home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 54.2 KB | 1,125 lines |
- ________________________________________________________________
- [ _ _ _____ ]
- [ // \\ // / ]
- [ //\ /\\ //__ / ]
- [ // \ / \\ // ]
- [ // \/ \\ ystic // roductions ]
- [ ]
- [ "For some this is a legend, others a legecy" ]
- [ 12/17/90 ]
- [________________________________________________________________]
-
- Krack Issue 0 - 8 Series #1
-
-
- Disclaimer
- ~~~~~~~~~~
- This text file is for informational purposes only, any reproductions of
- this file is not illegal. I do not take any responsibality for the preceeding
- messages, or do incourage you to do anything described in the text file.
-
- Description
- ~~~~~~~~~~~
- In the following issues of Krack (which will be issued monthly) will contain
- 8 files containing of 1 issue. The files will be reproductions, descriptions,
- Telephone Fraud, Phreaking, Carding, PBX, mics items, ect. The files will not
- only be written by me, but others. The intention of this is to carry out on
- the production of the stopped magazine "Phrack". All you "underground members"
- are welcome to goin in and construct/help produce Krack.
-
- Krack #1
- ~~~~~~~~
- This file will be the first of a series of many in the Krack library. The
- first file will get you into the seriousness of the following items, or text
- files.
-
- Krack #2
- ~~~~~~~~
- The file will explain all about recent busts. The file is fairly new and
- explains in detail some occurances that have happened, and all the stupid
- things you should be aware of.
-
- Krack #3
- ~~~~~~~~
- The file explains a recent NASA breakin! Very good
-
- Krack #4
- ~~~~~~~~
- This file is all about Picking Master Locks, Seriousness of Locker Breakins.
-
- Krack #5
- ~~~~~~~~
- This file explains Phone Sex, and how to benifet from setting up your own
- line for phone sex!
-
- Krack #6
- ~~~~~~~~
- What to do if you Detect a Bug. Also other concerns about bugging homes,
- where bugs are hidden, how to detect a bug.
-
- Krack #7
- ~~~~~~~~
- A Krack Orignal! ProTerm Emulation Documents. Ever run a board and just
- don't know how to do ProTerm Emulation like the other boards? Well just read
- the docs and you will be programming like a wizard
-
- Krack #8
- ~~~~~~~~
- GPR! Known as the popular 'Game Players Review' The game players review will
- not only review new releases for game systems, but will also tell you some tips
- on new/old games. The Currently Supported Systems are: Turbo Grafx-16,
- Genesis, Lynx, and Nintendo. More to come..
-
- Publication ID: krackpub#0,1
-
- -----------------------------------------------------------------------------
- If intreasted in helping out please contact me on the following boards:
-
- Apple Rebel 916-457-0624 (Octavian #??)
- TCQ 614-231-7646 (Octavian #41)
- Apple Tree MW 816-826-4158 (Octavian #177)
- Ware House GS 609-429-8487 (Octavian #24)
- IxGS 914-693-5679 (Octavian #95)
- Imperial Fortress 201-808-5768 (Octavian #??)
-
-
-
- Staff this Issue:
- -----------------
-
- Octavian
- a. Orgnizer
- b. Intro Phreaking
- c. Master Lock #2
- d. ProTerm Docs
-
- Overlord
- a. Nasa Breakins
-
- Phrack Inc.
- a. Master Lock #1
- b. Detect a Bug?
-
- Unknown.
- a. News Update
- b. Penilities to Phreaking
- c. Carding #1
-
- Overall Staff:
- ----------------------------
- Octavian
- Overlord
- Phrack Inc
- Unknown Writters
- Wonder Boy
- Anaesthetist
-
- ________________________________________________________________
- [ _ _ _____ ]
- [ // \\ // / ]
- [ //\ /\\ //__ / ]
- [ // \ / \\ // ]
- [ // \/ \\ ystic // roductions ]
- [ ]
- [ "For some this is a legend, others a legecy" ]
- [ 12/17/90 ]
- [________________________________________________________________]
-
- Krack Issue 1 - 8 Series #1
- Issue: Phreaking Basics
-
- First off the term "Phreaking" is a faster way to say Telephone Fraud.
- Telephone is a serious crime and I do not recomend you try it because of the
- seriousness of it, a few penilities of phreaking is 1. Inprisonment (18 years
- or older) 2. Confiscated computer (third offence) 3. Pay for telephone bill
- (most common) 4. Community service (50-100hrs) (I dont think they have changed)
- for more information of busted phreakers please read ending
- The most common ways of going about phreaking is geting an extender
- (1800-225-5946 which might have been in use). The extenders resemble bulk
- mailing in the post office, which companies order it for a periof of time at a
- reduced rate. After you dial the extender there will be a recording telling
- you to enter a code, most codes run from 5-11 digits, finding how many digits
- is the trickey part. After you enter the aurthirization code it may then ask
- you for the phone number you wish to dial. The important thing is that you
- don't enter the 1 before the area code! This method of phreaking is commonly
- refered to as ACN (Extender - Code - Number). Some extenders have it reversed
- to ANC (Extender - Number - Code).
- That's the basic phreaking way and I do not recomend you trying this and I do
- not take any responsibility for your actions! Well thats is for this issue, and
- they will get in depth as you learn more about the basics.
-
- ---Octavian
-
- Busted!
- ~~~~~~~
- Note: This article was taken from a series of text files on the seriousness
- of getting cought. Please be aware of the penilities.
