Sie sind auf Seite 1von 60

i i

jL
\ *

jrs-V-^J
/
hart
<’
r **w-
:

M" ^
1
"“i
1
1 s
,f
t'O
, »;, jv< «i , v . .
••

f'H V

Whatever you choose to call it, this will, he the biggest hacki
conference in the States to date! With nearly 50,000 squat
feet to play with,' expect a variety of speakers, panel
demonstrations, films, and a network like no other.

July
»
12 to 14, 20 V T.

%
Hotel Pennsylvania

(Make hotel reservations at (212) 736-5000)

Admission for the entire weekend is $50


You can register online at www.2600.com or send a
check/money order by 6/15/02 to:

2600/H2K2
PO Box 752
Middle Island, NY 1 1953 USA
m
Check www.hope.net for updates!

More details on page 56


Transaction Based Systems
How to Regain Privacy on the Net
Stupid Google Tricks
Neat Stuff with Switchboard.com 11
Poor Man’s 3d 12
Appletalk Security Secrets 14
The Definitive Guide to Phreak Boxes 15
The Bungee Box 21
CampusWide Wide Open 22
Idiocy in the Telcos dr
26
Letters 30
_
__ •
A : x T f i i •%. *» — - X .| ..
,
- JJ. -X 1
"i 4 A T -4“ / j —«»a

Creative Cable Modem Configuration 40


Fun Password Facts 42
Defeating Network Address Translation 45
NSI Abuse 46
The Threat of a Lazy Admin 47
A Script for the Right Click Suppressed 53
RetailHardware Revisited 54
More Radio Shack Facts
• i
- -?*< -VS
1 - .1 . > -
r
- - — nl»i -i.r* . - - -
55
Marketplace 56
Meetings 58
von con tap someone's phone lor jay
"I realize that this bill basically says
walking, and normally I would say, 'No way.' But after what happened on
September 11th, say screw 'em."' - Dana Lee Dembrow, Democratic
1

member of the Maryland House ot Delegates explaining her approval nl


new bill that would greatly expand the ability of authorities to momlot
e-mail and telephone traffic* Jaywalkers beware*

2600(1SSN 0749-3851) ispiMisbed


quarterly by 2600 Enterprises Inc.
Edi tor-1 n -Chief
Emmanuel Goldstein 7 Strong's Lane, Setauket, NY II 733.
Second class postage penult paid at
Layout and Design
ShapeShifter Seimiket, New York.

Cover Concept and Photo


David A. Buchwaid, Bob Hardy POSTMASTER:
Send address changes to
Cover Design 2600 , P.0. Box 752. Middle [stand.
Mike Essl
NY 1 1953-0752.
Office Manager Copyright (c ) 2002
Tampruf
2600 Enterprises. Inc.
Writers; Bernie S., Billsf, Blue Whale, Yearly subscription: U.S. and Canada
Noam Cfiomslcr, Erie Corleyf Dalai, $18 individual.
John Drake, Paul Estev, Mr- French,
Thomas loom, Javamati, Joe330, S50 corporate (U.S. funds).
Kingpin, Lucky 2 25, Kevin Mitnick, Overseas - S26 individual.
The Prophet, David Ruder man, Seraf,
Silent Switchman, Scott Skinner, corporate.
Mr- Upsetter Back issues available for 1984-2001 at

Webmaster: Dominick LaTrappe S20 per year.


$25 per year overseas.
Web Assistance; Juintz, Kerry
Individual issues available from 1988 on
Network Operations: CSS at $5 each. S6.25 each overseas.

Special Projects: mlc


ADDRESS ALL SUBSCRIPTION
Reinforcement: Delchi CORRESPONDENCE TO:
2600 Subscription Dept., P.O. Box 752.
Broadcast Coordinators: Juintz,
BluKmght, Monarch, Pete, daRonin, Middle Island. NY 11953-0752
Digital Mercenary (stibs@2600.eoni).

IRC Admins: Antipent, Autojack,


DaRonin, Digital Mercenary, FOR LETTERS AND ARTICLE
Porkchop, Roadie
SUBMISSIONS, WRITE TO:
Inspirational Music: Asobi Seksu, 2600 Editorial Dept.. P.O. Box 99. Middle
Lalo Schifrin, Hal Hartley, BKackfeet Island. NY 11953-0099
Shout Outs: Colteen Anderson, ( lette rs @ 2600.com . articles@2600.com).
Vinny, Jeremiah, Stafoburpofse, 2600 Office Line: 631-751-2600
Doug Thomas, Free Speech TV,
New Pacifica 2600 TAX Line: 631- 4744677

Page 4 2600 Magazine


"

harm
““W *—
A
It's
ime To Care
sometimes hard

to
corruption or indifference: One thing
imagine which causes mare
is be-
of such an operation, not to mention the privacy con-
cerns, will likely persuade most broadcasters to sim-
coming clearer b\ the day. They're both needed to en- ply shut down tmd let themore commercial interests
sure an ominous future. take over. Of course, with enough support, this could
What’s been happening in our various govern- actually come back to haunt the recording industry.
mental bodies is shameful. With each passing day it Independent musicians alienated by the Recording In-
seems there's some other horrendous piece of legisla- dustry oi America (RIAA). not to mention many from
tion on its way to becoming law Our rights as inch other parts of the globe, may unite against this act of
vidua! s are either being wiped away to benefit some greed and create u new alternative sound. But who
corporate in teres; or being severely compromised in knows what new law s will spring up to thwart such a
the name of September 1 1 . Either way it's a repugnant development once ii becomes a reality? It’s cleat that
development, one which must lie fought on multiple anything seen as a threat to those who manage to ac
levels by people of all backgrounds. quire everything will be quickly struck down in one
The Digital Millennium Copyright Act (DMCA) way or another.
is .something we’ve all become acquainted with in re And of course we always have gems like the
will
cent years, Passed in 1998, iht was designed DMCA Communications Decency Act (CD A), which was
to implement treaties signed at the World Intellectual overturned by the Supreme Court in 1997 as an un-
Property Organization ( W
PO back in 19% So far
I | constitutional attack on free speech. That led to the
it's gotten us sued and gagged, a Russian programmer Child Online Protection Act (COPA), passed in 1998.
thrown into an American prison for writing software, which basically threatened to reduce the Internet to a
and a whole host of intimidation tactics, lawsuits, and playground for kids, imposing severe criminal and
threats sent to individuals and companies all over the civil penalties on providers who may have "inappro-
world. It is forever changing the concept of free use of priate material" somewhere. Despite its being struck
technology and it s the foundation upon which even down by a court in 999t more variations just keep on
1

more dangerous laws are heing built coming Now it’s the Children’s Internet Protection
The Consumer Broadband anti Digital Television Act KlPA). which wem into effect Iasi mvear. This lime
Promotion Act (f’BDTPA), formerly the Security Sys- libraries were targeted Those that don't comply with
tems Standard'-, and Certification Act (SSSCAk is but mandated blocking and li lie ring standards wilt lose
one example. It sounds consumer- friendly but this hit funding, And the dance continues.
nl legislation is going to make the DMCA look like There's DCS- 1 000 (more aptly named "Carni-
kid stuff. Imagine it being illegal id disable tiny .secu- vore" in the past), the mysterious l
:
BI e-mail snooping
rity technology, regardless ol the reason. Or manda- program installed in the offices of Internet Service
tory restrictions of any feature which could be used to Providers nationwide. And there's Magic Lantern, an-
copy something, Entire operating systems could be other Hi! project, which reportedly infiltrates a user ’s
outlawed- Computer security research will be crip- computer via an e-mail attachment and then sets up
pled. Technology itself could conte lo a screeching monitoring software which can capture keystrokes,
bait since tr/friigiial technology will be forced to ad- thereby helping to make encryption futile,
here to a government -mandated standard. And we all Wc could even talk about the badly thought out
know how long it takes any gen eminent to get a grasp USA Patriot act (which actually stands for "Uniting
on new technology. Going analog to avoid all this and Strengthening America by Providing Appropriate
nonsense won't even be an option in many eases. Dig Tools Required to Intercept and Obstruct Terrorism")
ital technology under these rules will be mandatory. and all of its attacks on fundamental freedoms, not to
Sake a took at what's happening to analog broad cast- mention the preponderance ol imitators which seek lo
ing to see how serious they are about this. destroy what it is our nation stands for as some sort of
The Copyright Arbitration Royalty Panel (CARP), way of attacking those who want to destroy what it is
an oilier offshoot of the DMCA, is targeting Internet our nation stands for
radio as if it were the second coming of Salon. The It's easy to become completely overwhelmed by
DMCA determined that Internet broadcasters must all of this and, as a defense mechanism, to simply shut

pay a specific fee for playing commercial music on- down and stop paying attention, In fact, this Is rather
line* regardless ol how badly degraded the quality is. essential in order for such cru/y laws to work in the
CARP has come up w ith a tec Structure to enforce this first place. Imagine what would happen if everyone

which will now he decided upon by the U,S. Copy realized the threat, H everyone understood the tech-
right Oil tec. That fee is actual ly based on a per sting, nology, The secret dial is luring kept from most A that
per listener equation which would not only bankrupt people jxiwer doe* work that activism is effective,
most small and independent broadcasters, bus would and that "eternal vigilance means ontinuous action, l

actually require them to keep track of their listeners, not simply quoted words
unlike their over-the-air counterparts. The overhead This is where the hacker world comes in. Unlike

Spring 2002 Page 5


d \

legislators and unlike those who have become swal We can help to lis ihat.
lowed up by the "industry," we have an understanding This will be one ol the goals at 1I2K2 this July.
of Ihe technology an the ability' and desire to commu- Phere will be many people from outside the hacker
nicate with others outside our work! What belter way world who will come to hear what we have to cay arid
to translate the evils ol these new laws into terms that who will be in a position to help us greatly if the facts
even one's grandmother could understand? arc made clear to them. We need to come up with a
i'li ere are many groups already involved KFF. comprehensive plan |o light not only what has already
EPIC, the ACLU, and more. They are all in desperate been proposed and adopted, but alt of the future legis
need of support. UN absolutely vital that we help to iatuur (hai current fy only exists in some warped law
take on this task. A look at many websites and hand- makers' minds. To do this, we will need to predict bow
outs ounce ruing tbe>e issues shows that many quickly their corrupted logic will proceed and be able to m
become lost in legal or technical jargon that means spire those who might otherwise not care. It s going to
nothing average person. The result is that the ac-
to the be a long and hard battle and die odds are already
tual threat never bums icsclf into that person mind cleady against us,. Can you think of a reason nos to get
and it becomes a non- issue to them from that point on. involved right away?

by S ta nkDaw g @ hot nia


xoro i I sue
if Ja ijgW £*£
keeps records bf die r own
dch uiTdy
Let's jump right in lo the first question: "Wtiat titans. Bu( ibis unk-k Is .to? about being
the bell is a transaction based system?" Wei!., iris' »S* lebed or tracked by Big Brother, so digress, I

straight forward as it sounds. It is a system that realize what happens to your data
f
works using nun sac turns lo process data. Retn^miV in transaction processing and you understand that
her ib at interactive processing shows immediate re-\\ it is stored -some where. What good o ill is forma i it

suits, hut batch processing takes more rime. tror to y*x/? C>:ick ymr Knuckles and stretch be-
Transaction based systems are exclusive to batch cause it is time to get todinical,
processing (although some systems may support Transaciions run on s6me son of regular cycle
both types of access i that is determined bjflfjaeh individual company,
For example, when you go to http:// store, ya- Gen era! ly, lha is (o run the transaction c y dec nee;
[

h no co m/2600hac ker/ (plug, plug...! or some ot her pet day (you e\ or .seen that warning that il may take
online shopping site, you add things to your shop- 2^iioni > lo process your transaction?). Some com-
ping can and IhcEi finally go lo checkout This is panies run these programs hourly or even more fre-t
where you can sec transaction processing happen. quern y, but this is stressful on a system. While
l

Do you think a little bell rings somewhere an a there lias been a trend moving towards live" in-
warehouse and someone rum to get your product vernory and order processing, it is still in its in-
right away? No, it will create a transaction Ihat per- fancy. Generally, all of the orders taken at a
forms several functions. First, it will send the actual particular site will get stored in a temporary file in
order to 2600 notifying them of their obligation. It the form of transactions. These transactions have
also submits a transaction to Ihe credit card com- programs behind them that decode the transaction
pany with details of the purchase and <t$ks for Ihe data and tell the system what to do with the data
payment H updates its own system at yahooxom
. within. A lypical unencrypted) transaction can be
I

with accounting information (billing 2600 for a flat as simple as this,


hosting fee, along with a per transaction ice to gel Jitt rm ®dbZ'C0wD2 1 nOOlPZbWmOOAny
their "cut," plus any number of other accounting roadNYl-345 CCI 23456789000
and tax record keeping fund ions). While you are If you look closely and decipher what you see.
silting there looking at the thank you for ordering" you may be able lo figure out that ihe key to the file
screen, all these dungs have happened in the back- appears to be rny friend's email address (this is
ground. common because it is unique and not as personal as
So why should you care? Well now that you someone's SSN). Beyond tlus, you might be able to
know exactly whal transactions arc, where do you figure out that on (12/ 13/200 2 lie purchased (the lea
think the data in those transactions are kepi? They ter P) two (2) products classified as TL
lowers! I f

are transactions that process data after all, and data which is product 01 The delivery address follows
doesn't normally just disappear. It is kepi for tax (note that this entire transaction is made up) with
purposes and hilling purposes as mentioned before. the last fields being his credit card number. This is
Everything you have ever ordered online h main- what the system gets when you click on ihat order
tained. Don't overlook that fact. No one throws button. Then, usually in the middle of the night
data aw ay So fur.
I don’t know of any centralized
I (downtime for most systems) a batch job runs that
location where all of your purchases are kept, but picks apart those transactions and sends out the

Page 6 2600 Magazine


£

parts thai 1 mentioned earlier in the article This is security that audits both, but in experience it my
when work gets done and the order is truly
ihc real doesn't happen. You edit the Hie, and the worst case
processed. The deduction from your account will 1 usually see timestamps the edit and
is that it

appear the next day, the warehouse will get the marks it will] the user’s ID (which is unimportant if
work order to process Ise purchase, etc. So the i
you are using a hacked ID). It is also unimportant
question pose to you is how would place an or-
I I because one of the parts usually in the transaction
der without ever seeing the web page? process is to son the tile and/or backup the file
Think about that for a second before reading which puts the job timestamp and system ID back
further You may see that the web is simply the in- on the file! As ihe program runs, it hides your foot-
terface that gathers information and generates the steps for you!
transactions. It is actual iy the transactions, and the Also, (here is a liming issue involved when
programs that process these transactions, that actu- multiple transactions are going on. The order may
ally do the work. So if you could get into the trans- be processed on an hourly cycle, but die credit card
action tile yourself, you would have direct control company may only process all of its charges at fie
over the transactions. Now keep in mind that am 1 end of the day, This is how people in the pa^t would
only explaining how- these systems work, am not 1 be able to use a stolen credit card all day without
suggesting or insinuating that you should do any- getting caught. It wasn't until (he next day that the
thing illegal with this know ledge You are on your 1 suspicious activity was noticed. Of course, the
own there, am
only here to inform.
I credit card companies got wise to this and now arc
IT you were able to gain access to this hie (this much more up to date on their monitoring.
is a topic that has been beaten to death, find your Willi all of this being said (particularly my
own way in), you could edit the tile to have any warning that you are at your own very high risk if
transaction you wanted. You could cancel your own you do anything illegal), think that if you look
I

order, change your address, or any other number ot around each day you w ill see how transactions are
things. You probably realize by now that you tire extremely prevalent in your everyday life. The
editing all of the records in the f inin' file, not just ATM will not process your deposit until the next
your own. And the beauty is that in my experience, business day (sometimes a manual process). A
the audit trail the logging of who does what to the
( change of address may not be reflected until 24
system) happens on the interface side of the house, hours later. Listen jerk, paid that ticket last week,
\

not the data side. The web server logs your visit and why hasn’t it been cleared from my record? Wait-
your order, but if you edit the Hie directly, it usually ing on a change of grade at school before you can
doesn't get logged. They assume that general sys- gel your loan? All of these can now be explained,
tem security is keeping you away from this infor and now, maybe you can do something about ii

niaiion. Obviously a good com pan y will h a v e got d j without wailing on someone else.

by Boris Loza be sold to any interested buyers. Have you ever


You'd probably be surprised you knew what ii wondered why every copy of Netscape running on
information is available about yourself on the In- Microsoft Windows defaults to honie.-
ternet. Whenever you connect to the Internet you tieLscape.com as a home page and the Internet Ex-
leave a great trail of information. Do you want to plorer browser defaults to www.rusn.com?
know what kind Go to http://www.-leader.ru/se-

Another method that web sites use to track vis-
c u re/ wh o. h ml ort hup: //w ww,ano n y m z.c r i itors is a special feature called a cookie, which
com/Mionp.cgi and see. contains a small amount of information transmit-
They can find out where you've come from, ted bet w
t n a web serve r and a brow sec Cookies
your operating system, browser type, and man) can contain your username/TD, computer type. IP
other things. Besides this, many servers keep care- address, and server location
ful records of your input into search engines, infor- Ever heard ot web bugs (also known as dear
mation that's submitted in forms, your shopping CiiFs)? Like cookies, web bugs are electronic tags
habits on ibe Web, and information about up- that help web sites and advertisers track visitors'
>a ded/do wnlc >a ded files.
t » whereabouts in cyberspace, The placement of a
W ho Gels This Information and How? web bug on a page allows the site hosting the ban-
Some companies, such as Doubleclick, create ner ad to know your IP address and the page that
large databases of such information, which are you visited, Ilus can be further correlated to
used by target advertising companies or which can cookie information that may He sent by your

Spring 2002 Page 7


browser as pan of the request to retrieve the page gelling just a cute cursor, in reality every time they
But web bugs are invisible on he page and are I visit any ot 60,000 web sites supporting Comet
much smaller, about the size of (he period at tlse Cursor technology, it will re (ion the user’s unique
end of Ins sentence, Unlike cookies* people ean'i
l serial number back to C omet Systems, Therefore
see web bugs and anti-cookie filters won’t catch a profile of the user's interests can be compiled,
them. and targeted ads can be served up to the users
Browsers also contain other useful data tor (There’s no such thing as a free lunch!)
those who know how to make use of it, such as hit fit this article, we'd show- wfiaf you am do to

logging and QUID numbers, as used by Mi- minimize, and sometimes prevent, submitting in
crosoft's internet Explorer. Hit logging keeps track formation to die Internet on your behalf. Even d
of all of your offline activities. When you click on you continue to allow' it to happen, at least you'll
a banner ad. a record is made of how long you he aware of how they do it.
looked at it and what ad you clicked on. as well as C 'or ikies and Web Bugs
personal information stored by the IE browser. lit I When you revisit your
an Internet server,
logging Is also designed to "phone home" to the browser shares the cookie previously installed on
server that created it. your hard drive, providing information that
GUID
numbers are randomly generated Guar- quickly identities you. Whenever you hit a Web
anteed Unique" or "Globally Unique" ID numbers. site supported by advertising, the ad server reads
It’s highly unlikely that these numbers will ever the cookie from your machine. The ad server then
occur twice across the planet. They are the ulti- uses your cookie to look up your profile and deter-
mate "electronic dog tag" and can survive even if mine which ad to serve to you dynamically, based
you kill the cookies and remove the "spyware." on the interests it's gleaned from your surfing ac-
Since the GUID number is kept on your sys- tivities at its member sites. The ad server also

t e m , it can be r eq ue st ed at any ti me And s


. nee
i
- M i records which advertisements you've clicked
crasoft has it on its databases - along with your through. he type of ad and the amount of time
I

name, address, and other registration details - the you've spent at the site is also captured. Also keep
potential for creating a system that tracks your in mind fha? cookies, the subject o) several law-
every online move is enormous. And there's even suits* are sent in clear text, in both directions,
morel Did you know that if you’re on a network, whenever encryption isn't used.
every Office 97 file you create could be traced It you use Internet Explorer on Windows 2000,

back to you? Th is because Office 97 attaches its


ft you can see. your cookies by opening the Docu-
own permanent til HD to everything you create. So ments and Settings^ Your Profile ]\Coukies direc-
if you send a document to your best friend and she tory. The cookie folder consists of several files,
deletes its entire contents, replaces it with abuse each ot which is a text file containing an actual
about your boss, adds a macro virus to iu renames cookie value. Eor more information about how Mi-
T
it, and sends it lo everyone in vour company, ii s crosoft bakes" cookies check the Cookies with
still got your address on it as the originator You 1 Your Coffee” article ai http; //msdit micraso fi-
can see what GUID looks like by opening ary Of- .co m/I bra ry / de fau as p 7
i 11 . 1 r I -i brary / e n -
! i

fice 97 Word hie with Notepad and searching for us/dn _v o ces w ebm en/li
i t in 1/we bm e nO 5 2797. as
the phrase GUID, A lew bytes later, you'll find an Microsoft IE 5.0 has a lot of menu and dialog
ID number broken up with spaces inside two curly changes, but you can still disable cookies. Go to
braces. By GUVD
helped to capture a cre-
the way. the Tool sJ ntemet Options/Security menu. In there,
ator of the Melissa virus. But that's another story. you can choose the security level for four different
Other applications and companies that use browsing conditions: Internet Sites, Local Sites.
"spyware" and "phone home are Real Netw ork s "
Trusted" Sites, and Restricted Sites If you select
1

ReaJJukebox. PKZip. 2 Bubble*. ( uieFTP. and "Internet’ and click on Custom Level, you'll get a
,

many others. SurFMonkey is an application that's dialog box where you can accept all warn before
supposed to block Internet sites inappropriate for accepting, or reject all cookies.
kids, but it also keeps their personal IX phone l Once a cookie is rejected, it is thrown out and
number, and err at address. Radiate is a company
I not saved to memory or disk. Don't forget, though,
that serves the sharew are market. Popular applica- that servers will keep looking for ihe cookie even
tions such as GOIZilla. Tree Solitaire, and if you have discarded it and may try to replace it as

Get Right come embedded with an automated ad- you surf around Remember also that some web
serving spyware" package created by Radiate sites (such as www.hotmail.com) require cookies

More than 400 different applications have this pro You can mol login into such websites if you've dis-
gram embedded w ithin them. abled cookies.
The Comet Cursor from Comet Systems is cur- Netscape users can also see their cookies found
sor software that replaces the standard screen cur- in the C:\Program I: iles\Netsuape\Users\[Your pro-
sot with many funny-looking cartoon characters lilelWooi.ies.txt tile. This rile consists of a block of
that appeal to kids, such as Garfield and Pokemon, ASCII text. Briefly, what you can see in this file is:
This is free software, hut while users think they’re Domain The domain that created and can read

Page 8 260<t Magazine


J ! 1 . -

I he variable (such as .google.com). ready knows your email address, they also could
Flag. A TRUE or FALSE v alue indicating it all include the email address in the web bug URL.
machines within given domain can access the a The email address can be in plain text or en-
variable. The browser, depending on the value set crypted ,

for domain, sets this value automatically. Web bugs used with emails allow the measure-
Path, The path within the domain for which the ment of how many people have viewed the same
variable is valid. email message in a marketing campaign. They
Set '
it re. A TRL T or ! v\ LS E v a ue indicating
l if help to detect whether someone has viewed a mes-
a secure connection dike SSI..) with the domain is sage. (People who don't view a message arc re-
needed to access the variable. moved from the list for future mailings. ) They also
Expinatiit/L The time at which the variable will help to synchronize a web browser cookie to a par-
expire. Time is debited as the number of seconds ticular email address, allowing a web site to know
since Jan !, 1970 00:00:00 (example: GMT the identity of people who come to the site at a
2145774284). later date.
Name. The name of the variable. Using web bugs also allows the sender of an
Value. The value of the variable. entail message to see what has been written when
For more information about Netscape cookies, the message is forwarded with comments to other
browse Netscape's Cookie Spec located at rec ipient s (http: 7/w w w, pri v a e y ft>u nd ati on o rg/pri .

b t tp ://w w w. i lc l scape .co in/ n ew s re 17 std/coo k e_s pe i


v acy watch/report, asp 7 id=54&acticuM)),
For complete cookie information refer to
c-.html. For a demonstration of bugged email see
R FC 2 09 at http://vv w w. rfc.nct/rfc2 09 .In ml.
1 1 http ;//m ac k ray, .co m/ trie ky b t/ readrccc pt/ i i

Note that most cookies can be accessed by all For more information,, check the web bug FAQ
hosts in the domain (eg, googlexom t
at http://www.eff.org/Pri vacy/Marketi ngA
hotmail.i ns n .co m . etc . )
web bug hunt or see the web bag gallery at

you want to disable cookies on Netscape go


If hup :// w w w. bi ig icsi s.org/e xample s.html You ea n
i .

hi the Ed / Pre fe re nces/Ad v an c ed/C ook ie


i t use a free web bug detector plug-in for IE called
The web hugs, like cookies, arc usually used Bugnosis by the Privacy Foundation
for tracking customer habits but are much harder h tt p ://w w w bug nos s, o rg/.
. i

to detect. A web bug is a graphic on a web page or Proxies, Anonymity Providing


in an email message that's designed to monitor Servers, and Remailers
w ho s read in a he page o r message. Unfortunately,
t
One can remain anonymous while web surfing
this technique could be used toward malicious by using a proxy server. A proxy acts as an inter-
ends, such as grabbing iP addresses or installing mediary, routing communications between clients
tiles. The security company Security Space, in a and the rest of a network, Web proxies can hide
monthly report (hllp://www. Security space, - your IP address and allow you to stay anonymous.
com/s_survey/data/man.200 2/ webbug.html), 1 i
If you don't use any proxy server yet, you may

has identified companies that benefit from the use choose one from a free proxy public servers list al
of web hugs, including online advertising net- Http: f/i oo Is ro si n siru men .cori i/prox y. T< con gi Ere
. t > I
i

works Doubleclick and Link exchange, as well as your Internet Explorer 5,0 browser to use a proxy,
Google and America Online. go to the Pools/ Internet Options/C on flections
The only way to find a web bug using the MS menu bar. Click on the Setup and follow the In-
Internet Explorer and Netscape browsers is to view structions on the screen. Check the Manual Proxy

the HTML source code of a weh page and search Server option and click on the Next Pm (he host
for IMG tags that match up w ith cookies stored on name of the proxy you re going to use and a port
the user’s computer, A web bug typically has its number (provided by proxy server). To check
HEIGHT and WIDTH parameters in the IMG tag whether your proxy server reveals your IP address,
set to L it s loaded from a different server than the go to htlp://w w w.all-nettools.com/pr.htm. If you
1

rest of the web page, and it has an associated gel the message 'Proxy Server Detected!' then ,

cookie. For example: lhere's a security hole in your proxy and informa-
lion about your real IP address is listed. (In this
< img sn = "hup: //ads. mm ct mVads/A B U CH E/00 7
. .

ease, try to use another proxy.) It the message is


4235001 5 Y. g if? Pagegr oup=BECHJ£J " wid "Proxy Server Not Detected everything should
11

H
ih= V
heigiti- "I border* "0" cilt= *">
,,
" be OK.
This web hug was placed on the home page by Netscape users can add a proxy by going to
Microsoft's www.bcentral.com to provide
site Ed iPrefe re nces/ A va need/Proxy.
1/ l. I

spy" information about visitors to ads.msn.com. If you don't want to use a proxy server, try one
By the way, this site contains more than ten web of the anonymity providing servers listed below.
bugs! These servers act as a proxy since weh pages are
Email web bugs are also represented as -by - I retrieved by them rather than by the person actu-
pixel IMG tags jusi like w eb bugs for web pages. ally browsing the web (you). Go to one of these
However, because the sender of the message al- web sites and jusl type a URL. you want to visit -

Spring 2002 Page 9


i . 1 ,

ihe server does the job for you securing you from , Explorer 5,0:

many potential dangers. < lick, i he Tools menu bar.


Some of the Anonymity Providing Choose Internet Options,
Servers Available t )ti the General tab. click Clear History,
Servers with SSL Support When it asks "Delete all i tents in your History
A n ony niv th : h tt p: //ww w, an on y n v t h co i 1 1
folder?" dick OK.
Oranga tango:
htt p :// w w w o ra n ga lango, co
. nde x.ns.html
1 1 /home/ i
Click the OK button at the bottom of the Intel

net Options window.


Rjewebber: http ://w ww t rewe b be r. com and
Another place that your web trail is recorded is
hup:// wwwainon.de
5 enters without SSL Si tpport the cache directory - a temporary storage area lot

m
A n ony ou se: http :// 10 n y m ou se c om 1 .
recently visited pages and images. Ehc cache ah
A nonym rzer; fit :/Av w w a non ym zee cot n
t
f
> . t lows for repeatedly visited Web sites to show up
S ege So ft: htt p :// w ww. s egeso ft com
i i . mom quickly when you reload them into your
A not y m ytb uses 5 2-bit SSL one ry ption for ai
'i
1 1 browser. If you don't want people to read youi
HTTP data, which prevents your ISP from tracking cache it should be deleted. Note, however, hat on I

your Internet activities. The only traces ibal are left slower machines with slow connections, this will
from your browsing are in your browser history result in a noticeable decrease in the speed when
list.
your computer brings up previously visited web
you want to remain anonymous while send-
If
pages, fo delete your cache on IE 5.0:
ing emails, you can use a remailer. This is a special
Choose Internet Options from IE’s fools menu.
service that receives an email message from yon,
Locate the Temporary Internet Files heading,
then readdresses it, and sends it to he person you I

want to send it to. During the process, any headers click the Delete Files button, and choose OK when
that might point back to you are removed, Many prompted.
remailers arc available on the Internet; some of Click the OK button at the bottom of the Inter-

them tel you put a fake return address, but most of net Options window.
them directly state dial the message is sent from an flase and restart your browser.
anonymous source. One nt these web-based re- Netscape users may go to the Ed it /Prefer-
mailers can be found at https://ssl.dm3 m. com/- ences/Navi gator menu to delete your browsers
heip/remailer.html for a list of remailers cheek
history list and lo the Edil/Prefcrences/Naviga-
http:// seeu H y. ao ea/e na ,s h t m
l t . i i 1 t

ror/Cache to clean up your browser’s cache.


Other Useful l ips
Bala nee Your Paranoia
You may want your browser 's his- to clear out
This article isn't intended to frighten you. lust
tory list, rids is something that should be done
each time you're finished with your browsing if remember that there isn't much privacy on the In-
you don't want someone to be able to easily see ternet. So think carefully about which sites you

where you've been surfing (it you share your Win- choose to visit, and think twice before you provide
dows workstation or server). To do this for Internet any information about yourself.

Stupid Google Tricks


by Particle Bored is Google's ability to search files with a specific
Google.com has long been the undisputed king DOS extension. This is done by submitting a query
of search engines, yet few arc aware of its power in the following format:
as a hacking tool. 1 have discovered a few features sen n h e n ns fitetype ext
S
r

that are sure to provide hours of fun for the whole where search terms are. uh, your search terms,
family, and ext is a typical DOS file extension. Searches of
Fo waste a lew seconds oi your life you can x Is and mdb tiles are great for finding things like

change the language via the Language Tools link customer lists. You can even search text within vbs
on the main page, it is possible to change the lan- and dll files. As far as 1 can tell there are no limits
guage of the interface to anything from Bengali to as to the file type, so there is plenty of room for
Telugu. but I prefer Elmer Fluid Do not attempt , to creativity.
use the Hacker language w hile under the influence I’m sure of you have visited a worthless
all

of caffeine, as you are likely to kick a hole in your web site where you can't locate information even
monitor. if you use their search engine, like sun.com. Well,
One of the features that gets me quite aroused let Google search their site for you. Using sun.com

Page 10 2600 Magazine


- .

as an example, simply use the format; Google is great for working with phone num-
search terms site: sun.com bers as well. Searching on an area code and prefix
and you will probably find w hat you seek. will quickly give you the location of an unknown
Another cool feature is the ability to search for
target since one of the hits is likely to contain art
^iies that link to a specific site. Not only can you
address. Hut wait Google can do reverse lookups,
use this to discover who is linking to your web site,
too! Simply enter the area code and phone number
but it isgood for quickly finding all of an interna-
tional company’s web sites. Tor sun.com 1 would fin dashed format) as the query.

use the format: You may want to use this final trick quickly,
search terms Unit: sum corn since 1 fear the functionality may disappear soon
Use only the domain name or you will restrict after this article is published. Have you ever found
the results the perfect document, only to be denied access be-
As for restricting results, there are times you cause the .mil sue where it resides doesn't like
will need to search only the title since searching all
your source IP? If you look within the query re
of the text yield far too many , hits. Searching titles
only can be done with this: suits you will hopefully find links that say

alkali fie: search terms "Cached” or "View as HTML”, follow the link
I'm not sure why they changed the syntax on and you will be able to view Google s copy of the
this one. Note the space after (he colon, too. document.

by Cmming Linguist menu, and clicking the button Libeled "Ren;---


n i n n ng n gu is t & h us h ina I. com
i I i i Listing", (You can also -update the fisting, also by
Switchboard.com - its the Yellow Pages. Electn- simply enteri )tg. a n e-m a a d d re s s w h ch no -doul >1
;
j1 i

i
] ed Suit c h b oard .co m is an online di rev ory o f c l i
t
you'll throw away at Yahoo? -s expense.) Auer en-
izenx nationwide, You can find friends, family, or tering an e-nun nddre.ss 1 shan’t use again, ! re-
anyone listed with a name yon know. In many ceived a link in:-th$ von rotation mail which
I i 1 was
uses, you come up with more than one listing
l!
instructed to click. After 1 complied J was directed
tor a specified name. One of the cool things about
page that o ld ne the
to a tig was m > v ed.
-i 11 m m <,

Switch board, com is the fact that if a person has all You can modify dd etc any pew*-. s account.•
; i

of their information you might be able to find a lot


Lm sure Sac V- in So m c where, USA? w on' be t

more information than you intended. On a search


loo pleased if his family es looking for his phone
lor my name, 1 found one ol me listed in my area
number online and dials Ms. Trixy's House of
and found Ids complete address, all three of his
Sexy Sexual Sex by mistake. Or if (hey can’t find it
phone numbers, and all of his e-mail addresses,
Adding a listing is not a problem, either
at all.
Switchboard com also provides hours of enter-
Here’s one some fellow posted: tmpd/www.
vummeru tor the bored teenage-] in his room with
swilchboard.com/l-jin/cg nbr.dl i I ?| D=50O683995&
nothing to do, Searching for one mister Hairy
Balls provides bands of laughs, as does searching
MEM= & FLING =MOK K&TYPE=
1 1 007,
suppose you really can't use any
In retrospect, 1
for Dick Paine and Harry Butts. But now. on to the
kind of security measure to ensure a random per-
real stuff.,.

