in jail for the rest of your life. and i dont fucking like it, so you know what i say? i say fuck the system be yourself and listen to the doors instead of going to church! AND A BIG FUCK YOU TO JEFF'S MOM discore! btw... although nothing illegal is here dont rage anarchy because of this article, its not my fucking fault if you get shot im simb0lia or something because of this! _____________________________________________________________ ***************************************** ***Phreaking for some europeans *** memor [HBS] ***************************************** French and european people, all thoses barbars want to phone without paying their call, but they HAVE NO skills in electronics , so they always, mostly ask lame questions.. so their is some methods that doesnt needs thoses "electronician" skills. Well the first method if u dont want to pay yer bills is blueboxing. --------------------------------------------------------------------------------------------------------- Remember thoses two mf frequencies 1st: --------------------------------------------------------------------- they are composed of two basics frequencies (its do the mf) ,a lenght of that frequencie playing and a little delay before playing the next frequencie. Frequencie n°1: -------------------------- frequencie a:usually 2600 Hertz frequencie b:usually 2400 Hertz lenght : 150ms (random lenght) delay : 10ms Frequencie n°2: -------------------------- frequencie a:usually 2400 Hertz frequencie b:usually 2400 Hertz lenght : 300ms (random lenght) delay : 10ms Some goodies for frenchz now: -------------------------------------------------- anyways, their is for the french phreakers that old coloumbia local bluebox.. (only call drugs sellers in bogotta and others doodz in columbia ONLY) Number : --------------- 0800909000 (old 05909000) Frequencie n°1: -------------------------- frequencie a:usually 2650 Hertz frequencie b:usually 2350 Hertz lenght : 170ms delay : 10ms Frequencie n°2: -------------------------- frequencie a:usually 2450 Hertz frequencie b:usually 2350 Hertz lenght : 320ms delay : 10ms interest ------------ well find a friend or a local provider in columbia, really clean line.. its an inexistant number in columbia (el numero no es blahblah..) and well there is another local one if u want to call a little dude in malaysia in normal 2600 2400 for the first frequencie. Number : --------------- 0800909140 (old 05909040) Frequencie n°1: -------------------------- frequencie a:usually 2600 Hertz frequencie b:usually 2400 Hertz lenght : 170ms delay : 10ms Frequencie n°2: -------------------------- frequencie a:usually 2450 Hertz frequencie b:usually 2350 Hertz lenght : 320ms delay : 10ms interest ------------ well find a friend or a local provider in columbia, clean line.. operator answers. Warning: --------------- Don't bluebox too much , remember NHP/HI (great dude) in besançon city who got busted for month agos for blueboxing and carding.(for french : but well anyways if u want to bluebox, scan 0800906000 to 0800909999 number, its like a bunch of foreign lame countries operators, nonexistant , busy , carding, vmb numbers.) , beforer thoses ones, its "industrialized countries" like USA , Britain or others.. Well another method is the use of PBX : ----------------------------------------------------------------- It is the thing i use mostly now, bluebox is not really secure i think and i really prefer using thoses little lame thing (in france) with only a little 4 digits password. like that one 0800901234 (easy to remember eh?) , a foreign country PBX with only 4 digits.. only 10 000 attempts and u'll find it.. it doesnt have fake tones or shit.. protection level : 0. scanning method..well easy as HELL: ATDT 0800901234,,,0000,,3336431515 to ATDT 0800901234,,,9999,,3336431515 -------------------- ------- -------------------- -------- \ \ \ \ PBX number Scan is french number end of begining to call and to see scanning if the passwd works ATDT is the Dial Tone prefix for compatible Hayes modems. well easy to script or to programm is u have some skills of course.. i YOU don't have any skill .. well OR learn programming , lame scripting OR use ure favorite fone and dial 0800901234 , wait 6 seconds, dial 0000 wait 4 seconds, dial 3336431515 TO dial 0800901234 , wait 6 seconds, dial 9999 wait 4 seconds, dial 3336431515 Well another method is the use of Calling Card (YUCK): ----------------------------------------------------------------------------------------- Uhm.. if you use windows95, if you use Compudaze or AoHell.. i guess u have the correct iq (25) to use that method calling card.. well i dont have to talk a lot about that.. its easy as hell.. 1st step: go in a WAREZ channel and ask for it (dont go in #phreak because you will get banned) 2nd step: dial your favorite ATT or France Telecom operator 3rd step: a) get an american voice if u are french and say: ------------------------------------------------------------------------------ "Hello i would like an international call" - Card Number Please? Dial on your phone pad or tell it "My card number is blahblahblah" - Phone number to call? "i want to call 33 36431515" and then prepare your modem with an ATD to connect the french teletel network and prepare to play on ure favorite lame game servers on it (mud in 1200 bauds, imagines yuck). (Dangerous, if u are suspected on the server you are to fraud, the system operator will call 0800361415 and tells that someone is frauding on his server your id on his server ) b) you use a France telecom paster card. ------------------------------------------------------------------ its only a device, dial your card digits and the number to call without the 33 if its in France cause u are damn calling local in france (Really dangerous, get busted if you dont do it from a Payfone) Well for easy use, only that method for you lazy people,next time i'll talk about some methods for experienced people i guess.. write me and ask me questions in memor@mygale.org memor [HBS] -----=====[ C Tutorials: Introduction to C ]=====---------------------------- Well here it is. My Attempt to help people learn programming in C. Thanks to Scud-O I will be releaseing a new tutorial in each issue of THTJ. If you already know C then this first tutorial will not be much help to you, I plan on starting off with the very basics and I assume the reader has no current knowledge of the C language. First some basic things. You need to understand that you are not going to be able to write Windows programs by reading this, and there is no quick way to it. Windows programming is not easy and you will *not* find a quick guide to it. All the applications you learn to write thru this will be text-mode. Depending on how long I keep releaseing tutorials thru THTJ things will pick up the pace. You also need to know that what I tell you here is no different then what you would find in a beginners guide to C book. What is the main differnce then? Well from me it is free and if you want to go buy a book it about 50 dollars. Also you can communicate with me. Any questions you have you can always e-mail me and I will help you out. Also if I refer to certain compiler I will be refering to Microsoft Visual C++, because this is the compiler I use. It really doesn't matter tho because I have used Borland C++ and there is basically no differnce accept for certain options. When you write a program it always starts out with the source. You open up your editor and write the source for the program. The source is what tells your program what you want it to do. The traditional first c program is usually hello.c, well here is my version of it... fuckyou.c #include void main() { printf("Fuck you, world!@!\n"); } Now what does all that do? I will explain that in a moment. First off just write that in you editor. And go to build and you should see the following: --------------------Configuration: fuckyou - Win32 Debug-------------------- Compiling... fuckyou.c Linking... fuckyou.exe - 0 error(s), 0 warning(s) Pretty easy huh? Now on to the next step. Compiling the program. Go to compile and you will see the following: --------------------Configuration: fuckyou - Win32 Debug-------------------- Compiling... fuckyou.c fuckyou.obj - 0 error(s), 0 warning(s) Now you have done it. Your first program. All this program does is it will open up a DOS window and print the words "Fuck you, world!@!" If you didn't get this then you most likely messed up the source somewhere. That is no problem tho. Suppose you left out the ; after \n"). Then you would get this as the result of compiling: --------------------Configuration: fuckyou - Win32 Debug-------------------- Compiling... fuckyou.c C:\Windows\Desktop\fuckyou.c(6) : error C2143: syntax error : missing ';' before '}' Error executing cl.exe. fuckyou.obj - 1 error(s), 0 warning(s) The compiler tells you where the error is. [C:\Windows\Desktop\fuckyou.c(6)] The (6) tells you that the error occured on line 6 of the program. And it tells you what the error is, missing ';' before '}'. So all you do is go back to the source and insert ; where it belongs in the source and try again. This time it should work. So now back to the original source.. #include void main() { printf("Fuck you, world!@!