-
-
- Article #1
- ~~~~~~~~~~~
- Title:
- ~~~~~~
- Teen-Ager Faces Felony Charges In Computer Crimes
-
- Date:
- ~~~~~
- August 9, 1988
-
-
- Article:
- ~~~~~~~~
- Using a personal computer to break into AT&T and government computers and
- steal more than $1 million worth of software. This is not malicious mischief,"
- U.s. Attorney Anton Valukas said in announcing the federal charges. "It's a
- felony." Herbert Zinn Jr., 18, also is accused of advertising on a computer
- bulletin board how to break into AT&T's computers electronically. The charges
- against Zinn mark the start of "an aggressive position toward computer crimes,
- "Valukas said. Zinn allegedly committed the crimes when he was a juvenile, and
- could be sent to prison until his 21st birthday in August 1991. Federal agents
- raided Zinn's home last year and confiscated three computers and software
- allegedly stolen during the electronic break-ins.
- The federal charges were brought after Zinn had been arrested several
- times, including for alleged computer break-ins at the Keller Graduate School
- of Management and at Commodity Perspective Inc., both in Chicago. "Before and
- after the computer break-ins (at Keller and Commodity Perspective), Zinn was,
- by his own admission, breaking into AT&T computers," Valukas said. Court
- documents said Zinn broke into an AT&T computer at the North Atlantic Treaty
- Organization's Maintenance and Supply Headquarters in Burlington, N.C.,
- and an AT&T computer at Robins Air Force Base, Ga. Valukas said the software
- taken from NATO and the Air Force base were "low level in terms of
- sensitivity." Agents raided Zinn's home after an AT&T security officer logged
- onto the so-called Phreak Class-2600 computer bulletin board and spotted
- messages signed by "Shadow Hawk," a code name the government said the teen-ager
- used. Shadow Hawk bragged in the messages that he had gained access to AT&T
- computer files, but he inadvertently included his telephone number.
-
-
- Article #2
- ~~~~~~~~~~~~
-
- Title:
- ~~~~~~
- 17 Arrested in High-Tech Phone Fraud
-
- Date:
- ~~~~~
- April 27, 1988 - Newsweek Newspaper
-
- Article:
- ~~~~~~~~
- HONOLULU--AP
- It was high-tech robbery -- the theft and sale of long-distance telephone
- service. Seventeen people in 13 states were arrested Monday. The charge:
- conspiracy to commit access device fraud and wire fraud. The victims: U.S.
- Sprint, MCI Corp., Allnet Corp.,ITT, Tri-Tel Communications. Their loss: a
- reported $125 million in the past year. Steve Ramsay of the Secret Service
- said those charged sold access codes for $80 to $150 a month. An access code
- -- a telephone credit card number-- allows callers to use long-distance phone
- lines. Calls were billed to that card number. The distributors often sold one
- code to hundreds, maybe thousands of people, Ramsey said. Charged to one number
- in four days: $73,592. According to Assistant U.S. Attorney Robert Godbey:
- Computers were programmed to call the companies' long distance networks, then
- enter a credit card number to pay for the call. If the number was rejected, the
- computer kept dialing until one was accepted. The successful number then was
- sold. Whoever was assigned the number, got the bill. "It was the miracle of
- technology, the computer took a simple chore and did it over and over and
- over," he said. The Secret Service caugt them by setting up their own
- distributorship of illegal numbers -- a "sting operation" -- and "making
- controlled diliveries," Ramsey said.
-
-
- Publication ID: krackpub#1,1
-
- -----------------------------------------------------------------------------
- If intreasted in helping out please contact me on the following boards:
-
- Apple Rebel 916-457-0624 (Octavian #??)
- TCQ 614-231-7646 (Octavian #41)
- Apple Tree MW 816-826-4158 (Octavian #177)
- Ware House GS 609-429-8487 (Octavian #24)
- IxGS 914-693-5679 (Octavian #95)
- Imperial Fortress 201-808-5768 (Octavian #??)
-
- ________________________________________________________________
- [ _ _ _____ ]
- [ // \\ // / ]
- [ //\ /\\ //__ / ]
- [ // \ / \\ // ]
- [ // \/ \\ ystic // roductions ]
- [ ]
- [ "For some this is a legend, others a legecy" ]
- [ 12/17/90 ]
- [________________________________________________________________]
-
- Krack Issue 2 - 8 Series #1
-
-
- Isssue: News Updates!
-
- Hacking Clubs
- ~~~~~~~~~~~~~
-
- Early computer hackers tended to be college students. With the advent
- of home computers, and the teaching of computer basics at the grade
- school level, the average age of the begininning (youth) hacker has
- dropped to only 14!! The overwhelming majority of BBS owners and users
- are teenagers. Teens tend to form cliques and peer groups, so the
- formation of phone phreak and hacker gangs was inevitable. The parents
- of these bright teens usually do not, themselves, understand the power
- of the computer. This means that the teens are not subject to the same
- parental restrictions that would govern their using the family car.
-
- Many parents veiw the home computer as an excellent baby-sitting device.
- If their child spends an evening quietly in his/her room with the computer
- the parents feel that thier offspring is not getting into any trouble.
- In reality, these teens may be engaging in electronic gang activites
- that have very serious implications. Losses to the software industry
- alone are staggering!!!
-
- Unfortunately, many of the gang leaders are older, more experienced
- teens, perhaps college students. These people are interested in hacking
- not for its intellectual challenge, for for its financial rewards. A
- few gang leaders are adults who are politically or firal adults who are
- major figures behind the cracking and distribution of pirated software for
- resale to the public. One adult gang leader openly solicited credit card
- numbers from the juvenile members in exchange for fraudulently obtained hard
- disk drives and other equipment. Some of the teenage leaders seek
- notoriety and acclaim from their peers. They strive to be the biggest
- phreaker or to have broken into the greatest number of computer systems.
