---[ Phrack Magazine Volume 8, Issue 53 July 8, 1998, article 02 of 15 -------------------------[ P H R A C K 53 L O O P B A C K --------[ Phrack Staff [ Ed. note: The letters are perhaps editted for format, but generally not for grammar and/or spelling. I try not to correct the vernacular, as it often adds a colorful perspective to the letter in question. ] 0x1>-------------------------------------------------------------------------- [ P52-02@0xd: ... Something you've mailed to a whiley bunch... ] I couldn't help but notice your use of "whiley" rather than the more common English word "wily" in the above-quoted paragraph. In the future, take the time to grammar and spell check your replies to minimize the emotional damage you are bound to suffer. --Bob Stratton [ WHOA! My bad. Strat has caught me with my proverbial pants around my proverbial ankles. Further evidence towards me - not - being omnisicient argument (although I still believe this to be conjecture). ] P.S. Thanks for the sensible code-formatting discussion. Your style sounds a lot like that which kept me sane back when I earned my living writing code. The enlightened person's answer, of course, is to use an Emacs minor mode, and to let the editor do the work while one types. Emacs is also the answer to the Windoze 95 junkie looking for something with which to read Phrack. Works for me. [ Amen. Except for the emacs part. pico with regexp or vim 5.0 with syntax highlighting is the way to go. ] 0x2>-------------------------------------------------------------------------- [ P52-09: On the Morality of Phreaking ] Dear Phrack, I am not a hacker nor a hacker wannabe, so I had only the most passing acquaintance with your publication. However, today by chance I came across this article in your January 26 issue. I am impressed. I did my MA in philosophy, and I was quite nonplussed to see such a lucid and philosophical point of view in what is, to my understanding, a very specialized publication not typically devoted to philosophy. Though my areas of interest were mainly Nietzsche and Deleuze, I found your summary of both Mill and Kant to be accurate and well-applied. Kudos, you obviously have some very intelligent people on staff, whose talents are not limited to your own area of expertise. Yours respectfully, Sean Saraq Toronto [ High praise indeed! Thank you for the compliments. It's good to see we're read in communities other then that of our target demographic. ] 0x3>-------------------------------------------------------------------------- I can't believe you included article 12 in Phrack 50. Is Phrack really getting so sad? Have you really got nothing better to publish than regurgitated crypto babble? [ Despite what you may think, we are not sad. The phrack compound is imbibed with much conviviality and festivity. Why, every Friday is `punch a mime day`. We hire a mime to come down to the office and we all take turns punching him in the face. ] Cheers, Chris (XORed that's Fghyud) [ That's not a very good XOR implementation you have there. It appears an extraneous character has been inserted. Check your pad or the stream cipher. Or perhaps check your other regurgitated crypto babble for more info. ] 0x4>-------------------------------------------------------------------------- For those readers interested in "Piercing Firewalls" (Phrack Issue 52) take a look at datapipe.c available at www.rootshell.com. I can't think of any way to make it work with X, like tunnel/portal, but it works fine with telnet and nothing needs to be running outside the firewall. ziro antagonist [ Noted. ] 0x5>-------------------------------------------------------------------------- Okay, enough nagging about the Milla pics! The one thing everyone reading Phrack wants to know is: When will you publish nude pictures of dangergrl ??? [ When your mom gives them back. ] Yours Sincerely, -anonymous. (i get kicked from #hack enuf as it is already :) [ What a suprise. ] 0x6>-------------------------------------------------------------------------- While the Juggernaut program is interesting, I've found that its model for session stealing is a tad limited. There are two issues, one of which I've dealt with. First issue is the one packet read, one packet written paradigm. It really should allow separate threads for read/write to avoid getting easily out of synch. This I've not dealt with, but it is understandable given the second, the ACK storms it creates. [ Juggernaut 1.x is very primitive in many ways. Juggernaut++, the next generation juggernaut, has been mostly redesigned from the ground up with a 90% new code base. It has many things the previous versions lacked, including: a much better interface, threading for concurency, portability, effcicieny mods, and many bugfixes. ] The ACK storms can be avoided with an ARP attack (or possibly an ICMP redirect). Send an ARP message to the source of the connection you're stealing (an ARP reply) which tells it that the ethernet address of the machine it's talking to (the destination machine, which you want to talk to instead) is something "off in space" like 