💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › CIA › cia3.txt captured on 2022-06-12 at 10:39:47.
-=-=-=-=-=-=-
/\###############/\/\/###################/\/\/\/\/\/\/\/####/\/\/\/\/\/\/\/\/ /###############/\/\/\/#################/\/\/\/\/\/\/\/######/\/\/\/\/\/\/\/\ ###############/\/\/\/\/###############/\/\/\/\/\/\/\/########/\/\/\/\/\/\/\/ #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\/\/\#####/\#####/\/\/\/\/\/\/ #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\/\/#####/\/\#####/\/\/\/\/\/\ #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\/\#####/\/\/\#####/\/\/\/\/\/ #####enter of/\/\/\/\/\/\/\/\#####ntelligent/\/\/#####/\/\/\/\#####narchists/ #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\#####/\/\/\/\/\#####/\/\/\/\/ #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\####################/\/\/\/\/ #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\####################/\/\/\/\/ #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\####################/\/\/\/\/ #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\#####/\/\/\/\/\#####/\/\/\/\/ #####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\#####/\/\/\/\/\#####/\/\/\/\/ ###############/\/\/\/\/###############/\/\/\/\/#####/\/\/\/\/\#####/\/\/\/\/ /###############/\/\/\/#################/\/\/\/\#####/\/\/\/\/\#####/\/\/\/\/ /\###############/\/\/###################/\/\/\/#####/\/\/\/\/\#####/\/\/\/\/ Center of Intelligent Anarchists Issue #3 Release Date: 05/02/94 -------------------------------------------------- /## Editor: Totally Destroyed Prodigy:GSTD79B ####/ /########################## (Not Permanent) #####/ / Center of Intelligent Anarchists ##############/ /# c/o Totally Destroyed ###########################/ /## 2400 Derby Drive ############################/ /### Fallston, MD 21047 #######################/ ------------------------------------------------- <><><><><><><><><> Table of Contents>>>>>>>>>> <><><><><><><><><> Introduction by Totally Destroyed Subscription Information by Totally Destroyed Writing for CIA by Totally Destroyed Tips for the New Hacker &&& by Totally Destroyed Credit Card Fraud Busts by Totally Destroyed Mortar by Totally Destroyed Classified Ads by Totally Destroyed Where to Get Information by Totally Destroyed Hacking and Hackers by Mark Hittinger Tribute to Kurt Kobain by Totally Destroyed &&&-password list found in the Internet Worm of 1988 by Robert T. Morris Jr. ><><><><><><> Introduction>>>>>> ><><><><><><> Well, this is the third issue. I am doing well with putting one out each month (First Two, No Problem). I don't know how many of you have actually downloaded a single copy. If you have, how about dropping me a message (email) on one of the local boards to me that I am on. Such as: Terminal Addiction: 410-527-9549*Anarchy Outside the Wall: 410-665-1855*Anarchy (CD-ROM) The Underground Ice Kingdom: 410-823-4125*Anarchy The Dog House BBS: 410-692-5792 The Whore House: 410-296-3205 Most of those offer anarchy files. Outside the Wall has no ratios, neither does Terminal Addiction. T.U.I.K. has ratios, but they have great files. Give them a call any time. The ones with a "*" I log on daily, the others I get on maybe once every two weeks. My Handle is "Totally Destroyed" send me a message. On TUIK I don't have a handle, send it to "Totally Destroyed". Just to let me know you actually read the last issues. Then I'll know if I'm wasting my time or not. Well, on with Issue #3. ><><><><><><><><><><><><> Subscription Information>>>>>>>>> ><><><><><><><><><><><><> To receive the Center of Intelligent Anarchist's publication monthly by mail then send me a letter including Name, Address, and Where you get your copies of CIA (BBS name, Person, etc.). Prices are as follows: Hard Copy $15.00 12 issues Soft Copy Disks Supplied (specify size) $25.00 12 issues Soft Copy, you supply disks $20.00 12 issues Sample copies are available at $2.00 for hard copy and $3.50 for soft copy with the disk supplied (specify size). Send your name, address, phone number (Optional), and check, money order, or cash (Not Responisble for Lost Mail). Mail orders to: Center of Intelligent Anarchist's c/o Totally Destroyed 2400 Derby Drive Fallston, MD 21047 <><><><><><><><> Writing for CIA>>>>>>>>> <><><><><><><><> If you wish to write for the Center of Intelligent Anarchist's publication submit article to: Center of Intelligent Anarchist's c/o Totally Destroyed 