<-><-><-><-><-><-><-><-><-><-><-><-> <-> Death By Electronics <-> <-> Volume 1, Issue 1 <-> <-> Released on <-> <-> 10/1/94 <-> <-><-><-><-><-><-><-><-><-><-><-><-> +----------+ |Disclaimer| : We, at DBE, take no responsability for your actions +----------+ due to this magazine. We are simply using the freedom of speech, and the freedom of the press. We do not encourage you to do anything that we demonstrate in this magazine. In other words, if you get caught, we will be getting away clean while you will be in prison getting fucked up the ass every night by some queer in jail. +------------------+ |Quick Introduction| : Well, this is our first issue. We will improve as +------------------+ time goes on. So, if you read this throughly, and think to yourself "this sucked" then, all we can say is that we will try to make the next issue better. <-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-> <-> Table Of Contents <-> <-> <-> <-> 1. Cracking Password Protection in Windows <-> <-> 2. New Methods to Succesefully Virus Someone <-> <-> 3. Phone Lines <-> <-> 4. Phreaking Tips <-> <-> 5. Reccomended Reading <-> <-> 6. Rules for Escaping <-> <-> 7. The Basics of Being a Hacker <-> <-> <-> <-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-> (1). Cracking Password Protection in Windows by No Fear Problem: Somebody has configured their conputer with a password- protection screensaver in Windows, and you want to get around it. Solution: In a text editor such as EDIT, open the file CONTROL.INI located in the Windows directory. Search for PWProtected=1, and change every occurence of this line to read PWProtected=0. Next, search for [SreenSaver] and remove that line and the line below it, the one that reads Password= followed by something cryptic. Now edit WIN.INI to search for ScreenSaverActive=1 and type a 0 instead of 1. The next time you load Windows, the password will be gone, and you can reconfigure the screen saver with one of your own. There that was simple, you can go in and out without leaving a trace. To do this, simply undo all of the changes that was done above and the password protection will be enabled with the original password. (2). New Methods to Succesefully Virus Someone by Source Unknown Did you ever read a text file called "Virusing for Lamers" that was released about 6 months ago? Well, I was the author of that file (even though I didnt mention it. And yes, that means that I was the author of the "Anarchy In School" series (From SCHOOL1.TXT to SCHOOL4.TXT). Well, at the end of Virusing for Lamers, I said to watch out for my sequel, Virusing for Elite (Don't you just hate the way people use that word now??) Anyways, I never released VFE, since I had beleived that the techniques in it could easily backfire onto me. In other words, you would know every trick up my sleve to virus somebody, and that somebody could be me. Well, I will now demonstrate a couple techniques that I use to virus people (which I rarely do now, and which you shouldn't do unless you have a good reason). Method #1. Have you noticed that most commercial games of more then 1 disk, usually have 3+ files for the first disk, and 1 big file for every other disk? EX: DISK1 : DEICE.EXE, INSTALL.BAT, DOOM2LZH.DAT, DOOM2LZH.1 DISK2 : DOOM2LZH.2 DISK3 : DOOM2LZH.3 (And so on....) Ok. I will explain what I would do from here. You can modify my little "technique" to your needs. 1. I rename PKUNZIP.EXE to DOOM2LZH.DAT 2. I PKZIP about 20 files together (Including the virus) Into this one file called DOOM2LZH.1 3. I create a .EXE file that does this: -REN DOOM2LZH.DAT PKUNZIP.EXE -PKUNZIP DOOM2LZH.1 -REN PKUNZIP.EXE DOOM2LZH.DAT -(I would run the virus here) -ASK FOR DISK 2,3 and 4 As you can see, there is no way of stopping this. Inside all the DOOM2LZH.X, should be real files of a real game, so that the person dosen't suspect anything. In Q-Basic, it would look like this (simplified) CLS PRINT "DOOM 2 INSTALLATION" SHELL "REN DOOM2LZH.DAT PKUNZIP.EXE" SHELL "PKUNZIP DOOM2LZH.1" SHELL "VIRUS" 'Run the virus SHELL "DEL VIRUS" 'Delete it right away CLS 'Cause it will say file deleted PRINT "PLEASE ENTER DISK 2 AND PRESS ENTER" INPUT X SHELL "PKUNZIP DOOM2LZH.2" PRINT "PLEASE ENTER DISK 3 AND PRESS ENTER" INPUT X SHELL "PKUNZIP DOOM2LZH.3" SHELL "REN PKUNZIP.EXE DOOM2LZH.DAT" PRINT "GAME SUCCESEFULLY INSTALLED" END Now. If you have the time and patience, you can set this up so that the game will actually work once installed. This way, the person won't suspect that its a virus. Since most people know that if games don't work, it may be corrupted by a virus, you should it this way. One way of knowing what will happen, is that you should view INSTALL.EXE If you used QBASIC (and compiled it) all text strings for the SHELL instructions will show. So, if you see stuff like "REN DOOMLZH.DAT VIRUS.EXE" "VIRUS", "DEL VIRUS.EXE" That should be a hint that the installation file is fake. I use Norton Commander to view the file (F3) or you can use QDOS or even DOS EDIT (which won't allow you to see the text strings all the time) Method #2. A patch for a game is always a good method for virusing people Rename the virus to something like PATCH.DAK and make a batch file re-rename it to its original name and run it. So that when you scan it with