1857 lines
82 KiB
Plaintext
1857 lines
82 KiB
Plaintext
|
______ ______ _____________ ____ ___ ______
|
|||
|
/ ____|\ / \ /____ ____/\ / | \ / / | / \
|
|||
|
/ / ____\| / __ |\ \_/ /\____\/ / | / / / / __ |\
|
|||
|
/ / / / /__/ / | / / / / /| |/ / / / /__/ / |
|
|||
|
/ /__/______ | / / / / / / / | / / | / /
|
|||
|
|____________|\ |\_____ / / /__ / / /___/ / |___/ / |\_____ / /
|
|||
|
|_____________\| \|____| / \__\ / |___ |/ |___|/ \|____| /
|
|||
|
|
|||
|
____
|
|||
|
/ \ ---
|
|||
|
/ \ \ __
|
|||
|
/ /\ \ \ \
|
|||
|
_/______|_/ / / / \
|
|||
|
| | / / / /
|
|||
|
| ---\( |/ / / /
|
|||
|
| \|\(/\(/ \(/
|
|||
|
| |
|
|||
|
/ /
|
|||
|
/ \ /
|
|||
|
/ \ ___/
|
|||
|
/
|
|||
|
/
|
|||
|
/
|
|||
|
|
|||
|
Communications of The New Order
|
|||
|
Issue #5
|
|||
|
Fall 1994
|
|||
|
|
|||
|
|
|||
|
"Those who would sacrifice a little privacy for more security, deserve
|
|||
|
neither privacy nor security."
|
|||
|
- Ben Franklin
|
|||
|
|
|||
|
|
|||
|
Special Thanks: Boo Yaa, Ninja Master, TEK, Gatsby, TDK, Pulse,
|
|||
|
Invalid Media, Mark Tabas, Marauder, Frosty,
|
|||
|
Phalcon/Skism, PMF.
|
|||
|
|
|||
|
Good Luck To: Merc and the 602 Crowd, Crypt Keeper and 513 Crowd.
|
|||
|
|
|||
|
|
|||
|
Cavalier...."I don't mind standing at a payphone for three hours
|
|||
|
if its for a good cause."
|
|||
|
Dead Kat...."I've been on hold forever! I just wasted five
|
|||
|
dollars of some guys money."
|
|||
|
DisordeR...."When I die I'm going to prank call god from hell."
|
|||
|
The Public.."MoD never really split up, they were just in
|
|||
|
different jails."
|
|||
|
Voyager....."#hack, the IRC Channel of broken dreams."
|
|||
|
|
|||
|
|
|||
|
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
|||
|
|
|||
|
|
|||
|
__/\iNTRo/\__
|
|||
|
|
|||
|
|
|||
|
CoTNo is a 'zine of the computer underground of the 1990's. It is written
|
|||
|
for H4Qu3r's and pHR3aCK3r's of intermediate to beginning experience. All
|
|||
|
the information published herein is as accurate as possible and pertains to
|
|||
|
techniques and devices that actually work. We do not publish any article
|
|||
|
that is not of an H/P nature. If you wish to comment on or contribute to
|
|||
|
CoTNo, email us at tno@fc.net, or catch one of us on the iRC or try to catch
|
|||
|
us in your local Telco dumpster.
|
|||
|
|
|||
|
Ahem...
|
|||
|
|
|||
|
As was hinted at in our last issue, some of our own members were snagged in
|
|||
|
the so-called "Operation Sundevil '94". One of those was John Falcon (aka
|
|||
|
Renegade), the uberhacker of Alaska. He was convicted of and incarcerated
|
|||
|
for a number of cumputer related crimes this summer. For his "offences" he
|
|||
|
received a 20 month jail sentence. Since rumors about his bust have been
|
|||
|
running rampant on the 'Net, I've decided to set the facts straight here with
|
|||
|
the information straight from JF himself.
|
|||
|
|
|||
|
First we'll begin with the information that has been released by the press.
|
|||
|
Following is an excerpt from the Elmendorf AFB newspaper titled 'Computer
|
|||
|
Hackers Benefit From Lax Security". My comments appear in [brackets]. ;)
|
|||
|
|
|||
|
[...garbage about security...]
|
|||
|
Elmendorf (AFB) hasn't been immune to computer crimes and hacker
|
|||
|
intrusions. During the past 12 months, AFOSI (Air Force Office of
|
|||
|
Special Invesigations) Detachment 631 has investigated several
|
|||
|
computer-related crimes, according to Special Agent Michael Vickery,
|
|||
|
criminal invesigator for Det. 631 [da Fedz].
|
|||
|
In one case, and active-duty military member gave his government
|
|||
|
computer password to a friend [thanks dude!]. His friend used the password
|
|||
|
to access the military computer system and store files in it [WaReZ!!].
|
|||
|
The military member didn't know his friend, an accomplished hacker, was a
|
|||
|
member of an active computer hacking group based in Colorado -- a group
|
|||
|
responsible for causing massive damage to DOD (Department of Defense)
|
|||
|
computer systems. [ooohhh... now we're famous.]
|
|||
|
The same hacker and an associate also broke into a base building
|
|||
|
five different time and stole more than $15,000.00 worth of government
|
|||
|
computer equiptment [see CoTNo #03, article 4]. The hacker continued his
|
|||
|
illegal activities when he charged more than $1,700.00 in long distance
|
|||
|
phone calls to the Federal Aviation Administration and Mark Air
|
|||
|
(local airline)[I was wondering how he managed to call Flatline so much! ;)],
|
|||
|
and broke into a Seattle-based computer company's system.
|
|||
|
The investigation involved a multi-agency task force, which
|
|||
|
included investigators from the AFOSI, 3rd Security Police Squadron,
|
|||
|
FBI, Secret Service (CIA), and the FAA. The hacker and his accomplice
|
|||
|
were caught and convicted in federal court. The hacker was sentenced
|
|||
|
to 20 months confinement, $21,000.00 restitution, and three years of
|
|||
|
probation, according to Vickery [and Phiber thought he had it bad].
|
|||
|
The AFOSI is addressing this new crime in a unique way. In 1978
|
|||
|
AFOSI was the first law enforcment agency to create computer crime
|
|||
|
invesigators. In 1992 AFOSI formed a small squad of these
|
|||
|
investigators at Bolling AFB, Washington D.C., that manages all
|
|||
|
computer intrusion invesigations for the agency. These cases need
|
|||
|
central management so that only one coordinated invesigation is
|
|||
|
conducted instead of several individual invesigations running
|
|||
|
concurrently withou coordination.
|
|||
|
[...deleted garbage...]
|
|||
|
|
|||
|
Once news of the bust started to leak out to the scene, the rumours went wild!
|
|||
|
Following is a message from JF that debunks some of the rumours. Thanks to
|
|||
|
Shade for getting in contact with him about this.
|
|||
|
|
|||
|
>From Jfalcon@ice_bbs.alaska.net Wed Nov 16 16:21:20 MST 1994
|
|||
|
|
|||
|
Greetings, I am Mr. Falcon aka John Falcon. A friend of mine was so gratious
|
|||
|
as to send me a copy of the alt.2600 posting you made. Let me just cut to the
|
|||
|
chase. I liked your writing, but you were misinformed on the facts so that is
|
|||
|
why I am making this posting public because some kind of example must be made.
|
|||
|
|
|||
|
Common myths of my arrest:
|
|||
|
|
|||
|
1 - The FBI/NSA cracked my hard drive and read all my encrypted mail.
|
|||
|
|
|||
|
A: Christ man, If this was true, do you realize how many of your guys that sit
|
|||
|
all night on #hack on IRC or some other channel or even all the mail in and
|
|||
|
out of ripco.com and phantom.com would be monitored and people arrested?! If
|
|||
|
this were the case, I can assure you my friend I would be talking to you face
|
|||
|
to face right now and not via computer or anything.
|
|||
|
|
|||
|
2 - Mr. Falcon left his secring.pgp on his system.
|
|||
|
|
|||
|
A: This is only 50% true. Yes I had my secring.pgp on the system. The reason
|
|||
|
for it being there was that 3 weeks earlier, the person who is kind enough to
|
|||
|
post this message for me borrowed my 486 computer and took it to his school.
|
|||
|
No big deal. Except when he hooked it up to their network, it began to have a
|
|||
|
little problem. Chalk one up for microsoft, I was using doublespace and
|
|||
|
lo-and-behold all my data got scrambled. Scary sight to see about 200 megs
|
|||
|
worth of the latest information just go POOF. But I am sure all the people on
|
|||
|
the net have experienced this once before. So the week before my computer was
|
|||
|
brought in by the FBI, I created a new key that I never got to use. As you all
|
|||
|
know, that every time you make a new key, you can make sure that it will be
|
|||
|
original unlike DES standard which is a rather fixed algorithm.
|
|||
|
|
|||
|
3 - FBI/NSA read the RSA encrypted data.
|
|||
|
|
|||
|
A: This couldn't be farther from the truth, all the data on my HD was from a
|
|||
|
backup over 3 months old. When they did get around to trying to disect (sic)
|
|||
|
my hard drive they weren't able to read it. Not that there was much to read
|
|||
|
anyway. The key that they did find couldn't open that file even if it wanted
|
|||
|
to. Since PGP requires 2 keys, and since I just created my new PGP key the
|
|||
|
week before, they weren't anble to read jack shit. Also chalk another one up
|
|||
|
for NORTON UTILITIES. They weren't able to read my DISKREET directory with DES
|
|||
|
running. You are right though, the FBI is running under a very tight budget
|
|||
|
and the NSA doesn't have any real jurisdiction because none of what I did
|
|||
|
compromised NATIONAL SECURITY. If anyone wants to read the report, please mail
|
|||
|
me an address to the one I will provide at the end of this message and I will
|
|||
|
try to send you one as soon as possible. It is to laugh...:)
|
|||
|
|
|||
|
4 - My conviction was because I was a hacker.
|
|||
|
|
|||
|
A: This again is only 50% true, I really am here for Theft and not all because
|
|||
|
of HACKING. There wasn't enough to get me a reasonalbe long sentence so they
|
|||
|
nailed me on theft charges. If anything, the amount of 'Hacking' which was
|
|||
|
actually 'Phreaking' since there weren't any computers involved. Wait, I take
|
|||
|
that back. Let me go over my conviction.
|
|||
|
|
|||
|
Count 1: Theft of Government Property - How they caught me: Narc
|
|||
|
Count 2: Fradulent use of an Access Device - How they caught me: Narc
|
|||
|
Count 3: Fradulent use of a Computer - How they caught me: questionable
|
|||
|
Count 4: Fradulent use of an Access Device - How they caught me: Narc
|
|||
|
|
|||
|
Now, the count 3, supposedly I hacked into a place called Tera and erased
|
|||
|
these guys desk top. Then they changed their story and said that it was MOVED,
|
|||
|
not ERASED. But then they went on and said I went in 13 times. Then they
|
|||
|
changed their story again and said that there were only 3 entries and 13
|
|||
|
attempts. ATTEMPTS DONT COUNT PEOPLE! Then they changed it again and said they
|
|||
|
don't know who did it 2 times, but they could only actually track me 1 time.
|
|||
|
Just like I told the court all the time.
|
|||
|
|
|||
|
Being in prison, you get to learn about the law since you got time to kill.
|
|||
|
There are people using what I call randomizer chips for cellular phones that
|
|||
|
are able to beat the rap see US v. McNutt on this one. I also congradulate you
|
|||
|
on giving a very good location as to where I am. You mention 'the birdman of
|
|||
|
Lompoc.' Well, I never mentioned where I was sent to anyone but my friends and
|
|||
|
family. Congrats, I live across the street from the 'Birdman of Lompoc'. He is
|
|||
|
in the USP and I am in the PCI across the street to I recently just read 'The
|
|||
|
Falcon and the Snowman' and was able to see how the snowman was able to
|
|||
|
escape.
|
|||
|
|
|||
|
The government is very fucked folks. If I were you, I would keep reading for
|
|||
|
some more of my posts from prison. I can only hope Phiber Optik is doing the
|
|||
|
same on the east coast that I am doing here.