2:3:4:5:6:7 instead of the real address. This needs to be done fairly often, should be started immediately before you start your hijack attack. [ Indeed. As long the host will accept and cache unsolicited ARP responses, this will work. ] The result is that the machine you are intercepting becomes unable to talk to the destination and won't desynch the session, and traffic goes to practically nothing. After you stop, the ARP table will shortly expire and be updated with correct information, so the attack will either appear as a network glitch, or you'll get alerted (NT will alert) that an IP address conflict exists (but tell nothing about what the conflict is with). Moreover, an ARP reply will escape the notice of many network monitoring programs. [ Something like this has in fact been implemented in juggernaut++... And, just to answer the burning question I get asked so often, NO, J++ is NOT publically available. ] I have sent the code to the original author of Juggernaut (being inclined to share knowledge) and wanted to alert you. [ The original author of juggernaut and I are pretty close. I'll be shure to check with him. ] 0x7>-------------------------------------------------------------------------- Hi! My name is StiN. [ Mine's route. ] I'm from Russia. [ I'm from the U.S. ] Sorry for my bad English. [ Sorry for my bad russian, comrade. ] I Have a friend His name is Armany. [ I have a friend named Gilgamesh. ] Where do you live? [ I live in a small one bedroom aprartment with four cats. ] How old are you? [ 19. ] What's yore name? [ We already went over this. ] What's yore Hobby? [ Volunteering for free medical tests of any variety. ] Do you knew Russia? [ I KNEW RUSSIA BACK IN THE GOOD OLE' DAYS! Back before the collapse. ] Good Bay. [ Bad Bay: Bay of Pigs. Good bay: Bay of jello. ] 0x8>-------------------------------------------------------------------------- Hola, soy Omar Soy un fanático de su revista, la sigo desde la phrack 48. No soy un hacker, phreaker, o cualquier cosa, soy más un fanático de las malditas máquinas. Muy buenos artículos; gracias por las cosas de LINUX (me fueron de mucha utilidad) Suerte y sigan así. Saludos de Uruguay. South América. [ Yo quiero taco bell. ] 0x9>-------------------------------------------------------------------------- hi, where can i find the source code for the legendary internet worm by morris (1988) ? thanx (i hope u dudez can help me :( ) [ ftp://idea.sec.dsi.unimi.it/pub/crypt/code/worm_src.tar.gz ] 0xa>-------------------------------------------------------------------------- My friends were going to a basketball game at their gay school (Grades [ Wow, they have gay schools now? Do they videotape you jerking off and looking completely gay and stupid? (http://www.leisuretown.com) ] pre-school through 8th grade). They were wearing their wallet chains, not causing any harm with them. (It was an after school activity) the [ As opposed to those people who have the wallet-chain/morning-stars. They are the ones who cause all that wallet-chain inflicted harm. ] teachers made them take them off. My friend, Krazy K, asked if he could [ Krazy K? Any relation to Daft D? ] take off the chain and keep the wallet, but they made him give them the whole thing. He thought it was funny, though, especially since he had condomes in it (It is a "christian" school). Not that he was going to [ Condomes! The condom that's a tent! ] use them. They of course being the nosy bastards that they are, rummaged around in it to their liking and found them. (We know because they talked to him about it. [ Good detective work. ] He told them it was a joke he was going to do to his friend. "I was going to put it in his locker" He said.) [ Now *that's* good humor. ] I was wondering about the legality of this whole thing. Is it legal [ Perhaps you should wonder about the stupidity of the whole thing first, then work your way towards relevance, and then back to stupidity again. ] to take someones wallet and chain (Which I consider personal property) when it is an after school activity and then look through it? They gave [ *shrug* Sure is fun though, isn't it? Actually, I don't know the laws and regulations of gay schools. It just might be allowed. ] him no alternative (but to go home, and, "Oh by the way, you can't use the phone"). Then to search through the wallet without permission of the owner? I am asking because, I would like to get them in trouble, In retaliation to the many times I've been screwed there (I go to high [ Been screwed at the gay school? Hmm. Did you have any condomes? ] school now, thank God). If you could tell me, or know of someone who knows, then that would help us. Thanks, Abs0lute Zer0 [ You can say that again. ] 0xb>-------------------------------------------------------------------------- Dear Editor, I would like to take a chance to give my most sincere thanks for resurrecting my uttermost respect to the humanity (so often shattered by politicians and other freaks) by providing me a unique opportunity to immerse myself into the deep wisdom and magic of written word found in the Line