fbpx
Wikipedia

Phantom Access

Phantom Access was the name given to a series of hacking programs written by Patrick Kroupa (a.k.a., Lord Digital) of LOD. The programs were worked on during the early to mid-1980s (1982–1986), and designed to run on the Apple II computer and Apple-Cat modem.

Phantom Access 5.7K title page, featuring a confused TIE fighter in front of a Death Star and the post-divestiture AT&T "death star" logo.

History edit

There are a variety of references to the Phantom Access programs in texts from underground bulletin board systems from the 1980s.[1][2][3] Reading the files and messages, it appears that the Phantom Access name was a given to an entire series of programs coded by Lord Digital and apparently for internal LOD use, because the programs were not distributed to the "public" or even most other members of the hacker underground of the time.

Much like Festering Hate, there are references to the programs in a variety of mainstream press articles of the early and mid 90s when MindVox first came online,.[4][5][6] Phantom Access is also where the parent company that launched MindVox, Phantom Access Technologies, took its name from.

Program Content edit

Despite obviously being made for internal (rather than public/commercial) release, Phantom Access contains many of the qualities that would be more expected of a commercial release. The use of graphics (including animation), utility programs, extensive formatted documentation and sample "sub-modules" which contain instructions for the Phantom Access program itself is unusual for a program of this kind at this time due to the amount of work involved in setting up those elements when the expectation would be that the limited user-base would be able to manage without them. In addition to the functional aspects of the program there was also bundled easter egg type media such as random poems, and Pink Floyd lyrics.

Phantom Access 5.7K edit

The Phantom Access disks that were leaked, contained one full Apple II disk side of software and an additional disk of documentation written about the programs.[7] There is another text archive of messages from the era that were apparently posted when Phantom Access was leaked to The Underground BBS in the late 80s.[8]

The programs come on a disk formatted with ZDOS (Zilog DOS), a common operating system used with a Z80 co-processor add-on to the Apple II.[9] Messages from the era indicate that the Phantom Access leak may contain a virus, and taking into account Festering Hate, it is certainly possible.

=^=^=^=^=^=^=^=^=^=^=^=^=^=^=^=^=^=^=^= % )=-> PHANTOM ACCESS [5.7K] <-=(  % =/%/%/%/%/%/%/%/%/%/%/%/%/%/%/%/%/%/%/= % (C)opyright 1982-86, Lord Digital  % =^=^=^=^=^=^=^=^=^=^=^=^=^=^=^=^=^=^=^= (Sub-Module Loaded) /:::::::::::::::::::::::::::::::::::::\ :    : : [Code File]:[Filename For Save]  : : [Now Testing Code]:[012345]  : : [Total Codes Scanned]:[1234]  : : [Valid Codes Scanned]:[99]  : : [Last Valid Code]:[012345]  : :    : -:::::::::::[System Status]:::::::::::- :    : : [SND][PHN][PCN][OCC][RNG][---][SEQ] : : [%][ Current Function Active ][%] : :  [Block]:[-]  : : [Audio Duration]:[00]:000  : : [Time Left In Audio Test]:[-]  : :.....................................: \Type [ESC] to Exit After Current Code/ 

Phantom Access itself appears to be a highly-programmable common interface, which follows instructions contained in a variety of files. At the topmost level it seems to be a toolkit for utilizing all the special functions of the Apple-Cat modem, it scans systems, hacks codes, functions as a blue box, and exports the results into a series of files which can be manipulated using all the other programs in the series.

A quote from the Phantom Access Documentation:

Phantom Access 5.7K is the hacker itself. It could be described as the final processing unit of the instruction sets, but without the utilities it would be useless to the end user, as that is ALL it is. Sub-Modules must already exist prior to usage. This was a necessary compromise, as there is NO memory left on a 64K system once the Slider's and Rotation system are activated.

It uses EXEC files as a form of primitive scripting for the Apple II. Reading through the messages of the era,[10] the scripts are doing direct writes to various registers and parts of memory using the POKE command. The programs regularly check memory to see what is running or loaded and generally seem to take over control of the computer.

Final Evolution edit

Lacking an Apple II computer and Apple-Cat modem, in addition to their historical value, perhaps the most useful and interesting part of the Phantom Access programs is the extensive documentation Kroupa wrote.[11] In addition to explaining how to program the sub-modules, the documents provide an extensive overview of phreaking information, information about the other programs in the Phantom Access series (which appear to have been other system penetration tools and rootkits, before the term "rootkit" existed), and the eventual goal of the whole series, which seems to have been turning the entire Apple II computer and Apple-Cat modem into a programmable phreaking box, which could be plugged into the computers Kroupa and other LOD members were abandoning the Apple platform and switching over to (NeXT, Sun and SGI hardware).[12]

From the Phantom Access documentation:

The eventual goal of Phantom Access was to realize a fully automated system for the Apple-Cat modem. The sound sampling and evaluation system has been almost unchanged from revision 4.0 to 5.7 of the series, everything else has been rewritten several times. The final 6.6 revision is a full implementation of the original design (read: it has very little in common with anything in the 5.7 series) with a final processor that is capable of passing data through the Apple-Cat's serial port to an external machine, thus allowing use of the entire Apple computer system as nothing more than a very sophisticated auxiliary modem.

