-> he comes through again?
,x«`'«x,
,sS Ss, ,sS'` 'Ss, `"ý%%ý"'
,sS'` 'Ss$$$: $$$sS'` 'Ss$$$: $$$sS'` 'SssS
$$$:" """"""" " $$$$$:" """"""" " """""" " $$$$:
`""""^%ggggg. ` ```""""^%ggggg%^"" ",g#"' `7$$$:
.ggg. $$$'"""^%ggggg. `'¬¬¬¬¬' $$$: $$$$: .ggg.
$$$: $$$: $$$$$: `¬¬¬¬ $$$: $$$$: $$$
<< $$$>> $$$<< $$$$$>> ¬¬¬' $$$>> $$$$<< $$$ >>
$$$: $$$: $$$$$: ,¬¬: $$$: $$$$: $$$
::: $$$:: :$$$:: :::$$$$$: : ,¬¬¬¬, :::$$$::: $$$$: ::$$$ :::
$$$: $$$: $$$$$: ,¬¬¬¬¬¬ $$$: $$$$: $$$
$$$: $$$:``""""ýýý"''`¬¬¬¬¬¬' $$$:` `""""'' $$$
`"ýý%%ýý"' `"ýý%%ýý"' `"ýý%%ýý""ýý%%ýý"'
..>> system failure. anarchist / satire
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
³ System Failure: Issue #8 ³
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
Yoyoyoyo and stuff. Happy New Year. Here's issue 8, we barely made it on time,
but we've got some cool stuff in here. Sysfail.org was down for awhile due to
hardware problems at amer.net, but we're back with a completely new look. Be
sure to let us know what you think of our changes to the site, and keep those
submissions coming. Saint skullY the Dazed has been added to the group as
well, and also hosts our shell server (shell.sysfail.org). Enjoy the issue,
and I'll see you again in System Failure #9.
--Logic Box [1/30/98]
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
³ http://www.sysfail.org/ ³
³ [sysfail@linux.slackware.org] ³
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
eyem elite! (c) dh 1997
eye am a haxor so elite
i have mad juarez at my feet
i own your b0x left and right
yoh fbi, ill put up a fight!
as i ssping you with my packet juar4z
you try to find an ircOP that cares
as you reboot ur box, you think
why did i have to mess with this chink
you try and report denial of service, but logs dont count
five more packets and ur connection is out.
you get pissed and start to shout
THIS MOTHER FUCKER IS ONE BAD SCOUT!
try and turn me into the fbi
cause i keep making joo cry
with my bringing your network down like a rock
because you had to go off and be a c0ck!
i hear the fbi at my door
i rm my juarez, so they dont score.
they look confused with their frizzy hair,
they say this is just some kid, with no care.
Mother fucker, you think you've won.
but i have just begun.....
--- dh,.
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
³ CONTENTS ³
³ SysInfoTrade by Pinguino ³
³ Basic Linux Security by Logic Box ³
³ Understanding Bell Boxes by DataStorm ³
³ Firewalling Your Linux Boxen, Part 3 by Dr. Seuss ³
³ A Guide to Trojans by Kortex Bawm ³
³ Evading Anti-Shoplifting Devices by Spessa ³
³ Fear of the Unknown by NeWarrior ³
³ Fraud Force System Technical Interoffice Data by DDay ³
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
<-------+
| SysInfoTrade
+----------------> pinguino@leper.org
--Our domains are back up. www.sysfail.org has been fully redesigned, and
we're adding a telnet board and javaIRC. penguinpalace.com is back up and
being redesigned to appear as an umbrella organization for publications.
--DefCon is slated to take place mid August, but at an unknown location.
--ADSL is the new speed everyone's talking about; a quabizillion companies
getting together to make the web a faster place to play with. Here's the url
to see if your area is going to test it:
http://www.adsl.com/trial_matrix.html and for more info go to adsl.com
--Switchboard.com is now offering free email services. You can have a web
account there, or have it forward. They will also give you some cheesy
free webspace.
--Jan 19, 1997. AOL gets into another fight.. against the US Navy!
Apparently the sailor put "gay" on his profile, so he got dismissed from the
military. The sailor's name is Tim McVeigh, and he's suing the Navy with
AOL's support. The Navy says that having "gay" on an electronic profile goes
against their "don't ask, don't tell" policy.
--The birth of "digital phreak p1mps", a brand spankin' new lam-0 phreak
zine. It can be found at "http://members.tripod.com/~p1mp". The innaugeral
issue is to be released on January 30, so get off your ass and read it!
(info from hatredonalog)
--Can't get enough prank call tapes? Blackout's Box was a voicemail system
which moved to realaudio.. www.blackout.com
--Are you a "suspicious PERSON????" The Computer Assisted Passenger Screening
System (CAPS) might think so! When TWA's plane went down, the government set
up this system to tag people who fit the profile of a terrorist based on
40 pieces of data. This does not include race or religion. For personal story
of someone who was randomly chosedn a few times, check this out:
http://www.slate.com/FineWhine/97-05-24/FineWhine.asp
--US West is considering a split into two companies, US West Communications
and US West Media group. Communications is the phone company, and Media is
cable and DEX.
--US West is teaming up with Cisco, Williams, and Intermedia to complete its
"Next Generation National Data Network." Their goal is to offer full network
services outside their 14-state limit, being the first BOC to do so. They want
to offer applications utelizing IP telephony, fax systems, and multimedia.