-
- The gangs may be local in nature such as the infamous "Milwaukee 414
- gang"; they may be national in nature, like the "Inner Circle"; or
- even international. One such international group is "NYSHII" or
- "CHAOS" both cracking and pirating clubs with headquaters in both
- West Germany and the United States. All of these groups had a BBS
- that was their main base of operations and served supposedly as a
- sercure communications center. The 414s had a private BBS that was
- so sercet it didn't even have a name. The Inner Circle had a
- Securityland BBS and Illegitimate accounts on GTE'S Telemail network.
- Chaos operates on a variety of BBS's in both the U.S. and West Germany.
- NYSHII (New York Safehouse II) to this date has baffled local and
- international law enforcement agencys as to it's true whereabouts.
- The Sysop "The Line Breaker" has found a way of changing the BBS's
- location on a weekly basis without moving the master computer.
-
- Orginzed Crime News Update
- ~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Naturally, an underground BBS could be used by organized crime in
- much the same manner as the teen hacker gangs use them. The author
- has good reason to believe thgat organized crime is controlling a
- number of BBS systems in the Midwest, the New York City area, and
- in Florida. One informant claims there is a bbs that is located
- in an off-track betting parlor. Teenagers are easily recruited to
- act as information gathers for organized crime. The young people
- work for little or nothing and, in most cases, do not even know
- that they are being used. The author and other adult hackers have
- been approached and offered large sums of money to tamper with
- banking and credit data computer systems. Organized crime is
- moving into this new area of crime. There is a real and present
- danger if BBSs continue to be alloowed to operate unchecked.
-
- Underground BBSs may be creating a whole new generation of
- criminals. As the youthful hackers mature, their interest in hacking
- as an intellectual challenge and rebellion against authority
- may be replaced by profit motive. College students always seem
- to need money and the teens who do not go to college may find it
- difficult to obtain a job. It is only natural that these individuals
- would graviate into hacking for personal gain. For example, many
- bulletin boards cater to those who are involved in credit card fraud.
- There is also evidence that drug dealers use BBSs to arrange swaps
- of stolen property for drugs. Hackers who have learned how to access
- credit bureau systems, such as TRWs, have discovered that making
- unauthorized credit checks foe
- business.
-
- Credit bureau computer penetrations are routine in the hacker under-
- ground. The typical hacker gang obtains credit card numbers from
- discarded charge slip carbons. As an alternative, one or more
- hackers who work in retail establishments may supply card numbers.
- Other gang members can then check the cards for credit limits and
- expiuration dates by using the telephone or illegally accessing
- credit bureau computers. Others in the gang set up mail drops
- and safe houses for the deliverly of the merchandise ordered by mail
- and charged to the credit card numbers. Since the gangs know no
- geographic boundaries, it is difficult to investigate these frauds.
-
- Some commerical time-sharing services, such as Comp-u-serve, allow
- merchandise to be ordered via computer and shipped to the user's
- address. ime-sharing accounts are easily obtained with a stolen
- credit card. This allows the thief to order merchandise with little
- fear of being traced. These new high tech thieves are replacing
- more traditional criminals.
-
- The hackers and phone phreaks have knowledge and skill to completly
- disrupt major communication and computer networks. All that is lacking
- is organization, planning and financing. If enemy power should
- infiltrate and organize this underground, the consequences could
- be disastrous.
-
-
- Subversive Bulletin Boards
- ~~~~~~~~~~~~~~~~~~~~~~~~~~
- An article in a newspaper from the United Kingdom had an article relating to a
- computer bulletin board being run by a 14-year-old boy in Wilmslow, Cheshire,
- England. It contained information relating to such things as making plastic
- explosives.
-
- Anti-terrorist detectives are said to be investigating for possible breaches of
- the Obscene Publications Act. Apparently reporters were able to easily gain
- access to this bulletin board and peruse articles on such subjects as credit
- card fraud, making various types of explosives, street fighting techniques and
- dodging police radar traps.
-
- One article was obviously aimed at children and described how to make a bomb
- suitable for use on "the car of a teacher you do not like at school," which
- would destroy the tire of a car when it was started.
-
- The boy's parents did not seem to think that their son was doing anything
- wrong, preferring him to be working with his computer rather than roaming the
- streets.
-
- A London computer consultant, Noel Bradford, is quoted as having seen the
- bulletin board and found messages discussing "how to crack British Telecom, how
- to get money out of people and how to defraud credit card companies. Credit
- card numbers are given, along with PIN numbers, names, addresses and other
- details."
-
- Publication ID: krackpub#2,1
-
- -----------------------------------------------------------------------------
- If intreasted in helping out please contact me on the following boards:
-
- Apple Rebel 916-457-0624 (Octavian #??)
- TCQ 614-231-7646 (Octavian #41)
- Apple Tree MW 816-826-4158 (Octavian #177)
- Ware House GS 609-429-8487 (Octavian #24)
- IxGS 914-693-5679 (Octavian #95)
- Imperial Fortress 201-808-5768 (Octavian #??)
-
- ________________________________________________________________
- [ _ _ _____ ]
- [ // \\ // / ]
- [ //\ /\\ //__ / ]
- [ // \ / \\ // ]
- [ // \/ \\ ystic // roductions ]
- [ ]
- [ "For some this is a legend, others a legecy" ]
- [ 12/17/90 ]
- [________________________________________________________________]
-
- Krack Issue 3 - 8 Series #1
-
-
- Issue: Nasa Breakins
-
- Nasa Breakin Report
- ~~~~~~~~~~~~~~~~~~~
- Boy tells of 'WAR GAMES' on NASA computers
- HUNTSVILLE, Ala.(AP)-One of four teenagers whose home computers were seized
- by the FBI after an ilegal tap into NASA computers likend his electronic
- forays to those in the movie "WAR GAMES," and one of the boys mothers said
- they never ment any harm.
-
- "We didn't find anything top secret or anything we thought was top secret,
- just stuff about space and sattelites," Joe Moorman, 13, said after the
- FBI on onday seized home computers, floppy disks and software that were
- allegedly used to tap into two computers, according to the FBI.
