home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Jason Aller Floppy Collection
/
432.img
/
PHREAK.ZIP
/
PHOENIX
< prev
next >
Wrap
Text File
|
1980-01-02
|
71KB
|
2,556 lines
*--* Qmodem Session Capture File *--*
*--* Qmodem Capture File 08/30/88 22:58:52 *--*
N
<< Q-scan all >>
< Q-scan General #1 - 100 msgs >
70/100: {BRUCE STERLING
Name: The Trader #36
Date: 10:17 pm Tue Aug 16, 1988
ALL U CYBERPUNKS OUT THERE BRUCE STERLING HAS A NEW BOOK OUT CALLED ISLANDS
IN THE NET.
THE TRADER OF CNY
Read:(1-100,^70),? :
71/100: Scanning
Name: Ship Of Fools #59
Date: 7:38 am Wed Aug 17, 1988
OK, I read about Packet Networks and all that...understood very little. But
scanning makes sense to meWhat's a good scanning program aI download it from?
Am I likely to get 'noticed' by the wrong peoiple when scanning? How can I
do what I want and not get caught? I just want to hack.
■≥/ex
Read:(1-100,^71),? :
72/100: Scanning
Name: Epsilon #12
Date: 8:51 am Wed Aug 17, 1988
Well, there are no programs written for scanning Telenet as of yet (as far
as I know). Tales Gallery is working on one for the IBM, which should be
out sometime soon.
For now, you're going to have to do it manually. Make sure you know how to
hard-break, because Telenet will sometimes wait five minutes before telling
you that the particular address is not reachable.
If you don't get a message in say, five seconds, just break, and it'll
return you to the @ prompt, where you can hit 'd' to abort the attempt.
Read:(1-100,^72),? :
73/100: The Trader
Name: Arcane Hierophant #28
Date: 1:39 pm Wed Aug 17, 1988
I didn't know that he wrote that. Thks for the information
Read:(1-100,^73),? :
74/100: hmmm
Name: The Mentor #1
Date: 6:43 pm Wed Aug 17, 1988
If you like Sterling, check out Eclipse & Eclipse`{XW╫╡ë╔àüσüR⌡╦╥*ZZ╣ley.
The Mentor
Read:(1-100,^74),? :
75/100: They gave me the run around!
Name: Vet-San #83
Date: 9:30 pm Sat Aug 20, 1988
When i tried to find out what switching system we're under where i live,
the gave me the run around! I called the opporator and asked to speak with
the supervisor. When comected i politely asked what switching system we were
under. She asked me why and i said i was doing report for an independant
study class that i took on on computer, and i was currently studying
telecommunications. She said she had no idea of what i was talking about, and
asked for my name. Obiously i didnt give her my real name. She told me to
contact some obscure dude. So i called there and this person didnt know
didly-spit about what i was talking about. So she asks accusingle what my
name was. Sheeeeesh what sorta phone company are we under????? Trying to
get a small piece of information is like hacking an nui!!!! Something that is
sooooooo futile that you'd throw the telephone out the window... Does anyone
have any comments on my failiar?????? Hell i'm pretty sure we're under ESS
anyway, but i'd still like to know what version.
Read:(1-100,^75),? :
76/100: Hah.
Name: Epsilon #12
Date: 9:45 am Sun Aug 21, 1988
Why don't you engineer the number to the frame or SCC offices from, say,
the RSB and ask them. Usually, the offices that handle customer-relations
don't know anything about the switch. Asking the operator won't do you
any good either.
Read:(1-100,^76),? :
77/100: ...
Name: The Mentor #1
Date: 11:46 am Sun Aug 21, 1988
Another successful tack to take is to go there in person. Dress like a nice
little student (hs or college), carry a notebook and a book on the 'History of
the Telephone', and ask to speak to someone in public relations. Have a long
list of prepared questions ready. Start with the history of your local co,
ask a few lame questions like how does tone dialing work versus rotary, then
slip one in about the switch. Ask a few more, say thanks, leave. If you're
lucky you can con them into an improptu tour of the place. Be persistant.
They may have started getting suspicious of phone inquiries, but if you look
like a nice young man (or lady), you won't be confused with those damn hackers.
The Mentor
LOD/H!
Read:(1-100,^77),? :
78/100: ...
Name: Epsilon #12
Date: 3:55 pm Sun Aug 21, 1988
Yeah, then sneak over to one of the terminals and enter a few quick
commands to have all your friends set up in a multi-line hunt group.
Read:(1-100,^78),? :
79/100: to Informants & Undercovers
Name: >UNKNOWN<
Date: <-> INACTIVE <->
N O T I C E
-----------
All Undercover Operatives and
Informants Found in the Phone Network
will be Prosecuted in a Special
Unkindly Fashion.
Read:(1-100,^79),? :
80/100: Undercovers!
Name: Capt Zap #39
Date: 1:07 am Mon Aug 22, 1988
There are a number of persons who have stated that some may employ a number of
persons on bulletin boards. One such person, as most of are aware, is the one
and only John Maxfield. But closer to home, while having a conversation with a
security type of a major phone company, they stated that they have a number of
persons working for them doing nothing more than playing in the boards. Now,
of course the telco police are mainly looking for code rodents and the like,
the also get some of the latest technology and ideas. Not to mention that
there must be a number of cover address used by the telcos to get 2600 and the
like. Just a thought!
Zap
Read:(1-100,^80),? :
81/100: Blah.
Name: Cold Steel #40
Date: 12:12 pm Wed Aug 24, 1988
I was wondering if someone here could recommend a few good Phreak/Hack boards
and also give me the Primarys for them. Leave me the numbers in mail after all
this place is public.
-Cold Steel
Read:(1-100,^81),? :
82/100: i think
Name: Knightmare #21
Date: 9:38 pm Wed Aug 24, 1988
people shold tick to this BBS if you're new. It's turning out great, comparing
to other BBS' i've seen in the past.
Read:(1-100,^82),? :
83/100: ...
Name: The Mentor #1
Date: 7:40 am Thu Aug 25, 1988
There's really not that much out there anymore unfortunately. Every time a
board goes up it goes down within a month. No dedication.
The Mentor
LOD/H!
Read:(1-100,^83),? :
84/100: ...
Name: Epsilon #12
Date: 11:32 am Thu Aug 25, 1988
Death's board's still there if people would ever fucking call.
s
Read:(1-100,^84),? :
85/100: OSUNY
Name: Ship Of Fools #59
Date: 4:51 pm Thu Aug 25, 1988
What's happened with OSUNY? FOr awhile they answered with a phone recording
that they were down temporarily due to techinical problems. Today, its a
pheone co. recording saying the number has been disconnected?
Are they busted, or what?
Read:(1-100,^85),? :
86/100: death
Name: The Mentor #1
Date: 5:56 pm Thu Aug 25, 1988
If Death's board would answer the phone when I called, I'd call it more often.
I always get either a dead line or a carrier with no bbs attached. Or
sometimes his Dad playing warez king, which is kind of amusing...
Mentor
Read:(1-100,^86),? :
87/100: Hmm..
Name: Dark Sorcerer #79
Date: 8:42 pm Thu Aug 25, 1988
Well, I don't know if I've stated this or not before.. but..
A friend of mine (Sorcerer's Apprentice) wrote a hacker that hacks through
Telenet (PCP.) I don't know if he's made it ready for public consumption yet,
as I haven't called him in about a month. It's for the Apple (oh no!) and
seems like a pretty damn good idea to me.
So, how many h/pH boards are left in the nation? I hear a conservative
estimate of about 5 really good ones. Sigh. I guess I was still playing with
Lego's while the "golden age" was flourishing.
Read:(1-100,^87),? :
88/100: phedz
Name: The Leftist #3
Date: 11:36 am Fri Aug 26, 1988
Well, obviously they like where were now coming from, w'eve all matured quite
a bit since metal shop etc.. One reason I say this is because of the lack of
busts lately.. youd expect more people going down, knock oin wood. Yes, there
are alot of users that are informants they are SIMPLE to spot.. they always
give themselves away, if you watch what they post, and the way they word
things, etc.. even if they employ a real honest to god hacker., H'ell still
slip up..watch for it... COld Steel huh?
Read:(1-100,^88),? :
89/100: Lefty.
Name: Cold Steel #40
Date: 4:41 pm Fri Aug 26, 1988
We wouldn't be impling anything would we?
-Cold Steel
Read:(1-100,^89),? :
90/100: Dead's Board
Name: Geo #34
Date: 8:01 pm Fri Aug 26, 1988
How about a little poll? How many have applied for validation on Dead's
board? How many were validated?
Geo
Read:(1-100,^90),? :
91/100: Cold Steel..
