641 lines
26 KiB
Plaintext
641 lines
26 KiB
Plaintext
|
||
PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC
|
||
PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC
|
||
PPiC-PPiC _____ _____ ______ _____ PPiC-PPiC
|
||
PPiC-PPiC / _ /\ / _ /\ /_ __/\ / ___/\ PPiC-PPiC
|
||
PPiC-PPiC / ___/ // ___/ /_\/ /\_\// /\__\/ PPiC-PPiC
|
||
PPiC-PPiC /_/\__\//_/\__\//_____/\ /____/\ PPiC-PPiC
|
||
PPiC-PPiC \_\/ \_\/ \_____\/ \____\/ PPiC-PPiC
|
||
PPiC-PPiC PPiC-PPiC
|
||
PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC
|
||
PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC-PPiC
|
||
|
||
|
||
PRESENTS: PPiC Issue #1
|
||
|
||
By No Name & Scourge
|
||
|
||
|
||
|
||
|
||
|
||
|
||
^L
|
||
|
||
THE BULLSHIT:
|
||
|
||
THIS FILE IS FOR INFORMATIONAL PURPOSES ONLY. DO NOT ATTEMPT
|
||
ANYTHING CONTAINED WITH IN. PLEASE DELETE THIS FILE. DON'T
|
||
EVEN FUKN READ THIS FILE. DON'T BLAME ANYONE BUT YOURSELF IF
|
||
YOU TRY ANYTHING IN HERE AND GET CAUGHT, HURT YOURSELF, GET
|
||
LOCKED OFF OF A BBS, GO TO PRISON, ETC. THE AUTHORS OF THIS
|
||
TAKE NO RESPONSIBILITY FOR ANYTHING IN THIS DOC. WE DON'T
|
||
TAKE RESPONSIBILITY IN ANYTHING. AND YOU WON'T BE ABLE TO
|
||
FIND US. SO DON'T TRY AND PIN SHIT ON US. END OF BOLD PRINT.
|
||
|
||
Thats all I gotta say...
|
||
-----------------------------------------------------------------------------
|
||
|
||
|
||
Table of Contents:
|
||
------------------
|
||
PPiC History -Scourge & No Name
|
||
The True Game -Scourge
|
||
Destroy Corruption -Scourge
|
||
No Name's Shit -No Name
|
||
Fukn with Phortress Fones -No Name
|
||
Hacking Macs -Duck
|
||
Our Intro -No Name
|
||
Ben & Paul -Scourge
|
||
CC's #'s -BILL V.
|
||
|
||
|
||
|
||
History:
|
||
--------
|
||
The iNNER CiRCLE merged with Phose and Phree on March 1st, 1994.
|
||
To form PPiC. A diverse group devoted to hacking, phreaking,
|
||
anarchy, and other weird shit like storytelling and getting fucked.
|
||
-Scourge and No Name, leaders of PPiC...
|
||
|
||
|
||
|
||
|
||
|
||
The True Game
|
||
-------------
|
||
-Scourge
|
||
|
||
Who am I? The question has happened many a time, over and over.
|
||
Am I the super-intelligent person some people make me out to be? Am I the
|
||
brutal asshole others have labeled me? Am I the vicious hacker, the
|
||
evil mischief-maker, the lover?
|
||
|
||
I am fate. I defy the bonds of the oppressing law, of the
|
||
corruption which eats at this world. I destroy the corrupt, I live with it,
|
||
and it with me. I am the lover, the fighter, the brain, and the devil.
|
||
|
||
What is my destiny? What am I meant to do? Do I follow my current
|
||
path? Does my destiny in destroying the security of this corrupt world
|
||
make me evil as well?
|
||
|
||
I am not of this world. I defy the corruption. This is the True
|
||
Game. The game of hiding, the game of seeking, the game of sex, the game of
|
||
war. It is a battle I cannot win, but I will not lose. Breaking
|
||
the standards others have set is not immoral, stopping the rise of the
|
||
evil of conformity is not immoral. Fight the battle, and you may
|
||
not win, but we can still win the war.
|
||
|
||
Become the hacker. Become the fighter. Become the lover, the genius, the
|
||
thief and anarchist. Join the movement. We have the so-called power, if
|
||
we united, what law could stop us, what name could strike fear into our
|
||
hearts?
