💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › IRG › newvol07.irg captured on 2022-06-12 at 13:01:51.

View Raw

More Information

-=-=-=-=-=-=-



                 //////     ///////     ////////
                  //       //    //    //
                 //       ///////     //   ////
                //       //    //    //     //
             //////     //     //   /////////
             
     
     
    International Rogues Guild and Shadow/Net Presents...            
    IRG Newsletter v7.00              Released: 6/11/91 
    Written by: Haywire               Edited by: Haywire
        
        Hello to all and to all hello,
                I have found myself in a slump, I can not get myself to get
these news letters out on time.  This news letter is over 3 months late.  Of
course I have at last got it done and I hope to continue with IRG for a few
more years.  Or until the world ends (the rise of the third Anti-Christ is
suppost to happen in 1992!!).  Welcome to IRG Number 7!!!


 7.10 Table Of Contents
 ----------------------
 7.10...................................Table Of Contents              
 7.20...................................Disclaimer
 7.30...................................More About IRG
 7.40...................................CyberPunk Follies
 7.50...................................Letters From Prison
 7.51...................................Magic Computer Voo-Doo by Psycho
 7.52...................................The Art Of Suicide by Damaged
 7.53...................................Hackin' Internet! by The Gatsby
 7.60...................................Running The ShadowNet
 7.70...................................Hellos and Goodbyes 
                             
7.20 Disclaimer
---------------
        All items in this newsletter are meant for informational purposes. 
It is written to encourage illegal activities, I hope the reader is inspired
to break the law after reading all IRG Information.  Of course the authors of 
this newsletter cannot be held for anything that the reader does.
        WARNING: Remember ALL explosives are dangerous, DO NOT, I repeat, DO
NOT mess around with any of the recipes for explosives, EVER!  These recipes
are real, they can kill you, and anyone else.  Make sure you know what you're
doing.  Otherwise its your fault.

7.30 More About IRG
-------------------
        IRG is doing rather good and alot more people have heard about it then
I thought.  It seems though that the old age of hackers is over and a whole new
generation of younger hackers is here.  I never see the old names of hackers
around anymore, or even hear about any realy exciting new one!  There are of
course those Neo-Great Hackers that I am happy to find running around in places
but it seems that often when a hacker gets to the level that people have heard
of him, then he gets caught by the Feds or disappears for a time.  Control - S
is one such person, HEY WHERE THE HELL ARE YOU???? He just suddenly disapeared
on day.  Another hacker and member of IRG, Damaged Sectorz was arrest for
hacking and a bunch of other crap and I fear we will not be seeing him again
for a long time.  This makes me sad and also angry.  Doesn't the Goverment know
that it cannot get rid of hackers and rebels?  Well actualy they can I have
developed a plan that will stop all hackers and rebels FOREVER!  Because you
must remember Hackers are rebels...

        1. Start with a monthly purge of all youth computer equipment.  Anyone
        under the age of 30 should have there computers confescated and
        destoried.

        2. Arrest anyone who uses the phone for an other reason then to plan
        meetings to talk in person.

        3. Kill all violators of numbers 2 and 3.
        
        4. Kill anyone who can think.
        
This little idea is for The FBI no one else is to take it serouisly, of course
if any number is not done then it will not work at all.  Because hacking is an
Idea and ideas cannot be destoryed unless they kill everyone who can think.
There is another name for hacking, or thinking or, its called ThoughtCrime.
Yes that is from 1984 the book, but I have been reading it and found that there
are alot of things that make sense even today.  I know there is not as much
oppression as in the book 1984, but it is overly strong to make a point.  To
get us to think!
        I when into the store InnerWorld the other day and on the wall was a
big sign that said "ALL YOUTHS ARE BASICLY CRIMINALS SO WE ARE WATCHING YOU."
I laughed at first then it dawned on me how true this was.  All youths basicly
are criminals and the goverment watchs us.  Then I thought who cares if they
watch us we just stay with in the bondary of the law until they blink then bamb
we do something illegal.  Then I thought of all the hackers outhere.  Shit we
have so much power but we don't even put it to use.  If the goverment wants to
fuck with us then lets fuck with them.  We could easly turn the whole
Tele-Compumications into a hell that even the goverment would have a hard time
cleaning up.  We need to band together and take to arms.  There needs to be
more organization of hackers world wide.  But I fear it will never happen
becuase people don't believe in themself.  They don't believe in the power that
they hold.  And instead they would rather fight amoung themselves.  They would
rather crash each others GOOD elite boards and bother each other.
        I was reading this book called Hackers, and it was pretty lame, it was
suppost to be about the new "Hacker age" but it only talked about people who
had been busted or had never really been good hackers.  It mentioned something
called The Hacker Ethics, which I had only heard of once and that was in a
Phrack Issue, I think, but I never heard much of it.  I decided to re-write
these Hacker Ethics and to try to organize the Hacker Age.  Next issue I will
have The Neo-Hacker Ethics for everyone to follow if they would like.


Here are the IRG members, I am looking for more at all times!

