1233 lines
65 KiB
Plaintext
1233 lines
65 KiB
Plaintext
|
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><> <20><><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
"The name speaks for itself!" <20><>
|
|||
|
|
|||
|
Presents the
|
|||
|
|
|||
|
Damage, INC. Newsletter
|
|||
|
|
|||
|
October 1997 Issue #2
|
|||
|
|
|||
|
"Fighting Corruption with Information."
|
|||
|
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
C O N T E N T S :
|
|||
|
|
|||
|
|
|||
|
INTRODUCTION - An Introduction to the Damage, INC. Newsletter.
|
|||
|
|
|||
|
BIG BROTHER BASHING - Encryption and Big Brother's need for control.
|
|||
|
Search String: {BIG BROTHER}
|
|||
|
|
|||
|
BLACKENED'S TIP OF THE MONTH - Detecting trojans using a hex editor.
|
|||
|
Search String: {BLACKENED}
|
|||
|
|
|||
|
CONSPIRACIES AND COVERUPS - The War Against Unions.
|
|||
|
Search String: {COVERUPS}
|
|||
|
|
|||
|
CORRUPTION AND GREED - Bell TotalVision...the start of a total monopoly.
|
|||
|
Search String: {GREED}
|
|||
|
|
|||
|
H/P INFORMATION AND NEWS - Extenders and h/p News.
|
|||
|
Search String: {NEWS}
|
|||
|
|
|||
|
INTERVIEWS AND INTERROGATIONS - An interrogation of LORDICON.
|
|||
|
Search String: {INTERVIEWS}
|
|||
|
|
|||
|
LETTERS TO THE EDITOR - Feedback from Aenima about the Damage, INC. Newsletter.
|
|||
|
Search String: {LETTERS}
|
|||
|
|
|||
|
OBJECTIVE OPINIONS - Hacking and Hollywood.
|
|||
|
Search String: {OPINIONS}
|
|||
|
|
|||
|
REPORTS FROM THE FRONT - Social Engineering.
|
|||
|
Search String: {REPORTS}
|
|||
|
|
|||
|
SOURCE AND SCRIPTS - The RAZORBACK trojan by Damage, INC.
|
|||
|
Search String: {SOURCE}
|
|||
|
|
|||
|
THE JOURNALIST'S TOP TEN LIST - Phun things to do in the Fall
|
|||
|
Search String: {TOP TEN}
|
|||
|
|
|||
|
CLOSING COMMENTS - BLACKENED'S Inspirational Closing Comments.
|
|||
|
Search String: {CLOSING}
|
|||
|
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
|
|||
|
|
|||
|
INTRODUCTION: Greetings and salutations to our loyal readers. Welcome to the
|
|||
|
second issue of the Damage, INC. Newsletter. This issue includes
|
|||
|
more h/p information, interesting articles, an interrogation and
|
|||
|
the RAZORBACK trojan. The contents has been changed to make it
|
|||
|
easier to read and use. Personally, I think it's an improvement.
|
|||
|
There were so many articles written for this particular issue
|
|||
|
that we couldn't publish all of them. That does not mean we
|
|||
|
aren't accepting new writers though, as we are always interested
|
|||
|
in articles that contain different opinions and ideas. Also, if
|
|||
|
you program and want to support us... or contribute in some way,
|
|||
|
contact us. To all of our readers: Read, learn, experiment and
|
|||
|
explore with h/p. Lastly, enjoy reading the newsletter and the
|
|||
|
information that is provided to you. ;)
|
|||
|
|
|||
|
|
|||
|
BIG BROTHER BASHING - {BIG BROTHER}
|
|||
|
Encryption and Big Brother's need for control.
|
|||
|
|
|||
|
Big Brother, the "spy in the sky" is watching. Not only that, they are taking
|
|||
|
control of encryption and taking away your right to privacy. That's correct,
|
|||
|
Big Bro will do anything in it's power to stop you from protecting your own
|
|||
|
privacy. Those that encrypt data (text and executable files) do so in an
|
|||
|
attempt to keep that information private. Is there any point in locking up
|
|||
|
something if Big Brother already has the key? No, of course not. That would
|
|||
|
be a complete waste of time, and you would only be giving yourself a false
|
|||
|
sense of security. Don't allow them to easily decrypt sensitive data and use
|
|||
|
it against you as "evidence". I've researched this topic very thoroughly, and
|
|||
|
the lengths that Big Brother goes to in order to infiltrate the personal
|
|||
|
information of citizens sickens me.
|
|||
|
|
|||
|
This article wasn't written to describe every type of encryption, nor was the
|
|||
|
intent to teach you all all about how it works etc. The purpose is to educate
|
|||
|
you, by showing you that many types of encryption aren't safe. Big Brother has
|
|||
|
regulated and controlled encryption by setting standards. Anyone that follows
|
|||
|
those standards in programming encryption routines is just helping them by
|
|||
|
leaving a backdoor wide open for Big Bro to use against you. The NSA (National
|
|||
|
Security Agency) in the United States is guilty of approving algorithms that
|
|||
|
they don't trust or use for their own internal security. DES and RSA were
|
|||
|
approved by the NSA for public use, because they know it offers citizens very
|
|||
|
little protection against the prying eyes of Big Bro. You must take any and
|
|||
|
all steps necessary in order to secure vital information and make sure it isn't
|
|||
|
sitting in an unlocked safe. Unless of course, you want it to be read, stolen,
|
|||
|
distributed elsewhere etc.
|
|||
|
|
|||
|
Since many commercial encryption programs are a fucking joke, and follow the
|
|||
|
government standards, I recommend that you avoid using them for anything.
|
|||
|
If you really want to keep sensitive information protected, but don't know
|
|||
|
much about encryption routines, program utilities etc. then download Vincrypt
|
|||
|
or any other quality non-commercial encryption program. Many of them are
|
|||
|
available on my board at no ratio. Here's a direct quote from the docs of
|
|||
|
Vincrypt that describes what it is:
|
|||
|
|
|||
|
"Well, basically what Vincrypt is, and was designed to do is keep sensitive
|
|||
|
information protected. There have been many other programs that are out that
|
|||
|
do along the same thing as Vincrypt, but not to the same degree. Vincrypt
|
|||
|
incorporates a modified DES routine, RSA public-key, MPJ encryption, and a
|
|||
|
modified PKware zip based routine. The most significant factor about this
|
|||
|
program is the fact that it is a relatively 'dumb' program. Aside from
|
|||
|
identifying whether or not the source file was generated with the program, it
|
|||
|
simply processes the files without any headers of pointers. The reason for
|
|||
|
this is to make it even more difficult to break the routine and bypass the
|
|||
|
encryption due to file common information (such as how all government letters
|
|||
|
say TO: FROM: DEPT:, etc)."
|
|||
|
|
|||
|
Also, you can use it on text and executable (COM, EXE) files. If you want to
|
|||
|
know more about encryption, find CRYPTFAQ.ZIP, download it and read through it
|
|||
|
carefully. There's a vast amount of information in that FAQ, therefore there
|
|||
|
is no point in repeating it here. In conclusion, Big Brother always seeks
|
|||
|
control. Even the author of Vincrypt mentions Orwell's book 1984 and can see
|
|||
|
the similarities between the book and the present. We live in very turbulent
|
|||
|
and troublesome times. Trusting the government is a trap that can turn into a
|
|||
|
fatal mistake faster than you can say "Billy Gates". He and his corrupt company
|
|||
|
Micro$oft fit into the Big Brother category as well... since Windoze is setup
|
|||
|
to invade privacy. That's another article though. ;) Be aware, take measures
|
|||
|
to protect sensitive data and information and don't just trust everyone. If you
|
|||
|
do, don't complain afterwards about your privacy being taken or invaded by
|
|||
|
someone. You are responsible for your own privacy, and can't rely on anyone
|
|||
|
else to protect you from Big Brother. I suggest that you take the first step by
|
|||
|
getting Vincrypt or an equally good encryption program. Then create your own
|
|||
|
unique password and encrypt anything you have that might be classified as
|
|||
|
incriminating evidence.
|
|||
|
|
|||
|
|
|||
|
BLACKENED'S TIP OF THE MONTH - {BLACKENED}
|
|||
|
Detecting trojans using a hex editor:
|
|||
|
|
|||
|
Thanks to the suggestion Aenima wrote to me on FoI, we have a new section in
|
|||
|
the Damage, INC. Newsletter. ;) Every month, I will share another h/p/a/c/v/t
|
|||
|
related tip with readers. It's up to you how the information I give out is
|
|||
|
used. Perhaps you'll get some ideas of your own and start thinking after
|
|||
|
reading this section. Yes, the first tip is about *detecting* trojans... and
|
|||
|
we are trying to help people by providing them with reliable information.
|
|||
|
|
|||
|
First, you'll need to have a quality Hex Editor to use. Load up TROJAN.COM
|
|||
|
or TROJAN.EXE (or a file that you suspect to be a trojan) into a hex editor.
|
|||
|
Second, look for MZ at the top as the first two characters if it's an EXE
|
|||
|
file. It should be there, even if the file has been Pklited. That's just a
|
|||
|
quick way to tell if the file is a legitimate EXE or not. Next, look at the
|
|||
|
first page on your screen. Do you see the string "Not enough memory$" visible
|
|||
|
anywhere? If so, that is an indication that the EXE file has been Pklited.
