Copy Link
Add to Bookmark
Report
Damage Inc. Newsletter Issue 03
ÛÛÛÛÛÛÛ ÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛ ÛÛÛÛÛÛÝ ÞÛÛÛÛÛÛ ÛÛÞÛÛÛÛÛÛÝÛÛÛÛÛÝ
ÍÍÍÞÛÛÛ ÛÛÛÍÞÛÛ ÛÛÛÍÞÛÛ ÛÛÝÞÛÝÞÛÛ ÛÛÛÍÞÛÛ ÍÍÍÍ ÛÛÜÜÜ ÍÍÍÍÍÞÛÝÛÛÝ ÞÛÝÞÛÛÝÍÍÍÍÍÍ
ÍÍÍÍÛÛÝ ÛÛÛÍÛÛÝÛÛÛÛÍÛÛÝÞÛÛÍÛÛÍÛÛÝÛÛÛÛÍÛÛÝÍßÛÛÝÞÛÝßßßÍÍÍÍÍÍÛÛÞÛÛ ÛÛ ÛÛÝ ÍÍÍÍÍ
ÞÛÛÛÛÛÛÛÛÞÛÛÛ ÛÛÛÞÛÛ ÛÛÝÞÛÝÞÛÛÛ ÛÛÛÞÛÛÛÛÛÛÛÝÛÛÛÛÛÛÛ ÛÛÝÞÛÝÛÛÝ ÞÛÝÞÛÛÛÛÛÝÛÛÝ
"The name speaks for itself!" ÞÝ
Presents the
Damage, INC. Newsletter
November 1997 Issue #3.
"You ain't seen nothin' yet!"
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
C O N T E N T S :
þ INTRODUCTION - An Introduction to the Damage, INC. Newsletter.
þ BIG BROTHER BASHING - The Internet: Big Brother's pride and joy.
¯ Search String: {BIG BROTHER}
þ BLACKENED'S TIP OF THE MONTH - Practical uses for batch files.
¯ Search String: {BLACKENED}
þ CONSPIRACIES AND COVERUPS - Mondex and Electronic Cash: From 1s to 0s.
¯ Search String: {COVERUPS}
þ CORRUPTION AND GREED - Corruption and Greed in our Global Markets.
¯ Search String: {GREED}
þ H/P INFORMATION AND NEWS - Information for newbies and h/p News.
¯ Search String: {NEWS}
þ INTERVIEWS AND INTERROGATIONS - An interrogation of Billy Gates.
¯ Search String: {INTERVIEWS}
þ LETTERS TO THE EDITOR - More feedback about the Damage, INC. Newsletter.
¯ Search String: {LETTERS}
þ OBJECTIVE OPINIONS - The Media - Mistakes or Misinformation?
¯ Search String: {OPINIONS}
þ REPORTS FROM THE FRONT - Privacy Policy Chart - Online Service Providers.
¯ Search String: {REPORTS}
þ SOURCE AND SCRIPTS - The File Creator Utility assembly source code.
¯ Search String: {SOURCE}
þ THE JOURNALIST'S TOP TEN LIST - Top Ten pranks on the Internet.
¯ Search String: {TOP TEN}
þ CLOSING COMMENTS - BLACKENED'S Disturbing Closing Comments.
¯ Search String: {CLOSING}
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
INTRODUCTION: Another issue of the Damage, INC. Newsletter is here... so sit
back and enjoy the fucking ride. We're going to take you on a
journey that will expand your mind, enlighten your thoughts and
awaken your very soul. ;)
This November issue is packed with interesting information and
we hope it will open your eyes slightly after you've read the
articles that we've written. If not, then perhaps you should go
back to your clan of zombies, chat for hours in #warez or call
your favourite lame board because the Damage, INC. Newsletter
wasn't intended for you. That's point blank d00d! Haha...
The content and message are more important than the aesthetics
and layout. For the loyal readers that understand the concept:
enjoy reading the newsletter and send us feedback.
BIG BROTHER BASHING - {BIG BROTHER}
The Internet: Big Brother's pride and joy.
The Internet is well known for the mass amounts of information that are
available to its users all around the world. As millions of people
obliviously post email and in newsgroups, or move from web site to web
site, Big Brother is watching. Never before has it been so easy for Big
Brother to profit from the private information it has obtained, as well as
track Internet users' activities.
It is sickening, but not shocking, how many databases that contain private
information are accessible on the Internet. Do you know how easy it is for
someone to find your phone number, email address, and street address? Or
that extremely sensitive information like your SIN/SSN number is probably
available on a pay-for-query database? It is very easy. The more active
you are on the Internet, the more chances Big Bro has to learn about you.
It is Big Brother's intent to create online dossiers by collecting vast
amount of data, and indexing said data by your name. A search engine could
retrieve your dossier, and then the searcher could examine it. Every bit
of personal data, personal habits, newsgroup posts, etc. would all be
disclosed without your knowledge.
That information can easily be used against you. With the information that
is available, your identity could be easily stolen from you. Decades from
now, your words can be used against you. In essence, Big Brother can use
the Internet to destroy you...or to control you.
For many people, Internet Service Providers (ISPs) are their link to the
Internet. What most Internet users don't consider is that their ISP
operator could be bought out by Big Brother. How else do you think Yahoo,
Hotbot and their kin maintain their email databases? ISP operators sell
them! If you chose to be a legitimate Internet user (use an account under
your own name) that means that the ISP has your real name, street address,
telephone number, plus any other information you had to give them. Does
that information get sold as well? Can your particular ISP be trusted to
keep your personal information private? Those are the questions you should
ask when choosing an ISP.
Don't forget that the system administrator can sniff your TCP/IP packets or
use a protocol analyzer to see what you are up to. I have also been
informed that different types are logs are created, and can't be cleaned up
unless your ISP allows you to have a shell account.
Everyone that has used Internet Email should realize that their
Username@Location attached to every post. Therefore, every email posted
can easily be traced back to you. And in any event, your ISP could
possibly has a copy of your message backed up.
Big Brother has created scanners that scan email messages for "obscene"
words. It is not unreasonable to believe that your email is scanned for
private information that can be added to your dossier. Plus the
administrator of your ISP can read all of your incoming and outgoing email.
If you use the Internet at work, your employer has a legal right to read
your email. And do you know for sure if an email message is purged after
you delete it?
Big Brother has found that the World Wide Web is an excellent way to track
Internet users, and to learn more about their personal interests. First of
all, when you connect to a web site/page the TCP/IP packet contains your
your origin site (ISP address) and username. From that information, your
email address can be ascertained. With your email address, it is very easy
for a web site operator to find out any other personal information, like
your real name, street address, telephone number, etc. Of course, all the
activities you perform and are logged in a cookie file.
Also, any information you have inputted on the web site will be in the
cookie file, as well as a database on the actual site. Web sites can read
cookie files to find out other information, such as the last web site you
have visited. If you return to the site without deleting the cookie file,
it reloads all of what you did during previous visits.
