1086 lines
45 KiB
Plaintext
1086 lines
45 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
***** * * ******* * ***** * *
|
|||
|
* * * * * * * * * *
|
|||
|
* * * * * * * * * *
|
|||
|
* * * * * * * * * * *
|
|||
|
* * * * * * ******* * * *
|
|||
|
***** **** * ****** * * * *
|
|||
|
|
|||
|
|
|||
|
|
|||
|
A USER'S MANUAL
|
|||
|
IMPORTED BY CRIMINAL
|
|||
|
|
|||
|
----- NO COPYRIGHTS -----
|
|||
|
------- EXCLUSIVE SPREADING RIGHTS SCC -------
|
|||
|
|
|||
|
(MESSAGE TO HARMAN KARDON: HAVING PROBLEM WITH YOUR STEREO?)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
CONTENS: HOW TO STEAL CARS BY YARDLEY FLOURIDE.
|
|||
|
|
|||
|
CREDIT FRAUD BY SNEAK THIEF.
|
|||
|
|
|||
|
ASSORTED EXPOSIVES INFORMATION BY UNKNOWN.
|
|||
|
|
|||
|
PYROMANIAC BY GREY WOLF.
|
|||
|
|
|||
|
SMALL GRENADE BY SS-BADMAN.
|
|||
|
|
|||
|
WATS EXTENDERS BY UNKNOWN.
|
|||
|
|
|||
|
HACKING: BASICS.
|
|||
|
|
|||
|
UNIX & VAX.
|
|||
|
|
|||
|
DATA.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
XxXxXxxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxX
|
|||
|
X X
|
|||
|
X xXxXx HOW TO STEAL CARS #1 xXxXx X
|
|||
|
X X
|
|||
|
X X
|
|||
|
X written by Yardley Flouride X
|
|||
|
X X
|
|||
|
X presented by X
|
|||
|
X X
|
|||
|
X xxx the xORGanization xxx X
|
|||
|
X (fraud/hack/thieve) X
|
|||
|
X 2/13/89 X
|
|||
|
X X
|
|||
|
X X
|
|||
|
XxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXx
|
|||
|
|
|||
|
|
|||
|
FOREWORD:
|
|||
|
|
|||
|
This is the first file I've written under the xORGanization
|
|||
|
and under the handle Yardley Flouride. Maybe you've read
|
|||
|
some of my files under the name Dial Tone with Black September
|
|||
|
and cDc communications. From now own I will write under
|
|||
|
the new handle and for xORG and cDc. The xORG is the newest
|
|||
|
hack/fraud/thieve group around and most of my fraud ideas
|
|||
|
will be directed to that group. My more fun files (i.e.
|
|||
|
"Fun With Traffic Lights") will be with cDc. Just to clear
|
|||
|
that up.
|
|||
|
|
|||
|
xXxXxxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXx
|
|||
|
|
|||
|
this file is part 1 of 2. part 1 is the basic breaking into
|
|||
|
cars or being devious to gain access to the car. part 2 will
|
|||
|
be the hot wiring of a car if you're in it already. i know
|
|||
|
there's already been files like that but this will go beyond
|
|||
|
the others. i don't feel like typing all that right now though.
|
|||
|
|
|||
|
xXxXxxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXx
|
|||
|
|
|||
|
No transportation!
|
|||
|
|
|||
|
I know, I know. Looking for a great time and what? No wheels!
|
|||
|
I hate when that happens. Well, if you've read the file on casing
|
|||
|
by Elijah Bonecrusher and L.E. Pirate you're one step ahead. With
|
|||
|
the art of casing comes the art of getting the rest of the car.
|
|||
|
Ok, you need a car to get you to where you have to go and for no
|
|||
|
other reasons.
|
|||
|
|
|||
|
|
|||
|
7-11's are convenient for more than slurpees you know!
|
|||
|
I was hanging out in front of 7-11 and it smacked me right in the
|
|||
|
face how many people leave their car on when running into 7-11.
|
|||
|
In a half hour I counted over 7 cars that people left unattended
|
|||
|
to run in. In this one incident, myself and Elijah were out front
|
|||
|
of one and this dude went in and left his piece of shit Duster
|
|||
|
waiting for us to take. Just hide around the sides of the stores
|
|||
|
and get the ones near the sides of the building. Elijah during the
|
|||
|
summer at the shore got a government vehicle. Pretty cool, eh?
|
|||
|
|
|||
|
Don't dress like a god damn thief. Most fake "anarchist"
|
|||
|
faggot asswipe computer nerds would wear all black and a ski mask.
|
|||
|
No no no. Dress like a prep or some way you never dress. Beat up
|
|||
|
someone for their rags and wear them. And act like you're having
|
|||
|
fun hanging out at 7-11, drink a slurpee or something. Don't just
|
|||
|
sit there sticking your head around the corner of the building going,
|
|||
|
"how's that car!?", "let's get the porsche!", etc. Of course when
|
|||
|
all the people went into the store and left their cars on it was in
|
|||
|
the winter, it was cold as balls out. Who knows, if you find a good
|
|||
|
car take it to some remote spot and dump it. Rip everything out of
|
|||
|
it and take anything that looks over $5. This is all I have to say
|
|||
|
for "Stealing Cars Part I". Support the scene. Amen.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
| |
|
|||
|
| Volume I of The Adventures in Fraud Series |
|
|||
|
| The Bible of Fraud |
|
|||
|
| By: |
|
|||
|
| Sneak Thief |
|
|||
|
| Smog City..213-926-7720 |
|
|||
|
| Thanx to: The Raider |
|
|||
|
| Copyright, (C) 1985 by Sneak Thief |
|
|||
|
| |
|
|||
|
\=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=/
|
|||
|
|
|||
|
|
|||
|
Introduction
|
|||
|
============
|
|||
|
|
|||
|
You ever wonder where that unemployed guy down the street got
|
|||
|
enough cash to start a 1200 baud board with 60 megs? Well, the
|
|||
|
answer, most likely, is Credit Fraud.
|
|||
|
|
|||
|
Credit fraud involves getting a credit card number (a CC #), and
|
|||
|
then ordering things by phone. All you need is the card number
|
|||
|
and the experation date. And a few other nasties...
|
|||
|
|
|||
|
Well, forget this basic stuff! Let's get into the good parts....
|
|||
|
|
|||
|
Getting Your Card
|
|||
|
===================
|
|||
|
|
|||
|
Always been meticulous about your appearence? Don't like to be
|
|||
|
dirty? Then the primary method of getting credit cards is not
|
|||
|
going to appeal to you.
|
|||
|
|
|||
|
When a customer buys something at a store or restaurant (with a
|
|||
|
credit card, of course), several carbons are made. The store
|
|||
|
puts these into their files, and throws them away a week or so
|
|||
|
later.