By partnering with Intermedia, US West gains 142 additional data switches
and over 385 network-to-network interfaces(NNI).
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Basic Linux Security
by Logic Box (logic@linux.slackware.org)
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Security is a major headache for many a Linux user. Whether you've just
installed your shiny new distribution of Slackware or (god forbid) Redhat,
or you've been running Linux for awhile, chances are security is an issue to
you if have any desire at all to keep your Linux box in one piece.
I'm not some mighty security wizard, nor do I claim to be. I've only been
using Linux for about nine months at the time of this writing, and I still
have a lot to learn. Several of my suggestions in this article will
reiterate--and build on--the points made in Saint skullY's article from System
Failure #5. skullY (along with kadafi, drs, and vel0city, thanks guys) has
been one of the most helpful people to me in the short amount of time I've
been using Linux, so it would be difficult to write any sort of security
article without mentioning some of the things that I've learned from him. I
just thought it'd be a good idea to compile all my limited security
knowledge into one place. So, here goes.
The following information is applicable to pretty much any Linux system,
though I'd recommend it for Slackware users in particular, since that's the
distribution that I gathered all of this information with (Slackware 3.4
running the 2.0.33 kernel, specifically). If you aren't running Slackware,
you can get it at ftp://ftp.cdrom.com/pub/linux/slackware/
The Inet Daemon
---------------
The Inet daemon (inetd) is started at boot time and controls what services
are available on your system. You'll want to edit the inetd configuration
file (stored in /etc/inetd.conf) and weed out a few of the more needless
services.
A large majority of the services listed in inetd.conf are of no use to an
everyday Linux user, and several of them pose dangerous security hazards.
Unnecessary services should be commented out, after which inetd should be
restarted (killall -HUP inetd).
The only service that is absolutely needed is auth, which allows servers to
verify your identity via identd requests. Auth operates on port 113. If you
plan on giving out shell accounts, you might also want to enable telnet and
ftp. Pop3 and smtp services are unnecessary unless you plan on running a mail
server, and the other services are needless as well. If for some reason you
want to change the ports on which enabled services may be accessed, you can
edit them in /etc/services.
The Syslog Daemon
-----------------
The Syslog daemon (syslogd) is also started at boot time. It controls where
system log files are saved, and what sorts of activities are to be logged.
Its configuration file is stored in /etc/syslog.conf, and some quick
editing of it will make monitoring your system logs much more efficient.
First of all, you'll want to save your system logs to files. To do this, add
the following lines to your syslog.conf file (make sure to use tabs, not
spaces):
*.* /var/log/all
local5.* /var/log/tcplog
local4.* /var/log/icmplog
kern.* /var/log/kern
daemon.* /var/log/daemon
auth.* /var/log/auth
*.=debug /var/log/debug
*.=info;*.=notice /var/log/messages
*.warning;*.err;*.crit;*.alert;*.emerg /var/log/syslog
This will log most important information to text files, which you will be
able to review at your discretion. In addition, it is also very handy to
have a running activity log that you can view quickly and frequently. To
allow this, add these line to syslog.conf:
*.* /dev/tty7
local5.* /dev/tty8
local4.* /dev/tty9
kern.* /dev/tty10
daemon.* /dev/tty11
auth.* /dev/tty12
This will display all system activity on tty7 (Alt-F7), and it will also be
saved to /var/log/all, as shown above. TCP logs will be displayed on tty8,
with ICMP logs on tty9. Kernel messages will output to tty10, daemon
messages to tty11, and auth messages on tty12. This is very useful for
diagnosing problems quickly. If you're using tty7-12 for something else,
redirect the output to tty13-18 (or whatever) instead, which may be accessed
through the use of the right Alt key. After you've made changes to your
/etc/syslog.conf file, restart syslogd (killall -HUP syslogd).
I would also suggest running tcplog and icmplog at all times. They will
monitor TCP and ICMP connections to your machine, which will be displayed in
the syslog.
File and Directory Permissions
------------------------------
Now comes the fun part. SUID bits. SUID stands for Set User ID. Each user on
a Linux machine has their own unique user ID (UID), which can be changed
through the use of /bin/su. This can be an extremely dangerous program if
you don't know what you're doing.
There are many files on a Linux machine which require root privileges to
run. su is one of these programs, as are passwd, ping, strace, and several
others. When executed, such programs temporarily switch the user's ID to 0
(root), and then switch the UID back to its normal number when it is
finished. You can check to see if a file has a SUID bit on it by doing an ls
-la in a directory, and examining the file permissions. An "s" anywhere in
the file permissions means that the program sets UID 0 when executed. For
example:
-rws--x--x 1 root root 32196 Jan 3 21:38 /usr/bin/passwd*
The passwd file has a SUID bit, and changes the UID to 0 when it is executed
to change a user's password. This is necessary because only root has the
authority to change passwords, so the user is given temporary superuser
status while changing his password.
This is all good and well, but there are a great many exploits that can
create buffer overflows in SUID root programs, causing a premature exit and
spawning a root shell. Good examples of this are lpr, mount, and umount.
In order to protect against SUID exploits, it is advisable to remove the
SUID bits from most of the files on your Linux machine (chmod a-s filename).