Like the Anuizon.com mishap a while back, son doesn't delete your listing. I mean, the listings

where people could w rite comments about a book cm! up there one w ay or another; know my father I

is rhe author of that book, Switchboard.com al-


didn't add bis listing He probably pul his name

lows you to add or delete users listed without any and address on a form somewhere, and whoosh, he
authentication whatsoever, except an e-mail ad- w as i n a n at on a online di rec r o ry
i 1

dress. When I searched For my information, did- l


Just thought I'd share this fun little story with

u’t find me, hut l bound my mother and father. I you.


opted to delete their listings from the database of TfKinks to C hi for
show in# me the fan / can
pe o pie, s o 1 took he a ppn pr ate
r :> i * t ep s by clicking have while hared and watching The Mummy Re-
nn their names (which appear in hold text), click- turns ail day cvety day. I And III sec VeUr and
ing the Update Listing
1
'

link on die right-hand R etd Van re i n seh oaf. f

Spring 2002 Page It


; . 0 ; ; c .

by dktboflk order to make the analyzers appear to be bulging


diabolikt^nitric.nci out of the screen, the offset between the red and
This article will explain how lo lake those blue analyzers (I’ll just refer to this as the offset
cheap '3D glasses" you gel in cereal boxes and from mwv on) must vary, A good value for the off-
comic books and use them with Winamp s AVS set found was c * e o s( 2 * y ) +0 (75 for vertical
l .

studio to create very realistic 3D spectrum ana- siope s and c *e o^( 2 * x )+4 05 tot h ori zo ntal sh >pes )

lyzer effects and trip for days. It's pretty simple where c is a value of from 0.05 to 0,2, (Note:
and amazing. When it works, you can get effects these values work well for a 14" monitor at about
reaching about a foot to two feel out of your two feet away. You may have to modify this range
screen toward you. Very nippy. The trick to in order to suit your setup.) Since the scopes are
achieving a 3D effect from your monitor is a pair offset horizontally, it is easier to see a vertical
of those old 3D glasses” you'd get as a kid to scope in 3D because the two scopes will cancel
turn red and blue lines into a shitty purple picture each other out less - this is where a higher resolu-
that w&& sort of, but not {juke, 3D, tion comes into play. The higher the detail of the
Disclaimer: You can hurt your eyes doing scopes, the less one scope will overwrite its com-
this. The day after figured it out, I woke up with
1 panions position, and the better looking this result,
a pretty had headache. You can experience any- To make a throbbing vertical scope, try the
thing from nausea to tiredness and just a plain bad follow mg
headache. If those "Magic Eye things weren't ft Open the AVS Studio, (Stan the vi«ualizsi|
1

for you, don't attempt this Use a’ your own risk tion and double dick in the window. Make a new )

it's non my fault. Don’t blame rue. preset.


What You
Will Need 2. Add a tmns/fade ( + -> irans -> fadeouO. Set
A computer. (Actually, although it’s not that it to be fast enough you can slow it you
later if i

ijiren.se graphically, you should have a, pretty like the effect. Personally I just click on "Main"
good video card, 1 he higher the frame rate, the and check off ’“clear every frame" so the effect is i

nicer this effect looks. More importantly a low as clean as possible.


resolution will force the spectrum analyzers to 3, Add a Superscope (+ -> render -> Super-
cancel each other out more often and will m.stdl w scope J wjth (he following settings:
distorted pictures.) Init: it =40; t~0; tv -0.1 pit = I;
A pair tfj 3D glasses. (These ;ire the ones with Per frame: t—t^0.9+ivH1 1
a piece of red cellophane on one eye and blue cel- Per Point:
lophane on the other. The ones I'm using have red \ = + *(p<n\-\ sini rfti / 4 (59), f }/?.}+ 0. 0A S ‘os (2
f \ J \
:

over the left eye and blue over the Eight. If yours )) v = *2 - V 0; x - v * L5- (l 09
f

are n the sanies we ar h e


l T m
bae k w aids > r mod my i Check off "Waveform”, Center and I '
11

11
code.) "Lines Although you can modify those as you
.

j
WinAMP with /H\V studio, (These are what I wish, that’s just what suggest. This will be the I

wrote the '3D mod" presets in,) You'll want to be blue scope. To accurately choose your color, see
1

fullscreening these effects at 640x480, although "Calibrating Your Preset' below


yesterday l was ICQing white
had a portion of
I Click the \2" button to copy this Superscope.
my monitor displaying the AVS and the effect Modify this one to have the following settings;
was uobceable- it hurt a lot mote, too. I nil: n=40: t-0; fv—0 f;dt= l ,

Booming techno always helps. Aphex Iwim On Beat: c ~ Urandf fOOy/OO) *9. D8)+9. #7;
Clint Mansell.,, whatever floats your boat. Per f rame: t-f*Q.9+t\' * 1 ;l - * 9; .

How to Make the Presets Per Point:


You can download tire presets from i—i + rfsjnf i *3, 14159ft if2 ) +fc
1 j ?s ( 3 y,ft
1!

hllp;//d)nsinik7.hypermart.nel/T but 1 strongly +0.05; v— 1*2- LO; jr— X' * L 5-0 09,
suggest writing your own. The AVS presets I This is only slightly more complex than a flat
wrote art si triple spectrum analyzers, a blue ana- surfaced (in 3-space) scope. When the On Beat
lyzer with a red analyzer offset to the right of the function is run, the offset between the two scopes
blue, The more the Iw'o are offset, the closer to is randomized between 0,07 and 0.15, Every
your eyes they appear, in Winamp V AVS Studio, frame, the offset is reduced to 90 percent of its
the x and y coordinates of the screen begin at -1 previous value (the scope appears io shrink back
and end at ft to matter what the resolution is. In towards the screen). Although Win amp Y, beat de l

Page 12 2600 Magazine


i 2 vj ; : c
: 9

lection isn't that great., during good house music namically, Win AM P's AVS Studio contains the
or anything with good bass, you will definitely ability to do "On Beat” modifications to your vari-
"see" the effect, You can get another neat effect ables.
hy making two sets of scopes one vertical one - Calibrating Your Preset
horizontal - and have them come out of the screen To get the best 3D effect, you warn the bright-
On Beat random amounts, with or without decay. est color of red that still appears dark to he eye I

To make a .ID horizontal scope, 1 use the follow- seeing through the blue cellophane, and vice
ing settings for each scope: versa. To lind the right shade of blue, double dick
Blue Scope: 1
on rhe blue bar near the bottom-right of the win-
frtit:n=40: t-0 ; tv-0.1 ;dt-i dow. Pm on your glasses. Close your right eye.
Per Frame: t=-t*&.9+l *0, / Choose a shade of blue that appears dark to your
Pe r Point: v = / + r *ipo u s in(i *3. / 4. / 5
-
-t j, / JZ2 j
; left eye. Yon should now be looking at the lighl-
x'—i*2-i.0+(0.03*t tost _ Tv ) ) to-dark blue vertical gradient near the bottom
v=v^7.5; right of the color selector through the red cello-
Red Set ipe; phane. Move the brightness selector upwards as
fnii: n-40; t=V; tv-Q.l;di= /; high as it goes while it still appears black, or near
On Bern: c-((mnd( I(Xp/JO0yd).O7)+0m: black. J’his will make the color as noticeable as
Per Fra m e: t-tHhd+tv *0. 1 ;e= * 9 ( rh is wot* id ; possible to your righl eye while still appearing us
be i a decoy the scope hark io the screen, other- nothing to your left eye. Click okay, and calibrate
,r
wise remove the kilter equation} the second Render/S uperscope" color by doing
Per Point: y~t+ v^(pow(sin{ 14159), I )/2); the opposite of what you did for the first. II when
v — *2- f A)+(c A :m( A ) + 0, 05 looking at the presets through the glasses you can
y-y*1.5; see w hat almost looks like shadows of the scopes
Another interesting effect you cou fd try would on the screen itself, try darkening the chosen
be to change cos(2*x) to abs(eos(4*3. 14159" x}), shades of blue and red.
F would make two 3D ripples in the analyzer.
his Other Ideas with the Glasses
Instead of just coming out once, it would come Obviously, Win AMP
AVS modules are just
out. go back in, out and in again, one idea for these glasses. With basic VB skill/
What Can't 1 Do to the Presets? one could write 3D wire framing modules or a
I recommend you make your own -
strongly staiiield generator in pseudo- 3D* Of course,
mine are just working guides. You probably can you’re limited to the color of purple, but consid-
do a lot better if you’ve ever made Winamp A VS ering you’ve paid about a dollar nr less for these
settings before - until this project i never tried. you shouldn't really complain. One suggestion
However, don't think you will throw some
that I’ve had from a friend was to make an hour-long
crazy blur effect into the mix and it will be even mix ta pc. export the whole thing to VMS and bring
more trippy. For this effect to work, the blue pixel the tape, 20 pairs of he glasses, and a lot of
I

must be immediately offset to the left of the red booze/ weed/cough syrup/ whatever to a party and
pixel for vout eyes to combine them into a single have a nice massive trip.
U) point, I've found to get the most effective 3D Conclusion
effect, keep your presets clean Whatever effects Well, when it works, it works well. If you
you do attempt to add, keep in mind if the red T can't gel your crazy ass preset to work on the first
and blue lines cross (this is a reference to a verti- try, attempt to simplify h I've found it's a lot
cal scope - in a horizontal scope, they will cross easier to see two scopes than one. but three or
all the time), you will lose the 3D effect immedi- more need a warm up of simpler effects, Other
ately. things you can try arc shifting your head from
It would be really interesting lo gei a dot- side to side - this helps you really see (he effect
plane working with but unfortunately
this effect, I’ve found. 11 you have loo many scopes (four in-
I've found that there are far too many dots at most stead of two), try changing the distance or angle
angles to not have one dot plane overlap a large you re viewing. Just experiment, half the fun’s
portion of the other. You could do this by writing just seeing what you can come up with. Then
an AVS plugin in C++, but lhai is outside I he again a good chunk of it is staying up til 4 am
scope of this article. coaxing some cough syrup listening to Aphex
What Can
the Presets? 1 Do with Twin headphones,
in
Noting the limitations above, you can have Greetz: FiackCanada. argv, cl ox, the other
some damn cool effects. The most noticeable members of Priapism, Jaiden Knight, all my local
thing you can do is modify "c" in the formula dy- friends you know who you ore.
-

¥
Spring 2002 Page 13
by Steven Krtuzer folder m y 5 te m‘™l3erAW^ n (fie rn a c hi he

s k reuzer @ mac .com boots up. it will rnouni all


file servers, listed in that

By most accounts, Apple clients and servers folder. This can become a problem if an attacker
make up a small portion of the types of systems on has physical access to a client machine. It. is possi
any given network. However. Apple hardware and ble lo modify AppleShare client so that the
the
software have carved out a niche in certain areas "Save my name and password" feature is disabled.
such as design and multimedia along with the ed- A patch for that is available at
ueational See Id. AppleTalk networks Jo exist. It is http://htmiepage.mac.com/sfc reuzer.
and system administrators lend to
just that hackers The last problem I will address on the client
overlook them. In mixed environments, the net side is personal file sharing. Every Mac OS since
work managers tend to be highly proficient with version 7.0 has the ability to allow the end user to
Unix or Windows NT but don't know, or care to share his or her hard drive and allow remote con-
know, about how AppleTalk networks actually nections. Most of the time when a person enables
work. They will take the minimum steps neces- fi/c sharing they don't assign a password lo the
sary to ensure that Apple clients can connect to system owner, thus allowing remote logins with
network resources and once that is complete all is full read and w rite privileges to the entire bard
well and good. However, this lack of understand- drive. Or a person will share the entire hard drive
ing can be used as a possible entry point into your rather then make share points and give regular
network. This article was written using a Power users read and write privileges to the whole hard
Macintosh G4 running OS 9J.2 and a dual drive, including the system folder. This will allow
processor Power Macintosh G4 running OS 9.1 an all acker access to vital system resources and
and AppleShare IP 6.3. 3. It w .tl address potential also exposes filings like preference files w hich can
security holes and what you can do to harden both
contain passwords used by different applications.
the client and server side of an AppleTalk network
It would also be possible to install a trojan or virus
We will start off by examining the client side that will execute upon next startup by placing the
undo a c of he mos comm on prob lent x wh ic h
t t ;d so
file in the Startup hems' folder. An attacker with
plagues other network protocols as well. Older
malicious intent could erase certain parts of the
Macintosh clients connecting to servers will send
hard drive, or the entire hard drive. To prevent this
their password in dear text across the network, ft
from occurring, you can remove the "Fife Sharing
is also possible that the server will force the client 1

Extension '

from the extensions folder in the sys-


to send their password as clear text if it does not
tem folder, Tliis will remove the ability to start
support other authentication algorithms, (Win-
personal hie sharing.
dows 2000 with AppleTalk support will do this.)
On
both AppleShare IP servers and Macintosh
This is one; of the easiest problems to fix. and you
workstations running personal file sharing store
have two very good solutions at hand. The first is
usernames, passwords and group data in a hie
to download an updated version of the AppleShare
called "Users and Groups Data File" which is lo-
client that is h Up:// www. apple.-
available at
cated in (he preferences folder of the system
com/u p pi eshare p/ te x t/dow n 1 carIsditml. The sec-
i

folder. The encryption algorithm is ven simple


ond solution is a little more complex, ff you open
and it is possible to decode passwords stored in
the AppleShare client in Res Edit and locate the
this file. AppleShare IP does not allow you to
"FSMNT resource you will sec a sub-resource la-
11 share the system folder, so unless an attacker had
beled "ApShare Mounter Open up that resource ,

1 physical access to the server or was able to exe-


and do a search in ASCII for "Cleartxf Once ,

cute a trojan on the server side, you should not


found, replace the "C” in "Clean xr" with any other
have worry about the trivial encoding scheme
to
letter. Once that is complete, do the same tor the
,H
used, maefspwete, the Unix utility to decode the
"ApShare ExFS” in the EXFS" resource. Once
password is available from http://happine.ss-
that is complete, save your changes and move the
.dhs t >rg/sofiw are/ n acts pwd/ mac fspwd ,c +
file back into the extensions folder on the clieni
. i

machine his will prevent the user from sending


S
The perceived simplicity of AppleShare IP
their password in clear text.
(A5IP) makes it appealing to novice administra-
Another problem is allowing users to save tors who typically have little appreciation for se-

then login name and password. This creates an curity. Out of the box, AS/P is very secure btrt

alias to the file server located in the "Servers" certain steps can be taken to harden the out of the
box configuration. One of the biggest drawbacks

Page 14 2600 Magazine


;

of AS IP is its inability to keep access Jogs. (The are unable to force a user to mis numbers and let-

web am! mail server do log activity, but rile shar- ters,and you are unable to "blacklist" certain
ing does not.) It is possible to get a list of users words like "password".
currently connected to the server, the connection The final topic I will address in this article is
method, and when they logged on, but this data is related to user authentication The algorithms for
not written to any tile so once they log off, all this all of the AppleShare authentication methods are
information is lost. public. Tile most widely used authentication
A SIP makes the enumeration of valid ii^er method b 2 Way randnum
sends two S byte that
names a trivia! task due to the fact that security l)HS encrypted random numbers over the net-
was sacrificed for ease of use. When you use the work From a computational standpoint the algo-
AppleShare client to log onto a server, the return rithm is exactly as strong as 56-bit l>ES and it has
result from the server can be used to brute force
a password length HmvV of eight characters. It is
valid usernames. When an invalid username ts en-
vulnerable to an offline password guessing attack
responds w ith a kOAMErrMem-
tered, the server
similar to running crack against n Unix passwd
lierObjectNotFpund (error n29312) which
tile, Apple has developed a new authentication
translates to "Unknown user, invalid password or
method that addresses the weaknesses of 2 Way
the Login is disabled,,..'', but when a valid user-
randnum. called DHX. DHX uses Piffle Heilman
name with an invalid password is sent, the server
key exchange to create a 128-bit session kev and
respon ds with k O A M Err Yu the n heal i oriError (er
then, sends a 64 -character password to the server
ror n 29360 ) which translates to "Horry, the pass,
encrypted with CAST 128 Its strength is approxi-
word you entered is incorrect.,," With this it
would be possible to write a script to read in user mately equivalent to 128-bil SSL.
names from a tile and mimic the login process and have only scratched the surface of the numer-
>

parse the result to brute force enumerate valid ous potential vulnerabilities of AppleTalk net-
usernames. To protect yourself against this, make works. In reality, on a well- con figured AppleTalk
sure that the server disables accounts after multi- network, it can be incredibly difficulty to bypass
ple tailed login attempts. With dws feature and a and techniques can cre-
security. Lot certain voo Is
secure user password in place, brute forcing be- ate access paths into your systems. hope this arti I

comes much more difficult, if not impossible The de has sparked an interest, and system
drawback is that ASfPonly allows you to config- administrators will take a closer look at their net-
ure the minimum characters in a password You works.

by Elf Qrin I've catalogued 94 phreak boxes of 75 differ- !

i w w w.ElfQrinxom ) ent boxes with different


kinds (counting only
Traditionally in the phreuker culture, any de- functions), and 17 aliases (same box with a differ-
vice thought to be connected to a phone line is ent name),
called a "box" and is named after a color since (he I’ve also included live non-phreak boxes o|
first "blue box" invented by Captain Crunch, the four different kinds {boxes not meant to be
father of the phreak scene. Since all colors were plugged litre rfre phone hue they're meant for use
i
-

quickly used for this purpose, other fanciful names with the eleefrk Ime or soincfhing.el.se).
began to be used to name boxes.
The raw mtal iff 99 boxes of 7 Vf kinds and 17
Eve tried to make of all the
a definitive list
aliases, which adds up to 16 box names. 1

known "color boxes" with a brief description of


When the name of a box is included between
each.
paremhesevThe box name is actually just an alias
I’ve done a lot and classify
of research to find
of another box.
the m a re a d ng th mu g h a bo u 3( K) doe u nen s
I ! . i n 1 i t . I

most eases I've used quotes from the original doc-


When the name gj a pox is included between
uments for the descriptions. square brackets',, the box has been created or rein-

Since most boxes were invented in the ‘80s or vented by someone else using a different scheme :

early ‘90s, this article is mainly meant for infor- and/or different components.
mative and historical purposes. Many of these When lhere Y s one box that uses the name of an I

boxes don't work nowadays, (Some may never already existing box (supposedly because the au I

have worked at all,} However, some still do. And thor was unaware of ]\ Eve added to it a sequen-
sometimes similar models can even be found in tial number between parentheses, such as (2). (3),

stores, etc.

Spring 2002 Page 15


(2600 Bo x) (another name for the Blue Box). shut up.
See Blue Box. Blast Box H.
Similar to ihe Blast Box, but de-
A cry lie Box (aka Extended Bud Box). The signed to blow up other people’s computers, in-
purpose of this box is to get Three- Wav Calling. stead of their ears.
Call Waning, programmable Call Forwarding. and Bleeper Box [UK version of the Blue Box],
an easier way of extended Bud Boxing, stealing fhe United Kingdom's own version of the Blue
them from the fortunate ones on your block, Cre- Box, modi lied to work with the UK/s phone sys-
ated by The Pimp, tem. Based on the same principles. However,
ALF Box. A tone generator for the Apple lie British Telecom uses two sets of frequencies, for-
with an ALT Music Synthesizer Card. Created by ward and backward
Sir Briggs of the SouthCemra] Discount Ware- Blotto Box. For years now every pirate has
meisters (SCDW)oi' Texas. dreamed of the Blotto Box. It w as at first made as
Aqua Bow Every true phreaker lives m fear of a joke to mock more ignorant people into thinking
the dreaded EBJ, Lock
Trace/ Lor a long in that the function of ii actually was possible. This
time, it was impossible to escape from lire lock in box quite simply, can turn off the phone lines
trace. This box offers, an "escape route" by lower- everywhere. Originally conceived by King Blotto.
ing the voltage on thephone line. Concept by Cap- Created b> The Traveler,
tain Xero x .
PI arts by The Tra velcr,
: Blue Box (aka 2600 Box). he mother of all I

Assassin Box (sometimes misspelled as As- boxes. The lirst box in history which started the
sasin Box. Asassin Box, Asasin Box). A box de- whole ph making scene. Invented by John Draper
signed to scare, harm, or kill people at the phone (Lika ’C aptu i n On nc h " in he va ri y 60 ‘s, w ho dr s-
,1 t ,

h\ a shock of electricity right in the car as soon as covered that by sending a tone of 2600H / over the
the victim starts dialing u number Dris box was telephone lines ot AT&T, it was possible to make
designed, because its Day-
authors, after trying a free calls. In the 1960’s, the makers of CapTi
Glo Box for some weeks "were bored and decided Crunch breakfast cereal offered a toy-w histle prize
to move on to telephone terrorism " Linked by in every box as a treat for the Cap'll Crunch set,
Grim Reaper. Somehow John Draper (who called himself "Cap-
[Beagan Box! (sometimes misspelled us Be- tain Crunch" since then) discovered that the toy
gan Box [similar to Beige Box, Beige Box Revis-
i whistle just happened to produce a perfect 2600-
ited, Day-Glo Box Sec Beige Box. Concept and
j
cycle tone. Discovered by Captain Crunch (John
Design; Black Box Bela Testing: Lord Reagan. Draper). Year: early 1960's,
Beige Box /similar Jo Beagan Box. Beige Box (Blue Coo Box) short name for the Blue Con-
t

Revisited. Bud Box, Day-Glo Box], A homemade ference Box). See Blue Conference Box.
lineman’s handset, also known as REMOBS (RE- Blue Conference Box (aka Blue Con Box), A
Mote OB serving Systems) With a Beige Box you Blue Box and a Con Box combined.
can do the following things: "Eavesdropping; long Bottle -Nosed Gray Box Selective version of |

distance, static- free free tone calls to phriends; di- the Rainbow Box}. This box will do damage to
aling direct to Alliance Conferencing (also static- only your phone, the line between you and your
free); phuking up people; bothering the operator at enemy, and your enemy’s modem, whereas the
little risk to yourself; blue boxing with a greatly Rainbow Box just takes everything out. By The
reduced chance of getting caught;, anything a all I Dolphin that came from Belmont.
that you want, since you are an extension on lhai [ Brown Boxj (aka Opaque Box) [similar to
line." Invented by The Exterminator and Fhe Ter- Con Box, Party Box. Three Box]. Created by The
minal Man, Date: Friday, May 17, 1985. Doc,
{Beige Box Revisited ( [similar to Beagan Box. Bud Box . This box is quite similar to a Beige
Beige Box. Day-Glo ftuxj. See Beige Box. By Box. except extremely
this is a portable unit. It is
Mercenary. Yean 992 or later. 1 handy for free voice calls and tapping a nearby
Black Box A Black Box is a device that is
, house’ s line. Invented by Dr. D-Code and Lire
hooked up to your tone lhai fixes so that when is Pimp of The Slaughtered Chic ken.
you get a call, the caller doesn't get charged for the Busy Box. This box is attached to the outside
call This is good for calls up to a half hour. After of the person's house in their telephone box. It
that the tone company gets suspicious, and then makes it so that when any phone inside (hat house
you can guess what happens. The original box was is picked up, no dial tone is heard and no calls can

created in the USA There are modified versions be received or sent. This is good for lame BBS's as
for other countries. Original author unknown. K 1 1
they tend not to call out much, and it will remain
Black Box by K.S. Reach of The Hackers Acad- undetected for a longer period of time. nvented by I

cun (March 1988). Greek Black Box by Fabulist Black Death.


and Enigma (year 1992), Charging Box (aka Light Box), 'his box is
Blast Box , All a Blast cheap Box is is a really used to indicate when a call is being charged for
amplifier (around five walls or so) connected in and when it is not. Once installed, the box has two
place of the microphone on your telephone meant lights, green one and a red one. Green means free
Lt

to talk to someone on the phone who just doesn't and red shows that you arc being charged. Created

Page 16 2600 Magazine


)

by Stinky Pig Productions (a LI team} world. Conceptualized by John F. Kennedy.


( Chart ft ox) (short name for the Chartreuse Divert! Box. Cited in the B lotto Box docu-
Box )* See Chartreuse Box. ment. Probably used to divert u phone call. Cre-
Chartreuse Box (aka Chart Box, Obnoxious ated hy The Traveler.
Box). Your telephone line is a constant power Dior Box Cal Receive on two lines with the
,

source. This box is designed to allow you to tap option to conference them. By The Park Lords of
that power source and give you up to 12 volts Chaos: Prowler. Apprentice. Pro Hack, Zeus,
(more if you use a transformer). Created by Tarkmelh. Blacksioke, Lazer. Date: October. 3
Wonko The Sane. 1988.
Cheese Box; This box (named for the type of DMA Box. Not actually a box hut a project of
box the lirst one was found in) turns your home die Outlaw Telecom mandos to hack cellular
phone into a pay phone. It cm be used together phones in the early era of those devices 1989). Is- (

with a Red Box to make free calls. Created by sued in February 1989.
Otho Radix (?}. (Extended Bad Box (another name for the
Chrome Box. A portable self-contained device Acrylic Box). See Aery tie Box.
to manipulate traffic signals. Not a phreak box fuzz This box duplicates the tones of
Created by Remote Control Date; June 14 1988. coins dropping down the phone chute, thereby al-
11

Clear Box. This box works on post -pay " pay lowing the user to place calls without paying for
phones (a kind of payphone that could he found in them.
Canada and in rural United Slates). hi other words, Gold Box [similar to X-GokJ Box]. When you
those phones that don’t require payment until after put a gold box on two phone lines it lets anyone
the connection has been e&tebfvshed. If you don't who calls one of the lines call can on the other So
deposit money, you can't speak to the person at the when thephone company traces the line it will tell
oilier end, because your mouthpiece is cut off - hut them that you're calling from the line you hooked
not your earpiece. (Yes, you can make free culls to the gold box up to. By Dr. Revenge, cosysop of
the weather, etc. from such phones.) With this box Modem Madness (5 lb).
the user able to speak to the other person for
is Grab Box. This box uses inductive coupling to
free. The clear box thus "clears" up the problem of join with any radio that uses a coil for an antenna
not being heard. Author: Mr Trench of 2600. (such as an AM. longwave, or shortwave radio)
Originally published hi the July 1984 issue of and allows you to lengthen it considerably Not a
2600 . p break box. This kind of box can be commonly
Cold Box. Usage unknown. Cited in the Blotto Found in an electronic shop. By Shadow spawn.
Box document. Created by The Traveler, Green Box. This box generates tones for Coin
Con Box (aka Conference Box) [similar to Collection in Return, and Ringbaek U must be
Brown Box. Party Box. Three Box). This box al- used by the CALI TP party,
lows you to connect two lines in your house to (Green Box (2)j similar to Crimson Box. Or-
|

g ve
i Th rec-Way t
y pe sc r v ice. c real mg a party line. ange Box, Hold Box, Hold On Box, White Box
(Conference Box) (expanded name for the (2), Yello w Bo x ( 2 A h old hu tt on S ee Cri m son
) j , ,

Con Box). See Con Box. Box.


Copper Box. Uses cross- talk feedback to try to (Gray Box) (another name for the Silver Box).
'

damage sensitive equipment of a phone company. Sec Silver Box


More a method than a real box. Conceived bv The {Hold Boxj [similar to Crimson Box, Green I

Cypher. Year I486, Box r2). Orange Box, Hold On Box. White Box
Crimson Box (sometimes misspelled as (2), Yellow Box (2)]. A hold button. Sec Crimson
Chrirmon Box) similar to Green Box (2), Orange
[ Box,
Box, Hold Box. Hold On Box, White Box (2). Ycl- / Hold On Box} [similar to Crimson Box,
low Box 0)1 This box is a very simple device that Green Box 2). Orange Box. Hold Box. White Box
(

will allow you to pul someone on hold or make (2). Yellow Box (2)|. A hold button. See Crimson
your phone busy with a large amount of ease. You Box.
11 ip a switch and the person can't hear you talking. Infinity Box sometimes misspelled as Inliity
(

Rip it back and everything is peachy. U doesn’t Box). When the plume number of a tele phone con-
have a LTD to show when hold mode is on. Cre- taining an infinity box device is dialed and a cer-
ated by Or. O-Code. Year. 1985. tain note is blown into the phone from a Hohner
Dark Box. Multi-Purpose Network Manipula- Key of C
harmonica, the bugged phone does not
tion Unit This box’s basic design allows you to ring and, what's more, enables the caller to then
call any where on earth without fear of being billed hear everything said in the room that the phone is
or traced. Created by Cablecast Operator of the located in. As long as the caller wants on
to stay
Dark Side Research Group. Year: 1987. (he phone, all is open to him or her. If the phone is
,

(Day-Glo Box {aka Day do Box [similar to


I ) book, the transmitter is disconnected
lifted off vhe
Beige Box] This box lets you place calls for free
1

and the "bugged’ party receives a dial tone as if


With no time limit, no possibility of a wiretap, and nothing was wrong with the line Description by
the culls can be placed from anywhere in the Iron Man of The Crack Shop From the original

Spring 2002 Page 17


) ) n

'“Infinity Transmitter" hy Manny Mi tile man. vice that adds a normal jack interface to a tele-
In-Use Light Box, A device that signals phone, allowing the sending of music or tones into
whether or not an extension of a particular phone the phone line, or the recording of conversations
line is off-hook. It does mtl indicate whether or not using the microphone input of a recorder. This
a phone is being tapped, and will light whenever kind of box can be common! v found in a phone
any extension is picked up. By The Night Owl AE. shop,
Jack Box. A device to generate tones created Noise Box [similar to the Scarlet Box], It is a
starling from a phone keypad. device you can attach to a victim’s phone line so
Jolly Box Software written in 8086 assembly
. that an abnormal amount ot noise will be present
which generates several phone tones "Multi-Fre- i on the line at all times, which would make data
q tien / -Demon- Dialer for Global Access"). Code transmissions almost impossible and voice com-
by Jolly Roger. Updated by Zaphod Beeblebrox of munications annoying, to say the least. By Doctor
Control Team. Date: probably 1993 or earlier. Dissector of Phortune 500,
(Light Box (another name for the Charging (Obnoxious Box) (another name for die Char-
Box). See Charging Box treuse Box). See Chartreuse Box.
IM ud Box Makes your voice louder over the
. Olive Box An alternative ring lor your phone
.

phone line. Especially meant foi use in conference with a light that a ho flashes when the phone rings.
calls. Designed, written and built by Mr. Bill. By Arnold, sysop of Hobbit Hole AE (HHAE)
Lunch Box (aka Tap Box), The Lunch Box is a East Branch,
very simple transmitter used for eavesdropping. It (Opaque Box (another name for the Brown
is quite small and cm easily be put in a number of Box). .See Brown Box.
places, Created by Dr. D-Code / Orange Box / fsimiia r C m son B o \ G ree
it > e i ,

Magenta Box. When you call up line one from Box (2). Hold Box, Hold On Box. White Box (2k
your house, you will gel a dial tone almost imme- Yellow Box (2 )1, A hold button See Crimson Box.
diately. Using DTML you can dial anywhere that Paisley Box. A multipurpose box that com-
the person who owns line two has service to. bines the functions of several boxes, including
Which means you can direct dial Alliance, Aus- blue, beige, and blotto. Among other things can
tralia, and your favorite BBS far free. Designed by seize operator lines and remotely control all TSPS
Street f ighter. and TOPS consoles, By Blade of the Neon I tic ken
Magenta Box (2), A portable ringing generator Knights.
which, connected to a phone me, will make the
if Pandora Box A
device that generates a high

phone on the end of it ring. It works by using a re- intensity sound to produce pain. A similar device
lay as a vibrator to generate AC which is then (usually called "phasor") is commonly sold in se-
stepped up by a transformer and led through a ca- curity shops for personal defense. By Du Rat of
pacitor into the phone line to make the phone ring. Rat Labs, S.F., C A. Year: 1986.
Mauve Box Generates a magnetic held to lap
. (Party Box] similar to Brown Box, Three
|

the nearest phone conversation (somehow similar Box, Con Box This box allows free hree-Way
|. I

to Tempest, the system to tap video screens). Cre- calling, connects two phone conversations at once*
ated by Captain Generic with help from The Ge- without any static or excess wiring, or even having
netic Mishap. Date: November, 24 1986- 19:08. two phone lines. Created by Grey haw ke of The
Meeko Box. A multi-purpose box with the fol- Dark Knights {TDK),
lowing features; It is able to record telephone con- Pearl Box similar to Pearl Box 2 - Advanced
f

versations with excellent quality. It is able to play Pearl Box]. This is a box that may substitute for
8 source directly into rhe phone line. It can keep many boxes which produce tones in hertz, The
die phone line open. You can box without using a Pearl Box when operated correctly can produce
phone, and headphones {requires a modem). De- tones from -9999Hz, As you can see, 2600, 1633*
1

signed by Meeko of Hi-ReS UK. Year: 1994, 1336, and other crucial tones are obviously in its
Mega Box. A cable re router to hook up a sec- sound spectrum (yet you’d need two Pearl Boxes
ond line in youi house. to generate combined tones, such as the ones of
Modu Box (aka Modu] a Box), A second
phone the dial pad), Created bv Dr, (3-Code. Year: before
plug attached to an existing one. Designed by 1989.
Magnus Adept .
/ Pearl Box 2 Advanced Pearl Box] {similar
-

(Modulo Box) (expanded name for the Modu to Pearl Boxj. A Pearl Box made in an easier and
Box). See Moduki Box. cheaper way. Created and Tested by D (spate r.

