1086 lines
45 KiB
Plaintext
1086 lines
45 KiB
Plaintext
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
***** * * ******* * ***** * *
|
||
* * * * * * * * * *
|
||
* * * * * * * * * *
|
||
* * * * * * * * * * *
|
||
* * * * * * ******* * * *
|
||
***** **** * ****** * * * *
|
||
|
||
|
||
|
||
A USER'S MANUAL
|
||
IMPORTED BY CRIMINAL
|
||
|
||
----- NO COPYRIGHTS -----
|
||
------- EXCLUSIVE SPREADING RIGHTS SCC -------
|
||
|
||
(MESSAGE TO HARMAN KARDON: HAVING PROBLEM WITH YOUR STEREO?)
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
CONTENS: HOW TO STEAL CARS BY YARDLEY FLOURIDE.
|
||
|
||
CREDIT FRAUD BY SNEAK THIEF.
|
||
|
||
ASSORTED EXPOSIVES INFORMATION BY UNKNOWN.
|
||
|
||
PYROMANIAC BY GREY WOLF.
|
||
|
||
SMALL GRENADE BY SS-BADMAN.
|
||
|
||
WATS EXTENDERS BY UNKNOWN.
|
||
|
||
HACKING: BASICS.
|
||
|
||
UNIX & VAX.
|
||
|
||
DATA.
|
||
|
||
|
||
|
||
|
||
XxXxXxxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxX
|
||
X X
|
||
X xXxXx HOW TO STEAL CARS #1 xXxXx X
|
||
X X
|
||
X X
|
||
X written by Yardley Flouride X
|
||
X X
|
||
X presented by X
|
||
X X
|
||
X xxx the xORGanization xxx X
|
||
X (fraud/hack/thieve) X
|
||
X 2/13/89 X
|
||
X X
|
||
X X
|
||
XxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXx
|
||
|
||
|
||
FOREWORD:
|
||
|
||
This is the first file I've written under the xORGanization
|
||
and under the handle Yardley Flouride. Maybe you've read
|
||
some of my files under the name Dial Tone with Black September
|
||
and cDc communications. From now own I will write under
|
||
the new handle and for xORG and cDc. The xORG is the newest
|
||
hack/fraud/thieve group around and most of my fraud ideas
|
||
will be directed to that group. My more fun files (i.e.
|
||
"Fun With Traffic Lights") will be with cDc. Just to clear
|
||
that up.
|
||
|
||
xXxXxxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXx
|
||
|
||
this file is part 1 of 2. part 1 is the basic breaking into
|
||
cars or being devious to gain access to the car. part 2 will
|
||
be the hot wiring of a car if you're in it already. i know
|
||
there's already been files like that but this will go beyond
|
||
the others. i don't feel like typing all that right now though.
|
||
|
||
xXxXxxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXx
|
||
|
||
No transportation!
|
||
|
||
I know, I know. Looking for a great time and what? No wheels!
|
||
I hate when that happens. Well, if you've read the file on casing
|
||
by Elijah Bonecrusher and L.E. Pirate you're one step ahead. With
|
||
the art of casing comes the art of getting the rest of the car.
|
||
Ok, you need a car to get you to where you have to go and for no
|
||
other reasons.
|
||
|
||
|
||
7-11's are convenient for more than slurpees you know!
|
||
I was hanging out in front of 7-11 and it smacked me right in the
|
||
face how many people leave their car on when running into 7-11.
|
||
In a half hour I counted over 7 cars that people left unattended
|
||
to run in. In this one incident, myself and Elijah were out front
|
||
of one and this dude went in and left his piece of shit Duster
|
||
waiting for us to take. Just hide around the sides of the stores
|
||
and get the ones near the sides of the building. Elijah during the
|
||
summer at the shore got a government vehicle. Pretty cool, eh?
|
||
|
||
Don't dress like a god damn thief. Most fake "anarchist"
|
||
faggot asswipe computer nerds would wear all black and a ski mask.
|
||
No no no. Dress like a prep or some way you never dress. Beat up
|
||
someone for their rags and wear them. And act like you're having
|
||
fun hanging out at 7-11, drink a slurpee or something. Don't just
|
||
sit there sticking your head around the corner of the building going,
|
||
"how's that car!?", "let's get the porsche!", etc. Of course when
|
||
all the people went into the store and left their cars on it was in
|
||
the winter, it was cold as balls out. Who knows, if you find a good
|
||
car take it to some remote spot and dump it. Rip everything out of
|
||
it and take anything that looks over $5. This is all I have to say
|
||
for "Stealing Cars Part I". Support the scene. Amen.
|
||
|
||
|
||
|
||
|
||
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
| |
|
||
| Volume I of The Adventures in Fraud Series |
|
||
| The Bible of Fraud |
|
||
| By: |
|
||
| Sneak Thief |
|
||
| Smog City..213-926-7720 |
|
||
| Thanx to: The Raider |
|
||
| Copyright, (C) 1985 by Sneak Thief |
|
||
| |
|
||
\=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=/
|
||
|
||
|
||
Introduction
|
||
============
|
||
|
||
You ever wonder where that unemployed guy down the street got
|
||
enough cash to start a 1200 baud board with 60 megs? Well, the
|
||
answer, most likely, is Credit Fraud.
|
||
|
||
Credit fraud involves getting a credit card number (a CC #), and
|
||
then ordering things by phone. All you need is the card number
|
||
and the experation date. And a few other nasties...
|
||
|
||
Well, forget this basic stuff! Let's get into the good parts....
|
||
|
||
Getting Your Card
|
||
===================
|
||
|
||
Always been meticulous about your appearence? Don't like to be
|
||
dirty? Then the primary method of getting credit cards is not
|
||
going to appeal to you.
|
||
|
||
When a customer buys something at a store or restaurant (with a
|
||
credit card, of course), several carbons are made. The store
|
||
puts these into their files, and throws them away a week or so
|
||
later.