The only programs which absolutely MUST have a SUID bit in order to operate
correctly are /usr/bin/passwd and /bin/su, as well as /usr/bin/sudo if you
use it (I don't). A quick way to scan your system for SUID root files is:
find / \( -perm -4000 -o -perm -2000 \) -exec ls -ldb {} \;
Unless you place implicit trust in everyone you give accounts to, it is also
unwise to allow free access of /bin/su to everyone. I would strongly suggest
creating a su group. Change group ownership of /bin/su to su (chgrp su
/bin/su), change its file permissions to allow only those in the su group to
access it (chmod o-x /bin/su), and add the following line to /etc/group:
su::1002:root,user1,user2,user3
Replace user1, user2, and user3 with appropriate login names of those who
should have access to /bin/su; add as many login names as you need to,
separated by commas. The su group's group ID (GID) is 1002, though you can
change this if you like.
As stated previously, passwd and su are the only programs on your system
that need to be SUID root to work. Their file permissions should look
similar to this when you are finished, with no other SUID root files on your
system:
-rws--x--x 1 root root 32196 Jan 3 21:38 /usr/bin/passwd*
-rws--x--- 1 root su 29784 Dec 9 21:35 /bin/su*
Another thing you might want to do is disallow others to access /root (chmod
700 /root), since sensitive files are often kept there.
Preventing Unwanted Logins
--------------------------
One thing you definitely do NOT want people to have the option to do is to
log in remotely as root. The /etc/securetty file controls which ttys are
allowed to log in as root. ONLY the console and local ttys (tty1, tty2,
etc.) should be allowed to log in as root. Remote ttys (ttyS0, ttyS1, ttyp0,
ttyp1, etc.) should not be allowed to log in as root. Comment these ttys
out. After being edited, your /etc/securetty file should look something like
this:
console
tty1
tty2
tty3
tty4
tty5
tty6
#ttyS0
#ttyS1
#ttyS2
#ttyS3
#ttyp0
#ttyp1
#ttyp2
#ttyp3
Another thing you might want to do (depending on how paranoid you are) is to
control what hosts are even allowed a login prompt on your machine. The
/etc/hosts.allow and /etc/hosts.deny files control this. You should add the
following line to /etc/hosts.allow, regardless of whether or not you want to
restrict access:
ALL:127.0.0.1
127.0.0.1 is the localhost (your computer). You can test out various
services such as telnet or ftp by connecting to yourself and logging in,
which would be impossible without this line in /etc/hosts.allow.
Now, if you're the paranoid type like me and you want to restrict who can
access your machine, first add this line to /etc/hosts.deny:
ALL:ALL
Trusted hostnames may then be added to /etc/hosts.allow. For instance, if
you've created an account for someone from cool.isp.net, you would add this
line to /etc/hosts.allow in order to allow that person to log in:
ALL:cool.isp.net
Dynamic hostnames are a bit trickier, though they don't present too much of
a problem. Let's say, for example, you wanted to allow someone from PSI.Net
to log in to your machine. That's all good and well, except for the fact
that their hostname is ip170.mountain-view.ca.pub-ip.psi.net and changes
evertime they connect to their provider. So, we'll allow for all PSI.Net
users within California to reach a login prompt by adding the following line
to /etc/hosts.allow:
ALL:.ca.pub-ip.psi.net
Restricting login access isn't terribly necessary, unless you are
administrating a machine for a corporation or you're just paranoid. :)
Boot Files
----------
Several files are executed at boot time, which are stored in /etc/rc.d.
These files run daemons, execute startup and shutdown scripts, and perform
custom-tailored actions specified by the administrator.
A couple of these files (/etc/rc.d/rc.M and /etc/rc.d/rc.inet2) call some
daemons that are probably not necessary for you to run. If you do not plan to
run a mail server, edit /etc/rc.d/rc.M and comment out the lines that refer
to the sendmail daemon.
# Start the sendmail daemon:
# if [ -x /usr/sbin/sendmail ]; then
# echo "Starting sendmail daemon (/usr/sbin/sendmail -bd -q15m)..."
# /usr/sbin/sendmail -bd -q15m
# fi
Similarly, if you aren't going to run a webserver, comment out the lines in
/etc/rc.d/rc.M that refer to httpd.
# Start Web server:
# if [ -x /etc/rc.d/rc.httpd ]; then
# . /etc/rc.d/rc.httpd
# fi
Some of these lines may be nonexistent or already commented out in your
/etc/rc.d/rc.M file if you have not installed the corresponding software
packages.
Next, edit /etc/rc.d/rc.inet2 and comment out the two sections referring to
SUN RPC. You might also want to disable the printer spooler daemon. When you
are finished editing rc.inet2, these three sections should look like this:
# Constants.
NET="/usr/sbin"
IN_SERV=""
LPSPOOL="/var/spool/lpd"
# Start the SUN RPC Portmapper.
#if [ -f ${NET}/rpc.portmap ]; then
# echo -n " portmap"
# ${NET}/rpc.portmap
#fi
# # Start the various SUN RPC servers.
#if [ -f ${NET}/rpc.portmap ]; then
# # Start the NFS server daemons.
# if [ -f ${NET}/rpc.mountd ]; then
# echo -n " mountd"
# ${NET}/rpc.mountd
# fi
# if [ -f ${NET}/rpc.nfsd ]; then
# echo -n " nfsd"
# ${NET}/rpc.nfsd
# fi
## # Fire up the PC-NFS daemon(s).
## if [ -f ${NET}/rpc.pcnfsd ]; then
## echo -n " pcnfsd"
## ${NET}/rpc.pcnfsd ${LPSPOOL}
## fi
## if [ -f ${NET}/rpc.bwnfsd ]; then
## echo -n " bwnfsd"
## ${NET}/rpc.bwnfsd ${LPSPOOL}
## fi
#fi # Done starting various SUN RPC servers.
