CONNEXION Connexion INSCRIPTION
rss
Plateforme de Hacking

Vous trouverez dans la rubrique article de nombreux tutoriels afin de mieux comprendre la sécurité informatique,
ainsi que différents articles plus poussés
Hacker
  • sniffing
  • cracking
  • buffer overflow
  • créations d'exploits
  • social engeneering
  • l'anonymat sur le web, spoofing
  • Bypass-proxy, Bypass-firewall
  • injection de code SSI, SQL, etc...
  • Utilisation d'exploits, crétion de scripts(php, irc, perl)
  • Cours en ligne
We make porn
Challenges
Vous pourrez également participer à de nombreux challenges en constant renouvellement (si possible :p)
Dernièrement, les missions relativent aux derniers produits open sources marchent bien :)

Votre ultime challenge sera de défacer HackBBS. De nombreuses failles sont présentes. A vous de les trouver et de les exploiter.

Cet ultime test permettra de constater votre réactions face à une faille.
Black ou White? ^^

Ezine du moment: PHRACK/phrack43/p43-01.txt
                              ==Phrack Magazine==



                   Volume Four, Issue Forty-Three, File 1 of 27



                                 Issue 43 Index

                              ___________________



                               P H R A C K   4 3



                                  July 1, 1993

                              ___________________



       ~ finger whitehouse.gov and make a secret service agent come ~





Well, here it is:  Phrack 43.  This issue should really piss every security

professional off.  Well, actually, none of them should ever see it because

only two people have registered their subscriptions.



But, then again I think we all know that the whole world is FULL of

lying, thieving people who just don't care about other people's

property.  No, smarty, not hackers...computer professionals!



CASE 1:



The Computer Emergency Response Team.  Bastions of life, liberty and the

pursuit of happiness.  CERT had been on the Phrack mailing list

previously, and was sent a copy of 42 (as was everyone) to give them

the opportunity to subscribe.  Rather than do the right thing

and let us at Phrack know that they were not interested in paying,

and to take their name off the list, Ed DiHart instead forwarded off

several copies to his cronies.



Luckily for us, Ed is not the best typist, and the mail bounced all the way

back to Phrack.  I called Ed and asked him why he would do such a thing,

which was clearly a direct violation of US Copyright Law.  Ed claimed

he didn't know of any new rules for Phrack, and that he had always forwarded

off a few copies to his pals.  I told Ed that this practice was unacceptable

and that if he wanted to continue to get Phrack he and his pals would all have

to register their subscriptions.  Ed said that he did not want to pay

and to take CERT off the list.



A month prior to this Ed had said to me at the Computers, Freedom & Privacy

conference in San Francisco, "Why are YOU here anyway?  It sure is IRONIC

that someone whose goal in life was to invade other people's privacy would

be attending a conference on protecting privacy."  I walked away from him in

disgust.



While talking to Ed about Phrack I said, "You know Ed, it sure is IRONIC

that an organization such as CERT, whose main goal is to help protect

the property of others would so flagrantly violate US Copyright law and

completely disregard someone's property rights."  Man, did that feel great!





CASE 2:



BT Tymnet.  Dale Drew, security guru, made the statement on IRC about

Phrack, "I have absolutely no desire to pay for anything having to do with

hackers."  Later, someone from Dale's machine at BT Tymnet (opus.tymnet.com)

logged into Len Rose's machine and ftp'd Phrack 42.  With prior knowledge

Phrack was not free, he willingly used company property to commit a crime.

At most companies, that is grounds for termination.  Luckily for Dale

Tymnet doesn't give a shit.  In fact, Dale several times since has gone

back on IRC stating, "People here are Tymnet are kind of upset about

Phrack 42."  This just shows that people at Tymnet are just as criminal

as they say hackers are.  Since they could care less about MY property,

then why should I care about theirs?  Maybe I should print a list of

all Tymnet internal NUIs!  Well, two wrongs won't make a right, so I better

not.



I did, however, send email to Dale stating that we were aware of Tymnet's

transgressions and that we may be forced to take legal action.  I have

decided to offer BT a sweet deal on a company-wide site license.  We

shall see if they take me up on this offer, or continue to steal Phrack.



CASE 3:



Gail Thackeray.  A woman sworn by the court to uphold the laws of the

land.  This woman had the audacity to tell me that unless I

enforced my copyright, it was worthless.  Unless I enforce it.  What the

hell does that mean?  Am I supposed to raid companies myself and

go dig for evidence that they have stolen my information?  Geez...it's

not like I'm Bellcore.  Gail's disgusting interpretation of the law,

that unless you are big enough to stand up for yourself then you have

no recourse, is a festering sore on the face of the American Legal system

and I personally am appalled that this woman is allowed to act as

a law enforcement professional.



