💾 Archived View for spam.works › mirrors › textfiles › uploads › black2.txt captured on 2023-11-14 at 12:38:01.

View Raw

More Information

⬅️ Previous capture (2023-06-16)

-=-=-=-=-=-=-

          ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~                                                                                        
          -={ BlackCode Ravers Magazine Issue 2 }=-   
             Home page : http://www.blackcode.com                      
                Editor of the magazine: tHe mAniAc                     
                       themaniac@blackcode.com                                
       ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Table of Contents:

----------------------------------------------------- 
1.Editorial                                                                     
2.Mirrors of the magazine                                           
3.Latest News With BlackCode Ravers                 
4.How to break your school security                             
5.About Virii   
6.Advertising                                                                
7.Trojans Section                                                        
8.For the newbies                                                    
9.Linux Section                                                       
10.Interviews                                                            
11.Final Words                                                     
-----------------------------------------------   
                                    

1.Editorial
=-=-=-=-=-=-=-=-=-=-=-=-=
It's me again.This is our second issue.I've changed the
design and I've added several new things in the newsletter.
I've also received a lot of e-mails about our magazine.
People like it and they want more information here.
The first issue was short one but of course every new
issue has many new things added in it.
I'm happy people like it and we have MANY new subcribers every day.
Also we have much more visitors than before.
All issues of our magazine are archived on the page because
many new subscribers want to read the one they haven't read.
Also we have new section about our magazine where you'll be able
to read what is our magazine about and other things connected with it.
Many people think that their e-mail will be used for spamming
after they subscribe.This is NOT true we BlackCode Ravers are
agains the spamming and you can be 100% sure that we won't 
give your e-mail to anyone.I hope you'll suggest new sections
or send some texts to me.
========================================>
I want to thank to all people that support us and mail me with their
comments about our magazine.
If you want to publish one of your texts in our Magazine, just
mail me your text to :themaniac@blackcode.com
I will review it and if it is a good one I will publish it.
Note : All texts are welcome.
You can write about everything you want, but it has to be connected with
hacking/cracking/phreaking/carding/virii/computers ... -thanx a lot-
========================================>

Just keep sending new texts to me it's always useful to read texts from
new people and if they're good I'll put them in our magazine.
Also if you want to mirror our magazine on our page mail me also.
Our magazine will become more popular if you put links about it on some
pages or mirror it on your page.
If you have any suggestion about out magazine please mail me and tell me about it.
I'll be very happy if all people help me to make this magazine one of the best and most
informative out there.
__ __________________________________________
_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-

If you want to put these texts on your page/ftp/newsgroup etc.
PLEASE don't change anything.
USE THESE TEXTS AT YOUR OWN RISK.WE'RE 
NOT RESPONSIBLE FOR ANYTHING HAPPENED
AFTER READING SOME OF THESE TEXTS.
THEY'RE FOR EDUCATIONAL PURPOSES ONLY.
OUR GOAL IS TO IMPROVE YOUR KNOWLEDGE.
___________________________________________
_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-

Happy reading :-)


2.Mirrors of the magazine
=-=-=-=-=-=-=-=-=-=-=
This is our second issue and we've got mirror of the magazine.
I think this is very good thing and if you want to become a mirror just
mail me about that.

These are our mirrors for now:
http://www.tlsecurity.com/Textware/mailinglists/

If you're mirror of our magazine please inform me 
so I can add you to the list.
---------------------------------------------

