__ _____ __ ___ _ ______ __ _ _ __ ___ / _ __ ____ _ ( ) ___)\ /______ ______ _________ \ / ___ _____ ___)\ ___ __. _____ | /_ \ | /_ / | ___\ | (/ || // _ | | _ __ __ _ _ _\\ | | _______ |:(/ ( ) | | ( ) ) \/_ \ /( )\ ( ) \\| | /_ ____ ||\\ | | | | | | ) ) / ___) \\ | //__ || \\ | | | | | | | | \ (___ __ _ \) | // || \\_ __| |__| |__| | | |_ \_______ __ | |// ____ __/ | \___ ____ _ _ _ _ _ __ ______) | (/ / __ __ )/ \ \| | / / \ \ (\_____/ /___ _ ___ _ ____ \ ) \____ _____ __ __ Dense Wavelength Division Multiplexing _ _ ( 30 ) | | c/a 8.2002. _____________________________________________________________________________ » .- Words from the Editor -. « | *: [-] Introduction .......................................... The Clone :* *: (-) Contact Information ................................... The Clone :* *: (-) Link of the Month ..................................... The Clone :* *: (-) K-1ine Mirrors ........................................ The Clone :* ____________________________________________________________________________ » .- Documents -. « | *: (x) 'Review #1 of VoodooMagickBox' ......................... The Clone :* *: (x) 'Review #2 of VoodooMagickBox' ......................... Voodoo Boy :* *: (x) 'Challenge-Response Authentication for Dummys'.......... Fractal :* *: (x) 'Caller ID Spoofing through TELUS' ..................... Lucky225 :* *: (x) '1080 / Generic Open-Proxy List' ....................... Smev :* ____________________________________________________________________________ » .- E-mail -. « *: (x) 'Rogers AT&T Billing Vulnerability (E-MAIL UPDATE)'..... :* *: (x) 'Miscellaneous ANI/ANAC #'s' ........................... Colt45 :* _____________________________________________________________________________ » .- Conclusion -. « | *: [-] Credits ............................................... The Clone :* *: [-] Sorry's ............................................... The Clone :* *: [-] Shouts ................................................ The Clone :* _____________________________________________________________________________ Introduction - Welcome to the latest issue of K-1ine #30 'Dense Wavelength Division Multiplexing'. Thanks to all the for submitting articles. Enjoy this issue of K-1ine zine, and don't forget to send me more articles in the future. Peace out, and support the scene. --> Contact Information; Comments/Questions/Submissions: theclone@hackcanada.com Check out my site: (Nettwerked) http://www.nettwerked.net --> -- ----------------------------------------------------------------------- --=[ LINK OF THE MONTH ]=-- Every month I post one really great "link of the month" on every issue of K-1ine magazine. The link can be anything in the technology industry, music scene, rave scene, punk scene, or even a good article you read on a news site. I'll be taking submissions via e-mail or IRC right away; so get your links in and maybe you'll see it in the next issue of K-1ine! For the month of August, the link of the month is: http://www.rtms-by-eis.com/pagesDownloads/downloadSoftware.html 'Electronics Integrated Systems - Remote Traffic Monitoring System (RTMS)' [submitted by: The Clone] --==================================================================-- K-1ine Mirrors: http://www.mirrors.wiretapped.net/security/info/textfiles/k1ine/ (Now mirrored in two places, one in Belgium and another in Sydney) "Wiretapped.net is an archive of open source software, informational textfiles and radio/conference broadcasts covering the areas of network and information security, network operations, host integrity, cryptography and privacy, among others. We believe we are now the largest archive of this type of software & information, hosting in excess of 20 gigabytes of information mirrored from around the world." --------============================================================-- -- Review of 'VoodooMagickBox' Many science fiction writers, hackers, and techies have discussed the future as a place where wetware technology is prevalent in our lives. One idea that floats around in these circles is that of "digital drugs". A person, sometimes an habitual drug user, would have a piece of small computer hardware which they would hook up to a part of their body, and instantly endure affects - head rush, body high, feelings of ecstasy. The digital drug wouldn't have any negative side effects, long-term brain damage, or even contain traces of itself in the users body... albeit the perfect drug. Of course we all know this type of sci-fi technology couldn't possibly exist today, right? Think again, because VoodooMagickBox does just that! The first time I was told about this piece of technology, I was a little bit skeptical. I asked myself: "This little box is going to make me feel like I've had two martinis, or some narcotic? No way!" Well my friends, those claims are completely true. The Experience... When I was originally handed the VoodooMagickBox, I was told that I would need to dabble a small amount of electro-gel on to two ear clips that were attached to a wire that went directly into the box. Then I was told to place the two clips on my ears and slowly turn the knob on the box until I felt a small resistance. I proceeded to follow the instructions. Slowly I turned the knob, and within 30-45 seconds I knew something was happening because everything around me appeared to be breathing. This "breathing" could be described (by some) as a "mini-hallucination". Shortly after the hallucination started, I noticed small bursts of light in my peripheral vision, followed by a feeling of happiness. The happiness can only be described as the same feeling one would get if they drank a glass of strong wine, a couple of martinis, or even smoked marijuana. After approximately 15 minutes, I decided to take the ear clips off and stand up to see if I'd still feel "high". Walking was a somewhat difficult