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
DESTROY CORRUPTION
|
||
|
||
------------------
|
||
Stopping the Corruption:
|
||
|
||
There are several ways you can "liberate" freedom in your school.
|
||
Sick of listening to conforming bitches like Mrs. Biatch, your 11th
|
||
Grade English teacher? Well, you can give yourself a little relief (Grin)
|
||
|
||
First, take the following:
|
||
Newspaper
|
||
Scissors
|
||
Glue
|
||
Gloves
|
||
Envelope
|
||
Stamp.
|
||
Write a good nasty letter (bomb threat) to your school.
|
||
Chances are 50/50 they will ignore it the 1st time. Write a few more, get a
|
||
friend that's out of school to make a few calls from DIFFERENT pay phones.
|
||
(This is important. If I hadn't said that, some poor kid would say,
|
||
"But mommy, Scourge didn't say I had to do it from different pay phones!"
|
||
If that doesn't close school, do this. Take a little (PURE) ammonia, and
|
||
some iodine crystals. Mix them till the iodine dissolves. Dip some
|
||
toilet paper into the mixture, stuff it in the keyhole of the school
|
||
or something, while IT IS STILL WET! Once it dries, anyone who touches,
|
||
hits, breathes on, or looks at the TP will probably be injured by the
|
||
explosion. THEN, they will take you seriously. Be VERY careful from now on.
|
||
If you get busted, you will most likely be on NATIONAL TELEVISION!
|
||
-Scourge
|
||
|
||
|
||
|
||
|
||
|
||
No Names Shit
|
||
-------------
|
||
-No Name
|
||
|
||
Hey its me. I'm not gonna get all deep like Scourge. But here's the shit.
|
||
We're new at this. The shit's probably all fukd. Typo's and other shit will
|
||
be all over it. Sorry this'll be so short, but we wanted to get our name out.
|
||
As Scourge says, We are hackers/piraters/anarchists. We plan on doing a lot
|
||
for the hacker community. But we need some help first. Call our board (29A)
|
||
give us some numbers of good boards to get on. In 616 there are only a couple
|
||
of kewl boards around so we need some more. -End of my shit.
|
||
|
||
About me: Past adventures.. Well, I remember when I became the "TiTANiC" and
|
||
sent a zip file that had a ansi bomb inclosed to many of the local bbs's.
|
||
which when unzipped redefined the return key to type format c: (enter) Y (enter)
|
||
Hacked around a security program that did loggins for a network. (Stole the
|
||
supervisor password with a log file.)
|
||
|
||
|
||
|
||
|
||
|
||
X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%
|
||
%X %X
|
||
X% HAKN Phortress Fones X%X%
|
||
%X %X<>X
|
||
X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%<25>%
|
||
X<><58><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>By No Name<6D><65><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>X
|
||
%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%
|
||
|
||
PHOS<4F>/PHR<48><52>/<2F>NN<4E>R C<>RCL<43>
|
||
[616] HACKERS
|
||
|
||
|
||
|
||
How to Beige box off of pay Phones..
|
||
|
||
________________________
|
||
|\ /|
|
||
| \___________________/ |
|
||
| | | | <---- Phone Booth
|
||
| | ____________ | |
|
||
| | | Phone | | |
|
||
| | | __ | | |
|
||
| | | ( ) | | |
|
||
| | | || | | |
|
||
| | | (__) | | |
|
||
| | | \ | | |
|
||
| | | <20><> \____| | |
|
||
| | |____________| | |
|
||
| |_________________| |
|
||
| / \ |
|
||
|/_____________________\|
|
||
| _____ |
|
||
|| ||
|
||
|| R ||
|
||
|| e ||
|
||
|| m || <-------Important wires kept in here.