3.Latest News With BlackCode Ravers
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Our page has MANY new subscribers and new visitors 
these days.We've added MANY new exlpoits in the our
exploit section and also many new things.
A new area has born inside BC-Tech. It's the Blackcode Newsletter area 
where you can learn more about our e-zine, send 
comments and articles, and download old issues.
So you'll be able to download all issues of the magazine
from our new area and you won't miss any of them.
Just go there and check it.Also download issue 1 if you don't have it.
Search Blackcode now available so you can easily find the information
you're looking for.
Also we have added 2 Virii made by one of our members.
2 new texts has been added.About Encryption and PGP
and about Voting.
We've added AntiSniff for windows and Unix, the last L0pht 
Industries tool. 
We've affiliated with amazon to offer directly from Blackcode computer
related books.You can look at the Library area for more info.
We're soon going to put several books on our page,and we
hope you'll like them.
But don't worry BlackCode will be updated a lot we promise :-)
In a few days we'll make interview with all of our members and 
we'll post them in our magazine.I think this will be usefull and
you'll learn new thing for our members.
Also we think it's good idea to have Linux section with many
texts and programs in it.Some of them will be our creation.
-------------------------------------------------------------------

4.How to break your school
by tHe mAnIaC
themaniac@blackcode.com
=-=-=-=-=-=-=-=-=-=-=
This guide is for educational purposes only I do not 
take any responsibility about anything
happen after reading the guide. I'm only telling you 
how to do this not to do it. It's your decision.
If you want to put this text on your Site/FTP/Newgroup 
or anything else you can do it but don't
change anything without the permission of the author.

A word from the author:

I hope you like my texts and find them useful.
If you have any problem or some suggestion feel 
free to e-mail me but please don't send mails like
"I want to hack the US government please help me" or 
"Tell me how to blind a trojan into a .jpg"
Be sure if I can help you with something I will do it.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

In this guide I'll explain you how to hack your school 
and the things you can do after you're in the
school's computer.This guide is for people who hate 
their school and want to learn how to hack it.
-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_

So you want to hack your school :-) OK now you should do 
some social engineering.Learn every-
thing you can about the computers in your school.
About the teacher working with them,about
their OS (operation system)everything that can 
be usefull for you.Most of the cases the teacher 
that is working with the computers will put lame 
password that is easy to gues.Use every moment
when your teacher is writing some password and
try to remember it.It's good when you have some
friends with you so everyone will remember a little 
part of the password and then you'll combine
it to the full one.
Almost every teacher has a favourit student.
You should use him to give you some information
about the passwords and other things.
You teacher is maybe writing the passwords on paper so
you should find this paper in the room where the computers are.
Use the guy that the teacher likes
a lot he or she can give you very useful information.
Another way is to use another teacher.
Check if the teacher that is working with the computer is
not there.Find another teacher and tell him 
or her that you've lost sensitive information and will
get to write it again because you've lost it.
Make sure the teacher will believe you and let you do it.
Then tell the teacher that the information is on the school
computer and you should go and take it from there.
Then if the teacher let's you in that's good
now search for passwords and other things on the disk.
You can see if there's anything interesting
in the "my documents folder" you can find something 
useful there.You should search for the paper
I told you about with the passwords.If the teacher 
you came with is still there you can't search
because the teacher will see you,so one of your 
friends should call the teacher and talk with it
for 5 minutes for that time you should find the
paper or other information that can be useful for you.
You must know everything about the teacher 
that is working with the computers.What he/she likes
what the teacher hate,what he think about the 
passwords such things.Once again your friend that is
the teacher favourite student will help you 
for these things.Then you should create a wordlist
with words you think your teacher will put 
as passwords on the computer.It's better and more usefull
when you know many things about your 
teacher.Then you should just try the passwords.If you're
good social engineer you'll make very good word list and you'll have the password.
Also learn about what kind of passwords your teacher prefers.Something like:
letters with numbers or something else this is important and will help you a lot.
You teacher should know you as person 
that don't know anything about the computers so when you
hack their computers and do other things
 he/she won't think it was you because you don't know
anything about computers.
So now let's suppose you're in and you 
can do as you want.First of all you must check the disk for
some tests and students marks.If you 
find any tests copy them and you have the answers to them
hehe you'll be ready.If you find any 
students marks you can change them to what you want.But
don't write the best mark to the most 
stupid student because they'll check and see it's not true.

