!$@E$ !#@$! !@#!@$@$! $!@ #@$#%! !$G$! #$@#! !@%F! !@#@!$@!$$$ #@%% @##!%! !Q@!~ ##%%« NFA` `Q#!! DWQ!«ø`@#@# !@@#@#R !@!@$ %@1$/ @!#(___.FSJ# SQR! WOI! $!@$ ~~~~ !$!!@#$DR @!$@!# !%$4« JASQWHRRQ@@G /!$JNCXX\ (!&! #@$! `#@!$.É._ !#@!$#%\ !@$ QRQ !#@@$ !@$$ JHKB#@ %H52! @!$DHYDX@#@! $!$@!$$!@ AIQ! #@$! `!$@!$&@` !$!@$!@! DJASQWR!R @!$$! !DJQ E@!$ #@@ #@%! H!)1«~~`HFKP @!$«ø`FWD !@$! *$#! ___ @!$! !@$«ø`@! #@!@UG@*$ $!@$! _ !#!! !@$$ 52 26@\ JROQ. XZNV. @!$!@$$@$ !$!~___. #@F! !@$@!_!ASO! %!@\_/$% DEH« $!@ $!@!$/#\#$@! #@$$ Y(@23%! #@$#! $$J$! !$$«___. (!@#$!@! F#@!_ !@#E#!@$@! $!@$@$@/ !@I\ REQ\ $!HJD@$@I@ JK#B$ 23JR#! !D#I# !O$#@ `!@$#@JG) 218IUUIQ W%F@%) `E#@$@!« @!$!~~« QRD@ #@$! H!$/\$@# !@)$$ \666! #!$%! _ |\ /| /ø\ /ø\ /ø\ øø/ | |\ | |ø +------------------------------+--------------------+ _|_|_ / \ | \/ | |_| | _ |_| / | | \| |- ! HELLSPAWN MAGAZINE ISSUE #6 ! FREE KEVIN. ! _|_|_ |_ | | | | \_/ | | /__ | | | |_ +------------------------------+--------------------+ | | | \ \_/ - - ---------============================= by the HellSpawN GrouP =============================---------- - - DISCLAIMER: The HellSpawN GrouP is in no way responsible for your actions as an indirect or direct result of the information presented here. Read at your own risk. And be careful! - - ---------==================================================================================---------- - - .::. .:#%:. .:%R%#@X:. .:Xw932IU¿¿öfUìÙ¬SI«R:. 5e4«~øú:ïîÜ âEW:.úø~~~`X:. .:úÆÃ:ú º÷e EWQ ú:$!@ .:RG §¶÷:. .:T@# `:$@:. B A C K T O S C H O O L _.:r· RÆöá Jrj:._____RQT._ `#@$kPW¬ö¸HîO(JHF¥»úIDDQÚÛÝ¡ÛÚRTWEQNI~ú« E D I T I O N *R §¶÷:. .:T@# ú:D$:. IO $@# %#@ .:2$ 78 RWE::. . .::ROR .:FSJ EW .AKD:ú ú$@#%. .:¤¦° 42¿ÆFú ú:$@#.::$! .:F$!:ú ÂöÄ$X$ .&$@:úXiyQR:._____.:¤@^35ú:$@:. .:%~ú RVBXU6¥°:ú« ú@!:. `~ `~« The New World..................................Dead_matriX supplies.......................................alienbinary raise hell in school!..........................alienbinary Fight For Your Right...........................Dead_matriX System Mapping.................................alienbinary HackOS.........................................alienbinary guide to having phun...........................alienbinary ***ThE HellSpawN LogO CodeD in MetaL*** phonecards.....................................alienbinary - - ---------==================================================================================---------- - - Issue #6, hacks and phreaks! The HellSpawN GrouP has now officially formed. We now have a new Vice President. Dead_matriX is the VP, and I, alienbinary, am the president. This is the official ezine of the group, and it's time for a new era in HSM. More philosophy, more philes, and higher distribution rate! Well anyhoo, it's that time of the year august. This is August 1998, school begins in a few days. This is the "Back to schooL" issue! sort of. Inside this issue there are many articles on "phun in school". REMEMBER: use with caution, the HellSpawN GrouP is not respnsable for your actions as an indirect or direct result of the information presented here. "the teacher stands in front of the class, but the lesson plan he can't recall. the student's eyes will perceive the lies bouncing off of every fucking wall." - rage against the machine - - ---------==================================================================================---------- - - DISCLAIMER: The HellSpawN GrouP is in no way responsible for your actions as an indirect or direct result of the information presented here. Read at your own risk. And be careful! one rendition of the underground. a lot of people would disagree with this, but personally i like it. The New World By Dead_matriX Technology is the wave of the future. Why then do many restrict access to information that would help the next generation better understand what so many people rely on 24/7 ? I'm talking about computers. They make rules because they are afraid! Afraid of too many young people getting to know more than they do. Afraid of getting ursurped by the "young" people when they (the adults) are in their "prime". Well, their prime has long been gone. Their prime was wasted going to woodstock and drawing peace symbols. We are more awake. We know that there is violence and hate in this world that we live in. What do we do? We turn to another world where there is no racism. Where there is no crime based upon how people talk or look. We turn to computers. In computers we find a wealth of information that we would have never found in this world. Again