hakeri.217bastion,
-> #214, kiki> kosovskih Albanaca. "Nastavicemo da uklanjamo albanske lazi sa
> interneta, a planiramo da uklonimo i NATO sajt", rekao je za "Blic" od
> 22. oktobra jedan anonimni muski glas, koji se predstavio kao clan grupe
> "Crna ruka".
Ne bih im preporucio da skidaju NATO sajt, jer je veliki rizik
to uraditi, tj. postoji velika verovatnoca da ce biti uhvaceni,
a tek bi to bila steta. Neka rasturaju ove sto prenose lazi, tj.
manje vazne. Ovi Nato i sl. su suvise obezbedjeni, a i ne prenose
velike lazi ko ovi manji. Zato je moj predlog uklanjanje manjih,
a kada njih ponestane onda nek predju na zverke.
hakeri.218ventura,
-> #217, bastion> Ne bih im preporucio da skidaju NATO sajt, jer je veliki rizik
> to uraditi, tj. postoji velika verovatnoca da ce biti uhvaceni,
Fora je u tome sto nema sanse da to izvedu 'amateri'. Jer ako
jedan ili vise klinja sa kompjuterom, provali u kompjuter 'udruzenja'
koje godisnje dobija vise od 2 milijarde dolara, onda, zasto oni
dobijaju te pare?
1. Treba provaliti u komp. (nemoguce)
2. Treba sakriti trag da te ne uhvate (vrlo vrlo tesko)
-Ako te otkriju treba im pobeci (SF)
VeNTuRa
hakeri.219dr.iivan,
-> #215, ventura> > kosovskih Albanaca. "Nastavicemo da uklanjamo albanske lazi sa
> interneta, > a planiramo da uklonimo i NATO sajt", rekao je za "Blic" od
> 22. oktobra ^^^^
>
> Ma jeah, obicno to tako ide... lako im je sa kosova.com da se igraju
> kada ga pokrece neki FREE linux, al natov site ve 'malkice' teze, jer za
> njih radi citav tim ljudi na KUPLJENOJ verziji UNIX-a, koji se upravo
> trude da sprece 'avanturiste' u sprovodjenju nhihovih namera...
Pa? :)
I IRIX je kupljeni UNIX, na kome radi Afrodita, pa znam ortaka koji
sad može da im obriše ceo disk, ukine bilo koji nalog itd :)
Stvar je u tome što ovaj na Afroditi može da ima nalog, što je mogao
da bude na mašini i odatle radi posao, a to će malo teže da ide sa
NATO-om, pošto njegov UNIX verovatno niko osim njega nema, ali nije
nemoguće.
Teško će iko provaliti u NATO, a još teže posle toga ostati neuhvaćen,
ali to nije nemoguće.
Na kraju, ako je to neko i uradio - sigurno se neće javiti, a ni mi za
njega saznati :) Ko zna koliko hakera raznih obaveštajnih službi u ovom
trenutku ima pristup NATO/Pentagon i sličnim serverima all arround the
world :)
> BTW. ako bi neko zeleo na ovo da spomene slucaj onog Zadrovcana koji je
> provalio u 'pentagon', samo da kazem da to nije tacno... Pentagon je
> najvise obezbedjen sto se toga tice, a ortak od tog tipa je bio
> kontrolor letenja te mu je dao neke 'informacije', sa kojima je on
> provalio u kontrolu letenja na nekom tamo aerodromu.Znaci nikakav
Ma taj mu je dao informacije koje je našao na nekom hack sajtu, koje su
ovi iz Pentagona namerno lansirali, da bi pohvatali naivne klince, a
te šifre sigurno nisu bile sa nekog "pravog" Pentagon servera.
hakeri.220ventura,
-> #219, dr.iivan> I IRIX je kupljeni UNIX, na kome radi Afrodita, pa znam ortaka koji
> sad moze da im obrise ceo disk, ukine bilo koji nalog itd :)
Pa i ja znam ortaka koji moze da obrise diskove na FON-u i na EUNet-u
da dodaje/brise korisnike itd. Naime Covek je root na oba sistema :>>
-A neradi se o tome da je kupljeni UNIX sigurniji, sve zavisi od onoga
ko ga odrzava, moze neki laik da kupi SCO UNIX pa da mu ga neko ko
ima iskustva sa tom vrstom unixa (sysop) sjebe, znaci treba imati
iskusne admine da mi maximalno zastitili sistem. A spomenuo sam kupovinu
upravo zbog GPL na linux, jer ja sada mogu da 'doradim' svoj linux, tj.
da dopisem u kernel da kada proverava user i sifru pre toga da stavim
da moze da se pristupi rootu i preko neke druge sifre (koju samo ja znam)
i onda taj linux distribuiram, kao neku tralala veziju. i kada neko
instalira taj linux, onda se ja mogu uz pomoc moje dorade logovati na
taj sistem kao root, ovo pricam zato sto firma koja pravi/prodaje UNIX-e
GARANTUJE da na njihovim KUPLJENIM sistemima ne postoji 'back-door'.
> njega saznati :) Ko zna koliko hakera raznih obavestajnih sluzbi u ovom
> trenutku ima pristup NATO/Pentagon i slicnim serverima all arround the
> world :)
U to sam siguran, nisu ni oni iz CIA, vrabci.
> Ma taj mu je dao informacije koje je nasao na nekom hack sajtu, koje su
> ovi iz Pentagona namerno lansirali, da bi pohvatali naivne klince, a
> te sifre sigurno nisu bile sa nekog "pravog" Pentagon servera.
Isto tako vataju i revolucionare, ono, postave site i onda napale
ove, daju im informacije, T&T, onda oni skupljaju te stvarcice, ponesto
i naprave, pa onda Pentagonovci izvedu neko stvarno zesce s*anje, i okrive
ove druge, a naravno dokaza ima kolko oces...
hakeri.221spantic,
-> #220, ventura> Pa i ja znam ortaka koji moze da obrise diskove na FON-u i na EUNet-u
> da dodaje/brise korisnike itd. Naime Covek je root na oba sistema :>>
I ja bih voleo da upoznam tog čoveka. Naime, ja znam tri čoveka koji
to mogu da urade na EUnetu, ali zanimljivo, niko od njih niti može
niti ima ambiciju da to radi na Fonu.
hakeri.222gligo,
Crna ruka strikes again...:)
Blic prenosi da su ovoga puta 'srusili' site hrvatskog lista Vjesnik.
hakeri.223dr.iivan,
-> #220, ventura> -A neradi se o tome da je kupljeni UNIX sigurniji, sve zavisi od onoga
> ko ga odrzava, moze neki laik da kupi SCO UNIX pa da mu ga neko ko
> ima iskustva sa tom vrstom unixa (sysop) sjebe, znaci treba imati
> iskusne admine da mi maximalno zastitili sistem. A spomenuo sam kupovinu
Tako je, najveća rupa na sistemu su njegovi admin-i.
hakeri.224ventura,
Q: Kakva je razlika izmedju korisnika i hakera?
A: Korisnik misli da kilobajt ima 1000 bajtova, a Haker misli
da kilometar ima 1024 metra.
hakeri.225ventura,
By Reuters
Special to CNET News.com
December 28, 1998, 3:45 p.m. PT
SHANGHAI--Two hackers who broke into a bank computer network and stole
260,000 yuan ($31,400) have been sentenced to death by a court in eastern
China, the official Wenhui Daily said today.