-
- The unauthorized taps destroyed records and blocked scientists from using
- the computers, according to the FBI.
-
- "It was sort of like 'War Games,'" which depicted a students unauthorized
- entery into a strategic defense computer, Moorman said. "We used an automatic
- dialer to print out all the codes until we got the right one." printers were
- also seized from the youths' residences.
-
- The two NASA computers that were broken into contained no classified
- information, but secret passwords and access numbers were needed to use either
- machine, NASA officials said.
-
- "Valuable computer time was stolen and certain computer records have been
- destroyed by persons who made the penetrations," said Cecil Moses, special
- agent in charge of the FBI's Birmingham office.
-
- Charges have not been filed against the teenagers, but may be filed later,
- said Moses. Conviction for theft or destruction of government property
- carries a maximum fine of $10,000 and up to 10 years imprisonment.
-
- "NASA had good countermeasures in their system to discover any penetration
- and it took us about 10 days to trace the origin," said Tom Moore, an FBI
- spokesman.
-
- There has been no indication of any attempt to tap into NASA computers at
- the Kennedy Space Center in Cape Canaveral, Fla., or the Johnson Space
- Center in Houston, officials said.
-
- Tapping even the administrative computers "Has been made as diffucult as
- possible," said Hugh Harris, a spokesman at the Kennedy Space Center.
- A series of passwords and identefication codes must be used to gain access
- to these computers, and these are periodically changed, he said.
-
- Scientists at Marshall discoverd the computer break-in June 28 and reported
- it to the FBI, said Moses. The scientists were unable to use the computers
- whial the "hackers" were working on them, he said.
-
- The telephones through which the data banks were tapped were traced to
- the four residences raided Monday, which are all in the same area of
- Huntsville, said Moses and Moore.
-
- The FBI did not release the names of the teenagers, but residences where
- computer equipment was seized were identified by federal agents as those
- of William H. Graham, George R. Grumbles, Dr. Robert S. Moorman Jr. and
- Mark A. Strickland.
-
- Carroll Strickland said her 15 year-old son, Allen, who lost his computer
- equipment to the FBI, was innocent of tapping into the NASA computers.
-
- She said her son from a friend a list of telephone numbers that "Contained
- the number of the computer which we were recently told by the FBI was a
- NASA computer, not described as such on the list, of course."
-
- Mrs. Strickland said her son, despite two attempts, never gained access
- to the NASA computer.
-
- "As one of the FBI agents told us when he left yesterday, it was obvious
- there was nothing malicious in what they did," said Lenora Grumbles, the
- mother of the 16 year-old Robert Grumbles. He surrenderd an APPLE ][
- computer to the FBI.
-
- Mrs. Grumbles said she was told any evidence the FBI may have found will
- be presented to a federal grand jury next month. She said agents also told
- her that "they will try to get our equipment back as soon as possible."
-
- Mrs. Grumbles said that she was "thouroughly convinced the children had
- no malicious intent. I guess we would have to say that their computer
- knowledge exceeds thier maturity."
-
- She said her son "passed all of us in computer know-how years ago."
-
- When he was 13, he and another student developed a video game called
- "Doom Vally." which is now being marketted nationally, she said.
-
- "we weren't really sure what he was doing, typing away at that computer
- all the time. I guess now we know," Mrs. Grumbles said.
-
- At Marshall, scientists work on general research and managment of the
- space program, including work on space shuttles.
-
-
- Publication ID: krackpub#3,1
-
- -----------------------------------------------------------------------------
- If intreasted in helping out please contact me on the following boards:
-
- Apple Rebel 916-457-0624 (Octavian #??)
- TCQ 614-231-7646 (Octavian #41)
- Apple Tree MW 816-826-4158 (Octavian #177)
- Ware House GS 609-429-8487 (Octavian #24)
- IxGS 914-693-5679 (Octavian #95)
- Imperial Fortress 201-808-5768 (Octavian #??)
-
- ________________________________________________________________
- [ _ _ _____ ]
- [ // \\ // / ]
- [ //\ /\\ //__ / ]
- [ // \ / \\ // ]
- [ // \/ \\ ystic // roductions ]
- [ ]
- [ "For some this is a legend, others a legecy" ]
- [ 12/17/90 ]
- [________________________________________________________________]
-
- Krack Issue 1 - 8 Series #1
-
- Issue: Master Locks
-
- Have you ever tried to impress your friends by picking one of those Master
- combination locks and failed? Well then read on. The Master lock company has
- made this kind of lock with a protection scheme. If you pull the handle of it
- hard, the knob won't turn. That was their biggest mistake...... Ok, now on to
- it.
-
- 1st number. Get out any of the Master locks so you know what's going on.
- 1: The handle part (the part that springs open when you get the combination),
- pull on it, but not enough so that the knob won't move. 2: While pulling on it
- turn the knob to the left until it won't move any more. Then add 5 to this
- number. Congradulations, you now have the 1st number.
-
- 2nd number. (a lot tougher) Ok, spin the dial around a couple of times,
- then go to the 1st number you got, then turn it to the right, bypassing the 1st
- number once. WHEN you have bypassed. Start pulling the handle and turning it.
- It will eventually fall into the groove and lock. While in the groove pull on
- it and turn the knob. If it is loose go to the next groove; if it's stiff you
- got the second number.
-
- 3rd number: After getting the 2nd, spin the dial, then enter the 2 numbers,
- then after the 2nd, go to the right and at all the numbers pull on it. The lock
- will eventually open if you did it right. If can't do it the first time, be
- patient, it takes time.
-
- * Credits - Taken from Phrack Updated 12/19/90 Krack #4 Issue #1
-
-
- Master Lock Picking 12/20/90
-
- Ever see a broken down railroad? Chances are you have, now a broken down
- railroad is the best tool for locker breakings! I am not saying just take the
- dam railroad, but try walking down the tracks and look for a railroad spike.