If your school has a Linux OS and you're 
root create several users with root rights so when you want
to get back just use them.Be sure to remove 
everythig connected with you from the log files.
But almost EVERY school is using Windows 
not Linux because the teachers are too lame to use it
they just want to use Windows and nothing else.

I hope now you're in the school computers or you know some of their passwords.
-------------------------------------------

6.Advertising
=-=-=-=-=-=-=-=
Our magazine need more advertising.We want more people to read it.
And of course EVERYONE can help.Just tell your friends so they can
subscribe too or if you're webmaster somewhere put a link to our page
and tell the other people about BlackCode Ravers Magazine.
You can also add the page to some search engines and of course
try to find a mirror of the magazine.But please don't start spamming
and sending messages to every e-mail you find.Just tell about the 
magazine to your friends and to people you know.
This will make our magazine
popular but of course with your help.I hope you'll do some
advertising and tell the other about us and our magazine.
This will help us a lot because we'll probably find some
good writers for our magazine and you'll be able to see more texts.
-------------------------------------------

7.Trojans Section
=-=-=-=-=-=-=-=-=
This is our new section.Many people want such section and that's why 
the section is up now.Don't think in this section I'll put links
where you can download trojans because the trojans are everywhere.
Here you'll see information about the latest
trojans,how to remove them,latest news connected with trojans,
latest and the best anti-trojan software and many other things connected
with trojans.
I just want to show you how dangerous the trojans are and that you may
completely destroy yourself when you're using them.

In thie issue I'll tell you about the different kinds of the trojans
and I'll also review one trojan.

------------------|
by tHe mAnIaC |
-----------------|

Remote Access Trojans
-------------------------------

These trojans are the most popular trojans now.
Everyone wants to have such trojan because he
or she want to have access to their victim's hard drive.
The RAT'S (remote access trojans)are very
simple to use.Just make someone run the server 
and you get the victim's IP and you have FULL
access to his or her computer.They you can 
almost everything it depends of the trojan you use.
But the RAT'S have the common remote access trojan functions like:
keylogger,upload and download function,
make a screenshot and so on.Some people use the 
trojans for malicious purposes.
They want just to delete and delete.This is lame.But a have a guide
about the best way to use a trojan.You should read it.
There are many programs out there 
that detects the most common trojans,but new trojans are
coming every day and these programs are not the maximum deffence.
The trojans do always the same things.
If the trojan restart every time Windows is loaded that
means it put something in the registry 
or in win.ini or in other system file so the trojan can restart.
Also the trojans create some file in 
the WINDOWS\SYSTEM directory.The file is always looking
to be something that the victim will think 
is a normal WINDOWS executable.Most trojans hide
from the Alt+Ctrl+Del menu.This is not 
good because there are people who use only this way to see
which process are running.There are programs 
that will tell me you exactly the process and the
file from where it comes.Yeah but some trojans 
as I told you use fake names and it's a little hard
for some people to understand which process 
should they kill.The remote access trojans opens
a port on your computer letting everyone to connect.
Some trojans has options like change the port
and put a password so only the guy that infect you 
will be able to use the computer.The change
port option is very good because I'm sure you 
don't want your victim to see that port 31337 is open
on their computer.Remote access trojans are 
appearing every day and they will continue to appear.
For those that use such trojans: BE CAREFULL 
you can infect yourself and they the victim you
wantet destroyed will revange and you'll be sorry.
If you don't know anything about trojans
DON'T USE THEM.
---------------------------------------
Password Sending Trojans                                                                 

The purpose of these trojans is to rip all cached 
passwords and send them to specified e-mail
without letting the victim about the e-mail.
Most of these trojans don't restart every time Windows
is loaded and most of them use port 25 to 
send the e-mail.There are such trojans that e-mail 
other information too like ICQ number 
computer info and so on.These trojans are dangerous if
you have any passwords cached anywhere on your computer.
----------------------------------------
Keyloggers                                                                               