they are afraid. They do not want us to have access to this information. Those who deny access to this information are being unjust. We have tried to ignore this problem for a long time, but today is the day that it is going too far. So what do we do? We use our knowledge of these wonderful machines to gain access. First we ask, but are refused. We plead, but we are denied. That day is gone. Now is the age where if we want access, we have it. Where if we are refused, we find a backdoor. But they have found us out. So they made rules against this "crime". When we are caught breaking these laws we are punished. We are punished for giving ourselves access to this "restricted" information. Now, in this age, no information is safe. For even under threat of these severe punishments, we have continued to rebel. >> We explore... and you call us criminals. We seek after knowledge... and you call us criminals. << We have made it known that "there is NO security". There are no "un-crackable" systems. We are hackers. We are each an individual, yet we are all alike. We know the ins-and-outs of the "moderns systems". We understand that if information is kept locked up, it is asking to be found. Whether we do it for the challenge or whether we do it for knowledge (which most everyone does), in one way or another we all do it to rebel. Rebel against the laws and restraints that have been forced upon us. Rebel against the social and cultural imprints that have been molded onto us. >> We exist without skin color, without nationality, without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe that it's for our own good, yet we're the criminals. Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. << Now is the time. This is the place. We will no longer be held under water while everyone else is greedily breathing in air. We are the next generation. We are hackers. We are crackers. We are the elite. No one can stop us. We will prevail. Disclaimer -=- All of the information in this phile is for educational purposes only. Pheel phree to pass it on to others or post it anywhere, but please keep it in itz original shape, form, and size. Thanx and hack the planet! ©opyright 1998 Dead_matriX All ¨ights ¨eserved Everything between the >> and << is quoted from the Hacker's Manifesto (or The Conscience of a Hacker) ©opyright 1986 +++The Mentor+++ - - ---------==================================================================================---------- - - ~ The HellSpawN GrouP's ~ "Back to schooL" supply list by alienbinary ~~~~~~~~~~~~~~ DISCLAIMER: The HellSpawN GrouP is in no way responsible for your actions as an indirect or direct result of the information presented here. Read at your own risk. And be careful! SOFTWARE 01. NAME: xCGI AUTHOR: Logik DESCRIPTION: analyzes cgi scripts, scans for for exploitable flaws, security holes, and tells you how to exploit them. 02. NAME: CAEM v1.0 AUTHOR: WeeDo DESCRIPTION: short for "completely anonymous email", this program enables you to send email anonymously. Hence the term "completely anonymous". 03. NAME: ResEdit v2.1.3 AUTHOR: Apple Computer DESCRIPTION: this is a great resource editor. 04. NAME: AGNet Tools AUTHOR: the ag group DESCRIPTION: it's a collection of tools in a GUI interface for network queries, finger, whois queries, et cetera. It's a great bunch of net tools. 05. NAME: WinNuke AUTHOR: the 2600 group DESCRIPTION: if your school has a windows server, take it out with this fantastic tool of Mac-Induced terror. It floods the server, and makes a mess of the network, and at the very least, slows the network down to a crawl. Often this software is capable of much worse, for example, I have seen it take down an NT server. 06. NAME: Virex 0.53b 2 AUTHOR: Data Watch Corporation DESCRIPTION: keep your mac free of virii. 07. NAME: Resourcer DESCRIPTION: Another, more advanced resource editor, great for cracking software in assembly. 08. NAME: Ping-of-Death AUTHOR: the 2600 group DESCRIPTION: a very effect Ping-Flooder. It will ping a server till it's reduced to a box of errors. HARDWARE 01. 56k modem these are great for quick dialups from anywhere, in order to establish a PingFlood or a DoS attack on your school's network. 02. 3400c/G3 For speedy wardialing I recommend the 3400c laptop. if fact, that's what I am writing this on. For a lappy you can grab, and take everywhere, I recommend a middle end G3. Supercomputing in the classroom. Both lappy models are fabulous tools for outsmarting the teachers. I collect compiling software for creating mathematical programs, and scaring the teacher when he realized that he had someone in the class with brains (me). 