W3ll i am back from the mutha fucking dead hoes. this PFC is new like my new home now that I am not homeless. Being homeless sucks. you have no comfortable place to masterbate, you stink like the beans you spilt on yourself the night before and you get hair lice. eewwweee! what fun. or is it phun. well whatever's hip... you stupid dumbshit god damn mother fucker.
<INSERT="ANDREW_DICE_CLAY IMITATION">
Yeah so I was like fucking this bitch the other night. and she was like "oh dice i like your cack, give it to me", and i was like okay bitch and made her eat my shit. yeah like my fucking feces.
<END INSERT>
==========================
tH3 b1tcH3s wh0 d1d 5h17 for PFC thi5 t1m3 AROUND:\
-SiMONSAYS
-Af8e4f5
-JohnnyTHM
---
****************************************
Quotes right from the pig's mouf================
=_+_()_*)*(&)*%_#(_($#)$(_)_#(%_)(#_%)(_%*(#&$)
Doc Strange: "I you show me a woman that doesn't make her man a sandwhich and I'll show you a woman with a black eye"
Teflon: "One time i was in this sewer system checking out the bell system and it reminded me of my mom's pussy"
Deadly Muffin: "I like to masterbate"
--------\\\///----------
DEF CON 7.0 UPDATE!$%^^$^#%@$%
--------///\\\----------
DEF CON 7.0 IS ON JULY 9TH-11TH (FRIDAY-SUNDAY) AT THE ALEXIS PARK HOTEL IN LAS VEGAS NEVADA. IF YOU NEED A RIDE FROM CALIFORNIA OR ARIZONA (CARPOOLING) EMAIL
simonsays@netlimit.com.
______________________________________
LINKS FOR DEF CON 7.0
______________________________________
www.defcon.org - offical def con web site. info and shit from the Dark Tangent the dude who puts on def con.
www.alexispark.com - the site of the hotel where def con will be held. info on reservations etc.
www.exit2shell.com/illegalx/ - some shitty def con resource page i made.
www.nevadaundergroun.net - site made by freaky the "Head" of the nevada underground (duh). he's cool so's the site check it out.
*****************===================()()()()()()
Sun Glass Hut International part #1
( O V E R V I E W) - ( O V E R V I E W) - ( O V E R V I E W)
@@@@@@@@@@@@@@@@@<<<<>>>>><<<<<<>>>>>>><>><><
SUN GLASS HUT AND THEIR GOODIES FOR PEOPLE TO PLAY WITH!
Sun Glass Hut (SGH) has lot's of neato stuff for people to place with. What seems to be a boring place to buy over-priced revo's can actually be a place of fun and amusement (sorta, no maybe, oh yeah kinda well yeah).
System Overview: Coputing/Register Device
Operating System: InStorePlus Point Of Sale (POS) System by STR Inc.
This is very similar to Window's 3.1 and your mama's clitorus. After booting up the POS System kicks in as the "Program Manager". The program manager acts as a desktop where the HUTraing Guid, and the Sun Glas Hut POS application are as icons on the desktop. The applications are launched on startup. All applications are access able using "alt+tab".
The HUTraining is just a GUI app that has info on procedures and that kinda shit. The Sun Glass Hut POS is the app that is used the majority of the time. It allow's the associate (clerk) to make sales, view reports write/send email to and from SHG headquarters. It may be possible to send email to other address rather than SGH headquaters though. To access the the sales menu and reports menu you need to enter a 6 digit numerical number. From the POS screen you have the choice to enter "F" key commands or enter your associate number to gain entery to the sales/reporting menu's. Each number is unique to the associate it is assigned to (so i am led to believe). So unless you are an associate, or you saw the sales associate type it in then you cant do shiznit.
On launch of the POS application (which is a dos application btw) you will receive a screen like this one, or very similar:
Reg#1 (Register #1) Sunglass Hut of Date
Version#6.xx (Version of software) EMPLOYEE SELECTION Time
Esc - Cancel F1 - Help F7 - Clock In F8 - Flash Sales F9 -Inventory Inquiry
F10 - Lock System
*Flash Sales gives you an overview of your current sales etc.