|
||
|
||
What's that? You say, "Why don't I go to the trash, and get
|
||
these carbons?", do you? Well, you're correct; this is exactly
|
||
what you do. Here are some tips:
|
||
|
||
1) Go on the First of the month. (In a lot of stores, this is
|
||
the 'clear the files day'.
|
||
|
||
2) Go to the mall. That way, if one trash can is empty, you
|
||
have a hundred or so more.
|
||
|
||
3) Stay away from food stores. Sticking you're hand into last
|
||
week's fried chicken is a price too high for a lousy credit
|
||
card.
|
||
|
||
4) For convienence, look for florists, video stores and the like.
|
||
Video stores especially, since >every< transaction they make
|
||
involves a credit card.
|
||
|
||
Ok, that is just one of the ways which you can get you're card
|
||
here are the other primary methods:
|
||
|
||
CBI/TRW
|
||
=======
|
||
|
||
CBI and TRW are Credit services which have Credit Cards,
|
||
Addresses, names, and driver's licenses for most of the
|
||
population of the United States. You can also use this system to
|
||
find out the credit card mend calling through a PBX, then XXXXX (insert you're
|
||
favorite phone service here).
|
||
|
||
Leeching
|
||
========
|
||
|
||
You could also get them off the credit fraud board on you're
|
||
local elite BBS. Not a good idea, since most cards up there have
|
||
about 1,000 dollars worth of porno tapes on them.
|
||
|
||
Better yet, you can ask a friend. This will probaly work, but
|
||
sometimes people give a card that they have used, or used but
|
||
messed up with. Oh, the death of friendship!
|
||
|
||
Ok, you've got your card? Good.
|
||
|
||
Ordering
|
||
========
|
||
|
||
You've got to order your merchandise. To do this, call the
|
||
orderline for the company, and talk to these people. If you're
|
||
known as "The Human Carrier" by you're friends, or modems connect
|
||
when you say "Hello", then forget it. These days they are
|
||
getting mighty suspicous.
|
||
|
||
They will ask you what card you want to use. Master Cards have a
|
||
5 as the first digit of the first cluster, Visas have a 4.
|
||
|
||
If ice--very
|
||
softly. Just say, "I'm sorry... I have this awful sore
|
||
throat..."
|
||
|
||
The first rule is be polite. Don't sound nervous. If the lady
|
||
asks you for the driver's license, and you don't have it, make
|
||
one up, then before you hang up, say "I'm sorry, I'm going to
|
||
have to cancel this order...my husband told me that he had
|
||
already gotten the XXXXX (the item you were trying to order)"
|
||
Try to order from a pay phone, and when they ask for a phone
|
||
number, give them the pay phone's number. Or scan for a number
|
||
that will ring, and ring... A board that is down is a good bet.
|
||
|
||
Now, you may ask, what address do I give the salesman?
|
||
|
||
The Address
|
||
===========
|
||
|
||
The pick up is one of the most crucial part of the entire part.
|
||
Here is what I think the ultimate address should be:
|
||
|
||
1) Abandoned.
|
||
|
||
2) Isolated (No little old ladies calling the police or spraying
|
||
you with hoses).
|
||
|
||
3) About a mile or so away from your house.
|
||
|
||
Number one could also have a friend of yours who will sign for
|
||
the package, then when the feds come deny it ever arrived. This
|
||
is unlikely.
|
||
|
||
Number two is obvious. I have been yelled at by numerous old
|
||
people, and people that don't speak English. Not fun.
|
||
|
||
The mile away from you're house is obvious. Don't want people
|
||
that know you to be witnesses.
|
||
|
||
Also, you can order to an occupied house. Send them a note by
|
||
mail, telling them about a "computer glitch that sent some of
|
||
our mechandise to you're address, and we will send a sales
|
||
representative (or his son) to come pick it up." Spice this up,
|
||
by apologizing for any hassles, and giving a fake name for the
|
||
"sales represenative". Then, when you go, just give them a
|
||
little note authorizing you to be there with an impressive
|
||
signature.
|
||
|
||
When you pick up the package, be calm. Talk to the people no
|
||
longer than necessary, but don't run away or anything. Wear a
|
||
hat, but don't wear a ski mask and sunglasses. Look normal, yet
|
||
try and conceal as much of you're looks as possible.
|
||
|
||
If you do this right, you will look like a normal person, and
|
||
the people will forget about you in the month or so it takes the
|
||
credit agency to do anything about the fraud.
|
||
|
||
Advanced Fraud
|
||
==============
|
||
|
||
To order more advanced, (ie: from Northwestern, or things that
|
||
cost alot of money), you will need the following (usually):
|
||
|
||
The Driver's License Number
|
||
The Bank or Interbank Number (For MasterCard)
|
||
The Billing Addresss
|
||
|
||
Sometimes this will be written on the carbon. But the best way
|
||
is just to use TRW...if you have a password for it.
|
||
|
||
Miscellanous
|
||
============
|
||
|
||
Reading an issue of U.S News and World Report (June 3, 1985)
|
||
yesterday, I found an article on Phreaking, Fraud, and BBS's.
|
||
Very interesting.
|
||
|
||
Said something about mailboxing, which is going through a company
|
||
mailbox looking for let's say bills and the like which would
|
||
have a credit number on it. Sounds interesting. Go on a
|
||
Saturday, and look in the mailboxes. The last few days of a
|
||
month would be a good idea, since maybe you could get lucky and
|
||
snipe their Visa statement. That just goes to show that reading >some<
|
||
value.
|
||
|
||
Look for cards like this one:
|
||
|
||
5024 0000 6184 3847
|
||
|
||
The second cluster means it's a "preferred" card, and you can
|
||
order more stuff with it. Some cards only have 13 digits (i.e:
|
||
5024 000 618 787).
