💾 Archived View for gemini.spam.works › mirrors › textfiles › messages › phoenix3.msg captured on 2020-10-31 at 16:53:56.
-=-=-=-=-=-=-
*** {Phoenix Project BBS Message Base File 3 of 3} *** ______________________________________________________________________________ Copyright (C) 1993 LOD Communications. No part of this Work may be distributed or reproduced, electronically or otherwise, in part or in whole, without express written permission from LOD Communications ______________________________________________________________________________ *** {Internet Sub-Board} *** < Q-scan Internet 8 - 31 msgs > 1/31: This sub. > Permanent Message Name: The Mentor #1 Date: Wed Jan 24 19:50:44 1990 This sub is for the discussion of Internet. Enjoy... Mentor 2/31: people say... Name: Dark Sun #11 Date: Wed Jan 24 20:30:42 1990 It was stupid of the 'folks' that designed internet were stupid... But, As I believe, it was NEVER meant to be secure by ANY means... The security should be handled by the individual systems. From what I see, the main reason that I-net is so insecure is because the sysadmins are careless and lazy (I wont say stupid, because you can't be stupid to run a Unix system, just ignorant and lazy)... If they restricted access to I-net it might make it more secure, but then that would defeat the whole purpose of I-net... People also say it was stupid to implement the TFTP protocol, when actually, this was meant so that people could set up a "diskless" system and transfer the OS to it during boot time... The programmers might've made some mistakes while implementing it, but it was DEFINETLY NOT stupid! I very much doubt it would be in so many different versions of Unix if it was stupid! DS 3/31: I plan to talk alot on this baord.. Name: Phoenix #17 Date: Wed Jan 24 21:34:07 1990 problem with the internet as i see it.. On any interactivenetwork <as the internet>, in which various systems are "trusted hosts" o other systems... you are going to have the ollowing problem you can have 100 systems on a network, and 99 o them can be totally unhackable.. all you need is to get into that one, and then getting in to the other 99 is dead easy..! To make lie easier or users, alovely set of r <remote> commands were created.. which let you manipulate things on remote hots or your system... you can practically do everything you can do had you logged into the system, without logging in.. not to mention the 1000's o bugs in both the internet and the machines and their networking capabilities in general.. <as some bbs users know! ahem..> I still look it it like one big playground... :-) Phoenix <you can do some real interesting things to a sun by playing with the limiting commands!> 4/31: pseudo internet question Name: Guc #97 Date: Wed Jan 24 22:33:15 1990 does anyone know of any public access unix sites that i can connect to using tcp/ip? i'd like something legal. .s 5/31: well.. Name: Phoenix #17 Date: Thu Jan 25 07:29:46 1990 most universities/colleges do..if you go to one of them... else.. i dont know.. i have never looked at it from thsat point of view :-) Phoenix 6/31: internet Name: Silencer #31 Date: Thu Jan 25 23:51:20 1990 well...this may seem kinda ignorant...but I'm afraid I've never used internet... how the hell do you get access to it? Through unix you say...so ANY unix acct will hook into internet...or what.. .s 7/31: well Name: Guc #97 Date: Fri Jan 26 06:20:08 1990 ut will sell if accounts $5, w/ free cpu time and dirtcheap printing, but the only catch is having to be a ut student w/ id. i had one before which i got a friend of mine (who was a student) to get for me, but someone decided to narc on my and tell the system admins what i did. <how they knew is beyond me> i heard somewhere <have not verified this yet> that ut has some stupid evening classes that ANYONE can get into for like $45. and you get a regular student id. going to look into that today, if anyone wants to know if it works let me know. but assuming the above trick won't work, i'd like to get an account somewhere that is 100% legal. <ie: not someone elses account> .s 8/31: internet Name: Guc #97 Date: Fri Jan 26 06:29:33 1990 the one i'm talking about is the network that connects thousands of university and other type computers together. the nice thing about it is that you could say have a unix account at MIT, you could call up UT and without any password connect to the site at MIT and login login with your account. hopefully someone will give a more in-depth description. oh and for those of you who enjoy using such things, try telneting to quartz.rutgers.edu and login as `bbs' <no passwd>. it has irc, tinymud, and tiny hell built into one account. kinda fun when you're totally bored. .s 9/31: Telneting Name: Sicilumm Thorne #28 Date: Fri Jan 26 08:15:28 1990 I may be in the dark [again, blasphamy?!] but could you explain how one would "telnet" to quartz.rutgers.edu? What exactly is telnet'ing? Sic. 10/31: ut accounts Name: Ravage #19 Date: Fri Jan 26 12:28:18 1990 are open to the public, it is a state school and anyone can get an account on the machines. just like anyone can get a ut library card for $18/yr. 11/31: ... Name: Guc #97 Date: Fri Jan 26 15:36:57 1990 ...then how come unix consulting said that you "must be a ut student with a current ut id."??? .s 12/31: UT UNIX Name: Erik Bloodaxe #2 Date: Fri Jan 26 17:28:30 1990 For Joe Average to get an account at UT it will cost 100/CPU hour. Kind of steep...but this will give you an account on EMX. For a student, you can pay a flat fee of 5 dollars (towards the cost of any printing you may do) and you will get an account on one of the Sun systems. This is what most students have done, as most of us don't have 100 bucks to blow! I don't even know how much time elapses in a cpu hour! There are a couple of public access unixes here in austin that allow for Bitnet mail, and Usenet...I doubt they will let you telnet around the internet though.. ->ME 13/31: CPU hour Name: Dark Sun #11 Date: Fri Jan 26 20:45:30 1990 well, the student is limited to like .05 cpu hours max on a single process on EMX.... There are NO austin public access unix systems that are even hooked into I-net let alone letting you telnet between 'em.... Anyone know of any x.25 unixs off inet that you can get an account on? DS 14/31: yeah Name: Guc #97 Date: Sat Jan 27 00:33:25 1990 it sucks down here. there are 2 pubnix sites, rpp386 <832-8835> and bigtex <346-2339>. You can't connect to either using tcp/ip and for the most part they only allow uucp logins. as for mail, i've know of *one* place to send internet mail from for free, and its okay, but its single line and has to go through pnet01 and cts.com before the mail even gets outside. plus it only polls for mail during pc pursuit hours. with all this factored together it ends up taking about 2 days to send to like mit.edu, and for comparison purposes (even though i know this is an extreme> i sent a 180line file from the if machines at ut to mit, and it took less than 10 minutes... as soon as i go to compuadd and pick up a new power supply, I'll sit down and read these uucp docs so i can get my own site up... .s 15/31: well. Name: Phoenix #17 Date: Sat Jan 27 07:38:03 1990 ok.. the reason you can login into a system from a differnet system is as follows if on the system you are calling, there exists in your directory a file called .rhosts, and it has the name of the system you want to xcall form in it... you are then able to use the rlogin command <also provided that the system you are calling from is in hosts.equiv and hosts on the remote system> umm.. a cpu hour takes a hell of a long time.. i have just discovered that my univerwsity down here charge 20 dollars a cpu hour.. and i have used that system lots in the last year.. still havent been charged more than 16 cents or something.. Telneting is the internet equivelant of padding around the PSN. it is extermely quick, and basically craps all over psn <i wonder why...? :-) hmm.. i wonder if quartz.rutgers.edu will consider giving out source for that bbs... then again they may have no choice :-) hehe.. Phoenix <only reason i stopped putting flatline here is coz my damn f key dont work..> 16/31: i think Name: Guc #97 Date: Sat Jan 27 10:33:47 1990 all the stuff that they use is public domain, like the irc, tinymudd and citidel software. i'll take a look... by the way, does anyone know of any other ways to connect to the internet other than UT micom? they're making it damn near impossible to get off camps without an account. sux, you used to be able to telnet off of portal1.... 17/31: yes, but...... Name: Dark Sun #11 Date: Sat Jan 27 11:05:49 1990 If you do a find then it skyrockets and goes up about 5 cpu minutes a second! In one minute would go your $100 bucks! DS (It reallly depends what your using it for...just DONT EVEN THINK to run a password hacker on it) ^^^^^^^^^^^^^^^ BTW, what/where is the FDES library (Is it not on sun,umax,HP/UX??) I know how to link it, but where is the library andwhat is its name? 18/31: well Name: Phoenix #17 Date: Sun Jan 28 14:18:57 1990 ffdes is not a library... it is a redone function, called crypt... and it is damn good ! i was running about 6 crypts off my system at home, and am now running 88 asecond off my little mac ii macs dictionary hacking great! <go thru every word in usr/dict backwards forwards,upper and lower case per user in under an hour!> get lots o accounts! phoenix 19/31: umm Name: Phoenix #17 Date: Wed Jan 31 09:31:46 1990 i anyone has any listings on which systems get zardoz, and are willing to give me a copy please let me know... i have the australian distribution list, but australian systems are damn hard enough to get into when they DONT get zardoz.. no sleep till zardoz... or so ive been told!! phoenix <still out there looking!> 20/31: Zardoz? Name: Sicilumm Thorne #28 Date: Wed Jan 31 16:48:12 1990 Could you [Phoenix] describe Zardoz? 21/31: fg Name: Dtmf #27 Date: Wed Jan 31 22:31:36 1990 RE: i think Here at UTA the Ethernet server still connects about anywhere...I'll hunt up the address b4 I call next time... DTMF 22/31: ok.. Name: Phoenix #17 Date: Thu Feb 01 10:12:52 1990 zardoz is probably the equivelant of an elite hacking board.. only the exact opposite. it is a security mailing list which has all the top security experts in the world on it. Its basic function is to bring lovely security holes in various os to the attention of the security administrators. thelist is EXTREMELY restricted.. and becausde it displays all known bugs on unix and various other operating systems, the systems which generally recieve it are damn near impossible to hack. when you get root on a system.. look or it first thing!! phoenix <much happier now.. !!!> 23/31: Zardoz and some other stuff Name: Mr. Slippery #72 Date: Fri Feb 02 23:46:38 1990 The Zardoz list does not put most bugs on it for a very good reason. ITs sent out using mail and various Internet and uucp sites get it. As it passes by in clear text, anyone with sufficient knowledge can intercept it (he he). For a good look at what is really in the Internet, find a copy of the book, The Matrix, and peruse it. I did not say buy it since it costs a lot but its worth looking thru the sections about networks in various contries. Did you know that there are no known networks in Albania, for example? 24/31: communist countries Name: Ravage #19 Date: Sat Feb 03 11:13:59 1990 up until recently only allow government agencies to use computers. even the academic institutions cant get modems, copiers modems and typewriters can get you busted big time, for the computers they have. for an individual to have a computer is until the last two years impossible as it was against the law. i send mail through gt-net to a guy in england who then transfers the files manually to a academic network that has a link in moscow. 25/31: _The Matrix_ Name: Daneel Olivaw #9 Date: Sat Feb 03 13:03:18 1990 is an excellent book (if you can affort it... get it). It is written by John Quaterman (an Austinite), and it copyright 1990 (came out late 1989). It is the most complete source of info I have seen. Daneel Olivaw 26/31: well Name: Phoenix #17 Date: Sun Feb 04 05:54:31 1990 The zardoz list i got seems to have quite a few bugs, and enough info on the ones it doesnt specify as much to figure them out anyway... 8) 27/31: Yes Zardoz is definitely tops.. Name: The Parmaster #21 Date: Mon Feb 05 20:11:42 1990 But i've seen another one round back in the days when i had a look on internet... I don;t recall the name... might have started with M though. had great stuff in it.. !! no details, Par Jason 28/31: USSR Name: Cassius Cray #135 Date: Tue Feb 06 06:39:06 1990 Any of you ever really got connected to a Ruskie computer... Shit I aways thought they had nothing newer than the old 35 teletypes... If you can get there is the output in Russian or English? I heard of some hackers in New Jersey accessing a worldnet port to the KGB... Those fuckers will ice your shit ... Cassius Cray 29/31: hehe Name: Phoenix #17 Date: Tue Feb 06 13:26:00 1990 told you to watch out for them cossaks par!! ok... there is also a security mailing list called Security-Misc which originates from a system called red.rutgers.edu this list is ok.. but became a bitmore public than zardoz.. and hence did not <in the long run> have as much information as zardoz did.. 30/31: Ruskies... i.e. USSR Name: Daneel Olivaw #9 Date: Tue Feb 06 17:38:35 1990 from some info from a person at CalTech The latest information is that most technology is stolen from the US (surprise). One system is expecially interesting. I forget the number, but it is based on an Amdahl. They copied a clone... how sad. Most of the systems, especially mainframes are in English simply because most people over there speak English (that deal w/ computers), and they haven't the experience to steal and modify. Daneel Olivaw 31/31: Stolen, yeah Name: Cassius Cray #135 Date: Wed Feb 07 07:05:59 1990 Yeah the Russkies have gotten shit from us in some pretty underhanded ways... I read where they got the design of the Fulcrum jet from models of our f-16 sold at any hobby store or K-mart... they took the models back and they had a scale version....saves a bunch of design cost... < Internet Q-Scan Done > _____________________________________________________________________________ *** {Other Packet Nets Sub-Board} *** < Q-scan Other Packet Nets 9 - 60 msgs > 1/60: This Sub > Permanent Message Name: The Mentor #1 Date: Sun Jan 07 05:17:50 1990 This sub covers all the networks other than Telenet and Tymnet. Autonet, BITNET, USENET (yes, some of these aren't true packet nets. sue me.), etc. Mentor 2/60: Grumble Name: Erik Bloodaxe #2 Date: Tue Jan 09 14:34:56 1990 Israel pisses me off. I decided to scan them. Everything is going GREAT! the response time is immediate, I'm getting all kinds of addresses, etc... THEN...they make the network REFUSE COLLECT from the US. So I get about 200 RCC's in my scan...I stop it, mad. Later it's working again. I start back up, happy. Then, they take it down again. I'm getting confused by now. Then, it's back up again, but the response time is LOOOOONG. My program doesn't like waiting, and therefore keeps fucking up. I dunno what their problem is over there. Are they still at war or something? Also: The datapac directory is going to be done soon. I still have to go and check some 2000+ addresses but I will eventually. Anyone know anything useful about the HUNDREDS of Terminals attached to the network? I'm assuming that they are dialin-nodes, but I don'tthink you can pad to pad them. At least I haven't been able to get on one when someone's been there. But I have millions of them... ->ME 3/60: Autonet Name: Grey Owl #10 Date: Tue Jan 09 21:09:39 1990 Is there a scan directory available for this one? (Should I bother scanning?) grey owl 4/60: janet Name: One Assembler #11 Date: Tue Jan 09 23:16:45 1990 anyone got any systems/accnts on Janet? Will their gateway accept collect connections? OA 5/60: autonet Name: The Mentor #1 Date: Wed Jan 10 00:57:39 1990 Well, we've gotten part of autonet done, but they noticed the scanning and went a bit nuts (monitoring internal mail is wonderful). It's been 6-8 months though, so it might be time to start again. Mentor 6/60: Autonet & things... Name: Erik Bloodaxe #2 Date: Wed Jan 10 04:03:03 1990 Um, are you going to scan it from the local dialup? Or by it's DNIC? It's 3126, isn't it? I'm not too sure if Telenet lets you call it, but that would really get rid of that damn three try delay...also, I think 21221 resets the error attempts, so you can scan two then 21221 and then two more, ad infinitum... Also, Janet refuses collect...I'm assuming you mean the nua when calling from telenet...Or have you found a gateway through Tymnet? Janet needs a password, but it might only be for some woman named Janet...who knows. ->ME 7/60: autonet scan Name: Grey Owl #10 Date: Wed Jan 10 19:08:07 1990 Scanning by dialup would be slow. That's out. I don't know if telenet is connected to Autonet. If it is, I'd scan it by NUA. Otherwise, there are gateways to it. (eg. You connect to an NUA which acts just like a dialup) grey owl PS: Can someone upload an executable NUA scanner for IBM or Mac? (Binaries please) 8/60: Autonet... Name: Erik Bloodaxe #2 Date: Thu Jan 11 13:18:39 1990 It woulnd't be such a great idea to scan Autonet through the Telenet gateway. Autonet raised a holy shit-fit when Urvile was doing it about a year ago, and sent Telenet Security all kinds of nasty mail bitching for them to stop whoever in 404 was connecting to their system. Telenet blew them off, but if it started again, Telenet might just have to listen to their whining and crack down. I suggest you (or whoever is planning on this) do your scanning through a main dialup. It will be slower, but probably safer in the long run. ->ME 9/60: thanx Name: Grey Owl #10 Date: Thu Jan 11 18:06:40 1990 There is a gateway or something that goes to Autonet. When you connect to the NUA it acts just like you called an Autonet dialup. Would this be as crummy as scanning with the 3126 DNIC? Check out the DNICs listing from Daneel Olivaw and myself. I never knew that the US had that many pacet networks! Also, what's the difference between Telenet (3110 DNIC) and GTE Telenet (3127 DNIC)? grey owl 10/60: autonet Name: The Mentor #1 Date: Thu Jan 11 21:15:12 1990 The Autonet gateway is at 31341. The problem is, although it *acts* like a normal dialup, your PAD address is sent to them from your Telenet PAD when you connect. Apparently, the address header is attached to every connect attempt, because they went *nuts* when Urvile scanned 5 or 6 NPAs - they knew immediately it was from a 404 Telenet PAD. Mentor 11/60: Autonet Name: Erik Bloodaxe #2 Date: Fri Jan 12 00:23:46 1990 Don't bother scanning it...Phoenix v:and m~ryself should have the network wrapped up in a few weeks... Look for the directory soon... THIS FUCKING i]LINE {OISE HAS GOT{TO kYqk]t~D!xD!w3{!!! /he{p /l{ q{_ga8!oku!ws{m{{ {/~rli {i]{_;z}?7aThis is the Ctrl-D Macro{o'+fJwT w3w,\Z[[{{>{ {x{qxD {{t(>~rxDf*MEtz{w3 { -t{>ME {s 12/60: ok.. Name: Phoenix #17 Date: Fri Jan 12 00:54:28 1990 yeah... wierd network.. scanned out about 15000 nuas on it so ar and it has the strangest format i ever seen... and i have seen a fairt few nets. Umm.. one good thing for it is that it is an extremely fast network... so yeah... shouldnt take much longer to scan.. Phoenix <The Flatline> Jacking out.. 13/60: .. Name: Silencer #31 Date: Sat Jan 13 03:00:33 1990 Well...some of this may be out of sub but here ... Janet/PSS: I don't have any accounts....but from the main login you can access a help account and read some of the files available. There is one with an extensive list of NUA's reachable by Janet....and one that explains the entire system..how to logon....Account info..format...etc etc...good way to learn about the system.... Which brings me to another point....I called it through 51359 (Develnet) at the time. This was quite a useful little system... but now any valid command you type it will disconnect you..there must be a pass or something. But I tried a few random cmds and got the following to hang me up (valid).. Pad Dialout Devel Help When and If this system ever becomes available to us hackers again....we must explore these cmds......l8r - SIlencer/DFKN 14/60: DAMN !!! Name: The Parmaster #21 Date: Sat Jan 13 08:40:17 1990 Shit, i got drunk l;ast night and went onto that philippine sys..stupid admin came on and asks who i am... next thing i know i'm booted off and both acct's on the sys are gone not only this...but the fucking whole philippine net isn't accepting collect anymore (before it was completely down after i was booted!) anyway apparently someone there had enough of me. It might also have been the fact that i tried to login to the tdt2 system on it about 6 or 9 hours previoulsy to getting ripped out of my skull on Long Island Iced Tea. My apologies to you chris...and especially to scott! by the way kids...never drink and hack! Par Jason 15/60: janet Name: Dark Sun #11 Date: Sat Jan 13 16:53:46 1990 what is the NUA for janet? (So i can login with the help account and read about it)? 