💾 Archived View for clemat.is › saccophore › library › ezines › textfiles › ezines › HWA › hwa-hn03.… captured on 2021-12-03 at 14:04:38.

View Raw

More Information

-=-=-=-=-=-=-

   [42:65:67:69:6E]-[28:63:29:31:39:39:38:20:68:77:61:20:73:74:65:76:65]
  =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=
  ==========================================================================
  =                    <=-[ HWA.hax0r.news ]-=>                            =
  ==========================================================================
   �`�>[=�HWA'99=]<���                Number 3 Volume 1 Xmas Special'1998/99
  ==========================================================================

  Sorry its late, there was some religious thing people were getting
  all antsy about and THEN all this drunkenness and stuff started it was
  quite strange really ... anyways here it is... - Cruci
  
				 
               sss
             sssshoho
            s   ohohoho                         sss
           s  ooooooooooo                     AAs  ss
          (0)  HHHH   HHH WWW           WW  AAAAA   ss
                 HH   HH   WW    WW    WW  AA   AA  (o)
	         HHHHHHH    WW  WWWW  WW  AAAAAAAAA  -
	         HH   HH     WWWWWWWWWW  AA       AA 
               HHHH   HHH     WWW  WWW  AAA       AAA

        
   -= H W A . H A X 0 R . N E W S  C H R I S T M A S  S P E C I A L =-
   
          �`������`������`������`������`������`������`������	  
          
   [] Which turned out to be the "New Years Special" but nevah mind []
		      
		           kr4d!=31337
   
          �`������`������`������`������`������`������`������
          
   
   

   "I f*cking hate christmas, you know, its so fuc*ing commercialized
    and I always get like f*cking cDc t-shirts and Linux CD's, it sux"
      						
      						 - BGates 12/17/98

 
           �`������`������`������`������`������`������`������	   

  "hope i can get this out before 1999... cripes its bigger than I 
   thought.. omigod its eating me ! arrgh get em off me get em off me!
   uhm, anyway my apologies for the shabby layout of this issue, we were
   all wasted on valerian root and ganesh sticks ... 

				 - Ed (Slightly psychotic)
	  				
          �`������`������`������`������`������`������`������	   	  				


     
   Synopsis
   --------
   
   The purpose of this list is to 'digest' current events of interest that
   affect the online underground and netizens in general. This includes
   coverage of general security issues, hacks, exploits, underground news
   and anything else I think is worthy of a look see.

    This list is NOT meant as a replacement for, nor to compete with, the
   likes of publications such as CuD or PHRACK or with news sites such as
   AntiOnline, the Hacker News Network (HNN) or mailing lists such as
   BUGTRAQ or ISN nor could any other 'digest' of this type do so.

    It *is* intended  however, to  compliment such material and provide a
   reference to those who follow the culture by keeping tabs on as many
   sources as possible and providing links to further info, its a labour
   of love and will be continued for as long as I feel like it, i'm not
   motivated by dollars or the illusion of fame, did you ever notice how
   the most famous/infamous hackers are the ones that get caught? there's
   a lot to be said for remaining just outside the circle... <g>


   @HWA
   
             �`������`������`������`������`������`������`������	  
             
             OK. THATS AS CHRISTMASSY AS WE GET, 'NUFF SED AWK?
             
             �`������`������`������`������`������`������`������	  
   
   
  =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=
                     Welcome to HWA.hax0r.news ... #3
  =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=
  Issue #3 ( The super /<ick <\ss Christmas Special or some shit )   Plik!
  =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=


	    "Captain, I am not a merry man" 
	    			
	    			- Lt.Cmndr Worf, STTNG
 

  [*]====[ Issue 4 Volume 1 to be released on or about Jan 13th 1999]====[*]
  

  ------+--+----------------------------------------------------------------
    Key     Content
  ------+--+----------------------------------------------------------------
  
   Keys: use the keys to search for start of each section rather than using
   regular numbers ... this may change but dats the way its at now so tfs.
   
    0.0 ... COPYRIGHTS 
    0.1 ... CONTACT INFORMATION & SNAIL MAIL DROP (UPDATED) ETC
    0.2 ... SOURCES        
    0.3 ... THIS IS WHO WE ARE
    0.4 ... WHAT'S IN A NAME? why `HWA.hax0r.news'?
    0.5 ... Cruciphux's bio (h0h0 and its true, erhm mostly.) <G>
    0.6 ... HWA FAQ V1.0   
    A.L ... Nothing. (Just put here to deliberately annoy people. -Ed.)
    1.0 ... Greets (!?!?!?)
    1.1 ... Last minute stuff, rumours, newsbytes, malebag
    1.1a .. www.ehap.org: The ongoing war against Pedophilia on The Net.
    1.1b .. ALERT!: Chinese Hackers Sentenced to Death, LoU preps for war.
    1.1c .. HWA mirrors Keen Veracity, the LoU hacking e-zine
    2.0 ... From the editor
    2.1 ... Email and Commentary
    2.2 ... Tron's death (Chaos Computer Club member)
    2.3 ... Santa in the nude?
    2.4 ... Remember the Hong Kong Blondes? cDc takes their leave.
    3.0 ... Santa's Dox *** HHN Exclusive! 
    3.1 ... Remote Explorer hits MCI *HARD*     
    4.0 ... Latest Web Browser Exploits (UPDATED - READER RESPONSE)
    4.1 ... Cyber Army's Present, the Anonymizer source!
    4.2 ... Windows Trojans Update & The New Remote Explorer NT Scare
    4.3 ... Fucking Hostile and HWA get jiggy wit it over issue #2
    5.0 ... l33t d00dz - by Flaming Cow
    5.1 ... Anti-Antionline?
    5.2 ... Bikkle gets the Pickle?
    6.0 ... The Christmas Hax0r Flood 
    6.1 ... Latest exploits & hacks (13th)
    6.2 ... Think Twice before becoming a Hacker Attacker!
    6.3 ... Hack Your Head Instead! xtc, exctasy, mdma, etc ...
    7.0 ... Hacking IRC'98 : Part 2:  Crashing Eggdrop bots
    7.1 ... Hacked Websites (Zillions of em!!)
    A.0 ... APPENDICES  
    A.1 ... PHACVW linx and references (Xm4s Special Edition)

  ------+--+----------------------------------------------------------------

     @HWA'98/99                 
             

         
0.0  (C) COPYRIGHT, (K)OPYWRONG, COPYLEFT? V2.0
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     
     Important semi-legalese and license to redistribute:
     
     YOU MAY DISTRIBUTE THIS ZINE WITHOUT PERMISSION FROM MYSELF 
     AND ARE GRANTED THE RIGHT TO QUOTE ME OR THE CONTENTS OF THE
     ZINE SO LONG AS Cruciphux AND HWA.hax0r.news ARE MENTIONED IN
     YOUR WRITING. LINK'S ARE NOT NECESSARY OR EXPECTED BUT ARE 
     APPRECIATED the current link is http://welcome.to/HWA.hax0r.news
     IT IS NOT MY INTENTION TO VIOLATE ANYONE'S COPYRIGHTS OR BREAK
     ANY NETIQUETTE IN ANY WAY IF YOU FEEL I'VE DONE THAT PLEASE EMAIL
     ME PRIVATELY current email cruciphux@dok.org 
     
     THIS DOES NOT CONSTITUTE ANY LEGAL RIGHTS, IN THIS COUNTRY ALL
     WORKS ARE (C) AS SOON AS COMMITTED TO PAPER OR DISK, IF ORIGINAL
     THE LAYOUT AND COMMENTARIES ARE THEREFORE (C) WHICH MEANS:
     
     I RETAIN ALL RIGHTS, BUT I GIVE YOU THE RIGHT TO READ, QUOTE
     AND REDISTRIBUTE. - EoD
   
    
     Although this file and all future issues are now copyright, some of
    the content however holds its  own copyright and these are printed and
    respected. News is news so i'll print any and all news but will quote 
    sources when the source is known, if its good enough for CNN its good
    enough for me. And i'm doing it for free on my own time so pfffft. :) 
    
    No monies are made or sought through the distribution of this material.
    If you have a problem or concern email me and we'll discuss it.
    
    cruciphux@dok.org
    
    Cruciphux [C*:.]

      
     
0.1  CONTACT INFORMATION AND MAIL DROP
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     
     Wahoo, we now have a mail-drop, if you are outside of the U.S.A or 
    Canada / North America (hell even if you are inside ..) and wish to
    send printed matter like newspaper clippings a subscription to your
    cool foreign hacking zine or photos, small non-explosive packages
    or sensitive information etc etc well, now you can. (w00t)
    
    Send all goodies to:
    
    HWA NEWS
    P.O BOX 44118
    370 MAIN ST. NORTH
    BRAMPTON, ONTARIO
    CANADA
    L6V 4H5
    
    Don't bother staking it out it gets forwarded elsewhere from there 
    and others pick up the mail ;-)
    
    Our email remains:
    
    Submissions/zine gossip.....: hwa@press.usmc.net
    Private email to editor.....: cruciphux@mobsters.com (* changing soon)
    Distribution/Website........: sas72@usa.net
    
    Phone number................: hahahaha uhm, no. maybe later thanks.
    Fax.........................: see above.
    Celfone?....................: Scan for it. the opto
    Uhm pager? .................: no. Stop that! ^G
    VMB.........................: How to irritate people w/John Cleese was on last 
    				  night, a jolly good shew no matter how often you've
    				  seen it.    

    System fail much? ..........: Not usually no, hrm lemme see

    12:10AM  up 2 days, 11:49, 2 users, load averages: 0.04, 0.02, 0.00
    
    12:20am up 1 day, 21:41h, 2 users, load average: 0.07, 0.13, 0.25
    
    <snip>
    
    Guh. oh ya, installed more hardware forgot .. bah. owell. ;-)
    
    <snip>
    
    

    @HWA'98
    
0.2  Sources ***
     ~~~~~~~~~~~     

     Sources can be some, all, or none of the following (by no means complete
    nor listed in any degree of importance) Unless otherwise noted, like msgs
    from lists or news from other sites, articles and information is compiled
    and or sourced by Cruciphux no copyright claimed.

    HiR:Hackers Information Report... http://axon.jccc.net/hir/
    News & I/O zine ................. http://www.antionline.com/
    News/Hacker site................. http://www.bikkel.com/~demoniz/
    News (New site unconfirmed).......http://cnewz98.hypermart.net/
    Back Orifice/cDc..................http://www.cultdeadcow.com/
    News site (HNN/l0pht),............http://www.hackernews.com/
    Help Net Security.................http://help.ims.hr
    News,Advisories,++ ...............http://www.l0pht.com/
    NewsTrolls (HNN)..................http://www.newstrolls.com/
    News + Exploit archive ...........http://www.rootshell.com/beta/news.html
    CuD ..............................http://www.soci.niu.edu/~cudigest
    News site+........................http://www.zdnet.com/

    +Various mailing lists and some newsgroups, such as ...

    http://www.the-project.org/ .. IRC list/admin archives
    http://www.anchordesk.com/  .. Jesse Berst's AnchorDesk

    alt.hackers.malicious
    alt.hackers
    alt.2600
    BUGTRAQ
    ISN security mailing list
    ntbugtraq
    <+others>


    NEWS Agencies, News search engines etc:
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    http://www.cnn.com/SEARCH/
    http://www.foxnews.com/search/cgi-bin/search.cgi?query=cracker&days=0&wires=0&startwire=0
    http://www.news.com/Searching/Results/1,18,1,00.html?querystr=cracker
    http://www.ottawacitizen.com/business/
    http://search.yahoo.com.sg/search/news_sg?p=cracker
    http://www.washingtonpost.com/cgi-bin/search?DB_NAME=WPlate&TOTAL_HITLIST=20&DEFAULT_OPERATOR=AND&headline=&WITHIN_FIELD_NAME=.lt.event_date&WITHIN_DAYS=0&description=cracker
    http://www.zdnet.com/zdtv/cybercrime/
    http://www.zdnet.com/zdtv/cybercrime/chaostheory/ (Kevin Poulsen's Column)

    NOTE: See section 9.0 for more details on links.
    
    Referenced news links
    ~~~~~~~~~~~~~~~~~~~~~

    http://www.ottawacitizen.com/business/981211/2093909.html
    http://www.zdnet.com/zdnn/stories/news/0,4586,2175287,00.html
    http://www.zdnet.com/zdtv/cybercrime/features/story/0,3700,2175248,00.html
    http://www.3xt.net/justin/  Another Agent Steal home page(?):

    Submissions/Hints/Tips/Etc
    ~~~~~~~~~~~~~~~~~~~~~~~~~~
    All submissions that are `published' are printed with the credits
    you provide, if no response is received by a week or two it is assumed
    that you don't care wether the article/email is to be used in an issue
    or not and may be used at my discretion.
    
