Clippings Welcome, one and all, to the newest section of the magazine collectively known as Happle. In here you will find various articles which are too small to justify an entire chapter, but nonetheless usually contain some interesting nuggets of information. Sometimes funny, often thought-provoking, and always ripping off other magazines, this is Cliipings. ------------ Hack 'Foolproof' using 'Dropstuff' Description Deletes FoolProof from any computer that has a working copy of "Dropstuff" installed (Luckily this happens to be the case on most computers.) This happens to be the most simple hack for "FoolProof" that I have discovered. Instructions Open "DropStuff" and select the "Compress" menu item in the "File" menu. Select the FoolProof Extension "FoolProof Init" in the "Extensions" folder. In the window check the box "delete file after stuffing". Press "OK". After "Dropstuff" has finished stuffing the extension, crash the computer by turning it off at the back of the machine. Do not shutdown using a menu or command (this is important because if Foolproof has advance disk locking enabled the FoolProof extension which won't actually be deleted until you have restarted will lock the machine on shutdown skrewing up this hack and the computer. This will not happen if you crash the machine.) On Startup the FoolProof Extension will be compressed so it won't work. (The original FoolProof extension was deleted because you checked the "delete file after stuffing" check box.) This method can also be used for deleting other files while foolproof is on, such as user files, applications, other extensions and preferences. Enjoy , BIG BROTHER ------------ IP Spoofing for IRC via wingates First of all find an open Wingate. This has been Explained in earlier Happle Issues. Next, Fire up Ircle (I dont know if this works in snak.) You should now type: /server 23 /raw 6667 /raw user /raw user 0 0 : none /raw nick And thats all there is to it. I wrote this in about 30 seconds so if i have made a mistake find me on hotline or IRC going by the name of Hawkthorn Hawkthorn ------------ Wingate Listing People keep asking me for wingates all the time and it's pissing me off, so here you go you stupid bitches. I found this old list on my HD, some should work. mail.live95.com mamba.lpkf.si proxy.gibbsnc.com 193.189.182.21 193.189.182.52 globe.okeechobee.com rajraj.nu wiley238h002.roadrunner.nf.net terminator42.dpo.depaul.edu ts004d08.orl-fl.concentric.net ts1-039.oricom.ca 207.96.187.23 helios.uqtr.uquebec.ca dockets.ozemail.com.au mica4ppp176.cac.psu.edu 24.232.28.80 ppp158.oricom.ca 207.253.33.252 208.155.155.51 tcparis1-53.hol.fr cas2-24.moe.edu.sg ppp06-ceb5.mozcom.com dynamic291.dov.adelphia.net monoch.lnk.telstra.net webtest.avenue.nirvanet.net d33.aardvark.apana.org.au olymp.codalan.cz toddwg.erols.com dockets.ozemail.com.au 193.254.32.235 m-13.r2.icrdl.net 205.241.211.87 olymp.codalan.cz 209.20.152.84 NIRVANA.MIT.EDU ptg.access.one.net 206.186.172.26 monoch.lnk.telstra.net epsinc.alaska.net dockets.ozemail.com.au 198.109.164.205 195.84.176.46 s79.usachoice.net ida.csd.uu.se 24.232.28.130 cable19-186.gte.net diagent.com eve.genius-net.co.jp olymp.codalan.cz cyclone.eas.purdue.edu cx41573-a.vista1.sdca.home.com epsinc.alaska.net gilmour.ne.mediaone.net dyn107ppp87.pacific.net.sg toddwg.erols.com nwpcog.dst.nc.us pcseg36.eif.ch Dialup-593.HIP.CAM.ORG cable0.royaume.com 207.175.225.31 blackice.sendfax.com poste253.autray.net edgetech.kersur.net pentium-nt.saop.si ns.tais.ru 209.89.134.66 203.30.39.241 internet-sv.mdk.co.jp 134.7.1.64 ns.cntrl.co.jp acr.kappa.ro h24-64-70-16.cg.wave.shaw.ca slc184h.modem.xmission.com 204.251.13.23 dyn43.netlabs.net h24-64-70-16.cg.wave.shaw.ca dynamic423.dov.adelphia.net radresearch.ucsd.edu gatekeeper.stpatricks.tas.edu.au 142.169.51.51 mail.concordegaming.com sealink.duluth.spacestar.net fpvq.qc.ca smtp.advantageline.com.au 24.232.28.123 sealink.duluth.spacestar.net jk.estpak.ee 167.114.53.180 195.84.176.46 nocommen.siol.net 204.251.13.23 