2107 lines
112 KiB
Plaintext
2107 lines
112 KiB
Plaintext
|
|
ÛÛÛÛÛÛÛ ÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛ ÛÛÛÛÛÛÝ ÞÛÛÛÛÛÛ ÛÛÞÛÛÛÛÛÛÝÛÛÛÛÛÝ
|
|
ÍÍÍÞÛÛÛ ÛÛÛÍÞÛÛ ÛÛÛÍÞÛÛ ÛÛÝÞÛÝÞÛÛ ÛÛÛÍÞÛÛ ÍÍÍÍ ÛÛÜÜÜ ÍÍÍÍÍÞÛÝÛÛÝ ÞÛÝÞÛÛÝÍÍÍÍÍÍ
|
|
ÍÍÍÍÛÛÝ ÛÛÛÍÛÛÝÛÛÛÛÍÛÛÝÞÛÛÍÛÛÍÛÛÝÛÛÛÛÍÛÛÝÍßÛÛÝÞÛÝßßßÍÍÍÍÍÍÛÛÞÛÛ ÛÛ ÛÛÝ ÍÍÍÍÍ
|
|
ÞÛÛÛÛÛÛÛÛÞÛÛÛ ÛÛÛÞÛÛ ÛÛÝÞÛÝÞÛÛÛ ÛÛÛÞÛÛÛÛÛÛÛÝÛÛÛÛÛÛÛ ÛÛÝÞÛÝÛÛÝ ÞÛÝÞÛÛÛÛÛÝÛÛÝ
|
|
"The name speaks for itself!" ÞÝ
|
|
|
|
Presents the
|
|
|
|
Damage, INC. Newsletter
|
|
|
|
August 1998 Issue #11
|
|
|
|
"No Phear."
|
|
|
|
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
|
|
C O N T E N T S :
|
|
|
|
|
|
þ INTRODUCTION - An Introduction to the Damage, INC. Newsletter.
|
|
|
|
þ BIG BROTHER BASHING - Electromagnetic Mind Control Weapons Part 2.
|
|
¯ Search String: {BIG BROTHER}
|
|
|
|
þ BLACKENED'S TIP OF THE MONTH - Social Engineering.
|
|
¯ Search String: {BLACKENED}
|
|
|
|
þ BREAKER'S REVIEWS - Not available in this issue.
|
|
¯ Search String: {REVIEWS}
|
|
|
|
þ CONSPIRACIES AND COVERUPS - Examining the Majestic-12.
|
|
¯ Search String: {COVERUPS}
|
|
|
|
þ CORRUPTION AND GREED - Power industry reformation is required.
|
|
¯ Search String: {GREED}
|
|
|
|
þ CROSSED WIRES - PSYCOSiS BBS Advertisement.
|
|
¯ Search String: {WIRES}
|
|
|
|
þ DRUGS DISCUSSION - Sweet Leaf Dreams and Experiences.
|
|
¯ Search String: {DRUGS}
|
|
|
|
þ H/P INFORMATION AND NEWS - Dialing out through VMBs.
|
|
¯ Search String: {H/P}
|
|
|
|
þ INTERVIEWS AND INTERROGATIONS - Billy Gates: The saga continues.
|
|
¯ Search String: {INTERVIEWS}
|
|
|
|
þ LETTERS TO THE EDITOR - More feedback about the Damage, INC. Newsletter.
|
|
¯ Search String: {LETTERS}
|
|
|
|
þ OBJECTIVE OPINIONS - The ethics of hacking.
|
|
¯ Search String: {OPINIONS}
|
|
|
|
þ REPORTS FROM THE FRONT - Micro$oft Propaganda Bulletin and other articles.
|
|
¯ Search String: {REPORTS}
|
|
|
|
þ SOURCE AND SCRIPTS - Promisc.C source code.
|
|
¯ Search String: {SOURCE}
|
|
|
|
þ THC PHREAK'S TOP TEN LIST - "Hilarious VMB Messages"
|
|
¯ Search String: {TOP TEN}
|
|
|
|
þ THOUGHTS, POEMS AND CREATIVE WRITING - Chaotic/lyrical sound bytes/rants.
|
|
¯ Search String: {WRITING}
|
|
|
|
þ CLOSING COMMENTS - BLACKENED's Captivating Closing Comments.
|
|
¯ Search String: {CLOSING}
|
|
|
|
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
|
|
|
|
|
|
< DISCLAIMER >
|
|
|
|
All articles contained in the Damage, INC. Newsletter are for informational
|
|
purposes only. Damage, INC. is not responsible for how any of the information
|
|
presented is used. It is not intended to be a manual with instructions to be
|
|
followed. We won't be held responsible for any damages caused, illegal acts
|
|
committed etc. by our readers. If/how you use the information given is entirely
|
|
up to you.
|
|
|
|
|
|
< COPYRIGHT NOTICE >
|
|
|
|
All articles and source code contained within this file are (C) Copyright by
|
|
Damage, INC. (unless stated otherwise). No part of this work can be modified,
|
|
reproduced or changed in any way without the expressed written consent of
|
|
Damage, INC. That means, electronically or otherwise, in part or in whole
|
|
this file must not be altered. It cannot be included with any other releases.
|
|
You cannot claim that you wrote it, or alter any articles and source code that
|
|
has been written and Copyrighted by us. Also, do *not* distribute any
|
|
Damage, INC. releases in "packages" with other text files or utilities. They
|
|
must only be distributed alone in their present, original form. You are
|
|
permitted to read and distribute the Damage, INC. Newsletter freely to quality
|
|
h/p boards only.
|
|
|
|
Copyright 1998 by Damage, INC.
|
|
All Rights Reserved.
|
|
_______________________________________________________________________________
|
|
|
|
|
|
INTRODUCTION: Through the darkness, between the states of madness and above
|
|
the countless layers of misinformation. It's August and we're
|
|
flying high again. So, drop a few hits, get out your favourite
|
|
bong, rip open that garbage bag of weed, cut that brick of hash
|
|
with a chainsaw, or just grab your dirty old crack pipe...
|
|
because it's time to start stokin' and tokin' again. ;)
|
|
|
|
Have no phear, there's plenty of dope for everyone. We've got
|
|
an infinite supply of premium bud stashed away in a safe place
|
|
here for you to try. This is the alternate dimension of the
|
|
universe, where nobody knows your name and nobody cares since
|
|
everyone is baked. A true Utopia? That's for you to decide.
|
|
In this realm, the people are all strange and their thoughts
|
|
are their own. Ideas and opinions aren't dismissed for being
|
|
different. Yes, indeed it is an unearthly place to be.
|
|
However, it's where we reside... thriving on the uniqueness
|
|
of what surrounds us. There are no rules and we phear nothing.
|
|
In this world, intelligent beings are free to think and do
|
|
anything. Is it reality or illusion? Dreams and illusions
|
|
aren't lasting. They are transparent realities that can be
|
|
easily shattered. However, thoughts are real. Their energy
|
|
is tangible and powerful. Embrace your "strange", "deviant",
|
|
"weird", "wrong", "unacceptable", "unpopular", "abnormal",
|
|
"psychotic" thoughts and join us in the Damage, INC. zone. ;)
|
|
|
|
|
|
BIG BROTHER BASHING - {BIG BROTHER}
|
|
Electromagnetic Mind Control Weapons Part 2:
|
|
|
|
In the last issue, I wrote an article named EM Mind Control Weapons Part 1
|
|
and stated that I would write Part 2 on the 1990s. Well, here it is. This
|
|
article will describe the EM Weapons of this decade and what Big Brother has
|
|
been working on relating to them.
|
|
|
|
|
|
ACOUSTIC PSYCHO-CORRECTION DEVICES - Supposedly, these devices can alter
|
|
a willing or unwilling person's behaviour after very little exposure by
|
|
transmitting specific commands to their subconscious using static or
|
|
white noise bands. Their intellectual functions aren't affected either,
|
|
so the person won't know that they've been brainwashed. Nor would anyone
|
|
else think that they were, since their level of intellect is unaltered.
|
|
Basically, it's a way of directly accessing a human being's mind. This
|
|
technology was developed by Russian scientists. However, the United States
|
|
is also conducting research and an exchange of information between the
|
|
two countries exists. In fact, using psycho-correction in Waco, Texas
|
|
(on David Koresh and the Branch Davidians) was even discussed. Some people
|
|
believe that some EM Weapons were actually deployed and used against them,
|
|
such as an unusual noise generator etc. I haven't watched the actual tapes,
|
|
so I can't comment on that. But, I won't discount the possibility of that.
|
|
|
|
EM WEAPONS - Electromagnetic fields can affect a person's behaviour, emotional
|
|
state and thought process. This involves stimulating the brain via a carrier
|
|
frequency. It's a technical process that involves using amplitude modulation
|
|
to shape the wave.. which mimics an EEG frequency... imposing theta rhythms on
|
|
the victims. The research and development dates back to the 1960s and 1970s.
|
|
They can easily be used to adversely affect a victim's mind and nervous system.
|
|
Dr. Robert Becker, a person that was nominated twice for the Nobel Prize, and
|
|
a specialist in Electromagnetic effects wrote a report that describes the
|
|
symptoms of limited exposure to microwaves. They include nausea, panic,
|
|
retinal irritation etc.
|
|
|
|
|
|
SLEEPING BEAUTY - A project that involves mind-altering EM weapons for use
|
|
on the battlefield.
|
|
|
|
MONARCH - A project that's supposedly directed towards the creation of severe
|
|
multiple personality disorder in intended victims.
|
|
|
|
There are many other programs and projects underway relating to non-lethal
|
|
weapons (or "less than lethal" as the military refers to them as being).
|
|
Many of these projects in the United States are funded under the U.S.
|
|
counter-drug law enforcement policy, which has a yearly budget of $10+ billion.
|
|
Basically, the resources are just diverted to fund mind control programs which
|
|
can be used to develop weapons for crowd control during riots, or as non-lethal
|
|
anti-personnel weapons. Since they're non-lethal, there isn't any opposition
|
|
to their development and creation. Many of these projects are "black" projects
|
|
and highly classified. You can't obtain any information about them through
|
|
the FOIA (Freedom of Information Act).
|
|
|
|
In conclusion, as I continue to research this topic, gain more knowledge and
|
|
information I'll attempt to keep everyone updated. The most likely scenario
|
|
is that articles on EM Weapons will be included in the Reports from the Front
|
|
section. I'll admit, this article was rushed. However, I intend to do
|
|
everything possible to ensure that readers of the Damage, INC. Newsletter are
|
|
provided with some current information in a future issue. Hopefully this
|
|
short article has opened your eyes about mind control weapons. It's something
|
|
that everyone should be concerned with and informed about in my opinion. These
|
|
weapons threaten our right and ability to think freely. They can be an evil,
|
|
unstoppable weapon in the hands of governments, terrorists and dictatorships.
|
|
|
|
Written by BLACKENED ú Damage, INC. (C)opyright 1998.
|
|
|
|
|
|
BLACKENED'S TIP OF THE MONTH - {BLACKENED}
|
|
Social Engineering:
|
|
|
|
In this article, I will share some tried and tested social engineering
|
|
techniques, tips, ideas and ways to apply them. I'll also explain what
|
|
social engineering is all about, why you should practice before attempting
|
|
to social engineer someone and what the best tactics to use are. Even though
|
|
TJ wrote an article titled 'Social Engineering' for the Damage, INC. Newsletter
|
|
Issue #2, I felt that it was necessary to write this article and share some of
|
|
the finer points of the art. The main reasons are that his article wasn't
|
|
nearly thorough enough, lacked useful information and techniques etc. Overall,
|
|
it wasn't complete and basically just contained his own untested theories and
|
|
ideas. TJ wasn't an experienced social engineer, nor was he a knowledgable
|
|
hacker/phreak. I regret publishing that particular article (as well as the
|
|
'Motivational Neophyte Blurb' that TJ wrote). In fact, I apologize for making
|
|
the mistake of including articles such as those, that weren't informational
|
|
or what I'd deem to be quality. I can assure you that oversights such as
|
|
that won't ever happen again though. Therefore, the topic of social engineering
|
|
has to be revisited and explained properly. Hopefully by writing this article,
|
|
the previous 'Social Engineering' article can be overlooked, ignored and perhaps
|
|
even forgotten. I sincerely hope that it doesn't need to be mentioned again.
|
|
|
|
Most of you have probably read about social engineering or heard the term
|
|
used by others already. However, you may not know what it means. Or, you
|
|
may even think that it's not worth learning the skill and becoming an
|
|
experienced social engineer. To be blunt, you're wrong if you believe it's
|
|
not an important aspect of h/p, because it most definitely is. Just as a night
|
|
of trashing can provide useful, valuable information/hardware, a few minutes of
|
|
social engineering can save you a tremendous amount of time hacking. ;)
|
|
|
|
|
|
Social Engineering - My definition of social engineering isn't a very complex
|
|
one. In my opinion, it simply means using your mind and being able to think
|
|
of quick responses during any situation to persuade, influence, trick, scam,
|
|
fool, dupe, verbally hack/exploit in order to gain information, access to
|
|
systems etc. Basically, it's fast thinking and conning an intended mark out
|
|
of what you seek. The goal is to get them to believe you, do what you want them
|
|
to do and release information that they otherwise wouldn't/shouldn't give out
|
|
to anyone. It's about obtaining information that you wouldn't otherwise be able
|
|
to access easily or would be too time consuming to pursue. Social engineering
|
|
is a useful means of doing that for hackers/phreaks. It's also something that
|
|
requires creativity, improvising, experience, knowledge and most importantly,
|
|
intelligence. You must be an intelligent person in order to be a successful
|
|
social engineer. However, if you want to read someone else's definition, then
|
|
read the Social Engineering FAQ that exists. I just don't feel that text files
|
|
such as that adequately describe what it means, so I decided to define the term
|
|
'social engineering' in my own words for readers. In essence, it basically
|
|
means "bullshitting" if you want the blunt, true, unrefined, rarely stated
|
|
explanation/meaning of it. ;)
|
|
|
|
|
|
Techniques to try:
|
|
~~~~~~~~~~~~~~~~~
|
|
|
|
þ Sometimes social engineering a slow mark can be quick and easy. In fact, I've
|
|
seen it done (to acquire a password for a UNIX system) in 2 minutes or less.
