Phantom Access

Phantom Access

Phantom Access was the name given to a series of hacking programs written by Patrick Kroupa (a.k.a., Lord Digital) of LOD. The programs were worked on during the early to mid 80s (1982-1986), and designed to run on the Apple II computer and Apple-Cat modem.

History

There are a variety of references to the Phantom Access programs in texts from underground BBS systems from the 80s [http://www.totse.com/en/ego/no_laughing_matter/elitecmt.html] , [http://www.skepticfiles.org/cowtext/100/lozershu.htm] , [http://p.ulh.as/phrack/p42/P42-03.html] . Reading the files and messages, it appears that the Phantom Access name was a given to an entire series of programs coded by Lord Digital and apparently for internal LOD use, because the programs were not distributed to the "public" or even most other members of the hacker underground of the time.

Much like Festering Hate, there are references to the programs in a variety of mainstream press articles of the early and mid 90s when MindVox first came online [ [http://www.mindvox.com/staticpage/Media/Wired1.html MindVox: Urban Attitude Online] Wired Magazine, Volume 1, Issue 5, November 1993 ] , [ [http://www.phantom.com/staticpage/Akashic/Mondo2k1.html There's a Party in My Mind: MindVox!] Mondo 2000, Issue 8, 1992 ] , [ [http://www.phantom.com/staticpage/Media/SFF.html Trading Data with Dead & Digital] by Charles Platt, The Magazine of Fantasy & Science Fiction, 1994 ] . Phantom Access is also where the parent company that launched MindVox, Phantom Access Technologies, took its name from.

Hacking as Art

The overall package is extremely polished and surprisingly professional looking, taking into consideration that Phantom Access was made for internal release, and definitely fell into the black hat category of tools. It was obviously something that would never be commercially released, or apparently, released at all. Yet the attention to detail is stunning. The Phantom Access disks contain graphics, utility programs, extensive, well written and formatted documentation, and sample "sub-modules" which contain instructions for the Phantom Access program itself.

The programs also contain a high level of aesthetics, melting Matrix-style green text screens that spin and fall apart as the next section of the program opens, a collection of strange easter eggs, random poems, and Pink Floyd lyrics. There are endless details contained in the package, which must have taken a tremendous amount of time to add, yet contain nothing that is absolutely essential for the program function. After looking at the Phantom Access package as a whole, you are left with the impression of painstaking attention to detail, for no logical reason. It's a package that would never be seen by more than a handful of people from the era, and certainly never sold.

It is quite likely that Phantom Access would have sunk back into mythology and never seen the light of day were it not for the efforts of digital historian and film-maker, Jason Scott, who featured Phantom Access as the first exhibit on textfiles.com, in January 2006 [ [http://ascii.textfiles.com/archives/000188.html Introduction of Phantom Access Exhibit, by Jason Scott] (Retrieved from Textfiles.com) ] . Nearly 20 years after it was written, Phantom Access had made the transition from lost artifact of the past, to finally being made available to anyone who wanted to see what it was all about [ [http://www.textfiles.com/exhibits/paccess/ Phantom Access Exhibit, by Jason Scott] (Retrieved from Textfiles.com) ] .

Phantom Access 5.7K

The Phantom Access disks that were leaked, contained one full Apple II disk side of software and an additional disk of documentation written about the programs [ [http://www.textfiles.com/exhibits/paccess/Phantom-Access-Docs.DSK Phantom Access Disk 2 (Documentation) Image] (Retrieved from Textfiles.com) ] . There is an another text archive of messages from the era that were apparently posted when Phantom Access was leaked to the underground in the late 80s [ [http://www.textfiles.com/exhibits/paccess/PhantomAccess.txt Phantom Access related messages, from the late 80s] (Retrieved from Textfiles.com) ] .

The programs come on a disk containing something called "ZDOS". As of 2006, there is not a single reference to any disk operating system or variant, for the Apple computer, with any such name. It is unknown if "ZDOS" was ever a commercial product, or something written specifically for Phantom Access. It is also unknown whether ZDOS is itself some kind of virus. Messages from the era indicate that the Phantom Access leak may contain a virus, and taking into account Festering Hate, it is certainly possible.

Phantom Access itself appears to be a highly-programmable common interface, which follows instructions contained in a variety of files. At the topmost level it seems to be a toolkit for utilizing all the special functions of the Apple-Cat modem, it scans systems, hacks codes, functions as a blue box, and exports the results into a series of files which can be manipulated using all the other programs in the series.

A quote from the Phantom Access Documentation:

:"Phantom Access 5.7K is the hacker itself. It could be described as the final processing unit of the instruction sets, but without the utilities it would be useless to the end user, as that is ALL it is. Sub-Modules must already exist prior to usage. This was a necessary compromise, as there is NO memory left on a 64K system once the Slider's and Rotation system are activated."

It uses EXEC files as a form of primitive scripting for the Apple II. Reading through the messages of the era [http://www.textfiles.com/exhibits/paccess/PhantomAccess.txt] , the scripts are doing direct writes to various registers and parts of memory using the POKE command. The programs regularly check memory to see what is running or loaded and generally seem to take over control of the computer.