Name: Dark Sorcerer #79
Date: 8:30 pm Fri Aug 26, 1988
I have seen this guy before, a long time ago on a board called Club Zero.
The only things I can say to watch for are:
nalmost never posts, and when he does, asks things like "leave me your #, and
I'll call you up and you can give me credit card #'s." If it has an xfer
section, he'll upload old or lame shit so he can download.. (assuming it's on
a credit system.)
Read:(1-100,^91),? :
92/100: death's bbs
Name: Knightmare #21
Date: 9:54 pm Fri Aug 26, 1988
Geo:
Death's BBS is not exactly the all-beginner bbs. Don't get me wrong because
I'm not stating you're a biginnerier. I don't know you. (damn do i hate
outdials, slow) I don't think a poll is such a brilliant idea?!
Read:(1-100,^92),? :
93/100: Apology
Name: Geo #34
Date: 10:46 am Sat Aug 27, 1988
I keep forgetting that body language doesn't cross the net. You probably
got the idea that I had applied for validation on Death's (not "Dead")
board and didn't get it. Well, maybe after I've been around for a while.
'll try to keep down the sarcasm.
Geo
Read:(1-100,^93),? :
94/100: Fractal Music Demo
Name: Geo #34
Date: 10:48 am Sat Aug 27, 1988
I know the Mentor has a policy against posting numbers, but here's one
that's OK. I came across it on BIX, Byte Magazine's conferencing
system. It was posted by mac.tech (Jim Reekes, Apple Computer) on
August 8.
Try 201-644-2332. You'll get a demo of fractal music, generated --
according to the synthesized voice -- in real time, uniquely for
you. I tried it this morning (1045 Eastern time). It's impressive.
Geo
Read:(1-100,^94),? :
95/100: oh.. heh
Name: Knightmare #21
Date: 12:42 am Sun Aug 28, 1988
geo: ok.. no biggy. guesss i was in one of those serious modes or something..
Read:(1-100,^95),? :
96/100: ...
Name: Epsilon #12
Date: 8:24 am Sun Aug 28, 1988
That demo is setup by Bell Labs in Morristown, NJ. It's kind of funny.
It's running on a Sun Workstation.
Read:(1-100,^96),? :
97/100: fractals
Name: The Mentor #1
Date: 10:56 am Sun Aug 28, 1988
Is anyone interested in graphic representations of fractals (like the
Mandelbrot set)? A friend of mine is doing some work on a VAX exploring areas
of Mandlebrots that appear to have stable orbits. Each run takes about 10
hours of VAX 8600 CPU time...
Mentor
Read:(1-100,^97),? :
98/100: Gawd..
Name: Epsilon #12
Date: 9:17 pm Sun Aug 28, 1988
Fractals on your basic plain vanilla IBM 8088 based machines take days..
What exactly are they doing that makes them take so much CPU time?
Read:(1-100,^98),? :
99/100: Yeah . . .
Name: Amadeus #96
Date: 4:46 pm Mon Aug 29, 1988
Yeah, I remember just two years ago there were over a hundred phreak boards
known to me. I wrote them all down in my notebook which I still have (with
all the BBS numbers intact!) Maybe there's a separate community of
phreak/hackers still out there existing in a different world than us.
But back then boards went up and down faster than a roller coaster . . .
Read:(1-100,^99),? :
100/100: ...
Name: The Mentor #1
Date: 5:26 pm Mon Aug 29, 1988
re: Fractals
They do hundreds and hundreds of floating point math calls to compute each
pixel. Verrrrryyyy CPU intensive.
re: Phreak Boards
I can name on two hands the number of *good* phreak boards that were up. Codes
boards went up and down real fast. But yeah, things have slowed down some. I
don't think there could be much of a phreak world that we wouldn't have run
into somehow. I'm sure there are isolated packets of people (DPAK for
instance) that aren't in the mainstream, but I don't think there's that much
out there unknown.
Mentor
lodh
.s
damn, you'd think I wouldn't do that on my own board, wouldn't you?
Read:(1-100,^100),? :
Post on General? No
< General Q-scan done >
< Q-scan Telecommunications #2 - 94 msgs >
80/94: Federal Agents
Name: Dark Sorcerer #79
Date: 10:59 am Wed Aug 17, 1988
Hmm... well, I'd like to think that if there weren't any codes or cards on a
board, they couldn't shut it down, but I'm always drawn back to that one quote:
"Real pirates know that the disclaimers on BBS' accomplish little more than
wasting a few bytes of space.."
so disclaimers don't help. hmmm.. what does then?
Read:(1-94,^80),? :
81/94: !
Name: The Mentor #1
Date: 6:45 pm Wed Aug 17, 1988
I purposely made this board UNsecure so that anyone who was interested in
hack/phreaking could get on and learn more... hopefully it's not going to come
back and burn me.
The Mentor
LOD/H!
Read:(1-94,^81),? :
82/94: evidence
Name: Just Ice #82
Date: 1:58 am Thu Aug 18, 1988
If one was busted, I heard computer text can't be admitted as evidence in
court. Anyone know if there's any truth to that??
-Ice
Read:(1-94,^82),? :
83/94: ...
Name: Epsilon #12
Date: 11:43 am Thu Aug 18, 1988
Of course this board isn't secure. The idea of a board like this is to
educate the masses, which could be anyone.
√1╔ì┘àæΘBèj╩ób≥àÜJb·╥┌┤j
84/94: back to...
Name: The Mentor #1
Date: 11:52 am Sun Aug 21, 1988
Back to telecommunications... ANI or Epsi or Thrash, please clarify the
following for me. What are *all* the possible methods available to an
enterprising hacker for
a) Monitoring calls
b) Doing an interrupt into a busy line
Please include a *short* one or two line explaination of each. I'll explain
later.
The Mentor
LOD/H!
Read:(1-94,^84),? :
85/94: ...
Name: Epsilon #12
Date: 4:21 pm Sun Aug 21, 1988
Ok, I'm going to be quite rediculous. I don't think anyone will
actually try some of these methods, but I'm sure they could work with a
little time and a bit of dedication.
1) Monitoring A Call..
a. Voice.
1. Local. Go to your junction box (with your test-set of course), identify
the DN of the person you wish to monitor (using the ANAC, Automatic
Number Announcement Circuit, for your exchange), attach your test-set
and listen.
Use a telco computer system to monitor a line successfully. We won't
mention which one, of course.
2. Long Distance. I see no effective way of doing this. Does anyone else
have any ideas? Please, no rem0bzz!!!!111
b. Data.
1. Construct a cable with two alliagtor clips on one end, and a modular
socket on the other. Go to your junction box, with a laptop terminal
and a modem (if not built into the terminal), and plug the modem into
the socket end of your cable. Turn on your machine, and put your
modem into transparent mode. This should work. Shouldn't it?
2. No other ideas.
2) Performing An Emegency Interrupt.
Note - This should actually be subtitled 'Performing An Interrupt
Request', because there are not any known methods of gaining
access to any verification equipment as of yet.
a. Call the operator by pressing the '0' key located between the '*'
and '#' keys on your telephone keypad, or by placing your finger in
the appropriate position for '0' on your telephone rotary-dial, and
proceeding to dial. (Aww, am I insulting your intelligence?)
Tell the operator that you wish to have NPA+NXX+SUFF (number) interrupted
on emergency. Give the operator your name, and she will take care of the
rest.
b. With your blue box, seize a trunk, and proceed to dial the routing of
the inward for the area of the line which you wish interrupted (in MF
of course). Tell this inward that you have an interrupt request from
<Your Name>. The inward will perform the interruption, and tell you
if the interrupted party wishes to reliquish their line.
I hope this all helps, because I will be extremely angry if I typed this
whole message for absolutely nothing whatsoever.
Epsilon!
Read:(1-94,^85),? :
86/94: Lunatic Labs!
Name: Capt Zap #39
Date: 1:10 am Mon Aug 22, 1988
All I said that it was heresay. Not fact, but would think that if they are
running codes, then thats why the major scutiny! They do not like code boards.
No if, ands, or but's, they hate them and go for them like sharks feeding!
Zap
Read:(1-94,^86),? :
87/94: Well..
Name: Dark Sorcerer #79
Date: 7:19 pm Mon Aug 22, 1988
What else can they go for? As long as a board doesn't have any VISA's or
Metr0z! on it, they can't do a lot in most cases... am I correct?
.s
Read:(1-94,^87),? :
88/94: also
Name: The Mentor #1
Date: 7:41 pm Tue Aug 23, 1988
I'm also interested in REMOBS, Fortell, and LMOS as far as monitoring
possiblities go...
