==Phrack Inc.== Volume Four, Issue Thirty-Nine, File 2 of 13 [-=:< Phrack Loopback >:=-] By Phrack Staff Phrack Loopback is a forum for you, the reader, to ask questions, air problems, and talk about what ever topic you would like to discuss. This is also the place Phrack Staff will make suggestions to you by reviewing various items of note; magazines, software, catalogs, hardware, etc. _______________________________________________________________________________ A Review of Steve Jackson Games' HACKER ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ By Deluge They had to get around to it eventually. While I was scanning the game section at the not-so-well-stocked game and comic store where I shop on occasion, I saw something that caught my eye: A game called "Hacker" by Steve Jackson Games. What you see on the cover gives you a clue that this game is a bit more than the typical trash we see about hackers. Here we have a guy with a leather jacket with a dinosaur pin, John Lennon shades, a Metallica shirt, and a really spiffy spiked hairdo. This guy has an expression with a most wicked grin, and his face is bathed in the green glow of a monitor. Various decorations in the room include a model rocket, a skateboard, a pizza box, and a couple of Jolt Cola cans. Behind him, hanging on his wall, are a couple of posters, one which says, "Legion of Doom Internet World Tour," and another which says, "Free the Atlanta Three." On his bookshelf, we see a copy of Neuromancer, Illuminati BBS, and The Phoenix-- (I assume "Project" follows, and don't ask me why this guy has BBSes in his bookshelf). Finally, there's a note tacked to the LOD poster that says "PHRACK SummerCon CyberView, St. Louis" which appears to be an invitation of some kind. This struck me as quite interesting. Twenty bucks interesting, as it turns out, and I think it was twenty well spent. Now don't tell me Steve Jackson Games has no significance for you (sigh). Ok, here is how Steve tells it (in the intro to the game): ----- "In 1990, Steve Jackson Games was raided by the U.S. Secret Service during a 'hacker hunt' that went disastrously out of control. We lost several computers, modems, and other equipment. Worse, we lost the manuscripts to several uncompleted games, most notably _GURPS Cyberpunk_, which a Secret Service agent the next day called 'a handbook for computer crime.' The company had to lay off half its staff, and narrowly avoided bankruptcy. "Eventually we got most of our property back (though some of it was damaged or destroyed). The Secret Service admitted that we'd never been a target of their investigation. We have a lawsuit pending against the officials and agencies responsible. "But since the day of the raid, gamers have been asking us, 'When are you going to make a game about it?' Okay. We give up. Here it is. Have fun." ----- Weeeell...everybody naturally wants to look as good as they can, right? For the real lowdown on the whole situation, a scan through some old CUDs would be in order, where you could find a copy of the warrant which authorized this raid. I can tell you that Loyd Blankenship is the author of SJG's _GURPS Cyberpunk_, so draw your own conclusions. Hacker is played with cards. This does NOT, in my view, make it a card game, though it is advertised that way. It's pretty similar to Illuminati, requiring a lot of diplomacy, but it has a totally different flavor. The goal here is to become the mondo superhacker king of the net by getting access on twelve systems. You build the net as you go along, upgrading your system, hacking systems, and looking for ways to screw your fellow hackers so they can't be king of the net before you can get around to it. While the hacking aspect is necessarily resolved by a dice roll, the other aspects of this game ring true. They distinguish between regular and root access on systems, have specific OSes, specific net types, NetHubs, secret indials, back doors, and, of course, the feds, which range from local police to combined raids from the FBI and other government authorities. This is a good game all on its own. It's fun, it has a fair amount of strategy, lots of dirty dealing, and a touch of luck to spice things up. And if things get too hairy and blood is about to flow, they inevitably cool down when someone uses a special card. Quite a few of these are funny as hell. Some examples: Trashing: Somebody threw away an old backup disk. Bad idea. You can leave them e-mail about it...from their own account. Get A Life: A new computer game ate your brain. 