AOH :: P53-02.TXT

Phrack Loopback


---[  Phrack Magazine   Volume 8, Issue 53 July 8, 1998, article 02 of 15


-------------------------[  P H R A C K     53     L O O P B A C K


--------[  Phrack Staff



[ Ed. note:  The letters are perhaps editted for format, but generally not for
  grammar and/or spelling.  I try not to correct the vernacular, as it often
  adds a colorful perspective to the letter in question. ]

0x1>--------------------------------------------------------------------------

[ P52-02@0xd: ... Something you've mailed to a whiley bunch... ]
 
I couldn't help but notice your use of "whiley" rather than the more common
English word "wily" in the above-quoted paragraph. In the future, take the
time to grammar and spell check your replies to minimize the emotional
damage you are bound to suffer.                                       
    --Bob Stratton

    [ WHOA!  My bad.  Strat has caught me with my proverbial pants around my
      proverbial ankles.  Further evidence towards me - not - being
      omnisicient argument (although I still believe this to be conjecture). ]

P.S. Thanks for the sensible code-formatting discussion. Your style sounds
a lot like that which kept me sane back when I earned my living writing
code.  The enlightened person's answer, of course, is to use an Emacs minor
mode, and to let the editor do the work while one types. Emacs is also the
answer to the Windoze 95 junkie looking for something with which to read
Phrack. Works for me.

    [ Amen.  Except for the emacs part.  pico with regexp or vim 5.0 with
      syntax highlighting is the way to go. ]

0x2>--------------------------------------------------------------------------

[ P52-09: On the Morality of Phreaking ]

Dear Phrack,

I am not a hacker nor a hacker wannabe, so I had only the most passing
acquaintance with your publication.  However, today by chance I came across
this article in your January 26 issue.

I am impressed. I did my MA in philosophy, and I was quite nonplussed to see
such a lucid and philosophical point of view in what is, to my understanding,
a very specialized publication not typically devoted to philosophy.  Though my
areas of interest were mainly Nietzsche and Deleuze, I found your summary of
both Mill and Kant to be accurate and well-applied.  Kudos, you obviously have
some very intelligent people on staff, whose talents are not limited to your
own area of expertise.

Yours respectfully,
Sean Saraq
Toronto

    [ High praise indeed!  Thank you for the compliments.  It's good to see
      we're read in communities other then that of our target demographic. ]

0x3>--------------------------------------------------------------------------

I can't believe you included article 12 in Phrack 50.  Is Phrack really
getting so sad? Have you really got nothing better to publish than
regurgitated crypto babble?

    [ Despite what you may think, we are not sad.  The phrack compound is
      imbibed with much conviviality and festivity.  Why, every Friday is
      `punch a mime day`.  We hire a mime to come down to the office and we
      all take turns punching him in the face. ]

Cheers, Chris (XORed that's Fghyud)    

    [ That's not a very good XOR implementation you have there.  It appears
      an extraneous character has been inserted.  Check your pad or the stream
      cipher.  Or perhaps check your other regurgitated crypto babble for more
      info. ]

0x4>--------------------------------------------------------------------------

For those readers interested in "Piercing Firewalls" (Phrack Issue 52)
take a look at datapipe.c available at www.rootshell.com. I can't think
of any way to make it work with X, like tunnel/portal, but it works fine
with telnet and nothing needs to be running outside the firewall.

ziro antagonist

    [ Noted. ]

0x5>--------------------------------------------------------------------------

Okay, enough nagging about the Milla pics!

The one thing everyone reading Phrack wants to know is:
When will you publish nude pictures of dangergrl ???

    [ When your mom gives them back. ]

Yours Sincerely,
-anonymous. (i get kicked from #hack enuf as it is already :)  

    [ What a suprise. ]

0x6>--------------------------------------------------------------------------

While the Juggernaut program is interesting, I've found that its model for
session stealing is a tad limited.  There are two issues, one of which I've
dealt with.  First issue is the one packet read, one packet written paradigm.
It really should allow separate threads for read/write to avoid getting
easily out of synch.  This I've not dealt with, but it is understandable given
the second, the ACK storms it creates.

