home *** CD-ROM | disk | FTP | other *** search
- STATION ID - 7091/6.411
-
- 9x Datakit Network
- FOR OFFICIAL USE ONLY
-
- This is a 9x system, restricted to authorized persons and for
- official 9x business only. Anyone using this system, network or data
- is subject to being monitored at any time for system administration and
- for identifying unauthorized users or system misuse. Anyone using this
- system expressly consents to such monitoring and is advised that any
- evidence of criminal activity revealed through such monitoring may be
- provided to law enforcement for prosecution.
-
-
- 9x is Substance, Schizo Man, Grampa Elite, and Firebug
-
- The Distro Sites
-
- Another Way of Life (518)
- The Phantom Tollbooth (718)
-
- -----------------------------------------------------------------------------
-
- - Internet Hacking vs. Local Hacking -
- - Writin in 1996 by Grampa Elite -
-
-
- Here we go, i will try to as unbiased or whatever as possible because
- I know some people prefer nethacking to localhacking or visa versa, so i'll
- try to bring out the good and bad points of both areas of hacking. If you
- think i missed something or forgot to add something important let me know.
-
-
- 3587198561297862709856787112157-LOCAL HACKING-7125612876512874512745217845149
-
-
- Local hacking apposed to nethacking is considerably easier for
- instance, local systems arent usually that secure and probobly have some
- default accounts with the default passwords still running. I have gotten
- into many a local system using default login/password's. Or you can use a
- cn/a to find out there address and go trashing wherever the system is at to
- possibly find some valid login's. Or you can find there voice line and do
- some social engineering which you can also do with systems on the internet.
- For instance do some homework on who works there and find out when he leaves
- and comes to work at whatever place it is another plus is to find out what
- his voice sounds like, i can do just about anybodys voice except women's.
- Then you call when he's not there and give them some bullshit story, and
- don't try that line that zero cool gave that one guy working at gibson or
- whatever the hell that company was in the movie hackers, because it aint
- gunna happen.
- But before you start breaking into systems you have to find them.
- You can accomplish this by either scanning your whole area code or by doing
- more social engineering and getting the dialup that way. But before you
- start scanning your whole ac you better find out if you have unlimited
- calling or if it has a limit and after that you pay a certain ammount per
- call. A way to defeat this is to either get a unlimited calling thing for
- your line, or hack your local switch (which is also local usually)and change
- your line using rc commands or what have you. Local hacking other than x.25
- is what you want if you want to get into companys and shit instead of i-net
- providers. You can also get to other systems by hacking locally, say you
- hack into some sort of unix and you checkout there /etc/uucp/Systems file if
- they have it and then you can CU to those systems or you can CU to some ld
- bbs, its also good for a diverter which you will need when you hack locally
- because it is alot more risky hacking locally if you dont have alot of
- diverters or bounce it through some ld carriers or pbx's or whatever. It is
- alot easier for people to trace you or fuck they could be running ani and you
- could get busted or worse. In other words be carefull about what you are
- doing, and who you are doing it to, this applies to all hacking, no matter
- where or when there are some things you just don't do.
-
- 3587198561297862709856787112-INTERNET HACKING-7125612876512874512745217342845
-
-
- Internet hacking is fun also because there are tons of systems out
- there waiting to be broken into unlike local hacking where if you live in a
- small city there aren't many systems. Although internet hacking isn't as
- easy as local hacking because some systems have firewalls and have all there
- bugs patched there are more ways to break into systems than local
- hacking. Some people consider irc haxoring to be internet hacking, i don't.
- Just because you have a script that you didnt even write that sends you
- people's passwd files or adds your address to there .rhosts file doesnt mean
- your a hacker (sorry had to get that out of my system, blah). Anyways, all
- the exploits writin usually are for linux it seems so you are kind of
- restricted to hacking linux unless you can find some way old version of SunOS
- or if you find an Ultrix or sumthin stoopit. There is a program out there to
- scan ip's but i havent used it yet so i don't know if its any good or what.
- And of course there is the famous iP spoofing, whichis defeated if the system
- you are attacking has a properly setup firewall or a secure router or what
- have you. Some systems don't have there firewalls correctly installed so
- they have some false sense of security until you break in. Although i-net
- hacking isn't as risky as local hacking you can be traced no matter what you
- think, you can be traced. And once they get your info your sunk because you
- were probobly over state lines when they traced you and so they'll call in
- the FBI which is not cool.
-
- So make your own decision try both to see which one you like the best
- or the one you think works the most with you, one has more systems and the
- other is easier to hack, one has mostly small systems and the other has
- mostly corporations and businesses.
- -----------------------------------------------------------------------------
-