            IRG Members              Rank
            -----------             ------
            Haywire                 IRG and ShadowNet Leader
            Wasteland Warrior       IRG Member
            Damaged                 IRG's Busted "Sick" Member
            Psycho                  (615)ShadowNet Member
            Dr. Digital             (619)ShadowNet Member
                
            Journalist
            ----------               
            Haywire
            The Spectral Demon
            Control-S
            Kryptic Night
            Psycho
            Damaged
            Wasteland Warrior
            The Gatsby
                
        Thats about it, if you feel like becoming a member of either IRG or
ShadowNet.  Please call one of the IRG nodes.  If you would like to become and
IRG node contact one of the IRG nodes.


7.40 CyberPunk Follys
---------------------
        I have decided that I will rename More About IRG to CyberPunk Follys so
next time expect the change.


7.50 Letters From Prison
------------------------
        I did not get as many files as I would of liked this issue but maybe
next issue I will get more.  Luckly The Gatsby jumped in there at the last
second and wrote a great file on InterNet!


7.51 Voo-Doo Powder by Psycho
-----------------------------------------------
                       Psycho's

                               mystical, magical

                              *******************
                              *                 *
                              *   Voo-Doo       *
                              *                 *
                              *        Powder   *
                              *                 *
                              *******************

                        Written Exclusively for The IRG


If you're like me, nothing warms your heart more than a little random, 
senseless destruction of someone else's property. The following recipe for 
destruction has been totally Vandal Tested & Approved, and, when properly 
applied, is guaranteed to put a little excitement back into anyone's life, no 
matter how fucking miserable they are, including you and the person you're 
working this special brand of Voo-Doo on...

LIST OF INGREDIENTS:
                       1-Hunk of iron, any shape
                       1-Bench grinder (a common file
                         may be substituted, if you've
                         got a lot of time to waste)
                       1-Box of Nerds candy

INSTRUCTIONS:
                Put on a pair of safety goggles, and start grinding the shit
                out of the piece of iron you have chosen. Do this for several
                minutes, or until you have amassed a pretty good-sized pile of
                iron filings. Examine the box of Nerds closely; You will find
                that the box is split into two sections, with a different
                flavor in each side, both having a handy pour spout with a
                sliding cover. Open one side of the Nerds candy. You can either
                eat the shitty candy or just toss it- it's not important. Go
                ahead and open the other side of the box, but leave the candy
                intact, as it can come in handy later as an "alibi" of sorts
                (this will be explained farther down). Now, using a magnet,
                pick up all the iron filings you can and stuff them into the     
                empty side of the Nerds box. CONGRATULATIONS! You now hold in
                your hand the EVIL powers of ELECTRONIC VOO-DOO, thus making     
                you a High Priest witchdoctor extraordinare, or a "Voudoun",
                as Voo-Doo practicioneers in Haiti and New Orleans call it.
                Now, bop on down to your local mall to try your first hexings.

APPLICATIONS:
                The first step in freeing the evil spirits or "legba", that
                you now control, is to find some hi-tech electronic stuff,
                the more expensive, the better- Audio/Video & Computer stores
                are ideal targets.

                Having located one of the aforementioned establishments, you
                are now ready to begin. Take out the Nerds box, and shake a
                little Voo-Doo Powder into your hand. Now, pick a real nice
                piece of equipment (such as a Multi-CD player or 486 computer),  
                that is turned OFF, and gently blow the powder inside. In the    
                case of the computer, you may have to content your self with
                simply tossing the powder into the air vents in the back-
                this is not as effective as you can get, but will usually work 
                nicely. VCRs and CD-players work best, as you can easily gain 
                access to the inner-workings by the small door in the front of 
                the machine.

                After working your evil magic, stand around and wait for some 
                hapless fucker to either ask for a demonstration of a machine 
                you have hexed, or (better yet) turn the machine on himself. 
                Regardless of who does turn it on, the evil Electronic Demons 
                will be summoned forth, and the machine will erupt in sparks, 
                smoke, and quite possibly flame. And, as an added attraction, 
                the asshole turning it on just might get zapped real good in 
                the process.

                HAH! FEEL THE POWER! Isn't it GREAT?!? However, one must use 
                the Powers of Darkness wisely, or risk punishment by a Higher 
                Authority (like the police). It's NOT a good idea to hex more 
                than two or three machines in any particular store. Should 
                someone spot you with the box and ask you what the hell it is, 
                you simply say: "Nerds, Man... Ya want some?", while shaking a 
                handful out and popping them into your mouth. Always be sure 
                which side really IS candy, otherwise you're pretty much 
                screwed.

                And now, with the occultic knowledge that has been bestowed 
                upon you, venture forth into that vast gleaming Mecca of glass 
                and steel known cryptically as "The Mall" and have some REAL 
                FUN with senseless, random DESTRUCTION via ELECTRONIC 
                VOO-DOO!!!


                Thanks to: Haywire & the other members of the MIGHTY IRG!

 Special Thanks to: Randy Metler, wherever you are (prison, most likely), for
                the original inspiration for this idea.