|
|||
|
|
|||
|
I won't mention names of the Narc like Magpie and Equalizer or anyone like
|
|||
|
that :) but I can only say one thing, Keep it alive folks because it gov't is
|
|||
|
out there and they want to fuck you.
|
|||
|
|
|||
|
Phil Zimmerman, Say 'Hi' from me to all the guys at TNO that host the little
|
|||
|
shindig you did a few months back.
|
|||
|
|
|||
|
Catch ya on the Flipside... (signed) John Falcon
|
|||
|
|
|||
|
Well there you have it.. the story straight from the horses mouth. JF is a
|
|||
|
great guy and I was sorry to see him go down (along with the rest of my
|
|||
|
friends). The busts have completely changed TNo. We now take precautions that
|
|||
|
would make the NSA envious. We encrypt everything, never discuss 'info' over
|
|||
|
the phone, and have destroyed all physical evidence (notebooks, trash, ect.)
|
|||
|
I suggest that YOU take take these same precautions. Also, always, ALWAYS
|
|||
|
divert. Phone records are always used in cases like this, so make sure that
|
|||
|
your phone calls bounce through a few systems before they hit your intended
|
|||
|
target.
|
|||
|
|
|||
|
If you would like to get in contact with JF, here is his info:
|
|||
|
|
|||
|
email: jfalcon@ice_bbs.alaska.net
|
|||
|
|
|||
|
snailmail: Don Fanning
|
|||
|
#12617-006
|
|||
|
3600 Guard Road
|
|||
|
Lompoc, CA 93436
|
|||
|
|
|||
|
Please don't send him any 'things', though letters are very welcome. Don't
|
|||
|
send him books, but photocopies of non-criminal material would make him very
|
|||
|
happy. At least let him know that he is not forgotten.
|
|||
|
|
|||
|
|>ead|<at
|
|||
|
-=[TNo]=-
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Table of Contents
|
|||
|
~~~~~~~~~~~~~~~~~
|
|||
|
1. Introduction...........................................DeadKat
|
|||
|
2. The Stealth-Combo Box..................................DeadKat
|
|||
|
3. RETAiL SKAMMiNG II.....................................DisordeR
|
|||
|
4. Gopher Holes...........................................Rage(303)
|
|||
|
5. Internet Outdial List 3.0..............................Cavalier/DisordeR
|
|||
|
6. Notes on Unix Password Security........................Voyager
|
|||
|
7. Frequently Called AT&T Organizations...................ThePublic/DeadKat
|
|||
|
8. Revenge Database 1.3...................................DisordeR
|
|||
|
9. Conclusion.............................................DeadKat
|
|||
|
|
|||
|
|
|||
|
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)\
|
|||
|
(*) (*)\|
|
|||
|
(*) |>ead|<at (*)\|
|
|||
|
(*) presents (*)\|
|
|||
|
(*) (*)\|
|
|||
|
(*) The Stealth Combo Box (*)\|
|
|||
|
(*) (*)\|
|
|||
|
(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)(*)\|
|
|||
|
\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Ever since the original Rat Shack Red Box mod was printed in 2600 Magazine,
|
|||
|
there has been an explosion in red box use. Red boxing is still one of the
|
|||
|
primary topics of discussion on alt.2600 years later. The Radio Shack Tone
|
|||
|
Dialer mod was one of the first boxes I ever built and has proven to be the
|
|||
|
most useful of all the boxes I've experimented with.
|
|||
|
|
|||
|
For years, though, I've played with the original design in order to improve
|
|||
|
it. My favorate variation of the original plans is what I call the Stealth-
|
|||
|
Combo box. It is based on the original design, but makes use of mercury
|
|||
|
switches to allow the use of both DTMF's and ACTS tones. In other words it
|
|||
|
combines the functions of the red and white boxes.
|
|||
|
|
|||
|
The reason its called 'stealth' is the fact that when the dialer is held in
|
|||
|
its normal position, it will produce touchtones as if it were un-modded.
|
|||
|
When held 'upside-down' it is capable of producing tones similar to the
|
|||
|
Bell ACTS tones that emulate a quarter being dropped into a payphone. This
|
|||
|
design not only gives you both features, but leaves the box looking and
|
|||
|
seemingly acting 'normal'.
|
|||
|
|
|||
|
Following are the complete steps to building the Stealth-Combo box that I
|
|||
|
demonstrated at the Denver 2600 meetings. These instructions assume that
|
|||
|
you have some experience working with electronics. If you don't, pracitice
|
|||
|
a bit before you go cutting up your $30 tone dialer.
|
|||
|
|
|||
|
Parts List
|
|||
|
~~~~~~~~~~
|
|||
|
One (1) Radio Shack 33-Memory Tone Dialer (Cat. No. 43-146)
|
|||
|
Two (2) Radio Shack Experimenter's Mercury Bulb Switches (Cat. No. 275-040)
|
|||
|
One (1) 6.50 Mhz Sub-Miniature Crystal (Don't use 6.5536, its too big)
|
|||
|
Three (3) AAA batteries
|
|||
|
Solder
|
|||
|
Stranded insulated wire no larger than 22 gauge
|
|||
|
Electrical Tape
|
|||
|
|
|||
|
Recommended Tools
|
|||
|
~~~~~~~~~~~~~~~~~
|
|||
|
Soldering Gun of 20 watts or less
|
|||
|
Small Philips Scewdrivers
|
|||
|
Needle Nose Pliers
|
|||
|
Wire Strippers
|
|||
|
Wire Cutters
|
|||
|
Exacto Knife
|
|||
|
Epoxy or super glue
|
|||
|
|
|||
|
Schematics
|
|||
|
~~~~~~~~~~
|
|||
|
The following schematics shows the concept of how the switches work, not how
|
|||
|
its supposed to look.
|
|||
|
|
|||
|
|
|||
|
+ @----------------------+-------------------+ C1,2 = Crystals
|
|||
|
| | S1,2 = Switches
|
|||
|
- @---------+-------------------+ | (The switches are
|
|||
|
| | | | orientated in
|
|||
|
| +----+ +---+ | +----+ +---+ opposite directions)
|
|||
|
_|_|_ _|_|_ _|_|_ _|_|_
|
|||
|
| S1 | | C1 | | S2 | | C2 |
|
|||
|
|____| |____| |____| |____|
|
|||
|
|
|||
|
Since this diagram doesn't explain shit, on to the steps to build the thing.
|
|||
|
|
|||
|
Steps
|
|||
|
~~~~~
|
|||
|
1. Remove the 6 screws securing the back of the Tone Dialer to the front.
|
|||
|
Four of the screws are underneath the battery cover.
|
|||
|
|
|||
|
2. Gently pry off the back being careful not to break the four wires that
|
|||
|
connect the speaker to the circuit board. Lay the back cover to the side
|
|||
|
of the dialer. You should now be looking onto the back of the dialer's
|
|||
|
circuit board.
|
|||
|
|
|||
|
3. Locate the original crystal (silver cylinder) on left side of the circuit
|
|||
|
board. Carefully cut the crystal off the circuit board as close to board as
|
|||
|
possible. Use needle nose pliers to pull the crystal loose as it is held in
|
|||
|
place with rubber cement. Be careful not to crush the crystal!
|
|||
|
|
|||
|
4. Measure out 2 pieces of wire that are long enough to go from the
|
|||
|
original crystal solder points, around the edge of the dialer, to a point
|
|||
|
on the lower right side of the circuit board. Solder one end of the wire
|
|||
|
to the lower original crystal solder point and the other end to a lead on
|
|||
|
the original crystal (keep the leads on the crystals as short as possible).
|
|||
|
Solder the other wire to the other lead on the crystal but _not_ to the
|
|||
|
circuit board. Leave it hanging for now. Use tape to insulate the crystal's
|
|||
|
leads.
|
|||
|
|
|||
|
5. Route the wires around the edge of the circuit board on the _underside_ of
|
|||
|
the circuit board. You may have to remove the circuit board to route this
|
|||
|
sucessfully. The circuit board is held in place by 6 philips screws down the
|
|||
|
middle of the board. Glue or tape the crystal into place on the lower right
|
|||
|
side of the circuit board on the underneath side (the keypad side). This
|
|||
|
will leave us more room on the circuit board for the swithches.
|
|||
|
|
|||
|
6. Locate four green capacitors on left edge of the circuit board. Cut off
|
|||
|
the second one from the bottom as close to the circuit board as possible.
|
|||
|
Important! Make note of which lead on the capacitor went to which solder
|
|||
|
point. Unlike crystals, capacitors are directional and if you reverse the
|
|||
|
current, it will fry.
|
|||
|
|
|||
|
7. Glue or tape the capacitor to the empty spot on the upper right side of
|
|||
|
the circuit board next to the LED.
|
|||
|
|
|||
|
8. Solder wires from the leads on the capacitor to the original solder points
|
|||
|
of the capacitor. Run the wires along the edge of the circuit board and
|
|||
|
insulate the capcitor's leads with tape. You have now moved the capacitor and
|
|||
|
made room for the first switch.
|
|||
|
|
|||
|
9. Glue or tape the first switch on the left side of the circuit board
|
|||
|
where the capacitor used to be. Carefully push the upper two green
|
|||
|
capacitors to the right to help make room for the first switch. Orientate
|
|||
|
the switch's leads down.
|
|||
|
|
|||
|
10. Solder the free end of the wire that runs to the original crystal
|
|||
|
to one of the leads on the mercury switch. Solder a wire from the other lead
|
|||
|
of the mercury switch to the upper solder point of the original crystal. The
|
|||
|
circuit should now go from the upper solder point through the switch to
|
|||
|
the original crystal and back to the lower solder point.
|
|||
|
|
|||
|
11. Test your work by putting the batteries in the dialer holding the slide
|
|||
|
switch which turns on the dialer in the on posistion. The LED _should_ come
|
|||
|
on. If it doesn't, check your work. Make sure that the circuit is complete
|
|||
|
and the leads aren't grounding on anything. Hold the dialer in an upright
|
|||
|
position while holding the switch on and press some buttons. You should
|
|||
|
hear touchtones. If not, make sure you haven't broken any of the wires to
|
|||
|
the speakers.
|
|||
|
|
|||
|
12. Locate the yellow capacitor on the lower right side of the circuit board.
|
|||
|
Gently pry the capacitor loose with needle nose pliers and flip the capacitor
|
|||
|
over. Insulate the leads of the capacitor with tape so that it doesn't come
|
|||
|
in contact with the resistors which it is now partially laying on. This will
|
|||
|
leave a nice open spot on the circuit board for the rest of our mods.
|
|||
|
|
|||
|
13. Look at the back cover of the dialer. You will notice that on the lower
|
|||
|
left side of the back cover is some space about the size of a crystal. How
|
|||
|
convenient! Remove the small screen on the lower left side that covers a
|
|||
|
small opening in the cover.
|
|||
|
|
|||
|
14. Glue the new crystal into the spot where the screen was with the leads
|
|||
|
facing out. The crystal will stick out the hole a little bit, but that won't
|
|||
|
hurt anything.
|
|||
|
|
|||
|
15. Glue or tape the mercury switch in the space to the right of it with
|
|||
|
the leads oriented up.
|
|||
|
|
|||
|
16. Solder wire from the new crystal to one of the leads of the mercury
|
|||
|
switch. Solder a wire from the other lead of the new crystal to the lower
|
|||
|
solder point of the original crystal. Make the wire to the solder point
|
|||
|
as short as possible with the case open. Insulate the leads with tape.
|
|||
|
|
|||
|
17. Solder a wire from the remaining lead on the second mercury switch to
|
|||
|
the upper solder point of the original crystal.
|
|||
|
|
|||
|
18. Test your dialer once more. This time hold the switch in the on position
|
|||
|
while the dialer is upside down and press the keys. You should here the
|
|||
|
touch-tones in a much higher key now.
|
|||
|
|
|||
|
19. If everything has tested out, then close up the box. This is probably
|
|||
|
the most difficult step of all. You must have the mercury switches located
|
|||
|
just right, or it won't close. Also you must place the wires which run from
|
|||
|
the back cover away from the the components in order to optimize space.