|
||
|| o ||
|
||
|| v || Ground
|
||
|| e || /
|
||
||_____|| V
|
||
__________|_______|____________________________________________
|
||
|
||
Remove cover from area marked in the above illustration. (use pry bar.)
|
||
You will find four (4) wires. Red, green, yellow, and black. The Red and
|
||
Green wires are for phone use. The yellow and black are used to tell when
|
||
coins are inserted, and when to give them back. If none are exposed, Use
|
||
wire strippers and strip the red and the green wires. Attach the red and
|
||
green sides of the beige box to the appropriate sides. And there you go.
|
||
You have just bypassed the phones coin collect.
|
||
|
||
(If wall mounted or in a different shell, reach under it and feel around,
|
||
If not found, pull phone off of the wall and get the wires.)
|
||
-No Name
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||
<20> How To Hack Macintosh <20>
|
||
<20> Computers...... <20>
|
||
<20> <20><><EFBFBD><EFBFBD><EFBFBD>Ŀ <20><><EFBFBD><EFBFBD><EFBFBD>Ŀ <20><><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD>Ŀ <20>
|
||
<20> <20> <20> <20> <20> <20> <20> <20>
|
||
<20> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20> <20> <20>
|
||
<20> <20> <20> <20> <20> <20>
|
||
<20> <20> <20> <20><><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20>
|
||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||
By Duck
|
||
|
||
<20><><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||
<20>
|
||
<20> he key to hacking Macintosh is the software!
|
||
<20>
|
||
<20>
|
||
|
||
1......At Ease v1.0
|
||
|
||
There are many ways to get by "At Ease v1.0"
|
||
|
||
|
||
1) Overite the "At Ease Preferences" file using
|
||
a Word Processor of your choice.
|
||
|
||
2) Delete the "At Ease Preferences" file using
|
||
any application with a delete function.
|
||
|
||
3) Start up with a boot disk. Then drag "At Ease"
|
||
into the trash. Drag the "Finder" from the
|
||
boot disk into the hard drives "System" folder.
|
||
Eject the boot disk and reboot.
|
||
|
||
4) Use "HyperCard" to make a script to delete the
|
||
file "At Ease Preferences". (Knowledge of
|
||
HyperCard Programming is helpful)...req...
|
||
|
||
2......Folder Bolt v1.0
|
||
|
||
1) Rebuild the desktop. (by holding Shft-Cmnd-Opt-Ctrl
|
||
during boot) Then do a finder file search. Search for
|
||
"Kind" contains "Folder". Keep hitting Cmnd-G until
|
||
you are in the System Folder. There you go!
|
||
|
||
2) Select the folder you want into. Then hit Cmnd-O
|
||
until the folder opens.
|
||
|
||
3) This is not yet confirmed...
|
||
Edit the FB???????? file using Norton or some
|
||
other hex-editor. This should show you the password.
|
||
|
||
4) Buy folder bolt. (or get the administrators disk)
|
||
Run the program "FolderBolt Administrator". Then select
|
||
uninstall. This should get rid of FolderBolt all to-
|
||
gether.
|
||
|
||
3......After Dark Password protection
|
||
|
||
1) First start up with a boot disk. Then drag the "After
|
||
Dark Preferences" file into the trash. Empty the trash.
|
||
Reboot and the problem should be fixed.
|
||
|
||
4.....Menu Hacking
|
||
|
||
1) Using ResEdit v2.x.x or above you can edit the menus
|
||
of the "Finder". Open ResEdit. Then open the finder and
|
||
edit the "MENU" resource. You should be able to rename
|
||
the menus and menu items. Have fun here. Try changing
|
||
names to your favorite cut-down sentence. (warning...any
|
||
changes to the finder a permanent so make a backup copy
|
||
first! ..other wise your computer maybe shot for life!)
