💾 Archived View for gemini.spam.works › mirrors › textfiles › phreak › outlaw.txt captured on 2023-01-29 at 10:41:48.

View Raw

More Information

⬅️ Previous capture (2020-10-31)

-=-=-=-=-=-=-










            *****   *    * ******* *       *****   *           * 
           *     *  *    *    *    *      *     *   *         *     
           *     *  *    *    *    *      *     *    *       * 
           *     *  *    *    *    *      *     *     *  *  *  
           *     *  *    *    *    *      *******     *  *  *     
            *****    ****     *    ****** *     *      *   *  



                             A USER'S MANUAL
                           IMPORTED BY CRIMINAL 
                  
                       -----  NO COPYRIGHTS -----
             -------  EXCLUSIVE SPREADING RIGHTS SCC -------

       (MESSAGE TO HARMAN KARDON: HAVING PROBLEM WITH YOUR STEREO?)
 







      CONTENS:     HOW TO STEAL CARS BY YARDLEY FLOURIDE.
   
                   CREDIT FRAUD BY SNEAK THIEF.
 
                   ASSORTED EXPOSIVES INFORMATION BY UNKNOWN.
  
                   PYROMANIAC BY GREY WOLF.

                   SMALL GRENADE BY SS-BADMAN.
  
                   WATS EXTENDERS BY UNKNOWN.

                   HACKING: BASICS.
          
                            UNIX & VAX.
 
                            DATA.


 

XxXxXxxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxX
X                                                                  X
X                xXxXx HOW TO STEAL CARS #1 xXxXx                  X
X                                                                  X
X                                                                  X
X                  written by Yardley Flouride                     X
X                                                                  X
X                         presented by                             X
X                                                                  X
X                   xxx the xORGanization xxx                      X
X                      (fraud/hack/thieve)                         X
X                            2/13/89                               X
X                                                                  X
X                                                                  X
XxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXx


FOREWORD:

     This is the first file I've written under the xORGanization
     and under the handle Yardley Flouride.  Maybe you've read
     some of my files under the name Dial Tone with Black September
     and cDc communications.  From now own I will write under
     the new handle and for xORG and cDc.  The xORG is the newest
     hack/fraud/thieve group around and most of my fraud ideas
     will be directed to that group.  My more fun files (i.e.
     "Fun With Traffic Lights") will be with cDc.  Just to clear
     that up.

xXxXxxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXx

     this file is part 1 of 2.  part 1 is the basic breaking into
     cars or being devious to gain access to the car.  part 2 will
     be the hot wiring of a car if you're in it already.  i know
     there's already been files like that but this will go beyond
     the others.  i don't feel like typing all that right now though.

xXxXxxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXx

                       No transportation!

I know, I know.  Looking for a great time and what?  No wheels!  
I hate when that happens.  Well, if you've read the file on casing
by Elijah Bonecrusher and L.E. Pirate you're one step ahead.  With 
the art of casing comes the art of getting the rest of the car.  
Ok, you need a car to get you to where you have to go and for no 
other reasons.


7-11's are convenient for more than slurpees you know!
I was hanging out in front of 7-11 and it smacked me right in the 
face how many people leave their car on when running into 7-11.  
In a half hour I counted over 7 cars that people left unattended 
to run in.  In this one incident, myself and Elijah were out front 
of one and this dude went in and left his piece of shit Duster 
waiting for us to take.  Just hide around the sides of the stores 
and get the ones near the sides of the building.  Elijah during the 
summer at the shore got a government vehicle.  Pretty cool, eh?

Don't dress like a god damn thief.  Most fake "anarchist"
faggot asswipe computer nerds would wear all black and a ski mask.  
No no no. Dress like a prep or some way you never dress.  Beat up 
someone for their rags and wear them.  And act like you're having 
fun hanging out at 7-11, drink a slurpee or something.  Don't just 
sit there sticking your head around the corner of the building going, 
"how's that car!?", "let's get the porsche!", etc.  Of course when 
all the people went into the store and left their cars on it was in 
the winter, it was cold as balls out.  Who knows, if you find a good 
car take it to some remote spot and dump it.  Rip everything out of 
it and take anything that looks over $5.  This is all I have to say 
for "Stealing Cars Part I".  Support the scene.  Amen.




          =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
         |                                            |  
         | Volume I of The Adventures in Fraud Series |
         |             The Bible of Fraud             |
         |                     By:                    |
         |                 Sneak Thief                |
         |           Smog City..213-926-7720          |
         |            Thanx to: The Raider            |
         |     Copyright, (C) 1985 by Sneak Thief     |
         |                                            |
          \=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=/


Introduction
============

You ever wonder where that unemployed guy down the street got
enough cash to start a 1200 baud board with 60 megs?  Well, the
answer, most likely, is Credit Fraud.

Credit fraud involves getting a credit card number (a CC #), and
then ordering things by phone.  All you need is the card number
and the experation date.  And a few other nasties...