The Mentor
Read:(1-94,^88),? :
89/94: Monitoring
Name: Thrash Verify #49
Date: 11:32 pm Tue Aug 23, 1988
Humm well as far a monitoring lines go LMOS is about the best bet, I really
don't want to go into the directions but I know I've talked to you about it.
As to ReMobs donno about them ever since I've been around everyone hase talked
about "REMBOS" but I have never had one.. I Don't know if there is actually
REMOBS that exist I think ANI may be able to clareify this!?
And fortell is just for testing lines I have a bunch of them so ~{ive me a
call and I'll give you a few..
Thrash
Legion of D00M/Hackers!
Read:(1-94,^89),? :?
Read:number
<CR>=next
T:itles Q:uit
P:ost A:uto-reply
R:e-read B:next board in N-scan
Read:(1-94,^89),? :╤Mc≥
90/94: ...
Name: Epsilon #12
Date: 9:01 am Wed Aug 24, 1988
Fortell systems are just used for your basic remote loop testing type thing.
the closest thing you can get to monitoring a line, I believe, is having
the system tell you if there is voice on the line, or whether or not that
particular loop is in use. I forgot the commands. Oh well.
Epsilon
Read:(1-94,^90),? :
91/94: ...
Name: Necron 99 #9
Date: 5:45 pm Thu Aug 25, 1988
KILL THAT FUCKING MESSAGE NOW! WE DON'T NEED THAT KIND OF SHIT.
MATTER OF A FACT, KILL WHOEVER POSTED THAT AS A WARNING TO OTHER
MORONS WHO TRY. THIS IS A FUCKING PUBLIC SYSTEM, PEOPLE. GET A
FUCKING MIND, FOR FCHRIST'S SAKE.
Read:(1-94,^91),? :
92/94: ...
Name: The Mentor #1
Date: 6:02 pm Thu Aug 25, 1988
To: Crystal Knight
Subj: REMOB PIN#
I'll assume you were either on acid or just asleep when you posted that
number/account on this sub, so I haven't deleted your account, just the
message. If I ever see anything like that happen again, I promise I will hunt
you down and kill you.
Clear?
The Mentor
LOD/H!
Read:(1-94,^92),? :
93/94: Can you phreak from a hotel..
Name: Rockin Dude #18
Date: 3:44 pm Fri Aug 26, 1988
using a blue box without being caught. Cause I'm going to be away for a
while in a hotel and I want to call so will it work. Later
Rockin Dude
Read:(1-94,^93),? :
94/94: remobs
Name: >UNKNOWN<
Date: <-> INACTIVE <->
epsilon is correct, the only monitor function of 4tel 'test ok-monitor'
allows the central office line tester (colt) to check for speech, silence, or
permanent signal on the line. the 4tel can then relay that info to a human. it
does not let a human listen.
this info comes from the company that makes 4tel, so it's not like i am
posting anything illegal. I am paying for the call to this bbs, and I believe
that this post is just an example of me speaking within my rights.
ANI-F
Read:(1-94,^94),? :
Post on Telecommunications? No
< Telecommunications Q-scan done >
< Q-scan Electronics #3 - 27 msgs >
26/27: Bridging Equipment
Name: Arcane Hierophant #28
Date: 2:05 pm Wed Aug 17, 1988
Correct me if I am wrong, but wouldn't it be easy to build a "box" of
sorts to do the work of the expensive equipment you seek? The same
technology found in those funky phones that let you conference all
three of your lines could be used. I am no expert on electronics, but
I will look into this to see if it can be layed out as well as it can
on a BBS. It would be interesting to have a legal Bridge to use, or
better yet, one with protection to keep undesirable types out.
the Arcane Hierophant
Read:(1-27,^26),? :J
Read:(1-27,^26),? :Q
< Electronics Q-scan done >
<<Global Q-scan done>>
Phoenix Project Menu:
A:dd to BBS List B:BS List C:hat w/ The Mentor D:efault
E:mail Send F:eedback to sysop G:Files H:Macros
I:nfo on Phoenix J:Purge Messages K:ill old Email L:og of Callers
M:ail Read N:ewscan O:ffline P:ost
Q:uickscan board R:emove Messages S:can Messages T:ranfer Section
U:serlist V:ote W:rite Auto-Message X:pert Mode
Y:our Information Z:Global Purge *:Board Menu $:Change Password
/O:Fast Logoff /E:Multiple Email ?:This Menu
T - 00:24:34
[1] [General] :O
Hangup? Sure? No
Phoenix Project Menu:
A:dd to BBS List B:BS List C:hat w/ The Mentor D:efault
E:mail Send F:eedback to sysop G:Files H:Macros
I:nfo on Phoenix J:Purge Messages K:ill old Email L:og of Callers
M:ail Read N:ewscan O:ffline P:ost
Q:uickscan board R:emove Messages S:can Messages T:ranfer Section
U:serlist V:ote W:rite Auto-Message X:pert Mode
Y:our Information Z:Global Purge *:Board Menu $:Change Password
/O:Fast Logoff /E:Multiple Email ?:This Menu
T - 00:24:27
[1] [General] :O
Hangup? Sure? Yes
Thanks for calling! Keep your line clean...
*--* Qmodem Capture File 08/31/88 01:20:03 *--*
N
<< Q-scan all >>
< Q-scan General #1 - 100 msgs >
99/100: isolated groups?
Name: Ground Zero #78
Date: 10:21 pm Mon Aug 29, 1988
heh, I have heard of a lot of groups.
Just call a bridge, and you'll hear
of a lot. Or a mailbox. SOmeone left
a message on my box saying "You mess with me, you mess with every member of
(Group's name here)". Sheesh..
Ground Zero
Read:(1-100,^99),? :
100/100: the
Name: The Mentor #1
Date: 11:14 pm Mon Aug 29, 1988
The funniest message I have seen from a group was on the 414 Tech. Net from a
guy named King Arthur. He explained that the board had been banned by the
414 Demons (or some other lame group name, Epsilon might remember it.) and
that they were preparing to let loose their wrath. Sounded like something
Oryan Quest would post...
"If I don't get FULL access to MSP I will UNLEASH with FULL force..."
Quest '86
Mentor
Read:(1-100,^100),? :
Post on General? No
< General Q-scan done >
< Q-scan Telecommunications #2 - 94 msgs >
< Telecommunications Q-scan done >
< Q-scan Electronics #3 - 27 msgs >
27/27: ...
Name: The Mentor #1
Date: 11:59 am Sun Aug 21, 1988
I was interested in a build-your-own loop kind of thing. Let's say you have a
junction box out in the middle of nowhere (a new subdivision or something, eh
Thrash?) and you'd like to set up a loop on it...
Ok, you've got two lines, each with a Receive and Transmit line (r1,t1, r2,t2)
. Now, the problem with just wiring the two together is that when one rang
and answered, the other would also, as the voltage drop would effect both
lines, so unless you can keep the other line stable, people would have to call
simotaneously to get it to work.
Ok, I think I can get around this with a resistor... plug a 30 Ohm resistor in
there and make sure it's pointing *away* from line 2. That would keep the
voltage steady as a drop can't travel the wrong way up the resistor.
My problem now is, how do I get the lines to answer automatically? Rig up a
small switch triggered by the ring? If so, what would it need to do to pick
up a line?
The reason I'm asking is that a local loop is an invaluable social engineering
tool. Four or five times in the last week I've gotten people to the point of,
"Ok, I'll go find out what you need, give me a ringback number." Since I've
already been impersonating someone local (for a variety of reasons I won't go
into), I can't give them a loop in 618 and expect them to buy it.
The Mentor
LOD/H!
Read:(1-27,^27),? :
Post on Electronics? No
< Electronics Q-scan done >
< Q-scan Packet Switched Nets #4 - 77 msgs >
66/77: Hey Nec
Name: Epsilon #12
Date: 8:54 am Wed Aug 17, 1988
I can be equally as obnoxious as you can, so phhhhtt..
Knightmare - No, I'm afraid I don't know how the X.25 protocol is converted
to ASCII format.. I should read up on that a bit.
What are you planning to do, build your own PAD?
Read:(1-77,^66),? :
67/77: Oh.. joy.
Name: Dark Sorcerer #79
Date: 11:01 am Wed Aug 17, 1988
With my luck, by the time i find out, everyone else will be getting NUI's too.
So, when do you want to discuss this, eps?
.s
.shit <used to gbbs>
Read:(1-77,^67),? :
68/77: ...
Name: Epsilon #12
Date: 6:06 pm Wed Aug 17, 1988
Don't worry. It's not working correctly from what I hear right now, so
there's really not much of a point in discussing it.
Read:(1-77,^68),? :
69/77: Welp.. okay.