16/60: drink and hack Name: Grey Owl #10 Date: Sat Jan 13 17:31:18 1990 I thought the proverb was "Never drink beer and program at the same time." In the miscelaneous NUA file I u/led there are some DPAC NUAs that give you a list of all the outdials in Canada. Helpful, huh? Does anyone know the new NUA for Develnet? grey owl 17/60: if you drink and hack.. Name: Phoenix #17 Date: Sat Jan 13 21:05:00 1990 I can occasionally turn up with better results.... imiganition runs wild.. 18/60: Stuff Name: Gary Seven #38 Date: Mon Jan 15 11:12:28 1990 The NUA for the Janet net is 234223519xxx. Anybody have a Net scanner for the Apple? Later. 19/60: Autonet help Name: The Parmaster #21 Date: Tue Jan 16 00:25:55 1990 Been needing help hacking autonet? Need you're local dialup? here's the sys to consult dialup autonet: (if u don't have a dilup) Use: 212-947-1xxx or 212-629-5xxx after connect hit <cr> twice. then type 1300,7777 Password is AID system is menu driven and has lots o handy stuff online <gag> (sucks compared to telenet's phones/phones but it's still usefull NOTE: to all FEDS this is public info Thank you, Your COMRADE, bahahahaah Par Jason 20/60: Autonet... Name: Grey Owl #10 Date: Tue Jan 16 08:52:36 1990 or you could call 512-480-0xxx and login with "help". You'll get a WATS number to call and they will tell you what the dialup for your NPA is. grey owl 21/60: x.25 help Name: Lancia #37 Date: Tue Jan 16 14:58:43 1990 i was on internet the other day and using ftp i found what appeared to be x.25 software so i grabbed everything in that directory..is there any way these programs can be used to be able to pad off of the computer im storing them on??? 22/60: well Name: The Mentor #1 Date: Tue Jan 16 17:08:21 1990 You can't modify it for pad-to-pad, but you *can* modify the X.25 software so that you can connect to any CUG by disguising your incoming address. Mentor 23/60: CUG Name: Konica #47 Date: Wed Jan 17 11:01:59 1990 Can someone explain CUG? 24/60: CUG Name: The Mentor #1 Date: Wed Jan 17 12:21:03 1990 A CUG is a Closed User Group. It only accepts connections from certain addresses or address ranges. Mentor 25/60: Janet Name: Silencer #31 Date: Thu Jan 18 06:11:44 1990 Gary Seven.... the Janet doesnt accept collect does it? I dunno..I called through develnet before....if you can would you call and get the direct dialup for it? .s 26/60: What is Develnet anyway? Name: Grey Owl #10 Date: Thu Jan 18 09:11:29 1990 Since they had an easily found PAD in Canada that went down, and then I noticed another part of Develnet in Dayton that ALSO had easily found pads on it, there has to be another one. If I can get some information on their company and where it is based (besides Canada and Ohio) I might be able to track the next Develnet pad. Anyone want to help me here? grey owl 27/60: I think... Name: Erik Bloodaxe #2 Date: Fri Jan 19 01:39:40 1990 but I may not be right, that DevelNet, JettNet, and others are all owned by Mead...like the paper people, and whatever else they make... That's my guess...they are a world-wide (well, at least North-America wide) company...and probably do lots of business in Canada...and they are basd in Ohio, thus the Meadnet address there too...arg... Your guess is as good as mine... ->ME 28/60: minor Name: Phoenix #17 Date: Fri Jan 19 06:36:51 1990 just a slight warning... maybe stay away from develnet... it is being monitored quite quite heavily... but then again... what do i know...? Phoenix <The Flatline> Jacking Out.. 29/60: Meadnet Name: Grey Owl #10 Date: Fri Jan 19 12:51:38 1990 It looks to me like they think they can hide otherwise unprotected pads just by moving the address from net to net. Typical moronic security. Bloodaxe--when is the dpac scan going up? I NEED this. grey owl 30/60: Develnet Name: Silencer #31 Date: Fri Jan 19 18:16:45 1990 Hmm.. Would it matter if it was being monitored? as long as you werent caling from a local telenet dialup and you didnt give out yer number over the pad it shouldnt really matter. Anyway... When u log on to the 51359 pad it says something like Develnet somethingorother - SCL2 or some odd number.... Develnet only disconnects you when you type valid commands..When I tried this odd number SCL2 or whatevr as a command it disconnected me..I tried again to verify and it did again..I wonder what this command would be used for.?? - Silencer 31/60: well Name: Phoenix #17 Date: Sat Jan 20 07:54:21 1990 The way I see it, it matters as follows Anything you do through that p[ad is being logged.. that means any info you find or is given to you by others will be captured.. These systems will probably then get logged as well.. followed by which they will die... and eventually one thing leads to another... and people get busted... A general rule that i try to follow is that if i know something is bieng monitored... STAY AWAY... Prevention is seriously the best cure... 32/60: well.. Name: Silencer #31 Date: Sun Jan 21 05:16:30 1990 You dont seem to have any problem with calling QSD ..and EVERYONE knows that IT is monitored. Hmm?? However.. I agree with you. Now..about Develnet being owned by mead...I dunno.. What I DO know is that there is an NUA that I found scanning that connects you to MEADNET. Its in 513 too. What I dont know..is how to get the damn thing to work?! It gives a list of 40 or so systems ..but how do you select whihc one you want to connect to? Herez the NUA: 51331 from telenet... it accepts collect connections too.. if anyone can get anything out of this can you let me know eitjer here or in email? ...thanx... Also...does anyone know anything about LEXIS & NEXIS ? Looks interesting. - Silencer BTW: in case anyone would like to contact Mead Corp... their business office number is 513-495-6xxx.. 33/60: Connection Name: The Parmaster #21 Date: Sun Jan 21 10:16:11 1990 Well, the only connection is disconnection (as Gandalf would say ;-)) thats what i'm putting on my epitaph. THE ONLY CONNECTION IS DISCONNECTION... oh well.. maybe i'll take a few of the buggers with me when they pull up. Who knows? Later, Par Jason. 34/60: meadnet Name: Grey Owl #10 Date: Sun Jan 21 11:32:39 1990 k-rad d00d. Heh. 51331 is Jetnet/Evandale, I believe. In case you didn't know, logging on to 51359 and typing PAD would log you onto the Jetnet pads. This was useful as a front end to 51331 which didn't accept collects when 51359 was up. Got that? grey owl 35/60: lexis/nexis Name: Mr. Slippery #72 Date: Mon Jan 22 00:29:27 1990 These are legal networks. A friend who works at a law office gets to use them to do research on cases/precidents and the like. I'm not sure what else they are good for but with all the busts, maybe that is enough! 36/60: oops Name: Grey Owl #10 Date: Mon Jan 22 14:15:27 1990 correction: Jetnet/Evandale is 0311051300080 not 51331. I think 51331 is Lexis/Nexis or something like that. grey owl 37/60: Hey la Name: Sicilumm Thorne #28 Date: Mon Jan 22 17:37:36 1990 When someone is in the US (03110), and is "non-collectable", how should I go about connecting. Strnagely enough, I can only linkup to other countries. Explain that. If you want, or if security req's, leave me mail. 38/60: A Pad Name: Daneel Olivaw #9 Date: Mon Jan 22 22:35:04 1990 might help.... Daneel Olivaw P.S. An NUI is good too... hehe 39/60: better than a PAD Name: Grey Owl #10 Date: Wed Jan 24 19:18:43 1990 You could always call Pac*it+ if you don't mind MCI giving your name/number to GM! Get yourself a good fast outdial that will allows WATS numbers and call 1-800-727-2796. It works just like Telenet 'cept you leave off the leading 0 in the DNIC. (0208057040540 should be 2080...) It will connect you to any 3110 or 2624 address without a problem as long as the host is actually up. Don't abuse this from home. They will fuck you over. grey owl 40/60: Pac*IT plus Name: Dark Sun #11 Date: Wed Jan 24 20:31:58 1990 it will also work with the 3020 (Datapac) DNIC DS 41/60: Hah, Name: The Parmaster #21 Date: Thu Jan 25 18:58:00 1990 Just keep in mind they see eveyrhting you do. Believe me.. I know. Jason. 42/60: pacit Name: Silencer #31 Date: Thu Jan 25 23:54:39 1990 What does pac*it mean whenit says (or telenet or tymnet for that matter) Call cleared DTE originated. ?? Whats dte.. 43/60: dte Name: Dark Sun #11 Date: Fri Jan 26 16:32:16 1990 same as a asych port... when DTE drops, the connection's dropped. DS (Likewise, when you drop DTR, the connection drops to the remote) 44/60: anyone heard of... Name: Ravage #19 Date: Tue Jan 30 23:57:26 1990 nexus??? i was watching espn and a mention was made about doing a search through here for past bush speaches. does it have to do with public statements made in washington? is it public or private access? 45/60: make that espn cspan... Name: Ravage #19 Date: Wed Jan 31 12:15:55 1990 sorry. 46/60: pavc*it Name: Corrupt #114 Date: Thu Feb 01 06:59:10 1990 pac*it plus calls 03110..germany and spain..I didn't think it called DPAC. usefulfor scanning spain..but at this point......hmm I'd be scared ofwhat MCI i woulddo then GM... anyone up on Kinneynet?hehehehehe I'llpost the dialup later but u need a NUI for it :-(( Develnet? I thoughghht the Develnet was just x.25 server software! I've seen several Develnet pads and I had gotinto thesystems it connected to and they weren't MEAN related...maybe I'm wrong?(it was a modm company.) Needless to say I was pissed when everyone used it todeath just to see a pretty (canada)..the reason it diconnects is because of where you're calling from..if you call from canda u probably won'T expirence this problem....on the 03110 develnet..same thing cept you have to be at console...there are still somesystems availble from there that r open..here'Sone IBM <-i couldn't hack it so of course Iposted that one:-)) C U-->greets from [8lgm]corrupt 47/60: MEAD / Develnet Name: Grey Owl #10 Date: Fri Feb 02 22:03:31 1990 Misunderstanding: 51331 is meadnet. 51359 and 51380 are Develnet. 51331 has nothing to do with Develnet except that I was mistaken in a post a while back. Corrupt: do post that Kinneynet dialup..please! Pac*it is still great for calling those Telenet dialers! I mean...not direct of course. Heh...MCI sucks. grey owl 48/60: pac*it Name: Silencer #31 Date: Sat Feb 03 00:40:23 1990 hmmm......a few people have said that pac*it is gonna bill me for using od's from it. i dont doubt this...but i doubt i'll ever pay anything. Because..mainly..i never broke the law! I never enetered any passcodes or anything ..a ya know? all you do to iuse pac*it is call a 800 line..input a network address...and dial the number.....getting charged for that is the silliest thing i've ever heard...i'll fight em to the end on that shit.. - SIlencer 49/60: chargeing Name: Alter Ego #110 Date: Sat Feb 03 07:26:13 1990 RE: pac*it They MAY charge you for use of thier service... also some of those od's are meant to be payed for i.e. pcpursuit. So you may even billed for use of PCP's od's or both... Alter Ego 50/60: silencer.. Name: Grey Owl #10 Date: Sat Feb 03 18:39:21 1990 you can be billed. You DID break the law. Technically, you call their system and used it without their permission. Now, if for somereason they should go after you for calling a few piddley outdials you can just say you thought it was Telenet. They probably will let you off with a warning and some other little deals. If you were using it to scan...then you will be screwed. I wouldn't advise calling anything direct anymore. It's just too dangerous these days. The only things I call direct are Phoenix Project and Telenet or Tymnet. grey owl 51/60: kinneynet? Name: Corrupt #114 Date: Sat Feb 03 20:37:57 1990 umm KinneyNet:201-623-6009,6014,6035 there are more..most won't find it useful..you neeed a NUI but it does have exstensive help (for a PSN dialup) ..also..dunno where it enters the network..maybe one could..(if one had the time..)too see if you could..ahem 52/60: things... Name: Erik Bloodaxe #2 Date: Mon Feb 05 01:07:17 1990 jesus...if you thugs are STILL calling pac*it plus direct then I genuinely hope MCI drives a nice new GM truck right up your sphincters. DOESN'T ANYONE LISTEN TO ME? oh well... also, kinnynet isn't hooked into tams, and all you need is an old id to get it to work, although you don't want to use it for scanning, as it hangs up after a wrong attempt (and after you disconnect from a valid host) dig up your old telenet nuis and use it freely...until they get smart and fix it. ->ME 53/60: well from the way I understand.. Name: Phelix The Hack #89 Date: Mon Feb 05 11:36:32 1990 pacit*plus...is perfectly legeal to call and abuse... BUT ...not only does MCI get Detailed Report...EVERYTHING you do is monitored..so if you use it do something illeagal..they know... a good example is Doc Cypher...and none other than Par..(so you might ask him) pth 54/60: Bloodaxe... Name: Grey Owl #10 Date: Mon Feb 05 16:52:08 1990 I wasn't ignoring you that time you told me to quit calling Pac*it. I haven't called it direct since then. There are outdials that are nice and fast. Pac*it is a great little pad for my personal use and abuse when I'm outdialing! grey owl 55/60: There is a new network Name: Daneel Olivaw #9 Date: Mon Feb 05 19:53:16 1990 I am not sure of it... but I'll get more info... it seems to have dial-ups in most cities. Daneel olivaw 56/60: Yes well you can ask me... Name: The Parmaster #21 Date: Mon Feb 05 20:19:50 1990 Yes you can ask me... And i will tell you...THEY LOG EVERYTHING ON PAC*IT PLUS! and for the people who don't listen and get into bigger stuff then dont say that i didn't warn you... also Doc. Cypher saw the printout they had of the MCI call detail report says it was like fucking 6 inches thick...he called it and it had his # approximately 200 or so times...so you can see.. if you called it a lot from home you caused a lot of problems for GM they are losing a lot of $$ coz of it. they also like to see what neat little toys you play with over it. and if it's anything big, hairy, and scary count on a visit. Also: the fools who do use it- PLEASE don't talk to my on any of the chats... my= me i've got enough probs already with bein logged, i don't need more. Stay Safe, Par Jason 57/60: hmm Name: Phoenix #17 Date: Tue Feb 06 13:27:34 1990 i hope this is only temporary.. but altos munich <altger> corner stone <or at least was. for many a year seems to be refusing guest logins.. thats really sad... 8( phoenix 58/60: Pakit Name: Nemesis #122 Date: Wed Feb 07 01:26:15 1990 Well Ive heard a lot of thing about it, and had a million warning fomr other peopel not to use it.. But I have to say.. that I have been useing it for years, and have had not one problem, and Im not about to stop now. To be honest, despite what a lot of people are saying, I think its reletivly safe, as long as you use something correctly it will always be safe. 59/60: shit Name: Psychedelic Ranger #80 Date: Wed Feb 07 04:18:54 1990 but even calling in-direct implies that something is before it... and the first call will always be direct! But you can weave your calls around in several interesting ways that make it much harder to trace over a period of time... 60/60: new Name: Corrupt #114 Date: Wed Feb 07 06:04:53 1990 -yup!..new network Coming...however..it 's gonna have a few problems..like..you r city will be sent in thepacket header..notlike itwasn't before..like example...youcallqsd via it (and you willbecause that's gonna be a littkle service they offer..probably have a PCP /starlink type thinie...) it's say Corrupt (NYnet) now Sure this looks Fine And Dandy but it screams where your coming from andmaybe it'll be tymeto look what Port your coming from adn callup AT&T and... well..whose gonna get a nui first! (if U even Need one..) I'llletcha know more when I getmy info (a week after I memorizedalltheLitature :-)) ) justKidding! 