(Music Box] [similar to Pink Box < 2)1* It s ba- Date: July 1 1989.
sically a Pink Box (2) without the LED. See Pink Pink Box. Allows you to hook two separate
Box (2). Created by Aluminium Gerbul. phone lines together to have Three-Way calling
Mute Box. This box lets the user receive long with hold on either line, as well as bringing a dial
distance calls without being detected, tone into the conversation with someone and al-
Neon Box (aka Record-o-Box) (erroneously lowing them to dial the number with touch tones
used as an alias tor the Bias! Box li) |simr!ar to so il will connect Three-Way, When they hang up,
Sound Blaster Box, Rock Box, Slug Box], A de- ii wilt disconnect Three-Way calling. No more

Page IS 2600 Magazine


.. . ) }

need with the hook for Three-Way.


to play tones for red boxing and green boxing. By Pink
Pink Box ( 2 [similar to Music Box]. The Panther.
function of a "Pink Box is to add hold button that Ring/Busy Box When connected
. phone to a
allows music or anything else to be played into the line, this box will cause a busy signal anytime a
telephone while the. person is on hold. This ruodifi call is made to that particular line. They can sBU
cation can either be done right in the telephone or use their phone to make outgoing calls. By
as a separate box. This kind of box can be com- MOrtaSkuld,
monly found in a phone shop, {Rock Box - Basic J [similar to the Rock Box -
Plaid Box Turns a pulse phone line into a Advanced, Neon Box, Sound Blaster Box The {

touch phone capable line. Rock Box channels the music from the stereo out i

(Portable Gray Box) (another name for the to the phone line via the headphone output. It also
Gray Box;, See Portable Silver Box. can record conversations. Created and designed by 11

Portable Silver Box (aka Portable Gray Boxy Video Vindicator of the Shadows of IGA
A bmteries -operated Silver Box that can lit in a / Rock Box - Advanced/ similar to the Rock
|

pocket for use in payphones or wherever. By The Box - Basie, Neon Box, Sound Blaster Box] The
Phone Phantom. Rock Box channels rhe music from the stereo out
(Power Box] similar f ron Box], The power
to I to the phone line via the headphone output. It alxo
bos is a simple device that will allow you to com- can record conversations. The Advanced version
pletely bypass the meter- reading equipment of the has more complex wiring and belter audio quality,
power company works by connecting the power
l( C reated and designed By Video Vindicator of the
line running into your house directly instead of Shadows of IGA.
through (he meter {which records electricity usage Sand Box. Usage unknown. Cited in the t rim
tor <he power company). When implemented cor son Box document. By Dr. D-t ode. Year: 1985 or
reedy, there is no possible way that you can he de- 1986.
I, T he
tected by the power company and therefore save / Scarlet Box ( (s mi ar to he No ise Bex
i I I

many hundreds of dollars through its use. Not a purpose of a Scarlet Box is to create a very bad
p break box Concept and Plans hv Cursoi Date: connection lr can be used to crush a BBS or just
August 9 1990. make life miserable for those you seek revenge
Puce Box This box emits vaporous LSD ine l upon. Written and created by The Pimp
noise may cause strychnine formal ion Servo Box. Uses R/C car servos to change
Purple Box, This box allows switching be- lines in poles outside of house. This could be a
tween two phone lines- putting one of them on nice idea, but very expensive and hard to do.
hold. A LED shows which line is on hold. Created Silver Box (aka Gray Box? [similar to Solid
by The Flash. Date: February 26 1986. Slate Silver Bo\|. The silver box transforms keys
Rainbow Box [non selective version of I he 3 6 9, # to special keys A, B, C\ D,
f .

Bottle-Nosed Gray box Connects the electric line


[* [Slug BoxJ similar to the Neon Box). A slug
|

to die phone line blowing up every thing. Odds are box is a recording box that slops am! si am, the tape
you will take out every phone in the neighborhood recorder when a connection is made. Date: May 14
and get caught. By The Dolphin that came from 1 990, 10:18 pm.
Belmont. Snow
Box. An underground television trans-
Razz Box This box allows you to tap your mitter built using commercially available parts.
neighbor's line without your neighbor knowing it. Not a phreak box. Date: June Id 1988.
You can also make free phone calls. Written by Solid State Silver Box (can be shortened as
The Razz and released by The Magnet of Crime SS Silver Box) [similar to Silver Box]. This box
Ring International. Date: November 12 1988. Uses an integrated circuit to generate the tones
{ R e cord-o- Box) (another name for the Neon rather than converting a phone keypad
Box ). Sec Neon Box (SSSilver Box) (short name for die Solid State
Red Box [similar to the Red Box Whistle] The Silver Box). See Solid Stale Silver Box.
Red Box basically simulates the sounds of coins {Sound Blaster BoxJ [similar to Neon Box.
being dropped into the coin slot of a payphone. Rock Box]. A device that adds a normal jack inter-
The traditional Red Box consists of a pair of face to a telephone, allow ing the sending of music
Wien- bridge oscillators with the timing controlled or tones into the phone line, or the recording o]
by 555 timer chips. conversations using The microphone input of a
j Red Box Whistle [similar to Lhe Red Box]. A recorder. Better than a Neon Box, By Shad-
phreak in the Midwest has extensively tested a ow Hawk Date: March 31 1994.
method oj red boxing which uses nothing more Static Box Tins box keeps the voltage regu-
.

than a pair of brass or aluminum whistles. This lated so that you can avoid static. This allow a
method Is very similar to the original blue boxing more stable line for high speed modems (which at
as it was discovered by Cap At Crunch Reported the time meant 2400bps). In a certain way it’s the
hy The Researcher. opposite of boxes like the Noise Box. Created by
Red Green Box [combines a Red Box and a The Usurper and The Raver of the ords of Twi- i

Green Box]. This is a device that generates the light- Date: Originally released on November 21

Spring 2002 Page 19


j T .

1986, Second release on December 27 1987. tric meter run backwards, Not a phreak box By
Switch Box. With the Switch Box you cun put Pure Evil.
one or both phone tines on hold with visible indi- Urine Box (aka Zap Box). It basically creates a
cators of each lines status, conference call with
eapacitative disturbance between the ring and lip
two people, change a phone from line 1 to line 2 ,

wires in another’s telephone headset. By Wolf-


and make one phone line physically dead to
lastly,

the outside world. By Autopsy Saw.


gang von Albatross of the U nderground_E ite. I

Sword Box The sword box is just essentially a


,
Date: March 2 1986.
Bud/Beige/ Day-Glo Box with enhancements and V-Box. Detect v oil age changes in phone lines
modifications, i
he structural differences in the (used for taps).
Sword Box make it better however, and thus safer Violet Box This box allows
. calls to be made
for you to use. By Grim Reaper/$TS. Date; No-
from payphones with just one coin, keeping ihe
vember 22 987. 1

line from being released when time is up, I he au-


Tan Box ik\ not the short name of the Tanger-
ine Box, which is a different box). It allows you to
thor was going to tail this ihe " Yellow. Violet and
make recordings from phone fine, and it writ a Brown Box" but then decided that name w as too
only record once the victim’s phone is picked up long so he stuck to just violet because it sounded
U s like a Neon Box combined with a Beige Box. nice. By The Kez*
Tan Box (2) it s not the shon name of the Tan-
{
White Box. Turns a normal touch tone keypad
gerine Box, which is a different box). It serves as a
into a portable uni i. This kind of box can be com-
phone ringer. You have two choices for ringers: a
monly found in a phone shop,
piezoelectric transducer (ringer) or a standard 8
ohm speaker [White Box (2)] l similar to Crimson Box,
(Tanger Box) (short name for the Tangerine Green Box (2), Orange Box, Hold Box, Hold Oil
Box), See Tangerine Box. Sox, Yellow Box (2)j. A hold burton. See Crimson
Tangerine Box (can be shortened as Tanger Box,
Box. Can't be shortened as Tan Box, which is a White Gold Box. A While Box and a Gold Box
different box). Enables you to plug in, then listen ii
combined. Created by The Traveler.
to the conversation, without them hearing a click
YeHow Box. This box can switch a payphone
or anything... plus a jack for headphone, or tape.
By Happy Harley. from working to out of order and vice versa. By
(Tap Box) (another name for the Lunch Box). Captain Hook. Date; February 3 1986 - 5:47.

See umch Box.


1 / Yellow Box Crimson Box.
(2)\ [siiuila to
[Three Box [similar In Brown Box, Party Green Box (2), Orange Box, Hold Box. Hold On
Box, Con Box], Use one line, another line, or both. Box, White Box (2|). A hold button. See Crimson
Like a Con Box, but better because it uses LEDs
Box.
lorwhich line you are on.
(Znp Box) (another name for the Urine Box),
Tran Box (similar to Power Box], Ii will pul a
See Urine Box. The scheme and description is the
reverse phase signal on the line and cancel out the
other phase and put a reverse phase signal running same for the urine box. but is s attributed to an-

everything in the house. It should make the elec- s >tb e r uu thor. By KiLLg Ore fmu t [BUI ,gc ]

— Over the years, wo managed


of eorpora-
ve to get a lot
^ ons agencies, and entire governments very angry at as
'

A for the things we


magazine or the web site.
print in the
Ife become dit’licult for us to keep track of all the legal
threats we've gotten So we decided to stick it ah on a ,

u shirt so nobody would forget.


I . ^ I The from of the shirt is a graphical image of our eon-
linuing ride through the streets of Corporate America.
EggfW JyAhl
mi i t
const ant v ait rac ting the attention of enforcement agen-
I
7-

^cies of all sorts. On the back you'll find a conceit tour


=•••
- m
^
•w TV':. , \ _ —
^
l1 >tvlc listing of the various legal threats and lawsuits
'
T
---

we've faced. Gel yours


J
soon before we have to add more
\
*
| h reals and make the print smaller!
i

Order through our online store at store. 2600. eom or send $18 (US $22 overseas) to

2600. PO Box 752. Middle Island, NY 1 1953 USA. Indicate your size (L, XL. XXL)

Page 20 2600 Magazine


by Captain B other words, if the tittle spring clip on the handset
The principal and construction of this box is cord was facing down, crimp the line cord plug
quite simple. You’ re modifying a phone handsel on facing the same way as that was.) To crimp,
cord for use as a line cord. All you will need for first push the line cord plug over the end of the
making this is a wire culler (or wire cm ter/s trip- handset cord as mentioned, then insert that end of
le n and modular crimp tool Radio Shack sells the handsel cord into the modular crimp tool
both, bm you can also find the modular crimp tool properly, and squeeze the handles together firmly
at other places that sell phones and phone acces- until it stops {which is quite fast). Sec the instruc-
sories. Radio Shack sells two different modular
tions thatcame with the modular crimp tool if
crimp tools. The only difference is that the you need more help.
cheaper one ($9.99) has no wire cutter and only After crimping a line cord plug on one end oi
crimps RJ1 L 14, and 25 (one. two, and three line)
flic handset cord, you have only to repeat the
modular plugs. Hie more expensive one ($29*99)
same process end of the handset cord
for the other
has a built in wire cutter and also crimps plugs on
and you're done- If you messed up on the polarity
RJ45 [four line) modular plugs. As long as you
at either end. it should still work, but keeping po-
have a wire cutter, you don't need to drop $30 on
larity correct is the rightway. As long as you're
ihe more expensive crimp rook
eaircftt and work patiently, it’s a piece of cake.
!

It should l>e noted that some phone handsel


think the bungee box is great for beige box-
I
cords have four conductors inside, while others
have two But unless you’re going to use a two
ing purposes, because when phreaking out in the

line phone, the cord won't need to have more than


held, you don't want a tangled mess of lifte cord
two conductors. Take a phone handset cord and to have to disconnect and qore away when you
look first at (lie hide wires in the plug to observe have to get out of the scene in a hurry. It should
for the color scheme f thus making note of the cor- be mentioned that another way to accomplish this
rect polarity ). Then cm off that handset cord plug. is to use a retractable line cord. It comes in its

You could do both at once, but you might lose own These can be bought either
circular ease.
track of the correct polarity. To simplify, do one from Radio Shack for $19.99 or Home tepol for I

end of the cord a lime. Try to cut off the plug as


at about SI 5. he one from Radio Shack is 12 feet
i

close as possible with where it connects to the long, the one from Home Depot is 16 feet long
cord. Take a [wo line (RJJ4) modular line cord {according to the packages). Have plum,
plug and crimp it on the handset cord facing the AU credit for the name of this box goes to icOn
same way as the previous handsel cord was. (In nfLPH.

A( long last, our documentary film


"Freedom Downtime" is available
on videotape. This is. the story of !

ihe Free Kevin movement, our trip


across the United States to talk to
people involved in the Kevin Mri-
niek affair, and our attempts to
Tjjpeople behind
Takedown a major motion pic-
fdsotit ps spreadvlies

II h ^ -JW9 H ML* I about Kevin to moviegoers every-


where.
TwMBMl*"-
VHS NTSC format, 121 minutes.^
Order through bur online store at store.2600.com or send $20 (US $23 overseas)
to 2600, PO Rox 752. Middle Island. MV 1 1953 USA-

Spring 2002 Page 21


by Acidus tempt to improve security with the addition ot II
i
1

CampusWide is the mostly widely used card converters y, but in truth, they have weakened an
access system in America today, It sadly is the already frail system.
least secure, CampusWide an ID card sdhmorr-
is The Campu sWide system is the most prevalent,
originajly created by AT&T and now owned by and my to spot. The readers are black metal or
Blackboard. U is an ID card that can he used to plastic, almost have an LCD screen, and they
alt

purchase things from vending /laundry machines have no writing on them except for the AT&T logo
or the college bookstore just like a debt card. It's with the word AT&T" under it The newer Black-
used to check out books from libraries, open com- board ones work exactly the same as the AT&T
puter bibs and buildings at night, gain access to ones, only they have Blackboard written on them.
parking decks, and even get you into sporting Information on (he CampusWide system was very
events. The CampusWide system gives everyone a hard to find. I started lot? king right after AT&T
card that Sets them access both unattended and at- sold it when they were clearing out their old web
tended card readers and Points of Sale. All these pages and Blackboard was still creating their web
actions and transactions are sent to a central server pages. Needless to say, AT&T had much better
which stores all the information in a database A documentation of the specs ol the system than
confirm or deny signal is sent back so the card Blackboard does. Sadly, all of it is off AT&T's
reader page now and you’ll have to hurry to still find it
Back in the day (last ten years), there were two cached on Google. Luckily saved everything, andI

major card systems available to colleges: AT&T's should post it up soon.


CampusWide system (also known as Optijn900O) The Server
and (college's Envision. Envision was one of the Thu CampusWide system is recommended to
first card systems ever made. The seeds of the cur- run on Hi *9000 machines, though any RISC
rent Envision system go all the way back to 1984 p roe ess n will do. h only runs on
i
HP-UX (Black
with a company called Special Teams. The original hoard currently installs ver Lx). I The AT&T sys-
engineers from Special Teams went through sev- tem had a list of specs that the end users had to
eral companies, each one being bought by another have to support ihe software. These included the
company every year for several years, before they above, but also a four gig capacity Digital Audio
came to leol lege, AT&T saw the market for card Tape and a UPS (hat could keep the system up for
systems and jumped into [he mix as well stealing 20 minutes (Blackboard's newer specs suggest a
some of the ideas behind the system by hiring de- Best Fcrrups .8 KVA battery that can go for 45
1

velopers of Envision away from [college. They re- minutes). More interestingly, the CampusWide
leased a system known as CampusWide, It is system is required to have a 9600 bps modem for
commonly called Opt ini 9000 or OneCard, how- remote diagnostics, he system itself consists of
i

ever Iwill continue to call it by its most well two pans: The Application Processor (Alb and the
known name, CampusWide So why do you need Network Processor (NP). The Application Proces-
to know all this history? Because the core of all sor is ihe back end of Campus Wide, the part the
modem card systems is based entirely on 1984 users never see. It manages ihe database where all
technology! The original engineers from Special the information is s lored and provides an interface
Team and people trained in their ideas have been for human operators to look at logs and run re
the only people in the country designing and build- ports, as well as change c on tgurat ion/ privileges I

ing these things. That means that the weaknesses and transaction s/account maintenance. The NP is
in the reader/server infrastructure that point put 1 the gateway from the infrastructure to the AP. Er
here are found in every card system made in the lakes in (he requests from readers around campus,
United States in the last 15 years! By the mid to converts the mode of communications into com-
late 90 's CampusWide held the largest market mands the AP can understand, and then passes it.

share Then in November 2000 a newly formed P along. AT&T CampusWide could support up 60
company called Blackboard purchased both Fin vi- communication lines and 1000 card readers. The
sion and CampusWide. It sells both systems under new Blackboard system allows up to 3072 readers.
the names Envision and Optim90QG, Blackboard's The Database
first order of business was to upgrade the two sys- Alt the information about a student or em-
tems to use newer technology, only to learn that ployee isn't stored on the card for security reasons,
they couldn't! Too many colleges and even busi- it’s stored in the database (the card simply has an

nesses had he older equipment and Blackboard


I account number which is used to organize the data
couldn’t afford to drop compatibility! They have in the database). The database used by the current

tried to merge older and newer technology in an at- Blackboard system fa db Vista. The database for the

Page 22 2600 Magazine


) n

AT&T version was never advertised by AT&T bui photo printer is used and the company recom-
was believed to be Informix. However* based on mended by B lack board is Polaroid (just like the
the modular design of CmupukWkie, 1 believe any printers at the DM
V ) The magnetic stripe on the
SQL queried relational database should work. The card is a Standard American Banker Association
database is most likely not encrypted or protected (ABA) Track 2. Any card reader/capture tool can
ut any way otba than by isolation. The only way read these cards. The cards are encoded on high
to get to it is either at the console of the APor by Coercivity stripes (known as HiCo), which are
the commands from card readers that have al-
sent very resistance to wear and tear. These cards only
ready passed through vhe NP Blackboard's as- use Track 2 of the card which is read only. It is in-
sumption that these two ways of reaching the AP teresting that they don't use Track 3 which is
are secure is one of the system's downfalls. The read/write. Track 2> s information breakdown is as
database can store up to 9,999 different accounts* follows:
each account having many different holds. The Sum Sentinel = / charm u>r
balance the person has and the doors he can open Pri nm ry A t Ct tank N unite r = up U > 1 9 t ha ra t ti- rs
are included in the system. The balance will be a Separator = / character
lloatine point number* and the doors the person Country Ct rde - 3 rha mete rs
can open will most likely be a string of characters, Expiration Date or Separator -- f or 4 characters
with the bits being used to tell which doors he can Junk data -fids the card up to 40 characters
or can open The doors are most likely grouped
t
IJiC ( Longitudinal Redundant \ Check = ( char-
into /ones* so that the five doors into a building acter
have one bit instead of five separate hits saying
whether the person can open those doors or not.
This idea is upheld by Lhe fact that Blackboard
says the users are given plans and they can be up-
dated regarding their access to buildings. These
plans grant different levels of security access to a
building. Lower levels can get into the building
through all the exits, the next level can access labs
on a certain Moor. etc. Without direct inspection of
the database, only educated guesses can be made
about its structure. (I have totally left out any pro-
visions for checking out hoofed and other things lhe
card can do,
The Workstations As you can
most of this applies to banks.
see,

Tlie AP was interfaced originally by the AT&T However, the account number have stamped on I

system only at the server console, or through dumb my Campus Wide card is lb characters long* so the
terminals connected to 19.200 bps serial lines. To- Primary Account number held is known to be
ward the end of the AT&T days and now with used. < TmpusWidc also vTlows for lottl cards. IV a
Blackboard changes to someone's security privi- card an entry is made in that person’s table
is lost,

leges can be made from any workstation on cam- ill the database* the last digit of the account num-

pus. watched ibis process several times. A certain


I
ber is increased by one (this is called the check
software package was used to connect through digit so of the ]6 digit account number have, ihe
-
1

TCP/IP to the AP. saw lhe name once* briefly,


( I
first 15 digits are my number; the 16th digit is Lhe

and for some reason 1 thought it wa s Osiris. check digit). The


old card that uses the old check
Checking on this name has turned up no results. digit is deactivated and a new card is printed.
Perhaps this is a proprietary piece of software spe- The Infrastructure
cific to m> college* or simple a closely guarded The infrastructure is a security through obscu-
y
software package from Blackboard.) A GUT was ri
t "
pi oy of tbe sy st em C > r gi n a lly lhe
.
i
s y s le i Was
used to select my name from a list of students, A designed to run over several RS- 485 drop lines.
summary of my security privileges then came up. (These are the 60 communication lines mentioned
and the ability to add and remove these was there before RS-485 is a very robust means of trails
)

as well. This GUI was incredibly user friendly* as mining data. (The whole Campus Wide system is
ihe man udng it had nil computer knowledge. I
designed to take a beating.) Unlike RS-232, which
i ' nly got to few people having new secu-
watch a
has a protocol built into the standard that says how
rely privileges activated, and never got to use it
devices must talk to each other (stop bus, baud,
myself* so have no way of knowing if the debt
1
handshaking* etc*}, RS-485 has none of that. It a

balance can be aceessed/c hanged from this GUI. Way for a master device dial sits at the end of a
The Card communication line to talk to slave devices that
The ID cards that are used are your standard are daisy chained on the line. The Campus Wide

mag stripe cards. JThcy arc made of


\.NSI C’R-KO system uses the full duplex version of RS-485
PVC and are 2J25 by 3.375 inches. They are where slaves can speak to the master before the
made on site at ihe college \ "card station." and master polls them for data. (Campus Wide needs
Mbs ro have the sub-seconds Limes they advertise.
normally have a photo ID on them. A 300 dpi

Spring 2002 Page 23


!

However, the NP still polls all the readers on a reg- that takes in 16 different RS-485 devices, converts
ular basis and ean be interrupted by a reader when all communications into TCP/IP packets, and
their
a transaction comes in.) The data lines are very ro- encrypts them to send over the network. The NP
bust against noise and interference. RS-485 has (hen has a converter at its end that converts the
two each direction, called
lines in A and B. Data is packet back lo RS-485 format. The IP converter is
sent by having a difference an the voltage of A and assigned an IP address which is most likely a static
B of more than five volts. This mean that if you address. The IP converter also most likely has a
have a signal being sent and A is at 10 volts, B is at daemon on it you can telnet into lo look at the sta-
15, and a power spike comes along, the spike will tus and perhaps change configuration info. Black-
boost both voltages by the power of the spike. board says he data from these boxes is encrypted
l

However, the difference between the higher power and die box certainly has the power to crunch
A and B will still he five volts and the data is not some numbers. iowever, have found that if en
3 I

corrupted. Over short distances, speeds of 10Mbit eryptton is good, then companies will brag that
can be achieved, low even the longer the cable is,
f about the key length, etc. The only data Black-
the lower Lite speed. All Cam pus Wide card readers board gives about the encryption is that the keys
operate at 9600 bps, thus making the maximum can be changed automatically at any interval from
distance of the RS-485 drop line 4KX) feet at that the AP.
speed. This can be extended through the use of re- For the longest time at my college if an off-
peaters and boosters on the iine. RS-485 is very campus food joint wanted to have the student he
common in the industry, but secure" at a college able to use their school cards to pay for food, they
since it is unlikely anyone would have a means of had to pay For an expensive leased line that con-
interfacing to it. Commercial RS-485 RS-232 to nected them to the school. It's my guess that this
converters are available and prices range from $50 was the RS-485 line or something similar. Re-
to a few hundred, V IDL
designs of these converts
t cently (in the last six months) my college offered
can be found on the Internet, and thus an FPGA cheap ( than $300) boxes to nearby pizza joints
less
could be configured to decode RS-485 signals. that would allow lor payment w ith a school card.
While researching came across a post from some-
I These boxes were simply card readers with
one claiming to be a field tech for some company. modems installed, much like a credit card valida-
He said that you could make an RS-485 to RS-232 tor. These modems are dialing the NP directly!
converter very easily bv w iring: Major security risk
RS-232 Xmii =* RS-485 RX The infrastructure ends up like this. All the de-
RS-232 Rvcd = RS-485 TX vices in a building send their lines into one place in
No one posted after him to say he was wrong. 1 the budding. This where multiplexers exist
is

don’t know if it would work, since the second wire which split the main RS-485 drop line up into
of the pair of RS-485 data lines isn’t even men- slices tor each reader These multiplexers also can
tioned, and it's the difference between these two boost the power of the main drop line, letting it

lines that sends the data. Also, the possibility of travel longer distances. They can be stored in a
high voltage on an RS-485 line could easily dam locked networking closet or in these big metal cab-
age a serial port on a computer, if not fry the moth- inets on the wall of a room. AT&T called these
erboard. Also, this assumes the data scheme used MW/MHWMKNC - Wall Mount Enclosures. This

to transmit data on the 485 line is identical to RS- metal box has a handle and a lock, but the front of
232. Phis doesn't have to be true, since the way the handle and lock assembly has four Mat head
data is represented m packets, streams, stop bits,
( screws. used a cheap metal knife and opened ihis
J

RS-485. It you could


parity, etc.) is not defined by locked box Inside I found the LCM (Laundry
get to the data streams, you have no idea what the Center Multiplexes) that controlled the laundry
scheme used to represent it is, and thus how to de- room was in. Everything had "AT&T Cam-
1

code it. This last problem however, is moot, as you pus Wide Access Solution” written on it. as well as
will read in the Exploits section, lots of Motorola chips. Sadly, this was early in my
AT&T would recommend that these lines be investigation, and haven't gone hack to look
1

used (indeed all the readers can only transmit their again.
data RS-485 mode), however the data can travel
iii The drop coming to the building can be
lines
over any facility from telephone lines to radio traced back ail the way to the building that houses
waves, provided that full duplex 9600 bps asyn- the NP There the NP interfaces with the AP to op
chronous communication can occur on them. The prove or deny transactions.
NP is the part of the system that would sort all this The Readers
out. AT&T did however specifically say that using Every reader imaginable is available to a col-
an existing Ethernet or computer network was not lege from Blackboard. Laundry readers, vending
a good idea, as it sent he data out into the wild,
I machine readers, Point ol Sale (PCS) terminals in
and would slow down both the Campus Wide sys- the campus bookstore, door readers, elevators,
tem and the existing computer network. However, copiers, football game attendance, everything!!!
Blackboard now offers an IP converter This de- All of the readers communicate using RS- 485
vice is a simple computer (it has a Pentium class lines, and if any other medium is used bet ween the
processor and a standard off the shelf NIC Card) reader and the NP {such as TCP/IP networking by

Page 24 2600 Magazine


way of the IP converter), ii must be converted back and shape, but all have several fundamental fea-
to RS-4K5 at the NP since all CampusWide uses
S tures. They all have an LCD screen of some kind.
that standard Everything is back wands compati- Ihe most common being 2\I6 characters Most arc .

ble.The majority of my college campus has AT&T mounted to walks and the povver/data lines are pro-
readers on them, though a lew new Blackboard tected by metal conduit. Coke readers are mounted
readers are showing op. on a Coke machine where the dollar bill acceptor
would go. Of this group one stands out: the Value
Transfer station! Unlike the GUI at the worksta-
tions * this reader can direct to query about the ac-
count balance of the cardholder and add money to
it as well (by feeding in dollar bills like a change

mac h ne ) In add i ti on, it di spe n se s te porary P VC


i .
m
cards that can be credited, so people can do laun-
dry, etc. if they forget their card. This means that
this station can leh the AP to create a new account
and give it x number of dollars!
Final!) there arc the POS devices, A student
would never they are used in
get to use these,
cafeterias and bookstores. They allow for payment
by the student ID card and several other options.
All these readers have inherent similarities.
Most are made from high impact plastic or metal.
If ii s wall mounted, there will he metal conduit
3

running out of the top which holds the power and


data lines. All have their programcode on
ROM/NV-RAM chips. 1 once managed to power
down a card reader for :i copier. When I turned it

back on, it ran through several self tests in the span


of a few seconds. vaw messages on the LCD that
I

said things like "ROM ver" and CRC check com-


plete," AT&T and now Blackboard say all the read-
ers, including POS, wdl power up to
operating full
status without any user input in a maximum of 20
Readers can he broken into three categories: seconds. All of these readers can store swipes of
security, self vending, and POS. cards and transactions in their local until NV RAM
Security readers are made of high density plas- it can reach the NK and through it, the AP to con-

tic and consist of a vertical swipe slot and two firm the transaction While disconnected front the
LEDs They are green when they are not locked NP, the readers show no warning lights or anything
and reel when they are. When you swipe, a card to like that. Some readers, such as the security read-
open a door you are cleared for, the light will ers, can be wired to a UPS to keep areas secure
change to green for around 10 seconds. If the door even w hen the power goes out.
has not been opened in that time, it locks again. To A Simple Transaction
allow for handicapped people who may not be able Let s run through a simple transaction. am at a I

to get to the door vw tinvt. a pices imity sensor is laundry reader, tell the reader with a key pad
I

available to receive signals from a key source to which washer I want to use. Let's say choose t 4. 1

open the door. Information about vvhai frequencies then swipe my card. The reader sends a signal
1

are used to control the door are obviously not pub- that contains the account number bind she amount
lished by either AT&T of Blackboard. There is also of my purchase and most likely nothing more) to
a model ol door reader with both a swipe and a 0-9 the NP through some medium (most likely it's a
keypad for codes. have encountered no such
\
straight R5-4S5 line, but an IP converter could be
model and have no idea how it works. Advanced installed by the university). The NP decodes the
forms of these three security readers are available data out of the RS-485 line and parses it into com-
which have the ability to have a local database of mand 1
APcan
understand. The \P uses the ac-
- the
4,000 (expandable to 6,000) account numbers
1
count number to pull up my account and checks
stored in NVRAM. This way if for some reason the balance against the amount requested. It then
the card reader canT reach the NP to confirm
either deducts the money from my account and
someone's identity, then the reader can check its tells Ihe NPto send an OK
signal, or to send a deny
local records. The tricky bastards also built the signal along with the new balance of my account,
readers so there is no visible difference between a The P forwards the reply back to the reader, and
jN
reader that can’t reach the N P and one that can. the reader (if it got an OK signal) sends an elec-
The vending machines are the most color-
self
tronic pulse to the coin tester inside the washer C4
ful group They are the best to hack because they
and tell it that $.50 was received. The washer is re-
arc unattended and work 24/7. They vary in size
tarded for all it knows put $.50 m it with coins. [

Spring 2002 Page 25


-

and it gives me a load. Transfer Stations routinely have their bac k s acces-
ExploitsThe sible from janitor or utility closets, which are
Did you see the problem with the above scenar- rarely locked The 485 line literally comes out of
ios? There are several ways to cheat the system. It the back of a coke machine unprotected. The flexi-
] can record the its OK
Lo sell it to him' signal
1

ble piping that carries the coin w ires from the laun
r

from the NP to the reader and play it to the reader dry reader to the washer are secured to the back of
again. I will get another load of wash. Also, if I
the washer with flat head screws. It is pathetically
could get to the wires that go from the Coke reader unprotected. T he phone numbers the modems dial
to inside the Coke machine that send the coin from off campus eateries are easily socially engi-
pulses, can make the Coke machine think money
1
neered out of the minimum wage workers there,
has been paid, have looked at Coke machines
I
and they let you dial directly to the NP. Or you
with these Coke readers. Out ihe back of them they could simply find the range of telephone numbers
have an RJ jack (though it will have RS-4H5 sig-
1
1
of the building that the card system is housed in
nals on it). All need is a converter and laptop
and wardtal it The AP is required by Blackboard
1 ll

and can trap the signals back and forth between


to have a modem for diagnostics. You could steal a
I

the reader and the NP. You don’t even need to


copy of the GUI of a computer and then edit peo-
know what the data scheme used on the RS-485 ple’s privileges to your heart’s content. And even
line is, just send to the reader what you intercepted
worse, the Envision system is exactly the same as
front the NP and it w ilt work. It is even easier if
Cam pus Wide, except it uses a Windows NT/2000
the traffic takes place over a TCP/IP network. If I

machine using Oracle as its database. Every flaw- 1

1
learn the IP address of the IP converter. can sim- 1

mentioned will work against Envision as well.


ply send packets to it from anywhere in the world
Hell, both systems even use the same readers! And
(provided can telnet into the college's TCP/IP
1

there is no fear of having any of your actions


network) that contain the RS-485 code to spit out a
logged. Once you trap the RS-485 signals from the
Coke! You can fool door readers as well if you can
get to the wires that go from the reader to the mag- NP to She reader, just play it back to the reader
net holding the door shut. Just send the correct
whenever. The A P never knows you are doing any-
pulses, this system is horribly insecure because
thing and thus doesn't log it, and the reader as-

you can completely bypass the Campus Wide inter- sumes that any data it gets must be secure. Now
face: The Value Transfer Stations are even worse. tell me this. The next rime you swipe a Cam-

They have the ability to make the AP create a new pus Wide card to get into a football game, how do
account and set a starling balance of any amount. you know' someone isn't trapping the data and cre-
Just gain access Lo the RS-485 lines, record the ating a copy of your account onto a card from a
traffic to and from the NP while you are getting a hacked Value Iran sic r Station? Hopefully this arti-
temporary card, and you have the system to create cle will force Blackboard to change to a more se-
and alter debt accounts. cure system.
With a system like this, you would think that Thank m to Jitn at Blackboard for ail the techni-
the RS-485 lines would be protected with massive cal info ,
and various websites like rs485.com,
security. They aren't. Metal conduit protecting the google, coni k cached webpages, and howstuff
lines commonly stops at the hanging ceiling. Value works, com.