The Yangzhou Intermediate Court in Jiangsu province also confiscated 40,000
yuan ($4,830) from Hao Jinglong, formerly an accountant at the Zhenjiang
branch of the Industrial and Commercial Bank of China, and his brother
Hao Jingwen, the newspaper said.
The two opened 16 accounts under various names in a branch of the bank in
September and later broke into the branch to install a controlling device
in a bank computer terminal, the newspaper said. They used the device to
electronically wire 720,000 yuan($86,975) in non-existent deposits into the
bank accounts. Afterward, they successfully withdrew 260,000 yuan from eight
different branches of the bank, the newspaper said.
All the money since has been recovered, the newspaper said without giving
further details.
hakeri.226ventura,
Jebote... zamrla ova konfa... evo jednog TXT-a o hakovanju HotMail-a....
hotmail.txthakeri.227sekirica.joe,
Imam bezicni telefon, bez baze i kradem neciji signal.
kako bih mogao da ga povezem sa modemom?
Sekira.
hakeri.228ventura,
-> #227, sekirica.joe> Imam bezicni telefon, bez baze i kradem neciji signal.
> kako bih mogao da ga povezem sa modemom?
:>> Otvori telefon, i onda one dve zice od mikrofona (u slusalici)
spojis na kabal koji potom ustekas na modem... i vozi misko... ;)
hakeri.229rkramer,
-> #228, venturaC:\> :>> Otvori telefon, i onda one dve zice od mikrofona (u slus
C:\> spojis na kabal koji potom ustekas na modem... i vozi
C:\> misko... ;)
:))))))))))))))))))))))))))))))))))))))))))))))))))))
Nadam se da nisu svi nasi 'hackeri' na ovom nivou ;)
hakeri.230ventura,
-> #229, rkramer> C:\> :>> Otvori telefon, i onda one dve zice od mikrofona (u slus
> C:\> spojis na kabal koji potom ustekas na modem... i vozi
> C:\> misko... ;)
>
> :))))))))))))))))))))))))))))))))))))))))))))))))))))
>
> Nadam se da nisu svi nasi 'hackeri' na ovom nivou ;)
Jebiga... zajebo sam se na brzinu... treba da imas i povratni signal...
hakeri.231rkramer,
-> #230, venturaC:\> > C:\> :>> Otvori telefon, i onda one dve zice od mikrofona
C:\> > C:\> spojis na kabal koji potom ustekas na modem... i vozi
C:\> > C:\> misko... ;)
C:\> >
C:\> > :))))))))))))))))))))))))))))))))))))))))))))))))))))
C:\> >
C:\> > Nadam se da nisu svi nasi 'hackeri' na ovom nivou ;)
C:\>
C:\>
C:\> Jebiga... zajebo sam se na brzinu... treba da imas i
C:\> povratni signal...
Mmmm... Bolje da cutis - samo se dublje ukopavas... ;)
Ako malo bolje razmislis, shvatices da su u najmanju ruku i
naponski nivoi drugaciji (na samoj liniji imas napon reda 60V !),
pa se unosi i gomila smetnji, pa je pitanje
da li se radio talasima prenosi ceo bandwith koji inace prolazi kroz
telefonsku mrezu itd, itd, da ne razvlacim
U svakom slucaju, po meni je jedino realno resenje koje bi
_moglo_ da proradi naci jedan od onih matorih modema koji su se
kacili na slusalicu (uh... kako se to zove... akusticki _nesto_... to
bi dejanr bolje znao :), ali je problem sto su mislim najbrzi takvi
modemi bili 1200 bps i to bez MNP-a.
Drugo resenje (po meni manje realno ;) bi bilo da ti neko
napravi KONVERTOR koji bi koristeci ono sto prima telefon SIMULIRAO
uslove sa telefonske linije... Iako je ovo pretpostavljam dovoljno
komplikovano da bi pojedinac radio (zbog cilja kakav imas ;) da bude
apsolutno neisplativo... :)
hakeri.232darth.vader,
-> #229, rkramer>> Nadam se da nisu svi nasi 'hackeri' na ovom nivou ;)
Mada, uopste nije lose imati tako nesto ;>>>
hakeri.233vstan,
-> #231, rkramer> kacili na slusalicu (uh... kako se to zove... akusticki
> _nesto_...
Akustični kupler
hakeri.234banos,
da li bi neko mogao da mi posalje neki od programa sa kojim je moguce
ucu u tuci racun. preko neta
hvala unapred
hakeri.235ventura,
-> #234, banos> da li bi neko mogao da mi posalje neki od programa sa kojim je moguce
> ucu u tuci racun. preko neta
:)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))
hakeri.236rkramer,
-> #235, venturaC:\> > da li bi neko mogao da mi posalje neki od programa sa kojim
C:\> > ucu u tuci racun. preko neta
C:\>
C:\>
C:\> :)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))
C:\> ))))))))
Vidi ko se smeje ;)
hakeri.237ventura,
-> #236, rkramer> C:\> > da li bi neko mogao da mi posalje neki od programa sa kojim
> C:\> > ucu u tuci racun. preko neta
> C:\>
> C:\>
> C:\> :)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))
> C:\> ))))))))
>
>
> Vidi ko se smeje ;)
Mozda pogresim na nekim stvarima... ali nisam bas tolko glup...
hakeri.238rkramer,
-> #237, venturaC:\> > Vidi ko se smeje ;)
C:\>
C:\> Mozda pogresim na nekim stvarima... ali nisam bas tolko
C:\> glup...
Koliko glup? :))))
hakeri.239ventura,
-> #238, rkramer> C:\> > Vidi ko se smeje ;)
> C:\>
> C:\> Mozda pogresim na nekim stvarima... ali nisam bas tolko
> C:\> glup...
>
>
> Koliko glup? :))))
Ti bas zapeo....
hakeri.240rkramer,
-> #239, venturaC:\> > C:\> Mozda pogresim na nekim stvarima... ali nisam bas to
C:\> > C:\> glup...
C:\> >
C:\> >
C:\> > Koliko glup? :))))
C:\>
C:\>
C:\> Ti bas zapeo....
Nisam zapeo, nego me interesuje... Nisi zavrsio recenicu...
:)))
hakeri.241ventura,
-> #240, rkramer> C:\> > Koliko glup? :))))
> C:\>
> C:\>
> C:\> Ti bas zapeo....
>
>
> Nisam zapeo, nego me interesuje... Nisi zavrsio recenicu...
Ni ti nisi zavrsio recenicu :)
hakeri.243ventura,
Samo da vas obavestim da su sve sifre sa EUNet-a skinute, jos pre par
meseci. Ukoliko je neko od vas ostecen ima pravo da tuzi eunet jer
ste pri otvaranju naloga potpisali ugovor o koriscenju internet servisa.
Naravno, kao i uvek, zvanicnici nista ne govore, i sve poricu...
hakeri.244file,
-> #243, venturaEUnet
ne EUNet :)
hakeri.247dr.iivan,
-> #243, ventura> meseci. Ukoliko je neko od vas ostecen ima pravo da tuzi eunet jer
> ste pri otvaranju naloga potpisali ugovor o koriscenju internet servisa.