03. iMac very nice. This machine is gonna help Apple crush the competition. I'm still saving up for one, but I was at CompUSA for the debut of the iMac. I was playing the game "Nanosaur" on t. Nanosaur utilizes soem highly advanced graphics features, but the iMac handled it with great ease. But not only is it's graphics card great, the 292mhz G3 processor and the 56k/s internal modem, the 24x cdrom, and the beautiful outer shell. Although people have been complaining about the lack of peripherals, and expansion room, those complaints came from idiots. Imation came out with the iMac Superdrive. a single slot that can handle floppy disks with 1.44 megabyte capacity, and the 120 megabyte Superdisks. TOOLS 01. Mutlitool- a very useful tool available from the sharper image. It's got a powerful wire cutter for clipping small padlocks off of lockers. It's got a large knife for etching shit into your desk, a wire stripper, vital for any phreak's collection of tools, and is, in general, very useful. 02. Laser Pen- if you can get a laser pointer pen, I suggest that you do. They're absolutely great for classroom disruption, (shine it on a wall, when the teacher's not looking, and the class loses interest in the bullshit that's being taught, because they think it's funny.), and is a great thing to own. DISCLAIMER: I, the author, alienbinary, am in no way responsible for your actions as an indirect or direct result of the information presented here. Read at your own risk. And be careful! - - ---------==================================================================================---------- - - raise hell in school! v1.0 by the HellSpawN GrouP ~~~~~~~~~~~~~~~~~~~~~~ DISCLAIMER: I, the author, alienbinary, am in no way responsible for your actions as an indirect or direct result of the information presented here. Read at your own risk. And be careful! HERE ARE SOME PHUN THINGS TO DO IN/TO SCHOOL. - order a pizza to the school's address. Never claim it, most likely the receptionist at the front desk will have to fork over the cash. - light up a cigarette in class. - try to bum a smoke off your teacher. - scratch things into your desk with an exacto knife. - at lunch, steal some kitchen knives, ad try to saw the table in half. (very unlikely to work if you don't keep at it all year, but it's still funny as hell!). - break the tips of every pencil you can find. - "sharpen" a bic pen in one of the school's pencil sharpeners. - slip your own slides into the slide projectors when noone's looking. (be creative!) - steal the front door of the school! - if your school has cooling fans in the building, (try the teacher's lounge), attach post-it notes to the outsides so they hit the fanblades. If done correctly this will produce an irritating "click-clack" sound. - if you happen to be held back late, slip into the office, and replace the answering machine tape with death metal. - on a snowy day, call around, and make faulty rumors about a snow day, and school cancelation. Watch the fireworks as people find out that there was school. - sneak into the computer lab, and swith the monitor cables. This way the person at the one computer will get a private viewing of someone else typing out thier homework. - steal the trackballs on the bottom of all the mice. - download as many virii as you can to the school computers, preferably if the computer's are on a network. - try downloading a different virus to every HD in the school, this way, everytime the network is initialized by someone, they release a new virus onto the network. That way they can't trace it to one user. (this requires network attacking virii) - If the school has PC's (wintel), go to the DOS prompt and type "kill *.*". this erases the hard drive. more accurately it, well, kills it. - if they have linux on the computers, (not fucking likely), try deleting the "/etc/" directory in root.... Better yet try deleting root! ;-) - in the school cafeteria, steal a kitchen knife, and begin to saw the table in half. If asked what you're doing, respond nonchalantly with your true intentions. Just tell them you're sawing the table in half. It is unlikely that will saw the table in half with a dull kitchen knife from a school cafeteria, unless you keep at it the whole year. But, it's fucking funny as hell! - sharpen a ballpoint bic pen in the pencil sharpener. - if you can get your hands on some latex gloves, and