Oh well, as you can tell I've had a little fun with all this.  And I have

effectively proven my point.  Security people, corporate professionals,

and law enforcement types are just as unscrupulous and unethical as they

have always claimed that we are.



Only TWO PEOPLE within the computer/legal/security profession have the right

to receive and keep copies of Phrack.  Winn Schwartau, and a man at Mitre.

It's amazing that they are the only ones with any scruples, isn't it?



Well, let's get on with the issue.  This one is pure, unadulterated evil.

Only the strong will survive this time.  We've got Cellular, we've got

Novell, we've got 5e, we've got PHRACK TRIVIA!  Get comfortable, grab

your favorite intoxicant, and enjoy.



*NOTES*  Some of you will recognize the 5ESS file from the Summer issue of

2600 magazine.  This file was sent to both myself and E. Goldstein.  I

was told by the author that 2600 was not printing it.  Wrong.  Well, we

got permission from 2600 to print it here too since its such a good file,

and since I spent like 8 hours dealing with the author correcting

and editing it.  In the future gang, if you send something to Phrack AND

to 2600, TELL US BEFOREHAND!  The last thing I want to hear is, "Phrack

is plagiarizing 2600...gawd they are so lame."  The acronym file, you will

note, is DIFFERENT.  Heh.



In addition to the above, you may notice that we were a bit late in

distributing this issue.  As many of you saw through the "resubscribe"

blurb sent over the mailing list, Phrack is not going through Stormking.COM

any longer.  The struggle to relocate put us into further delays

but I've managed to take care of securing a new distribution site.

We want to thank everyone at Stormking for shipping Phrack out for

so long, and wish them the best in their future endeavors.



-------------------------------------------------------------------------

                        READ THE FOLLOWING



                IMPORTANT REGISTRATION INFORMATION



Corporate/Institutional/Government:  If you are a business,

institution or government agency, or otherwise employed by,

contracted to or providing any consultation relating to computers,

telecommunications or security of any kind to such an entity, this

information pertains to you.



You are instructed to read this agreement and comply with its

terms and immediately destroy any copies of this publication

existing in your possession (electronic or otherwise) until

such a time as you have fulfilled your registration requirements.

A form to request registration agreements is provided

at the end of this file.



Individual User:  If you are an individual end user whose use

is not on behalf of a business, organization or government

agency, you may read and possess copies of Phrack Magazine

free of charge.  You may also distribute this magazine freely

to any other such hobbyist or computer service provided for

similar hobbyists.  If you are unsure of your qualifications

as an individual user, please contact us as we do not wish to

withhold Phrack from anyone whose occupations are not in conflict

with our readership.



_______________________________________________________________



Phrack Magazine corporate/institutional/government agreement



   Notice to users ("Company"):  READ THE FOLLOWING LEGAL

AGREEMENT.  Company's use and/or possession of this Magazine is

conditioned upon compliance by company with the terms of this

agreement.  Any continued use or possession of this Magazine is

conditioned upon payment by company of the negotiated fee

specified in a letter of confirmation from Phrack Magazine.



   This magazine may not be distributed by Company to any

outside corporation, organization or government agency.  This

agreement authorizes Company to use and possess the number of copies

described in the confirmation letter from Phrack Magazine and for which

Company has paid Phrack Magazine the negotiated agreement fee.  If

the confirmation letter from Phrack Magazine indicates that Company's

agreement is "Corporate-Wide", this agreement will be deemed to cover

copies duplicated and distributed by Company for use by any additional

employees of Company during the Term, at no additional charge.  This

agreement will remain in effect for one year from the date of the

confirmation letter from Phrack Magazine authorizing such continued use

or such other period as is stated in the confirmation letter (the "Term").

If Company does not obtain a confirmation letter and pay the applicable

agreement fee, Company is in violation of applicable US Copyright laws.



    This Magazine is protected by United States copyright laws and

international treaty provisions.  Company acknowledges that no title to

the intellectual property in the Magazine is transferred to Company.

Company further acknowledges that full ownership rights to the Magazine

will remain the exclusive property of Phrack Magazine and Company will

not acquire any rights to the Magazine except as expressly set

forth in this agreement.  Company agrees that any copies of the

Magazine made by Company will contain the same proprietary

notices which appear in this document.



    In the event of invalidity of any provision of this agreement,

the parties agree that such invalidity shall not affect the validity

of the remaining portions of this agreement.