'and I've Got A Gun to kil MC better than me but THERE are None!' howcum nobody asked me to Sing yet!!!! < Other Packet Nets Q-Scan Done > ______________________________________________________________________________ *** {UNIX Sub-Board} *** < Q-scan Unix 10 - 69 msgs > 1/69: This Sub > Permanent Message Name: The Mentor #1 Date: Sun Jan 07 05:18:55 1990 This sub is for discussion of UNIX in all its myriad forms - XENIX, BSD, System V, AIX, COSNIX, and so on, ad infinitum. Mentor 2/69: ! Name: Erik Bloodaxe #2 Date: Tue Jan 09 14:35:53 1990 Someone explain to me...for the benefit of EVERYONE...the wall and rwall bugs. I can't get anything to work, and I think I'm doing it all wrong. ->ME 3/69: WALL and RWALL bugs Name: One Assembler #11 Date: Tue Jan 09 22:35:01 1990 I dont understand what the diff would be between rwall and wall... in order to use the wall bugs you gotta modify /etc/utmp on the local system, right (correct me as i go along if I'm wrong). So, you would just either specify you're local net or no net for rwall. I heard the prob with wall t(and rwall is that you're fields get messed up in your passwd file when you do this. I was thinking instead pointing it to /etc/passwd point it to a superuser accnt (ie first cp /usr/spool/cron/crontabs/root $HOME/root then point your utmp entry to the file /usr/spool/cron/crontabs/root, because I wouldnt think that cron would screw up on any characters added{in,{as lon{yM t(as w3one line {ad the corre{t "*"'s and command fields. OA 4/69: restore bug Name: One Assembler #11 Date: Tue Jan 09 23:17:50 1990 anyone know how do get write permission to a file system thru the restore bug? OA 5/69: ok.. Name: Phoenix #17 Date: Thu Jan 11 03:56:08 1990 someone tell me how to configure cu so it calls out on x25... <I really should know.. but dont..> Phoenix <the latline> ahem <The Flatline> Jacking out.. 6/69: defcon Name: Phoenix #17 Date: Fri Jan 12 01:11:27 1990 defcon is not system specific... it is an invention of the realm, and was initially concieved by the force. The theory behind defcon was to write a program which would hack/scan/perform almost anything youwould give it. The results are quite astonishing... defcon can go through 50 vaxes trying 150 username/passwords on each in under an hour. It runs of a mainframe, so user does not need to be online while defcon is running. Todays defcon has deault listings for unix , prime, and vax plus more systems, does a default hack, and then any additional combinations you tell it to try. It will also scan nuas for you.. All up not a bad package. Phoenix <The Flatline> Jacking out. 7/69: defcon Name: Grey Owl #10 Date: Fri Jan 12 23:00:21 1990 Are you, by any chance, sharing defcon? grey owl 8/69: well.. Name: Phoenix #17 Date: Sat Jan 13 03:36:07 1990 not the soruce.. but i hope to have some sort of system worked out soon... Phoenix <The Flatline> Jacking out.. 9/69: DESZIP Name: The Parmaster #21 Date: Sat Jan 13 08:43:26 1990 If anyone happens to have the program DESZIP (using the special algo to encrypt both the encrypted password and word checking, ) Let me know.. i'd appreciate to get a copy again! i admit the thing is huge but i've only got one more hope for getting another copy now.. any help would be appreciated Thansk, Par Jason 10/69: Piper... Name: Erik Bloodaxe #2 Date: Sat Jan 13 20:23:20 1990 who is supposed to be calling here soon... sent me Internet mail the other day...He should be u/l a copy of DESzip to my school's unix, and I'm going to ask him to set it up too, so we will ahve a base to use the damn thing from...I've been wanting a damn DESzip site for a LOOOOOOONG time. ->ME 11/69: AIX(rt, ps/2, 370) Name: Dark Sun #11 Date: Sun Jan 14 00:02:12 1990 In my normal, EVERYDAY life, I have access to over 500 AIX systems. What ways are there to gain entrance thru TCPIP, and once you're in, what are some bugs that will give you root? DS 12/69: try Name: Phoenix #17 Date: Sun Jan 14 06:34:13 1990 try telnet, rlogin,ftp,tftpand heaps of other protocols... all will get you there... Phoenix <The Flatline> Jacking out.. 13/69: try... Name: Phiber Cut #34 Date: Sun Jan 14 08:13:09 1990 The best way is to tftp all of the address's for the organization you are looking at and snatch the password files. This can be automated in a simple shellcript which would look at/read the host table as sysn (assuming you're in one system already) and tftp to each machine in the table. Then do a "get" to grab the password file. This is where you will generally discover someone left an unpassworeded account. If there are SUN's connected you're really in luck because the security onthese machines is always left open, and generally they belong to researchers who don't know how or just don't give a shit ("why should I password all of the accounts?"). Anyway, once you've grabbed all of the password files (try giving them the host address as a name - makes it easier) run even a simple cracker against them and you're sure to get results. 14/69: I didnt ask anything about SunOS Name: Dark Sun #11 Date: Sun Jan 14 14:11:54 1990 I asked about AIX! 15/69: same same Name: The Mentor #1 Date: Sun Jan 14 14:23:25 1990 But the same principles apply. You must generalize out from a specific opsys... 16/69: ok...then... Name: Dark Sun #11 Date: Sun Jan 14 18:40:51 1990 What are some systems (besides uunet) where I can ftp SunOS 4.0.3 source? 17/69: System Name: Captain Crook #36 Date: Sun Jan 14 22:45:58 1990 What is an ideal system to have Unix on? I can get discounts on AT&T equipment because I have 3 or 4 relatives who work for AT&T and Bell Labs. Price is a factor but not much of one. I do not want to get some piece of shit clone and use Xenix and all that other shit. I want a robust system with the works. 18/69: well Name: The Mentor #1 Date: Mon Jan 15 01:35:47 1990 If you don't mind older equipment, snag a 3b2 (or 3b5 or whatever). They're good, solid machines. I'm not up on the latest AT&T stuff - my hands-on experience was all on older stuff that they don't make anymore. Mentor 19/69: umm.. Name: Phoenix #17 Date: Mon Jan 15 02:18:33 1990 just let me casually point out that ttp will only work on the older versions o ttp, which do not do a chroot. so there. Phoenix <The Flatline> Jacking Out.. 20/69: You might call: Name: Daneel Olivaw #9 Date: Mon Jan 15 18:24:54 1990 Electrorep... they carry erverything, and have a nice 300 page catalog of all AT&T and Sun equipment... Daneel 21/69: well Name: Phiber Cut #34 Date: Tue Jan 16 07:03:37 1990 Mentor, AT&T 3B5, 3B15 and 3B20 are old dinosaurs being put to rest. The new 3B2/1000 line (models 60,80 and whatever) rock and roll. The 3B2/1000-80 is just about as powerful as a VAX 8600, which is pretty good for a machine the size of a SUN workstation. There Microline includes the 6386 WGS, which if configured properly (i.e., 32M Ram, 300M storage) can be a kick ass UNIX box. 22/69: i Name: Phoenix #17 Date: Tue Jan 16 07:38:32 1990 ok.. is a/ux supposedly 100% bsd compatible ? i heard yes.. and wsecondly... should there be major dierences in compiling source on bsd 4.2 compared to bsd 4.3 ? i havent heard anything.. but rom experience.. yes... clariication please.. Phoenix 23/69: I have never heard anything good about A/ux Name: Grey Owl #10 Date: Tue Jan 16 08:55:22 1990 Maybe I just don't run with the right circles, but I took Macworld and MacUser for several years (subs. just ran out a few months ago) and I don't recall reading anything good about A/ux. All I've heard is that it's slow and not fully implemented. I guess it's one of the few Unices (is that really plural for unix?) that runs on a micro...the only for an Apple. grey owl 24/69: p.cut Name: The Mentor #1 Date: Tue Jan 16 17:08:57 1990 Yes, but they are *cheap* dead beasts - I can't afford a VAX! Mentor 25/69: Picture This.... Name: Konica #47 Date: Wed Jan 17 11:12:16 1990 I get root on a system.... I want to edit the login file so I can add a locin straight to the file instead of the /etc/passwd file. How would I go about doing this? 26/69: uhhh Name: The Mentor #1 Date: Wed Jan 17 12:22:16 1990 You want to put a trapdoor into the login program, right? You need to get ahold of login.c (I think I have a copy of the BSD 4.3 version) and just put a jump in it that takes you over the /etc/password check if you enter a certain string as a username. Mentor 27/69: Yea Name: The Dictator #43 Date: Wed Jan 17 18:45:22 1990 Yea..The Login.C (At least all the ones Ive seen) are extremely easy to follow. Either insert a jump to avoid the etc/password, or set up a varable to copare with the password you give to bypass the etc/passwd check. The Dictator 28/69: its amazing actually Name: Dark Sun #11 Date: Wed Jan 17 19:47:18 1990 I was looking around some systems tonite and while reading someones mail I found out where to get SunOS source (on a recently setup system)... Just thought it was amazing that I've been specifically looking for it and couldnt find it for quite some time, and then when I'm NOT looking for it it just appears.. (As you can tell, this is not the reason i posted this)... So, I go to FTP the source for login, and guess what???? My passwords been changed. I think I know who, but I dont want to start an argument again (he already is in a bad mood for some reason)... You know who you are, so could you at LEAST change the password back? Related... I can supply source with a reasonable amount of trouble to anyone who wants it (ie maybe I'll encrypt it and let you break it--just to make sure noone gets it from me instead of trying to find it at all)... DS ps I dont want ANY replies in public posts about the person changing my password... (It WAS a COMPLETELY random one) 29/69: hmm Name: Phoenix #17 Date: Thu Jan 18 02:07:43 1990 i got source or most shit on unix... <still looking or tp and telnet> but i want to know why my login.c or 4.3 doesnt compile on 4.2 and then i want login.c 4.2 i anyone can help me ? 30/69: NYCENET.... Name: Ravage #19 Date: Thu Jan 18 10:37:23 1990 is the New York City Educational Network. the number is 1-800-344-8280 31/69: Root Name: Konica #47 Date: Thu Jan 18 23:28:30 1990 If a freind of mine as a favor gave me the root shell on a unix how can i get the login.c source from the system. We talked about deleteing the original one and puting yours, but how do I check out his? The guy that gave me root probbly had a backdoor in it all ready and I want to check it out. Does anyone have a decryption breaker? As far as I know the /bin/login file is encrypted and I want to veiw it at least... And is their anyway that I can download (besides buffering) files from a unix if I don't have a unix myself? I doubt there is an xmodem protocal or something.. sorry for all the questions but everybody has to start somewhere... .s 32/69: Unix! Name: Erik Bloodaxe #2 Date: Fri Jan 19 01:42:03 1990 I don't know if these are on the d/l's yet, but there are a few good UUCP packages for the IBM family. You can uucp yourself some files, if you want. I haven't gotten them off of here yet myself, but I'm going to soon, and when I get them to snag remote files when calling into a unix and getting into the uucico shell, I'll let you all knw how well it works. ->ME 33/69: ok Name: Phoenix #17 Date: Fri Jan 19 06:38:28 1990 finally got it... source for almost all unix protocols... ahh.. yawn and practically everything else... berkeley uni if anything... provides.. Phoenix <The Flatline> Jacking Out.. 34/69: internet worm Name: Dark Sun #11 Date: Fri Jan 19 12:44:05 1990 Well, I see rfc1135's up... anyone have a pure text version of spaf's report? (Dont have access to a postscript printer for awhile) DS 35/69: /dev files Name: Dark Sun #11 Date: Fri Jan 19 12:47:44 1990 how would I intercept all information going thru the /dev files (ie /dev/ttyp0 or /dev/kmem)? Also, anyone know how to tap the LAN of a net to watch the info going across it? DS 36/69: unix ftps Name: Grey Owl #10 Date: Fri Jan 19 12:54:09 1990 There are lots. You can use one of the xmodem packages available (call your local C oriented programming BBS) or get the UNXZMODM.ARC package. Zmodem for your unix. It's quite handy. grey owl 37/69: source Name: Johnny Hicap #45 Date: Fri Jan 19 22:23:46 1990 I have all sort of source files for BSD 4.3 but I am looking for soure for SunOS. Does anybody have any? 38/69: rn Name: Ripper #51 Date: Sat Jan 20 21:16:27 1990 OK....I use rn to read all the latest BS on the net, is there any way to bepass the moderator? Me and a moderator have a personal thing, and he's so immature he bounces back my message to others on the group (that would do go for everyone to see) with "HA HA HA HA!" appended. 39/69: sysdiag Name: Dark Sun #11 Date: Sat Jan 20 21:38:28 1990 What interesting info can you do with sysdiag accounts(besides run the system diagnostics)...anyway to change it to the csh shell or ftp to/from it? DS 40/69: well Name: Phoenix #17 Date: Sun Jan 21 01:06:02 1990 not much... sysdiag is rather tightly sewn up.. umm.. unwise to play with it.. coz it an seriously stu up a system.. <<f key still broken.,.>> 41/69: CARRIER SCANNER FOR UNIX Name: Dark Sun #11 Date: Sun Jan 21 01:21:01 1990 Anyone write a carrier scanner for UNIX modems? You could have 30 or so scans going at the same time if you had that many outdial modems DS 42/69: Hmm sysdiag. Name: The Parmaster #21 Date: Sun Jan 21 10:19:26 1990 I think an old trick is to make sysdiag readable and writable by everyone. Then if you ever lose root. Walla. Later, Par Jason. 43/69: bypassing moderator Name: Mr. Slippery #72 Date: Mon Jan 22 00:30:49 1990 Yes, its been done and in fact, you have to know how to do it (sort of) to post to alt.hackers but if you do it normally someone will get on your case and threaten your system with getting cut off from net access. 44/69: well Name: Phoenix #17 Date: Mon Jan 22 09:26:57 1990 only problem is that i have never seen sysdiag with a shell <it plain aint got one> phoenix 45/69: sysdiag Name: Dark Sun #11 Date: Mon Jan 22 15:40:06 1990 It has the sysdiag shell (if you can really call it a shell) DS 46/69: well Name: Phoenix #17 Date: Tue Jan 23 06:53:01 1990 its not really a shell... it is the program diag youcan call it a shell as much as you can call something like tfp orkermit a shell... Phoenix 47/69: Ok. Name: The Parmaster #21 Date: Tue Jan 23 19:14:40 1990 Yes, but i mean if you have another acct you make the sysdiag PROGRAM Readable/writeable by everyone. then if you lose root you can use it to get it back. dig? Later, Par Jason 48/69: hmm Name: Phoenix #17 Date: Wed Jan 24 01:31:44 1990 whatever phoenix 49/69: okey-doke.. Name: Phelix The Hack #89 Date: Wed Jan 24 12:42:26 1990 say I've got a question... ...and its on uucp, so before everyone starts jumping my case; and telling me how shitty uucp/nnucp is and tis worthless...blah..blah...saveit. I am perfectly aware of its limitations.. ok...after submitting a uucp request (or any request for that matter that uucio sets up); how can I IMMEDIATELY bump my request off the queue; and have it "executed" right then and there (if possible)...even as root, with the host time set at ANY; and flat out running uucio will not do it. I have tried cron entries executing uucicio once a min...etc..This is true even if the particulr entry in question is the only one in the queue...any help? pls answer thisone SOMEONE..its more a frustration barrier than a useful item..and its driving me nuts. also any encounters with AT&T sys V3.2.3 (or soon to be released 4.0)...featuring password shadowing, passable ENV variables between "security" programs ex: login..(for root only)...non modifiable ENV variables for restricted accts...blah..blah..blah..? pth. 50/69: uucp reqs Name: The Mentor #1 Date: Wed Jan 24 14:05:04 1990 When you execute a uucp request, getty is usually executed as part of it. Because of the slow nature of this command, if you execute it too quickly, you'll execute a second getty before ungetty has been executed. This screws everything up, and usually freezes up uucp until someone manually resets the tty's. If you want to do it, I'd execute the following: 1. Change the cron so that it isn't running uucico. 2. Kill off everything in the queue (uuqxt?). 3. Give it a few minutes to kill everything. 4. Queue your request. 5. NOW execute uucico. 6. Restore the cron. 7. Begone... Mentor 51/69: lovely bug.. Name: Phoenix #17 Date: Wed Jan 24 21:35:34 1990 which lets you get the shell o anyone mailing you..! coming soon..! 52/69: something i had a long time ago and lost.. Name: Phoenix #17 Date: Sat Jan 27 07:42:48 1990 umm.. anyone got a copy of xyz.c source code for unix ? basuically it is source for xmodem, ymodem and zmodem on unix. I could probably manage to do xmodem and ymodem <maybe..!> but never zmodem <dont know damn thing bout it!> so if anyone got xyz.c let me know! thanks Phgoenix 53/69: password hacker Name: Dark Sun #11 Date: Sat Jan 27 12:00:56 1990 Anyone either got a patch for pwh.c to let it work w/ dictionaries on any system or a different password hacker that'll work almost anywhere? (Or maybe just on SunOS?) DS 54/69: well Name: Phoenix #17 Date: Sun Jan 28 14:21:26 1990 to run it with a dictionary.. make the dictionary a file, and use it as a wordlist.. you will have to modiy the ARB_CONST to some ungodly amout.... then go for it.. by the way.. i got zmodem source if anyone wants it.. ill put it up here! phoenix shit i hate prompt security guys.. one minute ftp from 1987, next minute ftp version 5.84, jan 24, 1990 arggh! 55/69: i have... Name: Dark Sun #11 Date: Fri Feb 02 23:18:14 1990 suid'ed chroot on a system... will it now be easy enough where all I have to do is create the /etc and /bin dirs and then place passwd and login in them (oh yea and csh)? I mean do a chroot to my home dirs and then create those directoriesm or is it a bit (or ALOT) tuffer than this? DS 56/69: aha Name: Phoenix #17 Date: Sun Feb 04 05:56:25 1990 try it <hehehe...> by the way .. anyone got sun source codes ? any version of sun will do.. need them rather badly.. 