|
|||
|
|
|||
|
What's that? You say, "Why don't I go to the trash, and get
|
|||
|
these carbons?", do you? Well, you're correct; this is exactly
|
|||
|
what you do. Here are some tips:
|
|||
|
|
|||
|
1) Go on the First of the month. (In a lot of stores, this is
|
|||
|
the 'clear the files day'.
|
|||
|
|
|||
|
2) Go to the mall. That way, if one trash can is empty, you
|
|||
|
have a hundred or so more.
|
|||
|
|
|||
|
3) Stay away from food stores. Sticking you're hand into last
|
|||
|
week's fried chicken is a price too high for a lousy credit
|
|||
|
card.
|
|||
|
|
|||
|
4) For convienence, look for florists, video stores and the like.
|
|||
|
Video stores especially, since >every< transaction they make
|
|||
|
involves a credit card.
|
|||
|
|
|||
|
Ok, that is just one of the ways which you can get you're card
|
|||
|
here are the other primary methods:
|
|||
|
|
|||
|
CBI/TRW
|
|||
|
=======
|
|||
|
|
|||
|
CBI and TRW are Credit services which have Credit Cards,
|
|||
|
Addresses, names, and driver's licenses for most of the
|
|||
|
population of the United States. You can also use this system to
|
|||
|
find out the credit card mend calling through a PBX, then XXXXX (insert you're
|
|||
|
favorite phone service here).
|
|||
|
|
|||
|
Leeching
|
|||
|
========
|
|||
|
|
|||
|
You could also get them off the credit fraud board on you're
|
|||
|
local elite BBS. Not a good idea, since most cards up there have
|
|||
|
about 1,000 dollars worth of porno tapes on them.
|
|||
|
|
|||
|
Better yet, you can ask a friend. This will probaly work, but
|
|||
|
sometimes people give a card that they have used, or used but
|
|||
|
messed up with. Oh, the death of friendship!
|
|||
|
|
|||
|
Ok, you've got your card? Good.
|
|||
|
|
|||
|
Ordering
|
|||
|
========
|
|||
|
|
|||
|
You've got to order your merchandise. To do this, call the
|
|||
|
orderline for the company, and talk to these people. If you're
|
|||
|
known as "The Human Carrier" by you're friends, or modems connect
|
|||
|
when you say "Hello", then forget it. These days they are
|
|||
|
getting mighty suspicous.
|
|||
|
|
|||
|
They will ask you what card you want to use. Master Cards have a
|
|||
|
5 as the first digit of the first cluster, Visas have a 4.
|
|||
|
|
|||
|
If ice--very
|
|||
|
softly. Just say, "I'm sorry... I have this awful sore
|
|||
|
throat..."
|
|||
|
|
|||
|
The first rule is be polite. Don't sound nervous. If the lady
|
|||
|
asks you for the driver's license, and you don't have it, make
|
|||
|
one up, then before you hang up, say "I'm sorry, I'm going to
|
|||
|
have to cancel this order...my husband told me that he had
|
|||
|
already gotten the XXXXX (the item you were trying to order)"
|
|||
|
Try to order from a pay phone, and when they ask for a phone
|
|||
|
number, give them the pay phone's number. Or scan for a number
|
|||
|
that will ring, and ring... A board that is down is a good bet.
|
|||
|
|
|||
|
Now, you may ask, what address do I give the salesman?
|
|||
|
|
|||
|
The Address
|
|||
|
===========
|
|||
|
|
|||
|
The pick up is one of the most crucial part of the entire part.
|
|||
|
Here is what I think the ultimate address should be:
|
|||
|
|
|||
|
1) Abandoned.
|
|||
|
|
|||
|
2) Isolated (No little old ladies calling the police or spraying
|
|||
|
you with hoses).
|
|||
|
|
|||
|
3) About a mile or so away from your house.
|
|||
|
|
|||
|
Number one could also have a friend of yours who will sign for
|
|||
|
the package, then when the feds come deny it ever arrived. This
|
|||
|
is unlikely.
|
|||
|
|
|||
|
Number two is obvious. I have been yelled at by numerous old
|
|||
|
people, and people that don't speak English. Not fun.
|
|||
|
|
|||
|
The mile away from you're house is obvious. Don't want people
|
|||
|
that know you to be witnesses.
|
|||
|
|
|||
|
Also, you can order to an occupied house. Send them a note by
|
|||
|
mail, telling them about a "computer glitch that sent some of
|
|||
|
our mechandise to you're address, and we will send a sales
|
|||
|
representative (or his son) to come pick it up." Spice this up,
|
|||
|
by apologizing for any hassles, and giving a fake name for the
|
|||
|
"sales represenative". Then, when you go, just give them a
|
|||
|
little note authorizing you to be there with an impressive
|
|||
|
signature.
|
|||
|
|
|||
|
When you pick up the package, be calm. Talk to the people no
|
|||
|
longer than necessary, but don't run away or anything. Wear a
|
|||
|
hat, but don't wear a ski mask and sunglasses. Look normal, yet
|
|||
|
try and conceal as much of you're looks as possible.
|
|||
|
|
|||
|
If you do this right, you will look like a normal person, and
|
|||
|
the people will forget about you in the month or so it takes the
|
|||
|
credit agency to do anything about the fraud.
|
|||
|
|
|||
|
Advanced Fraud
|
|||
|
==============
|
|||
|
|
|||
|
To order more advanced, (ie: from Northwestern, or things that
|
|||
|
cost alot of money), you will need the following (usually):
|
|||
|
|
|||
|
The Driver's License Number
|
|||
|
The Bank or Interbank Number (For MasterCard)
|
|||
|
The Billing Addresss
|
|||
|
|
|||
|
Sometimes this will be written on the carbon. But the best way
|
|||
|
is just to use TRW...if you have a password for it.
|
|||
|
|
|||
|
Miscellanous
|
|||
|
============
|
|||
|
|
|||
|
Reading an issue of U.S News and World Report (June 3, 1985)
|
|||
|
yesterday, I found an article on Phreaking, Fraud, and BBS's.
|
|||
|
Very interesting.
|
|||
|
|
|||
|
Said something about mailboxing, which is going through a company
|
|||
|
mailbox looking for let's say bills and the like which would
|
|||
|
have a credit number on it. Sounds interesting. Go on a
|
|||
|
Saturday, and look in the mailboxes. The last few days of a
|
|||
|
month would be a good idea, since maybe you could get lucky and
|
|||
|
snipe their Visa statement. That just goes to show that reading >some<
|
|||
|
value.
|
|||
|
|
|||
|
Look for cards like this one:
|
|||
|
|
|||
|
5024 0000 6184 3847
|
|||
|
|
|||
|
The second cluster means it's a "preferred" card, and you can
|
|||
|
order more stuff with it. Some cards only have 13 digits (i.e:
|
|||
|
5024 000 618 787).