7.52 The Art Of Suicide by Damaged Sectorz
------------------------------------------

<BoF>


                        <-+========================+->
                           :                      :
                           :  The Art Of Suicide  :
                           :        VoL 1         :
                           :                      :
                        <-+========================+->


                                 Puked Up By:
                                   Damaged
                                   2.28.91



 InTroductiOn 

  Ok well welcome to another G-Phile Phrom Me. whoaaaaa.  Anywayz today boys &
 Chicks we will be discuss'n the Many Phine Arts of Commit'n Suicide.  Yes you
 too can die in an artful manner that all Anrchists would be proud of.  Of
 course that's only if you can make the headlines and you only get one chance
 to do it.  So Be artful in your die'n way.  <fart> a smile comes my phace as
 i type this g-file.


 Basic Suicide Techniques 


  ! Usage of Sharp Objects !

   Well most people think that cut'n your wrists phrom left to right does the
  job.  In some cases it does if you bleed like water.  If not then do not
  attempt to do this then.  The proper way to slice'n is to take a razor blade
  , start'n at base of bottom of your arm at yer elbow.  Now go deep into the
  skin drag it slowly to the base of your hand.  Now if your the type that
  doesn't like pain, take some ice and freeze your arm Phor about 10 minutes.
  Now put your arm under some warm runn'n water to prevent clot'n.

   Ok now another one.  Take a razor blade and make incision at the base of
  yer neck.  You have to cut all the way through.  When you do this blood will
  phill up your lungs.  Thus cause'n you to drown on your own blood.

  ! Usage of Rope Bondage !

   Talk about Hang'n tough.  Obtain a good study rope.  If you the type that
  wants to get it done an over with.  just tie the rope around your neck real
  tight.  If you want to die by a hangman's noose, look at the diagram below
  to postion the rope correctly.
               _
              | |
              | |  _______ <--  Now take this end and wrap it around
              | | |             13 times.
              | |_|

   After you have phinished this.  Tighten it up by pull'n on of the ends.
  Welps you need a place to hang yourself Phrom.  Well you can go to your
  neighbor's yard and hang yerself Phrom his/her tree.  Or phind a bridge
  and try it phrom there.

     Quote "Death by no breath"

  ! OverDose'n & Poisons !

   Well this technique is one of the most popular ones around to do.  It's
  sometimes phast, enjoyable, or you won't even notice that you even died.
  Now you have some choices, what drug should be the proud winner to take
  your life?  Examine the List below.


  Sleep'n Pills - Take a whole bottle or two.  Cause'n you to phall asleep
                  and never wake up.  You can obtain this at any drug store.

  Cyanide - Well it will kill you in 3 seconds or less.  You have to look
            around Phor this one.

  House Hold Cleaners - Now you have to experiment with each one to see
                        what the effects are.  But some goodies are bleach,
                        amonia(so phuck'n what if it's misspelled).


  Fertilizer - go to a nature store of some sort.  just down some fertilizer.
               Now Phrom what i understand you can use Black Leaf 40 or 4.  Not
               sure but it kills very quickly.

  Other Drugs - Hell go to your mom's medicine cabinet and down whatever you
                can phind.

  Acid - Take about 40 or so blots and really massivly phry big time.  And
         they say die'n isn't really that colorful.

  Alcohol - Drink loads and loads of this shit and die Phrom Intoxication.


  ! Usage of Guns !

   Well this section is a real basic.  Just take da gun, put it to yer temple
  and BOOM.  Now all you brains slowly ozze out.  Now you can survive this
  sometimes.  So phor the most effective technique is to put the barrel on
  the back of your neck where your head and your neck meet.  Or if you want
  the phountain effect, stick the gun into your mouth.  Point the barrel
  upwards.

  ! Other Shit !

   Ok well some other shit is to Jump off a 40 story build'n.  You can also
  lay on some railroad tracks.  If you do this wear some earplugs so you don't
  hear the train come'n and totally surprises the hell outta ya.


 Introduction 2 

   huh? an introduction in the middle of a phile.  Yes so phuck'n what.  Now
  those last phew ways to die are really basic and BOR'N!!!  Hell if your
  going to die do it the stylish way.  Be creative, try to make the headlines,
  get national coverage and shit.  Cause great grief runn'n through your
  loves ones.  Hell record it too!! maybe they'll make a movie of it.  You
  never know until your try.  hell you'll never know.  here's a phew ideas
  i thought of.


 -Take an Axe and shove it through your phorehead and run into the live'n
  room.  Sit next to your mom and put your arm around her and watch tv.

 -Take the brake lights in your car and put the exposed wires into your gas
  tank. Now drive around Phor a while and slam on the brakes in a busy
  intersection.

 -Dose yerself in some gas.  Light yerself up and run down the street at
  Nighttime.

 -Jump off a phreeway pass into the rush hour traffic.

 -Drive your car into a gas tanker at about 90 miles an hour.

 -Phind some Dog, Horse or Cow shit.  you can phind this shit anywhere.
  Insert the shit into your mouth and inhale, do not swallow.

