💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › PHRACK › PHRACK-5 captured on 2022-06-12 at 13:56:54.
-=-=-=-=-=-=-
==Phrack Inc.== Volume One, Issue Five, Phile #1 of 12 Intro to Phrack V! ~~~~~ ~~ ~~~~~~ ~~ 4/18/86 Welcome to Phrack Inc. Issue Five! Thanks to you, the readers, we have received a good following and will continue to pump out issues! Your support has been fantastic and I'm happy to say that more people out there that know their stuff are coming out of the woodwork and writing philes to be distributed with Phrack Inc. Recently, I received a letter from a law firm in New York complaining about the Master Lock Picking phile in Issue One of Phrack Inc. This was written by Ninja NYC and Gin Fizz, both of The Punk Mafia. It was a top class phile and it worked...but that was the problem. They wished me to do something about the material stated. Details of this story can be read in this edition of Phrack World News. Let me state here though, all philes that are distributed with Phrack Inc. are merely being transmitted, and we are not responsible for the philes' content any more than the readers are. The philes are the responsibility of the writers, and I'm not trying to lay the blame on Ninja NYC and Gin Fizz (see the letter I wrote to the firm stating my position here), but we will not be blamed for a crime that has not been committed. Look forward to many more issues of Phrack Inc. in the far future! TARAN KING Sysop of Metal Shop Private This issue contains the following philes: #1 Phrack V Intro by Taran King #2 Phrack Pro-Phile of Broadway Hacker by Taran King #3 Hacking Dec's by Carrier Culprit #4 Hand to Hand Combat by Bad Boy in Black #5 DMS-100 by Knight Lightning #6 Bolt Bombs by The Leftist #7 Wide Area Networks Part 1 by Jester Sluggo #8 Radio Hacking by The Seker #9 Mobile Telephone Communications by Phantom Phreaker #10-12 Phrack World News IV by Knight Lightning =============================================================================== ==Phrack Inc.== Volume One, Issue Five, Phile #2 of 12 ==Phrack Pro-Phile II== Written and Created by Taran King 4/5/86 Welcome to Phrack Pro-Phile II. Phrack Pro-Phile is created to bring info to you, the users, about old or highly important/controversial people. This month, I bring to you one of the most controversial users of our times and of days of old... Broadway Hacker ~~~~~~~~ ~~~~~~ Broadway Hacker is the sysop of The Radio Station, a phreak/hack bulletin board in Brooklyn, N.Y. (718). ------------------------------------------------------------------------------- Personal ~~~~~~~~ Handle: Broadway Hacker Call him: Mike Past handles: None (except his sysop handle, "The Program Director") Handle origin: Thought it up while on Compu-Serve Date of Birth: April 22, 1965 Age at current date: 20 years old Height: 6'2" Weight: About 150 lbs. Eye color: Green/Hazel Hair Color: Brown Computer: Commodore 64 with 3 disk drives and 300/1200 baud modem Sysop/Co-Sysop of: The Radio Station, The Night Stalker ------------------------------------------------------------------------------- Broadway Hacker started out in the BBS world in late 1983 when he first got his modem. On March 23, 1985, The Broadway Show, his first bulletin board, was launched into the BBS world. It started on 1 disk drive at 300 baud and has upgraded incredibly. It was originally a phreak board as it currently is also. He had originally gotten his C-64 computer in early 1985. Various members of the elite world including King Blotto, Lex Luthor, and Dr. Who got on his board to make it the memorable board that it was before the format change. His phreak experience began in 1981 through CB radios when a CB'er gave him a code over the line. Some of the memorable phreak boards he was on included Blottoland, The AT&T Phone Center of 312, and Dark Side of the Moon of 818. He gives credit for his phreak knowledge to conferences mostly. The Radio Mike works at a very large radio station. His phreaking is unknown at work. He's not particularly interested in programming beyond modifying The Radio Station. Broadway Hacker hasn't the time for hacking now. Broadway attends the Tap meetings in New York occasionally, but in the past he was a regular. He attended the 1986 TelePub meeting in New York which was to decide the fate of Tap magazine. Broadway has met various phreaks in person including BIOC Agent 003, Lex Luthor, Dr. Who, King Blotto, Cheshire Catalyst, The Sprinter, The Saint, Micro Ghoul, 2600 Magazine People, Paul Muad'Dib, and TUC. There were others, but he couldn't remember at 9:00 AM EST. He has made it a point to not become a member of groups, but he has been, in the past, invited to many. ------------------------------------------------------------------------------- Interests: Traveling, radio, telecommunications (modeming, phreaking), trashing, meeting