    In no event shall Phrack Magazine be liable for consequential, incidental

or indirect damages of any kind arising out of the delivery, performance or

use of the information contained within the copy of this magazine, even

if Phrack Magazine has been advised of the possibility of such damages.

In no event will Phrack Magazine's liability for any claim, whether in

contract, tort, or any other theory of liability, exceed the agreement fee

paid by Company.



    This Agreement will be governed by the laws of the State of Texas

as they are applied to agreements to be entered into and to be performed

entirely within Texas.  The United Nations Convention on Contracts for

the International Sale of Goods is specifically disclaimed.



    This Agreement together with any Phrack Magazine

confirmation letter constitute the entire agreement between

Company and Phrack Magazine which supersedes any prior agreement,

including any prior agreement from Phrack Magazine, or understanding,

whether written or oral, relating to the subject matter of this

Agreement.  The terms and conditions of this Agreement shall

apply to all orders submitted to Phrack Magazine and shall supersede any

different or additional terms on purchase orders from Company.



_________________________________________________________________



            REGISTRATION INFORMATION REQUEST FORM





We have approximately __________ users.



We desire Phrack Magazine distributed by (Choose one):



Electronic Mail: _________

Hard Copy:       _________

Diskette:        _________  (Include size & computer format)





Name:_______________________________  Dept:____________________



Company:_______________________________________________________



Address:_______________________________________________________



_______________________________________________________________



City/State/Province:___________________________________________



Country/Postal Code:___________________________________________



Telephone:____________________   Fax:__________________________





Send to:



Phrack Magazine

603 W. 13th #1A-278

Austin, TX 78701

-----------------------------------------------------------------------------





Enjoy the magazine.  It is for and by the hacking community.  Period.





      Editor-In-Chief : Erik Bloodaxe (aka Chris Goggans)

                3L33t : OMAR

                 News : Datastream Cowboy

          Photography : dFx

          Pornography : Stagliano

    Prison Consultant : Co / Dec

          The Baddest : Dolomite

             Rad Book : Snow Crash

     Reasons Why I Am

         The Way I Am : Hoffman, Hammett, The Power Computer

               Typist : Minor Threat

    Future Movie Star : Weevil

   SCon Acid Casualty : Weevil

            Thanks To : Robert Clark, Co/Dec, Spy Ace, Lex Luthor

                        Phreak Accident, Madjus, Frosty, Synapse, Hawkwind

                        Firm G.R.A.S.P., Aleph One, Len Rose, Seven-Up

                        Computer Crime Laboratories



"If you can take the bag off of your own head, then you haven't had

enough nitrous."  -- KevinTX



Phrack Magazine V. 4, #43, July 1, 1993.     ISSN 1068-1035

Contents Copyright (C) 1993 Phrack Magazine, all rights reserved.

Nothing may be reproduced in whole or in part without written

permission of the Editor-In-Chief.  Phrack Magazine is made available

quarterly to the amateur computer hobbyist free of charge.  Any

corporate, government, legal, or otherwise commercial usage or

possession (electronic or otherwise) is strictly prohibited without

prior registration, and is in violation of applicable US Copyright laws.

To subscribe, send email to phrack@well.sf.ca.us and ask to be added to

the list.



                    Phrack Magazine

                    603 W. 13th #1A-278       (Phrack Mailing Address)

                    Austin, TX 78701



                    ftp.netsys.com            (Phrack FTP Site)

                    /pub/phrack



                    phrack@well.sf.ca.us      (Phrack E-mail Address)



Submissions to the above email address may be encrypted

with the following key : (Not that we use PGP or encourage its

use or anything.  Heavens no.  That would be politically-incorrect.

Maybe someone else is decrypting our mail for us on another machine

that isn't used for Phrack publication.  Yeah, that's it.   :) )