Towards the late 80s, it looks like Kroupa and LOD had exactly one use left for the Apple II: to utilize the entire computer as a host for the Apple-Cat modem. This makes a very strong statement about how highly valued Novation's, Apple-Cat modem was amongst phone phreaks.

This was my solution to working within the Apple's limits. No other modem comes close to having the Apple-Cat's capabilities, but the Apple itself leaves much to be desired.

Historical Exhibit edit

Due to its nature as a product designed for a limited set of users, Phantom Access remained extremely obscure to the general public until it was featured by digital historian and film-maker, Jason Scott as the first exhibit on textfiles.com, in January 2006.[13]

External links edit

  • Phantom Access Exhibit

References edit

  1. ^ . Archived from the original on 2007-09-29. Retrieved 2006-09-02.
  2. ^ "Defaulters – if You See Something, Say Something".
  3. ^ http://p.ulh.as/phrack/p42/P42-03.html[permanent dead link]
  4. ^ MindVox: Urban Attitude Online Archived 2012-09-05 at archive.today Wired Magazine, Volume 1, Issue 5, November 1993
  5. ^ There's a Party in My Mind: MindVox! Archived 2012-09-09 at archive.today Mondo 2000, Issue 8, 1992
  6. ^ Trading Data with Dead & Digital Archived 2012-09-09 at archive.today by Charles Platt, The Magazine of Fantasy & Science Fiction, 1994
  7. ^ Phantom Access Disk 2 (Documentation) Image (Retrieved from Textfiles.com)
  8. ^ Phantom Access related messages, from the late 80s (Retrieved from Textfiles.com)
  9. ^ (PDF). Archived from the original (PDF) on 2017-03-28. Retrieved 2018-09-15.{{cite web}}: CS1 maint: archived copy as title (link)
  10. ^ http://www.textfiles.com/exhibits/paccess/PhantomAccess.txt [bare URL plain text file]
  11. ^ Phantom Access Documentation (converted to text) (Retrieved from Textfiles.com)
  12. ^ Voices in My Head: MindVox The Overture Archived 2012-09-06 at archive.today by Patrick Kroupa, 1992
  13. ^ Introduction of Phantom Access Exhibit, by Jason Scott 2006-08-24 at the Wayback Machine (Retrieved from Textfiles.com)