Noise section. This is truly the place where one can look for (with a sense of deep confidence) a genuine proof that every person is a genius on the inside. [ Well thank you very much. Although I think you are refering to loopback. ] Driven by this wonderful feeling of replenished hope and respect, I'd like to answer a cry for help from a young but talented Hacker Demonhawk, who expressed a wish to "blow shit up!!". I used to be a chemist, and I would [ Ummm... ] like to share, in the spirit of the magazine, my knowledge and provide easy, quick instructions for young fighting souls that would assist them in the aforementioned noble cause. In other words, how to build a bomb. [ Whoops. You just lost me there. ] { rest of message truncated due to overwhelming levels of inanity ... } 0xc>-------------------------------------------------------------------------- where would one go to get "private" hacker help? [ In the back where they give the lapdances. ] 0xd>-------------------------------------------------------------------------- sorry to bother ya... i was hoping maybe you could give me some info. don't take me for a complete idiot, [ Uh oh. ] i just don't know much about this kind of stuff. maybe u could get me started... give a few tips??? [ Sure. Never kiss on the first date. Always pack an extra pair of socks AND underwear. Never put electrity in your mouth 'just to see what would happen'. Also, if you happen to find yourself in the position, always at least *ask* to give someone the reach-around; it's common courtesy. ] 0xe>-------------------------------------------------------------------------- Hello, My name is Robert I guess you could call me a beginner hacker I I was wondering if you could please help me out I need some hacking numbers and [ Ok. 7, 9, 11, 43, and 834. ] passwords just so I can play around on them and get good. Also if you have [ Sure. Try `password`, `hacker12`, `pickle`, and `love`. ] any files or anything that you think that would be helpful to me please attach [ Alright, /dev/random is a good one to start with. ] or tell me where I can get them. I just bought the book Secerts Of A Super Hacker By Knightmare is that any good if there is any books I should get [ Ah yes, the book of the truly desperate and depraved. As was said once before by Voayger, Knightmare's biggest hack was getting that book actually published. ] please tell me or if you have any text please send. I am running windows 95 [ Can you put Windows 95 in your mouth? NO! Such is Mango! ] Thanks For Ur Time Robert 0xf>-------------------------------------------------------------------------- Dear Sir I like you hacker people because you made life easy to a lot of people [ Especially the makers of fine Bavarian shoe-horns. ] I want to ask you an important question to me When connecting to Internet, I found that some sites inform me with my ISP IP# So if they're any possibility that any site can track me and identify the following 1-what country I came from? [ Well; if you're dialing up to your ISP, and connecting to 'sites' from there, that would be a one hop jump out to the world. And yes; they could find out what country you're coming from, unless you're dialed into a provider in another country. In which case; it might be a little more difficult. The other tipoff is when you scan in your birth certificate and put it up on your webpage along side your current address and a head shot. That's a 'no-no'. ] 2-what is my phone number? [ Are you asking us if we know your number? Or if someone can find your number when you connect to their machine and they know your IP address? I'm confused, so I'll answer the question both ways. A-1: No. We don't know your number, and we don't want it. While we're at it. We don't want to make out with you either. Quit sending us the flowers. It's over this time once and for all. A-2: If you did something that would incite someone to try to find your phone number; odds are if it was an illegal action your ISP would gladly hand your information to the first law enforcement person who walked through the door. Or for that matter, anyone who asks nicely. ISPs aren't exactly known for being well guarded vaults of information. ] Globally can any site by coordination with my ISP track me and catch me? [ Ever hear of Kevin Mitnick? ] Please provide me with a full answer quickly. [ Do people not realize this is a quarterly magazine? Quick for us is 3 months. If you've done something stupid and gotten busted; our sincerest apologies for being late. Next time we'll drop what we're doing and get right to it. ] 0x10>------------------------------------------------------------------------- I am a Indiana University student currently studying Criminal Justice. I am trying to gather data and find information concerning computer hacking and governmental and/or corporate involvement. The twist that I am persuing concerns a rumor that I had heard. I was told that when some computer hackers were caught, they were recruited by the government and/or corporations to work in their security department. Usually where there is a