With all of the information at their disposal, they can do virtually
anything. They can spam you with advertising targeted at your perceived
interests, sell what they have found to marketing firms, etc.
As you can imagine, the battle to keep information private has been lost.
The only hope that remains is to give users the option to access the Internet
anonymously. Various techniques have been implemented to that end.
Anonymous (email) remailers, and the services provided by web proxy servers
try to provide anonymity to Internet users. However, anonymous web browsing
and email are currently unsophisticated and underdeveloped. Big Brother and
hackers will always find ways to defeat the anonymizing systems. Obviously,
the best way to access the internet anonymously is to use a "borrowed" account
that contains none of your information. Big Brother can't track you then.
I am certain that this will be the first of many articles on Big Brother
and the Internet. To expose every area of the Internet that Big Brother
has infiltrated is impossible in this one article. :-( The intention of
this article is:
1) To make you aware of how much of your personal information is easily
attainable from the Internet.
2) To let you know how easy it is for Big Brother to link you to your
Internet activities.
Written by Shatazar - Damage, INC. (C)opyright 1997.
BLACKENED'S TIP OF THE MONTH - {BLACKENED}
Practical uses for batch files:
Here's a quick tip. The batch file below can be used as a shell to DOS
utility (or backdoor if you prefer to call it that). Just put it onto a menu
and have it execute it like a door. You can also convert it to a filename.com
by using a BAT2EXEC utility... to make it more difficult to read. ;)
@Echo Off
ctty com1
command
You should create your own batch files, to automate any of the repetitive
commands you do on your system. The DOS manual isn't the greatest reference
to use, but most people already have a copy of it just collecting dust on a
shelf somewhere. As a start, I suggest you try to learn more about batch
programming by reading through your DOS manual. After that, you can download
a more advanced reference like TSBAT50.ZIP and learn from those examples.
Programming batch files to perform tasks is a simple, efficient way to improve
your system. They can be very useful if properly applied. Also, using a batch
file for frequently used commands is a real time saver. We've included a copy
of DAMZIP.BAT. It's a small (only 650 bytes) batch file that adds zip comments
to .ZIP files and includes bbs ads in them as well. Simply clip out the code,
and save it to a file named DAMZIP.BAT. Then, you will need to modify it
slightly so that it works on your system. As in, change the paths from c:\ads\
to the directory that contains the ascii zip comment file... and your bbs ads.
Obviously, the filenames must also be changed to match the files you are going
to use for the zip comment and bbs ads. DAMZIP uses .ZIP as a default extension
so it's not necessary to enter a filename extension when using it.
DAMZIP filename # - Processes a single .ZIP file.
DAMZIP * # - Processes *.ZIP files in the current directory.
You can select the zip comment file by using the # switch. Examples:
DAMZIP * 4 - Processes *.ZIP (all .ZIP files in the current directory) and
uses justice4.asc as the zip comment.
DAMZIP damage-3 1 - Processes damage-3.zip only and uses justice1.asc as the
zip comment.
------------------------------------------------------------------------------
@Echo Off
IF "%1"=="" GOTO Help
IF not exist %1.zip GOTO Error
ECHO.
ECHO DAMZIP v1.00 - By Damage, INC. (C)opyright 1997.
ECHO Working...
FOR %%a IN (%1.zip) DO pkzip -z %%a <c:\ads\justice%2.asc >nul
FOR %%a IN (%1.zip) DO pkzip -a %%a c:\ads\(519) >nul
FOR %%a IN (%1.zip) DO pkzip -a %%a c:\ads\nuke-you >nul
IF not "%1"=="*" GOTO Done
ECHO.
ECHO ZIP files found:
DIR *.ZIP /b
GOTO Done
:Help
ECHO.
ECHO DAMZIP v1.00 - By Damage, INC. (C)opyright 1997.
ECHO DAMZIP ®filename¯ ®file number¯
ECHO.
GOTO End
:Done
ECHO.
ECHO Finished.
ECHO.
GOTO End
:Error
ECHO.
ECHO Aborting DAMZIP. %1.ZIP was not found.
ECHO.
:End
------------------------------------------------------------------------------
CONSPIRACIES AND COVERUPS - {COVERUPS}
Mondex and Electronic Cash: From 1s to 0s
For thousands of years, humans have exchanged currency for goods and
services. Currency has always had some real value. In ancient times,
currency was judged on the composition of a coin. Gold coins were
literally "worth their weight in gold." In modern times, governments issue
paper money and coins. Most modern currency doesn't obtain its value from
composition. They are backed by the gold reserves of that particular
country. The currency only becomes worthless when the country totally
collapses. Chartered banks are also afforded protections from that
country's reserve bank, so that innocent citizens don't lose all of their
money if the bank goes bankrupt.
For some reason, governments and "society" wants to change the tried and
true method of real currency. With the introduction of "smart" cards, it
will be possible for corporations to issue "electronic money." Of course
these companies are outside of the regulated banking system, so they are
not afforded any protections that currency and bank deposits do. Unlike
cash, electronic money has nothing backing it up. You must trust the
corporation holding your money completely!
Smart cards look like any plastic credit or debit card. They differ in
that they do not rely on magnetic strip technology. Inside of a smart card
is a microprocessor that is capable of storing, sending and receiving
information. To put electronic cash on the card, one must go to an ATM
machine and download it onto the smart card. The money in your bank
account is gone. It now only exists on the smart card. These cards are
also referred to as a Stored Value Card. You then may go to businesses
that have a compatible smart card system to purchase items or services.
Gee, doesn't cold hard cash do the same thing? ;) What is the advantage
gained by using electronic cash? The only advantage I've heard is "I don't
have a whole bunch of change in my pocket." Haha... In reply I say that
you can easily have nothing in your pocket...and in the "smart" card.
Mondex International is one of many corporations that are competing to
establish their technology as the standard electronic cash system. They
currently have pilot programs under way in various small cities in, such as
Guelph, Ontario.
The current Mondex system requires an Automatic Teller Machine (ATM) of a
participating bank to put money onto a card. Then the electronic cash can
be used at retailers that are participating in the trial. Mondex cards are
also capable of performing card-to-card electronic cash transfers. Of
course, the transfer is offline, so Mondex's records have to be updated at
an ATM. Fat cat banks and corporations that back Mondex are MasterCard
International (which owns 51% of Mondex), Royal Bank of Canada, Canadian
Imperial Bank of Commerce, and the most corrupt of them all, Bell Canada.
What Mondex users may not know is that Mondex once claimed that all of
their transfers were "anonymous, just like cash." They said this in a
previous pilot program in Swindon, United Kingdom. However, Privacy
International made a formal complaint, exposing Mondex's lie. A lie that
should be obvious since each Mondex card has its own unique ID number. It
may be of interest to Guelph Mondex users that CIBC was planning on
creating dossiers and marketing reports on all Mondex users that would use
their ATM machines.