|
|
Therefore, don't assume that you have to carry on a long conversation with
|
|
the mark before asking for any important information. Try to catch them
|
|
off guard by calling and identifying yourself as "Jim Robertson". Tell
|
|
them that you're an employee that's been on vacation in California for the
|
|
past two weeks. Explain that you've somehow forgotten your password. Or,
|
|
if you need a 'security' password to login on their UNIX system, tell them
|
|
that the password has been changed/forgotten... and that you can't access
|
|
your account to do your work. Let them know that you want to be able to call
|
|
remotely and finish working on an "important project" during the weekend.
|
|
|
|
þ Dial up your mark (financial service companies are an especially good mark
|
|
for this technique). Express an interest in their company. Tell them that
|
|
you'd like to become a client of theirs and have inherited some money that
|
|
you wish to invest. Ask them questions about their company. Write down
|
|
their answers. Make them believe that you're very interested in the service
|
|
that they provide. They love talking to prospective clients. The mark will
|
|
start to trust you and treat you as though you're already a client/customer
|
|
of theirs. Then, say that you really want to try out the service first etc.
|
|
and explain that a greedy corporation ripped you off in the past. Play the
|
|
part of an innocent victim. If they want your business, and you're
|
|
believable, they'll allow you to do that... by providing you with any
|
|
information/login/password. Perhaps you'll be given a guest account to try
|
|
out their investment service or whatever they offer. Plus, you'll at least
|
|
have some basic information about their company to use against them at a later
|
|
date if needed.
|
|
|
|
þ Select your mark and say "This is Robert Harpo of the New York remote
|
|
office/station... We're having problems logging into the server. We've
|
|
had problems with our network today. Some of our systems have been infected
|
|
by a virus. We've lost data... There are missing/corrupted/files etc. and
|
|
one of them contained passwords. Our clients are relying on us and we
|
|
may lose profits due to the virus attack." etc. Sound like you're worried
|
|
and that it's a major problem. Tell them the server crashed if you want,
|
|
that a trojan nuked it, that there are configuration/compatibility problems
|
|
with the network, or with retrieving certain data files. ;) Then ask for
|
|
the password needed to login on their server. If you know what cities they
|
|
have offices in, the address etc. then this technique should work perfectly.
|
|
Pretend that you're doing your job and make sure it sounds like you're in a
|
|
large office building with other people working away at terminals. As in,
|
|
the sound of a keyboard clicking overheard in the background can be very
|
|
effective at fooling the mark.
|
|
|
|
þ Call up your mark (at a large corporation with many employees) and identify
|
|
yourself as "Richard Johnson. Human Resources Assistant." or whatever
|
|
job title you want. Then instruct the mark to setup an account for the
|
|
newly hired "Thomas Gibson"... with a password of "gibson". Assure them
|
|
that the new employee will be instructed to change their password for
|
|
security reasons etc. Say that you've been busy reading the resumes of
|
|
applicants and conducting interviews, information sessions etc. all day.
|
|
Make sure you call just after lunch hour, and say that you haven't even
|
|
had a chance to eat lunch yet. ;)
|
|
|
|
þ Phone the mark and tell them that there's a problem with *their* server.
|
|
Explain that it's not accepting the password that you type. Tell them
|
|
that it's urgent that you access the system and retrieve a report that
|
|
you wrote. Sound desperate, but business-like. Pretend to be an employee
|
|
and try to con the password out of them by saying that you work in
|
|
the "marketing department" and that "you need the information ASAP for
|
|
a meeting that's scheduled today." etc. This technique isn't for accounts,
|
|
but rather for obtaining the password to access the system. If you know
|
|
anything about the corporation, such as what they produce, how they
|
|
advertise etc. use that in your "marketing report" scam...
|
|
|
|
þ First, go trashing and try to obtain an employee list for the company that is
|
|
your target. If it contains hired on dates, choose a new employee's name
|
|
that was hired within the last few days/week. Then, call up your mark
|
|
and tell them that you're a new employee and haven't been given an account
|
|
yet. Give them the 'borrowed' name and a password etc. If they tell you that
|
|
you've already been given a login and password to use, explain that you
|
|
weren't personally notified. Tell them that Human Resources said you'd be
|
|
assigned an account, but never got back to you. Say that you've been in
|
|
training and that it's been a hectic, stressful week etc. Apologize profusely
|
|
for the time and hassle (inconvenience) that this misunderstanding has caused
|
|
them. However, remain calm and speak in a polite voice. They'll probably
|
|
reply with "That's okay." Thank them for their help. Soon you should have
|
|
an account (login and password) to use on their system.
|
|
|
|
þ There are also social engineering techniques in which the telco is involved,
|
|
and you identify yourself as being a linesman, technician... or an operator.
|
|
Or, if you're very confident, have the ability and your mark is stupid,
|
|
sometimes the "I'm a security consultant/specialist/worker" scam works. ;)
|
|
Demonstrate to the mark that you know what you're doing, and they'll be more
|
|
than willing to help you get information etc. Sometimes you can even persuade
|
|
them into believing that you're helping them. I'm sure that you get the idea
|
|
by now though.
|
|
|
|
|
|
Note: Using your own ideas, techniques, scams etc. is always best. Only
|
|
telephone social engineering techniques were discussed. There are
|
|
also ways to social engineer by mail, internet Email and in person.
|
|
Most of the examples given were for gaining access to UNIX systems.
|
|
They're just tips, and not an instruction manual on how to social
|
|
engineer *anyone* you want. You must develop some of your own unique
|
|
techniques and apply them to the appropriate situations. Some of mine
|
|
are patented, and I chose not to reveal them to everyone. Also, you
|
|
may want to divert your calls (by using a diverter or dialing through
|
|
a VMB that you know diverts) as a precaution as well. ;)
|
|
|
|
|
|
Things to remember:
|
|
~~~~~~~~~~~~~~~~~~
|
|
|
|
þ You must remain calm and be confident while social engineering someone over
|
|
the phone, or in person. No Phear. ;)
|
|
|
|
þ You have to be comfortable using the social engineering technique/scam that
|
|
you've chosen to use. So, practice it many times on friends while talking
|
|
on the phone. Learn how to play mind games on them. Eventually, conning
|
|
people that are total strangers won't seem so difficult anymore.
|
|
|
|
þ Some social engineers like to have everything carefully planned out, written
|
|
down on paper, know as much as possible about their mark and don't like to
|
|
improvise at all. In other words, they follow a script that they created
|
|
beforehand. They're almost like telemarketers. If you're that uncomfortable
|
|
or ineffective at social engineering, then you might as well quit now.
|
|
If not, then play off what your mark says to you. Improvise and use the
|
|
spontaneous responses to your advantage. It'll sound more realistic that
|
|
way, like a normal conversation. Basically, you have to be able to make shit
|
|
up as you go along and feed your mark believable bullshit. Speak to them
|
|
naturally, in a normal tone of voice... instead of reading from a script.
|
|
Try to be real, not a fake that they'll be able to detect. Gain their trust
|
|
and then use it against them to get the information that you seek.
|
|
|
|
þ Be courteous and polite with whoever answers the phone. In most situations,
|
|
you should act business-like and mature. Avoid using any slang, swear words,
|
|
poor grammar etc. at all times. For example, do not say "Hello. Like, ummm
|
|
I really need a password to access your UNIX system d00d. Do ya think ya
|
|
can help me? Uhhh... Please? Duh..." Basically, don't talk like a warez
|
|
d00d and act stupid.
|
|
|
|
þ Knowing your mark can be very important in certain cases. You can obtain
|
|
information by trashing, and then reading documents. Or, you can get
|
|
someone else to social engineer them for basic company information first,
|
|
several days before you call. That way, you will have some names, phone
|
|
numbers, basic company information, contacts, companies that they supply,
|
|
work with or are affiliated with etc. already when you call to social engineer
|
|
them for 'security' information such as a password to login.
|
|
|
|
þ Scanning can definitely benefit you in your social engineering endeavours.
|
|
If your target is a large UNIX system, and you scan around (+50 and -50
|
|
numbers above/below the number usually works)... then you should be able to
|
|
find the root system. Once you find a line with a person that answers voice,
|
|
you will already have some basic information about their company that you can
|
|
use against them.
|
|
|
|
þ Consider your mark to be your opponent/adversary. Don't have mercy or
|
|
pity on them. Don't show any weakness. Never assume that they're not
|
|
intelligent or that you can easily social engineer them. Be aggressive and
|
|
act as though you're just doing your job if they start asking a lot of
|
|
prying questions. Say whatever is required to make them believe you. In
|
|
fact, pressure them. Force them into believing you. Sometimes you'll have
|
|
to become angry with them if they doubt your authenticity. At that point,
|
|
sometimes a verbal assault is the key to getting them to apologize and give
|
|
you whatever you originally asked for. When asking for information, don't
|
|
hesitate. Be assertive. Don't let them cut you off while you're speaking.
|
|
Make sure you clearly state what your intentions are and what you want.
|
|
However, they'll obviously ask certain questions that you'll have to provide
|
|
them with answers to... such as what your name is, what company you work
|
|
for, what job position you hold etc. So, have something prepared or at
|
|
least an idea of how to answer any questions that you know you'll be asked.
|
|
|
|
þ Whatever personal/company information you use cannot sound fake, or it won't
|
|
work. Therefore, take the time to choose an appropriate name, an authentic
|
|
company name etc. Never try to use shit like "Hello. This is Joe Hax0r of
|
|
Killroy & Killroy Co. I'm doing research on..." or "Hello. My name is
|
|
Harry Black. I'm a University student. The reason I called is that I'm doing
|
|
a project and would like some information about your company for a term paper
|
|
on Macro Economics that I am writing. Can you provide me with anything?
|
|
Thanks in advance." or "Hi, I'm having difficulty logging into the system.
|
|
I'm... ummm... Rick the Admin guy." etc. That shit won't fool anyone.
|
|
|
|
þ The "I'm a new employee with the company and I forgot the password." type
|
|
of social engineering attack isn't the greatest and it lacks imagination.
|
|
It's also quickly becoming obsolete. That is, unless you've gone trashing
|
|
or obtained an employee list through some other means. Then it may work,
|
|
if you sound/act the part... by apologizing profusely, chatting with the
|
|
mark and letting them know that you won't forget it again. Basically,
|
|
reassure them that it's all your fault and say "I can't believe I forgot the
|
|
password. I went to login and my mind was blank." Try to get them to pity
|
|
you. Boost their ego in the process, and the mark will feel good about
|
|
helping a lowly 'clueless' new employee out. Avoid using it often though.
|
|
Never rely on that story to work every attempt either.
|
|
|
|
þ Don't be greedy. If you start asking them for too much information, too
|
|
quickly, you won't be given anything at all. Plus, it can alert the mark
|
|
about what you're attempting to do. Once they're "on to your scam" they
|
|
aren't going to give you any assistance at all. That is, at least not on
|
|
that particular day. ;) If you become too greedy, and want information
|
|
right away, you may find that you are successful at social engineering
|
|
people less and less.
|
|
|
|
þ Try not to act nervous or suspicious. I realize that some people may not
|
|
be able to control their emotions, but it's critical that you do. Otherwise,
|
|
you'll fail at social engineering, time and time again. So, you must
|
|
learn to be at ease while scamming your mark. Obviously, you want to be
|
|
as convincing as possible and not draw any suspicion. There's no way to
|
|
teach how that's accomplished. Nor is there any great advice that can be
|
|
given regarding how to avoid nervousness. I can't tell you how that's done.
|
|
Also, don't be hyper and start talking fast. If they can't understand you,
|
|
and have to ask you to repeat yourself... they'll become suspicious.
|
|
|
|
þ Good liars don't necessarily make great social engineers. In other words,
|
|
habitual liars aren't always so adept at being able to social engineer
|
|
for certain types of information. Sometimes, knowledge is required in
|
|
order to be successful and it was attained through a means other than
|
|
lying. Basically, the point is that lies can only take you so far, even
|
|
in relation to social engineering for information.
|
|
|
|
þ If you have a high pitched voice, one that crackles or is in the process of
|
|
changing... you won't pass for an adult. So, you're only option is to buy a
|
|
voice changer. It'll alter your voice so that it sounds deeper to your mark.
|
|
That way, they won't say "Who are you? How old are you? Is this a prank?
|
|
Listen kid, I don't have time for this shit. Go play Sega/Nintendo." ;)
|
|
|
|
þ Background noise (such as music that wouldn't be playing in an office),
|
|
street noise (if you're using a pay phone), dogs barking, kids crying,
|
|
people talking loudly or yelling etc. can destroy your efforts at social
|
|
engineering someone. Try to eliminate those types of noises if at all
|
|
possible, as they can adversely affect what you're trying to do.
|
|
You won't be believed by your mark if your friend is laughing in the
|
|
background either.
|
|
|
|
|
|
In conclusion, social engineering is a valuable tool/skill to possess. It's
|
|
a powerful skill that has to be developed. Some people are born "natural
|
|
social engineers". It's a talent that they've always had... but they still
|
|
work on honing their skills, practice their craft and have made it into
|
|
a legitimate art. Watching and listening to someone successfully social
|
|
engineer their way to gaining access to a system is such a thing of beauty.
|
|
Just as, the rush that you get after social engineering someone yourself
|
|
is amazing. You can allow your creativity to emerge, use your imagination,
|
|
react to the situation, respond quickly to questions and trick your mark
|
|
into believing or doing whatever you want. By now, it should be obvious to
|
|
you that I enjoy social engineering. ;) It's a learning process that takes
|
|
time and is challenging though. However, it has great benefits and the
|
|
experience gained can be extremely rewarding.