These trojans are very simple.The only one thing 
they do is to log the keys that the victim is pressing
and then check for passwords in the log file.
In the most cases these trojans restart every 
time Windows is loaded.They have options 
like online and offline recording.In the online recording
they know that the victim is online and
 they record everything.But in the offline recording 
everything writen after Windows start is 
recorded and saved on the victims disk waiting for 
to be transfered.
----------------------------------------
Desctructive

The only one fuction of these trojans is to 
destroy and delete files.This makes them very simple
and easy to use.They can automatically 
delete all your .dll or .ini or .exe files on your computer.
These are very dangerous trojans and once 
you're infected be sure if you don't desinfect your
computer information will no longer exist.
-----------------------------------------
FTP trojans      
                                                                   
These trojans open port 21 on your computer
 letting EVERYONE that has a FTP client to connect
to your computer without password and will full upload and download options.


These are the most common trojans.They all are dangerous 
and you should me carefull using them.
-----------------------------------------
So now I'll review one trojan called Vampire 1.2
I think most of you know it but if you don't you'll now
learn about it and how to remove it.

Vampire 1.2 is a remote access trojan that use port 1020 to connect.
It has a friendly and easy to use client.The trojan is dangerous one
because it has a lot of functions some of them cal COMPLETELY
destroy your computer data.

HideTaskbar 
Send Message 
Format Drive
Read A:\ Drive 
Shutdown
Logged on User 
Log Off 
Ping 
Get Hard Drive - Get fixed hard drive(s)
Server Path 
Show Mouse 
Hide Mouse 
Clear Recent Folder 
Open Control Panel
Open Date/Time 
Reboot
Delete File
Delete Directory -
ISP Account Info 
Open CD Door - Open victims CD doorClose 
CD Door - Close victims CD door
Close Server 
Open Web Page -
Run Program 
Get Windows Directory
Get Local Time 
Get Temp Directory
Set Computer Name 
Registry Kill
Fill Hard Drive
Get ICQ Number
Close Windows 
Wacky CD-ROM
hangup Modem
Monitor Off
Make Directory
Enable Alt+Ctrl+Del
Get Active Windows
Crazy Mouse 
Stop Crazy Mouse 
Get Operating System 
Get System Owner
Get Organisation 
Set Volume Label
Find File
Disk Space left
Send Keys
Get Disk Serial Number 
Kill Window
Chat with Victim 
Screenshot

These are all the functions of the trojan.
The server's size is 53,248bytes .
You can remove the trojan when you:
delete c:\windows\system\Winboot.exe
and then in the registry
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows
\CurrentVersion\Run] "WindowsBootFile"="c:\\windows\\system\\Winboot.exe" 

That's it when you delete these things you're clean from the trojan.
You see what dangerous options it has so check if you're infected 
with it manualy :-)

That was everything for the trojan section in this issue.
I'm waiting for your ideas and suggestions at: themaniac@blackcode.com
-----------------------------------------------

8.For the newbies
=-=-=-=-=-=-=-=
This is also a new section in our magazine.It's for people that just came 
on the net and want to know some things and of course to learn how to
hack.So they started sending e-mails to everyone asking but in the most
of the cases they don't receive reply.That's for what is this section.
To answer to your questions and help you to learn something.
Don't worry you're newbie and you want to know,you're not lamer
that don't read because he/she "knows" everything :-)
The section will explain things only for newbies and will be only for them.
But who knows you may also learn something new from this section.
I hope this section will help to many people that don't know the basics
and will teach them something.If you have any question and you want to
see the answer here tell it to me at:themaniac@blackcode.com.I'm waiting
for your suggestions about this new section.