|
|||
|
Is there a string of "PKLITE Copr. 1990-92 PKWARE Inc. All Rights Reserved"
|
|||
|
on the screen? That's called a Pklite header. It shows that the file has
|
|||
|
been compressed. However, that can be overwritten with data so that the
|
|||
|
EXE file won't look like it's been Pklited. If that string isn't there but
|
|||
|
the "Not enough memory$" one is, the file has more than likely been Pklited
|
|||
|
and then altered with a hex editor or by using a utility to remove the Pklite
|
|||
|
header. You can put the Pklite header back by using a hex editor, then you
|
|||
|
can Pkunlite it (uncompress the file). After that, you can disassemble it
|
|||
|
using Sourcer or the disassembler of your choice. If extra compression was
|
|||
|
used to Pklite the file, you'll need a special Pkunlite utility. Of course,
|
|||
|
it's available to download from AJFA at no ratio.
|
|||
|
|
|||
|
You can also use your hex editor to look for other strings, such as *.COM,
|
|||
|
*.EXE, *.*, Borland etc. by doing text searches. If you see words such as
|
|||
|
"nuked" or any other suspicious text... then send a copy of the file to a
|
|||
|
member of Damage, INC. and we'll test it for you and determine exactly what
|
|||
|
it is. As a free service, we do virus/trojan research for respected users in
|
|||
|
the hacking/phreaking scene. We will report our findings to the user that
|
|||
|
sends us the file(s) that they don't trust. In fact, we will even disassemble
|
|||
|
the file(s) and give you a copy of the source code if you request it.
|
|||
|
|
|||
|
Recently, it's become popular to use a small utility called Mini-Chainer to
|
|||
|
link trojans to legitimate COM and EXE files. Here's a quick and easy way
|
|||
|
to find them. Load the file up into a hex editor. Look at the second line
|
|||
|
on the first page. If the word "FUCK" is written there, then that basically
|
|||
|
means someone used Mini-Chainer to link one file to another. That doesn't
|
|||
|
necessarily mean it's a trojan, although it's possible since a lot of people
|
|||
|
around here use that method to attach trojans to other files. I hope you find
|
|||
|
these tips useful for detecting trojans (that are undetectable to the majority
|
|||
|
of virus scanners, including heuristics). Of course, there are also more
|
|||
|
complex ways that you can use a hex editor to detect trojans. Another tip is
|
|||
|
to check the end of the file, and simply compare it to another EXE file that
|
|||
|
you know is legit. There are other reliable, more complicated methods as well.
|
|||
|
I'll leave disassembly tips for another issue though. ;)
|
|||
|
|
|||
|
|
|||
|
CONSPIRACIES AND COVERUPS - {COVERUPS}
|
|||
|
THE WAR AGAINST UNIONS
|
|||
|
|
|||
|
Big business and the governments in North America are doing all that they
|
|||
|
can to weaken unions. Twenty years ago, approximately 21 percent of the
|
|||
|
private workforce were members of a union. That has dropped down to a mere
|
|||
|
10 percent. As many businesses report record profit levels, the wages and
|
|||
|
benefits for the working class have been stagnated for the past twenty
|
|||
|
years. "Big business" is profiting immensely from the recession of the
|
|||
|
early 1990s when the working class was victimized by layoffs, job migration,
|
|||
|
and "downsizing". Even as the world's economy gains strength, particularly
|
|||
|
in the United States, workers are not seeing any of the benefits.
|
|||
|
|
|||
|
For the most part, the record corporate profits have been made off of the
|
|||
|
backs of workers, not on superior products or good management. It is
|
|||
|
cheaper for businesses to have several part-time employees instead of one
|
|||
|
full-time employee. With no real job security, no benefits, no guarantee
|
|||
|
for stable hours, and minimum wages, it is extremely difficult for part-time
|
|||
|
workers to earn a decent living. In contrast to part-time employees, most
|
|||
|
full-time employees earn higher wages, have a benefit package, stable hours
|
|||
|
and more job security with seniority based upon their hiring date.
|
|||
|
|
|||
|
The proliferation of these part-time positions is one of the issues that
|
|||
|
the Teamsters Union fought in the recent UPS strike. They were successful
|
|||
|
in forcing UPS to maintain all current full-time positions. The Teamsters
|
|||
|
Union also fought for stable hours for UPS's part-time employees. One lie
|
|||
|
that the government and big business spread during the UPS strike was "all
|
|||
|
part-time employees want to work part-time!" There are millions of workers
|
|||
|
throughout North America that do not agree with that statement. CNN
|
|||
|
interviewed several striking UPS employees. Many were working part-time
|
|||
|
for years, and admitted that they badly wanted and needed full-time positions.
|
|||
|
UPS promised these employees full-time jobs eventually... but "eventually"
|
|||
|
never came for them. Thankfully, UPS was stopped in its quest to make even
|
|||
|
more money off of the backs of their employees. Unfortunately, union members
|
|||
|
must be vigilant, because thousands of other companies are looking to maximize
|
|||
|
profits at any cost.
|
|||
|
|
|||
|
Another tactic that fat cat corporations love to use is to employ temporary
|
|||
|
workers in a continuous cycle. Temporary workers are not their employees,
|
|||
|
and therefore have no link to the company. These workers aren't treated
|
|||
|
like human beings, but like a tool that is used and then disposed of when
|
|||
|
it is no longer needed. Temporary workers also have to live with the fact
|
|||
|
that they are only making a portion of what the company is paying for their
|
|||
|
services. Being an employee of a temporary agency is a sickening experience.
|
|||
|
If it weren't for labour unions, all members of the working class would be
|
|||
|
treated the same way that non-unionized temporary workers are today.
|
|||
|
|
|||
|
Unions are now in a fight for survival. In July, the government of Ontario
|
|||
|
proposed a law to take away the right to strike from municipal, education,
|
|||
|
hospital, and other public workers. The public unions retaliated by
|
|||
|
threatening to initiate province wide walkouts. Premier Mike Harris, afraid
|
|||
|
that the public would hold him responsible for the potential walkout, backed
|
|||
|
down. He then promised to "restore the right to strike" in an amendment.
|
|||
|
Harris then changed his tactics. Instead of attacking all public sector
|
|||
|
workers, he seems to be attacking one faction at a time. Former Education
|
|||
|
Minister John Snoblen, one of Harris' puppets, announced that would make the
|
|||
|
school year longer, and that he wants to strip the right to strike from
|
|||
|
teachers. He also wants to eliminate up to 10,000 jobs in addition to cutting
|
|||
|
$1 billion from Ontario's education system. In order to protect their union
|
|||
|
and maintain their rights, the teachers have initiated an "illegal" strike.
|
|||
|
Instead of negotiating with their employees in good faith, the government is
|
|||
|
attempting to take any kind of leverage or strength away from the public
|
|||
|
worker's union. And whatever the government does to help themselves in their
|
|||
|
own labour problems eventually helps greedy "big business" as well.
|
|||
|
|
|||
|
It is sickening how many people have adopted a negative view towards unions.
|
|||
|
They focus more on negative scandals, instead of the benefits that labour unions
|
|||
|
have obtained for its members. When the name Jimmy Hoffa, the former Teamsters
|
|||
|
Union President, is mentioned, he is remembered more for being convicted of
|
|||
|
jury tampering and misappropriation of union funds. Meanwhile, he was
|
|||
|
responsible for signing the first U.S. contract with trucking companies, giving
|
|||
|
truckers more job security and better working conditions. Another example is
|
|||
|
very recent. Teamsters president Ron Carey was responsible for the union's
|
|||
|
victory over UPS. However, it has come to light that his campaign managers
|
|||
|
misappropriated union funds in order to finance his successful run at the
|
|||
|
presidency of the union. In my personal opinion, unions are too important to
|
|||
|
be destroyed by the greed of some of the union's executives. The fact remains
|
|||
|
that without unions, all the people that consider themselves to be in the
|
|||
|
working class would be at the mercy of upper management. One employee who
|
|||
|
stands up for better working conditions and pay is the next employee to be
|
|||
|
fired. It takes all the employees united together in order to get their CEO's
|
|||
|
attention.
|
|||
|
|
|||
|
There is a conspiracy to destroy unions, not only in Ontario but in the rest
|
|||
|
of North America. The government always sides with big business whenever
|
|||
|
there's a dispute or large scale strike. Plus, big business has more power
|
|||
|
and influence in government than most citizens realize. They stick together
|
|||
|
in their goal to enslave the working class, remove our rights, benefits,
|
|||
|
job security and keep wages low. The auto industry is a perfect example of
|
|||
|
how the large companies make sure the UAW (United Auto Workers) isn't given
|
|||
|
too much in contract negotiations. They protect each other. It's time for
|
|||
|
the working class to unite and fight back. Fight fire with fire.
|
|||
|
|
|||
|
|
|||
|
CORRUPTION AND GREED - {GREED}
|
|||
|
Bell TotalVision...the start of a total monopoly.
|
|||
|
|
|||
|
The media has recently been releasing a lot of reports and articles on Bell.
|
|||
|
I've personally been keeping a close eye on that company, and feel they are
|
|||
|
on the verge of a total monopoly. As in, a monopoly comparable to the
|
|||
|
magnitude of Micro$oft and its control of the software industry. I will
|
|||
|
explain in further detail by quoting from an article that I read recently,
|
|||
|
and paraphrasing from a Quebec television program.
|
|||
|
|
|||
|
The headline reads "Bell Canada rolls out TV cable trial in London, Ont."
|
|||
|
That's right, Bell is doing market trials in London, Ont. and Repentigny, Que.
|
|||
|
It's their first step towards a total monopoly on the telephone, TV and
|
|||
|
Internet service industries. The Canadian Press article starts off by saying
|
|||
|
"Ma Bell has fired a shot over the bow of the cable television industry,
|
|||
|
rolling out big-gun interactive technology in a fight to win the hearts and
|
|||
|
wallets of viewers." The wallet comment is pure truth. That is always the
|
|||
|
goal of Bell Canada, and has been since the inception of that corrupt, greedy
|
|||
|
organization.