57/69: ok Name: Phoenix #17 Date: Sun Feb 04 06:06:14 1990 password shadowing; found on some lbl system <lbl.arpa> at ucb unix bsd 4.3 as i saw it, it works as such. you have your passwd file still kept in /etc/passwd, but all accounts are * out. eg root:*:..etc they all appear that way. now.. there is a file called master.passwd in /etc which is readable/writeable by root only. when a user attempts to change a field in his passwd entry, it creates a temporary file in /tmp <called #.passwd, where # is a number>, does the changes there, and then copies back to master.passwd this is how i believe it to work anyway. ??????? arg of course i will look into it further.. but i got a shock when i saw this, coz i was unaware thate berkeley were even considering using shadowing as security. for those of you thsat dont know, password shadowing involves hiding all the encrypted passwds usually found in /etc/passwd i guess they have finally realized what a mistake it was to make /etc/passwd world readable ;-) 58/69: I'll SAY it was a mistake! Name: Grey Owl #10 Date: Sun Feb 04 21:17:50 1990 That had to be the biggest mistake since pad to pad! I know of several password hackers that FTP a remote /etc/passwd and try out names for passwords and reversed names and last names and things like that. It's just too big of a security hole unless the passwords are created by a good sysadm. grey owl 59/69: Unix [ANY] Name: Captain Crook #36 Date: Sun Feb 04 23:03:20 1990 Does anyone have either AT&T System V 4.x? or ANY SunOS? 60/69: both ways Name: Corrupt #114 Date: Mon Feb 05 05:08:25 1990 nice trojans ------------ good security this works both ways....look-out for unixes(and VMS sites) that keep another copy of /etc/passwd (or sysuaf.dat) and everynite rewrite it over the one used for login(some any mods are discovered)..u can alternatly install some security inside likethis for yourself...(hide it in CROn) (or wherever u want on vms:-)) undersytand? I know I7m not clear:-(( but thats works for you sometimes and it'S sinmple if you know script:-) anyone here into Rapid Fire hacking? 61/69: well.. Name: Phelix The Hack #89 Date: Mon Feb 05 11:40:45 1990 AT&T keep their shadow in /etc/shadow..which is readable nly by root...and they have allowed passable env var to such key programs such as login; passwd..etc...that allow the sysadm toREQUIRE that the passwds meet a certain format..such as 5characters+1digit+Special Cahr..etc.. i really cannot type today. pth 62/69: its a real bitch.. Name: Phoenix #17 Date: Mon Feb 05 12:15:49 1990 but thank god for sendmail and fingerd, which let you read anything on the damn thing anyway.. ;-).. still.. it would be nice to have source to the damn thing.. and know what structure it uses to insert/extract the passwords in /etc/master.passwd or /etc/shadow. It isnt straight ascii with your encrypted passwords just sitting there, thats for sure! Rapid fire hacking ? <ever heard of defcon ? > ok.. seeing as i cant seem to get hold ofsun source code.. the problem i have is as follows.. login.c on BSD 4.3 compiles using quota.h this contains general quota info/requirment definitions for system. it doesnt seem to exist under sunOS. I dont think that sunOS has an equivelant... and i believe that login on sun works rather differently from login on BSD... so if anyone can help me out.. please do.. when i shoved quota.h on a sun, and then compiled it.. it compiled ok... but the thing crashed like youve never seen.. i spose whats needed is sun source <sigh..> phoenix 63/69: hah Name: The Parmaster #21 Date: Mon Feb 05 20:23:54 1990 Yep DEFCON i'm sure could be the "rapid fire hacking of the '90s" Also there is a good example of pw shadowing on JOLNET in chicago.... it's public access... Later, Par Jason 64/69: /etc/shadow Name: Dark Sun #11 Date: Tue Feb 06 00:20:28 1990 i got the format lying in one of my old gfiles (if I even still have ANY of my gfiles).. I'll see if i can dig it up DS 65/69: speaking of Jolnet... Name: Guc #97 Date: Tue Feb 06 04:24:07 1990 I have not been able to get a connect for days... it just rings and rings... .s 66/69: well.. Name: Phoenix #17 Date: Tue Feb 06 13:28:37 1990 i am sure there is a simple c structure for it.. hell... there is a c structure for EVERYthing <almost> 67/69: hun:digress. Name: Corrupt #114 Date: Wed Feb 07 05:45:49 1990 Someone got busted forhacking JOLNET:-(( 68/69: Shit Name: Cassius Cray #135 Date: Wed Feb 07 07:07:22 1990 Know who? I thought Jolnet was a hacker board for UNIX freaks... 69/69: hmmm Name: Guc #97 Date: Wed Feb 07 08:48:04 1990 i never saw anything hack related there, but then again I basicly just used it for mail. .s < Unix Q-Scan Done > ______________________________________________________________________________ *** {DEC VAX/VMS O.S. Sub-Board} *** < Q-scan VAX/VMS 11 - 18 msgs > 1/18: This Sub > Permanent Message Name: The Mentor #1 Date: Sun Jan 07 05:19:47 1990 This sub is for discussion of Digital Equipment's VAX operating system VMS (one of my personal favorites). Mentor 2/18: wait a second.. does this mean.... Name: Ravage #19 Date: Thu Jan 11 18:35:41 1990 that i cant ask for help w/ rt-11? ravage black leather monster 3/18: DEC. Name: Corrupt #114 Date: Wed Jan 31 05:18:22 1990 question:..anyone know of a way to monitor port activity on adecserver? such as seeing thier connection to a host(andpossibly watch them login?) note:who has seen a xyplex? only seen 2 (one by US west) the are exaclty like decservers..no,,,better than decservers..and you can mod them easily...I find that SYSTEM,BRIDGE,ACCESS ar systempasswords forpriveldges..no SYSTEMis factory default..theothers are defaults for the competition but findthier way as the pass for DEcservers as well Corrupted? 4/18: hmm Name: Phoenix #17 Date: Wed Jan 31 09:19:45 1990 i believe electron tried to monitor other terminals on a vax, and failed.. but ask/mail him.. he knows more about it than i do. phoenix 5/18: Xyplex Name: Grey Owl #10 Date: Wed Jan 31 14:42:10 1990 I've been one on and it does look just like a DECserver. I wouldn't have known unless someone told me. They are better once you get a feel for the different features. grey owl .s !#&$*# 6/18: monitor Name: The Mentor #1 Date: Wed Jan 31 16:31:02 1990 If you are on a VAX with decent privs, you can run a utility called "MONITOR" that allows you to see everything going across an Ethernet or X.25(9) link. Very useful if you're on a busy system. Just turn the buffer on and sit back... Type "HELP MONITOR" for details - even if you don't have the privs to run it, it'll give you all the info you need about it. Mentor 7/18: monitor Name: Dark Sun #11 Date: Thu Feb 01 14:26:46 1990 I've got a Tower UNIX with a Beta(?) Test version of some PAD utilities... One of the programs is monitor... Any possible relation? DS 8/18: MONITOR Name: Psychedelic Ranger #80 Date: Fri Feb 02 04:23:03 1990 Are you referring to the infamous promiscious mode instead? Where you set the Ethernet controller to record all the datagrams. I have a DEQNA ETHERNET users' guide in front of me, and this includes information on how to set promisious mode on. I imagine there are programs out there that do this...does anyone have one already written? PR 9/18: ? Name: The Mentor #1 Date: Fri Feb 02 09:24:07 1990 Nope, I was referring to "MONITOR"... but it wouldn't suprise me if monitor invokes a call to set promiscuious mode to ON... Mentor 10/18: VMS Manuals... Name: Pain Hertz #84 Date: Sat Feb 03 03:49:32 1990 I have access to a very recent system admins VMS manual. I also have access to his (lack of) brain(s). I sit down at his terminal, I don't know what his loginid is... I try his name, then I give the guys name as the psw, Im in... geez... -PHz 11/18: Which monitor? Name: Psychedelic Ranger #80 Date: Mon Feb 05 03:56:00 1990 Which command is it? That does this....I cannot find it! Also, do NOT try (from SYSGEN) SYSGEN> SHOW UNIBUS or the system will crash! SHOW UNIBUS is more than a simple SHOW command...but don';t try it...just though I'd let anyone know who may be playing with any utils on a VMS. ANyone have any experience with the System Dump Analyzer (SDA)? I have found a lot of nice shit through playing with SDA analyzing the running system. PR 12/18: yeah! Name: Corrupt #114 Date: Mon Feb 05 05:11:00 1990 SDA? U Can Watch the type-Ahead Buffers..and Other Neato Stuff.. Can't you Define your sys$output as sonme_1 else's terminal ? so you can see what they Do? also..anyone have the VMS patch for 5.X systems? now that wuld shock me for 1990..make my whole year :-)9 13/18: SDA Name: Grey Owl #10 Date: Mon Feb 05 16:54:05 1990 How would I use this to my advantage? I want DETAILS. grey owl 14/18: SYS$OUTPUT Name: Psychedelic Ranger #80 Date: Tue Feb 06 03:48:35 1990 I have done this, assinging SYS$OUTPUT to say, _RTA1 or LTA6:, and I am sometimes able to send things to their screen, like if I did a SHOW USERS, it would appear on their terminal screen. I did this in a room full of people with DEC terminals, it was amusing. Of course I didn't interfere with anything important, but it was interesting to watch peoples reactions! They would look around and wonder who the heck did that? one person somehow found out that I had my SYS$OUTPUT defined as his terminal and sent me a msg back. BUt about SDA, there is so much there... whoever said you can read the type - ahead buffers, can you give me some more details on this? I have only been working with SDA for about 2 weeks or so. Psy Ranger 15/18: Psy Name: The Mentor #1 Date: Tue Feb 06 22:58:26 1990 Every VAX I've been on that has an ethernet or X.25 connection has had the MONITOR command. me 16/18: MONITOR Name: Psychedelic Ranger #80 Date: Wed Feb 07 04:21:00 1990 Yes, I know the MONITOR command is ther, MONITOR USERS, MONITOR PROCESS, MONITOR RMS, MONITOR DECNET, MONITOR DISK, etc. etc. but I have not seen one that read the data....or were you referring to its analysis methods and not the exact results? PR 17/18: well.. Name: Corrupt #114 Date: Wed Feb 07 05:51:16 1990 pls..some1 get back 2 me on these 3 things 1)Monitoring ports On DECSERVERS 2)I have Attach to send stuff to other terminals..:-) fun ! but I Wanna Define there Sys$output to my terminal to see what they type-real time 3)I knowSome1 Knows Wether They have A VMS 5.X patch but there not saying anything :-)) !!..not tomention the new zealand BBS is down cause I Messed up the Patch Doing it by hand..:-(( PLUS[you know how I am about VMS secrets..some of U know anyway :-) I almost Never tell Any1 Anything! I'll do the sucker move and mail U :-Devery1 will know soon anyway! 18/18: monitor Name: The Mentor #1 Date: Wed Feb 07 18:49:04 1990 You can set flags when you have it monitor decnet that will do an ascii dump (in 128 byte packets) of everything going across the net. I don't have access to a vax anymore, and seem to have lost all my old notes, so I don't have the exact command. Mentor < VAX/VMS Q-Scan Done > ______________________________________________________________________________ *** {Prime Computers Sub-Board} *** < Q-scan Primes 12 - 28 msgs > 1/28: This Sub > Permanent Message Name: The Mentor #1 Date: Sun Jan 07 05:20:22 1990 This sub is for discussion of Prime Computers and the Primos operating system. Mentor 2/28: Minor question... Name: Phoenix #17 Date: Thu Jan 11 03:29:53 1990 just referring to the &on quit$ function.. umm..i believe it drops user into a second cpl function when any form of break is detected... however - i cant seem to get it working... one i am using... but allows you to send a break before command is done is &on break <file> but anyway.. Phoenix <The Flatline> Jacking out 3/28: ! Name: Erik Bloodaxe #2 Date: Fri Jan 12 03:00:14 1990 This is kinda interesting... I've been finding local primes lately.... Very odd...I've never really run into them off of networks, yet in the last five days, I've run into three. Prime isn't my thing, so I want to know where things are kept...also how to designate between types of files (ie: ascii & binary) to when I slist them I don't get a bunch of shit. Also, is there anything I should be keeping an eye out for? ->ME 4/28: Erik---- Name: Grey Owl #10 Date: Fri Jan 12 23:02:11 1990 Which prefix are all these Primes in? Compuadd has a system in 327 or 328. I wanna find this one...heh. Bye bye Compuadd! grey owl 5/28: Do I have a Prime? Why, YES! Name: The Operator #42 Date: Thu Jan 18 22:43:24 1990 Recently, I paid a friend of mine to haul a Prime Computer to my house. It was real neat, but by request of the Warden (Madre') I had to get rid of it...It was busted anyway, so I found out, but I kept the manual...If I can get ahold of one of them page-scanners, I'll put it on disk and UL it...Lots of neat-o stuff... Oh by the way, the Prime was from my college..They tossed it out cause they just got a Vax 6830 and a Vax 8600...It's in a picture window, and frankly, my nipples get hard when I walk through the computer science wing.. Hitler sends greetings, Parhamster.. The Operator .s 6/28: Well... i thought Name: Phoenix #17 Date: Fri Jan 19 06:39:18 1990 that we werent going to get racist on boards... i would rather you didnt do it again.. 7/28: Uh, Name: Erik Bloodaxe #2 Date: Fri Jan 19 12:19:34 1990 I think he meant his mother, not Adolph...she's kind of a nazi, if I remember Operator's stories correctly. ->ME 8/28: Oh Erik...Nah. Name: The Operator #42 Date: Fri Jan 19 19:50:07 1990 Ahh Erik...How quickly you forget! Hitler is my six foot tarantula! 9/28: binary files Name: Gordon Meyer #65 Date: Sat Jan 20 00:57:13 1990 You won't want to slist any thing that ends in .RUN .LINK .SAVE .ABBREV or .VAR that's for sure. Also, don't try anything that indicates is a segment directory or you'll get a bunch of shit too. One thing about Primes is that if you do slist a bunch of binary stuff by accident you may end up hanging that comm port until they do a reboot... it depends on how they are setup but it is possible. Same thing can happen if you enter an application that asks for a terminal type and you enter a wrong one. Hey...instead of slisting files you want to examine just ED the file and P2 lines of it....at least that way you won't get a whole screen full of garbage if you get a binary file. Oh..... .DBMS files are binary too.... 10/28: &on quit$ Name: Gordon Meyer #65 Date: Sat Jan 20 00:59:09 1990 RE: Minor question... Phoenix - Not sure but I think you need a &SEVERITY statement in there for that to work. I'll check around and let you know if you haven't already figured it out by now.... 11/28: not to worry.. Name: Phoenix #17 Date: Sat Jan 20 07:57:06 1990 i implemented a different trap routine... the &severity is usually required for &on &error.. not quit$ thanks though.. Phoenix 12/28: say... Name: Phelix The Hack #89 Date: Wed Jan 24 12:47:25 1990 Why doesn't omeone go completely out of their way and teach me everything about primes?..I mean I suppose I really should actually learn something about them someday as many networks see it fit as their controller site...the extent of my knowledge is little crib notes I have scribbled all over my "primos" area of notes... Any one have any good recommended reading on the subject (be they files or otherwise)..any tutors (hint Pheonix) pth 13/28: primes... Name: Ravage #19 Date: Wed Jan 24 14:41:52 1990 go to the local electronic wholesalers and suppliers and find out who supplies primes ot oem and var's. then tell them you are an independant consultant and would like info on the systems. they will give you a lot of the manuals. i have done this and walked out the door w/ my little ranger pick up full. i like the fact that the memory is cooled w/ liquid nitrogen. 14/28: ok.. you talked me into it.. Name: Phoenix #17 Date: Wed Jan 24 21:37:20 1990 i havent seen much documentaion around or primes <in terms o iles, plenty o manuals though..!> umm.. I suppose its about time someone typed something up.. give me a couple of days.. in the mean time post up here what speciics about prime you want to know.. they are awully big..! Phoenix 15/28: well Name: Silencer #31 Date: Thu Jan 25 23:58:38 1990 i'd kinda like some other defaults..or a better way to 'explore' the system.. right now i have tried cpl, netlink, tele, test, prime, primos, mail, guest, demo, and system.... with user id's and pass identicle for over 30 primes i scanned. none would let me in....am I doing something wrong..or just unlucky. 16/28: well Name: Phoenix #17 Date: Fri Jan 26 01:49:03 1990 primes never were the easiest systems to get into.. alot less <common> bugs than your average unix.. and ewer <common> regular accounts, like your average vax. Try combinations o Prime,primenet,primos eg: Prime, passwd primenet etc... Phoenix 17/28: yeah Name: Silencer #31 Date: Mon Jan 29 20:34:10 1990 yeah m,an..i have tons of defaults...try all sorts of combos of them...but i guess i just gotta keep trying eh... 18/28: hey! Name: Corrupt #114 Date: Wed Jan 31 05:56:57 1990 Here's wot I use[8lgm]? network Ninjitsu Hiiiya! admin cmdnc0 demo diag fam games guest help info jcl lib library netman netpriv news nonetpriv prime pr1me primos prime_cl regist rje student sysadm system telenet (or wot ever net it is owned by) test tools it'sby no means complete..and U stillprobablywon't get in most on telnete(usa) anyway./..but it like anything else..no garuntees:-)) any1 got some more common accounts to add? Net Ninjitsu![8lgm]! 19/28: hmm Name: Silencer #31 Date: Wed Jan 31 21:41:33 1990 i dontunderstand how ANY nua is owned by any network.. you know? like i can access most or all of the primes from telenet or pac*it or probably even tymnet if i had a good account...how can the prime be owned by any ONE network? Well....thanx for the defaults.... thats cool.. - Silencer 20/28: phrased: Name: Corrupt #114 Date: Thu Feb 01 07:04:20 1990 the context of 'owned' means not literal ownership ofthe DTE and host computer (although if U DID find aprime on another net it'S probably OWNED by the network itself..) by rather one part of the collective network weave..telenet would claim a prime in 03110...understand? soif you found aprime in France(02080) you couldpossibly try TRANSPAC as a login/password IDpair.... Net ninja[8lgm]Corrupted..HiiiiyA! 21/28: NUA ownership Name: Daneel Olivaw #9 Date: Fri Feb 02 22:50:28 1990 according to TP4 support at Telenet, the person with the NUA actually OWNS it... Telenet cannot legally give it out without written consent of the company. That does not mean they don't (hehehe), but they aren't supposed to. Daneel Olivaw 22/28: ok Name: Silencer #31 Date: Sat Feb 03 00:43:37 1990 ok.....thanx corrupt.....thats helpful..i never quite understood that .. So nearly ever NUA within the USA is owned by telenet...rich mutha fuckers...heheh.. 23/28: defaults Name: Gordon Meyer #65 Date: Sat Feb 03 09:55:17 1990 anyknow what the default account for Prime Field Engineer's is? That might be a way in. 24/28: NUAs... Name: Grey Owl #10 Date: Sat Feb 03 18:42:06 1990 They are owned by the people that they are conencted to. Not nearly every NUA in the States are owned by Telenet. There are about 15 different networks that are NOT Telenet. They have NUA's too. grey owl 25/28: ahh Name: Corrupt #114 Date: Sat Feb 03 20:49:11 1990 but obviosuly were referring to an NUA within a Specified DNIC (which determines the net and subsequently the country it's located in) So your Saying in Effect the address (like a phone #..is owned by the company?..but if they let go ofthe account.