- (Railroad Tire Spike also works) Once you find the spike then all you need is
- a master lock. (Ever watch those comercials that they shoot a bullet through
- the lock? Hmm.. Makes you wonder.. Send a master lock and a railroad spike to
- David Horawitz 'Fight Back')
- After you have the two items then the rest is easy. Put the Spike in between
- the lock part and then just pull down/up. Kaboom! There you have an open
- master lock.
-
- * Credits - Octavian
-
- Publication ID: krackpub#4,1
-
- -----------------------------------------------------------------------------
- If intreasted in helping out please contact me on the following boards:
-
- Apple Rebel 916-457-0624 (Octavian #??)
- TCQ 614-231-7646 (Octavian #41)
- Apple Tree MW 816-826-4158 (Octavian #177)
- Ware House GS 609-429-8487 (Octavian #24)
- IxGS 914-693-5679 (Octavian #95)
- Imperial Fortress 201-808-5768 (Octavian #??)
-
- ________________________________________________________________
- [ _ _ _____ ]
- [ // \\ // / ]
- [ //\ /\\ //__ / ]
- [ // \ / \\ // ]
- [ // \/ \\ ystic // roductions ]
- [ ]
- [ "For some this is a legend, others a legecy" ]
- [ 12/17/90 ]
- [________________________________________________________________]
-
- Krack Issue 5 - 8 Series #1
-
- Issue: Phone Sex
-
- Ever called a phone sex line? Moaning and groaning of sensual
- pleasures for only 20-45 bucks, and memberships?
-
- The Scandal:
-
- The only way your are going to be able to pull this off is if you
- have call waiting (this is a necessary for the 1st type of phone sex scam),
- or a Voice Mail System (this is easy, but it is harder to get the cards
- out of the perverted ones).
-
-
- Sub-Section #1 : Call Waiting
- -----------------------------
-
- Materials Needed
- ----------------
- A Phone with TONE dialing (that PULSE shit ain't gonna cut it!)
- Call Waiting (of course)
- The number to the BEST phone sex line you can get (live convo's ONLY!)
- A good phreak (unless you live in LA where all the good ones are)
- A good MC/AMEX/VISA card (the sex line must carry all of those)
-
- Setting it up
- -------------
-
- Using one of the cards, advertise in Penthouse Forum, Club, X Rated
- Porn Stars, or any other porno mag that is semi-hardcore and carries the
- sex line ads and card an advertisement. Have it run for a few weeks
- (send in a picture and shit for the ad, they will tell you all about it).
- You should get a different phone line that can be easily disconnected
- by Ma Bell so the feds don't come a runnin' and the perverts don't keep
- calling back. When the guys (or girls) call to "have sex", you simply
- answer the phone "Triple X Hardcore Porn Line, may I help you?" Go for
- a big ass ad in the mag, since you're not paying for it anyway. Ask for
- the person's credit card type, card #, expiration, bank number, name, etc.
- Don't ask too much personal information, you do not want them to hang up
- on you. Then after they give you the information, say "please wait".
- Next, dial the >GOOD< porn line and give THEM the information the person
- gave you (act as though you are them). Just before the chick comes on,
- hit the button and stick the dude online, say "enjoy!" Don't hang up,
- you will disconnect them (on some phones). I have also found that if you
- record them, you can exploit it to the maximum (if they are kids, tell
- them to give you all their parents cards or you will send the tape to mommy
- and daddy). You know have a good card, (if it has enough money on it for
- the line you just called!), go out and have fun. That is just 1 way to do
- it.
-
- Sub-Section #2 : Voice Mail Systems
- -----------------------------------
-
- Get ahold of a voice mail system, the kind you just dial up and answers
- like an answering machine (the Dragonfire one is 415-227-5618, call it for
- an example). Set up the message (get your girlfriend to do this, or if
- you are a geek and have a squeaky voice, go for it!) to say something like
- this "Welcummmmm, tooooo Pandora's Hardcore Triple X CUM Again Porn Line,
- Please leave your name, number, credit card type, card number, expiration
- date, bank number, and anything you'd like to talk about. We will call you
- back in 2 hours. If this is inconvienent, please hang up and call when it
- is not. Otherwise, you will be getting the hottest head in LA,SF,Trenton,
- Lubbock, etc. Thank you for calling, mmmmmmmmmmm." BEEP. This way is a
- piece of shit way since it is so fucken inconvienent. You would be lucky
- if you got 2-3 cards in a week. But it's better than nothing. Remember,
- using this way, you don't do shit! You do not have to call the guy back.
- You got his card, why give him the merchandise? Heh.
-
- * Note I would like to state that credit card fraud is a serious offense
- under the constitution of the united states (i forget what amendment,
- but ya know, the one reagan made a year or two back). I am not liable for
- what you do with this, and I am in no way responsible for your actions with
- voice mail systems and false advertising. This file is for informational
- and educational purposes only (they all say that!) and should not actually
- be used. I had a brainstorm,
-
- * Credit - Unknown
-
- Publication ID: krackpub#5,1
-
- -----------------------------------------------------------------------------
- If intreasted in helping out please contact me on the following boards:
-
- Apple Rebel 916-457-0624 (Octavian #??)
- TCQ 614-231-7646 (Octavian #41)
- Apple Tree MW 816-826-4158 (Octavian #177)
- Ware House GS 609-429-8487 (Octavian #24)
- IxGS 914-693-5679 (Octavian #95)
- Imperial Fortress 201-808-5768 (Octavian #??)