|
|||
|
|
|||
|
If you think you have ordered the limit of you're card, verify
|
|||
|
it. You do this by calling a dial up (usually 800), giving them
|
|||
|
a merchant number, the card number, the name on the card, the
|
|||
|
expiration date, and the amount to be spent. They will tell you
|
|||
|
it the card has enough money for the purchase. Get a dial up and
|
|||
|
merchant number by going to the Department Store. They are
|
|||
|
usually written on the phones.
|
|||
|
|
|||
|
For MasterCard, the Interbank number isRyight below the na}~sn
|
|||
|
the carbon. Nisa cards contain a bank number in one of the
|
|||
|
clusters.
|
|||
|
|
|||
|
Don't order from Northwestern. There prices are not worth all of
|
|||
|
the questions you have to answer.
|
|||
|
|
|||
|
Order from Conroy-LaPointe at 800/547-1289, they are quite
|
|||
|
easy.
|
|||
|
|
|||
|
Conclusion
|
|||
|
==========
|
|||
|
|
|||
|
There are no old carders. You quit, or you get caught. Plan
|
|||
|
what you want to get, and don't try and rush your frauds.
|
|||
|
|
|||
|
The first rule of fraud is, "Greed Kills." I think being
|
|||
|
arrested by the feds and having to face my parents and lose my
|
|||
|
computer about the same as death. But what is life without a
|
|||
|
little risk?
|
|||
|
|
|||
|
Try to sell most of the things you card. If there is no stolen
|
|||
|
(carded) stuff in you're house, they might go easier on you.
|
|||
|
|
|||
|
By the way, I am in no way responsible for any use made of
|
|||
|
the information in this file. It is for informational purposes
|
|||
|
only. And if you believe that, please leave me mail on Smog
|
|||
|
City about a business opportunity. I have this bridge...
|
|||
|
|
|||
|
|
|||
|
June 6, 1985 - Sneak Thief of the Smog City Crew
|
|||
|
|
|||
|
The End
|
|||
|
|
|||
|
*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*
|
|||
|
* ASSORTED EXPLOSIVES INFORMATION *
|
|||
|
*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*
|
|||
|
|
|||
|
Common Rocket Fuel
|
|||
|
------------------
|
|||
|
Materials:
|
|||
|
|
|||
|
1.) Potassium Nitrate (KNO3) or
|
|||
|
"Saltpeter". This can be obtained
|
|||
|
from a drugstore, or ordered from
|
|||
|
a chemical supply house.
|
|||
|
|
|||
|
2.) Sugar (Powdered is the best)
|
|||
|
|
|||
|
Procedure:
|
|||
|
|
|||
|
1.) Mix the two together 1/2 Nitrate
|
|||
|
and 1/2 Sugar.
|
|||
|
|
|||
|
2.) Take an old cooking pan, and
|
|||
|
melt the two together. There
|
|||
|
is NO way for it to ignite.
|
|||
|
|
|||
|
3.) It should turn into a fudgey
|
|||
|
looking compound. Pour this
|
|||
|
compound into a rocket engine
|
|||
|
such as a cardboard tube, and
|
|||
|
set a fuse into the compound
|
|||
|
and let the compound harden.
|
|||
|
|
|||
|
Chlorate Mixtures
|
|||
|
-----------------
|
|||
|
|
|||
|
NOTE: The main ingredient for this
|
|||
|
experiment is potassium or
|
|||
|
sodium chlorate. Both of these
|
|||
|
will do equally well. However,
|
|||
|
both may prove difficult to
|
|||
|
find. Probably the only way to
|
|||
|
get it would be to order it
|
|||
|
through a chemical supply house.
|
|||
|
|
|||
|
Materials:
|
|||
|
----------
|
|||
|
|
|||
|
1) Potassium chlorate or sodium
|
|||
|
chlorate.
|
|||
|
|
|||
|
2) Powdered charcoal
|
|||
|
|
|||
|
3) Powdered aluminum
|
|||
|
|
|||
|
4) Sulfur
|
|||
|
|
|||
|
Procedure:
|
|||
|
----------
|
|||
|
|
|||
|
NOTE: There is no set procedure for
|
|||
|
making chlorate mixtures.
|
|||
|
The only special thing ABOUT
|
|||
|
chlorate mixtures is that
|
|||
|
they have a chlorate in them.
|
|||
|
Experiment with diffiernt
|
|||
|
proportions of each of the
|
|||
|
ingredients. All of the
|
|||
|
chlorate mixtures I made had
|
|||
|
no set procedure and I just
|
|||
|
experimented with the
|
|||
|
proportions of each of the
|
|||
|
ingredients. Most of your
|
|||
|
mixture, however, should be
|
|||
|
potassium chlorate or sodium
|
|||
|
chlorate.
|
|||
|
|
|||
|
1) Make sure that you mix the
|
|||
|
sulfur and charcoal and aluminum
|
|||
|
first. You may grind these in
|
|||
|
a mortar and pestal to get a good
|
|||
|
mix of these ingredients.
|
|||
|
|
|||
|
2) Add potassium chlorate or sodium
|
|||
|
chlorate. Mix them VERY CAREFULLY
|
|||
|
in the mortar and pestal. DO NOT
|
|||
|
GRIND the mixture once the
|
|||
|
chlorate has been added or it will
|
|||
|
ignite and burn the shit out of
|
|||
|
you.
|
|||
|
|
|||
|
3) You now may use the mixture for
|
|||
|
whatever you want to. Chlorate
|
|||
|
mixtures are some of the best
|
|||
|
compositions there are and, in
|
|||
|
my experiences, they are the best
|
|||
|
except for model rocket
|
|||
|
propellant (procedure for making
|
|||
|
this is given later).
|
|||
|
|
|||
|
> Green Goddess <
|
|||
|
-------------
|
|||
|
Materials
|
|||
|
---------
|
|||
|
|
|||
|
1.) Zinc (Zn) <---NOTE: This is not the
|
|||
|
same as Zinc
|
|||
|
Oxide!
|
|||
|
2.) Sulfur (S)
|
|||
|
|
|||
|
Procedure
|
|||
|
---------
|
|||
|
|
|||
|
1.) Mix the two together 1/2 and 1/2.
|
|||
|
|
|||
|
2.) MAKE SURE that you mix them very
|
|||
|
well. The best way to do so, is to
|
|||
|
put the mixture in a jar with a lid
|
|||
|
and shake it up for 15-60 seconds,
|
|||
|
until it is all a greyish color.
|
|||
|
|
|||
|
3.) To ignite, use a fuse, or throw a
|
|||
|
match into the powder. WARNING,
|
|||
|
this burns very very quickly, and
|
|||
|
produces smoke. Also it burns at
|
|||
|
a fairly high temperature. It will
|
|||
|
surprise you when you throw a match
|
|||
|
into it. There will be a delay, and
|
|||
|
then all of a sudden, it will flash
|
|||
|
up, and is capable of burning the
|
|||
|
hell out of you.
