247 lines
12 KiB
Plaintext
247 lines
12 KiB
Plaintext
|
|
ÜÜÜ ÜÜÜÜÜ
|
|
ÜßÜ ÜßßßßÜ Üßß Ü Û Û ÜÜÜ ßßßßÜÜÜ
|
|
Üß Ü ß ÜÛÛÜ ßÜß ÜÛÛÛ Û ÜßßßÜ ÜßßßßÜ Üß ÛÛÛÛÛÛÛÜÜÜ ßÜ
|
|
ÜÛÛÛÜÛÛÛÛÛÛÜÜÜÛÛÛß Üß Üß ÜÛÜ ßÜ Üß ÜÛÛÜ ßÛ Û ÜÛÛÛÛÛÛÛÛÛÛÛÛÜ ßÜ
|
|
ÛÛÛÛÛÛÛÛÛßßÛÛÛÛÛÛ Üß Üßßßß Ûß ßÛÜ Û ÜÜÜß ÛÛÛßÞÛ ßßßßÜ ßÜ ßÛÛÛÛÛß ßÛÛÛÜ
|
|
ßÛÛÛÛßß ßÛÛÛß ßÜß ÜßÜ ÜÛß Üß Üß Ü ÛÛß ÜÞÛ ÞÛÜ ßÜ Û ÛÛÛÛÝ ÛÛÛÛÞ
|
|
ÛÛÛÛÛ ÜÛÜ Ü ÛÝ ÛÛÝ ßßßßßßß ÜÛÛ ÞÛÛß ÜÛß ßÜ ß ßÛÛÛÝ ÜÜÛÛÛß
|
|
ÛÛÛÛÛÜÛÛÜ ßÜÛßÛÛ ÛÝ ÛÝ ÞÛÛ ÛÛÜ ÜÛÛ ÞÛÝÛÝÞÛ ÜÛÛ ÜÛß ß Ü ÞÛÛÛÜÛÛÛßß Üß
|
|
ÛÛÛÛÛÛÛÛÛÛ ÛÛ ÛÝ ÞÛ ÞÛÝ ÛÛÝÛÛÝÞÛÜ ÞÛÞÛ ß ÛÛÛÜ ÛÛÛÜÜÛÛÛÜ ÛÛÛÛÛÛÛÛÜ ß
|
|
ÜÛÛÛÛÛÛÛßÛÛß ßÛÛÛÛ ÛÝ ÛÛÝ ÞÛÛÛÛ ÛÝÞÛÛÛÞÛ ÞÛÛÞÛÜ ßÛÛÛÛß ÞÛÛÛßß ßÛÛÜ
|
|
ÛÛÛÛÛÛÛÜ Ü Ûß Ü Ûß ÛÛ ÛÛ ÛÛÝÞÛ ÞÛÛÞÛÝÞÛß ßÛÛÜÜ ÞÛÛÝ ÛÛÛÝÜßßÛ ßÛÛÛ
|
|
ßÛÛÛÛÛÛÛÛÜ ß ÛÛ Ü ÛÛ ÞÛÛ ÛÝ ÛÛÞÛÝ ß ßÜ ßÛÛÝÜÛÛÜÛÜÞÛÛÛÝÛ Û ÛÛÛÝ
|
|
Ü ßÛ ÜßÛÛÛÜÜÜ ÜÛÛÜ ÞÛ ßß ßÛÜ Ý Ûß ßÛÜ ÜÛ ÞÛÛ ÛÛÛÛß ÞÛÛÛÝÛ ÛÞÛÛÝÜ
|
|
ßÜ ßß ÛÛÛÛÛÜÛÛßßÛÛÛÜ ÛÛÜ ÜÛÛÜ ßÜ Ý Ü ßÛÛÛ ÛÛÝÞÛÛÝÜÜ ÞÛÛÛ ÛÜßÜÛÛÛ Û
|
|
ßÜ ßÛÛÛÜ ÜÛÛÛß Ü ßÛÛÜÛß ßÛ ßÜ Üß ßÜ ß ÜÜ ÜÛß ßÛÛÛÛß ÛÛ Þ ÛÞÛÛÛÝÜß
|
|
ßÜ ÜßÜ Ü ßÛÛÛÛÛÜß Üß ßÜ ßß Ü ß ÜßÜÜÜß ßßß Û ßÛß ÜÜÜ ßß ÜÜÜÜß ßÜ ÛßÜß
|
|
ßÜ ßßÜ ßßß Üß ßßßß ßßß ßÜÜÜß ßßßß ßÜÜÜß ßÜ Üß Üßßßßß ßÜ Üß
|
|
ßÜß
|
|
|
|
How to hack a SCHOOL Network? All typed by The Evilhacker
|
|
ßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßß
|
|
How to hack a SCHOOL Network ][
|
|
|
|
|
|
[=NOTICE=]
|
|
|
|
The following information is for the purpose of knowledge and nothing
|
|
else. The character "The Evilhacker", is purely fictional and does not exist
|
|
All those exploited in his actions have his apologies.