    Looking for:
    
    Good news sites that are not already listed here OR on the HNN affiliates
    page at http://www.hackernews.com/affiliates.html
    
    Magazines (complete or just the articles) of breaking sekurity or hacker
    activity in your region, this includes telephone phraud and any other
    technological use, abuse hole or cool thingy. ;-) cut em out and send it
    to the drop box. Hell even a postcard would be cool, i'll scan em in and
    stick em in a postcard section on the site heh. I like mail. It is your
    friend. Spammers will be bumfucked by my pet doberman though. Or digitally
    destroyed. so be warned.  <sic>
    
    
    - Ed
    


    @HWA'98
    
     
0.3  THIS IS WHO WE ARE
     ~~~~~~~~~~~~~~~~~~
      The only two people you need to know about at this time are sAs72
     who does website maintenance and Cruciphux who does editorial.
    
      sas72@usa.net ............. currently active
      cruciphux@dok.org.......... currently active 

     * Formerly "Who am we?" otherwise unchanged since last issue.
       see the mini-bio on Cruciphux (next article) this issue (#3)
    
     Who cares? (Version 2.0) 
     ~~~~~~~~~~~~~~~~~~~~~~~~~
    
     Revised Xmas 98
     ~~~~~~~~~~~~~~~
    
     I do NOT work for the government in any shape or form other than
    paying uh some of my erhm taxes...well most of it but fuck you 
    you don't need to know that. <sic>
    
    Ok i'm still a noone and a nobody, but yeah I *was* a hacker, been
    a cracker, ran a warez board (and a PD board) done some phone phun
    etc .. but all in my teens and i've since started wearing a "white
    hat" (but it has little grey specks on it I must admit) and I am in
    no way a "master hacker/phreaker" not "leet". I'm just me, take it or
    leave it, didn't want it, didn't need it, been there, done that ...
    you guys have the reigns now and i'm deadly curious as to what you're
    doing with them. Hell mail me for advice and shit if you want, i'll
    help if I can. I'll respond to all verifiable emails. Maybe even some
    aol.com's. <heh> I hear there's a new movie out "You've got burned!"
    or something? sounds cool gotta check that out...    

    If you're really curious and have "mad sk1llz" you prolly know who I
    am or could find out if you care so much, bfd. I've nothing to hide
    go ahead, it might be fun. ;-) just don't come to my house to rag on
    my ass coz badness may reign down upon you,and I have some heavyweight
    friends <grin who doesnt you ask?> well we all die sometime if you 
    wanna go early, fine by me. <sic>

    Version 1.0
    ~~~~~~~~~~~
    I am noone, a nobody, I am not a phed or a narq, I could be you. I do
    this for myself and some friends, you get something out of it too?
    'whump, there it is'. Thats all there is to it, nothing more, Neither
    am I a "hax0r" or a "cracker" and hell if I were, you think i'd
    broadcast it all over some crummy news sheet? heh, get over it, this
    is meant to be a fun read, nothing more, so get reading. and if you ain't
    smiling, you're taking things much too seriously. Keep hacking and stay
    free ... w00t.

    C*:.
    
       "Daddy. what does regret mean?"
 
   "Well son, the funny thing about regret is, that its better to regret
    something you HAVE done, than to regret something that you HAVEN'T 
    done, oh and by the way if you see your mom this weekend tell her 
    ... NFR!!!!" 
                      - Orbital	<slightly modified quote>  				

    
     -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-


0.4  Whats in a name? why HWA.hax0r.news??
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     
      Well what does HWA stand for? never mind if you ever find out I may
     have to get those hax0rs from 'Hackers' or the Pretorians after you.
     
     In case you couldn't figure it out hax0r is "new skewl" and although
     it is laughed at, shunned, or even pidgeon holed with those 'dumb
     leet (l33t?) dewds' <see article later in this issue) this is the state
     of affairs. It ain't Stephen Levy's HACKERS anymore. BTW to all you up
     and comers, i'd highly recommend you get that book. Its almost like
     buying a clue. Anyway..on with the show .. - Editorial staff
     

0.5  Cruciphux's bio.� Dec 1998
     ~~~~~~~~~~~~~~~~~~~~~~~~~~
   
     Part i: The basic shit
     ~~~~~~~~~~~~~~~~~~~~~~
       
       Ok since so many people already tried hacking certain systems and
     checked the phederal databases and tried to match my writing stylie
     to other ppl i'll come clean with a little bit of 411 on my dox. k?
       
     Time of birth......: Between 1964 and 1974 around 8:30am, I'm a Leo
     Where..............: Great Britain (Or UK, England, whatever)
     Why? ..............: Accidental, just sorta happened they didn't have
                          good condomz back then.
     Are you a b4st3rd?..:Yes but not in the sense of birthright
     Schooling?, uni etc?:Fuck schools, i'm self taught my teachers sucked.
     
     Vitals:
     Age...........: 16-36  Mentally:depends on context and day of 
                     week: 12-52 (yeah thats in yrs smart ass..) ;)
     Pyschological 
     profile.......: My phile is smaller than a phone book but bigger
                     than a 2600 mag
                              
     Thoughts on life..:"You're cold a very long time so be hot while you can"
     Favourite quote...:"If you where any more full of shit you would have an
                          extra arsehole!" - Myself
     
        
     Hardware owned: (Physically, partial list)
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     Commodore stuph (hey I was a kid, Wargames was da b0mb etc) 
     Vic-20, C16, C64, B128, C128, Amiga 500, Amiga 1000, Amiga 2000
     IBM Clone XT, AT, 386, 486, AMD 5x86, Cyrix 6x86 150mhz 
     
     W00ten Asteroids arrived at the pinball arcade/bowling alley!!
     guess who got to be the Asteroids king? hahaha prolly the last
     year I ever really 'played' games, started writing em then got
     bored with that real quick.. anyways ..
      
     None of this stuph stayed stock for long, used to have the machines
     (c64<>*128) etc nullmodemed together with a bogus kinda 'lan' thingy
     that run in interpreter C= mode heh hell I remember paying $950
     for a 7 meg (seven megabytes) HD for my C64 bbs and thought I kicked
     ass. Oh yah I've run various bbs'es and even wrote one for the C= 
     machines INCLUDING the Vic-20 , someone said it couldn't be done so
     i just HAD to prove the fuqr wrong. <g> NEC-V20 chips anyone?
     
     Thats it. I had way more but that would be secret, hardware is kinda
     like sex the more you have the more people know about you etc ..
  
     ;-)
     
     Wierd machines: IBM RS6000, Ohio Scientific multi-processor 6502
     Atari 2600, Coleco Adam, TI thingy, IBM wierdness from some bank
     etc .. the Ohio Scientific was interesting, nice 17" hd in there
     and all the patients records were still on it... hrm. bing! ^G
       
     =EoF
     =null pointer assignment
        
     Part ii: Computers 0wn3d: (the other kind of leasing to 0wn)
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 
     ********************************************************************* 
     * Disclaimer:                                                       *
     * ----------                                                        *    
     * All illegal activities on my part ended on 11:59pm of the date    *
     * of <insert your countries statute of limitations for minors here>.* 
     ********************************************************************* 
      
     Uhm, well mostly .edu, some .gov two .mil, Motorolla, oh and I had
     mad fun with Northern Telecom. this is all pre-1989 and thats all 
     i'm saying on this matter. I did NO damage at any time to any hw or
     sw on any of the systems i entered.
       
     Phone systems? (cool aren't they?)
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
       Good for making fone calls with and confs, carding? not into it but
      at least one of my friends went to juvi for in excess of $250k in 
      cc phraud. Several visits to dumb friends by security types got me
      bored in confs pretty quick, much more interesting things to do and
      see, especially now with cell and digital phones etc QSL?
  
      
      Q: Do you have any hints for anyone?     A:yes. and here they are:
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
       Depending on your goals if you want to survive as a person of some 
      repute AND be active then good luck. Meanwhile as an ethical hacker
      <coff> or security professional <sneeze> take  these rules to heart
      and memorize them, they're good, I wrote em. ;)
      
      <grin>
      
      note to self: stop smiling and grinning and shit so much
      self: fuck u thats me,live with it
      note to self: fine. see if I care.
      
          
          
      POP QUIZ !
      ~~~~~~~~~~    

      Section 1
          
      Q: Do you think you know what you are doing?
      A: Yes - See rules #1, #2 and #3 (thats ALL of them for you AOL'ers)
  
      Section 2    
      
      Q: Do you KNOW what you are doing?
      A: See rules #2 and #3 but think about #1 
  
      Section 3    
      
      Q: Did you answer yes to #2 buy feel a tinge of guilt, fear, terror
         or feel high? or a tingling in the thumbs or back of the neck?
      A: You're lying. Start again or go to bed and come back tomorrow.
         oh, and stop lying!
      
      THE RULES
      ~~~~~~~~~
      Rule #1:  If its illegal and you're over <insert age> don't do it!! 
      Rule #2,  Don't get caught!! <I didn't tell you to do it either!>
      Rule #3.  Did it and got away with it? well then wOOp for you, now
                keep your fucking mouth SHUT noone likes or even believes
                a braggart many people have been where you are now, its what
                you do NEXT that counts the most
                
       What do I do next?
       
       That depends, perhaps in a future article ....
            
      Q: Any parting comments?   A: Yes
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 
  
      Have a safe and happy whatever this December.
       
      oh, and read the article on by xd0pEr in section 6.3
      possibly also check out the cool pyschologicl profile of a hacker
      engine (work in progress) at hrm forget the url, will look it up.
      
      Q: Did you interview yourself for this 'bit' ??
      A: These bytes you mean?, perhaps some of it but noone was looking...
      
      Now piss off. ;-) 
      
      C*:.'98
       
       
      @HWA             
      

0.6  HWA FAQ v0.1 Dec 31st 1998/1999
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    Q: Who the hell is Ed? I see - Ed. *EVERYWHERE* who is he/she!?!?!
    
    A: We checked this issue out and indeed Ed is everywhere, people are
       currently looking for this person coz noone can possibly be every
       where at the same time, unless .. they are, could it be? gh0d???   
   
    Q: WTF is @HWA a copyright notice?
        
    A: No. @HWA and  @HWA'98 does not denote (c) 1998 its just a cool 'end of
       article marker' thingy like some real mags have (Boot, now MaximumPC
       Sysadmin etc ...) however the newsletter IS (c) 1998/1999 so pfft. 
      
    Q: Are you a girl or a guy?
    A: NFC

    Q: Are you gay?
    A: None of your business, fuck off. I *am* happy however.
   
    Q: What does AAM, EoF, EoD,NFC, NFR, PHAC, P/H/A/C/CC/CT/G/V/W, Plik!
       and etc mean??
    A: Check out your favourite search engine and do a search for those terms
       like "phac meaning" etc (If you're from AOL remove the quotation marks 
       when you type that in, those are the two little dot things that seem to
       hang in the air above letters, they look like skydiving sperm) 
   
    Some of the stuff related to personal useage and use in this zine are
    listed below: Some are very useful, others attempt to deny the any possible
    attempts at eschewing obfuscation by obsucuring their actual definitions.
      
    !=   - Mathematical notation "is not equal to" or "does not equal"
           ASC(247)  "wavey equals" sign means "almost equal" to. If written
           an =/= (equals sign with a slash thru it) also means !=, =< is Equal
           to or less than and =>  is equal to or greater than (etc, this aint 
           fucking grade school, cripes, don't believe I just typed all that..)      
    AAM  - Ask a minor (someone under age of adulthood, usually <16, <18 or <21)
   *AOL  - A great deal of people that got ripped off for net access by a huge
           clueless isp with seckurity that you can drive buses through, we're
           not talking Kung-Fu being no good here, Buy-A-Kloo maybe?
    EoC  - End of Commentary
    EoA  - End of Article 
    EoF  - End of file
    EoD  - End of diatribe (AOL'ers: look it up)
    CC   - Credit Card phraud
    CCC  - Chaos Computer Club (Germany)
    NFC  - Depends on context: No Further Comment or No Fucking Comment
    NFR  - Network Flight Recorder (Do a websearch)
    PHAC - And variations of same <coff> 
           Phreaking, Hacking, Anarchy, Cracking, Carding (CC) Groups Virus, Warfare
          
          Alternates: H - hacking, hacktivist
                      C - Cracking <software>
                      C - Cracking <systems hacking>
                      W - Warfare <cyberwarfare usually as in Jihad>
                      CT - Cyber Terrorism
    TBC - To Be Continued also 2bc (usueally followed by ellipses...) :)
    TBA - To Be Arranged/To Be Announced also 2ba
    
A.L AOL. "We're better than a shoe up the arse from Henry Rollins!" - Steve Case
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    AOL has even sparked a new movie along the lines of 'Sleepless in Seatle' or
    was it 'Where Eagles Dare'? hrm.. anyway its called 'You should bail!' and
    infers that everyone on AOL are morons and should dump AOL for a real ISP.
    Be sure to check it out at your local theatres now (or soon). - Ed <- look
    there the fuqr is again!
    
    AOL - The Angry Overpriced Lamer network is one of the worlds largest
          networks next to the one in my room, and runs of millions of
          .007 BogoMIP 8086's with Nec V20 mods. But seriously check out
          this url to see why you are being screwed:
          
    <BeG> - Big evil grin
    <bg>  - Big Grin
     
    Figure the rest out amongst yourselves, 'hack' the answer or try socialing
    it out of someone on #hackphreak or #hax* etc ... (#irchelp works too)      
          
    http://www.aolsucks.com/ Why AOL sucks. Damn Good informative site.
    it made ME drop MY 9e99 hacked accounts immediately <hahaha> no not
    really. AOL is lame period.
    
    Small excerpt from the site:
    
    
    {
    
    America Online - Your Security 

    America Online's service, designed originally to handle about 30,000 users, is now
    serving millions. As a result, many of its flaws are coming out into the open -- one
    of the most prominent has been AOL's almost nonexistant security. In this mirror
    of the original AOL Security site, find out how it is that the AOL hacker
    community knows more about the service than AOL itself. 

    AOL: A Spammer's Paradise 

    Virtually every AOL member wages a day-to-day battle with unsolicited
    commercial junk mail. Is AOL doing all it can to stop its flow? Not a chance.
    AOL equips its users with nearly useless mail filtering options which do nothing but
    make spammers get a new domain name every day. In the process, AOL has
    made it easier and easier for spammers to build junk mail lists, and has done
    nothing to stop that "harvesting" beyond making it a TOS violation. 
    