About IP and how to get it
------------------|
by tHe mAnIaC |
-----------------|

In this issue I'll explain you everything you want to know about the IP addresses
and how to get someones IP from IRC,ICQ,e-mail etc.
First I'll explain you what an IP is.
Every computer connected to the net has IP address.
This IP identifies the computer on the Internet.
The IP is where the data comes and goes out.
If you're using Dial Up every time when you connect
your IP is differend this is called dynamic IP.
Everyone  need the IP address of someone to do something 
to the victim like nuking,flooding
or if the victim is infected with trojan horse and you need the 
IP to connect to the computer.
The IP addresses can be get with these methods:

via e-mail-the IP is in the header.When you receive a message
right click,then Save Message and
then you'll see the IP there.
via IRC-if your victim is on IRC just type /dns <nick> and you'll see it
via ICQ-ICQ is not so secure thing and in the most of the 
cases you'll see the IP in the info if not
just find a ICQ patch that will show you the real IP of the 
victim.Most of these patches are
on every page connected with h/c/p/a.
Also there are ICQ tools that will help you to get the IP of ICQ user.

I hope you understood what an IP is and how to 
get it from the people.
But there are people that hide their IP so you just
can't get it from everyone.

Advices to the newbies and
for the people that want to know
------------------|
by tHe mAnIaC |
-----------------|

People STOP sending e-mails to everyone like
"Learn me to hack","How can I use a trojan","if you're hacker can you hack hotmail account"
and such things.This is lame and in the most of the cases you won't receive reply.
Or you'll receive something like "FUCK oFF laMer".Noone want to be called lamer.
Just learn what to ask and how to ask it.Ask BUT don't ask shit like these ones.
Read and of course practise.There are MANY texts on the net believe me just
read some and understand what is the hacking about and learn something
about the security on the net.
Many people ask where to read.Well you can read at
blackcode.com and also on many other sites.Just check progenic.com or cyberarmy.com
and check some sites in their top lists.There you'll find many texts that will help you.
Many people think hacking is to nuke machines,to flood someone,to steal passwords 
from people that don't know what a trojan is,to send viruses and such shit.This is not
hacking this is stupid thing and you should NEVER do it.
I hope now you'll start reading and learn the basic things and then start asking questions.
But I'm sure they won't be lame one :-)
And last thing: SHARE YOUR KNOWLEDGE with the other people.Teach and learn the other
people the things you know and don't be shame to say that you don't know something.
--------------------------------------------------------

9.Linux Section
=-=-=-=-=-=-=
This will be our Linux section full with texts about Linux security
and other things connected with Linux.
In this issue I'll publish one text about Why you should use Linux
instead of Windows bacause many people ask what's the big deal
with Linux.I'll show you now.
------------------------------------------------
Why people use Windows instead of Linux?
by tHe mAnIaC

In this text I'll explain you why almost EVERY man that is working with
computers use Windows instead of other OS like Linux.

Everyone know Windows.In most of the cases when you buy a computer you
have Windows on it.This show you once again how many people use it.
But why you may ask why are they using something that crashes every
5 minutes,that is so insecure on the net and that everyone can own your
computer via the net.Because the people don't know about these things.
They just think if they learn how to use Windows they'll have computer
knowledge.But they're normal users.They don't want to learn about
security,they don't want to learn how the things  work and what might 
happen to their machines when they're on the net.They just want to have
an e-mail box and surf the net,that's everything they want.And when
someone find that they're infected with trojan and inform them all the
normal users says something like "are you crazy this is impossible".
They don't know about anything they just think that when all the people
are using Windows they should use it too.
People take the easier part when they don't have to do anything instead 
of clicking on icons and working with Word.They don't care about security
about making they're system more secure.That's what Windows is.
But how about Linux.Linux is for people that want to learn that want to know
it's for the hackers.
You can COMPLETELY control your computer with Linux.You can see
who is on your system why tried to brute-force passwords on your
accounts and so on.You have full control and everything is FREE.
That's it that's what Linux is a system for the hacker for the person that want
to learn and want to know,that want to make his/her own programs under Linux.
Windows uses all of your system resources 
for something and that's why it crashes.
Linux completely uses the resources of your system and make it stable.