100 hours later, you beat it, and you're ready to get back to hacking, but you get only one hack this turn. There is another one of these about meeting a member of the opposite sex and briefly entertaining the notion that there is more to life than hacking. Original Manuals: The official system manuals explain many possible security holes. This is good. Some system administrators ignore them. This is bad. They usually get away with it because most people don't have the manuals. This is good. But YOU have a set of manuals. This is very interesting. Social Engineering: "This is Joe Jones. My password didn't work. Can you reset it to JOE for me?" There is another one of these that says something about being the phone company checking the modem line, what's your root password please. And my favorite, a card designed to be played to save yourself from a raid: Dummy Equipment: The investigators took your TV and your old Banana II, but they overlooked the real stuff! No evidence, no bust -- and you keep your system. As you can see, this game goes pretty far toward catching the flavor of the real scene, though some of it is necessarily stereotypical. Well, enough praise. Here are a couple of gripes. The game is LONG. A really nasty group of players can keep this going for hours. That isn't necessarily a bad thing, but be forewarned. A few modifications to shorten it up are offered, but the short game is a little like masturbating. Just not as good as the real thing. There was too much work to get the game ready to play. I've gotten used to some amount of setting up SJGs, and believe me, I would not have bought more unless they were good, and they always are, but the setup has not usually been such a pain. HACKER has a lot of pieces, and a lot of them come on a single page, requiring you to hack them out with scissors and hope you don't do something retarded like cut the wrong thing off. Once I got done with this, everything was cool, but this was a real pain. So, overall, what do I think? Four stars. If you play games, or if you're just massively hip to anything about hacking, get this game. You're gonna need at least three players, preferably four or five (up to six can play), so if you only know one person, don't bother unless you have some hope of getting someone else to game with you. And when Dr. Death or the K-Rad Kodez Kid calls you up and wonders where you've been lately, just tell him you're busy dodging feds, covering your tracks, and hacking for root in every system you find in your quest to call yourself king of the net, and if he doesn't support you...well, you know what to do with posers who refuse to believe you're God, don't you? Muahahahahahahaahaha! _______________________________________________________________________________ CPSR Listserv ~~~~~~~~~~~~~ Computer Professionals for Social Responsibility (CPSR) has set up a list server to (1) archive CPSR-related materials and make them available on request, and (2) disseminate relatively official, short, CPSR-related announcements (e.g., press releases, conference announcements, and project updates). It is accessible via Internet and Bitnet e-mail. Mail traffic will be light; the list is set up so that only the CPSR Board and staff can post to it. Because it is self-subscribing, it easily makes material available to a wide audience. We encourage you to subscribe to the list server and publicize it widely, to anyone interested in CPSR's areas of work. To subscribe, send mail to: listserv@gwuvm.gwu.edu (Internet) OR listserv@gwuvm (Bitnet) Your message needs to contain only one line: subscribe cpsr You will get a message that confirms your subscription. The message also explains how to use the list server to request archived materials (including an index of everything in CPSR's archive), and how to request more information about the list server. Please continue to send any CPSR queries to cpsr@csli.stanford.edu. If you have a problem with the list server, please contact the administrator, Paul Hyland (phyland@gwuvm.gwu.edu or phyland@gwuvm). We hope you enjoy this new service. _______________________________________________________________________________ TRW Allows Inspection ~~~~~~~~~~~~~~~~~~~~~ According to USA Today, as of April 30, you can get a free copy of your TRW credit report once a year by writing to: TRW Consumer Assistance P.O. Box 2350 Chatsworth, CA 91313-2350 Include all of