task at first, as my balance felt a bit off and I was still hallucinating and seeing bursts of light from the sides of my eyes. Shortly after, the visual affects wore off, but I still had an ecstasy- like feeling coming over me. For two days I was happier than usual, and didn't feel any anxi- ety; something I've been unsuccessfully trying to deal with my entire life. With the continued use with VoodooMagickBox, I can honestly say it helped the minor anxiety disappear, which is something I never expected to happen from using this box! The perfectly safe, legal, recreat- ional digital drug? Hell yeah! I've recommended it to all my friends and they too have told me they have the same great trips from it. Now I recommend it to you. Has this story made you curious? If so, I suggest purchasing Voodoo Magick Box. Thank you for reading my review, and I hope you enjoy this incredible product as much as I have! - The Clone ( www.VoodooMagickBox.com - PURCHASE IT FROM THIS WEB-SITE ) --- Hey all, Well... where to start? The Voodoo Magick Box... This little toy is incredible. I still remember my first trip about two weeks ago... I know this sounds a bit crazy, but I actually prefer it to alcohol, smoking weed, hash, or poppin' a tab of ecstasy. But its even better when you mix it up. How it works: You attach two little clips to your earlobes. Then you turn the Magick Box on. There is a dial to adjust the strength. You will feel it working immediately. You turn it up slowly to a strong, but comfortable level, then sit back and enjoy... What it does: It's as good as any drug or alcohol induced trip. Almost immediately, you'll notice a flashing-strobe light in your peripheral vision. You wouldn't believe how cool it is when you're tos- sing a couple back at the bar or going hardcore at a rave. Everything seems so surreal, like you're dreaming. You're happy as hell and it's like you just slammed back a couple shots of tequila. Honest to god, you feel as drunk as you want to be. Your body is lighter and you can party with it all damn night. You know that feeling of electricity running over your body after popping a hit of ecstasy. Well, times that by like a hundred. You can turn the box off at anytime. Within a couple minutes, your back to your normal sober self, except for a couple of intense qualities. Stress seems to disa- ppear for hours. You're relaxed and anxiety seems to fade away. That feeling of lightness seems to last for a while, kind of a bounce in your step. They say it improves your memory too. Well, I think its a bit early for me to tell, but anything is better than the fried mind I've gotten from weed. The kick-ass part: You can take it anywhere and use it anytime. Wanna puff a joint ? Go ahead. Afterwards or during, pop the ear clips on and it's an entirely different trip. It's also sustained, so it will save you cash. Save cash by not having to 'pick up' as often. Stronger, longer, incredible trips. Also, it runs on a 9-volt battery, and is supposed to last up to 500 hours. Fuck'n eh. I'm still on my original battery after sharing it with all my friends. Still need another reason? SEX. Yes... sex. Wear it while your having sex. Fuck man, my girlfriend had the most fucking incredible orgasm while wearing it. Not just once, but she came three times in a row. She couldn't even stand for an hour. haha. We're buying a second unit so that both of us can wear one while fucking. They have a two person model too, so that kicks the donkey's ass. I know many of you reading this are still skeptical... The thing costs about $70 US. You're gonna see everybody wearing these boxes in a couple weeks. And for the price of a single 'pick up', you've always got it. If you want one, you can click here or send MagicMan an email. He'll set up. If you live in Edmon- ton, he might even show up and let you try one out first hand. They've got years of testing behind this thing and tons of positive feedback. It 100% safe and 100% legal, so the man can't hassle you about it. You've just got a try it to see what you've been missing... Peace & Happy Tripping! Voodoo Boy ( www.VoodooMachines.com ) -=- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Challenge-Response Authentication for Dummys -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= To often, I see hackers design systems that need security, but they send passwords out as cleartext. Generally, secure authentication is thought to be difficult to do, and often not worth the trouble. However, in our networked world, secure authentication is vital. Automated password sniffers are not only theoretically possible, but doubtlessly already in common use on large, high-bandwidth routers and NAT devices, placed there by hackers or crooked network admins. Ideally, all network communication should be encrypted, but sometimes this is not necessary, possible, or even legal! In any case, if you do develop some sort of network program that needs authentication devices, and you aren't willing to encrypt all traffic, at least use challenge-response authentication. What is Challenge-Response Authentication? ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Challenge-Response Authentication (CRA) is a method for proving your identity over an insecure medium without giving any information out to eavsedroppers that may enable them to identify themselves as you. It should also be noted that CRA is still secure, even if an attacker can modify your messages to the server, although, if you send plain-text messages to the server, and the attacker can still modify THAT, the attacker will just wait for you to authenticate, then take over your connection. How does it work? ~~~~~~~~~~~~~~~~~ CRA fundamentally depends on the existance of "one-way hashes". A one-way hash is a function that takes an input, and returns a "hash". Finding the input of the function from the hash is "computationally infeasible", which, in the case of a decent hash function, means you'll be crunching numbers until the next stone age. Popular one-way hash functions are MD4, MD5, SHA, and RIPE-MD. Let's call this one-way function h(). When the client connects to the server, the server makes up a random value, X. The server sends X to the client. The client sends the server h(X+P), where P is the password. The servers computes h(X+P) as well, and checks to see if the data from the client matches the computed value. If so, the client must know P. A practical example: This example uses the common unix utility "md5sum", which hashes the data on stdin to a 128 bit hash, displayed as 32 hex digits. This example also substitutes concatenation for addition. Assume the password is "mysecretpass" and both the client and the server know this. The client connects to the server. The server makes up some random data, say "sldkfjdslfkjweifj". The server sends this data to client. The client concatenates the random data with the password, resulting in "sldkfjdslfkjweifjmysecretpass" The client computes the MD5 hash of this value: 5>doug@saturn:/home/doug$ echo sldkfjdslfkjweifjmysecretpass | md5sum 4fab7ebffd7ef35d88494edb647bac37 5>doug@saturn:/home/doug$ The client sends "4fab7ebffd7ef35d88494edb647bac37" to the server. The server runs the same command, and since the server (hopefully) got the same result, it lets the user in. How does this provide security? ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Well, notice how that the password is never actually sent out in the clear, and how in order for an attacker to determine the password would be to bruteforce the hash function: a daunting task. Miscellaneous Info ~~~~~~~~~~~~~~~~~~ You understand why this method is called Challenge-Response Authentication now, don't you? No? Well, I suppose this is a for dummies book after all... Notice how the server "challenges" the client and it "responds". A potential weakness in CRA is if the server sends out the same challenge more than once, an attacker who recorded the hash of the first authentication can simply replay the hash, gaining access without even knowing the password. This is easily solved by making the random data large enough to minimize the odds of such an event as much as you want. Even with 16 random ASCII characters of data the odds of this happening are 1 in 340282366920938463463374607431768211456. Actually, a one-way hash need not be used if you have access to an encryption function. Just use the encryption function in place of the hash function. Of course, one more piece of information needs to be kept secret: The key to the encryption function. May as well just encrypt all traffic, if possible. One interesting application of CRA is in packet radio. There are 2 reasons why encrypting the traffic isn't ideal for this medium. Often, packet radio devices are ancient machines barely even capable of conducting serial communications (my dad still uses a Tandy t-100!), and don't nearly have the processing power to handle a stream of encrypted data, but could manage a hash at the beginning of a conversation, or the operator could even have a hashing program on his palmtop or whatnot. Secondly, the CRTC has stipulated that amateur radio operators use no ciphers whatsoever when transmitting on the airwaves, and this includes packet radio. Now I'm not sure if one-way hashes are considered ciphers, so it's a bit of a grey area... I hope I get some ma1lz from the CRTC. Cease and desist. That'd be sweet. Ah yes, speaking of palmtop hashing programs, none exist that I know of. Any palm c0d0rz looking for something to do: This would be a very cool program. Try porting md5sum to the palmtop. You'll probably want to use RSA's md5sum.c reference implementation as it is much less complicated than the version your unix system uses. For a copy of this, and a usage example, (and a pretty neat program if I do say so myself), see my program coinflip: http://www.hcsw.org/downloads/coinflip-1.1.tgz Fractal HardSoft CoreWare www.hcsw.org Shouts ~~~~~~ theclone - Don't take IBM's k-1ine buyout offer!! phlux - You give shouts, you get shouts. :) rt, magma, cyb, everyone on #hackcanada Special thanks to GOBBLES (haha you're a retard) -- Caller ID Spoofing through TELUS by Lucky225 2002-07-16 This was the prepared speach I had for H2K2 however I got cut off early, there are links at the bottom for the CID spoofing software mentioned during the con. Automatic Number Identification, or ANI, was developed by the telephone companies long before Caller ID and was originally developed for billing purposes only. ANI is a service, similar to Caller ID, that displays your phone number to the called party when you place a call, except that because it is used for billing purposes and emergency services you can not block your phone number. ANI was used by telephone companies to determine what number to bill when you placed a long distance call. This service soon became available to toll free numbers and 911 emergency services. The reason it is available to toll free numbers is that when you call one of these numbers it's a free call -- to you -- the company or person who owns the toll free number has to pay for the call, and rates can be different depending on the area the call was placed from, so even if you block your caller ID, your ANI is still sent to the toll free number. ANI, because it supposedly can't be blocked, is used as the premisis for (C)LASS services. What is (C)LASS you ask? well it stands for Custom Local Area Signalling Services. These services are all the overpriced services that the local phone companies are always trying to offer to you, such as *69 Call return, *57 Call trace, Caller ID, etc... Now ANI sounds like the greatest thing since sliced bread, however it is not full-proof. There are two types of ways ANI can be signaled, the