***** * * ******* * ***** * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * ******* * * * ***** **** * ****** * * * * A USER'S MANUAL IMPORTED BY CRIMINAL ----- NO COPYRIGHTS ----- ------- EXCLUSIVE SPREADING RIGHTS SCC ------- (MESSAGE TO HARMAN KARDON: HAVING PROBLEM WITH YOUR STEREO?) CONTENS: HOW TO STEAL CARS BY YARDLEY FLOURIDE. CREDIT FRAUD BY SNEAK THIEF. ASSORTED EXPOSIVES INFORMATION BY UNKNOWN. PYROMANIAC BY GREY WOLF. SMALL GRENADE BY SS-BADMAN. WATS EXTENDERS BY UNKNOWN. HACKING: BASICS. UNIX & VAX. DATA. XxXxXxxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxX X X X xXxXx HOW TO STEAL CARS #1 xXxXx X X X X X X written by Yardley Flouride X X X X presented by X X X X xxx the xORGanization xxx X X (fraud/hack/thieve) X X 2/13/89 X X X X X XxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXx FOREWORD: This is the first file I've written under the xORGanization and under the handle Yardley Flouride. Maybe you've read some of my files under the name Dial Tone with Black September and cDc communications. From now own I will write under the new handle and for xORG and cDc. The xORG is the newest hack/fraud/thieve group around and most of my fraud ideas will be directed to that group. My more fun files (i.e. "Fun With Traffic Lights") will be with cDc. Just to clear that up. xXxXxxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXx this file is part 1 of 2. part 1 is the basic breaking into cars or being devious to gain access to the car. part 2 will be the hot wiring of a car if you're in it already. i know there's already been files like that but this will go beyond the others. i don't feel like typing all that right now though. xXxXxxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXx No transportation! I know, I know. Looking for a great time and what? No wheels! I hate when that happens. Well, if you've read the file on casing by Elijah Bonecrusher and L.E. Pirate you're one step ahead. With the art of casing comes the art of getting the rest of the car. Ok, you need a car to get you to where you have to go and for no other reasons. 7-11's are convenient for more than slurpees you know! I was hanging out in front of 7-11 and it smacked me right in the face how many people leave their car on when running into 7-11. In a half hour I counted over 7 cars that people left unattended to run in. In this one incident, myself and Elijah were out front of one and this dude went in and left his piece of shit Duster waiting for us to take. Just hide around the sides of the stores and get the ones near the sides of the building. Elijah during the summer at the shore got a government vehicle. Pretty cool, eh? Don't dress like a god damn thief. Most fake "anarchist" faggot asswipe computer nerds would wear all black and a ski mask. No no no. Dress like a prep or some way you never dress. Beat up someone for their rags and wear them. And act like you're having fun hanging out at 7-11, drink a slurpee or something. Don't just sit there sticking your head around the corner of the building going, "how's that car!?", "let's get the porsche!", etc. Of course when all the people went into the store and left their cars on it was in the winter, it was cold as balls out. Who knows, if you find a good car take it to some remote spot and dump it. Rip everything out of it and take anything that looks over $5. This is all I have to say for "Stealing Cars Part I". Support the scene. Amen. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- | | | Volume I of The Adventures in Fraud Series | | The Bible of Fraud | | By: | | Sneak Thief | | Smog City..213-926-7720 | | Thanx to: The Raider | | Copyright, (C) 1985 by Sneak Thief | | | \=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=/ Introduction ============ You ever wonder where that unemployed guy down the street got enough cash to start a 1200 baud board with 60 megs? Well, the answer, most likely, is Credit Fraud. Credit fraud involves getting a credit card number (a CC #), and then ordering things by phone. All you need is the card number and the experation date. And a few other nasties... Well, forget this basic stuff! Let's get into the good parts.... Getting Your Card =================== Always been meticulous about your appearence? Don't like to be dirty? Then the primary method of getting credit cards is not going to appeal to you. When a customer buys something at a store or restaurant (with a credit card, of course), several carbons are made. The store puts these into their files, and throws them away a week or so later. What's that? You say, "Why don't I go to the trash, and get these carbons?", do you? Well, you're correct; this is exactly what you do. Here are some tips: 1) Go on the First of the month. (In a lot of stores, this is the 'clear the files day'. 