Name: Dark Sorcerer #79
Date: 10:01 am Sat Aug 20, 1988
Whatever.
Read:(1-77,^69),? :
70/77: X.400 vs X.25
Name: >UNKNOWN<
Date: <-> INACTIVE <->
Does anyone here even know the workings of a packet net such as the
protocols used to bring things about to the right place?
Overseas they seem to7use{X.400 and here we're using X.25.
I don't know this... but what are the differences of X.400 and X.25?
I think there was some documentation on this on several of the network
{information centers... if you don't know about those then don't
bother asking.
Read:(1-77,^70),? :
71/77: Hmm.
Name: Epsilon #12
Date: 11:21 am Mon Aug 22, 1988
You sure about that? I was always thinking that the other networks, over-
seas, also used the same X.25 packet protocol. Great, now I'm confused.
Thanks a lot. :-)
Read:(1-77,^71),? :
72/77: Packet Routing
Name: Epsilon #12
Date: 11:40 am Mon Aug 22, 1988
Alright. Whoever asked about how packets get to the right place..
All packets sent have some data at the beginning called a header. Each
header contains the origination and destination virtual addresses of the
packet, along with some other information.
When the packet is sent, the header gets stripped off, interpreted, and
the data is received in its entirety at the destination host.
Read:(1-77,^72),? :
73/77: x.25 documentation
Name: Knightmare #21
Date: 1:53 pm Mon Aug 22, 1988
i have some x25 documentation, i have about 75k of it, the other 20 k is lost
in space. But I'm sure I can get the rest of it. (of one of those inofrmation
centers) Epsi, no, i'm not bulding a pad.. it's for something else which you
already kno about.
Read:(1-77,^73),? :
74/77: x.400
Name: Mr. Slippery #5
Date: 12:34 pm Sat Aug 27, 1988
X.400 is a mail transfer protocol. It specifies how to address mail and
such. It is therefore level 7 (I think) of the 7 layer OSI model. X.25
is the lower 3 (4?) layers of the model. Hope this helps.
Read:(1-77,^74),? :
75/77: level 7???
Name: Knightmare #21
Date: 12:45 am Sun Aug 28, 1988
If i recall correctly I didn't think level 7 was transfer protocals or anthing
associatd with transfers. Level 7 is what happens with the information after
it reaches the user and is stripped. It's been a while since I've updated
myself to standards so I may be wrong. You can say x.25 is 3 or 4. no wrong or
right answer to that one.
Read:(1-77,^75),? :
76/77: Way way back
Name: Amadeus #96
Date: 5:00 pm Mon Aug 29, 1988
This response goes way way way way back:
Autonet from Telenet: 03124002709
Other Telenet nums: 1-800-238-0631 (2400 baud) 1-800-225-6751 (all bauds 2400
and below, pcpid or nui required)
Tymnet from Telenet: 51331 or 031249
Later . . . Amadeus
Read:(1-77,^76),? :
77/77: ...
Name: Necron 99 #9
Date: 7:10 pm Mon Aug 29, 1988
i need a list of all the gateways off telenet (mainly hte intl things, the
ones that you have to do soemthing like 311051300013 and so on)
any takers? most of this is fairly public, but i lost my old lists.
please reply in mail if not a pulic gateway.
hm. that would be "public"
Read:(1-77,^77),? :
Post on Packet Switched Nets? No
< Packet Switched Nets Q-scan done >
< Q-scan VAX/DEC #5 - 39 msgs >
25/39: VAX!
Name: One Man Army #69
Date: 12:44 pm Wed Aug 17, 1988
I logged on to a vax but i am good with
HP-3000's & UNIX
I don't know shit about VAX i heard
alot of things but i'd rather here
it from someone who knows what there
talking about because i know some
texted files i read that have alot
of INFO!,about them but texted files
are people scrapping but BS!.
PS=Give me some info on it....LatRer!
.es
Read:(1-39,^25),? :
26/39: One Man Army
Name: Epsilon #12
Date: 6:08 pm Wed Aug 17, 1988
If you'd like us to help you, first you must tell us what you wish to
know. VAX/VMS is a fairly big system, and an explanation cannot be
furnished in one post.
Thanks.
Read:(1-39,^26),? :
27/39: VAX
Name: Professor Falken #56
Date: 7:27 pm Thu Aug 18, 1988
I'm also a beginner with VAX systems I've screwed with it's phone option and
such but thats about all. Is there a way to corrupt the system with out
writing/editing access ? Also I've found some VAX but I don't know any VAX
defaults could someone supply some ?
Read:(1-39,^27),? :
28/39: ?
Name: The Mentor #1
Date: 9:58 pm Thu Aug 18, 1988
Define 'corrupt the system'...
The Mentor
LOD/H!
Read:(1-39,^28),? :
29/39: ...
Name: Epsilon #12
Date: 9:44 am Fri Aug 19, 1988
Why would you want to 'corrupt the system'?
Read:(1-39,^29),? :
30/39: ...
Name: Necron 99 #9
Date: 8:05 pm Fri Aug 19, 1988
because he's bored.
and it's not unix.
Read:(1-39,^30),? :
31/39: don't do that
Name: >UNKNOWN<
Date: <-> INACTIVE <->
Don't fuck up the system. It takes little talent or skill to fuck
something up. For instance, on a Novell network connected by thinwire cable,
if you take the T-connector off of the file server, all other systems will not
work. That is obvious. Learning how to work the OS, and becoming familiar with
the machine and how it works is much more interesting. I do work on a MicroVAx
(legal work, that is) and I'd hate to see someone fuck it up because they were
bored, or for any other reason.
ANIF
Read:(1-39,^31),? :
32/39: CHOICE OF WORDS
Name: Professor Falken #56
Date: 6:30 pm Sat Aug 20, 1988
I guess my choice of words was wrong for that situation. I meant to imply
something like edit/make user records. Sorry if I had ya thinking I'm gonna
demolish somehting...
Read:(1-39,^32),? :
33/39: ...
Name: The Mentor #1
Date: 6:52 pm Sat Aug 20, 1988
To create a new account under VMS.
$set default sys$system
$run authorize
>add <acctname>/UIC=[xxx,yyy]
>modify <acctname>/password=(<desiredpw>,"")
That's it... simple, huh?
The Mentor
LOD/H!
Read:(1-39,^33),? :
34/39: how good..
Name: Knightmare #21
Date: 1:58 pm Mon Aug 22, 1988
would you say a VAX/875 is? Personal reasons.. Some defaults for VAX..
demo/demo (obvious)
user/user
Hey, they're mostly all the same. Try the OBVIOUS ones..
Read:(1-39,^34),? :
35/39: DECVAX Defaults
Name: Epsilon #12
Date: 11:23 am Tue Aug 23, 1988
VAX/VAX VMS/VMS DCL/DCL DEMO/DEMO TEST/TEST HELP/HELP NEWS/NEWS GUEST/GUEST
GAMES/GAMES DECNET/DECNET* SYSTEST/UETP/SYSTEST FIELD/SERVICE/TEST/SUPPORT
SYSTEM/MANAGER/OPERATOR DEFAULT/USER/DEFAULT
* - Sometimes, if you attempt to login with DECNET, the system will respond
with - 'Not authorized to login from this source' or something like
that.
Defaults courtesy of Lex Luthor's hacking VAX/VMS files.
Oh, always try common first names..
Read:(1-39,^35),? :
36/39: DECVAX Defaults
Name: Geo #34
Date: 8:09 pm Wed Aug 24, 1988
Where VAXes serve large undergraduate populations, there's usually a standard
approach to accounts and password creation. For example, at my school, a
student's account is always first initial+last name, e.g., JSMITH or JBLOW.
The original password is the student's student number. Most never change it.
This means instructors -- who have class rosters with student numbers -- can
impersonate most students. Students who glance at instructors' grade sheets
can usually do the same. If you want to start guessing and you're near a
school, don't bother. Just ask a student. Most don't use their accounts
anyway.
Geo
Read:(1-39,^36),? :
37/39: ...
Name: The Mentor #1
Date: 7:42 am Thu Aug 25, 1988
Another easy method of obtaining pw's on academic systems is to hang around
the main terminal room near the beginning of the semester. There are *always*
people who need help logging in... and they are more than happy to share
their pw with anyone, not realizing exactly what they're doing.
The Mentor
LOD/H!
Read:(1-39,^37),? :
38/39: Some interesting VMS commands
Name: Ani Failure #50
Date: 12:13 pm Sun Aug 28, 1988
For those of you interested in the VMS OS, here are a few commands that I
consider interesting (plus I have never seen then in a file or a post
anywhere).