|
||
|
||
If you think you have ordered the limit of you're card, verify
|
||
it. You do this by calling a dial up (usually 800), giving them
|
||
a merchant number, the card number, the name on the card, the
|
||
expiration date, and the amount to be spent. They will tell you
|
||
it the card has enough money for the purchase. Get a dial up and
|
||
merchant number by going to the Department Store. They are
|
||
usually written on the phones.
|
||
|
||
For MasterCard, the Interbank number isRyight below the na}~sn
|
||
the carbon. Nisa cards contain a bank number in one of the
|
||
clusters.
|
||
|
||
Don't order from Northwestern. There prices are not worth all of
|
||
the questions you have to answer.
|
||
|
||
Order from Conroy-LaPointe at 800/547-1289, they are quite
|
||
easy.
|
||
|
||
Conclusion
|
||
==========
|
||
|
||
There are no old carders. You quit, or you get caught. Plan
|
||
what you want to get, and don't try and rush your frauds.
|
||
|
||
The first rule of fraud is, "Greed Kills." I think being
|
||
arrested by the feds and having to face my parents and lose my
|
||
computer about the same as death. But what is life without a
|
||
little risk?
|
||
|
||
Try to sell most of the things you card. If there is no stolen
|
||
(carded) stuff in you're house, they might go easier on you.
|
||
|
||
By the way, I am in no way responsible for any use made of
|
||
the information in this file. It is for informational purposes
|
||
only. And if you believe that, please leave me mail on Smog
|
||
City about a business opportunity. I have this bridge...
|
||
|
||
|
||
June 6, 1985 - Sneak Thief of the Smog City Crew
|
||
|
||
The End
|
||
|
||
*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*
|
||
* ASSORTED EXPLOSIVES INFORMATION *
|
||
*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*
|
||
|
||
Common Rocket Fuel
|
||
------------------
|
||
Materials:
|
||
|
||
1.) Potassium Nitrate (KNO3) or
|
||
"Saltpeter". This can be obtained
|
||
from a drugstore, or ordered from
|
||
a chemical supply house.
|
||
|
||
2.) Sugar (Powdered is the best)
|
||
|
||
Procedure:
|
||
|
||
1.) Mix the two together 1/2 Nitrate
|
||
and 1/2 Sugar.
|
||
|
||
2.) Take an old cooking pan, and
|
||
melt the two together. There
|
||
is NO way for it to ignite.
|
||
|
||
3.) It should turn into a fudgey
|
||
looking compound. Pour this
|
||
compound into a rocket engine
|
||
such as a cardboard tube, and
|
||
set a fuse into the compound
|
||
and let the compound harden.
|
||
|
||
Chlorate Mixtures
|
||
-----------------
|
||
|
||
NOTE: The main ingredient for this
|
||
experiment is potassium or
|
||
sodium chlorate. Both of these
|
||
will do equally well. However,
|
||
both may prove difficult to
|
||
find. Probably the only way to
|
||
get it would be to order it
|
||
through a chemical supply house.
|
||
|
||
Materials:
|
||
----------
|
||
|
||
1) Potassium chlorate or sodium
|
||
chlorate.
|
||
|
||
2) Powdered charcoal
|
||
|
||
3) Powdered aluminum
|
||
|
||
4) Sulfur
|
||
|
||
Procedure:
|
||
----------
|
||
|
||
NOTE: There is no set procedure for
|
||
making chlorate mixtures.
|
||
The only special thing ABOUT
|
||
chlorate mixtures is that
|
||
they have a chlorate in them.
|
||
Experiment with diffiernt
|
||
proportions of each of the
|
||
ingredients. All of the
|
||
chlorate mixtures I made had
|
||
no set procedure and I just
|
||
experimented with the
|
||
proportions of each of the
|
||
ingredients. Most of your
|
||
mixture, however, should be
|
||
potassium chlorate or sodium
|
||
chlorate.
|
||
|
||
1) Make sure that you mix the
|
||
sulfur and charcoal and aluminum
|
||
first. You may grind these in
|
||
a mortar and pestal to get a good
|
||
mix of these ingredients.
|
||
|
||
2) Add potassium chlorate or sodium
|
||
chlorate. Mix them VERY CAREFULLY
|
||
in the mortar and pestal. DO NOT
|
||
GRIND the mixture once the
|
||
chlorate has been added or it will
|
||
ignite and burn the shit out of
|
||
you.
|
||
|
||
3) You now may use the mixture for
|
||
whatever you want to. Chlorate
|
||
mixtures are some of the best
|
||
compositions there are and, in
|
||
my experiences, they are the best
|
||
except for model rocket
|
||
propellant (procedure for making
|
||
this is given later).
|
||
|
||
> Green Goddess <
|
||
-------------
|
||
Materials
|
||
---------
|
||
|
||
1.) Zinc (Zn) <---NOTE: This is not the
|
||
same as Zinc
|
||
Oxide!
|
||
2.) Sulfur (S)
|
||
|
||
Procedure
|
||
---------
|
||
|
||
1.) Mix the two together 1/2 and 1/2.
|
||
|
||
2.) MAKE SURE that you mix them very
|
||
well. The best way to do so, is to
|
||
put the mixture in a jar with a lid
|
||
and shake it up for 15-60 seconds,
|
||
until it is all a greyish color.
|
||
|
||
3.) To ignite, use a fuse, or throw a
|
||
match into the powder. WARNING,
|
||
this burns very very quickly, and
|
||
produces smoke. Also it burns at
|
||
a fairly high temperature. It will
|
||
surprise you when you throw a match
|
||
into it. There will be a delay, and
|
||
then all of a sudden, it will flash
|
||
up, and is capable of burning the
|
||
hell out of you.
|
||
=======================================
|
||
Common Uses
|
||
-----------
|
||
1.) Rocket Fuel
|
||
2.) Bombs <--- NOTE: The best way to do
|
||
this is to take
|
||
it and compress
|
||
it into cardboard
|
||
tubing.
|
||
3.) Smoke bombs (Cardboard tube w/ big
|
||
hole.)