McAfee, it wont be detected unless you write SCAN [drive][directory] /A /A is for all. If you dont put it, McAfee only scans .com and .exe which means PATCH.DAK (the hidden virus) wont be scanned. So it should look like this: -PATCH.DAK (Virus) -PATCH.BAT (the file that must be runned to "patch" the game) or PATCH.COM (use BAT2EXE to turn .BAT into .COM) -FILE_ID.DIZ (You know what a FILE_ID.DIZ is used for) -README.TXT (A text file on how to use the patch) Now, whats most likely going to happen is this: Mister Idiot see's a patch (or crack) for his favorite game. He download's it, copy's it in the same directory as the game, reads the README.TXT, virus scan's the game directory, finds out that no virus is present (if he didn't use /A with McAfee) and runs the patch. Now he loads up the game, finds out that it didn't work. Tries it again and again. Finally, he gives up and delete's the patch. Don't use a overwriting virus for this technique. Just a appending virus otherwise, as soon as he finds out that things aren't working right, he will panic and virus scan his computer again. ----=**DONT RUN THESE FILES**=---- +================+================+================+================+ | Pakage Name ||| Virus/Trojan ||| Released ||| Area Code | +================+================+================+================+ | REGDOOM.ZIP | Bootkill Trojan| Febuary '94 | 613 | | SCORCH17.ZIP | Fatfuck Trojan | Febuary '94 | 613 | | SIM2000$.ZIP | Fish Virus | March '94 | 613 | | GRAF-X24.ZIP | Red X Virus | April '94 | 613 | | C&DMODEM.ZIP | April 15 Virus | April '94 | 613 | | RAPTOR$.ZIP | 250 Virus | June '94 | 613 | | TLX322-5.ZIP | A_A_II Virus | July '94 | 613 | +----------------+----------------+----------------+----------------+ I know that these files are old, but they may still be floating around somewhere out there. They were created by hackers like you and me out to release their anger on society. Like, I remember getting infected by a unscanable virus, but I managed to get rid of it manually (took me 2 hours), put it on diskette, create a fake patch for a game and release it. I remember that at one BBS, about 8 people had downloaded it. I don't do that stuff anymore though...(Don't get all offended, it was a LAME PD BBS) (3). Phone Lines by No Fear Knowing how phone lines are hooked up is very important, if you want to adventure yourself into the realms of Bell Canada. Lets start with the simple wire that connects the modem to the wall-mounted plug. Look carefully and each end, and there will be either two or four different coloured wires on each plug. In fact only two is needed for everyday phone use, the others are for different lines like in an office. Most of the time the colours of the wires are red, green, yellow and black. In old wires it is different; there will be usually six wires and of colour white with green dots, green with white dots, and the same for blue and orange. Now holding each end of the wire with the tap of the plug upwards, notice that the colour order of one plug is the inverse of the other. In order for the connection to work properly, wires must be place in that order. Keep this in mind when splicing a wire. Even though there are usually four wires, only two is needed. So when connecting wall-mounted plugs or extending the phone line pick two colours. The standard is green-red and black-yellow. With old wires, select the two wires that contain the same colours, such as white with blue dots and blue with white dots. For the phone jacks, there is no worrying about inverting the colour order. In most new plugs each screen has a letter beside it indicating which colour goes where. All that matters is that a red wire will be connected to another red wire. Now if wires are all mixed up, it's a matter of following the wires from plug to plug so as not to get any cross overs. A very useful tool is a multimeter; wires can be check for electricity flow and determine if it's cut or not. To check for power simply switch on the voltmeter and probe around to determine which two wires conduct. The potential reading should be 115 volts. This is also a good method of figuring out which wire lead where. It is a big pain in the ass to install a line and discover that it is not working. First check to see if electricity can flow through the wire by switching on the ohmmeter and checking the resistance of the wire. There should be none, if the reading indicates resistance then either there is a bad connection or the wire is damage and should not be used, because there could be a short or it will not function properly. If the reading is very large or no reading, the wire is cut somewhere along the way. To try to discover where, twist the wire at different spots until the reading changes. Try to keep all connection simple and neat. It will be much simpler to do modifications later on, and there will be less static enabling higher CPS on a modem. If there is a hum or hiss in the phone, then some wires were crossed over or some lines and plugs are connected in parallel, instead of series, with another wire or plug. The trick is to obey a couple of easy rules, and keep it simple. By the way, do not short circuit Bells line switches and lines two often or they will call and ask for an explanation. (4). Phreaking Tips by Source Unknown So you wanna take up the amazing hobby of phreaking, but don't where to start? If yes, then this is for you. Ok. There are many ways to phreak. 