$ SHOW LOG
This will show the system logicals, for instance one may be DISK1. DISK1 is
like a variable that translates to DUA0. DUA0 can be a name for a disk, I
think Disk Unit driver A section 0 or something like that. Anyway, the use of
logicals saves time. Also, logicals with a dollar sign in them are DEC
standard logicals, I don't believe that SYSTEM or anyone else can put in a
logical with a dollar sign included. For instance, SYS$SYSTEM, SYS$SYSROOT,
SYS$MANAGER, etc. are all installed with the OS. SYS$MANAGER may 'translate'
to DUA1:[.SYS]SYSMAN (that is not exactly correct as I am posting from
memory). So to enter this directory, you can type $ SET DEFAULT SYS$MANAGER.
This will take you to the directory that the logical is defined as. Also,
logicals can be defined to other logicals, making changes quick and easy.
$ SHOW PROCESS/ALL
This one shows a lot of interesting info, status info, etc. Also, if you have
terminal emulation, try SHOW PROCESS/CONTINOUS. This will make a full screen
display of the process and will show you as status information changes by
updating the field area.
Also, try the following to list intersting COM files:
$ SET DEF SYS$SYSTEM
or
$ SET DEF SYS$MANAGER
then
$ DIR *.COM/OUT=SYS$LOGIN:filename
This will make a directory listing of all the COM files in the directory you
are set to, and will write the output to your home directory (at login) to the
filename you specify. You can then type the file and then type the com files
you want to see. Many dealing with DECnet and networks are very interesting.
ANI-F
LOD
Read:(1-39,^38),? :
39/39: ...
Name: The Mentor #1
Date: 5:28 pm Mon Aug 29, 1988
The logicals are shorthand for directories or commands. Ferinstance, if you
tired of typing $SH US for show users you can do the following
$u :== "show users"
and from now on you'd just type $u.
/ed
Read:(1-39,^39),? :
Post on VAX/DEC? No
< VAX/DEC Q-scan done >
< Q-scan Unix #6 - 82 msgs >
66/82: 3.2
Name: Epsilon #12
Date: 8:57 am Wed Aug 17, 1988
That's the version that allows you to enter shell commands from within the
chat, eh? Yeah, I have that also. Quite nice actually. Check out my chat
monitor. It's so incredibly simple, but I liked it.
/guests/edward/bellcore/chat.mon
It takes this file, and announces that the chat is being monitored, then logs
itself in anonymously, and logs all the sessions to chat.log.
Read:(1-82,^66),? :
67/82: UNix Defaults
Name: Professor Falken #56
Date: 4:54 pm Wed Aug 17, 1988
Could someone please give me some unix defaults? I'm new to hacking unix and
am giving it a try. Is investing in a UNIX book gonna do any good ? Like maybe
teach me some basic shit ? Or should I stick to phreak/LOD files ?
- Falken
Read:(1-82,^67),? :
68/82: Starting Unix
Name: Epsilon #12
Date: 6:12 pm Wed Aug 17, 1988
If you want to look at G-Files, you might as well read The Prophet's
'UNIX From the Ground Up' series. That is the most thorough as far
as files are concerned I believe.
As far as books go, try 'UNIX Primer Plus' by The Waite Group is great
for starting. Others may go into more detail, so you may want to check
those out after you've done the basics.
Read:(1-82,^68),? :
69/82: UNIX books
Name: Mr. Slippery #5
Date: 9:54 pm Wed Aug 17, 1988
UNIX System Security by Wood & Kochan is highly recommended as an intermediate
book. I've found some useful hints in it. For example, if you wind up in
a restricted shell and you have access to certain commands such as cp
you can break out of the restricted area into a non-restricted shell.
Read:(1-82,^69),? :
70/82: Thanks
Name: Professor Falken #56
Date: 7:29 pm Thu Aug 18, 1988
Thanks I'll give those a try, by the way where can I find the Prophets work ?
Is it in phrack ? LOD ?
Read:(1-82,^70),? :
71/82: ...
Name: Epsilon #12
Date: 9:45 am Fri Aug 19, 1988
I'm sure you can find Prophet's files on any board with a decent GFile
library, like P80 or something.
Read:(1-82,^71),? :
72/82: Hahahahah
Name: Thrash Verify #49
Date: 9:58 am Sun Aug 21, 1988
Like P-80? No there is no feds{on there hay call Atla. too..
hahahaha
if you want good unix books check out a book called UNIX the complete
reference. it's exelent..
Read:(1-82,^72),? :
73/82: ...
Name: Epsilon #12
Date: 4:24 pm Sun Aug 21, 1988
I didn't say there were no feds there, I said they had a lot of GFiles.
Stop laughing at me.
Call Atlantis at 804/355-7327. The most secure board on earth.
Bah
Read:(1-82,^73),? :
74/82: isn' atlantis down?
Name: Knightmare #21
Date: 2:02 pm Mon Aug 22, 1988
Epsi, isn't Atlantis down? Shit, I called it about 2 weeks ago and a recording
told me the nuber was disconnected, shiT! i'll try again.. or are both of you
just bullshitting?????
heh
Read:(1-82,^74),? :
75/82: ...
Name: Epsilon #12
Date: 11:25 am Tue Aug 23, 1988
Ehh. I really could care less. I called that board once, and I was
disguested, so I never called back.
Read:(1-82,^75),? :
76/82: cosmos commands
Name: Knightmare #21
Date: 6:49 pm Tue Aug 23, 1988
Someone help me with MMC? What are the options after issueing the nukber to be
modified? Also, are there any help files online other than TAT? (Read
somewhere that there aren't)
Thanks/.
Read:(1-82,^76),? :
77/82: life.
Name: Shark #111
Date: 5:20 am Sun Aug 28, 1988
...Just got an account on a Sequent machine, running DYNIX, a 4.3bsd/SysV
hybrid. It uses something like 4 (or more, depending on how much money
you have) 80386s for co-processing. '86 code on a supermini!Ha! Well,
it's nice, anyway...
...anyway, nifty trick number eight-hundred and thirty-six for gaining
Unix passwords, which I think I mentioned before on another systemv{
In environments where an installation has lots of users - an academic
environment is a good example - you'll have some brainless people who botch
the job of logging in. A common mistake is to enter one's password as one's
login name.
How does that affect you? A suprising number of systems keep a 'badlogin'
file; called /some-path-or-another/BADLOGIN or something similar. You can
often easily find the path for this file by running 'strings' (if your
system has it) on the login binary. (digression: 'strings' is a utility
which prints all ASCII strings found in whatever file you pass as an
arguement. I don't know how many systems have this utility installed).
So anyway, this BADLONG text file is an accounting of all bad login tries,
with times, ttys, etc. Naturally, if your system administrator uses something
like the last six digits of the user's Social Security number, a line
like 'bad login:654392 at xxxxxxx' is a tip-off! Another pattern I've
seen is the following:
bad login:JOEL at xxxxxxxxxx
bad login:JOEL at xxxxxxxxxx
bad login:B4QLZY at xxxxxxxxxxx
bad login:JOEL at xxxxxxxxxx
now here, the unfortunate Joel had his 'caps lock' key down; most of the
time this is a no-no. Since 'JOEL' didn't work, he tried his password as
his login; all you need to do is try 'b4qlzy' for the 'joel' account and
you'll most probably get in!
On to other things: since this is my first call to this system, I noticed
somebody mentioning a desire to get their hands on SF Drake's hacker.
He published the source in his magazine, W.O.R.M. On the outside, the hacker
looks very very nice (pattern matching, full-name field parsing, backwords
login and name attempts, all SORTS of neat things are supported) but it's
a C programmer's nightmare on the inside as he just learned the language.
I know because he installed inder my account and I got to convert it to
Unix C from Lightspeed C, which he wrote it in on his Mac II...
Anyway, I'll try to post something intelligent next time...
shark
Read:(1-82,^77),? :
78/82: About the elmos
Name: >UNKNOWN<
Date: <-> INACTIVE <->
Mentor, there is a main LMOS system, the 'LMOS back-end'. This is an IBM
mainframe system, I believe they can be run on a VM 370 type. The 'back-end'
is what stores all the LMOS database information, such as the Abbreviated
Trouble History (ATH), Trouble History (TH), Special Services (SS), Associated
Number (AN), etc. Also Main Line Record (MLR) comes from the LMOS back+end.
The front end is the unix type system, and it communicates to the back end
with a series of programs that I believe are written in C. There is usually
one LMOS back end per BOC, and then several front ends, and cross front-ends
(xfe's) that the repair service attendants enter info into.
For more reading, check out a 1982 issue of the Bell System Technical Journal.