Every hacker that respect himself should use Linux instead of Windows.
Windows is FULL with security problems and you can be easily crashed and
hacked over the net.Of course Linux has also security problems but you can
remove them just get the latest patches for the bugs.Also if you know how to
configure your Linux right you'll be secure for the lame people that has one
exploit and think they're elite and they can hack everyone.
When you're using you'll learn much more about your hardware which is very good
thing.You won't be stupid Windows user anymore.You'll be Linux user.

NOTE:
Windows is good for offices and for graphic designers also for people that
don't want to learn anything,that just want to surf BUT if you want to know
and you respect yourself you should get Linux and learn how it works.

That's for now in our Linux Section.The next time you'll see here some
security papers also with source code of some attacks.
If you're Linux expert and want to handle the section
please e-mail me and tell me.
themaniac@blackcode.com
-------------------------------------------------------------

10. Interviews
=-=-=-=-=-=-=
This is again new section I think you'll like and have fun with.
In this section you'll see interviews with webmasters,hackers,
security experts and many other one.I hope you'll like the section
and also you'll learn many new things about the people that have
been interviewed in our magazine.
I'm waiting for your ideas about this section and also your
suggestions about it at: themaniac@blackcode.com

In this issue you'll read interview with Melkor the webmaster and the
founder of BlackCode Ravers.
The interview was made by me tHe mAnIaC.

tHe m4niac:When did you start BlackCode Ravers? 
Melkor:
tHe m4niac:Why and how did you start the page? 
Melkor:
tHe m4niac:What do you think about the page now?About it's stuff,visitors? 
Melkor:
tHe m4niac:Do you think BlackCode is famous group with good reputation? 
Melkor:
tHe m4niac:What do you think about the BlackCode's magazine? 
Melkor:
tHe m4niac:What do you think about the people that use trojans 
and make fun with the other people? 
Melkor:
tHe m4niac:What will you say to the webmasters of the other pages on the net?  
Melkor:
tHe m4niac:Which is  the best H/P/C/A site on the net by your opinion? 
Melkor:
tHe m4niac:What do you think about the future of the net and BlackCode? 
Melkor:
tHe m4niac:What are your plans for the future? 
Melkor:

Well that's for now.I hope you like the interview and you've learned a lot of things
about the webmaster of BlackCode Ravers.In the next issue here there will be again
interview with someone.I'm waiting for your ideas about this section and also your
suggestions about it.
----------------------------------------------------------------------------------------------

11.Final Words
=-=-=-=-=-=-=
You're finally reading the final words.Well that was from us in this second issue.
It's was bigger the issue 1 and I think you'll like all the changes and the new
sections added in the new issue.
Many new things as you see have been added,new sections and a lot of other
things.Of course in the next issue there
will be many new things and new sections too so for now just spread the word 
about our magazine and tell the other people about it.
This is our second issue and we've got so many readers and people that
like the magazine I hope we'll get new readers every day.
We're still looking for mirrors of our magazine and of course your opinions
and suggestions about our second issue.Also send texts and ideas about
new sections.I'll be really happy if you can handle some section or help me
with the magazine or write something for us.Of course you'll get FULL
credit for everything you've written for the magazine.
Tell me what do you think about
the design.If you make better one please send it to me so I can see it.
Bye for now and I hope you've learned something new from our second issue.
Be ready for out third one and by then just keep telling people about our
magazine and about BlackCode Ravers.

-----------------------------------|
tHe mAnIaC                                      |
Magazine Editor                            |
themaniac@blackcode.com     |
---------------------------------|
-----------------------------------------|
Melkor                                                          |
Webmaster of BlackCode Ravers    |
melkor@blackcode.com                     |
--------------------------------------|