247 lines
12 KiB
Plaintext
247 lines
12 KiB
Plaintext
|
|
|||
|
<20><><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20><><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD> <20> <20> <20> <20><><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<EFBFBD><EFBFBD> <20> <20> <20><><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD> <20> <20><><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><> <20><> <20><><EFBFBD> <20><> <20><> <20><><EFBFBD><EFBFBD> <20><> <20> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><> <20><><EFBFBD><EFBFBD><EFBFBD> <20><> <20><><EFBFBD> <20> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD> <20><> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD> <20><><EFBFBD> <20><> <20><> <20> <20><><EFBFBD> <20><><EFBFBD> <20><><EFBFBD> <20><> <20> <20><><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD> <20> <20><> <20><><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD> <20><> <20> <20><><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><> <20><> <20><><EFBFBD> <20><><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD> <20> <20> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><> <20><> <20><> <20><><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD> <20><> <20><><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20> <20><> <20> <20><> <20><> <20><> <20><><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20> <20><> <20> <20><> <20><><EFBFBD> <20><> <20><><EFBFBD><EFBFBD><EFBFBD> <20> <20><> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20> <20><><EFBFBD><EFBFBD>
|
|||
|
<EFBFBD> <20><> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><> <20><> <20><><EFBFBD> <20> <20><> <20><><EFBFBD> <20><> <20><><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20><> <20><> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD> <20><> <20> <20> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20>
|
|||
|
<20><> <20><><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD> <20> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><> <20><> <20><> <20><> <20> <20><> <20><><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><> <20> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20><> <20><><EFBFBD> <20> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><> <20><> <20><> <20> <20> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD> <20> <20><><EFBFBD> <20><><EFBFBD> <20><> <20><><EFBFBD><EFBFBD><EFBFBD> <20><> <20><><EFBFBD><EFBFBD>
|
|||
|
<20><> <20><><EFBFBD> <20><><EFBFBD> <20><> <20><><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD> <20><> <20><> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><> <20><>
|
|||
|
<20><><EFBFBD>
|
|||
|
|
|||
|
How to hack a SCHOOL Network? All typed by The Evilhacker
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
How to hack a SCHOOL Network ][
|
|||
|
|
|||
|
|
|||
|
[=NOTICE=]
|
|||
|
|
|||
|
The following information is for the purpose of knowledge and nothing
|
|||
|
else. The character "The Evilhacker", is purely fictional and does not exist
|
|||
|
All those exploited in his actions have his apologies.
|
|||
|
|
|||
|
[=PREFACE=]
|
|||
|
|
|||
|
Hey what's up fellow computer phreaks, too bad I ain't one... Anyway
|
|||
|
before we begin to learn to hack a school network I would like to strongly
|
|||
|
advise that you do not do this, due to the fact that penalties are very stiff.
|
|||
|
If you are caught in the act of hacking you will be either:
|
|||
|
|
|||
|
1. Suspended.
|
|||
|
2. EXPELLED!
|
|||
|
3. Forced to pay for all damages or loss of data.
|
|||
|
4. Humiliated because your whole school will know that you
|
|||
|
are a computer nerd.
|
|||
|
|
|||
|
That is all I have to tell you about penalties, and I totally wash my hands
|
|||
|
from any incident which may happen to you due to this text file...
|
|||
|
So it has been said so let it be done...
|
|||
|
|
|||
|
|
|||
|
[=Chapter 1=]
|
|||
|
|
|||
|
Ok, the first step in hacking is understanding the concept. Most
|
|||
|
school run their computers on networks, because it is alot easier for
|
|||
|
students and teachers to access their files (work). A network is simply a
|
|||
|
group of copmputers hooked up to a main computer, which enables people to
|
|||
|
use their computer, save their work, and retrieve it on another computer.
|
|||
|
This concept is used Ticket Reservation systems and eeve by police. The most
|
|||
|
common brand of network that a school would use is IBM SHOOL LAN. Lan is just
|
|||
|
a simple abrieviation for Local Area Network. The reason for this is because
|
|||
|
most computers are either IBM PS\1 in AT 286, or 386 SX, format. And since
|
|||
|
they are IBM they get a discount on the LAN software. Another common brand
|
|||
|
is Novell but since their prices are steep chances are it will not be
|
|||
|
available for student use.
|
|||
|
Another thing you should know is the Operating System (OS). A school
|
|||
|
will use an uncommon version or brand of OS which is not likely to be on
|
|||
|
most computers, due to the fact that students may create boot disk and bring
|
|||
|
them to school. The most common would be MS-DOS v3.1 and PC-DOS V3.0. Both
|
|||
|
these DOS versions are old considering that Microsoft currently has released
|
|||
|
MS-DOS 6.2 and IBM has released PC-DOS 7.0.