Exchange Carriers). The "Incumbents" are the


guys who were around since before the breakup
ot AT&T, while the "Competi fives'' are the new
guys on the block who are supposed to help keep
the oldguys "honest" and force them to keep raLcs
competitive. The guys who carry your conversa-
tions as a long distance call are IXC’s (IntereX-
ehange Carriers).
As an old "phone phreak." it s almost embar-
rassing that should have to admit that my "day
I

job" is that of a Directory Assistance(DA) opera-


tor for a major Long Distance Carrier ilXCk It

Page 26 2600 Magazine


, 1

doesn't matter which one because 1 don I really lic Service Commission offices but never need to
work them anyway. In these modern days of
for talk to. Keep in mind that the telephone book pub-
deregulation, work for a third-parly outfit that is
I lishing arm of those same phone companies have
hired to provide the service cheaper than they DA been "spun -off so the right hand really doesn't
can do the job in-house. 1 hat's because I live in know what the left hand is doing because it isn't
one of the numerous "Right-To-Work" Mules in its own left hand any more!

the nation's sun-belt, and get paid pittance. The other problem is when callers call am of
One of the major embarrassments of my job state DA at
1
N PA-555-12 12 N PA
"Numbering
( is

happens when someone calls for the local phone Plan Area.' the telcos in-house term for Area
company - not just in a small town, hut even in Codes A the White Pages listings are nevet dear
major cities! The phone company never puts itself us to where an out-of-state caller should call about
in the directory so it can he found! And of course, discussing a bill. Actually. should compliment
1

i only handle While Pages. If the caller doesn't BellSouth here. They actually do have a specific
know the name of the telco. I’ not allowed (by m number for ou\-oCs\att callers to dud. Let me i ell

FCC tariff, I’m (old) 10 provide a Yellow Pages' 1

you why.
search. keep threatening to fake some vacation
I The number most BellSouth states to reach
in
time to visit die reading room of (he FCC m the telco for residential customers is 7H1J-2355
Washington some lime and look this stuff up. but (78U-BELLk It’s always u local number wherever
1 really can’i afford the trip (see comment on vou call from, and if you
» 4
live in an area that has
K ight F Wor k " st at e abo ve
Vl
i i 10-digit dialing, you have to use your area code in
Since cover a number ol states in my job.
I I front of thai number to get there. The number is
gel to look at the listings of a number of major never good from out of state, but most of my col-
TEC's. Verizon will have Verizon Wireless” list- leagues" in the Call Center don'i know this and
ings for every hamlet and burg in the nation - but give ii out - causing much frustration when the
try to bad a number tov residential land -line ser- culler callsback to complain and gel a good num-
vice that an out of suite caller can ring up to see ber. It’s a toll free number, and clearly marked
about the problem with Aunt Minnie s account "out of state" but most callers don’t want the "loll
back home, and I'm up against the tariff asking Free Number Runaround ." They want a "direct
Do you now the name of the phone company in
I' number." then gel the recording that the number
7
ihat area Even when break down and suggest I hi the 780 exchange is not valid

that Verizon as the primary local carrier in Boston, So how does a telco go about changing the
or Amen tech in Chicago flipping lhai this isn’t listings m tile directory database lhai I (and my
one of the calls being 'monitored for Quality As- 600 friends in my call center) use every day? Do
surance"), jusl what number am supposed to 1 what we people who call wondering why their
tell

supply? Deregulation began in 198-6 wash the number isn’t in our directory: "Call your Local
Modified Final Judgment. Here l am in the next Phone Company, and make sure they have your
century wondering what I'm supposed to tell a listing correct. Our information is updated from
customer who's on their third call to Directory the information lhai they provide lo ns."
Assistance looking to gel a phone account So there it is. Get with it. you telcos! Get your
squared away! act together and pretend you're "jusl another
People call in w ith the most compelling stories American company." Even vou need to check
about how their elderly aunt back home in Vour company's telephone book listings once in a
Chicago or Boston can't deal with their phone while, M ike sure your customers can find you
company any more, and they need to call and take when Directory Assistance, whether
they call
care of the charges. Or somebody in (he Rust Belt they’re in town or across the country - jusl like
up north is trying to reach the telco of their winter every other company has to. Otherwise, your cus-
home in the South to deal with a problem on their tomers will go to that CL EC across town. Usually,
bill. It isn’t that I've got the time to stop and listen they can be found in the Phone. Book!
(n their stories, it’s shat can't shut them up while I

Lr> n g
i i scare h he m a n y ree u rre nee s of he D -
j > t l i

rectory Sales Office numbers while trying to find


an out of ^tate. caller to call.
a listing for
The rick here is that she phone companies
l

have all their information about contacting them


packed in the front pages of (heir local telephone
directories. over 15 years of deregulation, it
In
hasn’t occurred to most of them to advertise in
their own Yellow Pages under "Telephone Com-
panies" or to put in as big a listing in the White
Pag es as their HI ectri c Cr>m pa y r
\
uLilit y bre 1 i ren
the ones they keep passing in the halls of the Pub-

Spring 2002 Page 2 7


Regrettably, we left out the source for two uLilitiu^ that went spawn exeefurgv, errdi);
along with last issue's amde iwi the Inferno operating sys ei ! :
= >-errch:
tern We apologize for the omission and include them below: 1 (err I
- nil) j

sys-<fprim(suterri ’ logon: '•;


>
", err):

- logon .h -
svs-<raise("fa»i:uxec failed");

# c logon 1

port of wm/Iogon to the command line

M exedargv: list of string, errch: chan of string )

p Ju3 a \{ da in <8> S wbt met


w
I i

# http: // w s
1

w bt net/ ’dihai #ys-<pC£Jfsy s-<NEWFr?* ,


0 :: 1 2 nil k

e := ref Svs-dLvLeplion;
implement dogon: if f sys -< rescud *= Sys-cEXCETTION) 11

fid l c) l

* y s -c r e sC ue dt S y s<G N C F nil): ,

include "sys,m"; eJtii:

sys: Sys; 1

argv = "/dis/sh/sh,dis"
r

include 'draw.m :: "-i" :: "-n' :: niE:

cmd = Load Command lid argv:


include sh,m
r p1

; if {cmd = nil) (

include "newris.ni". errch >-- s>s-<sprint< cannot load %s: %r". hd argvn
1
else |

e logon: module errch >-= nil:

i cmd-dnbl m3, argv):


ini r: fn{ ni 1 : rdf l
w -<Comex 1 „ a rgv: list of sEri n g); \

I; i

initinil: ref Draw-<( (intent, argv: list of string! logon* user: string); inf

I (

sys = load Sp 5ys<PATH; userdir := 7usr/"+u.ser:


sy s -cprintC'clogon . by dalai (dal ai @ swbLnet)\n i f{ sy s-<chd t r{ u serdi r ) >0 ) j

sys-<pnnt{ "There is no home directory far that user


s y s- <pdUsyx-<» OR KNSjsy - < FOR K FIX nil \ mounted on Hits maduneW K
return 0:
progdir :
- "#p/" + string sys^pciltO. nil);
1

fcfrjl - sy pmgd r+ ‘Vctl svs-<OVVRITK'i; i


1

'

if(,kfd — nil) \

s y s-<spri 1 1
1
"eannot i *pe n %s 1

Tr " pro gtlir+'Vci Id,


.
# Sel the user Id

sys-<raiserfaiS:bad prog dir" n #


I'd sys-<of^n( "/dev/user", sys cOWRITE);
)

ifft'd = nil)
i
\

usr .= sys-<prim ' tailed to open /dev/usef: ^tW);


iff argv l- nil) ( return U;
argv - 1 argv.
=
1
l

ifltugv 1= nil &,&. hd "-iCf |


h := array of byte user;
argv - ll argv: iHsys"<wriidfd. h. len b) >(|) (

ifiaigv = nil! \
sys-cprinU "hi led m write /dev/user with error: (;
-f r\ti '
>

usr = hd argv: return 0:


argv = fJ argv: }

}
return 1

if (usr = nil ||
f logon (usr)) |
stden }: ref Sys*<FD
dag on
1

svx-<pri
^
nit 'usage: -u usciV'): f

1
return sy'f^<lildcs{2);

(olt . nil ): sys-<stat{ namespace " );


-

— - dognnTi
if(ok <= 0) [

ns ;= load Newns Mewns-cFATH:


iffns — nil}

svs-<primi "failed to load namespace builrfer\n hciirircth


else if {'{nserr := ns-<newn.s(nil, nil)) '.= nil)
sys-<pnmf "error in user namespace tile: %s", nserri; tf be 1 1 It re .b : /keydb/piissworil decoder
H
svs-<pmtif \n"H #
\
# by : dahiildalai^swbi.tiet)

\
# hllp://ww vow bt. ne(/-daJui
sv .s-<f pn nti. kid. " killgtp" );
errch := chan of string,

Page 28 2600 Magazine


; ;, ; ) ); . ) :

implement hel fire;


l

pwbu fl' 2 - ,i nay key nn g-<S H Ad


f
1 e nj o I by c£

pwbufT f= array f key ri ng -<S H A ri len 1 of byte;


1
include "sys.ni' ;

sys; Sys; # some common passwords


try
1

include "drawn si ':


fort n I; n >4: tj+-h|
draw; Draw;
include "hufio.m",
iffn — 1

pwbu IT = array of by (e "password';


hufio BuIict;
l obi. it import bufio;
iff n — 2)

include "strtng.m"; p whuff = array of by g uid; I

iffn =- 3)
Mr; String;
include "arg.ip";
pwbu 17 = array of byte

aig; \rg;
. include "keyringurT; fceyring^sha(p whuff. keynng-^SKAdieri, pwbuffX nil);

keyring; Keyring,
include "set.tjmy.nV’: tempi ;= string pwbuffZ;
pass; Password; temp A : string pw.pw;

i ft temp A — tempt >1

hellfire: module fjmshcpwbiift’i;


I

]
init: fn{etxt: ref Druw-<Gmtext, urgv: list »[" string);
usage. riiO:
finish: fnltemp: array of byte).
H if not. try (he dictionary
}l r
‘"
tortdentry ;= ; ;)(

t'
den try = dfdgeUfV);
init( nil

f
re Draw-<Cortiext. argv . fisi ol suing i

iffdentrv = ml)

ays* load Sys Sys-<FATH: break

draw = load Draw Draw -<PATH


bufio = load Bulio Rntm <PATH iffdentryflen dentiy- 1 \
=- An' if

str ft uid
1

Slri n g S iri ng -c PATH heh:^


;<rg -Arg Arg-<PATJT
luiid (huh. mlt - str-csplitlCdentry, "m");
pass = nail Password Pass word -<PATH
I dentrv = heh;
keyring = Wd
Vkeyriing Keyring^PATH; Y
I

{
s V s -<pri nl " Vn h e 1 1 fi rc . by da I a i l da I a s ® sw hi . ne t )\it " i ;
p whuff - array til byre dentry;
1
sy.v<print("A Traumatized Production An ');
key nng- <shatpw bub keyring-^ SHAdJen, pwbtiffZ nil);

iftargv ss nil)
tempi ;= siring pwbufTJ;
UKiigef );
lcmp3 string pw.pw

ditto pfily uid ;=


if(temp2 ^ - tempi }\
arg-<initfargv);
linish(p whuff);

whilefflmp arg eoptf )) 1 = Or }

ease tmp [
:
,i

d -< dJile s arg-<arg( '):

u =< uid = urg-cargl ); sys-<pnnt* "done An" j;


* =c usageO; sys-epnnh "Have ,i nice day An" K
eSH;

=
I

ifldfile nil ||
urd =- nil )

y. fimsbtpwbt i f¥ a ira v of byte


[

dftl ** bufio-<open(dfile. bdfUHfQRBAD); >y.s-<priTiLi "Password is \"%sV\n". string pwbufD;

llriifct = ml){
sys-<print{'’Hnve a nice
exit;
dti> \n"):

sys-: prinu "Could not open %s.\n\ dfilcj:


1

exit;

1
usage*

pw .- pass cgchuiiri; <

rf(pw = nil) |
sy#-<fnintf "usage; hdltire -d dictionary u use An") 4,

sys-c prim T Could not get entry for%sAn\ uid): exit;

exit; I

— hidShic b “ —
sv s-<p rinic'c: me k ng i . . An \n " i ;

Spring 2002 Page 29


V

Signs of Hope ff jff puters. him it wasn't true and that all they had
3 told
w ere computers running winxp with no online access.
Dey r 2ffOf); Ho claimed that he saw me doing it asked him it we I

I hm‘ only your radio show in (he


fust di severed could go down to the tech bench to talk to someone
hist, month, and have now downloaded most of this •'
who, knew what a hacker was. He agreed. We talked to
•rar

year's shriws and also subscribed to 260(1 On the sub- the department manager who said and quote; "Please I

ject of DVD p layers, work in a major consumer dec-


I leave the kid id one. There is no way he was doing any
ironies store here in Australia. In the last 12 months all thing bad to ihe computers," About ten minutes later
major DVD hardware manufacturers have introduced the manager said, "So kid. how is the MPA A lawsuit
not just region free but region selectable players that going, huh
bypass any advanced region encoding. It started with a avatar
few unknown Asian brands. Then Pioneer, Philips, For cast's that dot Ft end so well, it's important to
Samsung, L.G. Panasonic, etc. all introduced these know that in many places searching someone \ hag in
mu it (most also have mp3 playback}
[-region p layers this way is illegal and van open the establishment up
The only major manufacturer not to release a player ol to legal action.
this type is Sony. Some oft he cheaper brands can e ve n
be Macrovision disabled. This is a direct result of both Higher Education
government policy and consumer power. Government
competition po.Ucs says vwa can seP, unv TWO player
m this country fas you already know our competition
Dear2^|.‘
I am in
^
high school right now and on our school
^
watchdog is looking very closely at the whole region computers there is a program installed tfijfi censors the
coding thing saying it may be used to artificially inhate Internet. The Program is 'Gear 31" and it’s made by In-
prices) and the consumers decided they wanted multi- terne! Content Management Software, was wonder- I

region. ing if anyone knew anything about the program and


The amazing thing is the response we have had in some possible loopholes in it.

I )V D re case times here w is pu re h as ng D V Ds fro n


I I
t i 1
A7th
the USA and Canada last year because there was a The w ord is out.

three to six month delay


major release dates be- in the
ween our countries. Hie times ire now around a
Dear 2600;
1

Noi myself being a person to exceed the bounds of


month or .so for most major movies, so wait for the I

he law (I try to adhere to a strict moral code], had a


better quality PAL versions sorry, but i
NTSC sucks).
i I

briet skirmish with the authorities of my high school


At the moment we are at Ihe beginning of having
which, thankfully* did not advance very far along tire
digital television forced upon us by ihe media giants of
the world, but that’s another story.
disciplinary lines, would like to know the opinion of
I

some other computer users.


Brelo
This an excellent example of the importance of
r \
The school runs Novell Netware and i idiotically)
diil not turn off the feature that allows users to send
regulating huge corporations by a government which
tt >pre se tit\ th c pet tple ishes Been se our go e rn
!v \ \ . it i
-
messages each other. During a typing class
to was I

forced to take, my lingers roamed across the keyboard


went and our corporations are virtually one and the
a nd 1 began to look around the system, realized that
same, consul nets simply don't have the power they !

the system was allowing rne to modify anything and


should have. If we ever succeed it: pulling them apart,
we mti\ have a chance. Thanks for the inspiration that could send messages to another user. After
I

school. :ii a later date, i sent a message to another


Dear 2600: classmate in another room. A classmate nex< to me
I just got back from a major electronics store alerted the librarian that was "using the computer for
I

known as "Fry’s Electronics” and [ got in some serious bad stuff/' The librarian became red in the face and
trouble. I donT have my own transportation so [ have pulled '.ve to the principal’ s office. She informed she
to ride the bus all around town. When was in this 1 principal that was crashing the network, found this
i I

store, pulled out my bus book to know what time the


f to be a ludicrous charge against me but didn’t contest
neat bus would come by. In doing this had to open I tt, seeing as how u would upset the situation. I got off
my book bag that goes everywhere with me that had with absolutely no penalty except that computer all the
some back issues of 2600 in it. Minutes later this guy teachers vs ill be looking over my shoulder from now
asked tue to show him what was inside my bag (since on. My quest tori is whether or not sending a message
he saw me going, through it), told him sure, why not. I to another user is a great offense.
He opened my bag and behold ten issues of 2600 He -
. St Mike
said he was going to gel security to escort me out. ] The great offense is doing something that the peo-
asked why He said it was for hacking the store com- ple in charge didn understand. Unfortunately, in most
't

Page 30 2600 Magazine


high schools. that applies to plm< >si ativfhing that hap- hang totally Whatever problems are
honest wish you','

pens after the power is turned on. goirtg on in this relationship are not going to he sol ved
with subterfuge. If yon can communicate openly, 't

Help Wanted there's not much there to salvage.

)ear 2600:
I
Corrupting Youth
want to lea rtf hriw to hack' in such a bad way it
1

male's me sick! have die hunger for the information


! Dear 2600:
and a lot oi tune on my hands, don’t know how to i l just want to start by saying that I totally agree
even key, in to stall my hacker education,. what books to with the first sentence of JohnG54429's letter in your
buy* vyhat projgs or tools to get. just picked up your I fall issue It is grciiL what you're doing for Today’s
mag in hook store ami couldn’t believe it Fpalfy an*
,i youth. All that I’ve seen you print in your magazine is

Canyon
1

.vers ui sohte type ot ftdpj was certain J . tl ec truth and it it causes more American youth i like
guys a i teas! point me in the right direction '

By the mysdO morale for this great country." then so


" tftdosc
way. you guys rtfekf be i\\ Wm\ they won’t have blind leva
by to a conn
Mingus try without knowing the truth. And may be once more
We gel about a dozen of these inters every' day. So people realize this, we can all help to change the gov-
rot isider yourself honored that sours nm selected ernment .so il will once again he someth mg we Can hi*
completely at random. There art a couple oj things proud of.
that have to in understood, f irst, relatively feyc people e\_chrOnos
are hackers even though quite a few cither wont to he
,

or walk around saying they are. Most of who! cons to Miscellaneous Info
fides hits kit tg s t e v hole p n mess tj figuring th ings
i it \ t

mi. \V7idifc we ran offer rips and suggestions on spe- Dear 2hUlt:

cific applications of technology, tec Cannot tell von Just a heads up that the final build of Windows XP
how it) think, That's some thing you either develop on home on version 5 2600 h:o incidence?) default
edit i i

sour own or run. if yott keep ad open mind and. don > install does n have any firewall protection enabled.i

sh\ away from activities which most would view, as a Ail attacker will have access to s u ch services as smtp,
complete waste of time, von 're off to a good start, And ft p and neihins serv te e.s. To enable your fircwal e heck
. I

learning a Utile history is always a wise move there me ix>x ’Protect my computer w ith firewall" in the ad
are plenty of online resources in addition to our tnayti- vanced tab under the Connection Properties dialog
zint which document she milestones of our ommmmv t box. can believe Microsoft didn inform the user
1 i
r

about This option as the average computer user has no


I)car26^; worries about Internet security
Hey need some help on finding some
I credit card Also. he investigation of Enron will be done
I w ith
and pin numbers so if you can help do i
m this HI do a program called Ej tCase. Ibis computer forensics
you a favor so hook me up.... program enables someone to view- data alter it is

Asbigasscx^aoLcStii dele ed fro m he most popi


l t i f a r oj ie rati ng sy mcr cu i
-

(
'on side r yourself hooked up. We get hundreds of ready in use. The web site htlp://w ww.guidance&oft-
these requests every week most always as a res ids of warC.eomyiitml/index.htnd allows you to request a
some My media repose on iwwkcry. fu iE. weird way. the demo disk everyone by ordering
Don't spoil il for
media seems to he creating these people they go on
f you know nf anyone who
-
20,1 >00 o f heni overnig ht t ! I

the air and print stories saying that hackers go around has die lull version of this, declare them your best
stealing things and then the people who go atmnul friend and see they’ll burn ya a copy because it’ll il

dealing things sec this and shin calling themselves cost ya $2,500 r

hackers. Perhaps we should come up with some choice -d&solUteii


definitions of media so that everyone equates them
n ith liars Dear 2600:
Please check nut these important sources of critical
U*ar im \
inform at ion!
i
think my gill friend hast been cheating on me and I
http: // 1>3 i > ec tc en s< ret org | ) !

wanted know to il I could gel Iter password to Hotmail http:// www. copvc a. Corn i

and AOL. am I so desperate to find out. Any help h ftp: //www n dy me dia, o rg . i

would !>e appreciated* Thanks. http: f/il i sek rsureprt rject.o eg


HSFk2 Empty Set
And another popular category of fetter
this is vet
uc yet. You say any help would be appreciated? Let 's Dear 2600:
find out if that's true. Do you think someone who is When programming, dici-
1 first was interested in I

cheating on you might also he capable of having a n’ want u> invest any money before
I knew for sure 1

mailbox you don know about? Do you think that even


't what it wax all about. was saved by a great language 1

if vo a amid get into (he mailbox she uses that she called Python. Python is an interpreter; which means it
would he discussing her deception there, especially if executes the source one tine at a lime instead of mm
u'c live in a world where Hotmail and AOL pass words mg it into machine Uriigtiage. Python is fljs£ ubject-orj-
rire so easily obtained? Finally, would you feel heller if entedt a near necessity for any modern language. But
you invaded her privacy and found out that she was perhaps the most appealing faidi about python is that it

Spring 2002 Page 2 l


is free! The syntax of Python
remarkably dear, yel n is press release concerning it at: hEip://wwwxhumba.-
May* powerful and com pelt Live, h has plenty of docu- corn/_passi talon gditm
mentation all over the web and is a great language lot On General Motors bought the rights
a side note,
beginners and experts alike. hi use this same song (the album version, not the

The article isn’t much bui in my opinion Python remix) in their recent Pontiac commercials. Appar-
deserves a whole lot more respect. Fed free to edit a: d ently. C’humhawamhu turned around and donated hall
add 0:11 to this article. I just want a free t-shirt or 26(H) of that money to Corp Watch, who plans on using the
e-mail money to document the Asocial and environmental im-
Raleigh f ross pacts of GM 1

itself. The other half went to Indy Media.


'

U v rather dear that what you \s want. It 'v time once Chumbawamba has a very in teres ting political past.
again tit clarify run policy. Letters arc not articles! Among other things, a member once dumped a bucket
And articles: should not i)c written far the sole purpose of water on Great Britain's Deputy Prime Minister
of getting fret staff, it’s screamingly ob\ ions when they John Prescott Ibr his handling of a dock worker s'
are. strike. fTs good lo know that a (relatively) mainstream
hand is this potiticatty conscious.
Dear 2600: love your magazine and hope you can prevail in
1

1 am response to dmitry kostyuk's letter


writing in
your current and future endeavors. Good luck to you.
in your 1H:4 issue. Me was asking for a program to
Random Juhatus
convert Microsoft Word files into HTML tiles. Mi -
Crosolt Word can save as an HTML tile, Fo do this go
to File- Save As. Click on the pull down menu labeled
Answers Needed
"Save as Type", select HTML, Type in a file name and Dear 2600:
hit Save, Also. I have not seen the specs on Microsoft’s I'm just curious to know your magazine has u
if

doc Uittov However, iv ,s v^ed outside of Microsoft ;

in ini mum maxi mum


f
length requirement for article
Sun Microsystems makes a free program called Star submissions. Let me know-.
Office which is capable of using Word files. Hope this Kick Olson
helps. aka fluffy
Rev ;munt .4.' indicated something extraordinarily
above,
short will probably he looked at as a tetter: Articles
Dear 2600: should he ay i/t -depth as possible without being overly
1 just got m> copy of 18:4 and was pleasantly sur-
wordy. Since we wind up editing anyway it's best to ;

prised iii >,ee the letter by No Name" on the @homc give us as much info as you urn rather than too little.
Malm. 1 agree, the information he'^ given out is not
So there are no formal requirements either way - just
much lo hide one’s name or handle over. The Matrix
go with your instincts
dots not, in fact, allow you to access someone’s com-
puter direct ly. The Matrix works in a tier system. The Dear 2600:
higher the tier, the more access you have. I may excuse you because of the September II th

Some of the higher tier accessing staff never both- terrorist attacks but 1 sent you four photographs of
ered to log out afterwards. They were: matrix- users, payphones (bv mail) and 1 don’t have my free sub-
m aj ordo mo M atm * [You bic ani La J ohsti ton agen tile,
, , scription. I also sent an e-mail to letters® 2bfl0.com
bart_. connors,hmartone, brutkow.sk i, clow cry, DHen- and the only thing L got was an automated answer.
nie. Thirell_Mo.se tuyT fschmidL happ legate, jbrenuan, "Thank you blablabla,...’ Maybe sending to all of your 1

jsapienza, jtrccce. Irohinson. rsimmons, rsuIJivat^ addresses may work, fhank you for being so commu-
shill, 7726458
.1 1 wright. and j grove.
1 . t nicative,
The Matrix was located at 24/257.21)7.77, hut un- Johnny
fortunately was taken down permanently as of Feb-
it we have always been way too bus y to re -
First off
ruary 28th, 2002. However, the greatness of this spand to each and even piece aj mail we get. Most
system should not be forgotten and any who wish to people and certainly most magazines simply ami ten do
learn more about it may wish to go to this Second, we're quite clear on our web page that
.

bttpjTrnvln x .home ,n elidoc M'atm 6 pdf and read the r i r i you wiJJ get a free subscription if your payphone pho-
Matrix User's Guide. tos are printed. You seem to think that just by sending
Doodle us photos you qualify. That's not how it works. Third ,

Unfortunately with the demise of @home> this ad- the automated answer von got from the letters e-mail
dn'ss is no longer valid ff we find a mirror, well pass . address explains that personal replies area ) possible.
it along. Why you then eh ose to enter into an extended dialogue
with an automated reply function is something people
Dear 2600: who do have time on their hands nntv choose to pon-
You may Of may not already know this bin I
der, Finally, all you succeed doing by flooding us
in
haven’t seen it in your magazine or elsewhere. The with annoying mail is to he labeled os someone worthy
British anarchist band Chuinbawamba put a remix of
of being ig no red altogether.
heir song "Pass It Along" on their web page a while
ago ft features sound clips from MctuIJica. !)r„ Ore, Dear 2600:
and f-.niuiem. gll appearing without permission. Better When
exactly do you plan on releasing Freedom
yeu h. has excerpts from Jello Biafhrs H2K keynote Downtime It’s been about a year already since it was
speech. You can download the song and read their completed. You could at least release it on VHS; the

Page .12 2600 Magazine


medium really doesn't matter could read and comprehend what was written on the
haux pages of 2600, It comes lime now that have a band 1

tVeVe wanted to release it more than any* me has and we have been ripping our bra ms out for names to
wanted So tee it so we imdcrstand the frustration. H4 j
call ourselves arid finally I suggested '2N.H4" My only
needed to makt sure we a we red the legal bases with questions are: Is this legal? Is tins okay with the writ-
re yards to the musk we used since stung us has he-
1
er s/ed i l or s o f my favorite zinc? I know 2600 is onl y a
come corporals \merica > latest sport. But we re degree of megahertz used in phreaking. but it is a name
happy to sa\ that these hurdles arc he hind us and sou trademarked by you. 3^ this all right?
\hould find ordering info in this issue and on our web 1 >rew
siu Par now it's in VHS format. We expect to have a it's hertz, While it's it very nice
not megahertz..
DVD version same lime jfs fht\ftth}rc. themghi, we wmiltinV be entirely comfortable with a
hand going around with that mime. What would hap
Dear 2600: pen if you became really big and your music started to
\ would like to contribute some money to the suck? People would forever tissue kite the name
DeCSS appeal legal dele rise fund, Please let me know "2600' with corporate fork and ice V/ probably wind
how to do so. up gening sued by the giant record nmqxiny that
Boyle Dill signed you. Imagine (he irony. But seriously, we have
The Efenrcmh Frontier Fmmdaikm covered the no say in this You can call yourself whatever von
.

fa gut expenses for that eon Yon can donate to them at .

wat f 1 Vt d he hoj ip ie tht nigh if it n ere a refer v uk vt t >f


i ' > ; ,

www.e.ffarg or bv writing to LI F 454 Showed Street, some sort rather than the entire name. Af ter all, there Is
San Francisco, CA 94110-19! 4, always the chant e that we 're going to quit this pub-
lishing thing and turn into musician one day, >

I lear 2600 ;
I attend a meeting of security administrators at my Dear 2600:
office every other month. In your recent issue, there While flipping through my recently purchased
are two articles that would like to photocopy and give
3
I
S:4 noticed something odd. Some of the pages were
1

out at dus meeting to give Other attendees a better un- blank How ever will
1

build my wooden computer I

derstanding of what information is readily available to since pages 22-2? are missing Mow- will 1 know the J

people try ing to break into systems and why you must outcome of the 'Right Click Suppression" article with-
keep patches current and lock down the server. What out page 19? will not be able to
i Harness the Air
would be the proper way to get permission IVom you to wives? m
page Its wots dvxs blank. In addition. 35. 3 irk
c opy these articles and give them out in the meeting?
39, and 42 were also blank. 1 hope this is just a case of
Anti- Chris! a misprinting and not a larger conspiracy by someone
its amazing to us that people at fiutllv think they to keep the information from reaching the masses. If it
have to da this. This constitutes personal ;iu vow was indeed just a misprinting, could the pages listed be
have cveiy right to use excerpts of a publication in sen or posted somewhere so that we could read the
such a manner without asking permission rest or the articles that were to have been printed on
these pages?
Dear 2600:
SuperGuldft
My father passed away Inst year. ? ^fortunately he
if you ha a. such a printing defect in this or any Is-
used my name and social security number nt the past.
sue. send it in to us and we'll not ontx send you a re
Now I don’t have a good credit report; and
need help. I

placement, but an extra issue as well for your tnmbh .

Can you help me? am the father of two baby girls and
I

Iwould like to buy a house one day. Dear 2600;


top do you have information stored away
Just curious -

Assuming you don't want to continue the family in random pictures on 2b00.com Sfegdetecl reported '

tradition and simply use vour kids SiSfls, vau need to '

thai a few jpgs from your site have information stored


ha.tr yota name. You seem to hr under die impression with jphide. However I have been unable to crack
that h tickers go around wiping people credit reports 's them to determine if this is true...*

ot i: renting new Of the relatively fox win/ do


identities. Ciiin
know how to easily da such things, hardly tin would \

ever do it for hire. And n-e don't talk to them. D ear 2600;
So for you to stop a* tiny like you -e
the first step is
At my law studies class this morning, we had a

guilty oj a crime. Unless xou arc tWc still won) he guest speaker. Je was a Secret Service agem He
aide to help you hut we'd at least respect your hon- popped in a tape that explained to us what the Secret
esty, happened the way you said did there are Service was and why we wanted to be in it. In a couple
) if if it ,

Check with the Socfut' Security of scenes, they showed either your website or maga-
it
of dealing with it.
-ays
Administration and the various credit bureaus and teU zine. i can'! remember' what the cover was though, so 1

us what they say, If you Ye forthcoming with (hem and don’t know how old it was. Anyway, the video was
dan I do anything stupid like ask people to help you get talking about how the SS is very knowledgeable on

hike /edit, you at least have a hance of setting things


. t
technological forms of theft, fraud, and hacking and
tight. And even if then doesn’t work there arc other „
how thetr agents arc highly trained in investigating

channels which cun give van a voice. these things. showed an agefjjj pullmg up your web-
It

site. Then later, when they Were talking about credit

Dear 2M0: card fraud and other computer crimes, it showed a


I've been reading 2600 for. well, most vears t desk with a computer and a 2600 sitting next to the

tammyb loo
1 n )

keyboard. Just thought you'd like to know. Don’t they tempts to gain unauthorized access to files in various
11
have li> ask permission Tor that or something? systems. Thai is just not true. lackers aren’t evil, we I

Kaos lord are realty good people. But everyone hates us. Why?
Ft Lauderdale, FL Because we get the fallout from people who write
We're not concerned about our covers being used viruses and stuff like that, that's why. Because so ami
so much as we’re concerned over the context. If so wrote a virus and the media said he was a hacker,
they're implying by their use that we’re involved in that means all of you hackers are evil. We get pinned
criminal activity then we have something to talk so with the blame, Il s gelling so bad ihal if you say (he
them about. UYhv been hearing about this video for word hack people sort a cringe, like when you say mur-
some time now - hopefatly one day someone can get us der or something Bui if you try and hide the fact that
a copy of it. -
you're a hacker yens lor them wm, You let the media
make you ashamed of who you arc. So be proud to be
Complaints a hacker, be proud of who and what you are.
Binary Burnout
E^r2^
The meetings for Orange County are a joke. It’s
like a bunch of kids in a pissing contest. These people
Worries
are making 2600 look sorry’,

john smith
n** r
Wm\ fc i M
Have you had any concern of the U.S. govern-
all
Let ’s be clear about our meetings and the relation- ?"
ment freezing your assets due trt "terrorist activity'
ship between them and the magazine. Our affiliation is (Not that hacking is a terroristic activity, but the U.S.
1 very loose one hut we do consider she meetings to he
Patriot Act of 2001 says it is!
representative of what She magazine stands for. That ’s
Mr. Brown
why we have a of guidelines (available in the meet-
set
Our biggest comfort in that regard is that we don’t
ings section of our web pages or by c- moiling meet-
have a whole lot of assets in the first place. Actually,
ings^ 260Q.com) which sped out what’s acceptable that s probably not very comforting at ad.
and what isn’t. For example, our meetings are open to
the world. 7'hat means inevitably people who don ) re- Dear 2600:
ady believe in what we stand for will show up, We cam Here is something
though everyone might find in-
I

not prevent Usually there arc multiple sections at


this. teresting to think about. A few days ago received a I

any single meeting - their only common point being the code from a person asking me to crack it. A few days
mee ting guidelines. It’s important to remember that no later 1 did and sent him the decrypted message to prove
one group any meeting. Therefore, to
of people runs' that i had done it. Ire reason he claimed for sending it
1

define it as you have means that either von 're paying involved a huge "worldwide underground hacking
tinetitkm to the wrong people or the meeting has in group." While he seemed to give the feeling that this
fact been subvened by idiots who don’t respect our was something of a rather "elite" group, he mentioned
guidelines. The loner has happened in the past and no specifics about it. After sending him the decrypted
probably wilt in the future. When we find out (and we code he proceeded to tell me that he worked tor a gov-
most always do), our name comes off it and it becomes ernment agency in Australia called the AS IQ (Aus-
just an anonymous group of idiots in a mod on a Fri- tralian Security Intelligence Organization) and that
day night t
they were looking for people who could do things like
crack codes, hack, and so on. After hearing this had I
Dear 2600 :
no desire to continue communication with this person
To she ''hacker" who was on Cool FM 98,5 (in
but here is the interesting part. The second step for
Montreal) on O2/U/02: shut the fuck up! Thanks for
"joining" was to crack a harder code using a program.
idling everyone thai hackers are nothing but simple
Easy, right? Yes, but here is the catch. After doing so
thieves, I hope vou die in horrible pain!
they will hack the computer that you used to download
IHrl3z3
the program to look at your hard drive So basically
There's nothing like an intelligent counterpoint to
they are looking for hackers and cyberterrorists but at
I
move a point.
the same time are recruiting hackers. Anyway, once
Dear 2600: they have hacked your computer (and this is govern-
I am sick of it. J am sick of being labeled a crimi- ment! !!), they will use your computer as their personal
nal, S amof being branded as a menace to society
fired proxy. So if they are tracing a eyberterrorist and the
and a threat to order i was Yipping through the TV 'i
cyberterrortst is smart enough to figure out he is being
channels and watching .some movie. 1| was
1 started traced, he will send u trace hack. At this point it would
like Mas Something Super Sp\\ bill anyways all il was lead to the AS Os
I "proxy," in this ease my computer.
was some anti backet propaganda crap that Holly- So let’s think about this. Now ii looks like my com-
wood churned out. am so tired of Wt arc con-I it,. puter is them and the cyherterrorists go after
tracing
stantly being bashed because we are hackers. hale the I this computer. Why would anyone in his or her rig hi
common misconceptions of us. If you are a hacker that mind let this happen ? Hope this gives everyone some-
means all you do is break into people’s e-mail ac thing in think about,
counts and write viruses. Even looking a I the dictio- 3-C oni
nary is appalling, il says a h acker is a talented Oh it does. Like perhaps you 've confused your
amateur user of comp tilers;, specifically one who at- computer with \ our TV set.