2) Go to the mall. That way, if one trash can is empty, you have a hundred or so more. 3) Stay away from food stores. Sticking you're hand into last week's fried chicken is a price too high for a lousy credit card. 4) For convienence, look for florists, video stores and the like. Video stores especially, since >every< transaction they make involves a credit card. Ok, that is just one of the ways which you can get you're card here are the other primary methods: CBI/TRW ======= CBI and TRW are Credit services which have Credit Cards, Addresses, names, and driver's licenses for most of the population of the United States. You can also use this system to find out the credit card mend calling through a PBX, then XXXXX (insert you're favorite phone service here). Leeching ======== You could also get them off the credit fraud board on you're local elite BBS. Not a good idea, since most cards up there have about 1,000 dollars worth of porno tapes on them. Better yet, you can ask a friend. This will probaly work, but sometimes people give a card that they have used, or used but messed up with. Oh, the death of friendship! Ok, you've got your card? Good. Ordering ======== You've got to order your merchandise. To do this, call the orderline for the company, and talk to these people. If you're known as "The Human Carrier" by you're friends, or modems connect when you say "Hello", then forget it. These days they are getting mighty suspicous. They will ask you what card you want to use. Master Cards have a 5 as the first digit of the first cluster, Visas have a 4. If ice--very softly. Just say, "I'm sorry... I have this awful sore throat..." The first rule is be polite. Don't sound nervous. If the lady asks you for the driver's license, and you don't have it, make one up, then before you hang up, say "I'm sorry, I'm going to have to cancel this order...my husband told me that he had already gotten the XXXXX (the item you were trying to order)" Try to order from a pay phone, and when they ask for a phone number, give them the pay phone's number. Or scan for a number that will ring, and ring... A board that is down is a good bet. Now, you may ask, what address do I give the salesman? The Address =========== The pick up is one of the most crucial part of the entire part. Here is what I think the ultimate address should be: 1) Abandoned. 2) Isolated (No little old ladies calling the police or spraying you with hoses). 3) About a mile or so away from your house. Number one could also have a friend of yours who will sign for the package, then when the feds come deny it ever arrived. This is unlikely. Number two is obvious. I have been yelled at by numerous old people, and people that don't speak English. Not fun. The mile away from you're house is obvious. Don't want people that know you to be witnesses. Also, you can order to an occupied house. Send them a note by mail, telling them about a "computer glitch that sent some of our mechandise to you're address, and we will send a sales representative (or his son) to come pick it up." Spice this up, by apologizing for any hassles, and giving a fake name for the "sales represenative". Then, when you go, just give them a little note authorizing you to be there with an impressive signature. When you pick up the package, be calm. Talk to the people no longer than necessary, but don't run away or anything. Wear a hat, but don't wear a ski mask and sunglasses. Look normal, yet try and conceal as much of you're looks as possible. If you do this right, you will look like a normal person, and the people will forget about you in the month or so it takes the credit agency to do anything about the fraud. Advanced Fraud ============== To order more advanced, (ie: from Northwestern, or things that cost alot of money), you will need the following (usually): The Driver's License Number The Bank or Interbank Number (For MasterCard) The Billing Addresss Sometimes this will be written on the carbon. But the best way is just to use TRW...if you have a password for it. Miscellanous ============ Reading an issue of U.S News and World Report (June 3, 1985) yesterday, I found an article on Phreaking, Fraud, and BBS's. Very interesting. Said something about mailboxing, which is going through a company mailbox looking for let's say bills and the like which would have a credit number on it. Sounds interesting. Go on a Saturday, and look in the mailboxes. The last few days of a month would be a good idea, since maybe you could get lucky and snipe their Visa statement. That just goes to show that reading >some< value. Look for cards like this one: 5024 0000 6184 3847 The second cluster means it's a "preferred" card, and you can order more stuff with it. Some cards only have 13 digits (i.e: 5024 000 618 787). If you think you have ordered the limit of you're card, verify it. You do this by calling a dial up (usually 800), giving them a merchant number, the card number, the name on the card, the expiration date, and the amount to be spent. They will tell you it the