\n"); } What does all this mean? Well I am just gonna put what each part means in the order they occur: #include - This is what tells the compiler to include another file along with your source. - This is the included file with the program you just wrote. The file stdio.h has standard input/output commands that most programs need. void main - This has two parts. Void identified the type of function and what it produces. This would be main, and since main does not produce anything in this program you have void. () - Right now this doesn't matter. Just know that you do it. You occasionaly may have something in them but not now. You then have {. Everything between the first { bracket and the last } bracket is a function. The {} show that everything between them is a function of main(). printf - This tells the program what to do. This is also one of the reasons you need to include stdio.h with this program. With out it the compiler does not understand printf. After printf you have a string (the text you wrote) include in parentheses. When you want to print words on the screen you will use the following: (" Blah blah blah \n") The \n is just showing its the end of the string and that you start a new line after that. The whole line ends with ; which tells the compiler that the statement ends. Then you finish the whole thing off with the last } bracket. So there you have it. Like I said this first one was going to be very basic but in following issues of THTJ I plan to move along faster and not get very technical with things you don't really need to know. But this is it for now. - Fucking Hostile (fh@sinnerz.com) _____________________________________________________________ Oddville, THTJ - From the Mailboxes of Scud-O Ok, I think it is time for you all to read some of the lame ass and wierd ass mail i get from month to month. Anyway, all names have been changed to hide the lame ass or crazy ass people. However, next month, if you send ANY lame mail to my old address i will post your name, since my old address is no longer for h/p mail, use scud@thtj.com for h/p mail. My replies are inside the brackets. --- Subject: Starting a elite realm Date: Fri, 4 Jul 97 20:04:13 +0000 From: xxx xxxxxx To: my old e-mail address Hey. My name is Xxx Xxxxxx and I am a Anarchist/Hacker/Phreaker and was wondering if you guys would like to start a club,a realm of Anarchists,hackers,phreakers,crackers and such if you will.The wanna be members would fill out a form and we would review it and then decide to let them in or not.If you agree to what I am proposing I would gladly be the Memebership reviwer and a hard working memeber.Write Back Asap [ five minutes of uncontrolable laughter... ] [ One word : NO. Gee i just love this 'great' idea of yours. First of, i have no fucking clue who you are, and 2, i told people to leave my old e-mail the fuck alone! ] --- Subject: [Fwd: Shotgun rules] Date: Wed, 2 Jul 97 22:19:53 +0000 From: psych0 just passing stuff along..... for reference, section II, #6... all i have to say is: "jabba" -psych0 ---------------------------- Subject: Shotgun rules Date: Wed, 2 Jul 97 08:20:15 +0000 From: disantis@fr.com To: comedy@fatboy.geog.unsw.edu.au The rules listed below apply to the calling of Shotgun (the passenger seat) in an automobile. These rules are definitive and binding. Section I The Basic Rules 1. In order to call Shotgun, the caller must pronounce the word "Shotgun" in a clear voice. This call must be heard and acknowledged by the driver. The other occupants of the vehicle need not hear the call as long as the driver verifies the call. 2. Shotgun may only be called if all occupants of the vehicle are outside and on the way to said vehicle. 3. Early calls are strictly prohibited. Shotgun may only be called while walking toward the vehicle and only applies to the drive immediately forthcoming. Shotgun can never be called while inside a vehicle or stilltechnically on the way to the first location. For example, one can not get out of a vehicle and call Shotgun for the return journey. 4. The driver has final say in all ties and disputes. The driver has the right to suspend or remove all shotgun privileges from one or more persons. Section II Special Cases These special exceptions to the rules above should be considered in the order presented; the case listed first will take precedence over any of the cases beneath it, when applicable. 1. In the instance that the normal driver of a vehicle is drunk or otherwise unable to perform their duties as driver, then he/she is automatically given Shotgun. 2. If the instance that the person who actually owns the vehicle is not driving, then he/she is automatically given Shotgun, unless they decline. 3. In the instance the the driver's spouse, lover, partner, or hired prostitute for the evening is going to accompany the group, he/she is automatically given Shotgun, unless they decline. 4. In the instance that one of the passengers may become so ill during the course of the journey that the other occupants feel he/she will toss their cookies, then the ill person should be given Shotgun to make appropriate use of the window. 5. In the instance that only one person knows how to get to a given location and this person is not the driver, then as the designated navigator for the group they automatically get Shotgun, unless they decline. 6. In the instance that one of the occupants is too wide or tall to fit comfortably in the back seat, then the driver may show mercy and award Shotgun to the genetic misfit. Alternatively, the driver and other passengers may continually taunt the poor fellow as they make a three hour trip with him crammed in the back. Section III The Survival of the Fittest Rule 1. If the driver so wishes, he/she may institute the Survival of the Fittest Rule on the process of calling Shotgun. In this case all rules, excepting I-4, are suspended and the passenger seat is occupied by whoever can take it by force. 2. The driver must announce the institution of the Survival of the Fittest Rule with reasonable warning to all passengers. This clause reduces the amount of blood lost by passengers and the damage done to the vehicle. Please follow the above rules to the best of your ability. If there are any arguments or exceptions not covered in these rules, please refer to rule I-4. ----------------------------------------------------------------------------- END OF ARTICLE ************** To join the comedy list, send the command: subscribe comedy in the body of a message to "majordomo@fatboy.geog.unsw.edu.au". [ Im not sure why i posted this, but who cares, its pretty funny. ] --- Subject: Proggie Date: Sat, 28 Jun 97 02:46:56 +0000 From: XxxxXxxx@aol.com To: my old e-mail address hey i have a question do you have any proggies or programs that actually tos someone off line....the reason i ask is because soemone tossed me and i want that program if you have on. What happed was he IMed me very fast and it made aol mess up! Can you send that program to me? Please Xxxxx [ Look, im not going to waste my time looking for some program for you, and i do not have any icmp or other type of nuking programs on my hard drive. go do a search on yahoo or lycos or something. and, you might not get tossed off line so much if you got off of aol. ] --- Subject: http://www.sinnerz.com/scud-o/ [ <- old address, thtj.com now ] Date: Tue, 24 Jun 97 01:57:46 +0000 From: xxxxxxx@xxxxxxx.xxxxxxx.xx To: my old e-mail wondering how to subscribe your zine [Ok, this is for you and the countless others who have asked for info on how to subscribe, go to http://www.thtj.com in a few days, and scroll down to the form that should be up and enter your e-mail address this will add you to the majordomo e-mail list, if my hosting server ever decides to set up the majordomo. if there is no form, there should be instructions next to the picture of the guy with the coffee maker in his car. ] --- Subject: THTJ Date: Sun, 22 Jun 97 13:04:46 +0000 From: "xxxxxx xxxxxx" To: old e-mail address Scud-O Just thought i'd drop you a line and say how great THTJ is. I've read every edition and spent many a happy hour playing with toys. Keep up the good work :) BTW What's the deadline for submitting articles for each issue? Do you have any cool contacts in the UK? [ Ok, once again, for you and all the people who have asked, the deadline for aritcles for each issue, is around the 23rd to the 25th of each month, and the issue will be released on the 1st of the folling month. We do like to get articles in ASAP, so send it in when it is done, and we will add it in right away. ] --- From: xxxxxxxxxxxxxxxxxxx To : hellcore@juno.com Sup: Where can I find your tech. manuals? bye [ Once again, to the number of people who have asked me, hellcore is not going to publish any manuals for a LONG time, since we are so damn busy with thtj. so quit bugging me! ] --- From: xxxxxx@aol.com To: hellcore@juno.com do u have the password for havoc [ What the FUCK? ] --------------- Well this is it for this month's installment of Oddville, THTJ , which is in no way related to Oddville, MTV. --------------- ---------------------------------------------- -------------- --=[The News]=-- Compiled & edited by KungFuFox -------------- 1 : Bellcore signs MOU with World Communication Group to explore... 2 : AT&T CEO to argue merits of Baby Bell tie-up 3 : U S West pulls high-speed, low-cost service, angers ISPs... 4 : AOL "Snoops On Members' Privacy" 5 : Netscape bug illustrates risky world of Net security 6 : Netscape fixes flaw, foils blackmail threat 7 : McNealy Injects Java With $150 Million 8 : NTT Gets Carved Up Into Three Carriers 9 : Spy Agency Wants To Sell Advice 10: Hacker Vows 'Terror' for Child Pornographers 11: The Ultimate Caller ID 12: Poll: U.S. hiding knowledge of aliens 13: Computer group unites to break computer code But it took 4 months 14: Senate Votes to Outlaw Bomb-Making Info 15: AT&T, Baby Bell Knot "Unthinkable" 16: Hackers' Dark Side Gets Even Darker Serpentor (rlb@ts60-06.tor.iSTAR.ca) has joined #phreak Is it true that all teenagers who use irc regularly are virgins who can't get laid Well, stud that I am, I often find it necessary to go for months, no, years, without a date or even talking to girl - but instead choosing to sit at a computer screen 18 hours a day - my head growing out of my neck at a 90 degree angle, personal hygiene and a social life sacrificed for the purpose of finding somem new pbx's. But other than that I women basically consider me to be a sex symbol. [#phreak - home of the studliest guys on IRC!] _____________________________________________________________ Bellcore signs MOU with World Communication Group to explore wireless local loop opportunities in China June 9, 1997 SINGAPORE -- Bellcore International and World Communication Group announced today that they signed a Memorandum Of Understanding (MOU) to explore the possibilities of deploying wireless local loop and mobility networks throughout China. The two companies announced this during Asia Telecom 1997. Under the terms of the memorandum, WCG would serve as system integrator and general contractor. Bellcore would provide consulting services to WCG on a variety of issues, including planning and engineering, integration testing and training. Bellcore would also supply software products such as mobility and network management products. "We have every expectation that Wireless Local Loop (WLL) service and technology will help meet unmet demand for telephone services throughout China," said Peter Wang, WCG's president and CEO. This MOU with Bellcore, a world-class provider of communications software with in-depth network knowledge, is a very important first step. Now we look forward to increasing the number of signed agreements with hardware suppliers and winning numerous new deployment contracts. At the basis of the memorandum is Personal Access Communications System, or PACS, an outgrowth of Bellcore Technologies. PACS services are a low-cost, wireline-quality alternative to conventional wireless services. They are particularly well-suited to densely populated areas, such as urban and suburban environments. "We believe our MOU with WCG marks a great beginning," said Kevin Connolly, president of Bellcore International. "Our wireless telecommunications software and consulting expertise is complemented by WCG's system