|
|
|
|
[=PREFACE=]
|
|
|
|
Hey what's up fellow computer phreaks, too bad I ain't one... Anyway
|
|
before we begin to learn to hack a school network I would like to strongly
|
|
advise that you do not do this, due to the fact that penalties are very stiff.
|
|
If you are caught in the act of hacking you will be either:
|
|
|
|
1. Suspended.
|
|
2. EXPELLED!
|
|
3. Forced to pay for all damages or loss of data.
|
|
4. Humiliated because your whole school will know that you
|
|
are a computer nerd.
|
|
|
|
That is all I have to tell you about penalties, and I totally wash my hands
|
|
from any incident which may happen to you due to this text file...
|
|
So it has been said so let it be done...
|
|
|
|
|
|
[=Chapter 1=]
|
|
|
|
Ok, the first step in hacking is understanding the concept. Most
|
|
school run their computers on networks, because it is alot easier for
|
|
students and teachers to access their files (work). A network is simply a
|
|
group of copmputers hooked up to a main computer, which enables people to
|
|
use their computer, save their work, and retrieve it on another computer.
|
|
This concept is used Ticket Reservation systems and eeve by police. The most
|
|
common brand of network that a school would use is IBM SHOOL LAN. Lan is just
|
|
a simple abrieviation for Local Area Network. The reason for this is because
|
|
most computers are either IBM PS\1 in AT 286, or 386 SX, format. And since
|
|
they are IBM they get a discount on the LAN software. Another common brand
|
|
is Novell but since their prices are steep chances are it will not be
|
|
available for student use.
|
|
Another thing you should know is the Operating System (OS). A school
|
|
will use an uncommon version or brand of OS which is not likely to be on
|
|
most computers, due to the fact that students may create boot disk and bring
|
|
them to school. The most common would be MS-DOS v3.1 and PC-DOS V3.0. Both
|
|
these DOS versions are old considering that Microsoft currently has released
|
|
MS-DOS 6.2 and IBM has released PC-DOS 7.0.
|
|
|
|
[=Chapter 2=]
|
|
|
|
Well an easy way to access the command prompt is simply by passing
|
|
the start up files. It is highly unlikely that your computer is equiped with
|
|
DOS 6.0+ so using the [F5] key will be hopeless. Your best bet is to hold
|
|
down the [SHIFT] and hopefully the files will be passed and you will be
|
|
granted access to the command prompt. Sometimes this may not work so you will
|
|
have to do more work. Since batch (.BAT) files can be aborted by the
|
|
[Ctrl] + [C] command or [Ctrl] + [Pause/Break] commands it fill be easy to
|
|
abort the AUTOEXEC.BAT (The computer start up file). Simply abort when you
|
|
see programs being loaded and you should see a message:
|
|
|
|
Terminate Batch File (Y/N)
|
|
|
|
And then press [Y] and BINGO.