|
|
|
|
Written by BLACKENED ú Damage, INC. (C)opyright 1998.
|
|
|
|
|
|
CONSPIRACIES AND COVERUPS - {COVERUPS}
|
|
Examining the Majestic-12.
|
|
|
|
Do you believe that a UFO crashed near Roswell, New Mexico? Do you believe
|
|
it is possible that aliens are living in hidden bases deep beneath the Earth?
|
|
Have you heard of the Majestic-12, and the leadership role they have played in
|
|
covering up the existence of aliens, and the aliens' relationship with the
|
|
United States? If you haven't, I'll give you a basic introduction to what could
|
|
very well be the greatest conspiracy and coverup perpetrated in human history.
|
|
All I ask of you, the reader, is that you have an open mind. This conspiracy is
|
|
so great that very little information/evidence has been uncovered.
|
|
|
|
As always, the best place to start is the beginning. When did the U.S.
|
|
Government, through their agents, initiate first contact with aliens? The
|
|
answer to that question is revealed in a leaked document with MAJIC security
|
|
clearance. On June 24, 1947 a civilian pilot saw nine flying disc-shaped
|
|
aircraft, while he was flying over the Cascade Mountains in Washington state.
|
|
The flying saucers were flying extremely fast in standard formation. Unlike
|
|
previous UFO sightings, this one was widely reported by the mass media. After
|
|
this, there were hundreds of people coming forward to report their sightings of
|
|
UFOs like the flying discs. What worried the U.S. Government is that many of
|
|
the sources came from military officers and civilian leaders. Various branches
|
|
of the U.S. military reacted by initiating their own investigations. Witnesses
|
|
were "interviewed". The U.S. military also tried to engage the flying discs,
|
|
but they failed miserably. Unfortunately for us, the coddled, weak-minded
|
|
public would border on hysteria at various times.
|
|
|
|
The U.S. Government knew very little about these flying discs. There simply
|
|
wasn't an opportunity for anyone to gain any new information. I am referring to
|
|
the now famous (perhaps infamous) Roswell incident. One night a rancher local
|
|
to Roswell reported that he saw a flying disc crash, at a location that was
|
|
approximately seventy-five miles northwest of the Roswell Army Air Base.
|
|
|
|
On July 7, 1947, The U.S. Government initiated a secret operation to recover the
|
|
wreckage of the "flying saucer" for scientific study. However, there is another
|
|
bit of information that many people that have studied the Roswell incident may
|
|
not know. The reason that many Roswell residents could not confirm seeing
|
|
aliens is that they ejected from their craft. Four small human-like beings were
|
|
found approximately two miles away from the crash site. There are conflicting
|
|
reports as to whether there was a surviving alien or not, but that could be the
|
|
subject of another article. The most important point of this incident is that
|
|
alien corpses and artifacts were recovered by the U.S. military. Roswell
|
|
citizens were then interviewed (and in some cases silenced by various threats)
|
|
and the weather research balloon coverup was construed.
|
|
|
|
In order to deal with this critical situation, some of then-President Truman's
|
|
closest advisors recommended the creation of a "Top Secret Research and
|
|
Development/Intelligence operation responsible directly and only to the
|
|
President of the United States." The name of the Operation is OPERATION
|
|
MAJESTIC-12. The Majestic-12 was established by Truman's executive order on
|
|
September 24, 1947. The Majestic-12 are literally twelve people. The
|
|
Majestic-12 are a team of military leaders, political leaders, and scientists
|
|
that are at the top of their respective fields. Each member is designated a
|
|
codename. Their leader is MJ-1, which falls upon the Director of the CIA. The
|
|
reason why I will not use "MJ-12" as an abbreviation is because MJ-12 is a
|
|
person, not an abbreviation for the Majestic-12. At different times, they may
|
|
be called upon to use their talents to evaluate alien information, technology,
|
|
biology, and other factors involving alien beings. When the Majestic-12 are
|
|
called into action, only members with the proper skills for the project are
|
|
given any information. The information the Majestic-12 is given is controlled
|
|
by MAJI.
|
|
|
|
MAJI stands for the MAJESTIC AGENCY for JOINT INTELLIGENCE. This group is in
|
|
total control of dealing with all alien concerns. That includes contact with
|
|
aliens, national security and intelligence, and of course providing
|
|
disinformation to prevent "outsiders" (us) from discovering the alien presence
|
|
within the United States. All MAJI documents are classified "MAJIC", which
|
|
means MAJI Controlled. MAJI, like the Majestic-12, report directly to the
|
|
President, and is thought to be based in Washington DC.
|
|
|
|
All alien information is processed under the large umbrella of what is known as
|
|
"PROJECT GRUDGE". Under Grudge, there are various child projects that deal with
|
|
specific courses of action to control the alien presence. Below I will give
|
|
you information on various projects that are at the heart of this coverup.
|
|
|
|
AQUARIUS: This project has been active since the United States' first contact
|
|
with UFOs, as well as contact with IACs (Identified Alien Crafts).
|
|
This project was born in 1953, and is under the control of MAJI and
|
|
the CIA. The purpose of Project Aquarius was to collect all
|
|
scientific, technological, medical and intelligence information from
|
|
UFO/IAC sightings and contacts with aliens. Information obtained
|
|
from Project Aquarius is what has given the United States its world
|
|
superiority in space flight and military aircraft.
|
|
|
|
AQUARIUS/
|
|
PLATO: Project Plato's mission was to establish diplomatic relations with
|
|
aliens. Under this project, diplomatic relations with alien races
|
|
were established and a pact was formed. The U.S. took alien
|
|
technology in exchange for agreeing to keep out of the aliens'
|
|
affairs on Earth. The U.S. also agreed to keep the existence of the
|
|
aliens' presence a secret. Project Pounce is an offshoot of Project
|
|
Plato. Project Pounce's mission is the secret crash recovery of all
|
|
aliens, and their craft.
|
|
|
|
AQUARIUS/
|
|
SIGMA: This project's goal was to establish communication with the aliens.
|
|
The goal was achieved in 1959, when primitive forms of communication
|
|
were established. Subsequent encounters with aliens under Project
|
|
Sigma have continuously improved communication with the aliens.
|
|
Project Sigma is viewed by MAGI to have been successful.
|
|
|
|
GRUDGE/
|
|
REDLIGHT: Project Redlight's purpose was to test fly recovered alien craft.
|
|
This project continues in Nevada (at Area 51/Dreamland). Project
|
|
Snowbird is a child project of Project Redlight. Project Snowbird's
|
|
objective was to create flying discs using conventional technology as
|
|
an excuse for the high number of flying disc sightings that were
|
|
being reported.
|
|
|
|
There are many more projects that deal with weapons development, and defense
|
|
strategies against the aliens, etc. However, they aren't as important as the
|
|
projects listed above. The United States have been harbouring and supporting
|
|
aliens for almost 50 years. Recently, in the last year the U.S. Government,
|
|
along with the U.S. Air Force has tried to coverup the Roswell incident yet
|
|
again. They now claim that there weren't any alien bodies recovered, but that
|
|
dummies that resemble human beings, that were used in an experiment were all
|
|
that the Roswell witnesses observed. Basically, they're still denying the
|
|
truth. They have cut deals with the aliens with their own self interests in
|
|
mind. Meanwhile, reports of alien abductions haven't decreased at all. In
|
|
fact MAJIC knows *and allows* the aliens to abduct humans, as long as they
|
|
provide MAJIC with the names of the victims. MAJI has sold us out to races of
|
|
aliens that plan to use us for their own ends. In my opinion, the greater sin
|
|
that the U.S. has committed is the fact that they are covering up every bit of
|
|
information. If there are alien "visitors" on our planet, we have a right to
|
|
know. Not all of us are weak-minded zombies. I'd personally rather face my
|
|
fate, than to be stabbed in the back and kept in the dark.
|
|
|
|
I hope that you have found this article to be interesting and informative.
|
|
I felt it was important for me to write this article. Of all the conspiracies
|
|
within Washington, none have been covered up like the existence of aliens within
|
|
the United States. A lot of disinformation is out there in various mediums. I
|
|
believe that we will eventually be exposed to "hard facts" of the existence of
|
|
aliens on our planet. At this point, it's difficult to know what to believe
|
|
and what not to believe. Unfortunately, the naive will be caught totally off
|
|
guard if the alien races' intentions are malevolent.
|
|
|
|
Written by Blackie Lawless ú Damage, INC. (C)opyright 1998.
|
|
|
|
|
|
CORRUPTION AND GREED - {GREED}
|
|
Power industry reformation is required.
|
|
|
|
Despite all of the advancements that've been made in the fields of science and
|
|
technology, there have been very few in the generation of the electricity and
|
|
fuels needed to power everything. Why is that? Why has power generation
|
|
technology taken so long to advance? Why do we still heavily rely on limited
|
|
resources for power? One would think that with finite natural resources, more
|
|
ingenious ways would be developed to provide clean electric power.
|
|
|
|
Actually, there are inventions that tap into free, natural energy sources. For
|
|
example, U.S. Patents have been awarded for motors that contain permanent
|
|
magnets. According to my research, the magnets within the motor tap into the
|
|
energy within the Earth's magnetic field. This provides the motor with a nearly
|
|
unlimited fuel source, so that conventional fuels (oil, gasoline, etc.) aren't
|
|
required. Can you imagine the potential if we could all have an electric
|
|
generator based on a magnetic field powered motor? If you are an intelligent,
|
|
enlightened person, I'm sure you understand the implications of that. We would
|
|
no longer have to pay a government or corporate power utility for electricity,
|
|
but *we* could be in control of our own independent power source! After the
|
|
initial investment, a generator powered by the Earth's magnetic field would pay
|
|
for itself extremely quickly.
|
|
|
|
Free energy inventions have been repressed for decades now. An Austrian civil
|
|
engineer named Viktor Schauberger invented, and with limited funds began to
|
|
develop what's called an "Implosion Turbine." Water is pumped by an Impeller
|
|
pump through a Logarithmic-Spiral shaped coil of tubing until it reaches a
|
|
critical velocity that causes the water to implode. The water moves so fast
|
|
that it no longer touches the inside walls of the tubing. The force of the
|
|
implosion drives the pump, which causes the pump's motor to become an electric
|
|
generator. Dan A. Davidson, an author that wrote about the Implosion Engine in
|
|
1977 says, "The device seems to be tapping energy from that of the Earth's
|
|
rotation, via the "Coriolis effect", like a tornado." In essence, it uses
|
|
the Earth's own gravity, in conjuction with its rotation to create a viable
|
|
means of sustained power. Basically, tremendous spinning forces can be used to
|
|
artificially create gravity. The most sickening fact is that Viktor Schauberger
|
|
invented the Implosion Engine during the 1930s. However, he didn't have the
|
|
funds or support to complete his work.
|
|
|
|
Are you skeptical about the existence of inventions that can tap into the
|
|
natural energy of the Earth? Hopefully, you will be more tolerant of an
|
|
invention with tremendous potential. A Bulgarian-born American Physicist named
|
|
Joseph Maglich invented and partially developed an atomic fusion reactor that he
|
|
named "Migma." An amazing fact is that Migma uses nonradioactive deuterium as
|
|
fuel. Nonradioactive deuterium is readily available in sea water. Obviously,
|
|
there's more sea water on this planet than we could ever use. If Migma were
|
|
fully developed, Maglich stated it would produce no radioactive waste, and is
|
|
designed not not to require a turbine to generate electricity. (According to
|
|
what I have read, Migma generates electricity itself, without any external
|
|
turbines, etc.) He also said that Migma could be built to fit in a single
|
|
house, or large enough to power an entire city. One source stated that
|
|
Maglich's partially developed Migma works, generating "three watts of power
|
|
for every watt put in."
|
|
|
|
You may be wondering why these devices haven't been developed and mass produced
|
|
for our benefit. What would benefit the average person does not benefit the
|
|
corrupt fat cats in the power and fuel industries. Governments also have a hand
|
|
in blocking any new, superior power generation technologies from being
|
|
developed. All factions involved in the current way that power is generated
|
|
and distributed are making a tremendous amount of wealth, and wield a lot of
|
|
influence. Free energy motors and other inventions would destroy them. The
|
|
potential that these, and many other power/electricity generating devices have
|
|
is enormous. Coal burning stations, nuclear reactors, oil refineries... they
|
|
would all become instantly obsolete. We could be in control of our own power
|
|
sources. Plus, the environment would also benefit. As I mentioned in the
|
|
examples above, none of them claim to produce any harmful gases, radioactive
|
|
waste, etc. So, the levels of air, water and ground pollution would be far less
|
|
than they currently are.
|
|
|
|
Governments and huge, multinational energy/fuel companies have been extremely
|
|
aggressive in eliminating such threats to their cash cow monopoly. Inventors
|
|
have been denied patents from their government. Then a "threatened" company
|
|
would patent that inventor's creation so that it can never be developed and mass
|
|
produced for our use. Other inventors have been bribed, threatened, or their
|
|
work is "mysteriously" destroyed. The reason for the collusion and between
|
|
governments and energy/fuel companies is greed. Tremendous profits are
|
|
generated by efficiently run private operations. Governments also reap
|
|
tremendous amount of tax money from these industries. In many areas,
|
|
electricity is a government controlled industry. They control it and supply
|
|
their citizens with electricty. Therefore, they'll do anything in order to
|
|
prevent people from becoming self-sufficient. Indeed, they want citizens to
|
|
rely on them for their basic needs. In Ontario, as an example, let's say that
|
|
the refinery sells some gasoline to a gas station. The price that day is 21.35
|
|
cents/litre. The Ontario government slaps on a 14.70 cent/litre "Fuel Tax."