Page 34 2600 Magazine


i 1 1 .

Dear 2600 : ers when ii comes to other technologies, like guns.


As if Carnivore wasn’t bad enough, now we have Firearms are simply a Icchno logy, like any red box,
the government stealing out encryption keys to read laptop, modem, network card, ( apfalri Crunch Ring,
lhe encrypted lilt's that we have every right to keep pn- or computer programming language. They, like any
v at e Hi s st m wj re km jw n as Mag e Lun te n ap par-
i i
i ' technology, can be used to enhance or detrac from in- t

L’nily installs a key logger on a target computer to grab dividual liberty depending on the user, their intentions,
the pass phrase used when pgp hinds. Our individual and their actions. Thus, like any technology, rearms (i

rights are continually being violated by this Cyber are morally neutral, inanimate objects, .hist as a hacker
Knight" project that encompasses Carnivore and could potentially ruin the life of any individual 01
-

Magic Lantern. You gotta wonder what else they have group of individuals in the world via identity theft or
up their sleeve. say we hold public protests. More
I other malicious abuses, any person possessing a

people need to he informed about this. dreamt can similarly potentially ruin the lives of oth-
Silent ers. it is the actual actions of ihe individual wielding
when someone finally finds this thing
hi addition, technology determines actual results, as you have
that
on their system, let ns know so we can print on article so rightly staled so many times in the past with regards
‘•n how deter I it. In fan, we suspect the re ore people
it.j in various computer techno todies. You should be at

,
wtiwly -.trying to get if for just such a purpose. least as consistent when it comes to other technolo-
gies, like guns, as well.
Ideas Mike ‘retro man*
Lorrey
Hi'iv always advocated the responsible use of any
\ tear 2600 :
tool dr technology and that its the user of these who
I am working on a project right now you may find hears ultimate responsibility for their nse/mixuse, We
l>T heard of a neat device called a Telezapper
interest. 1
hid ic v 1 h Is and te hnolog \ tin t ii ret t i\ fos ter eom-
i i i > t

which would not only automatically disconnect tele- immication. education, and the flirt he rams of free
marketers hut because of the disconnection their soft- speech should be made as widely available as possi-
ware removes you from their database. looked into 1
ble. This has always been our push ion. One s imply
the device and what does is send out a Lone (discon-
ii
cannot think of tools with obviously lethal functions in
nect pulse) In their switching equipment, father than the same miy, however. To do so is she height of irre-
spend S40 to buy this device, had the idea of using 1
sponsibility.
my modem and sound card to generate the signal, so
all you need ss a bit of software and cable. Once gel 1
Dear 2600:
this working and if no one has done this before, would In was reading your response to a Canadian
I K;3, I

you be interested in an article? on page 31-32, and you guys mentioned something
Drwar abo u ill ic Can ad a e tec on s v sre m aw ard mg he w n
i 1 f i c i
-

We'd certainly like to know more. We know of no ner to the person who received the most votes. This is
such 'disconnect pulse that could he used to get rid oj
'
probably a good thing. However, the Electoral College
anyeme, lei atone telemarketers. About the only dung in the U.S. does serve a purpose, and lhat is to make i!

w.e ran imagine ss that this device pin vs the three tones harder for the states that are more populated to wield
i
-otnnitm.lv heard before an intercept recording which power over the states with lesser population, thus mak-
might tnuk their auto-dialers assume it's not a valid
r
ing it harder for a presidential candidate to win Ihe of-
number. Ii V Hole more than wishful th Inking that this fice of President, Now. do not think that Dubya I

means pu number would be purged from the database. should have won the presidency (1 voted for Ralph
This could re suit in t titer ca Us ben ig lost as wadi Hut
j
Nader, and nearly persuaded my mother to do so on the
most importantly, paying 50 bucks to have these lanes way to the voting booth), but abolishing the Electoral

played would be a hit of a seam, to sa\ the least. We College would give much more power to the East and
had (t better smite (assuming you don't want to pick West Coast (for better or worse), and make it That
up any culls that dm ft display culler ID is offered by J
much easier for ihe majority to force their will on the
many local phone cent) pomes a fraction of ihe east. m minority. This is something ihe Framers made espe-
* oilers who don t
' transmit culler ID arc prompted to cially hard to do, and for a very good reason (Le. slav-

sas their mimes. The called party's phone then rings ery). I would like to know why you would have the

with rhat person's name and they run either accept the Electoral Colic ge a bo Eish ed
dl tti that point or refect it (or eotnpleiely ignore if), Jon McLaughlin
fidema renters who don identify themselves never ‘i
tf imposing the will of the majority over The minor*
l yn ring yom phone. fi.v is such ritrerK, why dm
ls wr see systems fiA<* (hr 'i

Electoral College put into place for other elections


More Politics and We're certain that we could find an-
refe rendurns *

gry people in sparsely populated regions of every slate 1

Wear 26W who feed the people In the cities unduly influenced
I am newsstand buyer of your maga-
a long time mas for governor, senators, representatives, etc,
zine, which I’ve always found to be highly informative Should nc give these people more mover because there
in its anil les, v bile the letters of a political bent lend are less of (hern Is this not fit si. another je>rm vj ajfr-
toward a naivete that strikingly contrasts the technical mutjyc action which rouses ware harm than food Hu; '

opiusticatipn of contributors. Keep up the tight for the the real proof that the flee timid Coil eye is a failed sys-
ights of individuals to use technology. Unfortunately, tem (apart from oil of ihe people in the rest of the
v oil seem to suffer from a similar naivete as your read- world laughing and pointing j Lx in die official numbers

Spring 2002 Page 35


for minority candidates. The person who you and heard it. It was kind of pleasing tu hear the message on
many others wound up voting for got, according to she such a popular video game. Then when 1 was looking
Electoral College, a total of zero votes, I Joes that seen f through die booklet fur the game, I noticed they listed
evert remotely dose to fair? guests for 'Chatterbox” in the back. So \ read through
and noticed the name "Bernie S," Very nice.
Dear 26(H): noire
E noticed in your response in i 8:3 to the letter un-
1

SK ar
1

der the heading "Guns/ you wrote ..oppression from


i
26(H):
the most jxwverful government in the history of Hey guys, great issue. I was walking out of Barnes
mankind." just wanted to correct you. The most pow-
I
and Noble at dusk with the magazine (18:3) in my
erful government in the history of mankind in terms of hand looking a! the cover: As crossed under a light I

power was probably ancient Rome and* as far as size the glare revealed the secret item! The peace sign. I

and possibly even power, the British Empire, love it. Always keeping us on our toes. Thanks guys.
Joseph McLeod Gustaf
Tins will quickly devolve into semantics so let V de
Dear 2600:
fine our terms, By "mast powerful" we mean most ca-
pable of having a direct influence over all other parts
was signed
I into MSN
Messenger on January l Oth
at M;]() Eastern Time, and go! a Maintenance Alen" l
of the world in a very decisive wav both militarily and
dialog box telling me that MSN will go down in five
r

legislatively, ft's a frighten big concept regardless of


minutes for maintenance. U this happened to everyone,
where yew stand politically.
then there obviously some way that you can cull a
i.s

Dear 2600 : dialog box on the machine of everyone who is signed


You do Mr. Conte rio your let-
a grave injustice in into MSN ai the momenL It kind of makes you wonder

ters page ( IS, 4). His arguments are the voice of reason w hat kind ol oilier events they might be able to initiate.

- surely’ Itanyone had a packet sniffer running and caught ihis.


Look in only so much gun crime
it like Shis: there's or if yon have more information on how this may
in he USA because the criminals can get guns easily.
i
work, please let us know.
And as Mr. Conierio points out, you usually only have p&ykOmantis
lo show a gun to deter a crime. Naturally, h has to be a
Dear 2600:
bigger gun than ihe criminal has.
I moved into a cheap three- story apart-
recently
So he solution is simple. Encourage everyone to
i

ment building. One day got curious and started to


I
get a bigger gun than the average criminal and carry it
lake the faceplates off the wall Behind where my
with them at all times. This does leave the poorer sec-
phone line came in discovered not just one wire, hut
I
tions of society more vulnerable (being unable to buy a
three! Jpon further investigation found that one was
I l

big gun), but this is all to the good ns it means the


for my apartment, with ihe (wo others providing dial
criminals will target them, instead of respectable, law-
lone to the Hour below me and the lloor below diem!
abiding citizens (with money)
1 (link about how easy it would be to tap into the line, I

But I wouldn't stop there Who is to say that adults 1

found a similar configuration for ilie cable television


have more of a ighv to life than children? And having
lines. Do you have a phreak for your upstairs neigh-
i

seen the reports on atrocities in high schools over re-


bor? Arc you sure?
cent years, is n not reasonable to campaign for chil-
bluuess
dren be able to defend themselves? Of course they
lo
More proof of how insecure phone lines really arc,
should! "Guns In Schools' can be the campaign slo-
This is very unlikely tv ever change.
gan. With proper raining (it should be a required sub-
i

ject). most children arc every bit as capable and Dear 2600:
responsible as an average adult to own and use a gun was watching the other day (again) the movie
I

(well, an average adult after a beer or two, anyway). Hackers and something caught my eye on the desk
mean, if somebody went into a school with a ma-
I
where Kate Acid Bum" Libby is preparing for her
chine that could launch baseball bats faster than the "battle" with fellow hacker Dade "Zero Cool/Crash
speed of sound at the rate of orte hundred per minute, Override" Murphy. Thai is a copy of the magazine
would you ban baseball bats? 2600. w onder how many others caughi this.
I

1 think my point is abundantly clear* and I trust I Hernia ei


have your full support in this matter, Another appearance occurs when the federal
m skz 41gent is reading "The Hacker Manifesto
"
in the car.
We. not h-ed you shied away from the infants '

right He's holding a copy of our magazine- That piece, how-


to carry issue. (5b ward, 1
ever appeared in “Phrack " pen here : They couldn't
.;
.

figure o’ut how to hold up a copy of an electronic


Observations newsletter so they just revised history a hit. Also check ,

out the subway cor scene as well as the wall in Phan-


Dear 2600: tom Phreak s mom. Those are original yellow HOPE
l Eyorrowed my
copy of Grand Theft Autofriend's bumper stickers from l 994 now worth many thou- r

3 for Playstation 2 and he informed me that a guy on sands on E-bay.


one of the radi o station s proc ai med Free Kevin!" So I

for the next few days when played would set the ra- 1
1 Dear 2600:
dio station to "Chatterbox" and after a while finally ! I have read before how someone used "sale web" lo

Page 36 2600 Magazine


; 1

gel around school or public firewalls but the problem change their numbers after this rather stupid over
is sites- like those are always blocked, Hut the one thing
they can never block are translator web sites, like Alta
Vista, All you have to do is enter the URL and change Dear 2600:
the language from "whatever" to English, Let's say
We enjoy wearing brown pants and sni fling your

you select German to English, Et will go through, magazine on Wednesday evenings while composing
change all the German words to English, leave fill the music with our Tandy are wearing

English words, and bam! You are at 2600, com


brown pants'

t ody Beeson
1W Avocados
We suggest using Chinese to English since there And this is as strangely haunting os a David Lmch
film.
an- enough German words with the same spelling as
English ones to make our web sire rather weird to read
if you try to translate from Gentian,
'
"
The World of Retail
1 Dear 2600
I tear 2600: v\_j/ IT B :
_
Just wanted you guys know you're getting
to let
I was Sacramento, Cali for-
in a local bookstore in

some free advertising, was reading this humorous Fi-


I
ma thaL 1 know carries your periodical and decided to I

at d Fantasy parody when came across this page


I
check to sec if I had your current issue. w as surprised I

to sec a fairly large stack of your magazine hiding be-


showing a character reading 2600 at http;//wwwmiik-
hind an issue of something or other. Needless to say, 1
Icarpo wer.&im/coniic-/05 8 .htm, i hope I’m not getting
already had that issue so moved the magazine to un-
the author of the comic in any trouble. (No, I’m not
[

cover it for other customers. came to the conclusion I

him.)
thaL it was when
intentionally covered returned u
DephKonl 1

week or so later to discover the same situation, 1 don’t


Dear 2600: know if an employee was doing this or someone else
l wish had more point to it. but it really
this letter with a strange hobby, but either way think it’s a terri- I

doesn't. In the sentence in your Marketplace section of ble way to sell magazines. Perhaps you at 2600 should
IK :3 and 8:4 d presume more of them) under the
3 ( i
start printing on excessively large paper to increase
heading "Only subscribers can advertise in 2600! "you visibility, I plan to make it a routine to stop at that
will notice near (he end of the paragraph it says. "In- bookstore to make sure you are kept visible to shop-
clude your address label or a photocopy so we know pers. You’re probably thinking why don't 1 tell the
shopkeepers Well, it just ain’t my style.
1

void re a subscriber Send your ad to 2600 Market- .'

place. PO Box 99, Middle Island, NY 1953. Include 1


The Dude
your address label or photocopy." We appreciate of our readers who took out for
all

Otherwise, l love the publication. Keep up the this sort of thing. Most of the time the people who hide

good w ork The hidden "peace" symbol in 8:3 w as re- 1


our magazines area i affiliated with the stores. We sim-
al ly near and l never noticed it until othef$;#oi tiled it ply have a lot of enemies who don V want our views to

out later. be heard. Consider it an attack on all of us.


4wifitc^07
Well, we never noticed this repeating phrase Until Injustice
vattpointed it out so thanks. Its the etui of t&i oversight
Dear 2600:
that \ been occurring since Spring i99&.
In response to ''Consequences" published in 18:3,

Dear 2600: am not sure that everyone aware of how- bad things is

In wroie on Black Ice for


addition to the article I
have gotten. think it is horrible that Sklyarov was ar-
I

(he 18:4 is sue of 2600, I would like to mention that ISS rested for violating (he DMCA when what was being
has released a patch for users with Windows XP and done promoted the sale of more eBooks. There arc
,
J
K. There is a hole that will allow "hackers" to execute many injustices that have been done to many good
computer jacking and crashing. Normal stuff. Just people. As far as know. am the first person to be ar-
1 ]

ibought should put that out there since it was not in


l
rested for performing a port scan in the process of pro-

the original write up. tec tmg a 91 system was put in charge of. A simple
1 I

Suicidal port scan now seems to be an offense that (me can be


arrested for, While have been successful at defending
I

Dear 2600: myself so far, it is still something that most computer


On the Rat Rat e DVD. as an extra, the producer people don’t realize the rest of the world doesn't un-
kUid director do candid calls to the actors in the film. derstand and which therefore must be il legal. Several
They apparently didn't know that the touch tones articles have been written on my case, one by Bill
t\ corded in the conversations can be used to call the Reilly, who is working on the Elcomsoft (Dmitry Skl-
aclors! yarov’s employer) case. It can be seen at;
As a friend of mine put it, "Hey. goi your phone i http: // w w warn n esecuri ty.eom/Commumty_Forum„_d
I i

number off of the DVD.., you should have hough: a etai .ph p?artic le_id -23, Being the Jtp* to ha ve to de-
1

squirrel!" fend a case of this type ciut re you ,u is a very diffi-


I I
!

Phonkud utic cult task to undertake and don't wish it on anyone, I

A reference on anyone who hasn V seen the


lost The devastation to business and family as well as ban k
film. We imagine some actors wound up having to account is iiemendotis^Sftd am not sure that many 1

Spring 2002 Page 37


people u rulers land what is involved. thank your mag I your cable modem away. Gee/,, all wanted to do was 1

a/ine lor doing a great job on promoting rights and run a puny little game server for Unreal Tournament,
telling some of these stories so that the people know [he i! tech support guv told me that they scan all of
what is going on. i Rogers Cable customers for web servers, think
heir I

Moulton Scott that this is stupid. Why would Rogers do that? Is (here
System Specialist and Software Engineer any way to circumvent tile scans, so that my Unreal
Tournament server dream can become a reality ?
Dear 2600: Johnny Slash
was working
1 at Bridgestone Firestone Lnforma- Internet access i ia a .table modem Is not true In-
don Services during the recall, so I was already biller,
ternet access primarily meant for outgoing traffic,
, If 's

file law -.nil again si 2600 is to much... doubt I'll ever not incoming, such as you would he getting on a web
drive a Ford again. another reason to support your local
set ver, This is yet
Found On Road Dead, cute huh? Internet Service Provider win.) vi dl generally not get in
bt vtHtr wwy as to how you choose to use the net.

Dear 2600: Dear 2600:


So r m am in Omaha visiting my girlfriend over Re e cut! y !
received a chain letter in my t n box . I he
the Christmas break. Just before 1 left 1 grabbed a 2600 chain had a boring poem about two friends who
letter
a i B&N to read on the flight home. I flew into Chicago are too busy in life U> speak to each other When one fi-
and had to switch planes. nally decides to visit the other, he turned out to be dead
Whenever f fly I ask to sit in emergency exit rows from old age. What this has to do with a chain letter
in order to get more leg room. Before takeoff, the flight aside from conveying a moral of no use. 1 can't deter-
attendant stopped by to make sure (hut l would agree mine The letter had a standard set of instructions.
toperform emergency tasks if needed. told her it was
t
Send this letter to a dozen or so people within three
no problem and continued reading my magazine. hours of reading or suffer incredible bad luck.
I was into reading an article when ! finally realized
dug up all the e-mail addresses listed uv the e-
I

that we hadn't left the terminal yet. I looked up and u mail and replied back to them. I quoted Robert Frost.
man had come onto the plane from the terminal. S
"The Road Less Traveled?' and told them ail to take
watched him as he came up to me aiid said. 'Sir. I need the road Jess traveled and not forward the chain letter
you your things."
to step off he plane, please bring
I
on to a dozen other people to venture on into an end-
Confused, I stood up and walked off the plane. less tree of useless e-mail.
Once on the sky-bridge, they informed me that was I
To my surprise, received several replies from
i

going to be ".screened'' again. Before they started I


people who could not determine how knew their e- I

asked why, and they replied, "the flight attendant said mail addresses, even though the e-mail sent io them i

you were reading a terrorist pamphlet.' w as confused ]


had the original chain letter within the body, Appar-
.if best iind then explained to them that it was u maga-
ent fv. f pissed off a bunch of people making them feet
zine about "computers and electronics. They then foolish for sending the message to their friends. If you
asked if they could look at it and had to OK it w ith ihe consider it T it’s thinking only about yourself that drives
pilots before was allowed back on the plane. Oh
l
you to ship off an e-mail to all your friends so they can
yeah, had to be "screened"' again as wdl.
I
take on the harden of bad luck if they don’t spam oth
My guess is that she saw- the article about
-
vulner-
ers within three hours of reading.
1

abilities' in Passport '


(regarding the article on Mi- To make a long story short, was supposedly re- J

c rosoft \ new .Net Passport stuff]. ported to some Internet security agencies and told I

understand that wuth all of the recent events that


I
wasn't aware of the repercussions of my actions.
people are more concerned about security, but 1 think Tell me i don't have the right to free speech,
there is a place where we need to draw the line. Caus- you don't have the
"Nicolai... right to free speech,"
ing a flight to be delayed for more than an hour over There we have it.
my reading a magazine is not acceptable. Nicolai
Anthony \h Bower
Please write buck to us (paper mail wit! get a hu- Dear 2600:
man's attention a lot faster) with as much specific in- ! wanted to write a quick letter to you guys
just
formation on this as possible. When such events m cur telling you that 1 e-mailed Ford informing them that I

we need to hum exactly who is responsible so they con was boycotting (and encouraging everyone knew io i

be dealt with as severely as possible. The idea that you boycott) them due to the legal actions they were taking
can be taken off a plane because some dimwit dnesn ) against 26(Xh told them that Freedom of speech is
I

understand your reading material should he consid- probably the most important freedom we have a.s
ered an affront to every freethinking person alive . Americans and that could not accept them taking le-
I

gal actions to prevent said freedom Thanks for the


Deal 2600: great magazine and website, guys. If you keep writing.
I can’t believe it! Absolutely outrageous! Rogers E'l! keep reading.
has really pissed me oft this lime! called Rogers’ tech
I
S unlist
support tor heir cable Internet andEfound out that you I

aren’t allowed to run w eb servers while you are con- :

Dear 2600:
nected via Rogers Cable. II you do, then apparently Why ts it that those in power are so afraid of peo-
you will be found out and they wilt come Lind lake ple who they see as a threat to that power ? I’m enrolled

Page 38 2600 Magazine


h 8

'ii a Business Technology course at my high school. it, but the gist of the show is that hackers arc bad. In
Ii s sold ns some super advanced course, hut 1 person fact, my kids now call each other ‘hacker' as a put-
illy find it to he a little below my level, so 1 find my- down."
still spending most of my time helping the instructor They are planting seeds I tell ya. I like PBS but al-
with on he s ide. A few wee ks ago we re-
little pr oj ec ts t ter seeing this, Fm going to write a short note to the
placed has school -owned piece of shit computer with a pbskids.org site (unless you have a better contact), just
rather nice Pentium III machine we built ourselves. In to let them know how about this "toon I feel
order to connect to the school network however, we re- Just thought Fd pass along this info. Maybe others
quired a co.uple of programs which the system admins might want to rethink donations or write a (nice) short
refuse to give out. Namely Novell Client software and note,
some program do attendance and
the teachers use lo johnny fulcrum
grad ebooks called STL After several work orders were If 's essential that people express their fee lings
filed in an attempt in get someone From the lech de- about this since it's a really unfair 'ha raclcri Tjltion < .

partment to come and lake care of this issue for us -


Contact your local PBS station as well as PBS, the
each of which was simply ignored - we decided to rake Corporation for Public Broadcasting, and the Na-
matters into bur own
hands. After a couple of hours tional Science Foundation, aft of whom provide fund-
r

spent scrolling through every directory on every net- ing. h ^ had enough to have the evil character he a
work drive on the school server l access to which his hacker has for his actual name to be Hacker is a bit
no hacking was required
"teacher access" provided - much.
1managed to find copies of both programs needed. We
downloaded the software and got our system up and Dear 2600:
running, Yesterday he was called into a meeting with
I had nothing to do Monday so went to a Lee
last I

the Superintendent of Schools and accused of using his


lure given by Janet Reno at my college. was bored, 1

and thought that she might have something intelli-


class to train hackers He is now teaching a restricted
1

gent to say. After announcing that she was running for


curriculum. They him quite specifically What he tell
governor in Florida and an unconvincing tirade about
can and can teach. Myself and a few other students
t

who hud absolutely nothing to do with the alleged at- how we need to "shake up the government .system,"
tacks now have our computer privileges closely scruti-
Reno stated that "we need to protect our young chil-
nized. Wf also have
dren. from the hackers that try to seduce them in chat
reason to believe that certain
individuals in the upper levels of the
rooms and prevent hackers living in other countries
admin hierarchy
have been sabotaging our equipment.. Ultimately what from stealing funds from America’s banking institu-
comes down tions.' After this broad generalization* was pissed I

it to is this: the school lech department


sees myself and a few other students as a free source o!
and wrote a question on the paper provided by the
proctor nt the assembly. After a slew of questions
labor which the school
board can lap to do their jobs
about health care, the legal system, and even a ques-
This threatens their paycheck, so we're on the slid list
tion about whether leb Bush was more intelligent than
1 have three months to go until graduate high school ]

and get rid of all ihis bullshit once and for all. Fm bit-
George W, Bush, she neglected to answer "Why are
hackers still being criminally prosecuted for pointing
mg my tongue and resisting the urge to do some real
out blatant and potentially dangerous security holes in
damage. Why is it that people in power seem to go out
government and business computer networks?" guess
of i heir wayand ultimately push
to threaten, anger,
I

ou r n ati on's po! ci a ns arc sti u n ab e or u nw ing t o


i t i I ] 1 i ] I

perfectly legitimate hackers to do the kind o:i things


that give us a bad rep? I'd have to say that not wanting
tackle the injustice in our society,
Polar Mike
iu restrict future generations even further is the only 1

She probably watched an episode of ''Cyherehase'


reason I haven't done such things yet fust three more
right before giving that speech. Children s cartoons
months,
are popular with politicians and it explains the level of
Ghent
their intellect. It would be a good idea to keep track of
Even if you were ymtr ihr foM t Jto.i of .sem^rs m all the stupid things they say about hackers.
high school, destruction wonldn i he the answer: Nath-
mg would make rise morons who antagonize you hap- Dear 2600 :
pier. What's important is for van to reveal their As am I goddamned SSSCA is
Sure you know, the
stupidity iti ways that non -technical people van under
still being bandied about. This is basically she com-
stand, You've indicated that there is a paper trail
plete bending over of customers by the RFAA* MPA A,
which would prove that von attempted to yet help from and other lobbying groups. Because Congress is here
the tech department and that they ignored you. Ass am -
to represent business, right? This country was started
mg you dido) violate any software licenses in doing on the premise We hold these truths to be self evident:
11

n hat you did, it should he a snap to prove that you did


every corporation has the right to as much profit as
nothing wrong. Then s no reason why you can't for possible, regardless of the rights, health, or well being
shot ddn V) continue to help with this after you're gone. of the citizens of these United States," right?
Here is a great website that is trying to fight by
Hear 26(H):
sending faxes lo congresspcople: hiLp://\vww,digiEal-
I was pretty disgusted when u friend of mine told
coi isu me r,org-/fa JrihtmJ mod- You con use their letter,
me about a new kids' show that his kids were watch-
,

ify it, or write yotfr owoi. Please Lake a moment to do


ing It s called Cyherehase and
URL, is at: the
this. Maybe we can get some of our rights back for a
In i
p://pbskids.org/cyberchase/mcet_b;icker hi ml r

change.
He said, "I haven't seen more than two minutes ot | Continued on p u ^c4

Spring 2002 Page 39


x ’ ,

by Paiikaj A rota mi "spoofablc


1

MAC
address which will be accom-
)

pankh pirorn pa wa re.efifii panied by an IP address which is either static or


An interesting aspect of cable modem tech- dynamically assigned by the ISP and of course
nology is the evolution and standardization of the handled in software.
Dam Over Cabt^ervire Interface Specification However, a feyrffhings most people may not
( DOC' S f S ) de ve lof ied by
, C af c Tc
S I ev isi on Labo -
know are: ) Thefcabie modem itself has a hard-
1

ratones, Inc. and approved by the b)icruauon,al ware address arid in IP address on the HFC inter-
Telecommunication Union (ITUJ. face and 2} The cable modem itself has another IP
The locus of this piece deals with the way address on the CPE interlace. Generally this IP
ISPs configure DOCS IS -compliant cable address is 1 92, 68. 100.
1 1

modems and is constructed in a fashion that edu- When you turn your cable modem on. ii uses a
cates the reader on how a cable modem user primitive TCP/IP stack and DHCP client to re-
could configure their own device.
potential v I quest an IP address for the With HFC interface.
Take very important note* reconfiguring and/or some ISPs the IP address it will receive will be a
tampering wit It your cable modem not only most Hkx.x.x add re s s Addi t onal y upon rece v n g t he
. i
1 , i i

likely breaks your terms of service agreement but IP address for the HFC interface, it may also re
could potential !y be found illegal in most juris- eeive the IP address for the ISP's Trivial File
dictions and would then be punishable by law. If Transfer Protocol (TFTP) server. Upon the mo-
you wish to experiment, prior permission from dem obtaining the IP address for the TFTP server
your cable modem service provider would most it will connect to the server, download a configu-
certainly be necessary. urge you Lo educate 1 ration and use that to setup such thing* as
file.

yourself through this writing but not to break the downstream and upstream bandwidth caps. Its a
rules, and I urge cable modem service providers rather simple process that usually doesn’t take
to use the information contained in this article to more than a minute.
help better protect their service, 1 have a cable How would one hypothetically configure a ca-
modem myself and I respect my cable company ble modem ? To configure a cable modem, the first
and the law - but 1 also highly value free speech thing one would have to do is obtain the IP ad-
and learning. dress of the ISPs TFTP server. For some it mav j
This article makes the assumption that the actually be he same as the ISP's DHCP server. To
t

read e r h a s prior 1C P/1 P, networking, and Li n u find the address one could look at the information
knowledge (although this can theoretically be provided by the cable modem's mini web server
done on plenty of other OSes). There are certain (which exists on some modems such as certain
exceptions to the content of this article and claims Motorola SurfBoard models and can be accessed
are based on a generalization of the DOCS IS - via the Ethemel/USB interface IP address, e,g.
compliant cable modems that exist on the marker 192. 168.1 DO. 1, using a standard web browser I,

today as well as my own testing - and the work of Conversely, if that option isn't available or it the
others. 11 P server information
I isn’t given via the web
How does an ISP configure DOCS IS -com pi i- server, then one could possibly use an SNMP
ant cable modems'? To answer that, one should client to scan the modem for that same informa-
first take notice of the interfaces on a cable mo- tion.
dem. One interface connects to the coaxial cable Using this same processes k one would also
itself This is the HFC interface. Another is tradi
. need to obtain the name of the DOCSIS configu-
lion ally either Ethernet or USB (or both in some ration file the modem downloads since TFTP
models) which is used to connect the cable mo- doesn't allow you to list directories and thus a
dem to the customer's computer (or other network specific filename must be known to be able to
device). This is the CPE interface. As you may al- download the configuration file. Once you find
ready know, the device we connect the cable mo- that out, the next steps are to use a TFTP client to
dem to will have a hard-coded (but still download the configuration file off the ISP's

Page 40 2600 Magazine


1

I server and to use a DOCSIS utility to dc-


FTP you don't have IP Aliasing built into the kernel or
l <xJc the file into a readable text format. Once you otherwise generally available you could just theo-
decode the configuration file, it will look some- retically change your IP address to that of the
thing like this: ITTP server for the time being. You will want to
Main ( ensure you set the nelmask to 255.255,255.255 to
NettooritAccess /; avoid unwanted network routes which could
( lassOfService j cause problems.
Class ID I; 4) The next step is to create a static route to
MaxRateDown 1 544000; your cable modem to ensure you are coming from
MaxRaieUp 128000; the spoofed address.Under Linux one could issue
Priority Up 0; the command: route add -host <cpe interface ip
(hmranteedUp 0; address> gw <tftp server> again replacing that
Affix Hurst Up 0; which is in brackets with the proper values.
OnvacyEnable 0; Once all the preceding setup is complete,
5)
! one would start their FTP and lime server with
!