To što sam potpisao taj Ugovor mi ama baš ništa u tom slučaju ne znači.
Baš me zanima kako bih ja mogao da tužim EUnet bez dokaza. Sve što ja
znam jeste da sam siguran da mi negde fali par sati (ovo samo kao
primer), a to ne mogu nikome da dokažem, ponajmanje nekom sudiji
našeg suda. Za njega postoji samo lista poziva, a svaki je obavljen
sa analogne centrale, pa nema broja telefona u koloni, što znači
da nema ni dokaza.
Ali zato, kad bih nekim slučajem ja zgrešio nešto na Web-u, EUnet
i ima dokaze, i može da me tuži.
hakeri.248jpedja,
-> #247, dr.iivan> primer), a to ne mogu nikome da dokazem, ponajmanje nekom sudiji
> naseg suda. Za njega postoji samo lista poziva, a svaki je
> obavljen
> sa analogne centrale, pa nema broja telefona u koloni, sto znaci
> da nema ni dokaza.
>
> Ali zato, kad bih nekim slucajem ja zgresio nesto na Web-u,
> Eunet
> i ima dokaze, i moze da me tuzi.
Suma sumarum, eunet su smradovi, a to je poznato jos od kad su
se pojavili, s' tim sto sad kad imaju konkurenciju to postaje sve
izrazenije ...
Pozdrav,
Pedja...
hakeri.249spantic,
-> #243, ventura> Samo da vas obavestim da su sve sifre sa EUNet-a skinute, jos pre par
> meseci. Ukoliko je neko od vas ostecen ima pravo da tuzi eunet jer
> ste pri otvaranju naloga potpisali ugovor o koriscenju internet servisa.
> Naravno, kao i uvek, zvanicnici nista ne govore, i sve poricu...
Ja se zbog tebe nadam da imaš neki dokaz za ovu svoju izjavu,
s ozbirom da sve što izjaviš podleže tvojoj odgovornosti.
Mnogima je poznato da radim u EUnet Yugoslavia. Jedna od
mojih primarnih dužnosti je sistem administrator. Citirana izjava
je najobičnija neistina i dezinformacija.
hakeri.250jpedja,
-> #249, spantic
> Ja se zbog tebe nadam da imas neki dokaz za ovu svoju izjavu,
> s ozbirom da sve sto izjavis podleze tvojoj odgovornosti.
JEl to po onom vasem novom zakonu o informisanju , a?
hakeri.251stameni,
-> #249, spantic>> > Naravno, kao i uvek, zvanicnici nista ne govore, i sve poricu...
>> Citirana izjava
>> je najobičnija neistina i dezinformacija.
Mislim da je bar gore bio u pravu... ;)
hakeri.252spantic,
-> #250, jpedja> JEl to po onom vasem novom zakonu o informisanju , a?
U svakoj normalnoj državi odgovaraš za ono što kažeš.
Ako nešto ne možeš da dokažeš to je kleveta i kompenzaciju
za nju isplaćuješ oštećenoj strani, a ne državi.
hakeri.253ventura,
-> #252, spantic> > JEl to po onom vasem novom zakonu o informisanju , a?
>
> U svakoj normalnoj drzavi odgovaras za ono sto kazes.
> Ako nesto ne mozes da dokazes to je kleveta i kompenzaciju
> za nju isplacujes ostecenoj strani, a ne drzavi.
zaboravio si na kom poluostrvu zivis...
hakeri.254ventura,
Mali info o Kevinu Mitniku, posto je skoro napunio 4 godine u zatvoru
i jos uvek ceka na sudjenje...
flyer1.ziphakeri.255ventura,
U toku sledece godine izlazi film pod imenom pod imenom "TakeDown",
bojkotovan od strane 2600, jer ne opisuje verodostojno hapsenje
kevina mitnika....
flyer.ziphakeri.256van.gogh,
Crna Ruka...se nadvila nad svetom.... ;)
Ono kao...i treba...
hakeri.257rkramer,
-> #256, van.goghC:\> Crna Ruka...se nadvila nad svetom.... ;)
C:\>
C:\> Ono kao...i treba...
Samo da momci ne preteraju, pa nam cviknu internet... To bi
nam bio zestok autogol... :(
hakeri.258indi,
-> #256, van.gogh-> Crna Ruka...se nadvila nad svetom.... ;)
cujem sjebali su pentagonovo neko sranje u vezi sa mornaricom...
hakeri.259pperica,
-> #256, van.goghPa to oni grade sebi alibi....kad roknu neutronku na kosovo reci
ce: nismo mi, eto, srpski hakeri....
hakeri.260van.gogh,
-> #259, ppericaVA>Pa to oni grade sebi alibi....kad roknu neutronku na kosovo
VA>reci ce: nismo mi, eto, srpski hakeri....
:))))
hakeri.261bovi,
Sto se tice Euneta: Meni je naprasno nestalo par sati. Moguce da je
to sa kradjom lozinki istina. Ja se ne secam da sam ja to potrosio.
Zasto Eunet nije upozorio korisnike na ovo?
Ako hoce da sve bude po zakonu, njihovo pravo je da opomenu sve
korisnike.
hakeri.262bovi,
-> #261, bovi> Ako hoce da sve bude po zakonu, njihovo pravo je da opomenu sve
> korisnike. ^^^^^
Hteo sam reci obaveza.
hakeri.263obren,
-> #261, bovi> Sto se tice Euneta: Meni je naprasno nestalo par sati. Moguce da je
> to sa kradjom lozinki istina. Ja se ne secam da sam ja to potrosio.
> Zasto Eunet nije upozorio korisnike na ovo?
Nije bilo nikakve krađe lozinki, u pitanju je obična dezinformacija
koja se sada širi kao istina jer je toliko puta ispaljena u javnost.
Pogledaj u listi seansi kada si sve zvao i koliko dugo si bio na vezi,
sva je prilika da si se ti malo preračunao.
hakeri.264dr.iivan,
Šta rade ruski hakeri sajtovima američke vlade :)
govcrack.jpghakeri.265roach,
-> #261, boviNajbolje je da odes licno i da uplatis, ovako ce neko iz Eunet-a
sigurno da ti uzme malo. :(
hakeri.266ventura,
-> #257, rkramer> Samo da momci ne preteraju, pa nam cviknu internet... To bi
> nam bio zestok autogol... :(
Mogu samo da nam precvikaju glavnu 'liniju' koja ide u madjarsku
ali nam druge ostaju, uostalom gomila provajdera ima satelitske linkove.
hakeri.267rkramer,
-> #266, venturaC:\> > Samo da momci ne preteraju, pa nam cviknu internet...
C:\> > nam bio zestok autogol... :(
C:\>
C:\> Mogu samo da nam precvikaju glavnu 'liniju' koja ide u
C:\> madjarsku
C:\> ali nam druge ostaju, uostalom gomila provajdera ima
C:\> satelitske linkove.
C:\>
Ajme, opet ti... ;)
Mislio sam na skidanje celokupnog domena sa mreze. Ionako smo
na blacklistovima mnogih provajdera zbog spamovanja i mail bombinga.
hakeri.268ventura,
-> #267, rkramer> Ajme, opet ti... ;)
:)
>
> Mislio sam na skidanje celokupnog domena sa mreze. Ionako smo
> na blacklistovima mnogih provajdera zbog spamovanja i mail bombinga.