 -Slice your abdomenal area in to and I section.  How do you do this?  Well
  carve a really deep I into your belly start'n at the bottom of your rib
  cage and right Before where you might have pubic hair.  Carve a line up
  and down to connect the lines.  Peel back the skin and whoopie all yer guts
  Phall out onto the pavement.  This works real well in malls.

 -<yawn> Stick yer hands one a time into a garbage disposal.  Make sure the
  points are nice and sharp.

 -Shove a stick of dynamite up yer ass and light it.

 -Hell put a gun barrel up yer ass and phire it.

 -Ahh one of my favorties.  The old fashion Guiltine trick.  It's where the
  person's head is chopped off by a big ol' razor blade back in the old
  Phrench days.  Now this is the 90's, and this is more creative.  Go out and
  phind a car, could be yours, could be your neighbor's.  Jack up the car, now
  Take one of the phront tires off.  Tie a rope to the jack, so you can yank
  it and the car will phall.  Now put a brick or something to hold yer head up
  underneath the disc (where you taken the tire off).  now lay your head down
  and pull the son-ofa-bitch rope.  A little messy but who really cares. As
  long you get a nice phuneral where everyone wears black and should play
  Metallica "Fade to Black".

 -Take some Sleep'n Pills; Lots of them too.  Turn your oven on to Broil, and
  crawl inside of it and pass out.

 -Take a Broom Stick, sharpen one end of it to a real phine point.  Climb
  on top of yer house.  Stick the sharp end of the broom stick up yer ass and
  jump off the damn house.  Make sure you land on the broomstick Phor best
  results.

 -Snort or Drink Battery Acid.

 -Eat a lot of pinto beans and have the runs really bad.  Jump down after you
  beat yer pecker and stick yer head into the toliet bowl and drown.

 -Obtain a nail gun and shoot nails into your phorehead.

 -Ok make a noose as described earlier.  Now go to a 40 story build'n.  Take
  one end of the rope (not the noose) and tie it to a oak desk or something
  real heavy.  Slip on the noose onto your pecker real tight.  Jump outa the
  window.  You should phall and the your dick gets rip'd off.  And you go
  splat into the crowds below.


 Laturs 

  Well guys that all i have Phor right now, so go back and jerk yerselfs
 off to yer porno gifs or fli's.  No systems status this time, if your
 Elite you should be already on those systems.


 Laid-her

  Damaged
    IRG "SiCK" Member

 <EoF>
7.53 Hackin' InterNet by The Gatsby
-----------------------------------
 
$%&$%&$%&$%&$%&$%&$%&$%&$%&$%&$%&$%&$%&$%&$%&
                                                                           $
                                   A                                       %
                                                                           
                             Hacker's Guide                                #
                                                                           $
                                  to                                       %
                                                                           &
                                InterNet                                   
                                                                           #
                                                                           $
                              By: The Gatsby                               %
                                                                           &
$%&$%&$%&$%&$%&$%&$%&$%&$%&$%&$%&$%&$%&$%&$%&
                                                                           #
   This is written for IRG     Newsletter Number 7     6, 1991   3:25 am.  $
                                                                           &
$%&$%&$%&$%&$%&$%&$%&$%&$%&$%&$%&$%&$%&$%&$%&


Introduction
~~~~~~~~~~~
     Well, I was asked to write this file by Haywire (a.k.a. Insanity, sysop
f Insanity Lane), about InterNet. I have not seen any files written for the
ew comers to InterNet, so this will cover the basic commands, the use of
nterNet, and some tips for hacking through internet. This file will not
over hacking an account to get on internet. There is no MAGICAL way to
acking a UNIX system, i have found that brute force works best (Brute hacker
s something different). Hacking snow balls, once you get the feel of it, it
s all clock work from there. Well i hope you enjoy the file. If you have any
uestions i can be reached on a number of boards. This file was written for
ackers (like me) who do not go to school with a nice InterNet account, this
s purely written for hackers to move around effectively who are new to
nterNet. NOTE this is written for hackers who know basic UNIX commands.
The Crypt                   -  619/457+1836
est Coast Technologies     -  213/274+1333
nsanity Lane               -  619/591+4974
  and any other good board  across the country.....
Disclaimer
~~~~~~~~~

uck that damn thing !!

Glossary, Acronyms & Abbreviations
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

RPANET  -  defence_Advanced_Research_Project_Agency or ARPA. This is a
           experimental PSN, which is now dead.
ERT     -  Computer Emergency Response Team, they are responsible for
           coordinating many security incident response efforts. In other
           words, these are the guys you do not want to mess with. Because
           they are after YOU! They have real nice reports on "holes" in
           UNIX, which you should get.
DN      -  Defence Data Network
tp      -  File Transfer Protocol, this is used to copy files from
           one host to another.
QDN     -  Fully Qualified Domain Name, the complete hostname that
           reflects the domains of which the host is a part.
ateway  -  Computer that interconnects networks
ost     -  Computer that connected to a PSN.
ostname -  Name that officially identifies each computer attached
           internetwork.
nterNet -  The specific IP-base internetwork.
P       -  Internet Protocol which is the standard that allows dissimilar
           host to connect.
AN      -  Local Area Network
ILNET   -  DDN unclassified operational military network
IC      -  DDN Network Information Center
SN      -  Packet Switched Network
SS      -  Packet Switched Service
FC      -  Request For Comments, is technical files about InterNet protocols
           one can access these from anonymous ftp at NIC.DDN.MIL
AC      -  Terminal Access Controller; a computer that allow direct access
           to internet.
ELNET   -  Protocol for opening a transparent connection to a distant host.
ftp     -  Trivial File Transfer Protocol, one way to transfer data from one
           host to another.
NIX     -  This is copyrighted by AT$T, but i use it to cover all the look
           alike UNIX system, which you will run into more often.
AN      -  Wide Area Network