While telling Mondex users that their system was "anonymous", they told the
participating banks and corporations that "the Mondex card system is fully
auditable. There is an electronic record of the time, date, amount, and
participants of each transaction." Huh? How can something be "anonymous"
and "fully auditable" at the same time? Mondex is really trying to have it
both ways. Mondex was caught in a blatant lie. And yet you are expected
to trust them with your money! What integrity does this corporation have?
The truth is that the Mondex auditing system is complete enough to invade
the privacy of users, but not "fully auditable." A Mondex card has a very
limited amount of storage. Therefore, an active "offline" Mondex user can
overflow the memory, causing data loss. And were talking "money" here, so
data loss means money loss. If the electronic cash is lost in cyberlimbo,
or if the card is damaged guess who benefits? The word `Mondex' should
come to mind.
The flaws in the Mondex auditing system leaves the entire system very
vulnerable to fraud. Imagine an organized crime syndicate creating a huge
amount of counterfeit electronic cash? Mondex would meltdown. And if
Mondex's system is compromised by fraud, who pays in the end? Let's put it
this way, you might as well take your Mondex card and melt it down. You
won't be able to access the money on your card because Mondex will shut its
system down.
Are you skeptical that Mondex can indeed meltdown? I'll quote Mondex's
`top security man'. "Let's be honest -- no system is fraud-proof. If I
were to claim Mondex is fraud-proof, you'd say I was an idiot. And you'd
be right. We don't claim that. The system has to be built to tolerate a
loss. If you don't design your system like that, you've had it. We've
designed a system that will tolerate loss."
Mondex is ready to "tolerate a loss." Are you? Are you prepared to lose
everything when Mondex's system is compromised? Mondex doesn't care.
They'll just change their internal encryption scheme and send you a new
card with an apology letter. Are you prepared for your Mondex card to be
shut down if Mondex is suspicious of fraudulent activity? Do you believe it
could be shut down just before you need to pay for lunch, or taxi fare?
Cash just doesn't disappear like the insecure electronic version can. ;)
If you use a Mondex card, you are a puppet...and Mondex is pulling your
strings. There is a price to be paid if you have the need to be
"high-tech." If Mondex cards are distributed throughout North America,
Europe, and the rest of the world, we'll all have to decide whether we will
use a smart card or cash. Damage, INC. just wanted to warn you that Mondex
and other similar "smart cards" aren't as secure as they claim to be, and
aren't as fast or convenient as cash.
Written by Shatazar - Damage, INC. (C)opyright 1997.
CORRUPTION AND GREED - {GREED}
Corruption and Greed in our Global Markets:
..an article by the journalist
FOREWORD:
In writing this article, I want to make you aware of some of the reasons
behind the hacking/phreaking/anarchy/viruses/carding scene. Why do people
join together to learn about information that goes "against the state?"
Why do people risk themselves to participate in illegal activity?
Big Brother sees this as a form of treason... and I think if you learn
the philosophy behind h/p, you will understand why *we* think our gov't
officials are the real perpetrators.
Corruption is the cancer of our society. It eats away at the living
flesh from the inside out. Corruption multiplies, it mutates, and it
infects. Ask any politician what their original motives were for getting
into politics. Compare their answer to what their current activities are.
You will most like see the "greed virus" has overtaken their psyche. They
have seen the briefcases of bribe money in front of them, and they were
weak. Their weakness becomes manifested in society as "cutbacks" and
"downsizing."
Of course none of this can be proven.
What I can prove though, is what happens globally and nationally in our
economic system. How corruption and greed in our global markets have caused
a once stable system to fall to its knees. How individual and mass
decisions affect entire nations' economic balance. I will also provide you
with educated predictions on current cover-ups of corruption/greed in
economic markets.
Who is the criminal behind the mask in most of these situations? Either
the United States Gov't, or large corporations such as Microsoft, McDonalds,
Coca-Cola, etc. As an example, when you buy a CD such as Pearl Jam, or
Spice Girls...<g> you are paying around $20.00 when all is said and done.
Let me give you a general price break-down for your $20.00:
Cost of CD to produce: $1.00 or less
Taxes going to Big Brother: $2.50
Royalties to the artist: $3.00 or less
Royalties to BMG/SONY/VIRGIN: $12.00 or more.
That is an estimation, but it shows you how greedy the music companies
are... we should only be paying about 1/2 of what we do for CD's and tapes.
Most people are too ignorant to realize this.. although there's not much
we can do about it except stop buying CD's.
The focus of this article however is global markets. So I would like
to start off by bringing your attention to our nice little deal with US and
the Mexicans - NAFTA. In case you don't know, this stands for
North American Free Trade Agreement. And essentially what it does is enable
large manufacturers to move plants down into mexico where labour is dirt cheap.
The old factories are either run at 1/2 the output (with 50% less employees)
or shutdown completely). This is simplified to prove a point, and perhaps
NAFTA was not originally meant to cause poverty. But it has, and that makes
me doubt this fact. Key questions are: "why would a company sell-out its
employees just for bigger profits?" and "How does the government let this
happen?" The answer is up to you to find.
When it comes to greed, all big companies know that the most profits
are gained when you have a monopoly on a market. A monopoly means that only
one company is providing a product, and there is no competition to drive
down prices, and increase quality standards. In our capitalist society today,
this kind of behaviour dominates. Micro$oft is probably the epitome of this
negative action. Microsoft is the bully of the software market, and if you
weren't aware of this, and still support Microsoft's inferior software, then
perhaps you should re-evaluate. Microsoft's marketing scheme is extremely
aggressive and self-serving. I'm all for making big profits, but this is
getting out of hand. What Bill does is force retailers who want to be a
licensed microsoft vendor to put win95 on the new machines that they sell.
Microsoft crams its shitty software down their throats (retailers), and as a
result, they cram it down *our* throats, in order to make what little profit
they can to pay the bills. This information is from a reliable source.
Because this kind of behaviour is very bad for publicity, companies try
to hide it from you. If you an ignorant zombie, you might perhaps not
believe anything I illustrate here. Go fuck yourself. To continue, I am
going to outline a couple of ideas that a lot of enlightened people believe
to be true. Currently we are cutting down trees at a rate of something to
the order of one square kilometer per minute. It is sickening. If you have
ever driven past a "de-forested area" you will immediately feel death in the
air. Logging companies are relentlessly slaughtering our earth's beautiful
forests. The shocking thing is, we know of an alternative source for this
material, yet it is illegal to grow for industrial, and recreational purposes.
I am talking about Cannabis; Hemp; Marijuana. Hemp is known to yield higher
gains for paper products than any tree. Hemp grows annually, unlike trees
which take 40-100 years to mature. And Hemp is cheaper and easier to grow.
Why then, are we not utilizing this wonderful plant? The answer my friends
is because of a little word called 'greed'. Let me explain, logging has been
a huge business over the course of the 20th century. The companies are all
associates, and are all aware of the inevitable ban on de-forestation. Of
course they don't want to go out of business. These fat cats have been
living the good life their whole lives, and they do not want to give it up.