|
|||
|
=======================================
|
|||
|
Common Uses
|
|||
|
-----------
|
|||
|
1.) Rocket Fuel
|
|||
|
2.) Bombs <--- NOTE: The best way to do
|
|||
|
this is to take
|
|||
|
it and compress
|
|||
|
it into cardboard
|
|||
|
tubing.
|
|||
|
3.) Smoke bombs (Cardboard tube w/ big
|
|||
|
hole.)
|
|||
|
4.) Flare bombs.
|
|||
|
5.) The rest is up to your imagination
|
|||
|
|
|||
|
GOOD LUCK!
|
|||
|
=============================
|
|||
|
|
|||
|
|
|||
|
_________________________________
|
|||
|
[ ]
|
|||
|
[ THE FIRST BOOK OF ]
|
|||
|
[ PYROMANIACS ]
|
|||
|
[ ]
|
|||
|
[ BY: GREY WOLF ]
|
|||
|
[ <THE COMMANDERS> ]
|
|||
|
[_________________________________]
|
|||
|
|
|||
|
|
|||
|
P.S. DON'T KILL YOURSELF...
|
|||
|
|
|||
|
.......................................
|
|||
|
|
|||
|
->UNSTABLE EXPLOSIVE<-
|
|||
|
^^^^^^^^ ^^^^^^^^^
|
|||
|
|
|||
|
|
|||
|
1) MIX SOLID NITRIC IODINE WITH
|
|||
|
HOUSEHOLD AMMONIA
|
|||
|
|
|||
|
2) WAIT OVERNIGHT
|
|||
|
|
|||
|
3) POUR OFF THE LIQUID
|
|||
|
|
|||
|
4) DRY MUD ON BOTTOM TO HARD (LIKE
|
|||
|
CONCRETE)
|
|||
|
|
|||
|
5) THROW SOMETHING AT IT!
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
->SMOKE BOMBS<-
|
|||
|
^^^^^ ^^^^^
|
|||
|
|
|||
|
|
|||
|
1) MIX: 3 PARTS SUGAR
|
|||
|
----------------------
|
|||
|
6 PARTS EPSON SALTS
|
|||
|
|
|||
|
2) PUT IN TINCAN, ONTO LOW FLAME
|
|||
|
(LIKE A LIGHTER) ---
|
|||
|
|
|||
|
3) LET GEL & HARDEN
|
|||
|
|
|||
|
4) PUT A MATCH IN AS A FUSE.
|
|||
|
|
|||
|
5) LIGHT IT & RUN LIKE HELL 'CAUSE
|
|||
|
4 POUNDS WILL FILL A CITY BLOCK...
|
|||
|
|
|||
|
|
|||
|
->MEDIUM EXPLOSIVE<-
|
|||
|
^^^^^^ ^^^^^^^^^
|
|||
|
|
|||
|
1) MIX: 7 PARTS POTASIUM CHLORATE
|
|||
|
---------------------------
|
|||
|
1 PART VASELINE
|
|||
|
|
|||
|
2) TO IGNITE, USE AN ELECTRIC CHARGE
|
|||
|
OR A FUSE.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
->CAR BOMB<-
|
|||
|
^^^ ^^^^
|
|||
|
|
|||
|
1) PUT LIQUID DRAINO INTO A PILL BOX
|
|||
|
(THE KIND YOU GET WHEN YOU'RE ON
|
|||
|
A PERSCRIPTION, NOTHING ELSE WILL
|
|||
|
WORK)
|
|||
|
|
|||
|
2) CLOSE THE LID & POP THE THING INTO
|
|||
|
THE GAS TANK
|
|||
|
|
|||
|
3) WAIT 5 MIN.
|
|||
|
|
|||
|
4) RUN
|
|||
|
|
|||
|
|
|||
|
->PLASTIC EXPLOSIVES<-
|
|||
|
^^^^^^^ ^^^^^^^^^^
|
|||
|
|
|||
|
1) MIX: 2 PARTS VASELINE
|
|||
|
------------------
|
|||
|
1 PART GASOLINE
|
|||
|
|
|||
|
2) IGNITE WITH AN ELECTRIC
|
|||
|
CHARGE.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|))(||)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)((|)(
|
|||
|
| Small Grenade |
|
|||
|
| \ | / |
|
|||
|
| By: SS-Badman \|/ |
|
|||
|
|(|---[*]---|) (|--- - - *- - ---|)|
|
|||
|
| Kingdom of the Dead II /|\ |
|
|||
|
| 509-927-9120 / | \ |
|
|||
|
| 1200/2400 - 5 drives - 20 megs..soon! |
|
|||
|
| Sysop: Angel of Death |
|
|||
|
||)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(||)(|
|
|||
|
|
|||
|
|
|||
|
Hardware:
|
|||
|
1 Nut (any size, as long as bolts fit), the wider the better
|
|||
|
2 Bolts (to fit nut)
|
|||
|
|
|||
|
Chemicals Phosphorus (the odd colored tips of strike on anything
|
|||
|
matches work well).
|
|||
|
|
|||
|
|
|||
|
1> Take 1 bolt and the nut, screw in the bolt until it is just in the
|
|||
|
nut, try and make sure there is no area for air to escape. This is
|
|||
|
where a perfectly matched nut and bolt are nice.
|
|||
|
|
|||
|
bolt nut
|
|||
|
\ ||______[ ] /
|
|||
|
\||______[ ]/
|
|||
|
|| [ ]
|
|||
|
|
|||
|
|
|||
|
2> Put as much phosphorus as possible in the nut.
|
|||
|
|
|||
|
||______[**]
|
|||
|
||______[**] * = phosphorus
|
|||
|
|| [**]
|
|||
|
|
|||
|
|
|||
|
3> Screw the 2ed bolt into the open end, simply crush the phosphorus
|
|||
|
when inserting it. But be carefull, we wouldn't want to ignite it!
|
|||
|
|
|||
|
||______[**]______||
|
|||
|
||______[**]______||
|
|||
|
|| [**] ||
|
|||
|
|
|||
|
Once both ends are nice and snug, it is ready. You now have a small
|
|||
|
grenade. They can be made in various sizes. Easily stored in the
|
|||
|
clove box of your car, or in a school locker. The possibile uses
|
|||
|
are endless.
|
|||
|
|
|||
|
It can be thrown or dropped onto any hard surface to ignite the
|
|||
|
phosphorus. The gases formed from the combustion will force one
|
|||
|
or both of the bolts out of the nut. The distace the bolt(s) travel,
|
|||
|
and its volocity, depend on the amount of phosphorus used.