    }
    
    (TOS = terms of service - Ed)
          

    EoA
    
    TBC...
    
    @HWA'99 
    
0.7  Inspirations and turn ons / turn offs for 1998    
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     
     Inspirations / turn ons etc:
     
     
     Official drink is .......... Coke Classic (obviously not Jolt)
     Best album release ......... Celebrity Skin/Hole
     Best music of the year ..... 'I think i'm Paranoid'/Garbage
                                  'Pure Morning'/Placebo       
                                  'Dragula'/Rob Zombie
                                  'Don't like the drugs..'/Marilyn Manson
                                   
     Joke of the year............. "The Apple Imac"               
     
     `Turn ons':
     ~~~~~~~~~~~                    
 
     Videos ..................... Pure Morning/Placebo
                                  *!*@/Bif
      				  *!*@/Hole
                                  Garbage
                                  Dragula/Rob Zombie
                                  Dope Show/Marilyn Manson
                                  Sparkle and Shine/Econoline Crush
 
     IRC network ................ Eris Free net (EFnet)
 
     TV ......................... Cable 87 (Rogers) ;-)
                                  Matrix
                                  7 Days
                                  X-Files
                                  The Net
                                  vR.5
                                  Fromage98 (and it isn't even on yet)
                                  
     Movies ..................... X-files (Wow! a long episode)
                                  Star Trek: Insurrection                             
                                  
     Hacktivist Group ........... Zapatista's 
     Hacker ..................... Kevin Mitnick
     Corporation ................ BMG (http://www.bmg.com/) nice site too.
                                  godmart (Sandles, staffs Connection Machines etc)
     
     "mega is just a short form for megamanic I guess" - Eatons Ad

     
     `Turn offs':
     ~~~~~~~~~~~~
     
     Videos ..................... Dunno, don't watch shit videos, only good ones.
     .
     IRC network ................ Uhm you know the one(s)
 
     TV.......................... TV , just turn it off period.
     				  Millennium, X-Files etc suck now most times
     				  they can't stick to a story, think they have
     				  ADHD.. hrm.
                                  CNN (Ya nice war dickweeds)			  
                                  Fromage98 (and it isn't even on yet)
                                  
     Movies ..................... X-files (Wow! a long episode)
                                  Star Trek: Insurrection                             
                                  
     Hacktivist Group ........... Zapatista's
     
     Hacker ..................... NFC
     
     Corporation ................ Go on take a guess. hrm lessee there are so 
                                  many of em... Mircosloth and AOL will do tho.
                                  
     NFC ........................ Bill Clinton's predickament
                                  War on Iraq the sequel Desert Fox (Desert fox off)
                                  Bombing Civilians     		 	
                                  
                                       	  
     @HWA     
     
     
1.0  Greets!?!?! yeah greets! w0w huh. - Ed
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     
     Thanks to all in the community for their support and interest but i'd
     like to see more reader input, help me out here, whats good, what sucks
     etc, not that I guarantee i'll take any notice mind you, but send in 
     your thoughts anyway.
     
     
     Special shoutouts to:

       * Kevin Mitnick (what can I say? hang in there man.)
       * demoniz
       * The l0pht crew
       * Weld Pond 
       * Ken Williams
       * Dicentra
       * Pyra 
       * Vexxation
       * FProphet
       * TP
       * The NeMstah Meistah
       * sAs72
       * R.Stevens (hi, nice house Robby!!)
       * V.D
       * D.B
       * all the people who sent in cool emails and support
       * Me, myself and I and everyone who reads this for whatever reasons.
     
     + http://www.l0pht.com/
     + http://www.2600.com/
     + http://www.legions.org/
     + http://www.genocide2600.com/     
     + http://www.hackernews.com/ (Went online same time we started issue 1!)     
    
     
     Prolly more next time. ;-) have to get ppl's ok first <grin> you know 
     who you are fuqrz. heh. PliK!
     
     Fuck off's to: Those certain turn-coats and double dealing scumbags,
     you know who you are and what goes 'round comes round. Hi Jay! wtf
     you doing reading this?? fuck off!
     
     
     "I f*c!<ing hate krad l33t sp3ak and b4nners but wtf its kinda fun" 
  					- Anonymous
     
      Well seems some of my friends like what i'm doing and are offering some
     of their resources to help things along, some server space new emails and
     a place to try out stuff on our local lan safely and uh legally <g> will 
     now be easier and more fun. Hell we even have a PoBOX snail mail address
     that has been graciously 'donated' to us, so send in those post cards and
     photos of your leet xmas private h0h0 con's etc ... ;-)
     
     See section 0.4 for our mail drop.
     
     @HWA'98/99
     

1.1  Last minute stuff, rumours and newsbytes
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


    +++  Keen Veracity has released issue #6, check it out 
         I got mine from a site off the main page at Bikkel, 
         it wasn't available on the site listed and LoU is
         renovating so ...
         
         Come get it here:
         http://members.tripod.com/~hwa_2k/keen.html
    
    +++  From 100% Pure Bikkel:
      
         Hacker gets hacked
         update by demoniz at Dec 28 , 12:25 CET

         LoRD OaK, the 'hacker' who defaced CyberArmy recently tries to keep
         the dispute between him and the webmaster of CyberArmy alive. He
         wrote 100 % Pure Bikkel: "I donno if it matters or not, but if you go
         to cyberarmy's webpage, it says the source was being "handed out" by
         someone. That someone is me and the webpage it was located at is
         www.confine.com under CGI-Warez. Also their script was already
         copyrighted and it is the EXACTLY the same script like word for word."
         No script at Confine.com, but a hacked site. One who hacks, gets
         hacked. 

         Archive of the site is available at http://hacknews.bikkel.com/
         
         ** Confine Web site http://www.confine.com
   
         ** When I tried reaching this site on the 28th at 12:01 EST it
            was unreachable - Ed
            
          
         Text reads (formatting not preserved, see Bikkel's archive): 
         
         " Milw0rm,   this site was hacked f0r a reas0n.   One 0f are small
          time friends n0t stating any names was hacked by a s0 called l0rd 
          0ak. the wrath will be felt. give sh0t 0uts to all my br0ther's in
          milw0rm and als0 t0 kingdem0ni0

          hacked by milw0rm J.C."
          
         ** 01:00am EST Friday i'm too busy. & a tad tired, so threw the rest
            of the zine together at the last minute as usual and tossed it up
            on the web. See you  on the 13th... now to send the word out..    
            and back to work on issue #4 <bg>
          

         
    @HWA'98         
    
1.1a WWW.EHAP.ORG
     ~~~~~~~~~~~~
 
      EHAP stands for Ethical Hackers Against Pedophilia. Watch for a 
     feature article on this organization in an upcoming issue. I just
     wanted to put this in this issue coz while some people are sitting
     around the xmas tree opening prezzies that santa left them, somewhere
     someone is being buggered or sodomized. That act is then being 
     photographed, scanned and spread on the net. This must be stopped.
     And EHAP has some ideas on how to do just that. - Ed

     From http://www.ehap.org main page December 31st 1998:
     
     12.02.98    Japan criticized for slack policing of Internet CP
     
     December 02, 1998

     TOKYO -- Hundreds of pornographic images of children flood
     Internet sites with addresses ending in "jp." It's a tip-off that they
     originate in Japan -- and that there is basically nothing officials can
     do about it. With no laws explicitly banning child pornography, Japan
     has acquired the dubious distinction of being the global leader in the
     fast-growing Internet child pornography business. Japanese police
     say there are about 1,200 commercial child pornography Internet
     sites in Japan. Some feature photos of children from Japan, others
     of Southeast Asian children. Keiji Goto, a senior official at the
     National Police Agency, said police are frustrated by cases in which
     they identified the source of a pornographic site but were unable to
     take further action.      

     Full story:
     http://detnews.com/1998/technology/9812/02/12020238.htm
     
     
1.1b CHINESE HACKERS/CRACKERS GET DEATH SENTENCE!
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     
     December 28th 8:55am PST
     Story sourced from:: Wired News 
     http://www.wired.com/news/news/email/explode-infobeat/politics/story/17039.html

     CHINESE CRACKERS GET DEATH SENTENCE

     Editor Comments:

     Just picked this up by Wired News ... not a nice story for this "xmas 
     special" Is this what the world is coming to? some countries don't fuck 
     around with ANY sort of anti-government sentiment, this is a classic example
     especially to 'the newbie contingent' to be damn sure you KNOW WHAT YOU'RE 
     GETTING YOURSELF INTO and be sure to cover your ass/tracks or you may get 
     something pushed up there, or even worse, be terminated 
     
     <bang><bang<bang>
     
     USERS TERMINATED BY FOREIGN HOST

     The Story:
     Chinese Crackers Get Death (Reuters 8:55 a.m.  28.Dec.98.PST)
     
     SHANGHAI, China -- Two crackers who broke into a bank computer network 
     and stole 260,000 yuan (US$31,400) have been sentenced to death by a court
     in eastern China, the official Wenhui Daily said on Monday.  

     Hao Jinglong, formerly an accountant at the Zhenjiang branch of the 
     Industrial and Commercial Bank of China, was condemned to death, as was his
     brother, Hao Jingwen, the newspaper said. The Yangzhou Intermediate Court 
     in Jiangsu province also confiscated 40,000 yuan from Hao. 

     The two opened 16 accounts under various names in a branch of the bank in
     September and later broke into the branch to install a controlling device
     in a bank computer terminal, the newspaper said. 

     They used the device to electronically wire 720,000 yuan in non-existent
     deposits into the bank accounts. Afterward, they successfully withdrew
     260,000 yuan from eight different branches of the bank, the newspaper
     said. 

     All the money has since been recovered, the newspaper said, without giving
     further details. 
                     
     Copyright� 1998 Reuters Limited. 
     
     [EoA-1]
     
     
     Source: http://www.humanrights-china.org/
     Contrib: Ed
     
     Two sentenced for subverting state
     Author: <unknown>

     THE Chinese courts yesterday sentenced two men convicted of subverting 
     state power to 13 and 11 years in prison respectively. Xu Wenli, a 
     Beijing resident, and Wang Youcai, of East China's Zhejiang Province,
     also received a three-year deprivation of their political rights from
     the Beijing No 1 Intermediate People's Court and the Intermediate 
     People's Court of Hangzhou, capital of Zhejiang. 

     Both Xu and Wang previously served prison terms in China. 

     In an open trial yesterday, the Beijing No 1 Intermediate People's Court
     found that in November this year, with the purpose of subverting state 
     power, Xu secretly planned the founding of the so-called "Beijing and 
     Tianjin Regional Party Committee of the China Democratic Party," 
     formulated this illicit organization's constitution, and served as its
     chairman. 

     The court also found that Xu made efforts to recruit party members, 
     planned to convene a national party congress, and sought and accepted 
     funds from some hostile overseas organizations in order to organize, plan
     and conduct subversive activities. 

     It was also proven by court investigation that from November 1997 to April
     1998, Xu used various means to stir up subversive activities. After hearing
     opinions from the prosecutors and the defence, the court ruled that in 
     accordance with relevant stipulations in China's Criminal Law, Xu's 
     activities constituted the crime of subverting state power, and he should 
     be punished according to law as both a principal element in the case and a
     recidivist. 

     In an open trial in Zhejiang, the Intermediate People's Court of Hangzhou 
     found that in June this year, with the purpose of subverting state power, 
     Wang secretly planned to found an illicit organization called the "China 
     Democratic Party," formed a "Zhejiang Preparatory Committee for the China
     Democratic Party," and formulated a party constitution and a declaration. 

     The court also found that in order to organize, plan and conduct subversive
     activities, Wang contacted some hostile overseas organizations, from which 
     he sought and accepted financial support. 

     After hearing the opinions of the prosecutors and the defence, the court 
     ruled that in accordance with relevant stipulations in China's Criminal Law
     Wang's activities constituted the crime of subverting state power, that the
     crime was severe, and that he should also be punished as a recidivist. 

     Xu and Wang families and people from various walks of life attended yesterday's
     court hearings. (Xinhua)

     Date: 12/22/98
     Author: 
     Copyright� by China Daily 
     
     [EoA-2]
     
     
1.1b LoU declares war ,,,just do it right guys.
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

     From HNN http://www.hackernews.com/   
     

    " War declared on China and Iraq "


     contributed by Legion of the Underground 
     In a very heated and emotional discussion Legion of the
     Underground declared cyber-war on the information
     infrastructure of China and Iraq last night. They cited
     severe civil rights abuses by the governments of both
     countries as well as the recent sentencing to death of
     two bank robbers in China and the production of
     weapons of mass destruction by Iraq as the reasons for
     their outrage. 
 
     Quoting from the Declaration of Independence about the
     right of the people to govern themselves and stating
     that the US government will probably stand idly by while
     these atrocities happen in other countries the Legion of
     the Underground called for the complete destruction of
     all computer systems in China and Iraq. 
 
     "The Government controls what goes into our mouths
     lets not let them do the same with what comes out!"
     said one LoU member during a press conference held on
     IRC Monday night. 
 
     LoU mentioned that they may seek out assistance in
     their war from the Hong Kong Blondes. The HKBs are a
     well known group attempting to cause mayhem on
     China's internetworks from within the Iron Curtain. The
     HKBs where trained and assisted, until recently, by the
     infamous Cult of the Dead Cow hacking group. 

     Legion of Underground gained previous notoriety back in
     October for defacing the Chinese Human Rights web site
     a day after it went online. 