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Our Proud Country
|
||
or the Black Handkerchief
|
||
or Ben & Paul
|
||
----------------------------
|
||
|
||
There once was this kid named Norman. Norman wasn't to liked by the kids
|
||
at his school. He tried everything. Bell bottoms, dancing the Cabbage Patch,
|
||
playing "lackey" for all the other kiddies. Suddenly, an idea hit Norman. He
|
||
would work out some, got his ear pierced, got his buttcheeks stiffened (for
|
||
the fellas), and wear the cute black handkerchief in his back left pocket. He
|
||
got attention, all right. He started hanging out with the crowd whose names
|
||
all ended in "enna".
|
||
|
||
Chapter Two
|
||
|
||
The annual FBA was meeting. No one really knew what FBA stood for, it was
|
||
considered a great honor of the group leaders. Every Wednesday they would
|
||
go out, take big sledgehammers, and go beat queers. They were going to
|
||
merge with the KKK tonight at their annual Queerbash fest. They sent out
|
||
invitations to all the unknowing rump-rangers, including Rush Limbaugh,
|
||
George Bush, and Cindy Crawford (who by the way IS a man, you think any
|
||
WOMAN could be that good-lookin?) When the party started, nothing but
|
||
underwear was left of the 3 celebs. Not even a dickhair. One of the
|
||
group leaders' sons, whose name was Terrin, decided he was going to protest
|
||
against such violence. After all, homosexually-oriented people have their
|
||
rights. So, he staged a revolt, and got kicked out of the FBA.
|
||
|
||
|
||
Chapter 3
|
||
So, Norman was in the grocery store. He was checking out the pantyhose section
|
||
when four men in full-body armor burst into the store holding long metal
|
||
pipes. Norman started viciously rubbing at the mascara and other highlights
|
||
on his face. He ducked behind the isle. Unfortunately (for him) he was
|
||
seen by one of the men.
|
||
"Hey guys! A fag! Let's get him!" screamed the man.
|
||
To no avail, Norman ran as hard as he could.
|
||
"Sthtop it, you guysth!" he pleaded. The men grabbed him, and shoved
|
||
their pipes up his ass.
|
||
"Let's see how you like it, fag!" one of the men screamed.
|
||
"Not stho hard!" yelled Norman.
|
||
But the men didn't listen. They shoved their pipes up Norman's anus further,
|
||
and punctured his intestines. Norman's blood began to drain from his face, and
|
||
shit started pouring out his butt.
|
||
"Oh, you like it, huh?" laughed one of the men. He shoved his pipe
|
||
until he heard a FSST and his pipe was dissolved by the mixture of stomach acid
|
||
and come. THe man holding the now shortened pipe screamed, and the rest of the
|
||
men shoved their pipes in other places also, causing Norman's heart to come out
|
||
of his mouth, shit pour out of his ears, and have an enigma all at the same
|
||
time.
|
||
"Whoa! Look at that, guys! Ain't ever seen a full-body breakdown
|
||
before!"
|
||
So the four men nailed his arms and legs to the front window of the Grocery
|
||
Store. Their customers dropped by 50%.
|
||
|
||
Chapter 4
|
||
|
||
Terrin, hearing about the mishap at the grocery store, got there as quickly
|
||
as he could. The grocer took him aside. After a long talk with the
|
||
grocer, Terrin wrote all he had learned in the little notebook he had
|
||
purchased for this person.
|
||
"Stho Norman isth sthill alive?" Terrin asked the Grocer.
|
||
"Yeah. Of course! As soon as the government heard of it! You
|
||
know what a straight man's rights are worth nowadays! Why, as soon as they
|
||
heard of Norman's plight, they kicked out all the white male Republicans!"
|
||
"Yeah. Stho?"
|
||
Terrin traveled to the hospital where Norman was. He saw Norman hooked
|
||
up to a very expensive piece of machinery, with big patches of gauze on his
|
||
ears and a tube running up his anus.
|
||
"Norman? Are you all right?" asked Terrin.
|
||
"Yesth. I'm doing justh fine, for a man with a enigma."