|
|||
|
|
|||
|
Of course the larger the nut and bolt, the more explosive needed to
|
|||
|
force them out effectivly. It works on the same principal as the
|
|||
|
bullet being forced out of the gun barrel, except that the direction
|
|||
|
in which the bolts fly is never known, so watch yourself.
|
|||
|
|
|||
|
I haven't expiramented, but I'm sure that just about any, dry, shock
|
|||
|
sensitive chemical can be used in place of the phosphorus. The head
|
|||
|
of each bolt can be sharpened to a point for more effectiveness as
|
|||
|
well. Of course there are many variations to this design, I have
|
|||
|
seen special nuts that are quite wide, allowing the use of more
|
|||
|
explosive. Look in the section of your hardware store where small
|
|||
|
(or large) plumbing pipe is sold. There are pieces that have threads
|
|||
|
on each end to screw somthing on, but now we are talking about
|
|||
|
something that more resembles a pipe bomb than a devise which only
|
|||
|
causes a tiny disturbance (but is still dangerous).
|
|||
|
|
|||
|
This file was written for informational purposes only, the author
|
|||
|
takes no responsibility for the use, or the consequences of the use,
|
|||
|
of the information.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
WATS EXTENDERS
|
|||
|
|
|||
|
Many people think of phone phreaks as slime, out to rip off Bell
|
|||
|
for all she is worth. Nothing could be further from the truth!
|
|||
|
|
|||
|
Granted, there are some who get there kicks just by making free calls,
|
|||
|
however they are not true phone phreaks. Real phone phreaks are
|
|||
|
"telecommunications hobbyists" who experiment, play with and learn
|
|||
|
from the phone system. Occasionally this experimenting, and a need
|
|||
|
to communicate with other phreaks (without going broke), leads to
|
|||
|
free calls. The free calls are but a small subset of a TRUE phone
|
|||
|
phreaks activities.
|
|||
|
|
|||
|
Until several years ago, the phreaks main tool for free calls was the
|
|||
|
Blue Box. In recent years however, Bell has made GREAT strides in
|
|||
|
their security and detection of Blue Box's. While box's still work,
|
|||
|
their use is becoming EXTREMELY dangerous. With the advent of CCIS,
|
|||
|
the places where a Blue Box will work are rapidly decreasing, and
|
|||
|
within several years the Box will be totallt obsolete.
|
|||
|
|
|||
|
Thus for their communications needs, phreaks have turned to other
|
|||
|
methods, one being: WATS EXTENDERS.
|
|||
|
|
|||
|
Many companies throughout the United States have a salesman in the
|
|||
|
field that must contact a large amount of customers long distance
|
|||
|
by phone. To pay for these calls, generally the salesman use the
|
|||
|
companies Bell credit card (Now called a "Calling Card") this is
|
|||
|
quite expensive to the company. Several years ago, someone came up
|
|||
|
with a neat money saving idea. Since the company already had an an
|
|||
|
INWATS (800) number for salesmen to call in orders to the main plant,
|
|||
|
and since the company had a flat rate OUTWATS line to call customers
|
|||
|
during the day.
|
|||
|
|
|||
|
Why not couple them together after hours so that the salesman calls
|
|||
|
the companies INWATS 800 number, then gets connected up to OUTWATS.
|
|||
|
This would mean he could call anywhere in the United States. from
|
|||
|
anywhere at no charge to him! This arrangement would save the company
|
|||
|
tremendous amounts of long distance charges since they had the WATS
|
|||
|
lines anyway, and the WATS was a lot more cost efficient than Credit
|
|||
|
Cards.
|
|||
|
|
|||
|
This arrangement was exactly how early "WATS EXTENDERS" worked.
|
|||
|
During WATS (800) scanning (For how to do this, read "Napolean
|
|||
|
Solo's" EXCELLENT article in issue 55) phreaks discovered these
|
|||
|
WATS EXTENDERS, and found they could call anywhere in the country
|
|||
|
just by calling the extenders 800 number, then (Using Touch Tone of
|
|||
|
course) dial the number they wanted. The companies soon realized
|
|||
|
that their extenders were being messed with and decided to add some
|
|||
|
security to prevent tampering. It was set up so that when a salesman
|
|||
|
dialed the WATS EXTENDER, he would hear what sounds like a dial tone.
|
|||
|
The salesman then keyed in a four digit Touch Tone secret access
|
|||
|
code. If the code was incorrect a high-low tone would result, and
|
|||
|
the extender would have to be re-dialed. If the code was correct,
|
|||
|
and second internal PBX dial tone would result. The salesman would
|
|||
|
then access the companies OUTWATS line by hitting 8 or 9 (usually)
|
|||
|
and dial wherever he wanted.
|
|||
|
|
|||
|
The four digit access code posed a problem to phreaks since only 1
|
|||
|
out of 9999 possible codes worked, and the 800 number had to be
|
|||
|
re-dialed each timeand try another.
|
|||
|
|
|||
|
|
|||
|
Many a phone phreak spent long nights breaking the four digit codes
|
|||
|
and then using the extenders themselves! Most companies change
|
|||
|
the code every few months so the phreaks would have to start over
|
|||
|
again. (Also company employees that were not authorized to know,
|
|||
|
but found out from "leaks"). Many of you have probably heard of the
|
|||
|
infamous computer "Charlie". For those who haven't, several years
|
|||
|
ago Charlie was brought to life by Capn Crunce (Now retired from
|
|||
|
the communications service) Charlie was an Apple ][ computer with a
|
|||
|
special board which allowed it to Touch Tone dial numbers extremely
|
|||
|
rapidly (D/A) then "listen" to the results (A/D).
|
|||
|
|
|||
|
Charlie was put to use calling a given WATS EXTENDER, trying an access
|
|||
|
code, if the high-low tone was heard (meaning an incorrect code),
|
|||
|
Charlie hung up and dialed again, trying the next sequential code.
|
|||
|
Charlie would sit working for hours, and when it found the code,
|
|||
|
it would print it on it's display screen. VERY effective!
|
|||
|
|
|||
|
Unfortunately the only problem with Charlie was the he was very
|
|||
|
noticeable to Bell. Every time an 800 number is dialed, and
|
|||
|
AMA record is punched at the C.O. thus it looks real phunny to Bell
|
|||
|
to see that you have called Dry Dock orange shippers 800 number
|
|||
|
in Florida 3,750 times at 2:00 AM with each call lasting 1 second!
|
|||
|
Since Charlie was not very easily portable to pay phones this was
|
|||
|
a real problem. There are many WATS EXTENDERS reportedly presently
|
|||
|
in service. Most working as described, with some taking more than
|
|||
|
a four digit code, and some even responding to voice input!
|
|||
|
|
|||
|
It should be pointed out however, that should any of you crack any
|
|||
|
WATS EXTENDER access codes and attempt to use them, you are gulity
|
|||
|
of Theft of communications services from the company who owns it,
|
|||
|
and Bell is very willing and able to help nail you! WATS EXTENDERS
|
|||
|
can get you in every bit as much trouble as a Blue Box should you
|
|||
|
be caught.