the following in your letter: - Full name including middle initial and generation such as Jr, Sr, III etc. - Current address and ZIP code. - All previous addresses and ZIPs for past five years. - Social Security number. - Year of birth. - Spouse's first name. - A photocopy of a billing statement, utility bill, driver's license or other document that links your name with the address where the report should be mailed. _______________________________________________________________________________ The POWER Computer Lives! ~~~~~~~~~~~~~~~~~~~~~~~~~ Do the words of the prophet Abraham Epstein ring true? (Remember him from his correspondence in Phrack 36 Loopback?) If you don't believe that The IBM/TV Power Computer and is attempting to take over the world then read the following and judge for yourself. o IBM is the worlds largest corporation. o IBM has more in assets than most small countries. o In 1991 IBM and it's arch enemy, Apple Computer, have joined forces to build the POWER computer. o The POWER computer will replace all existing Macintosh, PS/2, and RS/6000 machines. o The POWER architecture will be licenced to third-party companies in order that they may build their own POWER computers. o With both Apple Computer (QuickTime) and IBM (Ultimedia) advancing their work on Multimedia, it can only mean that the POWER computer will speak through TV. - - - - - - - - - Here are some quotes from Harley Hahn of IBM's Advanced Workstation Division: "PowerOpen is a computing architecture based on AIX and the POWER Architecture. To that we've added the PowerPC architecture [a low- end implementation if POWER ] and the Macintosh interface and applications." "Our goal is to create the major RISC computing industry standard based on the PowerPC architecture and the PowerOpen environment." "Eventually all our workstations will use POWER" - - - - - - - - - Here's a quote from Doug McLean of Apple Computer: "It is our intention to replace the 68000 in our entire line of Macintosh computers with PowerPC chips." - - - - - - - - - The PROPHECY IS COMING TRUE. We have no time to lose. Unless we act quickly the world will come to an abrupt end as the POWER COMPUTER passes wind on all of us. Abraham Epstein [Big Daddy Plastic Recycling Corporation] [Plastic Operations With Energy Resources (POWER)] _______________________________________________________________________________ Major Virus Alert ~~~~~~~~~~~~~~~~~ George Bush Virus - Doesn't do anything, but you can't get rid of it until November. Ted Kennedy Virus - Crashes your computer, but denies it ever happened. Warren Commission Virus - Won't allow you to open your files for 75 years Jerry Brown Virus - Blanks your screen and begins flashing an 800 number. David Duke Virus - Makes your screen go completely white. Congress Virus - Overdraws your disk space. Paul Tsongas Virus - Pops up on Dec. 25 and says "I'm Not Santa Claus." Pat Buchanan Virus - Shifts all output to the extreme right of the screen. Dan Quayle Virus - Forces your computer to play "PGA TOUR" from 10am to 4pm, 6 days a week Bill Clinton Virus - This virus mutates from region to region. We're not exactly sure what it does. Richard Nixon Virus - Also know as the "Tricky Dick Virus." You can wipe it out, but it always makes a comeback. H. Ross Perot Virus - Same as the Jerry Brown virus, only nicer fonts are used, and it appears to have had a lot more money put into its development. _______________________________________________________________________________ AUDIO LINKS ~~~~~~~~~~~ By Mr. Upsetter It all started with my Macintosh... Some time ago I had this crazy idea of connecting the output from the audio jack of my Macintosh to the phone line. Since the Macintosh has built in sound generation hardware, I could synthesize any number of useful sounds and play them over the phone. For instance, with a sound editing program like SoundEdit, it is easy to synthesize call progress tones, DTMF and MF tones, red box, green box, and other signalling tones. So I set out to do exactly this. I created a set of synthesized sounds as sound resources using SoundEdit. Then I wrote a HyperCard stack for the purpose of playing these sounds. Now all I needed was a circuit to match the audio signal from the headphone jack of my Mac to the phone line. How The Circuit Works ~~~~~~~~~~~~~~~~~~~~~ I designed a simple passive circuit that does the job quite well. Here is the schematic diagram. +------+ T1 +------+ o-----| R1 |-----o------o--------(| |)-----| C1 |-----o-----o +------+ +| -| (| |) +------+ | +---+ +---+ (| |) +---+ to Mac | D | | D | 8 (| |) 500 |VR | to headphone | 1 | | 2 | ohm (| |) ohm | 1 | phone jack +---+ +---+ (| |) +---+ line -| +| (| |) | o------------------o------o--------(| |)------------------o-----o C1-.22 uF, 200V D1,D2- 1N4148 switching diode R1-620 ohm, 1/4W T1- 8 ohm to 500 ohm audio transformer, Mouser part 42TL001 VR1-300V MOV, Mouser part 570-V300LA4 VR1 is a 300V surge protector to guard against transient high voltages. Capacitor C1 couples the phone line to transformer T1, blocking the phone line's DC voltage but allowing the AC audio signal to pass. The transformer matches the impedance of the phone line to the impedance of the headphone jack. Diodes D1 and D2 provide clipping for additional ringing voltage protection (note their polarity markings in the schematic). They will clip any signal above 7 volts. Resistor R1 drops the volume of the audio signal from the Mac to a reasonable level. The end result is a circuit that isolates the Mac from dangerous phone line voltages and provides a good quality audio link to the phone line. Building and Using the Circut ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ This simple circuit is easy to build (if you're handy with electronics). I personally prefer to solder the circuit together. A length of shielded audio cable with a 1/8 inch mono plug on one end should be connected to the audio input end of the circuit. A standard RJ11 phone jack should be connected to the phone line end of the circuit. Although this circuit will protect against dangerous phone line voltages, it is best to disconnect it when not in use. You just don't want to risk anything bad happening to your brand new Quadra 900, right? Once you have an audio link between your Mac and the phone line, the applications are limitless. Use HyperCard's built-in DTMF dialing to dial for you, or build a memory dialer stack. Talk to people with Macintalk. Play your favorite Ren and Stimpy sounds for your friends. Play a ringback tone to "transfer" people to an "extension". Build and use a set of synthesized MF tones. Try to trick COCOT's with synthesized busy and reorder signals. But Wait, There Is More... ~~~~~~~~~~~~~~~~~~~~~~~~~~ So you say you don't own a Macintosh? That is ok, because the circuit can be used with other devices besides your Mac. You can use it with the 8 ohm headphone output from tape recorders, radios, scanners, etc. You could also probably use it with any other computer as long as you had the proper audio D/A hardware and software to create sounds. All parts are available from Mouser Electronics. Call 800-346-6873 for a free catalog. _______________________________________________________________________________ Thank You Disk Jockey! ~~~~~~~~~~~~~~~~~~~~~~ Date: May 22, 1992 From: Sarlo To: Phrack Subject: The Disk Jockey I was searching through some Phracks (issues 30-38), just checking them out and noticed something. It's small and insignificant, I guess, but important to me all the same. I noticed in Disk Jockey's Prophile (Phrack 34, File 3) that he "Never got any thanks for keeping his mouth shut."..I dunno how to get ahold of him or anything, but if you drop a line to him sometime, tell him I said "thanks." -Sarlo _______________________________________________________________________________ An Upset Reader Responds To Knight Lightning and Phrack ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Date: Mon, 20 Apr 92 16:57 GMT From: "Thomas J. Klotzbach" <0003751365@mcimail.com> To: Knight Lightning Subject: In response to your comments of Phrack Vol 4, Issue 37, File 2 of 14 Hi, I have a lot of respect for Phrack and all the work they are doing to promote an understanding of the Computer Underground. But your comments in the latest issue of Phrack are what I would like to comment on. You say: "In short -- I speak on behalf of the modem community in general, 'FUCK OFF GEEK!' Crawl back under the rock from whence you came and go straight to hell!" First, you don't speak for me and about five other people at this college. I have maintained throughout that the ONLY way to further the efforts of the Computer Underground is to destroy them with logic - not with creton-like comments. Yes, you are entitled to your say - but why not take this Dale Drew person and destroy him with logic? The minute that you descend to the level Dale Drew operates from makes you look just as