|
|||
|
|
|||
|
[=Chapter 2=]
|
|||
|
|
|||
|
Well an easy way to access the command prompt is simply by passing
|
|||
|
the start up files. It is highly unlikely that your computer is equiped with
|
|||
|
DOS 6.0+ so using the [F5] key will be hopeless. Your best bet is to hold
|
|||
|
down the [SHIFT] and hopefully the files will be passed and you will be
|
|||
|
granted access to the command prompt. Sometimes this may not work so you will
|
|||
|
have to do more work. Since batch (.BAT) files can be aborted by the
|
|||
|
[Ctrl] + [C] command or [Ctrl] + [Pause/Break] commands it fill be easy to
|
|||
|
abort the AUTOEXEC.BAT (The computer start up file). Simply abort when you
|
|||
|
see programs being loaded and you should see a message:
|
|||
|
|
|||
|
Terminate Batch File (Y/N)
|
|||
|
|
|||
|
And then press [Y] and BINGO.
|
|||
|
|
|||
|
|
|||
|
[=Chapter 3=]
|
|||
|
|
|||
|
If that did not work don't fret, simply ask your teacher what OS is
|
|||
|
on these computers and when he/she (I'm not sexist) tells you say you have the
|
|||
|
same on your computer. Then later (like a week or two) go back and tell him/
|
|||
|
her that you have a virus and could you make me a boot disk. He or She is
|
|||
|
certain to make you a boot disk of that version and brand OS. Once you recieve
|
|||
|
your boot disk, "Bull's eye", you have the key which gives you access to the
|
|||
|
command prompt. If you do not know how to operate a boot disk, all I have to
|
|||
|
say is that you are an "IGNORANT FOOL". Even a MAC (Apple McIntosh) could
|
|||
|
figure out how to use one. Well all you have to do is stick the disk in
|
|||
|
before you start your computer... Easy! By the way if you do have MAC's in
|
|||
|
your school I'll show you some tips in the MAC Chapter at the end... And if
|
|||
|
you have a Commodore, Amiga, Atari or anything else go and make some mods!
|
|||
|
|
|||
|
[=Chapter 4=] "IBM LAN"
|
|||
|
|
|||
|
Ok that did not work so we'll have to do this through the NET menu's.
|
|||
|
since Networks are basically a string of batch like files run through a main
|
|||
|
executable (.EXE or .COM) file it is likely to be simple to abort these menus.
|
|||
|
Well after you login (Try logining in as a friend in the SAME class as you.
|
|||
|
The reason is that I logged in as some guy with the logon of IGNATIUSX and
|
|||
|
his password was BUSY; well obviously the teacher knew that there was no
|
|||
|
one of that name in our class and since my login was totally different I was
|
|||
|
busted, but since I had a kind teacher I was let off the hook), pick a
|
|||
|
selection and at the second menu just abort. You can abort by pressing
|
|||
|
[Ctrl] + [C] or [Ctrl] + [Pause/Break]. It will ask you if you wish to
|
|||
|
terminate the batch file and obviously you will answer with [Y].
|
|||
|
Well if you don't know where to break why don't you try these
|
|||
|
places:
|
|||
|
|
|||
|
1. CHANGE YOUR PASSWORD
|
|||
|
2. DIR OF DRIVE A: (B:)
|
|||
|
3. DIR OF STUDENT HOME DIRECTORY
|
|||
|
|
|||
|
These are the most likliest places to be able to abort because it uses OS.
|
|||
|
|
|||
|
[=Chapter 4b=]
|
|||
|
|
|||
|
Simple... There's a secret passthru command built into IBM LAN.
|
|||
|
To access it you must be at the Main Menu screen (some schools may have
|
|||
|
hexed this out). Simply hold down the [Alt] key, then in this sequence
|
|||
|
press [A], then [T], then [E]. Bam, your into DOS.
|
|||
|
|
|||
|
[=Chapter 5=]
|
|||
|
|
|||
|
Well if none of these worked then you are messed. You could try
|
|||
|
to hack through programs but there will be little memory and it will take
|
|||
|
longer but nevertheless you are in. Here are some tips for certain school
|
|||
|
programs:
|
|||
|
|
|||
|
[Turbo Pascal/C ++]
|
|||
|
Here is a good source good which should work:
|
|||
|
|
|||
|
Check the file HACKDEMO.PAS which is included in this ZIP
|
|||
|
|
|||
|
[Shapescape/Turing]
|
|||
|
Go to the command menu and type ":sh" or ":shell" or ":SHELL"
|
|||
|
Note: All commands are case sensitive!
|
|||
|
|
|||
|
Heres a quick source that should access the COMMAND prompt.
|
|||
|
|
|||
|
% Program_Name : DOS SHELL
|
|||
|
% Purpose : To access DOS.
|
|||
|
%
|
|||
|
% var s: int
|
|||
|
% system ("command.com",s)
|
|||
|
%
|
|||
|
|
|||
|
[WordPerfect]
|
|||
|
Go to the menu and select "Shell to DOS".
|
|||
|
If that doesn't work select run a program and run "C:\COMMAND.COM"
|
|||
|
These should be enough to run the program.