|
|||
|
Carefully close the box, but be warned, it takes quite a bit of pressure to
|
|||
|
get the box closed. You may want to have a friend help you hold it closed
|
|||
|
while you screw the screws back in. You may break a switch or two before
|
|||
|
you get it right. Be very careful with any spilled mercury since as Karb0n
|
|||
|
once told me, "Dude! That shit will make you go insane!" You must get the
|
|||
|
case closed all the way, or the on switch will not make contact. This step
|
|||
|
can be very frustrating, but once you get it closed _and_ working, don't
|
|||
|
ever open it again!
|
|||
|
|
|||
|
Programming the Stealth-Combo Box
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
To program the box, hold it in an upright position with it on and the second
|
|||
|
switch in the store position. Now follow these steps to program in quarter
|
|||
|
tones:
|
|||
|
|
|||
|
1. Press the memory button
|
|||
|
2. Press the star key 5 times
|
|||
|
3. Press the memory button again
|
|||
|
4. Press the P1 button
|
|||
|
5. Repeat these steps for the other Priority buttons
|
|||
|
|
|||
|
Switch it back to 'dial' and hold it upside down. Push the P1 button and you
|
|||
|
should hear a 5 quick beeps that sound much like a quarter being dropped in
|
|||
|
a payphone.
|
|||
|
|
|||
|
Using the Stealth-Combo Box
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
After building the thing, you should have a very good idea of how it operates.
|
|||
|
If you have never used a red box before, consult CoTNo #01, article 6 for
|
|||
|
detailed instructions on using it.
|
|||
|
__________________________________________________________________________
|
|||
|
(C)opywrong 1994, DeadKat Inc.
|
|||
|
All wrongs denied.
|
|||
|
|
|||
|
|
|||
|
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
RETAiL SKAMMiNG II
|
|||
|
------------------
|
|||
|
by DisordeR[TNo]
|
|||
|
|
|||
|
|
|||
|
Y0y0y0
|
|||
|
|
|||
|
This is my greeting to all you out there in white bread land. More
|
|||
|
retail type scams for you to enjoy. Like usual these are for educational
|
|||
|
purposes. These are designed to show you that everything is a system.
|
|||
|
Hacking root on unix, hacking a cell network, or hacking the social
|
|||
|
system, it is all the same. Ponder on that after this article.
|
|||
|
|
|||
|
Free Car Repair
|
|||
|
---------------
|
|||
|
|
|||
|
Driving down the road, your call stalls out. You later find out
|
|||
|
that you have several hundred dollars in car repairs to come. 'This is
|
|||
|
lame' you say. This is the solution...
|
|||
|
|
|||
|
Go to a Firestone or Midas or other chain car repair place that
|
|||
|
can be found anywhere. Go early in the morning. Most of these places
|
|||
|
will open at 7am or so since they hit the yuppie fucks who want to drop
|
|||
|
their car off, go to work, and pick it up on their lunch break. Tell them
|
|||
|
what is wrong, let them tell you what they think is the problem etc.
|
|||
|
Just play it cool, and keep saying you HAVE to have it fixed because you
|
|||
|
have to go somewhere important like court or out of town. When they ask
|
|||
|
"what time do you need this by?" You respond "12:00 and preferrably no
|
|||
|
later." This gives them about 5 hours(which most car repairs can be done
|
|||
|
in) to fix your car. They will usually say that is fine since you will
|
|||
|
be the first or second repair if you are there that early.
|
|||
|
First thing. Leave them the ignition key and NO door key. Tell them
|
|||
|
that you lost your door key, and to leave it unlocked as you have nothing
|
|||
|
valuable in it. Make sure you do not sound nervous and that it sounds like
|
|||
|
you really did lose your door key. Sign all the paperwork they want you to
|
|||
|
with bullshit info. When they ask for a number to call you at, say you
|
|||
|
will be away from the office/home and will just come back at noon, and that
|
|||
|
they are authorized to do ANY repair needed. If they insist, give them
|
|||
|
one of those numbers which always ring busy (see #Hack FAQ).
|
|||
|
Enjoy your morning. Do whatever you want and get ready for the
|
|||
|
next step.
|
|||
|
Scope out the repair place. Around noon the place should be quite
|
|||
|
busy with people reparing cars, new customers coming in, and morning
|
|||
|
customers picking up their cars. Now, since your doors are not locked,
|
|||
|
go to your car, use your second ignition key, get in, drive off happy
|
|||
|
knowing that you ripped off some company that has about 250% markup on
|
|||
|
parts, and overpriced labor charges. Free repairs to your car. Only
|
|||
|
catch is you don't go back to the same place...but since there are a ton
|
|||
|
of Firestone's and Midas repair shops around, no problem. Of course they
|
|||
|
put your tags down on their paper work so stolen plates wouldn't hurt!
|
|||
|
|
|||
|
|
|||
|
Free Diverters
|
|||
|
--------------
|
|||
|
|
|||
|
Ever find yourself devoting all your time to scanning for a new
|
|||
|
diverter of some kind? Praying that you will stumble on some decnet,
|
|||
|
meridian, or other diverter? Create your own.
|
|||
|
|
|||
|
Most places that offer voice mail are ideal for you. Independent
|
|||
|
voice mail owners really don't have a clue about phreaking, diverting,
|
|||
|
or anything of that nature. Look in your yellow pages under 'voice mail'
|
|||
|
and find some places that offer this service. Don't choose a place like
|
|||
|
AT&T or USWorst or something since they are a little more keen on the
|
|||
|
fraud thang.
|
|||
|
Call the place up and ask questions about their voice mail service.
|
|||
|
Ask normal questions like 'Do I have my own number?', 'How many messages
|
|||
|
will it store?", or "Does it have paging service?". Sometime during these
|
|||
|
questions, ask if it has a dialout feature. If it does, you are in luck.
|
|||
|
If it doesn't, choose another place.
|
|||
|
If the place has dialout service, this is the place for you. Now
|
|||
|
ask about their billing. What you want to find out is if they can do auto
|
|||
|
billing to a credit card, or if they bill an address. Either way, you should
|
|||
|
be fine. If they do it all by credit card, then choose that. Use your
|
|||
|
friend's credit card (with his consent of course). Have the place bill
|
|||
|
that credit card at the end of each month. If they bill and address, then
|
|||
|
tell them your address(probably a neighbor's house since you are never home)
|
|||
|
and you are set. After all that is arranged, you should have a voice mail
|
|||
|
box, with dialout feature. Since everything is in your friend's name(since
|
|||
|
you work so much and are hard to reach), you shouldn't get hassled too much.
|
|||
|
Rememeber, if you use the dialout feature for any reason, make sure
|
|||
|
you use it for no more than three weeks, in case your 'friend' gets the bill
|
|||
|
and is cross with you. If he is, set up another with a different friend's
|
|||
|
credit card number.
|
|||
|
|
|||
|
The Rat Shack Discount
|
|||
|
----------------------
|
|||
|
|
|||
|
How many of you shop at rat shack for any reason? Need a new tone
|
|||
|
dialer since yours got stepped on? Need some more solder for creating that
|
|||
|
new box? Like getting discounts just for the hell of it? This is your place.
|
|||
|
|
|||
|
Background. Tandy Corporation owns radio shack. They also own some
|
|||
|
other stores as well, making them a pretty big company. One of the things
|
|||
|
you get when working at ANY Tandy store is a discount at all the others.
|
|||
|
Most people don't realize this, but Computer City is owned by Tandy as well.
|
|||
|
Since Tandy treats their employees like total shit, this is your chance to
|
|||
|
take a little out of them on each purchase. Take into account that since
|
|||
|
Rat Shacks litter the country, they have a virutal monopoly on small
|
|||
|
electronic parts. Thus, they can get away with unbelievable mark ups on
|
|||
|
their items. Thus, ripping the customer off.
|
|||
|
Go into radio shack. Get whatever you want, and take it up to the
|
|||
|
counter. Tell them that you work for Computer City and get your employee
|
|||
|
discount. Most Rat Shack employees will know about Computer City being in
|
|||
|
the chain, but know nothing else about it. From there they will ask what
|
|||
|
discount you recieve. According to Tandy, you get 10% off at all Rat Shacks
|
|||
|
if you work at Computer City. So make sure you say 10% (If you said 25% or
|
|||
|
something, they probably wouldn't question you though). 100% of the time
|
|||
|
that friend's have used this, they have NOT checked to see if it is true.
|
|||
|
So now you can but whatever you want at a decent discount. 10% may not seem
|
|||
|
like a big discount but look at it this way. 10% is more than your tax rate.
|
|||
|
So at the least you are taking a little money from the government. At most
|
|||
|
you are taking 10% from Tandy Corporation which really deserves to rot in
|
|||
|
hell. The ONLY thing they have brough us is a single place where you can
|
|||
|
buy anything you need for your phreaking desires.
|
|||
|
When you purchase the items they will ask you for two pieces
|
|||
|
of information. First, your store number. If you don't know a computer
|
|||
|
city store number you can do one of two things. Call your local
|
|||
|
Computer City (If they have one in your area), ask for customer service,
|
|||
|
and just ask "What is your store number?". They will usually tell you without
|
|||
|
a question. OR, you can use this one: 29-5260. That is the store number
|
|||
|
for the Computer City in Denver, CO. The format for their store codes is
|
|||
|
29-5XXX with it usually being either 52XX or 51XX depending on the region.
|
|||
|
The second thing they will ask you for is your social security number.
|
|||
|
The only thing to remember here is that they begin with a number between
|
|||
|
2-5. So don't say "866-69-1010" or something. Also remember the number you
|
|||
|
use in case the person is a gimp and doesn't type it in right, and has to
|
|||
|
ask you again.
|
|||
|
|
|||
|
Free New Car Engine
|
|||
|
-------------------
|
|||
|
|
|||
|
Deadkat made me aware of this one, and it is quite nice.
|
|||
|
Jiffy Lube offers a guarantee on their work that goes something like
|
|||
|
this: They will repair/replace any damaged piece/component of your
|
|||
|
car that is damaged due to their work.
|
|||
|
|
|||
|
Go do their spiffy 10 minute oil change at a distant Jiffy Lube.
|
|||
|
After they are done, pay and drive off. A little ways down the road
|
|||
|
pull over somewhere where you can't be seen, and get under your car. Loosen
|
|||
|
or remove the oil pan drain plug. Whatever it takes to make oil drip out
|
|||
|
or leak. Keep driving as the oil drains. After a while your engine will
|
|||
|
overheat, and probably seize. Bingo. Their faulty workmanship caused
|
|||
|
your engine to blow up. Have your car towed back to the Jiffy Lube and
|
|||
|
demand to see their manager. Tell them you were driving down the road
|
|||
|
enjoying life, and your engine blew up and you don't know why. Tell them
|
|||
|
you just came from there hours earlier, and want them to look at it and
|
|||
|
find out what is wrong.
|
|||
|
Through persistance and social engineering, you should be able to
|
|||
|
convinve him(since they will find the reason it happened quite easily)
|
|||
|
that they fucked up and you suffered. Although this is a little more
|
|||
|
hardcore, it can pay off quite well, especially if you have an old piece
|
|||
|
of shit for a car.
|
|||
|
|
|||
|
|
|||
|
Free Books
|
|||
|
----------
|
|||
|
|
|||
|
Find the company that publishes the book you want. Call them up.
|
|||
|
Here is an example of what you would say.
|
|||
|
|
|||
|
"Hi. My name is Hank Poecher and I am teaching a class on _________
|
|||
|
at __________ College (Highschool). I would like to get a review copy of your
|
|||
|
book called 'Eye kAn hAcK!@#!". The ISBN number is 3038661010."
|
|||
|
|
|||
|
Usually they will be more than glad to send you a copy as
|
|||
|
it will be bought by every student, and spread more. If they would
|
|||
|
like to charge you, just mention the above fact. Many computer related
|
|||
|
or school type books are getting pretty expensive, so this comes in
|
|||
|
handy.
|
|||
|
|
|||
|
Free Software II
|
|||
|
----------------
|
|||
|
|
|||
|
Even though I mentioned one way to get software, this method
|
|||
|
is ideal for those bigger software packages out there. This is a sample
|
|||
|
conversation you can use. Call up the company who makes/distributes
|
|||
|
the software...