ridiculous as him. In my opinion, you came off very poorly in the exchange with Dale Drew. Thomas J. Klotzbach MCI Mail: 375-1365 Genesee Community College Internet: 3751365@mcimail.com Batavia, NY 14020 Work: (716) 343-0055 x358 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Dear Mr. Klotzbach, >From all of us at Phrack, this is our reply to your recent email... ******************************************************************************* Cyber-Redneck & Shitkickin' Jim's GUIDE TO MANLY HACKING A Lod/GoD Presentation Legion of d0oDeZ / Gardeners of Doom! "You can have my encryption algorithm, when you pry it from my cold dead fingers!" ******************************************************************************* NOW BOYS... first of all, you gotta git yerself a pickup truck. Shitkickin' Jim's got one. And you gotta get a bedliner, a toolbox, a gunrack, and a CB. For decoration, you have to get a confederate flag Hank Williams Jr. license plate, or a Harley Davidson license plate, at your option. You also gotta get an NRA sticker for the back, and the Bassmaster fishing sticker (you know, the one that's has a fish on it). The most mandatory requirement are two antennaes for your CB which are mounted on each of the side view mirrors. Now that you have your pickup truck/hackermobile, you gotta rip out the dashboard and mount a Data General processing unit in the front seat, cuz that's a manly-sounding computer name, not some pussy sounding 'puter. You also have to get an Anchorman direct-connect modem, cuz that's the only thing left that your battery will be able to power. Not only do you have to have a pickup truck, but you gotta have rollbars, with foglights, armed with KC light covers so that you can see at night while you're trashing. THE MANLY WAY FOR A NIGHT OF HACKING NOTE: Before you begin any journey in the hackmobile, you must get a six pack of Budweiser, and a carton of Marlboro reds. It's mandatory. Call up your buddy who owns his own trash business. If you are a real man, ALL of your friends will work in this business. Get him to take the company truck out (the deluxe model -- the Hercules trash truck, the one with the forklift on the front). HOW REAL MEN GO TRASHING Drive down to your local Bell office or garage, and empty all of the dumpsters into the trashtruck, by way of the convenient forklift. This method has brought both me and Shitkickin' Jim much luck in the way of volume trashing. Now that you have all of your trash, go back and dump it in your backyard. If you are a real man, no one will notice. Dump it between the two broke down Chevette's, the ones that all the dogs will sleep under, next to the two barrels of wire. Go through the trash and find out who the geek is that is the switchman at the central office. This shouldn't be hard. It's the little squiggly letters at the bottom of the page. Next, drive to his house. Pull your truck into his front yard. Threaten him with the following useful phrase: "HAY FAY-GUT! WUT IS THE PASSWORD TO THE LOCAL COSMOS DIALUP?" "IFFIN YOU DON'T TELL ME, I'M GONNA RUN OVER YOUR PIECE OF SHIT RICE-BURNING COMMUNIST JAPANESE CAR WITH MY 4 BY 4 PICKUP TRUCK, GAWDDAMIT!" Then spit a big, brown, long tobaccoe-juice glob onto his shirt, aiming for the Bell logo. Should he withhold any information at this point, git out of yer truck and walk over to him. Grab him by his pencil neck, and throw him on the ground. Place your cowboy boot over his forehead, and tell him your going to hogtie his ass to the front of your 4 by 4 and smash him into some concrete posts. At this point, he will give in, especially noticing the numerous guns in the gunrack. WHAT TO DO WITH THE INFORMATION THAT YOU HAVE COVERTLY OBTAINED Don't even think about using a computer. Make him log on to his terminal at home, and make him do whatever you like. Read a copy of JUGGS magazine, or High Society, or Hustler, while at the same time exhibiting your mighty hacker power. Enjoy the newfound fame and elitism that you will receive from your friends and loved ones. GOD BLESS AMERICA! ***************************************************** This file was brought to you by Cyber-Redneck a/k/a Johnny Rotten, and Shitkickin' Jim a/k/a Dispater. Iffin you don't like this here file, we will burn a cross in your yard, and might even tell the BellCo geek to cut your line off. He's still tied up in Shitkickin' Jim's basement. _______________________________________________________________________________