     Legions of the Underground
     CNN - article on bank robbers sentenced to death
     http://www.cnn.com/WORLD/asiapcf/9812/28/BC-CHINA-HACKERS.reut/
     
     [EoA-3]
     
     Read the Wired News coverage its better but here's part of CNN's
     Reuters blurb:
     
     China sentences hackers to death for
     bank theft

     December 28, 1998 
     Web posted at: 3:09 AM EST (0809 GMT) 

     SHANGHAI, China (Reuters) -- Two hackers who broke into a bank
     computer network and stole 260,000 yuan (31,400) have been sentenced to
     death by a court in eastern China, the official Wenhui Daily said on Monday.
     
     ...
     
     They used the device to electronically wire 720,000 yuan in non-existent
     deposits into the bank accounts. Afterwards, they successfully withdrew
     260,000 yuan from eight different branches of the bank, the newspaper said.

     ...
     
     Copyright 1998 Reuters. All rights reserved. 
     
     ** "This material may not be published, broadcast, rewritten, or redistributed"
     
     [DoA-2]
        
     ** ok, i'll just note some of it then ... - Ed ;-)
     
     
     HWA Comments:
     ~~~~~~~~~~~~~
     
     Great fun, glad i'm not living in China, give these fuckers some shit guys!
     take the damn infrastructure down. We can NOT let this sort of thing go on
     Kevin Mitnick gets 3yrs with no trial and China is fucking killing people,
     this is now open cyber-war. Thats what they want?, thats what they're going
     to get. 
     
     Prepare for armageddon. Is an electonic world war imminent?
     - Ed
     
    
     http://www.humanrights-china.org/
     
     @ HWA'98     
     
1.1c  HWA Mirrors Keen Veracity
     ~~~~~~~~~~~~~~~~~~~~~~~~~
     The site had me going for a bit there, most amusing, we thought you'd been
     hacked for like 25ms, anyways theres an insiduous hack for you, put that on
     a real hacked page and ppl will think ah, sysadmin's just having some fun..
     hrm. And my Santa's Credit Report section is from a real cc report too. :)
     
    
     http://members.tripod.com/~hwa_2k/keen.html     
     
     Jan 1st 1999
     ~~~~~~~~~~~~
     
     http://www.legions.org/ 
     
     The LoU site greeted users with the following screen:
     
     <snip>
     
     Welcome

     to the Legions of assistance for Sick, and disfunctional children. We are currently working side by side with the Feed the Children Foundation aswell as The
     Childrens Hospital Network. Our site is under construction. Please check back soon... 

     Please visit one of our Sponsors: Childrens Hospital Feed the Children

     We are a non-profit organization

     Read the source, and you shall be FREE! 
     
     <snip>
     

     With links to
     http://www.childrenshospital.org/
     http://www.feedthechildren.org/
     
     The relevant section in the source was this:
     
     <!---this is actually a ploy.  Legions is here and still in effect,  and 
      as soon as we finish our new site we'll be back at ya..  LoU--->
      
      FYI "<!--" is a comment line that most browsers not still in the stoneage
      recognize as a 'hide this text' tag. - Ed
     
     
     @HWA'99
     
     
2.0  From the editor:
     ~~~~~~~~~~~~~~~

     START
     ~~~~~
     
      This file is much too big and sort of wanders around a bit, sorry 
     about this i've been gathering info as per usual and sometimes its
     difficult to 'hold on' to some material for later release. Anyway
     I hope you enjoy this issue, and bear with us while we try and get
     things organized into an effective well tweaked digest.
     
     Oh ya, happy new year... and best of whatever you celebrate to those
     celebrating this December. I know Orthodox Macedonian Christians
     celebrate on Jan 7th as the birth of Christ since they use a different
     calendar but there I go wandering again, its late, or early and time
     to shut this baby down. ttys... next issue Jan 13th 1999. l8z.
     
     - Ed
     

     Congrats, thanks, articles, news submissions and kudos to us at the
     main address: hwa@press.usmc.net complaints and all nastygrams and 
     mailbombs can go to /dev/nul nukes, synfloods and smurfs to 127.0.0.1

     danke.

     C*:.


     @HWA'98/99    

2.1  Email and commentary
     ~~~~~~~~~~~~~~~~~~~~     
     <deleted> Time constraints, its a 'special' y'know ... - Ed


2.2  Update on the death of Tron of the Chaos Computing Club (Germany)     
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      This is very old and tragic news but we have been waiting for the
     "official" results of the CCC's investigation to be released before
     getting into any real detail on this topic. Tron was one the best
     and most respected hackers in Europe.
      
     Wired has this story:
     
     Source: Wired News Site
     Author: David Hudson
     Email :dwh@berlin.snafu.de
     Contrib: Ed
 
 
     Berlin Prepares for Chaos
     by David Hudson 
    
 
     3:00 a.m.  24.Dec.98.PST
     BERLIN -- When Germany's legendary Chaos Computer Club convenes here
     on Sunday for its 15th Congress, the atmosphere may be more emotionally
     charged than it has been in years. 
 
     The CCC's annual meeting between Christmas and the new year has been a
     holiday tradition since the early 1980s, when hackers and hobbyists 
     would show up to trade tips and passwords. Last year, over 1,500 
     converged on a humble school building in Hamburg for three days of hacking
     workshops, and lectures on topics ranging from lockpicking to social
     engineering to the history of German Net culture. 
 
     Late in October, however, one of the CCC's most accomplished hackers, 
     Boris Floricic, who had taken the name Tron, was found dead, hanging from a
     belt strung from a tree in a Berlin park. He was 26. 
     
     (This sounds like auto-erotic asphyixiation to me but that could be 
      staged and the Police would know this too... - Ed )
 
     The mysterious and as yet unsolved case is eerily reminiscent of the death 
     of another CCC associate, Karl Koch, nearly 10 years ago. Indeed, Berlin 
     police were quick to call Tron's death a suicide, as Koch's had been. But
     the CCC, as well as Tron's family and friends, have vehemently denied that
     suicide was even remotely in his nature. 
     
     Unlike Koch, Tron was not only a well-balanced personality but also a
     brilliant hacker. He was the first European to hack phone cards so that 
     they could be used freely and forever, and had figured out a way to make
     ISDN phone calls tap-proof. 
 
     "Often, he was the focus of attention,"  remembers Heinrich Seeger, a 
     Hamburg journalist who has covered many CCC congresses. "I guess one of 
     the reasons for that, aside from his undebatable genius and expertise, 
     were his good looks and his charm, which made him stand out." 
 
     Despite ruling the death a suicide, Berlin police have assigned eight 
     officers to investigate, noting more than a few oddities about the case.
     Although Tron appeared to have hanged himself, for example, his feet were
     firmly on the ground. German newspaper and television reports have suggested
     that considering the potential value of Tron's knowledge of smartcards and
     telephony, organized  crime may have been involved. 
 
     Two hours are slotted on the very first evening of this year's CCC Congress 
     for a presentation of what is known about the case, as well as a discussion 
      of the dangers in cracking valuable secrets. "We know the police will be there,
     but they won't be presenting any information," says CCC spokesman Andy
     Mueller-Maguhn. "Our position has always been not to do or say anything that
     would hinder their investigation." 

     Nevertheless, given the CCC's firm and publicly stated conviction that Tron 
     was murdered, the evening session will hardly be a dispassionate one. "I'm 
     anxious to know if the CCC's version of his death differs substantially from
     the police's," says Seeger. 

     The CCC had already planned to convene in Germany's future capital rather 
     than Hamburg before Tron's death, but now, with the fact that Berlin was also
     his hometown, this Congress promises to be more intense and more somber than 
     the others preceding it. 
    
     EoF
                     
     Go to the Wired site for related links in the mainstream media
     on this and other related stories.
     
     If you have any further hints or tips or sources to offer please do so
     also i'd like to request any news paper clippings from outside the US and
     Canada to be sent to our new snail mail drop (Postal Box), much appreciated.
     
     Thanks - Ed
     
     @HWA
                      
     
2.3  See SANTA nude.
     ~~~~~~~~~~~~~~~
     The link is on my site, check it out, hint SiN has something to do
     with it. <BeG> <- thats big evil grin for those not in the know.
     
     Not there anymore? no prob check here: 
     http://members.tripod.com/~hwa_2k/santa-sin.gif     
     
2.4  The cDc severs all connections with the Hong Kong Blondes.
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     From http://www.hackernews.com/
     
     Sorry Source of this is unknown: Think it was some little no-name
     place like CNN or Wired or something.... 
     
     Background article:
     WHO are the Blondes anyway?
     Author: Arik Hesseldahl (c) 1998 (?)
     
     Hacking for Human Rights?
     by Arik Hesseldahl  

      9:15am  14.Jul.98.PDT
      The reclusive leader of a Chinese hacking group
      that last year claimed to have temporarily disabled
      a Chinese satellite is now forming a new global
      hacking organization to protest Western
      investment in the country. 
      
      In an interview with the Boston-based hacking
      collective, the Cult of the Dead Cow, the hacker,
      who calls himself Blondie Wong, said the new
      group is forming in the US, Canada, and in Europe
      to take up the cause of fighting human rights
      abuses in China. 
      
      Wong, a dissident astrophysicist living in Toronto,
      said that the new group -- known as the Yellow
      Pages -- plans to target companies doing
      business with China, and possibly attack their
      computer networks. 
      
      "Many of these companies have computer
      networks and there are a lot of members in the
      Yellow Pages who have excellent hacking skills,"
      Wong said. 
      
      The interview was conducted by a former United
      Nations consultant known only as Oxblood Ruffin.
      The group provided Wired News with an advance
      copy of the interview. 
      
      In the interview, Wong seemed unconcerned about
      any damage or monetary losses that might result
      from a network attack carried out by the Yellow
      Pages. 
      
      "Human rights is an international issue, so I don't
      have a problem with businesses that profit from
      our suffering paying part of the bill," he told
      Oxblood. 
      
      As leader of the Hong Kong Blondes hacking
      group, Wong has the credentials to back up his
      threats. With members operating inside and
      outside of China, the Hong Kong Blondes claim to
      have found significant security holes within
      Chinese government computer networks,
      particularly systems related to satellite
      communications. 
      
      The group claims it first announced itself to the
      government in Beijing last year by temporarily
      disabling a Chinese communications satellite -- an
      incident never confirmed by the Chinese
      government. 
      
      Since then, the group has threatened to cripple
      certain Chinese military and security networks if
      human rights issues in China reach what they
      decide is a critical point. 
      
      Members of the Cult of the Dead Cow said that the
      organization began advising the Blondes on strong
      encryption and network intrusion at the annual
      "Beyond Hope" hacker conference held in New
      York last August. 
      
      In the interview, Wong details how he saw his
      father stoned to death by members of the Chinese
      Red Guard during the Cultural Revolution, the
      period of political chaos that engulfed China during
      the 1960s and '70s. 
      
      Later, as a student attending an unspecified
      university in the Great Britain where he was
      studying to become a teacher, Wong describes
      watching televised images of the 1989 massacre
      at Tiananmen Square. 
      
      "When the tanks went into the square and began
      shooting and running over people, it was like I was
      a little boy again, watching my father being killed,"
      he told Oxblood. 
      
      Wong claimed that the Hong Kong Blondes has
      doubled in size, with 42 active members operating
      in China and other countries. Many of the group's
      newest members are Chinese government
      employees, whom Wong describes as "technical
      people." 
      
      One member, a female hacker known as Lemon
      Li, was detained earlier this year and has since
      been moved to Paris with the help of a group
      Blondie described only as "a group of people even
      more outside the law than we are." The same
      group provides Wong with an armed escort
      wherever he goes. 
      
      The interviewer, Oxblood, said he knows little
      about the origin or membership of the Yellow
      Pages, other than that the organization was
      founded recently by students at Cal Tech. 
      
      "Blondie wants anyone who agrees with the
      strategy of attacking American companies doing
      business in China to get involved," Oxblood said.
      "So starting new chapters is really up to whoever
      gets inspired, making membership open to
      anyone." 
      
      Sun Microsystems, Lucent, Motorola, Yahoo, and
      Excite are among a growing number of American
      companies active in China. 
      
      As for any current or future activities of the Hong
      Kong Blondes, Oxblood said the group has been
      patiently watching and waiting. 
      
      "They have gotten to the point where they can
      pretty much hack everything that is up and
      running. [Wong] is pretty tight-lipped about what
      he's got planned. I would say though, that the
      Blondes have the capacity to snap the backbone
      of the Chinese end of the Net." 
     
     

3.0  Dec 22nd: SANTA'S CREDIT INFO SPREAD BY DISGRUNTLED ELF
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   
   Just before Christmas this year HWA has learned that due to layoffs at
   the prestigious Santa's North Pole Workshop (SNPW)
   
   
   *** leetguy has changed the topic on channel #leetchan to HWA.hax0r.news Christmas issue will have Santas
    +credit info & dox!