vader.cygnacom.com 24.113.43.164 amutas.amutas.co.jp pbucha.fastlane.net ppp17-63.ght.iadfw.net relay.eurotech.it m150.accesspro.net tnt01-77.anv.net 12.13.17.93 dialup168.mho.net 206.191.192.52 dialup2-036.csc.cuhk.edu.hk abacus.uel.ac.uk a28.hn1.wave.co.nz imodem47.missoula4.bigsky.net 1-115.dialup.inconnect.com gateway.pmcsystems.com 47-104.dr.cgocable.ca cc340063-a.lwmrn1.pa.home.com dialup2-023.csc.cuhk.edu.hk tomimaarit.yok.utu.fi nwrg.com mail.nextwavetech.com www.kasa.org per1-60.wantree.com.au as5200-14.sl003.cns.vt.edu jupiter.prim.is m1.dk.ee as5200-12.sl041.cns.vt.edu harley.ccv.cz putnam.wwd.net ns2.bogo.co.uk iv.modem.hogia.net imodem47.missoula4.bigsky.net spinecho.wustl.edu elecs.kaluga.com ppp29-68.ght.iadfw.net 207.2.12.19 tiffanyw.ne.mediaone.net 206.252.226.42 cable019129.cable.eph.ptd.net piibltvnt.sullivan.preferred.com imodem12.missoula4.bigsky.net FPIPMAIL.FPIP.COM bmr.v-wave.com 207.2.12.22 MAIL.MACFINANCE.COM pinkerton.net intecba.bblanca.com.ar as5200-13.sl002.cns.vt.edu 206.252.226.19 proline.erols.com imodem33.missoula4.bigsky.net cc20239-a.catv1.md.home.com 209.113.151.36 surf3812.se.mediaone.net linux.esc.ac.at zyqux.v-wave.com ns.hamc.or.jp sv1.eve.ne.jp compexp.ballistic.com ns.mpeg.de bray.qc.ca vader.cygnacom.com gatekeeper.eop.gov catalogcard.cjnetworks.com spice.mhv.net dasinc.das-inc.com cc1006569-a.lwmrn1.pa.home.com Ferrocyanide "Best file compression around: 'rm -rf /' = 100% compression" ------------ The NEW Nail in the Mouthpiece Trick by überphuck Intro. Hey, remember that old trick where you used to be able to stick a nail or paperclip into the mouthpiece of a payphone, touch it to the box and dial for free? Well, here's a new method for the same thing that will work on ANY phone whether it has been fixed (like most California phones, at least) or not. Materials: 1. Metal Snipping device (Something that can cut through the cord connecting the hadnset to the phone itself) 2. Small pocketknife (or similar instrument for stripping wires) 3. Electrical tape The Method: Use the cutters to snip a hole in the cord connecting the handset to the phone itself. DON'T CUT THE CORD IN HALF, DUH. Just a hole so you can easily reach the RED wire. Now, expose the red wire and use the pocketknife to scrape at the wire, exposing the metal within. Now, touch the wire with the pocketknife or just let it touch the metal on the phone cord. You should hear static in the earpiece. This is where you can dial out. When you finish dialing, have your tape ready and patch up the red wire (otherwise, it's kinda hard to hear people with that static). Try to cut the initial hole close to the base of the handset, under the blue rubber thing (use the knife to slice the rubber if needed), or close to the phone itself. A big gaping hole in the cord will probably get fixed quickly. NOTE: While doing all this, KEEP THE PHONE OFF THE HOOK. Otherwise you will get a nonlethal but very unpleasant shock from the red wire. Not too fun. What happens: The old trick of sticking metal into the mouthpiece and touching it to metal simply grounded out the red wire (signal wire, I'd guess). When that wire's grounded, the phone dials out like a regular phone without waiting for the switching machines at large to validate coin insertion. NOTE: I have been know to be nothing more than a blowhard... this is my best guess as to what's happening. Possible permanent mod to the payphone: Cut the red wire in half and tape up one end (so you don't get shocked when it touches the metal cord). Not too sure what would happen. In theory, the phone would dial as if you just grounded the red wire, but this has yet to be tested. That's all folks... hope that was insightful. I'm NOT an advocate of fucking around with the phone company for the hell of it, so don't come cryin to me if you get in trouble. I just feel this is an interesting bug in the phone company's hardware that's been around since I was at least in 4th grade... ------------ Freeing School Computers by Virgil