Well, forget this basic stuff!  Let's get into the good parts....

Getting Your Card
===================

Always been meticulous about your appearence?  Don't like to be
dirty?  Then the primary method of getting credit cards is not
going to appeal to you.

When a customer buys something at a store or restaurant (with a
credit card, of course), several carbons are made.  The store
puts these into their files, and throws them away a week or so
later.

What's that?  You say, "Why don't I go to the trash, and get
these carbons?", do you? Well, you're correct; this is exactly
what you do.  Here are some tips:

1) Go on the First of the month.  (In a lot of stores, this is
   the 'clear the files day'.

2) Go to the mall.  That way, if one trash can is empty, you
   have a hundred or so more.

3) Stay away from food stores.  Sticking you're hand into last
   week's fried chicken is a price too high for a lousy credit
   card.

4) For convienence, look for florists, video stores and the like.
   Video stores especially, since >every< transaction they make
   involves a credit card.

Ok, that is just one of the ways which you can get you're card
here are the other primary methods:

CBI/TRW
=======

CBI and TRW are Credit services which have Credit Cards,
Addresses, names, and driver's licenses for most of the
population of the United States.  You can also use this system to
find out the credit card mend calling through a PBX, then XXXXX (insert you're
favorite phone service here).

Leeching
========

You could also get them off the credit fraud board on you're
local elite BBS.  Not a good idea, since most cards up there have
about 1,000 dollars worth of porno tapes on them.

Better yet, you can ask a friend.  This will probaly work, but
sometimes people give a card that they have used, or used but
messed up with.  Oh, the death of friendship!

Ok, you've got your card?  Good.

Ordering
========

You've got to order your merchandise.  To do this, call the
orderline for the company, and talk to these people.  If you're
known as "The Human Carrier" by you're friends, or modems connect
when you say "Hello", then forget it.  These days they are
getting mighty suspicous.

They will ask you what card you want to use.  Master Cards have a
5 as the first digit of the first cluster, Visas have a 4.

If ice--very
softly.  Just say, "I'm sorry...  I have this awful sore
throat..."

The first rule is be polite.  Don't sound nervous.  If the lady
asks you for the driver's license, and you don't have it, make
one up, then before you hang up, say "I'm sorry, I'm going to
have to cancel this order...my husband told me that he had
already gotten the XXXXX (the item you were trying to order)"
Try to order from a pay phone, and when they ask for a phone
number, give them the pay phone's number.  Or scan for a number
that will ring, and ring...  A board that is down is a good bet.

Now, you may ask, what address do I give the salesman?

The Address
===========

The pick up is one of the most crucial part of the entire part.
Here is what I think the ultimate address should be:

1) Abandoned.

2) Isolated (No little old ladies calling the police or spraying
   you with hoses).

3) About a mile or so away from your house.

Number one could also have a friend of yours who will sign for
the package, then when the feds come deny it ever arrived.  This
is unlikely.

Number two is obvious.  I have been yelled at by numerous old
people, and people that don't speak English.  Not fun.

The mile away from you're house is obvious.  Don't want people
that know you to be witnesses.

Also, you can order to an occupied house.  Send them a note by
mail, telling them about a "computer glitch that sent some of
our mechandise to you're address, and we will send a sales
representative (or his son) to come pick it up."  Spice this up,
by apologizing for any hassles, and giving a fake name for the
"sales represenative".  Then, when you go, just give them a
little note authorizing you to be there with an impressive
signature.

When you pick up the package, be calm.  Talk to the people no
longer than necessary, but don't run away or anything.  Wear a
hat, but don't wear a ski mask and sunglasses.  Look normal, yet
try and conceal as much of you're looks as possible.

If you do this right,  you will look like a normal person, and
the people will forget about  you in the month or so it takes the
credit agency to do anything about the fraud.

Advanced Fraud
==============

To order more advanced, (ie: from Northwestern, or things that
cost alot of money), you will need the following (usually):

      The Driver's License Number
      The Bank or Interbank Number (For MasterCard)
      The Billing Addresss

Sometimes this will be written on the carbon.  But the best way
is just to use TRW...if you have a password for it.

Miscellanous
============

Reading an issue of U.S News and World Report (June 3, 1985)
yesterday, I found an article on Phreaking, Fraud, and BBS's.
Very interesting.

Said something about mailboxing, which is going through a company
mailbox looking for let's say bills and the like which would
have a credit number on it.  Sounds interesting.  Go on a
Saturday, and look in the mailboxes.  The last few days of a
month would be a good idea, since maybe you could get lucky and
snipe their Visa statement.  That just goes to show that reading >some<
value.

Look for cards like this one:

     5024 0000 6184 3847

The second cluster means it's a "preferred" card, and you can
order more stuff with it.  Some cards only have 13 digits (i.e:
5024 000 618 787).