   
   SANTA'S TRW (EXPERIAN) CREDIT DOX - Submitted by s4ntaSUx (A. Disgruntled Elf)

   ************************** TRW CONSUMER CREDIT REPORT **************************
   *                               consumerinfo.com                               *
   *                                Ref: 100000001                                *
   ***************** Dept: CUSTOMER SERVICE / Queued by: SUPERVISOR ***************

   DATE:06-30-1997    TIME:13:13:43    SUBJECT ID:

   CONSUMER,SANTA N CLAUS
   AA-10777 N POLE ST/NORTH POLE AA 11209;
   U-CONSUMERINFO,T-01,V-06/999/8.00,H-Y;

   PAGE 1   DATE  22-12-98  TIME 23:13:34  PCB29  V401  TCA7

    SANTA NICHOLAS CLAUS             SS: ###-##-####     E: ELF EMPLOYED
    XXX N POLE ST                        ###-##-####*    XXXX E POLE ROAD 
    NORTH POLE AA 11209-1234             ###-##-####*    SOUTH POLE
    RPTD: 11-94 TO 3-97 U 3X         YOB: 1731           RPTD: 3-1792 I
    LAST SUB: #######
                                                         E:BELL ATLANTIC
   *2600 BOWSER ST  12                                   111 MAIN STREET
    LOS ANGELES CA 90017-9876                            BURBANK CA 91503
    RPTD: 2-92 I                                         RPTD: 10-90 TO 2-91 I

   *SANTA CLAUS, SATAN CLAUSE, JACK D RIPPER

    ------------------------------ PROFILE SUMMARY -------------------------------
                                                                   CNT 04/01/01/20
    PUBLIC RECORDS-------3  PAST DUE AMT------$956  INQUIRIES---3  SATIS ACCTS---2
    INSTALL BAL----$30,630  SCH/EST PAY-----$1,431  INQS/6 MO---2  NOW DEL/DRG---2
    R ESTATE BAL-------N/A  R ESTATE PAY-------N/A  TRADELINE---5  WAS DEL/DRG---1
    REVOLVNG BAL-------$50  REVOLVNG AVAIL-----96%  PAID ACCT---1  OLD TRADE--1-68

    ------------------------------- PUBLIC RECORDS -------------------------------
   *SO CALIF DISTRICT COURT  11-20-92  12-01-93  3011111    $12,450    CO LIEN REL
    C#: 45078321                 1   BP: B476P2109

   *COUNTY SPR CT SANTA ANA   2-19-92            3019999     $1,200    CIV CL JUDG
    D#: 7505853                  1   PLAINTIFF: ALLIED COMPANY
    BP: B1234P50987

   *U S BANKRUPTCY COURT      6-10-91            3009999     $8,500-L  BK 13-PETIT
    D#: 35054539906234561        2                         $100,000-A        VOLUN

    ----------------------------------- TRADES -----------------------------------
    SUBSCRIBER                 OPEN    AMT-TYP1    AMT-TYP2 ACCTCOND   PYMT STATUS
    SUB#   KOB TYP TRM ECOA BALDATE     BALANCE  PYMT LEVEL  MOS REV  PYMT HISTORY
    ACCOUNT #               LAST PD   MONTH PAY    PAST DUE  MAXIMUM    BY MONTH

   *CREDIT AND COLLECTION      9-96      $500-O                           COLLACCT
    ####### YC UNK UNK  2   4-05-97      $250        9-95       (20) 9999999999999
    ############                                                      9999999
    ORIGINAL CREDITOR:  DR. JOHN KILDARE

    HEMLOCKS                   2-96      $900-L      $500-H   CLOSED     CURR ACCT
    ####### DC CHG REV  3   6-01-96        $0        2-96       (17) BNCCCCCCCCC-C
    #############                                                     CNNC

   *MOUNTAIN BK                3-94   $43,225-O                 OPEN    30 3 TIMES
    ####### BI SEC  60  2   5-17-97   $19,330        5-97       (39) 1CCCCCC1CCCCC
    ######################     4-97      $956        $956     2-95/1  CCCCCCCCCCCC
    ###############

   *BAY COMPANY                1-68    $1,400-L    $1,200-H     OPEN    CUR WAS 90
    ####### DC CHG REV  3   5-16-97       $50        3-97       (99) C0C321CCCC000
    #########                  3-97       $10-E                       CCCCCCCCCCCC
    **ACCOUNT WAS IN DISPUTE-NOW RESOLVED-REPORTED BY SUBSCRIBER**

    CENTRAL BANK              12-94   $22,350-O                 OPEN     CURR ACCT
    ####### BI AUT  48  1   6-15-97   $11,050       12-94       (31) CCCCCCCCCCCCC
    ###########                5-97      $465                         CCCCCCCCCCCC
    COLLATERAL:  1995 FORD TAURUS

    --------------------------------- INQUIRIES ----------------------------------
    HEMLOCKS                5-05-97  ####### DC
    BAY COMPANY             5-03-97  ####### DC     $1,500 CHG REV
    HILLSIDE BANK           3-21-96  ####### BC

    --------------------------------- MESSAGES -----------------------------------
    SSN MATCHES

 
   IF YOU FEEL THERE ARE INACCURACIES IN YOUR EXPERIAN CREDIT REPORT, CALL
   TOLL-FREE 1 (800) 567-5470.  THE EXPERIAN CUSTOMER SERVICE REPRESENTATIVE
   WILL ASK YOU FOR YOUR MEMBERSHIP NUMBER, AND YOU SHOULD RESPOND WITH, "THIS
   IS IN REGARD TO MY CONSUMER REVIEW SERVICE REPORT."   THE REPRESENTATIVE
   WILL THEN PROMPTLY ASSIST YOU.



    END -- EXPERIAN  



3.1  Dec 21st: REMOTE EXPLORER NT VIRUS/TROJAN HITS MCI
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  
     MCI was hit by a new virus targetted presumeably only at NT systems
     called the Remote Explorer..Dec 21st

     Contributed by: Dicentra   
     Also contrib'd by others but not all the same stories...

     Thanks Dice for coming up with the best/most details for me, 
     
     http://www.nai.com/products/antivirus/remote_explorer.asp  ($)
     Main site: http://www.cnn.com/  
     Section: http://www.cnn.com/TECH/
     Story: http://cnn.com/TECH/computing/9812/22/ntvirus.idg/index.html



     Update: Tuesday, 22 Dec 98, 04:53:29 PM EST 

     "MCI WorldCom network virus may be inside job"

     A new strain of computer virus that attacked MCI WorldCom's internal
     business network of NT servers may have been started by a disgruntled
     employee, MCI WorldCom has acknowledged.
  
  
     -=[ Full Story Below ]=-


     MCI WorldCom network virus
     may be inside job 

     Telecom giant calls in Network Associates' emergency response team to
    stop virus from spreading.

    (Updated) December 22, 1998 Web posted at: 4:10 PM EST 

    by Ellen Messmer 

    (IDG) -- A new strain of computer virus that attacked MCI WorldCom's
    internal business network of NT servers may have been started by a
    disgruntled employee, MCI WorldCom has acknowledged. 

     The company, which is in the midst of layoffs, said they are 
    investigating the possibility of an inside job. The strain, which is 
    believed to be the first NT-hosted virus, was first detected last 
    Thursday. It corrupts files and encrypts data, making them unreadable. 

    MCI WorldCom spokesman Jim Monroe, who declined to offer much detail
    about the virus attack, claimed that it "has had no serious impact on 
    MCI's ability to deliver service to its customers." However, Network 
    Associates, whose antivirus emergency response team was called in to 
    help MCI WorldCom with the incident, said that the virus, dubbed Remote
    Explorer, wreaked havoc on files in hundreds of desktop computers 
    connected to MCI's large NT-based network. 

    "We've never seen anything like this in 10 years of doing business," 
    said Peter Watkins, general manager in the security division at Network
    Associates, about Remote Explorer's modus operandi. Network Associates
    believes it is the first totally NT-hosted virus that spreads by 
    exploiting a network's features in order to corrupt files or lock them
    up through encryption. Weighing in at 125 kilobytes, the virus acts like
    a network administrator run amok. In fact, the artfully crafted virus was
    probably deployed on an NT server within the unlucky organization by an 
    inside employee, say Network Associates experts still studying the case.
    But it remains unclear whether Remote Explorer can penetrate an organ-
    -ization without inside help or if this malicious code is yet up on 
    hacker Web sites. 

    "This is a very sophisticated virus written by a knowledgeable person 
    familiar with business processes," explained Vincent Gullotto, manager of
    the Network Associates antivirus emergency response team. "It's the
    first NT-hosted virus we've seen, and the virus uses the network to spread
    into the NT programs." 

    Remote Explorer, which has to somehow be installed in the NT driver 
    subdirectory, acts  like an NT remote management monitor, sits in on 
    sessions, gathers data and impersonates a network administrator, Gullotto 
    said. "The virus emulates a network administrator and gives itself as many
    rights as it can." The virus is intrinsically different from any other 
    virus spotted before because it doesn't spread through more traditional
    means, such as floppies, or through e-mail as macro viruses do. 

     "If you discover it, it won't let you get rid of it by just shutting
    it off," Gullotto  warned. The virus, formally called 4.03r.sys, carries
    a Microsoft DLL with it, and if you try to delete it, it simply creates 
    another DLL. The Remote Explorer virus corrupts HTML and other types of 
    files through data-compression routines or encrypts them so they can't be
    read. It does not, however, appear to actually delete the files it attacks
    or to cause other mischief, such as reformatting a hard drive. 

    The virus was designed with a time routine that causes it to do damage
    between 3 p.m. and 6 a.m., as well as all day Saturday and Sunday-times
    when few people may notice it on a binge. 

    "It corrupts data so it's not usable, but we have developed a cleaner to 
    cope with this," Gullotto noted. Network Associates is updating its 
    VirusScan product with an antidote to counteract the virus's damage. 
    Network Associates believes its antidote will even "make the system immune
    from it," Gulloto added. The antidote will restore files and decrypt files
    that were encrypted by Remote Explorer's 608-bit encryption component. 

    Remote Explorer doesn't appear to infect Unix or spread through Unix, 
    though Network Associates is still running tests on a variety of Unix 
    platforms before it issues a final determination. 

    Ellen Messmer is a senior editor at Network World.

   
    (From CNN)
    
    But wait! theres more! ...

    From HNN http://www.hackernews.com/
    New NT virus spreads via NT networks
    contributed by Weld Pond (To HNN)
    
    So Back Orifice wasn't enough of a potential trojan
    wake up call to corporate America running their critical
    business apps on NT networks. Most companies and
    most NT administrators don't understand security well
    enough to effectively secure their networks. UNIX
    admins know not to run untrusted software as root. Do
    NT admins think about this or are they running the
    lastest email attachment their buddy from college sent
    them?

    Everyone has this story:

    <snip>

    Check out this funny quote from the CNET story: 'This
    means Windows NT is a very large target of opportunity
    now,' Dietz said. 'We have to make the leap of faith
    that attackers are as good as a certified NT
    administrator.'

    <snip>
  

    @HWA


3.2  The REAL reason we are on Internet Relay Chat
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     
     Self explanatory; read on...

     Resent-Cc: recipient list not shown: ;
     Resent-Date: Tue, 15 Dec 1998 11:50:50 -0700 (MST)
     Date: Tue, 15 Dec 1998 11:48:31 -0700 (MST)
     From: Ray Powers <rayp@primenet.com>
     Reply-To: Ray Powers <rayp@primenet.com>
     To: operlist@the-project.org
     cc: dummies@initiate.monk.org
     Subject: The real reason we're on IRC...
     Resent-From: operlist@the-project.org
     X-Mailing-List: <operlist@the-project.org> archive/latest/618
     X-Loop: operlist@the-project.org
     Resent-Sender: operlist-request@the-project.org
     
     
     
     Preface: This is long rambling and philosophical. It does not give any
     info on the latest hack or attack, and is no way meant to have any
     technical merit.  If that didn't make you hit D, read on...
     
     
     Most of you know me. I've been on IRC for roughly.. too long. And been an
     oper since the first big euro/us TS/NDCD split.  I've been involved in
     taking out fludnets, co-founding bH, working on the botwatch lists and the
     spambot channels, being the routing secretary, co-adminning operlist, and
     several other tasks I can't even remember any more all to try to help this
     lovely thing we call Efnet.
     
     The funny thing is, I haven't chatted on IRC for about two years.
     
     I mean, I've been on IRC the whole time basically, but in retrospect, over
     95% of my IRC conversations start with a user, oper or admin saying "Can
     you help me with....."  It's all about me klining a bot, helping a user
     get a channel back, answering questions about clients, servers, links, or
     hackers, threatening to get smurfed (or worse), showing someone how to
     bothunt, answering e-mail on why my bot kickbanned them, or something
     else.
     
     I never actually chat.
     
     About two months ago my work schedule got really hectic and I basically
     fell off the edge of the IRC world. I was working about 14-16 hours a day,
     and just had no time to idle on IRC.  A few weeks into it, I emailed the
     frontiernet admins and told them to remove my O lines, as I didn't have
     the time for it any more. They, nice people that they are, offered to
     leave them in, so if I ever wanted to come back and help out, I could.
     
     A week or so later, I *DID* get some spare time. I logged in, opered up,
     went to hang out on a couple of my normal channels, and booted up BotHunt,
     an irc script that searches the servers for bots and klines them.
     
     I got attacked about 10 minutes later by some random DoS pup.  Didn't
     actually do anything but finally ping out bothunt, but kind of annoying
     none-the-less, as they did send a floodnet after the client.  So I, like
     loyal little oper I am, compiled a list of the flood bots, klined all I
     could and sent the rest to botwatch.
     
     And stopped coming on IRC again for a bit. I mean, why bother. I just get
     questions I don't have time for, requests I can't help on, and attacked
     for simply enforcing the server rules. Why do people even bother to come
     on IRC anyways, I thought.
     
     Oh yeah, to chat.
     
     A couple days later, I came back online.
     
     I didn't oper up. I didn't connect to a tcm bot. I didn't join any oper
     channels. I pulled MtgMonk out of the oper channels it was in.  I joined a
     couple channels I was interested in (in my particular case, the Magic:The
     Gathering channels), joined, and chatted.
     