Disabling the abovementioned services will close off a number of unneeded
ports, limiting the number of ports that people can connect to and thereby
reducing the number of security hazards.
Mounting Other Filesystems
--------------------------
It is not advisable to mount your DOS or (ugh) OS2 filesystems in publicly
accessible directories. Create directories in /root for these filesystems,
and mount them accordignly in /etc/fstab. For example, you might create a
/root/dos directory where /dev/hda1 (your DOS partition) is to be mounted,
and add the following line to /etc/fstab to mount it correctly:
/dev/hda1 /root/dos msdos defaults 1 1
Firewalling
-----------
While not absolutely necessary, firewalling can help a great deal to keep
unwanted things such as denial of service attacks at bay. I don't know much
about firewalling, but a lot of what I do know was learned from Dr. Seuss's
article "Firewalling Your Linux Boxen, Part 1: A Stand-Alone Firewall" from
System Failure #6 (http://www.sysfail.org/). Please refer to that article
for instructions on how to set up a basic firewall.
Passwords
---------
Passwords are annoying things. Fortunately, recent Linux releases (Slackware
at least) make some attempt to guard against password cracking. Users will
be warned when attempting to create weak passwords, and on some machines,
they won't even be allowed to use a password that the system deems weak. It
is advisable to use strong passwords, with a combination of numbers and
letters (upper and lower case), and a length of no less than six characters.
Shadowed passwords are also recommended. Recent Linux releases also come
with this enabled by default. Shadowed passwords are much more difficult to
crack, and could possibly save you quite a few headaches. If you don't have
the Shadow Password Suite, get it at
ftp://sunsite.unc.edu/pub/Linux/system/admin/ (shadow-971001.tar.gz was the
latest at the time of this writing) and install it.
Staying Updated
---------------
After following all of the above suggestions, the best way of keeping a
reasonably secure system would be to stay updated. Always run the latest
Linux kernel (2.0.33 was the latest at the time of this writing), keep your
libc files recent, keep your programs up-to-date, and make yourself aware of
new security exploits as they are found. The following links will help you
to accomplish this.
ftp://sunsite.unc.edu/pub/Linux/
ftp://tsx-11.mit.edu/pub/linux/
ftp://ftp.cdrom.com/pub/linux/
ftp://ftp.kernel.org/
http://www.linux.org/
http://www.ecst.csuchico.edu/~jtmurphy/
http://www.users.interport.net/~reptile/linux/
http://www.geek-girl.com/bugtraq/
This article is only an introduction to Linux security. Following these
suggestions will give you a reasonably secure system, and will keep your box
out of the hands of idiot wannabes seeking to screw you over.
Much thanks goes to Kadafi, Dr. Seuss, Saint skullY the Dazed, and vel0city.
I never would have been able to write this article without them, nor would I
have ever gotten as far as I have with Linux. If you've got questions or
comments about this article, feel free to e-mail me.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Understanding Bell Boxes
by DataStorm (havok@tfs.net)
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
I have found the usual texts on Bell system boxes vague and somewhat old, and
overall not very useful in the field. Because of this I have decided to write
my own, a more up-to-date and precise version if I do say so. Keep in mind
that this text is based around MY experiences with Southwestern Bell's
equipment, your RBOC may have different equipment or may label theirs
differently. Also, this text is NOT complete by any means, but should give you
enough information to get what you want.
Bell boxes differ as much in color and shape as they do in location and
operation. The easiest and perhaps the safest box to beige off of is the
CUI (Customer User Interface). This box is located at the side (sometimes the
basement) of 99% of buildings that have telephone service. This box is
divided into two sections, the customer test side, and the Bell service side.
The customer test side is opened with a philips screwdriver, and contains one
or many RJ-11 female sockets. This side was designed for use by the customer,
to test if a problem in their phone service is the customer's or Bell's
problem. Fortunately, most everyone has no idea that this box exsists, let
alone what it is used for. The Bell service side is pretty much useless to
phreaks, so don't worry about it. You should be able to phreak from this box
with no problem, so that is all I am going to say about it.
Leaving the safety of the customers' property and exploring the vastness of
the field, the next box I am going to discuss is the SPL, or splice box. This
box is about 2 1/2 feet high, and about 4 inches wide and deep (although I
have seen them twice as big, and in odd shapes such as cylinders). You will
know it is a splice box because it will have large letters on the front that
say "SPL". Find a secluded box, wait until night, and open it up. Inside is an
array of wires of all different colors. When I first started working with Bell
boxes, I about died looking in one of these for the first time. I expected a
neatly organized board with only the four standard pair colors, and screws
where I could screw in my beige. It wasn't until a few months later that I
actually found out how to use one of these. The wires ARE in pairs, but they
are in different colors for each pair, because so many pairs come though these
boxes (these boxes are used to seperate sections of cable, in case a cable
breaks they don't have to replace three miles of cable). This is the actual
telephone cable you are looking at, which I presume heads on to a cross box,
but I will disscuss that later. Below is a list of all of the colors and
their corresponding color to form a pair. To phreak on these boxes requires
you to do some damage. Of course, you probably don't care unless you're the
Bell tech doing the fixing.