|
|||
|
|
|||
|
"Hi there, my name is Chester Karma and I am authoring a new
|
|||
|
book called 'Business Software for the PC' and would like to review your
|
|||
|
product. Could you send me a copy of your package please?"
|
|||
|
|
|||
|
Usually they are willing, but sometimes there are two objections
|
|||
|
to this, or two catches. Sometimes they will want the request in writing.
|
|||
|
This is not a problem. Just write out a letter telling them exactly what
|
|||
|
they want to hear. Since you are not doing anything in illegal, send it
|
|||
|
to your house. They will not do anything since the potential for a good
|
|||
|
review in a major book is a wet dream to them. Sometimes they will ask
|
|||
|
who your publisher is, and you can drop any name to a MAJOR publisher,
|
|||
|
or mention that you aren't sure yet, or that you are self published.
|
|||
|
In any case, just sound convincing.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
DisordeR[TNo]
|
|||
|
|
|||
|
Any questions, call me vox at 301.688.6311 and ask for 'Director of Ops'
|
|||
|
That is my work number, so call during business hours please.
|
|||
|
|
|||
|
|
|||
|
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|\_/| Gopher Holes |\_/|
|
|||
|
.' o o\ Brought to you by /o o `.
|
|||
|
_--~~~/ ._ o}~~--_ Rage-303 _--~~{o _. \~~~--_
|
|||
|
( ( . .\|| ) -------- ( ||/. . ) )
|
|||
|
~--___`-' `-'____--~ ~--____`-' `-'___--~
|
|||
|
~~~~~~~ ~~~~~~~
|
|||
|
|
|||
|
|
|||
|
The Intro and What a Gopher Hole is
|
|||
|
-----------------------------------
|
|||
|
This article will tell a little about Gophers, but will be mostly be
|
|||
|
directed on one thing they have that will let you access almost anything
|
|||
|
through them. Totaly anonymous.
|
|||
|
|
|||
|
A Gopher Hole is when a Gopher System tries to telnet you to another
|
|||
|
system but that system is laged to hell, or doesn't exist anymore. So
|
|||
|
the gopher will give you an error and defualt back to the telnet prompt
|
|||
|
allowing you to Telnet anywhere you want, Fake Mail, Outdials, Hacking
|
|||
|
Systems, Anon IRC Services all totaly anonymous.
|
|||
|
|
|||
|
About Gophers and How to find Gopher Holes
|
|||
|
------------------------------------------
|
|||
|
|
|||
|
A Gopher is a somthing that will let you have access to certain
|
|||
|
information and utilities without having to have an account somewhere.
|
|||
|
You can do many things from looking though Phone Books to FTPing.
|
|||
|
|
|||
|
Finding a Gopher Hole is easy. All you need is a number to a Gopher in
|
|||
|
your area code that you can dial anytime you want, just ask around on
|
|||
|
local BBSes or something like that. Once you dial it up and login you
|
|||
|
will usally be presented with a sceen similar to the following.
|
|||
|
|
|||
|
Internet Gopher Information Client 2.0 pl10
|
|||
|
|
|||
|
Online Auraria Shared Information Service
|
|||
|
|
|||
|
--> 1. Information About BOARDNAME/
|
|||
|
2. Local Campus/
|
|||
|
3. Local Library/
|
|||
|
4. Local Media Center/
|
|||
|
5. Community College of Bolivia/
|
|||
|
6. Metropolitan State College of Denmark/
|
|||
|
7. University of Colorado at BFE/
|
|||
|
8. Information Beyond Auraria including Other Colorado Info Systems/
|
|||
|
9. Interesting Things to Explore on the Internet (under construction)/
|
|||
|
10. BoardName Statistics/
|
|||
|
|
|||
|
The top line is the Gopher Software/Version they are running the Gopher
|
|||
|
off of. The next line is the Menu you are on. If it is the first/main
|
|||
|
menu then it will be the Gopher info (like above). The arrow
|
|||
|
(-->) shows what you have selected, you can move it up and down with the
|
|||
|
arrow keys. There are four things in a Gopher to take note of,
|
|||
|
Directories, Telnets, Files and Word Serches. All of the above options are
|
|||
|
Directories, you can see this because they have a forward slash (/)
|
|||
|
after the option. You select options by moving the arrow to it and
|
|||
|
hitting return, or pressing the corresponding number.
|
|||
|
|
|||
|
Internet Gopher Information Client 2.0 pl10
|
|||
|
|
|||
|
Information Beyond Auraria including Other Colorado Info Systems
|
|||
|
|
|||
|
--> 1. Academe this Week (Chronicle of Higher Education)/
|
|||
|
2. Archie Gateway (FTP Searches)/
|
|||
|
3. CULine <TEL>
|
|||
|
4. Colorado Legislative Database (CLD) <TEL>
|
|||
|
5. Colorado Legislative Information (Higher Education Issues)/
|
|||
|
6. FEDIX/MOLIS/
|
|||
|
7. Hytelnet/
|
|||
|
8. Library of Congress (LC MARVEL)/
|
|||
|
9. Other Gophers (by geographic location)/
|
|||
|
10. Other Gophers (by subject)/
|
|||
|
11. Other Gophers in Colorado/
|
|||
|
12. Phonebooks/
|
|||
|
13. UMS/IRM Gopher/
|
|||
|
14. United Nations/
|
|||
|
15. University of Minnesota Gopher/
|
|||
|
16. WAIS Gateway/
|
|||
|
|
|||
|
This is the menu we get after selecting option 8. As you can see now we
|
|||
|
have some <TEL> options. As an idiot could have guessed that means when
|
|||
|
you select it you will be telneted somewhere else. This is what we get
|
|||
|
after selecting 7, then 1 (selecting a <TEL> command).
|
|||
|
|
|||
|
+-------------------Connect to Hytelnet-------------------+
|
|||
|
| |
|
|||
|
| Warning!!!!!, you are about to leave the Internet |
|
|||
|
| Gopher program and connect to another host. If |
|
|||
|
| you get stuck press the control key and the |
|
|||
|
| ] key, and then type quit |
|
|||
|
| |
|
|||
|
| Connecting to oasis.denver.colorado.edu using telnet. |
|
|||
|
| |
|
|||
|
| Use the account name "hytelnet" to log in |
|
|||
|
| |
|
|||
|
| [Cancel: ^G] [OK: Enter] |
|
|||
|
| |
|
|||
|
+---------------------------------------------------------+
|
|||
|
|
|||
|
This tells us it is going to telnet us, where its going to telnet us to,
|
|||
|
and the login name to use. So we hit enter and go through the login
|
|||
|
process to see this..
|
|||
|
|
|||
|
Welcome to HYTELNET version 6.7
|
|||
|
May 14, 1994
|
|||
|
What is HYTELNET? <WHATIS>
|
|||
|
Library catalogs <SITES1>
|
|||
|
Other resources <SITES2>
|
|||
|
Help files for catalogs <OP000>
|
|||
|
Catalog interfaces <SYS000>
|
|||
|
Internet Glossary <GLOSSARY>
|
|||
|
Telnet tips <TELNET>
|
|||
|
Telnet/TN3270 escape keys <ESCAPE.KEY>
|
|||
|
Key-stroke commands <HELP>
|
|||
|
.............................................................
|
|||
|
Up/Down arrows MOVE Left/Right arrows SELECT ? for HELP anytime
|
|||
|
m returns here i searches the index q quits
|
|||
|
.............................................................
|
|||
|
HYTELNET 6.7 was written by Peter Scott
|
|||
|
E-mail address: aa375@freenet.carleton.ca
|
|||
|
Unix and VMS software by Earl Fogel
|
|||
|
|
|||
|
Basicaly this is one big Telnet system that will take you to other
|
|||
|
Gophers, Free Nets, Fee Based Systems (like Delphi and Prodigy$@!) and
|
|||
|
other info systems. If you can get to hytelnet you are in luck. From
|
|||
|
here you can go to almost any Gopher System looking for holes (All the
|
|||
|
good stuff is in <SITES2>).
|
|||
|
|
|||
|
Internet Gopher Information Client v1.12S
|
|||
|
|
|||
|
EcoGopher!
|
|||
|
|
|||
|
--> 1. Welcome to the EcoGopher Project at the University of Virginia!/
|
|||
|
2. Connect to the U.Va. Resource Tracking System!/
|
|||
|
3. Environmental Groups and Programs/
|
|||
|
4. Archives of Environmental Electronic Mailing Lists/
|
|||
|
5. The Library/
|
|||
|
6. Other Gopher-accessible services/
|
|||
|
7. Katie - Keyword-search of All Text In EcoSystems <?>
|
|||
|
8. Environmental CHAT Areas!/
|
|||
|
9. :-) :-) :-) :-) :-) :-) :-) :-) :-) :-) :-) :-) :-) :-) :-) :-).
|
|||
|
10. EcoLynx - access to the World Wide Web of Hyper-text! <TEL>
|
|||
|
|
|||
|
I am showing you this menu because it has all 4 options on it. You can
|
|||
|
see the Directories marked with "/", then Telnets marked with "<TEL>",
|
|||
|
the Word Serches marked with "<?>" and the files marked with "." (BTW,
|
|||
|
That file is one HUGE Ascii Galary, you can access EcoGopher through
|
|||
|
Hytelnet). Now, the first thing we would do when we found this menu is
|
|||
|
select option 10. If it telnets to EcoLynx (which it does) then you have
|
|||
|
two option. You can either roam around EcoLynx looking for Gopher Holes
|
|||
|
(which would be useless since WWW doesn't have Gopher Holes), or you can
|
|||
|
quit back to EcoGopher and search the rest of that before moving on (that
|
|||
|
what I sugest you do). If we select the following options, (";"=Enter)
|
|||
|
6;2;4;12;7;, we will get this.
|
|||
|
|
|||
|
+------------------------IRC Server--------------------------+
|
|||
|
| |
|
|||
|
| Warning!!!!!, you are about to leave the Internet |
|
|||
|
| Gopher program and connect to another host. If |
|
|||
|
| you get stuck press the control key and the ] key, |
|
|||
|
| and then type quit |
|
|||
|
| |
|
|||
|
| Connecting to ircd.deamon.co.uk, port 6666 using telnet. |
|
|||
|
| |
|
|||
|
| Use the account name "irc" to log in |
|
|||
|
| |
|
|||
|
| [Cancel: ^G] [OK: Enter] |
|
|||
|
| |
|
|||
|
+------------------------------------------------------------+
|
|||
|
|
|||
|
Trying 158.152.1.65 ...
|
|||
|
telnet: connect: Connection refused
|
|||
|
telnet>
|
|||
|
|
|||
|
Bingo, if you get this consider yourself lucky that you now have a
|
|||
|
totaly anonymous Telnet Diverter (now all of you have one if you were
|
|||
|
paying attention to what I was saying and the options I selected). So
|
|||
|
just go through all the Directories on a gopher looking for a <TEL>
|
|||
|
option, and trying it out. Also note that you will have to have telnet
|
|||
|
once already for this to work, otherwise it will defualt back to the
|
|||
|
Gopher since you haven't telneted yet.
|
|||
|
|
|||
|
Note: By the time I got to EcoGopher I had already Telneted twice.
|
|||
|
|
|||
|
Info for 303ers
|
|||
|
---------------
|
|||
|
Two of the numbers to Oasis - 303.893.9440, 303.629.0134.
|
|||
|
Once you connected just press any key and a menu will come up.
|
|||
|
login: oasis
|
|||
|
|
|||
|
The number to Hytelnet - 303.592.7911.
|
|||
|
Once you connected hit enter. I have found out that you cannot log
|
|||
|
into Hytelnet dialing direct anymore because dialing direct puts you
|
|||
|
on "oasis.denver.colorado.edu" but if you telnet is from Oasis you get
|
|||
|
connected to "ccnucd.denver.colorado.edu". Note that these are the
|
|||
|
same addreses as Oasis, this is because they are telneting on
|
|||
|
different ports.
|
|||
|
login: hytelnet
|
|||
|
|
|||
|
Info for Everyone
|
|||
|
-----------------
|
|||
|
Here are some places you can go once you get to a Telnet prompt.