-
- ________________________________________________________________
- [ _ _ _____ ]
- [ // \\ // / ]
- [ //\ /\\ //__ / ]
- [ // \ / \\ // ]
- [ // \/ \\ ystic // roductions ]
- [ ]
- [ "For some this is a legend, others a legecy" ]
- [ 12/17/90 ]
- [________________________________________________________________]
-
- Krack Issue 6 - 8 Series #1
-
- Issue: A Bug or Not to Bug?
-
-
- Detect a Bug???
- ~~~~~~~~~~~~~~~
-
- In today's landscape of insider trading, leveraged buyouts and merger mania,
- it is no great shock that a new underground industry has developed within
- telecom -- eavesdropping.
-
- Bugs are cheap (starting at $30) and can be installed in as little as 10
- seconds. And you can bet your bottom $1 million that this expense pales in
- comparison to the rewards of finding out your takeover plans, marketing
- strategies, and product developments.
-
- According to Fritz Lang of Tactical Research Devices (Brewster, NY), there is a
- virtual epidemic of bugging going on in the American marketplace. Counter-
- surveillance agencies like TRD have sprung up all over. They search for
- eavesdropping equipment, then notify the client if they're being tapped. It's
- up to the client to respond to the intrusion.
-
- Each of TRD's employees is a retired CIA or FBI operative. Formerly, they
- planted bugs for Uncle Sam. Since it's illegal to plant bugs for anyone else,
- these men now engage in counter surveillance work, pinpointing eavesdropping
- devices, and sometimes the culprits who put them there, for TRD's client
- companies.
-
-
- Where Do They Put The Bugs?
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Your TELEPHONE, of course, is a convenient place to install an eavesdropping
- device. But this doesn't mean that the illegal tapping will be limited to your
- phone conversations.
-
- Electronic phones have microphones which are always "live," even when the
- telephone is on-hook. Stick an amplifier and transmitting unit to the
- microphone, and you have constant surveillance of all conversations taking
- place in that room, whether or not the phone is off-hook at the time.
-
- A device rapidly gaining popularity among today's wire-tappers is a mouthpiece
- containing a tiny bug, which looks exactly like the one of your 2500 set. All
- it takes is one trip to the water cooler or the men's room for the insider to
- surreptitiously make the old switcheroo.
-
- LOUDSPEAKERS are another favorite location for wire-tappers, because they can
- pick up conversations when not in use. Paging systems, piped in music, and
- telephone systems all employ some variety of amplifier which the culprit can
- use to his advantage.
-
- LINE INTERCEPTORS allow eavesdroppers more extensive coverage of your
- activities, since they can monitor more than on-line communications from a
- single listening post.
-
- But really, the number of places you can find a bug is limited only by the
- tapper's imagination. Light switches, plugs, clocks, calculators, legs of
- wooden chairs, staplers, ashtrays, the underside of a toilet bowl -- all of
- these items have proved fertile territory for the little critters.
-
-
- Tools For Finding The Bugs
- ~~~~~~~~~~~~~~~~~~~~~~~~~~
- TRD's people use a patented Surveillance Search Receiver to locate the bugs.
- The Receiver uses a broad-band radio spectrum, from 25 kHz to 7 gHz.
-
- If there is an unaccounted-for radio frequency emission on the premises, the
- Receiver will tune it in on a small spectrum monitor. It then traces the
- emission to its inevitable source, the bug.
-
- For room bugs, they also use a Non-Linear Junction Detector, which can pinpoint
- all electronic circuit diodes or resistors in the architecture of the building.
-
- The Detector emits a high microwave signal into walls, furniture, et al.,
- causing any circuit hidden within to oscillate. As soon as they oscillate,
- they become detectable.
-
- Mr. Lang clears up a misconception about the Russians bugging our embassy in
- Moscow. "They didn't riddle the building with actual bugs, instead, they
- buried millions of little resistors in the concrete."
-
- The embassy, therefore, became a hot bed for false alarms. Whenever the
- American counter-measure people came in with their detectors to look for a bug,
- they'd pick up oscillation readings from the countless resistors and
- capacitors buried in the walls. Finding any real bugs would be infinitely more
- difficult than finding the old needle in a haystack.
-
- For finding wire-taps along the phone lines, TRD uses a computerized electronic
- Telephone Analyzer. The unit runs 18 different tests on phone lines between
- the CPE block and the Central Office (CO). Resistance, voltage, and line
- balance are just a few of them. Once they locate a tapped line, they send a
- pulse down it with a time-domain reflectometer, which can pinpoint exactly
- where in the line the bug has been affixed.
-
- Bear in mind that wire-tapping is extremely difficult and time consuming. As
- much as 20 hours of conversations has to be monitored every single business
- day. Because of this, key executives' telephones are usually the only ones
- slated for a wire-tap.
-
-
- Catching The Culprit
- ~~~~~~~~~~~~~~~~~~~~
- Finding a wire-tap is easier than finding the spy who bugged your office.
- Direct hardwire taps can be traced to the remote location where the snoop
- stores his voltage-activated electronic tape recorder. After you've found the
- monitoring post, it's a matter of hanging around the premises until someone
- comes to collect the old tapes and put in fresh ones.
-
- As for room bugs, your best bet is to make the device inoperable, without
- removing it, and wait for the eavesdropping to come back to fix or replace it.
-
-
- Once Is Never Enough
- ~~~~~~~~~~~~~~~~~~~~
- Some of TRD's clients have their offices checked monthly, some quarterly.
- After the initial sweep, you can have equipment installed on your phone lines
- which constantly monitors any funny stuff.
-
- As for TRD, they offer a money-back guarantee if they fail to detect an
- existing bug on your premises. Mr. Lang assures us that Fortune 500 company
- has been bugged to a greater or lesser extent. That's how out-of-hand the
- problem is getting.
-
- Toward the end of our conversation, Mr. Lang pauses. "So you're really going
- to print this, huh? You're really on the up and up?" Then he spills the
- beans.