|
||
"Well, I've come on your behalf, to let you know that usth kind of
|
||
people do have righth."
|
||
"Oh, fantasthic! Terrin, will you be my lover?"
|
||
"Yesth, you hunk of a ma-an!"
|
||
Stho Norman and Terrin went off into thhe thsunthset.
|
||
|
||
Chapter 5
|
||
|
||
The FBA was at one of their Wednesday meetings. They were in quite an outrage,
|
||
hearing that Terrin had joined the ranks of the butt-pirates. They were all
|
||
wondering what was to be done about this. So, they all joined together, and
|
||
after 2 coffee breaks, a few donuts, and some wild thang on the boss's desk
|
||
(characteristic of federally-oriented agencies), they came up with a wonderful
|
||
idea.
|
||
"I say we kill him."
|
||
After 2 more coffee breaks, and a few more rounds of hanky-panky:
|
||
"No. We couldn't do that"
|
||
So they decided the best way to teach him his place was to show his foul acts
|
||
on public TV.
|
||
|
||
Chapter 6
|
||
|
||
"Oh, Terrin, you thsweet angel!" Norman screamed as he shot it
|
||
up Terrin. He fell over, only to see, laying on his back, a 9mm camera.
|
||
"AAAAAAAAAAAAAAAAHHHHHHHHHHHHHH!!!!" he screamed, mortified. Terrin,
|
||
watching TV, also screamed when Tiny Toons was interupted by his session
|
||
with Norman.
|
||
----------------------------SIX HOURS LATER--------------------------------------
|
||
|
||
NOrman and Terrin sitting in a police station for exposure. The cops, being
|
||
faggot-haters, staged a car chase and blamed their beating them on their
|
||
being temporarily insane.
|
||
|
||
Epilogue
|
||
|
||
Norman, still having a indecent life after being raped in prison and
|
||
suffering anal cancer, changed his name to **** *********. Terrin, being
|
||
chased after, decided to change not only his name, but his actual sex. He
|
||
got a Fake ID and renamed himself (Name with-held).
|
||
|
||
Point of Story
|
||
|
||
HA!
|
||
|
||
Moral
|
||
|
||
See what eventually happens to faggots?
|
||
|
||
Corollary to Moral: Faggots eventually get anal cancer.
|
||
|
||
|
||
Theorem: Homosexuality causes intelligence deprivation.
|
||
Proof: **** *********
|
||
|
||
---------------------------------------------------------------------------
|
||
|
||
|
||
How the numbering on CC's works.
|
||
And how people change them.
|
||
--------------------------------
|
||
-No Name
|
||
|
||
(Editors note: Some info from Phrack)
|
||
|
||
Credit card Format:
|
||
TBBB-LLLL-XXXX-XXXC
|
||
|
||
T= Type
|
||
B= Branch of bank
|
||
L= Limit/experation date
|
||
X= Id purpose
|
||
C= Checksum
|
||
|
||
Type of cards.. (the letter T in the Ex.)
|
||
|
||
3 American Express
|
||
4 Visa
|
||
5 Mastercard
|
||
6 Discover
|
||
|
||
Branch codes, Different for each type of card.
