======================================================== +HCU Maillist Issue: 241 06/10/1998 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: more junk #2 Subject: re: Next Generation of Crackers #3 Subject: Tazer: Zero - ing partition table ARTICLES: -----#1------------------------------------------------- Subject: more junk hey all, well, i'm not trying to spam the list, but it might seem that way. ;-) an observation from my recent virus incident that seems to fit into the current thread concerning data security, etc. after being virused, i used the 'floppy of death' disk and formatted a total of 4 times. afterwards, i used norton unerase to try to find the original .com file that infected me. i ended up finding almost 40 files, including several icq messages i sent to gthorne and some irc logs. i was only searching for the text 'missilena' (the name of the virus i got). a subsequent search for all recoverable files found over 6,000 files in under %40 of my hard drive's unused space. just an illustration of how depending on a format to clean a drive is not a secure solution. this is software available to Joe User. imagine what real data recovery software might have found...? newbcrack -----#2------------------------------------------------- Subject: re: Next Generation of Crackers Hi, i agree to The Sandman way about hidden activities.Too many ppl want the last essay,lessons,crackme to fill their webpage to make it attractive to 'fashion crackers page'.The only way of mailinglist is not to be largewide spreaded ppl,how many loosy look at an essay and say 'ohh really lame,i could do it too,it's not difficult then'. Close knowledges to lame and not-ready-for-this www guys. The biggest ftp sites where all releases come from are deep closed and hidden and they continue bigger and faster,thats a matter of protection!. You want learn to crack,but now ther is much enough avail on web,dont throw anymore in p pubc web the easy face of crack. +ceban ______________________________________________________ Get Your Private, Free Email at ********************** -----#3------------------------------------------------- Subject: Tazer: Zero - ing partition table Hi to all of you! newbcrack , zeroing partition table is not an answer ! It is a five minute work to rebuild it. Destroying electronic hardware is better, but even in this case the info is still recuperable. Best Regards , Iceman ______________________________________________________ Get Your Private, Free Email at ********************** =====End of Issue 241=================================== ======================================================== +HCU Maillist Issue: 242 06/11/1998 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: gthorne - this one is interesting #2 Subject: none #3 Subject: Hard Drive & Partitions #4 Subject: HDD Deletion #5 Subject: more meditations. HD. ARTICLES: -----#1------------------------------------------------- Subject: gthorne - this one is interesting Message Body = *************** apparently some kind of proggies designed to act like a lie detector online (kinda creepy, thought you guys would wanna take a peek) +gthorne -----#2------------------------------------------------- Subject: none Hi +all! :) I'm giving a look to MS Localization Studio 4.0 right now... IT'S POWERFUL!!! It seems to be a resource editor better than Borland Resource Workshop! The only problem is that it's quite big (the installation files are more than 7 megs)... Have you ever tried it? I remember I tried some time ago to open Winamp with BRW and failed, but this program opens it without any problem and I can see EVERY resource contained in the executable! Nice, really... :) byez, .+MaLaTTiA. -----#3------------------------------------------------- Subject: Hard Drive & Partitions Hi all, I'm no expert on electronics but surly if you were to setup a kinda electro-magnetic pulse or just about any kind of magnetic field (certain frequency ranges are better than a wide range field) around a pc then wouldn't this scramble the data on a hard disk?. If we can't completely ease the data on a hard disk then why not scramble it so that it would be completely unreadable. Since a magnetic field is completely random it would be like using an encryption key on all your data only there wouldn't be any key to de-scramble the data back into it's original format again. The Partition table would also be scrambled as well..:) If you really want to make things even more difficult for anyone to 'read' the hard disk then frying the internal components as suggest a few articles ago would certainly help here as well. Regards, The Sandman -----#4------------------------------------------------- Subject: HDD Deletion I've recently performed a security wipe of my 6.4gb HD and it was SLOW. The only way I can think of to quickly destroy information on a HD is to open up the casing and apply a blowtorch (perhaps with some magnesium powder for good measure). Just taking the case off the computer to get to the HD takes time and if we're talking seconds then the best