|
|
Then the Canadian government adds on a 10 cent/litre "Excise Tax." Finally,
|
|
the Federal Goods and Services Tax (GST) of 7% is added. The GST is applied to
|
|
the Provincial Fuel Tax and the Federal Excise Tax as well as the base price to
|
|
the gas station. That increases the price to the consumer tremendously. It
|
|
starts off at 21.35 cents/litre and goes to 49.3 cent/litre (and that's without
|
|
adding the gas station's profit of a few cents). If a car with a water,
|
|
air, or magnetic field powered engine was manufactured, that tax money would
|
|
remain in our pockets (until new taxes were created to replace the old taxes
|
|
mentioned above...). However, it might be more difficult for them to tax
|
|
those natural elements. :-)
|
|
|
|
Although tax dollars are important to them, control over the zombies is
|
|
paramount. Big Brother wants every house to have electricity and be connected
|
|
to his power grid. That way, Big Brother is in total control of the power
|
|
switch. If we all had independent power sources, Big Brother wouldn't be able
|
|
to shut off your electric power before busting down your door, or monitor how
|
|
much power you use as easily as they can right now.
|
|
|
|
It is a horrible state of affairs when the pursuit of greed and power by a
|
|
corrupt few can do so much damage. What is even worse is that their efforts
|
|
to prevent all of us from obtaining free electric power have been successful.
|
|
There aren't very many people that know about all of the inventions that have
|
|
been hidden or eliminated. That is why I have written this article. I want to
|
|
make sure that everyone is informed that there are people out there that are
|
|
suppressing new and old, superior technologies for their own short-sighted,
|
|
greedy purposes. They also live with great fear in their hearts, as the death
|
|
of their industry looms before them.
|
|
|
|
---
|
|
While doing research for this article, I found some references that I was
|
|
unfortunately unable to obtain. If you have access to the following sources
|
|
(and wish to learn more about the inventions I wrote about), check them out:
|
|
|
|
"Science & Mechanics" magazine, Spring 1980, ("Amazing Magnet-Powered Motor", by
|
|
Jorma Hyypia, pages 45-48, 114-117, and front cover).
|
|
|
|
Implosion Turbine: "A Breakthrough to New Free-Energy Sources",
|
|
Dan A. Davidson, 1977.
|
|
|
|
Migma: "New Times" (U.S. version), 6-26-78, pages 32-40.]
|
|
|
|
Written by Shatazar ú Damage, INC. (C)opyright 1998.
|
|
|
|
|
|
CROSSED WIRES - {WIRES}
|
|
|
|
If you'd like to advertise your h/p board or net here, contact us at
|
|
damage_inc@mailcity.com and attach an ascii advertisement to the message.
|
|
Advertisements must not exceed 4 pages in length and 80 columns in width.
|
|
|
|
|
|
Special Access for long distance users
|
|
.sS$$$$$ý$$$Ss. If you are into h/p give it a call.
|
|
`$$$$$$$. `$$$$$.
|
|
`$$$$$$$. `$$$$ Running Mystic BBS Software
|
|
$$$$$$$$$. `$$$ up and running 24/7
|
|
$$%$!$$$$' .$$' (519) 742-6899
|
|
$$$$$$$$$sSý'
|
|
$$$$$$'
|
|
$$$$$$ $$$$$$$Ss.`$s,.. ..,s$'.sSý$Ss. .sS$ý$Ss. $$$$$$Ss. $$$$$ $$$$$$Ss.
|
|
$$$$$$ $$$$ù~"ý$$ $$$$$ $$$$$ $$$ $$$$ $$$$.`$$$ $$$$~"ý$$ $$$$$ $$$$~"ý$$
|
|
$$$$$$ `$$$s,. `$ $$$$$.$$$$$ $$$ $ý'~ $$$$$ $$$ `$$$s,.`$ `ýSý' `$$$s,.`$
|
|
$$$$$$ , `$$$Ss.ï `ýS$$$$$$$$ $$$ .,s$ $$$$$ $$$ ,`$$$$Ss. $s.s$ ,`$$$$Ss.
|
|
$$$$$$ $, `$$$$$ $s,...$$$$$ $$$ $$$$ $$$$$ $$$ $, `$$$$$ $$$$$ $, `$$$$$
|
|
$$$$$$ $$s,..$$$$ $$$$$$$$$$$ $$$ $$$$ $$$$'.$$$ $$s,.$$$$ $$$$$ $$s,.$$$$
|
|
$$$$$$.`ýS$$$$Sý' $ý"~ùùù~"ý' `ýSs$Sý' `ýS$s$Sý' `ýS$$$Sý' `ý$ý' `ýS$$$Sý'
|
|
$$$$$$$
|
|
$ý"ý$$$
|
|
`$$
|
|
`$
|
|
'
|
|
PSYCOSiS BBS is now online. :) If you'd like to get access, leave me
|
|
Email at fatalvis@iname.com or just call the board and page.
|
|
|
|
|
|
DRUGS DISCUSSION - {DRUGS}
|
|
Sweet Leaf Dreams and Experiences:
|
|
|
|
It's sometimes called the elusive weed by law enforcement. Most often though,
|
|
they call it pot or dope. Ah yes, that wonderful plant... cannabis. That
|
|
beautiful green plant, with its sweet leaf. Those perfect buds. With that
|
|
intoxicating fragrance. That amazing flavour. It's simply too sweet. In fact,
|
|
it should be grown everywhere with a mandatory minimum for THC content. Yes,
|
|
I'm speaking about marijuana. Yes, indeed it's the best plant of all! :)
|
|
|
|
Let me tell you about some of my drug experiences, especially the ones that
|
|
involve the sweet leaf. Afterall, sharing drug experiences is part of what
|
|
the Drugs Discussion section is about.
|
|
|
|
Sure, I've tried other drugs. I've experimented with acid, heroin etc. I
|
|
have smoked hash, oil and done shrooms countless times. However, there's
|
|
just nothing better than smoking a big, fat joint in my opinion. That's where
|
|
it's at. Why? Well, it's calming and soothing for one thing. I find that
|
|
I can collect my thoughts, think clearly and get back my creativity. I don't
|
|
toke to get away from my problems. Nor does it provide me with answers and
|
|
solutions. I don't think of it as an escape or a way to avoid reality. And I
|
|
definitely don't smoke weed in order to be cool. It's a pure, basic, primal,
|
|
honest experience. I really enjoy it, and don't see any harm in smoking up now
|
|
and then. Well, actually my 'habit' of smoking pot is almost a daily ritual
|
|
now. That's okay though. Why? I haven't experienced any harmful side effects
|
|
at all. It hasn't suddenly made me into a lazy 'stoner' that's permanently
|
|
baked or burned out. I've been able to accomplish more in the last few months
|
|
than when I wasn't smoking marijuana on a regular basis. It has been beneficial
|
|
to me, instead of the myth that it will make you into a dope if you smoke
|
|
too much or too often.
|
|
|
|
Now that I've explained a few things and given some reasons as to why I
|
|
smoke marijuana, I'll describe some of the drug experiences that I've had
|
|
with the sweet leaf. :)
|
|
|
|
One of my fondest memories is of smoking weed with some friends at an old,
|
|
abandoned school. We were downtown that night and picked up some weed from
|
|
a local dealer behind an arcade. We all decided to go to the school to roll
|
|
some joints and smoke it. The building was old, it was about midnight and
|
|
I was much younger. The whole experience was new to me, as it was only the
|
|
second time that I'd smoked a joint. Sure, I'd smoke hash before and took
|
|
a few drags off of joints that were passed around. But I had never really
|
|
gotten much more than a buzz... and didn't smoke enough. This time was
|
|
different though. Everyone in the group smoked until we were baked... and we
|
|
sat there, drinking, smoking up, talking for hours. Nobody was around so we
|
|
were able to sit out on the old fire escape balcony without worrying about a
|
|
cop busting us. The memory of that night is still vivid in my mind, and
|
|
it's something that I don't think I'll ever forget. We shared stories and I
|
|
was at peace... one with the other members of the group. I think the dope
|
|
was at least partially responsible for us being able to open up and talk so
|
|
openly about things with each other. Basically, it was comfortable and I
|
|
felt free. It was just a feeling that I had that particular night that lasted
|
|
the duration of our gathering. It was more than getting 'high'. There was good
|
|
karma. That may sound lame, but it's the truth. It's the feeling that smoking
|
|
weed gave me. I fucking loved it. That is probably what attracted me to
|
|
marijuana, made me continue to smoke it and fed my desire for it.
|
|
|
|
Perhaps I'll share some other drug experiences in a future article. Hopefully
|
|
you enjoyed reading this article. I also hope that everyone understands the
|
|
message I was trying to convey about the feeling marijuana gave me. That's not
|
|
an easy thing to explain or express in mere words.
|
|
|
|
Written by THC Phreak ú Damage, INC. (C)opyright 1998.
|
|
|
|
|
|
H/P INFORMATION AND NEWS - {H/P}
|
|
Dialing out through VMBs:
|
|
|
|
Would you like to divert your calls? Or, perhaps you want to call ld for free.
|
|
Maybe you should look at dialing out through Voice Mail Box Systems. Many
|
|
support it, and most are set default to allow dialing out. That means the
|
|
Admin of the VMB would have to manually change the system to disallow the dial
|
|
out feature. If you are looking for VMBs, then I suggest checking out the
|
|
800-MAIL.DAT scan list that's included with this issue. There are many Meridian
|
|
Mail systems to choose from in that scan. Obviously, you can also scan
|
|
1-800 exchanges on your own to find VMBs. Also, I suggest that you read
|
|
Blackie Lawless' article on VMBs that was included in the h/p section of the
|
|
Damage, INC. Newsletter Issue #6. Now that you have a few Voice Mail Systems to
|
|
check out, I'll explain a little about dialing out and using certain features.
|
|
Some very good VMB systems for this are Meridian Mail, Audix, ASPEN, etc.
|
|
|
|
With Meridian Mail Systems the default password is the same as the box number,
|
|
so obtaining a working Meridian VMB isn't too much of a challenge. Once you
|
|
have successfully accessed a box on the system, you'll most likely hear a
|
|
"MAILBOX EMPTY" message. If there are messages in the box it will say
|
|
"YOU HAVE x MESSAGES" or "YOU HAVE x NEW MESSAGES" and start playing them.
|
|
Usually it'll tell you that they're "FROM AN EXTERNAL NUMBER" etc. as well.
|
|
It'll say "END OF MESSAGE" after each message that you listen to. Try pressing
|
|
options such as "7*" which will tell you a list of message commands, "8*" will
|
|
give you to a list of personal options, and "0*" is used to access the outdial
|
|
feature. :)
|
|
|
|
Meridian Mail Box Features:
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
7* message commands:
|
|
|
|
Message option 0 - Not useful.
|
|
Reply 1 - Reply to a previous message.
|
|
Play Envelope 2 - Play message envelope.
|
|
Forward 3 - Forward your mail to another box.
|
|
Reply All 4 - Reply with multi-mail.
|
|
Compose 5 - Send multi-mail.
|
|
Delete 6 - Delete mail.
|
|
Send 9 - Send mail to another user's box (requires valid BN).
|
|
To Exit press # - Exit.
|
|
To hear the list again or stop listening to messages press "*".
|
|
|
|
8* personal options:
|
|
|
|
Mailbox options 0 - Change operator code.
|
|
Login 1 - Login another box.
|
|
Greeting 2 - Change the greeting messages.
|
|
Logoff 3 - Logoff the system. "Goodbye". :)
|
|
Password Change 4 - Change VMB password.
|
|
Distribution List 5 - Enter Distribution List number followed by # sign.
|
|
Goto 6 - Go to the start of listening to messages.
|
|
Personal Verification 9 - Record a name for personal verify.
|
|
To Exit press # - Exit personal options.
|
|
|
|
After entering "0*" (zero-star) while in a box, you should hear a message
|
|
similar to the one below with most Meridian Mail systems:
|
|
|
|
"You have reached an automated service which will connect you to the phone
|
|
number that you enter. Please enter the number or the name of the person you
|
|
wish to reach, followed by # sign. To enter a name press 11, spell the last
|
|
name and then spell the first name. When the name is recognized, it will be
|
|
announced..." etc.
|
|
|
|
Some Meridians will only let certain BNs dial out though. If the BN that you
|
|
are in won't allow you to dial out, then try a few others to make sure that
|
|
you're not just in a BN that doesn't support it. Usually, the Admin's BN will
|
|
be either: 111, 222, 333...999. Once you've found a box that allows you to
|
|
use the outdial feature, call a local number with a "#" sign at the end.
|
|
(Example: 742-6899#). At that point, it'll either connect you, or it'll
|
|
beep and you'll hear the message "That number cannot be reached from this
|
|
service..." If it reports that, then try dialing another number in a different
|
|
local exchange. Dialing a 1-800 ANI to check to see if the VMB diverts is
|
|
always a good idea. If you cannot seem to get the VMB to dial out, the SysAdmin
|
|
may have disabled that option. Or, you may need to try dialing the number using
|
|
a different method, as shown below:
|
|
|
|
(X = number NPA = Area Code)
|
|
xxx-xxxx#
|
|
npa-xxx-xxxx#
|
|
1-npa-xxx-xxx#
|
|
9 + 1-npa-xxx-xxxx#
|
|
9 + xxx-xxxx#
|
|
0 + 1-xxx-xxxx#
|
|
* + 1-xxx-xxxx#
|
|
|
|
If it says "That number cannot be reached from this service" and you've tried
|
|
everything that I mentioned above, then most likely that Box Number doesn't
|
|
have dial out access. If you're able to dial out from it, that's cool. You'll
|
|
have to play around with the VMB to learn what areas it can reach. As in,
|
|
experiment and try calling ld numbers in various area codes etc. To get an
|
|
operator to social engineer, try hitting 0# as the number to dial out and it
|
|
should connect you to a live (or zombie?) operator.
|
|
|
|
I am sure that if you can't get it to dial out, or need some more information
|
|
about the system that the operator would be more than willing to give you some
|
|
information. Just use some of the techniques that BLACKENED mentioned in his
|
|
Tip of the Month article. Some good questions to ask after you've identified
|
|
yourself are, "Hey, I am trying to leave the SysAdmin a VMB Message, but I can't
|
|
seem to remember his Box Number. Can you help me out? Thanks." Once you have
|
|
his box number, you could work on hacking into his box, and dialing out through
|
|
there. Some other questions you could ask would be "Does this system support
|
|
call forwarding?" "Do you have a Subscriber List?" etc.