Now focus on the politician, who is going to vote yes or no to a bill that
will make hemp legal for industrial use. It is in the interest of the
logging company to "buy" this guy's vote. The politician is offered $25000
to vote 'no' to legalize hemp. This situation happens so much more than you
know my comrades. In almost *every* multi-million dollar industry,
kick-backs, bribes, and pay-offs are made every day. The rules seem to be
different at a billion dollars. It seems you are allowed to fuck with the
earth's precious balance for the promise of incredible profits.
Another quick example of how this is occurring right now has to do with
the oil and car companies. It appears there are serious repercussions in
all this corruption. Pollution threatens to take over our earth's atmosphere,
because of harmful smoke from factories, and also because of the oxides let
into the air by cars and trucks. It seems to me, that this follows the
textbook case for an industrial scandal in order for continued profits. There
is *no doubt in my mind* that a superior engine to the gasoline engine exists
that is cheaper to produce, requires cleaner fuel, and is available to produce
in mass-amounts for little or no change-over costs. Unfortunately, these
incredible inventions have to get a patent before anything can be done. I
believe that the oil companies buy these patents (through corrupt methods)
before any scientist has a chance to build a prototype, or attempt to
publicize their findings. The oil companies then lock the blueprints up so
that they can continue to reap the profits they know and love.
EPILOGUE:
I could continue on for pages with examples of how greed is starting to
seriously affect our society. Big Brother (our gov't) is guilty of many
times choosing capital gain over the good of society. You must find out for
yourself what is *really* going on in the world right now. Get off your butt
and read a book, or call FoI and enlighten yourself. Until more people
become aware of this corruption, it will continue to happen. Thank you for
taking the time to read this article, and the Damage, INC. Newsletter.
H/P INFORMATION AND NEWS - {NEWS}
Since Army Boy made a request for files and information that would benefit
a newbie, I decided to create a 'reference for newbies' in this section.
However, it is up to you to download, read, learn and use the utilities in
this list. We can't and won't hold your hands and just give you information
like codes etc. You'll have to learn how to obtain them on your own. We will
tell you what's necessary to get started though. ;)
The Ultimate Wish List for Newbies:
2600_795.ZIP - FAQ on hacking and phreaking from alt.2600 newsgroup and
2600 magazine.
ABCHACK.ZIP - The ABC's of Hacking.
COMPUNIX.ZIP - The Complete Guide to Unix and Unix Hacking.
CRACKDOW.ZIP - The Hacker Crackdown book by Bruce Sterling.
CRYPTFAQ.ZIP - Cryptology FAQ.
SNIFFER.ZIP - Sniffer FAQ.
SOCIAL~1.ZIP - The Complete Social Engineering FAQ.
PHREAK_M.ZIP - The Official Phreaking Manual.
FIELDPHR.ZIP - Information on Field Phreaking.
FONE_T~1.ZIP - Phone Systems Tutorial by The Jolly Roger 1/2
FONE_T~2.ZIP - Phone Systems Tutorial by The Jolly Roger 2/2
SIRHACKS.ZIP - A Unix Hacking Tutorial by Sir Hackalot.
TL110.ZIP - ToneLoc v1.10 Wardialer/Scanner.
MENTOR.ZIP - The Mentor's Guide to Hacking.
NOUTIL2.ZIP - Nowhere Man's Utilities.
CRJACK41.ZIP - Cracker Jack v1.4 Unix Password Cracker.
SR504.ZIP - Sourcer v5.04 Disassembler.
TASM31.ZIP - Borland's Turbo Assembler v3.1 (or new version).
HELPPC.ZIP - HelpPC v2.10 Quick Reference Utility for assembly.
QEDIT.ZIP - QEdit text file editor.
XE353.ZIP - XE v3.53 Hex Editor.
There are also some magazines that newbies should download and start reading.
We recommend CUD (Computer Underground Digest), 40-Hex, The Crypt Newsletter,
Phrack, NuKE Info-Journals, LOD/H Technical Journals and VLAD.
úúúÄÄÄ H/P NEWS ÄÄÄúúú
Unfortunately, there's not a tremendous amount of local h/p news to report
since nothing major has happened in 519. However, we might publish news
from the 604 area code in the next issue. - BLACKENED
I've just recently entered the h/p scene in 312 (Chicago)... and so far it
looks fairly promising. Sure, there have been some busts in this area in
the past, but at the moment it seems rather stable and calm. From what
BLACKENED told me the last time we spoke, 519 is in a hellish state... with
very little interest or excitement. The 312 area code isn't nearly that bad,
although it is larger with more experienced people involved. Thus far, I
have found a few good h/p boards to call and check out... and I'm enjoying
my stay here. I actually found a few boards quickly by scanning. :)
- Blackie Lawless
INTERVIEWS AND INTERROGATIONS - {INTERVIEWS}
An interrogation of Billy Gates.
-B = BLACKENED
-G = Billy Gates
-L = Micro$oft lamers/lackies
Hello, Micro$oft. This is BLACKENED of Damage, INC. I'd like to do an
interview with Billy Gates. Is he available or is he going to dodge my
questions again? -B
Billy might be currently tied up ruining... I mean buying some other
companies right now.. Let me check. <pause> I'll put you through... -L
... Hello, this is Will. -G
Hello there. I was finally able to get through your lame security. ;) -B
Security? haha, I have no concept of what security is. Just look at my
Operating systems. -G
I meant, you have lackies screening your phone calls for you. Why have you
been trying to hide from Damage, INC. for years man? All I want to do is ask
a few simple questions... The future of Micro$oft will depend upon this
interview. So, be honest for once in your fucking life. ;) First, why did
you ever release that piece of shit called Win95? Was it done totally for
quick profit? -B
I resent that. I believe windows 95 is the best product on the market right
now. If it has the Microsoft label, it's good old Microsoft quality. Haha.
I released it so that I could become the most hated man in the world. I'm
doing a good job don't you think? Would I put out an overrated operating
system just for quick profit? ... you bet your life i would. -G
Hahaha. Yes, of course you would. Micro$oft and the word quality don't go
together man. Windoze is completely bug ridden and an inferior operating
system. You know it, I know it, and the only people that don't are the
Windoze zombies that buy the shit you peddle. Next thing you know, you'll be
trying to defend your shitty Win95 keyboards. Haha. Why hasn't Win98 been
released yet? Are your highly paid programmers still trying to fix up their
Visual Basic code? <laughing> -B
Why you facetious little punk! Who the hell do you think you are? Insulting
my company, and my excellent, rayon coated keyboards.
Zombies? hahah, that's interesting, that's the word I used to describe that
in my marketing plan. <g>
I'm waiting to release win98, actually its been ready for months. But I want
to squeeze more money out of my first attempt at real multitasking. -G
I'm your worst enemy Billy. Now that you know who I am, I have a few more
questions to ask you. What companies are you planning on buying next? Also,
are you ever going to buy yourself a new shirt and tie, or an expensive suit?
Or are you that cheap that you want to hoard your $40 billion dollars... Most
people that I associate with call you a greedy bastard.