integration strengths, on the ground sales, service and engineering staff, and track record in China. We're excited about working with them to make PACS WLL and mobility services available in China, arguably the world's largest potential telecom market." Bellcore International is a wholly owned subsidiary of Bellcore. Bellcore, based in Morristown, New Jersey, USA, is a leading provider of communications software, engineering and consulting services based on world-class research. Bellcore provides business solutions that help information technology work for telecommunications carriers, businesses and governments worldwide. On November 21, 1996 SAIC (Science Applications International Corporation) announced it had agreed to purchase Bellcore when the requisite regulatory approvals had been obtained. More information about Bellcore is available on the Web at www.bellcore.com. WCG is a fast growing wireless telecommunication company headquartered in Hazlet, New Jersey. It is a leading distributor of wireless telephony (fixed wireless) equipment and also a major service provider in China. The majority of its products and services focus on wireless local loop technology and wireless payphones. ©Business Wire _____________________________________________________________ AT&T CEO to argue merits of Baby Bell tie-up June 9, 1997 By Eric Auchard NEW YORK (Reuter) - AT&T Corp Chairman Robert Allen plans to defend a possible merger between AT&T and a Baby Bell local phone carrier in a luncheon speech Tuesday before an exeuctive group in Boston, the company said. An AT&T spokeswoman said Allen's comments on such a potential merger will be "hypothetical" and that he will not comment on recent media reports that AT&T is in talks to merge with SBC Communications Inc., a leading U.S. Baby Bell. Sources familiar with those talks have confirmed that the two companies have been holding substantive talks in recent months on a combination that could be valued at more than $50 billion, in what would be the largest merger in history. Both companies have declined to comment on the reports. A union of SBC and AT&T would combine a mighty provider of local phone services with the nation's leading long-distance powerhouse in the first such merger since the 1982 federal order breaking apart the Bell phone system monopoly. Allen is set to deliver the speech before the Chief Executives Club at the Boston Harbor Hotel. He will discuss the pros and cons that a merger with a regional local phone operator might give AT&T, the spokeswoman said. Among the questions he will address are whether there is any way in which a merger could be in keeping with the spirit of recent efforts to deregulate the phone industry, and the U.S. Telecommunications Act of 1996 in particular, she said. He will confront widespread antitrust concerns such a mega-merger might raise by arguing that a combination with a regional Bell company could actually act to spur greater competition in U.S. telecommunication markets, she said. "Is such a hypothetical merger that unthinkable? Is there any way in which it could actually function to spur local competition?" the spokeswoman said, referring to topics to be raised by Allen in his speech. "The main thing will be to firmly reiterate our commitment to competition and set the record staight on that," she said. "He certainly is going to address how significant we consider entry into the local service market." Jeffrey Kagan, an industry analyst based in Atlanta, speculated, "Tomorrow will probably be an effort to soften the criticism that reports of AT&T's merger talks with SBC have inspired." Critics have argued an AT&T merger would delay the advent of increased competition in local U.S. phone markets and note that SBC retains near-monopoly status in seven states in the Southern, central and Western United States, including the region served by SBC's recently acquired Pacific Telesis Group unit. "Everybody is thinking of every reason why it can't happen," Kagan said of the initial public reaction to AT&T's reported merger talks. "Allen will argue everything that could possibly go right with such a merger." He said Allen may sketch a potential plan to open up local phone markets to competition by splitting Baby Bell operators into separate wholesale and retail operations. The wholesale unit would then sell its services to both competitors and to a combined AT&T-Baby Bell local service retail operation, Kagan said. The plan would be designed to answer U.S. regulators' concerns that the market be "irreversibly open" to competition before Baby Bells are allowed into the U.S. long-distance phone market, he said. ©Reuters Ltd. All rights reserved. _____________________________________________________________ U S West pulls high-speed, low-cost service, angers ISPs, according to 'Inter@ctive Week' June 6, 1997 GARDEN CITY, N.Y. -- U S West Communications, the $13 billion communications giant, is discontinuing a service that allows competing telephone companies and Internet service providers to offer high-speed services at low prices, according to a story posted on the Website of Inter@ctive Week. The move is drawing the ire of the Internet community. U S West, which does business in 14 Great Plains and Pacific Northwest states, has stoped leasing "dry copper" lines in seven or eight of its states, and is working to pull the plug in its remaining service areas, according to the Inter@ctive Week report. Dry copper lines -- also known as Local Area Data Service, or LADS -- are standard twisted pair copper lines that are in place but aren't hooked up to provide telephone service. The lines, which use a low-powered signal are used for such things as security alarms and are relatively cheap to lease from U S West -- as low as $20 per month. In recent months, however, Internet service providers, or ISPs, and competitive local exchange carriers, or CLECs, have bought dry copper lines to resell to business customers equipped with Digital Subscriber Line, or xDSL, modems, devices that allow for fast Internet access. By cutting off the low-cost resale of dry copper lines, however, U S West effectively cuts off competitive provision of xDSL service at prices below what the telephone company wants to charge. U S West's Interprise Networking Services group, meanwhile, is slated to offer its own xDSL service this summer. Ray Guadia, director of AZAP Inc., a Las Vegas-based company that specializes in secure store and forward data transfers sees the move as an effort by U S West to protect artificially high prices for other services, such as its T-1 service at 1.5 Mbps. "It is not in the telcos' advantage to allow that wide bandwidth access under the 1996 telecommunications law because customers who are currently leasing (dedicated) T-1 for $2,000 can lease (dry copper) T-1 lines for under $100 a month, literally hundreds of millions of profits can switch from the telcos to the business community at large," Guadia told Inter@ctive Week. U S West said, however, that it's concerned about network degradation because these dry copper connections weren't intended to support high-speed services. XDSL signals can disrupt other services, when wires carrying both sets of service are bundled together within the telephone network. "The (dry copper connections) were intended to be just a signaling channel, like burglar alarm companies use," said Jeremy Story, spokesman for the U S West Interprise Networking Services group. "Essentially ISPs have latched on to this to create their own circuits and are providing (lots of) bandwidth across them. What that's doing is messing up the network," he said. Having high-bandwidth connections ruining in two directions within a central switching office results in what is known as cross-talk, said Joe Glynn, director of product marketing for megabit services, including xDSL services, at Interprise. Cross talk is caused by electromagnetic fields surrounding xDSL circuits that causes degradation on nearby cable bundles, he said. U S West is grandfathering in existing companies that are using the copper connections for high-bandwidth services. But that's a very limited group at this time, Story said. Inter@ctive Week, with a circulation of 100,000 is the leading publication for the Internet-involved business professional. Inter@ctive Week is published by Inter@ctive Enterprises LLC. ©Business Wire. _____________________________________________________________ AOL "Snoops On Members' Privacy" 06/09/97 By David Braun, TechInvestor WASHINGTON – America Online snoops into its subscribers’ incomes and details of their children, selling the information aggressively through a broker to third parties, a consumer watchdog group charged Monday. At a press conference to coincide with this week’s hearings by the Federal Trade Commission on online privacy issues, the editor of Privacy Times, Evan Hendricks, said he had spoken to at least 10 members of AOL, "and not one of them was aware this could be happening to them." While AOL users may be in the dark, the company has made it quite clear to investors that it expects to market its members. And AOL shares have surged recently on stronger-than-expected earnings and speculation that the company would be announcing more marketing deals to profit from its members. Hendricks published a front-page article in the latest edition of Privacy Times which said Reston, Va.