phantom, access, name, given, series, hacking, programs, written, patrick, kroupa, lord, digital, programs, were, worked, during, early, 1980s, 1982, 1986, designed, apple, computer, apple, modem, title, page, featuring, confused, fighter, front, death, star, . Phantom Access was the name given to a series of hacking programs written by Patrick Kroupa a k a Lord Digital of LOD The programs were worked on during the early to mid 1980s 1982 1986 and designed to run on the Apple II computer and Apple Cat modem Phantom Access 5 7K title page featuring a confused TIE fighter in front of a Death Star and the post divestiture AT amp T death star logo Contents 1 History 2 Program Content 3 Phantom Access 5 7K 4 Final Evolution 5 Historical Exhibit 6 External links 7 ReferencesHistory editThere are a variety of references to the Phantom Access programs in texts from underground bulletin board systems from the 1980s 1 2 3 Reading the files and messages it appears that the Phantom Access name was a given to an entire series of programs coded by Lord Digital and apparently for internal LOD use because the programs were not distributed to the public or even most other members of the hacker underground of the time Much like Festering Hate there are references to the programs in a variety of mainstream press articles of the early and mid 90s when MindVox first came online 4 5 6 Phantom Access is also where the parent company that launched MindVox Phantom Access Technologies took its name from Program Content editDespite obviously being made for internal rather than public commercial release Phantom Access contains many of the qualities that would be more expected of a commercial release The use of graphics including animation utility programs extensive formatted documentation and sample sub modules which contain instructions for the Phantom Access program itself is unusual for a program of this kind at this time due to the amount of work involved in setting up those elements when the expectation would be that the limited user base would be able to manage without them In addition to the functional aspects of the program there was also bundled easter egg type media such as random poems and Pink Floyd lyrics Phantom Access 5 7K editThe Phantom Access disks that were leaked contained one full Apple II disk side of software and an additional disk of documentation written about the programs 7 There is another text archive of messages from the era that were apparently posted when Phantom Access was leaked to The Underground BBS in the late 80s 8 The programs come on a disk formatted with ZDOS Zilog DOS a common operating system used with a Z80 co processor add on to the Apple II 9 Messages from the era indicate that the Phantom Access leak may contain a virus and taking into account Festering Hate it is certainly possible gt PHANTOM ACCESS 5 7K lt C opyright 1982 86 Lord Digital Sub Module Loaded Code File Filename For Save Now Testing Code 012345 Total Codes Scanned 1234 Valid Codes Scanned 99 Last Valid Code 012345 System Status SND PHN PCN OCC RNG SEQ Current Function Active Block Audio Duration 00 000 Time Left In Audio Test Type ESC to Exit After Current Code Phantom Access itself appears to be a highly programmable common interface which follows instructions contained in a variety of files At the topmost level it seems to be a toolkit for utilizing all the special functions of the Apple Cat modem it scans systems hacks codes functions as a blue box and exports the results into a series of files which can be manipulated using all the other programs in the series A quote from the Phantom Access Documentation Phantom Access 5 7K is the hacker itself It could be described as the final processing unit of the instruction sets but without the utilities it would be useless to the end user as that is ALL it is Sub Modules must already exist prior to usage This was a necessary compromise as there is NO memory left on a 64K system once the Slider s and Rotation system are activated It uses EXEC files as a form of primitive scripting for the Apple II Reading through the messages of the era 10 the scripts are doing direct writes to various registers and parts of memory using the POKE command The programs regularly check memory to see what is running or loaded and generally seem to take over control of the computer Final Evolution editLacking an Apple II computer and Apple Cat modem in addition to their historical value perhaps the most useful and interesting part of the Phantom Access programs is the extensive documentation Kroupa wrote 11 In addition to explaining how to program the sub modules the documents provide an extensive overview of phreaking information information about the other programs in the Phantom Access series which appear to have been other system penetration tools and rootkits before the term rootkit existed and the eventual goal of the whole series which seems to have been turning the entire Apple II computer and Apple Cat modem into a programmable phreaking box which could be plugged into the computers Kroupa and other LOD members were abandoning the Apple platform and switching over to NeXT Sun and SGI hardware 12 From the Phantom Access documentation The eventual goal of Phantom Access was to realize a fully automated system for the Apple Cat modem The sound sampling and evaluation system has been almost unchanged from revision 4 0 to 5 7 of the series everything else has been rewritten several times The final 6 6 revision is a full implementation of the original design read it has very little in common with anything in the 5 7 series with a final processor that is capable of passing data through the Apple Cat s serial port to an external machine thus allowing use of the entire Apple computer system as nothing more than a very sophisticated auxiliary modem Towards the late 80s it looks like Kroupa and LOD had exactly one use left for the Apple II to utilize the entire computer as a host for the Apple Cat modem This makes a very strong statement about how highly valued Novation s Apple Cat modem was amongst phone phreaks This was my solution to working within the Apple s limits No other modem comes close to having the Apple Cat s capabilities but the Apple itself leaves much to be desired Historical Exhibit editDue to its nature as a product designed for a limited set of users Phantom Access remained extremely obscure to the general public until it was featured by digital historian and film maker Jason Scott as the first exhibit on textfiles com in January 2006 13 External links editPhantom Access ExhibitReferences edit Totse com the Elite Commandments very amusing Archived from the original on 2007 09 29 Retrieved 2006 09 02 Defaulters if You See Something Say Something http p ulh as phrack p42 P42 03 html permanent dead link MindVox Urban Attitude Online Archived 2012 09 05 at archive today Wired Magazine Volume 1 Issue 5 November 1993 There s a Party in My Mind MindVox Archived 2012 09 09 at archive today Mondo 2000 Issue 8 1992 Trading Data with Dead amp Digital Archived 2012 09 09 at archive today by Charles Platt The Magazine of Fantasy amp Science Fiction 1994 Phantom Access Disk 2 Documentation Image Retrieved from Textfiles com Phantom Access related messages from the late 80s Retrieved from Textfiles com Archived copy PDF Archived from the original PDF on 2017 03 28 Retrieved 2018 09 15 a href Template Cite web html title Template Cite web cite web a CS1 maint archived copy as title link http www textfiles com exhibits paccess PhantomAccess txt bare URL plain text file Phantom Access Documentation converted to text Retrieved from Textfiles com Voices in My Head MindVox The Overture Archived 2012 09 06 at archive today by Patrick Kroupa 1992 Introduction of Phantom Access Exhibit by Jason Scott Archived 2006 08 24 at the Wayback Machine Retrieved from Textfiles com Retrieved from https en wikipedia org w index php title Phantom Access amp oldid 1176221828, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.