MaxCPE 3; everything in place and start pinging the cable


•'* EndOfDauiMa rker V modem s CFE and then, while that is
IP address
/
occurring, reset (he cable modem (or unplug it for
One could theoretically adjust the settings to
a few moments anti plug it back in).
lus or her own preference. For example, setting If you were able to get Ibis far and you set
MaxRaieUp to 0 would remove any upstream cap everything up right, chances are the cable modem
that may exist on the cable modem's end and set-
will download the configuration file from you,
ting MaxRateDown to 0 would do the same for
Once this is complete the aliased address can be
downstream. Alter any changes are made, the file
deleted or the IP address can he set back to DHCP
can be re encoded using a DOCSIS utility. Again,
or the static address given by your ISP, Addition-
let me stress to you, know the rules and follow
ally. you can stop pinging. You can verify this
them. This information is provided for under-
works via an SNMP query on the CPE interface
standing and was not produced with the intent of
or by just testing the results of any changes made.
fostering and/or promoting illegal activities. Be
Back up! How does this all make sense? The
smart and keep it legal, but at the same time don't
setup is similar to that of how it is set up on an
be at raid to team about this technology.
ISP's end. for the most part. The pinging of the
low would one apply the configuration them-
1

selves? The next steps involve running both a


cable CPE interface poisons the ARP
modem's ’

3) cache of the cable modem and the resetting of the


FIT server and a time server since manv cable
I i

modems lime -stamp log entries those modems


•r
modem Hushes the cache so the ISP's T1 FP
make) on the compute r/de vice that is connected
server MAC address (the real one) is flushed out.

to the cable modem (CPE interface]. The process


This process essentially makes the cable modem
is rather straightforward:
believe the MAC address of the TFTP server is

Place the conhguralion hie in the root di-


i)
you rs ins lead t i wh
eh be lo ngs to he ISP's
f that i i

rectory of the TFTP server making sure you use


TFTP server which - as far as the cable modern is
concerned - makes you the TFTP server it wants.
the exact same tile name your ISP uses
?) Depending on what OS you use you may
So when it s ready, it w ill connect lo your box and
get your configuration file. If you have a detailed
want to create an entry in your HOSTS lile lor the
modem's CPE IP address (since DNS will not be
enough understanding of TCP/IP this should
available when the cable modem connecting la is
make sense. If not it's okay, there are plenty of re-
in. KI P server and things such as the standard
I
sources available to learn more of the fundamen-
I .mux inetd sen ice does not like the lack of DNS tals. There are many potential barriers an ISP may

ivailahility when resolving hostnames - most and should pul in place to prevent Eh fo procedure
l
mux distributions have the HOSTS tile at: from working. Additionally, some cable modems
etc /hosts). don't allow you to ping the CPE interface until it
Create an alias IP address on the interface obtains the TFT P configuration lile. which would
dui cable modern is connected to. As you may essentially prevent the spoofing from working as
li.tvc guessed, the alias IP address needs to be the it will cache the correct MAC address before you

address of the TFT P server as you are going to


1
J
can deliver the wrong one by pinging
it How- ii

he doing a little spooling. Depending on your CIS. ever, for the most part this process tends to work -

this can be done in a variety of ways. Under at leasL for now.


Linux, with IP Aliasing installed in the kernel, 1 hope extended your understand-
this article
in- could simply issue the following command; ing of how cable modems work and are config
ilconlig ethO: ctftp server> net mask 1 ured - the utilities, servers, and services
S 5 2 5 5 25 5 255 Re mentioned in this article are readily available on
p ace <t ftp serve r> vv ilh he
'

. . . 1 l

IP address of your ISPs TFT P server of course. If the web for numerous platforms.

Spring 2002 Page 41


by hairhttll
hairban@illgotteD.nel
In ihc course of a computer security professional's everyday ueh <ti riinc. we can't help Inn nnut*

across several programs that can Jo 'interesting things with passwords. From the everyday U ntx/Li mix
password cracker to the Windows brute forcing programs strewn all over the Internet, I see the same sin-
gle problem that seems to envelop most of them. Many read from a password list instead of generating
the passwords as they go. While this makes perfect sense when used with '"most common passwords
11

lists and all, when it comes to brute force this is very impractical due to the large number of possible

password combinations. Let's do a little investigation.


As many of you probably already know, (he ASCII character set contains a total of 25b unique char-
acters, Remember that a byte is eight bits, and that a bit is a one or a zero. Therefore, in the range
CHlOOOOtXM Mil 11, only 256 possibilities exist. So every tile in existence can only contain combina-
1

tions of these 256 characters and nothing more. Numbered 0-255, each character possible has its own
ASCII code. The first 32 codes (0-3 }, when it comes to text hies, are control codes. These codes, which
1

date back to MS-DOS .0, are passed from program to program to perform certain functions. For exam-
1

ple. code 7 is the "bell tone" code. This is die code that causes your computer to send the motherboard the
command to make your onboard PC speaker beep. On a PC compatible system, entering a raw ASCII
command is as simple as holding down the ALT key and entering its code on the numerical keypad (not
vhe one above the letters),
Here’s a simple example:
/) Open u DOS window (C:\CQMMAND.COM on most versions of Windows/DOS ).
2) At the command prompt, enter "ECHO", and a space.
3) Now hold down the ALT ke\K anil press 7 on the numerical keypad.
\

4) Release the ALT key .

"
A
5) Your screen should say something similar to ”..>LCHO G\
6) Now t
press the enter key.
Since the DOS command "PC HO your computer to spit back at you what you just entered, it
tells
w ill display the control character on your screen But the code you just entered is not a visible character;
" A
it is the bell tone code. Instead of G" being proudly displayed, one of two things w ill happen. Depend-
ing on your system configuration, either your PC speaker will beep (sometimes it will just click on cheap
motherboards), or Windows will play the "default beep" sound hie that’s programmed in the system set-
tings. In the latter case, Windows simply intercepts the motherboard's heep command and interprets it in-
tern ally.
,!

Other control characters, include "backspace" linefeed" UtJ). and 'character return' <AA). Each of
the ASCII control characters also has a simple keyboard command, such as "break" (3) which is
CTRL+C. Notice how the above bell tone example displayed A G on the screen'? This is because ALT+7
r

and CTRL+G are the same ASCII command character. This is how functions such as CTRL+C (copy)
and CTRL+V (paste) work in Windows.
Here's a simple example;
7) Open DOS window {again l
8} At the command prompt, enter 'DIR' the DOS command to list the files
.
in the current directory*
9) Now, holddown the ALT key and press id on the numerical keypad.
1

10) Release the ALT key


11 Notice that the directory was displayed. This is because ALIA IS
} is the same as enter:
12) Now, tty it again hx entering DIR at the prompt again.
IS) This time, instead of AIT+1L use CTRL+M.
14) Notice the same thing happens, because CTRL+M is the same as ALT+I3.
ASCII codes 32-1 26 are where the common keys are: A-Z, a-z, 0-9, plus all the symbols keys, space,
and whatnot. 99.9 percent of the time a system password will consist of nothing hut these characters.
ASCII codes 127-255 are the "extended" characters. These codes are characters with accent marks,
drawing characters, and other such novelties. These characters are interpreted differently in DOS and

Page 42 2600 Magazine


!

Windows environments, and cause a lot of compatibility issues. For this reason, they are mostly not well
understood by the Windows generation. At a DOS window* try ALT+ 176, 177, 178, 219* These are shad-
ing effects used in old school DOS programs. Also, check out the border drawing set, ALT+ (179-222).
11 you have ever seen a DOS program has draws a border around itself without any graphical modes, this
l

is how
does it. it

nix and Linux, because of the nature of the OS itself, can handle passwords made up of almost any
I

ombination of almost any of the 256 characters. Unfortunately, password files simply cannot contain all
«! this. The only characters that know of that can’t be used in a mix/I .mux password is code 0 and 13*
I l

Remember from the above example thui 13 is the same as enter. So how would a password be able to
contain an enter as a character? It can't. Code 0 is NULL, and entering nothing is nothing. Linux pass-
words can, however, contain the linefeed character. This is where Windows has some trouble. In Win-
dows, both a linefeed and carriage return are needed to end a line in a text tie. But in Unix/Linux, they I

both perform a different function


A line feed is a control character that says, "Go to the next line." A cant age return is a control charac-
ter that says, "Go to the beginning of the line." So in a normal Window,s/DOS text file, each fine ends
with both a linefeed and a carriage return. Here's an example
W
h a l vour computer secs:
hu is COOLfCRULFfHe likes Cheese Pi&aHCRHLFlDMCA Sucks.
What you see:
foe is COOL.
He likes Cheese Pizza
i*MCA Sucks,
Your computer displays the first part, "Joe is ( COLA It hits the carriage return code and puts the cur-
sor back m Then hits the
the beginning of the line - at the J in Joe. ii linefeed character and takes the cur-
sor down one spot, right below the J in Joe. which ss the beginning of the next line. It continues
displaying the next line, "Tie likes Cheese Pizza!" until it hits the CR and F again and repeats the I

process. This is how each sentence appears to be on its own line, even though a text file is a continuous
string ol data.
F he problem arises when one o( the characters is missing. Let’s say lor some reason the text file does
not contain the carriage return control characters.
What vour computer sees:
Jot is COOLtl.FfHe likes Cheese P&.al/LFJDMCA Sucks.
What you see:
foe is COOL
He (ikes Cheese Pizza!
DMCA Sucks,
This is because the computer displays the first part, "joe is COOL. ? hits the linefeed control charac-
1

ter. and spaces the character down one line where it left off. Since there is no carriage return, the com-

puter does not reset the cursor at the beginning of the line and it just starts printing where it left off, just
one line down.
Now let's say the same lexi files now have carriage returns, but are missing the linefeeds*
What the computer sees:
foe ix COOL ICR He j likes Cheese Pizzzafj CR IDM CA Sucks.
What you see:
DMCA Sucks.ei.se Pizza!
because the computer prints the first part* Joe is COOL
This is then hits the carriage return control ',

haiaeter and sets the cursor back to the in Joe. Then it continues with the next line.
,1 He likes Cheese
I
V/iifi" overwriting What was on the screen before. Since there was no linefeed* the computer did not go
lo the next line.
The most common place you may experience problems from CR and LF mismatches is during telnet
UK terminal sessions* Telnet is not as much of a problem because most servers have adopted the V'TIOO
I

standard, hut using a terminal emulator has been famous for tins kind of trouble. Also CR
on a modem
and LF play a major rule When using a dot-matrix primer. Anyhow, back to the file formatting,
his is why sometimes if you copy a text file from one operating system to another, it doesn't open
f

There are simple ways to fix this, such as opening them in a program that understands the format,
i
fit.

then resaving them. But the fact is that Uni x/L mux and Window s/DOS use different (ext hie formats, and
i f
i/e of a password file will \y? larger on a Windows/DOS system than a Unix/Lmux system*
Windows/DOS requires a text file to have both the linefeed and carriage return codes, while
i
hm/Linux requires only the carriage return (under most configurations).
So, lei’s get to the math. As discussed earlier, a password can contain any of the characters except the
1.1 (code 0) and the carriage return (code >)* So the question is* how big would a text file be that
i
!

Spring 2002 Page 43


3 s ::

contains every possible Unix/Linux password?


Let's figure it out.
For all practical purposes, we are going to assume the password can be made of any ASC II character
except 0 and 13, and that it can be between zero and eight characters long.
So, at the 256 possible characters, we are going to be using 254 of them. Let's make a chart of the
possibilities.
We know that there’s only one zero-character password, a blank one
Now. foreach of the remaining combinations, we are going to use Lhe formula 254 A (number of char-
acters). This will give the possible combinations ot 254 characters for any given length of password.
Number of 0 character passwords; 1

Numbei of 1 character passwords? 254


Number of 2 character passwords: 64,516
Number of 3 eh arse ter pa ss words 16,387, 064
Number of 4 character passwords; 4 2 62 314,256 , ,

Number of 5 character passwords: 1,057,227, 321 024 1

Number of 6 character passwords 263,535,866, 540,036


Number of 7 ch aracter pa s s wore ; 63 208, 110, 101,284,384
j

Number of 8 character passwords : 17, 324 863, 965, 700, 83 J 536


, ,

TOTAL : 1 7, 393,337, 673,075, 145, 131


Whew! That's a Sotta passwords! But bow much hard disk space will a plain text list of them all take
up
Well, do more math
let’s

Let’s assume the password list will be stored on a Windows/ DOS system. This means that every en-
try will require a carriage return and linefeed byte to maintain the text file format. ,5n. here’s the formula.
Site - l Number of X digit passwords *(X + 2)/
Breakdown: The space needed on the hard drive lo store this set of passwords in bytes) is equal to the t

number of password combinations in the set. times the length of each password p us 2 (carnage return
and linefeed).
Example: There are 254 one-character combinations. So that’s 254 passwords times a length of three.
Each password is three characters long because of the one-character size, plus the carriage return and
linefeed.
Okay, lets form another table.
X' ft of Passwords * (Digits + 2 ) - Size in Bytes

0 1 f
0 L2 J - 2
1 254 f 1 * 2 )
= 762
2 64,516 f 2 + 2 J - 258,064
3 16, 387, 064 f 3 + 2 }
= 81,935,320
4 4,162,314,256 i
4 + 2 / - 24 273 035,536, ,

5 1,057,227,821,024 t 5 + 2 J * 7,400,594/747,160
# 268,535,866,540,096 f 6 +21= 2,148,286,932,320,768
7 68,228,110, 101,184,384 { 7 + 2 '

: 613,872,990,910,659,456
8: 17,324,859,965,700,83.3,536 * t 8 + 2 )
= 173, 248, 599,657, 008, 335, 360

TOTAL t 173,864,623,360,502,142,436
So. how big would a Window s/DOS (ext rile that contained every possible Uni>./Linux password be?
Looks 73,864.628,360302, 142.436 bytes.
like 1

Thai s 69,789,676.2 Terabytes.


1

Well, this is every possible password ever, but remember said that 99.9 percent of all passwords only I

used characters between ASCII codes 32-126? Lets figure this whole thing out again using this see in-
stead of the whole shebang.
Number of 0 character passwords: 1
Number of 1 character passwords: 95
Number of 2 character passwords: 9, 025

Number of 3 character passwords: 657,375


Number of 4 character passwords: 81,450,625
Number of 5 character passwords: 7,737,809,375
Number of 6 character passwords: 7 35,091,890,625

Number of 7 character passwords: 59,833, 729,609,375


Number of 8 character passwords: 6,634,204,312,890,625

Page 44 2600 Magazine


.

V: 4 of Passwords /Digits + 2 )
= Size m Bytes

I
0 1 ( 0 t 2 ) = 2
1

1 95 { 1 2 )
= 285
i2 9, 025 2 + 2 ) - 36,100
)3 857 375
, 3 f 2 ) 4,286,975
4 450,625 81, 4 f 2 ) 488, 703, 750
f 5 7 137,809,375 ( ( 5 f 2 J
- 54,164,665,625
^ 735,091 .890,625 ( 6 f 2 )
= 5,880, 735,125,000
I

7 69,833, 729,609 375 ,


* i 7 2 ) = 628, 503,566,484,375
1

8 6,614,204,312,890,625 \ 8 + 2 ) - 56, 342,043, 123, 905,250

TOTAL: 66,976,482,088,208,262
So. a plain text Windows/DOS format text tile containing every possible Unix/Linux password for
\SC1I characters 32- 126 would be:
66,97 6 ,4 8 2 OK 8 208 26 2 bytes which is 65,406.7 Terabytes.
, , ,

Quite large file.


Perhaps now you can understand why am forced to laugh when see a program on a web page or
I 3

BBS that claims to be able to generate a complete password list using the entire ASCi alphabet. Sure, the !

program probably could do it, if it had two million terabytes to work with. And, oh, it would probably take
a few decades too.
My point being, brute force is a real time-consuming game. It takes raw power that most of as just
don't have available. If you need to brute force, then you'll need to get a program that generates the pass-
word list as it goes* therefore making the requirement for free hard drive space a little less.
While most of you probably knew that a complete password list would he quite a large file, even I was
guilty of thinking a 40-gig hard drive would handle the job. By writing this article 1 hope to have opened
a few people’s eyes and save you the wasted Lime of trying to accomplish something that is, at best, a bad
idea.
In conclusion, have a question* What do you and all the computers you come in contact with
I all have
in common? They both are capable of doing whatever the hell you want. Peace Out,
Greetz: sybah tekniq, radiate, Mr I myke&LM
, \

I Special Thanks to Windows Calculator J

by gOOgle miner muter doing network address translation (NAT) for


gOGgle mi n e r @ f the ri a com , the cafe's machines. This is a pretty common
I was sitting in a cybercafe recently, daydream- setup, since it’s cheap and secure if it s set up cor-
in' how nice it would be to remotely access these rectly. Emphasis on the last part of the sentence.
lie. Linux boxen in front of me to hop around the gOOg le perciplex: gOOg / e (205/ re l n et
noi anonymously. gave il a shut. No shell access
I
-
632228.xxx.xxx
u meone direful set up these hosts. 1 tried to shod Trying 03 228. x.\.x .xxx
. , ,

dcr surf die password out of the bored (but helpful) Connected to 63.228..xxx..xxx,
do worker. My eyes were too slow. IT oh! tried I Escape character is
browse / via the browser - no luck. The front
was impervious. But asked myself if some -
"i 1 Flfwpoint/2200 SDSL (AIM ) Router fp2200-32
ne had set up the "back door" with the same at- v33. } Ready
tention to detail. 1 surfed to Login:
haiismyipaddress.com and got the IP address. 1 Lessee, could that be on a default password
i
note of it on my PDA. Back in the lah.
i
1 list? ! surfed to www.phenoeltt.de/ dpl/dpLhthil
I* Ted around. The IP addy turned out to be a DSL (this site is threatened by the DMCA, incidentally)

N firing 2002 Page 45


e

and saw the default immediately: admin (sad, hut 220 some>ry!nnrufr.hosr FTP sen er ready.
true). Name (seme, cybercafe, hesttgOOgle}.
tfigin:***** Woohoo ! h worked. From here, 1 could do any
Logged in successfully *
number of things which I will leave to your imagi-
Now what') i had to figure out a way to do nation Note that in getting to this point, 1 did not
some Flow point
port redirection so that the would change the Flow point admin password, muck with
Forward specific service traffic to the same port on DM CP leases, or generally cause unwarranted
internal, NAT’ed hosts. After some Google (afi)us- chaos. I also look the time to restore the serv ice to
age, I did: its previous unforwarded state when 1 was fin-
# dhcp list
ished:
and saw the IP pool oJ reserved, nun-romeable ftrem do IServer 192. 168.254. J 9 tep ftp wan
addresses handed out to the cafe clients upon issu- If you try this for yourself, remember not to
ing a DHCP request. chose one of the IPs and is- 1
choose telnet as (he forwarded service, or you w ill
sued the command which would do the port lose communication w ith the router on subsequent
forwarding from the Flow point to this particular connects, M would also be wise to temporarily turn
internal IP address and port, chose ftp since it I
logging Off prior to exploration of he Flow point I

comes enabled on many Linux distros. OS:


ftp wan
it rent addServer 192. 168.254. 19 tcp
ft system log stop
ft exit
Although this example worked for a cybercafe
Now 1 tried to connect to the masqueraded setting, you
encounter similar setups else-
will
host:
where since many people mist NAT blindly and l )

g X)gle @pe triplex gOOgl


(
: / 206 / ftp 2) are too lazy to change default passwords. It
63.22S.xxx.xxx should be eus\ to do fhis for Cisco DSL routers as
C Qt meet ed to some, ybe n :afe. hex
t t well.

by Chris Byrnes Lei ’s do a WHO IS


lookup on a domain I know
JKAH Communications, LLC is expired, because I've been trying to register it:

http://wwwJEA H .net skullboeks.com, skull hocks, corn, of course, was


A
few years hack, the government split tap (he (he domain name used in the popular movie An-
11
monopoly Network Solutions held on the registra- ti Trust. This domain is registered at Network So-
tion market. Now, at (hat lime, they still allowed lutions and it says "Record expires on
Network Solutions to control the global registry 05-May -200 1." So contacted VeriSign and asked
I

(the thing hat all competing registrars report back


I
why ihe domain hasn't been deleted yet. No re-
to so all the data is kept in sync). As you may sponse.
know, Network Solutions is now owned by I spoke w ith an official at a competing registrar
VeriSign, who told me, "VeriSign essentially is allowed to
Our good friends at Vert Sign not only operate break its own rules. It just says that it pays itself
two registrars (registrars.com, and Network Solu- the additional registry keep (he domain
fee to
tions k but also this central registry catted alive. In all honesty VeriSign could continue to
VeriSign Global Registry. Lots of domains have ’
hold onto as many expired domains for however
been expiring in the last few months as people for long it warned, and never be breaking the registry
get to pay their bills, dot com companies flop, etc. rules."
When these domains expire, they are supposed to ICANN, the non-profit corporation that was
be deleted within a maximum lime frame of 30 to formed to assume responsibility tor the IP address
45 days. Otherwise the registrar must pay an addi space allocation, protocol parameter assignment,
ttonal registry fee to keep the domain active (No domain name system management, and root server
registrar will do this if they don't get paid by the system management functions, has yet to adopt a
client, of course). ThN is all according to the policy that supersedes the policies put in place by
global registry policy. VeriSign in (his matter.

Page 46 2600 Magazine


> *

by, Javier (X matched with


skftss the MAC address in port
1

18, My
jav i h3 @ y a h oo. com roommates' MACs also matched port 18, So i
went
I iiiTi writing his article because
1 many admins do back to the switch and decided to change our port to
noi seem to grasp the importance of security- espe- full duplex. I logged in and typed:
i iitlly "inside" security. Last summer [ moved into
>omc new apartments here in beautiful west LA.
> e the met <ente r>
About a month inter we decided to hook up our place
with DSL,, so we placed u cal! ami scheduled an ap-
pointment, Weeks later we had DSL, As soon as the
>pt>r i Mode <? m er
a hs were done with (he installation, t busted out my
I
inkS VS switch a ltd a couple more hubs and hooked Nc.\l it asked "what port? So 1 typed 18 and then u
mv whole place was an IFCON- up. First thing 1 did asked to enter a value.

I IG to yet nn IP info noticed that we were on a i

>ltCP based service and that wc were not the only Select Ethernet port f 1-26); 18
k-s. on the same network segment decided to se- Enter new mine
>i I
\ IQkalf lOfttll} { lOfttllf:
me both of my roommates Windows boxes, uns har-
em the drives, setting passwords and permissions for f entered "
lOfuJl" and was sent back to the main
hkw and printers. When all hai was done checked c I
menu. ! douhlechecked my work and port 18 was at
my Linux box. was curious to see what else was in 1
"10 Cool! Next
full". would create an account for
!

our same segment, so I busied out the trusty NMAP


myself, just in case an act of faith occurs and the ud-
ww wnimp.org) scanner and did a: #>nmap nO
F*2 168.0/24 > results. That way it would scan the
mm decides to check his network and devices. Trying

hole network based on a class C address and the re-


to make the account not seem suspicious. I named it

from the scan could he saved to the "system" and gave full access to it. Before any
al Is I
tile "results".

V' exfK’cted. 192 .168.1. 1 and 192.168.1,2 were inter- changes take place you have to reset the switch, which
line.. The
one belonged to a Cisco router ansi
first can be done remotely Now by doing some bandwidth
tin second address belonged to a 3Com sw itch. So 1 tests, 1 secsome improvement on our connections It
did a quick telnet to the switch and didn't gel a is not a huge difference since all did was double the I

prompt So 1 hit the ENTER key twice and burn! I got throughput of the port (full duplex doubles the
login prompt. 3 com switches by default have no throughput of a link), so the bandwidth and other net
password set According to the manual, you are sup
work traffic was still the same. 1.1 ut at feast it helps,
cd to set one upon installation,,, tsk, tsk. So typed
J
Now the other IP address < 192. 168.1 l ): I was able hr
in Admin" with no password and I got ihe follow ing;
telnet to the Cisco router and get low level access.
"
Nothing really useful but by running the command:
i //sir i. min} if}
t\ iwiiwrf;
>shmv version" J can see that it is a Cisco 2600. The
only way to get root that I know of requires physical

! nn nptiotto: 3Com SuperStaek 11 Switch 110(1 access to the router. Hmm ... 1 guess I can look around
'hi met Administer Ethernet ports my building next lime t take out the trash There are a
ip Administer IP lot of other security issues with this setup, like the

up Logout o f the Command Line Interface ever famous ‘file and printer sharing" by Microsoft,
~'Ui if j /1 dmm i s re r SNM P All I had to do was open up My Network Places" and
m os n i
- Administer system-level functions choose a workgroup (about five exist on my segment),
then just see what hosts offered what services, was li

fu /or kelp,
do AlpaddressVeS" on

really kin da easy to a "net use x;


mwt i too i 1 1
my computer and mount some person \ drive since
hi menu option;
Windows by default shares \c$ and VI PCS. But I was
went to the Ethernet menu tmd checked the
more interested in the switch and router than snooping
I sta-
on Of course around nlher people s drives
ll si ie* all the pons. they were all set to

ill duplex. So !
quickly ran 1FCOMHG again oil my As admins and enthusiasts, always secure your
mi pi iter and got my MAC address. That way I
shit from both sides and never trust ihe users

uld check the tables on the switch and lind out Shout (mis to: Happvdrgn, AlefZZ* Escorpion. Ih-
port was assigned to. 1 found my
i I
ad MAC tlesunshyngrl my Enmity and to till my other friends.

Spring 2002 Page 47


Continued from page 3 |
needed - code on the card. Now, got
just the four digit I

curious about this and dialed the number. When


1 wrote my own tetter
prompted for a code. entered something random and
"Back when was in high school lead magazines I 1
1

the call began to ring through. Uh oh! This means any-


about computers and software. Then started budding I

one can dial into tins system and hit random stuff, in-
my own computers front pails salvaged from friends*
curring charges on unknowing MCI customers' bills.
old computers plus whatever had to bay to put every I

According to MCI "Your [calling cards] are ready to


thing together.
use right away. There's no need to sign up for anything
would also sometimes borrow' software which
"1 *

and no extra fee to pay [which, by the way., is not quite


[ cow Ui. not ufU'rvd to purchase While this was illegal, it ,

true l" 1 don't see much potential for abuse here, un-
is a badly kept secret that this can sometimes greatly
less you drop the card and some random individual de-
help vendors of the most expensive software to have, it
cides to call you up repeatedly out of maliciousness -

widely available to people interested in learning the


or. as in the previous example, if some asshple just de-
software. They then go to work for companies which
cides to go wacko dialing numbers. Neither of these
buy hundreds or thousands of copies. In fact, some of
things are likely to happen, suppose, but would be
I

now being
i

the most expensive c restive software es


willing to hei (ha! every [lumber 0001-9999 rings
given away free to non-business users for exactly this
through to a different individual’s phone line. Mj.sdiaK
reason.
are bound to happen, and one person's mistakes are
"If 3 hadn' t gotten that experience I wouldn't have
conveniently charged directly to another’s bill. Not to
the great job and career I have today I am now well
mention that the service is a ripoff - the only possible
paid and therefore have quite a bit of disposable in-
use can think of for it is if you are at a payphone with
I
come which l ttsc for software, new technology, and
no change anil no access to a cashier or an ATM. Using
entertainment.
a conventional phone card would be more economical
"On the entertain men t side, there have been dozens
in almost all cases. MCI is essentially charging you ex-
of reports showing that Napster actually increased al-
tra to dial your own phone number by way of an inse-
bum sales. DVD, which most
major studios initially
cure, Hawed proxy system ihai is unnecessary abouL 99
tried to destroy in favor of a horrendous pay -per- watch
percent of the time. The ad sheet should have read,
format, has been the best thing to happen to that indus-
'Make long distance prank phone calls and charge -

try since the V ITS machine (which you may recall they
them to someone else’" J*d go for that ( sarcasm I.
also fought).
~toast66i)
good for Corporate Amer-
"Regardless of what i* 1

To pul this kind of a "feat it re'' on someone 3 phone


ica, for once please concentrate on what is good for the
hue without their permission is, at hr si. extraordinar-
citizenry. There are laws on the books right now which
ily sleazy on XfCIs part .

clearly establish the right of a customer to make a copy


of an item they’ve purchased for use in another format Dear 2609:
(ex. for transfer to a more portable system) or as a your response to DarkBtayd 18:4), you stale
In i

safeguard against damage ns the original These rights thai you don't see how it’s possible for Radio Shack to
arc being violated by members of the MPA A and espe lose money if someone elects not to activate a piece of
dally RIAA every single day. yet nothing is done, hardware ihyi they've bought (such as DirecTV). One
"I ask that you not only prevent the likes of the word; kickbacks, worked for the Canadian arm way
1

SSSCA, but that you look into the continued routine back when cell phones first came out. Radio Shack, as
violations of customers' fair- use and other rights, un- well as the competitors, sold cell phones at or below
fair business practices, and price fixing by the compa-
"
cost. We got a percentage of the money the airtime
nies supporting SSSCA package cost (usually around $300), was directed to I

— Jeremy M Lang not sell a phone unless die .customer activated in the tl

If mo n f yeopl e took t hh kin d of in ft* re st , including store before he/she left. One of my cow tinkers "forgot"
ending tetters iu the mail, making phone calk, rufrf
v
and was Lanced.
even making appointments to talk wi$i elected offi- vidieOn
cials. ii would definitely make a difference. Since this If it's clearly understood that an item is only for
letter was sent, the SSSCA has hern returned the CB- sale if its activated, that's one thing, ft's quite another
DTPA {Consumer Broadband and Digital Television if it ud verified at a certain price and then alt
s simply
Promotion Act}. Keep updated, and spread the won! )j your personal info iy grabbed alike point of sale as

it '.v really our Only chance^ a f'condmotC for getting it at that price..

Corporate Corruption
^ - % Mm <*m»
I am writing this letter in order to inform you so
Dear 16(H): you can inform the public. Recently all
received a rather interesting mailing today from
\ Comcast & home {around SGOjOfX)) users were transit
MCI. The letter, which is attached to a couple of pi as- tinned to conicast.net. Without warning Comcast cut
tic cards, advertises a new service allowing MCI sub- the service levels ©home users were getting in half.
scri tiers to dial home using a toll-free number They have also created connectivity issues with the
( l -8fK)-4H4-b236) and a four digit code Each call poorly executed network and their privacy invading
costs 35 cents a minute, plus a 26 cent access charge if proxies that aren't even i^bfe to be user-disabled. After
the number is dialed from a payphone. Interestingly, all this the price pay the same amount
is still rising. I

the card is already Activated and no password is for less than half the service. Comcast doesn’t even

Cage 48 2600 Magazine


1 e

I i,i vc a news server set up. Also, i he upload cap they reived ami taken advantage of by their own record
have set m place has made it difficult to even down- companies. A recent "settlement" with online music
simple gone on below list w hy this
r
'*'dJ files. I've to distributors resulted in money going to the record
proxy setup is so bad. comparers and nothing to the artists. We
- were?} i a hit
Access to IP restricted resources
] > is disrupted. In u r* inset I hi it a h>t >f music ions >e re
'i r 1 .

order io facilitate access to HTTP IP restricted re-


-oyi'ct's. 1 must allow the Comcast proxy server to ac- Dear 2600:
cess these resources. allow the Comcast proxy If l It appears Disney is starting young with its brain
server to access these resources, inadvertently allow I washing (not that I’m surprised). My girlfriend was
my other users of the proxy server access as well. llscking through the channels tonight and started to
no check and balance on Comcast/ ATT
2j There is watch this cartoon oil the Disney Channel called "Th
in how they implement the Inktomi Traffic Edge soft- Proud f amity." It featured this young kid in a black
ware or what they do with the information they gather, trerrehcoat (a Matrix spoof) enticing his young girl-
' even what information they do gather
i

friend to download
music from his website. She
free
t) Customers were not noli lied of [he change in
complied and then turned into this crazy mu sic -down-
set vice.
loading Ireak. This eventually led to her arrest and be-
4) The Comcast call center was ignorant and un- ing banned from ihe use of her father's computer.
i change m service.
ware ol the
Later she was again enticed by her misguided black
5i Software which would defeat the intended pur-
trench coat- wearing friend (who is obviously Disney's
pose of the proxy server Virtual Private Networks) is t
demented impersonation of a hacker) to download mu-
unhidden to be run or implemented by residential
sic again.This time, instead of her arrest, she finds at a
1

omcast customers per <he Comcast Acceptable Use


local CD store that all of the CD s are gone, leaving
Pul icy and Subscriber Policy.
the store owner broke. Her music downloading is Io
to Ihe Traffic Edge software has the ability to ex-
blame [of course). Not only is he out of business, but
I lkIc IP addresses from participating in the proxy. I

should he given the opportunity to opt out of this ser '


various people are out ol jobs who have nothing to do

sia:' (I should have been Lold I was opted in to some-


with the music industry. At the end ol the show she
thing in the tirsi place).
Lulls thisoh so evil hacker kid that downloading music
is stealing and to go away. Of course the show ends
you have no other choice if you
tdn top of all this
want cubic Internet access If Comcast is hi your area, with her getting a great big hug from her mom telling
they are your provider. Not In mention that Comcast, her she did the right thing,
the number three biggest cable provider in the nation* nomgtion
bought AT&’I Broadband, the number one biggest Should anyone he surprised at this kind oj propa-
i
io ". nier. Comcast has bought out almost all the little ganda when such corporations practically own the
providers over the years. Now you have Comcast from airy caves in this country ? And the only reason we even
In add phi a to Miami. There is no competition. It’s
I I say "practically” is because, at least on paper the air-
v to tell Comcast has no desire to make things bet-
i
waves still belong to the people and ran he taken hack
Ihe only desire they have is to drive up prices by if the current holders ewe deemed unworthy. This ap-
giving less and less service and charging more and plies to cable outlets as well .

more.
Robert Williams Dear 2600:
was reading through an article today and the
3

I tear 2600 : headline read Moviegoing Set Record in 2001 " Ap-
During the Gramm ys a representative of a record parently the movie industry had the highest grossing
i ompany spewed for about five minutes on how the year in 2001 since 1950. Now this strikes me as odd
musk food chain'’ is in danger by people who down- because there have been so many news articles about
1

and pirate music. Throughout ihe entire spiel he


id
how the M PA A is losing billions of dollars each year
Viis making false, accusations, saying that every kid is
to movie piracy. went looking for one of these arti-
I

f n loading music on ihe computer behind (hen par-



.