(network Connection..()they lose the rightto that address.So it's more like....umm a co-oop!..plan! ss@ @@ ? .s 26/28: networks in USA Name: The Parmaster #21 Date: Mon Feb 05 20:28:36 1990 Actually try more like 50 nets in USA. when most of the countgries in the world only have 1... it makes me feel at home! :-) Later Par Jason 27/28: hehe Name: Phoenix #17 Date: Tue Feb 06 13:29:38 1990 well it definetely makes me feel home... <we aussies seem to run rampant on your nets> 28/28: Nets Name: Daneel Olivaw #9 Date: Tue Feb 06 17:40:41 1990 Look out... coming soon... everythign. Hehe.. actually the USA is pretty nice for PSDN stuff... lots to play with. Daneel Olivaw < Primes Q-Scan Done > ______________________________________________________________________________ *** {HP3000 Computers Sub-Board} *** < Q-scan HP-3000s 13 - 41 msgs > 1/41: This Sub > Permanent Message Name: The Mentor #1 Date: Sun Jan 07 05:21:00 1990 This sub is for the discussion of Hewlett-Packard's HP-X000 series (and whatever the name of that !@@#$%! operating system is...) Mentor 2/41: things... Name: Erik Bloodaxe #2 Date: Wed Jan 10 04:10:10 1990 Ya know, I have so many of the fuckers, I could scream. I want to use one of them for a pad. I know it's VERY possible, but I can't figure out how. I've dug around everywhere looking for something even looking like it's the damn tp software or something relating to the network, but nada. I was convinced that you could somehow use DSLINE with some kind of modifier to call back out, but that didn't seem to work. DRAG! Does anyone use the fucking things? Has everyone wrote them off? Hell, just think of the possibilities of never needing an nui again. ->ME 3/41: from what I have heard... Name: Grey Owl #10 Date: Wed Jan 10 19:10:51 1990 HPs have been shunned to no end. I understand they are EXTREMELY easy to break into (if you call that breaking in.) Erik--did you try calling HP dealers and requesting info. on x25 software for your companys system? A little social engineering never hurt anyone! grey owl 4/41: extermely easy = understatement Name: Phoenix #17 Date: Thu Jan 11 03:31:31 1990 very veryvery easy to break into.. and even that is putting it mildly... All i have to say is that one o thesedays ill get round to learning the dmn system... but till then <yawn>... Phoenix <The Flatline> Jacking out... 5/41: Funny... Name: Erik Bloodaxe #2 Date: Thu Jan 11 13:22:47 1990 Everyone has the same attitude...I can't imagine Phoenix adopting such awful American habits like putting something off until "later" hehe... As a matter of fact, I was just going through my Datapac scans and get into a dumb 3000... I don't think mrg.hpword is EVER passworded...some of the time the damn thing even has system manager privs... (so a listuser @.@ spews everything out quite nicely) I think what we need is EastWind on here to enlighten us on the finer points of HP-3000. Anyone know him personally? ->ME 6/41: x25 via HPx000?\ Name: Grey Owl #10 Date: Thu Jan 11 18:09:31 1990 Did anyone ever find out the setup for this? (translation: am I going to have to find someone who can munge some X.25 code?) grey owl 7/41: Yeah Yeah Yeah Name: The Parmaster #21 Date: Sat Jan 13 08:49:34 1990 I'll try to get him to ring here. anyway...i've also got a friend in South Africa who works for HP down there He's offered me the source for MPE V and MPE XL trouble is it's all on magtape! and if anyone's got a fucking HP they can lend me maybe i could take him up on the offer anyway i'll try to have him ring here also.. later, Par Jason 8/41: he's Name: The Mentor #1 Date: Sat Jan 13 11:42:10 1990 Your friend from SA is on here... Mentor 9/41: defaults Name: Dark Sun #11 Date: Sat Jan 13 16:54:28 1990 what are some common/default HP-300 accounts? HP-3000 even. BS 10/41: big deal...I know Name: Grey Owl #10 Date: Sat Jan 13 17:34:04 1990 I scanned an HP-3000 in my exchange and got in on the first try. This was my first time to connect to an HP. I never knew how USELESS they were. Can someone give my some uses for them? grey owl 11/41: MPE - The best OPSYS ever Name: Wiz #25 Date: Sat Jan 13 18:52:51 1990 MPE (Multi-Programming Executive) has to be the best operating system I have ever seen. If you have a REALLY smart System Manager,then MPE is one of the safest operating systems around. However, most SM's are brain-dead, and leave several loop-holes open. The TELESUP is a prime example. Try logging in to MGR/MGR.TELESUP/HPONLY,PRV/PRV - this usualy has the same priveleges as MANAGER.SYS, so you can do anything. If you ever want to get nasty with a system, and slow it down HORRIBLY, run a program called COLOSSUS.PUB/.TELESUP, or COLOSSUS.PRV.TELESUP. This is an awesome program, (the COLOSSUS part stands for COmprehensive On-Line Oriented System Stressing Utility Sets) - this program will stress the living daylights out of an HP3000, and slow the whole thing down immensely. NOTE: When you run this program, is will give you a "lock", and yopu must enter the key. The lock is in the format of a 6-digit number, and the key is calculated as follows: Take the second digit of the lock and add 4. This is the first digit of the key. Then put in any other digit. Take the third digit of the key and add 5. (Sorry, the FOURTH digiti of the lock). This is the third digit of the key. Again, add any other digit to make the 4'th digit of the key. Then take the LAST digit of the lock and add 6. This is the 5'th digit of the key. Add one last digit, and you are in! Assuming that the 6 digitis of the lock are ABCDEF, and that X is any digit from 0 to 9, then formula for the key is: (B+6)X(D+6)X(F+6)X. So if the lock is 108064, the key will be 4X5X0X - where X is any digit. Simple, but effective. If anyone is interested, I have the complete source code for MPE V G.02.04 (including all the sub-systems) on a HP7980A-readable 6250BPI mag tape (6 tapes in total), and the complete source code for MPE/XL 1.1 on 2 CD-ROMS. I no longer have access to an MPE system, but I can always try and copy the tapes at our local HP office if anyone wants them. The CD-ROMS I will NOT part with :-) If anyone has NUA's for MPE systems, please post. I would be most grateful. Bye for now, MPE Wiz PS: You can tell I used to work for HP, can't you :-) 12/41: MPE-XL Name: Erik Bloodaxe #2 Date: Sat Jan 13 20:28:20 1990 I know I have at least three of those in my notes...I will look for them, but for now, could you (Wiz) please tell me if it is possible to use a HP-3000 for connections back into the network? This would be INFINITELY wonderful. ->ME 13/41: And then.. Name: Phoenix #17 Date: Sat Jan 13 21:07:50 1990 If the above is possible, and you know enough about them... how about running a multi line scanner and some other shit off them ? Phoenix <The Flatline> Jacking out.. 14/41: good idea! Name: Grey Owl #10 Date: Sat Jan 13 23:22:51 1990 With multiple jobs and all available machines you could scan an entirenetwork in a couple days! grey owl 15/41: Don't know Name: Phase Jitter #3 Date: Sun Jan 14 01:11:36 1990 I'm not sure that this is the proper place to post this, but I noticed that someone was asking about HP-3000 defaults.. This subject allways seems to come up.. Mentor, could you possibly set up some type of databases for defaults (where you can enter and read them) I think that might be a good idea... Phase Legion o' Doom! 16/41: hmmm Name: The Mentor #1 Date: Sun Jan 14 01:22:17 1990 I'll add it to the list, right after fixing the Transfer section, G-files, NUA database, and misc. systems stuff. <sigh> Mentor 17/41: Help! Name: Captain Crook #36 Date: Sun Jan 14 12:18:02 1990 OKay, I have 3 HP-3OOO's that all belong to military contractors. I can get into all of them (considering I used to work for one of the companies before) but when I get in some dipshit put an extra password PROGRAM in. So obviously I break out of it BUT when I try to get into the editor it says I can not do that in break. So here is my question, how can I snag ASCII files without going into the editor. cc 18/41: Hey Par! Name: Wiz #25 Date: Mon Jan 15 07:22:58 1990 RE: Yeah Yeah Yeah Hi Par. Your friend form South Africa was already here :-) I am tryinmg to organize an HP3000/MicroGX so that I can port all the relevant code accross to my PC. AAll the interesting utilities like DISKEDX, and all the accounting routines. If you have PM on any MPE machine, I can get the source for a program called GOD, which changes the users capabilities in the JMAT and user stack (which is where all MPE commands look for capabilities). I will also soon make an ACAD drawing of the MPE SYstem Tables maps, which is invaluable information for any MPE hacker. It explains the JMAT, User stack, all account,group and user indexes etc. Alternatively, I can try to scan in the MPE System Tables Manual, and post it somehwre releavnt, or I can just send you a copy? Let me know what you want. Regards, and phone soon, MPE Wiz. 19/41: Default MPE accounts Name: Wiz #25 Date: Mon Jan 15 07:28:03 1990 RE: defaults Basically, there is only ONE default MPE account - the SYS account, and there is always at least 2 users in this account - OPERATOR.SYS and MAGAER.SYS. However, for every sub-system that you install, they all reate default accounts. If HP-DESKMANAGER is installed, there is a new group in SYS, called HPMAIL, and a new account called HPOFFICE. MGR.HPOFFICE always has PM capability. If the customer subscribes to remote support, then TELESUP is created. This is a VERY useful account, as it has all the capabilities possible on MPE. Try to log on as MGR/MGR.TELESUP.HPONLY,PRV/PRV Other sub-systems lke HP-WORD, DS/3000 and NS/3000 etc, all create their own accounts. Talking about DS/3000, if the site has X.25, and you want to use it to call out, try typeing in DSLINE ENET at the : prompt. It should give you an @ prompt, and from there you just type in C nua to connect to an NUA. Hope this helps, MPE Wiz 20/41: DSLINE Name: Wiz #25 Date: Mon Jan 15 07:29:56 1990 RE: MPE-XL Type in :DSLINE ENET - this should get you to the system PAD, and give you an @ prompt, from which you type in C nua MPE Wiz. 21/41: ASCII files Name: Wiz #25 Date: Mon Jan 15 07:32:34 1990 RE: Help! You can use the FCOPY command and FCOPY the file to your LDEV. However, once you have pressed BREAK, you enter the MPE break mode. Just enter :ABORT and it should put you back into normal command mode. MPE Wiz 22/41: Damnit... Name: Erik Bloodaxe #2 Date: Mon Jan 15 17:34:05 1990 I knew DSLINE was the right fucking command... Why is it ENET? Is that short for something? Or just a truncated TELENET? Damn DAMN DAMN! All this time... OK...another HP-3000 problem... When you are checking files, and perhaps want to look at one, is there an easy way to discern the "type" of file that it is? IE: ascii, binary, etc... Any other HP help much appreciated... ->ME 23/41: Ok Wiz..will do. Name: The Parmaster #21 Date: Tue Jan 16 00:31:48 1990 Wiz whatever u want i can find.. I'll get on it and have Eastwind give me a sys with taht s/w u are talking about by the way everone..Dontcha just love this guy? Later, Par Jason 24/41: hmm Name: Phoenix #17 Date: Tue Jan 16 07:40:07 1990 he certainly has made hp areas clearer.. im damned surprised that noone bothered to igure hp's out though... the help ile is pretty good... i keep telling mysel... one o these days <out o character ?> damn - got to ix that F key.. Phoenix 25/41: File Types Name: Wiz #25 Date: Tue Jan 16 09:56:05 1990 RE: Damnit... "When you are checking files, and perhaps want to look at one, is there an easy way to discern the "type" of file that it is? IE: ascii, binary, etc..." Yes - the command to do so is LISTF,2 - this will display the files in a full format, and after the file name, there will be a file type. All executables are of type PROG, text files are of type TEXT etc. I can post a full list of file types and what they mean if this would help you any. As a matter of interest - ENET stands for Extended-NETwork. It is the X25 extention to the DS/3000 or NS/3000 packages. Also, a neat little trick thast you might try, to run multiple sessions without the risk of having an LDEV hang on you, is to DSLINE into your own system. Eg, if your system is called "GOLD" on the network, then just DSLINE GOLD - then you can log on again, and if anything goes wrong, just press BREAK, followed by a :, which will drop you back one DSLINE level. Regards, MPE Wiz. 26/41: Hmmm Name: The Parmaster #21 Date: Wed Jan 17 02:59:44 1990 Hmmm was wondering ... on an Hp i'm sure there is some way to spawn a child process etc. Mpe: how can i do it? and how can i do it using DSLINE? (so that i can multi-pad) Or is that not possibl;e? i know it's possibl;e on almsot every other sys... Thanks, Par Jason 27/41: Child processes Name: Wiz #25 Date: Wed Jan 17 15:10:06 1990 RE: Hmmm Jason, if you want to stream a child process, you have to write a little job to do what you want to run in background, and then STREAM the job. I'll type up a text file on MPE jobs, and post it in a relevant G-FILES section (is there one for MPE ???). As regards DSLINE, just type in DSLINE and the name of the system you want to connect to. I'm not sure if I understand what multi-padding is, so explain it to me and I will tell you if it is possible. MPE Wiz. 28/41: multi-padding Name: Grey Owl #10 Date: Wed Jan 17 17:00:57 1990 It should be running more that one DSLINE at a time. Am I right or am I right? grey owl 29/41: Yep Name: The Parmaster #21 Date: Thu Jan 18 03:18:57 1990 Yep GO when you're right.. you're right. tahts exactly what i need to be able to do.. and then to be able to pause each process. and switch to one of tjthe others. (Hopefulyy relatively fast) If u could tell me a little bit about this MPE i'd be n?FD???u???rFD?8full ?? thanks, Par Jason. 30/41: Shit - you got me there .... Name: Wiz #25 Date: Thu Jan 18 14:37:36 1990 RE: Yep Par. Shit man, you got the stangest requests :-) I dont think it is possible to run multiple sessions (interactive) from one LDEV (port). What you CAN do is repeatedly DSLINE into your own machine, but in order to get back to each parent session, you need to BREAK out of the current one, so the proccess is suspended. The cleanest solution is to write a job file to do what you want to do, and then STREAM it. MPE Wiz 31/41: does this mean.. Name: Grey Owl #10 Date: Thu Jan 18 14:49:01 1990 Does that mean that HP's have no multi-tasking capabilities?! (Obviously I don't play in HP's) And all this time I thought they were REAL computers! grey owl 32/41: Hehe Name: Erik Bloodaxe #2 Date: Fri Jan 19 01:45:27 1990 I was working on a file a while back on Hp's but was waiting until I could figure out a few things, which Wiz cleared up, but now I'll let him write one, as he's the expert (OBVIOUSLY!) and he'll do a much better job. But anyway, it started out: If Crays are the Lamborghinis of the Computer world, then HP-3000's are the volkswagen Bugs...there's a million of them out there, easy as hell to break into, and boring as hell once you're in! hehe ->ME 33/41: Yes of COURSE ... Name: Wiz #25 Date: Fri Jan 19 13:09:05 1990 RE: does this mean.. Owl, of COURSE MPE can multi-task - but you have obviously been spoled by Unix - you cant append an & to the end of an MPE command to make it run in background for example. But you can write background jobs, it is just a little more work than it is on any other operating system. MPE WIz 34/41: Huh Name: Wiz #25 Date: Fri Jan 19 13:12:33 1990 RE: Hehe Humph. May your face become a battle-ground for evil, smelly warts, and may you forever be condemned to lick a siphalitic whores arse for so insulting MPE. MPE is great, but there are just better opsys's around. If you want a REALLY shit "operating system" (I shuddder to use the word) - try DOS, or AppleDOS. Now THOSE are the VW bugs of the opsys world! Anyway, DOS isn't an operating system - it is a COM and EXE file loader - there s a BIG difference :-) MPE Wiz (offended!) 35/41: OS's Name: Grey Owl #10 Date: Fri Jan 19 19:20:37 1990 I don't use MPE that much. Don't rag on MS-Dos tho! It's pretty good for a PC. It wouldn't cut the butter on a multi-user system. I am spoiled by Unix Wiz. grey owl 36/41: Woah! Name: Erik Bloodaxe #2 Date: Mon Jan 22 03:36:40 1990 I wasn't ragging on MPE! Not at all, i was just "JOking" about the large numbers of hp-3000 systems around the world and the unbelievable ease in gaining access on one. Geez, read...MPE seems ok, just kinda hard to get used to. I mean, I'm in HUNDREDS of hp's, but until last year I didn't know what to do with them...so they just sat there. UNIX is just as lame security-wise, but On a percentage basis, I have gotten into 85-90% of the HP's I have found, while I've only gotten into abot 50% of the UNIXes I've found. (LOok at me grovel before one of the two HP experts I've ever seen...pathetic, isn't it?) Wiz, no offense intended towards your adopted os... ->ME 37/41: well Name: Phoenix #17 Date: Mon Jan 22 09:27:31 1990 i tried that networking stu and didnt get very ar <sigh. oh well.. 38/41: Well Name: Phelix The Hack #89 Date: Wed Jan 24 12:57:14 1990 ..ahving just talked to Mr.E Wind...he assured me that his intrest is indeed sparked and that he will call here ...as soon as he gets a phone. WIZ: Eastwind informs me that he has a way of "entering" ANY hp-3000 regardless of the type or securitly level of the accts...as I do not consider HP's a forte (hah!); and in that I do not know wheter Easty considers it public knowledge...I will let him explain it when he arrives on this system...