|
|||
|
|
|||
|
Is Bell really seeking a total monopoly? Here's another quote: "The outcome
|
|||
|
could see a single company look after all the communication and entertainment
|
|||
|
needs of a subscriber - phone, interactive TV and high-speed Internet." That
|
|||
|
should clarify their motives a little. Terry Jarman, Bell's group vice-
|
|||
|
president for business development was quoted as saying "TotalVision is a first
|
|||
|
for Bell and for our customers." That's a very obvious statement, since this
|
|||
|
is the first attempt by Bell to dominate three different industries and gain
|
|||
|
a total monopoly. TotalVision=Total Monopoly. That equation shouldn't be too
|
|||
|
difficult for our readers to understand.
|
|||
|
|
|||
|
Jarman also said that consumers will be the big winners and that "TotalVision
|
|||
|
is ushering in a whole new level of programming choice and quality." Quality?
|
|||
|
That must be questioned by us as consumers. Judging by Bell's past inferior
|
|||
|
quality and service in the telephone industry, TotalVision will be Total Shit.
|
|||
|
|
|||
|
According to the article, there will be a package that starts at $19.95 a
|
|||
|
month for 26 channels of programming that's already available locally on
|
|||
|
Rogers Cablesystems. I'm not defending Rogers by any means, just giving you
|
|||
|
the necessary information on cost etc. The $19.95 is what Bell claims their
|
|||
|
TotalVision will start at, but of course that can easily change without notice.
|
|||
|
Also, that is the most basic package, nothing more than normal cable TV in my
|
|||
|
opinion. The article goes on to say "Subscribers will be able to build their
|
|||
|
own TV menu by adding themed bundles of channels - such as news and sports -
|
|||
|
plus specialty stations to the basic offering." Again, Rogers offers a very
|
|||
|
similar "specialty station" and "Cable plus" type of service. Therefore,
|
|||
|
Bell isn't revolutionizing anything by being innovative and creative.
|
|||
|
|
|||
|
Jarman also said that "TotalVision promises sharper picture and better sound
|
|||
|
quality through digital technology." It also comes with an interactive program
|
|||
|
guide, an on-screen device that "transforms regular channel surfing into a
|
|||
|
high-tech art" according to the Canadian Press. Haha. It has station lock-out
|
|||
|
capabilities (many TV devices offer that already) and a what's-on-right-now
|
|||
|
feature. "With a hand-held converter, viewers can select a week's worth of
|
|||
|
viewing by subject, title or channel." "The converter can also remind a viewer
|
|||
|
when a favorite program is about to start." Those features might sound nice,
|
|||
|
but don't be influenced into thinking they were difficult to implement. Here
|
|||
|
is the best part, "Bell customers also will be offered high-speed Internet
|
|||
|
access, either through a personal computer or the television." Man, Bell sure
|
|||
|
is getting into the cable TV and Internet service market quickly. They must
|
|||
|
have realized how much cash is involved, and want to grab as much of the market
|
|||
|
as they can.
|
|||
|
|
|||
|
Jarman also said that "more choices - not anti-cable industry sentiment - will
|
|||
|
be the biggest motivator for people in the test area to switch to Bell."
|
|||
|
Why didn't he just speak the truth, and say that influence, propaganda,
|
|||
|
ignorance and naiveness by Bell customers are the biggest factors. The zombies
|
|||
|
want to support Bell, remain loyal to them, and help them build a gigantic
|
|||
|
monopoly. The government, politicians etc. are already trying to tell people
|
|||
|
to switch to Bell. And I quote London Mayor Dianne Haskett "the initiative
|
|||
|
will help keep the city in the forefront of technological change." That's a
|
|||
|
direct attempt by the mayor to influence the citizens of London to try
|
|||
|
TotalVision and give Bell money. They are expecting as many as 1,500
|
|||
|
subscribers signed up by the end of this year in London, about 3,500 households
|
|||
|
in both London and Repentigny, before they expand and try to reach millions of
|
|||
|
other TV subscribers across the country. Bell's plans for a total monopoly are
|
|||
|
crystal clear as far as I'm concerned. Owning a monopoly on local telephone
|
|||
|
service isn't enough for those greedy Bell bastards. They want "TotalControl",
|
|||
|
which is what TotalVision equates to being. I can't even imagine the poor
|
|||
|
customer service you'd receive, when you encounter problems with cable or
|
|||
|
internet usage. If it's anything like their current "customer service" then
|
|||
|
the word poor won't begin to describe it. In summary, watch out for
|
|||
|
TotalVision. If it's offered in your area, do some research first before
|
|||
|
switching and paying the price. Bell will use every marketing tactic, and every
|
|||
|
trick in the book (including underhanded payoffs, undercutting the competition
|
|||
|
for a couple of months etc.) to urge you, sway you and ultimately influence you
|
|||
|
into switching to Bell TotalVision. Don't be fooled like a zombie. Make an
|
|||
|
intelligent, informed choice. Don't base your decision on their expected,
|
|||
|
upcoming commercials and other advertising but rather on facts and real
|
|||
|
information.
|
|||
|
|
|||
|
|
|||
|
H/P INFORMATION AND NEWS - {NEWS}
|
|||
|
|
|||
|
If the thought of using an extender, or the mention of the word itself makes
|
|||
|
you shudder in fear then quit reading now. The information discussed in this
|
|||
|
section is for informational purposes only. If and how you use it is your own
|
|||
|
choice, and we aren't responsible for any consequences that might result.
|
|||
|
|
|||
|
Extenders are mainly used to call ld for free. Some extenders divert, but
|
|||
|
not all of them do. There are several quick and easy ways to find that out.
|
|||
|
For example, if you're using 651-2252 to call Guelph from K-W... you can dial
|
|||
|
an ANI. If it reports your phone number, then it doesn't divert. Or, if you
|
|||
|
don't have an ANI... try calling a friend that has Caller ID and ask them what
|
|||
|
phone number is displayed. If you don't know anyone that has Caller ID and
|
|||
|
are desperate to know if it diverts, call a friend and ask them to hang up and
|
|||
|
type *69 to find out the number of the last caller.
|
|||
|
|
|||
|
In order to find extenders, you'll need to use a good scanner such as ToneLoc.
|
|||
|
Download a copy of ToneLoc from a local h/p board, read the docs and take time
|
|||
|
to set it up properly etc. Start scanning some exchanges in your local area.
|
|||
|
Make sure you log everything. You'll soon discover that there are quite a few
|
|||
|
tones and carriers around that you never knew existed. (Examples: 651-2252,
|
|||
|
651-2255, 895-2255, 846-2255 etc.) Don't scan at night because you'll awaken
|
|||
|
people. Use *67 in the dialing prefix as a small precaution. Be aware of
|
|||
|
what you're doing and careful not to call certain numbers that will end up
|
|||
|
getting you caught. If you use ToneLoc, you can create a list of numbers that
|
|||
|
should never be dialed while scanning. There are also several features that
|
|||
|
you can use for making notes of tones, carriers, VMBs etc.
|
|||
|
|
|||
|
Once you've found an extender or two, and realize that there is a passcode
|
|||
|
(usually 4+ digits)... don't despair or give up immediately. That simply
|
|||
|
means it will have to be hacked. First, you have to determine how many digits
|
|||
|
the passcode is. Try calling it voice (using your phone) and listening to
|
|||
|
the recorded message... Experiment by entering in a few digits and gauge the
|
|||
|
amount of time you are given for that task. There are things that can't be
|
|||
|
taught in a text file, such as intuition, resourcefulness, skill, experience
|
|||
|
and intelligence. ;)
|
|||
|
|
|||
|
ToneLoc can be used to scan and hack PBXs, extenders etc. or you can use any
|
|||
|
scanner that you prefer. There are also ways to use Telix scripts etc. for
|
|||
|
this purpose. Hacking is much more than just reading how to do something,
|
|||
|
learning one technique or using a scanner. It is thinking and learning on
|
|||
|
your own. Therefore, these are just the basics to get newbies started.
|
|||
|
|
|||
|
Okay, so you've found an extender and believe it has a 4 digit passcode. Now
|
|||
|
what? You can manually try to "guess" default type passcodes if you want.
|
|||
|
However, that isn't the most efficient way for obvious reason. A 4 digit
|
|||
|
passcode means it is between 0000-9999. That's the range of possible choices.
|
|||
|
That does not mean that you should try every combination. Haha! If it's a PBX
|
|||
|
and not an extender, hack after business hours during the night (when most
|
|||
|
offices are closed)...ToneLoc can be used to hack extenders, diverters, PBXs,
|
|||
|
VMBs and just about any other code. In fact, there are people scanning and
|
|||
|
hacking codes in 519 all the time. Try to stick to the 4 digit ones, and use
|
|||
|
a diverter whenever possible. I'll discuss PBXs and VMBs in a future issue.
|
|||
|
Also, don't scan sequentially... or dial the same numbers day after day etc.
|
|||
|
If you have access to a remote system with a modem, then I'm sure you can figure
|
|||
|
out a way to safely use that for scanning and hacking codes.
|
|||
|
|
|||
|
Now that you've found a passcode for the extender, you'll need to use a dialing
|
|||
|
string in Telix (or the terminal program you use) like this example:
|
|||
|
|
|||
|
atdt 8952255,,,,####,,,,,8218486
|
|||
|
|
|||
|
The first number is the extender. The commas ",,,," are pauses. The #### is
|
|||
|
the passcode. Then there are more pauses and the number of a board or whatever
|
|||
|
you want to call. In the above example, I used distraught continuum which is a
|
|||
|
BBS in Guelph. You will have to experiment and try different amounts of pauses
|
|||
|
for virtually every extender that you find. As in, there are different lengths
|
|||
|
of messages etc. Some extenders require you to enter a client number first,
|
|||
|
then pauses, then the passcode, then more pauses and finally the number that
|
|||
|
you want to dial. If that sounds too difficult or complex, then you might as
|
|||
|
well forget about using extenders altogether.