|
|||
|
|
|||
|
IRC Services:
|
|||
|
134.129.123.1 power.ee.ndsu.NoDak.edu (VAX/VMS)
|
|||
|
Username: IRC
|
|||
|
|
|||
|
199.0.65.102 question.tiac.net
|
|||
|
login: irc
|
|||
|
Note: This account has been temporarily disabled.
|
|||
|
|
|||
|
149.156.98.60 student.uci.agh.edu.pl
|
|||
|
login: irc Password: irc 1st=Realname 2nd=Nick
|
|||
|
Note: The above system is lagged to HELL
|
|||
|
|
|||
|
140.113.17.162 4470 gopher.csie.nctu.edu.tw 4470
|
|||
|
login: gopher
|
|||
|
Note: That one says banned from server, then won't let you switch servers.
|
|||
|
|
|||
|
If you get on IRC do a "/who *irc*" to try and find more.
|
|||
|
|
|||
|
The Outro
|
|||
|
---------
|
|||
|
By now you should have a pretty good idea of what a Gopher does, what to
|
|||
|
look for on a Gopher, how to abuse them and some places you can go once
|
|||
|
you get to the telnet prompt. The Gopher Hole I gave out has been up for
|
|||
|
4 months, about 10 people knew of it before this file, and have done many
|
|||
|
things with it. Final greets to DeadKat, DisordeR and Mindscrew <-he made
|
|||
|
me :]
|
|||
|
|
|||
|
|
|||
|
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Internet Outdial List v3.0
|
|||
|
by Cavalier and DisordeR
|
|||
|
|
|||
|
|
|||
|
Introduction
|
|||
|
------------
|
|||
|
There are several lists of Internet outdials floating around the net these
|
|||
|
days. The following is a compilation of other lists, as well as v2.0 by
|
|||
|
DeadKat(CoTNo issue 2, article 4). Unlike other lists where the author
|
|||
|
just ripped other people and released it, we have sat down and tested
|
|||
|
each one of these. Some of them we have gotten "Connection Refused" or
|
|||
|
it timed out while trying to connect...these have been labeled dead.
|
|||
|
|
|||
|
|
|||
|
Working Outdials
|
|||
|
----------------
|
|||
|
as of 12/29/94
|
|||
|
|
|||
|
NPA IP Address Instructions
|
|||
|
--- ---------- ------------
|
|||
|
215 isn.upenn.edu modem
|
|||
|
|
|||
|
218 modem.d.umn.edu atdt9,xxxXXXX
|
|||
|
|
|||
|
412 gate.cis.pitt.edu tn3270,
|
|||
|
connect dialout.pitt.edu,
|
|||
|
atdtxxxXXXX
|
|||
|
|
|||
|
413 dialout2400.smith.edu Ctrl } gets ENTER NUMBER: xxxxxxx
|
|||
|
|
|||
|
502 UKNET.UKY.EDU CONNECT KECNET
|
|||
|
@ dial: "OUTDIAL2400 or OUT"
|
|||
|
|
|||
|
602 acssdial.inre.asu.edu atdt8,,,,,[x][yyy]xxxyyyy
|
|||
|
|
|||
|
713 128.143.70.101 connect telnet
|
|||
|
connect hayes
|
|||
|
|
|||
|
713 128.249.27.153 atdt x,xxxXXXX
|
|||
|
|
|||
|
714 modem.nts.uci.edu atdt[area]0[phone]
|
|||
|
|
|||
|
804 ublan.virginia.edu connect hayes, 9,,xxx-xxxx
|
|||
|
|
|||
|
??? 128.200.142.121 atdt x,xxxXXXX
|
|||
|
|
|||
|
??? dialout.cecer.army.mil atdt x,xxxXXXXX
|
|||
|
|
|||
|
|
|||
|
Need Password
|
|||
|
-------------
|
|||
|
|
|||
|
303 129.82.100.64 login: modem
|
|||
|
404 128.140.1.239 .modem8|CR
|
|||
|
415 128.32.132.250 "dial1" or "dial2" or "dialer1"
|
|||
|
514 132.204.2.1 externe,9+number
|
|||
|
703 128.173.5.4 dial2400 -aa
|
|||
|
??? 128.95.55.100 This is an unbroken password
|
|||
|
|
|||
|
|
|||
|
Dead/No Connect
|
|||
|
---------------
|
|||
|
|
|||
|
201 128.112.88.0
|
|||
|
202 modem.aidt.edu
|
|||
|
204 umnet.cc.manitoba.ca "dial12" or "dial24"
|
|||
|
206 dialout24.cac.washington.edu
|
|||
|
215 wiseowl.ocis.temple.edu "atz" "atdt 9xxxyyyy"
|
|||
|
218 aa28.d.umn.edu "cli" "rlogin modem" at "login:"
|
|||
|
type "modem"
|
|||
|
305 128.227.224.27
|
|||
|
307 modem.uwyo.edu/129.72.1.59 Hayes 0,XXX-XXXX
|
|||
|
313 35.1.1.6 dial2400-aa or dial1200-aa or dialout
|
|||
|
402 modem.criegthon.edu
|
|||
|
404 broadband.cc.emory.edu ".modem8" or ".dialout"
|
|||
|
404 emory.edu .modem8 or
|
|||
|
413 dialout.smith.edu
|
|||
|
416 annex132.berkely.edu atdt 9,,,,, xxx-xxxx
|
|||
|
416 pacx.utcs.utoronto.ca modem
|
|||
|
503 dca.utk.edu dial2400 D 99k #
|
|||
|
503 dialout.uvm.edu
|
|||
|
513 r596adil.uc.edu/128.137.33.72
|
|||
|
514 132.204.2.11 externe#9 9xxx-xxxx
|
|||
|
602 dial9600.telcom.arizona.edu
|
|||
|
609 128.119.131.11X (X= 1 - 4) Hayes
|
|||
|
609 129.119.131.11x (x = 1 to 4)
|
|||
|
609 129.72.1.59 "Hayes"
|
|||
|
614 ns2400.ircc.ohio-state.edu "dial"
|
|||
|
614 r596adi.uc.edu
|
|||
|
615 dca.utk.edu "dial2400"
|
|||
|
617 128.52.30.3 2400baud
|
|||
|
617 dialout.lcs.mit.edu
|
|||
|
617 mrmodem.wellesley.edu
|
|||
|
619 128.54.30.1 atdt [area][phone]
|
|||
|
619 dialin.ucsd.edu "dialout"
|
|||
|
713 128.249.27.154 "c modem96" "atdt 9xxx-xxxx"
|
|||
|
or "Hayes"
|
|||
|
714 130.191.4.70 atdt 8xxx-xxxx
|
|||
|
714 modem24.nts.uci.edu
|
|||
|
902 star.ccs.tuns.ca "dialout"
|
|||
|
916 128.120.2.251 connect hayes/dialout
|
|||
|
916 129.137.33.72
|
|||
|
??? 128.112.131.110-114
|
|||
|
??? 128.112.88.1
|
|||
|
??? 128.112.88.2
|
|||
|
??? 128.112.88.3
|
|||
|
??? 128.119.131.11X (1 - 4)
|
|||
|
??? 128.120.59.29 UCDNET <ret> C KEYCLUB <ret>
|
|||
|
??? 128.122.138.226-230 dial3/dial12/dial24
|
|||
|
??? 128.169.200.68 dial 2400 d 99Kxxxxxxx
|
|||
|
??? 128.173.5.4
|
|||
|
??? 128.200.142.3
|
|||
|
??? 128.200.142.5
|
|||
|
??? 128.54.30.1 nue
|
|||
|
??? 128.54.30.1 nue, X to discontinue, ? for Help
|
|||
|
??? 128.6.1.41
|
|||
|
??? 128.6.1.42
|
|||
|
??? 129.137.33.72
|
|||
|
??? 129.180.1.57
|
|||
|
??? 129.72.1.59 Hayes
|
|||
|
??? 131.212.32.110 atdt 9,xxxxxxx Duluth MN
|
|||
|
??? 140.112.3.2 ntu <none>
|
|||
|
??? 140.115.1.101 guest <none>
|
|||
|
??? 140.115.17.110 u349633
|
|||
|
??? 140.115.70.21 cs8005
|
|||
|
??? 140.115.83.200 guest <none>
|
|||
|
??? 140.119.1.110 ?
|
|||
|
??? 18.26.0.55
|
|||
|
??? alcat.library.nova.edu
|
|||
|
??? annexdial.rz.uni-duesseldorf.de
|
|||
|
??? annexdial.rz.uni-duesseldorf.de
|
|||
|
??? dial.cc.umanitoba.ca
|
|||
|
??? dial24-nc00.net.ubc.ca
|
|||
|
??? dial24-nc01.net.ubc.ca
|
|||
|
??? dial96-np65.net.ubc.ca
|
|||
|
??? dial96.ncl.ac.uk
|
|||
|
??? dial9600.umd.edu
|
|||
|
??? dialin.creighton.edu
|
|||
|
??? dialout.lcs.mit.edu
|
|||
|
??? dialout.plk.af.mil
|
|||
|
??? dialout.scu.edu
|
|||
|
??? dialout1.princeton.edu
|
|||
|
??? dialout1200.scu.edu
|
|||
|
??? dialout1200.unh.edu
|
|||
|
??? dialout24.afit.af.mil
|
|||
|
??? dialout24.cac.washington.edu
|
|||
|
??? dialout2400.scu.edu
|
|||
|
??? dialout9600.scu.edu
|
|||
|
??? dswitch.byu.edu "C Modem"
|
|||
|
??? engdial.cl.msu.edu
|
|||
|
??? gmodem.capcollege.bc.ca
|
|||
|
??? hmodem.capcollege.bc.ca
|
|||
|
??? irmodem.ifa.hawaii.edu
|
|||
|
??? modem-o.caps.maine.edu
|
|||
|
??? modem.calvin.edu
|
|||
|
??? modem.cis.uflu.edu
|
|||
|
??? modem.d.umn.edu/129.72.1.59 Hayes 9,XXX-XXXX
|
|||
|
??? modem.ireq.hydro.qc.ca
|
|||
|
??? modem12.bcm.tmc.edu
|
|||
|
??? modem24.bcm.tmc.edu
|
|||
|
??? modem24.bcm.tmc.edu
|
|||
|
??? modem_out12e7.atk.com
|
|||
|
??? modem_out24n8.atk.com
|
|||
|
??? modem_pool.runet.edu
|
|||
|
??? modems.csuohio.edu
|
|||
|
??? modems.uwp.edu
|
|||
|
??? outdial.louisville.edu
|
|||
|
??? r596adi1.uc.edu
|
|||
|
??? ts-modem.une.oz.au
|
|||
|
??? ts-modem.une.oz.au
|
|||
|
??? vtnet1.cns.ut.edu "CALL" or "call"
|
|||
|
??? wright-modem-1.rutgers.edu
|
|||
|
??? wright-modem-2.rutgers.edu
|
|||
|
|
|||
|
|
|||
|
Conclusion
|
|||
|
----------
|
|||
|
If you find any of the outdials to have gone dead, changed commands,
|
|||
|
or require password, please let us know so we can keep this list as
|
|||
|
accurate as possible. If you would like to add to the list, feel free
|
|||
|
to mail us and it will be included in future versions of this list,
|
|||
|
with your name beside it. Have fun...