|
||
4.) Flare bombs.
|
||
5.) The rest is up to your imagination
|
||
|
||
GOOD LUCK!
|
||
=============================
|
||
|
||
|
||
_________________________________
|
||
[ ]
|
||
[ THE FIRST BOOK OF ]
|
||
[ PYROMANIACS ]
|
||
[ ]
|
||
[ BY: GREY WOLF ]
|
||
[ <THE COMMANDERS> ]
|
||
[_________________________________]
|
||
|
||
|
||
P.S. DON'T KILL YOURSELF...
|
||
|
||
.......................................
|
||
|
||
->UNSTABLE EXPLOSIVE<-
|
||
^^^^^^^^ ^^^^^^^^^
|
||
|
||
|
||
1) MIX SOLID NITRIC IODINE WITH
|
||
HOUSEHOLD AMMONIA
|
||
|
||
2) WAIT OVERNIGHT
|
||
|
||
3) POUR OFF THE LIQUID
|
||
|
||
4) DRY MUD ON BOTTOM TO HARD (LIKE
|
||
CONCRETE)
|
||
|
||
5) THROW SOMETHING AT IT!
|
||
|
||
|
||
|
||
|
||
->SMOKE BOMBS<-
|
||
^^^^^ ^^^^^
|
||
|
||
|
||
1) MIX: 3 PARTS SUGAR
|
||
----------------------
|
||
6 PARTS EPSON SALTS
|
||
|
||
2) PUT IN TINCAN, ONTO LOW FLAME
|
||
(LIKE A LIGHTER) ---
|
||
|
||
3) LET GEL & HARDEN
|
||
|
||
4) PUT A MATCH IN AS A FUSE.
|
||
|
||
5) LIGHT IT & RUN LIKE HELL 'CAUSE
|
||
4 POUNDS WILL FILL A CITY BLOCK...
|
||
|
||
|
||
->MEDIUM EXPLOSIVE<-
|
||
^^^^^^ ^^^^^^^^^
|
||
|
||
1) MIX: 7 PARTS POTASIUM CHLORATE
|
||
---------------------------
|
||
1 PART VASELINE
|
||
|
||
2) TO IGNITE, USE AN ELECTRIC CHARGE
|
||
OR A FUSE.
|
||
|
||
|
||
|
||
->CAR BOMB<-
|
||
^^^ ^^^^
|
||
|
||
1) PUT LIQUID DRAINO INTO A PILL BOX
|
||
(THE KIND YOU GET WHEN YOU'RE ON
|
||
A PERSCRIPTION, NOTHING ELSE WILL
|
||
WORK)
|
||
|
||
2) CLOSE THE LID & POP THE THING INTO
|
||
THE GAS TANK
|
||
|
||
3) WAIT 5 MIN.
|
||
|
||
4) RUN
|
||
|
||
|
||
->PLASTIC EXPLOSIVES<-
|
||
^^^^^^^ ^^^^^^^^^^
|
||
|
||
1) MIX: 2 PARTS VASELINE
|
||
------------------
|
||
1 PART GASOLINE
|
||
|
||
2) IGNITE WITH AN ELECTRIC
|
||
CHARGE.
|
||
|
||
|
||
|
||
|))(||)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)((|)(
|
||
| Small Grenade |
|
||
| \ | / |
|
||
| By: SS-Badman \|/ |
|
||
|(|---[*]---|) (|--- - - *- - ---|)|
|
||
| Kingdom of the Dead II /|\ |
|
||
| 509-927-9120 / | \ |
|
||
| 1200/2400 - 5 drives - 20 megs..soon! |
|
||
| Sysop: Angel of Death |
|
||
||)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(||)(|
|
||
|
||
|
||
Hardware:
|
||
1 Nut (any size, as long as bolts fit), the wider the better
|
||
2 Bolts (to fit nut)
|
||
|
||
Chemicals Phosphorus (the odd colored tips of strike on anything
|
||
matches work well).
|
||
|
||
|
||
1> Take 1 bolt and the nut, screw in the bolt until it is just in the
|
||
nut, try and make sure there is no area for air to escape. This is
|
||
where a perfectly matched nut and bolt are nice.
|
||
|
||
bolt nut
|
||
\ ||______[ ] /
|
||
\||______[ ]/
|
||
|| [ ]
|
||
|
||
|
||
2> Put as much phosphorus as possible in the nut.
|
||
|
||
||______[**]
|
||
||______[**] * = phosphorus
|
||
|| [**]
|
||
|
||
|
||
3> Screw the 2ed bolt into the open end, simply crush the phosphorus
|
||
when inserting it. But be carefull, we wouldn't want to ignite it!
|
||
|
||
||______[**]______||
|
||
||______[**]______||
|
||
|| [**] ||
|
||
|
||
Once both ends are nice and snug, it is ready. You now have a small
|
||
grenade. They can be made in various sizes. Easily stored in the
|
||
clove box of your car, or in a school locker. The possibile uses
|
||
are endless.
|
||
|
||
It can be thrown or dropped onto any hard surface to ignite the
|
||
phosphorus. The gases formed from the combustion will force one
|
||
or both of the bolts out of the nut. The distace the bolt(s) travel,
|
||
and its volocity, depend on the amount of phosphorus used.
|
||
|
||
Of course the larger the nut and bolt, the more explosive needed to
|
||
force them out effectivly. It works on the same principal as the
|
||
bullet being forced out of the gun barrel, except that the direction
|
||
in which the bolts fly is never known, so watch yourself.
|
||
|
||
I haven't expiramented, but I'm sure that just about any, dry, shock
|
||
sensitive chemical can be used in place of the phosphorus. The head
|
||
of each bolt can be sharpened to a point for more effectiveness as
|
||
well. Of course there are many variations to this design, I have
|
||
seen special nuts that are quite wide, allowing the use of more
|
||
explosive. Look in the section of your hardware store where small
|
||
(or large) plumbing pipe is sold. There are pieces that have threads
|
||
on each end to screw somthing on, but now we are talking about
|
||
something that more resembles a pipe bomb than a devise which only
|
||
causes a tiny disturbance (but is still dangerous).