Pair # Tip Ring
--------------------------------------
1 White Blue
2 White Orange
3 White Green
4 White Brown
5 White Silver
6 Red Blue
7 Red Orange
8 Red Green
9 Red Brown
10 Red Silver
11 Black Blue
12 Black Orange
13 Black Green
14 Black Brown
15 Black Silver
16 Yellow Blue
17 Yellow Orange
18 Yellow Green
19 Yellow Brown
20 Yellow Silver
21 Purple Blue
22 Purple Orange
23 Purple Green
24 Purple Brown
25 Purple Silver
On some telephone poles (usually right outside of a business), there are small
silver boxes (about the same size as the CUI). These boxes are made out of
aluminum and usually have one or two lines in them. Beiging from these boxes
is extremely easy; you just have to clip on and dial away. Be aware, though,
that these boxes are almost always located next to a street or busy area, and
you may have trouble using one carefully.
Most similar to the splice box, the next box I am going to talk about has no
proper name, at least to me. Call them whatever you like. I have heard Bell
technicians call them "pedestals" but that term can be used to describe many
different forms of Bell boxes. This box is the same size and shape as the
splice box, but is much different inside. Inside there are rows of screws,
just waiting for you to clip them with your beige box. A phreaker's dream if
you ask me. I don't know very much about them so this is as far as I go on
that topic.
The next type of box I am going to talk about is the infamous cross box. These
things are big. If you see a large green box that has the letters XBOX on it,
rest assured it is a cross box. These boxes are almost always out in the open,
and I would be careful when phreaking from one of these. From what I have seen
(and discussed with Bell technicians), the inside of these boxes resemble
punchdown blocks, each wire in its own cozy punchdown. If you have access to
the inside of these, you have access to A LOT [Editor's note: THERE KAD, ARE
YOU HAPPY? ;)] of phone lines. The lines are sometimes labled on the inside of
the swing-open doors, and Bell technicians sometimes leave tools and other
goodies inside of these. These boxes shouldn't be too hard for you to phreak
from--that is, if you can get access to one.
Moving right along. At the top of a telephone pole that services a house is an
array of lines, sometimes even extra lines. All that would be needed to get
your own second phone line at no charge is some wire, some coupling tools, and
some balls. I wouldn't be supprised if Bell noticed after awhile though
(actually I would be suprised if they DIDN'T notice).
Last but not least, I am going to tell you about the most powerful--and most
dangerous--phreaking tool there is. This is your local switch. Imagine it,
you walk in with your lineman's handset, and conveniently plug into ANY line
in the whole town. Better yet, go to your local AT&T or Sprint tandem switch.
You now have hundreds of lines available for you to access. Actually I
wouldn't reccomend doing anything in this last paragraph, or you may go to
jail forever.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Firewalling Your Linux Boxen, Part 3: Firewalling in Relation to Masquerading
by Dr. Seuss (drs@monks.net)
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
This article was intended to have information about firewalling in relation to
IP masquerading, and some cool firewall scripts. Unfortunately I suffered a
huge HD crash this week, losing the article and all the scripts, therefore all
you get is the IP Masquerading part. Check out SysFail #9 for my scripts
article.
If you don't know what IP Masquerading, is this article isn't for you.
When using Linux to masquerade a LAN you must consider a few things when
constructing a firewall. First you want to make sure that your firewall
doesn't restrict your LAN machines from accessing the internet or services on
your local machine.
For example, if you are running samba on your local machine to share data with
the Windows machines on your LAN, then the following rule for Firewall part 1
would also deny your local LAN.
ipfwadm -I -a deny -P tcp -S 0/0 -D 0/0 139 -o
In order to repair this, we have two choices. One is to add a -W ppp0 to make
it only apply to the ppp0 interface (e.g. packets not coming from the LAN), or
add this line above the existing line.
ipfwadm -I -a accept -P tcp -S 192.168.1.0/0 -D 0/0 139
Assuming your LAN is using 192.168.1.0/24 as its block of IPs that would
allow your LAN to communicate to your box, but still deny the outside world.
Check the other rules you are currently implementing and make sure they do not
interfere with the operation of your masqueraded machines.
The next thing you are going to want to do is make sure no one from the
outside can spoof their IP to connect to your machine, so add this line in.
ipfwadm -I -a deny -S 192.168.1.0/24 -D 0/0 -W ppp0
That will deny all traffic claiming to be from your local LAN.
The main thing to remember is to carefully check rules before placing them,
and understand what they do before you place them.
Sorry about the shortness of this article, but as I stated above, the majority
of it was going to be on firewall scripts. Oh well, stay tuned to SysFail, and
look for the scripts in the next issue.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
A Guide to Trojans
by Kortex Bawm (k0rtex@hotmail.com)
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
In case you aren't too bright, this article is about making and implementing
trojans on a UNIX type system. For this you should only need:
- A decent knowledge of a UNIX type system.
- Access to code for a common command/program run.
- A basic knowledge of the programming language C.
Definition
----------
Something is wrong with people today. No one gets the trojan definition right.
Everyone thinks its a type of virus. It can be, but normally, they aren't. By
definition from some dictionary I found at my house:
trojan (tro'jen): designed for one purpose, this purpose being cloaked by an
other which is not the actual purpose.
That's not the actual thing, I translated it into something real people could
understand. You get the picture.
Why Are Trojans Nice?
---------------------
Just because they are. A trojan can backdoor a system, get you root after
you've lost it, just plain get you root, and whatever else you can come up
with. The best reason is actually because of the fact that you must use
imagination to make one. They are just plain neato leeto reeto freeto caneeto.