|
|
|
|
|
|
[=Chapter 3=]
|
|
|
|
If that did not work don't fret, simply ask your teacher what OS is
|
|
on these computers and when he/she (I'm not sexist) tells you say you have the
|
|
same on your computer. Then later (like a week or two) go back and tell him/
|
|
her that you have a virus and could you make me a boot disk. He or She is
|
|
certain to make you a boot disk of that version and brand OS. Once you recieve
|
|
your boot disk, "Bull's eye", you have the key which gives you access to the
|
|
command prompt. If you do not know how to operate a boot disk, all I have to
|
|
say is that you are an "IGNORANT FOOL". Even a MAC (Apple McIntosh) could
|
|
figure out how to use one. Well all you have to do is stick the disk in
|
|
before you start your computer... Easy! By the way if you do have MAC's in
|
|
your school I'll show you some tips in the MAC Chapter at the end... And if
|
|
you have a Commodore, Amiga, Atari or anything else go and make some mods!
|
|
|
|
[=Chapter 4=] "IBM LAN"
|
|
|
|
Ok that did not work so we'll have to do this through the NET menu's.
|
|
since Networks are basically a string of batch like files run through a main
|
|
executable (.EXE or .COM) file it is likely to be simple to abort these menus.
|
|
Well after you login (Try logining in as a friend in the SAME class as you.
|
|
The reason is that I logged in as some guy with the logon of IGNATIUSX and
|
|
his password was BUSY; well obviously the teacher knew that there was no
|
|
one of that name in our class and since my login was totally different I was
|
|
busted, but since I had a kind teacher I was let off the hook), pick a
|
|
selection and at the second menu just abort. You can abort by pressing
|
|
[Ctrl] + [C] or [Ctrl] + [Pause/Break]. It will ask you if you wish to
|
|
terminate the batch file and obviously you will answer with [Y].
|
|
Well if you don't know where to break why don't you try these
|
|
places:
|
|
|
|
1. CHANGE YOUR PASSWORD
|
|
2. DIR OF DRIVE A: (B:)
|
|
3. DIR OF STUDENT HOME DIRECTORY
|
|
|
|
These are the most likliest places to be able to abort because it uses OS.
|
|
|
|
[=Chapter 4b=]
|
|
|
|
Simple... There's a secret passthru command built into IBM LAN.
|
|
To access it you must be at the Main Menu screen (some schools may have
|
|
hexed this out). Simply hold down the [Alt] key, then in this sequence
|
|
press [A], then [T], then [E]. Bam, your into DOS.
|
|
|
|
[=Chapter 5=]
|
|
|
|
Well if none of these worked then you are messed. You could try
|
|
to hack through programs but there will be little memory and it will take
|
|
longer but nevertheless you are in. Here are some tips for certain school
|
|
programs:
|
|
|
|
[Turbo Pascal/C ++]
|
|
Here is a good source good which should work:
|
|
|
|
Check the file HACKDEMO.PAS which is included in this ZIP
|
|
|
|
[Shapescape/Turing]
|
|
Go to the command menu and type ":sh" or ":shell" or ":SHELL"
|
|
Note: All commands are case sensitive!
|
|
|
|
Heres a quick source that should access the COMMAND prompt.
|
|
|
|
% Program_Name : DOS SHELL
|
|
% Purpose : To access DOS.
|
|
%
|
|
% var s: int
|
|
% system ("command.com",s)
|
|
%
|
|
|
|
[WordPerfect]
|
|
Go to the menu and select "Shell to DOS".
|
|
If that doesn't work select run a program and run "C:\COMMAND.COM"
|
|
These should be enough to run the program.