|
|
|
|
Some extensions may just give off a dialtone, or be totally silent. So,
|
|
you'll have to listen and not just try one box to see if it can dial out.
|
|
If you get an extension that gives a dialtone, then you've most likely found
|
|
the dial out box number.
|
|
|
|
Here's a little tip as well. Another way of obtaining free calls with some
|
|
larger systems, (since most smaller systems don't have this option enabled) is
|
|
by setting up the call forwarding number. First, you'll have to set the call
|
|
forwarding number to the number that you would like to connect to, such as
|
|
a h/p board that's ld. After you've changed the number, call the VMB and
|
|
it will connect you to the specified number (in this case the ld h/p board).
|
|
|
|
There are many ways you can dial out through VMBs. As you can see there isn't
|
|
only "one way." It's up to you to develop your own techniques. You can only
|
|
do that by experimenting with certain systems, asking questions and social
|
|
engineering.
|
|
|
|
After you have found a few systems that allow dialing out, I suggest calling a
|
|
1-800 ANI to see what number gets reported back to you. If it reports your
|
|
number then discontinue using that VMB for dialing out. You'll have to find
|
|
another system to use. If it reports the VMB number that you're using, then
|
|
you can use that system for diverting and possibly calling long distance. See
|
|
what area codes/exchanges can be reached using that VMB. If it only supports
|
|
local calls, don't scratch that number off your list as it can still be *very*
|
|
useful for diverting your calls to ISPs, PBXs, Extenders, Voice Operators with
|
|
ANI etc. In a future article, dialing out through other types of VMB systems,
|
|
(including Direct Dial VMBs) will be explained.
|
|
|
|
Written by Fatal Vision ú Damage, INC. (C)opyright 1998.
|
|
|
|
|
|
--- 1-800 SCAN ---
|
|
|
|
We've also included a 1-800-XXX-6245 scan with this issue. The scan was done
|
|
by Shatazar and Fatal Vision. The filename is 800-MAIL.DAT. Direct any
|
|
comments and/or questions to them.
|
|
|
|
|
|
ú - NEWS FROM THE TRENCHES - ú
|
|
|
|
THC Phreak (514) is now a Damage, INC. Member. He's written several quality
|
|
articles for the Damage, INC. Newsletter in the past... and already has his
|
|
own section etc. So, we're looking forward to his future contributions to
|
|
the group. ;)
|
|
|
|
Fatal Vision's BBS, PSYCOSiS is now online. Obviously, it's a Damage, INC.
|
|
Member Board and all Damage, INC. releases are available there at no ratio.
|
|
|
|
The Journalist has resigned from Damage, INC. He was a Damage, INC. Member
|
|
from August 1997 - August 1998. TJ is the first and only person to ever quit
|
|
Damage, INC. While his ego increased, his contributions to the group dwindled
|
|
and then finally ceased in May 1998. I'm sure many readers noticed his absence
|
|
from writing articles for months though. After that point, he was no longer
|
|
actively involved with anything related to Damage, INC. However, I just want to
|
|
be the first to say "Good luck, best wishes and I hope that you're successful at
|
|
whatever you're involved in TJ... during your college years and afterwards. May
|
|
your positivity, philosophies and objective outlook on things bring you all that
|
|
you deserve." Actually, TJ won't be missed... and has already been replaced by
|
|
THC Phreak. So, the Damage, INC. Newsletter won't be adversely affected by this
|
|
minor situation at all. Read the included TJCHRON.TXT file (The Journalist
|
|
Chronicles) if you want more information about TJ, and why he eventually decided
|
|
after months of contemplation, to quit the group. Ah well. Good riddance. ;)
|
|
I believe that statement expresses the sentiments of the entire group.
|
|
|
|
Written by BLACKENED ú Damage, INC. (C)opyright 1998.
|
|
|
|
|
|
INTERVIEWS AND INTERROGATIONS - {INTERVIEWS}
|
|
Interrogation of Billy Gates: The saga continues.
|
|
|
|
|
|
<B> = BLACKENED
|
|
<BL> = Blackie Lawless
|
|
<M$L> = #1 Micro$oft Lackey
|
|
<G> = Billy "bad ass" Gates
|
|
|
|
|
|
<B> - (Dialing 1-800-MS-SUCKS then #LAME for Billy Gates' extension.)
|
|
|
|
(The call is re-routed and forwarded to Gates' cell phone)
|
|
|
|
<M$L> - Hello? Hello? (the voice of a pathetic lackey is heard, spoken in a
|
|
desperate tone...) Is anyone there?
|
|
|
|
<B> - Tell Gates that it's Damage, INC. and get him on the phone right now.
|
|
|
|
<G> - Who is this? What the hell do you want?
|
|
|
|
<B> - You sound a little irritated Billy Boy. What's the matter? ;)
|
|
|
|
<G> - I know who it is now. You bastard! You're going to pay for what you
|
|
did to Microsoft... You... you... malicious criminals are all going to pay
|
|
for this. I don't care what it costs.
|
|
|
|
<M$L> - Mr. Gates... Sir, our resources are running low. The food rations
|
|
have almost been exhausted and we no longer have any power or heat.
|
|
|
|
<G> - No heat? What happened to our coal reserves? Start burning the corpses
|
|
of employees for heat. Call the Seattle market and threaten to quit selling
|
|
Microsoft software to them. Then call the nuclear power plant and tell them
|
|
that they better re-connect our hydro or else we'll shut them down. Geez, do
|
|
I have to do EVERYTHING around here?
|
|
|
|
<M$L> - Yes sir. No sir. I mean, no... you don't have to do everything around
|
|
here sir. You know that I'm your number one lackey... err.. employee.. sir.
|
|
|
|
<G> - It's good to know that I still have a few 'Yes Men' left at my side, to
|
|
do my bidding for me.
|
|
|
|
<BL> - It's too bad your wife isn't at your side anymore though. Haha.
|
|
|
|
<G> - Is that Blackie Lawless I hear? Your sarcastic remarks are not
|
|
appreciated mister. I take offense to your snide little comments. My wife
|
|
is as loyal as Mr. Lackster (#1 M$ Lackey) is... Who by the way, is my
|
|
towel boy, shoe shine gimp and boot licker extraordinairre. Here's a small
|
|
demonstration of my power. Listen and learn. Lackster, trace this call
|
|
with ANI and send the law enforcement authorities there immediately.
|
|
|
|
<M$L> - Yes sir! I'll get right on it.
|
|
|
|
<BL> - Really? I never would've fucking guessed by the way he follows your
|
|
every command, and kisses your ass at every opportunity. Man, haven't you
|
|
heard yet? He's all you've got left Billy. By the way, you won't be able to
|
|
trace us with ANI Billy Boy.
|
|
|
|
<M$L> - Sir, ANI Failure. I called up AT&T, and asked them to help us. It's
|
|
the same thing though. I'm sorry sir. I apologize for my incompetence... and
|
|
take full responsibility for not being able to trace them.
|
|
|
|
<G> - Shit. Ummm... think of something. I really want to catch those bad guys.
|
|
We have to make those menacing hackers pay for what they've done.
|
|
|
|
<M$L> - Yes sir! You can count on me sir.
|
|
|
|
<B> - Haha. Billy has been in that bunker too long man. He doesn't realize
|
|
what's happened, nor does he know where his wife is.
|
|
|
|
<G> - What have you mischievous deviants done with my wife?
|
|
|
|
<BL> - Nothing. We've just seen her working downtown in Seattle. Monika
|
|
Lewinski might not be going down anymore, but your wife definitely is...
|
|
|
|
<B> - Hehe... That's for sure man. ;)
|
|
|
|
<G> - What's that supposed to mean? My wife doesn't go down. You guys are
|
|
just making up stuff... and trying to... (interrupted)
|
|
|
|
<B> - It means that your wife is a working woman now. She's walking the
|
|
streets... wearing knee pads and picking up dimes. She goes down faster
|
|
than Monika Lewinski on Whitehouse Billy. Just because she never gave
|
|
*you* head, means nothing Billy Boy. Your wife is now a full-fledged, cheap,
|
|
slutty, downtown whore now. She's quick to go down and slow to quit sucking.
|
|
|
|
<BL> - Damn straight. You've got that right man. Now that she lost geek boy,
|
|
she's not half bad. I mean, she made a huge mistake slutting around Gates,
|
|
but I've gotta admit she's a nice piece of ass. Hehe.
|
|
|
|
<G> - Why you fucking... filthy.. sons of bitches. Fuck you. My wife is
|
|
NOT a prostitute!
|
|
|
|
<BL> - Bitch? Yeah, you could call her that. I prefer to refer to your wife
|
|
as a cheap whore though. Prostitute? Nah... At least not a very good one.
|
|
Most of the time she blows for free and swallows... That's how she manages to
|
|
get a free lunch without begging.
|
|
|
|
<B> - Hahaha. That's hilarious... and true man. ;)
|
|
|
|
<G> - Grrrrrrr... You're making me VERY upset and angry. (Gates is seething
|
|
at this point and almost ready to snap.) Bill is getting frustrated. If I
|
|
could trace this call, I'd... I'd.... (interrupted)
|
|
|
|
<M$L> - Sir, our stocks are starting to rise again. I took the liberty of
|
|
loading your personal stock portfolio with all of the most popular Internet
|
|
Stocks on the market. Then I used some of the new profits to buy back the
|
|
majority of the Microsoft stock that you sold. It looks like things are going
|
|
to be alright.
|
|
|
|
<G> - That's great news! (a huge sigh of relief is literally heard over
|
|
the phone.) What about employees? They haven't all been killed yet have
|
|
they?
|
|
|
|
<M$L> - No sir. You still employee many immigrant workers... and Visual Basic
|
|
programmers. Microsoft is still the proud owner.. err.. employer of over
|
|
two thousand Mexican workers, that package our products. Cheap wages, cheap
|
|
labour... It's all good, sir.
|
|
|
|
<BL> - Yeah, cheap is definitely the word.
|
|
|
|
<B> - And that cheapness is due to Billy's greed. His own greed is what drives
|
|
him to exploit workers.. and the zombies that purchase M$ products.
|
|
|
|
<G> - Excellent... Excellent. Hey, the zombies buy Microsoft products because
|
|
THEY want to. It's not because I've brainwashed them all.. and can influence
|
|
them to do anything that I want. Now, it looks as though I have Damage, INC.
|
|
right where I want you. Your diabolical plan has failed and Microsoft is
|
|
strong once again.
|
|
|
|
<B> - You still haven't learned yet Billy. I told you before, you ain't seen
|
|
nothin' yet. This is just the beginning...
|
|
|
|
<BL> - Run and hide behind your lackies again Gates. Pay them protection money.
|
|
Hire more security guards. Do whatever the fuck you want... Regardless of what
|
|
you attempt to do, Damage, INC. is stalking you.
|
|
|
|
<M$L> - I would give my life for Mr. Gates. I exist to serve and protect him.
|
|
In fact, if the truth be told... he IS my life. Microsoft is also my life.
|
|
It's what I've chosen to dedicate myself towards.
|
|
|
|
<G> - I know that I can count on you to help me fulfill my dream.. My vision...
|
|
of every house, every vehicle, and every street corner having and relying on
|
|
Microsoft products. You Mr. Lackster are my loyal servant. To show my deepest
|
|
appreciation, I'm going to give you a raise. Effective in 1999, your salary
|
|
will be increased by a sum of $0.20 an hour! If you continue serving me well,
|
|
there might even be a year end bonus in it for you... Just don't count on it.
|
|
Times are tough you know. My net worth is down to $55 billion... give or take
|
|
a billion dollars due to the market crash August 31, 1998.
|
|
|
|
<M$L> - Why thank you sir... Thank you. That's most generous of you. I promise
|
|
that I'll work overtime for the next 5 years... and try to repay you in some
|
|
way for such a kind gesture. Indeed, I'm a lucky lackey. The luckiest in the
|
|
world... to work for such a selfless, humble boss.
|
|
|
|
<B> - I'm going to be sick. I feel like puking. You both disgust me. Gates,
|
|
your endless greed and cheapness is sickening. As for your dream, the reality
|
|
is that your wife is working in every house, every vehicle's backseat and on
|
|
every street corner in Seattle. Haha...
|
|
|
|
<BL> - Yeah, and *she* is doing a fine job of serving this town. It won't be
|
|
long before she has her own boss. A few local pimps have been eyeing her.
|
|
Hehe. ;)
|
|
|
|
<G> - Blackie Lawless, you're disgusting. You have a filthy, gutter of a mind.
|
|
The cheapshots that you hurl never cease to amaze me. If only you'd use your
|
|
thoughts, ideas and energy for good... and make something of yourself. You
|
|
are brilliantly evil, and could make a tremendous profit if you would only
|
|
utilitize your specialized skills and talent for humiliation. You could employ
|
|
a workforce of slaves, like I do. It's called profiting off the ideas and
|
|
backs of others. That's what Capitalism is all about. Just ask my political
|
|
friends and associates. You should seriously consider a career as a Microsoft
|
|
employee. We offer limited benefits to our most loyal slaves... errr.. workers.
|
|
You just have to pass our rigorous testing and training programs, and then
|
|
take the mandatory brainwashing program.
|
|
|
|
<M$L> - You've always treated me with respect sir. I can understand why you've
|
|
been so successful. Right down to your very DNA, you are the perfect boss.
|
|
You know how to command and use your authority so effectively. I just love
|
|
working for you sir.
|
|
|
|
<BL> - Listen fucker. We don't respect you, your vision or the way that you
|
|
ripoff everyone else's ideas and products. I'd never work for Microsoft,
|
|
no matter how much money was involved. I'll never be one of your zombies.