2400 Derby Drive Fallston, MD 21047 Include your address, name, where I can get in touch with you (Mailing address U.S. Mail is fine), and the article. If you wish to become a regular writer tell me that as well. If you want to remain anonymous in the article that's ok, just let me know. I would like your address so I can send you information on writing regularly and so I can reach you if I have any questions on your article or want you to write again. <><><><><><><><><><><><> Tips for the New Hacker>>>>>>>>>> <><><><><><><><><><><><> This month we will be dealing with guessing passwords. Let's say that you have someone's valid user name and would like to guess their pass- word. Well, first try their first name, last name, any combinations. First or last names with a numeric or special character in it somewhere. Nicknames, and combinations. Then you could try their street name if you know it, and the city they live in, if you know it. Then try all of those backwards. Then you proceed to this list of more popular passwords. This is the list used in the Internet Worm Virus a few years ago. A few have been added. aaa cornelius guntis noxious simon academia couscous hacker nutrition simple aerobics creation hamlet nyquist singer airplane creosote handily oceanography smile albany cretin happening ocelot smiles alatross daemon harmony olivetti smooch albert dancer harold olivia smother alex daniel harvey oracle snatch alexander danny hebrides orca snoopy algebra dave heinlein orwell soap aliases december hello osiris socrates alphabet defoe help outlaw sossina ama deluge herbert oxford single amporphous desperate hiawatha pacific sparrows analog develop hibernia painless spit anchor dieter honey pakistan spring andromache digital horse pam springer animals discovery horus papers squires answer disney hutchins password strangle anthropogenic dog imbroglio patricia stratford anvils drought imperial penguin stuttgart anything duncan include peoria subway aria eager ingres percolate success ariadne easier inna persimmon summer arrow edges innocuous persona super arthur edinburgh irishman pete superstage athena edwin isis peter support atmosphere edwina japan philip supported aztecs egghead jessica phoenix surfer azure eiderdown jester pierre suzanne bacchus eileen jixian pizza swearer balley einstein johnny plover symmetry banana elephant joseph plymouth tangerine bandit ellen judith pondering target banks emerald juggle pork tarragon barber engine julia poster taylor baritone engineer kathleen praise telephone bass enterprise kermit precious temptation bassoon enzyme kernel prelude thailand batman ersatz kirkland prince tiger beater establish knight princeton toggle beauty estate lagle protect tomato beethoven euclid lambda protozoa topography beloved evelyn lamination pumpkin tortoise benz extension larkin puneet toyota beowulf fairway larry puppet trails berkeley felicia lazarous rabbit trivial berliner fender lebesgue rachmaninoff trombone beryl fermat lee rainbow tubas beverly fidelity leland raindrop tuttle bicameral finite leroy raleigh umesh bob fishers leris random unhappy brenda flakes light rascal unicorn brian float lisa really unknown bridget flower louis rebecca urchin broadway flowers lynne remote utility bumbling foolproof macintosh rick vasant burgess football mack ripple vertigo campanile foresight maggot rochester village cardinal forsythe malcolm rolex virginia carmen fourier mark romano warren carolina fred markus ronald water caroline friend marty rosebud weenie cascades frighten marvin rosemary whatnot castle fun master roses whiting cat fungible maurice ruben whitney cayuga gabriel mellon rules will celtics gardner merlin ruth wiliam cerulean garfield mets sal williamsburg change gauss michael saxon willie charles george michelle scamper winston charming gertrude mike scheme wisconsin charon ginger minimum scott wizard chester glacier minsky scotty wombat cigar gnu moguls secret woodwind classic golfer moose sensor wormwood clusters gorgeous morley serenity yaco coffee gorges mozart sharks yang coke gosling nancy sharon yellowstone commrades graham nepenthe sheldon zap computer gryphon ness shiva zimmerman condo guest network shivers cookie guitar newton shuttle cooper gumption next signature These can all be tried with a special character (!,@,#,$,%,^,&,*,(,),etc.) at the end of the word, the beginning of the word, or any place in the middle. Try the