|
|||
|
|
|||
|
|
|||
|
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Notes on Unix Password Security
|
|||
|
by
|
|||
|
Voyager
|
|||
|
will@gnu.ai.mit.edu
|
|||
|
|
|||
|
|
|||
|
Introduction
|
|||
|
~~~~~~~~~~~~
|
|||
|
Standard Unix implementations keep user passwords in the file
|
|||
|
/etc/passwd. An entry in the password file consists of seven colon
|
|||
|
delimited fields:
|
|||
|
|
|||
|
Username
|
|||
|
Encrypted password (And optional password aging data)
|
|||
|
User number
|
|||
|
Group Number
|
|||
|
GECOS Information
|
|||
|
Home directory
|
|||
|
Shell
|
|||
|
|
|||
|
]
|
|||
|
] Sample entry from /etc/passwd:
|
|||
|
]
|
|||
|
] will:5fg63fhD3d:9406:12:Will Spencer:/home/fsg/will:/bin/bash
|
|||
|
]
|
|||
|
|
|||
|
Broken down, this passwd file line shows:
|
|||
|
|
|||
|
Username: will
|
|||
|
Encrypted password: 5fg63fhD3d
|
|||
|
User number: 9406
|
|||
|
Group Number: 12
|
|||
|
GECOS Information: Will Spencer
|
|||
|
Home directory: /home/fsg/will
|
|||
|
Shell: /bin/bash
|
|||
|
|
|||
|
|
|||
|
Password Aging
|
|||
|
~~~~~~~~~~~~~~
|
|||
|
On some systems you will find passwd entries with password aging
|
|||
|
installed. Password aging forces the user to change passwords after a
|
|||
|
System Administrator specified period of time. Password aging can
|
|||
|
also force a user to keep a password for a certain number of weeks
|
|||
|
before changing it.
|
|||
|
|
|||
|
]
|
|||
|
] Sample entry from /etc/passwd with password aging installed:
|
|||
|
]
|
|||
|
] will:5fg63fhD3d,M.z8:9406:12:Will Spencer:/home/fsg/will:/bin/bash
|
|||
|
]
|
|||
|
|
|||
|
Note the comma in the encrypted password field. The characters after
|
|||
|
the comma are used by the password aging mechanism.
|
|||
|
|
|||
|
]
|
|||
|
] Password aging characters from above example:
|
|||
|
]
|
|||
|
] M.z8
|
|||
|
]
|
|||
|
|
|||
|
The four characters are interpreted as follows:
|
|||
|
|
|||
|
1: Maximum number of weeks a password can be used before changing
|
|||
|
2: Minimum number of weeks a password must be used before changing
|
|||
|
3&4: Last time password was changed, in number of weeks since 1970/1/1
|
|||
|
|
|||
|
Three special cases should be noted:
|
|||
|
|
|||
|
If the first and second characters are set to '..' the user will be
|
|||
|
forced to change his/her passwd the next time he/she logs in. The
|
|||
|
passwd program will then remove the passwd aging characters, and the
|
|||
|
user will not be subjected to password aging requirements again.
|
|||
|
|
|||
|
If the third and fourth characters are set to '..' the user will be
|
|||
|
forced to change his/her passwd the next time he/she logs in. Password
|
|||
|
aging will then occur as defined by the first and second characters.
|
|||
|
|
|||
|
If the first character (MAX) is less than the second character (MIN),
|
|||
|
the user is not allowed to change his/her password. Only root can
|
|||
|
change that users password.
|
|||
|
|
|||
|
It should also be noted that the su command does not check the
|
|||
|
password aging data. An account with an expired password can be su'd
|
|||
|
to without being forced to change the password.
|
|||
|
|
|||
|
The password aging codes are in base-64 format, and can be converted to
|
|||
|
decimal using the following table:
|
|||
|
|
|||
|
Password Aging Codes
|
|||
|
+------------------------------------------------------------------------+
|
|||
|
| |
|
|||
|
| Character: . / 0 1 2 3 4 5 6 7 8 9 A B C D E F G H |
|
|||
|
| Number: 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 |
|
|||
|
| |
|
|||
|
| Character: I J K L M N O P Q R S T U V W X Y Z a b |
|
|||
|
| Number: 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 |
|
|||
|
| |
|
|||
|
| Character: c d e f g h i j k l m n o p q r s t u v |
|
|||
|
| Number: 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 |
|
|||
|
| |
|
|||
|
| Character: w x y z |
|
|||
|
| Number: 60 61 62 63 |
|
|||
|
| |
|
|||
|
+------------------------------------------------------------------------+
|
|||
|
|
|||
|
|
|||
|
Password Aging Defaults
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
System wide defaults for password aging are stored in the file
|
|||
|
/etc/default/passwd.
|
|||
|
|
|||
|
]
|
|||
|
] Sample entry from /etc/default/passwd under System V release 4.0
|
|||
|
]
|
|||
|
] MINWEEKS=0
|
|||
|
] MAXWEEKS=500
|
|||
|
] PASSLENGTH=5
|
|||
|
] WARNWEEKS=1
|
|||
|
]
|
|||
|
|
|||
|
MINWEEKS is the default minimum number of weeks a password must be
|
|||
|
used before changing. MAXWEEKS is the default maximum number of weeks
|
|||
|
a password can be used before changing. PASSLENGTH is the minimum
|
|||
|
number of characters a password may contain. WARNWEEKS, which did not
|
|||
|
exist prior to System V Release 4, is the number of weeks a user is
|
|||
|
warned that they must change their password.
|
|||
|
|
|||
|
|
|||
|
Password Shadowing
|
|||
|
~~~~~~~~~~~~~~~~~~
|
|||
|
Due to basic design aspects of the Unix system, the file /etc/passwd
|
|||
|
is world readable. This allows password crackers to steal the
|
|||
|
encrypted passwords and attempt to crack them. Newer versions of Unix
|
|||
|
use a scheme known as shadowing to alleviate this problem.
|
|||
|
|
|||
|
On a Unix system with password shadowing, the encrypted password field
|
|||
|
of the password file is replaced by a special token. When the login
|
|||
|
and passwd programs see this token in the password field, they switch
|
|||
|
to the shadowed copy of the password file for the actual encrypted
|
|||
|
password field. The shadowed copy of the password file is readable
|
|||
|
only by root and the login and passwd programs run SUID root.
|
|||
|
|
|||
|
|
|||
|
Defeating Password Shadowing
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Password shadowing can be defeated on some systems by using
|
|||
|
getpwent(), as in the following program. Successive calls to
|
|||
|
getpwent() are made for every line in the passwd file. This method
|
|||
|
only works for older password shadowing schemes.
|
|||
|
|
|||
|
] #include <pwd.h>
|
|||
|
] main()
|
|||
|
] {
|
|||
|
] struct passwd *p;
|
|||
|
] while(p=getpwent())
|
|||
|
] printf("%s:%s:%d:%d:%s:%s:%s\n", p->pw_name, p->pw_passwd,
|
|||
|
] p->pw_uid, p->pw_gid, p->pw_gecos, p->pw_dir, p->pw_shell);
|
|||
|
] }
|
|||
|
|
|||
|
|
|||
|
On systems where getpwent() fails, it is possible to utilize the
|
|||
|
pwdauth() function for similar purposes. Note that the pwdauth()
|
|||
|
function is purposefully designed to operate very slowly. This
|
|||
|
program shows the basics of pwdauth(), for a more complete example of
|
|||
|
a cracker utilitizing pwdauth() refer to Shadow Crack from The
|
|||
|
Shining/UPi.
|
|||
|
|
|||
|
]
|
|||
|
] #define MAXLOGIN 8
|
|||
|
] #define MAXPASS 8
|
|||
|
]
|
|||
|
] main()
|
|||
|
] {
|
|||
|
]
|
|||
|
] char login[MAXLOGIN];
|
|||
|
] char password[MAXPASS];
|
|||
|
]
|
|||
|
] printf("login: ");
|
|||
|
] scanf("%s", login);
|
|||
|
]
|
|||
|
] printf("password: ");
|
|||
|
] scanf("%s", password);
|
|||
|
]
|
|||
|
]
|
|||
|
] if (pwdauth(login,password) == 0 )
|
|||
|
] printf("Correct!\n");
|
|||
|
] else printf("Wrong!\n");
|
|||
|
] }
|
|||
|
]
|
|||
|
|
|||
|
|
|||
|
A third method of defeating password shadowing is to have root
|
|||
|
priveleges, as root is able to read the shadowed password file
|
|||
|
directly.
|
|||
|
|
|||
|
The following chart show the location of the shadowed password
|
|||
|
information and the token left in the /etc/passwd file by various
|
|||
|
versions of Unix.
|
|||
|
|
|||
|
]
|
|||
|
] Unix Path Token
|
|||
|
] -----------------------------------------------------------------
|
|||
|
] AIX 3 /etc/security/passwd !
|
|||
|
] or /tcb/auth/files/<first letter #
|
|||
|
] of username>/<username>
|
|||
|
] A/UX 3.0s /tcb/files/auth/?/*
|
|||
|
] BSD4.3-Reno /etc/master.passwd *
|
|||
|
] ConvexOS 10 /etc/shadpw *
|
|||
|
] ConvexOS 11 /etc/shadow *
|
|||
|
] DG/UX /etc/tcb/aa/user/ *
|
|||
|
] EP/IX /etc/shadow x
|
|||
|
] HP-UX /.secure/etc/passwd *
|
|||
|
] IRIX 5 /etc/shadow x
|
|||
|
] Linux 0.99 /etc/shadow *
|
|||
|
] OSF/1 /etc/passwd[.dir|.pag] *
|
|||
|
] SCO UNIX R3.2v4.2 /etc/shadow x
|
|||
|
] SCO Unix 3.2.x /tcb/auth/files/<first letter *
|
|||
|
] of username>/<username>
|
|||
|
] SunOS 4.1+c2 /etc/security/passwd.adjunct ##username
|
|||
|
] SunOS 5.0 /etc/shadow
|
|||
|
] <optional NIS+ private secure maps/tables/whatever>
|
|||
|
] System V Release 3.2 /etc/shadow x
|
|||
|
] System V Release 4.0 /etc/shadow x
|
|||
|
] System V Release 4.2 /etc/security/* database
|
|||
|
] Ultrix 4 /etc/auth[.dir|.pag] *
|
|||
|
] UNICOS /etc/udb *
|
|||
|
]
|
|||
|
|
|||
|
|
|||
|
Format of the shadowed password file
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
The format of the shadowed password file differs under various Unix
|
|||
|
implementations. Many implementations follow the original System V
|
|||
|
Release 3.2, while others opt for a more complicated yet more
|
|||
|
efficient database structure.
|
|||
|
|
|||
|
An entry in the System V Release 3.2 shadow file consists of five
|
|||
|
colon delimited fields:
|
|||
|
|
|||
|
Username
|
|||
|
Encrypted password (And optional password aging data)
|
|||
|
Last time password was changed, in number of days since 1970/1/1
|
|||
|
Minimum number of days a password must be used before changing
|
|||
|
Maximum number of days a password can be used before changing
|
|||
|
|
|||
|
System V Release 4 introduced three more fields to the shadow file:
|
|||
|
|
|||
|
The number of days before the password expires that the user will be warned
|
|||
|
The number of days of inactivity allowed for the user
|
|||
|
The absolute expiration date for the account
|
|||
|
|
|||
|
]
|
|||
|
] Sample entry from /etc/shadow under System V release 4.0
|
|||
|
]
|
|||
|
] will:5fg63fhD3d:8960:1:60:10:90:10000
|
|||
|
]
|
|||
|
|
|||
|
Broken down, this shadow file line shows:
|
|||
|
|
|||
|
Username: will
|
|||
|
Encrypted password: 5fg63fhD3d
|
|||
|
Last change: 8960 (Password was last changed on
|
|||
|
Minimum days: 1 (Password must be kept for 1 day without changing)
|
|||
|
Maximum days: 60 (Password must be changed every 60 days)
|
|||
|
Warning days: 10 (User receives 10 days warning of required
|
|||
|
password change)
|
|||
|
Inactivity days: 90 (Account disabled if not used for 90 days)
|
|||
|
Expiration date: 10000 (Account expires on
|
|||
|
|
|||
|
|
|||
|
The SunOS adjunct system
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Sun Microsystems introduced changes in their version of the shadow
|
|||
|
file in SunOS 4.1.