If you are lucky enough to gain access to the second associate menu then you are able to enduldge in the real fun. When the sale's associate chooses #1 (Make Sale) then you get a window prompting you to enter the last few digits of a the customer's last name. then you go thru select their name if they are in the computer or enter it if they are not. The name's are not on a network between stores, so if Joe Shmoe buy's some thing at store #593 then he wont be on the system at store #266. Once you enter the name information it ask's you to enter the SKU# of the item (thats like the barcode #). then you enter that bullshit and it asks how they want to pay for the item. At this point I chose "Credit Card Other". From there I chose "Mall Card". Then I scanned 3 different type's of cards with magnetic strips on them: California Drivers License, Safeway Club Card, and ATM Card. NOTE: Not an ATM/Debit card, but just a plain ATM card.
Scan#1 Drivers License
A long 16+ digit number scanned accross the screen fallowed by two more numbers separated by "=" signs. It looked like this:
872837428548297879212916=901204=203480
For what these digit's are, or mean I have not figured that out yet. But I believe that the first section of numbers is the drivers license number assigned to the card by the DMV. I came to this conclusion this way.... After cards scan it asks for the last 4 digit's on the card to verify that the # on the strip is the same one on the card. So I scanned it again to try read the #'s as they flew accross the screen a an unbelievabl speed. So first I tried "3480" and it said it was invaid and asked me to scan again. Then I entered "1240" and that was invalid. So I tried "2916" and it was accepted. Then it printed out the recipe and the expiration date of the card
was 9/99. The same expiration date that was printed on the face of the card. Where and how that information is stored on the card will be next on the agenda to figure out.
Scan#2 Safeway Club Card
This time a shorter number that was preceeded with a ";" went accross the screen:
;09230548323
It again asked me for the last 4 digit's of the number. I entered "8323". I didn't check to see if that number was the same on the front of the card, but it again accepted it and printed out a recipe.
Scan#3 ATM Card
This time I chose "Travlers Card" instead of "Mall Card" and the steps described above were the same, accept that after I scanned in the card and entered the last 4 digit's of the number it asked me for a expiration date. And radomly chose "9/99" and it worked like the others.
NOTE: The card #'s used in this article are totaly random and are do not fallow any algorithum.
And that is what has been explored of the Sun Glass Hut International copmuter system. Next will be playing with the email program.
http://kitsrus.com- DIY Electronics. They manufactor mad kits from FM Telefone bugs to other nifty things.
www.angelfire.com/co/SixToed - This site is run by a bunch of pimps who fuck so many bitches that your eyes get soar. They have projects that you can help them with and also are the new host of the friendly fly we call the Pig Fuckers Corner.
www.l0pht.com - a bunch of hackuhs based outta boston. probably the biggest and most known hacking group.
http://www.msec.net - these guys write programs and further the security side of the macintosh os. (site under construction)
http://www.genocide2600.com/~spikeman - basicly tons and tons of apps for mac and pc and unix systems.
http://team2600.blackout.org - macintosh based security applications and dos stuff. good.
This article is for informational purpose only. i (the author) like to learn and to share what i learn. any thing you do is done by and you, and you alone. if you get caught for doing something stupid you can't blame anyone but your self. if you use this article for devious purposes, well you shouldn't. ok nuf said.
This article will show you some basics on UNIX password files. (what ever flavor of UNIX you come across the password files will be somewhat the same so it don't matter much where you find it.) if you don't know where the passwd file is keep then you might want to read up on your UNIX first, cuz the wise one says "to hack a system you must be one with the system," i can not understate the importance of this saying. but if you want to take the risk of being caught then go right ahead, have fun, but i will say i told you so. ok the passwd file is keeped in the /etc directory along with all sorts of other neat things, but i will try to stay on subject.
I came across this nice little password file in on of my many journeys through the wonderful world that is knowing as school computers systems. the identity of the school i am hiding so as not to bring attention to my operations, sorry but you understand =]. each line of the passwd file is cmprised of 7 different segments separated by a colon.
username:passwd:uid:gid:gecos:homedir:shell
username: this is what they logon as. it has to be unique to the user and on most systems it is limited to eight alphanumeric characters.
passwd: is an encrypted representation of the user's password. it uses a one-way encryption scheme that is difficult (but not impossible) to break =]. however if the first character of the passwd field is * (an asterisk), the account is "disabled", the system will not allow logins as this user. if the field is empty then there is no password needed to logon.
uid: is the user ID, a unique integer the system uses to identify the account. the system uses the uid field internally when dealing with process and file permissions; it's easier and more compact to deal with integers than byte strings. therefore, both the uid and the username are pretty much the same thing.
gid: is the group ID, an integer referring to the user's default group, found in the file /etc/group.
gecos: contains miscellaneous information about the user, such as the user's real name, and optional "location information" such as the user's office address or phone number. programs like mail and finger use this information to identify users on the system. incase you care, gecos is a historical name from the 1970s; it stands for General Electric Comprehensive Operating System. GECOS has nothing to do with UNIX, cool uh?
homedir: is the user's home directory, for his or her personal use. when the user first logs in, his or her shell finds its current working directory in the named homedir.
shell: is the name of the program to run when the user logs in; in most cases this is the full pathname of a shell, like /bin/bash or/bin/tcsh.