other phreaks, BBS'ing, and running The Radio Station. Broadway Hacker's Favorite Things --------------------------------- Women: No names mentioned but yes... Cars: Fieros Foods: Ray's Pizza (West 11th and 6th Ave.), Steve's Ice Cream Music: Any top 40 groups in general. Most Memorable Experiences -------------------------- Getting almost kidnapped by a gay bellhop in Denver Getting stranded in California Some People to Mention ---------------------- Sigmund Fraud (an up-and-coming phreak who has learned a lot in a short time) ------------------------------------------------------------------------------- Broadway Hacker wishes you all to know that he does not conference at all any more because conferencing has depreciated from the old days and that they have become mostly a place to gather for gossip. ------------------------------------------------------------------------------- I hope you enjoyed this phile, look forward to more Phrack Pro-Philes coming in the near future. ...And now for the regularly taken poll from all interviewees. Of the general population of phreaks you have met, would you consider most phreaks, if any, to be computer geeks? For the most part, Broadway says, "No". Thanks for your time Mike. TARAN KING SYSOP OF METAL SHOP PRIVATE ==Phrack Inc.== Volume One, Issue Five, Phile #3 of 12 [/][/][/][/][/][/][/][/][/][/][/] [/] Hacking the Dec-10 system [/] [/] written by, [/] [/] Carrier Culprit [/] [/][/][/][/][/][/][/][/][/][/][/] Revised Edition.... Note: This file was distributed by accident, it was not finished. This is the new and revised edition. If you see my file distributed on some AE, BBS, Catfur, and it's not the revised edition please ask the sysop to delete it. Thank-you. ------------------------------------ Part I: Logging In, and simple cmds. ------------------------------------ Note:Sysop's may download this file but please keep the appropriate credits. Welcome to Hacking Dec 10's! There is one way to recognize a Dec-10, you will get the "." prompt. First there will be a little login message, sort of like a login on a BBS. For example- NIH Timesharing NIH Tri-SMP 7.02-FF 19:57:11 TTY12 system 1378/1381/1453 Connected to Node Happy(40) Line # 13 Please LOGIN . Now, you've gotten so far that you have found a Dec (Digital Equipment Corp), you will need to know the format of the login. [Login format] The users have numbers called PPN's which stands for "Project/Program Number". The format of a PPN number is [X,X]. The first number is the the Project number and the second is the Program Number. ie- .Log 12,34 Job 64 NIH 7.01 KL 64-UC TTY12 Password: The password can range from 1-8 characters long, it may contain numbers, initials, or something of the sort. Try and think, if I were a user what would my password be. I doubt that method would work but it's worth a try. Now say this is your very first time on a Dec 10 system. Now if you want to see some information about the system and some commands you may want to type- .Help This will tell a little more about the system you are on. It will tell you how to get information on a specific topic. It may also give you the number to their voice dial-up just in case your having trouble. Now the dial-up (voice) may help you if your good in BS'ing. Usually the Help command will tell you to consult your 'Dec 10-system guide' for more information. Now say you want a list of commands to execute. You can type- .Help * You will then get the following commands- Which are too many to type in but you will recognize them when you type Help *. Now after it shows all the commands it will then tell you how to login. It will not give you a demo account, but will give you an example login. It will say something like, "The Login command is used for accessing the Decsystem-10 timesharing system." To login please enter your project,programmer number pair. LOGIN XXX,XXXX The system will prompt you for your password. If your PPN or password is wrong you will then be prompted with a message that says- Enter Project,programmer #xxx,xxxx Password: End of that. Now, there are some other useful commands you may enter while still *not* having a account. You can access Decnet which I will discuss later which is very nice to a hacker. Now, there is also a command you can execute called "Help Phone". What this does is, it lists the numbers of different Dec related staffs. etc.... Example- .Help Phone DCRT/CCB/DECsystem-10 Information Phone numbers (4/86) Recorded message Dial xxx-xxxx Dec-10 operator Dial xxx-xxxx Dec-10 staff Dial xxx-xxxx Terminal Repairs Dial xxx-xxxx Classes/Courses Dial xxx-xxxx Users Area Phone Dial xxx-xxxx Project Control Office Dial xxx-xxxx NOTE:This is the same area code as the Decsystem. Now the two numbers which would be the most important to you would be the number of the Dec10 operator and the Dec10 staff. Now the most important command which can be executed on the Dec10 which is good to use is "Systat"; this will list PPN's, time, running job, time elapsed. Once you get that PPN you can start hacking away. Using systat is the simplest and easiest way to get PPN's. It will just be easier to type "SY" instead of "Systat", they are both the same thing except sy is the abbreviation. Now here's a little example of what you would get by executing the "sy" command. .SY Status of Brown University 603A at 11:52:33 on 29-Jan-86 Uptime 187:12:22, 80%Null time = 80%idle + 0%Lost 7 Jobs in use out of 128. 