|
|||
|
|
|||
|
An entry in the SunOS passwd.adjunt file consists of seven colon
|
|||
|
delimited fields:
|
|||
|
|
|||
|
Username
|
|||
|
Encrypted password (And optional password aging data)
|
|||
|
|
|||
|
]
|
|||
|
] Sample entry from /etc/security/passwd.adjunt under SunOS 4.1
|
|||
|
]
|
|||
|
] will:5fg63fhD3d::::ad,p0,p1:dr,dw,dc,da,lo
|
|||
|
]
|
|||
|
|
|||
|
Broken down, this passwd.adjunt line shows:
|
|||
|
|
|||
|
Username: will
|
|||
|
Encrypted password: 5fg63fhD3d
|
|||
|
Minimum login clearance:
|
|||
|
Maximum login clearance:
|
|||
|
Default login clearance:
|
|||
|
Always audit: ad,p0,p1
|
|||
|
Never audit: dr,dw,dc,da,lo
|
|||
|
|
|||
|
|
|||
|
NIS
|
|||
|
~~~
|
|||
|
NIS (Network Information System) in the current name for what was once
|
|||
|
known as yp (Yellow Pages). The purpose for NIS is to allow many
|
|||
|
machines on a network to share configuration information, including
|
|||
|
password data. NIS is not designed to promote system security. If
|
|||
|
your system uses NIS you will have a very short /etc/passwd file that
|
|||
|
includes a line that looks like this:
|
|||
|
|
|||
|
+::0:0:::
|
|||
|
|
|||
|
To view the real password file use this command "ypcat passwd"
|
|||
|
|
|||
|
|
|||
|
Password cracking
|
|||
|
~~~~~~~~~~~~~~~~~
|
|||
|
Contrary to popular belief, Unix passwords cannot be decrypted. Unix
|
|||
|
passwords are encrypted with a one way function. The login program
|
|||
|
encrypts the text you enter at the "password:" prompt and compares
|
|||
|
that encrypted string against the encrypted form of your password.
|
|||
|
|
|||
|
Password cracking software uses wordlists. The password cracking
|
|||
|
program encrypts each word in the wordlist and compares that encrypted
|
|||
|
string against the encrypted form of the password. If the encrypted
|
|||
|
forms match, the password is known.
|
|||
|
|
|||
|
To crack passwords, you will need a password cracking program and a
|
|||
|
wordlist. The best cracking program for Unix passwords is currently
|
|||
|
Crack by Alec Muffett. For PC-DOS, the best package to use is
|
|||
|
currently CrackerJack. Larger wordlists will allow you to crack more
|
|||
|
accounts.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
|||
|
|
|||
|
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20> Thank you for abusing AT&T <20>
|
|||
|
<09><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<09><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> by The Public & Dead Kat
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<09><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Some of the "Frequently Called AT&T Organizations":
|
|||
|
|
|||
|
Account Inquiry Centers (AIC)...................................1-800-325-0138
|
|||
|
Provides support for business customer inquiries regarding
|
|||
|
billing of MTS, WATS and private line.
|
|||
|
|
|||
|
ACCUMASTER Network Management Support...........................1-800-637-0007
|
|||
|
Provides custormer service for the following systems:
|
|||
|
1. ACCUMASTER Integrator
|
|||
|
2. Services Workstation
|
|||
|
|
|||
|
ACCUNET Bandwidth Management Service............................1-800-526-0253
|
|||
|
|
|||
|
ALLIANCE Teleconference.........................................1-800-544-6363
|
|||
|
Call to set up dial-in and dial-out teleconferences.
|
|||
|
|
|||
|
Amcom Software Helpline.........................................1-800-852-8935
|
|||
|
Provides customer support for 3B2 Messaging Server.
|
|||
|
|
|||
|
AT&T Easylink...................................................1-800-242-6005
|
|||
|
|
|||
|
AT&T Paradyne Products..........................................1-800-237-0016
|
|||
|
Processes customer trouble reports and arranges repair
|
|||
|
for Paradyne modems and multiplexors.
|
|||
|
|
|||
|
Call Acquisition/Fault Management Helpline......................1-800-422-6622
|
|||
|
Provides customer service for the following systems:
|
|||
|
1. Call Accounting System (CAS), CAS+
|
|||
|
2. CDRU, CDRP, Cost Allocator
|
|||
|
3. Trouble Tracker
|
|||
|
|
|||
|
Call Center Helpline............................................1-800-344-9670
|
|||
|
Provides customer service for the following systems:
|
|||
|
1. Call Management System (CMS)
|
|||
|
2. CONVERSANT Voice Information System (VIS)
|
|||
|
3. Telemarketing Gateway
|
|||
|
|
|||
|
Computer Hotline................................................1-800-922-0354
|
|||
|
Handles customer problems relating to AT&T
|
|||
|
software, computers and net-working products.
|
|||
|
|
|||
|
Corporate Education.............................................1-800-TRAINER
|
|||
|
Provides training for customers and employees on a wide 8724637
|
|||
|
range of AT&T products and services.
|
|||
|
|
|||
|
General Business Systems Branch Offices (GBS)...................1-800-247-7000
|
|||
|
Provide small business customers (those with less than 80
|
|||
|
stations) sales, lease and overall support for voice
|
|||
|
products and data systems.
|
|||
|
|
|||
|
Inbound MEGACOM Service.........................................1-800-222-1000
|
|||
|
Outbound MEGACOM WATS...........................................1-800-MEGSCOM
|
|||
|
Processes customer trouble reports and arranges repair for 634-2266
|
|||
|
M800/900/MultiQuest Service
|
|||
|
|
|||
|
International Information Service...............................1-800-874-4000
|
|||
|
A toll-free service for U.S. customers providing
|
|||
|
answers to international calling questions (including
|
|||
|
international rate and dialing instructions).
|
|||
|
|
|||
|
Long Distance Gift Certificates -- Business.....................1-800-222-7747
|
|||
|
-- Residence 1-800-222-8555
|
|||
|
Sales and service for AT&T Long Distance Certificates
|
|||
|
|
|||
|
Long Distance Repair Service Center (LDRSC).....................1-800-222-3000
|
|||
|
Processes customer trouble reports and arranges repair for
|
|||
|
both residence and business AT&T Long Distance Services.
|
|||
|
Covers 800 Service, WATS, PRO WATS, and One Line WATS.
|
|||
|
|
|||
|
National Sales & Service Center (NSSC)..........................1-800-222-3111
|
|||
|
Provides:
|
|||
|
-- nationwide sales to residence and very small business
|
|||
|
customers for corded, cordless answering systems,
|
|||
|
typewriters and Do-It-Yourself products.
|
|||
|
-- troubleshooting support for al AT&T consumer products.
|
|||
|
|
|||
|
National Service Assistance Center (NSAC)
|
|||
|
Supports business customers in the repair of the following
|
|||
|
product lines:
|
|||
|
1. Smaller systems (ComKey, 1 A Key, Horizon(R)).............1-800-526-2000
|
|||
|
2. Merlin(R), Spirit(R), FAX, EKTS, System 25................1-800-628-2888
|
|||
|
|
|||
|
National Special Needs Center (NSNC)......................voice 1-800-233-1222
|
|||
|
Handles inquiries for speech and hearing impaired tdd 1-800-833-3232
|
|||
|
customers including lease and sale of telecommunications
|
|||
|
products, billing inquiries for long distance and
|
|||
|
equipment.
|
|||
|
|
|||
|
National Telemarketing Centers (NTC)............................1-800-CALL-ATT
|
|||
|
Handles orders for AT&T Card and residence AT&T optional
|
|||
|
calling plans
|
|||
|
|
|||
|
PBX Technical Service Center....................................1-800-242-2121
|
|||
|
Handles questions concerning:
|
|||
|
Definity Communications System G1, G2, G3
|
|||
|
System 75
|
|||
|
Dimension PBX
|
|||
|
|
|||
|
PC/PBX Support..................................................1-800-231-1111
|
|||
|
|
|||
|
Primary Account Sales Centers (PASC)............................1-800-222-0400
|
|||
|
Perform a wide range of sales oriented functions for small
|
|||
|
business customers (those with annual long distance bills
|
|||
|
of less than $50,000).
|
|||
|
|
|||
|
Residential Billing Inquiry
|
|||
|
-- residence customers for sales, service and billing of......1-800-555-8111
|
|||
|
long distance
|
|||
|
-- residence and very small business customers for lease,.....1 800-555-8111
|
|||
|
sales, service and billing of equipment
|
|||
|
|
|||
|
Share Owner Services (TRANSTECH)................................1-800-348-8288
|
|||
|
Provides a wide range of services including stock
|
|||
|
transfers and dividend payment processing.
|
|||
|
|
|||
|
SDN Repair Service Center.......................................1-800-344-5100
|
|||
|
Processes customer trouble reports and arrages repair for
|
|||
|
Software Defined Network (SDN).
|
|||
|
|
|||
|
Switched 56 Repair Service Center...............................1-800-367-7956
|
|||
|
Proceses customer trouble reports and arranges repair for
|
|||
|
Switched 56 systems.
|
|||
|
|
|||
|
Private Line Repair Service Center..............................1-800-325-1230
|
|||
|
Processes customer trouble reports and arranges repair for
|
|||
|
voice grade PL/DDS/ASDS.
|
|||
|
|
|||
|
Telephone Equipment, Computers & Services.......................1-800-247-1212
|
|||
|
Business Marketing Group
|
|||
|
38 computers, PCs, System 75 and 85, UNIX(tm), and ISN.
|
|||
|
For businesses 80 stations +.
|
|||
|
8:00am to 6:00pm [EST I found out]
|
|||
|
|
|||
|
The AT&T Catalog................................................1-800-635-8866
|
|||
|
The Global Business Communication Systems product catalog
|
|||
|
for Business, Federal, State and Local Government
|
|||
|
Custormers. Ask for extension 7000 to order catalog.
|
|||
|
|
|||
|
Voice Messaging Helpline........................................1-800-56-AUDIX
|
|||
|
Provides custormer service for the following systems: 562-8349
|
|||
|
1. Audix Voice Messaging System
|
|||
|
2. Voice Mail, AUDIX VP, Inbound Call Director, Voice
|
|||
|
Power Automated Attendant
|
|||
|
|
|||
|
ADDITIONAL RESOURCES FOR EMPLOYEES
|
|||
|
|
|||
|
"Easy To Do Business With" Reference Manuals. A variety
|
|||
|
of printed reference materials which include helpful
|
|||
|
contact information. Ask for a copy of the BCSystems
|
|||
|
Publications Catalog (# 555-000-010) 1-800-432-6600
|
|||
|
|
|||
|
A "LAST" RESOURCE FOR EMPLOYEES
|
|||
|
|
|||
|
FIND AT&T Center 1-800-FIND-AT&T
|
|||
|
A last resource for employees needing additional (346-3288)
|
|||
|
information on a wide range of AT&T topics, (e.g.
|
|||
|
products, organizations, addresses, telephone numbers)
|
|||
|
|
|||
|
|
|||
|
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Revenge Database
|
|||
|
v1.3
|
|||
|
by: DisordeR
|
|||
|
|
|||
|
|
|||
|
Things to do to people for revenge. These include local and LD forms. From
|
|||
|
'pain in the ass' to 'downright fuckin cruel'. This is just for speculation
|
|||
|
and not suggesting any actions, so I am not responsible for anything you do.
|
|||
|
|
|||
|
With many of these ideas, you may not be able to do everything you wish,
|
|||
|
but remember that even the smallest effort on your part can cause a lot
|
|||
|
of problems on their side.
|
|||
|
|
|||
|
Finding their info.
|
|||
|
|
|||
|
1) If you have their handle. Check around local area BBSs for their real name
|
|||
|
in user info. Check with other BBSers or friends who may know the person.
|
|||
|
Get real name and any other info possible. Even the most abstract of things,
|
|||
|
regardless of what it is, write it down. It may come in use later down
|
|||
|
the road.
|
|||
|
|
|||
|
2) With any info you currently have (mainly focus on getting their name and
|
|||
|
phone number) get their phone number. If you only have their name try and
|
|||
|
get their number through the phone books, or information. If you have
|
|||
|
their number use a CN/A to get more info. Also check with 900 pay/info
|
|||
|
lines for more info. If you have thier license plate number, go down to
|
|||
|
the DMV and have thier info pulled. This only costs a couple of bucks.
|
|||
|
|
|||
|
Once you have their info...
|
|||
|
|
|||
|
._._._._._._._._._._._._._._._._._._._._._._._._._._._._._._._._._._._._._.
|
|||
|
|
|||
|
Phone.
|
|||
|
|
|||
|
1) Call up their local phone provider and act like the victem.