    [ Juggernaut 1.x is very primitive in many ways.  Juggernaut++, the next
      generation juggernaut,  has been mostly redesigned from the ground up
      with a 90% new code base.  It has many things the previous versions
      lacked, including: a much better interface, threading for concurency,
      portability, effcicieny mods, and many bugfixes. ]

The ACK storms can be avoided with an ARP attack (or possibly an ICMP
redirect).  Send an ARP message to the source of the connection you're
stealing (an ARP reply) which tells it that the ethernet address of the
machine it's talking to (the destination machine, which you want to talk to
instead) is something "off in space" like 2:3:4:5:6:7 instead of the real
address.  This needs to be done fairly often, should be started immediately
before you start your hijack attack.

    [ Indeed.  As long the host will accept and cache unsolicited ARP
      responses, this will work. ]

The result is that the machine you are intercepting becomes unable to talk to
the destination and won't desynch the session, and traffic goes to practically
nothing.  After you stop, the ARP table will shortly expire and be updated
with correct information, so the attack will either appear as a network
glitch, or you'll get alerted (NT will alert) that an IP address conflict
exists (but tell nothing about what the conflict is with).  Moreover, an ARP
reply will escape the notice of many network monitoring programs.

    [ Something like this has in fact been implemented in juggernaut++...
      And, just to answer the burning question I get asked so often, NO, J++
      is NOT publically available. ]

I have sent the code to the original author of Juggernaut (being inclined to
share knowledge) and wanted to alert you.

    [ The original author of juggernaut and I are pretty close.  I'll be shure
      to check with him. ]

0x7>--------------------------------------------------------------------------
 
Hi!  My name is StiN.  

    [ Mine's route. ]

I'm from Russia.
    
    [ I'm from the U.S. ]

Sorry for my bad English.

    [ Sorry for my bad russian, comrade. ]

I Have a friend His name is Armany.

    [ I have a friend named Gilgamesh. ]

Where do you live?

    [ I live in a small one bedroom aprartment with four cats. ]

How old are you?

    [ 19. ]

What's yore name?

    [ We already went over this. ]

What's yore Hobby?

    [ Volunteering for free medical tests of any variety. ]

Do you knew Russia?

    [ I KNEW RUSSIA BACK IN THE GOOD OLE' DAYS!  Back before the collapse. ]

Good Bay.

    [ Bad Bay:  Bay of Pigs.  Good bay: Bay of jello. ]

0x8>--------------------------------------------------------------------------

Hola, soy Omar

Soy un fanático de su revista, la sigo desde la phrack 48.
No soy un hacker, phreaker, o cualquier cosa, soy más un fanático de las
malditas máquinas.
Muy buenos artículos; gracias por las cosas de LINUX (me fueron de mucha
utilidad)

Suerte y sigan así.
Saludos de Uruguay. South América.

    [ Yo quiero taco bell. ]

0x9>--------------------------------------------------------------------------

hi,

where can i find the source code for the legendary internet worm by
morris (1988) ?

thanx (i hope u dudez can help me :( )

    [ ftp://idea.sec.dsi.unimi.it/pub/crypt/code/worm_src.tar.gz ]

0xa>--------------------------------------------------------------------------

My friends were going to a basketball game at their gay school (Grades

    [ Wow, they have gay schools now?  Do they videotape you jerking off
      and looking completely gay and stupid?  (http://www.leisuretown.com) ]

pre-school through 8th grade). They were wearing their wallet chains,
not causing any harm with them. (It was an after school activity) the

    [ As opposed to those people who have the wallet-chain/morning-stars.
      They are the ones who cause all that wallet-chain inflicted harm. ]

teachers made them take them off. My friend, Krazy K, asked if he could

    [ Krazy K?  Any relation to Daft D? ]

take off the chain and keep the wallet, but they made him give them the
whole thing. He thought it was funny, though, especially since he had
condomes in it (It is a "christian" school). Not that he was going to

    [ Condomes!  The condom that's a tent! ]

use them. They of course being the nosy bastards that they are, rummaged
around in it to their liking and found them. (We know because they
talked to him about it. 