cles. and found in one a quote thought was interest I

tit A bucks, able to download 6 .(XX) songs in three


ing: "Claiming that the movie industry is losing $3
lays Come on! live off a shit 5bk connection. There
1

billion annually through theft of its product in one


no way could even start on that number! He was all
. 1

form or another, Jack Valenti said that what w as now


oncemed about how- the artists will not receive their f |

money when they make about 52 off every CD while happening could ‘disfigure and shred the future of
r

if rest is sent to record companies. It scents be is


i
A me r can fi ms bee an .sc of he case w h which ms
i I \ i t fi 1

lore worried over his money than the music food


11
can now be copied and transported on the Net."
ham. Give me a break! Dash Interrupl
c(M3wr_kh3r We’re becoming increasingly convinced that

ib \nnrid he interesting tn ask this guy if he actually


there s a parallel universe MPAA adversely af-
that's

u ght someone would buy that amount of minor in a


iii fected by these things. There v realty no other explana-
on l store: if that figure is any where close to true tion as to how they can make spcM dkitptgtrically
a d we don believe it for a nanosecond), they should
't opposed statements and expect the#? both to be true
happy that people are taking an interest in their Other than perhaps someone not being co’mplelriy
prod w and busy thinking up ways to exploit that in-
t honesty that is. Yeah, well ga with the parallel tab-
ti o a fu reality the musicians are being horribly de verse theory.

spring 2002 Page 49


Deftr26ffl; format of an ‘ARL (Akamai Resource Locator) can
Yesterday my Business Tech class had a rather piggyback their own content on a paying Akamai cus-
lengths dehate on the issue ot open source. We also tomer's account. Like said, they don't intentionally
I

discussed the controversial "sharing" of files through give their bandwidth away for free
services like Napster, Kazau, md Morpheus. Tve a i The author implies that Akamai makes its money
wav s liked getting stuff lor free through those serv ices, by some form of underhanded distribution of end-user
but I’ve al ways
of been on ihe fence on that topic.
sort data. That has not been my experience They have no
1 mil yesterday. We were right in the middle of this big problem selling ihe data hack to the web owner
site
discussion and 1 was being uncharacteristically quiet but they do not cross- sc 31 this information between
Then something deep inside of me woke up I realized firms, as that would
quick way to get themselves
lie a
something People say that these services are killing sued out of existence, not by the end -users, but by the
the recording industry, 1 say let them kill it. Destroy media companies themselves.
she establishment. Kill all the record companies and And ihe author s supposed shock at lycos.com
movie studios You can't kilt art so is will go on with cookies and URLs sprinkled about a wired.com page
out them. Only instead of having poppy little pieces ol should lx- no surprise at alt. Wired News is simply a
hts like Brittany Spearv and Warner Brothers, you 11 brand owned by Terra yens Of course they are going
I

have tin underground coalition of artists, producing n track your activity tm Their entire family of sites, lb
i

their work in their basements and sharing wiih the ti those folks, you’re not browsing separate sites Yon
world for little or no money via the Internet They'll are merely browsing different "properties" owned by
have day jobs and still continue to produce their art be- Terra Lycos It is a rare media. company that operates a
cause the% truly believe in and love it forget about diversity and does not do this kind of thing. < )l
>t sites
money, lose your self image. Indulge your passions, far. far mure concern islhn J-party traffic watchers like
embrace youi art. Free your mind, and lake down the Doublet 1 ick,
system. MSM
Brad
Dear 2600:
Article Feedback Maybe because I work in advertising, maybe be-
cause have more training in economics titan the aver-
I

Dear 2600: age bear maybe because know people who work for 1

Your contributor "angelu/aharia" is most griev Niros like doubleclick .net, but maybe because like I

nusiy mistaken in the article Behind the Scenes oo a tree goods and services, is why have to complain 1

Web Page (IK -U when asserting that Akamai pro- about all the derisions against doubleclick, akarttaL el
vides its image delivery services free of charge." can I ai.
assure you that they do not. At least nut intentionally. yes, these firms do invade privacy. They track a

Akamai is "content delivery network


i
they op unique identifier - you." as it were, arid they know
H
craft an "edge net wot W i>f obyeo cache servers plac- when you have been sleeping, thev know when you’re
ing them in hundreds of NOCs around the world aw ake, etc Blit these linns do not pose a threat against
ithough itiostfy in North America). The lung URLs at- us 2600 readers should have an affinity for how things
tached to "ukanufed" images PDFs, streaming media work and should know how to get around them lb
iiles. and ot her web page components arc actually spe- avoid ads without overhead go to
k rally assembled L RL> thal include a cache rule, a htlp://w wu. yoyo.org/~pgl/adservefs/ and edit
r
vour
tiniesiamp and/or fingerprint of the content cached, hosts tile. Turn off cookies, or use einikie management
and a number that identifies Akamai's customer
serial software, or just do yourself to your temp folders
it

ulvc web site that owns the component Wired/Terra -


from time lo tunc.
Lycos in the case of the article's web page), Akamai These hr ms provide their clients - websites like
M
caches copies ol the heavy items on a web page on a
"

wired, for example, u ith the revenue that allows them


network of servers, and then uses its ow n proprietary to go on publishing fret news on ihctr website If vent
algorithms to identify which of the edge servers re use any ol the ubiquitous free services like weather,
closest fin a network sense) to the end user and then news, e-mail, etc services that not more than ten
iie vers he ct >nte n t frt >m ha se rve r.
1
1 i t i years ago cost real in one y ,
you have 1 1 n u s like Jon
This is meant to improve ihe response time for blectfck and akarnai to thank for it
building 3 complicated web page by limiting the num Fm not saying that should open your system up for
her of network hops that heavy content needs to tra these turns to pick through, by no circle h of the imagi-
v ersc to reach the end user. It is also supposed to lower nation. Bui insofar as online privacy is concerned, the
die amount ot server hardware that a media company real "had guys" are linns that produce things like the
like Terra Lycos Isas to invest in themselves by limiting infamous B )L installation engine, ComeiCursor. and
I

the number ol requests thai come to the site’s origin others that surreptitiously track your movements. We
servers. The media company pays dearly for (his scr all know doubleclick tracks online activity - that's
that
vice - rn my experience up to lour limes die cost of what they do They arc not hiding behind a tile sharing
bandwidth from ihe typical bandwidth
available protocol, or a "enhancement " A lilile hit of
web sin
provider ai a evocation center. Whether the supposed privacy is ihe price of admission to premium content
im pro’s eftipnt in web page performance is worth the sites. \nd there is a worse Case scenario. A subscrip-
exorbitant costs i at Yeast .for simple object delivery) is tion based Internet would give you even less privacy
a matter of no small debate. because now they would have a name, address, and
As an added bonus, anyone who can figure out the credit card number to match up with a browser s

Page 50 2600 Magazine


- \

unique global! identifier Knowing this, irKiead of run- line Access to Records that i
nm only keeps information
n tig at the mouth at how Vvil these firms arc. put tip on students { transcript, addresses, plume numbers,
id simt up As Jong us nit ot douhJeelkk's *RLs are 1

etc.) hut on til! alumni, often without then knowledge.


pi tilled at 127 0.0.0. they don't know me. and l don't The username is the SSN ( easily obtained as it 's also
care. the student ID which is printed m everything from
Kurt Winter term papers to grade pastings) and the password is tin
StHtu* goad points, bur what happens whan they dr vr'.i digit hinhdote (also easily obtained or easily
*h of people like von who bypass their
they 'tv tired guessed} I'hose few individuals who managed to fig-
rocking software' Perhaps they wilt even make it a
1

ure out how to change the password in the post will be


me Stronger things have then happening We feel
i
delighted to learn that they apparently revert back to
hu pie should at least tune the option of bedding if t
the default after a certain amount of time, it s said that
they want to pirn by these tales. By letting people
a new system called SOLAR is about to be launched.
it tow fun they u ark and with some of the itifbrrnation
i
Let's hope the added 1 somehow brings security.
n vi provided, people are better armed to deal with
Hut just I mu
use these moneymaking Joins ate Dear 2600:
m trued that this is the only wax the net eon be nut
\
A ye a picked up a copy of 2600 and was
i ago, I

dte sni make it so. We should always be Striving for very food of the information found. It was something 1
v to provide information and sendees to the musses
1
could read and not cringe ul Fast forward to today and
'*
u vs that arm t offensive, intrusive. or expensive. ail l sec are articles on right click suppression" and
"building a wooden computer." Not to mention that
I Kir 2600:
many letters arc angst filled piles of jealousy and stu-
In the irlivk Babies on Answering Machine
from high school nitwits What’s happened to
pidity
Mi king" k Horrid presented a UN)5-digit sc
in IS
26002 seen is io have been going steadily downhill
1 1

• I
iienee that contains ail the Ldign numbers between
Also, mi regard to the letter about the libertarian
"
and 1>W. IK asked for another such sequence the
><i I

Party,your assumptions arc wrong. Libertarian beliefs


liorter Welt, it may be a bit simplistic but if he re-
are founded Upon freedom for both the individual and
1
'U‘d the two imiling zeros from his sequence and
aided a 9 at the beginning, it would he shortened by
tor the corporation, as wad 3 as the be lie I m personal re-

me digit while still contain mg all the numbers. It is


sponsibility. Corporations are not always honest or
ethical, and the goal of Libertarian views is to prevent
well use a computer to generate a number
enough to
requenee. bur one should exercise a little reasoning its the corporation from impeding upon the citizen un&fc
well. mg laws like (he DMCA null), and allowing die citizen
ascii 32 freedom from the state, socially and economically.
),m managed to shorten it hut soar triumph isn’t Scott
me to fast verv long,,,. Usual lx when were accused of going steadily
downhill, its for a longer period of time than a year
I H-nr 2600: Perhaps you meant to accutu us of a sharp decline? As
Horrid's string for accessing answering machines for Liberia rum beliefs, it all sounds great except far
hi passwords is almost prefect 'Hie minimal
t-digii the fact that it doesn't work. If a government lets huge
ngth tor such a string is 1002 digits, not 1005. in t
corporations write the laws (suck as in the United
in: ml. the length of a skeleton key for an arts wiring
States today), it's lit tie different than there being no
.bme code of length n is lO^n+n-l J In order to re-
.

government at keep the corporations in check.


all to
unnecessary repetition from Horrid's string,
It A unlx in those places where governments actual!
unply remove positions *W, 000, and 1001. (The
represent the people that there s even a chance of
I

die end of the string becomes WlO.)


;ii
keeping the corporations from systematic ally abusing
ted
the power that inevitnhlx comes from being huge
tl -on otnhine tins with the previous letter i idea.
ii i an vet this down to WO! Dear 2600:
This is in response to Right Click Suppression’
I t i
ur 2h00:
(18:4) by Rob Rohan. The right click suppression, is
After reading the article in 18;4 enmled Exarmn
not really a problem and it is in easy to by-
fact quite
Ml dent Ihitii bases. ni surprised that St reamer I

|kind s wasn't aware that most universities have some


pass by mm- ml nisi \i means, For example, to copy
pictures from the site onto the clipboard, you don't
*
siiulc n Ui acuhy database that s available for the
i
i

ol's si' Now what is amazing is that my school


li
need rig hi dick. Use Intern cl Explorer {lets you high-
(which shall remain nameless to protect the innocent) light images) and just highlight the image tor whatever
this information publicly available to everyone else you warned to right-click on using the tell mouse i

(h just a short jot on the URL, Now if s just a good button. Then simply press the Microsoft context- menu
that ChaiHix's friend's student ID isn't his SSN key (the key between CTRL and ALT on a standard
it is with other schools [imagine the fun). Now the 104-key keyboard it's next to the Microsoft logo

pimu to change one of those


it does exist, hut it is key h Most people know find this key to be useless,
I

i;s that the school information technology depart and some even remove it But, don’t be foqhd. This
M lorgcts to tell you during orientation. key i> quite a boon it axed to- vow advantage. As for
P4R4d0x people who don’t have tins key on (heir keyboard, you
* hit hy us, the State t ft i versify of > New York at can simply high fight the picture anti use ihc menu op
Hnu>k In o tl system ailed SOAK t t Student On lion: Edit Copy to copy it !n the cUphonn! In any case.

Spring 2002 Page 51


. .

I think this is considerably easier than writing a Java time vow "c racked intoa bank account " let alone that ,

program to save the picture of someone who's on a most wanted list or in this -

Em re Yu cel case on ALL of them? It's not like on TV and nor too
many people seem to think that it is. This l cat Is to the
Dear 2600:
perception that hackers can be used as some sort of cy-
Another way to capture a web page is to simply do
herarmy, which about the furthest thing from the-
is
Pile, Edit Page in Netscape Communicator, did this I

for a web page that had photos on and it worked like it


(ruth. Anyone with even a slight familiarity of the
a charm. hacker world would know that we're constantly ques-
Inter net Guiltless tioning, disagreeing, exploring, ami getting into trou-
ble, Not exactly the kirn! of people who would do well
.

Dear 2600: in a military environment. We happen to hear from a


>

In your 1 Hack from


8:4 issue in the article "How to
sizable number of unhappy hackers who somehow
a RAM Disk" by Nv, the author recommends destruc-
wind up in military serviced Finally, even if it were
1

tion of CD media; If you're, really paranoid, you can


'

something simple, where do you get the right to be the


torch/ incinerate the CD. I've heard nuking the CD in a
judge, juts', and executioner':' Imagine ft everyone took
microwave is not 100 percent successful in destroying
itupon themselves to impose their brand of justice in
data (and it stinks!)."
this manner, ff you really want to help, the best thing
would like to note that these examples (^destroy-
1

vou can do is he observant and notice things that other


ing CD media are dangerous - fire could gel out of
control. hope no one would actually place CD media
5
people may not notice. Then let people know what you
in heir microwave. There are also some companies
i
see. Itt this age where the truth is fleeting and mass

that sell what they term degauss devices that effec- nutnipulation is common, the ability to detect when
tively act as belt sunders and grind the CD media until something doc rtf f make sense is a valuable one.
you are left with dust and u plaslic disc, have recom- I

Dear 2600:
mended my company not purchase these devices as
they are both expensive and unnecessary.
I'm writing 10 disagree with your analysis that the

Recently J found, purely by accident* a very effec- government should release an original digital version
tiveand inexpensive way to destroy CD media without of the bin Laden tape. Apparently all digital video
11

the use of any machinery or heat, had Inadvertently I


tapes have special "markers for things like time, cam-
placed a compact disc in a solution of Purex Bleach. era lens settings, etc. It seems silly to think that our
Twenty- four hours later 1 found the disc transformed government is good enough to fake bin Laden's image
to a bath of metallic flakes and a plastic disc. The and voice, but can't fake a few digital markers to go
process may have taken less than 24 hours to dissolve a o ng w uh that. Fhc gov ernn ien l did n
I h a ve to re ease ' i l

the actual metal coating on the plastic disc, but it was any evidence at all, so be lucky you got any. If you re
not before 24 hours had lapsed that 1 realized my disc ject it then reject it, but don’t expect them to pander to
was in the bleach solution. your whims.
Steven Richards
Dan
One of the more hnAMstmg in&dmmtn tic is we 've
They didn't have to release any evidence at all?
heard of lately
What kind of world do you live in? It is the obligation
of thinking people everywhere to question and analyze
Tracking Terrorists without relying on blind faith. Almost every major con-
Deal 2600r flict in the world cun be traced to people who refuse to
I wanted to comment on a reply to one of your even entertain the possibility of seeing something they
reader s letters. someone that basically
You stated to don't want to sec, As people with a technical knowl-
trying to hack Bin Laden was a stupid idea. don’t I
edge of such things, it was a lot more than a mere
necessarily agree. could be worthless, butSure, it “whmT'for'us to Warn to see the t mice ode of the tape ,

cracking into his bank accounts and such forth would Them were numerous details attesting to the authentic-
T
actually do some good whether you believe it s a stu- ity that omld have been garnered by seeing these val-
pid thought or not Itwould also be helping the Amer- ues. While they could have been faked, it would take
ican cause a lot if she hacker community united and
tin extraordinary amount of effort and lime to get all of
did something for the sake of our country. We bitch
them just why
right. That's their release in a timely
anti moan about how much we hate our count ry, yet we.
manner Hm so essential. And it's a perfa example of t
were all angered by the events in September and ait
how hackers can help in these troubled times by us- -
were united to help everyone. mean, it’s very possi- I

ing some technical knowledge to let the world know if


ble that the govern mens themselves are trying to crack
into Bin Laden Yaccoums,
something makes sense or not. Of course, to do this
Chris properly you have to accept the fact shat you don 's

First off, we don “bitch amf moan about how 'f


know the answer
you analyze the data. It s puz-
until

much we hate our country." Ike bitch and moan about zling and quite disturbing that she United Smses gov-
those who continually subvert the principles of democ- ernment wouldn’t want this evidence to he known. Hut
racy and get awax with it. all the while masking them- what s even worse is when people close their eyes to
selves in patriotic fervar. Second, when was the lust the mere possibility that the facts don't add up.

Page 52 2600 Magazine


1 I 1 1 ; r : . ’ '
1 ;

Right Click Suppressed


by fMe Script The
The purpose of this article is to provide an e*- The script isninja.pl is designed to get around
h nsiuEi to "Right Click Suppression by Rob that kind of right- click protection w ithout having to
Rohan in 18:4. root though the source yourself Supply it with a
Blocking right clicks, whether on the entire lew URLs and it will print all at the scripts includ- i

'.sec iff
i, si images. is growing more and more i, Li ing the aue used \o block your rigfcrt-chcks} found
popular as a form of weak copyright protection- on those pages, along w ith the URLs of the images.
i
encountered sites attempting to prevent me Optionally, it wall download the images and put
saving materia] copyrighted by people other them m the current directory. It you want to down-
than the owner of the page! load the Hash presentations, the midi music, or
In addition to the methods mentioned by VI whatever, it would be fairly easy to add that to the
than. indoze users can click on an image and W script. In the absence of wget, Mr. Rohan's Java
Ifit from the browser to l heir desktop or another
i!:
1

.
app would also work well. hud to dust off my Perl I.

Jolder to copy (be image Linus users can try the skills for this, so please forgive me if it's a hit
piovided script.

M
sloppy
f
__

ipjr, ''Script Ninjd bv EVit J
rLMhl Jin'
iii. : KL iin.1 fhriiihi d* lacafliwu of ti n^'i-u«Ui npUrjuiHliy iJkJwnluuilsUk- Sdcifi SAROV'Skinpl.
'1.1 i .
.m I iv ttripH iimaJ on ihs jar-* 'r-n iiki j*l help' fuf n* n mri-rmi'T! in
!*(!Eijn2 - fhtipi Stmpi,
u i» hik' yiiaiLuin, 1 1* u imom m ii willbf Me^itl
whttefitfiifO (re V* i

If ''
'

T.'.‘. j .
I

SliripZ =idw>(X Slnipl L


> 'iny luuijif.-Si- njil S’anja. . \ti

ffsod nJiiif

i • imi, rfi. AispplsciX HxiwiMl ^pniirnL* nnd didn't specify Mp‘
\Mi\ ||
#ARUV=-/ hdfv'l
Vi 1 1 1.; List = V(«pp SiLupj SU dtp?]
I
vnnynimi f

[mu H
prjnf "tjfjwp
"
Hsag<- ^nin>d.pi [-fiiti injures) uri] (uHi ur|3„.J\rt ;
Slmaiiri\ii
P"'ii l HIA'i iiui.sr rmi m i* filename (' lilnil. dc. ) Ur a lurilipg 4nh.fn'
• , . ishuii^ LCiv.iktrKiL£‘i rhr iEEidi^tr iWfMtl afctiiy printing p* k l. I
(it"; t

iftil, h"V^ri.i ui('


i

U |ir| Ssinpnrl ");

j*eml if
Iftind it
j
- i ; . \i..inrr .1 (i i
-:r. £ Us nuiige-.
v Iii A - (-
; flt'iJil far
/(LcihJ ti
li
n f jJiC'F-e ,i - Li. i
fre
'

I
"ml if
UiSfilfl VIihl'I ,j
- :-l n "i
t i'ii J
ft* 3

1
I

i Ulll.llX'i = EJ,
if If so. fU Jiif Jbu’ kh tk< t'onrn c M.npt> In </m. ri|TO
!

i
Ih'Jwl rl;ie $v,Fiiuiii'+;
4
llm.Mil.fi E-Jt-h | HI prim " : • Script frV-.cmu.n i= =ln
. 0 vUiifj} - CS'ARO V; SkKipm-l 11
l‘he n^:-srcd nn.f1 lh Hetv iji cas*; a-fiyon- uwm a stupi
f In pi in i Util miMUicT HLTifm iOmi:ibinj'
i - u 1 ; i i '
.
' i. it i he nrg.ti meiU ’

Vnrvit'.! •
0:
I' '•
\KOV| \L4H7p|«1 "
UetJJlklf'eOl
whit^hDf < U> file i

r
1
ikkU
prnii S^Je! Stine];
liUcml if
h
jti'ShlejSlinc] =- .'<>,L'Tipi/i |
ii.if-. lire Ule
1
1 1 •
'y.'i vAkf iV(Slot*p| -^Tutfmt-ditMnwrtr- (


la- e'ji n I'ryrtlt Ll£ .HCp^ilH.'

mi nVifC* 'utt» rVniu V \H(j v


1

*!.:,!
.p| 'ji
ItfriMJ if

'
HI. I III Nil = (I; rPSflbffSJinfl pi.' 1

l inij'ntjin If, t

Iii f r Ll flu' ih 'iVne-Scdlj


i 1 Lllir fl if I Hi.’ Itf'file, Sthjc++) t

t Ifl'C
n 1- ijict.' in itriq^c?
I
Hr i? i.i iZ n
irOlilfiSli.ni£ =- tetarig/iS
l
inesnaJ-
V fffeld if
ir [i stfi f-itFwlIre U ire in Ui*ppv mn'inci
Sltmr++:
'
h* -fliti 'l ->]/'. SBklVlinclU
#ea (? rehtEe
1'cnitlpnpZ £i; J9fe*|jp2 < ft niwi['- +-« |

ireinl ' =r=S!ik1 St'i'tfx .

i
1 Jsf-I SJ. -
I'hFi-'i
]#t-ini if
1
|

I I
*ifiwJ J'ekt

I
sop = ^ifiKA",'. SK'Slonf!! !.', f#i;hil fiir

)OfQli>i>fi3 I ; $tou fS' i -. .|


i
J i- fttefi; £k]g^3-f-+ prim *~Hnisliediyn~

Spring 2002 Page 53


by dual parallel anything to stop the machine from running the
d ua I pa r a lei @ h ot m a .com
l (I BlueLight app. was lucky; there was a primer
!

In this article I II discuss some variations in a configuration problem that popped up an error
common pin pad, a couple of hacks at a large re- window and s Lopped BlueLight,
tailer.and finally a disturbing trend. l left the printer error window atone and
In my last article discussed the VeriFone
l started poking around the desktop. saw that any- I

PmPad 1000 and the button presses (all simulta- thing significant that could be accessed from the
neous) needed to access the Master Key, or Mkey. Start button was missing. Function keys and Task
Variations exist. Some pads are set to access the Manager were disabled, fhc only thing in the sys-
Mkey by pressing the bottom right and top right tem tray w as doubled
anti- virus and... the clock. I

buttons. But the vast majority are set to access the clicked the clock and the time was correct Not
Mkey by pressing the bottom right and top left for long Windows applications and temporal
buttons. anomalies do not mix. So set the year to 1980, I

The last article discussed Wal-Mart. This arti- clicked Apply, and OK. Dr, Watson promptly
cle will discuss its failing competitor. Kmart, The crashed.
pin pads at every Kmart register arc Checkmate What can I leverage here? One of the buttons
model CM 2 20s.
i
OS l .07. version 2. 1 . One can in Watson error
the Dr. window was Help. Click-
gain access to the pin pad by pressing the four ing Help brought up your favorite Contents- In-
small buttons by the LC D screen, and she two
dex -Search, messed around in Help until had
I !

bottom-most buttons, green Enter and red Cancel,


the option to search for Windows Help files. This
simultaneously (think Vulcan mind meld). After
gave me an Open File dialog box.
an incorrect password. Lhe pad will cycle, verify-
Should search the C drive, C:\W1NNT? No,
1

ing the applications that the user has authorized


[ went to Network Neighborhood And there, with
access to.
Utile perusing. saw' vast networks like km-
I

Now: from pin pads to PCs. Walking into


northamerica, kmintcr national, kih.kmart.com -
Kmart, at the Customer Service counter, one will
way more than could w rite down without being
I

immediately see one of two public computers


noticed.
running BlueLighl.com, K mart’s online shopping
1 believe Kmart
counting on securing un-is
application. These computers, the other residing
wanted access from the BlueLight computers
in Electronics or sometimes Sporting Goods, run
(which probably have trusted access) to these
N 4, have LCD monitors, a keyboard, and an en-
1

large nets by locking down these NT boxes. As


closed trackball where the right button is trapped
under plastic. The BlueLight.com application you can see Lb is isn’t the case.
starts automatically, so logging off or shutting
Finally, 1 w ant to discuss, not a hack, but what
down just brings the application right back up. Ican only call negligence. Throughout my explo-
BlueLight.com (v 1.0.55) is an e-commerce rations examined quite a tew pin pads. And un-
I

application that features products and a shopping derneath many would find a sticker with an 800
I

carl, running on publicly available NT computers


number and a client number, 'he 800 numbers I

in many K marts across the nation. ITte applica-


belong to either banks or transaction handling
tion is a browser, accessing the Internet to trans- companies, and the client number is the only au-
mit selections from the local Kmart to thentication needed to access sales, deposit, and
Kmart.com \ servers (kih ..kmart.com). Blue Light checking account information for a given vendor.
takes over the machine, running in Lhe fore- Having deuh with small businesses and having
ground. So the first thing to do is to log off by found these stickers at such. know that this in- I

pressing Qrl+Ail+ Delete and clicking Logoff formation is held closely. It is a shame that some-
The machine will cycle quickly, bringing up the one needs only a remote interest to access this
NT desktop and then the BlueLight app. Now, do private information

Page 54 2600 Magazine


by c311ph the supplied Compaq computer depending
itself,

c3il pti @
hot mail .co m o n h o'w s a e lie y want ih--.ii s lore's
t t POS a n d Coji 1
-

In the summer and autumn of 2000, Radio paq display computers to be.
Slacks across the country got a new fixture* the n add ion ii c C omp a< c out pu te rs the mse Ives
I i I
,
t
]

bcmsoft At the heart of'these is Internet Center. are stripped of most functionality. All f-keys are
'tl course a Compaq Presari o 5000 series. Most are
disabled, you can open " my computer with only
600 with 128 MB of ram and no anti-virus
I '
the ed rom drive, Ctrl- All-Del is active but there is
r w u re { yes
* » I b ac kdoor-G/bae k or Ike work we . t J
an easier way. When clicking on start. Then docu-
nli these The computet is linked by cat 5 to a re- )
ments. you click on "my documents", you get
ii

it er/decodcr box in the back, A Skvstar Ad van-


-

> into the folder. Way too easy. From there you can
luge model VSTAT IDO is what this store is navigate as usual, except right clicking. Most of
pupped with. The Sky star is connected by coax those options are available on (he tile button any-
i" commercial si/e two-way dish in the mot.
.i
way. You have almost all rights including opening
I Itose in cities are equipped with, in all likelihood, a DOS prompt and access to r%eb.il.
I usi assume this because in the kiosk it gives the
I
Name Database
link e to learn about high-speed access by cither
All stores (corporate and franchise) keep local
The stores in rural America are
1 or satellite.
in -store records onEy. Once a month the entire
quipped with what was GiUu-to-Home twww.gi- uploaded to Radio Shack’s corporate
database is
m nm). After being called Gi laid o- Home, tl was
oft ice. The old addresses are included in this lor
i '’named to Siarbaud. Now Radio Shack or Mi-
the purpose of reeenl address/phone number
ott has dropped them for service because they
changes, etc. Then the Radio Shack corporate of
slowing the show. Other companies have
c
lice crosses this with their previous tiles ft? com-
noked at Gihit including EchoStar, Russia's Ya
plete the database update. Then we all get a flyer in
maltelcom. PMSI. ISKRA, etc. Radio Shack has
the mail once a month The come at no cost
llyers
u witched to Hughes, the current ow ner of our
’i

to your local franchise stores. That is why we are


n He lice satellite TV provider. Only the server
always asking for your info. It's free advertising.
h- chan ged n one of the eti stomc r equip me n L C -
, i i

Also, a recent update to the Radio Shack POS.


had prior to the switch put out version two ol
i

found a www.rudioxhackpos.eoni, A1lzip.exe, a


i

the ii receiver box. a free upgrade to existing cus-


self-extracting WinZip tile, has let us add all the
rs, This original setup required you to pur-
zip codes in die U S or per state if we so wish
one of two specially configured Compaq
i

iiiputers, " priced at $999 or % 1299 in addition to


Most POS updates have both full install (server)
ttial satellite equipment and overpriced m-
..
and file only (client). Allzip.exe is installed on the
server only, not any of the client computers. This
tuihnoii Since then, about May or June ‘01, both
computers have been discontinued and arc creates two lilts in the C:\RSPOSlC3\RSFlLES
linger available. From other dealers 3 have directory, the same directory that holds ail inven-

dked lower cost machine wasn’t up to par to, the tor): customer name, and most; other database hies.

tin the system from the beginning. Originally


The files created are Rsallzip.exe and
! January or February 01 release was the
i i
j
IVipcode.hms. When you run the exe, you get
1; only version that could run with an existing your choice of which states you want to add one
ipuLer to hook up to the satellite system. These or all. You choose which ones, hit OK, then just
H add-on boxes ended up working with only entei (he zip code and get the city name You now

n oil one out of every ten computers, So they


i
don't have to ask she customer how to spell Kala-
Hi j.vc been "’finishing" testing for USB -only add mazoo, or wherever they are from. Something in-
m sixes. Since these are always connected, they
I teresting happens after the initial installation and
constant assigned IP. i
running of RSallzip.exe. When run again ii wants
In nine franchise stores for sure, maybe in cor to connect up to (he Radio Shack corporate server
,
*
»ie ones also depending on the of the
intellect and look for new updates. When it does, it gives a
-in igers and their location (i.c , broadband op- basic store info screen that happens to have the
' r- ;
uw ner s/manage rs have tied into the 2-way server password listed in plain text.
II i
io access the Internet for their store s In I hope
have shed a little light on Radio Shack
[

connection. They do (his either by use of a doings. Also, hope all of this info is correct. It
I

Mic computer set up as a proxy server or with may dtffer between store types and stales.