way would be perhaps to prepare a fake HD hidden under a floorboard and do a quick swap. Regarding a secure chat client. I've heard of some which use SSL and I've seen a chat client at one of the shareware depots (Tucows, I think). I think that some IRC clients also support encryption. ~~ Ghiribizzo -----#5------------------------------------------------- Subject: more meditations. HD. We are speaking on these topics, because we are interested in our security. Through communications we get outside of the house, and we have examined the security of our communications, and we could not get a satisfactory answer as we do not know the range of possibilities of the professionals. And our house is our HD, where all data is stocked, and we have to transform our house in a fortress. Our fortress should resist any attack, logical or physical. 1) Logical. The disk should be inaccessible for : a) reading, even through diskette, even after being brought to a lab, b) writing, for virus protection. 2) Physical. It should be physically inaccessible. Here are some primitive solutions, some of them have been tested. First we begin with ROM. Passwording ROM access is not a good solution as it can easily be bypassed through removing or discharging the battery. Another inconveniance is a great danger of electricity cutdown during ROM manipulations. I had a bad experience of the electricity instant cutdown due to a storm lightning precisely during the computer booting. But reprogramming and upgrading of BIOS contains enormous possibilities. One should do it with a thorough knowledge, it is not a testing field. I have not found any programming documentation; please any information on the subject. Then the booting partition. Manual multiboot: several partitions without multiboot program. Switching is being made either by FDISK or by a disk editor (one has to change 3 or 4 hex numbers in the boot sector). Purpose: to hide certain partitions to the intruder. Programming of the partitions is limited because of BIOS dictatorship. A joined BIOS-BOOT programming would be a brilliant solution to any human or virus intruders. Boot itself is passworded. Then boot loads OS. Split it: a vital part should be on a diskette, which you hide somewhere. OS should know where to search it; in its absence a strong Bell sound is emitted, without displaying the name of the lacking files. As OS constantly needs a flopyy, you should install the second floppy driver. Splitting OS is a temporary solution: one can reinstall the deficient OS. The best solution is elaborating your own OS with its own FAT table with descending compatibility: it can read other 0S files, and no OS can read yours. Writing on HD should be non-sequential and cryptical, to prevent any lab reading. It is the most difficult and time-consuming task and acceptable only for the obsessed by security. It would be also a secure bulwork against virus attacks. After a logical failure, the infuriated assailant would try to destroy it physically. The efficient defence is difficult. Other people have already examined the problem and found a good solution. Those people are in the US, while they have studied the survival of computers and its data in case of a devastating nuclear attack. Their solution: a secure networking, where destruction of a part would not destroy the whole. For our case it would something like this: you create your mini-LAN with secure cables (inside the walls or wireless). You work with a terminal (a small or a diskless computer, a notebook, etc.), the server is physically inaccessible: in a solid locked iron box with some holes for ventilation, it is permenantly chained to something irremovable. It can be dissimulated in the apartment, in underground, in somebody's else apartment, in another building. The rich people can put it even abroad, in an African desert or in Amazonian jungles, as they can support the communications costs. But the long distances encrease the risk of communications interception. For a better security one can put a mirror server in another place. Using anonymously an Internet server as storage, as it was mentionned in our list, is unsecure and acceptable only for data to consult. Another good solution: a removable HD. For those interesting in philosophical approach in solving computer problems, I can recommend the book of P.A.Lee&C.Phillips, "The apprentice C++ Programmer. A Touch od Class", 1997 (ftp.thomson.com, or ************** com, or ************************** AZ111. =====End of Issue 242=================================== ======================================================== +HCU Maillist Issue: 243 06/13/1998 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #0 Subject: this maillist #1 Subject: more meditations. Introduction. #2 Subject: Hard Drive #3 Subject: checksum ? #4 Subject: re:MS localization #5 Subject: different stuff #6 Subject: MS locstudio ARTICLES: -----#0------------------------------------------------- Subject: this maillist Hi +All! :)) Sorry I didn't send the list yesterday... anyway, you should have noticed i usually don't send the ml on saturday: this is because I usually come back home quite late and in this period I need some more time to sleep... :) But don't worry, since I was out yesterday night I send this issue today! :) byez, .