|
||
|
||
VISA
|
||
|
||
BBB Bank
|
||
-------- ---------
|
||
019 Bank of America
|
||
024 Bank of America
|
||
052 First Cincinatti
|
||
060 Navy Federal Credit Union
|
||
128 Citibank
|
||
131 State Street Bank
|
||
215 Marine Midland
|
||
225 Chase Manhattan
|
||
231 Chase Lincoln First Classic
|
||
232 Chase Lincoln First Classic
|
||
241 Nat. Westminester Bank
|
||
250 First Chicago Bank
|
||
271 Citibank Preferred
|
||
302 H.H.B.C.
|
||
310 Imperial Savings
|
||
317 Gold Dome
|
||
387 Bank One
|
||
428 Bank of Hoven
|
||
811 Bank of Hawaii
|
||
897 Village bank of Cincinatti
|
||
|
||
|
||
Master Cards
|
||
|
||
|
||
|
||
BBB Bank
|
||
--------- ---------
|
||
215 Marine Midland
|
||
217 Manufacturers Hanover Trust
|
||
233 Huntington Bank
|
||
242 Chevy Chase Federal Savings
|
||
254 Bank of America
|
||
263 Chemical Bank
|
||
273 Bank of America
|
||
286 Chase Lincoln First
|
||
317 Norwest
|
||
323 Bank of New York
|
||
329 Maryland Bank NA (MBNA)
|
||
410 Citibank Preferred
|
||
411 1st Fin. bank of Omaha
|
||
414 Nat. Westminester Bank
|
||
415 Colonial National Bank
|
||
424 Citibank
|
||
465 Chase Manhattan
|
||
678 Marine Midland
|
||
|
||
|
||
III. Bank Codes [ International Bank or Interlink Numbers]
|
||
|
||
|
||
|
||
These are used in checking credit. Later on, you will learn that while
|
||
checking the credit cards for the amount of credit, you will be prompted to
|
||
enter the Bank ID along with the Merchant ID. The bank IDs are, I believe, from
|
||
the following list. One note-- you cannot just choose any Bank ID and use it
|
||
with any merchant ID. They must correspond in some way. How, I don't know. I
|
||
THINK that a bank issues a merchant number to each of their customers. If you
|
||
try to use a merchant number with a bank number, and the merchant doesn't
|
||
actually use the bank that is specified by the bank number, you are going to
|
||
get some problems. (ie, the verification won't go through.) Again, I will state
|
||
that this is only a theory. The reason that I post this theory is to get minds
|
||
working. So far, no one has mentioned their ideas on the function of Bank
|
||
Codes. If you do happen to find out the true meaning of these numbers, please
|
||
get in touch with me so I can update this list. Thanks. One word- on VISA
|
||
credit cards, the bank IDs are the first 4 digits of the Card. For Mastercards,
|
||
however, they vary. A list follows:
|
||
|
||
Bank Bank Code
|
||
---- ---------
|
||
Chemical Bank 1263
|
||
Marine Midland 6207 [1207?]
|
||
Manufacturers Hanover Trust 1033
|
||
Citibank 1035
|
||
Huntington 1226
|
||
First Card Gold 1286
|
||
MBNA 6017
|
||
Chase Manhatten 1665
|
||
[ Bank from 5127 ] 1015
|
||
|
||
|
||
|
||
The LLLL part, or the second group on a credit card in from
|
||
the left, contains some VERY useful information about the card. This group
|
||
holds the information on the Maximum Expiration Date and the Maximum Credit
|
||
Limit. (I believe that you can all see the benefits of this.) This does not
|
||
mean, however, that the ACTUAL expiration date and ACTUAL credit limit are in
|
||
this group. What it means is this: When the different Credit Card Companies
|
||
issue Credit Cards to the consumer, he of course has a credit limit. And when
|
||
the Companies formulate credit cards, they create certain groups for certain
|
||
customers. That is, certain "groups" contain all the credit cards for people
|
||
with a credit limit between $x and $y. The same thing goes with the expiration
|
||
dates. Everyone whose card expires after m1/y1 and before m2/y2 has their
|
||
credit card in a certain group formulated by the company. For example:
|
||
My name is Joe Schmoe. My Visa credit card expires in January of the year 1999.
|
||
My credit limit on this card is $7,000. My credit card number (CCN) will
|
||
probably be in the same group as my brother-in-law Jack Koff whose card expires
|
||
in December of 1998 and whose credit limit is $6,000. BUT, our cards will be in
|
||
different groups entirely than my boss' whose card expires in June of 1995 and
|
||
whose credit limit is $40,000.
|
||
|
||
Back to the point of section IV: Lets say you have a credit card with a
|
||
known expiration date and known credit limit. Lets also say that you happen
|
||
upon ANOTHER credit card whose numbers are the same up until the last 2 groups.