If you think you have ordered the limit of you're card, verify
it.  You do this by calling a dial up (usually  800), giving them
a merchant number, the card number, the name on the card, the
expiration date, and the amount to be spent.   They will tell you
it the card has enough money for the purchase.  Get a dial up and
merchant number by going to the Department Store.  They are
usually written on the phones.

For MasterCard, the Interbank number isRyight below the na}~sn
the carbon.  Nisa cards contain a bank number in one of the
clusters.

Don't order from Northwestern.  There prices are not worth all of
the questions you have to answer.

Order from Conroy-LaPointe at 800/547-1289, they are quite
easy.

Conclusion
==========

There are no old carders.  You quit, or you get caught.  Plan
what you want to get, and don't try and rush your frauds.

The first rule of fraud is, "Greed Kills."  I think being
arrested by the feds and having to face my parents and lose my
computer about the same as death.  But what is life without a
little risk?

Try to sell most of the things you card.  If there is no stolen
(carded) stuff in you're house, they might go easier on you.

By the way, I am in no way responsible for any use made of
the information in this file.  It is for informational purposes
only.  And if you believe that, please leave me mail on Smog
City about a business opportunity.  I have this bridge...


        June 6, 1985 - Sneak Thief of the Smog City Crew

                             The End



         Common Rocket Fuel
         ------------------
  Materials:

1.) Potassium Nitrate (KNO3) or
 "Saltpeter". This can be obtained
 from a drugstore, or ordered from
  a chemical supply house.

2.) Sugar (Powdered is the best)

   Procedure:

1.) Mix the two together 1/2 Nitrate
    and 1/2 Sugar.

2.) Take an old cooking pan, and
    melt the two together. There
    is NO way for it to ignite.

3.) It should turn into a fudgey
    looking compound. Pour this
    compound into a rocket engine
    such as a cardboard tube, and
    set a fuse into the compound
    and let the compound harden.

         Chlorate Mixtures
         -----------------

NOTE: The main ingredient for this
      experiment is potassium or
      sodium chlorate.  Both of these
      will do equally well.  However,
      both may prove difficult to
      find.  Probably the only way to
      get it would be to order it
      through a chemical supply house.

Materials:
----------

1) Potassium chlorate or sodium
   chlorate.

2) Powdered charcoal

3) Powdered aluminum

4) Sulfur

Procedure:
----------

NOTE:  There is no set procedure for
       making chlorate mixtures.
       The only special thing ABOUT
       chlorate mixtures is that
       they have a chlorate in them.
       Experiment with diffiernt
       proportions of each of the
       ingredients. All of the
       chlorate mixtures I made had
       no set procedure and I just
       experimented with the
       proportions of each of the
       ingredients. Most of your
       mixture, however, should be
       potassium chlorate or sodium
       chlorate.

1)  Make sure that you mix the
    sulfur and charcoal and aluminum
    first.  You may grind  these in
    a mortar and pestal to get a good
    mix of these ingredients.

2)  Add potassium chlorate or sodium
   chlorate.  Mix them VERY CAREFULLY
    in the mortar and pestal.  DO NOT
    GRIND the mixture once the
    chlorate has been added or it will
    ignite and burn the shit out of
    you.

3)  You now may use the mixture for
    whatever you want to.  Chlorate
    mixtures are some of the best
    compositions there are and, in
    my experiences, they are the best
    except for model  rocket
    propellant (procedure for making
    this is given later).

        > Green Goddess <
          -------------
Materials
---------

1.) Zinc (Zn) <---NOTE: This is not the
                        same as Zinc
                        Oxide!
2.) Sulfur (S)

Procedure
---------

1.) Mix the two together 1/2 and 1/2.

2.) MAKE SURE that you mix them very
    well. The best way to do so, is to
    put the mixture in a jar with a lid
    and shake it up for 15-60 seconds,
    until it is all a greyish color.

3.) To ignite, use a fuse, or throw a
    match into the powder. WARNING,
    this burns very very quickly, and
    produces smoke. Also it burns at
    a fairly high temperature. It will
    surprise you when you throw a match
    into it. There will be a delay, and
    then all of a sudden, it will flash
    up, and is capable of burning the
    hell out of you.
=======================================
Common Uses
-----------
1.) Rocket Fuel
2.) Bombs <--- NOTE: The best way to do
                     this is to take
                     it and compress
                     it into cardboard
                     tubing.
3.) Smoke bombs (Cardboard tube w/ big
                 hole.)
4.) Flare bombs.
5.) The rest is up to your imagination

          GOOD LUCK!
=============================


    _________________________________
   [                                 ]
   [       THE FIRST BOOK OF         ] 
   [          PYROMANIACS            ]
   [                                 ]
   [    BY: GREY WOLF                ]
   [         <THE COMMANDERS>        ]
   [_________________________________]


    P.S.  DON'T KILL YOURSELF...

.......................................