ANI-F
$LOD$
Read:(1-82,^78),? :
79/82: Rampart
Name: The Whacko Cracko Bros. #114
Date: 11:22 pm Sun Aug 28, 1988
Whats going on guys, long time no see.. Anyway has anyone heard anything or
gotten any further than the first file i wrote on Rampart? If not i will
upload the second file.... Also, Ole' BootLeg sent me box's of docs for vax
& Unix systems.. I already know the pretty good, so im willing to donate the
to the new magazines around town.. Whichever mag. wants them im willing to
donate them if you pay the postage. By the way, has anyone heard from Bootleg
i really need to get in touch with him... Later T.W.C.B. Inc.
Read:(1-82,^79),? :
80/82: lmos
Name: The Mentor #1
Date: 5:30 pm Mon Aug 29, 1988
Ummm, ANI, let me rephrase. Saying there is a main LMOS is like saying there
is a main VMS. There is a main Loop Maintainence *System* that *runs* LMOS.
See what I mean? It's a matter of semantics. There are a lot of people out
there who have no idea what the difference is in an operating system and the
computer running it... I'm just trying to be clear.
The Mentor
LOD/H!
Read:(1-82,^80),? :
81/82: uuuuuuaaaaaaaagggghhhhhhh
Name: Necron 99 #9
Date: 7:14 pm Mon Aug 29, 1988
shut up about lmos! just forget about it! don't call mention it again, for
get it, or i'll come over to your house, kill you, burn down your house, kill
your relatives, and plow your land over with salt. get it?
some people don't want lmos being talkd about in this, a public medium. and
that person is bell/at&t. keep on, and something you don't want to happen
might.
Read:(1-82,^81),? :
82/82: ummm
Name: The Mentor #1
Date: 11:18 pm Mon Aug 29, 1988
When it comes to talking about LMOS in that broad a sense, Bell can kiss mine
*and* the ACLU's ass. You want to see scary things about Bell? Subscribe to
"Reality Hackers". The latest issue explains in *full* detail- where to order
the equipment, how to set it up, etc... for taking over the signal of your
local TV station. One of the back issues explored some hardcore stuff about
REMOBS, included the numbers of a shitload of them with pin format, etc...
Tim Leary is putting this one out. They're the second people I'll call if I
got hassled about anything on this board (as long as pinheads like C.Knight
don't post any more codes.) The first people are the ACLU. This is America,
for chrissakes. We are *not* talking about shooting the president. We're
talking about phones and the phone system. Take a 'lude, to paraphrase one of
your posts (back when *i* was the paranoid one...)
Mentor
Read:(1-82,^82),? :
Post on Unix? No
< Unix Q-scan done >
< Q-scan Primos #7 - 24 msgs >
18/24: Question...Question
Name: Magic Hasan #64
Date: 10:10 am Thu Aug 18, 1988
Hey PS-
Gosh, what a surprise, you call BBS's now?
<snicker>
-me
Read:(1-24,^18),? :
19/24: reply... to mh
Name: Prime Suspect #70
Date: 12:04 am Mon Aug 22, 1988
Only here if possible. Why should I call elsewhere?
This looks like a promising board full of hacker youth and the...
<ahem> elderly or mature.
Read:(1-24,^19),? :
20/24: EDB - binary editor
Name: Prime Suspect #70
Date: 12:18 am Mon Aug 22, 1988
Try this out for seeing something different:
ATTACH LIB
EDB CCMAIN.BIN
F ALL
If CCMAIN.BIN doesn't exist...just use another .BIN file there
like PFTNLB.BIN or something. These are the libraries loaded when
compiling a program.{Doing an "F ALL" shows you the functions and calls
used in that library.
Kind of interesting for seeing what's available.
Prime Suspect
LOD/H
Read:(1-24,^20),? :
21/24: Elderly and mature
Name: Magic Hasan #64
Date: 1:16 pm Mon Aug 22, 1988
Ah, you mean me.
heh.
Oops, back to Primos:
Here are some dialups of Primos systems belonging to various colleges.
Try the defaults <hint hint>
617-891-2011 / At switch : "connect b" - Bentley College
219-284-4612 - St. mary's College
Remember - think defaults...defaults...defaults...
-MH
Read:(1-24,^21),? :
22/24: ...
Name: Necron 99 #9
Date: 6:48 pm Mon Aug 22, 1988
do NOT post any numbers on here. we've already heard that there may be feds
here, so don't give them ANY reasons to arrest poor loythere.
get it?
Read:(1-24,^22),? :
23/24: Numbers.
Name: Magic Hasan #64
Date: 1:08 am Thu Aug 25, 1988
Necron, good friend -
Let's think back to our bit of law background. It comes back to me that there
is absolutely nothing wrong with posting a phone number. In fact, the numbrs
aren't even private. Much like a wardialer, a phone number depends alot on
what one does with it.
Very innocent,
-MH
Read:(1-24,^23),? :
24/24: ...
Name: Necron 99 #9
Date: 5:51 pm Thu Aug 25, 1988
yeah, fine, whatever, just don't do it again, okay? i'm sure there are some
unscrupulous tupes that may consider that information illegal.
eneough on this subject, let's keep this off the board, eh.
Read:(1-24,^24),? :
Post on Primos? No
< Primos Q-scan done >
< Q-scan HP-x000 #8 - 14 msgs >
8/14: HP3000
Name: One Man Army #69
Date: 1:00 pm Wed Aug 17, 1988
Also I have gotten around by using
HELLO.MANAGER.RJE
Usally theres no pass sometimes!
also
HELLO.MANAGER.ITF3000
HELLO.MGR.TELEACCT
But If you dudes really want to learn
Hp3000's and you need help Super-Nigger From: D-PAK! is good with
them..when it comes to HP TIME!..
Also CONSOLE has alot to do with the
Other users passwords and acct.
And RUNING
a Directory on the acct/pass
its not hard to explain you would
have to be in it to find out...
itsds EAZY,More like talkin to the new
girl on the block...
One Man Army
LaTeR'88!
Read:(1-14,^8),? :
9/14: T-Files on HPx Series
Name: Professor Falken #56
Date: 6:26 pm Sat Aug 20, 1988
I got a file here that Eastwind wrote about HP3000's its pretty good, names a
lot of ways of getting past system security and also has defaults. If anyone
is interested leave me mail and we'll arrange something, or iff possible I'll
upload it to here...
- Falken
Read:(1-14,^9),? :
10/14: HP-INSIDE!
Name: One Man Army #69
Date: 2:28 am Mon Aug 22, 1988
heres what i seen and its not all
that fun on hp's
********************
FILE: K2342321.PUB.ITF3000
FCODE: EDITQ FOPTIONS: STD,ASC
BLK FACTOR: 9 CREATOR: **
REC SIZE: 112(B) LOCKWORD: **
BLK SIZE: 504(W) SECURITY--READ:
EXT SIZE: 56(S) WRITE:
# REC: 9 APPEND:
# SEC: 224 LOCK:
# EXT: 4 EXECUTE
MAX REC: 2000 **SECURIT
MAX EXT: 16 COLD LOAD ID: %23
# LABELS: 0 CREATED: SUN, 21
MAX LABELS: 0 MODIFIED: SUN, 21
11:21 P
DISC DEV #: 2 ACCESSED: SUN, 21
DISC TYPE: 3 LABEL ADR: **
DISC SUBTYPE: 10 SEC OFFSET: %4
CLASS: DISC FLAGS: NO ACCESSO
FCB VECTOR: %0 %0
>
PARAMETERS
acctname Name to be assigned to
PARAMETER)
Read:(1-14,^10),? :
11/14: HP.INFO
Name: One Man Army #69
Date: 2:44 am Mon Aug 22, 1988
e
END OF SUBSYSTEM
:editor
HP32201A.07.17 EDIT/3000 MON, AUG 22, 1
(C) HEWLETT-PACKARD CO. 1985
/text acctjobs.pub.sys
FILE UNNUMBERED
.SYS 1 SUPACCT.PUB.
.SYS 1 SUPACCT.PUB.
2 FIELDJOB,FIELD .SUPPORT
/
A LITTLE FUCKED UP BECAUSE I WAS
LOOKING FOR SOMETHING ESLE AND IN A
HURRAY..BUT THATS A LITTLE SIGN SEE'IN!