a photo of the principle, tape the picture to the inside of all the urinals in the bathrooms at school. - if a teacher keeps you after school, sneak into the office, and replace the answering machine tape with something of your own devising. - run a DoS attack on the school's network, and a Ping-flood on the server. - if your school has PCs, get all the apple stickers you can, and put them directly on the middle of the PC monitor's screen. - print up all your work in the smallest size font you can. - - ---------==================================================================================---------- - - DISCLAIMER: The HellSpawN GrouP is in no way responsible for your actions as an indirect or direct result of the information presented here. Read at your own risk. And be careful! Fight For Your Right =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= by Dead_matriX http://freeyellow.com/members2/eleet eleet00@hotmail.com =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= The year is 1998. We are living in the Digital Age. The age of the Internet and of the Electronic Lifestyle. In this age information rules. Simply having access to a bit of information that the government or Big Brother doesn't want you to see will land you in jail. Even knowing how to gain access to this information is grounds for a jail sentence. Is this the kind of world we want to live in? Where you can spend years in a cell with a man named Big John who wants to be your wife just for learning? Just for being able to uncover a few secrets and find flaws in security systems? No. It is not the kind of world we want to live in. So we rebelled. Once electronic security became a "top issue" with the government and major corporations, a new world was born. The Digital Underground. A refuge for those who did not agree with the powers that tried to control them. A place for those who wanted to know to learn. A network of free thinking minds and digital personalities. The mass public has only glimpsed a few tattered peices of the Underground. The media has fed upon these few, bland images and stories. They have dubbed us "hackers", "crackers", "cyberpunks", "digital terroists", "electronic vandals", "phreakers", the list goes on and on. The Underground is viewed as "the dark side of the Net" and "the sewers of the Information Superhighway". But many of us have taken on these names and put new meanings to them. The Digital Underground is composed of many different kinds of people with many different kinds of skills and talents. Hackers. crackers, phreakers, anarchists, programmers, and pirates to name just a few. But all of these types of people beleive in one thing: Information Should Be Free. Big Brother has outlawed many activities that promote this. Tell me, what ever happeed to the First Amendment??? Nowadays you can be jailed for knowing how to find holes in networks and how to make a simple pipe bomb. Come on, this is getting out of hand. This was supposed to be a free country, where you could say and think as you please. But nowadays we see more and more evidence that Big Brother is trying to convert us into conformist, one minded, slaves who only do what they say is "right". Is this the kind of future we want? Is this the kind of future we want our children to grow up in? No. Rebel. While you still can. Learn all that you can. Read, talk, fight for your right. Your right to say, do, and think as you want. Join the Underground so that one day it won't be an "underground" any more. *** Author's Note : Dead_matriX understands that not everybody in the Digital Underground applies to this. He understands that many hackers, crackers, and phreakers do what they do only for the sake of learning. But this was meant to be an anti-governmental text and that wouldn't have really fit in. He hopes that this has changed someones life / mind and helped at least a few people understand. Hack The Planet! - - ---------==================================================================================---------- - - +-----------------------------------------------+ ! ! ! System Mapping in Relation to Network attacks ! ! ! ! ~ by alienbinary ~ ! ! ! +-----------------------------------------------+ DISCLAIMER: I, the author, alienbinary, am in no way responsible for your actions as an indirect or direct result of the information presented here. Read at your own risk. And be careful! What is a system map? ~~~~~~~~~~~~~~~~~~~~~ A system map is a diagram of a network. It is comprised of server CPU, terminals, (dumb and CPU), and all the layers. It is also a good idea to include a peripheral map. example: L1 = Layer 1 TCP L2 = Ethernet L3 = Telnet L4 = FTP P1 = Peripheral 1 (printer) P2 = Peripheral 2 (EXT. CD-R) T1 = Terminal 1 (dumb) T2 = Terminal 2 (NT workstation) T3 = Terminal 3 (NT workstation2) T4 = Your iMac ______L1___L3__ / \ | ________ P2 | | / | server ----------P1 | __L2__ \ ISP __/ | | | _/ / | | | / T1 T2 T3 \ T4 \___L4 ROUTES: T1 -> L2 -> server T2 -> L2 -> server T3 -> L2 -> server T4 -> ISP -> L3 -> L1 -> server Why map, instead of just attacking immediately? ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Because, say for example you want to run WinNuke. You want to crash the server, not your ISP, and not some poor terminal. You want to know exactly what you're getting into, and precisely which machine to flood. If you try to run a scan for the first server on the network, you might end up fucking up your ISP. Another example is say you run a wordlist cracker, and it fails. You can then switch over to FTP, and try and find the shadowed password file, or simply download the info you wanted to hack into. Without proper knowledge of the network's infrastructure, your chances of successfully connecting to the FTP are greatly lessened. example: ______L1___L3__ / \ | ________ P2 | | / | server ----------P1 | .áúøúá. __L2__ \ ISP : __/ | | | _/ .« switching over to FTP / | | | / : T1 T2 T3 \ T4 ._.....á \___L4 How to make a System Map. ~~~~~~~~~~~~~~~~~~~~~~~~~ Peripheral Map: 1. this will be explained in PAH mapping. Proxy Map: 1. Run a TRACEROUTE for a proxy map. Physical Access: Say it's your school's network. Then follow the appropriate steps. IF IT'S AN NT/WINDOZE NETWORK: 1. Walk into the computer lab and start visually tracing the route. Look at the snaking cables, look for hubs, phonejacks, anything that helps. 2. Sit at a machine and run a manual diagnostic. 3. Check for: - printershare - ethernet - IrTalk (why not? =D) - scan for any open ports 4. write them down. 5. draft a map like the one above. 6. properly label map. 7. determine the route you want to take in order to hack the system. 8. do a map of the route to the server. 9. *** I recommend doing the attack when you have physical access to a machine already on the network. IF IT'S A MAC NETWORK: 1. Walk into the computer lab and start visually tracing the route. Look at the snaking cables, look for hubs, phonejacks, anything that helps. 2. Sit at a machine and run a manual diagnostic. 3. Check for: - printershare - ethernet - appletalk - filesharing - appleshare - at ease on an appleshare network - IrTalk (why not? =D) - scan for any open ports 4. write them down. 5. open up chooser. 6. do a cmd-shift-3 and print the screenshot. 7. draft a map like the one above. 8. properly label map. 9. determine the route you want to take in order to hack the system. 10. do a map of the route to the server. 11. *** I recommend doing the attack when you have physical access to a machine already on the network. What do I do now? ~~~~~~~~~~~~~~~~~ Once you complete the map, study the fucking thing till it hurts (well, not really =/). Make sure it makes sense, and you now understand the inner structure of your target network. Then, choose the best path for success, and launch your attack! Some helpful tips. ~~~~~~~~~~~~~~~~~~ - check your map, look it over, and make sure it's correct, a single misprint could be disastrous, and greatly jeopordize your attack. - you might want to get AGNet Tools, and run all the diagnostics you deem necessary. Any knowledge of the network is good knowledge. - choose your targets wisely, carelessness can mean a visit from the feds, which means great unhappiness for you. - "Just because you're paranoid, doesn't mean they're not out to get you." - - ---------==================================================================================---------- - - /-----------------------------------------------X-------------X ! ! ! ! || || //\\ //\\ ||// //\\ //\\ ! ~ the HSG ~ ! ! ||_|| //__\\ || | / |||| \\_ ! ! ! | _ | | -- | || | \ |||| || ! =---------= ! ! || || || || || ||\\ \\// \\// ! alienbinary ! ! || || || || \\// || \\ -= v1.0 =- ! Dead_matriX ! ! ! =---------= ! X-----------------------------------------------/ ! ! ! ! ! brought to you by: the HellSpawN GrouP ! ! ! ~~~~~~~~~~~~~~~~~~~ ! ! X-----------------------------------------------/-------------/ DISCLAIMER: The HellSpawN GrouP is in no way responsible for your actions as an indirect or direct result of