     ->UNSTABLE EXPLOSIVE<-
       ^^^^^^^^ ^^^^^^^^^


1)  MIX SOLID NITRIC IODINE WITH
    HOUSEHOLD AMMONIA

2)  WAIT OVERNIGHT

3)  POUR OFF THE LIQUID

4)  DRY MUD ON BOTTOM TO HARD (LIKE
    CONCRETE)

5)  THROW SOMETHING AT IT!




            ->SMOKE BOMBS<-
              ^^^^^ ^^^^^


1)  MIX:     3 PARTS SUGAR
          ----------------------
           6 PARTS EPSON SALTS

2)  PUT IN TINCAN, ONTO LOW FLAME
    (LIKE A LIGHTER)    ---

3)  LET GEL & HARDEN

4)  PUT A MATCH IN AS A FUSE.

5)  LIGHT IT & RUN LIKE HELL 'CAUSE
    4 POUNDS WILL FILL A CITY BLOCK...


          ->MEDIUM EXPLOSIVE<-
            ^^^^^^ ^^^^^^^^^

1)  MIX:  7 PARTS POTASIUM CHLORATE
         ---------------------------
             1 PART VASELINE

2)  TO IGNITE, USE AN ELECTRIC CHARGE
    OR A FUSE.



           ->CAR BOMB<-
             ^^^ ^^^^

1)  PUT LIQUID DRAINO INTO A PILL BOX
    (THE KIND YOU GET WHEN YOU'RE ON
    A PERSCRIPTION, NOTHING ELSE WILL
    WORK)

2)  CLOSE THE LID & POP THE THING INTO
    THE GAS TANK

3)  WAIT 5 MIN.

4)  RUN


         ->PLASTIC EXPLOSIVES<-
           ^^^^^^^ ^^^^^^^^^^

1)  MIX:   2 PARTS VASELINE
          ------------------
           1 PART GASOLINE

2)  IGNITE WITH AN ELECTRIC
    CHARGE.



|))(||)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)((|)(
|                         Small Grenade                             |
|                                                      \ | /        |
|                        By:  SS-Badman                 \|/         |
|(|---[*]---|)                                (|---  - - *- -  ---|)|
|                      Kingdom of the Dead II           /|\         |
|                          509-927-9120                / | \        |
|             1200/2400 - 5 drives - 20 megs..soon!                 |
|                    Sysop:  Angel of Death                         |
||)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(|)(||)(|

             
Hardware:                                                           
1 Nut (any size, as long as bolts fit), the wider the better                  
2 Bolts (to fit nut)                                                         
             
Chemicals Phosphorus (the odd colored tips of strike on anything 
matches work well).


1>  Take 1 bolt and the nut, screw in the bolt until it is just in the
nut, try and make sure there is no area for air to escape.  This is 
where a perfectly matched nut and bolt are nice.  

                  bolt              nut
                     \ ||______[  ] /
                      \||______[  ]/
                       ||      [  ]
                       
                   
2>  Put as much phosphorus as possible in the nut.            

                       ||______[**]
                       ||______[**]    * = phosphorus
                       ||      [**]   


3>  Screw the 2ed bolt into the open end, simply crush the phosphorus 
when inserting it.  But be carefull, we wouldn't want to ignite it!

                       ||______[**]______||
                       ||______[**]______||
                       ||      [**]      ||

Once both ends are nice and snug, it is ready.  You now have a small 
grenade. They can be made in various sizes.  Easily stored in the 
clove box of your car, or in a school locker.  The possibile uses 
are endless.             

It can be thrown or dropped onto any hard surface to ignite the 
phosphorus.  The gases formed from the combustion will force one 
or both of the bolts out of the nut.  The distace the bolt(s) travel, 
and its volocity, depend on the amount of phosphorus used.  

Of course the larger the nut and bolt, the more explosive needed to 
force them out effectivly.  It works on the same principal as the 
bullet being forced out of the gun barrel, except that the direction 
in which the bolts fly is never known, so watch yourself.

I haven't expiramented, but I'm sure that just about any, dry, shock 
sensitive chemical can be used in place of the phosphorus.  The head 
of each bolt can be sharpened to a point for more effectiveness as 
well.  Of course there are many variations to this design, I have 
seen special nuts that are quite wide, allowing the use of more 
explosive.  Look in the section of your hardware store where small 
(or large) plumbing pipe is sold.  There are pieces that have threads 
on each end to screw somthing on, but now we are talking about 
something that more resembles a pipe bomb than a devise which only 
causes a tiny disturbance (but is still dangerous).

This file was written for informational purposes only, the author 
takes no responsibility for the use, or the consequences of the use, 
of the information.
                             


                       WATS EXTENDERS

Many people think of phone phreaks as slime, out to rip off Bell 
for all she is worth.  Nothing could be further from the truth!  

Granted, there are some who get there kicks just by making free calls, 
however they are not true phone phreaks.  Real phone phreaks are 
"telecommunications hobbyists" who experiment, play with and learn 
from the phone system.  Occasionally this experimenting, and a need 
to communicate with other phreaks (without going broke), leads to 
free calls.  The free calls are but a small subset of a TRUE phone 
phreaks activities.
        
