101 lines
5.7 KiB
Plaintext
101 lines
5.7 KiB
Plaintext
STATION ID - 7091/6.411
|
|
|
|
9x Datakit Network
|
|
FOR OFFICIAL USE ONLY
|
|
|
|
This is a 9x system, restricted to authorized persons and for
|
|
official 9x business only. Anyone using this system, network or data
|
|
is subject to being monitored at any time for system administration and
|
|
for identifying unauthorized users or system misuse. Anyone using this
|
|
system expressly consents to such monitoring and is advised that any
|
|
evidence of criminal activity revealed through such monitoring may be
|
|
provided to law enforcement for prosecution.
|
|
|
|
|
|
9x is Substance, Schizo Man, Grampa Elite, and Firebug
|
|
|
|
The Distro Sites
|
|
|
|
Another Way of Life (518)
|
|
The Phantom Tollbooth (718)
|
|
|
|
-----------------------------------------------------------------------------
|
|
|
|
- Internet Hacking vs. Local Hacking -
|
|
- Writin in 1996 by Grampa Elite -
|
|
|
|
|
|
Here we go, i will try to as unbiased or whatever as possible because
|
|
I know some people prefer nethacking to localhacking or visa versa, so i'll
|
|
try to bring out the good and bad points of both areas of hacking. If you
|
|
think i missed something or forgot to add something important let me know.
|
|
|
|
|
|
3587198561297862709856787112157-LOCAL HACKING-7125612876512874512745217845149
|
|
|
|
|
|
Local hacking apposed to nethacking is considerably easier for
|
|
instance, local systems arent usually that secure and probobly have some
|
|
default accounts with the default passwords still running. I have gotten
|
|
into many a local system using default login/password's. Or you can use a
|
|
cn/a to find out there address and go trashing wherever the system is at to
|
|
possibly find some valid login's. Or you can find there voice line and do
|
|
some social engineering which you can also do with systems on the internet.
|
|
For instance do some homework on who works there and find out when he leaves
|
|
and comes to work at whatever place it is another plus is to find out what
|
|
his voice sounds like, i can do just about anybodys voice except women's.
|
|
Then you call when he's not there and give them some bullshit story, and
|
|
don't try that line that zero cool gave that one guy working at gibson or
|
|
whatever the hell that company was in the movie hackers, because it aint
|
|
gunna happen.
|
|
But before you start breaking into systems you have to find them.
|
|
You can accomplish this by either scanning your whole area code or by doing
|
|
more social engineering and getting the dialup that way. But before you
|
|
start scanning your whole ac you better find out if you have unlimited
|
|
calling or if it has a limit and after that you pay a certain ammount per
|
|
call. A way to defeat this is to either get a unlimited calling thing for
|
|
your line, or hack your local switch (which is also local usually)and change
|
|
your line using rc commands or what have you. Local hacking other than x.25
|
|
is what you want if you want to get into companys and shit instead of i-net
|
|
providers. You can also get to other systems by hacking locally, say you
|
|
hack into some sort of unix and you checkout there /etc/uucp/Systems file if
|
|
they have it and then you can CU to those systems or you can CU to some ld
|
|
bbs, its also good for a diverter which you will need when you hack locally
|
|
because it is alot more risky hacking locally if you dont have alot of
|
|
diverters or bounce it through some ld carriers or pbx's or whatever. It is
|
|
alot easier for people to trace you or fuck they could be running ani and you
|
|
could get busted or worse. In other words be carefull about what you are
|
|
doing, and who you are doing it to, this applies to all hacking, no matter
|
|
where or when there are some things you just don't do.
|
|
|
|
3587198561297862709856787112-INTERNET HACKING-7125612876512874512745217342845
|
|
|
|
|
|
Internet hacking is fun also because there are tons of systems out
|
|
there waiting to be broken into unlike local hacking where if you live in a
|
|
small city there aren't many systems. Although internet hacking isn't as
|
|
easy as local hacking because some systems have firewalls and have all there
|
|
bugs patched there are more ways to break into systems than local
|
|
hacking. Some people consider irc haxoring to be internet hacking, i don't.
|
|
Just because you have a script that you didnt even write that sends you
|
|
people's passwd files or adds your address to there .rhosts file doesnt mean
|
|
your a hacker (sorry had to get that out of my system, blah). Anyways, all
|
|
the exploits writin usually are for linux it seems so you are kind of
|
|
restricted to hacking linux unless you can find some way old version of SunOS
|
|
or if you find an Ultrix or sumthin stoopit. There is a program out there to
|
|
scan ip's but i havent used it yet so i don't know if its any good or what.
|
|
And of course there is the famous iP spoofing, whichis defeated if the system
|
|
you are attacking has a properly setup firewall or a secure router or what
|
|
have you. Some systems don't have there firewalls correctly installed so
|
|
they have some false sense of security until you break in. Although i-net
|
|
hacking isn't as risky as local hacking you can be traced no matter what you
|
|
think, you can be traced. And once they get your info your sunk because you
|
|
were probobly over state lines when they traced you and so they'll call in
|
|
the FBI which is not cool.
|
|
|
|
So make your own decision try both to see which one you like the best
|
|
or the one you think works the most with you, one has more systems and the
|
|
other is easier to hack, one has mostly small systems and the other has
|
|
mostly corporations and businesses.
|
|
-----------------------------------------------------------------------------
|