|
|
|
|
[Microsft Works]
|
|
In the main menu go to the run and type "C:\COMMAND.COM"
|
|
|
|
[Other programs]
|
|
There are so many programs it is hard to tell you what to do so try to abort
|
|
and to run the COMMAND.COM
|
|
|
|
|
|
[=Chapter 6=]
|
|
|
|
Finally if all fails, for IBM LAN, if you can't get in I
|
|
included the SYSTEM BOOT-UP OPTION disk in this packet. Use it
|
|
to modify the whole network! Hahaha. Try it. The file is named
|
|
IBM-BOOT.EXE
|
|
|
|
|
|
[=Chapter 6 for NOVELL USERS=]
|
|
|
|
The archive NOVELL.EXE contains password attainers for use
|
|
on Novell Networks. Use it to create havoc. Have fun!
|
|
|
|
|
|
[=Chapter 7=] What do I do when I am there?
|
|
|
|
Well there is not much to do once you are at the command prompt.
|
|
You should notice that the drives are partitioned into many drives in
|
|
order for the LAN to work properly and to confuse hackers. If you are
|
|
looking for programs it will be or either drive W: or E:. Student files
|
|
are also on W:. It all depends on the way it is setup but it will definatley
|
|
be a partioned hard disk drive. You could leech all the school programs,
|
|
play games and impress your friends, or be EVIL. I never had the chance
|
|
to do this because I had to sit right up front by the teacher because of
|
|
that damn alphabetic seating plan and my last name didn't even start with
|
|
an A or a B,C,D... Anyway you put virus on the computer. It is simple.
|
|
Download a virus from your favourite Pirate Bulletin Board System and
|
|
uncompress it onto a disk. Copy the school's COMMAND.COM file onto that
|
|
disk and then WRITE PROTECT your harddrive and MEMORY! Run the disk
|
|
COMMAND.COM and then the virusized program. Once done replace the original
|
|
school COMMAND.COM with this virusized copy. If you were unable to run
|
|
the CCOMMAND.COM just copy the virus infected program to the school
|
|
computer and add it to the autoexec.bat file, hopefully to the beigining
|
|
of the AUTOEXEC.BAT file so that all the autoexec files that are run will
|
|
be infected. This is 100% fool proof. But before you do that have fun on
|
|
supply teacher classes and play games if you even bother going to class.
|
|
|
|
[=MAC ATTACK, MAC ATTACK=]
|
|
|
|
Yo, Yo, YO! What is up my MAC frieneds. MAC's suck but are
|
|
pretty cool for an over-rated, over priced and under powered machine.
|
|
Elementry schools are the main schools with Apple McIntosch computers
|
|
because they are so easy to use. If this in the USA or anywhere else
|
|
I doubt you ever have computers in Elementry Schools because the US is
|
|
a hood. Washington is like the only place that ain't a ghetto...
|
|
Anyway back to the subject. To Hack a Mac is easy. Teachers often
|
|
try to hide their files. A maze of directories is very common, but to
|
|
outsmart your teacher go to seacrh and search for all files. When you
|
|
find a file with a long directory sort of path you know it is hidden.
|
|
Sorry I don't know much about MAC's but all I have is one year's
|
|
experience with them back in grade eight, which was a LONG time ago.
|
|
|
|
[=CONCLUSION=]
|
|
|
|
I would like to thank you [censored-censored-censored-censored-censored]
|
|
for reading this, and hope you are successful in your quest to hack
|
|
your school. I must tell you I have nothing to do with what happens
|
|
to you.
|
|
|
|
[=GREETS=]
|
|
Greets to those people who try and get me FREE things like I dunno,
|
|
computer parts, weapons, and of course FREE Internet Accounts for
|
|
my personal abuse.
|
|
|
|
[=COMMENTS/QUESTIONS?=]
|
|
Contact me by Internet Email at : evilhacker@apc.tor250.org
|
|
|
|
Note: If you are wondering why all my real names at my email accounts
|
|
seem to be different, gee I wonder.. It ain't my real name fools.. But
|
|
they are REAL people, just no me though stupid LAMERS.
|
|
|
|
[=END=]
|
|
How to Hack School Networks ][
|
|
1995 Evilhacker Productions, The Evilhacker.
|
|
|
|
This text file was not proof read, nor spell checked.
|
|
I'm never going to update this again.. So the rest is up to you!
|