    [ Good detective work. ]

He told them it was a joke he was going to do to his friend. "I was going to
put it in his locker" He said.)      

    [ Now *that's* good humor. ]

I was wondering about the legality of this whole thing. Is it legal

    [ Perhaps you should wonder about the stupidity of the whole thing first,
      then work your way towards relevance, and then back to stupidity again. ]

to take someones wallet and chain (Which I consider personal property)
when it is an after school activity and then look through it? They gave

    [ *shrug*  Sure is fun though, isn't it?  Actually, I don't know the laws
      and regulations of gay schools.  It just might be allowed. ]

him no alternative (but to go home, and, "Oh by the way, you can't use
the phone"). Then to search through the wallet without permission of the
owner? I am asking because, I would like to get them in trouble, In
retaliation to the many times I've been screwed there (I go to high

    [ Been screwed at the gay school?  Hmm.  Did you have any condomes? ]

school now, thank God). If you could tell me, or know of someone who
knows, then that would help us.   

Thanks,

Abs0lute Zer0
                    
    [ You can say that again. ]

0xb>--------------------------------------------------------------------------

Dear Editor,

I would like to take a chance to give my most sincere thanks for
resurrecting my uttermost respect to the humanity (so often shattered by
politicians and other freaks) by providing me a unique opportunity to
immerse myself into the deep wisdom and magic of written word found in the
Line Noise section.  This is truly the place where one can look for (with a
sense of deep confidence) a genuine proof that every person is a genius on
the inside.

    [ Well thank you very much.  Although I think you are refering to
      loopback. ]

Driven by this wonderful feeling of replenished hope and respect, I'd like
to answer a cry for help from a young but talented Hacker Demonhawk, who
expressed a wish to "blow shit up!!".  I used to be a chemist, and I would

    [ Ummm... ]

like to share, in the spirit of the magazine, my knowledge and provide easy,
quick instructions for young fighting souls that would assist them in the
aforementioned noble cause.  In other words, how to build a bomb.

    [ Whoops.  You just lost me there. ]

    { rest of message truncated due to overwhelming levels of inanity ... }

0xc>--------------------------------------------------------------------------

where would one go to get "private" hacker help?

    [ In the back where they give the lapdances. ]

0xd>--------------------------------------------------------------------------

sorry to bother ya...
i was hoping maybe you could give me some info.  don't take me for a complete
idiot,

    [ Uh oh. ]

i just don't know much about this kind of stuff.
maybe u could get me started... give a few tips???

    [ Sure.  Never kiss on the first date.  Always pack an extra pair of
      socks AND underwear.  Never put electrity in your mouth 'just to see
      what would happen'.  Also, if you happen to find yourself in the
      position, always at least *ask* to give someone the reach-around; it's
      common courtesy. ]

0xe>--------------------------------------------------------------------------

Hello,
My name is Robert  I guess you could call me a beginner hacker I I was
wondering if you could please help me out I need some hacking numbers and

    [ Ok.  7, 9, 11, 43, and 834. ]

passwords just so I can  play around on them and get good. Also if you have

    [ Sure.  Try `password`, `hacker12`, `pickle`, and  `love`. ]

any files or anything that you think that would be helpful to me please attach
    
    [ Alright, /dev/random is a good one to start with. ]

or tell me where I can get them. I just bought the book Secerts Of A Super
Hacker  By Knightmare is that any good if there is any books I should get

    [ Ah yes, the book of the truly desperate and depraved.  As was said once
      before by Voayger, Knightmare's biggest hack was getting that book
      actually published. ]

please tell me or if you have any text please send. I am running windows 95

    [ Can you put Windows 95 in your mouth?  NO!  Such is Mango! ]

Thanks For Ur Time
Robert

0xf>--------------------------------------------------------------------------

Dear Sir
I like you hacker people because you made life easy
to a lot of people

    [ Especially the makers of fine Bavarian shoe-horns. ]

I want to ask you an important question to me
When connecting to Internet, I found that some sites inform me with my ISP IP#

So if they're any possibility that any site can track me
and identify the following
1-what country I came from?