 In this text file i have used several special charters to signify certain
hing. Here is the key.

    margin. This is normally "how to do" or just "examples" of what to do
    when using InterNet.
  - This means these are commands, or something that must be typed in.

hat is The InterNet ?
~~~~~~~~~~~~~~~~~~~~~
     To understand The InterNet you must first know what it is. The InterNet
ne of a group of various networks, ARPANET (an experimental WAN, which is no
onger in existence) was the first. This "group" of networks came together
ecause of the expansion of LANs (Local Area Networks). LANs
haracteristically having gateways to other LANs, thus forcing a
nternational Protocol (x.75 in this case, but this is better know as IP or
nternet protocol) to be established. This would allow everyone to send data
o everyone. This group of WANs and LANs over time lead to the creation of
hat we now know today as InterNet.
   The Internet is really a PSN or packet switched network, but i would not
hink of it as one because a normal PSN (TymNet, TeleNet) all have the
rotocol of X.25, and internet is a protocol is a X.75 (though their are
ateways between the two).  The InterNet should be though of as a "umbrella"
etwork. This is composed of several large segments or subnetworks connected
ogether to form one interworking network.

Where can you access InterNet ?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   InterNet is most likely to be found on Local Area Networks or LANs and
ide Area networks or WANs. LANs are defined as networks permitting the
nterconnection and intercommunication of a group of computers, primarily for
he sharing of resources such as data storage device and printers. LANs cover
 short distance (less than a mile), almost always within a single building
omplex. Normally having gateways to InterNet, and in turn InterNet the back
one to the area network, but one could argue this point.
  WANs are networks which have been designed to carry data calls over long
istances (many hundreds of miles). Thus also being (for the same reasons
ANs are) linked into the mix mash of PSS.
  You can also access InterNet through TymNet via gateway. But i do not
appen to have the TymNet address now, just ask around.

AC
~~
    TAC is another way to access internet, but due to the length of this part i
ust made it another section.
  TAC (terminal access controller) is another way to access InterNet. This
s just dial-up terminal to a terminal access controller. You will need to
ack out a password and account. TAC has direct access to MILNET (a part of
nternet, one of the networks in the group that makes up internet).
A TAC dial up number is 18oo/368+2217 (this is just one, there are full
ists on any good text file board), and TAC information services from which
ou can try to social engineer a account (watch out their is a CERT report out
bout this, for more information the CERT reports are available at
28.237.253.5 anonymous ftp, more on that later), the number is 18oo/235+3155
nd 1415/859+3695. If you want the TAC manual you can write a letter to (be
ure an say you want the TAC user guide, 310-p70-74) :
       Defense Communications Agency
      Attn: Code BIAR
      Washington, DC 2o3o5-2ooo

To logon you will need a TAC Access Card, but your are a hacker, so I am not
ounting on this (if you can get a card, you would get it from the DDN NIC).
ere is a sample logon:
Use Control-Q for help...

 PVC-TAC 111: 01               \ TAC uses to this to identify itself
 #o 124.32.5.82               \ Use ``O'' for open and the internet
                                / address which yea want to call.

 TAC Userid: #THE.GATSBY
 Access Code: 10kgb0124
 Login OK
 TCP trying...Open



ood Luck you will need it....

Basic TELNET Commands
~~~~~~~~~~~~~~~~~~~~

     Ok, you now have a account on a UNIX system which is a host on
nterNet, you can not access the world. Once on the UNIX system you should
ee a prompt, which can look like a '


, '%' of the systems name (also
epending on what shell you are in, and the type of UNIX system). Now at the
rompt you can do all the normal UNIX accounts, but when on a InterNet host
ou can type 'telnet' which will bring you to the 'telnet' prompt.