newer way is refered to as ANI II which provides a 2 digit code along with your phone number that identifies the class of service of the phone line calling from, for example a payphone's ANI II code is 27, a regular phone is 00, etc... Before ANI II was implemented, the telephone companie's local operator had no way of re-transmitting the number calling from when placing calls to toll free or local phone numbers, instead your ANI would simply read the area code of the operator center and that was it, so if you called a toll free number from a local operator in areacode 909 all that would show as your ANI is 909, this is known as an ANI fail, and just because the 909 shows up does- n't necissarily mean you were calling from the 909 areacode, that's just where the operator was stationed. You can still cause ANI fails today from most local operators though it is said there are a few that do pass ANI with ANI II equipment. ANI Fails causes problems for (C)LASS services such as Call Trace or Call Return, if you place a local call through the operator, though you may be billed operator assited charges so there is a record of the call being placed, if the person you are calling trys to *57 Call trace you they will receive a message that the call could not be traced, this is because there was no ANI provided for the call. Here's where it gets fun, because ANI is used for billing purposes, some- times when you call a toll-free number that offers Collect, third number billing or Calling Card services such as 800-Call-ATT, they also use your ANI to put on the phone bill of the person you call collect or bill third party to, but how can they do this if the call is has an ANI fail? They can't, so generally instead of the automated system you usually get, you will get an operator asking where you are calling from and you can give the operator any phone number you want as where you are calling from. This is where things get interesting. AT&T's operators handle very many calls, they handle calls that come from their 10102880 dial-around, from long distance customers that dial 00 to reach them and of course from calls that come in over the toll-free number. If the operator is not paying close attention she will not notice that you dialed a toll free number to reach her, and you can give her any number you wish as where you are calling from and then say you are a visually impaired customer and need her to dial a toll free number, she will believe that you dialed 00 to reach her, which many visually impaired customers do, and not the toll-free number. In the past AT&T used to use the number you gave them as where you are calling from as ANI and actually passed that ANI along to any toll free number you called, and other telephone company toll-free numbers would allow you to bill long distance calls to the ANI you were calling from, bellsouth was one of these companies, you could simply call 1-800-bellsouth from your home phone and have the operator place a long distance call and bill it to the number you were calling from, When it was possible to spoof ANI through AT&T's 800-Call-ATT service, you could give the AT&T any phone number you wish as where you were calling from, then have her call 800-bellsouth leading her to believe you were a visually impaired customer and needing assistance dialing that number, then you could press 0 for the bellsouth operator and have her place a long distance call and have it billed to the number you gave the AT&T operator because that's the number bellsouth thought you were calling from. All this has been published in 2600 magazine and is now history, bellsouth has learned from their mistakes and no longer bills to ANI that comes in over their 800 number, and AT&T does not even pass ANI to 800 numbers anymore, you can dial 00 or 10-10-288-0 and touch-tone in an 800 number and it will connect you to that 800 number with a an ANI fail, you don't even have to speak to an operator. The problem with this is it makes it easier to cause ANI fails, sure it solves the ANI spoofing problem but now you can toll-free numbers with an ANI fail more easily. Inspite of the fact that AT&T and Bellsouth has learned it's lesson, there are still many telephone companies that have not. Telus is one of these companies, and not only do they allow you to spoof ANI, but they allow you to spoof Caller ID too. Telus' toll-free "dial-around" is 800-646-000, by simply calling this number with an ANI-fail you can give the operator any number as where you are calling from. Telus is odd, in that they keep upgrading and downgrading there dial-around call center, you used to be able to call any toll-free number through the Telus operator and it would pass whatever number you gave the operator as ANI to the toll-free number you called, now it apears that they have new toll-free trunks that only pass ANI-fails to toll-free numbers, and you can not call MCI owned toll-free numbers for some reason either. Never-the-less, the ANI is still passed when you call a long distance number through Telus dial-around service and the ANI is also used as Caller ID So by simply causing an ANI-fail to Telus dial-around service you can spoof Caller ID to anyone you want to call, not only that if the person you are calling is in the same area as the number you are spoofing, the NAME and number shows up on the caller ID display. To demonstrate this I will cause an ANI fail to Telus dial-around using AT&T's 10-10-288-0 and then calling 800-646-0000, I will then place a collect call to this phone from a spoofed number, I will use xxx-xxx-xxxx as an example and you will see the name and number show up on the screen. Now I know you're thinking yea that's great, but can you only use it to spoof caller ID on collect calls? NO, you can social engineer the telus operator to place "test calls" for you which is a free call w/ no billing, however