|
||
|
||
This file was written for informational purposes only, the author
|
||
takes no responsibility for the use, or the consequences of the use,
|
||
of the information.
|
||
|
||
|
||
|
||
WATS EXTENDERS
|
||
|
||
Many people think of phone phreaks as slime, out to rip off Bell
|
||
for all she is worth. Nothing could be further from the truth!
|
||
|
||
Granted, there are some who get there kicks just by making free calls,
|
||
however they are not true phone phreaks. Real phone phreaks are
|
||
"telecommunications hobbyists" who experiment, play with and learn
|
||
from the phone system. Occasionally this experimenting, and a need
|
||
to communicate with other phreaks (without going broke), leads to
|
||
free calls. The free calls are but a small subset of a TRUE phone
|
||
phreaks activities.
|
||
|
||
Until several years ago, the phreaks main tool for free calls was the
|
||
Blue Box. In recent years however, Bell has made GREAT strides in
|
||
their security and detection of Blue Box's. While box's still work,
|
||
their use is becoming EXTREMELY dangerous. With the advent of CCIS,
|
||
the places where a Blue Box will work are rapidly decreasing, and
|
||
within several years the Box will be totallt obsolete.
|
||
|
||
Thus for their communications needs, phreaks have turned to other
|
||
methods, one being: WATS EXTENDERS.
|
||
|
||
Many companies throughout the United States have a salesman in the
|
||
field that must contact a large amount of customers long distance
|
||
by phone. To pay for these calls, generally the salesman use the
|
||
companies Bell credit card (Now called a "Calling Card") this is
|
||
quite expensive to the company. Several years ago, someone came up
|
||
with a neat money saving idea. Since the company already had an an
|
||
INWATS (800) number for salesmen to call in orders to the main plant,
|
||
and since the company had a flat rate OUTWATS line to call customers
|
||
during the day.
|
||
|
||
Why not couple them together after hours so that the salesman calls
|
||
the companies INWATS 800 number, then gets connected up to OUTWATS.
|
||
This would mean he could call anywhere in the United States. from
|
||
anywhere at no charge to him! This arrangement would save the company
|
||
tremendous amounts of long distance charges since they had the WATS
|
||
lines anyway, and the WATS was a lot more cost efficient than Credit
|
||
Cards.
|
||
|
||
This arrangement was exactly how early "WATS EXTENDERS" worked.
|
||
During WATS (800) scanning (For how to do this, read "Napolean
|
||
Solo's" EXCELLENT article in issue 55) phreaks discovered these
|
||
WATS EXTENDERS, and found they could call anywhere in the country
|
||
just by calling the extenders 800 number, then (Using Touch Tone of
|
||
course) dial the number they wanted. The companies soon realized
|
||
that their extenders were being messed with and decided to add some
|
||
security to prevent tampering. It was set up so that when a salesman
|
||
dialed the WATS EXTENDER, he would hear what sounds like a dial tone.
|
||
The salesman then keyed in a four digit Touch Tone secret access
|
||
code. If the code was incorrect a high-low tone would result, and
|
||
the extender would have to be re-dialed. If the code was correct,
|
||
and second internal PBX dial tone would result. The salesman would
|
||
then access the companies OUTWATS line by hitting 8 or 9 (usually)
|
||
and dial wherever he wanted.
|
||
|
||
The four digit access code posed a problem to phreaks since only 1
|
||
out of 9999 possible codes worked, and the 800 number had to be
|
||
re-dialed each timeand try another.
|
||
|
||
|
||
Many a phone phreak spent long nights breaking the four digit codes
|
||
and then using the extenders themselves! Most companies change
|
||
the code every few months so the phreaks would have to start over
|
||
again. (Also company employees that were not authorized to know,
|
||
but found out from "leaks"). Many of you have probably heard of the
|
||
infamous computer "Charlie". For those who haven't, several years
|
||
ago Charlie was brought to life by Capn Crunce (Now retired from
|
||
the communications service) Charlie was an Apple ][ computer with a
|
||
special board which allowed it to Touch Tone dial numbers extremely
|
||
rapidly (D/A) then "listen" to the results (A/D).
|
||
|
||
Charlie was put to use calling a given WATS EXTENDER, trying an access
|
||
code, if the high-low tone was heard (meaning an incorrect code),
|
||
Charlie hung up and dialed again, trying the next sequential code.
|
||
Charlie would sit working for hours, and when it found the code,
|
||
it would print it on it's display screen. VERY effective!
|
||
|
||
Unfortunately the only problem with Charlie was the he was very
|
||
noticeable to Bell. Every time an 800 number is dialed, and
|
||
AMA record is punched at the C.O. thus it looks real phunny to Bell
|
||
to see that you have called Dry Dock orange shippers 800 number
|
||
in Florida 3,750 times at 2:00 AM with each call lasting 1 second!
|
||
Since Charlie was not very easily portable to pay phones this was
|
||
a real problem. There are many WATS EXTENDERS reportedly presently
|
||
in service. Most working as described, with some taking more than
|
||
a four digit code, and some even responding to voice input!
|
||
|
||
It should be pointed out however, that should any of you crack any
|
||
WATS EXTENDER access codes and attempt to use them, you are gulity
|
||
of Theft of communications services from the company who owns it,
|
||
and Bell is very willing and able to help nail you! WATS EXTENDERS
|
||
can get you in every bit as much trouble as a Blue Box should you
|
||
be caught.
|
||
|
||
Most WATS EXTENDERS also record all numbers call from them on OUTWATS.
|
||
If the company detects the extender being mis-used, they will usually
|
||
first try to change the access code. If the abuse continues and the
|
||
get mad enough they will contact Bell who will help them investigate
|
||
all the numbers you called!