the information presented here. Read at your own risk. And be careful! InTrO: this file is a collection of useful hacks created by -= HsG =- . These are mostly hacks that are useful for solving problems, customizing software, and helpful hints. tHe VaMp PlAyLiSt: This hack came to me when my copy of MacAmp was corrupted. I started using Vamp. Anyway, after a while, it got extremely irritating to have to open every single mp3, in order to have a playlist. So, I decided to create an applescript that opens all my mp3s for me, opens Vamp, and then closes the windows for me and respectively quits. For reasons of syntax, I decided to let the computer do the scripting. HOW TO MAKE IT: 1. open up applescript, and set it to record. 2. open up all of your mp3's, and Vamp. 3. close the windows. 4. goto applescript 5. turn off record. 6. look over your playlist, and remove any mp3's that suck. 7. compile the script, and quit applescript. 8. if you want, change the icon. 9. now make sure all windows are closed. 10. test your script, and if it works, you now have a playlist. ThE fUcK yOu CuRsOr The hand cursor in aol software really is pathetic. So I changed it. Open up aol with resedit, and doubleclick on the "crsr" resource. Select resource ID number 137, and press return. You should now get a pallete, and a cursor editor. Now select the index finger of the hand, and move it to the right, now select the pen, and fix all the black lines. You should now get a hand with the middle finger raised. Move the "x" to the tip of the middle, so as not to reduce accuracy. - - ---------==================================================================================---------- - - the HellSpawN GrouP's GUIDE TO HAVING PHUN! DISCLAIMER: The HellSpawN GrouP is in no way responsible for your actions as an indirect or direct result of the information presented here. Read at your own risk. And be careful! INTRO In this society we often do stuff that we really don't want to. We go places that we don't want to, and attend celebrations overflowing with the rank stench of futility. So FUCK 'EM! The next time some punk assed bitch wants you to attend a party for somone you don't know, or go clothes shopping for formal attire, pull one of these on them. PHUN AT OFFICE SUPPLY STORES 01. fax something to one of the fax machines in the store. 02. find every pamphlet and coupon you can and stroll over to the paper shredder department. Watch the confusion as the "free windows upgrade kit mail in order forms" turn to confetti. 03. Get a bunch of phreinds together, and host ChairCon '98 in the office furniture department. 04. host a phreak conference from the best office phones you can find. Rembember, must have conference call, unless you're ready to start boxing in the middle of an office supply store. 05. find the label makers. print mac propaganda. and post it all over the expensive wintel paperweights. (PC's). 06. type k-rad shit on the print out calcs. "31337" would be funny. 07. test out the rubber stamps.... on furniture, people, customers, and countertops. 08. take the "RESTROOM" signs from the sign aisle, and put it on the "staff only entrance". 09. Xerox machines have a multitude of possibilities. Xerox you're ass (thanks 'Beavis and Butthead'). Xerox your middle finger and post it facing outward on the glass windows, so customers get "greeted" on their way into the store. 10. there are lots of fun things to do at office supply stores. GROCIERY STORES 01. go to the produce aisle, and make obscene gestures with a carrot. 02. find the bananas, and remove all the stickers, then apply them as you see fit. 03. draw extra lines on the bar codes of random items. 04. if the store has a recycling center, like a can drop off, try to redeem full cans. 05. if you can get your hands on the PA, "sale annancements" are always funny. ("sale on head.... of lettuce"). 06. try having a feast in the store. the produce aisle is good. If you are confronted by a store employee.... run like hell. 07. go to the meat department, and make mooing noises. 08. start an in store food fight. FORMAL WEAR 01. try on a tux, and waddle like a penguin. PHUN AT TOY STORES 01. sit in the barbie aisle with a freind and have a long debate about her breasts. 02. in the same aisle, set up an orgy of dolls. 03. go to the nerf area, and be a sniper. Every time some brat says "but moooom, I reaaallyyy waaaaannntt itttt", pick him off with your strongest nerf. 04. play n64 goldeneye, and challenge little kids. If you win, point and laugh at them. 05. at fao schwartz, they have this irritating "freindship tree". It "talks", and a fake plastic mouth moves. Stick dolls in it's mouth, and make crunching noises. 