|
|
|
|
<B> - In a way, it's hilarious that Gates would actually say something like
|
|
that though man. He honestly believes that he can buy anyone. He thinks
|
|
that we'd sell out to Microsoft for money. Haha. It seems as though the
|
|
richest geek in the world is also the most naive. Obviously, I wouldn't
|
|
work for him for any amount of money... including a billion times what he has.
|
|
He can continue to buy zombies, but he'll never be able to influence the
|
|
intelligent and enlightened.
|
|
|
|
<G> - What are you guys... Communists? Does money mean nothing to you?
|
|
Let's make a deal. I'll pay you a million dollars to quit harassing me,
|
|
interfering with Microsoft, and publishing slanderous material that contains
|
|
references to me and my beloved company. Is it a deal? That's a million
|
|
dollars each... for every Damage, INC. Member.
|
|
|
|
<B> - Hahaha... Do you really think that we'll accept that pathetic offer?
|
|
We can't be bought Gates. Damage, INC. doesn't make deals with anyone. That
|
|
includes fat cat lamers like you. We will continue to say and do whatever
|
|
we want.
|
|
|
|
<BL> - He's delusional man. Billy is grasping at straws. Haha... calling
|
|
us communists? It looks like the petty dictator is calling the kettle black.
|
|
As for money, your money means absolutely nothing to us Gates. It's greed
|
|
stained Micro$oft money... and it's as worthless to us as Monopoly money.
|
|
|
|
<G> - I will never understand people like you. Money is everything. Can't
|
|
you see that? How can you not? I've built an empire based on greed. I
|
|
rely on corrupt, underhanded ways of stealing and blackmailing other companies
|
|
in the computer industry. If that doesn't work, then I buy them. If you
|
|
guys aren't doing this to profit... by blackmailing me or using extortion
|
|
tactics, what the hell is your reason? What's your goal? What's the purpose?
|
|
What is YOUR vision?
|
|
|
|
<BL> - Are you paranoid? Good! Hahaha.
|
|
|
|
<B> - He actually believes that we're going to reveal our objective to him...
|
|
Haha. Gates, your zombie slaves are more intelligent and clever than you are.
|
|
Figure it out for yourself Billy Boy. Or, better yet, pay someone to do it for
|
|
you. Afterall, your precious money can buy anything right? <G> You cannot
|
|
buy the information that you seek. Just as, you can't buy knowledge, wisdom
|
|
or intellect. Basically, you're forever limited to your little thoughts and
|
|
restricted way of thinking. Your mind will never be able to analyze anything.
|
|
You are not a logical person. Your own greed takes priority. To summarize,
|
|
you are a stupid, greedy, rich zombie that's lacking all that makes someone
|
|
into a human being. Morals, ethics and other human qualities can't be bought
|
|
for any sum of money. So, in other words, you are FUBAR. ;)
|
|
|
|
|
|
LETTERS TO THE EDITOR - {LETTERS}
|
|
|
|
|
|
Date: 7:45 pm Sat Aug 1, 1998 Number : 3 of 3
|
|
From: Ufoguy Base : Private Mail
|
|
To : Blackened Refer #: None
|
|
Subj: editorial Replies: None
|
|
Stat: Normal Origin : Local
|
|
|
|
This is just a small response to an article in the last issue of the
|
|
NewsLetter...
|
|
|
|
------
|
|
|
|
I would like to comment on one particular article in Issue #10. The
|
|
"Cops and Harassment" feature written by Fatal Vision is filled with a
|
|
number of instances that are not only stupid, but because of his actions
|
|
he could have voluntarily given up his right to freedom.
|
|
|
|
There are countless documents from people in the scene about what to do
|
|
when confronted by the police, whether conducting anything illegal or not.
|
|
Let me run down a short list that would've made Fatal Vision's experiences
|
|
more bearable.
|
|
|
|
Rule #1: Don't admit shit. If a cop asks "Do you know wat time it is?"
|
|
wait for your lawyer. If they ask you "Why are you out so late?" wait for
|
|
your lawyer. If they even ask you for your name, wait for your lawyer. Doing
|
|
anything else is allowing them access to personal information and if you
|
|
open yourself to even the most irrelevant questions you could be giving them
|
|
much needed "evidence"
|
|
|
|
Rule #2: If they want to speak to you in your house tell them they'll
|
|
require a search warrant to even be on the premises. This will piss them off
|
|
but by letting them see your living environment you're giving them an opening
|
|
to your life. What you don't say will be known from what hangs on your walls,
|
|
or resides on the bookshelf. Anything that a doughnut-eater could consider
|
|
"probable cause" will hook you in a holding cell. Also, refer to Rule #1.
|
|
|
|
Rule #3: Don't volunteer evidence. Make them prove their case. By handing
|
|
them anything that could be construed as evidence you're on a short trip to
|
|
Cell Block D. If they frisk you without arresting you it's an illegal seach
|
|
and seizure. Even though the worst penalty for the puerco will be suspension
|
|
with pay, you can still have any evidence thrown out of court. This ties in
|
|
with Rule #2. Acting like you're doing something wrong is probable cause,
|
|
and is reason enough for the cops to obtain a search warrant.
|
|
|
|
If the cops start threatening you just laugh. Always request a lawyer,
|
|
always find out the officer's name and the name of their supervisor and always
|
|
let them know that you know your individual rights are being infringed upon.
|
|
If you don't stand up for your rights they will believe you to be ignorant of
|
|
the law and your rights and they will do everything outside of their power to
|
|
force you to give up everything you know, or don't know.
|
|
|
|
Lawyers may be the scourge of society, but in many cases they can keep you
|
|
from seeing the inside of a cage, and can get you a lot of money by suing
|
|
those who believe it's their job to infringe upon your rights.
|
|
|
|
------
|
|
UfoGuy
|
|
|
|
|
|
I'm not the editor, but since your feedback concerns my article on cops,
|
|
I thought that I would reply instead of BLACKENED. Thanks for the feedback.
|
|
|
|
It's nice to see that you read my article man. ;) You seem to have some
|
|
experience with that type of thing. If that's the case, why don't you write an
|
|
article on how to deal with cops and send it in to be published? At any rate,
|
|
I'll admit that when those events happened I wasn't fully educated about how
|
|
to deal with police officers. I was just simply trying to prove a point that
|
|
some cops just try to take the easy route out of everything. They are *not* what
|
|
most people think they are. I know from talking with quite a few people that
|
|
they think cops are not racist, follow the system, do not abuse anyone while
|
|
arresting someone etc. They have been brainwashed man. That's *exactly* what
|
|
they want you to think. I was simply sharing some experiences that I've had
|
|
with cops. Why should people in blue uniforms have more power than we do?
|
|
They shouldn't and they don't IMO. By writing that article I learned a few
|
|
things, and thought about what I'd do differently if I was ever in situations
|
|
such as those. As you hopefully noticed the events that I wrote about ranged
|
|
in time from recent to many years ago. Cops haven't changed though man. They
|
|
are still on a "power trip" and think they can do whatever they fucking want.
|
|
It's up to everyone to make sure that they do their jobs properly. The first
|
|
step is admitting there are faults in the police force. The second step is
|
|
educating the public to know exactly what their rights are, and informing them
|
|
whenever situations arise. The third step is teaching them what to do if they
|
|
encounter an average, power tripping cop.
|
|
|
|
Written by Fatal Vision ú Damage, INC. (C)opyright 1998.
|
|
|
|
|
|
OBJECTIVE OPINIONS - {OPINIONS}
|
|
The ethics of hacking:
|
|
|
|
Some people strongly believe that everyone should follow a 'hackers ethic'
|
|
and there have been countless text files created with information regarding
|
|
'the ethics of hacking'. Just do a search using a web browser for "ethics",
|
|
"h/p ethics", "hacking ethics" etc. I'm sure that you'll find quite a few
|
|
useful text files on sites to choose from and read.
|
|
|
|
Personally, I don't believe in following any set of "rules" whether it's hacking
|
|
ethics, laws or anything else. I'll follow my own set of rules, my own ethics,
|
|
and live the way I want to live... not how someone else wants me to. I've read
|
|
several text files now on the "ethics of hacking" and had to laugh, since they
|
|
are all based on opinion. There are so many different ideas about what is
|
|
right and what is wrong. I'm sure you'll know what I mean once you do some
|
|
reading and find out a few things about this issue. Some people think that
|
|
damaging systems isn't right, and nothing should be altered/manipulated except
|
|
the log files. Yet, some say "Nuke the system when you are done hacking so
|
|
that you don't leave a trace." They are so contradictory. One text file tells
|
|
you not to do any damage, while another encourages you to do damage.
|
|
|
|
I've also read text files describing hackers as criminals that do manipulate
|
|
files, change options, nuke systems etc. In my opinion, a hacker/phreak should
|
|
do what they feel and not what is written in a text file that explains how they
|
|
should act, what they should do and what to do on systems.
|
|
|
|
With this article, I am by no means saying that following a code of ethics is
|
|
wrong. In fact, I would almost call it a necessity to follow your own code
|
|
of ethics that you develop. I think that *everyone* should sit down and
|
|
determine what their own ethics are, establish them clearly and live by them.
|
|
Make sure they're *your* ethics and not someone else's ideas. I know that
|
|
people involved with the government have created numerous text files, web pages
|
|
etc. in an attempt to make hackers believe that nuking systems and altering data
|
|
is wrong and will get you into shit. One of the main reasons they do that is
|
|
to try to make some people "follow" what they write and not damage any systems.
|
|
They don't want to lose any information or money, and they believe that they
|
|
can influence people into following a "government code of ethics". <SH>
|
|
|
|
In my opinion, nuking systems isn't all that's involved with ethics. You
|
|
have to think about who you are going to associate with, whether they're
|
|
newbies, experienced h/pers, warez d00dz, etc. That's just an example of
|
|
another factor in ethics. I am sure that you could think of many other issues
|
|
that could be included with your own "ethics".
|
|
|
|
This is a little story about a group of hackers and their ethics of not damaging
|
|
or destroying the data/information that they obtain access to. It's funny how
|
|
some people think certain security systems are 100% secure. I watched a
|
|
television show on security, and it showed how the police force thought that
|
|
their cop cars' computer systems are *unhackable*. A group of hackers from the
|
|
L0pht proved to these fat pigs that they were wrong, and that their security was
|
|
lame and weak. The group found a few systems by trashing. They later found
|
|
that there were no encryption methods for outgoing/incoming data and there
|
|
weren't many passwords. The program showed them trashing late at night, finding
|
|
equipment, fixing it up and changing the equipment they found to have more
|
|
features. They then used the equipment to find information on people, enter
|
|
licence plate numbers and change data. They are still experimenting with it.
|
|
However, the L0pht isn't malicious and they didn't change any personal data or
|
|
alter any crucial files etc. So, you could say that their ethics in this case
|
|
were honourable. They did it only for information.
|
|
|
|
I'd like to suggest that you form your own ethics, follow your own set of rules,
|
|
use your own guidelines and abide by what you strongly believe in. Don't read
|
|
an article about ethics and immediately follow what that person says to do,
|
|
just because they wrote a text file on hacking ethics. Use your judgement while your
|
|
hacking and don't rely on others to make those types of choices for you. Think
|
|
for yourself and do what you want to do. Don't rely on text files that an
|
|
anonymous person wrote as a guide to your personal hacking ethics.
|
|
|
|
Written by Fatal Vision ú Damage, INC. (C)opyright 1998.
|
|
|
|
|
|
REPORTS FROM THE FRONT - {REPORTS}
|
|
|
|
We've decided to include several interesting articles in this issue. The
|
|
first is a Micro$oft Propaganda Bulletin relating to cDc's Back Orifice.
|
|
Unfortunately, Micro$oft has shown how ignorant and inept they are yet again.
|
|
They claim that security is taken seriously etc. Micro$oft also uses the
|
|
word "truth", which is a fucking joke when you consider the source. They even
|
|
failed to spell Back Orifice properly. Perhaps they should've looked at the
|
|
docs that are included with Back Orifice more carefully. The next article isn't
|
|
just for our American readers. It's applicable to anyone that thinks about
|
|
freedom, takes it seriously, and believes that it should be discussed and not
|
|
ignored. Even if you take freedom for granted, I suggest that you read the
|
|
article. The last article (titled "The New Bill of Rights") is relevant to
|
|
Americans and those that understand the basic rights of U.S. citizens.
|
|
Basically, it is a parody with changes and additions to the original that make
|
|
it hilarious. ;)
|
|
|
|
|
|
From: Microsoft Product Security Response Team [secure@MICROSOFT.COM] Sent:
|
|
Wednesday, August 05, 1998 11:22 AM To:
|
|
MICROSOFT_SECURITY@ANNOUNCE.MICROSOFT.COM Subject: Microsoft Security Bulletin
|
|
(MS98-010)
|
|
|
|
|
|
|
|
Microsoft Security Bulletin (MS98-010)
|
|
|
|
----------------------------------------------------------------------- -
|
|
|
|
Information on the BackOrifice Program
|
|
|
|
Last Revision: August 04, 1998
|
|
|
|
Summary
|
|
=======
|
|
On July 21, a self-described hacker group known as the Cult of the Dead Cow
|
|
released a tool called BackOrifice, and suggested that Windows users were at
|
|
risk from unauthorized attacks. Microsoft takes security seriously, and has
|
|
issued this bulletin to advise customers that Windows 95(r) and Windows 98(r)
|
|
users following safe computing practices are not at risk and Windows NT(r)
|
|
users are not threatened in any way by this tool.
|
|
|
|
The Claims About BackOrifice
|
|
============================
|
|
According to its creators, BackOrifice is "a self-contained, self-installing
|
|
utility which allows the user to control and monitor computers running the
|
|
Windows operating system over a network". The authors claim that the program
|
|
can be used to remotely control a Windows computer, read everything that the
|
|
user types at the keyboard, capture images that are displayed on the monitor,
|
|
upload and download files remotely, and redirect information to a remote
|
|
internet site.