|
|||
|
|
|||
|
Most WATS EXTENDERS also record all numbers call from them on OUTWATS.
|
|||
|
If the company detects the extender being mis-used, they will usually
|
|||
|
first try to change the access code. If the abuse continues and the
|
|||
|
get mad enough they will contact Bell who will help them investigate
|
|||
|
all the numbers you called!
|
|||
|
|
|||
|
Thus, as in most things those of you who are determined to play with
|
|||
|
WATS EXTENDERS, do so from a pay phone and only to institutional
|
|||
|
switchboards, or people with short memories. By the way, on some
|
|||
|
"Money First" payphones (as as opposed to "Dial Tone First") the
|
|||
|
Touch Tone pad is cut off after the WATS call is complete. (Because
|
|||
|
of polarity reversal) It can be re-activated by depositing a dime
|
|||
|
after the connection is made, which you will get back after
|
|||
|
you hang up.
|
|||
|
|
|||
|
Also please remember the opening of this article. DO NOT use WATS
|
|||
|
EXTENDERS just to make free calls all the time! Experiment with them
|
|||
|
and learn what they can do and how they work. I think you will
|
|||
|
learn a lot!!
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
***************************
|
|||
|
* *
|
|||
|
* Basics of Hacking I: *
|
|||
|
* *
|
|||
|
***************************
|
|||
|
|
|||
|
|
|||
|
Welcome to basics of hacking i: dec's in this article you will learn
|
|||
|
how to log in to dec's, logging out, and all the fun stuff to do
|
|||
|
in-between. All of this information is based on a standard dec system.
|
|||
|
Since there are dec systems 10 and 20, and we favor, the dec 20,
|
|||
|
there will be more info on them in this article. It just so happens
|
|||
|
that the dec 20 is also the more common of the two, and is used by
|
|||
|
much more interesting people (if you know what we mean...) Ok, the
|
|||
|
first thing you want to do when you are receiving carrier from a dec
|
|||
|
system is to find out the format of login names.
|
|||
|
|
|||
|
You can do this by looking at who is on the system. Dec=> ` (the
|
|||
|
'exec' level prompt) you=> sy sy is short for sy(stat) and shows you
|
|||
|
the system status. You should see the format of login names... A systat
|
|||
|
usually comes up in this form: job line program user job: the job
|
|||
|
number (not important unless you want to log them off later) line:
|
|||
|
what line they are on (used to talk to them...) These are both two or
|
|||
|
three digit numbers. Program: whatprogram are they running under?
|
|||
|
If it says 'exec' they aren't doing anything at all... User:
|
|||
|
ahhhahhhh! This is the user name they are logged in under...
|
|||
|
Copy the format, and hack yourself out a working code...
|
|||
|
Login format is as such: dec=> ` you=> login username password
|
|||
|
username is the username in the format you saw above in the systat.
|
|||
|
After you hit the space after your username, it will stop echoing
|
|||
|
characters back to your screen. This is the password you are typing
|
|||
|
in... Remember, people usually use their name, their dog's name,
|
|||
|
the name of a favorite character in a book, or something like this.
|
|||
|
A few clever people have it set to a key cluster (qwerty or asdfg).
|
|||
|
Pw's can be from 1 to 8 characters long, anything after that is
|
|||
|
ignored. You are finally in... It would be nice to have a little help,
|
|||
|
wouldn't it?
|
|||
|
|
|||
|
Just type a ? Or the word help, and it will give you a whole list
|
|||
|
of topics... Some handy characters for you to know would be the
|
|||
|
control keys, wouldn't it? Backspace on a dec 20 is rub which is 255
|
|||
|
on your ascii chart. On the dec 10 it is cntrl-h. To abort a long
|
|||
|
listing or a program, cntrl-c works fine. Use cntrl-o to stop long
|
|||
|
output to the terminal. This is handy when playing a game, but you
|
|||
|
don't want to cntrl-c out. Cntrl-t for the time. Cntrl-u will kill
|
|||
|
the whole line you are typing at the moment. You may accidently run
|
|||
|
a program where the only way out is a cntrl-x, so keep that in reserve.
|
|||
|
Cntrl-s to stop listing, cntrl-q to continue on both systems.
|
|||
|
Is your terminal having trouble?? Like, it pauses for no reason, or
|
|||
|
it doesn't backspace right?
|
|||
|
|
|||
|
This is because both systems support many terminals, and you haven't
|
|||
|
told it what yours is yet... You are using a vt05 (isn't that funny?
|
|||
|
I thought I had an apple) so you need to tell it you are one.
|
|||
|
Dec=> ` you=> information terminal or... You=> info ter this shows you
|
|||
|
what your terminal is set up as... Dec=> all sorts of shit, then the
|
|||
|
` you=> set ter vt05 this sets your terminal type to vt05. Now let's
|
|||
|
see what is in the account (here after abbreviated acct.) That you
|
|||
|
have hacked onto... Say => dir short for directory, it shows you what
|
|||
|
the user of the code has save to the disk.
|
|||
|
|
|||
|
There should be a format like this: xxxxx.Ooo xxxxx is the file
|
|||
|
name, from 1 to 20 characters long. Ooo is the file type, one of:
|
|||
|
exe, txt, dat, bas, cmd and a few others that are system dependant.
|
|||
|
Exe is a compiled program that can be run (just by typing its name
|
|||
|
at the `). Txt is a text file, which you can see by typing=> type
|
|||
|
xxxxx.Txt do not try to=> type xxxxx.Exe this is very bad for your
|
|||
|
terminal and will tell you absolutly nothing.
|
|||
|
|
|||
|
Dat is data they have saved. Bas is a basic program, you can have it
|
|||
|
typed out for you. Cmd is a command type file, a little too
|
|||
|
complicated to go into here. Try => take xxxxx.Cmd by the way, there
|
|||
|
are other users out there who may have files you can use (gee, why
|
|||
|
else am I here?). Type => dir <*.*> (Dec 20) => dir [*,*]
|
|||
|
(dec 10) * is a wildcard, and will allow you to access the files on
|
|||
|
other accounts if the user has it set for public access. If it isn't
|
|||
|
set for public access, then you won't see it. To run that program:
|
|||
|
dec=> ` you=> username program-name username is the directory you saw
|
|||
|
the file listed under, and file name was what else but the file name?
|
|||
|
** You are not alone ** remember, you said (at the very start) sy
|
|||
|
short for systat, and how we said this showed the other users on the
|
|||
|
system? Well, you can talk to them, or at least send a message to
|
|||
|
anyone you see listed in a systat. You can do this by: dec=> the
|
|||
|
user list (from your systat) you=> talk username (dec20) send
|
|||
|
username (dec 10) talk allows you and them immediate transmission
|
|||
|
of whatever you/they type to be sent to the other.