 $ #telnet
 ^   ^
 |   |
 |  the command that will bring you to the telnet prompt
 |
 a normal UNIX prompt

nce this is done you should see this:

 telnet>

   At this prompt you will have a whole different set of commands which are
s follow (NOTE taken from UCSD, so this may vary from place to place).

 telnet> #help

 close           close current connection
 display         display operating parameters
 open            connect to a site
 quit            exit telnet
 send            transmit special character
 set             set operating parameters
 status          print status information
 toggle          toggle operating parameters
 ?               to see what you are looking at now

close      - this command is used to 'close' a connection, when multitasking
            or jumping between systems.
display    - this set the display setting, commands for this are as follow.
             ^E    echo.
            ^]    escape.
            ^H    erase.
            ^O    flushoutput.
            ^C    interrupt.
            ^U    kill.
            ^\    quit.
            ^D    eof.

open       - type 'open [host]' to connect to a system

 $ #telent ucsd.edu

     or

 telnet> #open 125.24.64.32.1#

quit       - to get out of telnet, and back to UNIX.
send       -  send files
set        -
            echo    - character to toggle local echoing on/off
            escape  - character to escape back to telnet command mode
                The following need 'localchars' to be toggled true
            erase         -  character to cause an Erase Character
            flushoutput   -  character to cause an Abort Oubput
            interrupt     -  character to cause an Interrupt Process
            kill          -  character to cause an Erase Line
            quit          -  character to cause a Break
            eof           -  character to cause an EOF
            ?             -  display help information

          -  to see the help screen


 ftp ANONYMOUS to a remote site
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

   ftp or file transfer protocol is used to copy file from a remote host to
the one that you are on. You can copy anything from some ones mail to the
passwd file. Though security has really clamped down on the passwd flaw, but it
will still work here and there (always worth a shot). More on this later, lets
get an idea what it is first.
    This could come in use full when you see a InterNet CuD site that accepts
a anonymous ftps, and you want to read the CuDs but do not feel like wasting
your time on boards d/ling them. The best way to start out is to ftp a
directory to see what you are getting (taking blind stabs is not worth a few
CuDs). This is done as follow:
(the CuD site is InterNet address 192.55.239.132, and my account name is gats)

 $ #ftp
 ^  ^
 |  |
 | ftp command
 |
UNIX prompt

 ftp> #open 192.55.239.132
 Connected to 192.55.239.132
 220 192.55.239.132 FTP Server (sometimes the date, etc)
 Name (192.55.239.132:gats): #anonymous
            ^         ^        ^
            |         |        |
            |         |       This is where you type 'anonymous' unless
            |         |     you have a account 192.55.239.132.
            |         |
            |        This is the name of my account or [from]
            |
           This is the InterNet address or [to]

 Password: #gats
            ^
            |
           For this just type your user name or anything you feel like
           typing in at that time.

 % ftp 192.55.239.132
 Connected to 192.55.239.132
 ftp> #ls
       ^
       |
      You are connected now, thus you can ls it.
     Just move around like you would in a normal unix system. Most of the
ommands still apply on this connection. Here is a example of me getting a
lectronic Frontier Foundation Vol 1.04 from InterNet address 192.55.239.132.

 % #ftp
 ftp> #open 128.135.12.60
 Trying 128.135.12.60...
 220 chsun1 FTP server (SunOS 4.1) ready.
 Name (128.135.12.60:gatsby): anonymous
 331 Guest login ok, send ident as password.
 Password: #gatsby
 230 Guest login ok, access restrictions apply.
 ftp> #ls
 200 PORT command successful.
 150 ASCII data connection for /bin/ls (132.239.13.10,4781) * (0 bytes).
 .hushlogin
 bin
 dev
 etc
 pub
 usr
 README
 226 ASCII Transfer complete.
 37 bytes received in 0.038 seconds (0.96 Kbytes/s)
 ftp>
     /
    \  this is where you can try to 'cd' the "etc" dir or just 'get'
    /  /etc/passwd, but grabbing the passwd file this way is a dieing art.
    \  But then again always worth a shot, may be you will get lucky.
    /

 200 PORT command successful.
 ftp> #ls
 ceremony
 cud
 dos
 eff
 incoming
 united
 unix
 vax
 226 ASCII Transfer complete.
 62 bytes received in 1.1 seconds (0.054 Kbytes/s)
 ftp> #cd eff
 250 CWD command successful.
 ftp> #ls
 200 PORT command successful.
 150 ASCII data connection for /bin/ls (132.239.13.10,4805) (0 bytes).
 Index
 eff.brief
 eff.info
 eff.paper
 eff1.00
 eff1.01
 eff1.02
 eff1.03
 eff1.04
 eff1.05
 realtime.1
 226 ASCII Transfer complete.
 105 bytes received in 1.8 seconds (0.057 Kbytes/s)
 ftp> #get
 (remote-file) #eff1.04
 (local-file) #eff1.04
 200 PORT command successful.
 150 Opening ASCII mode data connection for eff1.04 (909 bytes).
 226 Transfer complete.
 local: eff1.04 remote: eff1.04
 931 bytes received in 2.2 seconds (0.42 Kbytes/s)
 ftp> #close
 Bye...
 ftp> #quit
 %

    To read the file you can just 'get' the file and buff it! Now if the
iles are just too long you can 'xmodem' it off the host your on. Just type
xmodem' and that will make it much faster to get the files. Here is the set
p (stolen from ocf.berkeley.edu).
   If you want to:                                         type:
end a text file from an apple computer to the ME       xmodem ra <filename>
end a text file from a non-apple home computer         xmodem rt <filename>
end a non-text file from a home computer               xmodem rb <filename>
end a text file to an apple computer from the ME       xmodem sa <filename>
end a text file to a non-apple home computer           xmodem st <filename>
end a non-text file to a home computer                 xmodem sb <filename>

modem will then display:

 XMODEM Version 3.6 -- UNIX-Microcomputer Remote File Transfer Facility
 File filename Ready to (SEND/BATCH RECEIVE) in (binary/text/apple) mode
 Estimated File Size (file size)
 Estimated transmission time (time)
 Send several Control-X characters to cancel


ints - File transfer can be an iffy endeavor; one thing that can help is to
ell the annex box not to use flow control.  Before you do rlogin to an
E machine, type
 stty oflow none
stty iflow none
at the annex prompt.  This works best coming through 2-6092. Though i have
ot found this on too many UNIX systems with the xmodem command, but where it
s you can find me LeEcHiNg files.

ow to tftp the /etc/passwd File
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     Well there is a little trick that has been around a while. This trick it
he tftp (Trivial File Transfer Protocol, the command is not in caps, because
NIX is cap sensitive). This little trick will help you to "flip" the
etc/passwd file out of different sites. This can be real handy, you can have
he passwd file with out breaking into the system. Then just run Brute Hacker
the latest version) on the thing, thus you will save time, and energy.  This
hole' (NOTE the word 'hole' is not used in this case in the normal sense,
he normal sense it a way to obtain super user status once in UNIX) may be
ound on SunOS 3.X, but have been fixed in 4.0. Though i have found this hole
n several other system, such as System V, BSD and a few others.
     The only problem with this 'hole' is that the system manager will
ometimes know that you are doing this (that is if the manager know what the
ell he is doing). The problem occurs when attempts to tftp the /etc/passwd
s done too many times, you may see this (or something like this) when you
ogon on to your ? account. (This is what I buffed this off
lague.berkeley.edu, hmm i think they knew what i was doing <g>).

 DomainOS Release 10.3 (bsd4.3) Apollo DN3500 (host name):
         This account has been deactivated due to use in system cracking
 activities (specifically attempting to tftp /etc/passwd files from remote
 sites) and for having been used or broken in to from <where the calls are
 from>.  If the legitimate owner of the account wishes it reactivated,
 please mail to the staff for more information.

 - Staff

    Though, if this is not done too much it can be a use full tool in hacking
on InterNet. The tftp is used in this format is as follow:
 tftp -<command> <any name> <InterNet Address>  /etc/passwd  <netascii>
Command      -g   is to get the file, this will copy the file onto
                 your 'home' directory, thus you can do anything with
                 the file.
Any Name     If your going to copy it to your 'home' directory
            you may want to name anything that is not already
            used. I have found it best to name it 'a<and the internet
            address>' or the internet address name, so I know
            where is came from.
InterNet     This is the address that you want to snag the passwd file
  Address   from.  I will not include any for there are huge list that other
            hackers have scanned out, and I would be just copying their
            data.
/etc/passwd  This is the file that you want, isn't it ? I do not think you
            want John Jones mail. Well you could grab their mail, this
            would be one way to do it.
netascii     This how you want file transferred, you can also do it
            Image, but i have never done this. I just leave it blank, and it
            dose it for me.
         Welcome to the power of UNIX, it is multitasking, this little
            symbol place at the end will allow you to do other things (such
            as grab the passwd file from the UNIX that you are on).
    Here is the set up:We want to get the passwd file from sunshine.ucsd.edu.
he file is copying to your 'home' directory is going to be named
asunshine'.

 $ #tftp -g asunshine sunshine.ucsd.edu /etc/passwd &

Fingering
~~~~~~~~
  Fingering is a real good way to get account on remote sites. Typing 'who'
f just 'finger <CR>' you can have names to "finger". This will give you all
inds info. on the persons account, thus you will have a better chance of
racking that system. Here is a example of how to do it.


 % #who
 joeo                 ttyp0       Jun 10 21:50   (bmdlib.csm.edu)
 gatsby               ttyp1       Jun 10 22:25   (foobar.plague.mil)
 bbc                  crp00       Jun 10 11:57   (aogpat.cs.pitt.edu)
 liliya               display     Jun 10 19:40
 % #finger bbc
 Login name: bbc                     In real life: David Douglas Cornuelle
 Office: David D. Co
 Directory: //aogpat/users_local/bdc     Shell: /bin/csh
 On since Jun 10 11:57:46 on crp00 from aogpat   Phone 555-1212
 52 minutes Idle Time
 Plan: I am a dumb fool!!
 %

     From there i can just call 'aogpat.cs.pit.edu' and try to hack it out.
ry the last name as the password, the first name, middle name and try them
ll backwards (do i really need to explain it any more). The chances are real
ood that you WILL get in since you now have something to work with.
    If their are no users in line for you to type "who" you can just type
last" and all the user who logged on will come rolling out, and "finger"
hem.

ostname and Address
~~~~~~~~~~~~~~~~~~~
  This is for those of who like to know what they are doing, and when it
omes to address, you will know what you are looking at.