Until several years ago, the phreaks main tool for free calls was the
Blue Box.  In recent years however, Bell has made GREAT strides in 
their security and detection of Blue Box's.  While box's still work, 
their use is becoming EXTREMELY dangerous.  With the advent of CCIS, 
the places where a Blue Box will work are rapidly decreasing, and 
within several years the Box will be totallt obsolete.

Thus for their communications needs, phreaks have turned to other
methods, one being: WATS EXTENDERS.

Many companies throughout the United States have a salesman in the
field that must contact a large amount of customers long distance 
by phone. To pay for these calls, generally the salesman use the 
companies Bell credit card (Now called a "Calling Card") this is 
quite expensive to the company. Several years ago, someone came up 
with a neat money saving idea. Since the company already had an an 
INWATS (800) number for salesmen to call in orders to the main plant, 
and since the company had a flat rate OUTWATS line to call customers 
during the day.
  
Why not couple them together after hours so that the salesman calls 
the companies INWATS 800 number, then gets connected up to OUTWATS.  
This would mean he could call anywhere in the United States. from
anywhere at no charge to him!  This arrangement would save the company
tremendous amounts of long distance charges since they had the WATS 
lines anyway, and the WATS was a lot more cost efficient than Credit 
Cards.
        
This arrangement was exactly how early "WATS EXTENDERS" worked.
During WATS (800) scanning (For how to do this, read "Napolean 
Solo's" EXCELLENT article in issue 55) phreaks discovered these 
WATS EXTENDERS, and found they could call anywhere in the country 
just by calling the extenders 800 number, then (Using Touch Tone of 
course) dial the number they wanted. The companies soon realized 
that their extenders were being messed with and decided to add some 
security to prevent tampering. It was set up so that when a salesman 
dialed the WATS EXTENDER, he would hear what sounds like a dial tone.  
The salesman then keyed in a four digit Touch Tone secret access 
code.  If the code was incorrect a high-low tone would result, and 
the extender would have to be re-dialed.  If the code was correct, 
and second internal PBX dial tone would result.  The salesman would
then access the companies OUTWATS line by hitting 8 or 9 (usually)
and dial wherever he wanted.
        
The four digit access code posed a problem to phreaks since only 1 
out of 9999 possible codes worked, and the 800 number had to be 
re-dialed each timeand try another.
        

Many a phone phreak spent long nights breaking the four digit codes 
and then using the extenders themselves!  Most companies change 
the code every few months so the phreaks would have to start over 
again.  (Also company employees that were not authorized to know, 
but found out from "leaks"). Many of you have probably heard of the 
infamous computer "Charlie". For those who haven't, several years 
ago Charlie was brought to life by Capn Crunce (Now retired from 
the communications service) Charlie was an Apple ][ computer with a 
special board which allowed it to Touch Tone dial numbers extremely 
rapidly (D/A) then "listen" to the results (A/D).
        
Charlie was put to use calling a given WATS EXTENDER, trying an access
code, if the high-low tone was heard (meaning an incorrect code), 
Charlie hung up and dialed again, trying the next sequential code.  
Charlie would sit working for hours, and when it found the code, 
it would print it on it's display screen.  VERY effective!

Unfortunately the only problem with Charlie was the he was very
noticeable to Bell.  Every time an 800 number is dialed, and 
AMA record is punched at the C.O. thus it looks real phunny to Bell 
to see that you have called Dry Dock orange shippers 800 number 
in Florida 3,750 times at 2:00 AM with each call lasting 1 second!  
Since Charlie was not very easily portable to pay phones this was 
a real problem. There are many WATS EXTENDERS reportedly presently 
in service.  Most working as described, with some taking more than 
a four digit code, and some even responding to voice input!

It should be pointed out however, that should any of you crack any 
WATS EXTENDER access codes and attempt to use them, you are gulity 
of Theft of communications services from the company who owns it, 
and Bell is very willing and able to help nail you!  WATS EXTENDERS 
can get you in every bit as much trouble as a Blue Box should you 
be caught.
        
Most WATS EXTENDERS also record all numbers call from them on OUTWATS.
If the company detects the extender being mis-used, they will usually 
first try to change the access code.  If the abuse continues and the 
get mad enough they will contact Bell who will help them investigate 
all the numbers you called!

Thus, as in most things those of you who are determined to play with
WATS EXTENDERS, do so from a pay phone and only to institutional 
switchboards, or people with short memories.  By the way, on some 
"Money First" payphones (as as opposed to "Dial Tone First") the 
Touch Tone pad is cut off after the WATS call is complete. (Because 
of polarity reversal)  It can be re-activated by depositing a dime 
after the connection is made, which you will get back after
you hang up.

Also please remember the opening of this article.  DO NOT use WATS
EXTENDERS just to make free calls all the time!  Experiment with them 
and learn what they can do and how they work.  I think you will 
learn a lot!!