|
||
|
||
Thus, as in most things those of you who are determined to play with
|
||
WATS EXTENDERS, do so from a pay phone and only to institutional
|
||
switchboards, or people with short memories. By the way, on some
|
||
"Money First" payphones (as as opposed to "Dial Tone First") the
|
||
Touch Tone pad is cut off after the WATS call is complete. (Because
|
||
of polarity reversal) It can be re-activated by depositing a dime
|
||
after the connection is made, which you will get back after
|
||
you hang up.
|
||
|
||
Also please remember the opening of this article. DO NOT use WATS
|
||
EXTENDERS just to make free calls all the time! Experiment with them
|
||
and learn what they can do and how they work. I think you will
|
||
learn a lot!!
|
||
|
||
|
||
|
||
|
||
***************************
|
||
* *
|
||
* Basics of Hacking I: *
|
||
* *
|
||
***************************
|
||
|
||
|
||
Welcome to basics of hacking i: dec's in this article you will learn
|
||
how to log in to dec's, logging out, and all the fun stuff to do
|
||
in-between. All of this information is based on a standard dec system.
|
||
Since there are dec systems 10 and 20, and we favor, the dec 20,
|
||
there will be more info on them in this article. It just so happens
|
||
that the dec 20 is also the more common of the two, and is used by
|
||
much more interesting people (if you know what we mean...) Ok, the
|
||
first thing you want to do when you are receiving carrier from a dec
|
||
system is to find out the format of login names.
|
||
|
||
You can do this by looking at who is on the system. Dec=> ` (the
|
||
'exec' level prompt) you=> sy sy is short for sy(stat) and shows you
|
||
the system status. You should see the format of login names... A systat
|
||
usually comes up in this form: job line program user job: the job
|
||
number (not important unless you want to log them off later) line:
|
||
what line they are on (used to talk to them...) These are both two or
|
||
three digit numbers. Program: whatprogram are they running under?
|
||
If it says 'exec' they aren't doing anything at all... User:
|
||
ahhhahhhh! This is the user name they are logged in under...
|
||
Copy the format, and hack yourself out a working code...
|
||
Login format is as such: dec=> ` you=> login username password
|
||
username is the username in the format you saw above in the systat.
|
||
After you hit the space after your username, it will stop echoing
|
||
characters back to your screen. This is the password you are typing
|
||
in... Remember, people usually use their name, their dog's name,
|
||
the name of a favorite character in a book, or something like this.
|
||
A few clever people have it set to a key cluster (qwerty or asdfg).
|
||
Pw's can be from 1 to 8 characters long, anything after that is
|
||
ignored. You are finally in... It would be nice to have a little help,
|
||
wouldn't it?
|
||
|
||
Just type a ? Or the word help, and it will give you a whole list
|
||
of topics... Some handy characters for you to know would be the
|
||
control keys, wouldn't it? Backspace on a dec 20 is rub which is 255
|
||
on your ascii chart. On the dec 10 it is cntrl-h. To abort a long
|
||
listing or a program, cntrl-c works fine. Use cntrl-o to stop long
|
||
output to the terminal. This is handy when playing a game, but you
|
||
don't want to cntrl-c out. Cntrl-t for the time. Cntrl-u will kill
|
||
the whole line you are typing at the moment. You may accidently run
|
||
a program where the only way out is a cntrl-x, so keep that in reserve.
|
||
Cntrl-s to stop listing, cntrl-q to continue on both systems.
|
||
Is your terminal having trouble?? Like, it pauses for no reason, or
|
||
it doesn't backspace right?
|
||
|
||
This is because both systems support many terminals, and you haven't
|
||
told it what yours is yet... You are using a vt05 (isn't that funny?
|
||
I thought I had an apple) so you need to tell it you are one.
|
||
Dec=> ` you=> information terminal or... You=> info ter this shows you
|
||
what your terminal is set up as... Dec=> all sorts of shit, then the
|
||
` you=> set ter vt05 this sets your terminal type to vt05. Now let's
|
||
see what is in the account (here after abbreviated acct.) That you
|
||
have hacked onto... Say => dir short for directory, it shows you what
|
||
the user of the code has save to the disk.
|
||
|
||
There should be a format like this: xxxxx.Ooo xxxxx is the file
|
||
name, from 1 to 20 characters long. Ooo is the file type, one of:
|
||
exe, txt, dat, bas, cmd and a few others that are system dependant.
|
||
Exe is a compiled program that can be run (just by typing its name
|
||
at the `). Txt is a text file, which you can see by typing=> type
|
||
xxxxx.Txt do not try to=> type xxxxx.Exe this is very bad for your
|
||
terminal and will tell you absolutly nothing.
|
||
|
||
Dat is data they have saved. Bas is a basic program, you can have it
|
||
typed out for you. Cmd is a command type file, a little too
|
||
complicated to go into here. Try => take xxxxx.Cmd by the way, there
|
||
are other users out there who may have files you can use (gee, why
|
||
else am I here?). Type => dir <*.*> (Dec 20) => dir [*,*]
|
||
(dec 10) * is a wildcard, and will allow you to access the files on
|
||
other accounts if the user has it set for public access. If it isn't
|
||
set for public access, then you won't see it. To run that program:
|
||
dec=> ` you=> username program-name username is the directory you saw
|
||
the file listed under, and file name was what else but the file name?
|
||
** You are not alone ** remember, you said (at the very start) sy
|
||
short for systat, and how we said this showed the other users on the
|
||
system? Well, you can talk to them, or at least send a message to
|
||
anyone you see listed in a systat. You can do this by: dec=> the
|
||
user list (from your systat) you=> talk username (dec20) send
|
||
username (dec 10) talk allows you and them immediate transmission
|
||
of whatever you/they type to be sent to the other.
|
||
|
||
Send only
|
||
allow you one message to be sent, and only after you hit <return>.