I'm not sure if that is considered toll fraud or not so I will not be demonstrating that. Telus is not the only telephone company that has this type of dial-around system, AT&T as stated used this in the past though they didn't use spoofed ANI as Caller ID, and there are a few other phone companies out there besides Telus that you can also use this trick on. The sad thing is that ANI spoofing and Caller ID spoofing is so easy, yet many companies use ANI and Caller ID as a security feature, for example I got a credit card in the mail once that the only verification you needed to activate it was to call from your "home phone". It didn't ask for the last 4 of my SSN or anything else, had the card been mis-delivered to my neigh- bor or I accidently through it away anyone could have easily spoofed ANI and activated the card with- out me knowing it. Hopefully this presentation will make everyone more aware that ANI and Caller ID should not be relied on as where you are really calling from. -- What you saw at H2K2 when it said "Lucky225 Rules" was spoofing by emulating bell 202 FSK signals, near the end of the panel was me social engineering the Telus operator telling her I was calling from 909-661-2600 and having her place a call to the phone next to me, the reason it didn't work the first time is because I tried to make it quick and just have her call the phone collect but the lines had a collect block, so then I tried telling her I'm a tech and the call went through and the caller ID was spoofed but the line I was calling didn't have the Caller ID projector hooked up to it, so I finally switched phones and did a final social engineer through telus to call the phone that had the Caller ID projector hooked up and thats when you saw "California 909-661-2600" flash up on the screen. Spoofing Caller ID through Telus still works, but social engineering them to get a free call is most likely harder now that I have told you all how to do it during the speach, but if you happen to have 2 phone lines and one of them doesn't have a collect block you can call the one next to you collect through the Telus oper- ator(op divert to her first and give her the # you wish to spoof as where you are calling from). Spoonm's Open Source software wrote in perl, also has a web based cgi that allows you to create and download a wav file w/ the spoofed info you want. Software Orange Box -- Closed source SHAREWARE Windows version wrote by The Fixer -- 1080s and generic proxy's (submitted by Smev - August 2002) 211.234.92.6:8080 208.17.231.81:80 210.125.135.127:8080 202.108.211.173:1080 210.181.4.174:8080 200.204.57.199:1080 64.9.10.226:1080 205.136.164.80:8080 63.205.19.82:3128 62.153.147.198:3128 210.72.33.194:8080 211.234.92.5:8080 194.129.174.209:1080 80.18.191.196:1080 12.37.114.49:80 208.183.104.26:8080 68.15.131.142:1080 65.196.202.111:1080 212.131.224.68:8080 212.126.15.1:8080 217.34.100.12:1080 24.132.99.47:1080 216.68.162.208:8080 207.224.13.29:1080 208.183.218.10:8080 205.205.37.227:1080 68.65.36.208:3128 212.251.80.198:80 213.121.172.235:1080 216.231.240.20:8080 200.168.108.12:3128 210.90.247.95:8080 216.129.45.106:80 216.72.155.74:8080 63.224.48.146:1080 210.125.134.127:8080 200.38.84.12:80 195.53.11.10:8080 212.243.86.141:8080 24.232.222.57:8080 213.165.32.133:80 217.126.122.160:1080 66.29.192.162:8080 61.74.65.98:8080 64.109.69.2:1080 210.65.0.4:8080 65.117.85.91:8080 209.11.96.17:1080 61.13.161.250:8080 212.141.50.158:1080 208.166.82.124:8080 206.111.234.150:1080 65.25.149.51:3128 200.230.55.201:80 216.68.162.210:8080 144.232.138.114:1080 210.178.219.65:8080 203.162.41.98:3128 200.213.198.5:80 202.54.54.77:1080 211.251.139.129:8080 62.3.44.179:80 210.18.72.14:1080 168.8.168.51:80 65.121.80.1:8080 217.218.193.1:8080 4.33.90.42:3128 217.167.180.65:1080 204.60.70.42:80 217.56.69.162:3128 211.161.159.35:8080 216.227.131.17:3128 24.232.85.220:1080 216.209.32.141:1080 209.224.211.74:1080 63.163.68.115:3128 66.13.48.226:1080 211.251.108.122:8080 195.171.12.102:80 211.114.139.67:8080 208.238.167.130:1080 200.203.159.2:80 211.183.77.60:8080 4.21.138.55:1080 206.228.51.3:80 217.107.91.118:1080 200.182.252.2:1080 4.3.34.171:1080 216.72.155.245:80 212.214.136.247:8080 209.103.227.50:8080 200.190.101.162:80 207.208.206.186:80 169.207.61.89:8080 207.232.193.8:80 196.3.114.18:1080 209.82.60.68:8080 200.193.46.18:8080 12.34.32.110:80 132.254.192.11:8080 12.24.192.50:8080 207.89.150.147:80 216.209.32.140:1080 208.249.221.98:1080 62.42.10.176:1080 200.207.45.85:1080 200.199.204.1:80 12.39.17.42:1080 64.167.170.107:3128 200.168.32.86:1080 200.198.99.197:1080 203.154.220.8:8080 148.245.66.130:80 217.141.85.135:80 24.132.58.232:1080 205.169.30.11:80 216.230.139.29:3128 217.107.74.178:3128 148.223.251.99:1080 206.172.11.11:80 200.207.10.200:1080 210.181.4.173:8080 63.83.252.3:1080 61.144.248.46:3128 205.205.37.228:1080 64.24.17.233:1080 202.29.138.3:1080 148.233.143.2:1080 212.177.164.2:80 211.94.225.11:1080 193.145.123.60:3128 194.208.53.233:3128 66.51.7.82:1080 168.11.50.50:80 200.207.120.215:1080 216.72.63.198:8080 12.152.244.5:1080 207.232.137.54:80 200.161.16.189:3128 213.70.22.254:1080 61.132.4.116:1080 61.74.65.97:80 200.207.163.133:1080 61.186.252.126:80 148.243.239.241:1080 203.199.147.126:80 65.105.65.146:3128 200.207.11.223:1080 161.132.92.40:8080 207.232.137.21:80 216.120.184.9:8080 200.21.223.100:8080 211.162.108.49:8080 164.58.80.130:1080 194.108.51.123:8080 64.210.189.186:80 200.171.70.216:1080 65.107.121.66:1080 4.42.141.65:1080 213.26.250.163:8080 65.115.160.90:80 203.103.4.50:8080 65.125.1.8:80 202.103.11.82:3128 200.190.101.242:80 61.153.40.161:8080 205.205.37.157:1080 67.105.130.194:1080 63.207.202.131:1080 200.207.119.143:3128 211.183.77.59:8080 209.198.65.194:80 213.186.85.226:80 63.242.72.234:1080 210.204.118.194:8080 64.80.64.110:80 207.232.137.23:80 64.8.207.114:8080 209.248.175.2:1080 217.37.74.65:1080 4.35.84.98:80 