|
|||
|
|
|||
|
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> H/P NEWS <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
|
|||
|
A 14 year old hacker in Burlington was caught hacking an estimated 500 internet
|
|||
|
sites, military sites etc. He was recently busted at his home. There weren't
|
|||
|
many details reported about the case, since he is a minor and the cops can't
|
|||
|
release his information. They also wouldn't disclose how he was caught or why
|
|||
|
he was able to hack that many sites before being caught.
|
|||
|
|
|||
|
Recently, the h/p scene has improved somewhat. There's still a long way to
|
|||
|
go though as many users still aren't educated and misunderstand what it is
|
|||
|
about. I'd like to give credit to the newbies that *are* learning. People
|
|||
|
such as Blade Runner have begun to read, experiment, learn and put that
|
|||
|
knowledge into practice. I can see potential in him, and hope that he
|
|||
|
continues to mature and evolve as well as become more involved. ;) In fact,
|
|||
|
I might start accepting new users on my board again, to reward people that
|
|||
|
are actually trying things and becoming dedicated. There might even be a new
|
|||
|
h/p board online in 519 soon. Perhaps the local scene is starting to change.
|
|||
|
|
|||
|
Chicago...Chicago... the city of Capone. Killing people in the streets...with
|
|||
|
a heart of stone.
|
|||
|
Chicago...Chicago... the city of Capone. Death is lurking everywhere...welcome
|
|||
|
to the crime zone.
|
|||
|
|
|||
|
Please allow me to introduce myself, my alias is Blackie Lawless. I am a
|
|||
|
proud member of Damage, INC. and have been in the h/p scene for many years.
|
|||
|
I'll be writing about any h/p news in my area that is worth reporting. Since
|
|||
|
I just moved to Chicago recently, I'm still becoming acquainted with the local
|
|||
|
h/p scene. I must say, I like the concept of the Damage, INC. Newsletter
|
|||
|
though and I'm looking forward to contributing more in future issues.
|
|||
|
|
|||
|
|
|||
|
INTERVIEWS AND INTERROGATIONS - {INTERVIEWS}
|
|||
|
|
|||
|
Below is Lordicon's reply to my New User Application message on Discrete and
|
|||
|
Elite. He laughs and tries to mock Damage, INC. That is what prompted me to
|
|||
|
interrogate him. I was very sarcastic with some of my comments and didn't
|
|||
|
answer any of his questions truthfully. Also, you'll notice that he likes
|
|||
|
to use the phrase "lemme guess" and calls h/p "old and lame" several times.
|
|||
|
This interrogation of Lordicon should show you how lamers talk and act. As
|
|||
|
you'll see, he knows nothing about h/p.
|
|||
|
|
|||
|
|
|||
|
-B is BLACKENED
|
|||
|
-L is Lordicon/Lamer
|
|||
|
|
|||
|
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
|||
|
<EFBFBD> Num <20> Date/Time <20> Sender <20> Subject <20>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
1 22 Sep 1997 05:55p Lordicon Re: New User Application
|
|||
|
|
|||
|
Select message (1-1) :
|
|||
|
|
|||
|
Date: 5:55 pm Mon Sep 22, 1997 Number : 1 of 1
|
|||
|
From: Lordicon Base : Private Mail
|
|||
|
To : Blackened Refer #: None
|
|||
|
Subj: Re: New User Application Replies: None
|
|||
|
Stat: Normal Origin : Local
|
|||
|
|
|||
|
|
|||
|
B> I saw an old ad for your board on FOI... and then it was on the bbs list
|
|||
|
B> on distraught continuum. So, I thought I'd call.. and check it out.
|
|||
|
B> Later
|
|||
|
B>
|
|||
|
B> BLACKENED
|
|||
|
B> Damage, INC.
|
|||
|
|
|||
|
cool...I guess...damage Inc...HAHAHAHA...u "hacker" nerd :)
|
|||
|
|
|||
|
Read mail (?=Help) :
|
|||
|
|
|||
|
.<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>.
|
|||
|
LORDICON jumps in to chat...
|
|||
|
<EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><>
|
|||
|
hi...this is your sisop speaking. -L
|
|||
|
|
|||
|
LORDICON Sends U back To Discreet & Elite...
|
|||
|
|
|||
|
.<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>.
|
|||
|
LORDICON jumps in to chat...
|
|||
|
<EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><>
|
|||
|
|
|||
|
hi...i can't talk sorry... -L
|
|||
|
|
|||
|
Why not? -B
|
|||
|
|
|||
|
grounded :( ...heh heh, damage inc. ...lame old hacking stuff... -L
|
|||
|
|
|||
|
|
|||
|
.<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>.
|
|||
|
LORDICON jumps in to chat...
|
|||
|
<EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><><EFBFBD><EFBFBD>..<2E><>
|
|||
|
|
|||
|
Hey.. how's it going? -B
|
|||
|
|
|||
|
fine :) ya, ok, I have lotz of homework 2 do so I gotta be quick ok... -L
|
|||
|
|
|||
|
okay. You have lots of homework already? -B
|
|||
|
|
|||
|
of course...I goto a private skool :( :) heh heh, ya we gotta wear a uniform
|
|||
|
(expensive) but it's comfortable -L
|
|||
|
|
|||
|
What school do you go to? -B
|
|||
|
|
|||
|
SJK (st john's kilmarnock) a little skool out by maryhill between gwelf and
|
|||
|
kW...ok, anywayz...assembly...why sort r we talking about like 6502 assembly
|
|||
|
or like 8386 or whatever? -L
|
|||
|
|
|||
|
8086/88. I was just wondering, why did you call your board discrete and elite?
|
|||
|
Does it have warez? -B
|
|||
|
|
|||
|
some, it's more of a name...u know, like Alien Horizons is just a name, it's
|
|||
|
not really some horizon with alien's on it...heh heh...mainly a cool rhyming
|
|||
|
name...ok but assembler!!!! :) -L
|
|||
|
|
|||
|
Okay, I know how to program in assembly. I'm new to calling Guelph boards,
|
|||
|
so I don't know what Alien Horizons is all about. Anyways, why were you
|
|||
|
saying before that you hate hacking/phreaking? -B
|
|||
|
|
|||
|
old and lame...people who are NEW to it think it's cool...all hacking is
|
|||
|
really if finding someone's PW cuz they made it easy to crack...more luck
|
|||
|
than skill in hacking and preaking is also lame, none of the like red or blue
|
|||
|
or other boxes really work...only thing that works is physically SPLICING the
|
|||
|
cables... it's just lame, and lame to see ppl with no experience saying...OH
|
|||
|
IT'S SOOO COOL... :) Can u UL me an assembly manual and an assembler? -L
|
|||
|
|
|||
|
Yeah, sure man.. right after we chat. I'm new to this and you're teaching me
|
|||
|
some things and giving me good information. What do you know about
|
|||
|
carding/anarchy? -B
|
|||
|
|
|||
|
I know that anarchy was origionally an antigovernment movement in europe that
|
|||
|
-- where some asshole decided to use bombs to highlight his opinions...so all
|
|||
|
use stupid idiots in canada and the US think that anarchy is breaking pop
|
|||
|
machines and blowing stuff up...YA RITE!...anywayz, carding is practically
|
|||
|
impossible unless u, again, PHYSICALLY get a card under some fake accound and
|
|||
|
like over draw on the account...see, it's not anything cool it's just luck! -L
|
|||
|
|
|||
|
Okay. Is Freedom of Information Archives a good source of information for
|
|||
|
that type of stuff? -B
|
|||
|
|
|||
|
ya, if u like it...I guess, I DL'd a whole ton of that stuff when I used to
|
|||
|
think it was cool...too bad it was about 8 year or so out of date...and
|
|||
|
besides, things like the black box OBVIOUSLY don't work...it's just cutting
|
|||
|
up a fone and sticking a light on one of the wires...and the guy who wrote
|
|||
|
the file says it makes the bell computers think ur still ringing and havn't
|
|||
|
picked up yet...oh well... -L
|
|||
|
|
|||
|
Do you still call FoI? -B
|
|||
|
|
|||
|
nope...no point...I don't like the stuff...I'm into games...way more fun and
|
|||
|
diverse than "hacking" -L
|
|||
|
|
|||
|
Okay, I read somewhere that you were deleted from there. ;) -B
|
|||
|
|
|||
|
ya, the sysop kicked me off (I was his cosysop) and I implimented a cool lite
|
|||
|
bar menu system for all the mojor menu's on the board...so like on the main
|
|||
|
menu u press up and down and left and right to move a cursor around and hit
|
|||
|
space when the cursor is on the desired item and then it takes u to that
|
|||
|
menu...
|
|||
|
btw, I may have to brake out of the conversation for a time if my parents
|
|||
|
come it so like, if I just stop typing for a while just hang -L
|
|||
|
|
|||
|
Okay, no problem man. So, why do you think Damage, INC. is lame though? Do
|
|||
|
you think I should stop being a member? -B
|
|||
|
|
|||
|
just had to brake out then,.,glad i told u :) I don't think DI is lame
|
|||
|
anymore, I thought it was some hacking/phreaking/anarchy thing (damage
|
|||
|
--the word damage suggests that) -L
|
|||
|
|
|||
|
Well, Damage, INC. does deal in h/p. ;) -B
|
|||
|
|
|||
|
lemme guess, u figure out cracks and stuff to get into things...well, if it's
|
|||
|
a crack for a good game or prog that's GREAT but if it's to hack some guys
|
|||
|
hard drive with a trojan or something that's lame! -L
|
|||
|
|
|||
|
What about hacking extenders/PBXs etc.? -B
|
|||
|
|
|||
|
u can get caught easily on those...besides, it's better to just get the net
|
|||
|
and use things like netfone...u can actually use a special PC card that
|
|||
|
plugs into the fone and let's u call a person over the net voice...cool eh..