Anyway, they will help a lot, regardless how experienced you are in hacking.
In The Beginning
----------------
There are several things you must do before being able to start. If the trojan
is really important, do some research. See what root runs all the time, or
what other superusers do. Now, try to find the code for it. Shouldn't be too
hard for most Linux commands, or things such as ircII or BitchX. Many people
put their trojan into the code for other things, such as telnetd and login.
This can be good, but it somewhat limits your ability of what you can do. It's
your choice, though. If you can't find the code for what you want, try
something else.
ftp://prep.ai.mit.edu/
^- A good place to get source for just about everything.
Making The Trojan
-----------------
Once you have the code, open it up. Here's where the knowledge of C comes in.
Most every thing you are going to run is going to have its own header files
(#include files), and you need to know where they should be when you compile
it.
Anyway, once you have the code open, you need to find a good place to insert
the trojan into the code. If it is a command, or something of that sort, I
would put it near the end of it, just before the exit/return function that
would end it. If it is another type of program, such as ircII, or some other
common program run by everyone, I would insert in near the beginning, when it
would open. It's all up to you though.
Depending on what you want the trojan to do, you may want to check if they
have uid 0 (root). That can be done with a simple line like:
if (getuid() == 0)
If you won't need root to execute the trojan (rare), you won't need that line.
Most trojans need/will work better with root access. Once you've established
if they have uid 0, you can move on to executing the trojan itself.
You know what you need the trojan to do. Normally it will only be a few short
commands and its done. Anyway, this can be done in two basic ways (at least
that I can think of). One, you can make a shell script (.sh file) and just
get the trojan to run it, using something like:
system("sh /home/mydir/myshellscript.sh");
In my opinion, using a shell script is about the stupidest thing you can do.
If root finds the trojan, he will most likely know who owns that shell script
(you), and cancel your account. The other would be to just straight out
execute the commands in the code. All you really have to do is add a few
system(); functions and it should work fine. Here's an example trojan (only
the trojan part):
if (getuid() == 0) {
system("cp /bin/sh /tmp/vi.save");
system("chown /tmp/vi.save");
system("chmod 4755 /tmp/vi.save");
wait(2);
}
That's pretty basic. The wait(2); function is optional. I just add it so
whoever runs it will think the computer is working real hard, since the copy
etc might take a little while on slow systems (btw, this creates a root shell
at /tmp/vi.save - note: this backdoor is common and easy to find, I suggest
not using that).
Implementing the Trojan
-----------------------
This is the easier part. There is really only one bad thing about trojans.
For most everything you trojan you will most likely need to already have bin
access, or some type of high level access so you can replace the old one. Even
ircII and BitchX are normally stored in the /bin directory if they are system
wide accessible.
Of course, compile the new code. After its compiled, just transfer it into the
directory it belongs, and hope a superuser runs it soon. Also, its a good idea
to keep a backup copy of the original binary file so you can replace it once
the trojan is activated. Optional though, of course.
The End Or Something
--------------------
Uhmm, that's the end or something. Any other questions mail to
k0rtex@hotmail.com ... Hope you might have learned something, probably not
though.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Evading Anti-Shoplifting Devices
by Spessa (spessa@phreakers.org)
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
In department stores, most expensive clothing items are protected by sensor
tags. Yet often these aren't really sensors at all, but little containers
which hold two glass tubes of ink. You can distinguish these tags from actual
sensors by examining the tag closely. Usually, the tag will just say "WARNING!
Any attempt to remove this tag will result in an explosion of glass and ink.
Do not remove!" Well, this warning is a total exaggeration; if you move the
top of the tag in a fashion which puts pressure on the glass tubes, they will
break and ink will flow onto the garment and your hands.
Little pieces of glass will NOT fly all over and disfigure you, don't worry.
If the item is of light color, you'll most likely have a permanent stain. So,
don't attempt removal of such in a dressing room! You'll come out with purple
and yellow on your hands, and the dressing room attendant (if there is one)
will probably call Loss Prevention to follow you around for the rest of your
visit to the store. You may even be detained for destroying store property.
So, what can you do? Since these types of tags aren't going to set off a
signal when you leave the store, conceal the item and do your work at home.
At least in the privacy of your own room no bitchy store employee will freak
out about ink all over your hands.
Once home, take off the warning sticker. On some models, once the sticker is
off you can clearly see where the two tubes are and where you're going to need
to saw. Other models require closer inspection between the two pieces which
are joined by a metal pin. Once you've determined how the tubes of glass are
lying, take a small, fine-toothed hacksaw (less than five bucks and worth
every penny) and saw directly down the middle of the tubes. Saw through the metal pin and
within moments the top and bottom pieces are separated. Put whatever ugly
article of clothing you acquired on and be proud of yourself.
But what about when you encounter actual sensor tags? These will not give you
any warning about glass and ink, but will trip an alarm as you exit the store.
Unless you live in an igloo in Antarctica, you've seen these sensors before.
What isn't heavily advertised though, is that older models of sensor tags and
alarms can be easily defeated. Your only problem is determining the age of the
system that your store has installed. If you know the history of the store,
and you remember when they implemented such devices, you can figure out if
this trick is worth your time. Anything older than a year at the time of this
writing (January 1998) is worth looking into.