following substitutions: S----------$ ex. PA$WORD I----------! ex. S!GNATURE C----------( ex. (ATTLE A----------@ ex. @SSOCIATES Also, try the User Name "Anonymous" or "Guest" or "Friend" or "New User". Then try the following passwords with each: Anonymous Guest Friend New User New Test Password When all that fails, start at page one of the Dictionary and work your way through. If all that fails start over and use each word backwards. If all that fails find a new account (if you were dumb enough to try that one for that long.) If you continue hacking that account for very long, you WILL get busted. <><><><><><><><><> Credit Card Busts>>>>>>>>>>> <><><><><><><><><> Sometime last year two asian men traveled throughout Miami, Florida and spent over $260,000. They used well over 20 credit cards they had manufactured. These two men were part of a large credit card fraud group that in the past year has carded over $260,000,000. These men as well as the ringleader of the group were arrested by the secret service sometime last month. The ringleader will be serving 4 years in a federal prison. The funny thing is the lack of observation on the clerks part. The video tapes were reviewed, and the clerks had handed the card back before the man using it even signed the transaction slip. The clerk had no way to check the signatures. The clerk also didn't look at the name of he/she would have noticed that the names on the cards were not asian. This is inexcusable says fomer Visa Employee. The cards should have been checked better. ><><><> Mortar>>>>>> ><><><> This handy weapon can be made to shoot scrap metal and/or glass. Materials Needed for Construction: Iron Pipe 3 feet long and 2 inches to 4 inches in diameter. If you will be shooting tennis balls or oranges make sure that your ammo will fit in the pipe snugly Threaded cap to fit pipe Battery and Wire Tools Needed for Contruction: None First screw the cap on the end of the pipe. The cannon is now completed. Burry the pipe in the ground. Make sure the pipe is angled in the desired direction. The end should be almost flush with the ground. Place about 1/2 pound of gunpowder or similar propellant on a cloth. Wrap this up into a package and insert an ignitor (ESTES Model Rocket) into the powder with the leads connected to about ten feet of wire. Put this in the pipe with the insulated wires hanging out the open end. Tamp another piece of cloth in the pipe for wadding. Then pour in the screws, nuts, nails, broken glass, or small stones as your projectiles. BB's or shotgun shot work well also. You then get behind the tube and connect the wires to a 9-volt battery. If there is a clean connection between the igniter and the wires, then it will go off. ><><><><><><><> Classified Ads>>>>>> ><><><><><><><> I know this really isn't anarchy related, but if you have anything you wish to sell, then send me an ad and I will post it in the next issue of CIA. Don't forget to include your phone number or address in the ad. Send ads to: CIA Classified Ads c/o Totally Destroyed 2400 Derby Drive Fallston, MD 21047 ****************************************************** * I have the following AD&D books for sale: * * Players Handbook $15.00 * * Tome of Magic $12.00 * * Monsterous Compendium Vol. 1 * * $18.00 * * Contact Totally Destroyed at 2400 Derby Drive * * Fallston, MD 21047. If you wish to make an* * offer of less than the above than * * write me and I'll get back to you. * ****************************************************** Skateboard wanted. Preferably in fairly good condition. Completes only. Contact Doug Haller........410-893-0785 That's all the ads this month. ><><><><><><><><><><><><> Where to Get Information>>>>>> ><><><><><><><><><><><><> Here's the address of some Magazine's that I thought you might be interested. 