+MaLaTTiA. -----#1------------------------------------------------- Subject: more meditations. Introduction. I like classifying everything, typically a librarian work, as it was noticed to me by one of you. It is because of my research experience in libraries. But i go further: after having defined the problem and the available sources, I go straigt to the solution. Do not rebuke me and shut down if you have nothing to propose. I have intentionally used the term 'cryptology' instead of 'cryptography': their reciprocal relations as between reverse engineering and programming. No books on reverse engineering, but the knowledge of programming languages is indispensable for good results. Why especially the assembly language? because of the existance of debuggers, while with high languages you have to posess the source code. J.Duntemann ("Assembly language") qualified a debugger as a cracker's best friend. What would be a cracker without a debugger? It is a case with cryptology. I have no knowledge about probable tools in NSA and in corresponding bodies in other countries. One can add: "And they should not exist for legal reasons. That's why you see no books teaching how to decrypt what was encrypted by somebody else. You can learn only how to encrypt your own files". Well, it's another topic, as with reverse engineering. The point raised here is that in reverse engineering they have tools to open what was written by somebody else. In any a case, some companies, to advertise their product, o pubcly challenge with a price everybody able to break their code, and it helps them to improve it. And there are official results. Another aspect for example: to be protected against eavesdropping, one has first to learn how it is done and the limits. Since I raised the topic, here are some scare references from the cold war annals for those who wants to investigate. 1) Philby references regarding his job in Washington: all encoded wireless messages are systematically registered, waiting for the right moment. As decrypting technique constantly evolves, at certain time it would be possible to crack the ancient, less complicated messages. (compare the +ORC advice to begin with ancient protectionist schemes). 2) At the height of cold war it was revealed that Kremlin local wireless encrypted conversations could be captured from sattelites and decrypted. Indignations in the Soviet press. 3) Western countries were forced to develop decrypting techniques because of the iron curtain, while the Soviets traditionally were relied on humint and interception of communications, and they had a large infrastructure for it. In general, every endoctrinated country tends to humint. 4) Arrest in Teheran of trade representatives of a Swiss company selling encoding machines. Espionage accusations, see press covership. I do not mention numerous cases of physycal stealing of codes, which belong to humint. End of part I. Introduction. Part II. HD is your fortress. (sent as a second message). AZ111. -----#2------------------------------------------------- Subject: Hard Drive Hello Everyone >I'm no expert on electronics but surly if you were to setup a kinda >electro-magnetic pulse or just about any kind of magnetic field (certain >frequency ranges are better than a wide range field) around a pc then >wouldn't this scramble the data on a hard disk?. I think such a device would be hard to control in its output range, unless it was placed inside the hard disk's case. ( intensity verus spread of field ) to destroy data. But then again for scrambling maybe just mounted next to it would do the job. Hello Ghiribizzo Could I please have your Email. I would like to discuss something with you on a one to one. cheers Rundus ______________________________________________________ Get Your Private, Free Email at ********************** -----#3------------------------------------------------- Subject: checksum ? I sort of new at cracking , but I am really interested in this subject. Recently Ive been working on cracking a program which when patched crashes. Using softice Im pretty sure the loader in winnt is detecting that it has been tampered with. Ive downloaded a pe header extraction program which displays the checksum as 0000000. When use softice to load the program it seems like winnt has screwed up the program already. Is there a way using softice to actually debug the loading process Thanks for any help. -----#4------------------------------------------------- Subject: re:MS localization Hi Malattia, you just posted here a stunning view of MS localization but were also fine to post the url where i can get it! I'm not dumb and dont say search the web,i've done it,but a name like localization and common by ms engine is not easy to find and i take much interest to a tool who stund you! anyway,dont take it bad,but spare