130 lines
6.3 KiB
Plaintext
130 lines
6.3 KiB
Plaintext
|
|
|||
|
|
|||
|
HackBBS v0.2 COM ONLY Version
|
|||
|
(c)1993 By Virogen
|
|||
|
06-29-93
|
|||
|
-----------------
|
|||
|
The Ultimate In Board Hacking Software
|
|||
|
|
|||
|
|
|||
|
Disclaimer :
|
|||
|
Naturally, this software is not intended to be used in any
|
|||
|
state or country in which it may be illegal. This creator
|
|||
|
of this software can not be help accountable for any
|
|||
|
damages, loss of data, or anything else which may result
|
|||
|
in the use of this program. All responsibilities lie with
|
|||
|
the operator of this software.
|
|||
|
If you do not agree to the above terms then don't use
|
|||
|
this software.
|
|||
|
|
|||
|
HACKBBS - The Concept
|
|||
|
----------------------
|
|||
|
A while back I was looking at a few text files which describe how to
|
|||
|
infiltrate bulletin boards thru backdoors and bugs in the software. I
|
|||
|
saw some good ideas for hacking SOME bulletin boards. HackBBS will allow
|
|||
|
you to hack nearly any bulletin board in existence using no bugs in the
|
|||
|
software, etc.. So, welcome to the latest in board hacking technology.
|
|||
|
Yea, stupid phrase, I know.
|
|||
|
|
|||
|
|
|||
|
How it works
|
|||
|
-------------
|
|||
|
This is a COM Only version of Hackbbs. I had a few problems with memory
|
|||
|
with the EXE version, but I do still expect to release it soon. I separated
|
|||
|
the versions so that the file size could be kept to a minimum. Anyway, what
|
|||
|
hackbbs does is install itself, along with a specified batch, com, or exe
|
|||
|
file, onto any COM file. The file you append to the COM file will be
|
|||
|
called the activation file from now on. This file CANNOT exceed 32k. If it
|
|||
|
does, then it will not execute properly once activated. I'm working
|
|||
|
on fixing this. ALSO, make sure that the infected COM file does not exceed
|
|||
|
the 64k boundary. The infected file will function normally until the
|
|||
|
key is located anywhere in the command line. At which time, hackbbs
|
|||
|
will take control and write the batch, com, or exe file which it attached
|
|||
|
to the program. It will then execute this file. HackBBS writes the file
|
|||
|
to disk as EXACTLY the same name you specified when infecting the file.
|
|||
|
If you used a path such as : "C:\TEST\RUNME.COM" then HackBBS will write
|
|||
|
the file to that directory and filename upon activation. If you did not
|
|||
|
specify a directory name, then hackbbs will write it to the current
|
|||
|
directory on the victim's computer. Confusing enough? Good, why make it
|
|||
|
simple when you can completly screw things over?
|
|||
|
|
|||
|
Command Syntax for HACKBBS :
|
|||
|
HACKBBS [COMFILE] [COM_EXE_BAT] [KEY]
|
|||
|
|
|||
|
-COMFILE is the name of the file you wish to infect
|
|||
|
-COM_EXE_BAT is the name of the activation file -LESS THAN 32k!
|
|||
|
-KEY is up to 8 characters which, when found on the command line,
|
|||
|
activate hackBBS. If you specify a key longer than 8 chars, only
|
|||
|
the first 8 characters will apply.
|
|||
|
|
|||
|
How to use it
|
|||
|
--------------
|
|||
|
To use this program to hack into a board, simply run hackbbs on the
|
|||
|
COM file you wish to infect, using the above parameters. The activation file
|
|||
|
you create can do anything you wish. I'll leave it up to your imagination
|
|||
|
to think of the possiblities. One thing you MUST remember though, this
|
|||
|
program is not designed for re-entry into the executable. Therefore, once
|
|||
|
the batch file is run don't plan on returning to the COM file and
|
|||
|
continuing the process. I'd suggest removing all evidence and then
|
|||
|
rebooting his system. Anyway, an example of hacking a board would
|
|||
|
be :
|
|||
|
1) Create the batch file TEST.BAT containing :
|
|||
|
CTTY COM1
|
|||
|
(substitute the appropriate COM port)
|
|||
|
2) Extract the latest version of DSZ into a temporary directory.
|
|||
|
Infect DSZ.COM with a command line something like :
|
|||
|
HACKBBS C:\TEMP\DSZ.COM TEST.BAT ACTIVATE
|
|||
|
3) Be friendly, and upload it to the victim's board.
|
|||
|
(be sure to talk it up in the description, to make sure
|
|||
|
that he'll use it on his board)
|
|||
|
4) Call back whenever he's got it installed and upload him the
|
|||
|
file : ACTIVATE.ZIP using DSZ. Bam, boom, smack.. as soon
|
|||
|
as DSZ is run with "ACTIVATE" in the command line your batch
|
|||
|
file is written to disk and executed. Thus, redirecting
|
|||
|
standord I/O to COM1. You just got access to his/her DOS.
|
|||
|
You need to remember to delete all evidence of your infiltration.
|
|||
|
HackBBS will not return to the infected file and continue
|
|||
|
running. I suggest you reboot the victim's computer.
|
|||
|
|
|||
|
Ofcourse, you could just write a batch file to format his HD, send
|
|||
|
his users data file, etc.. No limits. The best part is that HACKBBS
|
|||
|
can install itself onto any COM file, protocols, compression utils,
|
|||
|
upload processors, etc. The EXE version will be even more effective.
|
|||
|
|
|||
|
|
|||
|
Details & Warnings
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
- DO NOT USE AN ACTIVATION FILE LARGER THAN 32k!
|
|||
|
- ALWAYS CHECK AND MAKE SURE THAT AN INFECTED COM FILE DOES NOT
|
|||
|
EXCEED THE 64K BOUNDARY.
|
|||
|
- HackBBS was written in assembly, compiled by TASM v2.0.
|
|||
|
- When executing a batch file, hackbbs uses the command line :
|
|||
|
C:\COMMAND.COM /K [filename.BAT]
|
|||
|
Where [filename.BAT] is the filename of the file you appended
|
|||
|
to the COM.
|
|||
|
- When executing a COM or EXE file, hackbbs executes it directly.
|
|||
|
- No, I haven't tested it extensivly.
|
|||
|
- Nowhere Man's CRYPTCOM utility was used to encrypt the
|
|||
|
original executable (HACKBBS.COM). I then made a few
|
|||
|
unsignificant changes to deter debugging. (here CCh, there
|
|||
|
a CCh, everywhere a CCh)
|
|||
|
|
|||
|
|
|||
|
How to tell Virogen what a great program he wrote, or what a shitty
|
|||
|
piece of crap this thing is
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
Simply leave me a message anywhere, and everywhere and eventually I'm
|
|||
|
bound to recieve it. You can leave a message to me on Fidonet (Virogen),
|
|||
|
Virus Conference, but I only scan it occaisionally.
|
|||
|
|
|||
|
|
|||
|
<20><><EFBFBD> <20><>
|
|||
|
<20><><EFBFBD> <20><> <20><> <20><><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD> <20> <20><> <20> <20><> <20> <20><><EFBFBD> <20><> <20>
|
|||
|
<20><><EFBFBD> <20><><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD> <20><> <20>
|
|||
|
<20><>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
|
|||
|
|