193.179.211.2:1080 61.241.154.250:1080 4.35.69.177:1080 212.62.87.8:8080 200.158.126.30:1080 62.110.245.69:3128 210.90.3.43:8080 63.150.182.38:8080 61.159.224.11:80 66.150.0.102:1080 200.80.27.125:1080 61.185.255.4:3128 204.60.70.43:80 194.204.236.217:8080 65.118.7.130:80 193.194.83.226:8080 202.54.64.101:8080 61.133.119.130:1080 208.234.34.202:1080 211.138.91.22:80 205.177.166.98:1080 66.9.52.234:3128 208.245.162.250:8080 211.35.78.36:8080 62.42.4.239:1080 211.167.63.34:8080 213.217.45.2:8080 63.107.233.40:1080 24.132.130.15:8080 192.168.168.221:8080 210.73.78.210:80 218.5.185.102:3128 211.97.139.138:3128 212.38.106.26:80 200.38.84.18:80 200.38.84.17:80 205.205.37.156:1080 63.205.39.98:1080 216.240.130.17:80 202.158.48.10:1080 148.233.0.18:8080 203.163.146.71:3128 65.42.199.145:1080 217.34.139.177:1080 202.66.32.243:80 208.227.232.5:8080 211.141.143.3:3128 217.6.253.178:1080 193.232.4.103:1080 212.214.136.244:8080 213.215.27.18:1080 192.115.132.177:1080 213.2.70.130:1080 212.160.236.50:80 216.241.16.170:1080 210.73.74.125:3128 61.208.37.42:3128 212.175.245.82:3128 204.101.124.74:80 202.187.243.25:1080 211.251.90.130:8080 217.204.193.242:1080 212.89.110.253:1080 64.166.190.75:3128 63.227.80.232:1080 203.94.243.1:8080 217.34.228.89:1080 202.164.165.198:1080 209.133.128.195:80 63.227.80.237:1080 200.204.151.122:1080 216.208.126.162:1080 213.25.7.215:1080 65.64.154.41:1080 216.37.203.68:8080 202.108.211.171:1080 62.3.34.227:8080 24.132.35.187:8080 62.42.9.235:1080 203.38.85.106:1080 148.244.255.248:80 66.87.139.137:1080 200.168.158.141:1080 211.233.36.66:1080 62.176.44.226:8080 212.160.195.114:1080 200.204.67.29:1080 207.61.134.4:1080 216.72.155.194:80 210.102.176.4:3128 203.62.199.7:1080 209.133.128.198:80 211.184.216.194:80 213.136.46.129:1080 200.183.49.207:1080 211.162.251.245:1080 210.160.182.210:80 209.88.60.244:1080 200.204.68.197:1080 62.161.229.145:1080 12.45.132.34:1080 195.19.164.172:3128 63.242.169.74:1080 148.244.255.249:80 205.169.56.253:1080 209.121.233.198:8080 207.86.156.18:1080 200.38.84.8:80 211.99.42.203:3128 200.49.210.45:3128 202.108.119.181:80 200.38.84.10:80 63.76.234.54:1080 200.207.239.8:1080 209.248.176.186:1080 200.173.219.202:1080 202.106.107.234:3128 217.161.16.3:1080 63.198.147.91:1080 212.216.251.69:8080 216.53.169.154:3128 212.82.218.170:1080 65.65.123.177:1080 63.101.129.75:80 195.7.45.204:1080 217.59.130.148:3128 148.235.139.18:8080 211.141.154.93:3128 200.253.203.162:1080 169.199.2.1:8080 200.38.167.2:1080 205.177.166.109:1080 205.200.137.10:80 203.130.204.229:8080 216.249.138.243:1080 199.105.125.140:80 203.45.149.179:1080 211.114.193.169:8080 62.160.236.225:1080 63.150.174.62:1080 203.90.89.107:3128 217.127.52.23:8080 127.0.0.1:1080 206.151.154.120:1080 63.142.107.163:3128 148.244.255.247:80 209.88.252.80:1080 210.161.69.194:8080 62.168.16.249:3128 209.88.97.81:80 205.241.35.202:1080 12.37.114.65:80 212.0.164.98:80 65.105.65.82:1080 62.188.56.11:1080 202.102.160.170:80 192.114.65.146:1080 200.171.46.190:1080 66.89.79.35:1080 200.253.224.10:1080 202.106.139.88:8080 206.131.28.11:80 205.136.244.50:80 203.41.52.194:8080 12.19.48.228:1080 200.28.88.194:80 212.250.177.194:1080 63.222.218.146:1080 200.206.141.138:1080 213.172.48.2:8080 216.41.93.2:1080 203.69.223.141:3128 210.151.189.41:1080 208.160.145.252:8080 217.144.7.3:1080 200.30.146.246:1080 200.27.152.3:80 62.3.45.196:80 216.146.101.29:1080 198.143.202.226:1080 212.7.8.188:3128 216.200.99.34:80 209.184.210.7:8080 208.136.102.155:80 207.75.249.6:80 210.212.215.32:80 200.48.252.103:80 216.102.199.63:3128 194.108.22.5:80 62.161.209.225:1080 63.141.67.146:1080 146.235.66.52:80 12.37.114.101:80 206.112.72.3:8080 210.99.118.62:8080 213.29.75.130:1080 210.178.187.250:3128 206.131.28.252:80 64.173.218.26:1080 200.207.15.4:1080 62.161.190.12:1080 213.26.206.3:8080 217.52.96.131:1080 202.104.189.20:1080 168.234.181.154:3128 195.3.81.47:80 62.110.216.147:1080 61.185.49.61:1080 200.181.142.84:1080 194.154.82.86:1080 203.197.20.224:80 64.107.107.226:1080 24.205.142.7:1080 194.97.223.21:3128 211.42.72.16:80 207.232.137.20:80 61.155.92.6:1080 64.77.61.19:1080 202.110.59.142:8080 203.199.64.132:1080 210.217.42.101:8080 12.31.41.66:1080 66.149.144.131:8080 208.233.218.8:1080 209.181.150.178:1080 66.83.10.226:1080 202.110.59.141:8080 207.232.137.6:80 12.37.114.89:80 24.237.23.150:1080 213.107.214.66:1080 61.177.181.243:3128 211.90.159.100:3128 217.98.219.80:1080 168.11.50.71:80 208.241.232.83:8080 206.74.62.44:8080 202.155.88.132:3128 212.174.189.68:1080 202.206.248.25:1080 64.170.6.98:3128 202.98.33.13:1080 64.176.79.24:1080 61.140.231.66:3128 61.11.15.251:3128 168.243.136.85:80 12.37.114.116:80 217.96.36.135:3128 206.171.67.33:1080 195.174.66.225:8080 209.183.15.88:80 63.195.44.18:1080 208.33.111.45:80 130.94.67.35:1080 210.248.49.2:1080 217.110.40.99:3128 210.94.35.15:1080 213.76.238.36:1080 212.210.234.68:1080 193.95.103.106:1080 216.72.155.116:80 211.98.213.254:1080 24.140.12.128:3128 193.137.239.3:80 209.3.144.105:8080 195.174.3.51:3128 216.72.87.136:80 203.197.156.131:1080 200.27.182.30:8080 62.42.4.171:1080 210.204.147.187:8080 12.254.37.33:1080 63.65.11.47:8080 210.82.165.4:1080 195.2.124.5:80 64.76.87.184:80 202.155.70.144:3128 202.85.153.194:1080 210.82.34.250:8080 210.254.106.6:8080 213.77.177.147:8080 207.35.102.29:1080 200.251.61.150:1080 200.199.249.66:8080 200.168.78.89:1080 24.218.86.100:1080 211.91.218.8:80 216.124.25.5:80 195.8.1.11:80 206.52.252.60:3128 203.197.166.198:1080 208.62.208.110:8080 64.35.84.230:1080 64.35.84.247:1080 209.67.106.9:1080 63.194.88.43:80 208.136.102.135:80 216.72.226.40:80 208.33.111.51:80 209.187.235.30:80 203.197.20.125:80 66.7.0.171:1080 194.65.77.1:80 206.168.194.10:80 213.24.90.73:1080 168.234.195.66:1080 24.116.0.193:8080 195.68.114.2:1080 198.142.14.121:1080 203.199.178.181:80 194.203.204.1:1080 192.139.181.145:1080 61.132.92.50:3128 211.97.80.136:1080 193.95.42.44:1080 