Read:(1-14,^11),? :
12/14: Err. ^
Name: Epsilon #12
Date: 11:17 am Mon Aug 22, 1988
Uhh, that was cute. Mow tell us exactly what the fuck it was. :-)
Read:(1-14,^12),? :
13/14: hp-3000
Name: Crystal Knight #103
Date: 6:27 pm Thu Aug 25, 1988
ya, d-pak got us(Avalon )nightS) a operator account on hp once, but its`long
since dead, i like hp bacuse its easly to learn(online help fi|es) compare to
somethinn like cosmos
Crystal Knight
Read:(1-14,^13),? :
14/14: escape sequences/:tell command
Name: Father Zerchi #88
Date: 1:07 pm Sun Aug 28, 1988
If you happen to have access to a machine that's using an older version of MPE
(I don't know how far back you'd have to go), you might try something like
this:
logged on as FRED.ACCTNG,
With Manager.sys logged on,
:tell manager.sys; <esc>B altuser fred.acctng;cap=sm <esc>D
If manager.sys is logged on to an HP264xx terminal, those escape sequences
will take whatever is received by manager.sys and send it to the computer as
a command if appropriate. The above command would give fred.acctng system
manager capabilities. HP got wind of this and now the
escape sequences are filtered out of the tell commands (works with :tellop
also).
Read:(1-14,^14),? :
Post on HP-x000? No
< HP-x000 Q-scan done >
< Q-scan Engineering #9 - 16 msgs >
16/16: Getting #s
Name: Crystal Knight #103
Date: 11:19 pm Thu Aug 25, 1988
this doesnt seem like the right place, but its what people are talking about
so...
how would i go about getting this #:
a man had a number in '85, but changed it, and the old number was
resubscribed to a new person ...
Crystal Knight
Read:(1-16,^16),? :
Post on Engineering? No
< Engineering Q-scan done >
< Q-scan Programming & Theory #10 - 33 msgs >
30/33: decompiler
Name: Mr. Slippery #5
Date: 10:00 pm Wed Aug 17, 1988
I'd start with a disassembler. There are lots around for various
environments. UNIX adb can print code ('i' option). There are others
around for MSDOS and CP/M at least. Going back to C code is a different
matter. If you have access to UNIX 3B20 source code, there is a
command 'dis' that will disassemble 3B20 code. I hope this helps.
Read:(1-33,^30),? :
31/33: ...
Name: The Mentor #1
Date: 12:01 am Thu Aug 18, 1988
No, I don't want to tackle the machine code... I want to attack the tokenized
object file and rebuild from there... much easier.
The Mentor
LOD/H!
Read:(1-33,^31),? :
32/33: talk?
Name: Knightmare #21
Date: 12:49 am Sun Aug 28, 1988
If anyone is interested in a discussion over in-depth C let me know. I'm
orking on a project and would like to figure out some of my poblems..
Read:(1-33,^32),? :
33/33: C stuff.
Name: Shark #111
Date: 5:34 am Sun Aug 28, 1988
About printing structures...*if* you're printing the contents of a structure
to a file (to be read back in its entirety later) and not to the screen,
you can use the fwrite() and fread() functions. You can easily look up
the format, but if I recall it's something like fwrite(sizeof structure,
pointer to structure, number of structures to write, file pointer).
About passing a variable number of arguments...I haven't been reading
too closely, but I always do it by placing them in an array of pointers
and then passing two arguments to the function: the array, and the number
of arguments in the array.
example:
main()
{
char *stuff[5] = { "I", "love", "8", "year-old", "girls" };
pedo(stuff5);
}
void pedo(argv, argc)
char *argv[];
int argc; /* original names, eh? arrrrrrrrghc! */
{
printf("there are %d arguments, and they are ",argc);
for (I = 0; iargc; i++) printf("%s\n",argv[i]);
}
No, the above code won't work exactly as typed, SORRY...
I pretty much make my living writing C code, and I love to talk about it.
shark
Read:(1-33,^33),? :
Post on Programming & Theory? No
< Programming & Theory Q-scan done >
< Q-scan Phrack Inc. #11 - 42 msgs >
37/42: Non Tech
Name: Arcane Hierophant #28
Date: 2:20 pm Wed Aug 17, 1988
On what grounds are non tech articles received? The automatic boot? I for
one would like to see them reinstated, if only periodicaly. I am of the
opinion that history and trivia from the past are of great importance in
shaping the future. And I am sure things like that increase the distribution
of the rag. And that is one of the main goals in bringing about a resurgance
in the phrack world.
Did anyone ever tell you that it is impossible to edit with this software?
the Arcane Hierophant
Read:(1-42,^37),? :
38/42: ...
Name: Epsilon #12
Date: 6:15 pm Wed Aug 17, 1988
Some Non-Tech articles are great. Really techy, thorough, manual-material
type stuff usually gets put into the Ell Ohh Dee Tech Journals anyway, so
it keeps it in good balance.
Read:(1-42,^38),? :
39/42: Bellcore manual?
Name: Knightmare #21
Date: 6:38 pm Tue Aug 23, 1988
Epsi or Nec, have one you heard about the Bellcore Tech manual? Laser
supposedly has it completedly but I haven't seen it. Any ideas on when it will
be released?
Read:(1-42,^39),? :
40/42: 'BCTJ'
Name: Epsilon #12
Date: 9:02 am Wed Aug 24, 1988
It's on Lunatic Labs. Ask Doc Telecom about it.
Read:(1-42,^40),? :
41/42: ok
Name: Knightmare #21
Date: 9:42 pm Wed Aug 24, 1988
alright think i'm still there? hope so!
Read:(1-42,^41),? :
42/42: hey..
Name: The Whacko Cracko Bros. #114
Date: 11:29 pm Sun Aug 28, 1988
So, who's in charge of Phrack these days. The St. Louis boys couldnt handle it
or what... I talked to Taran awhile back and he said that everyone was
completly out of it.. Anyway where is Craig??
Read:(1-42,^42),? :
Post on Phrack Inc.? No
< Phrack Inc. Q-scan done >
< Q-scan Sociological Inquiries #12 - 29 msgs >
14/29: and more...
Name: Gordon Meyer #57
Date: 12:19 am Wed Aug 17, 1988
Thanks for your replies, helpful info, if you have anything to add later
please do.
Those of you at SummerCon may have heard this, but since I got a few questions
on it I'm gonna repeat it. Just so everyone knows where I am coming from...
I'm a graduate student at Northern Illinois University, obtaining an MA in
Sociology. For my thesis, I'm studying the social world of phreaks and
hackers. As such, I'm *not* interested (at least academically) in specifics
of what and how you do your p/hacking. I am (somewhat) interested in "why"
but mostly I would like to find out what it is like to be involved in these
activities. Make sense? I'm being a little vague, and I'll narrow it as
we progress, but I hope that clears some things up. If you want to know still
more just holler.
I appreciate your willingness to let me "evesdrop" for a while, and thanks for
answering my ?'s so far. If you want to communicate via Email instead of the
base, great! If some of you are willing to talk voice, let me know and I will
send you my number. (or however you want to work that out) I'm into the
"interview" mode right now, but maybe soon.
Anway.....my next question follows.........
Read:(1-29,^14),? :
15/29: who knows?
Name: Gordon Meyer #57
Date: 12:23 am Wed Aug 17, 1988
I understand that because of "questionable legal" methods it is important to
keep your indentity under wraps. But do people (associates) know of your
phreak-hacking activities? I mean, do your friends, parents, teachers,
girlfriend(s) know what you are into? How secretive and concerned are you
about letting people find out?
Any general comments about handles/indentities?
Thanks...
-=->G<-=-
Read:(1-29,^15),? :
16/29: research
Name: Gordon Meyer #57
Date: 12:25 am Wed Aug 17, 1988
I wanted to add this to my other message. As Mentor already knows, any of you
who help me out with this thesis will, of course, be treated in the utmost
confidence. At no time in my thesis will any type of identity be given. That
includes handles, cities, BBS's, etc etc. This has been implied by the fact
that Mentor lets me hang out here, but I just wanted to make it clear.
-=->G<-=-
Read:(1-29,^16),? :
17/29: Friends/Outsiders
Name: >UNKNOWN<
Date: <-> INACTIVE <->
Friends and people outside the hacking community rarely know what it is that
I do. I have a few friends that I've shown, who I trust. Otherwise I try
as much as possible to keep it under.
I know that sometimes I slip and let out something that I know, that I
probably shouldn't have said in the first place.
I think your best bet is to try and keep what you do a secret. My friends
know I'm good with computers, and that's about the extent of what they know.
I can recall one time where I kind of puzzled a telco technician with what
I know. He was kind of wondering why and how I knew what I did. Oh well.
I don't think anything will really come of that.
Read:(1-29,^17),? :
18/29: What?