-based AOL had turned to traditional direct marketing techniques to learn about its 8 million subscribers’ incomes, length of residence, age and children. "Then it aggressively sells its subscriber list through a broker, which can break it out into various segments." Consequently, Hendricks added, AOL members increasingly are targeted by junk mailers. "The practices raise questions about the adequacy of notice that AOL provides its members about marketing practices." Privacy Times quoted AOL spokesperson Tricia Primrose saying the online service provider was not willing to give details of how much money the company made selling members’ lists. Hendricks said AOL recently put on the market a specialized list of 1.4 million AOL members who purchase books, CD Roms, software games, AOL apparel from the AOL Store, direct mail and marketing. "The vast majority of AOL members on this specialized list are married with children living at home, are between the ages of 35-54, own their home, have income over $55,000, are at their home addresses and are credit worthy – over 90 percent pay by credit card," he said. The lists, which are said to be selling well, go for $110 per thousand names. They are marketed through a company called List Services Corp. Primrose said Monday she would comment later on Hendricks’ allegations. AOL members interested in learning about the company’s list practices are told to enter "marketing preferences" into a key-word search. The company tells members it "occasionally makes our membership list available to select, reputable companies whose products and services may be of interest to you AOL carefully screens all offers to its mailing list to ensure they are appropriate." Members are invited to list hobbies and interests they can check-off so they can receive information about those interests. According to Hendricks, none of the lists sold by List Services Corp. referenced the 15 hobbies and interests on AOL’s marketing preferences screen. Hendricks said personal details, such as income levels and information about children, are added to AOL’s profiles by means of marketing research. AOL members are given the option to check a box on the marketing preferences screen to request that they do not receive any junk mail. ©CMP Media, 1996. _____________________________________________________________ Netscape bug illustrates risky world of Net security June 15, 1997 BY DAVID L. WILSON Mercury News Staff Writer Fifteen-year-old Tim Howe of Milpitas did millions of Internet users a favor in March when he identified a security hole in Microsoft's Internet Explorer Web browser, a flaw that might have let outsiders view data on someone else's computer. He says he had trouble getting the software giant to take him seriously, but eventually Microsoft agreed there was a problem. "I was hoping for maybe a thank you," the 10th grader said, laughing, "but at least they fixed it, and that was the point." It's the point for a legion of Internet bug finders these days. They range from self-taught youngsters to computer science professionals. Howe worked solo, and didn't spend a great deal of time looking for the bug. Others work in teams, sometimes knowing teammates only by code names, and devote many of their waking hours to the task. And among the teams, some have malevolent aims. The bug finders' work matters because your electronic privacy matters, as was made clear again last week with the discovery of a bug in the Netscape browser. Computer security is a growing issue as more and more of our computers become connected via networks. Bugs that leave security holes in Internet software can be a threat to data on all kinds of computers, including the ones at home. Competitive pressures, meanwhile, have led software developers to push their products out the door sooner than ever. There have always been bugs in software, but the rush to market has made them more common, experts say. In addition, today's programs are much larger, with more capabilities, and are therefore more likely to conflict with each other in ways that cause problems. Like many bug finders, Howe went immediately to the company with his findings. But some bug-hunting teams first share their findings via the Net, banding together to explore the severity of the problem and to cobble together a solution. They are hackers in the original sense of the word, exploring and testing new systems just for fun. Some people, including Eugene H. Spafford, associate professor of computer science at Purdue University, call those who work to repair computer security holes the "White Hats." Also looking for bugs -- but in ways that Spafford and other experts find alarming -- are more malevolent hackers, known as "crackers" or "Black Hats." They don't want to plug the security holes, however. They want to use those bugs to snoop, spy, steal and often harass. (The precise definition of "hacker" or "cracker" depends largely on who's using the terms; many crackers insist they're hackers.) Formality shunned In keeping with the anarchic nature of the Net itself, the White Hats have no formal organization. They shun the semi-official Internet security system that revolves about the Computer Emergency Response Team Coordination Center, based at Carnegie Mellon University in Pittsburgh. The White Hats and security teams are often in direct conflict, with the official teams trying to keep a lid on knowledge about bugs until a fix is available. At the same time, the White Hats publicly pool their knowledge, racing to stay ahead of the Black Hats who, they assume, have as much information as they do. Black Hats and White Hats -- the crackers and the hackers -- both win status points from peers for solving tough problems, and enjoy the intellectual challenges presented by computer security. But White Hats work on security problems to make the Net a little safer for everyone, including themselves. White Hats and Black Hats rarely engage in the work for direct monetary profit, however, and that's one of the things that made last week's incident with Netscape Communications Corp. so unusual. In that case, a man who appears to represent a Danish computer consulting company called Cabocomm told Netscape that he wanted a large payment or else he would distribute the information publicly, with obvious risks to the company's stock price. Question of reward The consultant said Netscape's $1,000 bounty for significant bugs wasn't close to what the information was worth; most other companies provide something like a T-shirt for such information. Netscape announced last week that it had developed a patch for the problem itself. Offering money for bug discoveries has drawn contempt from some hackers. "We had a standing offer of $10,000 to anybody who could break into our site, but we stopped offering money when people in the community told us it was insulting," said Brett Nelson, firewalls product marketing manager for Secure Computing Corp., a computer security company with headquarters in Roseville, Minn. "Now we just offer things like nice leather jackets." Nelson said no one has successfully broken into the site, and he calls the Netscape incident unusual. "To a certain degree, what happened with Netscape -- you pay me what I want, or I hurt you -- is extortion, and right now it's not extremely common," he said. "But if somebody like Netscape caved in, I think it could become common." Already common are concerted efforts to test security systems by hackers and crackers alike. At any time, on any computer system, the odds are good that software written by the "intruder community," as law enforcement calls it, is probing for unplugged holes. If a vulnerable computer is found, word quickly spreads throughout the Black Hat community, whose members then rifle through files for anything useful. They sometimes use the machine to hide data, but nearly always use it as a jumping-off point to stage more attacks and better conceal their identities. Shared solutions The White Hats also constantly run such software through the paces, and whenever anybody finds something troubling, they post it to one of many electronic mailing lists or bulletin boards that deal with the topic. Other list members study the bug and try to re-create it on different systems. Then they proffer temporary solutions while working on more permanent fixes. One of the most respected security mailing lists is BUGTRAQ, administered by a man whose nom de guerre is Aleph One. He says his real name is Elias Levy, and that he is a computer security expert employed by a major Silicon Valley company. (Levy agreed to an interview on condition that his company remain unnamed.) Levy doesn't get paid for administering the list, which can suck up free time the way a black hole sucks in light. "If we didn't do this, you'd never see fixes for problems, because only the bad guys would know about them," he said. Levy and others deride the concept of not telling people about bugs until you've got a fix for them -- a policy they call "security through obscurity." It doesn't work because the intruder community already knows about the flaws, they insist. Many members of the teams that don't announce bugs before fixes acknowledge the system's potential flaws. "I can see both sides to it," said William J. Orvis, a member of the U.S. Energy Department's Computer Incident Advisory Capability, which, along with the other nearly 60 members of the international Forum of Incident Security Response Teams, keeps its lips zipped about problems until finding a solution. `A hard call' "I would love to involve everybody in the process, on the assumption that the bad guys already know about it, but the wannabes might not know about it," he said. "This is a hard call to make, but we don't put out a bulletin until we have a fix." A member of another security team, commenting on condition of anonymity, said this policy has won reasonably good cooperation from some major software vendors who know that their product lines won't be damaged by a public announcement of a security problem with no solution. "But some of these companies have had significant problems with their products for years, and have made no attempt to patch them," said the team member. "Oftentimes, the only way to get these guys to act is when something gets publicized." In that sense, the official security community and the unofficial White Hat community work with each other. Often, the mailing lists identify a problem, and the security teams -- members read the lists religiously -- squeeze the software vendor to build a patch. And many corporate computer security administrators wait for an official release from a security team before using a fix the White Hats have created. There's not likely to be any lack of work for members of either group any time soon. "The bad guys are just looking for a machine to break into," said Orvis. "They don't care what's in the machine. If you've got 1,000 computers connected to the Internet, it's a good bet that somebody is banging on your door daily." ©1997 San Joes Mercury News _____________________________________________________________ Netscape fixes flaw, foils blackmail threat June 14, 1997 BY TOM QUINLAN Mercury News Staff Writer A trans-Atlantic cyber scandal reached a rapid resolution Friday as Netscape Communications Corp. said it had fixed a serious security problem in its widely used Internet browser products, thus ending the get-rich-quick scheme of the Danish computer consultant who had notified Netscape of the problem and sought a reward. The Mountain View company plans to post early next week the solution for the browser bug -- which in rare cases would let a Web site operator grab files stored on a personal computer. The company said that, after testing the solution, it will first post to its Web site the fix for Netscape Communicator, its newest browser. Software fixes for Netscape Navigator's 2.0 and 3.0 series, which represent the overwhelming majority of current Netscape users, will be posted "shortly thereafter," a spokeswoman said, although no specific time frame was given. The bug affects all systems supported by Netscape's browsers, including computers running the Windows, Macintosh