First, to see if this will work at the store of your choice, arm yourself with
some aluminum foil. Just a little should do. Go into the store and remove one
of their tags from an item on the shelf. It wouldn't hurt to take two, just in
case one was deactivated accidentally. Go into a store restroom and LOOSELY
wrap your sensor(s) in the aluminum. Then try exiting the store. This is
sounding risky, but of course you're not going to try this with a new alarm
system, so the risk is highly diminished. If the alarms don't start wailing
and three security guards don't tackle you, go back into the store and see if
you trip the alarm again. If not, you've most likely found sensors which use
a frequency that aluminum disables.
If you're female, you can use a purse that has an aluminum lining. No, you
can't buy these; you have to make one yourself. Take the cloth lining out of
your purse and coat the inside of the purse with two layers of aluminum. Then
utilize your mad sewing skills and sew the cloth lining back in. You've got to
be very careful with this purse because it WILL make that "aluminum-crunching"
noise if you hit it up against something. Men can do basically the same thing
in jacket or pants pockets. Or, you can make your own "shop(lift)ing bag" by
making a false bottom (coated with aluminum, also) on a bag from another
store. This works particularly well in malls. The motive to this insanity is
so that you don't have to peel any of those obnoxious stickers off items or
fuck around with something you want to steal before you steal it. Less time
that you have the object in your possession in plain view is less time that
someone can see you with it. Good luck.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Fear of the Unknown
by NeWarrior (e-mail sysfail@linux.slackware.org to contact)
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Perhaps you see us walking down the street. Most of the time, we'll be on the
other side of the street, though, because you've already crossed to get away
from us. Perhaps you see us sitting in the dark corner of a coffee shop,
reading the newest issue of Sandman, or Poppy Z Brite's latest novel. You sit
and stare at us. Or, perhaps you wander into a club one night, and run into
one of us, wearing a long, flowing black skirt as we cotton-pick our way
across the dance floor to a rythem only we can hear in the music. You whisper
to your friends about us. It happens all the time. You call us names: faggots,
freaks, vampires. But, most of the time, there is one name we are not called.
And that is Goths.
Having considered myself a Goth for the past few years, I've ran into all
these experiances on more that one occasion. Fortunately, nothing has come of
it; people yelling at me as I walk down the street, whispers as I walk down
the halls in school, stares as I'm sitting in a McDonalds, but nothing else.
But that's not always the case. I've seen and heard stories of people being
physically abused, humiliated, and outcast solely based on their appearance,
one that does not fit into the realm of the norm. Without a shadow of a doubt,
this is not a good thing.
If you don't know what a Goth is, let me give you my idea: we are a (for the
most part) non-political agenda, musically based subculture. We like to dress
in black, have an interest in the darker, more mysterious things in life, and
listen to music like Sisters of Mercy, Bauhaus, Siouxsie and the Banshees, and
others. We are not vampires, although some of us claim to be, but usually they
are not considered Goth. Some of us take a liking to Victorian age dress, dark
peotry, and classic horror writers like Edgar Allen Poe, Bram Stoker, and the
like. We don't think we're the Crow, although some do. Again, usually they are
not considered Goth. Now, this does not mean all Goths subscribe to these
generalizations; I, myself, do not subuscribe to them all. But, most people
that consider themselves Goth have an interest in at least one of the
aformentioned.
If you want a full history of Goth, go somewhere else. That's not what this is
about. All this is about is enlightenment. Trying to get people that would
normally scoff at us to accept us. Easily, we are one of the most _feared_
subcultures. Not feared like one would fear being attacked by a rabid dog, but
feared because we are different. It shouldn't be any surprise, though, because
people fear the strange and unusual. Goths are strange and unusual, compared
to the "normal" person. What "normal" person would idolize a characted named
Death? What "normal" person would wear all black when _not_ attending a
funeral? Not many. And this is why we are feared. Simply because we are
different.
This is where we need your help. If you see on of us walking down the street,
and you like our make-up, compliment us. If your kid is staring at us, don't
pull him away. If you are ever staring at a flowing black skirt in a mall
while your wife is bying some clothes, try it on. Don't fear us. Live with us.
We may be different, but respect that. There are very few different people in
this world, and most Goths savor the fact that they are among them.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Fraud Force System Technical Interoffice Data
by DDay (hempfarm@stomped.com)
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
People in the Baton Rouge, New Orleans Louisiana and surrounding towns may
find some use in the following file. It documents the structure of the "Fraud
Force" system being implemented into these locations' cell sites and switches.
It is unknown if it will affect landline systems, but from the way it works,
it is doubtful.
EOC---------------------------------------------------------------------EOC
Interoffice Memorandum
Date: Febuary 18,1997 File: FRAUDFOR
To: Div/Dist Managers
Office Managers
Chris Nolen
Barry Gugliuzza
FROM: Phyllis May
SUBJECT: Fraud Force Use In Fraud Markets
Laura Graham developed the following procedure for the Customer Service Center
to be used when customers are using the phones in high fraud markets where
Fraud Force has been implemented.
The following details are unique to Region 1 and the Force implementation.
Fraud Force will start with the Baton Rouge system the week ending
Feb 28. Other markets will be added as needed.
All Louisiana, Arkansas, and Texarkana cellulars in this system will be
routed through Fraud Force.
Calls will be routed to Customer Service.
Please direct any questions to Jim Burnham at 318/683-3429 or Rhonda Woodard
at 318/683-3427.
(page 2)
Overview:
Purpose: FraudForce is a system implemented by Century, to help combat cloning
fraud for our customers roaming in high fraud areas. Affected markets will be
included as needed, those which are found to have high fraud rates.