Many of you that are experienced with getting past weak security measures on Windows and UNIX platforms are lacking knowledge about one of the easiest to use operating systems ever: The Macintosh. I know, you guys are groaning, but believe it or not, these are great computers, and you can have a lot of fun with them during whatever class you might be using them in at school. Most schools are mostly mac, and many of the school computers have some light security measure that they put on the macs as some pathetic attempt to keep us from having any fun. In this article I will be dealing with how to get past the most common security measures taken: FoolProof. FoolProof basically stops all actions that it has been set to stop. But the key is, if, say, a program, and not the user, were to do this type of action, FoolProof could be bypassed completely. One of my favorite things about the Mac is a high level scripting language called "AppleScript" that is in most of the school's computers. AppleScript has the macintosh equivalent to root on the computer. FoolProof won't mess with it in the slightest. While all I will be going into in this article about AppleScript is how to get past FoolProof, perhaps in future articles I will give you more info about this kickin' scripting language. First thing you do: Open up the hard drive and go to the Apple Extras folder. If you are lucky, inside you will see a folder called AppleScript. If there is one, open it up. If there isn't one, never fear! I'll give you some other ways to get past FoolProof. Okay, so inside the AppleScript folder, there is an app called Script Editor. Open that up, and a new window for you to script in should open up. In the window, put in the following script. Leave my comments out, of course. tell application "Finder" <-- the main interface of MacOS is the Finder activate <-- brings the Finder to the front. MacOS doesn't multitask. select folder "FoolProof" of folder "Preferences" of folder "System Folder" of boot disk move selection to trash <-- don't empty the trash. If you don't put it back later, they'll delete AppleScript. end tell You can run the script, or save it as an application, or whatever suits your situation. From this point, it's a simple restart and you're home free! But let's say that your school deleted AppleScript or disabled the Script Editor. You are NOT screwed! FoolProof is very weird based on the fact that some experimenting with the keys will deactivate it temporarily (for 30 seconds I think) which will allow you to go move it manually and restart. Just experiment with key combinations, or sweet talk it out of one of the people who does computer stuff. Tell the teacher you are having trouble deleting a file you accidentally saved, and shoulder surf it. Usually the key combination is something like "option control command" or "option command z" or something of the sort. If you are too lazy to do this kind of stuff, go look for a computer that still has AppleScript. Once you free the macintosh of the chains of badly designed security, here are some applications that us mac hackers use that you will appreciate if you want to take things any further: AGNetTools: My favorite application. This multiscanner does just about everything! WhatRoute: Great tracerouter. IPNetMonitor: Great for watching port activity, monitoring data flow, scanning subnets TWBFPH: decrypts FoolProof password files if you want to get in the easy way next time Watch, Snarfer, or Etherpeek: packet sniffers. good for getting AppleTalk logins and passes. Most schools have an AppleTalk network. Before you guys go have fun with your school's computers, remember this: Your school computers are a learning tool that many people there depend on. Whatever you disable, reable. And whatever you do, don't do any malicious shit. Sure, have fun by disabling the annoyances, but don't become an annoyance yourself. Also, watch out for monitoring programs. Some schools have screen watchers in place! Happy mac hacking!