and Unix operating systems. Although software glitches are common, the Netscape bug drew attention because of the way it unfolded late Thursday, with Netscape characterizing the Danish company as behaving outrageously in its efforts to extract a big payment rather than cooperate in fixing the flaw. In e-mail correspondence, the consulting company told Netscape, using increasingly threatening tones, that it would publicly reveal the flaw's existence if Netscape didn't pay more than its standard $1,000 bounty to bug finders. The Danish outfit -- identified as Cabocomm and represented by Christian Orellana in e-mail exchanges obtained Friday from Netscape -- did indeed arrange for media coverage Thursday, at the time Netscape was holding its developer conference in San Jose and was preparing for the imminent shipment of Communicator. The messages to Netscape began several days ago, with Orellana at first seeming exasperated that he hadn't received a response and then asking for unspecified but significant amounts of money. Early on, providing only a bare-bones description of the flaw, Orellana asked that Netscape respond by the time of the developers' conference. "I think the person most suited for handling this is somebody in charge of the company checkbook," Orellana wrote. In later messages, Orellana informed Netscape that he was prepared to release the information to news organizations if the two companies could not reach an agreement. After detailing the effects of the bug, "...I think all pre-Communicator versions of Navigator... would be pretty worthless," Orellana said. "I'll leave it to you to estimate what impact that would have on Netscape stocks." Cable News Network's vehicle for financial news, CNNfn, and PC Magazine both reported the problem Thursday, and Netscape's stock dropped Friday, by $1.06 to $32.25. During the week, senior engineers and programmers at Netscape talked to Cabocomm engineers in an effort to determine exactly what the problem was, said company spokeswoman Jennifer O'Mahony. "(Cabocomm) wasn't very forthcoming," she said. "They felt if they said too much, they'd be giving everything away." While Netscape was talking with Cabocomm, a separate Netscape team of programmers tried to track down the problem independently. Although Netscape wouldn't identify details of the glitch Friday, or where in the program it resided, "in the end Cabocomm wasn't any help," O'Mahony said. "We ended up knowing a lot more about it than they did." Efforts by the Mercury News to contact Orellana by telephone Friday were unsuccessful. Netscape said Friday it was determining whether it would seek legal action against the Danish firm. Although the idea of threatening to go public with the information could be seen as a form of extortion under California's criminal code, extortion could be a very difficult point to prove, said Alan Ruby, a San Jose attorney who is a criminal law specialist. "It's a fine line, sometimes," Ruby said. "Things that corporations say everyday in the course of normal business dealings sometimes come close. It really depends on how something is said, and the context it's said in." An increasing number of security breaches have come to light in recent months, even as the Internet takes shape as a key global medium for business and personal communications. Financial transactions and other sensitive information frequently travel across the Net. In the case of the Netscape browser flaw, a person who was aware of it could develop a Web site that could read files directly off a user's hard drive. The Web site would have to know the exact name of the files it wanted to read, as well as the location on the user's hard disk. That's not as hard as it might appear because file names share a lot of similar characteristics. Someone seeking to read those files would probably be able to successfully guess file names, at least occasionally. Netscape downplayed the seriousness of the flaw, pointing out that apparently only one Web site had been created that took advantage of the bug, even though the problem has been in Netscape's products for at least 17 months. And Netscape was able to fix the problem in a matter of days after it learned of it. Microsoft Corp. recently acknowledged that Web-based applications written with the two most popular Internet software development environments -- known as Java and ActiveX -- can be written to damage or change information stored on a user's computer, something that Java users had been told would be impossible. Microsoft has said that all known problems in its Web browsing software have been fixed. Also, special software can read e-mail messages or determine what someone is looking at on the Web if the data are flowing through certain cable modems, which are expected to be one of the most commonly used ways for consumers to surf the Internet. ©1997 San Jose Mercury News _____________________________________________________________ McNealy Injects Java With $150 Million 06/13/97 By Malcolm Maclachlan, TechWire SAN JOSE, Calif. -- Sun Microsystems CEO Scott McNealy is not known for holding back his opinions. True to form, McNealy delivered some zingers Friday on why Java is better than Windows. Delivering the final keynote at the Netscape Developer Conference here, McNealy attacked Microsoft on areas such as scalability and compatibility. He also outlined a vision of the future in which Java is embedded in computers from the mainframe down to the smart card. "When you hear the word `thin client,' you may think of this," he said, pulling a smart card out of his wallet. "See how thin this is? Now can you imagine any Windows technology on a smart card? If you wanted to put it in your wallet, you'd have to redesign every pair of trousers on the planet." The tools exist today, he said, to embed Java in everyday items such as wrist watches, which could then communicate the information to the level of mainframes. The result, he said, could be a world in which a watch, with an antennae in the hand, could act as a debit card, car key and airplane boarding pass. This is the kind of scalability Microsoft is still trying to reach, he said, with its multiple versions of Windows, ranging from the handheld version, Win CE, up to the server software, Win NT. Sun is investing $150 million in R&D in Java in the next year, McNealy said. Among these projects: a default Java user interface for NCs, PCs and other devices; new chips that will make Java run faster; the new Java Developer Kit 1.2 Security Manager; and an Active X "bridge" for encapsulating Active X code into a Java-type bean. McNealy pointed to his company's close relationship with Netscape Communications, in Mountain View, Calif. Most of Netscape's Web hosting and databases run on SunSoft's Solaris, he said, and the company uses 700 Sun Stations. Sun, in the meantime, hosts numerous Netscape engineers working on joint development. This meeting of Netscape and the Solaris development offers the greatest hope for open standards for Internet development, he said, and for continued opportunities for small developers. "When is the last time you heard of a Windows start-up?," he asked. "Do a Windows business plan, submit it to a venture capitalist and see if you get a call back." ©CMP Media, 1996. _____________________________________________________________ NTT Gets Carved Up Into Three Carriers 06/13/97 By Douglas Hayward, TechWire TOKYO -- Japan's expensive and heavily regulated telecommunications market came closer to U.S.-style competition Friday, when the Japanese parliament passed legislation restructuring the country's dominant carrier, Nippon Telegraph and Telephone. The upper house of Japan's legislature gave final approval to a government provision that will divide NTT into three carriers -- two regional companies and an international carrier -- controlled by a single holding company. NTT, which has sales of 8 trillion yen ($70 billion), will also be allowed to compete in the international market for the first time. Friday's passage of the law will put the company into direct competition with KDD, Japan's dominant international carrier, in both international and domestic markets. In return for NTT being allowed to compete in the international market, KDD will be allowed to compete with the former state-owned NTT when the law goes into effect, probably in late 1999. KDD is said to be talking to regional Japanese utilities about plans to establish a second national telecom infrastructure. Japan's Ministry of Posts and Telecommunications said the reforms will increase the competitiveness -- and reduce the costs -- of Japan's huge but expensive telecom industry. The Japanese government said it is committed to letting foreign telecom carriers -- such as AT&T -- enter the domestic market, though legislation deregulating the Japanese market has not yet been passed. The new law and the planned deregulation measures would create "a new era of competition" in the Japanese telecom market, said Hisao Horinouchi, the minister for posts and telecommunications. ©CMP Media, 1996. _____________________________________________________________ Spy Agency Wants To Sell Advice 06/11/97 By Douglas Hayward, TechWire LONDON -- The computer services arm of Britain's largest spy agency wants to sell security advice to private utility companies facing hacking attacks from terrorist organizations. But utilities fearing imminent attacks from terrorist hackers will have to wait for advice -- the British government has been pondering the proposal for more than two years and has yet to give a date for any decision. The Communications Electronic Security Group said it wants British government officials to grant it the right to advise utilities -- such as electricity, gas and telephone companies -- on defense against so-called "information warfare" attacks by terrorist groups. Information warfare involves crippling military and civil information networks in pursuit of political and military objectives. The group has the right only to sell advice to government organizations. "Government systems are potential targets for information warfare attacks -- that is clear, and it's in our charter," said Tim Webb, head of policy in the group, which is part of the giant Government Communications Headquarters communications interception organization. Webb's public appearance Wednesday at the "Delivering Security To The Desktop" seminar here was one of the first by an officer of the spy agency. But, Webb added, the vulnerability of a nation does not lie in just government systems. "Recently the Irish Republican Army was attempting to blow up all the [electricity] power sub-stations in London with explosives," he said. "Another way to stop the power supply is to hack into the appropriate computers and