    [ Well; if you're dialing up to your ISP, and connecting to 'sites' from
      there, that would be a one hop jump out to the world.  And yes; they
      could find out what country you're coming from, unless you're dialed
      into a provider in another country.  In which case; it might be a little
      more difficult.  The other tipoff is when you scan in your birth
      certificate and put it up on your webpage along side your current
      address and a head shot.

      That's a 'no-no'. ]

2-what is my phone number?  

    [ Are you asking us if we know your number?  Or if someone can find your
      number when you connect to their machine and they know your IP address?
      I'm confused, so I'll answer the question both ways.

      A-1: No. We don't know your number, and we don't want it.  While we're
      at it. We don't want to make out with you either. Quit sending us the
      flowers. It's over this time once and for all.

      A-2: If you did something that would incite someone to try to find your
      phone number; odds are if it was an illegal action your ISP would gladly
      hand your information to the first law enforcement person who walked
      through the door.  Or for that matter, anyone who asks nicely.  ISPs
      aren't exactly known for being well guarded vaults of information. ]

Globally can any site by coordination with my ISP track me and catch me?

     [ Ever hear of Kevin Mitnick? ]

Please provide me with a full answer quickly.

    [ Do people not realize this is a quarterly magazine?  Quick for us is
      3 months.  If you've done something stupid and gotten busted; our
      sincerest apologies for being late. Next time we'll drop what we're
      doing and get right to it. ]

0x10>-------------------------------------------------------------------------

I am a Indiana University student currently studying Criminal Justice.  I am
trying to gather data and find information concerning computer hacking and
governmental and/or corporate involvement.  The twist that I am persuing
concerns a rumor that I had heard.  I was told that when some computer
hackers were caught, they were recruited by the government and/or
corporations to work in their security department. Usually where there is a
rumor, there is some truth to the matter, especially when concerning the
department of defense.  I don't know if you could help me find information
concerning this issue.  Any help would be greatly appreciated.

                                                Respectfully,
                                                        Jason Sturgeon

    [ Well...  We at Phrack haven't heard anything about the DoD hiring
      'hackers', it's been our understanding that the government at least
      prefers straight laced guys with military background to handle their
      stuff.  Although it's not out of the realms of possibility that they've
      hired 'hackers', if it's happened it's of rare occurance, and those
      individuals who fit the title of 'hacker' probably don't conform to your
      definition of what a 'hacker' really is..

     Corporations and The Government for the most part tend to shy away from
     'hackers', if merely for the stigma of being a 'hacker'.  But as a
     stereotype, hackers conjur up all sorts of bad mental images for
     respectable management types.  We're sure it's happened to some capacity,
     but we have no witty anticdotes concerning it. ]

0x11>-------------------------------------------------------------------------

Hello there

I have heard there are some risks using callback modems.
Can you give me some more info on this, or info where to look

    [ Risks of callback modems are fairly simple.  The problems involved with
      them are a little bit more complex.  We'll discuss both in an effort to
      best cover this subject.  The overall fundamental flaw of callback
      modems is the idea that you could 'fake' a hang-up on your end, or play
      a dialtone in an effort to fool the modem into thinking it hung up.  Then
      you wait for it to dial the number, and once it's done, 'ATA' your modem
      and pick up the carrier.

      We ourselves have tested this a couple times with moderate success, it's
      not 100% accurate, and it also depends on the hardware on the remote
      side.

      If the call-back information is based of ANI, that could provide more
      problems, since the Phrack staff has heard the rumor that you can fake
      ANI with certian types of ISDN set-ups.

      The two types of callback modem configurations, one being a program that
      acts as a frontend to the dialing mechanism, the other being hardware
      based.