card has enough money for the purchase. Get a dial up and merchant number by going to the Department Store. They are usually written on the phones. For MasterCard, the Interbank number isRyight below the na}~sn the carbon. Nisa cards contain a bank number in one of the clusters. Don't order from Northwestern. There prices are not worth all of the questions you have to answer. Order from Conroy-LaPointe at 800/547-1289, they are quite easy. Conclusion ========== There are no old carders. You quit, or you get caught. Plan what you want to get, and don't try and rush your frauds. The first rule of fraud is, "Greed Kills." I think being arrested by the feds and having to face my parents and lose my computer about the same as death. But what is life without a little risk? Try to sell most of the things you card. If there is no stolen (carded) stuff in you're house, they might go easier on you. By the way, I am in no way responsible for any use made of the information in this file. It is for informational purposes only. And if you believe that, please leave me mail on Smog City about a business opportunity. I have this bridge... June 6, 1985 - Sneak Thief of the Smog City Crew The End *=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=* * ASSORTED EXPLOSIVES INFORMATION * *=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=* Common Rocket Fuel ------------------ Materials: 1.) Potassium Nitrate (KNO3) or "Saltpeter". This can be obtained from a drugstore, or ordered from a chemical supply house. 2.) Sugar (Powdered is the best) Procedure: 1.) Mix the two together 1/2 Nitrate and 1/2 Sugar. 2.) Take an old cooking pan, and melt the two together. There is NO way for it to ignite. 3.) It should turn into a fudgey looking compound. Pour this compound into a rocket engine such as a cardboard tube, and set a fuse into the compound and let the compound harden. Chlorate Mixtures ----------------- NOTE: The main ingredient for this experiment is potassium or sodium chlorate. Both of these will do equally well. However, both may prove difficult to find. Probably the only way to get it would be to order it through a chemical supply house. Materials: ---------- 1) Potassium chlorate or sodium chlorate. 2) Powdered charcoal 3) Powdered aluminum 4) Sulfur Procedure: ---------- NOTE: There is no set procedure for making chlorate mixtures. The only special thing ABOUT chlorate mixtures is that they have a chlorate in them. Experiment with diffiernt proportions of each of the ingredients. All of the chlorate mixtures I made had no set procedure and I just experimented with the proportions of each of the ingredients. Most of your mixture, however, should be potassium chlorate or sodium chlorate. 1) Make sure that you mix the sulfur and charcoal and aluminum first. You may grind these in a mortar and pestal to get a good mix of these ingredients. 2) Add potassium chlorate or sodium chlorate. Mix them VERY CAREFULLY in the mortar and pestal. DO NOT GRIND the mixture once the chlorate has been added or it will ignite and burn the shit out of you. 3) You now may use the mixture for whatever you want to. Chlorate mixtures are some of the best compositions there are and, in my experiences, they are the best except for model rocket propellant (procedure for making this is given later). > Green Goddess < ------------- Materials --------- 1.) Zinc (Zn) <---NOTE: This is not the same as Zinc Oxide! 2.) Sulfur (S) Procedure --------- 1.) Mix the two together 1/2 and 1/2. 2.) MAKE SURE that you mix them very well. The best way to do so, is to put the mixture in a jar with a lid and shake it up for 15-60 seconds, until it is all a greyish color. 3.) To ignite, use a fuse, or throw a match into the powder. WARNING, this burns very very quickly, and produces smoke. Also it burns at a fairly high temperature. It will surprise you when you throw a match into it. There will be a delay, and then all of a sudden, it will flash up, and is capable of burning the hell out of you. ======================================= Common Uses ----------- 1.) Rocket Fuel 2.) Bombs <--- NOTE: The best way to do this is to take it and compress it into cardboard tubing. 3.) Smoke bombs (Cardboard tube w/ big hole.) 4.) Flare bombs. 