                     *************************** 
                     *                         *
                     *   Basics of Hacking I:  *
                     *                         *
                     ***************************


Welcome to basics of hacking i: dec's in this article you will learn 
how to log in to dec's, logging out, and all the fun stuff to do 
in-between. All of this information is based on a standard dec system.  
Since there are dec systems 10 and 20, and we favor, the dec 20,
there will be more info on them in this article. It just so happens 
that the dec 20 is also the more common of the two, and is used by 
much more interesting people (if you know what we mean...) Ok, the 
first thing you want to do when you are receiving carrier from a dec 
system is to find out the format of login names.  

You can do this by  looking at who is on the system. Dec=> `   (the
'exec' level prompt) you=> sy sy is short for sy(stat) and shows you 
the system status.  You should see the format of login names... A systat 
usually comes up in this form: job  line  program  user job:  the job 
number (not important unless you want to log them off later) line:  
what line they are on (used to talk to them...) These are both two or 
three digit  numbers. Program:  whatprogram are they running under?  
If it says 'exec' they aren't doing anything at all... User:  
ahhhahhhh!  This is the user name they are logged in under...
Copy the format, and hack yourself out a working code... 
Login format is as such: dec=> ` you=> login username password 
username is the username in the format you saw above in the systat.  
After you hit the space after your username, it will stop echoing 
characters back to your screen.  This is the password you are typing 
in...  Remember, people  usually use their name, their dog's name, 
the name of a favorite character in a book, or something like this.
 A few clever people have it set to a key cluster (qwerty or asdfg).  
Pw's can be from 1 to 8 characters long, anything after that is 
ignored. You are finally in... It would be nice to have a little help, 
wouldn't it? 

Just type a ? Or the word help, and it will give you a whole list 
of topics... Some handy characters for you to know would be the 
control keys, wouldn't it? Backspace on a dec 20 is rub which is 255 
on your ascii chart.  On the dec 10 it is cntrl-h. To abort a long 
listing or a program, cntrl-c works fine.  Use cntrl-o to stop long 
output to the terminal.  This is handy when playing a game, but you 
don't want to cntrl-c out.  Cntrl-t for the time.  Cntrl-u will kill 
the whole line you are typing at the moment.  You may accidently run 
a program where the only way out is a cntrl-x, so keep that in reserve. 
Cntrl-s to stop listing, cntrl-q to continue on both systems.  
Is your terminal having trouble??  Like, it pauses for no reason, or 
it doesn't backspace right? 

This is because both systems support many terminals, and you haven't 
told it what yours is yet...  You are using a vt05 (isn't  that funny?  
I thought I had an apple) so you need to tell it you are one. 
Dec=> ` you=> information terminal or...   You=> info ter this shows you 
what your terminal is set up as... Dec=>  all sorts of shit, then the 
` you=>  set ter vt05 this sets your terminal type to vt05. Now let's
see what is in the account (here after abbreviated acct.) That you 
have hacked onto... Say => dir short for directory, it shows you what 
the user of the code has save to the disk.  

There should be a format like this:    xxxxx.Ooo xxxxx is the file 
name, from 1 to 20 characters long.  Ooo is the file type, one of: 
exe, txt, dat, bas, cmd   and a few others that are system dependant. 
Exe is a compiled program that can be run (just by typing its name 
at the `). Txt is a text file, which you can see by typing=> type 
xxxxx.Txt do not try to=> type xxxxx.Exe this is very bad for your 
terminal and will tell you absolutly nothing. 

Dat is data they have saved. Bas is a basic program, you can have it
typed out for you. Cmd is a command type file, a little too 
complicated to go into here. Try => take xxxxx.Cmd by the way, there 
are other users out there who may have files you can use (gee, why 
else am I here?). Type => dir <*.*>  (Dec 20)      => dir [*,*]   
(dec 10) * is a wildcard, and will allow you to access the files on 
other accounts if the user has it set for public access. If it isn't 
set for public access, then you won't see it. To run that program:
dec=> ` you=> username program-name username is the directory you saw 
the file listed under, and file name was what else but the file name? 

short for systat, and how we said this showed the other users on the 
system?  Well, you can talk to them, or at least send a message to 
anyone you see listed in a systat.  You can do this by: dec=> the 
user list (from your systat) you=> talk username     (dec20) send 
username     (dec 10) talk allows you and them immediate transmission 
of whatever you/they type to be sent to the other.  

Send only
allow you one message to be sent, and only after you hit <return>. 
With send, they will send back to you, with talk you can just keep 
going. By the way, you may be noticing with the talk command that 
what you type is still acted upon by the parser (control program).  
To avoid the constant error messages type either: you=>  ;your 
message you=>  rem        your message the semi-colon tells the parser 
that what follows is just a comment.  Rem is short for 'remark' and 
ignores you from then on until you type a cntrl-z or cntrl-c, at which 
point it puts you back in the exec mode.