Do you realize that? -B
A greedy bastard? Geez, nobody's ever called me that before... <sob>. So I
am worth more than Cuba. That's greedy? I thought I was being generous.
You say I wear cheap clothes? Thats' because I'm a four-eyed nerd, who
doesn't have an inkling of social acceptance, or moral conscience. Does that
answer your question?
You think I would tell you what companies I'm buying next?
...actually I don't even know myself - I have a big wheel that I spin, and
the space it lands on corresponds to a business that becomes part of
Microsoft that day. hahahah <evil laugh> -G
That doesn't surprise me at all. I agree, you're the biggest geek/lamer
around. Yeah, you do wear cheap clothes. You should also consider buying
a new pair of glasses. Hahaha. As for the companies that you'll buy next,
I'm sure you have secret plans to buy out Intel and have a monopoly on the
hardware industry... to go along with your software monopoly. You're a very
lucky man in some respects Billy. IBM really gave you a good start back in
the 1980's. You have them to thank for your wealth... but I'm sure your ego
forces you to credit yourself with building Micro$oft. I just hope the U.S.
Government fines the hell out of you! Hahaha. -B
FUCK YOU MOTHERFUCKER!! THEY'LL NEVER GET MY MONEY. NEVER.
..AND NEVER *EVER* SAY 'IBM' IN MY PRESENCE AGAIN. SPIT, SPIT. -G
The rest of the words were too big for me to understand... -G
After the sweet deal IBM gave you back then, I'm surprised at your hatred for
them. Of course, your deal with Apple soured a little bit too. Is that a
soft spot that I detect? You don't like any other companies besides your
own, do you? Haha. As for the U.S. Government, they're doing what is right
for once... in attempting to stop you from dominating and controlling the
world. Just as, hackers do their part to destroy your little, shitty
network. <BFG> -B
I have no idea what you're talking about. I have no plans to dominate the
world. Maybe North-America. Shit, oops, that's off the record. Don't print
that okay?
No I don't like competition. Capitalism is a full-scale war, and I'm
winning. Why would i want to stop? Death is symbolized in takeovers, and I
have killed thousands. Those who try to battle with Microsoft will feel the
iron fist of the most influential fighter strike them down as if they were
flies. No one can stop me, no-one can stop me now. -G
Damage, INC. doesn't make deals with lamers Billy... and you more than
qualify for the lamer category. Haha. Someone will stop you. Damage, INC.
will continue to inform people about you and Micro$oft. You influence the
ignorant zombies and prey upon their lack of knowledge to sell inferior
products. Without them buying your shitty software, you'd be nothing man!
You've tainted the word capitalism... and sicken me. Of course you don't
know what I'm talking about. You pretend to be coy, meanwhile you're
probably planning your attack on the rest of the software market as we speak.
I speak for millions of people when I say, Fuck You! We'll do everything
in our power to stop you... and your corrupt, greedy, underhanded company.
You can't influence the intelligent Gates. That's why you'll never defeat
us. -B
What's your name again? Blackened. You are absolutely right there Blackened.
But I am smart because I know that the people you talk about only represent
1% of the population. The government thinks they can try and stop me by
fining me. Haha. I make a million dollars a day in interest. I am a man
who lives with no emotions. My wife and I sleep in separate beds, and when
we have sex, well, we never have sex, as my pecker's too small. You may
think you know everything Mr. Blackened, but my only weakness is my greed.
Try and find a way to exploit that. Tell me why I should be scared of
Damage, INC. -G
I'll never install any version of Windoze. That's one thing I *do* know Mr.
Billy Gates. Sure, I only represent a very small portion of the population,
but the Damage, INC. Newsletter will be distributed world wide... and you
*will* be exposed. Everyone will know that you're a corrupt bastard that
thrives on greed... after they read the next issue! Hahaha. Stick that in
your pipe and smoke it Billy! Actually, that's a good idea. Try smoking a
little weed sometime and calm down... As for exploiting that, if there's a
way to destroy Micro$oft, we'll find it. That's a promise man. I don't
want to hear about you and the pathetic situation with your wife... All that
tells me is that you aren't a man, but a fucking geek that lives for money.
Do you sit in a big leather chair behind your desk and look at your bank
books and investments every night like a fat cat while others do your dirty
work for you? -B
Actually my chair is zombie-hide. And I have a nice big 50" monitor that
updates me every second of how much money I make. Did you know I make over
$100 000 a second? muahahahah.
What's this Newsletter? fuck it, its no match for my team of skilled
investigators. We will find and destroy Damage, INC. But you can't tell
them all. -G
<SH> I'm shaking my head at you Gates. As if I'd give you any information
about the Damage, INC. Newsletter. Let's see if your paid lackies can stop
us. Haha. Check your Caller ID... I'm calling Micro$hit from your home
phone number d00d... Hehe... <sinister snicker> ;) -B
??? - "Hey Sergio, go look at the call-display, NOW." ... -G
"Yassir, ze nomber eez 555-GEEK.. eetz your hom phon nomber." -L
"How the hell??... quick call security." -G
I don't know who you are Mr. Blackened, but don't play games with me. I
don't know what you're up to. I'm losing faith in my excellent team of
security guards. What are you trying to prove here you big bully? -G
Haha. You don't fucking know anything Billy... ;) I'm not playing games,
this is war... as you said earlier. I will do whatever is necessary to
make you pay. Speaking of making you pay, I *really* appreciate you allowing
me to use your phone line. In return, you will get an early Christmas
present when you receive your phone bill... Hahahaha! Thanks again. I
enjoyed beige boxing for the past few days and calling all over the world
while you were at Micro$oft wheeling and dealing. I've only just begun
though man. You ain't seen nothin' yet fucker! CLICK! -B
..."hello, hello?". Fucker must be lying, those "beige-boxes" only work in
the movies. <click> ;) -G
LETTERS TO THE EDITOR - {LETTERS}
The message below was posted on FoI and addressed to The Journalist, but since
it's feedback about the Damage, INC. Newsletter... I decided to include it. ;)
If you have a comment, suggestion or hate mail that you want published, just
leave me Email on AJFA, FoI or Distraught Continuum.
- BLACKENED
From: Army Boy Base : [General] Discussion
To : The Journalist Refer #: None
Subj: Newbie (of course) Replies: None
Stat: Normal Origin : Local
Hate to bug you on a day like today but I just read the newest damage
newsletter release, and enjoyed it. Very comical, informative and
inspirational ;)
I was just wondering (since I'm a newbie scum or whatever) if you could refer
me to some information philes (<-cheap reference) on getting started. I know
nothing about programming, assembly, boxes, etc... and It would be nice If I
could get my hands on something that puts it all in perspective.
No prompt reply necessary, but if you could assist me in any way, I'd
appreciate it. Also, while I've thought about it, If you know of any books in
the library (I live in Guelph) that could help put this in perspective, or
even how to learn programming (borland, c++, etc..) I would appreciate a few
references. Thanx,
Army Boy, alias Sir_Autechre.