|
|
|
|
The Truth About BackOrifice
|
|
===========================
|
|
BackOrifice does not expose or exploit any security issue with the Windows
|
|
platform or the BackOffice(r) suite of products.
|
|
|
|
BackOrifice does not compromise the security of a Windows network. Instead, it
|
|
relies on the user to install it and, once installed, has only the rights and
|
|
privileges that that the user has on the computer.
|
|
|
|
For a BackOrifice attack to succeed, a chain of very specific events must
|
|
happen:
|
|
- The user must deliberately install, or be tricked into
|
|
installing the program
|
|
- The attacker must know the user's IP address
|
|
- The attacker must be able to directly address the user's
|
|
computer; e.g., there must not be a firewall between the
|
|
attacker and the user.
|
|
|
|
What Does This Mean for Customers Running Windows 95 and Windows 98?
|
|
====================================================================
|
|
BackOrifice is unlikely to pose a threat to the vast majority of Windows 95
|
|
or Windows 98 users, especially those who follow safe internet computing
|
|
practices. Windows 95 and Windows 98 offer a set of security features that
|
|
will in general allow users to safely use their computers at home or on the
|
|
Internet. Like any other program, BackOrifice must be installed before it can
|
|
run. Clearly, users should prevent this installation by following good
|
|
practices like not downloading unsigned executables, and by insulating
|
|
themselves from direct connection to the Internet with Proxy Servers and/or
|
|
firewalls wherever possible.
|
|
|
|
What Does This Mean For Customers Running Windows NT?
|
|
=====================================================
|
|
There is no threat to Windows NT Workstation or Windows NT Server customers; the
|
|
program does not run on the Windows NT platform. BackOrifice's authors don't
|
|
claim that their product poses any threat to Windows NT.
|
|
|
|
What Customers Should do
|
|
========================
|
|
Customers do not need to take any special precautions against this program.
|
|
However customer should ensure that they follow all of the normal precautions
|
|
regarding safe computing:
|
|
- Customers should not install or run software from
|
|
unknown sources -- this applies to both software available
|
|
on the Internet and sent via e-mail. Reputable software
|
|
vendors digitally sign their software to verify its authenticity
|
|
and safety.
|
|
- Corporate administrators can block software that is not digitally
|
|
signed by a reputable or authorized software company at their proxy
|
|
server and/or firewall.
|
|
- Customers should keep their software up to date to ensure that
|
|
hackers cannot take advantage of known issues.
|
|
- Companies should use actively use auditing and monitor their
|
|
network usage to deter and prevent insider attacks.
|
|
|
|
|
|
More Information
|
|
================
|
|
Please see the following references for more information related to this
|
|
issue.
|
|
|
|
- Microsoft Security Bulletin 98-010, Information on the
|
|
BackOrifice Program (the Web posted version of this
|
|
bulletin),
|
|
http://www.microsoft.com/security/bulletins/ms98-010.htm
|
|
|
|
Revisions
|
|
=========
|
|
|
|
August 04, 1998: Bulletin Created
|
|
|
|
For additional security-related information about Microsoft products, please
|
|
visit http://www.microsoft.com/security
|
|
|
|
|
|
----------------------------------------------------------------------- -- THE
|
|
INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS"
|
|
WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER
|
|
EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS
|
|
SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
|
|
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN
|
|
IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY
|
|
OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF
|
|
LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION
|
|
MAY NOT APPLY.
|
|
|
|
(c) 1998 Microsoft and/or its suppliers. All rights reserved. For Terms of Use
|
|
see http://support.microsoft.com/support/misc/cpyright.asp.
|
|
-------------------------------------------------------------------------------
|
|
|
|
From the Radio Free Michigan archives
|
|
|
|
ftp://141.209.3.26/pub/patriot
|
|
|
|
If you have any other files you'd like to contribute, e-mail them to
|
|
bj496@Cleveland.Freenet.Edu.
|
|
------------------------------------------------
|
|
|
|
------------------------------------------------
|
|
* WHAT TODAY'S AMERICANS DON'T UNDERSTAND *
|
|
------------------------------------------------
|
|
By Charley Reese, Syndicated Columnist
|
|
|
|
There are three things every American ought to read: the
|
|
DECLARATION OF INDEPENDENCE, the CONSTITUTION, and the
|
|
FEDERALIST PAPERS. None of them is difficult reading. They
|
|
are not obscure dissertations written by pedants to impress
|
|
pedants. All three were written for the average person and
|
|
widely published.
|
|
|
|
The Declaration contains the philosophical premises of the
|
|
American Revolution. A lot of Americans today clearly don't
|
|
believe in them. A lot more have no idea what they are.
|
|
|
|
The Constitution is the compact drawn up and ratified by the
|
|
people who created a government consistent with the
|
|
philosophical premises of the Declaration. Incidentally,
|
|
the government created by that Constitution is not
|
|
recognizable in Washington, except in the barest outline.
|
|
|
|
The Federalist Papers are a series of articles written and
|
|
published in newspapers during the debate over ratification.
|
|
They are arguments in favor of the Constitution and its
|
|
original intent. There are many paperback editions
|
|
available.
|
|
|
|
All of this is 100 percent relevant to today, for whether
|
|
you agree or disagree with the premises and principles of
|
|
the American Revolution will determine how you view current
|
|
political issues.
|
|
|
|
In a nutshell, the basic premises of the American Revolution
|
|
are these: people are born free and equal, their rights a
|
|
gift of God, the only legitimate purpose for government is
|
|
to protect those rights, when government instead abuses
|
|
those rights, then people have the right and the duty to
|
|
overthrow it with force and violence, and to form a new
|
|
government that will protect their rights. Too many
|
|
Americans today, consumed with material pursuits, their
|
|
brains spongy with trivia and amusement, their spirits timid
|
|
and corrupted with whining and pleading, view such
|
|
sentiments as absolutely radical, if not subversive and, God
|
|
forbid, even leftist.
|
|
|
|
Their standard question to public officials and candidates
|
|
is, "What are you going to do for me economically?" You
|
|
would thing listening to American political debate, that the
|
|
American Revolutionists were all Marxists and that nothing
|
|
in the world matters but economics. I'm sure most people if
|
|
they ever find themselves standing before God will hand him
|
|
first their financial statement.
|
|
|
|
Freedom in this modern, Orwellian America, is something that
|
|
is "defended" overseas but otherwise never mentioned in
|
|
polite conversation at home.
|
|
|
|
A true son or daughter of the American Revolution will be
|
|
more concerned about freedom than about making it easier for
|
|
the police to catch criminals; more concerned about property
|
|
rights which are the basis of political freedom, than about
|
|
schemes to control traffic and housing developments; more
|
|
concerned about freedom than in accomplishing social goals
|
|
at the expense of freedom; more concerned about freedom than
|
|
about some fool being corrupted by what he reads or sees.
|
|
|
|
Basically what it means to be free is to be let alone.
|
|
People have a right to be let alone. They have an
|
|
obligation to leave others alone. They do not have a right
|
|
to subsidies, to be liked or approved, or granted favors.
|
|
Just let alone. Nor do they have an obligation to like,
|
|
approve or grant favors to others. Just to leave them
|
|
alone.
|
|
|
|
This clearly is not understood by the sons and daughters of
|
|
the welfare state. Gays, for example have a right to be let
|
|
alone, but they demand that others approve of them. They
|
|
have no right to approval. Others demand so called equal
|
|
opportunity , but they want a lower standard of test scores
|
|
or physical demands. Everyone has a right to be treated
|
|
equally. No one has the right to demand special treatment.
|
|
|
|
Clearly, freedom demands a better class of human beings -
|
|
human beings who value freedom more than wealth or personal
|
|
security and who don't need the approval of others to
|
|
bolster their weak egos.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
NEW
|
|
THE^BILL OF RIGHTS
|
|
|
|
Nearly everything has changed in the United States since the Bill of
|
|
Rights was written and adopted. We still see the original words when
|
|
we read those first 10 Amendments to the Constitution, yet the meaning
|
|
is vastly different now.
|
|
|
|
And no wonder. We've gone from a country of a few million to a few
|
|
hundred million. The nation's desire to band together was replaced by
|
|
revulsion of togetherness. We exchanged a birthright of justice for a
|
|
magic bullet, and replaced the Pioneer Spirit with the Pioneer Stereo.
|
|
|
|
We're not the people who founded this country and our Bill of Rights
|
|
should reflect this.
|
|
|
|
As we approach the 21st Century, it's time to bring the wording up to
|
|
date showing what we are and who we are.
|
|
|
|
AMENDMENT I
|
|
|
|
Congress shall make no law establishing religion, but shall act as if
|
|
it did; and shall make no laws abridging the freedom of speech, unless
|
|
such speech can be construed as "commercial speech" or "irresponsible
|
|
speech" or "offensive speech;" or shall abridge the right of the
|
|
people to peaceably assemble where and when permitted; or shall
|
|
abridge the right to petition the government for a redress of
|
|
grievances, under proper procedures.
|
|
|
|
It shall be unlawful to cry "Fire!" in a theatre occupied by three or
|
|
more persons, unless such persons shall belong to a class declared
|
|
Protected by one or more divisions of Federal, State or Local
|
|
government, in which case the number of persons shall be one or more.
|
|
|
|
|
|
AMENDMENT II
|
|
|
|
A well-regulated military force shall be maintained under control of
|
|
the President, and no political entity within the United States shall
|
|
maintain a military force beyond Presidential control. The right of
|
|
the people to keep and bear arms shall be determined by the Congress
|
|
and the States and the Cities and the Counties and the Towns (and
|
|
someone named Fred.)
|
|
|
|
|
|
AMENDMENT III
|
|
|
|
No soldier shall, in time of peace, be quartered in any house without
|
|
the consent of the owner, unless such house is believed to have been
|
|
used, or believed may be used, for some purpose contrary to law or
|
|
public policy.
|
|
|
|
|
|
AMENDMENT IV
|
|
|
|
The right of the people to be secure in their persons, houses, papers,
|
|
and effects against unreasonable searches and seizures may not be
|
|
suspended except to protect public welfare. Any place or conveyance
|
|
shall be subject to search by law enforcement forces of any political
|
|
entity, and any such places or conveyances, or any property within
|
|
them, may be confiscated without judicial proceeding if believed to be
|
|
used in a manner contrary to law.
|
|
|
|
|
|
AMENDMENT V
|
|
|
|
Any person may be held to answer for a crime of any kind upon any
|
|
suspicion whatever; and may be put in jeopardy of life or liberty by
|
|
the state courts, by the federal judiciary, and while incarcerated;
|
|
and may be compelled to be a witness against himself by the forced
|
|
submission of his body or any portion thereof, and by testimony in
|
|
proceedings excluding actual trial. Private property forfeited under
|
|
judicial process shall become the exclusive property of the judicial
|
|
authority and shall be immune from seizure by injured parties.
|
|
|
|
|
|
AMENDMENT VI
|
|
|
|
In all criminal prosecutions, the accused shall enjoy the right to
|
|
avoid prosecution by exhausting the legal process and its
|
|
practitioners. Failure to succeed shall result in speedy
|
|
plea-bargaining resulting in lesser charges. Convicted persons shall
|
|
be entitled to appeal until sentence is completed. It shall be
|
|
unlawful to bar or deter an incompetent person from service on a jury.
|
|
|
|
|
|
AMENDMENT VII
|
|
|
|
In civil suits, where a contesting party is a person whose private
|
|
life may interest the public, the right of trial in the Press shall
|
|
not be abridged.
|
|
|
|
|
|
AMENDMENT VIII
|
|
|
|
Sufficient bail may be required to ensure that dangerous persons
|
|
remain in custody pending trial. There shall be no right of the public
|
|
to be afforded protection from dangerous persons, and such protection
|
|
shall be dependent upon incarceration facilities available.
|
|
|
|
|
|
AMENDMENT IX
|
|
|
|
The enumeration in The Constitution of certain rights shall be
|
|
construed to deny or discourage others which may from time to time be
|
|
extended by the branches of Federal, State or Local government, unless
|
|
such rights shall themselves become enacted by Amendment.
|
|
|
|
|
|
AMENDMENT X
|
|
|
|
The powers not delegated to the United States by the Constitution
|
|
shall be deemed to be powers residing in persons holding appointment
|
|
therein through the Civil Service, and may be delegated to the States
|
|
and local Governments as determined by the public interest. The
|
|
public interest shall be determined by the Civil Service.
|
|
|
|
-----------------------------------------------------------------------
|
|
The Pen is mightier than the Sword.
|
|
The Court is mightier than the Pen.
|
|
The Sword is mightier than the Court.
|
|
- Rey Barry -
|
|
-----------------------------------------------------------------------
|
|
|
|
|
|
SOURCE AND SCRIPTS - {SOURCE}
|
|
|
|
|
|
This will scan your devices to detect sniffers on your system.
|
|
Linux support is ready but SunOS has some problems (mainly in
|
|
net/if.h when i tried compiling i got a lot of parse errors in
|
|
if.h and socket.h <shrug> maybe the system i was on was damaged.)
|
|
|
|
Comments welcome :-).
|
|
|
|
-------------------------------------------------------------------------------
|
|
begin promisc.c --
|
|
// $Id: promisc.c,v null 1997/03/09 10:35:58 trevorl Exp $
|
|
// promisc.c: test devices for sniffers and device moniters.
|
|
//
|
|
// Copyright (C) 1997 Trevor F. Linton (blind@xmission.com)
|
|
//
|
|
// Created for Linux based loosely upon linux ioctl controls.
|
|
// ioctl() is used to detect different flags set on devices used
|
|
// on your system.