|
||
(You and I see that these two cards were issued by the same bank and PROBABLY
|
||
have a credit limit in the same ball park and an expiration date not far from
|
||
each other. ) BUT, even though you have this new credit card, you lost the
|
||
expiration date and credit limit. GOSH! How are you going to use this card when
|
||
you don't know this information?? APROXIMATE! You have a general idea now, and
|
||
you can go from there.
|
||
|
||
One warning here: I have found that small groups of cards with high credit
|
||
limits are often hidden in between large groups of cards with very low credit
|
||
limits. For instance, lets look at this card: 4123 4567 8901 2345. From -4567
|
||
until 4600 in group 3 (from the right) gold cards may exist. But after 4600 and
|
||
before 4567, cards with credit limits of $500 exist. Kind of sucks, huh?? Just
|
||
wanted to make you aware of this.
|
||
|
||
Now, once you learn how to modify these without hurting the card, you have
|
||
increased your value as a carder by 100x. But be careful. Often when you modify
|
||
a card's group 3 to get a higher credit limit line of cards, you will find the
|
||
entire line is dead. Or, in other cases, just the original card you find is
|
||
dead, and all surrounding cards are valid with the new credit limits.
|
||
|
||
|
||
V. "Group 2" & "Group 1"
|
||
|
||
|
||
|
||
These two groups, or the last two groups on the credit card, are the
|
||
easiest to modify. By changing these in such a way, you can formulate new
|
||
credit cards simply by doing a little math in your head. These two groups
|
||
contain the IDentification codes. Later on in your carding careers, you might
|
||
find out how to change these, and thus, you have found the secret to a vault of
|
||
new and awaiting credit cards. I stress here that the only purpose that these
|
||
two groups serve is to differentiate between customers. If the first two groups
|
||
of two cards are the same and the last two groups of two cards are different,
|
||
the two cards were issued by the same bank and probably have similar credit
|
||
limits, but are of course issued to different people.
|
||
|
||
So I'm sure you could play around with those on your own to get new CC numbers.
|
||
|
||
Now the tricky part is the Last digit, The Checksum...
|
||
|
||
Whats the check sum for? Its to stop people from making up there own cards.
|
||
But its easy to calculate. (With instructions)
|
||
|
||
Credit Card. XXXX-XXXX-XXXX-XXXC (fill in numbers from above)
|
||
|
||
X is a number, and C (the key to the formula) is a check-digit.<2E>
|
||
Ignore the check digit (we'll create one) fill in the X digit's with <20>
|
||
numbers ( zero through nine ). Take every odd digit (from right to<74>
|
||
left) a and multiply it by two, if the resulting number is greater or<6F>
|
||
equal to ten subtract nine. Do this for all of the odd digits and add<64>
|
||
the result's together. Next add all of the even digits to the total calculated<65>
|
||
the resulting number find the next higher multiple of ten and subtract<63>
|
||
out result from it.
|
||
|
||
|
||
|
||
|
||
|
||
PPiC Members List:
|
||
------------------
|
||
No Name
|
||
Scourge
|
||
Duck
|
||
Prophet
|
||
The Frenchman
|
||
Over Kill
|
||
Scorch
|
||
Chicago
|
||
C-4
|
||
Virus?
|
||
|
||
-----------------------------------------------------------------------------
|
||
Property of PPiC.
|
||
Do not, I repeat, DO NOT, ever change any of the contents of this file.
|
||
-----------------------------------------------------------------------------
|
||
|
||
|
||
If you wish to become a PPiC Distribution Site, or a member, call:
|
||
616-781-1177 29A (Wouldn't you like to know?) <Home Base>
|
||
914-993-6232 Virii <PPiC Distrib Site>
|
||
|
||
|
||
|
||
(C)opright --=<3D> Phose <20><><EFBFBD>. <20>=-- 1994 All Rights reserved.
|
||
PHOSE and PHREE and PPiC are trademarks of PHOSE International.
|
||
Blah blah blah and a bunch of other small print shit.
|
||
|