This is a few lines from the passwd file that i chose for you. if you want the entire thing goto the hotline server illagleX at 24.5.28.31. the file will be in /PC-archives/UNIXtexts/passwd
root:aj3VDq5dM9VqY:0:0:root:/root:/bin/sh
bin:*:1:1:bin:/bin:
daemon:*:2:2:daemon:/sbin:
adm:*:3:4:adm:/var/adm:
dbray:gy.9tp9tO.DfM:500:100:RHS Linux User:/home/dbray:/bin/bash
grumore:GmZ3dQcGPeAnM:503:100:RHS Linux User:/home/grumore:/bin/bash
jdoe:fRvZoFq58HSX6:604:100:Dr. John Doe,some school 203,555-2921,555-8890,
:/home/jdoe:/bin/bash
mwagoner:NZTWzV2p10gNU:602:100:RHS Linux User:/home/mwagoner:/bin/bash
stdnt1::501:501:RHS Linux User:/home/stdnt1:/bin/bash
stdnt3::504:504:RHS Linux User:/home/stdnt3:/bin/bash
stdnt4::505:505:RHS Linux User:/home/stdnt4:/bin/bash
stdnt67:SPOmvXn1fdgHQ:568:568:RHS Linux User:/home/stdnt67:/bin/bash
stdnt68:Hfuj4c81ega2w:569:569:RHS Linux User:/home/stdnt68:/bin/bash
stdnt69:HDY3aCvekVeF6:570:570:RHS Linux User:/home/stdnt69:/bin/bash
One of the first things you should notice or at least the first thing i noticed is that stdnt1 through stdnt3 have their password fields empty. free anonymous entry to the system, hehehe =]. no more need to logon as my self when trying passwords. The second thing to notice is the line with the user jdoe. you can see this user is most likely the sysadmin because he has put his full name, room# and phone# in his gecos entry. since there are no other entries like this it is pretty safe to assume he is the head admin. you can also see in the gecos field for all the other users, "RHS Linux User". the importance of this is that to change what that field says in linux is kind of a pain when running red hat linux, unless you are on a terminal running Xwindows. i know with pretty good certainty that there is only one terminal hooked up to this system, which would be the one directly coming off the box. the only way to setup some high level shit on the system is to be directly connected to it so, Dr. John Doe setup the system. dbray, grumore, mwagoner are admins as well. all admins on this system will have a gid of 100. watch out for them if there on, if you are not suppose to be on and you stick out at all you risk the chance of being caught or at the very least they will find out how you got in and watch for you next time.
If you want to crack the password there is not much to this part of it. you could use your favorite password kracker and let it run and run and run, this works pretty good if the password is a word from the dictionary, but if it is some total random crap (like a good password should be) the kracker will not work very well. my preferred way is to do it the good old fashion way. the good old fashion way is try to guess their password. a good place to start is to use the finger command. to use this you would type: finger jdoe (jdoe would be the user name you wanted to get info on). this should give you some information on the user if they have it filled out. if not then another way is too cd/ to their home director. take a look around and see what you can find in the way of info on them. another very effective way to go dumpster diving at the place you are working on. if you don't find anything to do with the password you might find other neat stuff (i have come across many interesting things while dumster diving, ex. cable boxes, old office equipment, and confidential papers on real-estate deals that some one missed at the shredder). the best advice i can give to you on passwords is to think like your "friend" who has the password and is not giving it to you. be smart about.
Ok, every thing else is pretty much self explanatory. have fun, don't get caught and don't blame me if this shits not right, it should be.
_______af8e4f5________
echo g=ffff:0000|debug
--to get the passwd file for this text goto the hotline server illagleX at 24.5.28.31. the file will be in /PC-archives/UNIXtexts/passwd
+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+_+
www.angelfire.com/co/Sixtoed and www.angelfire.com/co/Sixtoed/pfc.html