|
|
//
|
|
// gcc -o sys_test promisc.c
|
|
//
|
|
|
|
#include <stdio.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/ioctl.h>
|
|
#include <errno.h>
|
|
#if defined (__linux__)
|
|
#include <linux/if.h>
|
|
#else
|
|
#include <net/if.h>
|
|
#endif
|
|
#define size(p) (sizeof(p))
|
|
|
|
int dev_flags=0,
|
|
device_flags=0,
|
|
set_look_all=0;
|
|
|
|
int
|
|
main(int argc, char **argv) {
|
|
struct ifreq ifreq, *ifr;
|
|
struct ifconf ifc;
|
|
char buf[BUFSIZ], *cp, *cplim;
|
|
|
|
if(argc <= 1)
|
|
set_look_all++;
|
|
|
|
if((dev_flags = socket(PF_INET, SOCK_DGRAM, 0)) < 0) {
|
|
fprintf(stderr, "An error occured establiashing while establishing a socket\n");
|
|
perror("socket");
|
|
exit(1);
|
|
}
|
|
|
|
ifc.ifc_len = sizeof(buf);
|
|
ifc.ifc_buf = buf;
|
|
|
|
if(ioctl(dev_flags, SIOCGIFCONF, (char *)&ifc) < 0) {
|
|
perror("SIOCGIFCONF");
|
|
exit(1);
|
|
}
|
|
ifr = ifc.ifc_req;
|
|
cplim=buf+ifc.ifc_len;
|
|
for(cp = buf; cp < cplim;
|
|
cp += sizeof (ifr->ifr_name) + size(ifr->ifr_addr))
|
|
{
|
|
ifr = (struct ifreq *)cp;
|
|
|
|
if(argv[1])
|
|
if(strcmp(ifr->ifr_name, argv[1]) && !set_look_all)
|
|
continue;
|
|
|
|
ifreq = *ifr;
|
|
if(ioctl(dev_flags, SIOCGIFFLAGS, (char *)&ifreq) < 0)
|
|
{
|
|
fprintf(stderr, "SIOCGIFFLAGS: %s (get interface flags): %s\n", ifr->ifr_name,strerror(errno));
|
|
continue;
|
|
}
|
|
|
|
device_flags=0; device_flags = ifreq.ifr_flags;
|
|
fprintf(stdout, "%s: ", ifreq.ifr_name);
|
|
|
|
if((device_flags & IFF_PROMISC) != 0)
|
|
fprintf(stdout, "Promiscuous: Sniffer detected.\n");
|
|
else
|
|
fprintf(stdout, "Not-Promiscous: No Sniffers detected.\n");
|
|
|
|
if(!set_look_all)
|
|
exit(0); // We're finished..
|
|
else
|
|
continue; // Go onto next device..
|
|
|
|
}
|
|
if(!set_look_all)
|
|
fprintf(stdout, "%s: Unknown device.\n", argv[1]);
|
|
// Device not found..
|
|
}
|
|
end promisc.c --
|
|
-------------------------------------------------------------------------------
|
|
|
|
|
|
THC PHREAK'S TOP TEN LIST - {TOP TEN}
|
|
"Hilarious VMB Messages"
|
|
|
|
1. "Hi, this is Sara Stupid. You can call me at 555-1000 after 6.
|
|
I've had money problems lately. There have been a lot of things
|
|
going on and my financial situation hasn't improved yet. I know
|
|
that I still owe you $500 from the loan. I promise to pay you
|
|
back soon. I'm sorry it has taken so long. Should I deposit the
|
|
money directly into the account at Fat Cat Trust, account # 223344?
|
|
Or do you want to make other arrangements instead? Call me and let
|
|
me know or drop by my house at 200 Mulberry Street to discuss the
|
|
situation in person. Thanks."
|
|
|
|
[Quit crying. I'm not buying your sob story. So, quit making
|
|
lame excuses. You're pathetic. Send me the money. RIGHT NOW!]
|
|
|
|
2. "This is Bill Hacker. I'm still interested in purchasing the
|
|
products that you're selling that we discussed previously over
|
|
the phone. You can bill it to my Visa card. The number is
|
|
2532520381."
|
|
|
|
[Good idea d00d. Leave your CC# in VMB messages.]
|
|
|
|
3. "Hello Jake. I'm going to be away this weekend. So, if you want
|
|
to drop off the package, my address is 315 Loser Avenue. I will
|
|
be sure to leave the side door open for you. Talk to you soon."
|
|
|
|
[Okay. Thanks for leaving the door open for me. That eliminates
|
|
a breaking and entering (B&E) charge. :)]
|
|
|
|
4. "You have reached the Burger King Voice Mail System. Please
|
|
dial the number of the person you're calling. If you have
|
|
a mail box on this system, please press #. '5555' Mike Johnson,
|
|
Franchise Manager...BEEP." 'Hey Mikey. Former customer.
|
|
Shit King sucks!' :)
|
|
|
|
[That's his real name, Mikey. I didn't feel like changing it.]
|
|
|
|
5. "Hey all you K0d3 Kidz... This week we have even more kewl k0d3z
|
|
for ya to use. Try 1-800-XXX-XXXX passcode XXXXXX. etc."
|
|
|
|
[Obviously, a K-K3wli0 K0d3z KiDz VMB hotline.]
|
|
|
|
6. "Hey baby. Are you feeling horny tonight? Meet me at the
|
|
park on Richmond Street after 11. I'll be there, wet and
|
|
waiting. MMmmmm... Oh yeah..."
|
|
|
|
[She sounded hot. That's a message she left in her box...err
|
|
in someone's mail box, not a greeting.]
|
|
|
|
7. "Harry. Hi, this is Joe. My call got forwarded to voice mail.
|
|
I need some good shit man. I'm starting to go insane! Why aren't
|
|
you answering your cell phone? I'll try your pager again."
|
|
|
|
[Drugs anyone? That one isn't an exact quote, but rather just
|
|
typed from memory, but you get the point. A desperate guy
|
|
that's trying to reach his dealer.]
|
|
|
|
8. "Hey Stuart. I couldn't get in touch with you, so I thought that
|
|
I'd leave voice mail. The PIN # that you wanted is 55555. The
|
|
credit card # is 2512334980. It expires on 04/06/99. Call me
|
|
as soon as you hear this message."
|
|
|
|
9. "Hi Tom. This is Jeff O'Neil of Greedy Financial Services speaking.
|
|
I just wanted to notify you about your Mutual fund. The Mutual
|
|
fund that you held with us expired and the funds were transferred.
|
|
They've been deposited into your account. The total sum of your
|
|
investment upon maturation was $10,000. If you have any questions,
|
|
call 555-2255 and ask for Jeff."
|
|
|
|
[Thanks for the financial info. Forward some cash to my account.]
|
|
|
|
10. "This is NOT the Hewlett Packard (HP) line. So, quit calling
|
|
this number and leaving messages." - 1-800 Direct Dial VMB.
|
|
|
|
[It's not the h/p line? Damn.]
|
|
|
|
Note: Names, addresses, numbers etc. have been changed to protect the
|
|
naive and stupid. :) I was going to include the actual 1-800 VMB #, BN
|
|
and passcode for each, but decided not to allow everyone reading this to
|
|
call and 'invade their privacy'. Some of them are just greeting messages.
|
|
The [...] underneath them denotes my comments. The 'text' is the actual
|
|
message that I left.
|
|
|
|
Written by THC Phreak ú Damage, INC. (C)opyright 1998.
|
|
|
|
|
|
THOUGHTS, POEMS AND CREATIVE WRITING - {WRITING}
|
|
Chaotic/lyrical sound bytes/rants:
|
|
|
|
Give me fuel. Give me fire. Give me Damage, INC. desire.
|
|
|
|
Chaotic dreams are made of these. Who has a mind to disagree?
|
|
|
|
Wherever I may roam is where I'll call home.
|
|
|
|
It's a bitter sweet... symphony of destruction.
|
|
|
|
Label me and I'll lamer you.
|
|
|
|
We will... We will root you. We will... We will root you.
|
|
|
|
We're all stars in the dope show. We own your d0p3...and the show.
|
|
|
|
I woke up this morning and got myself a beer.
|
|
|
|
We are the champions, my phreak... and we'll keep going against
|
|
the grain... until the end.
|
|
|
|
Every cop is a criminal and all the answers are free.
|
|
|
|
Keep on phreakin' in the free world.
|
|
|
|
Purple haze is in my brain.
|
|
|
|
The killer in me is the killer in you.
|
|
|
|
Sick and tired, I stand alone.
|
|
|
|
I killed you... I'm not gonna crack. I'm just gonna smoke crack.
|
|
|
|
The only thing you have to phear is phear itself.
|
|
|
|
It's the end of the world as you know it. Watch the world die.
|
|
|
|
This is the end... my only phriend... the end.
|
|
|
|
Note: I decided to write something different, that I feel is creative in
|
|
its own right. Most of the above are lyrics that have been taken from
|
|
various songs. They were selected because each lyric fit into the theme of
|
|
the rant. Most were altered in some way to either change the meaning or to
|
|
add humour. Some of the others were combined with another lyric, rearranged,
|
|
the words were written differently or they were left in their original state.
|
|
I'm not going to explain what it all means, nor should I. Just as the name
|
|
Damage, INC. speaks for itself, the rant should stand alone and require no
|
|
explanation and worthless analytical comments. Take it for what it is.
|
|
|
|
Written by Blackie Lawless ú Damage, INC. (C)opyright 1998.
|
|
|
|
|
|
CLOSING COMMENTS - {CLOSING}
|
|
|
|
Alright, perhaps my closing comments aren't captivating. Maybe they're not
|
|
motivational either. They may not even be creative. However, I always
|
|
try to express my thoughts in a clear manner and send a message at the end
|
|
of each issue. In other words, I'd rather write something that carries a
|
|
meaning rather than just close every issue with the same "This ends another
|
|
issue of the Damage, INC. Newsletter. I'm very proud of this particular issue
|
|
and think that it's one of our best so far." etc. In my opinion, that's not
|
|
only boring and repetitive but it also demonstrates a lack of thought put
|
|
into it. I've read certain zines that always seem to have the exact same
|
|
closing, and I personally find it annoying... So, regardless of how my words
|
|
are received, I always write a few short paragraphs that I think are unique
|
|
to each respective issue. In that way, hopefully you won't skip this section
|
|
or die of boredom while reading through it. ;)
|
|
|
|
As I'm sure you've noticed, this issue was quite different from the previous
|
|
ones. Certain sections (such as the previous two) contained articles that you
|
|
may not be accustomed to seeing in the Damage, INC. Newsletter. No matter what
|
|
your reaction to them is, it's good. Even though not all changes are good, we
|
|
still intend to continue changing and evolving. Some readers might even be
|
|
opposed to the inclusion of a 1-800 scan. A couple mentioned that they don't
|
|
think that it's a good idea to publish scans, codes etc. That's alright. I
|
|
applaud them for saying what they think. Even though we appreciate and
|
|
encourage feedback, consider suggestions and think about the comments that are
|
|
made, that *doesn't* mean that we'll conform and change the way that the
|
|
newsletter is...to how a single reader thinks that it should be. Before any
|
|
important changes are made, they are discussed at length amongst all that are
|
|
involved in publishing the Damage, INC. Newsletter. So, if someone makes an
|
|
intelligent suggestion that we feel is worthwhile, then it will be implemented.
|
|
Basically, if we like your idea, then we'll use it. Otherwise, it obviously is
|
|
ignored, but not forgotten. There's always a chance that we'll use the idea in
|
|
the future. Therefore, voice your opinions directly to us. Send us comments
|
|
and suggestions. They don't go unnoticed. However, they won't all be used, nor
|
|
should they be. In summary, Damage, INC. isn't going to change the entire
|
|
format of the newsletter, the way that articles are written or what types of
|
|
things are included based on a small comment by a reader. That shouldn't be
|
|
expected. That's not how it works. If you disagree with this or any other
|
|
"policy", send Email to damage_inc@mailcity.com.
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
We're always looking for Writers, Members and Distribution Sites. If you'd like
|
|
to apply to Damage, INC. and join a respected h/p group, then download a copy of
|
|
the Damage, INC. Application Generator and contact us. If you want any of our
|
|
releases, they are currently available (at no ratio) on the following boards:
|
|
|
|
ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸
|
|
³ ...AND JUSTICE FOR ALL - (519) NUKE-YOU ³
|
|
³ Damage, INC. WHQ, h/p/a/c/v/t, no ratios, invite only. ³
|
|
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
|
|
³ PSYCOSiS - (519) 742-6899 ³
|
|
³ Damage, INC. Member Board, h/p/a/c/v/t. ³
|
|
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
|
|
³ SatanicDreams - (604) 930-2061 ³
|
|
³ Damage, INC. Dist. Site, Psycho/2 Net WHQ, CCi Net, h/p/a/c/v/t. ³
|
|
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
|
|
³ Infinite Darkness - (954) 797-0666 ³
|
|
³ Damage, INC. Dist. Site, CCi Net WHQ, h/p etc. ³
|
|
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
|
|
³ T's BBS - (306) 384-1600 ³
|
|
³ Damage, INC. Dist. Site, CCi Saskatchewan Host. ³
|
|
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
|
|
³ OBLiViO - +381-11-318-6392 ³
|
|
³ Damage, INC. Dist. Site, CCi Yugoslavia Host, h/p etc. ³
|
|
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
|
|
³ ViCkY BBS - +421-7-596-8331 ³
|
|
³ Damage, INC. Dist. Site, CCi Slovakia Host, h/p etc. ³
|
|
ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ;
|
|
|
|
Damage, INC. web site:
|
|
|
|
http://members.tripod.com/~damage_inc
|
|
|
|
Comments, Suggestions, Questions, Feedback, Letters to the Editor and article
|
|
submissions should be sent to damage_inc@mailcity.com. Credit is always given
|
|
to the author for any articles or source code that is submitted and published.
|
|
|
|
You can contact BLACKENED directly at blackened@coldmail.com. Shatazar can be
|
|
contacted at shatazar@alloymail.com. You can also contact us in Email on a
|
|
Damage, INC. board near you or via Echomail/Netmail in several quality nets
|
|
including: CCi_Net, Psycho/2_Net etc.
|
|
|
|
- EOF
|