142 lines
7.5 KiB
Plaintext
142 lines
7.5 KiB
Plaintext
![]() |
(C)1988
|
|||
|
|
|||
|
|
|||
|
|
|||
|
<()>-<()>-<()>-<()>-<()>-<()>-<()>-<()>-<()>-<()>-<()>-<()>-<()>-<()>-<()>
|
|||
|
/|| ||\
|
|||
|
\|| P R O F E S S O R F A L K E N ' S ||/
|
|||
|
/|| ||\
|
|||
|
\|| GUIDE TO ||/
|
|||
|
/|| ||\
|
|||
|
\|| ***** ***** **** ***** ||/
|
|||
|
/|| * * * * * * * ||\
|
|||
|
\|| * * * * * ***** ||/
|
|||
|
/|| * * * * * * * ||\
|
|||
|
\|| ***** ***** **** ***** ||/
|
|||
|
/|| P { ||\
|
|||
|
\|| ||/
|
|||
|
/|| HACKING SECURITY ||\
|
|||
|
\|| (C)1988||/
|
|||
|
<()>-<()>-<()>-<()>-<()>-<()>-<()>-<()>-<()>-<()>-<()>-<()>-<()>-<()>-<()>
|
|||
|
|
|||
|
|
|||
|
First I'd like to thank the following people for thier contributions to this
|
|||
|
file and to my knowledge about this fucking world--=-> Frye Guy, Laser,
|
|||
|
David Lightman, HackerSoft in it's entirety, The Rebel, Digital Logic,
|
|||
|
L.E. Pirate, Brain Tumor, Boris Crack, Mad Max, Sike III, The Blade,
|
|||
|
Spartacus, Baby Eagle, Iceman/TOPGUN, Spam Master, & Codebuster.
|
|||
|
|
|||
|
|
|||
|
This file is meant for the beginner/novice/amateur code hacker. Anyone
|
|||
|
have been hacking for over 2 years you probably don't need to read.
|
|||
|
|
|||
|
The first thing I would like to point out is the major LD companies security
|
|||
|
systems. A couple years ago MCI and SPRINT installed a NEW type of ESS
|
|||
|
which makes it easier to catch code hacks. This system is able to detect
|
|||
|
patterns on it's ports, such as one target number being repeated many times or
|
|||
|
invalid codes repeating every x number of minutes. They thought they were
|
|||
|
smart, but we just have to be a step smarter.
|
|||
|
|
|||
|
|
|||
|
MULTIPLE PORTS-->
|
|||
|
|
|||
|
By having a code hacker that uses multiple port hacking ( that is one that
|
|||
|
can hack many ports in one session ) you can lower the odds of being caught
|
|||
|
tremendously. By entering many ports into the hackers database and being able
|
|||
|
to access them all in one session reduces the LD Co's ability to catch a
|
|||
|
pattern on one of their port/s. With this feature you are able to throw the LD
|
|||
|
company off WHERE and WHEN you will strike next. ALSO SEE TIMING PATTERNS.
|
|||
|
|
|||
|
|
|||
|
MULTIPLE TARGETS-->
|
|||
|
|
|||
|
The first of the (IBM) programs to have multiple targets was Terminus's
|
|||
|
Codebuster, it was then implemented into The Brew Associate's Code Thief. By
|
|||
|
utilizing a program's multiple target option, the chances you being caught by
|
|||
|
their system's pattern detection is almost NIL. Code Thief's multiple target
|
|||
|
file contains 369 targets. If you cannot get this target list I suggest you
|
|||
|
compile a list of TELENET,COMPUSERVE, etc. dial ups and use them for targets.
|
|||
|
At least you'll have a better chance...
|
|||
|
|
|||
|
|
|||
|
PORT PATTERNS & TIMING PATTERNS-->
|
|||
|
|
|||
|
Long distance companies like SPRINT/MCI usually have more than 1 port in
|
|||
|
large cities/areacodes, thus you can hack on many of their ports. Increasing
|
|||
|
the number of ports you hack on gives you an edge. The LD's system will get
|
|||
|
suspicious if it finds many invalid codes attempts on one of its port. Each
|
|||
|
port is allotted a certain amount of invalid codes attempts. If this number is
|
|||
|
exceeded an error flag will go on and the security division will be alerted to
|
|||
|
the port. So in other words by increasing the ports you can decrease your odds
|
|||
|
of being alerted to and ANI'ed.