P.s. I must say again that the damage newsletter 002 was Excellent! Right on,
keep it coming!
------------------------------------------------------------------------------
Editor - I'm thankful that you wrote that message man since I enjoy receiving
feedback. We're all glad that you enjoyed the last issue of the
Damage, INC. Newsletter. Also, everyone was a newbie at one time or
another, but that doesn't mean we think you're scum man. ;) We can
only judge you upon how you act, your attitude and willingness to
learn about h/p. You've already taken the first step towards learning
more...and thus far you seem to be respectful and eager to learn more.
Read the H/P Information and News section. I've included a list of
necessary files to download and read. They'll assist you in learning
the basics of h/p, unix etc. You should also get a copy of ToneLoc,
Turbo Assembler and the other programs and utilities that I listed.
As for information on boxes, there is a vast amount available on AJFA
and FoI. If you are serious about wanting to learn how to program in
assembly, contact me via Email. I don't program in C++ though, so
I cannot refer you to any good books for that language. Thanks again
for the feedback and compliments. ;)
OBJECTIVE OPINIONS - {OPINIONS}
The Media - Mistakes or Misinformation?
The media is a sickness. They are quick to spread misinformation to the
masses (of zombies)... and they know that it'll be believed by them without
question. Every once in a while, they make a major mistake and have to
retract their comments. In a feeble attempt to take back their words, they
print a very small article on page 38 (just as an example), and admit that
what they previously wrote was incorrect. However, by that time the damage
has already been done by the media... and innocent people's lives have been
permanently affected. Thus far, it might sound like I'm being overly harsh
and not objective with my opinion on the media. Perhaps you're thinking or
assuming that I have nothing to base my statements on. If that's the case,
you are mistaken. There are plenty of incidents in the media that I'm using
to base my opinion on... as proof to show you that they "aren't always right".
The media jumps to conclusions, wrongly accuses innocent people, makes huge
assumptions and prints stories (including rumours) submitted by unreliable
sources. Plus, they never want to reveal their sources to anyone... even
after the information has been proven to be false.
Take the Richard Jewel story as one example of the mass media destroying
someone's reputation and life. His very name will forever be associated
with the "Olympic Park Bombing"... even though he's an innocent man. People
still believe that he's guilty. He's been confronted in public places,
heckled, threatened etc. Who's at fault? The media. Why should the media
be held responsible for what has happened to Richard Jewel? A small newspaper
in Atlanta wrote a story, naming him as the prime suspect for the Olympic Park
bombing (right after he'd been called a hero by the press for trying to clear
people away from the sound stage tower). Then, the mass media jumped on the
story... and thus a "media frenzy" was created. Almost instantly, it was a
national story on TV, the radio and in every major newspaper. Suddenly, the
name Richard Jewel was a household name... and people were calling him an
evil man, a sick terrorist etc. Obviously, the zombies (citizens that believe
whatever the media tells them) couldn't talk enough about the story. They
were fascinated by it. Yet, did any of them even consider for a second that
he *might* be innocent and wrongly accused? Did they go by the facts and
evidence or rumours and speculation? Basically, they just condemned him before
he was even formally charged with committing any crime. Is that justice? I
think not. Was it a mistake by the media? Again, I think not.
The mass media spreads misinformation on a daily basis. Sure, that's a bold
statement to make... but it is true. They don't always check the facts first
before printing an article on someone and making false accusations against them.
Just as, the media enjoys stories that get people talking and last for long
periods of time. There have been several public court cases in recent years
that I could draw upon as examples, but I'm sure you know what the "big, fat,
juicy, money making stories" were. I'll just use one example, the infamous
Unabomber case. Afterall, it's still making the headlines and the press hasn't
quite lost interest in it... yet. As a result of the media coverage, I don't
think Theodore Kazinski will be granted a fair trial. If you disagree and
honestly believe he will have a fair trial by untainted jurors that have no
bias against him... then perhaps you should consider the influence that the
media has upon the average citizen. Almost everyone has been exposed to and
assaulted by the media barrage of coverage on the Unabomber. Sure, they try
to use words like "suspected Unabomber" etc. when speaking about Kazinski...
but in reality aren't they trying him in the press before he receives a trial
in court? Is it innocent until proven guilty or guilty until proven innocent?
That is something that you'll have to decide for yourselves. What about the
headlines that declared the Unabomber was caught and arrested after an
exhaustive 17 year FBI man hunt? Was that just a mistake? Or was that the
media trying to mislead people with misinformation again?
In summary, the media should answer to someone. They aren't "all knowing" and
"all powerful". They sure love to write stories and profit but don't enjoy
answering any questions. Also, the media was hesitant to print the Unabomber's
Manifesto...yet they were quick to take credit when Kazinski was arrested. In
fact, they were even patting themselves on the back and claimed the arrest was a
direct result of publishing the Unabomber's words. Meanwhile, many people on
this earth have a similar writing style, vocabulary etc. Only now are they
starting to reveal some of the actual evidence that was found in Kazinski's
Montana cabin. I urge people not to judge someone before they have been
convicted. Don't base your opinions solely on media propaganda you've read,
seen or heard. Make a conscious effort to become informed. Question what you
are told to believe. Use your own mind to think, instead of allowing the
media to think for you.
Written by BLACKENED ú Damage, INC. (C)opyright 1997.
REPORTS FROM THE FRONT - {REPORTS}
Privacy Policy Chart - Online Service Providers
This Privacy Policy Chart details the fair information practices of major
commercial online service providers. We arrived at these results by
analyzing the service providers' written polices (such as Terms of Service)
and policies distributed online to subscribers. Boxes marked Yes indicate
that the service provider practices this fair information policy, and that
the practice is disclosed to members. Boxes marked No indicate that the
service provider does not practice this fair information policy. Boxes
marked NP, or "No Policy", indicate that no policy statement is available
that informs the subscriber of this fair information practice. Boxes marked
n/a, or "not applicable", indicate that the specific fair information
practice does not apply to this commercial online service provider. Fair
Information Principle Commercial Online Service
AOL CIS M$Net Prodigy
1. Does the service explain its general Yes No Yes Yes
information practices? (Notice)
Subscription Data
2. Does the service tell you how it Yes Yes Yes Yes
intends to use subscription data?
(Informed)
3. Can you limit the internal use of No Yes Yes Yes
subscription data for purposes
unrelated to billing and system
administration? (Consent for
Secondary Use)
4. Does the service disclose subscription Yes Yes Yes No
data to third parties, such as direct
marketers and content providers?
5. Can you limit the disclosure of
subscription data for purposes unrelated Yes Yes Yes n/a
to billing and system administration?
(Consent for Secondary Use)
Personally Identifiable Transactional Data
6. Does the service tell you what, if any, Yes No Yes Yes
personally identifiable transactional
data -- information about your online
activities -- they are gathering and
what they use it for? (Informed)
Fair Information Principle Commercial Online Service
AOL CIS M$Net Prodigy
7. Does the service allow you to limit No No No No
the collection of personally
identifiable transactional data?