|
|||
|
I could call u over the net and I'm pretty sure u don't even need to be on
|
|||
|
the net...it just calls or somthing...and it's free (cept for the 150 bucks
|
|||
|
or so for the card) ...btw, the Web is the most boring thing now, damn that
|
|||
|
netscape, making it all graphical and stuff...the old superfast text based
|
|||
|
thing was cool...like a giant bbs! -L
|
|||
|
|
|||
|
Yeah, what do you think about calling ld for free? -B
|
|||
|
|
|||
|
lemme guess, biege boxing...too dangerous and too unrelaible...I don't have
|
|||
|
anyone to call anywayz since I use ICQ over the net (not the web the
|
|||
|
internet...that's 2 different things) ICQ is a real time chat prog that let's
|
|||
|
u send files, chat and send msgs and other things with lots of people at the
|
|||
|
same time so I just chat with my friends in KW for free over that and send
|
|||
|
files too... -L
|
|||
|
|
|||
|
What about hacking ISPs and using the internet for free? -B
|
|||
|
|
|||
|
I just too my skool's net info and duplicated on my comp...that's how I log
|
|||
|
in. -L
|
|||
|
|
|||
|
What languages do you know how to program in? -B
|
|||
|
|
|||
|
QuickBasic 4.0 Turing 7.05A VERY LITTLE Turbo Pascal and I'm
|
|||
|
learning Borland C++ 5 from one of the FOR DUMMIES books -L
|
|||
|
|
|||
|
Haha... Have you ever tried to program a virus/trojan? -B
|
|||
|
|
|||
|
again, LAME...WHY? I don't WANT access to anyones HD and viruses are lame
|
|||
|
and stupid...I don't like destroying or ruining things -L
|
|||
|
|
|||
|
Okay, so you don't have anything like that on your board then? -B
|
|||
|
|
|||
|
HELL NO...I've nearly got my entire 2.1 gig HD full of all kinds of cool
|
|||
|
games and stuff...i don'
|
|||
|
t want it deleted by accidentally releasing a virus on myself!!!!!! GEEZ! -L
|
|||
|
|
|||
|
Haha. ;) Alright, so can I get access to your warez? -B
|
|||
|
|
|||
|
it costs 5 bucks a month (much cheaper than any other board I've seen) and u
|
|||
|
get everything...all the files, tons more options and stuff...plus access to
|
|||
|
any tournaments I may have in games...plus all the new ONLINE GAMEs I get -L
|
|||
|
|
|||
|
Would I have no ratio access if I sent in $5? -B
|
|||
|
|
|||
|
ya... ...ya that's what it is...no ratio...u can DL as much as u want...plus
|
|||
|
ud get 3 hours a day -L
|
|||
|
|
|||
|
Yeah. That's *very* reasonable, but I'm not into warez. ;) -B
|
|||
|
|
|||
|
Heh heh...web warez suck...they never DL properly because of all the
|
|||
|
congestion...RRRRRRRRRRr -L
|
|||
|
|
|||
|
I don't play any games. I mainly program... -B
|
|||
|
|
|||
|
ya, program any games? -L
|
|||
|
or just apps ? -L
|
|||
|
|
|||
|
I program utilities, trojans, viruses etc. ;) -B
|
|||
|
|
|||
|
what about like, COOL stuff...things that EVERYONE can enjoy...games, DECENT
|
|||
|
utils that like can HELP you...etc...I'm not into virus stuff...infact, don't
|
|||
|
bother Uploading that assembler now, I'm afraid u'll put a virus in it. -L
|
|||
|
|
|||
|
I wouldn't do that. As for useful utilities, I've programmed many. Check
|
|||
|
out the Damage, INC. Utilities sometime. They can be used by everyone. -B
|
|||
|
|
|||
|
examples? -L
|
|||
|
|
|||
|
Let's see, we've released a utility that can nuke files permanently. -B
|
|||
|
|
|||
|
wow, I've seen that already...so basically it doesn't put that invisible tag
|
|||
|
on the file that allows it to be written over, it just kills the file right
|
|||
|
away? -L
|
|||
|
|
|||
|
No, that isn't how it works. We've also programmed a utility called
|
|||
|
HideDrive that can be used to hide hard drives. We've -B[LORDICON interrupted]
|
|||
|
|
|||
|
how about on that can password a directory...that would be nice... -L
|
|||
|
|
|||
|
AND make it undeletable unless u know the PW? -L
|
|||
|
|
|||
|
Yeah, I could create a utility like that. We've also programmed a utility
|
|||
|
to rename subdirectories and one to nuke subdirectories/trees. -B
|
|||
|
|
|||
|
ok, DELTREE for dos does that and also, windows 95 can rename sub dirs
|
|||
|
anywayz...I want something that puts PWs on directories in win and dos so
|
|||
|
it's inaccessable from anywhere...AND make it so u can't remove the dir
|
|||
|
unless u have the PW -L
|
|||
|
|
|||
|
You said before that you wouldn't trust files that I upload. -B
|
|||
|
|
|||
|
ok, I trust u now :) I just HATE viruses... -L
|
|||
|
|
|||
|
Yeah, we've made quite a few utilities. You'll have to read the Damage, INC.
|
|||
|
Utilities User Manual sometime... -B
|
|||
|
|
|||
|
ok, whatever...u have a beginners manual for asm? Like one that will start
|
|||
|
at the start...like, this is how assembly works and stuff...basically all I
|
|||
|
know it that assembly works almost like the CPU itself, sending info to
|
|||
|
memory addresses and calculating it there...can u do graphics with ASM? -L
|
|||
|
|
|||
|
Yes. You sound like you've mastered assembly already. ;) I'll look for the
|
|||
|
manual and upload it the next time I call. -B
|
|||
|
|
|||
|
ok...and PLEASE, don't infect it!!!! -L
|
|||
|
|
|||
|
Why would you assume that I'd do something like that? -B
|
|||
|
|
|||
|
cuz once some asshole ULed a prog saying it was PKZIP (some newer version)
|
|||
|
(this was on my old 386 and I have no virus scan) ...I'd chatted once with
|
|||
|
him and we were just jokin and stuff, like I didn't tell him off or yell at
|
|||
|
him or get him mad and the next thing he does it UL this prog saying it was
|
|||
|
self extracting and it was really some shit exe prog (easily made in ANY
|
|||
|
language, ie: DEL *.*) and it nuked half my HD...>:O -L
|
|||
|
|
|||
|
What was their alias? -B
|
|||
|
|
|||
|
I dunno, but it was common...I saw someone with the same name on another
|
|||
|
board but it was the wrong guy... -L
|
|||
|
|
|||
|
Haha.. shYueahtup!!! >:) [interrupted by LORDICON again] -B
|
|||
|
|
|||
|
So, who draws the ansi for your board? -B
|
|||
|
|
|||
|
me
|
|||
|
...I use a3e...I feel that a sysop has lost his/her own personal touch of the
|
|||
|
board...
|
|||
|
sorry I had to brake for a sec :) ...u know what I mean, once they don't do
|
|||
|
the ansis they don't own the board anymore. -L
|
|||
|
|
|||
|
Yeah, I know what you mean. Do you have a Co-Sysop though? -B
|
|||
|
|
|||
|
about 3...Rebel being my MAIN co who actually calls...the other 3 actually
|
|||
|
being a friend of mine, my bro and another friend that donated a 4x4 cdrom
|
|||
|
(4 disks. 4 spin) -L
|
|||
|
|
|||
|
That's cool. Do they all help with the board? -B
|
|||
|
|
|||
|
well, mainly reble...my bro is co by default and the other 2 barley ever call
|
|||
|
cuz one has his own board and the other (who donated the 4x4 drive) is LD -L
|
|||
|
|
|||
|
How many hard drives do you have? -B
|
|||
|
|
|||
|
1...a 2.1 gig...I want to get an 8 gig... -L
|
|||
|
|
|||
|
Did you just get a new system? -B
|
|||
|
|
|||
|
about ...nearly a year ago...a very nice p200 MMX...top of the line back when
|
|||
|
I got it...32 meg ram um, 15 inch monitor and a SB-AWE 32...and 8x cdrom -L
|
|||
|
|
|||
|
How'd you afford to buy that? -B
|
|||
|
|
|||
|
my parents did...I'm only 16... -L
|
|||
|
|
|||
|
Haha. Okay, anyways, I'm busy and have to go do something. So, I'll call
|
|||
|
tomorrow.
|
|||
|
Later [LORDICON started fucking around again] -B
|
|||
|
|
|||
|
heh heh sorry, ok laters...btw, check out the files...I have MP3s and video
|
|||
|
game emulators and roms... -L
|
|||
|
|
|||
|
Okay. I'll check it out tomorrow. -B
|
|||
|
|
|||
|
ya, okie...I got that HW to finish anywayz...btw how old be u -L
|
|||
|
|
|||
|
I'm 32 -B
|
|||
|
|
|||
|
HAHAHAHA...and ur into hacking and stuff...NERD! :)
|
|||
|
sorry :) it's just so KIDDISH to be into hacking and stuff...asembly is cool
|
|||
|
tho... -L
|
|||
|
|
|||
|
Yeah, that's how I make money... Anyways, I'll chat with ya later. -B
|
|||
|
|
|||
|
c ya...ok...bye -L
|
|||
|
|
|||
|
|
|||
|
LORDICON Sends U back To Discreet & Elite...