Aaaaa too :)
Pa ako ga skinu nasi provajderi mogu da predju na .net domene...
hakeri.269rkramer,
-> #268, venturaC:\> Aaaaa too :)
C:\> Pa ako ga skinu nasi provajderi mogu da predju na .net
C:\> domene...
Pcelice mamina... Ajde, idi blago nama da spavas, vidi se da
si umoran od svega ;)
hakeri.270kiki,
-> #266, ventura> Mogu samo da nam precvikaju glavnu 'liniju' koja ide u madjarsku
> ali nam druge ostaju, uostalom gomila provajdera ima satelitske linkove.
a mogu samo i da nam gadjaju EUnet ( :>>>>> ), InfoSky.. itd ;)
hakeri.271vantic,
-> #270, kiki-> a mogu samo i da nam gadjaju EUnet ( :>>>>> ), InfoSky.. itd ;)
PTT daj Boze ,pa da izgrade novi!
hakeri.272fear,
Ode ova tema dodjavola ali evo jedan programcic
za zajebavanje po netu imate vise mogucnosi
boom pismo, ping, ip scanner, port scanner.....
hakeri.273ventura,
S-Tools 4.0
Interesantan programcic koji sluzi za sakrivanje fajlova u BMP i WAV.
Sakriveni fajl se kriptuje, sakrije se u sliku/Wav, a slika ostaje ista.
s-tools4.ziphakeri.274fear,
-> #273, venturaI sta se time postize?
hakeri.275obren,
-> #274, fear> > S-Tools 4.0
> >
> > Interesantan programcic koji sluzi za sakrivanje fajlova u BMP i WAV.
> > Sakriveni fajl se kriptuje, sakrije se u sliku/Wav, a slika ostaje
> > ista.
>
> I sta se time postize?
Ova tehnika se naziva steganografija i predstavlja vid enkripcije kojem
se sve više poklanja pažnja. Radi se se o tehnici kojom se u multimedijalne
datoteke na pogodan način ukodira i neka informacija (obično tekst) tako
da se to ne primeti (bitovi koji nose kodiranu informacije su rasuti po
slici na pogodan način tako da se vizuelno/na sluh ne primećuju ali se
mogu restaurirati na prijemnoj strani).
U čemu je kvaka kod ove tehnike: kada šalješ poruku šifrovanu recimo PGP-om
ili nekim sličnim programom, automatski budiš sumnju da se u poruci krije
nešto važno i tajno te samim tim pobudjuješ interesovanje kod odgovarajućih
službi ;) Čak iako ne mogu da razbiju šifrat, mogu jednostavno da obrišu
takvu poruku ("nestala u morima Interneta") i osujete prenost informacije.
Međutim, ako pošalješ e-mail poruku u kojoj diskutuješ o sisatim plavušama
i uz nju zakačiš JPG sa jednom od njih, ali takav da se u sliku ukodirane
neke dodatne informacije koje prijemna strana očekuje, ovakva poruka
najverovatnije neće pobuditi pažnju dežurnog "špijuna" ili softvera za
filtriranje e-maila. Čak iako odluči da pogleda kakva je to slika u pitanju
videće zaista običnu "sisatu plavušu" ali ne i informaciju koja je utisnuta
u samu sliku.
Nadam se da sam uspeo da dočaram u čemu je kvaka.
hakeri.276dr.iivan,
-> #273, ventura> S-Tools 4.0
>
> Interesantan programcic koji sluzi za sakrivanje fajlova u BMP i WAV.
> Sakriveni fajl se kriptuje, sakrije se u sliku/Wav, a slika ostaje ista.
Da li ovaj program radi i obrnuti smer?
hakeri.277dr.iivan,
-> #275, obren> > > S-Tools 4.0
> > > Interesantan programcic koji sluzi za sakrivanje fajlova u BMP i WAV.
>
> Ova tehnika se naziva steganografija i predstavlja vid enkripcije kojem
> se sve više poklanja pažnja. Radi se se o tehnici kojom se u
>
> kod odgovarajućih službi ;) Čak iako ne mogu da razbiju šifrat, mogu
> jednostavno da obrišu takvu poruku ("nestala u morima Interneta") i
>
> Međutim, ako pošalješ e-mail poruku u kojoj diskutuješ o sisatim
> plavušama i uz nju zakačiš JPG sa jednom od njih, ali takav da se u sliku
> ukodirane neke dodatne informacije koje prijemna strana očekuje, ovakva
Da li postoji način da strana koja nije prijemna provali da u fajlu
postoji neki drugi sadržaj osim slike?
Na koji način prijemna strana dekodira dokument? Da li taj način
obezbeđuje da niko osim nje ne može da vidi dokument?
I postoji li još koji program slične namene i da li se njegov princip
šifrovanja razlikuje?
hakeri.278ventura,
-> #276, dr.iivan> > S-Tools 4.0
> >
> > Interesantan programcic koji sluzi za sakrivanje fajlova u BMP i WAV.
> > Sakriveni fajl se kriptuje, sakrije se u sliku/Wav, a slika ostaje ista.
>
> Da li ovaj program radi i obrnuti smer?
Naravno... samo program nije bas najjasniji sto se tice koriscenja, elem,
kratko uputstvo...
otvoriti program i u njega prevuci neki bmp/wav, potom u tu sliku dovuci
neki fajl i upisati zeljenu sifru. potom desnim dugmetom se klikne na
sliku i ide na save ili save as. i onda sliku saljes nekome...
primalac isto tako prevuce tu sliku u program, klikne desnim dugmetom i
ide na Reveal, unosi frazu, i pojavljuje se prozorcic sa sakrivenim
fajlovima, koji se prevlace na zeljenu destinaciju.
hakeri.279ventura,
-> #277, dr.iivan> Da li postoji nacin da strana koja nije prijemna provali da u fajlu
> postoji neki drugi sadrzaj osim slike?
Pa ako pretrpas sliku odnosno ako je slika mala a fajl koji stavljas
veliki onda ce se pri velikom zumu videti mali 'sum' i moze da se
posumnja, ali ukoliko se u recimo sliku od mega stavi text od par
kila, a pritom je slika prepuna boja i ostalih dzidzbidza, gotovo
je nemoguce sa sigurnocu reci da ima u toj slici nesto.
> Na koji nacin prijemna strana dekodira dokument? Da li taj nacin
> obezbeduje da niko osim nje ne moze da vidi dokument?
Procitaj moju predhodnu poruku. Taj fajl koji se umece u sliku se
predhodno kriptuje jakim algoritmom, sto je dosta sigurno.
> I postoji li jos koji program slicne namene i da li se njegov princip
> sifrovanja razlikuje?
Verovatno postoji, mada u ovom programu ima dosta sigurnih algoritama,
i zato je pouzdan...
hakeri.280fear,
-> #275, obrenUspeo si da docars u cemu je kvaka.
Hvala.
hakeri.281fear,
Malo sam procesljavao kroz ranije poruke
u ovj konferenciji i video kriptere
i kad pokusam da da desifrujem onaj
chalenge.txt on mi kaze could not open destination file.
hakeri.282obren,
-> #277, dr.iivan> Da li postoji način da strana koja nije prijemna provali da u fajlu
> postoji neki drugi sadržaj osim slike?