1. Try to find yourself a "Phreak Payphone". I will describe to you MY phreaking payphone so that you get the idea. -Its one of those new payphones (with the digital screen) -Its in a residential area (a quiet neighbourhood) -Its in front of a Plaza -Nobody hangs out there after 11:00pm -Its a 5 minute walk from my house There! The reason for this, is that sometimes, you must do something from a payphone, to risk the chances of you getting caught. This may be using a 1-800 PBX, using boxes, etc. 2. Try to find yourself a "Boxing Area" I will describe to you MY Boxing Area area. -Its in a town house area -Its a 5 minute walk from my house -It is next to a DARK field (so that I can run away and lose my predators) -Its very quiet, people here are rarely outside -Old people live there Ok! The reason for this, is that its handy having a area where you can beige box or experiment any other box. This area is perfectly ideal. Think about it. Its close to my house, its full of old people, it has a big park next to it so that I can easily run away, its very quiet. Whenever I feel like boxing, I go to this place. 3. If you use a stolen cell phone, make sure you use it on the run (like in a car) because they can home-in on you pretty easily. It is VERY stupid to use it in your own house. 4. Whenever a Bell repair man comes to your house, fixes up a payphone, drinks in a bar etc, try talking to him. They probably had a hard day, the boss yelled at him, half of his friends got layed off because of budjet cuts, etc. You may learn something usefull from him. After all, they are human too. Put yourself in his shoes. 5. I remember hearing somewhere about how The Wizard (amazing phreak) used to go in the Bell office for a tour, and he would hide bugs in the building. When the tour was over, he would go on the other side of the street, and use his walkman to tune-in on his bugs, and listen to everything that would go on inside of the building. Now, before you go do this, I heard that they now have security to prevent this sort of thing. But hey! Its worth a try. (5). Reccomended Reading by Source Unknown I reccomend that you read these text files or magazines: -2600 Magazines -PHRACK Magazines -The Anarchist's Cook Book -The Hackers Crackdown -The Official Phreakers Manual (6). Rules for Escaping by Source Unknown So, do you think that you will be getting chased in the future? I will give you handy advice to help you escape from your predators. Rule #1. Always ask (And answer) yourself these 3 questions when getting chased: -Who is chasing me (Cop, Teenager, Old Woman, etc) -How are they chasing me (by car, on bike, on foot, etc) -How many are chasing me (1, 3, 28, etc) Rule #2. Being on foot is USUALLY better then being on bike or car when you are getting chased (depends on the situation) I will tell you why. If you are in a car, they can easily take down your lisence plate. So even though you got away, you will be caught the next day. If you are on bike, you can quickly escape somebody chasing you on foot, except that you have to sometimes jump fences, go in backyards (all of which is impossible on bike) If you are on foot, your only disadvantage is that you are slow, and that you cant run away for long. But there are many advantages. Rule #3. You should know your neighbour hood well. I was on the bus one day, and I heard somebody say "I can get around my neighbour hood with my eyes closed". That impressed me. You should be able to do that also. You should know which backyard leads you to which street (or house or whatever), which street leads you to which dead end and so on. Rule #4. Now that you are getting chased, and that you know who, how and how many, you gotta find a way to escape. Know how to escape. Dont just pick a street, and run down hoping to lose him. Take this for a example: I am getting chased by a guy on bike, and I am on foot. As I run down the hill, I see a 4 way intersection 50 feet in front of me. If I go straight, I will have to keep on running down a street, for a good 2 minutes, and the guy will catch me in 40 seconds since he is on a bike. So thats bad. If I go left, I will be in the residential area in 30 seconds, where many curves and corners are, so I MIGHT loose him there. If I go right, I will be in a park in 30 seconds, and since the guy chasing me is on a bike, I can easily escape him in the tall grass. Rule #5. Make it hard for the predator to catch you. So that means, jump fenses, knock down garbage cans in back of you, run through a busy street (watch out for the cars!), yell "THIS GUY IS TRYING TO RAPE ME!!!" if you pass a group of teenagers (they will probably take advantage of the situation to beat up the predator. If they get caught, they would say in court "but we had to protect the other guy! He was going to get raped!") And so on. Rule #6. Hide is UNobvious places, and don't hide in a area where you can't escape in case the guy finds you there (up a tree, under a car, in a dead end, etc) Well, I hope that helps you guys out! I better start talking more about "computer stuff" and less about Anarchy. After