     It was pretty cool.
     
     Nobody nuked me. I had a couple great conversations with people on Magic
     theory. I joked around with a few people I knew online, and in general had
     a great time. It was amazing. It's like there's some other world out there
     in IRC. Some world where people don't threaten to take over your channel
     or flood your server, or yell at you for klinigng their bot.  A place
     where accounts don't get , users don't get nuked, and takeovers
     don't happen everyday.
     
     Its a place where people gather, and chat.  That's it.
     
     Its pretty damn cool.
     
     This really is going out to both sides of the fence.  The IRCOpers, and
     the DoS pups.  You want to celebrate the Holiday season this year right?
     Maybe give a gift to the community that accepts you no matter who you are,
     how old you are, or where you live?  Try this:
     
     Try logging on to IRC for a bit as a user.  Don't oper up if you're an
     oper. Don't load the nuker or the anonymous shell you DoS from if you're a
     DoS pup. Just log in, join a couple channels about things you're
     interested in, be it #wrestling, #sandiego, or #people_with_ppodles.
     
     And chat.
     
     And try and remember why you came on to this place to begin with. Not what
     it became, not what *you* became.
     
     IRC, as what its supposed to be, as what its *meant* to be, is really,
     really, cool.
     
     Try it sometime. Try using IRC to *chat*.
     
     Its worth your time.
     
     
     
     
     ------------------  [ operlist@the-project.org ]  -------------------------
     To unsub: operlist-request@the-project.org with unsub operlist in the subject
     List Maintainer: Matthew Ramsey <mjr@blackened.com>
     Web Archives: http://www.the-project.org/operlist/current
     ---------------------------------------------------------------------------
     
     Lovely piece of writing, just had to include this. 
     
     @HWA

    


4.0  Windows Trojans Update & The New Remote Explorer NT VIRUS
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     Last issue I reported that I had recently found many new trojans
        
     "What you don't know CAN and DOES hurt you..." - me last issue

     Trojan list: 
     
     Keys - Don't have it
          + Have it
         !+ Contributed
          ? Name may be incorrect or a duplicate of another trojan
           
     you have one of the 'needs' or know where I can find it for review 
     purposes please mail me. tnx.
     
    !+Thanks to psychorakz muna for the url to girlfriend trojan site.
   
     Key Name                   Key Name
     ===/==========================/=======================================  
     *- Acid Shiver               + BackDoor
      + BackOffrice               ? Control du Socket
      + Control Access            + Deep Throat
      + Gatecrasher               - Gjamer
     !+ Girlfriend               ?+ ICQ Trojan *There are many of these!
      + MastersParadise           - Millennium (by HCVORG)
      + NetBus                    + NetSpy
      - phAse zero                - RAW
      - SysProtect 98             + Sockets Du Trois (Same as #4?)
      - TeleCommando

   ** Acid Shiver source was offered by someone at a hotmail account some
     time ago on one of the mailing lists, dunno about anyone else or if it
     was a phish or not but I never got mine. If this does exist (or not)
     any 411 at all would be appreciated. ;)


     A few sites where trojans may be found: (Updates requested)
     
   !+http://www.chat.ru/~gfailure/ General Failure (Girlfriend & Source)

     http://www.ufl.edu/~cycy92n/........ PHAC site - trojan files
     http://www.legion2000.org/hcvorg/ .. PHAC site - HcVORG Trojan files

     @HWA

4.1  Cyber Army is being jolly nice especially after recent hack attacks
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     
     Contrib: demoniz/Ed
     
      
      The Cyber Army site is a nice site, a bit flash, but nice, they 
     have now released their much sought after (and allegedly already
     stolen and spread) anonymizer source code. After recent events its
     a token of good will to the community and shows who the bad guys
     are once again.
     
     Story from http://hacknews.bikkel.com/  100% Pure Bikkel (demoniz)
     CyberArmy Anonymizer source released
     update by demoniz at Dec 27 , 14:11 CET

     The CyberArmy crew released today their long awaited source code of
     the CyberArmy Anonymizer. You can hide your real identity with this
     script. You need to have cgi-bin access to install the anonymizer.
     We've tested it briefly and it worked quite well.

     Download it: http://www.cyberarmy.com/files/cyberanon.zip
     Main site..: http://www.cyberarmy.com
     
      We haven't tried it here yet but plan on doing so when we move to
     a new bawx in the new year, !**! <- search for that for further info

     
     @HWA

4.2  Is it cool to hate Kevin Mitnick? - Updated with comments from fh
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

    EPiLOGUE
    ~~~~~~~~
    
    "two sides to every story, somebody had to stop me, I'm not the same
    as when I began, I will not be treated as property!" - John Lydon/PiL 

    
    Last issue we printed an admitted diatribe ranting about the killkevin
    site run by fucking hostile (fh) on sinnerz.com I really fucked up by
    not contacting him via email PRIOR to posting that article but I was in
    a pissed off mood and the site as it stands still pisses me off. Anyways
    here is the outcome of a discussion between myself and fh. Mucho thanks
    to fh for permission to print the mail (although I was going to do it 
    anyway had I not recieved the response just moments ago) so thanks.
    
    

    X-Sender: typeo@qni.com
    X-Mailer: COOLMAILER2.0
    Date: Sat, 26 Dec 1998 16:42:42 -0600
    To: Cruciphux <cruciphux@mobsters.com>
    From: fh <xxxx.xxx>
    Subject: Re: hmmm

    go ahead...
    
    At 10:22 PM 12/18/98 -0500, you wrote:
  
  *  Ed>[ Modified for clarity : Ed = me fh = fucking hostile ]
    
     Ed>Hi;
     -
     Ed>First off, do I have your permission to print your message and this
     Ed>reply in a future issue of the newsletter? 
     Ed>
     Ed>I wish all views to be aired out in the open if you are agreeable.
     Ed>
     fh>At 11:05 PM 12/17/98 -0600, you wrote:
     fh>>What is to be careful about? I find this comment rather offending
     fh>>considering neither The Messiah or SIN have >EVER released anything
     fh>>that anyone would need to "be careful" while checking out.
     -
     Ed>Merely covering my ass. Insomuch as anyone should "be careful" when
     Ed>checking out software they download from the net. I had not tried out 
     Ed>the software and did not want to recommend something that I had not
     Ed>even run, however I maintain that the description sounded very good
     Ed>and with the proliferation of trojans of the like of BO and the 
     Ed>(alleged) hacking of a site where software was replaced with NetBus
     Ed>in the archives etc its a good  policy to check-out everything no 
     Ed>matter what the source IMHO.
     -
     fh>>And also in issue 2. 
     fh>>Well I am saying right now that any person with a brain can tell my
     fh>>site is for these basic reasons:
     -
     fh>>1. To get a rise out of people.
     -
     Ed>Having a brain and English being my primary language I figured as much
     Ed>I contend the intention may not be as obvious to others.
     Ed>
     -
     fh>2. To stop the 'FREE KEVIN' banners that everyone is putting on their
     fh>page just so they look cool and all with the "hacker movements" or 
     fh>whatever.
     -
     Ed>I agree misuse of any movement for personal aggrandization sucks.
     Ed>
     fh>3. To stop the idiots who hack webpages and put FREE KEVIN all over them
     fh>   which he him and his freinds (several of whom have emalied me because 
     fh>   of my webpage) say does more to hurt his situation then help it.
     fh>
     Ed>This I also agree is an unfortunate situation but with any "hero" or
     Ed>"anti-hero" you're going to get this sort of abuse for personal 
     Ed>glorification and justification of otherwise illegal and anti-social 
     Ed>actions.
     -
     fh>And my opinion is that Kevin has brought his problems on himself. He broke
     fh>the law and everyone knows it. While I don't think he should be in prison for
     fh>almost 4 years with out trial, he did give up some of his rights and it is his own
     fh>fault.
     fh>And when he gave up his own rights then I refuse to support him. 
     -
     Ed>Moot point. Hacker or no, agree or disagree, basic human and constitutional
     Ed>rights have been abused and broken by the U.S government.
     -
     fh>I made no comments on my page saying that someone is "elite" for putting
     fh>my banner up on their webpage. In fact I even realize that some people, who
     fh>I am sure I would truely hate if I knew them, have put the banner up on their
     fh>sites in order to seem like the "rebels" or whatever. That can't be avoided,
     fh>just like it can't be avoided that some people who have no clue about Kevin 
     fh>will be putting FREE KEVIN all over their webpages.
     -
     Ed>...
     -
     -
     fh>So do I truely want to see Kevin killed, fucked, and burned? Of course
     fh>not. My banner is a statement of how this whole "FREE KEVIN" campaign has
     fh>been shoved down everyones throat enough. And before you say it hasn't stop
     fh>and think about it. Were the numorous webpages that have been hacked that
     fh>said FREE KEVIN and were all about Kevin not indeed doing just that? The 
     fh>majority of these pages were virtual domains and the people had no clue what
     fh>was going on other then some "hacker" (I wouldn't look at those people as 
     fh>hackers myself) has defaced their webpage for no reason other then that
     fh>was the server their latest k-r4d 0-dAy SPLoiTz happend to work on. 
     -
     Ed>I totally agree with your position on this.
     -
   **fh>Anyways the point is. You have your opinion and I have mine. At least the
     fh>people who agree with me don't go hacking every virtual server that is hosted
     fh>by someone like prohost.com or whatever the fuck it may be and shove their 
     fh>opinions down someones throat. 
     fh>
     fh>They can accept it or not. I personally do not care either way.
     -
     Ed>I couldn't have said it better myself and hope you agree to this being
     Ed>posted in an upcoming issue so others can see the points in a clearer light.
     -
     Ed>Cruciphux 
     Ed>HWA Staff
     -
     Ed>---------------------------------------------------------------------
     Ed>Contrary to popular opinion, UNIX *is* user friendly. It just happens
     Ed>to be highly selective about who it makes friends with.
     Ed>---------------------------------------------------------------------
     
     
     ** If only other people could get down and sort out their differences in
     this manner it would be a cool "scene" indeed. See guys? we had some shit
     to sort out, its sorted. No fucking problem. Try it some time talking works
     wonders. 
     
     fh: Public formal apologies for not contacting you prior to that "mini
     diatribe" and also "you have your opinion i have mine"? fucking kick-ass
     I loved the email.
     
     tnx.
     
      By the way after receiving this initial response and understanding better
     the true reasoning behind the rationale of the site i posted BOTH the free
     kevin and burn, fuck, kill kevin banners on my site so people coule mkae
     their own minds up. Personally although I understand and agree to some 
     extent with fh's position on this i'll lean towards the free side tnx for
     the response. BTW Genius is way cool ... ;-)

      - Ed ( Cruciphux )    
    
     http://www.kevinmitnick.com/ Free Kevin
     http://www.sinnerz.com/fh/   FK&B Kevin site
     
     @HWA


5.0  l33t d00d! totally l33t! KILL THE NEWBIES!!!! [ NOT!!] READ THIS.
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      I was (well still am) working on an article concerning this very
     topic for an upcoming issue. There are a lot of differing views on
     the net about the "newbie" you've seen em, they're usually from
     *.aol.com or maybe from *ipt.aol.com AND have a scroller or NUKER
     <GASP an hax0r!> but seriously. often they get flamed or nuked or
     ridiculed and hell, some of these assholes totally deserve the shit
     they get back and well IMHO AOL.COM should be banned everywhere
     not coz of the users but if the fucking admins couldn't handle
     their own dicks in a pissing contest what chance do their poor users
     have with them "showing them the way"? thats like asking Microsoft to
     do a security audit on your NT network. <ahem>     
        
     Anyways as this is a totally no-bs unbiased publication <grin>
     I won't rant and rave, we ALL had to start somewhere and this
     nicely points that out. Check the article below, it was first pub'd
     on http://www.hackernews.com/ in the COREDUMP section. A very good
     and original piece. Permission was sought and graciously granted
     for this reprint.
     
     Original source: http://www.hackernews.com/
     Original url: http://www.hackernews.com/orig/coredump/leet.html
     (There is a slight misspelling here seems they spelled "l33t" as
     "leet" i've already notified them of this gross error) <not>

     Author: Flaming Cow
     Author's site: http://www.planethack.com {nice site check it out}
     
     How About Those l33t d00dz? 
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     by Flaming Cow www.planethack.com
     Reprinted here with the permission of Flaming Cow and Planethack.
 
     When is the last time that you were just hanging around on
     IRC when you encountered a very lame person. You know
     the type - they talk l1k3 7h1s; they think that the fact
     that they just downloaded the newest ICQ flooder naturally
     means that they now rule the world. 

     Most of you would probably have the same reaction that I
     used to: head straight for ye olde kick/ban button. Wait.
     What if that person you are about to kick could be crypto
     analyzing AES in six months? What if they were destined to
     be the next one added to that large group of people who
     found sendmail bugs? Who exactly are you kicking? 

     I run a hacking website that attracts exactly these types. I
     can't count the number of times that I have received "Do
     you have the latest AOL scroller?" through the feedback
     form. My good friend and site sysadmin tells me that before
     we got the firewall, he had several users break in and start
     by trying to "dir". However, I don't ignore these emails, and
     I don't send back nasty "Go Away" notes. 

     Yes its hard, hell, nearly impossible to imagine, but this is
     the way that a hacker today has to start out. These are
     not the kids who were as lucky as us to have the BBS
     scene and accepting "Mentor"s to teach us. Anyone who
     has the interest and the drive to learn about computers will
     be caught by the media hype and will end up searching
     Altavista for "hacking". 