Naravno, tehnika nije 100% imuna na oktrivanje iako je neki danas zovu
i "stealth cryptography" ;) a svi znamo da ono što je stealth nije baš
uvek nevidljivo ;))
Inače steganografija je vrlo korišćen metod u totalitarnim državama koje
zakonima zabranjuju svojim gradjanima da koriste PGP i sl. progame, kao
što je recim Kina. Zanimljivo je da i jedna Francuska zabranjuje svojim
građanima korišćenje "jakih" algoritama i programa za enkripciju.
Ukoliko neki Kinez pošalje e-mail poruku koja u sebi sadrži PGP tagline,
sigurno će biti provaljen i policija će mu pokucati na vrata da se raspita
šta to on krije od države. Međutim, ukoliko isti taj Kinez pošalje svom
prijatelju u Americi PGP-ovan tekst u sklopu slike sa venčanja svoje sestre
i prigodnim propratnim tekstom, najverovatnije neće pobuditi ničiju sumnju
i u toj kombinaciji je glavni štos.
> Na koji način prijemna strana dekodira dokument?
Ako pitaš za S-Tools, odvučeš sliku/zvuk u okvir prozora ovog programa,
klikneš desnim tasterom na sliku i odabereš "Reveal" (i otkucaš lozinku).
> Da li taj način obezbeđuje da niko osim nje ne može da vidi dokument?
Čak i da neko provali da se u slici nalazi utisnuto i nešto više, i dalje
mu ostaje problem kako da razbije to nešto više. Koliko sam video, može se
birati između nekoliko ponuđenih algoritama za jaku enkripciju, među kojima
je i IDEA koga koristi popularni PGP, kao i diskutabilni DES, čija dužina
ključa je prekratka za današnju snagu računara.
Opet, ako gajiš sumnje prema implementacijama koje je odradio autor ovog
programa, datoteku možeš prvo kriptovati ručno pomoću nekog proverenog
programa (recimo PGP) pa tek onda provući kroz S-Tools, čime postižeš čak
tri vida zaštite podataka - dva šifrovanja i jedno kamufliranje ;)
> I postoji li još koji program slične namene i da li se njegov princip
> šifrovanja razlikuje?
Svakako, potraži na internetu ključnu reč "steganography" naći ćeš
sigurno dosta informacija, pa i programa na tu temu. Ipak, ovaj koji
je Ventura poslao je jedan od boljih koje sam video, mada je način
korišćenja pomalo čudan i neintuitivan.
hakeri.283ventura,
-> #281, fear> Malo sam procesljavao kroz ranije poruke
> u ovj konferenciji i video kriptere
> i kad pokusam da da desifrujem onaj
> chalenge.txt on mi kaze could not open destination file.
A ti si ga otvaro u wordu... ql...
BTW malo si zakasnio sa tim dekriptovanjem... svi ti fajlovi su dekriptovani
i nalaze se u istoj konfi.
hakeri.284fear,
-> #283, venturaZnam ali nema ih vise.
CU
hakeri.285aandric,
Jel isao neko na www.srbija.com?
Ono je nevidjena bruka i zahteva osvetu po hitnom postupku!
hakeri.286fear,
-> #285, aandric>Jel isao neko na www.srbija.com?
>Ono je nevidjena bruka i zahteva osvetu po hitnom postupku!
Povajder je prepun (BeoTelNet) i stalno je zauzeto.
Sta je na www.srbija.com? Sta je tako strasno.
hakeri.287ventura,
-> #285, aandric> Jel isao neko na www.srbija.com?
>
> Ono je nevidjena bruka i zahteva osvetu po hitnom postupku!
:)) To stoji tako vec 3 godine...
hakeri.288aandric,
-> #287, venturaAA> > Jel isao neko na www.srbija.com?
AA> >
AA> > Ono je nevidjena bruka i zahteva osvetu po hitnom postupku!
AA>
AA> :)) To stoji tako vec 3 godine...
Moguce, nikad ranije nisam isao.
Sad slucajno odem kad ono: shahovnica.
Jebote, reko, sta je ovo.
Pa sto niko nista ne preduzme?
hakeri.289ventura,
-> #288, aandric> Moguce, nikad ranije nisam isao.
> Sad slucajno odem kad ono: shahovnica.
> Jebote, reko, sta je ovo.
>
> Pa sto niko nista ne preduzme?
A imas isto tako jugoslavija.com
hakeri.290dusandz,
-> #289, ventura)--> A imas isto tako jugoslavija.com
A topic kanala #serbia na DALNetu je 'ZA DOM!'...
hakeri.291killboy,
Sta je ovo bre po srpskim sjtovima?!!!!
hakeri.292aandric,
-> #291, killboyAA> Sta je ovo bre po srpskim sjtovima?!!!!
Ma to samo pokazuje koliko su iskompleksirani i koliko misle samo
na nas.
hakeri.293dr.iivan,
-> #282, obren> Inače steganografija je vrlo korišćen metod u totalitarnim državama koje
> zakonima zabranjuju svojim gradjanima da koriste PGP i sl. progame, kao
> što je recim Kina. Zanimljivo je da i jedna Francuska zabranjuje svojim
> građanima korišćenje "jakih" algoritama i programa za enkripciju.
Pa Francuska je policijska država, po rangu odmah tu negde oko nas :)
Ne priznaje nacionalne manjine, a ima ih dosta sa separatističkim idejama
i sve to jako prikriva. Kad bi se tamo desilo nešto slično bivšoj SFRJ,
od Francuske ništa ne bi ostalo.
> > I postoji li još koji program slične namene i da li se njegov princip
> > šifrovanja razlikuje?
>
> Svakako, potraži na internetu ključnu reč "steganography" naći ćeš
> sigurno dosta informacija, pa i programa na tu temu. Ipak, ovaj koji
Vrlo zanimljiva stvarčica, prvi put čujem za to :)
Hvala tebi i venturi na pojašnjenju.
hakeri.294ventura,
-> #292, aandric> AA> Sta je ovo bre po srpskim sjtovima?!!!!
>
> Ma to samo pokazuje koliko su iskompleksirani i koliko misle samo
> na nas.
A kojim to srpskim sajtovima?
hakeri.295ventura,
Ovo nemoze proci tek tako...
> =========================
> 85476 Za ventura Nije procitano
> Od killboy 04.05.99. 17:30 128 chr
> ---------------------------------------------------
> E sve mi je jasno kako se ulazi u sistem ali
> kako da provalim pass i user name to mi nije jasno.
> Pomagaj molim te.
> Pozdrav
> -------------------------------------------85476---
hakeri.296rkramer,
-> #295, venturaC:\> Ovo nemoze proci tek tako...
C:\>
C:\> > =========================
C:\> > 85476 Za ventura Nije procitano
C:\> > Od killboy 04.05.99. 17:30 128 chr
C:\> > ---------------------------------------------------
C:\> > E sve mi je jasno kako se ulazi u sistem ali
C:\> > kako da provalim pass i user name to mi nije jasno.
Pa objasni coveku... ;)
(NHF, nije moglo da prodje tek tako...)
hakeri.297killboy,
Shta bre ne mozhe da prodje tek tako bre.