Name: Arcane Hierophant #28
Date: 2:10 pm Wed Aug 17, 1988
I think the best why to describe the hacker or phreak would be the Thrill
Seeker. At least this is how I see myself in this sort of activity. I get no
perverse pleasure from banging keys all night, but I do enjoy being on top of
a lot of information and able to "break" into other peoples things in the
comfort of my living room. I think many of "us" like to know that we are in
some sort of illegal activity even though the danger we are in is mostly a
grande illusion. My question is what kind of person would want to study other
people for a living. Pretty boring if you ask me, but I guess you're not.
Remember this.
Neurotics build castles in the sky.
Psycotics live in them.
Psychologists collect the rent.
the Arcane Hierophant
Read:(1-29,^18),? :
19/29: ...
Name: The Mentor #1
Date: 6:55 pm Wed Aug 17, 1988
I got into a philisophical chat with Leftist at Summercon about the dangers of
hacking and how foolish it was to do it... the conversation ended with us
simataneously going "but it's soooo much fucking fun!".
That pretty much covers why I do it. I get a real adrenaline rush when I'm
getting into a system, same as I get when I'm programming.
As far as how I relate to other people? Well, like someone else said, there
are a couple of close friends who know what I really do, but that's about it.
My wife doesn't understand it and isn't interested in computers, and my
not-so-close friends just know I'm reallllll good with computers.
My downfall isn't friends, it's complete strangers. I have this weakness for
freaking people out... I had a long conversation with one guy at the gym one
day, explained to him all about blue boxing & how it worked and why we
couldn't do it in our area any more but could up until '85 and so on, then
when I was leaving he told me he ran the computer system at the local CO... he
was pretty cool, though, never heard anything from it and that was years ago.
It just gets tempting to show off to some obnoxious techie type that starts
talking down to you... "Now, do you know what a phone is? Goooooooodddddd."
Bleah.
Read:(1-29,^19),? :
20/29: groups...
Name: Gordon Meyer #57
Date: 11:29 pm Wed Aug 24, 1988
I was looking thru the old issues of Phrack, and found a list of some of the
groups that have existed over the past few years. Obviously I was aware of
some of them, like the LOD/H, and a few others I have run across.
So somebody tell me, what is the purpose of joining a group? What are the
disadvantages? What are the advantages? Isn't p/hacking a solitary activity?
How do the groups help you individually? (or do they? are they more social
than functional?)
Thanks for your attention...
see ya around
-=->G<-=-
Read:(1-29,^20),? :
21/29: groups
Name: >UNKNOWN<
Date: <-> INACTIVE <->
The group exists mainly for information trading. If you trust everyone else
in the group, it is very profitable to pool information on systems. Also, a
group tends to have certain people specializing in certain areas of hacking.
While there is always some overlap, it is nice to know someone you can call if
you need help on operating system X and to have people feel free to call you
if they need help on operating system Y.
Read:(1-29,^21),? :
22/29: Groups
Name: >UNKNOWN<
Date: <-> INACTIVE <->
Trust is a very important part of a group. I think that's blatantly
obvious. You have to be able to trust the other members of the group with the
information you are providing ni order to be productive, and have a secure
situation.
Read:(1-29,^22),? :
23/29: Well..
Name: Dark Sorcerer #79
Date: 8:36 pm Thu Aug 25, 1988
It is often beneficial to form a "c0dez group" or something like that; a bunch
of people who you know you can trust with your information. Let's face it, if
you gave out a <whatever> account, it's going to be up on everyone's VMS
within 12 hours.
Does anyone have any bridges that aren't party lines? all the #s i have are
down. help is appreciated...
-ds
Read:(1-29,^23),? :
24/29: Bullshit.
Name: Epsilon #12
Date: 11:02 am Fri Aug 26, 1988
Dark Sorcerer, I think not. Maybe in some lames groups with unproductive
know-nothing members that would be the case. I don't think any responsible
group is going to put up inside information on their VMSs. Be real.
Read:(1-29,^24),? :
25/29: Gordon's Questions
Name: Geo #34
Date: 8:27 pm Fri Aug 26, 1988
Gordon Meyer #57 writes (12:23 am Wed Aug 17, 1988):
> I understand that because of "questionable legal" methods it is important to
> keep your indentity under wraps. But do people (associates) know of your
> phreak-hacking activities? I mean, do your friends, parents, teachers,
> girlfriend(s) know what you are into?
Gordon... some of us ARE parents and teachers! It's our kids
and our students who really don't give a shit.
> Any general comments about handles/indentities?
Ever try to come up with a nickname for "George?"
Geo
Read:(1-29,^25),? :
26/29: Nope...
Name: Dark Sorcerer #79
Date: 8:32 pm Fri Aug 26, 1988
I didn't mean a "technical" group; ones who have actual names and who put
out 1800 PBX lists. Just a group of <people> who would like to share
information. That's all.
Read:(1-29,^26),? :
27/29: misc
Name: Necron 99 #9
Date: 1:54 pm Sat Aug 27, 1988
well, i don't se the point of a lot of groups myslef, i mean, you could be in
(let me think) pale, bamf, dpac, sts, or any other really rodemt group, or
you could be in a really neat0 group, but they serve the same purpose: to
make their members feel better about themselves (like, wow, i'm in a group. )
and to trade things, wheter it's wares, codes, or whatever. it's just saying,
"i trust you, so like, what can we do?"
Read:(1-29,^27),? :
28/29: ...
Name: Epsilon #12
Date: 8:28 am Sun Aug 28, 1988
That's true. Sorcerer - Ok, I see what you're saying then.
Read:(1-29,^28),? :
29/29: life.
Name: Shark #111
Date: 4:10 pm Mon Aug 29, 1988
(Speaking of one who hasn't been in a 'group' since 1984, and one who
regretted that action...)
I've always seen groups as falling into two analogies. The higher eschelon
organizations such as LOD/H and the like seem to me to be like Special
Interest Groups, or clubs, where the primary goal is to learn and trade
information within the group to increase the knowledge of the group as a
general entity. That's why it seems that these have a resident NOS expert,
a resident Apple DOS 3.2 expert, etc. etc. (okay, bad examples. I was trying
to be cute.)
...the lower eschelon, or 'geek' groups, like DPAK and the like, seem to be
similar to the youth gangs they have over in realworld. Joining is a pride-
builder, a status-builder, a way of finding a place where you can be thought
of as 'cool,' even if it's only by your peers in your gang or group.
Geez, I'm paying for this call...
shark
Read:(1-29,^29),? :
Post on Sociological Inquiries? No
< Sociological Inquiries Q-scan done >
<<Global Q-scan done>>
Phoenix Project Menu:
A:dd to BBS List B:BS List C:hat w/ The Mentor D:efault
E:mail Send F:eedback to sysop G:Files H:Macros
I:nfo on Phoenix J:Purge Messages K:ill old Email L:og of Callers
M:ail Read N:ewscan O:ffline P:ost
Q:uickscan board R:emove Messages S:can Messages T:ranfer Section
U:serlist V:ote W:rite Auto-Message X:pert Mode
Y:our Information Z:Global Purge *:Board Menu $:Change Password
/O:Fast Logoff /E:Multiple Email ?:This Menu
T - 00:18:12
[1] [General] :B
512-754-8182 The Phoenix Project [2400] (WWIV)
618-943-2399 Forgotten Realm [2400]
512-353-0590 The Bastille [2400] (WWIV)
305-752-8645 Digital Logic Data Systems [2400] (GBBS)
914-761-6877 UNCENSORED! [2400]
914-234-3260 The Central Office, 2600 BBS #2 [2400]
402-564-4518 Yoyodyne, 2600 BBS #3 [2400]
214-422-4307 Dallas Hack Shack Private [19.2] (SPC)
415-278-7421 Lunatic Labs [1200]
401-789-4239 The Hermetic Order of the Golden Dawn - New BBS [2400] (NOVA)
718-358-9209 Hackers Den-88 [1200] (TBBS)
205-774-7453 The Grey Zone [1200] (HENG)
201-281-7682 THE EQUALIZER [2400] (WWIV)
203-834-0367 LimeLight Technologies (Programming/Hacking) [2400] (LIME)
619-745-2110 Biocidal Tendencies...100 MEGS ONLINE [2400] (WWIV)
Phoenix Project Menu:
A:dd to BBS List B:BS List C:hat w/ The Mentor D:efault
E:mail Send F:eedback to sysop G:Files H:Macros
I:nfo on Phoenix J:Purge Messages K:ill old Email L:og of Callers
M:ail Read N:ewscan O:ffline P:ost
Q:uickscan board R:emove Messages S:can Messages T:ranfer Section
U:serlist V:ote W:rite Auto-Message X:pert Mode
Y:our Information Z:Global Purge *:Board Menu $:Change Password
/O:Fast Logoff /E:Multiple Email ?:This Menu
T - 00:17:57