|
|||
|
|
|||
|
Send only
|
|||
|
allow you one message to be sent, and only after you hit <return>.
|
|||
|
With send, they will send back to you, with talk you can just keep
|
|||
|
going. By the way, you may be noticing with the talk command that
|
|||
|
what you type is still acted upon by the parser (control program).
|
|||
|
To avoid the constant error messages type either: you=> ;your
|
|||
|
message you=> rem your message the semi-colon tells the parser
|
|||
|
that what follows is just a comment. Rem is short for 'remark' and
|
|||
|
ignores you from then on until you type a cntrl-z or cntrl-c, at which
|
|||
|
point it puts you back in the exec mode.
|
|||
|
|
|||
|
To break the connection from a talk command type: you=> break priv's:
|
|||
|
if you happen to have privs, you can do all sorts of things. First
|
|||
|
of all, you have to activate those privs. You=> enable this gives you
|
|||
|
a $ prompt, and allows you to do this: whatever you can do to your
|
|||
|
own directory you can now do to any other directory. To create a
|
|||
|
new acct. Using your privs, just type => build username if username
|
|||
|
is old, you can edit it, if it is new, you can define it to be whatever
|
|||
|
you wish. Privacy means nothing to a user with privs. By the way,
|
|||
|
there are various levels of privs: operator, wheel, cia wheel is
|
|||
|
the most powerful, being that he can log in from anywhere and have
|
|||
|
his powers. Operators have their power because they are at a special
|
|||
|
terminal allowing them the privs. Cia is short for 'confidential
|
|||
|
information access', which allows you a low level amount of privs.
|
|||
|
Not to worry though, since you can read the system log file, which also
|
|||
|
has the passwords to all the other accounts. To de-activate your privs,
|
|||
|
type you=> disable
|
|||
|
|
|||
|
when you have played your greedy heart out, you can finally leave
|
|||
|
the system with the command=> logout this logs the job you are using
|
|||
|
off the system (there may be varients of this such as kjob, or killjob).
|
|||
|
By the way, you can say (if you have privs) => logout username afl
|
|||
|
|
|||
|
|
|||
|
|
|||
|
******************************
|
|||
|
** The basics of hacking II: **
|
|||
|
* Vax's *
|
|||
|
* Unix *
|
|||
|
********************************
|
|||
|
|
|||
|
Welcome to the basics of hacking II:
|
|||
|
|
|||
|
Unix is a trademark of bell labs ** ** (and you know what *that*
|
|||
|
means). In this article, we discuss the unix system that runs
|
|||
|
on the various vax systems. If you are on another unix-type system,
|
|||
|
some commands may differ, but since it is licenced to bell, they can't
|
|||
|
make many changes. Hacking onto a unix system is very difficult,
|
|||
|
and in this case, we advise having an inside source, if possible. The
|
|||
|
reason it is difficult to hack a vax is this: many vax, after you get
|
|||
|
a carrier from them, respond=> login: they give you no chance to see
|
|||
|
what the login name format is. Most commonly used are single words,
|
|||
|
under 8 digits, usually the person's name.
|
|||
|
|
|||
|
There is a way around this: most vax have an acct. Called 'suggest'
|
|||
|
for people to use to make a suggestion to the system root terminal.
|
|||
|
This is usually watched by the system operator, but at late he is
|
|||
|
probably at home sleeping or screwing someone's brains out. So we can
|
|||
|
write a program to send at the vax this type of a message: a screen
|
|||
|
freeze (cntrl-s), screen clear (system dependant), about 255 garbage
|
|||
|
characters, and then a command to create a login acct., After which
|
|||
|
you clear the screen again, then un- freeze the terminal.
|
|||
|
|
|||
|
What this does: when the terminal is frozen, it keeps a buffer of
|
|||
|
what is sent. Well, the buffer is about 127 characters long. So you
|
|||
|
overflow it with trash, and then you send a command line to create
|
|||
|
an acct. (System dependant). After this you clear the buffer and
|
|||
|
screen again, then unfreeze the terminal. This is a bad way to do
|
|||
|
it, and it is much nicer if you just send a command to the terminal
|
|||
|
to shut the system down, or whatever you are after... There is always,
|
|||
|
*always* an acct. Called root, the most powerful acct. To be on,
|
|||
|
since it has all of the system files on it. If you hack your way
|
|||
|
onto this one, then everything is easy from here on...
|
|||
|
|
|||
|
On the unix system, the abort key is the cntrl-d key. Watch how
|
|||
|
many times you hit this, since it is also a way to log off the
|
|||
|
system! A little about unix architechture: the root directory,
|
|||
|
called root, is where the system resides. After this come a few
|
|||
|
'sub' root directories, usually to group things (stats here, priv
|
|||
|
stuff here, the user log here...). Under this comes the superuser
|
|||
|
(the operator of the system), and then finally the normal users. In
|
|||
|
the unix 'shell' everything is treated the same. By this we mean:
|
|||
|
you can access a program the same way you access a user directory,
|
|||
|
and so on. The way the unix system was written, everything, users
|
|||
|
included, are just programs belonging to the root directory. Those
|
|||
|
of you who hacked onto the root, smile, since you can screw
|
|||
|
everything...
|
|||
|
|
|||
|
The main level (exec level) prompt on the unix system is the $,
|
|||
|
and if you are on the root, you have a # (super- user prompt). Ok,
|
|||
|
a few basics for the system... To see where you are, and what paths
|
|||
|
are act; G i] reguards to your user account, then type => pwd this
|
|||
|
shows your acct. Seperated by a slash with another pathname (acct.),
|
|||
|
Possibly manytimes.