      Such as, you dial in to the modem, the program asks you to authenticate
      yourself by some means, you do so; it hangs up and calls the number
      that's paired with your authenication information.  This isn't so bad,
      but if anyone remembers back when certian BBSs had callback that you
      could enter, you could make them call arbitrary phone numbers by putting
      in a fake number if their door was misconfigured.

      As far as hardware based call-back, whence you program the passwords and
      numbers into the modem and it deals with the whole transaction,
      introduces a scalability issue as well as the fact that the modem has no
      means to log on it's own, etc.. etc.. etc.

      If any readers wish to write an article based on this subject you are
      urged to write it and send it in.  It'd be nice to see some more solid
      information on this subject.

      As well; if any companies wish to send us modems, we urge you to send us
      some modems so we can put them up against a battery of hacker tested and
      hacker approved tests. ]

0x12>-------------------------------------------------------------------------

I would like to know about cellular phones....how to find out secret
pin, how to listen to calls etc....

    [ I would like to know more about marshmellows. How they're planted, the
      way they're picked in the spring time as they blossom from the little
      tiny buds you get in 'Swiss Miss Hot Coco', to the fat chewey vessles of
      taste and excitment that they are at full maturity.

      I would like to find out the secrets of gravity, as well as a good solid
      reason why the universe keeps 'expanding' -- without any of that "just
      because" rhetoric that seems to dominate the subject. ]

If You need the cellular make I'll be obliged to give it to you....       

    [ Wow.  You'll give us your phone just so we can look at it?  Send us your
      home address and we'll send you a S.A.S.E to mail it back to us in. ]

Thanks. Anthony.

    [ No. Thank _you_ your generosity Anthony! ]
           
0x13>-------------------------------------------------------------------------

Hiya,

Not wishing to sound like a playboy forum article but I have read phrack for

    [ Already my interest is waning... ]

quite a while and have only seen cause to write now.
I commend you on your editorial on C programming style.  The sooner we get out

    [ And I commend you on your commendation.  +100 points. ]

there and club to death those people that use single space indentation the
better.

I do however have three main points to disagree with you on.

1. Write as many comments as you can.  You may need to remember what it
was you where coding AFTER copious amounts of recriational drugs.

    [ Nah.  You don't want to get out of hand with the commenting.  You end
      up commenting needlessly and redundancy abounds.  And if you can't read
      your own code, kill yourself.  -100 points. ]

2. Put your own varaibles with uppercase first letters (to distinguish them 
from sys vars)

    [ `sys vars`?  What like argc, argv or errno?  This is a ridiculous
      suggestion.  It makes your code ugly and harder to parse.  I award you
      no points. ]

3. In reference to your comment

    "In the grand scheme of things, none are really
     any more correct than any others, except mine."

It must be said that this is completely wrong.  The only point that counts
is in fact mine.

    [ Not when it's in my magazine.  With a final score of 0, you lose. ]

Regards,
andrewm at quicknet dot com dot au

    [ Cute. ]

0x14>-------------------------------------------------------------------------

Dear Guys,

First off, I'd like to say that I am ever more impressed with the quality
of each successive issue of Phrack.

    [ Danke. ]

The reason for this mail it to respond to the request made by N0_eCH0 in
Ireland in issue 52. Myself and a few friends are happy to help this guy
out if we can. I'm afraid that we're no great sources of knowledge, but
are willing to have a crack at most things.

Anyway, if you can pass this on, as there was no e-mail address for
N0_eCH0, I'd be much obliged. Keep up the excellent work, I look forward
to issue 53 !

ben_w@netcom.co.uk          

    [ There you go. ]

0x15>-------------------------------------------------------------------------

To whom it may concern:

I was wonder how I can read someone dir and take over their
account the kernal is 2.0.0. How could I hack into the system
without having a passwd!!

    [ I assume you mean Linux.  `LILO: linux init=/bin/sh`.  Oh, and you need
      console access.  Good luck. ]

Thanx!