|
|||
|
|
|||
|
|
|||
|
LETTERS TO THE EDITOR: {LETTERS}
|
|||
|
|
|||
|
I received these messages on Freedom of Information Archives, and decided to
|
|||
|
save my replies for this section of the Damage, INC. Newsletter. Send us
|
|||
|
feedback. We'll try to publish the majority of the readable, quality letters.
|
|||
|
|
|||
|
|
|||
|
From: Aenima Base : Damage, INC. Discussion
|
|||
|
To : Blackened Refer #: 107
|
|||
|
Subj: Re: feedback Replies: 1
|
|||
|
Stat: Normal Origin : Local
|
|||
|
|
|||
|
i have a suggestion for Damage INC.
|
|||
|
|
|||
|
ahem
|
|||
|
|
|||
|
"BLACKENDS TIP OF THE MONTH"
|
|||
|
and make a tip. would take like 5-20 mins but would make it really cool!
|
|||
|
|
|||
|
|
|||
|
From: Aenima Base : Damage, INC. Discussion
|
|||
|
To : Blackened Refer #: 85
|
|||
|
Subj: Re: feedback Replies: None
|
|||
|
Stat: Normal Origin : Local
|
|||
|
|
|||
|
B> I'm looking for some feedback from the readers of the Damage, INC. Newslette
|
|||
|
B> So, if you've read it.. reply. We're thinking about adding a letters to the
|
|||
|
B> editor section. You write me a message with comments, suggestions, whatever
|
|||
|
B> you want to say about the newsletter.. and I will reply to some letters in
|
|||
|
B> the next issue. ;)
|
|||
|
|
|||
|
feedback eh. hmm, well i for one thought it was well laid out easy to read,
|
|||
|
very informative <not to much along the h/p lines yet> when i say well laid
|
|||
|
out i mean like easy to follow
|
|||
|
e.g
|
|||
|
|
|||
|
when you an the journalist were chatting after he or you were done you would
|
|||
|
say -TJ or -B very usefull also i like that method with the NWO trojan its
|
|||
|
efective and a GOOD method. you like 40 hex?
|
|||
|
|
|||
|
now some bad things i found i did not really like the table of contents
|
|||
|
PERSOANLY i feel they should be a little neater.
|
|||
|
|
|||
|
thats all i have to say other than that LITTLE thing it was very informative
|
|||
|
|
|||
|
i'll never eat at burger king again :)
|
|||
|
--------------------------------------------------------------------------------
|
|||
|
|
|||
|
Editor - Thanks for the feedback man. We always appreciate comments and
|
|||
|
helpful suggestions. As for the interview, the -B and -TJ identifiers
|
|||
|
were added afterwards to make it easier for readers to follow. We've
|
|||
|
included more h/p information in this issue, and plan to gradually
|
|||
|
increase that aspect of the Damage, INC. Newsletter.
|
|||
|
|
|||
|
I have respect for Phalcon/Skism and used to read 40 Hex magazine
|
|||
|
regularly. That's why I decided to use the debug script method,
|
|||
|
since it's very safe and effective.
|
|||
|
|
|||
|
The contents has been changed in the issue. We hope the readers find
|
|||
|
the new format neater and easier to use. You suggested that I add
|
|||
|
a section called "BLACKENED's Tip of the Month" and that has been
|
|||
|
included in this issue. Thanks again for that insightful suggestion.
|
|||
|
|
|||
|
I'm glad you found the first issue to be informative. As for Burger
|
|||
|
King, my intention was to write an article that would have an impact
|
|||
|
on anyone that read it. Your comment about never eating there again
|
|||
|
confirms that I was successful in informing at least one reader. ;)
|
|||
|
|
|||
|
|
|||
|
OBJECTIVE OPINIONS - {OPINIONS}
|
|||
|
---/ Hacking and Hollywood /---
|
|||
|
|
|||
|
Like almost everything in this world, Hacking/Phreaking has received
|
|||
|
its share of media attention. This is expected, as nothing escapes the
|
|||
|
watchful eye of the paparazzi. Whenever Hollywood takes an interest,
|
|||
|
and decides to publicize events/facts in a totally distorted view, I get a
|
|||
|
little pissed off.
|
|||
|
I'm not talking about real events like the Internet wormhole virus, but
|
|||
|
fictional material that portrays hacking in a certain view. Let's take the
|
|||
|
movie "Hackers" for example. I'm sure anyone reading this has seen it just
|
|||
|
out of curiosity. For those of you lucky enough to be warned by a fellow
|
|||
|
h/p'er not to see it, I will recap the general theme. In the film, hacking
|
|||
|
is glamourized; to no end. In this movie its the hackers who get the chicks,
|
|||
|
not the jocks. Hahaha, now that's realism for ya ;). Granted, the film is
|
|||
|
set in the future, but unfortunately the producers decided to show techniques
|
|||
|
that have been used by hackers for years. So first of all, the first
|
|||
|
incongruency that comes to my attention is that they give the impression hackers
|
|||
|
are a malicious bunch of rebels, using the same technique to accomplish their
|
|||
|
means. Despite the true reality, which is that hacking constantly changes, and
|
|||
|
is being updated. Otherwise it wouldn't be hacking. I think in the movie,
|
|||
|
they even have the audacity to show someone using a bluebox. I could be
|
|||
|
wrong, but crap like this just represents hackers as idiots. It appalls me.
|
|||
|
Another aspect of the "Hackers" movie was the hang-out spot used by the
|
|||
|
main characters. This is essentially a "Boogie's Diner" (bad show) with
|
|||
|
some neon lights and music. And don't forget the inline skaters, hehe.
|
|||
|
They are portraying hacking as a social activity, something that you do
|
|||
|
around dinner, which is hilarious. I think if they made a true hacker
|
|||
|
movie it would either be really boring, or fucking amazing. That's how it
|
|||
|
is when you live the lifestyle. When you eat, breathe, sleep h/p you
|
|||
|
spend hours in a trance playing around with numerous different variables,
|
|||
|
twiddling obscure configs and hoping it works. H/P has its exciting
|
|||
|
moments, and its boring moments. Hollywood cannot understand this.
|
|||
|
Another, and perhaps not quite so bad h/p flick is "The Net" with Sandra
|
|||
|
Bullock. The producers managed to come up with some unique ideas
|
|||
|
surrounding viruses/cryptology/hp etc. It was still too Hollywood though,
|
|||
|
with the standard movie "template" - good guy, bad guy, conflict, a chase,
|
|||
|
romance, happy ending. You know what I mean... far too predictable ;)
|
|||
|
I think if a hacker movie was to be done properly, it would far more like
|
|||
|
Pulp Fiction/Clerks/Trainspotting. Not much editing, actors that were more
|
|||
|
hackers than actors, and a producer that wasn't bent on going mainstream
|
|||
|
to make money. Only then could our community be properly represented.
|
|||
|
|
|||
|
I am a firm hater of "Hollywood style" movies. They are all the same,
|
|||
|
just with a slight twist in the plot, and some different actors. For those
|
|||
|
reading this that have never experienced the thrill of hacking an extender,
|
|||
|
or coding a trojan, pay attention closely: Hacking is nothing like you
|
|||
|
think it is. All, and I repeat *All* of you have a misconception that h/p
|
|||
|
is about reading text files and then doing what they say. This cannot be
|
|||
|
further from the truth. It is about racking your brains to think of a
|
|||
|
potential security leak. It is about brainstorming new ideas for social
|
|||
|
engineering. Hollywood is in some cases the cause of these misconceptions.
|
|||
|
And there is always a message in my articles. It is of vital importance
|
|||
|
to constantly and completely evaluate all information entering your senses
|
|||
|
throughout waking consciousness. Decide whether the data matches and fits
|
|||
|
in with your belief system. Be aware of false data/propaganda, especially
|
|||
|
from Big Brother, and seek out information that corresponds with your
|
|||
|
interests.
|
|||
|
|
|||
|
<an article by the journalist.>
|
|||
|
|
|||
|
|
|||
|
REPORTS FROM THE FRONT - {REPORTS}
|
|||
|
---/ Social Engineering /---
|
|||
|
|
|||
|
So what do those big words mean? ;) If you don't know, perhaps you
|
|||
|
should not try any of the things mentioned in this article. But enough
|
|||
|
chatter, let's get down to business.
|
|||
|
Throughout the history of networked computers, the biggest security
|
|||
|
breach comes from humans. You can't beat a computer, you really can't.
|
|||
|
Ask Blade Runner, guessing passwords just doesn't work ;). Perhaps every
|
|||
|
now and then you find a unix terminal that hasn't got a certain bug removed,
|
|||
|
in which case you promptly take advantage of the loophole, and give yourself
|
|||
|
admin access. But unfortunately it's not always that easy. A certain amount
|
|||
|
of tact must be applied if you wish to successfully break the system you've
|
|||
|
been tracking for weeks. Trashing is one of the alternatives, but that can
|
|||
|
be saved for another time. In this article I want to explain to you the
|
|||
|
basics of social engineering, what it is, and perhaps answer some questions
|
|||
|
you might find yourself asking.
|
|||
|
So what is social engineering? Put simply, it is calling up a person
|
|||
|
associated with your target system, and fooling them into giving you
|
|||
|
information otherwise kept for special users. There are many variations on
|
|||
|
this, and I encourage you not to practice any of the ideas presented here,
|
|||
|
but think of your own. This will serve as a starting point for ideas you
|
|||
|
create on your own.
|
|||
|
|
|||
|
Let's say for example I have been scanning the exchange for carriers, and
|
|||
|
I come across an unsupervised unix prompt. The first thing to do is record
|
|||
|
the phone number (this will be done automatically by a wardialer). After
|
|||
|
this I would try to find out what other numbers go with that one. I would
|
|||
|
call say 5 number variations on either side, let me show you.