Lepo sam te pitao da mi objasnish a ti me tu blamirash.
grrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
hakeri.298aandric,
Da li je nekako moguce pogledati spisak svih fajlova koji se
nalaze na odredjenom mestu na Internetu, bez logovanja na
server? To bi bilo nesto kao otkucati "DIR" u nekom
direktorijumu.
(npr. treba mi informacija o spisku fajlova na
http://members.xoom.com/_XOOM/ggromozeka/aviation/*.* )
hakeri.299ventura,
-> #298, aandric> Da li je nekako moguce pogledati spisak svih fajlova koji se
> nalaze na odredjenom mestu na Internetu, bez logovanja na
> server? To bi bilo nesto kao otkucati "DIR" u nekom
> direktorijumu.
Mislim da bi se sa UUCP-om to moglo uraditi... samo sto server koji
gledas treba da podrzava UUCP
hakeri.300madamov,
-> #298, aandric> (npr. treba mi informacija o spisku fajlova na
> http://members.xoom.com/_XOOM/ggromozeka/aviation/*.* )
FTP klijent Anarchie Pro na Macintoshu to može.
P.S. Što u temu hakeri, pobogu?
hakeri.301aandric,
-> #300, madamovAA> > (npr. treba mi informacija o spisku fajlova na
AA> > http://members.xoom.com/_XOOM/ggromozeka/aviation/*.* )
AA>
AA> FTP klijent Anarchie Pro na Macintoshu to može.
AA>
AA> P.S. Što u temu hakeri, pobogu?
E steta, treba mi za PC.
P.S. Zato sto mi treba za neke manje vise nedozvoljene radnje, a
rekoh verovatno ce neko ko prati ovu temu znati da mi da odgovor;)
hakeri.302ventura,
-> #301, aandric> E steta, treba mi za PC.
Pa nije problem da nadjes emulator mekintosa...
hakeri.303aandric,
-> #302, venturaAA> > E steta, treba mi za PC.
AA>
AA> Pa nije problem da nadjes emulator mekintosa...
Ajd reci mi proceduru i posalji ako mozes emulator za Mac.
hakeri.304ventura,
-> #303, aandric> AA> Pa nije problem da nadjes emulator mekintosa...
>
> Ajd reci mi proceduru i posalji ako mozes emulator za Mac.
Nisam se nikada zezao sa mac-ovim emulatorima, ali na amiginom
emulatoru ide odprilike ovako:
skines neki fajl sa neta, i uz pomoc posebnog programa prebacis
taj fajl u image koji predstavlja amigin disk (ili mountujes
svoj disk, mada neznam dali mac-ov emulator podrzava mountovanje)
i onda pustis emulator i pokrenes program...
hakeri.305dekiz,
Potrebaqn mi je program "KABOOM" ako ga neko ima neka ga posalje ovde
u conf.
LLGS!
hakeri.306killboy,
-> #305, dekiz> Potrebaqn mi je program "KABOOM" ako ga neko ima neka ga posalje
> ovde
> u conf.
> LLGS!
Za shta sluzhi taj program i shta radi?
hakeri.307ventura,
Evo nekih interesantnih fazona iz jedne knjige...
#1
kreirajte neki direktorijum i umesto njegovog imena odkucajte karakter
alt+255, potom se kuca xcopy c:\ c:\(alt+255) /s/e
#2
u neki batch se ubaci:
ECHO Y format c: /q
#3
c:\>debug
-e 100
neki tamo dump....
-g
c:\>
#4
ovaj je najinteresantnij:
u autoexec se ubaci linija
prompt=$E[0;30;40m
i u config.sys
device = c:\windows\command\ansi.sys
ne preporucujem da ovo probavate na svom komp-u...
hakeri.308indi,
-> #307, ventura-> Evo nekih interesantnih fazona iz jedne knjige...
-> ne preporucujem da ovo probavate na svom komp-u...
reci onda priblizno sta bi se deslio kad bi se svaka od
ovih stvarcica uradila
i iz koje je to knjige?
hakeri.309rotten,
Ajd ako neko ima program za skidanje necijeg IP-a neka ga baci!
hakeri.310killboy,
-> #309, rottenImamja ali samo sa ICQ ako ti treba
hakeri.311kiki,
-> #310, killboy> Imamja ali samo sa ICQ ako ti treba
Za koji icq? 98 ili 99?
hakeri.312killboy,
-> #311, kikiValjda za 98 mozhda radi i na 99(isprobano na 98).
hakeri.313indi,
-> #312, killboy-> Valjda za 98 mozhda radi i na 99(isprobano na 98).
e, jeste culi za ver 2000? :)
hakeri.314kiki,
-> #312, killboy> Valjda za 98 mozhda radi i na 99(isprobano na 98).
To sam i predpostavljao, radi samo na 98 verziji.. probano na 99 i ne radi.
hakeri.315killboy,
-> #314, kikiBilo je dosta o tome u nekoj newsgroup-i ne radi valjda zato shto
je drugachiji .exe fajl.
hakeri.316jones,
Ajde ako neko zna kako da dekodira *.pwl fajlove neka
javi...
pozdrav
hakeri.318ventura,
Evo par intervijua sa Kevinom Lee Poulsenom, u jednom od njih se spominje
ona cuvena kradja porsea...
The Kevin Poulsen Story 2: Tattoos and Reform
The Site: So are you rehabilitated?
Poulsen: If nothing else I'm just too old for that sort of thing.
The Site: What's ahead for you? What are you going to do in
the future?
Poulsen: Right now I'm doing political work with a
grassroots organization in Los Angeles. Once my supervision
restrictions are lifted, or if they're eased-- in the last year, my
probation officer has learned a bit more about computers and
he's beginning to feel like he might be able to give me a little
leeway there if I don't have access to a modem or a network
or any location with all of that stuff. Then I would like to, of
course, get back involved with computers. A lot of
opportunities are available now that weren't back when I first
go into this trouble.
The Site: So you have an unusual design on your T-shirt.
Actually that's, you have the tattoo too right?
Poulsen: Yeah, this is based on a prison tattoo, an authentic
prison tattoo that I got.
The Site: What some guy named Rocco came over and
scratched it in your skin?
Poulsen: Well, I don't remember his name. I don't think it
was Rocco. It cost me a lot in cigarettes in order to get it
done.
The Site: Really? And you gave him the drawing and he
tattooed it on?
Poulsen: I Xeroxed my arm, and he...
The Site: But, no, the original tattoo, you drew something
and then..
Poulsen: Yeah, I gave him the concept. and he sort of drew it
out and I said, "yeah, make a change there, make a change
there," and then he slung the ink as they say.
The Site: And now you have this T-shirt. So what, what does
it mean?
Poulsen: I actually don't like to verbalize what it means
because if I could put it into words, then I wouldn't have had
to make it into a picture.
The Site: But now that's part of the great seal of the United
States, isn't that on the back of the dollar bill?
Poulsen: Well it's much older than that. It goes back to
Masonry and it's been linked to the Bavarian Illuminati and...
The Site: It's kind of a cultish kind of a thing, huh?
Poulsen: Yeah. I guess to me it represents the power structure
in general.
The Site: OK. So that's the government?
Poulsen: Right.
The Site: So, for instance, when you cracked radio station
contests and were able to win those contests, does does that
count? It sounds to me like you're taking money.
Poulsen: Well, they were giving the stuff away anyway.
The Site: So why not just have it be you?