bring the whole lot down." The computer group of the spy agency is responsible for the security of British government networks. As part of its mission, it develops security hardware and software, including encryption algorithms. The Cabinet Office, the government unit that controls the civil service, is considering whether to apply some of the group's knowledge about information security to protect the national infrastructure, Webb said. The desire to break into the utilities consulting market stems from reforms introduced by the free-market Conservative government of John Major, under which the agency was forced for the first time to sell its services to government departments to generate operating revenues. ©CMP Media, 1996. _____________________________________________________________ Hacker Vows 'Terror' for Child Pornographers by Steve Silberman 2:32pm 13.Jun.97.PDT -- After 17 years in the hacker underground, Christian Valor - well known among old-school hackers and phone phreaks as "Se7en" - was convinced that most of what gets written in the papers about computers and hacking is sensationalistic jive. For years, Valor says, he sneered at reports of the incidence of child pornography on the Net as "exaggerated/over-hyped/fearmongered/bullshit." Now making his living as a lecturer on computer security, Se7en claims he combed the Net for child pornography for eight weeks last year without finding a single image. That changed a couple of weeks ago, he says, when a JPEG mailed by an anonymous prankster sent him on an odyssey through a different kind of underground: IRC chat rooms with names like #littlegirlsex, ftp directories crammed with filenames like 6yoanal.jpg and 8&dad.jpg, and newsgroups like alt.binaries.pictures.erotica.pre-teen. The anonymous file, he says, contained a "very graphic" image of a girl "no older than 4 years old." On 8 June, Se7en vowed on a hacker's mailing list to deliver a dose of "genuine hacker terror" to those who upload and distribute such images on the Net. The debate over his methods has stirred up tough questions among his peers about civil liberties, property rights, and the ethics of vigilante justice. A declaration of war What Se7en tapped into, he says, was a "very paranoid" network of traders of preteen erotica. In his declaration of "public war" - posted to a mailing list devoted to an annual hacker's convention called DefCon - Se7en explains that the protocol on most child-porn servers is to upload selections from your own stash, in exchange for credits for more images. What he saw on those servers made him physically sick, he says. "For someone who took a virtual tour of the kiddie-porn world for only one day," he writes, "I had the opportunity to fully max out an Iomega 100-MB Zip disc." Se7en's plan to "eradicate" child-porn traders from the Net is "advocating malicious, destructive hacking against these people." He has enlisted the expertise of two fellow hackers for the first wave of attacks, which are under way. Se7en feels confident that legal authorities will look the other way when the victims of hacks are child pornographers - and he claims that a Secret Service agent told him so explicitly. Referring to a command to wipe out a hard drive by remote access, Se7en boasted, "Who are they going to run to? The police? 'They hacked my kiddie-porn server and rm -rf'd my computer!' Right." Se7en claims to have already "taken down" a "major player" - an employee of Southwestern Bell who Se7en says was "posting ads all over the place." Se7en told Wired News that he covertly watched the man's activities for days, gathering evidence that he emailed to the president of Southwestern Bell. Pseudonymous remailers like hotmail.com and juno.com, Se7en insists, provide no security blanket for traders against hackers uncovering their true identities by cracking server logs. Se7en admits the process of gaining access to the logs is time consuming, however. Even with three hackers on the case, it "can take two or three days. We don't want to hit the wrong person." A couple of days after submitting message headers and logs to the president and network administrators of Southwestern Bell, Se7en says, he got a letter saying the employee was "no longer on the payroll." The hacker search for acceptance Se7en's declaration of war received support on the original mailing list. "I am all for freedom of speech/expression," wrote one poster, "but there are some things that are just wrong.... I feel a certain moral obligation to the human race to do my part in cleaning up the evil." Federal crackdowns targeting child pornographers are ineffective, many argued. In April, FBI director Louis Freeh testified to the Senate that the bureau operation dubbed "Innocent Images" had gathered the names of nearly 4,000 suspected child-porn traffickers into its database. Freeh admitted, however, that only 83 of those cases resulted in convictions. (The Washington Times reports that there have also been two suicides.) The director's plan? Ask for more federal money to fight the "dark side of the Internet" - US$10 million. Pitching in to assist the Feds just isn't the hacker way. As one poster to the DefCon list put it, "The government can't enforce laws on the Internet. We all know that. We can enforce laws on the Internet. We all know that too." The DefCon list was not a unanimous chorus of praise for Se7en's plan to give the pornographers a taste of hacker terror, however. The most vocal dissenter has been Declan McCullagh, Washington correspondent for the Netly News. McCullagh is an outspoken champion of constitutional rights, and a former hacker himself. He says he was disturbed by hackers on the list affirming the validity of laws against child porn that he condemns as blatantly unconstitutional. "Few people seem to realize that the long-standing federal child-porn law outlawed pictures of dancing girls wearing leotards," McCullagh wrote - alluding to the conviction of Stephen Knox, a graduate student sentenced to five years in prison for possession of three videotapes of young girls in bathing suits. The camera, the US attorney general pointed out, lingered on the girls' genitals, though they remained clothed. "The sexual implications of certain modes of dress, posture, or movement may readily put the genitals on exhibition in a lascivious manner, without revealing them in a nude display," the Feds argued - and won. It's decisions like Knox v. US, and a law criminalizing completely synthetic digital images "presented as" child porn, McCullagh says, that are making the definition of child pornography unacceptably broad: a "thought crime." The menace of child porn is being exploited by "censor-happy" legislators to "rein in this unruly cyberspace," McCullagh says. The rush to revile child porn on the DefCon list, McCullagh told Wired News, reminded him of the "loyalty oaths" of the McCarthy era. "These are hackers in need of social acceptance," he says. "They've been marginalized for so long, they want to be embraced for stamping out a social evil." McCullagh knows his position is a difficult one to put across to an audience of hackers. In arguing that hackers respect the property rights of pornographers, and ponder the constitutionality of the laws they're affirming, McCullagh says, "I'm trying to convince hackers to respect the rule of law, when hacking systems is the opposite of that." But McCullagh is not alone. As the debate over Se7en's declaration spread to the cypherpunks mailing list and alt.cypherpunks - frequented by an older crowd than the DefCon list - others expressed similar reservations over Se7en's plan. "Basically, we're talking about a Dirty Harry attitude," one network technician/cypherpunk told Wired News. Though he senses "real feeling" behind Se7en's battle cry, he feels that the best way to deal with pornographers is to "turn the police loose on them." Another participant in the discussion says that while he condemns child porn as "terrible, intrinsically a crime against innocence," he questions the effectiveness of Se7en's strategy. "Killing their computer isn't going to do anything," he says, cautioning that the vigilante approach could be taken up by others. "What happens if you have somebody who doesn't like abortion? At what point are you supposed to be enforcing your personal beliefs?" Raising the paranoia level Se7en's loathing for aficionados of newsgroups like alt.sex.pedophilia.swaps runs deeper than "belief." "I myself was abused when I was a kid," Se7en told Wired News. "Luckily, I wasn't a victim of child pornography, but I know what these kids are going through." With just a few hackers working independently to crack server logs, sniff IP addresses, and sound the alarm to network administrators, he says, "We can take out one or two people a week ... and get the paranoia level up," so that "casual traders" will be frightened away from IRC rooms like "#100%preteensexfuckpics." It's not JPEGs of clothed ballerinas that raise his ire, Se7en says. It's "the 4-year-olds being raped, the 6-year-old forced to have oral sex with cum running down themselves." Such images, Se7en admits, are very rare - even in online spaces dedicated to trading sexual imagery of children. "I know what I'm doing is wrong. I'm trampling on the rights of these guys," he says. "But somewhere in the chain, someone is putting these images on paper before they get uploaded. Your freedom ends when you start hurting other people." ©1993-97 Wired Ventures, Inc. _____________________________________________________________ The Ultimate Caller ID by David J. Wallace 9:07am 13.Jun.97.PDT -- Move over, GPS. British astronomer Peter Duffett-Smith has invented a technology that can pinpoint a digital cellular phone's location within a few hundred feet. The system, called Cursor, tracks a handset by radio triangulation - a method similar to the use of radio telescopes to chart distant galaxies. Using a ping-and-reply system, a transmitter network relays the handset's location on the same 900-MHz phone frequencies. When the technology becomes commercially available in 1998, marketer Cambridge Positioning Systems envisions GPS-like uses such as regional mapping and enhanced 911 tracking. Privacy advocates have another take on it. "This is likely to be used by law enforcement to trace signals," says Marc Rotenberg, director of the Electronic Privacy Information Center. Under current law, telcos don't reveal call locations. But the FBI is petitioning to change this. "In the old days," notes Rotenberg, "the phone didn't move." ©1993-97 Wired Ventures, Inc. _____________________________________________________________ Poll: U.S. hiding knowledge of aliens (CNN) -- Nearly 50 years since an alleged UFO was sighted at Roswell, New Mexico, a new CNN/Time poll released