Tag

0x16>-------------------------------------------------------------------------

[ P52-19@0x2: Statement of Louis J. Freeh, Director F.B.I... ]


Hello,

    I would like to say that the article, published as P52-19 is without
a doubt one of the most frightening threats to our freedom that man has
ever seen.

the article is:
"The Impact of Encryption
                                                 on Public Safety

                              Statement of Louis J. Freeh, Director
                                Federal Bureau of Investigation"

    This article basically states that Americans should have now
personal communication rights whatsoever.  The Director of the FBI
practically states that strong encryption should be banned from the
public, because he wants law enforcement officers to be able to read all
of our mail.  He says that this would be for reasons of terrorists and
criminals, but fails to state that the security of the average American
would be compromised. Due to his proposal that  you would have to
forfeit your key to government officials, and that these keys would only
be used "for the immediate decryption of criminal-related encrypted
communications or electronic information.".  Or maybe this way the
government can just intrecept all of your communications.
    My main objection to this is the irrelevancy that this would have to
the general public.  According to US law, the US Postal Service is the
ultimate form of private security.  The average American should be able
to send a letter to anywhere in the world, and it should be completely
safe.  And what more can you send with encrypted email? A program, but
you can do that with a disk in a letter.  So whats stopping these
terrorists from hopping on down to the Post Office?
    Another problem with this proposal is that encrypted information is
more used to protect your information from other parties then the
government.  I can guarantee that the average Joe living down the street
is encrypting his love letter to his mistress Jane so that his wife
doesn't see int, not so that some lazy, fat, government "official"
doesn't see it.  Most people use this technology for much more practical
usage than the deception of the government.  We use it because of the
millions of people on the Net, and perhapse we don't want those millions
to see every little thing about our personal lives.
    And finally, why should the government be able to restrict our right
to gather peacefully?  With technology moving so fast, i think that it
is reasonable to assume that the Internet is a gathering place? We have
all of the means of normal communication and more.  Chat rooms, email,
and programs like Mirabilis's ICQ allow us to communicate on a whole new
level.
    In light of all of this, i hope you share my opinions now about the
loss of freedom that this would represent.  Thank you.

0x17>-------------------------------------------------------------------------

Hi,

I am a little sysadm on a little Linux-Server on the net.

    [ I have little interest in those details. ]

I am searching for documents about System Security under Linux/UNIX
just to be up-to-date :) Thank you for your help.

    [ http://www.redhat.com/linux-info/security/linux-security/ ]

And btw...I have parts of the /etc/shadow file from my ISP...what
can I do with this? Can I just run crack over it?

    [ Well now, that all depends on what parts you have, doesn't it...?
      If you have the encrypted hashes, then you're in business. ]

And, btw: Not all germans hate americans...I am german and I
don't hate americans... and my generation has nothing to do with
the WWII...

    [ Oh, I think you do.  I am relatively certian that, somewhere deep
      down, you dislike us.  You couldn't take a shellacking like you did
      in WWII (not to mention spaetzle) and *not* feel some sort of
      resentment.  It's ok.  Embrace your malevolent feelings.  Hug them.
      C'mon!  Once you've done that, you can dissolve them.  I admonish you to
      TURN THAT FROWN UPSIDE-DOWN!  Cmon!  Bodyslam yourself into gayness! ]

-firefox01

0x18>-------------------------------------------------------------------------

     Hello there, good to talk to you. 

    [ Likewise. ]

I am just this "Thinker" with this thought why don't we the Hackers and you
the one of the major contributing Hacker commune (2600,Phrack,ect) make a Full
Strong "live" Cryto network for the Hacker and by the Hacker.

    [ I have a thought.  Get a speak n' spell. ]

     I can't belive I am sending this from hotmail bought out by
microshit blah blah no this thing must be really insecure.