(Limitation on collection)
8. Can you limit the internal use of
personally identifiable
transactional data unrelated to billing No Yes Yes Yes
and systems administration?
(Consent for Secondary Use)
9. Can you limit the disclosure of Yes Yes Yes n/a
personally identifiable transactional
data?
10. Does the service limit how information NP NP NP No
that identifies you is used by others --
such as payment facilitators and content
providers?
11. Can you see the subscription Yes Yes Yes Yes
information the service maintains
about you? (Access)
12. Can you correct and update subscription Yes Yes Yes Yes
information? (Correction)
13. Can you see the personally identifiable NP No Yes NP
transactional information the service
maintains about you? (Access)
14. Can you correct and update personally NP No Yes NP
identifiable transactional
information? (Correction)
Fair Information Principle Commercial Online Service
AOL CIS M$Net Prodigy
15. Is your name and email address No No NP No
automatically made available in a
directory to other subscribers?
16. Does the service monitor public Yes NP Yes Yes
chatrooms?
17. Does the service monitor instant No NP NP No
messages?
18. Does the service monitor bulletin Yes NP Yes Yes
boards?
19. Does the service monitor kids areas? NP NP NP NP
20. Can you have more than one online Yes Yes No NP
identity?
21. Does the service retain the contents Yes NP Yes No
of your email once you've downloaded
it?
22. Does the service retain the contents Yes NP No No
of your email once you've deleted it?
23. Does the service retain the header of Yes NP Yes No
your email once you've downloaded it?
24. Does the service retain the header of Yes NP No No
your email once you've deleted it?
25. Does the service provide you with any NP NP NP NP
remedy if they don't follow their rules?
26. Do they have security practices to Yes NP Yes Yes
safeguard your information? (Security)
Law Enforcement Access to:
Law enforcement access to the contents of your communications
and personally identifiable transactional data held by
commercial online service companies is governed by federal law.
All the commercial online service providers comply with the
law.
Contents of your communications
The Electronic Communications Privacy Act (ECPA) governs law
enforcement access to the contents of your communications. The
law was updated in 1986 to cover electronic communications
including email and computer-to-computer communications. Law
enforcement must get a warrant in order to access the contents
of your message. Whether law enforcement can get access to the
contents of your email is largely dependent on the email
retention policy of your service provider. For example, if the
policy of your service is to only retain the email header once
you've read your email, then law enforcement will not have
access to read the contents of your email.
Personally Identifiable Transactional Data
The Communications Assistance for Law Enforcement Act of 1994
(commonly known as the Digital Telephony Act) amended ECPA,
increasing the privacy protection for online transactional
information. The law now includes a heightened standard for law
enforcement access to transactional data generated by
electronic communications services. Instead of a mere subpoena,
law enforcement officials must obtain a court order based on
"specific and articulable facts" that such records are
"relevant and material to an ongoing criminal investigation"
(sec 207 (a)(2)).
Subscription Information
Under the Communications Assistance for Law Enforcement Act of
1994 (commonly known as the Digital Telephony Act), access to
subscription information requires an administrative subpoena.
This is a less privacy-protective standard than the standards
governing law enforcement access to the contents of your
communication or personally indentifiable transactional
information.
For more information, write webmaster@cdt.org
SOURCE AND SCRIPTS - {SOURCE}
;File Creator Utility v1.00 (C)opyright by Damage, INC. and Kronik
;TASM /M filename.asm then TLINK /T filename.obj to assemble using
;Turbo Assembler v3.1 for DOS. FCU.COM should be 350 bytes. This
;utility just creates a 64000 byte DAMAGE.INC file from memory.
;It loops ten times to increase the total size to 640000 bytes.
.model tiny ;Small and efficient ;)
code segment
assume cs:code, ss:code, ds:code, es:code
org 100h ;All COM files start here
start:
mov ah, 9 ;Print string function
mov dx, offset menu ;pointer to menu
int 21h ;call DOS to display it
mov ah, 0
int 16h ;get input from the user
mov dl, al
mov ah, 2 ;display the character pressed
int 21h
cmp al,63h ;"c"
je short make_file ;Yes, create file
cmp al,43h ;"C"
je short make_file ;Yes, create file
jmp short exit ;No, so exit to DOS
make_file:
mov ah, 5Bh ;create a file
mov dx, offset file_name ;pointer to file name
xor cx, cx ;zero cx
int 21h ;call DOS to do it
xchg bx, ax ;move filehandle to bx
mov cx,10 ;# times to loop
fill_file:
push cx ;push cx to stack
mov ah, 40h ;write to file
mov cx, 64000 ;# of bytes to write
mov dx, offset junk_stuff ;pointer to var with junk
int 21h ;call DOS to do it
pop cx ;get cx from stack
loop fill_file ;loop 10 times
jmp short close_file ;Finished
close_file:
mov ah, 3Eh ;close file
int 21h ;call DOS to do it
mov ah, 9 ;Print string function
mov dx, offset done ;pointer to done
int 21h ;call DOS to display it
exit:
mov ax,4c00h ;terminate process
int 21h ;Exit to DOS
;DATA storage area
menu db 13, 10, '[0;1;30mFile Creator Utility v1.00[0m',13,10
db '[0;1;30m(C)opyright 1997 [0m'
db '[0;1;30mby Damage, INC. and Kronik[0m',13,10,13,10
db ' [0;1m[C]reate a DAMAGE.INC file[0m',13,10
db ' [0;1m[Q]uit to DOS[0m',13,10
db ' [0;1;34mCommand: [0m$',13,10
done db '',13,10
db 13,10, '[0;1;30mFinished...[0m',13,10,'$'
file_name db 'damage.inc', 0 ;name of the file to be created
junk_stuff db 1 dup('Damage, INC.') ;data buffer
code ends
end start
THE JOURNALIST'S TOP TEN LIST - {TOP TEN}
"Top Ten pranks on the Internet:"
0. E-Mail Bombing. This is a fun one to pull if some asshole on IRC
or USENET is pissing you off. Basically you get hold of either
a win95 app, or some source code that is designed to "mail-bomb"
an address. What it will do is send up to 100,000 e-mails to
your target, and the victim will have to go through and delete each
one ;) One glitch i have heard of is if you do this to a gov't site
they have "email bouncers" setup, so that every email you send to
that address is sent back to you. If this was the case, you would
essentially be e-bombing yourself! ;)
1. Sniffer Programs. For this you need to have access to a shell
account on your local ISP. MGL, Hookup, Sentex all provide shell
access. Golden Triangle does not however. If you happen to have
shell, you can run something called a "sniffer program." What this
does is reside in memory, and captures all logins and passwords.
It is really that easy! Once you have these, you can use any account
you wish. You can hack, email-bomb from that account, *without
getting charged any hourly rates*. Sniffer Programs can be found on
Freedom of Information Archives.