Final Evolution

Lacking an Apple II computer and Apple-Cat modem, in addition to their historical value, perhaps the most useful and interesting part of the Phantom Access programs is the extensive documentation Kroupa wrote [ [http://www.textfiles.com/exhibits/paccess/PhantomDocs.txt Phantom Access Documentation (converted to text)] (Retrieved from Textfiles.com) ] . In addition to explaining how to program the sub-modules, the documents provide an extensive overview of phreaking information, information about the other programs in the Phantom Access series (which appear to have been other system penetration tools and rootkits, before the term "rootkit" existed), and the eventual goal of the whole series, which seems to have been turning the entire Apple II computer and Apple-Cat modem into a programmable phreaking box, which could be plugged into the computers Kroupa and other LOD members were abandoning the Apple platform and switching over to (NeXT, Sun and SGI hardware) [ [http://www.phantom.com/staticpage/Akashic/Voices.html Voices in My Head: MindVox The Overture] by Patrick Kroupa, 1992 ] .

From the Phantom Access documentation:

:"The eventual goal of Phantom Access was to realize a fully automated system for the Apple-Cat modem. The sound sampling and evaluation system has been almost unchanged from revision 4.0 to 5.7 of the series, everything else has been rewritten several times. The final 6.6 revision is a full implementation of the original design (read: it has very little in common with anything in the 5.7 series) with a final processor that is capable of passing data through the Apple-Cat's serial port to an external machine, thus allowing use of the entire Apple computer system as nothing more than a very sophisticated auxiliary modem."

Towards the late 80s, it looks like Kroupa and LOD had exactly one use left for the Apple II: to utilize the entire computer as a host for the Apple-Cat modem. This makes a very strong statement about how highly valued Novation's, Apple-Cat modem was amongst phone phreaks.

:"This was my solution to working within the Apple's limits. No other modem comes close to having the Apple-Cat's capabilities, but the Apple itself leaves much to be desired."

External links

* [http://www.textfiles.com/exhibits/paccess/ Phantom Access Exhibit]

References


Wikimedia Foundation. 2010.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • Phantom Ranch — is a resort village within Grand Canyon National Park in Arizona. It is located at coord|36|06|18|N|112|05|40|W| on the north side of the Colorado River near its confluence with Bright Angel Creek and Phantom Creek. Phantom Ranch is on the US… …   Wikipedia

  • Phantom 2040 (video game) — Phantom 2040 is a side scrolling action adventure video game developed by Hearst Entertainment and published by Viacom in 1995 for the Sega Genesis, Super Nintendo and Game Gear. The game is directly based upon the animated television series… …   Wikipedia

  • Phantom FM — Infobox Radio station name = Phantom 105.2 slogan = Quality Sounds Only! airdate = 31 October 2006 frequency = 105.2 MHz, [http://www.phantom.ie Online] ,DAB Digital Radio, DTT, UPC Ch 935 | area = Dublin format = Alternative Rock owner = Dublin… …   Wikipedia

  • Phantom Zone — Infobox comics location imagesize = no caption = publisher = DC Comics debut = Adventure Comics #283 (April 1961) creators = type = dimension=y prison=y residents = races = locations = subcat = DC Comics altcat = sortkey = Phantom ZoneThe Phantom …   Wikipedia

  • Phantom Limb (character) — VBCharacter caption = character name = The Phantom Limb debut ep = Tag Sale You re It! voiced by = James Urbaniak real name = Hamilton G. Fantomas char alias = profession = Supervillain, former high ranking member of The Guild of Calamitous… …   Wikipedia

  • Phantom Stranger — Superherobox caption=Drawn by Jim Aparo and colored by Tom Ziuko in Secret Origins volume 2 issue 10. character name=Phantom Stranger real name=Unknown publisher=DC Comics/Vertigo debut= Phantom Stranger #1 (August September 1952) creators=John… …   Wikipedia

  • Phantom Troupe — The nihongo|Phantom Troupe|幻影旅団|Genei Ryodan, or Phantom Brigade, is the name for a gang of thieves, from the anime and manga series Hunter × Hunter.The group consists of a total of 13 members, each with a numbered tattoo of a spider on their… …   Wikipedia

  • Phantom (novel) — infobox Book | name = Phantom title orig = translator = image caption = author = Susan Kay illustrator = cover artist = country = United Kingdom language = English series = genre = Historical novel publisher = Doubleday pub date = 1990 english… …   Wikipedia

  • Star Wars Episode I: The Phantom Menace — This article is about the film. For the video game, see Star Wars Episode I: The Phantom Menace (video game). Star Wars I redirects here. For the first film in theatrical order, see Star Wars Episode IV: A New Hope. Star Wars Episode I: The… …   Wikipedia

  • Characters in Ghost Trick: Phantom Detective — Logo for Ghost Trick: Phantom Detective, featuring the two main characters, Sissel and Lynne. Ghost Trick: Phantom Detective is a Nintendo DS video game developed by Shu Takumi in 2010. Like Takumi s other works, Ghost Trick has a strong emphasis …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”