|
|||
|
|
|||
|
As mentioned before the LD companies also have timing pattern recognition.
|
|||
|
This means they can tell if they are getting an invalid code attempt every
|
|||
|
x minutes. This really is the most deadly features of their system ( next to
|
|||
|
ANI of course ) because almost every hacker I know of runs on a set amount of
|
|||
|
time for each thing to happen. Carrier timeout,seconds to wait till code &
|
|||
|
target are entered, all of these are on a fixed amount of time. Every so many
|
|||
|
number of seconds the hacker repeats its invalid code timeout & retry time
|
|||
|
almost exactly. To get rid of this deadly feature is QUITE simple.
|
|||
|
What I suggest is to add another port or two to your list. However, this port
|
|||
|
is special because its not a port at all. It's a friend you hate or a
|
|||
|
disconnected number or some business. That way your timing for the LD's ports
|
|||
|
will not stay predictable. Also vary the carrier timeout value ( a.k.a.
|
|||
|
timeout value ) for the fake port numbers. Doing this will make you about as
|
|||
|
unpredictable as nitroglycerine made from a T-File.
|
|||
|
|
|||
|
|
|||
|
TIMES TO HACK-->
|
|||
|
|
|||
|
When I first started code hacking 84' I thought the best time to hack was
|
|||
|
at 2 a.m. because there wouldn't be anybody at the L.D. company then. Well
|
|||
|
maybe back then there wasn't because there wasn't any customer service after
|
|||
|
6pm. But the times have changed. There is security and customer service and
|
|||
|
maintenance there 24 hours a day 7 days a week- Even Holidays. So the best
|
|||
|
time to hack would be when normal customers are using it. Most customers are
|
|||
|
either business's or households. So your best bet would be hacking when they
|
|||
|
would use it- M-F 8am to 7pm. This is when most people accidently fuck-up on
|
|||
|
their code and thus it is the best time to hack. I would suggest hacking in
|
|||
|
the morning since the LD's system is counting the number of invalid attempts
|
|||
|
if you do a lot in the morning then the subscribers in the afternoon will get
|
|||
|
get evil eye, not you. Usually the LD companies system RESETS its value at
|
|||
|
12:00 midnight so that the invalid attempt numbers don't keep adding on the
|
|||
|
the previous days. Also hacking on holidays such as Christmas is excellent
|
|||
|
because the amount of people calling everyone all over the fucking place is
|
|||
|
magnanimous.
|
|||
|
|
|||
|
|
|||
|
IBM HACK PROGRAMS-->
|
|||
|
|
|||
|
I have an IBM and I use Code Thief Version 2.2 which can be found on almost
|
|||
|
any good phreak/pirate BBS around. Most of the code hacker's I have run into
|
|||
|
either didn't work on my system because 1> The programmer didn't BETA test the
|
|||
|
program totally. 2> The programmer didn't know what the fuck he was doing.
|
|||
|
3> The program had so little features that you're bound to be caught using it.
|
|||
|
The best program I've found was Code Thief Version 2.2 I have looked over:
|
|||
|
|
|||
|
Fuckin Hacker 2.0- It didn't work properly on IBM PC (Possibly fucked ARC)
|
|||
|
All-In-One Hacker- Not enough features/Parts of program fucked up.
|
|||
|
Codebuster- Couldn't get it to work with my modem ( HAYES 1200B )
|
|||
|
AutoHack- Not enough features.
|
|||
|
|
|||
|
|
|||
|
NEW PRODUCTS-->
|
|||
|
|
|||
|
Be on the look out for INTEL-Hack. This hacker is somewhat secret right now,
|
|||
|
but I'll tell you it will have all the features of Code Thief but it will take
|
|||
|
advantage of the 80386's multitasking capabilities. Lookout it should be
|
|||
|
killer, release date: Not yet planned, 89' sometime.
|
|||
|
|
|||
|
Later, and I hope this shed some insight on how to keep yourself safe...
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- Professor Falken
|
|||
|
|
|||
|
(C)1988
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|