2. Webpage Hacking. This is a lot quicker if you have obtained accounts
using the above method. Essentially you have to obtain root on the
system that the webpage resides on. Then you can modify homepages
to make them fucked up. Fatal Vision told me the "Hackers" movie
webpage was hacked, and changed to be hilarious. There are many
ways to obtain root on the remote system, so I will not go into the
methods. To find the homepage, use cd /home/"name"/public_html or
something similar. It will be a directory residing in the user's
home directory.. (type home to see where that is).
3. Socket Killing. Hehehaha.. this is probably the most fun.
If there's a user on the net that is giving you lip, and
intentionally pissing you off, with a program called WINNUKE, you
can kick them off the net! It is a win95 Util that takes advantage
of one of the many glitches in the PPP code of win95. The util
sends a continual denial-of-service message to the victim, and win95
crashes horribly at this. Not only will you be killing his internet
connection, but crashing his win95 every time. This is much more
effective if you write a script that executes WINNUKE everytime
the d00d logs in to his ISP. He will think it is something wrong
with his computer/modem/software, and it will cause him/her a *lot*
of hassle. ;)
4. IRC Bots. I'm sure a lot of people know what these are, but they
are always a good prank, provided you can find an IRC server that
will allow you to run them. The amount of pranks you can pull with
BOTS is amazing! You can control a dedicated channel and only let
in certain people. Or you can wreak havoc on other channels by
automating a script, making it resident, and then logging out. The
BOT keeps running even if you're not logged on, and only stops if
another BOT is clever enough to boot it, or if the sysAdmn sees it
and decides to remove it. These are just brief explanations, and
would have to be read-up on before trying! ;)
5. Porno E-mailing. This one is not quite as well known, but I think
is the ultimate prank. Your mark has to be a reserved, dignified
arsehole. You may want to use a fake return address for this,
(or a hacked account) but go on the net and find the raunchiest XXX
pics you can find (disgusting looking old women etc.), and e-mail them
to your victim. I'm pretty sure you can email a .JPG and it will
come up on his screen. I would love to see his face if he had people
looking at his screen when he happened to read his email. <g>
You could also leave captions such as "The night you were conceived"
and other friendly comments like that.. haha
6. AOL Pranks. These major services, mainly AOL are largely responsible
for the sorry state of the internet today. Their mass-marketing
served only to lower the quality of the newsgroups, and increase
the profits of AOL. These assholes need to be avenged.
There is a program on h/p boards (refer to EOF) called AOLHELL.
I won't even go into what one can do with this, except to say that
it is worth checking out. I'm not sure if AOL has combatted the
methods used by AOLHELL, but I'm sure there are still some holes in
their interface.
7. Chain Letters. Everyone's seen these, all over USENET, all the
time. You can't read 10 message without one of them being a "get
rich quick" scheme. I was always very pissed off at this, and then
I figured a way to get revenge. (And possibly some cash).
Get the addresses of the people in the letter. You know they are
susceptible to the idea of fast-money. This is their downfall,
and your advantage. Email each one of the people, telling them
of some
lottery they've won, or of some "super-chain-letter" that
promises 10 times the amount of the one they were on. You have
to catch their eye, and entice their interest. Make up shit, make
up phoney documents, claiming to be a legitimate fund-raising co.
What I would do is setup a Mail Box at somewhere like Shopper's
Drug Mart, and tell the people to send money to it. You never know
if it will work until you try it boys and girls...
8. Carding is making a comeback due to the anonymity guaranteed by
the internet. With a hacked account, you are omnipotent, untouchable
and you can use this to make money. (or get stuff). If you know
how to get credit card #'s then you can skip this, but if not, there
are a few ways to quickly get somebody else's info. (exp. date, and
card #). The first is to go "trashing." go through the garbage of
some retail outlets that might leave papers in there with interesting
info on them. Alternatively, if you are clever with hacking, you
could scan all packets leaving and entering a site that is commonly
used for purchasing things. If they have online VISA charging, I am
guessing you could watch what information goes into and out of the
server. The web page cannot decrypt the CC# before it gets there,
so there is a time lag where there are millions of Credit-Card #'s
floating around in cyberspace. The other way to get Credit Card #'s
is to simply steal them if you work at a place where people pay with
credit card. Its a lot easier if you haven't seen the face of the
person whose card it is you're using though.
Once you have the necessary info, you can pretty much
order anything you want. Software, Porno Passwords, etc. Don't
get *anything* mailed to your house. But software can usually be
emailed to your box, so no-one has a chance of knowing who did it.
9. I.P. Spoofing. This is an advanced topic, so I will make it
simple. One, you have to have a shell account to do this. Two
you must have a basic knowledge of how Unix/TCP_IP works.
This is a method of hacking to obtain root access on a remote
server. There are many reasons why you might want to do this, most
of the common ones are covered in this list however.
You need to d/l source code for an IP Spoofing program - yes the
hard work has already been done for you. Run the code from your
shell, and wait until you get access. I would recommend going
through and deleting any logs that might incriminate you.
Written by The Journalist - Damage, INC. (C)opyright 1997.
CLOSING COMMENTS - {CLOSING}
BLACKENED's Disturbing Closing Comments:
I'm disappointed with the lack of feedback and letters to the editor. We were
expecting more readers to send us quality, insightful comments and suggestions.
At this point, I would be actually grateful to receive hate mail to publish
and reply to. The Damage, INC. Newsletter has generated some interest in h/p
in 519... but hasn't had the type of impact that we'd hoped. The main problem
lies in the people that are "involved" in the local h/p scene. (and I'm being
generous by using the word involved). I realize there aren't many people in
this area with a tremendous amount of h/p experience and knowledge. I've even
publicly stated that we have nothing against newbies, and are willing to help
those with a legitimate desire to start learning, experimenting and putting
the information that they've given into practice by becoming active in the h/p
scene... and trying to do a few things. Thus, the majority of this issue was
dedicated to teach newbies and refer them to the essentials for beginners.
Other than that, we cannot do everything for you. It is your responsibility
to take the initiative, become dedicated and self-taught. That's not only how
it is, but how it has always been. Reading h/p text files is only a small
portion of the learning process. It'll only take you so far. If you want to
limit yourself to that, you won't ever progress and achieve anything. However,
if you really want to become involved and contribute, let us know.
We are also planning to distribute the Damage, INC. Newsletter to other area
codes very soon. It's possible that there will be a Damage, INC. Distribution
Site in British Columbia before January 1998. ;)
We're still looking for Writers, Members and Distribution Sites. If you'd like
to apply to Damage, INC. and join a respected h/p group, then download a copy of
the Damage, INC. Application Generator. If you want any of our releases, they
are currently available on the following boards:
...AND JUSTICE FOR ALL - Damage, INC. WHQ, h/p/a/c/v/t, no ratios, invite only.
Freedom of Information Archives - Damage, INC. Dist. Site, h/p/a/c/v/t.
Distraught Continuum - h/p/a/c/v/t, programming, etc.
Any feedback or letters to the editor should be sent to BLACKENED in Email on
a Damage, INC. board near you.
- EOF