  Hostnames:
   InterNet address are long and hard to remember such as 128.128.57.83. If
ou had to remember all the hosts you are on you would need a really good
emory which most people (like me) do not have. So Being humans (thus lazy)
e came up with host names.
       All hosts registered on the InterNet must have names that reflect
hem domains under which they are registered. Such names are called Fully
ualified Domain Names (FQDNs). Ok, lets take apart a name, and see such
omains.
 lilac.berkeley.edu
  ^      ^      ^
  |      |      |
  |      |      |____  ``edu'' shows that this host is sponsored by a
  |      |               educational related organization. This is a
  |      |               top-level domain.
  |      |
  |      |___________   ``berkeley'' is the second-level domain, this
  |                       shows that it is an organization within UC
  |                       Berkeley.
  |
  |__________________   ``lilac'' is the third-level domain, this indicates
                          the local host name is 'lilac'.
   Here is a list of top-level domain you will run into.

     |~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
     |            Common Top-Level Domains                 |
     |                                                     |
     |   COM  -  commercial enterprise                     |
     |   EDU  -  educational institutions                  |
     |   GOV  -  non-military government agencies          |
     |   MIL  -  military (non-classified)                 |
     |   NET  -  networking entities                       |
     |   ORG  -  nonprofit intuitions                      |
     |                                                     |
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

     Addressing:
      A network address is that numeric address of a host, gateway or TAC.
he address was though of with us in mind, meaning it is easy to scan
wardial, wonder etc..). The address are maid up of four decimals numbered
lots, which are separated by the well know dot called a period. The think I
ill place at the end of this sentence. See it, it is four word over from the
ord four. Now that we have that down <Grin>, we can move on. There are three
lasses that are used most, these are Class A, Class B, and Class C. I know
his has nothing to do with you, but I feel you should know what they are...

  Class A  -  from '0'    to  '127'
  Class B  -  from '128'  to  '191'
  Class C  -  from '192'  to  '223'

lass A  -  Is for MILNET net hosts. The first part of the address has the
           network number. The second is for the their physical PSN port
           number, and the third is for the logical port number, since it is
           on MILNET it is a MILNET host. The fourth part is for which PSN
           is on. 29.34.0.9. '29' is the network it is on. '34'  means it is
           on port '34'. '9' is the PSN number.
Class B  -  This is for the InterNet hosts, the first two "clumps" are for
           the network portion. The second two are for the local port.
             128.28.82.1
              \_/   \_/
               |     |_____ Local portion of the address
               |
               |___________ Potation address.
Class C  -  The first three "clumps" is the network portion. And the last one
           is the local port.
            193.43.91.1
             ^  ^  ^ ^
              \_|_/  |_____ Local Portation Address
                |
                |__________ Network Portation Address

Tips and Hints
~~~~~~~~~~~~~
    When on a stolen account these are basic thing to do and not to to do.
                 -   Do not logon too late at night. All the manager has to
                    do is see when you logoned by typing "login". If it
                    sees 3 am to 5 am he is going to know that you were
                    in the system. I know, I love spending all night on a
                    account, but the best times are in the middle of the day
                    when the normal (the owner) would use the account. (NOTE
                    this is what they look for !)
                -   Do not leave files that were not there on *ANY*
                    directory, checks are sometimes made. This is on a
                    system security check list, which is normally done from
                    time to time.
                -   When hacking, do not try to hack a account more than
                    three times. It does show up on a logon file (when more
                    than three try are made on the same account !), and it
                    will also not let you logon on the account even if you
                    do get it right (NOTE this is not on all UNIX systems).
                -   DO NOT CHANGE THE PASSWORD, if the real owner wants on
                    he will have the account deleted. Well you could, but
                    it will not last long.
                -   Do not type in your handle ! you real name etc etc..
                -   DO send The Gatsby all the accounts you will get and
                    have.

$!$!$!$!$!$!$!$!$!$!$!$!$!$!$!$!$!$!$!

                         The Gatsby                                        #
                                                                           $
                          6, 1991-ish                                      !
                                                                           
    At this time i would like to thank Doctor Dissector !!! for getting    #
    me into InterNet in the first place.....                               $
                                                                           %
#$!$!!$!$!$!$!$!$!$!$!$!$!$!$!$!$!$!$!
  You can change the file name, you can u/l to the FBI, but do not change  #
                          the file it self !  T.G.                         !
$!$!$!$!$!$!$!$!$!$!$!$!$!$!$!$!$!$!$
/eof


7.60 Running The ShadowNet
--------------------------
        ShadowNet is kinda working but I was thinking of turning it into a
Virus Group or a kill group that works on Viruses and other such destructive
things.  Anyone who is good with Viruses out there please give my board a
call...


7.70 Hellos And Goodbyes
------------------------
        Hello everyone and goodbye everyone...

        In Mermorial:
                Damaged Sectorz
                Kryptic Night (or so I hear)
                The Inner Circle (again so I hear, but that was sooo long ago.)
                
        Big Brother is watching YOU
        Freedom of Speech is not a luxury!        
-------------------------------------------------------------------------------
This Is An Offical IRG/ShadowNet Production All Rights Resevered
Copy Write (C)   Feb. 2 1991
-------------------------------------------------------------------------------

[7] Tfiles: (1-7,?,Q) :