5.) The rest is up to your imagination GOOD LUCK! ============================= _________________________________ [ ] [ THE FIRST BOOK OF ] [ PYROMANIACS ] [ ] [ BY: GREY WOLF ] [ ] [_________________________________] P.S. DON'T KILL YOURSELF... ....................................... ->UNSTABLE EXPLOSIVE<- ^^^^^^^^ ^^^^^^^^^ 1) MIX SOLID NITRIC IODINE WITH HOUSEHOLD AMMONIA 2) WAIT OVERNIGHT 3) POUR OFF THE LIQUID 4) DRY MUD ON BOTTOM TO HARD (LIKE CONCRETE) 5) THROW SOMETHING AT IT! ->SMOKE BOMBS<- ^^^^^ ^^^^^ 1) MIX: 3 PARTS SUGAR ---------------------- 6 PARTS EPSON SALTS 2) PUT IN TINCAN, ONTO LOW FLAME (LIKE A LIGHTER) --- 3) LET GEL & HARDEN 4) PUT A MATCH IN AS A FUSE. 5) LIGHT IT & RUN LIKE HELL 'CAUSE 4 POUNDS WILL FILL A CITY BLOCK... ->MEDIUM EXPLOSIVE<- ^^^^^^ ^^^^^^^^^ 1) MIX: 7 PARTS POTASIUM CHLORATE --------------------------- 1 PART VASELINE 2) TO IGNITE, USE AN ELECTRIC CHARGE OR A FUSE. ->CAR BOMB<- ^^^ ^^^^ 1) PUT LIQUID DRAINO INTO A PILL BOX (THE KIND YOU GET WHEN YOU'RE ON A PERSCRIPTION, NOTHING ELSE WILL WORK) 2) CLOSE THE LID & POP THE THING INTO THE GAS TANK 3) WAIT 5 MIN. 4) RUN ->PLASTIC EXPLOSIVES<- ^^^^^^^ ^^^^^^^^^^ 1) MIX: 2 PARTS VASELINE ------------------ 1 PART GASOLINE 2) IGNITE WITH AN ELECTRIC CHARGE. |))(||)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)((|)( | Small Grenade | | \ | / | | By: SS-Badman \|/ | |(|---[*]---|) (|--- - - *- - ---|)| | Kingdom of the Dead II /|\ | | 509-927-9120 / | \ | | 1200/2400 - 5 drives - 20 megs..soon! | | Sysop: Angel of Death | ||)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(||)(| Hardware: 1 Nut (any size, as long as bolts fit), the wider the better 2 Bolts (to fit nut) Chemicals Phosphorus (the odd colored tips of strike on anything matches work well). 1> Take 1 bolt and the nut, screw in the bolt until it is just in the nut, try and make sure there is no area for air to escape. This is where a perfectly matched nut and bolt are nice. bolt nut \ ||______[ ] / \||______[ ]/ || [ ] 2> Put as much phosphorus as possible in the nut. ||______[**] ||______[**] * = phosphorus || [**] 3> Screw the 2ed bolt into the open end, simply crush the phosphorus when inserting it. But be carefull, we wouldn't want to ignite it! ||______[**]______|| ||______[**]______|| || [**] || Once both ends are nice and snug, it is ready. You now have a small grenade. They can be made in various sizes. Easily stored in the clove box of your car, or in a school locker. The possibile uses are endless. It can be thrown or dropped onto any hard surface to ignite the phosphorus. The gases formed from the combustion will force one or both of the bolts out of the nut. The distace the bolt(s) travel, and its volocity, depend on the amount of phosphorus used. Of course the larger the nut and bolt, the more explosive needed to force them out effectivly. It works on the same principal as the bullet being forced out of the gun barrel, except that the direction in which the bolts fly is never known, so watch yourself. I haven't expiramented, but I'm sure that just about any, dry, shock sensitive chemical can be used in place of the phosphorus. The head of each bolt can be sharpened to a point for more effectiveness as well. Of course there are many variations to this design, I have seen special nuts that are quite wide, allowing the use of more explosive. Look in the section of your hardware store where small (or large) plumbing pipe is sold. There are pieces that have threads on each end to screw somthing on, but now we are talking about something that more resembles a pipe bomb than a devise which only causes a tiny disturbance (but is still dangerous). This file was written for informational purposes only, the author takes no responsibility for the use, or the consequences of the use, of the information. WATS EXTENDERS Many people think of phone phreaks as slime, out to rip off Bell for all she is worth. Nothing could be further from the truth! Granted, there are some who get there kicks just by making free calls, however they are not true phone phreaks. Real phone phreaks are "telecommunications hobbyists" who experiment, play with and learn from the phone system. Occasionally this experimenting, and a need to communicate with other phreaks (without going broke), leads to free calls. The free calls are but a small subset of a TRUE phone phreaks activities. Until several years ago, the phreaks main tool for free calls was the Blue Box. In recent years however, Bell has made GREAT strides in their security and detection of Blue Box's. While box's still work, their use is becoming EXTREMELY dangerous. With the advent of CCIS, the places where a Blue Box will work are rapidly decreasing, and within several years the Box will be totallt obsolete. Thus for their communications needs, phreaks have turned to other methods, one being: WATS EXTENDERS. Many companies throughout the United States have a salesman in the field that must contact a large amount of customers long distance by phone. To pay for these calls, generally the salesman use the companies Bell credit card (Now called a "Calling Card") this is quite expensive to the company. Several years ago, someone came up with a neat money saving idea. Since the company already had an an INWATS (800) number for salesmen to call in orders to the main plant, and since the company had a flat rate OUTWATS line to call customers during the day. Why not couple them together after hours so that the salesman calls the companies INWATS 800 number, then gets connected up to OUTWATS. This would mean he could call anywhere in the