|
|||
|
|
|||
|
--> 651-1502 <-- number found by scanner
|
|||
|
651-1497 \
|
|||
|
651-1498 \
|
|||
|
651-1499 \
|
|||
|
651-1500 |
|
|||
|
651-1501 I dial these numbers off my voice phone, and
|
|||
|
651-1503 find out who answers, etc.
|
|||
|
651-1504 |
|
|||
|
651-1505 /
|
|||
|
651-1506 /
|
|||
|
651-1507 /
|
|||
|
|
|||
|
Okay, I have dialed all of the surrounding numbers, and got some busies,
|
|||
|
no-answers, residence lines, and 3 business lines. These are what you are
|
|||
|
looking for, as it is quite possible they are connected to the 651-1502
|
|||
|
which has the carrier on the end of it. It depends now on your research
|
|||
|
skills, as to how much you decide to find out about the companies. This
|
|||
|
is important because there's not much point in hacking a hardware store
|
|||
|
for example. The social engineering comes into play here, because you will
|
|||
|
use this to find out what companies are on the other end of those voice
|
|||
|
lines. Either divert your call or use *67 to at least fool their
|
|||
|
call-display. I call the first number :
|
|||
|
|
|||
|
Target: "Hello, Branton & Branton Co."
|
|||
|
TJ: "Hi, can you spare 5 minutes of your time, I'm doing
|
|||
|
a research paper for school."
|
|||
|
Target: "Ohh, what school, etc etc."
|
|||
|
TJ: "Guelph University, Macro-Economics & social darwinism"
|
|||
|
(or some bullshit)
|
|||
|
Target: "Okay, what do you need?"
|
|||
|
TJ: "Uhm, ..What type of service does your business provide?"
|
|||
|
Target: "Financial Assistance for retired politicians."
|
|||
|
TJ: "ahh, okay. And what is the average annual profit for this
|
|||
|
company?"
|
|||
|
Target: "blah blah"
|
|||
|
TJ: "Okay, thank you very much for your time. I appreciate your
|
|||
|
co-operation." (be sure to be very polite, no matter what)
|
|||
|
|
|||
|
This is a sample conversation with a possible hack. That is social
|
|||
|
engineering right there. It is the ability to lie quickly, and believably.
|
|||
|
The skill comes with practice, and once you find a good outline, you can
|
|||
|
use it for almost any target.
|
|||
|
Once you decide on a suitable system to hack, your focus is to get in
|
|||
|
without drawing attention to yourself. Call the business up again, and
|
|||
|
this time be ready to adapt your story as you go along. You are attempting
|
|||
|
to trick this person into giving you a password, so obviously they will be
|
|||
|
suspicious. Whatever you do, don't give up. It is an indicator you are
|
|||
|
full of shit. You must be assertive, and pretend you are doing your job -
|
|||
|
Unix Maintenance Engineer for the Branton & Branton Co. Network.
|
|||
|
(or whatever you choose.) I will provide a list of possible lies that might
|
|||
|
work on a gullible victim (because remember, some people aren't stupid, and
|
|||
|
will figure you out. Be ready)
|
|||
|
|
|||
|
-Say you just started working for the company, but have not
|
|||
|
yet been given access to unix. Ask the secretary to set up
|
|||
|
an account under the following name, with the following
|
|||
|
password. (now you have an account on there)
|
|||
|
|
|||
|
-Say you have been attempting to connect to the server, but
|
|||
|
it does not seem to be connecting right. Use lots of rich
|
|||
|
terminology to confuse the poor bitch, and at the same time
|
|||
|
make her think you know what you're doing. This technique
|
|||
|
when modified is unbeatable.
|
|||
|
|
|||
|
-One thing to be aware of is that you should never mention
|
|||
|
the word "password" in the first 3-5 minutes of conversation.
|
|||
|
Give the person the impression there is something wrong with
|
|||
|
their system, and then proceed to bullshit your way around
|
|||
|
them verbally until they decide to give you the sysop password
|
|||
|
or whatever your request may be.
|
|||
|
|
|||
|
-You must establish yourself immediately, and don't falter.
|
|||
|
|
|||
|
-One other thing I forgot to mention, for those of you who don't
|
|||
|
have a man's voice. (pre-pubescent) ;) you can get hold of a
|
|||
|
voice changer, from about $29.99, or use a wave editor that
|
|||
|
takes mic input and changes the pitch to a lower one.
|
|||
|
|
|||
|
Conclusion:
|
|||
|
This information has been provided in the hopes that people will once
|
|||
|
again seek out new ways to gain access, and also learn more about a
|
|||
|
suspicious company, or whatever. These are strictly guidelines and should
|
|||
|
not be followed to the letter. To anybody who successfully uses these
|
|||
|
techniques, please let me know, I'd love to hear about it.
|
|||
|
|
|||
|
<article by the journalist.>
|
|||
|
|
|||
|
|
|||
|
SOURCE AND SCRIPTS - {SOURCE}
|
|||
|
The RAZORBACK trojan by Damage, INC.
|
|||
|
|
|||
|
This is the long awaited, RAZORBACK trojan. It wasn't intended to be used
|
|||
|
for malicious purposes. However, if it is used for destructive purposes then
|
|||
|
we aren't responsible for any damage it causes. We're releasing it, but are
|
|||
|
not condoning that type of usage. Also, we aren't hiding it in anything or
|
|||
|
executing it on anyone else's system. It's up to you to use DEBUG to assemble
|
|||
|
it. After that, you are supposed to use it for informational, educational
|
|||
|
purposes to learn more about trojans. That's the disclaimer. That is also the
|
|||
|
only warning we are going to issue to anyone reading this. ;)
|
|||
|
Shown below is some information about memory requirements, file size and how to
|
|||
|
use DEBUG.
|
|||
|
|
|||
|
Conventional Memory :
|
|||
|
|
|||
|
Name Size in Decimal Size in Hex
|
|||
|
------------- --------------------- -------------
|
|||
|
RAZOR 2384 ( 2.3K) 950
|
|||
|
|
|||
|
|
|||
|
Clip out the RAZORBACK debug script and save it to a file called RAZOR.SCR.
|
|||
|
Then use DEBUG < RAZOR.SCR at a DOS prompt to assemble it. The result will
|
|||
|
be RAZOR.COM, which should be 1117 bytes.
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
N RAZOR.COM
|
|||
|
E 0100 B8 F8 1B BA 9E 02 3B C4 73 67 8B C4 2D 44 03 25
|
|||
|
E 0110 F0 FF 8B F8 B9 A2 00 BE 7C 01 FC F3 A5 8B D8 B1
|
|||
|
E 0120 04 D3 EB 8C D9 03 D9 53 33 DB 53 CB 0C 01 F2 15
|
|||
|
E 0130 FB 09 DE 40 2A AA D4 93 78 32 34 BF 3A 04 75 98
|
|||
|
E 0140 C5 48 C8 62 2B D4 F0 5E 37 55 61 95 AB C2 98 E5
|
|||
|
E 0150 B9 02 BA 49 BF DC 70 6D 47 20 02 71 3F 14 B2 4E
|
|||
|
E 0160 6F 74 20 65 6E 6F 75 67 68 20 6D 65 6D 6F 72 79
|
|||
|
E 0170 24 B8 00 09 BA 5F 01 CD 21 CD 20 90 FD 8B F8 4F
|
|||
|
E 0180 4F BE BE 02 03 F2 8B CA D1 E9 F3 A5 FC 87 F7 46
|
|||
|
E 0190 46 BF 00 01 AD 95 BA 10 00 EB 32 90 AD 95 B2 10
|
|||
|
E 01A0 EB 3B AD 95 B2 10 EB 3C AD 95 B2 10 EB 41 AD 95
|
|||
|
E 01B0 B2 10 EB 63 AD 95 B2 10 EB 64 AD 95 B2 10 EB 65
|
|||
|
E 01C0 AD 95 B2 10 EB 66 AD 95 B2 10 72 08 A4 D1 ED 4A
|
|||
|
E 01D0 74 F4 73 F8 33 C9 33 DB D1 ED 4A 74 BF D1 D3 D1
|
|||
|
E 01E0 ED 4A 74 BE D1 D3 85 DB 74 17 D1 ED 4A 74 B9 D1
|
|||
|
E 01F0 D3 80 FB 06 72 0B D1 ED 4A 75 04 AD 95 B2 10 D1
|
|||
|
E 0200 D3 2E 8A 8F 1C 01 80 F9 0A 74 3A 33 DB 83 F9 02
|
|||
|
E 0210 74 26 D1 ED 4A 74 97 72 1F D1 ED 4A 74 96 D1 D3
|
|||
|
E 0220 D1 ED 4A 74 95 D1 D3 D1 ED 4A 74 94 D1 D3 80 FB
|
|||
|
E 0230 02 73 1E 2E 8A BF 2C 01 AC 8A D8 56 8B F7 2B F3