me a lot of time to look the web! thanks! towntown_at_usa(dot)net ____________________________________________________________________ Get free e-mail and a permanent address at ****************************** -----#5------------------------------------------------- Subject: different stuff First, I enjoy reading the high quality articles of this mail list everyday. Especially +gthorne with his long articles (yes, quality AND quantity) about security is very good. But also the discussion about the "new generation of crackers" is quite interesting. I'm quite sad that a lot of REALLY good crackers and reversers see such bad chances for recruiting new crackers. Some time ago (I think more than a year) I wrote an essay about cracking W32Dasm. It was the last one, afterwards the section was closed. Inside the essay was a little failure, which crashed some version of Win95. I'm still getting eMails from people who try to follow the essay and fail on this little mistake, done by me. That should tell us, that there aren't only a lot of people producing hits at fravia's page, but there are also people reading and trying to understand these essays. New crackers are coming and they will learn how to crack. One and a half year ago, I were only able to program, but then I found fravia's page and I learned how to crack. In my opinion this process of finding and learning is still going on, but would prevented by closing this wonderfull site. Lord Caligo wants to retire and fravia also doesn't want to continue his wonderfull work (as mentioned in the last "blackbord", I hope this was a joke). I hope that the good sites on the inet will stay, cause this will give a chance to the willing people. TWD -----#6------------------------------------------------- Subject: MS locstudio >Hi Malattia, >you just posted here a stunning view of MS localization but were also >fine to post the url where i can get it! Ehee... :) I'm sorry, but I don't know... really, I got it from a friend of mine and I don't even know if it's online! Just wanted you to know it exists and maybe find it... if it's not online I can upload it somewhere, but I need A LOT of space, because it takes about 8 megs... and one last thing: are you interested in it? Will you download it? Can you give me the space? In this case, I'll upload it ASAP! :)) byez, .+MaLaTTiA. =====End of Issue 243=================================== ======================================================== +HCU Maillist Issue: 244 06/14/1998 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: Contacts #2 Subject: security, cfs, unix. #3 Subject: Re: New Generation of Crackers #4 Subject: +HCU ML Issue 243 space for malattia #5 Subject: HDD deletion (resend due to replay down) #6 Subject: re:MS Localization ARTICLES: -----#1------------------------------------------------- Subject: Contacts I was going to arrange some sort of contact database, but then cracking.net had one so I left it. It's sometimes hard to contact other crackers. A trick is to do a xxx.home.ml.org search as many crackers use ml. There is a contact list on the forum, but the format isn't the best it can be for this sort of thing. Anyone got time and space to set up someting better? ~~ ************************ -----#2------------------------------------------------- Subject: security, cfs, unix. Hi People in our "line of work" can never be paranoid enough, start protecting yourselvs. get CFS, cryptographic file system: ************************************************************************** Let me tell you about some sick idea of mine, I took an old 486 box, installed OpenBSD on it, installed a 2gig HD, installed CFS, installed SAMBA, and 100mbit network card. now, all the file my windoze box uses, are mounted via a network drive connected w/ a 100mbit link to the 486 box which uses CFS to protect my files, sambaD is running as a fileserver. that's all I have to say for now, protect your files ;) bye, acpizer. -----#3------------------------------------------------- Subject: Re: New Generation of Crackers Greetings everyone, > But also the discussion about the "new generation of crackers" is quite > interesting. > I'm quite sad that a lot of REALLY good crackers and reversers see such bad > chances for recruiting new crackers. As long as there are sites like Fravia to show *cracking* in it's true light, without the myths normal associated with *cracking* there will always be the knowledge and encouragement to those seeking to become *crackers*. I for one hope that Fravia isn't seriously thinking of discontinuing with his work (yep, I read the blackboard too), such a loss will leave a vacuum on the web that would take a very long time to fill. There is no question about restricting support or help towards new crackers (my homepage is devoted 100% to Newbies interested in Reverse Code Engineering) the point that was made earlier was that there are more people who are interested in learning only the basic's of cracking (in which case reading essays and tutorials on this subject will be enough for them to get where