United States. from anywhere at no charge to him! This arrangement would save the company tremendous amounts of long distance charges since they had the WATS lines anyway, and the WATS was a lot more cost efficient than Credit Cards. This arrangement was exactly how early "WATS EXTENDERS" worked. During WATS (800) scanning (For how to do this, read "Napolean Solo's" EXCELLENT article in issue 55) phreaks discovered these WATS EXTENDERS, and found they could call anywhere in the country just by calling the extenders 800 number, then (Using Touch Tone of course) dial the number they wanted. The companies soon realized that their extenders were being messed with and decided to add some security to prevent tampering. It was set up so that when a salesman dialed the WATS EXTENDER, he would hear what sounds like a dial tone. The salesman then keyed in a four digit Touch Tone secret access code. If the code was incorrect a high-low tone would result, and the extender would have to be re-dialed. If the code was correct, and second internal PBX dial tone would result. The salesman would then access the companies OUTWATS line by hitting 8 or 9 (usually) and dial wherever he wanted. The four digit access code posed a problem to phreaks since only 1 out of 9999 possible codes worked, and the 800 number had to be re-dialed each timeand try another. Many a phone phreak spent long nights breaking the four digit codes and then using the extenders themselves! Most companies change the code every few months so the phreaks would have to start over again. (Also company employees that were not authorized to know, but found out from "leaks"). Many of you have probably heard of the infamous computer "Charlie". For those who haven't, several years ago Charlie was brought to life by Capn Crunce (Now retired from the communications service) Charlie was an Apple ][ computer with a special board which allowed it to Touch Tone dial numbers extremely rapidly (D/A) then "listen" to the results (A/D). Charlie was put to use calling a given WATS EXTENDER, trying an access code, if the high-low tone was heard (meaning an incorrect code), Charlie hung up and dialed again, trying the next sequential code. Charlie would sit working for hours, and when it found the code, it would print it on it's display screen. VERY effective! Unfortunately the only problem with Charlie was the he was very noticeable to Bell. Every time an 800 number is dialed, and AMA record is punched at the C.O. thus it looks real phunny to Bell to see that you have called Dry Dock orange shippers 800 number in Florida 3,750 times at 2:00 AM with each call lasting 1 second! Since Charlie was not very easily portable to pay phones this was a real problem. There are many WATS EXTENDERS reportedly presently in service. Most working as described, with some taking more than a four digit code, and some even responding to voice input! It should be pointed out however, that should any of you crack any WATS EXTENDER access codes and attempt to use them, you are gulity of Theft of communications services from the company who owns it, and Bell is very willing and able to help nail you! WATS EXTENDERS can get you in every bit as much trouble as a Blue Box should you be caught. Most WATS EXTENDERS also record all numbers call from them on OUTWATS. If the company detects the extender being mis-used, they will usually first try to change the access code. If the abuse continues and the get mad enough they will contact Bell who will help them investigate all the numbers you called! Thus, as in most things those of you who are determined to play with WATS EXTENDERS, do so from a pay phone and only to institutional switchboards, or people with short memories. By the way, on some "Money First" payphones (as as opposed to "Dial Tone First") the Touch Tone pad is cut off after the WATS call is complete. (Because of polarity reversal) It can be re-activated by depositing a dime after the connection is made, which you will get back after you hang up. Also please remember the opening of this article. DO NOT use WATS EXTENDERS just to make free calls all the time! Experiment with them and learn what they can do and how they work. I think you will learn a lot!! *************************** * * * Basics of Hacking I: * * * *************************** Welcome to basics of hacking i: dec's in this article you will learn how to log in to dec's, logging out, and all the fun stuff to do in-between. All of this information is based on a standard dec system. Since there are dec systems 10 and 20, and we favor, the dec 20, there will be more info on them in this article. It just so happens that the dec 20 is also the more common of the two, and is used by much more interesting people (if you know what we mean...) Ok, the first thing you want to do when you are receiving carrier from a dec system is to find out the format of login names. You can do this by