    [ Well, maybe it just needs love and attention and for someone to say nice
      things to it. ]

     Well I have a whole line of ideas and no one ever listens to me
netscape ect... but if your intrested e-mail me back and I'll give you
my POP adress. The benifit of this system is 1) we can piss off the FBI

    [ Yes, let's piss off the F.B.I.  And, while we're at it, let's piss off
      the IRS and let's annoy the CIA..  We can poke fun at the retarded
      wrestlers association.  And lastly, let's aggravate an enraged bull. ]

and 2) final we hackers can have a place to loyter and idile , lurk at

    [ loyter and idile?  Hey, aren't they those two Jewish film critics?  I
      love them! ]

where we can say what ever the Hell such as Full deatails on how to
enter a sys,ect...of corse we will have to screen ppl for trust ect...

    [ And screen them for stupidity. ]

But I reall belive we can werk this.
If you want to here the rest of my ground shaking ideas just ask, or
full deatials on the Crypto.net .

    [ Pass. ]

0x19>-------------------------------------------------------------------------

First off, I'd like to say that I love the mag...but you really get some
nutjobs that post to it..(myself included) I'm not an elite hacker, a unix
guru or anything like that(duh), but I am amazed at the effort you put into
Phrack...anyways, keep up the good work

    [ Thanks, nutjob. ]

0x1a>-------------------------------------------------------------------------

Hello,

Who was the first hacker in history?

    [ God. ]

thanks for your time,
greetings,
Max

0x1b>-------------------------------------------------------------------------

Hi.

i'm a Swedish kid and i just wonders

    [ Now the Swedes I like.  Beautiful women.  Amazing accents.  I *think*
      they like me.  Although this one particularly hot Swedish girl I know
      doesn't seem to like me much.  I think maybe it's because I try too hard
      around her.  She'll come around and I'll be like bouncing off the walls
      trying to impress her..  I remember one time I got so excited I almost
      set sail for gaiety.  I know.  I know.  I should "just relax" and
      everything will fall into place.  I dunno tho.  She's so pretty.  And
      ahm just so awkward... ]

if you might know a good haking, freaking and craking
site. I've checked everywhere but i have not any.

    [ Huh? ]

0x1c>-------------------------------------------------------------------------

Hey sup, I'm makin an essay site similar to Slackers Inc. but with more
essays. The only problem is I need sponsors to get my page up, can you pay me
a small fee monthly for displayin a banner for your site. I know almost

    [ O.k.  Sure, how does nothing/month sound? ]

everybody knows about Phrack Magazine but I heard you do some sponsoring, E-
mail me back if you are interested.

    [ Yah, we are *so* reknown for our advertising budget.  And now I'd like to
      make Phrack reknown for sponsoring a gay fucking highschool/college paper
      stealing webpage.  Sure.  I'll get right on that after we do our 'kick
      a baby harp seal campaign'. ]

0x1d>-------------------------------------------------------------------------

     You need to write an Interactive tutorial to simulate hacking into a
private college or a company. You should make it realistic and hard to access.

    [ Someone already did.  They're called *.edu and *.com.  Although sometimes
      they're not too realistic. ]

0x1e>-------------------------------------------------------------------------

[ P52-14: International Crime Syndicate Association ]

Dorathea Demming,

You remark that the ICSA doesn't guarantee their certification against
attack.

"In plain English, they are saying that if you get sued, you are on your
own."

Do you know of any security company, consultant, or consortia that will
commit to helping a customer legally if they've been attacked?

Stu

0x1f>-------------------------------------------------------------------------

In skateboarding you are a "poseur" if you don't know shit.
In the computers culture you are a "lamer" if you don't know shit.

The term that bugs me is "elite" or "eleet" or "3l33t3".
Are you elite?

I just don't like the term.
I really like the term "HI-FI" ,as in high-fidelity, or high-fidelity
stereo's.

An outdate term that orginally meant "I've got the best gear".
But now it just means "late 70's marketing scheme".

Are you hi-fi?
It has a ring to it.
You may be elite right now but in time you'll be hi-fi.

------------------------------------------------------------------------------

----[  EOF

AOH Site layout & design copyright © 2006 AOH