|
|||
|
E 0240 F3 A4 5E EB 88 AC 02 C8 80 D5 00 3C FF 75 BC EB
|
|||
|
E 0250 33 D1 ED 4A 75 04 AD 95 B2 10 D1 D3 80 FB 08 72
|
|||
|
E 0260 D2 D1 ED 4A 75 04 AD 95 B2 10 D1 D3 80 FB 17 72
|
|||
|
E 0270 C2 D1 ED 4A 75 04 AD 95 B2 10 D1 D3 81 E3 DF 00
|
|||
|
E 0280 86 DF EB B4 33 C0 06 BB 00 01 53 8B D8 8B C8 8B
|
|||
|
E 0290 D0 8B E8 8B F0 8B F8 CB 03 00 02 0A 04 05 00 00
|
|||
|
E 02A0 00 00 00 00 06 07 08 09 01 02 00 00 03 04 05 06
|
|||
|
E 02B0 00 00 00 00 00 00 00 00 07 08 09 0A 0B 0C 0D 90
|
|||
|
E 02C0 00 00 B8 09 35 CD 21 89 1E 4C 01 8C 06 4E 01 B4
|
|||
|
E 02D0 25 14 00 BA 19 01 0F BA F8 08 CD 27 9C 2E FF 06
|
|||
|
E 02E0 50 00 50 01 2E 83 3E 05 4B 72 0B 50 53 51 52 00
|
|||
|
E 02F0 00 06 1E 16 56 57 EB 02 EB 16 E8 1B 00 E8 1C 02
|
|||
|
E 0300 2E 09 00 C7 20 00 00 5F 5E 17 1F 07 5A 59 5B 58
|
|||
|
E 0310 6C 00 9D EA 00 01 50 9C E4 60 E4 61 8A E0 A0 00
|
|||
|
E 0320 0C 80 E6 61 86 E0 04 9D FA B0 20 E6 20 00 00 58
|
|||
|
E 0330 BA 1E 01 06 B8 40 00 8E C0 26 89 16 13 00 07 05
|
|||
|
E 0340 14 BB 3B BE 02 00 06 33 C0 11 D1 00 25 E3 D1 E6
|
|||
|
E 0350 8B 87 FE 03 87 84 04 89 01 A0 08 07 EB 00 0E 07
|
|||
|
E 0360 C6 06 CA 01 14 B4 2C 00 12 8D 0B D2 74 F8 02 D6
|
|||
|
E 0370 02 D1 02 D5 8A 0A 00 EA B0 A4 09 80 EC 06 B1 01
|
|||
|
E 0380 B6 01 B2 80 0A 14 BB CB AD 13 72 06 FE 0E 2B 75
|
|||
|
E 0390 98 CE D4 C3 00 20 01 DB 01 F7 CF 09 11 0B 8E 77
|
|||
|
E 03A0 04 12 DD 20 DE 11 DF EE 37 0E DD 1D 54 EE 01 CD
|
|||
|
E 03B0 01 DE 38 D9 99 09 01 08 DD DE AF 29 03 12 DD 2A
|
|||
|
E 03C0 CD D5 9E 0D DC 01 0B E7 E4 14 61 26 DD CD DF F3
|
|||
|
E 03D0 01 59 35 9E 76 68 08 DE 07 E7 54 02 12 CD DF 62
|
|||
|
E 03E0 DF AF 73 01 37 DE 39 9E D3 7B 62 A0 DE FB F6 DA
|
|||
|
E 03F0 A6 03 9D B7 FF 12 01 D6 FD DC 1F 00 9D 1C 1D A0
|
|||
|
E 0400 EF 0D 01 22 54 68 65 20 6E 61 6D 00 00 05 73 70
|
|||
|
E 0410 65 61 6B 73 20 66 6F 72 20 69 74 73 50 1D 65 6C
|
|||
|
E 0420 66 21 22 46 0C 3B 0E 07 16 40 B0 75 A9 B9 02 00
|
|||
|
E 0430 B6 00 00 00 AA 6E 03 CD 13 E9 40 02 52 41 5A A0
|
|||
|
E 0440 37 4F 52 42 41 43 4B FC 09 FC F4 E0 0E 21 09 58
|
|||
|
E 0450 A1 1C 01 B9 01 24 88 58 C6 05 58 EE 02 00 DE 01
|
|||
|
E 0460 FC 01 EF 01 53 4C 41 4D 4D 49 00 00 4E 47 20 54
|
|||
|
E 0470 48 52 4F 55 47 48 2C 20 44 4F 4E 27 00 E5 54 20
|
|||
|
E 0480 46 55 43 4B 20 57 49 16 20 23 30 43 20 53 54 45
|
|||
|
E 0490 50 50 0B 14 2C 29 54 3F 20 20 59 07 27 8A 2A 4C
|
|||
|
E 04A0 4C 2A 45 45 05 0B 54 9A 52 20 48 08 09 4E B5 41
|
|||
|
E 04B0 18 0D 31 42 4C 4F 4F 44 29 DC 21 4F 18 4F 57 53
|
|||
|
E 04C0 14 50 0E 41 4E 04 57 45 20 4D 41 4B AA A8 05 53
|
|||
|
E 04D0 29 05 4C 49 42 B2 6B 16 49 75 69 DE B2 3E 24 27
|
|||
|
E 04E0 1D CA CC 80 04 43 26 7C 92 AA A9 52 4A 45 23 48
|
|||
|
E 04F0 30 5B 54 49 68 43 52 55 53 48 25 09 8F 41 78 56
|
|||
|
E 0500 49 15 4D 20 49 A7 B2 53 7F 4E 2D 45 67 4D 47 4F
|
|||
|
E 0510 26 22 09 44 46 05 B4 03 B0 01 B5 00 08 01 04 02
|
|||
|
E 0520 CD 13 B2 02 50 00 E8 0F 00 E8 0C 03 09 00 FE C2
|
|||
|
E 0530 80 FA 18 00 00 75 F0 EB 12 52 8A C2 B9 E8 FD 33
|
|||
|
E 0540 D2 BB C6 07 CD 60 04 26 83 C4 02 5A C3 7B 40 04
|
|||
|
E 0550 D8 B8 7F 7F A3 72 00 A8 1A 00 FF FF FF
|
|||
|
RCX
|
|||
|
045D
|
|||
|
W
|
|||
|
Q
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
|
|||
|
The Journalist's Top Ten List - {TOP TEN}
|
|||
|
"Phun things to do in the Fall..."
|
|||
|
|
|||
|
1. An oldie but a goody. Beige Box some unsuspecting idiot's
|
|||
|
house. A bonus is if you have a laptop ;)
|
|||
|
2. Pour HCl around the trees and bushes in your neighbourhood. -
|
|||
|
ruin it for those who like the fall colours.
|
|||
|
3. Pile the leaves from the curb into the middle of the road.
|
|||
|
This works even better if you put half bricks, half leaves, haha.
|
|||
|
4. A little early, but smashing pumpkins on the walls of people's
|
|||
|
houses always relieves stress! ;)
|
|||
|
5. An alternative is to put a small bomb inside it, and use a
|
|||
|
remote detonator. Make sure you ring the doorbell before you run!
|
|||
|
6. Halloween & Devil's night always provide a plethora of pranks
|
|||
|
for the amateur terrorist. Make sure you get into the spirit of
|
|||
|
Halloween, and hang your neighbours cats/dogs from the tree.
|
|||
|
Perhaps the tree outside the local church.
|
|||
|
7. Tell all your (lamer) friends that Daylight Savings Time has
|
|||
|
been cancelled this year due to budget cutbacks.
|
|||
|
8. Lots of people take walks in the fall. To see the "pretty colours"
|
|||
|
<g>. This is the perfect opportunity to bring out the old pellet
|
|||
|
gun, and have some phun! As a rule, only shoot the dogs they walk,
|
|||
|
but if the neighbourhood asshole walks by, 'pop a cap in his ass' ;)
|
|||
|
9. Go to a snowmobile auction. Pretend to be "looking" in the gas
|
|||
|
tank, but instead pour sugar into it. Be sure you don't miss the
|
|||
|
expensive ones.
|
|||
|
10. And the final way to cause anarchy in the fall...
|
|||
|
Sneak to the local asshole's house. Block his drainpipe by stuffing
|
|||
|
a load of stones/dirt/concrete mixture into the top or bottom. This
|
|||
|
will probably cause his house to flood in the spring, or even before
|
|||
|
winter *starts*! haha, there goes the Christmas bonus ;)
|
|||
|
|
|||
|
.by..the..Journalist.
|
|||
|
|
|||
|
|
|||
|
CLOSING COMMENTS - {CLOSING}
|
|||
|
|
|||
|
We had planned to include a list of h/p sites, but we decided to release all
|
|||
|
lists separately instead. There are going to be many lists created by us and
|
|||
|
released. They are for the purpose of using to gain more information, and by
|
|||
|
no means should you just rely on them as your only source. As in, you have to
|
|||
|
look for things on your own if you want to learn and become involved in the
|
|||
|
h/p scene. Overall, I feel that the local h/p scene is starting to change.
|
|||
|
Damage, INC. is changing the way people look at h/p, their attitudes, and
|
|||
|
ignorance by providing them with quality, reliable information.
|
|||
|
|
|||
|
Also, there are people bashing and attacking Damage, INC. in this area, yet
|
|||
|
they don't even know what we're involved in. Instead of making assumptions,
|
|||
|
or listening to rumours, learn the truth and get the facts straight. Just
|
|||
|
because we include a debug script for a trojan in the newsletter, doesn't
|
|||
|
mean we are responsible for it nuking someone or a board. Why not? Debug
|
|||
|
scripts aren't executable files, nor are we uploading the trojan anywhere.
|
|||
|
Therefore, it's up to you if/how the trojan is used. Think about it. ;)
|
|||
|
|
|||
|
We're still looking for Writers, Members and Distribution Sites. If you'd like
|
|||
|
to apply to Damage, INC. and join a respected h/p group, then download a copy of
|
|||
|
the Damage, INC. Application Generator. If you want any of our releases, they
|
|||
|
are available on the following boards:
|
|||
|
|
|||
|
...AND JUSTICE FOR ALL - Damage, INC. WHQ, h/p/a/c/v/t, no ratios, invite only.
|
|||
|
Freedom of Information Archives - Damage, INC. Dist. Site, h/p/a/c/v/t.
|
|||
|
|
|||
|
Any feedback or letters to the editor should be sent to BLACKENED in Email on
|
|||
|
a Damage, INC. board.
|
|||
|
|
|||
|
- EOF
|