|
|||
|
|
|||
|
[Microsft Works]
|
|||
|
In the main menu go to the run and type "C:\COMMAND.COM"
|
|||
|
|
|||
|
[Other programs]
|
|||
|
There are so many programs it is hard to tell you what to do so try to abort
|
|||
|
and to run the COMMAND.COM
|
|||
|
|
|||
|
|
|||
|
[=Chapter 6=]
|
|||
|
|
|||
|
Finally if all fails, for IBM LAN, if you can't get in I
|
|||
|
included the SYSTEM BOOT-UP OPTION disk in this packet. Use it
|
|||
|
to modify the whole network! Hahaha. Try it. The file is named
|
|||
|
IBM-BOOT.EXE
|
|||
|
|
|||
|
|
|||
|
[=Chapter 6 for NOVELL USERS=]
|
|||
|
|
|||
|
The archive NOVELL.EXE contains password attainers for use
|
|||
|
on Novell Networks. Use it to create havoc. Have fun!
|
|||
|
|
|||
|
|
|||
|
[=Chapter 7=] What do I do when I am there?
|
|||
|
|
|||
|
Well there is not much to do once you are at the command prompt.
|
|||
|
You should notice that the drives are partitioned into many drives in
|
|||
|
order for the LAN to work properly and to confuse hackers. If you are
|
|||
|
looking for programs it will be or either drive W: or E:. Student files
|
|||
|
are also on W:. It all depends on the way it is setup but it will definatley
|
|||
|
be a partioned hard disk drive. You could leech all the school programs,
|
|||
|
play games and impress your friends, or be EVIL. I never had the chance
|
|||
|
to do this because I had to sit right up front by the teacher because of
|
|||
|
that damn alphabetic seating plan and my last name didn't even start with
|
|||
|
an A or a B,C,D... Anyway you put virus on the computer. It is simple.
|
|||
|
Download a virus from your favourite Pirate Bulletin Board System and
|
|||
|
uncompress it onto a disk. Copy the school's COMMAND.COM file onto that
|
|||
|
disk and then WRITE PROTECT your harddrive and MEMORY! Run the disk
|
|||
|
COMMAND.COM and then the virusized program. Once done replace the original
|
|||
|
school COMMAND.COM with this virusized copy. If you were unable to run
|
|||
|
the CCOMMAND.COM just copy the virus infected program to the school
|
|||
|
computer and add it to the autoexec.bat file, hopefully to the beigining
|
|||
|
of the AUTOEXEC.BAT file so that all the autoexec files that are run will
|
|||
|
be infected. This is 100% fool proof. But before you do that have fun on
|
|||
|
supply teacher classes and play games if you even bother going to class.
|
|||
|
|
|||
|
[=MAC ATTACK, MAC ATTACK=]
|
|||
|
|
|||
|
Yo, Yo, YO! What is up my MAC frieneds. MAC's suck but are
|
|||
|
pretty cool for an over-rated, over priced and under powered machine.
|
|||
|
Elementry schools are the main schools with Apple McIntosch computers
|
|||
|
because they are so easy to use. If this in the USA or anywhere else
|
|||
|
I doubt you ever have computers in Elementry Schools because the US is
|
|||
|
a hood. Washington is like the only place that ain't a ghetto...
|
|||
|
Anyway back to the subject. To Hack a Mac is easy. Teachers often
|
|||
|
try to hide their files. A maze of directories is very common, but to
|
|||
|
outsmart your teacher go to seacrh and search for all files. When you
|
|||
|
find a file with a long directory sort of path you know it is hidden.
|
|||
|
Sorry I don't know much about MAC's but all I have is one year's
|
|||
|
experience with them back in grade eight, which was a LONG time ago.
|
|||
|
|
|||
|
[=CONCLUSION=]
|
|||
|
|
|||
|
I would like to thank you [censored-censored-censored-censored-censored]
|
|||
|
for reading this, and hope you are successful in your quest to hack
|
|||
|
your school. I must tell you I have nothing to do with what happens
|
|||
|
to you.
|
|||
|
|
|||
|
[=GREETS=]
|
|||
|
Greets to those people who try and get me FREE things like I dunno,
|
|||
|
computer parts, weapons, and of course FREE Internet Accounts for
|
|||
|
my personal abuse.
|
|||
|
|
|||
|
[=COMMENTS/QUESTIONS?=]
|
|||
|
Contact me by Internet Email at : evilhacker@apc.tor250.org
|
|||
|
|
|||
|
Note: If you are wondering why all my real names at my email accounts
|
|||
|
seem to be different, gee I wonder.. It ain't my real name fools.. But
|
|||
|
they are REAL people, just no me though stupid LAMERS.
|
|||
|
|
|||
|
[=END=]
|
|||
|
How to Hack School Networks ][
|
|||
|
1995 Evilhacker Productions, The Evilhacker.
|
|||
|
|
|||
|
This text file was not proof read, nor spell checked.
|
|||
|
I'm never going to update this again.. So the rest is up to you!
|