06. stick long hard objects in the mouth of the tree. RESTAURANTS 01. order a burger, and then run around the restaurant going moo!!!! 02. order a chicken and then flap it's wings. 03. Ask if they have a dish you know they have, explain to them that sounds good.... and then order another, completely different dish. 04. read the menu aloud, and enunciate every word. - - ---------==================================================================================---------- - - ThE HellSpawN LogO CodeD in MetaL -------[ by alienbinary ]------- DISCLAIMER: The HellSpawN GrouP is in no way responsible for your actions as an indirect or direct result of the information presented here. Read at your own risk. And be careful! '© 1998 the HellSpawN GrouP cls forecolor 0,0,0 backcolor 65535,65535,65535 print "" print " " forecolor 65535,65535,65535 backcolor 0,0,0 print " -> ThE HellSpawN GrouP <- " forecolor 0,0,0 backcolor 65535,65535,65535 print " " print " ~~~~~~~~~~~~~~~~~~~ " print " email us at: " print " ebe01@hotmail.com " print " ~~~~~~~~~~~~~~~~~~~ " print " " wait button cls forecolor 65535,65535,65535 backcolor 0,0,0 print " " print " alienbinary " print " Dead_matriX " print " " print " hack the planet. " print " " stop end - - ---------==================================================================================---------- - - DISCLAIMER: The HellSpawN GrouP is in no way responsible for your actions as an indirect or direct result of the information presented here. Read at your own risk. And be careful! +=---------------=+=---------------------=+ ! ! another phreaking ! ! PHONECARDS ! text from.... ! ! ! a l i e n b i n a r y ! +=---------------=+=---------------------=+ +=---------------------------------------=+ ! DISCLAIMER: this is for entertainment ! ! purposes only. Read at your own risk. ! +=---------------------------------------=+ CONTENTS: *~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~* social engineering..........................1 brute force pin number hacking..............2 pin number generation.......................3 tips........................................4 SOCIAL ENGINEERING IN THE CONTEXT OF PIN NUMBER HACKING This works moderately well. Wait by a payphone with a phreind. have then freind pretend to be doing homework or something. When someone comes over to the phone, and produces a phonecard, act all excited, and say that you collect phonecards, and can you see it for a sec. the person will probably say something like "sure, why not.", grin inwardly. Pretend to look at the card being sure your freind can see it. have him copy down the pin number and the dialup on his "homework". Have him pretend that he doesn't care and needs to do his homework. this way, it looks like he's doing math, while you're getting all worked up about a peice of plastic. (which we all know they are so much more). Give them back their phonecard, and leave them alone. Now look at your freind and say, "I hope you let me copy your homework". He should turn it over to you, where you take a clean sheet of paper and copy the pin and dialup. Now you have a pin number and a dialup. Repeat at another payphone. Do this until you have about 10 phonecards, and then go home and make a database for your collection. BRUTE FORCE PIN NUMBER HACKING Find the 800 number you dial before the pin number of a card. Call it and enter random numbers. they are usually in sets of ten. 1. call number 2. wait for beep or slogan of company. 3. at the prompt enter and random set of ten digits. XXXXXXXXXX 4. if it doesn't work, hang up, and go back to step 1. 5. if it works, you will hear some sort of confirmation. 6. hang up, and record your find. PIN NUMBER GENERATION there are a few pin generators, mostly used for MCI calling card number hacking. I haven't really found one that worked, normally cause the telco (phone company) fixed the error. TIPS - I don't recommend doing this shit from home. try to find a payphone nearby. - note: the FBI and the Secret Service are allowed to tap public payphones, so cover the mouthpeice with a handkercheif, and try not to make a sound while you are phreaking. - do not try social engineering if you cannot act. I am a pretty good actor, so I can get away with it. - - ---------==================================================================================---------- - -