-----BEGIN PGP PUBLIC KEY BLOCK-----

Version: 2.1



mQCNAiuIr00AAAEEAMPGAJ+tzwSTQBjIz/IXs155El9QW8EPyIcd7NjQ98CRgJNy

ltY43xMKv7HveHKqJC9KqpUYWwvEBLqlZ30H3gjbChXn+suU18K6V1xRvxgy21qi

a4/qpCMxM9acukKOWYMWA0zg+xf3WShwauFWF7btqk7GojnlY1bCD+Ag5Uf1AAUR

tCZQaHJhY2sgTWFnYXppbmUgPHBocmFja0B3ZWxsLnNmLmNhLnVzPg==

=q2KB

-----END PGP PUBLIC KEY BLOCK-----





  -= Phrack 43 =-

 Table Of Contents

 ~~~~~~~~~~~~~~~~~

 1. Introduction by The Editor                               24K

 2. Phrack Loopback Part I                                   38K

 3. Phrack Loopback Part II / Editorial                      44K

 4. Line Noise Part I                                        39K

 5. Line Noise Part II                                       43K

 6. Phrack Pro-Phile on Doctor Who                           15K

 7. Conference News Part I by Various Sources                53K

 8. Conference News Part II by Various Sources               58K

 9. How To Hack Blackjack (Part I) by Lex Luthor             52K

10. How To Hack Blackjack (Part II) by Lex Luthor            50K

11. Help for Verifying Novell Security by Phrack Staff       48K

12. My Bust (Part I) by Robert Clark                         56K

13. My Bust (Part II) by Robert Clark                        55K

14. Playing Hide and Seek, Unix Style by Phrack Accident     31K

15. Physical Access and Theft of PBX Systems by Co/Dec       28K

16. Guide to the 5ESS by Firm G.R.A.S.P.                     63K

17. Cellular Info by Madjus (N.O.D.)                         47K

18. LODCOM BBS Archive Information                           24K

19. LODCOM Sample Messages                                   52K

20. Step By Step Guide To Stealing a Camaro by Spy Ace       21K

21. Acronyms Part I by Firm G.R.A.S.P.                       50K

22. Acronyms Part II by Firm G.R.A.S.P.                      51K

23. Acronyms Part III by Firm G.R.A.S.P.                     45K

24. Acronyms Part IV by Firm G.R.A.S.P.                      52K

25. Acronyms Part V by Firm G.R.A.S.P.                       46K

26. International Scene by Various Sources                   51K

27. Phrack World News by Datastream Cowboy                   24K



                                                    Total: 1152K



     Another reason why the future is wireless.



     "The CTIA recommended that the FCC require the microprocessor chip be

     difficult to detach from the circuit board in order to prevent its

     removal and replacement or reprogramming."

     (Cellular Marketing, p. 18, May 1993)



     "Damn, and I was hoping to replace this 8051 with a P5! HAHAHAHAHA!"

     (Anonymous hacker-type, Tumbled Cellphone Call, 1993)



_______________________________________________________________________________


Manifest
Le but de ce site est de mieux comprendre la sécurité informatique.
Un hacker par définition est une personne qui cherche à améliorer les systèmes d'information dans le seul et unique but de contribuer à la stabilité de ces systèmes!
La croyance populaire laisse entendre que les hackers sont des pirates.
C'est vrai. Mais il y a différents types de pirate.
Tout comme il y a différents types de personnes.
Les bavures courantes auxquelles on pense lorsqu'on évoque le terme de pirate informatique
seraient les hacks de compte msn, ordinateurs lâchement trojantés avec des exploits déja tous faits
et encore peut-on classifier en tant que hack le fait de spammer
alors que depuis plus de 15 ans des scripts déja tous faits le font déjà extrèmement bien?

Ce ne sont pas des hackers qui font ça!!!
Nous appelons ces gens des lammers! Quand ils sont mauvais,
ou des black hat lorsqu'ils sont doués dans la mise en application de leurs méfaits.
Aucun amour propre - Aucune dignité
Agissent par dégout, vengeance ou simple plaisir.
Les raisons peuvent être nombreuses et je ne prétends pas devoir juger qui que ce soit.
Je pense juste que l'on ne doit pas utiliser l'épée de fly pour commettre des injustices.
Il est 100 fois plus profitable d'améliorer un système que de marcher sur un château de sable... même si marcher sur un château de sable est rigolo :P
A vous de trouver votre amusement. ;)

Tu peux réagir sur la shootbox


Disclaimer Veuillez lire obligatoirement les règles ci-dessous avant de consulter ce site. Conformément aux dispositions des différentes lois en vigueur, intrusions et maintenances frauduleuses sur un site, vol et /ou falsification de données. Vous ne devez en aucun cas mettre en application les stratagèmes mis en place par ce site, qui sont présentés uniquement à titre d’éducation et de recherche dans le domaine de la protection de données. Vous ne devez en aucun cas utiliser ce que vous aurez découvert, sauf si vous avez une autorisation écrite de l’administrateur d’un site ou que celui-ci vous ai ouvert un compte uniquement pour la recherches de failles. Tout cela est interdit et illégal ne faites pas n'importe quoi. Vous acceptez donc que l'administrateur de ce site n'est en aucun cas responsable d'aucun de vos actes. Sinon quittez ce site. Vous êtes soumis à ce disclamer. ET A CE TITRE, NI L'ADMINISTRATEUR, NI L'HEBERGEUR, NE POURRONT, NI NE SERONT RESPONSABLE DE VOS ACTES.