(but it has to do with submitting a "job" before login...sound feasable?..idunno..like i said hp's are not my cup-0-soup, so if that did not make sense talk to E.) pth / s/s fuck! 39/41: Thats ok.... Name: Wiz #25 Date: Tue Jan 30 11:53:26 1990 RE: Woah! Hello "Bloody Axe" Thats OK - you cant offend me THAT easily. I was only pulling your proverbial leg. If you have so many HP's, would you care to sahre via E-MAIL please, or send me a list via UUCP to wiz@tabbs.UUCP. Thanks a million. MPE Wiz 40/41: :JOB Name: Wiz #25 Date: Tue Jan 30 11:56:56 1990 RE: Well Ok, that sounds ALMOST feasible. When you log onto MPE, there are 3 ways of doing it: :HELLO, :JOB or :DATA. :HELLO is interactive, :JOB is a batched job file, and :DATA is something else which is so uncommon that I dont even know what it ios :-) I have looked at the logon source, and there doesnt appear to be any bug in the NURSERY code. It can all depend on the version of MPE you are using too. I am most familiar with G.03.02 (V-Delta II). MPE Wiz 41/41: Reading Security/3000 Name: Sventek #137 Date: Wed Feb 07 02:36:50 1990 Just reading threw the security/3000 system on the HP 3000s, it looks like if used to its full extent it could be something. The hp environment is hard to understand and is full of richs. hehehe sl8r Sventek < HP-3000s Q-Scan Done > ______________________________________________________________________________ *** {Other Computer Operating Systems Sub-Board} *** < Q-scan Other Op. Systems 14 - 42 msgs > 1/42: This Sub > Permanent Message Name: The Mentor #1 Date: Sun Jan 07 05:21:46 1990 Here's where the discussion of op systems that don't have their own sub goes. TOPS, AOS/VS, etc. Mentor 2/42: Weird... Name: Erik Bloodaxe #2 Date: Fri Jan 12 02:48:11 1990 I hate things I know nothing about... 327-5023 Pollcat V.9 What the hell is this thing? I hate things like this...I can't even evoke much of a response out of it... 327-3346 Cooperative Computing... Another weird thing. It seems to always say invalid program group, unless you type S then hit return, and it says invalid syntax... I hate not being able to figure something out immediately. I usually just find things, and if they are uneasy to identify I hand them out for others to mess with...so expect quite a bit of crap like these on this sub in the near future... (Yes, I'm scanning 327...should be done tonight...Apologies to people in the Westlake area for waking you all up) ->ME 3/42: has Name: The Data Wizard #16 Date: Fri Jan 12 17:05:13 1990 anyone ever messed with a system called Fortune? You connect, hit <Esc> and the screen clears and it immediately identifies itself as Fortune System, blah, blah, blah, and asks for an account. I have found quite a few of these damn things and have no idea how to utilize them.. Any help appreciated.. Later, TDW 4/42: what does this mean? Name: Grey Owl #10 Date: Sun Jan 14 12:01:53 1990 I found this system that says: System/32, VOS Release 6.6x, Module %primefax#m1 Please login What is this? Also, I found a system (probably a front end) that sends ~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~ ?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~?~??~?~?~?~?~?~?~?~?~?~?~?~ for several screens and the hangs up. Does anyone recognize this? grey owl 5/42: PollCat Name: Captain Crook #36 Date: Sun Jan 14 12:19:07 1990 Yes, I have many Pollcats that I have found after scanning. If you find out anything on them let me know. 6/42: OSL Systems Name: Captain Crook #36 Date: Sun Jan 14 12:20:23 1990 Anyone know how to get into OSL [i.e. defaults, logins, and anyother shit]. This OSL belongs to Bell Labs and I would be interested in getting in. 7/42: OSL, Please... Name: Erik Bloodaxe #2 Date: Sun Jan 14 19:01:44 1990 Those are some kind of PBX computer I think...at least that's what we all decided a while back...hell, maybe we were wrong... type OSL, and it will ask you "Key?" which is a password of up to 8 alpha-numerics... ->ME 8/42: That looks... Name: Daneel Olivaw #9 Date: Sun Jan 14 19:29:25 1990 like a IBM System/32 (God.. I thought I trashed the last one.. oh well). Security should be weak.. real weak... Daneel 9/42: ???? and all that crap that Name: The Parmaster #21 Date: Tue Jan 16 00:33:21 1990 well as a response to ??????#$#@$ or whatevr the hell went shooting across your scren you can bet that is an x25 dialup etc Later, Par Jason 10/42: Sintran Name: Gary Seven #38 Date: Tue Jan 16 18:36:19 1990 Anybody encountered something like this called SINTRAN? I have found by exploring this system that i am sure it links to a COSMOS system somewhere. By typing a certain command it will try to connect to COSMOS then it says something to the tee of You cannot login from this source or you cannot connect remote or remote is already connected or something like this. You might think of this as a folly but it really says the letters COSMOS. This is from Telenet. later 11/42: COSMOS Name: The Parmaster #21 Date: Wed Jan 17 03:01:47 1990 Hmmm dunnoi Gary but i'm sure COSMOS can mean more than just the FD? bell system.. For instance COSMOS is a program that Citicorp runs on their primes for their global systems on GTN.. oh welFD?FD?FD? that probly isn;t mFD?uch helpo tho :-( Later, Jason (Par) 12/42: All those ~?~? 's Name: Wiz #25 Date: Wed Jan 17 15:12:38 1990 RE: what does this mean? Owl - I get the same shit with my MNP modem when the protocol gets confused. If I turn MNP4 off, then this no longer happens. It seems to be a common bug when you have an error correcting link. MPE Wiz. 13/42: sht Name: Grey Owl #10 Date: Wed Jan 17 17:02:25 1990 I just sold my MNP3 modem. It was a piece of shit but it had a redeeming quality (only one, mind you) that it could be configured (for a small fee of $60 dollars) for X.25, X.PC or MNP5. I wish I hadn't have sold it now that I'm into hacking more than I was... grey owl 14/42: I Name: Dtmf #27 Date: Thu Jan 18 14:09:45 1990 RE: what does this mean? I have run across quite a few systems like the one you described also...They were all in Gov't exchanges.. The ~? is something like ansi's feedback of a <ctrl-backspace> (try it sometimes at half duplex)...ANyway, at certain intervals during the screens are you recieving a 10-12 digit number? If anyone out there can describe the steps neccessary to login it would be greatly appreciated. DTMF 15/42: read back messages Name: Grey Owl #10 Date: Thu Jan 18 14:51:36 1990 DTMF..we decided that the ~?~?~?'s were either X.25 dialups or forced MNP. I think they are MNP. The pattern looks familiar to me since I used to have an MNP modem. What I did was send the break string in an MNP connection, terminate the MNP on my end and then watch the trash the the MNP modem sent across. Sounds dumb...I know. grey owl 16/42: ?~?~?~ Name: Silencer #31 Date: Fri Jan 19 18:32:53 1990 Hahaha...well...I am almost positive that you are at the wrong baud...from MY experiances if a system is 1200 max and you connect at 2400 but your modem fails to 'downshift' automatically then it will display ?~?~?~?~?~? forever until you manually switch the baud with your software or whatever... sounds weird but its true. Can anyone help me with this. I found a local system to me in the PRE-00xx area that is 110 baud max and gives the follwng repsonse at logon. MONITOR RUNNING STATE REQUEST and then sits there it responds with ILLEGAL REWQUEST to everything I type..I tried everything...numbers words....all sorts of shit but always the same..anyone got any suggestions? - Silencer 17/42: ~?~?~? Name: Dark Sun #11 Date: Fri Jan 19 20:00:59 1990 You also get this when a system is attempting to determine your baud rate (during the time your pressing <cr>) DS 18/42: 110 baud Name: Ravage #19 Date: Sat Jan 20 10:45:35 1990 might be a ttd for the deaf. 19/42: ... Name: Silencer #31 Date: Sun Jan 21 05:22:07 1990 to serve what purpose? like....will TTD's connect to modems? Beside the point..what would it be doing in the 00xx area of a prefix and what would it be used for? What kind of system could it be? 20/42: hmmm Name: The Parmaster #21 Date: Sun Jan 21 10:25:26 1990 Ok guys.. go into the telemail phones/phones acct and choose an x.25 dialup Call up the fcker and see what it gives u ok? don';t know if it's MNP because i'm not sure if the X.25 dialups could REQUIRE that every system have MNP ( and i don't think that MNP has anything to do with the X.25 protocol at all) oh well, But what do i know! Jason 21/42: x.25/mnp Name: Grey Owl #10 Date: Sun Jan 21 11:36:15 1990 They have nothing to do with eachother except that MNP is commonly use at the hardware link level with MNP running in software and sometimes hardware in addition. My personal opinion is that X.25 is enough and MNP+X.25 is redundant. I have decided that it is a forced MNP modem unless I can prove myself wrong! grey owl 22/42: ttd for the deaf... Name: Ravage #19 Date: Sun Jan 21 23:55:15 1990 well considering the rising number of services for the deaf and the fact that all equipment used by the deaf community must communicate at 110 baud, they consider it a standard, then i would guess that there might be either a private or perhaps a government funded organization that hs a dial-up for client usage. also they use baudot,which is also stnd ofr 110 baud, has something to do with the old ibm type teletypes. 23/42: VOS Name: Mr. Slippery #72 Date: Mon Jan 22 00:34:01 1990 VOS is a Stratus operating system. Stratus is fault tolerant; IBM resells them as System 88 but I don't know any technical details. 24/42: plus Name: The Mentor #1 Date: Mon Jan 22 12:35:53 1990 If you're looking around here in Austin, the Texas School for the Deaf *IS* local... Mentor 25/42: That helps... VOS Name: Daneel Olivaw #9 Date: Mon Jan 22 22:37:23 1990 Thanks, I keep forgetting about those Sys/88 machines... if I remeber IBM pushes them for brokers... Daneel PS What is the passwd length on a VOS system? Anybody? 26/42: pw Name: The Mentor #1 Date: Tue Jan 23 01:09:47 1990 The only defaults that I konw of are AUTOLOG, NETWORK and AUTOLOG2 (same passwords). I'm sure there are more. Mentor 27/42: others. Name: The Parmaster #21 Date: Tue Jan 23 19:17:39 1990 Hmm others i have seen are CMSBATCH/CMSBACTH CMSBATCH/BATCH at least i think thats the same sys. oh wel. fuck it. fuck it all. Jaso 28/42: fuck that! Name: Corrupt #114 Date: Thu Feb 01 07:11:22 1990 I'm Putting My Foot Down.. Someone help me with ROM'S please? sorry..ROLM'S...what Exactlyare they.. defaults..ect... and howdo you programthem?(if possible) asI understand they run/configure a PBX.....more than interesting tomy ass :-) Corrrrrrupt..So feds..please think twice..would you jointhenavy if you didn't like the gravy and rice? Think about it... 29/42: ROLM Name: Dark Sun #11 Date: Thu Feb 01 14:30:47 1990 yea.... Voice Mail System (ha)... A pbx w/ VMB features... Try #'s in the 512-823-xxxx area and mess around with 'em (IBM's 'reserved' prefix)... I've got some scan results sitting around here... I also have the # users call into to read mail & modify greeting... If anyones interested I'll see if I can find it again and post it. DS 30/42: ROLM Name: The Blade #64 Date: Fri Feb 02 13:56:44 1990 ROLM pbx's usally have a carrier in the 99xx range. This carrier lets you configure the pbx, which can be used for various fun things. The pw half the time is what it says in the upper left hand corner on the screen. (i.e. MEGACORP, TOMS HARDWARE, etc.). The Blade 31/42: IBM Name: Daneel Olivaw #9 Date: Fri Feb 02 22:51:39 1990 IBM's main number in Austin is 838... this is where most things are located.. there are numbers in the 823 range though. ROLM's are nbice, but they are wierd... Daneel Olivaw 32/42: damn... Name: Dark Sun #11 Date: Fri Feb 02 23:14:23 1990 thought to keep it a secret (838 that is) to people round here :-) DS 33/42: Why... Name: Daneel Olivaw #9 Date: Sat Feb 03 13:04:56 1990 ?it in the phone book... what I don't give out is the data ?k??lin?ms damn line noise I don't give ou?t the data lines... ?? Daneel Olivaw 34/42: but...its Name: Dark Sun #11 Date: Sun Feb 04 17:50:39 1990 listed as a normal prefix. DS 35/42: So... Name: Daneel Olivaw #9 Date: Sun Feb 04 21:34:28 1990 everything is listed as a normal prefix... it would look odd if SWB published this: 870-XXXX LMOS System 870-XXXX COMSMOS Syste, The idea is not to publish them... it just happens if you think about it.. IBM has 7000 employees is Austin, and most have an 838 prefix for their phone, seems to me they own the 838 prefix.. Daneel Olivaw 36/42: ROLM Name: Phelix The Hack #89 Date: Mon Feb 05 11:44:53 1990 well heres some info...ROLM was bought out by IBM in 1984...who then introdeuced the CBX..as in computerized brach exchange the the world. It is rumored (?) to be fully digital..but I have my doubts...and it can pretty easily be programmend..as opposed to AT&T 25/75 or sl1's...to set up private DISA's and what not.. pth 37/42: ROLM Name: Daneel Olivaw #9 Date: Mon Feb 05 19:56:23 1990 and then ROLM was 50% sold to Siemens (nice name) in 1989.. The Rolm CBX ][ is fully digital (at least once it digitizes your voice at the phone set), and it is a bitch to get a modem line on. I know this from experience.... however, on all the sets I've seen there is a RS-232C port on back of the phone, and I believe that it has a maximum bandwidth of roughly 56Kbps... I'm not sure, but I'll see if I can get docs from one of the techs. Daneel Olivaw 38/42: rolm Name: Dark Sun #11 Date: Tue Feb 06 00:22:52 1990 yea... ibm kept marketing I think... DS BTW in the offices that require modems they install "analog" lines... 39/42: DISA Name: Psychedelic Ranger #80 Date: Tue Feb 06 03:56:16 1990 I have looked into flicking on a DISA line via RMATS or similar... anyone have solid info on this? I have MITEL sx-100/200 manuals...about three manuals which describe everything on their system, including DISA features.. ?? Psychedelic ranger Anyone ever find DISA lines that respond to # and * before you enter the access code (if it has one which most do...i remember a few years ago there would sometimes be 9-able PBX DISA lines on 800 numbers..those were very nice but naive. I know on some you can do # and * and sometimes get speed calling codes (like #9, #90, #x...x, etc.) AFTER you are "cleared" wuith the intial access code. But it is usually inconclusive to mess with the # and * bore the code, at least in my experience. PR 40/42: DISA Name: Phelix The Hack #89 Date: Tue Feb 06 12:13:56 1990 I can get you anything you need about DISA's...I always make a # part of the paswd string as a "initiator"...so that an acccidental key stroke by a foolish "paying" custi=omer who has misdialed is not logged as "invalid attempt"..which would alert them of your DISA.. pth 41/42: Colgate ICCS Name: Landmine #86 Date: Tue Feb 06 14:42:27 1990 does anyone know anything about this type of OS?It requests a LOGON. I tried alot of things, but it sayes nothing but LOGON please. If anyone have any info on this please leave it. 42/42: ROLM PBXs again... Name: Daneel Olivaw #9 Date: Tue Feb 06 17:43:17 1990 I was looking at the docs the other day, and noticed something interesting. There would seem to be a security hole in the mail part of the CBX (voice mail that is). It seems it only care what line it goes to... not who. hehe, could make for some interesting fun. Oh yea, ROLM on an oscilliscope is interesting. It does some digital multiplexing, so data transfers are limited (at least as far as standard modems are concerned). Direct digital is fine, just it the multiplexing screws up the analog/digital transmissions of a modem. Daneel Olivaw It's all in the timing. < Other Op. Systems Q-Scan Done > ______________________________________________________________________________ *** {Computer Programming Sub-Board} *** < Q-scan Programming 15 - 27 msgs > 1/27: This Sub > Permanent Message Name: The Mentor #1 Date: Sun Jan 07 05:22:57 1990 This sub is intended for discussing issues relating to computer programming. This does *not* have to be related to hacking/phreaking - if you've got a question about how to do something on a PC or mainframe, or have an interesting bit of code to share, please feel free. Mentor 2/27: MODEMS and Turbo Name: Erik Bloodaxe #2 Date: Tue Jan 09 14:37:08 1990 How do I make the modem bark from turbo pascal? Someone send me a line of code that will just make the damn thing dial. That's all I need...I can figure the rest out. ->ME 3/27: Wel... Name: Daneel Olivaw #9 Date: Tue Jan 09 18:28:33 1990 if only it were that easy... The problem is that there is no easy way to use the modem from Pascal, C, or any language for that matter. I have some good libraries for C, and I can get some for TurboPascal, but... you know how DOS is... Daneel 4/27: C Name: The Mentor #1 Date: Wed Jan 10 00:58:29 1990 I've got a short (10 line) program in Microsoft C that lets you send/receive to the modem. I'll dig it up and post it. Me 5/27: Pascal/modem Name: Grey Owl #10 Date: Wed Jan 10 19:12:00 1990 If I can find it all, I'll put up ASYNC11. It's a decently documented Turbo Pascal Unit for guess what...async stuff. It's my first choice for an async driver. grey owl 6/27: ok... Name: Phoenix #17 Date: Thu Jan 11 03:33:54 1990 this should possibly be on unix but.. ill put it both.. how do i configure cu to call out on x25 ? i have found occassionally a prepared cu command <usualyy renamed to cux25 or something like that> and desperately need to know how toconfigure it myself, in order to get a unix version of defcon running... Phoenix <The Flatline> Jacking out.. 7/27: what's.. Name: Grey Owl #10 Date: Thu Jan 11 18:10:18 1990 Phoenix: What's defcon? (answer in the unix section) grey owl 8/27: o Name: Dtmf #27 Date: Thu Jan 18 14:13:51 1990 I have a short program in DCl for the vax that emulates the login sequence for my local college computer network. It traps the passwords etc etc. The only thing is, you have to run it on a terminal that someone else would be using. Is anyone out there familiar enough with devicae manipulaton on VAX/VMS 5.x to be able to instruct me as to how I should go about getting it on a terminal without actually being there? 