|
||
With send, they will send back to you, with talk you can just keep
|
||
going. By the way, you may be noticing with the talk command that
|
||
what you type is still acted upon by the parser (control program).
|
||
To avoid the constant error messages type either: you=> ;your
|
||
message you=> rem your message the semi-colon tells the parser
|
||
that what follows is just a comment. Rem is short for 'remark' and
|
||
ignores you from then on until you type a cntrl-z or cntrl-c, at which
|
||
point it puts you back in the exec mode.
|
||
|
||
To break the connection from a talk command type: you=> break priv's:
|
||
if you happen to have privs, you can do all sorts of things. First
|
||
of all, you have to activate those privs. You=> enable this gives you
|
||
a $ prompt, and allows you to do this: whatever you can do to your
|
||
own directory you can now do to any other directory. To create a
|
||
new acct. Using your privs, just type => build username if username
|
||
is old, you can edit it, if it is new, you can define it to be whatever
|
||
you wish. Privacy means nothing to a user with privs. By the way,
|
||
there are various levels of privs: operator, wheel, cia wheel is
|
||
the most powerful, being that he can log in from anywhere and have
|
||
his powers. Operators have their power because they are at a special
|
||
terminal allowing them the privs. Cia is short for 'confidential
|
||
information access', which allows you a low level amount of privs.
|
||
Not to worry though, since you can read the system log file, which also
|
||
has the passwords to all the other accounts. To de-activate your privs,
|
||
type you=> disable
|
||
|
||
when you have played your greedy heart out, you can finally leave
|
||
the system with the command=> logout this logs the job you are using
|
||
off the system (there may be varients of this such as kjob, or killjob).
|
||
By the way, you can say (if you have privs) => logout username afl
|
||
|
||
|
||
|
||
******************************
|
||
** The basics of hacking II: **
|
||
* Vax's *
|
||
* Unix *
|
||
********************************
|
||
|
||
Welcome to the basics of hacking II:
|
||
|
||
Unix is a trademark of bell labs ** ** (and you know what *that*
|
||
means). In this article, we discuss the unix system that runs
|
||
on the various vax systems. If you are on another unix-type system,
|
||
some commands may differ, but since it is licenced to bell, they can't
|
||
make many changes. Hacking onto a unix system is very difficult,
|
||
and in this case, we advise having an inside source, if possible. The
|
||
reason it is difficult to hack a vax is this: many vax, after you get
|
||
a carrier from them, respond=> login: they give you no chance to see
|
||
what the login name format is. Most commonly used are single words,
|
||
under 8 digits, usually the person's name.
|
||
|
||
There is a way around this: most vax have an acct. Called 'suggest'
|
||
for people to use to make a suggestion to the system root terminal.
|
||
This is usually watched by the system operator, but at late he is
|
||
probably at home sleeping or screwing someone's brains out. So we can
|
||
write a program to send at the vax this type of a message: a screen
|
||
freeze (cntrl-s), screen clear (system dependant), about 255 garbage
|
||
characters, and then a command to create a login acct., After which
|
||
you clear the screen again, then un- freeze the terminal.
|
||
|
||
What this does: when the terminal is frozen, it keeps a buffer of
|
||
what is sent. Well, the buffer is about 127 characters long. So you
|
||
overflow it with trash, and then you send a command line to create
|
||
an acct. (System dependant). After this you clear the buffer and
|
||
screen again, then unfreeze the terminal. This is a bad way to do
|
||
it, and it is much nicer if you just send a command to the terminal
|
||
to shut the system down, or whatever you are after... There is always,
|
||
*always* an acct. Called root, the most powerful acct. To be on,
|
||
since it has all of the system files on it. If you hack your way
|
||
onto this one, then everything is easy from here on...
|
||
|
||
On the unix system, the abort key is the cntrl-d key. Watch how
|
||
many times you hit this, since it is also a way to log off the
|
||
system! A little about unix architechture: the root directory,
|
||
called root, is where the system resides. After this come a few
|
||
'sub' root directories, usually to group things (stats here, priv
|
||
stuff here, the user log here...). Under this comes the superuser
|
||
(the operator of the system), and then finally the normal users. In
|
||
the unix 'shell' everything is treated the same. By this we mean:
|
||
you can access a program the same way you access a user directory,
|
||
and so on. The way the unix system was written, everything, users
|
||
included, are just programs belonging to the root directory. Those
|
||
of you who hacked onto the root, smile, since you can screw
|
||
everything...
|
||
|
||
The main level (exec level) prompt on the unix system is the $,
|
||
and if you are on the root, you have a # (super- user prompt). Ok,
|
||
a few basics for the system... To see where you are, and what paths
|
||
are act; G i] reguards to your user account, then type => pwd this
|
||
shows your acct. Seperated by a slash with another pathname (acct.),
|
||
Possibly manytimes.