rumor, there is some truth to the matter, especially when concerning the department of defense. I don't know if you could help me find information concerning this issue. Any help would be greatly appreciated. Respectfully, Jason Sturgeon [ Well... We at Phrack haven't heard anything about the DoD hiring 'hackers', it's been our understanding that the government at least prefers straight laced guys with military background to handle their stuff. Although it's not out of the realms of possibility that they've hired 'hackers', if it's happened it's of rare occurance, and those individuals who fit the title of 'hacker' probably don't conform to your definition of what a 'hacker' really is.. Corporations and The Government for the most part tend to shy away from 'hackers', if merely for the stigma of being a 'hacker'. But as a stereotype, hackers conjur up all sorts of bad mental images for respectable management types. We're sure it's happened to some capacity, but we have no witty anticdotes concerning it. ] 0x11>------------------------------------------------------------------------- Hello there I have heard there are some risks using callback modems. Can you give me some more info on this, or info where to look [ Risks of callback modems are fairly simple. The problems involved with them are a little bit more complex. We'll discuss both in an effort to best cover this subject. The overall fundamental flaw of callback modems is the idea that you could 'fake' a hang-up on your end, or play a dialtone in an effort to fool the modem into thinking it hung up. Then you wait for it to dial the number, and once it's done, 'ATA' your modem and pick up the carrier. We ourselves have tested this a couple times with moderate success, it's not 100% accurate, and it also depends on the hardware on the remote side. If the call-back information is based of ANI, that could provide more problems, since the Phrack staff has heard the rumor that you can fake ANI with certian types of ISDN set-ups. The two types of callback modem configurations, one being a program that acts as a frontend to the dialing mechanism, the other being hardware based. Such as, you dial in to the modem, the program asks you to authenticate yourself by some means, you do so; it hangs up and calls the number that's paired with your authenication information. This isn't so bad, but if anyone remembers back when certian BBSs had callback that you could enter, you could make them call arbitrary phone numbers by putting in a fake number if their door was misconfigured. As far as hardware based call-back, whence you program the passwords and numbers into the modem and it deals with the whole transaction, introduces a scalability issue as well as the fact that the modem has no means to log on it's own, etc.. etc.. etc. If any readers wish to write an article based on this subject you are urged to write it and send it in. It'd be nice to see some more solid information on this subject. As well; if any companies wish to send us modems, we urge you to send us some modems so we can put them up against a battery of hacker tested and hacker approved tests. ] 0x12>------------------------------------------------------------------------- I would like to know about cellular phones....how to find out secret pin, how to listen to calls etc.... [ I would like to know more about marshmellows. How they're planted, the way they're picked in the spring time as they blossom from the little tiny buds you get in 'Swiss Miss Hot Coco', to the fat chewey vessles of taste and excitment that they are at full maturity. I would like to find out the secrets of gravity, as well as a good solid reason why the universe keeps 'expanding' -- without any of that "just because" rhetoric that seems to dominate the subject. ] If You need the cellular make I'll be obliged to give it to you.... [ Wow. You'll give us your phone just so we can look at it? Send us your home address and we'll send you a S.A.S.E to mail it back to us in. ] Thanks. Anthony. [ No. Thank _you_ your generosity Anthony! ] 0x13>------------------------------------------------------------------------- Hiya, Not wishing to sound like a playboy forum article but I have read phrack for [ Already my interest is waning... ] quite a while and have only seen cause to write now. I commend you on your editorial on C programming style. The sooner we get out [ And I commend you on your commendation. +100 points. ] there and club to death those people that use single space indentation the better. I do however have three main points to disagree with you on. 1. Write as many comments as you can. You may need to remember what it was you where coding AFTER copious amounts of recriational drugs. [ Nah. You don't want to get out of hand with the commenting. You end up commenting needlessly and redundancy abounds. And if you can't read your own code, kill yourself. -100 points. ] 2. Put your own varaibles with uppercase first letters (to distinguish them from sys vars) [ `sys vars`? What like argc, argv or errno? This is a ridiculous suggestion. It makes your