9/27: JPI TopSpeed C professional Name: Wiz #25 Date: Thu Jan 18 14:41:46 1990 Since you people have much better access to pirated software, please could you all keep your eyes peeled for JPI TopSpeed C PRofessional? If you DO get a copy, please post it to me. If you get it I will give you my address. I can be VERY grateful when I want to be, get my drift ???????? MPE Wiz 10/27: I don't think... Name: Grey Owl #10 Date: Thu Jan 18 14:53:38 1990 Read the info-file for the Phoenix Project. I don't think this board is supposed to be spreading pirated stuff due to the nature of taps (most likely) on the BBS line. I'm not condoning the buying of legitamit software, I'm just trying to look out for fellow pirates. grey owl 11/27: Ok Name: Wiz #25 Date: Fri Jan 19 13:15:04 1990 RE: I don't think... Sorry Owl, you are right. If I EVER get validated on Circus Maximus, I will ask for this there. However, if someone has it and can send it to me via MAIL, then this BBS isn't compromised, is it? MPE Wiz (hopefully) 12/27: hallo. Name: Sicilumm Thorne #28 Date: Fri Jan 19 16:02:49 1990 Hey la. I'm a telelcommunications (primarily, aren't we all) programmer. Under PC/MS-DOS I write under TurboPascal and Assembly. Anyhow, I'm a fidonet programmer and sysop, and lal la la. Some of you might know me from the past (Tales Gallery). I wrote Criminis, which was never distributed out of BetaSoft form that would Randomly (Random-DBase, extremely good) search prefixes for carriers. Was going to write a Script hacker but got lazy. And probably will write a network scanner, if anyone gives me schematics on what it should do. TURBO PASCAL OR ASSEMBLY OR EVEN C PROGRAMMERS WITH A WORKING KNOWLEDGE OF FIDONET. I'm looking for someone to help me work on some code I'm developing, a new BBS software that will work under Fidonet AND UUCP and perhaps CyberNet (my own invention). If you're interested, contact me here or on 1:141/234@Sicilumm.Thorne Sic. 13/27: stuff Name: The Mentor #1 Date: Sat Jan 20 03:04:18 1990 Wiz- This board is so compromised that it might as well be run out of Washington. Assume everything you post is read by the Secret Service, NSA, CIA, FBI, and the security departments for any telco you can name. If it's any comfort, I don't think we have any South African feds on here. re: encryption Ok, I'm thinking about writing a short, downloadable program that will allow people to decrypt an encrypted mail message. This way no one would be able to see the true text if there's a data tap on the line. You'd call in, buffer your encrypted mail, and decrypt it with a prearranged key from the safety of your home. I could write the thing in basic so that it'd run on damn near any system (it'd be a modified version of my Cellular Automata program from the tech journal #3 - available from the d/l section). Any comments? Mentor 14/27: Yes - I've already written it Name: Wiz #25 Date: Sat Jan 20 07:00:36 1990 RE: stuff Mentor. I have already written an encrypted front-end to the Unix "Korn" chat for DOS machine, but I am in the porcess of making it a bit more generic. It is nearly done, and if anyone is interested, I will post it here. As regards South Africa feds - they are all so barin-dead that they wouldn't know what the word "hack" even meant. ^^^^=brain MPE Wiz 15/27: you could... Name: Dark Sun #11 Date: Sat Jan 20 10:27:40 1990 Make the whole board encrypted... Doesnt WWIV use just 1 routine for I/O? DS 16/27: ummm Name: The Mentor #1 Date: Sat Jan 20 11:53:23 1990 Think on that a second. If I encrypt the entire board, then either *everyone* knows the key (which defeats the purpose) or I have a differently encrypted version for each caller (wasteful). Wiz- Is this a DES-based crypt? I am suspicious of most common crypt machines. Mentor 17/27: umm Name: Dark Sun #11 Date: Sat Jan 20 12:17:00 1990 RE: ummm Well, what you might do is restrict access to all but the general board sectio n if the caller does not have the encryption. BTW, Mentor, I took you're cellular encryption method and converted that into a chat encryption program that will work over anything (except typing gets slowed down by 1/2 because before every encrypted character it sends a "%". DS 18/27: Yes - it has DES Name: Wiz #25 Date: Sat Jan 20 20:03:37 1990 Mentor. Yes - the new version now has DES, as well as a Vernam-cypher, and a custom encryption method I dreamed up. I will list the features below, but first one question: Will it be OK if the program uses the entire ASCII set (0-255), or do I have to add an option to mask all characters out of the range 32-127 ? If you want to know what ECHAT has, it can: a) Do buffered inoput and output, in a split-screen mode. This is usefull for the "Korn" chat, as quite often the text gets garbled when two users send a message at the same time. (This buffereing will be optional). b) Have a complete back-scroll buffer, up to 64K long c) Has a dialing directory, so you can dial from it too d) Has a two-way Eliza Parser, so you can fool the bloody Itals on Altger if you like e) It can filter out messages from specific users, and alternatively ignore/send a response/use Eliza on the user(s) f) USe Either DES, Vernam-cypher, or my own custom encryption g) Log everything to disk if you like h) Run in 43/50 line mode if you have the hardware i) Have a note-pad facility so you can make notes as you go along on the system j) Have several macro hot-keys, to save you typing in all the boring logons k) Supports from 110 up to 38400 BAUD, and has FOSSIL support l) Can use COM1-COM8, so it is quite flexible And as I go along, I add in all sorts of extra little bits which I think will be usefull. As soon as the current version is finished, Iwill upload it here fro evaluation. Unfortunately, it only runs under DOS, so all the Aplle/Amiga users will have a problem, unless I can get it converted for those machines. MPE Wiz 19/27: hmmm Name: The Mentor #1 Date: Sun Jan 21 17:15:18 1990 Sounds neat! I'd love to look at it. Mentor 20/27: This might sound idiotic... Name: Maze Master #92 Date: Wed Jan 24 22:11:46 1990 however, can anyone tell me what is the '$emit(.....)' command is? I found it in a source for a program written in C and compiled with Computer Innovations Optimizing C86 compiler. Later..... MM 21/27: CU Name: The Prophet #104 Date: Fri Jan 26 17:54:50 1990 Hm... To use CU fr X.25 connections, you have to specify an X.25 device (in the Devices file) as the outdialing device. -TP 22/27: $emit(...) Name: Grey Owl #10 Date: Sun Jan 28 00:09:16 1990 this command allows you to insert an opcode into the object file if for some unknown reason you don't have an assembler.... CI-C sucks, but that's the breaks.... grey owl 23/27: fortran Name: Corrupt #114 Date: Wed Jan 31 05:51:02 1990 in VMS..whats the system call in fortran...specifically for DCL..is it LIB$CALL..I keep forgettin' :-( Alos..I have some modem programs for vms in VAXbasic but I can't uploadanything cept ascii but ifyour in DIRE need I7ll do it at mylesiure... my space bar still is messedup protenatious dirt stains prove anethetical tomost fibers? 24/27: well.... Name: Ravage #19 Date: Wed Jan 31 12:18:18 1990 i for one would like to see it. 25/27: yep Name: The Mentor #1 Date: Wed Jan 31 16:32:33 1990 LIB$CALL works. You can also assign it to environment variables... Anyone know where to get a used Microvax cheap? With manuals... Wouldn't that be a cool system? Mentor 26/27: well... Name: Ravage #19 Date: Thu Feb 01 10:51:38 1990 i will see what i can find. no promises. 27/27: Hal/S Name: Cygnus 61 #48 Date: Fri Feb 02 14:33:37 1990 I have recently uncoverd a Nasa programming manual and would like to find a system to progam in Hal/S. It resembles fortran in the first degree. MOst defense contracter that had done work on the space shuttle would have it but if you have seen it around let me know please. (damn 40 col.) Cygnus 61 < Programming Q-Scan Done > ______________________________________________________________________________ *** {Social Engineering Sub-Board} *** < Q-scan Social Engineering 16 - 27 msgs > 1/27: This Sub > Permanent Message Name: The Mentor #1 Date: Sun Jan 07 05:24:00 1990 This sub is for the discussion of Social Engineering techniques. For the novices here, Social Engineering is the art of extracting information over the phone (or in person) by fast-talking someone into telling you things they shouldn't... Mentor 2/27: Welp Name: Acid Phreak #8 Date: Tue Jan 09 18:01:26 1990 Just how "open" is this sub? 3/27: social engineering Name: Grey Owl #10 Date: Tue Jan 09 21:14:58 1990 I wrote a short file about this. It covers everything Ithought of while I was writing it. I'll upload it. grey owl 4/27: ? Name: The Mentor #1 Date: Wed Jan 10 00:58:51 1990 Open? Everyone has access to it, talk about whatever you want. Mentor 5/27: hmm.. Name: Phoenix #17 Date: Thu Jan 11 03:36:04 1990 In australia we call social engineering bullshitting... for some reason or other.. most hackers are good at it.. Personally - i only opt for it when all other options are wasted.. Admittedly though it is damn effective when used properly... I guess the best method is to simply prepare what you say before saying iut... not to go in blind.. etc... <god is there a board this thing doesnt have ?> 6/27: ? Name: The Mentor #1 Date: Thu Jan 11 21:18:29 1990 Social engineering is probably the easiest way to get into a system (other than unchanged defaults). The stupidity of the average system or network manager amazes me. There's *still* some moron at WESPAC that thinks I'm a network engineer in Cincinatti - everytime I talk to him, he's happy to let me know the latest gateway passwords, newest systems, etc. He's bought into this for well over 2 years... Mentor 7/27: net enigneer in Cinci Name: Grey Owl #10 Date: Fri Jan 12 23:04:15 1990 all I have to say abou that is JEEEEEEEEEZUS! Some poeple are soooo stoopid. grey owl 8/27: Mentor.. Name: Frame Error #5 Date: Sat Jan 13 12:10:10 1990 ..No way! You're still talking to that guy? I remember when we first started out scanning on WESPAC. Wasn't he the same guy who gave you the network access password to that GS/1>? I think the PW was 'rosebud' or something similar. What a joke. FRAME ERROR 9/27: yep Name: The Mentor #1 Date: Sat Jan 13 15:20:13 1990 Yep, that's him. Nice guy... Mentor 10/27: Switching Name: Gary Seven #38 Date: Tue Jan 16 18:40:29 1990 Ok, once you have bs'd the SCC number (Switching Control Center) for the Telco what kinda tricks on your line can you do. How do you bs a forwarded number? This might be TOOOO open so if you would like to help me send me mail for further contacts. later 11/27: asdf Name: Dtmf #27 Date: Thu Jan 18 14:15:39 1990 We always used the SCC as an easy alternative to CNA... DTMF 12/27: CNA / SCC Name: The Dictator #43 Date: Thu Jan 18 18:23:17 1990 You can find out a lot of shit from SCC about C or D orders, or anything like that on a subscribers line...its kinda funny. CNA or CN/L or CNA/L is so goofed up these days, that if I dont use SCC then Ill try my luck through Lmos... The Dictator 13/27: 800 Pots Name: The Dictator #43 Date: Thu Jan 18 18:28:13 1990 Anyone who has had any luck with the setting up (not the identifing) of 800 posts, please leave me some mail..I got some questions. The Dictator 14/27: 'Wunga Wunga' I hear them chant.. Name: The Operator #42 Date: Thu Jan 18 22:46:54 1990 Can anyone help me out in getting the official address of someone with a P.O. box without directly calling them and bullshitting, or physically trailing them? I tried calling the post office and telling them I was from G.O.D. and I needed a residential address cause we didnt deliver to P.O. boxes and the Mail God told me that he couldnt give that info out unless I came down with a form and ID and all that shit... Lemme know.. The Operator 15/27: Things... Name: Erik Bloodaxe #2 Date: Fri Jan 19 01:52:34 1990 Hell, if CNA doesn't work, call the Business office that covers the exchange for that area code. Tell them you are So & So from Whatever Bell, and that CNA doesn't have a current listing for a/c-nnx-xxxx and would they please check the name listed for the account. You will usually need to give them the CNA number to "Prove" you are who you say you are. This works just as well for non-pub's and they will usually give you the address and other lines at that address if you say please. (BTW: don't fuck up and call them daily and do it for a BUNCH of numbers...especially if you are after 512 numbers!) Setting up 800 translations for a pots is a pretty simple thing. You need an SCCS. That's about it. Real rough...I think you can even get a Nation-wide one, but you might need to be on one that controls a 5e...I don't know. Mark? You know. What is it? ->ME 16/27: . Name: Frame Error #5 Date: Fri Jan 19 14:59:48 1990 About engineering the SCC as an alternative to CNA - I wouldn't do it. Simply because there are many other more worthwhile things to do with the SCC than find someone's name and address from a number. Use the business office. They are usually more unaware of things like that. To set up an 800, I think you have to have access to a 4E toll switch. Correct me if I'm wrong. FRAME ERROR 17/27: .. Name: Silencer #31 Date: Fri Jan 19 18:38:28 1990 I think someone told me that the Uiversity (in 805) will be going up again soon with an 800 number. HAHAHA... If its true.. I think i will fucking explode. Thats hilarious. 18/27: 800 Pots Name: The Dictator #43 Date: Sat Jan 20 02:17:23 1990 Well..My problem is ... I have identified a few 800 POTS in my area... Im just having trouble thinking of the terminology to use when calling the SCC to set up the #. Usually when I have #s being RCFd, I do it another way... The Dictator 19/27: Legal Name: The Blade #64 Date: Mon Jan 22 13:15:13 1990 When you BS a bell office, say the res billing office, and extract subscriber information, saying you're from repair or whatever, are you breaking the law? If so what law? Can you get arrested for it? I doubt it, it's the companys fault if they give you the info.. Blade 20/27: try freud... Name: Ravage #19 Date: Tue Jan 23 13:34:32 1990 and it can get you busted. 21/27: well... Name: Phelix The Hack #89 Date: Thu Jan 25 12:44:18 1990 Frame Error:...i assume that they are talking about "enigineering a WATS line into existance"...not actually physically seting one up off a DS1 (or simialr) toll switch ...(not that it cannot be done, but rather in that this is the engineering sub) Dictator:...I thought I had told you how to do it on atlantis or someplace? Everone: Please take whose-ever advice it was and save the SCC for "important" things...just about any inter-office/ field office has access to half a dozen system that can be used to cross reference names to address to billing address to Cable pair to feeder posts to ...etc.... call the LAC or Roadblock or FAC or RMA or RCMAC or whatever....if for no other reason that because the employees have a tendencey to be ALOT less TEchnically oriented and (no offence (sp?) also tend to be women..which I find easier to engineer...wheras I have never encounter anything but men at the SCC. PO Boxes: If you have a CBI acct you can specify a F- option which will print out BOTH home and PO address IF THEY BOTH ARE ON FILE (which they usually are)....or if you can get any other point from which to referance you can always turn to your RBOC... you know I really cannot spell... pth 22/27: Not Name: The Blade #64 Date: Tue Jan 30 13:36:49 1990 Supernigger has NOT been busted, just busy. Also, his computer is busted so he really can't call out. He will be here just as soon as he fixes his term. Blade 23/27: Does anyone Name: Alter Ego #110 Date: Wed Jan 31 07:10:11 1990 have any text files on Social Engineering or any tips... I would greatly apperiacte it... Alter Ego 24/27: I think Name: Grey Owl #10 Date: Wed Jan 31 14:44:24 1990 I think I might be able to upload my file on social engineering. You'll notice that most of it is common sense, but not everyone thinks of _everything_. grey owl 25/27: RMA Name: Psychedelic Ranger #80 Date: Fri Feb 02 04:26:31 1990 Hm. WHen I hear RMA, I think of it in the FACS context, that is Request for Manual Assistance, which pops up when there is a trouble in the automatic service provisioning flow. The LAC gets these RMA's, at least in my area. Shit, as far as having line info, that is everywhere, as Phelix mentioned...shit, QDN, ISH, INQ, /FOR DMLR, etc. etc... 26/27: well.. Name: Phelix The Hack #89 Date: Mon Feb 05 11:49:47 1990 you are correct about the FACS/RMA relation ship but oft times RC/MAC is also reffered to as RMA..and not as RC/MAC. hmm..well i don't think that the COSMOS line inquiries or the LMOS are quite what people had in mind..:) pth (you know I had n=vowed that I would never use a cutelsy smiley face!) pth 27/27: DAMN! Name: The Parmaster #21 Date: Mon Feb 05 20:33:06 1990 PHELIX!?!?! DAMN!!! Are you getting SOFT on us?!?! :-) Later, PAr JASON < Social Engineering Q-Scan Done > _____________________________________________________________________________ *** {Electronic Banking Sub-Board} *** < Q-scan Electronic Banking 17 - 12 msgs > 1/12: This Sub > Permanent Message Name: The Mentor #1 Date: Sun Jan 07 05:26:18 1990 This sub is for the discussion of all the aspects of late-20th century banking such as Electronic Fund Transfers, Routing Codes, Automatic Tellers, etc. While some hackers have been active in this area for some years, it is only recently that it is being discussed in the mainstream. Because of the sensitivity of some of the information that may be posted here, this is one of the two subs (Drugs is the other one) that allows anonymous posting. Mentor 2/12: EFT Name: Erik Bloodaxe #2 Date: Tue Jan 09 14:46:26 1990 I don't know why Mentor put this here, but I suppose everyone knows by now. I have a few friends who have worked in banks as tellers. The system I got a chance to look at first hand through him was weird. It was some big beast of a system, with each teller having his own telex terminal. Very strange. Kind of reminded me of the setup travel agents have. VERY weird. He showed me how to use it though. Hell, they trained him for a few months, so I didn't feel bad about not getting the hang of it in the hour I was there. Computer assisted banking transactions are not anywhere near as easy to perform as glamorized in the movies. None of this transfer from here to there with a simple keystroke bullshit. Banks are fucked. Everything has to be approved, verified, stamped, signed etc...well, maybe not all that, but there are a LOT of things to take into consideration, and if ONE little thing isn't there, the whole thing aborts...like, if one response wasn't letter perfect, the thing rejected the whole transation. I guess I can understand that, as banks do the SAME thing over and over, and there really isn't any reason to have changes in the data format. One nifty system I'm in in California will allow you to do all kinds of neato things. It's on telenet too. Lots of banks on telenet. One interesting thing is that the California one rejects when you call the main address...but when you connect to the right sub-address *BOOM* you're in. There is only one sub address that works too. Wild. Would have kept out most people. ->ME 3/12: ok... i admit it i work/soon to be worked in a bank Name: Phoenix #17 Date: Thu Jan 11 03:42:26 1990 true.. transactions are very very very hard to perform frfom remote.. First a system emulator would be nice... <banks tend to use really wierd sys emulation> Secondly online transactions from front office terminals are only available during business hours... they shut down at other times.. only thing operating is atms.. and <most> they use encryption anyway. Next you need to know pretty much how the bank works in order to perform correct transaction... all sorts of system codes... bank codes and a whole stack of other shit. Of course before any of this can take place.. a valid sign on is required... 