Poulsen: Yeah, I mean you could certainly argue that I cost
them in that the credibility of their contests was affected, and
they may not be able to get as good ratings the next time they
do a promotion like that. Yeah, that was definitely a gray
area. Plus, I certainly have victimized the people that played
that contest and thought they had a chance of winning when
didn't or had a much slimmer chance than they would have
otherwise. There's also a feeling in the hacker community
that it's wrong to profit from your hacking. That's actually
something that goes way back to the roots of hacking where
people actually said it was wrong to go to work for a
corporation and be paid to design computers or write
software. So yeah, I definitely crossed the line in some ways.
The Site: Right. I mean you would sit, according to, and now
I would have to say I'm quoting in many cases Jonathan
Littman's book about you, The Watchman. I know you just
rolled your eyes. I've looked at your webpage, and you're
obviously not real happy about it. So before I go on quoting
Jonathan Littman, maybe you should tell me what's wrong
with that book?
Poulsen: It's really readable. I recommend it to somebody
that wants a good, easy read. It's a good story. He wanted it
to read like fiction and so he he wrote it like fiction.
The Site: And yet he interviewed you, he interviewed your
friends, he got a lot of information out of you, right?
Poulsen: Yeah, but he makes things up. I'm not going to say
the entire book is made up, he gets the major events right.
But by changing a lot of little things-- dialogue, things that I
said, things that other people said, or circumstances, or
omitting characters that were involved in certain hacks. He
portrays an overall image that just isn't accurate. It's like he
started with the title; "...the twisted life and crimes of a serial
hacker." And then he wrote the book in such a way that fit
the title and did whatever he had to make that work.
The Site: If I talk about an incident that is not so, that
Jonathan made up, you tell me. But since that, right now, is
the only source we have for information about you, let's talk
about one incident that he talks about, the Mutual of Omaha
basement. You were able to get in, tap into Telenet, which is
the network, the online connection that banks use to send
unencoded information back and forth. At that point, you had
access to unencrypted transactions, passwords, information.
You had the information you needed to steal billions.
Poulsen: Actually, Eric did that. I wasn't involved in the
Telenet tap. He shared some of the data with me. The biggest
catch from that was the California Department of Motor
Vehicles.
The Site: The ability to get information about people through
their driver's license or their vehicle tags.
Poulsen: Yeah, exactly. It came in handy. If I saw suspicious
cars I could run them, and if it comes back with no listing, or
something, well, then I know it's probably the FBI.
The Site: So why did Eric do that. Why didn't he steal all that
money he had access to?
Poulsen: He tried. After he turned me in and went to work for
the FBI, he started doing credit card scams on the sly, and
they tried to arrest him for that. He took off, and as a fugitive
he engineered what would have been a theft of how much? I
think 250,000 dollars from a bank using the same Telenet tap
again, or another one that he set up. But it didn't go through
because he just didn't know what he was doing.
The Site: You certainly had the ability to do this kind of thing
though?
Poulsen: I imagine so, but I never really looked into it.
The Site: You had no interest in doing that?
Poulsen: No. In the radio stations, you know, that was
definitely a gray area. But they were giving the stuff away, so
it didn't feel like theft. Transferring money from one bank to
another, that's outright theft.
The Site: And so you had no interest in doing anything like
that?
Poulsen: No serious interest.
The Site: Yeah. So, a theoretical interest. It sounds like this is
an intellectual challenge more than anything else for you?
What was the pleasure, what was the interest in doing this?
Poulsen: Like I've said before, it it has the same intellectual
satisfaction that ordinary hacking, computer programming,
hardware, has plus the added element of risk and of
adrenaline and having actual opponents you're working
against.
The Site: So going to a job where you would be a security
advisor and hack into banks at their behest to try to help them
with their security would have less interest since there is no
risk in getting caught?
Poulsen: Yeah I think that could be fun because it's getting
around things and finding loopholes, and you get to use the
devious portion of your brain, which is always good to
exercise now and then. But, it certainly wouldn't be the same
as hacking.
The Site: Is there, do you think there's hysteria around the
idea of hacking? I mean that people are going overboard at
the risks that hackers...
Poulsen: Yeah and I think it's, the hysteria is something that
serves a specific portion of society, the government and the
large corporations that want to see more restrictive laws
either governing how we can use technology like the
Internet-- you've seen the Communications Decency Act, the
Communications for Law Enforcement Assistance Act-- their
attempts to legislate encryption. Hackers are useful as
scapegoats, as ways of justifying these more restrictive laws.
The Site: So what's their long term agenda?
Poulsen: The Internet is really an unprecedented use of
technology. It's global, it ignores borders, it's very difficult to
control or to censor, and I think that makes a lot of people
nervous. Their long-term agenda would be to change that and
put more severe restrictions on it.
Are Hackers Dangerous?
The Site: So what do you think? Are hackers dangerous? Are
they a threat to the international community? Obviously
you're not, but others?
Poulsen: I still haven't heard of a case of a hacker doing
anything that's really dangerous. We've been around for a
long time, and there still haven't been any major computer
catastrophes that have been attributed to hackers.
The Site: Is there, do you think there's hysteria around the
idea of hacking? I mean that people are going overboard at
the risks that hackers...
Poulsen: Yeah and I think it's, the hysteria is something that
serves a specific portion of society, the government and the
large corporations that want to see more restrictive laws
either governing how we can use technology like the
Internet-- you've seen the Communications Decency Act, the
Communications for Law Enforcement Assistance Act-- their
attempts to legislate encryption. Hackers are useful as
scapegoats, as ways of justifying these more restrictive laws.
The Site: So what's their long term agenda?
Poulsen: The Internet is really an unprecedented use of
technology. It's global, it ignores borders, it's very difficult to
control or to censor, and I think that makes a lot of people
nervous. Their long-term agenda would be to change that and
put more severe restrictions on it.
The Site: Well, how much of that is because it hasn't
happened, and how much of it is because nobody wants to
tell that it happened? I mean isn't there a bit a coverup going
on?
Poulsen: When a major long distance company's network
fails, the first response is 'hackers did it,' then it turns out to
be a software bug.
The Site: They like to blame you guys.
Poulsen: Yeah when there are power outages because of a
computer error it's the same thing. Hackers have been around
since the beginning of the computer revolution. In fact they,
they basically started the computer revolution. And if
nothing's happened yet, the odds are nothing's going to.
The Site: I want to ask you a little bit about how hackers are
approached. Hackers have some skills that would be useful
for corporations, for governments. Do they ever approach
you and say, "Hack for us? Help us out?"
Poulsen: Not me personally. It's well known that the CIA has,
you know, a computer intrusion program for breaking into
computers in foreign governments, probably for more
corporate espionage.
The Site: So some hacker probably wrote those programs for
them.
Poulsen: That seems pretty likely. It would make sense for
them to go to somebody that's been doing this all their lives,
rather than somebody that just graduated college. The closest
I know of something like that happening, is one of my co-
defendants-- who actually was an informant it turns out--
who worked at a investigative corporate security firm in
Southern California. And this was somebody who had ties to
the intelligence community. But all they paid him to do was
wiretap individuals for the benefit of other corporations that
were paying them, the clients.
The Site: You're talking about Eric?
Poulsen: Yeah. Eric.