code ugly and harder to parse. I award you no points. ] 3. In reference to your comment "In the grand scheme of things, none are really any more correct than any others, except mine." It must be said that this is completely wrong. The only point that counts is in fact mine. [ Not when it's in my magazine. With a final score of 0, you lose. ] Regards, andrewm at quicknet dot com dot au [ Cute. ] 0x14>------------------------------------------------------------------------- Dear Guys, First off, I'd like to say that I am ever more impressed with the quality of each successive issue of Phrack. [ Danke. ] The reason for this mail it to respond to the request made by N0_eCH0 in Ireland in issue 52. Myself and a few friends are happy to help this guy out if we can. I'm afraid that we're no great sources of knowledge, but are willing to have a crack at most things. Anyway, if you can pass this on, as there was no e-mail address for N0_eCH0, I'd be much obliged. Keep up the excellent work, I look forward to issue 53 ! ben_w@netcom.co.uk [ There you go. ] 0x15>------------------------------------------------------------------------- To whom it may concern: I was wonder how I can read someone dir and take over their account the kernal is 2.0.0. How could I hack into the system without having a passwd!! [ I assume you mean Linux. `LILO: linux init=/bin/sh`. Oh, and you need console access. Good luck. ] Thanx! Tag 0x16>------------------------------------------------------------------------- [ P52-19@0x2: Statement of Louis J. Freeh, Director F.B.I... ] Hello, I would like to say that the article, published as P52-19 is without a doubt one of the most frightening threats to our freedom that man has ever seen. the article is: "The Impact of Encryption on Public Safety Statement of Louis J. Freeh, Director Federal Bureau of Investigation" This article basically states that Americans should have now personal communication rights whatsoever. The Director of the FBI practically states that strong encryption should be banned from the public, because he wants law enforcement officers to be able to read all of our mail. He says that this would be for reasons of terrorists and criminals, but fails to state that the security of the average American would be compromised. Due to his proposal that you would have to forfeit your key to government officials, and that these keys would only be used "for the immediate decryption of criminal-related encrypted communications or electronic information.". Or maybe this way the government can just intrecept all of your communications. My main objection to this is the irrelevancy that this would have to the general public. According to US law, the US Postal Service is the ultimate form of private security. The average American should be able to send a letter to anywhere in the world, and it should be completely safe. And what more can you send with encrypted email? A program, but you can do that with a disk in a letter. So whats stopping these terrorists from hopping on down to the Post Office? Another problem with this proposal is that encrypted information is more used to protect your information from other parties then the government. I can guarantee that the average Joe living down the street is encrypting his love letter to his mistress Jane so that his wife doesn't see int, not so that some lazy, fat, government "official" doesn't see it. Most people use this technology for much more practical usage than the deception of the government. We use it because of the millions of people on the Net, and perhapse we don't want those millions to see every little thing about our personal lives. And finally, why should the government be able to restrict our right to gather peacefully? With technology moving so fast, i think that it is reasonable to assume that the Internet is a gathering place? We have all of the means of normal communication and more. Chat rooms, email, and programs like Mirabilis's ICQ allow us to communicate on a whole new level. In light of all of this, i hope you share my opinions now about the loss of freedom that this would represent. Thank you. 0x17>------------------------------------------------------------------------- Hi, I am a little sysadm on a little Linux-Server on the net. [ I have little interest in those details. ] I am searching for documents about System Security under Linux/UNIX just to be up-to-date :) Thank you for your help. [ http://www.redhat.com/linux-info/security/linux-security/ ] And btw...I have parts of the /etc/shadow file from my ISP...what can I do with this? Can I just run crack over it? [ Well now, that all depends on what parts you have, doesn't it...? If you have the encrypted hashes, then you're in business. ] And, btw: Not all germans hate americans...I am german and I don't hate americans... and my generation has nothing to do with the WWII... [ Oh, I think you do. I am relatively certian that, somewhere deep down, you dislike us. You couldn't take a shellacking like you did in WWII (not to mention spaetzle) and *not* feel some sort of resentment. It's