To break the connection from a talk command type: you=>  break priv's: 
if you happen to have privs, you can do all sorts of things.  First 
of all, you have to activate those privs. You=> enable this gives you 
a $ prompt, and allows you to do this:  whatever you can do to your 
own directory you can now do to  any other directory.   To create a 
new acct. Using your privs, just type =>  build username if username 
is old, you can edit it, if it is new, you can define it to be whatever 
you wish. Privacy means nothing to a user with privs.  By the way, 
there are various levels of privs:  operator, wheel, cia wheel is 
the most powerful, being that he can log in from anywhere and have 
his powers.  Operators have their power because they are at a special 
terminal allowing them the privs.  Cia is short for 'confidential 
information access', which allows you a low level amount of privs. 
Not to worry though, since you can read the system log file, which also
has the passwords to all the other accounts. To de-activate your privs, 
type you=> disable

when you have played your greedy heart out, you can finally leave 
the system with the command=>  logout this logs the job you are using 
off the system (there may be varients of this such as kjob, or killjob). 
By the way, you can say (if you have privs)  => logout username afl


              
                ******************************
               **  The basics of hacking II: **
               *           Vax's              *
               *           Unix               *
               ******************************** 
 
Welcome to the basics of hacking II:

Unix is a trademark of bell labs ** **  (and you know what *that* 
means).  In this article, we discuss the unix system that runs 
on the various vax systems.  If you are on another unix-type system, 
some commands may differ, but since it is licenced to bell, they can't 
make many changes.   Hacking onto a unix system is very difficult, 
and in this case, we advise having an inside source, if possible. The 
reason it is difficult to hack a vax is this:  many vax, after you get 
a carrier from them, respond=> login: they give you no chance to see 
what the login name format is.  Most commonly used are single words, 
under 8 digits, usually the person's name.  

There is a way around this: most vax have an acct. Called 'suggest' 
for people to use to make a suggestion to the system root terminal.  
This is usually watched by the system operator, but at late  he is 
probably at home sleeping or screwing someone's brains out. So we can
write a program to send at the vax this type of a message: a screen
freeze (cntrl-s), screen clear (system dependant), about 255 garbage
characters, and then a command to create a login acct., After which
you clear the screen again, then un- freeze the terminal.  

What this does: when the terminal is frozen, it keeps a buffer of 
what is sent.  Well, the buffer is about 127 characters long. So you 
overflow it with trash, and then you send a command line to create 
an acct. (System dependant).  After this you clear the buffer and 
screen again, then unfreeze the terminal.  This is a bad way to do
it, and it is much nicer if you just send a command to the terminal 
to shut the system down, or whatever you are after... There is always,

since  it has all of the system files on it.  If you hack your way 
onto this one, then everything is easy from here on... 

On the unix system, the abort key is the cntrl-d key.  Watch how
many times you hit this, since it is also a way to log off the 
system! A little about unix architechture: the root directory, 
called root, is where the system resides.  After this come a few 
'sub' root directories, usually to group things (stats here, priv 
stuff here, the user log here...). Under this comes the superuser 
(the operator of the system), and then finally the normal users. In
the unix 'shell' everything is treated the same. By this we mean:  
you can access a  program the same way you access a user directory, 
and so on.  The way the unix system was written, everything, users 
included, are just programs belonging to the root directory.  Those 
of you who hacked onto the root, smile, since you can screw 
everything... 

The main level (exec level) prompt on the unix system is the $, 
and if you are on the root, you have a # (super- user prompt). Ok, 
a few basics for the system... To see where you are, and what paths 
are act; G i] reguards to your user account, then type => pwd this 
shows your acct. Seperated by a slash with another pathname (acct.), 
Possibly manytimes.