they want) to those who have greater aspirations and so seek further knowledge and support from experienced crackers. It's these potential crackers with greater aspirations that of course, should be offered all the help and support they need, but it can be sometimes hard to see them among so many who are only interested in this subject. Newbies finding their way to this mailing list on their own initiative is one good example of those who wish to go further. I had an email from a Shareware Author today (who's program I had cracked and had posted an essay on how to crack his program on my web page) who said:- >>>>> Based on my own research, "warez" access is probably the third best point-of-approach leading to sales behind media and retail access. If it were possible within the law, I would connect myself with a warez group I knew could give my software wide distribution in cracked form, because over the last five products I have produced, there has *always* been a significant sales leap within a month or two of hearing a report from a user that my software had been cracked. I will fight any publisher to the limit to get protection minimized for this very reason. The single serial was chosen with all due consideration to the consequences. Had I to do it over again, I'd not have done more than pop a splash nag on installation. This is the only one of my personal releases which I have ever truly crippled, and it was a horribly expensive mistake. I have a page up at **************************************************** that explains my position on software copyright to some degree...my publishing agreements prevent me from speaking my mind and experience as I'd like.<<<<<<<<<< This author has some interesting ideas on Shareware & Freeware that makes worth while!. His main webpage is at: ************************************************** Regards, The Sandman -----#4------------------------------------------------- Subject: +HCU ML Issue 243 space for malattia Ehee... :) I'm sorry, but I don't know... really, I got it from a friend of mine and I don't even know if it's online! Just wanted you to know it exists and maybe find it... if it's not online I can upload it somewhere, but I need A LOT of space, because it takes about 8 megs... and one last thing: are you interested in it? Will you download it? Can you give me the space? In this case, I'll upload it ASAP! :)) -*------------- Make a chez page with faked front and upload behind just for us ******************* (faked front IN FRENCH) (ne puoi trovare quante vuoi su mygale.com :-) NON mandare il programma troppo in giro (la general maillist NON E' SICURA) later fravia+ -----#5------------------------------------------------- Subject: HDD deletion (resend due to replay down) I've recently performed a security wipe of my 6.4gb HD and it was SLOW. The only way I can think of to quickly destroy information on a HD is to open up the casing and apply a blowtorch (perhaps with some magnesium powder for good measure). Just taking the case off the computer to get to the HD takes time and if we're talking seconds then the best way would be perhaps to prepare a fake HD hidden under a floorboard and do a quick swap. Regarding a secure chat client. I've heard of some which use SSL and I've seen a chat client at one of the shareware depots (Tucows, I think). I think that some IRC clients also support encryption. ~~ Ghiribizzo -----#6------------------------------------------------- Subject: re:MS Localization HI Sure i download it,but i've no fixed ftp or kinda stuff,strange to be the only one who want use this tool!tell me atleast where i can contact you in case of quick location on common free web for this.. towntown_at_usa_dot_net cya ____________________________________________________________________ Get free e-mail and a permanent address at ****************************** =====End of Issue 244=================================== ======================================================== +HCU Maillist Issue: 245 06/15/1998 -------------------------------------------------------- Send Articles To:......................... ************* Info, Help, Unsubscription, etc:....... **************** Web Repository.........................hcuml.home.ml.org ======================================================== CONTENTS: #1 Subject: ms localization #2 Subject: gthorne - MS Localization and crypting #3 Subject: A Few Thoughts #4 Subject: none ARTICLES: -----#1------------------------------------------------- Subject: ms localization This is a multi-part message in MIME format. ------=_NextPart_000_0014_01BD9819.76C26E60 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Hi .+MaLaTTiA, I would like to aquire MS Localization Studio 4.0 from you. I will be = happy to provide the space.=20 let me know when you are able to, & I will organise it. I will then = handle others requests for the prog if interest is there. Thanks=20 HaQue [icq 1129107] boney(at)senet(dot)com(dot)au ------=_NextPart_000_0014_01BD9819.76C26E60 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable