105 lines
7.8 KiB
Plaintext
105 lines
7.8 KiB
Plaintext
******************************************************************************
|
||
* THE BASICS OF HACKING: INTRO **
|
||
|
||
THE FIRST OF A SET OF ARTICLES: AN INTRODUCTION TO THE WORLD OF THE HACKER.
|
||
BASICS TO KNOW BEFORE DOING ANYTHING, ESSENTIAL TO YOUR CONTINUING CAREER AS
|
||
ONE OF THE ELITE IN * * THE COUNTRY... THIS ARTICLE, "THE INTRODUCTION TO THE
|
||
WORLD OF HACKING" IS MEANT TO HELP YOU BY TELLING YOU HOW NOT TO GET CAUGHT,
|
||
WHAT NOT TO DO ON A COMPUTER SYSTEM, WHAT TYPE OF EQUIPMENT SHOULD I KNOW ABOUT
|
||
NOW, AND JUST A LITTLE ON THE HISTORY, PAST PRESENT FUTURE, OF THE HACKER.
|
||
WELCOME TO THE WORLD OF HACKING! WE, THE PEOPLE WHO LIVE OUTSIDE OF THE NORMAL
|
||
RULES, AND HAVE BEEN SCORNED AND EVEN ARRESTED BY THOSE FROM THE 'CIVILIZED
|
||
WORLD', ARE BECOMMING SCARCER EVERY DAY. THIS IS DUE TO THE GREATER FEAR OF
|
||
WHAT A GOOD HACKER (SKILL WISE, NO MORAL JUDGEMENTS HERE) CAN DO NOWADAYS, THUS
|
||
CAUSING ANTI-HACKER SENTIMENT IN THE MASSES. ALSO, FEW HACKERS SEEM TO
|
||
ACTUALLY KNOW ABOUT THE COMPUTER SYSTEMS THEY HACK, OR WHAT EQUIPMENT THEY WILL
|
||
RUN INTO ON THE FRONT END, OR WHAT THEY COULD DO WRONG ON A SYSTEM TO ALERT THE
|
||
'HIGHER' AUTHORITIES WHO MONITOR THE SYSTEM. THIS ARTICLE IS INTENDED TO TELL
|
||
YOU ABOUT SOME THINGS NOT TO DO, EVEN BEFORE YOU GET ON THE SYSTEM. WE WILL
|
||
TELL YOU ABOUT THE NEW WAVE OF FRONT END SECURITY DEVICES THAT ARE BEGINNING TO
|
||
BE USED ON COMPUTERS. WE WILL ATTEMPT TO INSTILL IN YOU A SECOND IDENTITY, TO
|
||
BE BROUGHT UP AT TIME OF GREAT NEED, TO PULL YOU OUT OF TROUBLE. AND, BY THE
|
||
WAY, WE TAKE NO, REPEAT, NO, RESPONSIBILITY FOR WHAT WE SAY IN THIS AND THE
|
||
FORTHCOMING ARTICLES. ENOUGH OF THE BULLSHIT, ON TO THE FUN: AFTER LOGGING ON
|
||
YOUR FAVORITE BBS, YO U SEE ON THE HIGH ACCESS BOARD A PHONE NUMBER! IT SAYS
|
||
IT'S A GREAT SYSTEM TO "FUCK AROUND WITH!" THIS MAY BE TRUE, BUT HOW MANY OTHER
|
||
PEOPLE ARE GOING TO CALL THE SAME NUMBER? SO: TRY TO AVOID CALLING A NUMBER
|
||
GIVEN TO THE PUBLIC. THIS IS BECAUSE THERE ARE AT LEAST EVERY OTHER USER
|
||
CALLING, AND HOW MANY OTHER BOARDS WILL THAT NUMBER SPREAD TO? IF YOU CALL A
|
||
NUMBER FAR, FAR AWAY, AND YOU PLAN ON GOING THRU AN EXTENDER OR A RE- SELLER,
|
||
DON'T KEEP CALLING THE SAME ACCESS NUMBER (I.E. AS YOU WOULD IF YOU HAD A
|
||
HACKER RUNNING), THIS LOOKS VERY SUSPICIOUS AND CAN MAKE LIFE MISERABLE WHEN
|
||
THE PHONE BILL COMES IN THE MAIL. MOST CITIES HAVE A VARIETY OF ACCESS NU
|
||
MBERS AND SERVICES, SO USE AS MANY AS YOU CAN. NEVER TRUST A CHANGE IN THE SY
|
||
STEM... THE 414'S, THE ASSHOLES, WERE CAUGHT FOR THIS REASON: WHEN ONE OF TH
|
||
EM CONNECTED TO THE SYSTEM, THERE WAS NOTHING GOOD THERE. THE NEXT TIME, THE
|
||
RE WAS A TREK GAME STUCK RIGHT IN THEIR WAY! THEY PROCEDED TO PLAY SAID GAME F
|
||
OR TWO, SAY TWO AND A HALF HOURS, WHILE TELENET WAS TRACING THEM! NICE JOB, DO
|
||
N'T YOU THINK? IF ANYTHING LOOKS SUSPICIOUS, DROP THE LINE IMMEDIATELY !! AS
|
||
IN, YESTERDAY!! THE POINT WE'RE TRYING TO GET ACROSS IS: IF YOU USE A LITTLE
|
||
COMMON SENSE, YOU WON'T GET BUSTED. LET THE LITTLE KIDS WHO AREN'T SMART
|
||
ENOUGH TO RECOGNIZE A TRAP GET BUSTED, IT WILL TAKE THE HEAT OFF OF THE REAL
|
||
HACKERS. NOW, LET'S SAY YOU GET ON A COMPUTER SYSTEM... IT LOOKS GREAT ,
|
||
CHECKS OUT, EVERYTHING SEEMS FINE. OK, NOW IS WHEN IT GETS MORE DANGEROUS.
|
||
YOU HAVE TO KNOW THE COMPUTER SYSTEM (SEE FUTURE ISSUES OF THIS ARTICLE FOR
|
||
INFO ON SPECIFIC SYSTEMS) TO KNOW WHAT NOT TO DO. BASICALLY, KEEP AWAY FROM A
|
||
NY COMMAND WHICH LOOKS LIKE IT MIGHT DELETE SOMETHING, COPY A NEW FILE INTO THE
|
||
ACCOUNT, OR WHATEVER! ALWAYS LEAVE THE ACCOUNT IN THE SAME STATUS YOU LOGG ED
|
||
IN WITH. CHANGE *NOTHING*... IF IT ISN'T AN ACCOUNT WITH PRIV'S, THEN DON' T
|
||
TRY ANY COMMANDS THAT REQUIRE THEM! ALL, YES ALL, SYSTEMS ARE GOING TO BE K
|
||
EEPING LOG FILES OF WHAT USERS ARE DOING, AND THAT WILL SHOW UP. IT IS JUST
|
||
LIKE DROPPING A TROUBLE-CARD IN AN ESS SYSTEM, AFTER SENDING THAT NICE OPE
|
||
RATOR A PRETTY TONE. SPEND NO EXCESSIVE AMOUNTS OF TIME ON THE ACCOUNT IN ONE
|
||
STRETCH. KEEP YOUR CALLING TO THE VERY LATE NIGHT IF POSSIBLE, OR DURING
|
||
BUSINESS HOURS (BELIEVE IT OR NOT!). IT SO HAPPENS THAT THERE ARE MORE USERS
|
||
ON DURING BUSINESS HOURS, AND IT IS VERY DIFFICULT TO READ A LOG FILE WITH 60
|
||
USERS DOING MANY COMMNDS EVERY MINUTE. TRY TO AVOID SYSTEMS WHERE EVERYONE
|
||
KNOWS EACH OTHER, DON'T TRY TO BLUFF. AND ABOVE ALL: NEVER ACT LIKE YOU OWN
|
||
THE SYSTEM, OR ARE THE BEST THERE IS. THEY ALWAYS GRAB THE PEOPLE WHO'S HEADS
|
||
SWELL... THERE IS SOME VERY INTERESTING FRONT END EQUIPMENT AROUND NOWADAYS,
|
||
BUT FIRST LET'S DEFINE TERMS... BY FRONT END, WE MEAN ANY DEVICE THAT YOU MUST
|
||
PASS THRU TO GET AT THE REAL COMPUTER. THERE ARE DEVICES THAT ARE MADE TO
|
||
DEFEAT HACKER PROGRAMS, AND JUST PLAIN OLD MULTIPLEXERS. TO DEFEAT HACKER
|
||
PROGRAMS , THERE ARE NOW DEVICES THAT PICK UP THE PHONE AND JUST SIT THERE...
|
||
THIS MEANS THAT YOUR DEVICE GETS NO CARRIER, THUS YOU THINK THERE ISN'T A
|
||
COMPUTER ON THE OTHER END. THE ONLY WAY AROUND IT IS TO DETECT WHEN IT WAS
|
||
PICKED UP. IF IT PICKES UP AFTER THE SAME NUMBER RING, THEN YOU KNOW IT IS A
|
||
HACKER- DEFEATER. THESE DEVICES TAKE A MULTI- DIGIT CODE TO LET YOU INTO THE
|
||
SYSTEM. SOME ARE, IN FACT, QUITE SOPHISTICATED TO THE POINT WHERE IT WILL ALSO
|
||
LIMIT THE USER NAME' S DOWN, SO ONLY ONE NAME OR SET OF NAMES CAN BE VALID
|
||
LOGINS AFTER THEY INPUT THE CODE... OTHER DEVICES INPUT A NUMBER CODE, AND
|
||
THEN THEY DIAL BACK A PRE-PROGRAMMED NUMBER FOR THAT CODE. THESE SYSTEMS ARE
|
||
BEST TO LEAVE ALONE, BECAUSE THEY KNOW SOMEONE IS PLAYING WITH THEIR PHONE.
|
||
YOU MAY THINK "BUT I'LL JUST REPROGRAM THE DIAL-BACK." THINK AGAIN, HOW STUPID
|
||
THAT IS... THEN THEY HAVE YOUR NUMBER, OR A TEST LOOP IF YOU WERE JUST A
|
||
LITTLE SMARTER. IF IT'S YOUR NUMBER, THEY HAVE YOUR BALLS (IF MALE...), IF ITS
|
||
A LOOP, THEN YOU ARE SCREWED AGAIN, SINCE THOSE LOOPS ARE *MONITORED*. AS FOR
|
||
MULTIPLEXERS... WHAT A PLEXER IS SUPPOSED TO DO IS THIS: THE SYSTEM CAN
|
||
ACCEPT MULTIPLE USERS. WE HAVE TO TIME SHARE, SO WE'LL LET THE FRONT- END
|
||
PROCESSOR DO IT... WELL, THIS IS WHAT A MULTIPLEXER DOES. USUALLY THEY WILL
|
||
ASK FOR SOMETHING LIKE "ENTER CLASS" OR "LINE:". USUALLY IT IS PROGRAMMED FOR
|
||
A DOUBLE DIGIT NUMBER, OR A FOUR TO FIVE LETTER WORD. THERE ARE USUALLY A FEW
|
||
SETS OF NUMBERS IT ACCEPTS, BUT THOSE NUMBERS ALSO SET YOUR 300/1200 BAUD DATA
|
||
TYPE. THESE MULTIPLEXERS ARE INCONVENIENT AT BEST, SO NOT TO WORRY. A LITTLE
|
||
ABOUT THE HISTORY OF HACKING: HACKING, BY OUR DEFINITION, MEANS A GREAT
|
||
KNOWLEDGE OF SOME SPECIAL AREA. DOCTORS AND LAWYERS ARE HACKERS OF A SORT, BY
|
||
THIS DEFINITION. BUT MOST OFTEN, IT IS BEING USED IN THE COMPUTER CONTEXT, AND
|
||
THUS WE HAVE A DEFINITION OF "ANYONE WHO HAS A GREAT AMOUNT OF COMPUTER OR
|
||
TELECOMMUNICATIONS KNOWLEDGE." YOU ARE NOT A HACKER BECAUSE YOU HAVE A LIST OF
|
||
CODES... HACKING, BY OUR DEFINITION, HAS THEN BEEN AROUND ONLY ABOUT 15 YEARS.
|
||
IT STARTED , WHERE ELSE BUT, MIT AND COLLEGES WHERE THEY HAD COMPUTER SCIENCE
|
||
OR ELECTRICAL ENGINEERING DEPARTMENTS. HACKERS HAVE CREATED SOME OF THE BEST
|
||
COMPUTER LANGUAGES, THE MOST AWESOME OPERATING SYSTEMS, AND EVEN GONE ON TO
|
||
MAKE MILLIONS. HACKING USED TO HAVE A GOOD NAME, WHEN WE COULD HONESTLY SAY
|
||
"WE KNOW WHAT WE ARE DOING". NOW IT MEANS (IN THE PUBLIC EYE): THE 414'S, RON
|
||
AUSTIN, THE NASA HACKERS, THE ARPANET HACKERS... ALL THE PEOPLE WHO HAVE BEEN
|
||
CAUGHT, HAVE DONE DAMAGE, AND ARE NOW GOING TO HAVE TO FACE FINES AND
|
||
SENTANCES. THUS WE COME PAST THE MORALISTIC CRAP, AND TO OUR PURPOSE: EDUCATE
|
||
THE HACKER COMMUNITY, RETURN TO THE DAYS WHEN PEOPLE ACTUALLY KNEW SOMETHING...
|
||
PROGRAM GUIDE: THREE MORE ARTICLES WILL BE WRIT TEN IN THIS SERIES, AT THE
|
||
PRESENT TIME. BASICS OF HACKING I: DEC'S BASICS OF H ACKING II: VAX'S (UNIX)
|
||
BASICS OF HACKING III: DATA GENERAL IT IS IMPOSS IBLE TO WRITE AN ARTICLE ON
|
||
IBM, SINCE THERE ARE SO MANY SYSTEMS AND WE ONLY H AVE INFO ON A FEW... THIS
|
||
ARTICLE HAS BEEN WRITTEN BY: THE KNIGHTS OF SHADOW
|
||
********************************* [END] 1984 *****************************
|
||
|