-
- It turns out Mr. Fritz Lang is really Mr. Frank Jones (he says), a licensed
- private investigator with a broad reputation in the industry. He used the
- alias because he suspected I was from a rival counter-measure agency, or worse,
- a wire-tapper, trying to infiltrate his operations.
-
- Which quite possibly I am. You can't trust anybody in this spy business.
-
- * Credit - Phrack
-
- Publication ID: krackpub#6,1
-
- -----------------------------------------------------------------------------
- If intreasted in helping out please contact me on the following boards:
-
- Apple Rebel 916-457-0624 (Octavian #??)
- TCQ 614-231-7646 (Octavian #41)
- Apple Tree MW 816-826-4158 (Octavian #177)
- Ware House GS 609-429-8487 (Octavian #24)
- IxGS 914-693-5679 (Octavian #95)
- Imperial Fortress 201-808-5768 (Octavian #??)
-
- ________________________________________________________________
- [ _ _ _____ ]
- [ // \\ // / ]
- [ //\ /\\ //__ / ]
- [ // \ / \\ // ]
- [ // \/ \\ ystic // roductions ]
- [ ]
- [ "For some this is a legend, others a legecy" ]
- [ 12/17/90 ]
- [________________________________________________________________]
-
- Krack Issue 7 - 8 Series #1
-
-
- Issue: Programming ProTerm in your BBS
-
- ProTerm Emulation Docs
- ~~~~~~~~~~~~~~~~~~~~~~
-
- Introduction:
- ------------
-
- I. So you want to master the art of making ProTerm Adds, well your in luck
- because you have the best of the best explaining it to you. Well the docs
- you are about to read will explain how to use the curser control command
- and the repeat command. Ok well you might get confused when you see
- characters like this (ie. ò,,,) in that inversed form. Well to
- duplicate them you must get into your ProTerm editor and hit
- (control-p, then it will ask you for the character you want)
-
- Repeat Command:
- --------------
-
- II. The repeat command will make your add ZOOM litterly. The repeat command
- cuts down time in 2/3 the ammout as if you were to type it out. Here is
- an example of both
-
- Problem:
- Lets say you want to get 10 "_" across the screen
-
- 1. (The Lame way) __________
- 2. (The Fast way) _*
-
- A. Explaination
- a. The means repeat. (Wow that was hard) the _ means the character
- you want to repeat, and the * means the ascii character for 10
- (the ascii chart will be explained later)
- B. How do I get the ascii character?
- a. First deterimine how many times you want the character to repeat
- its self (ie. 10) then add 32 to the given number (ie. 32+10)
- then the given total is 42. Look up 42 on the ascii chart and
- you will see that the character is a *
-
- Move Command:
- ------------
-
- III. The move command is pretty easy. It is similar to the move command.
- The move command saves ALOT of disk space and is easy to program
- one you know how to do it.
-
- Problem:
- Lets say you wanted to move to horozantial 5 (left to right and vertical
- (up and down) 6.
-
- 1. (The Lame way)
-
-
-
-
-
-
- 2. (The Fast way) ò%&"then whatever you want..(ie. a repeat command)
-
- A. Explaination
- The ò command you must have on every move statement. The rest
- is a little complex. The % after the ò is the ascii character
- for 5, simple enough. The & is the ascii character for 6. That
- was easy. So the command ò%(horozantial) & (vertical).
-
- B. How do I get the ascii character?
- Same way as you did before. Take the given character and add
- 32 to it for the sum, then look up the sum on the ascii chart
- and then you get your ascii character.
-
- Few Examples:
- ------------
-
- IV. Here is a quick example of both statements combined to preform
- a function.
-
- Problem:
- You want to make a 22 _'s across the screen on the location, 8
- horozantial and 12 vertical.
-
- Answer:
- ò(,_6
-
- Ascii Chart:
- ------------
- **** Remember to add 32 to your number ****
-
- _____________________________________ _____________________________________
- | Number | Ascii Number | Ascii Code || Number | Ascii Number | Ascii Code |
- |=========|==============|============||=========|==============|============|
- | 0 | 32 | SPACE || 1 | 33 | ! |
- | 2 | 34 | " || 3 | 35 | # |
- | 4 | 36 | $ || 5 | 37 | % |
- | 6 | 38 | & || 7 | 39 | ' |
- | 8 | 40 | ( || 9 | 41 | ) |
- | 10 | 42 | * || 11 | 43 | + |
- | 12 | 44 | , || 13 | 45 | - |
- | 14 | 46 | . || 15 | 47 | / |
- | 16 | 48 | 0 || 17 | 49 | 1 |
- | 18 | 50 | 2 || 19 | 51 | 3 |
- | 20 | 52 | 4 || 21 | 53 | 5 |
- | 22 | 54 | 6 || 23 | 55 | 7 |
- | 24 | 56 | 8 || 25 | 57 | 9 |
- | 26 | 58 | : || 27 | 59 | ; |
- | 28 | 60 | < || 29 | 61 | = |
- | 30 | 62 | > || 31 | 63 | ? |
- | 32 | 64 | @ || 33 | 65 | A |
- | 34 | 66 | B || 35 | 67 | C |
- | 36 | 68 | D || 37 | 69 | E |
- | 38 | 70 | F || 39 | 71 | G |
- | 40 | 72 | H || 41 | 73 | I |
- | 42 | 74 | J || 43 | 75 | K |
- | 44 | 76 | L || 45 | 77 | M |
- | 46 | 78 | N || 47 | 79 | O |
- | 48 | 80 | P || 49 | 81 | Q |
- | 50 | 82 | R || 51 | 83 | S |
- | 52 | 84 | T || 53 | 85 | U |
- | 54 | 86 | V || 55 | 87 | W |
- | 56 | 88 | X || 57 | 89 | Y |
- | 58 | 90 | Z || 59 | 91 | [ |
- | 60 | 92 | \ || 61 | 93 | ] |
- | 62 | 94 | ^ || 63 | 95 | _ |
- | 64 | 96 | ` || 65 | 97 | a |
- | 66 | 98 | b || 67 | 99 | c |
- | 68 | 100 | d || 69 | 101 | e |
- | 70 | 102 | f || 71 | 103 | g |
- | 72 | 104 | h || 73 | 105 | i |
- | 74 | 106 | j || 75 | 107 | k |
- | 76 | 108 | l || 77 | 109 | m |
- | 78 | 110 | n || 79 | 111 | o |
- | 80 | 112 | p || 81 | 113 | q |
- ------------------------------------------------------------------------------
-
- * Credit - Octavian 10/28/90
-
-
- Publication ID: krackpub#7,1
-
- -----------------------------------------------------------------------------
- If intreasted in helping out please contact me on the following boards:
-
- Apple Rebel 916-457-0624 (Octavian #??)