19 logged in 4 detached out of 89 (LOGMAX) Job Who What Run Time 1 [OPR] OPSER 3:22 2 [OPR] DIALOG 1:29 3 [OPR] BATCON 4:01 4 [OPR] SYSINF 51:13 01 5 24,2 SYSTAT 4:52 6 2332,21 DIRECT 2:22 7 32,22 SYSTAT 8:19 There will also be more stuff along with the above. Now you shouldn't concern yourself with it, that's why I didn't add in. Now also there will be more sub-headings than run time, who, what, and job. You also shouldn't concern yourself with that either. Now everything is really self explanatory which is up there. Now for beginners who are reading this file I will just tell you what that means Job is no concern. Who is telling you what kind of person is on the system. [OPR] means Operator, and the numbers such as, 24,2 are referring to regular users with PPN's. Now the next column which is "What". This is telling us what they are executing or what they are presently doing on the system. Run time is telling us what time they logged in. They are using military time. Now under systat you can find: System File Structures, Busy devices, Height segments, and Disk Structure. Don't worry about that stuff now. Now you've finally got yourself some PPN's, well the next thing to do is to login using the procedure I showed you with Log. Enter the PPN xx,xx, and try to hack out some passwords. I will now give you a list of passwords which I have currently used to get into a Dec10. If these passwords don't work well I am sorry you'll just have to try some yourself. Note: You can also make a little program having it testing out different PPN's and Passwords. List of Passwords-- ------------------------------------- Sex Dec Decnet Games Test Dcl System Computer Password Help Link List Secret Default Modem Account Terminal Acsnet Ppn Operator Connect ------------------------------------- There are many more passwords people use but I just put some common ones. You can also try random passwords like, AA, AAB, AB, CC, etc.. Now that is it on logging in. I spent a little too much time on this but since this will be a two part file, I will discuss more commands that I don't get around to discuss in here in part II. Now this file is intended for the beginner so you experienced Dec hackers are bored now or will get bored later. Note: If connected to Acsnet, just type AcsDec10 to access the Dec. Everything else that I mentioned in the login will work. [In the system] Now will assume you've finally gotten into the system after hacking your brains out. Now, this is how you will know you are in the system. Example- .Login 21,34 Password: Note: You usually get two tries to enter PPN and Password. The Dec will introduce itself, saying when the last time you were on, etc. Also if you may do something like this to log-on. .Log 12,34 JOB 51 NIH 7.01 KL 64-UC TT12 Password:[c/r] Other jobs detached with same PPN: Job 34 running SYSTAT in ^C state Do you want to ATTACH to this job? yes Attaching to job 34 Now, what you are doing is attaching to an idle PPN. See, while someone else is on the system, about 10 minutes <max=15 mins> before you, they can input a command that will allow them to logoff and he can attach back to that PPN when he logs back on. That person will then be put to the place where he logged off at. If I were using 'sys', and I logged off. I would use the command 'detach'. Now the person would have 15 minutes to call back and attach to his PPN. There's one other way to attach to an account. If the person doesn't type something for awhile he will automatically be logged off and if you call within 15 minutes you may be able to attach to his PPN. Note: You may still have to login. Ok, we are now in the system after it has verified itself. What do we do? Well first let's take another look at the "systat". We notice there is one other person logged in. But we see he is in "exe", this means he is doing nothing or he's detached. In other words, don't worry about it. Now if we wanted to change our password, we would type- /Password After we do this, the system will ask us for our old password and our new password, but we should leave the password the way it is so we won't be discovered. But it's a good thing to know. Now we can take a look at other users files. We can do this by typing- Dir [*,*]