|
|||
|
|
|||
|
BBS LIST BY MOGWAI/PHALANX - 1 APRIL 1989
|
|||
|
-----------------------------------------
|
|||
|
|
|||
|
St Name Phone Baud Storage Software
|
|||
|
ON *** AIRWOLF *** 416-767-1907 19200 64 AMIGA
|
|||
|
CA UNKNOWN BBS 213-329-4603 2400 60 AMIGA
|
|||
|
CA TWILITE ZONE 714-731-5195 2400 60 AMIGA
|
|||
|
NY NIGHT FLIGHT 212-962-3504 2400 43 AMIGA
|
|||
|
FL AMIGA AUSCHWITZ 904-744-9326 2400 4 AMIGA
|
|||
|
NY TRILOGY/PE#1 HEADQUARTERS 516-484-9240 9600 20 AMIGA
|
|||
|
OH SINNERS U.S. HEADQUARTERS 216-784-5552 2400 20 AMIGA
|
|||
|
ON 68000 416-278-5654 19200 328 AMIGA
|
|||
|
ON THE MESSAGE BOARD 416-536-4282 9600 2 AMIGA
|
|||
|
ON FUCKN' A BBS 416-278-0490 9600 128 AMIGA
|
|||
|
NY FBI BBS 718-259-9661 9600 310 PC BOARD
|
|||
|
NY FBI BBS 718-234-3659 9600 310 PC BOARD
|
|||
|
GA AMIGA DOCS 'R' US 912-748-0331 2400 20 AMIGA
|
|||
|
ON CANADIAN AMIGA CONNECTION 416-440-1459 9600 20 AMIGA
|
|||
|
CA PIPELINE 805-526-5660 2400 40+ AMIGA
|
|||
|
WI PANDEMONIUM 414-352-5982 9600 80 AMIGA
|
|||
|
AZ BLOOM COUNTY AMIGA 602-843-8261 9600 20 AMIGA
|
|||
|
MD TERMINAL FIX 202-562-1174 19200 N/A AMIGA
|
|||
|
IL SKIDDS' LAIR 312-631-4817 19200 N/A AMIGA
|
|||
|
CA CUTTING EDGE/ESI CALIF. 213-836-2381 19200 N/A AMIGA
|
|||
|
IN GENESIS ONE 317-885-1268 19200 N/A AMIGA
|
|||
|
FL AMIGA BEACH 407-833-8692 19200 N/A AMIGA
|
|||
|
NJ DAMAGE, INC./ORACLE HQ 602-264-6670 9600+ N/A AMIGA
|
|||
|
ND SHADOWS OF IGA 707-528-7238 19200 N/A AMIGA
|
|||
|
MT TELE-TRADER 406-782-3161 19200 N/A AMIGA
|
|||
|
ON VENTURE 416-469-1031 19200 140 AMIGA
|
|||
|
AL FEAR AND LOATHING IN LAS VEGAS 205-221-3327 19.2k 150 PC BOARD
|
|||
|
IA THE ZONE 712-366-9747 9600 65 AMIGA
|
|||
|
ON C.O.P.S. HQ 416-633-8801 9600 80 AMIGA
|
|||
|
|
|||
|
|
|||
|
***************************************
|
|||
|
** The basics of hacking III: Data **
|
|||
|
***************************************
|
|||
|
|
|||
|
|
|||
|
Welcome to the basics of hacking III: data general computers.
|
|||
|
Data general is favored by large corporations who need to have a lot
|
|||
|
of data on-line. The data general aos, which stands for advanced
|
|||
|
operating system, is a version of bastardized unix. All the commands
|
|||
|
which were in the unix article, will work on a data general.
|
|||
|
Once again, we have tb^"|yoblem of not knowing the format for the login
|
|||
|
name on the data general you want to hack. As seems to be standard,
|
|||
|
try names from one to 8 digits long. Data general designed the computer
|
|||
|
to be for busi- nessmen, and is thus very simplistic, and basically
|
|||
|
fool proof (but not damn fool proof). It follows the same login
|
|||
|
format as the unix system: dg=> login: you=> username dg=> password:
|
|||
|
you=> password passwords can be a maximum of 8 characters, and they
|
|||
|
are almost always set to a default of 'aos' or 'dg'. (Any you know
|
|||
|
about businessmen...) A word about control characters: cntrl-o
|
|||
|
stops massive print-outs to the screen, but leaves you in whatever
|
|||
|
mode you were.
|
|||
|
|
|||
|
(A technical word on what this actually does: it tells the cpu to
|
|||
|
ignore the terminal, and prints everything out to the cpu! This is
|
|||
|
about 19200 baud, and so it seems like it just cancels.) Cntrl-u
|
|||
|
kills the line you are typing at the time. Now for the weird one:
|
|||
|
cntrl-c tells the cpu to stop, and wait for another cntrl character.
|
|||
|
To stop a program, you actually need to type cntrl-c and then a
|
|||
|
cntrl-b. Once you get on, type 'help'. Many dg (data general)
|
|||
|
computers are sold in a package deal, which also gets the company
|
|||
|
free customizing. So you never know what commands there might be.
|
|||
|
|
|||
|
So we will follow what is known as the 'eclipse standard', or
|
|||
|
what it comes out of the factory like. To find out the files
|
|||
|
on the directory you are using, type => dir to run a program,
|
|||
|
just like on a dec, just type its name. Other than this, and
|
|||
|
running other people's programs, there really isn't a standard...
|
|||
|
*** Hark, yon other system users *** to see who is on, type =>
|
|||
|
who (and a lot of the other unix commands, remember?). This shows
|
|||
|
the other users, what they are doing, and what paths they are
|
|||
|
connected across. This is handy, so try a few of those paths
|
|||
|
yourself. To send a message, say => send username this is a one
|
|||
|
time message, just like send on the dec 10. From here on, try
|
|||
|
commands from the other previous files and from the 'help' listing.
|
|||
|
Superuser: if you can get privs, just say: => superuser on and you
|
|||
|
turn those privs on! By the way, you remember that computers keep
|
|||
|
a log of what people do? Type: => syslog /stop and it no longer
|
|||
|
records anything you do on the system, or any of the other users.
|
|||
|
|
|||
|
It screams to high heaven that it was you who turned it off,
|
|||
|
but it keeps no track of any accounts created or whatever else
|
|||
|
you may do. You can say=> syslog /start to turn it back on
|
|||
|
(now why would you want to do something like that?????) To exit from
|
|||
|
the system, type=> bye and the system will hang up on you. Most
|
|||
|
of the systems around, including decs, vax's, and dg's, have games.
|
|||
|
These are usually located in a path or directory of the name games
|
|||
|
or <games> or games: try looking in them, and you may find some
|
|||
|
trek games, adventure, zork, wumpus (with bent arrows in hand) or
|
|||
|
a multitude of others. There may also be games called 'cb' or
|
|||
|
'forum'. These are a sort of computer conference call. Use them on
|
|||
|
w-Wsnds, and you can meet all sorts of interesting people.
|
|||
|
|
|||
|
*****************************************
|
|||
|
|
|||
|
If you would like to see more articles on hacking (this time far
|
|||
|
more than just the basics), or maybe articles on networks and such,
|
|||
|
then leave us mail if we are on the system, or have the sysop search
|
|||
|
us down. We call a lot of places, and you may just find us. This
|
|||
|
completes the series of articles on hacking... These articles were:
|
|||
|
the basics of hacking: introduction the basics of hacking i: dec's the
|
|||
|
basics of hacking ii: vax's (unix) the basics of hacking iii: dg's
|
|||
|
This and the previous articles by:
|
|||
|
|
|||
|
|
|||
|
/The Knights of Shadow
|
|||
|
|
|||
|
The Knights of Shadow on the PPS SuperSystem (206) 783-9798 [25]
|
|||
|
count 'em [25] megs!
|
|||
|
|