BBS LIST BY MOGWAI/PHALANX - 1 APRIL 1989
-----------------------------------------

St  Name                            Phone         Baud  Storage  Software
ON  *** AIRWOLF ***                 416-767-1907  19200 64       AMIGA       
CA  UNKNOWN BBS                     213-329-4603  2400  60       AMIGA       
CA  TWILITE ZONE                    714-731-5195  2400  60       AMIGA       
NY  NIGHT FLIGHT                    212-962-3504  2400  43       AMIGA       
FL  AMIGA AUSCHWITZ                 904-744-9326  2400  4        AMIGA       
NY  TRILOGY/PE#1 HEADQUARTERS       516-484-9240  9600  20       AMIGA       
OH  SINNERS U.S. HEADQUARTERS       216-784-5552  2400  20       AMIGA       
ON  68000                           416-278-5654  19200 328      AMIGA       
ON  THE MESSAGE BOARD               416-536-4282  9600  2        AMIGA       
ON  FUCKN' A BBS                    416-278-0490  9600  128      AMIGA       
NY  FBI BBS                         718-259-9661  9600  310      PC BOARD    
NY  FBI BBS                         718-234-3659  9600  310      PC BOARD    
GA  AMIGA DOCS 'R' US               912-748-0331  2400  20       AMIGA       
ON  CANADIAN AMIGA CONNECTION       416-440-1459  9600  20       AMIGA       
CA  PIPELINE                        805-526-5660  2400  40+      AMIGA       
WI  PANDEMONIUM                     414-352-5982  9600  80       AMIGA       
AZ  BLOOM COUNTY AMIGA              602-843-8261  9600  20       AMIGA       
MD  TERMINAL FIX                    202-562-1174  19200 N/A      AMIGA       
IL  SKIDDS' LAIR                    312-631-4817  19200 N/A      AMIGA       
CA  CUTTING EDGE/ESI CALIF.         213-836-2381  19200 N/A      AMIGA       
IN  GENESIS ONE                     317-885-1268  19200 N/A      AMIGA       
FL  AMIGA BEACH                     407-833-8692  19200 N/A      AMIGA       
NJ  DAMAGE, INC./ORACLE HQ          602-264-6670  9600+ N/A      AMIGA       
ND  SHADOWS OF IGA                  707-528-7238  19200 N/A      AMIGA       
MT  TELE-TRADER                     406-782-3161  19200 N/A      AMIGA       
ON  VENTURE                         416-469-1031  19200 140      AMIGA       
AL  FEAR AND LOATHING IN LAS VEGAS  205-221-3327  19.2k 150      PC BOARD    
IA  THE ZONE                        712-366-9747  9600  65       AMIGA       
ON  C.O.P.S. HQ                     416-633-8801  9600  80       AMIGA       


             ***************************************
             ** The basics of hacking III: Data   **
             ***************************************


Welcome to the basics of hacking III: data general computers.  
Data general is favored by large corporations who need to have a lot 
of data on-line. The data general aos, which stands for advanced 
operating system, is a version of bastardized unix.  All the commands
which were in the unix article, will work on a data general.
Once again, we have tb^"|yoblem of not knowing the format for the login 
name on the data general you want to hack. As seems to be standard, 
try names from one to 8 digits long.  Data general designed the computer 
to be for busi- nessmen, and is thus very simplistic, and basically 
fool proof (but not damn fool proof).  It follows the same login 
format as the unix system: dg=> login: you=> username dg=> password: 
you=> password passwords can be a maximum of 8 characters, and they 
are almost always set to a default of 'aos' or 'dg'. (Any you know 
about businessmen...) A word about control characters: cntrl-o 
stops massive print-outs to the screen, but leaves you in whatever 
mode you were.  

(A technical word on what this actually does:  it tells the cpu to 
ignore the terminal, and prints everything out to the cpu! This is  
about 19200 baud, and so it seems like it just cancels.)  Cntrl-u
kills the line you are typing at the time.  Now for the weird one:  
cntrl-c tells the cpu to stop, and wait for another cntrl character.  
To stop a program, you actually need to type cntrl-c and then a 
cntrl-b. Once you get on, type 'help'.  Many dg (data general) 
computers are sold in a package deal, which also gets the company 
free customizing.  So you never know what commands there might be.  

So we will follow what is known as the 'eclipse standard', or
what it comes  out of the factory like. To find out the files 
on the directory you are using, type => dir to run a program, 
just like on a dec, just type its name.  Other than this, and 
running other people's programs, there really isn't a standard... 

who (and a lot of the other unix commands, remember?).  This shows 
the other users, what they are doing, and what paths they are 
connected across.  This is handy, so try a few of those paths 
yourself.  To send a message, say => send username this is a one 
time message, just like send on the dec 10.  From here on, try 
commands from the other previous files and from the 'help' listing.
Superuser: if you can get privs, just say: => superuser on and you 
turn those privs on! By the way, you remember that computers keep 
a log of what people do? Type: => syslog /stop and it no longer 
records anything you do on the system, or any of the other users.  

It screams to high heaven that it was you who turned it off, 
but it keeps no track of any accounts created or whatever else 
you may do.  You can say=>  syslog /start   to turn it back on 
(now why would you want to do something like that?????) To exit from
the system, type=> bye and the system will hang up on you. Most 
of the systems around, including decs, vax's, and dg's, have games. 
These are usually located in a path or directory of the name  games 
or <games> or games:  try looking in them, and you may find some 
trek games, adventure, zork, wumpus (with bent arrows in hand) or 
a multitude of others.  There may  also be games called 'cb' or 
'forum'. These are a sort of computer conference call. Use them on
w-Wsnds, and you  can meet all sorts of interesting  people.



If you would like to see more articles on hacking (this time far 
more than  just the basics), or maybe articles on networks and such, 
then leave us mail if we are on the system, or have the sysop search 
us down.  We call a lot of places, and you may just find us. This 
completes the series of articles on hacking...  These articles were: 
the basics of hacking: introduction the basics of hacking i: dec's the 
basics of hacking ii: vax's (unix) the basics of hacking iii: dg's 
This and the previous articles by: 
 
 
/The Knights of Shadow 

The Knights of Shadow on the PPS SuperSystem (206) 783-9798 [25] 
count 'em [25] megs!