203.139.197.193:8080 218.5.181.154:3128 65.106.133.18:80 24.151.116.182:1080 212.102.3.2:3128 194.224.131.4:80 64.9.48.41:1080 207.148.171.22:8080 170.222.36.3:1080 12.19.138.47:80 12.34.48.129:80 12.37.114.127:80 203.132.16.3:1080 192.168.1.3:1080 206.137.99.162:80 195.47.14.193:80 207.70.183.13:80 203.197.21.45:80 212.131.182.66:1080 207.225.147.120:1080 208.253.85.65:8080 207.194.210.193:3128 195.205.251.101:80 202.85.183.72:1080 202.53.92.131:3128 139.130.216.13:1080 212.0.120.252:1080 212.243.86.138:8080 216.156.1.4:1080 200.204.92.25:80 203.241.151.50:80 216.161.204.81:1080 212.131.182.70:1080 203.162.56.236:8080 208.191.168.110:1080 211.20.195.43:3128 200.30.47.70:8080 203.110.134.20:1080 213.38.170.5:1080 12.102.24.45:3128 210.71.181.209:1080 204.71.65.253:3128 200.199.140.130:3128 61.163.221.110:8080 66.67.193.149:1080 209.139.81.2:1080 200.204.73.80:1080 202.66.32.242:80 212.131.182.74:1080 216.160.240.211:3128 62.37.182.26:1080 211.91.176.148:1080 24.118.28.41:1080 213.140.194.97:1080 213.25.237.209:1080 61.11.46.14:3128 61.150.43.154:1080 211.95.132.87:80 212.131.182.71:1080 211.141.130.155:80 217.5.207.235:80 211.95.132.84:80 65.82.18.139:1080 61.138.232.11:1080 193.137.239.10:80 62.176.125.35:3128 212.131.182.68:1080 212.145.4.89:3128 211.102.2.205:1080 209.88.4.98:3128 12.28.8.39:1080 209.101.84.130:1080 211.163.123.51:8080 207.225.63.2:8080 208.18.72.77:8080 65.64.57.105:1080 193.130.233.8:1080 202.187.147.157:8080 61.152.126.131:80 12.153.68.131:1080 202.54.67.53:80 63.197.21.29:8080 213.96.213.84:1080 12.32.180.18:1080 61.76.147.18:1080 193.252.217.22:1080 206.169.172.194:1080 210.227.151.130:8080 199.178.252.3:1080 194.65.84.162:1080 200.168.124.133:1080 194.19.238.17:8080 65.90.163.41:1080 64.50.63.122:3128 136.145.70.128:1080 4.3.179.182:1080 217.10.214.182:1080 170.211.154.254:1080 196.40.9.146:1080 207.212.130.43:1080 204.176.164.59:80 66.160.116.32:80 210.206.141.67:8080 202.103.244.130:1080 216.133.89.87:1080 61.127.9.243:8080 195.239.131.126:80 66.121.144.26:3128 12.37.114.118:80 12.37.114.43:80 12.37.114.58:80 12.37.114.114:80 12.37.114.107:80 12.37.114.45:80 12.37.114.121:80 64.80.158.118:3128 12.37.114.46:80 65.42.156.5:1080 12.37.114.77:80 12.37.114.124:80 12.37.114.98:80 207.35.76.162:3128 12.37.114.123:80 64.2.255.77:1080 195.117.60.1:8080 168.11.51.6:80 205.146.38.3:80 205.217.144.59:8080 200.69.218.241:3128 211.98.60.31:1080 207.204.67.11:80 63.242.239.218:1080 205.146.38.4:80 195.39.131.188:80 205.146.38.2:80 204.252.190.2:80 195.41.32.21:80 193.130.233.40:1080 212.0.128.248:80 209.241.255.227:80 213.177.166.11:8080 209.248.195.74:1080 200.41.179.134:3128 164.164.82.90:1080 213.23.104.125:1080 216.221.78.180:80 216.27.180.249:8080 202.98.33.11:1080 208.34.82.185:8080 64.76.86.217:80 130.13.113.190:1080 140.112.21.70:3128 195.68.114.9:1080 208.62.152.226:80 210.81.194.13:80 202.188.17.35:80 213.7.247.100:1080 211.93.107.8:1080 209.62.161.11:8080 193.140.194.85:80 65.205.169.138:3128 217.37.58.138:1080 217.58.162.210:3128 213.25.224.38:1080 202.103.172.59:3128 213.38.69.3:80 210.201.112.2:80 24.104.93.3:8080 193.224.94.194:3128 61.127.197.4:8080 12.42.45.199:8080 200.204.171.154:1080 66.40.240.213:1080 200.206.162.115:3128 209.99.226.105:3128 66.84.244.98:1080 212.244.57.3:8080 217.37.64.237:1080 165.21.75.42:80 148.233.16.210:1080 213.176.112.10:8080 206.187.60.250:8080 203.197.21.27:80 212.77.192.23:80 195.68.95.209:8080 12.37.114.41:80 200.15.130.56:1080 61.153.195.5:1080 200.207.158.105:1080 195.128.128.3:3128 65.27.255.129:1080 200.11.72.245:1080 210.17.78.253:80 207.86.70.241:80 68.12.33.4:1080 61.137.91.59:1080 216.163.123.15:80 210.248.220.18:8080 192.168.21.29:1080 216.72.155.225:80 80.224.176.3:1080 65.115.43.2:1080 193.140.194.66:80 196.40.3.74:3128 80.224.178.246:1080 206.170.241.2:3128 193.140.194.79:80 62.42.6.144:1080 209.4.250.243:80 213.82.217.229:1080 213.121.167.50:1080 200.50.192.0:80 216.62.130.51:3128 12.37.114.112:80 165.139.64.4:80 165.139.64.2:80 195.174.5.170:1080 210.163.156.178:8080 216.103.188.10:1080 207.199.5.153:80 210.17.43.3:1080 210.201.63.181:8080 165.139.64.3:8080 210.77.130.211:3128 64.217.136.251:3128 196.40.68.35:1080 61.153.231.141:1080 208.198.128.10:80 12.46.236.82:1080 210.196.142.228:1080 216.17.81.66:1080 207.103.224.78:8080 195.112.196.194:1080 12.37.114.62:80 194.228.213.185:3128 12.230.73.225:1080 210.140.205.250:8080 66.189.192.247:1080 12.37.114.50:80 12.37.114.76:80 12.37.114.70:80 80.224.177.117:1080 144.29.1.16:80 12.37.114.111:80 12.37.114.109:80 207.61.176.202:3128 12.37.114.54:80 209.234.69.163:8080 217.99.171.66:1080 213.11.160.98:80 213.189.83.162:1080 210.187.14.186:1080 217.194.133.82:3128 208.20.112.18:8080 210.132.71.52:80 24.46.255.18:8080 192.117.138.131:1080 207.242.195.2:1080 63.243.20.40:1080 203.197.21.38:80 206.170.162.10:1080 210.243.27.6:80 12.37.114.100:80 211.96.31.207:1080 208.136.102.147:80 129.206.123.176:80 194.179.40.7:1080 211.152.194.72:8080 210.115.125.53:8080 164.8.252.30:1080 205.200.3.17:80 217.57.244.61:1080 212.155.179.198:8080 206.150.178.23:3128 62.90.124.14:1080 57.68.12.102:80 210.225.164.50:8080 217.204.230.83:1080 203.53.226.2:8080 194.65.86.129:8080 193.140.194.120:80 211.250.100.146:8080 12.37.114.80:80 209.149.145.250:8080 65.104.18.161:1080 65.68.94.42:3128 211.173.29.9:80 195.92.245.144:1080 208.33.69.252:80 148.74.255.104:80 205.205.37.55:1080 196.41.147.67:1080 216.76.114.131:80 209.181.17.187:1080 207.236.234.100:80 198.165.204.130:3128 206.49.32.15:1080 168.243.210.7:3128 210.66.164.1:80 212.0.216.98:3128 216.191.111.26:1080 202.187.248.100:8080 205.232.248.10:80 202.181.230.69:1080 202.57.140.6:3128 208.183.191.2:80 63.80.194.51:1080 212.71.164.41:3128 208.30.227.23:8080 213.156.64.196:3128 64.67.154.226:3128 66.154.10.226:3128 108.9.10.226:8080 213.134.132.144:8080 212.130.241.245:8080 202.65.209.39:1080 202.134.0.135:8080 62.218.25.221:8080 194.7.83.108:1080 202.66.161.161:80 