|
|||
|
A) Install a password on their phone line. This makes it so they can't
|
|||
|
change their own service without providing that password. The only
|
|||
|
way around it, is for them to visit a local office, show ID, fill
|
|||
|
out bullshit paperwork etc. Remember, since most people don't
|
|||
|
call the phone company that often, it may take them a month until
|
|||
|
they realize what you have done.
|
|||
|
|
|||
|
B) Add any/all of the following services.
|
|||
|
1) Privacy/Non-Publish $2.10/month
|
|||
|
2) Caller ID $5.95/month
|
|||
|
3) Call Waiting $4.50/month
|
|||
|
4) Call Forwarding $1.50/month
|
|||
|
5) Three Way $3.50/month
|
|||
|
6) Speed Calling (30) $3.00/month
|
|||
|
7) Callback $2.95/month $8.50/install
|
|||
|
8) LD Block $2.00/month
|
|||
|
9) Change Number(Custom) $17.50 (after first time)
|
|||
|
10) Change to Custom # $75.00
|
|||
|
-----------------------------------
|
|||
|
Total $126.50
|
|||
|
|
|||
|
C) Change their LD service to the most expensive service if you want
|
|||
|
a quick but subtle revenge. I find it better to change their carrier
|
|||
|
to MCI. From here ask for a custom 800 number for 'your' line. After
|
|||
|
that, they will be reached from an 800 number, and all calls will
|
|||
|
be billed to them, even local. Post up their number as a BBS number
|
|||
|
on any of the lamer Usenet groups. Since they are with MCI, you
|
|||
|
can set up and bill conference calls to their number through the
|
|||
|
right procedures.
|
|||
|
|
|||
|
2) Visit the victem's house and use your beige on them. Also have a custom
|
|||
|
little device that will allow you to bridge the line while you are on
|
|||
|
it, so that you can remove your beige and they will stay on the line.
|
|||
|
|
|||
|
A) Call any 900 numbers you want, including the various 900 services that
|
|||
|
give information about people. Might as well make them pay for you
|
|||
|
getting their information. :) I suggest dedicating some time to call
|
|||
|
900.97M.ONEY ... each call to that number will bill them 25 bucks.
|
|||
|
One hour of this can hit around 1500 bucks of damage to their phone
|
|||
|
bill.
|
|||
|
|
|||
|
B) Set up a string of confs for ten or so days, and make each day
|
|||
|
last from noon til midnight. For more info on setting up confs,
|
|||
|
consult CoTNo issue 3, article 6.
|
|||
|
|
|||
|
C) Call the secret service and threaten to kill the president. Make
|
|||
|
it convincing and be somewhat vague about your plans. This will prompt
|
|||
|
a quick visit by agents in trenchcoats that will want to play 20 questions
|
|||
|
about how that person plans to kill the president.
|
|||
|
|
|||
|
D) Prank call people, threaten them, initiate as many COT's (Customer
|
|||
|
Oriented Trace) as you can. This will flood their house with those
|
|||
|
wonderful letters from the phone company saying that person was
|
|||
|
harrasing people, and are the scum of the earth.
|
|||
|
|
|||
|
E) On your way out of their backyard, cut their phone lines. If you can't
|
|||
|
use them, why should they? If you don't want to do that, hook up the
|
|||
|
little device to hold the line when you unclip your beige, and call
|
|||
|
Time/Temp in Japan. That should rack up a decent bill.
|
|||
|
|
|||
|
._._._._._._._._._._._._._._._._._._._._._._._._._._._._._._._._._._._._._.
|
|||
|
|
|||
|
Credit.
|
|||
|
|
|||
|
1) Pull a CBI on them, or obtain their credit info any way you can. Through
|
|||
|
enough social engineering, you should be able to get most of the info
|
|||
|
you need, if not, there are still a few ways to strike out at them.
|
|||
|
Cancel all their credit cards. Report them as stolen, and ask for a new
|
|||
|
one to be sent to you, and your old account number put on hold. Next time
|
|||
|
they are in a store and use it, the cashier will call the cops when the
|
|||
|
response comes back as 'stolen'. Public humiliation and a hassle in a
|
|||
|
store is great to watch.
|
|||
|
|
|||
|
2) Using their info, apply for a credit card they don't have. Usually
|
|||
|
Diner's Club or Discover or something that isn't as widely used. Fill
|
|||
|
out all the information as theirs, and send it in. Intercept the mail
|
|||
|
with the card in it, and send response back that you moved, and give
|
|||
|
them a new address that is more convenient for you. Now you have a credit
|
|||
|
card that is in their name, and they don't know about. When the bill
|
|||
|
is sent to them, it will go to the new address where you are picking
|
|||
|
up mail. Abuse the hell out of that card. Use it on anything/everything
|
|||
|
you can. When the bill comes, just ignore it. You should get several
|
|||
|
months of use out of it or until you max it. When that happens, call
|
|||
|
in and change your address again and tell them the check is in the mail.
|
|||
|
By the time the person knows they have that card, gets the bill, there
|
|||
|
will be a huge amount to pay, interest on it all, and a mark on their
|
|||
|
credit records indicating late/delinquent pay.
|
|||
|
|
|||
|
3) Using their existing credit cards, make as many purchases on them as you
|
|||
|
can. Key here is to make as many that can't be disputed. Make phone
|
|||
|
calls from local payphones with their CC#. Doing this it becomes
|
|||
|
very hard for them to prove they didn't do it. Use it at gas stations
|
|||
|
that have the new pumps with built in credit card payment options.
|
|||
|
The more they can't dispute, the more they pay. Card as many goods
|
|||
|
as you can. Get stuff that you need, or use their own card to do some
|
|||
|
of the other things mentioned above.
|
|||
|
|
|||
|
4) If all else fails, spread their credit card/calling card numbers as
|
|||
|
far as you can. Let other people abuse them as much as possible. When
|
|||
|
they change accounts, do another CBI and respread their info. The more
|
|||
|
you do this, the more that will rack up on their bills and the harder
|
|||
|
it will be for them to dispute the bill, and the more of a hassle it is
|
|||
|
for them to clear their name.
|
|||
|
|
|||
|
._._._._._._._._._._._._._._._._._._._._._._._._._._._._._._._._._._._._._.
|
|||
|
|
|||
|
Misc.
|
|||
|
|
|||
|
If you have their full info, which shouldn't be a problem if you have
|
|||
|
their name/phone number/address etc, employ a few more harassing
|
|||
|
ideas.
|
|||
|
|
|||
|
1) Report their car as stolen. Tell the police the info, that you parked
|
|||
|
it at some office and when you came out your car was gone. Next time
|
|||
|
the victem is driving down a road, if a cop ID's the car, they will pull
|
|||
|
the victem over and harass him.
|
|||
|
|
|||
|
2) If the person is making a road trip, call Crime Stoppers and give
|
|||
|
an anonymous tip that the person is trafficking drugs, and has them
|
|||
|
well hidden in the car. Be somewhat vague but make it believable.
|
|||
|
|
|||
|
3) Steal their mail whenever you can. Sign them up for any magazine/club
|
|||
|
offer that comes to them. If they are a member of any existing clubs,
|
|||
|
then sign them up for additional years, order more merchandise, etc.
|
|||
|
This works well with Columbia House and the like because the order
|
|||
|
forms have their info, and just blanks to fill in part
|
|||
|
numbers/catalog numbers.
|
|||
|
|
|||
|
4) Their car. Using a wrench and five minutes or so, do one/all of the
|
|||
|
following:
|
|||
|
|
|||
|
A) Remove bottom bolt from engine mounts. When they start their car,
|
|||
|
the engine will launch almost straight up into the hood of their
|
|||
|
car if they have enough torque on their engine. V8's and 350's
|
|||
|
will rip the hood right off the car. :)
|
|||
|
B) Remove oil plug, drain oil into container. Make sure you don't
|
|||
|
leave any sign of what you did. When they start their car and take
|
|||
|
off, it won't take long before parts start heating, and the engine
|
|||
|
will overheat, and the pistons will crack.
|
|||
|
C) Siphon all their gas, and fill their tank with urine/salt/sand.
|
|||
|
This will clog their entire system, and take some time to flush
|
|||
|
the system, and get their car operating again.
|
|||
|
D) Drain brake fluid, replace with water. It will take a few miles
|
|||
|
before the person realizes his brakes won't work.
|
|||
|
E) Remove screw on clutch fluid tap. When they try to clutch, it will
|
|||
|
'spooj' clutch fluid out the bottom of their car and they will
|
|||
|
lose pressure.
|
|||
|
F) Remove drive shaft bolts near transmission. A little ways down the
|
|||
|
road, they may notive their drive shaft fall to the ground, or
|
|||
|
hopefully rocket through the back of your car.
|
|||
|
G) Remove pins in tire stems after letting air out. Not only do they
|
|||
|
have a few flats, they can't fill up the tires.
|
|||
|
H) If they leave their window cracked, or you see a prime way to
|
|||
|
make a small hole in their windows, fill it with urine, a fire
|
|||
|
extinguisher, or just water. Plenty of fun when they come out
|
|||
|
the next morning.
|
|||
|
|
|||
|
5) Card all sorts of shit to their house. Some of the better things to
|
|||
|
card to them: 50lbs of raw meat, urinals, male strippers, gay porn
|
|||
|
catalogs, singing telegrams, flowers(pansies), fireworks, cases of
|
|||
|
toilet paper, bibles, a coffin, sexual toys, bags of cow manure,
|
|||
|
|
|||
|
6) Get their neighbor's info, and pose as them. Make any/all of the following
|
|||
|
calls:
|
|||
|
|
|||
|
A) Call the police and tell them you saw the person dragging a dead
|
|||
|
body through the back yard.
|
|||
|
B) Call the police and say the person was running through the house
|
|||
|
waving a machete and holding a gun.
|
|||
|
C) Call the police and mention that 'shady' characters keep buying
|
|||
|
stuff in their back yard.
|
|||
|
|
|||
|
7) Call a local landscaping company, and have them bring a few tons of
|
|||
|
granite rocks to their house, and re-landscape their front yard while
|
|||
|
the person is at work. Have them rip up the current grass or whatnot,
|
|||
|
and dump rocks there.
|
|||
|
|
|||
|
8) Go to your local book store or 7-11 and get about 100 magazine subscription
|
|||
|
cards. Fill each one out with the person's info, and send them off.
|
|||
|
|
|||
|
9) With their full info, call down to public works and tell them that you
|
|||
|
are going out of town for a few weeks, and need your utilities shut
|
|||
|
off for the duration. No water, gas, electricity, etc is always a
|
|||
|
fun thing to overcome. Especially if they don't have use of their phones.
|
|||
|
|
|||
|
|
|||
|
I am always looking for 'phresh gnu ideas' on revenge, and as you can see,
|
|||
|
this is version 1.3 for now. When I add more, I will change the version
|
|||
|
number and spread it around as far as possible. In future CoTNO's, I may
|
|||
|
just have 'adder files' with more ideas, and not reprint the whole thing.
|
|||
|
Thanx goes out to Deadkat, Rage-303, Cavalier, and Synergy for their
|
|||
|
contributions to the file.
|
|||
|
|
|||
|
|
|||
|
DisordeR
|
|||
|
|
|||
|
|
|||
|
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
|||
|
|
|||
|
End of CoTNo #05
|
|||
|
|
|||
|
We hope the long wait for this issue (6 months) was worth it. Now that TNO
|
|||
|
has reorganized, we will be producing CoTNo's on a more regular basis. Be
|
|||
|
sure to check out our other TNo sponsered publications though:
|
|||
|
|
|||
|
#Hack FAQ - The complete reference of Frequently Asked Questions for
|
|||
|
#hack and alt.2600
|
|||
|
|
|||
|
F.U.C.K. - Fucked Up College Kids, a collection of Rants about modern
|
|||
|
American society ranging from the serene to the obscene.
|
|||
|
|
|||
|
Now that we have finished this issue we are off to HoHoCon 94! If your
|
|||
|
lucky, you'll see us there. And if you ARE going, remember Voyager's
|
|||
|
sound words of wisdom, "Don't lick the strippers, you don't know where
|
|||
|
they've been."
|
|||
|
|
|||
|
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|