- TCQ 614-231-7646 (Octavian #41)
- Apple Tree MW 816-826-4158 (Octavian #177)
- Ware House GS 609-429-8487 (Octavian #24)
- IxGS 914-693-5679 (Octavian #95)
- Imperial Fortress 201-808-5768 (Octavian #??)
-
- ________________________________________________________________
- [ _ _ _____ ]
- [ // \\ // / ]
- [ //\ /\\ //__ / ]
- [ // \ / \\ // ]
- [ // \/ \\ ystic // roductions ]
- [ ]
- [ "For some this is a legend, others a legecy" ]
- [ 12/17/90 ]
- [________________________________________________________________]
-
- Krack Issue 8 - 8 Series #1
-
- Issue: GPR (Game Players Review)
-
- Introduction
- ~~~~~~~~~~~~
- The GPR will be in every issue of Krack because of the growing population of
- game systems. Well will battle each other and all but never before has an
- offical GPR been released for the home computer enviorment. The purpose of the
- GPR is to get you aware of the strong points and weak points of your system.
- Following Systems Supported So Far: TG-16, Genesis, Lynx, Nintendo
-
-
- Turbo Grafx-16 Stats
- ~~~~~~~~~~~~~~~~~~~~
- Micro Processor - HU6820
- Max Screen Resolution - 256 x 216 (With Overscan 320 x 224)
- Palette of Colors - 512
- # of Colors/Screen - 256
- # Sprites/Screen - 64
- # Colors/Sprite - 16
- Stero Sound - Yes
-
- Genesis
- ~~~~~~~
- Micro Processor - 68000
- Max Screen Resolution - 320 x 224)
- Palette of Colors - 512
- # of Colors/Screen - 64
- # Sprites/Screen - 80
- # Colors/Sprite - 16
- Stero Sound - Yes
-
-
- Reviews
- ~~~~~~~
- TV Sports Football (Turbo Grafx-16)
- The first in a series of great games, Cinemaware introduces TV Sports
- Football for the Turbo Grafx-16. TV Sports Foorball includes everything from a
- pre-game show to halftime (featuring marching band) to updates of games from
- around the leauge and everything inbetween. Using the TurboTap, up to five
- people can play. Choose to be a coach or a player in both offensive or
- defensive positions, as you tackle our way through the 16 game season into the
- playoffs. What a great was to spend the off season! Retail Price $49.99
-
- Klax (Turbo Grapfx-16)
- Based on the hit arcade game, Klax is Tengen's first entry for the Turbo
- Grafx-16. Tengen kept this puzzle game true to the arcade counterpart by
- including the special bonus points ans warps. Klax is sure to become a
- classic. Retail Price $45.99
-
- Gloden Axe (Genesis)
- This is Sega's orignal arcade game and has proven a spot in the genesis
- library. In the start of the game you start off by choosing to be either a
- Dwarf, Fighter, Girl. The game has one extra level not present in the arcade
- game. The game is much like the arcade game but the controls are a little off
- so you have to line your self up with your enemy.
-
- Moonwalker (Genesis)
- This is another Sega orignal arcade game. The game is different fromn the
- arcade game in many ways. In the arcade game the perspective is a blimp view,
- which is nice, but in the genesis version it is a flat picture with litte
- effects of 3-D motion. The game is not much like the arcade so if you like the
- arcade game, dont go out and buy this and expect the same.
-
-
- Tips
- ~~~~
- Phantasy Star II
- To play this role playing game in slow motion, simply press START to pause,
- then press and hold the B button.
- Truxton
- Make sure you have at least one bomb at the end of each level. When you reach
- the boss release the bomb, and PASUE it, wait 20-30 sec. then un PAUSE it. Wow
- the boos is gone.
- R-Type
- Extra Credits: On the title screen hold down the SELECT button and rapidly
- hit 1. You must hit the buttons quickly for this trick to work (Just put the
- sucker on TURBO). The highest you can aquire is 21, once you are there hit
- START quickly!! There 21 continues.
- Galaga '90
- Extra Fire Power: During the title screen, press and hold UP, then press
- RUN. On the select mode pick single ship and the first pod (from the last
- enemy shot) will give you triple ship
-
- * Credit - Written in full by Octavian 12/20/90
-
- Publication ID: krackpub#8,1
-
- -----------------------------------------------------------------------------
- If intreasted in helping out please contact me on the following boards:
-
- Apple Rebel 916-457-0624 (Octavian #??)
- TCQ 614-231-7646 (Octavian #41)
- Apple Tree MW 816-826-4158 (Octavian #177)
- Ware House GS 609-429-8487 (Octavian #24)
- IxGS 914-693-5679 (Octavian #95)
- Imperial Fortress 201-808-5768 (Octavian #??)
-
-