Sunday shows that 80 percent of Americans think the government is hiding knowledge of the existence of extraterrestrial life forms. While nearly three-quarters of the 1,024 adults questioned for the poll said they had never seen or known anyone who saw a UFO, 54 percent believe intelligent life exists outside Earth. Sixty-four percent of the respondents said that aliens have contacted humans, half said they've abducted humans, and 37 percent said they have contacted the U.S. government. The poll has a margin of error of plus or minus 3 percentage points. But only 9 percent said they believed there were any aliens near the Hale-Bopp comet, which recently passed close enough to Earth to be seen with the naked eye. Some "ufologists" believed a spacecraft was hidden near the comet, and members of the Heaven's Gate cult committed suicide, believing that they would be taken aboard the craft and returned "home." What happened in Roswell? As for the Roswell incident, nearly two-thirds of the respondents to the poll said they believed that a UFO crash-landed in a field outside the New Mexico town 50 years ago next month. In one of the most famous UFO "sightings" in U.S. history, Roswell residents in 1947 saw lights in the night sky, followed by a loud explosion. A rancher found the "crash site" and removed a large piece of debris, storing it in his shed. A few days later, Air Force officials from nearby Roswell Air Force Base inspected the site and the debris, and issued a press release announcing the recovery of a "flying disc." The Air Force quickly retracted that statement, and claimed the debris was from a weather balloon. But countless statements -- some from military personnel -- appeared to contradict the Air Force's revised position. And several "witnesses" claimed to have seen bodies of dead aliens whisked away by the military. Roswell today capitalizes on its fame as a UFO crash site -- whether or not it actually happened -- and is hosting a 50th anniversary celebration the first week of July. Friend or foe? Most people -- 91 percent -- told the pollsters that they had never had contact with aliens or known anyone who had. A similar number -- 93 percent -- said they had never been abducted or known anyone whisked away by beings from another planet. But if they do meet someone from a galaxy far, far away, 44 percent said they expect to be treated as friends, while 26 percent think they'll be treated as enemies. Thirty-nine percent don't expect aliens to appear very humanoid, although 35 percent said they probably look "somewhat" human. ©1997 Cable News Network _____________________________________________________________ Computer group unites to break computer code But it took 4 months June 19, 1997 SAN FRANCISCO (AP) -- Using the Internet to harness the combined power of their machines, thousands of computer users broke a government-endorsed code that protects electronic money transfers. The group, organized by programmer Rocke Verser, took four months to read a message that had been scrambled using the code, known as the Data Encryption Standard. The code was finally broken Tuesday. The national standard, or DES, was considered almost unbreakable when introduced in 1977. It is required in most federal agencies but not the military, and is also widely used in the private sector. Critical information in computers is protected by the national standard and other encryption programs that use very large numbers to scramble information. Only the correct "key" can unlock the encrypted information. The longer the key, the harder it is to crack. Given the fact that it took four months to break through the standard code, experts say the nation's financial institutes are hardly at risk. Most of them use what it known as dynamic key exchange, which changes the keys almost constantly during a transaction. Taking months to crack the code wouldn't do thieves much good. Verser and his group were responding to a $10,000 challenge offered in January by RSA Data Security Inc., a Redwood City, California, company that sells encryption programs. The actual attack on the code was quite simple. Verser wrote a program that ran through every possible combination that might unlock the coded message -- 72 quadrillion of them in all. Then he put a copy of the program on his Web site and invited others to work on cracking it. Anyone could download the program, which would then run in the background as they went about their work. The project began with 20 computers and ended with 14,000 working on the problem. All told, they used 10 million hours of computer time. Had they started with 14,000 computers it would have taken about 30 days, Verser said from his Loveland, Colorado, home. While the code-cracking doesn't have much practical uses, it's a harbinger of things to come, said David Weisman, director of money and technology strategies for Cambridge, Massachusetts-based Forrester Research. "It's not something to cause a panic. But people have known that as computing power increases, key lengths have to increase," he said. The incident is likely to prompt more calls for relaxing U.S. laws that restrict the export of longer codes. ©1997 Associated Press. _____________________________________________________________ Senate Votes to Outlaw Bomb-Making Info by Rebecca Vesely 12:09pm 20.Jun.97.PDT -- The Senate has voted 94-0 to tack onto a Defense Department spending bill an amendment that would prohibit the distribution of bomb-making instructions in the United States. Although the word "Internet" is not mentioned in the four-page amendment, the legislation would outlaw Web sites, newspapers, zines, and books that publish instructions on how to make a bomb - such as The Anarchist's Cookbook and The Terrorist Handbook. Violators would face fines and prison sentences of up to 20 years. Sponsored by Senator Dianne Feinstein (D-California), who has been trying to get the legislation on the books since 1995, the amendment passed Thursday is narrowly written to include only the distribution of material that has an "intent to harm." In April, the Justice Department released a study that found there indeed is a connection between the availability of bomb-making instructions and the actual making of bombs. It also concluded that legislation criminalizing the publication of such information, if narrowly written, would not be a violation of the First Amendment. The Justice Department determined that the distribution of such materials is not a basic free-speech right, but an obstruction of justice. The Senate will vote on the defense bill early next week. The bill - and the amendment - will then go to a House conference committee. ©1993-97 Wired Ventures, Inc. _____________________________________________________________ AT&T, Baby Bell Knot "Unthinkable" 06/19/97 By David Braun, TechInvestor WASHINGTON -- Any combination between No. 1 long-distance company AT&T and a Baby Bell would be "unthinkable," Federal Communications Commission chairman Reed Hundt said Thursday. In a speech to the Brookings Institution in Washington, Hundt, who recently announced his intention to resign as FCC chief, attempted to put a spoke in the wheels of the merger being negotiated between AT&T and SBC Communications. The deal, which if approved will be the largest corporate marriage in US history, is expected to be announced formally within weeks. It will have to be cleared by federal regulators, including the FCC. "We are at a watershed point in the evolution of the telecommunications industry. Whether we have competitive or monopolized markets depends on the interactive and complex decisions of private firms, investors, Congress, agencies and courts. At stake is the possibility of billions of dollars of economic growth and astounding feats of innovation only achievable through competition," Hundt said in his speech. Combining the long distance market share of AT&T in any RBOC (regional bell operating company) region, even as it may be reduced by RBOC entry, with the long distance market share that reasonably can be imputed to the RBOC would yield a resulting concentration that was unthinkable, the FCC chief said. AT&T slapped back Thursday, saying all the FCC needed to do was to evaluate any merger proposal, "when and if it is made," on whether or not it accelerates competition in all local markets. "AT&T and the other long distance companies have documented the RBOC's foot-dragging with enough paper to fill an FCC hearing room," said Mark Rosenblum, AT&T vice president -- law and federal government affairs. "All we have suggested is that partnership transactions should not be an unthinkable way of breaking the logjam and accelerating the process of bringing real competition to local markets. "If a partnership between a long distance company and a local RBOC can be structured to increase competition both in the RBOC's home territory and in the states it does not currently serve, then it ought to be considered. "The chairman of the FCC said that if a merger between a long distance company and an RBOC is presented in the future, he will judge it on the law and the specific facts that are placed on the record. That's exactly what the FCC should do." Hundt had said that in analyzing an AT&T-RBOC hypothetical merger in terms of the local market, "Every RBOC is, in its region, by far the dominant firm in the provision of in-region local exchange service. Only a tiny fraction of customers choose any other local service provider." One of the best positioned entrants in the local exchange market was AT&T, Hundt said. "It is the largest telecommunications company in the country. It already has a business relationship with presumably about half the customers in any given Bell region. It has extensive network assets, a powerful brand, customer information, and sales force expertise. AT&T has already publicly set the goal of taking one-third market share in Bell markets. "Indeed, it's difficult to imagine that any other firm will be a more effective broad-based local entrant than AT&T as long as the market-opening provisions of the Telecom Act are fully implemented and enforced. It seems unreasonable to assert that AT&T cannot obtain at least some meaningful entry in Bell markets if it seeks to enforce all the rights of entry given to it under the new law and our rules. "Imputing to AT&T even a modest percentage of market share taken from the existing Bell incumbent in that Bell's region, as we must do under our potential or precluded competitor doctrine, then under conventional and serviceable antitrust analysis, a merger between it and the Bell incumbent is unthinkable. It would be exactly the type of horizontal combination that antitrust law frowns upon," he said. Hundt said the concerns created by an AT&T-RBOC merger were not