The Site: "Eric." How big a problem is this? I've heard
hackers say the real problem is not hackers on the outside,
the real problem is internal jobs done by disgruntled
employees or corporate espionage. Would you agree with
that?
Poulsen: Yeah, it certainly makes a lot more sense to worry
about the people that are inside that have access to the
information or the equipment or whatever directly than to
worry about somebody coming in from the outside. That's
definitely where more of the threat would be. By the time a
hacker gets to the point where he or she can break into
computers at will, they've been around long enough so that
they've also been ingrained with a hacker ethic that would
prohibit them from doing anything malicious like that or
selling information to foreign governments. People that are
inside well they just suddenly have access to this stuff so it
would be...
The Site: They have no ethic, they got the information and
they, for one reason or another, may want to use that.
Poulsen: Yeah. I would say that's where the threat is.
The Site: This hacker ethic is interesting though. It seems
variable. I mean some people believe it's one thing, some
people believe it's another thing. Is there a real code, or is it
just whatever you say it is?
Poulsen: The basic part that never changes is that you are not
supposed to be malicious, you are not supposed to do
damage, and you're not supposed to cost anybody money.
Excepting the money they spend catching you and putting
you in prison. That's unavoidable.
From: sschoenh
Date: 07/31/97 03:34:23 PM AST
Subject: question for kevin
What do you think about this idea? Because of your
experience and because of increasing legal restrictions on the
flow of information, elite hackers sell out and go to work for
the powers that [wanna] be [forever] instead of remaining a
sort of alternative source of information. The powers that be
(megacorps/gov't) get more and more powerful, creating a
true power elite and a class of drones (people who can't hack
well enough not to get caught by the sold out elites). Isn't this
where we're headed?
What are your plans? Are you going to work for The Man?
>>KP<<
I think that hackers have a future as the proverbial fly in the
ointment to the "power elite." As for me going to work for
The Man: Been there; done that.
>>/KP<<
2
From: hont
Date: 07/29/97 12:20:24 PM MST
Subject: Kevin Poulsen
In your previous interview it said that you weren't aloud to
touch a computer until 1999. Are you still reading up on
current technology in the computer world so you don't fall
behind on information, or have you given up on the idea of
ever getting a job and working with computers again? So
much has changed from back in the '80s that it seems that it
would be difficult for you to keep up unless you had the
opportunity to operate a computer and test out new things.
My second question is, were you ever banned from using a
touch tone phone for the phreaking you did way back as a
kid?
-WiL Poulsen 3
From: Steve_Lemanski
Date: 07/24/97 04:51:00 PM CST
Subject: question
What does 1999 hold in store for you, especially with rapid
advancements in technology concerning computers in
conjunction with the dependency life and BUSINESSES
have with computers? Do you have any new interests you
would like to investigate besides your love for phones
meaning "There is no crime if there is no law"? Are you
going to be the proverbial kid in the candy store with a crisp
ten dollar bill?
>>KP<<
I'm still keeping up on developments in technology, but
consider this: Unix was hot in the '80s, it's hot now; HTML is
new, but hypertext isn't; and the Internet is still based on
TCP/IP, just as it was in the beginning. Most of the changes
in the past six years have been social and political, not
technological.
>>/KP<<
4
From: Hotclue
Date: 07/28/97 09:15:23 PM AST
Subject: Your Career Plans
Did you ever try going to work for Bill Gates? He could use
the help. I bet he'd love to have you, although... on second
thought... it's scary imagining what you could probably do to
him...
>>KP<<
Bill hasn't called yet.
>>/KP<<
5
From: allisone
Date: 07/28/97 05:58:07 PM MST
Subject: Constitutional Rights to Privacy on the Internet
Dear Kevin,
In regards to the events you have endured with government
agencies, criminal convictions, incarceration, and the
probationary criteria, have you, either on your own or
through legal counsel, considered the ramifications of the
government eroding away citizens' constitutional rights
through their "unmonitored espionage" on the American
public? I ask this in part due to a discussion with concerned
friends over the fact that government agencies having the
"right" and access to an individual's personal business and
interests. Many ordinary citizens are wary of joining in on the
online information revolution for fear of government
intervention and the possibility of loss of privacy. These
people have a legitimate concern, as I see it. The RICO
[Racketeer Influenced and Corrupt Organizations] act can
lialie person of his or her properiteen I would lik k yxe owpobilitf ce
Myself, I have nothing to hide. No revolutionary agendas, no
illegal pursuits, etc. But I do wonder if this wonderful tool
could be turned against us.
Thanks you for your thoughts on this subject.
Beverly Allisone
AKA Deli Mama :)
Good luck, Kevin, in future pursuits. I think you're an all-
right guy!
>>KP<<
I share your concerns totally. The RICO act, and civil
forfeiture in general, has been terribly abused by the
government. Same with conspiracy laws. The lesson here is
that any expansion of governmental powers will inevitably be
abused by a zealous cadre of True Believers looking out for
Our Best Interests. That's something to keep in mind when
considering laws like "Digital Telephony," proposals to
discourage or restrict the use of strong encryption, and the
emerging double standard for "computer crimes" versus their
low-tech equivalents (a la Kevin Mitnick).
>>/KP<<
6
From: Ufohacker
Date: 07/28/97 03:48:07 PM AST
Subject: I'VE GOT A QUES!!!!!!!
hello i'm Mulder Bean and i wanted to ask you what scifi
book do you like (hacker related) and what kind of Puters do
you like???
>>KP<<
Computers: Mac; anything running Unix
Science Fiction Novels: Shockwave Rider, John Brunner;
Neuromancer, William Gibson; The Watchman, Jon Littman
>>/KP<<
7
From: christer.nissen
Date: 07/28/97 06:22:41 PM ZE2
Subject: Letting the mind free...
Everyone wants to be a famous hacker. Not everyone makes
it. I can only speak for myself, but I have always had a
burning desire to discover new grounds within the different
computer areas. Now I'm planning to join a university to
learn even more... what I want to know (finally.. :-)) is if it's
worth the time... do I get an as solid and complete
understanding of computers that great hackers as Kevin
Mitnick and many others has proven themselves to have-- or
can I learn most things on my own by just reading books?
S w e d e n
>>KP<<
Reading books
>>/KP<<
Toliko za sada...
hakeri.319milosch,
Da li postoji elegantan nacin, ili bar bilo kakav nacin
da se saznaju e-mail adresa ili neki drugi podatci
(provajder, drzava i sl) ako mu se zna trenutno dodeljeni
IP broj.
pozdrav Milos
hakeri.320ventura,
-> #319, milosch> Da li postoji elegantan nacin, ili bar bilo kakav nacin
> da se saznaju e-mail adresa ili neki drugi podatci
> (provajder, drzava i sl) ako mu se zna trenutno dodeljeni
> IP broj.
Uzmi netscan tools, i uz pomoc alatke resolv host, pretvori taj IP
u oblik poput ppp31-11.propvajder.net. posle toga izbaci samo ono pre
provajder.net i upotrebi whois servis na tu adresu, ili idi na
www.networksolutions.com i tamo nadji WHOIS i direktno preko web-a
proveri, i dobices adresu broj telefona, email i ostalo od njegovog
provajdera... posle toga zamolis provajder da ti da odredjene podatke,
i opises sta ti je taj IP uradio... i misim ako oce dace ti ako ne...