looking at who is on the system. Dec=> ` (the 'exec' level prompt) you=> sy sy is short for sy(stat) and shows you the system status. You should see the format of login names... A systat usually comes up in this form: job line program user job: the job number (not important unless you want to log them off later) line: what line they are on (used to talk to them...) These are both two or three digit numbers. Program: whatprogram are they running under? If it says 'exec' they aren't doing anything at all... User: ahhhahhhh! This is the user name they are logged in under... Copy the format, and hack yourself out a working code... Login format is as such: dec=> ` you=> login username password username is the username in the format you saw above in the systat. After you hit the space after your username, it will stop echoing characters back to your screen. This is the password you are typing in... Remember, people usually use their name, their dog's name, the name of a favorite character in a book, or something like this. A few clever people have it set to a key cluster (qwerty or asdfg). Pw's can be from 1 to 8 characters long, anything after that is ignored. You are finally in... It would be nice to have a little help, wouldn't it? Just type a ? Or the word help, and it will give you a whole list of topics... Some handy characters for you to know would be the control keys, wouldn't it? Backspace on a dec 20 is rub which is 255 on your ascii chart. On the dec 10 it is cntrl-h. To abort a long listing or a program, cntrl-c works fine. Use cntrl-o to stop long output to the terminal. This is handy when playing a game, but you don't want to cntrl-c out. Cntrl-t for the time. Cntrl-u will kill the whole line you are typing at the moment. You may accidently run a program where the only way out is a cntrl-x, so keep that in reserve. Cntrl-s to stop listing, cntrl-q to continue on both systems. Is your terminal having trouble?? Like, it pauses for no reason, or it doesn't backspace right? This is because both systems support many terminals, and you haven't told it what yours is yet... You are using a vt05 (isn't that funny? I thought I had an apple) so you need to tell it you are one. Dec=> ` you=> information terminal or... You=> info ter this shows you what your terminal is set up as... Dec=> all sorts of shit, then the ` you=> set ter vt05 this sets your terminal type to vt05. Now let's see what is in the account (here after abbreviated acct.) That you have hacked onto... Say => dir short for directory, it shows you what the user of the code has save to the disk. There should be a format like this: xxxxx.Ooo xxxxx is the file name, from 1 to 20 characters long. Ooo is the file type, one of: exe, txt, dat, bas, cmd and a few others that are system dependant. Exe is a compiled program that can be run (just by typing its name at the `). Txt is a text file, which you can see by typing=> type xxxxx.Txt do not try to=> type xxxxx.Exe this is very bad for your terminal and will tell you absolutly nothing. Dat is data they have saved. Bas is a basic program, you can have it typed out for you. Cmd is a command type file, a little too complicated to go into here. Try => take xxxxx.Cmd by the way, there are other users out there who may have files you can use (gee, why else am I here?). Type => dir <*.*> (Dec 20) => dir [*,*] (dec 10) * is a wildcard, and will allow you to access the files on other accounts if the user has it set for public access. If it isn't set for public access, then you won't see it. To run that program: dec=> ` you=> username program-name username is the directory you saw the file listed under, and file name was what else but the file name? ** You are not alone ** remember, you said (at the very start) sy short for systat, and how we said this showed the other users on the system? Well, you can talk to them, or at least send a message to anyone you see listed in a systat. You can do this by: dec=> the user list (from your systat) you=> talk username (dec20) send username (dec 10) talk allows you and them immediate transmission of whatever you/they type to be sent to the other. Send only allow you one message to be sent, and only after you hit . With send, they will send back to you, with talk you can just keep going. By the way, you may be noticing with the talk command that what you type is still acted upon by the parser (control program). To avoid the constant error messages type either: you=> ;your message you=> rem your message the semi-colon tells the parser that what follows is just a comment. Rem is short for 'remark' and ignores you from then on until you type a cntrl-z or cntrl-c, at which point it puts you back in the exec mode. To break the connection from a talk command type: you=> break priv's: if you happen to have privs, you can do all sorts of things. First of all, you have to activate those privs. You=> enable this gives you a $ prompt, and allows you to do this: whatever you can do to your own directory you can now do to any other directory. To create a new acct. Using your privs, just type => build username if username is old, you can edit it, if it is new, you can define it to be whatever you wish. Privacy means nothing to a user with privs. By the way, there are various levels of privs: operator, wheel, cia wheel is the most powerful, being that he can log in from anywhere and have his powers. Operators have their power because they are at a special terminal allowing them the privs. Cia is short for 'confidential information access', which allows you a low level amount of privs. Not to worry though, since you can read the system log file, which also has the passwords to all the other accounts. To de-activate your privs, type you=> disable when you have played your greedy heart out, you can finally leave the system with the command=> logout this logs the job you are using off the system (there may be varients of this such as kjob, or killjob). By the way, you can say (if you have privs) => logout username afl ****************************** ** The basics of hacking II: ** * Vax's * * Unix * ******************************** Welcome to the basics of hacking II: Unix is a trademark of bell labs ** ** (and you know what *that* means). In this article, we discuss the unix system that runs on the various vax systems. If you are on another unix-type system, some commands may differ, but since it is licenced to bell, they can't make many changes. Hacking onto a unix system is very difficult, and in this case, we advise having an inside source, if possible. The reason it is difficult to hack a vax is this: many vax, after you get a carrier from them, respond=> login: they give you no chance to see what the login name format is. Most commonly used are single words, under 8 digits, usually the person's name. There is a way around this: most vax have an acct. Called 'suggest' for people to use to make a suggestion to the system root terminal. This is usually watched by the system operator, but at late he is probably at home sleeping or screwing someone's brains out. So we can write a program to send at the vax this type of a message: a screen freeze (cntrl-s), screen clear (system dependant), about 255 garbage characters, and then a command to create a login acct., After which you clear the screen again, then un- freeze the terminal. What this does: when the terminal is frozen, it keeps a buffer of what is sent. Well, the buffer is about 127 characters long. So you overflow it with trash, and then you send a command line to create an acct. (System dependant). After this you clear the buffer and screen again, then unfreeze the terminal. This is a bad way to do it, and it is much nicer if you just send a command to the terminal to shut the system down, or whatever you are after... There is always, *always* an acct. Called root, the most powerful acct. To be on, since it has all of the system files on it. If you hack your way onto this one, then everything is easy from here on... On the unix system, the abort key is the cntrl-d key. Watch how many times you hit this, since it is also a way to log off the system! A little about unix architechture: the root directory, called root, is where the system resides. After this come a few 'sub' root directories, usually to group things (stats here, priv stuff here, the user log here...). Under this comes the superuser (the operator of the system), and then finally the normal users. In the unix 'shell' everything is treated the same. By this we mean: you can access a program the same way you access a user directory, and so on. The way the unix system was written, everything, users included, are just programs belonging to the root directory. Those of you who hacked onto the root, smile, since you can screw everything... The main level (exec level) prompt on the unix system is the $, and if you are on the root, you have a # (super- user prompt). Ok, a few basics for the system... To see where you are, and what paths are act; G i] reguards to your user account, then type => pwd this shows your acct. Seperated by a slash with another pathname (acct.), Possibly manytimes. BBS LIST BY MOGWAI/PHALANX - 1 APRIL 1989 ----------------------------------------- St Name Phone Baud Storage Software ON *** AIRWOLF *** 416-767-1907 19200 64 AMIGA CA UNKNOWN BBS 213-329-4603 2400 60 AMIGA CA TWILITE ZONE 714-731-5195 2400 60 AMIGA NY NIGHT FLIGHT 212-962-3504 2400 43 AMIGA FL AMIGA AUSCHWITZ 904-744-9326 2400 4 AMIGA NY TRILOGY/PE#1 HEADQUARTERS 516-484-9240 9600 20 AMIGA OH SINNERS U.S. HEADQUARTERS 216-784-5552 2400 20 AMIGA ON 68000 416-278-5654 19200 328 AMIGA ON THE MESSAGE BOARD 416-536-4282 9600 2 AMIGA ON FUCKN' A BBS 416-278-0490 9600 128 AMIGA NY FBI BBS 718-259-9661 9600 310 PC BOARD NY FBI BBS 718-234-3659 9600 310 PC BOARD GA AMIGA DOCS 'R' US 912-748-0331 2400 20 AMIGA ON CANADIAN AMIGA CONNECTION 416-440-1459 9600 20 AMIGA CA PIPELINE 805-526-5660 2400 40+ AMIGA WI PANDEMONIUM 414-352-5982 9600 80 AMIGA AZ BLOOM COUNTY AMIGA 602-843-8261 9600 20 AMIGA MD TERMINAL FIX 202-562-1174 19200 N/A AMIGA IL SKIDDS' LAIR 312-631-4817 19200 N/A AMIGA CA CUTTING EDGE/ESI CALIF. 