12.37.114.126:80 139.130.100.119:80 168.10.178.3:8080 200.62.131.254:8080 194.90.143.17:1080 203.155.152.195:80 194.9.184.101:8080 209.158.179.102:8080 64.105.119.2:1080 217.125.26.53:1080 217.58.153.61:1080 210.240.77.3:3128 193.95.103.182:1080 208.136.102.160:80 216.72.155.219:80 216.181.174.146:1080 212.0.215.130:3128 202.54.68.49:80 131.165.146.141:8080 65.203.83.131:80 203.197.20.196:80 63.198.130.166:1080 195.174.160.149:1080 195.208.211.201:3128 193.220.15.2:1080 204.184.190.252:80 207.90.72.234:1080 209.26.191.31:1080 24.132.70.195:1080 194.200.253.49:80 207.208.204.62:3128 211.39.201.45:8080 210.212.215.80:80 213.42.186.137:80 211.100.125.55:1080 210.24.130.195:8080 210.248.113.2:8080 203.111.1.66:80 213.143.90.116:1080 216.72.155.126:80 12.37.114.42:80 200.171.116.188:1080 202.155.57.180:1080 193.140.194.64:80 203.197.21.171:80 195.171.168.126:1080 12.37.114.51:80 12.37.114.92:80 12.37.114.52:80 200.207.81.119:1080 12.37.114.81:80 208.136.102.171:80 12.37.114.44:80 12.37.114.97:80 12.37.114.120:80 12.37.114.82:80 12.37.114.99:80 12.37.114.63:80 12.37.114.40:80 210.241.106.42:80 203.38.246.10:1080 12.37.114.84:80 209.88.60.14:1080 12.37.114.86:80 12.37.114.95:80 210.227.166.195:8080 12.37.114.110:80 211.184.220.66:80 211.114.175.129:8080 205.232.127.215:80 216.113.92.12:80 12.37.114.60:80 210.181.1.173:8080 12.37.114.85:80 12.37.114.90:80 12.37.114.73:80 12.37.114.61:80 212.131.128.133:80 12.37.114.122:80 12.37.114.55:80 200.46.109.34:8080 213.123.249.207:1080 211.75.8.58:3128 210.66.164.6:80 211.250.96.2:8080 193.53.80.72:3128 65.42.154.33:1080 209.184.154.48:80 207.170.17.250:80 210.17.78.245:80 210.232.129.82:8080 63.199.169.3:1080 216.154.144.25:1080 195.19.169.125:3128 24.221.86.5:1080 193.66.190.34:80 212.183.16.66:8080 62.30.227.136:1080 217.6.121.244:8080 210.233.10.234:8080 61.18.196.161:3128 24.232.6.28:1080 207.181.36.3:80 210.164.199.211:3128 216.72.155.68:80 208.138.115.144:3128 193.140.194.98:80 204.211.185.12:80 202.54.67.218:80 203.197.20.200:80 66.88.168.66:1080 192.168.0.100:1080 216.72.155.229:80 211.162.224.249:80 203.208.81.1:80 202.100.249.200:3128 212.131.128.132:80 210.204.162.254:8080 195.39.77.1:3128 62.6.148.234:1080 213.120.112.105:1080 206.114.36.6:80 202.110.113.74:1080 216.181.211.98:80 205.252.196.101:80 195.181.4.189:8080 212.135.193.10:80 216.238.129.38:80 194.126.1.170:1080 63.86.185.30:1080 66.1.194.123:3128 207.109.232.30:1080 200.75.42.5:80 212.184.66.211:8080 206.74.214.203:1080 212.163.132.67:80 211.250.4.195:8080 199.104.254.242:80 209.251.103.174:1080 211.46.117.65:8080 195.255.125.82:80 12.38.65.157:80 216.181.20.2:80 213.32.53.5:80 207.19.98.29:1080 193.140.194.92:80 161.196.210.68:1080 64.0.241.210:3128 213.74.106.21:1080 204.210.202.19:3128 211.10.10.83:80 151.197.89.50:1080 216.208.167.169:3128 64.168.82.2:1080 64.5.90.230:1080 218.44.141.10:8080 63.236.146.243:1080 203.197.20.185:80 211.57.5.65:8080 203.197.20.57:80 210.212.218.107:80 203.197.20.186:80 203.197.20.3:80 63.70.84.101:1080 203.197.20.20:80 -- -0- - `= E-mail =` - -----Original Message----- From: Mike Hack To: webmaster@hackcanada.com Date: Saturday, July 27, 2002 7:55 PM Hello, Last night (July 27th) starting at about 4am, the Rogers AT&T Pay As You Go vulnerability was once again in effect. Calls were getting no "you have blah blah blah minutes available for this call" prompts in Saskatchewan and BC. I don't know about other provinces. All calls to anywhere in the world were going through for free up until 115pm. Then they seemed to be working on it, calls were getting prompts again unfortunately. Then at 210pm they were going through for free again until around 6pm. One thing I also noticed is that during the time they fixed it, I used minutes, then it went to free again, they fixed it again, and I had the minutes I used during that time BACK! Anyway just wondering if you guys noticed this where you are. I got my worth from it. [NOTE: "" Was referring to the Rogers AT&T Billing Vulnerability that I wrote about: http://www.nettwerked.net/rogersatt_exploit.txt ] -- Date: Mon, 12 Aug 2002 19:22:51 -0400 From: dave elliott To: theclone@cyberspace.org Hi im colt45 from Hackers.com and Hackers Unlimited Organization. Im obviously on your mailing list and i have a little tidbit of info for you. I dont know if you can use it but if you do that would be great. I live in brockville ontario. I have an ANI for my area and a unversal ANI/ringback number supposed to be for use anywhere in canada. The ANI=958-2622 ANI/ringback=1-888-837-8274 if you have call display the number that rings you back is: 1-416-981-0001. I hope you can use this info for the next K-1ine issue. Could you please email me back and tell me if its of use to you OR not. Either way, i would like to know. Well keep up the good work and i look forward to reading #30. FROM COLT45, THE SMOKING GUN! --- -- Credits Without the following contributions, this zine issue would be fairly delayed or not released. So thank you to the following people: Colt45, CYB0RG/ASM, Fractal, , Lucky225, Smev, The Clone, Voodoo Boy -- Sorry's: Hey Phlux, I didn't have enough room in this issue for your PAD-CODES.TXT. But don't fret, it'll be in next month. =) -- Shouts: CYB0RG/ASM, Wildman, H410g3n, warVamp, The Question, plappy, Phlux, rt, Magma, Hack Canada, The Grasshopper Unit, Flippersmack, to2600, soapie, `enjoy, littleyellowdot, Breanne, Cry-s (hee!), Flopik, and lastly to everyone and anyone who contributes to the Canadian H/P scene. ;. .;.. ; ;. ;.. ;.. .;..; .;.; .;; ;.. .;..;. .;..; .;.;...; ;..;.. .;. A .;. .;. ;.. N E T T W E R K E D ;.. ;..;.. P R O D U C T ;..;.. .;..; ;..;.. ; .;..;.;.. .; . .;. ..;.. .;.. . .; ..;..;..;.. .; ;..;. .;.. . .;.. .;.;. ..;. ..;.. .;. ;.;..;;..;.; ;.;;..;.. ;.;.; .; . ;.;..;. .;. ;.;:.;. ,;....;. .;.;. .;.; .;.;.; .;.; ;..;. .;.;;.; .;. ..; ;. > > > > > > ... End of #30. You ain't seen nothin' yet!