lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <KIMBN5MCNSGID5PRD3IBCCHWB2N5BRF3D4GONSFQ@ziplip.com>
From: phrackstaff at ziplip.com (Phrack Staff)
Subject: New Hacking Zine: p62 (formatting corrected)

How the hell can people make the claim that p62 is "fake" or a "hoax"?
Exactly what part of the magazine is "fake" ?

1. All logged/sniffed AIM/IRC conversations are 100% real and unmodified.
2. All logs of people's home dirs/w/who output, etc were 100% real and unmodified (except for some dates edited out)
3. REAL working code to protect your privacy by providing a secure unlink() mechanism.
4. REAL working code to bypass tripwire.
5. REAL working highly advanced shellcode to be used in exploits.
6. REAL lists of uncovered Honeynet machines.
7. REAL code to evade logging under a Sebek-enabled system.
8. REAL copies of trashed documents which took time to be retyped.
9. REAL copies of tools/exploits from the hacking community in the Toolz Armory.
10. REAL working LKMS for Solaris/Linux to detect local Honeypots.
11. A REAL unprecedented article on how to use DMS100 systems.
12. A REAL unprecedented article on how to write Plan9 shellcode.
13. A REAL instructive article with helpful code for writing LKMS.
14. REAL working code to disrupt snort (the author had never heard of the original sneeze which came to his attention after the fd-threads, and besides sneeze.c is leaps and bounds ahead of sneeze.pl)
15. REAL authentic logs of a snort compromise which Marty Roesch claimed were in the distant past, but if you look at the filenames, you will realize that it could have been no longer than a year old at most.
16. REAL authentic information regarding iDEFENSE contractor purchases.


Since the goal of p62, as you may have read in the introduction, was to be a "hacking" magazine, it follows blackhat principles - ie, the release of information that could not possibly be used to do any good. That means, these articles should not provide information that could be used by whitehats. Which restricts the scope of topics that can possibly be discussed. Nevertheless, p62 was probably the most valuable phrack in the entire history of the magazine, because it blended technical writing, real hacking, political writing, anarchy, and phreaking into a seamless whole. 

If "fake" means that p62 was written by non-hackers, then you are correct. I challenge anybody on this list to disprove any one of these 16 points I have listed. After you are done accepting all of them as correct, stand back and look at that list, take into consideration its sheer size and magnitude... ponder its greatness, and muse a bit over the comic genius which binds the phrack62 magazine together as a whole.

And by the way, feel free to use this as an email address for flames/responses/p63 submissions.

Cheers,
Phrack Staff


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