(page 3)
Following is an overview of the verification process for Century customers
using cell service for the first time in a FF market. For detailed
instructions, see "Verification Process."
1. Customer places first call to any number.
2. Call is routed (hotlined) to FraudForce, where an Interactive Voice
Response (IVR) prompts the user to enter their 10-digit cell number, which
is verified ending with the pound key. The customer has three (3) tries to
enter their number correctly.
3. Call is transferred to Century Cellunet's customer service center.
- Valid customers will continue to step 4
- Invalid customers are instructed to make another call and
re-enter the correct cell number.
4. The customer information is verified to confirm the cell user is valid.
-----------------------------------------------------------------------
|If Information Is | The CSR |
-----------------------------------------------------------------------
| verified, | explains the call credit and |
| | procedure to establish PIN. Go to step 5 |
|-------------------------- -------------------------------------------
| not verified, | presses 0 on their keypad to transfer to |
| | a recording explaining the caller is |
| | denied. |
|__________________________|__________________________________________|
5. The CSR presses 1 to transfer the call to the FraudForce IVR,and the
customer interactively uses their phone keypad to establish a 4 digit PIN.
6. If a billed call, the CSR notes the length of the call and credits the
customer's account (length of call X roaming airtime rate) to AFDFC. This
is because the customer incurred airtime charges during verification and
PIN selection.
ESTABLISHING AND USING A PIN
Hours accessible: Any normal working hours. Customers after hours will be
directed to call during normal hours.
Call types: There are two types of FraudForce calls.
Fraud Force 1 These are calls where the customer entered a valid 10
------------- digit cell number when prompted after the initial hotline.
There are customers who had previously established a PIN,
however entered it incorrectly and must repeat the
verification process, or are making their first call in the
FraudForce market verifying for the first time.
Fraud Force 3 These are calls where the customer entered an invalid 10
------------- digit cell number or pressed zero (0) for assistance (the
customer has three tries to enter their cell # correctly).
The customer can not be verified without entering a valid
10 digit number. They are instructed to attempt the call
again,so they receive the IVR prompts to enter the 10
digit number correctly.
PIN DETAILS: The PIN is four digits and should not start with zero.
The PIN is not accesible to Century. The customer must
remember their PIN.
Once established, the PIN is valid in that market until
Century removes it and the customer calls the IVR to
establish a new one. This can be done if the user forgets
their PIN or if the usage/user appears to be fraudulent and
Century needs to block service.
A PIN must be established in each FraudForce market. The
same PIN may be used in every FraudForce market, or
different PINs may be used.
Different customers MAY have the same PIN.
The customer will periodically be asked to enter the PIN
before making a call.
A user has 3 tries to enter the PIN correctly. On the 4th
try,the call will be directed to Fraud Force 1.
(page 4)
VERIFICATION PROCEDURES
The following are the procedures for a FraudForce 1 call.
1. Customer first places call to any number.
2. Caller is hotlined to FraudForce,where an IVR prompts the user to enter
their 10 digit cell phone number and the pound key.
3. When entered correctly, the call is transferred to Century's customer
service center, with the following introduction: "Please verify your 10
digit cellular number. Press any key to accept this call."
4. The CSR presses any key on their phone to accept the call and says to the
caller "Century Cellunet, this is (name). You are currently roaming in a
high cellular fraud area. For your protection and ours,will you verify some
account information to enable you to establish a Personal Identification
Number,or PIN."
5. Important: customer information must be verified to confirm that the
account holder, secondary authorization holders, or business account
cellular users are valid before given access to establishing a PIN.
Individal Accounts:
What city are you currently in?
What is your mobile number?
What is your name?
If user differs from account name, what is the name on the account?
What is your Social Security Number?
If the Social Security number is not verified, verify one of the following:
What is the account's billing address?
What is your home phone number?
What is your work number?
Business Accounts:
What city are you currently in?
What is your mobile number?
What is your name?
What is the account name?
What is the account's billing address?
The general billing address is okay, if not verified at all (customer does not
know), verify the following:
What is your work phone number?
(page 5)
If information is verified:
Thank you for your cooperation.
If a billed call: You will receive credit for this call.
If a free call: This is a free call.
I am now returning you to the system so you can set up your PIN.
The CSR presses 1 on their keypad to transfer to the FraudForce IVR to
establish their PIN.
If Information is NOT verified:
"I am unable to authorize the information you have given," and presses 0
on their keypad to transfer the call to a recording explaining the call
is denied (no don't give out account information).
7. The CSR tickles the customer's account using an action code of PENDF.
Include the 1- digit cellular number, FF, whether or not the customer
was verified.
(page 6)(End of Memo)
I would have typed the rest of this file, but it's basically just a list of
customers' questions and alternate places for the caller to be transferred.
Nothing you pretty much need to know about the system, but if you keep a copy
of this on hand, you may be able to bypass. You have what the operator is
looking at, you know what she's going to do. Use this information, don't
flaunt it. Century is a good corporation, but sometimes you need a cell! If
updates to this file are made, I will be sure to send them out to the public.
UPDATE: I have just discovered that FraudForce is now being implemented in
almost all cities around the country that use Century. Now this is a serious
problem.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Well, that's the end of issue 8. I hope you all like the site redesign, and
I'll be back in a month or so with System Failure #9. E-mail us your comments
and submissions at sysfail@linux.slackware.org. Werd out!@
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-E-O-F-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-