|
||
|
||
BBS LIST BY MOGWAI/PHALANX - 1 APRIL 1989
|
||
-----------------------------------------
|
||
|
||
St Name Phone Baud Storage Software
|
||
ON *** AIRWOLF *** 416-767-1907 19200 64 AMIGA
|
||
CA UNKNOWN BBS 213-329-4603 2400 60 AMIGA
|
||
CA TWILITE ZONE 714-731-5195 2400 60 AMIGA
|
||
NY NIGHT FLIGHT 212-962-3504 2400 43 AMIGA
|
||
FL AMIGA AUSCHWITZ 904-744-9326 2400 4 AMIGA
|
||
NY TRILOGY/PE#1 HEADQUARTERS 516-484-9240 9600 20 AMIGA
|
||
OH SINNERS U.S. HEADQUARTERS 216-784-5552 2400 20 AMIGA
|
||
ON 68000 416-278-5654 19200 328 AMIGA
|
||
ON THE MESSAGE BOARD 416-536-4282 9600 2 AMIGA
|
||
ON FUCKN' A BBS 416-278-0490 9600 128 AMIGA
|
||
NY FBI BBS 718-259-9661 9600 310 PC BOARD
|
||
NY FBI BBS 718-234-3659 9600 310 PC BOARD
|
||
GA AMIGA DOCS 'R' US 912-748-0331 2400 20 AMIGA
|
||
ON CANADIAN AMIGA CONNECTION 416-440-1459 9600 20 AMIGA
|
||
CA PIPELINE 805-526-5660 2400 40+ AMIGA
|
||
WI PANDEMONIUM 414-352-5982 9600 80 AMIGA
|
||
AZ BLOOM COUNTY AMIGA 602-843-8261 9600 20 AMIGA
|
||
MD TERMINAL FIX 202-562-1174 19200 N/A AMIGA
|
||
IL SKIDDS' LAIR 312-631-4817 19200 N/A AMIGA
|
||
CA CUTTING EDGE/ESI CALIF. 213-836-2381 19200 N/A AMIGA
|
||
IN GENESIS ONE 317-885-1268 19200 N/A AMIGA
|
||
FL AMIGA BEACH 407-833-8692 19200 N/A AMIGA
|
||
NJ DAMAGE, INC./ORACLE HQ 602-264-6670 9600+ N/A AMIGA
|
||
ND SHADOWS OF IGA 707-528-7238 19200 N/A AMIGA
|
||
MT TELE-TRADER 406-782-3161 19200 N/A AMIGA
|
||
ON VENTURE 416-469-1031 19200 140 AMIGA
|
||
AL FEAR AND LOATHING IN LAS VEGAS 205-221-3327 19.2k 150 PC BOARD
|
||
IA THE ZONE 712-366-9747 9600 65 AMIGA
|
||
ON C.O.P.S. HQ 416-633-8801 9600 80 AMIGA
|
||
|
||
|
||
***************************************
|
||
** The basics of hacking III: Data **
|
||
***************************************
|
||
|
||
|
||
Welcome to the basics of hacking III: data general computers.
|
||
Data general is favored by large corporations who need to have a lot
|
||
of data on-line. The data general aos, which stands for advanced
|
||
operating system, is a version of bastardized unix. All the commands
|
||
which were in the unix article, will work on a data general.
|
||
Once again, we have tb^"|yoblem of not knowing the format for the login
|
||
name on the data general you want to hack. As seems to be standard,
|
||
try names from one to 8 digits long. Data general designed the computer
|
||
to be for busi- nessmen, and is thus very simplistic, and basically
|
||
fool proof (but not damn fool proof). It follows the same login
|
||
format as the unix system: dg=> login: you=> username dg=> password:
|
||
you=> password passwords can be a maximum of 8 characters, and they
|
||
are almost always set to a default of 'aos' or 'dg'. (Any you know
|
||
about businessmen...) A word about control characters: cntrl-o
|
||
stops massive print-outs to the screen, but leaves you in whatever
|
||
mode you were.
|
||
|
||
(A technical word on what this actually does: it tells the cpu to
|
||
ignore the terminal, and prints everything out to the cpu! This is
|
||
about 19200 baud, and so it seems like it just cancels.) Cntrl-u
|
||
kills the line you are typing at the time. Now for the weird one:
|
||
cntrl-c tells the cpu to stop, and wait for another cntrl character.
|
||
To stop a program, you actually need to type cntrl-c and then a
|
||
cntrl-b. Once you get on, type 'help'. Many dg (data general)
|
||
computers are sold in a package deal, which also gets the company
|
||
free customizing. So you never know what commands there might be.
|
||
|
||
So we will follow what is known as the 'eclipse standard', or
|
||
what it comes out of the factory like. To find out the files
|
||
on the directory you are using, type => dir to run a program,
|
||
just like on a dec, just type its name. Other than this, and
|
||
running other people's programs, there really isn't a standard...
|
||
*** Hark, yon other system users *** to see who is on, type =>
|
||
who (and a lot of the other unix commands, remember?). This shows
|
||
the other users, what they are doing, and what paths they are
|
||
connected across. This is handy, so try a few of those paths
|
||
yourself. To send a message, say => send username this is a one
|
||
time message, just like send on the dec 10. From here on, try
|
||
commands from the other previous files and from the 'help' listing.
|
||
Superuser: if you can get privs, just say: => superuser on and you
|
||
turn those privs on! By the way, you remember that computers keep
|
||
a log of what people do? Type: => syslog /stop and it no longer
|
||
records anything you do on the system, or any of the other users.
|
||
|
||
It screams to high heaven that it was you who turned it off,
|
||
but it keeps no track of any accounts created or whatever else
|
||
you may do. You can say=> syslog /start to turn it back on
|
||
(now why would you want to do something like that?????) To exit from
|
||
the system, type=> bye and the system will hang up on you. Most
|
||
of the systems around, including decs, vax's, and dg's, have games.
|
||
These are usually located in a path or directory of the name games
|
||
or <games> or games: try looking in them, and you may find some
|
||
trek games, adventure, zork, wumpus (with bent arrows in hand) or
|
||
a multitude of others. There may also be games called 'cb' or
|
||
'forum'. These are a sort of computer conference call. Use them on
|
||
w-Wsnds, and you can meet all sorts of interesting people.
|
||
|
||
*****************************************
|
||
|
||
If you would like to see more articles on hacking (this time far
|
||
more than just the basics), or maybe articles on networks and such,
|
||
then leave us mail if we are on the system, or have the sysop search
|
||
us down. We call a lot of places, and you may just find us. This
|
||
completes the series of articles on hacking... These articles were:
|
||
the basics of hacking: introduction the basics of hacking i: dec's the
|
||
basics of hacking ii: vax's (unix) the basics of hacking iii: dg's
|
||
This and the previous articles by:
|
||
|
||
|
||
/The Knights of Shadow
|
||
|
||
The Knights of Shadow on the PPS SuperSystem (206) 783-9798 [25]
|
||
count 'em [25] megs!
|
||
|