ok. Embrace your malevolent feelings. Hug them. C'mon! Once you've done that, you can dissolve them. I admonish you to TURN THAT FROWN UPSIDE-DOWN! Cmon! Bodyslam yourself into gayness! ] -firefox01 0x18>------------------------------------------------------------------------- Hello there, good to talk to you. [ Likewise. ] I am just this "Thinker" with this thought why don't we the Hackers and you the one of the major contributing Hacker commune (2600,Phrack,ect) make a Full Strong "live" Cryto network for the Hacker and by the Hacker. [ I have a thought. Get a speak n' spell. ] I can't belive I am sending this from hotmail bought out by microshit blah blah no this thing must be really insecure. [ Well, maybe it just needs love and attention and for someone to say nice things to it. ] Well I have a whole line of ideas and no one ever listens to me netscape ect... but if your intrested e-mail me back and I'll give you my POP adress. The benifit of this system is 1) we can piss off the FBI [ Yes, let's piss off the F.B.I. And, while we're at it, let's piss off the IRS and let's annoy the CIA.. We can poke fun at the retarded wrestlers association. And lastly, let's aggravate an enraged bull. ] and 2) final we hackers can have a place to loyter and idile , lurk at [ loyter and idile? Hey, aren't they those two Jewish film critics? I love them! ] where we can say what ever the Hell such as Full deatails on how to enter a sys,ect...of corse we will have to screen ppl for trust ect... [ And screen them for stupidity. ] But I reall belive we can werk this. If you want to here the rest of my ground shaking ideas just ask, or full deatials on the Crypto.net . [ Pass. ] 0x19>------------------------------------------------------------------------- First off, I'd like to say that I love the mag...but you really get some nutjobs that post to it..(myself included) I'm not an elite hacker, a unix guru or anything like that(duh), but I am amazed at the effort you put into Phrack...anyways, keep up the good work [ Thanks, nutjob. ] 0x1a>------------------------------------------------------------------------- Hello, Who was the first hacker in history? [ God. ] thanks for your time, greetings, Max 0x1b>------------------------------------------------------------------------- Hi. i'm a Swedish kid and i just wonders [ Now the Swedes I like. Beautiful women. Amazing accents. I *think* they like me. Although this one particularly hot Swedish girl I know doesn't seem to like me much. I think maybe it's because I try too hard around her. She'll come around and I'll be like bouncing off the walls trying to impress her.. I remember one time I got so excited I almost set sail for gaiety. I know. I know. I should "just relax" and everything will fall into place. I dunno tho. She's so pretty. And ahm just so awkward... ] if you might know a good haking, freaking and craking site. I've checked everywhere but i have not any. [ Huh? ] 0x1c>------------------------------------------------------------------------- Hey sup, I'm makin an essay site similar to Slackers Inc. but with more essays. The only problem is I need sponsors to get my page up, can you pay me a small fee monthly for displayin a banner for your site. I know almost [ O.k. Sure, how does nothing/month sound? ] everybody knows about Phrack Magazine but I heard you do some sponsoring, E- mail me back if you are interested. [ Yah, we are *so* reknown for our advertising budget. And now I'd like to make Phrack reknown for sponsoring a gay fucking highschool/college paper stealing webpage. Sure. I'll get right on that after we do our 'kick a baby harp seal campaign'. ] 0x1d>------------------------------------------------------------------------- You need to write an Interactive tutorial to simulate hacking into a private college or a company. You should make it realistic and hard to access. [ Someone already did. They're called *.edu and *.com. Although sometimes they're not too realistic. ] 0x1e>------------------------------------------------------------------------- [ P52-14: International Crime Syndicate Association ] Dorathea Demming, You remark that the ICSA doesn't guarantee their certification against attack. "In plain English, they are saying that if you get sued, you are on your own." Do you know of any security company, consultant, or consortia that will commit to helping a customer legally if they've been attacked? Stu 0x1f>------------------------------------------------------------------------- In skateboarding you are a "poseur" if you don't know shit. In the computers culture you are a "lamer" if you don't know shit. The term that bugs me is "elite" or "eleet" or "3l33t3". Are you elite? I just don't like the term. I really like the term "HI-FI" ,as in high-fidelity, or high-fidelity stereo's. An outdate term that orginally meant "I've got the best gear". But now it just means "late 70's marketing scheme". Are you hi-fi? It has a ring to it. You may be elite right now but in time you'll be hi-fi. ------------------------------------------------------------------------------ ----[ EOF