Spring 2002 Page 55


.

iou. CT f>M-t4 or sutrsciilis; via Paypa) on our wvbsiie at


Happenings htip^/w ww. Ei com-tech.com/.
MACINTOSH HACKERS can gel mac underground tiles on
all the
KfifilSTRATlON LS UNDERWAY FOR HZK2 - the llh HOFF]
a professionally published Cl J. bit) Megs of PURE: mac he/ Eti- f

conference. taking piai;;; July 1?- ! 1


. ''OO? at rite (lure I Pennsylvania
dud&r ihc Thdcon 7 Macintosh whole Freaks security speech, the
in New York City! Admission for tlve entire weekend is. £50. You can
www.2600,com or send a check/ money order by
M vdiJtq«h Archives and Whacked Mac Archives. S25.00 USD will -

(Agister online at
ship intemalionally. Secure Mae. PMB 310. 6(70 W. Lake Mead
&TM& 260Cm2kZ VO Bos 752,
nr Island, NY 1125$ MMe Blvd., Las Vegas, NV 89! 08. USA H;ick from yotir Max:'
USA. We' ve si cured u special conference rate ai the hotel of S 09
[LA RN LOCK PICKING lr' FAS 7 wiih our new hook Learn
1

L-

for a single oe double. Si 19 triple, 5129 quad. Call 212-7 3.6-5900


whut they dofiT watd ytm to know Any security nystem can be
and ask lor the H2K2 rale. i
You niigln even be able r.o find cheaper
b^aicn. many limes right through the front door Be secure, t.eoni the
rates at bore discount sue. on the net.) 'Lhc
I Hold Pennsylvania is -

secrets a ini wtnkncs-. of lode; s Ilk k If you Waul U gel where you 1

easily accessible from anywhere in New- York City it’s directly -

urc not supposed to be. iNih kmk cmdd he yum auswer. Explore the
across like slrcei from Penn Station on 7ih Avenue. We've got 50,000
en^pbwering world » Im. r picking, Send twenty bucks to Standard
i

sijimre feet to play with and we have lots nl' plans, for this massive
Puh scan ms, IK') fhn\ 222bHQ, Champaign. IL 6i 825 or visit us ui
I i.

space more than 4 limes the space we had fur Our last confeivuee ll
www.standurdpublk'ulions.com/dirtx'l^l 6A0.html feot your special
you have an idea for $ panel or pre^entatiofc, it's not too late! E-mail
price.
speaker*. (fr h2k2.net. We're also looking for participant* to help us fill
this space with interesting projects of all ?kins Inuhnlliu; computer*,
I < >VERTA CCESSCOM, An ml me tiQUIPMBNI and SERV ICES
providing vt.'U with ihc physical Lind records access you need!
robots, artwork, etc. Email space L*ld k2.net if you're interested in
OVER 1 50 TELECOM MANUALS are now avaiiahle online Ebr
helping us fill the space. We need a ion of volunteers in ell areas; to
free vicwing/downhmding at The Synergy Global Network's fully re-
make I his happen. You guessed it: volufllfeerst ?h2k2 i
rtci We will
designed website Most bciup available in Adobe. PDF format, Ihty
also have space who lime things nf interest for
For small vendors
lire crisp^ clean, suitable fot luinuny. nud L-uinplitm Update your
hacker*- H-mail vendors I#h2k2 .net to become part of that. ]f you
wuEitto lake pan m online discussions focusing oh the upcoming
phreak Library now heteure it's loo Jute. We don't know how long h ts
i

website will be allowed to distribute these manuals, however they


conference, join the H2K2 mailing list hy c -mail mg major-
dome W? 2 600 c on and typing ^subscribe h2k2" on the lirst line of
, l
are yours for ihe time b<ing Our website rv free and upen to the pub-
lic, and require^ no purchase of any krinl, a in! is also ficttr from pop-
your messijjgc As always, check www.hopc net or www,h2.k2jtei for
updates!
up (of jsv|> under > advent sc nteu t? as well. PAYPHONE SERVICE
I HITCH HACKER MEETINGS. Every second Sunday of she
MANUALS TOO! Visit usontine ai: h tpr//w ww. synerrg ygkib n Inet
i

works, co in
month 7 Klaphek organizes u meeting lit the meeting pohtt of the
centra] Motion ofUirevhi in the Netbeidandji.Everyone interesnsd in HATE MICROSOFT? Or dp they ju^i je<m loul afiertaste? Show r
;i

\ illt <!i ss,i.h sfiLi, ion with s “Calvin peeing on Microsoft" slicker.
1
i
!
hacking related subjects r welcome to show up. 1 bese meeting!; are
7
Sticket is approx, 'VI" tuid his nicely sn a ciir window or even cm
similar to the 2600 meetings. We meet around 14 00 i2 pmi m front
of the GWK
office month!} We hope n> ree you there' More info the side of your favorite *nix box. Each slicker is mack: »l contitieT'
cial grade vinyl Wnttr and U V ray rt-yi-vtcmt. To itc* a iurmplo go Id
Mm (v iuundai wwu^hphcluil/inedm^hlitiJ
hz p i^calvinhtrtesmkrosofl-hy permart.net. V-lK) (US l, SiatKNUS)
SAN FRANCISCO OFENBSD USERS GROUP now meeting - t

i Mice a month ui the Zephyr l ’ale. 2nd Tlimsday U<r iraf. see lor international, fhder The l alviri sticker cmd ttic MS loga is yours
hup ://ww w.sfbhug.or g .
free. That's THE MlCROStjR LOGO IS FREE (cat th^t one.
right,

SUMMERCON 2002 will take place May June in Washington


3 1 - 1
Hill; Send ulh widens ^ CD May ne, TO Box 57 791 Murt ay, Utah 1 ,

DC At the Marital Renaissance im ‘All Am; uiNW by Gallery Bface. 54J57 LISA Ca-'li "i tnctficy orders only, No checks, credit winds., or

for more info, vt.su www:sumn>cn:ofl Qig, r


COD. Allow 2-;l weeks for delivery via USffS.
BECOME RECOGNIZED us the backer, phreaker. or computet
for Sale guai you really are. BROWN TEK COM ha& wide selcctniui tif

clothing and gear especially designed for the computer uudc^runml


FREEDOM NTlSfE, (he feature-length 2&QO documentary. is From our tOousdjte "Blame the h6ck«s^ i 'km fjCrie*, to CbffeC rnugx.

now: available on video! See the adventure unfold as we try to gel to t> > tihils and i iiJcopl. BROWnTI K COM has wlial you’re kicking

the bottom of the Kevin Mitnick story ,md prevent major motion for. Check as oul!

picture from spreading more lies. Available or VHS iti NTSC tU.S.) CRYFtO OUTL.AW T-SHIRTS* Govcmmenli around the world
Innnal. 12! minutes, Send $20 to 2600. PO Box 752. Middle island. are turning innocent fictjple into crypto outlaws. Where will the mad-
NY 1953 or order via our online score at www.26t.Kl com,
1
ness end? Cry ptography may be our la^i hope tor privacy From
REAL WORLD HACKING: Interested in rooftops, steam tunnels, Ciirvedspacc, the unofficial band qf anareho* capitalism. Get yours al

and the like? For a copy ui fnjdtnjrion, the one about going places cu rvcdKpacc.org/mercltandtvi: .hi n hi
you supposed to go, rend 52
re not in PO Box 3. Suction E.
Help Wanted
1

Toronto, ON M6H 4E| Canada ,

MAKE ANY SLOT MACHINE PAYOirT 2004B0 oudiis Works


r
on KYJ-s machines. No contact. Also available, blackjack con tilers. UIRtNG PROFESSIONAL (\TCR.\ETC01VSlfL'fAiV IS' wilii
E-mail rocorbalJi tl’atlamiceity 1 , com if you want to discuss it luifher. joh references only for the follow me; Wi.'hsiie sccunty, pert'ormance
WWW.PUOTEO-ONR.f-OM. thotect yourself Everyone has a I and marketing for online magazine. Please send your bio and
Uj ning,

need to be and lire! safe from the outside world Wc carry full line It
resume lo: j hftarts worth t^yahoi i.com -you can work front home, but
of self defense, security, and surveillance products at k>w prices, should live in lor around) NYC, ;i' you will need to all end a incding
I
;
v from alarm* to mini cameras ro relescopie batons to stun
try thing or two.
gum- and more! Check us out. all major credit cards accepted, Wc NEED ASSISTAN L ’)'
Ip re sc uc/rr:, -.
, . ,. ASC II levt data w h ich urc

ship worldwide' prcsemly comprossed/encrypted by some tyi>e nt commercial pro-


CYBERIBCH TECHNOLOGICAL SURVIVAL NEWSLET- gram. Most Jilc-s are rather litrgc, from 30MB to about 600 M B U
iEK: Bimonthly high tech and low tech DJY information urs self-re- irrg, DOS based search engine for iclricval Please advise if there
liance and preparedness edited by 26<X) writer Thomas Icom Topics exisis .my u.n>1s currently available or anyone who may be ut' help,

include con nmi nieatiiwis, scent ny, weaponry, electronics* alternative ioh iidp4 @hotmai t emu
energy, survival medicine, and intelligence operations. Send $12 I NEED TO BUILD A HIDDEN CAMERA SYSTEM including
cash or “payee blank" money order to Cybertech- Ptl Box Mar- ML sound on a brested budget to take wilh me on my visits with my

Page 56 2600 Magazine


" i 5
- 1 1 ^ 1 , I •

• l
lit} in order Id prove chat everviliirig is going well i
J
k'i5 Si e- mail jiisoti I). Ijumn. L-sii (<i02) 22 -t ’YBER (222-^237 1 . I^umn ^s: Assa-
.iny recnTntncfidjiionif Iit love pu ise f4‘ y iihno.com> fax (705 330- 1
emtes. 5d>(J N [|t^ r plxi i-, Suitu 12. ITioenix. A/ M5uf4. Free confi-
M256. dential and profess 1 hi .d c.unxu] tation
I (K KSMfTHS: am ! in need tit .1 keytnukef from only a piGiuru GENERAL PUKINJSE EMAIL IDENTITY AUTHENTICA-
H .hi penril sketch ovcF at" u key Pending on Eiming and kucrdran, J
TION SI RVH I lor use Ftotn CGI programs. Legit muire uses only
i .i 1^ able to get ihc key far a Saturduv ur Sunday .itiei rmwi meei-
please http: ifr pjar. cu u id icuoy ±.f I'J A IS. h t m
. > I

irig. I am i n Kenosha, Wl, so 1 tan only go to Milwaukee or North


1
hi', -ago for meetings. Please e-maif ;ii M Rterif M ^hotnuii
i • • tom ill
MJ3i l NDERSTfM >D II At KERS UNDERSTOOD. Write me
" Cornu Itations are no charge, and proLectod by clergy /chem in \ ilege
make
i

ntr Jested, (he subject 'keymakcj


l
r..i ined (elec am A elec! r a >its i i ec b hi Sy I s-lj riday tr tec ti ie .m i n

Wanted iOMPU TER SIT'D HI FY7SPY. Is j hacker in your computer w


network? Do you need a spy" (i call Jasor? Taylor nt i50i) 2 3d-

M3 U [ I OINK \L II, LUSTRA TOIL I'm anting a book mi sr- | A | po.' i Li: id .
( 3 1
. i i icpj i ? ic - pre 3 cn cd sb(J f ii m r or c 1 iaj

LUt iK eiruMmeiirkm. lock pieilinij. bypiiij, safes. alarms, and oilier i ay lord 1
1 n>: :. art n.i. oo 1 1 1

nhjects. I need someone expet tended nt teetiiiicsd draw mg 1


- laureate
iirigtiinl the Uai-
black and white illustrations for my hook. I live in Announcements
las-Fort Worth artji orTwCHS and would prefer snmei me of college
.ige nearby although we could probably manage long (lista-wcc ec>1-
33 IH2D - A WANTON DLSpLAY OF CONTROL AND DI^RUP-
tatauraitvia Ttiv, till be unpaid far both -of UdVd the Kiok .
m J'tON, W [>r "D is a h,d! funis radio -mlie pwxlut't-d by n small group
acts published, at which poini we'd split the profits equally I intend
ni otherwi.se uncniploycd individuals w.»l)i roomluls or old rc-cord
in nfter it to J iriiiiipnnfcxnr Delia Press, and have every k.-orafrc.km.‘.e
nigs, analog .syndic.-.. Air a. and racks full oi tiraoiM dcirtronies gear.
i
hui hey' II warn to puhlish I ti. Flense cotiUcl sue lie

:V il[_ud<icfcer^yatHi(,>.L ojii if
,

inlet esied!
Burn out oi the pirate radio scene VVEX'1 3 Lars s
r
xi slier! in various
HACKERS WANTED IN PITTSBURGH lortns on various imouthori/ed tlM longer rhim any

-
I I \l Al l ftw ;i study raiiio I'ru.iueoclr' 1

'd die h-: lid's, bdutviof. and culture t>l computet hnekcr> offer 1 of Us cur* io recall (nr want to .id You can hear W[ JCI J every
run to.i

mpplete tordideniwlify. I pay 535 i


;>r an interview have rtn con- 1 Friday at fj:,ifi pm ET or 74 15 KH/. shortwave ami on other rundom
nection with any law enfoiveiiient agency. I .un a professor t-merilus trc^Lh: lines 1
1
yi u dun i have n shortwave radio, you'rv mi wing out
ueLired professor hui i S a-ttmin in [elicit unity ueiive I have clone aa- on .some imtnwiijig siuFf Chock oni orir we^ile fra itiprc intsTFiw
iul research for mans iteeaJe.H and have published many articles anti I ton: hripr//www wikdradiG.otJtri. Verified WfXD listeners will gel si

tout h.ufks 1 win it to jniblish ran article ihn will gs> c an ncctirate, true mu prise. WDCD Radio. M4 S tfth hi 133. PhilrideEphtu, FA
' L-.LSoi’i:jb[y ityrtiptuhctii- pkturc of what hackers are tally like - r*n
wi k d
i

I y I -T? 1 21 5 i C432-13 3 25. [


;

\ nni I nruiil i :
ud ti > cran
•v ntcwtish. m> journal Kuy sensalmijahsm, am) nu law cnbjnctmteni
H A KEkMlNJL Tune
I

( in Thuixdxy> at |U pm 1 .
by Often ing ora I

w
1

hype Make un traceable tekpliaiu: call to 41 2-34 3- 35<>b >i:nd un


irnii-nbk e-nuil rebury lekiLima.eraii
ijojj Tj 6 23. 4S. Sft'JHtd iviih Winamp or Real flayer to hear f irteker-
irtcs.sa.HC tn hi f ciimpl vied 1

interviews so far, .ill with men I am told that there are women hack-
mind, the straw fra- using an ihe-opirsicins rd ibixse m ttie hacker
ers but so far none have L-miracied me. 1 meet my respondents in ,j
isiiBd. For 1 lone detail v, check out www h«kenmnd. net
i Lsblie place. so far mostly ur Srailiuck-. coffee shops Van vein leant OFJ 1 HE. I I(>(>E js (be weekly one hour hacker radio shov. prer-

about me by doing Google- scorch for Hen. hard! I,jetnf rmai sgnted Fuesday mglus S;(K3 pm FT on W HA E S53.5 EM in Mew
KIDNAP PU) BY niflSKCRET SERVICE* charged wif.li York t n >- Yon can also tun m over the. net af
i
NAt THOMZRD USE OF AN ACCESS >I£VK my comput- I
i .ill ww w.2N HJ.con doff ihcbook nr on shortwave m North and Souih
ers t onli.se atcr 1 .

8 years rumaming on sentence Fatbel nl bwo sei k Amt' lie a ul 74 5 1 lib/.. Vrchives. •; all shows dating back to I ‘IBS can
mg Donation of K's for kids, "Both computef savvy bur now withcml Ik- found ill ilk 2600 site, now in mp3 I'oirmit' Ymn feedback p, we I

uirdwarc, software, c-n Am wjUbj! in puy sbtppirvL on domaicd 1

s ome at oihif|f2£kKJ’.i;i,iiii,
PC’i, software, And peripheriify, ii nccessini'v Cornuct me tor ship
plfig infn Mr Darren Leon Felder, Sr. 4 7742-B6E L.'nitcd States
Peishem iary. AttiiUtL (jcodfgki. Rax PMIi. WH MeDunumcti Houle
Personals
v,ud. S.E,, Ulantu, GiHWgNu .303 5-4400; or e-raail me at higdur- 1

; e n 2 Or"? [ # ya hi to .corn, S TART INGA HA VOR SI TPORT GROUT :md need piutfedpa-
I I v t k r ks : i ii ;a i t i i a i t; k t - bra/ju a n aD co w lioii from cxpciicnced and mex pinicnced hg.s^r?, ( ernt kci'i, nod
| t >NC 'FUNS; ftoswilS cwRfe. sheep. ,ind goal jurat ;uid ;i5s<>.')Mcd phrtakers. H yuii wmjbJ liken- join this FRTL wrvtye. write nte m
praditel.ii f dairy r>r* .. I li.c tsi i
fixer- he cm hitrliFiM by Canada sintit- Febru i he Addrc^ below. You may be ..ivked lo search for information oji
iry 7IK1I .itrd tJie t.
1
£, Depajlmoiit of Agrivuiiure US DA ' ti-JX re ( he 'net t' aisiiiu others with lesri cvperranic tfr .submii kqpw ledge nit
• Mil ivd the imputation nf runiEnani products limn Kra/i| ftfket (ttdiFisqucs you know ALsn, isKiking for poliiicul views and electKtpii
d 2001 bjBCiWjtse c»l enneet ns for bavitic s parte d'orr n c n-
,: v ti 2. pn>}i*vi!» well is itkias tor bat king to; . magazine I am starring
phalapaihy (lSSt:i fmad cow iti.m?asrf). USE is *t1w;iys fatal after tl
Write (o me at: i.iiriv flcaiti WheeDf. Ki J Box 150-8175*32, Fort
I'.tss away in lumen bra tit [issue Ltmi leaves sponge t 'ikc
:
li
J
de Boy SiiKkUiit, Tcufu* 79755. Ail inquiries, will be unswered.
oti Bnuii is iifjeniptme to help people uiKlersurnd the Bov h-m IMPRISONED MRUS W RE FER. Tbougfe I fern still a novice ai
1-ivl caw " is.-. lie. It ist wenlial dial AI S COUNTRJFLS suspend the
v : i ii - tciimoJogy. 1 do wis h to become more I.bito IcDgcable through
of beef and dairy products from Brazil so the Bra/itiiin gos
-ii i|" ni •

i irrc,spi mdener with skilled ^ a’us writers 1 will gladly pay tor :•, ocb
erumtnl rnay prove svhai is htci und whui iv fiction, ViAtt the BoycvHl
Bmjjl website far awfe infoirinaricm www hriizi lboycott.oip. Dank McAvcy #64A26K. l Rl. I |Jm \ 50, Tennessee
Colony, TX 75HB-1

Services
ONI A Slim RISERS AN < ADV1.M1L51 IN 2SQQ! Don i
even
M SPECTED OR At * I mn OF a v ItERCRlML ts ANY
t think . -mlh trying la lykt- out an ad unless you subscribe All 1

ails are
t VI 1FORNIA OR FEDERAL CfHJRl 7 Consult with semantic a. litL :ullI there rs tlo iimciiini of money we will accept for a non .vuh

an iur Lruui'nittcsS in the Eihcratioit of tQjbnnatkm spCLrudF/i ug in scribe! ad. Wl- hope mat's dear. Ql l. imr.se. w* reserve ibe right to
K'kvr, c nicker, and p ireak He tense. Contact Omar Figueroa, m p;o.% judgment on your ltd and riot print ii ii iTs niifuiyjttgjy .sdipiil or
'
'Sili 5 59 or (41 5 9X&-559 at omar<& aya.yak- e Ju ai 5 Uft
hu^er world We make no guarantee
'
J 1
j ' .

has notliirsg at afl u? do with the


•idw'sy Sjji Francisco. CA 441 ^3 Lice pirrsunrd consul tiition for
as in ihe honesly rightciiusncs-., sanity, ek of the people advertising
f 'i 1
renders AD consuJ Ilians arc stneiiy confiffcntrnl ainl protected
hurc. Cniuavi diem .u your |>cril .All subinissjous are for ONE; !S-
the attorney-client privilege,
m
.

M E R C V B ERf Rl M PROS FT SU L (J N LY y nL W'lins to run y our ad more lia


1
mcc you mi ist re 1'
l
t Ht I 't FOR now de fends those
1 i

:Ati gated been on the submit it cikli time, I'Jrai't enpec-i os to inn jijs.Jiie tluui ran: ltd fur you
or charged with thj* type of (. rime. Has jriy

h •sjBe know how the system works' and how the govern
I inert!
in a single issue eiihei Inc luck your address label or u phr.Hfocnpy so
at tiii'pcE YOl With pro 'Cdtiior? probably wanting yau to serve ’ wc know- you're a subscriber Send your ad i> 26<ii i
Markelphicc B 3

n turn you need a proven veteran n ini ahomey who knows


i- Bov 99. Middle fd.ui.l. NY 1 195 \ DcadEme far Summer issuer
h h.intflc thew cases and who knows how m defend your righ»s h/L'02.

Spring 2002 Page 57


A . . ) m , i m 1 i -

ARGENTINA ITALY Florida New York


ItUn'cios in ihe ton at Sin Milan: Piaun Laielif in IrLiiki Ot F(, I-jTiimli’rtiijlc,' BuwnnJ Mali m Buflnln; Gntlcri Ik Mj|| luod GoUri.
Jotti-flS, McDeitkiSiJs. > iJiy court by the paypnonca,
fiaid New y wrk : (.hiijitiin p Ctri ter. uythc
AC'STRA CIA MCXirO fioittttliitr: Ahrde.- RevA Su.a'e .
j.;iftfty, uLar me po:>ph.pijffSh
:

ist.li
Ydc-fsiRlv: Gw side Ihc Deli on 'ih!isk ii ,
City: SiAbvvay Mj- itfe'e* t 1-7". .v/MSev, Ik-rry
L.
r

53 fd Sl,. Set wee n Le v i St^Loh -V. .N lJ

Pullency • :-*i.*n*iv-rly Sssimiv> ti.vp I l ine 2 oi i lie Mctsn . bJviii line Ottilia North Cartilmti
Snack nea> the valuer of ,\i the ‘

1 piirtaihi'ijio (teil D^biW Atlanta: Lersnu \! i! loorl coins


Clwilsrtlrr Si'uih Park Mrtlfj uppto
Gsviifoll A'
j
r iT|h-Bc:y ftpm. F'crJe'.,]]" e>: it .
i
He payphones A ::7 pm .

j,i e.j L?f food LUtiri.


Mri>hLLi!f: Hungry JdL'k:, ON the Ihe candy -.hop, at the begirminp i«l Hawaii North DhIiIiLu
Queeo Si, Mall IKHS. np3.T03.1Ee Inlo ihe "ZiK-oio-Pi nu Suarez '
tunnel I Cnjfee Talk
loni d u I u : t. .tfr. WJl
largo Moorhead. MNl: .“nter
M W KKALAND
1

1A I >>! h I
-
7 pin, WuhlIjl A vc Pav phono 02- 1

Mall (ohplI coiifr hy tJiU tlHLiitaLts


OmlHimt: KC'v Virtual Reddy AuchSuxid; LontlnTi Bar, u^Laiiv. L
>1 S4 ftps ri
Ofak>
Calc II i.OSt KVC 1 "uv n. .'pm Wellesley St-. Aut khi»d Central. Idaho
Mu thou me Me Ibtrt true CiTiET.i ; I ARJ pm. IAh-uxcUu: Ciilk'^e Market, ftii-3
Akron; A min ex on SS. Maikei
Shi -| v;n n Cenlic
ir. || tit: .Swojrvtnn t lii isl etUkCLh: Jo vo £ ‘:d>. i.-nmer rtf South Sth Street Si roei, internet tiari of Hawkins, W
SilCCt cnlrTMKr Ik: .LI I he fMjll I ill
Mi oh St. a.oi.t Maiichcsier Sl ft pm Qtthris and
Mitf-keL,

ph<me:s. VV ciliTjgtijn: Mpiphy''i Bar in Cuba Utleagti: Stanon In iht Ution Cirrin mli: Oody's (.'VtiC'. 1
1 1

Perth: Ric Mu rCwrH lea ;miJ Oyl MtiSh V30 pm. Grejt ICdt [L-esr .ihe payphone v licnui Si., for. hack rritim ft’ pro
(W House, 18.7 Murfuy St. 6 pm. \f mww Ludiann C,f vd'land f Bed fund); Cytier Pete -

Sydney: The CfyAiul Foi- t, front Oslo: Oslo Septra I I nun Station Evansville: humee ;.inij Solve t-afe Internet ( r. ftft.5 Braid ms;, Ave
hat '
si jo, opposite fbc Inis fitLiIiflH
7 pm. al 6^4 S Crrecjn River RJ. CtvIumHus: Cvnventiun CcttiiT
:uvii an CiLtnpij S trcci si Central I'mndEieirn: Rkk - c afe m Aix Ft- Wriyne: Ol Clkbi m k Mali feext ••
i downtown) basement, far bad of
Stuihiti, ft pm die "ate. ft pm. court m hunt of Siwrrt'fi,: 6 pm bu'floillg in 1‘aipeted pav plirtfie JUVti
A l SI R] POLAND ItldliiliapnlhL Hordeix S.kjtjkH- i
.at
7 [jrn.
(im: Cafe HaLtcstrUv on l-Ao- ^t;ii-iiarri S/c^dnAls Ail <. al'tc ihe eori'HC Vises 1(1,: I! Li:-:.:;i
:

Dapun; At ihe Marions behind Lhv


ttklniiplnfr,. Unn^ blue IxHrk. 7 pm. WnsJ linyLtHt.
1 ':iy Li.ti M.ih fNli
BRAZIL RUSSIA Koovsi^
ft

Thu
OkLtiiPm:*
Bela Hnrblknle: Petcgo'i- at
Mo^tovt: Bkkigor On^eii ejie .o Kansas UiJ lOn’rlund I'urkl:
Hear the payplKWie 6 . pm T-M</J .-\M‘ {Telephone Agency ol' O&k :
‘..Tk l-i ! food llhiii
OklHbomu t i?y: Penn Square M il

CANADA Hi the edge. lllo hjotl ...it by


kiis»iiJ’|..:Legrr,:ih Agejiey of SoVid r .liuhtiaita
A lllerlu L.'iliiini u&tk klK'WSk as Niciivkie Baloii Rouge; In die LSI Union PrCJJtel Ltffjjf:,

< tilbury; Ei.uu Claire M. i'M tood VoLtrra :


veer !tie Tijtrr Pause LYiIki: Vl'wdJand Hills Mall fiXKl
Ci.mil by [he hSaml ydjuw wall ifitf
SCOTLAND A- Me Pqilah |‘.y Ftest to tile pti>- Cnurt-
iT^erl l rhe "mil-. • all 22's> OtV.gim
' 1

Glmi^kw, Cental Slali'in, pay pbf ’fteS. PnvpiKi!!e BuifiPCh. :

f’tlrmrol ijn: Etlmoi'ilon. City Centre pm. Portliind: Pimintf Place Midi i.mk
pt^SLIO . ,CSJ i
::- [
'
r I
Mill I 7 387.-5420; -y>l% '!?%$.
LuwjBlf VVv-sl in rite Skid Li.aH
l
SOI I H AFRICA 97J5 Platte er Squibroi} .food cuurt fi pm.
hv Hi.' [wyfitnines, JohiirmrsliuTE (StndtiM CtVy'S: Nt-v. Orltiums: ? tliinWlioTi Qjlf^ie Ptiiuvyl vania 1

Ciilmribiu
llrits-sh
S Jiklt’ ns Slki k! e( ms ft: ? U
p H t i
I >i I’-te, 5:' j5 G ,. ; i;il
;
5 ;|
. d .
.;
,
pii PhilddHphUt: (tHi- Screei Suitniin
Vuncomw; Pacific Can ILL FlxxI
SWEDEN ATnSno 4:mg
foovl v'( v r t. wji-ttLin
1
. fl: i

Fair, i.tic level l<. .- wti. |‘Htn 0 eel


trtfvle: Rniiiv.;,, : strtirm ftirttawl: M»i| hy tlw bench Pittsburgh: T
-N‘ i.PJ Ian Pin t Jniim
level by jwyphout^s 4 pm to 9 pn i

GNITKD STATUS Ml the .-- cr^ut door 1

bulking Oil '-ik: !


i bersiiy ot Fill*
VtcinriB: ECiltm Cfrdei food tour!
Alabama Mnryluiul i
urgii xunpiv. by the Blgelnw
hv AifeW
\uluirtt: 'The student loumrc up- B.ildimirc: P.m oe^ A: Noble bait jU
New HiUJttwkk ifonSfevtnd e-nt mire
.-tiiins >fl tin: J-’f,;. t:niLJki Building. the liuier Harbrn
i S i.ntci i.mi r Ground Zero Network South Carolina
7 pm ijfefflprh useti .
NW Maui St lismiimKtimii; HiX>Vflf GaUftis Boston: Pnj.kbtiiil Ccntci Phubi.
Cbuilesiton: Northw^pd-v Mull in

Omar in am by payphones ncxS rtuce fw :d n tin hull fend 'rve.fji Sc , 1 - anil Chik
l
lx hi e Tilt ft> , i ,
L i il ; 1 1 ie in ! i n tjwr
Rurrie: Will UtiX Coffee Pub. Fil-A
Wirridy'.H. 7 pm d te 'veil hivvw^
pm; ,
7
Rryuc Drive. 7 pm. Sou Elk imkrtln
IksCdhtosa: Me Par I ^.nd Mall fotnl MiitrlborougJi; Srdo’mnh Park Mil!
ILndltnni hicksi n ^|uatc foofl Sioux Falls: Empifr Midi, hy
cmill rtttn the I'nm, ..'.nlrarrc; i’lxk] eoiiri.
cmiri by payphlwii. ml Burger K my
Arixoad NorthnoLpr^K fiiVLutei i.
-.!e acRXvi B-.j.;ger
King. ?:3p pirj-
Icmpc: GtiS'],: Wdrfc^ trt Nrimaik. from Folaski Pack. fi.r-.nvv-.ev
Qiiwei ECmJujs Bnuks Cate
Mills; Ma5 1, Vijchigiin KnoAvilly;
Mottimfr: H. 1J AmpbiElf.ilr:.
Tucson; Ramev A Nuhlr'.. ' I 30 E. \nn Arhnar: Midlipim Lhiiow (Uni "iwwihA fitim ^stown Ms II
| (jflO tiaucheltere Steel.
rtvSKf vifa v. vcmiiy of Miehitjift.. Acikvr AtempblS: Hi, A: Noble. Ifkk
DENMARK I :

Arknsajr Riwul
u-.:.y

\iir+usv: ! :i the Or , ornir M tfctO-

hmvsJjom Mull (fraud Rapids; RiYdUhiiWi Crciss-


nry RjiL'p-.M-nil,

P-S-fr cafe m Lite f ad Way ^Cjttiop


I uJi-; i'ljevI etfttrt
Nashville: i-j'fi. Market, 1912
by Ihc ht£ wincUnvs ingi ;V|;lI'., vaeohd (eye in the ftn-xJ l
Hr uatlurjiy.
Cupenhagi-n: IcrrmriaiNr iriTiuL
C^lforqfei eourl.
ctJtiriimpwL'.. 1 1 !> Shi.Tjip.i ill Cl nier. 'HexsHt
Union Slat :nn. c.irncr
.utAit^lcti: MliuWsotn
ENGLAND I
Austin; Ekshpe Mali tot >4 touri
of llaey A Alameda, fende itoiin HE,Mjf3ii!lfftfi)»i: Mull AmrrieLi
Rristttt: ftejo to !oe OrHnp.e .aid
i t"
Dallas: Mattra'9 PtefcU, CamjibftU &
eatmnCL’- h-. hank of ptii^iic Pay noriJs '.iik
1
i.:.,-l .. :ff. ac-ioss from
gTC k ppl phi l
ilLV tippOSLtL Ull PripstriFk. 7 ptn ‘

"Gsmib* siuro. Merrhinl Street phtjn.es: S72-Y5M), >)52fS: 12 S3) fiurjter isiirtp * rite Ixink of pay
'

Uou-fiin: Cttfe Niehblaif in GailcrsT.


62 ?i ~'Vm. 9924 ft 3^7 04 974ft 1 . phones that don t r'aL.r- i n: -: r-r
r- l r

Pay planes-
.

ttro:i fire end, +-44 II" 4


vi.i> AntonRi: Non Ik Slai Mol) !a>. 1
9299011, 929447': 7-V' in Omits;* Ciyrnty llpspona Niguel jt ca.IG.
|

27020 DulidU; Bumye Noble byCuh-i utiurt ft pm.


hint CpflCx, Alicia A.
Hull: :
n rh* Old Guy Mane puli,
Chili
Lippi mile The SJikih.ee saijr "I Hull
P:iA:w:iy, -Up. 7 pm
7 pm.
San Die^o; U^ckliaV Pi Mem on MLwimri >,||( Lake C-irv: /t
'
11
Midi ill ihe

ReipeviTH Road iMmv Shoppirt" tvailMIJt City lEidL^cniltnri): lclsJ L’uun i Lear Zion's B jll k.
I.Cfds: Leeds C'ily Lra'ni .fljilkltl by
Malt? Bimcs A Nvhle, I9t2tj Eavi Vi-rnmnt
the [lay partita, 7 pm.
Stamping Suri Ir:< tWJsefj! j Embareuckf'.i 49th Sl. Buihpigton: BitrtSei:. Bimks .it
Li union: 1 nxsi I eii^ Cl-el-
1*/:a ii.iiiidej. (fetyp hones: 1 4 S E i Sl. Lnuis: £ iliena, Highway <* (t Oiui'di Si. and Cherry Si bn ihe
ii-< •
near Pii-LdflEy CircilM, "tovveit i

level. pin,
3^4 ftyAL. ’
jxi ji BffiJilivtu id, Hcvjited wi tmn, Il'iilI see L-.ru L Koor III thy Late.
7
Manchester: the Green Rjoffl n •
Sun .lose {€aj?npht]Lt: Orchard iXHir! a am. h L the ihuuiets 4'ifgmb
Vnijcv CtrUL"': Shjjp-Net Cafe on the Springfield' R.mn; lV N il rtH Dpt riel of CnluinMa^
WhsswtjHhSiimJt.? pm. fsii-

S+iulhamphxi: City Center lil the l tf me r tif S <7c >': ;l Avc iind h Battlefield ik-tQS,v from tlx .n-il
WashiivgCkri
CumpbeJ! Avi; 5: jo pm.
InEcniei Cafe in the Eajr^ate^ ” pm. Seattle WLLshingiitn Siait tmrtfii-
IRVNtr .Sstnta Rnrharg! Cure Sicnn um Nthrunkii
rkjn Ccnii. tor fioor ft p:;?
Purfs: r-'i-iLc LS'Italic- XIII in front ol State Sireet. Om^lUi: O.j.S, V'rteA Mall Bamov ,y
IVjsLuiHin
the GtatnJ Ecrafl Ciiitnua. 6-7 pm. Cothnuto Nobbc. 7 ].nrj
MmtHin: lluieu? Srtnth i'727 N
GERMANY Jitndder: Piilty J's feed covfft, 1 3 l£: Nevada
RilIuMI Aye. t Oh ihe lower Levni in
Knrlsrrriu:: "OLJ Dtihliii Irish arid College. 6 pin. I aft Wgftif: vG>w Superstore- CaJ-.-.

f.'tinncrtiLUl Snkare A Dnearuj-. B pm The Marlin l.uihCT Ktn^ fr. Ltaingc


IAjSi, Kapdlciiiirai^e.. Nessr puhlir
Meriden: Mcsiden Square M«ll Ncfi Mexico
i
v the pay plionov Pnyphouti:
ptroae, 7 put,
GREECE food court ftpm, Albuqyvivjnc: Winrock MjFE food 75HWC
Athene: OutsiiJe ifw kwiCsinre Pn- Dislrirl ol thiluinhi^ cotirl, nc.ir pjLvphoncv lhS ihe lower MUwuuiiee Who wslosafr Shiy-
(

paswsjrifm ini the otH'nek oi'Patisicu] Arliihpttmr K-iHbjj;<j«i Cily Mall in level ftetWijeEl die Lbual ;lin & i.iir Mill! fin Hu HMJ A Nfrn Ave li

and Siv>um;i:i 7 pm l he food Crtmt 6 pin. urL-ade. in Rnurii f/l llhvG! jG- 6 pm.

All meetings lake plocf on Lhc lirsi.. l-'rulay cit ihc moniii Unless oihcrwifitr nr«i:d. they stan ut 5 pm loco! Lime
r*i star i ineoting in your city. leavelj nic^sge & photic number &i (641 ) 751. .1600 or sond email lo n tcc u gs tc 7 600. vOm :i t i

Page 58 2600 Magazine


unsterdam* Increasingly hard to find, this Amsterdam, Increasingly easy to find, this
i
"ik- nnl\ accepts coins. phone doesn't accept coins.

Photos by Daniel Langdon Jones

1
ome and our website and see our vast array of payphone
visit

photos that we’ve compiled! http://www.2600.com


Phnom Penfi, C nmhodia. A card-only phone. Phnom Penh, Cambodia. Close-up view.

Photo by John Bullock Photo by John Bullock

Willemstad, Curacao. A shape and color so Kyiv, Ukraine. I’his rotary phone is said to
rarely seen in the Slates* only take prepaid smart cards, although it's
rather hard to figure out where they would go.

Photo by Phillip Bettac Zoufal Photo by an anonymous Canadian

Look on the other side of this page for even more photos!

Das könnte Ihnen auch gefallen