2600 Subscription Department P.O. Box 752 Middle Island, NY 11953-0752 -the ultimate hacker/phreak/computer enthusiast magazine (Subscription: $22.00 per four issues.) Mondo 2000 P.O. Box 10171 Berkeley, CA 94709-5171 Phone: 1-510-845-9018 Fax: 1-510-649-9630 -hacking CIA Magazine Archives c/o Totally Destroyed 2400 Derby Drive Fallston, MD 21047 -collection of "Anarchy Files" commonly found on BBS also has some of the phrack files and Computer Underground Digest, write for catalog ($1.00) You can write any of the above for pricing and other assorted information. CIA's catalog is $1.00 due to shipping costs. <><><><><><><><><><><> Beige Boxes Revisited>>>>>> <><><><><><><><><><><> Yes, I know that their are many, many plans for beige boxes floating and these plans are nothing new, but I will cover more ways to use the beige box than the other files I have seen floating around. Materials: Phone cord (To plug into the wall) or Cheap one piece phone, touch tone Wire stripper 2 Alligator Clips Few hundred feet of thin wire Sodder Soddering Iron First you need to decide if you wish to hook up a phone in your house to the box you are doing this to. If not you won't need the thin wire, sodder, or soddering iron. Now take the phone cord, or the cord coming out of the cheap one piece phone. And cut off the plug that goes in the wall. Then strip off the insulation. You should see four wires inside of this. One is Green, one is Red, one is Black, and one is Yellow. If they are not color coded, then you want the two middle ones. Cut off the yellow and black ones. They are not needed. Strip off the red and green ones though. Then attach the alligator clips to these wires (might require sodder). If you used a cheap phone, you're pretty much done, if not the plug the other end of the wire into a phone and you're done. Now go find a junction box. Bring your beige box and a 7/16 inch hex driver. Open up the box with the driver. Then look inside (make sure this is not the box on your porperty). Find the green wire and the red wire. Hook them up appropriately. When I did it, the box had two of each and I hooked up my red to red and my green to the other red. I don't know why, but if green to green and red to red don't work, fool around with it. Sooner or later you'll hit a combination that works. Don'w mess with the yellow and black though, they aren't used. When you finally get a dial tone (on the phone), dial your own phone number. If it is busy then you're tapped in on your on line, if not then you have someone elses line. I wouldn't do this when they might get on the phone, because what you're on is just like another extension in their house. You could bring your laptop and call long distance bbs. Anyway, this is a great way to get someones parents wondering about them. Find a house where it is the parents and only male children (atleast 11 yrs. + old). Run up huge charges on gay porno lines. This is all billed to their line. If you want this to be more permanent. Run the long wire from the red and from the green on your phone wire (beige box) and then run it all the way to the box from your house. hook up the alligator clips and close the box. Hide the wire. Now you have an extension in your house, yet it's their number. Don't leave it their for too long, someone might notice it. Well, that's it. <><><><><><><><><><> Hacking and Hackers>>>>>>. <><><><><><><><><><> Hacking and Hackers: The Rise, Stagnation, and Renaissance. Copyright(C) 1991 By Mark Hittinger (an288@freenet.cleveland.edu, #60 on Blitzkrieg) This document may be freely reproduced so long as credit to the author is maintained. It doesn't take a rocket scientist to figure out that the publicity afforded to hacking has risen to peak levels within the last year. As one would expect, the political attention being paid to the subject of hackers has also risen to peak levels. We are hearing more about hackers each day. The newspapers have articles about alleged computer crime and phone fraud almost weekly. The legal system is issuing indictments, the secret service is running around with wildcard search warrants, and captured naive hackers are turning on each other. Some well known computer people have formed a lobby called the "Electronic Frontier Foundation". Fox TV has news people on the scene during a bust of an alleged "hacker" who was invading their own doofus system! Non-computer "lay" people have been asking me a lot of questions. So who am I? I'm just another computer bum. I got into computers in the early seventies during high school. I've witnessed computing's rise as something social outcasts did to something everybody wanted to be a part of. Babes looked at us with disgust as we grabbed our data on 110 baud teletypes and paper tape. Rolls of paper tape and access to timeshared basic was so great that we didn't even think that it could get better. Well guess what? Computers and our social position kept getting better. It got so good that pretty soon everybody wanted to ask us questions. These days we are like doctors at a cocktail party, we