confined to in-region combinations. Many of the RBOCs have expressed intentions to compete out-of-region in long distance and, eventually, local markets. They could be formidable competitors of AT&T, among others, in all out-of-region markets. This would be particularly true if the RBOCs supported and used the pro-competitive rules written by the FCC. Hundt stressed that because the Bell Atlantic-NYNEX merger was currently before the FCC, "I cannot and will not comment on that merger or how I think it should be categorized. Nothing in this speech should be read as any kind of communication on the topic of that merger." Meanwhile, Lehman Brothers lowered its rating Thursday on a range of telephone concerns to hold from outperform: U S West Communications, SBC Communications, GTE, BellSouth, Bell Atlantic, and Ameritech. The brokerage said it expected slower revenue growth in the sector. Earlier this week, A. G. Edwards lowered its ratings on Sprint, Ameritech, Nynex, SBC, and U S West, due to valuation. At market close Thursday, most of the RBOC’s shares were down. Nynex [NYN] was off 3/8 to 58 3/8; Bell Atlantic [BEL] was down 1/2 to 76 5/8; SBC [SBC] added 3/8 to 60 5/8; U S West [USW] was up 3/8 to 37 5/8; Ameritech [AIT] slipped 5/8 to 70 3/4; and BellSouth [BLS] retreated 3/8 to 46 1/ 4. AT&T [T] was up 3/8 to 37 7/8. Other long-distance companies were mixed. MCI International [MCIC] was up 1 to 39 5/8. Sprint [FON] was off 3/4 to 51 1/8. ©CMP Media, 1996. _____________________________________________________________ Hackers' Dark Side Gets Even Darker 06/19/97 By Douglas Hayward, TechWire LONDON -- The hacker community is splitting into a series of distinct cultural groups -- some of which are becoming dangerous to businesses and a potential threat to national security, an official of Europe's largest defense research agency warned Thursday. New types of malicious hackers are evolving who use other hackers to do their dirty work, said Alan Hood, a research scientist in the information warfare unit of Britain's Defense Evaluation and Research Agency (DERA). Two of the most dangerous types of malicious hackers are information brokers and meta-hackers, said Hood, whose agency develops security systems for the British military. Information brokers commission and pay hackers to steal information, then resell the information to foreign governments or business rivals of the target organizations. Meta-hackers are sophisticated hackers who monitor other hackers without being noticed, and then exploit the vulnerabilities identified by these hackers they are monitoring. A sophisticate meta-hacker effectively uses other hackers as tools to attack networks. "Meta-hackers are one of the most sinister things I have run into," Hood said. "They scare the hell out of me." DERA is also concerned that terrorist and criminal gangs are preparing to use hacking techniques to neutralize military, police and security services, Hood said. Other cultural groups evolving within the hacker community include gangs known as elites, who form closed clubs and look down on those ordinary hackers who employ commonly used attack tools, Hood said. "These guys [elites] develop their own tools," Hood said. "They get a camaraderie and an appreciation of their prowess from their peers." Another group -- known as "darksiders" -- use hacking techniques for financial gain or to create malicious destruction. They reject the classic motivation for hackers, which is to gain a feeling of achievement and authority, Hood said. "Hackers don't see electronic trespass as wrong per se, but the important thing about darksiders is that they cross the line [drawn by hackers] and start to be bad guys," he said. "That generally means they do it for gain or to cause harm." Users should stop believing they can build security systems capable of repelling any attack from hackers, Hood added. Instead, organizations should concentrate on minimizing the damage caused by attacks, and on deterring hackers. "I don't believe you can stop every hacker forever," Hood said. "All they need is one new technique you haven't heard about. But what you can do is minimize the target, by using knowledge and resources." According to DERA, users should divide their anti-hacker strategies into deterrence, protection, detection and reaction. Deterrence means making it so difficult for hackers that most give up and try another target, Hood said. Protection means more than installing firewalls and security software and procedures; it also means getting to know your system and removing all but essential content. "Everything you have on your system is at risk -- you should strip out anything you don't need," Hood said. "Make sure your system does what you want it to do -- no more and no less -- and make sure you have procedural policies to stop social engineering. If someone rings up and says they have forgotten their password, the person at the other end of the phone shouldn't automatically say OK and give them a new one," Hood said. Social engineering is the term used by hackers to describe how they obtain passwords, confidential information and credit by deception. Users should install monitoring software, preferably with the ability to detect attacks in real time, and should react to everything that looks out of place. DERA employs 14,00 staff and has a budget of $1.5 billion. Hood's division, the command and information systems division, is responsible for secure communications and information warfare and employs more than 500 scientists and engineers. ©CMP Media, 1996. _____________________________________________________________ _____________________________________________________________ LOGS 1. telnet log from memor 2. #phreak log from psych0 3. #hacking log from Optima --- 1 - telnet log from memor %TELNET-I-SESSION, Session 01, host mail.pratique.fr, port 25 220-prat.iway.fr Sendmail 8.6.12/8.6.12 ready at Thu, 5 Jun 1997 00:19:05 +0200 220 ESMTP spoken here helo a 250 prat.iway.fr Hello clp2.clpgh.org [192.204.3.2], pleased to meet you mail from:hbs@hbs.org 250 hbs@hbs.org... Sender ok rcpt to:root@skypub.com 250 root@skypub.com... Recipient ok data 354 Enter mail, end with "." on a line by itself hi, You finished by finding that .phf in cgi-bin of www.skypub.com , good job, dont forget a ls -a in /htdocs .. we didnt do bad things, only little hacking for making that group known.. HBS HAVOC BELL SYSTEMS.. talk a bit about us in yer magazine hm? :) that would make a big ads for us, please.. anyways.. phf is boggus, php.cgi is too, webdist.cgi, wievsource, wrap.. lots of cgi scripts are bogus.. so.. be carefull when ya intall one ;) bye memz [HBS] . 250 AAA06509 Message accepted for delivery --- 2 - a log from #phreak ( i think ) Subject: just a lamer to brighten your day Date: Sat, 14 Jun 97 16:14:32 +0000 From: psych0 To: Scud-O name: Rebel_Log (phraud@ip203-126.cc.interlog.com) proof: [12:11] *** Rebel_Log (phraud@ip203-126.cc.interlog.com) has joined #phreak heh... /list again =) [12:11] the amount of scroll he got must've given him a heart attack [12:12] sup poin dexter's hey guys.. type /whois * ... =) [12:12] *** Rebel_Log has quit IRC (Max Sendq exceeded) --- 3 - a long in #hacking on Undernet This log is of a really stupid person who thinks that if they scroll jiberish in the channel that it will flood people off (rarely happens). You have done a great job on THTJ and keep it up the good work. This log is from #hacking on Undernet [14:41] Joins: CrazyPooh (~crazypooh@alawan5-asl.ala.net) [14:42] [14:42] [14:42] [14:42] Quits: CrazyPooh (Excess Flood) haha [14:42] Joins: Ocnty (FireIce@sdn-ts-005cacoviP03.dialsprint.net) [14:42] lol [14:42] what a lamer [14:42] haha [14:42] Joins: CrazyPooh (~crazypooh@alawan5-asl.ala.net) [14:42] hi [14:42] Quits: CrazyPooh (Excess Flood) Heh [14:42] Joins: CrazyPooh (~crazypooh@alawan5-asl.ala.net) [14:42] so crazypooh [14:42] i stil havnt died CrazyPooh: You are lame as hell! [14:42] [14:42] [14:42] HAHAHA [14:42] [14:42] [14:42] lol [14:42] oh my god [14:42] what [14:42] Parts: CrazyPooh (~crazypooh@alawan5-asl.ala.net) [14:42] i`m gonna piss myself [14:43] haha [14:43] now he`s message flooding me [14:43] haha [14:43] i love my bitchx... [14:43] Ocnty is now known as \JamesBon [14:43] Joins: CrazyPooh (~crazypooh@alawan5-asl.ala.net) [14:43] [14:43] haha [14:43] [14:43] wb CP [14:43] Quits: CrazyPooh (Excess Flood) [14:43] lol shit...How Stupid is he? [14:44] oh my god [14:44] 2 lines and he floods himself off [14:44] Joins: CrazyPooh (~crazypooh@alawan5-asl.ala.net) [14:44] [14:44] [14:44] haha [14:44] [14:44] Quits: CrazyPooh (Excess Flood) heh [14:44] Joins: CrazyPooh (~crazypooh@alawan5-asl.ala.net) [14:44] [14:44] [14:44] [14:44] fuck he`s dumb [14:44] Quits: CrazyPooh (Excess Flood) This log has been provided by Optima _____________________________________________________________ ------------------------ ---------------------- -[HAVOC Bell Systems]- -[Acknowledgements]- ------------------------ ---------------------- ArcAngl : Just joined up Agrajag : Back from the dead btm : Elite (MIA?) darkcyde : #phreak old-schooler digipimp : Co-conspirator Digital_X : Nemesis (MIA?) dr1x : It's 420! disc0re : Thinks were on NBC ec|ipse : Hysterical bastard Keystroke : Submissions Editor shamrock : nice hair KungFuFox : Helped Reform #phreak RBCP : Funniest man alive memor : Ueberleet French phreak shoelace : FINALLY has ops psych0 : Lame ass mofo WeatherM : anarchist REality : Owns Own3r darc : Left #phreak Scud-O : Has a new car! JP : killed Antionline.com Redtyde : #phreak not so old-schooler tombin : phear! theLURK3R : Out Clubing antifire : NT security guru UnaBomber : Tired of IRC (MIA?) ChiaPope : sniff, we miss wrath! FH : want scud to have ICQ ------------------- TMessiah : Likes PGP -[ Channels ]- Revelation: old schooler ------------------- Modify : Lives near Scud-O #phreak : Newly Reformed |Banshee| : Also lives near Scud-O #sin : SIN Home mC : infected.com - nuff said! silitoad : Did ya like thtj? _____________________________________________________________ This Month's Question: _____________________________________________________________ Next Month: Look, we can predict the future about as well as a weatherman, so just chill out until july 1st to see what is going to be in thtj13! Issue 13 is out August 1st! Send all articles for issue 13 to Keystroke at: keystroke@thepentagon.com Tune in next time, Same Bat Time, Same Bat Channel! ========================================================== = Is this copy of The HAVOC Technical Journal skunked? = = If this file doesn't read at 152009 bytes, it probably = = doesn't have a born on date! Get a fresh copy from our = = NEW site at: http://www.thtj.com = ========================================================== -[End of Communique]-