all, our name is Death By Electronics, not Death by Anarchists. (7). The Basics of Being a Hacker by Source Unknown So, you wanna be a big hacker eh? Good choice! If it werent for hackers, many companies would be out of business. Think about it. If there werent any viruses, why should we have anti-viral programs? If there werent any system's getting crashed, why should we get a tape backup? If they werent any system hacks, why should we get security? You get the idea.... Read On! Rule #1. Always carry a Swiss Army Knife on you. Not only can they be real handy to unscrew bolts, open locks, cut wires and open your beer bottle, but they can be used in self defense also. And, I beleive, that its perfectly legal to carry one (except on a plane). Rule #2. Good hackers don't brag. The main reason people get caught, is cause someone told the police who did it. Another thing, you shouldnt leave any "signatures" of what you did (leaving a big "Your system was hacked by a DBE member" or something similar like that is a big nono.) They can use this to your disadvantage if you get caught. Rule #3. Know what you are doing. Dont go hack Bell Canada if you dont know what a phone is. You should work your way to the top. Not the other way around. Rule #4. Don't repeat your actions. I heard that when the Pentagon got hacked, they (the pentagon) had set up a trap the next day in hope that the hackers would call back. If these hackers would of called back, they would be in jail as we speak. They didn't call back, and they are probably getting drunk somewhere right now. Rule #5. Hang out with someone who knows what he is doing. You shouldnt completely rely on text files like these. It is much better if you hack with an expert in the area. Search around, leave messages on boards asking for stuff like this. Not only will you get known in the area, but you will gain valuable information. Rule #6. Know your limits. Hacking something every week is fine. But hacking 20 different things every day is bad. They say that the average person who regurly steals from stores, gets caught on the 50th or 60th time. Every time you hack, you have a chance of getting caught. Remember this. Rule #7. Hacking should be a hobby or a pass-time. Not something you do so that you can be accepted in a group or BBS. If you don't like something, don't do it. Thats how simple it is. Rule #8. You will suck at first. Don't expect to be able to accomplish the impossible the first or second time you try it. You will only get better by experience. Rule #9. You can never be too safe. Don't try to impress anybody. Don't take risks to show people that you aren't scared. Remember, hacking is a BIG offense. You might go in jail if you get caught. Rule #10. Who cares what the others think. If at school, people make fun of you because you always "talk computer", fuck them. Let them sit in front of TV watching Berverly Hills 90210 while you are doing what you like most. I am not saying to be a "social drop-out" and to do nothing except go on the computer. I am simply saying do what you feel like doing. Oh yea, to the people who really annoy you, remember what you are, and fuck them over if you really want to. I know that there is this guy at school who really annoys me. I will fuck up his phone line sometime soon. Thats an advantage of being a hacker. Well, those are my 10 basic rules for being a hacker. The most important one is probably to be careful. Watch your back. Don't leave a trace. Lets compare hacking a BBS to vandalising a house: To vandalise a house (which I don't do anymore) these are the precautions I would take: I would wear dark clothes, do it at 3:00am in the morning, be either alone or with ONE other person, make sure its a quiet area where no police patrols, make sure they don't have security (dogs, motion detectors, etc). To hack a BBS, these are the precautions I would take: Create a fake user on the BBS, use a PBX, make sure that the sysop and users are lamers, make sure that the sysop cant be watching me (I would do it during school hours or at 3:00am), make sure that nobody knows about it, and so on. Well, as you can see, you have to plan both of these events out, and you have to know what you are doing. Remember this whenever you want to hack something. <*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*> <*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*> <*><*> <*><*> <*><*> Well, that concludes issue 1 of DBE Magazine. We hope to be <*><*> <*><*> able to release the next issue on November 1st. Until then, <*><*> <*><*> remember.... <*><*> <*><*> <*><*> <*><*> "There is no such thing as something being unhackable. This <*><*> <*><*> applies to everything from software to payphones to arcade <*><*> <*><*> games. The only thing that is present is the level of <*><*> <*><*> difficulty to hack something. Everything is hackable, no <*><*> <*><*> matter how complicated and secure it is..." <*><*> <*><*> -Source Unknown <*><*> <*><*> <*><*> <*><*> <*><*> <*><*> Members in DBE up to date: <*><*> <*><*> <*><*> <*><*> Source Unknown <*><*> <*><*> No Fear <*><*> <*><*> NightWidow <*><*> <*><*> HellùSpawn <*><*> <*><*> <*><*> <*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*> <*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*>