PPN – Concepts of Echelon by Phonetap – November 07, 1999

PPN – Concepts of Echelon by Phonetap – November 07, 1999

The Phone Punx Network Presents--Phone Punx Magazine------Issue three----"We are the phony in telephony"November 07, 1999Last Updated: November 07, 1999http://fly.to/ppn(Mirror: http://worship.to/ppn)phonepunx@yahoo.com Contents ~Intro by Mohawk ~Beginners Guide to the DACS, Part One by BitError ~CallerID: Up close and Personal by hatredonalog ~DATUs - The Tool of the New Age Phreak: Part II by MMX ~Frequency Counters by Black Axe ~An Overview of Trunked Radio Systems by.....

AoMess Read Me


AOMess v3.0 FiNaL! Sept 1995
I now present you with a non-beta, complete MeSS!
Featuring:
– Mass Mail
– Bust In
– Three-line scroller
– Find Mail
– The LynX CD Player
– Mail Bomb
– BombFixer
– Punter
– DriveHell
– AOMESSage
– Da UsuaLs
– Options Saver
– Load AOL
– a clock…… so you can see how long ago you should have
gone to sleep.

ACK Tunneling Trojans


ACK Tunneling Trojans

– Arne Vidstrom, arne.vidstrom@ntsecurity.nu
Summary

Trojans normally use ordinary TCP or UDP communication between their client and server parts. Any firewall between the attacker and the victim that blocks incoming traffic will usually stop all trojans from working. ICMP tunneling has existed for quite some time now, but if you block ICMP in the firewall you’ll be safe from that. This paper describes another concept, that I call ACK Tunneling. ACK Tunneling works through firewalls that don’t apply their rule sets on TCP ACK segments (ordinary packet filters belong to this class of firewalls).

ACK Tunneling Trojans


ACK Tunneling Trojans

– Arne Vidstrom, arne.vidstrom@ntsecurity.nu
Summary

Trojans normally use ordinary TCP or UDP communication between their client and server parts. Any firewall between the attacker and the victim that blocks incoming traffic will usually stop all trojans from working. ICMP tunneling has existed for quite some time now, but if you block ICMP in the firewall you’ll be safe from that. This paper describes another concept, that I call ACK Tunneling. ACK Tunneling works through firewalls that don’t apply their rule sets on TCP ACK segments (ordinary packet filters belong to this class of firewalls).

Lithium Node

Lithium Node

About Lithium NodeIt all started back in June of 1996. Some guy in a chat room gave me my first prefix, 4019-1, and I used that to sign on AOL for free. I soon got a list of invokes, which were the "in" thing at the time. One of the invokes at the bottom of the list (40-13 785) led to an area which contained.....