     When they do that, what do they find? Well--the last time I
     checked--I came up number 5. I'll admit it: by the
     standards of sites like this, mine is seriously lame. People
     constantly tell me: all these files are for attacking. This
     violates any kind of hacker ethics that exist, and they don't
     teach anyone anything. And they're right. So why do I keep
     this page running? Specifically to attract those Altavista
     searchers. Confused yet? 

     I run my site to get people interested. That is my goal.
     People come here and they use these programs. I get 2000
     hits a day from people who want to nuke their friend off
     ICQ. They destroy, they wreak havoc, and they generally
     cause a giant, unforgivable mess. 

     However--maybe once a week--I get an e-mail that asks
     "Is this all there is? How can I go farther? I want to learn
     about computers, UN*X, etc. I want to stop destroying and
     start creating knowledge." By sheer math, that is 1 out of
     14000 people, but it is still one person. I can guide that
     person away from their little GUI world. That one in
     fourteen thousand was ready to move on, and to expand
     themselves. Those that are weeded out by this
     bandwidth-wasteful process have the desire and the ability
     to learn. They all expand beyond my limited knowledge very
     fast. Several have gone on to much better things. All of
     them have been well worth my time. 

     So, you ask yourself, this letter started with some h^c&3r
     coming into my IRC channel. I definitely don't have 14000
     people doing this to *me* a week, so why should I care if
     there are that few real possibilities out there? My response
     is: Can we afford to waste even a single questioning mind?
     The number of people who would call themselves "hackers"
     has grown exponentially on the 'net in the last several
     years. The number of true hackers that adhere to ethics
     and hack only for knowledge and not for publicity or
     bravado has dropped drastically. Do those few who are left
     want their only legacy to be a bunch of kids running around
     with WinNuke? If all the *real* hackers out there don't get
     off their high horses and start teaching a new generation,
     all that will be left eventually will be those "script kiddies." 

     Even the newest hacker has read Mentor's Last Words.
     Some of us know them by heart, and have spent time
     analyzing how we can apply his writing to our actions.
     However, consider his name. He called himself Mentor for a
     reason: he taught people. His values still live on in some
     people, but his idea of raising the next generation is being
     lost, and we *must* fight to keep it. 


     Related links: 
     http://www.antionline.com/ (if its back up **)
    


    ** See next story about some "happenings" re: Antionline.
    
5.1 ANTIONLINE! hacked? or just a "hardware failure"?
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    
     The owner of Antionline seems to have become a bit of a target (to
    put it mildly) for the "script kiddies"
    
    As of this writing we see this on an attempted connect to Antionline
    (what happened to all that venture capital?)
    
    Dec 26th 1998 - 16:00hrs
    
    http://www.antionline.com/

    Greetings All,

    Due to a hard drive crash, AntiOnline is currently down. We should be
    back up and running the day after Christmas.

    AntiOnline strives for accuracy in all that we report. When we receive
    a tip, we make sure that we double check it with as many sources as 
    possible, and talk to all sides involved. Unfortunately, some of our
    colleagues in the field do not follow the same dedication to accuracy
    as we do. The Hacker News Network received an email from some "hack 
    group" who apparently noticed that we were down, and decided that they
    would attempt to gain a reputation for themselves by claiming that they
    were the cause. HNN decided to post the claims of these hackers without
    so much as an email to us, much less requesting additional verification
    from the hackers. It saddens us that the Hacker News Network has decided
    to follow nothing more than the standards of tabloid journalists.

    To all of our regular users, you can be sure that AntiOnline will cont-
  **-inue to be THE ONLY news source in the world dedicated to bringing you
    the latest news from the underground and computer security scene in an 
    accurate and timely manner.

    Oh, and one more thing. Look for the new AntiOnline, dubbed The 
    AntiOnline Network, on February 16th.

    Yours In CyberSpace,
    John Vranesevich
    Founder, AntiOnline
    
    
    ** I don't want to sound like a prick but my knee jerk reaction to that
    comment "THE ONLY news source..." etc would be "ooooh little boy had his
    ego kicked in the nuts?" hope things pan out coz if the shit comes to-
    gether this will be great for the 'community' all the in-fighting and 
    stuff thats going on though is getting a bit silly. Go re-read the piece
    on newbies and then look at what some of you guys (you know who you are)
    are doing ... - Ed
   
     [TBC-#4]
   
5.2  Bikkel Gets The Pickle!
     ~~~~~~~~~~~~~~~~~~~~~~~

     Contrib: me
     Story: demoniz
     Time: 3:14am
     Attire: Xmas Boxer shorts

     Shoot the messenger
     update by demoniz at Dec 24 , 0:59 CET

     100 % Pure Bikkel has been accused of being responsible for
     defacing the Web site of Slampcoach.com. The abuse team of
     PSInet contacted our hostprovider with the request to remove this
     site and take proper actions against the webmaster (me.) A classic
     case of shoot the messenger. The accusation of the abuse team
     was based on the fact that I reported about the compromised site.
     PSInet claims to have contacted the FBI. Yeah whatever.

     Read my reply to the abuse team of PSInet:

     
     Dear Net-abuse team,

     I received a complaint from the owner of bikkel.com regarding the 
     compromised server of www.slampcoach.com. I would appreciate it if
     you could refrain from any unsubstantial accusations. According to the
     information which was sent to our hostprovider (WideXS) you accuse the
     bikkel.com members being responsible for this hack. This accusation 
     rests on the fact that my user account (http://www.bikkel.com/~demoniz/)
     was mentioned on the defaced Web site. For your information: I'm the 
     webmaster of a popular news site for the hacker scene. I report on a 
     daily base about various exploits/bugs/hacks. We're dealing here with
     a classic case of 'lets shoot the messenger since we have noone else to
     blame.' I don't want to be disrespectful, but your investigation of this
     particular hack is anything except thorough. 

     You wrote in your complaint:

     >> If you go the website http://www.bikkel.com/~demoniz/, there is 
     >> mention of our customer's website getting hacked. Please see the 
     >> following contents found on that site.
     >> -----------------------------------------------------------------
     >> http://www.bikkel.com/~demoniz/
     >> ok now hadez came on dalnet and asked me to give him the pass to this
     >> domain i said yea sure whatever, i never met him before this...so he 
     >> changed the page to say some shit bot I-L and some other HCV members,
     >> well little did i know thisd create a big flaming war...see i only had
     >> a problem with wizk1d and silicosis...Wizk1d cause hes a jakcass 13 
     >> year old, that called... [snip]

     Since you obviously visited my site, you should know that this particular
     quote is taken from a copy of the hacked site which I received. You can 
     find the archive of the hacked site here: 
     http://www.bikkel.com/~demoniz/hacksite/slampcoach3_com.html

     Maybe you should also take a look in the directory /demoniz/hacksite. 
     You'll find many many more archived hacked sites. Why?
     Because it's an _archive_ of hacked sites. Those pages aren't written by
     me, but are copies of hacked Web sites. I merely report about them.

     Since you had your finger on the trigger to bring charges against me
     (and punish me [start quote] PSINet is requesting that the following 
     website be removed and action taken on the users responsible [end quote]),
     I assume you will be just as quick with your apologies.

     Thank you for your time and I'm looking forward to your apologies.

     Kick Ass Demoniz, some people are just so ... well you know. 
     
     @HWA
     
   
6.1  The Great Christmas Hax0r Flood of 1998
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     
      Ok i'm not really sure i'm totally clued into what the point of this
     is maybe its because i'm not in Europe or .NL right now maybe someone
     could elucidate for me. Just email me some info on what the hell is
     going on here.
     
      It would appear that someone is extremely bored or someone else is
     trying desperately to destroy someone else's name OR perhaps its a
     fame and glory thing maybe they want to be busted I don't know. 
     
     From: http://xmaxhax0r.virtualave.net/memberz.html
        
    

        

6.1a Latest exploits and hacks <revisited>
     ~~~~~~~~~~~~~~~~~~~~~~~~~

     Source credit:-> BUGTRAQ

     Approved-By: aleph1@DFW.NET
     Date: 	Sat, 21 Nov 1998 12:54:41 -0500
     Reply-To: John Carlton <techhelp@ROCKETMAIL.COM>
     Sender: Bugtraq List <BUGTRAQ@netspace.org>
     From: John Carlton <techhelp@ROCKETMAIL.COM>
     Subject:      Freestats.com CGI vulnerability
     To: BUGTRAQ@netspace.org

     About a year ago I developed an exploit for the free web stats services
     offered at freestats.com, and supplied the webmaster with proper code to
     patch the bug.  After hearing no reply, and seeing no fix in sight, I've
     decided to post it here.

     Procedure:

     Start an account with freestats.com, and log in.  Click on the area that
     says "CLICK HERE TO EDIT YOUR USER PROFILE & COUNTER INFO"  This will call
     up a file called edit.pl with your user # and password included in it.

     Save this file to your hard disk and open it with notepad.  The only form
     of security in this is a hidden attribute on the form element of your account
     number.  Change this from *input type=hidden name=account value=your#* to
     *input type=text name=account value=""*  Save your page and load it into your
     browser.

     Their will now be a text input box where the hidden element was before.
     Simply type a # in and push the "click here to update user profile" and all
     the information that appears on your screen has now been written to that user
     profile.

     But that isn't the worst of it.  By using frames (2 frames, one to hold this
     page you just made, and one as a target for the form submission) you could
     change the password on all of their accounts with a simple JavaScript function.

     Any thoughts, questions, or comments?

     John Carlton,
     CompSec specialist.

     Source credit:-> [ http://www.rootshell.com/ ]

    Date:         Thu, 5 Nov 1998 02:38:51 +0200
    From:         Tatu Ylonen <ylo@SSH.FI>
    Organization: SSH Communications Security, Finland
    Subject:      security patch for ssh-1.2.26 kerberos code

    -----BEGIN PGP SIGNED MESSAGE-----

    This message contains information relevant to people who compile ssh
    with --with-kerberos5.  There is one or more potential security
    problem in the Kerberos code.  These issues are not relevant for
    people who have not explicitly specified --with-kerberos5 on the
    configure command line.

    Peter Benie <pjb1008@cam.ac.uk> found a buffer overflow in the
    kerberos authentication code.  To quote from his mail:

    > What about sshconnect.c, line 1139
    >
    >     sprintf(server_name,"host/%s@", remotehost);
    >
    > where remotehost is (char *) get_canonical_hostname() (up to 255 chars),
    > is copied into server_name (a 128 char buffer)?

    It looks to me like this is a genuine buffer overflow.  I had not
    noticed it when going through the code.

    This buffer overflow is, however, extremely hard to exploit:

    1. The victim must have have client compiled with --with-kerberos5 and
       --enable-kerberos-tgt-passing.
    2. The victim must be connecting to a server running with the same
       options (i.e., krb5 with tgt passing).
    3. You must do the following DNS spoofing:
       - fake reverse map for the *server*
       - fake forward map for the fake reversed name
    4. You must fake your attack code to look like valid DNS records; this
       is highly untrivial with modern versions of bind that reject all
       domain names with invalid characters in them.
    5. Only the part of the DNS name beyond 128 bytes can be exploited; that
       must be made to align with stack frames and must contain appropriate
       return addresses and jump addresses.  It has been shown that this can
       generally be done, but the space and structural constraints here are
       extremely tight compared to most instances of buffer overflow
       exploits.
    6. Since the client with Kerberos TGT passing is only used
       interactively, the user will almost certainly notice that something
       went wrong.  I don't think you can, within the structure and space
       constraints, construct the code so that the user would not notice at
       least the client crashing.
    7. You cannot try again after a failed attack until the client again
       tries to log into the same host.

    This might yield an attack against the *client*.

    I've fixed this in the source tree.

    I'd like to thank Peter for reporting this.  A fix will be included in
    the next release (which I expect in about a week).

    <patch deleted for brevity>

    - --
    SSH Communications Security           http://www.ssh.fi/
    SSH IPSEC Toolkit                     http://www.ipsec.com/
    Free Unix SSH                         http://www.ssh.fi/sshprotocols2/

    -----BEGIN PGP SIGNATURE-----
    Version: 2.6.3i
    Charset: noconv

    iQCVAwUBNkDyOakZxfGWH0o1AQGYOQP/bUNnE/ZpSQqWVc0ngxLG50+CtyksugLJ
    wD0X2yIoc8jmY+UNPL7weQatgv6CmUUoWWpLctzKr8A6G/HrD2sh0OHPBwhIxg1i
    3mPj7WrcIX9g/K5LaEksiZ0vv4h/gvSJty5y+wRiu0QLRmuAy91CyaKTV7Sab0YT
    /W/s1NazNIg=
    =iABB
    -----END PGP SIGNATURE-----


     @HWA'98

6.2  Think Twice Before Becoming A Hacker Attacker
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     Source: CMPNET Internetweek article
     Author: RUTRELL YASIN 
     
     Think Twice Before Becoming A Hacker Attacker
     RUTRELL YASIN 
     December 14, 1998 

     I'm a big proponent of self-defense. Having studied a few of the martial
     arts, I've learned the value of being prepared to fend off and respond
     to attacks. To paraphrase a famous activist of the '60s: If someone 
     attacks you, make sure he can't put his hands on somebody else.
   
     That appears to be the stance of a growing number of large companies that
     have been victimized by hacker attacks, according to extensive research
     conducted by WarRoom Research.
   
     In an 18-month study of 320 Fortune 500 companies, 30 percent said they
     have installed software capable of launching counterattacks to security
     breaches. The report, titled "Corporate America's Competitive Edge," 
     focuses on security and business intelligence practices and will be 
     available next month.
   
     Most security experts agree that companies should have some way to
     strike back at hackers. They caution users, however, not to get
     embroiled in cyber shootouts. The main reason? The system you're
     aiming at might not be the culprit.
   
     The concept of "strikeback" has been around for years, but the method
     gained wider attention over the past few months after the Defense
     Department used software to disable an attacker's browser.
   
     Strikeback can take many forms-from the collection of information
     about intruders that can be used later to launch a counterstrike or put
     the culprits in jail, to the launch of debilitating countermeasures such
     as denial of services or flooding attacks that virtually shut down an
     attacker's system.
   
     But a savvy hacker can forge packet headers to make it appear that an
     attack is coming from another location. And if a company is shooting
     first and asking questions later, innocent people could be hurt.
   
     What's ominous about the WarRoom Research findings is that many of
     the companies in the security study would prefer to use their own
     strikeback methods as opposed to calling the FBI or state law
     enforcement agencies.
   
     As WarRoom Research president Mark Gembicki pointed out, a code
     of ethics controls how government agencies use strikeback measures.
     Large companies are truly borderless and are moving into uncharted
     territory.
   
     Ken Geide, section chief of computer investigation with the FBI's
     National Infrastructure Protection Center, agreed.
   
     "It's really important that companies have the capability to detect 
     efforts  to break into systems," he said. But strikeback has possible
     drawbacks.
   
     "The consequences of strikeback has the potential to put the victim at
     civil risk or physical risk," Geide said.
   
     The companies in the WarRoom study view strikeback as a right, just
     as the law protects physical self-defense by way of force.
   
     But there are lessons from the physical world that IT managers should
     consider before launching a strike, experts said.
   
     If you see someone trying to break into your car parked at the curb, do
     you have the right to get your gun and take a shot at the suspected
     thief? Geide asked.
   
     The person might be intoxicated and just stumbling on your car, not
     actually intending to break in. Worse, the bullets may ricochet and hit 
     a bystander.
   
     "Our recommendation would be to let a properly trained individual help
     protect the property," Geide said. IT managers should adopt the same
     kind of response when conflicts arise in cyberspace.
   
     "They could be launching a strikeback against themselves. The victim
     is better off working with law enforcement," he added.
   
     Geide said, however, that companies have been reluctant in the past to
     tell law enforcement about security breaches, fearing unwanted public
     exposure. Just as technology continues to advance, the FBI has grown
     more sophisticated in investigating computer break-ins. "We're
     cognizant of the concerns of the victim. It would be silly to victimize 
     the victim twice," Geide said.
   
     As a result, the FBI has seen a nearly 200 percent increase in pending
     investigations, primarily as referrals from victims, according to Geide.
   
     It's clear that more large companies are devising options and plans to
     address network intrusions-from both internal and external attacks.
     Many are deploying tools that block or kill TCP/IP connections when an
     intrusion is detected.
   
     Those considering counterstrikes should realize that we're a long way
     from being able to effectively verify that we're hitting the right targets. 
   
     Rutrell Yasin is a senior editor at InternetWeek. 
     
     
     @HWA'98
     

6.3  Ecstacy (XTC/mdma/rolls etc) Raves and Hacking your Head
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    
     "running around robbin banks all wacked on the sk00bi snax"
				     - Fun Loving Criminals

     Author: xd0pEr				     
     Status: (c) HWA/xd0pEr 1998 


     "Hack your head instead"
      xd0pEr
         
     * free to distribute if source and site is stated
       http://welcome.to/HWA.hax0r.news/
				     
     ok This is NOT an anti-drug article, but if it makes you stop and
     think then it was worth while. First off, its not just bums and
     welfare people or blacks or <insert your biggot ethnicity> that end
     up becoming alcoholics or drug addicts, I've known Doctors, Cops,
     lawyers, business men and many computer professionals who have fallen
     prey to this trap these are smart people.

     Anyway so wtf do I care? well i'll tell ya wtf I care, been there done
     that and i'm still here. used to play Suicidal Tendencies "Suicidal 
     Failure" and think it was funny ya big hahah h0h0.      

     Anyway the point is this HACK YOUR BRAIN. Not not with a hatchet fuck
     wad, get wit da program, get some fucking root man, GOT ROOT? no? ok
     try VALERIAN ROOT, if you're a raver, its sedating, makes the colours
     go super cool, neat visuals and its a herb. also take GINSENG in tab
     form and also if you can stand the taste (its pretty kewl actually)
     buy some ginseng drink from your local Korean variety store its like
     speed that shit keeps ya going for about 2 hrs and yer mind is unfucked
     ... try leaving the mdma bullshit at home sure your head ain't scared of
     dying but guess what the rest of your body is and fuck man you'd piss 
     off people you didn't even know were your friends if u deep-6'd it on 
     the dance floor, (thats rude) you'd look pretty rad then huh? End of 
     rant, check this out:
     
     
     Draw up a pro and con list, doesn't have to be long or elegant:
     
     Reasons/Excuses	                Consequences
     +++++++++++++++++++++++++++++++++  -------------------------------------
     Feels good NOW                     Accidental OD can kill you and your
                                        friends if you're driving to/from the
                                        rave or someone elses friends/family.
                                        (I know people that have done this)
     Escapism                           Try a movie instead, or book, hell
                                        I hear hacking websites is IN these
                                        days least you can't get killed too
                                        quickly.
     I think it makes me look cool      You will look very cool, stone cold
                                        and unless you're cremated you'll stay
                                        that way forever.
                                        
     


     What are my creds? oh how about 12yrs of lost life, 5 dead friends, a 
     lost house, AA ppl, NA ppl, the Police, Emerg and Shrinks know me on
     a first name basis. That enuff? fuck you if you think this is shit i'm
     taking the opportunity to put this out and thanks to Cruci for being
     there for me, if it weren't for him, FProphet, Dicentra, Vexxation
     and their families I wouldn't doing shit now cept watch worms crawl.
      
     One last story before I go. 
     
     There was a guy that had a fantastic time but had too much to drink
     he took his buddies keys and took off home in his car, hit another 
     car on the way home "fucking bummer" he thought, turns out that car
     wiped out and smashed head on into a lamp post <yikes> so some woman
     and two kids got killed just coz he was stupid enuff to get totalled
     and drive home.
     
     Next day his wife and kids are nowhere to be seen, but the police were
     in the driveway. Guess the ending? ya, that was his own fucking family
     he wiped out.
     
     Merry Fucking Christmas.
     Hope you all got the picture.
     It ain't cool.
     But the music is.
     fuck i'm like 27 now and things rock
     i'm still alive and life is great
     but the things that coulda been ... make me break up now and then
     btw: those frame sites piss you off here's the url for Bikkel's
     webboard http://www.bikkel.com/~paradise/webboard/ sans frames...

     
     
     
     To end on an upbeat t0ne, proof i've done the deal ...
     
              "gh0d grant me the serenity
              to accept the things I cannot
              chmod, the courage to not DoS
              although I can, and the wisdom
              to spewf my ip when killing ppl
              off of irc."
              
      Ok its slightly modified but wtf its xmas, i'm sober and its
      fun to be alive ... ;-)
     
     -  xd0pEr Dec'98 "A prick'n'still kickin"
     

     Comments: xd0per FUCKING AWESOME ARTICLE. thanks man. keep rocking 
               we'll always be here for ya. - Ed
              
               Demoniz may have something to say about that url but
               wtf .. I hate frames too so I left it in - Ed
               
    LEGAL HIGHS
    ~~~~~~~~~~~
    
     Well not really but a good way to start hacking your head, also you
    might want to look into n00tropics (nutropics). Use your favourite
    search engine and look up "nootropics and nutropics".

    Recommended links: (checked)
    
    http://www.nutrimed.com/  
    http://www.herbnet.com/
    http://www.natrol.com/
    http://sunsite.unc.edu/herbmed/mediherb.html


    @HWA'98/99 <almost>



7.0  HackingIRC'98 Part II [TBC] (NOTE) 
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

     Hacking eggdrops part 1 appeared in issue #2
    
     THIS WILL CONTINUE IN AN UPCOMING ISSUE 
     
    
7.1  Hacked Web Sites
     ~~~~~~~~~~~~~~~~
     
     MORE COVERED IN NEXT ISSUE TOO MANY TO LIST IN THIS ONE/HACKS IN
     PROGRESS...
     
     Partial list appears below though for the curious (Partial!)
     
     As far as I know these are not just a single vhosts hack ...
     
     From hnn dec23
     rumours


     These sites have been hacked Dec23rd'98:

     www.fractals.com ...........: Still hacked Dec 23rd
     www.ambientcorp.com.........: Still hacked Dec 23rd 
     www.lindasy.com.............: Fixed
     www.paulsonpress.com........: Fixed	
     www.uomini-photography.com..: Fixed
     www.pagnol.com..............: Still hacked Dec 23rd

     Newer hacks (Dec 28th)
     ~~~~~~~~~~~~~~~~~~~~~~
     Checked 1:55p EST this msg was posted (and reported) on Bikkel
     the "Still hacked" sites remained hacked for up to one week after
     the initial intrusion. Bad, very bad.
     
     More sites in protest of high telecom rates:
     
     Checked at 12:13 EST by Cruciphux:
     
     www.cabolinda.com  .....: Server down/not responding
     www.apibajasur.com.mx ..: Server down/not responding
     www.doring.com  ........: Raw directory with /logs displayed
     www.villamex.com.mx ....:"Pagina en Construccion !!!!" message
     www.cabo-architects.com.: Fixed
     www.finisterra.com......: Fixed

     According to BikkelRaZa-MeXiCaNa is claiming responsibility, watch for an article on the
     state of Hacktivism in an upcoming issue. - Ed

   * also check out http://xmaxhax0r.virtualave.net/memberz.html
     

    @HWA'98/99


A.0  APPENDICES
     ~~~~~~~~~~
     Planning on tidying things up a bit around here, make it more uhm
     hrm, accessible... index and shit, maybe even a PDF version. we'll
     see.
     
     @HWA'98
     

A.1  PHACVW, sekurity, security, cyberwar and referenced links
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

    Site....: ETHICAL HACKERS AGAINST PEDOPHILIA
    Run by..: Ken Williams
    Alias...: tattooman
    URL.....: http://www.ehap.org/
    Comment.: Go. Read. Be enlightened, hacktivate.
    Rating..: ***** 5/5
    Reviewer: Ed.
    
   

    Top 10/50/100/1000 etc lists:
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    http://www.webfringe.com/top100?
    http://www.hitbox.com/wc/world.100.HackingPhreaking.html
    http://www.tazzone.com/top500/tally.cgi?section1=Hacking_Phreaking
    http://www.splitinfinity.com/~top55/
    http://www.linkz.net/cgi-bin/top250/
    
    
    The links will no longer be maintained in this file, i've decided
    to put up an indexed link list of reference material and current
    hack and security sites on our web site instead of eating room in
    the newsletter. Hell my search engines file is around 200k in and
    of itself with just about every search engine/device out there
    "stolen" mostly from spyking and other places of course. That won't
    be up for some time though, i'll dig up the links to the sources as
    well if I can find and verify them within a reasonable time with my
    robot.. - HWA `Staff'.
    
   
A.2 Coolest Sig Award
    ~~~~~~~~~~~~~~~~~
    
            _/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/
          _/                        _/ Exxon Research & Engineering   _/
         _/ _/_/_/ _/_/     _/_/_/ _/ Kevin K. Sochacki              _/
        _/ _/     _/  _/   _/     _/ ICSBS CC124 (908) 730-2911     _/
       _/ _/_/_/ _/_/   & _/_/_/ _/ mailto:kksocha@erenj.com       _/
      _/ _/     _/ _/    _/     _/ PERSONAL                       _/
     _/ _/_/_/ _/  _/   _/_/_/ _/ mailto:kks@superlink.net       _/
    _/                        _/ http://mars.superlink.net/kks  _/
   _/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/
   
   
   Now someone was prolly paid to do this but its freakin cool so congrats
   to Kevin (number one most common name for (in)famous hackers! <bg> for
   receiving this most prestigious bit of scribble. Truly cool kev. can
   I call you kev? good how about teddy baby? ok 'nuff with the python
   time to shut this sucker down.
   
   EoD  
   
    EoF
    
     [TBC-JAN12th-1999] In Issue #4: "Special scratch and win" issue!!
		        AND a free toy! watch for it... - Ed

  -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-    
    
   APOLOGY: THERE WAS SOME FUCKING STRONG LANGUAGE IN THESE ISSUES SO IF
            YOU WERE EASILY OFFENDED WE STRONGLY URGE YOU TO CALL FOR
            SOME COUNSELLING, 1-888-NO-PIRACY IS OPEN 24/7. PLEASE. IF
            NOT FOR YOUR OWN SAKE, FOR THE SAKE OF OTHERS, SEEK HELP!
             
            - Ed "hey, you can do some cool things with this staff!"
            
   
    DISC-LAMER: IF IT WAS BAD, IT WASN'T ME. IF IT WAS GOOD, IT MAY HAVE BEEN
                ME BUT I CAN'T SAY COZ I WORK FOR AGENT SCULLY AND ITS SECRET.

               
    @HWA C*:.98'99
    
    (C) Cruciphux/HWA.hax0r.news
    (r) Cruciphux is a trade mark of my big hairy white ass productions.
    
		       "Mono power!" - BogoMIPr
    
  -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-
     --EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--
  -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-
       [45:6E:64]-[28:63:29:31:39:39:38:20:68:77:61:20:73:74:65:76:65]