textfiles/anarchy/MISCHIEF/shakhack.asc
2021-04-15 13:31:59 -05:00

116 lines
5.8 KiB
Plaintext
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[[ This phile is for informational purposes only, and I assume no ]]
[[ responsibility for actions taken after reading this. ]]
ShackHack
How to break into and use display computers at Radio Shack
by: XyZZy
The expensive computers on display at Trash Shack/computer stores are filled
with interesting programs and files. However, they almost invariably are
equipped with some sort of security program. The most common type is the menu
program. Usually there is some `amazing' graphics demo running to show the
`incredible' 300x200 Monochrome resolution, right? After you terminate that
program with an ESC, Break, Q or <snicker> BRS, you are greeted with a menu. If
you want to shell to DOS, or run a program on the menu, you are asked to enter a
password. Now, you have 3 choices. 1, you work there, and you enter the
password. (Not likely.) 2, You hack the password by trying random combinations
of letters or words, and probably get caught by an employee walking by. (Maybe,
if their password is `password'. <grin>) Finally: 3, you bypass the security
system. (This is the quickest, easiest, and most effective method, other than
method 1. It is also less risky than spending hours hacking it.)
Now that you have determined that there is a menu security program, and it is
not built into the operating system, try all the menu commands to see what
programs that you can run without breaking in. There may be a program with a
DOS shell built right in. Wouldn't that be convenient? If there is, shell to
DOS and have fun!
If there isn't a DOS shell that you can access, you'll have to get around
the menu program entirely. Remember that the menu is only a program, and
being so, must be activated at start-up, either manually or by the use of an
AUTOEXEC.BAT phile. In the case of the former, simply reboot the computer
with a ctrl-alt-delete. If the reboot function is locked, BRS it. Sometimes
there will be a clear panel cover over the reset button, and you will need to
find a way to remove this if there is something barring your access to The Big
Red Switch. After the system boots up, you will have free access to all of its
contents.
If it *is* loaded in the AUTOEXEC.BAT phile, it is probably loaded at the
end, so that the system can load its TSRs, if any. All you have to do is break
(^C) out of the batch phile before the security program is called. If,
however, there is a BREAK OFF command, you will have to be quick enough to
break before the statement is executed, and after the system boots. A few
tries should be enough. When you see "^CTerminate batch job?_", type "Y", and
the computer is under your control.
-== Computer Phun ==-
Once inside, move to the root directory and type "DIR *.". This will get
you a list of directories. (It excludes directories with extentions and
includes philes without extentions, but it gives you a place to start.)
Methodically change to each of these directories and check out the contents.
You will probably find all kinds of cool stuff. This is a list of a few phun
things to do once inside:
1) Create a batch file that says something over and over, or simulates an
error.
2) Change the prompt to "$p$g format c:$_All data will be destroyed! Are you
sure?y$_formatting..." and watch the face on the first half-brained
employee who happens to walk by.
3) Find the DOS directory and run GWBASIC or BASICA. Create a program that
simulates the menu program, and have it record the passwords in a hidden
phile which you can read later. (Also edit the appropriate batch philes)
4) Find the DOS directory and run GWBASIC or BASICA. Create a program that
destroys "\COMMAND.COM", "\*.SYS", or other necessary philes... Five minutes
after you leave.
5) Stealing software: If you have just `happened' to bring along a floppy
disk... (This one speaks for itself. 3<>" disks are best for this.)
6) DEL *.*, DEL COMMAND.COM, DEL *.SYS, DEL *.BAT!
7) FORMAT C:!
8) Bring your own programs to run, and really mess things up.
9) Bring a hex editor and search for passwords. (Find the security
program's directory by TYPEing "\AUTOEXEC.BAT"
10) If the system has an outdial modem, (unusual, but possible) hack the
Kremlin.
Well, I hope you found this phile useful, and if you have any questions, I
can be contacted on several bulletin board systems in the 214 area. I have
had hours of fun with this, and I hope you do too. Happy Hacking!
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
<20><><EFBFBD> <20> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20> <20> <20> <20> <20> <20>Ŀ
<20><><EFBFBD> <20> <20> <20><><EFBFBD> <20> <20> <20> <20> <20> <20><><EFBFBD> <20> <20> <20> <20> <20> <20> <20>Ŀ
<20><><EFBFBD> <20> <20> <20><><EFBFBD> <20> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20> <20> <20> <20> <20> <20>Ŀ
<20> <20> <20> <20> <20> <20> <20> <20><><EFBFBD> <20> <20> <20><><EFBFBD> <20> <20><><EFBFBD> <20> <20> <20> <20> <20> <20> <20>
<20><><EFBFBD><EFBFBD><EFBFBD> <20> <20><><EFBFBD> <20><><EFBFBD> <20> <20> <20> <20><><EFBFBD> <20><><EFBFBD> <20> <20><><EFBFBD> <20> <20> <20> <20>۳
<20> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20> <20> <20> <20> <20><><EFBFBD> <20> <20><><EFBFBD> <20> <20><><EFBFBD> <20> <20> <20><><EFBFBD> <20>
<20> <20> <20><><EFBFBD><EFBFBD><EFBFBD> <20> <20> <20> <20> <20> <20><><EFBFBD> <20><><EFBFBD> <20> <20> <20> <20><><EFBFBD> <20> <20><><EFBFBD> <20>
<20> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20> <20> <20> <20><><EFBFBD> <20> <20><><EFBFBD> <20> <20> <20> <20><><EFBFBD> <20><><EFBFBD> <20> <20>
<20><><EFBFBD><EFBFBD><EFBFBD> <20> <20><><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20> <20> <20><><EFBFBD><EFBFBD><EFBFBD> <20> <20>
<20> <20> <20> <20> <20> <20> <20> <20> <20><><EFBFBD> <20> <20><><EFBFBD> <20> <20> <20> <20> <20> <20><><EFBFBD> <20> <20> <20>
<20><><EFBFBD><EFBFBD><EFBFBD> <20> <20><><EFBFBD> <20> <20> <20><><EFBFBD> <20><><EFBFBD> <20> <20> <20> <20> <20> <20> <20><><EFBFBD> <20> <20> <20>
<20> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20> <20><><EFBFBD> <20> <20><><EFBFBD> <20> <20> <20> <20> <20> <20><><EFBFBD> <20> <20> <20> <20>
<20> <20> <20><><EFBFBD><EFBFBD><EFBFBD> <20> <20> <20><><EFBFBD> <20><><EFBFBD> <20> <20> <20> <20><><EFBFBD> <20> <20><><EFBFBD> <20> <20> <20> <20>
<20> <20> <20><><EFBFBD> <20> <20> <20><><EFBFBD> <20> <20><><EFBFBD> <20> <20> <20> <20><><EFBFBD> <20> <20> <20> <20> <20> <20> <20>
<20>Ŀ <20> <20> <20> <20> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20> <20><><EFBFBD> <20> <20> <20> <20><><EFBFBD>
<20>Ŀ <20> <20> <20> <20> <20> <20><><EFBFBD> <20> <20> <20> <20> <20> <20> <20><><EFBFBD> <20> <20> <20><><EFBFBD>
<20>Ŀ <20> <20> <20> <20> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20> <20> <20><><EFBFBD>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>