are always getting hit on for free computer consulting! Even from the babes! You've come a long way baby! Later I got into the professional side, that is, systems programming, systems management, and software development. I've worked with GE, Xerox, IBM, Digital, CDC, HP, Prime, anything I could get my hands on. I dearly loved the DEC-10, learned to live with VAX/VMS, and now grit my teeth when I work with Unix/MS-DOS. My hobby became my career, and they paid me money for it. My chosen hacking name is "bugs bunny" and you can find me on some bulletin boards as user "bugs". Bugs was always creating virtual rabbit holes out of thin air and dodging in and out of them. True hackers love to find and fix software "bugs". Yea!! I'm 34 now and a dad. Being involved in computers for a long time gives me a better perspective than most. Over the years there would sometimes be a major media coverage of some computer crime event. As a local computer "heavy", there were always questions coming my way about what these things were all about. Lately, the questions are more frequent and more sophisticated. All these big highly publicized busts are opening a lot of issues. I didn't have answers to some of these questions so I sat down and did some thinking. Writing this article is an outgrowth of that. I am not a writer so grant me some journalistic slack. Back in the early seventies hacking was quite free. Most of the important stuff was running on batch mainframes that had no connection to the outside world. The systems that we played with were not really considered critical by anyone. We were allowed to play to our hearts content, and nobody really worried about it at all. This period is what I like to think of as the "rise of hacking". You can read about some of it in the first section of Levy's book, "HACKERS". I love that section and read it when current events depress me. In those days the definition of hacker was clear and clean. It was fun, it was hi-tech, it was a blast, and it was not a threat. There were no big busts, very few people understood computing, and the public had no interest in it. We hacked for the sheer love of it. How can I describe the depth of interest that we had? We were not concerned with our image or our "identity". We wrote games, wrote neat hacks, and learned the strengths or weaknesses of each system. We were able to obtain access to a broad range of systems. Consider teenage boys comparing and contrasting the systems designed by older engineers! We eventually reached a point where we decided how a system should be set up. At this point we began to make an annoyance of ourselves. In all instances the various administrations considered us minor annoyances. They had much more pressing problems! New users began to show up in the labs. They reluctantly wanted to get something done that absolutely had to be done on the computer. In many cases they had no idea how to start, and were left to their own devices. Centralized data processing management (MIS) didn't want to deal with them. Often, they saw us playing around, joking, laughing, carefree, and not at all intimidated by the computer. They, on the other hand, were quite intimidated. We helped these people get started, showed them were the documentation was, and explained various error conditions to them. We quickly developed reputations as knowing how to get something to work. One of the people I helped made a remark to me that has stuck with me for a long time. He said, "I am trained as a civil engineer, so I don't have a feel for this. But you, you are pure bred. You've gotten into this fresh and taught yourself from the ground up. You haven't been trained into any set doctrine." Phar out man! This is an important point. There were no rules, guidelines, or doctrines. We made our own up as our experiences dictated. As time wore on, the new user pool began to grow more rapidly. The computers began to creak and groan under the work loads that were being placed upon them. During the day time, we came to the computer area to find it packed. We could no longer access the computers during the day. After all, we were just playing! That was OK with us. Soon we were there at night and on weekends. We obtained the off-hour non-prime time access, but this put us further away from the mainstream. These new guys liked the timeshared computers much more than their mainframe batch machines. They started to move their darn