99% of the time these sign ons are the employees salary number with the same password. But then there is the problem of each user only being allowed on the system once..between the hours of 9-5. So the solution ? I dont know.. i joined the bank to investigate such things.. and have done so pretty thoroughly <which is whyy i have just posted notice o resignation>. The only way i have found to actually rip off a bank has nothing to do with computers... so there... Phoenix <The Flatline> Jacking out.. 4/12: ATM Encryption Name: The Mentor #1 Date: Thu Jan 11 21:21:10 1990 But most of the ATM encryption schemes I've played with were fairly easy - ranging from straight rotation to one- and two-table schemes. As DES chips become common, it will become more difficult - I don't understand why they don't use more robust encryption methods now. I mean, the one I did in LOD TJ #3 is unbreakable by anything this side of an XMP-1, and even that would take awhile. Single-state machines are the wave of the encryption future... The Mentor Legion of Doom! 5/12: hmmm ever heard of... Name: The Parmaster #21 Date: Sat Jan 13 08:59:28 1990 Ever heard of a three character control-character (stupidly phrased but i'm hung over) sequence for citicorps systems that drops you right in for maintenance? anyway heard it from some guy who used to work for them. he showed a friend of mine so apparently it's true.. only need the last character to the sequence. some day when i'm board i suppose i should try it. i have control characters 1 and 2... have to take a rainy day and try to find 3. Later, Par Jason . 6/12: ^E Name: The Mentor #1 Date: Sat Jan 13 11:43:56 1990 I know of systems that send your their TRW login when you connect to them if you type ^E... I hadn't heard of the front end hole, though. How do you know when you have the first two characters right? (Or the first one, for that matter... gotta start somewhere.) As far as Citicorp systems go, which type is it in? It's not in their VAXen, at least. Mentor 7/12: Mentor Name: Grey Owl #10 Date: Sat Jan 13 17:35:49 1990 who owns the ^E systems? TRW is fun for a couple of calls. grey owl 8/12: interesting Name: Phoenix #17 Date: Sat Jan 13 21:09:28 1990 master control sequence on citi could actually be useful.. I hope it rains soon.. 9/12: CITI.. Name: The Parmaster #21 Date: Sun Jan 14 03:05:04 1990 It supposedly works from any of their online terminals.. And i know that the first two i have are correct... Because the tech was a nice guy and told me. Anyway what does he give a fuck... He doesn';t work for 'em anymore. When he demo'd it to my friend he used dialupo access .. So maybe it can be done on some of those weird GTN systems all over the world.. Anyway i lied... it's not all control charatcers :-) But however starts with one. Later, Par Jason 10/12: ^E Name: The Blade #64 Date: Mon Jan 22 13:16:59 1990 ^E = Telex if you are talking about that. 11/12: TV Name: Cassius Cray #135 Date: Tue Feb 06 06:57:39 1990 Did any body see that show "Beyond 2000" where they talked about Computer Crime? They showed this guy who tapped into a bank computer got it to give his computer the digital tone file of the ATM and then he recorded them on audio tape, pasted the tape on cardboard ATM sized cards and got tens of thousands of dollars ... The Service Secret showed a stack of cardboard ATM cards by the hundreds... I taped the show it's an Aussie production and comes on Discover channel (shows you how exciting my life is)... Cassius Cray 12/12: i know the show.. Name: Phoenix #17 Date: Tue Feb 06 13:31:20 1990 <ahem> interesting story.. wasnt it <grins..> < Electronic Banking Q-Scan Done > ______________________________________________________________________________ *** {Radio & Electronics Sub-Board} *** < Q-scan Radio & Electronics 18 - 32 msgs > 1/32: This Sub > Permanent Message Name: The Mentor #1 Date: Sun Jan 07 22:44:33 1990 This sub is for the discussion of electronics, radio and cellular communication. Mentor 2/32: Idea Name: Grey Owl #10 Date: Tue Jan 09 21:18:56 1990 Here's one: everyone knows that when you hook up a 9-volt battery to a relay switch it throws of lots of AM radio waves...all over the band. I WONDER what would happen if you made one of these babies,wrapped it in duct tape and threw it in someone's sattelite dish! You just knowsome poorrepairman will have a ball trying tofigure out why there's not picture! grey owl 3/32: cable Name: The Mentor #1 Date: Mon Jan 15 22:28:41 1990 Is anyone familiar with cable de-scrambling? I'm interested in building a tuner that will let me pick up Showtime, Playboy Channel, and Cinemax (I have HBO). How difficult a prospect is this - or is it even possible? Mentor 4/32: Austin Cablevision Name: Erik Bloodaxe #2 Date: Mon Jan 15 23:50:22 1990 You can't do it. Not on our system. We have two way cable...totally interactive, down to the point where they know what house each box is in. Kinda sucks...you can only grab HBO & Showtime for free, as they are the only one blocked by traps. All the other premium channels are controlled by the fucking cable company from their feeds. BIG DRAG. {Remember when cable was new, and you could just run out to the damn box and remove all the traps, and you'd have every channel? ->ME 5/32: Hmmm not sure but... Name: The Parmaster #21 Date: Tue Jan 16 00:37:51 1990 Hmmm lloyd not sure but in cali we had the same way but my friends father (an electronics engineeer for Radionics alarm co) developed a box with a chip in it to automatically tunbe to some weird freq. anyway probably not the same sys as u guys.. but i know u can do it with a sat dish..heard of a guy who designed a chip that snagged the nearest other persons descrambling code and fed it to yours. remember.. It's not what u know it's who u know.. Eh COMRADES? heheeheh Later, (Not a fat communist pig) Par Jason 6/32: Linear/AND MORE! Name: Ripper #51 Date: Tue Jan 16 03:12:46 1990 Hello..... I'm into radio stuff too (Pretty good, cause I'm also a Telecomminications Major.) If you want to cause havoc with someone radio equipment with major QRM a good approach is to make a good pink noice generator and hook it up to a high gain AF amp and into a small AM transmitter and drop it nearby the reciver. The power output only needs to be a few hundred mw to really make reception a problem, because while the tranmitter it's self is low power, it's still the strongest signal, and since it's being over driven, the band width can be several hundered Khz. We used this on people in out area who "DEAD KEY" or otherwise make themselves an obnoxious source of noise. Sure, while they are making all their noise it won't bother them, but until the batter is removed or dies, they just recive crap. Also, on a related note, my favorite if to get as close to an offending station as I can and just cause massive RFI with my linear. The subject will still hear me even with his radio turned off, I generate engough power in my mobile to drive coil in speakers, phones and other electronics without them being on (of course, with their audio amps on, it's even worse, because the RFI will creap into the amplifications stages.) Anyway...current radio project, a 1200 watt linear amp I'm making for an AM and SSB base station I'm making. Also, trying to start a little radio conv on a small system in San Diego, if interested 619-660-6734, minimal plug, I hate people posting numbers on my system...so... Anyway, radio stuff...I know a bunch, and I have all kinds of info from 5mw to 2KW, AM, FM, SSB, CW, DSB, 180 Meters to 75 cm....although, I am not a HAM...I can do my best to help out with anything. 7/32: jesus Name: Phoenix #17 Date: Tue Jan 16 07:42:19 1990 dont ever let me hear you complain about cable tv at least you got it <not all communist pigs are ffat> and besides... im on the other side Phoenix your sincere israeli traitor yawn 8/32: cable grabbing in austin.... Name: Ravage #19 Date: Tue Jan 16 11:45:16 1990 yes it can be done. go buy a scientific atlanta controller box from a cable distributor, cost about $100. pull the top off, pull the roms and get yourself a 8048 cross-assembler to look at the code. the routines that control the identification of the user are easy to find, right near the top of the code. just go in and play with this code, insert nop's for example, and enable all the decoding, it is done in hardware,and you have what you want. 9/32: jamming... Name: Ravage #19 Date: Tue Jan 16 11:51:53 1990 you should not use a pink noise generator as it's power spectrum falls off at the higher frequencies on a given channel. you should probably use a gunn diode oscillator, a white noise generator w/ equal power bandwidth spectrum, followed by a set of linear amplifiers. another good source of noise is a spark gap. this can be generated by using a high voltage transformer, i use a jefferson electric luminous tube transformer 721-121 12kv @ 30mA output. jefferson is in bellwood ill. what you do is connect the input to 110vac and the output to a couple of rounded probes. the distance between the probes is adjusted for the best spark. watch out for the ozone this generates because it creates free-radicals in your blood which is a carcinogen. these can also be used to make jacob's ladders or tesla coils. 10/32: Well..nuff of this crap./ Name: The Parmaster #21 Date: Thu Jan 18 03:32:01 1990 Well phoenix.. i don't know whatthat statement about YOU being a traintor was about... But as for me.. i have no desire to sell out my fucking country. Even though they may be so stupid as to think so. When i'm trying to help them out by monitoring a russian debug port. And using it to dump the pad ??mem (Which was WORTHLESS anyway) Let's get one thing straight.??# I love my country. (even after all the shit they've put me through) And i love my freedom (which they will eventually take away from me i assume) But i would never sell them out like those CCC scumbags did. i Love my family and friends too much to jeopardize them by selling secrets etc. and would never FD? label mysel;f the way you labelled yourself. (traitor) I think you should learn (and hope u do soon that we are just a bunch of kids FD?who gK?t too good.) <??FFD?or whatever reason> (I.e. b??ecasue tFD?hey couldn't stFDop us from doing it.. and once you excersize a muscle it tends to grow and prosper. so we've gotten out of their control.. don't jeopardize your country just because u are good..or your friends av?d family Because in the end...The gov't agencies will know everything about it. And you'll probably enFD?d up like that poor bastard in CCC. (i don't know about you guys but pou??ring gasl?oline on myslefFD? and being lit on fire is not my way of committing suicide) And anyone who tells me HE REALLY did commitFD? suicide.. Try to step back and look at the situation. Dealing with the KGB and CIA..DO YOU REALLY THINK SO? Anyway that is why i have never broken into military comps and nevr will.. sure i may break into communist coujntries systems but , i don't break into ours "just coz i'm CURIOUS" tahts the stupidest thing u can do. FD? Trust me on this one.. Par, Jason 11/32: seems to me... Name: Ravage #19 Date: Thu Jan 18 10:40:10 1990 that breaking into a communist country computer is a lot more dangerous, those folks dont mind shooting you and to hell with miranda, whereas this country will at least give you a trial. a small chance but a chance never the less. 12/32: Treason & Government Smegma... Name: Erik Bloodaxe #2 Date: Fri Jan 19 02:06:13 1990 It's the Major SS buzzword these days. Treason. If someone if poking around in ANY system they feel is sensitive (although they leave sysdiag unpassworded, or lp password lp, etc..) they will then label you as: "A Serious Threat to National Security!" Give me a break. Hell, I think my association with Par & Phoenix alone is enoough to get me the firing squad. I haven't even done anything, but it seems that everything bad that's happened I keep getting brought up, as I know such and such, or I somehow know EVERYTHING about how such and such happened. Well, I've tried my best to be good, and stay out of government things, military things, etc... I've even edited out the "sensitive" things I've run across in the Telenet scanning just for their sense of well being, but if I begin to feel threatened, it's all going out. Unabridged. We will see...I'm already getting nervous...the feds are already pissed that LOD is still kicking, and this bbs must have SLAMMED it into their faces. And I know that the EFT files must have pissed them off as well, although that may or may not have anything to do with this bbs suddenly going back up. Well, I'm not a threat to ANYTHING, except myself maybe. Anyone who knows me knows that. Back me up people. This is my public announcement of not-guilty to any and all crimes against the Security of the United States. So what if I was scanning 2502 a while back? Anyone ever think that it would be in THE INTEREST OF NATIONAL SECURITY to hop into a Soviet system? I thought it would. Par knows what I mean. Hell, The government now seems to think he's a spy, and want to shoot him. Killing Teenagers for fun is not my idea of constructive problem solving guys. Take an extended course in the ways of the hacker. That education might do you all a world of good. You may even pick up something you missed in your little weekend getaway training seminar in fighting computer crime. When you come and kick in my door, (don't step on the cat), and if you don't blow me away first, maybe I can educate you all a little better on what is REALLY GOING ON! (This message posted for the Secret Service & CERT, et al. whomever is posing on here, or reading this via Mentor's & My own Data Taps) ->ME 13/32: i personally agree.. Name: Phoenix #17 Date: Fri Jan 19 06:46:21 1990 umm... all i have to say is that certain people <ahem> who have not got half the education that specific security people have had are bypassing their years and years of education in an hours work.... maybe there is a lesson or two to be learnt there... but then if we get shot... you never hear our story.. Hell... if i get blown away by a firing squad... ill make sure that certain things happen... <before i get blownaway..> insurance is beautiful... Phoenix <The Flatyline> Jacking oUt. 14/32: . Name: Frame Error #5 Date: Fri Jan 19 15:07:20 1990 I am not treasonist, and never will be. I have to laugh at the stupidity of some of the people you (yes you, SS) send out to raid a hacker's home, or investigate a certain something. I hear stories from friends who have gone down, and I can't help but bust out laughing. Really now.. You should get a real training program going if you intend on keeping up with us. Sure, it's easy to get one of us, but what are you going to do about the rest who are still thriving above the system, and your observation? As you can see, even after three key members of the LOD went down, the group is active. I rest my case. FRAME ERROR 15/32: also... Name: Grey Owl #10 Date: Fri Jan 19 19:25:55 1990 If the SS is supposed to protect systems, they would scare the hackers out of NOT messing with the system...not bust him. That just makes the others so mad that they decide to ravage the system he got busted on...I know I have and will. grey owl 16/32: also. also. also.... Name: Phiber Cut #34 Date: Sat Jan 20 09:36:30 1990 Why is the SS saying everyone is in LOD? Why are they such a pain? Why are they so fuckin' stooopid? Why aren't they protecting the president or catching counterfiters(sp) like they're supposed to be? 17/32: ravage Name: Ravage #19 Date: Sat Jan 20 10:48:34 1990 be kool w/ my handle ace. 18/32: well Name: Phelix The Hack #89 Date: Thu Jan 25 12:55:58 1990 I think that I can safely say (for the benefit of those fed tyoes )that Erik Bloodaxe is the most dangerous person alive. sorry Erik. Haha. Boy I cannot wait to see that one in the papers taken out of context... ...fellow computer criminals report with all sincerity that Erik Bloodaxe is "the most dangerous person alive.." Seriously though...well I have nothing serious to say. No shit about getting the chair for even pretending to associatee with Pheonix and Par (looks like I picked the wrong set of friends). say...Pgheonix..any mre articals detailing the infamous Austro-American Connection? HA! pth. 19/32: aha Name: Phoenix #17 Date: Fri Jan 26 01:50:46 1990 Thats the one!! <why cant anyone spell my name ???> P H O E N I X 20/32: sweet dreams Name: The Electron #32 Date: Thu Feb 01 09:42:53 1990 anyone who is paranoid enuff to believe they have cia/fbi/kgb etc etc chasing after them with large weapons is either: a) a cronic bullshitter, who in the interests of their "image" like to run round saying they are WANTED by federal authoriities. b) a simple minded fuckwit if some1 like the CIA wanted to fuck u up, they fuck you up, they dont wait around for years to do it (But of course some of you are so K-rad the CIA will never find you right? rrriiiggghhhttt.) wake up please. (of course just coz ure paranoid doesnt mean they're NOT after you :-) 21/32: ok.. Name: Phoenix #17 Date: Thu Feb 01 10:15:42 1990 so their guns arent that big... 22/32: Heheh.. Name: Nemesis #122 Date: Fri Feb 02 00:15:22 1990 No, their guns are small.....Well the simple truth of the matter is that 90% of all the people who get "BUSTED BY THE PHEDS" are either totally full of it, or just a few quarts low. When someone get real busted, you hear about it.. and I dont mean as a rumor on a few boards and shit. But even more full of it than the BUSTED is the "THEY ARE AFTER ME" part. My god, if someone is AFTER you, and they havent already CAUGHT you,{then v:they must be mo{ing t{mightykO su!l{w... 23/32: ummmm Name: The Mentor #1 Date: Fri Feb 02 09:27:57 1990 Well, Electron, if the CIA wanted *you*, they'd just shoot you. Fortunately, we're inside the states so we only have to worry about the FBI, the NSA and the SS. While I can't speak for everyone, some of the "hunted" people on here are federal fugitives. Yes, they *are* being looked for. I know some others are wanted through phone contact to sympathetic government workers who occasionally clue me in as to what's going on. The bulk of the people who think they're being watched, aren't. But the gov. is going for airtight cases, most of which involves survellience for several