213-836-2381 19200 N/A AMIGA IN GENESIS ONE 317-885-1268 19200 N/A AMIGA FL AMIGA BEACH 407-833-8692 19200 N/A AMIGA NJ DAMAGE, INC./ORACLE HQ 602-264-6670 9600+ N/A AMIGA ND SHADOWS OF IGA 707-528-7238 19200 N/A AMIGA MT TELE-TRADER 406-782-3161 19200 N/A AMIGA ON VENTURE 416-469-1031 19200 140 AMIGA AL FEAR AND LOATHING IN LAS VEGAS 205-221-3327 19.2k 150 PC BOARD IA THE ZONE 712-366-9747 9600 65 AMIGA ON C.O.P.S. HQ 416-633-8801 9600 80 AMIGA *************************************** ** The basics of hacking III: Data ** *************************************** Welcome to the basics of hacking III: data general computers. Data general is favored by large corporations who need to have a lot of data on-line. The data general aos, which stands for advanced operating system, is a version of bastardized unix. All the commands which were in the unix article, will work on a data general. Once again, we have tb^"|yoblem of not knowing the format for the login name on the data general you want to hack. As seems to be standard, try names from one to 8 digits long. Data general designed the computer to be for busi- nessmen, and is thus very simplistic, and basically fool proof (but not damn fool proof). It follows the same login format as the unix system: dg=> login: you=> username dg=> password: you=> password passwords can be a maximum of 8 characters, and they are almost always set to a default of 'aos' or 'dg'. (Any you know about businessmen...) A word about control characters: cntrl-o stops massive print-outs to the screen, but leaves you in whatever mode you were. (A technical word on what this actually does: it tells the cpu to ignore the terminal, and prints everything out to the cpu! This is about 19200 baud, and so it seems like it just cancels.) Cntrl-u kills the line you are typing at the time. Now for the weird one: cntrl-c tells the cpu to stop, and wait for another cntrl character. To stop a program, you actually need to type cntrl-c and then a cntrl-b. Once you get on, type 'help'. Many dg (data general) computers are sold in a package deal, which also gets the company free customizing. So you never know what commands there might be. So we will follow what is known as the 'eclipse standard', or what it comes out of the factory like. To find out the files on the directory you are using, type => dir to run a program, just like on a dec, just type its name. Other than this, and running other people's programs, there really isn't a standard... *** Hark, yon other system users *** to see who is on, type => who (and a lot of the other unix commands, remember?). This shows the other users, what they are doing, and what paths they are connected across. This is handy, so try a few of those paths yourself. To send a message, say => send username this is a one time message, just like send on the dec 10. From here on, try commands from the other previous files and from the 'help' listing. Superuser: if you can get privs, just say: => superuser on and you turn those privs on! By the way, you remember that computers keep a log of what people do? Type: => syslog /stop and it no longer records anything you do on the system, or any of the other users. It screams to high heaven that it was you who turned it off, but it keeps no track of any accounts created or whatever else you may do. You can say=> syslog /start to turn it back on (now why would you want to do something like that?????) To exit from the system, type=> bye and the system will hang up on you. Most of the systems around, including decs, vax's, and dg's, have games. These are usually located in a path or directory of the name games or or games: try looking in them, and you may find some trek games, adventure, zork, wumpus (with bent arrows in hand) or a multitude of others. There may also be games called 'cb' or 'forum'. These are a sort of computer conference call. Use them on w-Wsnds, and you can meet all sorts of interesting people. ***************************************** If you would like to see more articles on hacking (this time far more than just the basics), or maybe articles on networks and such, then leave us mail if we are on the system, or have the sysop search us down. We call a lot of places, and you may just find us. This completes the series of articles on hacking... These articles were: the basics of hacking: introduction the basics of hacking i: dec's the basics of hacking ii: vax's (unix) the basics of hacking iii: dg's This and the previous articles by: /The Knights of Shadow The Knights of Shadow on the PPS SuperSystem (206) 783-9798 [25] count 'em [25] megs!